X-Git-Url: http://andersk.mit.edu/gitweb/openssh.git/blobdiff_plain/06617857197c00b4fdd0e1456bf25c82c796f4cf..4b3d23b41266cfc4bd54d0a3e2acc22bdf228c6d:/ChangeLog diff --git a/ChangeLog b/ChangeLog index 52ac8653..d8c2c94a 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,14 +1,318 @@ +20020611 + - (bal) ssh-agent.c RCSD fix (|unexpand already done) + - (bal) OpenBSD CVS Sync + - stevesk@cvs.openbsd.org 2002/06/09 22:15:15 + [ssh.1] + update for no setuid root and ssh-keysign; ok deraadt@ + - itojun@cvs.openbsd.org 2002/06/09 22:17:21 + [sshconnect.c] + pass salen to sockaddr_ntop so that we are happy on linux/solaris + - stevesk@cvs.openbsd.org 2002/06/10 16:53:06 + [auth-rsa.c ssh-rsa.c] + display minimum RSA modulus in error(); ok markus@ + - stevesk@cvs.openbsd.org 2002/06/10 16:56:30 + [ssh-keysign.8] + merge in stuff from my man page; ok markus@ + - stevesk@cvs.openbsd.org 2002/06/10 17:36:23 + [ssh-add.1 ssh-add.c] + use convtime() to parse and validate key lifetime. can now + use '-t 2h' etc. ok markus@ provos@ + - stevesk@cvs.openbsd.org 2002/06/10 17:45:20 + [readconf.c ssh.1] + change RhostsRSAAuthentication and RhostsAuthentication default to no + since ssh is no longer setuid root by default; ok markus@ + +20020609 + - (bal) OpenBSD CVS Sync + - markus@cvs.openbsd.org 2002/06/08 05:07:56 + [ssh.c] + nuke ptrace comment + - markus@cvs.openbsd.org 2002/06/08 05:07:09 + [ssh-keysign.c] + only accept 20 byte session ids + - markus@cvs.openbsd.org 2002/06/08 05:17:01 + [readconf.c readconf.h ssh.1 ssh.c] + deprecate FallBackToRsh and UseRsh; patch from djm@ + - markus@cvs.openbsd.org 2002/06/08 05:40:01 + [readconf.c] + just warn about Deprecated options for now + - markus@cvs.openbsd.org 2002/06/08 05:41:18 + [ssh_config] + remove FallBackToRsh/UseRsh + - markus@cvs.openbsd.org 2002/06/08 12:36:53 + [scp.c] + remove FallBackToRsh + - markus@cvs.openbsd.org 2002/06/08 12:46:14 + [readconf.c] + silently ignore deprecated options, since FallBackToRsh might be passed + by remote scp commands. + - itojun@cvs.openbsd.org 2002/06/08 21:15:27 + [sshconnect.c] + always use getnameinfo. (diag message only) + - markus@cvs.openbsd.org 2002/06/09 04:33:27 + [sshconnect.c] + abort() - > fatal() + - (bal) RCSID tag updates on channels.c, clientloop.c, nchan.c, + sftp-client.c, ssh-agenet.c, ssh-keygen.c and connect.h (we did unexpand + independant of them) + +20020607 + - (bal) Removed --{enable/disable}-suid-ssh + - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au + - (bal) use 'LOGIN_PROGRAM' not '/usr/bin/login' in session.c patch by + Bertrand.Velle@apogee-com.fr + +20020606 + - (bal) OpenBSD CVS Sync + - markus@cvs.openbsd.org 2002/05/15 21:56:38 + [servconf.c sshd.8 sshd_config] + re-enable privsep and disable setuid for post-3.2.2 + - markus@cvs.openbsd.org 2002/05/16 22:02:50 + [cipher.c kex.h mac.c] + fix warnings (openssl 0.9.7 requires const) + - stevesk@cvs.openbsd.org 2002/05/16 22:09:59 + [session.c ssh.c] + don't limit xauth pathlen on client side and longer print length on + server when debug; ok markus@ + - deraadt@cvs.openbsd.org 2002/05/19 20:54:52 + [log.h] + extra commas in enum not 100% portable + - deraadt@cvs.openbsd.org 2002/05/22 23:18:25 + [ssh.c sshd.c] + spelling; abishoff@arc.nasa.gov + - markus@cvs.openbsd.org 2002/05/23 19:24:30 + [authfile.c authfile.h pathnames.h ssh.c sshconnect.c sshconnect.h + sshconnect1.c sshconnect2.c ssh-keysign.8 ssh-keysign.c Makefile.in] + add /usr/libexec/ssh-keysign: a setuid helper program for hostbased + authentication in protocol v2 (needs to access the hostkeys). + - markus@cvs.openbsd.org 2002/05/23 19:39:34 + [ssh.c] + add comment about ssh-keysign + - markus@cvs.openbsd.org 2002/05/24 08:45:14 + [sshconnect2.c] + stat ssh-keysign first, print error if stat fails; + some debug->error; fix