Commit Graph

2427 Commits

Author SHA1 Message Date
Damien Miller 6cffb9a8cd - markus@cvs.openbsd.org 2002/08/12 10:46:35
[ssh-agent.c]
     make ssh-agent setgid, disallow ptrace.
     (note: change not yet made in Makefile)
2002-09-04 16:20:26 +10:00
Ben Lindstrom 3962119c8a - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign
it to ULONG_MAX.
2002-08-21 02:54:11 +00:00
Ben Lindstrom 479b476af6 - stevesk@cvs.openbsd.org 2002/08/17 23:55:01
[ssh_config.5]
     ordered list here
2002-08-20 19:04:51 +00:00
Ben Lindstrom 3541f18e10 - stevesk@cvs.openbsd.org 2002/08/17 23:07:14
[ssh.1]
     ForwardAgent has defaulted to no for over 2 years; be more clear here.
2002-08-20 19:03:20 +00:00
Ben Lindstrom bd9bf38b00 - stevesk@cvs.openbsd.org 2002/08/12 17:30:35
[ssh.1 sshd.8 sshd_config.5]
     more PermitUserEnvironment; ok markus@
2002-08-20 18:54:20 +00:00
Ben Lindstrom 15b6120e63 - stevesk@cvs.openbsd.org 2002/08/09 17:41:12
[sshd_config.5]
     proxy vs. fake display
2002-08-20 18:44:24 +00:00
Ben Lindstrom 1f8cf4f4fb - stevesk@cvs.openbsd.org 2002/08/09 17:21:42
[sshd_config.5]
     use Op for mdoc conformance; from esr@golux.thyrsus.com
     ok aaron@
2002-08-20 18:43:27 +00:00
Ben Lindstrom d4ee3497ca - stevesk@cvs.openbsd.org 2002/08/08 23:54:52
[auth.c]
     typo in comment
2002-08-20 18:42:13 +00:00
Ben Lindstrom e143f61b6f - aaron@cvs.openbsd.org 2002/08/08 13:50:23
[sshconnect1.c]
     Use & to test if bits are set, not &&; markus@ ok.
2002-08-20 18:41:15 +00:00
Ben Lindstrom 0deb5d958a - markus@cvs.openbsd.org 2002/08/02 22:20:30
[ssh-rsa.c]
     replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser
     for authentication; ok deraadt/djm
2002-08-20 18:40:03 +00:00
Ben Lindstrom 0e50d846b3 - markus@cvs.openbsd.org 2002/08/02 21:23:41
[ssh-rsa.c]
     diff is u_int (2x); ok deraadt/provos
2002-08-20 18:39:14 +00:00
Ben Lindstrom dc7adf2670 - marc@cvs.openbsd.org 2002/08/02 16:00:07
[ssh.1 sshd.8]
     note that .ssh/environment is only read when
     allowed (PermitUserEnvironment in sshd_config).
     OK markus@
2002-08-20 18:38:02 +00:00
Ben Lindstrom 0a4f7542da - millert@cvs.openbsd.org 2002/08/02 14:43:15
[monitor.c monitor_mm.c]
     Change mm_zalloc() sanity checks to be more in line with what
     we do in calloc() and add a check to monitor_mm.c.
     OK provos@ and markus@
2002-08-20 18:36:25 +00:00
Tim Rice d730b78071 [configure.ac] Display OpenSSL header/library version.
Patch by dtucker@zip.com.au
2002-08-13 18:52:10 -07:00
Ben Lindstrom 5d860f02ca - markus@cvs.openbsd.org 2002/07/30 17:03:55
[auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5]
     add PermitUserEnvironment (off by default!); from dot@dotat.at;
     ok provos, deraadt
2002-08-01 01:28:38 +00:00
Ben Lindstrom 4b99be899c - markus@cvs.openbsd.org 2002/07/29 18:57:30
[sshconnect.c]
     print file:line
2002-08-01 01:26:29 +00:00
Ben Lindstrom 8d631e8515 - mouring@cvs.openbsd.org 2002/07/25 01:16:59
[sftp.c]
     FallBackToRsh does not exist anywhere else.  Remove it from here.
     OK deraadt.
2002-08-01 01:25:00 +00:00
Ben Lindstrom 3ed6640532 - markus@cvs.openbsd.org 2002/07/24 16:11:18
[hostfile.c hostfile.h sshconnect.c]
     print out all known keys for a host if we get a unknown host key,
     see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4

