blob: c930ad3476eaeedf48f8a9616441cc3d095c1758 [file] [log] [blame]
Darren Tucker4c29dd92003-08-02 20:37:03 +1000120030802
2 - (dtucker) [monitor.h monitor_wrap.h] Remove excess ident tags.
3
Damien Miller7f2d7952003-07-30 14:53:11 +1000420030730
5 - (djm) [auth-pam.c] Don't use crappy APIs like sprintf. Thanks bal
6
Darren Tuckerfbba5a02003-07-26 19:38:30 +1000720030726
8 - (dtucker) [openbsd-compat/xcrypt.c] Fix typo: DISABLED_SHADOW ->
9 DISABLE_SHADOW. Fixes HP-UX compile error.
10
Ben Lindstrom0410e322003-07-24 06:52:13 +00001120030724
12 - (bal) [auth-passwd.c openbsd-compat/Makefile.in openbsd-compat/xcrypt.c
13 openbsd-compat/xcrypt.h] Split off encryption into xcrypt() interface,
14 and isolate shadow password functions. Tested in Solaris, but should
15 not break other platforms too badly (except maybe HP =). Also brings
16 auth-passwd.c into full sync with OpenBSD tree.
17
Darren Tuckeracb98492003-07-23 14:33:10 +10001820030723
19 - (dtucker) [configure.ac] Back out change for bug #620.
20
Darren Tucker394b8c82003-07-19 19:49:45 +10002120030719
22 - (dtucker) [configure.ac] Bug #620: Define BROKEN_GETADDRINFO for
23 Solaris/x86. Patch from jrhett at isite.net.
Darren Tuckerfe0078a2003-07-19 19:52:28 +100024 - (dtucker) OpenBSD CVS Sync
25 - markus@cvs.openbsd.org 2003/07/14 12:36:37
26 [sshd.c]
27 remove undocumented -V option. would be only useful if openssh is used
28 as ssh v1 server for ssh.com's ssh v2.
Darren Tuckere98dfa32003-07-19 19:54:31 +100029 - markus@cvs.openbsd.org 2003/07/16 10:34:53
30 [ssh.c sshd.c]
31 don't exit on multiple -v or -d; ok deraadt@
Darren Tucker538d1802003-07-19 19:56:18 +100032 - markus@cvs.openbsd.org 2003/07/16 10:36:28
33 [sshtty.c]
34 clear IUCLC in enter_raw_mode; from rob@pitman.co.za; ok deraadt@, fgs@
Darren Tucker03a29ba2003-07-19 20:07:45 +100035 - deraadt@cvs.openbsd.org 2003/07/18 01:54:25
36 [scp.c]
37 userid is unsigned, but well, force it anyways; andrushock@korovino.net
Darren Tucker554d5b52003-07-19 20:09:21 +100038 - djm@cvs.openbsd.org 2003/07/19 00:45:53
39 [sftp-int.c]
40 fix sftp filename parsing for arguments with escaped quotes. bz #517;
41 ok markus
Darren Tuckercca1bdb2003-07-19 20:11:54 +100042 - djm@cvs.openbsd.org 2003/07/19 00:46:31
43 [regress/sftp-cmds.sh]
44 regress test for sftp arguments with escaped quotes; ok markus
Darren Tucker394b8c82003-07-19 19:49:45 +100045
Darren Tucker5c6a91a2003-07-14 16:21:44 +10004620030714
47 - (dtucker) [acconfig.h configure.ac port-aix.c] Older AIXes don't declare
48 loginfailed at all, so assume 3-arg loginfailed if not declared.
Darren Tucker30317e32003-07-14 16:26:51 +100049 - (dtucker) [port-aix.h] Work around name collision on AIX for r_type by
50 undef'ing it.
Darren Tuckerfc3454e2003-07-14 16:41:55 +100051 - (dtucker) Bug #543: [configure.ac port-aix.c port-aix.h]
52 Call setauthdb() before loginfailed(), which may load password registry-
Darren Tucker394b8c82003-07-19 19:49:45 +100053 specific functions. Based on patch by cawlfiel at us.ibm.com.
Darren Tucker0abf13b2003-07-14 16:43:42 +100054 - (dtucker) [port-aix.h] Fix prototypes.
Darren Tucker29588612003-07-14 17:28:34 +100055 - (dtucker) OpenBSD CVS Sync
56 - avsm@cvs.openbsd.org 2003/07/09 13:58:19
57 [key.c]
58 minor tweak: when generating the hex fingerprint, give strlcat the full
59 bound to the buffer, and add a comment below explaining why the
60 zero-termination is one less than the bound. markus@ ok
Darren Tucker81a0b372003-07-14 17:31:06 +100061 - markus@cvs.openbsd.org 2003/07/10 14:42:28
62 [packet.c]
63 the 2^(blocksize*2) rekeying limit is too expensive for 3DES,
64 blowfish, etc, so enforce a 1GB limit for small blocksizes.
Darren Tucker1a721152003-07-14 17:32:29 +100065 - markus@cvs.openbsd.org 2003/07/10 20:05:55
66 [sftp.c]
67 sync usage with manpage, add missing -R
Darren Tucker5c6a91a2003-07-14 16:21:44 +100068
Darren Tuckera0c0b632003-07-08 20:52:12 +10006920030708
70 - (dtucker) [acconfig.h auth-passwd.c configure.ac session.c port-aix.[ch]]
71 Include AIX headers for authentication functions and make calls match
Darren Tucker5c6a91a2003-07-14 16:21:44 +100072 prototypes. Test for and handle 3-arg and 4-arg variants of loginfailed.
Darren Tuckerb9aa0a02003-07-08 22:59:59 +100073 - (dtucker) [session.c] Check return value of setpcred().
74 - (dtucker) [auth-passwd.c auth.c session.c sshd.c port-aix.c port-aix.h]
75 Convert aixloginmsg into platform-independant Buffer loginmsg.
Darren Tuckera0c0b632003-07-08 20:52:12 +100076
Darren Tuckerf1159b52003-07-07 19:44:01 +10007720030707
78 - (dtucker) [configure.ac] Bug #600: Check that getrusage is declared before
79 searching libraries for it. Fixes build errors on NCR MP-RAS.
