diff options
author | Colin Watson <cjwatson@debian.org> | 2008-07-22 19:45:18 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2008-07-22 19:45:18 +0000 |
commit | 137d76ba65883aa8143af1fcad83b57e7badef0c (patch) | |
tree | f426e804bb5248ceafedfab7bb78ae6e6752942c /ChangeLog | |
parent | dac7d049dad31f5f84d421d4eb628a7e13f977d7 (diff) | |
parent | ef94e5613d37bcbf880f21ee6094e4b1c7683a4c (diff) |
* New upstream release (closes: #474301). Important changes not previously
backported to 4.7p1:
- 4.9/4.9p1 (http://www.openssh.com/txt/release-4.9):
+ Added chroot(2) support for sshd(8), controlled by a new option
"ChrootDirectory" (closes: #139047, LP: #24777).
+ Linked sftp-server(8) into sshd(8). The internal sftp server is used
when the command "internal-sftp" is specified in a Subsystem or
ForceCommand declaration. When used with ChrootDirectory, the
internal sftp server requires no special configuration of files
inside the chroot environment.
+ Added a protocol extension method "posix-rename@openssh.com" for
sftp-server(8) to perform POSIX atomic rename() operations; sftp(1)
prefers this if available (closes: #308561).
+ Removed the fixed limit of 100 file handles in sftp-server(8).
+ ssh(8) will now skip generation of SSH protocol 1 ephemeral server
keys when in inetd mode and protocol 2 connections are negotiated.
This speeds up protocol 2 connections to inetd-mode servers that
also allow Protocol 1.
+ Accept the PermitRootLogin directive in a sshd_config(5) Match
block. Allows for, e.g. permitting root only from the local network.
+ Reworked sftp(1) argument splitting and escaping to be more
internally consistent (i.e. between sftp commands) and more
consistent with sh(1). Please note that this will change the
interpretation of some quoted strings, especially those with
embedded backslash escape sequences.
+ Support "Banner=none" in sshd_config(5) to disable sending of a
pre-login banner (e.g. in a Match block).
+ ssh(1) ProxyCommands are now executed with $SHELL rather than
/bin/sh.
+ ssh(1)'s ConnectTimeout option is now applied to both the TCP
connection and the SSH banner exchange (previously it just covered
the TCP connection). This allows callers of ssh(1) to better detect
and deal with stuck servers that accept a TCP connection but don't
progress the protocol, and also makes ConnectTimeout useful for
connections via a ProxyCommand.
+ scp(1) incorrectly reported "stalled" on slow copies (closes:
#140828).
+ scp(1) date underflow for timestamps before epoch.
+ ssh(1) used the obsolete SIG DNS RRtype for host keys in DNS,
instead of the current standard RRSIG.
+ Correctly drain ACKs when a sftp(1) upload write fails midway,
avoids a fatal() exit from what should be a recoverable condition.
+ Fixed ssh-keygen(1) selective host key hashing (i.e. "ssh-keygen -HF
hostname") to not include any IP address in the data to be hashed.
+ Make ssh(1) skip listening on the IPv6 wildcard address when a
binding address of 0.0.0.0 is used against an old SSH server that
does not support the RFC4254 syntax for wildcard bind addresses.
+ Enable IPV6_V6ONLY socket option on sshd(8) listen socket, as is
already done for X11/TCP forwarding sockets (closes: #439661).
+ Fix FD leak that could hang a ssh(1) connection multiplexing master.
+ Make ssh(1) -q option documentation consistent with reality.
+ Fixed sshd(8) PAM support not calling pam_session_close(), or
failing to call it with root privileges (closes: #372680).
+ Fix activation of OpenSSL engine support when requested in configure
(LP: #119295).
- 5.1/5.1p1 (http://www.openssh.com/txt/release-5.1):
+ Introduce experimental SSH Fingerprint ASCII Visualisation to ssh(1)
and ssh-keygen(1). Visual fingerprint display is controlled by a new
ssh_config(5) option "VisualHostKey". The intent is to render SSH
host keys in a visual form that is amenable to easy recall and
rejection of changed host keys.
+ sshd_config(5) now supports CIDR address/masklen matching in "Match
address" blocks, with a fallback to classic wildcard matching.
+ sshd(8) now supports CIDR matching in ~/.ssh/authorized_keys
from="..." restrictions, also with a fallback to classic wildcard
matching.
+ Added an extended test mode (-T) to sshd(8) to request that it write
its effective configuration to stdout and exit. Extended test mode
also supports the specification of connection parameters (username,
source address and hostname) to test the application of
sshd_config(5) Match rules.
+ ssh(1) now prints the number of bytes transferred and the overall
connection throughput for SSH protocol 2 sessions when in verbose
mode (previously these statistics were displayed for protocol 1
connections only).
+ sftp-server(8) now supports extension methods statvfs@openssh.com
and fstatvfs@openssh.com that implement statvfs(2)-like operations.
+ sftp(1) now has a "df" command to the sftp client that uses the
statvfs@openssh.com to produce a df(1)-like display of filesystem
space and inode utilisation (requires statvfs@openssh.com support on
the server).
+ Added a MaxSessions option to sshd_config(5) to allow control of the
number of multiplexed sessions supported over a single TCP
connection. This allows increasing the number of allowed sessions
above the previous default of 10, disabling connection multiplexing
(MaxSessions=1) or disallowing login/shell/subsystem sessions
entirely (MaxSessions=0).
+ Added a no-more-sessions@openssh.com global request extension that
is sent from ssh(1) to sshd(8) when the client knows that it will
never request another session (i.e. when session multiplexing is
disabled). This allows a server to disallow further session requests
and terminate the session in cases where the client has been
hijacked.
+ ssh-keygen(1) now supports the use of the -l option in combination
with -F to search for a host in ~/.ssh/known_hosts and display its
fingerprint.
+ ssh-keyscan(1) now defaults to "rsa" (protocol 2) keys, instead of
"rsa1".
+ Added an AllowAgentForwarding option to sshd_config(8) to control
whether authentication agent forwarding is permitted. Note that this
is a loose control, as a client may install their own unofficial
forwarder.
+ ssh(1) and sshd(8): avoid unnecessary malloc/copy/free when
receiving network data, resulting in a ~10% speedup.
+ ssh(1) and sshd(8) will now try additional addresses when connecting
to a port forward destination whose DNS name resolves to more than
one address. The previous behaviour was to try the only first
address and give up if that failed.
+ ssh(1) and sshd(8) now support signalling that channels are
half-closed for writing, through a channel protocol extension
notification "eow@openssh.com". This allows propagation of closed
file descriptors, so that commands such as "ssh -2 localhost od
/bin/ls | true" do not send unnecessary data over the wire.
+ sshd(8): increased the default size of ssh protocol 1 ephemeral keys
from 768 to 1024 bits.
+ When ssh(1) has been requested to fork after authentication ("ssh
-f") with ExitOnForwardFailure enabled, delay the fork until after
replies for any -R forwards have been seen. Allows for robust
detection of -R forward failure when using -f.
+ "Match group" blocks in sshd_config(5) now support negation of
groups. E.g. "Match group staff,!guests".
+ sftp(1) and sftp-server(8) now allow chmod-like operations to set
set[ug]id/sticky bits.
+ The MaxAuthTries option is now permitted in sshd_config(5) match
blocks.
+ Multiplexed ssh(1) sessions now support a subset of the ~ escapes
that are available to a primary connection.
+ ssh(1) connection multiplexing will now fall back to creating a new
connection in most error cases (closes: #352830).
+ Make ssh(1) deal more gracefully with channel requests that fail.
Previously it would optimistically assume that requests would always
succeed, which could cause hangs if they did not (e.g. when the
server runs out of file descriptors).
+ ssh(1) now reports multiplexing errors via the multiplex slave's
stderr where possible (subject to LogLevel in the mux master).
+ Prevent sshd(8) from erroneously applying public key restrictions
leaned from ~/.ssh/authorized_keys to other authentication methods
when public key authentication subsequently fails (LP: #161047).
+ Fixed an UMAC alignment problem that manifested on Itanium
platforms.
Diffstat (limited to 'ChangeLog')
-rw-r--r-- | ChangeLog | 1528 |
1 files changed, 1527 insertions, 1 deletions
@@ -1,3 +1,1529 @@ | |||
1 | 20080721 | ||
2 | - (djm) OpenBSD CVS Sync | ||
3 | - jmc@cvs.openbsd.org 2008/07/18 22:51:01 | ||
4 | [sftp-server.8] | ||
5 | no need for .Pp before or after .Sh; | ||
6 | - djm@cvs.openbsd.org 2008/07/21 08:19:07 | ||
7 | [version.h] | ||
8 | openssh-5.1 | ||
9 | - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec] | ||
10 | [contrib/suse/openssh.spec] Update version number in README and RPM specs | ||
11 | - (djm) Release OpenSSH-5.1 | ||
12 | |||
13 | 20080717 | ||
14 | - (djm) OpenBSD CVS Sync | ||
15 | - djm@cvs.openbsd.org 2008/07/17 08:48:00 | ||
16 | [sshconnect2.c] | ||
17 | strnvis preauth banner; pointed out by mpf@ ok markus@ | ||
18 | - djm@cvs.openbsd.org 2008/07/17 08:51:07 | ||
19 | [auth2-hostbased.c] | ||
20 | strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes | ||
21 | report and patch from res AT qoxp.net (bz#1200); ok markus@ | ||
22 | - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat | ||
23 | code, replace with equivalent cygwin library call. Patch from vinschen | ||
24 | at redhat.com, ok djm@. | ||
25 | - (djm) [sshconnect2.c] vis.h isn't available everywhere | ||
26 | |||
27 | 20080716 | ||
28 | - OpenBSD CVS Sync | ||
29 | - djm@cvs.openbsd.org 2008/07/15 02:23:14 | ||
30 | [sftp.1] | ||
31 | number of pipelined requests is now 64; | ||
32 | prodded by Iain.Morgan AT nasa.gov | ||
33 | - djm@cvs.openbsd.org 2008/07/16 11:51:14 | ||
34 | [clientloop.c] | ||
35 | rename variable first_gc -> last_gc (since it is actually the last | ||
36 | in the list). | ||
37 | - djm@cvs.openbsd.org 2008/07/16 11:52:19 | ||
38 | [channels.c] | ||
39 | this loop index should be automatic, not static | ||
40 | |||
41 | 20080714 | ||
42 | - (djm) OpenBSD CVS Sync | ||
43 | - sthen@cvs.openbsd.org 2008/07/13 21:22:52 | ||
44 | [ssh-keygen.c] | ||
45 | Change "ssh-keygen -F [host] -l" to not display random art unless | ||
46 | -v is also specified, making it consistent with the manual and other | ||
47 | uses of -l. | ||
48 | ok grunk@ | ||
49 | - djm@cvs.openbsd.org 2008/07/13 22:13:07 | ||
50 | [channels.c] | ||
51 | use struct sockaddr_storage instead of struct sockaddr for accept(2) | ||
52 | address argument. from visibilis AT yahoo.com in bz#1485; ok markus@ | ||
53 | - djm@cvs.openbsd.org 2008/07/13 22:16:03 | ||
54 | [sftp.c] | ||
55 | increase number of piplelined requests so they properly fill the | ||
56 | (recently increased) channel window. prompted by rapier AT psc.edu; | ||
57 | ok markus@ | ||
58 | - djm@cvs.openbsd.org 2008/07/14 01:55:56 | ||
59 | [sftp-server.8] | ||
60 | mention requirement for /dev/log inside chroot when using sftp-server | ||
61 | with ChrootDirectory | ||
