Damien Miller
9f0f5c64bc
- deraadt@cvs.openbsd.org 2001/12/19 07:18:56
...
[auth1.c auth2.c auth2-chall.c auth-bsdauth.c auth.c authfile.c auth.h]
[auth-krb4.c auth-rhosts.c auth-skey.c bufaux.c canohost.c channels.c]
[cipher.c clientloop.c compat.c compress.c deattack.c key.c log.c mac.c]
[match.c misc.c nchan.c packet.c readconf.c rijndael.c rijndael.h scard.c]
[servconf.c servconf.h serverloop.c session.c sftp.c sftp-client.c]
[sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c]
[sshconnect1.c sshconnect2.c sshconnect.c sshd.8 sshd.c sshd_config]
[ssh-keygen.c sshlogin.c sshpty.c sshtty.c ttymodes.c uidswap.c]
basic KNF done while i was looking for something else
2001-12-21 14:45:46 +11:00
Damien Miller
72c336def6
- stevesk@cvs.openbsd.org 2001/12/10 16:45:04
...
[sshd.c]
possible fd leak on error; ok markus@
2001-12-21 12:44:28 +11:00
Ben Lindstrom
ade03f6bad
- markus@cvs.openbsd.org 2001/12/06 13:30:06
...
[servconf.c servconf.h sshd.8 sshd.c]
add -o to sshd, too. ok deraadt@
- (bal) Minor white space fix up in servconf.c
2001-12-06 18:22:17 +00:00
Ben Lindstrom
1c37c6a518
- deraadt@cvs.openbsd.org 2001/12/05 10:06:12
...
[authfd.c authfile.c bufaux.c channels.c compat.c kex.c kexgex.c
key.c misc.c packet.c servconf.c ssh-agent.c sshconnect2.c
sshconnect.c sshd.c ssh-dss.c ssh-keygen.c ssh-rsa.c]
minor KNF
2001-12-06 18:00:18 +00:00
Ben Lindstrom
f8f065bc75
- itojun@cvs.openbsd.org 2001/12/05 03:50:01
...
[clientloop.c serverloop.c sshd.c]
deal with LP64 printf issue with sig_atomic_t. from thorpej
2001-12-06 17:52:16 +00:00
Ben Lindstrom
5e71c54b8c
- markus@cvs.openbsd.org 2001/11/22 12:34:22
...
[clientloop.c serverloop.c sshd.c]
volatile sig_atomic_t
2001-12-06 16:48:14 +00:00
Ben Lindstrom
d84df989db
- markus@cvs.openbsd.org 2001/11/19 11:20:21
...
[sshd.c]
fd leak on HUP; ok stevesk@
2001-12-06 16:35:40 +00:00
Ben Lindstrom
0795848def
- deraadt@cvs.openbsd.org 2001/11/14 20:45:08
...
[sshd.c]
errno saving wrapping in a signal handler
2001-12-06 16:19:01 +00:00
Damien Miller
6a4a4b9290
- markus@cvs.openbsd.org 2001/11/10 13:19:45
...
[sshd.c]
cleanup libwrap support (remove bogus comment, bogus close(), add debug, etc).
2001-11-12 11:07:11 +11:00
Damien Miller
e4a0ff4748
- markus@cvs.openbsd.org 2001/11/09 19:08:35
...
[sshd.c]
remove extra trailing dot from log message; pilot@naughty.monkey.org
2001-11-12 11:06:54 +11:00
Damien Miller
00b61645eb
- markus@cvs.openbsd.org 2001/10/24 08:41:41
...
[sshd.c]
mention remote port in debug message
2001-11-12 10:51:23 +11:00
Ben Lindstrom
1bae404457
- stevesk@cvs.openbsd.org 2001/10/02 22:56:09
...
[sshd.c]
#include "channels.h" for channel_set_af()
2001-10-03 17:46:39 +00:00
Ben Lindstrom
908afed17f
- markus@cvs.openbsd.org 2001/10/01 21:38:53
...
