blob: 8bc434acbe12b188f8143135c99532da7344cdc2 [file] [log] [blame]
Darren Tucker8661b562003-07-06 15:20:46 +1000120030706
2 - (dtucker) [ssh-rand-helper.c loginrec.c]
3 Apply atomicio typing change to these too.
4
Darren Tuckere5327042003-07-03 13:40:44 +1000520030703
6 - (dtucker) OpenBSD CVS Sync
7 - djm@cvs.openbsd.org 2003/06/28 07:48:10
8 [sshd.c]
9 report pidfile creation errors, based on patch from Roumen Petrov;
10 ok markus@
Darren Tucker9f63f222003-07-03 13:46:56 +100011 - deraadt@cvs.openbsd.org 2003/06/28 16:23:06
12 [atomicio.c atomicio.h authfd.c clientloop.c monitor_wrap.c msg.c
13 progressmeter.c scp.c sftp-client.c ssh-keyscan.c ssh.h sshconnect.c
14 sshd.c]
15 deal with typing of write vs read in atomicio
Darren Tuckeredeb1f72003-07-03 13:48:04 +100016 - markus@cvs.openbsd.org 2003/06/29 12:44:38
17 [sshconnect.c]
18 memset 0, not \0; andrushock@korovino.net
Darren Tucker9189ff82003-07-03 13:52:04 +100019 - markus@cvs.openbsd.org 2003/07/02 12:56:34
20 [channels.c]
21 deny dynamic forwarding with -R for v1, too; ok djm@
Darren Tucker46471c92003-07-03 13:55:19 +100022 - markus@cvs.openbsd.org 2003/07/02 14:51:16
23 [channels.c ssh.1 ssh_config.5]
24 (re)add socks5 suppport to -D; ok djm@
25 now ssh(1) can act both as a socks 4 and socks 5 server and
26 dynamically forward ports.
Darren Tucker3f521e22003-07-03 16:20:42 +100027 - markus@cvs.openbsd.org 2003/07/02 20:37:48
28 [ssh.c]
29 convert hostkeyalias to lowercase, otherwise uppercase aliases will
30 not match at all; ok henning@
Darren Tucker7a246622003-07-03 20:26:04 +100031 - markus@cvs.openbsd.org 2003/07/03 08:21:46
32 [regress/dynamic-forward.sh]
33 add socks5; speedup; reformat; based on patch from dtucker@zip.com.au
Darren Tuckere2f2be72003-07-03 20:27:55 +100034 - markus@cvs.openbsd.org 2003/07/03 08:24:13
35 [regress/Makefile]
36 enable tests for dynamic fwd via socks (-D), uses nc(1)
Darren Tucker0a4f04b2003-07-03 20:37:47 +100037 - djm@cvs.openbsd.org 2003/07/03 08:09:06
38 [readconf.c readconf.h ssh-keysign.c ssh.c]
39 fix AddressFamily option in config file, from brent@graveland.net;
40 ok markus@
Darren Tuckere5327042003-07-03 13:40:44 +100041
Damien Miller200d0a72003-06-30 19:21:36 +10004220030630
43 - (djm) Search for support functions necessary to build our
44 getrrsetbyname() replacement. Patch from Roumen Petrov
45
Darren Tuckercc9fd542003-06-29 21:23:37 +10004620030629
Darren Tucker6eb93042003-06-29 21:30:41 +100047 - (dtucker) [includes.h] Bug #602: move #include of netdb.h to after in.h
48 (fixes compiler warnings on Solaris 2.5.1).
49 - (dtucker) [configure.ac] Add sanity test after system-dependant compiler
50 flag modifications.
Darren Tuckercc9fd542003-06-29 21:23:37 +100051
Darren Tucker674f71d2003-06-28 12:33:12 +10005220030628
Damien Miller4a8e2842003-06-28 18:02:47 +100053 - (djm) Bug #591: use PKCS#15 private key label as a comment in case
54 of OpenSC. Report and patch from larsch@trustcenter.de
Damien Miller723569b2003-06-28 18:08:16 +100055 - (djm) Bug #593: Sanity check OpenSC card reader number; patch from
56 aj@dungeon.inka.de
Darren Tucker674f71d2003-06-28 12:33:12 +100057 - (dtucker) OpenBSD CVS Sync
58 - markus@cvs.openbsd.org 2003/06/23 09:02:44
59 [ssh_config.5]
60 document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@
Darren Tucker502d3842003-06-28 12:38:01 +100061 - markus@cvs.openbsd.org 2003/06/24 08:23:46
62 [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
63 monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
64 int -> u_int; ok djm@, deraadt@, mouring@
Darren Tuckera6612d42003-06-28 12:39:03 +100065 - miod@cvs.openbsd.org 2003/06/25 22:39:36
66 [sftp-server.c]
67 Typo police: attribute is better written with an 'r'.
Darren Tuckera99c1b72003-06-28 12:40:12 +100068 - markus@cvs.openbsd.org 2003/06/26 20:08:33
69 [readconf.c]
70 do not dump core for 'ssh -o proxycommand host'; ok deraadt@
Darren Tuckerb611c122003-06-28 12:42:09 +100071 - (dtucker) [regress/dynamic-forward.sh] Import new regression test.
