summaryrefslogtreecommitdiff
path: root/ChangeLog
diff options
context:
space:
mode:
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog1528
1 files changed, 1527 insertions, 1 deletions
diff --git a/ChangeLog b/ChangeLog
index 93555e518..3d08a80d3 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,1529 @@
120080721
2 - (djm) OpenBSD CVS Sync
3 - jmc@cvs.openbsd.org 2008/07/18 22:51:01
4 [sftp-server.8]
5 no need for .Pp before or after .Sh;
6 - djm@cvs.openbsd.org 2008/07/21 08:19:07
7 [version.h]
8 openssh-5.1
9 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
10 [contrib/suse/openssh.spec] Update version number in README and RPM specs
11 - (djm) Release OpenSSH-5.1
12
1320080717
14 - (djm) OpenBSD CVS Sync
15 - djm@cvs.openbsd.org 2008/07/17 08:48:00
16 [sshconnect2.c]
17 strnvis preauth banner; pointed out by mpf@ ok markus@
18 - djm@cvs.openbsd.org 2008/07/17 08:51:07
19 [auth2-hostbased.c]
20 strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes
21 report and patch from res AT qoxp.net (bz#1200); ok markus@
22 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat
23 code, replace with equivalent cygwin library call. Patch from vinschen
24 at redhat.com, ok djm@.
25 - (djm) [sshconnect2.c] vis.h isn't available everywhere
26
2720080716
28 - OpenBSD CVS Sync
29 - djm@cvs.openbsd.org 2008/07/15 02:23:14
30 [sftp.1]
31 number of pipelined requests is now 64;
32 prodded by Iain.Morgan AT nasa.gov
33 - djm@cvs.openbsd.org 2008/07/16 11:51:14
34 [clientloop.c]
35 rename variable first_gc -> last_gc (since it is actually the last
36 in the list).
37 - djm@cvs.openbsd.org 2008/07/16 11:52:19
38 [channels.c]
39 this loop index should be automatic, not static
40
4120080714
42 - (djm) OpenBSD CVS Sync
43 - sthen@cvs.openbsd.org 2008/07/13 21:22:52
44 [ssh-keygen.c]
45 Change "ssh-keygen -F [host] -l" to not display random art unless
46 -v is also specified, making it consistent with the manual and other
47 uses of -l.
48 ok grunk@
49 - djm@cvs.openbsd.org 2008/07/13 22:13:07
50 [channels.c]
51 use struct sockaddr_storage instead of struct sockaddr for accept(2)
52 address argument. from visibilis AT yahoo.com in bz#1485; ok markus@
53 - djm@cvs.openbsd.org 2008/07/13 22:16:03
54 [sftp.c]
55 increase number of piplelined requests so they properly fill the
56 (recently increased) channel window. prompted by rapier AT psc.edu;
57 ok markus@
58 - djm@cvs.openbsd.org 2008/07/14 01:55:56
59 [sftp-server.8]
60 mention requirement for /dev/log inside chroot when using sftp-server
61 with ChrootDirectory
62 - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to
63 avoid clash with sin(3) function; reported by
64 cristian.ionescu-idbohrn AT axis.com
65 - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close()
66 prototype; reported by cristian.ionescu-idbohrn AT axis.com
67 - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;
68 reported by cristian.ionescu-idbohrn AT axis.com
69 - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config]
70 [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd]
71 Revamped and simplified Cygwin ssh-host-config script that uses
72 unified csih configuration tool. Requires recent Cygwin.
73 Patch from vinschen AT redhat.com
74
7520080712
76 - (djm) OpenBSD CVS Sync
77 - djm@cvs.openbsd.org 2008/07/12 04:52:50
78 [channels.c]
79 unbreak; move clearing of cctx struct to before first use
80 reported by dkrause@
81 - djm@cvs.openbsd.org 2008/07/12 05:33:41
82 [scp.1]
83 better description for -i flag:
84 s/RSA authentication/public key authentication/
85 - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h]
86 return EAI_FAMILY when trying to lookup unsupported address family;
87 from vinschen AT redhat.com
88
8920080711
90 - (djm) OpenBSD CVS Sync
91 - stevesk@cvs.openbsd.org 2008/07/07 00:31:41
92 [ttymodes.c]
93 we don't need arg after the debug3() was removed. from lint.
94 ok djm@
95 - stevesk@cvs.openbsd.org 2008/07/07 23:32:51
96 [key.c]
97 /*NOTREACHED*/ for lint warning:
98 warning: function key_equal falls off bottom without returning value
99 ok djm@
100 - markus@cvs.openbsd.org 2008/07/10 18:05:58
101 [channels.c]
102 missing bzero; from mickey; ok djm@
103 - markus@cvs.openbsd.org 2008/07/10 18:08:11
104 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c]
105 sync v1 and v2 traffic accounting; add it to sshd, too;
106 ok djm@, dtucker@
107
10820080709
109 - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass
110 - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM
111 account check failure path. The vulnerable format buffer is supplied
112 from PAM and should not contain attacker-supplied data.
113 - (djm) [auth.c] Missing unistd.h for close()
114 - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x
115
11620080705
117 - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed
118 passwords disabled. bz#1083 report & patch from senthilkumar_sen AT
119 hotpop.com, w/ dtucker@
120 - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for
121 Tru64. readv doesn't seem to be a comparable object there.
122 bz#1386, patch from dtucker@ ok me
123 - (djm) [Makefile.in] Pass though pass to conch for interop tests
124 - (djm) [configure.ac] unbreak: remove extra closing brace
125 - (djm) OpenBSD CVS Sync
126 - djm@cvs.openbsd.org 2008/07/04 23:08:25
127 [packet.c]
128 handle EINTR in packet_write_poll()l ok dtucker@
129 - djm@cvs.openbsd.org 2008/07/04 23:30:16
130 [auth1.c auth2.c]
131 Make protocol 1 MaxAuthTries logic match protocol 2's.
132 Do not treat the first protocol 2 authentication attempt as
133 a failure IFF it is for method "none".
134 Makes MaxAuthTries' user-visible behaviour identical for
135 protocol 1 vs 2.
136 ok dtucker@
137 - djm@cvs.openbsd.org 2008/07/05 05:16:01
138 [PROTOCOL]
139 grammar
140
14120080704
142 - (dtucker) OpenBSD CVS Sync
143 - djm@cvs.openbsd.org 2008/07/02 13:30:34
144 [auth2.c]
145 really really remove the freebie "none" auth try for protocol 2
146 - djm@cvs.openbsd.org 2008/07/02 13:47:39
147 [ssh.1 ssh.c]
148 When forking after authentication ("ssh -f") with ExitOnForwardFailure
149 enabled, delay the fork until after replies for any -R forwards have
150 been seen. Allows for robust detection of -R forward failure when
151 using -f (similar to bz#92); ok dtucker@
152 - otto@cvs.openbsd.org 2008/07/03 21:46:58
153 [auth2-pubkey.c]
154 avoid nasty double free; ok dtucker@ djm@
155 - djm@cvs.openbsd.org 2008/07/04 03:44:59
156 [servconf.c groupaccess.h groupaccess.c]
157 support negation of groups in "Match group" block (bz#1315); ok dtucker@
158 - dtucker@cvs.openbsd.org 2008/07/04 03:47:02
159 [monitor.c]
160 Make debug a little clearer. ok djm@
161 - djm@cvs.openbsd.org 2008/06/30 08:07:34
162 [regress/key-options.sh]
163 shell portability: use "=" instead of "==" in test(1) expressions,
164 double-quote string with backslash escaped /
165 - djm@cvs.openbsd.org 2008/06/30 10:31:11
166 [regress/{putty-transfer,putty-kex,putty-ciphers}.sh]
167 remove "set -e" left over from debugging
168 - djm@cvs.openbsd.org 2008/06/30 10:43:03
169 [regress/conch-ciphers.sh]
170 explicitly disable conch options that could interfere with the test
171 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
172 returns EXDEV. Patch from Mike Garrison, ok djm@
173 - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h]
174 [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c]
175 [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on
176 some platforms (HP nonstop) it is a distinct errno;
177 bz#1467 reported by sconeu AT yahoo.com; ok dtucker@
178
17920080702
180 - (dtucker) OpenBSD CVS Sync
181 - djm@cvs.openbsd.org 2008/06/30 08:05:59
182 [PROTOCOL.agent]
183 typo: s/constraint_date/constraint_data/
184 - djm@cvs.openbsd.org 2008/06/30 12:15:39
185 [serverloop.c]
186 only pass channel requests on session channels through to the session
187 channel handler, avoiding spurious log messages; ok! markus@
188 - djm@cvs.openbsd.org 2008/06/30 12:16:02
189 [nchan.c]
190 only send eow@openssh.com notifications for session channels; ok! markus@
191 - djm@cvs.openbsd.org 2008/06/30 12:18:34
192 [PROTOCOL]
193 clarify that eow@openssh.com is only sent on session channels
194 - dtucker@cvs.openbsd.org 2008/07/01 07:20:52
195 [sshconnect.c]
196 Check ExitOnForwardFailure if forwardings are disabled due to a failed
197 host key check. ok djm@
198 - dtucker@cvs.openbsd.org 2008/07/01 07:24:22
199 [sshconnect.c sshd.c]
200 Send CR LF during protocol banner exchanges, but only for Protocol 2 only,
201 in order to comply with RFC 4253. bz #1443, ok djm@
202 - stevesk@cvs.openbsd.org 2008/07/01 23:12:47
203 [PROTOCOL.agent]
204 fix some typos; ok djm@
205 - djm@cvs.openbsd.org 2008/07/02 02:24:18
206 [sshd_config sshd_config.5 sshd.8 servconf.c]
207 increase default size of ssh protocol 1 ephemeral key from 768 to 1024
208 bits; prodded by & ok dtucker@ ok deraadt@
209 - dtucker@cvs.openbsd.org 2008/07/02 12:03:51
210 [auth-rsa.c auth.c auth2-pubkey.c auth.h]
211 Merge duplicate host key file checks, based in part on a patch from Rob
212 Holland via bz #1348 . Also checks for non-regular files during protocol
213 1 RSA auth. ok djm@
214 - djm@cvs.openbsd.org 2008/07/02 12:36:39
215 [auth2-none.c auth2.c]
216 Make protocol 2 MaxAuthTries behaviour a little more sensible:
217 Check whether client has exceeded MaxAuthTries before running
218 an authentication method and skip it if they have, previously it
219 would always allow one try (for "none" auth).