comment + - markus@cvs.openbsd.org 2002/05/25 08:50:39 + [sshconnect2.c] + execlp->execl; from stevesk + - markus@cvs.openbsd.org 2002/05/25 18:51:07 + [auth.h auth2.c auth2-hostbased.c auth2-kbdint.c auth2-none.c + auth2-passwd.c auth2-pubkey.c Makefile.in] + split auth2.c into one file per method; ok provos@/deraadt@ + - stevesk@cvs.openbsd.org 2002/05/26 20:35:10 + [ssh.1] + sort ChallengeResponseAuthentication; ok markus@ + - stevesk@cvs.openbsd.org 2002/05/28 16:45:27 + [monitor_mm.c] + print strerror(errno) on mmap/munmap error; ok markus@ + - stevesk@cvs.openbsd.org 2002/05/28 17:28:02 + [uidswap.c] + format spec change/casts and some KNF; ok markus@ + - stevesk@cvs.openbsd.org 2002/05/28 21:24:00 + [uidswap.c] + use correct function name in fatal() + - stevesk@cvs.openbsd.org 2002/05/29 03:06:30 + [ssh.1 sshd.8] + spelling + - markus@cvs.openbsd.org 2002/05/29 11:21:57 + [sshd.c] + don't start if privsep is enabled and SSH_PRIVSEP_USER or + _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@ + - markus@cvs.openbsd.org 2002/05/30 08:07:31 + [cipher.c] + use rijndael/aes from libcrypto (openssl >= 0.9.7) instead of + our own implementation. allow use of AES hardware via libcrypto, + ok deraadt@ + - markus@cvs.openbsd.org 2002/05/31 10:30:33 + [sshconnect2.c] + extent ssh-keysign protocol: + pass # of socket-fd to ssh-keysign, keysign verfies locally used + ip-address using this socket-fd, restricts fake local hostnames + to actual local hostnames; ok stevesk@ + - markus@cvs.openbsd.org 2002/05/31 11:35:15 + [auth.h auth2.c] + move Authmethod definitons to per-method file. + - markus@cvs.openbsd.org 2002/05/31 13:16:48 + [key.c] + add comment: + key_verify returns 1 for a correct signature, 0 for an incorrect signature + and -1 on error. + - markus@cvs.openbsd.org 2002/05/31 13:20:50 + [ssh-rsa.c] + pad received signature with leading zeros, because RSA_verify expects + a signature of RSA_size. the drafts says the signature is transmitted + unpadded (e.g. putty does not pad), reported by anakin@pobox.com + - deraadt@cvs.openbsd.org 2002/06/03 12:04:07 + [ssh.h] + compatiblity -> compatibility + decriptor -> descriptor + authentciated -> authenticated + transmition -> transmission + - markus@cvs.openbsd.org 2002/06/04 19:42:35 + [monitor.c] + only allow enabled authentication methods; ok provos@ + - markus@cvs.openbsd.org 2002/06/04 19:53:40 + [monitor.c] + save the session id (hash) for ssh2 (it will be passed with the + initial sign request) and verify that this value is used during + authentication; ok provos@ + - markus@cvs.openbsd.org 2002/06/04 23:02:06 + [packet.c] + remove __FUNCTION__ + - markus@cvs.openbsd.org 2002/06/04 23:05:49 + [cipher.c monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c] + __FUNCTION__ -> __func__ + - markus@cvs.openbsd.org 2002/06/05 16:08:07 + [ssh-agent.1 ssh-agent.c] + '-a bind_address' binds the agent to user-specified unix-domain + socket instead of /tmp/ssh-XXXXXXXX/agent.; ok djm@ (some time ago). + - markus@cvs.openbsd.org 2002/06/05 16:08:07 + [ssh-agent.1 ssh-agent.c] + '-a bind_address' binds the agent to user-specified unix-domain + socket instead of /tmp/ssh-XXXXXXXX/agent.; ok djm@ (some time ago). + - markus@cvs.openbsd.org 2002/06/05 16:48:54 + [ssh-agent.c] + copy current request into an extra buffer and just flush this + request on errors, ok provos@ + - markus@cvs.openbsd.org 2002/06/05 19:57:12 + [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c] + ssh-add -x for lock and -X for unlocking the agent. + todo: encrypt private keys with locked... + - markus@cvs.openbsd.org 2002/06/05 20:56:39 + [ssh-add.c] + add -x/-X to usage + - markus@cvs.openbsd.org 2002/06/05 21:55:44 + [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c] + ssh-add -t life, Set lifetime (in seconds) when adding identities; + ok provos@ + - stevesk@cvs.openbsd.org 2002/06/06 01:09:41 + [monitor.h] + no trailing comma in enum; china@thewrittenword.com + - markus@cvs.openbsd.org 2002/06/06 17:12:44 + [sftp-server.c] + discard remaining bytes of current request; ok provos@ + - markus@cvs.openbsd.org 2002/06/06 17:30:11 + [sftp-server.c] + use get_int() macro (hide iqueue) + - (bal) Missed msg.