mirror of git://anongit.mindrot.org/openssh.git
3480 lines
151 KiB
Plaintext
3480 lines
151 KiB
Plaintext
20101007
|
|
- (djm) OpenBSD CVS Sync
|
|
- matthew@cvs.openbsd.org 2010/09/24 13:33:00
|
|
[misc.c misc.h configure.ac openbsd-compat/openbsd-compat.h]
|
|
[openbsd-compat/timingsafe_bcmp.c]
|
|
Add timingsafe_bcmp(3) to libc, mention that it's already in the
|
|
kernel in kern(9), and remove it from OpenSSH.
|
|
ok deraadt@, djm@
|
|
NB. re-added under openbsd-compat/ for portable OpenSSH
|
|
- djm@cvs.openbsd.org 2010/09/25 09:30:16
|
|
[sftp.c configure.ac openbsd-compat/glob.c openbsd-compat/glob.h]
|
|
make use of new glob(3) GLOB_KEEPSTAT extension to save extra server
|
|
rountrips to fetch per-file stat(2) information.
|
|
NB. update openbsd-compat/ glob(3) implementation from OpenBSD libc to
|
|
match.
|
|
- djm@cvs.openbsd.org 2010/09/26 22:26:33
|
|
[sftp.c]
|
|
when performing an "ls" in columnated (short) mode, only call
|
|
ioctl(TIOCGWINSZ) once to get the window width instead of per-
|
|
filename
|
|
- djm@cvs.openbsd.org 2010/09/30 11:04:51
|
|
[servconf.c]
|
|
prevent free() of string in .rodata when overriding AuthorizedKeys in
|
|
a Match block; patch from rein AT basefarm.no
|
|
|
|
20100924
|
|
- (djm) OpenBSD CVS Sync
|
|
- naddy@cvs.openbsd.org 2010/09/10 15:19:29
|
|
[ssh-keygen.1]
|
|
* mention ECDSA in more places
|
|
* less repetition in FILES section
|
|
* SSHv1 keys are still encrypted with 3DES
|
|
help and ok jmc@
|
|
- djm@cvs.openbsd.org 2010/09/11 21:44:20
|
|
[ssh.1]
|
|
mention RFC 5656 for ECC stuff
|
|
- jmc@cvs.openbsd.org 2010/09/19 21:30:05
|
|
[sftp.1]
|
|
more wacky macro fixing;
|
|
- djm@cvs.openbsd.org 2010/09/20 04:41:47
|
|
[ssh.c]
|
|
install a SIGCHLD handler to reap expiried child process; ok markus@
|
|
- djm@cvs.openbsd.org 2010/09/20 04:50:53
|
|
[jpake.c schnorr.c]
|
|
check that received values are smaller than the group size in the
|
|
disabled and unfinished J-PAKE code.
|
|
avoids catastrophic security failure found by Sebastien Martini
|
|
- djm@cvs.openbsd.org 2010/09/20 04:54:07
|
|
[jpake.c]
|
|
missing #include
|
|
- djm@cvs.openbsd.org 2010/09/20 07:19:27
|
|
[mux.c]
|
|
"atomically" create the listening mux socket by binding it on a temorary
|
|
name and then linking it into position after listen() has succeeded.
|
|
this allows the mux clients to determine that the server socket is
|
|
either ready or stale without races. stale server sockets are now
|
|
automatically removed
|
|
ok deraadt
|
|
- djm@cvs.openbsd.org 2010/09/22 05:01:30
|
|
[kex.c kex.h kexecdh.c kexecdhc.c kexecdhs.c readconf.c readconf.h]
|
|
[servconf.c servconf.h ssh_config.5 sshconnect2.c sshd.c sshd_config.5]
|
|
add a KexAlgorithms knob to the client and server configuration to allow
|
|
selection of which key exchange methods are used by ssh(1) and sshd(8)
|
|
and their order of preference.
|
|
ok markus@
|
|
- jmc@cvs.openbsd.org 2010/09/22 08:30:08
|
|
[ssh.1 ssh_config.5]
|
|
ssh.1: add kexalgorithms to the -o list
|
|
ssh_config.5: format the kexalgorithms in a more consistent
|
|
(prettier!) way
|
|
ok djm
|
|
- djm@cvs.openbsd.org 2010/09/22 22:58:51
|
|
[atomicio.c atomicio.h misc.c misc.h scp.c sftp-client.c]
|
|
[sftp-client.h sftp.1 sftp.c]
|
|
add an option per-read/write callback to atomicio
|
|
|
|
factor out bandwidth limiting code from scp(1) into a generic bandwidth
|
|
limiter that can be attached using the atomicio callback mechanism
|
|
|
|
add a bandwidth limit option to sftp(1) using the above
|
|
"very nice" markus@
|
|
- jmc@cvs.openbsd.org 2010/09/23 13:34:43
|
|
[sftp.c]
|
|
add [-l limit] to usage();
|
|
- jmc@cvs.openbsd.org 2010/09/23 13:36:46
|
|
[scp.1 sftp.1]
|
|
add KexAlgorithms to the -o list;
|
|
|
|
20100910
|
|
- (dtucker) [openbsd-compat/port-linux.c] Check is_selinux_enabled for exact
|
|
return code since it can apparently return -1 under some conditions. From
|
|
openssh bugs werbittewas de, ok djm@
|
|
- OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/08/31 12:33:38
|
|
[ssh-add.c ssh-agent.c ssh-keygen.c ssh-keysign.c ssh.c sshd.c]
|
|
reintroduce commit from tedu@, which I pulled out for release
|
|
engineering:
|
|
OpenSSL_add_all_algorithms is the name of the function we have a
|
|
man page for, so use that. ok djm
|
|
- jmc@cvs.openbsd.org 2010/08/31 17:40:54
|
|
[ssh-agent.1]
|
|
fix some macro abuse;
|
|
- jmc@cvs.openbsd.org 2010/08/31 21:14:58
|
|
[ssh.1]
|
|
small text tweak to accommodate previous;
|
|
- naddy@cvs.openbsd.org 2010/09/01 15:21:35
|
|
[servconf.c]
|
|
pick up ECDSA host key by default; ok djm@
|
|
- markus@cvs.openbsd.org 2010/09/02 16:07:25
|
|
[ssh-keygen.c]
|
|
permit -b 256, 384 or 521 as key size for ECDSA; ok djm@
|
|
- markus@cvs.openbsd.org 2010/09/02 16:08:39
|
|
[ssh.c]
|
|
unbreak ControlPersist=yes for ControlMaster=yes; ok djm@
|
|
- naddy@cvs.openbsd.org 2010/09/02 17:21:50
|
|
[ssh-keygen.c]
|
|
Switch ECDSA default key size to 256 bits, which according to RFC5656
|
|
should still be better than our current RSA-2048 default.
|
|
ok djm@, markus@
|
|
- jmc@cvs.openbsd.org 2010/09/03 11:09:29
|
|
[scp.1]
|
|
add an EXIT STATUS section for /usr/bin;
|
|
- jmc@cvs.openbsd.org 2010/09/04 09:38:34
|
|
[ssh-add.1 ssh.1]
|
|
two more EXIT STATUS sections;
|
|
- naddy@cvs.openbsd.org 2010/09/06 17:10:19
|
|
[sshd_config]
|
|
add ssh_host_ecdsa_key to /etc; from Mattieu Baptiste
|
|
<mattieu.b@gmail.com>
|
|
ok deraadt@
|
|
- djm@cvs.openbsd.org 2010/09/08 03:54:36
|
|
[authfile.c]
|
|
typo
|
|
- deraadt@cvs.openbsd.org 2010/09/08 04:13:31
|
|
[compress.c]
|
|
work around name-space collisions some buggy compilers (looking at you
|
|
gcc, at least in earlier versions, but this does not forgive your current
|
|
transgressions) seen between zlib and openssl
|
|
ok djm
|
|
- djm@cvs.openbsd.org 2010/09/09 10:45:45
|
|
[kex.c kex.h kexecdh.c key.c key.h monitor.c ssh-ecdsa.c]
|
|
ECDH/ECDSA compliance fix: these methods vary the hash function they use
|
|
(SHA256/384/512) depending on the length of the curve in use. The previous
|
|
code incorrectly used SHA256 in all cases.
|
|
|
|
This fix will cause authentication failure when using 384 or 521-bit curve
|
|
keys if one peer hasn't been upgraded and the other has. (256-bit curve
|
|
keys work ok). In particular you may need to specify HostkeyAlgorithms
|
|
when connecting to a server that has not been upgraded from an upgraded
|
|
client.
|
|
|
|
ok naddy@
|
|
- (djm) [authfd.c authfile.c bufec.c buffer.h configure.ac kex.h kexecdh.c]
|
|
[kexecdhc.c kexecdhs.c key.c key.h myproposal.h packet.c readconf.c]
|
|
[ssh-agent.c ssh-ecdsa.c ssh-keygen.c ssh.c] Disable ECDH and ECDSA on
|
|
platforms that don't have the requisite OpenSSL support. ok dtucker@
|
|
- (dtucker) [kex.h key.c packet.h ssh-agent.c ssh.c] A few more ECC ifdefs
|
|
for missing headers and compiler warnings.
|
|
|
|
20100831
|
|
- OpenBSD CVS Sync
|
|
- jmc@cvs.openbsd.org 2010/08/08 19:36:30
|
|
[ssh-keysign.8 ssh.1 sshd.8]
|
|
use the same template for all FILES sections; i.e. -compact/.Pp where we
|
|
have multiple items, and .Pa for path names;
|
|
- tedu@cvs.openbsd.org 2010/08/12 23:34:39
|
|
[ssh-add.c ssh-agent.c ssh-keygen.c ssh-keysign.c ssh.c sshd.c]
|
|
OpenSSL_add_all_algorithms is the name of the function we have a man page
|
|
for, so use that. ok djm
|
|
- djm@cvs.openbsd.org 2010/08/16 04:06:06
|
|
[ssh-add.c ssh-agent.c ssh-keygen.c ssh-keysign.c ssh.c sshd.c]
|
|
backout previous temporarily; discussed with deraadt@
|
|
- djm@cvs.openbsd.org 2010/08/31 09:58:37
|
|
[auth-options.c auth1.c auth2.c bufaux.c buffer.h kex.c key.c packet.c]
|
|
[packet.h ssh-dss.c ssh-rsa.c]
|
|
Add buffer_get_cstring() and related functions that verify that the
|
|
string extracted from the buffer contains no embedded \0 characters*
|
|
This prevents random (possibly malicious) crap from being appended to
|
|
strings where it would not be noticed if the string is used with
|
|
a string(3) function.
|
|
|
|
Use the new API in a few sensitive places.
|
|
|
|
* actually, we allow a single one at the end of the string for now because
|
|
we don't know how many deployed implementations get this wrong, but don't
|
|
count on this to remain indefinitely.
|
|
- djm@cvs.openbsd.org 2010/08/31 11:54:45
|
|
[PROTOCOL PROTOCOL.agent PROTOCOL.certkeys auth2-jpake.c authfd.c]
|
|
[authfile.c buffer.h dns.c kex.c kex.h key.c key.h monitor.c]
|
|
[monitor_wrap.c myproposal.h packet.c packet.h pathnames.h readconf.c]
|
|
[ssh-add.1 ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh-keygen.c]
|
|
[ssh-keyscan.1 ssh-keyscan.c ssh-keysign.8 ssh.1 ssh.c ssh2.h]
|
|
[ssh_config.5 sshconnect.c sshconnect2.c sshd.8 sshd.c sshd_config.5]
|
|
[uuencode.c uuencode.h bufec.c kexecdh.c kexecdhc.c kexecdhs.c ssh-ecdsa.c]
|
|
Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and
|
|
host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer
|
|
better performance than plain DH and DSA at the same equivalent symmetric
|
|
key length, as well as much shorter keys.
|
|
|
|
Only the mandatory sections of RFC5656 are implemented, specifically the
|
|
three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and
|
|
ECDSA. Point compression (optional in RFC5656 is NOT implemented).
|
|
|
|
Certificate host and user keys using the new ECDSA key types are supported.
|
|
|
|
Note that this code has not been tested for interoperability and may be
|
|
subject to change.
|
|
|
|
feedback and ok markus@
|
|
- (djm) [Makefile.in] Add new ECC files
|
|
- (djm) [bufec.c kexecdh.c kexecdhc.c kexecdhs.c ssh-ecdsa.c] include
|
|
includes.h
|
|
|
|
20100827
|
|
- (dtucker) [contrib/redhat/sshd.init] Bug #1810: initlog is deprecated,
|
|
remove. Patch from martynas at venck us
|
|
|
|
20100823
|
|
- (djm) Release OpenSSH-5.6p1
|
|
|
|
20100816
|
|
- (dtucker) [configure.ac openbsd-compat/Makefile.in
|
|
openbsd-compat/openbsd-compat.h openbsd-compat/strptime.c] Add strptime to
|
|
the compat library which helps on platforms like old IRIX. Based on work
|
|
by djm, tested by Tom Christensen.
|
|
- OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/08/12 21:49:44
|
|
[ssh.c]
|
|
close any extra file descriptors inherited from parent at start and
|
|
reopen stdin/stdout to /dev/null when forking for ControlPersist.
|
|
|
|
prevents tools that fork and run a captive ssh for communication from
|
|
failing to exit when the ssh completes while they wait for these fds to
|
|
close. The inherited fds may persist arbitrarily long if a background
|
|
mux master has been started by ControlPersist. cvs and scp were effected
|
|
by this.
|
|
|
|
"please commit" markus@
|
|
- (djm) [regress/README.regress] typo
|
|
|
|
20100812
|
|
- (tim) [regress/login-timeout.sh regress/reconfigure.sh regress/reexec.sh
|
|
regress/test-exec.sh] Under certain conditions when testing with sudo
|
|
tests would fail because the pidfile could not be read by a regular user.
|
|
"cat: cannot open ...../regress/pidfile: Permission denied (error 13)"
|
|
Make sure cat is run by $SUDO. no objection from me. djm@
|
|
- (tim) [auth.c] add cast to quiet compiler. Change only affects SVR5 systems.
|
|
|
|
20100809
|
|
- (djm) bz#1561: don't bother setting IFF_UP on tun(4) device if it is
|
|
already set. Makes FreeBSD user openable tunnels useful; patch from
|
|
richard.burakowski+ossh AT mrburak.net, ok dtucker@
|
|
- (dtucker) bug #1530: strip trailing ":" from hostname in ssh-copy-id.
|
|
based in part on a patch from Colin Watson, ok djm@
|
|
|
|
20100809
|
|
- OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/08/08 16:26:42
|
|
[version.h]
|
|
crank to 5.6
|
|
- (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
|
|
[contrib/suse/openssh.spec] Crank version numbers
|
|
|
|
20100805
|
|
- OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/08/04 05:37:01
|
|
[ssh.1 ssh_config.5 sshd.8]
|
|
Remove mentions of weird "addr/port" alternate address format for IPv6
|
|
addresses combinations. It hasn't worked for ages and we have supported
|
|
the more commen "[addr]:port" format for a long time. ok jmc@ markus@
|
|
- djm@cvs.openbsd.org 2010/08/04 05:40:39
|
|
[PROTOCOL.certkeys ssh-keygen.c]
|
|
tighten the rules for certificate encoding by requiring that options
|
|
appear in lexical order and make our ssh-keygen comply. ok markus@
|
|
- djm@cvs.openbsd.org 2010/08/04 05:42:47
|
|
[auth.c auth2-hostbased.c authfile.c authfile.h ssh-keysign.8]
|
|
[ssh-keysign.c ssh.c]
|
|
enable certificates for hostbased authentication, from Iain Morgan;
|
|
"looks ok" markus@
|
|
- djm@cvs.openbsd.org 2010/08/04 05:49:22
|
|
[authfile.c]
|
|
commited the wrong version of the hostbased certificate diff; this
|
|
version replaces some strlc{py,at} verbosity with xasprintf() at
|
|
the request of markus@
|
|
- djm@cvs.openbsd.org 2010/08/04 06:07:11
|
|
[ssh-keygen.1 ssh-keygen.c]
|
|
Support CA keys in PKCS#11 tokens; feedback and ok markus@
|
|
- djm@cvs.openbsd.org 2010/08/04 06:08:40
|
|
[ssh-keysign.c]
|
|
clean for -Wuninitialized (Id sync only; portable had this change)
|
|
- djm@cvs.openbsd.org 2010/08/05 13:08:42
|
|
[channels.c]
|
|
Fix a trio of bugs in the local/remote window calculation for datagram
|
|
data channels (i.e. TunnelForward):
|
|
|
|
Calculate local_consumed correctly in channel_handle_wfd() by measuring
|
|
the delta to buffer_len(c->output) from when we start to when we finish.
|
|
The proximal problem here is that the output_filter we use in portable
|
|
modified the length of the dequeued datagram (to futz with the headers
|
|
for !OpenBSD).
|
|
|
|
In channel_output_poll(), don't enqueue datagrams that won't fit in the
|
|
peer's advertised packet size (highly unlikely to ever occur) or which
|
|
won't fit in the peer's remaining window (more likely).
|
|
|
|
In channel_input_data(), account for the 4-byte string header in
|
|
datagram packets that we accept from the peer and enqueue in c->output.
|
|
|
|
report, analysis and testing 2/3 cases from wierbows AT us.ibm.com;
|
|
"looks good" markus@
|
|
|
|
20100803
|
|
- (dtucker) [monitor.c] Bug #1795: Initialize the values to be returned from
|
|
PAM to sane values in case the PAM method doesn't write to them. Spotted by
|
|
Bitman Zhou, ok djm@.
|
|
- OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/07/16 04:45:30
|
|
[ssh-keygen.c]
|
|
avoid bogus compiler warning
|
|
- djm@cvs.openbsd.org 2010/07/16 14:07:35
|
|
[ssh-rsa.c]
|
|
more timing paranoia - compare all parts of the expected decrypted
|
|
data before returning. AFAIK not exploitable in the SSH protocol.
|
|
"groovy" deraadt@
|
|
- djm@cvs.openbsd.org 2010/07/19 03:16:33
|
|
[sftp-client.c]
|
|
bz#1797: fix swapped args in upload_dir_internal(), breaking recursive
|
|
upload depth checks and causing verbose printing of transfers to always
|
|
be turned on; patch from imorgan AT nas.nasa.gov
|
|
- djm@cvs.openbsd.org 2010/07/19 09:15:12
|
|
[clientloop.c readconf.c readconf.h ssh.c ssh_config.5]
|
|
add a "ControlPersist" option that automatically starts a background
|
|
ssh(1) multiplex master when connecting. This connection can stay alive
|
|
indefinitely, or can be set to automatically close after a user-specified
|
|
duration of inactivity. bz#1330 - patch by dwmw2 AT infradead.org, but
|
|
further hacked on by wmertens AT cisco.com, apb AT cequrux.com,
|
|
martin-mindrot-bugzilla AT earth.li and myself; "looks ok" markus@
|
|
- djm@cvs.openbsd.org 2010/07/21 02:10:58
|
|
[misc.c]
|
|
sync timingsafe_bcmp() with the one dempsky@ committed to sys/lib/libkern
|
|
- dtucker@cvs.openbsd.org 2010/07/23 08:49:25
|
|
[ssh.1]
|
|
Ciphers is documented in ssh_config(5) these days
|
|
|
|
20100819
|
|
- (dtucker) [contrib/ssh-copy-ud.1] Bug #1786: update ssh-copy-id.1 with more
|
|
details about its behaviour WRT existing directories. Patch from
|
|
asguthrie at gmail com, ok djm.
|
|
|
|
20100716
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/07/02 04:32:44
|
|
[misc.c]
|
|
unbreak strdelim() skipping past quoted strings, e.g.
|
|
AllowUsers "blah blah" blah
|
|
was broken; report and fix in bz#1757 from bitman.zhou AT centrify.com
|
|
ok dtucker;
|
|
- djm@cvs.openbsd.org 2010/07/12 22:38:52
|
|
[ssh.c]
|
|
Make ExitOnForwardFailure work with fork-after-authentication ("ssh -f")
|
|
for protocol 2. ok markus@
|
|
- djm@cvs.openbsd.org 2010/07/12 22:41:13
|
|
[ssh.c ssh_config.5]
|
|
expand %h to the hostname in ssh_config Hostname options. While this
|
|
sounds useless, it is actually handy for working with unqualified
|
|
hostnames:
|
|
|
|
Host *.*
|
|
Hostname %h
|
|
Host *
|
|
Hostname %h.example.org
|
|
|
|
"I like it" markus@
|
|
- djm@cvs.openbsd.org 2010/07/13 11:52:06
|
|
[auth-rsa.c channels.c jpake.c key.c misc.c misc.h monitor.c]
|
|
[packet.c ssh-rsa.c]
|
|
implement a timing_safe_cmp() function to compare memory without leaking
|
|
timing information by short-circuiting like memcmp() and use it for
|
|
some of the more sensitive comparisons (though nothing high-value was
|
|
readily attackable anyway); "looks ok" markus@
|
|
- djm@cvs.openbsd.org 2010/07/13 23:13:16
|
|
[auth-rsa.c channels.c jpake.c key.c misc.c misc.h monitor.c packet.c]
|
|
[ssh-rsa.c]
|
|
s/timing_safe_cmp/timingsafe_bcmp/g
|
|
- jmc@cvs.openbsd.org 2010/07/14 17:06:58
|
|
[ssh.1]
|
|
finally ssh synopsis looks nice again! this commit just removes a ton of
|
|
hacks we had in place to make it work with old groff;
|
|
- schwarze@cvs.openbsd.org 2010/07/15 21:20:38
|
|
[ssh-keygen.1]
|
|
repair incorrect block nesting, which screwed up indentation;
|
|
problem reported and fix OK by jmc@
|
|
|
|
20100714
|
|
- (tim) [contrib/redhat/openssh.spec] Bug 1796: Test for skip_x11_askpass
|
|
(line 77) should have been for no_x11_askpass.
|
|
|
|
20100702
|
|
- (djm) OpenBSD CVS Sync
|
|
- jmc@cvs.openbsd.org 2010/06/26 00:57:07
|
|
[ssh_config.5]
|
|
tweak previous;
|
|
- djm@cvs.openbsd.org 2010/06/26 23:04:04
|
|
[ssh.c]
|
|
oops, forgot to #include <canohost.h>; spotted and patch from chl@
|
|
- djm@cvs.openbsd.org 2010/06/29 23:15:30
|
|
[ssh-keygen.1 ssh-keygen.c]
|
|
allow import (-i) and export (-e) of PEM and PKCS#8 encoded keys;
|
|
bz#1749; ok markus@
|
|
- djm@cvs.openbsd.org 2010/06/29 23:16:46
|
|
[auth2-pubkey.c sshd_config.5]
|
|
allow key options (command="..." and friends) in AuthorizedPrincipals;
|
|
ok markus@
|
|
- jmc@cvs.openbsd.org 2010/06/30 07:24:25
|
|
[ssh-keygen.1]
|
|
tweak previous;
|
|
- jmc@cvs.openbsd.org 2010/06/30 07:26:03
|
|
[ssh-keygen.c]
|
|
sort usage();
|
|
- jmc@cvs.openbsd.org 2010/06/30 07:28:34
|
|
[sshd_config.5]
|
|
tweak previous;
|
|
- millert@cvs.openbsd.org 2010/07/01 13:06:59
|
|
[scp.c]
|
|
Fix a longstanding problem where if you suspend scp at the
|
|
password/passphrase prompt the terminal mode is not restored.
