Commit Graph

2064 Commits

Author SHA1 Message Date
Damien Miller 72c336def6 - stevesk@cvs.openbsd.org 2001/12/10 16:45:04
[sshd.c]
     possible fd leak on error; ok markus@
2001-12-21 12:44:28 +11:00
Damien Miller ee11625d43 - markus@cvs.openbsd.org 2001/12/09 18:45:56
[auth2.c auth2-chall.c auth.h]
     add auth2_challenge_stop(), simplifies cleanup of kbd-int sessions,
     fixes memleak.
2001-12-21 12:42:34 +11:00
Damien Miller 3afe375fd2 - stevesk@cvs.openbsd.org 2001/12/08 17:49:28
[channels.c pathnames.h]
     use only one path to X11 UNIX domain socket vs. an array of paths
     to try.  report from djast@cs.toronto.edu.  ok markus@
2001-12-21 12:39:51 +11:00
Damien Miller faf2f6483a - (djm) Add option to gnome-ssh-askpass to stop it from grabbing the X
server. I have found this necessary to avoid server hangs with X input
   extensions (e.g. kinput2). Enable by setting the environment variable
   "GNOME_SSH_ASKPASS_NOGRAB"
2001-12-21 10:28:07 +11:00
Kevin Steves 366298c696 - (stevesk) OpenBSD CVS sync X11 localhost display
- stevesk@cvs.openbsd.org 2001/11/29 14:10:51
     [channels.h channels.c session.c]
     sshd X11 fake server will now listen on localhost by default:
     $ echo $DISPLAY
     localhost:12.0
     $ netstat -an|grep 6012
     tcp        0      0  127.0.0.1.6012         *.*                    LISTEN
     tcp6       0      0  ::1.6012               *.*                    LISTEN
     sshd_config gatewayports=yes can be used to revert back to the old
     behavior.  will control this with another option later.  ok markus@
   - stevesk@cvs.openbsd.org 2001/12/19 08:43:11
     [includes.h session.c]
     handle utsname.nodename case for FamilyLocal X authorization; ok markus@
2001-12-19 17:58:01 +00:00
Ben Lindstrom 73f57be500 - stevesk@cvs.openbsd.org 2001/12/06 18:20:32
[channels.c]
     disable nagle for X11 fake server and client TCPs.  from netbsd.
     ok markus@
2001-12-07 17:28:34 +00:00
Ben Lindstrom ccd8d07b3c - stevesk@cvs.openbsd.org 2001/12/06 18:09:23
[channels.c session.c]
     strncpy->strlcpy.  remaining strncpy's are necessary.  ok markus@
2001-12-07 17:26:48 +00:00
Ben Lindstrom e181a4d294 - stevesk@cvs.openbsd.org 2001/12/06 18:02:32
[channels.c sshconnect.c]
     shutdown(sock, SHUT_RDWR) not needed here; ok markus@
2001-12-07 17:24:49 +00:00
Ben Lindstrom c97b1affc5 - (bal) PCRE no longer required. Banished from the source along with
fake-regex.h
2001-12-07 17:20:47 +00:00
Ben Lindstrom ade03f6bad - markus@cvs.openbsd.org 2001/12/06 13:30:06
[servconf.c servconf.h sshd.8 sshd.c]
     add -o to sshd, too. ok deraadt@
 - (bal) Minor white space fix up in servconf.c
2001-12-06 18:22:17 +00:00
Ben Lindstrom 9eab262f1c - markus@cvs.openbsd.org 2001/12/05 16:54:51
[compat.c match.c match.h]
     make theo and djm happy: bye bye regexp
2001-12-06 18:06:05 +00:00
Ben Lindstrom ff4a14f809 - markus@cvs.openbsd.org 2001/12/05 15:04:48
[version.h]
     post 3.0.2
2001-12-06 18:02:59 +00:00
Ben Lindstrom 1c37c6a518 - deraadt@cvs.openbsd.org 2001/12/05 10:06:12
[authfd.c authfile.c bufaux.c channels.c compat.c kex.c kexgex.c
      key.c misc.c packet.c servconf.c ssh-agent.c sshconnect2.c
      sshconnect.c sshd.c ssh-dss.c ssh-keygen.c ssh-rsa.c]
     minor KNF
2001-12-06 18:00:18 +00:00
Ben Lindstrom 3c36bb29ca - itojun@cvs.openbsd.org 2001/12/05 03:56:39
[auth1.c auth2.c canohost.c channels.c deattack.c packet.c scp.c
      sshconnect2.c]
     make it compile with more strict prototype checking
2001-12-06 17:55:26 +00:00
Ben Lindstrom f8f065bc75 - itojun@cvs.openbsd.org 2001/12/05 03:50:01
[clientloop.c serverloop.c sshd.c]
     deal with LP64 printf issue with sig_atomic_t.  from thorpej
2001-12-06 17:52:16 +00:00
Ben Lindstrom d05487d1db - deraadt@cvs.openbsd.org 2001/12/02 02:08:32
[sftp-common.c]
     zap };
2001-12-06 17:50:03 +00:00
Ben Lindstrom 38b951cdb2 - markus@cvs.openbsd.org 2001/12/01 21:41:48
[session.c sshd.8]
     don't pass user defined variables to /usr/bin/login
2001-12-06 17:47:47 +00:00
Ben Lindstrom 4a4bd719ea - stevesk@cvs.openbsd.org 2001/11/30 20:39:28
[ssh.c]
     sscanf() length dependencies are clearer now; can also shrink proto
     and data if desired, but i have not done that.  ok markus@
2001-12-06 17:45:19 +00:00
Ben Lindstrom 57fe5b592c - markus@cvs.openbsd.org 2001/11/29 22:08:48
[auth-rsa.c]
     fix protocol error: send 'failed' message instead of a 2nd challenge
     (happens if the same key is in authorized_keys twice).