Darren Tuckera3020db2003-06-28 12:54:33 +100072 - (dtucker) [configure.ac] Bug #570: Have ./configure --enable-FEATURE
73 actually enable the feature, for those normally disabled. Patch by
74 openssh (at) roumenpetrov.info.
Darren Tucker674f71d2003-06-28 12:33:12 +100075
Darren Tuckera0472e02003-06-24 20:22:09 +10007620030624
77 - (dtucker) Have configure refer the user to config.log and
78 contrib/findssl.sh for OpenSSL header/library mismatches.
79
Darren Tuckere0194e52003-06-22 12:33:27 +10008020030622
Darren Tuckera251f802003-06-22 20:45:15 +100081 - (dtucker) OpenBSD CVS Sync
Darren Tuckere0194e52003-06-22 12:33:27 +100082 - markus@cvs.openbsd.org 2003/06/21 09:14:05
Darren Tuckera251f802003-06-22 20:45:15 +100083 [regress/reconfigure.sh]
Darren Tuckere0194e52003-06-22 12:33:27 +100084 missing $SUDO; from dtucker@zip.com.au
Darren Tucker89b249b2003-06-22 21:22:04 +100085 - markus@cvs.openbsd.org 2003/06/18 11:28:11
Darren Tuckera251f802003-06-22 20:45:15 +100086 [ssh-rsa.c]
87 backout last change, since it violates pkcs#1
88 switch to share/misc/license.template
Darren Tucker91cf2612003-06-22 20:46:53 +100089 - djm@cvs.openbsd.org 2003/06/20 05:47:58
90 [sshd_config.5]
91 sync description of protocol 2 cipher proposal; ok markus
Darren Tuckerb8dae8e2003-06-22 20:48:45 +100092 - djm@cvs.openbsd.org 2003/06/20 05:48:21
93 [sshd_config]
94 sync some implemented options; ok markus@
Darren Tuckere0194e52003-06-22 12:33:27 +100095 - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
Darren Tucker6cf1a2c2003-06-22 18:32:10 +100096 - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
97 testing its value.
Darren Tuckere0194e52003-06-22 12:33:27 +100098
Damien Miller469954d2003-06-18 20:25:33 +10009920030618
100 - (djm) OpenBSD CVS Sync
101 - markus@cvs.openbsd.org 2003/06/12 07:57:38
102 [monitor.c sshlogin.c sshpty.c]
103 typos; dtucker at zip.com.au
Damien Miller116aabb2003-06-18 20:26:13 +1000104 - djm@cvs.openbsd.org 2003/06/12 12:22:47
105 [LICENCE]
106 mention more copyright holders; ok markus@
Damien Millerb2cdcb52003-06-18 20:26:34 +1000107 - nino@cvs.openbsd.org 2003/06/12 15:34:09
108 [scp.c]
109 Typo. Ok markus@.
Damien Miller56a0bb02003-06-18 20:28:40 +1000110 - markus@cvs.openbsd.org 2003/06/12 19:12:03
111 [scard.c scard.h ssh-agent.c ssh.c]
112 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
Damien Miller8c1d2e32003-06-18 20:29:01 +1000113 - markus@cvs.openbsd.org 2003/06/16 08:22:35
114 [ssh-rsa.c]
115 make sure the signature has at least the expected length (don't
116 insist on len == hlen + oidlen, since this breaks some smartcards)
117 bugzilla #592; ok djm@
Damien Miller80163e12003-06-18 20:29:18 +1000118 - markus@cvs.openbsd.org 2003/06/16 10:22:45
119 [ssh-add.c]
120 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
Damien Miller0275b522003-06-18 20:29:35 +1000121 - markus@cvs.openbsd.org 2003/06/17 18:14:23
122 [cipher-ctr.c]
123 use license from /usr/share/misc/license.template for new code
Darren Tuckerfc8a7ea2003-06-18 22:18:57 +1000124 - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
125 Import new regression tests from OpenBSD
Darren Tucker3a222ac2003-06-18 22:21:33 +1000126 - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
Darren Tuckerd57a76e2003-06-18 22:32:51 +1000127 - (dtucker) OpenBSD CVS Sync (regress/)
128 - markus@cvs.openbsd.org 2003/04/02 12:21:13
129 [Makefile]
130 enable rekey test
Darren Tuckera4040f52003-06-18 22:35:11 +1000131 - djm@cvs.openbsd.org 2003/04/04 09:34:22
132 [Makefile sftp-cmds.sh]
133 More regression tests, including recent directory rename bug; ok markus@
Darren Tuckeree5f83d2003-06-18 22:36:48 +1000134 - markus@cvs.openbsd.org 2003/05/14 22:08:27
135 [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
136 test against some new commerical versions
Darren Tuckerc43362c2003-06-18 22:41:41 +1000137 - mouring@cvs.openbsd.org 2003/05/15 04:07:12
138 [sftp-cmds.sh]
139 Advanced put/get testing for sftp. OK @djm
Darren Tucker76437602003-06-18 22:43:13 +1000140 - markus@cvs.openbsd.org 2003/06/12 15:40:01
141 [try-ciphers.sh]
142 add ctr
Darren Tucker50cea672003-06-18 22:45:34 +1000143 - markus@cvs.openbsd.org 2003/06/12 15:43:32
144 [Makefile]
145 test -HUP; dtucker at zip.com.au
Damien Miller469954d2003-06-18 20:25:33 +1000146
Damien Miller53950b62003-06-14 08:43:22 +100014720030614
148 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
149
Damien Millerf1ce5052003-06-11 22:04:39 +100015020030611
Damien Miller141efa72003-06-11 22:50:56 +1000151 - (djm) Mention portable copyright holders in LICENSE