|
|
OK djm@
|
|
- phessler@cvs.openbsd.org 2010/06/27 19:19:56
|
|
[regress/Makefile]
|
|
fix how we run the tests so we can successfully use SUDO='sudo -E'
|
|
in our env
|
|
- djm@cvs.openbsd.org 2010/06/29 23:59:54
|
|
[cert-userkey.sh]
|
|
regress tests for key options in AuthorizedPrincipals
|
|
|
|
20100627
|
|
- (tim) [openbsd-compat/port-uw.c] Reorder includes. auth-options.h now needs
|
|
key.h.
|
|
|
|
20100626
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/05/21 05:00:36
|
|
[misc.c]
|
|
colon() returns char*, so s/return (0)/return NULL/
|
|
- markus@cvs.openbsd.org 2010/06/08 21:32:19
|
|
[ssh-pkcs11.c]
|
|
check length of value returned C_GetAttributValue for != 0
|
|
from mdrtbugzilla@codefive.co.uk; bugzilla #1773; ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/06/17 07:07:30
|
|
[mux.c]
|
|
Correct sizing of object to be allocated by calloc(), replacing
|
|
sizeof(state) with sizeof(*state). This worked by accident since
|
|
the struct contained a single int at present, but could have broken
|
|
in the future. patch from hyc AT symas.com
|
|
- djm@cvs.openbsd.org 2010/06/18 00:58:39
|
|
[sftp.c]
|
|
unbreak ls in working directories that contains globbing characters in
|
|
their pathnames. bz#1655 reported by vgiffin AT apple.com
|
|
- djm@cvs.openbsd.org 2010/06/18 03:16:03
|
|
[session.c]
|
|
Missing check for chroot_director == "none" (we already checked against
|
|
NULL); bz#1564 from Jan.Pechanec AT Sun.COM
|
|
- djm@cvs.openbsd.org 2010/06/18 04:43:08
|
|
[sftp-client.c]
|
|
fix memory leak in do_realpath() error path; bz#1771, patch from
|
|
anicka AT suse.cz
|
|
- djm@cvs.openbsd.org 2010/06/22 04:22:59
|
|
[servconf.c sshd_config.5]
|
|
expose some more sshd_config options inside Match blocks:
|
|
AuthorizedKeysFile AuthorizedPrincipalsFile
|
|
HostbasedUsesNameFromPacketOnly PermitTunnel
|
|
bz#1764; feedback from imorgan AT nas.nasa.gov; ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/06/22 04:32:06
|
|
[ssh-keygen.c]
|
|
standardise error messages when attempting to open private key
|
|
files to include "progname: filename: error reason"
|
|
bz#1783; ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/06/22 04:49:47
|
|
[auth.c]
|
|
queue auth debug messages for bad ownership or permissions on the user's
|
|
keyfiles. These messages will be sent after the user has successfully
|
|
authenticated (where our client will display them with LogLevel=debug).
|
|
bz#1554; ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/06/22 04:54:30
|
|
[ssh-keyscan.c]
|
|
replace verbose and overflow-prone Linebuf code with read_keyfile_line()
|
|
based on patch from joachim AT joachimschipper.nl; bz#1565; ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/06/22 04:59:12
|
|
[session.c]
|
|
include the user name on "subsystem request for ..." log messages;
|
|
bz#1571; ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/06/23 02:59:02
|
|
[ssh-keygen.c]
|
|
fix printing of extensions in v01 certificates that I broke in r1.190
|
|
- djm@cvs.openbsd.org 2010/06/25 07:14:46
|
|
[channels.c mux.c readconf.c readconf.h ssh.h]
|
|
bz#1327: remove hardcoded limit of 100 permitopen clauses and port
|
|
forwards per direction; ok markus@ stevesk@
|
|
- djm@cvs.openbsd.org 2010/06/25 07:20:04
|
|
[channels.c session.c]
|
|
bz#1750: fix requirement for /dev/null inside ChrootDirectory for
|
|
internal-sftp accidentally introduced in r1.253 by removing the code
|
|
that opens and dup /dev/null to stderr and modifying the channels code
|
|
to read stderr but discard it instead; ok markus@
|
|
- djm@cvs.openbsd.org 2010/06/25 08:46:17
|
|
[auth1.c auth2-none.c]
|
|
skip the initial check for access with an empty password when
|
|
PermitEmptyPasswords=no; bz#1638; ok markus@
|
|
- djm@cvs.openbsd.org 2010/06/25 23:10:30
|
|
[ssh.c]
|
|
log the hostname and address that we connected to at LogLevel=verbose
|
|
after authentication is successful to mitigate "phishing" attacks by
|
|
servers with trusted keys that accept authentication silently and
|
|
automatically before presenting fake password/passphrase prompts;
|
|
"nice!" markus@
|
|
- djm@cvs.openbsd.org 2010/06/25 23:10:30
|
|
[ssh.c]
|
|
log the hostname and address that we connected to at LogLevel=verbose
|
|
after authentication is successful to mitigate "phishing" attacks by
|
|
servers with trusted keys that accept authentication silently and
|
|
automatically before presenting fake password/passphrase prompts;
|
|
"nice!" markus@
|
|
|
|
20100622
|
|
- (djm) [loginrec.c] crank LINFO_NAMESIZE (username length) to 512
|
|
bz#1579; ok dtucker
|
|
|
|
20100618
|
|
- (djm) [contrib/ssh-copy-id] Update key file explicitly under ~
|
|
rather than assuming that $CWD == $HOME. bz#1500, patch from
|
|
timothy AT gelter.com
|
|
|
|
20100617
|
|
- (tim) [contrib/cygwin/README] Remove a reference to the obsolete
|
|
minires-devel package, and to add the reference to the libedit-devel
|
|
package since CYgwin now provides libedit. Patch from Corinna Vinschen.
|
|
|
|
20100521
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/05/07 11:31:26
|
|
[regress/Makefile regress/cert-userkey.sh]
|
|
regress tests for AuthorizedPrincipalsFile and "principals=" key option.
|
|
feedback and ok markus@
|
|
- djm@cvs.openbsd.org 2010/05/11 02:58:04
|
|
[auth-rsa.c]
|
|
don't accept certificates marked as "cert-authority" here; ok markus@
|
|
- djm@cvs.openbsd.org 2010/05/14 00:47:22
|
|
[ssh-add.c]
|
|
check that the certificate matches the corresponding private key before
|
|
grafting it on
|
|
- djm@cvs.openbsd.org 2010/05/14 23:29:23
|
|
[channels.c channels.h mux.c ssh.c]
|
|
Pause the mux channel while waiting for reply from aynch callbacks.
|
|
Prevents misordering of replies if new requests arrive while waiting.
|
|
|
|
Extend channel open confirm callback to allow signalling failure
|
|
conditions as well as success. Use this to 1) fix a memory leak, 2)
|
|
start using the above pause mechanism and 3) delay sending a success/
|
|
failure message on mux slave session open until we receive a reply from
|
|
the server.
|
|
|
|
motivated by and with feedback from markus@
|
|
- markus@cvs.openbsd.org 2010/05/16 12:55:51
|
|
[PROTOCOL.mux clientloop.h mux.c readconf.c readconf.h ssh.1 ssh.c]
|
|
mux support for remote forwarding with dynamic port allocation,
|
|
use with
|
|
LPORT=`ssh -S muxsocket -R0:localhost:25 -O forward somehost`
|
|
feedback and ok djm@
|
|
- djm@cvs.openbsd.org 2010/05/20 11:25:26
|
|
[auth2-pubkey.c]
|
|
fix logspam when key options (from="..." especially) deny non-matching
|
|
keys; reported by henning@ also bz#1765; ok markus@ dtucker@
|
|
- djm@cvs.openbsd.org 2010/05/20 23:46:02
|
|
[PROTOCOL.certkeys auth-options.c ssh-keygen.c]
|
|
Move the permit-* options to the non-critical "extensions" field for v01
|
|
certificates. The logic is that if another implementation fails to
|
|
implement them then the connection just loses features rather than fails
|
|
outright.
|
|
|
|
ok markus@
|
|
|
|
20100511
|
|
- (dtucker) [Makefile.in] Bug #1770: Link libopenbsd-compat twice to solve
|
|
circular dependency problem on old or odd platforms. From Tom Lane, ok
|
|
djm@.
|
|
- (djm) [openbsd-compat/openssl-compat.h] Fix build breakage on older
|
|
libcrypto by defining OPENSSL_[DR]SA_MAX_MODULUS_BITS if they aren't
|
|
already. ok dtucker@
|
|
|
|
20100510
|
|
- OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/04/23 01:47:41
|
|
[ssh-keygen.c]
|
|
bz#1740: display a more helpful error message when $HOME is
|
|
inaccessible while trying to create .ssh directory. Based on patch
|
|
from jchadima AT redhat.com; ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/04/23 22:27:38
|
|
[mux.c]
|
|
set "detach_close" flag when registering channel cleanup callbacks.
|
|
This causes the channel to close normally when its fds close and
|
|
hangs when terminating a mux slave using ~. bz#1758; ok markus@
|
|
- djm@cvs.openbsd.org 2010/04/23 22:42:05
|
|
[session.c]
|
|
set stderr to /dev/null for subsystems rather than just closing it.
|
|
avoids hangs if a subsystem or shell initialisation writes to stderr.
|
|
bz#1750; ok markus@
|
|
- djm@cvs.openbsd.org 2010/04/23 22:48:31
|
|
[ssh-keygen.c]
|
|
refuse to generate keys longer than OPENSSL_[RD]SA_MAX_MODULUS_BITS,
|
|
since we would refuse to use them anyway. bz#1516; ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/04/26 22:28:24
|
|
[sshconnect2.c]
|
|
bz#1502: authctxt.success is declared as an int, but passed by
|
|
reference to function that accepts sig_atomic_t*. Convert it to
|
|
the latter; ok markus@ dtucker@
|
|
- djm@cvs.openbsd.org 2010/05/01 02:50:50
|
|
[PROTOCOL.certkeys]
|
|
typo; jmeltzer@
|
|
- dtucker@cvs.openbsd.org 2010/05/05 04:22:09
|
|
[sftp.c]
|
|
restore mput and mget which got lost in the tab-completion changes.
|
|
found by Kenneth Whitaker, ok djm@
|
|
- djm@cvs.openbsd.org 2010/05/07 11:30:30
|
|
[auth-options.c auth-options.h auth.c auth.h auth2-pubkey.c]
|
|
[key.c servconf.c servconf.h sshd.8 sshd_config.5]
|
|
add some optional indirection to matching of principal names listed
|
|
in certificates. Currently, a certificate must include the a user's name
|
|
to be accepted for authentication. This change adds the ability to
|
|
specify a list of certificate principal names that are acceptable.
|
|
|
|
When authenticating using a CA trusted through ~/.ssh/authorized_keys,
|
|
this adds a new principals="name1[,name2,...]" key option.
|
|
|
|
For CAs listed through sshd_config's TrustedCAKeys option, a new config
|
|
option "AuthorizedPrincipalsFile" specifies a per-user file containing
|
|
the list of acceptable names.
|
|
|
|
If either option is absent, the current behaviour of requiring the
|
|
username to appear in principals continues to apply.
|
|
|
|
These options are useful for role accounts, disjoint account namespaces
|
|
and "user@realm"-style naming policies in certificates.
|
|
|
|
feedback and ok markus@
|
|
- jmc@cvs.openbsd.org 2010/05/07 12:49:17
|
|
[sshd_config.5]
|
|
tweak previous;
|
|
|
|
20100423
|
|
- (dtucker) [configure.ac] Bug #1756: Check for the existence of a lib64 dir
|
|
in the openssl install directory (some newer openssl versions do this on at
|
|
least some amd64 platforms).
|
|
|
|
20100418
|
|
- OpenBSD CVS Sync
|
|
- jmc@cvs.openbsd.org 2010/04/16 06:45:01
|
|
[ssh_config.5]
|
|
tweak previous; ok djm
|
|
- jmc@cvs.openbsd.org 2010/04/16 06:47:04
|
|
[ssh-keygen.1 ssh-keygen.c]
|
|
tweak previous; ok djm
|
|
- djm@cvs.openbsd.org 2010/04/16 21:14:27
|
|
[sshconnect.c]
|
|
oops, %r => remote username, not %u
|
|
- djm@cvs.openbsd.org 2010/04/16 01:58:45
|
|
[regress/cert-hostkey.sh regress/cert-userkey.sh]
|
|
regression tests for v01 certificate format
|
|
includes interop tests for v00 certs
|
|
- (dtucker) [contrib/aix/buildbff.sh] Fix creation of ssh_prng_cmds.default
|
|
file.
|
|
|
|
20100416
|
|
- (djm) Release openssh-5.5p1
|
|
- OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/03/26 03:13:17
|
|
[bufaux.c]
|
|
allow buffer_get_int_ret/buffer_get_int64_ret to take a NULL pointer
|
|
argument to allow skipping past values in a buffer
|
|
- jmc@cvs.openbsd.org 2010/03/26 06:54:36
|
|
[ssh.1]
|
|
tweak previous;
|
|
- jmc@cvs.openbsd.org 2010/03/27 14:26:55
|
|
[ssh_config.5]
|
|
tweak previous; ok dtucker
|
|
- djm@cvs.openbsd.org 2010/04/10 00:00:16
|
|
[ssh.c]
|
|
bz#1746 - suppress spurious tty warning when using -O and stdin
|
|
is not a tty; ok dtucker@ markus@
|
|
- djm@cvs.openbsd.org 2010/04/10 00:04:30
|
|
[sshconnect.c]
|
|
fix terminology: we didn't find a certificate in known_hosts, we found
|
|
a CA key
|
|
- djm@cvs.openbsd.org 2010/04/10 02:08:44
|
|
[clientloop.c]
|
|
bz#1698: kill channel when pty allocation requests fail. Fixed
|
|
stuck client if the server refuses pty allocation.
|
|
ok dtucker@ "think so" markus@
|
|
- djm@cvs.openbsd.org 2010/04/10 02:10:56
|
|
[sshconnect2.c]
|
|
show the key type that we are offering in debug(), helps distinguish
|
|
between certs and plain keys as the path to the private key is usually
|
|
the same.
|
|
- djm@cvs.openbsd.org 2010/04/10 05:48:16
|
|
[mux.c]
|
|
fix NULL dereference; from matthew.haub AT alumni.adelaide.edu.au
|
|
- djm@cvs.openbsd.org 2010/04/14 22:27:42
|
|
[ssh_config.5 sshconnect.c]
|
|
expand %r => remote username in ssh_config:ProxyCommand;
|
|
ok deraadt markus
|
|
- markus@cvs.openbsd.org 2010/04/15 20:32:55
|
|
[ssh-pkcs11.c]
|
|
retry lookup for private key if there's no matching key with CKA_SIGN
|
|
attribute enabled; this fixes fixes MuscleCard support (bugzilla #1736)
|
|
ok djm@
|
|
- djm@cvs.openbsd.org 2010/04/16 01:47:26
|
|
[PROTOCOL.certkeys auth-options.c auth-options.h auth-rsa.c]
|
|
[auth2-pubkey.c authfd.c key.c key.h myproposal.h ssh-add.c]
|
|
[ssh-agent.c ssh-dss.c ssh-keygen.1 ssh-keygen.c ssh-rsa.c]
|
|
[sshconnect.c sshconnect2.c sshd.c]
|
|
revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with the
|
|
following changes:
|
|
|
|
move the nonce field to the beginning of the certificate where it can
|
|
better protect against chosen-prefix attacks on the signature hash
|
|
|
|
Rename "constraints" field to "critical options"
|
|
|
|
Add a new non-critical "extensions" field
|
|
|
|
Add a serial number
|
|
|
|
The older format is still support for authentication and cert generation
|
|
(use "ssh-keygen -t v00 -s ca_key ..." to generate a v00 certificate)
|
|
|
|
ok markus@
|
|
|
|
20100410
|
|
- (dtucker) [configure.ac] Put the check for the existence of getaddrinfo
|
|
back so we disable the IPv6 tests if we don't have it.
|
|
|
|
20100409
|
|
- (dtucker) [contrib/cygwin/Makefile] Don't overwrite files with the wrong
|
|
ones. Based on a patch from Roumen Petrov.
|
|
- (dtucker) [configure.ac] Bug #1744: use pkg-config for libedit flags if we
|
|
have it and the path is not provided to --with-libedit. Based on a patch
|
|
from Iain Morgan.
|
|
- (dtucker) [configure.ac defines.h loginrec.c logintest.c] Bug #1732: enable
|
|
utmpx support on FreeBSD where possible. Patch from Ed Schouten, ok djm@
|
|
|
|
20100326
|
|
- (djm) [openbsd-compat/bsd-arc4random.c] Fix preprocessor detection
|
|
for arc4random_buf() and arc4random_uniform(); from Josh Gilkerson
|
|
- (dtucker) [configure.ac] Bug #1741: Add section for Haiku, patch originally
|
|
by Ingo Weinhold via Scott McCreary, ok djm@
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/03/25 23:38:28
|
|
[servconf.c]
|
|
from portable: getcwd(NULL, 0) doesn't work on all platforms, so
|
|
use a stack buffer; ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/03/26 00:26:58
|
|
[ssh.1]
|
|
mention that -S none disables connection sharing; from Colin Watson
|
|
- (djm) [session.c] Allow ChrootDirectory to work on SELinux platforms -
|
|
set up SELinux execution context before chroot() call. From Russell
|
|
Coker via Colin watson; bz#1726 ok dtucker@
|
|
- (djm) [channels.c] Check for EPFNOSUPPORT as a socket() errno; bz#1721
|
|
ok dtucker@
|
|
- (dtucker) Bug #1725: explicitly link libX11 into gnome-ssh-askpass2 using
|
|
pkg-config, patch from Colin Watson. Needed for newer linkers (ie gold).
|
|
- (djm) [contrib/ssh-copy-id] Don't blow up when the agent has no keys;
|
|
bz#1723 patch from Adeodato Simóvia Colin Watson; ok dtucker@
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- dtucker@cvs.openbsd.org 2010/03/26 01:06:13
|
|
[ssh_config.5]
|
|
Reformat default value of PreferredAuthentications entry (current
|
|
formatting implies ", " is acceptable as a separator, which it's not.
|
|
ok djm@
|
|
|
|
20100324
|
|
- (dtucker) [contrib/cygwin/ssh-host-config] Mount the Windows directory
|
|
containing the services file explicitely case-insensitive. This allows to
|
|
tweak the Windows services file reliably. Patch from vinschen at redhat.
|
|
|
|
20100321
|
|
- (djm) OpenBSD CVS Sync
|
|
- jmc@cvs.openbsd.org 2010/03/08 09:41:27
|
|
[ssh-keygen.1]
|
|
sort the list of constraints (to -O); ok djm
|
|
- jmc@cvs.openbsd.org 2010/03/10 07:40:35
|
|
[ssh-keygen.1]
|
|
typos; from Ross Richardson
|
|
closes prs 6334 and 6335
|
|
- djm@cvs.openbsd.org 2010/03/10 23:27:17
|
|
[auth2-pubkey.c]
|
|
correct certificate logging and make it more consistent between
|
|
authorized_keys and TrustedCAKeys; ok markus@
|
|
- djm@cvs.openbsd.org 2010/03/12 01:06:25
|
|
[servconf.c]
|
|
unbreak AuthorizedKeys option with a $HOME-relative path; reported by
|
|
vinschen AT redhat.com, ok dtucker@
|
|
- markus@cvs.openbsd.org 2010/03/12 11:37:40
|
|
[servconf.c]
|
|
do not prepend AuthorizedKeysFile with getcwd(), unbreaks relative paths
|
|
free() (not xfree()) the buffer returned by getcwd()
|
|
- djm@cvs.openbsd.org 2010/03/13 21:10:38
|
|
[clientloop.c]
|
|
protocol conformance fix: send language tag when disconnecting normally;
|
|
spotted by 1.41421 AT gmail.com, ok markus@ deraadt@
|
|
- djm@cvs.openbsd.org 2010/03/13 21:45:46
|
|
[ssh-keygen.1]
|
|
Certificates are named *-cert.pub, not *_cert.pub; committing a diff
|
|
from stevesk@ ok me
|
|
- jmc@cvs.openbsd.org 2010/03/13 23:38:13
|
|
[ssh-keygen.1]
|
|
fix a formatting error (args need quoted); noted by stevesk
|
|
- stevesk@cvs.openbsd.org 2010/03/15 19:40:02
|
|
[key.c key.h ssh-keygen.c]
|
|
also print certificate type (user or host) for ssh-keygen -L
|
|
ok djm kettenis
|
|
- stevesk@cvs.openbsd.org 2010/03/16 15:46:52
|
|
[auth-options.c]
|
|
spelling in error message. ok djm kettenis
|
|
- djm@cvs.openbsd.org 2010/03/16 16:36:49
|
|
[version.h]
|
|
crank version to openssh-5.5 since we have a few fixes since 5.4;
|
|
requested deraadt@ kettenis@
|
|
- (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
|
|
[contrib/suse/openssh.spec] Crank version numbers
|
|
|
|
20100314
|
|
- (djm) [ssh-pkcs11-helper.c] Move #ifdef to after #defines to fix
|
|
compilation failure when !HAVE_DLOPEN. Reported by felix-mindrot
|
|
AT fefe.de
|
|
- (djm) [Makefile.in] Respecify -lssh after -lopenbsd-compat for
|
|
ssh-pkcs11-helper to repair static builds (we do the same for
|
|
ssh-keyscan). Reported by felix-mindrot AT fefe.de
|
|
|
|
20100312
|
|
- (tim) [Makefile.in] Now that scard is gone, no need to make $(datadir)
|
|
- (tim) [Makefile.in] Add missing $(EXEEXT) to install targets.
|
|
Patch from Corinna Vinschen.
|
|
- (tim) [contrib/cygwin/Makefile] Fix list of documentation files to install
|
|
on a Cygwin installation. Patch from Corinna Vinschen.
|
|
|
|
20100311
|
|
- (tim) [contrib/suse/openssh.spec] crank version number here too.
|
|
report by imorgan AT nas.nasa.gov
|
|
|
|
20100309
|
|
- (dtucker) [configure.ac] Use a proper AC_CHECK_DECL for BROKEN_GETADDRINFO
|
|
so setting it in CFLAGS correctly skips IPv6 tests.
|
|
|
|
20100308
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/03/07 22:16:01
|
|
[ssh-keygen.c]
|
|
make internal strptime string match strftime format;
|
|
suggested by vinschen AT redhat.com and markus@
|
|
- djm@cvs.openbsd.org 2010/03/08 00:28:55
|
|
[ssh-keygen.1]
|
|
document permit-agent-forwarding certificate constraint; patch from
|
|
stevesk@
|
|
- djm@cvs.openbsd.org 2010/03/07 22:01:32
|
|
[version.h]
|
|
openssh-5.4
|
|
- (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
|
|
crank version numbers
|
|
- (djm) Release OpenSSH-5.4p1
|
|
|
|
20100307
|
|
- (dtucker) [auth.c] Bug #1710: call setauthdb on AIX before getpwuid so that
|
|
it gets the passwd struct from the LAM that knows about the user which is
|
|
not necessarily the default. Patch from Alexandre Letourneau.
|
|
- (dtucker) [session.c] Bug #1567: move setpcred call to before chroot and
|
|
do not set real uid, since that's needed for the chroot, and will be set
|
|
by permanently_set_uid.
|
|
- (dtucker) [session.c] Also initialize creds to NULL for handing to
|
|
setpcred.
