diff options
author | Colin Watson <cjwatson@debian.org> | 2009-12-29 21:42:53 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2009-12-29 21:42:53 +0000 |
commit | 87552344215a38d3a2b0d4d63dc151e05978bbe1 (patch) | |
tree | 9f4b96055e6ccaa915e8d59d9f2805e9e119371d /ChangeLog | |
parent | a25ec0b132c44c9e341e08464ff830de06b81126 (diff) | |
parent | ef94e5613d37bcbf880f21ee6094e4b1c7683a4c (diff) |
import openssh-5.1p1-gsskex-cjwatson-20080722.patch
Diffstat (limited to 'ChangeLog')
-rw-r--r-- | ChangeLog | 1528 |
1 files changed, 1527 insertions, 1 deletions
@@ -1,3 +1,1529 @@ | |||
1 | 20080721 | ||
2 | - (djm) OpenBSD CVS Sync | ||
3 | - jmc@cvs.openbsd.org 2008/07/18 22:51:01 | ||
4 | [sftp-server.8] | ||
5 | no need for .Pp before or after .Sh; | ||
6 | - djm@cvs.openbsd.org 2008/07/21 08:19:07 | ||
7 | [version.h] | ||
8 | openssh-5.1 | ||
9 | - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec] | ||
10 | [contrib/suse/openssh.spec] Update version number in README and RPM specs | ||
11 | - (djm) Release OpenSSH-5.1 | ||
12 | |||
13 | 20080717 | ||
14 | - (djm) OpenBSD CVS Sync | ||
15 | - djm@cvs.openbsd.org 2008/07/17 08:48:00 | ||
16 | [sshconnect2.c] | ||
17 | strnvis preauth banner; pointed out by mpf@ ok markus@ | ||
18 | - djm@cvs.openbsd.org 2008/07/17 08:51:07 | ||
19 | [auth2-hostbased.c] | ||
20 | strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes | ||
21 | report and patch from res AT qoxp.net (bz#1200); ok markus@ | ||
22 | - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat | ||
23 | code, replace with equivalent cygwin library call. Patch from vinschen | ||
24 | at redhat.com, ok djm@. | ||
25 | - (djm) [sshconnect2.c] vis.h isn't available everywhere | ||
26 | |||
27 | 20080716 | ||
28 | - OpenBSD CVS Sync | ||
29 | - djm@cvs.openbsd.org 2008/07/15 02:23:14 | ||
30 | [sftp.1] | ||
31 | number of pipelined requests is now 64; | ||
32 | prodded by Iain.Morgan AT nasa.gov | ||
33 | - djm@cvs.openbsd.org 2008/07/16 11:51:14 | ||
34 | [clientloop.c] | ||
35 | rename variable first_gc -> last_gc (since it is actually the last | ||
36 | in the list). | ||
37 | - djm@cvs.openbsd.org 2008/07/16 11:52:19 | ||
38 | [channels.c] | ||
39 | this loop index should be automatic, not static | ||
40 | |||
41 | 20080714 | ||
42 | - (djm) OpenBSD CVS Sync | ||
43 | - sthen@cvs.openbsd.org 2008/07/13 21:22:52 | ||
44 | [ssh-keygen.c] | ||
45 | Change "ssh-keygen -F [host] -l" to not display random art unless | ||
46 | -v is also specified, making it consistent with the manual and other | ||
47 | uses of -l. | ||
48 | ok grunk@ | ||
49 | - djm@cvs.openbsd.org 2008/07/13 22:13:07 | ||
50 | [channels.c] | ||
51 | use struct sockaddr_storage instead of struct sockaddr for accept(2) | ||
52 | address argument. from visibilis AT yahoo.com in bz#1485; ok markus@ | ||
53 | - djm@cvs.openbsd.org 2008/07/13 22:16:03 | ||
54 | [sftp.c] | ||
55 | increase number of piplelined requests so they properly fill the | ||
56 | (recently increased) channel window. prompted by rapier AT psc.edu; | ||
57 | ok markus@ | ||
58 | - djm@cvs.openbsd.org 2008/07/14 01:55:56 | ||
59 | [sftp-server.8] | ||
60 | mention requirement for /dev/log inside chroot when using sftp-server | ||
61 | with ChrootDirectory | ||
62 | - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to | ||
63 | avoid clash with sin(3) function; reported by | ||
64 | cristian.ionescu-idbohrn AT axis.com | ||
65 | - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close() | ||
66 | prototype; reported by cristian.ionescu-idbohrn AT axis.com | ||
67 | - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash; | ||
68 | reported by cristian.ionescu-idbohrn AT axis.com | ||
69 | - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config] | ||
70 | [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd] | ||
71 | Revamped and simplified Cygwin ssh-host-config script that uses | ||
72 | unified csih configuration tool. Requires recent Cygwin. | ||
73 | Patch from vinschen AT redhat.com | ||
74 | |||
75 | 20080712 | ||
76 | - (djm) OpenBSD CVS Sync | ||
77 | - djm@cvs.openbsd.org 2008/07/12 04:52:50 | ||
78 | [channels.c] | ||
79 | unbreak; move clearing of cctx struct to before first use | ||
80 | reported by dkrause@ | ||
81 | - djm@cvs.openbsd.org 2008/07/12 05:33:41 | ||
82 | [scp.1] | ||
83 | better description for -i flag: | ||
84 | s/RSA authentication/public key authentication/ | ||
85 | - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h] | ||
86 | return EAI_FAMILY when trying to lookup unsupported address family; | ||
87 | from vinschen AT redhat.com | ||
88 | |||
89 | 20080711 | ||
90 | - (djm) OpenBSD CVS Sync | ||
91 | - stevesk@cvs.openbsd.org 2008/07/07 00:31:41 | ||
92 | [ttymodes.c] | ||
93 | we don't need arg after the debug3() was removed. from lint. | ||
94 | ok djm@ | ||
95 | - stevesk@cvs.openbsd.org 2008/07/07 23:32:51 | ||
96 | [key.c] | ||
97 | /*NOTREACHED*/ for lint warning: | ||
98 | warning: function key_equal falls off bottom without returning value | ||
99 | ok djm@ | ||
100 | - markus@cvs.openbsd.org 2008/07/10 18:05:58 | ||
101 | [channels.c] | ||
102 | missing bzero; from mickey; ok djm@ | ||
103 | - markus@cvs.openbsd.org 2008/07/10 18:08:11 | ||
104 | [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c] | ||
105 | sync v1 and v2 traffic accounting; add it to sshd, too; | ||
106 | ok djm@, dtucker@ | ||
107 | |||
108 | 20080709 | ||
109 | - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass | ||
110 | - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM | ||
111 | account check failure path. The vulnerable format buffer is supplied | ||
112 | from PAM and should not contain attacker-supplied data. | ||
113 | - (djm) [auth.c] Missing unistd.h for close() | ||
114 | - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x | ||
115 | |||
116 | 20080705 | ||
117 | - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed | ||
118 | passwords disabled. bz#1083 report & patch from senthilkumar_sen AT | ||
119 | hotpop.com, w/ dtucker@ | ||
120 | - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for | ||
121 | Tru64. readv doesn't seem to be a comparable object there. | ||
122 | bz#1386, patch from dtucker@ ok me | ||
123 | - (djm) [Makefile.in] Pass though pass to conch for interop tests | ||
124 | - (djm) [configure.ac] unbreak: remove extra closing brace | ||
125 | - (djm) OpenBSD CVS Sync | ||
126 | - djm@cvs.openbsd.org 2008/07/04 23:08:25 | ||
127 | [packet.c] | ||
128 | handle EINTR in packet_write_poll()l ok dtucker@ | ||
129 | - djm@cvs.openbsd.org 2008/07/04 23:30:16 | ||
130 | [auth1.c auth2.c] | ||
131 | Make protocol 1 MaxAuthTries logic match protocol 2's. | ||
132 | Do not treat the first protocol 2 authentication attempt as | ||
133 | a failure IFF it is for method "none". | ||
134 | Makes MaxAuthTries' user-visible behaviour identical for | ||
135 | protocol 1 vs 2. | ||
136 | ok dtucker@ | ||
137 | - djm@cvs.openbsd.org 2008/07/05 05:16:01 | ||
138 | [PROTOCOL] | ||
139 | grammar | ||
140 | |||
141 | 20080704 | ||
142 | - (dtucker) OpenBSD CVS Sync | ||
143 | - djm@cvs.openbsd.org 2008/07/02 13:30:34 | ||
144 | [auth2.c] | ||
145 | really really remove the freebie "none" auth try for protocol 2 | ||
146 | - djm@cvs.openbsd.org 2008/07/02 13:47:39 | ||
147 | [ssh.1 ssh.c] | ||
148 | When forking after authentication ("ssh -f") with ExitOnForwardFailure | ||
149 | enabled, delay the fork until after replies for any -R forwards have | ||
150 | been seen. Allows for robust detection of -R forward failure when | ||
151 | using -f (similar to bz#92); ok dtucker@ | ||
152 | - otto@cvs.openbsd.org 2008/07/03 21:46:58 | ||
153 | [auth2-pubkey.c] | ||
154 | avoid nasty double free; ok dtucker@ djm@ | ||
155 | - djm@cvs.openbsd.org 2008/07/04 03:44:59 | ||
156 | [servconf.c groupaccess.h groupaccess.c] | ||
157 | support negation of groups in "Match group" block (bz#1315); ok dtucker@ | ||
158 | - dtucker@cvs.openbsd.org 2008/07/04 03:47:02 | ||
159 | [monitor.c] | ||
160 | Make debug a little clearer. ok djm@ | ||
161 | - djm@cvs.openbsd.org 2008/06/30 08:07:34 | ||
162 | [regress/key-options.sh] | ||
163 | shell portability: use "=" instead of "==" in test(1) expressions, | ||
164 | double-quote string with backslash escaped / | ||
165 | - djm@cvs.openbsd.org 2008/06/30 10:31:11 | ||
166 | [regress/{putty-transfer,putty-kex,putty-ciphers}.sh] | ||
167 | remove "set -e" left over from debugging | ||
168 | - djm@cvs.openbsd.org 2008/06/30 10:43:03 | ||
169 | [regress/conch-ciphers.sh] | ||
170 | explicitly disable conch options that could interfere with the test | ||
171 | - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link | ||
172 | returns EXDEV. Patch from Mike Garrison, ok djm@ | ||
173 | - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h] | ||
174 | [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c] | ||
175 | [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on | ||
176 | some platforms (HP nonstop) it is a distinct errno; | ||
177 | bz#1467 reported by sconeu AT yahoo.com; ok dtucker@ | ||
178 | |||
179 | 20080702 | ||
180 | - (dtucker) OpenBSD CVS Sync | ||
181 | - djm@cvs.openbsd.org 2008/06/30 08:05:59 | ||
182 | [PROTOCOL.agent] | ||
183 | typo: s/constraint_date/constraint_data/ | ||
184 | - djm@cvs.openbsd.org 2008/06/30 12:15:39 | ||
185 | [serverloop.c] | ||
186 | only pass channel requests on session channels through to the session | ||
187 | channel handler, avoiding spurious log messages; ok! markus@ | ||
188 | - djm@cvs.openbsd.org 2008/06/30 12:16:02 | ||
189 | [nchan.c] | ||
190 | only send eow@openssh.com notifications for session channels; ok! markus@ | ||
191 | - djm@cvs.openbsd.org 2008/06/30 12:18:34 | ||
192 | [PROTOCOL] | ||
193 | clarify that eow@openssh.com is only sent on session channels | ||
194 | - dtucker@cvs.openbsd.org 2008/07/01 07:20:52 | ||
195 | [sshconnect.c] | ||
196 | Check ExitOnForwardFailure if forwardings are disabled due to a failed | ||
197 | host key check. ok djm@ | ||
198 | - dtucker@cvs.openbsd.org 2008/07/01 07:24:22 | ||
199 | [sshconnect.c sshd.c] | ||
