summaryrefslogtreecommitdiff
path: root/sshd.c
AgeCommit message (Collapse)Author
2002-06-25[acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from MarkusTim Rice
for Cygwin, Cray, & SCO
2002-06-23 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52Ben Lindstrom
[ssh-agent.c sshd.c] some minor KNF and %u
2002-06-23 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58Ben Lindstrom
[scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c sshpty.c] various KNF and %d for unsigned
2002-06-23 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27Ben Lindstrom
[sshd.c] don't call setsid() if debugging or run from inetd; no "Operation not permitted" errors now; ok millert@ markus@
2002-06-23 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19Ben Lindstrom
[sshd.c] check /var/empty owner mode; ok provos@
2002-06-21 - markus@cvs.openbsd.org 2002/06/20 23:05:56Ben Lindstrom
[servconf.c servconf.h session.c sshd.c] allow Compression=yes/no in sshd_config
2002-06-12 - (bal) Build noop setgroups() for cygwin to clean up code (For otherBen Lindstrom
platforms without the setgroups() requirement, you MUST define SETGROUPS_NOOP in the configure.ac) Based on patch by vinschen@redhat.com
2002-06-11 - mpech@cvs.openbsd.org 2002/06/11 05:46:20Ben Lindstrom
[auth-krb4.c monitor.h serverloop.c session.c ssh-agent.c sshd.c] pid_t cleanup. Markus need this now to keep hacking. markus@, millert@ ok
2002-06-06 - markus@cvs.openbsd.org 2002/05/29 11:21:57Ben Lindstrom
[sshd.c] don't start if privsep is enabled and SSH_PRIVSEP_USER or _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@
2002-06-06 - deraadt@cvs.openbsd.org 2002/05/22 23:18:25Ben Lindstrom
[ssh.c sshd.c] spelling; abishoff@arc.nasa.gov
2002-05-21 - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups()Kevin Steves
2002-05-21 - (stevesk) [sshd.c] bug 245; disable setsid() for nowKevin Steves
2002-05-15 - mouring@cvs.openbsd.org 2002/05/15 15:47:49Ben Lindstrom
[kex.c monitor.c monitor_wrap.c sshd.c] 'monitor' variable clashes with at least one lame platform (NeXT). i Renamed to 'pmonitor'. provos@ - (bal) Fixed up PAM case. I think.
2002-05-15 - millert@cvs.openbsd.org 2002/05/13 15:53:19Ben Lindstrom
[sshd.c] Call setsid() in the child after sshd accepts the connection and forks. This is needed for privsep which calls setlogin() when it changes uids. Without this, there is a race where the login name of an existing connection, as returned by getlogin(), may be changed to the privsep user (sshd). markus@ OK
2002-05-10 - (djm) Try to drop supplemental groups at daemon startup. Patch fromDamien Miller
RedHat
2002-04-25 - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26Kevin Steves
support. bug #184. most from dcole@keysoftsys.com.
2002-04-24 - djm@cvs.openbsd.org 2002/04/23 22:16:29Damien Miller
[sshd.c] Improve error message; ok markus@ stevesk@
2002-04-02 - markus@cvs.openbsd.org 2002/03/30 18:51:15Ben Lindstrom
[monitor.c serverloop.c sftp-int.c sftp.c sshd.c] check waitpid for EINTR; based on patch from peter@ifm.liu.se
2002-03-26 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26Ben Lindstrom
[sshd.c] setproctitle() after preauth child; ok markus@
2002-03-22 - markus@cvs.openbsd.org 2002/03/21 21:23:34Ben Lindstrom
[sshd.c] add privsep_preauth() and remove 1 goto; ok provos@
2002-03-22 - markus@cvs.openbsd.org 2002/03/21 10:21:20Ben Lindstrom
[ssh-add.c] ignore errors for nonexisting default keys in ssh-add, fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
2002-03-22 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25Ben Lindstrom
[servconf.c servconf.h ssh.h sshd.c] for unprivileged user, group do: pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
2002-03-22 - markus@cvs.openbsd.org 2002/03/19 10:49:35Ben Lindstrom
[auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c sshconnect2.c sshd.c ttymodes.c] KNF whitespace
2002-03-22 - markus@cvs.openbsd.org 2002/03/19 10:35:39Ben Lindstrom
[auth-options.c auth.h session.c session.h sshd.c] clean up prototypes
2002-03-22 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43Ben Lindstrom
[pathnames.h servconf.c servconf.h sshd.c] _PATH_PRIVSEP_CHROOT_DIR; ok provos@
2002-03-22 - provos@cvs.openbsd.org 2002/03/18 17:50:31Ben Lindstrom
[auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c kexgex.c servconf.c session.h servconf.h serverloop.c session.c sshd.c] integrate privilege separated openssh; its turned off by default for now. work done by me and markus@ applied, but outside of ensure that smaller code bits migrated with their owners.. no work was tried to 'fix' it to work. =) Later project!