220 Preincrement failure count before post-auth test - previously this
221 checked and postincremented, also to allow one "none" try.
222 Together, these two changes always count the "none" auth method
223 which could be skipped by a malicious client (e.g. an SSH worm)
224 to get an extra attempt at a real auth method. They also make
225 MaxAuthTries=0 a useful way to block users entirely (esp. in a
226 sshd_config Match block).
227 Also, move sending of any preauth banner from "none" auth method
228 to the first call to input_userauth_request(), so worms that skip
229 the "none" method get to see it too.
230
23120080630
232 - (djm) OpenBSD CVS Sync
233 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
234 [regress/Makefile regress/key-options.sh]
235 Add regress test for key options. ok djm@
236 - dtucker@cvs.openbsd.org 2008/06/11 23:11:40
237 [regress/Makefile]
238 Don't run cipher-speed test by default; mistakenly enabled by me
239 - djm@cvs.openbsd.org 2008/06/28 13:57:25
240 [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh]
241 very basic regress test against Twisted Conch in "make interop"
242 target (conch is available in ports/devel/py-twisted/conch);
243 ok markus@
244 - (djm) [regress/Makefile] search for conch by path, like we do putty
245
24620080629
247 - (djm) OpenBSD CVS Sync
248 - martynas@cvs.openbsd.org 2008/06/21 07:46:46
249 [sftp.c]
250 use optopt to get invalid flag, instead of return value of getopt,
251 which is always '?'; ok djm@
252 - otto@cvs.openbsd.org 2008/06/25 11:13:43
253 [key.c]
254 add key length to visual fingerprint; zap magical constants;
255 ok grunk@ djm@
256 - djm@cvs.openbsd.org 2008/06/26 06:10:09
257 [sftp-client.c sftp-server.c]
258 allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky
259 bits. Note that this only affects explicit setting of modes (e.g. via
260 sftp(1)'s chmod command) and not file transfers. (bz#1310)
261 ok deraadt@ at c2k8
262 - djm@cvs.openbsd.org 2008/06/26 09:19:40
263 [dh.c dh.h moduli.c]
264 when loading moduli from /etc/moduli in sshd(8), check that they
265 are of the expected "safe prime" structure and have had
266 appropriate primality tests performed;
267 feedback and ok dtucker@
268 - grunk@cvs.openbsd.org 2008/06/26 11:46:31
269 [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c]
270 Move SSH Fingerprint Visualization away from sharing the config option
271 CheckHostIP to an own config option named VisualHostKey.
272 While there, fix the behaviour that ssh would draw a random art picture
273 on every newly seen host even when the option was not enabled.
274 prodded by deraadt@, discussions,
275 help and ok markus@ djm@ dtucker@
276 - jmc@cvs.openbsd.org 2008/06/26 21:11:46
277 [ssh.1]
278 add VisualHostKey to the list of options listed in -o;
279 - djm@cvs.openbsd.org 2008/06/28 07:25:07
280 [PROTOCOL]
281 spelling fixes
282 - djm@cvs.openbsd.org 2008/06/28 13:58:23
283 [ssh-agent.c]
284 refuse to add a key that has unknown constraints specified;
285 ok markus
286 - djm@cvs.openbsd.org 2008/06/28 14:05:15
287 [ssh-agent.c]
288 reset global compat flag after processing a protocol 2 signature
289 request with the legacy DSA encoding flag set; ok markus
290 - djm@cvs.openbsd.org 2008/06/28 14:08:30
291 [PROTOCOL PROTOCOL.agent]
292 document the protocol used by ssh-agent; "looks ok" markus@
293
29420080628
295 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
296 RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).
297
29820080626
299 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
300 (bz#1372)
301 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
302 [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.
303
30420080616
305 - (dtucker) OpenBSD CVS Sync
306 - dtucker@cvs.openbsd.org 2008/06/16 13:22:53
307 [session.c channels.c]
308 Rename the isatty argument to is_tty so we don't shadow
309 isatty(3). ok markus@
310 - (dtucker) [channels.c] isatty -> is_tty here too.
311
31220080615
313 - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.
314 - OpenBSD CVS Sync
315 - dtucker@cvs.openbsd.org 2008/06/14 15:49:48
316 [sshd.c]
317 wrap long line at 80 chars
318 - dtucker@cvs.openbsd.org 2008/06/14 17:07:11
319 [sshd.c]
320 ensure default umask disallows at least group and world write; ok djm@
321 - djm@cvs.openbsd.org 2008/06/14 18:33:43
322 [session.c]
323 suppress the warning message from chdir(homedir) failures
324 when chrooted (bz#1461); ok dtucker
325 - dtucker@cvs.openbsd.org 2008/06/14 19:42:10
326 [scp.1]
327 Mention that scp follows symlinks during -r. bz #1466,
328 from nectar at apple
329 - dtucker@cvs.openbsd.org 2008/06/15 16:55:38
330 [sshd_config.5]
331 MaxSessions is allowed in a Match block too
332 - dtucker@cvs.openbsd.org 2008/06/15 16:58:40
333 [servconf.c sshd_config.5]
334 Allow MaxAuthTries within a Match block. ok djm@
335 - djm@cvs.openbsd.org 2008/06/15 20:06:26
336 [channels.c channels.h session.c]
337 don't call isatty() on a pty master, instead pass a flag down to
338 channel_set_fds() indicating that te fds refer to a tty. Fixes a
339 hang on exit on Solaris (bz#1463) in portable but is actually
340 a generic bug; ok dtucker deraadt markus
341
34220080614
343 - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
344 replacement code; patch from ighighi AT gmail.com in bz#1240;
345 ok dtucker
346
34720080613
348 - (dtucker) OpenBSD CVS Sync
349 - deraadt@cvs.openbsd.org 2008/06/13 09:44:36
350 [packet.c]
351 compile on older gcc; no decl after code
352 - dtucker@cvs.openbsd.org 2008/06/13 13:56:59
353 [monitor.c]
354 Clear key options in the monitor on failed authentication, prevents
355 applying additional restrictions to non-pubkey authentications in
356 the case where pubkey fails but another method subsequently succeeds.
357 bz #1472, found by Colin Watson, ok markus@ djm@
358 - dtucker@cvs.openbsd.org 2008/06/13 14:18:51
359 [auth2-pubkey.c auth-rhosts.c]
360 Include unistd.h for close(), prevents warnings in -portable
361 - dtucker@cvs.openbsd.org 2008/06/13 17:21:20
362 [mux.c]
363 Friendlier error messages for mux fallback. ok djm@
364 - dtucker@cvs.openbsd.org 2008/06/13 18:55:22
365 [scp.c]
366 Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@
367 - grunk@cvs.openbsd.org 2008/06/13 20:13:26
368 [ssh.1]
369 Explain the use of SSH fpr visualization using random art, and cite the
370 original scientific paper inspiring that technique.
371 Much help with English and nroff by jmc@, thanks.
372 - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
373 despite its name doesn't seem to implement all of GSSAPI. Patch from
374 Jan Engelhardt, sanity checked by Simon Wilkinson.
375
37620080612
377 - (dtucker) OpenBSD CVS Sync
378 - jmc@cvs.openbsd.org 2008/06/11 07:30:37
379 [sshd.8]
380 kill trailing whitespace;
381 - grunk@cvs.openbsd.org 2008/06/11 21:01:35
382 [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
383 sshconnect.c]
384 Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
385 graphical hash visualization schemes known as "random art", and by
386 Dan Kaminsky's musings on the subject during a BlackOp talk at the
387 23C3 in Berlin.
388 Scientific publication (original paper):
389 "Hash Visualization: a New Technique to improve Real-World Security",
390 Perrig A. and Song D., 1999, International Workshop on Cryptographic
391 Techniques and E-Commerce (CrypTEC '99)
392 http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
393 The algorithm used here is a worm crawling over a discrete plane,
394 leaving a trace (augmenting the field) everywhere it goes.
395 Movement is taken from dgst_raw 2bit-wise. Bumping into walls
396 makes the respective movement vector be ignored for this turn,
397 thus switching to the other color of the chessboard.
398 Graphs are not unambiguous for now, because circles in graphs can be
399 walked in either direction.
400 discussions with several people,
401 help, corrections and ok markus@ djm@
402 - grunk@cvs.openbsd.org 2008/06/11 21:38:25
403 [ssh-keygen.c]
404 ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
405 would not display you the random art as intended, spotted by canacar@
406 - grunk@cvs.openbsd.org 2008/06/11 22:20:46
407 [ssh-keygen.c ssh-keygen.1]
408 ssh-keygen would write fingerprints to STDOUT, and random art to STDERR,
409 that is not how it was envisioned.
410 Also correct manpage saying that -v is needed along with -l for it to work.
411 spotted by naddy@
412 - otto@cvs.openbsd.org 2008/06/11 23:02:22
413 [key.c]
414 simpler way of computing the augmentations; ok grunk@
415 - grunk@cvs.openbsd.org 2008/06/11 23:03:56
416 [ssh_config.5]
417 CheckHostIP set to ``fingerprint'' will display both hex and random art
418 spotted by naddy@
419 - grunk@cvs.openbsd.org 2008/06/11 23:51:57
420 [key.c]
421 #define statements that are not atoms need braces around them, else they
422 will cause trouble in some cases.