200 | Send CR LF during protocol banner exchanges, but only for Protocol 2 only, | ||
201 | in order to comply with RFC 4253. bz #1443, ok djm@ | ||
202 | - stevesk@cvs.openbsd.org 2008/07/01 23:12:47 | ||
203 | [PROTOCOL.agent] | ||
204 | fix some typos; ok djm@ | ||
205 | - djm@cvs.openbsd.org 2008/07/02 02:24:18 | ||
206 | [sshd_config sshd_config.5 sshd.8 servconf.c] | ||
207 | increase default size of ssh protocol 1 ephemeral key from 768 to 1024 | ||
208 | bits; prodded by & ok dtucker@ ok deraadt@ | ||
209 | - dtucker@cvs.openbsd.org 2008/07/02 12:03:51 | ||
210 | [auth-rsa.c auth.c auth2-pubkey.c auth.h] | ||
211 | Merge duplicate host key file checks, based in part on a patch from Rob | ||
212 | Holland via bz #1348 . Also checks for non-regular files during protocol | ||
213 | 1 RSA auth. ok djm@ | ||
214 | - djm@cvs.openbsd.org 2008/07/02 12:36:39 | ||
215 | [auth2-none.c auth2.c] | ||
216 | Make protocol 2 MaxAuthTries behaviour a little more sensible: | ||
217 | Check whether client has exceeded MaxAuthTries before running | ||
218 | an authentication method and skip it if they have, previously it | ||
219 | would always allow one try (for "none" auth). | ||
220 | Preincrement failure count before post-auth test - previously this | ||
221 | checked and postincremented, also to allow one "none" try. | ||
222 | Together, these two changes always count the "none" auth method | ||
223 | which could be skipped by a malicious client (e.g. an SSH worm) | ||
224 | to get an extra attempt at a real auth method. They also make | ||
225 | MaxAuthTries=0 a useful way to block users entirely (esp. in a | ||
226 | sshd_config Match block). | ||
227 | Also, move sending of any preauth banner from "none" auth method | ||
228 | to the first call to input_userauth_request(), so worms that skip | ||
229 | the "none" method get to see it too. | ||
230 | |||
231 | 20080630 | ||
232 | - (djm) OpenBSD CVS Sync | ||
233 | - dtucker@cvs.openbsd.org 2008/06/10 23:13:43 | ||
234 | [regress/Makefile regress/key-options.sh] | ||
235 | Add regress test for key options. ok djm@ | ||
236 | - dtucker@cvs.openbsd.org 2008/06/11 23:11:40 | ||
237 | [regress/Makefile] | ||
238 | Don't run cipher-speed test by default; mistakenly enabled by me | ||
239 | - djm@cvs.openbsd.org 2008/06/28 13:57:25 | ||
240 | [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh] | ||
241 | very basic regress test against Twisted Conch in "make interop" | ||
242 | target (conch is available in ports/devel/py-twisted/conch); | ||
243 | ok markus@ | ||
244 | - (djm) [regress/Makefile] search for conch by path, like we do putty | ||
245 | |||
246 | 20080629 | ||
247 | - (djm) OpenBSD CVS Sync | ||
248 | - martynas@cvs.openbsd.org 2008/06/21 07:46:46 | ||
249 | [sftp.c] | ||
250 | use optopt to get invalid flag, instead of return value of getopt, | ||
251 | which is always '?'; ok djm@ | ||
252 | - otto@cvs.openbsd.org 2008/06/25 11:13:43 | ||
253 | [key.c] | ||
254 | add key length to visual fingerprint; zap magical constants; | ||
255 | ok grunk@ djm@ | ||
256 | - djm@cvs.openbsd.org 2008/06/26 06:10:09 | ||
257 | [sftp-client.c sftp-server.c] | ||
258 | allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky | ||
259 | bits. Note that this only affects explicit setting of modes (e.g. via | ||
260 | sftp(1)'s chmod command) and not file transfers. (bz#1310) | ||
261 | ok deraadt@ at c2k8 | ||
262 | - djm@cvs.openbsd.org 2008/06/26 09:19:40 | ||
263 | [dh.c dh.h moduli.c] | ||
264 | when loading moduli from /etc/moduli in sshd(8), check that they | ||
265 | are of the expected "safe prime" structure and have had | ||
266 | appropriate primality tests performed; | ||
267 | feedback and ok dtucker@ | ||
268 | - grunk@cvs.openbsd.org 2008/06/26 11:46:31 | ||
269 | [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c] | ||
270 | Move SSH Fingerprint Visualization away from sharing the config option | ||
271 | CheckHostIP to an own config option named VisualHostKey. | ||
272 | While there, fix the behaviour that ssh would draw a random art picture | ||
273 | on every newly seen host even when the option was not enabled. | ||
274 | prodded by deraadt@, discussions, | ||
275 | help and ok markus@ djm@ dtucker@ | ||
276 | - jmc@cvs.openbsd.org 2008/06/26 21:11:46 | ||
277 | [ssh.1] | ||
278 | add VisualHostKey to the list of options listed in -o; | ||
279 | - djm@cvs.openbsd.org 2008/06/28 07:25:07 | ||
280 | [PROTOCOL] | ||
281 | spelling fixes | ||
282 | - djm@cvs.openbsd.org 2008/06/28 13:58:23 | ||
283 | [ssh-agent.c] | ||
284 | refuse to add a key that has unknown constraints specified; | ||
285 | ok markus | ||
286 | - djm@cvs.openbsd.org 2008/06/28 14:05:15 | ||
287 | [ssh-agent.c] | ||
288 | reset global compat flag after processing a protocol 2 signature | ||
289 | request with the legacy DSA encoding flag set; ok markus | ||
290 | - djm@cvs.openbsd.org 2008/06/28 14:08:30 | ||
291 | [PROTOCOL PROTOCOL.agent] | ||
292 | document the protocol used by ssh-agent; "looks ok" markus@ | ||
293 | |||
294 | 20080628 | ||
295 | - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec] | ||
296 | RFC.nroff lacks a license, remove it (it is long gone in OpenBSD). | ||
297 | |||
298 | 20080626 | ||
299 | - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD. | ||
300 | (bz#1372) | ||
301 | - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec] | ||
302 | [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files. | ||
303 | |||
304 | 20080616 | ||
305 | - (dtucker) OpenBSD CVS Sync | ||
306 | - dtucker@cvs.openbsd.org 2008/06/16 13:22:53 | ||
307 | [session.c channels.c] | ||
308 | Rename the isatty argument to is_tty so we don't shadow | ||
309 | isatty(3). ok markus@ | ||
310 | - (dtucker) [channels.c] isatty -> is_tty here too. | ||
311 | |||
312 | 20080615 | ||
313 | - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc. | ||
314 | - OpenBSD CVS Sync | ||
315 | - dtucker@cvs.openbsd.org 2008/06/14 15:49:48 | ||
316 | [sshd.c] | ||
317 | wrap long line at 80 chars | ||
318 | - dtucker@cvs.openbsd.org 2008/06/14 17:07:11 | ||
319 | [sshd.c] | ||
320 | ensure default umask disallows at least group and world write; ok djm@ | ||
321 | - djm@cvs.openbsd.org 2008/06/14 18:33:43 | ||
322 | [session.c] | ||
323 | suppress the warning message from chdir(homedir) failures | ||
324 | when chrooted (bz#1461); ok dtucker | ||
325 | - dtucker@cvs.openbsd.org 2008/06/14 19:42:10 | ||
326 | [scp.1] | ||
327 | Mention that scp follows symlinks during -r. bz #1466, | ||
328 | from nectar at apple | ||
329 | - dtucker@cvs.openbsd.org 2008/06/15 16:55:38 | ||
330 | [sshd_config.5] | ||
331 | MaxSessions is allowed in a Match block too | ||
332 | - dtucker@cvs.openbsd.org 2008/06/15 16:58:40 | ||
333 | [servconf.c sshd_config.5] | ||
334 | Allow MaxAuthTries within a Match block. ok djm@ | ||
335 | - djm@cvs.openbsd.org 2008/06/15 20:06:26 | ||
336 | [channels.c channels.h session.c] | ||
337 | don't call isatty() on a pty master, instead pass a flag down to | ||
338 | channel_set_fds() indicating that te fds refer to a tty. Fixes a | ||
339 | hang on exit on Solaris (bz#1463) in portable but is actually | ||
340 | a generic bug; ok dtucker deraadt markus | ||
341 | |||
342 | 20080614 | ||
343 | - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction | ||
344 | replacement code; patch from ighighi AT gmail.com in bz#1240; | ||
345 | ok dtucker | ||
346 | |||
347 | 20080613 | ||
348 | - (dtucker) OpenBSD CVS Sync | ||
349 | - deraadt@cvs.openbsd.org 2008/06/13 09:44:36 | ||
350 | [packet.c] | ||
351 | compile on older gcc; no decl after code | ||
352 | - dtucker@cvs.openbsd.org 2008/06/13 13:56:59 | ||
353 | [monitor.c] | ||
354 | Clear key options in the monitor on failed authentication, prevents | ||
355 | applying additional restrictions to non-pubkey authentications in | ||
356 | the case where pubkey fails but another method subsequently succeeds. | ||
357 | bz #1472, found by Colin Watson, ok markus@ djm@ | ||
358 | - dtucker@cvs.openbsd.org 2008/06/13 14:18:51 | ||
359 | [auth2-pubkey.c auth-rhosts.c] | ||
360 | Include unistd.h for close(), prevents warnings in -portable | ||
361 | - dtucker@cvs.openbsd.org 2008/06/13 17:21:20 | ||
362 | [mux.c] | ||
363 | Friendlier error messages for mux fallback. ok djm@ | ||
364 | - dtucker@cvs.openbsd.org 2008/06/13 18:55:22 | ||
365 | [scp.c] | ||
366 | Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@ | ||
367 | - grunk@cvs.openbsd.org 2008/06/13 20:13:26 | ||
368 | [ssh.1] | ||
369 | Explain the use of SSH fpr visualization using random art, and cite the | ||
370 | original scientific paper inspiring that technique. | ||
371 | Much help with English and nroff by jmc@, thanks. | ||
372 | - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which | ||
373 | despite its name doesn't seem to implement all of GSSAPI. Patch from | ||
374 | Jan Engelhardt, sanity checked by Simon Wilkinson. | ||
375 | |||
376 | 20080612 | ||
377 | - (dtucker) OpenBSD CVS Sync | ||
378 | - jmc@cvs.openbsd.org 2008/06/11 07:30:37 | ||
379 | [sshd.8] | ||
380 | kill trailing whitespace; | ||
381 | - grunk@cvs.openbsd.org 2008/06/11 21:01:35 | ||
382 | [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c | ||
383 | sshconnect.c] | ||
384 | Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the | ||
385 | graphical hash visualization schemes known as "random art", and by | ||
386 | Dan Kaminsky's musings on the subject during a BlackOp talk at the | ||
387 | 23C3 in Berlin. | ||
388 | Scientific publication (original paper): | ||
389 | "Hash Visualization: a New Technique to improve Real-World Security", | ||
390 | Perrig A. and Song D., 1999, International Workshop on Cryptographic | ||
391 | Techniques and E-Commerce (CrypTEC '99) | ||
392 | http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf | ||
393 | The algorithm used here is a worm crawling over a discrete plane, | ||
394 | leaving a trace (augmenting the field) everywhere it goes. | ||
395 | Movement is taken from dgst_raw 2bit-wise. Bumping into walls | ||
396 | makes the respective movement vector be ignored for this turn, | ||
397 | thus switching to the other color of the chessboard. | ||
