120090223 2 - (djm) OpenBSD CVS Sync 3 - djm@cvs.openbsd.org 2009/02/22 23:50:57 4 [ssh_config.5 sshd_config.5] 5 don't advertise experimental options 6 - djm@cvs.openbsd.org 2009/02/22 23:59:25 7 [sshd_config.5] 8 missing period 9 - djm@cvs.openbsd.org 2009/02/23 00:06:15 10 [version.h] 11 openssh-5.2 12 - (djm) [README] update for 5.2 13 - (djm) Release openssh-5.2p1 14 1520090222 16 - (djm) OpenBSD CVS Sync 17 - tobias@cvs.openbsd.org 2009/02/21 19:32:04 18 [misc.c sftp-server-main.c ssh-keygen.c] 19 Added missing newlines in error messages. 20 ok dtucker 21 2220090221 23 - (djm) OpenBSD CVS Sync 24 - djm@cvs.openbsd.org 2009/02/17 01:28:32 25 [ssh_config] 26 sync with revised default ciphers; pointed out by dkrause@ 27 - djm@cvs.openbsd.org 2009/02/18 04:31:21 28 [schnorr.c] 29 signature should hash over the entire group, not just the generator 30 (this is still disabled code) 31 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 32 [contrib/suse/openssh.spec] Prepare for 5.2p1 33 3420090216 35 - (djm) [regress/conch-ciphers.sh regress/putty-ciphers.sh] 36 [regress/putty-kex.sh regress/putty-transfer.sh] Downgrade disabled 37 interop tests from FATAL error to a warning. Allows some interop 38 tests to proceed if others are missing necessary prerequisites. 39 - (djm) [configure.ac] support GNU/kFreeBSD and GNU/kOpensolaris 40 systems; patch from Aurelien Jarno via rmh AT aybabtu.com 41 4220090214 43 - (djm) OpenBSD CVS Sync 44 - dtucker@cvs.openbsd.org 2009/02/02 11:15:14 45 [sftp.c] 46 Initialize a few variables to prevent spurious "may be used 47 uninitialized" warnings from newer gcc's. ok djm@ 48 - djm@cvs.openbsd.org 2009/02/12 03:00:56 49 [canohost.c canohost.h channels.c channels.h clientloop.c readconf.c] 50 [readconf.h serverloop.c ssh.c] 51 support remote port forwarding with a zero listen port (-R0:...) to 52 dyamically allocate a listen port at runtime (this is actually 53 specified in rfc4254); bz#1003 ok markus@ 54 - djm@cvs.openbsd.org 2009/02/12 03:16:01 55 [serverloop.c] 56 tighten check for -R0:... forwarding: only allow dynamic allocation 57 if want_reply is set in the packet 58 - djm@cvs.openbsd.org 2009/02/12 03:26:22 59 [monitor.c] 60 some paranoia: check that the serialised key is really KEY_RSA before 61 diddling its internals 62 - djm@cvs.openbsd.org 2009/02/12 03:42:09 63 [ssh.1] 64 document -R0:... usage 65 - djm@cvs.openbsd.org 2009/02/12 03:44:25 66 [ssh.1] 67 consistency: Dq => Ql 68 - djm@cvs.openbsd.org 2009/02/12 03:46:17 69 [ssh_config.5] 70 document RemoteForward usage with 0 listen port 71 - jmc@cvs.openbsd.org 2009/02/12 07:34:20 72 [ssh_config.5] 73 kill trailing whitespace; 74 - markus@cvs.openbsd.org 2009/02/13 11:50:21 75 [packet.c] 76 check for enc !=NULL in packet_start_discard 77 - djm@cvs.openbsd.org 2009/02/14 06:35:49 78 [PROTOCOL] 79 mention that eow and no-more-sessions extensions are sent only to 80 OpenSSH peers 81 8220090212 83 - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically 84 set ownership and modes, so avoid explicitly setting them 85 - (djm) [configure.ac loginrec.c] bz#1421: fix lastlog support for OSX. 86 OSX provides a getlastlogxbyname function that automates the reading of 87 a lastlog file. Also, the pututxline function will update lastlog so 88 there is no need for loginrec.c to do it explicitly. Collapse some 89 overly verbose code while I'm in there. 90 9120090201 92 - (dtucker) [defines.h sshconnect.c] INET6_ADDRSTRLEN is now needed in 93 channels.c too, so move the definition for non-IP6 platforms to defines.h 94 where it can be shared. 95 9620090129 97 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen. 98 If the CYGWIN environment variable is empty, the installer script 99 should not install the service with an empty CYGWIN variable, but 100 rather without setting CYGWNI entirely. 101 - (tim) [contrib/cygwin/ssh-host-config] Whitespace cleanup. No code changes. 102 10320090128 104 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen. 105 Changes to work on Cygwin 1.5.x as well as on the new Cygwin 1.7.x. 106 The information given for the setting of the CYGWIN environment variable 107 is wrong for both releases so I just removed it, together with the 108 unnecessary (Cygwin 1.5.x) or wrong (Cygwin 1.7.x) default setting. 109 11020081228 111 - (djm) OpenBSD CVS Sync 112 - stevesk@cvs.openbsd.org 2008/12/09 03:20:42 113 [channels.c servconf.c] 114 channel_print_adm_permitted_opens() should deal with all the printing 115 for that config option. suggested by markus@; ok markus@ djm@ 116 dtucker@ 117 - djm@cvs.openbsd.org 2008/12/09 04:32:22 118 [auth2-chall.c] 119 replace by-hand string building with xasprinf(); ok deraadt@ 120 - sobrado@cvs.openbsd.org 2008/12/09 15:35:00 121 [sftp.1 sftp.c] 122 update for the synopses displayed by the 'help' command, there are a 123 few missing flags; add 'bye' to the output of 'help'; sorting and spacing. 124 jmc@ suggested replacing .Oo/.Oc with a single .Op macro. 125 ok jmc@ 126 - stevesk@cvs.openbsd.org 2008/12/09 22:37:33 127 [clientloop.c] 128 fix typo in error message 129 - stevesk@cvs.openbsd.org 2008/12/10 03:55:20 130 [addrmatch.c] 131 o cannot be NULL here but use xfree() to be consistent; ok djm@ 132 - stevesk@cvs.openbsd.org 2008/12/29 01:12:36 133 [ssh-keyscan.1] 134 fix example, default key type is rsa for 3+ years; from 135 frederic.perrin@resel.fr 136 - stevesk@cvs.openbsd.org 2008/12/29 02:23:26 137 [pathnames.h] 138 no need to escape single quotes in comments 139 - okan@cvs.openbsd.org 2008/12/30 00:46:56 140 [sshd_config.5] 141 add AllowAgentForwarding to available Match keywords list 142 ok djm 143 - djm@cvs.openbsd.org 2009/01/01 21:14:35 144 [channels.c] 145 call channel destroy callbacks on receipt of open failure messages. 146 fixes client hangs when connecting to a server that has MaxSessions=0 147 set spotted by imorgan AT nas.nasa.gov; ok markus@ 148 - djm@cvs.openbsd.org 2009/01/01 21:17:36 149 [kexgexs.c] 150 fix hash calculation for KEXGEX: hash over the original client-supplied 151 values and not the sanity checked versions that we acutally use; 152 bz#1540 reported by john.smith AT arrows.demon.co.uk 153 ok markus@ 154 - djm@cvs.openbsd.org 2009/01/14 01:38:06 155 [channels.c] 156 support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482; 157 "looks ok" markus@ 158 - stevesk@cvs.openbsd.org 2009/01/15 17:38:43 159 [readconf.c] 160 1) use obsolete instead of alias for consistency 161 2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is 162 so move the comment. 163 3) reorder so like options are together 164 ok djm@ 165 - djm@cvs.openbsd.org 2009/01/22 09:46:01 166 [channels.c channels.h session.c] 167 make Channel->path an allocated string, saving a few bytes here and 168 there and fixing bz#1380 in the process; ok markus@ 169 - djm@cvs.openbsd.org 2009/01/22 09:49:57 170 [channels.c] 171 oops! I committed the wrong version of the Channel->path diff, 172 it was missing some tweaks suggested by stevesk@ 173 - djm@cvs.openbsd.org 2009/01/22 10:02:34 174 [clientloop.c misc.c readconf.c readconf.h servconf.c servconf.h] 175 [serverloop.c ssh-keyscan.c ssh.c sshd.c] 176 make a2port() return -1 when it encounters an invalid port number 177 rather than 0, which it will now treat as valid (needed for future work) 178 adjust current consumers of a2port() to check its return value is <= 0, 179 which in turn required some things to be converted from u_short => int 180 make use of int vs. u_short consistent in some other places too 181 feedback & ok markus@ 182 - djm@cvs.openbsd.org 2009/01/22 10:09:16 183 [auth-options.c] 184 another chunk of a2port() diff that got away. wtfdjm?? 