diff options
-rw-r--r-- | ChangeLog | 10 | ||||
-rw-r--r-- | sshd.8 | 6 |
2 files changed, 9 insertions, 7 deletions
@@ -14,12 +14,15 @@ | |||
14 | [readconf.c ssh.1] | 14 | [readconf.c ssh.1] |
15 | ``StrictHostKeyChecking ask'' documentation and small cleanup. | 15 | ``StrictHostKeyChecking ask'' documentation and small cleanup. |
16 | ok markus@ | 16 | ok markus@ |
17 | - stevesk@cvs.openbsd.org 2001/01/28 22:27:05 | 17 | - stevesk@cvs.openbsd.org 2001/01/28 20:43:25 |
18 | [authfile.c] | 18 | [sshd.8] |
19 | spelling. use sizeof vs. strlen(). ok markus@ | 19 | spelling. ok markus@ |
20 | - stevesk@cvs.openbsd.org 2001/01/28 20:53:21 | 20 | - stevesk@cvs.openbsd.org 2001/01/28 20:53:21 |
21 | [xmalloc.c] | 21 | [xmalloc.c] |
22 | use size_t for strlen() return. ok markus@ | 22 | use size_t for strlen() return. ok markus@ |
23 | - stevesk@cvs.openbsd.org 2001/01/28 22:27:05 | ||
24 | [authfile.c] | ||
25 | spelling. use sizeof vs. strlen(). ok markus@ | ||
23 | - niklas@cvs.openbsd.org 2001/01/29 1:59:14 | 26 | - niklas@cvs.openbsd.org 2001/01/29 1:59:14 |
24 | [atomicio.h canohost.h clientloop.h deattack.h dh.h dispatch.h | 27 | [atomicio.h canohost.h clientloop.h deattack.h dh.h dispatch.h |
25 | groupaccess.c groupaccess.h hmac.h hostfile.h includes.h kex.h | 28 | groupaccess.c groupaccess.h hmac.h hostfile.h includes.h kex.h |
@@ -29,7 +32,6 @@ | |||
29 | sshconnect.h sshd_config tildexpand.h uidswap.h uuencode.h] | 32 | sshconnect.h sshd_config tildexpand.h uidswap.h uuencode.h] |
30 | $OpenBSD$ | 33 | $OpenBSD$ |
31 | 34 | ||
32 | |||
33 | 20010126 | 35 | 20010126 |
34 | - (bal) SSH_PROGRAM vs _PATH_SSH_PROGRAM fix pointed out by Roumen | 36 | - (bal) SSH_PROGRAM vs _PATH_SSH_PROGRAM fix pointed out by Roumen |
35 | Petrov <roumen.petrov@skalasoft.com> | 37 | Petrov <roumen.petrov@skalasoft.com> |
@@ -34,7 +34,7 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: sshd.8,v 1.85 2001/01/28 10:37:25 markus Exp $ | 37 | .\" $OpenBSD: sshd.8,v 1.86 2001/01/28 20:43:25 stevesk Exp $ |
38 | .Dd September 25, 1999 | 38 | .Dd September 25, 1999 |
39 | .Dt SSHD 8 | 39 | .Dt SSHD 8 |
40 | .Os | 40 | .Os |
@@ -515,14 +515,14 @@ the three colon separated values | |||
515 | .Dq start:rate:full | 515 | .Dq start:rate:full |
516 | (e.g., "10:30:60"). | 516 | (e.g., "10:30:60"). |
517 | .Nm | 517 | .Nm |
518 | will refuse connection attempts with a probabillity of | 518 | will refuse connection attempts with a probability of |
519 | .Dq rate/100 | 519 | .Dq rate/100 |
520 | (30%) | 520 | (30%) |
521 | if there are currently | 521 | if there are currently |
522 | .Dq start | 522 | .Dq start |
523 | (10) | 523 | (10) |
524 | unauthenticated connections. | 524 | unauthenticated connections. |
525 | The probabillity increases linearly and all connection attempts | 525 | The probability increases linearly and all connection attempts |
526 | are refused if the number of unauthenticated connections reaches | 526 | are refused if the number of unauthenticated connections reaches |
527 | .Dq full | 527 | .Dq full |
528 | (60). | 528 | (60). |