423 Also do a computation of -1 once, and not in a loop several times.
424 spotted by otto@
425 - dtucker@cvs.openbsd.org 2008/06/12 00:03:49
426 [dns.c canohost.c sshconnect.c]
427 Do not pass "0" strings as ports to getaddrinfo because the lookups
428 can slow things down and we never use the service info anyway. bz
429 #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok
430 deraadt@ djm@
431 djm belives that the reason for the "0" strings is to ensure that
432 it's not possible to call getaddrinfo with both host and port being
433 NULL. In the case of canohost.c host is a local array. In the
434 case of sshconnect.c, it's checked for null immediately before use.
435 In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
436 be non-null but it's not obvious, so I added a warning message in
437 case it is ever passed a null.
438 - grunk@cvs.openbsd.org 2008/06/12 00:13:55
439 [sshconnect.c]
440 Make ssh print the random art also when ssh'ing to a host using IP only.
441 spotted by naddy@, ok and help djm@ dtucker@
442 - otto@cvs.openbsd.org 2008/06/12 00:13:13
443 [key.c]
444 use an odd number of rows and columns and a separate start marker, looks
445 better; ok grunk@
446 - djm@cvs.openbsd.org 2008/06/12 03:40:52
447 [clientloop.h mux.c channels.c clientloop.c channels.h]
448 Enable ~ escapes for multiplex slave sessions; give each channel
449 its own escape state and hook the escape filters up to muxed
450 channels. bz #1331
451 Mux slaves do not currently support the ~^Z and ~& escapes.
452 NB. this change cranks the mux protocol version, so a new ssh
453 mux client will not be able to connect to a running old ssh
454 mux master.
455 ok dtucker@
456 - djm@cvs.openbsd.org 2008/06/12 04:06:00
457 [clientloop.h ssh.c clientloop.c]
458 maintain an ordered queue of outstanding global requests that we
459 expect replies to, similar to the per-channel confirmation queue.
460 Use this queue to verify success or failure for remote forward
461 establishment in a race free way.
462 ok dtucker@
463 - djm@cvs.openbsd.org 2008/06/12 04:17:47
464 [clientloop.c]
465 thall shalt not code past the eightieth column
466 - djm@cvs.openbsd.org 2008/06/12 04:24:06
467 [ssh.c]
468 thal shalt not code past the eightieth column
469 - djm@cvs.openbsd.org 2008/06/12 05:15:41
470 [PROTOCOL]
471 document tun@openssh.com forwarding method
472 - djm@cvs.openbsd.org 2008/06/12 05:32:30
473 [mux.c]
474 some more TODO for me
475 - grunk@cvs.openbsd.org 2008/06/12 05:42:46
476 [key.c]
477 supply the key type (rsa1, rsa, dsa) as a caption in the frame of the
478 random art. while there, stress the fact that the field base should at
479 least be 8 characters for the pictures to make sense.
480 comment and ok djm@
481 - grunk@cvs.openbsd.org 2008/06/12 06:32:59
482 [key.c]
483 We already mark the start of the worm, now also mark the end of the worm
484 in our random art drawings.
485 ok djm@
486 - djm@cvs.openbsd.org 2008/06/12 15:19:17
487 [clientloop.h channels.h clientloop.c channels.c mux.c]
488 The multiplexing escape char handler commit last night introduced a
489 small memory leak per session; plug it.
490 - dtucker@cvs.openbsd.org 2008/06/12 16:35:31
491 [ssh_config.5 ssh.c]
492 keyword expansion for localcommand. ok djm@
493 - jmc@cvs.openbsd.org 2008/06/12 19:10:09
494 [ssh_config.5 ssh-keygen.1]
495 tweak the ascii art text; ok grunk
496 - dtucker@cvs.openbsd.org 2008/06/12 20:38:28
497 [sshd.c sshconnect.c packet.h misc.c misc.h packet.c]
498 Make keepalive timeouts apply while waiting for a packet, particularly
499 during key renegotiation (bz #1363). With djm and Matt Day, ok djm@
500 - djm@cvs.openbsd.org 2008/06/12 20:47:04
501 [sftp-client.c]
502 print extension revisions for extensions that we understand
503 - djm@cvs.openbsd.org 2008/06/12 21:06:25
504 [clientloop.c]
505 I was coalescing expected global request confirmation replies at
506 the wrong end of the queue - fix; prompted by markus@
507 - grunk@cvs.openbsd.org 2008/06/12 21:14:46
508 [ssh-keygen.c]
509 make ssh-keygen -lf show the key type just as ssh-add -l would do it
510 ok djm@ markus@
511 - grunk@cvs.openbsd.org 2008/06/12 22:03:36
512 [key.c]
513 add my copyright, ok djm@
514 - ian@cvs.openbsd.org 2008/06/12 23:24:58
515 [sshconnect.c]
516 tweak wording in message, ok deraadt@ jmc@
517 - dtucker@cvs.openbsd.org 2008/06/13 00:12:02
518 [sftp.h log.h]
519 replace __dead with __attribute__((noreturn)), makes things
520 a little easier to port. Also, add it to sigdie(). ok djm@
521 - djm@cvs.openbsd.org 2008/06/13 00:16:49
522 [mux.c]
523 fall back to creating a new TCP connection on most multiplexing errors
524 (socket connect fail, invalid version, refused permittion, corrupted
525 messages, etc.); bz #1329 ok dtucker@
526 - dtucker@cvs.openbsd.org 2008/06/13 00:47:53
527 [mux.c]
528 upcast size_t to u_long to match format arg; ok djm@
529 - dtucker@cvs.openbsd.org 2008/06/13 00:51:47
530 [mac.c]
531 upcast another size_t to u_long to match format
532 - dtucker@cvs.openbsd.org 2008/06/13 01:38:23
533 [misc.c]
534 upcast uid to long with matching %ld, prevents warnings in portable
535 - djm@cvs.openbsd.org 2008/06/13 04:40:22
536 [auth2-pubkey.c auth-rhosts.c]
537 refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not
538 regular files; report from Solar Designer via Colin Watson in bz#1471
539 ok dtucker@ deraadt
540 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now
541 takes 2 more args. with djm@
542 - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
543 from Todd Vierling.
544 - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
545 systems. Patch from R. Scott Bailey.
546 - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
547 on big endian machines, so ifdef them for little-endian only to prevent
548 unused function warnings on big-endians.
549 - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
550 compiler warnings on some platforms. Based on a discussion with otto@
551
55220080611
553 - (djm) [channels.c configure.ac]
554 Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no)
555 bz#1464; ok dtucker
556
55720080610
558 - (dtucker) OpenBSD CVS Sync
559 - djm@cvs.openbsd.org 2008/06/10 03:57:27
560 [servconf.c match.h sshd_config.5]
561 support CIDR address matching in sshd_config "Match address" blocks, with
562 full support for negation and fall-back to classic wildcard matching.
563 For example:
564 Match address 192.0.2.0/24,3ffe:ffff::/32,!10.*
565 PasswordAuthentication yes
566 addrmatch.c code mostly lifted from flowd's addr.c
567 feedback and ok dtucker@
568 - djm@cvs.openbsd.org 2008/06/10 04:17:46
569 [sshd_config.5]
570 better reference for pattern-list
571 - dtucker@cvs.openbsd.org 2008/06/10 04:50:25
572 [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8]
573 Add extended test mode (-T) and connection parameters for test mode (-C).
574 -T causes sshd to write its effective configuration to stdout and exit.
575 -C causes any relevant Match rules to be applied before output. The
576 combination allows tesing of the parser and config files. ok deraadt djm
577 - jmc@cvs.openbsd.org 2008/06/10 07:12:00
578 [sshd_config.5]
579 tweak previous;
580 - jmc@cvs.openbsd.org 2008/06/10 08:17:40
581 [sshd.8 sshd.c]
582 - update usage()
583 - fix SYNOPSIS, and sort options
584 - some minor additional fixes
585 - dtucker@cvs.openbsd.org 2008/06/09 18:06:32
586 [regress/test-exec.sh]
587 Don't generate putty keys if we're not going to use them. ok djm
588 - dtucker@cvs.openbsd.org 2008/06/10 05:23:32
589 [regress/addrmatch.sh regress/Makefile]
590 Regress test for Match CIDR rules. ok djm@
591 - dtucker@cvs.openbsd.org 2008/06/10 15:21:41
592 [test-exec.sh]
593 Use a more portable construct for checking if we're running a putty test
594 - dtucker@cvs.openbsd.org 2008/06/10 15:28:49
595 [test-exec.sh]
596 Add quotes
597 - dtucker@cvs.openbsd.org 2008/06/10 18:21:24
598 [ssh_config.5]
599 clarify that Host patterns are space-separated. ok deraadt
600 - djm@cvs.openbsd.org 2008/06/10 22:15:23
601 [PROTOCOL ssh.c serverloop.c]
602 Add a no-more-sessions@openssh.com global request extension that the
603 client sends when it knows that it will never request another session
604 (i.e. when session multiplexing is disabled). This allows a server to
605 disallow further session requests and terminate the session.
606 Why would a non-multiplexing client ever issue additional session
607 requests? It could have been attacked with something like SSH'jack:
608 http://www.storm.net.nz/projects/7
609 feedback & ok markus
610 - djm@cvs.openbsd.org 2008/06/10 23:06:19
611 [auth-options.c match.c servconf.c addrmatch.c sshd.8]
612 support CIDR address matching in .ssh/authorized_keys from="..." stanzas
613 ok and extensive testing dtucker@
614 - dtucker@cvs.openbsd.org 2008/06/10 23:21:34
615 [bufaux.c]
616 Use '\0' for a nul byte rather than unadorned 0. ok djm@
617 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
618 [Makefile regress/key-options.sh]
619 Add regress test for key options. ok djm@
620 - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6
621 since the new CIDR code in addmatch.c references it.
