]> andersk Git - openssh.git/log
openssh.git
15 years ago - djm@cvs.openbsd.org 2008/06/30 08:07:34
dtucker [Fri, 4 Jul 2008 07:08:58 +0000 (07:08 +0000)] 
   - djm@cvs.openbsd.org 2008/06/30 08:07:34
     [key-options.sh]
     shell portability: use "=" instead of "==" in test(1) expressions,
     double-quote string with backslash escaped /

15 years ago - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
dtucker [Fri, 4 Jul 2008 04:10:19 +0000 (04:10 +0000)] 
 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
   returns EXDEV.  Patch from Mike Garrison, ok djm@

15 years ago - dtucker@cvs.openbsd.org 2008/07/04 03:47:02
dtucker [Fri, 4 Jul 2008 03:51:45 +0000 (03:51 +0000)] 
   - dtucker@cvs.openbsd.org 2008/07/04 03:47:02
     [monitor.c]
     Make debug a little clearer.  ok djm@

15 years ago - djm@cvs.openbsd.org 2008/07/04 03:44:59
dtucker [Fri, 4 Jul 2008 03:51:12 +0000 (03:51 +0000)] 
   - djm@cvs.openbsd.org 2008/07/04 03:44:59
     [servconf.c groupaccess.h groupaccess.c]
     support negation of groups in "Match group" block (bz#1315); ok dtucker@

15 years ago - otto@cvs.openbsd.org 2008/07/03 21:46:58
dtucker [Fri, 4 Jul 2008 02:54:25 +0000 (02:54 +0000)] 
   - otto@cvs.openbsd.org 2008/07/03 21:46:58
     [auth2-pubkey.c]
     avoid nasty double free; ok dtucker@ djm@

15 years ago - djm@cvs.openbsd.org 2008/07/02 13:47:39
dtucker [Fri, 4 Jul 2008 02:53:50 +0000 (02:53 +0000)] 
   - djm@cvs.openbsd.org 2008/07/02 13:47:39
     [ssh.1 ssh.c]
     When forking after authentication ("ssh -f") with ExitOnForwardFailure
     enabled, delay the fork until after replies for any -R forwards have
     been seen. Allows for robust detection of -R forward failure when
     using -f (similar to bz#92); ok dtucker@

15 years ago - djm@cvs.openbsd.org 2008/07/02 13:30:34
dtucker [Fri, 4 Jul 2008 02:53:23 +0000 (02:53 +0000)] 
   - djm@cvs.openbsd.org 2008/07/02 13:30:34
     [auth2.c]
     really really remove the freebie "none" auth try for protocol 2

15 years ago - djm@cvs.openbsd.org 2008/07/02 12:36:39
dtucker [Wed, 2 Jul 2008 12:56:09 +0000 (12:56 +0000)] 
   - djm@cvs.openbsd.org 2008/07/02 12:36:39
     [auth2-none.c auth2.c]
     Make protocol 2 MaxAuthTries behaviour a little more sensible:
     Check whether client has exceeded MaxAuthTries before running
     an authentication method and skip it if they have, previously it
     would always allow one try (for "none" auth).
     Preincrement failure count before post-auth test - previously this
     checked and postincremented, also to allow one "none" try.
     Together, these two changes always count the "none" auth method
     which could be skipped by a malicious client (e.g. an SSH worm)
     to get an extra attempt at a real auth method. They also make
     MaxAuthTries=0 a useful way to block users entirely (esp. in a
     sshd_config Match block).
     Also, move sending of any preauth banner from "none" auth method
     to the first call to input_userauth_request(), so worms that skip
     the "none" method get to see it too.

15 years ago - dtucker@cvs.openbsd.org 2008/07/02 12:03:51
dtucker [Wed, 2 Jul 2008 12:37:30 +0000 (12:37 +0000)] 
   - dtucker@cvs.openbsd.org 2008/07/02 12:03:51
     [auth-rsa.c auth.c auth2-pubkey.c auth.h]
     Merge duplicate host key file checks, based in part on a patch from Rob
     Holland via bz #1348 .  Also checks for non-regular files during protocol
     1 RSA auth.  ok djm@

15 years ago - djm@cvs.openbsd.org 2008/07/02 02:24:18
dtucker [Wed, 2 Jul 2008 12:35:43 +0000 (12:35 +0000)] 
   - djm@cvs.openbsd.org 2008/07/02 02:24:18
     [sshd_config sshd_config.5 sshd.8 servconf.c]
     increase default size of ssh protocol 1 ephemeral key from 768 to 1024
     bits; prodded by & ok dtucker@ ok deraadt@

