summaryrefslogtreecommitdiff
path: root/ChangeLog
diff options
context:
space:
mode:
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog489
1 files changed, 488 insertions, 1 deletions
diff --git a/ChangeLog b/ChangeLog
index 993e0cb0b..f75aa5637 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,483 @@
120110905
2 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
3 [contrib/suse/openssh.spec] Update version numbers.
4 - (djm) Release OpenSSH-5.9
5
620110904
7 - (djm) [regress/connect-privsep.sh regress/test-exec.sh] demote fatal
8 regress errors for the sandbox to warnings. ok tim dtucker
9 - (dtucker) [ssh-keygen.c ssh-pkcs11.c] Bug #1929: add null implementations
10 ofsh-pkcs11.cpkcs_init and pkcs_terminate for building without dlopen
11 support.
12
1320110829
14 - (djm) [openbsd-compat/port-linux.c] Suppress logging when attempting
15 to switch SELinux context away from unconfined_t, based on patch from
16 Jan Chadima; bz#1919 ok dtucker@
17
1820110827
19 - (dtucker) [auth-skey.c] Add log.h to fix build --with-skey.
20
2120110818
22 - (tim) [configure.ac] Typo in error message spotted by Andy Tsouladze
23
2420110817
25 - (tim) [mac.c myproposal.h] Wrap SHA256 and SHA512 in ifdefs for
26 OpenSSL 0.9.7. ok djm
27 - (djm) [ openbsd-compat/bsd-cygwin_util.c openbsd-compat/bsd-cygwin_util.h]
28 binary_pipe is no longer required on Cygwin; patch from Corinna Vinschen
29 - (djm) [configure.ac] error out if the host lacks the necessary bits for
30 an explicitly requested sandbox type
31 - (djm) [contrib/ssh-copy-id] Missing backlslash; spotted by
32 bisson AT archlinux.org
33 - (djm) OpenBSD CVS Sync
34 - dtucker@cvs.openbsd.org 2011/06/03 05:35:10
35 [regress/cfgmatch.sh]
36 use OBJ to find test configs, patch from Tim Rice
37 - markus@cvs.openbsd.org 2011/06/30 22:44:43
38 [regress/connect-privsep.sh]
39 test with sandbox enabled; ok djm@
40 - djm@cvs.openbsd.org 2011/08/02 01:23:41
41 [regress/cipher-speed.sh regress/try-ciphers.sh]
42 add SHA256/SHA512 based HMAC modes
43 - (djm) [regress/cipher-speed.sh regress/try-ciphers.sh] disable HMAC-SHA2
44 MAC tests for platforms that hack EVP_SHA2 support
45
4620110812
47 - (dtucker) [openbsd-compat/port-linux.c] Bug 1924: Improve selinux context
48 change error by reporting old and new context names Patch from
49 jchadima at redhat.
50 - (djm) [contrib/redhat/openssh.spec contrib/redhat/sshd.init]
51 [contrib/suse/openssh.spec contrib/suse/rc.sshd] Updated RHEL and SLES
52 init scrips from imorgan AT nas.nasa.gov; bz#1920
53 - (djm) [contrib/ssh-copy-id] Fix failure for cases where the path to the
54 identify file contained whitespace. bz#1828 patch from gwenael.lambrouin
55 AT gmail.com; ok dtucker@
56
5720110807
58 - (dtucker) OpenBSD CVS Sync
59 - jmc@cvs.openbsd.org 2008/06/26 06:59:39
60 [moduli.5]
61 tweak previous;
62 - sobrado@cvs.openbsd.org 2009/10/28 08:56:54
63 [moduli.5]
64 "Diffie-Hellman" is the usual spelling for the cryptographic protocol
65 first published by Whitfield Diffie and Martin Hellman in 1976.
