]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
15 years ago - djm@cvs.openbsd.org 2010/03/08 00:28:55 V_5_4 anongit/V_5_4 github-selfhosted/V_5_4 github/V_5_4 V_5_4_P1
Damien Miller [Mon, 8 Mar 2010 00:30:28 +0000 (11:30 +1100)] 
   - djm@cvs.openbsd.org 2010/03/08 00:28:55
     [ssh-keygen.1]
     document permit-agent-forwarding certificate constraint; patch from
     stevesk@

15 years ago - djm@cvs.openbsd.org 2010/03/08 00:28:55
Damien Miller [Mon, 8 Mar 2010 00:30:00 +0000 (11:30 +1100)] 
   - djm@cvs.openbsd.org 2010/03/08 00:28:55
     [ssh-keygen.1]
     document permit-agent-forwarding certificate constraint; patch from
     stevesk@

15 years ago - (djm) Release OpenSSH-5.4p1
Damien Miller [Sun, 7 Mar 2010 22:50:17 +0000 (09:50 +1100)] 
 - (djm) Release OpenSSH-5.4p1

15 years ago - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
Damien Miller [Sun, 7 Mar 2010 22:41:02 +0000 (09:41 +1100)] 
 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
   crank version numbers

15 years ago - djm@cvs.openbsd.org 2010/03/07 22:16:01
Damien Miller [Sun, 7 Mar 2010 22:24:11 +0000 (09:24 +1100)] 
   - djm@cvs.openbsd.org 2010/03/07 22:16:01
     [ssh-keygen.c]
     make internal strptime string match strftime format;
     suggested by vinschen AT redhat.com and markus@

15 years ago - (djm) OpenBSD CVS Sync
Damien Miller [Sun, 7 Mar 2010 22:03:33 +0000 (09:03 +1100)] 
 - (djm) OpenBSD CVS Sync
   - djm@cvs.openbsd.org 2010/03/07 22:01:32
     [version.h]
     openssh-5.4

15 years ago - dtucker@cvs.openbsd.org 2010/03/07 11:57:13
Darren Tucker [Sun, 7 Mar 2010 12:05:17 +0000 (23:05 +1100)] 
   - dtucker@cvs.openbsd.org 2010/03/07 11:57:13
     [auth-rhosts.c monitor.c monitor_wrap.c session.c auth-options.c sshd.c]
     Hold authentication debug messages until after successful authentication.
     Fixes an info leak of environment variables specified in authorized_keys,
     reported by Jacob Appelbaum.  ok djm@

15 years ago - (dtucker) [session.c] Also initialize creds to NULL for handing to
Darren Tucker [Sun, 7 Mar 2010 02:32:16 +0000 (13:32 +1100)] 
 - (dtucker) [session.c] Also initialize creds to NULL for handing to
   setpcred.

15 years ago - (dtucker) [session.c] Bug #1567: move setpcred call to before chroot and
Darren Tucker [Sun, 7 Mar 2010 02:21:12 +0000 (13:21 +1100)] 
 - (dtucker) [session.c] Bug #1567: move setpcred call to before chroot and
   do not set real uid, since that's needed for the chroot, and will be set
   by permanently_set_uid.

15 years ago - (dtucker) [auth.c] Bug #1710: call setauthdb on AIX before getpwuid so that
Darren Tucker [Sun, 7 Mar 2010 00:56:59 +0000 (11:56 +1100)] 
 - (dtucker) [auth.c] Bug #1710: call setauthdb on AIX before getpwuid so that
   it gets the passwd struct from the LAM that knows about the user which is
   not necessarily the default.  Patch from Alexandre Letourneau.

15 years ago - djm@cvs.openbsd.org 2010/03/05 10:28:21
Damien Miller [Fri, 5 Mar 2010 10:31:11 +0000 (21:31 +1100)] 
   - djm@cvs.openbsd.org 2010/03/05 10:28:21
     [ssh-add.1 ssh.1 ssh_config.5]
     mention loading of certificate files from [private]-cert.pub when
     they are present; feedback and ok jmc@

15 years ago - jmc@cvs.openbsd.org 2010/03/05 08:31:20
Damien Miller [Fri, 5 Mar 2010 10:30:54 +0000 (21:30 +1100)] 
   - jmc@cvs.openbsd.org 2010/03/05 08:31:20
     [ssh.1]
     document certificate authentication; help/ok djm

15 years ago - jmc@cvs.openbsd.org 2010/03/05 06:50:35
Damien Miller [Fri, 5 Mar 2010 10:30:35 +0000 (21:30 +1100)] 
   - jmc@cvs.openbsd.org 2010/03/05 06:50:35
     [ssh.1 sshd.8]
     tweak previous;

15 years ago - (djm) [configure.ac] set -fno-strict-aliasing for gcc4; ok dtucker@
Damien Miller [Fri, 5 Mar 2010 04:04:35 +0000 (15:04 +1100)] 
 - (djm) [configure.ac] set -fno-strict-aliasing for gcc4; ok dtucker@