15 years ago - stevesk@cvs.openbsd.org 2008/07/01 23:12:47
dtucker [Wed, 2 Jul 2008 12:35:00 +0000 (12:35 +0000)] 
   - stevesk@cvs.openbsd.org 2008/07/01 23:12:47
     [PROTOCOL.agent]
     fix some typos; ok djm@

15 years ago - dtucker@cvs.openbsd.org 2008/07/01 07:24:22
dtucker [Wed, 2 Jul 2008 12:34:30 +0000 (12:34 +0000)] 
   - dtucker@cvs.openbsd.org 2008/07/01 07:24:22
     [sshconnect.c sshd.c]
     Send CR LF during protocol banner exchanges, but only for Protocol 2 only,
     in order to comply with RFC 4253.  bz #1443, ok djm@

15 years ago - dtucker@cvs.openbsd.org 2008/07/01 07:20:52
dtucker [Wed, 2 Jul 2008 12:33:55 +0000 (12:33 +0000)] 
   - dtucker@cvs.openbsd.org 2008/07/01 07:20:52
     [sshconnect.c]
     Check ExitOnForwardFailure if forwardings are disabled due to a failed
     host key check.  ok djm@

15 years ago - djm@cvs.openbsd.org 2008/06/30 12:18:34
dtucker [Wed, 2 Jul 2008 12:33:16 +0000 (12:33 +0000)] 
   - djm@cvs.openbsd.org 2008/06/30 12:18:34
     [PROTOCOL]
     clarify that eow@openssh.com is only sent on session channels

15 years ago - djm@cvs.openbsd.org 2008/06/30 12:16:02
dtucker [Wed, 2 Jul 2008 12:32:43 +0000 (12:32 +0000)] 
   - djm@cvs.openbsd.org 2008/06/30 12:16:02
     [nchan.c]
     only send eow@openssh.com notifications for session channels; ok! markus@

15 years ago - djm@cvs.openbsd.org 2008/06/30 12:15:39
dtucker [Wed, 2 Jul 2008 12:32:14 +0000 (12:32 +0000)] 
   - djm@cvs.openbsd.org 2008/06/30 12:15:39
     [serverloop.c]
     only pass channel requests on session channels through to the session
     channel handler, avoiding spurious log messages; ok! markus@

15 years ago - djm@cvs.openbsd.org 2008/06/30 08:05:59
dtucker [Wed, 2 Jul 2008 12:31:31 +0000 (12:31 +0000)] 
- djm@cvs.openbsd.org 2008/06/30 08:05:59
      [PROTOCOL.agent]
      typo: s/constraint_date/constraint_data/

15 years ago - (djm) [regress/Makefile] search for conch by path, like we do putty
djm [Sun, 29 Jun 2008 22:12:37 +0000 (22:12 +0000)] 
 - (djm) [regress/Makefile] search for conch by path, like we do putty

15 years ago - djm@cvs.openbsd.org 2008/06/28 13:57:25
djm [Sun, 29 Jun 2008 22:07:56 +0000 (22:07 +0000)] 
   - djm@cvs.openbsd.org 2008/06/28 13:57:25
     [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh]
     very basic regress test against Twisted Conch in "make interop"
     target (conch is available in ports/devel/py-twisted/conch);
     ok markus@

15 years ago - dtucker@cvs.openbsd.org 2008/06/11 23:11:40
djm [Sun, 29 Jun 2008 22:06:51 +0000 (22:06 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/11 23:11:40
     [Makefile]
     Don't run cipher-speed test by default; mistakenly enabled by me

15 years ago - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
djm [Sun, 29 Jun 2008 22:06:25 +0000 (22:06 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
     [regress/Makefile regress/key-options.sh]
     Add regress test for key options.  ok djm@

15 years ago - djm@cvs.openbsd.org 2008/06/28 14:08:30
djm [Sun, 29 Jun 2008 14:07:00 +0000 (14:07 +0000)] 
   - djm@cvs.openbsd.org 2008/06/28 14:08:30
     [PROTOCOL PROTOCOL.agent]
     document the protocol used by ssh-agent; "looks ok" markus@

15 years ago - djm@cvs.openbsd.org 2008/06/28 14:05:15
djm [Sun, 29 Jun 2008 14:05:48 +0000 (14:05 +0000)] 
   - djm@cvs.openbsd.org 2008/06/28 14:05:15
     [ssh-agent.c]
     reset global compat flag after processing a protocol 2 signature
     request with the legacy DSA encoding flag set; ok markus