66 ok jmc@
67 - jmc@cvs.openbsd.org 2010/10/14 20:41:28
68 [moduli.5]
69 probabalistic -> probabilistic; from naddy
70 - dtucker@cvs.openbsd.org 2011/08/07 12:55:30
71 [sftp.1]
72 typo, fix from Laurent Gautrot
73
7420110805
75 - OpenBSD CVS Sync
76 - djm@cvs.openbsd.org 2011/06/23 23:35:42
77 [monitor.c]
78 ignore EINTR errors from poll()
79 - tedu@cvs.openbsd.org 2011/07/06 18:09:21
80 [authfd.c]
81 bzero the agent address. the kernel was for a while very cranky about
82 these things. evne though that's fixed, always good to initialize
83 memory. ok deraadt djm
84 - djm@cvs.openbsd.org 2011/07/29 14:42:45
85 [sandbox-systrace.c]
86 fail open(2) with EPERM rather than SIGKILLing the whole process. libc
87 will call open() to do strerror() when NLS is enabled;
88 feedback and ok markus@
89 - markus@cvs.openbsd.org 2011/08/01 19:18:15
90 [gss-serv.c]
91 prevent post-auth resource exhaustion (int overflow leading to 4GB malloc);
92 report Adam Zabrock; ok djm@, deraadt@
93 - djm@cvs.openbsd.org 2011/08/02 01:22:11
94 [mac.c myproposal.h ssh.1 ssh_config.5 sshd.8 sshd_config.5]
95 Add new SHA256 and SHA512 based HMAC modes from
96 http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt
97 Patch from mdb AT juniper.net; feedback and ok markus@
98 - djm@cvs.openbsd.org 2011/08/02 23:13:01
99 [version.h]
100 crank now, release later
101 - djm@cvs.openbsd.org 2011/08/02 23:15:03
102 [ssh.c]
103 typo in comment
104
10520110624
106 - (djm) [configure.ac Makefile.in sandbox-darwin.c] Add a sandbox for
107 Darwin/OS X using sandbox_init() + setrlimit(); feedback and testing
108 markus@
109
11020110623
111 - OpenBSD CVS Sync
112 - djm@cvs.openbsd.org 2011/06/22 21:47:28
113 [servconf.c]
114 reuse the multistate option arrays to pretty-print options for "sshd -T"
115 - djm@cvs.openbsd.org 2011/06/22 21:57:01
116 [servconf.c servconf.h sshd.c sshd_config.5]
117 [configure.ac Makefile.in]
118 introduce sandboxing of the pre-auth privsep child using systrace(4).
119
120 This introduces a new "UsePrivilegeSeparation=sandbox" option for
121 sshd_config that applies mandatory restrictions on the syscalls the
122 privsep child can perform. This prevents a compromised privsep child
123 from being used to attack other hosts (by opening sockets and proxying)
124 or probing local kernel attack surface.
125
126 The sandbox is implemented using systrace(4) in unsupervised "fast-path"
127 mode, where a list of permitted syscalls is supplied. Any syscall not
128 on the list results in SIGKILL being sent to the privsep child. Note
129 that this requires a kernel with the new SYSTR_POLICY_KILL option.
130
131 UsePrivilegeSeparation=sandbox will become the default in the future
132 so please start testing it now.
