blob: 38744449b6b5ad44de0e01b2f22b4cde6e806942 [file] [log] [blame]
Darren Tuckere841eb02009-07-06 07:11:13 +10001 - (dtucker) OpenBSD CVS Sync
2 - andreas@cvs.openbsd.org 2009/06/27 09:29:06
3 [packet.h packet.c]
4 packet_bacup_state() and packet_restore_state() will be used to
5 temporarily save the current state ren resuming a suspended connection.
6 ok markus@
Darren Tucker466df212009-07-06 07:11:52 +10007 - andreas@cvs.openbsd.org 2009/06/27 09:32:43
8 [roaming_common.c roaming.h]
9 It may be necessary to retransmit some data when resuming, so add it
10 to a buffer when roaming is enabled.
11 Most of this code was written by Martin Forssen, maf at appgate dot com.
12 ok markus@
Darren Tucker71e4d542009-07-06 07:12:27 +100013 - andreas@cvs.openbsd.org 2009/06/27 09:35:06
14 [readconf.h readconf.c]
15 Add client option UseRoaming. It doesn't do anything yet but will
16 control whether the client tries to use roaming if enabled on the
17 server. From Martin Forssen.
18 ok markus@
Darren Tuckercd6b1a22009-07-06 07:13:04 +100019 - markus@cvs.openbsd.org 2009/06/30 14:54:40
20 [version.h]
21 crank version; ok deraadt
Darren Tuckere841eb02009-07-06 07:11:13 +100022
Darren Tucker821d3db2009-06-22 16:11:06 +10002320090622
24 - (dtucker) OpenBSD CVS Sync
25 - dtucker@cvs.openbsd.org 2009/06/22 05:39:28
26 [monitor_wrap.c monitor_mm.c ssh-keygen.c auth2.c gss-genr.c sftp-client.c]
27 alphabetize includes; reduces diff vs portable and style(9).
28 ok stevesk djm
29 (Id sync only; these were already in order in -portable)
30
Darren Tucker72efd742009-06-21 17:48:00 +10003120090621
32 - (dtucker) OpenBSD CVS Sync
33 - markus@cvs.openbsd.org 2009/03/17 21:37:00
34 [ssh.c]
35 pass correct argv[0] to openlog(); ok djm@
Darren Tucker3a6a51f2009-06-21 17:48:52 +100036 - jmc@cvs.openbsd.org 2009/03/19 15:15:09
37 [ssh.1]
38 for "Ciphers", just point the reader to the keyword in ssh_config(5), just
39 as we do for "MACs": this stops us getting out of sync when the lists
40 change;
41 fixes documentation/6102, submitted by Peter J. Philipp
42 alternative fix proposed by djm
43 ok markus
Darren Tuckera0964502009-06-21 17:49:36 +100044 - tobias@cvs.openbsd.org 2009/03/23 08:31:19
45 [ssh-agent.c]
46 Fixed a possible out-of-bounds memory access if the environment variable
47 SHELL is shorter than 3 characters.
48 with input by and ok dtucker
Darren Tucker90133232009-06-21 17:50:15 +100049 - tobias@cvs.openbsd.org 2009/03/23 19:38:04
50 [ssh-agent.c]
51 My previous commit didn't fix the problem at all, so stick at my first
52 version of the fix presented to dtucker.
53 Issue notified by Matthias Barkhoff (matthias dot barkhoff at gmx dot de).
54 ok dtucker
Darren Tucker5837b512009-06-21 17:52:27 +100055 - sobrado@cvs.openbsd.org 2009/03/26 08:38:39
56 [sftp-server.8 sshd.8 ssh-agent.1]
57 fix a few typographical errors found by spell(1).
58 ok dtucker@, jmc@
Darren Tuckeraf501cf2009-06-21 17:53:04 +100059 - stevesk@cvs.openbsd.org 2009/04/13 19:07:44
60 [sshd_config.5]
61 fix possessive; ok djm@
Darren Tuckerb62f1a82009-06-21 17:53:48 +100062 - stevesk@cvs.openbsd.org 2009/04/14 16:33:42
63 [sftp-server.c]
64 remove unused option character from getopt() optstring; ok markus@
Darren Tucker3b59dfa2009-06-21 17:54:47 +100065 - jj@cvs.openbsd.org 2009/04/14 21:10:54
66 [servconf.c]
67 Fixed a few the-the misspellings in comments. Skipped a bunch in
68 binutils,gcc and so on. ok jmc@
Darren Tuckerac46a912009-06-21 17:55:23 +100069 - stevesk@cvs.openbsd.org 2009/04/17 19:23:06
70 [session.c]
71 use INTERNAL_SFTP_NAME for setproctitle() of in-process sftp-server;
72 ok djm@ markus@
Darren Tucker00fcd712009-06-21 17:56:00 +100073 - stevesk@cvs.openbsd.org 2009/04/17 19:40:17
74 [sshd_config.5]
75 clarify that even internal-sftp needs /dev/log for logging to work; ok
76 markus@
Darren Tuckerf92077f2009-06-21 17:56:25 +100077 - jmc@cvs.openbsd.org 2009/04/18 18:39:10
78 [sshd_config.5]
79 tweak previous; ok stevesk
Darren Tucker51dbe502009-06-21 17:56:51 +100080 - stevesk@cvs.openbsd.org 2009/04/21 15:13:17
81 [sshd_config.5]
82 clarify we cd to user's home after chroot; ok markus@ on
83 earlier version; tweaks and ok jmc@
Darren Tuckerf7288d72009-06-21 18:12:20 +100084 - andreas@cvs.openbsd.org 2009/05/25 06:48:01
85 [channels.c packet.c clientloop.c packet.h serverloop.c monitor_wrap.c
86 monitor.c]
87 Put the globals in packet.c into a struct and don't access it directly
88 from other files. No functional changes.
89 ok markus@ djm@
90 - andreas@cvs.openbsd.org 2009/05/27 06:31:25
91 [canohost.h canohost.c]
92 Add clear_cached_addr(), needed for upcoming changes allowing the peer
93 address to change.
94 ok markus@
Darren Tucker39c76322009-06-21 18:13:57 +100095 - andreas@cvs.openbsd.org 2009/05/27 06:33:39
96 [clientloop.c]
97 Send SSH2_MSG_DISCONNECT when the client disconnects. From a larger
98 change from Martin Forssen, maf at appgate dot com.
99 ok markus@
Darren Tucker12b4a652009-06-21 18:14:48 +1000100 - andreas@cvs.openbsd.org 2009/05/27 06:34:36
101 [kex.c kex.h]
102 Move the KEX_COOKIE_LEN define to kex.h
103 ok markus@
Darren Tucker5b48cdd2009-06-21 18:15:25 +1000104 - andreas@cvs.openbsd.org 2009/05/27 06:36:07
105 [packet.h packet.c]
106 Add packet_put_int64() and packet_get_int64(), part of a larger change
107 from Martin Forssen.
Darren Tucker761c3892009-06-21 18:16:26 +1000108 ok markus@
109 - andreas@cvs.openbsd.org 2009/05/27 06:38:16
110 [sshconnect.h sshconnect.c]
111 Un-static ssh_exchange_identification(), part of a larger change from
112 Martin Forssen and needed for upcoming changes.
113 ok markus@
Darren Tucker1cc55d72009-06-21 18:17:19 +1000114 - andreas@cvs.openbsd.org 2009/05/28 16:50:16
115 [sshd.c packet.c serverloop.c monitor_wrap.c clientloop.c sshconnect.c
Darren Tuckerc5564e12009-06-21 18:53:53 +1000116 monitor.c Added roaming.h roaming_common.c roaming_dummy.c]
Darren Tucker1cc55d72009-06-21 18:17:19 +1000117 Keep track of number of bytes read and written. Needed for upcoming
118 changes. Most code from Martin Forssen, maf at appgate dot com.
119 ok markus@
Darren Tuckerc5564e12009-06-21 18:53:53 +1000120 Also, applied appropriate changes to Makefile.in
Darren Tuckerb422afa2009-06-21 18:58:46 +1000121 - andreas@cvs.openbsd.org 2009/06/12 20:43:22
122 [monitor.c packet.c]
123 Fix warnings found by chl@ and djm@ and change roaming_atomicio's
124 return type to match atomicio's
125 Diff from djm@, ok markus@
Darren Tucker7b935c72009-06-21 18:59:36 +1000126 - andreas@cvs.openbsd.org 2009/06/12 20:58:32
127 [packet.c]
128 Move some more statics into session_state
129 ok markus@ djm@
Darren Tucker6ae35ac2009-06-21 19:00:20 +1000130 - dtucker@cvs.openbsd.org 2009/06/21 07:37:15
131 [kexdhs.c kexgexs.c]
132 abort if key_sign fails, preventing possible null deref. Based on report
133 from Paolo Ganci, ok markus@ djm@
Darren Tuckere6b590e2009-06-21 19:08:48 +1000134 - dtucker@cvs.openbsd.org 2009/06/21 09:04:03
135 [roaming.h roaming_common.c roaming_dummy.c]
136 Add tags for the benefit of the sync scripts
137 Also: pull in the changes for 1.1->1.2 missed in the previous sync.
Darren Tucker43e7a352009-06-21 19:50:08 +1000138 - (dtucker) [auth2-jpake.c auth2.c canohost.h session.c] Whitespace and
139 header-order changes to reduce diff vs OpenBSD.
Darren Tucker64cee362009-06-21 20:26:17 +1000140 - (dtucker) [servconf.c sshd.c] More whitespace sync.
Darren Tucker828c96d2009-06-21 22:22:08 +1000141 - (dtucker) [roaming_common.c roaming_dummy.c] Wrap #include <inttypes.h> in
142 ifdef.
Darren Tucker72efd742009-06-21 17:48:00 +1000143
Darren Tucker32780622009-06-16 16:11:02 +100014420090616
145 - (dtucker) [configure.ac defines.h] Bug #1607: handle the case where fsid_t
146 is a struct with a __val member. Fixes build on, eg, Redhat 6.2.
147
Darren Tuckera422d972009-05-04 12:52:47 +100014820090504
149 - (dtucker) [sshlogin.c] Move the NO_SSH_LASTLOG #ifndef line to include
150 variable declarations. Should prevent unused warnings anywhere it's set
151 (only Crays as far as I can tell) and be a no-op everywhere else.
152
Tim Ricea74000e2009-03-18 11:25:02 -070015320090318
154 - (tim) [configure.ac] Remove setting IP_TOS_IS_BROKEN for Cygwin. The problem
155 that setsockopt(IP_TOS) doesn't work on Cygwin has been fixed since 2005.
156 Based on patch from vinschen at redhat com.
157
Darren Tucker9d86e5d2009-03-08 11:40:27 +110015820090308
159 - (dtucker) [auth-passwd.c auth1.c auth2-kbdint.c auth2-none.c auth2-passwd.c
160 auth2-pubkey.c session.c openbsd-compat/bsd-cygwin_util.{c,h}
161 openbsd-compat/daemon.c] Remove support for Windows 95/98/ME and very old
162 version of Cygwin. Patch from vinschen at redhat com.
163
Darren Tucker558d6ca2009-03-07 10:22:10 +110016420090307
165 - (dtucker) [contrib/aix/buildbff.sh] Only try to rename ssh_prng_cmds if it
166 exists (it's not created if OpenSSL's PRNG is self-seeded, eg if the OS
167 has a /dev/random).
Darren Tucker8aae6ff2009-03-07 12:01:47 +1100168 - (dtucker) [schnorr.c openbsd-compat/openssl-compat.{c,h}] Add
169 EVP_DigestUpdate to the OLD_EVP compatibility functions and tell schnorr.c
170 to use them. Allows building with older OpenSSL versions.
Darren Tuckerccfee052009-03-07 12:32:22 +1100171 - (dtucker) [configure.ac defines.h] Check for in_port_t and typedef if needed.
Darren Tucker30ed6682009-03-07 18:06:22 +1100172 - (dtucker) [configure.ac] Missing comma in type list.
Darren Tucker3e7e15f2009-03-07 22:22:35 +1100173 - (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}]
174 EVP_DigestUpdate does not exactly match the other OLD_EVP functions (eg
175 in openssl 0.9.6) so add an explicit test for it.
