summaryrefslogtreecommitdiff
path: root/sshd.c
AgeCommit message (Collapse)Author
2001-12-06 - markus@cvs.openbsd.org 2001/11/19 11:20:21Ben Lindstrom
[sshd.c] fd leak on HUP; ok stevesk@
2001-12-06 - deraadt@cvs.openbsd.org 2001/11/14 20:45:08Ben Lindstrom
[sshd.c] errno saving wrapping in a signal handler
2001-11-12 - markus@cvs.openbsd.org 2001/11/10 13:19:45Damien Miller
[sshd.c] cleanup libwrap support (remove bogus comment, bogus close(), add debug, etc).
2001-11-12 - markus@cvs.openbsd.org 2001/11/09 19:08:35Damien Miller
[sshd.c] remove extra trailing dot from log message; pilot@naughty.monkey.org
2001-11-12 - markus@cvs.openbsd.org 2001/10/24 08:41:41Damien Miller
[sshd.c] mention remote port in debug message
2001-10-03 - stevesk@cvs.openbsd.org 2001/10/02 22:56:09Ben Lindstrom
[sshd.c] #include "channels.h" for channel_set_af()
2001-10-03 - markus@cvs.openbsd.org 2001/10/01 21:38:53Ben Lindstrom
[channels.c channels.h ssh.c sshd.c] remove ugliness; vp@drexel.edu via angelos
2001-09-18 - (djm) Revert setgroups call, it causes problems on OS-XDamien Miller
2001-09-15 - (djm) Clear supplemental groups at sshd start to prevent them fromDamien Miller
being propogated to random PAM modules. Based on patch from Redhat via Pekka Savola <pekkas@netcore.fi>
2001-09-12 - camield@cvs.openbsd.org 2001/08/23 17:59:31Ben Lindstrom
[sshd.c] end request with 0, not NULL ok markus@
2001-08-06 - (bal) Second around of UNICOS patches. A few other things left.Ben Lindstrom
Patches by William L. Jones <jones@mail.utexas.edu>
2001-08-06 - stevesk@cvs.openbsd.org 2001/07/26 17:18:22Ben Lindstrom
[sshd.8 sshd.c] add -t option to test configuration file and keys; pekkas@netcore.fi ok markus@
2001-07-04 - dugsong@cvs.openbsd.org 2001/06/26 16:15:25Ben Lindstrom
[auth1.c auth.h auth-krb4.c auth-passwd.c readconf.c readconf.h servconf.c servconf.h session.c sshconnect1.c sshd.c] Kerberos v5 support for SSH1, mostly from Assar Westerlund <assar@freebsd.org> and Bjorn Gronvall <bg@sics.se>. markus@ ok
2001-06-25 - markus@cvs.openbsd.org 2001/06/23 19:12:43Ben Lindstrom
[sshd.c] pidfile/sigterm race; bbraun@synack.net
2001-06-25 - itojun@cvs.openbsd.org 2001/06/23 15:12:20Ben Lindstrom
[auth1.c auth2.c auth2-chall.c authfd.c authfile.c auth-rhosts.c canohost.c channels.c cipher.c clientloop.c deattack.c dh.c hostfile.c kex.c kexdh.c kexgex.c key.c nchan.c packet.c radix.c readpass.c scp.c servconf.c serverloop.c session.c sftp.c sftp-client.c sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c sshconnect1.c sshconnect2.c sshconnect.c sshd.c ssh-keygen.c ssh-keyscan.c] more strict prototypes. raise warning level in Makefile.inc. markus ok'ed TODO; cleanup headers
2001-06-09 - markus@cvs.openbsd.org 2001/06/04 23:07:21Ben Lindstrom
[clientloop.c serverloop.c sshd.c] set flags in the signal handlers, do real work in the main loop, ok provos@
2001-06-05 - markus@cvs.openbsd.org 2001/05/28 23:58:35Ben Lindstrom
[packet.c packet.h sshconnect.c sshd.c] remove some lines, simplify.