15 years ago - djm@cvs.openbsd.org 2008/06/28 13:58:23
djm [Sun, 29 Jun 2008 14:05:21 +0000 (14:05 +0000)] 
   - djm@cvs.openbsd.org 2008/06/28 13:58:23
     [ssh-agent.c]
     refuse to add a key that has unknown constraints specified;
     ok markus

15 years ago - djm@cvs.openbsd.org 2008/06/28 07:25:07
djm [Sun, 29 Jun 2008 14:04:57 +0000 (14:04 +0000)] 
   - djm@cvs.openbsd.org 2008/06/28 07:25:07
     [PROTOCOL]
     spelling fixes

15 years ago - jmc@cvs.openbsd.org 2008/06/26 21:11:46
djm [Sun, 29 Jun 2008 14:04:31 +0000 (14:04 +0000)] 
   - jmc@cvs.openbsd.org 2008/06/26 21:11:46
     [ssh.1]
     add VisualHostKey to the list of options listed in -o;

15 years ago - grunk@cvs.openbsd.org 2008/06/26 11:46:31
djm [Sun, 29 Jun 2008 14:04:03 +0000 (14:04 +0000)] 
   - grunk@cvs.openbsd.org 2008/06/26 11:46:31
     [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c]
     Move SSH Fingerprint Visualization away from sharing the config option
     CheckHostIP to an own config option named VisualHostKey.
     While there, fix the behaviour that ssh would draw a random art picture
     on every newly seen host even when the option was not enabled.
     prodded by deraadt@, discussions,
     help and ok markus@ djm@ dtucker@

15 years ago - djm@cvs.openbsd.org 2008/06/26 09:19:40
djm [Sun, 29 Jun 2008 12:47:04 +0000 (12:47 +0000)] 
   - djm@cvs.openbsd.org 2008/06/26 09:19:40
     [dh.c dh.h moduli.c]
     when loading moduli from /etc/moduli in sshd(8), check that they
     are of the expected "safe prime" structure and have had
     appropriate primality tests performed;
     feedback and ok dtucker@

15 years ago - djm@cvs.openbsd.org 2008/06/26 06:10:09
djm [Sun, 29 Jun 2008 12:46:35 +0000 (12:46 +0000)] 
   - djm@cvs.openbsd.org 2008/06/26 06:10:09
     [sftp-client.c sftp-server.c]
     allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky
     bits. Note that this only affects explicit setting of modes (e.g. via
     sftp(1)'s chmod command) and not file transfers. (bz#1310)
     ok deraadt@ at c2k8

15 years ago - otto@cvs.openbsd.org 2008/06/25 11:13:43
djm [Sun, 29 Jun 2008 12:45:37 +0000 (12:45 +0000)] 
   - otto@cvs.openbsd.org 2008/06/25 11:13:43
     [key.c]
     add key length to visual fingerprint; zap magical constants;
     ok grunk@ djm@

15 years ago - (djm) OpenBSD CVS Sync
djm [Sun, 29 Jun 2008 12:45:13 +0000 (12:45 +0000)] 
 - (djm) OpenBSD CVS Sync
   - martynas@cvs.openbsd.org 2008/06/21 07:46:46
     [sftp.c]
     use optopt to get invalid flag, instead of return value of getopt,
     which is always '?';  ok djm@

15 years ago - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
djm [Sat, 28 Jun 2008 06:01:35 +0000 (06:01 +0000)] 
 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
   RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).

15 years ago - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
djm [Thu, 26 Jun 2008 06:01:56 +0000 (06:01 +0000)] 
 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
   [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.

15 years ago - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
djm [Thu, 26 Jun 2008 05:59:32 +0000 (05:59 +0000)] 
 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
   (bz#1372)

15 years ago - (dtucker) [channels.c] isatty -> is_tty here too.
dtucker [Mon, 16 Jun 2008 13:35:56 +0000 (13:35 +0000)] 
 - (dtucker) [channels.c] isatty -> is_tty here too.