398 | Graphs are not unambiguous for now, because circles in graphs can be | ||
399 | walked in either direction. | ||
400 | discussions with several people, | ||
401 | help, corrections and ok markus@ djm@ | ||
402 | - grunk@cvs.openbsd.org 2008/06/11 21:38:25 | ||
403 | [ssh-keygen.c] | ||
404 | ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub | ||
405 | would not display you the random art as intended, spotted by canacar@ | ||
406 | - grunk@cvs.openbsd.org 2008/06/11 22:20:46 | ||
407 | [ssh-keygen.c ssh-keygen.1] | ||
408 | ssh-keygen would write fingerprints to STDOUT, and random art to STDERR, | ||
409 | that is not how it was envisioned. | ||
410 | Also correct manpage saying that -v is needed along with -l for it to work. | ||
411 | spotted by naddy@ | ||
412 | - otto@cvs.openbsd.org 2008/06/11 23:02:22 | ||
413 | [key.c] | ||
414 | simpler way of computing the augmentations; ok grunk@ | ||
415 | - grunk@cvs.openbsd.org 2008/06/11 23:03:56 | ||
416 | [ssh_config.5] | ||
417 | CheckHostIP set to ``fingerprint'' will display both hex and random art | ||
418 | spotted by naddy@ | ||
419 | - grunk@cvs.openbsd.org 2008/06/11 23:51:57 | ||
420 | [key.c] | ||
421 | #define statements that are not atoms need braces around them, else they | ||
422 | will cause trouble in some cases. | ||
423 | Also do a computation of -1 once, and not in a loop several times. | ||
424 | spotted by otto@ | ||
425 | - dtucker@cvs.openbsd.org 2008/06/12 00:03:49 | ||
426 | [dns.c canohost.c sshconnect.c] | ||
427 | Do not pass "0" strings as ports to getaddrinfo because the lookups | ||
428 | can slow things down and we never use the service info anyway. bz | ||
429 | #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok | ||
430 | deraadt@ djm@ | ||
431 | djm belives that the reason for the "0" strings is to ensure that | ||
432 | it's not possible to call getaddrinfo with both host and port being | ||
433 | NULL. In the case of canohost.c host is a local array. In the | ||
434 | case of sshconnect.c, it's checked for null immediately before use. | ||
435 | In dns.c it ultimately comes from ssh.c:main() and is guaranteed to | ||
436 | be non-null but it's not obvious, so I added a warning message in | ||
437 | case it is ever passed a null. | ||
438 | - grunk@cvs.openbsd.org 2008/06/12 00:13:55 | ||
439 | [sshconnect.c] | ||
440 | Make ssh print the random art also when ssh'ing to a host using IP only. | ||
441 | spotted by naddy@, ok and help djm@ dtucker@ | ||
442 | - otto@cvs.openbsd.org 2008/06/12 00:13:13 | ||
443 | [key.c] | ||
444 | use an odd number of rows and columns and a separate start marker, looks | ||
445 | better; ok grunk@ | ||
446 | - djm@cvs.openbsd.org 2008/06/12 03:40:52 | ||
447 | [clientloop.h mux.c channels.c clientloop.c channels.h] | ||
448 | Enable ~ escapes for multiplex slave sessions; give each channel | ||
449 | its own escape state and hook the escape filters up to muxed | ||
450 | channels. bz #1331 | ||
451 | Mux slaves do not currently support the ~^Z and ~& escapes. | ||
452 | NB. this change cranks the mux protocol version, so a new ssh | ||
453 | mux client will not be able to connect to a running old ssh | ||
454 | mux master. | ||
455 | ok dtucker@ | ||
456 | - djm@cvs.openbsd.org 2008/06/12 04:06:00 | ||
457 | [clientloop.h ssh.c clientloop.c] | ||
458 | maintain an ordered queue of outstanding global requests that we | ||
459 | expect replies to, similar to the per-channel confirmation queue. | ||
460 | Use this queue to verify success or failure for remote forward | ||
461 | establishment in a race free way. | ||
462 | ok dtucker@ | ||
463 | - djm@cvs.openbsd.org 2008/06/12 04:17:47 | ||
464 | [clientloop.c] | ||
465 | thall shalt not code past the eightieth column | ||
466 | - djm@cvs.openbsd.org 2008/06/12 04:24:06 | ||
467 | [ssh.c] | ||
468 | thal shalt not code past the eightieth column | ||
469 | - djm@cvs.openbsd.org 2008/06/12 05:15:41 | ||
470 | [PROTOCOL] | ||
471 | document tun@openssh.com forwarding method | ||
472 | - djm@cvs.openbsd.org 2008/06/12 05:32:30 | ||
473 | [mux.c] | ||
474 | some more TODO for me | ||
475 | - grunk@cvs.openbsd.org 2008/06/12 05:42:46 | ||
476 | [key.c] | ||
477 | supply the key type (rsa1, rsa, dsa) as a caption in the frame of the | ||
478 | random art. while there, stress the fact that the field base should at | ||
479 | least be 8 characters for the pictures to make sense. | ||
480 | comment and ok djm@ | ||
481 | - grunk@cvs.openbsd.org 2008/06/12 06:32:59 | ||
482 | [key.c] | ||
483 | We already mark the start of the worm, now also mark the end of the worm | ||
484 | in our random art drawings. | ||
485 | ok djm@ | ||
486 | - djm@cvs.openbsd.org 2008/06/12 15:19:17 | ||
487 | [clientloop.h channels.h clientloop.c channels.c mux.c] | ||
488 | The multiplexing escape char handler commit last night introduced a | ||
489 | small memory leak per session; plug it. | ||
490 | - dtucker@cvs.openbsd.org 2008/06/12 16:35:31 | ||
491 | [ssh_config.5 ssh.c] | ||
492 | keyword expansion for localcommand. ok djm@ | ||
493 | - jmc@cvs.openbsd.org 2008/06/12 19:10:09 | ||
494 | [ssh_config.5 ssh-keygen.1] | ||
495 | tweak the ascii art text; ok grunk | ||
496 | - dtucker@cvs.openbsd.org 2008/06/12 20:38:28 | ||
497 | [sshd.c sshconnect.c packet.h misc.c misc.h packet.c] | ||
498 | Make keepalive timeouts apply while waiting for a packet, particularly | ||
499 | during key renegotiation (bz #1363). With djm and Matt Day, ok djm@ | ||
500 | - djm@cvs.openbsd.org 2008/06/12 20:47:04 | ||
501 | [sftp-client.c] | ||
502 | print extension revisions for extensions that we understand | ||
503 | - djm@cvs.openbsd.org 2008/06/12 21:06:25 | ||
504 | [clientloop.c] | ||
505 | I was coalescing expected global request confirmation replies at | ||
506 | the wrong end of the queue - fix; prompted by markus@ | ||
507 | - grunk@cvs.openbsd.org 2008/06/12 21:14:46 | ||
508 | [ssh-keygen.c] | ||
509 | make ssh-keygen -lf show the key type just as ssh-add -l would do it | ||
510 | ok djm@ markus@ | ||
511 | - grunk@cvs.openbsd.org 2008/06/12 22:03:36 | ||
512 | [key.c] | ||
513 | add my copyright, ok djm@ | ||
514 | - ian@cvs.openbsd.org 2008/06/12 23:24:58 | ||
515 | [sshconnect.c] | ||
516 | tweak wording in message, ok deraadt@ jmc@ | ||
517 | - dtucker@cvs.openbsd.org 2008/06/13 00:12:02 | ||
518 | [sftp.h log.h] | ||
519 | replace __dead with __attribute__((noreturn)), makes things | ||
520 | a little easier to port. Also, add it to sigdie(). ok djm@ | ||
521 | - djm@cvs.openbsd.org 2008/06/13 00:16:49 | ||
522 | [mux.c] | ||
523 | fall back to creating a new TCP connection on most multiplexing errors | ||
524 | (socket connect fail, invalid version, refused permittion, corrupted | ||
525 | messages, etc.); bz #1329 ok dtucker@ | ||
526 | - dtucker@cvs.openbsd.org 2008/06/13 00:47:53 | ||
527 | [mux.c] | ||
528 | upcast size_t to u_long to match format arg; ok djm@ | ||
529 | - dtucker@cvs.openbsd.org 2008/06/13 00:51:47 | ||
530 | [mac.c] | ||
531 | upcast another size_t to u_long to match format | ||
532 | - dtucker@cvs.openbsd.org 2008/06/13 01:38:23 | ||
533 | [misc.c] | ||
534 | upcast uid to long with matching %ld, prevents warnings in portable | ||
535 | - djm@cvs.openbsd.org 2008/06/13 04:40:22 | ||
536 | [auth2-pubkey.c auth-rhosts.c] | ||
537 | refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not | ||
538 | regular files; report from Solar Designer via Colin Watson in bz#1471 | ||
539 | ok dtucker@ deraadt | ||
540 | - (dtucker) [clientloop.c serverloop.c] channel_register_filter now | ||
541 | takes 2 more args. with djm@ | ||
542 | - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch | ||
543 | from Todd Vierling. | ||
544 | - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA | ||
545 | systems. Patch from R. Scott Bailey. | ||
546 | - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used | ||
547 | on big endian machines, so ifdef them for little-endian only to prevent | ||
548 | unused function warnings on big-endians. | ||
549 | - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent | ||
550 | compiler warnings on some platforms. Based on a discussion with otto@ | ||
551 | |||
552 | 20080611 | ||
553 | - (djm) [channels.c configure.ac] | ||
554 | Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no) | ||
555 | bz#1464; ok dtucker | ||
556 | |||
557 | 20080610 | ||
558 | - (dtucker) OpenBSD CVS Sync | ||
559 | - djm@cvs.openbsd.org 2008/06/10 03:57:27 | ||
560 | [servconf.c match.h sshd_config.5] | ||
561 | support CIDR address matching in sshd_config "Match address" blocks, with | ||
562 | full support for negation and fall-back to classic wildcard matching. | ||
563 | For example: | ||
564 | Match address 192.0.2.0/24,3ffe:ffff::/32,!10.* | ||
565 | PasswordAuthentication yes | ||
566 | addrmatch.c code mostly lifted from flowd's addr.c | ||
567 | feedback and ok dtucker@ | ||
568 | - djm@cvs.openbsd.org 2008/06/10 04:17:46 | ||
569 | [sshd_config.5] | ||
570 | better reference for pattern-list | ||
571 | - dtucker@cvs.openbsd.org 2008/06/10 04:50:25 | ||
572 | [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8] | ||
573 | Add extended test mode (-T) and connection parameters for test mode (-C). | ||
574 | -T causes sshd to write its effective configuration to stdout and exit. | ||
575 | -C causes any relevant Match rules to be applied before output. The | ||
576 | combination allows tesing of the parser and config files. ok deraadt djm | ||
577 | - jmc@cvs.openbsd.org 2008/06/10 07:12:00 | ||
578 | [sshd_config.5] | ||
579 | tweak previous; | ||
580 | - jmc@cvs.openbsd.org 2008/06/10 08:17:40 | ||
581 | [sshd.8 sshd.c] | ||
582 | - update usage() | ||
583 | - fix SYNOPSIS, and sort options | ||
584 | - some minor additional fixes | ||
585 | - dtucker@cvs.openbsd.org 2008/06/09 18:06:32 | ||
586 | [regress/test-exec.sh] | ||
587 | Don't generate putty keys if we're not going to use them. ok djm | ||
588 | - dtucker@cvs.openbsd.org 2008/06/10 05:23:32 | ||
589 | [regress/addrmatch.sh regress/Makefile] | ||
590 | Regress test for Match CIDR rules. ok djm@ | ||
