]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
13 years ago - (djm) Respin OpenSSH-5.9p1 release V_5_9 anongit/V_5_9 github-selfhosted/V_5_9 github/V_5_9 V_5_9_P1
Damien Miller [Tue, 6 Sep 2011 23:13:15 +0000 (09:13 +1000)] 
 - (djm) Respin OpenSSH-5.9p1 release

13 years ago - (djm) [README version.h] Correct version
Damien Miller [Tue, 6 Sep 2011 23:11:18 +0000 (09:11 +1000)] 
 - (djm) [README version.h] Correct version

13 years ago - (djm) Release OpenSSH-5.9
Damien Miller [Mon, 5 Sep 2011 05:38:35 +0000 (15:38 +1000)] 
 - (djm) Release OpenSSH-5.9

13 years ago - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
Damien Miller [Mon, 5 Sep 2011 00:27:57 +0000 (10:27 +1000)] 
 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
   [contrib/suse/openssh.spec] Update version numbers.

13 years ago - (dtucker) [ssh-keygen.c ssh-pkcs11.c] Bug #1929: add null implementations
Darren Tucker [Sun, 4 Sep 2011 09:59:26 +0000 (19:59 +1000)] 
 - (dtucker) [ssh-keygen.c ssh-pkcs11.c] Bug #1929: add null implementations
   ofsh-pkcs11.cpkcs_init and pkcs_terminate for building without dlopen support.

13 years ago - (djm) [regress/connect-privsep.sh regress/test-exec.sh] demote fatal
Damien Miller [Sun, 4 Sep 2011 09:04:16 +0000 (19:04 +1000)] 
 - (djm) [regress/connect-privsep.sh regress/test-exec.sh] demote fatal
   regress errors for the sandbox to warnings. ok tim dtucker

13 years ago - (djm) [openbsd-compat/port-linux.c] Suppress logging when attempting
Damien Miller [Mon, 29 Aug 2011 06:09:52 +0000 (16:09 +1000)] 
 - (djm) [openbsd-compat/port-linux.c] Suppress logging when attempting
   to switch SELinux context away from unconfined_t, based on patch from
   Jan Chadima; bz#1919 ok dtucker@

13 years ago - (dtucker) [auth-skey.c] Add log.h to fix build --with-skey.
Darren Tucker [Sat, 27 Aug 2011 18:50:16 +0000 (04:50 +1000)] 
 - (dtucker) [auth-skey.c] Add log.h to fix build --with-skey.

14 years ago - (tim) [configure.ac] Typo in error message spotted by Andy Tsouladze
Tim Rice [Thu, 18 Aug 2011 04:48:22 +0000 (21:48 -0700)] 
 - (tim) [configure.ac] Typo in error message spotted by Andy Tsouladze

14 years ago - (djm) [regress/cipher-speed.sh regress/try-ciphers.sh] disable HMAC-SHA2
Damien Miller [Wed, 17 Aug 2011 02:25:46 +0000 (12:25 +1000)] 
 - (djm) [regress/cipher-speed.sh regress/try-ciphers.sh] disable HMAC-SHA2
   MAC tests for platforms that hack EVP_SHA2 support

14 years ago - djm@cvs.openbsd.org 2011/08/02 01:23:41
Damien Miller [Wed, 17 Aug 2011 02:10:02 +0000 (12:10 +1000)] 
   - djm@cvs.openbsd.org 2011/08/02 01:23:41
     [regress/cipher-speed.sh regress/try-ciphers.sh]
     add SHA256/SHA512 based HMAC modes

14 years ago - markus@cvs.openbsd.org 2011/06/30 22:44:43
Damien Miller [Wed, 17 Aug 2011 02:09:19 +0000 (12:09 +1000)] 
   - markus@cvs.openbsd.org 2011/06/30 22:44:43
     [connect-privsep.sh]
     test with sandbox enabled; ok djm@

14 years ago - dtucker@cvs.openbsd.org 2011/06/03 05:35:10
Damien Miller [Wed, 17 Aug 2011 02:08:15 +0000 (12:08 +1000)] 
   - dtucker@cvs.openbsd.org 2011/06/03 05:35:10
     [regress/cfgmatch.sh]
     use OBJ to find test configs, patch from Tim Rice

14 years ago - (djm) [contrib/ssh-copy-id] Missing backlslash; spotted by
Damien Miller [Wed, 17 Aug 2011 02:01:44 +0000 (12:01 +1000)] 
 - (djm) [contrib/ssh-copy-id] Missing backlslash; spotted by
   bisson AT archlinux.org

14 years ago - (djm) [configure.ac] error out if the host lacks the necessary bits for
Damien Miller [Wed, 17 Aug 2011 01:59:25 +0000 (11:59 +1000)] 
 - (djm) [configure.ac] error out if the host lacks the necessary bits for
   an explicitly requested sandbox type