Damien Milleraf639512003-06-11 22:51:32 +1000152 - (djm) Put licenses on substantial header files
Damien Miller4bfeb142003-06-11 22:08:36 +1000153 - (djm) Sync LICENSE against OpenBSD
Damien Millerf1ce5052003-06-11 22:04:39 +1000154 - (djm) OpenBSD CVS Sync
155 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
156 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
157 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
158 - section reorder
159 - COMPATIBILITY merge
160 - macro cleanup
161 - kill whitespace at EOL
162 - new sentence, new line
163 ssh pages ok markus@
Damien Miller2b92d322003-06-11 22:05:06 +1000164 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
165 [packet.c progressmeter.c]
166 mostly ansi cleanup; pval ok
Damien Miller7392ae62003-06-11 22:05:25 +1000167 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
168 [sshconnect.c]
169 clean up check_host_key() and improve SSHFP feedback. ok markus@
Damien Miller0e1b9372003-06-11 22:05:45 +1000170 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
171 [dns.c]
172 sync with check_host_key() change
Damien Millerd94f20d2003-06-11 22:06:33 +1000173 - djm@cvs.openbsd.org 2003/06/11 11:18:38
174 [authfd.c authfd.h ssh-add.c ssh-agent.c]
175 make agent constraints (lifetime, confirm) work with smartcard keys;
176 ok markus@
Damien Millerf1ce5052003-06-11 22:04:39 +1000177
178
Damien Millerc18c06e2003-06-10 18:55:22 +100017920030609
180 - (djm) Sync README.smartcard with OpenBSD -current
Damien Miller78f2e5c2003-06-10 21:09:09 +1000181 - (djm) Re-merge OpenSC info into README.smartcard
Damien Millerc18c06e2003-06-10 18:55:22 +1000182
Darren Tucker400b8782003-06-06 10:46:04 +100018320030606
184 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
185
Damien Miller10eac0c2003-06-05 09:48:32 +100018620030605
187 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
188 canohost.c changes.
Damien Miller5fe46a42003-06-05 09:53:31 +1000189 - (djm) Implement paranoid priv dropping checks, based on:
190 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
191 Proceedings of USENIX Security Symposium 2002
Damien Millerb95bb7f2003-06-05 10:04:12 +1000192 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
Damien Millerc28e38d2003-06-05 18:52:47 +1000193 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
Damien Millerf49078d2003-06-05 18:53:42 +1000194 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
195 Patch from larsch@trustcenter.de
Damien Miller76b5c8a2003-06-05 19:19:35 +1000196 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
197 Patch from larsch@trustcenter.de
Darren Tucker4aff13f2003-06-05 19:37:30 +1000198 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
Darren Tucker881753b2003-06-05 22:20:11 +1000199 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
Damien Miller10eac0c2003-06-05 09:48:32 +1000200
Damien Miller9fc7c692003-06-04 22:50:54 +100020120030604
Damien Miller865173e2003-06-04 19:06:59 +1000202 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
203 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
Damien Miller485397c2003-06-04 19:15:10 +1000204 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
Damien Miller2527f572003-06-04 19:22:06 +1000205 Patch from larsch@trustcenter.de; ok markus@
206 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
207 larsch@trustcenter.de; ok markus@
Damien Miller941ac452003-06-04 20:31:53 +1000208 - (djm) OpenBSD CVS Sync
209 - djm@cvs.openbsd.org 2003/06/04 08:25:18
210 [sshconnect.c]
211 disable challenge/response and keyboard-interactive auth methods
212 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
213 bz #580; ok markus@
Damien Miller31b3a0a2003-06-04 20:32:12 +1000214 - djm@cvs.openbsd.org 2003/06/04 10:23:48
215 [sshd.c]
216 remove duplicated group-dropping code; ok markus@
Damien Miller9fc7c692003-06-04 22:50:54 +1000217 - djm@cvs.openbsd.org 2003/06/04 12:03:59
218 [serverloop.c]
219 remove bitrotten commet; ok markus@
Damien Miller65d1f572003-06-04 22:51:08 +1000220 - djm@cvs.openbsd.org 2003/06/04 12:18:49
221 [scp.c]
222 ansify; ok markus@
Damien Millerb69aaa82003-06-04 22:51:24 +1000223 - djm@cvs.openbsd.org 2003/06/04 12:40:39
224 [scp.c]
225 kill ssh process upon receipt of signal, bz #241.
226 based on patch from esb AT hawaii.edu; ok markus@
Damien Millercc685c12003-06-04 22:51:38 +1000227 - djm@cvs.openbsd.org 2003/06/04 12:41:22
228 [sftp.c]
229 kill ssh process on receipt of signal; ok markus@
Damien Miller4c322482003-06-04 22:12:17 +1000230 - (djm) Update to fix of bug #584: lock card before return.
