blob: 85392699db64d90774cbebc8ab7540cde21b61db [file] [log] [blame]
Damien Miller7acefbb2014-07-18 14:11:24 +1000120140718
2 - OpenBSD CVS Sync
3 - millert@cvs.openbsd.org 2014/07/15 15:54:14
4 [PROTOCOL auth-options.c auth-passwd.c auth-rh-rsa.c auth-rhosts.c]
5 [auth-rsa.c auth.c auth1.c auth2-hostbased.c auth2-kbdint.c auth2-none.c]
6 [auth2-passwd.c auth2-pubkey.c auth2.c canohost.c channels.c channels.h]
7 [clientloop.c misc.c misc.h monitor.c mux.c packet.c readconf.c]
8 [readconf.h servconf.c servconf.h serverloop.c session.c ssh-agent.c]
9 [ssh.c ssh_config.5 sshconnect.c sshconnect1.c sshconnect2.c sshd.c]
10 [sshd_config.5 sshlogin.c]
11 Add support for Unix domain socket forwarding. A remote TCP port
12 may be forwarded to a local Unix domain socket and vice versa or
13 both ends may be a Unix domain socket. This is a reimplementation
14 of the streamlocal patches by William Ahern from:
15 http://www.25thandclement.com/~william/projects/streamlocal.html
16 OK djm@ markus@
Damien Miller6d576562014-07-18 15:02:06 +100017 - jmc@cvs.openbsd.org 2014/07/16 14:48:57
18 [ssh.1]
19 add the streamlocal* options to ssh's -o list; millert says they're
20 irrelevant for scp/sftp;
21 ok markus millert
Damien Miller1b833202014-07-18 15:03:02 +100022 - djm@cvs.openbsd.org 2014/07/17 00:10:56
23 [sandbox-systrace.c]
24 ifdef SYS_sendsyslog so this will compile without patching on -stable
Damien Millerf42f7682014-07-18 15:03:27 +100025 - djm@cvs.openbsd.org 2014/07/17 00:10:18
26 [mux.c]
27 preserve errno across syscall
Damien Millerdad9a4a2014-07-18 15:03:49 +100028 - djm@cvs.openbsd.org 2014/07/17 00:12:03
29 [key.c]
30 silence "incorrect passphrase" error spam; reported and ok dtucker@
Damien Miller357610d2014-07-18 15:04:10 +100031 - djm@cvs.openbsd.org 2014/07/17 07:22:19
32 [mux.c ssh.c]
33 reflect stdio-forward ("ssh -W host:port ...") failures in exit status.
34 previously we were always returning 0. bz#2255 reported by Brendan
35 Germain; ok dtucker
Damien Millerab2ec582014-07-18 15:04:47 +100036 - djm@cvs.openbsd.org 2014/07/18 02:46:01
37 [ssh-agent.c]
38 restore umask around listener socket creation (dropped in streamlocal patch
39 merge)
Darren Tucker450bc112014-07-19 06:23:18 +100040 - (dtucker) [auth2-gss.c gss-serv-krb5.c] Include misc.h for fwd_opts, used
41 in servconf.h.
Darren Tuckerf0fe9ea2014-07-19 06:33:12 +100042 - (dtucker) [Makefile.in] Add a t-exec target to run just the executable
43 tests.
Darren Tuckerd1a04212014-07-19 07:23:55 +100044 - (dtucker) [key.c sshkey.c] Put new ecdsa bits inside ifdef OPENSSL_HAS_ECC.
Damien Miller7acefbb2014-07-18 14:11:24 +100045
Damien Millerf6293a02014-07-17 09:01:25 +10004620140717
47 - (djm) [digest-openssl.c] Preserve array order when disabling digests.
48 Reported by Petr Lautrbach.
Damien Miller9d69d932014-07-17 09:49:37 +100049 - OpenBSD CVS Sync
50 - deraadt@cvs.openbsd.org 2014/07/11 08:09:54
51 [sandbox-systrace.c]
52 Permit use of SYS_sendsyslog from inside the sandbox. Clock is ticking,
53 update your kernels and sshd soon.. libc will start using sendsyslog()
54 in about 4 days.
Damien Miller6262d762014-07-17 09:52:07 +100055 - tedu@cvs.openbsd.org 2014/07/11 13:54:34
56 [myproposal.h]
57 by popular demand, add back hamc-sha1 to server proposal for better compat
58 with many clients still in use. ok deraadt
Damien Millerf6293a02014-07-17 09:01:25 +100059
Damien Miller00f9cd22014-07-15 10:41:38 +10006020140715
61 - (djm) [configure.ac] Delay checks for arc4random* until after libcrypto
62 has been located; fixes builds agains libressl-portable
63
Damien Miller1d0df322014-07-11 09:19:04 +10006420140711
65 - OpenBSD CVS Sync
66 - benno@cvs.openbsd.org 2014/07/09 14:15:56
67 [ssh-add.c]
68 fix ssh-add crash while loading more than one key
69 ok markus@
70
Damien Miller079bac22014-07-09 13:06:25 +10007120140709
72 - OpenBSD CVS Sync
73 - djm@cvs.openbsd.org 2014/07/07 08:19:12
74 [ssh_config.5]
75 mention that ProxyCommand is executed using shell "exec" to avoid
76 a lingering process; bz#1977
Damien Miller00707762014-07-09 13:07:06 +100077 - djm@cvs.openbsd.org 2014/07/09 01:45:10
78 [sftp.c]
79 more useful error message when GLOB_NOSPACE occurs;
80 bz#2254, patch from Orion Poplawski
Damien Millerd0bb9502014-07-09 13:07:28 +100081 - djm@cvs.openbsd.org 2014/07/09 03:02:15
82 [key.c]
83 downgrade more error() to debug() to better match what old authfile.c
84 did; suppresses spurious errors with hostbased authentication enabled
Damien Miller612f9652014-07-09 13:22:03 +100085 - djm@cvs.openbsd.org 2014/07/06 07:42:03
86 [multiplex.sh test-exec.sh]
87 add a hook to the cleanup() function to kill $SSH_PID if it is set
88
89 use it to kill the mux master started in multiplex.sh (it was being left
90 around on fatal failures)
Damien Miller7a57eb32014-07-09 13:22:31 +100091 - djm@cvs.openbsd.org 2014/07/07 08:15:26
92 [multiplex.sh]
93 remove forced-fatal that I stuck in there to test the new cleanup
94 logic and forgot to remove...
Damien Miller079bac22014-07-09 13:06:25 +100095
Damien Miller48bae3a2014-07-06 09:27:06 +10009620140706
97 - OpenBSD CVS Sync
98 - djm@cvs.openbsd.org 2014/07/03 23:18:35
99 [authfile.h]
100 remove leakmalloc droppings
Damien Miller3a48cc02014-07-06 09:32:49 +1000101 - djm@cvs.openbsd.org 2014/07/05 23:11:48
102 [channels.c]
103 fix remote-forward cancel regression; ok markus@
Damien Miller48bae3a2014-07-06 09:27:06 +1000104
Damien Millerd2c3cd52014-07-04 08:59:01 +100010520140704
106 - OpenBSD CVS Sync
107 - jsing@cvs.openbsd.org 2014/07/03 12:42:16
108 [cipher-chachapoly.c]
109 Call chacha_ivsetup() immediately before chacha_encrypt_bytes() - this
110 makes it easier to verify that chacha_encrypt_bytes() is only called once
111 per chacha_ivsetup() call.
112 ok djm@
Damien Miller6b37fbb2014-07-04 08:59:24 +1000113 - djm@cvs.openbsd.org 2014/07/03 22:23:46
114 [sshconnect.c]
115 when rekeying, skip file/DNS lookup if it is the same as the key sent
116 during initial key exchange. bz#2154 patch from Iain Morgan; ok markus@
Damien Miller602943d2014-07-04 08:59:41 +1000117 - djm@cvs.openbsd.org 2014/07/03 22:33:41
118 [channels.c]
119 allow explicit ::1 and 127.0.0.1 forwarding bind addresses when
120 GatewayPorts=no; allows client to choose address family;
121 bz#2222 ok markus@
Damien Miller72e6b5c2014-07-04 09:00:04 +1000122 - djm@cvs.openbsd.org 2014/07/03 22:40:43
123 [servconf.c servconf.h session.c sshd.8 sshd_config.5]
124 Add a sshd_config PermitUserRC option to control whether ~/.ssh/rc is
125 executed, mirroring the no-user-rc authorized_keys option;
126 bz#2160; ok markus@
Damien Millerd2c3cd52014-07-04 08:59:01 +1000127
Damien Miller8da0fa22014-07-03 11:54:19 +100012820140703
129 - (djm) [digest-openssl.c configure.ac] Disable RIPEMD160 if libcrypto
130 doesn't support it.
Damien Miller9eb4cd92014-07-03 13:29:50 +1000131 - (djm) [monitor_fdpass.c] Use sys/poll.h if poll.h doesn't exist;
132 bz#2237
Damien Miller61e28e52014-07-03 21:22:22 +1000133 - OpenBSD CVS Sync
134 - djm@cvs.openbsd.org 2014/07/03 01:45:38
135 [sshkey.c]
136 make Ed25519 keys' title fit properly in the randomart border; bz#2247
137 based on patch from Christian Hesse
Damien Millerb1e967c2014-07-03 21:22:40 +1000138 - djm@cvs.openbsd.org 2014/07/03 03:11:03
139 [ssh-agent.c]
140 Only cleanup agent socket in the main agent process and not in any
141 subprocesses it may have started (e.g. forked askpass). Fixes
142 agent sockets being zapped when askpass processes fatal();
143 bz#2236 patch from Dmitry V. Levin
Damien Millerd7ca2cd2014-07-03 21:23:01 +1000144 - djm@cvs.openbsd.org 2014/07/03 03:15:01
145 [ssh-add.c]
146 make stdout line-buffered; saves partial output getting lost when
147 ssh-add fatal()s part-way through (e.g. when listing keys from an
148 agent that supports key types that ssh-add doesn't);
149 bz#2234, reported by Phil Pennock
Damien Millerc174a3b2014-07-03 21:23:24 +1000150 - djm@cvs.openbsd.org 2014/07/03 03:26:43
151 [digest-openssl.c]
152 use EVP_Digest() for one-shot hash instead of creating, updating,
153 finalising and destroying a context.
154 bz#2231, based on patch from Timo Teras
Damien Millere5c0d522014-07-03 21:24:19 +1000155 - djm@cvs.openbsd.org 2014/07/03 03:34:09
156 [gss-serv.c session.c ssh-keygen.c]
157 standardise on NI_MAXHOST for gethostname() string lengths; about
158 1/2 the cases were using it already. Fixes bz#2239 en passant
Damien Miller4a1d3d52014-07-03 21:24:40 +1000159 - djm@cvs.openbsd.org 2014/07/03 03:47:27
160 [ssh-keygen.c]
161 When hashing or removing hosts using ssh-keygen, don't choke on
162 @revoked markers and don't remove @cert-authority markers;
163 bz#2241, reported by mlindgren AT runelind.net
Damien Millere6a40772014-07-03 21:25:03 +1000164 - djm@cvs.openbsd.org 2014/07/03 04:36:45
165 [digest.h]
166 forward-declare struct sshbuf so consumers don't need to include sshbuf.h
Damien Milleref9f13b2014-07-03 21:26:21 +1000167 - djm@cvs.openbsd.org 2014/07/03 05:32:36
168 [ssh_config.5]
169 mention '%%' escape sequence in HostName directives and how it may
170 be used to specify IPv6 link-local addresses
Damien Miller49d9bfe2014-07-03 21:26:42 +1000171 - djm@cvs.openbsd.org 2014/07/03 05:38:17
172 [ssh.1]
173 document that -g will only work in the multiplexed case if applied to
174 the mux master
Damien Miller9c386432014-07-03 21:27:46 +1000175 - djm@cvs.openbsd.org 2014/07/03 06:39:19
176 [ssh.c ssh_config.5]
177 Add a %C escape sequence for LocalCommand and ControlPath that expands
178 to a unique identifer based on a has of the tuple of (local host,
179 remote user, hostname, port).
180
181 Helps avoid exceeding sockaddr_un's miserly pathname limits for mux
182 control paths.
183
184 bz#2220, based on patch from mancha1 AT zoho.com; ok markus@
Damien Miller0f123412014-07-03 21:28:09 +1000185 - jmc@cvs.openbsd.org 2014/07/03 07:45:27
186 [ssh_config.5]
187 escape %C since groff thinks it part of an Rs/Re block;
Damien Miller686feb52014-07-03 21:29:38 +1000188 - djm@cvs.openbsd.org 2014/07/03 11:16:55
189 [auth.c auth.h auth1.c auth2.c]
190 make the "Too many authentication failures" message include the
191 user, source address, port and protocol in a format similar to the
192 authentication success / failure messages; bz#2199, ok dtucker
Damien Miller8da0fa22014-07-03 11:54:19 +1000193
Damien Miller51504ce2014-07-02 12:47:25 +100019420140702
195 - OpenBSD CVS Sync
196 - deraadt@cvs.openbsd.org 2014/06/13 08:26:29
197 [sandbox-systrace.c]
198 permit SYS_getentropy
199 from matthew
Damien Miller84a89162014-07-02 12:47:48 +1000200 - matthew@cvs.openbsd.org 2014/06/18 02:59:13
201 [sandbox-systrace.c]
202 Now that we have a dedicated getentropy(2) system call for
203 arc4random(3), we can disallow __sysctl(2) in OpenSSH's systrace
204 sandbox.
205
206 ok djm
Damien Miller99db8402014-07-02 12:48:04 +1000207 - naddy@cvs.openbsd.org 2014/06/18 15:42:09
208 [sshbuf-getput-crypto.c]
209 The ssh_get_bignum functions must accept the same range of bignums
210 the corresponding ssh_put_bignum functions create. This fixes the
211 use of 16384-bit RSA keys (bug reported by Eivind Evensen).
212 ok djm@
Damien Miller2cd79292014-07-02 12:48:30 +1000213 - djm@cvs.openbsd.org 2014/06/24 00:52:02
214 [krl.c]
215 fix bug in KRL generation: multiple consecutive revoked certificate
216 serial number ranges could be serialised to an invalid format.
217
218 Readers of a broken KRL caused by this bug will fail closed, so no
219 should-have-been-revoked key will be accepted.
Damien Miller86687062014-07-02 15:28:02 +1000220 - djm@cvs.openbsd.org 2014/06/24 01:13:21
221 [Makefile.in auth-bsdauth.c auth-chall.c auth-options.c auth-rsa.c
222 [auth2-none.c auth2-pubkey.c authfile.c authfile.h cipher-3des1.c
223 [cipher-chachapoly.c cipher-chachapoly.h cipher.c cipher.h
224 [digest-libc.c digest-openssl.c digest.h dns.c entropy.c hmac.h
225 [hostfile.c key.c key.h krl.c monitor.c packet.c rsa.c rsa.h
226 [ssh-add.c ssh-agent.c ssh-dss.c ssh-ecdsa.c ssh-ed25519.c
227 [ssh-keygen.c ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c
228 [ssh-rsa.c sshbuf-misc.c sshbuf.h sshconnect.c sshconnect1.c
229 [sshconnect2.c sshd.c sshkey.c sshkey.h
230 [openbsd-compat/openssl-compat.c openbsd-compat/openssl-compat.h]
231 New key API: refactor key-related functions to be more library-like,
232 existing API is offered as a set of wrappers.
233
234 with and ok markus@
235
236 Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
237 Dempsky and Ron Bowes for a detailed review a few months ago.
238 NB. This commit also removes portable OpenSSH support for OpenSSL
239 <0.9.8e.
Damien Miller19439e92014-07-02 15:28:40 +1000240 - djm@cvs.openbsd.org 2014/06/24 02:19:48
241 [ssh.c]
242 don't fatal() when hostname canonicalisation fails with a
243 ProxyCommand in use; continue and allow the ProxyCommand to
244 connect anyway (e.g. to a host with a name outside the DNS
245 behind a bastion)
Damien Miller1845fe62014-07-02 15:29:01 +1000246 - djm@cvs.openbsd.org 2014/06/24 02:21:01
247 [scp.c]
248 when copying local->remote fails during read, don't send uninitialised
249 heap to the remote end. Reported by Jann Horn
Damien Miller9e01ff22014-07-02 15:29:21 +1000250 - deraadt@cvs.openbsd.org 2014/06/25 14:16:09
251 [sshbuf.c]
252 unblock SIGSEGV before raising it
253 ok djm
Damien Miller4b3ed642014-07-02 15:29:40 +1000254 - markus@cvs.openbsd.org 2014/06/27 16:41:56
255 [channels.c channels.h clientloop.c ssh.c]
256 fix remote fwding with same listen port but different listen address
257 with gerhard@, ok djm@
Damien Millerec3d0e22014-07-02 15:30:00 +1000258 - markus@cvs.openbsd.org 2014/06/27 18:50:39
259 [ssh-add.c]
260 fix loading of private keys
Damien Miller3ff92ba2014-07-02 15:33:09 +1000261 - djm@cvs.openbsd.org 2014/06/30 12:54:39
262 [key.c]
263 suppress spurious error message when loading key with a passphrase;
264 reported by kettenis@ ok markus@
265 - djm@cvs.openbsd.org 2014/07/02 04:59:06
266 [cipher-3des1.c]
267 fix ssh protocol 1 on the server that regressed with the sshkey change
268 (sometimes fatal() after auth completed), make file return useful status
269 codes.
270 NB. Id sync only for these two. They were bundled into the sshkey merge
271 above, since it was easier to sync the entire file and then apply
272 portable-specific changed atop it.
Damien Miller5a967072014-07-02 15:38:05 +1000273 - djm@cvs.openbsd.org 2014/04/30 05:32:00
274 [regress/Makefile]
275 unit tests for new buffer API; including basic fuzz testing
276 NB. Id sync only.
Damien Miller43d3ed22014-07-02 17:01:08 +1000277 - djm@cvs.openbsd.org 2014/05/21 07:04:21
278 [regress/integrity.sh]
279 when failing because of unexpected output, show the offending output
Damien Millerc1dc24b2014-07-02 17:02:03 +1000280 - djm@cvs.openbsd.org 2014/06/24 01:04:43
281 [regress/krl.sh]
282 regress test for broken consecutive revoked serial number ranges
Damien Millerdd8b1dd2014-07-02 17:38:31 +1000283 - djm@cvs.openbsd.org 2014/06/24 01:14:17
284 [Makefile.in regress/Makefile regress/unittests/Makefile]
285 [regress/unittests/sshkey/Makefile]
286 [regress/unittests/sshkey/common.c]
287 [regress/unittests/sshkey/common.h]
288 [regress/unittests/sshkey/mktestdata.sh]
289 [regress/unittests/sshkey/test_file.c]
290 [regress/unittests/sshkey/test_fuzz.c]
291 [regress/unittests/sshkey/test_sshkey.c]
292 [regress/unittests/sshkey/tests.c]
293 [regress/unittests/sshkey/testdata/dsa_1]
294 [regress/unittests/sshkey/testdata/dsa_1-cert.fp]
295 [regress/unittests/sshkey/testdata/dsa_1-cert.pub]
296 [regress/unittests/sshkey/testdata/dsa_1.fp]
297 [regress/unittests/sshkey/testdata/dsa_1.fp.bb]
298 [regress/unittests/sshkey/testdata/dsa_1.param.g]
299 [regress/unittests/sshkey/testdata/dsa_1.param.priv]
300 [regress/unittests/sshkey/testdata/dsa_1.param.pub]
301 [regress/unittests/sshkey/testdata/dsa_1.pub]
302 [regress/unittests/sshkey/testdata/dsa_1_pw]
303 [regress/unittests/sshkey/testdata/dsa_2]
304 [regress/unittests/sshkey/testdata/dsa_2.fp]
305 [regress/unittests/sshkey/testdata/dsa_2.fp.bb]
306 [regress/unittests/sshkey/testdata/dsa_2.pub]
307 [regress/unittests/sshkey/testdata/dsa_n]
308 [regress/unittests/sshkey/testdata/dsa_n_pw]
309 [regress/unittests/sshkey/testdata/ecdsa_1]
310 [regress/unittests/sshkey/testdata/ecdsa_1-cert.fp]
311 [regress/unittests/sshkey/testdata/ecdsa_1-cert.pub]
312 [regress/unittests/sshkey/testdata/ecdsa_1.fp]
313 [regress/unittests/sshkey/testdata/ecdsa_1.fp.bb]
314 [regress/unittests/sshkey/testdata/ecdsa_1.param.curve]
315 [regress/unittests/sshkey/testdata/ecdsa_1.param.priv]
316 [regress/unittests/sshkey/testdata/ecdsa_1.param.pub]
317 [regress/unittests/sshkey/testdata/ecdsa_1.pub]
318 [regress/unittests/sshkey/testdata/ecdsa_1_pw]
319 [regress/unittests/sshkey/testdata/ecdsa_2]
320 [regress/unittests/sshkey/testdata/ecdsa_2.fp]
321 [regress/unittests/sshkey/testdata/ecdsa_2.fp.bb]
322 [regress/unittests/sshkey/testdata/ecdsa_2.param.curve]
323 [regress/unittests/sshkey/testdata/ecdsa_2.param.priv]
324 [regress/unittests/sshkey/testdata/ecdsa_2.param.pub]
325 [regress/unittests/sshkey/testdata/ecdsa_2.pub]
326 [regress/unittests/sshkey/testdata/ecdsa_n]
327 [regress/unittests/sshkey/testdata/ecdsa_n_pw]
328 [regress/unittests/sshkey/testdata/ed25519_1]
329 [regress/unittests/sshkey/testdata/ed25519_1-cert.fp]
330 [regress/unittests/sshkey/testdata/ed25519_1-cert.pub]
331 [regress/unittests/sshkey/testdata/ed25519_1.fp]
332 [regress/unittests/sshkey/testdata/ed25519_1.fp.bb]
333 [regress/unittests/sshkey/testdata/ed25519_1.pub]
334 [regress/unittests/sshkey/testdata/ed25519_1_pw]
335 [regress/unittests/sshkey/testdata/ed25519_2]
336 [regress/unittests/sshkey/testdata/ed25519_2.fp]
337 [regress/unittests/sshkey/testdata/ed25519_2.fp.bb]
338 [regress/unittests/sshkey/testdata/ed25519_2.pub]
339 [regress/unittests/sshkey/testdata/pw]
340 [regress/unittests/sshkey/testdata/rsa1_1]
341 [regress/unittests/sshkey/testdata/rsa1_1.fp]
342 [regress/unittests/sshkey/testdata/rsa1_1.fp.bb]
343 [regress/unittests/sshkey/testdata/rsa1_1.param.n]
344 [regress/unittests/sshkey/testdata/rsa1_1.pub]
345 [regress/unittests/sshkey/testdata/rsa1_1_pw]
346 [regress/unittests/sshkey/testdata/rsa1_2]
347 [regress/unittests/sshkey/testdata/rsa1_2.fp]
348 [regress/unittests/sshkey/testdata/rsa1_2.fp.bb]
349 [regress/unittests/sshkey/testdata/rsa1_2.param.n]
350 [regress/unittests/sshkey/testdata/rsa1_2.pub]
351 [regress/unittests/sshkey/testdata/rsa_1]
352 [regress/unittests/sshkey/testdata/rsa_1-cert.fp]
353 [regress/unittests/sshkey/testdata/rsa_1-cert.pub]
354 [regress/unittests/sshkey/testdata/rsa_1.fp]
355 [regress/unittests/sshkey/testdata/rsa_1.fp.bb]
356 [regress/unittests/sshkey/testdata/rsa_1.param.n]
357 [regress/unittests/sshkey/testdata/rsa_1.param.p]
358 [regress/unittests/sshkey/testdata/rsa_1.param.q]
359 [regress/unittests/sshkey/testdata/rsa_1.pub]
360 [regress/unittests/sshkey/testdata/rsa_1_pw]
361 [regress/unittests/sshkey/testdata/rsa_2]
362 [regress/unittests/sshkey/testdata/rsa_2.fp]
363 [regress/unittests/sshkey/testdata/rsa_2.fp.bb]
364 [regress/unittests/sshkey/testdata/rsa_2.param.n]
365 [regress/unittests/sshkey/testdata/rsa_2.param.p]
366 [regress/unittests/sshkey/testdata/rsa_2.param.q]
367 [regress/unittests/sshkey/testdata/rsa_2.pub]
368 [regress/unittests/sshkey/testdata/rsa_n]
369 [regress/unittests/sshkey/testdata/rsa_n_pw]
370 unit and fuzz tests for new key API
Damien Miller82b24822014-07-02 17:43:41 +1000371 - (djm) [sshkey.c] Conditionalise inclusion of util.h
Damien Miller81309c82014-07-02 17:45:55 +1000372 - (djm) [regress/Makefile] fix execution of sshkey unit/fuzz test
Damien Miller51504ce2014-07-02 12:47:25 +1000373
Tim Ricea261b8d2014-06-18 16:17:28 -070037420140618
375 - (tim) [openssh/session.c] Work around to get chroot sftp working on UnixWare
376
Darren Tucker316fac62014-06-17 23:06:07 +100037720140617
378 - (dtucker) [entropy.c openbsd-compat/openssl-compat.{c,h}
379 openbsd-compat/regress/{.cvsignore,Makefile.in,opensslvertest.c}]
380 Move the OpenSSL header/library version test into its own function and add
381 tests for it. Fix it to allow fix version upgrades (but not downgrades).
382 Prompted by chl@ via OpenSMTPD (issue #462) and Debian (bug #748150).
383 ok djm@ chl@
384
Darren Tuckeraf665bb2014-06-16 22:50:55 +100038520140616
386 - (dtucker) [defines.h] Fix undef of _PATH_MAILDIR. From rak at debian via
387 OpenSMTPD and chl@
388
Darren Tuckerf9696562014-06-13 11:06:04 +100038920140612
390 - (dtucker) [configure.ac] Remove tcpwrappers support, support has already
391 been removed from sshd.c.
392
Darren Tuckercf5392c2014-06-12 05:22:49 +100039320140611
394 - (dtucker) [defines.h] Add va_copy if we don't already have it, taken from
395 openbsd-compat/bsd-asprintf.c.
Darren Tucker985ee2c2014-06-12 05:32:29 +1000396 - (dtucker) [regress/unittests/sshbuf/*.c regress/unittests/test_helper/*]
397 Wrap stdlib.h include an ifdef for platforms that don't have it.
Tim Rice5e2b8892014-06-11 18:31:10 -0700398 - (tim) [regress/unittests/test_helper/test_helper.h] Add includes.h for
399 u_intXX_t types.
Darren Tuckercf5392c2014-06-12 05:22:49 +1000400
Darren Tucker67508ac2014-06-11 06:27:16 +100040120140610
402 - (dtucker) [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c
403 regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] Only do NISTP256
404 curve tests if OpenSSL has them.
Darren Tuckerd7af0cc2014-06-11 07:37:25 +1000405 - (dtucker) [myprosal.h] Don't include curve25519-sha256@libssh.org in
406 the proposal if the version of OpenSSL we're using doesn't support ECC.
Darren Tucker15c254a2014-06-11 07:38:49 +1000407 - (dtucker) [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] ifdef
408 ECC variable too.
Darren Tucker9f92c532014-06-11 07:57:58 +1000409 - (dtucker) OpenBSD CVS Sync
410 - djm@cvs.openbsd.org 2014/06/05 22:17:50
411 [sshconnect2.c]
412 fix inverted test that caused PKCS#11 keys that were explicitly listed
413 not to be preferred. Reported by Dirk-Willem van Gulik
Darren Tuckera54a0402014-06-11 07:58:35 +1000414 - dtucker@cvs.openbsd.org 2014/06/10 21:46:11
415 [sshbuf.h]
416 Group ECC functions together to make things a little easier in -portable.
417 "doesn't bother me" deraadt@
Darren Tuckerb9609fd2014-06-11 08:04:02 +1000418 - (dtucker) [sshbuf.h] Only declare ECC functions if building without
419 OpenSSL or if OpenSSL has ECC.
Darren Tuckereb012ac2014-06-11 13:10:00 +1000420 - (dtucker) [openbsd-compat/arc4random.c] Use explicit_bzero instead of an
421 assigment that might get optimized out. ok djm@
Darren Tucker58538d72014-06-11 13:39:24 +1000422 - (dtucker) [bufaux.c bufbn.c bufec.c buffer.c] Pull in includes.h for
423 compat stuff, specifically whether or not OpenSSL has ECC.
Darren Tucker67508ac2014-06-11 06:27:16 +1000424
Damien Millereae88742014-05-27 14:27:02 +100042520140527
426 - (djm) [cipher.c] Fix merge botch.
Damien Millerf9eb5e02014-05-27 14:31:58 +1000427 - (djm) [contrib/cygwin/ssh-host-config] Updated Cygwin ssh-host-config
428 from Corinna Vinschen, fixing a number of bugs and preparing for
429 Cygwin 1.7.30.
Damien Miller6482d902014-05-27 14:34:42 +1000430 - (djm) [configure.ac openbsd-compat/bsd-cygwin_util.c]
431 [openbsd-compat/bsd-cygwin_util.h] On Cygwin, determine privilege
432 separation user at runtime, since it may need to be a domain account.
433 Patch from Corinna Vinschen.
Damien Millereae88742014-05-27 14:27:02 +1000434
Damien Miller564b5e22014-05-22 08:23:59 +100043520140522
436 - (djm) [Makefile.in] typo in path
437
Damien Miller18912772014-05-21 17:06:46 +100043820140521
439 - (djm) [commit configure.ac defines.h sshpty.c] don't attempt to use
440 vhangup on Linux. It doens't work for non-root users, and for them
441 it just messes up the tty settings.
Damien Miller795b8632014-05-21 17:12:53 +1000442 - (djm) [misc.c] Use CLOCK_BOOTTIME in preference to CLOCK_MONOTONIC
443 when it is available. It takes into account time spent suspended,
444 thereby ensuring timeouts (e.g. for expiring agent keys) fire
445 correctly. bz#2228 reported by John Haxby
Damien Miller18912772014-05-21 17:06:46 +1000446
Damien Millerec0b67e2014-05-15 13:45:26 +100044720140519
448 - (djm) [rijndael.c rijndael.h] Sync with newly-ressurected versions ine
449 OpenBSD
Damien Miller16cd3922014-05-15 13:45:58 +1000450 - OpenBSD CVS Sync
451 - logan@cvs.openbsd.org 2014/04/20 09:24:26
452 [dns.c dns.h ssh-keygen.c]
453 Add support for SSHFP DNS records for ED25519 key types.
454 OK from djm@
Damien Millerd8accc02014-05-15 13:46:25 +1000455 - logan@cvs.openbsd.org 2014/04/21 14:36:16
456 [sftp-client.c sftp-client.h sftp.c]
457 Implement sftp upload resume support.
458 OK from djm@, with input from guenther@, mlarkin@ and
459 okan@
Damien Millerb15cd7b2014-05-15 13:46:52 +1000460 - logan@cvs.openbsd.org 2014/04/22 10:07:12
461 [sftp.c]
462 Sort the sftp command list.
463 OK from djm@
Damien Millerd875ff72014-05-15 13:47:15 +1000464 - logan@cvs.openbsd.org 2014/04/22 12:42:04
465 [sftp.1]
466 Document sftp upload resume.
467 OK from djm@, with feedback from okan@.
Damien Miller798a0252014-05-15 13:47:37 +1000468 - jmc@cvs.openbsd.org 2014/04/22 14:16:30
469 [sftp.1]
470 zap eol whitespace;
Damien Miller15271902014-05-15 13:47:56 +1000471 - djm@cvs.openbsd.org 2014/04/23 12:42:34
472 [readconf.c]
473 don't record duplicate IdentityFiles
Damien Miller633de332014-05-15 13:48:26 +1000474 - djm@cvs.openbsd.org 2014/04/28 03:09:18
475 [authfile.c bufaux.c buffer.h channels.c krl.c mux.c packet.c packet.h]
476 [ssh-keygen.c]
477 buffer_get_string_ptr's return should be const to remind
478 callers that futzing with it will futz with the actual buffer
479 contents
Damien Millerc5893782014-05-15 13:48:49 +1000480 - djm@cvs.openbsd.org 2014/04/29 13:10:30
481 [clientloop.c serverloop.c]
482 bz#1818 - don't send channel success/failre replies on channels that
483 have sent a close already; analysis and patch from Simon Tatham;
484 ok markus@
Damien Miller1f0311c2014-05-15 14:24:09 +1000485 - markus@cvs.openbsd.org 2014/04/29 18:01:49
486 [auth.c authfd.c authfile.c bufaux.c cipher.c cipher.h hostfile.c]
487 [kex.c key.c mac.c monitor.c monitor_wrap.c myproposal.h packet.c]
488 [roaming_client.c ssh-agent.c ssh-keygen.c ssh-keyscan.c ssh-keysign.c]
489 [ssh-pkcs11.h ssh.c sshconnect.c sshconnect2.c sshd.c]
490 make compiling against OpenSSL optional (make OPENSSL=no);
491 reduces algorithms to curve25519, aes-ctr, chacha, ed25519;
492 allows us to explore further options; with and ok djm
Damien Millerd7fd8be2014-05-15 14:24:59 +1000493 - dtucker@cvs.openbsd.org 2014/04/29 19:58:50
494 [sftp.c]
495 Move nulling of variable next to where it's freed. ok markus@
Damien Miller38094812014-05-15 14:25:18 +1000496 - dtucker@cvs.openbsd.org 2014/04/29 20:36:51
497 [sftp.c]
498 Don't attempt to append a nul quote char to the filename. Should prevent
499 fatal'ing with "el_insertstr failed" when there's a single quote char
500 somewhere in the string. bz#2238, ok markus@
Damien Miller05e82c32014-05-15 14:33:43 +1000501 - djm@cvs.openbsd.org 2014/04/30 05:29:56
502 [bufaux.c bufbn.c bufec.c buffer.c buffer.h sshbuf-getput-basic.c]
503 [sshbuf-getput-crypto.c sshbuf-misc.c sshbuf.c sshbuf.h ssherr.c]
504 [ssherr.h]
505 New buffer API; the first installment of the conversion/replacement
506 of OpenSSH's internals to make them usable as a standalone library.