14 years ago - (djm) [ openbsd-compat/bsd-cygwin_util.c openbsd-compat/bsd-cygwin_util.h]
Damien Miller [Wed, 17 Aug 2011 01:31:07 +0000 (11:31 +1000)] 
 - (djm) [ openbsd-compat/bsd-cygwin_util.c openbsd-compat/bsd-cygwin_util.h]
   binary_pipe is no longer required on Cygwin; patch from Corinna Vinschen

14 years ago - (tim) [mac.c myproposal.h] Wrap SHA256 and SHA512 in ifdefs for
Tim Rice [Wed, 17 Aug 2011 00:29:01 +0000 (17:29 -0700)] 
 - (tim) [mac.c myproposal.h] Wrap SHA256 and SHA512 in ifdefs for
   OpenSSL 0.9.7. ok djm

14 years ago - (djm) [contrib/ssh-copy-id] Fix failure for cases where the path to the
Damien Miller [Fri, 12 Aug 2011 01:22:47 +0000 (11:22 +1000)] 
 - (djm) [contrib/ssh-copy-id] Fix failure for cases where the path to the
   identify file contained whitespace. bz#1828 patch from gwenael.lambrouin
   AT gmail.com; ok dtucker@

14 years ago - (djm) [contrib/redhat/openssh.spec contrib/redhat/sshd.init]
Damien Miller [Fri, 12 Aug 2011 01:02:35 +0000 (11:02 +1000)] 
 - (djm) [contrib/redhat/openssh.spec contrib/redhat/sshd.init]
   [contrib/suse/openssh.spec contrib/suse/rc.sshd] Updated RHEL and SLES
   init scrips from imorgan AT nas.nasa.gov

14 years ago - (dtucker) [openbsd-compat/port-linux.c] Bug 1924: Improve selinux context
Darren Tucker [Fri, 12 Aug 2011 00:12:53 +0000 (10:12 +1000)] 
 - (dtucker) [openbsd-compat/port-linux.c] Bug 1924: Improve selinux context
   change error by reporting old and new context names  Patch from
   jchadima at redhat.

14 years ago - dtucker@cvs.openbsd.org 2011/08/07 12:55:30
Darren Tucker [Sun, 7 Aug 2011 13:12:26 +0000 (23:12 +1000)] 
   - dtucker@cvs.openbsd.org 2011/08/07 12:55:30
     [sftp.1]
     typo, fix from Laurent Gautrot

14 years ago - jmc@cvs.openbsd.org 2010/10/14 20:41:28
Darren Tucker [Sun, 7 Aug 2011 13:10:56 +0000 (23:10 +1000)] 
   - jmc@cvs.openbsd.org 2010/10/14 20:41:28
     [moduli.5]
     probabalistic -> probabilistic; from naddy

14 years ago - sobrado@cvs.openbsd.org 2009/10/28 08:56:54
Darren Tucker [Sun, 7 Aug 2011 13:10:11 +0000 (23:10 +1000)] 
   - sobrado@cvs.openbsd.org 2009/10/28 08:56:54
     [moduli.5]
     "Diffie-Hellman" is the usual spelling for the cryptographic protocol
     first published by Whitfield Diffie and Martin Hellman in 1976.
     ok jmc@

14 years ago - (dtucker) OpenBSD CVS Sync
Darren Tucker [Sun, 7 Aug 2011 13:09:20 +0000 (23:09 +1000)] 
 - (dtucker) OpenBSD CVS Sync
   - jmc@cvs.openbsd.org 2008/06/26 06:59:39
     [moduli.5]
     tweak previous;

14 years ago - djm@cvs.openbsd.org 2011/08/02 23:15:03
Damien Miller [Fri, 5 Aug 2011 20:18:16 +0000 (06:18 +1000)] 
   - djm@cvs.openbsd.org 2011/08/02 23:15:03
     [ssh.c]
     typo in comment

14 years ago - djm@cvs.openbsd.org 2011/08/02 23:13:01
Damien Miller [Fri, 5 Aug 2011 20:17:48 +0000 (06:17 +1000)] 
   - djm@cvs.openbsd.org 2011/08/02 23:13:01
     [version.h]
     crank now, release later

14 years ago - djm@cvs.openbsd.org 2011/08/02 01:22:11
Damien Miller [Fri, 5 Aug 2011 20:17:30 +0000 (06:17 +1000)] 
   - djm@cvs.openbsd.org 2011/08/02 01:22:11
     [mac.c myproposal.h ssh.1 ssh_config.5 sshd.8 sshd_config.5]
     Add new SHA256 and SHA512 based HMAC modes from
     http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt
     Patch from mdb AT juniper.net; feedback and ok markus@

14 years ago - markus@cvs.openbsd.org 2011/08/01 19:18:15
Damien Miller [Fri, 5 Aug 2011 20:16:46 +0000 (06:16 +1000)] 
   - markus@cvs.openbsd.org 2011/08/01 19:18:15
     [gss-serv.c]
     prevent post-auth resource exhaustion (int overflow leading to 4GB malloc);
     report Adam Zabrock; ok djm@, deraadt@

