Age | Commit message (Collapse) | Author |
|
[ssh.c]
sscanf() length dependencies are clearer now; can also shrink proto
and data if desired, but i have not done that. ok markus@
|
|
[auth-rsa.c]
fix protocol error: send 'failed' message instead of a 2nd challenge
(happens if the same key is in authorized_keys twice).
reported Ralf_Meister@genua.de; ok djm@
|
|
[channels.h]
remove dead function prototype; ok markus@
|
|
[clientloop.c serverloop.c sshd.c]
volatile sig_atomic_t
|
|
[ssh-keyscan.c]
don't use "\n" in fatal()
|
|
[ssh-keygen.1]
more on passphrase construction; ok markus@
|
|
[key.c]
mem leak
|
|
[deattack.c radix.c]
kill more registers
millert@ ok
|
|
[ssh-agent.1]
clarify/state that private keys are not exposed to clients using the
agent; ok markus@
|
|
[sshd.c]
fd leak on HUP; ok stevesk@
|
|
[auth2.c auth.c readconf.c servconf.c ssh-agent.c ssh-keygen.c]
enum/int type cleanup where it made sense to do so; ok markus@
|
|
[ssh-keyscan.c]
handle empty lines instead of dumping core; report from sha@sha-1.net
|
|
[sshd.c]
errno saving wrapping in a signal handler
|
|
openbsd-compat/bsd-cygwin_util.h, openbsd-compat/daemon.c]
Allow SSHD to install as service under WIndows 9x/Me
[configure.ac] Fix to allow linking against PCRE on Cygwin
Patches by Corinna Vinschen <vinschen@redhat.com>
|
|
|
|
<djast@cs.toronto.edu> Fix from markus@
|
|
|
|
[version.h]
enter 3.0.1
|
|
[servconf.c]
enable authorized_keys2 again. tested by fries@
|
|
- dugsong@cvs.openbsd.org 2001/11/11 18:47:10
[auth-krb5.c]
fix krb5 authorization check. found by <jhawk@MIT.EDU>. from
art@, deraadt@ ok
|
|
do_authenticated. Call loginfailed for protocol 2 failures > MAX like
we do for protocol 1. Reports from Ralf Wenk <wera0003@fh-karlsruhe.de>,
K.Wolkersdorfer@fz-juelich.de and others
|
|
Patch from Simon Wilkinson <simon@sxw.org.uk>
|
|
This should help reduce diff collisions for new server options (as they
will appear at the end)
|
|
[servconf.c]
make AuthorizedKeysFile2 fallback to AuthorizedKeysFile if AuthorizedKeysFile is specified.
|
|
[packet.c]
remove extra debug()
|
|
[ssh-rsa.c]
KNF (unexpand)
|
|
[sshd.c]
cleanup libwrap support (remove bogus comment, bogus close(), add debug, etc).
|
|
[sshd.c]
remove extra trailing dot from log message; pilot@naughty.monkey.org
|
|
[clientloop.c serverloop.c]
don't memset too much memory, ok millert@
original patch from jlk@kamens.brookline.ma.us via nalin@redhat.com
|
|
[auth.c]
don't print ROOT in CAPS for the authentication messages, i.e.
Accepted publickey for ROOT from 127.0.0.1 port 42734 ssh2
becomes
Accepted publickey for root from 127.0.0.1 port 42734 ssh2
|
|
[ssh.1]
mention setuid root requirements; noted by cnorris@csc.UVic.ca; ok stevesk@
|
|
[readpass.c]
don't strdup too much data; from gotoh@taiyo.co.jp; ok millert.
|
|
[channels.h]
crank c->path to 256 so they can hold a full hostname; dwd@bell-labs.com
|
|
[auth2.c auth-rh-rsa.c]
unused includes
|
|
[sshd.8]
s/Keepalive/KeepAlive/; from openbsd@davidkrause.com
|
|
[ssh-dss.c ssh-rsa.c]
missing free and sync dss/rsa code.
|
|
[ssh-rsa.c]
ssh_rsa_sign/verify: SSH_BUG_SIGBLOB not supported
|
|
[packet.c packet.h sshconnect2.c]
pad using the padding field from the ssh2 packet instead of sending
extra ignore messages. tested against several other ssh servers.
|
|
[ssh.1]
ssh.1
|
|
[sshconnect2.c]
hostbased: check for client hostkey before building chost
|
|
[ssh-keygen.1 ssh-keygen.c]
better docu for fingerprinting, ok deraadt@
|
|
[clientloop.c]
make ~& (backgrounding) work again for proto v1; add support ~& for v2, too
|
|
[clientloop.c ssh.c]
ignore SIGPIPE early, makes ssh work if agent dies, netbsd-pr via itojun@
|
|
[ssh.c]
remove unused
|
|
[sshd.c]
mention remote port in debug message
|
|
|
|
|
|
if permit_empty_passwd == 0 so null password check cannot be bypassed.
jayaraj@amritapuri.com OpenBSD bug 2168
|
|
Updates from Raymund Will <ray@caldera.de>
[acconfig.h configure.in] Clean up login checks.
Problem reported by Jim Knoble <jmknoble@pobox.com>
|
|
|