231 From larsch@trustcenter.de
Damien Miller0cbb9de2003-06-04 22:56:15 +1000232 - (djm) Always use mysignal() for SIGALRM
Damien Miller865173e2003-06-04 19:06:59 +1000233
23420030603
Damien Miller35276252003-06-03 10:14:28 +1000235 - (djm) Replace setproctitle replacement with code derived from
236 UCB sendmail
Damien Miller3a961dc2003-06-03 10:25:48 +1000237 - (djm) OpenBSD CVS Sync
238 - markus@cvs.openbsd.org 2003/06/02 09:17:34
239 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
240 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
241 [sshd_config.5]
242 deprecate VerifyReverseMapping since it's dangerous if combined
243 with IP based access control as noted by Mike Harding; replace with
244 a UseDNS option, UseDNS is on by default and includes the
245 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
246 ok deraadt@, djm@
Damien Millerdafb12e2003-06-03 13:06:18 +1000247 - millert@cvs.openbsd.org 2003/06/03 02:56:16
248 [scp.c]
249 Remove the advertising clause in the UCB license which Berkeley
250 rescinded 22 July 1999. Proofed by myself and Theo.
Damien Miller3a961dc2003-06-03 10:25:48 +1000251 - (djm) Fix portable-specific uses of verify_reverse_mapping too
Damien Miller329638e2003-06-03 12:12:50 +1000252 - (djm) Sync openbsd-compat with OpenBSD CVS.
Damien Millerd311c4e2003-06-03 13:09:16 +1000253 - No more 4-term BSD licenses in linked code
Darren Tuckereb28cbc2003-06-03 12:45:27 +1000254 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
Damien Miller35276252003-06-03 10:14:28 +1000255
Damien Millerf3bff942003-06-02 12:13:40 +100025620030602
257 - (djm) Fix segv from bad reordering in auth-pam.c
Damien Millerf2e3e9d2003-06-02 12:15:54 +1000258 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
259 clobber
Tim Rice237ca4a2003-06-01 19:25:27 -0700260 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
261 CVS ID.
Damien Millerdba59502003-06-02 17:43:19 +1000262 - (djm) Remove "noip6" option from RedHat spec file. This may now be
263 set at runtime using AddressFamily option.
Damien Millerdcc83122003-06-02 18:57:59 +1000264 - (djm) Fix use of macro before #define in cipher-aes.c
Damien Millerf4684422003-06-02 18:59:08 +1000265 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
Damien Millerab2db412003-06-02 19:09:13 +1000266 - (djm) OpenBSD CVS Sync
267 - djm@cvs.openbsd.org 2003/05/26 12:54:40
268 [sshconnect.c]
269 fix format strings; ok markus@
Damien Miller61d36802003-06-02 19:09:48 +1000270 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
271 [sshd.c uidswap.c]
272 seteuid and setegid; markus ok
Damien Millereacbb4f2003-06-02 19:10:41 +1000273 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
274 [ssh_config.5]
275 VerifyHostKeyDNS is v2 only. ok markus@
Damien Millerf3bff942003-06-02 12:13:40 +1000276
Darren Tucker3cb84e52003-05-30 16:58:22 +100027720030530
278 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
279 roumenpetrov.info
Darren Tucker2972d6c2003-05-30 17:43:42 +1000280 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
Darren Tucker3cb84e52003-05-30 16:58:22 +1000281
Damien Millera6a7c192003-05-26 21:36:13 +100028220030526
283 - (djm) Avoid auth2-chall.c warning when compiling without
284 PAM, BSD_AUTH and SKEY
285
Damien Millerc11fe252003-05-25 14:38:02 +100028620030525
287- (djm) OpenBSD CVS Sync
288 - djm@cvs.openbsd.org 2003/05/24 09:02:22
289 [log.c]
290 pass logged data through strnvis; ok markus
Damien Miller04bd8b02003-05-25 14:38:33 +1000291 - djm@cvs.openbsd.org 2003/05/24 09:30:40
292 [authfile.c monitor.c sftp-common.c sshpty.c]
293 cast some types for printing; ok markus@
Damien Millerc11fe252003-05-25 14:38:02 +1000294
Darren Tucker60145782003-05-24 11:41:16 +100029520030524
296 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
297
Damien Millerd419bda2003-05-23 18:43:40 +100029820030523
299 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
300 encoding (which encodes many more characters)
Damien Miller50677922003-05-23 18:44:04 +1000301 - OpenBSD CVS Sync
302 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
303 [sftp.1]
304 - new sentence, new line
305 - added .Xr's
306 - typos
307 ok djm@
Damien Millerfbf486b2003-05-23 18:44:23 +1000308 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
309 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
310 new sentence, new line
Damien Miller08293fa2003-05-23 18:44:41 +1000311 - djm@cvs.openbsd.org 2003/05/23 08:29:30
312 [sshconnect.c]
313 fix leak; ok markus@
Damien Millerd419bda2003-05-23 18:43:40 +1000314
Damien Miller74a34422003-05-20 09:24:17 +100031520030520
316 - (djm) OpenBSD CVS Sync
317 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
318 [log.c]
319 use syslog_r() in a signal handler called place; markus ok
Damien Miller1340ec22003-05-20 09:24:42 +1000320 - (djm) Configure logic to detect syslog_r and friends
Damien Miller74a34422003-05-20 09:24:17 +1000321
Damien Millereb0e9692003-05-19 11:28:44 +100032220030519
323 - (djm) Sync auth-pam.h with what we actually implement
324
32520030518
Damien Miller25d93422003-05-18 20:45:47 +1000326 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
327 recent merge
Damien Miller20a8f972003-05-18 20:50:30 +1000328 - (djm) OpenBSD CVS Sync
329 - djm@cvs.openbsd.org 2003/05/16 03:27:12
330 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
331 add AddressFamily option to ssh_config (like -4, -6 on commandline).