     reported Ralf_Meister@genua.de; ok djm@
2001-12-06 17:41:25 +00:00
Ben Lindstrom 623e4a0b1a - stevesk@cvs.openbsd.org 2001/11/29 19:06:39
[channels.h]
     remove dead function prototype; ok markus@
2001-12-06 16:49:57 +00:00
Ben Lindstrom 5e71c54b8c - markus@cvs.openbsd.org 2001/11/22 12:34:22
[clientloop.c serverloop.c sshd.c]
     volatile sig_atomic_t
2001-12-06 16:48:14 +00:00
Ben Lindstrom 28c603bf43 - stevesk@cvs.openbsd.org 2001/11/22 05:27:29
[ssh-keyscan.c]
     don't use "\n" in fatal()
2001-12-06 16:45:10 +00:00
Ben Lindstrom 4e366d5048 - stevesk@cvs.openbsd.org 2001/11/21 18:49:14
[ssh-keygen.1]
     more on passphrase construction; ok markus@
2001-12-06 16:43:21 +00:00
Ben Lindstrom 4cbc181983 - markus@cvs.openbsd.org 2001/11/21 15:51:24
[key.c]
     mem leak
2001-12-06 16:41:41 +00:00
Ben Lindstrom 70a290c5f7 - mpech@cvs.openbsd.org 2001/11/19 19:02:16
[deattack.c radix.c]
     kill more registers
     millert@ ok
2001-12-06 16:39:56 +00:00
Ben Lindstrom 11f790bbb1 - stevesk@cvs.openbsd.org 2001/11/19 18:40:46
[ssh-agent.1]
     clarify/state that private keys are not exposed to clients using the
     agent; ok markus@
2001-12-06 16:37:51 +00:00
Ben Lindstrom d84df989db - markus@cvs.openbsd.org 2001/11/19 11:20:21
[sshd.c]
     fd leak on HUP; ok stevesk@
2001-12-06 16:35:40 +00:00
Ben Lindstrom 65366a8c76 - stevesk@cvs.openbsd.org 2001/11/17 19:14:34
[auth2.c auth.c readconf.c servconf.c ssh-agent.c ssh-keygen.c]
     enum/int type cleanup where it made sense to do so; ok markus@
2001-12-06 16:32:47 +00:00
Ben Lindstrom eaffb9d6b6 - markus@cvs.openbsd.org 2001/11/16 12:46:13
[ssh-keyscan.c]
     handle empty lines instead of dumping core; report from sha@sha-1.net
2001-12-06 16:28:19 +00:00
Ben Lindstrom 0795848def - deraadt@cvs.openbsd.org 2001/11/14 20:45:08
[sshd.c]
     errno saving wrapping in a signal handler
2001-12-06 16:19:01 +00:00
Tim Rice fe1d100ffd [contrib/cygwin/README, openbsd-compat/bsd-cygwin_util.c,
openbsd-compat/bsd-cygwin_util.h, openbsd-compat/daemon.c]
Allow SSHD to install as service under WIndows 9x/Me
[configure.ac] Fix to allow linking against PCRE on Cygwin
Patches by Corinna Vinschen <vinschen@redhat.com>
2001-11-26 17:19:43 -08:00
Damien Miller f7c6f95682 Release 2001-11-15 23:16:50 +11:00
Damien Miller efdc1f179d - (djm) Fix IPv4 default in ssh-keyscan. Spotted by Dan Astoorian
<djast@cs.toronto.edu> Fix from markus@
2001-11-15 08:40:45 +11:00
Damien Miller 353f608740 - (djm) Bump RPM package versions 2001-11-14 00:05:57 +11:00
Damien Miller c3070c8fe0 - markus@cvs.openbsd.org 2001/11/13 02:03:57
[version.h]
     enter 3.0.1
2001-11-14 00:05:29 +11:00
Damien Miller 527366ccba - markus@cvs.openbsd.org 2001/11/12 11:17:07
[servconf.c]
     enable authorized_keys2 again. tested by fries@
2001-11-14 00:03:14 +11:00
Damien Miller 61b05cfdda - (djm) OpenBSD CVS Sync
