Ben Lindstrom
604dc72890
- markus@cvs.openbsd.org 2002/11/21 23:04:33
...
[ssh.c]
debug->debug2
2002-12-23 02:08:57 +00:00
Ben Lindstrom
93576d9538
- deraadt@cvs.openbsd.org 2002/11/21 23:03:51
...
[auth-krb5.c auth1.c hostfile.h monitor_wrap.c sftp-client.c sftp-int.c ssh-add.c ssh-rsa.c
sshconnect.c]
KNF
2002-12-23 02:06:19 +00:00
Ben Lindstrom
064496feaa
- markus@cvs.openbsd.org 2002/11/21 22:45:31
...
[cipher.c kex.c packet.c sshconnect.c sshconnect2.c]
debug->debug2, unify debug messages
2002-12-23 02:04:22 +00:00
Ben Lindstrom
1f53083fc4
- markus@cvs.openbsd.org 2002/11/21 22:22:50
...
[dh.c]
debug->debug2
2002-12-23 02:03:02 +00:00
Ben Lindstrom
f49dbff61d
- markus@cvs.openbsd.org 2002/11/18 16:43:44
...
[clientloop.c]
don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN;
e.g. if ssh is used for backup; report Joerg Schilling; ok millert@
2002-12-23 02:01:55 +00:00
Ben Lindstrom
44adb8fed9
- fgsch@cvs.openbsd.org 2002/11/15 10:03:09
...
[authfile.c]
lseek(2) may return -1 when getting the public/private key lenght.
Simplify the code and check for errors using fstat(2).
Problem reported by Mauricio Sanchez, markus@ ok.
2002-12-23 02:00:23 +00:00
Damien Miller
ab1c12a11c
- (djm) PERL-free fixpaths from stuge-openssh-unix-dev@cdy.org
2002-12-05 20:59:33 +11:00
Tim Rice
1c9e688548
[configure.ac] fix STDPATH test for IRIX. First reported by advax@triumf.ca.
...
This type of solution tested by <herb@sgi.com>
2002-11-22 13:29:01 -08:00
Tim Rice
be2396458e
[configure.ac] remove unused variables no_libsocket and no_libnsl
2002-11-13 15:55:55 -08:00
Tim Rice
748fcf9881
[contrib/solaris/opensshd.in] add umask 022 so sshd.pid is not world writable.
2002-11-13 15:50:04 -08:00
Ben Lindstrom
f5397c081d
- (bal) AIX does not log login attempts for unknown users (bug #432 ).
...
patch by dtucker@zip.com.au
2002-11-09 16:11:10 +00:00
Ben Lindstrom
224313cdae
- (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c
...
ntsec now default if cygwin version beginning w/ version 56. Patch
by Corinna Vinschen <vinschen@redhat.com>
2002-11-09 15:59:27 +00:00
Ben Lindstrom
007eb912ea
- markus@cvs.openbsd.org 2002/11/07 22:35:38
...
[scp.c]
check exit status from ssh, and exit(1) if ssh fails; bug#369;
binder@arago.de
2002-11-09 15:54:08 +00:00
Ben Lindstrom
b6df73b06a
- markus@cvs.openbsd.org 2002/11/07 22:08:07
...
[readconf.c readconf.h ssh-keysign.8 ssh-keysign.c]
we cannot use HostbasedAuthentication for enabling ssh-keysign(8),
because HostbasedAuthentication might be enabled based on the
target host and ssh-keysign(8) does not know the remote hostname
and not trust ssh(1) about the hostname, so we add a new option
EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de
2002-11-09 15:52:31 +00:00
Ben Lindstrom
c2faa4a504
- markus@cvs.openbsd.org 2002/11/07 16:28:47
...
[sshd.c]
log to stderr if -ie is given, bug #414 , prj@po.cwru.edu
2002-11-09 15:50:03 +00:00
Ben Lindstrom
8e879cf691
- markus@cvs.openbsd.org 2002/11/05 20:10:37
...
[sftp-client.c]
typo; GaryF@livevault.com
2002-11-09 15:48:49 +00:00
Ben Lindstrom
41ee2b0d77
- markus@cvs.openbsd.org 2002/11/05 19:45:20
...
[monitor.c]
handle overflows for size_t larger than u_int; siw@goneko.de , bug #425
2002-11-09 15:47:47 +00:00
Ben Lindstrom
9bda7ae4c6
- markus@cvs.openbsd.org 2002/11/04 10:09:51
...
[packet.c]
log before send disconnect; ok djm@
2002-11-09 15:46:24 +00:00
Ben Lindstrom
485075e8fa
- markus@cvs.openbsd.org 2002/11/04 10:07:53
...
[auth.c]
don't compare against pw_home if realpath fails for pw_home (seen
on AFS); ok djm@
2002-11-09 15:45:12 +00:00
Ben Lindstrom
ee844912c9
- markus@cvs.openbsd.org 2002/10/23 10:40:16
...
[bufaux.c]
%u for u_int
2002-11-09 15:43:23 +00:00
Ben Lindstrom
0cc2a47674
- markus@cvs.openbsd.org 2002/10/23 10:32:13
...
[packet.c]
use %u for u_int
2002-11-09 15:41:39 +00:00
Ben Lindstrom
0851381bf7
- itojun@cvs.openbsd.org 2002/10/16 14:31:48
...