15 years ago - djm@cvs.openbsd.org 2010/03/05 02:58:11
Damien Miller [Fri, 5 Mar 2010 03:03:03 +0000 (14:03 +1100)] 
   - djm@cvs.openbsd.org 2010/03/05 02:58:11
     [auth.c]
     make the warning for a revoked key louder and more noticable

15 years ago - (djm) [ssh-rand-helper.c] declare optind, avoiding compilation failure
Damien Miller [Fri, 5 Mar 2010 00:40:19 +0000 (11:40 +1100)] 
 - (djm) [ssh-rand-helper.c] declare optind, avoiding compilation failure
   on some platforms

15 years ago - djm@cvs.openbsd.org 2010/03/04 23:27:25
Damien Miller [Thu, 4 Mar 2010 23:42:24 +0000 (10:42 +1100)] 
   - djm@cvs.openbsd.org 2010/03/04 23:27:25
     [auth-options.c ssh-keygen.c]
     "force-command" is not spelled "forced-command"; spotted by
     imorgan AT nas.nasa.gov

15 years ago - djm@cvs.openbsd.org 2010/03/04 23:19:29
Damien Miller [Thu, 4 Mar 2010 23:42:05 +0000 (10:42 +1100)] 
   - djm@cvs.openbsd.org 2010/03/04 23:19:29
     [ssh.1 sshd.8]
     move section on CA and revoked keys from ssh.1 to sshd.8's known hosts
     format section and rework it a bit; requested by jmc@

15 years ago - djm@cvs.openbsd.org 2010/03/04 23:17:25
Damien Miller [Thu, 4 Mar 2010 23:41:45 +0000 (10:41 +1100)] 
   - djm@cvs.openbsd.org 2010/03/04 23:17:25
     [sshd_config.5]
     missing word; spotted by jmc@

15 years ago - jmc@cvs.openbsd.org 2010/03/04 22:52:40
Damien Miller [Thu, 4 Mar 2010 23:41:26 +0000 (10:41 +1100)] 
   - jmc@cvs.openbsd.org 2010/03/04 22:52:40
     [ssh-keygen.1]
     fix Bk/Ek;

15 years ago - (tim) [ssh-pkcs11.c] Fix "non-constant initializer" errors in older
Tim Rice [Thu, 4 Mar 2010 20:48:05 +0000 (12:48 -0800)] 
 - (tim) [ssh-pkcs11.c] Fix "non-constant initializer" errors in older
   compilers. OK djm@

15 years ago - djm@cvs.openbsd.org 2010/03/04 20:35:08
Damien Miller [Thu, 4 Mar 2010 20:39:35 +0000 (07:39 +1100)] 
   - djm@cvs.openbsd.org 2010/03/04 20:35:08
     [ssh-keygen.1 ssh-keygen.c]
     Add a -L flag to print the contents of a certificate; ok markus@

15 years ago - jmc@cvs.openbsd.org 2010/03/04 12:51:25
Damien Miller [Thu, 4 Mar 2010 20:39:01 +0000 (07:39 +1100)] 
   - jmc@cvs.openbsd.org 2010/03/04 12:51:25
     [ssh.1 sshd_config.5]
     tweak previous;

15 years ago - djm@cvs.openbsd.org 2010/03/04 10:38:23
Damien Miller [Thu, 4 Mar 2010 10:58:01 +0000 (21:58 +1100)] 
   - djm@cvs.openbsd.org 2010/03/04 10:38:23
     [regress/cert-hostkey.sh regress/cert-userkey.sh]
     additional regression tests for revoked keys and TrustedUserCAKeys

15 years ago - djm@cvs.openbsd.org 2010/03/03 00:47:23
Damien Miller [Thu, 4 Mar 2010 10:57:21 +0000 (21:57 +1100)] 
   - djm@cvs.openbsd.org 2010/03/03 00:47:23
     [regress/cert-hostkey.sh regress/cert-userkey.sh]
     add an extra test to ensure that authentication with the wrong
     certificate fails as it should (and it does)

15 years ago - djm@cvs.openbsd.org 2010/03/04 10:36:03
Damien Miller [Thu, 4 Mar 2010 10:53:35 +0000 (21:53 +1100)] 
   - djm@cvs.openbsd.org 2010/03/04 10:36:03
     [auth-rh-rsa.c auth-rsa.c auth.c auth.h auth2-hostbased.c auth2-pubkey.c]
     [authfile.c authfile.h hostfile.c hostfile.h servconf.c servconf.h]
     [ssh-keygen.c ssh.1 sshconnect.c sshd_config.5]
     Add a TrustedUserCAKeys option to sshd_config to specify CA keys that
     are trusted to authenticate users (in addition than doing it per-user
     in authorized_keys).