- dugsong@cvs.openbsd.org 2001/11/11 18:47:10
     [auth-krb5.c]
     fix krb5 authorization check. found by <jhawk@MIT.EDU>. from
     art@, deraadt@ ok
2001-11-14 00:02:10 +11:00
Damien Miller e49d0966b5 - (djm) AIX login{success,failed} changes. Move loginsuccess call to
do_authenticated. Call loginfailed for protocol 2 failures > MAX like
   we do for protocol 1. Reports from Ralf Wenk <wera0003@fh-karlsruhe.de>,
   K.Wolkersdorfer@fz-juelich.de and others
2001-11-13 23:46:18 +11:00
Damien Miller 056ca1eb47 - (djm) Fix early (and double) free of remote user when using Kerberos.
Patch from Simon Wilkinson <simon@sxw.org.uk>
2001-11-13 11:20:07 +11:00
Damien Miller 726273e129 - (djm) Reorder portable-specific server options so that they come first.
This should help reduce diff collisions for new server options (as they
   will appear at the end)
2001-11-12 11:40:11 +11:00
Damien Miller 75413ac499 - markus@cvs.openbsd.org 2001/11/11 13:02:31
[servconf.c]
     make AuthorizedKeysFile2 fallback to AuthorizedKeysFile if AuthorizedKeysFile is specified.
2001-11-12 11:14:35 +11:00
Damien Miller 084b8d4ed7 - markus@cvs.openbsd.org 2001/11/10 13:37:20
[packet.c]
     remove extra debug()
2001-11-12 11:07:58 +11:00
Damien Miller eacff8533e - markus@cvs.openbsd.org 2001/11/10 13:22:42
[ssh-rsa.c]
     KNF (unexpand)
2001-11-12 11:07:35 +11:00
Damien Miller 6a4a4b9290 - markus@cvs.openbsd.org 2001/11/10 13:19:45
[sshd.c]
     cleanup libwrap support (remove bogus comment, bogus close(), add debug, etc).
2001-11-12 11:07:11 +11:00
Damien Miller e4a0ff4748 - markus@cvs.openbsd.org 2001/11/09 19:08:35
[sshd.c]
     remove extra trailing dot from log message; pilot@naughty.monkey.org
2001-11-12 11:06:54 +11:00
Damien Miller 79faeff2c1 - markus@cvs.openbsd.org 2001/11/09 18:59:23
[clientloop.c serverloop.c]
     don't memset too much memory, ok millert@
     original patch from jlk@kamens.brookline.ma.us via nalin@redhat.com
2001-11-12 11:06:32 +11:00
Damien Miller f655207a46 - markus@cvs.openbsd.org 2001/11/08 20:02:24
[auth.c]
     don't print ROOT in CAPS for the authentication messages, i.e.
     	Accepted publickey for ROOT from 127.0.0.1 port 42734 ssh2
     becomes
     	Accepted publickey for root from 127.0.0.1 port 42734 ssh2
2001-11-12 11:06:06 +11:00
Damien Miller 705499b248 - markus@cvs.openbsd.org 2001/11/08 17:49:53
[ssh.1]
     mention setuid root requirements; noted by cnorris@csc.UVic.ca; ok stevesk@
2001-11-12 11:05:38 +11:00
Damien Miller 637b8ae2d4 - markus@cvs.openbsd.org 2001/11/08 10:51:08
[readpass.c]
     don't strdup too much data; from gotoh@taiyo.co.jp; ok millert.
2001-11-12 11:05:20 +11:00
Damien Miller 36f8dd3ed6 - markus@cvs.openbsd.org 2001/11/07 22:53:21
[channels.h]
     crank c->path to 256 so they can hold a full hostname; dwd@bell-labs.com
2001-11-12 11:04:54 +11:00