185 - djm@cvs.openbsd.org 2009/01/23 07:58:11 186 [myproposal.h] 187 prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC 188 modes; ok markus@ 189 - naddy@cvs.openbsd.org 2009/01/24 17:10:22 190 [ssh_config.5 sshd_config.5] 191 sync list of preferred ciphers; ok djm@ 192 - markus@cvs.openbsd.org 2009/01/26 09:58:15 193 [cipher.c cipher.h packet.c] 194 Work around the CPNI-957037 Plaintext Recovery Attack by always 195 reading 256K of data on packet size or HMAC errors (in CBC mode only). 196 Help, feedback and ok djm@ 197 Feedback from Martin Albrecht and Paterson Kenny 198 19920090107 200 - (djm) [uidswap.c] bz#1412: Support >16 supplemental groups in OS X. 201 Patch based on one from vgiffin AT apple.com; ok dtucker@ 202 - (djm) [channels.c] bz#1419: support "on demand" X11 forwarding via 203 launchd on OS X; patch from vgiffin AT apple.com, slightly tweaked; 204 ok dtucker@ 205 - (djm) [contrib/ssh-copy-id.1 contrib/ssh-copy-id] bz#1492: Make 206 ssh-copy-id copy id_rsa.pub by default (instead of the legacy "identity" 207 key). Patch from cjwatson AT debian.org 208 20920090107 210 - (tim) [configure.ac defines.h openbsd-compat/port-uw.c 211 openbsd-compat/xcrypt.c] Add SECUREWARE support to OpenServer 6 SVR5 ABI. 212 OK djm@ dtucker@ 213 - (tim) [configure.ac] Move check_for_libcrypt_later=1 in *-*-sysv5*) section. 214 OpenServer 6 doesn't need libcrypt. 215 21620081209 217 - (djm) OpenBSD CVS Sync 218 - djm@cvs.openbsd.org 2008/12/09 02:38:18 219 [clientloop.c] 220 The ~C escape handler does not work correctly for multiplexed sessions - 221 it opens a commandline on the master session, instead of on the slave 222 that requested it. Disable it on slave sessions until such time as it 223 is fixed; bz#1543 report from Adrian Bridgett via Colin Watson 224 ok markus@ 225 - djm@cvs.openbsd.org 2008/12/09 02:39:59 226 [sftp.c] 227 Deal correctly with failures in remote stat() operation in sftp, 228 correcting fail-on-error behaviour in batchmode. bz#1541 report and 229 fix from anedvedicky AT gmail.com; ok markus@ 230 - djm@cvs.openbsd.org 2008/12/09 02:58:16 231 [readconf.c] 232 don't leave junk (free'd) pointers around in Forward *fwd argument on 233 failure; avoids double-free in ~C -L handler when given an invalid 234 forwarding specification; bz#1539 report from adejong AT debian.org 235 via Colin Watson; ok markus@ dtucker@ 236 - djm@cvs.openbsd.org 2008/12/09 03:02:37 237 [sftp.1 sftp.c] 238 correct sftp(1) and corresponding usage syntax; 239 bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@ 240 24120081208 242 - (djm) [configure.ac] bz#1538: better test for ProPolice/SSP: actually 243 use some stack in main(). 244 Report and suggested fix from vapier AT gentoo.org 245 - (djm) OpenBSD CVS Sync 246 - markus@cvs.openbsd.org 2008/12/02 19:01:07 247 [clientloop.c] 248 we have to use the recipient's channel number (RFC 4254) for 249 SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages, 250 otherwise we trigger 'Non-public channel' error messages on sshd 251 systems with clientkeepalive enabled; noticed by sturm; ok djm; 252 - markus@cvs.openbsd.org 2008/12/02 19:08:59 253 [serverloop.c] 254 backout 1.149, since it's not necessary and openssh clients send 255 broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@ 256 - markus@cvs.openbsd.org 2008/12/02 19:09:38 257 [channels.c] 258 s/remote_id/id/ to be more consistent with other code; ok djm@ 259 26020081201 261 - (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files 262 and tweak the is-sshd-running check in ssh-host-config. Patch from 263 vinschen at redhat com. 264 - (dtucker) OpenBSD CVS Sync 265 - markus@cvs.openbsd.org 2008/11/21 15:47:38 266 [packet.c] 267 packet_disconnect() on padding error, too. should reduce the success 268 probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18 269 ok djm@ 270 - dtucker@cvs.openbsd.org 2008/11/30 11:59:26 271 [monitor_fdpass.c] 272 Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@ 273 27420081123 275 - (dtucker) [monitor_fdpass.c] Reduce diff vs OpenBSD by moving some 276 declarations, removing an unnecessary union member and adding whitespace. 277 cmsgbuf.tmp thing spotted by des at des no, ok djm some time ago. 278 27920081118 280 - (tim) [addrmatch.c configure.ac] Some platforms do not have sin6_scope_id 281 member of sockaddr_in6. Also reported in Bug 1491 by David Leonard. OK and 282 feedback by djm@ 283 28420081111 285 - (dtucker) OpenBSD CVS Sync 286 - jmc@cvs.openbsd.org 2008/11/05 11:22:54 287 [servconf.c] 288 passord -> password; 289 fixes user/5975 from Rene Maroufi 290 - stevesk@cvs.openbsd.org 2008/11/07 00:42:12 291 [ssh-keygen.c] 292 spelling/typo in comment 293 - stevesk@cvs.openbsd.org 2008/11/07 18:50:18 294 [nchan.c] 295 add space to some log/debug messages for readability; ok djm@ markus@ 296 - dtucker@cvs.openbsd.org 2008/11/07 23:34:48 297 [auth2-jpake.c] 298 Move JPAKE define to make life easier for portable. ok djm@ 299 - tobias@cvs.openbsd.org 2008/11/09 12:34:47 300 [session.c ssh.1] 301 typo fixed (overriden -> overridden) 302 ok espie, jmc 303 - stevesk@cvs.openbsd.org 2008/11/11 02:58:09 304 [servconf.c] 305 USE_AFS not referenced so remove #ifdef. fixes sshd -T not printing 306 kerberosgetafstoken. ok dtucker@ 307 (Id sync only, we still want the ifdef in portable) 308 - stevesk@cvs.openbsd.org 2008/11/11 03:55:11 309 [channels.c] 310 for sshd -T print 'permitopen any' vs. 'permitopen' for case of no 311 permitopen's; ok and input dtucker@ 312 - djm@cvs.openbsd.org 2008/11/10 02:06:35 313 [regress/putty-ciphers.sh] 314 PuTTY supports AES CTR modes, so interop test against them too 315 31620081105 317 - OpenBSD CVS Sync 318 - djm@cvs.openbsd.org 2008/11/03 08:59:41 319 [servconf.c] 320 include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.gov 321 - djm@cvs.openbsd.org 2008/11/04 07:58:09 322 [auth.c] 323 need unistd.h for close() prototype 324 (ID sync only) 325 - djm@cvs.openbsd.org 2008/11/04 08:22:13 326 [auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h] 327 [readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5] 328 [sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c] 329 [Makefile.in] 330 Add support for an experimental zero-knowledge password authentication 331 method using the J-PAKE protocol described in F. Hao, P. Ryan, 332 "Password Authenticated Key Exchange by Juggling", 16th Workshop on 333 Security Protocols, Cambridge, April 2008. 334 335 This method allows password-based authentication without exposing 336 the password to the server. Instead, the client and server exchange 337 cryptographic proofs to demonstrate of knowledge of the password while 338 revealing nothing useful to an attacker or compromised endpoint. 339 340 This is experimental, work-in-progress code and is presently 341 compiled-time disabled (turn on -DJPAKE in Makefile.inc). 342 343 "just commit it. It isn't too intrusive." deraadt@ 344 - stevesk@cvs.openbsd.org 2008/11/04 19:18:00 345 [readconf.c] 346 because parse_forward() is now used to parse all forward types (DLR), 347 and it malloc's space for host variables, we don't need to malloc 348 here. fixes small memory leaks. 