15 years ago - dtucker@cvs.openbsd.org 2008/06/16 13:22:53
dtucker [Mon, 16 Jun 2008 13:29:18 +0000 (13:29 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/16 13:22:53
     [session.c channels.c]
     Rename the isatty argument to is_tty so we don't shadow
     isatty(3).  ok markus@

15 years agoRemove extra tag
dtucker [Mon, 16 Jun 2008 13:27:34 +0000 (13:27 +0000)] 
Remove extra  tag

15 years ago - djm@cvs.openbsd.org 2008/06/15 20:06:26
djm [Sun, 15 Jun 2008 21:59:23 +0000 (21:59 +0000)] 
   - djm@cvs.openbsd.org 2008/06/15 20:06:26
     [channels.c channels.h session.c]
     don't call isatty() on a pty master, instead pass a flag down to
     channel_set_fds() indicating that te fds refer to a tty. Fixes a
     hang on exit on Solaris (bz#1463) in portable but is actually
     a generic bug; ok dtucker deraadt markus

15 years ago - dtucker@cvs.openbsd.org 2008/06/15 16:58:40
djm [Sun, 15 Jun 2008 21:56:20 +0000 (21:56 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/15 16:58:40
     [servconf.c sshd_config.5]
     Allow MaxAuthTries within a Match block.  ok djm@

15 years ago - dtucker@cvs.openbsd.org 2008/06/15 16:55:38
djm [Sun, 15 Jun 2008 21:55:46 +0000 (21:55 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/15 16:55:38
     [sshd_config.5]
     MaxSessions is allowed in a Match block too

15 years ago - dtucker@cvs.openbsd.org 2008/06/14 19:42:10
djm [Sun, 15 Jun 2008 21:55:06 +0000 (21:55 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/14 19:42:10
     [scp.1]
     Mention that scp follows symlinks during -r.  bz #1466,
     from nectar at apple

15 years ago - djm@cvs.openbsd.org 2008/06/14 18:33:43
djm [Sun, 15 Jun 2008 21:53:16 +0000 (21:53 +0000)] 
   - djm@cvs.openbsd.org 2008/06/14 18:33:43
     [session.c]
     suppress the warning message from chdir(homedir) failures
     when chrooted (bz#1461); ok dtucker

15 years ago - dtucker@cvs.openbsd.org 2008/06/14 17:07:11
djm [Sun, 15 Jun 2008 21:50:58 +0000 (21:50 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/14 17:07:11
     [sshd.c]
     ensure default umask disallows at least group and world write; ok djm@

15 years ago - OpenBSD CVS Sync
djm [Sun, 15 Jun 2008 21:50:24 +0000 (21:50 +0000)] 
 - OpenBSD CVS Sync
   - dtucker@cvs.openbsd.org 2008/06/14 15:49:48
     [sshd.c]
     wrap long line at 80 chars

15 years ago - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.
dtucker [Sun, 15 Jun 2008 16:27:48 +0000 (16:27 +0000)] 
 - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.

15 years ago - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
djm [Sun, 15 Jun 2008 00:55:34 +0000 (00:55 +0000)] 
 - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
   replacement code; patch from ighighi AT gmail.com in bz#1240;
   ok dtucker

15 years ago - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
dtucker [Fri, 13 Jun 2008 23:14:46 +0000 (23:14 +0000)] 
 - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
   despite its name doesn't seem to implement all of GSSAPI.  Patch from
   Jan Engelhardt, sanity checked by Simon Wilkinson.

15 years ago - grunk@cvs.openbsd.org 2008/06/13 20:13:26
dtucker [Fri, 13 Jun 2008 23:04:26 +0000 (23:04 +0000)] 
   - grunk@cvs.openbsd.org 2008/06/13 20:13:26
     [ssh.1]
     Explain the use of SSH fpr visualization using random art, and cite the
     original scientific paper inspiring that technique.
     Much help with English and nroff by jmc@, thanks.

15 years ago - dtucker@cvs.openbsd.org 2008/06/13 18:55:22
dtucker [Fri, 13 Jun 2008 23:02:25 +0000 (23:02 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/13 18:55:22
     [scp.c]
     Prevent -Wsign-compare warnings on LP64 systems.  bz #1192, ok deraadt@

15 years ago - dtucker@cvs.openbsd.org 2008/06/13 17:21:20
dtucker [Fri, 13 Jun 2008 23:01:54 +0000 (23:01 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/13 17:21:20
     [mux.c]
     Friendlier error messages for mux fallback.  ok djm@

15 years ago - dtucker@cvs.openbsd.org 2008/06/13 14:18:51
dtucker [Fri, 13 Jun 2008 23:01:24 +0000 (23:01 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/13 14:18:51
     [auth2-pubkey.c auth-rhosts.c]
     Include unistd.h for close(), prevents warnings in -portable