2002-03-22 - provos@cvs.openbsd.org 2002/03/18 01:12:14Ben Lindstrom
[auth.h auth1.c auth2.c sshd.c] have the authentication functions return the authentication context and then do_authenticated; okay millert@
2002-03-22 - markus@cvs.openbsd.org 2002/03/14 16:38:26Ben Lindstrom
[sshd.c] split out ssh1 session key decryption; ok provos@
2002-03-13Stupid djm commits experimental code to head instead of branchDamien Miller
revert
2002-03-13Import of Niels Provos' 20020312 ssh-complete.diffDamien Miller
PAM, Cygwin and OSF SIA will not work for sure
2002-03-05 - stevesk@cvs.openbsd.org 2002/02/27 21:23:13Ben Lindstrom
[canohost.c channels.c packet.c sshd.c] remove unneeded casts in [gs]etsockopt(); ok markus@
2002-02-26 - stevesk@cvs.openbsd.org 2002/02/24 16:09:52Ben Lindstrom
[sshd.c] use u_char* here; ok markus@
2002-02-13 - markus@cvs.openbsd.org 2002/02/11 16:19:39Damien Miller
[sshd.c] include md5.h not hmac.h
2002-02-13 - markus@cvs.openbsd.org 2002/02/11 16:17:55Damien Miller
[sshd.c] do not complain about port > 1024 if rhosts-auth is disabled
2002-02-08 - (djm) OpenBSD CVS SyncDamien Miller
- markus@cvs.openbsd.org 2002/02/04 12:15:25 [sshd.c] add SYSLOG_FACILITY_NOT_SET = -1, SYSLOG_LEVEL_NOT_SET = -1, fixes arm/netbsd; based on patch from bjh21@netbsd.org; ok djm@
2002-01-22 - markus@cvs.openbsd.org 2002/01/13 17:57:37Damien Miller
[auth2.c auth2-chall.c compat.c sshconnect2.c sshd.c] use buffer API and avoid static strings of fixed size; ok provos@/mouring@
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 14:50:54Damien Miller
[auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c] packet_read* no longer return the packet length, since it's not used.
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 13:57:33Damien Miller
[auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c] packet_get_bignum* no longer returns a size
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 18:22:16Damien Miller
[auth1.c authfile.c auth-rsa.c dh.c kexdh.c kexgex.c key.c rsa.c scard.c ssh-agent.c sshconnect1.c sshd.c ssh-dss.c] call fatal() for openssl allocation failures
2001-12-21 - deraadt@cvs.openbsd.org 2001/12/19 07:18:56Damien Miller
[auth1.c auth2.c auth2-chall.c auth-bsdauth.c auth.c authfile.c auth.h] [auth-krb4.c auth-rhosts.c auth-skey.c bufaux.c canohost.c channels.c] [cipher.c clientloop.c compat.c compress.c deattack.c key.c log.c mac.c] [match.c misc.c nchan.c packet.c readconf.c rijndael.c rijndael.h scard.c] [servconf.c servconf.h serverloop.c session.c sftp.c sftp-client.c] [sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c] [sshconnect1.c sshconnect2.c sshconnect.c sshd.8 sshd.c sshd_config] [ssh-keygen.c sshlogin.c sshpty.c sshtty.c ttymodes.c uidswap.c] basic KNF done while i was looking for something else
2001-12-21 - stevesk@cvs.openbsd.org 2001/12/10 16:45:04Damien Miller
[sshd.c] possible fd leak on error; ok markus@
2001-12-06 - markus@cvs.openbsd.org 2001/12/06 13:30:06Ben Lindstrom
[servconf.c servconf.h sshd.8 sshd.c] add -o to sshd, too. ok deraadt@ - (bal) Minor white space fix up in servconf.c
2001-12-06 - deraadt@cvs.openbsd.org 2001/12/05 10:06:12Ben Lindstrom
[authfd.c authfile.c bufaux.c channels.c compat.c kex.c kexgex.c key.c misc.c packet.c servconf.c ssh-agent.c sshconnect2.c sshconnect.c sshd.c ssh-dss.c ssh-keygen.c ssh-rsa.c] minor KNF
2001-12-06 - itojun@cvs.openbsd.org 2001/12/05 03:50:01Ben Lindstrom
[clientloop.c serverloop.c sshd.c] deal with LP64 printf issue with sig_atomic_t. from thorpej
2001-12-06 - markus@cvs.openbsd.org 2001/11/22 12:34:22Ben Lindstrom
[clientloop.c serverloop.c sshd.c] volatile sig_atomic_t
2001-12-06 - markus@cvs.openbsd.org 2001/11/19 11:20:21Ben Lindstrom
[sshd.c] fd leak on HUP; ok stevesk@
2001-12-06 - deraadt@cvs.openbsd.org 2001/11/14 20:45:08Ben Lindstrom
[sshd.c] errno saving wrapping in a signal handler
2001-11-12 - markus@cvs.openbsd.org 2001/11/10 13:19:45Damien Miller
[sshd.c] cleanup libwrap support (remove bogus comment, bogus close(), add debug, etc).