ChangeLog (181110) | ChangeLog (181111) |
---|---|
120080721 2 - (djm) OpenBSD CVS Sync 3 - jmc@cvs.openbsd.org 2008/07/18 22:51:01 4 [sftp-server.8] 5 no need for .Pp before or after .Sh; 6 - djm@cvs.openbsd.org 2008/07/21 08:19:07 7 [version.h] 8 openssh-5.1 9 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 10 [contrib/suse/openssh.spec] Update version number in README and RPM specs 11 - (djm) Release OpenSSH-5.1 12 1320080717 14 - (djm) OpenBSD CVS Sync 15 - djm@cvs.openbsd.org 2008/07/17 08:48:00 16 [sshconnect2.c] 17 strnvis preauth banner; pointed out by mpf@ ok markus@ 18 - djm@cvs.openbsd.org 2008/07/17 08:51:07 19 [auth2-hostbased.c] 20 strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes 21 report and patch from res AT qoxp.net (bz#1200); ok markus@ 22 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat 23 code, replace with equivalent cygwin library call. Patch from vinschen 24 at redhat.com, ok djm@. 25 - (djm) [sshconnect2.c] vis.h isn't available everywhere 26 2720080716 28 - OpenBSD CVS Sync 29 - djm@cvs.openbsd.org 2008/07/15 02:23:14 30 [sftp.1] 31 number of pipelined requests is now 64; 32 prodded by Iain.Morgan AT nasa.gov 33 - djm@cvs.openbsd.org 2008/07/16 11:51:14 34 [clientloop.c] 35 rename variable first_gc -> last_gc (since it is actually the last 36 in the list). 37 - djm@cvs.openbsd.org 2008/07/16 11:52:19 38 [channels.c] 39 this loop index should be automatic, not static 40 4120080714 42 - (djm) OpenBSD CVS Sync 43 - sthen@cvs.openbsd.org 2008/07/13 21:22:52 44 [ssh-keygen.c] 45 Change "ssh-keygen -F [host] -l" to not display random art unless 46 -v is also specified, making it consistent with the manual and other 47 uses of -l. 48 ok grunk@ 49 - djm@cvs.openbsd.org 2008/07/13 22:13:07 50 [channels.c] 51 use struct sockaddr_storage instead of struct sockaddr for accept(2) 52 address argument. from visibilis AT yahoo.com in bz#1485; ok markus@ 53 - djm@cvs.openbsd.org 2008/07/13 22:16:03 54 [sftp.c] 55 increase number of piplelined requests so they properly fill the 56 (recently increased) channel window. prompted by rapier AT psc.edu; 57 ok markus@ 58 - djm@cvs.openbsd.org 2008/07/14 01:55:56 59 [sftp-server.8] 60 mention requirement for /dev/log inside chroot when using sftp-server 61 with ChrootDirectory 62 - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to 63 avoid clash with sin(3) function; reported by 64 cristian.ionescu-idbohrn AT axis.com 65 - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close() 66 prototype; reported by cristian.ionescu-idbohrn AT axis.com 67 - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash; 68 reported by cristian.ionescu-idbohrn AT axis.com 69 - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config] 70 [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd] 71 Revamped and simplified Cygwin ssh-host-config script that uses 72 unified csih configuration tool. Requires recent Cygwin. 73 Patch from vinschen AT redhat.com 74 7520080712 76 - (djm) OpenBSD CVS Sync 77 - djm@cvs.openbsd.org 2008/07/12 04:52:50 78 [channels.c] 79 unbreak; move clearing of cctx struct to before first use 80 reported by dkrause@ 81 - djm@cvs.openbsd.org 2008/07/12 05:33:41 82 [scp.1] 83 better description for -i flag: 84 s/RSA authentication/public key authentication/ 85 - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h] 86 return EAI_FAMILY when trying to lookup unsupported address family; 87 from vinschen AT redhat.com 88 8920080711 90 - (djm) OpenBSD CVS Sync 91 - stevesk@cvs.openbsd.org 2008/07/07 00:31:41 92 [ttymodes.c] 93 we don't need arg after the debug3() was removed. from lint. 94 ok djm@ 95 - stevesk@cvs.openbsd.org 2008/07/07 23:32:51 96 [key.c] 97 /*NOTREACHED*/ for lint warning: 98 warning: function key_equal falls off bottom without returning value 99 ok djm@ 100 - markus@cvs.openbsd.org 2008/07/10 18:05:58 101 [channels.c] 102 missing bzero; from mickey; ok djm@ 103 - markus@cvs.openbsd.org 2008/07/10 18:08:11 104 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c] 105 sync v1 and v2 traffic accounting; add it to sshd, too; 106 ok djm@, dtucker@ 107 10820080709 109 - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass 110 - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM 111 account check failure path. The vulnerable format buffer is supplied 112 from PAM and should not contain attacker-supplied data. 113 - (djm) [auth.c] Missing unistd.h for close() 114 - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x 115 11620080705 117 - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed 118 passwords disabled. bz#1083 report & patch from senthilkumar_sen AT 119 hotpop.com, w/ dtucker@ 120 - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for 121 Tru64. readv doesn't seem to be a comparable object there. 122 bz#1386, patch from dtucker@ ok me 123 - (djm) [Makefile.in] Pass though pass to conch for interop tests 124 - (djm) [configure.ac] unbreak: remove extra closing brace 125 - (djm) OpenBSD CVS Sync 126 - djm@cvs.openbsd.org 2008/07/04 23:08:25 127 [packet.c] 128 handle EINTR in packet_write_poll()l ok dtucker@ 129 - djm@cvs.openbsd.org 2008/07/04 23:30:16 130 [auth1.c auth2.c] 131 Make protocol 1 MaxAuthTries logic match protocol 2's. 132 Do not treat the first protocol 2 authentication attempt as 133 a failure IFF it is for method "none". 134 Makes MaxAuthTries' user-visible behaviour identical for 135 protocol 1 vs 2. 136 ok dtucker@ 137 - djm@cvs.openbsd.org 2008/07/05 05:16:01 138 [PROTOCOL] 139 grammar 140 14120080704 142 - (dtucker) OpenBSD CVS Sync 143 - djm@cvs.openbsd.org 2008/07/02 13:30:34 144 [auth2.c] 145 really really remove the freebie "none" auth try for protocol 2 146 - djm@cvs.openbsd.org 2008/07/02 13:47:39 147 [ssh.1 ssh.c] 148 When forking after authentication ("ssh -f") with ExitOnForwardFailure 149 enabled, delay the fork until after replies for any -R forwards have 150 been seen. Allows for robust detection of -R forward failure when 151 using -f (similar to bz#92); ok dtucker@ 152 - otto@cvs.openbsd.org 2008/07/03 21:46:58 153 [auth2-pubkey.c] 154 avoid nasty double free; ok dtucker@ djm@ 155 - djm@cvs.openbsd.org 2008/07/04 03:44:59 156 [servconf.c groupaccess.h groupaccess.c] 157 support negation of groups in "Match group" block (bz#1315); ok dtucker@ 158 - dtucker@cvs.openbsd.org 2008/07/04 03:47:02 159 [monitor.c] 160 Make debug a little clearer. ok djm@ 161 - djm@cvs.openbsd.org 2008/06/30 08:07:34 162 [regress/key-options.sh] 163 shell portability: use "=" instead of "==" in test(1) expressions, 164 double-quote string with backslash escaped / 165 - djm@cvs.openbsd.org 2008/06/30 10:31:11 166 [regress/{putty-transfer,putty-kex,putty-ciphers}.sh] 167 remove "set -e" left over from debugging 168 - djm@cvs.openbsd.org 2008/06/30 10:43:03 169 [regress/conch-ciphers.sh] 170 explicitly disable conch options that could interfere with the test 171 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link 172 returns EXDEV. Patch from Mike Garrison, ok djm@ 173 - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h] 174 [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c] 175 [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on 176 some platforms (HP nonstop) it is a distinct errno; 177 bz#1467 reported by sconeu AT yahoo.com; ok dtucker@ 178 17920080702 180 - (dtucker) OpenBSD CVS Sync 181 - djm@cvs.openbsd.org 2008/06/30 08:05:59 182 [PROTOCOL.agent] 183 typo: s/constraint_date/constraint_data/ 184 - djm@cvs.openbsd.org 2008/06/30 12:15:39 185 [serverloop.c] 186 only pass channel requests on session channels through to the session 187 channel handler, avoiding spurious log messages; ok! markus@ 188 - djm@cvs.openbsd.org 2008/06/30 12:16:02 189 [nchan.c] 190 only send eow@openssh.com notifications for session channels; ok! markus@ 191 - djm@cvs.openbsd.org 2008/06/30 12:18:34 192 [PROTOCOL] 193 clarify that eow@openssh.com is only sent on session channels 194 - dtucker@cvs.openbsd.org 2008/07/01 07:20:52 195 [sshconnect.c] 196 Check ExitOnForwardFailure if forwardings are disabled due to a failed 197 host key check. ok djm@ 198 - dtucker@cvs.openbsd.org 2008/07/01 07:24:22 199 [sshconnect.c sshd.c] 200 Send CR LF during protocol banner exchanges, but only for Protocol 2 only, 201 in order to comply with RFC 4253. bz #1443, ok djm@ 202 - stevesk@cvs.openbsd.org 2008/07/01 23:12:47 203 [PROTOCOL.agent] 204 fix some typos; ok djm@ 205 - djm@cvs.openbsd.org 2008/07/02 02:24:18 206 [sshd_config sshd_config.5 sshd.8 servconf.c] 207 increase default size of ssh protocol 1 ephemeral key from 768 to 1024 208 bits; prodded by & ok dtucker@ ok deraadt@ 209 - dtucker@cvs.openbsd.org 2008/07/02 12:03:51 210 [auth-rsa.c auth.c auth2-pubkey.c auth.h] 211 Merge duplicate host key file checks, based in part on a patch from Rob 212 Holland via bz #1348 . Also checks for non-regular files during protocol 213 1 RSA auth. ok djm@ 214 - djm@cvs.openbsd.org 2008/07/02 12:36:39 215 [auth2-none.c auth2.c] 216 Make protocol 2 MaxAuthTries behaviour a little more sensible: 217 Check whether client has exceeded MaxAuthTries before running 218 an authentication method and skip it if they have, previously it 219 would always allow one try (for "none" auth). 220 Preincrement failure count before post-auth test - previously this 221 checked and postincremented, also to allow one "none" try. 222 Together, these two changes always count the "none" auth method 223 which could be skipped by a malicious client (e.g. an SSH worm) 224 to get an extra attempt at a real auth method. They also make 225 MaxAuthTries=0 a useful way to block users entirely (esp. in a 226 sshd_config Match block). 227 Also, move sending of any preauth banner from "none" auth method 228 to the first call to input_userauth_request(), so worms that skip 229 the "none" method get to see it too. 230 23120080630 232 - (djm) OpenBSD CVS Sync 233 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43 234 [regress/Makefile regress/key-options.sh] 235 Add regress test for key options. ok djm@ 236 - dtucker@cvs.openbsd.org 2008/06/11 23:11:40 237 [regress/Makefile] 238 Don't run cipher-speed test by default; mistakenly enabled by me 239 - djm@cvs.openbsd.org 2008/06/28 13:57:25 240 [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh] 241 very basic regress test against Twisted Conch in "make interop" 242 target (conch is available in ports/devel/py-twisted/conch); 243 ok markus@ 244 - (djm) [regress/Makefile] search for conch by path, like we do putty 245 24620080629 247 - (djm) OpenBSD CVS Sync 248 - martynas@cvs.openbsd.org 2008/06/21 07:46:46 249 [sftp.c] 250 use optopt to get invalid flag, instead of return value of getopt, 251 which is always '?'; ok djm@ 252 - otto@cvs.openbsd.org 2008/06/25 11:13:43 253 [key.c] 254 add key length to visual fingerprint; zap magical constants; 255 ok grunk@ djm@ 256 - djm@cvs.openbsd.org 2008/06/26 06:10:09 257 [sftp-client.c sftp-server.c] 258 allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky 259 bits. Note that this only affects explicit setting of modes (e.g. via 260 sftp(1)'s chmod command) and not file transfers. (bz#1310) 261 ok deraadt@ at c2k8 262 - djm@cvs.openbsd.org 2008/06/26 09:19:40 263 [dh.c dh.h moduli.c] 264 when loading moduli from /etc/moduli in sshd(8), check that they 265 are of the expected "safe prime" structure and have had 266 appropriate primality tests performed; 267 feedback and ok dtucker@ 268 - grunk@cvs.openbsd.org 2008/06/26 11:46:31 269 [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c] 270 Move SSH Fingerprint Visualization away from sharing the config option 271 CheckHostIP to an own config option named VisualHostKey. 272 While there, fix the behaviour that ssh would draw a random art picture 273 on every newly seen host even when the option was not enabled. 274 prodded by deraadt@, discussions, 275 help and ok markus@ djm@ dtucker@ 276 - jmc@cvs.openbsd.org 2008/06/26 21:11:46 277 [ssh.1] 278 add VisualHostKey to the list of options listed in -o; 279 - djm@cvs.openbsd.org 2008/06/28 07:25:07 280 [PROTOCOL] 281 spelling fixes 282 - djm@cvs.openbsd.org 2008/06/28 13:58:23 283 [ssh-agent.c] 284 refuse to add a key that has unknown constraints specified; 285 ok markus 286 - djm@cvs.openbsd.org 2008/06/28 14:05:15 287 [ssh-agent.c] 288 reset global compat flag after processing a protocol 2 signature 289 request with the legacy DSA encoding flag set; ok markus 290 - djm@cvs.openbsd.org 2008/06/28 14:08:30 291 [PROTOCOL PROTOCOL.agent] 292 document the protocol used by ssh-agent; "looks ok" markus@ 293 29420080628 295 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec] 296 RFC.nroff lacks a license, remove it (it is long gone in OpenBSD). 