349 350 previously dynamic forwards were not parsed in parse_forward() and 351 space was not malloc'd in that case. 352 353 ok djm@ 354 - stevesk@cvs.openbsd.org 2008/11/05 03:23:09 355 [clientloop.c ssh.1] 356 add dynamic forward escape command line; ok djm@ 357 35820081103 359 - OpenBSD CVS Sync 360 - sthen@cvs.openbsd.org 2008/07/24 23:55:30 361 [ssh-keygen.1] 362 Add "ssh-keygen -F -l" to synopsis (displays fingerprint from 363 known_hosts). ok djm@ 364 - grunk@cvs.openbsd.org 2008/07/25 06:56:35 365 [ssh_config] 366 Add VisualHostKey to example file, ok djm@ 367 - grunk@cvs.openbsd.org 2008/07/25 07:05:16 368 [key.c] 369 In random art visualization, make sure to use the end marker only at the 370 end. Initial diff by Dirk Loss, tweaks and ok djm@ 371 - markus@cvs.openbsd.org 2008/07/31 14:48:28 372 [sshconnect2.c] 373 don't allocate space for empty banners; report t8m at centrum.cz; 374 ok deraadt 375 - krw@cvs.openbsd.org 2008/08/02 04:29:51 376 [ssh_config.5] 377 whitepsace -> whitespace. From Matthew Clarke via bugs@. 378 - djm@cvs.openbsd.org 2008/08/21 04:09:57 379 [session.c] 380 allow ForceCommand internal-sftp with arguments. based on patch from 381 michael.barabanov AT gmail.com; ok markus@ 382 - djm@cvs.openbsd.org 2008/09/06 12:24:13 383 [kex.c] 384 OpenSSL 0.9.8h supplies a real EVP_sha256 so we do not need our 385 replacement anymore 386 (ID sync only for portable - we still need this) 387 - markus@cvs.openbsd.org 2008/09/11 14:22:37 388 [compat.c compat.h nchan.c ssh.c] 389 only send eow and no-more-sessions requests to openssh 5 and newer; 390 fixes interop problems with broken ssh v2 implementations; ok djm@ 391 - millert@cvs.openbsd.org 2008/10/02 14:39:35 392 [session.c] 393 Convert an unchecked strdup to xstrdup. OK deraadt@ 394 - jmc@cvs.openbsd.org 2008/10/03 13:08:12 395 [sshd.8] 396 do not give an example of how to chmod files: we can presume the user 397 knows that. removes an ambiguity in the permission of authorized_keys; 398 ok deraadt 399 - deraadt@cvs.openbsd.org 2008/10/03 23:56:28 400 [sshconnect2.c] 401 Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the 402 function. 403 spotted by des@freebsd, who commited an incorrect fix to the freebsd tree 404 and (as is fairly typical) did not report the problem to us. But this fix 405 is correct. 406 ok djm 407 - djm@cvs.openbsd.org 2008/10/08 23:34:03 408 [ssh.1 ssh.c] 409 Add -y option to force logging via syslog rather than stderr. 410 Useful for daemonised ssh connection (ssh -f). Patch originally from 411 and ok'd by markus@ 412 - djm@cvs.openbsd.org 2008/10/09 03:50:54 413 [servconf.c sshd_config.5] 414 support setting PermitEmptyPasswords in a Match block 415 requested in PR3891; ok dtucker@ 416 - jmc@cvs.openbsd.org 2008/10/09 06:54:22 417 [ssh.c] 418 add -y to usage(); 419 - stevesk@cvs.openbsd.org 2008/10/10 04:55:16 420 [scp.c] 421 spelling in comment; ok djm@ 422 - stevesk@cvs.openbsd.org 2008/10/10 05:00:12 423 [key.c] 424 typo in error message; ok djm@ 425 - stevesk@cvs.openbsd.org 2008/10/10 16:43:27 426 [ssh_config.5] 427 use 'Privileged ports can be forwarded only when logging in as root on 428 the remote machine.' for RemoteForward just like ssh.1 -R. 429 ok djm@ jmc@ 430 - stevesk@cvs.openbsd.org 2008/10/14 18:11:33 431 [sshconnect.c] 432 use #define ROQUIET here; no binary change. ok dtucker@ 433 - stevesk@cvs.openbsd.org 2008/10/17 18:36:24 434 [ssh_config.5] 435 correct and clarify VisualHostKey; ok jmc@ 436 - stevesk@cvs.openbsd.org 2008/10/30 19:31:16 437 [clientloop.c sshd.c] 438 don't need to #include "monitor_fdpass.h" 439 - stevesk@cvs.openbsd.org 2008/10/31 15:05:34 440 [dispatch.c] 441 remove unused #define DISPATCH_MIN; ok markus@ 442 - djm@cvs.openbsd.org 2008/11/01 04:50:08 443 [sshconnect2.c] 444 sprinkle ARGSUSED on dispatch handlers 445 nuke stale unusued prototype 446 - stevesk@cvs.openbsd.org 2008/11/01 06:43:33 447 [channels.c] 448 fix some typos in log messages; ok djm@ 449 - sobrado@cvs.openbsd.org 2008/11/01 11:14:36 450 [ssh-keyscan.1 ssh-keyscan.c] 451 the ellipsis is not an optional argument; while here, improve spacing. 452 - stevesk@cvs.openbsd.org 2008/11/01 17:40:33 453 [clientloop.c readconf.c readconf.h ssh.c] 454 merge dynamic forward parsing into parse_forward(); 455 'i think this is OK' djm@ 456 - stevesk@cvs.openbsd.org 2008/11/02 00:16:16 457 [ttymodes.c] 458 protocol 2 tty modes support is now 7.5 years old so remove these 459 debug3()s; ok deraadt@ 460 - stevesk@cvs.openbsd.org 2008/11/03 01:07:02 461 [readconf.c] 462 remove valueless comment 463 - stevesk@cvs.openbsd.org 2008/11/03 02:44:41 464 [readconf.c] 465 fix comment 466 - (djm) [contrib/caldera/ssh-host-keygen contrib/suse/rc.sshd] 467 Make example scripts generate keys with default sizes rather than fixed, 468 non-default 1024 bits; patch from imorgan AT nas.nasa.gov 469 - (djm) [contrib/sshd.pam.generic contrib/caldera/sshd.pam] 470 [contrib/redhat/sshd.pam] Move pam_nologin to account group from 471 incorrect auth group in example files; 472 patch from imorgan AT nas.nasa.gov 473 47420080906 475 - (dtucker) [config.guess config.sub] Update to latest versions from 476 http://git.savannah.gnu.org/gitweb/ (2008-04-14 and 2008-06-16 477 respectively). 478 47920080830 480 - (dtucker) [openbsd-compat/bsd-poll.c] correctly check for number of FDs 481 larger than FD_SETSIZE (OpenSSH only ever uses poll with one fd). Patch 482 from Nicholas Marriott. 483 48420080721 485 - (djm) OpenBSD CVS Sync 486 - djm@cvs.openbsd.org 2008/07/23 07:36:55 487 [servconf.c] 488 do not try to print options that have been compile-time disabled 489 in config test mode (sshd -T); report from nix-corp AT esperi.org.uk 490 ok dtucker@ 491 - (djm) [servconf.c] Print UsePAM option in config test mode (when it 492 has been compiled in); report from nix-corp AT esperi.org.uk 493 ok dtucker@ 494 49520080721 496 - (djm) OpenBSD CVS Sync 497 - jmc@cvs.openbsd.org 2008/07/18 22:51:01 498 [sftp-server.8] 499 no need for .Pp before or after .Sh; 500 - djm@cvs.openbsd.org 2008/07/21 08:19:07 501 [version.h] 502 openssh-5.1 503 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 504 [contrib/suse/openssh.spec] Update version number in README and RPM specs 505 - (djm) Release OpenSSH-5.1 506 50720080717 508 - (djm) OpenBSD CVS Sync 509 - djm@cvs.openbsd.org 2008/07/17 08:48:00 510 [sshconnect2.c] 511 strnvis preauth banner; pointed out by mpf@ ok markus@ 512 - djm@cvs.openbsd.org 2008/07/17 08:51:07 513 [auth2-hostbased.c] 514 strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes 515 report and patch from res AT qoxp.net (bz#1200); ok markus@ 516 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat 517 code, replace with equivalent cygwin library call. Patch from vinschen 518 at redhat.com, ok djm@. 519 - (djm) [sshconnect2.c] vis.h isn't available everywhere 520 52120080716 522 - OpenBSD CVS Sync 523 - djm@cvs.openbsd.org 2008/07/15 02:23:14 524 [sftp.1] 525 number of pipelined requests is now 64; 526 prodded by Iain.Morgan AT nasa.gov 527 - djm@cvs.openbsd.org 2008/07/16 11:51:14 528 [clientloop.c] 529 rename variable first_gc -> last_gc (since it is actually the last 530 in the list). 