summaryrefslogtreecommitdiff
path: root/ChangeLog
AgeCommit message (Collapse)Author
2002-01-22 - stevesk@cvs.openbsd.org 2002/01/04 18:14:16Damien Miller
[servconf.c sshd.8] protocol 2 HostKey code default is now /etc/ssh_host_rsa_key and /etc/ssh_host_dsa_key like we have in sshd_config. ok markus@
2002-01-22 - stevesk@cvs.openbsd.org 2002/01/04 17:59:17Damien Miller
[readconf.c servconf.c] remove #ifdef _PATH_XAUTH/#endif; ok markus@
2002-01-22 - stevesk@cvs.openbsd.org 2002/01/03 04:11:08Damien Miller
[ssh_config] grammar in comment
2002-01-22 - stevesk@cvs.openbsd.org 2001/12/29 21:56:01Damien Miller
[authfile.c channels.c compress.c packet.c sftp-server.c ssh-agent.c ssh-keygen.c] remove unneeded casts and some char->u_char cleanup; ok markus@
2002-01-22 - stevesk@cvs.openbsd.org 2001/12/28 22:37:48Damien Miller
[ssh.1 sshd.8] document LogLevel DEBUG[123]; ok markus@
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 15:06:00Damien Miller
[auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c dispatch.h kex.c kex.h serverloop.c ssh.c sshconnect2.c] remove plen from the dispatch fn. it's no longer used.
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 14:50:54Damien Miller
[auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c] packet_read* no longer return the packet length, since it's not used.
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 14:13:13Damien Miller
[bufaux.c bufaux.h packet.c] buffer_get_bignum: int -> void
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 13:57:33Damien Miller
[auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c] packet_get_bignum* no longer returns a size
2002-01-22oops, that last commit was really:Damien Miller
- markus@cvs.openbsd.org 2001/12/28 12:14:27 [auth1.c auth2.c auth2-chall.c auth-rsa.c channels.c clientloop.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c] s/packet_done/packet_check_eom/ (end-of-message); ok djm@ with 47 more patchsets to go, I am not going to back out all the files for the sake of a commit message...
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 19:54:53Damien Miller
[auth1.c auth.h auth-rh-rsa.c] auth_rhosts_rsa now accept generic keys.
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 19:37:23Damien Miller
[dh.c kexdh.c kexgex.c] always use BN_clear_free instead of BN_free
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 18:26:13Damien Miller
[authfile.c] missing include
2002-01-22 - stevesk@cvs.openbsd.org 2001/12/27 18:22:53Damien Miller
[sshd.8] clarify -p; ok markus@
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 18:22:16Damien Miller
[auth1.c authfile.c auth-rsa.c dh.c kexdh.c kexgex.c key.c rsa.c scard.c ssh-agent.c sshconnect1.c sshd.c ssh-dss.c] call fatal() for openssl allocation failures
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 18:10:29Damien Miller
[ssh-keygen.c] -t is only needed for key generation (unbreaks -i, -e, etc).
2002-01-22 - markus@cvs.openbsd.org 2001/12/25 18:53:00Damien Miller
[auth1.c] be more carefull on allocation
2002-01-22 - markus@cvs.openbsd.org 2001/12/25 18:49:56Damien Miller
[key.c] be more careful on allocation
2002-01-22 - deraadt@cvs.openbsd.org 2001/12/24 07:29:43Damien Miller
[ssh-add.c] try all listed keys.. how did this get broken? (oops - that was me)
2002-01-22 - markus@cvs.openbsd.org 2001/12/21 12:17:33Damien Miller
[serverloop.c] remove ifdef for USE_PIPES since fdin != fdout; ok djm@
2002-01-22 - djm@cvs.openbsd.org 2001/12/21 10:06:43Damien Miller
[ssh-add.1 ssh-add.c] Try all standard key files (id_rsa, id_dsa, identity) when invoked with no arguments; ok markus@
2002-01-22 - djm@cvs.openbsd.org 2001/12/21 08:53:45Damien Miller
[readpass.c] Avoid interruptable passphrase read; ok markus@
2002-01-22 - djm@cvs.openbsd.org 2001/12/21 08:52:22Damien Miller
[ssh-keygen.1 ssh-keygen.c] Remove default (rsa1) key type; ok markus@
2002-01-22 - (djm) autoconf hacking:Damien Miller
- Add OpenSSL sanity check: verify that header version matches version reported by library
2002-01-22 - (djm) Fix some bugs I introduced into ssh-rand-helper yesterdayDamien Miller
2002-01-22 - (djm) autoconf hacking:Damien Miller
- We don't support --without-zlib currently, so don't allow it. - Rework cryptographic random number support detection. We now detect whether OpenSSL seeds itself. If it does, then we don't bother with the ssh-rand-helper program. You can force the use of ssh-rand-helper using the --with-rand-helper configure argument - Simplify and clean up ssh-rand-helper configuration
2002-01-21 - (djm) Rework ssh-rand-helper:Damien Miller
- Reduce quantity of ifdef code, in preparation for ssh_rand_conf - Always seed from system calls, even when doing PRNGd seeding - Tidy and comment #define knobs - Remove unused facility for multiple runs through command list - KNF, cleanup, update copyright
2002-01-14 - (djm) Bug #50 - make autoconf entropy path checks more robustDamien Miller
2002-01-08 - (stevesk) defines.h: use "/var/spool/sockets/X11/%u" for HP-UX. doesKevin Steves
not depend on transition links. from Lutz Jaenicke.
