]>
andersk Git - openssh.git/log
mouring [Fri, 13 Apr 2001 00:00:14 +0000 (00:00 +0000)]
- mouring@cvs.openbsd.org 2001/04/12 23:17:54
[sftp-int.c sftp-int.h sftp.1 sftp.c]
Add support for:
sftp [user@]host[:file [file]] - Fetch remote file(s)
sftp [user@]host[:dir[/]] - Start in remote dir/
OK deraadt@
mouring [Thu, 12 Apr 2001 23:39:26 +0000 (23:39 +0000)]
- stevesk@cvs.openbsd.org 2001/04/12 20:09:38
[misc.c misc.h readconf.c servconf.c ssh.c sshd.c]
robust port validation; ok markus@ jakob@
mouring [Thu, 12 Apr 2001 23:36:05 +0000 (23:36 +0000)]
- markus@cvs.openbsd.org 2001/04/12 19:39:27
[readconf.c]
typo
mouring [Thu, 12 Apr 2001 23:34:34 +0000 (23:34 +0000)]
- markus@cvs.openbsd.org 2001/04/12 19:15:26
[auth-rhosts.c auth.h auth2.c buffer.c canohost.c canohost.h
compat.c compat.h hostfile.c pathnames.h readconf.c readconf.h
servconf.c servconf.h ssh.c sshconnect.c sshconnect.h sshconnect1.c
sshconnect2.c sshd_config]
implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2)
similar to RhostRSAAuthentication unless you enable (the experimental)
HostbasedUsesNameFromPacketOnly option. please test. :)
mouring [Thu, 12 Apr 2001 21:35:52 +0000 (21:35 +0000)]
- (bal) Added openbsd-compat/inet_ntop.[ch] since HP/UX (and others)
lack it.
mouring [Thu, 12 Apr 2001 16:16:57 +0000 (16:16 +0000)]
- markus@cvs.openbsd.org 2001/04/12 14:29:09
[ssh.c]
show debug output during option processing, report from
pekkas@netcore.fi
mouring [Wed, 11 Apr 2001 23:10:09 +0000 (23:10 +0000)]
- lebel@cvs.openbsd.org 2001/04/11 16:25:30
[sshd.8 sshd.c]
implement the -e option into sshd:
-e When this option is specified, sshd will send the output to the
standard error instead of the system log.
markus@ OK.
mouring [Wed, 11 Apr 2001 23:08:17 +0000 (23:08 +0000)]
- markus@cvs.openbsd.org 2001/04/11 13:56:13
[channels.c ssh.c]
https-connect and socks5 support. i feel so bad.
mouring [Wed, 11 Apr 2001 23:06:28 +0000 (23:06 +0000)]
- markus@cvs.openbsd.org 2001/04/11 10:59:01
[ssh.c]
use strtol() for ports, thanks jakob@
mouring [Wed, 11 Apr 2001 23:05:17 +0000 (23:05 +0000)]
- djm@cvs.openbsd.org 2001/04/11 07:06:22
[sftp-int.c]
'mget' and 'mput' aliases; ok markus@
mouring [Wed, 11 Apr 2001 16:08:34 +0000 (16:08 +0000)]
- markus@cvs.openbsd.org 2001/04/10 12:15:23
[channels.c]
debug cleanup
mouring [Wed, 11 Apr 2001 15:59:35 +0000 (15:59 +0000)]
- itojun@cvs.openbsd.org 2001/04/10 09:13:22
[ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh.1 sshd.8]
document id_rsa{.pub,}. markus ok
mouring [Wed, 11 Apr 2001 15:57:50 +0000 (15:57 +0000)]
- markus@cvs.openbsd.org 2001/04/10 07:46:58
[channels.c]
cleanup socks4 handling
mouring [Tue, 10 Apr 2001 02:48:50 +0000 (02:48 +0000)]
- stevesk@cvs.openbsd.org 2001/04/09 18:00:15
[sshd.8]
ListenAddress mandoc from aaron@
mouring [Tue, 10 Apr 2001 02:46:54 +0000 (02:46 +0000)]
- markus@cvs.openbsd.org 2001/04/09 15:19:49
[ssh-add.1]
ssh-add retries the last passphrase...
mouring [Tue, 10 Apr 2001 02:45:32 +0000 (02:45 +0000)]
- markus@cvs.openbsd.org 2001/04/09 15:12:23
[ssh-add.c]
passphrase caching: ssh-add tries last passphrase, clears passphrase if
not successful and after last try.