Darren Tucker558d6ca2009-03-07 10:22:10 +1100176
Damien Millercee85232009-03-06 00:58:22 +110017720090306
178 - (djm) OpenBSD CVS Sync
179 - djm@cvs.openbsd.org 2009/03/05 07:18:19
180 [auth2-jpake.c jpake.c jpake.h monitor_wrap.c monitor_wrap.h schnorr.c]
181 [sshconnect2.c]
182 refactor the (disabled) Schnorr proof code to make it a little more
183 generally useful
Damien Miller447e3872009-03-06 00:58:39 +1100184 - djm@cvs.openbsd.org 2009/03/05 11:30:50
185 [uuencode.c]
186 document what these functions do so I don't ever have to recuse into
187 b64_pton/ntop to remember their return values
Damien Millercee85232009-03-06 00:58:22 +1100188
Damien Miller19913842009-02-23 10:53:58 +110018920090223
190 - (djm) OpenBSD CVS Sync
191 - djm@cvs.openbsd.org 2009/02/22 23:50:57
192 [ssh_config.5 sshd_config.5]
193 don't advertise experimental options
Damien Miller0296ae82009-02-23 11:00:24 +1100194 - djm@cvs.openbsd.org 2009/02/22 23:59:25
195 [sshd_config.5]
196 missing period
Damien Miller582ca6b2009-02-23 11:09:25 +1100197 - djm@cvs.openbsd.org 2009/02/23 00:06:15
198 [version.h]
199 openssh-5.2
Damien Miller5d0d5302009-02-23 11:11:57 +1100200 - (djm) [README] update for 5.2
Damien Millerfaec50b2009-02-23 11:12:29 +1100201 - (djm) Release openssh-5.2p1
Damien Miller19913842009-02-23 10:53:58 +1100202
Damien Miller9eab9562009-02-22 08:47:02 +110020320090222
204 - (djm) OpenBSD CVS Sync
205 - tobias@cvs.openbsd.org 2009/02/21 19:32:04
206 [misc.c sftp-server-main.c ssh-keygen.c]
207 Added missing newlines in error messages.
208 ok dtucker
209
Damien Millere8001d42009-02-21 12:45:02 +110021020090221
211 - (djm) OpenBSD CVS Sync
212 - djm@cvs.openbsd.org 2009/02/17 01:28:32
213 [ssh_config]
214 sync with revised default ciphers; pointed out by dkrause@
Damien Miller25918382009-02-21 12:45:18 +1100215 - djm@cvs.openbsd.org 2009/02/18 04:31:21
216 [schnorr.c]
217 signature should hash over the entire group, not just the generator
218 (this is still disabled code)
Damien Miller7691e5f2009-02-21 18:03:04 +1100219 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
220 [contrib/suse/openssh.spec] Prepare for 5.2p1
Damien Millere8001d42009-02-21 12:45:02 +1100221
Damien Miller3f94aaf2009-02-16 15:21:39 +110022220090216
223 - (djm) [regress/conch-ciphers.sh regress/putty-ciphers.sh]
224 [regress/putty-kex.sh regress/putty-transfer.sh] Downgrade disabled
225 interop tests from FATAL error to a warning. Allows some interop
226 tests to proceed if others are missing necessary prerequisites.
Damien Miller90551722009-02-16 15:37:03 +1100227 - (djm) [configure.ac] support GNU/kFreeBSD and GNU/kOpensolaris
228 systems; patch from Aurelien Jarno via rmh AT aybabtu.com
Damien Miller3f94aaf2009-02-16 15:21:39 +1100229
Damien Millerfdd66fc2009-02-14 16:26:19 +110023020090214
231 - (djm) OpenBSD CVS Sync
232 - dtucker@cvs.openbsd.org 2009/02/02 11:15:14
233 [sftp.c]
234 Initialize a few variables to prevent spurious "may be used
235 uninitialized" warnings from newer gcc's. ok djm@
Damien Miller4bf648f2009-02-14 16:28:21 +1100236 - djm@cvs.openbsd.org 2009/02/12 03:00:56
237 [canohost.c canohost.h channels.c channels.h clientloop.c readconf.c]
238 [readconf.h serverloop.c ssh.c]
239 support remote port forwarding with a zero listen port (-R0:...) to
240 dyamically allocate a listen port at runtime (this is actually
241 specified in rfc4254); bz#1003 ok markus@
Damien Miller330d5852009-02-14 16:33:09 +1100242 - djm@cvs.openbsd.org 2009/02/12 03:16:01
243 [serverloop.c]
244 tighten check for -R0:... forwarding: only allow dynamic allocation
245 if want_reply is set in the packet
Damien Miller923e8bb2009-02-14 16:33:31 +1100246 - djm@cvs.openbsd.org 2009/02/12 03:26:22
247 [monitor.c]
248 some paranoia: check that the serialised key is really KEY_RSA before
249 diddling its internals
Damien Millere2f4cc52009-02-14 16:33:49 +1100250 - djm@cvs.openbsd.org 2009/02/12 03:42:09
251 [ssh.1]
252 document -R0:... usage
Damien Miller65fa4ca2009-02-14 16:34:05 +1100253 - djm@cvs.openbsd.org 2009/02/12 03:44:25
254 [ssh.1]
255 consistency: Dq => Ql
Damien Miller85c6d8a2009-02-14 16:34:21 +1100256 - djm@cvs.openbsd.org 2009/02/12 03:46:17
257 [ssh_config.5]
258 document RemoteForward usage with 0 listen port
Damien Millere379e102009-02-14 16:34:39 +1100259 - jmc@cvs.openbsd.org 2009/02/12 07:34:20
260 [ssh_config.5]
261 kill trailing whitespace;
Damien Miller61433be2009-02-14 16:35:01 +1100262 - markus@cvs.openbsd.org 2009/02/13 11:50:21
263 [packet.c]
264 check for enc !=NULL in packet_start_discard
Damien Miller6385e752009-02-14 18:00:52 +1100265 - djm@cvs.openbsd.org 2009/02/14 06:35:49
266 [PROTOCOL]
267 mention that eow and no-more-sessions extensions are sent only to
268 OpenSSH peers
Damien Millerfdd66fc2009-02-14 16:26:19 +1100269
27020090212
Damien Miller2de76242009-02-12 12:19:20 +1100271 - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically
272 set ownership and modes, so avoid explicitly setting them
Damien Miller20e231f2009-02-12 13:12:21 +1100273 - (djm) [configure.ac loginrec.c] bz#1421: fix lastlog support for OSX.
274 OSX provides a getlastlogxbyname function that automates the reading of
275 a lastlog file. Also, the pututxline function will update lastlog so
276 there is no need for loginrec.c to do it explicitly. Collapse some
277 overly verbose code while I'm in there.
Damien Miller2de76242009-02-12 12:19:20 +1100278
Darren Tucker642ebe52009-02-01 22:19:54 +110027920090201
280 - (dtucker) [defines.h sshconnect.c] INET6_ADDRSTRLEN is now needed in
281 channels.c too, so move the definition for non-IP6 platforms to defines.h
282 where it can be shared.
283
Tim Rice6a325342009-01-29 12:30:01 -080028420090129
285 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
286 If the CYGWIN environment variable is empty, the installer script
287 should not install the service with an empty CYGWIN variable, but
288 rather without setting CYGWNI entirely.
Tim Rice0d8f2f32009-01-29 12:40:30 -0800289 - (tim) [contrib/cygwin/ssh-host-config] Whitespace cleanup. No code changes.
Tim Rice6a325342009-01-29 12:30:01 -0800290
Tim Riceca3692d2009-01-28 12:50:04 -080029120090128
292 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
293 Changes to work on Cygwin 1.5.x as well as on the new Cygwin 1.7.x.
294 The information given for the setting of the CYGWIN environment variable
295 is wrong for both releases so I just removed it, together with the
296 unnecessary (Cygwin 1.5.x) or wrong (Cygwin 1.7.x) default setting.
297
Damien Millerb53d8a12009-01-28 16:13:04 +110029820081228
299 - (djm) OpenBSD CVS Sync
300 - stevesk@cvs.openbsd.org 2008/12/09 03:20:42
301 [channels.c servconf.c]
302 channel_print_adm_permitted_opens() should deal with all the printing
303 for that config option. suggested by markus@; ok markus@ djm@
304 dtucker@
Damien Millerc30def92009-01-28 16:13:39 +1100305 - djm@cvs.openbsd.org 2008/12/09 04:32:22
306 [auth2-chall.c]
307 replace by-hand string building with xasprinf(); ok deraadt@
Damien Miller62fd18a2009-01-28 16:14:09 +1100308 - sobrado@cvs.openbsd.org 2008/12/09 15:35:00
309 [sftp.1 sftp.c]
310 update for the synopses displayed by the 'help' command, there are a
311 few missing flags; add 'bye' to the output of 'help'; sorting and spacing.
312 jmc@ suggested replacing .Oo/.Oc with a single .Op macro.
313 ok jmc@
Damien Millerb3f2c9f2009-01-28 16:15:30 +1100314 - stevesk@cvs.openbsd.org 2008/12/09 22:37:33
315 [clientloop.c]
316 fix typo in error message
Damien Miller7375fe22009-01-28 16:16:00 +1100317 - stevesk@cvs.openbsd.org 2008/12/10 03:55:20
318 [addrmatch.c]
319 o cannot be NULL here but use xfree() to be consistent; ok djm@
Damien Millerb2c17d42009-01-28 16:18:03 +1100320 - stevesk@cvs.openbsd.org 2008/12/29 01:12:36
321 [ssh-keyscan.1]
322 fix example, default key type is rsa for 3+ years; from
323 frederic.perrin@resel.fr
Damien Millera70ac762009-01-28 16:19:52 +1100324 - stevesk@cvs.openbsd.org 2008/12/29 02:23:26
325 [pathnames.h]
326 no need to escape single quotes in comments
Damien Miller17819012009-01-28 16:20:17 +1100327 - okan@cvs.openbsd.org 2008/12/30 00:46:56
328 [sshd_config.5]
329 add AllowAgentForwarding to available Match keywords list
330 ok djm
Damien Miller7a606212009-01-28 16:22:34 +1100331 - djm@cvs.openbsd.org 2009/01/01 21:14:35
332 [channels.c]
333 call channel destroy callbacks on receipt of open failure messages.
334 fixes client hangs when connecting to a server that has MaxSessions=0
335 set spotted by imorgan AT nas.nasa.gov; ok markus@
Damien Millerccf7e222009-01-28 16:23:06 +1100336 - djm@cvs.openbsd.org 2009/01/01 21:17:36
337 [kexgexs.c]
338 fix hash calculation for KEXGEX: hash over the original client-supplied
339 values and not the sanity checked versions that we acutally use;
340 bz#1540 reported by john.smith AT arrows.demon.co.uk
341 ok markus@
Damien Miller1781f532009-01-28 16:24:41 +1100342 - djm@cvs.openbsd.org 2009/01/14 01:38:06
343 [channels.c]
344 support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482;
345 "looks ok" markus@
Damien Miller5bc6aae2009-01-28 16:27:31 +1100346 - stevesk@cvs.openbsd.org 2009/01/15 17:38:43
347 [readconf.c]
348 1) use obsolete instead of alias for consistency
349 2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is
350 so move the comment.
351 3) reorder so like options are together
352 ok djm@
Damien Millera1c1b6c2009-01-28 16:29:49 +1100353 - djm@cvs.openbsd.org 2009/01/22 09:46:01
354 [channels.c channels.h session.c]
355 make Channel->path an allocated string, saving a few bytes here and
356 there and fixing bz#1380 in the process; ok markus@
Damien Miller9576ac42009-01-28 16:30:33 +1100357 - djm@cvs.openbsd.org 2009/01/22 09:49:57
358 [channels.c]
359 oops! I committed the wrong version of the Channel->path diff,
360 it was missing some tweaks suggested by stevesk@
Damien Miller3dc71ad2009-01-28 16:31:22 +1100361 - djm@cvs.openbsd.org 2009/01/22 10:02:34
362 [clientloop.c misc.c readconf.c readconf.h servconf.c servconf.h]
363 [serverloop.c ssh-keyscan.c ssh.c sshd.c]
364 make a2port() return -1 when it encounters an invalid port number
365 rather than 0, which it will now treat as valid (needed for future work)
366 adjust current consumers of a2port() to check its return value is <= 0,
367 which in turn required some things to be converted from u_short => int
368 make use of int vs. u_short consistent in some other places too
369 feedback & ok markus@
Damien Millere37dde02009-01-28 16:33:01 +1100370 - djm@cvs.openbsd.org 2009/01/22 10:09:16
371 [auth-options.c]
372 another chunk of a2port() diff that got away. wtfdjm??
Damien Miller67081b52009-01-28 16:33:31 +1100373 - djm@cvs.openbsd.org 2009/01/23 07:58:11
374 [myproposal.h]
375 prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC
376 modes; ok markus@
Damien Miller9aa72ba2009-01-28 16:34:00 +1100377 - naddy@cvs.openbsd.org 2009/01/24 17:10:22
378 [ssh_config.5 sshd_config.5]
379 sync list of preferred ciphers; ok djm@
Damien Miller13ae44c2009-01-28 16:38:41 +1100380 - markus@cvs.openbsd.org 2009/01/26 09:58:15
381 [cipher.c cipher.h packet.c]
382 Work around the CPNI-957037 Plaintext Recovery Attack by always
383 reading 256K of data on packet size or HMAC errors (in CBC mode only).
