summaryrefslogtreecommitdiff
path: root/sshd.c
AgeCommit message (Collapse)Author
2003-05-10 - (dtucker) Bug #536: Test for and work around openpty/controlling ttyDarren Tucker
problem on Linux (fixes "could not set controlling tty" errors). Also renames STREAMS_PUSH_ACQUIRES_CTTY to the more generic SSHD_ACQUIRES_CTTY and moves the Solaris-specific comments to configure.ac.
2003-04-09*** empty log message ***Damien Miller
2003-03-10 - (djm) Bug #245: TTY problems on Solaris. Fix by stevesk@ andDamien Miller
dtucker@zip.com.au
2003-02-24 - markus@cvs.openbsd.org 2003/02/16 17:09:57Damien Miller
[kex.c kexdh.c kexgex.c kex.h sshconnect2.c sshd.c ssh-keyscan.c] split kex into client and server code, no need to link server code into the client; ok provos@
2003-02-24 - (djm) OpenBSD CVS SyncDamien Miller
- markus@cvs.openbsd.org 2003/01/27 17:06:31 [sshd.c] more specific error message when /var/empty has wrong permissions; bug #46, map@appgate.com; ok henning@, provos@, stevesk@
2003-01-10 - (djm) Enable new setproctitle emulation for Linux, AIX and HP/UX. MoreDamien Miller
systems may be added later.
2002-11-09 - markus@cvs.openbsd.org 2002/11/07 16:28:47Ben Lindstrom
[sshd.c] log to stderr if -ie is given, bug #414, prj@po.cwru.edu
2002-09-30 - (djm) OpenBSD CVS SyncDamien Miller
- mickey@cvs.openbsd.org 2002/09/27 10:42:09 [compat.c compat.h sshd.c] add a generic match for a prober, such as sie big brother; idea from stevesk@; markus@ ok
2002-09-27 - markus@cvs.openbsd.org 2002/09/25 15:19:02Damien Miller
[sshd.c] typo; pilot@monkey.org
2002-09-25Cray fixes (bug 367) based on patch from Wendy Palm @ cray.Tim Rice
This does not include the deattack.c fixes.
2002-09-19 - stevesk@cvs.openbsd.org 2002/09/13 19:23:09Damien Miller
[channels.c sshconnect.c sshd.c] remove use of SO_LINGER, it should not be needed. error check SO_REUSEADDR. fixup comments. ok markus@
2002-07-23 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10Ben Lindstrom
[sshd.c] utmp_len is unsigned; display error consistent with other options. ok markus@
2002-07-23 - markus@cvs.openbsd.org 2002/07/19 15:43:33Ben Lindstrom
[log.c log.h session.c sshd.c] remove fatal cleanups after fork; based on discussions with and code from solar.
2002-07-22 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial syncBen Lindstrom
with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com.
2002-07-07[acconfig.h configure.ac sshd.c] s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/Tim Rice
2002-07-04 - deraadt@cvs.openbsd.org 2002/06/30 21:59:45Ben Lindstrom
[auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c sshconnect2.c sshd.c] minor KNF
2002-07-04 - deraadt@cvs.openbsd.org 2002/06/30 21:54:16Ben Lindstrom
[auth2.c session.c sshd.c] lint asks that we use names that do not overlap
2002-07-04 - deraadt@cvs.openbsd.org 2002/06/28 23:05:06Ben Lindstrom
[sshd.c] gidset[2] -> gidset[1]; markus ok
2002-07-04 - deraadt@cvs.openbsd.org 2002/06/28 10:08:25Ben Lindstrom
[sshd.c] range check -u option at invocation
2002-06-27 - (bal) Cygwin uid0 fix by vinschen@redhat.comBen Lindstrom
2002-06-25 - markus@cvs.openbsd.org 2002/06/25 18:51:04Ben Lindstrom
[sshd.c] lightweight do_setusercontext after chroot()
2002-06-25[acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from MarkusTim Rice
for Cygwin, Cray, & SCO
2002-06-23 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52Ben Lindstrom
[ssh-agent.c sshd.c] some minor KNF and %u
2002-06-23 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58Ben Lindstrom
[scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c sshpty.c] various KNF and %d for unsigned
2002-06-23 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27Ben Lindstrom
[sshd.c] don't call setsid() if debugging or run from inetd; no "Operation not permitted" errors now; ok millert@ markus@
2002-06-23 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19Ben Lindstrom
[sshd.c] check /var/empty owner mode; ok provos@
2002-06-21 - markus@cvs.openbsd.org 2002/06/20 23:05:56Ben Lindstrom
[servconf.c servconf.h session.c sshd.c] allow Compression=yes/no in sshd_config
