X-Git-Url: http://andersk.mit.edu/gitweb/openssh.git/blobdiff_plain/67f04db19136c1d19bb4bad51894489212ac271f..4004c2acfe373ed256e2e09fda1310ed61c78ddc:/ChangeLog diff --git a/ChangeLog b/ChangeLog index 4029f38a..72d92a0c 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,61 @@ +20020820 + - OpenBSD CVS Sync + - millert@cvs.openbsd.org 2002/08/02 14:43:15 + [monitor.c monitor_mm.c] + Change mm_zalloc() sanity checks to be more in line with what + we do in calloc() and add a check to monitor_mm.c. + OK provos@ and markus@ + - marc@cvs.openbsd.org 2002/08/02 16:00:07 + [ssh.1 sshd.8] + note that .ssh/environment is only read when + allowed (PermitUserEnvironment in sshd_config). + OK markus@ + - markus@cvs.openbsd.org 2002/08/02 21:23:41 + [ssh-rsa.c] + diff is u_int (2x); ok deraadt/provos + +20020813 + - (tim) [configure.ac] Display OpenSSL header/library version. + Patch by dtucker@zip.com.au + +20020731 + - (bal) OpenBSD CVS Sync + - markus@cvs.openbsd.org 2002/07/24 16:11:18 + [hostfile.c hostfile.h sshconnect.c] + print out all known keys for a host if we get a unknown host key, + see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4 + + the ssharp mitm tool attacks users in a similar way, so i'd like to + pointed out again: + A MITM attack is always possible if the ssh client prints: + The authenticity of host 'bla' can't be established. + (protocol version 2 with pubkey authentication allows you to detect + MITM attacks) + - mouring@cvs.openbsd.org 2002/07/25 01:16:59 + [sftp.c] + FallBackToRsh does not exist anywhere else. Remove it from here. + OK deraadt. + - markus@cvs.openbsd.org 2002/07/29 18:57:30 + [sshconnect.c] + print file:line + - markus@cvs.openbsd.org 2002/07/30 17:03:55 + [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5] + add PermitUserEnvironment (off by default!); from dot@dotat.at; + ok provos, deraadt + +20020730 + - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de + +20020728 + - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar + - (stevesk) [CREDITS] solar + - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned + char arg. + +20020725 + - (djm) Remove some cruft from INSTALL + - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/ + 20020723 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger. - (bal) sync ID w/ ssh-agent.c @@ -26,6 +84,9 @@ [sshd.c] utmp_len is unsigned; display error consistent with other options. ok markus@ + - stevesk@cvs.openbsd.org 2002/07/15 17:15:31 + [uidswap.c] + little more debugging; ok markus@ 20020722 - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk