Commit Graph

2757 Commits

Author SHA1 Message Date
Damien Miller d9ec370ac3 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support) 2003-05-15 12:27:08 +10:00
Damien Miller 2aa0ab463f - jakob@cvs.openbsd.org 2003/05/15 01:48:10
[readconf.c readconf.h servconf.c servconf.h]
     always parse kerberos options. ok djm@ markus@
 - (djm) Always parse UsePAM
2003-05-15 12:05:28 +10:00
Damien Miller f842fcb296 - markus@cvs.openbsd.org 2003/05/15 00:28:28
[sshconnect2.c]
     cleanup unregister of per-method packet handlers; ok djm@
2003-05-15 12:01:28 +10:00
Damien Miller 7abe09bf86 - (djm) Configure glue for DNS support (code doesn't work in portable yet) 2003-05-15 10:53:49 +10:00
Damien Miller 54c459866e - markus@cvs.openbsd.org 2003/05/14 22:24:42
[clientloop.c session.c ssh.1]
     allow to send a BREAK to the remote system; ok various
2003-05-15 10:20:13 +10:00
Damien Miller 37876e913a - jakob@cvs.openbsd.org 2003/05/14 18:16:20
[key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
     [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
     add experimental support for verifying hos keys using DNS as described
     in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
     ok markus@ and henning@
2003-05-15 10:19:46 +10:00
Damien Miller abbae980e7 - (djm) OpenBSD CVS Sync
- jmc@cvs.openbsd.org 2003/05/14 13:11:56
     [ssh-agent.1]
     setup -> set up;
     from wiz@netbsd
2003-05-15 10:16:21 +10:00
Damien Miller 1ea7166019 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability 2003-05-14 22:33:58 +10:00
Darren Tucker abef5628e8 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@ 2003-05-14 21:48:51 +10:00
Damien Miller be64d43d01 - markus@cvs.openbsd.org 2003/05/14 08:57:49
[monitor.c]
     http://bugzilla.mindrot.org/show_bug.cgi?id=560
     Privsep child continues to run after monitor killed.
     Pass monitor signals through to child; Darren Tucker
2003-05-14 19:31:12 +10:00
Damien Miller d6ead282db - jmc@cvs.openbsd.org 2003/05/14 08:25:39
[sftp.1]
     - better formatting in SYNOPSIS
     - whitespace at EOL
     ok djm@
2003-05-14 19:30:38 +10:00
Damien Miller 4d99519535 - (djm) Avoid KrbV leak for MIT Kerberos 2003-05-14 19:23:56 +10:00
Damien Miller 9d507dac1f - (djm) Die screaming if start_pam() is called when UsePAM=no 2003-05-14 15:31:12 +10:00
Damien Miller 4e448a31ae - (djm) Add new UsePAM configuration directive to allow runtime control
over usage of PAM. This allows non-root use of sshd when built with
   --with-pam
2003-05-14 15:11:48 +10:00
Damien Miller 9c617693c2 - (djm) Make portable build with MIT krb5 (some issues remain) 2003-05-14 14:31:11 +10:00
Damien Miller 3ab496b3dd - markus@cvs.openbsd.org 2003/05/14 02:15:47
[auth2.c monitor.c sshconnect2.c auth2-krb5.c]
     implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
     server interops with commercial client; ok jakob@ djm@
2003-05-14 13:47:37 +10:00
Damien Miller fb7508edc8 - djm@cvs.openbsd.org 2003/05/14 01:00:44
[sftp.1]
     emphasise the batchmode functionality and make reference to pubkey auth,
     both of which are FAQs; ok markus@
2003-05-14 13:47:07 +10:00
Damien Miller 935063553a - markus@cvs.openbsd.org 2003/05/12 18:35:18
[ssh-keyscan.1]
     typo: DSA keys are of type ssh-dss; Brian Poole
2003-05-14 13:46:33 +10:00
Damien Miller 280ecfb6e4 - markus@cvs.openbsd.org 2003/05/12 16:55:37
[sshconnect2.c]
     for pubkey authentication try the user keys in the following order:
        1. agent keys that are found in the config file
        2. other agent keys
        3. keys that are only listed in the config file
     this helps when an agent has many keys, where the server might
     close the connection before the correct key is used. report & ok pb@
2003-05-14 13:46:00 +10:00
Damien Miller b1ca8bb159 - markus@cvs.openbsd.org 2003/05/11 20:30:25
[channels.c clientloop.c serverloop.c session.c ssh.c]
     make channel_new() strdup the 'remote_name' (not the caller); ok theo
2003-05-14 13:45:42 +10:00
Damien Miller db2747259c - markus@cvs.openbsd.org 2003/05/11 16:56:48
[authfile.c ssh-keygen.c]
     change key_load_public to try to read a public from:
     rsa1 private or rsa1 public and ssh2 keys.