62 | - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to | ||
63 | avoid clash with sin(3) function; reported by | ||
64 | cristian.ionescu-idbohrn AT axis.com | ||
65 | - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close() | ||
66 | prototype; reported by cristian.ionescu-idbohrn AT axis.com | ||
67 | - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash; | ||
68 | reported by cristian.ionescu-idbohrn AT axis.com | ||
69 | - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config] | ||
70 | [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd] | ||
71 | Revamped and simplified Cygwin ssh-host-config script that uses | ||
72 | unified csih configuration tool. Requires recent Cygwin. | ||
73 | Patch from vinschen AT redhat.com | ||
74 | |||
75 | 20080712 | ||
76 | - (djm) OpenBSD CVS Sync | ||
77 | - djm@cvs.openbsd.org 2008/07/12 04:52:50 | ||
78 | [channels.c] | ||
79 | unbreak; move clearing of cctx struct to before first use | ||
80 | reported by dkrause@ | ||
81 | - djm@cvs.openbsd.org 2008/07/12 05:33:41 | ||
82 | [scp.1] | ||
83 | better description for -i flag: | ||
84 | s/RSA authentication/public key authentication/ | ||
85 | - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h] | ||
86 | return EAI_FAMILY when trying to lookup unsupported address family; | ||
87 | from vinschen AT redhat.com | ||
88 | |||
89 | 20080711 | ||
90 | - (djm) OpenBSD CVS Sync | ||
91 | - stevesk@cvs.openbsd.org 2008/07/07 00:31:41 | ||
92 | [ttymodes.c] | ||
93 | we don't need arg after the debug3() was removed. from lint. | ||
94 | ok djm@ | ||
95 | - stevesk@cvs.openbsd.org 2008/07/07 23:32:51 | ||
96 | [key.c] | ||
97 | /*NOTREACHED*/ for lint warning: | ||
98 | warning: function key_equal falls off bottom without returning value | ||
99 | ok djm@ | ||
100 | - markus@cvs.openbsd.org 2008/07/10 18:05:58 | ||
101 | [channels.c] | ||
102 | missing bzero; from mickey; ok djm@ | ||
103 | - markus@cvs.openbsd.org 2008/07/10 18:08:11 | ||
104 | [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c] | ||
105 | sync v1 and v2 traffic accounting; add it to sshd, too; | ||
106 | ok djm@, dtucker@ | ||
107 | |||
108 | 20080709 | ||
109 | - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass | ||
110 | - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM | ||
111 | account check failure path. The vulnerable format buffer is supplied | ||
112 | from PAM and should not contain attacker-supplied data. | ||
113 | - (djm) [auth.c] Missing unistd.h for close() | ||
114 | - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x | ||
115 | |||
116 | 20080705 | ||
117 | - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed | ||
118 | passwords disabled. bz#1083 report & patch from senthilkumar_sen AT | ||
119 | hotpop.com, w/ dtucker@ | ||
120 | - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for | ||
121 | Tru64. readv doesn't seem to be a comparable object there. | ||
122 | bz#1386, patch from dtucker@ ok me | ||
123 | - (djm) [Makefile.in] Pass though pass to conch for interop tests | ||
124 | - (djm) [configure.ac] unbreak: remove extra closing brace | ||
125 | - (djm) OpenBSD CVS Sync | ||
126 | - djm@cvs.openbsd.org 2008/07/04 23:08:25 | ||
127 | [packet.c] | ||
128 | handle EINTR in packet_write_poll()l ok dtucker@ | ||
129 | - djm@cvs.openbsd.org 2008/07/04 23:30:16 | ||
130 | [auth1.c auth2.c] | ||
131 | Make protocol 1 MaxAuthTries logic match protocol 2's. | ||
132 | Do not treat the first protocol 2 authentication attempt as | ||
133 | a failure IFF it is for method "none". | ||
134 | Makes MaxAuthTries' user-visible behaviour identical for | ||
135 | protocol 1 vs 2. | ||
136 | ok dtucker@ | ||
137 | - djm@cvs.openbsd.org 2008/07/05 05:16:01 | ||
138 | [PROTOCOL] | ||
139 | grammar | ||
140 | |||
141 | 20080704 | ||
142 | - (dtucker) OpenBSD CVS Sync | ||
143 | - djm@cvs.openbsd.org 2008/07/02 13:30:34 | ||
144 | [auth2.c] | ||
145 | really really remove the freebie "none" auth try for protocol 2 | ||
146 | - djm@cvs.openbsd.org 2008/07/02 13:47:39 | ||
147 | [ssh.1 ssh.c] | ||
148 | When forking after authentication ("ssh -f") with ExitOnForwardFailure | ||
149 | enabled, delay the fork until after replies for any -R forwards have | ||
150 | been seen. Allows for robust detection of -R forward failure when | ||
151 | using -f (similar to bz#92); ok dtucker@ | ||
152 | - otto@cvs.openbsd.org 2008/07/03 21:46:58 | ||
153 | [auth2-pubkey.c] | ||
154 | avoid nasty double free; ok dtucker@ djm@ | ||
155 | - djm@cvs.openbsd.org 2008/07/04 03:44:59 | ||
156 | [servconf.c groupaccess.h groupaccess.c] | ||
157 | support negation of groups in "Match group" block (bz#1315); ok dtucker@ | ||
158 | - dtucker@cvs.openbsd.org 2008/07/04 03:47:02 | ||
159 | [monitor.c] | ||
160 | Make debug a little clearer. ok djm@ | ||
161 | - djm@cvs.openbsd.org 2008/06/30 08:07:34 | ||
162 | [regress/key-options.sh] | ||
163 | shell portability: use "=" instead of "==" in test(1) expressions, | ||
164 | double-quote string with backslash escaped / | ||
165 | - djm@cvs.openbsd.org 2008/06/30 10:31:11 | ||
166 | [regress/{putty-transfer,putty-kex,putty-ciphers}.sh] | ||
167 | remove "set -e" left over from debugging | ||
168 | - djm@cvs.openbsd.org 2008/06/30 10:43:03 | ||
169 | [regress/conch-ciphers.sh] | ||
170 | explicitly disable conch options that could interfere with the test | ||
171 | - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link | ||
172 | returns EXDEV. Patch from Mike Garrison, ok djm@ | ||
173 | - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h] | ||
174 | [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c] | ||
175 | [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on | ||
176 | some platforms (HP nonstop) it is a distinct errno; | ||
177 | bz#1467 reported by sconeu AT yahoo.com; ok dtucker@ | ||
178 | |||
179 | 20080702 | ||
180 | - (dtucker) OpenBSD CVS Sync | ||
181 | - djm@cvs.openbsd.org 2008/06/30 08:05:59 | ||
182 | [PROTOCOL.agent] | ||
183 | typo: s/constraint_date/constraint_data/ | ||
184 | - djm@cvs.openbsd.org 2008/06/30 12:15:39 | ||
185 | [serverloop.c] | ||
186 | only pass channel requests on session channels through to the session | ||
187 | channel handler, avoiding spurious log messages; ok! markus@ | ||
188 | - djm@cvs.openbsd.org 2008/06/30 12:16:02 | ||
189 | [nchan.c] | ||
190 | only send eow@openssh.com notifications for session channels; ok! markus@ | ||
191 | - djm@cvs.openbsd.org 2008/06/30 12:18:34 | ||
192 | [PROTOCOL] | ||
193 | clarify that eow@openssh.com is only sent on session channels | ||
194 | - dtucker@cvs.openbsd.org 2008/07/01 07:20:52 | ||
195 | [sshconnect.c] | ||
196 | Check ExitOnForwardFailure if forwardings are disabled due to a failed | ||
197 | host key check. ok djm@ | ||
198 | - dtucker@cvs.openbsd.org 2008/07/01 07:24:22 | ||
199 | [sshconnect.c sshd.c] | ||
200 | Send CR LF during protocol banner exchanges, but only for Protocol 2 only, | ||
201 | in order to comply with RFC 4253. bz #1443, ok djm@ | ||
202 | - stevesk@cvs.openbsd.org 2008/07/01 23:12:47 | ||
203 | [PROTOCOL.agent] | ||
204 | fix some typos; ok djm@ | ||
205 | - djm@cvs.openbsd.org 2008/07/02 02:24:18 | ||
206 | [sshd_config sshd_config.5 sshd.8 servconf.c] | ||
207 | increase default size of ssh protocol 1 ephemeral key from 768 to 1024 | ||
208 | bits; prodded by & ok dtucker@ ok deraadt@ | ||
209 | - dtucker@cvs.openbsd.org 2008/07/02 12:03:51 | ||
210 | [auth-rsa.c auth.c auth2-pubkey.c auth.h] | ||
211 | Merge duplicate host key file checks, based in part on a patch from Rob | ||
212 | Holland via bz #1348 . Also checks for non-regular files during protocol | ||
213 | 1 RSA auth. ok djm@ | ||
214 | - djm@cvs.openbsd.org 2008/07/02 12:36:39 | ||
215 | [auth2-none.c auth2.c] | ||
216 | Make protocol 2 MaxAuthTries behaviour a little more sensible: | ||
217 | Check whether client has exceeded MaxAuthTries before running | ||
218 | an authentication method and skip it if they have, previously it | ||
219 | would always allow one try (for "none" auth). | ||
220 | Preincrement failure count before post-auth test - previously this | ||
221 | checked and postincremented, also to allow one "none" try. | ||
222 | Together, these two changes always count the "none" auth method | ||
223 | which could be skipped by a malicious client (e.g. an SSH worm) | ||
224 | to get an extra attempt at a real auth method. They also make | ||
225 | MaxAuthTries=0 a useful way to block users entirely (esp. in a | ||
226 | sshd_config Match block). | ||
227 | Also, move sending of any preauth banner from "none" auth method | ||
228 | to the first call to input_userauth_request(), so worms that skip | ||
229 | the "none" method get to see it too. | ||
230 | |||
231 | 20080630 | ||
232 | - (djm) OpenBSD CVS Sync | ||
233 | - dtucker@cvs.openbsd.org 2008/06/10 23:13:43 | ||
234 | [regress/Makefile regress/key-options.sh] | ||
235 | Add regress test for key options. ok djm@ | ||
236 | - dtucker@cvs.openbsd.org 2008/06/11 23:11:40 | ||
237 | [regress/Makefile] | ||
238 | Don't run cipher-speed test by default; mistakenly enabled by me | ||
239 | - djm@cvs.openbsd.org 2008/06/28 13:57:25 | ||
240 | [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh] | ||
241 | very basic regress test against Twisted Conch in "make interop" | ||
242 | target (conch is available in ports/devel/py-twisted/conch); | ||
243 | ok markus@ | ||
244 | - (djm) [regress/Makefile] search for conch by path, like we do putty | ||
245 | |||
246 | 20080629 | ||
247 | - (djm) OpenBSD CVS Sync | ||
248 | - martynas@cvs.openbsd.org 2008/06/21 07:46:46 | ||
249 | [sftp.c] | ||
250 | use optopt to get invalid flag, instead of return value of getopt, | ||
251 | which is always '?'; ok djm@ | ||
252 | - otto@cvs.openbsd.org 2008/06/25 11:13:43 | ||
253 | [key.c] | ||
254 | add key length to visual fingerprint; zap magical constants; | ||
255 | ok grunk@ djm@ | ||
256 | - djm@cvs.openbsd.org 2008/06/26 06:10:09 | ||
257 | [sftp-client.c sftp-server.c] | ||
258 | allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky | ||
259 | bits. Note that this only affects explicit setting of modes (e.g. via | ||
260 | sftp(1)'s chmod command) and not file transfers. (bz#1310) | ||
261 | ok deraadt@ at c2k8 | ||
262 | - djm@cvs.openbsd.org 2008/06/26 09:19:40 | ||
263 | [dh.c dh.h moduli.c] | ||
264 | when loading moduli from /etc/moduli in sshd(8), check that they | ||
265 | are of the expected "safe prime" structure and have had | ||
266 | appropriate primality tests performed; | ||
267 | feedback and ok dtucker@ | ||
268 | - grunk@cvs.openbsd.org 2008/06/26 11:46:31 | ||
269 | [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c] | ||
270 | Move SSH Fingerprint Visualization away from sharing the config option | ||
271 | CheckHostIP to an own config option named VisualHostKey. | ||
272 | While there, fix the behaviour that ssh would draw a random art picture | ||
273 | on every newly seen host even when the option was not enabled. | ||
274 | prodded by deraadt@, discussions, | ||
275 | help and ok markus@ djm@ dtucker@ | ||
276 | - jmc@cvs.openbsd.org 2008/06/26 21:11:46 | ||
277 | [ssh.1] | ||
