120090926 2 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 3 [contrib/suse/openssh.spec] Update for release 4 - (djm) [README] update relnotes URL 5 - (djm) [packet.c] Restore EWOULDBLOCK handling that got lost somewhere 6 - (djm) Release 5.3p1 7 820090911 9 - (dtucker) [configure.ac] Change the -lresolv check so it works on Mac OS X 10 10.6 (which doesn't have BIND8_COMPAT and thus uses res_9_query). Patch 11 from jbasney at ncsa uiuc edu. 12 1320090908 14 - (djm) [serverloop.c] Fix test for server-assigned remote forwarding port 15 (-R 0:...); bz#1578, spotted and fix by gavin AT emf.net; ok dtucker@ 16 1720090901 18 - (dtucker) [configure.ac] Bug #1639: use AC_PATH_PROG to search the path for 19 krb5-config if it's not in the location specified by --with-kerberos5. 20 Patch from jchadima at redhat. 21 2220090829 23 - (dtucker) [README.platform] Add text about development packages, based on 24 text from Chris Pepper in bug #1631. 25 2620090828 27 - dtucker [auth-sia.c] Roll back the change for bug #1241 as it apparently 28 causes problems in some Tru64 configurations. 29 - (djm) [sshd_config.5] downgrade mention of login.conf to be an example 30 and mention PAM as another provider for ChallengeResponseAuthentication; 31 bz#1408; ok dtucker@ 32 - (djm) [sftp-server.c] bz#1535: accept ENOSYS as a fallback error when 33 attempting atomic rename(); ok dtucker@ 34 - (djm) [Makefile.in] bz#1505: Solaris make(1) doesn't accept make variables 35 in argv, so pass them in the environment; ok dtucker@ 36 - (dtucker) [channels.c configure.ac] Bug #1528: skip the tcgetattr call on 37 the pty master on Solaris, since it never succeeds and can hang if large 38 amounts of data is sent to the slave (eg a copy-paste). Based on a patch 39 originally from Doke Scott, ok djm@ 40 - (dtucker) [clientloop.c configure.ac defines.h] Make the client's IO buffer 41 size a compile-time option and set it to 64k on Cygwin, since Corinna 42 reports that it makes a significant difference to performance. ok djm@ 43 - (dtucker) [configure.ac] Fix the syntax of the Solaris tcgetattr entry. 44 4520090820 46 - (dtucker) [includes.h] Bug #1634: do not include system glob.h if we're not 47 using it since the type conflicts can cause problems on FreeBSD. Patch 48 from Jonathan Chen. 49 - (dtucker) [session.c openbsd-compat/port-aix.h] Bugs #1249 and #1567: move 50 the setpcred call on AIX to immediately before the permanently_set_uid(). 51 Ensures that we still have privileges when we call chroot and 52 pam_open_sesson. Based on a patch from David Leonard. 53 5420090817 55 - (dtucker) [configure.ac] Check for headers before libraries for openssl an 56 zlib, which should make the errors slightly more meaningful on platforms 57 where there's separate "-devel" packages for those. 58 - (dtucker) [sshlogin.c openbsd-compat/port-aix.{c,h}] Bug #1595: make 59 PrintLastLog work on AIX. Based in part on a patch from Miguel Sanders. 60 6120090729 62 - (tim) [contrib/cygwin/ssh-user-config] Change script to call correct error 63 function. Patch from Corinna Vinschen. 64 6520090713 66 - (dtucker) [openbsd-compat/getrrsetbyname.c] Reduce answer buffer size so it 67 fits into 16 bits to work around a bug in glibc's resolver where it masks 68 off the buffer size at 16 bits. Patch from Hauke Lampe, ok djm jakob. 69 7020090712 71 - (dtucker) [configure.ac] Include sys/param.h for the sys/mount.h test, 72 prevents configure complaining on older BSDs. 73 - (dtucker [contrib/cygwin/ssh-{host,user}-config] Add license text. Patch 74 from Corinna Vinschen. 75 - (dtucker) [auth-pam.c] Bug #1534: move the deletion of PAM credentials on 76 logout to after the session close. Patch from Anicka Bernathova, 77 originally from Andreas Schwab via Novelll ok djm. 78 7920090707 80 - (dtucker) [contrib/cygwin/ssh-host-config] better support for automated 81 scripts and fix usage of eval. Patch from Corinna Vinschen. 82 8320090705 84 - (dtucker) OpenBSD CVS Sync 85 - andreas@cvs.openbsd.org 2009/06/27 09:29:06 86 [packet.h packet.c] 87 packet_bacup_state() and packet_restore_state() will be used to 88 temporarily save the current state ren resuming a suspended connection. 89 ok markus@ 90 - andreas@cvs.openbsd.org 2009/06/27 09:32:43 91 [roaming_common.c roaming.h] 92 It may be necessary to retransmit some data when resuming, so add it 93 to a buffer when roaming is enabled. 94 Most of this code was written by Martin Forssen, maf at appgate dot com. 95 ok markus@ 96 - andreas@cvs.openbsd.org 2009/06/27 09:35:06 97 [readconf.h readconf.c] 98 Add client option UseRoaming. It doesn't do anything yet but will 99 control whether the client tries to use roaming if enabled on the 100 server. From Martin Forssen. 101 ok markus@ 102 - markus@cvs.openbsd.org 2009/06/30 14:54:40 103 [version.h] 104 crank version; ok deraadt 105 - dtucker@cvs.openbsd.org 2009/07/02 02:11:47 106 [ssh.c] 107 allow for long home dir paths (bz #1615). ok deraadt 108 (based in part on a patch from jchadima at redhat) 109 - stevesk@cvs.openbsd.org 2009/07/05 19:28:33 110 [clientloop.c] 111 only send SSH2_MSG_DISCONNECT if we're in compat20; from dtucker@ 112 ok deraadt@ markus@ 113 11420090622 115 - (dtucker) OpenBSD CVS Sync 116 - dtucker@cvs.openbsd.org 2009/06/22 05:39:28 117 [monitor_wrap.c monitor_mm.c ssh-keygen.c auth2.c gss-genr.c sftp-client.c] 118 alphabetize includes; reduces diff vs portable and style(9). 119 ok stevesk djm 120 (Id sync only; these were already in order in -portable) 121 12220090621 123 - (dtucker) OpenBSD CVS Sync 124 - markus@cvs.openbsd.org 2009/03/17 21:37:00 125 [ssh.c] 126 pass correct argv[0] to openlog(); ok djm@ 127 - jmc@cvs.openbsd.org 2009/03/19 15:15:09 128 [ssh.1] 129 for "Ciphers", just point the reader to the keyword in ssh_config(5), just 130 as we do for "MACs": this stops us getting out of sync when the lists 131 change; 132 fixes documentation/6102, submitted by Peter J. Philipp 133 alternative fix proposed by djm 134 ok markus 135 - tobias@cvs.openbsd.org 2009/03/23 08:31:19 136 [ssh-agent.c] 137 Fixed a possible out-of-bounds memory access if the environment variable 138 SHELL is shorter than 3 characters. 139 with input by and ok dtucker 140 - tobias@cvs.openbsd.org 2009/03/23 19:38:04 141 [ssh-agent.c] 142 My previous commit didn't fix the problem at all, so stick at my first 143 version of the fix presented to dtucker. 144 Issue notified by Matthias Barkhoff (matthias dot barkhoff at gmx dot de). 145 ok dtucker 146 - sobrado@cvs.openbsd.org 2009/03/26 08:38:39 147 [sftp-server.8 sshd.8 ssh-agent.1] 148 fix a few typographical errors found by spell(1). 149 ok dtucker@, jmc@ 150 - stevesk@cvs.openbsd.org 2009/04/13 19:07:44 151 [sshd_config.5] 152 fix possessive; ok djm@ 153 - stevesk@cvs.openbsd.org 2009/04/14 16:33:42 154 [sftp-server.c] 155 remove unused option character from getopt() optstring; ok markus@ 156 - jj@cvs.openbsd.org 2009/04/14 21:10:54 157 [servconf.c] 158 Fixed a few the-the misspellings in comments. Skipped a bunch in 159 binutils,gcc and so on. ok jmc@ 160 - stevesk@cvs.openbsd.org 2009/04/17 19:23:06 161 [session.c] 162 use INTERNAL_SFTP_NAME for setproctitle() of in-process sftp-server; 163 ok djm@ markus@ 164 - stevesk@cvs.openbsd.org 2009/04/17 19:40:17 165 [sshd_config.5] 166 clarify that even internal-sftp needs /dev/log for logging to work; ok 167 markus@ 168 - jmc@cvs.openbsd.org 2009/04/18 18:39:10 169 [sshd_config.5] 170 tweak previous; ok stevesk 171 - stevesk@cvs.openbsd.org 2009/04/21 15:13:17 172 [sshd_config.5] 173 clarify we cd to user's home after chroot; ok markus@ on 174 earlier version; tweaks and ok jmc@ 175 - andreas@cvs.openbsd.org 2009/05/25 06:48:01 176 [channels.c packet.c clientloop.c packet.h serverloop.c monitor_wrap.c 177 monitor.c] 178 Put the globals in packet.c into a struct and don't access it directly 179 from other files. No functional changes. 180 ok markus@ djm@ 181 - andreas@cvs.openbsd.org 2009/05/27 06:31:25 182 [canohost.h canohost.c] 183 Add clear_cached_addr(), needed for upcoming changes allowing the peer 184 address to change. 185 ok markus@ 186 - andreas@cvs.openbsd.org 2009/05/27 06:33:39 187 [clientloop.c] 188 Send SSH2_MSG_DISCONNECT when the client disconnects. From a larger 189 change from Martin Forssen, maf at appgate dot com. 190 ok markus@ 191 - andreas@cvs.openbsd.org 2009/05/27 06:34:36 192 [kex.c kex.h] 193 Move the KEX_COOKIE_LEN define to kex.h 194 ok markus@ 195 - andreas@cvs.openbsd.org 2009/05/27 06:36:07 196 [packet.h packet.c] 197 Add packet_put_int64() and packet_get_int64(), part of a larger change 198 from Martin Forssen. 199 ok markus@ 200 - andreas@cvs.openbsd.org 2009/05/27 06:38:16 201 [sshconnect.h sshconnect.c] 202 Un-static ssh_exchange_identification(), part of a larger change from 203 Martin Forssen and needed for upcoming changes. 