summaryrefslogtreecommitdiff
path: root/channels.c
AgeCommit message (Collapse)Author
2001-10-10 - markus@cvs.openbsd.org 2001/10/07 17:49:40Damien Miller
[channels.c channels.h] avoid possible FD_ISSET overflow for channels established during channnel_after_select() (used for dynamic channels).
2001-10-10 - markus@cvs.openbsd.org 2001/10/04 15:05:40Damien Miller
[channels.c serverloop.c] comment out bogus conditions for selecting on connection_in
2001-10-03 - markus@cvs.openbsd.org 2001/10/01 21:38:53Ben Lindstrom
[channels.c channels.h ssh.c sshd.c] remove ugliness; vp@drexel.edu via angelos
2001-09-18 - markus@cvs.openbsd.org 2001/09/17 21:04:02Ben Lindstrom
[channels.c serverloop.c] don't send fake dummy packets on CR (\r) bugreport from yyua@cs.sfu.ca via solar@@openwall.com
2001-09-18 - markus@cvs.openbsd.org 2001/09/17 20:52:47Ben Lindstrom
[channels.c channels.h clientloop.c] try to fix agent-forwarding-backconnection-bug, as seen on HPUX, for example; with Lutz.Jaenicke@aet.TU-Cottbus.DE,
2001-07-18 - markus@cvs.openbsd.org 2001/07/17 21:04:58Ben Lindstrom
[channels.c channels.h clientloop.c nchan.c serverloop.c] keep track of both maxfd and the size of the malloc'ed fdsets. update maxfd if maxfd gets closed.
2001-07-04 - markus@cvs.openbsd.org 2001/07/02 22:52:57Ben Lindstrom
[channels.c channels.h serverloop.c] improve cleanup/exit logic in ssh2: stop listening to channels, detach channel users (e.g. sessions). wait for children (i.e. dying sessions), send exit messages, cleanup all channels.
2001-07-04 - stevesk@cvs.openbsd.org 2001/06/30 18:08:40Ben Lindstrom
[channels.c channels.h clientloop.c] adress -> address; ok markus@
2001-07-04 - stevesk@cvs.openbsd.org 2001/06/29 18:40:28Ben Lindstrom
[channels.c] use socklen_t for getsockopt arg #5; ok markus@
2001-07-04 - markus@cvs.openbsd.org 2001/06/25 08:25:41Ben Lindstrom
[channels.c channels.h cipher.c clientloop.c compat.c compat.h hostfile.c kex.c kex.h key.c key.h nchan.c packet.c serverloop.c session.c session.h sftp-server.c ssh-add.c ssh-agent.c uuencode.h] update copyright for 2001
2001-06-25 - itojun@cvs.openbsd.org 2001/06/23 15:12:20Ben Lindstrom
[auth1.c auth2.c auth2-chall.c authfd.c authfile.c auth-rhosts.c canohost.c channels.c cipher.c clientloop.c deattack.c dh.c hostfile.c kex.c kexdh.c kexgex.c key.c nchan.c packet.c radix.c readpass.c scp.c servconf.c serverloop.c session.c sftp.c sftp-client.c sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c sshconnect1.c sshconnect2.c sshconnect.c sshd.c ssh-keygen.c ssh-keyscan.c] more strict prototypes. raise warning level in Makefile.inc. markus ok'ed TODO; cleanup headers
2001-06-21 - markus@cvs.openbsd.org 2001/06/20 13:56:39Ben Lindstrom
[channels.c channels.h clientloop.c packet.c serverloop.c] move from channel_stop_listening to channel_free_all, call channel_free_all before calling waitpid() in serverloop. fixes the utmp handling; report from Lutz.Jaenicke@aet.TU-Cottbus.DE
2001-06-09 - markus@cvs.openbsd.org 2001/06/07 20:23:05Ben Lindstrom
[authfd.c authfile.c channels.c kexdh.c kexgex.c packet.c ssh.c sshconnect.c sshconnect1.c] use xxx_put_cstring()
2001-06-09 - markus@cvs.openbsd.org 2001/06/05 10:24:32Ben Lindstrom
[channels.c] don't delete the auth socket in channel_stop_listening() auth_sock_cleanup_proc() will take care of this.
2001-06-09 - markus@cvs.openbsd.org 2001/06/04 21:59:43Ben Lindstrom
[channels.c channels.h session.c] switch uid when cleaning up tmp files and sockets; reported by zen-parse@gmx.net on bugtraq
2001-06-09 - markus@cvs.openbsd.org 2001/06/03 14:55:39Ben Lindstrom
[channels.c channels.h session.c] use fatal_register_cleanup instead of atexit, sync with x11 authdir handling
2001-06-09 - (bal) Channels.c and Channels.h -- "Merge Functions, simplify" (dragedBen Lindstrom
out of ssh Attic)
2001-06-05 - markus@cvs.openbsd.org 2001/05/28 23:25:24Ben Lindstrom
[channels.c] cleanup, typo
2001-06-05 - markus@cvs.openbsd.org 2001/05/28 23:14:49Ben Lindstrom
[channels.c channels.h nchan.c] undo broken channel fix and try a different one. there should be still some select errors...