278 | add VisualHostKey to the list of options listed in -o; | ||
279 | - djm@cvs.openbsd.org 2008/06/28 07:25:07 | ||
280 | [PROTOCOL] | ||
281 | spelling fixes | ||
282 | - djm@cvs.openbsd.org 2008/06/28 13:58:23 | ||
283 | [ssh-agent.c] | ||
284 | refuse to add a key that has unknown constraints specified; | ||
285 | ok markus | ||
286 | - djm@cvs.openbsd.org 2008/06/28 14:05:15 | ||
287 | [ssh-agent.c] | ||
288 | reset global compat flag after processing a protocol 2 signature | ||
289 | request with the legacy DSA encoding flag set; ok markus | ||
290 | - djm@cvs.openbsd.org 2008/06/28 14:08:30 | ||
291 | [PROTOCOL PROTOCOL.agent] | ||
292 | document the protocol used by ssh-agent; "looks ok" markus@ | ||
293 | |||
294 | 20080628 | ||
295 | - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec] | ||
296 | RFC.nroff lacks a license, remove it (it is long gone in OpenBSD). | ||
297 | |||
298 | 20080626 | ||
299 | - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD. | ||
300 | (bz#1372) | ||
301 | - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec] | ||
302 | [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files. | ||
303 | |||
304 | 20080616 | ||
305 | - (dtucker) OpenBSD CVS Sync | ||
306 | - dtucker@cvs.openbsd.org 2008/06/16 13:22:53 | ||
307 | [session.c channels.c] | ||
308 | Rename the isatty argument to is_tty so we don't shadow | ||
309 | isatty(3). ok markus@ | ||
310 | - (dtucker) [channels.c] isatty -> is_tty here too. | ||
311 | |||
312 | 20080615 | ||
313 | - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc. | ||
314 | - OpenBSD CVS Sync | ||
315 | - dtucker@cvs.openbsd.org 2008/06/14 15:49:48 | ||
316 | [sshd.c] | ||
317 | wrap long line at 80 chars | ||
318 | - dtucker@cvs.openbsd.org 2008/06/14 17:07:11 | ||
319 | [sshd.c] | ||
320 | ensure default umask disallows at least group and world write; ok djm@ | ||
321 | - djm@cvs.openbsd.org 2008/06/14 18:33:43 | ||
322 | [session.c] | ||
323 | suppress the warning message from chdir(homedir) failures | ||
324 | when chrooted (bz#1461); ok dtucker | ||
325 | - dtucker@cvs.openbsd.org 2008/06/14 19:42:10 | ||
326 | [scp.1] | ||
327 | Mention that scp follows symlinks during -r. bz #1466, | ||
328 | from nectar at apple | ||
329 | - dtucker@cvs.openbsd.org 2008/06/15 16:55:38 | ||
330 | [sshd_config.5] | ||
331 | MaxSessions is allowed in a Match block too | ||
332 | - dtucker@cvs.openbsd.org 2008/06/15 16:58:40 | ||
333 | [servconf.c sshd_config.5] | ||
334 | Allow MaxAuthTries within a Match block. ok djm@ | ||
335 | - djm@cvs.openbsd.org 2008/06/15 20:06:26 | ||
336 | [channels.c channels.h session.c] | ||
337 | don't call isatty() on a pty master, instead pass a flag down to | ||
338 | channel_set_fds() indicating that te fds refer to a tty. Fixes a | ||
339 | hang on exit on Solaris (bz#1463) in portable but is actually | ||
340 | a generic bug; ok dtucker deraadt markus | ||
341 | |||
342 | 20080614 | ||
343 | - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction | ||
344 | replacement code; patch from ighighi AT gmail.com in bz#1240; | ||
345 | ok dtucker | ||
346 | |||
347 | 20080613 | ||
348 | - (dtucker) OpenBSD CVS Sync | ||
349 | - deraadt@cvs.openbsd.org 2008/06/13 09:44:36 | ||
350 | [packet.c] | ||
351 | compile on older gcc; no decl after code | ||
352 | - dtucker@cvs.openbsd.org 2008/06/13 13:56:59 | ||
353 | [monitor.c] | ||
354 | Clear key options in the monitor on failed authentication, prevents | ||
355 | applying additional restrictions to non-pubkey authentications in | ||
356 | the case where pubkey fails but another method subsequently succeeds. | ||
357 | bz #1472, found by Colin Watson, ok markus@ djm@ | ||
358 | - dtucker@cvs.openbsd.org 2008/06/13 14:18:51 | ||
359 | [auth2-pubkey.c auth-rhosts.c] | ||
360 | Include unistd.h for close(), prevents warnings in -portable | ||
361 | - dtucker@cvs.openbsd.org 2008/06/13 17:21:20 | ||
362 | [mux.c] | ||
363 | Friendlier error messages for mux fallback. ok djm@ | ||
364 | - dtucker@cvs.openbsd.org 2008/06/13 18:55:22 | ||
365 | [scp.c] | ||
366 | Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@ | ||
367 | - grunk@cvs.openbsd.org 2008/06/13 20:13:26 | ||
368 | [ssh.1] | ||
369 | Explain the use of SSH fpr visualization using random art, and cite the | ||
370 | original scientific paper inspiring that technique. | ||
371 | Much help with English and nroff by jmc@, thanks. | ||
372 | - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which | ||
373 | despite its name doesn't seem to implement all of GSSAPI. Patch from | ||
374 | Jan Engelhardt, sanity checked by Simon Wilkinson. | ||
375 | |||
376 | 20080612 | ||
377 | - (dtucker) OpenBSD CVS Sync | ||
378 | - jmc@cvs.openbsd.org 2008/06/11 07:30:37 | ||
379 | [sshd.8] | ||
380 | kill trailing whitespace; | ||
381 | - grunk@cvs.openbsd.org 2008/06/11 21:01:35 | ||
382 | [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c | ||
383 | sshconnect.c] | ||
384 | Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the | ||
385 | graphical hash visualization schemes known as "random art", and by | ||
386 | Dan Kaminsky's musings on the subject during a BlackOp talk at the | ||
387 | 23C3 in Berlin. | ||
388 | Scientific publication (original paper): | ||
389 | "Hash Visualization: a New Technique to improve Real-World Security", | ||
390 | Perrig A. and Song D., 1999, International Workshop on Cryptographic | ||
391 | Techniques and E-Commerce (CrypTEC '99) | ||
392 | http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf | ||
393 | The algorithm used here is a worm crawling over a discrete plane, | ||
394 | leaving a trace (augmenting the field) everywhere it goes. | ||
395 | Movement is taken from dgst_raw 2bit-wise. Bumping into walls | ||
396 | makes the respective movement vector be ignored for this turn, | ||
397 | thus switching to the other color of the chessboard. | ||
398 | Graphs are not unambiguous for now, because circles in graphs can be | ||
399 | walked in either direction. | ||
400 | discussions with several people, | ||
401 | help, corrections and ok markus@ djm@ | ||
402 | - grunk@cvs.openbsd.org 2008/06/11 21:38:25 | ||
403 | [ssh-keygen.c] | ||
404 | ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub | ||
405 | would not display you the random art as intended, spotted by canacar@ | ||
406 | - grunk@cvs.openbsd.org 2008/06/11 22:20:46 | ||
407 | [ssh-keygen.c ssh-keygen.1] | ||
408 | ssh-keygen would write fingerprints to STDOUT, and random art to STDERR, | ||
409 | that is not how it was envisioned. | ||
410 | Also correct manpage saying that -v is needed along with -l for it to work. | ||
411 | spotted by naddy@ | ||
412 | - otto@cvs.openbsd.org 2008/06/11 23:02:22 | ||
413 | [key.c] | ||
414 | simpler way of computing the augmentations; ok grunk@ | ||
415 | - grunk@cvs.openbsd.org 2008/06/11 23:03:56 | ||
416 | [ssh_config.5] | ||
417 | CheckHostIP set to ``fingerprint'' will display both hex and random art | ||
418 | spotted by naddy@ | ||
419 | - grunk@cvs.openbsd.org 2008/06/11 23:51:57 | ||
420 | [key.c] | ||
421 | #define statements that are not atoms need braces around them, else they | ||
422 | will cause trouble in some cases. | ||
423 | Also do a computation of -1 once, and not in a loop several times. | ||
424 | spotted by otto@ | ||
425 | - dtucker@cvs.openbsd.org 2008/06/12 00:03:49 | ||
426 | [dns.c canohost.c sshconnect.c] | ||
427 | Do not pass "0" strings as ports to getaddrinfo because the lookups | ||
428 | can slow things down and we never use the service info anyway. bz | ||
429 | #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok | ||
430 | deraadt@ djm@ | ||
431 | djm belives that the reason for the "0" strings is to ensure that | ||
432 | it's not possible to call getaddrinfo with both host and port being | ||
433 | NULL. In the case of canohost.c host is a local array. In the | ||
434 | case of sshconnect.c, it's checked for null immediately before use. | ||
435 | In dns.c it ultimately comes from ssh.c:main() and is guaranteed to | ||
436 | be non-null but it's not obvious, so I added a warning message in | ||
437 | case it is ever passed a null. | ||
438 | - grunk@cvs.openbsd.org 2008/06/12 00:13:55 | ||
439 | [sshconnect.c] | ||
440 | Make ssh print the random art also when ssh'ing to a host using IP only. | ||
441 | spotted by naddy@, ok and help djm@ dtucker@ | ||
442 | - otto@cvs.openbsd.org 2008/06/12 00:13:13 | ||
443 | [key.c] | ||
444 | use an odd number of rows and columns and a separate start marker, looks | ||
445 | better; ok grunk@ | ||
446 | - djm@cvs.openbsd.org 2008/06/12 03:40:52 | ||
447 | [clientloop.h mux.c channels.c clientloop.c channels.h] | ||
448 | Enable ~ escapes for multiplex slave sessions; give each channel | ||
449 | its own escape state and hook the escape filters up to muxed | ||
450 | channels. bz #1331 | ||
451 | Mux slaves do not currently support the ~^Z and ~& escapes. | ||
452 | NB. this change cranks the mux protocol version, so a new ssh | ||
453 | mux client will not be able to connect to a running old ssh | ||
454 | mux master. | ||
455 | ok dtucker@ | ||
456 | - djm@cvs.openbsd.org 2008/06/12 04:06:00 | ||
457 | [clientloop.h ssh.c clientloop.c] | ||
458 | maintain an ordered queue of outstanding global requests that we | ||
459 | expect replies to, similar to the per-channel confirmation queue. | ||
460 | Use this queue to verify success or failure for remote forward | ||
461 | establishment in a race free way. | ||
462 | ok dtucker@ | ||
463 | - djm@cvs.openbsd.org 2008/06/12 04:17:47 | ||
464 | [clientloop.c] | ||
465 | thall shalt not code past the eightieth column | ||
466 | - djm@cvs.openbsd.org 2008/06/12 04:24:06 | ||
467 | [ssh.c] | ||
468 | thal shalt not code past the eightieth column | ||
469 | - djm@cvs.openbsd.org 2008/06/12 05:15:41 | ||
470 | [PROTOCOL] | ||
471 | document tun@openssh.com forwarding method | ||
472 | - djm@cvs.openbsd.org 2008/06/12 05:32:30 | ||
473 | [mux.c] | ||
474 | some more TODO for me | ||
475 | - grunk@cvs.openbsd.org 2008/06/12 05:42:46 | ||
476 | [key.c] | ||
477 | supply the key type (rsa1, rsa, dsa) as a caption in the frame of the | ||
478 | random art. while there, stress the fact that the field base should at | ||
479 | least be 8 characters for the pictures to make sense. | ||
480 | comment and ok djm@ | ||
481 | - grunk@cvs.openbsd.org 2008/06/12 06:32:59 | ||
482 | [key.c] | ||
483 | We already mark the start of the worm, now also mark the end of the worm | ||
484 | in our random art drawings. | ||
485 | ok djm@ | ||
486 | - djm@cvs.openbsd.org 2008/06/12 15:19:17 | ||
487 | [clientloop.h channels.h clientloop.c channels.c mux.c] | ||
488 | The multiplexing escape char handler commit last night introduced a | ||
489 | small memory leak per session; plug it. | ||
490 | - dtucker@cvs.openbsd.org 2008/06/12 16:35:31 | ||
491 | [ssh_config.5 ssh.c] | ||
492 | keyword expansion for localcommand. ok djm@ | ||
493 | - jmc@cvs.openbsd.org 2008/06/12 19:10:09 | ||
494 | [ssh_config.5 ssh-keygen.1] | ||
495 | tweak the ascii art text; ok grunk | ||
496 | - dtucker@cvs.openbsd.org 2008/06/12 20:38:28 | ||