507
508 This includes a set of wrappers to make it compatible with the
509 existing buffer API so replacement can occur incrementally.
510
511 With and ok markus@
512
513 Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
514 Dempsky and Ron Bowes for a detailed review.
Damien Miller294c58a2014-05-15 14:35:03 +1000515 - naddy@cvs.openbsd.org 2014/04/30 19:07:48
516 [mac.c myproposal.h umac.c]
517 UMAC can use our local fallback implementation of AES when OpenSSL isn't
518 available. Glue code straight from Ted Krovetz's original umac.c.
519 ok markus@
Damien Miller686c7d92014-05-15 14:37:03 +1000520 - djm@cvs.openbsd.org 2014/05/02 03:27:54
521 [chacha.h cipher-chachapoly.h digest.h hmac.h kex.h kexc25519.c]
522 [misc.h poly1305.h ssh-pkcs11.c defines.h]
523 revert __bounded change; it causes way more problems for portable than
524 it solves; pointed out by dtucker@
Damien Millerc31a0cd2014-05-15 14:37:39 +1000525 - markus@cvs.openbsd.org 2014/05/03 17:20:34
526 [monitor.c packet.c packet.h]
527 unbreak compression, by re-init-ing the compression code in the
528 post-auth child. the new buffer code is more strict, and requires
529 buffer_init() while the old code was happy after a bzero();
530 originally from djm@
Damien Miller3dc27172014-05-15 14:37:59 +1000531 - logan@cvs.openbsd.org 2014/05/05 07:02:30
532 [sftp.c]
533 Zap extra whitespace.
534
535 OK from djm@ and dtucker@
Damien Millerb9c56672014-05-15 14:43:37 +1000536 - (djm) [configure.ac] Unconditionally define WITH_OPENSSL until we write
537 portability glue to support building without libcrypto
Damien Millere5b9f0f2014-05-15 14:58:07 +1000538 - (djm) [Makefile.in configure.ac sshbuf-getput-basic.c]
539 [sshbuf-getput-crypto.c sshbuf.c] compilation and portability fixes
Damien Miller54343e92014-05-15 15:07:33 +1000540 - OpenBSD CVS Sync
541 - djm@cvs.openbsd.org 2014/03/13 20:44:49
542 [login-timeout.sh]
543 this test is a sorry mess of race conditions; add another sleep
544 to avoid a failure on slow machines (at least until I find a
545 better way)
Damien Milleredb1af52014-05-15 15:07:53 +1000546 - djm@cvs.openbsd.org 2014/04/21 22:15:37
547 [dhgex.sh integrity.sh kextype.sh rekey.sh try-ciphers.sh]
548 repair regress tests broken by server-side default cipher/kex/mac changes
549 by ensuring that the option under test is included in the server's
550 algorithm list
Damien Millerd0b69fe2014-05-15 15:08:19 +1000551 - dtucker@cvs.openbsd.org 2014/05/03 18:46:14
552 [proxy-connect.sh]
553 Add tests for with and without compression, with and without privsep.
Damien Miller16768572014-05-15 15:08:40 +1000554 - logan@cvs.openbsd.org 2014/05/04 10:40:59
555 [connect-privsep.sh]
556 Remove the Z flag from the list of malloc options as it
557 was removed from malloc.c 10 days ago.
558
559 OK from miod@
Damien Millerdef1de02014-05-15 15:17:15 +1000560 - (djm) [regress/unittests/Makefile]
561 [regress/unittests/Makefile.inc]
562 [regress/unittests/sshbuf/Makefile]
563 [regress/unittests/sshbuf/test_sshbuf.c]
564 [regress/unittests/sshbuf/test_sshbuf_fixed.c]
565 [regress/unittests/sshbuf/test_sshbuf_fuzz.c]
566 [regress/unittests/sshbuf/test_sshbuf_getput_basic.c]
567 [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c]
568 [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c]
569 [regress/unittests/sshbuf/test_sshbuf_misc.c]
570 [regress/unittests/sshbuf/tests.c]
571 [regress/unittests/test_helper/Makefile]
572 [regress/unittests/test_helper/fuzz.c]
573 [regress/unittests/test_helper/test_helper.c]
574 [regress/unittests/test_helper/test_helper.h]
575 Import new unit tests from OpenBSD; not yet hooked up to build.
Damien Millere7429f22014-05-15 18:01:01 +1000576 - (djm) [regress/Makefile Makefile.in]
577 [regress/unittests/sshbuf/test_sshbuf.c
578 [regress/unittests/sshbuf/test_sshbuf_fixed.c]
579 [regress/unittests/sshbuf/test_sshbuf_fuzz.c]
580 [regress/unittests/sshbuf/test_sshbuf_getput_basic.c]
581 [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c]
582 [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c]
583 [regress/unittests/sshbuf/test_sshbuf_misc.c]
584 [regress/unittests/sshbuf/tests.c]
585 [regress/unittests/test_helper/fuzz.c]
586 [regress/unittests/test_helper/test_helper.c]
587 Hook new unit tests into the build and "make tests"
Damien Miller7f1c2642014-05-15 18:01:52 +1000588 - (djm) [sshbuf.c] need __predict_false
Damien Millerec0b67e2014-05-15 13:45:26 +1000589
Darren Tuckerf0284602014-05-01 02:24:35 +100059020140430
591 - (dtucker) [defines.h] Define __GNUC_PREREQ__ macro if we don't already
592 have it. Only attempt to use __attribute__(__bounded__) for gcc.
593
Damien Millerc10bf4d2014-04-20 12:58:04 +100059420140420
595 - OpenBSD CVS Sync
596 - djm@cvs.openbsd.org 2014/03/03 22:22:30
597 [session.c]
598 ignore enviornment variables with embedded '=' or '\0' characters;
599 spotted by Jann Horn; ok deraadt@
600 Id sync only - portable already has this.
Damien Miller1c7ef4b2014-04-20 12:59:46 +1000601 - djm@cvs.openbsd.org 2014/03/12 04:44:58
602 [ssh-keyscan.c]
603 scan for Ed25519 keys by default too
Damien Miller8f9cd702014-04-20 13:00:11 +1000604 - djm@cvs.openbsd.org 2014/03/12 04:50:32
605 [auth-bsdauth.c ssh-keygen.c]
606 don't count on things that accept arguments by reference to clear
607 things for us on error; most things do, but it's unsafe form.
Damien Miller38195192014-04-20 13:00:28 +1000608 - djm@cvs.openbsd.org 2014/03/12 04:51:12
609 [authfile.c]
610 correct test that kdf name is not "none" or "bcrypt"
Damien Miller94bfe0f2014-04-20 13:00:51 +1000611 - naddy@cvs.openbsd.org 2014/03/12 13:06:59
612 [ssh-keyscan.1]
613 scan for Ed25519 keys by default too
Damien Millerf0858de2014-04-20 13:01:30 +1000614 - deraadt@cvs.openbsd.org 2014/03/15 17:28:26
615 [ssh-agent.c ssh-keygen.1 ssh-keygen.c]
616 Improve usage() and documentation towards the standard form.
617 In particular, this line saves a lot of man page reading time.
618 usage: ssh-keygen [-q] [-b bits] [-t dsa | ecdsa | ed25519 | rsa | rsa1]
619 [-N new_passphrase] [-C comment] [-f output_keyfile]
620 ok schwarze jmc
Damien Miller6e1777f2014-04-20 13:02:58 +1000621 - tedu@cvs.openbsd.org 2014/03/17 19:44:10
622 [ssh.1]
623 old descriptions of des and blowfish are old. maybe ok deraadt
624 - tedu@cvs.openbsd.org 2014/03/19 14:42:44
625 [scp.1]
626 there is no need for rcp anymore
627 ok deraadt millert
Damien Miller9235a032014-04-20 13:17:20 +1000628 - markus@cvs.openbsd.org 2014/03/25 09:40:03
629 [myproposal.h]
630 trimm default proposals.
631
632 This commit removes the weaker pre-SHA2 hashes, the broken ciphers
633 (arcfour), and the broken modes (CBC) from the default configuration
634 (the patch only changes the default, all the modes are still available
635 for the config files).
636
637 ok djm@, reminded by tedu@ & naddy@ and discussed with many
638 - deraadt@cvs.openbsd.org 2014/03/26 17:16:26
639 [myproposal.h]
640 The current sharing of myproposal[] between both client and server code
641 makes the previous diff highly unpallatable. We want to go in that
642 direction for the server, but not for the client. Sigh.
643 Brought up by naddy.
644 - markus@cvs.openbsd.org 2014/03/27 23:01:27
645 [myproposal.h ssh-keyscan.c sshconnect2.c sshd.c]
646 disable weak proposals in sshd, but keep them in ssh; ok djm@
Damien Miller4f402092014-04-20 13:21:22 +1000647 - djm@cvs.openbsd.org 2014/03/26 04:55:35
648 [chacha.h cipher-chachapoly.h digest.h hmac.h kex.h kexc25519.c
649 [misc.h poly1305.h ssh-pkcs11.c]
650 use __bounded(...) attribute recently added to sys/cdefs.h instead of
651 longform __attribute__(__bounded(...));
652
653 for brevity and a warning free compilation with llvm/clang
Damien Millerf2719b72014-04-20 13:22:18 +1000654 - tedu@cvs.openbsd.org 2014/03/26 19:58:37
655 [sshd.8 sshd.c]
656 remove libwrap support. ok deraadt djm mfriedl
Damien Millerc1621c82014-04-20 13:22:46 +1000657 - naddy@cvs.openbsd.org 2014/03/28 05:17:11
658 [ssh_config.5 sshd_config.5]
659 sync available and default algorithms, improve algorithm list formatting
660 help from jmc@ and schwarze@, ok deraadt@
Damien Miller43b156c2014-04-20 13:23:03 +1000661 - jmc@cvs.openbsd.org 2014/03/31 13:39:34
662 [ssh-keygen.1]
663 the text for the -K option was inserted in the wrong place in -r1.108;
664 fix From: Matthew Clarke
Damien Millerfcd62c02014-04-20 13:23:21 +1000665 - djm@cvs.openbsd.org 2014/04/01 02:05:27
666 [ssh-keysign.c]
667 include fingerprint of key not found
668 use arc4random_buf() instead of loop+arc4random()
Damien Miller7d6a9fb2014-04-20 13:23:43 +1000669 - djm@cvs.openbsd.org 2014/04/01 03:34:10
670 [sshconnect.c]
671 When using VerifyHostKeyDNS with a DNSSEC resolver, down-convert any
672 certificate keys to plain keys and attempt SSHFP resolution.
673
674 Prevents a server from skipping SSHFP lookup and forcing a new-hostkey
675 dialog by offering only certificate keys.
676
677 Reported by mcv21 AT cam.ac.uk
Damien Miller2a328432014-04-20 13:24:01 +1000678 - djm@cvs.openbsd.org 2014/04/01 05:32:57
679 [packet.c]
680 demote a debug3 to PACKET_DEBUG; ok markus@
Damien Miller75c62722014-04-20 13:24:31 +1000681 - djm@cvs.openbsd.org 2014/04/12 04:55:53
682 [sshd.c]
683 avoid crash at exit: check that pmonitor!=NULL before dereferencing;
684 bz#2225, patch from kavi AT juniper.net
Damien Milleradbfdbb2014-04-20 13:24:49 +1000685 - djm@cvs.openbsd.org 2014/04/16 23:22:45
686 [bufaux.c]
687 skip leading zero bytes in buffer_put_bignum2_from_string();
688 reported by jan AT mojzis.com; ok markus@
Damien Miller8c492da2014-04-20 13:25:09 +1000689 - djm@cvs.openbsd.org 2014/04/16 23:28:12
690 [ssh-agent.1]
691 remove the identity files from this manpage - ssh-agent doesn't deal
692 with them at all and the same information is duplicated in ssh-add.1
693 (which does deal with them); prodded by deraadt@
Damien Miller9395b282014-04-20 13:25:30 +1000694 - djm@cvs.openbsd.org 2014/04/18 23:52:25
695 [compat.c compat.h sshconnect2.c sshd.c version.h]
696 OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections
697 using the curve25519-sha256@libssh.org KEX exchange method to fail
698 when connecting with something that implements the spec properly.
699
700 Disable this KEX method when speaking to one of the affected
701 versions.
702
703 reported by Aris Adamantiadis; ok markus@
Damien Miller0e6b6742014-04-20 13:27:01 +1000704 - djm@cvs.openbsd.org 2014/04/19 05:54:59
705 [compat.c]
706 missing wildcard; pointed out by naddy@
Damien Miller84c1e7b2014-04-20 13:27:53 +1000707 - tedu@cvs.openbsd.org 2014/04/19 14:53:48
708 [ssh-keysign.c sshd.c]
709 Delete futile calls to RAND_seed. ok djm
710 NB. Id sync only. This only applies to OpenBSD's libcrypto slashathon
Damien Miller69cb24b2014-04-20 13:29:06 +1000711 - tedu@cvs.openbsd.org 2014/04/19 18:15:16
712 [sshd.8]
713 remove some really old rsh references
Damien Miller16f85cb2014-04-20 13:29:28 +1000714 - tedu@cvs.openbsd.org 2014/04/19 18:42:19
715 [ssh.1]
716 delete .xr to hosts.equiv. there's still an unfortunate amount of
717 documentation referring to rhosts equivalency in here.
Damien Miller88856692014-04-20 13:33:19 +1000718 - djm@cvs.openbsd.org 2014/04/20 02:30:25
719 [misc.c misc.h umac.c]
720 use get/put_u32 to load values rather than *((UINT32 *)p) that breaks on
721 strict-alignment architectures; reported by and ok stsp@
Damien Millerb628cc42014-04-20 13:33:58 +1000722 - djm@cvs.openbsd.org 2014/04/20 02:49:32
723 [compat.c]
724 add a canonical 6.6 + curve25519 bignum fix fake version that I can
725 recommend people use ahead of the openssh-6.7 release
Damien Millerc10bf4d2014-04-20 12:58:04 +1000726
Damien Miller14928b72014-04-01 14:38:07 +110072720140401
728 - (djm) On platforms that support it, use prctl() to prevent sftp-server
729 from accessing /proc/self/{mem,maps}; patch from jann AT thejh.net
Damien Millerc2e49062014-04-01 14:42:46 +1100730 - (djm) Use full release (e.g. 6.5p1) in debug output rather than just
731 version. From des@des.no
Damien Miller14928b72014-04-01 14:38:07 +1100732
Damien Miller48abc472014-03-17 14:45:56 +110073320140317
734 - (djm) [sandbox-seccomp-filter.c] Soft-fail stat() syscalls. Add XXX to
735 remind myself to add sandbox violation logging via the log socket.
736
Tim Rice9c366982014-03-14 12:45:01 -070073720140314
738 - (tim) [opensshd.init.in] Add support for ed25519
739
Damien Miller19158b22014-03-13 13:14:21 +110074020140313
741 - (djm) Release OpenSSH 6.6
742
Damien Miller8569eba2014-03-04 09:35:17 +110074320140304
744 - OpenBSD CVS Sync
745 - djm@cvs.openbsd.org 2014/03/03 22:22:30
746 [session.c]
747 ignore enviornment variables with embedded '=' or '\0' characters;
748 spotted by Jann Horn; ok deraadt@
749
Damien Miller2476c312014-03-02 04:01:00 +110075020140301
751 - (djm) [regress/Makefile] Disable dhgex regress test; it breaks when
752 no moduli file exists at the expected location.
753
Damien Millerf9a9aab2014-02-28 10:00:27 +110075420140228
755 - OpenBSD CVS Sync
756 - djm@cvs.openbsd.org 2014/02/27 00:41:49
757 [bufbn.c]
758 fix unsigned overflow that could lead to reading a short ssh protocol
759 1 bignum value; found by Ben Hawkes; ok deraadt@
Damien Miller172ec7e2014-02-28 10:00:57 +1100760 - djm@cvs.openbsd.org 2014/02/27 08:25:09
761 [bufbn.c]
762 off by one in range check
Damien Millerfc5d6752014-02-28 10:01:28 +1100763 - djm@cvs.openbsd.org 2014/02/27 22:47:07
764 [sshd_config.5]
765 bz#2184 clarify behaviour of a keyword that appears in multiple
766 matching Match blocks; ok dtucker@
Damien Miller92cf5ad2014-02-28 10:01:53 +1100767 - djm@cvs.openbsd.org 2014/02/27 22:57:40
768 [version.h]
769 openssh-6.6
Damien Millerf483cc12014-02-28 10:19:11 +1100770 - dtucker@cvs.openbsd.org 2014/01/19 23:43:02
771 [regress/sftp-chroot.sh]
772 Don't use -q on sftp as it suppresses logging, instead redirect the
773 output to the regress logfile.
Damien Miller1e2aa3d2014-02-28 10:19:51 +1100774 - dtucker@cvs.openbsd.org 2014/01/20 00:00:30
Damien Millerb8439232014-02-28 10:21:26 +1100775 [sregress/ftp-chroot.sh]
Damien Miller1e2aa3d2014-02-28 10:19:51 +1100776 append to rather than truncating the log file
Damien Millerb8439232014-02-28 10:21:26 +1100777 - dtucker@cvs.openbsd.org 2014/01/25 04:35:32
778 [regress/Makefile regress/dhgex.sh]
779 Add a test for DH GEX sizes
Damien Miller624a3ca2014-02-28 10:22:37 +1100780 - djm@cvs.openbsd.org 2014/01/26 10:22:10
781 [regress/cert-hostkey.sh]
782 automatically generate revoked keys from listed keys rather than
783 manually specifying each type; from portable
784 (Id sync only)
Damien Millerd705d982014-02-28 10:23:26 +1100785 - djm@cvs.openbsd.org 2014/01/26 10:49:17
786 [scp-ssh-wrapper.sh scp.sh]
787 make sure $SCP is tested on the remote end rather than whichever one
788 happens to be in $PATH; from portable
789 (Id sync only)
Damien Miller4f7f1a92014-02-28 10:24:11 +1100790 - djm@cvs.openbsd.org 2014/02/27 20:04:16
791 [login-timeout.sh]
792 remove any existing LoginGraceTime from sshd_config before adding
793 a specific one for the test back in
Damien Miller834aeac2014-02-28 10:25:16 +1100794 - djm@cvs.openbsd.org 2014/02/27 21:21:25
795 [agent-ptrace.sh agent.sh]
796 keep return values that are printed in error messages;
797 from portable
798 (Id sync only)
Damien Miller6486f162014-02-28 10:03:52 +1100799 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
800 [contrib/suse/openssh.spec] Crank version numbers
Damien Millerc83fdf32014-02-28 10:34:03 +1100801 - (djm) [regress/host-expand.sh] Add RCS Id
Damien Millerf9a9aab2014-02-28 10:00:27 +1100802
Damien Miller08b57c62014-02-27 10:17:13 +110080320140227
804 - OpenBSD CVS Sync
805 - djm@cvs.openbsd.org 2014/02/26 20:18:37
806 [ssh.c]
807 bz#2205: avoid early hostname lookups unless canonicalisation is enabled;
808 ok dtucker@ markus@
Damien Millere6a74ae2014-02-27 10:17:49 +1100809 - djm@cvs.openbsd.org 2014/02/26 20:28:44
810 [auth2-gss.c gss-serv.c ssh-gss.h sshd.c]
811 bz#2107 - cache OIDs of supported GSSAPI mechanisms before privsep
812 sandboxing, as running this code in the sandbox can cause violations;
813 ok markus@
Damien Miller13481292014-02-27 10:18:32 +1100814 - djm@cvs.openbsd.org 2014/02/26 20:29:29
815 [channels.c]
816 don't assume that the socks4 username is \0 terminated;
817 spotted by Ben Hawkes; ok markus@
Damien Millerfb3423b2014-02-27 10:20:07 +1100818 - markus@cvs.openbsd.org 2014/02/26 21:53:37
819 [sshd.c]
820 ssh_gssapi_prepare_supported_oids needs GSSAPI
Damien Miller08b57c62014-02-27 10:17:13 +1100821
Damien Millerd3cf67e2014-02-24 15:55:36 +110082220140224
823 - OpenBSD CVS Sync
824 - djm@cvs.openbsd.org 2014/02/07 06:55:54
825 [cipher.c mac.c]
826 remove some logging that makes ssh debugging output very verbose;
827 ok markus
Damien Miller0890dc82014-02-24 15:56:07 +1100828 - djm@cvs.openbsd.org 2014/02/15 23:05:36
829 [channels.c]
830 avoid spurious "getsockname failed: Bad file descriptor" errors in ssh -W;
831 bz#2200, debian#738692 via Colin Watson; ok dtucker@
Damien Miller06287802014-02-24 15:56:45 +1100832 - djm@cvs.openbsd.org 2014/02/22 01:32:19
833 [readconf.c]
834 when processing Match blocks, skip 'exec' clauses if previous predicates
835 failed to match; ok markus@
Damien Millerbee3a232014-02-24 15:57:22 +1100836 - djm@cvs.openbsd.org 2014/02/23 20:03:42
837 [ssh-ed25519.c]
838 check for unsigned overflow; not reachable in OpenSSH but others might
839 copy our code...
Damien Miller13f97b22014-02-24 15:57:55 +1100840 - djm@cvs.openbsd.org 2014/02/23 20:11:36
841 [readconf.c readconf.h ssh.c ssh_config.5]
842 reparse ssh_config and ~/.ssh/config if hostname canonicalisation changes
843 the hostname. This allows users to write configurations that always
844 refer to canonical hostnames, e.g.
845
846 CanonicalizeHostname yes
847 CanonicalDomains int.example.org example.org
848 CanonicalizeFallbackLocal no
849
850 Host *.int.example.org
851 Compression off
852 Host *.example.org
853 User djm
854
855 ok markus@
Tim Rice03ae0812014-02-21 09:09:34 -0800856
Darren Tucker4a209592014-02-13 16:38:32 +110085720140213
858 - (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}] Add compat
859 code for older OpenSSL versions that don't have EVP_MD_CTX_copy_ex.
860
Damien Miller6ce35b62014-02-07 09:24:14 +110086120140207
862 - OpenBSD CVS Sync
863 - naddy@cvs.openbsd.org 2014/02/05 20:13:25
864 [ssh-keygen.1 ssh-keygen.c]
865 tweak synopsis: calling ssh-keygen without any arguments is fine; ok jmc@
866 while here, fix ordering in usage(); requested by jmc@
Damien Millerd1a7a9c2014-02-07 09:24:33 +1100867 - djm@cvs.openbsd.org 2014/02/06 22:21:01
868 [sshconnect.c]
869 in ssh_create_socket(), only do the getaddrinfo for BindAddress when
870 BindAddress is actually specified. Fixes regression in 6.5 for
871 UsePrivilegedPort=yes; patch from Corinna Vinschen
Damien Miller6ce35b62014-02-07 09:24:14 +1100872
Darren Tucker8d36f9a2014-02-06 10:44:13 +110087320140206
874 - (dtucker) [openbsd-compat/bsd-poll.c] Don't bother checking for non-NULL
875 before freeing since free(NULL) is a no-op. ok djm.
Damien Miller6434cb22014-02-06 11:17:50 +1100876 - (djm) [sandbox-seccomp-filter.c] Not all Linux architectures define
877 __NR_shutdown; some go via the socketcall(2) multiplexer.
Darren Tucker8d36f9a2014-02-06 10:44:13 +1100878
Damien Millera0959da2014-02-05 10:33:45 +110087920140205
880 - (djm) [sandbox-capsicum.c] Don't fatal if Capsicum is offered by
881 headers/libc but not supported by the kernel. Patch from Loganaden
882 Velvindron @ AfriNIC
883
Damien Miller4e8d9372014-02-04 11:02:42 +110088420140204
885 - OpenBSD CVS Sync
886 - markus@cvs.openbsd.org 2014/01/27 18:58:14
887 [Makefile.in digest.c digest.h hostfile.c kex.h mac.c hmac.c hmac.h]
888 replace openssl HMAC with an implementation based on our ssh_digest_*
889 ok and feedback djm@
Damien Miller4a1c7aa2014-02-04 11:03:36 +1100890 - markus@cvs.openbsd.org 2014/01/27 19:18:54
891 [auth-rsa.c cipher.c ssh-agent.c sshconnect1.c sshd.c]
892 replace openssl MD5 with our ssh_digest_*; ok djm@
Damien Millerec93d152014-02-04 11:07:13 +1100893 - markus@cvs.openbsd.org 2014/01/27 20:13:46
894 [digest.c digest-openssl.c digest-libc.c Makefile.in]
895 rename digest.c to digest-openssl.c and add libc variant; ok djm@
Damien Millerf8f35bc2014-02-04 11:09:12 +1100896 - jmc@cvs.openbsd.org 2014/01/28 14:13:39
897 [ssh-keyscan.1]
898 kill some bad Pa;
899 From: Jan Stary
Damien Millerb0f26542014-02-04 11:10:01 +1100900 - djm@cvs.openbsd.org 2014/01/29 00:19:26
901 [sshd.c]
902 use kill(0, ...) instead of killpg(0, ...); on most operating systems
903 they are equivalent, but SUSv2 describes the latter as having undefined
904 behaviour; from portable; ok dtucker
905 (Id sync only; change is already in portable)
Damien Miller7cc194f2014-02-04 11:12:56 +1100906 - djm@cvs.openbsd.org 2014/01/29 06:18:35
907 [Makefile.in auth.h auth2-jpake.c auth2.c jpake.c jpake.h monitor.c]
908 [monitor.h monitor_wrap.c monitor_wrap.h readconf.c readconf.h]
909 [schnorr.c schnorr.h servconf.c servconf.h ssh2.h sshconnect2.c]
910 remove experimental, never-enabled JPAKE code; ok markus@
Damien Millere1e480a2014-02-04 11:13:17 +1100911 - jmc@cvs.openbsd.org 2014/01/29 14:04:51
912 [sshd_config.5]
913 document kbdinteractiveauthentication;
914 requested From: Ross L Richardson
915
916 dtucker/markus helped explain its workings;
Damien Miller3928de02014-02-04 11:13:54 +1100917 - djm@cvs.openbsd.org 2014/01/30 22:26:14
918 [sandbox-systrace.c]
919 allow shutdown(2) syscall in sandbox - it may be called by packet_close()
920 from portable
921 (Id sync only; change is already in portable)
Damien Miller1d2c4562014-02-04 11:18:20 +1100922 - tedu@cvs.openbsd.org 2014/01/31 16:39:19
923 [auth2-chall.c authfd.c authfile.c bufaux.c bufec.c canohost.c]
924 [channels.c cipher-chachapoly.c clientloop.c configure.ac hostfile.c]
925 [kexc25519.c krl.c monitor.c sandbox-systrace.c session.c]
926 [sftp-client.c ssh-keygen.c ssh.c sshconnect2.c sshd.c sshlogin.c]
927 [openbsd-compat/explicit_bzero.c openbsd-compat/openbsd-compat.h]
928 replace most bzero with explicit_bzero, except a few that cna be memset
929 ok djm dtucker
Damien Millera5103f42014-02-04 11:20:14 +1100930 - djm@cvs.openbsd.org 2014/02/02 03:44:32
931 [auth1.c auth2-chall.c auth2-passwd.c authfile.c bufaux.c bufbn.c]
932 [buffer.c cipher-3des1.c cipher.c clientloop.c gss-serv.c kex.c]
933 [kexdhc.c kexdhs.c kexecdhc.c kexgexc.c kexecdhs.c kexgexs.c key.c]
934 [monitor.c monitor_wrap.c packet.c readpass.c rsa.c serverloop.c]
935 [ssh-add.c ssh-agent.c ssh-dss.c ssh-ecdsa.c ssh-ed25519.c]
936 [ssh-keygen.c ssh-rsa.c sshconnect.c sshconnect1.c sshconnect2.c]
937 [sshd.c]
938 convert memset of potentially-private data to explicit_bzero()
Damien Milleraae07e22014-02-04 11:20:40 +1100939 - djm@cvs.openbsd.org 2014/02/03 23:28:00
940 [ssh-ecdsa.c]
941 fix memory leak; ECDSA_SIG_new() allocates 'r' and 's' for us, unlike
942 DSA_SIG_new. Reported by Batz Spear; ok markus@
Damien Millerdb3c5952014-02-04 11:25:45 +1100943 - djm@cvs.openbsd.org 2014/02/02 03:44:31
944 [digest-libc.c digest-openssl.c]
945 convert memset of potentially-private data to explicit_bzero()
Damien Millereb6d8702014-02-04 11:26:34 +1100946 - djm@cvs.openbsd.org 2014/02/04 00:24:29
947 [ssh.c]
948 delay lowercasing of hostname until right before hostname
949 canonicalisation to unbreak case-sensitive matching of ssh_config;
950 reported by Ike Devolder; ok markus@
Damien Millerbf7e0f02014-02-04 11:37:50 +1100951 - (djm) [openbsd-compat/Makefile.in] Add missing explicit_bzero.o
Damien Miller9c449bc2014-02-04 11:38:28 +1100952 - (djm) [regress/setuid-allowed.c] Missing string.h for strerror()
Damien Miller4e8d9372014-02-04 11:02:42 +1100953
Damien Miller7e5cec62014-01-31 09:25:34 +110095420140131
955 - (djm) [sandbox-seccomp-filter.c sandbox-systrace.c] Allow shutdown(2)
956 syscall from sandboxes; it may be called by packet_close.
Darren Tucker0eeafcd2014-01-31 14:18:51 +1100957 - (dtucker) [readconf.c] Include <arpa/inet.h> for the hton macros. Fixes
958 build with HP-UX's compiler. Patch from Kevin Brott.
Tim Rice69d0d092014-01-31 14:25:18 -0800959 - (tim) [Makefile.in] build regress/setuid-allow.
Damien Miller7e5cec62014-01-31 09:25:34 +1100960
Damien Millerc2868192014-01-30 10:21:19 +110096120140130
962 - (djm) [configure.ac] Only check for width-specified integer types
963 in headers that actually exist. patch from Tom G. Christensen;
964 ok dtucker@
Damien Millerf5bbd3b2014-01-30 11:26:46 +1100965 - (djm) [configure.ac atomicio.c] Kludge around NetBSD offering
966 different symbols for 'read' when various compiler flags are
967 in use, causing atomicio.c comparisons against it to break and
968 read/write operations to hang; ok dtucker
Damien Millercdb6c902014-01-30 12:50:17 +1100969 - (djm) Release openssh-6.5p1
Damien Millerc2868192014-01-30 10:21:19 +1100970
97120140129
Damien Millerc161fc92014-01-29 21:01:33 +1100972 - (djm) [configure.ac] Fix broken shell test '==' vs '='; patch from
973 Tom G. Christensen
974
Damien Millerab039492014-01-28 15:07:10 +110097520140128
976 - (djm) [configure.ac] Search for inet_ntop in libnsl and libresovl;
977 ok dtucker
Damien Millerab16ef42014-01-28 15:08:12 +1100978 - (djm) [sshd.c] Use kill(0, ...) instead of killpg(0, ...); the
979 latter being specified to have undefined behaviour in SUSv3;
980 ok dtucker
Tim Rice6f917ad2014-01-28 10:26:25 -0800981 - (tim) [regress/agent.sh regress/agent-ptrace.sh] Assign $? to a variable
982 when used as an error message inside an if statement so we display the
983 correct into. agent.sh patch from Petr Lautrbach.
Damien Millerab039492014-01-28 15:07:10 +1100984
Darren Tucker4ab20a82014-01-27 17:35:04 +110098520140127
986 - (dtucker) [Makefile.in] Remove trailing backslash which some make
987 implementations (eg older Solaris) do not cope with.