     Add a RevokedKeys option to sshd_config and a @revoked marker to
     known_hosts to allow keys to me revoked and banned for user or host
     authentication.

     feedback and ok markus@

15 years ago - djm@cvs.openbsd.org 2010/03/04 01:44:57
Damien Miller [Thu, 4 Mar 2010 10:52:18 +0000 (21:52 +1100)] 
   - djm@cvs.openbsd.org 2010/03/04 01:44:57
     [key.c]
     use buffer_get_string_ptr_ret() where we are checking the return
     value explicitly instead of the fatal()-causing buffer_get_string_ptr()

15 years ago - djm@cvs.openbsd.org 2010/03/03 22:50:40
Damien Miller [Thu, 4 Mar 2010 10:52:00 +0000 (21:52 +1100)] 
   - djm@cvs.openbsd.org 2010/03/03 22:50:40
     [PROTOCOL.certkeys]
     s/similar same/similar/; from imorgan AT nas.nasa.gov

15 years ago - djm@cvs.openbsd.org 2010/03/03 22:49:50
Damien Miller [Thu, 4 Mar 2010 10:51:37 +0000 (21:51 +1100)] 
   - djm@cvs.openbsd.org 2010/03/03 22:49:50
     [sshd.8]
     the authorized_keys option for CA keys is "cert-authority", not
     "from=cert-authority". spotted by imorgan AT nas.nasa.gov

15 years ago - OpenBSD CVS Sync
Damien Miller [Thu, 4 Mar 2010 10:51:11 +0000 (21:51 +1100)] 
 - OpenBSD CVS Sync
   - djm@cvs.openbsd.org 2010/03/03 01:44:36
     [auth-options.c key.c]
     reject strings with embedded ASCII nul chars in certificate key IDs,
     principal names and constraints

15 years ago - (djm) [regress/Makefile] Cleanup sshd_proxy_orig
Damien Miller [Thu, 4 Mar 2010 10:41:29 +0000 (21:41 +1100)] 
 - (djm) [regress/Makefile] Cleanup sshd_proxy_orig

15 years ago - (djm) [.cvsignore] Ignore ssh-pkcs11-helper
Damien Miller [Thu, 4 Mar 2010 10:09:46 +0000 (21:09 +1100)] 
 - (djm) [.cvsignore] Ignore ssh-pkcs11-helper

15 years ago - (djm) [contrib/redhat/openssh.spec] Replace obsolete BuildPreReq
Damien Miller [Thu, 4 Mar 2010 10:09:24 +0000 (21:09 +1100)] 
 - (djm) [contrib/redhat/openssh.spec] Replace obsolete BuildPreReq
   on XFree86-devel with neutral /usr/include/X11/Xlib.h;
   imorgan AT nas.nasa.gov in bz#1731

15 years ago - (djm) [ssh-keygen.c] Use correct local variable, instead of
Damien Miller [Thu, 4 Mar 2010 03:17:22 +0000 (14:17 +1100)] 
 - (djm) [ssh-keygen.c] Use correct local variable, instead of
   maybe-undefined global "optarg"

15 years ago - (djm) [regress/cert-userkey.sh] s/echo -n/echon/ here too
Damien Miller [Wed, 3 Mar 2010 02:22:41 +0000 (13:22 +1100)] 
 - (djm) [regress/cert-userkey.sh] s/echo -n/echon/ here too

15 years ago - djm@cvs.openbsd.org 2010/03/02 23:20:57
Damien Miller [Wed, 3 Mar 2010 01:14:15 +0000 (12:14 +1100)] 
   - djm@cvs.openbsd.org 2010/03/02 23:20:57
     [ssh-keygen.c]
     POSIX strptime is stricter than OpenBSD's so do a little dance to
     appease it.

15 years ago - djm@cvs.openbsd.org 2010/03/02 23:20:57
Damien Miller [Tue, 2 Mar 2010 23:26:04 +0000 (10:26 +1100)] 
   - djm@cvs.openbsd.org 2010/03/02 23:20:57
     [ssh-keygen.c]
     POSIX strptime is stricter than OpenBSD's so do a little dance to
     appease it.

15 years ago - otto@cvs.openbsd.org 2010/03/01 11:07:06
Damien Miller [Tue, 2 Mar 2010 23:25:41 +0000 (10:25 +1100)] 
   - otto@cvs.openbsd.org 2010/03/01 11:07:06
     [ssh-add.c]
     zap what seems to be a left-over debug message; ok markus@

15 years ago - jmc@cvs.openbsd.org 2010/02/26 22:09:28
Damien Miller [Tue, 2 Mar 2010 23:25:21 +0000 (10:25 +1100)] 
   - jmc@cvs.openbsd.org 2010/02/26 22:09:28
     [ssh-keygen.1 ssh.1 sshd.8]
     tweak previous;

15 years ago - (djm) [PROTOCOL.certkeys] Add RCS Ident
Damien Miller [Tue, 2 Mar 2010 23:24:00 +0000 (10:24 +1100)] 
 - (djm) [PROTOCOL.certkeys] Add RCS Ident

15 years ago - (tim) [config.guess config.sub] Bug 1722: Update to latest versions from
Tim Rice [Mon, 1 Mar 2010 23:57:42 +0000 (15:57 -0800)] 
 - (tim) [config.guess config.sub] Bug 1722: Update to latest versions from
   http://git.savannah.gnu.org/gitweb/ (2009-12-30 and 2010-01-22
   respectively).