622 - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
623 specific tests on platforms that don't do IPv6.
624 - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
625 as environment.
626 - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.
627
62820080609
629 - (dtucker) OpenBSD CVS Sync
630 - dtucker@cvs.openbsd.org 2008/06/08 17:04:41
631 [sftp-server.c]
632 Add case for ENOSYS in errno_to_portable; ok deraadt
633 - dtucker@cvs.openbsd.org 2008/06/08 20:15:29
634 [sftp.c sftp-client.c sftp-client.h]
635 Have the sftp client store the statvfs replies in wire format,
636 which prevents problems when the server's native sizes exceed the
637 client's.
638 Also extends the sizes of the remaining 32bit wire format to 64bit,
639 they're specified as unsigned long in the standard.
640 - dtucker@cvs.openbsd.org 2008/06/09 13:02:39
641 [sftp-server.c]
642 Extend 32bit -> 64bit values for statvfs extension missed in previous
643 commit.
644 - dtucker@cvs.openbsd.org 2008/06/09 13:38:46
645 [PROTOCOL]
646 Use a $OpenBSD tag so our scripts will sync changes.
647
64820080608
649 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c
650 openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h
651 openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and
652 fstatvfs and remove #defines around statvfs code. ok djm@
653 - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a
654 macro to convert fsid to unsigned long for platforms where fsid is a
655 2-member array.
656
65720080607
658 - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H.
659 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c]
660 Do not enable statvfs extensions on platforms that do not have statvfs.
661 - (dtucker) OpenBSD CVS Sync
662 - djm@cvs.openbsd.org 2008/05/19 06:14:02
663 [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@
664 - djm@cvs.openbsd.org 2008/05/19 15:45:07
665 [sshtty.c ttymodes.c sshpty.h]
666 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
667 we would send the modes corresponding to a zeroed struct termios,
668 whereas we should have been sending an empty list of modes.
669 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
670 - djm@cvs.openbsd.org 2008/05/19 15:46:31
671 [ssh-keygen.c]
672 support -l (print fingerprint) in combination with -F (find host) to
673 search for a host in ~/.ssh/known_hosts and display its fingerprint;
674 ok markus@
675 - djm@cvs.openbsd.org 2008/05/19 20:53:52
676 [clientloop.c]
677 unbreak tree by committing this bit that I missed from:
678 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
679 we would send the modes corresponding to a zeroed struct termios,
680 whereas we should have been sending an empty list of modes.
681 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
682
68320080604
684 - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias
685 in arc4random_uniform with upper_bound in (2^30,2*31). Note that
686 OpenSSH did not make requests with upper bounds in this range.
687
68820080519
689 - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in]
690 [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h]
691 Fix compilation on Linux, including pulling in fmt_scaled(3)
692 implementation from OpenBSD's libutil.
693
69420080518
695 - (djm) OpenBSD CVS Sync
696 - djm@cvs.openbsd.org 2008/04/04 05:14:38
697 [sshd_config.5]
698 ChrootDirectory is supported in Match blocks (in fact, it is most useful
699 there). Spotted by Minstrel AT minstrel.org.uk
700 - djm@cvs.openbsd.org 2008/04/04 06:44:26
701 [sshd_config.5]
702 oops, some unrelated stuff crept into that commit - backout.
703 spotted by jmc@
704 - djm@cvs.openbsd.org 2008/04/05 02:46:02
705 [sshd_config.5]
706 HostbasedAuthentication is supported under Match too
707 - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c]
708 [configure.ac] Implement arc4random_buf(), import implementation of
709 arc4random_uniform() from OpenBSD
710 - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes
711 - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h
712 - (djm) OpenBSD CVS Sync
713 - djm@cvs.openbsd.org 2008/04/13 00:22:17
714 [dh.c sshd.c]
715 Use arc4random_buf() when requesting more than a single word of output
716 Use arc4random_uniform() when the desired random number upper bound
717 is not a power of two
718 ok deraadt@ millert@
719 - djm@cvs.openbsd.org 2008/04/18 12:32:11
720 [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h]
721 introduce sftp extension methods statvfs@openssh.com and
722 fstatvfs@openssh.com that implement statvfs(2)-like operations,
723 based on a patch from miklos AT szeredi.hu (bz#1399)
724 also add a "df" command to the sftp client that uses the
725 statvfs@openssh.com to produce a df(1)-like display of filesystem
726 space and inode utilisation
727 ok markus@
728 - jmc@cvs.openbsd.org 2008/04/18 17:15:47
729 [sftp.1]
730 macro fixage;
731 - djm@cvs.openbsd.org 2008/04/18 22:01:33
732 [session.c]
733 remove unneccessary parentheses
734 - otto@cvs.openbsd.org 2008/04/29 11:20:31
735 [monitor_mm.h]
736 garbage collect two unused fields in struct mm_master; ok markus@
737 - djm@cvs.openbsd.org 2008/04/30 10:14:03
738 [ssh-keyscan.1 ssh-keyscan.c]
739 default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by
740 larsnooden AT openoffice.org
741 - pyr@cvs.openbsd.org 2008/05/07 05:49:37
742 [servconf.c servconf.h session.c sshd_config.5]
743 Enable the AllowAgentForwarding option in sshd_config (global and match
744 context), to specify if agents should be permitted on the server.
745 As the man page states:
746 ``Note that disabling Agent forwarding does not improve security
747 unless users are also denied shell access, as they can always install
748 their own forwarders.''
749 ok djm@, ok and a mild frown markus@
750 - pyr@cvs.openbsd.org 2008/05/07 06:43:35
751 [sshd_config]
752 push the sshd_config bits in, spotted by ajacoutot@
753 - jmc@cvs.openbsd.org 2008/05/07 08:00:14
754 [sshd_config.5]
755 sort;
756 - markus@cvs.openbsd.org 2008/05/08 06:59:01
757 [bufaux.c buffer.h channels.c packet.c packet.h]
758 avoid extra malloc/copy/free when receiving data over the net;
759 ~10% speedup for localhost-scp; ok djm@
760 - djm@cvs.openbsd.org 2008/05/08 12:02:23
761 [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c]
762 [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c]
763 [ssh.c sshd.c]
764 Implement a channel success/failure status confirmation callback
765 mechanism. Each channel maintains a queue of callbacks, which will
766 be drained in order (RFC4253 guarantees confirm messages are not
767 reordered within an channel).
768 Also includes a abandonment callback to clean up if a channel is
769 closed without sending confirmation messages. This probably
770 shouldn't happen in compliant implementations, but it could be
771 abused to leak memory.
772 ok markus@ (as part of a larger diff)
773 - djm@cvs.openbsd.org 2008/05/08 12:21:16
774 [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c]
775 [sshd_config sshd_config.5]
776 Make the maximum number of sessions run-time controllable via
777 a sshd_config MaxSessions knob. This is useful for disabling
778 login/shell/subsystem access while leaving port-forwarding working
779 (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or
780 simply increasing the number of allows multiplexed sessions.
781 Because some bozos are sure to configure MaxSessions in excess of the
782 number of available file descriptors in sshd (which, at peak, might be
783 as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds
784 on error paths, and make it fail gracefully on out-of-fd conditions -
785 sending channel errors instead of than exiting with fatal().
786 bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com
787 ok markus@
788 - djm@cvs.openbsd.org 2008/05/08 13:06:11
789 [clientloop.c clientloop.h ssh.c]
790 Use new channel status confirmation callback system to properly deal
791 with "important" channel requests that fail, in particular command exec,
792 shell and subsystem requests. Previously we would optimistically assume
793 that the requests would always succeed, which could cause hangs if they
794 did not (e.g. when the server runs out of fds) or were unimplemented by
795 the server (bz #1384)
796 Also, properly report failing multiplex channel requests via the mux
797 client stderr (subject to LogLevel in the mux master) - better than
798 silently failing.
799 most bits ok markus@ (as part of a larger diff)
800 - djm@cvs.openbsd.org 2008/05/09 04:55:56
801 [channels.c channels.h clientloop.c serverloop.c]
802 Try additional addresses when connecting to a port forward destination
803 whose DNS name resolves to more than one address. The previous behaviour
804 was to try the first address and give up.
805 Reported by stig AT venaas.com in bz#343
806 great feedback and ok markus@
807 - djm@cvs.openbsd.org 2008/05/09 14:18:44
808 [clientloop.c clientloop.h ssh.c mux.c]
809 tidy up session multiplexing code, moving it into its own file and
810 making the function names more consistent - making ssh.c and
811 clientloop.c a fair bit more readable.
812 ok markus@
813 - djm@cvs.openbsd.org 2008/05/09 14:26:08
814 [ssh.c]
815 dingo stole my diff hunk
816 - markus@cvs.openbsd.org 2008/05/09 16:16:06
817 [session.c]
818 re-add the USE_PIPES code and enable it.
819 without pipes shutdown-read from the sshd does not trigger
820 a SIGPIPE when the forked program does a write.
821 ok djm@
822 (Id sync only, USE_PIPES never left portable OpenSSH)
823 - markus@cvs.openbsd.org 2008/05/09 16:17:51
824 [channels.c]
825 error-fd race: don't enable the error fd in the select bitmask
826 for channels with both in- and output closed, since the channel
827 will go away before we call select();
828 report, lots of debugging help and ok djm@
829 - markus@cvs.openbsd.org 2008/05/09 16:21:13
830 [channels.h clientloop.c nchan.c serverloop.c]
831 unbreak
832 ssh -2 localhost od /bin/ls | true
833 ignoring SIGPIPE by adding a new channel message (EOW) that signals
834 the peer that we're not interested in any data it might send.