14 years ago - djm@cvs.openbsd.org 2011/07/29 14:42:45
Damien Miller [Fri, 5 Aug 2011 20:16:23 +0000 (06:16 +1000)] 
   - djm@cvs.openbsd.org 2011/07/29 14:42:45
     [sandbox-systrace.c]
     fail open(2) with EPERM rather than SIGKILLing the whole process. libc
     will call open() to do strerror() when NLS is enabled;
     feedback and ok markus@

14 years ago - tedu@cvs.openbsd.org 2011/07/06 18:09:21
Damien Miller [Fri, 5 Aug 2011 20:16:00 +0000 (06:16 +1000)] 
   - tedu@cvs.openbsd.org 2011/07/06 18:09:21
     [authfd.c]
     bzero the agent address.  the kernel was for a while very cranky about
     these things.  evne though that's fixed, always good to initialize
     memory.  ok deraadt djm

14 years ago - djm@cvs.openbsd.org 2011/06/23 23:35:42
Damien Miller [Fri, 5 Aug 2011 20:15:15 +0000 (06:15 +1000)] 
   - djm@cvs.openbsd.org 2011/06/23 23:35:42
     [monitor.c]
     ignore EINTR errors from poll()

14 years ago - (djm) [configure.ac Makefile.in sandbox-darwin.c] Add a sandbox for
Damien Miller [Sun, 26 Jun 2011 21:18:18 +0000 (07:18 +1000)] 
 - (djm) [configure.ac Makefile.in sandbox-darwin.c] Add a sandbox for
   Darwin/OS X using sandbox_init() + setrlimit(); feedback and testing
   markus@

14 years ago - djm@cvs.openbsd.org 2011/06/23 09:34:13
Damien Miller [Thu, 23 Jun 2011 09:45:51 +0000 (19:45 +1000)] 
   - djm@cvs.openbsd.org 2011/06/23 09:34:13
     [sshd.c ssh-sandbox.h sandbox.h sandbox-rlimit.c sandbox-systrace.c]
     [sandbox-null.c]
     rename sandbox.h => ssh-sandbox.h to make things easier for portable

14 years ago - (djm) [sandbox-null.c] Dummy sandbox for platforms that don't support
Damien Miller [Thu, 23 Jun 2011 09:03:18 +0000 (19:03 +1000)] 
 - (djm) [sandbox-null.c] Dummy sandbox for platforms that don't support
   setrlimit(2)

14 years ago - djm@cvs.openbsd.org 2011/06/22 22:08:42
Damien Miller [Wed, 22 Jun 2011 22:31:57 +0000 (08:31 +1000)] 
   - djm@cvs.openbsd.org 2011/06/22 22:08:42
     [channels.c channels.h clientloop.c clientloop.h mux.c ssh.c]
     hook up a channel confirm callback to warn the user then requested X11
     forwarding was refused by the server; ok markus@

14 years ago - djm@cvs.openbsd.org 2011/06/22 21:57:01
Damien Miller [Wed, 22 Jun 2011 22:30:03 +0000 (08:30 +1000)] 
   - djm@cvs.openbsd.org 2011/06/22 21:57:01
     [servconf.c servconf.h sshd.c sshd_config.5 sandbox-rlimit.c]
     [sandbox-systrace.c sandbox.h configure.ac Makefile.in]
     introduce sandboxing of the pre-auth privsep child using systrace(4).

     This introduces a new "UsePrivilegeSeparation=sandbox" option for
     sshd_config that applies mandatory restrictions on the syscalls the
     privsep child can perform. This prevents a compromised privsep child
     from being used to attack other hosts (by opening sockets and proxying)
     or probing local kernel attack surface.

     The sandbox is implemented using systrace(4) in unsupervised "fast-path"
     mode, where a list of permitted syscalls is supplied. Any syscall not
     on the list results in SIGKILL being sent to the privsep child. Note
     that this requires a kernel with the new SYSTR_POLICY_KILL option.

     UsePrivilegeSeparation=sandbox will become the default in the future
     so please start testing it now.

     feedback dtucker@; ok markus@

14 years ago - OpenBSD CVS Sync
Damien Miller [Wed, 22 Jun 2011 22:20:30 +0000 (08:20 +1000)] 
 - OpenBSD CVS Sync
   - djm@cvs.openbsd.org 2011/06/22 21:47:28
     [servconf.c]
     reuse the multistate option arrays to pretty-print options for "sshd -T"

14 years ago - djm@cvs.openbsd.org 2011/06/17 21:57:25
Damien Miller [Mon, 20 Jun 2011 04:43:31 +0000 (14:43 +1000)] 
   - djm@cvs.openbsd.org 2011/06/17 21:57:25
     [clientloop.c]
     setproctitle for a mux master that has been gracefully stopped;
     bz#1911 from Bert.Wesarg AT googlemail.com

14 years ago - djm@cvs.openbsd.org 2011/06/17 21:47:35
Damien Miller [Mon, 20 Jun 2011 04:43:11 +0000 (14:43 +1000)] 
   - djm@cvs.openbsd.org 2011/06/17 21:47:35
     [servconf.c]
     factor out multi-choice option parsing into a parse_multistate label
     and some support structures; ok dtucker@