     this makes ssh-keygen -e fail for ssh1 keys more gracefully
     for example; report from itojun (netbsd pr 20550).
2003-05-14 13:45:22 +10:00
Damien Miller 3155432cd9 - david@cvs.openbsd.org 2003/04/30 20:41:07
[sshd.8]
     fix invalid .Pf macro usage introduced in previous commit
     ok jmc@ mouring@
2003-05-14 13:44:58 +10:00
Damien Miller 049245d260 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
[sshd.8 sshd_config.5]
     Escape ?, * and ! in .Ql for nroff compatibility.  OpenSSH Portable
     Bug #550 and * escaping suggested by jmc@.
2003-05-14 13:44:42 +10:00
Damien Miller ea5ade28fb - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
[ssh-keyscan.c]
     -t in usage(); rogier@quaak.org
2003-05-14 13:43:53 +10:00
Damien Miller 8ce778a9f0 - markus@cvs.openbsd.org 2003/04/16 14:35:27
[auth.h]
     document struct Authctxt; with solar
2003-05-14 13:43:25 +10:00
Damien Miller 2372ace572 - markus@cvs.openbsd.org 2003/04/14 14:17:50
[channels.c sshconnect.c sshd.c ssh-keyscan.c]
     avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
2003-05-14 13:42:23 +10:00
Damien Miller 44e72a764f - naddy@cvs.openbsd.org 2003/04/12 11:40:15
[ssh.1]
     document -V switch, fix wording; ok markus@
2003-05-14 13:42:08 +10:00
Damien Miller ef095ce00a - markus@cvs.openbsd.org 2003/04/12 10:15:36
[misc.c]
     debug->debug2
2003-05-14 13:41:39 +10:00
Damien Miller a201bb3f8a - markus@cvs.openbsd.org 2003/04/12 10:13:57
[cipher.c]
     hide cipher details; ok djm@
2003-05-14 13:41:23 +10:00
Damien Miller c652cac5f7 - (djm) OpenBSD CVS Sync
- djm@cvs.openbsd.org 2003/04/09 12:00:37
     [readconf.c]
     strip trailing whitespace from config lines before parsing.
     Fixes bz 528; ok markus@
2003-05-14 13:40:54 +10:00
Damien Miller d558092522 - (djm) RCSID sync w/ OpenBSD 2003-05-14 13:40:06 +10:00
Damien Miller 1a27a1ee8c - (djm) Bug #117: Don't lie to PAM about username 2003-05-14 10:27:09 +10:00
Damien Miller 75d3b05c57 - (djm) Redhat spec: Don't install profile.d scripts when not
building with GNOME/GTK askpass (patch from bet@rahul.net)
2003-05-12 18:15:49 +10:00
Damien Miller 0d8b792931 - (djm) 2-clause license on loginrec.c, with permission from
andre@ae-35.com
2003-05-10 23:42:12 +10:00
Damien Miller 4f9f42a9bb - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
proper challenge-response module
2003-05-10 19:28:02 +10:00
Darren Tucker c437cda328 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
problem on Linux (fixes "could not set controlling tty" errors).

Also renames STREAMS_PUSH_ACQUIRES_CTTY to the more generic SSHD_ACQUIRES_CTTY
and moves the Solaris-specific comments to configure.ac.
2003-05-10 17:05:46 +10:00
Darren Tucker e8831091c3 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
"make install".  Patch by roth@feep.net.
2003-05-10 16:48:23 +10:00
Darren Tucker ac279284f6 Add bug# to ChangeLog. 2003-05-04 11:36:25 +10:00
Darren Tucker 70a08cd29d - (dtucker) Move #include of bsd-cygwin_util.h to openbsd-compat.h. Patch from
vinschen@redhat.com.
