Commit Graph

1066 Commits

Author SHA1 Message Date
Ben Lindstrom a6c20148f5 - markus@cvs.openbsd.org 2001/04/05 10:39:48
[version.h]
     temporary version 2.5.4 (supports rekeying).
     this is not an official release.
2001-04-05 23:22:25 +00:00
Ben Lindstrom fb50cdfdb8 - markus@cvs.openbsd.org 2001/04/05 10:39:03
[compress.c compress.h packet.c]
     reset compress state per direction when rekeying.
2001-04-05 23:20:46 +00:00
Ben Lindstrom 4f3ae4c550 - markus@cvs.openbsd.org 2001/04/05 10:00:06
[compat.c]
     2.3.x does old  GEX, too; report jakob@
2001-04-05 23:19:21 +00:00
Kevin Steves ff8b4959d9 - (stevesk) logintest.c: fix for systems without __progname 2001-04-05 23:05:22 +00:00
Kevin Steves 86a52b3dc8 - (stevesk) don't use vhangup() if defined(HAVE_DEV_PTMX); also removes
BROKEN_VHANGUP
2001-04-05 17:15:08 +00:00
Ben Lindstrom 5ba23b39bf - markus@cvs.openbsd.org 2001/04/04 23:09:18
[dh.c kex.c packet.c]
     clear+free keys,iv for rekeying.
     + fix DH mem leaks. ok niels@
2001-04-05 02:05:21 +00:00
Ben Lindstrom 8e312f3db0 - markus@cvs.openbsd.org 2001/04/04 22:04:35
[kex.c kexgex.c serverloop.c]
     parse full kexinit packet.
     make server-side more robust, too.
2001-04-04 23:50:21 +00:00
Ben Lindstrom 0cae04005e - markus@cvs.openbsd.org 2001/04/04 20:32:56
[auth2.c]
     we don't care about missing bannerfiles; from tsoome@ut.ee, ok deraadt@
2001-04-04 23:47:52 +00:00
Ben Lindstrom be2cc43c3a - markus@cvs.openbsd.org 2001/04/04 20:25:38
[channels.c channels.h clientloop.c kex.c kex.h serverloop.c
      sshconnect2.c sshd.c]
     more robust rekeying
     don't send channel data after rekeying is started.
2001-04-04 23:46:07 +00:00
Ben Lindstrom 78c261ab4a - markus@cvs.openbsd.org 2001/04/04 15:50:55
[compat.c]
     f-secure 1.3.2 does not handle IGNORE; from milliondl@ornl.gov
2001-04-04 23:43:26 +00:00
Ben Lindstrom 8ac9106c3d - markus@cvs.openbsd.org 2001/04/04 14:34:58
[clientloop.c kex.c kex.h serverloop.c sshconnect2.c sshd.c]
     enable server side rekeying + some rekey related clientup.
     todo: we should not send any non-KEX messages after we send KEXINIT
2001-04-04 17:57:54 +00:00
Ben Lindstrom 238abf6a14 - markus@cvs.openbsd.org 2001/04/04 09:48:35
[kex.c kex.h kexdh.c kexgex.c packet.c sshconnect2.c sshd.c]
     don't sent multiple kexinit-requests.
     send newkeys, block while waiting for newkeys.
     fix comments.
2001-04-04 17:52:53 +00:00
Ben Lindstrom 22b19b43e4 - (bal) Oops.. Missed including kexdh.c and kexgex.c in OpenBSD sync. 2001-04-04 17:39:19 +00:00
Ben Lindstrom f28f634a3a - markus@cvs.openbsd.org 2001/04/04 00:06:54
[clientloop.c sshconnect2.c]
     enable client rekeying
        (1) force rekeying with ~R, or
        (2) if the server requests rekeying.
     works against ssh-2.0.12/2.0.13/2.1.0/2.2.0/2.3.0/2.3.1/2.4.0
2001-04-04 02:03:04 +00:00
Ben Lindstrom 2d90e00309 - markus@cvs.openbsd.org 2001/04/03 23:32:12
[kex.c kex.h packet.c sshconnect2.c sshd.c]
     undo parts of recent my changes: main part of keyexchange does not
     need dispatch-callbacks, since application data is delayed until
     the keyexchange completes (if i understand the drafts correctly).
     add some infrastructure for re-keying.