497 | [sshd.c sshconnect.c packet.h misc.c misc.h packet.c] | ||
498 | Make keepalive timeouts apply while waiting for a packet, particularly | ||
499 | during key renegotiation (bz #1363). With djm and Matt Day, ok djm@ | ||
500 | - djm@cvs.openbsd.org 2008/06/12 20:47:04 | ||
501 | [sftp-client.c] | ||
502 | print extension revisions for extensions that we understand | ||
503 | - djm@cvs.openbsd.org 2008/06/12 21:06:25 | ||
504 | [clientloop.c] | ||
505 | I was coalescing expected global request confirmation replies at | ||
506 | the wrong end of the queue - fix; prompted by markus@ | ||
507 | - grunk@cvs.openbsd.org 2008/06/12 21:14:46 | ||
508 | [ssh-keygen.c] | ||
509 | make ssh-keygen -lf show the key type just as ssh-add -l would do it | ||
510 | ok djm@ markus@ | ||
511 | - grunk@cvs.openbsd.org 2008/06/12 22:03:36 | ||
512 | [key.c] | ||
513 | add my copyright, ok djm@ | ||
514 | - ian@cvs.openbsd.org 2008/06/12 23:24:58 | ||
515 | [sshconnect.c] | ||
516 | tweak wording in message, ok deraadt@ jmc@ | ||
517 | - dtucker@cvs.openbsd.org 2008/06/13 00:12:02 | ||
518 | [sftp.h log.h] | ||
519 | replace __dead with __attribute__((noreturn)), makes things | ||
520 | a little easier to port. Also, add it to sigdie(). ok djm@ | ||
521 | - djm@cvs.openbsd.org 2008/06/13 00:16:49 | ||
522 | [mux.c] | ||
523 | fall back to creating a new TCP connection on most multiplexing errors | ||
524 | (socket connect fail, invalid version, refused permittion, corrupted | ||
525 | messages, etc.); bz #1329 ok dtucker@ | ||
526 | - dtucker@cvs.openbsd.org 2008/06/13 00:47:53 | ||
527 | [mux.c] | ||
528 | upcast size_t to u_long to match format arg; ok djm@ | ||
529 | - dtucker@cvs.openbsd.org 2008/06/13 00:51:47 | ||
530 | [mac.c] | ||
531 | upcast another size_t to u_long to match format | ||
532 | - dtucker@cvs.openbsd.org 2008/06/13 01:38:23 | ||
533 | [misc.c] | ||
534 | upcast uid to long with matching %ld, prevents warnings in portable | ||
535 | - djm@cvs.openbsd.org 2008/06/13 04:40:22 | ||
536 | [auth2-pubkey.c auth-rhosts.c] | ||
537 | refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not | ||
538 | regular files; report from Solar Designer via Colin Watson in bz#1471 | ||
539 | ok dtucker@ deraadt | ||
540 | - (dtucker) [clientloop.c serverloop.c] channel_register_filter now | ||
541 | takes 2 more args. with djm@ | ||
542 | - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch | ||
543 | from Todd Vierling. | ||
544 | - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA | ||
545 | systems. Patch from R. Scott Bailey. | ||
546 | - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used | ||
547 | on big endian machines, so ifdef them for little-endian only to prevent | ||
548 | unused function warnings on big-endians. | ||
549 | - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent | ||
550 | compiler warnings on some platforms. Based on a discussion with otto@ | ||
551 | |||
552 | 20080611 | ||
553 | - (djm) [channels.c configure.ac] | ||
554 | Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no) | ||
555 | bz#1464; ok dtucker | ||
556 | |||
557 | 20080610 | ||
558 | - (dtucker) OpenBSD CVS Sync | ||
559 | - djm@cvs.openbsd.org 2008/06/10 03:57:27 | ||
560 | [servconf.c match.h sshd_config.5] | ||
561 | support CIDR address matching in sshd_config "Match address" blocks, with | ||
562 | full support for negation and fall-back to classic wildcard matching. | ||
563 | For example: | ||
564 | Match address 192.0.2.0/24,3ffe:ffff::/32,!10.* | ||
565 | PasswordAuthentication yes | ||
566 | addrmatch.c code mostly lifted from flowd's addr.c | ||
567 | feedback and ok dtucker@ | ||
568 | - djm@cvs.openbsd.org 2008/06/10 04:17:46 | ||
569 | [sshd_config.5] | ||
570 | better reference for pattern-list | ||
571 | - dtucker@cvs.openbsd.org 2008/06/10 04:50:25 | ||
572 | [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8] | ||
573 | Add extended test mode (-T) and connection parameters for test mode (-C). | ||
574 | -T causes sshd to write its effective configuration to stdout and exit. | ||
575 | -C causes any relevant Match rules to be applied before output. The | ||
576 | combination allows tesing of the parser and config files. ok deraadt djm | ||
577 | - jmc@cvs.openbsd.org 2008/06/10 07:12:00 | ||
578 | [sshd_config.5] | ||
579 | tweak previous; | ||
580 | - jmc@cvs.openbsd.org 2008/06/10 08:17:40 | ||
581 | [sshd.8 sshd.c] | ||
582 | - update usage() | ||
583 | - fix SYNOPSIS, and sort options | ||
584 | - some minor additional fixes | ||
585 | - dtucker@cvs.openbsd.org 2008/06/09 18:06:32 | ||
586 | [regress/test-exec.sh] | ||
587 | Don't generate putty keys if we're not going to use them. ok djm | ||
588 | - dtucker@cvs.openbsd.org 2008/06/10 05:23:32 | ||
589 | [regress/addrmatch.sh regress/Makefile] | ||
590 | Regress test for Match CIDR rules. ok djm@ | ||
591 | - dtucker@cvs.openbsd.org 2008/06/10 15:21:41 | ||
592 | [test-exec.sh] | ||
593 | Use a more portable construct for checking if we're running a putty test | ||
594 | - dtucker@cvs.openbsd.org 2008/06/10 15:28:49 | ||
595 | [test-exec.sh] | ||
596 | Add quotes | ||
597 | - dtucker@cvs.openbsd.org 2008/06/10 18:21:24 | ||
598 | [ssh_config.5] | ||
599 | clarify that Host patterns are space-separated. ok deraadt | ||
600 | - djm@cvs.openbsd.org 2008/06/10 22:15:23 | ||
601 | [PROTOCOL ssh.c serverloop.c] | ||
602 | Add a no-more-sessions@openssh.com global request extension that the | ||
603 | client sends when it knows that it will never request another session | ||
604 | (i.e. when session multiplexing is disabled). This allows a server to | ||
605 | disallow further session requests and terminate the session. | ||
606 | Why would a non-multiplexing client ever issue additional session | ||
607 | requests? It could have been attacked with something like SSH'jack: | ||
608 | http://www.storm.net.nz/projects/7 | ||
609 | feedback & ok markus | ||
610 | - djm@cvs.openbsd.org 2008/06/10 23:06:19 | ||
611 | [auth-options.c match.c servconf.c addrmatch.c sshd.8] | ||
612 | support CIDR address matching in .ssh/authorized_keys from="..." stanzas | ||
613 | ok and extensive testing dtucker@ | ||
614 | - dtucker@cvs.openbsd.org 2008/06/10 23:21:34 | ||
615 | [bufaux.c] | ||
616 | Use '\0' for a nul byte rather than unadorned 0. ok djm@ | ||
617 | - dtucker@cvs.openbsd.org 2008/06/10 23:13:43 | ||
618 | [Makefile regress/key-options.sh] | ||
619 | Add regress test for key options. ok djm@ | ||
620 | - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6 | ||
621 | since the new CIDR code in addmatch.c references it. | ||
622 | - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6 | ||
623 | specific tests on platforms that don't do IPv6. | ||
624 | - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well | ||
625 | as environment. | ||
626 | - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now. | ||
627 | |||
628 | 20080609 | ||
629 | - (dtucker) OpenBSD CVS Sync | ||
630 | - dtucker@cvs.openbsd.org 2008/06/08 17:04:41 | ||
631 | [sftp-server.c] | ||
632 | Add case for ENOSYS in errno_to_portable; ok deraadt | ||
633 | - dtucker@cvs.openbsd.org 2008/06/08 20:15:29 | ||
634 | [sftp.c sftp-client.c sftp-client.h] | ||
635 | Have the sftp client store the statvfs replies in wire format, | ||
636 | which prevents problems when the server's native sizes exceed the | ||
637 | client's. | ||
638 | Also extends the sizes of the remaining 32bit wire format to 64bit, | ||
639 | they're specified as unsigned long in the standard. | ||
640 | - dtucker@cvs.openbsd.org 2008/06/09 13:02:39 | ||
641 | [sftp-server.c] | ||
642 | Extend 32bit -> 64bit values for statvfs extension missed in previous | ||
643 | commit. | ||
644 | - dtucker@cvs.openbsd.org 2008/06/09 13:38:46 | ||
645 | [PROTOCOL] | ||
646 | Use a $OpenBSD tag so our scripts will sync changes. | ||
647 | |||
648 | 20080608 | ||
649 | - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c | ||
650 | openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h | ||
651 | openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and | ||
652 | fstatvfs and remove #defines around statvfs code. ok djm@ | ||
653 | - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a | ||
654 | macro to convert fsid to unsigned long for platforms where fsid is a | ||
655 | 2-member array. | ||
656 | |||
657 | 20080607 | ||
658 | - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H. | ||
659 | - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c] | ||
660 | Do not enable statvfs extensions on platforms that do not have statvfs. | ||
661 | - (dtucker) OpenBSD CVS Sync | ||
662 | - djm@cvs.openbsd.org 2008/05/19 06:14:02 | ||
663 | [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@ | ||
664 | - djm@cvs.openbsd.org 2008/05/19 15:45:07 | ||
665 | [sshtty.c ttymodes.c sshpty.h] | ||
666 | Fix sending tty modes when stdin is not a tty (bz#1199). Previously | ||
667 | we would send the modes corresponding to a zeroed struct termios, | ||
668 | whereas we should have been sending an empty list of modes. | ||
669 | Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@ | ||
670 | - djm@cvs.openbsd.org 2008/05/19 15:46:31 | ||
671 | [ssh-keygen.c] | ||
672 | support -l (print fingerprint) in combination with -F (find host) to | ||
673 | search for a host in ~/.ssh/known_hosts and display its fingerprint; | ||
674 | ok markus@ | ||
675 | - djm@cvs.openbsd.org 2008/05/19 20:53:52 | ||
676 | [clientloop.c] | ||
677 | unbreak tree by committing this bit that I missed from: | ||
678 | Fix sending tty modes when stdin is not a tty (bz#1199). Previously | ||
679 | we would send the modes corresponding to a zeroed struct termios, | ||
680 | whereas we should have been sending an empty list of modes. | ||
681 | Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@ | ||
682 | |||
683 | 20080604 | ||
684 | - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias | ||
685 | in arc4random_uniform with upper_bound in (2^30,2*31). Note that | ||
686 | OpenSSH did not make requests with upper bounds in this range. | ||
687 | |||
688 | 20080519 | ||
689 | - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in] | ||
690 | [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h] | ||
691 | Fix compilation on Linux, including pulling in fmt_scaled(3) | ||
692 | implementation from OpenBSD's libutil. | ||
693 | |||
694 | 20080518 | ||
695 | - (djm) OpenBSD CVS Sync | ||
696 | - djm@cvs.openbsd.org 2008/04/04 05:14:38 | ||
697 | [sshd_config.5] | ||
698 | ChrootDirectory is supported in Match blocks (in fact, it is most useful | ||
699 | there). Spotted by Minstrel AT minstrel.org.uk | ||
700 | - djm@cvs.openbsd.org 2008/04/04 06:44:26 | ||
701 | [sshd_config.5] | ||
702 | oops, some unrelated stuff crept into that commit - backout. | ||
703 | spotted by jmc@ | ||
704 | - djm@cvs.openbsd.org 2008/04/05 02:46:02 | ||
705 | [sshd_config.5] | ||
706 | HostbasedAuthentication is supported under Match too | ||
707 | - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c] | ||
708 | [configure.ac] Implement arc4random_buf(), import implementation of | ||
