X-Git-Url: http://andersk.mit.edu/gitweb/openssh.git/blobdiff_plain/637f91774c35d90e0e35b4f6c34b481282ea3564..7f056bc5d92b7558132f6e052806d071282037f7:/ChangeLog?ds=sidebyside diff --git a/ChangeLog b/ChangeLog index 96f222ba..8e6197cf 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,94 @@ +20020606 + - (bal) OpenBSD CVS Sync + - markus@cvs.openbsd.org 2002/05/15 21:56:38 + [servconf.c sshd.8 sshd_config] + re-enable privsep and disable setuid for post-3.2.2 + - markus@cvs.openbsd.org 2002/05/16 22:02:50 + [cipher.c kex.h mac.c] + fix warnings (openssl 0.9.7 requires const) + - stevesk@cvs.openbsd.org 2002/05/16 22:09:59 + [session.c ssh.c] + don't limit xauth pathlen on client side and longer print length on + server when debug; ok markus@ + - deraadt@cvs.openbsd.org 2002/05/19 20:54:52 + [log.h] + extra commas in enum not 100% portable + - deraadt@cvs.openbsd.org 2002/05/22 23:18:25 + [ssh.c sshd.c] + spelling; abishoff@arc.nasa.gov + - markus@cvs.openbsd.org 2002/05/23 19:24:30 + [authfile.c authfile.h pathnames.h ssh.c sshconnect.c sshconnect.h + sshconnect1.c sshconnect2.c ssh-keysign.8 ssh-keysign.c Makefile.in] + add /usr/libexec/ssh-keysign: a setuid helper program for hostbased + authentication in protocol v2 (needs to access the hostkeys). + - markus@cvs.openbsd.org 2002/05/23 19:39:34 + [ssh.c] + add comment about ssh-keysign + - markus@cvs.openbsd.org 2002/05/24 08:45:14 + [sshconnect2.c] + stat ssh-keysign first, print error if stat fails; + some debug->error; fix comment + - markus@cvs.openbsd.org 2002/05/25 08:50:39 + [sshconnect2.c] + execlp->execl; from stevesk + - markus@cvs.openbsd.org 2002/05/25 18:51:07 + [auth.h auth2.c auth2-hostbased.c auth2-kbdint.c auth2-none.c + auth2-passwd.c auth2-pubkey.c Makefile.in] + split auth2.c into one file per method; ok provos@/deraadt@ + - stevesk@cvs.openbsd.org 2002/05/26 20:35:10 + [ssh.1] + sort ChallengeResponseAuthentication; ok markus@ + - stevesk@cvs.openbsd.org 2002/05/28 16:45:27 + [monitor_mm.c] + print strerror(errno) on mmap/munmap error; ok markus@ + - stevesk@cvs.openbsd.org 2002/05/28 17:28:02 + [uidswap.c] + format spec change/casts and some KNF; ok markus@ + - stevesk@cvs.openbsd.org 2002/05/28 21:24:00 + [uidswap.c] + use correct function name in fatal() + - stevesk@cvs.openbsd.org 2002/05/29 03:06:30 + [ssh.1 sshd.8] + spelling + - markus@cvs.openbsd.org 2002/05/29 11:21:57 + [sshd.c] + don't start if privsep is enabled and SSH_PRIVSEP_USER or + _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@ + - markus@cvs.openbsd.org 2002/05/30 08:07:31 + [cipher.c] + use rijndael/aes from libcrypto (openssl >= 0.9.7) instead of + our own implementation. allow use of AES hardware via libcrypto, + ok deraadt@ + - markus@cvs.openbsd.org 2002/05/31 10:30:33 + [sshconnect2.c] + extent ssh-keysign protocol: + pass # of socket-fd to ssh-keysign, keysign verfies locally used + ip-address using this socket-fd, restricts fake local hostnames + to actual local hostnames; ok stevesk@ + - markus@cvs.openbsd.org 2002/05/31 11:35:15 + [auth.h auth2.c] + move Authmethod definitons to per-method file. + - markus@cvs.openbsd.org 2002/05/31 13:16:48 + [key.c] + add comment: + key_verify returns 1 for a correct signature, 0 for an incorrect signature + and -1 on error. + - markus@cvs.openbsd.org 2002/05/31 13:20:50 + [ssh-rsa.c] + pad received signature with leading zeros, because RSA_verify expects + a signature of RSA_size. the drafts says the signature is transmitted + unpadded (e.g. putty does not pad), reported by anakin@pobox.com + - deraadt@cvs.openbsd.org 2002/06/03 12:04:07 + [ssh.h] + compatiblity -> compatibility + decriptor -> descriptor + authentciated -> authenticated + transmition -> transmission + +20020604 + - (stevesk) [channels.c] bug #164 patch from YOSHIFUJI Hideaki (changed + setsockopt from debug to error for now). + 20020527 - (tim) [configure.ac.orig monitor_fdpass.c] Enahnce msghdr tests to address build problem on Irix reported by Dave Love . Back out