80
Darren Tucker8661b562003-07-06 15:20:46 +10008120030706
82 - (dtucker) [ssh-rand-helper.c loginrec.c]
83 Apply atomicio typing change to these too.
84
Darren Tuckere5327042003-07-03 13:40:44 +10008520030703
86 - (dtucker) OpenBSD CVS Sync
87 - djm@cvs.openbsd.org 2003/06/28 07:48:10
88 [sshd.c]
89 report pidfile creation errors, based on patch from Roumen Petrov;
90 ok markus@
Darren Tucker9f63f222003-07-03 13:46:56 +100091 - deraadt@cvs.openbsd.org 2003/06/28 16:23:06
92 [atomicio.c atomicio.h authfd.c clientloop.c monitor_wrap.c msg.c
93 progressmeter.c scp.c sftp-client.c ssh-keyscan.c ssh.h sshconnect.c
94 sshd.c]
95 deal with typing of write vs read in atomicio
Darren Tuckeredeb1f72003-07-03 13:48:04 +100096 - markus@cvs.openbsd.org 2003/06/29 12:44:38
97 [sshconnect.c]
98 memset 0, not \0; andrushock@korovino.net
Darren Tucker9189ff82003-07-03 13:52:04 +100099 - markus@cvs.openbsd.org 2003/07/02 12:56:34
100 [channels.c]
101 deny dynamic forwarding with -R for v1, too; ok djm@
Darren Tucker46471c92003-07-03 13:55:19 +1000102 - markus@cvs.openbsd.org 2003/07/02 14:51:16
103 [channels.c ssh.1 ssh_config.5]
104 (re)add socks5 suppport to -D; ok djm@
105 now ssh(1) can act both as a socks 4 and socks 5 server and
106 dynamically forward ports.
Darren Tucker3f521e22003-07-03 16:20:42 +1000107 - markus@cvs.openbsd.org 2003/07/02 20:37:48
108 [ssh.c]
109 convert hostkeyalias to lowercase, otherwise uppercase aliases will
110 not match at all; ok henning@
Darren Tucker7a246622003-07-03 20:26:04 +1000111 - markus@cvs.openbsd.org 2003/07/03 08:21:46
112 [regress/dynamic-forward.sh]
113 add socks5; speedup; reformat; based on patch from dtucker@zip.com.au
Darren Tuckere2f2be72003-07-03 20:27:55 +1000114 - markus@cvs.openbsd.org 2003/07/03 08:24:13
115 [regress/Makefile]
116 enable tests for dynamic fwd via socks (-D), uses nc(1)
Darren Tucker0a4f04b2003-07-03 20:37:47 +1000117 - djm@cvs.openbsd.org 2003/07/03 08:09:06
118 [readconf.c readconf.h ssh-keysign.c ssh.c]
119 fix AddressFamily option in config file, from brent@graveland.net;
120 ok markus@
Darren Tuckere5327042003-07-03 13:40:44 +1000121
Damien Miller200d0a72003-06-30 19:21:36 +100012220030630
123 - (djm) Search for support functions necessary to build our
124 getrrsetbyname() replacement. Patch from Roumen Petrov
125
Darren Tuckercc9fd542003-06-29 21:23:37 +100012620030629
Darren Tucker6eb93042003-06-29 21:30:41 +1000127 - (dtucker) [includes.h] Bug #602: move #include of netdb.h to after in.h
128 (fixes compiler warnings on Solaris 2.5.1).
129 - (dtucker) [configure.ac] Add sanity test after system-dependant compiler
130 flag modifications.
Darren Tuckercc9fd542003-06-29 21:23:37 +1000131
Darren Tucker674f71d2003-06-28 12:33:12 +100013220030628
Damien Miller4a8e2842003-06-28 18:02:47 +1000133 - (djm) Bug #591: use PKCS#15 private key label as a comment in case
134 of OpenSC. Report and patch from larsch@trustcenter.de
Damien Miller723569b2003-06-28 18:08:16 +1000135 - (djm) Bug #593: Sanity check OpenSC card reader number; patch from
136 aj@dungeon.inka.de
Darren Tucker674f71d2003-06-28 12:33:12 +1000137 - (dtucker) OpenBSD CVS Sync
138 - markus@cvs.openbsd.org 2003/06/23 09:02:44
139 [ssh_config.5]
140 document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@
Darren Tucker502d3842003-06-28 12:38:01 +1000141 - markus@cvs.openbsd.org 2003/06/24 08:23:46
142 [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
143 monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
144 int -> u_int; ok djm@, deraadt@, mouring@
Darren Tuckera6612d42003-06-28 12:39:03 +1000145 - miod@cvs.openbsd.org 2003/06/25 22:39:36
146 [sftp-server.c]
147 Typo police: attribute is better written with an 'r'.
Darren Tuckera99c1b72003-06-28 12:40:12 +1000148 - markus@cvs.openbsd.org 2003/06/26 20:08:33
149 [readconf.c]
150 do not dump core for 'ssh -o proxycommand host'; ok deraadt@
Darren Tuckerb611c122003-06-28 12:42:09 +1000151 - (dtucker) [regress/dynamic-forward.sh] Import new regression test.
Darren Tuckera3020db2003-06-28 12:54:33 +1000152 - (dtucker) [configure.ac] Bug #570: Have ./configure --enable-FEATURE
153 actually enable the feature, for those normally disabled. Patch by
154 openssh (at) roumenpetrov.info.
Darren Tucker674f71d2003-06-28 12:33:12 +1000155
Darren Tuckera0472e02003-06-24 20:22:09 +100015620030624
157 - (dtucker) Have configure refer the user to config.log and
158 contrib/findssl.sh for OpenSSL header/library mismatches.