15 years ago - dtucker@cvs.openbsd.org 2008/06/13 13:56:59
dtucker [Fri, 13 Jun 2008 22:59:49 +0000 (22:59 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/13 13:56:59
     [monitor.c]
     Clear key options in the monitor on failed authentication, prevents
     applying additional restrictions to non-pubkey authentications in
     the case where pubkey fails but another method subsequently succeeds.
     bz #1472, found by Colin Watson, ok markus@ djm

15 years ago - deraadt@cvs.openbsd.org 2008/06/13 09:44:36
dtucker [Fri, 13 Jun 2008 12:02:50 +0000 (12:02 +0000)] 
   - deraadt@cvs.openbsd.org 2008/06/13 09:44:36
     [packet.c]
     compile on older gcc; no decl after code

15 years ago - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
dtucker [Fri, 13 Jun 2008 05:03:14 +0000 (05:03 +0000)] 
  - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
    compiler warnings on some platforms.  Based on a discussion with otto@

15 years ago - djm@cvs.openbsd.org 2008/06/13 04:40:22
dtucker [Fri, 13 Jun 2008 04:51:28 +0000 (04:51 +0000)] 
   - djm@cvs.openbsd.org 2008/06/13 04:40:22
     [auth2-pubkey.c auth-rhosts.c]
     refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not
     regular files; report from Solar Designer via Colin Watson in bz#1471
     ok dtucker@ deraadt@

15 years ago - dtucker@cvs.openbsd.org 2008/06/13 01:38:23
dtucker [Fri, 13 Jun 2008 04:48:59 +0000 (04:48 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/13 01:38:23
     [misc.c]
     upcast uid to long with matching %ld, prevents warnings in portable

15 years ago - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
dtucker [Fri, 13 Jun 2008 02:40:55 +0000 (02:40 +0000)] 
  - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
    on big endian machines, so ifdef them for little endian only to prevent
    unused function warnings.

15 years ago - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
dtucker [Fri, 13 Jun 2008 01:13:13 +0000 (01:13 +0000)] 
  - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
    systems.  Patch from R. Scott Bailey.

15 years ago - dtucker@cvs.openbsd.org 2008/06/13 00:51:47
dtucker [Fri, 13 Jun 2008 00:58:50 +0000 (00:58 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/13 00:51:47
     [mac.c]
     upcast another size_t to u_long to match format

15 years ago - dtucker@cvs.openbsd.org 2008/06/13 00:47:53
dtucker [Fri, 13 Jun 2008 00:58:10 +0000 (00:58 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/13 00:47:53
     [mux.c]
     upcast size_t to u_long to match format arg; ok djm@

15 years ago - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
dtucker [Fri, 13 Jun 2008 00:28:57 +0000 (00:28 +0000)] 
  - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
    from Todd Vierling.

15 years ago - djm@cvs.openbsd.org 2008/06/13 00:16:49
dtucker [Fri, 13 Jun 2008 00:24:03 +0000 (00:24 +0000)] 
   - djm@cvs.openbsd.org 2008/06/13 00:16:49
     [mux.c]
     fall back to creating a new TCP connection on most multiplexing errors
     (socket connect fail, invalid version, refused permittion, corrupted
     messages, etc.); bz #1329 ok dtucker@

15 years ago - dtucker@cvs.openbsd.org 2008/06/13 00:12:02
dtucker [Fri, 13 Jun 2008 00:22:54 +0000 (00:22 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/13 00:12:02
     [sftp.h log.h]
     replace __dead with __attribute__((noreturn)), makes things
     a little easier to port.  Also, add it to sigdie().  ok djm@

15 years ago - ian@cvs.openbsd.org 2008/06/12 23:24:58
dtucker [Fri, 13 Jun 2008 00:21:51 +0000 (00:21 +0000)] 
   - ian@cvs.openbsd.org 2008/06/12 23:24:58
     [sshconnect.c]
     tweak wording in message, ok deraadt@ jmc@

15 years ago - grunk@cvs.openbsd.org 2008/06/12 22:03:36
dtucker [Thu, 12 Jun 2008 22:58:05 +0000 (22:58 +0000)] 
   - grunk@cvs.openbsd.org 2008/06/12 22:03:36
     [key.c]
     add my copyright, ok djm@

15 years ago - grunk@cvs.openbsd.org 2008/06/12 21:14:46
dtucker [Thu, 12 Jun 2008 22:57:27 +0000 (22:57 +0000)] 
   - grunk@cvs.openbsd.org 2008/06/12 21:14:46
     [ssh-keygen.c]
     make ssh-keygen -lf show the key type just as ssh-add -l would do it
     ok djm@ markus@