133
134 feedback dtucker@; ok markus@
135 - djm@cvs.openbsd.org 2011/06/22 22:08:42
136 [channels.c channels.h clientloop.c clientloop.h mux.c ssh.c]
137 hook up a channel confirm callback to warn the user then requested X11
138 forwarding was refused by the server; ok markus@
139 - djm@cvs.openbsd.org 2011/06/23 09:34:13
140 [sshd.c ssh-sandbox.h sandbox.h sandbox-rlimit.c sandbox-systrace.c]
141 [sandbox-null.c]
142 rename sandbox.h => ssh-sandbox.h to make things easier for portable
143 - (djm) [sandbox-null.c] Dummy sandbox for platforms that don't support
144 setrlimit(2)
145
14620110620
147 - OpenBSD CVS Sync
148 - djm@cvs.openbsd.org 2011/06/04 00:10:26
149 [ssh_config.5]
150 explain IdentifyFile's semantics a little better, prompted by bz#1898
151 ok dtucker jmc
152 - markus@cvs.openbsd.org 2011/06/14 22:49:18
153 [authfile.c]
154 make sure key_parse_public/private_rsa1() no longer consumes its input
155 buffer. fixes ssh-add for passphrase-protected ssh1-keys;
156 noted by naddy@; ok djm@
157 - djm@cvs.openbsd.org 2011/06/17 21:44:31
158 [log.c log.h monitor.c monitor.h monitor_wrap.c monitor_wrap.h sshd.c]
159 make the pre-auth privsep slave log via a socketpair shared with the
160 monitor rather than /var/empty/dev/log; ok dtucker@ deraadt@ markus@
161 - djm@cvs.openbsd.org 2011/06/17 21:46:16
162 [sftp-server.c]
163 the protocol version should be unsigned; bz#1913 reported by mb AT
164 smartftp.com
165 - djm@cvs.openbsd.org 2011/06/17 21:47:35
166 [servconf.c]
167 factor out multi-choice option parsing into a parse_multistate label
168 and some support structures; ok dtucker@
169 - djm@cvs.openbsd.org 2011/06/17 21:57:25
170 [clientloop.c]
171 setproctitle for a mux master that has been gracefully stopped;
172 bz#1911 from Bert.Wesarg AT googlemail.com
173
17420110603
175 - (dtucker) [README version.h contrib/caldera/openssh.spec
176 contrib/redhat/openssh.spec contrib/suse/openssh.spec] Pull the version
177 bumps from the 5.8p2 branch into HEAD. ok djm.
178 - (tim) [configure.ac defines.h] Run test program to detect system mail
179 directory. Add --with-maildir option to override. Fixed OpenServer 6
180 getting it wrong. Fixed many systems having MAIL=/var/mail//username
181 ok dtucker
182 - (dtucker) [monitor.c] Remove the !HAVE_SOCKETPAIR case. We use socketpair
183 unconditionally in other places and the survey data we have does not show
184 any systems that use it. "nuke it" djm@
185 - (djm) [configure.ac] enable setproctitle emulation for OS X
186 - (djm) OpenBSD CVS Sync
187 - djm@cvs.openbsd.org 2011/06/03 00:54:38
188 [ssh.c]
189 bz#1883 - setproctitle() to identify mux master; patch from Bert.Wesarg
190 AT googlemail.com; ok dtucker@
191 NB. includes additional portability code to enable setproctitle emulation
192 on platforms that don't support it.
193 - dtucker@cvs.openbsd.org 2011/06/03 01:37:40
194 [ssh-agent.c]
195 Check current parent process ID against saved one to determine if the parent
196 has exited, rather than attempting to send a zero signal, since the latter
197 won't work if the parent has changed privs. bz#1905, patch from Daniel Kahn
198 Gillmor, ok djm@
199 - dtucker@cvs.openbsd.org 2011/05/31 02:01:58
200 [regress/dynamic-forward.sh]
201 back out revs 1.6 and 1.5 since it's not reliable
202 - dtucker@cvs.openbsd.org 2011/05/31 02:03:34
203 [regress/dynamic-forward.sh]
204 work around startup and teardown races; caught by deraadt
205 - dtucker@cvs.openbsd.org 2011/06/03 00:29:52
206 [regress/dynamic-forward.sh]
207 Retry establishing the port forwarding after a small delay, should make
208 the tests less flaky when the previous test is slow to shut down and free
209 up the port.
210 - (tim) [regress/cfgmatch.sh] Build/test out of tree fix.
211
21220110529
213 - (djm) OpenBSD CVS Sync
214 - djm@cvs.openbsd.org 2011/05/23 03:30:07
215 [auth-rsa.c auth.c auth.h auth2-pubkey.c monitor.c monitor_wrap.c]
216 [pathnames.h servconf.c servconf.h sshd.8 sshd_config sshd_config.5]
217 allow AuthorizedKeysFile to specify multiple files, separated by spaces.