709 | arc4random_uniform() from OpenBSD | ||
710 | - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes | ||
711 | - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h | ||
712 | - (djm) OpenBSD CVS Sync | ||
713 | - djm@cvs.openbsd.org 2008/04/13 00:22:17 | ||
714 | [dh.c sshd.c] | ||
715 | Use arc4random_buf() when requesting more than a single word of output | ||
716 | Use arc4random_uniform() when the desired random number upper bound | ||
717 | is not a power of two | ||
718 | ok deraadt@ millert@ | ||
719 | - djm@cvs.openbsd.org 2008/04/18 12:32:11 | ||
720 | [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h] | ||
721 | introduce sftp extension methods statvfs@openssh.com and | ||
722 | fstatvfs@openssh.com that implement statvfs(2)-like operations, | ||
723 | based on a patch from miklos AT szeredi.hu (bz#1399) | ||
724 | also add a "df" command to the sftp client that uses the | ||
725 | statvfs@openssh.com to produce a df(1)-like display of filesystem | ||
726 | space and inode utilisation | ||
727 | ok markus@ | ||
728 | - jmc@cvs.openbsd.org 2008/04/18 17:15:47 | ||
729 | [sftp.1] | ||
730 | macro fixage; | ||
731 | - djm@cvs.openbsd.org 2008/04/18 22:01:33 | ||
732 | [session.c] | ||
733 | remove unneccessary parentheses | ||
734 | - otto@cvs.openbsd.org 2008/04/29 11:20:31 | ||
735 | [monitor_mm.h] | ||
736 | garbage collect two unused fields in struct mm_master; ok markus@ | ||
737 | - djm@cvs.openbsd.org 2008/04/30 10:14:03 | ||
738 | [ssh-keyscan.1 ssh-keyscan.c] | ||
739 | default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by | ||
740 | larsnooden AT openoffice.org | ||
741 | - pyr@cvs.openbsd.org 2008/05/07 05:49:37 | ||
742 | [servconf.c servconf.h session.c sshd_config.5] | ||
743 | Enable the AllowAgentForwarding option in sshd_config (global and match | ||
744 | context), to specify if agents should be permitted on the server. | ||
745 | As the man page states: | ||
746 | ``Note that disabling Agent forwarding does not improve security | ||
747 | unless users are also denied shell access, as they can always install | ||
748 | their own forwarders.'' | ||
749 | ok djm@, ok and a mild frown markus@ | ||
750 | - pyr@cvs.openbsd.org 2008/05/07 06:43:35 | ||
751 | [sshd_config] | ||
752 | push the sshd_config bits in, spotted by ajacoutot@ | ||
753 | - jmc@cvs.openbsd.org 2008/05/07 08:00:14 | ||
754 | [sshd_config.5] | ||
755 | sort; | ||
756 | - markus@cvs.openbsd.org 2008/05/08 06:59:01 | ||
757 | [bufaux.c buffer.h channels.c packet.c packet.h] | ||
758 | avoid extra malloc/copy/free when receiving data over the net; | ||
759 | ~10% speedup for localhost-scp; ok djm@ | ||
760 | - djm@cvs.openbsd.org 2008/05/08 12:02:23 | ||
761 | [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c] | ||
762 | [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c] | ||
763 | [ssh.c sshd.c] | ||
764 | Implement a channel success/failure status confirmation callback | ||
765 | mechanism. Each channel maintains a queue of callbacks, which will | ||
766 | be drained in order (RFC4253 guarantees confirm messages are not | ||
767 | reordered within an channel). | ||
768 | Also includes a abandonment callback to clean up if a channel is | ||
769 | closed without sending confirmation messages. This probably | ||
770 | shouldn't happen in compliant implementations, but it could be | ||
771 | abused to leak memory. | ||
772 | ok markus@ (as part of a larger diff) | ||
773 | - djm@cvs.openbsd.org 2008/05/08 12:21:16 | ||
774 | [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c] | ||
775 | [sshd_config sshd_config.5] | ||
776 | Make the maximum number of sessions run-time controllable via | ||
777 | a sshd_config MaxSessions knob. This is useful for disabling | ||
778 | login/shell/subsystem access while leaving port-forwarding working | ||
779 | (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or | ||
780 | simply increasing the number of allows multiplexed sessions. | ||
781 | Because some bozos are sure to configure MaxSessions in excess of the | ||
782 | number of available file descriptors in sshd (which, at peak, might be | ||
783 | as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds | ||
784 | on error paths, and make it fail gracefully on out-of-fd conditions - | ||
785 | sending channel errors instead of than exiting with fatal(). | ||
786 | bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com | ||
787 | ok markus@ | ||
788 | - djm@cvs.openbsd.org 2008/05/08 13:06:11 | ||
789 | [clientloop.c clientloop.h ssh.c] | ||
790 | Use new channel status confirmation callback system to properly deal | ||
791 | with "important" channel requests that fail, in particular command exec, | ||
792 | shell and subsystem requests. Previously we would optimistically assume | ||
793 | that the requests would always succeed, which could cause hangs if they | ||
794 | did not (e.g. when the server runs out of fds) or were unimplemented by | ||
795 | the server (bz #1384) | ||
796 | Also, properly report failing multiplex channel requests via the mux | ||
797 | client stderr (subject to LogLevel in the mux master) - better than | ||
798 | silently failing. | ||
799 | most bits ok markus@ (as part of a larger diff) | ||
800 | - djm@cvs.openbsd.org 2008/05/09 04:55:56 | ||
801 | [channels.c channels.h clientloop.c serverloop.c] | ||
802 | Try additional addresses when connecting to a port forward destination | ||
803 | whose DNS name resolves to more than one address. The previous behaviour | ||
804 | was to try the first address and give up. | ||
805 | Reported by stig AT venaas.com in bz#343 | ||
806 | great feedback and ok markus@ | ||
807 | - djm@cvs.openbsd.org 2008/05/09 14:18:44 | ||
808 | [clientloop.c clientloop.h ssh.c mux.c] | ||
809 | tidy up session multiplexing code, moving it into its own file and | ||
810 | making the function names more consistent - making ssh.c and | ||
811 | clientloop.c a fair bit more readable. | ||
812 | ok markus@ | ||
813 | - djm@cvs.openbsd.org 2008/05/09 14:26:08 | ||
814 | [ssh.c] | ||
815 | dingo stole my diff hunk | ||
816 | - markus@cvs.openbsd.org 2008/05/09 16:16:06 | ||
817 | [session.c] | ||
818 | re-add the USE_PIPES code and enable it. | ||
819 | without pipes shutdown-read from the sshd does not trigger | ||
820 | a SIGPIPE when the forked program does a write. | ||
821 | ok djm@ | ||
822 | (Id sync only, USE_PIPES never left portable OpenSSH) | ||
823 | - markus@cvs.openbsd.org 2008/05/09 16:17:51 | ||
824 | [channels.c] | ||
825 | error-fd race: don't enable the error fd in the select bitmask | ||
826 | for channels with both in- and output closed, since the channel | ||
827 | will go away before we call select(); | ||
828 | report, lots of debugging help and ok djm@ | ||
829 | - markus@cvs.openbsd.org 2008/05/09 16:21:13 | ||
830 | [channels.h clientloop.c nchan.c serverloop.c] | ||
831 | unbreak | ||
832 | ssh -2 localhost od /bin/ls | true | ||
833 | ignoring SIGPIPE by adding a new channel message (EOW) that signals | ||
834 | the peer that we're not interested in any data it might send. | ||
835 | fixes bz #85; discussion, debugging and ok djm@ | ||
836 | - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20 | ||
837 | [umac.c] | ||
838 | Ensure nh_result lies on a 64-bit boundary (fixes warnings observed | ||
839 | on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@ | ||
840 | - djm@cvs.openbsd.org 2008/05/15 23:52:24 | ||
841 | [nchan2.ms] | ||
842 | document eow message in ssh protocol 2 channel state machine; | ||
843 | feedback and ok markus@ | ||
844 | - djm@cvs.openbsd.org 2008/05/18 21:29:05 | ||
845 | [sftp-server.c] | ||
846 | comment extension announcement | ||
847 | - djm@cvs.openbsd.org 2008/05/16 08:30:42 | ||
848 | [PROTOCOL] | ||
849 | document our protocol extensions and deviations; ok markus@ | ||
850 | - djm@cvs.openbsd.org 2008/05/17 01:31:56 | ||
851 | [PROTOCOL] | ||
852 | grammar and correctness fixes from stevesk@ | ||
853 | |||
854 | 20080403 | ||
855 | - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile- | ||
856 | time warnings on LynxOS. Patch from ops AT iki.fi | ||
857 | - (djm) Force string arguments to replacement setproctitle() though | ||
858 | strnvis first. Ok dtucker@ | ||
859 | |||
860 | 20080403 | ||
861 | - (djm) OpenBSD CVS sync: | ||
862 | - markus@cvs.openbsd.org 2008/04/02 15:36:51 | ||
863 | [channels.c] | ||
864 | avoid possible hijacking of x11-forwarded connections (back out 1.183) | ||
865 | CVE-2008-1483; ok djm@ | ||
866 | - jmc@cvs.openbsd.org 2008/03/27 22:37:57 | ||
867 | [sshd.8] | ||
868 | remove trailing whitespace; | ||
869 | - djm@cvs.openbsd.org 2008/04/03 09:50:14 | ||
870 | [version.h] | ||
871 | openssh-5.0 | ||
872 | - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] | ||
873 | [contrib/suse/openssh.spec] Crank version numbers in RPM spec files | ||
874 | - (djm) [README] Update link to release notes | ||
875 | - (djm) Release 5.0p1 | ||
876 | |||
877 | 20080315 | ||
878 | - (djm) [regress/test-exec.sh] Quote putty-related variables in case they are | ||
879 | empty; report and patch from Peter Stuge | ||
880 | - (djm) [regress/test-exec.sh] Silence noise from detection of putty | ||
881 | commands; report from Peter Stuge | ||
882 | - (djm) [session.c] Relocate incorrectly-placed closefrom() that was causing | ||
883 | crashes when used with ChrootDirectory | ||
884 | |||
885 | |||
886 | 20080327 | ||
887 | - (dtucker) Cache selinux status earlier so we know if it's enabled after a | ||
888 | chroot. Allows ChrootDirectory to work with selinux support compiled in | ||
889 | but not enabled. Using it with selinux enabled will require some selinux | ||
890 | support inside the chroot. "looks sane" djm@ | ||
891 | - (djm) Fix RCS ident in sftp-server-main.c | ||
892 | - (djm) OpenBSD CVS sync: | ||
893 | - jmc@cvs.openbsd.org 2008/02/11 07:58:28 | ||
894 | [ssh.1 sshd.8 sshd_config.5] | ||
895 | bump Mdocdate for pages committed in "febuary", necessary because | ||
896 | of a typo in rcs.c; | ||
897 | - deraadt@cvs.openbsd.org 2008/03/13 01:49:53 | ||
898 | [monitor_fdpass.c] | ||
899 | Correct CMSG_SPACE and CMSG_LEN usage everywhere in the tree. Due to | ||
900 | an extensive discussion with otto, kettenis, millert, and hshoexer | ||
901 | - deraadt@cvs.openbsd.org 2008/03/15 16:19:02 | ||
902 | [monitor_fdpass.c] | ||
903 | Repair the simple cases for msg_controllen where it should just be | ||
904 | CMSG_SIZE(sizeof(int)), not sizeof(buffer) which may be larger because | ||
905 | of alignment; ok kettenis hshoexer | ||
906 | - djm@cvs.openbsd.org 2008/03/23 12:54:01 | ||
907 | [sftp-client.c] | ||
908 | prefer POSIX-style file renaming over filexfer rename behaviour if the | ||
909 | server supports the posix-rename@openssh.com extension. | ||
910 | Note that the old (filexfer) behaviour would refuse to clobber an | ||
911 | existing file. Users who depended on this should adjust their sftp(1) | ||
912 | usage. | ||
913 | ok deraadt@ markus@ | ||
914 | - deraadt@cvs.openbsd.org 2008/03/24 16:11:07 | ||
915 | [monitor_fdpass.c] | ||