2002-01-08 - (djm) Merge Cygwin copy_environment with do_pam_environment, removingDamien Miller
fixed env var size limit in the process. Report from Corinna Vinschen <vinschen@redhat.com>
2002-01-06 - (stevesk) defines.h: determine _PATH_UNIX_X; currently "/tmp/.X11-unix/X%u"Kevin Steves
for all platforms except HP-UX, which is "/usr/spool/sockets/X11/%u".
2002-01-05 - (stevesk) fix spurious ; from NCR change.Kevin Steves
2002-01-05 - (bal) NCR requies use_pipes to operate correctly.Ben Lindstrom
2002-01-03 - (djm) Use bigcrypt() on systems with SCO_PROTECTED_PW. Patch fromDamien Miller
Roger Cornelius <rac@tenzing.org>
2001-12-31test openssh-commits listDamien Miller
2001-12-31testing againDamien Miller
2001-12-29 - (djm) Typo in contrib/cygwin/README Fix from Corinna VinschenDamien Miller
<vinschen@redhat.com>
2001-12-29 - (djm) Apply Cygwin pointer deref fix from Corinna VinschenDamien Miller
<vinschen@redhat.com> Could be abused to guess valid usernames
2001-12-28 - (djm) Remove recommendation to use GNU make, we should support mostDamien Miller
make programs.
2001-12-25 - (stevesk) [Makefile.in ssh-rand-helper.c]Kevin Steves
portable lib and __progname support for ssh-rand-helper; ok djm@
2001-12-24 - (bal) Removed contrib/chroot.diff and noted in contrib/README that itBen Lindstrom
was not being maintained.
2001-12-24 - (djm) Ignore fix & patchlevel in OpenSSL version check. Patch fromDamien Miller
solar@openwall.com - (djm) Rework entropy code. If the OpenSSL PRNG is has not been internally seeded, execute a subprogram "ssh-rand-helper" to obtain some entropy for us. Rewrite the old in-process entropy collecter as an example ssh-rand-helper. - (djm) Always perform ssh_prng_cmds path lookups in configure, even if we don't end up using ssh_prng_cmds (so we always get a valid file)
2001-12-21 - djm@cvs.openbsd.org 2001/12/20 22:50:24Damien Miller
[auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c] [dispatch.h kex.c kex.h packet.c packet.h serverloop.c ssh.c] [sshconnect2.c] Conformance fix: we should send failing packet sequence number when responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by yakk@yakk.dot.net; ok markus@
2001-12-21 - markus@cvs.openbsd.org 2001/12/20 16:37:29Damien Miller
[channels.c channels.h session.c] setup x11 listen socket for just one connect if the client requests so. (v2 only, but the openssh client does not support this feature).
2001-12-21 - stevesk@cvs.openbsd.org 2001/12/19 17:16:13Damien Miller
[authfile.c bufaux.c bufaux.h buffer.c buffer.h packet.c packet.h ssh.c] change the buffer/packet interface to use void* vs. char*; ok markus@
2001-12-21 - markus@cvs.openbsd.org 2001/12/19 16:09:39Damien Miller
[serverloop.c] fix race between SIGCHLD and select with an additional pipe. writing to the pipe on SIGCHLD wakes up select(). using pselect() is not portable and siglongjmp() ugly. W. R. Stevens suggests similar solution. initial idea by pmenage@ensim.com; ok deraadt@, djm@
2001-12-21 - deraadt@cvs.openbsd.org 2001/12/19 07:18:56Damien Miller
[auth1.c auth2.c auth2-chall.c auth-bsdauth.c auth.c authfile.c auth.h] [auth-krb4.c auth-rhosts.c auth-skey.c bufaux.c canohost.c channels.c] [cipher.c clientloop.c compat.c compress.c deattack.c key.c log.c mac.c] [match.c misc.c nchan.c packet.c readconf.c rijndael.c rijndael.h scard.c] [servconf.c servconf.h serverloop.c session.c sftp.c sftp-client.c] [sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c] [sshconnect1.c sshconnect2.c sshconnect.c sshd.8 sshd.c sshd_config] [ssh-keygen.c sshlogin.c sshpty.c sshtty.c ttymodes.c uidswap.c] basic KNF done while i was looking for something else
2001-12-21 - jakob@cvs.openbsd.org 2001/12/18 10:06:24Damien Miller
[auth-rsa.c] log fingerprint on successful public key authentication, simplify usage of key structs; ok markus@