218 Bring back authorized_keys2 as a default search path (to avoid breaking
219 existing users of this file), but override this in sshd_config so it will
220 be no longer used on fresh installs. Maybe in 2015 we can remove it
221 entierly :)
222
223 feedback and ok markus@ dtucker@
224 - djm@cvs.openbsd.org 2011/05/23 03:33:38
225 [auth.c]
226 make secure_filename() spam debug logs less
227 - djm@cvs.openbsd.org 2011/05/23 03:52:55
228 [sshconnect.c]
229 remove extra newline
230 - jmc@cvs.openbsd.org 2011/05/23 07:10:21
231 [sshd.8 sshd_config.5]
232 tweak previous; ok djm
233 - djm@cvs.openbsd.org 2011/05/23 07:24:57
234 [authfile.c]
235 read in key comments for v.2 keys (though note that these are not
236 passed over the agent protocol); bz#439, based on patch from binder
237 AT arago.de; ok markus@
238 - djm@cvs.openbsd.org 2011/05/24 07:15:47
239 [readconf.c readconf.h ssh.c ssh_config.5 sshconnect.c sshconnect2.c]
240 Remove undocumented legacy options UserKnownHostsFile2 and
241 GlobalKnownHostsFile2 by making UserKnownHostsFile/GlobalKnownHostsFile
242 accept multiple paths per line and making their defaults include
243 known_hosts2; ok markus
244 - djm@cvs.openbsd.org 2011/05/23 03:31:31
245 [regress/cfgmatch.sh]
246 include testing of multiple/overridden AuthorizedKeysFiles
247 refactor to simply daemon start/stop and get rid of racy constructs
248
24920110520
250 - (djm) [session.c] call setexeccon() before executing passwd for pw
251 changes; bz#1891 reported by jchadima AT redhat.com; ok dtucker@
252 - (djm) [aclocal.m4 configure.ac] since gcc-4.x ignores all -Wno-options
253 options, we should corresponding -W-option when trying to determine
254 whether it is accepted. Also includes a warning fix on the program
255 fragment uses (bad main() return type).
256 bz#1900 and bz#1901 reported by g.esp AT free.fr; ok dtucker@
257 - (djm) [servconf.c] remove leftover droppings of AuthorizedKeysFile2
258 - OpenBSD CVS Sync
259 - djm@cvs.openbsd.org 2011/05/15 08:09:01
260 [authfd.c monitor.c serverloop.c]
261 use FD_CLOEXEC consistently; patch from zion AT x96.org
262 - djm@cvs.openbsd.org 2011/05/17 07:13:31
263 [key.c]
264 fatal() if asked to generate a legacy ECDSA cert (these don't exist)
265 and fix the regress test that was trying to generate them :)
266 - djm@cvs.openbsd.org 2011/05/20 00:55:02
267 [servconf.c]
268 the options TrustedUserCAKeys, RevokedKeysFile, AuthorizedKeysFile
269 and AuthorizedPrincipalsFile were not being correctly applied in
270 Match blocks, despite being overridable there; ok dtucker@
271 - dtucker@cvs.openbsd.org 2011/05/20 02:00:19
272 [servconf.c]
273 Add comment documenting what should be after the preauth check. ok djm
274 - djm@cvs.openbsd.org 2011/05/20 03:25:45
275 [monitor.c monitor_wrap.c servconf.c servconf.h]
276 use a macro to define which string options to copy between configs
277 for Match. This avoids problems caused by forgetting to keep three
278 code locations in perfect sync and ordering
279
280 "this is at once beautiful and horrible" + ok dtucker@
