summaryrefslogtreecommitdiff
path: root/sshd.c
AgeCommit message (Collapse)Author
2002-06-06 - markus@cvs.openbsd.org 2002/05/29 11:21:57Ben Lindstrom
[sshd.c] don't start if privsep is enabled and SSH_PRIVSEP_USER or _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@
2002-06-06 - deraadt@cvs.openbsd.org 2002/05/22 23:18:25Ben Lindstrom
[ssh.c sshd.c] spelling; abishoff@arc.nasa.gov
2002-05-21 - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups()Kevin Steves
2002-05-21 - (stevesk) [sshd.c] bug 245; disable setsid() for nowKevin Steves
2002-05-15 - mouring@cvs.openbsd.org 2002/05/15 15:47:49Ben Lindstrom
[kex.c monitor.c monitor_wrap.c sshd.c] 'monitor' variable clashes with at least one lame platform (NeXT). i Renamed to 'pmonitor'. provos@ - (bal) Fixed up PAM case. I think.
2002-05-15 - millert@cvs.openbsd.org 2002/05/13 15:53:19Ben Lindstrom
[sshd.c] Call setsid() in the child after sshd accepts the connection and forks. This is needed for privsep which calls setlogin() when it changes uids. Without this, there is a race where the login name of an existing connection, as returned by getlogin(), may be changed to the privsep user (sshd). markus@ OK
2002-05-10 - (djm) Try to drop supplemental groups at daemon startup. Patch fromDamien Miller
RedHat
2002-04-25 - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26Kevin Steves
support. bug #184. most from dcole@keysoftsys.com.
2002-04-24 - djm@cvs.openbsd.org 2002/04/23 22:16:29Damien Miller
[sshd.c] Improve error message; ok markus@ stevesk@
2002-04-02 - markus@cvs.openbsd.org 2002/03/30 18:51:15Ben Lindstrom
[monitor.c serverloop.c sftp-int.c sftp.c sshd.c] check waitpid for EINTR; based on patch from peter@ifm.liu.se
2002-03-26 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26Ben Lindstrom
[sshd.c] setproctitle() after preauth child; ok markus@
2002-03-22 - markus@cvs.openbsd.org 2002/03/21 21:23:34Ben Lindstrom
[sshd.c] add privsep_preauth() and remove 1 goto; ok provos@
2002-03-22 - markus@cvs.openbsd.org 2002/03/21 10:21:20Ben Lindstrom
[ssh-add.c] ignore errors for nonexisting default keys in ssh-add, fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
2002-03-22 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25Ben Lindstrom
[servconf.c servconf.h ssh.h sshd.c] for unprivileged user, group do: pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
2002-03-22 - markus@cvs.openbsd.org 2002/03/19 10:49:35Ben Lindstrom
[auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c sshconnect2.c sshd.c ttymodes.c] KNF whitespace
2002-03-22 - markus@cvs.openbsd.org 2002/03/19 10:35:39Ben Lindstrom
[auth-options.c auth.h session.c session.h sshd.c] clean up prototypes
2002-03-22 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43Ben Lindstrom
[pathnames.h servconf.c servconf.h sshd.c] _PATH_PRIVSEP_CHROOT_DIR; ok provos@
2002-03-22 - provos@cvs.openbsd.org 2002/03/18 17:50:31Ben Lindstrom
[auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c kexgex.c servconf.c session.h servconf.h serverloop.c session.c sshd.c] integrate privilege separated openssh; its turned off by default for now. work done by me and markus@ applied, but outside of ensure that smaller code bits migrated with their owners.. no work was tried to 'fix' it to work. =) Later project!
2002-03-22 - provos@cvs.openbsd.org 2002/03/18 01:12:14Ben Lindstrom
[auth.h auth1.c auth2.c sshd.c] have the authentication functions return the authentication context and then do_authenticated; okay millert@
2002-03-22 - markus@cvs.openbsd.org 2002/03/14 16:38:26Ben Lindstrom
[sshd.c] split out ssh1 session key decryption; ok provos@
2002-03-13Stupid djm commits experimental code to head instead of branchDamien Miller
revert
2002-03-13Import of Niels Provos' 20020312 ssh-complete.diffDamien Miller
PAM, Cygwin and OSF SIA will not work for sure
2002-03-05 - stevesk@cvs.openbsd.org 2002/02/27 21:23:13Ben Lindstrom
[canohost.c channels.c packet.c sshd.c] remove unneeded casts in [gs]etsockopt(); ok markus@
2002-02-26 - stevesk@cvs.openbsd.org 2002/02/24 16:09:52Ben Lindstrom
[sshd.c] use u_char* here; ok markus@
2002-02-13 - markus@cvs.openbsd.org 2002/02/11 16:19:39Damien Miller
[sshd.c] include md5.h not hmac.h
2002-02-13 - markus@cvs.openbsd.org 2002/02/11 16:17:55Damien Miller
[sshd.c] do not complain about port > 1024 if rhosts-auth is disabled
2002-02-08 - (djm) OpenBSD CVS SyncDamien Miller
- markus@cvs.openbsd.org 2002/02/04 12:15:25 [sshd.c] add SYSLOG_FACILITY_NOT_SET = -1, SYSLOG_LEVEL_NOT_SET = -1, fixes arm/netbsd; based on patch from bjh21@netbsd.org; ok djm@
2002-01-22 - markus@cvs.openbsd.org 2002/01/13 17:57:37Damien Miller
[auth2.c auth2-chall.c compat.c sshconnect2.c sshd.c] use buffer API and avoid static strings of fixed size; ok provos@/mouring@
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 14:50:54Damien Miller
[auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c] packet_read* no longer return the packet length, since it's not used.