916 | msg_controllen has to be CMSG_SPACE so that the kernel can account for | ||
917 | each cmsg_len (ie. msg_controllen = sum of CMSG_ALIGN(cmsg_len). This | ||
918 | works now that kernel fd passing has been fixed to accept a bit of | ||
919 | sloppiness because of this ABI repair. | ||
920 | lots of discussion with kettenis | ||
921 | - djm@cvs.openbsd.org 2008/03/25 11:58:02 | ||
922 | [session.c sshd_config.5] | ||
923 | ignore ~/.ssh/rc if a sshd_config ForceCommand is specified; | ||
924 | from dtucker@ ok deraadt@ djm@ | ||
925 | - djm@cvs.openbsd.org 2008/03/25 23:01:41 | ||
926 | [session.c] | ||
927 | last patch had backwards test; spotted by termim AT gmail.com | ||
928 | - djm@cvs.openbsd.org 2008/03/26 21:28:14 | ||
929 | [auth-options.c auth-options.h session.c sshd.8] | ||
930 | add no-user-rc authorized_keys option to disable execution of ~/.ssh/rc | ||
931 | - djm@cvs.openbsd.org 2008/03/27 00:16:49 | ||
932 | [version.h] | ||
933 | openssh-4.9 | ||
934 | - djm@cvs.openbsd.org 2008/03/24 21:46:54 | ||
935 | [regress/sftp-badcmds.sh] | ||
936 | disable no-replace rename test now that we prefer a POSIX rename; spotted | ||
937 | by dkrause@ | ||
938 | - (djm) [configure.ac] fix alignment of --without-stackprotect description | ||
939 | - (djm) [configure.ac] --with-selinux too | ||
940 | - (djm) [regress/Makefile] cleanup PuTTY interop test droppings | ||
941 | - (djm) [README] Update link to release notes | ||
942 | - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] | ||
943 | [contrib/suse/openssh.spec] Crank version numbers in RPM spec files | ||
944 | - (djm) Release 4.9p1 | ||
945 | |||
946 | 20080315 | ||
947 | - (djm) [regress/test-exec.sh] Quote putty-related variables in case they are | ||
948 | empty; report and patch from Peter Stuge | ||
949 | - (djm) [regress/test-exec.sh] Silence noise from detection of putty | ||
950 | commands; report from Peter Stuge | ||
951 | - (djm) [session.c] Relocate incorrectly-placed closefrom() that was causing | ||
952 | crashes when used with ChrootDirectory | ||
953 | |||
954 | 20080314 | ||
955 | - (tim) [regress/sftp-cmds.sh] s/cd/lcd/ in lls test. Reported by | ||
956 | vinschen at redhat.com. Add () to put echo commands in subshell for lls test | ||
957 | I mistakenly left out of last commit. | ||
958 | - (tim) [regress/localcommand.sh] Shell portability fix. Reported by imorgan at | ||
959 | nas.nasa.gov | ||
960 | |||
961 | 20080313 | ||
962 | - (djm) [Makefile.in regress/Makefile] Fix interop-tests target (note to | ||
963 | self: make changes to Makefile.in next time, not the generated Makefile). | ||
964 | - (djm) [Makefile.in regress/test-exec.sh] Find installed plink(1) and | ||
965 | puttygen(1) by $PATH | ||
966 | - (tim) [scp.c] Use poll.h if available, fall back to sys/poll.h if not. Patch | ||
967 | by vinschen at redhat.com. | ||
968 | - (tim) [regress/sftp-cmds.sh regress/ssh2putty.sh] Shell portability fixes | ||
969 | from vinschen at redhat.com and imorgan at nas.nasa.gov | ||
970 | |||
971 | 20080312 | ||
972 | - (djm) OpenBSD CVS Sync | ||
973 | - dtucker@cvs.openbsd.org 2007/10/29 06:57:13 | ||
974 | [regress/Makefile regress/localcommand.sh] | ||
975 | Add simple regress test for LocalCommand; ok djm@ | ||
976 | - jmc@cvs.openbsd.org 2007/11/25 15:35:09 | ||
977 | [regress/agent-getpeereid.sh regress/agent.sh] | ||
978 | more existant -> existent, from Martynas Venckus; | ||
979 | pfctl changes: ok henning | ||
980 | ssh changes: ok deraadt | ||
981 | - djm@cvs.openbsd.org 2007/12/12 05:04:03 | ||
982 | [regress/sftp-cmds.sh] | ||
983 | unbreak lls command and add a regress test that would have caught the | ||
984 | breakage; spotted by mouring@ | ||
985 | NB. sftp code change already committed. | ||
986 | - djm@cvs.openbsd.org 2007/12/21 04:13:53 | ||
987 | [regress/Makefile regress/test-exec.sh regress/putty-ciphers.sh] | ||
988 | [regress/putty-kex.sh regress/putty-transfer.sh regress/ssh2putty.sh] | ||
989 | basic (crypto, kex and transfer) interop regression tests against putty | ||
990 | To run these, install putty and run "make interop-tests" from the build | ||
991 | directory - the tests aren't run by default yet. | ||
992 | |||
993 | 20080311 | ||
994 | - (dtucker) [auth-pam.c monitor.c session.c sshd.c] Bug #926: Move | ||
995 | pam_open_session and pam_close_session into the privsep monitor, which | ||
996 | will ensure that pam_session_close is called as root. Patch from Tomas | ||
997 | Mraz. | ||
998 | |||
999 | 20080309 | ||
1000 | - (dtucker) [configure.ac] It turns out gcc's -fstack-protector-all doesn't | ||
1001 | always work for all platforms and versions, so test what we can and | ||
1002 | add a configure flag to turn it of if needed. ok djm@ | ||
1003 | - (dtucker) [openbsd-compat/port-aix.{c,h}] Remove AIX specific initgroups | ||
1004 | implementation. It's not needed to fix bug #1081 and breaks the build | ||
1005 | on some AIX configurations. | ||
1006 | - (dtucker) [openbsd-compat/regress/strtonumtest.c] Bug #1347: Use platform's | ||
1007 | equivalent of LLONG_MAX for the compat regression tests, which makes them | ||
1008 | run on AIX and HP-UX. Patch from David Leonard. | ||
1009 | - (dtucker) [configure.ac] Run stack-protector tests with -Werror to catch | ||
1010 | platforms where gcc understands the option but it's not supported (and | ||
1011 | thus generates a warning). | ||
1012 | |||
1013 | 20080307 | ||
1014 | - (djm) OpenBSD CVS Sync | ||
1015 | - jmc@cvs.openbsd.org 2008/02/11 07:58:28 | ||
1016 | [ssh.1 sshd.8 sshd_config.5] | ||
1017 | bump Mdocdate for pages committed in "febuary", necessary because | ||
1018 | of a typo in rcs.c; | ||
1019 | - djm@cvs.openbsd.org 2008/02/13 22:38:17 | ||
1020 | [servconf.h session.c sshd.c] | ||
1021 | rekey arc4random and OpenSSL RNG in postauth child | ||
1022 | closefrom fds > 2 before shell/command execution | ||
1023 | ok markus@ | ||
1024 | - mbalmer@cvs.openbsd.org 2008/02/14 13:10:31 | ||
1025 | [sshd.c] | ||
1026 | When started in configuration test mode (-t) do not check that sshd is | ||
1027 | being started with an absolute path. | ||
1028 | ok djm | ||
1029 | - markus@cvs.openbsd.org 2008/02/20 15:25:26 | ||
1030 | [session.c] | ||
1031 | correct boolean encoding for coredump; der Mouse via dugsong | ||
1032 | - djm@cvs.openbsd.org 2008/02/22 05:58:56 | ||
1033 | [session.c] | ||
1034 | closefrom() call was too early, delay it until just before we execute | ||
1035 | the user's rc files (if any). | ||
1036 | - dtucker@cvs.openbsd.org 2008/02/22 20:44:02 | ||
1037 | [clientloop.c packet.c packet.h serverloop.c] | ||
1038 | Allow all SSH2 packet types, including UNIMPLEMENTED to reset the | ||
1039 | keepalive timer (bz #1307). ok markus@ | ||
1040 | - djm@cvs.openbsd.org 2008/02/27 20:21:15 | ||
1041 | [sftp-server.c] | ||
1042 | add an extension method "posix-rename@openssh.com" to perform POSIX atomic | ||
1043 | rename() operations. based on patch from miklos AT szeredi.hu in bz#1400; | ||
1044 | ok dtucker@ markus@ | ||
1045 | - deraadt@cvs.openbsd.org 2008/03/02 18:19:35 | ||
1046 | [monitor_fdpass.c] | ||
1047 | use a union to ensure alignment of the cmsg (pay attention: various other | ||
1048 | parts of the tree need this treatment too); ok djm | ||
1049 | - deraadt@cvs.openbsd.org 2008/03/04 21:15:42 | ||
1050 | [version.h] | ||
1051 | crank version; from djm | ||
1052 | - (tim) [regress/sftp-glob.sh] Shell portability fix. | ||
1053 | |||
1054 | 20080302 | ||
1055 | - (dtucker) [configure.ac] FreeBSD's glob() doesn't behave the way we expect | ||
1056 | either, so use our own. | ||
1057 | |||
1058 | 20080229 | ||
1059 | - (dtucker) [openbsd-compat/bsd-poll.c] We don't check for select(2) in | ||
1060 | configure (and there's not much point, as openssh won't work without it) | ||
1061 | so HAVE_SELECT is not defined and the poll(2) compat code doesn't get | ||
1062 | built in. Remove HAVE_SELECT so we can build on platforms without poll. | ||
1063 | - (dtucker) [scp.c] Include sys/poll.h inside HAVE_SYS_POLL_H. | ||
1064 | - (djm) [contrib/gnome-ssh-askpass2.h] Keep askpass windown on top. From | ||
1065 | Debian patch via bernd AT openbsd.org | ||
1066 | |||
1067 | 20080228 | ||
1068 | - (dtucker) [configure.ac] Add -fstack-protector to LDFLAGS too, fixes | ||
1069 | linking problems on AIX with gcc 4.1.x. | ||
1070 | - (dtucker) [includes.h ssh-add.c ssh-agent.c ssh-keygen.c ssh.c sshd.c | ||
1071 | openbsd-compat/openssl-compat.{c,h}] Bug #1437 Move the OpenSSL compat | ||
1072 | header to after OpenSSL headers, since some versions of OpenSSL have | ||
1073 | SSLeay_add_all_algorithms as a macro already. | ||
1074 | - (dtucker) [key.c defines.h openbsd-compat/openssl-compat.h] Move old OpenSSL | ||
1075 | compat glue into openssl-compat.h. | ||
1076 | - (dtucker) [configure.ac openbsd-compat/port-aix.{c,h}] Bug #1081: Implement | ||
1077 | getgrouplist via getgrset on AIX, rather than iterating over getgrent. | ||
1078 | This allows, eg, Match and AllowGroups directives to work with NIS and | ||
1079 | LDAP groups. | ||
1080 | - (dtucker) [sshd.c] Bug #1042: make log messages for tcpwrappers use the | ||
1081 | same SyslogFacility as the rest of sshd. Patch from William Knox, | ||
1082 | ok djm@. | ||
1083 | |||
1084 | 20080225 | ||
1085 | - (dtucker) [openbsd-compat/fake-rfc2553.h] rename ssh_gai_strerror hack | ||
1086 | since it now conflicts with the helper function in misc.c. From | ||
1087 | vinschen AT redhat.com. | ||
1088 | - (dtucker) [configure.ac audit-bsm.c] Bug #1420: Add a local implementation | ||
1089 | of aug_get_machine for systems that don't have their own (eg OS X, FreeBSD). | ||
1090 | Help and testing from csjp at FreeBSD org, vgiffin at apple com. ok djm@ | ||
1091 | - (dtucker) [includes.h openbsd-compat/openssl-compat.c] Bug #1437: reshuffle | ||
1092 | headers so ./configure --with-ssl-engine actually works. Patch from | ||
1093 | Ian Lister. | ||
1094 | |||
1095 | 20080224 | ||
1096 | - (tim) [contrib/cygwin/ssh-host-config] | ||
1097 | Grammar changes on SYSCONFDIR LOCALSTATEDIR messages. | ||
1098 | Check more thoroughly that it's possible to create the /var/empty directory. | ||
1099 | Patch by vinschen AT redhat.com | ||
1100 | |||
1101 | 20080210 | ||
1102 | - OpenBSD CVS Sync | ||
1103 | - chl@cvs.openbsd.org 2008/01/11 07:22:28 | ||
1104 | [sftp-client.c sftp-client.h] | ||
1105 | disable unused functions | ||
1106 | initially from tobias@, but disabled them by placing them in | ||
1107 | "#ifdef notyet" which was asked by djm@ | ||
1108 | ok djm@ tobias@ | ||
1109 | - djm@cvs.openbsd.org 2008/01/19 19:13:28 | ||
1110 | [ssh.1] | ||
1111 | satisfy the pedants: -q does not suppress all diagnostic messages (e.g. | ||
1112 | some commandline parsing warnings go unconditionally to stdout). | ||
1113 | - djm@cvs.openbsd.org 2008/01/19 20:48:53 | ||
1114 | [clientloop.c] | ||
1115 | fd leak on session multiplexing error path. Report and patch from | ||
1116 | gregory_shively AT fanniemae.com | ||
1117 | - djm@cvs.openbsd.org 2008/01/19 20:51:26 | ||
1118 | [ssh.c] | ||
1119 | ignore SIGPIPE in multiplex client mode - we can receive this if the | ||