281 - djm@cvs.openbsd.org 2011/05/17 07:13:31
282 [regress/cert-userkey.sh]
283 fatal() if asked to generate a legacy ECDSA cert (these don't exist)
284 and fix the regress test that was trying to generate them :)
285 - djm@cvs.openbsd.org 2011/05/20 02:43:36
286 [cert-hostkey.sh]
287 another attempt to generate a v00 ECDSA key that broke the test
288 ID sync only - portable already had this somehow
289 - dtucker@cvs.openbsd.org 2011/05/20 05:19:50
290 [dynamic-forward.sh]
291 Prevent races in dynamic forwarding test; ok djm
292 - dtucker@cvs.openbsd.org 2011/05/20 06:32:30
293 [dynamic-forward.sh]
294 fix dumb error in dynamic-forward test
295
29620110515
297 - (djm) OpenBSD CVS Sync
298 - djm@cvs.openbsd.org 2011/05/05 05:12:08
299 [mux.c]
300 gracefully fall back when ControlPath is too large for a
301 sockaddr_un. ok markus@ as part of a larger diff
302 - dtucker@cvs.openbsd.org 2011/05/06 01:03:35
303 [sshd_config]
304 clarify language about overriding defaults. bz#1892, from Petr Cerny
305 - djm@cvs.openbsd.org 2011/05/06 01:09:53
306 [sftp.1]
307 mention that IPv6 addresses must be enclosed in square brackets;
308 bz#1845
309 - djm@cvs.openbsd.org 2011/05/06 02:05:41
310 [sshconnect2.c]
311 fix memory leak; bz#1849 ok dtucker@
312 - djm@cvs.openbsd.org 2011/05/06 21:14:05
313 [packet.c packet.h]
314 set traffic class for IPv6 traffic as we do for IPv4 TOS;
315 patch from lionel AT mamane.lu via Colin Watson in bz#1855;
316 ok markus@
317 - djm@cvs.openbsd.org 2011/05/06 21:18:02
318 [ssh.c ssh_config.5]
319 add a %L expansion (short-form of the local host name) for ControlPath;
320 sync some more expansions with LocalCommand; ok markus@
321 - djm@cvs.openbsd.org 2011/05/06 21:31:38
322 [readconf.c ssh_config.5]
323 support negated Host matching, e.g.
324
325 Host *.example.org !c.example.org
326 User mekmitasdigoat
327
328 Will match "a.example.org", "b.example.org", but not "c.example.org"
329 ok markus@
330 - djm@cvs.openbsd.org 2011/05/06 21:34:32
331 [clientloop.c mux.c readconf.c readconf.h ssh.c ssh_config.5]
332 Add a RequestTTY ssh_config option to allow configuration-based
333 control over tty allocation (like -t/-T); ok markus@
334 - djm@cvs.openbsd.org 2011/05/06 21:38:58
335 [ssh.c]
336 fix dropping from previous diff
337 - djm@cvs.openbsd.org 2011/05/06 22:20:10
338 [PROTOCOL.mux]
339 fix numbering; from bert.wesarg AT googlemail.com
340 - jmc@cvs.openbsd.org 2011/05/07 23:19:39
341 [ssh_config.5]
342 - tweak previous
343 - come consistency fixes
344 ok djm
345 - jmc@cvs.openbsd.org 2011/05/07 23:20:25
346 [ssh.1]
347 +.It RequestTTY
348 - djm@cvs.openbsd.org 2011/05/08 12:52:01
349 [PROTOCOL.mux clientloop.c clientloop.h mux.c]
350 improve our behaviour when TTY allocation fails: if we are in
351 RequestTTY=auto mode (the default), then do not treat at TTY
352 allocation error as fatal but rather just restore the local TTY
353 to cooked mode and continue. This is more graceful on devices that
354 never allocate TTYs.
355
356 If RequestTTY is set to "yes" or "force", then failure to allocate
357 a TTY is fatal.