332 Portable bug #534; ok markus@
Damien Millera9825782003-05-18 20:53:10 +1000333 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
334 [auth-rhosts.c]
335 just in case, put numbers to sscanf %s arg.
Damien Millerf5399c22003-05-18 20:53:59 +1000336 - markus@cvs.openbsd.org 2003/05/17 04:27:52
337 [cipher.c cipher-ctr.c myproposal.h]
338 experimental support for aes-ctr modes from
339 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
340 ok djm@
Damien Miller7e1bbc52003-05-18 20:52:40 +1000341 - (djm) Remove IPv4 by default hack now that we can specify AF in config
Damien Miller0b8e9002003-05-18 21:44:07 +1000342 - (djm) Tidy and trim TODO
Damien Millere323df62003-05-18 22:24:09 +1000343 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
Damien Miller31741252003-05-19 00:13:38 +1000344 - (djm) Big KNF on openbsd-compat/
Damien Miller5b5ca192003-05-19 00:50:02 +1000345 - (djm) KNF on md5crypt.[ch]
346 - (djm) KNF on auth-sia.[ch]
Damien Miller25d93422003-05-18 20:45:47 +1000347
34820030517
Ben Lindstrom4c9e9ab2003-05-18 01:22:43 +0000349 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
350
Damien Miller6e80c362003-05-16 11:38:00 +100035120030516
352 - (djm) OpenBSD CVS Sync
353 - djm@cvs.openbsd.org 2003/05/15 13:52:10
354 [ssh.c]
355 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
356 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
Damien Millerf9b3feb2003-05-16 11:38:32 +1000357 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
358 [readconf.c servconf.c]
359 warn for unsupported config option. ok markus@
Damien Miller99b4b882003-05-16 11:38:46 +1000360 - markus@cvs.openbsd.org 2003/05/15 14:09:21
361 [auth2-krb5.c]
362 fix 64bit issue; report itojun@
Damien Millerb78d5eb2003-05-16 11:39:04 +1000363 - djm@cvs.openbsd.org 2003/05/15 14:55:25
364 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
365 add a ConnectTimeout option to ssh, based on patch from
366 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
Damien Miller6ac2c482003-05-16 11:42:35 +1000367 - (djm) Add warning for UsePAM when built without PAM support
Damien Millerc46b6bc2003-05-16 15:51:44 +1000368 - (djm) A few type mismatch fixes from Bug #565
Damien Millere27c6cc2003-05-16 18:21:01 +1000369 - (djm) Guard free_pam_environment against NULL argument. Works around
370 HP/UX PAM problems debugged by dtucker
Damien Miller6e80c362003-05-16 11:38:00 +1000371
Damien Millerabbae982003-05-15 10:16:21 +100037220030515
373 - (djm) OpenBSD CVS Sync
374 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
375 [ssh-agent.1]
376 setup -> set up;
377 from wiz@netbsd
Damien Miller37876e92003-05-15 10:19:46 +1000378 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
379 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
380 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
381 add experimental support for verifying hos keys using DNS as described
382 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
383 ok markus@ and henning@
Damien Miller54c45982003-05-15 10:20:13 +1000384 - markus@cvs.openbsd.org 2003/05/14 22:24:42
385 [clientloop.c session.c ssh.1]
386 allow to send a BREAK to the remote system; ok various
Damien Millerf842fcb2003-05-15 12:01:28 +1000387 - markus@cvs.openbsd.org 2003/05/15 00:28:28
388 [sshconnect2.c]
389 cleanup unregister of per-method packet handlers; ok djm@
Damien Miller2aa0ab42003-05-15 12:05:28 +1000390 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
391 [readconf.c readconf.h servconf.c servconf.h]
392 always parse kerberos options. ok djm@ markus@
Damien Millerb0622652003-05-15 13:27:28 +1000393 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
394 [dns.c]
395 add missing freerrset
Damien Miller3a3261f2003-05-15 13:37:19 +1000396 - markus@cvs.openbsd.org 2003/05/15 03:08:29
397 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
398 split out custom EVP ciphers
Damien Millered12a262003-05-15 13:37:43 +1000399 - djm@cvs.openbsd.org 2003/05/15 03:10:52
400 [ssh-keygen.c]
401 avoid warning; ok jakob@
Damien Miller4962ed62003-05-15 13:48:59 +1000402 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
403 [sftp-int.c]