297 29820080626 299 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD. 300 (bz#1372) 301 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 302 [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files. 303 30420080616 305 - (dtucker) OpenBSD CVS Sync 306 - dtucker@cvs.openbsd.org 2008/06/16 13:22:53 307 [session.c channels.c] 308 Rename the isatty argument to is_tty so we don't shadow 309 isatty(3). ok markus@ 310 - (dtucker) [channels.c] isatty -> is_tty here too. 311 31220080615 313 - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc. 314 - OpenBSD CVS Sync 315 - dtucker@cvs.openbsd.org 2008/06/14 15:49:48 316 [sshd.c] 317 wrap long line at 80 chars 318 - dtucker@cvs.openbsd.org 2008/06/14 17:07:11 319 [sshd.c] 320 ensure default umask disallows at least group and world write; ok djm@ 321 - djm@cvs.openbsd.org 2008/06/14 18:33:43 322 [session.c] 323 suppress the warning message from chdir(homedir) failures 324 when chrooted (bz#1461); ok dtucker 325 - dtucker@cvs.openbsd.org 2008/06/14 19:42:10 326 [scp.1] 327 Mention that scp follows symlinks during -r. bz #1466, 328 from nectar at apple 329 - dtucker@cvs.openbsd.org 2008/06/15 16:55:38 330 [sshd_config.5] 331 MaxSessions is allowed in a Match block too 332 - dtucker@cvs.openbsd.org 2008/06/15 16:58:40 333 [servconf.c sshd_config.5] 334 Allow MaxAuthTries within a Match block. ok djm@ 335 - djm@cvs.openbsd.org 2008/06/15 20:06:26 336 [channels.c channels.h session.c] 337 don't call isatty() on a pty master, instead pass a flag down to 338 channel_set_fds() indicating that te fds refer to a tty. Fixes a 339 hang on exit on Solaris (bz#1463) in portable but is actually 340 a generic bug; ok dtucker deraadt markus 341 34220080614 343 - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction 344 replacement code; patch from ighighi AT gmail.com in bz#1240; 345 ok dtucker 346 34720080613 348 - (dtucker) OpenBSD CVS Sync 349 - deraadt@cvs.openbsd.org 2008/06/13 09:44:36 350 [packet.c] 351 compile on older gcc; no decl after code 352 - dtucker@cvs.openbsd.org 2008/06/13 13:56:59 353 [monitor.c] 354 Clear key options in the monitor on failed authentication, prevents 355 applying additional restrictions to non-pubkey authentications in 356 the case where pubkey fails but another method subsequently succeeds. 357 bz #1472, found by Colin Watson, ok markus@ djm@ 358 - dtucker@cvs.openbsd.org 2008/06/13 14:18:51 359 [auth2-pubkey.c auth-rhosts.c] 360 Include unistd.h for close(), prevents warnings in -portable 361 - dtucker@cvs.openbsd.org 2008/06/13 17:21:20 362 [mux.c] 363 Friendlier error messages for mux fallback. ok djm@ 364 - dtucker@cvs.openbsd.org 2008/06/13 18:55:22 365 [scp.c] 366 Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@ 367 - grunk@cvs.openbsd.org 2008/06/13 20:13:26 368 [ssh.1] 369 Explain the use of SSH fpr visualization using random art, and cite the 370 original scientific paper inspiring that technique. 371 Much help with English and nroff by jmc@, thanks. 372 - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which 373 despite its name doesn't seem to implement all of GSSAPI. Patch from 374 Jan Engelhardt, sanity checked by Simon Wilkinson. 375 37620080612 377 - (dtucker) OpenBSD CVS Sync 378 - jmc@cvs.openbsd.org 2008/06/11 07:30:37 379 [sshd.8] 380 kill trailing whitespace; 381 - grunk@cvs.openbsd.org 2008/06/11 21:01:35 382 [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c 383 sshconnect.c] 384 Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the 385 graphical hash visualization schemes known as "random art", and by 386 Dan Kaminsky's musings on the subject during a BlackOp talk at the 387 23C3 in Berlin. 388 Scientific publication (original paper): 389 "Hash Visualization: a New Technique to improve Real-World Security", 390 Perrig A. and Song D., 1999, International Workshop on Cryptographic 391 Techniques and E-Commerce (CrypTEC '99) 392 http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf 393 The algorithm used here is a worm crawling over a discrete plane, 394 leaving a trace (augmenting the field) everywhere it goes. 395 Movement is taken from dgst_raw 2bit-wise. Bumping into walls 396 makes the respective movement vector be ignored for this turn, 397 thus switching to the other color of the chessboard. 398 Graphs are not unambiguous for now, because circles in graphs can be 399 walked in either direction. 400 discussions with several people, 401 help, corrections and ok markus@ djm@ 402 - grunk@cvs.openbsd.org 2008/06/11 21:38:25 403 [ssh-keygen.c] 404 ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub 405 would not display you the random art as intended, spotted by canacar@ 406 - grunk@cvs.openbsd.org 2008/06/11 22:20:46 407 [ssh-keygen.c ssh-keygen.1] 408 ssh-keygen would write fingerprints to STDOUT, and random art to STDERR, 409 that is not how it was envisioned. 410 Also correct manpage saying that -v is needed along with -l for it to work. 411 spotted by naddy@ 412 - otto@cvs.openbsd.org 2008/06/11 23:02:22 413 [key.c] 414 simpler way of computing the augmentations; ok grunk@ 415 - grunk@cvs.openbsd.org 2008/06/11 23:03:56 416 [ssh_config.5] 417 CheckHostIP set to ``fingerprint'' will display both hex and random art 418 spotted by naddy@ 419 - grunk@cvs.openbsd.org 2008/06/11 23:51:57 420 [key.c] 421 #define statements that are not atoms need braces around them, else they 422 will cause trouble in some cases. 423 Also do a computation of -1 once, and not in a loop several times. 424 spotted by otto@ 425 - dtucker@cvs.openbsd.org 2008/06/12 00:03:49 426 [dns.c canohost.c sshconnect.c] 427 Do not pass "0" strings as ports to getaddrinfo because the lookups 428 can slow things down and we never use the service info anyway. bz 429 #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok 430 deraadt@ djm@ 431 djm belives that the reason for the "0" strings is to ensure that 432 it's not possible to call getaddrinfo with both host and port being 433 NULL. In the case of canohost.c host is a local array. In the 434 case of sshconnect.c, it's checked for null immediately before use. 435 In dns.c it ultimately comes from ssh.c:main() and is guaranteed to 436 be non-null but it's not obvious, so I added a warning message in 437 case it is ever passed a null. 438 - grunk@cvs.openbsd.org 2008/06/12 00:13:55 439 [sshconnect.c] 440 Make ssh print the random art also when ssh'ing to a host using IP only. 441 spotted by naddy@, ok and help djm@ dtucker@ 442 - otto@cvs.openbsd.org 2008/06/12 00:13:13 443 [key.c] 444 use an odd number of rows and columns and a separate start marker, looks 445 better; ok grunk@ 446 - djm@cvs.openbsd.org 2008/06/12 03:40:52 447 [clientloop.h mux.c channels.c clientloop.c channels.h] 448 Enable ~ escapes for multiplex slave sessions; give each channel 449 its own escape state and hook the escape filters up to muxed 450 channels. bz #1331 451 Mux slaves do not currently support the ~^Z and ~& escapes. 452 NB. this change cranks the mux protocol version, so a new ssh 453 mux client will not be able to connect to a running old ssh 454 mux master. 455 ok dtucker@ 456 - djm@cvs.openbsd.org 2008/06/12 04:06:00 457 [clientloop.h ssh.c clientloop.c] 458 maintain an ordered queue of outstanding global requests that we 459 expect replies to, similar to the per-channel confirmation queue. 460 Use this queue to verify success or failure for remote forward 461 establishment in a race free way. 462 ok dtucker@ 463 - djm@cvs.openbsd.org 2008/06/12 04:17:47 464 [clientloop.c] 465 thall shalt not code past the eightieth column 466 - djm@cvs.openbsd.org 2008/06/12 04:24:06 467 [ssh.c] 468 thal shalt not code past the eightieth column 469 - djm@cvs.openbsd.org 2008/06/12 05:15:41 470 [PROTOCOL] 471 document tun@openssh.com forwarding method 472 - djm@cvs.openbsd.org 2008/06/12 05:32:30 473 [mux.c] 474 some more TODO for me 475 - grunk@cvs.openbsd.org 2008/06/12 05:42:46 476 [key.c] 477 supply the key type (rsa1, rsa, dsa) as a caption in the frame of the 478 random art. while there, stress the fact that the field base should at 479 least be 8 characters for the pictures to make sense. 480 comment and ok djm@ 481 - grunk@cvs.openbsd.org 2008/06/12 06:32:59 482 [key.c] 483 We already mark the start of the worm, now also mark the end of the worm 484 in our random art drawings. 485 ok djm@ 486 - djm@cvs.openbsd.org 2008/06/12 15:19:17 487 [clientloop.h channels.h clientloop.c channels.c mux.c] 488 The multiplexing escape char handler commit last night introduced a 489 small memory leak per session; plug it. 490 - dtucker@cvs.openbsd.org 2008/06/12 16:35:31 491 [ssh_config.5 ssh.c] 492 keyword expansion for localcommand. ok djm@ 493 - jmc@cvs.openbsd.org 2008/06/12 19:10:09 494 [ssh_config.5 ssh-keygen.1] 495 tweak the ascii art text; ok grunk 496 - dtucker@cvs.openbsd.org 2008/06/12 20:38:28 497 [sshd.c sshconnect.c packet.h misc.c misc.h packet.c] 498 Make keepalive timeouts apply while waiting for a packet, particularly 499 during key renegotiation (bz #1363). With djm and Matt Day, ok djm@ 500 - djm@cvs.openbsd.org 2008/06/12 20:47:04 501 [sftp-client.c] 502 print extension revisions for extensions that we understand 503 - djm@cvs.openbsd.org 2008/06/12 21:06:25 504 [clientloop.c] 505 I was coalescing expected global request confirmation replies at 506 the wrong end of the queue - fix; prompted by markus@ 507 - grunk@cvs.openbsd.org 2008/06/12 21:14:46 508 [ssh-keygen.c] 509 make ssh-keygen -lf show the key type just as ssh-add -l would do it 510 ok djm@ markus@ 511 - grunk@cvs.openbsd.org 2008/06/12 22:03:36 512 [key.c] 513 add my copyright, ok djm@ 514 - ian@cvs.openbsd.org 2008/06/12 23:24:58 515 [sshconnect.c] 516 tweak wording in message, ok deraadt@ jmc@ 517 - dtucker@cvs.openbsd.org 2008/06/13 00:12:02 518 [sftp.h log.h] 519 replace __dead with __attribute__((noreturn)), makes things 520 a little easier to port. Also, add it to sigdie(). ok djm@ 521 - djm@cvs.openbsd.org 2008/06/13 00:16:49 522 [mux.c] 523 fall back to creating a new TCP connection on most multiplexing errors 524 (socket connect fail, invalid version, refused permittion, corrupted 525 messages, etc.); bz #1329 ok dtucker@ 526 - dtucker@cvs.openbsd.org 2008/06/13 00:47:53 527 [mux.c] 528 upcast size_t to u_long to match format arg; ok djm@ 529 - dtucker@cvs.openbsd.org 2008/06/13 00:51:47 530 [mac.c] 531 upcast another size_t to u_long to match format 532 - dtucker@cvs.openbsd.org 2008/06/13 01:38:23 533 [misc.c] 534 upcast uid to long with matching %ld, prevents warnings in portable 535 - djm@cvs.openbsd.org 2008/06/13 04:40:22 536 [auth2-pubkey.c auth-rhosts.c] 537 refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not 538 regular files; report from Solar Designer via Colin Watson in bz#1471 539 ok dtucker@ deraadt 540 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now 541 takes 2 more args. with djm@ 542 - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch 543 from Todd Vierling. 544 - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA 545 systems. Patch from R. Scott Bailey. 546 - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used 547 on big endian machines, so ifdef them for little-endian only to prevent 548 unused function warnings on big-endians. 549 - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent 550 compiler warnings on some platforms. Based on a discussion with otto@ 551 55220080611 553 - (djm) [channels.c configure.ac] 554 Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no) 555 bz#1464; ok dtucker 556 55720080610 558 - (dtucker) OpenBSD CVS Sync 559 - djm@cvs.openbsd.org 2008/06/10 03:57:27 560 [servconf.c match.h sshd_config.5] 561 support CIDR address matching in sshd_config "Match address" blocks, with 562 full support for negation and fall-back to classic wildcard matching. 563 For example: 564 Match address 192.0.2.0/24,3ffe:ffff::/32,!10.