384 Help, feedback and ok djm@
385 Feedback from Martin Albrecht and Paterson Kenny
Damien Millerb53d8a12009-01-28 16:13:04 +1100386
Tim Rice351529c2009-01-07 10:04:12 -080038720090107
Damien Miller1598d6b2009-01-21 16:04:24 +1100388 - (djm) [uidswap.c] bz#1412: Support >16 supplemental groups in OS X.
389 Patch based on one from vgiffin AT apple.com; ok dtucker@
Damien Miller819dbb62009-01-21 16:46:26 +1100390 - (djm) [channels.c] bz#1419: support "on demand" X11 forwarding via
391 launchd on OS X; patch from vgiffin AT apple.com, slightly tweaked;
392 ok dtucker@
Damien Miller02666772009-01-21 20:29:20 +1100393 - (djm) [contrib/ssh-copy-id.1 contrib/ssh-copy-id] bz#1492: Make
394 ssh-copy-id copy id_rsa.pub by default (instead of the legacy "identity"
395 key). Patch from cjwatson AT debian.org
Damien Miller1598d6b2009-01-21 16:04:24 +1100396
39720090107
Tim Rice351529c2009-01-07 10:04:12 -0800398 - (tim) [configure.ac defines.h openbsd-compat/port-uw.c
399 openbsd-compat/xcrypt.c] Add SECUREWARE support to OpenServer 6 SVR5 ABI.
400 OK djm@ dtucker@
Tim Rice26767912009-01-07 20:50:08 -0800401 - (tim) [configure.ac] Move check_for_libcrypt_later=1 in *-*-sysv5*) section.
402 OpenServer 6 doesn't need libcrypt.
Tim Rice351529c2009-01-07 10:04:12 -0800403
Damien Miller586b0052008-12-09 14:11:32 +110040420081209
405 - (djm) OpenBSD CVS Sync
406 - djm@cvs.openbsd.org 2008/12/09 02:38:18
407 [clientloop.c]
408 The ~C escape handler does not work correctly for multiplexed sessions -
409 it opens a commandline on the master session, instead of on the slave
410 that requested it. Disable it on slave sessions until such time as it
411 is fixed; bz#1543 report from Adrian Bridgett via Colin Watson
412 ok markus@
Damien Miller1be2cc42008-12-09 14:11:49 +1100413 - djm@cvs.openbsd.org 2008/12/09 02:39:59
414 [sftp.c]
415 Deal correctly with failures in remote stat() operation in sftp,
416 correcting fail-on-error behaviour in batchmode. bz#1541 report and
417 fix from anedvedicky AT gmail.com; ok markus@
Damien Miller0d772d92008-12-09 14:12:05 +1100418 - djm@cvs.openbsd.org 2008/12/09 02:58:16
419 [readconf.c]
420 don't leave junk (free'd) pointers around in Forward *fwd argument on
421 failure; avoids double-free in ~C -L handler when given an invalid
422 forwarding specification; bz#1539 report from adejong AT debian.org
423 via Colin Watson; ok markus@ dtucker@
Damien Miller7ebfad72008-12-09 14:12:33 +1100424 - djm@cvs.openbsd.org 2008/12/09 03:02:37
425 [sftp.1 sftp.c]
426 correct sftp(1) and corresponding usage syntax;
427 bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@
Damien Miller586b0052008-12-09 14:11:32 +1100428
Damien Miller7df2e402008-12-08 09:35:36 +110042920081208
430 - (djm) [configure.ac] bz#1538: better test for ProPolice/SSP: actually
431 use some stack in main().
432 Report and suggested fix from vapier AT gentoo.org
Damien Miller8533c782008-12-08 09:54:40 +1100433 - (djm) OpenBSD CVS Sync
434 - markus@cvs.openbsd.org 2008/12/02 19:01:07
435 [clientloop.c]
436 we have to use the recipient's channel number (RFC 4254) for
437 SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages,
438 otherwise we trigger 'Non-public channel' error messages on sshd
439 systems with clientkeepalive enabled; noticed by sturm; ok djm;
Damien Miller5a33ec62008-12-08 09:55:02 +1100440 - markus@cvs.openbsd.org 2008/12/02 19:08:59
441 [serverloop.c]
442 backout 1.149, since it's not necessary and openssh clients send
443 broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
Damien Miller16a73072008-12-08 09:55:25 +1100444 - markus@cvs.openbsd.org 2008/12/02 19:09:38
445 [channels.c]
446 s/remote_id/id/ to be more consistent with other code; ok djm@
Damien Miller7df2e402008-12-08 09:35:36 +1100447
Darren Tucker83795d62008-12-01 21:34:28 +110044820081201
449 - (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files
450 and tweak the is-sshd-running check in ssh-host-config. Patch from
451 vinschen at redhat com.
Darren Tucker99d11a32008-12-01 21:40:48 +1100452 - (dtucker) OpenBSD CVS Sync
453 - markus@cvs.openbsd.org 2008/11/21 15:47:38
454 [packet.c]
455 packet_disconnect() on padding error, too. should reduce the success
456 probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18
457 ok djm@
Darren Tucker23645642008-12-01 21:42:13 +1100458 - dtucker@cvs.openbsd.org 2008/11/30 11:59:26
459 [monitor_fdpass.c]
460 Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@
Darren Tucker83795d62008-12-01 21:34:28 +1100461
Darren Tucker69087ea2008-11-23 14:03:19 +110046220081123
463 - (dtucker) [monitor_fdpass.c] Reduce diff vs OpenBSD by moving some
464 declarations, removing an unnecessary union member and adding whitespace.
Darren Tuckerd3782b42008-11-23 19:05:53 +1100465 cmsgbuf.tmp thing spotted by des at des no, ok djm some time ago.
Darren Tucker69087ea2008-11-23 14:03:19 +1100466
Tim Rice0f4d2c02008-11-18 21:26:41 -080046720081118
468 - (tim) [addrmatch.c configure.ac] Some platforms do not have sin6_scope_id
469 member of sockaddr_in6. Also reported in Bug 1491 by David Leonard. OK and
470 feedback by djm@
471
Darren Tuckerff4350e2008-11-11 16:31:05 +110047220081111
473 - (dtucker) OpenBSD CVS Sync
474 - jmc@cvs.openbsd.org 2008/11/05 11:22:54
475 [servconf.c]
476 passord -> password;
477 fixes user/5975 from Rene Maroufi
Darren Tuckere15fb092008-11-11 16:31:43 +1100478 - stevesk@cvs.openbsd.org 2008/11/07 00:42:12
479 [ssh-keygen.c]
480 spelling/typo in comment
Darren Tuckerb57fab62008-11-11 16:32:25 +1100481 - stevesk@cvs.openbsd.org 2008/11/07 18:50:18
482 [nchan.c]
483 add space to some log/debug messages for readability; ok djm@ markus@
Darren Tuckerc6d744e2008-11-11 16:33:03 +1100484 - dtucker@cvs.openbsd.org 2008/11/07 23:34:48
485 [auth2-jpake.c]
486 Move JPAKE define to make life easier for portable. ok djm@
Darren Tucker63917bd2008-11-11 16:33:48 +1100487 - tobias@cvs.openbsd.org 2008/11/09 12:34:47
488 [session.c ssh.1]
489 typo fixed (overriden -> overridden)
490 ok espie, jmc
Darren Tucker49c31c42008-11-11 16:39:44 +1100491 - stevesk@cvs.openbsd.org 2008/11/11 02:58:09
492 [servconf.c]
493 USE_AFS not referenced so remove #ifdef. fixes sshd -T not printing
494 kerberosgetafstoken. ok dtucker@
495 (Id sync only, we still want the ifdef in portable)
Darren Tucker22662e82008-11-11 16:40:22 +1100496 - stevesk@cvs.openbsd.org 2008/11/11 03:55:11
497 [channels.c]
498 for sshd -T print 'permitopen any' vs. 'permitopen' for case of no
499 permitopen's; ok and input dtucker@
Darren Tucker4a6f62d2008-11-11 16:55:25 +1100500 - djm@cvs.openbsd.org 2008/11/10 02:06:35
501 [regress/putty-ciphers.sh]
502 PuTTY supports AES CTR modes, so interop test against them too
Darren Tuckerff4350e2008-11-11 16:31:05 +1100503
Damien Miller7fc5c0f2008-11-05 16:12:11 +110050420081105
505 - OpenBSD CVS Sync
506 - djm@cvs.openbsd.org 2008/11/03 08:59:41
507 [servconf.c]
508 include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.gov
Damien Miller6f66d342008-11-05 16:12:54 +1100509 - djm@cvs.openbsd.org 2008/11/04 07:58:09
510 [auth.c]
511 need unistd.h for close() prototype
512 (ID sync only)
Damien Miller01ed2272008-11-05 16:20:46 +1100513 - djm@cvs.openbsd.org 2008/11/04 08:22:13
514 [auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h]
515 [readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5]
516 [sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c]
517 [Makefile.in]
518 Add support for an experimental zero-knowledge password authentication
519 method using the J-PAKE protocol described in F. Hao, P. Ryan,
520 "Password Authenticated Key Exchange by Juggling", 16th Workshop on
521 Security Protocols, Cambridge, April 2008.
522
523 This method allows password-based authentication without exposing
524 the password to the server. Instead, the client and server exchange
525 cryptographic proofs to demonstrate of knowledge of the password while
526 revealing nothing useful to an attacker or compromised endpoint.
527
528 This is experimental, work-in-progress code and is presently
529 compiled-time disabled (turn on -DJPAKE in Makefile.inc).
530
531 "just commit it. It isn't too intrusive." deraadt@
Damien Miller1a0442f2008-11-05 16:30:06 +1100532 - stevesk@cvs.openbsd.org 2008/11/04 19:18:00
533 [readconf.c]
534 because parse_forward() is now used to parse all forward types (DLR),
535 and it malloc's space for host variables, we don't need to malloc
536 here. fixes small memory leaks.
537
538 previously dynamic forwards were not parsed in parse_forward() and
539 space was not malloc'd in that case.
540
541 ok djm@
Damien Miller0164cb82008-11-05 16:30:31 +1100542 - stevesk@cvs.openbsd.org 2008/11/05 03:23:09
543 [clientloop.c ssh.1]
544 add dynamic forward escape command line; ok djm@
Damien Miller7fc5c0f2008-11-05 16:12:11 +1100545
Damien Miller9f6fb562008-11-03 19:15:44 +110054620081103
547 - OpenBSD CVS Sync
548 - sthen@cvs.openbsd.org 2008/07/24 23:55:30
549 [ssh-keygen.1]
550 Add "ssh-keygen -F -l" to synopsis (displays fingerprint from
551 known_hosts). ok djm@
552 - grunk@cvs.openbsd.org 2008/07/25 06:56:35
553 [ssh_config]
554 Add VisualHostKey to example file, ok djm@
Damien Millerc6aadd92008-11-03 19:16:20 +1100555 - grunk@cvs.openbsd.org 2008/07/25 07:05:16
556 [key.c]
557 In random art visualization, make sure to use the end marker only at the
558 end. Initial diff by Dirk Loss, tweaks and ok djm@
Damien Millerc674d582008-11-03 19:16:57 +1100559 - markus@cvs.openbsd.org 2008/07/31 14:48:28
560 [sshconnect2.c]
561 don't allocate space for empty banners; report t8m at centrum.cz;
562 ok deraadt
Damien Millerfa51b162008-11-03 19:17:33 +1100563 - krw@cvs.openbsd.org 2008/08/02 04:29:51
564 [ssh_config.5]
565 whitepsace -> whitespace. From Matthew Clarke via bugs@.