[ch] in merge. Required for ssh-keysign. + - (bal) Forgot to add msg.c Makefile.in. + - (bal) monitor_mm.c typos. + - (bal) Refixed auth2.c. It was never fully commited while spliting out + authentication to different files. + - (bal) ssh-keysign should build and install correctly now. Phase two + would be to clean out any dead wood and disable ssh setuid on install. + - (bal) Reverse logic, use __func__ first since it's C99 + +20020604 + - (stevesk) [channels.c] bug #164 patch from YOSHIFUJI Hideaki (changed + setsockopt from debug to error for now). + +20020527 + - (tim) [configure.ac.orig monitor_fdpass.c] Enahnce msghdr tests to address + build problem on Irix reported by Dave Love . Back out + last monitor_fdpass.c changes that are no longer needed with new tests. + Patch tested on Irix by Jan-Frode Myklebust + +20020522 + - (djm) Fix spelling mistakes, spotted by Solar Designer i + + - Sync scard/ (not sure when it drifted) + - (djm) OpenBSD CVS Sync: + [auth.c] + Fix typo/thinko. Pass in as to auth_approval(), not NULL. + Closes PR 2659. + - Crank version + - Crank RPM spec versions + +20020521 + - (stevesk) [sshd.c] bug 245; disable setsid() for now + - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups() + +20020517 + - (tim) [configure.ac] remove extra MD5_MSG="no" line. + +20020515 + - (bal) CVS ID fix up on auth-passwd.c + - (bal) OpenBSD CVS Sync + - deraadt@cvs.openbsd.org 2002/05/07 19:54:36 + [ssh.h] + use ssh uid + - deraadt@cvs.openbsd.org 2002/05/08 21:06:34 + [ssh.h] + move to sshd.sshd instead + - stevesk@cvs.openbsd.org 2002/05/11 20:24:48 + [ssh.h] + typo in comment + - itojun@cvs.openbsd.org 2002/05/13 02:37:39 + [auth-skey.c auth2.c] + less warnings. skey_{respond,query} are public (in auth.h) + - markus@cvs.openbsd.org 2002/05/13 20:44:58 + [auth-options.c auth.c auth.h] + move the packet_send_debug handling from auth-options.c to auth.c; + ok provos@ + - millert@cvs.openbsd.org 2002/05/13 15:53:19 + [sshd.c] + Call setsid() in the child after sshd accepts the connection and forks. + This is needed for privsep which calls setlogin() when it changes uids. + Without this, there is a race where the login name of an existing + connection, as returned by getlogin(), may be changed to the privsep + user (sshd). markus@ OK + - markus@cvs.openbsd.org 2002/05/13 21:26:49 + [auth-rhosts.c] + handle debug messages during rhosts-rsa and hostbased authentication; + ok provos@ + - mouring@cvs.openbsd.org 2002/05/15 15:47:49 + [kex.c monitor.c monitor_wrap.c sshd.c] + 'monitor' variable clashes with at least one lame platform (NeXT). i + Renamed to 'pmonitor'. provos@ + - deraadt@cvs.openbsd.org 2002/05/04 02:39:35 + [servconf.c sshd.8 sshd_config] + enable privsep by default; provos ok + - millert@cvs.openbsd.org 2002/05/06 23:34:33 + [ssh.1 sshd.8] + Kill/adjust r(login|exec)d? references now that those are no longer in + the tree. + - markus@cvs.openbsd.org 2002/05/15 21:02:53 + [servconf.c sshd.8 sshd_config] + disable privsep and enable setuid for the 3.2.2 release + - (bal) Fixed up PAM case. I think. + - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy + - (bal) OpenBSD CVS Sync + - markus@cvs.openbsd.org 2002/05/15 21:05:29 + [version.h] + enter OpenSSH_3.2.2 + - (bal) Caldara, Suse, and Redhat openssh.specs updated. + +20020514 + - (stevesk) [README.privsep] PAM+privsep works with Solaris 8. + - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to + match what newer style ptys have when allocated. Based on a patch by + Roger Cornelius + - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work. + - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8 + from PAM-enabled pragraph. UnixWare has no PAM. + - (tim) [contrib/caldera/openssh.spec] update version. + 20020513 - - (djm) Add --with-superuser-path=xxx configure option to specify what $PATH - the superuser receives. + - (stevesk) add initial README.privsep + - (stevesk) [configure.ac] nicer message: --with-privsep-user=user + - (djm) Add --with-superuser-path=xxx configure option to specify + what $PATH the superuser receives. + - (djm) Bug #231: UsePrivilegeSeparation turns off Banner. + - (djm) Add --with-privsep-path configure option + - (djm) Update RPM spec file: different superuser path, use + /var/empty/sshd for privsep + - (djm) Bug #234: missing readpassphrase declaration and defines + - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/ + OpenSSL < 0.9.6 20020511 - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch. Now only searches system and /usr/local/ssl (OpenSSL's default install path) Others must use --with-ssl-dir=.... - (tim) [monitor_fdpass.c] fix for systems that have both - HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h has - #define msg_accrights msg_control + HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h + has #define msg_accrights msg_control 20020510 - (stevesk) [auth.c] Shadow account and expiration cleanup. Now @@ -57,7 +361,8 @@ 20020426 - (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode during distprep only - - (djm) Disable PAM password expiry until a complete fix for bug #188 exists + - (djm) Disable PAM password expiry until a complete fix for bug #188 + exists - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on patch from openssh@misc.tecq.org @@ -130,21 +435,23 @@ 20020421 - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0). - entropy.c needs seteuid(getuid()) for the setuid(original_uid) to succeed. - Patch by gert@greenie.muc.de. This fixes one part of Bug 208 + entropy.c needs seteuid(getuid()) for the setuid(original_uid) to + succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208 20020418 - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from Sturle Sunde 20020417 - - (djm) Tell users to configure /dev/random support into OpenSSL in INSTALL + - (djm) Tell users to configure /dev/random support into OpenSSL in + INSTALL - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca - (tim) [configure.ac] Issue warning on --with-default-path=/some_path if LOGIN_CAP is enabled. Report & testing by Tuc 20020415 - - (djm) Unbreak "make install". Fix from Darren Tucker + - (djm) Unbreak "make install". Fix from Darren Tucker + - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen - (tim) [configure.ac] add tests for recvmsg and sendmsg. [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for @@ -182,7 +489,8 @@ - (bal) OpenBSD CVS Sync - markus@cvs.openbsd.org 2002/04/10 08:21:47 [auth1.c compat.c compat.h] - strip '@' from username only for KerbV and known broken clients, bug #204 + strip '@' from username only for KerbV and known broken clients, + bug #204 - markus@cvs.openbsd.org 2002/04/10 08:56:01 [version.h] OpenSSH_3.2 @@ -253,13 +561,15 @@ - (bal) OpenBSD CVS Sync (now for the real sync) - markus@cvs.openbsd.org 2002/03/27 22:21:45 [ssh-keygen.c] - try to import keys with extra trailing === (seen with ssh.com < 2.0.12) + try to import keys with extra trailing === (seen with ssh.com < + 2.0.12) - markus@cvs.openbsd.org 2002/03/28 15:34:51 [session.c] do not call record_login twice (for use_privsep) - markus@cvs.openbsd.org 2002/03/29 18:59:32 [session.c session.h] - retrieve last login time before the pty is allocated, store per session + retrieve last login