* 565 PasswordAuthentication yes 566 addrmatch.c code mostly lifted from flowd's addr.c 567 feedback and ok dtucker@ 568 - djm@cvs.openbsd.org 2008/06/10 04:17:46 569 [sshd_config.5] 570 better reference for pattern-list 571 - dtucker@cvs.openbsd.org 2008/06/10 04:50:25 572 [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8] 573 Add extended test mode (-T) and connection parameters for test mode (-C). 574 -T causes sshd to write its effective configuration to stdout and exit. 575 -C causes any relevant Match rules to be applied before output. The 576 combination allows tesing of the parser and config files. ok deraadt djm 577 - jmc@cvs.openbsd.org 2008/06/10 07:12:00 578 [sshd_config.5] 579 tweak previous; 580 - jmc@cvs.openbsd.org 2008/06/10 08:17:40 581 [sshd.8 sshd.c] 582 - update usage() 583 - fix SYNOPSIS, and sort options 584 - some minor additional fixes 585 - dtucker@cvs.openbsd.org 2008/06/09 18:06:32 586 [regress/test-exec.sh] 587 Don't generate putty keys if we're not going to use them. ok djm 588 - dtucker@cvs.openbsd.org 2008/06/10 05:23:32 589 [regress/addrmatch.sh regress/Makefile] 590 Regress test for Match CIDR rules. ok djm@ 591 - dtucker@cvs.openbsd.org 2008/06/10 15:21:41 592 [test-exec.sh] 593 Use a more portable construct for checking if we're running a putty test 594 - dtucker@cvs.openbsd.org 2008/06/10 15:28:49 595 [test-exec.sh] 596 Add quotes 597 - dtucker@cvs.openbsd.org 2008/06/10 18:21:24 598 [ssh_config.5] 599 clarify that Host patterns are space-separated. ok deraadt 600 - djm@cvs.openbsd.org 2008/06/10 22:15:23 601 [PROTOCOL ssh.c serverloop.c] 602 Add a no-more-sessions@openssh.com global request extension that the 603 client sends when it knows that it will never request another session 604 (i.e. when session multiplexing is disabled). This allows a server to 605 disallow further session requests and terminate the session. 606 Why would a non-multiplexing client ever issue additional session 607 requests? It could have been attacked with something like SSH'jack: 608 http://www.storm.net.nz/projects/7 609 feedback & ok markus 610 - djm@cvs.openbsd.org 2008/06/10 23:06:19 611 [auth-options.c match.c servconf.c addrmatch.c sshd.8] 612 support CIDR address matching in .ssh/authorized_keys from="..." stanzas 613 ok and extensive testing dtucker@ 614 - dtucker@cvs.openbsd.org 2008/06/10 23:21:34 615 [bufaux.c] 616 Use '\0' for a nul byte rather than unadorned 0. ok djm@ 617 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43 618 [Makefile regress/key-options.sh] 619 Add regress test for key options. ok djm@ 620 - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6 621 since the new CIDR code in addmatch.c references it. 622 - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6 623 specific tests on platforms that don't do IPv6. 624 - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well 625 as environment. 626 - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now. 627 62820080609 629 - (dtucker) OpenBSD CVS Sync 630 - dtucker@cvs.openbsd.org 2008/06/08 17:04:41 631 [sftp-server.c] 632 Add case for ENOSYS in errno_to_portable; ok deraadt 633 - dtucker@cvs.openbsd.org 2008/06/08 20:15:29 634 [sftp.c sftp-client.c sftp-client.h] 635 Have the sftp client store the statvfs replies in wire format, 636 which prevents problems when the server's native sizes exceed the 637 client's. 638 Also extends the sizes of the remaining 32bit wire format to 64bit, 639 they're specified as unsigned long in the standard. 640 - dtucker@cvs.openbsd.org 2008/06/09 13:02:39 641 [sftp-server.c] 642 Extend 32bit -> 64bit values for statvfs extension missed in previous 643 commit. 644 - dtucker@cvs.openbsd.org 2008/06/09 13:38:46 645 [PROTOCOL] 646 Use a $OpenBSD tag so our scripts will sync changes. 647 64820080608 649 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c 650 openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h 651 openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and 652 fstatvfs and remove #defines around statvfs code. ok djm@ 653 - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a 654 macro to convert fsid to unsigned long for platforms where fsid is a 655 2-member array. 656 65720080607 658 - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H. 659 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c] 660 Do not enable statvfs extensions on platforms that do not have statvfs. 661 - (dtucker) OpenBSD CVS Sync 662 - djm@cvs.openbsd.org 2008/05/19 06:14:02 663 [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@ 664 - djm@cvs.openbsd.org 2008/05/19 15:45:07 665 [sshtty.c ttymodes.c sshpty.h] 666 Fix sending tty modes when stdin is not a tty (bz#1199). Previously 667 we would send the modes corresponding to a zeroed struct termios, 668 whereas we should have been sending an empty list of modes. 669 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@ 670 - djm@cvs.openbsd.org 2008/05/19 15:46:31 671 [ssh-keygen.c] 672 support -l (print fingerprint) in combination with -F (find host) to 673 search for a host in ~/.ssh/known_hosts and display its fingerprint; 674 ok markus@ 675 - djm@cvs.openbsd.org 2008/05/19 20:53:52 676 [clientloop.c] 677 unbreak tree by committing this bit that I missed from: 678 Fix sending tty modes when stdin is not a tty (bz#1199). Previously 679 we would send the modes corresponding to a zeroed struct termios, 680 whereas we should have been sending an empty list of modes. 681 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@ 682 68320080604 684 - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias 685 in arc4random_uniform with upper_bound in (2^30,2*31). Note that 686 OpenSSH did not make requests with upper bounds in this range. 687 68820080519 689 - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in] 690 [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h] 691 Fix compilation on Linux, including pulling in fmt_scaled(3) 692 implementation from OpenBSD's libutil. 693 69420080518 695 - (djm) OpenBSD CVS Sync 696 - djm@cvs.openbsd.org 2008/04/04 05:14:38 697 [sshd_config.5] 698 ChrootDirectory is supported in Match blocks (in fact, it is most useful 699 there). Spotted by Minstrel AT minstrel.org.uk 700 - djm@cvs.openbsd.org 2008/04/04 06:44:26 701 [sshd_config.5] 702 oops, some unrelated stuff crept into that commit - backout. 703 spotted by jmc@ 704 - djm@cvs.openbsd.org 2008/04/05 02:46:02 705 [sshd_config.5] 706 HostbasedAuthentication is supported under Match too 707 - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c] 708 [configure.ac] Implement arc4random_buf(), import implementation of 709 arc4random_uniform() from OpenBSD 710 - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes 711 - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h 712 - (djm) OpenBSD CVS Sync 713 - djm@cvs.openbsd.org 2008/04/13 00:22:17 714 [dh.c sshd.c] 715 Use arc4random_buf() when requesting more than a single word of output 716 Use arc4random_uniform() when the desired random number upper bound 717 is not a power of two 718 ok deraadt@ millert@ 719 - djm@cvs.openbsd.org 2008/04/18 12:32:11 720 [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h] 721 introduce sftp extension methods statvfs@openssh.com and 722 fstatvfs@openssh.com that implement statvfs(2)-like operations, 723 based on a patch from miklos AT szeredi.hu (bz#1399) 724 also add a "df" command to the sftp client that uses the 725 statvfs@openssh.com to produce a df(1)-like display of filesystem 726 space and inode utilisation 727 ok markus@ 728 - jmc@cvs.openbsd.org 2008/04/18 17:15:47 729 [sftp.1] 730 macro fixage; 731 - djm@cvs.openbsd.org 2008/04/18 22:01:33 732 [session.c] 733 remove unneccessary parentheses 734 - otto@cvs.openbsd.org 2008/04/29 11:20:31 735 [monitor_mm.h] 736 garbage collect two unused fields in struct mm_master; ok markus@ 737 - djm@cvs.openbsd.org 2008/04/30 10:14:03 738 [ssh-keyscan.1 ssh-keyscan.c] 739 default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by 740 larsnooden AT openoffice.org 741 - pyr@cvs.openbsd.org 2008/05/07 05:49:37 742 [servconf.c servconf.h session.c sshd_config.5] 743 Enable the AllowAgentForwarding option in sshd_config (global and match 744 context), to specify if agents should be permitted on the server. 745 As the man page states: 746 ``Note that disabling Agent forwarding does not improve security 747 unless users are also denied shell access, as they can always install 748 their own forwarders.'' 749 ok djm@, ok and a mild frown markus@ 750 - pyr@cvs.openbsd.org 2008/05/07 06:43:35 751 [sshd_config] 752 push the sshd_config bits in, spotted by ajacoutot@ 753 - jmc@cvs.openbsd.org 2008/05/07 08:00:14 754 [sshd_config.5] 755 sort; 756 - markus@cvs.openbsd.org 2008/05/08 06:59:01 757 [bufaux.c buffer.h channels.c packet.c packet.h] 758 avoid extra malloc/copy/free when receiving data over the net; 759 ~10% speedup for localhost-scp; ok djm@ 760 - djm@cvs.openbsd.org 2008/05/08 12:02:23 761 [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c] 762 [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c] 763 [ssh.c sshd.c] 764 Implement a channel success/failure status confirmation callback 765 mechanism. Each channel maintains a queue of callbacks, which will 766 be drained in order (RFC4253 guarantees confirm messages are not 767 reordered within an channel). 768 Also includes a abandonment callback to clean up if a channel is 769 closed without sending confirmation messages. This probably 770 shouldn't happen in compliant implementations, but it could be 771 abused to leak memory. 772 ok markus@ (as part of a larger diff) 773 - djm@cvs.openbsd.org 2008/05/08 12:21:16 774 [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c] 775 [sshd_config sshd_config.5] 776 Make the maximum number of sessions run-time controllable via 777 a sshd_config MaxSessions knob. This is useful for disabling 778 login/shell/subsystem access while leaving port-forwarding working 779 (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or 780 simply increasing the number of allows multiplexed sessions. 781 Because some bozos are sure to configure MaxSessions in excess of the 782 number of available file descriptors in sshd (which, at peak, might be 783 as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds 784 on error paths, and make it fail gracefully on out-of-fd conditions - 785 sending channel errors instead of than exiting with fatal(). 786 bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com 787 ok markus@ 788 - djm@cvs.openbsd.org 2008/05/08 13:06:11 789 [clientloop.c clientloop.h ssh.c] 790 Use new channel status confirmation callback system to properly deal 791 with "important" channel requests that fail, in particular command exec, 792 shell and subsystem requests. Previously we would optimistically assume 793 that the requests would always succeed, which could cause hangs if they 794 did not (e.g. when the server runs out of fds) or were unimplemented by 795 the server (bz #1384) 796 Also, properly report failing multiplex channel requests via the mux 797 client stderr (subject to LogLevel in the mux master) - better than 798 silently failing. 799 most bits ok markus@ (as part of a larger diff) 800 - djm@cvs.openbsd.org 2008/05/09 04:55:56 801 [channels.c channels.h clientloop.c serverloop.c] 802 Try additional addresses when connecting to a port forward destination 803 whose DNS name resolves to more than one address. The previous behaviour 804 was to try the first address and give up. 805 Reported by stig AT venaas.com in bz#343 806 great feedback and ok markus@ 807 - djm@cvs.openbsd.org 2008/05/09 14:18:44 808 [clientloop.c clientloop.h ssh.c mux.c] 809 tidy up session multiplexing code, moving it into its own file and 810 making the function names more consistent - making ssh.c and 811 clientloop.c a fair bit more readable. 812 ok markus@ 813 - djm@cvs.openbsd.org 2008/05/09 14:26:08 814 [ssh.c] 815 dingo stole my diff hunk 816 - markus@cvs.openbsd.org 2008/05/09 16:16:06 817 [session.c] 818 re-add the USE_PIPES code and enable it. 819 without pipes shutdown-read from the sshd does not trigger 820 a SIGPIPE when the forked program does a write. 