988
Darren Tuckere7e8b3c2014-01-27 17:32:50 +110098920140126
Damien Miller76eea4a2014-01-26 09:37:25 +1100990 - OpenBSD CVS Sync
991 - dtucker@cvs.openbsd.org 2014/01/25 10:12:50
992 [cipher.c cipher.h kex.c kex.h kexgexc.c]
993 Add a special case for the DH group size for 3des-cbc, which has an
994 effective strength much lower than the key size. This causes problems
995 with some cryptlib implementations, which don't support group sizes larger
996 than 4k but also don't use the largest group size it does support as
997 specified in the RFC. Based on a patch from Petr Lautrbach at Redhat,
998 reduced by me with input from Markus. ok djm@ markus@
Damien Millera92ac742014-01-26 09:38:03 +1100999 - markus@cvs.openbsd.org 2014/01/25 20:35:37
1000 [kex.c]
1001 dh_need needs to be set to max(seclen, blocksize, ivlen, mac_len)
1002 ok dtucker@, noted by mancha
Damien Miller2035b222014-01-26 09:39:53 +11001003 - (djm) [configure.ac sandbox-capsicum.c sandbox-rlimit.c] Disable
1004 RLIMIT_NOFILE pseudo-sandbox on FreeBSD. In some configurations,
1005 libc will attempt to open additional file descriptors for crypto
1006 offload and crash if they cannot be opened.
Damien Miller5b447c02014-01-26 09:46:53 +11001007 - (djm) [configure.ac] correct AC_DEFINE for previous.
Damien Miller76eea4a2014-01-26 09:37:25 +11001008
Darren Tuckere7e8b3c2014-01-27 17:32:50 +1100100920140125
Damien Millerf62ecef2014-01-25 12:34:38 +11001010 - (djm) [configure.ac] Fix detection of capsicum sandbox on FreeBSD
Damien Millerc96d8532014-01-25 13:12:28 +11001011 - (djm) [configure.ac] Do not attempt to use capsicum sandbox unless
1012 sys/capability.h exists and cap_rights_limit is in libc. Fixes
1013 build on FreeBSD9x which provides the header but not the libc
1014 support.
Damien Miller603b8f42014-01-25 13:16:59 +11001015 - (djm) [configure.ac] autoconf sets finds to 'yes' not '1', so test
1016 against the correct thing.
Damien Millerf62ecef2014-01-25 12:34:38 +11001017
Darren Tuckere7e8b3c2014-01-27 17:32:50 +1100101820140124
Damien Millerb0e0f762014-01-24 14:27:04 +11001019 - (djm) [Makefile.in regress/scp-ssh-wrapper.sh regress/scp.sh] Make
1020 the scp regress test actually test the built scp rather than the one
1021 in $PATH. ok dtucker@
1022
Darren Tuckere7e8b3c2014-01-27 17:32:50 +1100102320140123
Tim Rice617da332014-01-22 19:16:10 -08001024 - (tim) [session.c] Improve error reporting on set_id().
Darren Tucker42a09252014-01-23 23:14:39 +11001025 - (dtucker) [configure.ac] NetBSD's (and FreeBSD's) strnvis is gratuitously
1026 incompatible with OpenBSD's despite post-dating it by more than a decade.
1027 Declare it as broken, and document FreeBSD's as the same. ok djm@
Tim Rice617da332014-01-22 19:16:10 -08001028
Darren Tuckere7e8b3c2014-01-27 17:32:50 +1100102920140122
Damien Milleree878382014-01-22 16:30:15 +11001030 - (djm) [openbsd-compat/setproctitle.c] Don't fail to compile if a
1031 platform that is expected to use the reuse-argv style setproctitle
1032 hack surprises us by providing a setproctitle in libc; ok dtucker
Damien Miller852472a2014-01-22 16:31:18 +11001033 - (djm) [configure.ac] Unless specifically requested, only attempt
1034 to build Position Independent Executables on gcc >= 4.x; ok dtucker
Damien Miller5c2ff5e2014-01-22 21:30:12 +11001035 - (djm) [configure.ac aclocal.m4] More tests to detect fallout from
1036 platform hardening options: include some long long int arithmatic
1037 to detect missing support functions for -ftrapv in libgcc and
1038 equivalents, actually test linking when -ftrapv is supplied and
1039 set either both -pie/-fPIE or neither. feedback and ok dtucker@
Damien Milleree878382014-01-22 16:30:15 +11001040
Darren Tucker096118d2014-01-21 12:48:51 +1100104120140121
1042 - (dtucker) [configure.ac] Make PIE a configure-time option which defaults
1043 to on platforms where it's known to be reliably detected and off elsewhere.
1044 Works around platforms such as FreeBSD 9.1 where it does not interop with
1045 -ftrapv (it seems to work but fails when trying to link ssh). ok djm@
Darren Tuckera6d573c2014-01-21 12:50:46 +11001046 - (dtucker) [aclocal.m4] Differentiate between compile-time and link-time
1047 tests in the configure output. ok djm.
Tim Rice9464ba62014-01-20 17:59:28 -08001048 - (tim) [platform.c session.c] Fix bug affecting SVR5 platforms introduced
1049 with sftp chroot support. Move set_id call after chroot.
Damien Miller5c96a152014-01-21 13:10:26 +11001050 - (djm) [aclocal.m4] Flesh out the code run in the OSSH_CHECK_CFLAG_COMPILE
1051 and OSSH_CHECK_LDFLAG_LINK tests to give them a better chance of
1052 detecting toolchain-related problems; ok dtucker
Darren Tucker096118d2014-01-21 12:48:51 +11001053
Damien Miller35109792014-01-20 12:41:53 +1100105420140120
Darren Tuckerc74e70e2014-01-20 13:18:09 +11001055 - (dtucker) [gss-serv-krb5.c] Fall back to krb5_cc_gen_new if the Kerberos
1056 implementation does not have krb5_cc_new_unique, similar to what we do
1057 in auth-krb5.c.
Damien Millerf9df7f62014-01-20 20:07:15 +11001058 - (djm) [regress/cert-hostkey.sh] Fix regress failure on platforms that
1059 skip one or more key types (e.g. RHEL/CentOS 6.5); ok dtucker@
Damien Miller35109792014-01-20 12:41:53 +11001060 - (djm) OpenBSD CVS Sync
1061 - djm@cvs.openbsd.org 2014/01/20 00:08:48
1062 [digest.c]
1063 memleak; found by Loganaden Velvindron @ AfriNIC; ok markus@
1064
Darren Tucker2aca1592014-01-19 15:25:34 +1100106520140119
1066 - (dtucker) OpenBSD CVS Sync
1067 - dtucker@cvs.openbsd.org 2014/01/17 06:23:24
1068 [sftp-server.c]
1069 fix log message statvfs. ok djm
Darren Tucker293ee3c2014-01-19 15:28:01 +11001070 - dtucker@cvs.openbsd.org 2014/01/18 09:36:26
1071 [session.c]
1072 explicitly define USE_PIPES to 1 to prevent redefinition warnings in
Darren Tucker7b1ded02014-01-19 15:30:02 +11001073 portable on platforms that use pipes for everything. From vinschen at
1074 redhat.
1075 - dtucker@cvs.openbsd.org 2014/01/19 04:17:29
1076 [canohost.c addrmatch.c]
1077 Cast socklen_t when comparing to size_t and use socklen_t to iterate over
1078 the ip options, both to prevent signed/unsigned comparison warnings.
1079 Patch from vinschen at redhat via portable openssh, begrudging ok deraadt.
Darren Tuckerb7e01c02014-01-19 22:36:13 +11001080 - djm@cvs.openbsd.org 2014/01/19 04:48:08
1081 [ssh_config.5]
1082 fix inverted meaning of 'no' and 'yes' for CanonicalizeFallbackLocal
Darren Tucker7eee3582014-01-19 22:37:02 +11001083 - dtucker@cvs.openbsd.org 2014/01/19 11:21:51
1084 [addrmatch.c]
1085 Cast the sizeof to socklen_t so it'll work even if the supplied len is
1086 negative. Suggested by and ok djm, ok deraadt.
Darren Tucker2aca1592014-01-19 15:25:34 +11001087
Darren Tucker89c532d2014-01-18 20:43:49 +1100108820140118
1089 - (dtucker) [uidswap.c] Prevent unused variable warnings on Cygwin. Patch
1090 from vinschen at redhat.com
Darren Tucker1411c922014-01-18 21:03:59 +11001091 - (dtucker) [openbsd-compat/bsd-cygwin_util.h] Add missing function
1092 declarations that stopped being included when we stopped including
1093 <windows.h> from openbsd-compat/bsd-cygwin_util.h. Patch from vinschen at
1094 redhat.com.
Darren Tuckerfdce3732014-01-18 21:12:42 +11001095 - (dtucker) [configure.ac] On Cygwin the getopt variables (like optargs,
1096 optind) are defined in getopt.h already. Unfortunately they are defined as
1097 "declspec(dllimport)" for historical reasons, because the GNU linker didn't
1098 allow auto-import on PE/COFF targets way back when. The problem is the
1099 dllexport attributes collide with the definitions in the various source
1100 files in OpenSSH, which obviousy define the variables without
1101 declspec(dllimport). The least intrusive way to get rid of these warnings
1102 is to disable warnings for GCC compiler attributes when building on Cygwin.
1103 Patch from vinschen at redhat.com.
Darren Tucker841f7da2014-01-18 22:12:15 +11001104 - (dtucker) [sandbox-capsicum.c] Correct some error messages and make the
1105 return value check for cap_enter() consistent with the other uses in
1106 FreeBSD. From by Loganaden Velvindron @ AfriNIC via bz#2140.
Darren Tucker89c532d2014-01-18 20:43:49 +11001107
Darren Tuckerfd994372014-01-17 09:53:24 +1100110820140117
1109 - (dtucker) [aclocal.m4 configure.ac] Add some additional compiler/toolchain
1110 hardening flags including -fstack-protector-strong. These default to on
1111 if the toolchain supports them, but there is a configure-time knob
1112 (--without-hardening) to disable them if necessary. ok djm@
Damien Millerc3d483f2014-01-17 11:20:26 +11001113 - (djm) [sftp-client.c] signed/unsigned comparison fix
Darren Tucker1c4a0112014-01-17 12:23:23 +11001114 - (dtucker) [loginrec.c] Cast to the types specfied in the format
1115 specification to prevent warnings.
Darren Tuckerac413b62014-01-17 12:31:33 +11001116 - (dtucker) [crypto_api.h] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.
Darren Tucker99df3692014-01-17 12:42:17 +11001117 - (dtucker) [poly1305.c] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.
Darren Tuckerf45f78a2014-01-17 12:43:43 +11001118 - (dtucker) [blocks.c fe25519.c ge25519.c hash.c sc25519.c verify.c] Include
1119 includes.h to pull in all of the compatibility stuff.
Darren Tuckerc3ed0652014-01-17 14:18:45 +11001120 - (dtucker) [openbsd-compat/bcrypt_pbkdf.c] Wrap stdlib.h include inside
1121 #ifdef HAVE_STDINT_H.
Darren Tuckeracad3512014-01-17 14:20:05 +11001122 - (dtucker) [defines.h] Add typedefs for uintXX_t types for platforms that
1123 don't have them.
Darren Tuckerc5487222014-01-17 15:12:16 +11001124 - (dtucker) [configure.ac] Split AC_CHECK_FUNCS for OpenSSL functions into
1125 separate lines and alphabetize for easier diffing of changes.
Darren Tucker5f1c57a2014-01-17 16:29:45 +11001126 - (dtucker) OpenBSD CVS Sync
1127 - djm@cvs.openbsd.org 2014/01/17 00:21:06
1128 [sftp-client.c]
1129 signed/unsigned comparison warning fix; from portable (Id sync only)
Darren Tuckera9d186a2014-01-17 16:30:49 +11001130 - dtucker@cvs.openbsd.org 2014/01/17 05:26:41
1131 [digest.c]
1132 remove unused includes. ok djm@
Damien Miller868ea1e2014-01-17 16:47:04 +11001133 - (djm) [Makefile.in configure.ac sandbox-capsicum.c sandbox-darwin.c]
1134 [sandbox-null.c sandbox-rlimit.c sandbox-seccomp-filter.c]
1135 [sandbox-systrace.c ssh-sandbox.h sshd.c] Support preauth sandboxing
1136 using the Capsicum API introduced in FreeBSD 10. Patch by Dag-Erling
1137 Smorgrav, updated by Loganaden Velvindron @ AfriNIC; ok dtucker@
Darren Tuckerd23a91f2014-01-17 17:32:30 +11001138 - (dtucker) [configure.ac digest.c openbsd-compat/openssl-compat.c
1139 openbsd-compat/openssl-compat.h] Add compatibility layer for older
1140 openssl versions. ok djm@
Darren Tucker1357d712014-01-17 18:00:40 +11001141 - (dtucker) Fix typo in #ifndef.
Darren Tuckera5cf1e22014-01-17 18:10:58 +11001142 - (dtucker) [configure.ac openbsd-compat/bsd-statvfs.c
1143 openbsd-compat/bsd-statvfs.h] Implement enough of statvfs on top of statfs
1144 to be useful (and for the regression tests to pass) on platforms that
1145 have statfs and fstatfs. ok djm@
Darren Tucker50556992014-01-17 18:48:22 +11001146 - (dtucker) [openbsd-compat/bsd-statvfs.h] Only start including headers if we
1147 need them to cut down on the name collisions.
Darren Tucker6d725682014-01-17 19:17:34 +11001148 - (dtucker) [configure.ac] Also look in inttypes.h for uintXX_t types.
Darren Tucker9edcbff2014-01-17 21:54:32 +11001149 - (dtucker) [configure.ac] Have --without-hardening not turn off
1150 stack-protector since that has a separate flag that's been around a while.
Darren Tuckera3357662014-01-18 00:03:57 +11001151 - (dtucker) [readconf.c] Wrap paths.h inside an ifdef. Allows building on
1152 Solaris.
Darren Tucker355f8612014-01-18 00:12:38 +11001153 - (dtucker) [defines.h] Move our definitions of uintXX_t types down to after
1154 they're defined if we have to define them ourselves. Fixes builds on old
1155 AIX.
Darren Tuckerfd994372014-01-17 09:53:24 +11001156
Damien Miller52c371c2014-01-16 18:42:10 +1100115720140118
1158 - (djm) OpenBSD CVS Sync
1159 - djm@cvs.openbsd.org 2014/01/16 07:31:09
1160 [sftp-client.c]
1161 needless and incorrect cast to size_t can break resumption of
1162 large download; patch from tobias@
Damien Miller0fa29e62014-01-16 18:42:31 +11001163 - djm@cvs.openbsd.org 2014/01/16 07:32:00
1164 [version.h]
1165 openssh-6.5
Damien Miller2ae77e62014-01-16 18:51:07 +11001166 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1167 [contrib/suse/openssh.spec] Crank RPM spec version numbers.
Damien Miller366224d2014-01-16 18:51:44 +11001168 - (djm) [README] update release notes URL.
Damien Miller52c371c2014-01-16 18:42:10 +11001169
Damien Milleraf5d4482014-01-12 19:20:47 +1100117020140112
1171 - (djm) OpenBSD CVS Sync
1172 - djm@cvs.openbsd.org 2014/01/10 05:59:19
1173 [sshd_config]
1174 the /etc/ssh/ssh_host_ed25519_key is loaded by default too
Damien Miller91b580e2014-01-12 19:21:22 +11001175 - djm@cvs.openbsd.org 2014/01/12 08:13:13
1176 [bufaux.c buffer.h kex.c kex.h kexc25519.c kexc25519c.c kexc25519s.c]
1177 [kexdhc.c kexdhs.c kexecdhc.c kexecdhs.c kexgexc.c kexgexs.c]
1178 avoid use of OpenSSL BIGNUM type and functions for KEX with
1179 Curve25519 by adding a buffer_put_bignum2_from_string() that stores
1180 a string using the bignum encoding rules. Will make it easier to
1181 build a reduced-feature OpenSSH without OpenSSL in the future;
1182 ok markus@
Damien Milleraf5d4482014-01-12 19:20:47 +11001183
Damien Miller3e498532014-01-10 10:37:05 +1100118420140110
1185 - (djm) OpenBSD CVS Sync
1186 - tedu@cvs.openbsd.org 2014/01/04 17:50:55
1187 [mac.c monitor_mm.c monitor_mm.h xmalloc.c]
1188 use standard types and formats for size_t like variables. ok dtucker
Damien Millere00e4132014-01-10 10:40:45 +11001189 - guenther@cvs.openbsd.org 2014/01/09 03:26:00
1190 [sftp-common.c]
1191 When formating the time for "ls -l"-style output, show dates in the future
1192 with the year, and rearrange a comparison to avoid a potentional signed
1193 arithmetic overflow that would give the wrong result.
1194 ok djm@
Damien Millerb3051d02014-01-10 10:58:53 +11001195 - djm@cvs.openbsd.org 2014/01/09 23:20:00
1196 [digest.c digest.h hostfile.c kex.c kex.h kexc25519.c kexc25519c.c]
1197 [kexc25519s.c kexdh.c kexecdh.c kexecdhc.c kexecdhs.c kexgex.c kexgexc.c]
1198 [kexgexs.c key.c key.h roaming_client.c roaming_common.c schnorr.c]
1199 [schnorr.h ssh-dss.c ssh-ecdsa.c ssh-rsa.c sshconnect2.c]
1200 Introduce digest API and use it to perform all hashing operations
1201 rather than calling OpenSSL EVP_Digest* directly. Will make it easier
1202 to build a reduced-feature OpenSSH without OpenSSL in future;
1203 feedback, ok markus@
Damien Miller58cd63b2014-01-10 10:59:24 +11001204 - djm@cvs.openbsd.org 2014/01/09 23:26:48
1205 [sshconnect.c sshd.c]
1206 ban clients/servers that suffer from SSH_BUG_DERIVEKEY, they are ancient,
1207 deranged and might make some attacks on KEX easier; ok markus@
Damien Miller3e498532014-01-10 10:37:05 +11001208
Damien Millera9c1e502014-01-08 16:13:12 +1100120920140108
1210 - (djm) [regress/.cvsignore] Ignore regress test droppings; ok dtucker@
1211
Damien Miller324541e2013-12-31 12:25:40 +1100121220131231
1213 - (djm) OpenBSD CVS Sync
1214 - djm@cvs.openbsd.org 2013/12/30 23:52:28
1215 [auth2-hostbased.c auth2-pubkey.c compat.c compat.h ssh-rsa.c]
1216 [sshconnect.c sshconnect2.c sshd.c]
1217 refuse RSA keys from old proprietary clients/servers that use the
1218 obsolete RSA+MD5 signature scheme. it will still be possible to connect
1219 with these clients/servers but only DSA keys will be accepted, and we'll
1220 deprecate them entirely in a future release. ok markus@
1221
Damien Miller7d97fd92013-12-29 17:40:18 +1100122220131229
1223 - (djm) [loginrec.c] Check for username truncation when looking up lastlog
1224 entries
Damien Miller9f4c8e72013-12-29 17:57:46 +11001225 - (djm) [regress/Makefile] Add some generated files for cleaning
Damien Milleref275ea2013-12-29 17:44:07 +11001226 - (djm) OpenBSD CVS Sync
1227 - djm@cvs.openbsd.org 2013/12/19 00:10:30
1228 [ssh-add.c]
1229 skip requesting smartcard PIN when removing keys from agent; bz#2187
1230 patch from jay AT slushpupie.com; ok dtucker
Damien Millerbb3dafe2013-12-29 17:44:29 +11001231 - dtucker@cvs.openbsd.org 2013/12/19 00:19:12
1232 [serverloop.c]
1233 Cast client_alive_interval to u_int64_t before assinging to
1234 max_time_milliseconds to avoid potential integer overflow in the timeout.
1235 bz#2170, patch from Loganaden Velvindron, ok djm@
Damien Millerbf25d112013-12-29 17:44:56 +11001236 - djm@cvs.openbsd.org 2013/12/19 00:27:57
1237 [auth-options.c]
1238 simplify freeing of source-address certificate restriction
Damien Miller4def1842013-12-29 17:45:26 +11001239 - djm@cvs.openbsd.org 2013/12/19 01:04:36
1240 [channels.c]
1241 bz#2147: fix multiple remote forwardings with dynamically assigned
1242 listen ports. In the s->c message to open the channel we were sending
1243 zero (the magic number to request a dynamic port) instead of the actual
1244 listen port. The client therefore had no way of discriminating between
1245 them.
1246
1247 Diagnosis and fix by ronf AT timeheart.net
Damien Miller0b36c832013-12-29 17:45:51 +11001248 - djm@cvs.openbsd.org 2013/12/19 01:19:41
1249 [ssh-agent.c]
1250 bz#2186: don't crash (NULL deref) when deleting PKCS#11 keys from an agent
1251 that has a mix of normal and PKCS#11 keys; fix from jay AT slushpupie.com;
1252 ok dtucker
Damien Miller339a48f2013-12-29 17:46:49 +11001253 - djm@cvs.openbsd.org 2013/12/19 22:57:13
1254 [poly1305.c poly1305.h]
1255 use full name for author, with his permission
Damien Miller13797712013-12-29 17:47:14 +11001256 - tedu@cvs.openbsd.org 2013/12/21 07:10:47
1257 [ssh-keygen.1]
1258 small typo
Damien Miller3e192952013-12-29 17:47:50 +11001259 - djm@cvs.openbsd.org 2013/12/27 22:30:17
1260 [ssh-dss.c ssh-ecdsa.c ssh-rsa.c]
1261 make the original RSA and DSA signing/verification code look more like
1262 the ECDSA/Ed25519 ones: use key_type_plain() when checking the key type
1263 rather than tediously listing all variants, use __func__ for debug/
1264 error messages
Damien Miller06122e92013-12-29 17:48:15 +11001265 - djm@cvs.openbsd.org 2013/12/27 22:37:18
1266 [ssh-rsa.c]
1267 correct comment
Damien Miller83f2fe22013-12-29 17:48:38 +11001268 - djm@cvs.openbsd.org 2013/12/29 02:28:10
1269 [key.c]
1270 allow ed25519 keys to appear as certificate authorities
Damien Miller5baeacf2013-12-29 17:48:55 +11001271 - djm@cvs.openbsd.org 2013/12/29 02:37:04
1272 [key.c]
1273 correct comment for key_to_certified()
Damien Miller9de4fcd2013-12-29 17:49:13 +11001274 - djm@cvs.openbsd.org 2013/12/29 02:49:52
1275 [key.c]
1276 correct comment for key_drop_cert()
Damien Miller29ace1c2013-12-29 17:49:31 +11001277 - djm@cvs.openbsd.org 2013/12/29 04:20:04
1278 [key.c]
1279 to make sure we don't omit any key types as valid CA keys again,
1280 factor the valid key type check into a key_type_is_valid_ca()
1281 function
Damien Millerf72cdde2013-12-29 17:49:55 +11001282 - djm@cvs.openbsd.org 2013/12/29 04:29:25
1283 [authfd.c]
1284 allow deletion of ed25519 keys from the agent
Damien Millerb9a95492013-12-29 17:50:15 +11001285 - djm@cvs.openbsd.org 2013/12/29 04:35:50
1286 [authfile.c]
1287 don't refuse to load Ed25519 certificates
Damien Miller0fa47cf2013-12-29 17:53:39 +11001288 - djm@cvs.openbsd.org 2013/12/29 05:42:16
1289 [ssh.c]
1290 don't forget to load Ed25519 certs too
Damien Miller106bf1c2013-12-29 17:54:03 +11001291 - djm@cvs.openbsd.org 2013/12/29 05:57:02
1292 [sshconnect.c]
1293 when showing other hostkeys, don't forget Ed25519 keys
Damien Miller7d97fd92013-12-29 17:40:18 +11001294
Darren Tucker77244af2013-12-21 17:02:39 +1100129520131221
1296 - (dtucker) [regress/keytype.sh] Actually test ecdsa key types.
1297
Darren Tucker1fcec9d2013-12-19 11:00:12 +1100129820131219
1299 - (dtucker) [configure.ac] bz#2178: Don't try to use BSM on Solaris versions
1300 greater than 11 either rather than just 11. Patch from Tomas Kuthan.
Darren Tucker53f8e782013-12-19 11:31:44 +11001301 - (dtucker) [auth-pam.c] bz#2163: check return value from pam_get_item().
1302 Patch from Loganaden Velvindron.
Darren Tucker1fcec9d2013-12-19 11:00:12 +11001303
Damien Miller4f752cf2013-12-18 17:45:35 +1100130420131218
1305 - (djm) OpenBSD CVS Sync
1306 - djm@cvs.openbsd.org 2013/12/07 08:08:26
1307 [ssh-keygen.1]
1308 document -a and -o wrt new key format
Damien Miller8ba0ead2013-12-18 17:46:27 +11001309 - naddy@cvs.openbsd.org 2013/12/07 11:58:46
1310 [ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8 ssh.1]
1311 [ssh_config.5 sshd.8 sshd_config.5]
1312 add missing mentions of ed25519; ok djm@
Damien Miller6575c3a2013-12-18 17:47:02 +11001313 - dtucker@cvs.openbsd.org 2013/12/08 09:53:27
1314 [sshd_config.5]
1315 Use a literal for the default value of KEXAlgorithms. ok deraadt jmc
Damien Miller8a56dc22013-12-18 17:48:11 +11001316 - markus@cvs.openbsd.org 2013/12/09 11:03:45
1317 [blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]
1318 [ge25519_base.data hash.c sc25519.c sc25519.h verify.c]
1319 Add Authors for the public domain ed25519/nacl code.
1320 see also http://nacl.cr.yp.to/features.html
1321 All of the NaCl software is in the public domain.
1322 and http://ed25519.cr.yp.to/software.html
1323 The Ed25519 software is in the public domain.
Damien Miller155b5a52013-12-18 17:48:32 +11001324 - markus@cvs.openbsd.org 2013/12/09 11:08:17
1325 [crypto_api.h]
1326 remove unused defines
Damien Miller059321d2013-12-18 17:49:48 +11001327 - pascal@cvs.openbsd.org 2013/12/15 18:17:26
1328 [ssh-add.c]
1329 Make ssh-add also add .ssh/id_ed25519; fixes lie in manual page.
1330 ok markus@
Damien Millerd58a5962013-12-18 17:50:13 +11001331 - djm@cvs.openbsd.org 2013/12/15 21:42:35
1332 [cipher-chachapoly.c]
1333 add some comments and constify a constant
Damien Miller6674eb92013-12-18 17:50:39 +11001334 - markus@cvs.openbsd.org 2013/12/17 10:36:38
1335 [crypto_api.h]
1336 I've assempled the header file by cut&pasting from generated headers
1337 and the source files.
Damien Miller4f752cf2013-12-18 17:45:35 +11001338
Damien Miller7e6e42f2013-12-08 08:23:08 +1100133920131208
1340 - (djm) [openbsd-compat/bsd-setres_id.c] Missing header; from Corinna
1341 Vinschen
Damien Miller6d6fcd12013-12-08 15:53:28 +11001342 - (djm) [Makefile.in regress/Makefile regress/agent-ptrace.sh]
1343 [regress/setuid-allowed.c] Check that ssh-agent is not on a no-setuid
1344 filesystem before running agent-ptrace.sh; ok dtucker
Damien Miller7e6e42f2013-12-08 08:23:08 +11001345
Damien Miller39392072013-12-07 10:31:08 +1100134620131207
1347 - (djm) OpenBSD CVS Sync
1348 - djm@cvs.openbsd.org 2013/12/05 22:59:45
1349 [sftp-client.c]
1350 fix memory leak in error path in do_readdir(); pointed out by
1351 Loganaden Velvindron @ AfriNIC in bz#2163
Damien Miller0f8536d2013-12-07 10:31:37 +11001352 - djm@cvs.openbsd.org 2013/12/06 03:40:51
1353 [ssh-keygen.c]
1354 remove duplicated character ('g') in getopt() string;
1355 document the (few) remaining option characters so we don't have to
1356 rummage next time.
Damien Millerf0e90602013-12-07 10:40:26 +11001357 - markus@cvs.openbsd.org 2013/12/06 13:30:08
1358 [authfd.c key.c key.h ssh-agent.c]
1359 move private key (de)serialization to key.c; ok djm
Damien Millerbcd00ab2013-12-07 10:41:55 +11001360 - markus@cvs.openbsd.org 2013/12/06 13:34:54
1361 [authfile.c authfile.h cipher.c cipher.h key.c packet.c ssh-agent.c]
1362 [ssh-keygen.c PROTOCOL.key] new private key format, bcrypt as KDF by
1363 default; details in PROTOCOL.key; feedback and lots help from djm;
1364 ok djm@
Damien Miller5be9d9e2013-12-07 11:24:01 +11001365 - markus@cvs.openbsd.org 2013/12/06 13:39:49
1366 [authfd.c authfile.c key.c key.h myproposal.h pathnames.h readconf.c]
1367 [servconf.c ssh-agent.c ssh-keygen.c ssh-keyscan.1 ssh-keyscan.c]
1368 [ssh-keysign.c ssh.c ssh_config.5 sshd.8 sshd.c verify.c ssh-ed25519.c]
1369 [sc25519.h sc25519.c hash.c ge25519_base.data ge25519.h ge25519.c]
1370 [fe25519.h fe25519.c ed25519.c crypto_api.h blocks.c]
1371 support ed25519 keys (hostkeys and user identities) using the public
1372 domain ed25519 reference code from SUPERCOP, see
1373 http://ed25519.cr.yp.to/software.html
1374 feedback, help & ok djm@
Damien Millera7827c12013-12-07 11:24:30 +11001375 - jmc@cvs.openbsd.org 2013/12/06 15:29:07
1376 [sshd.8]
1377 missing comma;
Damien Millerca570a52013-12-07 11:29:09 +11001378 - djm@cvs.openbsd.org 2013/12/07 00:19:15
1379 [key.c]
1380 set k->cert = NULL after freeing it
Damien Millerf54542a2013-12-07 16:32:44 +11001381 - markus@cvs.openbsd.org 2013/12/06 13:52:46
1382 [regress/Makefile regress/agent.sh regress/cert-hostkey.sh]
1383 [regress/cert-userkey.sh regress/keytype.sh]
1384 test ed25519 support; from djm@
Damien Millerf104da22013-12-07 12:37:53 +11001385 - (djm) [blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]
Damien Miller3cccc0e2013-12-07 11:27:47 +11001386 [ge25519_base.data hash.c sc25519.c sc25519.h verify.c] Fix RCS idents
Damien Millerf104da22013-12-07 12:37:53 +11001387 - (djm) [Makefile.in] Add ed25519 sources
1388 - (djm) [authfile.c] Conditionalise inclusion of util.h
1389 - (djm) [configure.ac openbsd-compat/Makefile.in openbsd-compat/bcrypt_pbkdf.c]
Damien Miller1ff130d2013-12-07 11:51:51 +11001390 [openbsd-compat/blf.h openbsd-compat/blowfish.c]
1391 [openbsd-compat/openbsd-compat.h] Start at supporting bcrypt_pbkdf in
1392 portable.