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- dtucker@cvs.openbsd.org 2010/03/07 11:57:13
|
|
[auth-rhosts.c monitor.c monitor_wrap.c session.c auth-options.c sshd.c]
|
|
Hold authentication debug messages until after successful authentication.
|
|
Fixes an info leak of environment variables specified in authorized_keys,
|
|
reported by Jacob Appelbaum. ok djm@
|
|
|
|
20100305
|
|
- OpenBSD CVS Sync
|
|
- jmc@cvs.openbsd.org 2010/03/04 12:51:25
|
|
[ssh.1 sshd_config.5]
|
|
tweak previous;
|
|
- djm@cvs.openbsd.org 2010/03/04 20:35:08
|
|
[ssh-keygen.1 ssh-keygen.c]
|
|
Add a -L flag to print the contents of a certificate; ok markus@
|
|
- jmc@cvs.openbsd.org 2010/03/04 22:52:40
|
|
[ssh-keygen.1]
|
|
fix Bk/Ek;
|
|
- djm@cvs.openbsd.org 2010/03/04 23:17:25
|
|
[sshd_config.5]
|
|
missing word; spotted by jmc@
|
|
- djm@cvs.openbsd.org 2010/03/04 23:19:29
|
|
[ssh.1 sshd.8]
|
|
move section on CA and revoked keys from ssh.1 to sshd.8's known hosts
|
|
format section and rework it a bit; requested by jmc@
|
|
- djm@cvs.openbsd.org 2010/03/04 23:27:25
|
|
[auth-options.c ssh-keygen.c]
|
|
"force-command" is not spelled "forced-command"; spotted by
|
|
imorgan AT nas.nasa.gov
|
|
- djm@cvs.openbsd.org 2010/03/05 02:58:11
|
|
[auth.c]
|
|
make the warning for a revoked key louder and more noticable
|
|
- jmc@cvs.openbsd.org 2010/03/05 06:50:35
|
|
[ssh.1 sshd.8]
|
|
tweak previous;
|
|
- jmc@cvs.openbsd.org 2010/03/05 08:31:20
|
|
[ssh.1]
|
|
document certificate authentication; help/ok djm
|
|
- djm@cvs.openbsd.org 2010/03/05 10:28:21
|
|
[ssh-add.1 ssh.1 ssh_config.5]
|
|
mention loading of certificate files from [private]-cert.pub when
|
|
they are present; feedback and ok jmc@
|
|
- (tim) [ssh-pkcs11.c] Fix "non-constant initializer" errors in older
|
|
compilers. OK djm@
|
|
- (djm) [ssh-rand-helper.c] declare optind, avoiding compilation failure
|
|
on some platforms
|
|
- (djm) [configure.ac] set -fno-strict-aliasing for gcc4; ok dtucker@
|
|
|
|
20100304
|
|
- (djm) [ssh-keygen.c] Use correct local variable, instead of
|
|
maybe-undefined global "optarg"
|
|
- (djm) [contrib/redhat/openssh.spec] Replace obsolete BuildPreReq
|
|
on XFree86-devel with neutral /usr/include/X11/Xlib.h;
|
|
imorgan AT nas.nasa.gov in bz#1731
|
|
- (djm) [.cvsignore] Ignore ssh-pkcs11-helper
|
|
- (djm) [regress/Makefile] Cleanup sshd_proxy_orig
|
|
- OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/03/03 01:44:36
|
|
[auth-options.c key.c]
|
|
reject strings with embedded ASCII nul chars in certificate key IDs,
|
|
principal names and constraints
|
|
- djm@cvs.openbsd.org 2010/03/03 22:49:50
|
|
[sshd.8]
|
|
the authorized_keys option for CA keys is "cert-authority", not
|
|
"from=cert-authority". spotted by imorgan AT nas.nasa.gov
|
|
- djm@cvs.openbsd.org 2010/03/03 22:50:40
|
|
[PROTOCOL.certkeys]
|
|
s/similar same/similar/; from imorgan AT nas.nasa.gov
|
|
- djm@cvs.openbsd.org 2010/03/04 01:44:57
|
|
[key.c]
|
|
use buffer_get_string_ptr_ret() where we are checking the return
|
|
value explicitly instead of the fatal()-causing buffer_get_string_ptr()
|
|
- djm@cvs.openbsd.org 2010/03/04 10:36:03
|
|
[auth-rh-rsa.c auth-rsa.c auth.c auth.h auth2-hostbased.c auth2-pubkey.c]
|
|
[authfile.c authfile.h hostfile.c hostfile.h servconf.c servconf.h]
|
|
[ssh-keygen.c ssh.1 sshconnect.c sshd_config.5]
|
|
Add a TrustedUserCAKeys option to sshd_config to specify CA keys that
|
|
are trusted to authenticate users (in addition than doing it per-user
|
|
in authorized_keys).
|
|
|
|
Add a RevokedKeys option to sshd_config and a @revoked marker to
|
|
known_hosts to allow keys to me revoked and banned for user or host
|
|
authentication.
|
|
|
|
feedback and ok markus@
|
|
- djm@cvs.openbsd.org 2010/03/03 00:47:23
|
|
[regress/cert-hostkey.sh regress/cert-userkey.sh]
|
|
add an extra test to ensure that authentication with the wrong
|
|
certificate fails as it should (and it does)
|
|
- djm@cvs.openbsd.org 2010/03/04 10:38:23
|
|
[regress/cert-hostkey.sh regress/cert-userkey.sh]
|
|
additional regression tests for revoked keys and TrustedUserCAKeys
|
|
|
|
20100303
|
|
- (djm) [PROTOCOL.certkeys] Add RCS Ident
|
|
- OpenBSD CVS Sync
|
|
- jmc@cvs.openbsd.org 2010/02/26 22:09:28
|
|
[ssh-keygen.1 ssh.1 sshd.8]
|
|
tweak previous;
|
|
- otto@cvs.openbsd.org 2010/03/01 11:07:06
|
|
[ssh-add.c]
|
|
zap what seems to be a left-over debug message; ok markus@
|
|
- djm@cvs.openbsd.org 2010/03/02 23:20:57
|
|
[ssh-keygen.c]
|
|
POSIX strptime is stricter than OpenBSD's so do a little dance to
|
|
appease it.
|
|
- (djm) [regress/cert-userkey.sh] s/echo -n/echon/ here too
|
|
|
|
20100302
|
|
- (tim) [config.guess config.sub] Bug 1722: Update to latest versions from
|
|
http://git.savannah.gnu.org/gitweb/ (2009-12-30 and 2010-01-22
|
|
respectively).
|
|
|
|
20100301
|
|
- (dtucker) [regress/{cert-hostkey,cfgmatch,cipher-speed}.sh} Replace
|
|
"echo -n" with "echon" for portability.
|
|
- (dtucker) [openbsd-compat/port-linux.c] Make failure to write to the OOM
|
|
adjust log at verbose only, since according to cjwatson in bug #1470
|
|
some virtualization platforms don't allow writes.
|
|
|
|
20100228
|
|
- (djm) [auth.c] On Cygwin, refuse usernames that have differences in
|
|
case from that matched in the system password database. On this
|
|
platform, passwords are stored case-insensitively, but sshd requires
|
|
exact case matching for Match blocks in sshd_config(5). Based on
|
|
a patch from vinschen AT redhat.com.
|
|
- (tim) [ssh-pkcs11-helper.c] Move declarations before calling functions
|
|
to make older compilers (gcc 2.95) happy.
|
|
|
|
20100227
|
|
- (djm) [ssh-pkcs11-helper.c ] Ensure RNG is initialised and seeded
|
|
- (djm) [openbsd-compat/bsd-cygwin_util.c] Reduce the set of environment
|
|
variables copied into sshd child processes. From vinschen AT redhat.com
|
|
|
|
20100226
|
|
- OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/02/26 20:29:54
|
|
[PROTOCOL PROTOCOL.agent PROTOCOL.certkeys addrmatch.c auth-options.c]
|
|
[auth-options.h auth.h auth2-pubkey.c authfd.c dns.c dns.h hostfile.c]
|
|
[hostfile.h kex.h kexdhs.c kexgexs.c key.c key.h match.h monitor.c]
|
|
[myproposal.h servconf.c servconf.h ssh-add.c ssh-agent.c ssh-dss.c]
|
|
[ssh-keygen.1 ssh-keygen.c ssh-rsa.c ssh.1 ssh.c ssh2.h sshconnect.c]
|
|
[sshconnect2.c sshd.8 sshd.c sshd_config.5]
|
|
Add support for certificate key types for users and hosts.
|
|
|
|
OpenSSH certificate key types are not X.509 certificates, but a much
|
|
simpler format that encodes a public key, identity information and
|
|
some validity constraints and signs it with a CA key. CA keys are
|
|
regular SSH keys. This certificate style avoids the attack surface
|
|
of X.509 certificates and is very easy to deploy.
|
|
|
|
Certified host keys allow automatic acceptance of new host keys
|
|
when a CA certificate is marked as trusted in ~/.ssh/known_hosts.
|
|
see VERIFYING HOST KEYS in ssh(1) for details.
|
|
|
|
Certified user keys allow authentication of users when the signing
|
|
CA key is marked as trusted in authorized_keys. See "AUTHORIZED_KEYS
|
|
FILE FORMAT" in sshd(8) for details.
|
|
|
|
Certificates are minted using ssh-keygen(1), documentation is in
|
|
the "CERTIFICATES" section of that manpage.
|
|
|
|
Documentation on the format of certificates is in the file
|
|
PROTOCOL.certkeys
|
|
|
|
feedback and ok markus@
|
|
- djm@cvs.openbsd.org 2010/02/26 20:33:21
|
|
[Makefile regress/cert-hostkey.sh regress/cert-userkey.sh]
|
|
regression tests for certified keys
|
|
|
|
20100224
|
|
- (djm) [pkcs11.h ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c]
|
|
[ssh-pkcs11.h] Add $OpenBSD$ RCS idents so we can sync portable
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/02/11 20:37:47
|
|
[pathnames.h]
|
|
correct comment
|
|
- dtucker@cvs.openbsd.org 2009/11/09 04:20:04
|
|
[regress/Makefile]
|
|
add regression test for ssh-keygen pubkey conversions
|
|
- dtucker@cvs.openbsd.org 2010/01/11 02:53:44
|
|
[regress/forwarding.sh]
|
|
regress test for stdio forwarding
|
|
- djm@cvs.openbsd.org 2010/02/09 04:57:36
|
|
[regress/addrmatch.sh]
|
|
clean up droppings
|
|
- djm@cvs.openbsd.org 2010/02/09 06:29:02
|
|
[regress/Makefile]
|
|
turn on all the malloc(3) checking options when running regression
|
|
tests. this has caught a few bugs for me in the past; ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/02/24 06:21:56
|
|
[regress/test-exec.sh]
|
|
wait for sshd to fully stop in cleanup() function; avoids races in tests
|
|
that do multiple start_sshd/cleanup cycles; "I hate pidfiles" deraadt@
|
|
- markus@cvs.openbsd.org 2010/02/08 10:52:47
|
|
[regress/agent-pkcs11.sh]
|
|
test for PKCS#11 support (currently disabled)
|
|
- (djm) [Makefile.in ssh-pkcs11-helper.8] Add manpage for PKCS#11 helper
|
|
- (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
|
|
[contrib/suse/openssh.spec] Add PKCS#11 helper binary and manpage
|
|
|
|
20100212
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/02/02 22:49:34
|
|
[bufaux.c]
|
|
make buffer_get_string_ret() really non-fatal in all cases (it was
|
|
using buffer_get_int(), which could fatal() on buffer empty);
|
|
ok markus dtucker
|
|
- markus@cvs.openbsd.org 2010/02/08 10:50:20
|
|
[pathnames.h readconf.c readconf.h scp.1 sftp.1 ssh-add.1 ssh-add.c]
|
|
[ssh-agent.c ssh-keygen.1 ssh-keygen.c ssh.1 ssh.c ssh_config.5]
|
|
replace our obsolete smartcard code with PKCS#11.
|
|
ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-11/v2-20/pkcs-11v2-20.pdf
|
|
ssh(1) and ssh-keygen(1) use dlopen(3) directly to talk to a PKCS#11
|
|
provider (shared library) while ssh-agent(1) delegates PKCS#11 to
|
|
a forked a ssh-pkcs11-helper process.
|
|
PKCS#11 is currently a compile time option.
|
|
feedback and ok djm@; inspired by patches from Alon Bar-Lev
|
|
- jmc@cvs.openbsd.org 2010/02/08 22:03:05
|
|
[ssh-add.1 ssh-keygen.1 ssh.1 ssh.c]
|
|
tweak previous; ok markus
|
|
- djm@cvs.openbsd.org 2010/02/09 00:50:36
|
|
[ssh-agent.c]
|
|
fallout from PKCS#11: unbreak -D
|
|
- djm@cvs.openbsd.org 2010/02/09 00:50:59
|
|
[ssh-keygen.c]
|
|
fix -Wall
|
|
- djm@cvs.openbsd.org 2010/02/09 03:56:28
|
|
[buffer.c buffer.h]
|
|
constify the arguments to buffer_len, buffer_ptr and buffer_dump
|
|
- djm@cvs.openbsd.org 2010/02/09 06:18:46
|
|
[auth.c]
|
|
unbreak ChrootDirectory+internal-sftp by skipping check for executable
|
|
shell when chrooting; reported by danh AT wzrd.com; ok dtucker@
|
|
- markus@cvs.openbsd.org 2010/02/10 23:20:38
|
|
[ssh-add.1 ssh-keygen.1 ssh.1 ssh_config.5]
|
|
pkcs#11 is no longer optional; improve wording; ok jmc@
|
|
- jmc@cvs.openbsd.org 2010/02/11 13:23:29
|
|
[ssh.1]
|
|
libarary -> library;
|
|
- (djm) [INSTALL Makefile.in README.smartcard configure.ac scard-opensc.c]
|
|
[scard.c scard.h pkcs11.h scard/Makefile.in scard/Ssh.bin.uu scard/Ssh.java]
|
|
Remove obsolete smartcard support
|
|
- (djm) [ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c]
|
|
Make it compile on OSX
|
|
- (djm) [ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c]
|
|
Use ssh_get_progname to fill __progname
|
|
- (djm) [configure.ac] Enable PKCS#11 support only when we find a working
|
|
dlopen()
|
|
|
|
20100210
|
|
- (djm) add -lselinux to LIBS before calling AC_CHECK_FUNCS for
|
|
getseuserbyname; patch from calebcase AT gmail.com via
|
|
cjwatson AT debian.org
|
|
|
|
20100202
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/01/30 21:08:33
|
|
[sshd.8]
|
|
debug output goes to stderr, not "the system log"; ok markus dtucker
|
|
- djm@cvs.openbsd.org 2010/01/30 21:12:08
|
|
[channels.c]
|
|
fake local addr:port when stdio fowarding as some servers (Tectia at
|
|
least) validate that they are well-formed;
|
|
reported by imorgan AT nas.nasa.gov
|
|
ok dtucker
|
|
|
|
20100130
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/01/28 00:21:18
|
|
[clientloop.c]
|
|
downgrade an error() to a debug() - this particular case can be hit in
|
|
normal operation for certain sequences of mux slave vs session closure
|
|
and is harmless
|
|
- djm@cvs.openbsd.org 2010/01/29 00:20:41
|
|
[sshd.c]
|
|
set FD_CLOEXEC on sock_in/sock_out; bz#1706 from jchadima AT redhat.com
|
|
ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/01/29 20:16:17
|
|
[mux.c]
|
|
kill correct channel (was killing already-dead mux channel, not
|
|
its session channel)
|
|
- djm@cvs.openbsd.org 2010/01/30 02:54:53
|
|
[mux.c]
|
|
don't mark channel as read failed if it is already closing; suppresses
|
|
harmless error messages when connecting to SSH.COM Tectia server
|
|
report by imorgan AT nas.nasa.gov
|
|
|
|
20100129
|
|
- (dtucker) [openbsd-compat/openssl-compat.c] Bug #1707: Call OPENSSL_config()
|
|
after registering the hardware engines, which causes the openssl.cnf file to
|
|
be processed. See OpenSSL's man page for OPENSSL_config(3) for details.
|
|
Patch from Solomon Peachy, ok djm@.
|
|
|
|
20100128
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/01/26 02:15:20
|
|
[mux.c]
|
|
-Wuninitialized and remove a // comment; from portable
|
|
(Id sync only)
|
|
- djm@cvs.openbsd.org 2010/01/27 13:26:17
|
|
[mux.c]
|
|
fix bug introduced in mux rewrite:
|
|
|
|
In a mux master, when a socket to a mux slave closes before its server
|
|
session (as may occur when the slave has been signalled), gracefully
|
|
close the server session rather than deleting its channel immediately.
|
|
A server may have more messages on that channel to send (e.g. an exit
|
|
message) that will fatal() the client if they are sent to a channel that
|
|
has been prematurely deleted.
|
|
|
|
spotted by imorgan AT nas.nasa.gov
|
|
- djm@cvs.openbsd.org 2010/01/27 19:21:39
|
|
[sftp.c]
|
|
add missing "p" flag to getopt optstring;
|
|
bz#1704 from imorgan AT nas.nasa.gov
|
|
|
|
20100126
|
|
- (djm) OpenBSD CVS Sync
|
|
- tedu@cvs.openbsd.org 2010/01/17 21:49:09
|
|
[ssh-agent.1]
|
|
Correct and clarify ssh-add's password asking behavior.
|
|
Improved text dtucker and ok jmc
|
|
- dtucker@cvs.openbsd.org 2010/01/18 01:50:27
|
|
[roaming_client.c]
|
|
s/long long unsigned/unsigned long long/, from tim via portable
|
|
(Id sync only, change already in portable)
|
|
- djm@cvs.openbsd.org 2010/01/26 01:28:35
|
|
[channels.c channels.h clientloop.c clientloop.h mux.c nchan.c ssh.c]
|
|
rewrite ssh(1) multiplexing code to a more sensible protocol.
|
|
|
|
The new multiplexing code uses channels for the listener and
|
|
accepted control sockets to make the mux master non-blocking, so
|
|
no stalls when processing messages from a slave.
|
|
|
|
avoid use of fatal() in mux master protocol parsing so an errant slave
|
|
process cannot take down a running master.
|
|
|
|
implement requesting of port-forwards over multiplexed sessions. Any
|
|
port forwards requested by the slave are added to those the master has
|
|
established.
|
|
|
|
add support for stdio forwarding ("ssh -W host:port ...") in mux slaves.
|
|
|
|
document master/slave mux protocol so that other tools can use it to
|
|
control a running ssh(1). Note: there are no guarantees that this
|
|
protocol won't be incompatibly changed (though it is versioned).
|
|
|
|
feedback Salvador Fandino, dtucker@
|
|
channel changes ok markus@
|
|
|
|
20100122
|
|
- (tim) [configure.ac] Due to constraints in Windows Sockets in terms of
|
|
socket inheritance, reduce the default SO_RCVBUF/SO_SNDBUF buffer size
|
|
in Cygwin to 65535. Patch from Corinna Vinschen.
|
|
|
|
20100117
|
|
- (tim) [configure.ac] OpenServer 5 needs BROKEN_GETADDRINFO too.
|
|
- (tim) [configure.ac] On SVR5 systems, use the C99-conforming functions
|
|
snprintf() and vsnprintf() named _xsnprintf() and _xvsnprintf().
|
|
|
|
20100116
|
|
- (dtucker) [openbsd-compat/pwcache.c] Pull in includes.h and thus defines.h
|
|
so we correctly detect whether or not we have a native user_from_uid.
|
|
- (dtucker) [openbsd-compat/openbsd-compat.h] Prototypes for user_from_uid
|
|
and group_from_gid.
|
|
- (dtucker) [openbsd-compat/openbsd-compat.h] Fix prototypes, spotted by
|
|
Tim.
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- markus@cvs.openbsd.org 2010/01/15 09:24:23
|
|
[sftp-common.c]
|
|
unused
|
|
- (dtucker) [openbsd-compat/pwcache.c] Shrink ifdef area to prevent unused
|
|
variable warnings.
|
|
- (dtucker) [openbsd-compat/openbsd-compat.h] Typo.
|
|
- (tim) [regress/portnum.sh] Shell portability fix.
|
|
- (tim) [configure.ac] Define BROKEN_GETADDRINFO on SVR5 systems. The native
|
|
getaddrinfo() is too old and limited for addr_pton() in addrmatch.c.
|
|
- (tim) [roaming_client.c] Use of <sys/queue.h> is not really portable so we
|
|
use "openbsd-compat/sys-queue.h". s/long long unsigned/unsigned long long/
|
|
to keep USL compilers happy.
|
|
|
|
20100115
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- jmc@cvs.openbsd.org 2010/01/13 12:48:34
|
|
[sftp.1 sftp.c]
|
|
sftp.1: put ls -h in the right place
|
|
sftp.c: as above, plus add -p to get/put, and shorten their arg names
|
|
to keep the help usage nicely aligned
|
|
ok djm
|
|
- djm@cvs.openbsd.org 2010/01/13 23:47:26
|
|
[auth.c]
|
|
when using ChrootDirectory, make sure we test for the existence of the
|
|
user's shell inside the chroot; bz #1679, patch from alex AT rtfs.hu;
|
|
ok dtucker
|
|
- dtucker@cvs.openbsd.org 2010/01/14 23:41:49
|
|
[sftp-common.c]
|
|
use user_from{uid,gid} to lookup up ids since it keeps a small cache.
|
|
ok djm
|
|
- guenther@cvs.openbsd.org 2010/01/15 00:05:22
|
|
[sftp.c]
|
|
Reset SIGTERM to SIG_DFL before executing ssh, so that even if sftp
|
|
inherited SIGTERM as ignored it will still be able to kill the ssh it
|
|
starts.
|
|
ok dtucker@
|
|
- (dtucker) [openbsd-compat/pwcache.c] Pull in pwcache.c from OpenBSD (no
|
|
changes yet but there will be some to come).
|
|
- (dtucker) [configure.ac openbsd-compat/{Makefile.in,pwcache.c} Portability
|
|
for pwcache. Also, added caching of negative hits.
|
|
|
|
20100114
|
|
- (djm) [platform.h] Add missing prototype for
|
|
platform_krb5_get_principal_name
|
|
|
|
20100113
|
|
- (dtucker) [monitor_fdpass.c] Wrap poll.h include in ifdefs.
|
|
- (dtucker) [openbsd-compat/readpassphrase.c] Resync against OpenBSD's r1.18:
|
|
missing restore of SIGTTOU and some whitespace.
|
|
- (dtucker) [openbsd-compat/readpassphrase.c] Update to OpenBSD's r1.21.
|
|
- (dtucker) [openbsd-compat/readpassphrase.c] Update to OpenBSD's r1.22.
|
|
Fixes bz #1590, where sometimes you could not interrupt a connection while
|
|
ssh was prompting for a passphrase or password.