835 fixes bz #85; discussion, debugging and ok djm@
836 - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20
837 [umac.c]
838 Ensure nh_result lies on a 64-bit boundary (fixes warnings observed
839 on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
840 - djm@cvs.openbsd.org 2008/05/15 23:52:24
841 [nchan2.ms]
842 document eow message in ssh protocol 2 channel state machine;
843 feedback and ok markus@
844 - djm@cvs.openbsd.org 2008/05/18 21:29:05
845 [sftp-server.c]
846 comment extension announcement
847 - djm@cvs.openbsd.org 2008/05/16 08:30:42
848 [PROTOCOL]
849 document our protocol extensions and deviations; ok markus@
850 - djm@cvs.openbsd.org 2008/05/17 01:31:56
851 [PROTOCOL]
852 grammar and correctness fixes from stevesk@
853
85420080403
855 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile-
856 time warnings on LynxOS. Patch from ops AT iki.fi
857 - (djm) Force string arguments to replacement setproctitle() though
858 strnvis first. Ok dtucker@
859
86020080403
861 - (djm) OpenBSD CVS sync:
862 - markus@cvs.openbsd.org 2008/04/02 15:36:51
863 [channels.c]
864 avoid possible hijacking of x11-forwarded connections (back out 1.183)
865 CVE-2008-1483; ok djm@
866 - jmc@cvs.openbsd.org 2008/03/27 22:37:57
867 [sshd.8]
868 remove trailing whitespace;
869 - djm@cvs.openbsd.org 2008/04/03 09:50:14
870 [version.h]
871 openssh-5.0
872 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
873 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
874 - (djm) [README] Update link to release notes
875 - (djm) Release 5.0p1
876
87720080315
878 - (djm) [regress/test-exec.sh] Quote putty-related variables in case they are
879 empty; report and patch from Peter Stuge
880 - (djm) [regress/test-exec.sh] Silence noise from detection of putty
881 commands; report from Peter Stuge
882 - (djm) [session.c] Relocate incorrectly-placed closefrom() that was causing
883 crashes when used with ChrootDirectory
884
885
88620080327
887 - (dtucker) Cache selinux status earlier so we know if it's enabled after a
888 chroot. Allows ChrootDirectory to work with selinux support compiled in
889 but not enabled. Using it with selinux enabled will require some selinux
890 support inside the chroot. "looks sane" djm@
891 - (djm) Fix RCS ident in sftp-server-main.c
892 - (djm) OpenBSD CVS sync:
893 - jmc@cvs.openbsd.org 2008/02/11 07:58:28
894 [ssh.1 sshd.8 sshd_config.5]
895 bump Mdocdate for pages committed in "febuary", necessary because
896 of a typo in rcs.c;
897 - deraadt@cvs.openbsd.org 2008/03/13 01:49:53
898 [monitor_fdpass.c]
899 Correct CMSG_SPACE and CMSG_LEN usage everywhere in the tree. Due to
900 an extensive discussion with otto, kettenis, millert, and hshoexer
901 - deraadt@cvs.openbsd.org 2008/03/15 16:19:02
902 [monitor_fdpass.c]
903 Repair the simple cases for msg_controllen where it should just be
904 CMSG_SIZE(sizeof(int)), not sizeof(buffer) which may be larger because
905 of alignment; ok kettenis hshoexer
906 - djm@cvs.openbsd.org 2008/03/23 12:54:01
907 [sftp-client.c]
908 prefer POSIX-style file renaming over filexfer rename behaviour if the
909 server supports the posix-rename@openssh.com extension.
910 Note that the old (filexfer) behaviour would refuse to clobber an
911 existing file. Users who depended on this should adjust their sftp(1)
912 usage.
913 ok deraadt@ markus@
914 - deraadt@cvs.openbsd.org 2008/03/24 16:11:07
915 [monitor_fdpass.c]
916 msg_controllen has to be CMSG_SPACE so that the kernel can account for
917 each cmsg_len (ie. msg_controllen = sum of CMSG_ALIGN(cmsg_len). This
918 works now that kernel fd passing has been fixed to accept a bit of
919 sloppiness because of this ABI repair.
920 lots of discussion with kettenis
921 - djm@cvs.openbsd.org 2008/03/25 11:58:02
922 [session.c sshd_config.5]
923 ignore ~/.ssh/rc if a sshd_config ForceCommand is specified;
924 from dtucker@ ok deraadt@ djm@
925 - djm@cvs.openbsd.org 2008/03/25 23:01:41
926 [session.c]
927 last patch had backwards test; spotted by termim AT gmail.com
928 - djm@cvs.openbsd.org 2008/03/26 21:28:14
929 [auth-options.c auth-options.h session.c sshd.8]
930 add no-user-rc authorized_keys option to disable execution of ~/.ssh/rc
931 - djm@cvs.openbsd.org 2008/03/27 00:16:49
932 [version.h]
933 openssh-4.9
934 - djm@cvs.openbsd.org 2008/03/24 21:46:54
935 [regress/sftp-badcmds.sh]
936 disable no-replace rename test now that we prefer a POSIX rename; spotted
937 by dkrause@
938 - (djm) [configure.ac] fix alignment of --without-stackprotect description
939 - (djm) [configure.ac] --with-selinux too
940 - (djm) [regress/Makefile] cleanup PuTTY interop test droppings
941 - (djm) [README] Update link to release notes
942 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
943 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
944 - (djm) Release 4.9p1
945
94620080315
947 - (djm) [regress/test-exec.sh] Quote putty-related variables in case they are
948 empty; report and patch from Peter Stuge
949 - (djm) [regress/test-exec.sh] Silence noise from detection of putty
950 commands; report from Peter Stuge
951 - (djm) [session.c] Relocate incorrectly-placed closefrom() that was causing
952 crashes when used with ChrootDirectory
953
95420080314
955 - (tim) [regress/sftp-cmds.sh] s/cd/lcd/ in lls test. Reported by
956 vinschen at redhat.com. Add () to put echo commands in subshell for lls test
957 I mistakenly left out of last commit.
958 - (tim) [regress/localcommand.sh] Shell portability fix. Reported by imorgan at
959 nas.nasa.gov
960
96120080313
962 - (djm) [Makefile.in regress/Makefile] Fix interop-tests target (note to
963 self: make changes to Makefile.in next time, not the generated Makefile).
964 - (djm) [Makefile.in regress/test-exec.sh] Find installed plink(1) and
965 puttygen(1) by $PATH
966 - (tim) [scp.c] Use poll.h if available, fall back to sys/poll.h if not. Patch
967 by vinschen at redhat.com.
968 - (tim) [regress/sftp-cmds.sh regress/ssh2putty.sh] Shell portability fixes
969 from vinschen at redhat.com and imorgan at nas.nasa.gov
970
97120080312
972 - (djm) OpenBSD CVS Sync
973 - dtucker@cvs.openbsd.org 2007/10/29 06:57:13
974 [regress/Makefile regress/localcommand.sh]
975 Add simple regress test for LocalCommand; ok djm@
976 - jmc@cvs.openbsd.org 2007/11/25 15:35:09
977 [regress/agent-getpeereid.sh regress/agent.sh]
978 more existant -> existent, from Martynas Venckus;
979 pfctl changes: ok henning
980 ssh changes: ok deraadt
981 - djm@cvs.openbsd.org 2007/12/12 05:04:03
982 [regress/sftp-cmds.sh]
983 unbreak lls command and add a regress test that would have caught the
984 breakage; spotted by mouring@
985 NB. sftp code change already committed.
986 - djm@cvs.openbsd.org 2007/12/21 04:13:53
987 [regress/Makefile regress/test-exec.sh regress/putty-ciphers.sh]
988 [regress/putty-kex.sh regress/putty-transfer.sh regress/ssh2putty.sh]
989 basic (crypto, kex and transfer) interop regression tests against putty
990 To run these, install putty and run "make interop-tests" from the build
991 directory - the tests aren't run by default yet.
992
99320080311
994 - (dtucker) [auth-pam.c monitor.c session.c sshd.c] Bug #926: Move
995 pam_open_session and pam_close_session into the privsep monitor, which
996 will ensure that pam_session_close is called as root. Patch from Tomas
997 Mraz.
998
99920080309
1000 - (dtucker) [configure.ac] It turns out gcc's -fstack-protector-all doesn't
1001 always work for all platforms and versions, so test what we can and
1002 add a configure flag to turn it of if needed. ok djm@
1003 - (dtucker) [openbsd-compat/port-aix.{c,h}] Remove AIX specific initgroups
1004 implementation. It's not needed to fix bug #1081 and breaks the build
1005 on some AIX configurations.
1006 - (dtucker) [openbsd-compat/regress/strtonumtest.c] Bug #1347: Use platform's
1007 equivalent of LLONG_MAX for the compat regression tests, which makes them
1008 run on AIX and HP-UX. Patch from David Leonard.
1009 - (dtucker) [configure.ac] Run stack-protector tests with -Werror to catch
1010 platforms where gcc understands the option but it's not supported (and
1011 thus generates a warning).
1012
101320080307
1014 - (djm) OpenBSD CVS Sync
1015 - jmc@cvs.openbsd.org 2008/02/11 07:58:28
1016 [ssh.1 sshd.8 sshd_config.5]
1017 bump Mdocdate for pages committed in "febuary", necessary because
1018 of a typo in rcs.c;
1019 - djm@cvs.openbsd.org 2008/02/13 22:38:17
1020 [servconf.h session.c sshd.c]
1021 rekey arc4random and OpenSSL RNG in postauth child
1022 closefrom fds > 2 before shell/command execution
1023 ok markus@
1024 - mbalmer@cvs.openbsd.org 2008/02/14 13:10:31
1025 [sshd.c]
1026 When started in configuration test mode (-t) do not check that sshd is
1027 being started with an absolute path.