Damien Millerf104da22013-12-07 12:37:53 +11001393 - (djm) [ed25519.c ssh-ed25519.c openbsd-compat/Makefile.in]
1394 [openbsd-compat/bcrypt_pbkdf.c] Make ed25519/new key format compile on
1395 Linux
Damien Millereb401582013-12-07 17:07:15 +11001396 - (djm) [regress/cert-hostkey.sh] Fix merge botch
Damien Millerda3ca352013-12-07 21:43:46 +11001397 - (djm) [Makefile.in] PATHSUBS and keygen bits for Ed25519; from
1398 Loganaden Velvindron @ AfriNIC in bz#2179
Damien Miller39392072013-12-07 10:31:08 +11001399
Damien Millerdec03932013-12-05 10:18:43 +1100140020131205
1401 - (djm) OpenBSD CVS Sync
1402 - jmc@cvs.openbsd.org 2013/11/21 08:05:09
1403 [ssh_config.5 sshd_config.5]
1404 no need for .Pp before displays;
Damien Millerd937dc02013-12-05 10:19:54 +11001405 - deraadt@cvs.openbsd.org 2013/11/25 18:04:21
1406 [ssh.1 ssh.c]
1407 improve -Q usage and such. One usage change is that the option is now
1408 case-sensitive
1409 ok dtucker markus djm
Damien Millerbdb352a2013-12-05 10:20:52 +11001410 - jmc@cvs.openbsd.org 2013/11/26 12:14:54
1411 [ssh.1 ssh.c]
1412 - put -Q in the right place
1413 - Ar was a poor choice for the arguments to -Q. i've chosen an
1414 admittedly equally poor Cm, at least consistent with the rest
1415 of the docs. also no need for multiple instances
1416 - zap a now redundant Nm
1417 - usage() sync
Damien Miller1d2f8802013-12-05 10:22:03 +11001418 - deraadt@cvs.openbsd.org 2013/11/26 19:15:09
1419 [pkcs11.h]
1420 cleanup 1 << 31 idioms. Resurrection of this issue pointed out by
1421 Eitan Adler ok markus for ssh, implies same change in kerberosV
Damien Millere4870c02013-12-05 10:22:39 +11001422 - djm@cvs.openbsd.org 2013/12/01 23:19:05
1423 [PROTOCOL]
1424 mention curve25519-sha256@libssh.org key exchange algorithm
Damien Miller114e5402013-12-05 10:22:57 +11001425 - djm@cvs.openbsd.org 2013/12/02 02:50:27
1426 [PROTOCOL.chacha20poly1305]
1427 typo; from Jon Cave
Damien Millerf1e44ea2013-12-05 10:23:21 +11001428 - djm@cvs.openbsd.org 2013/12/02 02:56:17
1429 [ssh-pkcs11-helper.c]
1430 use-after-free; bz#2175 patch from Loganaden Velvindron @ AfriNIC
Damien Millerf7e8a872013-12-05 10:25:51 +11001431 - djm@cvs.openbsd.org 2013/12/02 03:09:22
1432 [key.c]
1433 make key_to_blob() return a NULL blob on failure; part of
1434 bz#2175 from Loganaden Velvindron @ AfriNIC
Damien Miller960f6a22013-12-05 10:26:14 +11001435 - djm@cvs.openbsd.org 2013/12/02 03:13:14
1436 [cipher.c]
1437 correct bzero of chacha20+poly1305 key context. bz#2177 from
1438 Loganaden Velvindron @ AfriNIC
1439
1440 Also make it a memset for consistency with the rest of cipher.c
Damien Miller9275df32013-12-05 10:26:32 +11001441 - djm@cvs.openbsd.org 2013/12/04 04:20:01
1442 [sftp-client.c]
1443 bz#2171: don't leak local_fd on error; from Loganaden Velvindron @
1444 AfriNIC
Damien Miller534b2cc2013-12-05 14:07:27 +11001445 - djm@cvs.openbsd.org 2013/12/05 01:16:41
1446 [servconf.c servconf.h]
1447 bz#2161 - fix AuthorizedKeysCommand inside a Match block and
1448 rearrange things so the same error is harder to make next time;
1449 with and ok dtucker@
Darren Tucker8369c8e2013-12-05 11:00:16 +11001450 - (dtucker) [configure.ac] bz#2173: use pkg-config --libs to include correct
1451 -L location for libedit. Patch from Serge van den Boom.
Damien Millerdec03932013-12-05 10:18:43 +11001452
Damien Miller0600c702013-11-21 13:55:43 +1100145320131121
1454 - (djm) OpenBSD CVS Sync
1455 - dtucker@cvs.openbsd.org 2013/11/08 11:15:19
1456 [bufaux.c bufbn.c buffer.c sftp-client.c sftp-common.c sftp-glob.c]
1457 [uidswap.c] Include stdlib.h for free() as per the man page.
Damien Miller867e6932013-11-21 13:56:06 +11001458 - markus@cvs.openbsd.org 2013/11/13 13:48:20
1459 [ssh-pkcs11.c]
1460 add missing braces found by pedro
Damien Miller23e00aa2013-11-21 13:56:28 +11001461 - djm@cvs.openbsd.org 2013/11/20 02:19:01
1462 [sshd.c]
1463 delay closure of in/out fds until after "Bad protocol version
1464 identification..." message, as get_remote_ipaddr/get_remote_port
1465 require them open.
Damien Millere0016732013-11-21 13:56:49 +11001466 - deraadt@cvs.openbsd.org 2013/11/20 20:53:10
1467 [scp.c]
1468 unsigned casts for ctype macros where neccessary
1469 ok guenther millert markus
Damien Millerfdb23062013-11-21 13:57:15 +11001470 - deraadt@cvs.openbsd.org 2013/11/20 20:54:10
1471 [canohost.c clientloop.c match.c readconf.c sftp.c]
1472 unsigned casts for ctype macros where neccessary
1473 ok guenther millert markus
Damien Miller0fde8ac2013-11-21 14:12:23 +11001474 - djm@cvs.openbsd.org 2013/11/21 00:45:44
1475 [Makefile.in PROTOCOL PROTOCOL.chacha20poly1305 authfile.c chacha.c]
1476 [chacha.h cipher-chachapoly.c cipher-chachapoly.h cipher.c cipher.h]
1477 [dh.c myproposal.h packet.c poly1305.c poly1305.h servconf.c ssh.1]
1478 [ssh.c ssh_config.5 sshd_config.5] Add a new protocol 2 transport
1479 cipher "chacha20-poly1305@openssh.com" that combines Daniel
1480 Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an
1481 authenticated encryption mode.
1482
1483 Inspired by and similar to Adam Langley's proposal for TLS:
1484 http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03
1485 but differs in layout used for the MAC calculation and the use of a
1486 second ChaCha20 instance to separately encrypt packet lengths.
1487 Details are in the PROTOCOL.chacha20poly1305 file.
1488
1489 Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC
1490 ok markus@ naddy@
Damien Millerfa7a20b2013-11-21 14:24:08 +11001491 - naddy@cvs.openbsd.org 2013/11/18 05:09:32
1492 [regress/forward-control.sh]
1493 bump timeout to 10 seconds to allow slow machines (e.g. Alpha PC164)
1494 to successfully run this; ok djm@
Damien Miller36aba252013-11-21 14:24:42 +11001495 - djm@cvs.openbsd.org 2013/11/21 03:15:46
1496 [regress/krl.sh]
1497 add some reminders for additional tests that I'd like to implement
Damien Millerea61b212013-11-21 14:25:15 +11001498 - djm@cvs.openbsd.org 2013/11/21 03:16:47
1499 [regress/modpipe.c]
1500 use unsigned long long instead of u_int64_t here to avoid warnings
1501 on some systems portable OpenSSH is built on.
Damien Miller8a073cf2013-11-21 14:26:18 +11001502 - djm@cvs.openbsd.org 2013/11/21 03:18:51
1503 [regress/cipher-speed.sh regress/integrity.sh regress/rekey.sh]
1504 [regress/try-ciphers.sh]
1505 use new "ssh -Q cipher-auth" query to obtain lists of authenticated
1506 encryption ciphers instead of specifying them manually; ensures that
1507 the new chacha20poly1305@openssh.com mode is tested;
1508
1509 ok markus@ and naddy@ as part of the diff to add
1510 chacha20poly1305@openssh.com
Damien Miller0600c702013-11-21 13:55:43 +11001511
Darren Tuckerb6a75b02013-11-10 20:25:22 +1100151220131110
1513 - (dtucker) [regress/keytype.sh] Populate ECDSA key types to be tested by
1514 querying the ones that are compiled in.
1515
Darren Tucker6e2fe812013-11-09 16:55:03 +1100151620131109
1517 - (dtucker) OpenBSD CVS Sync
1518 - dtucker@cvs.openbsd.org 2013/11/09 05:41:34
1519 [regress/test-exec.sh regress/rekey.sh]
1520 Use smaller test data files to speed up tests. Grow test datafiles
1521 where necessary for a specific test.
Darren Tucker37bcef52013-11-09 18:39:25 +11001522 - (dtucker) [configure.ac kex.c key.c myproposal.h] Test for the presence of
1523 NID_X9_62_prime256v1, NID_secp384r1 and NID_secp521r1 and test that the
1524 latter actually works before using it. Fedora (at least) has NID_secp521r1
1525 that doesn't work (see https://bugzilla.redhat.com/show_bug.cgi?id=1021897).
Darren Tucker95cb2d42013-11-09 22:02:31 +11001526 - (dtucker) [configure.ac] Fix brackets in NID_secp521r1 test.
Darren Tuckerdd5264d2013-11-09 22:32:51 +11001527 - (dtucker) [configure.ac] Add missing "test".
Darren Tucker2c894302013-11-10 12:38:42 +11001528 - (dtucker) [key.c] Check for the correct defines for NID_secp521r1.
Darren Tucker6e2fe812013-11-09 16:55:03 +11001529
Darren Tucker08998c52013-11-08 12:11:46 +1100153020131108
1531 - (dtucker) OpenBSD CVS Sync
1532 - dtucker@cvs.openbsd.org 2013/11/08 01:06:14
1533 [regress/rekey.sh]
1534 Rekey less frequently during tests to speed them up
Damien Miller690d9892013-11-08 12:16:49 +11001535 - (djm) OpenBSD CVS Sync
1536 - dtucker@cvs.openbsd.org 2013/11/07 11:58:27
1537 [cipher.c cipher.h kex.c kex.h mac.c mac.h servconf.c ssh.c]
1538 Output the effective values of Ciphers, MACs and KexAlgorithms when
1539 the default has not been overridden. ok markus@
Damien Miller6c81fee2013-11-08 12:19:55 +11001540 - djm@cvs.openbsd.org 2013/11/08 00:39:15
1541 [auth-options.c auth2-chall.c authfd.c channels.c cipher-3des1.c]
1542 [clientloop.c gss-genr.c monitor_mm.c packet.c schnorr.c umac.c]
1543 [sftp-client.c sftp-glob.c]
1544 use calloc for all structure allocations; from markus@
Damien Miller3ac4a232013-11-08 12:39:49 +11001545 - djm@cvs.openbsd.org 2013/11/08 01:38:11
1546 [version.h]
1547 openssh-6.4
Damien Miller3420a502013-11-08 16:48:13 +11001548 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1549 [contrib/suse/openssh.spec] Update version numbers following release.
Darren Tuckerccdb9be2013-11-08 18:54:38 +11001550 - (dtucker) [openbsd-compat/openbsd-compat.h] Add null implementation of
1551 arc4random_stir for platforms that have arc4random but don't have
1552 arc4random_stir (right now this is only OpenBSD -current).
Darren Tucker1c8ce342013-11-08 19:50:32 +11001553 - (dtucker) [kex.c] Only enable CURVE25519_SHA256 if we actually have
1554 EVP_sha256.
Darren Tuckerd94240b2013-11-08 21:10:04 +11001555 - (dtucker) [myproposal.h] Conditionally enable CURVE25519_SHA256.
Darren Tucker8c333ec2013-11-08 21:12:58 +11001556 - (dtucker) [openbsd-compat/bsd-poll.c] Add headers to prevent compile
1557 warnings.
Darren Tucker882abfd2013-11-09 00:17:41 +11001558 - (dtucker) [Makefile.in configure.ac] Set MALLOC_OPTIONS per platform
Darren Tuckeraff7ef12013-11-09 00:19:22 +11001559 and pass in TEST_ENV. use stderr to get polluted
Darren Tucker882abfd2013-11-09 00:17:41 +11001560 and the stderr-data test to fail.
Darren Tuckeraff7ef12013-11-09 00:19:22 +11001561 - (dtucker) [contrib/cygwin/ssh-host-config] Simplify host key generation:
1562 rather than testing and generating each key, call ssh-keygen -A.
1563 Patch from vinschen at redhat.com.
Darren Tucker6e2fe812013-11-09 16:55:03 +11001564 - (dtucker) OpenBSD CVS Sync
1565 - dtucker@cvs.openbsd.org 2013/11/09 05:41:34
1566 [regress/test-exec.sh regress/rekey.sh]
1567 Use smaller test data files to speed up tests. Grow test datafiles
1568 where necessary for a specific test.
Darren Tucker08998c52013-11-08 12:11:46 +11001569
Damien Miller61c5c232013-11-07 11:34:14 +1100157020131107
1571 - (djm) [ssh-pkcs11.c] Bring back "non-constant initialiser" fix (rev 1.5)
1572 that got lost in recent merge.
Damien Millerc9831972013-11-07 12:00:23 +11001573 - (djm) [Makefile.in monitor.c] Missed chunks of curve25519 KEX diff
Damien Millera6fd1d32013-11-07 12:03:26 +11001574 - (djm) [regress/modpipe.c regress/rekey.sh] Never intended to commit these
Damien Millerdf8b0302013-11-07 13:28:16 +11001575 - (djm) [configure.ac defines.h] Skip arc4random_stir() calls on platforms
1576 that lack it but have arc4random_uniform()
Damien Miller67a88002013-11-07 13:32:51 +11001577 - (djm) OpenBSD CVS Sync
1578 - markus@cvs.openbsd.org 2013/11/04 11:51:16
1579 [monitor.c]
1580 fix rekeying for KEX_C25519_SHA256; noted by dtucker@
1581 RCSID sync only; I thought this was a merge botch and fixed it already
Damien Miller49c145c2013-11-07 13:35:39 +11001582 - markus@cvs.openbsd.org 2013/11/06 16:52:11
1583 [monitor_wrap.c]
1584 fix rekeying for AES-GCM modes; ok deraadt
Damien Millerc8908aa2013-11-07 13:38:35 +11001585 - djm@cvs.openbsd.org 2013/11/06 23:05:59
1586 [ssh-pkcs11.c]
1587 from portable: s/true/true_val/ to avoid name collisions on dump platforms
1588 RCSID sync only
Darren Tuckeraa195482013-11-07 14:50:09 +11001589 - (dtucker) OpenBSD CVS Sync
1590 - djm@cvs.openbsd.org 2013/10/09 23:44:14
1591 [regress/Makefile] (ID sync only)
1592 regression test for sftp request white/blacklisting and readonly mode.
Darren Tuckerbbfb9b02013-11-07 14:56:43 +11001593 - markus@cvs.openbsd.org 2013/11/02 22:39:53
1594 [regress/kextype.sh]
1595 add curve25519-sha256@libssh.org
Darren Tucker23455772013-11-07 15:00:51 +11001596 - dtucker@cvs.openbsd.org 2013/11/04 12:27:42
1597 [regress/rekey.sh]
1598 Test rekeying with all KexAlgorithms.
Darren Tucker651dc8b2013-11-07 15:04:44 +11001599 - dtucker@cvs.openbsd.org 2013/11/07 00:12:05
1600 [regress/rekey.sh]
1601 Test rekeying for every Cipher, MAC and KEX, plus test every KEX with
1602 the GCM ciphers.
Darren Tucker06595d62013-11-07 15:08:02 +11001603 - dtucker@cvs.openbsd.org 2013/11/07 01:12:51
1604 [regress/rekey.sh]
1605 Factor out the data transfer rekey tests
Darren Tuckera9550412013-11-07 15:21:19 +11001606 - dtucker@cvs.openbsd.org 2013/11/07 02:48:38
1607 [regress/integrity.sh regress/cipher-speed.sh regress/try-ciphers.sh]
1608 Use ssh -Q instead of hardcoding lists of ciphers or MACs.
Darren Tucker74cbc222013-11-07 15:26:12 +11001609 - dtucker@cvs.openbsd.org 2013/11/07 03:55:41
1610 [regress/kextype.sh]
1611 Use ssh -Q to get kex types instead of a static list.
Darren Tucker6e9d6f42013-11-07 15:32:37 +11001612 - dtucker@cvs.openbsd.org 2013/11/07 04:26:56
1613 [regress/kextype.sh]
1614 trailing space
Darren Tucker4bf7e502013-11-07 22:33:48 +11001615 - (dtucker) [Makefile.in configure.ac] Remove TEST_SSH_SHA256 environment
1616 variable. It's no longer used now that we get the supported MACs from
1617 ssh -Q.
Damien Miller61c5c232013-11-07 11:34:14 +11001618
Damien Millerd2252c72013-11-04 07:41:48 +1100161920131104
1620 - (djm) OpenBSD CVS Sync
1621 - markus@cvs.openbsd.org 2013/11/02 20:03:54
1622 [ssh-pkcs11.c]
1623 support pkcs#11 tokes that only provide x509 zerts instead of raw pubkeys;
1624 fixes bz#1908; based on patch from Laurent Barbe; ok djm
Damien Miller1e124262013-11-04 08:26:52 +11001625 - markus@cvs.openbsd.org 2013/11/02 21:59:15
1626 [kex.c kex.h myproposal.h ssh-keyscan.c sshconnect2.c sshd.c]
1627 use curve25519 for default key exchange (curve25519-sha256@libssh.org);
1628 initial patch from Aris Adamantiadis; ok djm@
Damien Millerabdca982013-11-04 08:30:05 +11001629 - markus@cvs.openbsd.org 2013/11/02 22:10:15
1630 [kexdhs.c kexecdhs.c]
1631 no need to include monitor_wrap.h
Damien Miller660621b2013-11-04 08:37:51 +11001632 - markus@cvs.openbsd.org 2013/11/02 22:24:24
1633 [kexdhs.c kexecdhs.c]
1634 no need to include ssh-gss.h
Damien Miller4c3ba072013-11-04 08:40:13 +11001635 - markus@cvs.openbsd.org 2013/11/02 22:34:01
1636 [auth-options.c]
1637 no need to include monitor_wrap.h and ssh-gss.h
Damien Miller0bd8f152013-11-04 08:55:43 +11001638 - markus@cvs.openbsd.org 2013/11/02 22:39:19
1639 [ssh_config.5 sshd_config.5]
1640 the default kex is now curve25519-sha256@libssh.org
Damien Millerca67a7e2013-11-04 09:05:17 +11001641 - djm@cvs.openbsd.org 2013/11/03 10:37:19
1642 [roaming_common.c]
1643 fix a couple of function definitions foo() -> foo(void)
1644 (-Wold-style-definition)
Damien Miller094003f2013-11-04 22:59:27 +11001645 - (djm) [kexc25519.c kexc25519c.c kexc25519s.c] Import missed files from
1646 KEX/curve25519 change
Damien Millerd2252c72013-11-04 07:41:48 +11001647
Darren Tuckerd5277042013-11-03 16:30:46 +1100164820131103
1649 - (dtucker) [openbsd-compat/bsd-misc.c] Include time.h for nanosleep.
1650 From OpenSMTPD where it prevents "implicit declaration" warnings (it's
1651 a no-op in OpenSSH). From chl at openbsd.
Darren Tucker710f3742013-11-03 17:20:34 +11001652 - (dtucker) [openbsd-compat/setproctitle.c] Handle error case form the 2nd
1653 vsnprintf. From eric at openbsd via chl@.
Darren Tucker007e3b32013-11-03 18:43:55 +11001654 - (dtucker) [configure.ac defines.h] Add typedefs for intmax_t and uintmax_t
1655 for platforms that don't have them.
Darren Tuckerd5277042013-11-03 16:30:46 +11001656
Damien Miller4a3a9d42013-10-30 22:19:47 +1100165720131030
1658 - (djm) OpenBSD CVS Sync
1659 - djm@cvs.openbsd.org 2013/10/29 09:42:11
1660 [key.c key.h]
1661 fix potential stack exhaustion caused by nested certificates;
1662 report by Mateusz Kocielski; ok dtucker@ markus@
Damien Miller5ff30c62013-10-30 22:21:50 +11001663 - djm@cvs.openbsd.org 2013/10/29 09:48:02
1664 [servconf.c servconf.h session.c sshd_config sshd_config.5]
1665 shd_config PermitTTY to disallow TTY allocation, mirroring the
1666 longstanding no-pty authorized_keys option;
1667 bz#2070, patch from Teran McKinney; ok markus@
Damien Miller63857c92013-10-30 22:31:06 +11001668 - jmc@cvs.openbsd.org 2013/10/29 18:49:32
1669 [sshd_config.5]
1670 pty(4), not pty(7);
Damien Miller4a3a9d42013-10-30 22:19:47 +11001671
Damien Miller28631ce2013-10-26 10:07:56 +1100167220131026
1673 - (djm) OpenBSD CVS Sync
1674 - djm@cvs.openbsd.org 2013/10/25 23:04:51
1675 [ssh.c]
1676 fix crash when using ProxyCommand caused by previous commit - was calling
1677 freeaddrinfo(NULL); spotted by sthen@ and Tim Ruehsen, patch by sthen@
1678
Damien Miller26506ad2013-10-26 10:05:46 +1100167920131025
1680 - (djm) [ssh-keygen.c ssh-keysign.c sshconnect1.c sshd.c] Remove
1681 unnecessary arc4random_stir() calls. The only ones left are to ensure
1682 that the PRNG gets a different state after fork() for platforms that
1683 have broken the API.
1684
Damien Miller8f187312013-10-24 10:53:02 +1100168520131024
1686 - (djm) [auth-krb5.c] bz#2032 - use local username in krb5_kuserok check
1687 rather than full client name which may be of form user@REALM;
1688 patch from Miguel Sanders; ok dtucker@
Damien Miller03bf2e62013-10-24 21:01:26 +11001689 - (djm) OpenBSD CVS Sync
1690 - dtucker@cvs.openbsd.org 2013/10/23 05:40:58
1691 [servconf.c]
1692 fix comment
Damien Miller5ecb4162013-10-24 21:02:02 +11001693 - djm@cvs.openbsd.org 2013/10/23 23:35:32
1694 [sshd.c]
1695 include local address and port in "Connection from ..." message (only
1696 shown at loglevel>=verbose)
Damien Miller4bedd402013-10-24 21:02:26 +11001697 - dtucker@cvs.openbsd.org 2013/10/24 00:49:49
1698 [moduli.c]
1699 Periodically print progress and, if possible, expected time to completion
1700 when screening moduli for DH groups. ok deraadt djm
Damien Millercf31f382013-10-24 21:02:56 +11001701 - dtucker@cvs.openbsd.org 2013/10/24 00:51:48
1702 [readconf.c servconf.c ssh_config.5 sshd_config.5]
1703 Disallow empty Match statements and add "Match all" which matches
1704 everything. ok djm, man page help jmc@
Damien Millera90c0332013-10-24 21:03:17 +11001705 - djm@cvs.openbsd.org 2013/10/24 08:19:36
1706 [ssh.c]
1707 fix bug introduced in hostname canonicalisation commit: don't try to
1708 resolve hostnames when a ProxyCommand is set unless the user has forced
1709 canonicalisation; spotted by Iain Morgan
Tim Ricebd43e882013-10-24 12:22:49 -07001710 - (tim) [regress/sftp-perm.sh] We need a shell that understands "! somecmd"
Damien Miller8f187312013-10-24 10:53:02 +11001711
Damien Miller5c86ebd2013-10-23 16:29:12 +1100171220131023
1713 - (djm) OpenBSD CVS Sync
1714 - djm@cvs.openbsd.org 2013/10/20 04:39:28
1715 [ssh_config.5]
1716 document % expansions performed by "Match command ..."
Damien Miller8a04be72013-10-23 16:29:40 +11001717 - djm@cvs.openbsd.org 2013/10/20 06:19:28
1718 [readconf.c ssh_config.5]
1719 rename "command" subclause of the recently-added "Match" keyword to
1720 "exec"; it's shorter, clearer in intent and we might want to add the
1721 ability to match against the command being executed at the remote end in
1722 the future.
Damien Millerc0049bd2013-10-23 16:29:59 +11001723 - djm@cvs.openbsd.org 2013/10/20 09:51:26
1724 [scp.1 sftp.1]
1725 add canonicalisation options to -o lists
Damien Miller8e5a67f2013-10-23 16:30:25 +11001726 - jmc@cvs.openbsd.org 2013/10/20 18:00:13
1727 [ssh_config.5]
1728 tweak the "exec" description, as worded by djm;
Damien Miller084bcd22013-10-23 16:30:51 +11001729 - djm@cvs.openbsd.org 2013/10/23 03:03:07
1730 [readconf.c]
1731 Hostname may have %h sequences that should be expanded prior to Match
1732 evaluation; spotted by Iain Morgan
Damien Millereff5cad2013-10-23 16:31:10 +11001733 - djm@cvs.openbsd.org 2013/10/23 03:05:19
1734 [readconf.c ssh.c]
1735 comment
Damien Miller5b01b0d2013-10-23 16:31:31 +11001736 - djm@cvs.openbsd.org 2013/10/23 04:16:22
1737 [ssh-keygen.c]
1738 Make code match documentation: relative-specified certificate expiry time
1739 should be relative to current time and not the validity start time.
1740 Reported by Petr Lautrbach; ok deraadt@
Damien Miller5c86ebd2013-10-23 16:29:12 +11001741
Damien Millera176e182013-10-18 09:05:41 +1100174220131018
1743 - (djm) OpenBSD CVS Sync
1744 - djm@cvs.openbsd.org 2013/10/09 23:44:14
1745 [regress/Makefile regress/sftp-perm.sh]
1746 regression test for sftp request white/blacklisting and readonly mode.
Damien Miller1edcbf62013-10-18 10:17:17 +11001747 - jmc@cvs.openbsd.org 2013/10/17 07:35:48
1748 [sftp.1 sftp.c]
1749 tweak previous;
Damien Miller4502f882013-10-18 10:17:36 +11001750 - djm@cvs.openbsd.org 2013/10/17 22:08:04
1751 [sshd.c]
1752 include remote port in bad banner message; bz#2162
Damien Millera176e182013-10-18 09:05:41 +11001753
Damien Millerd77b81f2013-10-17 11:39:00 +1100175420131017
1755 - (djm) OpenBSD CVS Sync
1756 - jmc@cvs.openbsd.org 2013/10/15 14:10:25
1757 [ssh.1 ssh_config.5]
1758 tweak previous;
Damien Miller0faf7472013-10-17 11:47:23 +11001759 - djm@cvs.openbsd.org 2013/10/16 02:31:47
1760 [readconf.c readconf.h roaming_client.c ssh.1 ssh.c ssh_config.5]
1761 [sshconnect.c sshconnect.h]
1762 Implement client-side hostname canonicalisation to allow an explicit
1763 search path of domain suffixes to use to convert unqualified host names
1764 to fully-qualified ones for host key matching.
1765 This is particularly useful for host certificates, which would otherwise
1766 need to list unqualified names alongside fully-qualified ones (and this
1767 causes a number of problems).
1768 "looks fine" markus@
Damien Miller607af342013-10-17 11:47:51 +11001769 - jmc@cvs.openbsd.org 2013/10/16 06:42:25
1770 [ssh_config.5]
1771 tweak previous;
Damien Miller38505592013-10-17 11:48:13 +11001772 - djm@cvs.openbsd.org 2013/10/16 22:49:39
1773 [readconf.c readconf.h ssh.1 ssh.c ssh_config.5]
1774 s/canonicalise/canonicalize/ for consistency with existing spelling,
1775 e.g. authorized_keys; pointed out by naddy@
Damien Miller51682fa2013-10-17 11:48:31 +11001776 - djm@cvs.openbsd.org 2013/10/16 22:58:01
1777 [ssh.c ssh_config.5]
1778 one I missed in previous: s/isation/ization/
Damien Millerf29238e2013-10-17 11:48:52 +11001779 - djm@cvs.openbsd.org 2013/10/17 00:30:13
1780 [PROTOCOL sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c]
1781 fsync@openssh.com protocol extension for sftp-server
1782 client support to allow calling fsync() faster successful transfer
1783 patch mostly by imorgan AT nas.nasa.gov; bz#1798
1784 "fine" markus@ "grumble OK" deraadt@ "doesn't sound bad to me" millert@
Damien Millere3ea0942013-10-17 11:57:23 +11001785 - djm@cvs.openbsd.org 2013/10/17 00:46:49
1786 [ssh.c]
1787 rearrange check to reduce diff against -portable
1788 (Id sync only)
Damien Millerd77b81f2013-10-17 11:39:00 +11001789
Damien Miller6eaeebf2013-10-15 11:55:57 +1100179020131015
1791 - (djm) OpenBSD CVS Sync
1792 - djm@cvs.openbsd.org 2013/10/09 23:42:17
1793 [sftp-server.8 sftp-server.c]
1794 Add ability to whitelist and/or blacklist sftp protocol requests by name.
1795 Refactor dispatch loop and consolidate read-only mode checks.
1796 Make global variables static, since sftp-server is linked into sshd(8).
1797 ok dtucker@
Damien Miller73600e52013-10-15 11:56:25 +11001798 - djm@cvs.openbsd.org 2013/10/10 00:53:25
1799 [sftp-server.c]
1800 add -Q, -P and -p to usage() before jmc@ catches me
Damien Miller61ee4d62013-10-15 11:56:47 +11001801 - djm@cvs.openbsd.org 2013/10/10 01:43:03
1802 [sshd.c]
1803 bz#2139: fix re-exec fallback by ensuring that startup_pipe is correctly
1804 updated; ok dtucker@
Damien Millerbda5c842013-10-15 12:05:58 +11001805 - djm@cvs.openbsd.org 2013/10/11 02:45:36
1806 [sftp-client.c]
1807 rename flag arguments to be more clear and consistent.
1808 reorder some internal function arguments to make adding additional flags
1809 easier.
1810 no functional change
Damien Miller2f93d052013-10-15 12:06:27 +11001811 - djm@cvs.openbsd.org 2013/10/11 02:52:23
1812 [sftp-client.c]
1813 missed one arg reorder
Damien Miller61c7de82013-10-15 12:06:45 +11001814 - djm@cvs.openbsd.org 2013/10/11 02:53:45
1815 [sftp-client.h]
1816 obsolete comment
Damien Miller6efab272013-10-15 12:07:05 +11001817 - jmc@cvs.openbsd.org 2013/10/14 14:18:56
1818 [sftp-server.8 sftp-server.c]
1819 tweak previous;
1820 ok djm
Damien Miller71df7522013-10-15 12:12:02 +11001821 - djm@cvs.openbsd.org 2013/10/14 21:20:52
1822 [session.c session.h]
1823 Add logging of session starts in a useful format; ok markus@ feedback and
1824 ok dtucker@
Damien Miller194fd902013-10-15 12:13:05 +11001825 - djm@cvs.openbsd.org 2013/10/14 22:22:05
1826 [readconf.c readconf.h ssh-keysign.c ssh.c ssh_config.5]
1827 add a "Match" keyword to ssh_config that allows matching on hostname,
1828 user and result of arbitrary commands. "nice work" markus@
Damien Millere9fc72e2013-10-15 12:14:12 +11001829 - djm@cvs.openbsd.org 2013/10/14 23:28:23
1830 [canohost.c misc.c misc.h readconf.c sftp-server.c ssh.c]
1831 refactor client config code a little:
1832 add multistate option partsing to readconf.c, similar to servconf.c's
1833 existing code.
1834 move checking of options that accept "none" as an argument to readconf.c
1835 add a lowercase() function and use it instead of explicit tolower() in
1836 loops
1837 part of a larger diff that was ok markus@
Damien Miller386feab2013-10-15 12:14:49 +11001838 - djm@cvs.openbsd.org 2013/10/14 23:31:01
1839 [ssh.c]
1840 whitespace at EOL; pointed out by markus@
Damien Millerdcd39f22013-10-17 11:31:40 +11001841 - [ssh.c] g/c unused variable.
Damien Miller6eaeebf2013-10-15 11:55:57 +11001842
Darren Tuckerad92df72013-10-10 10:24:11 +1100184320131010
1844 - (dtucker) OpenBSD CVS Sync
1845 - sthen@cvs.openbsd.org 2013/09/16 11:35:43
1846 [ssh_config]
1847 Remove gssapi config parts from ssh_config, as was already done for
1848 sshd_config. Req by/ok ajacoutot@
1849 ID SYNC ONLY for portable; kerberos/gssapi is still pretty popular
Darren Tucker5d80e452013-10-10 10:25:09 +11001850 - djm@cvs.openbsd.org 2013/09/19 00:24:52
1851 [progressmeter.c]
1852 store the initial file offset so the progress meter doesn't freak out
1853 when resuming sftp transfers. bz#2137; patch from Iain Morgan; ok dtucker@`
Darren Tuckerb59aaf32013-10-10 10:26:21 +11001854 - djm@cvs.openbsd.org 2013/09/19 00:49:12
1855 [sftp-client.c]
1856 fix swapped pflag and printflag in sftp upload_dir; from Iain Morgan
Darren Tucker71152bc2013-10-10 10:27:21 +11001857 - djm@cvs.openbsd.org 2013/09/19 01:24:46
1858 [channels.c]
1859 bz#1297 - tell the client (via packet_send_debug) when their preferred
1860 listen address has been overridden by the server's GatewayPorts;
1861 ok dtucker@
Darren Tuckere6e52f82013-10-10 10:28:07 +11001862 - djm@cvs.openbsd.org 2013/09/19 01:26:29
1863 [sshconnect.c]
1864 bz#1211: make BindAddress work with UsePrivilegedPort=yes; patch from
1865 swp AT swp.pp.ru; ok dtucker@
Darren Tuckerdf62d712013-10-10 10:32:39 +11001866 - dtucker@cvs.openbsd.org 2013/10/08 11:42:13
1867 [dh.c dh.h]
1868 Increase the size of the Diffie-Hellman groups requested for a each
1869 symmetric key size. New values from NIST Special Publication 800-57 with
1870 the upper limit specified by RFC4419. Pointed out by Peter Backes, ok
1871 djm@.
