Age | Commit message (Collapse) | Author |
|
This makes it easier to audit networks for versions patched against security
vulnerabilities. It has little detrimental effect, as attackers will
generally just try attacks rather than bothering to scan for
vulnerable-looking version strings. (However, see debian-banner.patch.)
Forwarded: not-needed
Last-Update: 2017-10-04
Patch-Name: package-versioning.patch
|
|
for prior version; part of RSA-SHA2 strictification, ok markus@
OpenBSD-Commit-ID: 84a11fc0efd2674c050712336b5093f5d408e32b
|
|
OpenBSD-Commit-ID: 274e614352460b9802c905f38fb5ea7ed5db3d41
|
|
OpenBSD-Commit-ID: 274e614352460b9802c905f38fb5ea7ed5db3d41
|
|
openssh-7.6; ok deraadt@
Upstream-ID: a39c3a5b63a1baae109ae1ae4c7c34c2a59acde0
|
|
openssh-7.5
Upstream-ID: b8b9a4a949427c393cd868215e1724ceb3467ee5
|
|
openssh-7.4
Upstream-ID: 1ee404adba6bbe10ae9277cbae3a94abe2867b79
|
|
openssh-7.3
Upstream-ID: af106a7eb665f642648cf1993e162c899f358718
|
|
|
|
openssh-7.2
Upstream-ID: 9db776b26014147fc907ece8460ef2bcb0f11e78
|
|
|
|
openssh-7.1
Upstream-ID: ff7b1ef4b06caddfb45e08ba998128c88be3d73f
|
|
openssh 7.0; ok deraadt@
Upstream-ID: c63afdef537f57f28ae84145c5a8e29e9250221f
|
|
openssh-6.9
Upstream-ID: 6cfe8e1904812531080e6ab6e752d7001b5b2d45
|
|
crank; ok markus, deraadt
|
|
[compat.c compat.h sshconnect2.c sshd.c version.h]
OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections
using the curve25519-sha256@libssh.org KEX exchange method to fail
when connecting with something that implements the spec properly.
Disable this KEX method when speaking to one of the affected
versions.
reported by Aris Adamantiadis; ok markus@
|
|
[version.h]
openssh-6.6
|
|
[version.h]
openssh-6.5
|
|
[version.h]
openssh-6.4
|
|
[version.h]
openssh-6.3 for release
|
|
[version.h]
openssh 6.2
|
|
[version.h]
openssh 6.1
|
|
[version.h]
move from 6.0-beta to 6.0
|
|
[mux.c readconf.h channels.h compat.h compat.c ssh.c readconf.c channels.c version.h]
unbreak remote portforwarding with dynamic allocated listen ports:
1) send the actual listen port in the open message (instead of 0).
this allows multiple forwardings with a dynamic listen port
2) update the matching permit-open entry, so we can identify where
to connect to
report: den at skbkontur.ru and P. Szczygielski
feedback and ok djm@
|
|
|
|
[version.h]
crank now, release later
|
|
contrib/redhat/openssh.spec contrib/suse/openssh.spec] Pull the version
bumps from the 5.8p2 branch into HEAD. ok djm.
|
|
[version.h]
openssh-5.8
|
|
- djm@cvs.openbsd.org 2011/01/22 09:18:53
[version.h]
crank to OpenSSH-5.7
|
|
- djm@cvs.openbsd.org 2010/08/08 16:26:42
[version.h]
crank to 5.6
|
|
[version.h]
crank version to openssh-5.5 since we have a few fixes since 5.4;
requested deraadt@ kettenis@
|
|
- djm@cvs.openbsd.org 2010/03/07 22:01:32
[version.h]
openssh-5.4
|
|
[version.h]
crank version; ok deraadt
|
|
[version.h]
openssh-5.2
|
|
[version.h]
openssh-5.1
|
|
[version.h]
openssh-5.0
|
|
[version.h]
openssh-4.9
|
|
[version.h]
crank version; from djm
|
|
[version.h]
openssh 4.7
|
|
[version.h]
openssh-4.6; "please" deraadt@
|
|
[monitor.c version.h]
correctly check for bad signatures in the monitor, otherwise the monitor
and the unpriv process can get out of sync. with dtucker@, ok djm@,
dtucker@
|
|
[version.h]
crank to 4.4
|
|
contrib/redhat/openssh.spec contrib/suse/openssh.spec] Bump version
strings to match 4.3p2 release.
|
|
[version.h]
openssh 4.3
|
|
[version.h]
4.2
|
|
[version.h]
4.1
|
|
[version.h]
OpenSSH 4.0
|
|
banner. Suggested by deraadt@, ok mouring@, dtucker@
|
|
- markus@cvs.openbsd.org 2004/08/16 08:17:01
[version.h]
3.9
|
|
[version.h]
3.8.1
|