531 - djm@cvs.openbsd.org 2008/07/16 11:52:19 532 [channels.c] 533 this loop index should be automatic, not static 534 53520080714 536 - (djm) OpenBSD CVS Sync 537 - sthen@cvs.openbsd.org 2008/07/13 21:22:52 538 [ssh-keygen.c] 539 Change "ssh-keygen -F [host] -l" to not display random art unless 540 -v is also specified, making it consistent with the manual and other 541 uses of -l. 542 ok grunk@ 543 - djm@cvs.openbsd.org 2008/07/13 22:13:07 544 [channels.c] 545 use struct sockaddr_storage instead of struct sockaddr for accept(2) 546 address argument. from visibilis AT yahoo.com in bz#1485; ok markus@ 547 - djm@cvs.openbsd.org 2008/07/13 22:16:03 548 [sftp.c] 549 increase number of piplelined requests so they properly fill the 550 (recently increased) channel window. prompted by rapier AT psc.edu; 551 ok markus@ 552 - djm@cvs.openbsd.org 2008/07/14 01:55:56 553 [sftp-server.8] 554 mention requirement for /dev/log inside chroot when using sftp-server 555 with ChrootDirectory 556 - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to 557 avoid clash with sin(3) function; reported by 558 cristian.ionescu-idbohrn AT axis.com 559 - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close() 560 prototype; reported by cristian.ionescu-idbohrn AT axis.com 561 - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash; 562 reported by cristian.ionescu-idbohrn AT axis.com 563 - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config] 564 [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd] 565 Revamped and simplified Cygwin ssh-host-config script that uses 566 unified csih configuration tool. Requires recent Cygwin. 567 Patch from vinschen AT redhat.com 568 56920080712 570 - (djm) OpenBSD CVS Sync 571 - djm@cvs.openbsd.org 2008/07/12 04:52:50 572 [channels.c] 573 unbreak; move clearing of cctx struct to before first use 574 reported by dkrause@ 575 - djm@cvs.openbsd.org 2008/07/12 05:33:41 576 [scp.1] 577 better description for -i flag: 578 s/RSA authentication/public key authentication/ 579 - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h] 580 return EAI_FAMILY when trying to lookup unsupported address family; 581 from vinschen AT redhat.com 582 58320080711 584 - (djm) OpenBSD CVS Sync 585 - stevesk@cvs.openbsd.org 2008/07/07 00:31:41 586 [ttymodes.c] 587 we don't need arg after the debug3() was removed. from lint. 588 ok djm@ 589 - stevesk@cvs.openbsd.org 2008/07/07 23:32:51 590 [key.c] 591 /*NOTREACHED*/ for lint warning: 592 warning: function key_equal falls off bottom without returning value 593 ok djm@ 594 - markus@cvs.openbsd.org 2008/07/10 18:05:58 595 [channels.c] 596 missing bzero; from mickey; ok djm@ 597 - markus@cvs.openbsd.org 2008/07/10 18:08:11 598 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c] 599 sync v1 and v2 traffic accounting; add it to sshd, too; 600 ok djm@, dtucker@ 601 60220080709 603 - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass 604 - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM 605 account check failure path. The vulnerable format buffer is supplied 606 from PAM and should not contain attacker-supplied data. 607 - (djm) [auth.c] Missing unistd.h for close() 608 - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x 609 61020080705 611 - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed 612 passwords disabled. bz#1083 report & patch from senthilkumar_sen AT 613 hotpop.com, w/ dtucker@ 614 - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for 615 Tru64. readv doesn't seem to be a comparable object there. 616 bz#1386, patch from dtucker@ ok me 617 - (djm) [Makefile.in] Pass though pass to conch for interop tests 618 - (djm) [configure.ac] unbreak: remove extra closing brace 619 - (djm) OpenBSD CVS Sync 620 - djm@cvs.openbsd.org 2008/07/04 23:08:25 621 [packet.c] 622 handle EINTR in packet_write_poll()l ok dtucker@ 623 - djm@cvs.openbsd.org 2008/07/04 23:30:16 624 [auth1.c auth2.c] 625 Make protocol 1 MaxAuthTries logic match protocol 2's. 626 Do not treat the first protocol 2 authentication attempt as 627 a failure IFF it is for method "none". 628 Makes MaxAuthTries' user-visible behaviour identical for 629 protocol 1 vs 2. 630 ok dtucker@ 631 - djm@cvs.openbsd.org 2008/07/05 05:16:01 632 [PROTOCOL] 633 grammar 634 63520080704 636 - (dtucker) OpenBSD CVS Sync 637 - djm@cvs.openbsd.org 2008/07/02 13:30:34 638 [auth2.c] 639 really really remove the freebie "none" auth try for protocol 2 640 - djm@cvs.openbsd.org 2008/07/02 13:47:39 641 [ssh.1 ssh.c] 642 When forking after authentication ("ssh -f") with ExitOnForwardFailure 643 enabled, delay the fork until after replies for any -R forwards have 644 been seen. Allows for robust detection of -R forward failure when 645 using -f (similar to bz#92); ok dtucker@ 646 - otto@cvs.openbsd.org 2008/07/03 21:46:58 647 [auth2-pubkey.c] 648 avoid nasty double free; ok dtucker@ djm@ 649 - djm@cvs.openbsd.org 2008/07/04 03:44:59 650 [servconf.c groupaccess.h groupaccess.c] 651 support negation of groups in "Match group" block (bz#1315); ok dtucker@ 652 - dtucker@cvs.openbsd.org 2008/07/04 03:47:02 653 [monitor.c] 654 Make debug a little clearer. ok djm@ 655 - djm@cvs.openbsd.org 2008/06/30 08:07:34 656 [regress/key-options.sh] 657 shell portability: use "=" instead of "==" in test(1) expressions, 658 double-quote string with backslash escaped / 659 - djm@cvs.openbsd.org 2008/06/30 10:31:11 660 [regress/{putty-transfer,putty-kex,putty-ciphers}.sh] 661 remove "set -e" left over from debugging 662 - djm@cvs.openbsd.org 2008/06/30 10:43:03 663 [regress/conch-ciphers.sh] 664 explicitly disable conch options that could interfere with the test 665 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link 666 returns EXDEV. Patch from Mike Garrison, ok djm@ 667 - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h] 668 [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c] 669 [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on 670 some platforms (HP nonstop) it is a distinct errno; 671 bz#1467 reported by sconeu AT yahoo.com; ok dtucker@ 672 67320080702 674 - (dtucker) OpenBSD CVS Sync 675 - djm@cvs.openbsd.org 2008/06/30 08:05:59 676 [PROTOCOL.agent] 677 typo: s/constraint_date/constraint_data/ 678 - djm@cvs.openbsd.org 2008/06/30 12:15:39 679 [serverloop.c] 680 only pass channel requests on session channels through to the session 681 channel handler, avoiding spurious log messages; ok! markus@ 682 - djm@cvs.openbsd.org 2008/06/30 12:16:02 683 [nchan.c] 684 only send eow@openssh.com notifications for session channels; ok! markus@ 685 - djm@cvs.openbsd.org 2008/06/30 12:18:34 686 [PROTOCOL] 687 clarify that eow@openssh.com is only sent on session channels 688 - dtucker@cvs.openbsd.org 2008/07/01 07:20:52 689 [sshconnect.c] 690 Check ExitOnForwardFailure if forwardings are disabled due to a failed 691 host key check. ok djm@ 692 - dtucker@cvs.openbsd.org 2008/07/01 07:24:22 693 [sshconnect.c sshd.c] 694 Send CR LF during protocol banner exchanges, but only for Protocol 2 only, 695 in order to comply with RFC 4253. bz #1443, ok djm@ 696 - stevesk@cvs.openbsd.org 2008/07/01 23:12:47 697 [PROTOCOL.agent] 698 fix some typos; ok djm@ 699 - djm@cvs.openbsd.org 2008/07/02 02:24:18 700 [sshd_config sshd_config.5 sshd.8 servconf.c] 701 increase default size of ssh protocol 1 ephemeral key from 768 to 1024 702 bits; prodded by & ok dtucker@ ok deraadt@ 703 - dtucker@cvs.openbsd.org 2008/07/02 12:03:51 704 [auth-rsa.c auth.c auth2-pubkey.c auth.h] 705 Merge duplicate host key file checks, based in part on a patch from Rob 706 Holland via bz #1348 . Also checks for non-regular files during protocol 707 1 RSA auth. ok djm@ 708 - djm@cvs.openbsd.org 2008/07/02 12:36:39 709 [auth2-none.c auth2.c] 710 Make protocol 2 MaxAuthTries behaviour a little more sensible: 711 Check whether client has exceeded MaxAuthTries before running 712 an authentication method and skip it if they have, previously it 713 would always allow one try (for "none" auth). 