159
Darren Tuckere0194e52003-06-22 12:33:27 +100016020030622
Darren Tuckera251f802003-06-22 20:45:15 +1000161 - (dtucker) OpenBSD CVS Sync
Darren Tuckere0194e52003-06-22 12:33:27 +1000162 - markus@cvs.openbsd.org 2003/06/21 09:14:05
Darren Tuckera251f802003-06-22 20:45:15 +1000163 [regress/reconfigure.sh]
Darren Tuckere0194e52003-06-22 12:33:27 +1000164 missing $SUDO; from dtucker@zip.com.au
Darren Tucker89b249b2003-06-22 21:22:04 +1000165 - markus@cvs.openbsd.org 2003/06/18 11:28:11
Darren Tuckera251f802003-06-22 20:45:15 +1000166 [ssh-rsa.c]
167 backout last change, since it violates pkcs#1
168 switch to share/misc/license.template
Darren Tucker91cf2612003-06-22 20:46:53 +1000169 - djm@cvs.openbsd.org 2003/06/20 05:47:58
170 [sshd_config.5]
171 sync description of protocol 2 cipher proposal; ok markus
Darren Tuckerb8dae8e2003-06-22 20:48:45 +1000172 - djm@cvs.openbsd.org 2003/06/20 05:48:21
173 [sshd_config]
174 sync some implemented options; ok markus@
Darren Tuckere0194e52003-06-22 12:33:27 +1000175 - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
Darren Tucker6cf1a2c2003-06-22 18:32:10 +1000176 - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
177 testing its value.
Darren Tuckere0194e52003-06-22 12:33:27 +1000178
Damien Miller469954d2003-06-18 20:25:33 +100017920030618
180 - (djm) OpenBSD CVS Sync
181 - markus@cvs.openbsd.org 2003/06/12 07:57:38
182 [monitor.c sshlogin.c sshpty.c]
183 typos; dtucker at zip.com.au
Damien Miller116aabb2003-06-18 20:26:13 +1000184 - djm@cvs.openbsd.org 2003/06/12 12:22:47
185 [LICENCE]
186 mention more copyright holders; ok markus@
Damien Millerb2cdcb52003-06-18 20:26:34 +1000187 - nino@cvs.openbsd.org 2003/06/12 15:34:09
188 [scp.c]
189 Typo. Ok markus@.
Damien Miller56a0bb02003-06-18 20:28:40 +1000190 - markus@cvs.openbsd.org 2003/06/12 19:12:03
191 [scard.c scard.h ssh-agent.c ssh.c]
192 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
Damien Miller8c1d2e32003-06-18 20:29:01 +1000193 - markus@cvs.openbsd.org 2003/06/16 08:22:35
194 [ssh-rsa.c]
195 make sure the signature has at least the expected length (don't
196 insist on len == hlen + oidlen, since this breaks some smartcards)
197 bugzilla #592; ok djm@
Damien Miller80163e12003-06-18 20:29:18 +1000198 - markus@cvs.openbsd.org 2003/06/16 10:22:45
199 [ssh-add.c]
200 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
Damien Miller0275b522003-06-18 20:29:35 +1000201 - markus@cvs.openbsd.org 2003/06/17 18:14:23
202 [cipher-ctr.c]
203 use license from /usr/share/misc/license.template for new code
Darren Tuckerfc8a7ea2003-06-18 22:18:57 +1000204 - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
205 Import new regression tests from OpenBSD
Darren Tucker3a222ac2003-06-18 22:21:33 +1000206 - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
Darren Tuckerd57a76e2003-06-18 22:32:51 +1000207 - (dtucker) OpenBSD CVS Sync (regress/)
208 - markus@cvs.openbsd.org 2003/04/02 12:21:13
209 [Makefile]
210 enable rekey test
Darren Tuckera4040f52003-06-18 22:35:11 +1000211 - djm@cvs.openbsd.org 2003/04/04 09:34:22
212 [Makefile sftp-cmds.sh]
213 More regression tests, including recent directory rename bug; ok markus@
Darren Tuckeree5f83d2003-06-18 22:36:48 +1000214 - markus@cvs.openbsd.org 2003/05/14 22:08:27
215 [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
216 test against some new commerical versions
Darren Tuckerc43362c2003-06-18 22:41:41 +1000217 - mouring@cvs.openbsd.org 2003/05/15 04:07:12
218 [sftp-cmds.sh]
219 Advanced put/get testing for sftp. OK @djm
Darren Tucker76437602003-06-18 22:43:13 +1000220 - markus@cvs.openbsd.org 2003/06/12 15:40:01
221 [try-ciphers.sh]
222 add ctr
Darren Tucker50cea672003-06-18 22:45:34 +1000223 - markus@cvs.openbsd.org 2003/06/12 15:43:32
224 [Makefile]
225 test -HUP; dtucker at zip.com.au
Damien Miller469954d2003-06-18 20:25:33 +1000226
Damien Miller53950b62003-06-14 08:43:22 +100022720030614
228 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
229
Damien Millerf1ce5052003-06-11 22:04:39 +100023020030611
Damien Miller141efa72003-06-11 22:50:56 +1000231 - (djm) Mention portable copyright holders in LICENSE
Damien Milleraf639512003-06-11 22:51:32 +1000232 - (djm) Put licenses on substantial header files
Damien Miller4bfeb142003-06-11 22:08:36 +1000233 - (djm) Sync LICENSE against OpenBSD
Damien Millerf1ce5052003-06-11 22:04:39 +1000234 - (djm) OpenBSD CVS Sync
235 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
236 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
237 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
238 - section reorder
239 - COMPATIBILITY merge
240 - macro cleanup
241 - kill whitespace at EOL
242 - new sentence, new line
243 ssh pages ok markus@
Damien Miller2b92d322003-06-11 22:05:06 +1000244 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
245 [packet.c progressmeter.c]
246 mostly ansi cleanup; pval ok
Damien Miller7392ae62003-06-11 22:05:25 +1000247 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
248 [sshconnect.c]
249 clean up check_host_key() and improve SSHFP feedback. ok markus@
Damien Miller0e1b9372003-06-11 22:05:45 +1000250 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
251 [dns.c]
252 sync with check_host_key() change
Damien Millerd94f20d2003-06-11 22:06:33 +1000253 - djm@cvs.openbsd.org 2003/06/11 11:18:38
254 [authfd.c authfd.h ssh-add.c ssh-agent.c]
255 make agent constraints (lifetime, confirm) work with smartcard keys;
256 ok markus@
Damien Millerf1ce5052003-06-11 22:04:39 +1000257
258
Damien Millerc18c06e2003-06-10 18:55:22 +100025920030609
260 - (djm) Sync README.smartcard with OpenBSD -current
Damien Miller78f2e5c2003-06-10 21:09:09 +1000261 - (djm) Re-merge OpenSC info into README.smartcard
Damien Millerc18c06e2003-06-10 18:55:22 +1000262
Darren Tucker400b8782003-06-06 10:46:04 +100026320030606
264 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
265
Damien Miller10eac0c2003-06-05 09:48:32 +100026620030605
267 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
268 canohost.c changes.