591 | - dtucker@cvs.openbsd.org 2008/06/10 15:21:41 | ||
592 | [test-exec.sh] | ||
593 | Use a more portable construct for checking if we're running a putty test | ||
594 | - dtucker@cvs.openbsd.org 2008/06/10 15:28:49 | ||
595 | [test-exec.sh] | ||
596 | Add quotes | ||
597 | - dtucker@cvs.openbsd.org 2008/06/10 18:21:24 | ||
598 | [ssh_config.5] | ||
599 | clarify that Host patterns are space-separated. ok deraadt | ||
600 | - djm@cvs.openbsd.org 2008/06/10 22:15:23 | ||
601 | [PROTOCOL ssh.c serverloop.c] | ||
602 | Add a no-more-sessions@openssh.com global request extension that the | ||
603 | client sends when it knows that it will never request another session | ||
604 | (i.e. when session multiplexing is disabled). This allows a server to | ||
605 | disallow further session requests and terminate the session. | ||
606 | Why would a non-multiplexing client ever issue additional session | ||
607 | requests? It could have been attacked with something like SSH'jack: | ||
608 | http://www.storm.net.nz/projects/7 | ||
609 | feedback & ok markus | ||
610 | - djm@cvs.openbsd.org 2008/06/10 23:06:19 | ||
611 | [auth-options.c match.c servconf.c addrmatch.c sshd.8] | ||
612 | support CIDR address matching in .ssh/authorized_keys from="..." stanzas | ||
613 | ok and extensive testing dtucker@ | ||
614 | - dtucker@cvs.openbsd.org 2008/06/10 23:21:34 | ||
615 | [bufaux.c] | ||
616 | Use '\0' for a nul byte rather than unadorned 0. ok djm@ | ||
617 | - dtucker@cvs.openbsd.org 2008/06/10 23:13:43 | ||
618 | [Makefile regress/key-options.sh] | ||
619 | Add regress test for key options. ok djm@ | ||
620 | - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6 | ||
621 | since the new CIDR code in addmatch.c references it. | ||
622 | - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6 | ||
623 | specific tests on platforms that don't do IPv6. | ||
624 | - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well | ||
625 | as environment. | ||
626 | - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now. | ||
627 | |||
628 | 20080609 | ||
629 | - (dtucker) OpenBSD CVS Sync | ||
630 | - dtucker@cvs.openbsd.org 2008/06/08 17:04:41 | ||
631 | [sftp-server.c] | ||
632 | Add case for ENOSYS in errno_to_portable; ok deraadt | ||
633 | - dtucker@cvs.openbsd.org 2008/06/08 20:15:29 | ||
634 | [sftp.c sftp-client.c sftp-client.h] | ||
635 | Have the sftp client store the statvfs replies in wire format, | ||
636 | which prevents problems when the server's native sizes exceed the | ||
637 | client's. | ||
638 | Also extends the sizes of the remaining 32bit wire format to 64bit, | ||
639 | they're specified as unsigned long in the standard. | ||
640 | - dtucker@cvs.openbsd.org 2008/06/09 13:02:39 | ||
641 | [sftp-server.c] | ||
642 | Extend 32bit -> 64bit values for statvfs extension missed in previous | ||
643 | commit. | ||
644 | - dtucker@cvs.openbsd.org 2008/06/09 13:38:46 | ||
645 | [PROTOCOL] | ||
646 | Use a $OpenBSD tag so our scripts will sync changes. | ||
647 | |||
648 | 20080608 | ||
649 | - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c | ||
650 | openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h | ||
651 | openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and | ||
652 | fstatvfs and remove #defines around statvfs code. ok djm@ | ||
653 | - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a | ||
654 | macro to convert fsid to unsigned long for platforms where fsid is a | ||
655 | 2-member array. | ||
656 | |||
657 | 20080607 | ||
658 | - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H. | ||
659 | - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c] | ||
660 | Do not enable statvfs extensions on platforms that do not have statvfs. | ||
661 | - (dtucker) OpenBSD CVS Sync | ||
662 | - djm@cvs.openbsd.org 2008/05/19 06:14:02 | ||
663 | [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@ | ||
664 | - djm@cvs.openbsd.org 2008/05/19 15:45:07 | ||
665 | [sshtty.c ttymodes.c sshpty.h] | ||
666 | Fix sending tty modes when stdin is not a tty (bz#1199). Previously | ||
667 | we would send the modes corresponding to a zeroed struct termios, | ||
668 | whereas we should have been sending an empty list of modes. | ||
669 | Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@ | ||
670 | - djm@cvs.openbsd.org 2008/05/19 15:46:31 | ||
671 | [ssh-keygen.c] | ||
672 | support -l (print fingerprint) in combination with -F (find host) to | ||
673 | search for a host in ~/.ssh/known_hosts and display its fingerprint; | ||
674 | ok markus@ | ||
675 | - djm@cvs.openbsd.org 2008/05/19 20:53:52 | ||
676 | [clientloop.c] | ||
677 | unbreak tree by committing this bit that I missed from: | ||
678 | Fix sending tty modes when stdin is not a tty (bz#1199). Previously | ||
679 | we would send the modes corresponding to a zeroed struct termios, | ||
680 | whereas we should have been sending an empty list of modes. | ||
681 | Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@ | ||
682 | |||
683 | 20080604 | ||
684 | - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias | ||
685 | in arc4random_uniform with upper_bound in (2^30,2*31). Note that | ||
686 | OpenSSH did not make requests with upper bounds in this range. | ||
687 | |||
688 | 20080519 | ||
689 | - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in] | ||
690 | [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h] | ||
691 | Fix compilation on Linux, including pulling in fmt_scaled(3) | ||
692 | implementation from OpenBSD's libutil. | ||
693 | |||
694 | 20080518 | ||
695 | - (djm) OpenBSD CVS Sync | ||
696 | - djm@cvs.openbsd.org 2008/04/04 05:14:38 | ||
697 | [sshd_config.5] | ||
698 | ChrootDirectory is supported in Match blocks (in fact, it is most useful | ||
699 | there). Spotted by Minstrel AT minstrel.org.uk | ||
700 | - djm@cvs.openbsd.org 2008/04/04 06:44:26 | ||
701 | [sshd_config.5] | ||
702 | oops, some unrelated stuff crept into that commit - backout. | ||
703 | spotted by jmc@ | ||
704 | - djm@cvs.openbsd.org 2008/04/05 02:46:02 | ||
705 | [sshd_config.5] | ||
706 | HostbasedAuthentication is supported under Match too | ||
707 | - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c] | ||
708 | [configure.ac] Implement arc4random_buf(), import implementation of | ||
709 | arc4random_uniform() from OpenBSD | ||
710 | - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes | ||
711 | - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h | ||
712 | - (djm) OpenBSD CVS Sync | ||
713 | - djm@cvs.openbsd.org 2008/04/13 00:22:17 | ||
714 | [dh.c sshd.c] | ||
715 | Use arc4random_buf() when requesting more than a single word of output | ||
716 | Use arc4random_uniform() when the desired random number upper bound | ||
717 | is not a power of two | ||
718 | ok deraadt@ millert@ | ||
719 | - djm@cvs.openbsd.org 2008/04/18 12:32:11 | ||
720 | [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h] | ||
721 | introduce sftp extension methods statvfs@openssh.com and | ||
722 | fstatvfs@openssh.com that implement statvfs(2)-like operations, | ||
723 | based on a patch from miklos AT szeredi.hu (bz#1399) | ||
724 | also add a "df" command to the sftp client that uses the | ||
725 | statvfs@openssh.com to produce a df(1)-like display of filesystem | ||
726 | space and inode utilisation | ||
727 | ok markus@ | ||
728 | - jmc@cvs.openbsd.org 2008/04/18 17:15:47 | ||
729 | [sftp.1] | ||
730 | macro fixage; | ||
731 | - djm@cvs.openbsd.org 2008/04/18 22:01:33 | ||
732 | [session.c] | ||
733 | remove unneccessary parentheses | ||
734 | - otto@cvs.openbsd.org 2008/04/29 11:20:31 | ||
735 | [monitor_mm.h] | ||
736 | garbage collect two unused fields in struct mm_master; ok markus@ | ||
737 | - djm@cvs.openbsd.org 2008/04/30 10:14:03 | ||
738 | [ssh-keyscan.1 ssh-keyscan.c] | ||
739 | default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by | ||
740 | larsnooden AT openoffice.org | ||
741 | - pyr@cvs.openbsd.org 2008/05/07 05:49:37 | ||
742 | [servconf.c servconf.h session.c sshd_config.5] | ||
743 | Enable the AllowAgentForwarding option in sshd_config (global and match | ||
744 | context), to specify if agents should be permitted on the server. | ||
745 | As the man page states: | ||
746 | ``Note that disabling Agent forwarding does not improve security | ||
747 | unless users are also denied shell access, as they can always install | ||
748 | their own forwarders.'' | ||
749 | ok djm@, ok and a mild frown markus@ | ||
750 | - pyr@cvs.openbsd.org 2008/05/07 06:43:35 | ||
751 | [sshd_config] | ||
752 | push the sshd_config bits in, spotted by ajacoutot@ | ||
753 | - jmc@cvs.openbsd.org 2008/05/07 08:00:14 | ||
754 | [sshd_config.5] | ||
755 | sort; | ||
756 | - markus@cvs.openbsd.org 2008/05/08 06:59:01 | ||
757 | [bufaux.c buffer.h channels.c packet.c packet.h] | ||
758 | avoid extra malloc/copy/free when receiving data over the net; | ||
759 | ~10% speedup for localhost-scp; ok djm@ | ||
760 | - djm@cvs.openbsd.org 2008/05/08 12:02:23 | ||
761 | [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c] | ||
762 | [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c] | ||
763 | [ssh.c sshd.c] | ||
764 | Implement a channel success/failure status confirmation callback | ||
765 | mechanism. Each channel maintains a queue of callbacks, which will | ||
766 | be drained in order (RFC4253 guarantees confirm messages are not | ||
767 | reordered within an channel). | ||
768 | Also includes a abandonment callback to clean up if a channel is | ||
769 | closed without sending confirmation messages. This probably | ||
770 | shouldn't happen in compliant implementations, but it could be | ||
771 | abused to leak memory. | ||
772 | ok markus@ (as part of a larger diff) | ||
773 | - djm@cvs.openbsd.org 2008/05/08 12:21:16 | ||
774 | [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c] | ||
775 | [sshd_config sshd_config.5] | ||
776 | Make the maximum number of sessions run-time controllable via | ||
777 | a sshd_config MaxSessions knob. This is useful for disabling | ||
778 | login/shell/subsystem access while leaving port-forwarding working | ||
779 | (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or | ||