2001-04-04 02:00:54 +00:00
Ben Lindstrom 9323d96479 - todd@cvs.openbsd.org 2001/04/03 21:19:38
[ssh_config]
     id_rsa1/2 -> id_rsa; ok markus@
2001-04-04 01:58:48 +00:00
Ben Lindstrom 20d7c7b02c - markus@cvs.openbsd.org 2001/04/03 19:53:29
[dh.c dh.h kex.c kex.h sshconnect2.c sshd.c]
     move kex to kex*.c, used dispatch_set() callbacks for kex. should
     make rekeying easier.
2001-04-04 01:56:17 +00:00
Ben Lindstrom 86ebcb6cf5 - stevesk@cvs.openbsd.org 2001/04/03 13:56:11
[sftp-glob.c ssh-agent.c ssh-keygen.c]
     free() -> xfree()
2001-04-04 01:53:20 +00:00
Ben Lindstrom 0d3e8fafa4 - deraadt@cvs.openbsd.org 2001/04/02 17:32:23
[ssh-agent.1]
     grammar; slade@shore.net
2001-04-04 01:51:25 +00:00
Kevin Steves efe5fd811b - (stevesk) nchan.c: remove ostate checks and add EINVAL to
shutdown(SHUT_RD) error() bypass for HP-UX.
2001-04-03 13:02:48 +00:00
Ben Lindstrom 3704c2612a - stevesk@cvs.openbsd.org 2001/04/02 14:20:23
[readconf.c servconf.c]
     correct comment; ok markus@
2001-04-02 18:20:03 +00:00
Ben Lindstrom 55b99e35c7 - stevesk@cvs.openbsd.org 2001/04/02 14:15:31
[sshd.8]
     typo; ok markus@
2001-04-02 18:18:21 +00:00
Kevin Steves 6189e1905c - (stevesk) sshpty.h openbsd sync; PTY_H -> SSHPTY_H 2001-04-02 14:02:55 +00:00
Kevin Steves edcd5762e2 - (stevesk) log.c openbsd sync; missing newlines 2001-04-02 13:45:00 +00:00
Damien Miller ff75ac4d68 - OpenBSD CVS Sync
- djm@cvs.openbsd.org 2001/03/29 23:42:01
     [sshd.c]
     Protocol 1 key regeneration log => verbose, some KNF; ok markus@
2001-03-30 10:50:32 +10:00
Damien Miller 9709f90684 - OpenBSD CVS Sync
- markus@cvs.openbsd.org 2001/03/29 21:17:40
     [dh.c dh.h kex.c kex.h]
     prepare for rekeying: move DH code to dh.c
2001-03-30 10:50:10 +10:00
Damien Miller a0ff466d80 - OpenBSD CVS Sync
- stevesk@cvs.openbsd.org 2001/03/29 21:06:21
     [sshconnect2.c sshd.c]
     need to set both STOC and CTOS for SSH_BUG_BIGENDIANAES; ok markus@
2001-03-30 10:49:35 +10:00
Damien Miller 653ae11c4a - OpenBSD CVS Sync
- provos@cvs.openbsd.org 2001/03/29 14:24:59
     [sshconnect2.c]
     use recommended defaults
2001-03-30 10:49:05 +10:00
Damien Miller 5d57e50730 - OpenBSD CVS Sync
- markus@cvs.openbsd.org 2001/03/28 22:43:31
     [auth.h auth2.c auth2-chall.c]
     check auth_root_allowed for kbd-int auth, too.