2001-06-05 - stevesk@cvs.openbsd.org 2001/05/19 19:43:57Ben Lindstrom
[misc.c misc.h servconf.c sshd.8 sshd.c] sshd command-line arguments and configuration file options that specify time may be expressed using a sequence of the form: time[qualifier], where time is a positive integer value and qualifier is one of the following: <none>,s,m,h,d,w Examples: 600 600 seconds (10 minutes) 10m 10 minutes 1h30m 1 hour 30 minutes (90 minutes) ok markus@
2001-06-05 - markus@cvs.openbsd.org 2001/05/18 14:13:29Ben Lindstrom
[auth-chall.c auth.h auth1.c auth2-chall.c auth2.c readconf.c readconf.h servconf.c servconf.h sshconnect1.c sshconnect2.c sshd.c] improved kbd-interactive support. work by per@appgate.com and me
2001-04-16 - markus@cvs.openbsd.org 2001/04/15 16:58:03Ben Lindstrom
[authfile.c ssh-keygen.c sshd.c] don't use errno for key_{load,save}_private; discussion w/ solar@openwall
2001-04-15 - markus@cvs.openbsd.org 2001/04/15 08:43:47Ben Lindstrom
[dh.c sftp-glob.c sftp-glob.h sftp-int.c sshconnect2.c sshd.c] some unused variable and typos; from tomh@po.crl.go.jp
2001-04-12 - stevesk@cvs.openbsd.org 2001/04/12 20:09:38Ben Lindstrom
[misc.c misc.h readconf.c servconf.c ssh.c sshd.c] robust port validation; ok markus@ jakob@
2001-04-11 - lebel@cvs.openbsd.org 2001/04/11 16:25:30Ben Lindstrom
[sshd.8 sshd.c] implement the -e option into sshd: -e When this option is specified, sshd will send the output to the standard error instead of the system log. markus@ OK.
2001-04-05 - markus@cvs.openbsd.org 2001/04/05 10:42:57Ben Lindstrom
[auth-chall.c authfd.c channels.c clientloop.c kex.c kexgex.c key.c mac.c packet.c serverloop.c sftp-client.c sftp-client.h sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c sftp.c ssh-keygen.c sshconnect.c sshconnect2.c sshd.c] fix whitespace: unexpand + trailing spaces.
2001-04-04 - markus@cvs.openbsd.org 2001/04/04 20:25:38Ben Lindstrom
[channels.c channels.h clientloop.c kex.c kex.h serverloop.c sshconnect2.c sshd.c] more robust rekeying don't send channel data after rekeying is started.
2001-04-04 - markus@cvs.openbsd.org 2001/04/04 14:34:58Ben Lindstrom
[clientloop.c kex.c kex.h serverloop.c sshconnect2.c sshd.c] enable server side rekeying + some rekey related clientup. todo: we should not send any non-KEX messages after we send KEXINIT
2001-04-04 - markus@cvs.openbsd.org 2001/04/04 09:48:35Ben Lindstrom
[kex.c kex.h kexdh.c kexgex.c packet.c sshconnect2.c sshd.c] don't sent multiple kexinit-requests. send newkeys, block while waiting for newkeys. fix comments.
2001-04-04 - markus@cvs.openbsd.org 2001/04/03 23:32:12Ben Lindstrom
[kex.c kex.h packet.c sshconnect2.c sshd.c] undo parts of recent my changes: main part of keyexchange does not need dispatch-callbacks, since application data is delayed until the keyexchange completes (if i understand the drafts correctly). add some infrastructure for re-keying.
2001-04-04 - markus@cvs.openbsd.org 2001/04/03 19:53:29Ben Lindstrom
[dh.c dh.h kex.c kex.h sshconnect2.c sshd.c] move kex to kex*.c, used dispatch_set() callbacks for kex. should make rekeying easier.
2001-03-30 - OpenBSD CVS SyncDamien Miller
- djm@cvs.openbsd.org 2001/03/29 23:42:01 [sshd.c] Protocol 1 key regeneration log => verbose, some KNF; ok markus@
2001-03-30 - OpenBSD CVS SyncDamien Miller
- stevesk@cvs.openbsd.org 2001/03/29 21:06:21 [sshconnect2.c sshd.c] need to set both STOC and CTOS for SSH_BUG_BIGENDIANAES; ok markus@
2001-03-30 - (djm) OpenBSD CVS SyncDamien Miller
- provos@cvs.openbsd.org 2001/03/28 21:59:41 [kex.c kex.h sshconnect2.c sshd.c] forgot to include min and max params in hash, okay markus@
2001-03-29 - markus@cvs.openbsd.org 2001/03/28 20:50:45Ben Lindstrom
[sshd.c] call refuse() before close(); from olemx@ans.pl
2001-03-29 - provos@cvs.openbsd.org 2001/03/27 17:46:50Ben Lindstrom
[compat.c compat.h dh.c dh.h ssh2.h sshconnect2.c sshd.c version.h] make dh group exchange more flexible, allow min and max group size, okay markus@, deraadt@
2001-03-29 - markus@cvs.openbsd.org 2001/03/27 10:34:08Ben Lindstrom
[ssh-rsa.c sshd.c] use EVP_get_digestbynid, reorder some calls and fix missing free.