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- dtucker@cvs.openbsd.org 2010/01/13 00:19:04
|
|
[sshconnect.c auth.c]
|
|
Fix a couple of typos/mispellings in comments
|
|
- dtucker@cvs.openbsd.org 2010/01/13 01:10:56
|
|
[key.c]
|
|
Ignore and log any Protocol 1 keys where the claimed size is not equal to
|
|
the actual size. Noted by Derek Martin, ok djm@
|
|
- dtucker@cvs.openbsd.org 2010/01/13 01:20:20
|
|
[canohost.c ssh-keysign.c sshconnect2.c]
|
|
Make HostBased authentication work with a ProxyCommand. bz #1569, patch
|
|
from imorgan at nas nasa gov, ok djm@
|
|
- djm@cvs.openbsd.org 2010/01/13 01:40:16
|
|
[sftp.c sftp-server.c sftp.1 sftp-common.c sftp-common.h]
|
|
support '-h' (human-readable units) for sftp's ls command, just like
|
|
ls(1); ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/01/13 03:48:13
|
|
[servconf.c servconf.h sshd.c]
|
|
avoid run-time failures when specifying hostkeys via a relative
|
|
path by prepending the cwd in these cases; bz#1290; ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/01/13 04:10:50
|
|
[sftp.c]
|
|
don't append a space after inserting a completion of a directory (i.e.
|
|
a path ending in '/') for a slightly better user experience; ok dtucker@
|
|
- (dtucker) [sftp-common.c] Wrap include of util.h in an ifdef.
|
|
- (tim) [defines.h] openbsd-compat/readpassphrase.c now needs _NSIG.
|
|
feedback and ok dtucker@
|
|
|
|
20100112
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- dtucker@cvs.openbsd.org 2010/01/11 01:39:46
|
|
[ssh_config channels.c ssh.1 channels.h ssh.c]
|
|
Add a 'netcat mode' (ssh -W). This connects stdio on the client to a
|
|
single port forward on the server. This allows, for example, using ssh as
|
|
a ProxyCommand to route connections via intermediate servers.
|
|
bz #1618, man page help from jmc@, ok markus@
|
|
- dtucker@cvs.openbsd.org 2010/01/11 04:46:45
|
|
[authfile.c sshconnect2.c]
|
|
Do not prompt for a passphrase if we fail to open a keyfile, and log the
|
|
reason the open failed to debug.
|
|
bz #1693, found by tj AT castaglia org, ok djm@
|
|
- djm@cvs.openbsd.org 2010/01/11 10:51:07
|
|
[ssh-keygen.c]
|
|
when converting keys, truncate key comments at 72 chars as per RFC4716;
|
|
bz#1630 reported by tj AT castaglia.org; ok markus@
|
|
- dtucker@cvs.openbsd.org 2010/01/12 00:16:47
|
|
[authfile.c]
|
|
Fix bug introduced in r1.78 (incorrect brace location) that broke key auth.
|
|
Patch from joachim joachimschipper nl.
|
|
- djm@cvs.openbsd.org 2010/01/12 00:58:25
|
|
[monitor_fdpass.c]
|
|
avoid spinning when fd passing on nonblocking sockets by calling poll()
|
|
in the EINTR/EAGAIN path, much like we do in atomicio; ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/01/12 00:59:29
|
|
[roaming_common.c]
|
|
delete with extreme prejudice a debug() that fired with every keypress;
|
|
ok dtucker deraadt
|
|
- dtucker@cvs.openbsd.org 2010/01/12 01:31:05
|
|
[session.c]
|
|
Do not allow logins if /etc/nologin exists but is not readable by the user
|
|
logging in. Noted by Jan.Pechanec at Sun, ok djm@ deraadt@
|
|
- djm@cvs.openbsd.org 2010/01/12 01:36:08
|
|
[buffer.h bufaux.c]
|
|
add a buffer_get_string_ptr_ret() that does the same as
|
|
buffer_get_string_ptr() but does not fatal() on error; ok dtucker@
|
|
- dtucker@cvs.openbsd.org 2010/01/12 08:33:17
|
|
[session.c]
|
|
Add explicit stat so we reliably detect nologin with bad perms.
|
|
ok djm markus
|
|
|
|
20100110
|
|
- (dtucker) [configure.ac misc.c readconf.c servconf.c ssh-keyscan.c]
|
|
Remove hacks add for RoutingDomain in preparation for its removal.
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- dtucker@cvs.openbsd.org 2010/01/09 23:04:13
|
|
[channels.c ssh.1 servconf.c sshd_config.5 sshd.c channels.h servconf.h
|
|
ssh-keyscan.1 ssh-keyscan.c readconf.c sshconnect.c misc.c ssh.c
|
|
readconf.h scp.1 sftp.1 ssh_config.5 misc.h]
|
|
Remove RoutingDomain from ssh since it's now not needed. It can be
|
|
replaced with "route exec" or "nc -V" as a proxycommand. "route exec"
|
|
also ensures that trafic such as DNS lookups stays withing the specified
|
|
routingdomain. For example (from reyk):
|
|
# route -T 2 exec /usr/sbin/sshd
|
|
or inherited from the parent process
|
|
$ route -T 2 exec sh
|
|
$ ssh 10.1.2.3
|
|
ok deraadt@ markus@ stevesk@ reyk@
|
|
- dtucker@cvs.openbsd.org 2010/01/10 03:51:17
|
|
[servconf.c]
|
|
Add ChrootDirectory to sshd.c test-mode output
|
|
- dtucker@cvs.openbsd.org 2010/01/10 07:15:56
|
|
[auth.c]
|
|
Output a debug if we can't open an existing keyfile. bz#1694, ok djm@
|
|
|
|
20100109
|
|
- (dtucker) Wrap use of IPPROTO_IPV6 in an ifdef for platforms that don't
|
|
have it.
|
|
- (dtucker) [defines.h] define PRIu64 for platforms that don't have it.
|
|
- (dtucker) [roaming_client.c] Wrap inttypes.h in an ifdef.
|
|
- (dtucker) [loginrec.c] Use the SUSv3 specified name for the user name
|
|
when using utmpx. Patch from Ed Schouten.
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2010/01/09 00:20:26
|
|
[sftp-server.c sftp-server.8]
|
|
add a 'read-only' mode to sftp-server(8) that disables open in write mode
|
|
and all other fs-modifying protocol methods. bz#430 ok dtucker@
|
|
- djm@cvs.openbsd.org 2010/01/09 00:57:10
|
|
[PROTOCOL]
|
|
tweak language
|
|
- jmc@cvs.openbsd.org 2010/01/09 03:36:00
|
|
[sftp-server.8]
|
|
bad place to forget a comma...
|
|
- djm@cvs.openbsd.org 2010/01/09 05:04:24
|
|
[mux.c sshpty.h clientloop.c sshtty.c]
|
|
quell tc[gs]etattr warnings when forcing a tty (ssh -tt), since we
|
|
usually don't actually have a tty to read/set; bz#1686 ok dtucker@
|
|
- dtucker@cvs.openbsd.org 2010/01/09 05:17:00
|
|
[roaming_client.c]
|
|
Remove a PRIu64 format string that snuck in with roaming. ok djm@
|
|
- dtucker@cvs.openbsd.org 2010/01/09 11:13:02
|
|
[sftp.c]
|
|
Prevent sftp from derefing a null pointer when given a "-" without a
|
|
command. Also, allow whitespace to follow a "-". bz#1691, path from
|
|
Colin Watson via Debian. ok djm@ deraadt@
|
|
- dtucker@cvs.openbsd.org 2010/01/09 11:17:56
|
|
[sshd.c]
|
|
Afer sshd receives a SIGHUP, ignore subsequent HUPs while sshd re-execs
|
|
itself. Prevents two HUPs in quick succession from resulting in sshd
|
|
dying. bz#1692, patch from Colin Watson via Ubuntu.
|
|
- (dtucker) [defines.h] Remove now-undeeded PRIu64 define.
|
|
|
|
20100108
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- andreas@cvs.openbsd.org 2009/10/24 11:11:58
|
|
[roaming.h]
|
|
Declarations needed for upcoming changes.
|
|
ok markus@
|
|
- andreas@cvs.openbsd.org 2009/10/24 11:13:54
|
|
[sshconnect2.c kex.h kex.c]
|
|
Let the client detect if the server supports roaming by looking
|
|
for the resume@appgate.com kex algorithm.
|
|
ok markus@
|
|
- andreas@cvs.openbsd.org 2009/10/24 11:15:29
|
|
[clientloop.c]
|
|
client_loop() must detect if the session has been suspended and resumed,
|
|
and take appropriate action in that case.
|
|
From Martin Forssen, maf at appgate dot com
|
|
- andreas@cvs.openbsd.org 2009/10/24 11:19:17
|
|
[ssh2.h]
|
|
Define the KEX messages used when resuming a suspended connection.
|
|
ok markus@
|
|
- andreas@cvs.openbsd.org 2009/10/24 11:22:37
|
|
[roaming_common.c]
|
|
Do the actual suspend/resume in the client. This won't be useful until
|
|
the server side supports roaming.
|
|
Most code from Martin Forssen, maf at appgate dot com. Some changes by
|
|
me and markus@
|
|
ok markus@
|
|
- andreas@cvs.openbsd.org 2009/10/24 11:23:42
|
|
[ssh.c]
|
|
Request roaming to be enabled if UseRoaming is true and the server
|
|
supports it.
|
|
ok markus@
|
|
- reyk@cvs.openbsd.org 2009/10/28 16:38:18
|
|
[ssh_config.5 sshd.c misc.h ssh-keyscan.1 readconf.h sshconnect.c
|
|
channels.c channels.h servconf.h servconf.c ssh.1 ssh-keyscan.c scp.1
|
|
sftp.1 sshd_config.5 readconf.c ssh.c misc.c]
|
|
Allow to set the rdomain in ssh/sftp/scp/sshd and ssh-keyscan.
|
|
ok markus@
|
|
- jmc@cvs.openbsd.org 2009/10/28 21:45:08
|
|
[sshd_config.5 sftp.1]
|
|
tweak previous;
|
|
- djm@cvs.openbsd.org 2009/11/10 02:56:22
|
|
[ssh_config.5]
|
|
explain the constraints on LocalCommand some more so people don't
|
|
try to abuse it.
|
|
- djm@cvs.openbsd.org 2009/11/10 02:58:56
|
|
[sshd_config.5]
|
|
clarify that StrictModes does not apply to ChrootDirectory. Permissions
|
|
and ownership are always checked when chrooting. bz#1532
|
|
- dtucker@cvs.openbsd.org 2009/11/10 04:30:45
|
|
[sshconnect2.c channels.c sshconnect.c]
|
|
Set close-on-exec on various descriptors so they don't get leaked to
|
|
child processes. bz #1643, patch from jchadima at redhat, ok deraadt.
|
|
- markus@cvs.openbsd.org 2009/11/11 21:37:03
|
|
[channels.c channels.h]
|
|
fix race condition in x11/agent channel allocation: don't read after
|
|
the end of the select read/write fdset and make sure a reused FD
|
|
is not touched before the pre-handlers are called.
|
|
with and ok djm@
|
|
- djm@cvs.openbsd.org 2009/11/17 05:31:44
|
|
[clientloop.c]
|
|
fix incorrect exit status when multiplexing and channel ID 0 is recycled
|
|
bz#1570 reported by peter.oliver AT eon-is.co.uk; ok dtucker
|
|
- djm@cvs.openbsd.org 2009/11/19 23:39:50
|
|
[session.c]
|
|
bz#1606: error when an attempt is made to connect to a server
|
|
with ForceCommand=internal-sftp with a shell session (i.e. not a
|
|
subsystem session). Avoids stuck client when attempting to ssh to such a
|
|
service. ok dtucker@
|
|
- dtucker@cvs.openbsd.org 2009/11/20 00:15:41
|
|
[session.c]
|
|
Warn but do not fail if stat()ing the subsystem binary fails. This helps
|
|
with chrootdirectory+forcecommand=sftp-server and restricted shells.
|
|
bz #1599, ok djm.
|
|
- djm@cvs.openbsd.org 2009/11/20 00:54:01
|
|
[sftp.c]
|
|
bz#1588 change "Connecting to host..." message to "Connected to host."
|
|
and delay it until after the sftp protocol connection has been established.
|
|
Avoids confusing sequence of messages when the underlying ssh connection
|
|
experiences problems. ok dtucker@
|
|
- dtucker@cvs.openbsd.org 2009/11/20 00:59:36
|
|
[sshconnect2.c]
|
|
Use the HostKeyAlias when prompting for passwords. bz#1039, ok djm@
|
|
- djm@cvs.openbsd.org 2009/11/20 03:24:07
|
|
[misc.c]
|
|
correct off-by-one in percent_expand(): we would fatal() when trying
|
|
to expand EXPAND_MAX_KEYS, allowing only EXPAND_MAX_KEYS-1 to actually
|
|
work. Note that nothing in OpenSSH actually uses close to this limit at
|
|
present. bz#1607 from Jan.Pechanec AT Sun.COM
|
|
- halex@cvs.openbsd.org 2009/11/22 13:18:00
|
|
[sftp.c]
|
|
make passing of zero-length arguments to ssh safe by
|
|
passing "-<switch>" "<value>" rather than "-<switch><value>"
|
|
ok dtucker@, guenther@, djm@
|
|
- dtucker@cvs.openbsd.org 2009/12/06 23:41:15
|
|
[sshconnect2.c]
|
|
zap unused variable and strlen; from Steve McClellan, ok djm
|
|
- djm@cvs.openbsd.org 2009/12/06 23:53:45
|
|
[roaming_common.c]
|
|
use socklen_t for getsockopt optlen parameter; reported by
|
|
Steve.McClellan AT radisys.com, ok dtucker@
|
|
- dtucker@cvs.openbsd.org 2009/12/06 23:53:54
|
|
[sftp.c]
|
|
fix potential divide-by-zero in sftp's "df" output when talking to a server
|
|
that reports zero files on the filesystem (Unix filesystems always have at
|
|
least the root inode). From Steve McClellan at radisys, ok djm@
|
|
- markus@cvs.openbsd.org 2009/12/11 18:16:33
|
|
[key.c]
|
|
switch from 35 to the more common value of RSA_F4 == (2**16)+1 == 65537
|
|
for the RSA public exponent; discussed with provos; ok djm@
|
|
- guenther@cvs.openbsd.org 2009/12/20 07:28:36
|
|
[ssh.c sftp.c scp.c]
|
|
When passing user-controlled options with arguments to other programs,
|
|
pass the option and option argument as separate argv entries and
|
|
not smashed into one (e.g., as -l foo and not -lfoo). Also, always
|
|
pass a "--" argument to stop option parsing, so that a positional
|
|
argument that starts with a '-' isn't treated as an option. This
|
|
fixes some error cases as well as the handling of hostnames and
|
|
filenames that start with a '-'.
|
|
Based on a diff by halex@
|
|
ok halex@ djm@ deraadt@
|
|
- djm@cvs.openbsd.org 2009/12/20 23:20:40
|
|
[PROTOCOL]
|
|
fix an incorrect magic number and typo in PROTOCOL; bz#1688
|
|
report and fix from ueno AT unixuser.org
|
|
- stevesk@cvs.openbsd.org 2009/12/25 19:40:21
|
|
[readconf.c servconf.c misc.h ssh-keyscan.c misc.c]
|
|
validate routing domain is in range 0-RT_TABLEID_MAX.
|
|
'Looks right' deraadt@
|
|
- stevesk@cvs.openbsd.org 2009/12/29 16:38:41
|
|
[sshd_config.5 readconf.c ssh_config.5 scp.1 servconf.c sftp.1 ssh.1]
|
|
Rename RDomain config option to RoutingDomain to be more clear and
|
|
consistent with other options.
|
|
NOTE: if you currently use RDomain in the ssh client or server config,
|
|
or ssh/sshd -o, you must update to use RoutingDomain.
|
|
ok markus@ djm@
|
|
- jmc@cvs.openbsd.org 2009/12/29 18:03:32
|
|
[sshd_config.5 ssh_config.5]
|
|
sort previous;
|
|
- dtucker@cvs.openbsd.org 2010/01/04 01:45:30
|
|
[sshconnect2.c]
|
|
Don't escape backslashes in the SSH2 banner. bz#1533, patch from
|
|
Michal Gorny via Gentoo.
|
|
- djm@cvs.openbsd.org 2010/01/04 02:03:57
|
|
[sftp.c]
|
|
Implement tab-completion of commands, local and remote filenames for sftp.
|
|
Hacked on and off for some time by myself, mouring, Carlos Silva (via 2009
|
|
Google Summer of Code) and polished to a fine sheen by myself again.
|
|
It should deal more-or-less correctly with the ikky corner-cases presented
|
|
by quoted filenames, but the UI could still be slightly improved.
|
|
In particular, it is quite slow for remote completion on large directories.
|
|
bz#200; ok markus@
|
|
- djm@cvs.openbsd.org 2010/01/04 02:25:15
|
|
[sftp-server.c]
|
|
bz#1566 don't unnecessarily dup() in and out fds for sftp-server;
|
|
ok markus@
|
|
- dtucker@cvs.openbsd.org 2010/01/08 21:50:49
|
|
[sftp.c]
|
|
Fix two warnings: possibly used unitialized and use a nul byte instead of
|
|
NULL pointer. ok djm@
|
|
- (dtucker) [Makefile.in added roaming_client.c roaming_serv.c] Import new
|
|
files for roaming and add to Makefile.
|
|
- (dtucker) [Makefile.in] .c files do not belong in the OBJ lines.
|
|
- (dtucker) [sftp.c] ifdef out the sftp completion bits for platforms that
|
|
don't have libedit.
|
|
- (dtucker) [configure.ac misc.c readconf.c servconf.c ssh-keyscan.c] Make
|
|
RoutingDomain an unsupported option on platforms that don't have it.
|
|
- (dtucker) [sftp.c] Expand ifdef for libedit to cover complete_is_remote
|
|
too.
|
|
- (dtucker) [misc.c] Move the routingdomain ifdef to allow the socket to
|
|
be created.
|
|
- (dtucker] [misc.c] Shrink the area covered by USE_ROUTINGDOMAIN more
|
|
to eliminate an unused variable warning.
|
|
- (dtucker) [roaming_serv.c] Include includes.h for u_intXX_t types.
|
|
|
|
20091226
|
|
- (tim) [contrib/cygwin/Makefile] Install ssh-copy-id and ssh-copy-id.1
|
|
Gzip all man pages. Patch from Corinna Vinschen.
|
|
|
|
20091221
|
|
- (dtucker) [auth-krb5.c platform.{c,h} openbsd-compat/port-aix.{c,h}]
|
|
Bug #1583: Use system's kerberos principal name on AIX if it's available.
|
|
Based on a patch from and tested by Miguel Sanders
|
|
|
|
20091208
|
|
- (dtucker) Bug #1470: Disable OOM-killing of the listening sshd on Linux,
|
|
based on a patch from Vaclav Ovsik and Colin Watson. ok djm.
|
|
|
|
20091207
|
|
- (dtucker) Bug #1160: use pkg-config for opensc config if it's available.
|
|
Tested by Martin Paljak.
|
|
- (dtucker) Bug #1677: add conditionals around the source for ssh-askpass.
|
|
|
|
20091121
|
|
- (tim) [opensshd.init.in] If PidFile is set in sshd_config, use it.
|
|
Bug 1628. OK dtucker@
|
|
|
|
20091120
|
|
- (djm) [ssh-rand-helper.c] Print error and usage() when passed command-
|
|
line arguments as none are supported. Exit when passed unrecognised
|
|
commandline flags. bz#1568 from gson AT araneus.fi
|
|
|
|
20091118
|
|
- (djm) [channels.c misc.c misc.h sshd.c] add missing setsockopt() to
|
|
set IPV6_V6ONLY for local forwarding with GatwayPorts=yes. Unify
|
|
setting IPV6_V6ONLY behind a new function misc.c:sock_set_v6only()
|
|
bz#1648, report and fix from jan.kratochvil AT redhat.com
|
|
- (djm) [contrib/gnome-ssh-askpass2.c] Make askpass dialog desktop-modal.
|
|
bz#1645, patch from jchadima AT redhat.com
|
|
|
|
20091107
|
|
- (dtucker) [authfile.c] Fall back to 3DES for the encryption of private
|
|
keys when built with OpenSSL versions that don't do AES.
|
|
|
|
20091105
|
|
- (dtucker) [authfile.c] Add OpenSSL compat header so this still builds with
|
|
older versions of OpenSSL.
|
|
|
|
20091024
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2009/10/11 23:03:15
|
|
[hostfile.c]
|
|
mention the host name that we are looking for in check_host_in_hostfile()
|
|
- sobrado@cvs.openbsd.org 2009/10/17 12:10:39
|
|
[sftp-server.c]
|
|
sort flags.
|
|
- sobrado@cvs.openbsd.org 2009/10/22 12:35:53
|
|
[ssh.1 ssh-agent.1 ssh-add.1]
|
|
use the UNIX-related macros (.At and .Ux) where appropriate.
|
|
ok jmc@
|
|
- sobrado@cvs.openbsd.org 2009/10/22 15:02:12
|
|
[ssh-agent.1 ssh-add.1 ssh.1]
|
|
write UNIX-domain in a more consistent way; while here, replace a
|
|
few remaining ".Tn UNIX" macros with ".Ux" ones.
|
|
pointed out by ratchov@, thanks!
|
|
ok jmc@
|
|
- djm@cvs.openbsd.org 2009/10/22 22:26:13
|
|
[authfile.c]
|
|
switch from 3DES to AES-128 for encryption of passphrase-protected
|
|
SSH protocol 2 private keys; ok several
|
|
- djm@cvs.openbsd.org 2009/10/23 01:57:11
|
|
[sshconnect2.c]
|
|
disallow a hostile server from checking jpake auth by sending an
|
|
out-of-sequence success message. (doesn't affect code enabled by default)
|
|
- dtucker@cvs.openbsd.org 2009/10/24 00:48:34
|
|
[ssh-keygen.1]
|
|
ssh-keygen now uses AES-128 for private keys
|
|
- (dtucker) [mdoc2man.awk] Teach it to understand the .Ux macro.
|
|
- (dtucker) [session.c openbsd-compat/port-linux.{c,h}] Bug #1637: if selinux
|
|
is enabled set the security context to "sftpd_t" before running the
|
|
internal sftp server Based on a patch from jchadima at redhat.
|
|
|
|
20091011
|
|
- (dtucker) [configure.ac sftp-client.c] Remove the gyrations required for
|
|
dirent d_type and DTTOIF as we've switched OpenBSD to the more portable
|
|
lstat.