Damien Miller5fe46a42003-06-05 09:53:31 +1000269 - (djm) Implement paranoid priv dropping checks, based on:
270 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
271 Proceedings of USENIX Security Symposium 2002
Damien Millerb95bb7f2003-06-05 10:04:12 +1000272 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
Damien Millerc28e38d2003-06-05 18:52:47 +1000273 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
Damien Millerf49078d2003-06-05 18:53:42 +1000274 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
275 Patch from larsch@trustcenter.de
Damien Miller76b5c8a2003-06-05 19:19:35 +1000276 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
277 Patch from larsch@trustcenter.de
Darren Tucker4aff13f2003-06-05 19:37:30 +1000278 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
Darren Tucker881753b2003-06-05 22:20:11 +1000279 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
Damien Miller10eac0c2003-06-05 09:48:32 +1000280
Damien Miller9fc7c692003-06-04 22:50:54 +100028120030604
Damien Miller865173e2003-06-04 19:06:59 +1000282 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
283 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
Damien Miller485397c2003-06-04 19:15:10 +1000284 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
Damien Miller2527f572003-06-04 19:22:06 +1000285 Patch from larsch@trustcenter.de; ok markus@
286 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
287 larsch@trustcenter.de; ok markus@
Damien Miller941ac452003-06-04 20:31:53 +1000288 - (djm) OpenBSD CVS Sync
289 - djm@cvs.openbsd.org 2003/06/04 08:25:18
290 [sshconnect.c]
291 disable challenge/response and keyboard-interactive auth methods
292 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
293 bz #580; ok markus@
Damien Miller31b3a0a2003-06-04 20:32:12 +1000294 - djm@cvs.openbsd.org 2003/06/04 10:23:48
295 [sshd.c]
296 remove duplicated group-dropping code; ok markus@
Damien Miller9fc7c692003-06-04 22:50:54 +1000297 - djm@cvs.openbsd.org 2003/06/04 12:03:59
298 [serverloop.c]
299 remove bitrotten commet; ok markus@
Damien Miller65d1f572003-06-04 22:51:08 +1000300 - djm@cvs.openbsd.org 2003/06/04 12:18:49
301 [scp.c]
302 ansify; ok markus@
Damien Millerb69aaa82003-06-04 22:51:24 +1000303 - djm@cvs.openbsd.org 2003/06/04 12:40:39
304 [scp.c]
305 kill ssh process upon receipt of signal, bz #241.
306 based on patch from esb AT hawaii.edu; ok markus@
Damien Millercc685c12003-06-04 22:51:38 +1000307 - djm@cvs.openbsd.org 2003/06/04 12:41:22
308 [sftp.c]
309 kill ssh process on receipt of signal; ok markus@
Damien Miller4c322482003-06-04 22:12:17 +1000310 - (djm) Update to fix of bug #584: lock card before return.
311 From larsch@trustcenter.de
Damien Miller0cbb9de2003-06-04 22:56:15 +1000312 - (djm) Always use mysignal() for SIGALRM
Damien Miller865173e2003-06-04 19:06:59 +1000313
31420030603
Damien Miller35276252003-06-03 10:14:28 +1000315 - (djm) Replace setproctitle replacement with code derived from
316 UCB sendmail
Damien Miller3a961dc2003-06-03 10:25:48 +1000317 - (djm) OpenBSD CVS Sync
318 - markus@cvs.openbsd.org 2003/06/02 09:17:34
319 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
320 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
321 [sshd_config.5]
322 deprecate VerifyReverseMapping since it's dangerous if combined
323 with IP based access control as noted by Mike Harding; replace with
324 a UseDNS option, UseDNS is on by default and includes the
325 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
326 ok deraadt@, djm@
Damien Millerdafb12e2003-06-03 13:06:18 +1000327 - millert@cvs.openbsd.org 2003/06/03 02:56:16
328 [scp.c]
329 Remove the advertising clause in the UCB license which Berkeley
330 rescinded 22 July 1999. Proofed by myself and Theo.
Damien Miller3a961dc2003-06-03 10:25:48 +1000331 - (djm) Fix portable-specific uses of verify_reverse_mapping too
Damien Miller329638e2003-06-03 12:12:50 +1000332 - (djm) Sync openbsd-compat with OpenBSD CVS.
Damien Millerd311c4e2003-06-03 13:09:16 +1000333 - No more 4-term BSD licenses in linked code
Darren Tuckereb28cbc2003-06-03 12:45:27 +1000334 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
Damien Miller35276252003-06-03 10:14:28 +1000335
Damien Millerf3bff942003-06-02 12:13:40 +100033620030602
337 - (djm) Fix segv from bad reordering in auth-pam.c
Damien Millerf2e3e9d2003-06-02 12:15:54 +1000338 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
339 clobber
Tim Rice237ca4a2003-06-01 19:25:27 -0700340 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
341 CVS ID.
Damien Millerdba59502003-06-02 17:43:19 +1000342 - (djm) Remove "noip6" option from RedHat spec file. This may now be
343 set at runtime using AddressFamily option.