Darren Tuckerad92df72013-10-10 10:24:11 +11001872
Damien Miller91593102013-10-09 10:42:32 +1100187320131009
1874 - (djm) [openbsd-compat/arc4random.c openbsd-compat/chacha_private.h] Pull
1875 in OpenBSD implementation of arc4random, shortly to replace the existing
1876 bsd-arc4random.c
Damien Miller72071192013-10-09 10:44:47 +11001877 - (djm) [openbsd-compat/Makefile.in openbsd-compat/arc4random.c]
1878 [openbsd-compat/bsd-arc4random.c] Replace old RC4-based arc4random
1879 implementation with recent OpenBSD's ChaCha-based PRNG. ok dtucker@,
1880 tested tim@
Damien Miller91593102013-10-09 10:42:32 +11001881
Darren Tuckerf2bf36c2013-09-22 19:02:40 +1000188220130922
1883 - (dtucker) [platform.c platform.h sshd.c] bz#2156: restore Linux oom_adj
1884 setting when handling SIGHUP to maintain behaviour over retart. Patch
1885 from Matthew Ife.
1886
Darren Tuckere90a06a2013-09-18 15:09:38 +1000188720130918
1888 - (dtucker) [sshd_config] Trailing whitespace; from jstjohn at purdue edu.
1889
Damien Miller045bda52013-09-14 09:44:37 +1000189020130914
1891 - (djm) OpenBSD CVS Sync
1892 - djm@cvs.openbsd.org 2013/08/22 19:02:21
1893 [sshd.c]
1894 Stir PRNG after post-accept fork. The child gets a different PRNG state
1895 anyway via rexec and explicit privsep reseeds, but it's good to be sure.
1896 ok markus@
Damien Miller66085482013-09-14 09:45:03 +10001897 - mikeb@cvs.openbsd.org 2013/08/28 12:34:27
1898 [ssh-keygen.c]
1899 improve batch processing a bit by making use of the quite flag a bit
1900 more often and exit with a non zero code if asked to find a hostname
1901 in a known_hosts file and it wasn't there;
1902 originally from reyk@, ok djm
Damien Miller61353b32013-09-14 09:45:32 +10001903 - djm@cvs.openbsd.org 2013/08/31 00:13:54
1904 [sftp.c]
1905 make ^w match ksh behaviour (delete previous word instead of entire line)
Damien Miller8bab5e72013-09-14 09:47:00 +10001906 - deraadt@cvs.openbsd.org 2013/09/02 22:00:34
1907 [ssh-keygen.c sshconnect1.c sshd.c]
1908 All the instances of arc4random_stir() are bogus, since arc4random()
1909 does this itself, inside itself, and has for a very long time.. Actually,
1910 this was probably reducing the entropy available.
1911 ok djm
1912 ID SYNC ONLY for portable; we don't trust other arc4random implementations
1913 to do this right.
Damien Millerff9d6c22013-09-14 09:48:55 +10001914 - sthen@cvs.openbsd.org 2013/09/07 13:53:11
1915 [sshd_config]
1916 Remove commented-out kerberos/gssapi config options from sample config,
1917 kerberos support is currently not enabled in ssh in OpenBSD. Discussed with
1918 various people; ok deraadt@
1919 ID SYNC ONLY for portable; kerberos/gssapi is still pretty popular
Damien Miller70182522013-09-14 09:49:19 +10001920 - djm@cvs.openbsd.org 2013/09/12 01:41:12
1921 [clientloop.c]
1922 fix connection crash when sending break (~B) on ControlPersist'd session;
1923 ok dtucker@
Damien Miller13840e02013-09-14 09:49:43 +10001924 - djm@cvs.openbsd.org 2013/09/13 06:54:34
1925 [channels.c]
1926 avoid unaligned access in code that reused a buffer to send a
1927 struct in_addr in a reply; simpler just use use buffer_put_int();
1928 from portable; spotted by and ok dtucker@
Damien Miller045bda52013-09-14 09:44:37 +10001929
Damien Miller04be8b92013-08-28 12:49:43 +1000193020130828
1931 - (djm) [openbsd-compat/bsd-snprintf.c] teach our local snprintf code the
1932 'j' (intmax_t/uintmax_t) and 'z' (size_t/ssize_t) conversions in case we
1933 start to use them in the future.
Damien Miller43968a82013-08-28 14:00:54 +10001934 - (djm) [openbsd-compat/bsd-snprintf.c] #ifdef noytet for intmax_t bits
1935 until we have configure support.
Damien Miller04be8b92013-08-28 12:49:43 +10001936
Damien Miller02e87802013-08-21 02:38:51 +1000193720130821
1938 - (djm) OpenBSD CVS Sync
1939 - djm@cvs.openbsd.org 2013/08/06 23:03:49
1940 [sftp.c]
1941 fix some whitespace at EOL
1942 make list of commands an enum rather than a long list of defines
1943 add -a to usage()
Damien Millereec84062013-08-21 02:39:39 +10001944 - djm@cvs.openbsd.org 2013/08/06 23:05:01
1945 [sftp.1]
1946 document top-level -a option (the -a option to 'get' was already
1947 documented)
Damien Millera6d6c1f2013-08-21 02:40:01 +10001948 - djm@cvs.openbsd.org 2013/08/06 23:06:01
1949 [servconf.c]
1950 add cast to avoid format warning; from portable
Damien Millerc6895c52013-08-21 02:40:21 +10001951 - jmc@cvs.openbsd.org 2013/08/07 06:24:51
1952 [sftp.1 sftp.c]
1953 sort -a;
Damien Miller034f27a2013-08-21 02:40:44 +10001954 - djm@cvs.openbsd.org 2013/08/08 04:52:04
1955 [sftp.c]
1956 fix two year old regression: symlinking a file would incorrectly
1957 canonicalise the target path. bz#2129 report from delphij AT freebsd.org
Damien Millerc7dba122013-08-21 02:41:15 +10001958 - djm@cvs.openbsd.org 2013/08/08 05:04:03
1959 [sftp-client.c sftp-client.h sftp.c]
1960 add a "-l" flag for the rename command to force it to use the silly
1961 standard SSH_FXP_RENAME command instead of the POSIX-rename- like
1962 posix-rename@openssh.com extension.
Damien Miller02e87802013-08-21 02:38:51 +10001963
Damien Millerc7dba122013-08-21 02:41:15 +10001964 intended for use in regress tests, so no documentation.
Damien Miller036d3072013-08-21 02:41:46 +10001965 - djm@cvs.openbsd.org 2013/08/09 03:37:25
1966 [sftp.c]
1967 do getopt parsing for all sftp commands (with an empty optstring for
1968 commands without arguments) to ensure consistent behaviour
Damien Millerfec029f2013-08-21 02:42:12 +10001969 - djm@cvs.openbsd.org 2013/08/09 03:39:13
1970 [sftp-client.c]
1971 two problems found by a to-be-committed regress test: 1) msg_id was not
1972 being initialised so was starting at a random value from the heap
1973 (harmless, but confusing). 2) some error conditions were not being
1974 propagated back to the caller
Damien Millere0ee7272013-08-21 02:42:35 +10001975 - djm@cvs.openbsd.org 2013/08/09 03:56:42
1976 [sftp.c]
1977 enable ctrl-left-arrow and ctrl-right-arrow to move forward/back a word;
1978 matching ksh's relatively recent change.
Damien Millerd234afb2013-08-21 02:42:58 +10001979 - djm@cvs.openbsd.org 2013/08/13 18:32:08
1980 [ssh-keygen.c]
1981 typo in error message; from Stephan Rickauer
Damien Millerd5d9d7b2013-08-21 02:43:27 +10001982 - djm@cvs.openbsd.org 2013/08/13 18:33:08
1983 [ssh-keygen.c]
1984 another of the same typo
Damien Millerb7727df2013-08-21 02:43:49 +10001985 - jmc@cvs.openbsd.org 2013/08/14 08:39:27
1986 [scp.1 ssh.1]
1987 some Bx/Ox conversion;
1988 From: Jan Stary
Damien Miller1262b662013-08-21 02:44:24 +10001989 - djm@cvs.openbsd.org 2013/08/20 00:11:38
1990 [readconf.c readconf.h ssh_config.5 sshconnect.c]
1991 Add a ssh_config ProxyUseFDPass option that supports the use of
1992 ProxyCommands that establish a connection and then pass a connected
1993 file descriptor back to ssh(1). This allows the ProxyCommand to exit
1994 rather than have to shuffle data back and forth and enables ssh to use
1995 getpeername, etc. to obtain address information just like it does with
1996 regular directly-connected sockets. ok markus@
Damien Millerf2f6c312013-08-21 02:44:58 +10001997 - jmc@cvs.openbsd.org 2013/08/20 06:56:07
1998 [ssh.1 ssh_config.5]
1999 some proxyusefdpass tweaks;
Damien Miller036d3072013-08-21 02:41:46 +10002000
Darren Tuckera5a3cbf2013-08-08 10:58:49 +1000200120130808
2002 - (dtucker) [regress/Makefile regress/test-exec.sh] Don't try to use test -nt
2003 since some platforms (eg really old FreeBSD) don't have it. Instead,
2004 run "make clean" before a complete regress run. ok djm.
Darren Tucker94396b72013-08-08 11:52:37 +10002005 - (dtucker) [misc.c] Fall back to time(2) at runtime if clock_gettime(
2006 CLOCK_MONOTONIC...) fails. Some older versions of RHEL have the
2007 CLOCK_MONOTONIC define but don't actually support it. Found and tested
2008 by Kevin Brott, ok djm.
Darren Tucker9542de42013-08-08 12:50:06 +10002009 - (dtucker) [misc.c] Remove define added for fallback testing that was
2010 mistakenly included in the previous commit.
Darren Tuckeracd20602013-08-08 17:02:12 +10002011 - (dtucker) [regress/Makefile regress/test-exec.sh] Roll back the -nt
2012 removal. The "make clean" removes modpipe which is built by the top-level
2013 directory before running the tests. Spotted by tim@
Damien Millered4af412013-09-14 09:40:51 +10002014 - (djm) Release 6.3p1
Darren Tuckera5a3cbf2013-08-08 10:58:49 +10002015
Darren Tuckerf3ab2c52013-08-04 21:48:41 +1000201620130804
2017 - (dtucker) [auth-krb5.c configure.ac openbsd-compat/bsd-misc.h] Add support
2018 for building with older Heimdal versions. ok djm.
2019
Damien Millerc192a4c2013-08-01 14:29:20 +1000202020130801
2021 - (djm) [channels.c channels.h] bz#2135: On Solaris, isatty() on a non-
2022 blocking connecting socket will clear any stored errno that might
2023 otherwise have been retrievable via getsockopt(). A hack to limit writes
2024 to TTYs on AIX was triggering this. Since only AIX needs the hack, wrap
2025 it in an #ifdef. Diagnosis and patch from Ivo Raisr.
Damien Millerab3575c2013-08-01 14:34:16 +10002026 - (djm) [sshlogin.h] Fix prototype merge botch from 2006; bz#2134
Damien Millerc192a4c2013-08-01 14:29:20 +10002027
Damien Millerc8669a82013-07-25 11:52:48 +1000202820130725
2029 - (djm) OpenBSD CVS Sync
2030 - djm@cvs.openbsd.org 2013/07/20 22:20:42
2031 [krl.c]
2032 fix verification error in (as-yet usused) KRL signature checking path
Damien Millerc331dbd2013-07-25 11:55:20 +10002033 - djm@cvs.openbsd.org 2013/07/22 05:00:17
2034 [umac.c]
2035 make MAC key, data to be hashed and nonce for final hash const;
2036 checked with -Wcast-qual
Damien Miller94c9cd32013-07-25 11:55:39 +10002037 - djm@cvs.openbsd.org 2013/07/22 12:20:02
2038 [umac.h]
2039 oops, forgot to commit corresponding header change;
2040 spotted by jsg and jasper
Damien Miller98e27dc2013-07-25 11:55:52 +10002041 - djm@cvs.openbsd.org 2013/07/25 00:29:10
2042 [ssh.c]
2043 daemonise backgrounded (ControlPersist'ed) multiplexing master to ensure
2044 it is fully detached from its controlling terminal. based on debugging
Damien Miller0d032412013-07-25 11:56:52 +10002045 - djm@cvs.openbsd.org 2013/07/25 00:56:52
2046 [sftp-client.c sftp-client.h sftp.1 sftp.c]
2047 sftp support for resuming partial downloads; patch mostly by Loganaden
2048 Velvindron/AfriNIC with some tweaks by me; feedback and ok dtucker@
Damien Miller53435b22013-07-25 11:57:15 +10002049 "Just be careful" deraadt@
2050 - djm@cvs.openbsd.org 2013/07/25 00:57:37
2051 [version.h]
2052 openssh-6.3 for release
Damien Millerfea44062013-07-25 12:08:07 +10002053 - dtucker@cvs.openbsd.org 2013/05/30 20:12:32
2054 [regress/test-exec.sh]
2055 use ssh and sshd as testdata since it needs to be >256k for the rekey test
Damien Miller78d47b72013-07-25 12:08:46 +10002056 - dtucker@cvs.openbsd.org 2013/06/10 21:56:43
2057 [regress/forwarding.sh]
2058 Add test for forward config parsing
Damien Millerd1e26cf2013-07-25 12:11:18 +10002059 - djm@cvs.openbsd.org 2013/06/21 02:26:26
2060 [regress/sftp-cmds.sh regress/test-exec.sh]
2061 unbreak sftp-cmds for renamed test data (s/ls/data/)
Tim Riceed899eb2013-07-25 15:40:00 -07002062 - (tim) [sftp-client.c] Use of a gcc extension trips up native compilers on
2063 Solaris and UnixWare. Feedback and OK djm@
Tim Rice81f7cf12013-07-25 18:41:40 -07002064 - (tim) [regress/forwarding.sh] Fix for building outside source tree.
Damien Millerc8669a82013-07-25 11:52:48 +10002065
Damien Miller85b45e02013-07-20 13:21:52 +1000206620130720
2067 - (djm) OpenBSD CVS Sync
2068 - markus@cvs.openbsd.org 2013/07/19 07:37:48
2069 [auth.h kex.h kexdhs.c kexecdhs.c kexgexs.c monitor.c servconf.c]
2070 [servconf.h session.c sshd.c sshd_config.5]
2071 add ssh-agent(1) support to sshd(8); allows encrypted hostkeys,
2072 or hostkeys on smartcards; most of the work by Zev Weiss; bz #1974
2073 ok djm@
Damien Miller32ecfa02013-07-20 13:22:13 +10002074 - djm@cvs.openbsd.org 2013/07/20 01:43:46
2075 [umac.c]
2076 use a union to ensure correct alignment; ok deraadt
Damien Miller3009d3c2013-07-20 13:22:31 +10002077 - djm@cvs.openbsd.org 2013/07/20 01:44:37
2078 [ssh-keygen.c ssh.c]
2079 More useful error message on missing current user in /etc/passwd
Damien Miller1f0e86f2013-07-20 13:22:49 +10002080 - djm@cvs.openbsd.org 2013/07/20 01:50:20
2081 [ssh-agent.c]
2082 call cleanup_handler on SIGINT when in debug mode to ensure sockets
2083 are cleaned up on manual exit; bz#2120
Damien Miller63ddc892013-07-20 13:35:45 +10002084 - djm@cvs.openbsd.org 2013/07/20 01:55:13
2085 [auth-krb5.c gss-serv-krb5.c gss-serv.c]
2086 fix kerberos/GSSAPI deprecation warnings and linking; "looks okay" millert@
Damien Miller85b45e02013-07-20 13:21:52 +10002087
Damien Miller9a661552013-07-18 16:09:04 +1000208820130718
2089 - (djm) OpenBSD CVS Sync
2090 - dtucker@cvs.openbsd.org 2013/06/10 19:19:44
2091 [readconf.c]
2092 revert 1.203 while we investigate crashes reported by okan@
Damien Miller044bd2a2013-07-18 16:09:25 +10002093 - guenther@cvs.openbsd.org 2013/06/17 04:48:42
2094 [scp.c]
2095 Handle time_t values as long long's when formatting them and when
2096 parsing them from remote servers.
2097 Improve error checking in parsing of 'T' lines.
2098 ok dtucker@ deraadt@
Damien Miller30710702013-07-18 16:09:44 +10002099 - markus@cvs.openbsd.org 2013/06/20 19:15:06
2100 [krl.c]
2101 don't leak the rdata blob on errors; ok djm@
Damien Miller20bdcd72013-07-18 16:10:09 +10002102 - djm@cvs.openbsd.org 2013/06/21 00:34:49
2103 [auth-rsa.c auth.h auth2-hostbased.c auth2-pubkey.c monitor.c]
2104 for hostbased authentication, print the client host and user on
2105 the auth success/failure line; bz#2064, ok dtucker@
Damien Miller7f2b4382013-07-18 16:10:29 +10002106 - djm@cvs.openbsd.org 2013/06/21 00:37:49
2107 [ssh_config.5]
2108 explicitly mention that IdentitiesOnly can be used with IdentityFile
2109 to control which keys are offered from an agent.
Damien Millerbbeb1da2013-07-18 16:10:49 +10002110 - djm@cvs.openbsd.org 2013/06/21 05:42:32
2111 [dh.c]
2112 sprinkle in some error() to explain moduli(5) parse failures
Damien Miller81584412013-07-18 16:11:07 +10002113 - djm@cvs.openbsd.org 2013/06/21 05:43:10
2114 [scp.c]
2115 make this -Wsign-compare clean after time_t conversion
Damien Millerbc35d922013-07-18 16:11:25 +10002116 - djm@cvs.openbsd.org 2013/06/22 06:31:57
2117 [scp.c]
2118 improved time_t overflow check suggested by guenther@
Damien Millerfecfd112013-07-18 16:11:50 +10002119 - jmc@cvs.openbsd.org 2013/06/27 14:05:37
2120 [ssh-keygen.1 ssh.1 ssh_config.5 sshd.8 sshd_config.5]
2121 do not use Sx for sections outwith the man page - ingo informs me that
2122 stuff like html will render with broken links;
2123 issue reported by Eric S. Raymond, via djm
Damien Miller0d02c3e2013-07-18 16:12:06 +10002124 - markus@cvs.openbsd.org 2013/07/02 12:31:43
2125 [dh.c]
2126 remove extra whitespace
Damien Millerce986542013-07-18 16:12:44 +10002127 - djm@cvs.openbsd.org 2013/07/12 00:19:59
2128 [auth-options.c auth-rsa.c bufaux.c buffer.h channels.c hostfile.c]
2129 [hostfile.h mux.c packet.c packet.h roaming_common.c serverloop.c]
2130 fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@
Damien Miller746d1a62013-07-18 16:13:02 +10002131 - djm@cvs.openbsd.org 2013/07/12 00:20:00
2132 [sftp.c ssh-keygen.c ssh-pkcs11.c]
2133 fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@
Damien Miller7313fc92013-07-18 16:13:19 +10002134 - djm@cvs.openbsd.org 2013/07/12 00:43:50
2135 [misc.c]
2136 in ssh_gai_strerror() don't fallback to strerror for EAI_SYSTEM when
2137 errno == 0. Avoids confusing error message in some broken resolver
2138 cases. bz#2122 patch from plautrba AT redhat.com; ok dtucker
Damien Miller5bb88332013-07-18 16:13:37 +10002139 - djm@cvs.openbsd.org 2013/07/12 05:42:03
2140 [ssh-keygen.c]
2141 do_print_resource_record() can never be called with a NULL filename, so
2142 don't attempt (and bungle) asking for one if it has not been specified
2143 bz#2127 ok dtucker@
Damien Miller649fe022013-07-18 16:13:55 +10002144 - djm@cvs.openbsd.org 2013/07/12 05:48:55
2145 [ssh.c]
2146 set TCP nodelay for connections started with -N; bz#2124 ok dtucker@
Damien Millerbf836e52013-07-18 16:14:13 +10002147 - schwarze@cvs.openbsd.org 2013/07/16 00:07:52
2148 [scp.1 sftp-server.8 ssh-keyscan.1 ssh-keysign.8 ssh-pkcs11-helper.8]
2149 use .Mt for email addresses; from Jan Stary <hans at stare dot cz>; ok jmc@
Damien Millerd93340c2013-07-18 16:14:34 +10002150 - djm@cvs.openbsd.org 2013/07/18 01:12:26
2151 [ssh.1]
2152 be more exact wrt perms for ~/.ssh/config; bz#2078
Damien Miller9a661552013-07-18 16:09:04 +10002153
Darren Tuckerb7482cf2013-07-02 20:06:46 +1000215420130702
2155 - (dtucker) [contrib/cygwin/README contrib/cygwin/ssh-host-config
2156 contrib/cygwin/ssh-user-config] Modernizes and improve readability of
2157 the Cygwin README file (which hasn't been updated for ages), drop
2158 unsupported OSes from the ssh-host-config help text, and drop an
2159 unneeded option from ssh-user-config. Patch from vinschen at redhat com.
2160
Damien Miller36187092013-06-10 13:07:11 +1000216120130610
2162 - (djm) OpenBSD CVS Sync
2163 - dtucker@cvs.openbsd.org 2013/06/07 15:37:52
2164 [channels.c channels.h clientloop.c]
2165 Add an "ABANDONED" channel state and use for mux sessions that are
2166 disconnected via the ~. escape sequence. Channels in this state will
2167 be able to close if the server responds, but do not count as active channels.
2168 This means that if you ~. all of the mux clients when using ControlPersist
2169 on a broken network, the backgrounded mux master will exit when the
2170 Control Persist time expires rather than hanging around indefinitely.
2171 bz#1917, also reported and tested by tedu@. ok djm@ markus@.
Darren Tucker6d8bd572013-06-11 11:26:10 +10002172 - (dtucker) [Makefile.in configure.ac fixalgorithms] Remove unsupported
2173 algorithms (Ciphers, MACs and HostKeyAlgorithms) from man pages.
Darren Tucker97b62f42013-06-11 11:47:24 +10002174 - (dtucker) [myproposal.h] Do not advertise AES GSM ciphers if we don't have
2175 the required OpenSSL support. Patch from naddy at freebsd.
Darren Tuckerb8ae92d2013-06-11 12:10:02 +10002176 - (dtucker) [myproposal.h] Make the conditional algorithm support consistent
2177 and add some comments so it's clear what goes where.
Damien Miller36187092013-06-10 13:07:11 +10002178
Darren Tucker2ea9eb72013-06-05 15:04:00 +1000217920130605
Darren Tuckerb4e00942013-06-05 22:48:44 +10002180 - (dtucker) [myproposal.h] Enable sha256 kex methods based on the presence of
2181 the necessary functions, not from the openssl version.
2182 - (dtucker) [contrib/ssh-copy-id] bz#2117: Use portable operator in test.
2183 Patch from cjwatson at debian.
Darren Tucker2a228732013-06-06 01:59:13 +10002184 - (dtucker) [regress/forwarding.sh] For (as yet unknown) reason, the
2185 forwarding test is extremely slow copying data on some machines so switch
2186 back to copying the much smaller ls binary until we can figure out why
2187 this is.
Darren Tuckerdc62edb2013-06-06 05:12:35 +10002188 - (dtucker) [Makefile.in] append $CFLAGS to compiler options when building
2189 modpipe in case there's anything in there we need.
Darren Tucker5d12b8f2013-06-06 08:09:10 +10002190 - (dtucker) OpenBSD CVS Sync
2191 - dtucker@cvs.openbsd.org 2013/06/02 21:01:51
2192 [channels.h]
2193 typo in comment
Darren Tuckerea8342c2013-06-06 08:11:40 +10002194 - dtucker@cvs.openbsd.org 2013/06/02 23:36:29
2195 [clientloop.h clientloop.c mux.c]
2196 No need for the mux cleanup callback to be visible so restore it to static
2197 and call it through the detach_user function pointer. ok djm@
Darren Tucker4ac66af2013-06-06 08:12:37 +10002198 - dtucker@cvs.openbsd.org 2013/06/03 00:03:18
2199 [mac.c]
2200 force the MAC output to be 64-bit aligned so umac won't see unaligned
2201 accesses on strict-alignment architectures. bz#2101, patch from
2202 tomas.kuthan at oracle.com, ok djm@
Darren Tucker194454d2013-06-06 08:16:04 +10002203 - dtucker@cvs.openbsd.org 2013/06/04 19:12:23
2204 [scp.c]
2205 use MAXPATHLEN for buffer size instead of fixed value. ok markus
Darren Tuckerea647212013-06-06 08:19:09 +10002206 - dtucker@cvs.openbsd.org 2013/06/04 20:42:36
2207 [sftp.c]
2208 Make sftp's libedit interface marginally multibyte aware by building up
2209 the quoted string by character instead of by byte. Prevents failures
2210 when linked against a libedit built with wide character support (bz#1990).
2211 "looks ok" djm
Darren Tucker746e9062013-06-06 08:20:13 +10002212 - dtucker@cvs.openbsd.org 2013/06/05 02:07:29
2213 [mux.c]
2214 fix leaks in mux error paths, from Zhenbo Xu, found by Melton. bz#1967,
2215 ok djm
Darren Tucker0cca17f2013-06-06 08:21:14 +10002216 - dtucker@cvs.openbsd.org 2013/06/05 02:27:50
2217 [sshd.c]
2218 When running sshd -D, close stderr unless we have explicitly requesting
2219 logging to stderr. From james.hunt at ubuntu.com via bz#1976, djm's patch
2220 so, err, ok dtucker.
Darren Tuckere52a2602013-06-06 08:22:05 +10002221 - dtucker@cvs.openbsd.org 2013/06/05 12:52:38
2222 [sshconnect2.c]
2223 Fix memory leaks found by Zhenbo Xu and the Melton tool. bz#1967, ok djm
Darren Tucker408eaf32013-06-06 08:22:46 +10002224 - dtucker@cvs.openbsd.org 2013/06/05 22:00:28
2225 [readconf.c]
2226 plug another memleak. bz#1967, from Zhenbo Xu, detected by Melton, ok djm
Darren Tuckerae133d42013-06-06 08:30:20 +10002227 - (dtucker) [configure.ac sftp.c openbsd-compat/openbsd-compat.h] Cater for
2228 platforms that don't have multibyte character support (specifically,
2229 mblen).
Darren Tucker2ea9eb72013-06-05 15:04:00 +10002230
Tim Rice86211d12013-06-01 18:38:23 -0700223120130602
2232 - (tim) [Makefile.in] Make Solaris, UnixWare, & OpenServer linkers happy
2233 linking regress/modpipe.
Darren Tucker00e1abb2013-06-02 23:46:24 +10002234 - (dtucker) OpenBSD CVS Sync
2235 - dtucker@cvs.openbsd.org 2013/06/02 13:33:05
2236 [progressmeter.c]
2237 Add misc.h for monotime prototype. (ID sync only).
Darren Tucker073f7952013-06-02 23:47:11 +10002238 - dtucker@cvs.openbsd.org 2013/06/02 13:35:58
2239 [ssh-agent.c]
2240 Make parent_alive_interval time_t to avoid signed/unsigned comparison
Darren Tuckeref4901c2013-06-03 01:59:13 +10002241 - (dtucker) [configure.ac] sys/un.h needs sys/socket.h on some platforms
Darren Tucker898ac932013-06-03 02:03:25 +10002242 to prevent noise from configure. Patch from Nathan Osman. (bz#2114).
2243 - (dtucker) [configure.ac] bz#2111: don't try to use lastlog on Android.
2244 Patch from Nathan Osman.
Tim Rice5ab9b632013-06-02 14:05:48 -07002245 - (tim) [configure.ac regress/Makefile] With rev 1.47 of test-exec.sh we
2246 need a shell that can handle "[ file1 -nt file2 ]". Rather than keep
2247 dealing with shell portability issues in regression tests, we let
2248 configure find us a capable shell on those platforms with an old /bin/sh.
Tim Rice01ec0af2013-06-02 14:31:27 -07002249 - (tim) [aclocal.m4] Enhance OSSH_CHECK_CFLAG_COMPILE to check stderr.
2250 feedback and ok dtucker
Tim Rice3f3064c2013-06-02 15:13:09 -07002251 - (tim) [regress/sftp-chroot.sh] skip if no sudo. ok dtucker
Darren Tucker0b43ffe2013-06-03 09:30:44 +10002252 - (dtucker) [configure.ac] Some platforms need sys/types.h before sys/un.h.
Darren Tucker16cac192013-06-04 12:55:24 +10002253 - (dtucker) [configure.ac] Some other platforms need sys/types.h before
2254 sys/socket.h.
Tim Rice86211d12013-06-01 18:38:23 -07002255
Darren Tuckerc0c33732013-06-02 06:28:03 +1000225620130601
2257 - (dtucker) [configure.ac openbsd-compat/xcrypt.c] bz#2112: fall back to
Darren Tucker65cf7402013-06-02 09:11:19 +10002258 using openssl's DES_crypt function on platorms that don't have a native
Darren Tuckerc0c33732013-06-02 06:28:03 +10002259 one, eg Android. Based on a patch from Nathan Osman.
Darren Tuckerc7aad002013-06-02 07:18:47 +10002260 - (dtucker) [configure.ac defines.h] Test for fd_mask, howmany and NFDBITS
2261 rather than trying to enumerate the plaforms that don't have them.
2262 Based on a patch from Nathan Osman, with help from tim@.
Darren Tuckera627d422013-06-02 07:31:17 +10002263 - (dtucker) OpenBSD CVS Sync
2264 - djm@cvs.openbsd.org 2013/05/17 00:13:13
2265 [xmalloc.h cipher.c sftp-glob.c ssh-keyscan.c ssh.c sftp-common.c
2266 ssh-ecdsa.c auth2-chall.c compat.c readconf.c kexgexs.c monitor.c
2267 gss-genr.c cipher-3des1.c kex.c monitor_wrap.c ssh-pkcs11-client.c
2268 auth-options.c rsa.c auth2-pubkey.c sftp.c hostfile.c auth2.c
2269 servconf.c auth.c authfile.c xmalloc.c uuencode.c sftp-client.c
2270 auth2-gss.c sftp-server.c bufaux.c mac.c session.c jpake.c kexgexc.c
2271 sshconnect.c auth-chall.c auth2-passwd.c sshconnect1.c buffer.c
2272 kexecdhs.c kexdhs.c ssh-rsa.c auth1.c ssh-pkcs11.c auth2-kbdint.c
2273 kexdhc.c sshd.c umac.c ssh-dss.c auth2-jpake.c bufbn.c clientloop.c
2274 monitor_mm.c scp.c roaming_client.c serverloop.c key.c auth-rsa.c
2275 ssh-pkcs11-helper.c ssh-keysign.c ssh-keygen.c match.c channels.c
2276 sshconnect2.c addrmatch.c mux.c canohost.c kexecdhc.c schnorr.c
2277 ssh-add.c misc.c auth2-hostbased.c ssh-agent.c bufec.c groupaccess.c
2278 dns.c packet.c readpass.c authfd.c moduli.c]
2279 bye, bye xfree(); ok markus@
Darren Tucker74836ae2013-06-02 07:32:00 +10002280 - djm@cvs.openbsd.org 2013/05/19 02:38:28
2281 [auth2-pubkey.c]
2282 fix failure to recognise cert-authority keys if a key of a different type
2283 appeared in authorized_keys before it; ok markus@
Darren Tucker0acca372013-06-02 07:41:51 +10002284 - djm@cvs.openbsd.org 2013/05/19 02:42:42
2285 [auth.h auth.c key.c monitor.c auth-rsa.c auth2.c auth1.c key.h]
2286 Standardise logging of supplemental information during userauth. Keys
2287 and ruser is now logged in the auth success/failure message alongside
2288 the local username, remote host/port and protocol in use. Certificates
2289 contents and CA are logged too.
2290 Pushing all logging onto a single line simplifies log analysis as it is
2291 no longer necessary to relate information scattered across multiple log
2292 entries. "I like it" markus@
Darren Tucker55119252013-06-02 07:43:59 +10002293 - dtucker@cvs.openbsd.org 2013/05/31 12:28:10
2294 [ssh-agent.c]
2295 Use time_t where appropriate. ok djm
Darren Tuckerb759c9c2013-06-02 07:46:16 +10002296 - dtucker@cvs.openbsd.org 2013/06/01 13:15:52
2297 [ssh-agent.c clientloop.c misc.h packet.c progressmeter.c misc.c
2298 channels.c sandbox-systrace.c]
2299 Use clock_gettime(CLOCK_MONOTONIC ...) for ssh timers so that things like
2300 keepalives and rekeying will work properly over clock steps. Suggested by
2301 markus@, "looks good" djm@.
Darren Tucker3750fce2013-06-02 07:52:21 +10002302 - dtucker@cvs.openbsd.org 2013/06/01 20:59:25
2303 [scp.c sftp-client.c]
2304 Replace S_IWRITE, which isn't standardized, with S_IWUSR, which is. Patch
2305 from Nathan Osman via bz#2085. ok deraadt.