2001-06-05 - stevesk@cvs.openbsd.org 2001/05/19 19:57:09Ben Lindstrom
[channels.c] typo in error message
2001-05-17 - markus@cvs.openbsd.org 2001/05/16 22:09:21Ben Lindstrom
[channels.c nchan.c] more select() error fixes (don't set rfd/wfd to -1).
2001-05-10 - markus@cvs.openbsd.org 2001/05/09 22:51:57Ben Lindstrom
[channels.c] fix -R for protocol 2, noticed by greg@nest.cx. bug was introduced with experimental dynamic forwarding.
2001-05-08 - markus@cvs.openbsd.org 2001/05/08 19:17:31Ben Lindstrom
[channels.c serverloop.c] adds correct error reporting to async connect()s fixes the server-discards-data-before-connected-bug found by onoe@sm.sony.co.jp
2001-05-05 - markus@cvs.openbsd.org 2001/05/04 23:47:34Ben Lindstrom
[channels.c channels.h clientloop.c nchan.c nchan.h serverloop.c ssh.c] move to Channel **channels (instead of Channel *channels), fixes realloc problems. channel_new now returns a Channel *, favour Channel * over channel id. remove old channel_allocate interface.
2001-05-04 - markus@cvs.openbsd.org 2001/05/04 14:34:34Ben Lindstrom
[channels.c] channel_new() reallocs channels[], we cannot use Channel *c after calling channel_new(), XXX fix this in the future...
2001-05-03 - stevesk@cvs.openbsd.org 2001/05/03 15:07:39Ben Lindstrom
[channels.c] typo in debug() string
2001-04-29 - markus@cvs.openbsd.org 2001/04/29 19:16:52Ben Lindstrom
[channels.c clientloop.c compat.c compat.h serverloop.c] more ssh.com-2.0.x bug-compat; from per@appgate.com
2001-04-17 - markus@cvs.openbsd.org 2001/04/17 12:55:04Ben Lindstrom
[channels.c ssh.c] undo socks5 and https support since they are not really used and only bloat ssh. remove -D from usage(), since '-D' is experimental.
2001-04-14 - markus@cvs.openbsd.org 2001/04/14 16:17:14Ben Lindstrom
[channels.c] remove some channels that are not appropriate for keepalive.
2001-04-13 - beck@cvs.openbsd.org 2001/04/13 22:46:54Ben Lindstrom
[channels.c channels.h servconf.c servconf.h serverloop.c sshd.8] Add options ClientAliveInterval and ClientAliveCountMax to sshd. This gives the ability to do a "keepalive" via the encrypted channel which can't be spoofed (unlike TCP keepalives). Useful for when you want to use ssh connections to authenticate people for something, and know relatively quickly when they are no longer authenticated. Disabled by default (of course). ok markus@
2001-04-11 - markus@cvs.openbsd.org 2001/04/11 13:56:13Ben Lindstrom
[channels.c ssh.c] https-connect and socks5 support. i feel so bad.
2001-04-11 - markus@cvs.openbsd.org 2001/04/10 12:15:23Ben Lindstrom
[channels.c] debug cleanup
2001-04-11 - markus@cvs.openbsd.org 2001/04/10 07:46:58Ben Lindstrom
[channels.c] cleanup socks4 handling
2001-04-08 - markus@cvs.openbsd.org 2001/04/07 08:55:18Ben Lindstrom
[buffer.c channels.c channels.h readconf.c ssh.c] allow the ssh client act as a SOCKS4 proxy (dynamic local portforwarding). work by Dan Kaminsky <dankamin@cisco.com> and me. thanks to Dan for this great patch: use 'ssh -D 1080 host' and make netscape use localhost:1080 as a socks proxy.
2001-04-08 - markus@cvs.openbsd.org 2001/04/06 21:00:17Ben Lindstrom
[auth-rh-rsa.c auth-rhosts.c auth-rsa.c auth2.c channels.c session.c ssh.c sshconnect.c sshconnect.h uidswap.c uidswap.h] do gid/groups-swap in addition to uid-swap, should help if /home/group is chmod 750 + chgrp grp /home/group/, work be deraadt and me, thanks to olar@openwall.com is comments. we had many requests for this.
2001-04-05 - markus@cvs.openbsd.org 2001/04/05 10:42:57Ben Lindstrom
[auth-chall.c authfd.c channels.c clientloop.c kex.c kexgex.c key.c mac.c packet.c serverloop.c sftp-client.c sftp-client.h sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c sftp.c ssh-keygen.c sshconnect.c sshconnect2.c sshd.c] fix whitespace: unexpand + trailing spaces.