Damien Millerdcc83122003-06-02 18:57:59 +1000344 - (djm) Fix use of macro before #define in cipher-aes.c
Damien Millerf4684422003-06-02 18:59:08 +1000345 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
Damien Millerab2db412003-06-02 19:09:13 +1000346 - (djm) OpenBSD CVS Sync
347 - djm@cvs.openbsd.org 2003/05/26 12:54:40
348 [sshconnect.c]
349 fix format strings; ok markus@
Damien Miller61d36802003-06-02 19:09:48 +1000350 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
351 [sshd.c uidswap.c]
352 seteuid and setegid; markus ok
Damien Millereacbb4f2003-06-02 19:10:41 +1000353 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
354 [ssh_config.5]
355 VerifyHostKeyDNS is v2 only. ok markus@
Damien Millerf3bff942003-06-02 12:13:40 +1000356
Darren Tucker3cb84e52003-05-30 16:58:22 +100035720030530
358 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
359 roumenpetrov.info
Darren Tucker2972d6c2003-05-30 17:43:42 +1000360 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
Darren Tucker3cb84e52003-05-30 16:58:22 +1000361
Damien Millera6a7c192003-05-26 21:36:13 +100036220030526
363 - (djm) Avoid auth2-chall.c warning when compiling without
364 PAM, BSD_AUTH and SKEY
365
Damien Millerc11fe252003-05-25 14:38:02 +100036620030525
367- (djm) OpenBSD CVS Sync
368 - djm@cvs.openbsd.org 2003/05/24 09:02:22
369 [log.c]
370 pass logged data through strnvis; ok markus
Damien Miller04bd8b02003-05-25 14:38:33 +1000371 - djm@cvs.openbsd.org 2003/05/24 09:30:40
372 [authfile.c monitor.c sftp-common.c sshpty.c]
373 cast some types for printing; ok markus@
Damien Millerc11fe252003-05-25 14:38:02 +1000374
Darren Tucker60145782003-05-24 11:41:16 +100037520030524
376 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
377
Damien Millerd419bda2003-05-23 18:43:40 +100037820030523
379 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
380 encoding (which encodes many more characters)
Damien Miller50677922003-05-23 18:44:04 +1000381 - OpenBSD CVS Sync
382 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
383 [sftp.1]
384 - new sentence, new line
385 - added .Xr's
386 - typos
387 ok djm@
Damien Millerfbf486b2003-05-23 18:44:23 +1000388 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
389 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
390 new sentence, new line
Damien Miller08293fa2003-05-23 18:44:41 +1000391 - djm@cvs.openbsd.org 2003/05/23 08:29:30
392 [sshconnect.c]
393 fix leak; ok markus@
Damien Millerd419bda2003-05-23 18:43:40 +1000394
Damien Miller74a34422003-05-20 09:24:17 +100039520030520
396 - (djm) OpenBSD CVS Sync
397 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
398 [log.c]
399 use syslog_r() in a signal handler called place; markus ok
Damien Miller1340ec22003-05-20 09:24:42 +1000400 - (djm) Configure logic to detect syslog_r and friends
Damien Miller74a34422003-05-20 09:24:17 +1000401
Damien Millereb0e9692003-05-19 11:28:44 +100040220030519
403 - (djm) Sync auth-pam.h with what we actually implement
404
40520030518
Damien Miller25d93422003-05-18 20:45:47 +1000406 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
407 recent merge
Damien Miller20a8f972003-05-18 20:50:30 +1000408 - (djm) OpenBSD CVS Sync
409 - djm@cvs.openbsd.org 2003/05/16 03:27:12
410 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
411 add AddressFamily option to ssh_config (like -4, -6 on commandline).
412 Portable bug #534; ok markus@
Damien Millera9825782003-05-18 20:53:10 +1000413 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
414 [auth-rhosts.c]
415 just in case, put numbers to sscanf %s arg.
Damien Millerf5399c22003-05-18 20:53:59 +1000416 - markus@cvs.openbsd.org 2003/05/17 04:27:52
417 [cipher.c cipher-ctr.c myproposal.h]
418 experimental support for aes-ctr modes from
419 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
420 ok djm@
Damien Miller7e1bbc52003-05-18 20:52:40 +1000421 - (djm) Remove IPv4 by default hack now that we can specify AF in config
Damien Miller0b8e9002003-05-18 21:44:07 +1000422 - (djm) Tidy and trim TODO
Damien Millere323df62003-05-18 22:24:09 +1000423 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
Damien Miller31741252003-05-19 00:13:38 +1000424 - (djm) Big KNF on openbsd-compat/
Damien Miller5b5ca192003-05-19 00:50:02 +1000425 - (djm) KNF on md5crypt.[ch]
426 - (djm) KNF on auth-sia.[ch]
Damien Miller25d93422003-05-18 20:45:47 +1000427
42820030517
Ben Lindstrom4c9e9ab2003-05-18 01:22:43 +0000429 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
430
Damien Miller6e80c362003-05-16 11:38:00 +100043120030516
432 - (djm) OpenBSD CVS Sync
433 - djm@cvs.openbsd.org 2003/05/15 13:52:10
434 [ssh.c]
435 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
436 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
Damien Millerf9b3feb2003-05-16 11:38:32 +1000437 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
438 [readconf.c servconf.c]
439 warn for unsupported config option. ok markus@
Damien Miller99b4b882003-05-16 11:38:46 +1000440 - markus@cvs.openbsd.org 2003/05/15 14:09:21
441 [auth2-krb5.c]
442 fix 64bit issue; report itojun@
Damien Millerb78d5eb2003-05-16 11:39:04 +1000443 - djm@cvs.openbsd.org 2003/05/15 14:55:25
444 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
445 add a ConnectTimeout option to ssh, based on patch from
446 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
Damien Miller6ac2c482003-05-16 11:42:35 +1000447 - (djm) Add warning for UsePAM when built without PAM support
Damien Millerc46b6bc2003-05-16 15:51:44 +1000448 - (djm) A few type mismatch fixes from Bug #565
Damien Millere27c6cc2003-05-16 18:21:01 +1000449 - (djm) Guard free_pam_environment against NULL argument. Works around
450 HP/UX PAM problems debugged by dtucker
Damien Miller6e80c362003-05-16 11:38:00 +1000451