404 Make put/get (globed and nonglobed) code more consistant. OK djm@
Damien Miller19c8f2b2003-05-15 13:49:21 +1000405 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
Damien Miller34bb5672003-05-15 13:49:58 +1000406 [sftp-int.c sftp.c]
Damien Miller19c8f2b2003-05-15 13:49:21 +1000407 Teach ls how to display multiple column display and allow users
408 to return to single column format via 'ls -1'. OK @djm
Damien Miller156cbe82003-05-15 14:16:41 +1000409 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
410 [readconf.c servconf.c]
411 disable kerberos when not supported. ok markus@
Damien Miller46a7b402003-05-15 14:17:28 +1000412 - markus@cvs.openbsd.org 2003/05/15 04:08:41
413 [ssh.1]
414 ~B is ssh2 only
Damien Miller2aa0ab42003-05-15 12:05:28 +1000415 - (djm) Always parse UsePAM
Damien Miller7abe09b2003-05-15 10:53:49 +1000416 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
Damien Millerd9ec3702003-05-15 12:27:08 +1000417 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
Damien Millera47f5262003-05-15 13:23:07 +1000418 - (djm) Tidy Makefile clean targets
Damien Miller5975cf12003-05-15 13:23:36 +1000419 - (djm) Adapt README.dns for portable
Damien Millerffda4cb2003-05-15 13:57:51 +1000420 - (djm) Avoid uuencode.c warnings
Damien Miller156cbe82003-05-15 14:16:41 +1000421 - (djm) Enable UsePAM when built --with-pam
Damien Millerb10f1cd2003-05-15 20:55:27 +1000422 - (djm) Only build getrrsetbyname replacement when using --with-dns
Damien Miller04cb5362003-05-15 21:29:10 +1000423 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
424 correctly)
Damien Millereff041d2003-05-15 21:33:46 +1000425 - (djm) Bug #444: Wrong paths after reconfigure
Darren Tucker5d0ccf32003-05-15 21:42:59 +1000426 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
Damien Miller04cb5362003-05-15 21:29:10 +1000427
Damien Miller1a27a1e2003-05-14 10:27:09 +100042820030514
429 - (djm) Bug #117: Don't lie to PAM about username
Damien Millerd5580922003-05-14 13:40:06 +1000430 - (djm) RCSID sync w/ OpenBSD
Damien Millerc652cac2003-05-14 13:40:54 +1000431 - (djm) OpenBSD CVS Sync
432 - djm@cvs.openbsd.org 2003/04/09 12:00:37
433 [readconf.c]
434 strip trailing whitespace from config lines before parsing.
435 Fixes bz 528; ok markus@
Damien Millera201bb32003-05-14 13:41:23 +1000436 - markus@cvs.openbsd.org 2003/04/12 10:13:57
437 [cipher.c]
438 hide cipher details; ok djm@
Damien Milleref095ce2003-05-14 13:41:39 +1000439 - markus@cvs.openbsd.org 2003/04/12 10:15:36
440 [misc.c]
441 debug->debug2
Damien Miller44e72a72003-05-14 13:42:08 +1000442 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
443 [ssh.1]
444 document -V switch, fix wording; ok markus@
Damien Miller2372ace2003-05-14 13:42:23 +1000445 - markus@cvs.openbsd.org 2003/04/14 14:17:50
446 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
447 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
Damien Miller8ce778a2003-05-14 13:43:25 +1000448 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
449 [sftp-int.c]
450 Missing globfree(&g) in process_put() spotted by Vince Brimhall
451 <VBrimhall@novell.com>. ok@ Theo
452 - markus@cvs.openbsd.org 2003/04/16 14:35:27
453 [auth.h]
454 document struct Authctxt; with solar
Damien Millerea5ade22003-05-14 13:43:53 +1000455 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
456 [ssh-keyscan.c]
457 -t in usage(); rogier@quaak.org
Damien Miller049245d2003-05-14 13:44:42 +1000458 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
459 [sshd.8 sshd_config.5]
460 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
461 Bug #550 and * escaping suggested by jmc@.
Damien Miller31554322003-05-14 13:44:58 +1000462 - david@cvs.openbsd.org 2003/04/30 20:41:07
463 [sshd.8]
464 fix invalid .Pf macro usage introduced in previous commit
465 ok jmc@ mouring@
Damien Millerdb274722003-05-14 13:45:22 +1000466 - markus@cvs.openbsd.org 2003/05/11 16:56:48
467 [authfile.c ssh-keygen.c]
468 change key_load_public to try to read a public from:
469 rsa1 private or rsa1 public and ssh2 keys.
470 this makes ssh-keygen -e fail for ssh1 keys more gracefully
471 for example; report from itojun (netbsd pr 20550).