Damien Millerad793d52008-11-03 19:17:57 +1100566 - djm@cvs.openbsd.org 2008/08/21 04:09:57
567 [session.c]
568 allow ForceCommand internal-sftp with arguments. based on patch from
569 michael.barabanov AT gmail.com; ok markus@
Damien Miller15bce6b2008-11-03 19:19:12 +1100570 - djm@cvs.openbsd.org 2008/09/06 12:24:13
571 [kex.c]
572 OpenSSL 0.9.8h supplies a real EVP_sha256 so we do not need our
573 replacement anymore
574 (ID sync only for portable - we still need this)
Damien Miller456e6f02008-11-03 19:20:10 +1100575 - markus@cvs.openbsd.org 2008/09/11 14:22:37
576 [compat.c compat.h nchan.c ssh.c]
577 only send eow and no-more-sessions requests to openssh 5 and newer;
578 fixes interop problems with broken ssh v2 implementations; ok djm@
Damien Millerd58f5602008-11-03 19:20:49 +1100579 - millert@cvs.openbsd.org 2008/10/02 14:39:35
580 [session.c]
581 Convert an unchecked strdup to xstrdup. OK deraadt@
Damien Miller49b78d42008-11-03 19:21:21 +1100582 - jmc@cvs.openbsd.org 2008/10/03 13:08:12
583 [sshd.8]
584 do not give an example of how to chmod files: we can presume the user
585 knows that. removes an ambiguity in the permission of authorized_keys;
586 ok deraadt
Damien Millerc4d1b362008-11-03 19:22:09 +1100587 - deraadt@cvs.openbsd.org 2008/10/03 23:56:28
588 [sshconnect2.c]
589 Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the
590 function.
591 spotted by des@freebsd, who commited an incorrect fix to the freebsd tree
592 and (as is fairly typical) did not report the problem to us. But this fix
593 is correct.
594 ok djm
Damien Millere272a5b2008-11-03 19:22:37 +1100595 - djm@cvs.openbsd.org 2008/10/08 23:34:03
596 [ssh.1 ssh.c]
597 Add -y option to force logging via syslog rather than stderr.
598 Useful for daemonised ssh connection (ssh -f). Patch originally from
599 and ok'd by markus@
Damien Miller51bde602008-11-03 19:23:10 +1100600 - djm@cvs.openbsd.org 2008/10/09 03:50:54
601 [servconf.c sshd_config.5]
602 support setting PermitEmptyPasswords in a Match block
603 requested in PR3891; ok dtucker@
Damien Millerc13c3ee2008-11-03 19:23:28 +1100604 - jmc@cvs.openbsd.org 2008/10/09 06:54:22
605 [ssh.c]
606 add -y to usage();
Damien Millerb4acb472008-11-03 19:23:45 +1100607 - stevesk@cvs.openbsd.org 2008/10/10 04:55:16
608 [scp.c]
609 spelling in comment; ok djm@
Damien Miller2f54ada2008-11-03 19:24:16 +1100610 - stevesk@cvs.openbsd.org 2008/10/10 05:00:12
611 [key.c]
612 typo in error message; ok djm@
Damien Millerece92c82008-11-03 19:25:03 +1100613 - stevesk@cvs.openbsd.org 2008/10/10 16:43:27
614 [ssh_config.5]
615 use 'Privileged ports can be forwarded only when logging in as root on
616 the remote machine.' for RemoteForward just like ssh.1 -R.
617 ok djm@ jmc@
618 - stevesk@cvs.openbsd.org 2008/10/14 18:11:33
619 [sshconnect.c]
620 use #define ROQUIET here; no binary change. ok dtucker@
Damien Millera414cd32008-11-03 19:25:21 +1100621 - stevesk@cvs.openbsd.org 2008/10/17 18:36:24
622 [ssh_config.5]
623 correct and clarify VisualHostKey; ok jmc@
Damien Millere7261c72008-11-03 19:25:40 +1100624 - stevesk@cvs.openbsd.org 2008/10/30 19:31:16
625 [clientloop.c sshd.c]
626 don't need to #include "monitor_fdpass.h"
Damien Miller2b20a922008-11-03 19:26:00 +1100627 - stevesk@cvs.openbsd.org 2008/10/31 15:05:34
628 [dispatch.c]
629 remove unused #define DISPATCH_MIN; ok markus@
Damien Millerf7475d72008-11-03 19:26:18 +1100630 - djm@cvs.openbsd.org 2008/11/01 04:50:08
631 [sshconnect2.c]
632 sprinkle ARGSUSED on dispatch handlers
633 nuke stale unusued prototype
Damien Millera0094332008-11-03 19:26:35 +1100634 - stevesk@cvs.openbsd.org 2008/11/01 06:43:33
635 [channels.c]
636 fix some typos in log messages; ok djm@
Damien Millerc1719f72008-11-03 19:27:07 +1100637 - sobrado@cvs.openbsd.org 2008/11/01 11:14:36
638 [ssh-keyscan.1 ssh-keyscan.c]
639 the ellipsis is not an optional argument; while here, improve spacing.
Damien Millera699d952008-11-03 19:27:34 +1100640 - stevesk@cvs.openbsd.org 2008/11/01 17:40:33
641 [clientloop.c readconf.c readconf.h ssh.c]
642 merge dynamic forward parsing into parse_forward();
643 'i think this is OK' djm@
Damien Miller660d7da2008-11-03 19:27:52 +1100644 - stevesk@cvs.openbsd.org 2008/11/02 00:16:16
645 [ttymodes.c]
646 protocol 2 tty modes support is now 7.5 years old so remove these
647 debug3()s; ok deraadt@
Damien Millera279d252008-11-03 19:28:07 +1100648 - stevesk@cvs.openbsd.org 2008/11/03 01:07:02
649 [readconf.c]
650 remove valueless comment
Damien Millerf4b39532008-11-03 19:28:21 +1100651 - stevesk@cvs.openbsd.org 2008/11/03 02:44:41
652 [readconf.c]
653 fix comment
Damien Miller85dec732008-11-03 20:16:01 +1100654 - (djm) [contrib/caldera/ssh-host-keygen contrib/suse/rc.sshd]
655 Make example scripts generate keys with default sizes rather than fixed,
656 non-default 1024 bits; patch from imorgan AT nas.nasa.gov
Damien Miller250071f2008-11-03 20:18:12 +1100657 - (djm) [contrib/sshd.pam.generic contrib/caldera/sshd.pam]
658 [contrib/redhat/sshd.pam] Move pam_nologin to account group from
659 incorrect auth group in example files;
660 patch from imorgan AT nas.nasa.gov
Damien Miller9f6fb562008-11-03 19:15:44 +1100661
Darren Tuckerc570ff72008-09-06 18:20:57 +100066220080906
663 - (dtucker) [config.guess config.sub] Update to latest versions from
664 http://git.savannah.gnu.org/gitweb/ (2008-04-14 and 2008-06-16
665 respectively).
666
Darren Tucker661f63b2008-08-30 07:32:37 +100066720080830
668 - (dtucker) [openbsd-compat/bsd-poll.c] correctly check for number of FDs
669 larger than FD_SETSIZE (OpenSSH only ever uses poll with one fd). Patch
670 from Nicholas Marriott.
671
Damien Milleraa5f4332008-07-21 18:20:39 +100067220080721
673 - (djm) OpenBSD CVS Sync
Damien Miller6ef430d2008-07-23 17:40:04 +1000674 - djm@cvs.openbsd.org 2008/07/23 07:36:55
675 [servconf.c]
676 do not try to print options that have been compile-time disabled
677 in config test mode (sshd -T); report from nix-corp AT esperi.org.uk
678 ok dtucker@
Damien Miller212f0b02008-07-23 17:42:29 +1000679 - (djm) [servconf.c] Print UsePAM option in config test mode (when it
680 has been compiled in); report from nix-corp AT esperi.org.uk
681 ok dtucker@
Damien Miller6ef430d2008-07-23 17:40:04 +1000682
68320080721
684 - (djm) OpenBSD CVS Sync
Damien Milleraa5f4332008-07-21 18:20:39 +1000685 - jmc@cvs.openbsd.org 2008/07/18 22:51:01
686 [sftp-server.8]
687 no need for .Pp before or after .Sh;
Damien Milleraaae43e2008-07-21 18:21:05 +1000688 - djm@cvs.openbsd.org 2008/07/21 08:19:07
689 [version.h]
690 openssh-5.1
Damien Miller1f8909c2008-07-21 18:21:52 +1000691 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
692 [contrib/suse/openssh.spec] Update version number in README and RPM specs
Damien Miller8f42e9b2008-07-21 18:22:25 +1000693 - (djm) Release OpenSSH-5.1
Damien Milleraa5f4332008-07-21 18:20:39 +1000694
Damien Miller7ba0ca72008-07-17 18:57:06 +100069520080717
696 - (djm) OpenBSD CVS Sync
697 - djm@cvs.openbsd.org 2008/07/17 08:48:00
698 [sshconnect2.c]
699 strnvis preauth banner; pointed out by mpf@ ok markus@
Damien Millera1d03a52008-07-17 18:57:19 +1000700 - djm@cvs.openbsd.org 2008/07/17 08:51:07
701 [auth2-hostbased.c]
702 strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes
703 report and patch from res AT qoxp.net (bz#1200); ok markus@
Darren Tucker9a3f2b42008-07-17 19:03:49 +1000704 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat
705 code, replace with equivalent cygwin library call. Patch from vinschen
Damien Miller2e28d862008-07-17 19:15:43 +1000706 at redhat.com, ok djm@.
707 - (djm) [sshconnect2.c] vis.h isn't available everywhere
Damien Miller7ba0ca72008-07-17 18:57:06 +1000708
Damien Miller94717b02008-07-16 21:17:23 +100070920080716
710 - OpenBSD CVS Sync
711 - djm@cvs.openbsd.org 2008/07/15 02:23:14
712 [sftp.1]
713 number of pipelined requests is now 64;
714 prodded by Iain.Morgan AT nasa.gov
Damien Millerb9d3bee2008-07-16 22:40:52 +1000715 - djm@cvs.openbsd.org 2008/07/16 11:51:14
716 [clientloop.c]
717 rename variable first_gc -> last_gc (since it is actually the last
718 in the list).
Damien Miller6ef17492008-07-16 22:42:06 +1000719 - djm@cvs.openbsd.org 2008/07/16 11:52:19
720 [channels.c]
721 this loop index should be automatic, not static
Damien Miller94717b02008-07-16 21:17:23 +1000722
Damien Miller81dec052008-07-14 11:28:29 +100072320080714
724 - (djm) OpenBSD CVS Sync
725 - sthen@cvs.openbsd.org 2008/07/13 21:22:52
726 [ssh-keygen.c]
727 Change "ssh-keygen -F [host] -l" to not display random art unless
728 -v is also specified, making it consistent with the manual and other
729 uses of -l.
730 ok grunk@
Damien Miller163886f2008-07-14 11:28:58 +1000731 - djm@cvs.openbsd.org 2008/07/13 22:13:07
732 [channels.c]
733 use struct sockaddr_storage instead of struct sockaddr for accept(2)
734 address argument. from visibilis AT yahoo.com in bz#1485; ok markus@
Damien Miller7f980d12008-07-14 11:29:24 +1000735 - djm@cvs.openbsd.org 2008/07/13 22:16:03
736 [sftp.c]
737 increase number of piplelined requests so they properly fill the
738 (recently increased) channel window. prompted by rapier AT psc.edu;
739 ok markus@
Damien Miller276571c2008-07-14 12:09:57 +1000740 - djm@cvs.openbsd.org 2008/07/14 01:55:56
741 [sftp-server.8]
742 mention requirement for /dev/log inside chroot when using sftp-server
743 with ChrootDirectory
Damien Millerce02e5e2008-07-14 12:02:24 +1000744 - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to
745 avoid clash with sin(3) function; reported by
746 cristian.ionescu-idbohrn AT axis.com
Damien Miller639ce592008-07-14 12:03:27 +1000747 - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close()
748 prototype; reported by cristian.ionescu-idbohrn AT axis.com
Damien Miller36d70562008-07-14 12:04:43 +1000749 - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;
750 reported by cristian.ionescu-idbohrn AT axis.com
Damien Miller1fc231c2008-07-14 12:12:52 +1000751 - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config]
752 [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd]
753 Revamped and simplified Cygwin ssh-host-config script that uses
754 unified csih configuration tool. Requires recent Cygwin.
755 Patch from vinschen AT redhat.com
Damien Miller81dec052008-07-14 11:28:29 +1000756
Damien Miller2bcb8662008-07-12 17:12:29 +100075720080712
758 - (djm) OpenBSD CVS Sync
759 - djm@cvs.openbsd.org 2008/07/12 04:52:50
760 [channels.c]
761 unbreak; move clearing of cctx struct to before first use
762 reported by dkrause@
Damien Millera034baf2008-07-12 17:12:49 +1000763 - djm@cvs.openbsd.org 2008/07/12 05:33:41
764 [scp.1]
765 better description for -i flag:
766 s/RSA authentication/public key authentication/
Damien Millerc4657ef2008-07-14 21:37:36 +1000767 - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h]
768 return EAI_FAMILY when trying to lookup unsupported address family;
769 from vinschen AT redhat.com
Damien Miller2bcb8662008-07-12 17:12:29 +1000770
Damien Miller2f7faf12008-07-11 17:34:35 +100077120080711
772 - (djm) OpenBSD CVS Sync
773 - stevesk@cvs.openbsd.org 2008/07/07 00:31:41
774 [ttymodes.c]
775 we don't need arg after the debug3() was removed. from lint.