204 ok markus@ 205 - andreas@cvs.openbsd.org 2009/05/28 16:50:16 206 [sshd.c packet.c serverloop.c monitor_wrap.c clientloop.c sshconnect.c 207 monitor.c Added roaming.h roaming_common.c roaming_dummy.c] 208 Keep track of number of bytes read and written. Needed for upcoming 209 changes. Most code from Martin Forssen, maf at appgate dot com. 210 ok markus@ 211 Also, applied appropriate changes to Makefile.in 212 - andreas@cvs.openbsd.org 2009/06/12 20:43:22 213 [monitor.c packet.c] 214 Fix warnings found by chl@ and djm@ and change roaming_atomicio's 215 return type to match atomicio's 216 Diff from djm@, ok markus@ 217 - andreas@cvs.openbsd.org 2009/06/12 20:58:32 218 [packet.c] 219 Move some more statics into session_state 220 ok markus@ djm@ 221 - dtucker@cvs.openbsd.org 2009/06/21 07:37:15 222 [kexdhs.c kexgexs.c] 223 abort if key_sign fails, preventing possible null deref. Based on report 224 from Paolo Ganci, ok markus@ djm@ 225 - dtucker@cvs.openbsd.org 2009/06/21 09:04:03 226 [roaming.h roaming_common.c roaming_dummy.c] 227 Add tags for the benefit of the sync scripts 228 Also: pull in the changes for 1.1->1.2 missed in the previous sync. 229 - (dtucker) [auth2-jpake.c auth2.c canohost.h session.c] Whitespace and 230 header-order changes to reduce diff vs OpenBSD. 231 - (dtucker) [servconf.c sshd.c] More whitespace sync. 232 - (dtucker) [roaming_common.c roaming_dummy.c] Wrap #include <inttypes.h> in 233 ifdef. 234 23520090616 236 - (dtucker) [configure.ac defines.h] Bug #1607: handle the case where fsid_t 237 is a struct with a __val member. Fixes build on, eg, Redhat 6.2. 238 23920090504 240 - (dtucker) [sshlogin.c] Move the NO_SSH_LASTLOG #ifndef line to include 241 variable declarations. Should prevent unused warnings anywhere it's set 242 (only Crays as far as I can tell) and be a no-op everywhere else. 243 24420090318 245 - (tim) [configure.ac] Remove setting IP_TOS_IS_BROKEN for Cygwin. The problem 246 that setsockopt(IP_TOS) doesn't work on Cygwin has been fixed since 2005. 247 Based on patch from vinschen at redhat com. 248 24920090308 250 - (dtucker) [auth-passwd.c auth1.c auth2-kbdint.c auth2-none.c auth2-passwd.c 251 auth2-pubkey.c session.c openbsd-compat/bsd-cygwin_util.{c,h} 252 openbsd-compat/daemon.c] Remove support for Windows 95/98/ME and very old 253 version of Cygwin. Patch from vinschen at redhat com. 254 25520090307 256 - (dtucker) [contrib/aix/buildbff.sh] Only try to rename ssh_prng_cmds if it 257 exists (it's not created if OpenSSL's PRNG is self-seeded, eg if the OS 258 has a /dev/random). 259 - (dtucker) [schnorr.c openbsd-compat/openssl-compat.{c,h}] Add 260 EVP_DigestUpdate to the OLD_EVP compatibility functions and tell schnorr.c 261 to use them. Allows building with older OpenSSL versions. 262 - (dtucker) [configure.ac defines.h] Check for in_port_t and typedef if needed. 263 - (dtucker) [configure.ac] Missing comma in type list. 264 - (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}] 265 EVP_DigestUpdate does not exactly match the other OLD_EVP functions (eg 266 in openssl 0.9.6) so add an explicit test for it. 267 26820090306 269 - (djm) OpenBSD CVS Sync 270 - djm@cvs.openbsd.org 2009/03/05 07:18:19 271 [auth2-jpake.c jpake.c jpake.h monitor_wrap.c monitor_wrap.h schnorr.c] 272 [sshconnect2.c] 273 refactor the (disabled) Schnorr proof code to make it a little more 274 generally useful 275 - djm@cvs.openbsd.org 2009/03/05 11:30:50 276 [uuencode.c] 277 document what these functions do so I don't ever have to recuse into 278 b64_pton/ntop to remember their return values 279 28020090223 281 - (djm) OpenBSD CVS Sync 282 - djm@cvs.openbsd.org 2009/02/22 23:50:57 283 [ssh_config.5 sshd_config.5] 284 don't advertise experimental options 285 - djm@cvs.openbsd.org 2009/02/22 23:59:25 286 [sshd_config.5] 287 missing period 288 - djm@cvs.openbsd.org 2009/02/23 00:06:15 289 [version.h] 290 openssh-5.2 291 - (djm) [README] update for 5.2 292 - (djm) Release openssh-5.2p1 293 29420090222 295 - (djm) OpenBSD CVS Sync 296 - tobias@cvs.openbsd.org 2009/02/21 19:32:04 297 [misc.c sftp-server-main.c ssh-keygen.c] 298 Added missing newlines in error messages. 299 ok dtucker 300 30120090221 302 - (djm) OpenBSD CVS Sync 303 - djm@cvs.openbsd.org 2009/02/17 01:28:32 304 [ssh_config] 305 sync with revised default ciphers; pointed out by dkrause@ 306 - djm@cvs.openbsd.org 2009/02/18 04:31:21 307 [schnorr.c] 308 signature should hash over the entire group, not just the generator 309 (this is still disabled code) 310 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 311 [contrib/suse/openssh.spec] Prepare for 5.2p1 312 31320090216 314 - (djm) [regress/conch-ciphers.sh regress/putty-ciphers.sh] 315 [regress/putty-kex.sh regress/putty-transfer.sh] Downgrade disabled 316 interop tests from FATAL error to a warning. Allows some interop 317 tests to proceed if others are missing necessary prerequisites. 318 - (djm) [configure.ac] support GNU/kFreeBSD and GNU/kOpensolaris 319 systems; patch from Aurelien Jarno via rmh AT aybabtu.com 320 32120090214 322 - (djm) OpenBSD CVS Sync 323 - dtucker@cvs.openbsd.org 2009/02/02 11:15:14 324 [sftp.c] 325 Initialize a few variables to prevent spurious "may be used 326 uninitialized" warnings from newer gcc's. ok djm@ 327 - djm@cvs.openbsd.org 2009/02/12 03:00:56 328 [canohost.c canohost.h channels.c channels.h clientloop.c readconf.c] 329 [readconf.h serverloop.c ssh.c] 330 support remote port forwarding with a zero listen port (-R0:...) to 331 dyamically allocate a listen port at runtime (this is actually 332 specified in rfc4254); bz#1003 ok markus@ 333 - djm@cvs.openbsd.org 2009/02/12 03:16:01 334 [serverloop.c] 335 tighten check for -R0:... forwarding: only allow dynamic allocation 336 if want_reply is set in the packet 337 - djm@cvs.openbsd.org 2009/02/12 03:26:22 338 [monitor.c] 339 some paranoia: check that the serialised key is really KEY_RSA before 340 diddling its internals 341 - djm@cvs.openbsd.org 2009/02/12 03:42:09 342 [ssh.1] 343 document -R0:... usage 344 - djm@cvs.openbsd.org 2009/02/12 03:44:25 345 [ssh.1] 346 consistency: Dq => Ql 347 - djm@cvs.openbsd.org 2009/02/12 03:46:17 348 [ssh_config.5] 349 document RemoteForward usage with 0 listen port 350 - jmc@cvs.openbsd.org 2009/02/12 07:34:20 351 [ssh_config.5] 352 kill trailing whitespace; 353 - markus@cvs.openbsd.org 2009/02/13 11:50:21 354 [packet.c] 355 check for enc !=NULL in packet_start_discard 356 - djm@cvs.openbsd.org 2009/02/14 06:35:49 357 [PROTOCOL] 358 mention that eow and no-more-sessions extensions are sent only to 359 OpenSSH peers 360 36120090212 362 - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically 363 set ownership and modes, so avoid explicitly setting them 364 - (djm) [configure.ac loginrec.c] bz#1421: fix lastlog support for OSX. 365 OSX provides a getlastlogxbyname function that automates the reading of 366 a lastlog file. Also, the pututxline function will update lastlog so 367 there is no need for loginrec.c to do it explicitly. Collapse some 368 overly verbose code while I'm in there. 369 37020090201 371 - (dtucker) [defines.h sshconnect.c] INET6_ADDRSTRLEN is now needed in 372 channels.c too, so move the definition for non-IP6 platforms to defines.h 373 where it can be shared. 374 37520090129 376 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen. 377 If the CYGWIN environment variable is empty, the installer script 378 should not install the service with an empty CYGWIN variable, but 379 rather without setting CYGWNI entirely. 380 - (tim) [contrib/cygwin/ssh-host-config] Whitespace cleanup. No code changes. 381 38220090128 383 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen. 384 Changes to work on Cygwin 1.5.x as well as on the new Cygwin 1.7.x. 385 The information given for the setting of the CYGWIN environment variable 386 is wrong for both releases so I just removed it, together with the 387 unnecessary (Cygwin 1.5.x) or wrong (Cygwin 1.7.x) default setting. 388 38920081228 390 - (djm) OpenBSD CVS Sync 391 - stevesk@cvs.openbsd.org 2008/12/09 03:20:42 392 [channels.c servconf.c] 393 channel_print_adm_permitted_opens() should deal with all the printing 394 for that config option. suggested by markus@; ok markus@ djm@ 395 dtucker@ 396 - djm@cvs.openbsd.org 2008/12/09 04:32:22 397 [auth2-chall.c] 398 replace by-hand string building with xasprinf(); ok deraadt@ 399 - sobrado@cvs.openbsd.org 2008/12/09 15:35:00 400 [sftp.1 sftp.c] 401 update for the synopses displayed by the 'help' command, there are a 402 few missing flags; add 'bye' to the output of 'help'; sorting and spacing. 403 jmc@ suggested replacing .Oo/.Oc with a single .Op macro. 404 ok jmc@ 405 - stevesk@cvs.openbsd.org 2008/12/09 22:37:33 406 [clientloop.c] 407 fix typo in error message 408 - stevesk@cvs.openbsd.org 2008/12/10 03:55:20 409 [addrmatch.c] 410 o cannot be NULL here but use xfree() to be consistent; ok djm@ 411 - stevesk@cvs.openbsd.org 2008/12/29 01:12:36 412 [ssh-keyscan.1] 413 fix example, default key type is rsa for 3+ years; from 414 frederic.perrin@resel.fr 415 - stevesk@cvs.openbsd.org 2008/12/29 02:23:26 416 [pathnames.h] 417 no need to escape single quotes in comments 418 - okan@cvs.openbsd.org 2008/12/30 00:46:56 419 [sshd_config.5] 420 add AllowAgentForwarding to available Match keywords list 421 ok djm 422 - djm@cvs.openbsd.org 2009/01/01 21:14:35 423 [channels.c] 424 call channel destroy callbacks on receipt of open failure messages. 