time before the pty is allocated, store per + session - stevesk@cvs.openbsd.org 2002/03/29 19:16:22 [sshd.8] RSA key modulus size minimum 768; ok markus@ @@ -317,7 +627,8 @@ do not talk about packets in bufaux - rees@cvs.openbsd.org 2002/03/26 18:46:59 [scard.c] - try_AUT0 in read_pubkey too, for those paranoid few who want to acl 'sh' + try_AUT0 in read_pubkey too, for those paranoid few who want to + acl 'sh' - markus@cvs.openbsd.org 2002/03/26 22:50:39 [channels.h] CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too @@ -374,8 +685,9 @@ simplify num_identity_files handling - markus@cvs.openbsd.org 2002/03/25 21:13:51 [channels.c channels.h compat.c compat.h nchan.c] - don't send stderr data after EOF, accept this from older known (broken) - sshd servers only, fixes http://bugzilla.mindrot.org/show_bug.cgi?id=179 + don't send stderr data after EOF, accept this from older known + (broken) sshd servers only, fixes + http://bugzilla.mindrot.org/show_bug.cgi?id=179 - stevesk@cvs.openbsd.org 2002/03/26 03:24:01 [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h] $OpenBSD$ @@ -413,7 +725,8 @@ indent - markus@cvs.openbsd.org 2002/03/14 15:24:27 [sshconnect1.c] - don't trust size sent by (rogue) server; noted by s.esser@e-matters.de + don't trust size sent by (rogue) server; noted by + s.esser@e-matters.de - markus@cvs.openbsd.org 2002/03/14 16:38:26 [sshd.c] split out ssh1 session key decryption; ok provos@ @@ -434,7 +747,8 @@ BSD license. from Daniel Kouril via Dug Song. ok markus@ - provos@cvs.openbsd.org 2002/03/17 20:25:56 [auth.c auth.h auth1.c auth2.c] - getpwnamallow returns struct passwd * only if user valid; okay markus@ + getpwnamallow returns struct passwd * only if user valid; + okay markus@ - provos@cvs.openbsd.org 2002/03/18 01:12:14 [auth.h auth1.c auth2.c sshd.c] have the authentication functions return the authentication context @@ -462,11 +776,12 @@ [compress.c] export compression streams for ssh-privsep - provos@cvs.openbsd.org 2002/03/18 17:50:31 - [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c auth-skey.c auth.h - auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c kexgex.c servconf.c - session.h servconf.h serverloop.c session.c sshd.c] - integrate privilege separated openssh; its turned off by default for now. - work done by me and markus@ + [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c] + [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c] + [kexgex.c servconf.c] + [session.h servconf.h serverloop.c session.c sshd.c] + integrate privilege separated openssh; its turned off by default + for now. work done by me and markus@ - provos@cvs.openbsd.org 2002/03/18 17:53:08 [sshd.8] credits for privsep @@ -492,9 +807,9 @@ [auth-options.c auth.h session.c session.h sshd.c] clean up prototypes - markus@cvs.openbsd.org 2002/03/19 10:49:35 - [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h packet.c session.c - sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c sshconnect2.c sshd.c - ttymodes.c] + [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h] + [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c] + [sshconnect2.c sshd.c ttymodes.c] KNF whitespace - markus@cvs.openbsd.org 2002/03/19 14:27:39 [auth.c auth1.c auth2.c] @@ -549,9 +864,9 @@ remove unused, sync w/ cmdline patch in my tree. 20020317 - - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is wanted, - warn if directory does not exist. Put system directories in front of - PATH for finding entorpy commands. + - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is + wanted, warn if directory does not exist. Put system directories in + front of PATH for finding entorpy commands. - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package build fixes. Patch by Darren Tucker [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have