14 years ago - djm@cvs.openbsd.org 2011/06/17 21:46:16
Damien Miller [Mon, 20 Jun 2011 04:42:51 +0000 (14:42 +1000)] 
   - djm@cvs.openbsd.org 2011/06/17 21:46:16
     [sftp-server.c]
     the protocol version should be unsigned; bz#1913 reported by mb AT
     smartftp.com

14 years ago - djm@cvs.openbsd.org 2011/06/17 21:44:31
Damien Miller [Mon, 20 Jun 2011 04:42:23 +0000 (14:42 +1000)] 
   - djm@cvs.openbsd.org 2011/06/17 21:44:31
     [log.c log.h monitor.c monitor.h monitor_wrap.c monitor_wrap.h sshd.c]
     make the pre-auth privsep slave log via a socketpair shared with the
     monitor rather than /var/empty/dev/log; ok dtucker@ deraadt@ markus@

14 years ago - markus@cvs.openbsd.org 2011/06/14 22:49:18
Damien Miller [Mon, 20 Jun 2011 04:23:25 +0000 (14:23 +1000)] 
   - markus@cvs.openbsd.org 2011/06/14 22:49:18
     [authfile.c]
     make sure key_parse_public/private_rsa1() no longer consumes its input
     buffer.  fixes ssh-add for passphrase-protected ssh1-keys;
     noted by naddy@; ok djm@

14 years ago - djm@cvs.openbsd.org 2011/06/04 00:10:26
Damien Miller [Mon, 20 Jun 2011 04:22:49 +0000 (14:22 +1000)] 
   - djm@cvs.openbsd.org 2011/06/04 00:10:26
     [ssh_config.5]
     explain IdentifyFile's semantics a little better, prompted by bz#1898
     ok dtucker jmc

14 years ago - (tim) [regress/cfgmatch.sh] Build/test out of tree fix.
Tim Rice [Fri, 3 Jun 2011 05:26:19 +0000 (22:26 -0700)] 
 - (tim) [regress/cfgmatch.sh] Build/test out of tree fix.

14 years ago - dtucker@cvs.openbsd.org 2011/06/03 00:29:52
Darren Tucker [Fri, 3 Jun 2011 04:19:02 +0000 (14:19 +1000)] 
   - dtucker@cvs.openbsd.org 2011/06/03 00:29:52
     [regress/dynamic-forward.sh]
     Retry establishing the port forwarding after a small delay, should make
     the tests less flaky when the previous test is slow to shut down and free
     up the port.

14 years ago - dtucker@cvs.openbsd.org 2011/05/31 02:03:34
Darren Tucker [Fri, 3 Jun 2011 04:18:17 +0000 (14:18 +1000)] 
   - dtucker@cvs.openbsd.org 2011/05/31 02:03:34
     [regress/dynamic-forward.sh]
     work around startup and teardown races; caught by deraadt

14 years ago - dtucker@cvs.openbsd.org 2011/05/31 02:01:58
Darren Tucker [Fri, 3 Jun 2011 04:17:27 +0000 (14:17 +1000)] 
- dtucker@cvs.openbsd.org 2011/05/31 02:01:58
     [regress/dynamic-forward.sh]
     back out revs 1.6 and 1.5 since it's not reliable

14 years ago - dtucker@cvs.openbsd.org 2011/06/03 01:37:40
Darren Tucker [Fri, 3 Jun 2011 04:14:16 +0000 (14:14 +1000)] 
   - dtucker@cvs.openbsd.org 2011/06/03 01:37:40
     [ssh-agent.c]
     Check current parent process ID against saved one to determine if the parent
     has exited, rather than attempting to send a zero signal, since the latter
     won't work if the parent has changed privs.  bz#1905, patch from Daniel Kahn
     Gillmor, ok djm@

14 years ago - (djm) [configure.ac] enable setproctitle emulation for OS X
Damien Miller [Fri, 3 Jun 2011 02:11:38 +0000 (12:11 +1000)] 
 - (djm) [configure.ac] enable setproctitle emulation for OS X

14 years ago - djm@cvs.openbsd.org 2011/06/03 00:54:38
Damien Miller [Fri, 3 Jun 2011 02:10:22 +0000 (12:10 +1000)] 
  - djm@cvs.openbsd.org 2011/06/03 00:54:38
    [ssh.c]
    bz#1883 - setproctitle() to identify mux master; patch from Bert.Wesarg
    AT googlemail.com; ok dtucker@
    NB. includes additional portability code to enable setproctitle emulation
    on platforms that don't support it.