425 fixes client hangs when connecting to a server that has MaxSessions=0 426 set spotted by imorgan AT nas.nasa.gov; ok markus@ 427 - djm@cvs.openbsd.org 2009/01/01 21:17:36 428 [kexgexs.c] 429 fix hash calculation for KEXGEX: hash over the original client-supplied 430 values and not the sanity checked versions that we acutally use; 431 bz#1540 reported by john.smith AT arrows.demon.co.uk 432 ok markus@ 433 - djm@cvs.openbsd.org 2009/01/14 01:38:06 434 [channels.c] 435 support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482; 436 "looks ok" markus@ 437 - stevesk@cvs.openbsd.org 2009/01/15 17:38:43 438 [readconf.c] 439 1) use obsolete instead of alias for consistency 440 2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is 441 so move the comment. 442 3) reorder so like options are together 443 ok djm@ 444 - djm@cvs.openbsd.org 2009/01/22 09:46:01 445 [channels.c channels.h session.c] 446 make Channel->path an allocated string, saving a few bytes here and 447 there and fixing bz#1380 in the process; ok markus@ 448 - djm@cvs.openbsd.org 2009/01/22 09:49:57 449 [channels.c] 450 oops! I committed the wrong version of the Channel->path diff, 451 it was missing some tweaks suggested by stevesk@ 452 - djm@cvs.openbsd.org 2009/01/22 10:02:34 453 [clientloop.c misc.c readconf.c readconf.h servconf.c servconf.h] 454 [serverloop.c ssh-keyscan.c ssh.c sshd.c] 455 make a2port() return -1 when it encounters an invalid port number 456 rather than 0, which it will now treat as valid (needed for future work) 457 adjust current consumers of a2port() to check its return value is <= 0, 458 which in turn required some things to be converted from u_short => int 459 make use of int vs. u_short consistent in some other places too 460 feedback & ok markus@ 461 - djm@cvs.openbsd.org 2009/01/22 10:09:16 462 [auth-options.c] 463 another chunk of a2port() diff that got away. wtfdjm?? 464 - djm@cvs.openbsd.org 2009/01/23 07:58:11 465 [myproposal.h] 466 prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC 467 modes; ok markus@ 468 - naddy@cvs.openbsd.org 2009/01/24 17:10:22 469 [ssh_config.5 sshd_config.5] 470 sync list of preferred ciphers; ok djm@ 471 - markus@cvs.openbsd.org 2009/01/26 09:58:15 472 [cipher.c cipher.h packet.c] 473 Work around the CPNI-957037 Plaintext Recovery Attack by always 474 reading 256K of data on packet size or HMAC errors (in CBC mode only). 475 Help, feedback and ok djm@ 476 Feedback from Martin Albrecht and Paterson Kenny 477 47820090107 479 - (djm) [uidswap.c] bz#1412: Support >16 supplemental groups in OS X. 480 Patch based on one from vgiffin AT apple.com; ok dtucker@ 481 - (djm) [channels.c] bz#1419: support "on demand" X11 forwarding via 482 launchd on OS X; patch from vgiffin AT apple.com, slightly tweaked; 483 ok dtucker@ 484 - (djm) [contrib/ssh-copy-id.1 contrib/ssh-copy-id] bz#1492: Make 485 ssh-copy-id copy id_rsa.pub by default (instead of the legacy "identity" 486 key). Patch from cjwatson AT debian.org 487 48820090107 489 - (tim) [configure.ac defines.h openbsd-compat/port-uw.c 490 openbsd-compat/xcrypt.c] Add SECUREWARE support to OpenServer 6 SVR5 ABI. 491 OK djm@ dtucker@ 492 - (tim) [configure.ac] Move check_for_libcrypt_later=1 in *-*-sysv5*) section. 493 OpenServer 6 doesn't need libcrypt. 494 49520081209 496 - (djm) OpenBSD CVS Sync 497 - djm@cvs.openbsd.org 2008/12/09 02:38:18 498 [clientloop.c] 499 The ~C escape handler does not work correctly for multiplexed sessions - 500 it opens a commandline on the master session, instead of on the slave 501 that requested it. Disable it on slave sessions until such time as it 502 is fixed; bz#1543 report from Adrian Bridgett via Colin Watson 503 ok markus@ 504 - djm@cvs.openbsd.org 2008/12/09 02:39:59 505 [sftp.c] 506 Deal correctly with failures in remote stat() operation in sftp, 507 correcting fail-on-error behaviour in batchmode. bz#1541 report and 508 fix from anedvedicky AT gmail.com; ok markus@ 509 - djm@cvs.openbsd.org 2008/12/09 02:58:16 510 [readconf.c] 511 don't leave junk (free'd) pointers around in Forward *fwd argument on 512 failure; avoids double-free in ~C -L handler when given an invalid 513 forwarding specification; bz#1539 report from adejong AT debian.org 514 via Colin Watson; ok markus@ dtucker@ 515 - djm@cvs.openbsd.org 2008/12/09 03:02:37 516 [sftp.1 sftp.c] 517 correct sftp(1) and corresponding usage syntax; 518 bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@ 519 52020081208 521 - (djm) [configure.ac] bz#1538: better test for ProPolice/SSP: actually 522 use some stack in main(). 523 Report and suggested fix from vapier AT gentoo.org 524 - (djm) OpenBSD CVS Sync 525 - markus@cvs.openbsd.org 2008/12/02 19:01:07 526 [clientloop.c] 527 we have to use the recipient's channel number (RFC 4254) for 528 SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages, 529 otherwise we trigger 'Non-public channel' error messages on sshd 530 systems with clientkeepalive enabled; noticed by sturm; ok djm; 531 - markus@cvs.openbsd.org 2008/12/02 19:08:59 532 [serverloop.c] 533 backout 1.149, since it's not necessary and openssh clients send 534 broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@ 535 - markus@cvs.openbsd.org 2008/12/02 19:09:38 536 [channels.c] 537 s/remote_id/id/ to be more consistent with other code; ok djm@ 538 53920081201 540 - (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files 541 and tweak the is-sshd-running check in ssh-host-config. Patch from 542 vinschen at redhat com. 543 - (dtucker) OpenBSD CVS Sync 544 - markus@cvs.openbsd.org 2008/11/21 15:47:38 545 [packet.c] 546 packet_disconnect() on padding error, too. should reduce the success 547 probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18 548 ok djm@ 549 - dtucker@cvs.openbsd.org 2008/11/30 11:59:26 550 [monitor_fdpass.c] 551 Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@ 552 55320081123 554 - (dtucker) [monitor_fdpass.c] Reduce diff vs OpenBSD by moving some 555 declarations, removing an unnecessary union member and adding whitespace. 556 cmsgbuf.tmp thing spotted by des at des no, ok djm some time ago. 557 55820081118 559 - (tim) [addrmatch.c configure.ac] Some platforms do not have sin6_scope_id 560 member of sockaddr_in6. Also reported in Bug 1491 by David Leonard. OK and 561 feedback by djm@ 562 56320081111 564 - (dtucker) OpenBSD CVS Sync 565 - jmc@cvs.openbsd.org 2008/11/05 11:22:54 566 [servconf.c] 567 passord -> password; 568 fixes user/5975 from Rene Maroufi 569 - stevesk@cvs.openbsd.org 2008/11/07 00:42:12 570 [ssh-keygen.c] 571 spelling/typo in comment 572 - stevesk@cvs.openbsd.org 2008/11/07 18:50:18 573 [nchan.c] 574 add space to some log/debug messages for readability; ok djm@ markus@ 575 - dtucker@cvs.openbsd.org 2008/11/07 23:34:48 576 [auth2-jpake.c] 577 Move JPAKE define to make life easier for portable. ok djm@ 578 - tobias@cvs.openbsd.org 2008/11/09 12:34:47 579 [session.c ssh.1] 580 typo fixed (overriden -> overridden) 581 ok espie, jmc 582 - stevesk@cvs.openbsd.org 2008/11/11 02:58:09 583 [servconf.c] 584 USE_AFS not referenced so remove #ifdef. fixes sshd -T not printing 585 kerberosgetafstoken. ok dtucker@ 586 (Id sync only, we still want the ifdef in portable) 587 - stevesk@cvs.openbsd.org 2008/11/11 03:55:11 588 [channels.c] 589 for sshd -T print 'permitopen any' vs. 'permitopen' for case of no 590 permitopen's; ok and input dtucker@ 591 - djm@cvs.openbsd.org 2008/11/10 02:06:35 592 [regress/putty-ciphers.sh] 593 PuTTY supports AES CTR modes, so interop test against them too 594 59520081105 596 - OpenBSD CVS Sync 597 - djm@cvs.openbsd.org 2008/11/03 08:59:41 598 [servconf.c] 599 include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.gov 600 - djm@cvs.openbsd.org 2008/11/04 07:58:09 601 [auth.c] 602 need unistd.h for close() prototype 603 (ID sync only) 604 - djm@cvs.openbsd.org 2008/11/04 08:22:13 605 [auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h] 606 [readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5] 607 [sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c] 608 [Makefile.in] 609 Add support for an experimental zero-knowledge password authentication 610 method using the J-PAKE protocol described in F. Hao, P. Ryan, 611 "Password Authenticated Key Exchange by Juggling", 16th Workshop on 612 Security Protocols, Cambridge, April 2008. 613 614 This method allows password-based authentication without exposing 615 the password to the server. Instead, the client and server exchange 616 cryptographic proofs to demonstrate of knowledge of the password while 617 revealing nothing useful to an attacker or compromised endpoint. 618 619 This is experimental, work-in-progress code and is presently 620 compiled-time disabled (turn on -DJPAKE in Makefile.inc). 621 622 "just commit it. It isn't too intrusive." deraadt@ 623 - stevesk@cvs.openbsd.org 2008/11/04 19:18:00 624 [readconf.c] 625 because parse_forward() is now used to parse all forward types (DLR), 626 and it malloc's space for host variables, we don't need to malloc 627 here. fixes small memory leaks. 