15 years ago - (dtucker) [openbsd-compat/port-linux.c] Make failure to write to the OOM
Darren Tucker [Mon, 1 Mar 2010 04:52:49 +0000 (15:52 +1100)] 
 - (dtucker) [openbsd-compat/port-linux.c] Make failure to write to the OOM
   adjust log at verbose only, since according to cjwatson in bug #1470
   some virtualization platforms don't allow writes.

15 years ago - (dtucker) [regress/{cert-hostkey,cfgmatch,cipher-speed}.sh} Replace
Darren Tucker [Mon, 1 Mar 2010 01:49:05 +0000 (12:49 +1100)] 
 - (dtucker) [regress/{cert-hostkey,cfgmatch,cipher-speed}.sh} Replace
   "echo -n" with "echon" for portability.

15 years ago - (tim) [ssh-pkcs11-helper.c] Move declarations before calling functions
Tim Rice [Sun, 28 Feb 2010 22:51:56 +0000 (14:51 -0800)] 
 - (tim) [ssh-pkcs11-helper.c] Move declarations before calling functions
   to make older compilers (gcc 2.95) happy.

15 years ago - (djm) [auth.c] On Cygwin, refuse usernames that have differences in
Damien Miller [Sun, 28 Feb 2010 17:36:54 +0000 (04:36 +1100)] 
 - (djm) [auth.c] On Cygwin, refuse usernames that have differences in
   case from that matched in the system password database. On this
   platform, passwords are stored case-insensitively, but sshd requires
   exact case matching for Match blocks in sshd_config(5). Based on
   a patch from vinschen AT redhat.com.

15 years ago - (djm) [openbsd-compat/bsd-cygwin_util.c] Reduce the set of environment
Damien Miller [Sat, 27 Feb 2010 16:29:33 +0000 (03:29 +1100)] 
 - (djm) [openbsd-compat/bsd-cygwin_util.c] Reduce the set of environment
   variables copied into sshd child processes. From vinschen AT redhat.com

15 years ago- (djm) [ssh-pkcs11-helper.c ] Ensure RNG is initialised and seeded
Damien Miller [Sat, 27 Feb 2010 16:28:05 +0000 (03:28 +1100)] 
- (djm) [ssh-pkcs11-helper.c ] Ensure RNG is initialised and seeded

15 years ago - djm@cvs.openbsd.org 2010/02/26 20:33:21
Damien Miller [Fri, 26 Feb 2010 20:57:12 +0000 (07:57 +1100)] 
   - djm@cvs.openbsd.org 2010/02/26 20:33:21
     [Makefile regress/cert-hostkey.sh regress/cert-userkey.sh]
     regression tests for certified keys

15 years ago - OpenBSD CVS Sync
Damien Miller [Fri, 26 Feb 2010 20:55:05 +0000 (07:55 +1100)] 
 - OpenBSD CVS Sync
   - djm@cvs.openbsd.org 2010/02/26 20:29:54
     [PROTOCOL PROTOCOL.agent PROTOCOL.certkeys addrmatch.c auth-options.c]
     [auth-options.h auth.h auth2-pubkey.c authfd.c dns.c dns.h hostfile.c]
     [hostfile.h kex.h kexdhs.c kexgexs.c key.c key.h match.h monitor.c]
     [myproposal.h servconf.c servconf.h ssh-add.c ssh-agent.c ssh-dss.c]
     [ssh-keygen.1 ssh-keygen.c ssh-rsa.c ssh.1 ssh.c ssh2.h sshconnect.c]
     [sshconnect2.c sshd.8 sshd.c sshd_config.5]
     Add support for certificate key types for users and hosts.

     OpenSSH certificate key types are not X.509 certificates, but a much
     simpler format that encodes a public key, identity information and
     some validity constraints and signs it with a CA key. CA keys are
     regular SSH keys. This certificate style avoids the attack surface
     of X.509 certificates and is very easy to deploy.

     Certified host keys allow automatic acceptance of new host keys
     when a CA certificate is marked as sh/known_hosts.
     see VERIFYING HOST KEYS in ssh(1) for details.

     Certified user keys allow authentication of users when the signing
     CA key is marked as trusted in authorized_keys. See "AUTHORIZED_KEYS
     FILE FORMAT" in sshd(8) for details.

     Certificates are minted using ssh-keygen(1), documentation is in
     the "CERTIFICATES" section of that manpage.