714 Preincrement failure count before post-auth test - previously this 715 checked and postincremented, also to allow one "none" try. 716 Together, these two changes always count the "none" auth method 717 which could be skipped by a malicious client (e.g. an SSH worm) 718 to get an extra attempt at a real auth method. They also make 719 MaxAuthTries=0 a useful way to block users entirely (esp. in a 720 sshd_config Match block). 721 Also, move sending of any preauth banner from "none" auth method 722 to the first call to input_userauth_request(), so worms that skip 723 the "none" method get to see it too. 724 72520080630 726 - (djm) OpenBSD CVS Sync 727 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43 728 [regress/Makefile regress/key-options.sh] 729 Add regress test for key options. ok djm@ 730 - dtucker@cvs.openbsd.org 2008/06/11 23:11:40 731 [regress/Makefile] 732 Don't run cipher-speed test by default; mistakenly enabled by me 733 - djm@cvs.openbsd.org 2008/06/28 13:57:25 734 [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh] 735 very basic regress test against Twisted Conch in "make interop" 736 target (conch is available in ports/devel/py-twisted/conch); 737 ok markus@ 738 - (djm) [regress/Makefile] search for conch by path, like we do putty 739 74020080629 741 - (djm) OpenBSD CVS Sync 742 - martynas@cvs.openbsd.org 2008/06/21 07:46:46 743 [sftp.c] 744 use optopt to get invalid flag, instead of return value of getopt, 745 which is always '?'; ok djm@ 746 - otto@cvs.openbsd.org 2008/06/25 11:13:43 747 [key.c] 748 add key length to visual fingerprint; zap magical constants; 749 ok grunk@ djm@ 750 - djm@cvs.openbsd.org 2008/06/26 06:10:09 751 [sftp-client.c sftp-server.c] 752 allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky 753 bits. Note that this only affects explicit setting of modes (e.g. via 754 sftp(1)'s chmod command) and not file transfers. (bz#1310) 755 ok deraadt@ at c2k8 756 - djm@cvs.openbsd.org 2008/06/26 09:19:40 757 [dh.c dh.h moduli.c] 758 when loading moduli from /etc/moduli in sshd(8), check that they 759 are of the expected "safe prime" structure and have had 760 appropriate primality tests performed; 761 feedback and ok dtucker@ 762 - grunk@cvs.openbsd.org 2008/06/26 11:46:31 763 [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c] 764 Move SSH Fingerprint Visualization away from sharing the config option 765 CheckHostIP to an own config option named VisualHostKey. 766 While there, fix the behaviour that ssh would draw a random art picture 767 on every newly seen host even when the option was not enabled. 768 prodded by deraadt@, discussions, 769 help and ok markus@ djm@ dtucker@ 770 - jmc@cvs.openbsd.org 2008/06/26 21:11:46 771 [ssh.1] 772 add VisualHostKey to the list of options listed in -o; 773 - djm@cvs.openbsd.org 2008/06/28 07:25:07 774 [PROTOCOL] 775 spelling fixes 776 - djm@cvs.openbsd.org 2008/06/28 13:58:23 777 [ssh-agent.c] 778 refuse to add a key that has unknown constraints specified; 779 ok markus 780 - djm@cvs.openbsd.org 2008/06/28 14:05:15 781 [ssh-agent.c] 782 reset global compat flag after processing a protocol 2 signature 783 request with the legacy DSA encoding flag set; ok markus 784 - djm@cvs.openbsd.org 2008/06/28 14:08:30 785 [PROTOCOL PROTOCOL.agent] 786 document the protocol used by ssh-agent; "looks ok" markus@ 787 78820080628 789 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec] 790 RFC.nroff lacks a license, remove it (it is long gone in OpenBSD). 791 79220080626 793 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD. 794 (bz#1372) 795 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 796 [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files. 797 79820080616 799 - (dtucker) OpenBSD CVS Sync 800 - dtucker@cvs.openbsd.org 2008/06/16 13:22:53 801 [session.c channels.c] 802 Rename the isatty argument to is_tty so we don't shadow 803 isatty(3). ok markus@ 804 - (dtucker) [channels.c] isatty -> is_tty here too. 805 80620080615 807 - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc. 808 - OpenBSD CVS Sync 809 - dtucker@cvs.openbsd.org 2008/06/14 15:49:48 810 [sshd.c] 811 wrap long line at 80 chars 812 - dtucker@cvs.openbsd.org 2008/06/14 17:07:11 813 [sshd.c] 814 ensure default umask disallows at least group and world write; ok djm@ 815 - djm@cvs.openbsd.org 2008/06/14 18:33:43 816 [session.c] 817 suppress the warning message from chdir(homedir) failures 818 when chrooted (bz#1461); ok dtucker 819 - dtucker@cvs.openbsd.org 2008/06/14 19:42:10 820 [scp.1] 821 Mention that scp follows symlinks during -r. bz #1466, 822 from nectar at apple 823 - dtucker@cvs.openbsd.org 2008/06/15 16:55:38 824 [sshd_config.5] 825 MaxSessions is allowed in a Match block too 826 - dtucker@cvs.openbsd.org 2008/06/15 16:58:40 827 [servconf.c sshd_config.5] 828 Allow MaxAuthTries within a Match block. ok djm@ 829 - djm@cvs.openbsd.org 2008/06/15 20:06:26 830 [channels.c channels.h session.c] 831 don't call isatty() on a pty master, instead pass a flag down to 832 channel_set_fds() indicating that te fds refer to a tty. Fixes a 833 hang on exit on Solaris (bz#1463) in portable but is actually 834 a generic bug; ok dtucker deraadt markus 835 83620080614 837 - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction 838 replacement code; patch from ighighi AT gmail.com in bz#1240; 839 ok dtucker 840 84120080613 842 - (dtucker) OpenBSD CVS Sync 843 - deraadt@cvs.openbsd.org 2008/06/13 09:44:36 844 [packet.c] 845 compile on older gcc; no decl after code 846 - dtucker@cvs.openbsd.org 2008/06/13 13:56:59 847 [monitor.c] 848 Clear key options in the monitor on failed authentication, prevents 849 applying additional restrictions to non-pubkey authentications in 850 the case where pubkey fails but another method subsequently succeeds. 851 bz #1472, found by Colin Watson, ok markus@ djm@ 852 - dtucker@cvs.openbsd.org 2008/06/13 14:18:51 853 [auth2-pubkey.c auth-rhosts.c] 854 Include unistd.h for close(), prevents warnings in -portable 855 - dtucker@cvs.openbsd.org 2008/06/13 17:21:20 856 [mux.c] 857 Friendlier error messages for mux fallback. ok djm@ 858 - dtucker@cvs.openbsd.org 2008/06/13 18:55:22 859 [scp.c] 860 Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@ 861 - grunk@cvs.openbsd.org 2008/06/13 20:13:26 862 [ssh.1] 863 Explain the use of SSH fpr visualization using random art, and cite the 864 original scientific paper inspiring that technique. 865 Much help with English and nroff by jmc@, thanks. 866 - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which 867 despite its name doesn't seem to implement all of GSSAPI. Patch from 868 Jan Engelhardt, sanity checked by Simon Wilkinson. 869 87020080612 871 - (dtucker) OpenBSD CVS Sync 872 - jmc@cvs.openbsd.org 2008/06/11 07:30:37 873 [sshd.8] 874 kill trailing whitespace; 875 - grunk@cvs.openbsd.org 2008/06/11 21:01:35 876 [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c 877 sshconnect.c] 878 Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the 879 graphical hash visualization schemes known as "random art", and by 880 Dan Kaminsky's musings on the subject during a BlackOp talk at the 881 23C3 in Berlin. 882 Scientific publication (original paper): 883 "Hash Visualization: a New Technique to improve Real-World Security", 884 Perrig A. and Song D., 1999, International Workshop on Cryptographic 885 Techniques and E-Commerce (CrypTEC '99) 886 http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf 887 The algorithm used here is a worm crawling over a discrete plane, 888 leaving a trace (augmenting the field) everywhere it goes. 889 Movement is taken from dgst_raw 2bit-wise. Bumping into walls 890 makes the respective movement vector be ignored for this turn, 891 thus switching to the other color of the chessboard. 