summaryrefslogtreecommitdiffstats
AgeCommit message (Collapse)Author
2002-09-11 - (djm) Sync openbsd-compat with OpenBSD -currentDamien Miller
2002-09-10 - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL.Damien Miller
Patch from Robert Halubek <rob@adso.com.pl>
2002-09-10 - (djm) Bug #365: Read /.ssh/environment properly under CygWin.Damien Miller
Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com>
2002-09-05 - (djm) Add support for building gtk2 password requestor from Redhat betaDamien Miller
2002-09-05 - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch fromDamien Miller
Nalin Dahyabhai <nalin@redhat.com>
2002-09-05 - (djm) Merge openssh-TODO.patch from Redhat (null) betaDamien Miller
2002-09-05 - (djm) OpenBSD CVS SyncDamien Miller
- stevesk@cvs.openbsd.org 2002/09/04 18:52:42 [servconf.c sshd.8 sshd_config.5] default LoginGraceTime to 2m; 1m may be too short for slow systems. ok markus@
2002-09-04 - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcryptDamien Miller
2002-09-04 - (djm) Fix Redhat RPM build dependancy testDamien Miller
2002-09-04 - stevesk@cvs.openbsd.org 2002/08/29 22:54:10Damien Miller
[ssh_config.5 sshd_config.5] state XAuthLocation is a full pathname
2002-09-04 - stevesk@cvs.openbsd.org 2002/08/29 19:49:42Damien Miller
[ssh.c] shrink initial privilege bracket for setuid case; ok markus@
2002-09-04 - stevesk@cvs.openbsd.org 2002/08/29 16:09:02Damien Miller
[ssh_config.5] more on UsePrivilegedPort and setuid root; ok markus@
2002-09-04 - stevesk@cvs.openbsd.org 2002/08/29 16:02:54Damien Miller
[ssh.1 ssh.c] deprecate -P as UsePrivilegedPort defaults to no now; ok markus@
2002-09-04 - stevesk@cvs.openbsd.org 2002/08/29 15:57:25Damien Miller
[monitor.c session.c sshlogin.c sshlogin.h] pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org> NOTE: there are also p-specific parts to this patch. ok markus@
2002-09-04 - stevesk@cvs.openbsd.org 2002/08/27 17:18:40Damien Miller
[ssh_config.5] some warning text for ForwardAgent and ForwardX11; ok markus@
2002-09-04 - stevesk@cvs.openbsd.org 2002/08/27 17:13:56Damien Miller
[ssh-rsa.c] RSA_public_decrypt() returns -1 on error so len must be signed; ok markus@
2002-09-04 - markus@cvs.openbsd.org 2002/08/22 21:45:41Damien Miller
[session.c] send signal name (not signal number) in "exit-signal" message; noticed by galb@vandyke.com
2002-09-04 - markus@cvs.openbsd.org 2002/08/22 21:33:58Damien Miller
[auth1.c auth2.c] auth_root_allowed() is handled by the monitor in the privsep case, so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325
2002-09-04 - stevesk@cvs.openbsd.org 2002/08/22 20:57:19Damien Miller
[ssh-agent.c] shutdown(SHUT_RDWR) not needed before close here; ok markus@
2002-09-04 - stevesk@cvs.openbsd.org 2002/08/22 19:38:42Damien Miller
[clientloop.c] format with current EscapeChar; bugzilla #388 from wknox@mitre.org. ok markus@
2002-09-04 - stevesk@cvs.openbsd.org 2002/08/22 19:27:53Damien Miller
[ssh-agent.c] use common close function; ok markus@
2002-09-04 - stevesk@cvs.openbsd.org 2002/08/21 20:10:28Damien Miller
[ssh-agent.c] raise listen backlog; ok markus@
2002-09-04 - stevesk@cvs.openbsd.org 2002/08/21 19:38:06Damien Miller
[servconf.c sshd.8 sshd_config sshd_config.5] change LoginGraceTime default to 1 minute; ok mouring@ markus@
2002-09-04 - espie@cvs.openbsd.org 2002/08/21 11:20:59Damien Miller
[sshd.8] `RSA' updated to refer to `public key', where it matters. okay markus@
2002-09-04 - markus@cvs.openbsd.org 2002/08/12 10:46:35Damien Miller
[ssh-agent.c] make ssh-agent setgid, disallow ptrace. (note: change not yet made in Makefile)
2002-08-21 - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assignBen Lindstrom
it to ULONG_MAX.