358
359 ok markus@
360 - djm@cvs.openbsd.org 2011/05/10 05:46:46
361 [authfile.c]
362 despam debug() logs by detecting that we are trying to load a private key
363 in key_try_load_public() and returning early; ok markus@
364 - djm@cvs.openbsd.org 2011/05/11 04:47:06
365 [auth.c auth.h auth2-pubkey.c pathnames.h servconf.c servconf.h]
366 remove support for authorized_keys2; it is a relic from the early days
367 of protocol v.2 support and has been undocumented for many years;
368 ok markus@
369 - djm@cvs.openbsd.org 2011/05/13 00:05:36
370 [authfile.c]
371 warn on unexpected key type in key_parse_private_type()
372 - (djm) [packet.c] unbreak portability #endif
373
37420110510
375 - (dtucker) [openbsd-compat/openssl-compat.{c,h}] Bug #1882: fix
376 --with-ssl-engine which was broken with the change from deprecated
377 SSLeay_add_all_algorithms(). ok djm
378
37920110506
380 - (dtucker) [openbsd-compat/regress/closefromtest.c] Bug #1875: add prototype
381 for closefrom() in test code. Report from Dan Wallis via Gentoo.
382
38320110505
384 - (djm) [defines.h] Move up include of netinet/ip.h for IPTOS
385 definitions. From des AT des.no
386 - (djm) [Makefile.in WARNING.RNG aclocal.m4 buildpkg.sh.in configure.ac]
387 [entropy.c ssh-add.c ssh-agent.c ssh-keygen.c ssh-keyscan.c]
388 [ssh-keysign.c ssh-pkcs11-helper.c ssh-rand-helper.8 ssh-rand-helper.c]
389 [ssh.c ssh_prng_cmds.in sshd.c contrib/aix/buildbff.sh]
390 [regress/README.regress] Remove ssh-rand-helper and all its
391 tentacles. PRNGd seeding has been rolled into entropy.c directly.
392 Thanks to tim@ for testing on affected platforms.
393 - OpenBSD CVS Sync
394 - djm@cvs.openbsd.org 2011/03/10 02:52:57
395 [auth2-gss.c auth2.c auth.h]
396 allow GSSAPI authentication to detect when a server-side failure causes
397 authentication failure and don't count such failures against MaxAuthTries;
398 bz#1244 from simon AT sxw.org.uk; ok markus@ before lock
399 - okan@cvs.openbsd.org 2011/03/15 10:36:02
400 [ssh-keyscan.c]
401 use timerclear macro
402 ok djm@
403 - stevesk@cvs.openbsd.org 2011/03/23 15:16:22
404 [ssh-keygen.1 ssh-keygen.c]
405 Add -A option. For each of the key types (rsa1, rsa, dsa and ecdsa)
406 for which host keys do not exist, generate the host keys with the
407 default key file path, an empty passphrase, default bits for the key
408 type, and default comment. This will be used by /etc/rc to generate
409 new host keys. Idea from deraadt.
410 ok deraadt
411 - stevesk@cvs.openbsd.org 2011/03/23 16:24:56
412 [ssh-keygen.1]
413 -q not used in /etc/rc now so remove statement.
414 - stevesk@cvs.openbsd.org 2011/03/23 16:50:04
415 [ssh-keygen.c]
416 remove -d, documentation removed >10 years ago; ok markus
417 - jmc@cvs.openbsd.org 2011/03/24 15:29:30
418 [ssh-keygen.1]
419 zap trailing whitespace;
420 - stevesk@cvs.openbsd.org 2011/03/24 22:14:54
421 [ssh-keygen.c]
422 use strcasecmp() for "clear" cert permission option also; ok djm
423 - stevesk@cvs.openbsd.org 2011/03/29 18:54:17
424 [misc.c misc.h servconf.c]
425 print ipqos friendly string for sshd -T; ok markus
426 # sshd -Tf sshd_config|grep ipqos
427 ipqos lowdelay throughput
428 - djm@cvs.openbsd.org 2011/04/12 04:23:50
429 [ssh-keygen.c]
430 fix -Wshadow
431 - djm@cvs.openbsd.org 2011/04/12 05:32:49
432 [sshd.c]
433 exit with 0 status on SIGTERM; bz#1879
434 - djm@cvs.openbsd.org 2011/04/13 04:02:48
435 [ssh-keygen.1]
436 improve wording; bz#1861
437 - djm@cvs.openbsd.org 2011/04/13 04:09:37
438 [ssh-keygen.1]
439 mention valid -b sizes for ECDSA keys; bz#1862
440 - djm@cvs.openbsd.org 2011/04/17 22:42:42
441 [PROTOCOL.mux clientloop.c clientloop.h mux.c ssh.1 ssh.c]
442 allow graceful shutdown of multiplexing: request that a mux server
443 removes its listener socket and refuse future multiplexing requests;
444 ok markus@
445 - djm@cvs.openbsd.org 2011/04/18 00:46:05
446 [ssh-keygen.c]
447 certificate options are supposed to be packed in lexical order of
448 option name (though we don't actually enforce this at present).