Damien Millerb1ca8bb2003-05-14 13:45:42 +1000472 - markus@cvs.openbsd.org 2003/05/11 20:30:25
473 [channels.c clientloop.c serverloop.c session.c ssh.c]
474 make channel_new() strdup the 'remote_name' (not the caller); ok theo
Damien Miller280ecfb2003-05-14 13:46:00 +1000475 - markus@cvs.openbsd.org 2003/05/12 16:55:37
476 [sshconnect2.c]
477 for pubkey authentication try the user keys in the following order:
478 1. agent keys that are found in the config file
479 2. other agent keys
480 3. keys that are only listed in the config file
481 this helps when an agent has many keys, where the server might
482 close the connection before the correct key is used. report & ok pb@
Damien Miller93506352003-05-14 13:46:33 +1000483 - markus@cvs.openbsd.org 2003/05/12 18:35:18
484 [ssh-keyscan.1]
485 typo: DSA keys are of type ssh-dss; Brian Poole
Damien Millerfb7508e2003-05-14 13:47:07 +1000486 - markus@cvs.openbsd.org 2003/05/14 00:52:59
487 [ssh2.h]
488 ranges for per auth method messages
489 - djm@cvs.openbsd.org 2003/05/14 01:00:44
490 [sftp.1]
491 emphasise the batchmode functionality and make reference to pubkey auth,
492 both of which are FAQs; ok markus@
Damien Miller3ab496b2003-05-14 13:47:37 +1000493 - markus@cvs.openbsd.org 2003/05/14 02:15:47
494 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
495 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
496 server interops with commercial client; ok jakob@ djm@
Damien Millerd6ead282003-05-14 19:30:38 +1000497 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
498 [sftp.1]
499 - better formatting in SYNOPSIS
500 - whitespace at EOL
501 ok djm@
Damien Millerbe64d432003-05-14 19:31:12 +1000502 - markus@cvs.openbsd.org 2003/05/14 08:57:49
503 [monitor.c]
504 http://bugzilla.mindrot.org/show_bug.cgi?id=560
505 Privsep child continues to run after monitor killed.
506 Pass monitor signals through to child; Darren Tucker
Damien Miller9c617692003-05-14 14:31:11 +1000507 - (djm) Make portable build with MIT krb5 (some issues remain)
Damien Miller4e448a32003-05-14 15:11:48 +1000508 - (djm) Add new UsePAM configuration directive to allow runtime control
509 over usage of PAM. This allows non-root use of sshd when built with
510 --with-pam
Damien Miller9d507da2003-05-14 15:31:12 +1000511 - (djm) Die screaming if start_pam() is called when UsePAM=no
Damien Miller4d995192003-05-14 19:23:56 +1000512 - (djm) Avoid KrbV leak for MIT Kerberos
Darren Tuckerabef5622003-05-14 21:48:51 +1000513 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
Damien Miller1ea71662003-05-14 22:33:58 +1000514 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
Damien Miller1a27a1e2003-05-14 10:27:09 +1000515
Damien Miller75d3b052003-05-12 18:15:49 +100051620030512
517 - (djm) Redhat spec: Don't install profile.d scripts when not
518 building with GNOME/GTK askpass (patch from bet@rahul.net)
519
Darren Tuckere8831092003-05-10 16:48:23 +100052020030510
521 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
522 "make install". Patch by roth@feep.net.
Darren Tuckerc437cda2003-05-10 17:05:46 +1000523 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
524 problem on Linux (fixes "could not set controlling tty" errors).
Damien Miller4f9f42a2003-05-10 19:28:02 +1000525 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
526 proper challenge-response module
Damien Miller0d8b7922003-05-10 23:42:12 +1000527 - (djm) 2-clause license on loginrec.c, with permission from
528 andre@ae-35.com
Darren Tuckere8831092003-05-10 16:48:23 +1000529
Darren Tucker70a08cd2003-05-04 10:41:20 +100053020030504
Darren Tuckerac279282003-05-04 11:36:25 +1000531 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
532 Patch from vinschen@redhat.com.
Darren Tucker70a08cd2003-05-04 10:41:20 +1000533
Darren Tucker04cc5382003-05-03 07:32:56 +100053420030503
535 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
536 by wendyp@cray.com.
537
Darren Tucker3c016542003-05-02 20:48:21 +100053820030502
539 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
540 privsep should now work.
Darren Tucker97363a82003-05-02 23:42:25 +1000541 - (dtucker) Move handling of bad password authentications into a platform
Darren Tuckerbd570d72003-05-02 23:50:09 +1000542 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
Darren Tucker3c016542003-05-02 20:48:21 +1000543
Damien Millereab4bae2003-04-29 23:22:40 +100054420030429
545 - (djm) Add back radix.o (used by AFS support), after it went missing from
546 Makefile many moons ago
547 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
548 - (djm) Fix blibpath specification for AIX/gcc
549 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
550
Ben Lindstrom0e7f4362003-04-28 23:30:43 +000055120030428
552 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
553 hacked code.
554
Ben Lindstrom93b6b772003-04-27 17:55:33 +000055520030427
556 - (bal) Bug #541: return; was dropped by mistake. Reported by
557 furrier@iglou.com
Ben Lindstrom796b9a52003-04-27 18:01:37 +0000558 - (bal) Since we don't support platforms lacking u_int_64. We may
559 as well clean out some of those evil #ifdefs
Ben Lindstrom683036e2003-04-27 18:41:30 +0000560 - (bal) auth1.c minor resync while looking at the code.
Ben Lindstromf50ad1f2003-04-27 18:44:31 +0000561 - (bal) auth2.c same changed as above.