Damien Millerabbae982003-05-15 10:16:21 +100045220030515
453 - (djm) OpenBSD CVS Sync
454 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
455 [ssh-agent.1]
456 setup -> set up;
457 from wiz@netbsd
Damien Miller37876e92003-05-15 10:19:46 +1000458 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
459 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
460 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
461 add experimental support for verifying hos keys using DNS as described
462 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
463 ok markus@ and henning@
Damien Miller54c45982003-05-15 10:20:13 +1000464 - markus@cvs.openbsd.org 2003/05/14 22:24:42
465 [clientloop.c session.c ssh.1]
466 allow to send a BREAK to the remote system; ok various
Damien Millerf842fcb2003-05-15 12:01:28 +1000467 - markus@cvs.openbsd.org 2003/05/15 00:28:28
468 [sshconnect2.c]
469 cleanup unregister of per-method packet handlers; ok djm@
Damien Miller2aa0ab42003-05-15 12:05:28 +1000470 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
471 [readconf.c readconf.h servconf.c servconf.h]
472 always parse kerberos options. ok djm@ markus@
Damien Millerb0622652003-05-15 13:27:28 +1000473 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
474 [dns.c]
475 add missing freerrset
Damien Miller3a3261f2003-05-15 13:37:19 +1000476 - markus@cvs.openbsd.org 2003/05/15 03:08:29
477 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
478 split out custom EVP ciphers
Damien Millered12a262003-05-15 13:37:43 +1000479 - djm@cvs.openbsd.org 2003/05/15 03:10:52
480 [ssh-keygen.c]
481 avoid warning; ok jakob@
Damien Miller4962ed62003-05-15 13:48:59 +1000482 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
483 [sftp-int.c]
484 Make put/get (globed and nonglobed) code more consistant. OK djm@
Damien Miller19c8f2b2003-05-15 13:49:21 +1000485 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
Damien Miller34bb5672003-05-15 13:49:58 +1000486 [sftp-int.c sftp.c]
Damien Miller19c8f2b2003-05-15 13:49:21 +1000487 Teach ls how to display multiple column display and allow users
488 to return to single column format via 'ls -1'. OK @djm
Damien Miller156cbe82003-05-15 14:16:41 +1000489 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
490 [readconf.c servconf.c]
491 disable kerberos when not supported. ok markus@
Damien Miller46a7b402003-05-15 14:17:28 +1000492 - markus@cvs.openbsd.org 2003/05/15 04:08:41
493 [ssh.1]
494 ~B is ssh2 only
Damien Miller2aa0ab42003-05-15 12:05:28 +1000495 - (djm) Always parse UsePAM
Damien Miller7abe09b2003-05-15 10:53:49 +1000496 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
Damien Millerd9ec3702003-05-15 12:27:08 +1000497 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
Damien Millera47f5262003-05-15 13:23:07 +1000498 - (djm) Tidy Makefile clean targets
Damien Miller5975cf12003-05-15 13:23:36 +1000499 - (djm) Adapt README.dns for portable
Damien Millerffda4cb2003-05-15 13:57:51 +1000500 - (djm) Avoid uuencode.c warnings
Damien Miller156cbe82003-05-15 14:16:41 +1000501 - (djm) Enable UsePAM when built --with-pam
Damien Millerb10f1cd2003-05-15 20:55:27 +1000502 - (djm) Only build getrrsetbyname replacement when using --with-dns
Damien Miller04cb5362003-05-15 21:29:10 +1000503 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
504 correctly)
Damien Millereff041d2003-05-15 21:33:46 +1000505 - (djm) Bug #444: Wrong paths after reconfigure
Darren Tucker5d0ccf32003-05-15 21:42:59 +1000506 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
Damien Miller04cb5362003-05-15 21:29:10 +1000507
Damien Miller1a27a1e2003-05-14 10:27:09 +100050820030514
509 - (djm) Bug #117: Don't lie to PAM about username
Damien Millerd5580922003-05-14 13:40:06 +1000510 - (djm) RCSID sync w/ OpenBSD
Damien Millerc652cac2003-05-14 13:40:54 +1000511 - (djm) OpenBSD CVS Sync
512 - djm@cvs.openbsd.org 2003/04/09 12:00:37
513 [readconf.c]
514 strip trailing whitespace from config lines before parsing.
515 Fixes bz 528; ok markus@
Damien Millera201bb32003-05-14 13:41:23 +1000516 - markus@cvs.openbsd.org 2003/04/12 10:13:57
517 [cipher.c]
518 hide cipher details; ok djm@
Damien Milleref095ce2003-05-14 13:41:39 +1000519 - markus@cvs.openbsd.org 2003/04/12 10:15:36
520 [misc.c]
521 debug->debug2
Damien Miller44e72a72003-05-14 13:42:08 +1000522 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
523 [ssh.1]
524 document -V switch, fix wording; ok markus@
Damien Miller2372ace2003-05-14 13:42:23 +1000525 - markus@cvs.openbsd.org 2003/04/14 14:17:50
526 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
527 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
Damien Miller8ce778a2003-05-14 13:43:25 +1000528 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
529 [sftp-int.c]
530 Missing globfree(&g) in process_put() spotted by Vince Brimhall
531 <VBrimhall@novell.com>. ok@ Theo
532 - markus@cvs.openbsd.org 2003/04/16 14:35:27
533 [auth.h]
534 document struct Authctxt; with solar
Damien Millerea5ade22003-05-14 13:43:53 +1000535 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
536 [ssh-keyscan.c]
537 -t in usage(); rogier@quaak.org
Damien Miller049245d2003-05-14 13:44:42 +1000538 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
539 [sshd.8 sshd_config.5]
540 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
541 Bug #550 and * escaping suggested by jmc@.
Damien Miller31554322003-05-14 13:44:58 +1000542 - david@cvs.openbsd.org 2003/04/30 20:41:07
543 [sshd.8]
544 fix invalid .Pf macro usage introduced in previous commit
545 ok jmc@ mouring@
Damien Millerdb274722003-05-14 13:45:22 +1000546 - markus@cvs.openbsd.org 2003/05/11 16:56:48
547 [authfile.c ssh-keygen.c]
548 change key_load_public to try to read a public from:
549 rsa1 private or rsa1 public and ssh2 keys.