2002-08-20 - stevesk@cvs.openbsd.org 2002/08/17 23:55:01Ben Lindstrom
[ssh_config.5] ordered list here
2002-08-20 - stevesk@cvs.openbsd.org 2002/08/17 23:07:14Ben Lindstrom
[ssh.1] ForwardAgent has defaulted to no for over 2 years; be more clear here.
2002-08-20 - stevesk@cvs.openbsd.org 2002/08/12 17:30:35Ben Lindstrom
[ssh.1 sshd.8 sshd_config.5] more PermitUserEnvironment; ok markus@
2002-08-20 - stevesk@cvs.openbsd.org 2002/08/09 17:41:12Ben Lindstrom
[sshd_config.5] proxy vs. fake display
2002-08-20 - stevesk@cvs.openbsd.org 2002/08/09 17:21:42Ben Lindstrom
[sshd_config.5] use Op for mdoc conformance; from esr@golux.thyrsus.com ok aaron@
2002-08-20 - stevesk@cvs.openbsd.org 2002/08/08 23:54:52Ben Lindstrom
[auth.c] typo in comment
2002-08-20 - aaron@cvs.openbsd.org 2002/08/08 13:50:23Ben Lindstrom
[sshconnect1.c] Use & to test if bits are set, not &&; markus@ ok.
2002-08-20 - markus@cvs.openbsd.org 2002/08/02 22:20:30Ben Lindstrom
[ssh-rsa.c] replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser for authentication; ok deraadt/djm
2002-08-20 - markus@cvs.openbsd.org 2002/08/02 21:23:41Ben Lindstrom
[ssh-rsa.c] diff is u_int (2x); ok deraadt/provos
2002-08-20 - marc@cvs.openbsd.org 2002/08/02 16:00:07Ben Lindstrom
[ssh.1 sshd.8] note that .ssh/environment is only read when allowed (PermitUserEnvironment in sshd_config). OK markus@
2002-08-20 - millert@cvs.openbsd.org 2002/08/02 14:43:15Ben Lindstrom
[monitor.c monitor_mm.c] Change mm_zalloc() sanity checks to be more in line with what we do in calloc() and add a check to monitor_mm.c. OK provos@ and markus@
2002-08-13[configure.ac] Display OpenSSL header/library version.Tim Rice
Patch by dtucker@zip.com.au
2002-08-01 - markus@cvs.openbsd.org 2002/07/30 17:03:55Ben Lindstrom
[auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5] add PermitUserEnvironment (off by default!); from dot@dotat.at; ok provos, deraadt
2002-08-01 - markus@cvs.openbsd.org 2002/07/29 18:57:30Ben Lindstrom
[sshconnect.c] print file:line
2002-08-01 - mouring@cvs.openbsd.org 2002/07/25 01:16:59Ben Lindstrom
[sftp.c] FallBackToRsh does not exist anywhere else. Remove it from here. OK deraadt.
2002-08-01 - markus@cvs.openbsd.org 2002/07/24 16:11:18Ben Lindstrom
[hostfile.c hostfile.h sshconnect.c] print out all known keys for a host if we get a unknown host key, see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4 the ssharp mitm tool attacks users in a similar way, so i'd like to pointed out again: A MITM attack is always possible if the ssh client prints: The authenticity of host 'bla' can't be established. (protocol version 2 with pubkey authentication allows you to detect MITM attacks)
2002-07-30 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.deBen Lindstrom
2002-07-28 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsignedKevin Steves
char arg.
2002-07-28 - (stevesk) [CREDITS] solarKevin Steves
2002-07-28 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solarKevin Steves
2002-07-25 - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/Damien Miller
2002-07-25 - (djm) Remove some cruft from INSTALLDamien Miller
2002-07-23 - stevesk@cvs.openbsd.org 2002/07/15 17:15:31Ben Lindstrom
[uidswap.c] little more debugging; ok markus@
2002-07-23 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10Ben Lindstrom
[sshd.c] utmp_len is unsigned; display error consistent with other options. ok markus@