     the ssharp mitm tool attacks users in a similar way, so i'd like to
     pointed out again:
        A MITM attack is always possible if the ssh client prints:
        The authenticity of host 'bla' can't be established.
     (protocol version 2 with pubkey authentication allows you to detect
     MITM attacks)
2002-08-01 01:21:56 +00:00
Ben Lindstrom 18d2b5d399 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de 2002-07-30 19:32:07 +00:00
Kevin Steves 4bdb547ff4 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
char arg.
2002-07-28 20:42:23 +00:00
Kevin Steves e7dbdf7ff8 - (stevesk) [CREDITS] solar 2002-07-28 20:31:18 +00:00
Kevin Steves 6a998ebfa9 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar 2002-07-28 20:24:07 +00:00
Damien Miller a7609f548f - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/ 2002-07-25 14:40:22 +10:00
Damien Miller 6d8d78827e - (djm) Remove some cruft from INSTALL 2002-07-25 14:36:24 +10:00
Ben Lindstrom 1fa330cf35 - stevesk@cvs.openbsd.org 2002/07/15 17:15:31
[uidswap.c]
     little more debugging; ok markus@
2002-07-23 21:29:49 +00:00
Ben Lindstrom 41daec7538 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10
[sshd.c]
     utmp_len is unsigned; display error consistent with other options.
     ok markus@
2002-07-23 21:15:13 +00:00
Ben Lindstrom 7cea16bad5 - stevesk@cvs.openbsd.org 2002/07/22 17:32:56
[monitor.c]
     u_int here; ok provos@
2002-07-23 21:13:40 +00:00
Ben Lindstrom b9051ec9a4 - markus@cvs.openbsd.org 2002/07/22 11:03:06
[session.c]
     fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
2002-07-23 21:11:09 +00:00
Ben Lindstrom 3cc4450d54 - stevesk@cvs.openbsd.org 2002/07/21 18:34:43
[auth-options.h]
     remove invalid comment
2002-07-23 21:07:45 +00:00
Ben Lindstrom 218a07dfb4 - stevesk@cvs.openbsd.org 2002/07/21 18:32:20
[auth-options.c]
     unneeded includes
2002-07-23 21:06:45 +00:00
Ben Lindstrom 82ec9836b2 - (bal) sync ID w/ ssh-agent.c 2002-07-23 21:05:17 +00:00
Ben Lindstrom ee8d52d008 - stevesk@cvs.openbsd.org 2002/07/19 17:42:40
[ssh.c]
     display a warning from ssh when XAuthLocation does not exist or xauth
     returned no authentication data. ok markus@
2002-07-23 21:03:02 +00:00
Ben Lindstrom 264ee307a8 - markus@cvs.openbsd.org 2002/07/19 15:43:33
[log.c log.h session.c sshd.c]
     remove fatal cleanups after fork; based on discussions with and code
     from solar.
2002-07-23 21:01:56 +00:00
Ben Lindstrom 6f52b3e399 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger. 2002-07-23 21:00:17 +00:00
Kevin Steves 6fa740ba84 - (stevesk) [auth-pam.c] typo in comment 2002-07-23 00:51:53 +00:00
Kevin Steves 38b050a0f5 - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
freed by the caller; add free_pam_environment() and use it.
2002-07-23 00:44:07 +00:00
Ben Lindstrom 446d886fa5 - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
into it's own header.
2002-07-23 00:03:33 +00:00
Ben Lindstrom 762104ede0 - (bal) [configure.ac] Missing ;; from cray patch. 2002-07-23 00:00:05 +00:00
Ben Lindstrom 232ccf7754 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
with Cray (mostly #ifdef renaming).  Patch by wendyp@cray.com.
2002-07-22 23:34:25 +00:00
Kevin Steves 066e1ab8a3 - (stevesk) [xmmap.c] missing prototype for fatal() 2002-07-22 16:20:29 +00:00
Ben Lindstrom beb5f3304b - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk 2002-07-22 15:28:53 +00:00
Kevin Steves 287077eaf2 - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h 2002-07-21 23:59:39 +00:00
Kevin Steves 21e04eb2be - (stevesk) [auth-pam.h] unneeded include 2002-07-21 23:20:07 +00:00
Kevin Steves 7ba4970498 - (stevesk) [auth-pam.h] license 2002-07-21 23:16:00 +00:00
Kevin Steves 3429a1bf60 - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
warning on pam_conv struct conversation function.
2002-07-21 22:49:47 +00:00
Kevin Steves 63007d42ee - (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
2002-07-21 17:57:01 +00:00
Kevin Steves 6cdecd0892 - (stevesk) [auth-pam.c] merge cosmetic changes from solar's
openssh-3.4p1-owl-password-changing.diff
2002-07-21 17:26:54 +00:00
Kevin Steves 3a8819102c - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng(). 2002-07-20 19:05:40 +00:00
Tim Rice f028f1e460 [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au 2002-07-19 12:41:10 -07:00
Tim Rice f1a1001f0e [contrib/solaris/buildpkg.sh] create privsep user/group if needed.
Patch by dtucker@zip.com.au
2002-07-19 11:57:57 -07:00