1028 ok djm
1029 - markus@cvs.openbsd.org 2008/02/20 15:25:26
1030 [session.c]
1031 correct boolean encoding for coredump; der Mouse via dugsong
1032 - djm@cvs.openbsd.org 2008/02/22 05:58:56
1033 [session.c]
1034 closefrom() call was too early, delay it until just before we execute
1035 the user's rc files (if any).
1036 - dtucker@cvs.openbsd.org 2008/02/22 20:44:02
1037 [clientloop.c packet.c packet.h serverloop.c]
1038 Allow all SSH2 packet types, including UNIMPLEMENTED to reset the
1039 keepalive timer (bz #1307). ok markus@
1040 - djm@cvs.openbsd.org 2008/02/27 20:21:15
1041 [sftp-server.c]
1042 add an extension method "posix-rename@openssh.com" to perform POSIX atomic
1043 rename() operations. based on patch from miklos AT szeredi.hu in bz#1400;
1044 ok dtucker@ markus@
1045 - deraadt@cvs.openbsd.org 2008/03/02 18:19:35
1046 [monitor_fdpass.c]
1047 use a union to ensure alignment of the cmsg (pay attention: various other
1048 parts of the tree need this treatment too); ok djm
1049 - deraadt@cvs.openbsd.org 2008/03/04 21:15:42
1050 [version.h]
1051 crank version; from djm
1052 - (tim) [regress/sftp-glob.sh] Shell portability fix.
1053
105420080302
1055 - (dtucker) [configure.ac] FreeBSD's glob() doesn't behave the way we expect
1056 either, so use our own.
1057
105820080229
1059 - (dtucker) [openbsd-compat/bsd-poll.c] We don't check for select(2) in
1060 configure (and there's not much point, as openssh won't work without it)
1061 so HAVE_SELECT is not defined and the poll(2) compat code doesn't get
1062 built in. Remove HAVE_SELECT so we can build on platforms without poll.
1063 - (dtucker) [scp.c] Include sys/poll.h inside HAVE_SYS_POLL_H.
1064 - (djm) [contrib/gnome-ssh-askpass2.h] Keep askpass windown on top. From
1065 Debian patch via bernd AT openbsd.org
1066
106720080228
1068 - (dtucker) [configure.ac] Add -fstack-protector to LDFLAGS too, fixes
1069 linking problems on AIX with gcc 4.1.x.
1070 - (dtucker) [includes.h ssh-add.c ssh-agent.c ssh-keygen.c ssh.c sshd.c
1071 openbsd-compat/openssl-compat.{c,h}] Bug #1437 Move the OpenSSL compat
1072 header to after OpenSSL headers, since some versions of OpenSSL have
1073 SSLeay_add_all_algorithms as a macro already.
1074 - (dtucker) [key.c defines.h openbsd-compat/openssl-compat.h] Move old OpenSSL
1075 compat glue into openssl-compat.h.
1076 - (dtucker) [configure.ac openbsd-compat/port-aix.{c,h}] Bug #1081: Implement
1077 getgrouplist via getgrset on AIX, rather than iterating over getgrent.
1078 This allows, eg, Match and AllowGroups directives to work with NIS and
1079 LDAP groups.
1080 - (dtucker) [sshd.c] Bug #1042: make log messages for tcpwrappers use the
1081 same SyslogFacility as the rest of sshd. Patch from William Knox,
1082 ok djm@.
1083
108420080225
1085 - (dtucker) [openbsd-compat/fake-rfc2553.h] rename ssh_gai_strerror hack
1086 since it now conflicts with the helper function in misc.c. From
1087 vinschen AT redhat.com.
1088 - (dtucker) [configure.ac audit-bsm.c] Bug #1420: Add a local implementation
1089 of aug_get_machine for systems that don't have their own (eg OS X, FreeBSD).
1090 Help and testing from csjp at FreeBSD org, vgiffin at apple com. ok djm@
1091 - (dtucker) [includes.h openbsd-compat/openssl-compat.c] Bug #1437: reshuffle
1092 headers so ./configure --with-ssl-engine actually works. Patch from
1093 Ian Lister.
1094
109520080224
1096 - (tim) [contrib/cygwin/ssh-host-config]
1097 Grammar changes on SYSCONFDIR LOCALSTATEDIR messages.
1098 Check more thoroughly that it's possible to create the /var/empty directory.
1099 Patch by vinschen AT redhat.com
1100
110120080210
1102 - OpenBSD CVS Sync
1103 - chl@cvs.openbsd.org 2008/01/11 07:22:28
1104 [sftp-client.c sftp-client.h]
1105 disable unused functions
1106 initially from tobias@, but disabled them by placing them in
1107 "#ifdef notyet" which was asked by djm@
1108 ok djm@ tobias@
1109 - djm@cvs.openbsd.org 2008/01/19 19:13:28
1110 [ssh.1]
1111 satisfy the pedants: -q does not suppress all diagnostic messages (e.g.
1112 some commandline parsing warnings go unconditionally to stdout).
1113 - djm@cvs.openbsd.org 2008/01/19 20:48:53
1114 [clientloop.c]
1115 fd leak on session multiplexing error path. Report and patch from
1116 gregory_shively AT fanniemae.com
1117 - djm@cvs.openbsd.org 2008/01/19 20:51:26
1118 [ssh.c]
1119 ignore SIGPIPE in multiplex client mode - we can receive this if the
1120 server runs out of fds on us midway. Report and patch from
1121 gregory_shively AT fanniemae.com
1122 - djm@cvs.openbsd.org 2008/01/19 22:04:57
1123 [sftp-client.c]
1124 fix remote handle leak in do_download() local file open error path;
1125 report and fix from sworley AT chkno.net
1126 - djm@cvs.openbsd.org 2008/01/19 22:22:58
1127 [ssh-keygen.c]
1128 when hashing individual hosts (ssh-keygen -Hf hostname), make sure we
1129 hash just the specified hostname and not the entire hostspec from the
1130 keyfile. It may be of the form "hostname,ipaddr", which would lead to
1131 a hash that never matches. report and fix from jp AT devnull.cz
1132 - djm@cvs.openbsd.org 2008/01/19 22:37:19
1133 [ssh-keygen.c]
1134 unbreak line numbering (broken in revision 1.164), fix error message
1135 - djm@cvs.openbsd.org 2008/01/19 23:02:40
1136 [channels.c]
1137 When we added support for specified bind addresses for port forwards, we
1138 added a quirk SSH_OLD_FORWARD_ADDR. There is a bug in our handling of
1139 this for -L port forwards that causes the client to listen on both v4
1140 and v6 addresses when connected to a server with this quirk, despite
1141 having set 0.0.0.0 as a bind_address.
1142 report and patch from Jan.Pechanec AT Sun.COM; ok dtucker@
1143 - djm@cvs.openbsd.org 2008/01/19 23:09:49
1144 [readconf.c readconf.h sshconnect2.c]
1145 promote rekeylimit to a int64 so it can hold the maximum useful limit
1146 of 2^32; report and patch from Jan.Pechanec AT Sun.COM, ok dtucker@
1147 - djm@cvs.openbsd.org 2008/01/20 00:38:30
1148 [sftp.c]
1149 When uploading, correctly handle the case of an unquoted filename with
1150 glob metacharacters that match a file exactly but not as a glob, e.g. a
1151 file called "[abcd]". report and test cases from duncan2nd AT gmx.de
1152 - djm@cvs.openbsd.org 2008/01/21 17:24:30
1153 [sftp-server.c]
1154 Remove the fixed 100 handle limit in sftp-server and allocate as many
1155 as we have available file descriptors. Patch from miklos AT szeredi.hu;
1156 ok dtucker@ markus@
1157 - djm@cvs.openbsd.org 2008/01/21 19:20:17
1158 [sftp-client.c]
1159 when a remote write error occurs during an upload, ensure that ACKs for
1160 all issued requests are properly drained. patch from t8m AT centrum.cz
1161 - dtucker@cvs.openbsd.org 2008/01/23 01:56:54
1162 [clientloop.c packet.c serverloop.c]
1163 Revert the change for bz #1307 as it causes connection aborts if an IGNORE
1164 packet arrives while we're waiting in packet_read_expect (and possibly
1165 elsewhere).
1166 - jmc@cvs.openbsd.org 2008/01/31 20:06:50
1167 [scp.1]
1168 explain how to handle local file names containing colons;
1169 requested by Tamas TEVESZ
1170 ok dtucker
1171 - markus@cvs.openbsd.org 2008/02/04 21:53:00
1172 [session.c sftp-server.c sftp.h]
1173 link sftp-server into sshd; feedback and ok djm@
1174 - mcbride@cvs.openbsd.org 2008/02/09 12:15:43
1175 [ssh.1 sshd.8]
1176 Document the correct permissions for the ~/.ssh/ directory.
1177 ok jmc
1178 - djm@cvs.openbsd.org 2008/02/10 09:55:37
1179 [sshd_config.5]
1180 mantion that "internal-sftp" is useful with ForceCommand too
1181 - djm@cvs.openbsd.org 2008/02/10 10:54:29
1182 [servconf.c session.c]
1183 delay ~ expansion for ChrootDirectory so it expands to the logged-in user's
1184 home, rather than the user who starts sshd (probably root)
1185
118620080119
1187 - (djm) Silence noice from expr in ssh-copy-id; patch from
1188 mikel AT mikelward.com
1189 - (djm) Only listen for IPv6 connections on AF_INET6 sockets; patch from
1190 tsr2600 AT gmail.com
1191
119220080102
1193 - (dtucker) [configure.ac] Fix message for -fstack-protector-all test.