776 ok djm@
Damien Miller87dd5f22008-07-11 17:35:09 +1000777 - stevesk@cvs.openbsd.org 2008/07/07 23:32:51
778 [key.c]
779 /*NOTREACHED*/ for lint warning:
780 warning: function key_equal falls off bottom without returning value
781 ok djm@
Damien Millerdda5fff2008-07-11 17:35:37 +1000782 - markus@cvs.openbsd.org 2008/07/10 18:05:58
783 [channels.c]
784 missing bzero; from mickey; ok djm@
Damien Millerb61f3fc2008-07-11 17:36:48 +1000785 - markus@cvs.openbsd.org 2008/07/10 18:08:11
786 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c]
787 sync v1 and v2 traffic accounting; add it to sshd, too;
788 ok djm@, dtucker@
Damien Miller2f7faf12008-07-11 17:34:35 +1000789
Damien Millerd9648ee2008-07-09 00:21:12 +100079020080709
791 - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass
Damien Miller773a7b92008-07-09 20:54:05 +1000792 - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM
793 account check failure path. The vulnerable format buffer is supplied
794 from PAM and should not contain attacker-supplied data.
Damien Miller7acf5502008-07-09 20:54:37 +1000795 - (djm) [auth.c] Missing unistd.h for close()
Damien Miller73193b32008-07-09 21:07:19 +1000796 - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x
Damien Millerd9648ee2008-07-09 00:21:12 +1000797
Damien Miller22989f12008-07-05 08:59:43 +100079820080705
799 - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed
800 passwords disabled. bz#1083 report & patch from senthilkumar_sen AT
801 hotpop.com, w/ dtucker@
Damien Miller20d16942008-07-05 09:36:58 +1000802 - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for
803 Tru64. readv doesn't seem to be a comparable object there.
804 bz#1386, patch from dtucker@ ok me
Damien Miller42743cb2008-07-05 09:50:23 +1000805 - (djm) [Makefile.in] Pass though pass to conch for interop tests
Damien Millerff2e4922008-07-05 09:52:03 +1000806 - (djm) [configure.ac] unbreak: remove extra closing brace
Damien Millerd874fa52008-07-05 09:40:56 +1000807 - (djm) OpenBSD CVS Sync
808 - djm@cvs.openbsd.org 2008/07/04 23:08:25
809 [packet.c]
810 handle EINTR in packet_write_poll()l ok dtucker@
Damien Miller0b4d48b2008-07-05 09:44:53 +1000811 - djm@cvs.openbsd.org 2008/07/04 23:30:16
812 [auth1.c auth2.c]
813 Make protocol 1 MaxAuthTries logic match protocol 2's.
814 Do not treat the first protocol 2 authentication attempt as
815 a failure IFF it is for method "none".
816 Makes MaxAuthTries' user-visible behaviour identical for
817 protocol 1 vs 2.
818 ok dtucker@
Damien Millerc9c96f22008-07-05 15:17:48 +1000819 - djm@cvs.openbsd.org 2008/07/05 05:16:01
820 [PROTOCOL]
821 grammar
Damien Miller22989f12008-07-05 08:59:43 +1000822
Darren Tucker7c99b1c2008-07-04 12:53:23 +100082320080704
824 - (dtucker) OpenBSD CVS Sync
825 - djm@cvs.openbsd.org 2008/07/02 13:30:34
826 [auth2.c]
827 really really remove the freebie "none" auth try for protocol 2
Darren Tucker9a2a6092008-07-04 12:53:50 +1000828 - djm@cvs.openbsd.org 2008/07/02 13:47:39
829 [ssh.1 ssh.c]
830 When forking after authentication ("ssh -f") with ExitOnForwardFailure
831 enabled, delay the fork until after replies for any -R forwards have
832 been seen. Allows for robust detection of -R forward failure when
833 using -f (similar to bz#92); ok dtucker@
Darren Tuckerf5cafb02008-07-04 12:54:25 +1000834 - otto@cvs.openbsd.org 2008/07/03 21:46:58
835 [auth2-pubkey.c]
836 avoid nasty double free; ok dtucker@ djm@
Darren Tuckerb03fd022008-07-04 13:51:12 +1000837 - djm@cvs.openbsd.org 2008/07/04 03:44:59
838 [servconf.c groupaccess.h groupaccess.c]
839 support negation of groups in "Match group" block (bz#1315); ok dtucker@
Darren Tucker2784f1f2008-07-04 13:51:45 +1000840 - dtucker@cvs.openbsd.org 2008/07/04 03:47:02
841 [monitor.c]
842 Make debug a little clearer. ok djm@
Darren Tucker8c7a14e2008-07-04 17:08:58 +1000843 - djm@cvs.openbsd.org 2008/06/30 08:07:34
844 [regress/key-options.sh]
845 shell portability: use "=" instead of "==" in test(1) expressions,
846 double-quote string with backslash escaped /
Darren Tucker5d6d70a2008-07-04 17:10:30 +1000847 - djm@cvs.openbsd.org 2008/06/30 10:31:11
848 [regress/{putty-transfer,putty-kex,putty-ciphers}.sh]
849 remove "set -e" left over from debugging
Darren Tuckerb01bac12008-07-04 17:11:30 +1000850 - djm@cvs.openbsd.org 2008/06/30 10:43:03
851 [regress/conch-ciphers.sh]
852 explicitly disable conch options that could interfere with the test
Darren Tuckerf7fa7062008-07-04 14:10:19 +1000853 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
854 returns EXDEV. Patch from Mike Garrison, ok djm@
Damien Millerd8968ad2008-07-04 23:10:49 +1000855 - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h]
856 [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c]
857 [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on
858 some platforms (HP nonstop) it is a distinct errno;
859 bz#1467 reported by sconeu AT yahoo.com; ok dtucker@
860
Darren Tucker00f00f02008-07-02 22:31:31 +100086120080702
862 - (dtucker) OpenBSD CVS Sync
863 - djm@cvs.openbsd.org 2008/06/30 08:05:59
864 [PROTOCOL.agent]
865 typo: s/constraint_date/constraint_data/
Darren Tucker8810dd42008-07-02 22:32:14 +1000866 - djm@cvs.openbsd.org 2008/06/30 12:15:39
867 [serverloop.c]
868 only pass channel requests on session channels through to the session
869 channel handler, avoiding spurious log messages; ok! markus@
Darren Tucker8748b962008-07-02 22:32:43 +1000870 - djm@cvs.openbsd.org 2008/06/30 12:16:02
871 [nchan.c]
872 only send eow@openssh.com notifications for session channels; ok! markus@
Darren Tucker1f781b12008-07-02 22:33:16 +1000873 - djm@cvs.openbsd.org 2008/06/30 12:18:34
874 [PROTOCOL]
875 clarify that eow@openssh.com is only sent on session channels
Darren Tucker068e01f2008-07-02 22:33:55 +1000876 - dtucker@cvs.openbsd.org 2008/07/01 07:20:52
877 [sshconnect.c]
878 Check ExitOnForwardFailure if forwardings are disabled due to a failed
879 host key check. ok djm@
Darren Tuckerd7bdc0c2008-07-02 22:34:30 +1000880 - dtucker@cvs.openbsd.org 2008/07/01 07:24:22
881 [sshconnect.c sshd.c]
882 Send CR LF during protocol banner exchanges, but only for Protocol 2 only,
883 in order to comply with RFC 4253. bz #1443, ok djm@
Darren Tuckerf2e21de2008-07-02 22:35:00 +1000884 - stevesk@cvs.openbsd.org 2008/07/01 23:12:47
885 [PROTOCOL.agent]
886 fix some typos; ok djm@
Darren Tucker7499b0c2008-07-02 22:35:43 +1000887 - djm@cvs.openbsd.org 2008/07/02 02:24:18
888 [sshd_config sshd_config.5 sshd.8 servconf.c]
889 increase default size of ssh protocol 1 ephemeral key from 768 to 1024
890 bits; prodded by & ok dtucker@ ok deraadt@
Darren Tucker33c787f2008-07-02 22:37:30 +1000891 - dtucker@cvs.openbsd.org 2008/07/02 12:03:51
892 [auth-rsa.c auth.c auth2-pubkey.c auth.h]
893 Merge duplicate host key file checks, based in part on a patch from Rob
894 Holland via bz #1348 . Also checks for non-regular files during protocol
895 1 RSA auth. ok djm@
Darren Tucker4230a5d2008-07-02 22:56:09 +1000896 - djm@cvs.openbsd.org 2008/07/02 12:36:39
897 [auth2-none.c auth2.c]
898 Make protocol 2 MaxAuthTries behaviour a little more sensible:
899 Check whether client has exceeded MaxAuthTries before running
900 an authentication method and skip it if they have, previously it
901 would always allow one try (for "none" auth).
902 Preincrement failure count before post-auth test - previously this
903 checked and postincremented, also to allow one "none" try.
904 Together, these two changes always count the "none" auth method
905 which could be skipped by a malicious client (e.g. an SSH worm)
906 to get an extra attempt at a real auth method. They also make
907 MaxAuthTries=0 a useful way to block users entirely (esp. in a
908 sshd_config Match block).
909 Also, move sending of any preauth banner from "none" auth method
910 to the first call to input_userauth_request(), so worms that skip
911 the "none" method get to see it too.
Darren Tucker00f00f02008-07-02 22:31:31 +1000912
Damien Miller2e80cf22008-06-30 08:06:25 +100091320080630
914 - (djm) OpenBSD CVS Sync
915 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
916 [regress/Makefile regress/key-options.sh]
917 Add regress test for key options. ok djm@
Damien Millerd9bfce82008-06-30 08:06:51 +1000918 - dtucker@cvs.openbsd.org 2008/06/11 23:11:40
Damien Miller4268a132008-06-30 08:07:56 +1000919 [regress/Makefile]
Damien Millerd9bfce82008-06-30 08:06:51 +1000920 Don't run cipher-speed test by default; mistakenly enabled by me
Damien Miller4268a132008-06-30 08:07:56 +1000921 - djm@cvs.openbsd.org 2008/06/28 13:57:25
922 [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh]
923 very basic regress test against Twisted Conch in "make interop"
924 target (conch is available in ports/devel/py-twisted/conch);
925 ok markus@
Damien Millera766cea2008-06-30 08:12:37 +1000926 - (djm) [regress/Makefile] search for conch by path, like we do putty
Damien Miller2e80cf22008-06-30 08:06:25 +1000927
Damien Millerf184bcf2008-06-29 22:45:13 +100092820080629
929 - (djm) OpenBSD CVS Sync
930 - martynas@cvs.openbsd.org 2008/06/21 07:46:46
931 [sftp.c]
932 use optopt to get invalid flag, instead of return value of getopt,
933 which is always '?'; ok djm@
Damien Miller007132a2008-06-29 22:45:37 +1000934 - otto@cvs.openbsd.org 2008/06/25 11:13:43
935 [key.c]
936 add key length to visual fingerprint; zap magical constants;
937 ok grunk@ djm@
Damien Miller9e720282008-06-29 22:46:35 +1000938 - djm@cvs.openbsd.org 2008/06/26 06:10:09
939 [sftp-client.c sftp-server.c]
940 allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky
941 bits. Note that this only affects explicit setting of modes (e.g. via
942 sftp(1)'s chmod command) and not file transfers. (bz#1310)
943 ok deraadt@ at c2k8
Damien Miller2e9cf492008-06-29 22:47:04 +1000944 - djm@cvs.openbsd.org 2008/06/26 09:19:40
945 [dh.c dh.h moduli.c]
946 when loading moduli from /etc/moduli in sshd(8), check that they
947 are of the expected "safe prime" structure and have had
948 appropriate primality tests performed;
949 feedback and ok dtucker@
Damien Miller10288242008-06-30 00:04:03 +1000950 - grunk@cvs.openbsd.org 2008/06/26 11:46:31
951 [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c]
952 Move SSH Fingerprint Visualization away from sharing the config option
953 CheckHostIP to an own config option named VisualHostKey.
954 While there, fix the behaviour that ssh would draw a random art picture
955 on every newly seen host even when the option was not enabled.