Darren Tuckerc9a19912013-06-02 08:37:05 +10002306 - dtucker@cvs.openbsd.org 2013/06/01 22:34:50
2307 [sftp-client.c]
2308 Update progressmeter when data is acked, not when it's sent. bz#2108, from
2309 Debian via Colin Watson, ok djm@
Darren Tuckerf60845f2013-06-02 08:07:31 +10002310 - (dtucker) [M auth-chall.c auth-krb5.c auth-pam.c cipher-aes.c cipher-ctr.c
2311 groupaccess.c loginrec.c monitor.c monitor_wrap.c session.c sshd.c
2312 sshlogin.c uidswap.c openbsd-compat/bsd-cygwin_util.c
2313 openbsd-compat/getrrsetbyname-ldns.c openbsd-compat/port-aix.c
2314 openbsd-compat/port-linux.c] Replace portable-specific instances of xfree
2315 with the equivalent calls to free.
Darren Tuckera7108912013-06-02 08:18:31 +10002316 - (dtucker) [configure.ac misc.c] Look for clock_gettime in librt and fall
2317 back to time(NULL) if we can't find it anywhere.
Darren Tuckere9887d12013-06-02 09:17:09 +10002318 - (dtucker) [sandbox-seccomp-filter.c] Allow clock_gettimeofday.
Darren Tuckerc0c33732013-06-02 06:28:03 +10002319
232020130529
Darren Tuckerefdf5342013-05-30 08:29:08 +10002321 - (dtucker) [configure.ac openbsd-compat/bsd-misc.h] bz#2087: Add a null
2322 implementation of endgrent for platforms that don't have it (eg Android).
2323 Loosely based on a patch from Nathan Osman, ok djm
Darren Tuckerc0c33732013-06-02 06:28:03 +10002324
Darren Tucker712de4d2013-05-17 09:07:12 +10002325 20130517
2326 - (dtucker) OpenBSD CVS Sync
2327 - djm@cvs.openbsd.org 2013/03/07 00:20:34
2328 [regress/proxy-connect.sh]
2329 repeat test with a style appended to the username
Darren Tucker7c8b1e72013-05-17 09:10:20 +10002330 - dtucker@cvs.openbsd.org 2013/03/23 11:09:43
Darren Tucker75129022013-05-17 09:19:10 +10002331 [regress/test-exec.sh]
Darren Tucker7c8b1e72013-05-17 09:10:20 +10002332 Only regenerate host keys if they don't exist or if ssh-keygen has changed
2333 since they were. Reduces test runtime by 5-30% depending on machine
2334 speed.
Darren Tucker75129022013-05-17 09:19:10 +10002335 - dtucker@cvs.openbsd.org 2013/04/06 06:00:22
2336 [regress/rekey.sh regress/test-exec.sh regress/integrity.sh
2337 regress/multiplex.sh Makefile regress/cfgmatch.sh]
2338 Split the regress log into 3 parts: the debug output from ssh, the debug
2339 log from sshd and the output from the client command (ssh, scp or sftp).
2340 Somewhat functional now, will become more useful when ssh/sshd -E is added.
Darren Tuckerdfea3bc2013-05-17 09:31:39 +10002341 - dtucker@cvs.openbsd.org 2013/04/07 02:16:03
2342 [regress/Makefile regress/rekey.sh regress/integrity.sh
2343 regress/sshd-log-wrapper.sh regress/forwarding.sh regress/test-exec.sh]
2344 use -E option for ssh and sshd to write debuging logs to ssh{,d}.log and
2345 save the output from any failing tests. If a test fails the debug output
2346 from ssh and sshd for the failing tests (and only the failing tests) should
2347 be available in failed-ssh{,d}.log.
Darren Tuckerf3568fc2013-05-17 09:35:26 +10002348 - djm@cvs.openbsd.org 2013/04/18 02:46:12
Darren Tucker40aaff72013-05-17 09:36:20 +10002349 [regress/Makefile regress/sftp-chroot.sh]
Darren Tuckerf3568fc2013-05-17 09:35:26 +10002350 test sshd ChrootDirectory+internal-sftp; feedback & ok dtucker@
Darren Tucker40aaff72013-05-17 09:36:20 +10002351 - dtucker@cvs.openbsd.org 2013/04/22 07:23:08
Darren Tuckera4df65b2013-05-17 09:37:31 +10002352 [regress/multiplex.sh]
Darren Tucker40aaff72013-05-17 09:36:20 +10002353 Write mux master logs to regress.log instead of ssh.log to keep separate
Darren Tucker5e951732013-05-17 09:41:33 +10002354 - djm@cvs.openbsd.org 2013/05/10 03:46:14
Darren Tuckerc31c8722013-05-17 09:43:33 +10002355 [regress/modpipe.c]
Darren Tucker5e951732013-05-17 09:41:33 +10002356 sync some portability changes from portable OpenSSH (id sync only)
Darren Tuckera8a62fc2013-05-17 09:42:34 +10002357 - dtucker@cvs.openbsd.org 2013/05/16 02:10:35
Darren Tuckerc31c8722013-05-17 09:43:33 +10002358 [regress/rekey.sh]
Darren Tuckera8a62fc2013-05-17 09:42:34 +10002359 Add test for time-based rekeying
Darren Tuckerc31c8722013-05-17 09:43:33 +10002360 - dtucker@cvs.openbsd.org 2013/05/16 03:33:30
2361 [regress/rekey.sh]
2362 test rekeying when there's no data being transferred
Darren Tucker14490fe2013-05-17 09:44:20 +10002363 - dtucker@cvs.openbsd.org 2013/05/16 04:26:10
2364 [regress/rekey.sh]
2365 add server-side rekey test
Darren Tucker982b0cb2013-05-17 09:45:12 +10002366 - dtucker@cvs.openbsd.org 2013/05/16 05:48:31
2367 [regress/rekey.sh]
2368 add tests for RekeyLimit parsing
Darren Tucker56347ef2013-05-17 13:28:36 +10002369 - dtucker@cvs.openbsd.org 2013/05/17 00:37:40
2370 [regress/agent.sh regress/keytype.sh regress/cfgmatch.sh
2371 regress/forcecommand.sh regress/proto-version.sh regress/test-exec.sh
2372 regress/cipher-speed.sh regress/cert-hostkey.sh regress/cert-userkey.sh
2373 regress/ssh-com.sh]
2374 replace 'echo -n' with 'printf' since it's more portable
2375 also remove "echon" hack.
Darren Tuckerb8b96b02013-05-17 14:46:20 +10002376 - dtucker@cvs.openbsd.org 2013/05/17 01:16:09
2377 [regress/agent-timeout.sh]
2378 Pull back some portability changes from -portable:
2379 - TIMEOUT is a read-only variable in some shells
2380 - not all greps have -q so redirect to /dev/null instead.
2381 (ID sync only)
Darren Tucker34035be2013-05-17 14:47:51 +10002382 - dtucker@cvs.openbsd.org 2013/05/17 01:32:11
2383 [regress/integrity.sh]
2384 don't print output from ssh before getting it (it's available in ssh.log)
Darren Tucker59d928d2013-05-17 15:32:29 +10002385 - dtucker@cvs.openbsd.org 2013/05/17 04:29:14
2386 [regress/sftp.sh regress/putty-ciphers.sh regress/cipher-speed.sh
2387 regress/test-exec.sh regress/sftp-batch.sh regress/dynamic-forward.sh
2388 regress/putty-transfer.sh regress/conch-ciphers.sh regress/sftp-cmds.sh
2389 regress/scp.sh regress/ssh-com-sftp.sh regress/rekey.sh
2390 regress/putty-kex.sh regress/stderr-data.sh regress/stderr-after-eof.sh
2391 regress/sftp-badcmds.sh regress/reexec.sh regress/ssh-com-client.sh
2392 regress/sftp-chroot.sh regress/forwarding.sh regress/transfer.sh
2393 regress/multiplex.sh]
2394 Move the setting of DATA and COPY into test-exec.sh
Darren Tuckerdd669172013-05-17 20:39:57 +10002395 - dtucker@cvs.openbsd.org 2013/05/17 10:16:26
2396 [regress/try-ciphers.sh]
2397 use expr for math to keep diffs vs portable down
2398 (id sync only)
Darren Tucker05b5e512013-05-17 20:41:07 +10002399 - dtucker@cvs.openbsd.org 2013/05/17 10:23:52
2400 [regress/login-timeout.sh regress/reexec.sh regress/test-exec.sh]
2401 Use SUDO when cat'ing pid files and running the sshd log wrapper so that
2402 it works with a restrictive umask and the pid files are not world readable.
2403 Changes from -portable. (id sync only)
Darren Tucker1466bd22013-05-17 20:42:05 +10002404 - dtucker@cvs.openbsd.org 2013/05/17 10:24:48
Darren Tucker438f60e2013-05-17 20:43:13 +10002405 [regress/localcommand.sh]
Darren Tucker1466bd22013-05-17 20:42:05 +10002406 use backticks for portability. (id sync only)
Darren Tucker438f60e2013-05-17 20:43:13 +10002407 - dtucker@cvs.openbsd.org 2013/05/17 10:26:26
2408 [regress/sftp-badcmds.sh]
2409 remove unused BATCH variable. (id sync only)
Darren Tucker98989eb2013-05-17 20:44:09 +10002410 - dtucker@cvs.openbsd.org 2013/05/17 10:28:11
2411 [regress/sftp.sh]
2412 only compare copied data if sftp succeeds. from portable (id sync only)
Darren Tucker00478d32013-05-17 20:45:06 +10002413 - dtucker@cvs.openbsd.org 2013/05/17 10:30:07
2414 [regress/test-exec.sh]
2415 wait a bit longer for startup and use case for absolute path.
2416 from portable (id sync only)
Darren Tucker62ee2222013-05-17 20:46:00 +10002417 - dtucker@cvs.openbsd.org 2013/05/17 10:33:09
2418 [regress/agent-getpeereid.sh]
2419 don't redirect stdout from sudo. from portable (id sync only)
Darren Tucker0a404b02013-05-17 20:47:29 +10002420 - dtucker@cvs.openbsd.org 2013/05/17 10:34:30
2421 [regress/portnum.sh]
2422 use a more portable negated if structure. from portable (id sync only)
Darren Tucker9b42d322013-05-17 20:48:59 +10002423 - dtucker@cvs.openbsd.org 2013/05/17 10:35:43
2424 [regress/scp.sh]
2425 use a file extention that's not special on some platforms. from portable
2426 (id sync only)
Darren Tucker6e1e60c2013-05-17 11:23:41 +10002427 - (dtucker) [regress/bsd.regress.mk] Remove unused file. We've never used it
2428 in portable and it's long gone in openbsd.
Darren Tucker91af05c2013-05-17 13:16:59 +10002429 - (dtucker) [regress/integrity.sh]. Force fixed Diffie-Hellman key exchange
2430 methods. When the openssl version doesn't support ECDH then next one on
2431 the list is DH group exchange, but that causes a bit more traffic which can
2432 mean that the tests flip bits in the initial exchange rather than the MACed
2433 traffic and we get different errors to what the tests look for.
Darren Tucker8654dd22013-05-17 16:03:48 +10002434 - (dtucker) [openbsd-compat/getopt.h] Remove unneeded bits.
Darren Tucker7f193232013-05-17 19:02:28 +10002435 - (dtucker) [regress/cfgmatch.sh] Resync config file setup with openbsd.
Darren Tucker96457a52013-05-17 19:03:38 +10002436 - (dtucker) [regress/agent-getpeereid.sh] Resync spaces with openbsd.
Darren Tucker5f1a89a2013-05-17 19:17:58 +10002437 - (dtucker) [regress/integrity.sh regress/krl.sh regress/test-exec.sh]
2438 Move the jot helper function to portable-specific part of test-exec.sh.
Darren Tucker6f669812013-05-17 19:28:51 +10002439 - (dtucker) [regress/test-exec.sh] Move the portable-specific functions
2440 together and add a couple of missing lines from openbsd.
Darren Tuckerf8d5b342013-05-17 19:53:25 +10002441 - (dtucker) [regress/stderr-after-eof.sh regress/test-exec.sh] Move the md5
2442 helper function to the portable part of test-exec.sh.
Darren Tucker9cc8ff72013-05-17 20:01:52 +10002443 - (dtucker) [regress/runtests.sh] Remove obsolete test driver script.
Darren Tucker044f32f2013-05-17 20:12:57 +10002444 - (dtucker) [regress/cfgmatch.sh] Remove unneeded sleep renderd obsolete by
2445 rev 1.6 which calls wait.
Darren Tucker712de4d2013-05-17 09:07:12 +10002446
Damien Miller6aa3eac2013-05-16 11:10:17 +1000244720130516
2448 - (djm) [contrib/ssh-copy-id] Fix bug that could cause "rm *" to be
2449 executed if mktemp failed; bz#2105 ok dtucker@
Darren Tucker2ca51bf2013-05-16 20:22:46 +10002450 - (dtucker) OpenBSD CVS Sync
2451 - tedu@cvs.openbsd.org 2013/04/23 17:49:45
2452 [misc.c]
2453 use xasprintf instead of a series of strlcats and strdup. ok djm
Darren Tucker026d9db2013-05-16 20:23:52 +10002454 - tedu@cvs.openbsd.org 2013/04/24 16:01:46
2455 [misc.c]
2456 remove extra parens noticed by nicm
Darren Tucker5d8b7022013-05-16 20:24:23 +10002457 - dtucker@cvs.openbsd.org 2013/05/06 07:35:12
2458 [sftp-server.8]
2459 Reference the version of the sftp draft we actually implement. ok djm@
Darren Tucker54da6be2013-05-16 20:25:04 +10002460 - djm@cvs.openbsd.org 2013/05/10 03:40:07
2461 [sshconnect2.c]
2462 fix bzero(ptr_to_struct, sizeof(ptr_to_struct)); bz#2100 from
Darren Tucker7e831ed2013-05-16 20:25:40 +10002463 Colin Watson
Darren Tuckercaf00102013-05-16 20:26:18 +10002464 - djm@cvs.openbsd.org 2013/05/10 04:08:01
2465 [key.c]
2466 memleak in cert_free(), wasn't actually freeing the struct;
2467 bz#2096 from shm AT digitalsun.pl
Darren Tucker64c6fce2013-05-16 20:27:14 +10002468 - dtucker@cvs.openbsd.org 2013/05/10 10:13:50
2469 [ssh-pkcs11-helper.c]
2470 remove unused extern optarg. ok markus@
Darren Tuckerc53c2af2013-05-16 20:28:16 +10002471 - dtucker@cvs.openbsd.org 2013/05/16 02:00:34
2472 [ssh_config sshconnect2.c packet.c readconf.h readconf.c clientloop.c
2473 ssh_config.5 packet.h]
2474 Add an optional second argument to RekeyLimit in the client to allow
2475 rekeying based on elapsed time in addition to amount of traffic.
2476 with djm@ jmc@, ok djm
Darren Tucker5f96f3b2013-05-16 20:29:28 +10002477 - dtucker@cvs.openbsd.org 2013/05/16 04:09:14
2478 [sshd_config.5 servconf.c servconf.h packet.c serverloop.c monitor.c sshd_config
2479 sshd.c] Add RekeyLimit to sshd with the same syntax as the client allowing
2480 rekeying based on traffic volume or time. ok djm@, help & ok jmc@ for the man
2481 page.
Darren Tucker07636982013-05-16 20:30:03 +10002482 - djm@cvs.openbsd.org 2013/05/16 04:27:50
2483 [ssh_config.5 readconf.h readconf.c]
2484 add the ability to ignore specific unrecognised ssh_config options;
2485 bz#866; ok markus@
Darren Tucker63e0df22013-05-16 20:30:31 +10002486 - jmc@cvs.openbsd.org 2013/05/16 06:28:45
2487 [ssh_config.5]
2488 put IgnoreUnknown in the right place;
Darren Tucker64d22942013-05-16 20:31:29 +10002489 - jmc@cvs.openbsd.org 2013/05/16 06:30:06
2490 [sshd_config.5]
2491 oops! avoid Xr to self;
Darren Tuckerdbee3082013-05-16 20:32:29 +10002492 - dtucker@cvs.openbsd.org 2013/05/16 09:08:41
2493 [log.c scp.c sshd.c serverloop.c schnorr.c sftp.c]
2494 Fix some "unused result" warnings found via clang and -portable.
2495 ok markus@
Darren Tuckerb7ee8522013-05-16 20:33:10 +10002496 - dtucker@cvs.openbsd.org 2013/05/16 09:12:31
2497 [readconf.c servconf.c]
2498 switch RekeyLimit traffic volume parsing to scan_scaled. ok djm@
Darren Tucker9113d0c2013-05-16 20:48:14 +10002499 - dtucker@cvs.openbsd.org 2013/05/16 10:43:34
2500 [servconf.c readconf.c]
2501 remove now-unused variables
Darren Tucker09c0f032013-05-16 20:48:57 +10002502 - dtucker@cvs.openbsd.org 2013/05/16 10:44:06
2503 [servconf.c]
2504 remove another now-unused variable
Darren Tuckere194ba42013-05-16 20:47:31 +10002505 - (dtucker) [configure.ac readconf.c servconf.c
2506 openbsd-compat/openbsd-compat.h] Add compat bits for scan_scaled.
Damien Miller6aa3eac2013-05-16 11:10:17 +10002507
Darren Tuckerabbc7a72013-05-10 13:54:23 +1000250820130510
2509 - (dtucker) [configure.ac] Enable -Wsizeof-pointer-memaccess if the compiler
2510 supports it. Mentioned by Colin Watson in bz#2100, ok djm.
Darren Tucker35b2fe92013-05-10 15:35:26 +10002511 - (dtucker) [openbsd-compat/getopt.c] Factor out portibility changes to
2512 getopt.c. Preprocessed source is identical other than line numbers.
Darren Tucker39332022013-05-10 15:38:11 +10002513 - (dtucker) [openbsd-compat/getopt_long.c] Import from OpenBSD. No
2514 portability changes yet.
Darren Tuckerccfdfce2013-05-10 16:28:55 +10002515 - (dtucker) [openbsd-compat/Makefile.in openbsd-compat/getopt.c
2516 openbsd-compat/getopt_long.c regress/modpipe.c] Remove getopt.c, add
2517 portability code to getopt_long.c and switch over Makefile and the ugly
2518 hack in modpipe.c. Fixes bz#1448.
Darren Tucker0abfb552013-05-10 18:08:49 +10002519 - (dtucker) [openbsd-compat/getopt.h openbsd-compat/getopt_long.c
2520 openbsd-compat/openbsd-compat.h] pull in getopt.h from openbsd and plumb
2521 in to use it when we're using our own getopt.
Darren Tuckera75d2472013-05-10 18:11:55 +10002522 - (dtucker) [kex.c] Only include sha256 and ECC key exchange methods when the
2523 underlying libraries support them.
Darren Tuckerc54e3e02013-05-10 18:53:14 +10002524 - (dtucker) [configure.ac] Add -Werror to the -Qunused-arguments test so
2525 we don't get a warning on compilers that *don't* support it. Add
2526 -Wno-unknown-warning-option. Move both to the start of the list for
2527 maximum noise suppression. Tested with gcc 4.6.3, gcc 2.95.4 and clang 2.9.
Darren Tuckerabbc7a72013-05-10 13:54:23 +10002528
Damien Miller6332da22013-04-23 14:25:52 +1000252920130423
2530 - (djm) [auth.c configure.ac misc.c monitor.c monitor_wrap.c] Support
2531 platforms, such as Android, that lack struct passwd.pw_gecos. Report
2532 and initial patch from Nathan Osman bz#2086; feedback tim@ ok dtucker@
Damien Miller62e9c4f2013-04-23 15:15:49 +10002533 - (djm) OpenBSD CVS Sync
2534 - markus@cvs.openbsd.org 2013/03/05 20:16:09
2535 [sshconnect2.c]
2536 reset pubkey order on partial success; ok djm@
Damien Miller998cc562013-04-23 15:16:43 +10002537 - djm@cvs.openbsd.org 2013/03/06 23:35:23
2538 [session.c]
2539 fatal() when ChrootDirectory specified by running without root privileges;
2540 ok markus@
Damien Miller5cbec4c2013-04-23 15:17:12 +10002541 - djm@cvs.openbsd.org 2013/03/06 23:36:53
2542 [readconf.c]
2543 g/c unused variable (-Wunused)
Damien Miller4ce189d2013-04-23 15:17:52 +10002544 - djm@cvs.openbsd.org 2013/03/07 00:19:59
2545 [auth2-pubkey.c monitor.c]
2546 reconstruct the original username that was sent by the client, which may
2547 have included a style (e.g. "root:skey") when checking public key
2548 signatures. Fixes public key and hostbased auth when the client specified
2549 a style; ok markus@
Damien Miller91a55f22013-04-23 15:18:10 +10002550 - markus@cvs.openbsd.org 2013/03/07 19:27:25
2551 [auth.h auth2-chall.c auth2.c monitor.c sshd_config.5]
2552 add submethod support to AuthenticationMethods; ok and freedback djm@
Damien Miller508b6c32013-04-23 15:18:28 +10002553 - djm@cvs.openbsd.org 2013/03/08 06:32:58
2554 [ssh.c]
2555 allow "ssh -f none ..." ok markus@
Damien Millerd677ad12013-04-23 15:18:51 +10002556 - djm@cvs.openbsd.org 2013/04/05 00:14:00
2557 [auth2-gss.c krl.c sshconnect2.c]
2558 hush some {unused, printf type} warnings
Damien Miller9f12b5d2013-04-23 15:19:11 +10002559 - djm@cvs.openbsd.org 2013/04/05 00:31:49
2560 [pathnames.h]
2561 use the existing _PATH_SSH_USER_RC define to construct the other
2562 pathnames; bz#2077, ok dtucker@ (no binary change)
Damien Miller172859c2013-04-23 15:19:27 +10002563 - djm@cvs.openbsd.org 2013/04/05 00:58:51
2564 [mux.c]
2565 cleanup mux-created channels that are in SSH_CHANNEL_OPENING state too
2566 (in addition to ones already in OPEN); bz#2079, ok dtucker@
Damien Miller37f1c082013-04-23 15:20:43 +10002567 - markus@cvs.openbsd.org 2013/04/06 16:07:00
2568 [channels.c sshd.c]
2569 handle ECONNABORTED for accept(); ok deraadt some time ago...
Damien Miller03d4d7e2013-04-23 15:21:06 +10002570 - dtucker@cvs.openbsd.org 2013/04/07 02:10:33
2571 [log.c log.h ssh.1 ssh.c sshd.8 sshd.c]
2572 Add -E option to ssh and sshd to append debugging logs to a specified file
2573 instead of stderr or syslog. ok markus@, man page help jmc@
Damien Miller69010322013-04-23 15:21:24 +10002574 - dtucker@cvs.openbsd.org 2013/04/07 09:40:27
2575 [sshd.8]
2576 clarify -e text. suggested by & ok jmc@
Damien Millerd5edefd2013-04-23 15:21:39 +10002577 - djm@cvs.openbsd.org 2013/04/11 02:27:50
2578 [packet.c]
2579 quiet disconnect notifications on the server from error() back to logit()
2580 if it is a normal client closure; bz#2057 ok+feedback dtucker@
Damien Millerf1a02ae2013-04-23 15:22:13 +10002581 - dtucker@cvs.openbsd.org 2013/04/17 09:04:09
2582 [session.c]
2583 revert rev 1.262; it fails because uid is already set here. ok djm@
Damien Miller9303e652013-04-23 15:22:40 +10002584 - djm@cvs.openbsd.org 2013/04/18 02:16:07
2585 [sftp.c]
2586 make "sftp -q" do what it says on the sticker: hush everything but errors;
Damien Miller467b00c2013-04-23 15:23:07 +10002587 ok dtucker@
2588 - djm@cvs.openbsd.org 2013/04/19 01:00:10
2589 [sshd_config.5]
2590 document the requirment that the AuthorizedKeysCommand be owned by root;
2591 ok dtucker@ markus@
Damien Miller0d6771b2013-04-23 15:23:24 +10002592 - djm@cvs.openbsd.org 2013/04/19 01:01:00
2593 [ssh-keygen.c]
2594 fix some memory leaks; bz#2088 ok dtucker@
Damien Millera56086b2013-04-23 15:24:18 +10002595 - djm@cvs.openbsd.org 2013/04/19 01:03:01
2596 [session.c]
2597 reintroduce 1.262 without the connection-killing bug:
2598 fatal() when ChrootDirectory specified by running without root privileges;
2599 ok markus@
Damien Millerea111192013-04-23 19:24:32 +10002600 - djm@cvs.openbsd.org 2013/04/19 01:06:50
2601 [authfile.c cipher.c cipher.h kex.c kex.h kexecdh.c kexecdhc.c kexecdhs.c]
2602 [key.c key.h mac.c mac.h packet.c ssh.1 ssh.c]
2603 add the ability to query supported ciphers, MACs, key type and KEX
2604 algorithms to ssh. Includes some refactoring of KEX and key type handling
2605 to be table-driven; ok markus@
Damien Miller34bd20a2013-04-23 19:25:00 +10002606 - djm@cvs.openbsd.org 2013/04/19 11:10:18
2607 [ssh.c]
2608 add -Q to usage; reminded by jmc@
Damien Millerf8b894e2013-04-23 19:25:29 +10002609 - djm@cvs.openbsd.org 2013/04/19 12:07:08
2610 [kex.c]
2611 remove duplicated list entry pointed out by naddy@
Damien Millerbc02f162013-04-23 19:25:49 +10002612 - dtucker@cvs.openbsd.org 2013/04/22 01:17:18
2613 [mux.c]
2614 typo in debug output: evitval->exitval
Damien Miller6332da22013-04-23 14:25:52 +10002615
Damien Millerbc68f242013-04-18 11:26:25 +1000261620130418
2617 - (djm) [config.guess config.sub] Update to last versions before they switch
2618 to GPL3. ok dtucker@
Darren Tuckerce1c9572013-04-18 21:36:19 +10002619 - (dtucker) [configure.ac] Use -Qunused-arguments to suppress warnings from
2620 unused argument warnings (in particular, -fno-builtin-memset) from clang.
Damien Millerbc68f242013-04-18 11:26:25 +10002621
Darren Tucker19104782013-04-05 11:13:08 +1100262220130404
2623 - (dtucker) OpenBSD CVS Sync
2624 - dtucker@cvs.openbsd.org 2013/02/17 23:16:57
2625 [readconf.c ssh.c readconf.h sshconnect2.c]
2626 Keep track of which IndentityFile options were manually supplied and which
2627 were default options, and don't warn if the latter are missing.
2628 ok markus@
Darren Tuckerf3c38142013-04-05 11:16:52 +11002629 - dtucker@cvs.openbsd.org 2013/02/19 02:12:47
2630 [krl.c]
2631 Remove bogus include. ok djm
Darren Tuckeraefa3682013-04-05 11:18:35 +11002632 - dtucker@cvs.openbsd.org 2013/02/22 04:45:09
2633 [ssh.c readconf.c readconf.h]
2634 Don't complain if IdentityFiles specified in system-wide configs are
2635 missing. ok djm, deraadt.
Darren Tucker5d1d9542013-04-05 11:20:00 +11002636 - markus@cvs.openbsd.org 2013/02/22 19:13:56
2637 [sshconnect.c]
2638 support ProxyCommand=- (stdin/out already point to the proxy); ok djm@
Darren Tucker15fd19c2013-04-05 11:22:26 +11002639 - djm@cvs.openbsd.org 2013/02/22 22:09:01
2640 [ssh.c]
2641 Allow IdenityFile=none; ok markus deraadt (and dtucker for an earlier
2642 version)
Darren Tucker19104782013-04-05 11:13:08 +11002643
Darren Tuckerc9627cd2013-04-01 12:40:48 +1100264420130401
2645 - (dtucker) [openbsd-compat/bsd-cygwin_util.{c,h}] Don't include windows.h
2646 to avoid conflicting definitions of __int64, adding the required bits.
2647 Patch from Corinna Vinschen.
2648
Damien Miller67f1d552013-10-09 09:33:08 +1100264920130323
Tim Rice75db01d2013-03-22 10:14:32 -07002650 - (tim) [Makefile.in] remove some duplication introduced in 20130220 commit.
2651
Damien Miller67f1d552013-10-09 09:33:08 +1100265220130322
Damien Miller83efe7c2013-03-22 10:17:36 +11002653 - (djm) [contrib/ssh-copy-id contrib/ssh-copy-id.1] Updated to Phil
2654 Hands' greatly revised version.
Damien Millereed8dc22013-03-22 10:25:22 +11002655 - (djm) Release 6.2p1
Darren Tuckerc8a0f272013-03-22 12:49:14 +11002656 - (dtucker) [configure.ac] Add stdlib.h to zlib check for exit() prototype.
Darren Tucker221b4b22013-03-22 12:51:09 +11002657 - (dtucker) [includes.h] Check if _GNU_SOURCE is already defined before
2658 defining it again. Prevents warnings if someone, eg, sets it in CFLAGS.
Damien Miller83efe7c2013-03-22 10:17:36 +11002659
Damien Miller67f1d552013-10-09 09:33:08 +1100266020130318
Damien Miller63b4bcd2013-03-20 12:55:14 +11002661 - (djm) [configure.ac log.c scp.c sshconnect2.c openbsd-compat/vis.c]
2662 [openbsd-compat/vis.h] FreeBSD's strnvis isn't compatible with OpenBSD's
2663 so mark it as broken. Patch from des AT des.no
2664
Damien Miller67f1d552013-10-09 09:33:08 +1100266520130317
Tim Riceaa86c392013-03-16 20:55:46 -07002666 - (tim) [configure.ac] OpenServer 5 wants lastlog even though it has none
2667 of the bits the configure test looks for.
2668
Damien Miller67f1d552013-10-09 09:33:08 +1100266920130316
Damien Millera2438bb2013-03-15 10:23:07 +11002670 - (djm) [configure.ac] Disable utmp, wtmp and/or lastlog if the platform
2671 is unable to successfully compile them. Based on patch from des AT
2672 des.no
Damien Millerf4db77d2013-03-15 10:34:25 +11002673 - (djm) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
2674 Add a usleep replacement for platforms that lack it; ok dtucker
Damien Miller58528402013-03-15 11:22:37 +11002675 - (djm) [session.c] FreeBSD needs setusercontext(..., LOGIN_SETUMASK) to
2676 occur after UID switch; patch from John Marshall via des AT des.no;
2677 ok dtucker@
Damien Millera2438bb2013-03-15 10:23:07 +11002678
Damien Miller67f1d552013-10-09 09:33:08 +1100267920130312
Darren Tuckerfe10a282013-03-12 11:19:40 +11002680 - (dtucker) [regress/Makefile regress/cipher-speed.sh regress/test-exec.sh]
2681 Improve portability of cipher-speed test, based mostly on a patch from
2682 Iain Morgan.
Darren Tuckeraa97d132013-03-12 11:31:05 +11002683 - (dtucker) [auth.c configure.ac platform.c platform.h] Accept uid 2 ("bin")
2684 in addition to root as an owner of system directories on AIX and HP-UX.
2685 ok djm@
Darren Tuckerfe10a282013-03-12 11:19:40 +11002686
Darren Tuckerb3cd5032013-03-07 12:33:35 +1100268720130307
2688 - (dtucker) [INSTALL] Bump documented autoconf version to what we're
2689 currently using.
Darren Tucker4d1a0fe2013-03-07 20:14:34 +11002690 - (dtucker) [defines.h] Remove SIZEOF_CHAR bits since the test for it
Darren Tucker9243ef02013-03-07 20:06:13 +11002691 was removed in configure.ac rev 1.481 as it was redundant.
Tim Rice2b6ea472013-03-07 07:37:13 -08002692 - (tim) [Makefile.in] Add another missing $(EXEEXT) I should have seen 3 days
2693 ago.
Damien Millere4f43472013-03-08 12:14:22 +11002694 - (djm) [configure.ac] Add a timeout to the select/rlimit test to give it a
2695 chance to complete on broken systems; ok dtucker@
Darren Tuckerb3cd5032013-03-07 12:33:35 +11002696
Darren Tucker834a0d62013-03-06 14:06:48 +1100269720130306
2698 - (dtucker) [regress/forward-control.sh] Wait longer for the forwarding
2699 connection to start so that the test works on slower machines.
Darren Tuckerff008de2013-03-06 17:48:48 +11002700 - (dtucker) [configure.ac] test that we can set number of file descriptors
2701 to zero with setrlimit before enabling the rlimit sandbox. This affects
2702 (at least) HPUX 11.11.
Darren Tucker834a0d62013-03-06 14:06:48 +11002703
Damien Miller43e5e602013-03-05 09:49:00 +1100270420130305
2705 - (djm) [regress/modpipe.c] Compilation fix for AIX and parsing fix for
2706 HP/UX. Spotted by Kevin Brott
Darren Tucker5f0e54c2013-03-05 19:57:39 +11002707 - (dtucker) [configure.ac] use "=" for shell test and not "==". Spotted by
Darren Tuckerfef9f7c2013-03-05 20:02:24 +11002708 Amit Kulkarni and Kevin Brott.