1194
119520080101
1196 - (dtucker) OpenBSD CVS Sync
1197 - dtucker@cvs.openbsd.org 2007/12/31 10:41:31
1198 [readconf.c servconf.c]
1199 Prevent strict-aliasing warnings on newer gcc versions. bz #1355, patch
1200 from Dmitry V. Levin, ok djm@
1201 - dtucker@cvs.openbsd.org 2007/12/31 15:27:04
1202 [sshd.c]
1203 When in inetd mode, have sshd generate a Protocol 1 ephemeral server
1204 key only for connections where the client chooses Protocol 1 as opposed
1205 to when it's enabled in the server's config. Speeds up Protocol 2
1206 connections to inetd-mode servers that also allow Protocol 1. bz #440,
1207 based on a patch from bruno at wolff.to, ok markus@
1208 - dtucker@cvs.openbsd.org 2008/01/01 08:47:04
1209 [misc.c]
1210 spaces -> tabs from my previous commit
1211 - dtucker@cvs.openbsd.org 2008/01/01 09:06:39
1212 [scp.c]
1213 If scp -p encounters a pre-epoch timestamp, use the epoch which is
1214 as close as we can get given that it's used unsigned. Add a little
1215 debugging while there. bz #828, ok djm@
1216 - dtucker@cvs.openbsd.org 2008/01/01 09:27:33
1217 [sshd_config.5 servconf.c]
1218 Allow PermitRootLogin in a Match block. Allows for, eg, permitting root
1219 only from the local network. ok markus@, man page bit ok jmc@
1220 - dtucker@cvs.openbsd.org 2008/01/01 08:51:20
1221 [moduli]
1222 Updated moduli file; ok djm@
1223
122420071231
1225 - (dtucker) [configure.ac openbsd-compat/glob.{c,h}] Bug #1407: force use of
1226 builtin glob implementation on Mac OS X. Based on a patch from
1227 vgiffin at apple.
1228
122920071229
1230 - (dtucker) OpenBSD CVS Sync
1231 - djm@cvs.openbsd.org 2007/12/12 05:04:03
1232 [sftp.c]
1233 unbreak lls command and add a regress test that would have caught the
1234 breakage; spotted by mouring@
1235 - dtucker@cvs.openbsd.org 2007/12/27 14:22:08
1236 [servconf.c canohost.c misc.c channels.c sshconnect.c misc.h ssh-keyscan.c
1237 sshd.c]
1238 Add a small helper function to consistently handle the EAI_SYSTEM error
1239 code of getaddrinfo. Prompted by vgiffin at apple com via bz #1417.
1240 ok markus@ stevesk@
1241 - dtucker@cvs.openbsd.org 2007/12/28 15:32:24
1242 [clientloop.c serverloop.c packet.c]
1243 Make SSH2_MSG_UNIMPLEMENTED and SSH2_MSG_IGNORE messages reset the
1244 ServerAlive and ClientAlive timers. Prevents dropping a connection
1245 when these are enabled but the peer does not support our keepalives.
1246 bz #1307, ok djm@.
1247 - dtucker@cvs.openbsd.org 2007/12/28 22:34:47
1248 [clientloop.c]
1249 Use the correct packet maximum sizes for remote port and agent forwarding.
1250 Prevents the server from killing the connection if too much data is queued
1251 and an excessively large packet gets sent. bz #1360, ok djm@.
1252
125320071202
1254 - (dtucker) [configure.ac] Enable -fstack-protector-all on systems where
1255 gcc supports it. ok djm@
1256 - (dtucker) [scp.c] Update $OpenBSD tag missing from rev 1.175 and remove
1257 leftover debug code.
1258 - (dtucker) OpenBSD CVS Sync
1259 - dtucker@cvs.openbsd.org 2007/10/29 00:52:45
1260 [auth2-gss.c]
1261 Allow build without -DGSSAPI; ok deraadt@
1262 (Id sync only, Portable already has the ifdefs)
1263 - dtucker@cvs.openbsd.org 2007/10/29 01:55:04
1264 [ssh.c]
1265 Plug tiny mem leaks in ControlPath and ProxyCommand option processing;
1266 ok djm@
1267 - dtucker@cvs.openbsd.org 2007/10/29 04:08:08
1268 [monitor_wrap.c monitor.c]
1269 Send config block back to slave for invalid users too so options
1270 set by a Match block (eg Banner) behave the same for non-existent
1271 users. Found by and ok djm@
1272 - dtucker@cvs.openbsd.org 2007/10/29 06:51:59
1273 [ssh_config.5]
1274 ProxyCommand and LocalCommand use the user's shell, not /bin/sh; ok djm@
1275 - dtucker@cvs.openbsd.org 2007/10/29 06:54:50
1276 [ssh.c]
1277 Make LocalCommand work for Protocol 1 too; ok djm@
1278 - jmc@cvs.openbsd.org 2007/10/29 07:48:19
1279 [ssh_config.5]
1280 clean up after previous macro removal;
1281 - djm@cvs.openbsd.org 2007/11/03 00:36:14
1282 [clientloop.c]
1283 fix memory leak in process_cmdline(), patch from Jan.Pechanec AT Sun.COM;
1284 ok dtucker@
1285 - deraadt@cvs.openbsd.org 2007/11/03 01:24:06
1286 [ssh.c]
1287 bz #1377: getpwuid results were being clobbered by another getpw* call
1288 inside tilde_expand_filename(); save the data we need carefully
1289 ok djm
1290 - dtucker@cvs.openbsd.org 2007/11/03 02:00:32
1291 [ssh.c]
1292 Use xstrdup/xfree when saving pwname and pwdir; ok deraadt@
1293 - deraadt@cvs.openbsd.org 2007/11/03 02:03:49
1294 [ssh.c]
1295 avoid errno trashing in signal handler; ok dtucker
1296
129720071030
1298 - (djm) OpenBSD CVS Sync
1299 - djm@cvs.openbsd.org 2007/10/29 23:49:41
1300 [openbsd-compat/sys-tree.h]
1301 remove extra backslash at the end of RB_PROTOTYPE, report from
1302 Jan.Pechanec AT Sun.COM; ok deraadt@
1303
130420071026
1305 - (djm) OpenBSD CVS Sync
1306 - stevesk@cvs.openbsd.org 2007/09/11 23:49:09
1307 [sshpty.c]
1308 remove #if defined block not needed; ok markus@ dtucker@
1309 (NB. RCD ID sync only for portable)
1310 - djm@cvs.openbsd.org 2007/09/21 03:05:23
1311 [ssh_config.5]
1312 document KbdInteractiveAuthentication in ssh_config.5;
1313 patch from dkg AT fifthhorseman.net
1314 - djm@cvs.openbsd.org 2007/09/21 08:15:29
1315 [auth-bsdauth.c auth-passwd.c auth.c auth.h auth1.c auth2-chall.c]
1316 [monitor.c monitor_wrap.c]
1317 unifdef -DBSD_AUTH
1318 unifdef -USKEY
1319 These options have been in use for some years;
1320 ok markus@ "no objection" millert@
1321 (NB. RCD ID sync only for portable)
1322 - canacar@cvs.openbsd.org 2007/09/25 23:48:57
1323 [ssh-agent.c]
1324 When adding a key that already exists, update the properties
1325 (time, confirm, comment) instead of discarding them. ok djm@ markus@
1326 - ray@cvs.openbsd.org 2007/09/27 00:15:57
1327 [dh.c]
1328 Don't return -1 on error in dh_pub_is_valid(), since it evaluates
1329 to true.
1330 Also fix a typo.
1331 Initial diff from Matthew Dempsky, input from djm.
1332 OK djm, markus.
1333 - dtucker@cvs.openbsd.org 2007/09/29 00:25:51
1334 [auth2.c]
1335 Remove unused prototype. ok djm@
1336 - chl@cvs.openbsd.org 2007/10/02 17:49:58
1337 [ssh-keygen.c]
1338 handles zero-sized strings that fgets can return
1339 properly removes trailing newline
1340 removes an unused variable
1341 correctly counts line number
1342 "looks ok" ray@ markus@
1343 - markus@cvs.openbsd.org 2007/10/22 19:10:24
1344 [readconf.c]
1345 make sure that both the local and remote port are correct when
1346 parsing -L; Jan Pechanec (bz #1378)
1347 - djm@cvs.openbsd.org 2007/10/24 03:30:02
1348 [sftp.c]
1349 rework argument splitting and parsing to cope correctly with common
1350 shell escapes and make handling of escaped characters consistent
1351 with sh(1) and between sftp commands (especially between ones that
1352 glob their arguments and ones that don't).
1353 parse command flags using getopt(3) rather than hand-rolled parsers.
1354 ok dtucker@
1355 - djm@cvs.openbsd.org 2007/10/24 03:44:02
1356 [scp.c]
1357 factor out network read/write into an atomicio()-like function, and
1358 use it to handle short reads, apply bandwidth limits and update
1359 counters. make network IO non-blocking, so a small trickle of
1360 reads/writes has a chance of updating the progress meter; bz #799
1361 ok dtucker@
1362 - djm@cvs.openbsd.org 2006/08/29 09:44:00
1363 [regress/sftp-cmds.sh]
1364 clean up our mess
1365 - markus@cvs.openbsd.org 2006/11/06 09:27:43
1366 [regress/cfgmatch.sh]
1367 fix quoting for non-(c)sh login shells.
1368 - dtucker@cvs.openbsd.org 2006/12/13 08:36:36
1369 [regress/cfgmatch.sh]
1370 Additional test for multiple PermitOpen entries. ok djm@
1371 - pvalchev@cvs.openbsd.org 2007/06/07 19:41:46
1372 [regress/cipher-speed.sh regress/try-ciphers.sh]
1373 test umac-64@openssh.com
1374 ok djm@
1375 - djm@cvs.openbsd.org 2007/10/24 03:32:35
1376 [regress/sftp-cmds.sh regress/sftp-glob.sh regress/test-exec.sh]
1377 comprehensive tests for sftp escaping its interaction with globbing;
1378 ok dtucker@
1379 - djm@cvs.openbsd.org 2007/10/26 05:30:01
1380 [regress/sftp-glob.sh regress/test-exec.sh]
1381 remove "echo -E" crap that I added in last commit and use printf(1) for
1382 cases where we strictly require echo not to reprocess escape characters.