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- markus@cvs.openbsd.org 2009/10/08 14:03:41
|
|
[sshd_config readconf.c ssh_config.5 servconf.c sshd_config.5]
|
|
disable protocol 1 by default (after a transition period of about 10 years)
|
|
ok deraadt
|
|
- jmc@cvs.openbsd.org 2009/10/08 20:42:12
|
|
[sshd_config.5 ssh_config.5 sshd.8 ssh.1]
|
|
some tweaks now that protocol 1 is not offered by default; ok markus
|
|
- dtucker@cvs.openbsd.org 2009/10/11 10:41:26
|
|
[sftp-client.c]
|
|
d_type isn't portable so use lstat to get dirent modes. Suggested by and
|
|
"looks sane" deraadt@
|
|
- markus@cvs.openbsd.org 2009/10/08 18:04:27
|
|
[regress/test-exec.sh]
|
|
re-enable protocol v1 for the tests.
|
|
|
|
20091007
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2009/08/12 00:13:00
|
|
[sftp.c sftp.1]
|
|
support most of scp(1)'s commandline arguments in sftp(1), as a first
|
|
step towards making sftp(1) a drop-in replacement for scp(1).
|
|
One conflicting option (-P) has not been changed, pending further
|
|
discussion.
|
|
Patch from carlosvsilvapt@gmail.com as part of his work in the
|
|
Google Summer of Code
|
|
- jmc@cvs.openbsd.org 2009/08/12 06:31:42
|
|
[sftp.1]
|
|
sort options;
|
|
- djm@cvs.openbsd.org 2009/08/13 01:11:19
|
|
[sftp.1 sftp.c]
|
|
Swizzle options: "-P sftp_server_path" moves to "-D sftp_server_path",
|
|
add "-P port" to match scp(1). Fortunately, the -P option is only really
|
|
used by our regression scripts.
|
|
part of larger patch from carlosvsilvapt@gmail.com for his Google Summer
|
|
of Code work; ok deraadt markus
|
|
- jmc@cvs.openbsd.org 2009/08/13 13:39:54
|
|
[sftp.1 sftp.c]
|
|
sync synopsis and usage();
|
|
- djm@cvs.openbsd.org 2009/08/14 18:17:49
|
|
[sftp-client.c]
|
|
make the "get_handle: ..." error messages vaguely useful by allowing
|
|
callers to specify their own error message strings.
|
|
- fgsch@cvs.openbsd.org 2009/08/15 18:56:34
|
|
[auth.h]
|
|
remove unused define. markus@ ok.
|
|
(Id sync only, Portable still uses this.)
|
|
- dtucker@cvs.openbsd.org 2009/08/16 23:29:26
|
|
[sshd_config.5]
|
|
Add PubkeyAuthentication to the list allowed in a Match block (bz #1577)
|
|
- djm@cvs.openbsd.org 2009/08/18 18:36:21
|
|
[sftp-client.h sftp.1 sftp-client.c sftp.c]
|
|
recursive transfer support for get/put and on the commandline
|
|
work mostly by carlosvsilvapt@gmail.com for the Google Summer of Code
|
|
with some tweaks by me; "go for it" deraadt@
|
|
- djm@cvs.openbsd.org 2009/08/18 21:15:59
|
|
[sftp.1]
|
|
fix "get" command usage, spotted by jmc@
|
|
- jmc@cvs.openbsd.org 2009/08/19 04:56:03
|
|
[sftp.1]
|
|
ether -> either;
|
|
- dtucker@cvs.openbsd.org 2009/08/20 23:54:28
|
|
[mux.c]
|
|
subsystem_flag is defined in ssh.c so it's extern; ok djm
|
|
- djm@cvs.openbsd.org 2009/08/27 17:28:52
|
|
[sftp-server.c]
|
|
allow setting an explicit umask on the commandline to override whatever
|
|
default the user has. bz#1229; ok dtucker@ deraadt@ markus@
|
|
- djm@cvs.openbsd.org 2009/08/27 17:33:49
|
|
[ssh-keygen.c]
|
|
force use of correct hash function for random-art signature display
|
|
as it was inheriting the wrong one when bubblebabble signatures were
|
|
activated; bz#1611 report and patch from fwojcik+openssh AT besh.com;
|
|
ok markus@
|
|
- djm@cvs.openbsd.org 2009/08/27 17:43:00
|
|
[sftp-server.8]
|
|
allow setting an explicit umask on the commandline to override whatever
|
|
default the user has. bz#1229; ok dtucker@ deraadt@ markus@
|
|
- djm@cvs.openbsd.org 2009/08/27 17:44:52
|
|
[authfd.c ssh-add.c authfd.h]
|
|
Do not fall back to adding keys without contraints (ssh-add -c / -t ...)
|
|
when the agent refuses the constrained add request. This was a useful
|
|
migration measure back in 2002 when constraints were new, but just
|
|
adds risk now.
|
|
bz #1612, report and patch from dkg AT fifthhorseman.net; ok markus@
|
|
- djm@cvs.openbsd.org 2009/08/31 20:56:02
|
|
[sftp-server.c]
|
|
check correct variable for error message, spotted by martynas@
|
|
- djm@cvs.openbsd.org 2009/08/31 21:01:29
|
|
[sftp-server.8]
|
|
document -e and -h; prodded by jmc@
|
|
- djm@cvs.openbsd.org 2009/09/01 14:43:17
|
|
[ssh-agent.c]
|
|
fix a race condition in ssh-agent that could result in a wedged or
|
|
spinning agent: don't read off the end of the allocated fd_sets, and
|
|
don't issue blocking read/write on agent sockets - just fall back to
|
|
select() on retriable read/write errors. bz#1633 reported and tested
|
|
by "noodle10000 AT googlemail.com"; ok dtucker@ markus@
|
|
- grunk@cvs.openbsd.org 2009/10/01 11:37:33
|
|
[dh.c]
|
|
fix a cast
|
|
ok djm@ markus@
|
|
- djm@cvs.openbsd.org 2009/10/06 04:46:40
|
|
[session.c]
|
|
bz#1596: fflush(NULL) before exec() to ensure that everying (motd
|
|
in particular) has made it out before the streams go away.
|
|
- djm@cvs.openbsd.org 2008/12/07 22:17:48
|
|
[regress/addrmatch.sh]
|
|
match string "passwordauthentication" only at start of line, not anywhere
|
|
in sshd -T output
|
|
- dtucker@cvs.openbsd.org 2009/05/05 07:51:36
|
|
[regress/multiplex.sh]
|
|
Always specify ssh_config for multiplex tests: prevents breakage caused
|
|
by options in ~/.ssh/config. From Dan Peterson.
|
|
- djm@cvs.openbsd.org 2009/08/13 00:57:17
|
|
[regress/Makefile]
|
|
regression test for port number parsing. written as part of the a2port
|
|
change that went into 5.2 but I forgot to commit it at the time...
|
|
- djm@cvs.openbsd.org 2009/08/13 01:11:55
|
|
[regress/sftp-batch.sh regress/sftp-badcmds.sh regress/sftp.sh
|
|
regress/sftp-cmds.sh regres/sftp-glob.sh]
|
|
date: 2009/08/13 01:11:19; author: djm; state: Exp; lines: +10 -7
|
|
Swizzle options: "-P sftp_server_path" moves to "-D sftp_server_path",
|
|
add "-P port" to match scp(1). Fortunately, the -P option is only really
|
|
used by our regression scripts.
|
|
part of larger patch from carlosvsilvapt@gmail.com for his Google Summer
|
|
of Code work; ok deraadt markus
|
|
- djm@cvs.openbsd.org 2009/08/20 18:43:07
|
|
[regress/ssh-com-sftp.sh]
|
|
fix one sftp -D ... => sftp -P ... conversion that I missed; from Carlos
|
|
Silva for Google Summer of Code
|
|
- dtucker@cvs.openbsd.org 2009/10/06 23:51:49
|
|
[regress/ssh2putty.sh]
|
|
Add OpenBSD tag to make syncs easier
|
|
- (dtucker) [regress/portnum.sh] Import new test.
|
|
- (dtucker) [configure.ac sftp-client.c] DTOTIF is in fs/ffs/dir.h on at
|
|
least dragonflybsd.
|
|
- (dtucker) d_type is not mandated by POSIX, so add fallback code using
|
|
stat(), needed on at least cygwin.
|
|
|
|
20091002
|
|
- (djm) [Makefile.in] Mention readconf.o in ssh-keysign's make deps.
|
|
spotted by des AT des.no
|
|
|
|
20090926
|
|
- (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
|
|
[contrib/suse/openssh.spec] Update for release
|
|
- (djm) [README] update relnotes URL
|
|
- (djm) [packet.c] Restore EWOULDBLOCK handling that got lost somewhere
|
|
- (djm) Release 5.3p1
|
|
|
|
20090911
|
|
- (dtucker) [configure.ac] Change the -lresolv check so it works on Mac OS X
|
|
10.6 (which doesn't have BIND8_COMPAT and thus uses res_9_query). Patch
|
|
from jbasney at ncsa uiuc edu.
|
|
|
|
20090908
|
|
- (djm) [serverloop.c] Fix test for server-assigned remote forwarding port
|
|
(-R 0:...); bz#1578, spotted and fix by gavin AT emf.net; ok dtucker@
|
|
|
|
20090901
|
|
- (dtucker) [configure.ac] Bug #1639: use AC_PATH_PROG to search the path for
|
|
krb5-config if it's not in the location specified by --with-kerberos5.
|
|
Patch from jchadima at redhat.
|
|
|
|
20090829
|
|
- (dtucker) [README.platform] Add text about development packages, based on
|
|
text from Chris Pepper in bug #1631.
|
|
|
|
20090828
|
|
- dtucker [auth-sia.c] Roll back the change for bug #1241 as it apparently
|
|
causes problems in some Tru64 configurations.
|
|
- (djm) [sshd_config.5] downgrade mention of login.conf to be an example
|
|
and mention PAM as another provider for ChallengeResponseAuthentication;
|
|
bz#1408; ok dtucker@
|
|
- (djm) [sftp-server.c] bz#1535: accept ENOSYS as a fallback error when
|
|
attempting atomic rename(); ok dtucker@
|
|
- (djm) [Makefile.in] bz#1505: Solaris make(1) doesn't accept make variables
|
|
in argv, so pass them in the environment; ok dtucker@
|
|
- (dtucker) [channels.c configure.ac] Bug #1528: skip the tcgetattr call on
|
|
the pty master on Solaris, since it never succeeds and can hang if large
|
|
amounts of data is sent to the slave (eg a copy-paste). Based on a patch
|
|
originally from Doke Scott, ok djm@
|
|
- (dtucker) [clientloop.c configure.ac defines.h] Make the client's IO buffer
|
|
size a compile-time option and set it to 64k on Cygwin, since Corinna
|
|
reports that it makes a significant difference to performance. ok djm@
|
|
- (dtucker) [configure.ac] Fix the syntax of the Solaris tcgetattr entry.
|
|
|
|
20090820
|
|
- (dtucker) [includes.h] Bug #1634: do not include system glob.h if we're not
|
|
using it since the type conflicts can cause problems on FreeBSD. Patch
|
|
from Jonathan Chen.
|
|
- (dtucker) [session.c openbsd-compat/port-aix.h] Bugs #1249 and #1567: move
|
|
the setpcred call on AIX to immediately before the permanently_set_uid().
|
|
Ensures that we still have privileges when we call chroot and
|
|
pam_open_sesson. Based on a patch from David Leonard.
|
|
|
|
20090817
|
|
- (dtucker) [configure.ac] Check for headers before libraries for openssl an
|
|
zlib, which should make the errors slightly more meaningful on platforms
|
|
where there's separate "-devel" packages for those.
|
|
- (dtucker) [sshlogin.c openbsd-compat/port-aix.{c,h}] Bug #1595: make
|
|
PrintLastLog work on AIX. Based in part on a patch from Miguel Sanders.
|
|
|
|
20090729
|
|
- (tim) [contrib/cygwin/ssh-user-config] Change script to call correct error
|
|
function. Patch from Corinna Vinschen.
|
|
|
|
20090713
|
|
- (dtucker) [openbsd-compat/getrrsetbyname.c] Reduce answer buffer size so it
|
|
fits into 16 bits to work around a bug in glibc's resolver where it masks
|
|
off the buffer size at 16 bits. Patch from Hauke Lampe, ok djm jakob.
|
|
|
|
20090712
|
|
- (dtucker) [configure.ac] Include sys/param.h for the sys/mount.h test,
|
|
prevents configure complaining on older BSDs.
|
|
- (dtucker [contrib/cygwin/ssh-{host,user}-config] Add license text. Patch
|
|
from Corinna Vinschen.
|
|
- (dtucker) [auth-pam.c] Bug #1534: move the deletion of PAM credentials on
|
|
logout to after the session close. Patch from Anicka Bernathova,
|
|
originally from Andreas Schwab via Novelll ok djm.
|
|
|
|
20090707
|
|
- (dtucker) [contrib/cygwin/ssh-host-config] better support for automated
|
|
scripts and fix usage of eval. Patch from Corinna Vinschen.
|
|
|
|
20090705
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- andreas@cvs.openbsd.org 2009/06/27 09:29:06
|
|
[packet.h packet.c]
|
|
packet_bacup_state() and packet_restore_state() will be used to
|
|
temporarily save the current state ren resuming a suspended connection.
|
|
ok markus@
|
|
- andreas@cvs.openbsd.org 2009/06/27 09:32:43
|
|
[roaming_common.c roaming.h]
|
|
It may be necessary to retransmit some data when resuming, so add it
|
|
to a buffer when roaming is enabled.
|
|
Most of this code was written by Martin Forssen, maf at appgate dot com.
|
|
ok markus@
|
|
- andreas@cvs.openbsd.org 2009/06/27 09:35:06
|
|
[readconf.h readconf.c]
|
|
Add client option UseRoaming. It doesn't do anything yet but will
|
|
control whether the client tries to use roaming if enabled on the
|
|
server. From Martin Forssen.
|
|
ok markus@
|
|
- markus@cvs.openbsd.org 2009/06/30 14:54:40
|
|
[version.h]
|
|
crank version; ok deraadt
|
|
- dtucker@cvs.openbsd.org 2009/07/02 02:11:47
|
|
[ssh.c]
|
|
allow for long home dir paths (bz #1615). ok deraadt
|
|
(based in part on a patch from jchadima at redhat)
|
|
- stevesk@cvs.openbsd.org 2009/07/05 19:28:33
|
|
[clientloop.c]
|
|
only send SSH2_MSG_DISCONNECT if we're in compat20; from dtucker@
|
|
ok deraadt@ markus@
|
|
|
|
20090622
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- dtucker@cvs.openbsd.org 2009/06/22 05:39:28
|
|
[monitor_wrap.c monitor_mm.c ssh-keygen.c auth2.c gss-genr.c sftp-client.c]
|
|
alphabetize includes; reduces diff vs portable and style(9).
|
|
ok stevesk djm
|
|
(Id sync only; these were already in order in -portable)
|
|
|
|
20090621
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- markus@cvs.openbsd.org 2009/03/17 21:37:00
|
|
[ssh.c]
|
|
pass correct argv[0] to openlog(); ok djm@
|
|
- jmc@cvs.openbsd.org 2009/03/19 15:15:09
|
|
[ssh.1]
|
|
for "Ciphers", just point the reader to the keyword in ssh_config(5), just
|
|
as we do for "MACs": this stops us getting out of sync when the lists
|
|
change;
|
|
fixes documentation/6102, submitted by Peter J. Philipp
|
|
alternative fix proposed by djm
|
|
ok markus
|
|
- tobias@cvs.openbsd.org 2009/03/23 08:31:19
|
|
[ssh-agent.c]
|
|
Fixed a possible out-of-bounds memory access if the environment variable
|
|
SHELL is shorter than 3 characters.
|
|
with input by and ok dtucker
|
|
- tobias@cvs.openbsd.org 2009/03/23 19:38:04
|
|
[ssh-agent.c]
|
|
My previous commit didn't fix the problem at all, so stick at my first
|
|
version of the fix presented to dtucker.
|
|
Issue notified by Matthias Barkhoff (matthias dot barkhoff at gmx dot de).
|
|
ok dtucker
|
|
- sobrado@cvs.openbsd.org 2009/03/26 08:38:39
|
|
[sftp-server.8 sshd.8 ssh-agent.1]
|
|
fix a few typographical errors found by spell(1).
|
|
ok dtucker@, jmc@
|
|
- stevesk@cvs.openbsd.org 2009/04/13 19:07:44
|
|
[sshd_config.5]
|
|
fix possessive; ok djm@
|
|
- stevesk@cvs.openbsd.org 2009/04/14 16:33:42
|
|
[sftp-server.c]
|
|
remove unused option character from getopt() optstring; ok markus@
|
|
- jj@cvs.openbsd.org 2009/04/14 21:10:54
|
|
[servconf.c]
|
|
Fixed a few the-the misspellings in comments. Skipped a bunch in
|
|
binutils,gcc and so on. ok jmc@
|
|
- stevesk@cvs.openbsd.org 2009/04/17 19:23:06
|
|
[session.c]
|
|
use INTERNAL_SFTP_NAME for setproctitle() of in-process sftp-server;
|
|
ok djm@ markus@
|
|
- stevesk@cvs.openbsd.org 2009/04/17 19:40:17
|
|
[sshd_config.5]
|
|
clarify that even internal-sftp needs /dev/log for logging to work; ok
|
|
markus@
|
|
- jmc@cvs.openbsd.org 2009/04/18 18:39:10
|
|
[sshd_config.5]
|
|
tweak previous; ok stevesk
|
|
- stevesk@cvs.openbsd.org 2009/04/21 15:13:17
|
|
[sshd_config.5]
|
|
clarify we cd to user's home after chroot; ok markus@ on
|
|
earlier version; tweaks and ok jmc@
|
|
- andreas@cvs.openbsd.org 2009/05/25 06:48:01
|
|
[channels.c packet.c clientloop.c packet.h serverloop.c monitor_wrap.c
|
|
monitor.c]
|
|
Put the globals in packet.c into a struct and don't access it directly
|
|
from other files. No functional changes.
|
|
ok markus@ djm@
|
|
- andreas@cvs.openbsd.org 2009/05/27 06:31:25
|
|
[canohost.h canohost.c]
|
|
Add clear_cached_addr(), needed for upcoming changes allowing the peer
|
|
address to change.
|
|
ok markus@
|
|
- andreas@cvs.openbsd.org 2009/05/27 06:33:39
|
|
[clientloop.c]
|
|
Send SSH2_MSG_DISCONNECT when the client disconnects. From a larger
|
|
change from Martin Forssen, maf at appgate dot com.
|
|
ok markus@
|
|
- andreas@cvs.openbsd.org 2009/05/27 06:34:36
|
|
[kex.c kex.h]
|
|
Move the KEX_COOKIE_LEN define to kex.h
|
|
ok markus@
|
|
- andreas@cvs.openbsd.org 2009/05/27 06:36:07
|
|
[packet.h packet.c]
|
|
Add packet_put_int64() and packet_get_int64(), part of a larger change
|
|
from Martin Forssen.
|
|
ok markus@
|
|
- andreas@cvs.openbsd.org 2009/05/27 06:38:16
|
|
[sshconnect.h sshconnect.c]
|
|
Un-static ssh_exchange_identification(), part of a larger change from
|
|
Martin Forssen and needed for upcoming changes.
|
|
ok markus@
|
|
- andreas@cvs.openbsd.org 2009/05/28 16:50:16
|
|
[sshd.c packet.c serverloop.c monitor_wrap.c clientloop.c sshconnect.c
|
|
monitor.c Added roaming.h roaming_common.c roaming_dummy.c]
|
|
Keep track of number of bytes read and written. Needed for upcoming
|
|
changes. Most code from Martin Forssen, maf at appgate dot com.
|
|
ok markus@
|
|
Also, applied appropriate changes to Makefile.in
|
|
- andreas@cvs.openbsd.org 2009/06/12 20:43:22
|
|
[monitor.c packet.c]
|
|
Fix warnings found by chl@ and djm@ and change roaming_atomicio's
|
|
return type to match atomicio's
|
|
Diff from djm@, ok markus@
|
|
- andreas@cvs.openbsd.org 2009/06/12 20:58:32
|
|
[packet.c]
|
|
Move some more statics into session_state
|
|
ok markus@ djm@
|
|
- dtucker@cvs.openbsd.org 2009/06/21 07:37:15
|
|
[kexdhs.c kexgexs.c]
|
|
abort if key_sign fails, preventing possible null deref. Based on report
|
|
from Paolo Ganci, ok markus@ djm@
|
|
- dtucker@cvs.openbsd.org 2009/06/21 09:04:03
|
|
[roaming.h roaming_common.c roaming_dummy.c]
|
|
Add tags for the benefit of the sync scripts
|
|
Also: pull in the changes for 1.1->1.2 missed in the previous sync.
|
|
- (dtucker) [auth2-jpake.c auth2.c canohost.h session.c] Whitespace and
|
|
header-order changes to reduce diff vs OpenBSD.
|
|
- (dtucker) [servconf.c sshd.c] More whitespace sync.
|
|
- (dtucker) [roaming_common.c roaming_dummy.c] Wrap #include <inttypes.h> in
|
|
ifdef.
|
|
|
|
20090616
|
|
- (dtucker) [configure.ac defines.h] Bug #1607: handle the case where fsid_t
|
|
is a struct with a __val member. Fixes build on, eg, Redhat 6.2.
|
|
|
|
20090504
|
|
- (dtucker) [sshlogin.c] Move the NO_SSH_LASTLOG #ifndef line to include
|
|
variable declarations. Should prevent unused warnings anywhere it's set
|
|
(only Crays as far as I can tell) and be a no-op everywhere else.
|
|
|
|
20090318
|
|
- (tim) [configure.ac] Remove setting IP_TOS_IS_BROKEN for Cygwin. The problem
|
|
that setsockopt(IP_TOS) doesn't work on Cygwin has been fixed since 2005.
|
|
Based on patch from vinschen at redhat com.
|
|
|
|
20090308
|
|
- (dtucker) [auth-passwd.c auth1.c auth2-kbdint.c auth2-none.c auth2-passwd.c
|
|
auth2-pubkey.c session.c openbsd-compat/bsd-cygwin_util.{c,h}
|
|
openbsd-compat/daemon.c] Remove support for Windows 95/98/ME and very old
|
|
version of Cygwin. Patch from vinschen at redhat com.
|
|
|
|
20090307
|
|
- (dtucker) [contrib/aix/buildbff.sh] Only try to rename ssh_prng_cmds if it
|
|
exists (it's not created if OpenSSL's PRNG is self-seeded, eg if the OS
|
|
has a /dev/random).
|
|
- (dtucker) [schnorr.c openbsd-compat/openssl-compat.{c,h}] Add
|
|
EVP_DigestUpdate to the OLD_EVP compatibility functions and tell schnorr.c
|
|
to use them. Allows building with older OpenSSL versions.
|
|
- (dtucker) [configure.ac defines.h] Check for in_port_t and typedef if needed.
|
|
- (dtucker) [configure.ac] Missing comma in type list.
|
|
- (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}]
|
|
EVP_DigestUpdate does not exactly match the other OLD_EVP functions (eg
|
|
in openssl 0.9.6) so add an explicit test for it.
