djm@openbsd.org
3876a3bbd2
upstream: openssh-9.7
...
OpenBSD-Commit-ID: 618ececf58b8cdae016b149787af06240f7b0cbc
2024-03-11 16:19:44 +11:00
djm@openbsd.org
cdddd66412
upstream: openssh-9.6
...
OpenBSD-Commit-ID: 21759837cf0e0092d9a2079f8fb562071c11016b
2023-12-19 01:53:47 +11:00
djm@openbsd.org
f65f187b10
upstream: openssh-9.5
...
OpenBSD-Commit-ID: 5e0af680480bd3b6f5560cf840ad032d48fd6b16
2023-10-04 15:33:36 +11:00
djm@openbsd.org
78b4dc6684
upstream: openssh-9.4
...
OpenBSD-Commit-ID: 71fc1e01a4c4ea061b252bd399cda7be757e6e35
2023-08-10 20:17:05 +10:00
djm@openbsd.org
ba7532d0da
upstream: openssh-9.3
...
OpenBSD-Commit-ID: 8011495f2449c1029bb316bd015eab2e00509848
2023-03-16 08:21:56 +11:00
djm@openbsd.org
b2a2a8f69f
upstream: openssh-9.2
...
OpenBSD-Commit-ID: f7389f32413c74d6e2055f05cf65e7082de03923
2023-02-02 23:14:16 +11:00
djm@openbsd.org
b51f3f172d
upstream: openssh-9.1
...
OpenBSD-Commit-ID: 5a467b2ee81da01a86adf1ad93b62b1728494e56
2022-09-27 19:37:13 +10:00
djm@openbsd.org
8e4a8eadf4
upstream: openssh-9.0
...
OpenBSD-Commit-ID: 0dfb461188f4513ec024c1534da8c1ce14c20b64
2022-04-06 09:16:11 +10:00
djm@openbsd.org
c07e154fbd
upstream: openssh-8.9
...
OpenBSD-Commit-ID: 5c5f791c87c483cdab6d9266b43acdd9ca7bde0e
2022-02-23 22:08:26 +11:00
djm@openbsd.org
8c5b565514
upstream: openssh-8.8
...
OpenBSD-Commit-ID: 12357794602ac979eb7312a1fb190c453f492ec4
2021-09-27 00:03:12 +10:00
djm@openbsd.org
feee2384ab
upstream: openssh-8.7
...
OpenBSD-Commit-ID: 8769dff0fd76ae3193d77bf83b439adee0f300cd
2021-08-20 13:26:52 +10:00
djm@openbsd.org
b2b60ebab0
upstream: openssh-8.6
...
OpenBSD-Commit-ID: b5f3e133c846127ec114812248bc17eff07c3e19
2021-04-16 13:43:30 +10:00
djm@openbsd.org
0a4b23b11b
upstream: openssh-8.5
...
OpenBSD-Commit-ID: 185e85d60fe042b8f8fa1ef29d4ef637bdf397d6
2021-03-02 16:43:01 +11:00
djm@openbsd.org
58ca6ab6ff
upstream: openssh 8.4
...
OpenBSD-Commit-ID: a29e5b372d2c00e297da8a35a3b87c9beb3b4a58
2020-09-27 17:23:20 +10:00
djm@openbsd.org
a8265bd64c
upstream: openssh-8.3; ok deraadt@
...
OpenBSD-Commit-ID: c8831ec88b9c750f5816aed9051031fb535d22c1
2020-05-07 15:39:00 +10:00
djm@openbsd.org
8aa3455b16
upstream: openssh-8.2
...
OpenBSD-Commit-ID: 0a1340ff65fad0d84b997ac58dd1b393dec7c19b
2020-02-14 11:40:54 +11:00
djm@openbsd.org
3b4e56d740
upstream: openssh-8.1
...
OpenBSD-Commit-ID: 3356bb34e2aa287f0e6d6773c9ae659dc680147d
2019-10-09 11:12:26 +11:00
djm@openbsd.org
312dcee739
upstream: openssh-8.0
...
OpenBSD-Commit-ID: 5aafdf218679dab982fea20771afd643be9a127b
2019-04-05 03:39:46 +11:00
deraadt@openbsd.org
acc59cbe7a
upstream: introducing openssh 7.9
...
OpenBSD-Commit-ID: 42d526a9fe01a40dd299ac58014d3349adf40e25
2018-10-11 11:03:53 +11:00
djm@openbsd.org
2f30300c5e
upstream: crank version number to 7.8; needed for new compat flag
...
for prior version; part of RSA-SHA2 strictification, ok markus@
OpenBSD-Commit-ID: 84a11fc0efd2674c050712336b5093f5d408e32b
2018-07-03 23:26:47 +10:00
markus@openbsd.org
9d57762c24
upstream: openssh-7.7
...
OpenBSD-Commit-ID: 274e614352460b9802c905f38fb5ea7ed5db3d41
2018-03-26 09:38:44 +11:00
markus@openbsd.org
d7a7a39168
upstream: openssh-7.7
...