821 ok djm@ 822 (Id sync only, USE_PIPES never left portable OpenSSH) 823 - markus@cvs.openbsd.org 2008/05/09 16:17:51 824 [channels.c] 825 error-fd race: don't enable the error fd in the select bitmask 826 for channels with both in- and output closed, since the channel 827 will go away before we call select(); 828 report, lots of debugging help and ok djm@ 829 - markus@cvs.openbsd.org 2008/05/09 16:21:13 830 [channels.h clientloop.c nchan.c serverloop.c] 831 unbreak 832 ssh -2 localhost od /bin/ls | true 833 ignoring SIGPIPE by adding a new channel message (EOW) that signals 834 the peer that we're not interested in any data it might send. 835 fixes bz #85; discussion, debugging and ok djm@ 836 - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20 837 [umac.c] 838 Ensure nh_result lies on a 64-bit boundary (fixes warnings observed 839 on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@ 840 - djm@cvs.openbsd.org 2008/05/15 23:52:24 841 [nchan2.ms] 842 document eow message in ssh protocol 2 channel state machine; 843 feedback and ok markus@ 844 - djm@cvs.openbsd.org 2008/05/18 21:29:05 845 [sftp-server.c] 846 comment extension announcement 847 - djm@cvs.openbsd.org 2008/05/16 08:30:42 848 [PROTOCOL] 849 document our protocol extensions and deviations; ok markus@ 850 - djm@cvs.openbsd.org 2008/05/17 01:31:56 851 [PROTOCOL] 852 grammar and correctness fixes from stevesk@ 853 85420080403 855 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile- 856 time warnings on LynxOS. Patch from ops AT iki.fi 857 - (djm) Force string arguments to replacement setproctitle() though 858 strnvis first. Ok dtucker@ 859 86020080403 861 - (djm) OpenBSD CVS sync: 862 - markus@cvs.openbsd.org 2008/04/02 15:36:51 863 [channels.c] 864 avoid possible hijacking of x11-forwarded connections (back out 1.183) 865 CVE-2008-1483; ok djm@ 866 - jmc@cvs.openbsd.org 2008/03/27 22:37:57 867 [sshd.8] 868 remove trailing whitespace; 869 - djm@cvs.openbsd.org 2008/04/03 09:50:14 870 [version.h] 871 openssh-5.0 872 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 873 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files 874 - (djm) [README] Update link to release notes 875 - (djm) Release 5.0p1 876 87720080315 878 - (djm) [regress/test-exec.sh] Quote putty-related variables in case they are 879 empty; report and patch from Peter Stuge 880 - (djm) [regress/test-exec.sh] Silence noise from detection of putty 881 commands; report from Peter Stuge 882 - (djm) [session.c] Relocate incorrectly-placed closefrom() that was causing 883 crashes when used with ChrootDirectory 884 885 88620080327 887 - (dtucker) Cache selinux status earlier so we know if it's enabled after a 888 chroot. Allows ChrootDirectory to work with selinux support compiled in 889 but not enabled. Using it with selinux enabled will require some selinux 890 support inside the chroot. "looks sane" djm@ 891 - (djm) Fix RCS ident in sftp-server-main.c 892 - (djm) OpenBSD CVS sync: 893 - jmc@cvs.openbsd.org 2008/02/11 07:58:28 894 [ssh.1 sshd.8 sshd_config.5] 895 bump Mdocdate for pages committed in "febuary", necessary because 896 of a typo in rcs.c; 897 - deraadt@cvs.openbsd.org 2008/03/13 01:49:53 898 [monitor_fdpass.c] 899 Correct CMSG_SPACE and CMSG_LEN usage everywhere in the tree. Due to 900 an extensive discussion with otto, kettenis, millert, and hshoexer 901 - deraadt@cvs.openbsd.org 2008/03/15 16:19:02 902 [monitor_fdpass.c] 903 Repair the simple cases for msg_controllen where it should just be 904 CMSG_SIZE(sizeof(int)), not sizeof(buffer) which may be larger because 905 of alignment; ok kettenis hshoexer 906 - djm@cvs.openbsd.org 2008/03/23 12:54:01 907 [sftp-client.c] 908 prefer POSIX-style file renaming over filexfer rename behaviour if the 909 server supports the posix-rename@openssh.com extension. 910 Note that the old (filexfer) behaviour would refuse to clobber an 911 existing file. Users who depended on this should adjust their sftp(1) 912 usage. 913 ok deraadt@ markus@ 914 - deraadt@cvs.openbsd.org 2008/03/24 16:11:07 915 [monitor_fdpass.c] 916 msg_controllen has to be CMSG_SPACE so that the kernel can account for 917 each cmsg_len (ie. msg_controllen = sum of CMSG_ALIGN(cmsg_len). This 918 works now that kernel fd passing has been fixed to accept a bit of 919 sloppiness because of this ABI repair. 920 lots of discussion with kettenis 921 - djm@cvs.openbsd.org 2008/03/25 11:58:02 922 [session.c sshd_config.5] 923 ignore ~/.ssh/rc if a sshd_config ForceCommand is specified; 924 from dtucker@ ok deraadt@ djm@ 925 - djm@cvs.openbsd.org 2008/03/25 23:01:41 926 [session.c] 927 last patch had backwards test; spotted by termim AT gmail.com 928 - djm@cvs.openbsd.org 2008/03/26 21:28:14 929 [auth-options.c auth-options.h session.c sshd.8] 930 add no-user-rc authorized_keys option to disable execution of ~/.ssh/rc 931 - djm@cvs.openbsd.org 2008/03/27 00:16:49 932 [version.h] 933 openssh-4.9 934 - djm@cvs.openbsd.org 2008/03/24 21:46:54 935 [regress/sftp-badcmds.sh] 936 disable no-replace rename test now that we prefer a POSIX rename; spotted 937 by dkrause@ 938 - (djm) [configure.ac] fix alignment of --without-stackprotect description 939 - (djm) [configure.ac] --with-selinux too 940 - (djm) [regress/Makefile] cleanup PuTTY interop test droppings 941 - (djm) [README] Update link to release notes 942 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 943 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files 944 - (djm) Release 4.9p1 945 94620080315 947 - (djm) [regress/test-exec.sh] Quote putty-related variables in case they are 948 empty; report and patch from Peter Stuge 949 - (djm) [regress/test-exec.sh] Silence noise from detection of putty 950 commands; report from Peter Stuge 951 - (djm) [session.c] Relocate incorrectly-placed closefrom() that was causing 952 crashes when used with ChrootDirectory 953 95420080314 955 - (tim) [regress/sftp-cmds.sh] s/cd/lcd/ in lls test. Reported by 956 vinschen at redhat.com. Add () to put echo commands in subshell for lls test 957 I mistakenly left out of last commit. 958 - (tim) [regress/localcommand.sh] Shell portability fix. Reported by imorgan at 959 nas.nasa.gov 960 96120080313 962 - (djm) [Makefile.in regress/Makefile] Fix interop-tests target (note to 963 self: make changes to Makefile.in next time, not the generated Makefile). 964 - (djm) [Makefile.in regress/test-exec.sh] Find installed plink(1) and 965 puttygen(1) by $PATH 966 - (tim) [scp.c] Use poll.h if available, fall back to sys/poll.h if not. Patch 967 by vinschen at redhat.com. 968 - (tim) [regress/sftp-cmds.sh regress/ssh2putty.sh] Shell portability fixes 969 from vinschen at redhat.com and imorgan at nas.nasa.gov 970 97120080312 972 - (djm) OpenBSD CVS Sync 973 - dtucker@cvs.openbsd.org 2007/10/29 06:57:13 974 [regress/Makefile regress/localcommand.sh] 975 Add simple regress test for LocalCommand; ok djm@ 976 - jmc@cvs.openbsd.org 2007/11/25 15:35:09 977 [regress/agent-getpeereid.sh regress/agent.sh] 978 more existant -> existent, from Martynas Venckus; 979 pfctl changes: ok henning 980 ssh changes: ok deraadt 981 - djm@cvs.openbsd.org 2007/12/12 05:04:03 982 [regress/sftp-cmds.sh] 983 unbreak lls command and add a regress test that would have caught the 984 breakage; spotted by mouring@ 985 NB. sftp code change already committed. 986 - djm@cvs.openbsd.org 2007/12/21 04:13:53 987 [regress/Makefile regress/test-exec.sh regress/putty-ciphers.sh] 988 [regress/putty-kex.sh regress/putty-transfer.sh regress/ssh2putty.sh] 989 basic (crypto, kex and transfer) interop regression tests against putty 990 To run these, install putty and run "make interop-tests" from the build 991 directory - the tests aren't run by default yet. 992 99320080311 994 - (dtucker) [auth-pam.c monitor.c session.c sshd.c] Bug #926: Move 995 pam_open_session and pam_close_session into the privsep monitor, which 996 will ensure that pam_session_close is called as root. Patch from Tomas 997 Mraz. 998 99920080309 1000 - (dtucker) [configure.ac] It turns out gcc's -fstack-protector-all doesn't 1001 always work for all platforms and versions, so test what we can and 1002 add a configure flag to turn it of if needed. ok djm@ 1003 - (dtucker) [openbsd-compat/port-aix.{c,h}] Remove AIX specific initgroups 1004 implementation. It's not needed to fix bug #1081 and breaks the build 1005 on some AIX configurations. 1006 - (dtucker) [openbsd-compat/regress/strtonumtest.c] Bug #1347: Use platform's 1007 equivalent of LLONG_MAX for the compat regression tests, which makes them 1008 run on AIX and HP-UX. Patch from David Leonard. 1009 - (dtucker) [configure.ac] Run stack-protector tests with -Werror to catch 1010 platforms where gcc understands the option but it's not supported (and 1011 thus generates a warning). 1012 101320080307 1014 - (djm) OpenBSD CVS Sync 1015 - jmc@cvs.openbsd.org 2008/02/11 07:58:28 1016 [ssh.1 sshd.8 sshd_config.5] 1017 bump Mdocdate for pages committed in "febuary", necessary because 1018 of a typo in rcs.c; 1019 - djm@cvs.openbsd.org 2008/02/13 22:38:17 1020 [servconf.h session.c sshd.c] 1021 rekey arc4random and OpenSSL RNG in postauth child 1022 closefrom fds > 2 before shell/command execution 1023 ok markus@ 1024 - mbalmer@cvs.openbsd.org 2008/02/14 13:10:31 1025 [sshd.c] 1026 When started in configuration test mode (-t) do not check that sshd is 1027 being started with an absolute path. 1028 ok djm 1029 - markus@cvs.openbsd.org 2008/02/20 15:25:26 1030 [session.c] 1031 correct boolean encoding for coredump; der Mouse via dugsong 1032 - djm@cvs.openbsd.org 2008/02/22 05:58:56 1033 [session.c] 1034 closefrom() call was too early, delay it until just before we execute 1035 the user's rc files (if any). 1036 - dtucker@cvs.openbsd.org 2008/02/22 20:44:02 1037 [clientloop.c packet.c packet.h serverloop.c] 1038 Allow all SSH2 packet types, including UNIMPLEMENTED to reset the 1039 keepalive timer (bz #1307). ok markus@ 1040 - djm@cvs.openbsd.org 2008/02/27 20:21:15 1041 [sftp-server.c] 1042 add an extension method "posix-rename@openssh.com" to perform POSIX atomic 1043 rename() operations. based on patch from miklos AT szeredi.hu in bz#1400; 1044 ok dtucker@ markus@ 1045 - deraadt@cvs.openbsd.org 2008/03/02 18:19:35 1046 [monitor_fdpass.c] 1047 use a union to ensure alignment of the cmsg (pay attention: various other 1048 parts of the tree need this treatment too); ok djm 1049 - deraadt@cvs.openbsd.org 2008/03/04 21:15:42 1050 [version.h] 1051 crank version; from djm 1052 - (tim) [regress/sftp-glob.sh] Shell portability fix. 1053 105420080302 1055 - (dtucker) [configure.ac] FreeBSD's glob() doesn't behave the way we expect 1056 either, so use our own. 1057 105820080229 1059 - (dtucker) [openbsd-compat/bsd-poll.c] We don't check for select(2) in 1060 configure (and there's not much point, as openssh won't work without it) 1061 so HAVE_SELECT is not defined and the poll(2) compat code doesn't get 1062 built in. Remove HAVE_SELECT so we can build on platforms without poll. 1063 - (dtucker) [scp.c] Include sys/poll.h inside HAVE_SYS_POLL_H. 1064 - (djm) [contrib/gnome-ssh-askpass2.h] Keep askpass windown on top. From 1065 Debian patch via bernd AT openbsd.org 1066 106720080228 1068 - (dtucker) [configure.ac] Add -fstack-protector to LDFLAGS too, fixes 1069 linking problems on AIX with gcc 4.1.x. 1070 - (dtucker) [includes.h ssh-add.c ssh-agent.c ssh-keygen.c ssh.c sshd.c 1071 openbsd-compat/openssl-compat.{c,h}] Bug #1437 Move the OpenSSL compat 1072 header to after OpenSSL headers, since some versions of OpenSSL have 1073 SSLeay_add_all_algorithms as a macro already. 1074 - (dtucker) [key.c defines.h openbsd-compat/openssl-compat.h] Move old OpenSSL 1075 compat glue into openssl-compat.h. 1076 - (dtucker) [configure.ac openbsd-compat/port-aix.{c,h}] Bug #1081: Implement 1077 getgrouplist via getgrset on AIX, rather than iterating over getgrent. 1078 This allows, eg, Match and AllowGroups directives to work with NIS and 1079 LDAP groups. 1080 - (dtucker) [sshd.c] Bug #1042: make log messages for tcpwrappers use the 1081 same SyslogFacility as the rest of sshd. Patch from William Knox, 1082 ok djm@. 1083 108420080225 1085 - (dtucker) [openbsd-compat/fake-rfc2553.h] rename ssh_gai_strerror hack 1086 since it now conflicts with the helper function in misc.c. From 1087 vinschen AT redhat.com. 1088 - (dtucker) [configure.ac audit-bsm.c] Bug #1420: Add a local implementation 1089 of aug_get_machine for systems that don't have their own (eg OS X, FreeBSD). 1090 Help and testing from csjp at FreeBSD org, vgiffin at apple com. ok djm@ 1091 - (dtucker) [includes.h openbsd-compat/openssl-compat.c] Bug #1437: reshuffle 1092 headers so ./configure --with-ssl-engine actually works. Patch from 1093 Ian Lister. 