[channels.c channels.h ssh.c sshd.c]
remove ugliness; vp@drexel.edu via angelos
2001-10-03 17:34:59 +00:00
Damien Miller
ffbe69890d
- (djm) Revert setgroups call, it causes problems on OS-X
2001-09-18 14:03:03 +10:00
Damien Miller
ebf989e601
- (djm) Clear supplemental groups at sshd start to prevent them from
...
being propogated to random PAM modules. Based on patch from Redhat via
Pekka Savola <pekkas@netcore.fi>
2001-09-15 21:12:49 +10:00
Ben Lindstrom
ce89dacda8
- camield@cvs.openbsd.org 2001/08/23 17:59:31
...
[sshd.c]
end request with 0, not NULL
ok markus@
2001-09-12 16:58:04 +00:00
Ben Lindstrom
6db66ff387
- (bal) Second around of UNICOS patches. A few other things left.
...
Patches by William L. Jones <jones@mail.utexas.edu>
2001-08-06 23:29:16 +00:00
Ben Lindstrom
794325ac7a
- stevesk@cvs.openbsd.org 2001/07/26 17:18:22
...
[sshd.8 sshd.c]
add -t option to test configuration file and keys; pekkas@netcore.fi
ok markus@
2001-08-06 21:09:07 +00:00
Ben Lindstrom
ec95ed9b4c
- dugsong@cvs.openbsd.org 2001/06/26 16:15:25
...
[auth1.c auth.h auth-krb4.c auth-passwd.c readconf.c readconf.h
servconf.c servconf.h session.c sshconnect1.c sshd.c]
Kerberos v5 support for SSH1, mostly from Assar Westerlund
<assar@freebsd.org> and Bjorn Gronvall <bg@sics.se>. markus@ ok
2001-07-04 04:21:14 +00:00
Ben Lindstrom
980978639c
- markus@cvs.openbsd.org 2001/06/23 19:12:43
...
[sshd.c]
pidfile/sigterm race; bbraun@synack.net
2001-06-25 05:10:20 +00:00
Ben Lindstrom
bba81213b9
- itojun@cvs.openbsd.org 2001/06/23 15:12:20
...
[auth1.c auth2.c auth2-chall.c authfd.c authfile.c auth-rhosts.c
canohost.c channels.c cipher.c clientloop.c deattack.c dh.c
hostfile.c kex.c kexdh.c kexgex.c key.c nchan.c packet.c radix.c
readpass.c scp.c servconf.c serverloop.c session.c sftp.c
sftp-client.c sftp-glob.c sftp-int.c sftp-server.c ssh-add.c
ssh-agent.c ssh.c sshconnect1.c sshconnect2.c sshconnect.c sshd.c
ssh-keygen.c ssh-keyscan.c]
more strict prototypes. raise warning level in Makefile.inc.
markus ok'ed
TODO; cleanup headers
2001-06-25 05:01:22 +00:00
Ben Lindstrom
ec46e0b5fd
- markus@cvs.openbsd.org 2001/06/04 23:07:21
...
[clientloop.c serverloop.c sshd.c]
set flags in the signal handlers, do real work in the main loop,
ok provos@
2001-06-09 01:27:31 +00:00
Ben Lindstrom
80c6d77085
- markus@cvs.openbsd.org 2001/05/28 23:58:35
...
[packet.c packet.h sshconnect.c sshd.c]
remove some lines, simplify.
2001-06-05 21:09:18 +00:00
Ben Lindstrom
1bda4c835e
- stevesk@cvs.openbsd.org 2001/05/19 19:43:57
...
[misc.c misc.h servconf.c sshd.8 sshd.c]
sshd command-line arguments and configuration file options that
specify time may be expressed using a sequence of the form:
time[qualifier], where time is a positive integer value and qualifier
is one of the following:
<none>,s,m,h,d,w
Examples:
600 600 seconds (10 minutes)
10m 10 minutes
1h30m 1 hour 30 minutes (90 minutes)
ok markus@
2001-06-05 19:59:08 +00:00
Ben Lindstrom
551ea37576
- markus@cvs.openbsd.org 2001/05/18 14:13:29
...