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 13:57:33Damien Miller
[auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c] packet_get_bignum* no longer returns a size
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 18:22:16Damien Miller
[auth1.c authfile.c auth-rsa.c dh.c kexdh.c kexgex.c key.c rsa.c scard.c ssh-agent.c sshconnect1.c sshd.c ssh-dss.c] call fatal() for openssl allocation failures
2001-12-21 - deraadt@cvs.openbsd.org 2001/12/19 07:18:56Damien Miller
[auth1.c auth2.c auth2-chall.c auth-bsdauth.c auth.c authfile.c auth.h] [auth-krb4.c auth-rhosts.c auth-skey.c bufaux.c canohost.c channels.c] [cipher.c clientloop.c compat.c compress.c deattack.c key.c log.c mac.c] [match.c misc.c nchan.c packet.c readconf.c rijndael.c rijndael.h scard.c] [servconf.c servconf.h serverloop.c session.c sftp.c sftp-client.c] [sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c] [sshconnect1.c sshconnect2.c sshconnect.c sshd.8 sshd.c sshd_config] [ssh-keygen.c sshlogin.c sshpty.c sshtty.c ttymodes.c uidswap.c] basic KNF done while i was looking for something else
2001-12-21 - stevesk@cvs.openbsd.org 2001/12/10 16:45:04Damien Miller
[sshd.c] possible fd leak on error; ok markus@
2001-12-06 - markus@cvs.openbsd.org 2001/12/06 13:30:06Ben Lindstrom
[servconf.c servconf.h sshd.8 sshd.c] add -o to sshd, too. ok deraadt@ - (bal) Minor white space fix up in servconf.c
2001-12-06 - deraadt@cvs.openbsd.org 2001/12/05 10:06:12Ben Lindstrom
[authfd.c authfile.c bufaux.c channels.c compat.c kex.c kexgex.c key.c misc.c packet.c servconf.c ssh-agent.c sshconnect2.c sshconnect.c sshd.c ssh-dss.c ssh-keygen.c ssh-rsa.c] minor KNF
2001-12-06 - itojun@cvs.openbsd.org 2001/12/05 03:50:01Ben Lindstrom
[clientloop.c serverloop.c sshd.c] deal with LP64 printf issue with sig_atomic_t. from thorpej
2001-12-06 - markus@cvs.openbsd.org 2001/11/22 12:34:22Ben Lindstrom
[clientloop.c serverloop.c sshd.c] volatile sig_atomic_t
2001-12-06 - markus@cvs.openbsd.org 2001/11/19 11:20:21Ben Lindstrom
[sshd.c] fd leak on HUP; ok stevesk@
2001-12-06 - deraadt@cvs.openbsd.org 2001/11/14 20:45:08Ben Lindstrom
[sshd.c] errno saving wrapping in a signal handler
2001-11-12 - markus@cvs.openbsd.org 2001/11/10 13:19:45Damien Miller
[sshd.c] cleanup libwrap support (remove bogus comment, bogus close(), add debug, etc).
2001-11-12 - markus@cvs.openbsd.org 2001/11/09 19:08:35Damien Miller
[sshd.c] remove extra trailing dot from log message; pilot@naughty.monkey.org
2001-11-12 - markus@cvs.openbsd.org 2001/10/24 08:41:41Damien Miller
[sshd.c] mention remote port in debug message
2001-10-03 - stevesk@cvs.openbsd.org 2001/10/02 22:56:09Ben Lindstrom
[sshd.c] #include "channels.h" for channel_set_af()
2001-10-03 - markus@cvs.openbsd.org 2001/10/01 21:38:53Ben Lindstrom
[channels.c channels.h ssh.c sshd.c] remove ugliness; vp@drexel.edu via angelos
2001-09-18 - (djm) Revert setgroups call, it causes problems on OS-XDamien Miller
2001-09-15 - (djm) Clear supplemental groups at sshd start to prevent them fromDamien Miller
being propogated to random PAM modules. Based on patch from Redhat via Pekka Savola <pekkas@netcore.fi>
2001-09-12 - camield@cvs.openbsd.org 2001/08/23 17:59:31Ben Lindstrom
[sshd.c] end request with 0, not NULL ok markus@
2001-08-06 - (bal) Second around of UNICOS patches. A few other things left.Ben Lindstrom
Patches by William L. Jones <jones@mail.utexas.edu>