892 Graphs are not unambiguous for now, because circles in graphs can be 893 walked in either direction. 894 discussions with several people, 895 help, corrections and ok markus@ djm@ 896 - grunk@cvs.openbsd.org 2008/06/11 21:38:25 897 [ssh-keygen.c] 898 ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub 899 would not display you the random art as intended, spotted by canacar@ 900 - grunk@cvs.openbsd.org 2008/06/11 22:20:46 901 [ssh-keygen.c ssh-keygen.1] 902 ssh-keygen would write fingerprints to STDOUT, and random art to STDERR, 903 that is not how it was envisioned. 904 Also correct manpage saying that -v is needed along with -l for it to work. 905 spotted by naddy@ 906 - otto@cvs.openbsd.org 2008/06/11 23:02:22 907 [key.c] 908 simpler way of computing the augmentations; ok grunk@ 909 - grunk@cvs.openbsd.org 2008/06/11 23:03:56 910 [ssh_config.5] 911 CheckHostIP set to ``fingerprint'' will display both hex and random art 912 spotted by naddy@ 913 - grunk@cvs.openbsd.org 2008/06/11 23:51:57 914 [key.c] 915 #define statements that are not atoms need braces around them, else they 916 will cause trouble in some cases. 917 Also do a computation of -1 once, and not in a loop several times. 918 spotted by otto@ 919 - dtucker@cvs.openbsd.org 2008/06/12 00:03:49 920 [dns.c canohost.c sshconnect.c] 921 Do not pass "0" strings as ports to getaddrinfo because the lookups 922 can slow things down and we never use the service info anyway. bz 923 #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok 924 deraadt@ djm@ 925 djm belives that the reason for the "0" strings is to ensure that 926 it's not possible to call getaddrinfo with both host and port being 927 NULL. In the case of canohost.c host is a local array. In the 928 case of sshconnect.c, it's checked for null immediately before use. 929 In dns.c it ultimately comes from ssh.c:main() and is guaranteed to 930 be non-null but it's not obvious, so I added a warning message in 931 case it is ever passed a null. 932 - grunk@cvs.openbsd.org 2008/06/12 00:13:55 933 [sshconnect.c] 934 Make ssh print the random art also when ssh'ing to a host using IP only. 935 spotted by naddy@, ok and help djm@ dtucker@ 936 - otto@cvs.openbsd.org 2008/06/12 00:13:13 937 [key.c] 938 use an odd number of rows and columns and a separate start marker, looks 939 better; ok grunk@ 940 - djm@cvs.openbsd.org 2008/06/12 03:40:52 941 [clientloop.h mux.c channels.c clientloop.c channels.h] 942 Enable ~ escapes for multiplex slave sessions; give each channel 943 its own escape state and hook the escape filters up to muxed 944 channels. bz #1331 945 Mux slaves do not currently support the ~^Z and ~& escapes. 946 NB. this change cranks the mux protocol version, so a new ssh 947 mux client will not be able to connect to a running old ssh 948 mux master. 949 ok dtucker@ 950 - djm@cvs.openbsd.org 2008/06/12 04:06:00 951 [clientloop.h ssh.c clientloop.c] 952 maintain an ordered queue of outstanding global requests that we 953 expect replies to, similar to the per-channel confirmation queue. 954 Use this queue to verify success or failure for remote forward 955 establishment in a race free way. 956 ok dtucker@ 957 - djm@cvs.openbsd.org 2008/06/12 04:17:47 958 [clientloop.c] 959 thall shalt not code past the eightieth column 960 - djm@cvs.openbsd.org 2008/06/12 04:24:06 961 [ssh.c] 962 thal shalt not code past the eightieth column 963 - djm@cvs.openbsd.org 2008/06/12 05:15:41 964 [PROTOCOL] 965 document tun@openssh.com forwarding method 966 - djm@cvs.openbsd.org 2008/06/12 05:32:30 967 [mux.c] 968 some more TODO for me 969 - grunk@cvs.openbsd.org 2008/06/12 05:42:46 970 [key.c] 971 supply the key type (rsa1, rsa, dsa) as a caption in the frame of the 972 random art. while there, stress the fact that the field base should at 973 least be 8 characters for the pictures to make sense. 974 comment and ok djm@ 975 - grunk@cvs.openbsd.org 2008/06/12 06:32:59 976 [key.c] 977 We already mark the start of the worm, now also mark the end of the worm 978 in our random art drawings. 979 ok djm@ 980 - djm@cvs.openbsd.org 2008/06/12 15:19:17 981 [clientloop.h channels.h clientloop.c channels.c mux.c] 982 The multiplexing escape char handler commit last night introduced a 983 small memory leak per session; plug it. 984 - dtucker@cvs.openbsd.org 2008/06/12 16:35:31 985 [ssh_config.5 ssh.c] 986 keyword expansion for localcommand. ok djm@ 987 - jmc@cvs.openbsd.org 2008/06/12 19:10:09 988 [ssh_config.5 ssh-keygen.1] 989 tweak the ascii art text; ok grunk 990 - dtucker@cvs.openbsd.org 2008/06/12 20:38:28 991 [sshd.c sshconnect.c packet.h misc.c misc.h packet.c] 992 Make keepalive timeouts apply while waiting for a packet, particularly 993 during key renegotiation (bz #1363). With djm and Matt Day, ok djm@ 994 - djm@cvs.openbsd.org 2008/06/12 20:47:04 995 [sftp-client.c] 996 print extension revisions for extensions that we understand 997 - djm@cvs.openbsd.org 2008/06/12 21:06:25 998 [clientloop.c] 999 I was coalescing expected global request confirmation replies at 1000 the wrong end of the queue - fix; prompted by markus@ 1001 - grunk@cvs.openbsd.org 2008/06/12 21:14:46 1002 [ssh-keygen.c] 1003 make ssh-keygen -lf show the key type just as ssh-add -l would do it 1004 ok djm@ markus@ 1005 - grunk@cvs.openbsd.org 2008/06/12 22:03:36 1006 [key.c] 1007 add my copyright, ok djm@ 1008 - ian@cvs.openbsd.org 2008/06/12 23:24:58 1009 [sshconnect.c] 1010 tweak wording in message, ok deraadt@ jmc@ 1011 - dtucker@cvs.openbsd.org 2008/06/13 00:12:02 1012 [sftp.h log.h] 1013 replace __dead with __attribute__((noreturn)), makes things 1014 a little easier to port. Also, add it to sigdie(). ok djm@ 1015 - djm@cvs.openbsd.org 2008/06/13 00:16:49 1016 [mux.c] 1017 fall back to creating a new TCP connection on most multiplexing errors 1018 (socket connect fail, invalid version, refused permittion, corrupted 1019 messages, etc.); bz #1329 ok dtucker@ 1020 - dtucker@cvs.openbsd.org 2008/06/13 00:47:53 1021 [mux.c] 1022 upcast size_t to u_long to match format arg; ok djm@ 1023 - dtucker@cvs.openbsd.org 2008/06/13 00:51:47 1024 [mac.c] 1025 upcast another size_t to u_long to match format 1026 - dtucker@cvs.openbsd.org 2008/06/13 01:38:23 1027 [misc.c] 1028 upcast uid to long with matching %ld, prevents warnings in portable 1029 - djm@cvs.openbsd.org 2008/06/13 04:40:22 1030 [auth2-pubkey.c auth-rhosts.c] 1031 refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not 1032 regular files; report from Solar Designer via Colin Watson in bz#1471 1033 ok dtucker@ deraadt 1034 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now 1035 takes 2 more args. with djm@ 1036 - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch 1037 from Todd Vierling. 1038 - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA 1039 systems. Patch from R. Scott Bailey. 1040 - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used 1041 on big endian machines, so ifdef them for little-endian only to prevent 1042 unused function warnings on big-endians. 1043 - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent 1044 compiler warnings on some platforms. Based on a discussion with otto@ 1045 104620080611 1047 - (djm) [channels.c configure.ac] 1048 Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no) 1049 bz#1464; ok dtucker 1050 105120080610 1052 - (dtucker) OpenBSD CVS Sync 1053 - djm@cvs.openbsd.org 2008/06/10 03:57:27 1054 [servconf.c match.h sshd_config.5] 1055 support CIDR address matching in sshd_config "Match address" blocks, with 1056 full support for negation and fall-back to classic wildcard matching. 