2001-04-04 - markus@cvs.openbsd.org 2001/04/04 20:25:38Ben Lindstrom
[channels.c channels.h clientloop.c kex.c kex.h serverloop.c sshconnect2.c sshd.c] more robust rekeying don't send channel data after rekeying is started.
2001-03-17 - markus@cvs.openbsd.org 2001/03/16 19:06:30Ben Lindstrom
[auth-options.c channels.c channels.h serverloop.c session.c] implement "permitopen" key option, restricts -L style forwarding to to specified host:port pairs. based on work by harlan@genua.de
2001-03-05 - millert@cvs.openbsd.org 2001/03/04 17:42:28Ben Lindstrom
[authfd.c channels.c dh.c log.c readconf.c servconf.c sftp-int.c ssh.c sshconnect.c sshd.c] log functions should not be passed strings that end in newline as they get passed on to syslog() and when logging to stderr, do_log() appends its own newline.
2001-03-05 - markus@cvs.openbsd.org 2001/03/04 00:03:59Ben Lindstrom
[channels.c] debug1->2
2001-03-05 - markus@cvs.openbsd.org 2001/02/28 21:31:32Ben Lindstrom
[channels.c] typo
2001-03-05 - markus@cvs.openbsd.org 2001/02/28 21:27:48Ben Lindstrom
[channels.c packet.c packet.h serverloop.c] use ignore message to simulate a SSH2_MSG_CHANNEL_DATA message use random content in ignore messages.
2001-03-05 - markus@cvs.openbsd.org 2001/02/28 12:55:07Ben Lindstrom
[channels.c] unify debug messages
2001-03-05 - markus@cvs.openbsd.org 2001/02/28 08:54:55Ben Lindstrom
[channels.c nchan.c nchan.h] make sure remote stderr does not get truncated. remove closed fd's from the select mask.
2001-02-16- markus@cvs.openbsd.org 2001/02/16 13:38:18Ben Lindstrom
[channel.c] remove debug
2001-02-16 - (djm) OpenBSD CVS:Damien Miller
- markus@cvs.openbsd.org 2001/02/15 16:19:59 [channels.c channels.h serverloop.c sshconnect.c sshconnect.h] [sshconnect1.c sshconnect2.c] genericize password padding function for SSH1 and SSH2. add stylized echo to 2, too. - (djm) Add roundup() macro to defines.h
2001-02-10 - markus@cvs.openbsd.org 2001/02/08 21:58:28Ben Lindstrom
[channels.c] nuke sprintf, ok deraadt@
2001-02-05 - markus@cvs.openbsd.org 2001/01/31 13:37:24Kevin Steves
[channels.c channels.h serverloop.c ssh.c] do not disconnect if local port forwarding fails, e.g. if port is already in use - markus@cvs.openbsd.org 2001/02/01 14:58:09 [channels.c] use ipaddr in channel messages, ietf-secsh wants this - markus@cvs.openbsd.org 2001/01/31 12:26:20 [channels.c] ssh.com-2.0.1x does not send additional info in CHANNEL_OPEN_FAILURE messages; bug report from edmundo@rano.org
2001-02-05 - stevesk@cvs.openbsd.org 2001/02/04 08:32:27Kevin Steves
[many files; did this manually to our top-level source dir] unexpand and remove end-of-line whitespace; ok markus@
2001-02-04NB: big update - may break stuff. Please test!Damien Miller
- (djm) OpenBSD CVS sync: - markus@cvs.openbsd.org 2001/02/03 03:08:38 [auth-options.c auth-rh-rsa.c auth-rhosts.c auth.c canohost.c] [canohost.h servconf.c servconf.h session.c sshconnect1.c sshd.8] [sshd_config] make ReverseMappingCheck optional in sshd_config; ok djm@,dugsong@ - markus@cvs.openbsd.org 2001/02/03 03:19:51 [ssh.1 sshd.8 sshd_config] Skey is now called ChallengeResponse - markus@cvs.openbsd.org 2001/02/03 03:43:09 [sshd.8] use no-pty option in .ssh/authorized_keys* if you need a 8-bit clean channel. note from Erik.Anggard@cygate.se (pr/1659) - stevesk@cvs.openbsd.org 2001/02/03 10:03:06 [ssh.1] typos; ok markus@ - djm@cvs.openbsd.org 2001/02/04 04:11:56 [scp.1 sftp-server.c ssh.1 sshd.8 sftp-client.c sftp-client.h] [sftp-common.c sftp-common.h sftp-int.c sftp-int.h sftp.1 sftp.c] Basic interactive sftp client; ok theo@ - (djm) Update RPM specs for new sftp binary - (djm) Update several bits for new optional reverse lookup stuff. I think I got them all.