summaryrefslogtreecommitdiff
path: root/ChangeLog
AgeCommit message (Collapse)Author
2001-12-21 - markus@cvs.openbsd.org 2001/12/09 18:45:56Damien Miller
[auth2.c auth2-chall.c auth.h] add auth2_challenge_stop(), simplifies cleanup of kbd-int sessions, fixes memleak.
2001-12-21 - stevesk@cvs.openbsd.org 2001/12/08 17:49:28Damien Miller
[channels.c pathnames.h] use only one path to X11 UNIX domain socket vs. an array of paths to try. report from djast@cs.toronto.edu. ok markus@
2001-12-21 - (djm) Add option to gnome-ssh-askpass to stop it from grabbing the XDamien Miller
server. I have found this necessary to avoid server hangs with X input extensions (e.g. kinput2). Enable by setting the environment variable "GNOME_SSH_ASKPASS_NOGRAB"
2001-12-19 - (stevesk) OpenBSD CVS sync X11 localhost displayKevin Steves
- stevesk@cvs.openbsd.org 2001/11/29 14:10:51 [channels.h channels.c session.c] sshd X11 fake server will now listen on localhost by default: $ echo $DISPLAY localhost:12.0 $ netstat -an|grep 6012 tcp 0 0 127.0.0.1.6012 *.* LISTEN tcp6 0 0 ::1.6012 *.* LISTEN sshd_config gatewayports=yes can be used to revert back to the old behavior. will control this with another option later. ok markus@ - stevesk@cvs.openbsd.org 2001/12/19 08:43:11 [includes.h session.c] handle utsname.nodename case for FamilyLocal X authorization; ok markus@
2001-12-07 - stevesk@cvs.openbsd.org 2001/12/06 18:20:32Ben Lindstrom
[channels.c] disable nagle for X11 fake server and client TCPs. from netbsd. ok markus@
2001-12-07 - stevesk@cvs.openbsd.org 2001/12/06 18:09:23Ben Lindstrom
[channels.c session.c] strncpy->strlcpy. remaining strncpy's are necessary. ok markus@
2001-12-07 - stevesk@cvs.openbsd.org 2001/12/06 18:02:32Ben Lindstrom
[channels.c sshconnect.c] shutdown(sock, SHUT_RDWR) not needed here; ok markus@
2001-12-07 - (bal) PCRE no longer required. Banished from the source along withBen Lindstrom
fake-regex.h
2001-12-06 - markus@cvs.openbsd.org 2001/12/06 13:30:06Ben Lindstrom
[servconf.c servconf.h sshd.8 sshd.c] add -o to sshd, too. ok deraadt@ - (bal) Minor white space fix up in servconf.c
2001-12-06 - markus@cvs.openbsd.org 2001/12/05 16:54:51Ben Lindstrom
[compat.c match.c match.h] make theo and djm happy: bye bye regexp
2001-12-06 - markus@cvs.openbsd.org 2001/12/05 15:04:48Ben Lindstrom
[version.h] post 3.0.2
2001-12-06 - deraadt@cvs.openbsd.org 2001/12/05 10:06:12Ben Lindstrom
[authfd.c authfile.c bufaux.c channels.c compat.c kex.c kexgex.c key.c misc.c packet.c servconf.c ssh-agent.c sshconnect2.c sshconnect.c sshd.c ssh-dss.c ssh-keygen.c ssh-rsa.c] minor KNF
2001-12-06 - itojun@cvs.openbsd.org 2001/12/05 03:56:39Ben Lindstrom
[auth1.c auth2.c canohost.c channels.c deattack.c packet.c scp.c sshconnect2.c] make it compile with more strict prototype checking
2001-12-06 - itojun@cvs.openbsd.org 2001/12/05 03:50:01Ben Lindstrom
[clientloop.c serverloop.c sshd.c] deal with LP64 printf issue with sig_atomic_t. from thorpej
2001-12-06 - deraadt@cvs.openbsd.org 2001/12/02 02:08:32Ben Lindstrom
[sftp-common.c] zap };
2001-12-06 - markus@cvs.openbsd.org 2001/12/01 21:41:48Ben Lindstrom
[session.c sshd.8] don't pass user defined variables to /usr/bin/login
2001-12-06 - stevesk@cvs.openbsd.org 2001/11/30 20:39:28Ben Lindstrom
[ssh.c] sscanf() length dependencies are clearer now; can also shrink proto and data if desired, but i have not done that. ok markus@
2001-12-06 - markus@cvs.openbsd.org 2001/11/29 22:08:48Ben Lindstrom
[auth-rsa.c] fix protocol error: send 'failed' message instead of a 2nd challenge (happens if the same key is in authorized_keys twice). reported Ralf_Meister@genua.de; ok djm@
2001-12-06 - stevesk@cvs.openbsd.org 2001/11/29 19:06:39Ben Lindstrom
[channels.h] remove dead function prototype; ok markus@
2001-12-06 - markus@cvs.openbsd.org 2001/11/22 12:34:22Ben Lindstrom
[clientloop.c serverloop.c sshd.c] volatile sig_atomic_t
2001-12-06 - stevesk@cvs.openbsd.org 2001/11/22 05:27:29Ben Lindstrom
[ssh-keyscan.c] don't use "\n" in fatal()
2001-12-06 - stevesk@cvs.openbsd.org 2001/11/21 18:49:14Ben Lindstrom
[ssh-keygen.1] more on passphrase construction; ok markus@