[auth-chall.c auth.h auth1.c auth2-chall.c auth2.c readconf.c
readconf.h servconf.c servconf.h sshconnect1.c sshconnect2.c sshd.c]
improved kbd-interactive support. work by per@appgate.com and me
2001-06-05 18:56:16 +00:00
Ben Lindstrom
15f33866a6
- markus@cvs.openbsd.org 2001/04/15 16:58:03
...
[authfile.c ssh-keygen.c sshd.c]
don't use errno for key_{load,save}_private; discussion w/ solar@openwall
2001-04-16 02:00:02 +00:00
Ben Lindstrom
206941fdd8
- markus@cvs.openbsd.org 2001/04/15 08:43:47
...
[dh.c sftp-glob.c sftp-glob.h sftp-int.c sshconnect2.c sshd.c]
some unused variable and typos; from tomh@po.crl.go.jp
2001-04-15 14:27:16 +00:00
Ben Lindstrom
19066a112b
- stevesk@cvs.openbsd.org 2001/04/12 20:09:38
...
[misc.c misc.h readconf.c servconf.c ssh.c sshd.c]
robust port validation; ok markus@ jakob@
2001-04-12 23:39:26 +00:00
Ben Lindstrom
9fce9f02e8
- lebel@cvs.openbsd.org 2001/04/11 16:25:30
...
[sshd.8 sshd.c]
implement the -e option into sshd:
-e When this option is specified, sshd will send the output to the
standard error instead of the system log.
markus@ OK.
2001-04-11 23:10:09 +00:00
Ben Lindstrom
a3700050ec
- markus@cvs.openbsd.org 2001/04/05 10:42:57
...
[auth-chall.c authfd.c channels.c clientloop.c kex.c kexgex.c key.c
mac.c packet.c serverloop.c sftp-client.c sftp-client.h sftp-glob.c
sftp-glob.h sftp-int.c sftp-server.c sftp.c ssh-keygen.c sshconnect.c
sshconnect2.c sshd.c]
fix whitespace: unexpand + trailing spaces.
2001-04-05 23:26:32 +00:00
Ben Lindstrom
be2cc43c3a
- markus@cvs.openbsd.org 2001/04/04 20:25:38
...
[channels.c channels.h clientloop.c kex.c kex.h serverloop.c
sshconnect2.c sshd.c]
more robust rekeying
don't send channel data after rekeying is started.
2001-04-04 23:46:07 +00:00
Ben Lindstrom
8ac9106c3d
- markus@cvs.openbsd.org 2001/04/04 14:34:58
...
[clientloop.c kex.c kex.h serverloop.c sshconnect2.c sshd.c]
enable server side rekeying + some rekey related clientup.
todo: we should not send any non-KEX messages after we send KEXINIT
2001-04-04 17:57:54 +00:00
Ben Lindstrom
238abf6a14
- markus@cvs.openbsd.org 2001/04/04 09:48:35
...
[kex.c kex.h kexdh.c kexgex.c packet.c sshconnect2.c sshd.c]
don't sent multiple kexinit-requests.
send newkeys, block while waiting for newkeys.
fix comments.
2001-04-04 17:52:53 +00:00
Ben Lindstrom
2d90e00309
- markus@cvs.openbsd.org 2001/04/03 23:32:12
...
[kex.c kex.h packet.c sshconnect2.c sshd.c]
undo parts of recent my changes: main part of keyexchange does not
need dispatch-callbacks, since application data is delayed until
the keyexchange completes (if i understand the drafts correctly).
add some infrastructure for re-keying.
2001-04-04 02:00:54 +00:00
Ben Lindstrom
20d7c7b02c
- markus@cvs.openbsd.org 2001/04/03 19:53:29
...