15 years ago - djm@cvs.openbsd.org 2008/06/12 21:06:25
dtucker [Thu, 12 Jun 2008 22:56:01 +0000 (22:56 +0000)] 
   - djm@cvs.openbsd.org 2008/06/12 21:06:25
     [clientloop.c]
     I was coalescing expected global request confirmation replies at
     the wrong end of the queue - fix; prompted by markus@

15 years ago - djm@cvs.openbsd.org 2008/06/12 20:47:04
dtucker [Thu, 12 Jun 2008 21:01:29 +0000 (21:01 +0000)] 
   - djm@cvs.openbsd.org 2008/06/12 20:47:04
     [sftp-client.c]
     print extension revisions for extensions that we understand

15 years ago - dtucker@cvs.openbsd.org 2008/06/12 20:38:28
dtucker [Thu, 12 Jun 2008 20:42:45 +0000 (20:42 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/12 20:38:28
     [sshd.c sshconnect.c packet.h misc.c misc.h packet.c]
     Make keepalive timeouts apply while waiting for a packet, particularly
     during key renegotiation (bz #1363).  With djm and Matt Day, ok djm@

15 years ago - jmc@cvs.openbsd.org 2008/06/12 19:10:09
dtucker [Thu, 12 Jun 2008 19:18:03 +0000 (19:18 +0000)] 
   - jmc@cvs.openbsd.org 2008/06/12 19:10:09
     [ssh_config.5 ssh-keygen.1]
     tweak the ascii art text; ok grunk

15 years ago - (dtucker) [clientloop.c serverloop.c] channel_register_filter now
dtucker [Thu, 12 Jun 2008 19:09:18 +0000 (19:09 +0000)] 
  - (dtucker) [clientloop.c serverloop.c]  channel_register_filter now
    takes 2 more args.  with djm@

15 years ago - dtucker@cvs.openbsd.org 2008/06/12 16:35:31
dtucker [Thu, 12 Jun 2008 18:56:37 +0000 (18:56 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/12 16:35:31
     [ssh_config.5 ssh.c]
     keyword expansion for localcommand.  ok djm@

15 years ago - djm@cvs.openbsd.org 2008/06/12 15:19:17
dtucker [Thu, 12 Jun 2008 18:55:46 +0000 (18:55 +0000)] 
   - djm@cvs.openbsd.org 2008/06/12 15:19:17
     [clientloop.h channels.h clientloop.c channels.c mux.c]
     The multiplexing escape char handler commit last night introduced a
     small memory leak per session; plug it.

15 years ago - grunk@cvs.openbsd.org 2008/06/12 06:32:59
dtucker [Thu, 12 Jun 2008 18:55:10 +0000 (18:55 +0000)] 
   - grunk@cvs.openbsd.org 2008/06/12 06:32:59
     [key.c]
     We already mark the start of the worm, now also mark the end of the worm
     in our random art drawings.
     ok djm@

15 years ago - grunk@cvs.openbsd.org 2008/06/12 05:42:46
dtucker [Thu, 12 Jun 2008 18:54:40 +0000 (18:54 +0000)] 
   - grunk@cvs.openbsd.org 2008/06/12 05:42:46
     [key.c]
     supply the key type (rsa1, rsa, dsa) as a caption in the frame of the
     random art.  while there, stress the fact that the field base should at
     least be 8 characters for the pictures to make sense.
     comment and ok djm@

15 years ago - djm@cvs.openbsd.org 2008/06/12 05:32:30
dtucker [Thu, 12 Jun 2008 18:54:05 +0000 (18:54 +0000)] 
   - djm@cvs.openbsd.org 2008/06/12 05:32:30
     [mux.c]
     some more TODO for me

15 years ago - djm@cvs.openbsd.org 2008/06/12 05:15:41
dtucker [Thu, 12 Jun 2008 18:53:27 +0000 (18:53 +0000)] 
   - djm@cvs.openbsd.org 2008/06/12 05:15:41
     [PROTOCOL]
     document tun@openssh.com forwarding method

15 years ago - djm@cvs.openbsd.org 2008/06/12 04:24:06
dtucker [Thu, 12 Jun 2008 18:52:53 +0000 (18:52 +0000)] 
   - djm@cvs.openbsd.org 2008/06/12 04:24:06
     [ssh.c]
     thal shalt not code past the eightieth column

15 years ago - djm@cvs.openbsd.org 2008/06/12 04:17:47
dtucker [Thu, 12 Jun 2008 18:51:14 +0000 (18:51 +0000)] 
   - djm@cvs.openbsd.org 2008/06/12 04:17:47
     [clientloop.c]
     thall shalt not code past the eightieth column