     Documentation on the format of certificates is in the file
     PROTOCOL.certkeys

     feedback and ok markus@

15 years agocontrib/caldera/openssh.spec
Damien Miller [Wed, 24 Feb 2010 07:21:45 +0000 (18:21 +1100)] 
contrib/caldera/openssh.spec
contrib/redhat/openssh.spec
contrib/suse/openssh.spec

15 years ago - (djm) [Makefile.in ssh-pkcs11-helper.8] Add manpage for PKCS#11 helper
Damien Miller [Wed, 24 Feb 2010 07:18:51 +0000 (18:18 +1100)] 
 - (djm) [Makefile.in ssh-pkcs11-helper.8] Add manpage for PKCS#11 helper

15 years ago - dtucker@cvs.openbsd.org 2009/11/09 04:20:04
Damien Miller [Wed, 24 Feb 2010 06:33:30 +0000 (17:33 +1100)] 
   - dtucker@cvs.openbsd.org 2009/11/09 04:20:04
     [regress/Makefile keygen-convert.sh]
     add regression test for ssh-keygen pubkey conversions

15 years ago - markus@cvs.openbsd.org 2010/02/08 10:52:47
Damien Miller [Wed, 24 Feb 2010 06:31:20 +0000 (17:31 +1100)] 
   - markus@cvs.openbsd.org 2010/02/08 10:52:47
     [regress/agent-pkcs11.sh]
     test for PKCS#11 support (currently disabled)

15 years ago - djm@cvs.openbsd.org 2010/02/24 06:21:56
Damien Miller [Wed, 24 Feb 2010 06:29:34 +0000 (17:29 +1100)] 
   - djm@cvs.openbsd.org 2010/02/24 06:21:56
     [regress/test-exec.sh]
     wait for sshd to fully stop in cleanup() function; avoids races in tests
     that do multiple start_sshd/cleanup cycles; "I hate pidfiles" deraadt@

15 years ago - djm@cvs.openbsd.org 2010/02/09 06:29:02
Damien Miller [Wed, 24 Feb 2010 06:28:45 +0000 (17:28 +1100)] 
   - djm@cvs.openbsd.org 2010/02/09 06:29:02
     [regress/Makefile]
     turn on all the malloc(3) checking options when running regression
     tests. this has caught a few bugs for me in the past; ok dtucker@

15 years ago - djm@cvs.openbsd.org 2010/02/09 04:57:36
Damien Miller [Wed, 24 Feb 2010 06:26:38 +0000 (17:26 +1100)] 
   - djm@cvs.openbsd.org 2010/02/09 04:57:36
     [regress/addrmatch.sh]
     clean up droppings

15 years ago - dtucker@cvs.openbsd.org 2010/01/11 02:53:44
Damien Miller [Wed, 24 Feb 2010 06:25:58 +0000 (17:25 +1100)] 
   - dtucker@cvs.openbsd.org 2010/01/11 02:53:44
     [regress/forwarding.sh]
     regress test for stdio forwarding

15 years ago - dtucker@cvs.openbsd.org 2009/11/09 04:20:04
Damien Miller [Wed, 24 Feb 2010 06:24:56 +0000 (17:24 +1100)] 
   - dtucker@cvs.openbsd.org 2009/11/09 04:20:04
     [regress/Makefile]
     add regression test for ssh-keygen pubkey conversions

15 years ago - djm@cvs.openbsd.org 2010/02/11 20:37:47
Damien Miller [Wed, 24 Feb 2010 06:17:58 +0000 (17:17 +1100)] 
   - djm@cvs.openbsd.org 2010/02/11 20:37:47
     [pathnames.h]
     correct comment

15 years ago - (djm) [pkcs11.h ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c]
Damien Miller [Wed, 24 Feb 2010 06:16:08 +0000 (17:16 +1100)] 
 - (djm) [pkcs11.h ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c]
   [ssh-pkcs11.h] Add $OpenBSD$ RCS idents so we can sync portable

15 years ago- (djm) [configure.ac] Enable PKCS#11 support only when we find a working
Damien Miller [Thu, 11 Feb 2010 23:11:34 +0000 (10:11 +1100)] 
- (djm) [configure.ac] Enable PKCS#11 support only when we find a working
  dlopen()

15 years ago - (djm) [ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c]
Damien Miller [Thu, 11 Feb 2010 23:06:28 +0000 (10:06 +1100)] 
 - (djm) [ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c]
   Use ssh_get_progname to fill __progname

15 years ago - (djm) [ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c]
Damien Miller [Thu, 11 Feb 2010 22:49:06 +0000 (09:49 +1100)] 
 - (djm) [ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c]
   Make it compile on OSX

15 years ago - (djm) [INSTALL Makefile.in README.smartcard configure.ac scard-opensc.c]
Damien Miller [Thu, 11 Feb 2010 22:34:22 +0000 (09:34 +1100)] 
 - (djm) [INSTALL Makefile.in README.smartcard configure.ac scard-opensc.c]
   [scard.c scard.h pkcs11.h scard/Makefile.in scard/Ssh.bin.uu scard/Ssh.java]
   Remove obsolete smartcard support