14 years agoadd missing changelog entry
Darren Tucker [Fri, 3 Jun 2011 01:20:06 +0000 (11:20 +1000)] 
add missing changelog entry

14 years agoRemove the !HAVE_SOCKETPAIR case. We use socketpair unconditionally in other
Darren Tucker [Fri, 3 Jun 2011 01:17:52 +0000 (11:17 +1000)] 
Remove the !HAVE_SOCKETPAIR case.  We use socketpair unconditionally in other
places and the survey data we have does not show any systems that use it.
"nuke it" djm@

14 years ago - (tim) [configure.ac defines.h] Run test program to detect system mail
Tim Rice [Fri, 3 Jun 2011 01:17:49 +0000 (18:17 -0700)] 
 - (tim) [configure.ac defines.h] Run test program to detect system mail
   directory. Add --with-maildir option to override. Fixed OpenServer 6
   getting it wrong. Fixed many systems having MAIL=/var/mail//username
   ok dtucker

14 years ago - (dtucker) [README version.h contrib/caldera/openssh.spec
Darren Tucker [Fri, 3 Jun 2011 00:35:23 +0000 (10:35 +1000)] 
 - (dtucker) [README version.h contrib/caldera/openssh.spec
   contrib/redhat/openssh.spec contrib/suse/openssh.spec] Pull the version
   bumps from the 5.8p2 branch into HEAD.  ok djm.

14 years ago - djm@cvs.openbsd.org 2011/05/23 03:31:31
Damien Miller [Sun, 29 May 2011 11:59:10 +0000 (21:59 +1000)] 
   - djm@cvs.openbsd.org 2011/05/23 03:31:31
     [regress/cfgmatch.sh]
     include testing of multiple/overridden AuthorizedKeysFiles
     refactor to simply daemon start/stop and get rid of racy constructs

14 years ago - djm@cvs.openbsd.org 2011/05/24 07:15:47
Damien Miller [Sun, 29 May 2011 11:42:31 +0000 (21:42 +1000)] 
   - djm@cvs.openbsd.org 2011/05/24 07:15:47
     [readconf.c readconf.h ssh.c ssh_config.5 sshconnect.c sshconnect2.c]
     Remove undocumented legacy options UserKnownHostsFile2 and
     GlobalKnownHostsFile2 by making UserKnownHostsFile/GlobalKnownHostsFile
     accept multiple paths per line and making their defaults include
     known_hosts2; ok markus

14 years ago - djm@cvs.openbsd.org 2011/05/23 07:24:57
Damien Miller [Sun, 29 May 2011 11:42:08 +0000 (21:42 +1000)] 
   - djm@cvs.openbsd.org 2011/05/23 07:24:57
     [authfile.c]
     read in key comments for v.2 keys (though note that these are not
     passed over the agent protocol); bz#439, based on patch from binder
     AT arago.de; ok markus@

14 years ago - jmc@cvs.openbsd.org 2011/05/23 07:10:21
Damien Miller [Sun, 29 May 2011 11:41:40 +0000 (21:41 +1000)] 
   - jmc@cvs.openbsd.org 2011/05/23 07:10:21
     [sshd.8 sshd_config.5]
     tweak previous; ok djm

14 years ago - djm@cvs.openbsd.org 2011/05/23 03:52:55
Damien Miller [Sun, 29 May 2011 11:41:03 +0000 (21:41 +1000)] 
   - djm@cvs.openbsd.org 2011/05/23 03:52:55
     [sshconnect.c]
     remove extra newline

14 years ago - djm@cvs.openbsd.org 2011/05/23 03:33:38
Damien Miller [Sun, 29 May 2011 11:40:42 +0000 (21:40 +1000)] 
   - djm@cvs.openbsd.org 2011/05/23 03:33:38
     [auth.c]
     make secure_filename() spam debug logs less

14 years agoOpenBSD CVS Sync
Damien Miller [Sun, 29 May 2011 11:39:36 +0000 (21:39 +1000)] 
OpenBSD CVS Sync
   - djm@cvs.openbsd.org 2011/05/23 03:30:07
     [auth-rsa.c auth.c auth.h auth2-pubkey.c monitor.c monitor_wrap.c pathnames.h servconf.c servconf.h sshd.8 sshd_config sshd_config.5]
     allow AuthorizedKeysFile to specify multiple files, separated by spaces.
     Bring back authorized_keys2 as a default search path (to avoid breaking
     existing users of this file), but override this in sshd_config so it will
     be no longer used on fresh installs. Maybe in 2015 we can remove it
     entierly :)

     feedback and ok markus@ dtucker@

14 years ago - dtucker@cvs.openbsd.org 2011/05/20 06:32:30
Damien Miller [Fri, 20 May 2011 09:08:40 +0000 (19:08 +1000)] 
   - dtucker@cvs.openbsd.org 2011/05/20 06:32:30
     [dynamic-forward.sh]
     fix dumb error in dynamic-forward test

14 years ago - dtucker@cvs.openbsd.org 2011/05/20 05:19:50
Damien Miller [Fri, 20 May 2011 09:08:11 +0000 (19:08 +1000)] 
   - dtucker@cvs.openbsd.org 2011/05/20 05:19:50
     [dynamic-forward.sh]
     Prevent races in dynamic forwarding test; ok djm