1057 For example: 1058 Match address 192.0.2.0/24,3ffe:ffff::/32,!10.* 1059 PasswordAuthentication yes 1060 addrmatch.c code mostly lifted from flowd's addr.c 1061 feedback and ok dtucker@ 1062 - djm@cvs.openbsd.org 2008/06/10 04:17:46 1063 [sshd_config.5] 1064 better reference for pattern-list 1065 - dtucker@cvs.openbsd.org 2008/06/10 04:50:25 1066 [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8] 1067 Add extended test mode (-T) and connection parameters for test mode (-C). 1068 -T causes sshd to write its effective configuration to stdout and exit. 1069 -C causes any relevant Match rules to be applied before output. The 1070 combination allows tesing of the parser and config files. ok deraadt djm 1071 - jmc@cvs.openbsd.org 2008/06/10 07:12:00 1072 [sshd_config.5] 1073 tweak previous; 1074 - jmc@cvs.openbsd.org 2008/06/10 08:17:40 1075 [sshd.8 sshd.c] 1076 - update usage() 1077 - fix SYNOPSIS, and sort options 1078 - some minor additional fixes 1079 - dtucker@cvs.openbsd.org 2008/06/09 18:06:32 1080 [regress/test-exec.sh] 1081 Don't generate putty keys if we're not going to use them. ok djm 1082 - dtucker@cvs.openbsd.org 2008/06/10 05:23:32 1083 [regress/addrmatch.sh regress/Makefile] 1084 Regress test for Match CIDR rules. ok djm@ 1085 - dtucker@cvs.openbsd.org 2008/06/10 15:21:41 1086 [test-exec.sh] 1087 Use a more portable construct for checking if we're running a putty test 1088 - dtucker@cvs.openbsd.org 2008/06/10 15:28:49 1089 [test-exec.sh] 1090 Add quotes 1091 - dtucker@cvs.openbsd.org 2008/06/10 18:21:24 1092 [ssh_config.5] 1093 clarify that Host patterns are space-separated. ok deraadt 1094 - djm@cvs.openbsd.org 2008/06/10 22:15:23 1095 [PROTOCOL ssh.c serverloop.c] 1096 Add a no-more-sessions@openssh.com global request extension that the 1097 client sends when it knows that it will never request another session 1098 (i.e. when session multiplexing is disabled). This allows a server to 1099 disallow further session requests and terminate the session. 1100 Why would a non-multiplexing client ever issue additional session 1101 requests? It could have been attacked with something like SSH'jack: 1102 http://www.storm.net.nz/projects/7 1103 feedback & ok markus 1104 - djm@cvs.openbsd.org 2008/06/10 23:06:19 1105 [auth-options.c match.c servconf.c addrmatch.c sshd.8] 1106 support CIDR address matching in .ssh/authorized_keys from="..." stanzas 1107 ok and extensive testing dtucker@ 1108 - dtucker@cvs.openbsd.org 2008/06/10 23:21:34 1109 [bufaux.c] 1110 Use '\0' for a nul byte rather than unadorned 0. ok djm@ 1111 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43 1112 [Makefile regress/key-options.sh] 1113 Add regress test for key options. ok djm@ 1114 - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6 1115 since the new CIDR code in addmatch.c references it. 1116 - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6 1117 specific tests on platforms that don't do IPv6. 1118 - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well 1119 as environment. 1120 - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now. 1121 112220080609 1123 - (dtucker) OpenBSD CVS Sync 1124 - dtucker@cvs.openbsd.org 2008/06/08 17:04:41 1125 [sftp-server.c] 1126 Add case for ENOSYS in errno_to_portable; ok deraadt 1127 - dtucker@cvs.openbsd.org 2008/06/08 20:15:29 1128 [sftp.c sftp-client.c sftp-client.h] 1129 Have the sftp client store the statvfs replies in wire format, 1130 which prevents problems when the server's native sizes exceed the 1131 client's. 1132 Also extends the sizes of the remaining 32bit wire format to 64bit, 1133 they're specified as unsigned long in the standard. 1134 - dtucker@cvs.openbsd.org 2008/06/09 13:02:39 1135 [sftp-server.c] 1136 Extend 32bit -> 64bit values for statvfs extension missed in previous 1137 commit. 1138 - dtucker@cvs.openbsd.org 2008/06/09 13:38:46 1139 [PROTOCOL] 1140 Use a $OpenBSD tag so our scripts will sync changes. 1141 114220080608 1143 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c 1144 openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h 1145 openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and 1146 fstatvfs and remove #defines around statvfs code. ok djm@ 1147 - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a 1148 macro to convert fsid to unsigned long for platforms where fsid is a 1149 2-member array. 1150 115120080607 1152 - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H. 1153 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c] 1154 Do not enable statvfs extensions on platforms that do not have statvfs. 1155 - (dtucker) OpenBSD CVS Sync 1156 - djm@cvs.openbsd.org 2008/05/19 06:14:02 1157 [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@ 1158 - djm@cvs.openbsd.org 2008/05/19 15:45:07 1159 [sshtty.c ttymodes.c sshpty.h] 1160 Fix sending tty modes when stdin is not a tty (bz#1199). Previously 1161 we would send the modes corresponding to a zeroed struct termios, 1162 whereas we should have been sending an empty list of modes. 1163 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@ 1164 - djm@cvs.openbsd.org 2008/05/19 15:46:31 1165 [ssh-keygen.c] 1166 support -l (print fingerprint) in combination with -F (find host) to 1167 search for a host in ~/.ssh/known_hosts and display its fingerprint; 1168 ok markus@ 1169 - djm@cvs.openbsd.org 2008/05/19 20:53:52 1170 [clientloop.c] 1171 unbreak tree by committing this bit that I missed from: 1172 Fix sending tty modes when stdin is not a tty (bz#1199). Previously 1173 we would send the modes corresponding to a zeroed struct termios, 1174 whereas we should have been sending an empty list of modes. 1175 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@ 1176 117720080604 1178 - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias 1179 in arc4random_uniform with upper_bound in (2^30,2*31). Note that 1180 OpenSSH did not make requests with upper bounds in this range. 1181 118220080519 1183 - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in] 1184 [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h] 1185 Fix compilation on Linux, including pulling in fmt_scaled(3) 1186 implementation from OpenBSD's libutil. 1187 118820080518 1189 - (djm) OpenBSD CVS Sync 1190 - djm@cvs.openbsd.org 2008/04/04 05:14:38 1191 [sshd_config.5] 1192 ChrootDirectory is supported in Match blocks (in fact, it is most useful 1193 there). Spotted by Minstrel AT minstrel.org.uk 1194 - djm@cvs.openbsd.org 2008/04/04 06:44:26 1195 [sshd_config.5] 1196 oops, some unrelated stuff crept into that commit - backout. 