628 629 previously dynamic forwards were not parsed in parse_forward() and 630 space was not malloc'd in that case. 631 632 ok djm@ 633 - stevesk@cvs.openbsd.org 2008/11/05 03:23:09 634 [clientloop.c ssh.1] 635 add dynamic forward escape command line; ok djm@ 636 63720081103 638 - OpenBSD CVS Sync 639 - sthen@cvs.openbsd.org 2008/07/24 23:55:30 640 [ssh-keygen.1] 641 Add "ssh-keygen -F -l" to synopsis (displays fingerprint from 642 known_hosts). ok djm@ 643 - grunk@cvs.openbsd.org 2008/07/25 06:56:35 644 [ssh_config] 645 Add VisualHostKey to example file, ok djm@ 646 - grunk@cvs.openbsd.org 2008/07/25 07:05:16 647 [key.c] 648 In random art visualization, make sure to use the end marker only at the 649 end. Initial diff by Dirk Loss, tweaks and ok djm@ 650 - markus@cvs.openbsd.org 2008/07/31 14:48:28 651 [sshconnect2.c] 652 don't allocate space for empty banners; report t8m at centrum.cz; 653 ok deraadt 654 - krw@cvs.openbsd.org 2008/08/02 04:29:51 655 [ssh_config.5] 656 whitepsace -> whitespace. From Matthew Clarke via bugs@. 657 - djm@cvs.openbsd.org 2008/08/21 04:09:57 658 [session.c] 659 allow ForceCommand internal-sftp with arguments. based on patch from 660 michael.barabanov AT gmail.com; ok markus@ 661 - djm@cvs.openbsd.org 2008/09/06 12:24:13 662 [kex.c] 663 OpenSSL 0.9.8h supplies a real EVP_sha256 so we do not need our 664 replacement anymore 665 (ID sync only for portable - we still need this) 666 - markus@cvs.openbsd.org 2008/09/11 14:22:37 667 [compat.c compat.h nchan.c ssh.c] 668 only send eow and no-more-sessions requests to openssh 5 and newer; 669 fixes interop problems with broken ssh v2 implementations; ok djm@ 670 - millert@cvs.openbsd.org 2008/10/02 14:39:35 671 [session.c] 672 Convert an unchecked strdup to xstrdup. OK deraadt@ 673 - jmc@cvs.openbsd.org 2008/10/03 13:08:12 674 [sshd.8] 675 do not give an example of how to chmod files: we can presume the user 676 knows that. removes an ambiguity in the permission of authorized_keys; 677 ok deraadt 678 - deraadt@cvs.openbsd.org 2008/10/03 23:56:28 679 [sshconnect2.c] 680 Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the 681 function. 682 spotted by des@freebsd, who commited an incorrect fix to the freebsd tree 683 and (as is fairly typical) did not report the problem to us. But this fix 684 is correct. 685 ok djm 686 - djm@cvs.openbsd.org 2008/10/08 23:34:03 687 [ssh.1 ssh.c] 688 Add -y option to force logging via syslog rather than stderr. 689 Useful for daemonised ssh connection (ssh -f). Patch originally from 690 and ok'd by markus@ 691 - djm@cvs.openbsd.org 2008/10/09 03:50:54 692 [servconf.c sshd_config.5] 693 support setting PermitEmptyPasswords in a Match block 694 requested in PR3891; ok dtucker@ 695 - jmc@cvs.openbsd.org 2008/10/09 06:54:22 696 [ssh.c] 697 add -y to usage(); 698 - stevesk@cvs.openbsd.org 2008/10/10 04:55:16 699 [scp.c] 700 spelling in comment; ok djm@ 701 - stevesk@cvs.openbsd.org 2008/10/10 05:00:12 702 [key.c] 703 typo in error message; ok djm@ 704 - stevesk@cvs.openbsd.org 2008/10/10 16:43:27 705 [ssh_config.5] 706 use 'Privileged ports can be forwarded only when logging in as root on 707 the remote machine.' for RemoteForward just like ssh.1 -R. 708 ok djm@ jmc@ 709 - stevesk@cvs.openbsd.org 2008/10/14 18:11:33 710 [sshconnect.c] 711 use #define ROQUIET here; no binary change. ok dtucker@ 712 - stevesk@cvs.openbsd.org 2008/10/17 18:36:24 713 [ssh_config.5] 714 correct and clarify VisualHostKey; ok jmc@ 715 - stevesk@cvs.openbsd.org 2008/10/30 19:31:16 716 [clientloop.c sshd.c] 717 don't need to #include "monitor_fdpass.h" 718 - stevesk@cvs.openbsd.org 2008/10/31 15:05:34 719 [dispatch.c] 720 remove unused #define DISPATCH_MIN; ok markus@ 721 - djm@cvs.openbsd.org 2008/11/01 04:50:08 722 [sshconnect2.c] 723 sprinkle ARGSUSED on dispatch handlers 724 nuke stale unusued prototype 725 - stevesk@cvs.openbsd.org 2008/11/01 06:43:33 726 [channels.c] 727 fix some typos in log messages; ok djm@ 728 - sobrado@cvs.openbsd.org 2008/11/01 11:14:36 729 [ssh-keyscan.1 ssh-keyscan.c] 730 the ellipsis is not an optional argument; while here, improve spacing. 731 - stevesk@cvs.openbsd.org 2008/11/01 17:40:33 732 [clientloop.c readconf.c readconf.h ssh.c] 733 merge dynamic forward parsing into parse_forward(); 734 'i think this is OK' djm@ 735 - stevesk@cvs.openbsd.org 2008/11/02 00:16:16 736 [ttymodes.c] 737 protocol 2 tty modes support is now 7.5 years old so remove these 738 debug3()s; ok deraadt@ 739 - stevesk@cvs.openbsd.org 2008/11/03 01:07:02 740 [readconf.c] 741 remove valueless comment 742 - stevesk@cvs.openbsd.org 2008/11/03 02:44:41 743 [readconf.c] 744 fix comment 745 - (djm) [contrib/caldera/ssh-host-keygen contrib/suse/rc.sshd] 746 Make example scripts generate keys with default sizes rather than fixed, 747 non-default 1024 bits; patch from imorgan AT nas.nasa.gov 748 - (djm) [contrib/sshd.pam.generic contrib/caldera/sshd.pam] 749 [contrib/redhat/sshd.pam] Move pam_nologin to account group from 750 incorrect auth group in example files; 751 patch from imorgan AT nas.nasa.gov 752 75320080906 754 - (dtucker) [config.guess config.sub] Update to latest versions from 755 http://git.savannah.gnu.org/gitweb/ (2008-04-14 and 2008-06-16 756 respectively). 757 75820080830 759 - (dtucker) [openbsd-compat/bsd-poll.c] correctly check for number of FDs 760 larger than FD_SETSIZE (OpenSSH only ever uses poll with one fd). Patch 761 from Nicholas Marriott. 762 76320080721 764 - (djm) OpenBSD CVS Sync 765 - djm@cvs.openbsd.org 2008/07/23 07:36:55 766 [servconf.c] 767 do not try to print options that have been compile-time disabled 768 in config test mode (sshd -T); report from nix-corp AT esperi.org.uk 769 ok dtucker@ 770 - (djm) [servconf.c] Print UsePAM option in config test mode (when it 771 has been compiled in); report from nix-corp AT esperi.org.uk 772 ok dtucker@ 773 77420080721 775 - (djm) OpenBSD CVS Sync 776 - jmc@cvs.openbsd.org 2008/07/18 22:51:01 777 [sftp-server.8] 778 no need for .Pp before or after .Sh; 779 - djm@cvs.openbsd.org 2008/07/21 08:19:07 780 [version.h] 781 openssh-5.1 782 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 783 [contrib/suse/openssh.spec] Update version number in README and RPM specs 784 - (djm) Release OpenSSH-5.1 785 78620080717 787 - (djm) OpenBSD CVS Sync 788 - djm@cvs.openbsd.org 2008/07/17 08:48:00 789 [sshconnect2.c] 790 strnvis preauth banner; pointed out by mpf@ ok markus@ 791 - djm@cvs.openbsd.org 2008/07/17 08:51:07 792 [auth2-hostbased.c] 793 strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes 794 report and patch from res AT qoxp.net (bz#1200); ok markus@ 795 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat 796 code, replace with equivalent cygwin library call. Patch from vinschen 797 at redhat.com, ok djm@. 798 - (djm) [sshconnect2.c] vis.h isn't available everywhere 799 80020080716 801 - OpenBSD CVS Sync 802 - djm@cvs.openbsd.org 2008/07/15 02:23:14 803 [sftp.1] 804 number of pipelined requests is now 64; 805 prodded by Iain.Morgan AT nasa.gov 806 - djm@cvs.openbsd.org 2008/07/16 11:51:14 807 [clientloop.c] 808 rename variable first_gc -> last_gc (since it is actually the last 809 in the list). 810 - djm@cvs.openbsd.org 2008/07/16 11:52:19 811 [channels.c] 812 this loop index should be automatic, not static 813 81420080714 815 - (djm) OpenBSD CVS Sync 816 - sthen@cvs.openbsd.org 2008/07/13 21:22:52 817 [ssh-keygen.c] 818 Change "ssh-keygen -F [host] -l" to not display random art unless 819 -v is also specified, making it consistent with the manual and other 820 uses of -l. 821 ok grunk@ 822 - djm@cvs.openbsd.org 2008/07/13 22:13:07 823 [channels.c] 824 use struct sockaddr_storage instead of struct sockaddr for accept(2) 825 address argument. from visibilis AT yahoo.com in bz#1485; ok markus@ 826 - djm@cvs.openbsd.org 2008/07/13 22:16:03 827 [sftp.c] 828 increase number of piplelined requests so they properly fill the 829 (recently increased) channel window. prompted by rapier AT psc.edu; 830 ok markus@ 831 - djm@cvs.openbsd.org 2008/07/14 01:55:56 832 [sftp-server.8] 833 mention requirement for /dev/log inside chroot when using sftp-server 834 with ChrootDirectory 835 - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to 836 avoid clash with sin(3) function; reported by 837 cristian.ionescu-idbohrn AT axis.com 838 - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close() 839 prototype; reported by cristian.ionescu-idbohrn AT axis.com 840 - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash; 841 reported by cristian.ionescu-idbohrn AT axis.com 842 - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config] 843 [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd] 844 Revamped and simplified Cygwin ssh-host-config script that uses 845 unified csih configuration tool. Requires recent Cygwin. 