14 years ago - djm@cvs.openbsd.org 2011/05/20 02:43:36
Damien Miller [Fri, 20 May 2011 09:07:45 +0000 (19:07 +1000)] 
   - djm@cvs.openbsd.org 2011/05/20 02:43:36
     [cert-hostkey.sh]
     another attempt to generate a v00 ECDSA key that broke the test
     ID sync only - portable already had this somehow

14 years ago - djm@cvs.openbsd.org 2011/05/17 07:13:31
Damien Miller [Fri, 20 May 2011 09:06:48 +0000 (19:06 +1000)] 
   - djm@cvs.openbsd.org 2011/05/17 07:13:31
     [regress/cert-userkey.sh]
     fatal() if asked to generate a legacy ECDSA cert (these don't exist)
     and fix the regress test that was trying to generate them :)

14 years ago - djm@cvs.openbsd.org 2011/05/20 03:25:45
Damien Miller [Fri, 20 May 2011 09:04:14 +0000 (19:04 +1000)] 
   - djm@cvs.openbsd.org 2011/05/20 03:25:45
     [monitor.c monitor_wrap.c servconf.c servconf.h]
     use a macro to define which string options to copy between configs
     for Match. This avoids problems caused by forgetting to keep three
     code locations in perfect sync and ordering

     "this is at once beautiful and horrible" + ok dtucker@

14 years ago - dtucker@cvs.openbsd.org 2011/05/20 02:00:19
Damien Miller [Fri, 20 May 2011 09:03:49 +0000 (19:03 +1000)] 
   - dtucker@cvs.openbsd.org 2011/05/20 02:00:19
     [servconf.c]
     Add comment documenting what should be after the preauth check.  ok djm

14 years ago - djm@cvs.openbsd.org 2011/05/20 00:55:02
Damien Miller [Fri, 20 May 2011 09:03:31 +0000 (19:03 +1000)] 
   - djm@cvs.openbsd.org 2011/05/20 00:55:02
     [servconf.c]
     the options TrustedUserCAKeys, RevokedKeysFile, AuthorizedKeysFile
     and AuthorizedPrincipalsFile were not being correctly applied in
     Match blocks, despite being overridable there; ok dtucker@

14 years ago - djm@cvs.openbsd.org 2011/05/17 07:13:31
Damien Miller [Fri, 20 May 2011 09:03:08 +0000 (19:03 +1000)] 
   - djm@cvs.openbsd.org 2011/05/17 07:13:31
     [key.c]
     fatal() if asked to generate a legacy ECDSA cert (these don't exist)
     and fix the regress test that was trying to generate them :)

14 years ago - OpenBSD CVS Sync
Damien Miller [Fri, 20 May 2011 09:02:47 +0000 (19:02 +1000)] 
 - OpenBSD CVS Sync
   - djm@cvs.openbsd.org 2011/05/15 08:09:01
     [authfd.c monitor.c serverloop.c]
     use FD_CLOEXEC consistently; patch from zion AT x96.org

14 years ago - (djm) [servconf.c] remove leftover droppings of AuthorizedKeysFile2
Damien Miller [Fri, 20 May 2011 08:57:14 +0000 (18:57 +1000)] 
 - (djm) [servconf.c] remove leftover droppings of AuthorizedKeysFile2

14 years ago - (djm) [aclocal.m4 configure.ac] since gcc-4.x ignores all -Wno-options
Damien Miller [Fri, 20 May 2011 08:56:30 +0000 (18:56 +1000)] 
 - (djm) [aclocal.m4 configure.ac] since gcc-4.x ignores all -Wno-options
   options, we should corresponding -W-option when trying to determine
   whether it is accepted.  Also includes a warning fix on the program
   fragment uses (bad main() return type).
   bz#1900 and bz#1901 reported by g.esp AT free.fr; ok dtucker@

14 years ago - (djm) [aclocal.m4 configure.ac] since gcc-4.x ignores all -Wno-options
Damien Miller [Fri, 20 May 2011 01:45:25 +0000 (11:45 +1000)] 
 - (djm) [aclocal.m4 configure.ac] since gcc-4.x ignores all -Wno-options
   options, we should corresponding -W-option when trying to determine
   whether it is accepted.  Also includes a warning fix on the program
   fragment uses (bad main() return type).
   bz#1900 and bz#1901 reported by g.esp AT free.fr; ok dtucker@

14 years ago - (djm) [session.c] call setexeccon() before executing passwd for pw
Damien Miller [Fri, 20 May 2011 01:23:07 +0000 (11:23 +1000)] 
 - (djm) [session.c] call setexeccon() before executing passwd for pw
   changes; bz#1891 reported by jchadima AT redhat.com; ok dtucker@

14 years ago - (djm) [packet.c] unbreak portability #endif
Damien Miller [Sat, 14 May 2011 22:58:15 +0000 (08:58 +1000)] 
 - (djm) [packet.c] unbreak portability #endif