1197 spotted by jmc@ 1198 - djm@cvs.openbsd.org 2008/04/05 02:46:02 1199 [sshd_config.5] 1200 HostbasedAuthentication is supported under Match too 1201 - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c] 1202 [configure.ac] Implement arc4random_buf(), import implementation of 1203 arc4random_uniform() from OpenBSD 1204 - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes 1205 - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h 1206 - (djm) OpenBSD CVS Sync 1207 - djm@cvs.openbsd.org 2008/04/13 00:22:17 1208 [dh.c sshd.c] 1209 Use arc4random_buf() when requesting more than a single word of output 1210 Use arc4random_uniform() when the desired random number upper bound 1211 is not a power of two 1212 ok deraadt@ millert@ 1213 - djm@cvs.openbsd.org 2008/04/18 12:32:11 1214 [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h] 1215 introduce sftp extension methods statvfs@openssh.com and 1216 fstatvfs@openssh.com that implement statvfs(2)-like operations, 1217 based on a patch from miklos AT szeredi.hu (bz#1399) 1218 also add a "df" command to the sftp client that uses the 1219 statvfs@openssh.com to produce a df(1)-like display of filesystem 1220 space and inode utilisation 1221 ok markus@ 1222 - jmc@cvs.openbsd.org 2008/04/18 17:15:47 1223 [sftp.1] 1224 macro fixage; 1225 - djm@cvs.openbsd.org 2008/04/18 22:01:33 1226 [session.c] 1227 remove unneccessary parentheses 1228 - otto@cvs.openbsd.org 2008/04/29 11:20:31 1229 [monitor_mm.h] 1230 garbage collect two unused fields in struct mm_master; ok markus@ 1231 - djm@cvs.openbsd.org 2008/04/30 10:14:03 1232 [ssh-keyscan.1 ssh-keyscan.c] 1233 default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by 1234 larsnooden AT openoffice.org 1235 - pyr@cvs.openbsd.org 2008/05/07 05:49:37 1236 [servconf.c servconf.h session.c sshd_config.5] 1237 Enable the AllowAgentForwarding option in sshd_config (global and match 1238 context), to specify if agents should be permitted on the server. 1239 As the man page states: 1240 ``Note that disabling Agent forwarding does not improve security 1241 unless users are also denied shell access, as they can always install 1242 their own forwarders.'' 1243 ok djm@, ok and a mild frown markus@ 1244 - pyr@cvs.openbsd.org 2008/05/07 06:43:35 1245 [sshd_config] 1246 push the sshd_config bits in, spotted by ajacoutot@ 1247 - jmc@cvs.openbsd.org 2008/05/07 08:00:14 1248 [sshd_config.5] 1249 sort; 1250 - markus@cvs.openbsd.org 2008/05/08 06:59:01 1251 [bufaux.c buffer.h channels.c packet.c packet.h] 1252 avoid extra malloc/copy/free when receiving data over the net; 1253 ~10% speedup for localhost-scp; ok djm@ 1254 - djm@cvs.openbsd.org 2008/05/08 12:02:23 1255 [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c] 1256 [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c] 1257 [ssh.c sshd.c] 1258 Implement a channel success/failure status confirmation callback 1259 mechanism. Each channel maintains a queue of callbacks, which will 1260 be drained in order (RFC4253 guarantees confirm messages are not 1261 reordered within an channel). 1262 Also includes a abandonment callback to clean up if a channel is 1263 closed without sending confirmation messages. This probably 1264 shouldn't happen in compliant implementations, but it could be 1265 abused to leak memory. 1266 ok markus@ (as part of a larger diff) 1267 - djm@cvs.openbsd.org 2008/05/08 12:21:16 1268 [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c] 1269 [sshd_config sshd_config.5] 1270 Make the maximum number of sessions run-time controllable via 1271 a sshd_config MaxSessions knob. This is useful for disabling 1272 login/shell/subsystem access while leaving port-forwarding working 1273 (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or 1274 simply increasing the number of allows multiplexed sessions. 1275 Because some bozos are sure to configure MaxSessions in excess of the 1276 number of available file descriptors in sshd (which, at peak, might be 1277 as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds 1278 on error paths, and make it fail gracefully on out-of-fd conditions - 1279 sending channel errors instead of than exiting with fatal(). 1280 bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com 1281 ok markus@ 1282 - djm@cvs.openbsd.org 2008/05/08 13:06:11 1283 [clientloop.c clientloop.h ssh.c] 1284 Use new channel status confirmation callback system to properly deal 1285 with "important" channel requests that fail, in particular command exec, 1286 shell and subsystem requests. Previously we would optimistically assume 1287 that the requests would always succeed, which could cause hangs if they 1288 did not (e.g. when the server runs out of fds) or were unimplemented by 1289 the server (bz #1384) 1290 Also, properly report failing multiplex channel requests via the mux 1291 client stderr (subject to LogLevel in the mux master) - better than 1292 silently failing. 1293 most bits ok markus@ (as part of a larger diff) 1294 - djm@cvs.openbsd.org 2008/05/09 04:55:56 1295 [channels.c channels.h clientloop.c serverloop.c] 1296 Try additional addresses when connecting to a port forward destination 1297 whose DNS name resolves to more than one address. The previous behaviour 1298 was to try the first address and give up. 1299 Reported by stig AT venaas.com in bz#343 1300 great feedback and ok markus@ 1301 - djm@cvs.openbsd.org 2008/05/09 14:18:44 1302 [clientloop.c clientloop.h ssh.c mux.c] 1303 tidy up session multiplexing code, moving it into its own file and 1304 making the function names more consistent - making ssh.c and 1305 clientloop.c a fair bit more readable. 1306 ok markus@ 1307 - djm@cvs.openbsd.org 2008/05/09 14:26:08 1308 [ssh.c] 1309 dingo stole my diff hunk 1310 - markus@cvs.openbsd.org 2008/05/09 16:16:06 1311 [session.c] 1312 re-add the USE_PIPES code and enable it. 1313 without pipes shutdown-read from the sshd does not trigger 1314 a SIGPIPE when the forked program does a write. 1315 ok djm@ 1316 (Id sync only, USE_PIPES never left portable OpenSSH) 1317 - markus@cvs.openbsd.org 2008/05/09 16:17:51 1318 [channels.c] 1319 error-fd race: don't enable the error fd in the select bitmask 1320 for channels with both in- and output closed, since the channel 1321 will go away before we call select(); 1322 report, lots of debugging help and ok djm@ 1323 - markus@cvs.openbsd.org 2008/05/09 16:21:13 1324 [channels.h clientloop.c nchan.c serverloop.c] 1325 unbreak 1326 ssh -2 localhost od /bin/ls | true 1327 ignoring SIGPIPE by adding a new channel message (EOW) that signals 1328 the peer that we're not interested in any data it might send. 1329 fixes bz #85; discussion, debugging and ok djm@ 1330 - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20 1331 [umac.c] 1332 Ensure nh_result lies on a 64-bit boundary (fixes warnings observed 1333 on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@ 1334 - djm@cvs.openbsd.org 2008/05/15 23:52:24 1335 [nchan2.ms] 1336 document eow message in ssh protocol 2 channel state machine; 1337 feedback and ok markus@ 1338 - djm@cvs.openbsd.org 2008/05/18 21:29:05 1339 [sftp-server.c] 1340 comment extension announcement 1341 - djm@cvs.openbsd.org 2008/05/16 08:30:42 1342 [PROTOCOL] 1343 document our protocol extensions and deviations; ok markus@ 1344 - djm@cvs.openbsd.org 2008/05/17 01:31:56 1345 [PROTOCOL] 1346 grammar and correctness fixes from stevesk@ 1347 134820080403 1349 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile- 1350 time warnings on LynxOS. Patch from ops AT iki.fi 1351 - (djm) Force string arguments to replacement setproctitle() though 1352 strnvis first. Ok dtucker@ 1353 135420080403 1355 - (djm) OpenBSD CVS sync: 1356 - markus@cvs.openbsd.org 2008/04/02 15:36:51 1357 [channels.c] 1358 avoid possible hijacking of x11-forwarded connections (back out 1.183) 1359 CVE-2008-1483; ok djm@ 1360 - jmc@cvs.openbsd.org 2008/03/27 22:37:57 1361 [sshd.8] 1362 remove trailing whitespace; 1363 - djm@cvs.openbsd.org 2008/04/03 09:50:14 1364 [version.h] 1365 openssh-5.0 1366 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 1367 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files 1368 - (djm) [README] Update link to release notes 1369 - (djm) Release 5.0p1 1370