780 | simply increasing the number of allows multiplexed sessions. | ||
781 | Because some bozos are sure to configure MaxSessions in excess of the | ||
782 | number of available file descriptors in sshd (which, at peak, might be | ||
783 | as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds | ||
784 | on error paths, and make it fail gracefully on out-of-fd conditions - | ||
785 | sending channel errors instead of than exiting with fatal(). | ||
786 | bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com | ||
787 | ok markus@ | ||
788 | - djm@cvs.openbsd.org 2008/05/08 13:06:11 | ||
789 | [clientloop.c clientloop.h ssh.c] | ||
790 | Use new channel status confirmation callback system to properly deal | ||
791 | with "important" channel requests that fail, in particular command exec, | ||
792 | shell and subsystem requests. Previously we would optimistically assume | ||
793 | that the requests would always succeed, which could cause hangs if they | ||
794 | did not (e.g. when the server runs out of fds) or were unimplemented by | ||
795 | the server (bz #1384) | ||
796 | Also, properly report failing multiplex channel requests via the mux | ||
797 | client stderr (subject to LogLevel in the mux master) - better than | ||
798 | silently failing. | ||
799 | most bits ok markus@ (as part of a larger diff) | ||
800 | - djm@cvs.openbsd.org 2008/05/09 04:55:56 | ||
801 | [channels.c channels.h clientloop.c serverloop.c] | ||
802 | Try additional addresses when connecting to a port forward destination | ||
803 | whose DNS name resolves to more than one address. The previous behaviour | ||
804 | was to try the first address and give up. | ||
805 | Reported by stig AT venaas.com in bz#343 | ||
806 | great feedback and ok markus@ | ||
807 | - djm@cvs.openbsd.org 2008/05/09 14:18:44 | ||
808 | [clientloop.c clientloop.h ssh.c mux.c] | ||
809 | tidy up session multiplexing code, moving it into its own file and | ||
810 | making the function names more consistent - making ssh.c and | ||
811 | clientloop.c a fair bit more readable. | ||
812 | ok markus@ | ||
813 | - djm@cvs.openbsd.org 2008/05/09 14:26:08 | ||
814 | [ssh.c] | ||
815 | dingo stole my diff hunk | ||
816 | - markus@cvs.openbsd.org 2008/05/09 16:16:06 | ||
817 | [session.c] | ||
818 | re-add the USE_PIPES code and enable it. | ||
819 | without pipes shutdown-read from the sshd does not trigger | ||
820 | a SIGPIPE when the forked program does a write. | ||
821 | ok djm@ | ||
822 | (Id sync only, USE_PIPES never left portable OpenSSH) | ||
823 | - markus@cvs.openbsd.org 2008/05/09 16:17:51 | ||
824 | [channels.c] | ||
825 | error-fd race: don't enable the error fd in the select bitmask | ||
826 | for channels with both in- and output closed, since the channel | ||
827 | will go away before we call select(); | ||
828 | report, lots of debugging help and ok djm@ | ||
829 | - markus@cvs.openbsd.org 2008/05/09 16:21:13 | ||
830 | [channels.h clientloop.c nchan.c serverloop.c] | ||
831 | unbreak | ||
832 | ssh -2 localhost od /bin/ls | true | ||
833 | ignoring SIGPIPE by adding a new channel message (EOW) that signals | ||
834 | the peer that we're not interested in any data it might send. | ||
835 | fixes bz #85; discussion, debugging and ok djm@ | ||
836 | - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20 | ||
837 | [umac.c] | ||
838 | Ensure nh_result lies on a 64-bit boundary (fixes warnings observed | ||
839 | on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@ | ||
840 | - djm@cvs.openbsd.org 2008/05/15 23:52:24 | ||
841 | [nchan2.ms] | ||
842 | document eow message in ssh protocol 2 channel state machine; | ||
843 | feedback and ok markus@ | ||
844 | - djm@cvs.openbsd.org 2008/05/18 21:29:05 | ||
845 | [sftp-server.c] | ||
846 | comment extension announcement | ||
847 | - djm@cvs.openbsd.org 2008/05/16 08:30:42 | ||
848 | [PROTOCOL] | ||
849 | document our protocol extensions and deviations; ok markus@ | ||
850 | - djm@cvs.openbsd.org 2008/05/17 01:31:56 | ||
851 | [PROTOCOL] | ||
852 | grammar and correctness fixes from stevesk@ | ||
853 | |||
854 | 20080403 | ||
855 | - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile- | ||
856 | time warnings on LynxOS. Patch from ops AT iki.fi | ||
857 | - (djm) Force string arguments to replacement setproctitle() though | ||
858 | strnvis first. Ok dtucker@ | ||
859 | |||
860 | 20080403 | ||
861 | - (djm) OpenBSD CVS sync: | ||
862 | - markus@cvs.openbsd.org 2008/04/02 15:36:51 | ||
863 | [channels.c] | ||
864 | avoid possible hijacking of x11-forwarded connections (back out 1.183) | ||
865 | CVE-2008-1483; ok djm@ | ||
866 | - jmc@cvs.openbsd.org 2008/03/27 22:37:57 | ||
867 | [sshd.8] | ||
868 | remove trailing whitespace; | ||
869 | - djm@cvs.openbsd.org 2008/04/03 09:50:14 | ||
870 | [version.h] | ||
871 | openssh-5.0 | ||
872 | - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] | ||
873 | [contrib/suse/openssh.spec] Crank version numbers in RPM spec files | ||
874 | - (djm) [README] Update link to release notes | ||
875 | - (djm) Release 5.0p1 | ||
876 | |||
877 | 20080315 | ||
878 | - (djm) [regress/test-exec.sh] Quote putty-related variables in case they are | ||
879 | empty; report and patch from Peter Stuge | ||
880 | - (djm) [regress/test-exec.sh] Silence noise from detection of putty | ||
881 | commands; report from Peter Stuge | ||
882 | - (djm) [session.c] Relocate incorrectly-placed closefrom() that was causing | ||
883 | crashes when used with ChrootDirectory | ||
884 | |||
885 | |||
886 | 20080327 | ||
887 | - (dtucker) Cache selinux status earlier so we know if it's enabled after a | ||
888 | chroot. Allows ChrootDirectory to work with selinux support compiled in | ||
889 | but not enabled. Using it with selinux enabled will require some selinux | ||
890 | support inside the chroot. "looks sane" djm@ | ||
891 | - (djm) Fix RCS ident in sftp-server-main.c | ||
892 | - (djm) OpenBSD CVS sync: | ||
893 | - jmc@cvs.openbsd.org 2008/02/11 07:58:28 | ||
894 | [ssh.1 sshd.8 sshd_config.5] | ||
895 | bump Mdocdate for pages committed in "febuary", necessary because | ||
896 | of a typo in rcs.c; | ||
897 | - deraadt@cvs.openbsd.org 2008/03/13 01:49:53 | ||
898 | [monitor_fdpass.c] | ||
899 | Correct CMSG_SPACE and CMSG_LEN usage everywhere in the tree. Due to | ||
900 | an extensive discussion with otto, kettenis, millert, and hshoexer | ||
901 | - deraadt@cvs.openbsd.org 2008/03/15 16:19:02 | ||
902 | [monitor_fdpass.c] | ||
903 | Repair the simple cases for msg_controllen where it should just be | ||
904 | CMSG_SIZE(sizeof(int)), not sizeof(buffer) which may be larger because | ||
905 | of alignment; ok kettenis hshoexer | ||
906 | - djm@cvs.openbsd.org 2008/03/23 12:54:01 | ||
907 | [sftp-client.c] | ||
908 | prefer POSIX-style file renaming over filexfer rename behaviour if the | ||
909 | server supports the posix-rename@openssh.com extension. | ||
910 | Note that the old (filexfer) behaviour would refuse to clobber an | ||
911 | existing file. Users who depended on this should adjust their sftp(1) | ||
912 | usage. | ||
913 | ok deraadt@ markus@ | ||
914 | - deraadt@cvs.openbsd.org 2008/03/24 16:11:07 | ||
915 | [monitor_fdpass.c] | ||
916 | msg_controllen has to be CMSG_SPACE so that the kernel can account for | ||
917 | each cmsg_len (ie. msg_controllen = sum of CMSG_ALIGN(cmsg_len). This | ||
918 | works now that kernel fd passing has been fixed to accept a bit of | ||
919 | sloppiness because of this ABI repair. | ||
920 | lots of discussion with kettenis | ||
921 | - djm@cvs.openbsd.org 2008/03/25 11:58:02 | ||
922 | [session.c sshd_config.5] | ||
923 | ignore ~/.ssh/rc if a sshd_config ForceCommand is specified; | ||
924 | from dtucker@ ok deraadt@ djm@ | ||
925 | - djm@cvs.openbsd.org 2008/03/25 23:01:41 | ||
926 | [session.c] | ||
927 | last patch had backwards test; spotted by termim AT gmail.com | ||
928 | - djm@cvs.openbsd.org 2008/03/26 21:28:14 | ||
929 | [auth-options.c auth-options.h session.c sshd.8] | ||
930 | add no-user-rc authorized_keys option to disable execution of ~/.ssh/rc | ||
931 | - djm@cvs.openbsd.org 2008/03/27 00:16:49 | ||
932 | [version.h] | ||
933 | openssh-4.9 | ||
934 | - djm@cvs.openbsd.org 2008/03/24 21:46:54 | ||
935 | [regress/sftp-badcmds.sh] | ||
936 | disable no-replace rename test now that we prefer a POSIX rename; spotted | ||
937 | by dkrause@ | ||
938 | - (djm) [configure.ac] fix alignment of --without-stackprotect description | ||
939 | - (djm) [configure.ac] --with-selinux too | ||
940 | - (djm) [regress/Makefile] cleanup PuTTY interop test droppings | ||
941 | - (djm) [README] Update link to release notes | ||
942 | - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] | ||
943 | [contrib/suse/openssh.spec] Crank version numbers in RPM spec files | ||
944 | - (djm) Release 4.9p1 | ||
945 | |||
946 | 20080315 | ||
947 | - (djm) [regress/test-exec.sh] Quote putty-related variables in case they are | ||
948 | empty; report and patch from Peter Stuge | ||
949 | - (djm) [regress/test-exec.sh] Silence noise from detection of putty | ||
950 | commands; report from Peter Stuge | ||
951 | - (djm) [session.c] Relocate incorrectly-placed closefrom() that was causing | ||
952 | crashes when used with ChrootDirectory | ||
953 | |||
954 | 20080314 | ||
955 | - (tim) [regress/sftp-cmds.sh] s/cd/lcd/ in lls test. Reported by | ||
956 | vinschen at redhat.com. Add () to put echo commands in subshell for lls test | ||
957 | I mistakenly left out of last commit. | ||
958 | - (tim) [regress/localcommand.sh] Shell portability fix. Reported by imorgan at | ||
959 | nas.nasa.gov | ||
960 | |||
961 | 20080313 | ||
962 | - (djm) [Makefile.in regress/Makefile] Fix interop-tests target (note to | ||
963 | self: make changes to Makefile.in next time, not the generated Makefile). | ||
964 | - (djm) [Makefile.in regress/test-exec.sh] Find installed plink(1) and | ||
965 | puttygen(1) by $PATH | ||
966 | - (tim) [scp.c] Use poll.h if available, fall back to sys/poll.h if not. Patch | ||
967 | by vinschen at redhat.com. | ||
968 | - (tim) [regress/sftp-cmds.sh regress/ssh2putty.sh] Shell portability fixes | ||
969 | from vinschen at redhat.com and imorgan at nas.nasa.gov | ||
970 | |||
971 | 20080312 | ||
972 | - (djm) OpenBSD CVS Sync | ||
973 | - dtucker@cvs.openbsd.org 2007/10/29 06:57:13 | ||
974 | [regress/Makefile regress/localcommand.sh] | ||
975 | Add simple regress test for LocalCommand; ok djm@ | ||
976 | - jmc@cvs.openbsd.org 2007/11/25 15:35:09 | ||
977 | [regress/agent-getpeereid.sh regress/agent.sh] | ||
978 | more existant -> existent, from Martynas Venckus; | ||
979 | pfctl changes: ok henning | ||
980 | ssh changes: ok deraadt | ||
981 | - djm@cvs.openbsd.org 2007/12/12 05:04:03 | ||
982 | [regress/sftp-cmds.sh] | ||
983 | unbreak lls command and add a regress test that would have caught the | ||
984 | breakage; spotted by mouring@ | ||
985 | NB. sftp code change already committed. | ||
986 | - djm@cvs.openbsd.org 2007/12/21 04:13:53 | ||
987 | [regress/Makefile regress/test-exec.sh regress/putty-ciphers.sh] | ||
988 | [regress/putty-kex.sh regress/putty-transfer.sh regress/ssh2putty.sh] | ||
989 | basic (crypto, kex and transfer) interop regression tests against putty | ||
990 | To run these, install putty and run "make interop-tests" from the build | ||
991 | directory - the tests aren't run by default yet. | ||
992 | |||
993 | 20080311 | ||
994 | - (dtucker) [auth-pam.c monitor.c session.c sshd.c] Bug #926: Move | ||
995 | pam_open_session and pam_close_session into the privsep monitor, which | ||
996 | will ensure that pam_session_close is called as root. Patch from Tomas | ||
997 | Mraz. | ||
998 | |||
999 | 20080309 | ||
1000 | - (dtucker) [configure.ac] It turns out gcc's -fstack-protector-all doesn't | ||
1001 | always work for all platforms and versions, so test what we can and | ||
1002 | add a configure flag to turn it of if needed. ok djm@ | ||
1003 | - (dtucker) [openbsd-compat/port-aix.{c,h}] Remove AIX specific initgroups | ||
1004 | implementation. It's not needed to fix bug #1081 and breaks the build | ||
1005 | on some AIX configurations. | ||
1006 | - (dtucker) [openbsd-compat/regress/strtonumtest.c] Bug #1347: Use platform's | ||
1007 | equivalent of LLONG_MAX for the compat regression tests, which makes them | ||
1008 | run on AIX and HP-UX. Patch from David Leonard. | ||
1009 | - (dtucker) [configure.ac] Run stack-protector tests with -Werror to catch | ||
1010 | platforms where gcc understands the option but it's not supported (and | ||
1011 | thus generates a warning). | ||
1012 | |||
1013 | 20080307 | ||
1014 | - (djm) OpenBSD CVS Sync | ||
1015 | - jmc@cvs.openbsd.org 2008/02/11 07:58:28 | ||
1016 | [ssh.1 sshd.8 sshd_config.5] | ||
1017 | bump Mdocdate for pages committed in "febuary", necessary because | ||
1018 | of a typo in rcs.c; | ||
1019 | - djm@cvs.openbsd.org 2008/02/13 22:38:17 | ||
1020 | [servconf.h session.c sshd.c] | ||
1021 | rekey arc4random and OpenSSL RNG in postauth child | ||
1022 | closefrom fds > 2 before shell/command execution | ||
1023 | ok markus@ | ||
1024 | - mbalmer@cvs.openbsd.org 2008/02/14 13:10:31 | ||
1025 | [sshd.c] | ||
1026 | When started in configuration test mode (-t) do not check that sshd is | ||
1027 | being started with an absolute path. | ||
1028 | ok djm | ||
1029 | - markus@cvs.openbsd.org 2008/02/20 15:25:26 | ||
1030 | [session.c] | ||
1031 | correct boolean encoding for coredump; der Mouse via dugsong | ||
1032 | - djm@cvs.openbsd.org 2008/02/22 05:58:56 | ||
1033 | [session.c] | ||
1034 | closefrom() call was too early, delay it until just before we execute | ||
1035 | the user's rc files (if any). | ||
1036 | - dtucker@cvs.openbsd.org 2008/02/22 20:44:02 | ||
1037 | [clientloop.c packet.c packet.h serverloop.c] | ||
1038 | Allow all SSH2 packet types, including UNIMPLEMENTED to reset the | ||
1039 | keepalive timer (bz #1307). ok markus@ | ||
1040 | - djm@cvs.openbsd.org 2008/02/27 20:21:15 | ||
1041 | [sftp-server.c] | ||
1042 | add an extension method "posix-rename@openssh.com" to perform POSIX atomic | ||
1043 | rename() operations. based on patch from miklos AT szeredi.hu in bz#1400; | ||
1044 | ok dtucker@ markus@ | ||
1045 | - deraadt@cvs.openbsd.org 2008/03/02 18:19:35 | ||
1046 | [monitor_fdpass.c] | ||
1047 | use a union to ensure alignment of the cmsg (pay attention: various other | ||
1048 | parts of the tree need this treatment too); ok djm | ||
1049 | - deraadt@cvs.openbsd.org 2008/03/04 21:15:42 | ||
1050 | [version.h] | ||
1051 | crank version; from djm | ||
1052 | - (tim) [regress/sftp-glob.sh] Shell portability fix. | ||
1053 | |||
1054 | 20080302 | ||
1055 | - (dtucker) [configure.ac] FreeBSD's glob() doesn't behave the way we expect | ||
1056 | either, so use our own. | ||
1057 | |||
1058 | 20080229 | ||
1059 | - (dtucker) [openbsd-compat/bsd-poll.c] We don't check for select(2) in | ||
1060 | configure (and there's not much point, as openssh won't work without it) | ||
1061 | so HAVE_SELECT is not defined and the poll(2) compat code doesn't get | ||
1062 | built in. Remove HAVE_SELECT so we can build on platforms without poll. | ||
1063 | - (dtucker) [scp.c] Include sys/poll.h inside HAVE_SYS_POLL_H. | ||
1064 | - (djm) [contrib/gnome-ssh-askpass2.h] Keep askpass windown on top. From | ||
1065 | Debian patch via bernd AT openbsd.org | ||
1066 | |||
1067 | 20080228 | ||
1068 | - (dtucker) [configure.ac] Add -fstack-protector to LDFLAGS too, fixes | ||
1069 | linking problems on AIX with gcc 4.1.x. | ||
1070 | - (dtucker) [includes.h ssh-add.c ssh-agent.c ssh-keygen.c ssh.c sshd.c | ||
1071 | openbsd-compat/openssl-compat.{c,h}] Bug #1437 Move the OpenSSL compat | ||
1072 | header to after OpenSSL headers, since some versions of OpenSSL have | ||
1073 | SSLeay_add_all_algorithms as a macro already. | ||
1074 | - (dtucker) [key.c defines.h openbsd-compat/openssl-compat.h] Move old OpenSSL | ||
1075 | compat glue into openssl-compat.h. | ||
1076 | - (dtucker) [configure.ac openbsd-compat/port-aix.{c,h}] Bug #1081: Implement | ||
1077 | getgrouplist via getgrset on AIX, rather than iterating over getgrent. | ||
1078 | This allows, eg, Match and AllowGroups directives to work with NIS and | ||
1079 | LDAP groups. | ||
1080 | - (dtucker) [sshd.c] Bug #1042: make log messages for tcpwrappers use the | ||
1081 | same SyslogFacility as the rest of sshd. Patch from William Knox, | ||
1082 | ok djm@. | ||
1083 | |||
1084 | 20080225 | ||
1085 | - (dtucker) [openbsd-compat/fake-rfc2553.h] rename ssh_gai_strerror hack | ||
1086 | since it now conflicts with the helper function in misc.c. From | ||
1087 | vinschen AT redhat.com. | ||
1088 | - (dtucker) [configure.ac audit-bsm.c] Bug #1420: Add a local implementation | ||
1089 | of aug_get_machine for systems that don't have their own (eg OS X, FreeBSD). | ||
1090 | Help and testing from csjp at FreeBSD org, vgiffin at apple com. ok djm@ | ||
1091 | - (dtucker) [includes.h openbsd-compat/openssl-compat.c] Bug #1437: reshuffle | ||
1092 | headers so ./configure --with-ssl-engine actually works. Patch from | ||
1093 | Ian Lister. | ||
1094 | |||
1095 | 20080224 | ||
1096 | - (tim) [contrib/cygwin/ssh-host-config] | ||
1097 | Grammar changes on SYSCONFDIR LOCALSTATEDIR messages. | ||
1098 | Check more thoroughly that it's possible to create the /var/empty directory. | ||
1099 | Patch by vinschen AT redhat.com | ||
1100 | |||
1101 | 20080210 | ||
1102 | - OpenBSD CVS Sync | ||
1103 | - chl@cvs.openbsd.org 2008/01/11 07:22:28 | ||
1104 | [sftp-client.c sftp-client.h] | ||
1105 | disable unused functions | ||
1106 | initially from tobias@, but disabled them by placing them in | ||
1107 | "#ifdef notyet" which was asked by djm@ | ||
1108 | ok djm@ tobias@ | ||
1109 | - djm@cvs.openbsd.org 2008/01/19 19:13:28 | ||
1110 | [ssh.1] | ||
1111 | satisfy the pedants: -q does not suppress all diagnostic messages (e.g. | ||
1112 | some commandline parsing warnings go unconditionally to stdout). | ||
1113 | - djm@cvs.openbsd.org 2008/01/19 20:48:53 | ||
1114 | [clientloop.c] | ||
1115 | fd leak on session multiplexing error path. Report and patch from | ||
1116 | gregory_shively AT fanniemae.com | ||
1117 | - djm@cvs.openbsd.org 2008/01/19 20:51:26 | ||
1118 | [ssh.c] | ||
1119 | ignore SIGPIPE in multiplex client mode - we can receive this if the | ||
1120 | server runs out of fds on us midway. Report and patch from | ||
1121 | gregory_shively AT fanniemae.com | ||
1122 | - djm@cvs.openbsd.org 2008/01/19 22:04:57 | ||
1123 | [sftp-client.c] | ||
1124 | fix remote handle leak in do_download() local file open error path; | ||
1125 | report and fix from sworley AT chkno.net | ||
1126 | - djm@cvs.openbsd.org 2008/01/19 22:22:58 | ||
1127 | [ssh-keygen.c] | ||
1128 | when hashing individual hosts (ssh-keygen -Hf hostname), make sure we | ||
1129 | hash just the specified hostname and not the entire hostspec from the | ||
1130 | keyfile. It may be of the form "hostname,ipaddr", which would lead to | ||
1131 | a hash that never matches. report and fix from jp AT devnull.cz | ||
1132 | - djm@cvs.openbsd.org 2008/01/19 22:37:19 | ||
1133 | [ssh-keygen.c] | ||
1134 | unbreak line numbering (broken in revision 1.164), fix error message | ||
1135 | - djm@cvs.openbsd.org 2008/01/19 23:02:40 | ||
1136 | [channels.c] | ||
1137 | When we added support for specified bind addresses for port forwards, we | ||
1138 | added a quirk SSH_OLD_FORWARD_ADDR. There is a bug in our handling of | ||
1139 | this for -L port forwards that causes the client to listen on both v4 | ||
1140 | and v6 addresses when connected to a server with this quirk, despite | ||
1141 | having set 0.0.0.0 as a bind_address. | ||
1142 | report and patch from Jan.Pechanec AT Sun.COM; ok dtucker@ | ||
1143 | - djm@cvs.openbsd.org 2008/01/19 23:09:49 | ||
1144 | [readconf.c readconf.h sshconnect2.c] | ||
1145 | promote rekeylimit to a int64 so it can hold the maximum useful limit | ||
1146 | of 2^32; report and patch from Jan.Pechanec AT Sun.COM, ok dtucker@ | ||
1147 | - djm@cvs.openbsd.org 2008/01/20 00:38:30 | ||
1148 | [sftp.c] | ||
1149 | When uploading, correctly handle the case of an unquoted filename with | ||
1150 | glob metacharacters that match a file exactly but not as a glob, e.g. a | ||