15 years ago - djm@cvs.openbsd.org 2008/06/12 04:06:00
dtucker [Thu, 12 Jun 2008 18:50:27 +0000 (18:50 +0000)] 
   - djm@cvs.openbsd.org 2008/06/12 04:06:00
     [clientloop.h ssh.c clientloop.c]
     maintain an ordered queue of outstanding global requests that we
     expect replies to, similar to the per-channel confirmation queue.
     Use this queue to verify success or failure for remote forward
     establishment in a race free way.
     ok dtucker@

15 years ago - djm@cvs.openbsd.org 2008/06/12 03:40:52
dtucker [Thu, 12 Jun 2008 18:49:33 +0000 (18:49 +0000)] 
   - djm@cvs.openbsd.org 2008/06/12 03:40:52
     [clientloop.h mux.c channels.c clientloop.c channels.h]
     Enable ~ escapes for multiplex slave sessions; give each channel
     its own escape state and hook the escape filters up to muxed
     channels. bz #1331
     Mux slaves do not currently support the ~^Z and ~& escapes.
     NB. this change cranks the mux protocol version, so a new ssh
     mux client will not be able to connect to a running old ssh
     mux master.
     ok dtucker@

15 years ago - otto@cvs.openbsd.org 2008/06/12 00:13:13
dtucker [Thu, 12 Jun 2008 18:48:11 +0000 (18:48 +0000)] 
   - otto@cvs.openbsd.org 2008/06/12 00:13:13
     [key.c]
     use an odd number of rows and columns and a separate start marker, looks
     better; ok grunk@

15 years ago - grunk@cvs.openbsd.org 2008/06/12 00:13:55
dtucker [Thu, 12 Jun 2008 18:47:34 +0000 (18:47 +0000)] 
   - grunk@cvs.openbsd.org 2008/06/12 00:13:55
     [sshconnect.c]
     Make ssh print the random art also when ssh'ing to a host using IP only.
     spotted by naddy@, ok and help djm@ dtucker@

15 years ago - dtucker@cvs.openbsd.org 2008/06/12 00:03:49
dtucker [Thu, 12 Jun 2008 18:46:45 +0000 (18:46 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/12 00:03:49
     [dns.c canohost.c sshconnect.c]
     Do not pass "0" strings as ports to getaddrinfo because the lookups
     can slow things down and we never use the service info anyway. bz
     #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi.  ok
     deraadt@ djm@
     djm belives that the reason for the "0" strings is to ensure that
     it's not possible to call getaddrinfo with both host and port being
     NULL.  In the case of canohost.c host is a local array.  In the
     case of sshconnect.c, it's checked for null immediately before use.
     In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
     be non-null but it's not obvious, so I added a warning message in
     case it is ever passed a null.

15 years ago - grunk@cvs.openbsd.org 2008/06/11 23:51:57
dtucker [Thu, 12 Jun 2008 18:45:50 +0000 (18:45 +0000)] 
   - grunk@cvs.openbsd.org 2008/06/11 23:51:57
     [key.c]
     #define statements that are not atoms need braces around them, else they
     will cause trouble in some cases.
     Also do a computation of -1 once, and not in a loop several times.
     spotted by otto@

15 years ago - grunk@cvs.openbsd.org 2008/06/11 23:03:56
dtucker [Thu, 12 Jun 2008 18:44:25 +0000 (18:44 +0000)] 
   - grunk@cvs.openbsd.org 2008/06/11 23:03:56
     [ssh_config.5]
     CheckHostIP set to ``fingerprint'' will display both hex and random art
     spotted by naddy@

15 years ago - otto@cvs.openbsd.org 2008/06/11 23:02:22
dtucker [Thu, 12 Jun 2008 18:43:51 +0000 (18:43 +0000)] 
   - otto@cvs.openbsd.org 2008/06/11 23:02:22
     [key.c]
     simpler way of computing the augmentations; ok grunk@

15 years ago - grunk@cvs.openbsd.org 2008/06/11 22:20:46
dtucker [Thu, 12 Jun 2008 18:43:15 +0000 (18:43 +0000)] 
   - grunk@cvs.openbsd.org 2008/06/11 22:20:46
     [ssh-keygen.c ssh-keygen.1]
     ssh-keygen would write fingerprints to STDOUT, and random art to STDERR,
     that is not how it was envisioned.
     Also correct manpage saying that -v is needed along with -l for it to work.
     spotted by naddy@