2002-06-12 - (bal) Build noop setgroups() for cygwin to clean up code (For otherBen Lindstrom
platforms without the setgroups() requirement, you MUST define SETGROUPS_NOOP in the configure.ac) Based on patch by vinschen@redhat.com
2002-06-11 - mpech@cvs.openbsd.org 2002/06/11 05:46:20Ben Lindstrom
[auth-krb4.c monitor.h serverloop.c session.c ssh-agent.c sshd.c] pid_t cleanup. Markus need this now to keep hacking. markus@, millert@ ok
2002-06-06 - markus@cvs.openbsd.org 2002/05/29 11:21:57Ben Lindstrom
[sshd.c] don't start if privsep is enabled and SSH_PRIVSEP_USER or _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@
2002-06-06 - deraadt@cvs.openbsd.org 2002/05/22 23:18:25Ben Lindstrom
[ssh.c sshd.c] spelling; abishoff@arc.nasa.gov
2002-05-21 - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups()Kevin Steves
2002-05-21 - (stevesk) [sshd.c] bug 245; disable setsid() for nowKevin Steves
2002-05-15 - mouring@cvs.openbsd.org 2002/05/15 15:47:49Ben Lindstrom
[kex.c monitor.c monitor_wrap.c sshd.c] 'monitor' variable clashes with at least one lame platform (NeXT). i Renamed to 'pmonitor'. provos@ - (bal) Fixed up PAM case. I think.
2002-05-15 - millert@cvs.openbsd.org 2002/05/13 15:53:19Ben Lindstrom
[sshd.c] Call setsid() in the child after sshd accepts the connection and forks. This is needed for privsep which calls setlogin() when it changes uids. Without this, there is a race where the login name of an existing connection, as returned by getlogin(), may be changed to the privsep user (sshd). markus@ OK
2002-05-10 - (djm) Try to drop supplemental groups at daemon startup. Patch fromDamien Miller
RedHat
2002-04-25 - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26Kevin Steves
support. bug #184. most from dcole@keysoftsys.com.
2002-04-24 - djm@cvs.openbsd.org 2002/04/23 22:16:29Damien Miller
[sshd.c] Improve error message; ok markus@ stevesk@
2002-04-02 - markus@cvs.openbsd.org 2002/03/30 18:51:15Ben Lindstrom
[monitor.c serverloop.c sftp-int.c sftp.c sshd.c] check waitpid for EINTR; based on patch from peter@ifm.liu.se
2002-03-26 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26Ben Lindstrom
[sshd.c] setproctitle() after preauth child; ok markus@
2002-03-22 - markus@cvs.openbsd.org 2002/03/21 21:23:34Ben Lindstrom
[sshd.c] add privsep_preauth() and remove 1 goto; ok provos@
2002-03-22 - markus@cvs.openbsd.org 2002/03/21 10:21:20Ben Lindstrom
[ssh-add.c] ignore errors for nonexisting default keys in ssh-add, fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
2002-03-22 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25Ben Lindstrom
[servconf.c servconf.h ssh.h sshd.c] for unprivileged user, group do: pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
2002-03-22 - markus@cvs.openbsd.org 2002/03/19 10:49:35Ben Lindstrom
[auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c sshconnect2.c sshd.c ttymodes.c] KNF whitespace
2002-03-22 - markus@cvs.openbsd.org 2002/03/19 10:35:39Ben Lindstrom
[auth-options.c auth.h session.c session.h sshd.c] clean up prototypes
2002-03-22 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43Ben Lindstrom
[pathnames.h servconf.c servconf.h sshd.c] _PATH_PRIVSEP_CHROOT_DIR; ok provos@
2002-03-22 - provos@cvs.openbsd.org 2002/03/18 17:50:31Ben Lindstrom
[auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c kexgex.c servconf.c session.h servconf.h serverloop.c session.c sshd.c] integrate privilege separated openssh; its turned off by default for now. work done by me and markus@ applied, but outside of ensure that smaller code bits migrated with their owners.. no work was tried to 'fix' it to work. =) Later project!
2002-03-22 - provos@cvs.openbsd.org 2002/03/18 01:12:14Ben Lindstrom
[auth.h auth1.c auth2.c sshd.c] have the authentication functions return the authentication context and then do_authenticated; okay millert@
2002-03-22 - markus@cvs.openbsd.org 2002/03/14 16:38:26Ben Lindstrom
[sshd.c] split out ssh1 session key decryption; ok provos@
2002-03-13Stupid djm commits experimental code to head instead of branchDamien Miller
revert