summaryrefslogtreecommitdiff
path: root/ChangeLog
AgeCommit message (Collapse)Author
2008-07-09 - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAMDamien Miller
account check failure path. The vulnerable format buffer is supplied from PAM and should not contain attacker-supplied data.
2008-07-09 - (djm) [Makefile.in] Print "all tests passed" when all regress tests passDamien Miller
2008-07-05 - djm@cvs.openbsd.org 2008/07/05 05:16:01Damien Miller
[PROTOCOL] grammar
2008-07-05 - (djm) [configure.ac] unbreak: remove extra closing braceDamien Miller
2008-07-05 - (djm) [Makefile.in] Pass though pass to conch for interop testsDamien Miller
2008-07-05 - djm@cvs.openbsd.org 2008/07/04 23:30:16Damien Miller
[auth1.c auth2.c] Make protocol 1 MaxAuthTries logic match protocol 2's. Do not treat the first protocol 2 authentication attempt as a failure IFF it is for method "none". Makes MaxAuthTries' user-visible behaviour identical for protocol 1 vs 2. ok dtucker@
2008-07-05 - OpenBSD CVS SyncDamien Miller
- djm@cvs.openbsd.org 2008/07/04 23:08:25 [packet.c] handle EINTR in packet_write_poll()l ok dtucker@
2008-07-05 - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov forDamien Miller
Tru64. readv doesn't seem to be a comparable object there. bz#1386, patch from dtucker@ ok me
2008-07-05 - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowedDamien Miller
passwords disabled. bz#1083 report & patch from senthilkumar_sen AT hotpop.com, w/ dtucker@
2008-07-04 - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h]Damien Miller
[packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c] [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on some platforms (HP nonstop) it is a distinct errno; bz#1467 reported by sconeu AT yahoo.com; ok dtucker@
2008-07-04 - djm@cvs.openbsd.org 2008/06/30 10:43:03Darren Tucker
[regress/conch-ciphers.sh] explicitly disable conch options that could interfere with the test
2008-07-04 - djm@cvs.openbsd.org 2008/06/30 10:31:11Darren Tucker
[putty-transfer.sh putty-kex.sh putty-ciphers.sh] remove "set -e" left over from debugging
2008-07-04 - djm@cvs.openbsd.org 2008/06/30 08:07:34Darren Tucker
[key-options.sh] shell portability: use "=" instead of "==" in test(1) expressions, double-quote string with backslash escaped /
2008-07-04 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if linkDarren Tucker
returns EXDEV. Patch from Mike Garrison, ok djm@
2008-07-04 - dtucker@cvs.openbsd.org 2008/07/04 03:47:02Darren Tucker
[monitor.c] Make debug a little clearer. ok djm@
2008-07-04 - djm@cvs.openbsd.org 2008/07/04 03:44:59Darren Tucker
[servconf.c groupaccess.h groupaccess.c] support negation of groups in "Match group" block (bz#1315); ok dtucker@
2008-07-04 - otto@cvs.openbsd.org 2008/07/03 21:46:58Darren Tucker
[auth2-pubkey.c] avoid nasty double free; ok dtucker@ djm@
2008-07-04 - djm@cvs.openbsd.org 2008/07/02 13:47:39Darren Tucker
[ssh.1 ssh.c] When forking after authentication ("ssh -f") with ExitOnForwardFailure enabled, delay the fork until after replies for any -R forwards have been seen. Allows for robust detection of -R forward failure when using -f (similar to bz#92); ok dtucker@
2008-07-04 - djm@cvs.openbsd.org 2008/07/02 13:30:34Darren Tucker
[auth2.c] really really remove the freebie "none" auth try for protocol 2
2008-07-02 - djm@cvs.openbsd.org 2008/07/02 12:36:39Darren Tucker
[auth2-none.c auth2.c] Make protocol 2 MaxAuthTries behaviour a little more sensible: Check whether client has exceeded MaxAuthTries before running an authentication method and skip it if they have, previously it would always allow one try (for "none" auth). Preincrement failure count before post-auth test - previously this checked and postincremented, also to allow one "none" try. Together, these two changes always count the "none" auth method which could be skipped by a malicious client (e.g. an SSH worm) to get an extra attempt at a real auth method. They also make MaxAuthTries=0 a useful way to block users entirely (esp. in a sshd_config Match block). Also, move sending of any preauth banner from "none" auth method to the first call to input_userauth_request(), so worms that skip the "none" method get to see it too.