2003-05-04 10:41:20 +10:00
Darren Tucker 04cc5385b1 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
by wendyp@cray.com.
2003-05-03 07:32:56 +10:00
Darren Tucker bd570d7a22 Added ok for record_failed_login() change 2003-05-02 23:50:09 +10:00
Darren Tucker 97363a8b24 - (dtucker) Move handling of bad password authentications into a platform
specific record_failed_login() function (affects AIX & Unicos).
2003-05-02 23:42:25 +10:00
Darren Tucker 3c01654deb - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
privsep should now work.
2003-05-02 20:48:21 +10:00
Damien Miller eab4bae038 - (djm) Add back radix.o (used by AFS support), after it went missing from
Makefile many moons ago
 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
 - (djm) Fix blibpath specification for AIX/gcc
 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
2003-04-29 23:22:40 +10:00
Ben Lindstrom 0e7f4363f3 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
hacked code.
2003-04-28 23:30:43 +00:00
Ben Lindstrom f50ad1fd04 - (bal) auth2.c same changed as above. 2003-04-27 18:44:31 +00:00
Ben Lindstrom 683036ee2c - (bal) auth1.c minor resync while looking at the code. 2003-04-27 18:41:30 +00:00
Ben Lindstrom 796b9a5495 - (bal) Since we don't support platforms lacking u_int_64. We may
as well clean out some of those evil #ifdefs
2003-04-27 18:01:37 +00:00
Ben Lindstrom 93b6b776ad - (bal) Bug #541: return; was dropped by mistake. Reported by
furrier@iglou.com
2003-04-27 17:55:33 +00:00
Damien Miller 2a3f20e397 - (djm) Fix missed log => logit occurance (reference by function pointer) 2003-04-09 21:12:00 +10:00
Damien Miller bf2a0174e3 - hin@cvs.openbsd.org 2003/04/09 08:23:52
[servconf.c]
     Don't include <krb.h> when compiling with Kerberos 5 support
2003-04-09 21:07:14 +10:00
Damien Miller a0898b8505 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
[*.c *.h]
     rename log() into logit() to avoid name conflict.  markus ok, from
     netbsd
     - (djm) XXX - Performed locally using:
       "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
   - (djm) Fix up missing include for packet.c
2003-04-09 21:05:52 +10:00
Damien Miller b1ecd9cd97 - markus@cvs.openbsd.org 2003/04/07 08:29:57
[monitor_wrap.c]
     typo: get correct counters; introduced during rekeying change.
2003-04-09 20:51:24 +10:00
Damien Miller 3bed191ca2 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
[progressmeter.c]
     $OpenBSD$
   - itojun@cvs.openbsd.org 2003/04/03 10:17:35
     [progressmeter.c]
     remove $OpenBSD$, as other *.c does not have it.
2003-04-09 20:50:59 +10:00
Damien Miller 703ced55bb - markus@cvs.openbsd.org 2003/04/02 14:36:26
[ssh-keysign.c]
     potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
2003-04-09 20:50:26 +10:00
Damien Miller a5539d2698 - (djm) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2003/04/02 09:48:07
     [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
     [readconf.h serverloop.c sshconnect2.c]
     reapply rekeying chage, tested by henning@, ok djm@
2003-04-09 20:50:06 +10:00
Damien Miller a92a589e97 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils) 2003-04-09 19:41:25 +10:00
Damien Miller d186d74410 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
from matth@eecs.berkeley.edu
2003-04-09 19:40:33 +10:00
Ben Lindstrom c8a49d743a - (bal) if IP_TOS is not found or broken don't try to compile in
packet_set_tos() function call.  bug #527
2003-04-02 15:18:22 +00:00
Damien Miller a0ab669c13 - (djm) Release 3.6.1p1 2003-04-01 21:47:16 +10:00
Damien Miller b80e52ab6f - (djm) Crank spec file versions 2003-04-01 21:46:53 +10:00
Damien Miller 13c1c7a75e - markus@cvs.openbsd.org 2003/04/01 10:56:46
[version.h]
     3.6.1
2003-04-01 21:45:26 +10:00
Damien Miller d32090426b - markus@cvs.openbsd.org 2003/04/01 10:31:26
[compat.c compat.h kex.c]
     bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
     tested by ho@ and myself
2003-04-01 21:44:37 +10:00
Damien Miller 2dc074ef4b - markus@cvs.openbsd.org 2003/04/01 10:10:23
[clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
     [readconf.h serverloop.c sshconnect2.c]
     rekeying bugfixes and automatic rekeying:
     * both client and server rekey _automatically_
           (a) after 2^31 packets, because after 2^32 packets
               the sequence number for packets wraps
           (b) after 2^(blocksize_in_bits/4) blocks
       (see: draft-ietf-secsh-newmodes-00.txt)
       (a) and (b) are _enabled_ by default, and only disabled for known
       openssh versions, that don't support rekeying properly.