[sftp-common.c]
64bit pedant. %llu is "unsigned long long". markus ok
2002-11-09 15:40:34 +00:00
Damien Miller
885929cd31
fix changelog
2002-10-21 20:26:16 +10:00
Damien Miller
7b3f58cbcd
- (djm) Bug #317 : FreeBSD needs libutil.h for openpty() Report from
...
dirk.meyer@dinoex.sub.org
2002-10-21 10:50:25 +10:00
Damien Miller
5a5da88c59
- (djm) Kill ssh-rand-helper children on timeout, patch from
...
dtucker@zip.com.au
2002-10-21 10:13:35 +10:00
Ben Lindstrom
3e0064781b
- (bal) More advanced strsep test by Darren Tucker <dtucker@zip.com.au>
2002-10-16 00:24:03 +00:00
Ben Lindstrom
97e38d8667
20021015
...
- (bal) Fix bug id 383 and only call loginrestrict for AIX if not root.
2002-10-16 00:13:52 +00:00
Tim Rice
94f628f0ab
[contrib/caldera/openssh.spec] make ssh-agent setgid nobody
2002-10-15 13:16:55 -07:00
Ben Lindstrom
dc3c757f57
- (bal) Disable post-authentication Privsep for OSF/1. It conflicts with
...
SIA.
2002-10-04 23:54:54 +00:00
Damien Miller
901119beab
- (djm) Bug #406 : s/msg_send/ssh_msg_send/ for Mac OS X 1.2
2002-10-04 11:10:04 +10:00
Damien Miller
7e659de6f9
- (djm) Install ssh-agent setgid nobody in contrib/redhat/openssh.spec
2002-10-03 12:08:19 +10:00
Damien Miller
510d51300e
- (djm) Bump RPM spec version numbers
2002-10-03 11:56:58 +10:00
Damien Miller
7156fc7da6
- markus@cvs.openbsd.org 2002/10/01 13:24:50
...
[version.h]
OpenSSH 3.5
2002-10-03 11:55:37 +10:00
Damien Miller
af9de38c43
- (djm) OpenBSD CVS Sync
...
- markus@cvs.openbsd.org 2002/10/01 20:34:12
[ssh-agent.c]
allow root to access the agent, since there is no protection from root.
2002-10-03 11:54:35 +10:00
Damien Miller
d8769625fb
- stevesk@cvs.openbsd.org 2002/09/27 15:46:21
...
[ssh.1]
clarify compression level protocol 1 only; ok markus@ deraadt@
2002-09-30 12:00:55 +10:00
Damien Miller
e9264973ad
- (djm) OpenBSD CVS Sync
...
- mickey@cvs.openbsd.org 2002/09/27 10:42:09
[compat.c compat.h sshd.c]
add a generic match for a prober, such as sie big brother;
idea from stevesk@; markus@ ok
2002-09-30 11:59:21 +10:00
Damien Miller
aeaf2bee19
Avoid unpackages files warning on /usr/share/openssh/Ssh.bin
2002-09-30 11:39:22 +10:00
Damien Miller
d087562041
Use contrib/ Makefile for building askpass programs
2002-09-30 11:09:54 +10:00
Damien Miller
e81a65b1aa
grrr, cut n' paste
2002-09-30 10:44:40 +10:00
Damien Miller
50f6123eef
- (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs, tweak README
2002-09-30 10:40:39 +10:00
Damien Miller
cd501ec30b
tidy, fix typos, reorder
2002-09-30 10:34:05 +10:00
Damien Miller
d94e549ea8
- markus@cvs.openbsd.org 2002/09/26 11:38:43
...
[auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c]
[monitor_wrap.h]
krb4 + privsep; ok dugsong@, deraadt@
2002-09-27 13:25:58 +10:00
Damien Miller
d27a76de65
- markus@cvs.openbsd.org 2002/09/25 15:19:02
...
[sshd.c]
typo; pilot@monkey.org
2002-09-27 13:22:31 +10:00
Damien Miller
d681d2602c
- (djm) OpenBSD CVS Sync
...
- markus@cvs.openbsd.org 2002/09/25 11:17:16
[sshd_config]
sync LoginGraceTime with default
2002-09-27 13:21:57 +10:00
Tim Rice
81ed518b9b
Cray fixes (bug 367) based on patch from Wendy Palm @ cray.
...
This does not include the deattack.c fixes.
2002-09-25 17:38:46 -07:00
Ben Lindstrom
164725f40e
l) Fix issue where successfull login does not clear failure counts
...
in AIX. Patch by dtucker@zip.com.au ok by djm
2002-09-25 23:14:14 +00:00
Damien Miller
dcbb6c2dc9
- todd@cvs.openbsd.org 2002/09/24 20:59:44
...
[sshd.8]
tweak the example $HOME/.ssh/rc script to not show on any cmdline the
sensitive data it handles. This fixes bug # 402 as reported by
kolya@mit.edu (Nickolai Zeldovich).
ok markus@ and stevesk@
2002-09-25 12:20:52 +10:00
Damien Miller
ef73f50a12
- markus@cvs.openbsd.org 2002/09/24 08:46:04
...
[monitor.c]
only call kerberos code for authctxt->valid
2002-09-25 12:20:17 +10:00
Damien Miller
7db40c9e2e
- markus@cvs.openbsd.org 2002/09/23 22:11:05
...
[monitor.c]
only call auth_krb5 if kerberos is enabled; ok deraadt@
2002-09-25 12:19:39 +10:00
Damien Miller
b2f844dc51
- (djm) OpenBSD CVS Sync
...
- stevesk@cvs.openbsd.org 2002/09/23 20:46:27
[canohost.c]
change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for
non-sockets; fixes a problem passing NULL to snprintf(). ok markus@
2002-09-25 12:19:08 +10:00