based on discussions with espie@, jakob@, ... and code from jakob@ and
wolfgang@wsrcc.com
mouring [Tue, 10 Apr 2001 02:43:57 +0000 (02:43 +0000)]
- stevesk@cvs.openbsd.org 2001/04/09 00:42:05
[sftp.1]
spelling
mouring [Tue, 10 Apr 2001 02:41:56 +0000 (02:41 +0000)]
- stevesk@cvs.openbsd.org 2001/04/08 23:28:27
[sshd.8]
spelling
mouring [Tue, 10 Apr 2001 02:40:17 +0000 (02:40 +0000)]
- deraadt@cvs.openbsd.org 2001/04/08 20:52:55
[sftp.c]
do not modify an actual argv[] entry
stevesk [Mon, 9 Apr 2001 14:50:52 +0000 (14:50 +0000)]
- (stevesk) use setresgid() for setegid() if needed
stevesk [Sun, 8 Apr 2001 22:50:43 +0000 (22:50 +0000)]
- (stevesk) configure.in: typo
mouring [Sun, 8 Apr 2001 18:38:04 +0000 (18:38 +0000)]
- markus@cvs.openbsd.org 2001/04/08 11:24:33
[uidswap.c]
KNF
mouring [Sun, 8 Apr 2001 18:30:26 +0000 (18:30 +0000)]
- markus@cvs.openbsd.org 2001/04/07 08:55:18
[buffer.c channels.c channels.h readconf.c ssh.c]
allow the ssh client act as a SOCKS4 proxy (dynamic local
portforwarding). work by Dan Kaminsky <dankamin@cisco.com> and me.
thanks to Dan for this great patch: use 'ssh -D 1080 host' and make
netscape use localhost:1080 as a socks proxy.
mouring [Sun, 8 Apr 2001 18:26:59 +0000 (18:26 +0000)]
- markus@cvs.openbsd.org 2001/04/06 21:00:17
[auth-rh-rsa.c auth-rhosts.c auth-rsa.c auth2.c channels.c session.c
ssh.c sshconnect.c sshconnect.h uidswap.c uidswap.h]
do gid/groups-swap in addition to uid-swap, should help if /home/group
is chmod 750 + chgrp grp /home/group/, work be deraadt and me, thanks
to olar@openwall.com is comments. we had many requests for this.
mouring [Sun, 8 Apr 2001 18:07:22 +0000 (18:07 +0000)]
- markus@cvs.openbsd.org 2001/04/08 11:27:33
[clientloop.c]
leave_raw_mode if ssh2 "session" is closed
mouring [Sun, 8 Apr 2001 18:04:36 +0000 (18:04 +0000)]
- markus@cvs.openbsd.org 2001/04/08 13:03:00
[ssh-add.c]
init pointers with NULL, thanks to danimal@danimal.org
mouring [Sun, 8 Apr 2001 18:02:43 +0000 (18:02 +0000)]
- stevesk@cvs.openbsd.org 2001/04/08 16:01:36
[sshd.8]
document ListenAddress addr:port
mouring [Sat, 7 Apr 2001 17:25:48 +0000 (17:25 +0000)]
- stevesk@cvs.openbsd.org 2001/04/06 22:25:25
[servconf.c]
in addition to:
ListenAddress host|ipv4_addr|ipv6_addr
permit:
ListenAddress [host|ipv4_addr|ipv6_addr]:port
ListenAddress host|ipv4_addr:port
sshd.8 updates coming. ok markus@
mouring [Sat, 7 Apr 2001 17:23:43 +0000 (17:23 +0000)]
- stevesk@cvs.openbsd.org 2001/04/06 22:12:47
[hostfile.c]
unused; typo in comment
mouring [Sat, 7 Apr 2001 01:14:38 +0000 (01:14 +0000)]
- deraadt@cvs.openbsd.org 2001/04/06 16:46:59
[scp.c]
remove trailing / from source paths; fixes pr#1756
mouring [Sat, 7 Apr 2001 01:12:11 +0000 (01:12 +0000)]
- markus@cvs.openbsd.org 2001/04/05 23:39:20
[serverloop.c]
keep the ssh session even if there is no active channel.
this is more in line with the protocol spec and makes
ssh -N -L 1234:server:110 host
more useful.