2008-07-02 - dtucker@cvs.openbsd.org 2008/07/02 12:03:51Darren Tucker
[auth-rsa.c auth.c auth2-pubkey.c auth.h] Merge duplicate host key file checks, based in part on a patch from Rob Holland via bz #1348 . Also checks for non-regular files during protocol 1 RSA auth. ok djm@
2008-07-02 - djm@cvs.openbsd.org 2008/07/02 02:24:18Darren Tucker
[sshd_config sshd_config.5 sshd.8 servconf.c] increase default size of ssh protocol 1 ephemeral key from 768 to 1024 bits; prodded by & ok dtucker@ ok deraadt@
2008-07-02 - stevesk@cvs.openbsd.org 2008/07/01 23:12:47Darren Tucker
[PROTOCOL.agent] fix some typos; ok djm@
2008-07-02 - dtucker@cvs.openbsd.org 2008/07/01 07:24:22Darren Tucker
[sshconnect.c sshd.c] Send CR LF during protocol banner exchanges, but only for Protocol 2 only, in order to comply with RFC 4253. bz #1443, ok djm@
2008-07-02 - dtucker@cvs.openbsd.org 2008/07/01 07:20:52Darren Tucker
[sshconnect.c] Check ExitOnForwardFailure if forwardings are disabled due to a failed host key check. ok djm@
2008-07-02 - djm@cvs.openbsd.org 2008/06/30 12:18:34Darren Tucker
[PROTOCOL] clarify that eow@openssh.com is only sent on session channels
2008-07-02 - djm@cvs.openbsd.org 2008/06/30 12:16:02Darren Tucker
[nchan.c] only send eow@openssh.com notifications for session channels; ok! markus@
2008-07-02 - djm@cvs.openbsd.org 2008/06/30 12:15:39Darren Tucker
[serverloop.c] only pass channel requests on session channels through to the session channel handler, avoiding spurious log messages; ok! markus@
2008-07-02 - djm@cvs.openbsd.org 2008/06/30 08:05:59Darren Tucker
[PROTOCOL.agent] typo: s/constraint_date/constraint_data/
2008-06-30 - (djm) [regress/Makefile] search for conch by path, like we do puttyDamien Miller
2008-06-30 - djm@cvs.openbsd.org 2008/06/28 13:57:25Damien Miller
[regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh] very basic regress test against Twisted Conch in "make interop" target (conch is available in ports/devel/py-twisted/conch); ok markus@
2008-06-30 - dtucker@cvs.openbsd.org 2008/06/11 23:11:40Damien Miller
[Makefile] Don't run cipher-speed test by default; mistakenly enabled by me
2008-06-30 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43Damien Miller
[regress/Makefile regress/key-options.sh] Add regress test for key options. ok djm@
2008-06-30 - djm@cvs.openbsd.org 2008/06/28 14:08:30Damien Miller
[PROTOCOL PROTOCOL.agent] document the protocol used by ssh-agent; "looks ok" markus@
2008-06-30 - djm@cvs.openbsd.org 2008/06/28 14:05:15Damien Miller
[ssh-agent.c] reset global compat flag after processing a protocol 2 signature request with the legacy DSA encoding flag set; ok markus
2008-06-30 - djm@cvs.openbsd.org 2008/06/28 13:58:23Damien Miller
[ssh-agent.c] refuse to add a key that has unknown constraints specified; ok markus
2008-06-30 - djm@cvs.openbsd.org 2008/06/28 07:25:07Damien Miller
[PROTOCOL] spelling fixes
2008-06-30 - jmc@cvs.openbsd.org 2008/06/26 21:11:46Damien Miller
[ssh.1] add VisualHostKey to the list of options listed in -o;
2008-06-30 - grunk@cvs.openbsd.org 2008/06/26 11:46:31Damien Miller
[readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c] Move SSH Fingerprint Visualization away from sharing the config option CheckHostIP to an own config option named VisualHostKey. While there, fix the behaviour that ssh would draw a random art picture on every newly seen host even when the option was not enabled. prodded by deraadt@, discussions, help and ok markus@ djm@ dtucker@
2008-06-29 - djm@cvs.openbsd.org 2008/06/26 09:19:40Damien Miller
[dh.c dh.h moduli.c] when loading moduli from /etc/moduli in sshd(8), check that they are of the expected "safe prime" structure and have had appropriate primality tests performed; feedback and ok dtucker@
2008-06-29 - djm@cvs.openbsd.org 2008/06/26 06:10:09Damien Miller
[sftp-client.c sftp-server.c] allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky bits. Note that this only affects explicit setting of modes (e.g. via sftp(1)'s chmod command) and not file transfers. (bz#1310) ok deraadt@ at c2k8
2008-06-29 - otto@cvs.openbsd.org 2008/06/25 11:13:43Damien Miller
[key.c] add key length to visual fingerprint; zap magical constants; ok grunk@ djm@
2008-06-29 - (djm) OpenBSD CVS SyncDamien Miller
- martynas@cvs.openbsd.org 2008/06/21 07:46:46 [sftp.c] use optopt to get invalid flag, instead of return value of getopt, which is always '?'; ok djm@
2008-06-28 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]Damien Miller
RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).
2008-06-26 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]Damien Miller
[contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.
2008-06-26 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.Damien Miller
(bz#1372)
2008-06-16 - (dtucker) [channels.c] isatty -> is_tty here too.Darren Tucker
2008-06-16 - dtucker@cvs.openbsd.org 2008/06/16 13:22:53Darren Tucker
[session.c channels.c] Rename the isatty argument to is_tty so we don't shadow isatty(3). ok markus@
2008-06-16 - djm@cvs.openbsd.org 2008/06/15 20:06:26Damien Miller
[channels.c channels.h session.c] don't call isatty() on a pty master, instead pass a flag down to channel_set_fds() indicating that te fds refer to a tty. Fixes a hang on exit on Solaris (bz#1463) in portable but is actually a generic bug; ok dtucker deraadt markus
2008-06-16 - dtucker@cvs.openbsd.org 2008/06/15 16:58:40Damien Miller
[servconf.c sshd_config.5] Allow MaxAuthTries within a Match block. ok djm@