|
|
|
|
20090306
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2009/03/05 07:18:19
|
|
[auth2-jpake.c jpake.c jpake.h monitor_wrap.c monitor_wrap.h schnorr.c]
|
|
[sshconnect2.c]
|
|
refactor the (disabled) Schnorr proof code to make it a little more
|
|
generally useful
|
|
- djm@cvs.openbsd.org 2009/03/05 11:30:50
|
|
[uuencode.c]
|
|
document what these functions do so I don't ever have to recuse into
|
|
b64_pton/ntop to remember their return values
|
|
|
|
20090223
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2009/02/22 23:50:57
|
|
[ssh_config.5 sshd_config.5]
|
|
don't advertise experimental options
|
|
- djm@cvs.openbsd.org 2009/02/22 23:59:25
|
|
[sshd_config.5]
|
|
missing period
|
|
- djm@cvs.openbsd.org 2009/02/23 00:06:15
|
|
[version.h]
|
|
openssh-5.2
|
|
- (djm) [README] update for 5.2
|
|
- (djm) Release openssh-5.2p1
|
|
|
|
20090222
|
|
- (djm) OpenBSD CVS Sync
|
|
- tobias@cvs.openbsd.org 2009/02/21 19:32:04
|
|
[misc.c sftp-server-main.c ssh-keygen.c]
|
|
Added missing newlines in error messages.
|
|
ok dtucker
|
|
|
|
20090221
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2009/02/17 01:28:32
|
|
[ssh_config]
|
|
sync with revised default ciphers; pointed out by dkrause@
|
|
- djm@cvs.openbsd.org 2009/02/18 04:31:21
|
|
[schnorr.c]
|
|
signature should hash over the entire group, not just the generator
|
|
(this is still disabled code)
|
|
- (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
|
|
[contrib/suse/openssh.spec] Prepare for 5.2p1
|
|
|
|
20090216
|
|
- (djm) [regress/conch-ciphers.sh regress/putty-ciphers.sh]
|
|
[regress/putty-kex.sh regress/putty-transfer.sh] Downgrade disabled
|
|
interop tests from FATAL error to a warning. Allows some interop
|
|
tests to proceed if others are missing necessary prerequisites.
|
|
- (djm) [configure.ac] support GNU/kFreeBSD and GNU/kOpensolaris
|
|
systems; patch from Aurelien Jarno via rmh AT aybabtu.com
|
|
|
|
20090214
|
|
- (djm) OpenBSD CVS Sync
|
|
- dtucker@cvs.openbsd.org 2009/02/02 11:15:14
|
|
[sftp.c]
|
|
Initialize a few variables to prevent spurious "may be used
|
|
uninitialized" warnings from newer gcc's. ok djm@
|
|
- djm@cvs.openbsd.org 2009/02/12 03:00:56
|
|
[canohost.c canohost.h channels.c channels.h clientloop.c readconf.c]
|
|
[readconf.h serverloop.c ssh.c]
|
|
support remote port forwarding with a zero listen port (-R0:...) to
|
|
dyamically allocate a listen port at runtime (this is actually
|
|
specified in rfc4254); bz#1003 ok markus@
|
|
- djm@cvs.openbsd.org 2009/02/12 03:16:01
|
|
[serverloop.c]
|
|
tighten check for -R0:... forwarding: only allow dynamic allocation
|
|
if want_reply is set in the packet
|
|
- djm@cvs.openbsd.org 2009/02/12 03:26:22
|
|
[monitor.c]
|
|
some paranoia: check that the serialised key is really KEY_RSA before
|
|
diddling its internals
|
|
- djm@cvs.openbsd.org 2009/02/12 03:42:09
|
|
[ssh.1]
|
|
document -R0:... usage
|
|
- djm@cvs.openbsd.org 2009/02/12 03:44:25
|
|
[ssh.1]
|
|
consistency: Dq => Ql
|
|
- djm@cvs.openbsd.org 2009/02/12 03:46:17
|
|
[ssh_config.5]
|
|
document RemoteForward usage with 0 listen port
|
|
- jmc@cvs.openbsd.org 2009/02/12 07:34:20
|
|
[ssh_config.5]
|
|
kill trailing whitespace;
|
|
- markus@cvs.openbsd.org 2009/02/13 11:50:21
|
|
[packet.c]
|
|
check for enc !=NULL in packet_start_discard
|
|
- djm@cvs.openbsd.org 2009/02/14 06:35:49
|
|
[PROTOCOL]
|
|
mention that eow and no-more-sessions extensions are sent only to
|
|
OpenSSH peers
|
|
|
|
20090212
|
|
- (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically
|
|
set ownership and modes, so avoid explicitly setting them
|
|
- (djm) [configure.ac loginrec.c] bz#1421: fix lastlog support for OSX.
|
|
OSX provides a getlastlogxbyname function that automates the reading of
|
|
a lastlog file. Also, the pututxline function will update lastlog so
|
|
there is no need for loginrec.c to do it explicitly. Collapse some
|
|
overly verbose code while I'm in there.
|
|
|
|
20090201
|
|
- (dtucker) [defines.h sshconnect.c] INET6_ADDRSTRLEN is now needed in
|
|
channels.c too, so move the definition for non-IP6 platforms to defines.h
|
|
where it can be shared.
|
|
|
|
20090129
|
|
- (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
|
|
If the CYGWIN environment variable is empty, the installer script
|
|
should not install the service with an empty CYGWIN variable, but
|
|
rather without setting CYGWNI entirely.
|
|
- (tim) [contrib/cygwin/ssh-host-config] Whitespace cleanup. No code changes.
|
|
|
|
20090128
|
|
- (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
|
|
Changes to work on Cygwin 1.5.x as well as on the new Cygwin 1.7.x.
|
|
The information given for the setting of the CYGWIN environment variable
|
|
is wrong for both releases so I just removed it, together with the
|
|
unnecessary (Cygwin 1.5.x) or wrong (Cygwin 1.7.x) default setting.
|
|
|
|
20081228
|
|
- (djm) OpenBSD CVS Sync
|
|
- stevesk@cvs.openbsd.org 2008/12/09 03:20:42
|
|
[channels.c servconf.c]
|
|
channel_print_adm_permitted_opens() should deal with all the printing
|
|
for that config option. suggested by markus@; ok markus@ djm@
|
|
dtucker@
|
|
- djm@cvs.openbsd.org 2008/12/09 04:32:22
|
|
[auth2-chall.c]
|
|
replace by-hand string building with xasprinf(); ok deraadt@
|
|
- sobrado@cvs.openbsd.org 2008/12/09 15:35:00
|
|
[sftp.1 sftp.c]
|
|
update for the synopses displayed by the 'help' command, there are a
|
|
few missing flags; add 'bye' to the output of 'help'; sorting and spacing.
|
|
jmc@ suggested replacing .Oo/.Oc with a single .Op macro.
|
|
ok jmc@
|
|
- stevesk@cvs.openbsd.org 2008/12/09 22:37:33
|
|
[clientloop.c]
|
|
fix typo in error message
|
|
- stevesk@cvs.openbsd.org 2008/12/10 03:55:20
|
|
[addrmatch.c]
|
|
o cannot be NULL here but use xfree() to be consistent; ok djm@
|
|
- stevesk@cvs.openbsd.org 2008/12/29 01:12:36
|
|
[ssh-keyscan.1]
|
|
fix example, default key type is rsa for 3+ years; from
|
|
frederic.perrin@resel.fr
|
|
- stevesk@cvs.openbsd.org 2008/12/29 02:23:26
|
|
[pathnames.h]
|
|
no need to escape single quotes in comments
|
|
- okan@cvs.openbsd.org 2008/12/30 00:46:56
|
|
[sshd_config.5]
|
|
add AllowAgentForwarding to available Match keywords list
|
|
ok djm
|
|
- djm@cvs.openbsd.org 2009/01/01 21:14:35
|
|
[channels.c]
|
|
call channel destroy callbacks on receipt of open failure messages.
|
|
fixes client hangs when connecting to a server that has MaxSessions=0
|
|
set spotted by imorgan AT nas.nasa.gov; ok markus@
|
|
- djm@cvs.openbsd.org 2009/01/01 21:17:36
|
|
[kexgexs.c]
|
|
fix hash calculation for KEXGEX: hash over the original client-supplied
|
|
values and not the sanity checked versions that we acutally use;
|
|
bz#1540 reported by john.smith AT arrows.demon.co.uk
|
|
ok markus@
|
|
- djm@cvs.openbsd.org 2009/01/14 01:38:06
|
|
[channels.c]
|
|
support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482;
|
|
"looks ok" markus@
|
|
- stevesk@cvs.openbsd.org 2009/01/15 17:38:43
|
|
[readconf.c]
|
|
1) use obsolete instead of alias for consistency
|
|
2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is
|
|
so move the comment.
|
|
3) reorder so like options are together
|
|
ok djm@
|
|
- djm@cvs.openbsd.org 2009/01/22 09:46:01
|
|
[channels.c channels.h session.c]
|
|
make Channel->path an allocated string, saving a few bytes here and
|
|
there and fixing bz#1380 in the process; ok markus@
|
|
- djm@cvs.openbsd.org 2009/01/22 09:49:57
|
|
[channels.c]
|
|
oops! I committed the wrong version of the Channel->path diff,
|
|
it was missing some tweaks suggested by stevesk@
|
|
- djm@cvs.openbsd.org 2009/01/22 10:02:34
|
|
[clientloop.c misc.c readconf.c readconf.h servconf.c servconf.h]
|
|
[serverloop.c ssh-keyscan.c ssh.c sshd.c]
|
|
make a2port() return -1 when it encounters an invalid port number
|
|
rather than 0, which it will now treat as valid (needed for future work)
|
|
adjust current consumers of a2port() to check its return value is <= 0,
|
|
which in turn required some things to be converted from u_short => int
|
|
make use of int vs. u_short consistent in some other places too
|
|
feedback & ok markus@
|
|
- djm@cvs.openbsd.org 2009/01/22 10:09:16
|
|
[auth-options.c]
|
|
another chunk of a2port() diff that got away. wtfdjm??
|
|
- djm@cvs.openbsd.org 2009/01/23 07:58:11
|
|
[myproposal.h]
|
|
prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC
|
|
modes; ok markus@
|
|
- naddy@cvs.openbsd.org 2009/01/24 17:10:22
|
|
[ssh_config.5 sshd_config.5]
|
|
sync list of preferred ciphers; ok djm@
|
|
- markus@cvs.openbsd.org 2009/01/26 09:58:15
|
|
[cipher.c cipher.h packet.c]
|
|
Work around the CPNI-957037 Plaintext Recovery Attack by always
|
|
reading 256K of data on packet size or HMAC errors (in CBC mode only).
|
|
Help, feedback and ok djm@
|
|
Feedback from Martin Albrecht and Paterson Kenny
|
|
|
|
20090107
|
|
- (djm) [uidswap.c] bz#1412: Support >16 supplemental groups in OS X.
|
|
Patch based on one from vgiffin AT apple.com; ok dtucker@
|
|
- (djm) [channels.c] bz#1419: support "on demand" X11 forwarding via
|
|
launchd on OS X; patch from vgiffin AT apple.com, slightly tweaked;
|
|
ok dtucker@
|
|
- (djm) [contrib/ssh-copy-id.1 contrib/ssh-copy-id] bz#1492: Make
|
|
ssh-copy-id copy id_rsa.pub by default (instead of the legacy "identity"
|
|
key). Patch from cjwatson AT debian.org
|
|
|
|
20090107
|
|
- (tim) [configure.ac defines.h openbsd-compat/port-uw.c
|
|
openbsd-compat/xcrypt.c] Add SECUREWARE support to OpenServer 6 SVR5 ABI.
|
|
OK djm@ dtucker@
|
|
- (tim) [configure.ac] Move check_for_libcrypt_later=1 in *-*-sysv5*) section.
|
|
OpenServer 6 doesn't need libcrypt.
|
|
|
|
20081209
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/12/09 02:38:18
|
|
[clientloop.c]
|
|
The ~C escape handler does not work correctly for multiplexed sessions -
|
|
it opens a commandline on the master session, instead of on the slave
|
|
that requested it. Disable it on slave sessions until such time as it
|
|
is fixed; bz#1543 report from Adrian Bridgett via Colin Watson
|
|
ok markus@
|
|
- djm@cvs.openbsd.org 2008/12/09 02:39:59
|
|
[sftp.c]
|
|
Deal correctly with failures in remote stat() operation in sftp,
|
|
correcting fail-on-error behaviour in batchmode. bz#1541 report and
|
|
fix from anedvedicky AT gmail.com; ok markus@
|
|
- djm@cvs.openbsd.org 2008/12/09 02:58:16
|
|
[readconf.c]
|
|
don't leave junk (free'd) pointers around in Forward *fwd argument on
|
|
failure; avoids double-free in ~C -L handler when given an invalid
|
|
forwarding specification; bz#1539 report from adejong AT debian.org
|
|
via Colin Watson; ok markus@ dtucker@
|
|
- djm@cvs.openbsd.org 2008/12/09 03:02:37
|
|
[sftp.1 sftp.c]
|
|
correct sftp(1) and corresponding usage syntax;
|
|
bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@
|
|
|
|
20081208
|
|
- (djm) [configure.ac] bz#1538: better test for ProPolice/SSP: actually
|
|
use some stack in main().
|
|
Report and suggested fix from vapier AT gentoo.org
|
|
- (djm) OpenBSD CVS Sync
|
|
- markus@cvs.openbsd.org 2008/12/02 19:01:07
|
|
[clientloop.c]
|
|
we have to use the recipient's channel number (RFC 4254) for
|
|
SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages,
|
|
otherwise we trigger 'Non-public channel' error messages on sshd
|
|
systems with clientkeepalive enabled; noticed by sturm; ok djm;
|
|
- markus@cvs.openbsd.org 2008/12/02 19:08:59
|
|
[serverloop.c]
|
|
backout 1.149, since it's not necessary and openssh clients send
|
|
broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
|
|
- markus@cvs.openbsd.org 2008/12/02 19:09:38
|
|
[channels.c]
|
|
s/remote_id/id/ to be more consistent with other code; ok djm@
|
|
|
|
20081201
|
|
- (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files
|
|
and tweak the is-sshd-running check in ssh-host-config. Patch from
|
|
vinschen at redhat com.
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- markus@cvs.openbsd.org 2008/11/21 15:47:38
|
|
[packet.c]
|
|
packet_disconnect() on padding error, too. should reduce the success
|
|
probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18
|
|
ok djm@
|
|
- dtucker@cvs.openbsd.org 2008/11/30 11:59:26
|
|
[monitor_fdpass.c]
|
|
Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@
|
|
|
|
20081123
|
|
- (dtucker) [monitor_fdpass.c] Reduce diff vs OpenBSD by moving some
|
|
declarations, removing an unnecessary union member and adding whitespace.
|
|
cmsgbuf.tmp thing spotted by des at des no, ok djm some time ago.
|
|
|
|
20081118
|
|
- (tim) [addrmatch.c configure.ac] Some platforms do not have sin6_scope_id
|
|
member of sockaddr_in6. Also reported in Bug 1491 by David Leonard. OK and
|
|
feedback by djm@
|
|
|
|
20081111
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- jmc@cvs.openbsd.org 2008/11/05 11:22:54
|
|
[servconf.c]
|
|
passord -> password;
|
|
fixes user/5975 from Rene Maroufi
|
|
- stevesk@cvs.openbsd.org 2008/11/07 00:42:12
|
|
[ssh-keygen.c]
|
|
spelling/typo in comment
|
|
- stevesk@cvs.openbsd.org 2008/11/07 18:50:18
|
|
[nchan.c]
|
|
add space to some log/debug messages for readability; ok djm@ markus@
|
|
- dtucker@cvs.openbsd.org 2008/11/07 23:34:48
|
|
[auth2-jpake.c]
|
|
Move JPAKE define to make life easier for portable. ok djm@
|
|
- tobias@cvs.openbsd.org 2008/11/09 12:34:47
|
|
[session.c ssh.1]
|
|
typo fixed (overriden -> overridden)
|
|
ok espie, jmc
|
|
- stevesk@cvs.openbsd.org 2008/11/11 02:58:09
|
|
[servconf.c]
|
|
USE_AFS not referenced so remove #ifdef. fixes sshd -T not printing
|
|
kerberosgetafstoken. ok dtucker@
|
|
(Id sync only, we still want the ifdef in portable)
|
|
- stevesk@cvs.openbsd.org 2008/11/11 03:55:11
|
|
[channels.c]
|
|
for sshd -T print 'permitopen any' vs. 'permitopen' for case of no
|
|
permitopen's; ok and input dtucker@
|
|
- djm@cvs.openbsd.org 2008/11/10 02:06:35
|
|
[regress/putty-ciphers.sh]
|
|
PuTTY supports AES CTR modes, so interop test against them too
|
|
|
|
20081105
|
|
- OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/11/03 08:59:41
|
|
[servconf.c]
|
|
include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.gov
|
|
- djm@cvs.openbsd.org 2008/11/04 07:58:09
|
|
[auth.c]
|
|
need unistd.h for close() prototype
|
|
(ID sync only)
|
|
- djm@cvs.openbsd.org 2008/11/04 08:22:13
|
|
[auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h]
|
|
[readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5]
|
|
[sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c]
|
|
[Makefile.in]
|
|
Add support for an experimental zero-knowledge password authentication
|
|
method using the J-PAKE protocol described in F. Hao, P. Ryan,
|
|
"Password Authenticated Key Exchange by Juggling", 16th Workshop on
|
|
Security Protocols, Cambridge, April 2008.
|
|
|
|
This method allows password-based authentication without exposing
|
|
the password to the server. Instead, the client and server exchange
|
|
cryptographic proofs to demonstrate of knowledge of the password while
|
|
revealing nothing useful to an attacker or compromised endpoint.
|
|
|
|
This is experimental, work-in-progress code and is presently
|
|
compiled-time disabled (turn on -DJPAKE in Makefile.inc).
|
|
|
|
"just commit it. It isn't too intrusive." deraadt@
|
|
- stevesk@cvs.openbsd.org 2008/11/04 19:18:00
|
|
[readconf.c]
|
|
because parse_forward() is now used to parse all forward types (DLR),
|
|
and it malloc's space for host variables, we don't need to malloc
|
|
here. fixes small memory leaks.
|
|
|
|
previously dynamic forwards were not parsed in parse_forward() and
|
|
space was not malloc'd in that case.
|
|
|
|
ok djm@
|
|
- stevesk@cvs.openbsd.org 2008/11/05 03:23:09
|
|
[clientloop.c ssh.1]
|
|
add dynamic forward escape command line; ok djm@
|
|
|
|
20081103
|
|
- OpenBSD CVS Sync
|
|
- sthen@cvs.openbsd.org 2008/07/24 23:55:30
|
|
[ssh-keygen.1]
|
|
Add "ssh-keygen -F -l" to synopsis (displays fingerprint from
|
|
known_hosts). ok djm@
|
|
- grunk@cvs.openbsd.org 2008/07/25 06:56:35
|
|
[ssh_config]
|
|
Add VisualHostKey to example file, ok djm@
|
|
- grunk@cvs.openbsd.org 2008/07/25 07:05:16
|
|
[key.c]
|
|
In random art visualization, make sure to use the end marker only at the
|
|
end. Initial diff by Dirk Loss, tweaks and ok djm@
|
|
- markus@cvs.openbsd.org 2008/07/31 14:48:28
|
|
[sshconnect2.c]
|
|
don't allocate space for empty banners; report t8m at centrum.cz;
|
|
ok deraadt
|
|
- krw@cvs.openbsd.org 2008/08/02 04:29:51
|
|
[ssh_config.5]
|
|
whitepsace -> whitespace. From Matthew Clarke via bugs@.
|
|
- djm@cvs.openbsd.org 2008/08/21 04:09:57
|
|
[session.c]
|
|
allow ForceCommand internal-sftp with arguments. based on patch from
|
|
michael.barabanov AT gmail.com; ok markus@
|
|
- djm@cvs.openbsd.org 2008/09/06 12:24:13
|
|
[kex.c]
|
|
OpenSSL 0.9.8h supplies a real EVP_sha256 so we do not need our
|
|
replacement anymore
|
|
(ID sync only for portable - we still need this)
|
|
- markus@cvs.openbsd.org 2008/09/11 14:22:37
|
|
[compat.c compat.h nchan.c ssh.c]
|
|
only send eow and no-more-sessions requests to openssh 5 and newer;
|
|
fixes interop problems with broken ssh v2 implementations; ok djm@
|
|
- millert@cvs.openbsd.org 2008/10/02 14:39:35
|
|
[session.c]
|
|
Convert an unchecked strdup to xstrdup. OK deraadt@
|
|
- jmc@cvs.openbsd.org 2008/10/03 13:08:12
|
|
[sshd.8]
|
|
do not give an example of how to chmod files: we can presume the user
|
|
knows that. removes an ambiguity in the permission of authorized_keys;
|
|
ok deraadt
|
|
- deraadt@cvs.openbsd.org 2008/10/03 23:56:28
|
|
[sshconnect2.c]
|
|
Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the
|
|
function.
|
|
spotted by des@freebsd, who commited an incorrect fix to the freebsd tree
|
|
and (as is fairly typical) did not report the problem to us. But this fix
|
|
is correct.
|
|
ok djm
|
|
- djm@cvs.openbsd.org 2008/10/08 23:34:03
|
|
[ssh.1 ssh.c]
|
|
Add -y option to force logging via syslog rather than stderr.
|
|
Useful for daemonised ssh connection (ssh -f). Patch originally from
|
|
and ok'd by markus@
|
|
- djm@cvs.openbsd.org 2008/10/09 03:50:54
|
|
[servconf.c sshd_config.5]
|
|
support setting PermitEmptyPasswords in a Match block
|
|
requested in PR3891; ok dtucker@
|
|
- jmc@cvs.openbsd.org 2008/10/09 06:54:22
|
|
[ssh.c]
|
|
add -y to usage();
|
|
- stevesk@cvs.openbsd.org 2008/10/10 04:55:16
|
|
[scp.c]
|
|
spelling in comment; ok djm@
|
|
- stevesk@cvs.openbsd.org 2008/10/10 05:00:12
|
|
[key.c]
|
|
typo in error message; ok djm@
|
|
- stevesk@cvs.openbsd.org 2008/10/10 16:43:27
|
|
[ssh_config.5]
|
|
use 'Privileged ports can be forwarded only when logging in as root on
|
|
the remote machine.' for RemoteForward just like ssh.1 -R.
|
|
ok djm@ jmc@
|
|
- stevesk@cvs.openbsd.org 2008/10/14 18:11:33
|
|
[sshconnect.c]
|
|
use #define ROQUIET here; no binary change. ok dtucker@
|
|
- stevesk@cvs.openbsd.org 2008/10/17 18:36:24
|
|
[ssh_config.5]
|
|
correct and clarify VisualHostKey; ok jmc@
|
|
- stevesk@cvs.openbsd.org 2008/10/30 19:31:16
|
|
[clientloop.c sshd.c]
|
|
don't need to #include "monitor_fdpass.h"
|
|
- stevesk@cvs.openbsd.org 2008/10/31 15:05:34
|
|
[dispatch.c]
|
|
remove unused #define DISPATCH_MIN; ok markus@
|
|
- djm@cvs.openbsd.org 2008/11/01 04:50:08
|
|
[sshconnect2.c]
|
|
sprinkle ARGSUSED on dispatch handlers
|
|
nuke stale unusued prototype
|
|
- stevesk@cvs.openbsd.org 2008/11/01 06:43:33
|
|
[channels.c]
|
|
fix some typos in log messages; ok djm@
|
|
- sobrado@cvs.openbsd.org 2008/11/01 11:14:36
|
|
[ssh-keyscan.1 ssh-keyscan.c]
|
|
the ellipsis is not an optional argument; while here, improve spacing.