based on discussion with <mats@mindbright.se> long time ago
and recent mail from <res@shore.net>
mouring [Sat, 7 Apr 2001 01:08:46 +0000 (01:08 +0000)]
- (bal) CVS ID Resync of version.h
stevesk [Fri, 6 Apr 2001 01:58:37 +0000 (01:58 +0000)]
- (stevesk) Makefile.in: log.o is in libssh.a
mouring [Thu, 5 Apr 2001 23:37:36 +0000 (23:37 +0000)]
- markus@cvs.openbsd.org 2001/04/05 21:05:24
[clientloop.c ssh.c]
don't request a session for 'ssh -N', pointed out slade@shore.net
mouring [Thu, 5 Apr 2001 23:36:01 +0000 (23:36 +0000)]
- markus@cvs.openbsd.org 2001/04/05 21:02:46
[buffer.c]
better error message
mouring [Thu, 5 Apr 2001 23:34:29 +0000 (23:34 +0000)]
- markus@cvs.openbsd.org 2001/04/05 20:01:10
[clientloop.c]
for ~R print message if server does not support rekeying. (and fix ~R).
mouring [Thu, 5 Apr 2001 23:32:17 +0000 (23:32 +0000)]
- stevesk@cvs.openbsd.org 2001/04/05 15:48:18
[canohost.c canohost.h session.c]
move get_remote_name_or_ip() to canohost.[ch]; for portable. ok markus@
mouring [Thu, 5 Apr 2001 23:29:59 +0000 (23:29 +0000)]
- markus@cvs.openbsd.org 2001/04/05 15:45:43
[ssh.1]
ssh defaults to protocol v2; from quisar@quisar.ambre.net
mouring [Thu, 5 Apr 2001 23:28:36 +0000 (23:28 +0000)]
- markus@cvs.openbsd.org 2001/04/05 11:09:17
[clientloop.c compat.c compat.h]
add SSH_BUG_NOREKEY and detect broken (=all old) openssh versions.
mouring [Thu, 5 Apr 2001 23:26:32 +0000 (23:26 +0000)]
- markus@cvs.openbsd.org 2001/04/05 10:42:57
[auth-chall.c authfd.c channels.c clientloop.c kex.c kexgex.c key.c
mac.c packet.c serverloop.c sftp-client.c sftp-client.h sftp-glob.c
sftp-glob.h sftp-int.c sftp-server.c sftp.c ssh-keygen.c sshconnect.c
sshconnect2.c sshd.c]
fix whitespace: unexpand + trailing spaces.
mouring [Thu, 5 Apr 2001 23:22:25 +0000 (23:22 +0000)]
- markus@cvs.openbsd.org 2001/04/05 10:39:48
[version.h]
temporary version 2.5.4 (supports rekeying).
this is not an official release.
mouring [Thu, 5 Apr 2001 23:20:46 +0000 (23:20 +0000)]
- markus@cvs.openbsd.org 2001/04/05 10:39:03
[compress.c compress.h packet.c]
reset compress state per direction when rekeying.
mouring [Thu, 5 Apr 2001 23:19:21 +0000 (23:19 +0000)]
- markus@cvs.openbsd.org 2001/04/05 10:00:06
[compat.c]
2.3.x does old GEX, too; report jakob@
stevesk [Thu, 5 Apr 2001 23:05:22 +0000 (23:05 +0000)]
- (stevesk) logintest.c: fix for systems without __progname
stevesk [Thu, 5 Apr 2001 17:15:08 +0000 (17:15 +0000)]
- (stevesk) don't use vhangup() if defined(HAVE_DEV_PTMX); also removes
BROKEN_VHANGUP
mouring [Thu, 5 Apr 2001 02:05:21 +0000 (02:05 +0000)]
- markus@cvs.openbsd.org 2001/04/04 23:09:18
[dh.c kex.c packet.c]
clear+free keys,iv for rekeying.
+ fix DH mem leaks. ok niels@
mouring [Wed, 4 Apr 2001 23:50:21 +0000 (23:50 +0000)]
- markus@cvs.openbsd.org 2001/04/04 22:04:35
[kex.c kexgex.c serverloop.c]
parse full kexinit packet.
make server-side more robust, too.
mouring [Wed, 4 Apr 2001 23:47:52 +0000 (23:47 +0000)]
- markus@cvs.openbsd.org 2001/04/04 20:32:56
[auth2.c]
we don't care about missing bannerfiles; from tsoome@ut.ee, ok deraadt@
mouring [Wed, 4 Apr 2001 23:46:07 +0000 (23:46 +0000)]
- markus@cvs.openbsd.org 2001/04/04 20:25:38
[channels.c channels.h clientloop.c kex.c kex.h serverloop.c
sshconnect2.c sshd.c]
more robust rekeying
don't send channel data after rekeying is started.