15 years ago - grunk@cvs.openbsd.org 2008/06/11 21:38:25
dtucker [Thu, 12 Jun 2008 18:42:14 +0000 (18:42 +0000)] 
   - grunk@cvs.openbsd.org 2008/06/11 21:38:25
     [ssh-keygen.c]
     ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
     would not display you the random art as intended, spotted by canacar@

15 years ago - grunk@cvs.openbsd.org 2008/06/11 21:01:35
dtucker [Thu, 12 Jun 2008 18:40:35 +0000 (18:40 +0000)] 
   - grunk@cvs.openbsd.org 2008/06/11 21:01:35
     [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
      sshconnect.c]
     Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
     graphical hash visualization schemes known as "random art", and by
     Dan Kaminsky's musings on the subject during a BlackOp talk at the
     23C3 in Berlin.
     Scientific publication (original paper):
     "Hash Visualization: a New Technique to improve Real-World Security",
     Perrig A. and Song D., 1999, International Workshop on Cryptographic
     Techniques and E-Commerce (CrypTEC '99)
     http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
     The algorithm used here is a worm crawling over a discrete plane,
     leaving a trace (augmenting the field) everywhere it goes.
     Movement is taken from dgst_raw 2bit-wise.  Bumping into walls
     makes the respective movement vector be ignored for this turn,
     thus switching to the other color of the chessboard.
     Graphs are not unambiguous for now, because circles in graphs can be
     walked in either direction.
     discussions with several people,
     help, corrections and ok markus@ djm@

15 years ago - jmc@cvs.openbsd.org 2008/06/11 07:30:37
dtucker [Thu, 12 Jun 2008 18:32:00 +0000 (18:32 +0000)] 
   - jmc@cvs.openbsd.org 2008/06/11 07:30:37
     [sshd.8]
     kill trailing whitespace;

15 years ago - (djm) [channels.c configure.ac]
djm [Wed, 11 Jun 2008 20:05:12 +0000 (20:05 +0000)] 
 - (djm) [channels.c configure.ac]
   Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no)
   bz#1464; ok dtucker

15 years ago - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.
dtucker [Tue, 10 Jun 2008 23:47:59 +0000 (23:47 +0000)] 
 - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.

15 years ago - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
dtucker [Tue, 10 Jun 2008 23:38:12 +0000 (23:38 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
     [Makefile regress/key-options.sh]
     Add regress test for key options.  ok djm@

15 years ago - dtucker@cvs.openbsd.org 2008/06/10 23:21:34
dtucker [Tue, 10 Jun 2008 23:35:37 +0000 (23:35 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/10 23:21:34
     [bufaux.c]
     Use '\0' for a nul byte rather than unadorned 0.  ok djm@

15 years ago - djm@cvs.openbsd.org 2008/06/10 23:06:19
dtucker [Tue, 10 Jun 2008 23:34:46 +0000 (23:34 +0000)] 
   - djm@cvs.openbsd.org 2008/06/10 23:06:19
     [auth-options.c match.c servconf.c addrmatch.c sshd.8]
     support CIDR address matching in .ssh/authorized_keys from="..." stanzas
     ok and extensive testing dtucker@

15 years ago - djm@cvs.openbsd.org 2008/06/10 22:15:23
dtucker [Tue, 10 Jun 2008 23:34:01 +0000 (23:34 +0000)] 
   - djm@cvs.openbsd.org 2008/06/10 22:15:23
     [PROTOCOL ssh.c serverloop.c]
     Add a no-more-sessions@openssh.com global request extension that the
     client sends when it knows that it will never request another session
     (i.e. when session multiplexing is disabled). This allows a server to
     disallow further session requests and terminate the session.
     Why would a non-multiplexing client ever issue additional session
     requests? It could have been attacked with something like SSH'jack:
     http://www.storm.net.nz/projects/7
     feedback & ok markus

15 years ago - dtucker@cvs.openbsd.org 2008/06/10 18:21:24
dtucker [Tue, 10 Jun 2008 23:33:01 +0000 (23:33 +0000)] 
   - dtucker@cvs.openbsd.org 2008/06/10 18:21:24
     [ssh_config.5]
     clarify that Host patterns are space-separated.  ok deraadt

15 years ago - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
dtucker [Tue, 10 Jun 2008 19:15:51 +0000 (19:15 +0000)] 
 - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
   as environment.

15 years ago - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
dtucker [Tue, 10 Jun 2008 18:15:05 +0000 (18:15 +0000)] 
 - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
   specific tests on platforms that don't do IPv6.

This page took 1.672317 seconds and 4 git commands to generate.