956 prodded by deraadt@, discussions,
957 help and ok markus@ djm@ dtucker@
Damien Miller86399202008-06-30 00:04:31 +1000958 - jmc@cvs.openbsd.org 2008/06/26 21:11:46
959 [ssh.1]
960 add VisualHostKey to the list of options listed in -o;
Damien Millerbd45afb2008-06-30 00:04:57 +1000961 - djm@cvs.openbsd.org 2008/06/28 07:25:07
962 [PROTOCOL]
963 spelling fixes
Damien Miller1cfadab2008-06-30 00:05:21 +1000964 - djm@cvs.openbsd.org 2008/06/28 13:58:23
965 [ssh-agent.c]
966 refuse to add a key that has unknown constraints specified;
967 ok markus
Damien Miller471db5c2008-06-30 00:05:48 +1000968 - djm@cvs.openbsd.org 2008/06/28 14:05:15
969 [ssh-agent.c]
970 reset global compat flag after processing a protocol 2 signature
971 request with the legacy DSA encoding flag set; ok markus
Damien Miller1e18beb2008-06-30 00:07:00 +1000972 - djm@cvs.openbsd.org 2008/06/28 14:08:30
973 [PROTOCOL PROTOCOL.agent]
974 document the protocol used by ssh-agent; "looks ok" markus@
Damien Millerf184bcf2008-06-29 22:45:13 +1000975
Damien Miller493f0322008-06-28 16:01:35 +100097620080628
977 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
978 RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).
979
Damien Miller60dcc622008-06-26 15:59:32 +100098020080626
981 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
982 (bz#1372)
Damien Millerf299ff82008-06-26 16:01:56 +1000983 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
984 [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.
Damien Miller60dcc622008-06-26 15:59:32 +1000985
Darren Tuckered3cdc02008-06-16 23:29:18 +100098620080616
987 - (dtucker) OpenBSD CVS Sync
988 - dtucker@cvs.openbsd.org 2008/06/16 13:22:53
989 [session.c channels.c]
990 Rename the isatty argument to is_tty so we don't shadow
991 isatty(3). ok markus@
Darren Tucker1a48aec2008-06-16 23:35:56 +1000992 - (dtucker) [channels.c] isatty -> is_tty here too.
Darren Tuckered3cdc02008-06-16 23:29:18 +1000993
Darren Tucker330c93f2008-06-16 02:27:48 +100099420080615
995 - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.
Damien Miller2a628472008-06-16 07:50:24 +1000996 - OpenBSD CVS Sync
997 - dtucker@cvs.openbsd.org 2008/06/14 15:49:48
998 [sshd.c]
999 wrap long line at 80 chars
Damien Miller6ca16c62008-06-16 07:50:58 +10001000 - dtucker@cvs.openbsd.org 2008/06/14 17:07:11
1001 [sshd.c]
1002 ensure default umask disallows at least group and world write; ok djm@
Damien Miller6051c942008-06-16 07:53:16 +10001003 - djm@cvs.openbsd.org 2008/06/14 18:33:43
1004 [session.c]
1005 suppress the warning message from chdir(homedir) failures
1006 when chrooted (bz#1461); ok dtucker
Damien Millerc7ce0da2008-06-16 07:55:06 +10001007 - dtucker@cvs.openbsd.org 2008/06/14 19:42:10
1008 [scp.1]
1009 Mention that scp follows symlinks during -r. bz #1466,
1010 from nectar at apple
Damien Millerc62a5af2008-06-16 07:55:46 +10001011 - dtucker@cvs.openbsd.org 2008/06/15 16:55:38
1012 [sshd_config.5]
1013 MaxSessions is allowed in a Match block too
Damien Miller307c1d12008-06-16 07:56:20 +10001014 - dtucker@cvs.openbsd.org 2008/06/15 16:58:40
1015 [servconf.c sshd_config.5]
1016 Allow MaxAuthTries within a Match block. ok djm@
Damien Millerd310d512008-06-16 07:59:23 +10001017 - djm@cvs.openbsd.org 2008/06/15 20:06:26
1018 [channels.c channels.h session.c]
1019 don't call isatty() on a pty master, instead pass a flag down to
1020 channel_set_fds() indicating that te fds refer to a tty. Fixes a
1021 hang on exit on Solaris (bz#1463) in portable but is actually
1022 a generic bug; ok dtucker deraadt markus
Darren Tucker330c93f2008-06-16 02:27:48 +10001023
Damien Miller8b7ab962008-06-15 10:55:34 +1000102420080614
1025 - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
1026 replacement code; patch from ighighi AT gmail.com in bz#1240;
1027 ok dtucker
1028
Darren Tucker99bb7612008-06-13 22:02:50 +1000102920080613
1030 - (dtucker) OpenBSD CVS Sync
1031 - deraadt@cvs.openbsd.org 2008/06/13 09:44:36
1032 [packet.c]
1033 compile on older gcc; no decl after code
Darren Tuckerf2c16d32008-06-14 08:59:49 +10001034 - dtucker@cvs.openbsd.org 2008/06/13 13:56:59
1035 [monitor.c]
1036 Clear key options in the monitor on failed authentication, prevents
1037 applying additional restrictions to non-pubkey authentications in
1038 the case where pubkey fails but another method subsequently succeeds.
1039 bz #1472, found by Colin Watson, ok markus@ djm@
Darren Tuckerd9526a52008-06-14 09:01:24 +10001040 - dtucker@cvs.openbsd.org 2008/06/13 14:18:51
1041 [auth2-pubkey.c auth-rhosts.c]
1042 Include unistd.h for close(), prevents warnings in -portable
Darren Tucker47e713b2008-06-14 09:01:54 +10001043 - dtucker@cvs.openbsd.org 2008/06/13 17:21:20
1044 [mux.c]
1045 Friendlier error messages for mux fallback. ok djm@
Darren Tucker03ccc9b2008-06-14 09:02:25 +10001046 - dtucker@cvs.openbsd.org 2008/06/13 18:55:22
1047 [scp.c]
1048 Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@
Darren Tuckerf6bffb12008-06-14 09:04:26 +10001049 - grunk@cvs.openbsd.org 2008/06/13 20:13:26
1050 [ssh.1]
1051 Explain the use of SSH fpr visualization using random art, and cite the
1052 original scientific paper inspiring that technique.
1053 Much help with English and nroff by jmc@, thanks.
Darren Tucker30fd49e2008-06-14 09:14:46 +10001054 - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
1055 despite its name doesn't seem to implement all of GSSAPI. Patch from
1056 Jan Engelhardt, sanity checked by Simon Wilkinson.
Darren Tucker99bb7612008-06-13 22:02:50 +10001057
Darren Tucker11996732008-06-13 04:32:00 +1000105820080612
1059 - (dtucker) OpenBSD CVS Sync
1060 - jmc@cvs.openbsd.org 2008/06/11 07:30:37
1061 [sshd.8]
1062 kill trailing whitespace;
Darren Tucker9c16ac92008-06-13 04:40:35 +10001063 - grunk@cvs.openbsd.org 2008/06/11 21:01:35
1064 [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
1065 sshconnect.c]
1066 Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
1067 graphical hash visualization schemes known as "random art", and by
1068 Dan Kaminsky's musings on the subject during a BlackOp talk at the
1069 23C3 in Berlin.
1070 Scientific publication (original paper):
1071 "Hash Visualization: a New Technique to improve Real-World Security",
1072 Perrig A. and Song D., 1999, International Workshop on Cryptographic
1073 Techniques and E-Commerce (CrypTEC '99)
1074 http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
1075 The algorithm used here is a worm crawling over a discrete plane,
1076 leaving a trace (augmenting the field) everywhere it goes.
1077 Movement is taken from dgst_raw 2bit-wise. Bumping into walls
1078 makes the respective movement vector be ignored for this turn,
1079 thus switching to the other color of the chessboard.
1080 Graphs are not unambiguous for now, because circles in graphs can be
1081 walked in either direction.
1082 discussions with several people,
1083 help, corrections and ok markus@ djm@
Darren Tuckera376a322008-06-13 04:42:14 +10001084 - grunk@cvs.openbsd.org 2008/06/11 21:38:25
1085 [ssh-keygen.c]
1086 ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
1087 would not display you the random art as intended, spotted by canacar@
Darren Tucker35c45532008-06-13 04:43:15 +10001088 - grunk@cvs.openbsd.org 2008/06/11 22:20:46
1089 [ssh-keygen.c ssh-keygen.1]
1090 ssh-keygen would write fingerprints to STDOUT, and random art to STDERR,
1091 that is not how it was envisioned.
1092 Also correct manpage saying that -v is needed along with -l for it to work.
1093 spotted by naddy@
Darren Tucker014d76f2008-06-13 04:43:51 +10001094 - otto@cvs.openbsd.org 2008/06/11 23:02:22
1095 [key.c]
1096 simpler way of computing the augmentations; ok grunk@
Darren Tuckerdcc1ab52008-06-13 04:44:25 +10001097 - grunk@cvs.openbsd.org 2008/06/11 23:03:56
1098 [ssh_config.5]
1099 CheckHostIP set to ``fingerprint'' will display both hex and random art
1100 spotted by naddy@
Darren Tuckerd32b28a2008-06-13 04:45:50 +10001101 - grunk@cvs.openbsd.org 2008/06/11 23:51:57
1102 [key.c]
1103 #define statements that are not atoms need braces around them, else they
1104 will cause trouble in some cases.
1105 Also do a computation of -1 once, and not in a loop several times.
1106 spotted by otto@
Darren Tucker78913e02008-06-13 04:47:34 +10001107 - dtucker@cvs.openbsd.org 2008/06/12 00:03:49
1108 [dns.c canohost.c sshconnect.c]
1109 Do not pass "0" strings as ports to getaddrinfo because the lookups
1110 can slow things down and we never use the service info anyway. bz
1111 #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok
1112 deraadt@ djm@
1113 djm belives that the reason for the "0" strings is to ensure that
1114 it's not possible to call getaddrinfo with both host and port being
1115 NULL. In the case of canohost.c host is a local array. In the
1116 case of sshconnect.c, it's checked for null immediately before use.
1117 In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
1118 be non-null but it's not obvious, so I added a warning message in
1119 case it is ever passed a null.
1120 - grunk@cvs.openbsd.org 2008/06/12 00:13:55
1121 [sshconnect.c]
1122 Make ssh print the random art also when ssh'ing to a host using IP only.
1123 spotted by naddy@, ok and help djm@ dtucker@
Darren Tucker267e28b2008-06-13 04:48:11 +10001124 - otto@cvs.openbsd.org 2008/06/12 00:13:13
1125 [key.c]
1126 use an odd number of rows and columns and a separate start marker, looks
1127 better; ok grunk@
Darren Tucker2fb66ca2008-06-13 04:49:33 +10001128 - djm@cvs.openbsd.org 2008/06/12 03:40:52
1129 [clientloop.h mux.c channels.c clientloop.c channels.h]
1130 Enable ~ escapes for multiplex slave sessions; give each channel
1131 its own escape state and hook the escape filters up to muxed
1132 channels. bz #1331
1133 Mux slaves do not currently support the ~^Z and ~& escapes.
1134 NB. this change cranks the mux protocol version, so a new ssh
1135 mux client will not be able to connect to a running old ssh
1136 mux master.
1137 ok dtucker@
Darren Tucker9f407c42008-06-13 04:50:27 +10001138 - djm@cvs.openbsd.org 2008/06/12 04:06:00
1139 [clientloop.h ssh.c clientloop.c]
1140 maintain an ordered queue of outstanding global requests that we
1141 expect replies to, similar to the per-channel confirmation queue.
1142 Use this queue to verify success or failure for remote forward
1143 establishment in a race free way.
1144 ok dtucker@
Darren Tucker4d5cd332008-06-13 04:51:14 +10001145 - djm@cvs.openbsd.org 2008/06/12 04:17:47
1146 [clientloop.c]
1147 thall shalt not code past the eightieth column
Darren Tuckerd6173c02008-06-13 04:52:53 +10001148 - djm@cvs.openbsd.org 2008/06/12 04:24:06
1149 [ssh.c]
1150 thal shalt not code past the eightieth column
Darren Tuckere5d98292008-06-13 04:53:27 +10001151 - djm@cvs.openbsd.org 2008/06/12 05:15:41
1152 [PROTOCOL]
1153 document tun@openssh.com forwarding method
Darren Tuckerba69c7a2008-06-13 04:54:05 +10001154 - djm@cvs.openbsd.org 2008/06/12 05:32:30
1155 [mux.c]
1156 some more TODO for me
Darren Tucker4b3b9772008-06-13 04:55:10 +10001157 - grunk@cvs.openbsd.org 2008/06/12 05:42:46
1158 [key.c]
1159 supply the key type (rsa1, rsa, dsa) as a caption in the frame of the
1160 random art. while there, stress the fact that the field base should at
1161 least be 8 characters for the pictures to make sense.
1162 comment and ok djm@
1163 - grunk@cvs.openbsd.org 2008/06/12 06:32:59
1164 [key.c]
1165 We already mark the start of the worm, now also mark the end of the worm
1166 in our random art drawings.