846 Patch from vinschen AT redhat.com 847 84820080712 849 - (djm) OpenBSD CVS Sync 850 - djm@cvs.openbsd.org 2008/07/12 04:52:50 851 [channels.c] 852 unbreak; move clearing of cctx struct to before first use 853 reported by dkrause@ 854 - djm@cvs.openbsd.org 2008/07/12 05:33:41 855 [scp.1] 856 better description for -i flag: 857 s/RSA authentication/public key authentication/ 858 - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h] 859 return EAI_FAMILY when trying to lookup unsupported address family; 860 from vinschen AT redhat.com 861 86220080711 863 - (djm) OpenBSD CVS Sync 864 - stevesk@cvs.openbsd.org 2008/07/07 00:31:41 865 [ttymodes.c] 866 we don't need arg after the debug3() was removed. from lint. 867 ok djm@ 868 - stevesk@cvs.openbsd.org 2008/07/07 23:32:51 869 [key.c] 870 /*NOTREACHED*/ for lint warning: 871 warning: function key_equal falls off bottom without returning value 872 ok djm@ 873 - markus@cvs.openbsd.org 2008/07/10 18:05:58 874 [channels.c] 875 missing bzero; from mickey; ok djm@ 876 - markus@cvs.openbsd.org 2008/07/10 18:08:11 877 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c] 878 sync v1 and v2 traffic accounting; add it to sshd, too; 879 ok djm@, dtucker@ 880 88120080709 882 - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass 883 - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM 884 account check failure path. The vulnerable format buffer is supplied 885 from PAM and should not contain attacker-supplied data. 886 - (djm) [auth.c] Missing unistd.h for close() 887 - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x 888 88920080705 890 - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed 891 passwords disabled. bz#1083 report & patch from senthilkumar_sen AT 892 hotpop.com, w/ dtucker@ 893 - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for 894 Tru64. readv doesn't seem to be a comparable object there. 895 bz#1386, patch from dtucker@ ok me 896 - (djm) [Makefile.in] Pass though pass to conch for interop tests 897 - (djm) [configure.ac] unbreak: remove extra closing brace 898 - (djm) OpenBSD CVS Sync 899 - djm@cvs.openbsd.org 2008/07/04 23:08:25 900 [packet.c] 901 handle EINTR in packet_write_poll()l ok dtucker@ 902 - djm@cvs.openbsd.org 2008/07/04 23:30:16 903 [auth1.c auth2.c] 904 Make protocol 1 MaxAuthTries logic match protocol 2's. 905 Do not treat the first protocol 2 authentication attempt as 906 a failure IFF it is for method "none". 907 Makes MaxAuthTries' user-visible behaviour identical for 908 protocol 1 vs 2. 909 ok dtucker@ 910 - djm@cvs.openbsd.org 2008/07/05 05:16:01 911 [PROTOCOL] 912 grammar 913 91420080704 915 - (dtucker) OpenBSD CVS Sync 916 - djm@cvs.openbsd.org 2008/07/02 13:30:34 917 [auth2.c] 918 really really remove the freebie "none" auth try for protocol 2 919 - djm@cvs.openbsd.org 2008/07/02 13:47:39 920 [ssh.1 ssh.c] 921 When forking after authentication ("ssh -f") with ExitOnForwardFailure 922 enabled, delay the fork until after replies for any -R forwards have 923 been seen. Allows for robust detection of -R forward failure when 924 using -f (similar to bz#92); ok dtucker@ 925 - otto@cvs.openbsd.org 2008/07/03 21:46:58 926 [auth2-pubkey.c] 927 avoid nasty double free; ok dtucker@ djm@ 928 - djm@cvs.openbsd.org 2008/07/04 03:44:59 929 [servconf.c groupaccess.h groupaccess.c] 930 support negation of groups in "Match group" block (bz#1315); ok dtucker@ 931 - dtucker@cvs.openbsd.org 2008/07/04 03:47:02 932 [monitor.c] 933 Make debug a little clearer. ok djm@ 934 - djm@cvs.openbsd.org 2008/06/30 08:07:34 935 [regress/key-options.sh] 936 shell portability: use "=" instead of "==" in test(1) expressions, 937 double-quote string with backslash escaped / 938 - djm@cvs.openbsd.org 2008/06/30 10:31:11 939 [regress/{putty-transfer,putty-kex,putty-ciphers}.sh] 940 remove "set -e" left over from debugging 941 - djm@cvs.openbsd.org 2008/06/30 10:43:03 942 [regress/conch-ciphers.sh] 943 explicitly disable conch options that could interfere with the test 944 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link 945 returns EXDEV. Patch from Mike Garrison, ok djm@ 946 - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h] 947 [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c] 948 [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on 949 some platforms (HP nonstop) it is a distinct errno; 950 bz#1467 reported by sconeu AT yahoo.com; ok dtucker@ 951 95220080702 953 - (dtucker) OpenBSD CVS Sync 954 - djm@cvs.openbsd.org 2008/06/30 08:05:59 955 [PROTOCOL.agent] 956 typo: s/constraint_date/constraint_data/ 957 - djm@cvs.openbsd.org 2008/06/30 12:15:39 958 [serverloop.c] 959 only pass channel requests on session channels through to the session 960 channel handler, avoiding spurious log messages; ok! markus@ 961 - djm@cvs.openbsd.org 2008/06/30 12:16:02 962 [nchan.c] 963 only send eow@openssh.com notifications for session channels; ok! markus@ 964 - djm@cvs.openbsd.org 2008/06/30 12:18:34 965 [PROTOCOL] 966 clarify that eow@openssh.com is only sent on session channels 967 - dtucker@cvs.openbsd.org 2008/07/01 07:20:52 968 [sshconnect.c] 969 Check ExitOnForwardFailure if forwardings are disabled due to a failed 970 host key check. ok djm@ 971 - dtucker@cvs.openbsd.org 2008/07/01 07:24:22 972 [sshconnect.c sshd.c] 973 Send CR LF during protocol banner exchanges, but only for Protocol 2 only, 974 in order to comply with RFC 4253. bz #1443, ok djm@ 975 - stevesk@cvs.openbsd.org 2008/07/01 23:12:47 976 [PROTOCOL.agent] 977 fix some typos; ok djm@ 978 - djm@cvs.openbsd.org 2008/07/02 02:24:18 979 [sshd_config sshd_config.5 sshd.8 servconf.c] 980 increase default size of ssh protocol 1 ephemeral key from 768 to 1024 981 bits; prodded by & ok dtucker@ ok deraadt@ 982 - dtucker@cvs.openbsd.org 2008/07/02 12:03:51 983 [auth-rsa.c auth.c auth2-pubkey.c auth.h] 984 Merge duplicate host key file checks, based in part on a patch from Rob 985 Holland via bz #1348 . Also checks for non-regular files during protocol 986 1 RSA auth. ok djm@ 987 - djm@cvs.openbsd.org 2008/07/02 12:36:39 988 [auth2-none.c auth2.c] 989 Make protocol 2 MaxAuthTries behaviour a little more sensible: 990 Check whether client has exceeded MaxAuthTries before running 991 an authentication method and skip it if they have, previously it 992 would always allow one try (for "none" auth). 993 Preincrement failure count before post-auth test - previously this 994 checked and postincremented, also to allow one "none" try. 995 Together, these two changes always count the "none" auth method 996 which could be skipped by a malicious client (e.g. an SSH worm) 997 to get an extra attempt at a real auth method. They also make 998 MaxAuthTries=0 a useful way to block users entirely (esp. in a 999 sshd_config Match block). 1000 Also, move sending of any preauth banner from "none" auth method 1001 to the first call to input_userauth_request(), so worms that skip 1002 the "none" method get to see it too. 1003 100420080630 1005 - (djm) OpenBSD CVS Sync 1006 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43 1007 [regress/Makefile regress/key-options.sh] 1008 Add regress test for key options. ok djm@ 1009 - dtucker@cvs.openbsd.org 2008/06/11 23:11:40 1010 [regress/Makefile] 1011 Don't run cipher-speed test by default; mistakenly enabled by me 1012 - djm@cvs.openbsd.org 2008/06/28 13:57:25 1013 [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh] 1014 very basic regress test against Twisted Conch in "make interop" 1015 target (conch is available in ports/devel/py-twisted/conch); 1016 ok markus@ 1017 - (djm) [regress/Makefile] search for conch by path, like we do putty 1018 101920080629 1020 - (djm) OpenBSD CVS Sync 1021 - martynas@cvs.openbsd.org 2008/06/21 07:46:46 1022 [sftp.c] 1023 use optopt to get invalid flag, instead of return value of getopt, 1024 which is always '?'; ok djm@ 1025 - otto@cvs.openbsd.org 2008/06/25 11:13:43 1026 [key.c] 1027 add key length to visual fingerprint; zap magical constants; 1028 ok grunk@ djm@ 1029 - djm@cvs.openbsd.org 2008/06/26 06:10:09 1030 [sftp-client.c sftp-server.c] 1031 allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky 1032 bits. Note that this only affects explicit setting of modes (e.g. via 1033 sftp(1)'s chmod command) and not file transfers. (bz#1310) 1034 ok deraadt@ at c2k8 1035 - djm@cvs.openbsd.org 2008/06/26 09:19:40 1036 [dh.c dh.h moduli.c] 1037 when loading moduli from /etc/moduli in sshd(8), check that they 1038 are of the expected "safe prime" structure and have had 1039 appropriate primality tests performed; 1040 feedback and ok dtucker@ 1041 - grunk@cvs.openbsd.org 2008/06/26 11:46:31 1042 [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c] 1043 Move SSH Fingerprint Visualization away from sharing the config option 1044 CheckHostIP to an own config option named VisualHostKey. 1045 While there, fix the behaviour that ssh would draw a random art picture 1046 on every newly seen host even when the option was not enabled. 