1120 | server runs out of fds on us midway. Report and patch from | ||
1121 | gregory_shively AT fanniemae.com | ||
1122 | - djm@cvs.openbsd.org 2008/01/19 22:04:57 | ||
1123 | [sftp-client.c] | ||
1124 | fix remote handle leak in do_download() local file open error path; | ||
1125 | report and fix from sworley AT chkno.net | ||
1126 | - djm@cvs.openbsd.org 2008/01/19 22:22:58 | ||
1127 | [ssh-keygen.c] | ||
1128 | when hashing individual hosts (ssh-keygen -Hf hostname), make sure we | ||
1129 | hash just the specified hostname and not the entire hostspec from the | ||
1130 | keyfile. It may be of the form "hostname,ipaddr", which would lead to | ||
1131 | a hash that never matches. report and fix from jp AT devnull.cz | ||
1132 | - djm@cvs.openbsd.org 2008/01/19 22:37:19 | ||
1133 | [ssh-keygen.c] | ||
1134 | unbreak line numbering (broken in revision 1.164), fix error message | ||
1135 | - djm@cvs.openbsd.org 2008/01/19 23:02:40 | ||
1136 | [channels.c] | ||
1137 | When we added support for specified bind addresses for port forwards, we | ||
1138 | added a quirk SSH_OLD_FORWARD_ADDR. There is a bug in our handling of | ||
1139 | this for -L port forwards that causes the client to listen on both v4 | ||
1140 | and v6 addresses when connected to a server with this quirk, despite | ||
1141 | having set 0.0.0.0 as a bind_address. | ||
1142 | report and patch from Jan.Pechanec AT Sun.COM; ok dtucker@ | ||
1143 | - djm@cvs.openbsd.org 2008/01/19 23:09:49 | ||
1144 | [readconf.c readconf.h sshconnect2.c] | ||
1145 | promote rekeylimit to a int64 so it can hold the maximum useful limit | ||
1146 | of 2^32; report and patch from Jan.Pechanec AT Sun.COM, ok dtucker@ | ||
1147 | - djm@cvs.openbsd.org 2008/01/20 00:38:30 | ||
1148 | [sftp.c] | ||
1149 | When uploading, correctly handle the case of an unquoted filename with | ||
1150 | glob metacharacters that match a file exactly but not as a glob, e.g. a | ||
1151 | file called "[abcd]". report and test cases from duncan2nd AT gmx.de | ||
1152 | - djm@cvs.openbsd.org 2008/01/21 17:24:30 | ||
1153 | [sftp-server.c] | ||
1154 | Remove the fixed 100 handle limit in sftp-server and allocate as many | ||
1155 | as we have available file descriptors. Patch from miklos AT szeredi.hu; | ||
1156 | ok dtucker@ markus@ | ||
1157 | - djm@cvs.openbsd.org 2008/01/21 19:20:17 | ||
1158 | [sftp-client.c] | ||
1159 | when a remote write error occurs during an upload, ensure that ACKs for | ||
1160 | all issued requests are properly drained. patch from t8m AT centrum.cz | ||
1161 | - dtucker@cvs.openbsd.org 2008/01/23 01:56:54 | ||
1162 | [clientloop.c packet.c serverloop.c] | ||
1163 | Revert the change for bz #1307 as it causes connection aborts if an IGNORE | ||
1164 | packet arrives while we're waiting in packet_read_expect (and possibly | ||
1165 | elsewhere). | ||
1166 | - jmc@cvs.openbsd.org 2008/01/31 20:06:50 | ||
1167 | [scp.1] | ||
1168 | explain how to handle local file names containing colons; | ||
1169 | requested by Tamas TEVESZ | ||
1170 | ok dtucker | ||
1171 | - markus@cvs.openbsd.org 2008/02/04 21:53:00 | ||
1172 | [session.c sftp-server.c sftp.h] | ||
1173 | link sftp-server into sshd; feedback and ok djm@ | ||
1174 | - mcbride@cvs.openbsd.org 2008/02/09 12:15:43 | ||
1175 | [ssh.1 sshd.8] | ||
1176 | Document the correct permissions for the ~/.ssh/ directory. | ||
1177 | ok jmc | ||
1178 | - djm@cvs.openbsd.org 2008/02/10 09:55:37 | ||
1179 | [sshd_config.5] | ||
1180 | mantion that "internal-sftp" is useful with ForceCommand too | ||
1181 | - djm@cvs.openbsd.org 2008/02/10 10:54:29 | ||
1182 | [servconf.c session.c] | ||
1183 | delay ~ expansion for ChrootDirectory so it expands to the logged-in user's | ||
1184 | home, rather than the user who starts sshd (probably root) | ||
1185 | |||
1186 | 20080119 | ||
1187 | - (djm) Silence noice from expr in ssh-copy-id; patch from | ||
1188 | mikel AT mikelward.com | ||
1189 | - (djm) Only listen for IPv6 connections on AF_INET6 sockets; patch from | ||
1190 | tsr2600 AT gmail.com | ||
1191 | |||
1192 | 20080102 | ||
1193 | - (dtucker) [configure.ac] Fix message for -fstack-protector-all test. | ||
1194 | |||
1195 | 20080101 | ||
1196 | - (dtucker) OpenBSD CVS Sync | ||
1197 | - dtucker@cvs.openbsd.org 2007/12/31 10:41:31 | ||
1198 | [readconf.c servconf.c] | ||
1199 | Prevent strict-aliasing warnings on newer gcc versions. bz #1355, patch | ||
1200 | from Dmitry V. Levin, ok djm@ | ||
1201 | - dtucker@cvs.openbsd.org 2007/12/31 15:27:04 | ||
1202 | [sshd.c] | ||
1203 | When in inetd mode, have sshd generate a Protocol 1 ephemeral server | ||
1204 | key only for connections where the client chooses Protocol 1 as opposed | ||
1205 | to when it's enabled in the server's config. Speeds up Protocol 2 | ||
1206 | connections to inetd-mode servers that also allow Protocol 1. bz #440, | ||
1207 | based on a patch from bruno at wolff.to, ok markus@ | ||
1208 | - dtucker@cvs.openbsd.org 2008/01/01 08:47:04 | ||
1209 | [misc.c] | ||
1210 | spaces -> tabs from my previous commit | ||
1211 | - dtucker@cvs.openbsd.org 2008/01/01 09:06:39 | ||
1212 | [scp.c] | ||
1213 | If scp -p encounters a pre-epoch timestamp, use the epoch which is | ||
1214 | as close as we can get given that it's used unsigned. Add a little | ||
1215 | debugging while there. bz #828, ok djm@ | ||
1216 | - dtucker@cvs.openbsd.org 2008/01/01 09:27:33 | ||
1217 | [sshd_config.5 servconf.c] | ||
1218 | Allow PermitRootLogin in a Match block. Allows for, eg, permitting root | ||
1219 | only from the local network. ok markus@, man page bit ok jmc@ | ||
1220 | - dtucker@cvs.openbsd.org 2008/01/01 08:51:20 | ||
1221 | [moduli] | ||
1222 | Updated moduli file; ok djm@ | ||
1223 | |||
1224 | 20071231 | ||
1225 | - (dtucker) [configure.ac openbsd-compat/glob.{c,h}] Bug #1407: force use of | ||
1226 | builtin glob implementation on Mac OS X. Based on a patch from | ||
1227 | vgiffin at apple. | ||
1228 | |||
1229 | 20071229 | ||
1230 | - (dtucker) OpenBSD CVS Sync | ||
1231 | - djm@cvs.openbsd.org 2007/12/12 05:04:03 | ||
1232 | [sftp.c] | ||
1233 | unbreak lls command and add a regress test that would have caught the | ||
1234 | breakage; spotted by mouring@ | ||
1235 | - dtucker@cvs.openbsd.org 2007/12/27 14:22:08 | ||
1236 | [servconf.c canohost.c misc.c channels.c sshconnect.c misc.h ssh-keyscan.c | ||
1237 | sshd.c] | ||
1238 | Add a small helper function to consistently handle the EAI_SYSTEM error | ||
1239 | code of getaddrinfo. Prompted by vgiffin at apple com via bz #1417. | ||
1240 | ok markus@ stevesk@ | ||
1241 | - dtucker@cvs.openbsd.org 2007/12/28 15:32:24 | ||
1242 | [clientloop.c serverloop.c packet.c] | ||
1243 | Make SSH2_MSG_UNIMPLEMENTED and SSH2_MSG_IGNORE messages reset the | ||
1244 | ServerAlive and ClientAlive timers. Prevents dropping a connection | ||
1245 | when these are enabled but the peer does not support our keepalives. | ||
1246 | bz #1307, ok djm@. | ||
1247 | - dtucker@cvs.openbsd.org 2007/12/28 22:34:47 | ||
1248 | [clientloop.c] | ||
1249 | Use the correct packet maximum sizes for remote port and agent forwarding. | ||
1250 | Prevents the server from killing the connection if too much data is queued | ||
1251 | and an excessively large packet gets sent. bz #1360, ok djm@. | ||
1252 | |||
1253 | 20071202 | ||
1254 | - (dtucker) [configure.ac] Enable -fstack-protector-all on systems where | ||
1255 | gcc supports it. ok djm@ | ||
1256 | - (dtucker) [scp.c] Update $OpenBSD tag missing from rev 1.175 and remove | ||
1257 | leftover debug code. | ||
1258 | - (dtucker) OpenBSD CVS Sync | ||
1259 | - dtucker@cvs.openbsd.org 2007/10/29 00:52:45 | ||
1260 | [auth2-gss.c] | ||
1261 | Allow build without -DGSSAPI; ok deraadt@ | ||
1262 | (Id sync only, Portable already has the ifdefs) | ||
1263 | - dtucker@cvs.openbsd.org 2007/10/29 01:55:04 | ||
1264 | [ssh.c] | ||
1265 | Plug tiny mem leaks in ControlPath and ProxyCommand option processing; | ||
1266 | ok djm@ | ||
1267 | - dtucker@cvs.openbsd.org 2007/10/29 04:08:08 | ||
1268 | [monitor_wrap.c monitor.c] | ||
1269 | Send config block back to slave for invalid users too so options | ||
1270 | set by a Match block (eg Banner) behave the same for non-existent | ||
1271 | users. Found by and ok djm@ | ||
1272 | - dtucker@cvs.openbsd.org 2007/10/29 06:51:59 | ||
1273 | [ssh_config.5] | ||
1274 | ProxyCommand and LocalCommand use the user's shell, not /bin/sh; ok djm@ | ||
1275 | - dtucker@cvs.openbsd.org 2007/10/29 06:54:50 | ||
1276 | [ssh.c] | ||
1277 | Make LocalCommand work for Protocol 1 too; ok djm@ | ||
1278 | - jmc@cvs.openbsd.org 2007/10/29 07:48:19 | ||
1279 | [ssh_config.5] | ||
1280 | clean up after previous macro removal; | ||
1281 | - djm@cvs.openbsd.org 2007/11/03 00:36:14 | ||
1282 | [clientloop.c] | ||
1283 | fix memory leak in process_cmdline(), patch from Jan.Pechanec AT Sun.COM; | ||
1284 | ok dtucker@ | ||
1285 | - deraadt@cvs.openbsd.org 2007/11/03 01:24:06 | ||
1286 | [ssh.c] | ||
1287 | bz #1377: getpwuid results were being clobbered by another getpw* call | ||
1288 | inside tilde_expand_filename(); save the data we need carefully | ||
1289 | ok djm | ||
1290 | - dtucker@cvs.openbsd.org 2007/11/03 02:00:32 | ||
1291 | [ssh.c] | ||
1292 | Use xstrdup/xfree when saving pwname and pwdir; ok deraadt@ | ||
1293 | - deraadt@cvs.openbsd.org 2007/11/03 02:03:49 | ||
1294 | [ssh.c] | ||
1295 | avoid errno trashing in signal handler; ok dtucker | ||
1296 | |||
1297 | 20071030 | ||
1298 | - (djm) OpenBSD CVS Sync | ||
1299 | - djm@cvs.openbsd.org 2007/10/29 23:49:41 | ||
1300 | [openbsd-compat/sys-tree.h] | ||
1301 | remove extra backslash at the end of RB_PROTOTYPE, report from | ||
1302 | Jan.Pechanec AT Sun.COM; ok deraadt@ | ||
1303 | |||
1304 | 20071026 | ||
1305 | - (djm) OpenBSD CVS Sync | ||
1306 | - stevesk@cvs.openbsd.org 2007/09/11 23:49:09 | ||
1307 | [sshpty.c] | ||
1308 | remove #if defined block not needed; ok markus@ dtucker@ | ||
1309 | (NB. RCD ID sync only for portable) | ||
1310 | - djm@cvs.openbsd.org 2007/09/21 03:05:23 | ||
1311 | [ssh_config.5] | ||
1312 | document KbdInteractiveAuthentication in ssh_config.5; | ||
1313 | patch from dkg AT fifthhorseman.net | ||
1314 | - djm@cvs.openbsd.org 2007/09/21 08:15:29 | ||
1315 | [auth-bsdauth.c auth-passwd.c auth.c auth.h auth1.c auth2-chall.c] | ||
1316 | [monitor.c monitor_wrap.c] | ||
1317 | unifdef -DBSD_AUTH | ||
1318 | unifdef -USKEY | ||
1319 | These options have been in use for some years; | ||
1320 | ok markus@ "no objection" millert@ | ||
1321 | (NB. RCD ID sync only for portable) | ||
1322 | - canacar@cvs.openbsd.org 2007/09/25 23:48:57 | ||
1323 | [ssh-agent.c] | ||
1324 | When adding a key that already exists, update the properties | ||
1325 | (time, confirm, comment) instead of discarding them. ok djm@ markus@ | ||
1326 | - ray@cvs.openbsd.org 2007/09/27 00:15:57 | ||
1327 | [dh.c] | ||
1328 | Don't return -1 on error in dh_pub_is_valid(), since it evaluates | ||
1329 | to true. | ||
1330 | Also fix a typo. | ||
1331 | Initial diff from Matthew Dempsky, input from djm. | ||
1332 | OK djm, markus. | ||
1333 | - dtucker@cvs.openbsd.org 2007/09/29 00:25:51 | ||