550 this makes ssh-keygen -e fail for ssh1 keys more gracefully
551 for example; report from itojun (netbsd pr 20550).
Damien Millerb1ca8bb2003-05-14 13:45:42 +1000552 - markus@cvs.openbsd.org 2003/05/11 20:30:25
553 [channels.c clientloop.c serverloop.c session.c ssh.c]
554 make channel_new() strdup the 'remote_name' (not the caller); ok theo
Damien Miller280ecfb2003-05-14 13:46:00 +1000555 - markus@cvs.openbsd.org 2003/05/12 16:55:37
556 [sshconnect2.c]
557 for pubkey authentication try the user keys in the following order:
558 1. agent keys that are found in the config file
559 2. other agent keys
560 3. keys that are only listed in the config file
561 this helps when an agent has many keys, where the server might
562 close the connection before the correct key is used. report & ok pb@
Damien Miller93506352003-05-14 13:46:33 +1000563 - markus@cvs.openbsd.org 2003/05/12 18:35:18
564 [ssh-keyscan.1]
565 typo: DSA keys are of type ssh-dss; Brian Poole
Damien Millerfb7508e2003-05-14 13:47:07 +1000566 - markus@cvs.openbsd.org 2003/05/14 00:52:59
567 [ssh2.h]
568 ranges for per auth method messages
569 - djm@cvs.openbsd.org 2003/05/14 01:00:44
570 [sftp.1]
571 emphasise the batchmode functionality and make reference to pubkey auth,
572 both of which are FAQs; ok markus@
Damien Miller3ab496b2003-05-14 13:47:37 +1000573 - markus@cvs.openbsd.org 2003/05/14 02:15:47
574 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
575 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
576 server interops with commercial client; ok jakob@ djm@
Damien Millerd6ead282003-05-14 19:30:38 +1000577 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
578 [sftp.1]
579 - better formatting in SYNOPSIS
580 - whitespace at EOL
581 ok djm@
Damien Millerbe64d432003-05-14 19:31:12 +1000582 - markus@cvs.openbsd.org 2003/05/14 08:57:49
583 [monitor.c]
584 http://bugzilla.mindrot.org/show_bug.cgi?id=560
585 Privsep child continues to run after monitor killed.
586 Pass monitor signals through to child; Darren Tucker
Damien Miller9c617692003-05-14 14:31:11 +1000587 - (djm) Make portable build with MIT krb5 (some issues remain)
Damien Miller4e448a32003-05-14 15:11:48 +1000588 - (djm) Add new UsePAM configuration directive to allow runtime control
589 over usage of PAM. This allows non-root use of sshd when built with
590 --with-pam
Damien Miller9d507da2003-05-14 15:31:12 +1000591 - (djm) Die screaming if start_pam() is called when UsePAM=no
Damien Miller4d995192003-05-14 19:23:56 +1000592 - (djm) Avoid KrbV leak for MIT Kerberos
Darren Tuckerabef5622003-05-14 21:48:51 +1000593 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
Damien Miller1ea71662003-05-14 22:33:58 +1000594 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
Damien Miller1a27a1e2003-05-14 10:27:09 +1000595
Damien Miller75d3b052003-05-12 18:15:49 +100059620030512
597 - (djm) Redhat spec: Don't install profile.d scripts when not
598 building with GNOME/GTK askpass (patch from bet@rahul.net)
599
Darren Tuckere8831092003-05-10 16:48:23 +100060020030510
601 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
602 "make install". Patch by roth@feep.net.
Darren Tuckerc437cda2003-05-10 17:05:46 +1000603 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
604 problem on Linux (fixes "could not set controlling tty" errors).
Damien Miller4f9f42a2003-05-10 19:28:02 +1000605 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
606 proper challenge-response module
Damien Miller0d8b7922003-05-10 23:42:12 +1000607 - (djm) 2-clause license on loginrec.c, with permission from
608 andre@ae-35.com
Darren Tuckere8831092003-05-10 16:48:23 +1000609
Darren Tucker70a08cd2003-05-04 10:41:20 +100061020030504
Darren Tuckerac279282003-05-04 11:36:25 +1000611 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
612 Patch from vinschen@redhat.com.
Darren Tucker70a08cd2003-05-04 10:41:20 +1000613
Darren Tucker04cc5382003-05-03 07:32:56 +100061420030503
615 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
616 by wendyp@cray.com.
617
Darren Tucker3c016542003-05-02 20:48:21 +100061820030502
619 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
620 privsep should now work.
Darren Tucker97363a82003-05-02 23:42:25 +1000621 - (dtucker) Move handling of bad password authentications into a platform
Darren Tuckerbd570d72003-05-02 23:50:09 +1000622 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
Darren Tucker3c016542003-05-02 20:48:21 +1000623
Damien Millereab4bae2003-04-29 23:22:40 +100062420030429
625 - (djm) Add back radix.o (used by AFS support), after it went missing from
626 Makefile many moons ago
627 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
628 - (djm) Fix blibpath specification for AIX/gcc
629 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
630
Ben Lindstrom0e7f4362003-04-28 23:30:43 +000063120030428
632 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
633 hacked code.