1047 prodded by deraadt@, discussions, 1048 help and ok markus@ djm@ dtucker@ 1049 - jmc@cvs.openbsd.org 2008/06/26 21:11:46 1050 [ssh.1] 1051 add VisualHostKey to the list of options listed in -o; 1052 - djm@cvs.openbsd.org 2008/06/28 07:25:07 1053 [PROTOCOL] 1054 spelling fixes 1055 - djm@cvs.openbsd.org 2008/06/28 13:58:23 1056 [ssh-agent.c] 1057 refuse to add a key that has unknown constraints specified; 1058 ok markus 1059 - djm@cvs.openbsd.org 2008/06/28 14:05:15 1060 [ssh-agent.c] 1061 reset global compat flag after processing a protocol 2 signature 1062 request with the legacy DSA encoding flag set; ok markus 1063 - djm@cvs.openbsd.org 2008/06/28 14:08:30 1064 [PROTOCOL PROTOCOL.agent] 1065 document the protocol used by ssh-agent; "looks ok" markus@ 1066 106720080628 1068 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec] 1069 RFC.nroff lacks a license, remove it (it is long gone in OpenBSD). 1070 107120080626 1072 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD. 1073 (bz#1372) 1074 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 1075 [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files. 1076 107720080616 1078 - (dtucker) OpenBSD CVS Sync 1079 - dtucker@cvs.openbsd.org 2008/06/16 13:22:53 1080 [session.c channels.c] 1081 Rename the isatty argument to is_tty so we don't shadow 1082 isatty(3). ok markus@ 1083 - (dtucker) [channels.c] isatty -> is_tty here too. 1084 108520080615 1086 - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc. 1087 - OpenBSD CVS Sync 1088 - dtucker@cvs.openbsd.org 2008/06/14 15:49:48 1089 [sshd.c] 1090 wrap long line at 80 chars 1091 - dtucker@cvs.openbsd.org 2008/06/14 17:07:11 1092 [sshd.c] 1093 ensure default umask disallows at least group and world write; ok djm@ 1094 - djm@cvs.openbsd.org 2008/06/14 18:33:43 1095 [session.c] 1096 suppress the warning message from chdir(homedir) failures 1097 when chrooted (bz#1461); ok dtucker 1098 - dtucker@cvs.openbsd.org 2008/06/14 19:42:10 1099 [scp.1] 1100 Mention that scp follows symlinks during -r. bz #1466, 1101 from nectar at apple 1102 - dtucker@cvs.openbsd.org 2008/06/15 16:55:38 1103 [sshd_config.5] 1104 MaxSessions is allowed in a Match block too 1105 - dtucker@cvs.openbsd.org 2008/06/15 16:58:40 1106 [servconf.c sshd_config.5] 1107 Allow MaxAuthTries within a Match block. ok djm@ 1108 - djm@cvs.openbsd.org 2008/06/15 20:06:26 1109 [channels.c channels.h session.c] 1110 don't call isatty() on a pty master, instead pass a flag down to 1111 channel_set_fds() indicating that te fds refer to a tty. Fixes a 1112 hang on exit on Solaris (bz#1463) in portable but is actually 1113 a generic bug; ok dtucker deraadt markus 1114 111520080614 1116 - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction 1117 replacement code; patch from ighighi AT gmail.com in bz#1240; 1118 ok dtucker 1119 112020080613 1121 - (dtucker) OpenBSD CVS Sync 1122 - deraadt@cvs.openbsd.org 2008/06/13 09:44:36 1123 [packet.c] 1124 compile on older gcc; no decl after code 1125 - dtucker@cvs.openbsd.org 2008/06/13 13:56:59 1126 [monitor.c] 1127 Clear key options in the monitor on failed authentication, prevents 1128 applying additional restrictions to non-pubkey authentications in 1129 the case where pubkey fails but another method subsequently succeeds. 1130 bz #1472, found by Colin Watson, ok markus@ djm@ 1131 - dtucker@cvs.openbsd.org 2008/06/13 14:18:51 1132 [auth2-pubkey.c auth-rhosts.c] 1133 Include unistd.h for close(), prevents warnings in -portable 1134 - dtucker@cvs.openbsd.org 2008/06/13 17:21:20 1135 [mux.c] 1136 Friendlier error messages for mux fallback. ok djm@ 1137 - dtucker@cvs.openbsd.org 2008/06/13 18:55:22 1138 [scp.c] 1139 Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@ 1140 - grunk@cvs.openbsd.org 2008/06/13 20:13:26 1141 [ssh.1] 1142 Explain the use of SSH fpr visualization using random art, and cite the 1143 original scientific paper inspiring that technique. 1144 Much help with English and nroff by jmc@, thanks. 1145 - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which 1146 despite its name doesn't seem to implement all of GSSAPI. Patch from 1147 Jan Engelhardt, sanity checked by Simon Wilkinson. 1148 114920080612 1150 - (dtucker) OpenBSD CVS Sync 1151 - jmc@cvs.openbsd.org 2008/06/11 07:30:37 1152 [sshd.8] 1153 kill trailing whitespace; 1154 - grunk@cvs.openbsd.org 2008/06/11 21:01:35 1155 [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c 1156 sshconnect.c] 1157 Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the 1158 graphical hash visualization schemes known as "random art", and by 1159 Dan Kaminsky's musings on the subject during a BlackOp talk at the 1160 23C3 in Berlin. 1161 Scientific publication (original paper): 1162 "Hash Visualization: a New Technique to improve Real-World Security", 1163 Perrig A. and Song D., 1999, International Workshop on Cryptographic 1164 Techniques and E-Commerce (CrypTEC '99) 1165 http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf 1166 The algorithm used here is a worm crawling over a discrete plane, 1167 leaving a trace (augmenting the field) everywhere it goes. 1168 Movement is taken from dgst_raw 2bit-wise. Bumping into walls 1169 makes the respective movement vector be ignored for this turn, 1170 thus switching to the other color of the chessboard. 1171 Graphs are not unambiguous for now, because circles in graphs can be 1172 walked in either direction. 1173 discussions with several people, 1174 help, corrections and ok markus@ djm@ 1175 - grunk@cvs.openbsd.org 2008/06/11 21:38:25 1176 [ssh-keygen.c] 1177 ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub 1178 would not display you the random art as intended, spotted by canacar@ 1179 - grunk@cvs.openbsd.org 2008/06/11 22:20:46 1180 [ssh-keygen.c ssh-keygen.1] 1181 ssh-keygen would write fingerprints to STDOUT, and random art to STDERR, 1182 that is not how it was envisioned. 1183 Also correct manpage saying that -v is needed along with -l for it to work. 1184 spotted by naddy@ 1185 - otto@cvs.openbsd.org 2008/06/11 23:02:22 1186 [key.c] 1187 simpler way of computing the augmentations; ok grunk@ 1188 - grunk@cvs.openbsd.org 2008/06/11 23:03:56 1189 [ssh_config.5] 1190 CheckHostIP set to ``fingerprint'' will display both hex and random art 1191 spotted by naddy@ 1192 - grunk@cvs.openbsd.org 2008/06/11 23:51:57 1193 [key.c] 1194 #define statements that are not atoms need braces around them, else they 1195 will cause trouble in some cases. 1196 Also do a computation of -1 once, and not in a loop several times. 1197 spotted by otto@ 1198 - dtucker@cvs.openbsd.org 2008/06/12 00:03:49 1199 [dns.c canohost.c sshconnect.c] 1200 Do not pass "0" strings as ports to getaddrinfo because the lookups 1201 can slow things down and we never use the service info anyway. bz 1202 #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok 1203 deraadt@ djm@ 1204 djm belives that the reason for the "0" strings is to ensure that 1205 it's not possible to call getaddrinfo with both host and port being 1206 NULL. In the case of canohost.c host is a local array. In the 1207 case of sshconnect.c, it's checked for null immediately before use. 1208 In dns.c it ultimately comes from ssh.c:main() and is guaranteed to 1209 be non-null but it's not obvious, so I added a warning message in 1210 case it is ever passed a null. 1211 - grunk@cvs.openbsd.org 2008/06/12 00:13:55 1212 [sshconnect.c] 1213 Make ssh print the random art also when ssh'ing to a host using IP only. 1214 spotted by naddy@, ok and help djm@ dtucker@ 1215 - otto@cvs.openbsd.org 2008/06/12 00:13:13 1216 [key.c] 1217 use an odd number of rows and columns and a separate start marker, looks 1218 better; ok grunk@ 1219 - djm@cvs.openbsd.org 2008/06/12 03:40:52 1220 [clientloop.h mux.c channels.c clientloop.c channels.h] 1221 Enable ~ escapes for multiplex slave sessions; give each channel 1222 its own escape state and hook the escape filters up to muxed 1223 channels. bz #1331 1224 Mux slaves do not currently support the ~^Z and ~& escapes. 1225 NB. this change cranks the mux protocol version, so a new ssh 1226 mux client will not be able to connect to a running old ssh 1227 mux master. 1228 ok dtucker@ 1229 - djm@cvs.openbsd.org 2008/06/12 04:06:00 1230 [clientloop.h ssh.c clientloop.c] 1231 maintain an ordered queue of outstanding global requests that we 1232 expect replies to, similar to the per-channel confirmation queue. 1233 Use this queue to verify success or failure for remote forward 1234 establishment in a race free way. 1235 ok dtucker@ 1236 - djm@cvs.openbsd.org 2008/06/12 04:17:47 1237 [clientloop.c] 1238 thall shalt not code past the eightieth column 1239 - djm@cvs.openbsd.org 2008/06/12 04:24:06 1240 [ssh.c] 1241 thal shalt not code past the eightieth column 1242 - djm@cvs.openbsd.org 2008/06/12 05:15:41 1243 [PROTOCOL] 1244 document tun@openssh.com forwarding method 1245 - djm@cvs.openbsd.org 2008/06/12 05:32:30 1246 [mux.c] 1247 some more TODO for me 1248 - grunk@cvs.openbsd.org 2008/06/12 05:42:46 1249 [key.c] 1250 supply the key type (rsa1, rsa, dsa) as a caption in the frame of the 1251 random art. while there, stress the fact that the field base should at 1252 least be 8 characters for the pictures to make sense. 1253 comment and ok djm@ 1254 - grunk@cvs.openbsd.org 2008/06/12 06:32:59 1255 [key.c] 1256 We already mark the start of the worm, now also mark the end of the worm 1257 in our random art drawings. 