1383 - deraadt@cvs.openbsd.org 2005/11/28 17:50:12
1384 [openbsd-compat/glob.c]
1385 unused arg in internal static API
1386 - jakob@cvs.openbsd.org 2007/10/11 18:36:41
1387 [openbsd-compat/getrrsetbyname.c openbsd-compat/getrrsetbyname.h]
1388 use RRSIG instead of SIG for DNSSEC. ok djm@
1389 - otto@cvs.openbsd.org 2006/10/21 09:55:03
1390 [openbsd-compat/base64.c]
1391 remove calls to abort(3) that can't happen anyway; from
1392 <bret dot lambert at gmail.com>; ok millert@ deraadt@
1393 - frantzen@cvs.openbsd.org 2004/04/24 18:11:46
1394 [openbsd-compat/sys-tree.h]
1395 sync to Niels Provos' version. avoid unused variable warning in
1396 RB_NEXT()
1397 - tdeval@cvs.openbsd.org 2004/11/24 18:10:42
1398 [openbsd-compat/sys-tree.h]
1399 typo
1400 - grange@cvs.openbsd.org 2004/05/04 16:59:32
1401 [openbsd-compat/sys-queue.h]
1402 Remove useless ``elm'' argument from the SIMPLEQ_REMOVE_HEAD macro.
1403 This matches our SLIST behaviour and NetBSD's SIMPLEQ as well.
1404 ok millert krw deraadt
1405 - deraadt@cvs.openbsd.org 2005/02/25 13:29:30
1406 [openbsd-compat/sys-queue.h]
1407 minor white spacing
1408 - otto@cvs.openbsd.org 2005/10/17 20:19:42
1409 [openbsd-compat/sys-queue.h]
1410 Performing certain operations on queue.h data structurs produced
1411 funny results. An example is calling LIST_REMOVE on the same
1412 element twice. This will not fail, but result in a data structure
1413 referencing who knows what. Prevent these accidents by NULLing some
1414 fields on remove and replace. This way, either a panic or segfault
1415 will be produced on the faulty operation.
1416 - otto@cvs.openbsd.org 2005/10/24 20:25:14
1417 [openbsd-compat/sys-queue.h]
1418 Partly backout. NOLIST, used in LISTs is probably interfering.
1419 requested by deraadt@
1420 - otto@cvs.openbsd.org 2005/10/25 06:37:47
1421 [openbsd-compat/sys-queue.h]
1422 Some uvm problem is being exposed with the more strict macros.
1423 Revert until we've found out what's causing the panics.
1424 - otto@cvs.openbsd.org 2005/11/25 08:06:25
1425 [openbsd-compat/sys-queue.h]
1426 Introduce debugging aid for queue macros. Disabled by default; but
1427 developers are encouraged to run with this enabled.
1428 ok krw@ fgsch@ deraadt@
1429 - otto@cvs.openbsd.org 2007/04/30 18:42:34
1430 [openbsd-compat/sys-queue.h]
1431 Enable QUEUE_MACRO_DEBUG on DIAGNOSTIC kernels.
1432 Input and okays from krw@, millert@, otto@, deraadt@, miod@.
1433 - millert@cvs.openbsd.org 2004/10/07 16:56:11
1434 GLOB_NOESCAPE is POSIX so move it out of the #ifndef _POSIX_SOURCE
1435 block.
1436 (NB. mostly an RCS ID sync, as portable strips out the conditionals)
1437 - (djm) [regress/sftp-cmds.sh]
1438 Use more restrictive glob to pick up test files from /bin - some platforms
1439 ship broken symlinks there which could spoil the test.
1440 - (djm) [openbsd-compat/bindresvport.c]
1441 Sync RCS ID after irrelevant (for portable OpenSSH) header shuffling
1442
144320070927
1444 - (dtucker) [configure.ac atomicio.c] Fall back to including <sys/poll.h> if
1445 we don't have <poll.h> (eq QNX). From bacon at cs nyu edu.
1446 - (dtucker) [configure.ac defines.h] Shadow expiry does not work on QNX6
1447 so disable it for that platform. From bacon at cs nyu edu.
1448
144920070921
1450 - (djm) [atomicio.c] Fix spin avoidance for platforms that define
1451 EWOULDBLOCK; patch from ben AT psc.edu
1452
145320070917
1454 - (djm) OpenBSD CVS Sync
1455 - djm@cvs.openbsd.org 2007/08/23 02:49:43
1456 [auth-passwd.c auth.c session.c]
1457 unifdef HAVE_LOGIN_CAP; ok deraadt@ millert@
1458 NB. RCS ID sync only for portable
1459 - djm@cvs.openbsd.org 2007/08/23 02:55:51
1460 [auth-passwd.c auth.c session.c]
1461 missed include bits from last commit
1462 NB. RCS ID sync only for portable
1463 - djm@cvs.openbsd.org 2007/08/23 03:06:10
1464 [auth.h]
1465 login_cap.h doesn't belong here
1466 NB. RCS ID sync only for portable
1467 - djm@cvs.openbsd.org 2007/08/23 03:22:16
1468 [auth2-none.c sshd_config sshd_config.5]
1469 Support "Banner=none" to disable displaying of the pre-login banner;
1470 ok dtucker@ deraadt@
1471 - djm@cvs.openbsd.org 2007/08/23 03:23:26
1472 [sshconnect.c]
1473 Execute ProxyCommands with $SHELL rather than /bin/sh unconditionally
1474 - djm@cvs.openbsd.org 2007/09/04 03:21:03
1475 [clientloop.c monitor.c monitor_fdpass.c monitor_fdpass.h]
1476 [monitor_wrap.c ssh.c]
1477 make file descriptor passing code return an error rather than call fatal()
1478 when it encounters problems, and use this to make session multiplexing
1479 masters survive slaves failing to pass all stdio FDs; ok markus@
1480 - djm@cvs.openbsd.org 2007/09/04 11:15:56
1481 [ssh.c sshconnect.c sshconnect.h]
1482 make ssh(1)'s ConnectTimeout option apply to both the TCP connection and
1483 SSH banner exchange (previously it just covered the TCP connection).
1484 This allows callers of ssh(1) to better detect and deal with stuck servers
1485 that accept a TCP connection but don't progress the protocol, and also
1486 makes ConnectTimeout useful for connections via a ProxyCommand;
1487 feedback and "looks ok" markus@
1488 - sobrado@cvs.openbsd.org 2007/09/09 11:38:01
1489 [ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.c]
1490 sort synopsis and options in ssh-agent(1); usage is lowercase
1491 ok jmc@
1492 - stevesk@cvs.openbsd.org 2007/09/11 04:36:29
1493 [sshpty.c]
1494 sort #include
1495 NB. RCS ID sync only
1496 - gilles@cvs.openbsd.org 2007/09/11 15:47:17
1497 [session.c ssh-keygen.c sshlogin.c]
1498 use strcspn to properly overwrite '\n' in fgets returned buffer
1499 ok pyr@, ray@, millert@, moritz@, chl@
1500 - stevesk@cvs.openbsd.org 2007/09/11 23:49:09
1501 [sshpty.c]
1502 remove #if defined block not needed; ok markus@ dtucker@
1503 NB. RCS ID sync only
1504 - stevesk@cvs.openbsd.org 2007/09/12 19:39:19
1505 [umac.c]
1506 use xmalloc() and xfree(); ok markus@ pvalchev@
1507 - djm@cvs.openbsd.org 2007/09/13 04:39:04
1508 [sftp-server.c]
1509 fix incorrect test when setting syslog facility; from Jan Pechanec
1510 - djm@cvs.openbsd.org 2007/09/16 00:55:52
1511 [sftp-client.c]
1512 use off_t instead of u_int64_t for file offsets, matching what the
1513 progressmeter code expects; bz #842
1514 - (tim) [defines.h] Fix regression in long password support on OpenServer 6.
1515 Problem report and additional testing rac AT tenzing.org.
1516
151720070914
1518 - (dtucker) [openbsd-compat/bsd-asprintf.c] Plug mem leak in error path.
1519 Patch from Jan.Pechanec at sun com.
1520
152120070910
1522 - (dtucker) [openbsd-compat/regress/closefromtest.c] Bug #1358: Always
1523 return 0 on successful test. From David.Leonard at quest com.
1524 - (tim) [configure.ac] Autoconf didn't define HAVE_LIBIAF because we
1525 did a AC_CHECK_FUNCS within the AC_CHECK_LIB test.
1526
120070817 152720070817
2 - (dtucker) [sshd.8] Many Linux variants use a single "!" to denote locked 1528 - (dtucker) [sshd.8] Many Linux variants use a single "!" to denote locked
3 accounts and that's what the code looks for, so make man page and code 1529 accounts and that's what the code looks for, so make man page and code
@@ -3184,4 +4710,4 @@
3184 OpenServer 6 and add osr5bigcrypt support so when someone migrates 4710 OpenServer 6 and add osr5bigcrypt support so when someone migrates
3185 passwords between UnixWare and OpenServer they will still work. OK dtucker@ 4711 passwords between UnixWare and OpenServer they will still work. OK dtucker@
3186 4712
3187$Id: ChangeLog,v 1.4738.2.1 2007/09/04 06:49:09 djm Exp $ 4713$Id: ChangeLog,v 1.5095 2008/07/21 08:22:25 djm Exp $