14 years ago - djm@cvs.openbsd.org 2011/05/13 00:05:36
Damien Miller [Sat, 14 May 2011 22:51:43 +0000 (08:51 +1000)] 
   - djm@cvs.openbsd.org 2011/05/13 00:05:36
     [authfile.c]
     warn on unexpected key type in key_parse_private_type()

14 years ago - djm@cvs.openbsd.org 2011/05/11 04:47:06
Damien Miller [Sat, 14 May 2011 22:51:05 +0000 (08:51 +1000)] 
   - djm@cvs.openbsd.org 2011/05/11 04:47:06
     [auth.c auth.h auth2-pubkey.c pathnames.h servconf.c servconf.h]
     remove support for authorized_keys2; it is a relic from the early days
     of protocol v.2 support and has been undocumented for many years;
     ok markus@

14 years ago - djm@cvs.openbsd.org 2011/05/10 05:46:46
Damien Miller [Sat, 14 May 2011 22:50:32 +0000 (08:50 +1000)] 
   - djm@cvs.openbsd.org 2011/05/10 05:46:46
     [authfile.c]
     despam debug() logs by detecting that we are trying to load a private key
     in key_try_load_public() and returning early; ok markus@

14 years ago - djm@cvs.openbsd.org 2011/05/08 12:52:01
Damien Miller [Sat, 14 May 2011 22:48:05 +0000 (08:48 +1000)] 
   - djm@cvs.openbsd.org 2011/05/08 12:52:01
     [PROTOCOL.mux clientloop.c clientloop.h mux.c]
     improve our behaviour when TTY allocation fails: if we are in
     RequestTTY=auto mode (the default), then do not treat at TTY
     allocation error as fatal but rather just restore the local TTY
     to cooked mode and continue. This is more graceful on devices that
     never allocate TTYs.

     If RequestTTY is set to "yes" or "force", then failure to allocate
     a TTY is fatal.

     ok markus@

14 years ago - jmc@cvs.openbsd.org 2011/05/07 23:20:25
Damien Miller [Sat, 14 May 2011 22:47:43 +0000 (08:47 +1000)] 
   - jmc@cvs.openbsd.org 2011/05/07 23:20:25
     [ssh.1]
     +.It RequestTTY

14 years ago - jmc@cvs.openbsd.org 2011/05/07 23:19:39
Damien Miller [Sat, 14 May 2011 22:47:18 +0000 (08:47 +1000)] 
   - jmc@cvs.openbsd.org 2011/05/07 23:19:39
     [ssh_config.5]
     - tweak previous
     - come consistency fixes

     ok djm

14 years ago - djm@cvs.openbsd.org 2011/05/06 22:20:10
Damien Miller [Sat, 14 May 2011 22:46:54 +0000 (08:46 +1000)] 
   - djm@cvs.openbsd.org 2011/05/06 22:20:10
     [PROTOCOL.mux]
     fix numbering; from bert.wesarg AT googlemail.com

14 years ago - djm@cvs.openbsd.org 2011/05/06 21:38:58
Damien Miller [Sat, 14 May 2011 22:46:29 +0000 (08:46 +1000)] 
   - djm@cvs.openbsd.org 2011/05/06 21:38:58
     [ssh.c]
     fix dropping from previous diff

14 years ago - djm@cvs.openbsd.org 2011/05/06 21:34:32
Damien Miller [Sat, 14 May 2011 22:45:50 +0000 (08:45 +1000)] 
   - djm@cvs.openbsd.org 2011/05/06 21:34:32
     [clientloop.c mux.c readconf.c readconf.h ssh.c ssh_config.5]
     Add a RequestTTY ssh_config option to allow configuration-based
     control over tty allocation (like -t/-T); ok markus@

14 years ago - djm@cvs.openbsd.org 2011/05/06 21:31:38
Damien Miller [Sat, 14 May 2011 22:44:45 +0000 (08:44 +1000)] 
   - djm@cvs.openbsd.org 2011/05/06 21:31:38
     [readconf.c ssh_config.5]
     support negated Host matching, e.g.

     Host *.example.org !c.example.org
        User mekmitasdigoat

     Will match "a.example.org", "b.example.org", but not "c.example.org"
     ok markus@

14 years ago - djm@cvs.openbsd.org 2011/05/06 21:18:02
Damien Miller [Sat, 14 May 2011 22:44:02 +0000 (08:44 +1000)] 
   - djm@cvs.openbsd.org 2011/05/06 21:18:02
     [ssh.c ssh_config.5]
     add a %L expansion (short-form of the local host name) for ControlPath;
     sync some more expansions with LocalCommand; ok markus@

14 years ago - djm@cvs.openbsd.org 2011/05/06 21:14:05
Damien Miller [Sat, 14 May 2011 22:43:13 +0000 (08:43 +1000)] 
   - djm@cvs.openbsd.org 2011/05/06 21:14:05
     [packet.c packet.h]
     set traffic class for IPv6 traffic as we do for IPv4 TOS;
     patch from lionel AT mamane.lu via Colin Watson in bz#1855;
     ok markus@

