summaryrefslogtreecommitdiff
path: root/monitor.c
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2010-03-31 10:46:28 +0100
committerColin Watson <cjwatson@debian.org>2010-03-31 10:46:28 +0100
commitefd3d4522636ae029488c2e9730b60c88e257d2e (patch)
tree31e02ac3f16090ce8c53448677356b2b7f423683 /monitor.c
parentbbec4db36d464ea1d464a707625125f9fd5c7b5e (diff)
parentd1a87e462e1db89f19cd960588d0c6b287cb5ccc (diff)
* New upstream release (LP: #535029).
- After a transition period of about 10 years, this release disables SSH protocol 1 by default. Clients and servers that need to use the legacy protocol must explicitly enable it in ssh_config / sshd_config or on the command-line. - Remove the libsectok/OpenSC-based smartcard code and add support for PKCS#11 tokens. This support is enabled by default in the Debian packaging, since it now doesn't involve additional library dependencies (closes: #231472, LP: #16918). - Add support for certificate authentication of users and hosts using a new, minimal OpenSSH certificate format (closes: #482806). - Added a 'netcat mode' to ssh(1): "ssh -W host:port ...". - Add the ability to revoke keys in sshd(8) and ssh(1). (For the Debian package, this overlaps with the key blacklisting facility added in openssh 1:4.7p1-9, but with different file formats and slightly different scopes; for the moment, I've roughly merged the two.) - Various multiplexing improvements, including support for requesting port-forwardings via the multiplex protocol (closes: #360151). - Allow setting an explicit umask on the sftp-server(8) commandline to override whatever default the user has (closes: #496843). - Many sftp client improvements, including tab-completion, more options, and recursive transfer support for get/put (LP: #33378). The old mget/mput commands never worked properly and have been removed (closes: #270399, #428082). - Do not prompt for a passphrase if we fail to open a keyfile, and log the reason why the open failed to debug (closes: #431538). - Prevent sftp from crashing when given a "-" without a command. Also, allow whitespace to follow a "-" (closes: #531561).
Diffstat (limited to 'monitor.c')
-rw-r--r--monitor.c20
1 files changed, 3 insertions, 17 deletions
diff --git a/monitor.c b/monitor.c
index cd2ca4057..a1f4a2e05 100644
--- a/monitor.c
+++ b/monitor.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: monitor.c,v 1.104 2009/06/12 20:43:22 andreas Exp $ */ 1/* $OpenBSD: monitor.c,v 1.106 2010/03/07 11:57:13 dtucker Exp $ */
2/* 2/*
3 * Copyright 2002 Niels Provos <provos@citi.umich.edu> 3 * Copyright 2002 Niels Provos <provos@citi.umich.edu>
4 * Copyright 2002 Markus Friedl <markus@openbsd.org> 4 * Copyright 2002 Markus Friedl <markus@openbsd.org>
@@ -1040,17 +1040,6 @@ mm_answer_pam_free_ctx(int sock, Buffer *m)
1040} 1040}
1041#endif 1041#endif
1042 1042
1043static void
1044mm_append_debug(Buffer *m)
1045{
1046 if (auth_debug_init && buffer_len(&auth_debug)) {
1047 debug3("%s: Appending debug messages for child", __func__);
1048 buffer_append(m, buffer_ptr(&auth_debug),
1049 buffer_len(&auth_debug));
1050 buffer_clear(&auth_debug);
1051 }
1052}
1053
1054int 1043int
1055mm_answer_keyallowed(int sock, Buffer *m) 1044mm_answer_keyallowed(int sock, Buffer *m)
1056{ 1045{
@@ -1133,8 +1122,6 @@ mm_answer_keyallowed(int sock, Buffer *m)
1133 buffer_put_int(m, allowed); 1122 buffer_put_int(m, allowed);
1134 buffer_put_int(m, forced_command != NULL); 1123 buffer_put_int(m, forced_command != NULL);
1135 1124
1136 mm_append_debug(m);
1137
1138 mm_request_send(sock, MONITOR_ANS_KEYALLOWED, m); 1125 mm_request_send(sock, MONITOR_ANS_KEYALLOWED, m);
1139 1126
1140 if (type == MM_RSAHOSTKEY) 1127 if (type == MM_RSAHOSTKEY)
@@ -1518,8 +1505,6 @@ mm_answer_rsa_keyallowed(int sock, Buffer *m)
1518 if (key != NULL) 1505 if (key != NULL)
1519 key_free(key); 1506 key_free(key);
1520 1507
1521 mm_append_debug(m);
1522
1523 mm_request_send(sock, MONITOR_ANS_RSAKEYALLOWED, m); 1508 mm_request_send(sock, MONITOR_ANS_RSAKEYALLOWED, m);
1524 1509
1525 monitor_permit(mon_dispatch, MONITOR_REQ_RSACHALLENGE, allowed); 1510 monitor_permit(mon_dispatch, MONITOR_REQ_RSACHALLENGE, allowed);
@@ -1771,7 +1756,8 @@ mm_get_kex(Buffer *m)
1771 kex->flags = buffer_get_int(m); 1756 kex->flags = buffer_get_int(m);
1772 kex->client_version_string = buffer_get_string(m, NULL); 1757 kex->client_version_string = buffer_get_string(m, NULL);
1773 kex->server_version_string = buffer_get_string(m, NULL); 1758 kex->server_version_string = buffer_get_string(m, NULL);
1774 kex->load_host_key=&get_hostkey_by_type; 1759 kex->load_host_public_key=&get_hostkey_public_by_type;
1760 kex->load_host_private_key=&get_hostkey_private_by_type;
1775 kex->host_key_index=&get_hostkey_index; 1761 kex->host_key_index=&get_hostkey_index;
1776 1762
1777 return (kex); 1763 return (kex);