Damien Miller
b83df8d505
- espie@cvs.openbsd.org 2002/08/21 11:20:59
...
[sshd.8]
`RSA' updated to refer to `public key', where it matters.
okay markus@
2002-09-04 16:24:55 +10:00
Damien Miller
6cffb9a8cd
- markus@cvs.openbsd.org 2002/08/12 10:46:35
...
[ssh-agent.c]
make ssh-agent setgid, disallow ptrace.
(note: change not yet made in Makefile)
2002-09-04 16:20:26 +10:00
Ben Lindstrom
3962119c8a
- (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign
...
it to ULONG_MAX.
2002-08-21 02:54:11 +00:00
Ben Lindstrom
479b476af6
- stevesk@cvs.openbsd.org 2002/08/17 23:55:01
...
[ssh_config.5]
ordered list here
2002-08-20 19:04:51 +00:00
Ben Lindstrom
3541f18e10
- stevesk@cvs.openbsd.org 2002/08/17 23:07:14
...
[ssh.1]
ForwardAgent has defaulted to no for over 2 years; be more clear here.
2002-08-20 19:03:20 +00:00
Ben Lindstrom
bd9bf38b00
- stevesk@cvs.openbsd.org 2002/08/12 17:30:35
...
[ssh.1 sshd.8 sshd_config.5]
more PermitUserEnvironment; ok markus@
2002-08-20 18:54:20 +00:00
Ben Lindstrom
15b6120e63
- stevesk@cvs.openbsd.org 2002/08/09 17:41:12
...
[sshd_config.5]
proxy vs. fake display
2002-08-20 18:44:24 +00:00
Ben Lindstrom
1f8cf4f4fb
- stevesk@cvs.openbsd.org 2002/08/09 17:21:42
...
[sshd_config.5]
use Op for mdoc conformance; from esr@golux.thyrsus.com
ok aaron@
2002-08-20 18:43:27 +00:00
Ben Lindstrom
d4ee3497ca
- stevesk@cvs.openbsd.org 2002/08/08 23:54:52
...
[auth.c]
typo in comment
2002-08-20 18:42:13 +00:00
Ben Lindstrom
e143f61b6f
- aaron@cvs.openbsd.org 2002/08/08 13:50:23
...
[sshconnect1.c]
Use & to test if bits are set, not &&; markus@ ok.
2002-08-20 18:41:15 +00:00
Ben Lindstrom
0deb5d958a
- markus@cvs.openbsd.org 2002/08/02 22:20:30
...
[ssh-rsa.c]
replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser
for authentication; ok deraadt/djm
2002-08-20 18:40:03 +00:00
Ben Lindstrom
0e50d846b3
- markus@cvs.openbsd.org 2002/08/02 21:23:41
...
[ssh-rsa.c]
diff is u_int (2x); ok deraadt/provos
2002-08-20 18:39:14 +00:00
Ben Lindstrom
dc7adf2670
- marc@cvs.openbsd.org 2002/08/02 16:00:07
...
[ssh.1 sshd.8]
note that .ssh/environment is only read when
allowed (PermitUserEnvironment in sshd_config).
OK markus@
2002-08-20 18:38:02 +00:00
Ben Lindstrom
0a4f7542da
- millert@cvs.openbsd.org 2002/08/02 14:43:15
...
[monitor.c monitor_mm.c]
Change mm_zalloc() sanity checks to be more in line with what
we do in calloc() and add a check to monitor_mm.c.
OK provos@ and markus@
2002-08-20 18:36:25 +00:00
Tim Rice
d730b78071
[configure.ac] Display OpenSSL header/library version.
...
Patch by dtucker@zip.com.au
2002-08-13 18:52:10 -07:00
Ben Lindstrom
5d860f02ca
- markus@cvs.openbsd.org 2002/07/30 17:03:55
...
[auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5]
add PermitUserEnvironment (off by default!); from dot@dotat.at ;
ok provos, deraadt
2002-08-01 01:28:38 +00:00
Ben Lindstrom
4b99be899c
- markus@cvs.openbsd.org 2002/07/29 18:57:30
...
[sshconnect.c]
print file:line
2002-08-01 01:26:29 +00:00
Ben Lindstrom
8d631e8515
- mouring@cvs.openbsd.org 2002/07/25 01:16:59
...
[sftp.c]
FallBackToRsh does not exist anywhere else. Remove it from here.
OK deraadt.
2002-08-01 01:25:00 +00:00
Ben Lindstrom
3ed6640532
- markus@cvs.openbsd.org 2002/07/24 16:11:18
...
[hostfile.c hostfile.h sshconnect.c]
print out all known keys for a host if we get a unknown host key,
see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
the ssharp mitm tool attacks users in a similar way, so i'd like to
pointed out again:
A MITM attack is always possible if the ssh client prints:
The authenticity of host 'bla' can't be established.