OpenBSD-Commit-ID: 274e614352460b9802c905f38fb5ea7ed5db3d41
2018-03-25 09:48:48 +11:00
djm@openbsd.org
e4a798f001
upstream commit
...
openssh-7.6; ok deraadt@
Upstream-ID: a39c3a5b63a1baae109ae1ae4c7c34c2a59acde0
2017-10-01 09:27:30 +11:00
djm@openbsd.org
3be52bc36b
upstream commit
...
openssh-7.5
Upstream-ID: b8b9a4a949427c393cd868215e1724ceb3467ee5
2017-03-20 12:20:19 +11:00
djm@openbsd.org
5f8d0bb841
upstream commit
...
openssh-7.4
Upstream-ID: 1ee404adba6bbe10ae9277cbae3a94abe2867b79
2016-12-19 15:59:40 +11:00
djm@openbsd.org
b1a478792d
upstream commit
...
openssh-7.3
Upstream-ID: af106a7eb665f642648cf1993e162c899f358718
2016-07-24 21:47:18 +10:00
Damien Miller
b86a334aaa
put back portable patchlevel to p1
2016-02-23 20:16:53 +11:00
djm@openbsd.org
555dd35ff1
upstream commit
...
openssh-7.2
Upstream-ID: 9db776b26014147fc907ece8460ef2bcb0f11e78
2016-02-23 20:15:49 +11:00
Damien Miller
8c3d512a1f
openssh-7.1p2
2016-01-27 16:38:56 +11:00
djm@openbsd.org
78f8f589f0
upstream commit
...
openssh-7.1
Upstream-ID: ff7b1ef4b06caddfb45e08ba998128c88be3d73f
2015-08-21 13:47:08 +10:00
djm@openbsd.org
f097d0ea1e
upstream commit
...
openssh 7.0; ok deraadt@
Upstream-ID: c63afdef537f57f28ae84145c5a8e29e9250221f
2015-08-02 19:59:26 +10:00
djm@openbsd.org
984b064fe2
upstream commit
...
openssh-6.9
Upstream-ID: 6cfe8e1904812531080e6ab6e752d7001b5b2d45
2015-07-01 11:58:36 +10:00
djm@openbsd.org
d48a22601b
upstream commit
...
crank; ok markus, deraadt
2015-03-05 05:59:46 +11:00
Damien Miller
9395b28223
- djm@cvs.openbsd.org 2014/04/18 23:52:25
...
[compat.c compat.h sshconnect2.c sshd.c version.h]
OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections
using the curve25519-sha256@libssh.org KEX exchange method to fail
when connecting with something that implements the spec properly.
Disable this KEX method when speaking to one of the affected
versions.
reported by Aris Adamantiadis; ok markus@
2014-04-20 13:25:30 +10:00
Damien Miller
92cf5adea1
- djm@cvs.openbsd.org 2014/02/27 22:57:40
...
[version.h]
openssh-6.6
2014-02-28 10:01:53 +11:00
Damien Miller
0fa29e6d77
- djm@cvs.openbsd.org 2014/01/16 07:32:00
...
[version.h]
openssh-6.5
2014-01-16 18:42:31 +11:00
Damien Miller
3ac4a234df
- djm@cvs.openbsd.org 2013/11/08 01:38:11
...
[version.h]
openssh-6.4
2013-11-08 12:39:49 +11:00
Damien Miller
53435b2d87
- djm@cvs.openbsd.org 2013/07/25 00:57:37
...
[version.h]
openssh-6.3 for release
2013-07-25 11:57:15 +10:00
Damien Miller
fd05154dc4
- markus@cvs.openbsd.org 2013/02/10 21:19:34
...
[version.h]
openssh 6.2
2013-02-12 11:03:10 +11:00
Damien Miller
38fe66230f
- markus@cvs.openbsd.org 2012/07/22 18:19:21
...
[version.h]
openssh 6.1
2012-07-31 12:23:16 +10:00
Damien Miller
db854559be
- markus@cvs.openbsd.org 2012/02/09 20:00:18
...
[version.h]
move from 6.0-beta to 6.0
2012-02-11 08:19:44 +11:00
Darren Tucker
68afb8c5f2
- markus@cvs.openbsd.org 2011/09/23 07:45:05
...
[mux.c readconf.h channels.h compat.h compat.c ssh.c readconf.c channels.c version.h]
unbreak remote portforwarding with dynamic allocated listen ports:
1) send the actual listen port in the open message (instead of 0).
this allows multiple forwardings with a dynamic listen port
2) update the matching permit-open entry, so we can identify where
to connect to
report: den at skbkontur.ru and P. Szczygielski
feedback and ok djm@
2011-10-02 18:59:03 +11:00
Damien Miller
fb9d8173f0
- (djm) [README version.h] Correct version
2011-09-07 09:11:53 +10:00
Damien Miller
c471860d25
- djm@cvs.openbsd.org 2011/08/02 23:13:01
...
[version.h]
crank now, release later
2011-08-06 06:17:48 +10:00
Darren Tucker
c412c1567b
- (dtucker) [README version.h contrib/caldera/openssh.spec
...
contrib/redhat/openssh.spec contrib/suse/openssh.spec] Pull the version
bumps from the 5.8p2 branch into HEAD. ok djm.
2011-06-03 10:35:23 +10:00
Damien Miller
a69812707d
- djm@cvs.openbsd.org 2011/02/04 00:44:43
...
[version.h]
openssh-5.8
2011-02-04 11:47:20 +11:00
Damien Miller
ad4b1adf95
- OpenBSD CVS Sync
...
- djm@cvs.openbsd.org 2011/01/22 09:18:53
[version.h]
crank to OpenSSH-5.7
2011-01-22 20:21:33 +11:00
Damien Miller
7e569b883c
- OpenBSD CVS Sync
...
- djm@cvs.openbsd.org 2010/08/08 16:26:42
[version.h]
crank to 5.6
2010-08-09 02:28:37 +10:00
Damien Miller
13a9f7247a
- djm@cvs.openbsd.org 2010/03/16 16:36:49
...
[version.h]
crank version to openssh-5.5 since we have a few fixes since 5.4;
requested deraadt@ kettenis@
2010-03-22 05:59:22 +11:00
Damien Miller
b3bc331e09
- (djm) OpenBSD CVS Sync
...
- djm@cvs.openbsd.org 2010/03/07 22:01:32
[version.h]
openssh-5.4
2010-03-08 09:03:33 +11:00