1094 109520080224 1096 - (tim) [contrib/cygwin/ssh-host-config] 1097 Grammar changes on SYSCONFDIR LOCALSTATEDIR messages. 1098 Check more thoroughly that it's possible to create the /var/empty directory. 1099 Patch by vinschen AT redhat.com 1100 110120080210 1102 - OpenBSD CVS Sync 1103 - chl@cvs.openbsd.org 2008/01/11 07:22:28 1104 [sftp-client.c sftp-client.h] 1105 disable unused functions 1106 initially from tobias@, but disabled them by placing them in 1107 "#ifdef notyet" which was asked by djm@ 1108 ok djm@ tobias@ 1109 - djm@cvs.openbsd.org 2008/01/19 19:13:28 1110 [ssh.1] 1111 satisfy the pedants: -q does not suppress all diagnostic messages (e.g. 1112 some commandline parsing warnings go unconditionally to stdout). 1113 - djm@cvs.openbsd.org 2008/01/19 20:48:53 1114 [clientloop.c] 1115 fd leak on session multiplexing error path. Report and patch from 1116 gregory_shively AT fanniemae.com 1117 - djm@cvs.openbsd.org 2008/01/19 20:51:26 1118 [ssh.c] 1119 ignore SIGPIPE in multiplex client mode - we can receive this if the 1120 server runs out of fds on us midway. Report and patch from 1121 gregory_shively AT fanniemae.com 1122 - djm@cvs.openbsd.org 2008/01/19 22:04:57 1123 [sftp-client.c] 1124 fix remote handle leak in do_download() local file open error path; 1125 report and fix from sworley AT chkno.net 1126 - djm@cvs.openbsd.org 2008/01/19 22:22:58 1127 [ssh-keygen.c] 1128 when hashing individual hosts (ssh-keygen -Hf hostname), make sure we 1129 hash just the specified hostname and not the entire hostspec from the 1130 keyfile. It may be of the form "hostname,ipaddr", which would lead to 1131 a hash that never matches. report and fix from jp AT devnull.cz 1132 - djm@cvs.openbsd.org 2008/01/19 22:37:19 1133 [ssh-keygen.c] 1134 unbreak line numbering (broken in revision 1.164), fix error message 1135 - djm@cvs.openbsd.org 2008/01/19 23:02:40 1136 [channels.c] 1137 When we added support for specified bind addresses for port forwards, we 1138 added a quirk SSH_OLD_FORWARD_ADDR. There is a bug in our handling of 1139 this for -L port forwards that causes the client to listen on both v4 1140 and v6 addresses when connected to a server with this quirk, despite 1141 having set 0.0.0.0 as a bind_address. 1142 report and patch from Jan.Pechanec AT Sun.COM; ok dtucker@ 1143 - djm@cvs.openbsd.org 2008/01/19 23:09:49 1144 [readconf.c readconf.h sshconnect2.c] 1145 promote rekeylimit to a int64 so it can hold the maximum useful limit 1146 of 2^32; report and patch from Jan.Pechanec AT Sun.COM, ok dtucker@ 1147 - djm@cvs.openbsd.org 2008/01/20 00:38:30 1148 [sftp.c] 1149 When uploading, correctly handle the case of an unquoted filename with 1150 glob metacharacters that match a file exactly but not as a glob, e.g. a 1151 file called "[abcd]". report and test cases from duncan2nd AT gmx.de 1152 - djm@cvs.openbsd.org 2008/01/21 17:24:30 1153 [sftp-server.c] 1154 Remove the fixed 100 handle limit in sftp-server and allocate as many 1155 as we have available file descriptors. Patch from miklos AT szeredi.hu; 1156 ok dtucker@ markus@ 1157 - djm@cvs.openbsd.org 2008/01/21 19:20:17 1158 [sftp-client.c] 1159 when a remote write error occurs during an upload, ensure that ACKs for 1160 all issued requests are properly drained. patch from t8m AT centrum.cz 1161 - dtucker@cvs.openbsd.org 2008/01/23 01:56:54 1162 [clientloop.c packet.c serverloop.c] 1163 Revert the change for bz #1307 as it causes connection aborts if an IGNORE 1164 packet arrives while we're waiting in packet_read_expect (and possibly 1165 elsewhere). 1166 - jmc@cvs.openbsd.org 2008/01/31 20:06:50 1167 [scp.1] 1168 explain how to handle local file names containing colons; 1169 requested by Tamas TEVESZ 1170 ok dtucker 1171 - markus@cvs.openbsd.org 2008/02/04 21:53:00 1172 [session.c sftp-server.c sftp.h] 1173 link sftp-server into sshd; feedback and ok djm@ 1174 - mcbride@cvs.openbsd.org 2008/02/09 12:15:43 1175 [ssh.1 sshd.8] 1176 Document the correct permissions for the ~/.ssh/ directory. 1177 ok jmc 1178 - djm@cvs.openbsd.org 2008/02/10 09:55:37 1179 [sshd_config.5] 1180 mantion that "internal-sftp" is useful with ForceCommand too 1181 - djm@cvs.openbsd.org 2008/02/10 10:54:29 1182 [servconf.c session.c] 1183 delay ~ expansion for ChrootDirectory so it expands to the logged-in user's 1184 home, rather than the user who starts sshd (probably root) 1185 118620080119 1187 - (djm) Silence noice from expr in ssh-copy-id; patch from 1188 mikel AT mikelward.com 1189 - (djm) Only listen for IPv6 connections on AF_INET6 sockets; patch from 1190 tsr2600 AT gmail.com 1191 119220080102 1193 - (dtucker) [configure.ac] Fix message for -fstack-protector-all test. 1194 119520080101 1196 - (dtucker) OpenBSD CVS Sync 1197 - dtucker@cvs.openbsd.org 2007/12/31 10:41:31 1198 [readconf.c servconf.c] 1199 Prevent strict-aliasing warnings on newer gcc versions. bz #1355, patch 1200 from Dmitry V. Levin, ok djm@ 1201 - dtucker@cvs.openbsd.org 2007/12/31 15:27:04 1202 [sshd.c] 1203 When in inetd mode, have sshd generate a Protocol 1 ephemeral server 1204 key only for connections where the client chooses Protocol 1 as opposed 1205 to when it's enabled in the server's config. Speeds up Protocol 2 1206 connections to inetd-mode servers that also allow Protocol 1. bz #440, 1207 based on a patch from bruno at wolff.to, ok markus@ 1208 - dtucker@cvs.openbsd.org 2008/01/01 08:47:04 1209 [misc.c] 1210 spaces -> tabs from my previous commit 1211 - dtucker@cvs.openbsd.org 2008/01/01 09:06:39 1212 [scp.c] 1213 If scp -p encounters a pre-epoch timestamp, use the epoch which is 1214 as close as we can get given that it's used unsigned. Add a little 1215 debugging while there. bz #828, ok djm@ 1216 - dtucker@cvs.openbsd.org 2008/01/01 09:27:33 1217 [sshd_config.5 servconf.c] 1218 Allow PermitRootLogin in a Match block. Allows for, eg, permitting root 1219 only from the local network. ok markus@, man page bit ok jmc@ 1220 - dtucker@cvs.openbsd.org 2008/01/01 08:51:20 1221 [moduli] 1222 Updated moduli file; ok djm@ 1223 122420071231 1225 - (dtucker) [configure.ac openbsd-compat/glob.{c,h}] Bug #1407: force use of 1226 builtin glob implementation on Mac OS X. Based on a patch from 1227 vgiffin at apple. 1228 122920071229 1230 - (dtucker) OpenBSD CVS Sync 1231 - djm@cvs.openbsd.org 2007/12/12 05:04:03 1232 [sftp.c] 1233 unbreak lls command and add a regress test that would have caught the 1234 breakage; spotted by mouring@ 1235 - dtucker@cvs.openbsd.org 2007/12/27 14:22:08 1236 [servconf.c canohost.c misc.c channels.c sshconnect.c misc.h ssh-keyscan.c 1237 sshd.c] 1238 Add a small helper function to consistently handle the EAI_SYSTEM error 1239 code of getaddrinfo. Prompted by vgiffin at apple com via bz #1417. 1240 ok markus@ stevesk@ 1241 - dtucker@cvs.openbsd.org 2007/12/28 15:32:24 1242 [clientloop.c serverloop.c packet.c] 1243 Make SSH2_MSG_UNIMPLEMENTED and SSH2_MSG_IGNORE messages reset the 1244 ServerAlive and ClientAlive timers. Prevents dropping a connection 1245 when these are enabled but the peer does not support our keepalives. 1246 bz #1307, ok djm@. 1247 - dtucker@cvs.openbsd.org 2007/12/28 22:34:47 1248 [clientloop.c] 1249 Use the correct packet maximum sizes for remote port and agent forwarding. 1250 Prevents the server from killing the connection if too much data is queued 1251 and an excessively large packet gets sent. bz #1360, ok djm@. 1252 125320071202 1254 - (dtucker) [configure.ac] Enable -fstack-protector-all on systems where 1255 gcc supports it. ok djm@ 1256 - (dtucker) [scp.c] Update $OpenBSD tag missing from rev 1.175 and remove 1257 leftover debug code. 1258 - (dtucker) OpenBSD CVS Sync 1259 - dtucker@cvs.openbsd.org 2007/10/29 00:52:45 1260 [auth2-gss.c] 1261 Allow build without -DGSSAPI; ok deraadt@ 1262 (Id sync only, Portable already has the ifdefs) 1263 - dtucker@cvs.openbsd.org 2007/10/29 01:55:04 1264 [ssh.c] 1265 Plug tiny mem leaks in ControlPath and ProxyCommand option processing; 1266 ok djm@ 1267 - dtucker@cvs.openbsd.org 2007/10/29 04:08:08 1268 [monitor_wrap.c monitor.c] 1269 Send config block back to slave for invalid users too so options 1270 set by a Match block (eg Banner) behave the same for non-existent 1271 users. Found by and ok djm@ 1272 - dtucker@cvs.openbsd.org 2007/10/29 06:51:59 1273 [ssh_config.5] 1274 ProxyCommand and LocalCommand use the user's shell, not /bin/sh; ok djm@ 1275 - dtucker@cvs.openbsd.org 2007/10/29 06:54:50 1276 [ssh.c] 1277 Make LocalCommand work for Protocol 1 too; ok djm@ 1278 - jmc@cvs.openbsd.org 2007/10/29 07:48:19 1279 [ssh_config.5] 1280 clean up after previous macro removal; 1281 - djm@cvs.openbsd.org 2007/11/03 00:36:14 1282 [clientloop.c] 1283 fix memory leak in process_cmdline(), patch from Jan.Pechanec AT Sun.COM; 1284 ok dtucker@ 1285 - deraadt@cvs.openbsd.org 2007/11/03 01:24:06 1286 [ssh.c] 1287 bz #1377: getpwuid results were being clobbered by another getpw* call 1288 inside tilde_expand_filename(); save the data we need carefully 1289 ok djm 1290 - dtucker@cvs.openbsd.org 2007/11/03 02:00:32 1291 [ssh.c] 1292 Use xstrdup/xfree when saving pwname and pwdir; ok deraadt@ 1293 - deraadt@cvs.openbsd.org 2007/11/03 02:03:49 1294 [ssh.c] 1295 avoid errno trashing in signal handler; ok dtucker 1296 129720071030 1298 - (djm) OpenBSD CVS Sync 1299 - djm@cvs.openbsd.org 2007/10/29 23:49:41 1300 [openbsd-compat/sys-tree.h] 1301 remove extra backslash at the end of RB_PROTOTYPE, report from 1302 Jan.Pechanec AT Sun.COM; ok deraadt@ 1303 130420071026 1305 - (djm) OpenBSD CVS Sync 1306 - stevesk@cvs.openbsd.org 2007/09/11 23:49:09 1307 [sshpty.c] 1308 remove #if defined block not needed; ok markus@ dtucker@ 1309 (NB. RCD ID sync only for portable) 1310 - djm@cvs.openbsd.org 2007/09/21 03:05:23 1311 [ssh_config.5] 1312 document KbdInteractiveAuthentication in ssh_config.5; 1313 patch from dkg AT fifthhorseman.net 1314 - djm@cvs.openbsd.org 2007/09/21 08:15:29 1315 [auth-bsdauth.c auth-passwd.c auth.c auth.h auth1.c auth2-chall.c] 1316 [monitor.c monitor_wrap.c] 1317 unifdef -DBSD_AUTH 1318 unifdef -USKEY 1319 These options have been in use for some years; 1320 ok markus@ "no objection" millert@ 1321 (NB. RCD ID sync only for portable) 1322 - canacar@cvs.openbsd.org 2007/09/25 23:48:57 1323 [ssh-agent.c] 1324 When adding a key that already exists, update the properties 1325 (time, confirm, comment) instead of discarding them. ok djm@ markus@ 1326 - ray@cvs.openbsd.org 2007/09/27 00:15:57 1327 [dh.c] 1328 Don't return -1 on error in dh_pub_is_valid(), since it evaluates 1329 to true. 1330 Also fix a typo. 1331 Initial diff from Matthew Dempsky, input from djm. 1332 OK djm, markus. 1333 - dtucker@cvs.openbsd.org 2007/09/29 00:25:51 1334 [auth2.c] 1335 Remove unused prototype. ok djm@ 1336 - chl@cvs.openbsd.org 2007/10/02 17:49:58 1337 [ssh-keygen.c] 1338 handles zero-sized strings that fgets can return 1339 properly removes trailing newline 1340 removes an unused variable 1341 correctly counts line number 1342 "looks ok" ray@ markus@ 1343 - markus@cvs.openbsd.org 2007/10/22 19:10:24 1344 [readconf.c] 1345 make sure that both the local and remote port are correct when 1346 parsing -L; Jan Pechanec (bz #1378) 1347 - djm@cvs.openbsd.org 2007/10/24 03:30:02 1348 [sftp.c] 1349 rework argument splitting and parsing to cope correctly with common 1350 shell escapes and make handling of escaped characters consistent 1351 with sh(1) and between sftp commands (especially between ones that 1352 glob their arguments and ones that don't). 1353 parse command flags using getopt(3) rather than hand-rolled parsers. 1354 ok dtucker@ 1355 - djm@cvs.openbsd.org 2007/10/24 03:44:02 1356 [scp.c] 1357 factor out network read/write into an atomicio()-like function, and 1358 use it to handle short reads, apply bandwidth limits and update 1359 counters. make network IO non-blocking, so a small trickle of 1360 reads/writes has a chance of updating the progress meter; bz #799 1361 ok dtucker@ 1362 - djm@cvs.openbsd.org 2006/08/29 09:44:00 1363 [regress/sftp-cmds.sh] 1364 clean up our mess 1365 - markus@cvs.openbsd.org 2006/11/06 09:27:43 1366 [regress/cfgmatch.sh] 1367 fix quoting for non-(c)sh login shells. 