Darren Tucker29c71512013-03-05 21:50:09 +11002709 - (dtucker) [Makefile.in] Remove trailing "\" on PATHS, which caused obscure
2710 build breakage on (at least) HP-UX 11.11. Found by Amit Kulkarni and Kevin
2711 Brott.
Tim Riceff8bda82013-03-05 14:23:58 -08002712 - (tim) [Makefile.in] Add missing $(EXEEXT). Found by Roumen Petrov.
Damien Miller43e5e602013-03-05 09:49:00 +11002713
Damien Millerc0cc7ce2013-02-27 10:48:18 +1100271420130227
2715 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
2716 [contrib/suse/openssh.spec] Crank version numbers
Tim Ricea514bc02013-02-26 19:35:26 -08002717 - (tim) [regress/forward-control.sh] use sh in case login shell is csh.
Tim Ricef9e20602013-02-26 20:27:29 -08002718 - (tim) [regress/integrity.sh] shell portability fix.
Tim Riceada7e172013-02-26 21:49:09 -08002719 - (tim) [regress/integrity.sh] keep old solaris awk from hanging.
Tim Rice21f591b2013-02-26 22:48:31 -08002720 - (tim) [regress/krl.sh] keep old solaris awk from hanging.
Damien Millerc0cc7ce2013-02-27 10:48:18 +11002721
Damien Miller1e657d52013-02-26 18:58:06 +1100272220130226
2723 - OpenBSD CVS Sync
2724 - djm@cvs.openbsd.org 2013/02/20 08:27:50
2725 [integrity.sh]
2726 Add an option to modpipe that warns if the modification offset it not
2727 reached in it's stream and turn it on for t-integrity. This should catch
2728 cases where the session is not fuzzed for being too short (cf. my last
2729 "oops" commit)
Damien Miller6c21bb82013-02-26 19:41:30 +11002730 - (djm) [regress/integrity.sh] Run sshd via $SUDO; fixes tinderbox breakage
2731 for UsePAM=yes configuration
Damien Miller1e657d52013-02-26 18:58:06 +11002732
Darren Tucker03978c62013-02-25 11:24:44 +1100273320130225
2734 - (dtucker) [configure.ac ssh-gss.h] bz#2073: additional #includes needed
2735 to use Solaris native GSS libs. Patch from Pierre Ossman.
2736
Darren Tuckera423fef2013-02-25 10:32:27 +1100273720130223
Damien Millerb87f6b72013-02-23 09:12:23 +11002738 - (djm) [configure.ac includes.h loginrec.c mux.c sftp.c] Prefer
2739 bsd/libutil.h to libutil.h to avoid deprecation warnings on Ubuntu.
2740 ok tim
2741
Darren Tuckera423fef2013-02-25 10:32:27 +1100274220130222
Darren Tucker964de182013-02-22 10:39:59 +11002743 - (dtucker) [Makefile.in configure.ac] bz#2072: don't link krb5 libs to
Darren Tuckera2b5a4c2013-02-22 10:43:15 +11002744 ssh(1) since they're not needed. Patch from Pierre Ossman, ok djm.
2745 - (dtucker) [configure.ac] bz#2073: look for Solaris' differently-named
2746 libgss too. Patch from Pierre Ossman, ok djm.
Damien Miller91f40d82013-02-22 11:37:00 +11002747 - (djm) [configure.ac sandbox-seccomp-filter.c] Support for Linux
2748 seccomp-bpf sandbox on ARM. Patch from shawnlandden AT gmail.com;
2749 ok dtucker
Darren Tucker964de182013-02-22 10:39:59 +11002750
Tim Rice0ec74232013-02-20 21:37:55 -0800275120130221
2752 - (tim) [regress/forward-control.sh] shell portability fix.
2753
Tim Ricec08b3ef2013-02-19 11:53:29 -0800275420130220
2755 - (tim) [regress/cipher-speed.sh regress/try-ciphers.sh] shell portability fix.
Tim Ricec31db8c2013-02-19 19:01:51 -08002756 - (tim) [krl.c Makefile.in regress/Makefile regress/modpipe.c] remove unneeded
2757 err.h include from krl.c. Additional portability fixes for modpipe. OK djm
Damien Miller283e5752013-02-20 21:13:27 +11002758 - OpenBSD CVS Sync
2759 - djm@cvs.openbsd.org 2013/02/20 08:27:50
2760 [regress/integrity.sh regress/modpipe.c]
2761 Add an option to modpipe that warns if the modification offset it not
2762 reached in it's stream and turn it on for t-integrity. This should catch
2763 cases where the session is not fuzzed for being too short (cf. my last
2764 "oops" commit)
Damien Miller5acc6be2013-02-20 21:16:07 +11002765 - djm@cvs.openbsd.org 2013/02/20 08:29:27
2766 [regress/modpipe.c]
2767 s/Id/OpenBSD/ in RCS tag
Tim Ricec08b3ef2013-02-19 11:53:29 -08002768
Damien Miller0dc3bc92013-02-19 09:28:32 +1100276920130219
2770 - OpenBSD CVS Sync
2771 - djm@cvs.openbsd.org 2013/02/18 22:26:47
2772 [integrity.sh]
2773 crank the offset yet again; it was still fuzzing KEX one of Darren's
2774 portable test hosts at 2800
Damien Millerb3764e12013-02-19 13:15:01 +11002775 - djm@cvs.openbsd.org 2013/02/19 02:14:09
2776 [integrity.sh]
2777 oops, forgot to increase the output of the ssh command to ensure that
2778 we actually reach $offset
Damien Millerdae85cc2013-02-19 14:27:44 +11002779 - (djm) [regress/integrity.sh] Skip SHA2-based MACs on configurations that
2780 lack support for SHA2.
Tim Ricec31db8c2013-02-19 19:01:51 -08002781 - (djm) [regress/modpipe.c] Add local err, and errx functions for platforms
2782 that do not have them.
Damien Miller0dc3bc92013-02-19 09:28:32 +11002783
Damien Miller33d52562013-02-18 10:18:05 +1100278420130217
2785 - OpenBSD CVS Sync
2786 - djm@cvs.openbsd.org 2013/02/17 23:16:55
2787 [integrity.sh]
2788 make the ssh command generates some output to ensure that there are at
2789 least offset+tries bytes in the stream.
2790
Damien Miller5d7b9562013-02-16 17:32:31 +1100279120130216
2792 - OpenBSD CVS Sync
2793 - djm@cvs.openbsd.org 2013/02/16 06:08:45
2794 [integrity.sh]
2795 make sure the fuzz offset is actually past the end of KEX for all KEX
2796 types. diffie-hellman-group-exchange-sha256 requires an offset around
2797 2700. Noticed via test failures in portable OpenSSH on platforms that
2798 lack ECC and this the more byte-frugal ECDH KEX algorithms.
2799
Damien Miller91edc1c2013-02-15 10:23:44 +1100280020130215
2801 - (djm) [contrib/suse/rc.sshd] Use SSHD_BIN consistently; bz#2056 from
2802 Iain Morgan
Darren Tucker3c4a24c2013-02-15 11:41:35 +11002803 - (dtucker) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
2804 Use getpgrp() if we don't have getpgid() (old BSDs, maybe others).
Darren Tucker8e6fb782013-02-15 12:13:01 +11002805 - (dtucker) [configure.ac openbsd-compat/Makefile.in openbsd-compat/strtoull.c
2806 openbsd-compat/openbsd-compat.h] Add strtoull to compat library for
2807 platforms that don't have it.
Darren Tuckerf32db832013-02-15 12:20:41 +11002808 - (dtucker) [openbsd-compat/openbsd-compat.h] Add prototype for strtoul,
2809 group strto* function prototypes together.
Darren Tucker2991d282013-02-15 14:55:38 +11002810 - (dtucker) [openbsd-compat/bsd-misc.c] Handle the case where setpgrp() takes
2811 an argument. Pointed out by djm.
Damien Miller4018dc02013-02-15 10:28:55 +11002812 - (djm) OpenBSD CVS Sync
2813 - djm@cvs.openbsd.org 2013/02/14 21:35:59
2814 [auth2-pubkey.c]
2815 Correct error message that had a typo and was logging the wrong thing;
2816 patch from Petr Lautrbach
Damien Miller5ceddc32013-02-15 12:18:32 +11002817 - dtucker@cvs.openbsd.org 2013/02/15 00:21:01
2818 [sshconnect2.c]
2819 Warn more loudly if an IdentityFile provided by the user cannot be read.
2820 bz #1981, ok djm@
Damien Miller91edc1c2013-02-15 10:23:44 +11002821
Damien Miller2653f5c2013-02-14 10:14:51 +1100282220130214
2823 - (djm) [regress/krl.sh] Don't use ecdsa keys in environment that lack ECC.
Damien Miller6d77d6e2013-02-14 10:31:03 +11002824 - (djm) [regress/krl.sh] typo; found by Iain Morgan
Damien Miller57f92182013-02-14 10:32:33 +11002825 - (djm) [regress/integrity.sh] Start fuzzing from offset 2500 (instead
2826 of 2300) to avoid clobbering the end of (non-MAC'd) KEX. Verified by
2827 Iain Morgan
Damien Miller2653f5c2013-02-14 10:14:51 +11002828
Damien Millerea078462013-02-12 10:54:37 +1100282920130212
2830 - (djm) OpenBSD CVS Sync
2831 - djm@cvs.openbsd.org 2013/01/24 21:45:37
2832 [krl.c]
2833 fix handling of (unused) KRL signatures; skip string in correct buffer
Damien Miller6045f5d2013-02-12 10:54:54 +11002834 - djm@cvs.openbsd.org 2013/01/24 22:08:56
2835 [krl.c]
2836 skip serial lookup when cert's serial number is zero
Damien Miller377d9a42013-02-12 10:55:16 +11002837 - krw@cvs.openbsd.org 2013/01/25 05:00:27
2838 [krl.c]
2839 Revert last. Breaks due to likely typo. Let djm@ fix later.
2840 ok djm@ via dlg@
Damien Miller60565bc2013-02-12 10:56:42 +11002841 - djm@cvs.openbsd.org 2013/01/25 10:22:19
2842 [krl.c]
2843 redo last commit without the vi-vomit that snuck in:
2844 skip serial lookup when cert's serial number is zero
2845 (now with 100% better comment)
Damien Millerf0a8ded2013-02-12 11:00:34 +11002846 - djm@cvs.openbsd.org 2013/01/26 06:11:05
2847 [Makefile.in acss.c acss.h cipher-acss.c cipher.c]
2848 [openbsd-compat/openssl-compat.h]
2849 remove ACSS, now that it is gone from libcrypto too
Damien Miller0cd2f8e2013-02-12 11:01:39 +11002850 - djm@cvs.openbsd.org 2013/01/27 10:06:12
2851 [krl.c]
2852 actually use the xrealloc() return value; spotted by xi.wang AT gmail.com
Damien Miller1f583df2013-02-12 11:02:08 +11002853 - dtucker@cvs.openbsd.org 2013/02/06 00:20:42
2854 [servconf.c sshd_config sshd_config.5]
2855 Change default of MaxStartups to 10:30:100 to start doing random early
2856 drop at 10 connections up to 100 connections. This will make it harder
2857 to DoS as CPUs have come a long way since the original value was set
2858 back in 2000. Prompted by nion at debian org, ok markus@
Damien Miller18de9132013-02-12 11:02:27 +11002859 - dtucker@cvs.openbsd.org 2013/02/06 00:22:21
2860 [auth.c]
2861 Fix comment, from jfree.e1 at gmail
Damien Millerd6d9fa02013-02-12 11:02:46 +11002862 - djm@cvs.openbsd.org 2013/02/08 00:41:12
2863 [sftp.c]
2864 fix NULL deref when built without libedit and control characters
2865 entered as command; debugging and patch from Iain Morgan an
2866 Loganaden Velvindron in bz#1956
Damien Millerfd051542013-02-12 11:03:10 +11002867 - markus@cvs.openbsd.org 2013/02/10 21:19:34
2868 [version.h]
2869 openssh 6.2
Damien Miller78d22712013-02-12 11:03:36 +11002870 - djm@cvs.openbsd.org 2013/02/10 23:32:10
2871 [ssh-keygen.c]
2872 append to moduli file when screening candidates rather than overwriting.
2873 allows resumption of interrupted screen; patch from Christophe Garault
2874 in bz#1957; ok dtucker@
Damien Miller894926e2013-02-12 11:03:58 +11002875 - djm@cvs.openbsd.org 2013/02/10 23:35:24
2876 [packet.c]
2877 record "Received disconnect" messages at ERROR rather than INFO priority,
2878 since they are abnormal and result in a non-zero ssh exit status; patch
2879 from Iain Morgan in bz#2057; ok dtucker@
Damien Miller22e8a1e2013-02-12 11:04:48 +11002880 - dtucker@cvs.openbsd.org 2013/02/11 21:21:58
2881 [sshd.c]
2882 Add openssl version to debug output similar to the client. ok markus@
Damien Miller58e2c5b2013-02-12 11:16:57 +11002883 - djm@cvs.openbsd.org 2013/02/11 23:58:51
2884 [regress/try-ciphers.sh]
2885 remove acss here too
Damien Miller2f20de52013-02-12 11:31:38 +11002886 - (djm) [regress/try-ciphers.sh] clean up CVS merge botch
Damien Millerea078462013-02-12 10:54:37 +11002887
Damien Millerb6f73b32013-02-11 10:39:12 +1100288820130211
2889 - (djm) [configure.ac openbsd-compat/openssl-compat.h] Repair build on old
2890 libcrypto that lacks EVP_CIPHER_CTX_ctrl
2891
Damien Millere7f50e12013-02-08 10:49:37 +1100289220130208
2893 - (djm) [contrib/redhat/sshd.init] treat RETVAL as an integer;
2894 patch from Iain Morgan in bz#2059
Darren Tucker951b53b2013-02-08 11:50:09 +11002895 - (dtucker) [configure.ac openbsd-compat/sys-tree.h] Test if compiler allows
2896 __attribute__ on return values and work around if necessary. ok djm@
Damien Millere7f50e12013-02-08 10:49:37 +11002897
289820130207
Damien Miller5c3bbd72013-02-07 10:11:05 +11002899 - (djm) [configure.ac] Don't probe seccomp capability of running kernel
2900 at configure time; the seccomp sandbox will fall back to rlimit at
2901 runtime anyway. Patch from plautrba AT redhat.com in bz#2011
2902
Damien Millerda5cc5d2013-01-20 22:31:29 +1100290320130120
2904 - (djm) [cipher-aes.c cipher-ctr.c openbsd-compat/openssl-compat.h]
2905 Move prototypes for replacement ciphers to openssl-compat.h; fix EVP
2906 prototypes for openssl-1.0.0-fips.
Damien Millerac5542b2013-01-20 22:33:02 +11002907 - (djm) OpenBSD CVS Sync
2908 - jmc@cvs.openbsd.org 2013/01/18 07:57:47
2909 [ssh-keygen.1]
2910 tweak previous;
Damien Miller3d6d68b2013-01-20 22:33:23 +11002911 - jmc@cvs.openbsd.org 2013/01/18 07:59:46
2912 [ssh-keygen.c]
2913 -u before -V in usage();
Damien Miller72abeb72013-01-20 22:33:44 +11002914 - jmc@cvs.openbsd.org 2013/01/18 08:00:49
2915 [sshd_config.5]
2916 tweak previous;
Damien Miller072fdcd2013-01-20 22:34:04 +11002917 - jmc@cvs.openbsd.org 2013/01/18 08:39:04
2918 [ssh-keygen.1]
2919 add -Q to the options list; ok djm
Damien Miller881a7a22013-01-20 22:34:46 +11002920 - jmc@cvs.openbsd.org 2013/01/18 21:48:43
2921 [ssh-keygen.1]
2922 command-line (adj.) -> command line (n.);
Damien Millera0a7ee82013-01-20 22:35:06 +11002923 - jmc@cvs.openbsd.org 2013/01/19 07:13:25
2924 [ssh-keygen.1]
2925 fix some formatting; ok djm
Damien Millera7522d92013-01-20 22:35:31 +11002926 - markus@cvs.openbsd.org 2013/01/19 12:34:55
2927 [krl.c]
2928 RB_INSERT does not remove existing elments; ok djm@
Damien Millerd60b2102013-01-20 22:49:58 +11002929 - (djm) [openbsd-compat/sys-tree.h] Sync with OpenBSD. krl.c needs newer
2930 version.
Damien Millerdc75d1f2013-01-20 22:58:51 +11002931 - (djm) [regress/krl.sh] replacement for jot; most platforms lack it
Damien Millerda5cc5d2013-01-20 22:31:29 +11002932
Damien Millerf3747bf2013-01-18 11:44:04 +1100293320130118
2934 - (djm) OpenBSD CVS Sync
2935 - djm@cvs.openbsd.org 2013/01/17 23:00:01
2936 [auth.c key.c key.h ssh-keygen.1 ssh-keygen.c sshd_config.5]
2937 [krl.c krl.h PROTOCOL.krl]
2938 add support for Key Revocation Lists (KRLs). These are a compact way to
2939 represent lists of revoked keys and certificates, taking as little as
2940 a single bit of incremental cost to revoke a certificate by serial number.
2941 KRLs are loaded via the existing RevokedKeys sshd_config option.
2942 feedback and ok markus@
Damien Millerebafebd2013-01-18 11:51:56 +11002943 - djm@cvs.openbsd.org 2013/01/18 00:45:29
2944 [regress/Makefile regress/cert-userkey.sh regress/krl.sh]
2945 Tests for Key Revocation Lists (KRLs)
Damien Miller13f5f762013-01-18 15:32:03 +11002946 - djm@cvs.openbsd.org 2013/01/18 03:00:32
2947 [krl.c]
2948 fix KRL generation bug for list sections
Damien Millerf3747bf2013-01-18 11:44:04 +11002949
Damien Millerb26699b2013-01-17 14:31:57 +1100295020130117
2951 - (djm) [regress/cipher-speed.sh regress/integrity.sh regress/try-ciphers.sh]
2952 check for GCM support before testing GCM ciphers.
2953
Damien Millerc20eb8b2013-01-12 22:41:26 +1100295420130112
2955 - (djm) OpenBSD CVS Sync
2956 - djm@cvs.openbsd.org 2013/01/12 11:22:04
2957 [cipher.c]
2958 improve error message for integrity failure in AES-GCM modes; ok markus@
Damien Miller846dc7f2013-01-12 22:46:26 +11002959 - djm@cvs.openbsd.org 2013/01/12 11:23:53
2960 [regress/cipher-speed.sh regress/integrity.sh regress/try-ciphers.sh]
2961 test AES-GCM modes; feedback markus@
Damien Millerefa1c952013-01-12 23:10:47 +11002962 - (djm) [regress/integrity.sh] repair botched merge
Damien Millerc20eb8b2013-01-12 22:41:26 +11002963
Damien Miller4e14a582013-01-09 15:54:48 +1100296420130109
2965 - (djm) OpenBSD CVS Sync
2966 - dtucker@cvs.openbsd.org 2012/12/14 05:26:43
2967 [auth.c]
2968 use correct string in error message; from rustybsd at gmx.fr
Damien Miller73298f42013-01-09 15:55:50 +11002969 - djm@cvs.openbsd.org 2013/01/02 00:32:07
2970 [clientloop.c mux.c]
2971 channel_setup_local_fwd_listener() returns 0 on failure, not -ve
2972 bz#2055 reported by mathieu.lacage AT gmail.com
Damien Miller697485d2013-01-09 15:56:13 +11002973 - djm@cvs.openbsd.org 2013/01/02 00:33:49
2974 [PROTOCOL.agent]
2975 correct format description for SSH_AGENTC_ADD_RSA_ID_CONSTRAINED
2976 bz#2051 from david AT lechnology.com
Damien Miller44138442013-01-09 15:56:45 +11002977 - djm@cvs.openbsd.org 2013/01/03 05:49:36
2978 [servconf.h]
2979 add a couple of ServerOptions members that should be copied to the privsep
2980 child (for consistency, in this case they happen only to be accessed in
2981 the monitor); ok dtucker@
Damien Miller3739c8f2013-01-09 15:57:16 +11002982 - djm@cvs.openbsd.org 2013/01/03 12:49:01
2983 [PROTOCOL]
2984 fix description of MAC calculation for EtM modes; ok markus@
Damien Miller502ab0e2013-01-09 15:57:36 +11002985 - djm@cvs.openbsd.org 2013/01/03 12:54:49
2986 [sftp-server.8 sftp-server.c]
2987 allow specification of an alternate start directory for sftp-server(8)
2988 "I like this" markus@
Damien Millerec77c952013-01-09 15:58:00 +11002989 - djm@cvs.openbsd.org 2013/01/03 23:22:58
2990 [ssh-keygen.c]
2991 allow fingerprinting of keys hosted in PKCS#11 tokens: ssh-keygen -lD ...
2992 ok markus@
Damien Milleraa7ad302013-01-09 15:58:21 +11002993 - jmc@cvs.openbsd.org 2013/01/04 19:26:38
2994 [sftp-server.8 sftp-server.c]
2995 sftp-server.8: add argument name to -d
2996 sftp-server.c: add -d to usage()
2997 ok djm
Damien Miller1d75abf2013-01-09 16:12:19 +11002998 - markus@cvs.openbsd.org 2013/01/08 18:49:04
2999 [PROTOCOL authfile.c cipher.c cipher.h kex.c kex.h monitor_wrap.c]
3000 [myproposal.h packet.c ssh_config.5 sshd_config.5]
3001 support AES-GCM as defined in RFC 5647 (but with simpler KEX handling)
3002 ok and feedback djm@
Damien Miller1422c082013-01-09 16:44:54 +11003003 - djm@cvs.openbsd.org 2013/01/09 05:40:17
3004 [ssh-keygen.c]
3005 correctly initialise fingerprint type for fingerprinting PKCS#11 keys
Damien Millerd522c682013-01-09 16:42:47 +11003006 - (djm) [cipher.c configure.ac openbsd-compat/openssl-compat.h]
3007 Fix merge botch, automatically detect AES-GCM in OpenSSL, move a little
3008 cipher compat code to openssl-compat.h
Damien Miller4e14a582013-01-09 15:54:48 +11003009
Darren Tucker0fc77292012-12-17 15:59:42 +1100301020121217
3011 - (dtucker) [Makefile.in] Add some scaffolding so that the new regress
3012 tests will work with VPATH directories.
3013
Damien Miller8c05da32012-12-13 07:18:59 +1100301420121213
3015 - (djm) OpenBSD CVS Sync
3016 - markus@cvs.openbsd.org 2012/12/12 16:45:52
3017 [packet.c]
3018 reset incoming_packet buffer for each new packet in EtM-case, too;
3019 this happens if packets are parsed only parially (e.g. ignore
3020 messages sent when su/sudo turn off echo); noted by sthen/millert
Damien Miller25a02b02012-12-13 08:18:56 +11003021 - naddy@cvs.openbsd.org 2012/12/12 16:46:10
3022 [cipher.c]
3023 use OpenSSL's EVP_aes_{128,192,256}_ctr() API and remove our hand-rolled
3024 counter mode code; ok djm@
3025 - (djm) [configure.ac cipher-ctr.c] Adapt EVP AES CTR change to retain our
3026 compat code for older OpenSSL
Damien Miller13cbff12012-12-13 08:25:07 +11003027 - (djm) [cipher.c] Fix missing prototype for compat code
Damien Miller8c05da32012-12-13 07:18:59 +11003028
Damien Miller6a1937e2012-12-12 10:44:38 +1100302920121212
3030 - (djm) OpenBSD CVS Sync
3031 - markus@cvs.openbsd.org 2012/12/11 22:16:21
3032 [monitor.c]
3033 drain the log messages after receiving the keystate from the unpriv
3034 child. otherwise it might block while sending. ok djm@
Damien Milleraf43a7a2012-12-12 10:46:31 +11003035 - markus@cvs.openbsd.org 2012/12/11 22:31:18
3036 [PROTOCOL authfile.c cipher.c cipher.h kex.h mac.c myproposal.h]
3037 [packet.c ssh_config.5 sshd_config.5]
3038 add encrypt-then-mac (EtM) modes to openssh by defining new mac algorithms
3039 that change the packet format and compute the MAC over the encrypted
3040 message (including the packet size) instead of the plaintext data;
3041 these EtM modes are considered more secure and used by default.
3042 feedback and ok djm@
Damien Miller74f13bd2012-12-12 10:46:53 +11003043 - sthen@cvs.openbsd.org 2012/12/11 22:51:45
3044 [mac.c]
3045 fix typo, s/tem/etm in hmac-ripemd160-tem. ok markus@
Damien Miller1a45b632012-12-12 10:52:07 +11003046 - markus@cvs.openbsd.org 2012/12/11 22:32:56
3047 [regress/try-ciphers.sh]
3048 add etm modes
Damien Miller1fb593a2012-12-12 10:54:37 +11003049 - markus@cvs.openbsd.org 2012/12/11 22:42:11
3050 [regress/Makefile regress/modpipe.c regress/integrity.sh]
3051 test the integrity of the packets; with djm@
Damien Millerec7ce9a2012-12-12 10:55:32 +11003052 - markus@cvs.openbsd.org 2012/12/11 23:12:13
3053 [try-ciphers.sh]
3054 add hmac-ripemd160-etm@openssh.com
Damien Miller37834af2012-12-12 11:00:37 +11003055 - (djm) [mac.c] fix merge botch
Damien Miller37461d72012-12-12 12:37:32 +11003056 - (djm) [regress/Makefile regress/integrity.sh] Make the integrity.sh test
3057 work on platforms without 'jot'
3058 - (djm) [regress/integrity.sh] Fix awk quoting, packet length skip
Damien Millerfaabeb62012-12-12 12:51:54 +11003059 - (djm) [regress/Makefile] fix t-exec rule
Damien Miller6a1937e2012-12-12 10:44:38 +11003060
Darren Tucker3dfb8772012-12-07 13:03:10 +1100306120121207
3062 - (dtucker) OpenBSD CVS Sync
3063 - dtucker@cvs.openbsd.org 2012/12/06 06:06:54
3064 [regress/keys-command.sh]
3065 Fix some problems with the keys-command test:
3066 - use string comparison rather than numeric comparison
3067 - check for existing KEY_COMMAND file and don't clobber if it exists
3068 - clean up KEY_COMMAND file if we do create it.
3069 - check that KEY_COMMAND is executable (which it won't be if eg /var/run
3070 is mounted noexec).
3071 ok djm.
Darren Tuckerf9333d52012-12-07 13:06:13 +11003072 - jmc@cvs.openbsd.org 2012/12/03 08:33:03
3073 [ssh-add.1 sshd_config.5]
3074 tweak previous;
Darren Tucker8a965222012-12-07 13:07:02 +11003075 - markus@cvs.openbsd.org 2012/12/05 15:42:52
3076 [ssh-add.c]
3077 prevent double-free of comment; ok djm@
Darren Tucker3e1027c2012-12-07 13:07:46 +11003078 - dtucker@cvs.openbsd.org 2012/12/07 01:51:35
3079 [serverloop.c]
3080 Cast signal to int for logging. A no-op on openbsd (they're always ints)
3081 but will prevent warnings in portable. ok djm@
Darren Tucker3dfb8772012-12-07 13:03:10 +11003082
Tim Rice96ce9a12012-12-04 07:50:03 -0800308320121205
3084 - (tim) [defines.h] Some platforms are missing ULLONG_MAX. Feedback djm@.
3085
Damien Millercf6ef132012-12-03 09:37:56 +1100308620121203
3087 - (djm) [openbsd-compat/sys-queue.h] Sync with OpenBSD to get
3088 TAILQ_FOREACH_SAFE needed for upcoming changes.
Damien Millercb6b68b2012-12-03 09:49:52 +11003089 - (djm) OpenBSD CVS Sync
3090 - djm@cvs.openbsd.org 2012/12/02 20:26:11
3091 [ssh_config.5 sshconnect2.c]
3092 Make IdentitiesOnly apply to keys obtained from a PKCS11Provider.
3093 This allows control of which keys are offered from tokens using
3094 IdentityFile. ok markus@
Damien Miller33a81362012-12-03 09:50:24 +11003095 - djm@cvs.openbsd.org 2012/12/02 20:42:15
3096 [ssh-add.1 ssh-add.c]
3097 make deleting explicit keys "ssh-add -d" symmetric with adding keys -
3098 try to delete the corresponding certificate too and respect the -k option
3099 to allow deleting of the key only; feedback and ok markus@
Damien Milleraa5b3f82012-12-03 09:50:54 +11003100 - djm@cvs.openbsd.org 2012/12/02 20:46:11
3101 [auth-options.c channels.c servconf.c servconf.h serverloop.c session.c]
3102 [sshd_config.5]
3103 make AllowTcpForwarding accept "local" and "remote" in addition to its
3104 current "yes"/"no" to allow the server to specify whether just local or
3105 remote TCP forwarding is enabled. ok markus@
Damien Millerfa51d8b2012-12-03 10:08:25 +11003106 - dtucker@cvs.openbsd.org 2012/10/05 02:20:48
3107 [regress/cipher-speed.sh regress/try-ciphers.sh]
3108 Add umac-128@openssh.com to the list of MACs to be tested
Damien Miller6618e922012-12-03 10:09:04 +11003109 - djm@cvs.openbsd.org 2012/10/19 05:10:42
3110 [regress/cert-userkey.sh]
3111 include a serial number when generating certs
Damien Miller771c43c2012-12-03 10:12:13 +11003112 - djm@cvs.openbsd.org 2012/11/22 22:49:30
3113 [regress/Makefile regress/keys-command.sh]
3114 regress for AuthorizedKeysCommand; hints from markus@
Damien Miller999bd2d2012-12-03 10:13:39 +11003115 - djm@cvs.openbsd.org 2012/12/02 20:47:48
3116 [Makefile regress/forward-control.sh]
3117 regress for AllowTcpForwarding local/remote; ok markus@
Damien Miller55aca022012-12-03 11:25:30 +11003118 - djm@cvs.openbsd.org 2012/12/03 00:14:06
3119 [auth2-chall.c ssh-keygen.c]
3120 Fix compilation with -Wall -Werror (trivial type fixes)
Damien Miller03af12e2012-12-03 11:55:53 +11003121 - (djm) [configure.ac] Turn on -g for gcc compilers. Helps pre-installation
3122 debugging. ok dtucker@
Damien Miller8b489822012-12-03 12:35:55 +11003123 - (djm) [configure.ac] Revert previous. configure.ac already does this
3124 for us.
Damien Millercf6ef132012-12-03 09:37:56 +11003125
Damien Miller1e854692012-11-14 19:04:02 +1100312620121114
3127 - (djm) OpenBSD CVS Sync
3128 - djm@cvs.openbsd.org 2012/11/14 02:24:27
3129 [auth2-pubkey.c]
3130 fix username passed to helper program
3131 prepare stdio fds before closefrom()
3132 spotted by landry@
Damien Miller6f3b3622012-11-14 19:04:33 +11003133 - djm@cvs.openbsd.org 2012/11/14 02:32:15
3134 [ssh-keygen.c]
3135 allow the full range of unsigned serial numbers; 'fine' deraadt@
Damien Miller15b05cf2012-12-03 09:53:20 +11003136 - djm@cvs.openbsd.org 2012/12/02 20:34:10
3137 [auth.c auth.h auth1.c auth2-chall.c auth2-gss.c auth2-jpake.c auth2.c]
3138 [monitor.c monitor.h]
3139 Fixes logging of partial authentication when privsep is enabled
3140 Previously, we recorded "Failed xxx" since we reset authenticated before
3141 calling auth_log() in auth2.c. This adds an explcit "Partial" state.
3142
3143 Add a "submethod" to auth_log() to report which submethod is used
3144 for keyboard-interactive.
3145
3146 Fix multiple authentication when one of the methods is
3147 keyboard-interactive.
3148
3149 ok markus@
Damien Millerd27a0262012-12-03 10:06:37 +11003150 - dtucker@cvs.openbsd.org 2012/10/05 02:05:30
3151 [regress/multiplex.sh]
3152 Use 'kill -0' to test for the presence of a pid since it's more portable
Damien Miller1e854692012-11-14 19:04:02 +11003153
Damien Millerd5c3d4c2012-11-07 08:35:38 +1100315420121107
3155 - (djm) OpenBSD CVS Sync
3156 - eric@cvs.openbsd.org 2011/11/28 08:46:27
3157 [moduli.5]
3158 fix formula
3159 ok djm@
Damien Miller0120c412012-11-07 08:36:00 +11003160 - jmc@cvs.openbsd.org 2012/09/26 17:34:38
3161 [moduli.5]
3162 last stage of rfc changes, using consistent Rs/Re blocks, and moving the
3163 references into a STANDARDS section;
Damien Millerd5c3d4c2012-11-07 08:35:38 +11003164
Darren Tuckerf96ff182012-11-05 17:04:37 +1100316520121105
3166 - (dtucker) [uidswap.c openbsd-compat/Makefile.in
3167 openbsd-compat/bsd-setres_id.c openbsd-compat/bsd-setres_id.h
3168 openbsd-compat/openbsd-compat.h] Move the fallback code for setting uids
3169 and gids from uidswap.c to the compat library, which allows it to work with
3170 the new setresuid calls in auth2-pubkey. with tim@, ok djm@
Darren Tucker737f7af2012-11-05 17:07:43 +11003171 - (dtucker) [auth2-pubkey.c] wrap paths.h in an ifdef for platforms that
3172 don't have it. Spotted by tim@.