1334 | [auth2.c] | ||
1335 | Remove unused prototype. ok djm@ | ||
1336 | - chl@cvs.openbsd.org 2007/10/02 17:49:58 | ||
1337 | [ssh-keygen.c] | ||
1338 | handles zero-sized strings that fgets can return | ||
1339 | properly removes trailing newline | ||
1340 | removes an unused variable | ||
1341 | correctly counts line number | ||
1342 | "looks ok" ray@ markus@ | ||
1343 | - markus@cvs.openbsd.org 2007/10/22 19:10:24 | ||
1344 | [readconf.c] | ||
1345 | make sure that both the local and remote port are correct when | ||
1346 | parsing -L; Jan Pechanec (bz #1378) | ||
1347 | - djm@cvs.openbsd.org 2007/10/24 03:30:02 | ||
1348 | [sftp.c] | ||
1349 | rework argument splitting and parsing to cope correctly with common | ||
1350 | shell escapes and make handling of escaped characters consistent | ||
1351 | with sh(1) and between sftp commands (especially between ones that | ||
1352 | glob their arguments and ones that don't). | ||
1353 | parse command flags using getopt(3) rather than hand-rolled parsers. | ||
1354 | ok dtucker@ | ||
1355 | - djm@cvs.openbsd.org 2007/10/24 03:44:02 | ||
1356 | [scp.c] | ||
1357 | factor out network read/write into an atomicio()-like function, and | ||
1358 | use it to handle short reads, apply bandwidth limits and update | ||
1359 | counters. make network IO non-blocking, so a small trickle of | ||
1360 | reads/writes has a chance of updating the progress meter; bz #799 | ||
1361 | ok dtucker@ | ||
1362 | - djm@cvs.openbsd.org 2006/08/29 09:44:00 | ||
1363 | [regress/sftp-cmds.sh] | ||
1364 | clean up our mess | ||
1365 | - markus@cvs.openbsd.org 2006/11/06 09:27:43 | ||
1366 | [regress/cfgmatch.sh] | ||
1367 | fix quoting for non-(c)sh login shells. | ||
1368 | - dtucker@cvs.openbsd.org 2006/12/13 08:36:36 | ||
1369 | [regress/cfgmatch.sh] | ||
1370 | Additional test for multiple PermitOpen entries. ok djm@ | ||
1371 | - pvalchev@cvs.openbsd.org 2007/06/07 19:41:46 | ||
1372 | [regress/cipher-speed.sh regress/try-ciphers.sh] | ||
1373 | test umac-64@openssh.com | ||
1374 | ok djm@ | ||
1375 | - djm@cvs.openbsd.org 2007/10/24 03:32:35 | ||
1376 | [regress/sftp-cmds.sh regress/sftp-glob.sh regress/test-exec.sh] | ||
1377 | comprehensive tests for sftp escaping its interaction with globbing; | ||
1378 | ok dtucker@ | ||
1379 | - djm@cvs.openbsd.org 2007/10/26 05:30:01 | ||
1380 | [regress/sftp-glob.sh regress/test-exec.sh] | ||
1381 | remove "echo -E" crap that I added in last commit and use printf(1) for | ||
1382 | cases where we strictly require echo not to reprocess escape characters. | ||
1383 | - deraadt@cvs.openbsd.org 2005/11/28 17:50:12 | ||
1384 | [openbsd-compat/glob.c] | ||
1385 | unused arg in internal static API | ||
1386 | - jakob@cvs.openbsd.org 2007/10/11 18:36:41 | ||
1387 | [openbsd-compat/getrrsetbyname.c openbsd-compat/getrrsetbyname.h] | ||
1388 | use RRSIG instead of SIG for DNSSEC. ok djm@ | ||
1389 | - otto@cvs.openbsd.org 2006/10/21 09:55:03 | ||
1390 | [openbsd-compat/base64.c] | ||
1391 | remove calls to abort(3) that can't happen anyway; from | ||
1392 | <bret dot lambert at gmail.com>; ok millert@ deraadt@ | ||
1393 | - frantzen@cvs.openbsd.org 2004/04/24 18:11:46 | ||
1394 | [openbsd-compat/sys-tree.h] | ||
1395 | sync to Niels Provos' version. avoid unused variable warning in | ||
1396 | RB_NEXT() | ||
1397 | - tdeval@cvs.openbsd.org 2004/11/24 18:10:42 | ||
1398 | [openbsd-compat/sys-tree.h] | ||
1399 | typo | ||
1400 | - grange@cvs.openbsd.org 2004/05/04 16:59:32 | ||
1401 | [openbsd-compat/sys-queue.h] | ||
1402 | Remove useless ``elm'' argument from the SIMPLEQ_REMOVE_HEAD macro. | ||
1403 | This matches our SLIST behaviour and NetBSD's SIMPLEQ as well. | ||
1404 | ok millert krw deraadt | ||
1405 | - deraadt@cvs.openbsd.org 2005/02/25 13:29:30 | ||
1406 | [openbsd-compat/sys-queue.h] | ||
1407 | minor white spacing | ||
1408 | - otto@cvs.openbsd.org 2005/10/17 20:19:42 | ||
1409 | [openbsd-compat/sys-queue.h] | ||
1410 | Performing certain operations on queue.h data structurs produced | ||
1411 | funny results. An example is calling LIST_REMOVE on the same | ||
1412 | element twice. This will not fail, but result in a data structure | ||
1413 | referencing who knows what. Prevent these accidents by NULLing some | ||
1414 | fields on remove and replace. This way, either a panic or segfault | ||
1415 | will be produced on the faulty operation. | ||
1416 | - otto@cvs.openbsd.org 2005/10/24 20:25:14 | ||
1417 | [openbsd-compat/sys-queue.h] | ||
1418 | Partly backout. NOLIST, used in LISTs is probably interfering. | ||
1419 | requested by deraadt@ | ||
1420 | - otto@cvs.openbsd.org 2005/10/25 06:37:47 | ||
1421 | [openbsd-compat/sys-queue.h] | ||
1422 | Some uvm problem is being exposed with the more strict macros. | ||
1423 | Revert until we've found out what's causing the panics. | ||
1424 | - otto@cvs.openbsd.org 2005/11/25 08:06:25 | ||
1425 | [openbsd-compat/sys-queue.h] | ||
1426 | Introduce debugging aid for queue macros. Disabled by default; but | ||
1427 | developers are encouraged to run with this enabled. | ||
1428 | ok krw@ fgsch@ deraadt@ | ||
1429 | - otto@cvs.openbsd.org 2007/04/30 18:42:34 | ||
1430 | [openbsd-compat/sys-queue.h] | ||
1431 | Enable QUEUE_MACRO_DEBUG on DIAGNOSTIC kernels. | ||
1432 | Input and okays from krw@, millert@, otto@, deraadt@, miod@. | ||
1433 | - millert@cvs.openbsd.org 2004/10/07 16:56:11 | ||
1434 | GLOB_NOESCAPE is POSIX so move it out of the #ifndef _POSIX_SOURCE | ||
1435 | block. | ||
1436 | (NB. mostly an RCS ID sync, as portable strips out the conditionals) | ||
1437 | - (djm) [regress/sftp-cmds.sh] | ||
1438 | Use more restrictive glob to pick up test files from /bin - some platforms | ||
1439 | ship broken symlinks there which could spoil the test. | ||
1440 | - (djm) [openbsd-compat/bindresvport.c] | ||
1441 | Sync RCS ID after irrelevant (for portable OpenSSH) header shuffling | ||
1442 | |||
1443 | 20070927 | ||
1444 | - (dtucker) [configure.ac atomicio.c] Fall back to including <sys/poll.h> if | ||
1445 | we don't have <poll.h> (eq QNX). From bacon at cs nyu edu. | ||
1446 | - (dtucker) [configure.ac defines.h] Shadow expiry does not work on QNX6 | ||
1447 | so disable it for that platform. From bacon at cs nyu edu. | ||
1448 | |||
1449 | 20070921 | ||
1450 | - (djm) [atomicio.c] Fix spin avoidance for platforms that define | ||
1451 | EWOULDBLOCK; patch from ben AT psc.edu | ||
1452 | |||
1453 | 20070917 | ||
1454 | - (djm) OpenBSD CVS Sync | ||
1455 | - djm@cvs.openbsd.org 2007/08/23 02:49:43 | ||
1456 | [auth-passwd.c auth.c session.c] | ||
1457 | unifdef HAVE_LOGIN_CAP; ok deraadt@ millert@ | ||
1458 | NB. RCS ID sync only for portable | ||
1459 | - djm@cvs.openbsd.org 2007/08/23 02:55:51 | ||
1460 | [auth-passwd.c auth.c session.c] | ||
1461 | missed include bits from last commit | ||
1462 | NB. RCS ID sync only for portable | ||
1463 | - djm@cvs.openbsd.org 2007/08/23 03:06:10 | ||
1464 | [auth.h] | ||
1465 | login_cap.h doesn't belong here | ||
1466 | NB. RCS ID sync only for portable | ||
1467 | - djm@cvs.openbsd.org 2007/08/23 03:22:16 | ||
1468 | [auth2-none.c sshd_config sshd_config.5] | ||
1469 | Support "Banner=none" to disable displaying of the pre-login banner; | ||
1470 | ok dtucker@ deraadt@ | ||
1471 | - djm@cvs.openbsd.org 2007/08/23 03:23:26 | ||
1472 | [sshconnect.c] | ||
1473 | Execute ProxyCommands with $SHELL rather than /bin/sh unconditionally | ||
1474 | - djm@cvs.openbsd.org 2007/09/04 03:21:03 | ||
1475 | [clientloop.c monitor.c monitor_fdpass.c monitor_fdpass.h] | ||
1476 | [monitor_wrap.c ssh.c] | ||
1477 | make file descriptor passing code return an error rather than call fatal() | ||
1478 | when it encounters problems, and use this to make session multiplexing | ||
1479 | masters survive slaves failing to pass all stdio FDs; ok markus@ | ||
1480 | - djm@cvs.openbsd.org 2007/09/04 11:15:56 | ||
1481 | [ssh.c sshconnect.c sshconnect.h] | ||
1482 | make ssh(1)'s ConnectTimeout option apply to both the TCP connection and | ||
1483 | SSH banner exchange (previously it just covered the TCP connection). | ||
1484 | This allows callers of ssh(1) to better detect and deal with stuck servers | ||
1485 | that accept a TCP connection but don't progress the protocol, and also | ||
1486 | makes ConnectTimeout useful for connections via a ProxyCommand; | ||
1487 | feedback and "looks ok" markus@ | ||
1488 | - sobrado@cvs.openbsd.org 2007/09/09 11:38:01 | ||
1489 | [ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.c] | ||
1490 | sort synopsis and options in ssh-agent(1); usage is lowercase | ||
1491 | ok jmc@ | ||
1492 | - stevesk@cvs.openbsd.org 2007/09/11 04:36:29 | ||
1493 | [sshpty.c] | ||
1494 | sort #include | ||
1495 | NB. RCS ID sync only | ||
1496 | - gilles@cvs.openbsd.org 2007/09/11 15:47:17 | ||
1497 | [session.c ssh-keygen.c sshlogin.c] | ||
1498 | use strcspn to properly overwrite '\n' in fgets returned buffer | ||
1499 | ok pyr@, ray@, millert@, moritz@, chl@ | ||
1500 | - stevesk@cvs.openbsd.org 2007/09/11 23:49:09 | ||
1501 | [sshpty.c] | ||
1502 | remove #if defined block not needed; ok markus@ dtucker@ | ||
1503 | NB. RCS ID sync only | ||
1504 | - stevesk@cvs.openbsd.org 2007/09/12 19:39:19 | ||
1505 | [umac.c] | ||
1506 | use xmalloc() and xfree(); ok markus@ pvalchev@ | ||
1507 | - djm@cvs.openbsd.org 2007/09/13 04:39:04 | ||
1508 | [sftp-server.c] | ||
1509 | fix incorrect test when setting syslog facility; from Jan Pechanec | ||
1510 | - djm@cvs.openbsd.org 2007/09/16 00:55:52 | ||
1511 | [sftp-client.c] | ||
1512 | use off_t instead of u_int64_t for file offsets, matching what the | ||
1513 | progressmeter code expects; bz #842 | ||
1514 | - (tim) [defines.h] Fix regression in long password support on OpenServer 6. | ||
1515 | Problem report and additional testing rac AT tenzing.org. | ||
1516 | |||
1517 | 20070914 | ||
1518 | - (dtucker) [openbsd-compat/bsd-asprintf.c] Plug mem leak in error path. | ||
1519 | Patch from Jan.Pechanec at sun com. | ||
1520 | |||
1521 | 20070910 | ||
1522 | - (dtucker) [openbsd-compat/regress/closefromtest.c] Bug #1358: Always | ||
1523 | return 0 on successful test. From David.Leonard at quest com. | ||
1524 | - (tim) [configure.ac] Autoconf didn't define HAVE_LIBIAF because we | ||
1525 | did a AC_CHECK_FUNCS within the AC_CHECK_LIB test. | ||
1526 | |||
1 | 20070817 | 1527 | 20070817 |
2 | - (dtucker) [sshd.8] Many Linux variants use a single "!" to denote locked | 1528 | - (dtucker) [sshd.8] Many Linux variants use a single "!" to denote locked |
3 | accounts and that's what the code looks for, so make man page and code | 1529 | accounts and that's what the code looks for, so make man page and code |
@@ -3184,4 +4710,4 @@ | |||
3184 | OpenServer 6 and add osr5bigcrypt support so when someone migrates | 4710 | OpenServer 6 and add osr5bigcrypt support so when someone migrates |
3185 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ | 4711 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ |
3186 | 4712 | ||
3187 | $Id: ChangeLog,v 1.4738.2.1 2007/09/04 06:49:09 djm Exp $ | 4713 | $Id: ChangeLog,v 1.5095 2008/07/21 08:22:25 djm Exp $ |