2001-12-06 - markus@cvs.openbsd.org 2001/11/21 15:51:24Ben Lindstrom
[key.c] mem leak
2001-12-06 - mpech@cvs.openbsd.org 2001/11/19 19:02:16Ben Lindstrom
[deattack.c radix.c] kill more registers millert@ ok
2001-12-06 - stevesk@cvs.openbsd.org 2001/11/19 18:40:46Ben Lindstrom
[ssh-agent.1] clarify/state that private keys are not exposed to clients using the agent; ok markus@
2001-12-06 - markus@cvs.openbsd.org 2001/11/19 11:20:21Ben Lindstrom
[sshd.c] fd leak on HUP; ok stevesk@
2001-12-06 - stevesk@cvs.openbsd.org 2001/11/17 19:14:34Ben Lindstrom
[auth2.c auth.c readconf.c servconf.c ssh-agent.c ssh-keygen.c] enum/int type cleanup where it made sense to do so; ok markus@
2001-12-06 - markus@cvs.openbsd.org 2001/11/16 12:46:13Ben Lindstrom
[ssh-keyscan.c] handle empty lines instead of dumping core; report from sha@sha-1.net
2001-12-06 - deraadt@cvs.openbsd.org 2001/11/14 20:45:08Ben Lindstrom
[sshd.c] errno saving wrapping in a signal handler
2001-11-26[contrib/cygwin/README, openbsd-compat/bsd-cygwin_util.c,Tim Rice
openbsd-compat/bsd-cygwin_util.h, openbsd-compat/daemon.c] Allow SSHD to install as service under WIndows 9x/Me [configure.ac] Fix to allow linking against PCRE on Cygwin Patches by Corinna Vinschen <vinschen@redhat.com>
2001-11-15ReleaseDamien Miller
2001-11-15 - (djm) Fix IPv4 default in ssh-keyscan. Spotted by Dan AstoorianDamien Miller
<djast@cs.toronto.edu> Fix from markus@
2001-11-14 - (djm) Bump RPM package versionsDamien Miller
2001-11-14 - markus@cvs.openbsd.org 2001/11/13 02:03:57Damien Miller
[version.h] enter 3.0.1
2001-11-14 - markus@cvs.openbsd.org 2001/11/12 11:17:07Damien Miller
[servconf.c] enable authorized_keys2 again. tested by fries@
2001-11-14 - (djm) OpenBSD CVS SyncDamien Miller
- dugsong@cvs.openbsd.org 2001/11/11 18:47:10 [auth-krb5.c] fix krb5 authorization check. found by <jhawk@MIT.EDU>. from art@, deraadt@ ok
2001-11-13 - (djm) AIX login{success,failed} changes. Move loginsuccess call toDamien Miller
do_authenticated. Call loginfailed for protocol 2 failures > MAX like we do for protocol 1. Reports from Ralf Wenk <wera0003@fh-karlsruhe.de>, K.Wolkersdorfer@fz-juelich.de and others
2001-11-13 - (djm) Fix early (and double) free of remote user when using Kerberos.Damien Miller
Patch from Simon Wilkinson <simon@sxw.org.uk>
2001-11-12 - (djm) Reorder portable-specific server options so that they come first.Damien Miller
This should help reduce diff collisions for new server options (as they will appear at the end)
2001-11-12 - markus@cvs.openbsd.org 2001/11/11 13:02:31Damien Miller
[servconf.c] make AuthorizedKeysFile2 fallback to AuthorizedKeysFile if AuthorizedKeysFile is specified.
2001-11-12 - markus@cvs.openbsd.org 2001/11/10 13:37:20Damien Miller
[packet.c] remove extra debug()
2001-11-12 - markus@cvs.openbsd.org 2001/11/10 13:22:42Damien Miller
[ssh-rsa.c] KNF (unexpand)
2001-11-12 - markus@cvs.openbsd.org 2001/11/10 13:19:45Damien Miller
[sshd.c] cleanup libwrap support (remove bogus comment, bogus close(), add debug, etc).
2001-11-12 - markus@cvs.openbsd.org 2001/11/09 19:08:35Damien Miller
[sshd.c] remove extra trailing dot from log message; pilot@naughty.monkey.org
2001-11-12 - markus@cvs.openbsd.org 2001/11/09 18:59:23Damien Miller
[clientloop.c serverloop.c] don't memset too much memory, ok millert@ original patch from jlk@kamens.brookline.ma.us via nalin@redhat.com
2001-11-12 - markus@cvs.openbsd.org 2001/11/08 20:02:24Damien Miller
[auth.c] don't print ROOT in CAPS for the authentication messages, i.e. Accepted publickey for ROOT from 127.0.0.1 port 42734 ssh2 becomes Accepted publickey for root from 127.0.0.1 port 42734 ssh2
2001-11-12 - markus@cvs.openbsd.org 2001/11/08 17:49:53Damien Miller
[ssh.1] mention setuid root requirements; noted by cnorris@csc.UVic.ca; ok stevesk@
2001-11-12 - markus@cvs.openbsd.org 2001/11/08 10:51:08Damien Miller
[readpass.c] don't strdup too much data; from gotoh@taiyo.co.jp; ok millert.
2001-11-12 - markus@cvs.openbsd.org 2001/11/07 22:53:21Damien Miller
[channels.h] crank c->path to 256 so they can hold a full hostname; dwd@bell-labs.com
2001-11-12 - markus@cvs.openbsd.org 2001/11/07 22:41:51Damien Miller
[auth2.c auth-rh-rsa.c] unused includes