1368 - dtucker@cvs.openbsd.org 2006/12/13 08:36:36 1369 [regress/cfgmatch.sh] 1370 Additional test for multiple PermitOpen entries. ok djm@ 1371 - pvalchev@cvs.openbsd.org 2007/06/07 19:41:46 1372 [regress/cipher-speed.sh regress/try-ciphers.sh] 1373 test umac-64@openssh.com 1374 ok djm@ 1375 - djm@cvs.openbsd.org 2007/10/24 03:32:35 1376 [regress/sftp-cmds.sh regress/sftp-glob.sh regress/test-exec.sh] 1377 comprehensive tests for sftp escaping its interaction with globbing; 1378 ok dtucker@ 1379 - djm@cvs.openbsd.org 2007/10/26 05:30:01 1380 [regress/sftp-glob.sh regress/test-exec.sh] 1381 remove "echo -E" crap that I added in last commit and use printf(1) for 1382 cases where we strictly require echo not to reprocess escape characters. 1383 - deraadt@cvs.openbsd.org 2005/11/28 17:50:12 1384 [openbsd-compat/glob.c] 1385 unused arg in internal static API 1386 - jakob@cvs.openbsd.org 2007/10/11 18:36:41 1387 [openbsd-compat/getrrsetbyname.c openbsd-compat/getrrsetbyname.h] 1388 use RRSIG instead of SIG for DNSSEC. ok djm@ 1389 - otto@cvs.openbsd.org 2006/10/21 09:55:03 1390 [openbsd-compat/base64.c] 1391 remove calls to abort(3) that can't happen anyway; from 1392 <bret dot lambert at gmail.com>; ok millert@ deraadt@ 1393 - frantzen@cvs.openbsd.org 2004/04/24 18:11:46 1394 [openbsd-compat/sys-tree.h] 1395 sync to Niels Provos' version. avoid unused variable warning in 1396 RB_NEXT() 1397 - tdeval@cvs.openbsd.org 2004/11/24 18:10:42 1398 [openbsd-compat/sys-tree.h] 1399 typo 1400 - grange@cvs.openbsd.org 2004/05/04 16:59:32 1401 [openbsd-compat/sys-queue.h] 1402 Remove useless ``elm'' argument from the SIMPLEQ_REMOVE_HEAD macro. 1403 This matches our SLIST behaviour and NetBSD's SIMPLEQ as well. 1404 ok millert krw deraadt 1405 - deraadt@cvs.openbsd.org 2005/02/25 13:29:30 1406 [openbsd-compat/sys-queue.h] 1407 minor white spacing 1408 - otto@cvs.openbsd.org 2005/10/17 20:19:42 1409 [openbsd-compat/sys-queue.h] 1410 Performing certain operations on queue.h data structurs produced 1411 funny results. An example is calling LIST_REMOVE on the same 1412 element twice. This will not fail, but result in a data structure 1413 referencing who knows what. Prevent these accidents by NULLing some 1414 fields on remove and replace. This way, either a panic or segfault 1415 will be produced on the faulty operation. 1416 - otto@cvs.openbsd.org 2005/10/24 20:25:14 1417 [openbsd-compat/sys-queue.h] 1418 Partly backout. NOLIST, used in LISTs is probably interfering. 1419 requested by deraadt@ 1420 - otto@cvs.openbsd.org 2005/10/25 06:37:47 1421 [openbsd-compat/sys-queue.h] 1422 Some uvm problem is being exposed with the more strict macros. 1423 Revert until we've found out what's causing the panics. 1424 - otto@cvs.openbsd.org 2005/11/25 08:06:25 1425 [openbsd-compat/sys-queue.h] 1426 Introduce debugging aid for queue macros. Disabled by default; but 1427 developers are encouraged to run with this enabled. 1428 ok krw@ fgsch@ deraadt@ 1429 - otto@cvs.openbsd.org 2007/04/30 18:42:34 1430 [openbsd-compat/sys-queue.h] 1431 Enable QUEUE_MACRO_DEBUG on DIAGNOSTIC kernels. 1432 Input and okays from krw@, millert@, otto@, deraadt@, miod@. 1433 - millert@cvs.openbsd.org 2004/10/07 16:56:11 1434 GLOB_NOESCAPE is POSIX so move it out of the #ifndef _POSIX_SOURCE 1435 block. 1436 (NB. mostly an RCS ID sync, as portable strips out the conditionals) 1437 - (djm) [regress/sftp-cmds.sh] 1438 Use more restrictive glob to pick up test files from /bin - some platforms 1439 ship broken symlinks there which could spoil the test. 1440 - (djm) [openbsd-compat/bindresvport.c] 1441 Sync RCS ID after irrelevant (for portable OpenSSH) header shuffling 1442 144320070927 1444 - (dtucker) [configure.ac atomicio.c] Fall back to including <sys/poll.h> if 1445 we don't have <poll.h> (eq QNX). From bacon at cs nyu edu. 1446 - (dtucker) [configure.ac defines.h] Shadow expiry does not work on QNX6 1447 so disable it for that platform. From bacon at cs nyu edu. 1448 144920070921 1450 - (djm) [atomicio.c] Fix spin avoidance for platforms that define 1451 EWOULDBLOCK; patch from ben AT psc.edu 1452 145320070917 1454 - (djm) OpenBSD CVS Sync 1455 - djm@cvs.openbsd.org 2007/08/23 02:49:43 1456 [auth-passwd.c auth.c session.c] 1457 unifdef HAVE_LOGIN_CAP; ok deraadt@ millert@ 1458 NB. RCS ID sync only for portable 1459 - djm@cvs.openbsd.org 2007/08/23 02:55:51 1460 [auth-passwd.c auth.c session.c] 1461 missed include bits from last commit 1462 NB. RCS ID sync only for portable 1463 - djm@cvs.openbsd.org 2007/08/23 03:06:10 1464 [auth.h] 1465 login_cap.h doesn't belong here 1466 NB. RCS ID sync only for portable 1467 - djm@cvs.openbsd.org 2007/08/23 03:22:16 1468 [auth2-none.c sshd_config sshd_config.5] 1469 Support "Banner=none" to disable displaying of the pre-login banner; 1470 ok dtucker@ deraadt@ 1471 - djm@cvs.openbsd.org 2007/08/23 03:23:26 1472 [sshconnect.c] 1473 Execute ProxyCommands with $SHELL rather than /bin/sh unconditionally 1474 - djm@cvs.openbsd.org 2007/09/04 03:21:03 1475 [clientloop.c monitor.c monitor_fdpass.c monitor_fdpass.h] 1476 [monitor_wrap.c ssh.c] 1477 make file descriptor passing code return an error rather than call fatal() 1478 when it encounters problems, and use this to make session multiplexing 1479 masters survive slaves failing to pass all stdio FDs; ok markus@ 1480 - djm@cvs.openbsd.org 2007/09/04 11:15:56 1481 [ssh.c sshconnect.c sshconnect.h] 1482 make ssh(1)'s ConnectTimeout option apply to both the TCP connection and 1483 SSH banner exchange (previously it just covered the TCP connection). 1484 This allows callers of ssh(1) to better detect and deal with stuck servers 1485 that accept a TCP connection but don't progress the protocol, and also 1486 makes ConnectTimeout useful for connections via a ProxyCommand; 1487 feedback and "looks ok" markus@ 1488 - sobrado@cvs.openbsd.org 2007/09/09 11:38:01 1489 [ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.c] 1490 sort synopsis and options in ssh-agent(1); usage is lowercase 1491 ok jmc@ 1492 - stevesk@cvs.openbsd.org 2007/09/11 04:36:29 1493 [sshpty.c] 1494 sort #include 1495 NB. RCS ID sync only 1496 - gilles@cvs.openbsd.org 2007/09/11 15:47:17 1497 [session.c ssh-keygen.c sshlogin.c] 1498 use strcspn to properly overwrite '\n' in fgets returned buffer 1499 ok pyr@, ray@, millert@, moritz@, chl@ 1500 - stevesk@cvs.openbsd.org 2007/09/11 23:49:09 1501 [sshpty.c] 1502 remove #if defined block not needed; ok markus@ dtucker@ 1503 NB. RCS ID sync only 1504 - stevesk@cvs.openbsd.org 2007/09/12 19:39:19 1505 [umac.c] 1506 use xmalloc() and xfree(); ok markus@ pvalchev@ 1507 - djm@cvs.openbsd.org 2007/09/13 04:39:04 1508 [sftp-server.c] 1509 fix incorrect test when setting syslog facility; from Jan Pechanec 1510 - djm@cvs.openbsd.org 2007/09/16 00:55:52 1511 [sftp-client.c] 1512 use off_t instead of u_int64_t for file offsets, matching what the 1513 progressmeter code expects; bz #842 1514 - (tim) [defines.h] Fix regression in long password support on OpenServer 6. 1515 Problem report and additional testing rac AT tenzing.org. 1516 151720070914 1518 - (dtucker) [openbsd-compat/bsd-asprintf.c] Plug mem leak in error path. 1519 Patch from Jan.Pechanec at sun com. 1520 152120070910 1522 - (dtucker) [openbsd-compat/regress/closefromtest.c] Bug #1358: Always 1523 return 0 on successful test. From David.Leonard at quest com. 1524 - (tim) [configure.ac] Autoconf didn't define HAVE_LIBIAF because we 1525 did a AC_CHECK_FUNCS within the AC_CHECK_LIB test. 1526 152720070817 1528 - (dtucker) [sshd.8] Many Linux variants use a single "!" to denote locked 1529 accounts and that's what the code looks for, so make man page and code 1530 agree. Pointed out by Roumen Petrov. 1531 - (dtucker) [INSTALL] Group the parts describing random options and PAM 1532 implementations together which is hopefully more coherent. 1533 - (dtucker) [INSTALL] the pid file is sshd.pid not ssh.pid. 1534 - (dtucker) [INSTALL] Give PAM its own heading. 1535 - (dtucker) [INSTALL] Link to tcpwrappers. 1536 153720070816 1538 - (dtucker) [session.c] Call PAM cleanup functions for unauthenticated 1539 connections too. Based on a patch from Sandro Wefel, with & ok djm@ 1540 154120070815 1542 - (dtucker) OpenBSD CVS Sync 1543 - markus@cvs.openbsd.org 2007/08/15 08:14:46 1544 [clientloop.c] 1545 do NOT fall back to the trused x11 cookie if generation of an untrusted 1546 cookie fails; from Jan Pechanec, via security-alert at sun.com; 1547 ok dtucker 1548 - markus@cvs.openbsd.org 2007/08/15 08:16:49 1549 [version.h] 1550 openssh 4.7 1551 - stevesk@cvs.openbsd.org 2007/08/15 12:13:41 1552 [ssh_config.5] 1553 tun device forwarding now honours ExitOnForwardFailure; ok markus@ 1554 - (dtucker) [openbsd-compat/bsd-cray.c] Remove debug from signal handler. 1555 ok djm@ 1556 - (dtucker) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec 1557 contrib/suse/openssh.spec] Crank version. 1558 155920070813 1560 - (dtucker) [session.c] Bug #1339: ensure that pam_setcred() is always 1561 called with PAM_ESTABLISH_CRED at least once, which resolves a problem 1562 with pam_dhkeys. Patch from David Leonard, ok djm@ 1563 156420070810 1565 - (dtucker) [auth-pam.c] Use sigdie here too. ok djm@ 1566 - (dtucker) [configure.ac] Bug #1343: Set DISABLE_FD_PASSING for QNX6. From 1567 Matt Kraai, ok djm@ 1568 156920070809 1570 - (dtucker) [openbsd-compat/port-aix.c] Comment typo. 1571 - (dtucker) [README.platform] Document the interaction between PermitRootLogin 1572 and the AIX native login restrictions. 1573 - (dtucker) [defines.h] Remove _PATH_{CSHELL,SHELLS} which aren't 1574 used anywhere and are a potential source of warnings. 1575 157620070808 1577 - (djm) OpenBSD CVS Sync 1578 - ray@cvs.openbsd.org 2007/07/12 05:48:05 1579 [key.c] 1580 Delint: remove some unreachable statements, from Bret Lambert. 1581 OK markus@ and dtucker@. 1582 - sobrado@cvs.openbsd.org 2007/08/06 19:16:06 1583 [scp.1 scp.c] 1584 the ellipsis is not an optional argument; while here, sync the usage 1585 and synopsis of commands 1586 lots of good ideas by jmc@ 1587 ok jmc@ 1588 - djm@cvs.openbsd.org 2007/08/07 07:32:53 1589 [clientloop.c clientloop.h ssh.c] 1590 bz#1232: ensure that any specified LocalCommand is executed after the 1591 tunnel device is opened. Also, make failures to open a tunnel device 1592 fatal when ExitOnForwardFailure is active. 1593 Reported by h.goebel AT goebel-consult.de; ok dtucker markus reyk deraadt 1594 159520070724 1596 - (tim) [openssh.xml.in] make FMRI match what package scripts use. 1597 - (tim) [openbsd-compat/regress/closefromtest.c] Bug 1345: fix open() call. 1598 Report/patch by David.Leonard AT quest.com (and Bernhard Simon) 1599 - (tim) [buildpkg.sh.in openssh.xml.in] Allow more flexibility where smf(5) 1600 - (tim) [buildpkg.sh.in] s|$FAKE_ROOT/${sysconfdir}|$FAKE_ROOT${sysconfdir}| 1601 160220070628 1603 - (djm) bz#1325: Fix SELinux in permissive mode where it would 1604 incorrectly fatal() on errors. patch from cjwatson AT debian.org; 1605 ok dtucker 1606 160720070625 1608 - (dtucker) OpenBSD CVS Sync 1609 - djm@cvs.openbsd.org 2007/06/13 00:21:27 1610 [scp.c] 1611 don't ftruncate() non-regular files; bz#1236 reported by wood AT 1612 xmission.com; ok dtucker@ 1613 - djm@cvs.openbsd.org 2007/06/14 21:43:25 1614 [ssh.c] 1615 handle EINTR when waiting for mux exit status properly 1616 - djm@cvs.openbsd.org 2007/06/14 22:48:05 1617 [ssh.c] 1618 when waiting for the multiplex exit status, read until the master end 1619 writes an entire int of data *and* closes the client_fd; fixes mux 1620 regression spotted by dtucker, ok dtucker@ 1621 - djm@cvs.openbsd.org 2007/06/19 02:04:43 1622 [atomicio.c] 1623 if the fd passed to atomicio/atomiciov() is non blocking, then poll() to 1624 avoid a spin if it is not yet ready for reading/writing; ok dtucker@ 1625 - dtucker@cvs.openbsd.org 2007/06/25 08:20:03 1626 [channels.c] 1627 Correct test for window updates every three packets; prevents sending 1628 window updates for every single packet. ok markus@ 1629 - dtucker@cvs.openbsd.org 2007/06/25 12:02:27 1630 [atomicio.c] 1631 Include <poll.h> like the man page says rather than <sys/poll.h>. ok djm@ 1632 - (dtucker) [atomicio.c] Test for EWOULDBLOCK in atomiciov to match 1633 atomicio. 1634 - (dtucker) [atomicio.c configure.ac openbsd-compat/Makefile.in 1635 openbsd-compat/bsd-poll.{c,h} openbsd-compat/openbsd-compat.h] 1636 Add an implementation of poll() built on top of select(2). Code from 1637 OpenNTPD with changes suggested by djm. ok djm@ 1638 163920070614 1640 - (dtucker) [cipher-ctr.c umac.c openbsd-compat/openssl-compat.h] Move the 1641 USE_BUILTIN_RIJNDAEL compat goop to openssl-compat.h so it can be 1642 shared with umac.c. Allows building with OpenSSL 0.9.5 again including 1643 umac support. With tim@ djm@, ok djm. 1644 - (dtucker) [openbsd-compat/openssl-compat.h] Merge USE_BUILTIN_RIJNDAEL 1645 sections. Fixes builds with early OpenSSL 0.9.6 versions. 