1258 ok djm@ 1259 - djm@cvs.openbsd.org 2008/06/12 15:19:17 1260 [clientloop.h channels.h clientloop.c channels.c mux.c] 1261 The multiplexing escape char handler commit last night introduced a 1262 small memory leak per session; plug it. 1263 - dtucker@cvs.openbsd.org 2008/06/12 16:35:31 1264 [ssh_config.5 ssh.c] 1265 keyword expansion for localcommand. ok djm@ 1266 - jmc@cvs.openbsd.org 2008/06/12 19:10:09 1267 [ssh_config.5 ssh-keygen.1] 1268 tweak the ascii art text; ok grunk 1269 - dtucker@cvs.openbsd.org 2008/06/12 20:38:28 1270 [sshd.c sshconnect.c packet.h misc.c misc.h packet.c] 1271 Make keepalive timeouts apply while waiting for a packet, particularly 1272 during key renegotiation (bz #1363). With djm and Matt Day, ok djm@ 1273 - djm@cvs.openbsd.org 2008/06/12 20:47:04 1274 [sftp-client.c] 1275 print extension revisions for extensions that we understand 1276 - djm@cvs.openbsd.org 2008/06/12 21:06:25 1277 [clientloop.c] 1278 I was coalescing expected global request confirmation replies at 1279 the wrong end of the queue - fix; prompted by markus@ 1280 - grunk@cvs.openbsd.org 2008/06/12 21:14:46 1281 [ssh-keygen.c] 1282 make ssh-keygen -lf show the key type just as ssh-add -l would do it 1283 ok djm@ markus@ 1284 - grunk@cvs.openbsd.org 2008/06/12 22:03:36 1285 [key.c] 1286 add my copyright, ok djm@ 1287 - ian@cvs.openbsd.org 2008/06/12 23:24:58 1288 [sshconnect.c] 1289 tweak wording in message, ok deraadt@ jmc@ 1290 - dtucker@cvs.openbsd.org 2008/06/13 00:12:02 1291 [sftp.h log.h] 1292 replace __dead with __attribute__((noreturn)), makes things 1293 a little easier to port. Also, add it to sigdie(). ok djm@ 1294 - djm@cvs.openbsd.org 2008/06/13 00:16:49 1295 [mux.c] 1296 fall back to creating a new TCP connection on most multiplexing errors 1297 (socket connect fail, invalid version, refused permittion, corrupted 1298 messages, etc.); bz #1329 ok dtucker@ 1299 - dtucker@cvs.openbsd.org 2008/06/13 00:47:53 1300 [mux.c] 1301 upcast size_t to u_long to match format arg; ok djm@ 1302 - dtucker@cvs.openbsd.org 2008/06/13 00:51:47 1303 [mac.c] 1304 upcast another size_t to u_long to match format 1305 - dtucker@cvs.openbsd.org 2008/06/13 01:38:23 1306 [misc.c] 1307 upcast uid to long with matching %ld, prevents warnings in portable 1308 - djm@cvs.openbsd.org 2008/06/13 04:40:22 1309 [auth2-pubkey.c auth-rhosts.c] 1310 refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not 1311 regular files; report from Solar Designer via Colin Watson in bz#1471 1312 ok dtucker@ deraadt 1313 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now 1314 takes 2 more args. with djm@ 1315 - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch 1316 from Todd Vierling. 1317 - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA 1318 systems. Patch from R. Scott Bailey. 1319 - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used 1320 on big endian machines, so ifdef them for little-endian only to prevent 1321 unused function warnings on big-endians. 1322 - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent 1323 compiler warnings on some platforms. Based on a discussion with otto@ 1324 132520080611 1326 - (djm) [channels.c configure.ac] 1327 Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no) 1328 bz#1464; ok dtucker 1329 133020080610 1331 - (dtucker) OpenBSD CVS Sync 1332 - djm@cvs.openbsd.org 2008/06/10 03:57:27 1333 [servconf.c match.h sshd_config.5] 1334 support CIDR address matching in sshd_config "Match address" blocks, with 1335 full support for negation and fall-back to classic wildcard matching. 1336 For example: 1337 Match address 192.0.2.0/24,3ffe:ffff::/32,!10.* 1338 PasswordAuthentication yes 1339 addrmatch.c code mostly lifted from flowd's addr.c 1340 feedback and ok dtucker@ 1341 - djm@cvs.openbsd.org 2008/06/10 04:17:46 1342 [sshd_config.5] 1343 better reference for pattern-list 1344 - dtucker@cvs.openbsd.org 2008/06/10 04:50:25 1345 [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8] 1346 Add extended test mode (-T) and connection parameters for test mode (-C). 1347 -T causes sshd to write its effective configuration to stdout and exit. 1348 -C causes any relevant Match rules to be applied before output. The 1349 combination allows tesing of the parser and config files. ok deraadt djm 1350 - jmc@cvs.openbsd.org 2008/06/10 07:12:00 1351 [sshd_config.5] 1352 tweak previous; 1353 - jmc@cvs.openbsd.org 2008/06/10 08:17:40 1354 [sshd.8 sshd.c] 1355 - update usage() 1356 - fix SYNOPSIS, and sort options 1357 - some minor additional fixes 1358 - dtucker@cvs.openbsd.org 2008/06/09 18:06:32 1359 [regress/test-exec.sh] 1360 Don't generate putty keys if we're not going to use them. ok djm 1361 - dtucker@cvs.openbsd.org 2008/06/10 05:23:32 1362 [regress/addrmatch.sh regress/Makefile] 1363 Regress test for Match CIDR rules. ok djm@ 1364 - dtucker@cvs.openbsd.org 2008/06/10 15:21:41 1365 [test-exec.sh] 1366 Use a more portable construct for checking if we're running a putty test 1367 - dtucker@cvs.openbsd.org 2008/06/10 15:28:49 1368 [test-exec.sh] 1369 Add quotes 1370 - dtucker@cvs.openbsd.org 2008/06/10 18:21:24 1371 [ssh_config.5] 1372 clarify that Host patterns are space-separated. ok deraadt 1373 - djm@cvs.openbsd.org 2008/06/10 22:15:23 1374 [PROTOCOL ssh.c serverloop.c] 1375 Add a no-more-sessions@openssh.com global request extension that the 1376 client sends when it knows that it will never request another session 1377 (i.e. when session multiplexing is disabled). This allows a server to 1378 disallow further session requests and terminate the session. 1379 Why would a non-multiplexing client ever issue additional session 1380 requests? It could have been attacked with something like SSH'jack: 1381 http://www.storm.net.nz/projects/7 1382 feedback & ok markus 1383 - djm@cvs.openbsd.org 2008/06/10 23:06:19 1384 [auth-options.c match.c servconf.c addrmatch.c sshd.8] 1385 support CIDR address matching in .ssh/authorized_keys from="..." stanzas 1386 ok and extensive testing dtucker@ 1387 - dtucker@cvs.openbsd.org 2008/06/10 23:21:34 1388 [bufaux.c] 1389 Use '\0' for a nul byte rather than unadorned 0. ok djm@ 1390 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43 1391 [Makefile regress/key-options.sh] 1392 Add regress test for key options. ok djm@ 1393 - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6 1394 since the new CIDR code in addmatch.c references it. 1395 - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6 1396 specific tests on platforms that don't do IPv6. 1397 - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well 1398 as environment. 1399 - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now. 1400 140120080609 1402 - (dtucker) OpenBSD CVS Sync 1403 - dtucker@cvs.openbsd.org 2008/06/08 17:04:41 1404 [sftp-server.c] 1405 Add case for ENOSYS in errno_to_portable; ok deraadt 1406 - dtucker@cvs.openbsd.org 2008/06/08 20:15:29 1407 [sftp.c sftp-client.c sftp-client.h] 1408 Have the sftp client store the statvfs replies in wire format, 1409 which prevents problems when the server's native sizes exceed the 1410 client's. 1411 Also extends the sizes of the remaining 32bit wire format to 64bit, 1412 they're specified as unsigned long in the standard. 1413 - dtucker@cvs.openbsd.org 2008/06/09 13:02:39 1414 [sftp-server.c] 1415 Extend 32bit -> 64bit values for statvfs extension missed in previous 1416 commit. 1417 - dtucker@cvs.openbsd.org 2008/06/09 13:38:46 1418 [PROTOCOL] 1419 Use a $OpenBSD tag so our scripts will sync changes. 1420 142120080608 1422 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c 1423 openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h 1424 openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and 1425 fstatvfs and remove #defines around statvfs code. ok djm@ 1426 - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a 1427 macro to convert fsid to unsigned long for platforms where fsid is a 1428 2-member array. 1429 143020080607 1431 - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H. 1432 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c] 1433 Do not enable statvfs extensions on platforms that do not have statvfs. 1434 - (dtucker) OpenBSD CVS Sync 1435 - djm@cvs.openbsd.org 2008/05/19 06:14:02 1436 [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@ 1437 - djm@cvs.openbsd.org 2008/05/19 15:45:07 1438 [sshtty.c ttymodes.c sshpty.h] 1439 Fix sending tty modes when stdin is not a tty (bz#1199). Previously 1440 we would send the modes corresponding to a zeroed struct termios, 1441 whereas we should have been sending an empty list of modes. 1442 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@ 1443 - djm@cvs.openbsd.org 2008/05/19 15:46:31 1444 [ssh-keygen.c] 1445 support -l (print fingerprint) in combination with -F (find host) to 1446 search for a host in ~/.ssh/known_hosts and display its fingerprint; 1447 ok markus@ 1448 - djm@cvs.openbsd.org 2008/05/19 20:53:52 1449 [clientloop.c] 1450 unbreak tree by committing this bit that I missed from: 1451 Fix sending tty modes when stdin is not a tty (bz#1199). Previously 1452 we would send the modes corresponding to a zeroed struct termios, 1453 whereas we should have been sending an empty list of modes. 