14 years ago - djm@cvs.openbsd.org 2011/05/06 02:05:41
Damien Miller [Sat, 14 May 2011 22:36:59 +0000 (08:36 +1000)] 
   - djm@cvs.openbsd.org 2011/05/06 02:05:41
     [sshconnect2.c]
     fix memory leak; bz#1849 ok dtucker@

14 years ago - djm@cvs.openbsd.org 2011/05/06 01:09:53
Damien Miller [Sat, 14 May 2011 22:36:29 +0000 (08:36 +1000)] 
   - djm@cvs.openbsd.org 2011/05/06 01:09:53
     [sftp.1]
     mention that IPv6 addresses must be enclosed in square brackets;
     bz#1845

14 years ago - dtucker@cvs.openbsd.org 2011/05/06 01:03:35
Damien Miller [Sat, 14 May 2011 22:36:02 +0000 (08:36 +1000)] 
   - dtucker@cvs.openbsd.org 2011/05/06 01:03:35
     [sshd_config]
     clarify language about overriding defaults.  bz#1892, from Petr Cerny

14 years ago - djm@cvs.openbsd.org 2011/05/05 05:12:08
Damien Miller [Sat, 14 May 2011 22:34:46 +0000 (08:34 +1000)] 
   - djm@cvs.openbsd.org 2011/05/05 05:12:08
     [mux.c]
     gracefully fall back when ControlPath is too large for a
     sockaddr_un. ok markus@ as part of a larger diff

14 years ago - (dtucker) [openbsd-compat/openssl-compat.{c,h}] Bug #1882: fix
Darren Tucker [Tue, 10 May 2011 01:13:36 +0000 (11:13 +1000)] 
 - (dtucker) [openbsd-compat/openssl-compat.{c,h}] Bug #1882: fix
   --with-ssl-engine which was broken with the change from deprecated
   SSLeay_add_all_algorithms().  ok djm

14 years ago - (dtucker) [openbsd-compat/regress/closefromtest.c] Bug #1875: add prototype
Darren Tucker [Fri, 6 May 2011 00:43:50 +0000 (10:43 +1000)] 
 - (dtucker) [openbsd-compat/regress/closefromtest.c] Bug #1875: add prototype
   for closefrom() in test code.  Report from Dan Wallis via Gentoo.

14 years ago - (tim) [defines.h] Deal with platforms that do not have S_IFSOCK ok djm@
Tim Rice [Thu, 5 May 2011 06:06:59 +0000 (23:06 -0700)] 
 - (tim) [defines.h] Deal with platforms that do not have S_IFSOCK ok djm@

14 years ago - (tim) [configure.ac] Add AC_LANG_SOURCE to OPENSSH_CHECK_CFLAG_COMPILE
Tim Rice [Thu, 5 May 2011 04:44:25 +0000 (21:44 -0700)] 
 - (tim) [configure.ac] Add AC_LANG_SOURCE to OPENSSH_CHECK_CFLAG_COMPILE
   so autoreconf 2.68 is happy.

14 years ago - djm@cvs.openbsd.org 2011/05/04 21:15:29
Damien Miller [Thu, 5 May 2011 04:17:18 +0000 (14:17 +1000)] 
   - djm@cvs.openbsd.org 2011/05/04 21:15:29
     [authfile.c authfile.h ssh-add.c]
     allow "ssh-add - < key"; feedback and ok markus@

14 years ago - djm@cvs.openbsd.org 2011/04/18 00:46:05
Damien Miller [Thu, 5 May 2011 04:16:56 +0000 (14:16 +1000)] 
   - djm@cvs.openbsd.org 2011/04/18 00:46:05
     [ssh-keygen.c]
     certificate options are supposed to be packed in lexical order of
     option name (though we don't actually enforce this at present).
     Move one up that was out of sequence

14 years ago - djm@cvs.openbsd.org 2011/04/17 22:42:42
Damien Miller [Thu, 5 May 2011 04:16:22 +0000 (14:16 +1000)] 
   - djm@cvs.openbsd.org 2011/04/17 22:42:42
     [PROTOCOL.mux clientloop.c clientloop.h mux.c ssh.1 ssh.c]
     allow graceful shutdown of multiplexing: request that a mux server
     removes its listener socket and refuse future multiplexing requests;
     ok markus@

14 years ago - djm@cvs.openbsd.org 2011/04/13 04:09:37
Damien Miller [Thu, 5 May 2011 04:15:54 +0000 (14:15 +1000)] 
   - djm@cvs.openbsd.org 2011/04/13 04:09:37
     [ssh-keygen.1]
     mention valid -b sizes for ECDSA keys; bz#1862

14 years ago - djm@cvs.openbsd.org 2011/04/13 04:02:48
Damien Miller [Thu, 5 May 2011 04:15:33 +0000 (14:15 +1000)] 
   - djm@cvs.openbsd.org 2011/04/13 04:02:48
     [ssh-keygen.1]
     improve wording; bz#1861