15 years ago - jmc@cvs.openbsd.org 2010/02/11 13:23:29
Damien Miller [Thu, 11 Feb 2010 22:26:23 +0000 (09:26 +1100)] 
   - jmc@cvs.openbsd.org 2010/02/11 13:23:29
     [ssh.1]
     libarary -> library;

15 years ago - markus@cvs.openbsd.org 2010/02/10 23:20:38
Damien Miller [Thu, 11 Feb 2010 22:26:02 +0000 (09:26 +1100)] 
   - markus@cvs.openbsd.org 2010/02/10 23:20:38
     [ssh-add.1 ssh-keygen.1 ssh.1 ssh_config.5]
     pkcs#11 is no longer optional; improve wording; ok jmc@

15 years ago - djm@cvs.openbsd.org 2010/02/09 06:18:46
Damien Miller [Thu, 11 Feb 2010 22:25:29 +0000 (09:25 +1100)] 
   - djm@cvs.openbsd.org 2010/02/09 06:18:46
     [auth.c]
     unbreak ChrootDirectory+internal-sftp by skipping check for executable
     shell when chrooting; reported by danh AT wzrd.com; ok dtucker@

15 years ago - djm@cvs.openbsd.org 2010/02/09 03:56:28
Damien Miller [Thu, 11 Feb 2010 22:23:40 +0000 (09:23 +1100)] 
   - djm@cvs.openbsd.org 2010/02/09 03:56:28
     [buffer.c buffer.h]
     constify the arguments to buffer_len, buffer_ptr and buffer_dump

15 years ago - djm@cvs.openbsd.org 2010/02/09 00:50:59
Damien Miller [Thu, 11 Feb 2010 22:22:57 +0000 (09:22 +1100)] 
   - djm@cvs.openbsd.org 2010/02/09 00:50:59
     [ssh-keygen.c]
     fix -Wall

15 years ago - djm@cvs.openbsd.org 2010/02/09 00:50:36
Damien Miller [Thu, 11 Feb 2010 22:22:31 +0000 (09:22 +1100)] 
   - djm@cvs.openbsd.org 2010/02/09 00:50:36
     [ssh-agent.c]
     fallout from PKCS#11: unbreak -D

15 years ago - jmc@cvs.openbsd.org 2010/02/08 22:03:05
Damien Miller [Thu, 11 Feb 2010 22:22:04 +0000 (09:22 +1100)] 
   - jmc@cvs.openbsd.org 2010/02/08 22:03:05
     [ssh-add.1 ssh-keygen.1 ssh.1 ssh.c]
     tweak previous; ok markus

15 years ago - markus@cvs.openbsd.org 2010/02/08 10:50:20
Damien Miller [Thu, 11 Feb 2010 22:21:02 +0000 (09:21 +1100)] 
   - markus@cvs.openbsd.org 2010/02/08 10:50:20
     [pathnames.h readconf.c readconf.h scp.1 sftp.1 ssh-add.1 ssh-add.c]
     [ssh-agent.c ssh-keygen.1 ssh-keygen.c ssh.1 ssh.c ssh_config.5]
     replace our obsolete smartcard code with PKCS#11.
        ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-11/v2-20/pkcs-11v2-20.pdf
     ssh(1) and ssh-keygen(1) use dlopen(3) directly to talk to a PKCS#11
     provider (shared library) while ssh-agent(1) delegates PKCS#11 to
     a forked a ssh-pkcs11-helper process.
     PKCS#11 is currently a compile time option.
     feedback and ok djm@; inspired by patches from Alon Bar-Lev
`

15 years ago - djm@cvs.openbsd.org 2010/02/02 22:49:34
Damien Miller [Thu, 11 Feb 2010 20:35:08 +0000 (07:35 +1100)] 
   - djm@cvs.openbsd.org 2010/02/02 22:49:34
     [bufaux.c]
     make buffer_get_string_ret() really non-fatal in all cases (it was
     using buffer_get_int(), which could fatal() on buffer empty);
     ok markus dtucker

15 years ago - (djm) add -lselinux to LIBS before calling AC_CHECK_FUNCS for
Damien Miller [Tue, 9 Feb 2010 23:19:29 +0000 (10:19 +1100)] 
 - (djm) add -lselinux to LIBS before calling AC_CHECK_FUNCS for
   getseuserbyname; patch from calebcase AT gmail.com via
   cjwatson AT debian.org

15 years agoThis should have gone in with the multiplexing merge, but I dropped it
Damien Miller [Tue, 9 Feb 2010 23:17:49 +0000 (10:17 +1100)] 
This should have gone in with the multiplexing merge, but I dropped it
at the time.