1151 | file called "[abcd]". report and test cases from duncan2nd AT gmx.de | ||
1152 | - djm@cvs.openbsd.org 2008/01/21 17:24:30 | ||
1153 | [sftp-server.c] | ||
1154 | Remove the fixed 100 handle limit in sftp-server and allocate as many | ||
1155 | as we have available file descriptors. Patch from miklos AT szeredi.hu; | ||
1156 | ok dtucker@ markus@ | ||
1157 | - djm@cvs.openbsd.org 2008/01/21 19:20:17 | ||
1158 | [sftp-client.c] | ||
1159 | when a remote write error occurs during an upload, ensure that ACKs for | ||
1160 | all issued requests are properly drained. patch from t8m AT centrum.cz | ||
1161 | - dtucker@cvs.openbsd.org 2008/01/23 01:56:54 | ||
1162 | [clientloop.c packet.c serverloop.c] | ||
1163 | Revert the change for bz #1307 as it causes connection aborts if an IGNORE | ||
1164 | packet arrives while we're waiting in packet_read_expect (and possibly | ||
1165 | elsewhere). | ||
1166 | - jmc@cvs.openbsd.org 2008/01/31 20:06:50 | ||
1167 | [scp.1] | ||
1168 | explain how to handle local file names containing colons; | ||
1169 | requested by Tamas TEVESZ | ||
1170 | ok dtucker | ||
1171 | - markus@cvs.openbsd.org 2008/02/04 21:53:00 | ||
1172 | [session.c sftp-server.c sftp.h] | ||
1173 | link sftp-server into sshd; feedback and ok djm@ | ||
1174 | - mcbride@cvs.openbsd.org 2008/02/09 12:15:43 | ||
1175 | [ssh.1 sshd.8] | ||
1176 | Document the correct permissions for the ~/.ssh/ directory. | ||
1177 | ok jmc | ||
1178 | - djm@cvs.openbsd.org 2008/02/10 09:55:37 | ||
1179 | [sshd_config.5] | ||
1180 | mantion that "internal-sftp" is useful with ForceCommand too | ||
1181 | - djm@cvs.openbsd.org 2008/02/10 10:54:29 | ||
1182 | [servconf.c session.c] | ||
1183 | delay ~ expansion for ChrootDirectory so it expands to the logged-in user's | ||
1184 | home, rather than the user who starts sshd (probably root) | ||
1185 | |||
1186 | 20080119 | ||
1187 | - (djm) Silence noice from expr in ssh-copy-id; patch from | ||
1188 | mikel AT mikelward.com | ||
1189 | - (djm) Only listen for IPv6 connections on AF_INET6 sockets; patch from | ||
1190 | tsr2600 AT gmail.com | ||
1191 | |||
1192 | 20080102 | ||
1193 | - (dtucker) [configure.ac] Fix message for -fstack-protector-all test. | ||
1194 | |||
1195 | 20080101 | ||
1196 | - (dtucker) OpenBSD CVS Sync | ||
1197 | - dtucker@cvs.openbsd.org 2007/12/31 10:41:31 | ||
1198 | [readconf.c servconf.c] | ||
1199 | Prevent strict-aliasing warnings on newer gcc versions. bz #1355, patch | ||
1200 | from Dmitry V. Levin, ok djm@ | ||
1201 | - dtucker@cvs.openbsd.org 2007/12/31 15:27:04 | ||
1202 | [sshd.c] | ||
1203 | When in inetd mode, have sshd generate a Protocol 1 ephemeral server | ||
1204 | key only for connections where the client chooses Protocol 1 as opposed | ||
1205 | to when it's enabled in the server's config. Speeds up Protocol 2 | ||
1206 | connections to inetd-mode servers that also allow Protocol 1. bz #440, | ||
1207 | based on a patch from bruno at wolff.to, ok markus@ | ||
1208 | - dtucker@cvs.openbsd.org 2008/01/01 08:47:04 | ||
1209 | [misc.c] | ||
1210 | spaces -> tabs from my previous commit | ||
1211 | - dtucker@cvs.openbsd.org 2008/01/01 09:06:39 | ||
1212 | [scp.c] | ||
1213 | If scp -p encounters a pre-epoch timestamp, use the epoch which is | ||
1214 | as close as we can get given that it's used unsigned. Add a little | ||
1215 | debugging while there. bz #828, ok djm@ | ||
1216 | - dtucker@cvs.openbsd.org 2008/01/01 09:27:33 | ||
1217 | [sshd_config.5 servconf.c] | ||
1218 | Allow PermitRootLogin in a Match block. Allows for, eg, permitting root | ||
1219 | only from the local network. ok markus@, man page bit ok jmc@ | ||
1220 | - dtucker@cvs.openbsd.org 2008/01/01 08:51:20 | ||
1221 | [moduli] | ||
1222 | Updated moduli file; ok djm@ | ||
1223 | |||
1224 | 20071231 | ||
1225 | - (dtucker) [configure.ac openbsd-compat/glob.{c,h}] Bug #1407: force use of | ||
1226 | builtin glob implementation on Mac OS X. Based on a patch from | ||
1227 | vgiffin at apple. | ||
1228 | |||
1229 | 20071229 | ||
1230 | - (dtucker) OpenBSD CVS Sync | ||
1231 | - djm@cvs.openbsd.org 2007/12/12 05:04:03 | ||
1232 | [sftp.c] | ||
1233 | unbreak lls command and add a regress test that would have caught the | ||
1234 | breakage; spotted by mouring@ | ||
1235 | - dtucker@cvs.openbsd.org 2007/12/27 14:22:08 | ||
1236 | [servconf.c canohost.c misc.c channels.c sshconnect.c misc.h ssh-keyscan.c | ||
1237 | sshd.c] | ||
1238 | Add a small helper function to consistently handle the EAI_SYSTEM error | ||
1239 | code of getaddrinfo. Prompted by vgiffin at apple com via bz #1417. | ||
1240 | ok markus@ stevesk@ | ||
1241 | - dtucker@cvs.openbsd.org 2007/12/28 15:32:24 | ||
1242 | [clientloop.c serverloop.c packet.c] | ||
1243 | Make SSH2_MSG_UNIMPLEMENTED and SSH2_MSG_IGNORE messages reset the | ||
1244 | ServerAlive and ClientAlive timers. Prevents dropping a connection | ||
1245 | when these are enabled but the peer does not support our keepalives. | ||
1246 | bz #1307, ok djm@. | ||
1247 | - dtucker@cvs.openbsd.org 2007/12/28 22:34:47 | ||
1248 | [clientloop.c] | ||
1249 | Use the correct packet maximum sizes for remote port and agent forwarding. | ||
1250 | Prevents the server from killing the connection if too much data is queued | ||
1251 | and an excessively large packet gets sent. bz #1360, ok djm@. | ||
1252 | |||
1253 | 20071202 | ||
1254 | - (dtucker) [configure.ac] Enable -fstack-protector-all on systems where | ||
1255 | gcc supports it. ok djm@ | ||
1256 | - (dtucker) [scp.c] Update $OpenBSD tag missing from rev 1.175 and remove | ||
1257 | leftover debug code. | ||
1258 | - (dtucker) OpenBSD CVS Sync | ||
1259 | - dtucker@cvs.openbsd.org 2007/10/29 00:52:45 | ||
1260 | [auth2-gss.c] | ||
1261 | Allow build without -DGSSAPI; ok deraadt@ | ||
1262 | (Id sync only, Portable already has the ifdefs) | ||
1263 | - dtucker@cvs.openbsd.org 2007/10/29 01:55:04 | ||
1264 | [ssh.c] | ||
1265 | Plug tiny mem leaks in ControlPath and ProxyCommand option processing; | ||
1266 | ok djm@ | ||
1267 | - dtucker@cvs.openbsd.org 2007/10/29 04:08:08 | ||
1268 | [monitor_wrap.c monitor.c] | ||
1269 | Send config block back to slave for invalid users too so options | ||
1270 | set by a Match block (eg Banner) behave the same for non-existent | ||
1271 | users. Found by and ok djm@ | ||
1272 | - dtucker@cvs.openbsd.org 2007/10/29 06:51:59 | ||
1273 | [ssh_config.5] | ||
1274 | ProxyCommand and LocalCommand use the user's shell, not /bin/sh; ok djm@ | ||
1275 | - dtucker@cvs.openbsd.org 2007/10/29 06:54:50 | ||
1276 | [ssh.c] | ||
1277 | Make LocalCommand work for Protocol 1 too; ok djm@ | ||
1278 | - jmc@cvs.openbsd.org 2007/10/29 07:48:19 | ||
1279 | [ssh_config.5] | ||
1280 | clean up after previous macro removal; | ||
1281 | - djm@cvs.openbsd.org 2007/11/03 00:36:14 | ||
1282 | [clientloop.c] | ||
1283 | fix memory leak in process_cmdline(), patch from Jan.Pechanec AT Sun.COM; | ||
1284 | ok dtucker@ | ||
1285 | - deraadt@cvs.openbsd.org 2007/11/03 01:24:06 | ||
1286 | [ssh.c] | ||
1287 | bz #1377: getpwuid results were being clobbered by another getpw* call | ||
1288 | inside tilde_expand_filename(); save the data we need carefully | ||
1289 | ok djm | ||
1290 | - dtucker@cvs.openbsd.org 2007/11/03 02:00:32 | ||
1291 | [ssh.c] | ||
1292 | Use xstrdup/xfree when saving pwname and pwdir; ok deraadt@ | ||
1293 | - deraadt@cvs.openbsd.org 2007/11/03 02:03:49 | ||
1294 | [ssh.c] | ||
1295 | avoid errno trashing in signal handler; ok dtucker | ||
1296 | |||
1297 | 20071030 | ||
1298 | - (djm) OpenBSD CVS Sync | ||
1299 | - djm@cvs.openbsd.org 2007/10/29 23:49:41 | ||
1300 | [openbsd-compat/sys-tree.h] | ||
1301 | remove extra backslash at the end of RB_PROTOTYPE, report from | ||
1302 | Jan.Pechanec AT Sun.COM; ok deraadt@ | ||
1303 | |||
1304 | 20071026 | ||
1305 | - (djm) OpenBSD CVS Sync | ||
1306 | - stevesk@cvs.openbsd.org 2007/09/11 23:49:09 | ||
1307 | [sshpty.c] | ||
1308 | remove #if defined block not needed; ok markus@ dtucker@ | ||
1309 | (NB. RCD ID sync only for portable) | ||
1310 | - djm@cvs.openbsd.org 2007/09/21 03:05:23 | ||
1311 | [ssh_config.5] | ||
1312 | document KbdInteractiveAuthentication in ssh_config.5; | ||
1313 | patch from dkg AT fifthhorseman.net | ||
1314 | - djm@cvs.openbsd.org 2007/09/21 08:15:29 | ||
1315 | [auth-bsdauth.c auth-passwd.c auth.c auth.h auth1.c auth2-chall.c] | ||
1316 | [monitor.c monitor_wrap.c] | ||
1317 | unifdef -DBSD_AUTH | ||
1318 | unifdef -USKEY | ||
1319 | These options have been in use for some years; | ||
1320 | ok markus@ "no objection" millert@ | ||
1321 | (NB. RCD ID sync only for portable) | ||
1322 | - canacar@cvs.openbsd.org 2007/09/25 23:48:57 | ||
1323 | [ssh-agent.c] | ||
1324 | When adding a key that already exists, update the properties | ||
1325 | (time, confirm, comment) instead of discarding them. ok djm@ markus@ | ||
1326 | - ray@cvs.openbsd.org 2007/09/27 00:15:57 | ||
1327 | [dh.c] | ||
1328 | Don't return -1 on error in dh_pub_is_valid(), since it evaluates | ||
1329 | to true. | ||
1330 | Also fix a typo. | ||
1331 | Initial diff from Matthew Dempsky, input from djm. | ||
1332 | OK djm, markus. | ||
1333 | - dtucker@cvs.openbsd.org 2007/09/29 00:25:51 | ||
1334 | [auth2.c] | ||
1335 | Remove unused prototype. ok djm@ | ||
1336 | - chl@cvs.openbsd.org 2007/10/02 17:49:58 | ||
1337 | [ssh-keygen.c] | ||
1338 | handles zero-sized strings that fgets can return | ||
1339 | properly removes trailing newline | ||
1340 | removes an unused variable | ||
1341 | correctly counts line number | ||
1342 | "looks ok" ray@ markus@ | ||
1343 | - markus@cvs.openbsd.org 2007/10/22 19:10:24 | ||
1344 | [readconf.c] | ||
1345 | make sure that both the local and remote port are correct when | ||
1346 | parsing -L; Jan Pechanec (bz #1378) | ||
1347 | - djm@cvs.openbsd.org 2007/10/24 03:30:02 | ||
1348 | [sftp.c] | ||
1349 | rework argument splitting and parsing to cope correctly with common | ||
1350 | shell escapes and make handling of escaped characters consistent | ||
1351 | with sh(1) and between sftp commands (especially between ones that | ||
1352 | glob their arguments and ones that don't). | ||