(protocol version 2 with pubkey authentication allows you to detect
MITM attacks)
2002-08-01 01:21:56 +00:00
Ben Lindstrom
18d2b5d399
- (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de
2002-07-30 19:32:07 +00:00
Kevin Steves
4bdb547ff4
- (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
...
char arg.
2002-07-28 20:42:23 +00:00
Kevin Steves
e7dbdf7ff8
- (stevesk) [CREDITS] solar
2002-07-28 20:31:18 +00:00
Kevin Steves
6a998ebfa9
- (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar
2002-07-28 20:24:07 +00:00
Damien Miller
a7609f548f
- (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/
2002-07-25 14:40:22 +10:00
Damien Miller
6d8d78827e
- (djm) Remove some cruft from INSTALL
2002-07-25 14:36:24 +10:00
Ben Lindstrom
1fa330cf35
- stevesk@cvs.openbsd.org 2002/07/15 17:15:31
...
[uidswap.c]
little more debugging; ok markus@
2002-07-23 21:29:49 +00:00
Ben Lindstrom
41daec7538
- stevesk@cvs.openbsd.org 2002/07/23 16:03:10
...
[sshd.c]
utmp_len is unsigned; display error consistent with other options.
ok markus@
2002-07-23 21:15:13 +00:00
Ben Lindstrom
7cea16bad5
- stevesk@cvs.openbsd.org 2002/07/22 17:32:56
...
[monitor.c]
u_int here; ok provos@
2002-07-23 21:13:40 +00:00
Ben Lindstrom
b9051ec9a4
- markus@cvs.openbsd.org 2002/07/22 11:03:06
...
[session.c]
fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
2002-07-23 21:11:09 +00:00
Ben Lindstrom
3cc4450d54
- stevesk@cvs.openbsd.org 2002/07/21 18:34:43
...
[auth-options.h]
remove invalid comment
2002-07-23 21:07:45 +00:00
Ben Lindstrom
218a07dfb4
- stevesk@cvs.openbsd.org 2002/07/21 18:32:20
...
[auth-options.c]
unneeded includes
2002-07-23 21:06:45 +00:00
Ben Lindstrom
82ec9836b2
- (bal) sync ID w/ ssh-agent.c
2002-07-23 21:05:17 +00:00
Ben Lindstrom
ee8d52d008
- stevesk@cvs.openbsd.org 2002/07/19 17:42:40
...
[ssh.c]
display a warning from ssh when XAuthLocation does not exist or xauth
returned no authentication data. ok markus@
2002-07-23 21:03:02 +00:00
Ben Lindstrom
264ee307a8
- markus@cvs.openbsd.org 2002/07/19 15:43:33
...
[log.c log.h session.c sshd.c]
remove fatal cleanups after fork; based on discussions with and code
from solar.
2002-07-23 21:01:56 +00:00
Ben Lindstrom
6f52b3e399
- (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger.
2002-07-23 21:00:17 +00:00
Kevin Steves
6fa740ba84
- (stevesk) [auth-pam.c] typo in comment
2002-07-23 00:51:53 +00:00
Kevin Steves
38b050a0f5
- (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
...
freed by the caller; add free_pam_environment() and use it.
2002-07-23 00:44:07 +00:00
Ben Lindstrom
446d886fa5
- (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
...
into it's own header.
2002-07-23 00:03:33 +00:00
Ben Lindstrom
762104ede0
- (bal) [configure.ac] Missing ;; from cray patch.
2002-07-23 00:00:05 +00:00
Ben Lindstrom
232ccf7754
- (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
...
with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com .
2002-07-22 23:34:25 +00:00
Kevin Steves
066e1ab8a3
- (stevesk) [xmmap.c] missing prototype for fatal()
2002-07-22 16:20:29 +00:00
Ben Lindstrom
beb5f3304b
- (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk
2002-07-22 15:28:53 +00:00
Kevin Steves
287077eaf2
- (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h
2002-07-21 23:59:39 +00:00
Kevin Steves
21e04eb2be
- (stevesk) [auth-pam.h] unneeded include
2002-07-21 23:20:07 +00:00
Kevin Steves
7ba4970498
- (stevesk) [auth-pam.h] license
2002-07-21 23:16:00 +00:00
Kevin Steves
3429a1bf60
- (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
...
warning on pam_conv struct conversation function.
2002-07-21 22:49:47 +00:00
Kevin Steves
63007d42ee
- (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
...
PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
2002-07-21 17:57:01 +00:00
Kevin Steves
6cdecd0892
- (stevesk) [auth-pam.c] merge cosmetic changes from solar's
...
openssh-3.4p1-owl-password-changing.diff
2002-07-21 17:26:54 +00:00
Kevin Steves
3a8819102c
- (stevesk) [ssh-keygen.c] bug #231 : always init/seed_rng().
2002-07-20 19:05:40 +00:00
Tim Rice
f028f1e460
[configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au
2002-07-19 12:41:10 -07:00