2001-03-26 - markus@cvs.openbsd.org 2001/03/26 08:07:09Ben Lindstrom
[authfile.c authfile.h ssh-add.c ssh-keygen.c ssh.c sshconnect.c sshconnect.h sshconnect1.c sshconnect2.c sshd.c] simpler key load/save interface, see authfile.h
2001-03-24 - markus@cvs.openbsd.org 2001/03/23 14:28:32Ben Lindstrom
[session.c sshd.c] ignore SIGPIPE, restore in child, fixes x11-fwd crashes; with djm@
2001-03-24 - djm@cvs.openbsd.org 2001/03/23 11:04:07Ben Lindstrom
[compat.c compat.h sshconnect2.c sshd.c] Compat for OpenSSH with broken Rijndael/AES. ok markus@
2001-03-22 - deraadt@cvs.openbsd.org 2001/03/22 20:22:55Ben Lindstrom
[sshd.c] do not place linefeeds in buffer
2001-03-19 - deraadt@cvs.openbsd.org 2001/03/18 23:30:55Damien Miller
[compat.c compat.h sshd.c] specifically version match on ssh scanners. do not log scan information to the console
2001-03-19 - (djm) Seed PRNG at startup, rather than waiting for arc4random calls toDamien Miller
do it implicitly.
2001-03-09 - deraadt@cvs.openbsd.org 2001/03/09 12:30:29Ben Lindstrom
[sshd.c] typo; slade@shore.net
2001-03-06 - markus@cvs.openbsd.org 2001/03/05 17:17:21Ben Lindstrom
[kex.c kex.h sshconnect2.c sshd.c] generate a 2*need size (~300 instead of 1024/2048) random private exponent during the DH key agreement. according to Niels (the great german advisor) this is safe since /etc/primes contains strong primes only. References: P. C. van Oorschot and M. J. Wiener, On Diffie-Hellman key agreement with short exponents, In Advances in Cryptology - EUROCRYPT'96, LNCS 1070, Springer-Verlag, 1996, pp.332-343.
2001-03-05 - millert@cvs.openbsd.org 2001/03/04 17:42:28Ben Lindstrom
[authfd.c channels.c dh.c log.c readconf.c servconf.c sftp-int.c ssh.c sshconnect.c sshd.c] log functions should not be passed strings that end in newline as they get passed on to syslog() and when logging to stderr, do_log() appends its own newline.
2001-03-05 - (bal) CVS ID touch up on auth2.c, serverloop.c, session.c & sshd.cBen Lindstrom
2001-03-05 - markus@cvs.openbsd.org 2001/02/28 21:21:41Ben Lindstrom
[sshd.c] generate a fake session id, too
2001-03-05 - markus@cvs.openbsd.org 2001/02/23 18:15:13Ben Lindstrom
[sshd.c] the random session key depends now on the session_key_int sent by the 'attacker' dig1 = md5(cookie|session_key_int); dig2 = md5(dig1|cookie|session_key_int); fake_session_key = dig1|dig2; this change is caused by a mail from anakin@pobox.com patch based on discussions with my german advisor niels@openbsd.org
2001-02-20 - deraadt@cvs.openbsd.org 2001/02/19 23:09:05Ben Lindstrom
[sshd.c] clarify message to make it not mention "ident"
2001-02-18 - (bal) Markus' blessing to rename login.[ch] -> sshlogin.[ch] andBen Lindstrom
pty.[ch] -> sshpty.[ch]
2001-02-18 - (djm) Close listen_sock on bind() failures. Patch from ArkadiuszDamien Miller
Miskiewicz <misiek@pld.ORG.PL>