1353 | parse command flags using getopt(3) rather than hand-rolled parsers. | ||
1354 | ok dtucker@ | ||
1355 | - djm@cvs.openbsd.org 2007/10/24 03:44:02 | ||
1356 | [scp.c] | ||
1357 | factor out network read/write into an atomicio()-like function, and | ||
1358 | use it to handle short reads, apply bandwidth limits and update | ||
1359 | counters. make network IO non-blocking, so a small trickle of | ||
1360 | reads/writes has a chance of updating the progress meter; bz #799 | ||
1361 | ok dtucker@ | ||
1362 | - djm@cvs.openbsd.org 2006/08/29 09:44:00 | ||
1363 | [regress/sftp-cmds.sh] | ||
1364 | clean up our mess | ||
1365 | - markus@cvs.openbsd.org 2006/11/06 09:27:43 | ||
1366 | [regress/cfgmatch.sh] | ||
1367 | fix quoting for non-(c)sh login shells. | ||
1368 | - dtucker@cvs.openbsd.org 2006/12/13 08:36:36 | ||
1369 | [regress/cfgmatch.sh] | ||
1370 | Additional test for multiple PermitOpen entries. ok djm@ | ||
1371 | - pvalchev@cvs.openbsd.org 2007/06/07 19:41:46 | ||
1372 | [regress/cipher-speed.sh regress/try-ciphers.sh] | ||
1373 | test umac-64@openssh.com | ||
1374 | ok djm@ | ||
1375 | - djm@cvs.openbsd.org 2007/10/24 03:32:35 | ||
1376 | [regress/sftp-cmds.sh regress/sftp-glob.sh regress/test-exec.sh] | ||
1377 | comprehensive tests for sftp escaping its interaction with globbing; | ||
1378 | ok dtucker@ | ||
1379 | - djm@cvs.openbsd.org 2007/10/26 05:30:01 | ||
1380 | [regress/sftp-glob.sh regress/test-exec.sh] | ||
1381 | remove "echo -E" crap that I added in last commit and use printf(1) for | ||
1382 | cases where we strictly require echo not to reprocess escape characters. | ||
1383 | - deraadt@cvs.openbsd.org 2005/11/28 17:50:12 | ||
1384 | [openbsd-compat/glob.c] | ||
1385 | unused arg in internal static API | ||
1386 | - jakob@cvs.openbsd.org 2007/10/11 18:36:41 | ||
1387 | [openbsd-compat/getrrsetbyname.c openbsd-compat/getrrsetbyname.h] | ||
1388 | use RRSIG instead of SIG for DNSSEC. ok djm@ | ||
1389 | - otto@cvs.openbsd.org 2006/10/21 09:55:03 | ||
1390 | [openbsd-compat/base64.c] | ||
1391 | remove calls to abort(3) that can't happen anyway; from | ||
1392 | <bret dot lambert at gmail.com>; ok millert@ deraadt@ | ||
1393 | - frantzen@cvs.openbsd.org 2004/04/24 18:11:46 | ||
1394 | [openbsd-compat/sys-tree.h] | ||
1395 | sync to Niels Provos' version. avoid unused variable warning in | ||
1396 | RB_NEXT() | ||
1397 | - tdeval@cvs.openbsd.org 2004/11/24 18:10:42 | ||
1398 | [openbsd-compat/sys-tree.h] | ||
1399 | typo | ||
1400 | - grange@cvs.openbsd.org 2004/05/04 16:59:32 | ||
1401 | [openbsd-compat/sys-queue.h] | ||
1402 | Remove useless ``elm'' argument from the SIMPLEQ_REMOVE_HEAD macro. | ||
1403 | This matches our SLIST behaviour and NetBSD's SIMPLEQ as well. | ||
1404 | ok millert krw deraadt | ||
1405 | - deraadt@cvs.openbsd.org 2005/02/25 13:29:30 | ||
1406 | [openbsd-compat/sys-queue.h] | ||
1407 | minor white spacing | ||
1408 | - otto@cvs.openbsd.org 2005/10/17 20:19:42 | ||
1409 | [openbsd-compat/sys-queue.h] | ||
1410 | Performing certain operations on queue.h data structurs produced | ||
1411 | funny results. An example is calling LIST_REMOVE on the same | ||
1412 | element twice. This will not fail, but result in a data structure | ||
1413 | referencing who knows what. Prevent these accidents by NULLing some | ||
1414 | fields on remove and replace. This way, either a panic or segfault | ||
1415 | will be produced on the faulty operation. | ||
1416 | - otto@cvs.openbsd.org 2005/10/24 20:25:14 | ||
1417 | [openbsd-compat/sys-queue.h] | ||
1418 | Partly backout. NOLIST, used in LISTs is probably interfering. | ||
1419 | requested by deraadt@ | ||
1420 | - otto@cvs.openbsd.org 2005/10/25 06:37:47 | ||
1421 | [openbsd-compat/sys-queue.h] | ||
1422 | Some uvm problem is being exposed with the more strict macros. | ||
1423 | Revert until we've found out what's causing the panics. | ||
1424 | - otto@cvs.openbsd.org 2005/11/25 08:06:25 | ||
1425 | [openbsd-compat/sys-queue.h] | ||
1426 | Introduce debugging aid for queue macros. Disabled by default; but | ||
1427 | developers are encouraged to run with this enabled. | ||
1428 | ok krw@ fgsch@ deraadt@ | ||
1429 | - otto@cvs.openbsd.org 2007/04/30 18:42:34 | ||
1430 | [openbsd-compat/sys-queue.h] | ||
1431 | Enable QUEUE_MACRO_DEBUG on DIAGNOSTIC kernels. | ||
1432 | Input and okays from krw@, millert@, otto@, deraadt@, miod@. | ||
1433 | - millert@cvs.openbsd.org 2004/10/07 16:56:11 | ||
1434 | GLOB_NOESCAPE is POSIX so move it out of the #ifndef _POSIX_SOURCE | ||
1435 | block. | ||
1436 | (NB. mostly an RCS ID sync, as portable strips out the conditionals) | ||
1437 | - (djm) [regress/sftp-cmds.sh] | ||
1438 | Use more restrictive glob to pick up test files from /bin - some platforms | ||
1439 | ship broken symlinks there which could spoil the test. | ||
1440 | - (djm) [openbsd-compat/bindresvport.c] | ||
1441 | Sync RCS ID after irrelevant (for portable OpenSSH) header shuffling | ||
1442 | |||
1443 | 20070927 | ||
1444 | - (dtucker) [configure.ac atomicio.c] Fall back to including <sys/poll.h> if | ||
1445 | we don't have <poll.h> (eq QNX). From bacon at cs nyu edu. | ||
1446 | - (dtucker) [configure.ac defines.h] Shadow expiry does not work on QNX6 | ||
1447 | so disable it for that platform. From bacon at cs nyu edu. | ||
1448 | |||
1449 | 20070921 | ||
1450 | - (djm) [atomicio.c] Fix spin avoidance for platforms that define | ||
1451 | EWOULDBLOCK; patch from ben AT psc.edu | ||
1452 | |||
1453 | 20070917 | ||
1454 | - (djm) OpenBSD CVS Sync | ||
1455 | - djm@cvs.openbsd.org 2007/08/23 02:49:43 | ||
1456 | [auth-passwd.c auth.c session.c] | ||
1457 | unifdef HAVE_LOGIN_CAP; ok deraadt@ millert@ | ||
1458 | NB. RCS ID sync only for portable | ||
1459 | - djm@cvs.openbsd.org 2007/08/23 02:55:51 | ||
1460 | [auth-passwd.c auth.c session.c] | ||
1461 | missed include bits from last commit | ||
1462 | NB. RCS ID sync only for portable | ||
1463 | - djm@cvs.openbsd.org 2007/08/23 03:06:10 | ||
1464 | [auth.h] | ||
1465 | login_cap.h doesn't belong here | ||
1466 | NB. RCS ID sync only for portable | ||
1467 | - djm@cvs.openbsd.org 2007/08/23 03:22:16 | ||
1468 | [auth2-none.c sshd_config sshd_config.5] | ||
1469 | Support "Banner=none" to disable displaying of the pre-login banner; | ||
1470 | ok dtucker@ deraadt@ | ||
1471 | - djm@cvs.openbsd.org 2007/08/23 03:23:26 | ||
1472 | [sshconnect.c] | ||
1473 | Execute ProxyCommands with $SHELL rather than /bin/sh unconditionally | ||
1474 | - djm@cvs.openbsd.org 2007/09/04 03:21:03 | ||
1475 | [clientloop.c monitor.c monitor_fdpass.c monitor_fdpass.h] | ||
1476 | [monitor_wrap.c ssh.c] | ||
1477 | make file descriptor passing code return an error rather than call fatal() | ||
1478 | when it encounters problems, and use this to make session multiplexing | ||
1479 | masters survive slaves failing to pass all stdio FDs; ok markus@ | ||
1480 | - djm@cvs.openbsd.org 2007/09/04 11:15:56 | ||
1481 | [ssh.c sshconnect.c sshconnect.h] | ||
1482 | make ssh(1)'s ConnectTimeout option apply to both the TCP connection and | ||
1483 | SSH banner exchange (previously it just covered the TCP connection). | ||
1484 | This allows callers of ssh(1) to better detect and deal with stuck servers | ||
1485 | that accept a TCP connection but don't progress the protocol, and also | ||
1486 | makes ConnectTimeout useful for connections via a ProxyCommand; | ||
1487 | feedback and "looks ok" markus@ | ||
1488 | - sobrado@cvs.openbsd.org 2007/09/09 11:38:01 | ||
1489 | [ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.c] | ||
1490 | sort synopsis and options in ssh-agent(1); usage is lowercase | ||
1491 | ok jmc@ | ||
1492 | - stevesk@cvs.openbsd.org 2007/09/11 04:36:29 | ||
1493 | [sshpty.c] | ||
1494 | sort #include | ||
1495 | NB. RCS ID sync only | ||
1496 | - gilles@cvs.openbsd.org 2007/09/11 15:47:17 | ||
1497 | [session.c ssh-keygen.c sshlogin.c] | ||
1498 | use strcspn to properly overwrite '\n' in fgets returned buffer | ||
1499 | ok pyr@, ray@, millert@, moritz@, chl@ | ||
1500 | - stevesk@cvs.openbsd.org 2007/09/11 23:49:09 | ||
1501 | [sshpty.c] | ||
1502 | remove #if defined block not needed; ok markus@ dtucker@ | ||
1503 | NB. RCS ID sync only | ||
1504 | - stevesk@cvs.openbsd.org 2007/09/12 19:39:19 | ||
1505 | [umac.c] | ||
1506 | use xmalloc() and xfree(); ok markus@ pvalchev@ | ||
1507 | - djm@cvs.openbsd.org 2007/09/13 04:39:04 | ||
1508 | [sftp-server.c] | ||
1509 | fix incorrect test when setting syslog facility; from Jan Pechanec | ||
1510 | - djm@cvs.openbsd.org 2007/09/16 00:55:52 | ||
1511 | [sftp-client.c] | ||
1512 | use off_t instead of u_int64_t for file offsets, matching what the | ||
1513 | progressmeter code expects; bz #842 | ||
1514 | - (tim) [defines.h] Fix regression in long password support on OpenServer 6. | ||
1515 | Problem report and additional testing rac AT tenzing.org. | ||
1516 | |||
1517 | 20070914 | ||
1518 | - (dtucker) [openbsd-compat/bsd-asprintf.c] Plug mem leak in error path. | ||
1519 | Patch from Jan.Pechanec at sun com. | ||
1520 | |||
1521 | 20070910 | ||
1522 | - (dtucker) [openbsd-compat/regress/closefromtest.c] Bug #1358: Always | ||
1523 | return 0 on successful test. From David.Leonard at quest com. | ||
1524 | - (tim) [configure.ac] Autoconf didn't define HAVE_LIBIAF because we | ||
1525 | did a AC_CHECK_FUNCS within the AC_CHECK_LIB test. | ||
1526 | |||
1 | 20070817 | 1527 | 20070817 |
2 | - (dtucker) [sshd.8] Many Linux variants use a single "!" to denote locked | 1528 | - (dtucker) [sshd.8] Many Linux variants use a single "!" to denote locked |
3 | accounts and that's what the code looks for, so make man page and code | 1529 | accounts and that's what the code looks for, so make man page and code |
@@ -3184,4 +4710,4 @@ | |||
3184 | OpenServer 6 and add osr5bigcrypt support so when someone migrates | 4710 | OpenServer 6 and add osr5bigcrypt support so when someone migrates |
3185 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ | 4711 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ |
3186 | 4712 | ||
3187 | $Id: ChangeLog,v 1.4738.2.1 2007/09/04 06:49:09 djm Exp $ | 4713 | $Id: ChangeLog,v 1.5095 2008/07/21 08:22:25 djm Exp $ |