1454 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@ 1455 145620080604 1457 - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias 1458 in arc4random_uniform with upper_bound in (2^30,2*31). Note that 1459 OpenSSH did not make requests with upper bounds in this range. 1460 146120080519 1462 - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in] 1463 [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h] 1464 Fix compilation on Linux, including pulling in fmt_scaled(3) 1465 implementation from OpenBSD's libutil. 1466 146720080518 1468 - (djm) OpenBSD CVS Sync 1469 - djm@cvs.openbsd.org 2008/04/04 05:14:38 1470 [sshd_config.5] 1471 ChrootDirectory is supported in Match blocks (in fact, it is most useful 1472 there). Spotted by Minstrel AT minstrel.org.uk 1473 - djm@cvs.openbsd.org 2008/04/04 06:44:26 1474 [sshd_config.5] 1475 oops, some unrelated stuff crept into that commit - backout. 1476 spotted by jmc@ 1477 - djm@cvs.openbsd.org 2008/04/05 02:46:02 1478 [sshd_config.5] 1479 HostbasedAuthentication is supported under Match too 1480 - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c] 1481 [configure.ac] Implement arc4random_buf(), import implementation of 1482 arc4random_uniform() from OpenBSD 1483 - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes 1484 - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h 1485 - (djm) OpenBSD CVS Sync 1486 - djm@cvs.openbsd.org 2008/04/13 00:22:17 1487 [dh.c sshd.c] 1488 Use arc4random_buf() when requesting more than a single word of output 1489 Use arc4random_uniform() when the desired random number upper bound 1490 is not a power of two 1491 ok deraadt@ millert@ 1492 - djm@cvs.openbsd.org 2008/04/18 12:32:11 1493 [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h] 1494 introduce sftp extension methods statvfs@openssh.com and 1495 fstatvfs@openssh.com that implement statvfs(2)-like operations, 1496 based on a patch from miklos AT szeredi.hu (bz#1399) 1497 also add a "df" command to the sftp client that uses the 1498 statvfs@openssh.com to produce a df(1)-like display of filesystem 1499 space and inode utilisation 1500 ok markus@ 1501 - jmc@cvs.openbsd.org 2008/04/18 17:15:47 1502 [sftp.1] 1503 macro fixage; 1504 - djm@cvs.openbsd.org 2008/04/18 22:01:33 1505 [session.c] 1506 remove unneccessary parentheses 1507 - otto@cvs.openbsd.org 2008/04/29 11:20:31 1508 [monitor_mm.h] 1509 garbage collect two unused fields in struct mm_master; ok markus@ 1510 - djm@cvs.openbsd.org 2008/04/30 10:14:03 1511 [ssh-keyscan.1 ssh-keyscan.c] 1512 default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by 1513 larsnooden AT openoffice.org 1514 - pyr@cvs.openbsd.org 2008/05/07 05:49:37 1515 [servconf.c servconf.h session.c sshd_config.5] 1516 Enable the AllowAgentForwarding option in sshd_config (global and match 1517 context), to specify if agents should be permitted on the server. 1518 As the man page states: 1519 ``Note that disabling Agent forwarding does not improve security 1520 unless users are also denied shell access, as they can always install 1521 their own forwarders.'' 1522 ok djm@, ok and a mild frown markus@ 1523 - pyr@cvs.openbsd.org 2008/05/07 06:43:35 1524 [sshd_config] 1525 push the sshd_config bits in, spotted by ajacoutot@ 1526 - jmc@cvs.openbsd.org 2008/05/07 08:00:14 1527 [sshd_config.5] 1528 sort; 1529 - markus@cvs.openbsd.org 2008/05/08 06:59:01 1530 [bufaux.c buffer.h channels.c packet.c packet.h] 1531 avoid extra malloc/copy/free when receiving data over the net; 1532 ~10% speedup for localhost-scp; ok djm@ 1533 - djm@cvs.openbsd.org 2008/05/08 12:02:23 1534 [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c] 1535 [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c] 1536 [ssh.c sshd.c] 1537 Implement a channel success/failure status confirmation callback 1538 mechanism. Each channel maintains a queue of callbacks, which will 1539 be drained in order (RFC4253 guarantees confirm messages are not 1540 reordered within an channel). 1541 Also includes a abandonment callback to clean up if a channel is 1542 closed without sending confirmation messages. This probably 1543 shouldn't happen in compliant implementations, but it could be 1544 abused to leak memory. 1545 ok markus@ (as part of a larger diff) 1546 - djm@cvs.openbsd.org 2008/05/08 12:21:16 1547 [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c] 1548 [sshd_config sshd_config.5] 1549 Make the maximum number of sessions run-time controllable via 1550 a sshd_config MaxSessions knob. This is useful for disabling 1551 login/shell/subsystem access while leaving port-forwarding working 1552 (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or 1553 simply increasing the number of allows multiplexed sessions. 1554 Because some bozos are sure to configure MaxSessions in excess of the 1555 number of available file descriptors in sshd (which, at peak, might be 1556 as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds 1557 on error paths, and make it fail gracefully on out-of-fd conditions - 1558 sending channel errors instead of than exiting with fatal(). 1559 bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com 1560 ok markus@ 1561 - djm@cvs.openbsd.org 2008/05/08 13:06:11 1562 [clientloop.c clientloop.h ssh.c] 1563 Use new channel status confirmation callback system to properly deal 1564 with "important" channel requests that fail, in particular command exec, 1565 shell and subsystem requests. Previously we would optimistically assume 1566 that the requests would always succeed, which could cause hangs if they 1567 did not (e.g. when the server runs out of fds) or were unimplemented by 1568 the server (bz #1384) 1569 Also, properly report failing multiplex channel requests via the mux 1570 client stderr (subject to LogLevel in the mux master) - better than 1571 silently failing. 1572 most bits ok markus@ (as part of a larger diff) 1573 - djm@cvs.openbsd.org 2008/05/09 04:55:56 1574 [channels.c channels.h clientloop.c serverloop.c] 1575 Try additional addresses when connecting to a port forward destination 1576 whose DNS name resolves to more than one address. The previous behaviour 1577 was to try the first address and give up. 1578 Reported by stig AT venaas.com in bz#343 1579 great feedback and ok markus@ 1580 - djm@cvs.openbsd.org 2008/05/09 14:18:44 1581 [clientloop.c clientloop.h ssh.c mux.c] 1582 tidy up session multiplexing code, moving it into its own file and 1583 making the function names more consistent - making ssh.c and 1584 clientloop.c a fair bit more readable. 1585 ok markus@ 1586 - djm@cvs.openbsd.org 2008/05/09 14:26:08 1587 [ssh.c] 1588 dingo stole my diff hunk 1589 - markus@cvs.openbsd.org 2008/05/09 16:16:06 1590 [session.c] 1591 re-add the USE_PIPES code and enable it. 1592 without pipes shutdown-read from the sshd does not trigger 1593 a SIGPIPE when the forked program does a write. 1594 ok djm@ 1595 (Id sync only, USE_PIPES never left portable OpenSSH) 1596 - markus@cvs.openbsd.org 2008/05/09 16:17:51 1597 [channels.c] 1598 error-fd race: don't enable the error fd in the select bitmask 1599 for channels with both in- and output closed, since the channel 1600 will go away before we call select(); 1601 report, lots of debugging help and ok djm@ 1602 - markus@cvs.openbsd.org 2008/05/09 16:21:13 1603 [channels.h clientloop.c nchan.c serverloop.c] 1604 unbreak 1605 ssh -2 localhost od /bin/ls | true 1606 ignoring SIGPIPE by adding a new channel message (EOW) that signals 1607 the peer that we're not interested in any data it might send. 1608 fixes bz #85; discussion, debugging and ok djm@ 1609 - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20 1610 [umac.c] 1611 Ensure nh_result lies on a 64-bit boundary (fixes warnings observed 1612 on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@ 1613 - djm@cvs.openbsd.org 2008/05/15 23:52:24 1614 [nchan2.ms] 1615 document eow message in ssh protocol 2 channel state machine; 1616 feedback and ok markus@ 1617 - djm@cvs.openbsd.org 2008/05/18 21:29:05 1618 [sftp-server.c] 1619 comment extension announcement 1620 - djm@cvs.openbsd.org 2008/05/16 08:30:42 1621 [PROTOCOL] 1622 document our protocol extensions and deviations; ok markus@ 1623 - djm@cvs.openbsd.org 2008/05/17 01:31:56 1624 [PROTOCOL] 1625 grammar and correctness fixes from stevesk@ 1626 162720080403 1628 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile- 1629 time warnings on LynxOS. Patch from ops AT iki.fi 1630 - (djm) Force string arguments to replacement setproctitle() though 1631 strnvis first. Ok dtucker@ 1632 163320080403 1634 - (djm) OpenBSD CVS sync: 1635 - markus@cvs.openbsd.org 2008/04/02 15:36:51 1636 [channels.c] 1637 avoid possible hijacking of x11-forwarded connections (back out 1.183) 1638 CVE-2008-1483; ok djm@ 1639 - jmc@cvs.openbsd.org 2008/03/27 22:37:57 1640 [sshd.8] 1641 remove trailing whitespace; 1642 - djm@cvs.openbsd.org 2008/04/03 09:50:14 1643 [version.h] 1644 openssh-5.0 1645 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 1646 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files 1647 - (djm) [README] Update link to release notes 1648 - (djm) Release 5.0p1 1649