     * client option 'RekeyLimit'
     * do not reply to requests during rekeying
   - markus@cvs.openbsd.org 2003/04/01 10:22:21
     [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
     [readconf.h serverloop.c sshconnect2.c]
     backout rekeying changes (for 3.6.1)
2003-04-01 21:43:39 +10:00
Damien Miller 495dca3518 - (djm) OpenBSD CVS Sync
- jmc@cvs.openbsd.org 2003/03/28 10:11:43
     [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
     [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
     - killed whitespace
     - new sentence new line
     - .Bk for arguments
     ok markus@
2003-04-01 21:42:14 +10:00
Damien Miller b3207e8061 - (djm) OpenBSD CVS Sync
- deraadt@cvs.openbsd.org 2003/03/26 04:02:51
     [sftp-server.c]
     one last fix to the tree: race fix broke stuff; pr 3169;
     srp@srparish.net, help from djm
2003-03-26 16:01:11 +11:00
Damien Miller 68d893dfed - (djm) Fix getpeerid support for 64 bit BE systems. From
Arnd Bergmann <arndb@de.ibm.com>
2003-03-25 09:07:52 +11:00
Damien Miller 62b6b17080 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
Report from murple@murple.net, diagnosis from dtucker@zip.com.au
2003-03-24 13:35:58 +11:00
Damien Miller b062c293e0 - (djm) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2003/03/23 19:02:00
     [monitor.c]
     unbreak rekeying for privsep; ok millert@
2003-03-24 09:12:09 +11:00
Tim Rice 009b23f6ab [contrib/caldera/openssh.spec] workaround RPM quirk. Fix %files section 2003-03-20 20:50:41 -08:00
Ben Lindstrom c8c548d248 - (bal) Disable Privsep for Tru64 after pre-authentication due to issues
with SIA.  Also, clean up of tru64 support patch by Chris Adams
   <cmadams@hiwaay.net>
2003-03-21 01:18:09 +00:00
Ben Lindstrom a5a2648b81 - (bal) Collection of Cray patches (bsd-cray.h fix for CRAYT3E and improved
guessing rules)
2003-03-21 01:05:37 +00:00
Ben Lindstrom d54d9382a4 - (bal) scp.c 'limit' conflicts with Cray. Rename to 'limitbw' 2003-03-21 00:55:32 +00:00
Ben Lindstrom 5bd6eb71da - (bal) The days of lack of int64_t support are over. Sorry kids. 2003-03-21 00:34:34 +00:00
Damien Miller 4874c32531 - markus@cvs.openbsd.org 2003/03/17 11:43:47
[version.h]
     enter 3.6
2003-03-20 10:11:34 +11:00
Damien Miller 05f5578e1f - (djm) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2003/03/17 10:38:38
     [progressmeter.c]
     don't print \n if backgrounded; from ho@
2003-03-20 10:08:05 +11:00
Tim Rice 4e4dc561ae [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
add nanosleep(). testing/corrections by Darren Tucker <dtucker@zip.com.au>
2003-03-18 10:21:40 -08:00
Damien Miller cafbcc7334 - (djm) Fix return value checks for RAND_bytes. Report from
Steve G <linux_4ever@yahoo.com>
2003-03-17 16:13:53 +11:00
Damien Miller c51d0735a4 - markus@cvs.openbsd.org 2003/03/13 11:44:50
[ssh-agent.c]
     ssh-agent is similar to ssh-keysign (allows other processes to use
     private rsa keys). however, it gets key over socket and not from
     a file, so we have to do blinding here as well.