mouring [Wed, 4 Apr 2001 23:43:26 +0000 (23:43 +0000)]
- markus@cvs.openbsd.org 2001/04/04 15:50:55
[compat.c]
f-secure 1.3.2 does not handle IGNORE; from milliondl@ornl.gov
mouring [Wed, 4 Apr 2001 17:57:54 +0000 (17:57 +0000)]
- markus@cvs.openbsd.org 2001/04/04 14:34:58
[clientloop.c kex.c kex.h serverloop.c sshconnect2.c sshd.c]
enable server side rekeying + some rekey related clientup.
todo: we should not send any non-KEX messages after we send KEXINIT
mouring [Wed, 4 Apr 2001 17:52:53 +0000 (17:52 +0000)]
- markus@cvs.openbsd.org 2001/04/04 09:48:35
[kex.c kex.h kexdh.c kexgex.c packet.c sshconnect2.c sshd.c]
don't sent multiple kexinit-requests.
send newkeys, block while waiting for newkeys.
fix comments.
mouring [Wed, 4 Apr 2001 17:39:19 +0000 (17:39 +0000)]
- (bal) Oops.. Missed including kexdh.c and kexgex.c in OpenBSD sync.
mouring [Wed, 4 Apr 2001 02:03:04 +0000 (02:03 +0000)]
- markus@cvs.openbsd.org 2001/04/04 00:06:54
[clientloop.c sshconnect2.c]
enable client rekeying
(1) force rekeying with ~R, or
(2) if the server requests rekeying.
works against ssh-2.0.12/2.0.13/2.1.0/2.2.0/2.3.0/2.3.1/2.4.0
mouring [Wed, 4 Apr 2001 02:00:54 +0000 (02:00 +0000)]
- markus@cvs.openbsd.org 2001/04/03 23:32:12
[kex.c kex.h packet.c sshconnect2.c sshd.c]
undo parts of recent my changes: main part of keyexchange does not
need dispatch-callbacks, since application data is delayed until
the keyexchange completes (if i understand the drafts correctly).
add some infrastructure for re-keying.
mouring [Wed, 4 Apr 2001 01:58:48 +0000 (01:58 +0000)]
- todd@cvs.openbsd.org 2001/04/03 21:19:38
[ssh_config]
id_rsa1/2 -> id_rsa; ok markus@
mouring [Wed, 4 Apr 2001 01:56:17 +0000 (01:56 +0000)]
- markus@cvs.openbsd.org 2001/04/03 19:53:29
[dh.c dh.h kex.c kex.h sshconnect2.c sshd.c]
move kex to kex*.c, used dispatch_set() callbacks for kex. should
make rekeying easier.
mouring [Wed, 4 Apr 2001 01:53:20 +0000 (01:53 +0000)]
- stevesk@cvs.openbsd.org 2001/04/03 13:56:11
[sftp-glob.c ssh-agent.c ssh-keygen.c]
free() -> xfree()
mouring [Wed, 4 Apr 2001 01:51:25 +0000 (01:51 +0000)]
- deraadt@cvs.openbsd.org 2001/04/02 17:32:23
[ssh-agent.1]
grammar; slade@shore.net
stevesk [Tue, 3 Apr 2001 13:02:48 +0000 (13:02 +0000)]
- (stevesk) nchan.c: remove ostate checks and add EINVAL to
shutdown(SHUT_RD) error() bypass for HP-UX.