1167 ok djm@
Darren Tucker84c56f52008-06-13 04:55:46 +10001168 - djm@cvs.openbsd.org 2008/06/12 15:19:17
1169 [clientloop.h channels.h clientloop.c channels.c mux.c]
1170 The multiplexing escape char handler commit last night introduced a
1171 small memory leak per session; plug it.
Darren Tuckerf6b01b72008-06-13 04:56:37 +10001172 - dtucker@cvs.openbsd.org 2008/06/12 16:35:31
1173 [ssh_config.5 ssh.c]
1174 keyword expansion for localcommand. ok djm@
Darren Tuckerf09e8252008-06-13 05:18:03 +10001175 - jmc@cvs.openbsd.org 2008/06/12 19:10:09
1176 [ssh_config.5 ssh-keygen.1]
1177 tweak the ascii art text; ok grunk
Darren Tucker3fc464e2008-06-13 06:42:45 +10001178 - dtucker@cvs.openbsd.org 2008/06/12 20:38:28
1179 [sshd.c sshconnect.c packet.h misc.c misc.h packet.c]
1180 Make keepalive timeouts apply while waiting for a packet, particularly
1181 during key renegotiation (bz #1363). With djm and Matt Day, ok djm@
Darren Tuckera64ab332008-06-13 07:01:29 +10001182 - djm@cvs.openbsd.org 2008/06/12 20:47:04
1183 [sftp-client.c]
1184 print extension revisions for extensions that we understand
Darren Tuckerbabc1d52008-06-13 08:56:01 +10001185 - djm@cvs.openbsd.org 2008/06/12 21:06:25
1186 [clientloop.c]
1187 I was coalescing expected global request confirmation replies at
1188 the wrong end of the queue - fix; prompted by markus@
Darren Tuckerb68fb4a2008-06-13 08:57:27 +10001189 - grunk@cvs.openbsd.org 2008/06/12 21:14:46
1190 [ssh-keygen.c]
1191 make ssh-keygen -lf show the key type just as ssh-add -l would do it
1192 ok djm@ markus@
Darren Tucker0f0ef0a2008-06-13 08:58:05 +10001193 - grunk@cvs.openbsd.org 2008/06/12 22:03:36
1194 [key.c]
1195 add my copyright, ok djm@
Darren Tuckerff4454d2008-06-13 10:21:51 +10001196 - ian@cvs.openbsd.org 2008/06/12 23:24:58
1197 [sshconnect.c]
1198 tweak wording in message, ok deraadt@ jmc@
Darren Tuckerf8b7eb72008-06-13 10:22:54 +10001199 - dtucker@cvs.openbsd.org 2008/06/13 00:12:02
1200 [sftp.h log.h]
1201 replace __dead with __attribute__((noreturn)), makes things
1202 a little easier to port. Also, add it to sigdie(). ok djm@
Darren Tuckerca19bfe2008-06-13 10:24:03 +10001203 - djm@cvs.openbsd.org 2008/06/13 00:16:49
1204 [mux.c]
1205 fall back to creating a new TCP connection on most multiplexing errors
1206 (socket connect fail, invalid version, refused permittion, corrupted
1207 messages, etc.); bz #1329 ok dtucker@
Darren Tucker1adfd362008-06-13 10:58:10 +10001208 - dtucker@cvs.openbsd.org 2008/06/13 00:47:53
1209 [mux.c]
1210 upcast size_t to u_long to match format arg; ok djm@
Darren Tuckerc7e030f2008-06-13 10:58:50 +10001211 - dtucker@cvs.openbsd.org 2008/06/13 00:51:47
1212 [mac.c]
1213 upcast another size_t to u_long to match format
Darren Tucker7517b5b2008-06-13 14:48:59 +10001214 - dtucker@cvs.openbsd.org 2008/06/13 01:38:23
1215 [misc.c]
1216 upcast uid to long with matching %ld, prevents warnings in portable
Darren Tucker06db5842008-06-13 14:51:28 +10001217 - djm@cvs.openbsd.org 2008/06/13 04:40:22
1218 [auth2-pubkey.c auth-rhosts.c]
1219 refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not
1220 regular files; report from Solar Designer via Colin Watson in bz#1471
1221 ok dtucker@ deraadt
Darren Tucker1cf65ae2008-06-13 05:09:18 +10001222 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now
1223 takes 2 more args. with djm@
Darren Tucker61b06952008-06-13 10:28:57 +10001224 - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
1225 from Todd Vierling.
Darren Tucker2c1eb822008-06-13 11:13:13 +10001226 - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
1227 systems. Patch from R. Scott Bailey.
Darren Tucker2c91b282008-06-13 12:40:55 +10001228 - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
1229 on big endian machines, so ifdef them for little-endian only to prevent
1230 unused function warnings on big-endians.
Darren Tuckerf387e592008-06-13 15:03:14 +10001231 - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
1232 compiler warnings on some platforms. Based on a discussion with otto@
Darren Tucker11996732008-06-13 04:32:00 +10001233
Damien Miller4401e452008-06-12 06:05:12 +1000123420080611
1235 - (djm) [channels.c configure.ac]
1236 Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no)
1237 bz#1464; ok dtucker
1238
Darren Tucker7a3935d2008-06-10 22:59:10 +1000123920080610
1240 - (dtucker) OpenBSD CVS Sync
1241 - djm@cvs.openbsd.org 2008/06/10 03:57:27
1242 [servconf.c match.h sshd_config.5]
1243 support CIDR address matching in sshd_config "Match address" blocks, with
1244 full support for negation and fall-back to classic wildcard matching.
1245 For example:
1246 Match address 192.0.2.0/24,3ffe:ffff::/32,!10.*
1247 PasswordAuthentication yes
1248 addrmatch.c code mostly lifted from flowd's addr.c
1249 feedback and ok dtucker@
Darren Tuckerb06cc4a2008-06-10 22:59:53 +10001250 - djm@cvs.openbsd.org 2008/06/10 04:17:46
1251 [sshd_config.5]
1252 better reference for pattern-list
Darren Tuckere7140f22008-06-10 23:01:51 +10001253 - dtucker@cvs.openbsd.org 2008/06/10 04:50:25
1254 [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8]
1255 Add extended test mode (-T) and connection parameters for test mode (-C).
1256 -T causes sshd to write its effective configuration to stdout and exit.
1257 -C causes any relevant Match rules to be applied before output. The
1258 combination allows tesing of the parser and config files. ok deraadt djm
Darren Tucker6a2a4002008-06-10 23:03:04 +10001259 - jmc@cvs.openbsd.org 2008/06/10 07:12:00
1260 [sshd_config.5]
1261 tweak previous;
Darren Tuckere7f3f752008-06-10 23:06:01 +10001262 - jmc@cvs.openbsd.org 2008/06/10 08:17:40
1263 [sshd.8 sshd.c]
1264 - update usage()
1265 - fix SYNOPSIS, and sort options
1266 - some minor additional fixes
Darren Tuckerd788b7c2008-06-10 23:15:54 +10001267 - dtucker@cvs.openbsd.org 2008/06/09 18:06:32
1268 [regress/test-exec.sh]
1269 Don't generate putty keys if we're not going to use them. ok djm
Darren Tucker10f92422008-06-10 23:16:46 +10001270 - dtucker@cvs.openbsd.org 2008/06/10 05:23:32
1271 [regress/addrmatch.sh regress/Makefile]
1272 Regress test for Match CIDR rules. ok djm@
Darren Tucker5f346642008-06-11 01:38:52 +10001273 - dtucker@cvs.openbsd.org 2008/06/10 15:21:41
1274 [test-exec.sh]
1275 Use a more portable construct for checking if we're running a putty test
Darren Tuckerd8bafea2008-06-11 01:39:38 +10001276 - dtucker@cvs.openbsd.org 2008/06/10 15:28:49
1277 [test-exec.sh]
1278 Add quotes
Darren Tuckerc9807e82008-06-11 09:33:01 +10001279 - dtucker@cvs.openbsd.org 2008/06/10 18:21:24
1280 [ssh_config.5]
1281 clarify that Host patterns are space-separated. ok deraadt
Darren Tucker8901fa92008-06-11 09:34:01 +10001282 - djm@cvs.openbsd.org 2008/06/10 22:15:23
1283 [PROTOCOL ssh.c serverloop.c]
1284 Add a no-more-sessions@openssh.com global request extension that the
1285 client sends when it knows that it will never request another session
1286 (i.e. when session multiplexing is disabled). This allows a server to
1287 disallow further session requests and terminate the session.
1288 Why would a non-multiplexing client ever issue additional session
1289 requests? It could have been attacked with something like SSH'jack:
1290 http://www.storm.net.nz/projects/7
1291 feedback & ok markus
Darren Tucker896ad5a2008-06-11 09:34:46 +10001292 - djm@cvs.openbsd.org 2008/06/10 23:06:19
1293 [auth-options.c match.c servconf.c addrmatch.c sshd.8]
1294 support CIDR address matching in .ssh/authorized_keys from="..." stanzas
1295 ok and extensive testing dtucker@
Darren Tucker2a8b1382008-06-11 09:35:37 +10001296 - dtucker@cvs.openbsd.org 2008/06/10 23:21:34
1297 [bufaux.c]
1298 Use '\0' for a nul byte rather than unadorned 0. ok djm@
Darren Tuckere045e0c2008-06-11 09:38:12 +10001299 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
1300 [Makefile regress/key-options.sh]
1301 Add regress test for key options. ok djm@
Darren Tucker5d376902008-06-11 04:15:05 +10001302 - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6
1303 since the new CIDR code in addmatch.c references it.
1304 - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
1305 specific tests on platforms that don't do IPv6.
Darren Tucker34f49c62008-06-11 05:15:51 +10001306 - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
1307 as environment.
Darren Tuckerb8e05002008-06-11 09:47:59 +10001308 - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.
Darren Tucker7a3935d2008-06-10 22:59:10 +10001309
Darren Tucker422c34c2008-06-09 22:48:31 +1000131020080609
1311 - (dtucker) OpenBSD CVS Sync
1312 - dtucker@cvs.openbsd.org 2008/06/08 17:04:41
1313 [sftp-server.c]
1314 Add case for ENOSYS in errno_to_portable; ok deraadt
Darren Tucker7b598892008-06-09 22:49:36 +10001315 - dtucker@cvs.openbsd.org 2008/06/08 20:15:29
1316 [sftp.c sftp-client.c sftp-client.h]
1317 Have the sftp client store the statvfs replies in wire format,
1318 which prevents problems when the server's native sizes exceed the
1319 client's.
1320 Also extends the sizes of the remaining 32bit wire format to 64bit,
1321 they're specified as unsigned long in the standard.
Darren Tucker3463aca2008-06-09 23:06:55 +10001322 - dtucker@cvs.openbsd.org 2008/06/09 13:02:39
Darren Tucker588fe0e2008-06-09 23:52:22 +10001323 [sftp-server.c]
Darren Tucker3463aca2008-06-09 23:06:55 +10001324 Extend 32bit -> 64bit values for statvfs extension missed in previous
1325 commit.
Darren Tucker588fe0e2008-06-09 23:52:22 +10001326 - dtucker@cvs.openbsd.org 2008/06/09 13:38:46
1327 [PROTOCOL]
1328 Use a $OpenBSD tag so our scripts will sync changes.
Darren Tucker422c34c2008-06-09 22:48:31 +10001329
Darren Tucker598eaa62008-06-09 03:32:29 +1000133020080608
1331 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c
1332 openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h
1333 openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and
1334 fstatvfs and remove #defines around statvfs code. ok djm@
Darren Tucker77001382008-06-09 06:17:53 +10001335 - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a
1336 macro to convert fsid to unsigned long for platforms where fsid is a
1337 2-member array.
Darren Tucker598eaa62008-06-09 03:32:29 +10001338
Darren Tuckerce38d822008-06-07 06:25:15 +1000133920080607
1340 - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H.
Darren Tucker5b2e2ba2008-06-08 09:25:28 +10001341 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c]
1342 Do not enable statvfs extensions on platforms that do not have statvfs.
Darren Tucker136e56f2008-06-08 12:49:30 +10001343 - (dtucker) OpenBSD CVS Sync
1344 - djm@cvs.openbsd.org 2008/05/19 06:14:02
1345 [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@
Darren Tuckerdd392642008-06-08 12:53:20 +10001346 - djm@cvs.openbsd.org 2008/05/19 15:45:07
1347 [sshtty.c ttymodes.c sshpty.h]
1348 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
1349 we would send the modes corresponding to a zeroed struct termios,
1350 whereas we should have been sending an empty list of modes.