Darren Tuckerf96ff182012-11-05 17:04:37 +11003173
Damien Millerf33580e2012-11-04 22:22:52 +1100317420121104
3175 - (djm) OpenBSD CVS Sync
3176 - jmc@cvs.openbsd.org 2012/10/31 08:04:50
3177 [sshd_config.5]
3178 tweak previous;
Damien Millerd0d10992012-11-04 22:23:14 +11003179 - djm@cvs.openbsd.org 2012/11/04 10:38:43
3180 [auth2-pubkey.c sshd.c sshd_config.5]
3181 Remove default of AuthorizedCommandUser. Administrators are now expected
3182 to explicitly specify a user. feedback and ok markus@
Damien Millera6e3f012012-11-04 23:21:40 +11003183 - djm@cvs.openbsd.org 2012/11/04 11:09:15
3184 [auth.h auth1.c auth2.c monitor.c servconf.c servconf.h sshd.c]
3185 [sshd_config.5]
3186 Support multiple required authentication via an AuthenticationMethods
3187 option. This option lists one or more comma-separated lists of
3188 authentication method names. Successful completion of all the methods in
3189 any list is required for authentication to complete;
3190 feedback and ok markus@
Damien Millerf33580e2012-11-04 22:22:52 +11003191
Damien Miller07daed52012-10-31 08:57:55 +1100319220121030
3193 - (djm) OpenBSD CVS Sync
3194 - markus@cvs.openbsd.org 2012/10/05 12:34:39
3195 [sftp.c]
3196 fix signed vs unsigned warning; feedback & ok: djm@
Damien Miller09d3e122012-10-31 08:58:58 +11003197 - djm@cvs.openbsd.org 2012/10/30 21:29:55
3198 [auth-rsa.c auth.c auth.h auth2-pubkey.c servconf.c servconf.h]
3199 [sshd.c sshd_config sshd_config.5]
3200 new sshd_config option AuthorizedKeysCommand to support fetching
3201 authorized_keys from a command in addition to (or instead of) from
3202 the filesystem. The command is run as the target server user unless
3203 another specified via a new AuthorizedKeysCommandUser option.
3204
3205 patch originally by jchadima AT redhat.com, reworked by me; feedback
3206 and ok markus@
Damien Miller07daed52012-10-31 08:57:55 +11003207
Tim Ricec0e5cbe2012-10-18 21:38:58 -0700320820121019
3209 - (tim) [buildpkg.sh.in] Double up on some backslashes so they end up in
3210 the generated file as intended.
3211
Darren Tucker0af24052012-10-05 10:41:25 +1000321220121005
3213 - (dtucker) OpenBSD CVS Sync
3214 - djm@cvs.openbsd.org 2012/09/17 09:54:44
3215 [sftp.c]
3216 an XXX for later
Darren Tucker302889a2012-10-05 10:42:53 +10003217 - markus@cvs.openbsd.org 2012/09/17 13:04:11
3218 [packet.c]
3219 clear old keys on rekeing; ok djm
Darren Tucker063018d2012-10-05 10:43:58 +10003220 - dtucker@cvs.openbsd.org 2012/09/18 10:36:12
3221 [sftp.c]
3222 Add bounds check on sftp tab-completion. Part of a patch from from
3223 Jean-Marc Robert via tech@, ok djm
Darren Tucker191fcc62012-10-05 10:45:01 +10003224 - dtucker@cvs.openbsd.org 2012/09/21 10:53:07
3225 [sftp.c]
3226 Fix improper handling of absolute paths when PWD is part of the completed
3227 path. Patch from Jean-Marc Robert via tech@, ok djm.
Darren Tucker17146d32012-10-05 10:46:16 +10003228 - dtucker@cvs.openbsd.org 2012/09/21 10:55:04
3229 [sftp.c]
3230 Fix handling of filenames containing escaped globbing characters and
3231 escape "#" and "*". Patch from Jean-Marc Robert via tech@, ok djm.
Darren Tucker628a3fd2012-10-05 10:50:15 +10003232 - jmc@cvs.openbsd.org 2012/09/26 16:12:13
3233 [ssh.1]
3234 last stage of rfc changes, using consistent Rs/Re blocks, and moving the
3235 references into a STANDARDS section;
Darren Tucker3a7c0412012-10-05 10:51:59 +10003236 - naddy@cvs.openbsd.org 2012/10/01 13:59:51
3237 [monitor_wrap.c]
3238 pasto; ok djm@
Darren Tucker0dc283b2012-10-05 10:52:51 +10003239 - djm@cvs.openbsd.org 2012/10/02 07:07:45
3240 [ssh-keygen.c]
3241 fix -z option, broken in revision 1.215
Darren Tucker427e4092012-10-05 11:02:39 +10003242 - markus@cvs.openbsd.org 2012/10/04 13:21:50
3243 [myproposal.h ssh_config.5 umac.h sshd_config.5 ssh.1 sshd.8 mac.c]
3244 add umac128 variant; ok djm@ at n2k12
Darren Tucker189e5ba2012-10-05 11:41:52 +10003245 - dtucker@cvs.openbsd.org 2012/09/06 04:11:07
3246 [regress/try-ciphers.sh]
3247 Restore missing space. (Id sync only).
Darren Tucker6fc5aa82012-10-05 11:43:57 +10003248 - dtucker@cvs.openbsd.org 2012/09/09 11:51:25
3249 [regress/multiplex.sh]
3250 Add test for ssh -Ostop
Darren Tucker9b2c0362012-10-05 11:45:39 +10003251 - dtucker@cvs.openbsd.org 2012/09/10 00:49:21
3252 [regress/multiplex.sh]
3253 Log -O cmd output to the log file and make logging consistent with the
3254 other tests. Test clean shutdown of an existing channel when testing
3255 "stop".
Darren Tuckeree4ad772012-10-05 12:04:10 +10003256 - dtucker@cvs.openbsd.org 2012/09/10 01:51:19
3257 [regress/multiplex.sh]
3258 use -Ocheck and waiting for completions by PID to make multiplexing test
3259 less racy and (hopefully) more reliable on slow hardware.
Darren Tucker992faad2012-10-05 11:38:24 +10003260 - [Makefile umac.c] Add special-case target to build umac128.o.
Darren Tucker50ce4472012-10-05 12:11:33 +10003261 - [umac.c] Enforce allowed umac output sizes. From djm@.
Darren Tuckercc8e9ff2012-10-05 15:41:06 +10003262 - [Makefile.in] "Using $< in a non-suffix rule context is a GNUmake idiom".
Darren Tucker0af24052012-10-05 10:41:25 +10003263
Darren Tuckerbb6cc072012-09-17 13:25:06 +1000326420120917
3265 - (dtucker) OpenBSD CVS Sync
3266 - dtucker@cvs.openbsd.org 2012/09/13 23:37:36
3267 [servconf.c]
3268 Fix comment line length
Darren Tucker26b9e3b2012-09-17 13:25:44 +10003269 - markus@cvs.openbsd.org 2012/09/14 16:51:34
3270 [sshconnect.c]
3271 remove unused variable
Darren Tuckerbb6cc072012-09-17 13:25:06 +10003272
Darren Tucker92a39cf2012-09-07 11:20:20 +1000327320120907
3274 - (dtucker) OpenBSD CVS Sync
3275 - dtucker@cvs.openbsd.org 2012/09/06 09:50:13
3276 [clientloop.c]
3277 Make the escape command help (~?) context sensitive so that only commands
3278 that will work in the current session are shown. ok markus@
Darren Tucker83d0af62012-09-07 11:21:03 +10003279 - jmc@cvs.openbsd.org 2012/09/06 13:57:42
3280 [ssh.1]
3281 missing letter in previous;
Darren Tuckerf111d402012-09-07 11:21:42 +10003282 - dtucker@cvs.openbsd.org 2012/09/07 00:30:19
3283 [clientloop.c]
3284 Print '^Z' instead of a raw ^Z when the sequence is not supported. ok djm@
Darren Tuckerca0d0fd2012-09-07 11:22:24 +10003285 - dtucker@cvs.openbsd.org 2012/09/07 01:10:21
3286 [clientloop.c]
3287 Merge escape help text for ~v and ~V; ok djm@
Darren Tucker48bf4b02012-09-07 16:38:53 +10003288 - dtucker@cvs.openbsd.org 2012/09/07 06:34:21
3289 [clientloop.c]
3290 when muxmaster is run with -N, make it shut down gracefully when a client
3291 sends it "-O stop" rather than hanging around (bz#1985). ok djm@
Darren Tucker92a39cf2012-09-07 11:20:20 +10003292
Darren Tucker3ee50c52012-09-06 21:18:11 +1000329320120906
3294 - (dtucker) OpenBSD CVS Sync
3295 - jmc@cvs.openbsd.org 2012/08/15 18:25:50
3296 [ssh-keygen.1]
3297 a little more info on certificate validity;
3298 requested by Ross L Richardson, and provided by djm
Darren Tucker66cb0e02012-09-06 21:19:05 +10003299 - dtucker@cvs.openbsd.org 2012/08/17 00:45:45
3300 [clientloop.c clientloop.h mux.c]
3301 Force a clean shutdown of ControlMaster client sessions when the ~. escape
3302 sequence is used. This means that ~. should now work in mux clients even
3303 if the server is no longer responding. Found by tedu, ok djm.
Darren Tuckerae608bd2012-09-06 21:19:51 +10003304 - djm@cvs.openbsd.org 2012/08/17 01:22:56
3305 [kex.c]
3306 add some comments about better handling first-KEX-follows notifications
3307 from the server. Nothing uses these right now. No binary change
Darren Tuckerf09a8a62012-09-06 21:20:39 +10003308 - djm@cvs.openbsd.org 2012/08/17 01:25:58
3309 [ssh-keygen.c]
3310 print details of which host lines were deleted when using
3311 "ssh-keygen -R host"; ok markus@
Darren Tucker00c15182012-09-06 21:21:56 +10003312 - djm@cvs.openbsd.org 2012/08/17 01:30:00
3313 [compat.c sshconnect.c]
3314 Send client banner immediately, rather than waiting for the server to
3315 move first for SSH protocol 2 connections (the default). Patch based on
3316 one in bz#1999 by tls AT panix.com, feedback dtucker@ ok markus@
Darren Tucker50a48d02012-09-06 21:25:37 +10003317 - dtucker@cvs.openbsd.org 2012/09/06 04:37:39
3318 [clientloop.c log.c ssh.1 log.h]
3319 Add ~v and ~V escape sequences to raise and lower the logging level
3320 respectively. Man page help from jmc, ok deraadt jmc
Darren Tucker3ee50c52012-09-06 21:18:11 +10003321
Darren Tucker23e4b802012-08-30 10:42:47 +1000332220120830
3323 - (dtucker) [moduli] Import new moduli file.
3324
Darren Tucker31854182012-08-28 19:57:19 +1000332520120828
Damien Miller4eb0a532012-08-29 10:26:20 +10003326 - (djm) Release openssh-6.1
3327
332820120828
Darren Tucker31854182012-08-28 19:57:19 +10003329 - (dtucker) [openbsd-compat/bsd-cygwin_util.h] define WIN32_LEAN_AND_MEAN
3330 for compatibility with future mingw-w64 headers. Patch from vinschen at
3331 redhat com.
3332
Damien Miller39a9d2c2012-08-22 21:57:13 +1000333320120822
3334 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
3335 [contrib/suse/openssh.spec] Update version numbers
3336
Damien Miller709a1e92012-07-31 12:20:43 +1000333720120731
3338 - (djm) OpenBSD CVS Sync
3339 - jmc@cvs.openbsd.org 2012/07/06 06:38:03
3340 [ssh-keygen.c]
3341 missing full stop in usage();
Damien Miller5a5c2b92012-07-31 12:21:34 +10003342 - djm@cvs.openbsd.org 2012/07/10 02:19:15
3343 [servconf.c servconf.h sshd.c sshd_config]
3344 Turn on systrace sandboxing of pre-auth sshd by default for new installs
3345 by shipping a config that overrides the current UsePrivilegeSeparation=yes
3346 default. Make it easier to flip the default in the future by adding too.
Damien Miller1cce1032012-07-31 12:22:18 +10003347 prodded markus@ feedback dtucker@ "get it in" deraadt@
Damien Miller46cb75a2012-07-31 12:22:37 +10003348 - dtucker@cvs.openbsd.org 2012/07/13 01:35:21
3349 [servconf.c]
3350 handle long comments in config files better. bz#2025, ok markus
Damien Miller38fe6622012-07-31 12:23:16 +10003351 - markus@cvs.openbsd.org 2012/07/22 18:19:21
3352 [version.h]
3353 openssh 6.1
Damien Miller709a1e92012-07-31 12:20:43 +10003354
Darren Tuckerd809a4b2012-07-20 10:42:06 +1000335520120720
3356 - (dtucker) Import regened moduli file.
3357
Damien Millera0433a72012-07-06 10:27:10 +1000335820120706
3359 - (djm) [sandbox-seccomp-filter.c] fallback to rlimit if seccomp filter is
3360 not available. Allows use of sshd compiled on host with a filter-capable
3361 kernel on hosts that lack the support. bz#2011 ok dtucker@
Damien Miller77eab7b2012-07-06 11:49:28 +10003362 - (djm) [configure.ac] Recursively expand $(bindir) to ensure it has no
3363 unexpanded $(prefix) embedded. bz#2007 patch from nix-corp AT
3364 esperi.org.uk; ok dtucker@
Damien Millerdfceafe2012-07-06 13:44:19 +10003365- (djm) OpenBSD CVS Sync
3366 - dtucker@cvs.openbsd.org 2012/07/06 00:41:59
3367 [moduli.c ssh-keygen.1 ssh-keygen.c]
3368 Add options to specify starting line number and number of lines to process
3369 when screening moduli candidates. This allows processing of different
3370 parts of a candidate moduli file in parallel. man page help jmc@, ok djm@
Damien Millerab523b02012-07-06 13:44:43 +10003371 - djm@cvs.openbsd.org 2012/07/06 01:37:21
3372 [mux.c]
3373 fix memory leak of passed-in environment variables and connection
3374 context when new session message is malformed; bz#2003 from Bert.Wesarg
3375 AT googlemail.com
Damien Millerfff9f092012-07-06 13:45:01 +10003376 - djm@cvs.openbsd.org 2012/07/06 01:47:38
3377 [ssh.c]
3378 move setting of tty_flag to after config parsing so RequestTTY options
3379 are correctly picked up. bz#1995 patch from przemoc AT gmail.com;
3380 ok dtucker@
Damien Millera0433a72012-07-06 10:27:10 +10003381
Darren Tucker34f702a2012-07-04 08:50:09 +1000338220120704
3383 - (dtucker) [configure.ac openbsd-compat/bsd-misc.h] Add setlinebuf for
3384 platforms that don't have it. "looks good" tim@
3385
Darren Tucker60395f92012-07-03 14:31:18 +1000338620120703
3387 - (dtucker) [configure.ac] Detect platforms that can't use select(2) with
3388 setrlimit(RLIMIT_NOFILE, rl_zero) and disable the rlimit sandbox on those.
Darren Tuckerd545a4b2012-07-03 22:48:31 +10003389 - (dtucker) [configure.ac sandbox-rlimit.c] Test whether or not
3390 setrlimit(RLIMIT_FSIZE, rl_zero) and skip it if it's not supported. Its
3391 benefit is minor, so it's not worth disabling the sandbox if it doesn't
3392 work.
Darren Tucker60395f92012-07-03 14:31:18 +10003393
Darren Tuckerecbf14a2012-07-02 18:53:37 +1000339420120702
3395- (dtucker) OpenBSD CVS Sync
3396 - naddy@cvs.openbsd.org 2012/06/29 13:57:25
3397 [ssh_config.5 sshd_config.5]
3398 match the documented MAC order of preference to the actual one;
3399 ok dtucker@
Darren Tucker3b4b2d32012-07-02 18:54:31 +10003400 - markus@cvs.openbsd.org 2012/06/30 14:35:09
3401 [sandbox-systrace.c sshd.c]
3402 fix a during the load of the sandbox policies (child can still make
3403 the read-syscall and wait forever for systrace-answers) by replacing
3404 the read/write synchronisation with SIGSTOP/SIGCONT;
3405 report and help hshoexer@; ok djm@, dtucker@
Darren Tucker7b305012012-07-02 18:55:09 +10003406 - dtucker@cvs.openbsd.org 2012/07/02 08:50:03
3407 [ssh.c]
3408 set interactive ToS for forwarded X11 sessions. ok djm@
Darren Tucker4908d442012-07-02 22:15:38 +10003409 - dtucker@cvs.openbsd.org 2012/07/02 12:13:26
3410 [ssh-pkcs11-helper.c sftp-client.c]
3411 fix a couple of "assigned but not used" warnings. ok markus@
Darren Tucker369ceed2012-07-03 00:53:18 +10003412 - dtucker@cvs.openbsd.org 2012/07/02 14:37:06
3413 [regress/connect-privsep.sh]
3414 remove exit from end of test since it prevents reporting failure
Darren Tuckerec1e15d2012-07-03 01:06:49 +10003415 - (dtucker) [regress/reexec.sh regress/sftp-cmds.sh regress/test-exec.sh]
3416 Move cygwin detection to test-exec and use to skip reexec test on cygwin.
Darren Tucker6ea5dc62012-07-03 01:11:28 +10003417 - (dtucker) [regress/test-exec.sh] Correct uname for cygwin/w2k.
Darren Tuckerecbf14a2012-07-02 18:53:37 +10003418
Damien Miller97f43bb2012-06-30 08:32:29 +1000341920120629
3420 - OpenBSD CVS Sync
3421 - dtucker@cvs.openbsd.org 2012/06/21 00:16:07
3422 [addrmatch.c]
3423 fix strlcpy truncation check. from carsten at debian org, ok markus
Damien Miller5f58a872012-06-30 08:33:17 +10003424 - dtucker@cvs.openbsd.org 2012/06/22 12:30:26
3425 [monitor.c sshconnect2.c]
3426 remove dead code following 'for (;;)' loops.
3427 From Steve.McClellan at radisys com, ok markus@
Damien Millerea858292012-06-30 08:33:32 +10003428 - dtucker@cvs.openbsd.org 2012/06/22 14:36:33
3429 [sftp.c]
3430 Remove unused variable leftover from tab-completion changes.
3431 From Steve.McClellan at radisys com, ok markus@
Damien Miller560de922012-06-30 08:33:53 +10003432 - dtucker@cvs.openbsd.org 2012/06/26 11:02:30
3433 [sandbox-systrace.c]
3434 Add mquery to the list of allowed syscalls for "UsePrivilegeSeparation
3435 sandbox" since malloc now uses it. From johnw.mail at gmail com.
Damien Millerdb4f8e82012-06-30 08:34:59 +10003436 - dtucker@cvs.openbsd.org 2012/06/28 05:07:45
3437 [mac.c myproposal.h ssh_config.5 sshd_config.5]
3438 Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs since they were removed
3439 from draft6 of the spec and will not be in the RFC when published. Patch
3440 from mdb at juniper net via bz#2023, ok markus.
Damien Milleree3c1962012-06-30 08:35:59 +10003441 - naddy@cvs.openbsd.org 2012/06/29 13:57:25
3442 [ssh_config.5 sshd_config.5]
3443 match the documented MAC order of preference to the actual one; ok dtucker@
Darren Tucker30139032012-06-30 15:01:22 +10003444 - dtucker@cvs.openbsd.org 2012/05/13 01:42:32
3445 [regress/addrmatch.sh]
3446 Add "Match LocalAddress" and "Match LocalPort" to sshd and adjust tests
3447 to match. Feedback and ok djm@ markus@.
Darren Tucker4430a862012-06-30 15:03:28 +10003448 - djm@cvs.openbsd.org 2012/06/01 00:47:35
Darren Tucker2920bc12012-06-30 15:06:28 +10003449 [regress/multiplex.sh regress/forwarding.sh]
Darren Tucker4430a862012-06-30 15:03:28 +10003450 append to rather than truncate test log; bz#2013 from openssh AT
3451 roumenpetrov.info
Darren Tuckerff32d7c2012-06-30 15:04:13 +10003452 - djm@cvs.openbsd.org 2012/06/01 00:52:52
Darren Tucker2920bc12012-06-30 15:06:28 +10003453 [regress/sftp-cmds.sh]
Darren Tuckerff32d7c2012-06-30 15:04:13 +10003454 don't delete .* on cleanup due to unintended env expansion; pointed out in
3455 bz#2014 by openssh AT roumenpetrov.info
Darren Tucker2920bc12012-06-30 15:06:28 +10003456 - dtucker@cvs.openbsd.org 2012/06/26 12:06:59
3457 [regress/connect-privsep.sh]
3458 test sandbox with every malloc option
Darren Tuckera08c2072012-06-30 15:08:53 +10003459 - dtucker@cvs.openbsd.org 2012/06/28 05:07:45
3460 [regress/try-ciphers.sh regress/cipher-speed.sh]
3461 Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs since they were removed
3462 from draft6 of the spec and will not be in the RFC when published. Patch
3463 from mdb at juniper net via bz#2023, ok markus.
Darren Tucker3886f952012-06-30 19:47:01 +10003464 - (dtucker) [myproposal.h] Remove trailing backslash to fix compile error.
Darren Tucker14a9d252012-06-30 20:05:02 +10003465 - (dtucker) [key.c] ifdef out sha256 key types on platforms that don't have
3466 the required functions in libcrypto.
Damien Miller97f43bb2012-06-30 08:32:29 +10003467
Darren Tucker8908da72012-06-28 15:21:32 +1000346820120628
3469 - (dtucker) [openbsd-compat/getrrsetbyname-ldns.c] bz #2022: prevent null
3470 pointer deref in the client when built with LDNS and using DNSSEC with a
3471 CNAME. Patch from gregdlg+mr at hochet info.
3472
Darren Tucker62dcd632012-06-22 22:02:42 +1000347320120622
3474 - (dtucker) [contrib/cygwin/ssh-host-config] Ensure that user sshd runs as
3475 can logon as a service. Patch from vinschen at redhat com.
3476
Damien Millerefc6fc92012-06-20 21:44:56 +1000347720120620
3478 - (djm) OpenBSD CVS Sync
3479 - djm@cvs.openbsd.org 2011/12/02 00:41:56
3480 [mux.c]
3481 fix bz#1948: ssh -f doesn't fork for multiplexed connection.
3482 ok dtucker@
Damien Miller140df632012-06-20 21:46:57 +10003483 - djm@cvs.openbsd.org 2011/12/04 23:16:12
3484 [mux.c]
3485 revert:
3486 > revision 1.32
3487 > date: 2011/12/02 00:41:56; author: djm; state: Exp; lines: +4 -1
3488 > fix bz#1948: ssh -f doesn't fork for multiplexed connection.
3489 > ok dtucker@
3490 it interacts badly with ControlPersist
Damien Millerac58ce82012-06-20 21:50:47 +10003491 - djm@cvs.openbsd.org 2012/01/07 21:11:36
3492 [mux.c]
3493 fix double-free in new session handler
3494 NB. Id sync only
Damien Miller3bde12a2012-06-20 21:51:11 +10003495 - djm@cvs.openbsd.org 2012/05/23 03:28:28
3496 [dns.c dns.h key.c key.h ssh-keygen.c]
3497 add support for RFC6594 SSHFP DNS records for ECDSA key types.
3498 patch from bugzilla-m67 AT nulld.me in bz#1978; ok + tweak markus@
Darren Tucker86dc9b42012-09-07 18:08:23 +10003499 (Original authors Ondřej Surý, Ondřej Caletka and Daniel Black)
Damien Miller7f121572012-06-20 21:51:29 +10003500 - djm@cvs.openbsd.org 2012/06/01 00:49:35
3501 [PROTOCOL.mux]
3502 correct types of port numbers (integers, not strings); bz#2004 from
3503 bert.wesarg AT googlemail.com
Damien Miller2e7decf2012-06-20 21:52:00 +10003504 - djm@cvs.openbsd.org 2012/06/01 01:01:22
3505 [mux.c]
3506 fix memory leak when mux socket creation fails; bz#2002 from bert.wesarg
3507 AT googlemail.com
Damien Miller276dcfd2012-06-20 21:52:18 +10003508 - dtucker@cvs.openbsd.org 2012/06/18 11:43:53
3509 [jpake.c]
3510 correct sizeof usage. patch from saw at online.de, ok deraadt
Damien Miller71924332012-06-20 21:52:38 +10003511 - dtucker@cvs.openbsd.org 2012/06/18 11:49:58
3512 [ssh_config.5]
3513 RSA instead of DSA twice. From Steve.McClellan at radisys com
Damien Millerb9902cf2012-06-20 21:52:58 +10003514 - dtucker@cvs.openbsd.org 2012/06/18 12:07:07
3515 [ssh.1 sshd.8]
3516 Remove mention of 'three' key files since there are now four. From
3517 Steve.McClellan at radisys com.
Damien Miller36378c62012-06-20 21:53:25 +10003518 - dtucker@cvs.openbsd.org 2012/06/18 12:17:18
3519 [ssh.1]
3520 Clarify description of -W. Noted by Steve.McClellan at radisys com,
3521 ok jmc
Damien Millerc24da772012-06-20 21:53:58 +10003522 - markus@cvs.openbsd.org 2012/06/19 18:25:28
3523 [servconf.c servconf.h sshd_config.5]
3524 sshd_config: extend Match to allow AcceptEnv and {Allow,Deny}{Users,Groups}
3525 this allows 'Match LocalPort 1022' combined with 'AllowUser bauer'
3526 ok djm@ (back in March)
Damien Millerf8268502012-06-20 21:54:15 +10003527 - jmc@cvs.openbsd.org 2012/06/19 21:35:54
3528 [sshd_config.5]
3529 tweak previous; ok markus
Damien Miller6c6da332012-06-20 22:31:26 +10003530 - djm@cvs.openbsd.org 2012/06/20 04:42:58
3531 [clientloop.c serverloop.c]
3532 initialise accept() backoff timer to avoid EINVAL from select(2) in
3533 rekeying
Damien Millerefc6fc92012-06-20 21:44:56 +10003534
Darren Tuckerd0494fd2012-05-19 14:25:39 +1000353520120519
3536 - (dtucker) [configure.ac] bz#2010: fix non-portable shell construct. Patch
3537 from cjwatson at debian org.
Darren Tucker59353892012-05-19 15:24:37 +10003538 - (dtucker) [configure.ac contrib/Makefile] bz#1996: use AC_PATH_TOOL to find
3539 pkg-config so it does the right thing when cross-compiling. Patch from
3540 cjwatson at debian org.
Darren Tuckerfbcf8272012-05-19 19:37:01 +10003541- (dtucker) OpenBSD CVS Sync
3542 - dtucker@cvs.openbsd.org 2012/05/13 01:42:32
3543 [servconf.h servconf.c sshd.8 sshd.c auth.c sshd_config.5]
3544 Add "Match LocalAddress" and "Match LocalPort" to sshd and adjust tests
3545 to match. Feedback and ok djm@ markus@.
Darren Tuckerba9ea322012-05-19 19:37:33 +10003546 - dtucker@cvs.openbsd.org 2012/05/19 06:30:30
3547 [sshd_config.5]
3548 Document PermitOpen none. bz#2001, patch from Loganaden Velvindron
Darren Tuckerd0494fd2012-05-19 14:25:39 +10003549
Darren Tuckere1a3ddf2012-05-04 11:05:45 +1000355020120504
3551 - (dtucker) [configure.ac] Include <sys/param.h> rather than <sys/types.h>
3552 to fix building on some plaforms. Fom bowman at math utah edu and
3553 des at des no.
3554
Darren Tuckerd0d3fff2012-04-27 10:55:39 +1000355520120427
3556 - (dtucker) [regress/addrmatch.sh] skip tests when running on a non-ipv6
3557 platform rather than exiting early, so that we still clean up and return
3558 success or failure to test-exec.sh
3559
Damien Miller7584cb12012-04-26 09:51:26 +1000356020120426
3561 - (djm) [auth-passwd.c] Handle crypt() returning NULL; from Paul Wouters
3562 via Niels
Damien Miller025bfd12012-04-26 09:52:15 +10003563 - (djm) [auth-krb5.c] Save errno across calls that might modify it;
3564 ok dtucker@
Damien Miller7584cb12012-04-26 09:51:26 +10003565
Damien Millerba77e1f2012-04-23 18:21:05 +1000356620120423
3567 - OpenBSD CVS Sync
3568 - djm@cvs.openbsd.org 2012/04/23 08:18:17
3569 [channels.c]
3570 fix function proto/source mismatch
3571
Damien Millera563cce2012-04-22 11:07:28 +1000357220120422
3573 - OpenBSD CVS Sync
3574 - djm@cvs.openbsd.org 2012/02/29 11:21:26
3575 [ssh-keygen.c]
3576 allow conversion of RSA1 keys to public PEM and PKCS8; "nice" markus@
Damien Miller29cd1882012-04-22 11:08:10 +10003577 - guenther@cvs.openbsd.org 2012/03/15 03:10:27
3578 [session.c]
3579 root should always be excluded from the test for /etc/nologin instead
3580 of having it always enforced even when marked as ignorenologin. This
3581 regressed when the logic was incompletely flipped around in rev 1.251
3582 ok halex@ millert@
Damien Miller48348fc2012-04-22 11:08:30 +10003583 - djm@cvs.openbsd.org 2012/03/28 07:23:22
3584 [PROTOCOL.certkeys]
3585 explain certificate extensions/crit split rationale. Mention requirement
3586 that each appear at most once per cert.
Damien Millerc6081482012-04-22 11:18:53 +10003587 - dtucker@cvs.openbsd.org 2012/03/29 23:54:36
3588 [channels.c channels.h servconf.c]
3589 Add PermitOpen none option based on patch from Loganaden Velvindron
3590 (bz #1949). ok djm@
Damien Millera6508752012-04-22 11:21:10 +10003591 - djm@cvs.openbsd.org 2012/04/11 13:16:19
3592 [channels.c channels.h clientloop.c serverloop.c]
3593 don't spin in accept() when out of fds (ENFILE/ENFILE) - back off for a
3594 while; ok deraadt@ markus@
Damien Miller9fed1612012-04-22 11:21:43 +10003595 - djm@cvs.openbsd.org 2012/04/11 13:17:54
3596 [auth.c]
3597 Support "none" as an argument for AuthorizedPrincipalsFile to indicate
3598 no file should be read.
Damien Millera116d132012-04-22 11:23:46 +10003599 - djm@cvs.openbsd.org 2012/04/11 13:26:40
3600 [sshd.c]
3601 don't spin in accept() when out of fds (ENFILE/ENFILE) - back off for a
3602 while; ok deraadt@ markus@
Damien Miller839f7432012-04-22 11:24:21 +10003603 - djm@cvs.openbsd.org 2012/04/11 13:34:17
3604 [ssh-keyscan.1 ssh-keyscan.c]
3605 now that sshd defaults to offering ECDSA keys, ssh-keyscan should also
3606 look for them by default; bz#1971
Damien Miller23528812012-04-22 11:24:43 +10003607 - djm@cvs.openbsd.org 2012/04/12 02:42:32
3608 [servconf.c servconf.h sshd.c sshd_config sshd_config.5]
3609 VersionAddendum option to allow server operators to append some arbitrary
3610 text to the SSH-... banner; ok deraadt@ "don't care" markus@
Damien Miller8fef9eb2012-04-22 11:25:10 +10003611 - djm@cvs.openbsd.org 2012/04/12 02:43:55
3612 [sshd_config sshd_config.5]
3613 mention AuthorizedPrincipalsFile=none default
Damien Miller49223152012-04-22 11:25:47 +10003614 - djm@cvs.openbsd.org 2012/04/20 03:24:23
3615 [sftp.c]
3616 setlinebuf(3) is more readable than setvbuf(.., _IOLBF, ...)
Damien Miller70b2d552012-04-22 11:26:10 +10003617 - jmc@cvs.openbsd.org 2012/04/20 16:26:22
3618 [ssh.1]
3619 use "brackets" instead of "braces", for consistency;
Damien Millera563cce2012-04-22 11:07:28 +10003620
Damien Miller8beb3202012-04-20 10:58:34 +1000362120120420
3622 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
3623 [contrib/suse/openssh.spec] Update for release 6.0
Damien Millerbf230412012-04-20 14:11:04 +10003624 - (djm) [README] Update URL to release notes.
Damien Millerd5dacb42012-04-20 15:01:01 +10003625 - (djm) Release openssh-6.0