mouring [Mon, 2 Apr 2001 18:20:03 +0000 (18:20 +0000)]
- stevesk@cvs.openbsd.org 2001/04/02 14:20:23
[readconf.c servconf.c]
correct comment; ok markus@
mouring [Mon, 2 Apr 2001 18:18:21 +0000 (18:18 +0000)]
- stevesk@cvs.openbsd.org 2001/04/02 14:15:31
[sshd.8]
typo; ok markus@
stevesk [Mon, 2 Apr 2001 14:02:55 +0000 (14:02 +0000)]
- (stevesk) sshpty.h openbsd sync; PTY_H -> SSHPTY_H
stevesk [Mon, 2 Apr 2001 13:45:00 +0000 (13:45 +0000)]
- (stevesk) log.c openbsd sync; missing newlines
djm [Fri, 30 Mar 2001 00:55:20 +0000 (00:55 +0000)]
Fixup makefile after merge
djm [Fri, 30 Mar 2001 00:50:32 +0000 (00:50 +0000)]
- OpenBSD CVS Sync
- djm@cvs.openbsd.org 2001/03/29 23:42:01
[sshd.c]
Protocol 1 key regeneration log => verbose, some KNF; ok markus@
djm [Fri, 30 Mar 2001 00:50:10 +0000 (00:50 +0000)]
- OpenBSD CVS Sync
- markus@cvs.openbsd.org 2001/03/29 21:17:40
[dh.c dh.h kex.c kex.h]
prepare for rekeying: move DH code to dh.c
djm [Fri, 30 Mar 2001 00:49:35 +0000 (00:49 +0000)]
- OpenBSD CVS Sync
- stevesk@cvs.openbsd.org 2001/03/29 21:06:21
[sshconnect2.c sshd.c]
need to set both STOC and CTOS for SSH_BUG_BIGENDIANAES; ok markus@
djm [Fri, 30 Mar 2001 00:49:05 +0000 (00:49 +0000)]
- OpenBSD CVS Sync
- provos@cvs.openbsd.org 2001/03/29 14:24:59
[sshconnect2.c]
use recommended defaults
djm [Fri, 30 Mar 2001 00:48:31 +0000 (00:48 +0000)]
- OpenBSD CVS Sync
- markus@cvs.openbsd.org 2001/03/28 22:43:31
[auth.h auth2.c auth2-chall.c]
check auth_root_allowed for kbd-int auth, too.
djm [Fri, 30 Mar 2001 00:47:43 +0000 (00:47 +0000)]
- OpenBSD CVS Sync
- provos@cvs.openbsd.org 2001/03/28 22:04:57
[dh.c]
more sanity checking on primes file
djm [Fri, 30 Mar 2001 00:47:14 +0000 (00:47 +0000)]
- (djm) OpenBSD CVS Sync
- provos@cvs.openbsd.org 2001/03/28 21:59:41
[kex.c kex.h sshconnect2.c sshd.c]
forgot to include min and max params in hash, okay markus@
djm [Fri, 30 Mar 2001 00:23:17 +0000 (00:23 +0000)]
- (djm) Another openbsd-compat/glob.c sync
mouring [Thu, 29 Mar 2001 00:45:12 +0000 (00:45 +0000)]
- markus@cvs.openbsd.org 2001/03/28 20:50:45
[sshd.c]
call refuse() before close(); from olemx@ans.pl
mouring [Thu, 29 Mar 2001 00:43:54 +0000 (00:43 +0000)]
- stevesk@cvs.openbsd.org 2001/03/28 20:04:38
[scp.c]
usage more like rcp and add missing -B to usage; ok markus@
mouring [Thu, 29 Mar 2001 00:39:55 +0000 (00:39 +0000)]
- stevesk@cvs.openbsd.org 2001/03/28 19:56:23
[scp.c]
start to sync scp closer to rcp; ok markus@
mouring [Thu, 29 Mar 2001 00:36:16 +0000 (00:36 +0000)]
- provos@cvs.openbsd.org 2001/03/27 17:46:50
[compat.c compat.h dh.c dh.h ssh2.h sshconnect2.c sshd.c version.h]
make dh group exchange more flexible, allow min and max group size,
okay markus@, deraadt@
mouring [Thu, 29 Mar 2001 00:32:56 +0000 (00:32 +0000)]
- markus@cvs.openbsd.org 2001/03/27 10:57:00
[compat.c compat.h ssh-rsa.c]
some older systems use NID_md5 instead of NID_sha1 for RSASSA-PKCS1-v1_5
signatures in SSH protocol 2, ok djm@
mouring [Thu, 29 Mar 2001 00:31:20 +0000 (00:31 +0000)]
- markus@cvs.openbsd.org 2001/03/27 10:34:08
[ssh-rsa.c sshd.c]
use EVP_get_digestbynid, reorder some calls and fix missing free.
mouring [Thu, 29 Mar 2001 00:29:54 +0000 (00:29 +0000)]
- markus@cvs.openbsd.org 2001/03/26 23:23:24
[rsa.c rsa.h ssh-agent.c ssh-keygen.c]
try to read private f-secure ssh v2 rsa keys.