Ben Lindstrom93b6b772003-04-27 17:55:33 +0000562
Damien Millerd186d742003-04-09 19:40:33 +100056320030409
564 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
565 from matth@eecs.berkeley.edu
Damien Millera92a5892003-04-09 19:41:25 +1000566 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
Damien Millera5539d22003-04-09 20:50:06 +1000567 - (djm) OpenBSD CVS Sync
568 - markus@cvs.openbsd.org 2003/04/02 09:48:07
569 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
570 [readconf.h serverloop.c sshconnect2.c]
571 reapply rekeying chage, tested by henning@, ok djm@
Damien Miller703ced52003-04-09 20:50:26 +1000572 - markus@cvs.openbsd.org 2003/04/02 14:36:26
573 [ssh-keysign.c]
574 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
Damien Miller3bed1912003-04-09 20:50:59 +1000575 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
576 [progressmeter.c]
577 $OpenBSD$
578 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
579 [progressmeter.c]
580 remove $OpenBSD$, as other *.c does not have it.
Damien Millerb1ecd9c2003-04-09 20:51:24 +1000581 - markus@cvs.openbsd.org 2003/04/07 08:29:57
582 [monitor_wrap.c]
583 typo: get correct counters; introduced during rekeying change.
Damien Millera0898b82003-04-09 21:05:52 +1000584 - millert@cvs.openbsd.org 2003/04/07 21:58:05
585 [progressmeter.c]
586 The UCB copyright here is incorrect. This code did not originate
587 at UCB, it was written by Luke Mewburn. Updated the copyright at
588 the author's request. markus@ OK
589 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
590 [*.c *.h]
591 rename log() into logit() to avoid name conflict. markus ok, from
592 netbsd
593 - (djm) XXX - Performed locally using:
594 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
Damien Millerbf2a0172003-04-09 21:07:14 +1000595 - hin@cvs.openbsd.org 2003/04/09 08:23:52
596 [servconf.c]
597 Don't include <krb.h> when compiling with Kerberos 5 support
Damien Millera0898b82003-04-09 21:05:52 +1000598 - (djm) Fix up missing include for packet.c
Damien Miller2a3f20e2003-04-09 21:12:00 +1000599 - (djm) Fix missed log => logit occurance (reference by function pointer)
Damien Millerd186d742003-04-09 19:40:33 +1000600
Ben Lindstromc8a49d72003-04-02 15:18:22 +000060120030402
602 - (bal) if IP_TOS is not found or broken don't try to compile in
603 packet_set_tos() function call. bug #527
604
Damien Miller495dca32003-04-01 21:42:14 +100060520030401
606 - (djm) OpenBSD CVS Sync
607 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
608 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
609 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
610 - killed whitespace
611 - new sentence new line
612 - .Bk for arguments
613 ok markus@
Damien Miller2dc074e2003-04-01 21:43:39 +1000614 - markus@cvs.openbsd.org 2003/04/01 10:10:23
615 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
616 [readconf.h serverloop.c sshconnect2.c]
617 rekeying bugfixes and automatic rekeying:
618 * both client and server rekey _automatically_
619 (a) after 2^31 packets, because after 2^32 packets
620 the sequence number for packets wraps
621 (b) after 2^(blocksize_in_bits/4) blocks
622 (see: draft-ietf-secsh-newmodes-00.txt)
623 (a) and (b) are _enabled_ by default, and only disabled for known
624 openssh versions, that don't support rekeying properly.
625 * client option 'RekeyLimit'
626 * do not reply to requests during rekeying
627 - markus@cvs.openbsd.org 2003/04/01 10:22:21
628 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
629 [readconf.h serverloop.c sshconnect2.c]
630 backout rekeying changes (for 3.6.1)
Damien Millerd3209042003-04-01 21:44:37 +1000631 - markus@cvs.openbsd.org 2003/04/01 10:31:26
632 [compat.c compat.h kex.c]
633 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
634 tested by ho@ and myself
Damien Miller13c1c7a2003-04-01 21:45:26 +1000635 - markus@cvs.openbsd.org 2003/04/01 10:56:46
636 [version.h]
637 3.6.1
Damien Millerb80e52a2003-04-01 21:46:53 +1000638 - (djm) Crank spec file versions
Damien Millera0ab6692003-04-01 21:47:16 +1000639 - (djm) Release 3.6.1p1
Damien Miller495dca32003-04-01 21:42:14 +1000640
Damien Millerb3207e82003-03-26 16:01:11 +110064120030326
642 - (djm) OpenBSD CVS Sync
643 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
644 [sftp-server.c]
645 one last fix to the tree: race fix broke stuff; pr 3169;
646 srp@srparish.net, help from djm
647
Damien Miller68d893d2003-03-25 09:07:52 +110064820030325
649 - (djm) Fix getpeerid support for 64 bit BE systems. From
650 Arnd Bergmann <arndb@de.ibm.com>
651
Damien Millerb062c292003-03-24 09:12:09 +110065220030324
653 - (djm) OpenBSD CVS Sync
654 - markus@cvs.openbsd.org 2003/03/23 19:02:00
655 [monitor.c]
656 unbreak rekeying for privsep; ok millert@
657 - Release 3.6p1
Damien Miller62b6b172003-03-24 13:35:58 +1100658 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
659 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
Damien Millerb062c292003-03-24 09:12:09 +1100660
Darren Tucker8661b562003-07-06 15:20:46 +1000661$Id: ChangeLog,v 1.2845 2003/07/06 05:20:46 dtucker Exp $