|
|
- stevesk@cvs.openbsd.org 2008/11/01 17:40:33
|
|
[clientloop.c readconf.c readconf.h ssh.c]
|
|
merge dynamic forward parsing into parse_forward();
|
|
'i think this is OK' djm@
|
|
- stevesk@cvs.openbsd.org 2008/11/02 00:16:16
|
|
[ttymodes.c]
|
|
protocol 2 tty modes support is now 7.5 years old so remove these
|
|
debug3()s; ok deraadt@
|
|
- stevesk@cvs.openbsd.org 2008/11/03 01:07:02
|
|
[readconf.c]
|
|
remove valueless comment
|
|
- stevesk@cvs.openbsd.org 2008/11/03 02:44:41
|
|
[readconf.c]
|
|
fix comment
|
|
- (djm) [contrib/caldera/ssh-host-keygen contrib/suse/rc.sshd]
|
|
Make example scripts generate keys with default sizes rather than fixed,
|
|
non-default 1024 bits; patch from imorgan AT nas.nasa.gov
|
|
- (djm) [contrib/sshd.pam.generic contrib/caldera/sshd.pam]
|
|
[contrib/redhat/sshd.pam] Move pam_nologin to account group from
|
|
incorrect auth group in example files;
|
|
patch from imorgan AT nas.nasa.gov
|
|
|
|
20080906
|
|
- (dtucker) [config.guess config.sub] Update to latest versions from
|
|
http://git.savannah.gnu.org/gitweb/ (2008-04-14 and 2008-06-16
|
|
respectively).
|
|
|
|
20080830
|
|
- (dtucker) [openbsd-compat/bsd-poll.c] correctly check for number of FDs
|
|
larger than FD_SETSIZE (OpenSSH only ever uses poll with one fd). Patch
|
|
from Nicholas Marriott.
|
|
|
|
20080721
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/07/23 07:36:55
|
|
[servconf.c]
|
|
do not try to print options that have been compile-time disabled
|
|
in config test mode (sshd -T); report from nix-corp AT esperi.org.uk
|
|
ok dtucker@
|
|
- (djm) [servconf.c] Print UsePAM option in config test mode (when it
|
|
has been compiled in); report from nix-corp AT esperi.org.uk
|
|
ok dtucker@
|
|
|
|
20080721
|
|
- (djm) OpenBSD CVS Sync
|
|
- jmc@cvs.openbsd.org 2008/07/18 22:51:01
|
|
[sftp-server.8]
|
|
no need for .Pp before or after .Sh;
|
|
- djm@cvs.openbsd.org 2008/07/21 08:19:07
|
|
[version.h]
|
|
openssh-5.1
|
|
- (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
|
|
[contrib/suse/openssh.spec] Update version number in README and RPM specs
|
|
- (djm) Release OpenSSH-5.1
|
|
|
|
20080717
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/07/17 08:48:00
|
|
[sshconnect2.c]
|
|
strnvis preauth banner; pointed out by mpf@ ok markus@
|
|
- djm@cvs.openbsd.org 2008/07/17 08:51:07
|
|
[auth2-hostbased.c]
|
|
strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes
|
|
report and patch from res AT qoxp.net (bz#1200); ok markus@
|
|
- (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat
|
|
code, replace with equivalent cygwin library call. Patch from vinschen
|
|
at redhat.com, ok djm@.
|
|
- (djm) [sshconnect2.c] vis.h isn't available everywhere
|
|
|
|
20080716
|
|
- OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/07/15 02:23:14
|
|
[sftp.1]
|
|
number of pipelined requests is now 64;
|
|
prodded by Iain.Morgan AT nasa.gov
|
|
- djm@cvs.openbsd.org 2008/07/16 11:51:14
|
|
[clientloop.c]
|
|
rename variable first_gc -> last_gc (since it is actually the last
|
|
in the list).
|
|
- djm@cvs.openbsd.org 2008/07/16 11:52:19
|
|
[channels.c]
|
|
this loop index should be automatic, not static
|
|
|
|
20080714
|
|
- (djm) OpenBSD CVS Sync
|
|
- sthen@cvs.openbsd.org 2008/07/13 21:22:52
|
|
[ssh-keygen.c]
|
|
Change "ssh-keygen -F [host] -l" to not display random art unless
|
|
-v is also specified, making it consistent with the manual and other
|
|
uses of -l.
|
|
ok grunk@
|
|
- djm@cvs.openbsd.org 2008/07/13 22:13:07
|
|
[channels.c]
|
|
use struct sockaddr_storage instead of struct sockaddr for accept(2)
|
|
address argument. from visibilis AT yahoo.com in bz#1485; ok markus@
|
|
- djm@cvs.openbsd.org 2008/07/13 22:16:03
|
|
[sftp.c]
|
|
increase number of piplelined requests so they properly fill the
|
|
(recently increased) channel window. prompted by rapier AT psc.edu;
|
|
ok markus@
|
|
- djm@cvs.openbsd.org 2008/07/14 01:55:56
|
|
[sftp-server.8]
|
|
mention requirement for /dev/log inside chroot when using sftp-server
|
|
with ChrootDirectory
|
|
- (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to
|
|
avoid clash with sin(3) function; reported by
|
|
cristian.ionescu-idbohrn AT axis.com
|
|
- (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close()
|
|
prototype; reported by cristian.ionescu-idbohrn AT axis.com
|
|
- (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;
|
|
reported by cristian.ionescu-idbohrn AT axis.com
|
|
- (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config]
|
|
[contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd]
|
|
Revamped and simplified Cygwin ssh-host-config script that uses
|
|
unified csih configuration tool. Requires recent Cygwin.
|
|
Patch from vinschen AT redhat.com
|
|
|
|
20080712
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/07/12 04:52:50
|
|
[channels.c]
|
|
unbreak; move clearing of cctx struct to before first use
|
|
reported by dkrause@
|
|
- djm@cvs.openbsd.org 2008/07/12 05:33:41
|
|
[scp.1]
|
|
better description for -i flag:
|
|
s/RSA authentication/public key authentication/
|
|
- (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h]
|
|
return EAI_FAMILY when trying to lookup unsupported address family;
|
|
from vinschen AT redhat.com
|
|
|
|
20080711
|
|
- (djm) OpenBSD CVS Sync
|
|
- stevesk@cvs.openbsd.org 2008/07/07 00:31:41
|
|
[ttymodes.c]
|
|
we don't need arg after the debug3() was removed. from lint.
|
|
ok djm@
|
|
- stevesk@cvs.openbsd.org 2008/07/07 23:32:51
|
|
[key.c]
|
|
/*NOTREACHED*/ for lint warning:
|
|
warning: function key_equal falls off bottom without returning value
|
|
ok djm@
|
|
- markus@cvs.openbsd.org 2008/07/10 18:05:58
|
|
[channels.c]
|
|
missing bzero; from mickey; ok djm@
|
|
- markus@cvs.openbsd.org 2008/07/10 18:08:11
|
|
[clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c]
|
|
sync v1 and v2 traffic accounting; add it to sshd, too;
|
|
ok djm@, dtucker@
|
|
|
|
20080709
|
|
- (djm) [Makefile.in] Print "all tests passed" when all regress tests pass
|
|
- (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM
|
|
account check failure path. The vulnerable format buffer is supplied
|
|
from PAM and should not contain attacker-supplied data.
|
|
- (djm) [auth.c] Missing unistd.h for close()
|
|
- (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x
|
|
|
|
20080705
|
|
- (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed
|
|
passwords disabled. bz#1083 report & patch from senthilkumar_sen AT
|
|
hotpop.com, w/ dtucker@
|
|
- (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for
|
|
Tru64. readv doesn't seem to be a comparable object there.
|
|
bz#1386, patch from dtucker@ ok me
|
|
- (djm) [Makefile.in] Pass though pass to conch for interop tests
|
|
- (djm) [configure.ac] unbreak: remove extra closing brace
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/07/04 23:08:25
|
|
[packet.c]
|
|
handle EINTR in packet_write_poll()l ok dtucker@
|
|
- djm@cvs.openbsd.org 2008/07/04 23:30:16
|
|
[auth1.c auth2.c]
|
|
Make protocol 1 MaxAuthTries logic match protocol 2's.
|
|
Do not treat the first protocol 2 authentication attempt as
|
|
a failure IFF it is for method "none".
|
|
Makes MaxAuthTries' user-visible behaviour identical for
|
|
protocol 1 vs 2.
|
|
ok dtucker@
|
|
- djm@cvs.openbsd.org 2008/07/05 05:16:01
|
|
[PROTOCOL]
|
|
grammar
|
|
|
|
20080704
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/07/02 13:30:34
|
|
[auth2.c]
|
|
really really remove the freebie "none" auth try for protocol 2
|
|
- djm@cvs.openbsd.org 2008/07/02 13:47:39
|
|
[ssh.1 ssh.c]
|
|
When forking after authentication ("ssh -f") with ExitOnForwardFailure
|
|
enabled, delay the fork until after replies for any -R forwards have
|
|
been seen. Allows for robust detection of -R forward failure when
|
|
using -f (similar to bz#92); ok dtucker@
|
|
- otto@cvs.openbsd.org 2008/07/03 21:46:58
|
|
[auth2-pubkey.c]
|
|
avoid nasty double free; ok dtucker@ djm@
|
|
- djm@cvs.openbsd.org 2008/07/04 03:44:59
|
|
[servconf.c groupaccess.h groupaccess.c]
|
|
support negation of groups in "Match group" block (bz#1315); ok dtucker@
|
|
- dtucker@cvs.openbsd.org 2008/07/04 03:47:02
|
|
[monitor.c]
|
|
Make debug a little clearer. ok djm@
|
|
- djm@cvs.openbsd.org 2008/06/30 08:07:34
|
|
[regress/key-options.sh]
|
|
shell portability: use "=" instead of "==" in test(1) expressions,
|
|
double-quote string with backslash escaped /
|
|
- djm@cvs.openbsd.org 2008/06/30 10:31:11
|
|
[regress/{putty-transfer,putty-kex,putty-ciphers}.sh]
|
|
remove "set -e" left over from debugging
|
|
- djm@cvs.openbsd.org 2008/06/30 10:43:03
|
|
[regress/conch-ciphers.sh]
|
|
explicitly disable conch options that could interfere with the test
|
|
- (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
|
|
returns EXDEV. Patch from Mike Garrison, ok djm@
|
|
- (djm) [atomicio.c channels.c clientloop.c defines.h includes.h]
|
|
[packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c]
|
|
[sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on
|
|
some platforms (HP nonstop) it is a distinct errno;
|
|
bz#1467 reported by sconeu AT yahoo.com; ok dtucker@
|
|
|
|
20080702
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/06/30 08:05:59
|
|
[PROTOCOL.agent]
|
|
typo: s/constraint_date/constraint_data/
|
|
- djm@cvs.openbsd.org 2008/06/30 12:15:39
|
|
[serverloop.c]
|
|
only pass channel requests on session channels through to the session
|
|
channel handler, avoiding spurious log messages; ok! markus@
|
|
- djm@cvs.openbsd.org 2008/06/30 12:16:02
|
|
[nchan.c]
|
|
only send eow@openssh.com notifications for session channels; ok! markus@
|
|
- djm@cvs.openbsd.org 2008/06/30 12:18:34
|
|
[PROTOCOL]
|
|
clarify that eow@openssh.com is only sent on session channels
|
|
- dtucker@cvs.openbsd.org 2008/07/01 07:20:52
|
|
[sshconnect.c]
|
|
Check ExitOnForwardFailure if forwardings are disabled due to a failed
|
|
host key check. ok djm@
|
|
- dtucker@cvs.openbsd.org 2008/07/01 07:24:22
|
|
[sshconnect.c sshd.c]
|
|
Send CR LF during protocol banner exchanges, but only for Protocol 2 only,
|
|
in order to comply with RFC 4253. bz #1443, ok djm@
|
|
- stevesk@cvs.openbsd.org 2008/07/01 23:12:47
|
|
[PROTOCOL.agent]
|
|
fix some typos; ok djm@
|
|
- djm@cvs.openbsd.org 2008/07/02 02:24:18
|
|
[sshd_config sshd_config.5 sshd.8 servconf.c]
|
|
increase default size of ssh protocol 1 ephemeral key from 768 to 1024
|
|
bits; prodded by & ok dtucker@ ok deraadt@
|
|
- dtucker@cvs.openbsd.org 2008/07/02 12:03:51
|
|
[auth-rsa.c auth.c auth2-pubkey.c auth.h]
|
|
Merge duplicate host key file checks, based in part on a patch from Rob
|
|
Holland via bz #1348 . Also checks for non-regular files during protocol
|
|
1 RSA auth. ok djm@
|
|
- djm@cvs.openbsd.org 2008/07/02 12:36:39
|
|
[auth2-none.c auth2.c]
|
|
Make protocol 2 MaxAuthTries behaviour a little more sensible:
|
|
Check whether client has exceeded MaxAuthTries before running
|
|
an authentication method and skip it if they have, previously it
|
|
would always allow one try (for "none" auth).
|
|
Preincrement failure count before post-auth test - previously this
|
|
checked and postincremented, also to allow one "none" try.
|
|
Together, these two changes always count the "none" auth method
|
|
which could be skipped by a malicious client (e.g. an SSH worm)
|
|
to get an extra attempt at a real auth method. They also make
|
|
MaxAuthTries=0 a useful way to block users entirely (esp. in a
|
|
sshd_config Match block).
|
|
Also, move sending of any preauth banner from "none" auth method
|
|
to the first call to input_userauth_request(), so worms that skip
|
|
the "none" method get to see it too.
|
|
|
|
20080630
|
|
- (djm) OpenBSD CVS Sync
|
|
- dtucker@cvs.openbsd.org 2008/06/10 23:13:43
|
|
[regress/Makefile regress/key-options.sh]
|
|
Add regress test for key options. ok djm@
|
|
- dtucker@cvs.openbsd.org 2008/06/11 23:11:40
|
|
[regress/Makefile]
|
|
Don't run cipher-speed test by default; mistakenly enabled by me
|
|
- djm@cvs.openbsd.org 2008/06/28 13:57:25
|
|
[regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh]
|
|
very basic regress test against Twisted Conch in "make interop"
|
|
target (conch is available in ports/devel/py-twisted/conch);
|
|
ok markus@
|
|
- (djm) [regress/Makefile] search for conch by path, like we do putty
|
|
|
|
20080629
|
|
- (djm) OpenBSD CVS Sync
|
|
- martynas@cvs.openbsd.org 2008/06/21 07:46:46
|
|
[sftp.c]
|
|
use optopt to get invalid flag, instead of return value of getopt,
|
|
which is always '?'; ok djm@
|
|
- otto@cvs.openbsd.org 2008/06/25 11:13:43
|
|
[key.c]
|
|
add key length to visual fingerprint; zap magical constants;
|
|
ok grunk@ djm@
|
|
- djm@cvs.openbsd.org 2008/06/26 06:10:09
|
|
[sftp-client.c sftp-server.c]
|
|
allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky
|
|
bits. Note that this only affects explicit setting of modes (e.g. via
|
|
sftp(1)'s chmod command) and not file transfers. (bz#1310)
|
|
ok deraadt@ at c2k8
|
|
- djm@cvs.openbsd.org 2008/06/26 09:19:40
|
|
[dh.c dh.h moduli.c]
|
|
when loading moduli from /etc/moduli in sshd(8), check that they
|
|
are of the expected "safe prime" structure and have had
|
|
appropriate primality tests performed;
|
|
feedback and ok dtucker@
|
|
- grunk@cvs.openbsd.org 2008/06/26 11:46:31
|
|
[readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c]
|
|
Move SSH Fingerprint Visualization away from sharing the config option
|
|
CheckHostIP to an own config option named VisualHostKey.
|
|
While there, fix the behaviour that ssh would draw a random art picture
|
|
on every newly seen host even when the option was not enabled.
|
|
prodded by deraadt@, discussions,
|
|
help and ok markus@ djm@ dtucker@
|
|
- jmc@cvs.openbsd.org 2008/06/26 21:11:46
|
|
[ssh.1]
|
|
add VisualHostKey to the list of options listed in -o;
|
|
- djm@cvs.openbsd.org 2008/06/28 07:25:07
|
|
[PROTOCOL]
|
|
spelling fixes
|
|
- djm@cvs.openbsd.org 2008/06/28 13:58:23
|
|
[ssh-agent.c]
|
|
refuse to add a key that has unknown constraints specified;
|
|
ok markus
|
|
- djm@cvs.openbsd.org 2008/06/28 14:05:15
|
|
[ssh-agent.c]
|
|
reset global compat flag after processing a protocol 2 signature
|
|
request with the legacy DSA encoding flag set; ok markus
|
|
- djm@cvs.openbsd.org 2008/06/28 14:08:30
|
|
[PROTOCOL PROTOCOL.agent]
|
|
document the protocol used by ssh-agent; "looks ok" markus@
|
|
|
|
20080628
|
|
- (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
|
|
RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).
|
|
|
|
20080626
|
|
- (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
|
|
(bz#1372)
|
|
- (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
|
|
[contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.
|
|
|
|
20080616
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- dtucker@cvs.openbsd.org 2008/06/16 13:22:53
|
|
[session.c channels.c]
|
|
Rename the isatty argument to is_tty so we don't shadow
|
|
isatty(3). ok markus@
|
|
- (dtucker) [channels.c] isatty -> is_tty here too.
|
|
|
|
20080615
|
|
- (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.
|
|
- OpenBSD CVS Sync
|
|
- dtucker@cvs.openbsd.org 2008/06/14 15:49:48
|
|
[sshd.c]
|
|
wrap long line at 80 chars
|
|
- dtucker@cvs.openbsd.org 2008/06/14 17:07:11
|
|
[sshd.c]
|
|
ensure default umask disallows at least group and world write; ok djm@
|
|
- djm@cvs.openbsd.org 2008/06/14 18:33:43
|
|
[session.c]
|
|
suppress the warning message from chdir(homedir) failures
|
|
when chrooted (bz#1461); ok dtucker
|
|
- dtucker@cvs.openbsd.org 2008/06/14 19:42:10
|
|
[scp.1]
|
|
Mention that scp follows symlinks during -r. bz #1466,
|
|
from nectar at apple
|
|
- dtucker@cvs.openbsd.org 2008/06/15 16:55:38
|
|
[sshd_config.5]
|
|
MaxSessions is allowed in a Match block too
|
|
- dtucker@cvs.openbsd.org 2008/06/15 16:58:40
|
|
[servconf.c sshd_config.5]
|
|
Allow MaxAuthTries within a Match block. ok djm@
|
|
- djm@cvs.openbsd.org 2008/06/15 20:06:26
|
|
[channels.c channels.h session.c]
|
|
don't call isatty() on a pty master, instead pass a flag down to
|
|
channel_set_fds() indicating that te fds refer to a tty. Fixes a
|
|
hang on exit on Solaris (bz#1463) in portable but is actually
|
|
a generic bug; ok dtucker deraadt markus
|
|
|
|
20080614
|
|
- (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
|
|
replacement code; patch from ighighi AT gmail.com in bz#1240;
|
|
ok dtucker
|
|
|
|
20080613
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- deraadt@cvs.openbsd.org 2008/06/13 09:44:36
|
|
[packet.c]
|
|
compile on older gcc; no decl after code
|
|
- dtucker@cvs.openbsd.org 2008/06/13 13:56:59
|
|
[monitor.c]
|
|
Clear key options in the monitor on failed authentication, prevents
|
|
applying additional restrictions to non-pubkey authentications in
|
|
the case where pubkey fails but another method subsequently succeeds.
|
|
bz #1472, found by Colin Watson, ok markus@ djm@
|
|
- dtucker@cvs.openbsd.org 2008/06/13 14:18:51
|
|
[auth2-pubkey.c auth-rhosts.c]
|
|
Include unistd.h for close(), prevents warnings in -portable
|
|
- dtucker@cvs.openbsd.org 2008/06/13 17:21:20
|
|
[mux.c]
|
|
Friendlier error messages for mux fallback. ok djm@
|
|
- dtucker@cvs.openbsd.org 2008/06/13 18:55:22
|
|
[scp.c]
|
|
Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@
|
|
- grunk@cvs.openbsd.org 2008/06/13 20:13:26
|
|
[ssh.1]
|
|
Explain the use of SSH fpr visualization using random art, and cite the
|
|
original scientific paper inspiring that technique.
|
|
Much help with English and nroff by jmc@, thanks.
|
|
- (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
|
|
despite its name doesn't seem to implement all of GSSAPI. Patch from
|
|
Jan Engelhardt, sanity checked by Simon Wilkinson.
|
|
|
|
20080612
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- jmc@cvs.openbsd.org 2008/06/11 07:30:37
|
|
[sshd.8]
|
|
kill trailing whitespace;
|
|
- grunk@cvs.openbsd.org 2008/06/11 21:01:35
|
|
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
|
|
sshconnect.c]
|
|
Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
|
|
graphical hash visualization schemes known as "random art", and by
|
|
Dan Kaminsky's musings on the subject during a BlackOp talk at the
|
|
23C3 in Berlin.
|
|
Scientific publication (original paper):
|
|
"Hash Visualization: a New Technique to improve Real-World Security",
|
|
Perrig A. and Song D., 1999, International Workshop on Cryptographic
|
|
Techniques and E-Commerce (CrypTEC '99)
|
|
http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
|
|
The algorithm used here is a worm crawling over a discrete plane,
|
|
leaving a trace (augmenting the field) everywhere it goes.
|
|
Movement is taken from dgst_raw 2bit-wise. Bumping into walls
|
|
makes the respective movement vector be ignored for this turn,
|
|
thus switching to the other color of the chessboard.
|
|
Graphs are not unambiguous for now, because circles in graphs can be
|
|
walked in either direction.
|
|
discussions with several people,
|
|
help, corrections and ok markus@ djm@
|
|
- grunk@cvs.openbsd.org 2008/06/11 21:38:25
|
|
[ssh-keygen.c]
|
|
ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
|
|
would not display you the random art as intended, spotted by canacar@
|
|
- grunk@cvs.openbsd.org 2008/06/11 22:20:46
|
|
[ssh-keygen.c ssh-keygen.1]
|
|
ssh-keygen would write fingerprints to STDOUT, and random art to STDERR,
|
|
that is not how it was envisioned.
|
|
Also correct manpage saying that -v is needed along with -l for it to work.
|
|
spotted by naddy@
|
|
- otto@cvs.openbsd.org 2008/06/11 23:02:22
|
|
[key.c]
|
|
simpler way of computing the augmentations; ok grunk@
|
|
- grunk@cvs.openbsd.org 2008/06/11 23:03:56
|
|
[ssh_config.5]
|
|
CheckHostIP set to ``fingerprint'' will display both hex and random art
|
|
spotted by naddy@
|
|
- grunk@cvs.openbsd.org 2008/06/11 23:51:57
|
|
[key.c]
|
|
#define statements that are not atoms need braces around them, else they
|
|
will cause trouble in some cases.