mouring [Thu, 29 Mar 2001 00:28:37 +0000 (00:28 +0000)]
- markus@cvs.openbsd.org 2001/03/26 23:12:42
[authfile.c]
KNF
mouring [Thu, 29 Mar 2001 00:27:11 +0000 (00:27 +0000)]
- stevesk@cvs.openbsd.org 2001/03/26 15:47:59
[ssh.1]
document more defaults; misc. cleanup. ok markus@
djm [Wed, 28 Mar 2001 11:05:26 +0000 (11:05 +0000)]
- (djm) Sync openbsd-compat/glob.c
djm [Wed, 28 Mar 2001 04:37:06 +0000 (04:37 +0000)]
- (djm) Rework krbIV tests to get us closer to building on Redhat. Still
doesn't work because of conflicts between krbIV's and OpenSSL's des.h
djm [Wed, 28 Mar 2001 04:35:30 +0000 (04:35 +0000)]
- (djm) Work around Solaris' broken struct dirent. Diagnosis and suggested
fix from Philippe Levan <levan@epix.net>
djm [Wed, 28 Mar 2001 03:03:42 +0000 (03:03 +0000)]
- (djm) Reorder tests and library inclusion for Krb4/AFS to try to
resolve linking conflicts with libcrypto. Report and suggested fix
from Holger Trapp <Holger.Trapp@Informatik.TU-Chemnitz.DE>
djm [Tue, 27 Mar 2001 06:12:24 +0000 (06:12 +0000)]
- (djm) Reestablish PAM credentials (which can be supplemental group
memberships) after initgroups() blows them away. Report and suggested
fix from Nalin Dahyabhai <nalin@redhat.com>
djm [Tue, 27 Mar 2001 06:10:22 +0000 (06:10 +0000)]
more detail about krb4/-lcrypto conflicts
mouring [Mon, 26 Mar 2001 13:44:06 +0000 (13:44 +0000)]
- markus@cvs.openbsd.org 2001/03/26 08:07:09
[authfile.c authfile.h ssh-add.c ssh-keygen.c ssh.c sshconnect.c
sshconnect.h sshconnect1.c sshconnect2.c sshd.c]
simpler key load/save interface, see authfile.h
mouring [Mon, 26 Mar 2001 05:45:53 +0000 (05:45 +0000)]
- stevesk@cvs.openbsd.org 2001/03/25 13:16:11
[servconf.c servconf.h session.c sshd.8 sshd_config]
PrintLastLog option; from chip@valinux.com with some minor
changes by me. ok markus@
mouring [Mon, 26 Mar 2001 05:38:25 +0000 (05:38 +0000)]
- djm@cvs.openbsd.org 2001/03/25 00:01:34
[session.c]
shorten; ok markus@
mouring [Mon, 26 Mar 2001 05:35:33 +0000 (05:35 +0000)]
- Fix pointer issues in waitpid() and wait() replaces. Patch by Lutz
Jaenicke <Lutz.Jaenicke@aet.TU-Cottbus.DE>
mouring [Mon, 26 Mar 2001 05:32:16 +0000 (05:32 +0000)]
- Attempt sync with sshlogin.c w/ OpenBSD (mainly CVS ID)
djm [Sat, 24 Mar 2001 04:39:38 +0000 (04:39 +0000)]
- (djm) Pull out our own SIGPIPE hacks
mouring [Sat, 24 Mar 2001 00:43:26 +0000 (00:43 +0000)]
- markus@cvs.openbsd.org 2001/03/23 14:28:32
[session.c sshd.c]
ignore SIGPIPE, restore in child, fixes x11-fwd crashes; with djm@
mouring [Sat, 24 Mar 2001 00:39:12 +0000 (00:39 +0000)]
- markus@cvs.openbsd.org 2001/03/23 13:10:57
[sftp-int.c]
fix put, upload to _absolute_ path, ok djm@
mouring [Sat, 24 Mar 2001 00:37:59 +0000 (00:37 +0000)]
- markus@cvs.openbsd.org 2001/03/23 12:02:49
[auth1.c]
authctxt is now passed to do_authenticated
mouring [Sat, 24 Mar 2001 00:35:19 +0000 (00:35 +0000)]
- djm@cvs.openbsd.org 2001/03/23 11:04:07
[compat.c compat.h sshconnect2.c sshd.c]
Compat for OpenSSH with broken Rijndael/AES. ok markus@
mouring [Sat, 24 Mar 2001 00:20:56 +0000 (00:20 +0000)]
- Fixed permissions ssh-keyscan. Thanks to Christopher Linn <celinn@mtu.edu>.
mouring [Thu, 22 Mar 2001 22:45:33 +0000 (22:45 +0000)]
- deraadt@cvs.openbsd.org 2001/03/22 20:22:55
[sshd.c]
do not place linefeeds in buffer
This page took 0.158857 seconds and 4 git commands to generate.