2003-03-15 11:37:09 +11:00
Damien Miller ed33d3b4d2 - (djm) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2003/03/13 11:42:19
     [authfile.c ssh-keysign.c]
     move RSA_blinding_on to generic key load method
2003-03-15 11:36:18 +11:00
Damien Miller c1365e19b0 Fix bug # 2003-03-13 09:42:51 +11:00
Damien Miller c9c1d3757f - (djm) AIX package builder update from dtucker@zip.com.au 2003-03-10 12:10:45 +11:00
Damien Miller 933cc8fb9c - (djm) Bug #245: TTY problems on Solaris. Fix by stevesk@ and
dtucker@zip.com.au
2003-03-10 11:38:10 +11:00
Damien Miller f211efc690 - (djm) One more portable-specific one from dlheine@suif.Stanford.EDU/
CLOUSEAU
2003-03-10 11:23:06 +11:00
Damien Miller 0011138d47 - (djm) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2003/03/05 22:33:43
     [channels.c monitor.c scp.c session.c sftp-client.c sftp-int.c]
     [sftp-server.c ssh-add.c sshconnect2.c]
     fix memory leaks; from dlheine@suif.Stanford.EDU/CLOUSEAU; ok djm@
2003-03-10 11:21:17 +11:00
Damien Miller ca49a97788 - (djm) Fix some compile errors spotted by dtucker and his fabulous
tinderbox
2003-02-25 10:22:35 +11:00
Damien Miller fe1f14375a - (djm) Bug #456: Support for NEC SX6 with Unicos; from wendyp@cray.com 2003-02-24 15:45:42 +11:00
Damien Miller 1a3ccb07c5 - (djm) Bug #494: Allow multiple accounts on Windows 9x/Me;
From vinschen@redhat.com
2003-02-24 13:04:01 +11:00
Damien Miller 8d8168a255 - (djm) Rest of Bug #499: Import a basename() function from OpenBSD libc 2003-02-24 12:55:55 +11:00
Damien Miller b16f874d89 - (djm) Most of Bug #499: Cygwin compile fixes for new progressmeter 2003-02-24 12:47:15 +11:00
Damien Miller 30947c7287 - (djm) Bug #501: gai_strerror should return char*;
fix from dtucker@zip.com.au
2003-02-24 12:35:08 +11:00
Damien Miller d194048f57 - (djm) Add new object files to Makefile and reorder 2003-02-24 12:18:46 +11:00
Damien Miller 543402108e - mpech@cvs.openbsd.org 2003/02/21 10:34:48
[auth-krb4.c]
     ...sizeof(&adat.session) is not good here.
     henning@, deraadt@, millert@
2003-02-24 12:05:18 +11:00
Damien Miller 9f82c8fa4f - markus@cvs.openbsd.org 2003/02/21 09:05:53
[servconf.c]
     print sshd_config filename in debug2 mode.
2003-02-24 12:04:33 +11:00
Damien Miller 06ebedf365 - markus@cvs.openbsd.org 2003/02/16 17:30:33
[monitor.c monitor_wrap.c]
     fix permitrootlogin forced-commands-only for privsep; bux #387; ok provos@
2003-02-24 12:03:38 +11:00
Damien Miller 8e7fb33523 - markus@cvs.openbsd.org 2003/02/16 17:09:57
[kex.c kexdh.c kexgex.c kex.h sshconnect2.c sshd.c ssh-keyscan.c]
     split kex into client and server code, no need to link
     server code into the client; ok provos@
2003-02-24 12:03:03 +11:00
Damien Miller 1587fb8a17 - markus@cvs.openbsd.org 2003/02/12 21:39:50
[crc32.c crc32.h]
     replace crc32.c with a BSD licensed version; noted by David Turner
2003-02-24 12:02:12 +11:00
Damien Miller e8a240f966 - markus@cvs.openbsd.org 2003/02/12 09:33:04
[key.c key.h ssh-dss.c ssh-rsa.c]
     merge ssh-dss.h ssh-rsa.h into key.h; ok deraadt@
2003-02-24 12:01:40 +11:00
Damien Miller 7b406276c4 - markus@cvs.openbsd.org 2003/02/10 11:51:47
[ssh-add.1]
     xref sshd_config.5 (not sshd.8); mark@summersault.com; bug #490
2003-02-24 12:00:16 +11:00
Damien Miller 556f9315a5 - markus@cvs.openbsd.org 2003/02/06 21:22:43
[auth1.c auth2.c]
     undo broken fix for #387, fixes #486
2003-02-24 11:59:26 +11:00