1646 - (dtucker) [openbsd-compat/openssl-compat.h] Remove redundant definition 1647 of USE_BUILTIN_RIJNDAEL since the <0.9.6 test is covered by the 1648 subsequent <0.9.7 test. 1649 165020070612 1651 - (dtucker) OpenBSD CVS Sync 1652 - markus@cvs.openbsd.org 2007/06/11 09:14:00 1653 [channels.h] 1654 increase default channel windows; ok djm 1655 - djm@cvs.openbsd.org 2007/06/12 07:41:00 1656 [ssh-add.1] 1657 better document ssh-add's -d option (delete identies from agent), bz#1224 1658 new text based on some provided by andrewmc-debian AT celt.dias.ie; 1659 ok dtucker@ 1660 - djm@cvs.openbsd.org 2007/06/12 08:20:00 1661 [ssh-gss.h gss-serv.c gss-genr.c] 1662 relocate server-only GSSAPI code from libssh to server; bz #1225 1663 patch from simon AT sxw.org.uk; ok markus@ dtucker@ 1664 - djm@cvs.openbsd.org 2007/06/12 08:24:20 1665 [scp.c] 1666 make scp try to skip FIFOs rather than blocking when nothing is listening. 1667 depends on the platform supporting sane O_NONBLOCK semantics for open 1668 on FIFOs (apparently POSIX does not mandate this), which OpenBSD does. 1669 bz #856; report by cjwatson AT debian.org; ok markus@ 1670 - djm@cvs.openbsd.org 2007/06/12 11:11:08 1671 [ssh.c] 1672 fix slave exit value when a control master goes away without passing the 1673 full exit status by ensuring that the slave reads a full int. bz#1261 1674 reported by frekko AT gmail.com; ok markus@ dtucker@ 1675 - djm@cvs.openbsd.org 2007/06/12 11:15:17 1676 [ssh.c ssh.1] 1677 Add "-K" flag for ssh to set GSSAPIAuthentication=yes and 1678 GSSAPIDelegateCredentials=yes. This is symmetric with -k (disable GSSAPI) 1679 and is useful for hosts with /home on Kerberised NFS; bz #1312 1680 patch from Markus.Kuhn AT cl.cam.ac.uk; ok dtucker@ markus@ 1681 - djm@cvs.openbsd.org 2007/06/12 11:45:27 1682 [ssh.c] 1683 improved exit message from multiplex slave sessions; bz #1262 1684 reported by alexandre.nunes AT gmail.com; ok dtucker@ 1685 - dtucker@cvs.openbsd.org 2007/06/12 11:56:15 1686 [gss-genr.c] 1687 Pass GSS OID to gss_display_status to provide better information in 1688 error messages. Patch from Simon Wilkinson via bz 1220. ok djm@ 1689 - jmc@cvs.openbsd.org 2007/06/12 13:41:03 1690 [ssh-add.1] 1691 identies -> identities; 1692 - jmc@cvs.openbsd.org 2007/06/12 13:43:55 1693 [ssh.1] 1694 add -K to SYNOPSIS; 1695 - dtucker@cvs.openbsd.org 2007/06/12 13:54:28 1696 [scp.c] 1697 Encode filename with strnvis if the name contains a newline (which can't 1698 be represented in the scp protocol), from bz #891. ok markus@ 1699 170020070611 1701 - (djm) Bugzilla #1306: silence spurious error messages from hang-on-exit 1702 fix; tested by dtucker@ and jochen.kirn AT gmail.com 1703 - pvalchev@cvs.openbsd.org 2007/06/07 19:37:34 1704 [kex.h mac.c mac.h monitor_wrap.c myproposal.h packet.c ssh.1] 1705 [ssh_config.5 sshd.8 sshd_config.5] 1706 Add a new MAC algorithm for data integrity, UMAC-64 (not default yet, 1707 must specify umac-64@openssh.com). Provides about 20% end-to-end speedup 1708 compared to hmac-md5. Represents a different approach to message 1709 authentication to that of HMAC that may be beneficial if HMAC based on 1710 one of its underlying hash algorithms is found to be vulnerable to a 1711 new attack. http://www.ietf.org/rfc/rfc4418.txt 1712 in conjunction with and OK djm@ 1713 - pvalchev@cvs.openbsd.org 2007/06/08 04:40:40 1714 [ssh_config] 1715 Add a "MACs" line after "Ciphers" with the default MAC algorithms, 1716 to ease people who want to tweak both (eg. for performance reasons). 1717 ok deraadt@ djm@ dtucker@ 1718 - jmc@cvs.openbsd.org 2007/06/08 07:43:46 1719 [ssh_config.5] 1720 put the MAC list into a display, like we do for ciphers, 1721 since groff has trouble handling wide lines; 1722 - jmc@cvs.openbsd.org 2007/06/08 07:48:09 1723 [sshd_config.5] 1724 oops, here too: put the MAC list into a display, like we do for 1725 ciphers, since groff has trouble with wide lines; 1726 - markus@cvs.openbsd.org 2007/06/11 08:04:44 1727 [channels.c] 1728 send 'window adjust' messages every tree packets and do not wait 1729 until 50% of the window is consumed. ok djm dtucker 1730 - (djm) [configure.ac umac.c] If platform doesn't provide swap32(3), then 1731 fallback to provided bit-swizzing functions 1732 - (dtucker) [openbsd-compat/bsd-misc.c] According to the spec the "remainder" 1733 argument to nanosleep may be NULL. Currently this never happens in OpenSSH, 1734 but check anyway in case this changes or the code gets used elsewhere. 1735 - (dtucker) [includes.h] Bug #1243: HAVE_PATHS -> HAVE_PATHS_H. Should 1736 prevent warnings about redefinitions of various things in paths.h. 1737 Spotted by cartmanltd at hotmail.com. 1738 173920070605 1740 - (dtucker) OpenBSD CVS Sync 1741 - djm@cvs.openbsd.org 2007/05/22 10:18:52 1742 [sshd.c] 1743 zap double include; from p_nowaczyk AT o2.pl 1744 (not required in -portable, Id sync only) 1745 - djm@cvs.openbsd.org 2007/05/30 05:58:13 1746 [kex.c] 1747 tidy: KNF, ARGSUSED and u_int 1748 - jmc@cvs.openbsd.org 2007/05/31 19:20:16 1749 [scp.1 ssh_config.5 sftp-server.8 ssh-agent.1 sshd_config.5 sftp.1 1750 ssh-keygen.1 ssh-keyscan.1 ssh-add.1 sshd.8 ssh.1 ssh-keysign.8] 1751 convert to new .Dd format; 1752 (We will need to teach mdoc2man.awk to understand this too.) 1753 - djm@cvs.openbsd.org 2007/05/31 23:34:29 1754 [packet.c] 1755 gc unreachable code; spotted by Tavis Ormandy 1756 - djm@cvs.openbsd.org 2007/06/02 09:04:58 1757 [bufbn.c] 1758 memory leak on error path; from arnaud.lacombe.1 AT ulaval.ca 1759 - djm@cvs.openbsd.org 2007/06/05 06:52:37 1760 [kex.c monitor_wrap.c packet.c mac.h kex.h mac.c] 1761 Preserve MAC ctx between packets, saving 2xhash calls per-packet. 1762 Yields around a 12-16% end-to-end speedup for arcfour256/hmac-md5 1763 patch from markus@ tested dtucker@ and myself, ok markus@ and me (I'm 1764 committing at his request) 1765 - (dtucker) [mdoc2man.awk] Teach it to deal with $Mdocdate tags that 1766 OpenBSD's cvs now adds. 1767 - (dtucker) [mdoc2man.awk] Remove trailing "$" from Mdocdate regex so 1768 mindrot's cvs doesn't expand it on us. 1769 - (dtucker) [mdoc2man.awk] Add support for %R references, used for RFCs. 1770 177120070520 1772 - (dtucker) OpenBSD CVS Sync 1773 - stevesk@cvs.openbsd.org 2007/04/14 22:01:58 1774 [auth2.c] 1775 remove unused macro; from Dmitry V. Levin <ldv@altlinux.org> 1776 - stevesk@cvs.openbsd.org 2007/04/18 01:12:43 1777 [sftp-server.c] 1778 cast "%llu" format spec to (unsigned long long); do not assume a 1779 u_int64_t arg is the same as 'unsigned long long'. 1780 from Dmitry V. Levin <ldv@altlinux.org> 1781 ok markus@ 'Yes, that looks correct' millert@ 1782 - dtucker@cvs.openbsd.org 2007/04/23 10:15:39 1783 [servconf.c] 1784 Remove debug() left over from development. ok deraadt@ 1785 - djm@cvs.openbsd.org 2007/05/17 07:50:31 1786 [log.c] 1787 save and restore errno when logging; ok deraadt@ 1788 - djm@cvs.openbsd.org 2007/05/17 07:55:29 1789 [sftp-server.c] 1790 bz#1286 stop reading and processing commands when input or output buffer 1791 is nearly full, otherwise sftp-server would happily try to grow the 1792 input/output buffers past the maximum supported by the buffer API and 1793 promptly fatal() 1794 based on patch from Thue Janus Kristensen; feedback & ok dtucker@ 1795 - djm@cvs.openbsd.org 2007/05/17 20:48:13 1796 [sshconnect2.c] 1797 fall back to gethostname() when the outgoing connection is not 1798 on a socket, such as is the case when ProxyCommand is used. 1799 Gives hostbased auth an opportunity to work; bz#616, report 1800 and feedback stuart AT kaloram.com; ok markus@ 1801 - djm@cvs.openbsd.org 2007/05/17 20:52:13 1802 [monitor.c] 1803 pass received SIGINT from monitor to postauth child so it can clean 1804 up properly. bz#1196, patch from senthilkumar_sen AT hotpop.com; 1805 ok markus@ 1806 - jolan@cvs.openbsd.org 2007/05/17 23:53:41 1807 [sshconnect2.c] 1808 djm owes me a vb and a tism cd for breaking ssh compilation 1809 - (dtucker) [auth-pam.c] malloc+memset -> calloc. Patch from 1810 ldv at altlinux.org. 1811 - (dtucker) [auth-pam.c] Return empty string if fgets fails in 1812 sshpam_tty_conv. Patch from ldv at altlinux.org. 1813 181420070509 1815 - (tim) [configure.ac] Bug #1287: Add missing test for ucred.h. 1816 181720070429 1818 - (dtucker) [openbsd-compat/bsd-misc.c] Include unistd.h and sys/types.h 1819 for select(2) prototype. 1820 - (dtucker) [auth-shadow.c loginrec.c] Include time.h for time(2) prototype. 1821 - (dtucker) [configure.ac openbsd-compat/getrrsetbyname.c] Bug #1299: Use the 1822 platform's _res if it has one. Should fix problem of DNSSEC record lookups 1823 on NetBSD as reported by Curt Sampson. 1824 - (dtucker) [openbsd-compat/xmmap.c] Include stdlib.h for mkstemp prototype. 1825 - (dtucker) [configure.ac defines.h] Have configure check for MAXSYMLINKS 1826 so we don't get redefinition warnings. 1827 - (dtucker) [openbsd-compat/xmmap.c] Include stdlib.h for mkstemp prototype. 1828 - (dtucker) [configure.ac defines.h] Prevent warnings about __attribute__ 1829 __nonnull__ for versions of GCC that don't support it. 1830 - (dtucker) [configure.ac defines.h] Have configure check for offsetof 1831 to prevent redefinition warnings. 1832 183320070406 1834 - (dtucker) [INSTALL] Update the systems that have PAM as standard. Link 1835 to OpenPAM too. 1836 - (dtucker) [INSTALL] prngd lives at sourceforge these days. 1837 183820070326 1839 - (tim) [auth.c configure.ac defines.h session.c openbsd-compat/port-uw.c 1840 openbsd-compat/port-uw.h openbsd-compat/xcrypt.c] Rework libiaf test/defines 1841 to account for IRIX having libiaf but not set_id(). Patch with & ok dtucker@ 1842 184320070325 1844 - (dtucker) [Makefile.in configure.ac] Replace single-purpose LIBSELINUX, 1845 LIBWRAP and LIBPAM variables in Makefile with the general-purpose 1846 SSHDLIBS. "I like" djm@ 1847 184820070321 1849 - (dtucker) OpenBSD CVS Sync 1850 - dtucker@cvs.openbsd.org 2007/03/09 05:20:06 1851 [servconf.c sshd.c] 1852 Move C/R -> kbdint special case to after the defaults have been 1853 loaded, which makes ChallengeResponse default to yes again. This 1854 was broken by the Match changes and not fixed properly subsequently. 1855 Found by okan at demirmen.com, ok djm@ "please do it" deraadt@ 1856 - djm@cvs.openbsd.org 2007/03/19 01:01:29 1857 [sshd_config] 1858 Disable the legacy SSH protocol 1 for new installations via 1859 a configuration override. In the future, we will change the 1860 server's default itself so users who need the legacy protocol 1861 will need to turn it on explicitly 1862 - dtucker@cvs.openbsd.org 2007/03/19 12:16:42 1863 [ssh-agent.c] 1864 Remove the signal handler that checks if the agent's parent process 1865 has gone away, instead check when the select loop returns. Record when 1866 the next key will expire when scanning for expired keys. Set the select 1867 timeout to whichever of these two things happens next. With djm@, with & 1868 ok deraadt@ markus@ 1869 - tedu@cvs.openbsd.org 2007/03/20 03:56:12 1870 [readconf.c clientloop.c] 1871 remove some bogus *p tests from charles longeau 1872 ok deraadt millert 1873 - jmc@cvs.openbsd.org 2007/03/20 15:57:15 1874 [sshd.8] 1875 - let synopsis and description agree for -f 1876 - sort FILES 1877 - +.Xr ssh-keyscan 1 , 1878 from Igor Sobrado 1879 - (dtucker) [configure.ac openbsd-compat/bsd-getpeereid.c] Bug #1287: Use 1880 getpeerucred to implement getpeereid (currently only Solaris 10 and up). 1881 Patch by Jan.Pechanec at Sun. 1882 - (dtucker) [regress/agent-getpeereid.sh] Do peereid test if we have 1883 HAVE_GETPEERUCRED too. Also from Jan Pechanec. 1884 188520070313 1886 - (dtucker) [entropy.c scard-opensc.c ssh-rand-helper.c] Bug #1294: include 1887 string.h to prevent warnings, from vapier at gentoo.org. 1888 - (dtucker) [LICENCE] Add Daniel Walsh as a copyright holder for the 1889 selinux bits in -portable. 1890 - (dtucker) [cipher-3des1.c cipher-bf1.c] The OpenSSL 0.9.8e problem in 1891 bug #1291 also affects Protocol 1 3des. While at it, use compat-openssl.h 1892 in cipher-bf1.c. Patch from Juan Gallego. 