2001-03-30 10:48:31 +10:00
Damien Miller 23e526e271 - OpenBSD CVS Sync
- provos@cvs.openbsd.org 2001/03/28 22:04:57
     [dh.c]
     more sanity checking on primes file
2001-03-30 10:47:43 +10:00
Damien Miller 2557bfc5d7 - (djm) OpenBSD CVS Sync
- provos@cvs.openbsd.org 2001/03/28 21:59:41
     [kex.c kex.h sshconnect2.c sshd.c]
     forgot to include min and max params in hash, okay markus@
2001-03-30 10:47:14 +10:00
Damien Miller d8f72ca6d5 - (djm) Another openbsd-compat/glob.c sync 2001-03-30 10:23:17 +10:00
Ben Lindstrom 7de696e798 - markus@cvs.openbsd.org 2001/03/28 20:50:45
[sshd.c]
     call refuse() before close(); from olemx@ans.pl
2001-03-29 00:45:12 +00:00
Ben Lindstrom ff2618c80f - stevesk@cvs.openbsd.org 2001/03/28 20:04:38
[scp.c]
     usage more like rcp and add missing -B to usage; ok markus@
2001-03-29 00:43:54 +00:00
Ben Lindstrom bd47226987 - stevesk@cvs.openbsd.org 2001/03/28 19:56:23
[scp.c]
     start to sync scp closer to rcp; ok markus@
2001-03-29 00:39:55 +00:00
Ben Lindstrom df221391e6 - provos@cvs.openbsd.org 2001/03/27 17:46:50
[compat.c compat.h dh.c dh.h ssh2.h sshconnect2.c sshd.c version.h]
     make dh group exchange more flexible, allow min and max group size,
     okay markus@, deraadt@
2001-03-29 00:36:16 +00:00
Ben Lindstrom 60a4381f1a - markus@cvs.openbsd.org 2001/03/27 10:57:00
[compat.c compat.h ssh-rsa.c]
     some older systems use NID_md5 instead of NID_sha1 for RSASSA-PKCS1-v1_5
     signatures in SSH protocol 2, ok djm@
2001-03-29 00:32:56 +00:00
Ben Lindstrom 425fb02f20 - markus@cvs.openbsd.org 2001/03/27 10:34:08
[ssh-rsa.c sshd.c]
     use EVP_get_digestbynid, reorder some calls and fix missing free.
2001-03-29 00:31:20 +00:00
Ben Lindstrom d09fcf5f6e - markus@cvs.openbsd.org 2001/03/26 23:23:24
[rsa.c rsa.h ssh-agent.c ssh-keygen.c]
     try to read private f-secure ssh v2 rsa keys.
2001-03-29 00:29:54 +00:00
Ben Lindstrom c111660896 - markus@cvs.openbsd.org 2001/03/26 23:12:42
[authfile.c]
     KNF
2001-03-29 00:28:37 +00:00
Ben Lindstrom 89b0bd66e2 - stevesk@cvs.openbsd.org 2001/03/26 15:47:59
[ssh.1]
     document more defaults; misc. cleanup.  ok markus@
2001-03-29 00:27:11 +00:00
Damien Miller b68af624a9 - (djm) Sync openbsd-compat/glob.c 2001-03-28 21:05:26 +10:00
Damien Miller 9834474151 - (djm) Rework krbIV tests to get us closer to building on Redhat. Still
doesn't work because of conflicts between krbIV's and OpenSSL's des.h
2001-03-28 14:37:06 +10:00
Damien Miller 18bb473eb0 - (djm) Work around Solaris' broken struct dirent. Diagnosis and suggested
fix from Philippe Levan <levan@epix.net>
2001-03-28 14:35:30 +10:00
Damien Miller c79bc0d75b - (djm) Reorder tests and library inclusion for Krb4/AFS to try to
resolve linking conflicts with libcrypto. Report and suggested fix
   from Holger Trapp <Holger.Trapp@Informatik.TU-Chemnitz.DE>
2001-03-28 13:03:42 +10:00
Damien Miller f9e9300947 - (djm) Reestablish PAM credentials (which can be supplemental group
memberships) after initgroups() blows them away. Report and suggested
   fix from Nalin Dahyabhai <nalin@redhat.com>
2001-03-27 16:12:24 +10:00
Ben Lindstrom d0fca423fc - markus@cvs.openbsd.org 2001/03/26 08:07:09
[authfile.c authfile.h ssh-add.c ssh-keygen.c ssh.c sshconnect.c
      sshconnect.h sshconnect1.c sshconnect2.c sshd.c]
     simpler key load/save interface, see authfile.h
2001-03-26 13:44:06 +00:00
Ben Lindstrom 7bfff36ca3 - stevesk@cvs.openbsd.org 2001/03/25 13:16:11
[servconf.c servconf.h session.c sshd.8 sshd_config]
     PrintLastLog option; from chip@valinux.com with some minor
     changes by me.  ok markus@
2001-03-26 05:45:53 +00:00
Ben Lindstrom 6029432ec5 - djm@cvs.openbsd.org 2001/03/25 00:01:34
[session.c]
     shorten; ok markus@
2001-03-26 05:38:25 +00:00
Ben Lindstrom 9531825dd0 - Fix pointer issues in waitpid() and wait() replaces. Patch by Lutz
Jaenicke <Lutz.Jaenicke@aet.TU-Cottbus.DE>
2001-03-26 05:35:33 +00:00