|
|
Also do a computation of -1 once, and not in a loop several times.
|
|
spotted by otto@
|
|
- dtucker@cvs.openbsd.org 2008/06/12 00:03:49
|
|
[dns.c canohost.c sshconnect.c]
|
|
Do not pass "0" strings as ports to getaddrinfo because the lookups
|
|
can slow things down and we never use the service info anyway. bz
|
|
#859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok
|
|
deraadt@ djm@
|
|
djm belives that the reason for the "0" strings is to ensure that
|
|
it's not possible to call getaddrinfo with both host and port being
|
|
NULL. In the case of canohost.c host is a local array. In the
|
|
case of sshconnect.c, it's checked for null immediately before use.
|
|
In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
|
|
be non-null but it's not obvious, so I added a warning message in
|
|
case it is ever passed a null.
|
|
- grunk@cvs.openbsd.org 2008/06/12 00:13:55
|
|
[sshconnect.c]
|
|
Make ssh print the random art also when ssh'ing to a host using IP only.
|
|
spotted by naddy@, ok and help djm@ dtucker@
|
|
- otto@cvs.openbsd.org 2008/06/12 00:13:13
|
|
[key.c]
|
|
use an odd number of rows and columns and a separate start marker, looks
|
|
better; ok grunk@
|
|
- djm@cvs.openbsd.org 2008/06/12 03:40:52
|
|
[clientloop.h mux.c channels.c clientloop.c channels.h]
|
|
Enable ~ escapes for multiplex slave sessions; give each channel
|
|
its own escape state and hook the escape filters up to muxed
|
|
channels. bz #1331
|
|
Mux slaves do not currently support the ~^Z and ~& escapes.
|
|
NB. this change cranks the mux protocol version, so a new ssh
|
|
mux client will not be able to connect to a running old ssh
|
|
mux master.
|
|
ok dtucker@
|
|
- djm@cvs.openbsd.org 2008/06/12 04:06:00
|
|
[clientloop.h ssh.c clientloop.c]
|
|
maintain an ordered queue of outstanding global requests that we
|
|
expect replies to, similar to the per-channel confirmation queue.
|
|
Use this queue to verify success or failure for remote forward
|
|
establishment in a race free way.
|
|
ok dtucker@
|
|
- djm@cvs.openbsd.org 2008/06/12 04:17:47
|
|
[clientloop.c]
|
|
thall shalt not code past the eightieth column
|
|
- djm@cvs.openbsd.org 2008/06/12 04:24:06
|
|
[ssh.c]
|
|
thal shalt not code past the eightieth column
|
|
- djm@cvs.openbsd.org 2008/06/12 05:15:41
|
|
[PROTOCOL]
|
|
document tun@openssh.com forwarding method
|
|
- djm@cvs.openbsd.org 2008/06/12 05:32:30
|
|
[mux.c]
|
|
some more TODO for me
|
|
- grunk@cvs.openbsd.org 2008/06/12 05:42:46
|
|
[key.c]
|
|
supply the key type (rsa1, rsa, dsa) as a caption in the frame of the
|
|
random art. while there, stress the fact that the field base should at
|
|
least be 8 characters for the pictures to make sense.
|
|
comment and ok djm@
|
|
- grunk@cvs.openbsd.org 2008/06/12 06:32:59
|
|
[key.c]
|
|
We already mark the start of the worm, now also mark the end of the worm
|
|
in our random art drawings.
|
|
ok djm@
|
|
- djm@cvs.openbsd.org 2008/06/12 15:19:17
|
|
[clientloop.h channels.h clientloop.c channels.c mux.c]
|
|
The multiplexing escape char handler commit last night introduced a
|
|
small memory leak per session; plug it.
|
|
- dtucker@cvs.openbsd.org 2008/06/12 16:35:31
|
|
[ssh_config.5 ssh.c]
|
|
keyword expansion for localcommand. ok djm@
|
|
- jmc@cvs.openbsd.org 2008/06/12 19:10:09
|
|
[ssh_config.5 ssh-keygen.1]
|
|
tweak the ascii art text; ok grunk
|
|
- dtucker@cvs.openbsd.org 2008/06/12 20:38:28
|
|
[sshd.c sshconnect.c packet.h misc.c misc.h packet.c]
|
|
Make keepalive timeouts apply while waiting for a packet, particularly
|
|
during key renegotiation (bz #1363). With djm and Matt Day, ok djm@
|
|
- djm@cvs.openbsd.org 2008/06/12 20:47:04
|
|
[sftp-client.c]
|
|
print extension revisions for extensions that we understand
|
|
- djm@cvs.openbsd.org 2008/06/12 21:06:25
|
|
[clientloop.c]
|
|
I was coalescing expected global request confirmation replies at
|
|
the wrong end of the queue - fix; prompted by markus@
|
|
- grunk@cvs.openbsd.org 2008/06/12 21:14:46
|
|
[ssh-keygen.c]
|
|
make ssh-keygen -lf show the key type just as ssh-add -l would do it
|
|
ok djm@ markus@
|
|
- grunk@cvs.openbsd.org 2008/06/12 22:03:36
|
|
[key.c]
|
|
add my copyright, ok djm@
|
|
- ian@cvs.openbsd.org 2008/06/12 23:24:58
|
|
[sshconnect.c]
|
|
tweak wording in message, ok deraadt@ jmc@
|
|
- dtucker@cvs.openbsd.org 2008/06/13 00:12:02
|
|
[sftp.h log.h]
|
|
replace __dead with __attribute__((noreturn)), makes things
|
|
a little easier to port. Also, add it to sigdie(). ok djm@
|
|
- djm@cvs.openbsd.org 2008/06/13 00:16:49
|
|
[mux.c]
|
|
fall back to creating a new TCP connection on most multiplexing errors
|
|
(socket connect fail, invalid version, refused permittion, corrupted
|
|
messages, etc.); bz #1329 ok dtucker@
|
|
- dtucker@cvs.openbsd.org 2008/06/13 00:47:53
|
|
[mux.c]
|
|
upcast size_t to u_long to match format arg; ok djm@
|
|
- dtucker@cvs.openbsd.org 2008/06/13 00:51:47
|
|
[mac.c]
|
|
upcast another size_t to u_long to match format
|
|
- dtucker@cvs.openbsd.org 2008/06/13 01:38:23
|
|
[misc.c]
|
|
upcast uid to long with matching %ld, prevents warnings in portable
|
|
- djm@cvs.openbsd.org 2008/06/13 04:40:22
|
|
[auth2-pubkey.c auth-rhosts.c]
|
|
refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not
|
|
regular files; report from Solar Designer via Colin Watson in bz#1471
|
|
ok dtucker@ deraadt
|
|
- (dtucker) [clientloop.c serverloop.c] channel_register_filter now
|
|
takes 2 more args. with djm@
|
|
- (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
|
|
from Todd Vierling.
|
|
- (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
|
|
systems. Patch from R. Scott Bailey.
|
|
- (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
|
|
on big endian machines, so ifdef them for little-endian only to prevent
|
|
unused function warnings on big-endians.
|
|
- (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
|
|
compiler warnings on some platforms. Based on a discussion with otto@
|
|
|
|
20080611
|
|
- (djm) [channels.c configure.ac]
|
|
Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no)
|
|
bz#1464; ok dtucker
|
|
|
|
20080610
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/06/10 03:57:27
|
|
[servconf.c match.h sshd_config.5]
|
|
support CIDR address matching in sshd_config "Match address" blocks, with
|
|
full support for negation and fall-back to classic wildcard matching.
|
|
For example:
|
|
Match address 192.0.2.0/24,3ffe:ffff::/32,!10.*
|
|
PasswordAuthentication yes
|
|
addrmatch.c code mostly lifted from flowd's addr.c
|
|
feedback and ok dtucker@
|
|
- djm@cvs.openbsd.org 2008/06/10 04:17:46
|
|
[sshd_config.5]
|
|
better reference for pattern-list
|
|
- dtucker@cvs.openbsd.org 2008/06/10 04:50:25
|
|
[sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8]
|
|
Add extended test mode (-T) and connection parameters for test mode (-C).
|
|
-T causes sshd to write its effective configuration to stdout and exit.
|
|
-C causes any relevant Match rules to be applied before output. The
|
|
combination allows tesing of the parser and config files. ok deraadt djm
|
|
- jmc@cvs.openbsd.org 2008/06/10 07:12:00
|
|
[sshd_config.5]
|
|
tweak previous;
|
|
- jmc@cvs.openbsd.org 2008/06/10 08:17:40
|
|
[sshd.8 sshd.c]
|
|
- update usage()
|
|
- fix SYNOPSIS, and sort options
|
|
- some minor additional fixes
|
|
- dtucker@cvs.openbsd.org 2008/06/09 18:06:32
|
|
[regress/test-exec.sh]
|
|
Don't generate putty keys if we're not going to use them. ok djm
|
|
- dtucker@cvs.openbsd.org 2008/06/10 05:23:32
|
|
[regress/addrmatch.sh regress/Makefile]
|
|
Regress test for Match CIDR rules. ok djm@
|
|
- dtucker@cvs.openbsd.org 2008/06/10 15:21:41
|
|
[test-exec.sh]
|
|
Use a more portable construct for checking if we're running a putty test
|
|
- dtucker@cvs.openbsd.org 2008/06/10 15:28:49
|
|
[test-exec.sh]
|
|
Add quotes
|
|
- dtucker@cvs.openbsd.org 2008/06/10 18:21:24
|
|
[ssh_config.5]
|
|
clarify that Host patterns are space-separated. ok deraadt
|
|
- djm@cvs.openbsd.org 2008/06/10 22:15:23
|
|
[PROTOCOL ssh.c serverloop.c]
|
|
Add a no-more-sessions@openssh.com global request extension that the
|
|
client sends when it knows that it will never request another session
|
|
(i.e. when session multiplexing is disabled). This allows a server to
|
|
disallow further session requests and terminate the session.
|
|
Why would a non-multiplexing client ever issue additional session
|
|
requests? It could have been attacked with something like SSH'jack:
|
|
http://www.storm.net.nz/projects/7
|
|
feedback & ok markus
|
|
- djm@cvs.openbsd.org 2008/06/10 23:06:19
|
|
[auth-options.c match.c servconf.c addrmatch.c sshd.8]
|
|
support CIDR address matching in .ssh/authorized_keys from="..." stanzas
|
|
ok and extensive testing dtucker@
|
|
- dtucker@cvs.openbsd.org 2008/06/10 23:21:34
|
|
[bufaux.c]
|
|
Use '\0' for a nul byte rather than unadorned 0. ok djm@
|
|
- dtucker@cvs.openbsd.org 2008/06/10 23:13:43
|
|
[Makefile regress/key-options.sh]
|
|
Add regress test for key options. ok djm@
|
|
- (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6
|
|
since the new CIDR code in addmatch.c references it.
|
|
- (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
|
|
specific tests on platforms that don't do IPv6.
|
|
- (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
|
|
as environment.
|
|
- (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.
|
|
|
|
20080609
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- dtucker@cvs.openbsd.org 2008/06/08 17:04:41
|
|
[sftp-server.c]
|
|
Add case for ENOSYS in errno_to_portable; ok deraadt
|
|
- dtucker@cvs.openbsd.org 2008/06/08 20:15:29
|
|
[sftp.c sftp-client.c sftp-client.h]
|
|
Have the sftp client store the statvfs replies in wire format,
|
|
which prevents problems when the server's native sizes exceed the
|
|
client's.
|
|
Also extends the sizes of the remaining 32bit wire format to 64bit,
|
|
they're specified as unsigned long in the standard.
|
|
- dtucker@cvs.openbsd.org 2008/06/09 13:02:39
|
|
[sftp-server.c]
|
|
Extend 32bit -> 64bit values for statvfs extension missed in previous
|
|
commit.
|
|
- dtucker@cvs.openbsd.org 2008/06/09 13:38:46
|
|
[PROTOCOL]
|
|
Use a $OpenBSD tag so our scripts will sync changes.
|
|
|
|
20080608
|
|
- (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c
|
|
openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h
|
|
openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and
|
|
fstatvfs and remove #defines around statvfs code. ok djm@
|
|
- (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a
|
|
macro to convert fsid to unsigned long for platforms where fsid is a
|
|
2-member array.
|
|
|
|
20080607
|
|
- (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H.
|
|
- (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c]
|
|
Do not enable statvfs extensions on platforms that do not have statvfs.
|
|
- (dtucker) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/05/19 06:14:02
|
|
[packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@
|
|
- djm@cvs.openbsd.org 2008/05/19 15:45:07
|
|
[sshtty.c ttymodes.c sshpty.h]
|
|
Fix sending tty modes when stdin is not a tty (bz#1199). Previously
|
|
we would send the modes corresponding to a zeroed struct termios,
|
|
whereas we should have been sending an empty list of modes.
|
|
Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
|
|
- djm@cvs.openbsd.org 2008/05/19 15:46:31
|
|
[ssh-keygen.c]
|
|
support -l (print fingerprint) in combination with -F (find host) to
|
|
search for a host in ~/.ssh/known_hosts and display its fingerprint;
|
|
ok markus@
|
|
- djm@cvs.openbsd.org 2008/05/19 20:53:52
|
|
[clientloop.c]
|
|
unbreak tree by committing this bit that I missed from:
|
|
Fix sending tty modes when stdin is not a tty (bz#1199). Previously
|
|
we would send the modes corresponding to a zeroed struct termios,
|
|
whereas we should have been sending an empty list of modes.
|
|
Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
|
|
|
|
20080604
|
|
- (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias
|
|
in arc4random_uniform with upper_bound in (2^30,2*31). Note that
|
|
OpenSSH did not make requests with upper bounds in this range.
|
|
|
|
20080519
|
|
- (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in]
|
|
[openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h]
|
|
Fix compilation on Linux, including pulling in fmt_scaled(3)
|
|
implementation from OpenBSD's libutil.
|
|
|
|
20080518
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/04/04 05:14:38
|
|
[sshd_config.5]
|
|
ChrootDirectory is supported in Match blocks (in fact, it is most useful
|
|
there). Spotted by Minstrel AT minstrel.org.uk
|
|
- djm@cvs.openbsd.org 2008/04/04 06:44:26
|
|
[sshd_config.5]
|
|
oops, some unrelated stuff crept into that commit - backout.
|
|
spotted by jmc@
|
|
- djm@cvs.openbsd.org 2008/04/05 02:46:02
|
|
[sshd_config.5]
|
|
HostbasedAuthentication is supported under Match too
|
|
- (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c]
|
|
[configure.ac] Implement arc4random_buf(), import implementation of
|
|
arc4random_uniform() from OpenBSD
|
|
- (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes
|
|
- (djm) [openbsd-compat/port-tun.c] needs sys/queue.h
|
|
- (djm) OpenBSD CVS Sync
|
|
- djm@cvs.openbsd.org 2008/04/13 00:22:17
|
|
[dh.c sshd.c]
|
|
Use arc4random_buf() when requesting more than a single word of output
|
|
Use arc4random_uniform() when the desired random number upper bound
|
|
is not a power of two
|
|
ok deraadt@ millert@
|
|
- djm@cvs.openbsd.org 2008/04/18 12:32:11
|
|
[sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h]
|
|
introduce sftp extension methods statvfs@openssh.com and
|
|
fstatvfs@openssh.com that implement statvfs(2)-like operations,
|
|
based on a patch from miklos AT szeredi.hu (bz#1399)
|
|
also add a "df" command to the sftp client that uses the
|
|
statvfs@openssh.com to produce a df(1)-like display of filesystem
|
|
space and inode utilisation
|
|
ok markus@
|
|
- jmc@cvs.openbsd.org 2008/04/18 17:15:47
|
|
[sftp.1]
|
|
macro fixage;
|
|
- djm@cvs.openbsd.org 2008/04/18 22:01:33
|
|
[session.c]
|
|
remove unneccessary parentheses
|
|
- otto@cvs.openbsd.org 2008/04/29 11:20:31
|
|
[monitor_mm.h]
|
|
garbage collect two unused fields in struct mm_master; ok markus@
|
|
- djm@cvs.openbsd.org 2008/04/30 10:14:03
|
|
[ssh-keyscan.1 ssh-keyscan.c]
|
|
default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by
|
|
larsnooden AT openoffice.org
|
|
- pyr@cvs.openbsd.org 2008/05/07 05:49:37
|
|
[servconf.c servconf.h session.c sshd_config.5]
|
|
Enable the AllowAgentForwarding option in sshd_config (global and match
|
|
context), to specify if agents should be permitted on the server.
|
|
As the man page states:
|
|
``Note that disabling Agent forwarding does not improve security
|
|
unless users are also denied shell access, as they can always install
|
|
their own forwarders.''
|
|
ok djm@, ok and a mild frown markus@
|
|
- pyr@cvs.openbsd.org 2008/05/07 06:43:35
|
|
[sshd_config]
|
|
push the sshd_config bits in, spotted by ajacoutot@
|
|
- jmc@cvs.openbsd.org 2008/05/07 08:00:14
|
|
[sshd_config.5]
|
|
sort;
|
|
- markus@cvs.openbsd.org 2008/05/08 06:59:01
|
|
[bufaux.c buffer.h channels.c packet.c packet.h]
|
|
avoid extra malloc/copy/free when receiving data over the net;
|
|
~10% speedup for localhost-scp; ok djm@
|
|
- djm@cvs.openbsd.org 2008/05/08 12:02:23
|
|
[auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c]
|
|
[monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c]
|
|
[ssh.c sshd.c]
|
|
Implement a channel success/failure status confirmation callback
|
|
mechanism. Each channel maintains a queue of callbacks, which will
|
|
be drained in order (RFC4253 guarantees confirm messages are not
|
|
reordered within an channel).
|
|
Also includes a abandonment callback to clean up if a channel is
|
|
closed without sending confirmation messages. This probably
|
|
shouldn't happen in compliant implementations, but it could be
|
|
abused to leak memory.
|
|
ok markus@ (as part of a larger diff)
|
|
- djm@cvs.openbsd.org 2008/05/08 12:21:16
|
|
[monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c]
|
|
[sshd_config sshd_config.5]
|
|
Make the maximum number of sessions run-time controllable via
|
|
a sshd_config MaxSessions knob. This is useful for disabling
|
|
login/shell/subsystem access while leaving port-forwarding working
|
|
(MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or
|
|
simply increasing the number of allows multiplexed sessions.
|
|
Because some bozos are sure to configure MaxSessions in excess of the
|
|
number of available file descriptors in sshd (which, at peak, might be
|
|
as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds
|
|
on error paths, and make it fail gracefully on out-of-fd conditions -
|
|
sending channel errors instead of than exiting with fatal().
|
|
bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com
|
|
ok markus@
|
|
- djm@cvs.openbsd.org 2008/05/08 13:06:11
|
|
[clientloop.c clientloop.h ssh.c]
|
|
Use new channel status confirmation callback system to properly deal
|
|
with "important" channel requests that fail, in particular command exec,
|
|
shell and subsystem requests. Previously we would optimistically assume
|
|
that the requests would always succeed, which could cause hangs if they
|
|
did not (e.g. when the server runs out of fds) or were unimplemented by
|
|
the server (bz #1384)
|
|
Also, properly report failing multiplex channel requests via the mux
|
|
client stderr (subject to LogLevel in the mux master) - better than
|
|
silently failing.
|
|
most bits ok markus@ (as part of a larger diff)
|
|
- djm@cvs.openbsd.org 2008/05/09 04:55:56
|
|
[channels.c channels.h clientloop.c serverloop.c]
|
|
Try additional addresses when connecting to a port forward destination
|
|
whose DNS name resolves to more than one address. The previous behaviour
|
|
was to try the first address and give up.
|
|
Reported by stig AT venaas.com in bz#343
|
|
great feedback and ok markus@
|
|
- djm@cvs.openbsd.org 2008/05/09 14:18:44
|
|
[clientloop.c clientloop.h ssh.c mux.c]
|
|
tidy up session multiplexing code, moving it into its own file and
|
|
making the function names more consistent - making ssh.c and
|
|
clientloop.c a fair bit more readable.
|
|
ok markus@
|
|
- djm@cvs.openbsd.org 2008/05/09 14:26:08
|
|
[ssh.c]
|
|
dingo stole my diff hunk
|
|
- markus@cvs.openbsd.org 2008/05/09 16:16:06
|
|
[session.c]
|
|
re-add the USE_PIPES code and enable it.
|
|
without pipes shutdown-read from the sshd does not trigger
|
|
a SIGPIPE when the forked program does a write.
|
|
ok djm@
|
|
(Id sync only, USE_PIPES never left portable OpenSSH)
|
|
- markus@cvs.openbsd.org 2008/05/09 16:17:51
|
|
[channels.c]
|
|
error-fd race: don't enable the error fd in the select bitmask
|
|
for channels with both in- and output closed, since the channel
|
|
will go away before we call select();
|
|
report, lots of debugging help and ok djm@
|
|
- markus@cvs.openbsd.org 2008/05/09 16:21:13
|
|
[channels.h clientloop.c nchan.c serverloop.c]
|
|
unbreak
|
|
ssh -2 localhost od /bin/ls | true
|
|
ignoring SIGPIPE by adding a new channel message (EOW) that signals
|
|
the peer that we're not interested in any data it might send.
|
|
fixes bz #85; discussion, debugging and ok djm@
|
|
- pvalchev@cvs.openbsd.org 2008/05/12 20:52:20
|
|
[umac.c]
|
|
Ensure nh_result lies on a 64-bit boundary (fixes warnings observed
|
|
on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
|
|
- djm@cvs.openbsd.org 2008/05/15 23:52:24
|
|
[nchan2.ms]
|
|
document eow message in ssh protocol 2 channel state machine;
|
|
feedback and ok markus@
|
|
- djm@cvs.openbsd.org 2008/05/18 21:29:05
|
|
[sftp-server.c]
|
|
comment extension announcement
|
|
- djm@cvs.openbsd.org 2008/05/16 08:30:42
|
|
[PROTOCOL]
|
|
document our protocol extensions and deviations; ok markus@
|
|
- djm@cvs.openbsd.org 2008/05/17 01:31:56
|
|
[PROTOCOL]
|
|
grammar and correctness fixes from stevesk@
|
|
|
|
20080403
|
|
- (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile-
|
|
time warnings on LynxOS. Patch from ops AT iki.fi
|
|
- (djm) Force string arguments to replacement setproctitle() though
|
|
strnvis first. Ok dtucker@
|
|
|
|
20080403
|
|
- (djm) OpenBSD CVS sync:
|
|
- markus@cvs.openbsd.org 2008/04/02 15:36:51
|
|
[channels.c]
|
|
avoid possible hijacking of x11-forwarded connections (back out 1.183)
|
|
CVE-2008-1483; ok djm@
|
|
- jmc@cvs.openbsd.org 2008/03/27 22:37:57
|
|
[sshd.8]
|
|
remove trailing whitespace;
|
|
- djm@cvs.openbsd.org 2008/04/03 09:50:14
|
|
[version.h]
|
|
openssh-5.0
|
|
- (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
|
|
[contrib/suse/openssh.spec] Crank version numbers in RPM spec files
|
|
- (djm) [README] Update link to release notes
|
|
- (djm) Release 5.0p1
|