15 years ago - djm@cvs.openbsd.org 2010/01/30 21:12:08
Damien Miller [Tue, 2 Feb 2010 06:02:07 +0000 (17:02 +1100)] 
   - djm@cvs.openbsd.org 2010/01/30 21:12:08
     [channels.c]
     fake local addr:port when stdio fowarding as some servers (Tectia at
     least) validate that they are well-formed;
     reported by imorgan AT nas.nasa.gov
     ok dtucker

15 years ago - djm@cvs.openbsd.org 2010/01/30 21:08:33
Damien Miller [Tue, 2 Feb 2010 06:01:46 +0000 (17:01 +1100)] 
   - djm@cvs.openbsd.org 2010/01/30 21:08:33
     [sshd.8]
     debug output goes to stderr, not "the system log"; ok markus dtucker

15 years ago - djm@cvs.openbsd.org 2010/01/30 02:54:53
Damien Miller [Sat, 30 Jan 2010 06:42:01 +0000 (17:42 +1100)] 
   - djm@cvs.openbsd.org 2010/01/30 02:54:53
     [mux.c]
     don't mark channel as read failed if it is already closing; suppresses
     harmless error messages when connecting to SSH.COM Tectia server
     report by imorgan AT nas.nasa.gov

15 years ago - djm@cvs.openbsd.org 2010/01/29 20:16:17
Damien Miller [Sat, 30 Jan 2010 06:36:33 +0000 (17:36 +1100)] 
   - djm@cvs.openbsd.org 2010/01/29 20:16:17
     [mux.c]
     kill correct channel (was killing already-dead mux channel, not
     its session channel)

15 years ago - djm@cvs.openbsd.org 2010/01/29 00:20:41
Damien Miller [Sat, 30 Jan 2010 06:30:04 +0000 (17:30 +1100)] 
   - djm@cvs.openbsd.org 2010/01/29 00:20:41
     [sshd.c]
     set FD_CLOEXEC on sock_in/sock_out; bz#1706 from jchadima AT redhat.com
     ok dtucker@

15 years ago - djm@cvs.openbsd.org 2010/01/28 00:21:18
Damien Miller [Sat, 30 Jan 2010 06:28:34 +0000 (17:28 +1100)] 
   - djm@cvs.openbsd.org 2010/01/28 00:21:18
     [clientloop.c]
     downgrade an error() to a debug() - this particular case can be hit in
     normal operation for certain sequences of mux slave vs session closure
     and is harmless

15 years ago - (dtucker) [openbsd-compat/openssl-compat.c] Bug #1707: Call OPENSSL_config()
Darren Tucker [Thu, 28 Jan 2010 23:54:11 +0000 (10:54 +1100)] 
 - (dtucker) [openbsd-compat/openssl-compat.c] Bug #1707: Call OPENSSL_config()
   after registering the hardware engines, which causes the openssl.cnf file to
   be processed.  See OpenSSL's man page for OPENSSL_config(3) for details.
   Patch from Solomon Peachy, ok djm@.

15 years ago - djm@cvs.openbsd.org 2010/01/27 19:21:39
Damien Miller [Wed, 27 Jan 2010 19:27:54 +0000 (06:27 +1100)] 
   - djm@cvs.openbsd.org 2010/01/27 19:21:39
     [sftp.c]
     add missing "p" flag to getopt optstring;
     bz#1704 from imorgan AT nas.nasa.gov

15 years ago - djm@cvs.openbsd.org 2010/01/27 13:26:17
Damien Miller [Wed, 27 Jan 2010 19:26:59 +0000 (06:26 +1100)] 
   - djm@cvs.openbsd.org 2010/01/27 13:26:17
     [mux.c]
     fix bug introduced in mux rewrite:

     In a mux master, when a socket to a mux slave closes before its server
     session (as may occur when the slave has been signalled), gracefully
     close the server session rather than deleting its channel immediately.
     A server may have more messages on that channel to send (e.g. an exit
     message) that will fatal() the client if they are sent to a channel that
     has been prematurely deleted.

     spotted by imorgan AT nas.nasa.gov

15 years ago - djm@cvs.openbsd.org 2010/01/26 02:15:20
Damien Miller [Wed, 27 Jan 2010 19:26:20 +0000 (06:26 +1100)] 
   - djm@cvs.openbsd.org 2010/01/26 02:15:20
     [mux.c]
     -Wuninitialized and remove a // comment; from portable
     (Id sync only)

15 years ago - djm@cvs.openbsd.org 2010/01/26 01:28:35
Damien Miller [Tue, 26 Jan 2010 02:26:22 +0000 (13:26 +1100)] 
   - djm@cvs.openbsd.org 2010/01/26 01:28:35
     [channels.c channels.h clientloop.c clientloop.h mux.c nchan.c ssh.c]
     rewrite ssh(1) multiplexing code to a more sensible protocol.