1893 - (dtucker) [README.platform] Info about blibpath on AIX. 1894 189520070306 1896 - (djm) OpenBSD CVS Sync 1897 - jmc@cvs.openbsd.org 2007/03/01 16:19:33 1898 [sshd_config.5] 1899 sort the `match' keywords; 1900 - djm@cvs.openbsd.org 2007/03/06 10:13:14 1901 [version.h] 1902 openssh-4.6; "please" deraadt@ 1903 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 1904 [contrib/suse/openssh.spec] crank spec files for release 1905 - (djm) [README] correct link to release notes 1906 - (djm) Release 4.6p1 1907 190820070304 1909 - (djm) [configure.ac] add a --without-openssl-header-check option to 1910 configure, as some platforms (OS X) ship OpenSSL headers whose version 1911 does not match that of the shipping library. ok dtucker@ 1912 - (dtucker) [openbsd-compat/openssl-compat.h] Bug #1291: Work around a 1913 bug in OpenSSL 0.9.8e that prevents aes256-ctr, aes192-ctr and arcfour256 1914 ciphers from working correctly (disconnects with "Bad packet length" 1915 errors) as found by Ben Harris. ok djm@ 1916 191720070303 1918 - (dtucker) [regress/agent-ptrace.sh] Make ttrace gdb error a little more 1919 general to cover newer gdb versions on HP-UX. 1920 192120070302 1922 - (dtucker) [configure.ac] For Cygwin, read files in textmode (which allows 1923 CRLF as well as LF lineendings) and write in binary mode. Patch from 1924 vinschen at redhat.com. 1925 - (dtucker) [INSTALL] Update to autoconf-2.61. 1926 192720070301 1928 - (dtucker) OpenBSD CVS Sync 1929 - dtucker@cvs.openbsd.org 2007/03/01 10:28:02 1930 [auth2.c sshd_config.5 servconf.c] 1931 Remove ChallengeResponseAuthentication support inside a Match 1932 block as its interaction with KbdInteractive makes it difficult to 1933 support. Also, relocate the CR/kbdint option special-case code into 1934 servconf. "please commit" djm@, ok markus@ for the relocation. 1935 - (tim) [buildpkg.sh.in openssh.xml.in] Clean up Solaris 10 smf(5) bits. 1936 "Looks sane" dtucker@ 1937 193820070228 1939 - (dtucker) OpenBSD CVS Sync 1940 - dtucker@cvs.openbsd.org 2007/02/28 00:55:30 1941 [ssh-agent.c] 1942 Remove expired keys periodically so they don't remain in memory when 1943 the agent is entirely idle, as noted by David R. Piegdon. This is the 1944 simple fix, a more efficient one will be done later. With markus, 1945 deraadt, with & ok djm. 1946 194720070225 1948 - (dtucker) OpenBSD CVS Sync 1949 - djm@cvs.openbsd.org 2007/02/20 10:25:14 1950 [clientloop.c] 1951 set maximum packet and window sizes the same for multiplexed clients 1952 as normal connections; ok markus@ 1953 - dtucker@cvs.openbsd.org 2007/02/21 11:00:05 1954 [sshd.c] 1955 Clear alarm() before restarting sshd on SIGHUP. Without this, if there's 1956 a SIGALRM pending (for SSH1 key regeneration) when sshd is SIGHUP'ed, the 1957 newly exec'ed sshd will get the SIGALRM and not have a handler for it, 1958 and the default action will terminate the listening sshd. Analysis and 1959 patch from andrew at gaul.org. 1960 - dtucker@cvs.openbsd.org 2007/02/22 12:58:40 1961 [servconf.c] 1962 Check activep so Match and GatewayPorts work together; ok markus@ 1963 - ray@cvs.openbsd.org 2007/02/24 03:30:11 1964 [moduli.c] 1965 - strlen returns size_t, not int. 1966 - Pass full buffer size to fgets. 1967 OK djm@, millert@, and moritz@. 1968 196920070219 1970 - (dtucker) OpenBSD CVS Sync 1971 - jmc@cvs.openbsd.org 2007/01/10 13:23:22 1972 [ssh_config.5] 1973 do not use a list for SYNOPSIS; 1974 this is actually part of a larger report sent by eric s. raymond 1975 and forwarded by brad, but i only read half of it. spotted by brad. 1976 - jmc@cvs.openbsd.org 2007/01/12 20:20:41 1977 [ssh-keygen.1 ssh-keygen.c] 1978 more secsh -> rfc 4716 updates; 1979 spotted by wiz@netbsd 1980 ok markus 1981 - dtucker@cvs.openbsd.org 2007/01/17 23:22:52 1982 [readconf.c] 1983 Honour activep for times (eg ServerAliveInterval) while parsing 1984 ssh_config and ~/.ssh/config so they work properly with Host directives. 1985 From mario.lorenz@wincor-nixdorf.com via bz #1275. ok markus@ 1986 - stevesk@cvs.openbsd.org 2007/01/21 01:41:54 1987 [auth-skey.c kex.c ssh-keygen.c session.c clientloop.c] 1988 spaces 1989 - stevesk@cvs.openbsd.org 2007/01/21 01:45:35 1990 [readconf.c] 1991 spaces 1992 - djm@cvs.openbsd.org 2007/01/22 11:32:50 1993 [sftp-client.c] 1994 return error from do_upload() when a write fails. fixes bz#1252: zero 1995 exit status from sftp when uploading to a full device. report from 1996 jirkat AT atlas.cz; ok dtucker@ 1997 - djm@cvs.openbsd.org 2007/01/22 13:06:21 1998 [scp.c] 1999 fix detection of whether we should show progress meter or not: scp 2000 tested isatty(stderr) but wrote the progress meter to stdout. This patch 2001 makes it test stdout. bz#1265 reported by junkmail AT bitsculpture.com; 2002 of dtucker@ 2003 - stevesk@cvs.openbsd.org 2007/02/14 14:32:00 2004 [bufbn.c] 2005 typos in comments; ok jmc@ 2006 - dtucker@cvs.openbsd.org 2007/02/19 10:45:58 2007 [monitor_wrap.c servconf.c servconf.h monitor.c sshd_config.5] 2008 Teach Match how handle config directives that are used before 2009 authentication. This allows configurations such as permitting password 2010 authentication from the local net only while requiring pubkey from 2011 offsite. ok djm@, man page bits ok jmc@ 2012 - (dtucker) [contrib/findssl.sh] Add "which" as a shell function since some 2013 platforms don't have it. Patch from dleonard at vintela.com. 2014 - (dtucker) [openbsd-compat/getrrsetbyname.c] Don't attempt to calloc 2015 an array for signatures when there are none since "calloc(0, n) returns 2016 NULL on some platforms (eg Tru64), which is explicitly permitted by 2017 POSIX. Diagnosis and patch by svallet genoscope.cns.fr. 2018 201920070128 2020 - (djm) [channels.c serverloop.c] Fix so-called "hang on exit" (bz #52) 2021 when closing a tty session when a background process still holds tty 2022 fds open. Great detective work and patch by Marc Aurele La France, 2023 slightly tweaked by me; ok dtucker@ 2024 202520070123 2026 - (dtucker) [openbsd-compat/bsd-snprintf.c] Static declarations for public 2027 library interfaces aren't very helpful. Fix up the DOPR_OUTCH macro 2028 so it works properly and modify its callers so that they don't pre or 2029 post decrement arguments that are conditionally evaluated. While there, 2030 put SNPRINTF_CONST back as it prevents build failures in some 2031 configurations. ok djm@ (for most of it) 2032 203320070122 2034 - (djm) [ssh-rand-helper.8] manpage nits; 2035 from dleonard AT vintela.com (bz#1529) 2036 203720070117 2038 - (dtucker) [packet.c] Re-remove in_systm.h since it's already in includes.h 2039 and multiple including it causes problems on old IRIXes. (It snuck back 2040 in during a sync.) Found (again) by Georg Schwarz. 2041 204220070114 2043 - (dtucker) [ssh-keygen.c] av -> argv to match earlier sync. 2044 - (djm) [openbsd-compat/bsd-snprintf.c] Fix integer overflow in return 2045 value of snprintf replacement, similar to bugs in various libc 2046 implementations. This overflow is not exploitable in OpenSSH. 2047 While I'm fiddling with it, make it a fair bit faster by inlining the 2048 append-char routine; ok dtucker@ 2049 205020070105 2051 - (djm) OpenBSD CVS Sync 2052 - deraadt@cvs.openbsd.org 2006/11/14 19:41:04 2053 [ssh-keygen.c] 2054 use argc and argv not some made up short form 2055 - ray@cvs.openbsd.org 2006/11/23 01:35:11 2056 [misc.c sftp.c] 2057 Don't access buf[strlen(buf) - 1] for zero-length strings. 2058 ``ok by me'' djm@. 2059 - markus@cvs.openbsd.org 2006/12/11 21:25:46 2060 [ssh-keygen.1 ssh.1] 2061 add rfc 4716 (public key format); ok jmc 2062 - djm@cvs.openbsd.org 2006/12/12 03:58:42 2063 [channels.c compat.c compat.h] 2064 bz #1019: some ssh.com versions apparently can't cope with the 2065 remote port forwarding bind_address being a hostname, so send 2066 them an address for cases where they are not explicitly 2067 specified (wildcard or localhost bind). reported by daveroth AT 2068 acm.org; ok dtucker@ deraadt@ 2069 - dtucker@cvs.openbsd.org 2006/12/13 08:34:39 2070 [servconf.c] 2071 Make PermitOpen work with multiple values like the man pages says. 2072 bz #1267 with details from peter at dmtz.com, with & ok djm@ 2073 - dtucker@cvs.openbsd.org 2006/12/14 10:01:14 2074 [servconf.c] 2075 Make "PermitOpen all" first-match within a block to match the way other 2076 options work. ok markus@ djm@ 2077 - jmc@cvs.openbsd.org 2007/01/02 09:57:25 2078 [sshd_config.5] 2079 do not use lists for SYNOPSIS; 2080 from eric s. raymond via brad 2081 - stevesk@cvs.openbsd.org 2007/01/03 00:53:38 2082 [ssh-keygen.c] 2083 remove small dead code; arnaud.lacombe.1@ulaval.ca via Coverity scan 2084 - stevesk@cvs.openbsd.org 2007/01/03 03:01:40 2085 [auth2-chall.c channels.c dns.c sftp.c ssh-keygen.c ssh.c] 2086 spaces 2087 - stevesk@cvs.openbsd.org 2007/01/03 04:09:15 2088 [sftp.c] 2089 ARGSUSED for lint 2090 - stevesk@cvs.openbsd.org 2007/01/03 07:22:36 2091 [sftp-server.c] 2092 spaces 2093 209420061205 2095 - (djm) [auth.c] Fix NULL pointer dereference in fakepw(). Crash would 2096 occur if the server did not have the privsep user and an invalid user 2097 tried to login and both privsep and krb5 auth are disabled; ok dtucker@ 2098 - (djm) [bsd-asprintf.c] Better test for bad vsnprintf lengths; ok dtucker@ 2099 210020061108 2101 - (dtucker) OpenBSD CVS Sync 2102 - markus@cvs.openbsd.org 2006/11/07 13:02:07 2103 [dh.c] 2104 BN_hex2bn returns int; from dtucker@ 2105 |
|
120061107 2 - (dtucker) [sshd.c] Use privsep_pw if we have it, but only require it 3 if we absolutely need it. Pointed out by Corinna, ok djm@ 4 - (dtucker) OpenBSD CVS Sync 5 - markus@cvs.openbsd.org 2006/11/06 21:25:28 6 [auth-rsa.c kexgexc.c kexdhs.c key.c ssh-dss.c sshd.c kexgexs.c 7 ssh-keygen.c bufbn.c moduli.c scard.c kexdhc.c sshconnect1.c dh.c rsa.c] 8 add missing checks for openssl return codes; with & ok djm@ 9 - markus@cvs.openbsd.org 2006/11/07 10:31:31 10 [monitor.c version.h] 11 correctly check for bad signatures in the monitor, otherwise the monitor 12 and the unpriv process can get out of sync. with dtucker@, ok djm@, 13 dtucker@ 14 - (dtucker) [README contrib/{caldera,redhat,contrib}/openssh.spec] Bump 15 versions. | 210620061107 2107 - (dtucker) [sshd.c] Use privsep_pw if we have it, but only require it 2108 if we absolutely need it. Pointed out by Corinna, ok djm@ 2109 - (dtucker) OpenBSD CVS Sync 2110 - markus@cvs.openbsd.org 2006/11/06 21:25:28 2111 [auth-rsa.c kexgexc.c kexdhs.c key.c ssh-dss.c sshd.c kexgexs.c 2112 ssh-keygen.c bufbn.c moduli.c scard.c kexdhc.c sshconnect1.c dh.c rsa.c] 2113 add missing checks for openssl return codes; with & ok djm@ 2114 - markus@cvs.openbsd.org 2006/11/07 10:31:31 2115 [monitor.c version.h] 2116 correctly check for bad signatures in the monitor, otherwise the monitor 2117 and the unpriv process can get out of sync. with dtucker@, ok djm@, 2118 dtucker@ 2119 - (dtucker) [README contrib/{caldera,redhat,contrib}/openssh.spec] Bump 2120 versions. |
16 - (dtucker) [dh.c] Type fix for BN_hex2bn; ok markus@ | |
17 - (dtucker) Release 4.5p1. 18 1920061105 20 - (djm) OpenBSD CVS Sync 21 - otto@cvs.openbsd.org 2006/10/28 18:08:10 22 [ssh.1] 23 correct/expand example of usage of -w; ok jmc@ stevesk@ 24 - markus@cvs.openbsd.org 2006/10/31 16:33:12 --- 2576 unchanged lines hidden (view full) --- 2601 - (tim) [configure.ac] Bug 1078. Fix --without-kerberos5. Reported by 2602 Mike Frysinger. 2603 260420050908 2605 - (tim) [defines.h openbsd-compat/port-uw.c] Add long password support to 2606 OpenServer 6 and add osr5bigcrypt support so when someone migrates 2607 passwords between UnixWare and OpenServer they will still work. OK dtucker@ 2608 | 2121 - (dtucker) Release 4.5p1. 2122 212320061105 2124 - (djm) OpenBSD CVS Sync 2125 - otto@cvs.openbsd.org 2006/10/28 18:08:10 2126 [ssh.1] 2127 correct/expand example of usage of -w; ok jmc@ stevesk@ 2128 - markus@cvs.openbsd.org 2006/10/31 16:33:12 --- 2576 unchanged lines hidden (view full) --- 4705 - (tim) [configure.ac] Bug 1078. Fix --without-kerberos5. Reported by 4706 Mike Frysinger. 4707 470820050908 4709 - (tim) [defines.h openbsd-compat/port-uw.c] Add long password support to 4710 OpenServer 6 and add osr5bigcrypt support so when someone migrates 4711 passwords between UnixWare and OpenServer they will still work. OK dtucker@ 4712 |
2609$Id: ChangeLog,v 1.4588.2.1 2006/11/07 13:02:59 dtucker Exp $ | 4713$Id: ChangeLog,v 1.5095 2008/07/21 08:22:25 djm Exp $ |