634
Ben Lindstrom93b6b772003-04-27 17:55:33 +000063520030427
636 - (bal) Bug #541: return; was dropped by mistake. Reported by
637 furrier@iglou.com
Ben Lindstrom796b9a52003-04-27 18:01:37 +0000638 - (bal) Since we don't support platforms lacking u_int_64. We may
639 as well clean out some of those evil #ifdefs
Ben Lindstrom683036e2003-04-27 18:41:30 +0000640 - (bal) auth1.c minor resync while looking at the code.
Ben Lindstromf50ad1f2003-04-27 18:44:31 +0000641 - (bal) auth2.c same changed as above.
Ben Lindstrom93b6b772003-04-27 17:55:33 +0000642
Damien Millerd186d742003-04-09 19:40:33 +100064320030409
644 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
645 from matth@eecs.berkeley.edu
Damien Millera92a5892003-04-09 19:41:25 +1000646 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
Damien Millera5539d22003-04-09 20:50:06 +1000647 - (djm) OpenBSD CVS Sync
648 - markus@cvs.openbsd.org 2003/04/02 09:48:07
649 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
650 [readconf.h serverloop.c sshconnect2.c]
651 reapply rekeying chage, tested by henning@, ok djm@
Damien Miller703ced52003-04-09 20:50:26 +1000652 - markus@cvs.openbsd.org 2003/04/02 14:36:26
653 [ssh-keysign.c]
654 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
Damien Miller3bed1912003-04-09 20:50:59 +1000655 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
656 [progressmeter.c]
657 $OpenBSD$
658 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
659 [progressmeter.c]
660 remove $OpenBSD$, as other *.c does not have it.
Damien Millerb1ecd9c2003-04-09 20:51:24 +1000661 - markus@cvs.openbsd.org 2003/04/07 08:29:57
662 [monitor_wrap.c]
663 typo: get correct counters; introduced during rekeying change.
Damien Millera0898b82003-04-09 21:05:52 +1000664 - millert@cvs.openbsd.org 2003/04/07 21:58:05
665 [progressmeter.c]
666 The UCB copyright here is incorrect. This code did not originate
667 at UCB, it was written by Luke Mewburn. Updated the copyright at
668 the author's request. markus@ OK
669 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
670 [*.c *.h]
671 rename log() into logit() to avoid name conflict. markus ok, from
672 netbsd
673 - (djm) XXX - Performed locally using:
674 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
Damien Millerbf2a0172003-04-09 21:07:14 +1000675 - hin@cvs.openbsd.org 2003/04/09 08:23:52
676 [servconf.c]
677 Don't include <krb.h> when compiling with Kerberos 5 support
Damien Millera0898b82003-04-09 21:05:52 +1000678 - (djm) Fix up missing include for packet.c
Damien Miller2a3f20e2003-04-09 21:12:00 +1000679 - (djm) Fix missed log => logit occurance (reference by function pointer)
Damien Millerd186d742003-04-09 19:40:33 +1000680
Ben Lindstromc8a49d72003-04-02 15:18:22 +000068120030402
682 - (bal) if IP_TOS is not found or broken don't try to compile in
683 packet_set_tos() function call. bug #527
684
Damien Miller495dca32003-04-01 21:42:14 +100068520030401
686 - (djm) OpenBSD CVS Sync
687 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
688 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
689 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
690 - killed whitespace
691 - new sentence new line
692 - .Bk for arguments
693 ok markus@
Damien Miller2dc074e2003-04-01 21:43:39 +1000694 - markus@cvs.openbsd.org 2003/04/01 10:10:23
695 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
696 [readconf.h serverloop.c sshconnect2.c]
697 rekeying bugfixes and automatic rekeying:
698 * both client and server rekey _automatically_
699 (a) after 2^31 packets, because after 2^32 packets
700 the sequence number for packets wraps
701 (b) after 2^(blocksize_in_bits/4) blocks
702 (see: draft-ietf-secsh-newmodes-00.txt)
703 (a) and (b) are _enabled_ by default, and only disabled for known
704 openssh versions, that don't support rekeying properly.
705 * client option 'RekeyLimit'
706 * do not reply to requests during rekeying
707 - markus@cvs.openbsd.org 2003/04/01 10:22:21
708 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
709 [readconf.h serverloop.c sshconnect2.c]
710 backout rekeying changes (for 3.6.1)
Damien Millerd3209042003-04-01 21:44:37 +1000711 - markus@cvs.openbsd.org 2003/04/01 10:31:26
712 [compat.c compat.h kex.c]
713 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
714 tested by ho@ and myself
Damien Miller13c1c7a2003-04-01 21:45:26 +1000715 - markus@cvs.openbsd.org 2003/04/01 10:56:46
716 [version.h]
717 3.6.1
Damien Millerb80e52a2003-04-01 21:46:53 +1000718 - (djm) Crank spec file versions
Damien Millera0ab6692003-04-01 21:47:16 +1000719 - (djm) Release 3.6.1p1
Damien Miller495dca32003-04-01 21:42:14 +1000720
Damien Millerb3207e82003-03-26 16:01:11 +110072120030326
722 - (djm) OpenBSD CVS Sync
723 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
724 [sftp-server.c]
725 one last fix to the tree: race fix broke stuff; pr 3169;
726 srp@srparish.net, help from djm
727
Damien Miller68d893d2003-03-25 09:07:52 +110072820030325
729 - (djm) Fix getpeerid support for 64 bit BE systems. From
730 Arnd Bergmann <arndb@de.ibm.com>
731
Damien Millerb062c292003-03-24 09:12:09 +110073220030324
733 - (djm) OpenBSD CVS Sync
734 - markus@cvs.openbsd.org 2003/03/23 19:02:00
735 [monitor.c]
736 unbreak rekeying for privsep; ok millert@
737 - Release 3.6p1
Damien Miller62b6b172003-03-24 13:35:58 +1100738 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
739 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
Damien Millerb062c292003-03-24 09:12:09 +1100740
Darren Tucker4c29dd92003-08-02 20:37:03 +1000741$Id: ChangeLog,v 1.2868 2003/08/02 10:37:03 dtucker Exp $