     The new multiplexing code uses channels for the listener and
     accepted control sockets to make the mux master non-blocking, so
     no stalls when processing messages from a slave.

     avoid use of fatal() in mux master protocol parsing so an errant slave
     process cannot take down a running master.

     implement requesting of port-forwards over multiplexed sessions. Any
     port forwards requested by the slave are added to those the master has
     established.

     add support for stdio forwarding ("ssh -W host:port ...") in mux slaves.

     document master/slave mux protocol so that other tools can use it to
     control a running ssh(1). Note: there are no guarantees that this
     protocol won't be incompatibly changed (though it is versioned).

     feedback Salvador Fandino, dtucker@
     channel changes ok markus@

15 years ago - dtucker@cvs.openbsd.org 2010/01/18 01:50:27
Damien Miller [Tue, 26 Jan 2010 01:53:06 +0000 (12:53 +1100)] 
   - dtucker@cvs.openbsd.org 2010/01/18 01:50:27
     [roaming_client.c]
     s/long long unsigned/unsigned long long/, from tim via portable
     (Id sync only, change already in portable)

15 years ago - tedu@cvs.openbsd.org 2010/01/17 21:49:09
Damien Miller [Tue, 26 Jan 2010 01:51:13 +0000 (12:51 +1100)] 
   - tedu@cvs.openbsd.org 2010/01/17 21:49:09
     [ssh-agent.1]
     Correct and clarify ssh-add's password asking behavior.
     Improved text dtucker and ok jmc

15 years ago - (tim) [configure.ac] Due to constraints in Windows Sockets in terms of
Tim Rice [Fri, 22 Jan 2010 18:25:15 +0000 (10:25 -0800)] 
 - (tim) [configure.ac] Due to constraints in Windows Sockets in terms of
   socket inheritance, reduce the default SO_RCVBUF/SO_SNDBUF buffer size
   in Cygwin to 65535. Patch from Corinna Vinschen.

15 years agoReword comment in last commit for additional clearity.
Tim Rice [Mon, 18 Jan 2010 06:49:57 +0000 (22:49 -0800)] 
Reword comment in last commit for additional clearity.

15 years ago - (tim) [configure.ac] Use the C99-conforming functions snprintf() and
Tim Rice [Mon, 18 Jan 2010 01:05:39 +0000 (17:05 -0800)] 
 - (tim) [configure.ac] Use the C99-conforming functions snprintf() and
   vsnprintf() named _xsnprintf() and _xvsnprintf() on SVR5 systems.

15 years ago - (tim) [configure.ac] OpenServer 5 needs BROKEN_GETADDRINFO too.
Tim Rice [Sun, 17 Jan 2010 20:48:22 +0000 (12:48 -0800)] 
 - (tim) [configure.ac] OpenServer 5 needs BROKEN_GETADDRINFO too.

15 years agoOops, forgot to document second change to roaming_client.c
Tim Rice [Sun, 17 Jan 2010 15:12:40 +0000 (07:12 -0800)] 
Oops, forgot to document second change to roaming_client.c
 s/long long unsigned/unsigned long long/ to keep USL compilers happy.

15 years ago - (tim) [roaming_client.c] Use of <sys/queue.h> is not really portable so
Tim Rice [Sun, 17 Jan 2010 00:48:39 +0000 (16:48 -0800)] 
 - (tim) [roaming_client.c] Use of <sys/queue.h> is not really portable so
   we use "openbsd-compat/sys-queue.h"

15 years ago - (tim) [configure.ac] Define BROKEN_GETADDRINFO on SVR5 systems. The native
Tim Rice [Sat, 16 Jan 2010 20:23:25 +0000 (12:23 -0800)] 
 - (tim) [configure.ac] Define BROKEN_GETADDRINFO on SVR5 systems. The native
   getaddrinfo() is too old and limited for addr_pton() in addrmatch.c.

15 years ago - (tim) [regress/portnum.sh] Shell portability fix.
Tim Rice [Sat, 16 Jan 2010 19:37:53 +0000 (11:37 -0800)] 
 - (tim) [regress/portnum.sh] Shell portability fix.

15 years ago - (dtucker) [openbsd-compat/openbsd-compat.h] Typo.
Darren Tucker [Sat, 16 Jan 2010 12:58:37 +0000 (23:58 +1100)] 
 - (dtucker) [openbsd-compat/openbsd-compat.h] Typo.

15 years ago - (dtucker) [openbsd-compat/pwcache.c] Shrink ifdef area to prevent unused
Darren Tucker [Sat, 16 Jan 2010 02:53:52 +0000 (13:53 +1100)] 
 - (dtucker) [openbsd-compat/pwcache.c] Shrink ifdef area to prevent unused
   variable warnings.

15 years ago - markus@cvs.openbsd.org 2010/01/15 09:24:23
Darren Tucker [Sat, 16 Jan 2010 02:43:50 +0000 (13:43 +1100)] 
   - markus@cvs.openbsd.org 2010/01/15 09:24:23
     [sftp-common.c]
     unused

15 years ago - (dtucker) [openbsd-compat/openbsd-compat.h] Fix prototypes, spotted by
Darren Tucker [Sat, 16 Jan 2010 02:30:30 +0000 (13:30 +1100)] 
 - (dtucker) [openbsd-compat/openbsd-compat.h] Fix prototypes, spotted by
   Tim.