1351 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
Darren Tucker0f7e9102008-06-08 12:54:29 +10001352 - djm@cvs.openbsd.org 2008/05/19 15:46:31
1353 [ssh-keygen.c]
1354 support -l (print fingerprint) in combination with -F (find host) to
1355 search for a host in ~/.ssh/known_hosts and display its fingerprint;
1356 ok markus@
Darren Tuckerdf189fb2008-06-08 12:55:32 +10001357 - djm@cvs.openbsd.org 2008/05/19 20:53:52
1358 [clientloop.c]
1359 unbreak tree by committing this bit that I missed from:
1360 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
1361 we would send the modes corresponding to a zeroed struct termios,
1362 whereas we should have been sending an empty list of modes.
1363 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
Darren Tuckerce38d822008-06-07 06:25:15 +10001364
Damien Miller58ea61b2008-06-04 10:54:00 +1000136520080604
1366 - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias
1367 in arc4random_uniform with upper_bound in (2^30,2*31). Note that
1368 OpenSSH did not make requests with upper bounds in this range.
1369
Damien Millera7058ec2008-05-20 08:57:06 +1000137020080519
1371 - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in]
1372 [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h]
1373 Fix compilation on Linux, including pulling in fmt_scaled(3)
1374 implementation from OpenBSD's libutil.
1375
Damien Miller797e3d12008-05-19 14:27:42 +1000137620080518
1377 - (djm) OpenBSD CVS Sync
1378 - djm@cvs.openbsd.org 2008/04/04 05:14:38
1379 [sshd_config.5]
1380 ChrootDirectory is supported in Match blocks (in fact, it is most useful
1381 there). Spotted by Minstrel AT minstrel.org.uk
Damien Miller56f41dd2008-05-19 14:28:19 +10001382 - djm@cvs.openbsd.org 2008/04/04 06:44:26
1383 [sshd_config.5]
1384 oops, some unrelated stuff crept into that commit - backout.
1385 spotted by jmc@
Damien Miller25434de2008-05-19 14:29:08 +10001386 - djm@cvs.openbsd.org 2008/04/05 02:46:02
1387 [sshd_config.5]
1388 HostbasedAuthentication is supported under Match too
Damien Millera4be7c22008-05-19 14:47:37 +10001389 - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c]
1390 [configure.ac] Implement arc4random_buf(), import implementation of
1391 arc4random_uniform() from OpenBSD
Damien Millercaaed012008-05-19 15:26:54 +10001392 - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes
Damien Miller94178312008-05-19 15:28:35 +10001393 - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h
Damien Miller354c48c2008-05-19 14:50:00 +10001394 - (djm) OpenBSD CVS Sync
1395 - djm@cvs.openbsd.org 2008/04/13 00:22:17
1396 [dh.c sshd.c]
1397 Use arc4random_buf() when requesting more than a single word of output
1398 Use arc4random_uniform() when the desired random number upper bound
1399 is not a power of two
1400 ok deraadt@ millert@
Damien Millerd671e5a2008-05-19 14:53:33 +10001401 - djm@cvs.openbsd.org 2008/04/18 12:32:11
1402 [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h]
1403 introduce sftp extension methods statvfs@openssh.com and
1404 fstatvfs@openssh.com that implement statvfs(2)-like operations,
1405 based on a patch from miklos AT szeredi.hu (bz#1399)
1406 also add a "df" command to the sftp client that uses the
1407 statvfs@openssh.com to produce a df(1)-like display of filesystem
1408 space and inode utilisation
1409 ok markus@
Damien Miller64058cb2008-05-19 14:54:25 +10001410 - jmc@cvs.openbsd.org 2008/04/18 17:15:47
1411 [sftp.1]
1412 macro fixage;
Damien Millerff0dd882008-05-19 14:55:02 +10001413 - djm@cvs.openbsd.org 2008/04/18 22:01:33
1414 [session.c]
1415 remove unneccessary parentheses
Damien Miller0b4c1652008-05-19 14:55:29 +10001416 - otto@cvs.openbsd.org 2008/04/29 11:20:31
1417 [monitor_mm.h]
1418 garbage collect two unused fields in struct mm_master; ok markus@
Damien Millerbacb7fb2008-05-19 14:56:33 +10001419 - djm@cvs.openbsd.org 2008/04/30 10:14:03
1420 [ssh-keyscan.1 ssh-keyscan.c]
1421 default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by
1422 larsnooden AT openoffice.org
Damien Miller4f755cd2008-05-19 14:57:41 +10001423 - pyr@cvs.openbsd.org 2008/05/07 05:49:37
1424 [servconf.c servconf.h session.c sshd_config.5]
1425 Enable the AllowAgentForwarding option in sshd_config (global and match
1426 context), to specify if agents should be permitted on the server.
1427 As the man page states:
1428 ``Note that disabling Agent forwarding does not improve security
1429 unless users are also denied shell access, as they can always install
1430 their own forwarders.''
1431 ok djm@, ok and a mild frown markus@
Damien Millerba3a6592008-05-19 14:58:22 +10001432 - pyr@cvs.openbsd.org 2008/05/07 06:43:35
1433 [sshd_config]
1434 push the sshd_config bits in, spotted by ajacoutot@
Damien Millere9890192008-05-19 14:59:02 +10001435 - jmc@cvs.openbsd.org 2008/05/07 08:00:14
1436 [sshd_config.5]
1437 sort;
Damien Millerdb255ca2008-05-19 14:59:37 +10001438 - markus@cvs.openbsd.org 2008/05/08 06:59:01
1439 [bufaux.c buffer.h channels.c packet.c packet.h]
1440 avoid extra malloc/copy/free when receiving data over the net;
1441 ~10% speedup for localhost-scp; ok djm@
Damien Millerb84886b2008-05-19 15:05:07 +10001442 - djm@cvs.openbsd.org 2008/05/08 12:02:23
1443 [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c]
1444 [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c]
1445 [ssh.c sshd.c]
1446 Implement a channel success/failure status confirmation callback
1447 mechanism. Each channel maintains a queue of callbacks, which will
1448 be drained in order (RFC4253 guarantees confirm messages are not
1449 reordered within an channel).
1450 Also includes a abandonment callback to clean up if a channel is
1451 closed without sending confirmation messages. This probably
1452 shouldn't happen in compliant implementations, but it could be
1453 abused to leak memory.
1454 ok markus@ (as part of a larger diff)
Damien Miller7207f642008-05-19 15:34:50 +10001455 - djm@cvs.openbsd.org 2008/05/08 12:21:16
1456 [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c]
1457 [sshd_config sshd_config.5]
1458 Make the maximum number of sessions run-time controllable via
1459 a sshd_config MaxSessions knob. This is useful for disabling
1460 login/shell/subsystem access while leaving port-forwarding working
1461 (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or
1462 simply increasing the number of allows multiplexed sessions.
1463 Because some bozos are sure to configure MaxSessions in excess of the
1464 number of available file descriptors in sshd (which, at peak, might be
1465 as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds
1466 on error paths, and make it fail gracefully on out-of-fd conditions -
1467 sending channel errors instead of than exiting with fatal().
1468 bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com
1469 ok markus@
Damien Miller5771ed72008-05-19 15:35:33 +10001470 - djm@cvs.openbsd.org 2008/05/08 13:06:11
1471 [clientloop.c clientloop.h ssh.c]
1472 Use new channel status confirmation callback system to properly deal
1473 with "important" channel requests that fail, in particular command exec,
1474 shell and subsystem requests. Previously we would optimistically assume
1475 that the requests would always succeed, which could cause hangs if they
1476 did not (e.g. when the server runs out of fds) or were unimplemented by
1477 the server (bz #1384)
1478 Also, properly report failing multiplex channel requests via the mux
1479 client stderr (subject to LogLevel in the mux master) - better than
1480 silently failing.
1481 most bits ok markus@ (as part of a larger diff)
Damien Millerbd740252008-05-19 15:37:09 +10001482 - djm@cvs.openbsd.org 2008/05/09 04:55:56
1483 [channels.c channels.h clientloop.c serverloop.c]
1484 Try additional addresses when connecting to a port forward destination
1485 whose DNS name resolves to more than one address. The previous behaviour
1486 was to try the first address and give up.
1487 Reported by stig AT venaas.com in bz#343
1488 great feedback and ok markus@
Damien Millerb1cbfa22008-05-19 16:00:08 +10001489 - djm@cvs.openbsd.org 2008/05/09 14:18:44
1490 [clientloop.c clientloop.h ssh.c mux.c]
1491 tidy up session multiplexing code, moving it into its own file and
1492 making the function names more consistent - making ssh.c and
1493 clientloop.c a fair bit more readable.
1494 ok markus@
Damien Millerb3da5932008-05-19 16:02:37 +10001495 - djm@cvs.openbsd.org 2008/05/09 14:26:08
1496 [ssh.c]
1497 dingo stole my diff hunk
Damien Miller2ff1ca52008-05-19 16:04:56 +10001498 - markus@cvs.openbsd.org 2008/05/09 16:16:06
1499 [session.c]
1500 re-add the USE_PIPES code and enable it.
1501 without pipes shutdown-read from the sshd does not trigger
1502 a SIGPIPE when the forked program does a write.
1503 ok djm@
1504 (Id sync only, USE_PIPES never left portable OpenSSH)
Damien Millerd654dd22008-05-19 16:05:41 +10001505 - markus@cvs.openbsd.org 2008/05/09 16:17:51
1506 [channels.c]
1507 error-fd race: don't enable the error fd in the select bitmask
1508 for channels with both in- and output closed, since the channel
1509 will go away before we call select();
1510 report, lots of debugging help and ok djm@
Damien Millerbab9bd42008-05-19 16:06:47 +10001511 - markus@cvs.openbsd.org 2008/05/09 16:21:13
1512 [channels.h clientloop.c nchan.c serverloop.c]
1513 unbreak
1514 ssh -2 localhost od /bin/ls | true
1515 ignoring SIGPIPE by adding a new channel message (EOW) that signals
1516 the peer that we're not interested in any data it might send.
1517 fixes bz #85; discussion, debugging and ok djm@
Damien Miller0f30c872008-05-19 16:07:45 +10001518 - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20
1519 [umac.c]
1520 Ensure nh_result lies on a 64-bit boundary (fixes warnings observed
1521 on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
Damien Miller5159bdd2008-05-19 16:08:20 +10001522 - djm@cvs.openbsd.org 2008/05/15 23:52:24
1523 [nchan2.ms]
1524 document eow message in ssh protocol 2 channel state machine;
1525 feedback and ok markus@
Damien Millera7e0d5a2008-05-19 16:08:41 +10001526 - djm@cvs.openbsd.org 2008/05/18 21:29:05
1527 [sftp-server.c]
1528 comment extension announcement
Damien Miller58a81142008-05-19 16:11:56 +10001529 - djm@cvs.openbsd.org 2008/05/16 08:30:42
1530 [PROTOCOL]
1531 document our protocol extensions and deviations; ok markus@
1532 - djm@cvs.openbsd.org 2008/05/17 01:31:56
1533 [PROTOCOL]
1534 grammar and correctness fixes from stevesk@
Damien Miller797e3d12008-05-19 14:27:42 +10001535
Damien Miller5f5cd742008-04-03 08:43:57 +1100153620080403
Damien Miller55754fb2008-04-04 16:16:35 +11001537 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile-
1538 time warnings on LynxOS. Patch from ops AT iki.fi
Damien Millerc5750222008-05-16 10:01:54 +10001539 - (djm) Force string arguments to replacement setproctitle() though
1540 strnvis first. Ok dtucker@
Damien Miller55754fb2008-04-04 16:16:35 +11001541
154220080403
Damien Miller5f5cd742008-04-03 08:43:57 +11001543 - (djm) OpenBSD CVS sync:
1544 - markus@cvs.openbsd.org 2008/04/02 15:36:51
1545 [channels.c]
1546 avoid possible hijacking of x11-forwarded connections (back out 1.183)
1547 CVE-2008-1483; ok djm@
Damien Miller13ba9c22008-04-03 20:52:51 +11001548 - jmc@cvs.openbsd.org 2008/03/27 22:37:57
1549 [sshd.8]
1550 remove trailing whitespace;
Damien Millera68d31b2008-04-03 20:53:08 +11001551 - djm@cvs.openbsd.org 2008/04/03 09:50:14
1552 [version.h]
1553 openssh-5.0
Damien Miller5a4b6462008-04-03 20:55:44 +11001554 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1555 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
Damien Millerffa83022008-04-03 20:56:38 +11001556 - (djm) [README] Update link to release notes
Damien Miller79a1bc92008-04-03 20:57:05 +11001557 - (djm) Release 5.0p1