449 Move one up that was out of sequence
450 - djm@cvs.openbsd.org 2011/05/04 21:15:29
451 [authfile.c authfile.h ssh-add.c]
452 allow "ssh-add - < key"; feedback and ok markus@
453 - (tim) [configure.ac] Add AC_LANG_SOURCE to OPENSSH_CHECK_CFLAG_COMPILE
454 so autoreconf 2.68 is happy.
455 - (tim) [defines.h] Deal with platforms that do not have S_IFSOCK ok djm@
456
45720110221
458 - (dtucker) [contrib/cygwin/ssh-host-config] From Corinna: revamp of the
459 Cygwin-specific service installer script ssh-host-config. The actual
460 functionality is the same, the revisited version is just more
461 exact when it comes to check for problems which disallow to run
462 certain aspects of the script. So, part of this script and the also
463 rearranged service helper script library "csih" is to check if all
464 the tools required to run the script are available on the system.
465 The new script also is more thorough to inform the user why the
466 script failed. Patch from vinschen at redhat com.
467
46820110218
469 - OpenBSD CVS Sync
470 - djm@cvs.openbsd.org 2011/02/16 00:31:14
471 [ssh-keysign.c]
472 make hostbased auth with ECDSA keys work correctly. Based on patch
473 by harvey.eneman AT oracle.com in bz#1858; ok markus@ (pre-lock)
474
47520110206
476 - (dtucker) [openbsd-compat/port-linux.c] Bug #1851: fix syntax error in
477 selinux code. Patch from Leonardo Chiquitto
478 - (dtucker) [contrib/cygwin/ssh-{host,user}-config] Add ECDSA key
479 generation and simplify. Patch from Corinna Vinschen.
480
120110204 48120110204
2 - OpenBSD CVS Sync 482 - OpenBSD CVS Sync
3 - djm@cvs.openbsd.org 2011/01/31 21:42:15 483 - djm@cvs.openbsd.org 2011/01/31 21:42:15
@@ -19,6 +499,14 @@
19 succeeded before using its result. Patch from cjwatson AT debian.org; 499 succeeded before using its result. Patch from cjwatson AT debian.org;
20 bz#1851 500 bz#1851
21 501
50220110127
503 - (tim) [config.guess config.sub] Sync with upstream.
504 - (tim) [configure.ac] Consistent M4 quoting throughout, updated obsolete
505 AC_TRY_COMPILE with AC_COMPILE_IFELSE, updated obsolete AC_TRY_LINK with
506 AC_LINK_IFELSE, updated obsolete AC_TRY_RUN with AC_RUN_IFELSE, misc white
507 space changes for consistency/readability. Makes autoconf 2.68 happy.
508 "Nice work" djm
509
2220110125 51020110125
23 - (djm) [configure.ac Makefile.in ssh.c openbsd-compat/port-linux.c 511 - (djm) [configure.ac Makefile.in ssh.c openbsd-compat/port-linux.c
24 openbsd-compat/port-linux.h] Move SELinux-specific code from ssh.c to 512 openbsd-compat/port-linux.h] Move SELinux-specific code from ssh.c to
@@ -1229,4 +1717,3 @@
1229 (use "ssh-keygen -t v00 -s ca_key ..." to generate a v00 certificate) 1717 (use "ssh-keygen -t v00 -s ca_key ..." to generate a v00 certificate)
1230 1718
1231 ok markus@ 1719 ok markus@
1232