diff options
author | Colin Watson <cjwatson@debian.org> | 2010-03-31 10:46:28 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2010-03-31 10:46:28 +0100 |
commit | efd3d4522636ae029488c2e9730b60c88e257d2e (patch) | |
tree | 31e02ac3f16090ce8c53448677356b2b7f423683 /monitor.c | |
parent | bbec4db36d464ea1d464a707625125f9fd5c7b5e (diff) | |
parent | d1a87e462e1db89f19cd960588d0c6b287cb5ccc (diff) |
* New upstream release (LP: #535029).
- After a transition period of about 10 years, this release disables SSH
protocol 1 by default. Clients and servers that need to use the
legacy protocol must explicitly enable it in ssh_config / sshd_config
or on the command-line.
- Remove the libsectok/OpenSC-based smartcard code and add support for
PKCS#11 tokens. This support is enabled by default in the Debian
packaging, since it now doesn't involve additional library
dependencies (closes: #231472, LP: #16918).
- Add support for certificate authentication of users and hosts using a
new, minimal OpenSSH certificate format (closes: #482806).
- Added a 'netcat mode' to ssh(1): "ssh -W host:port ...".
- Add the ability to revoke keys in sshd(8) and ssh(1). (For the Debian
package, this overlaps with the key blacklisting facility added in
openssh 1:4.7p1-9, but with different file formats and slightly
different scopes; for the moment, I've roughly merged the two.)
- Various multiplexing improvements, including support for requesting
port-forwardings via the multiplex protocol (closes: #360151).
- Allow setting an explicit umask on the sftp-server(8) commandline to
override whatever default the user has (closes: #496843).
- Many sftp client improvements, including tab-completion, more options,
and recursive transfer support for get/put (LP: #33378). The old
mget/mput commands never worked properly and have been removed
(closes: #270399, #428082).
- Do not prompt for a passphrase if we fail to open a keyfile, and log
the reason why the open failed to debug (closes: #431538).
- Prevent sftp from crashing when given a "-" without a command. Also,
allow whitespace to follow a "-" (closes: #531561).
Diffstat (limited to 'monitor.c')
-rw-r--r-- | monitor.c | 20 |
1 files changed, 3 insertions, 17 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: monitor.c,v 1.104 2009/06/12 20:43:22 andreas Exp $ */ | 1 | /* $OpenBSD: monitor.c,v 1.106 2010/03/07 11:57:13 dtucker Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> | 3 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> |
4 | * Copyright 2002 Markus Friedl <markus@openbsd.org> | 4 | * Copyright 2002 Markus Friedl <markus@openbsd.org> |
@@ -1040,17 +1040,6 @@ mm_answer_pam_free_ctx(int sock, Buffer *m) | |||
1040 | } | 1040 | } |
1041 | #endif | 1041 | #endif |
1042 | 1042 | ||
1043 | static void | ||
1044 | mm_append_debug(Buffer *m) | ||
1045 | { | ||
1046 | if (auth_debug_init && buffer_len(&auth_debug)) { | ||
1047 | debug3("%s: Appending debug messages for child", __func__); | ||
1048 | buffer_append(m, buffer_ptr(&auth_debug), | ||
1049 | buffer_len(&auth_debug)); | ||
1050 | buffer_clear(&auth_debug); | ||
1051 | } | ||
1052 | } | ||
1053 | |||
1054 | int | 1043 | int |
1055 | mm_answer_keyallowed(int sock, Buffer *m) | 1044 | mm_answer_keyallowed(int sock, Buffer *m) |
1056 | { | 1045 | { |
@@ -1133,8 +1122,6 @@ mm_answer_keyallowed(int sock, Buffer *m) | |||
1133 | buffer_put_int(m, allowed); | 1122 | buffer_put_int(m, allowed); |
1134 | buffer_put_int(m, forced_command != NULL); | 1123 | buffer_put_int(m, forced_command != NULL); |
1135 | 1124 | ||
1136 | mm_append_debug(m); | ||
1137 | |||
1138 | mm_request_send(sock, MONITOR_ANS_KEYALLOWED, m); | 1125 | mm_request_send(sock, MONITOR_ANS_KEYALLOWED, m); |
1139 | 1126 | ||
1140 | if (type == MM_RSAHOSTKEY) | 1127 | if (type == MM_RSAHOSTKEY) |
@@ -1518,8 +1505,6 @@ mm_answer_rsa_keyallowed(int sock, Buffer *m) | |||
1518 | if (key != NULL) | 1505 | if (key != NULL) |
1519 | key_free(key); | 1506 | key_free(key); |
1520 | 1507 | ||
1521 | mm_append_debug(m); | ||
1522 | |||
1523 | mm_request_send(sock, MONITOR_ANS_RSAKEYALLOWED, m); | 1508 | mm_request_send(sock, MONITOR_ANS_RSAKEYALLOWED, m); |
1524 | 1509 | ||
1525 | monitor_permit(mon_dispatch, MONITOR_REQ_RSACHALLENGE, allowed); | 1510 | monitor_permit(mon_dispatch, MONITOR_REQ_RSACHALLENGE, allowed); |
@@ -1771,7 +1756,8 @@ mm_get_kex(Buffer *m) | |||
1771 | kex->flags = buffer_get_int(m); | 1756 | kex->flags = buffer_get_int(m); |
1772 | kex->client_version_string = buffer_get_string(m, NULL); | 1757 | kex->client_version_string = buffer_get_string(m, NULL); |
1773 | kex->server_version_string = buffer_get_string(m, NULL); | 1758 | kex->server_version_string = buffer_get_string(m, NULL); |
1774 | kex->load_host_key=&get_hostkey_by_type; | 1759 | kex->load_host_public_key=&get_hostkey_public_by_type; |
1760 | kex->load_host_private_key=&get_hostkey_private_by_type; | ||
1775 | kex->host_key_index=&get_hostkey_index; | 1761 | kex->host_key_index=&get_hostkey_index; |
1776 | 1762 | ||
1777 | return (kex); | 1763 | return (kex); |