[dh.c dh.h kex.c kex.h sshconnect2.c sshd.c]
move kex to kex*.c, used dispatch_set() callbacks for kex. should
make rekeying easier.
2001-04-04 01:56:17 +00:00
Damien Miller
ff75ac4d68
- OpenBSD CVS Sync
...
- djm@cvs.openbsd.org 2001/03/29 23:42:01
[sshd.c]
Protocol 1 key regeneration log => verbose, some KNF; ok markus@
2001-03-30 10:50:32 +10:00
Damien Miller
a0ff466d80
- OpenBSD CVS Sync
...
- stevesk@cvs.openbsd.org 2001/03/29 21:06:21
[sshconnect2.c sshd.c]
need to set both STOC and CTOS for SSH_BUG_BIGENDIANAES; ok markus@
2001-03-30 10:49:35 +10:00
Damien Miller
2557bfc5d7
- (djm) OpenBSD CVS Sync
...
- provos@cvs.openbsd.org 2001/03/28 21:59:41
[kex.c kex.h sshconnect2.c sshd.c]
forgot to include min and max params in hash, okay markus@
2001-03-30 10:47:14 +10:00
Ben Lindstrom
7de696e798
- markus@cvs.openbsd.org 2001/03/28 20:50:45
...
[sshd.c]
call refuse() before close(); from olemx@ans.pl
2001-03-29 00:45:12 +00:00
Ben Lindstrom
df221391e6
- provos@cvs.openbsd.org 2001/03/27 17:46:50
...
[compat.c compat.h dh.c dh.h ssh2.h sshconnect2.c sshd.c version.h]
make dh group exchange more flexible, allow min and max group size,
okay markus@, deraadt@
2001-03-29 00:36:16 +00:00
Ben Lindstrom
425fb02f20
- markus@cvs.openbsd.org 2001/03/27 10:34:08
...
[ssh-rsa.c sshd.c]
use EVP_get_digestbynid, reorder some calls and fix missing free.
2001-03-29 00:31:20 +00:00
Ben Lindstrom
d0fca423fc
- markus@cvs.openbsd.org 2001/03/26 08:07:09
...
[authfile.c authfile.h ssh-add.c ssh-keygen.c ssh.c sshconnect.c
sshconnect.h sshconnect1.c sshconnect2.c sshd.c]
simpler key load/save interface, see authfile.h
2001-03-26 13:44:06 +00:00
Ben Lindstrom
de71cda078
- markus@cvs.openbsd.org 2001/03/23 14:28:32
...
[session.c sshd.c]
ignore SIGPIPE, restore in child, fixes x11-fwd crashes; with djm@
2001-03-24 00:43:26 +00:00
Ben Lindstrom
c8530c7f5c
- djm@cvs.openbsd.org 2001/03/23 11:04:07
...
[compat.c compat.h sshconnect2.c sshd.c]
Compat for OpenSSH with broken Rijndael/AES. ok markus@
2001-03-24 00:35:19 +00:00
Ben Lindstrom
69d8c077d4
- deraadt@cvs.openbsd.org 2001/03/22 20:22:55
...
[sshd.c]
do not place linefeeds in buffer
2001-03-22 22:45:33 +00:00
Damien Miller
27dbe6f37e
- deraadt@cvs.openbsd.org 2001/03/18 23:30:55
...
[compat.c compat.h sshd.c]
specifically version match on ssh scanners. do not log scan
information to the console
2001-03-19 22:36:20 +11:00
Damien Miller
60bc517356
- (djm) Seed PRNG at startup, rather than waiting for arc4random calls to
...
do it implicitly.
2001-03-19 09:38:15 +11:00
Ben Lindstrom
ca42d5fb7f
- deraadt@cvs.openbsd.org 2001/03/09 12:30:29
...
[sshd.c]
typo; slade@shore.net
2001-03-09 18:25:32 +00:00
Ben Lindstrom
4c4f05e096
- markus@cvs.openbsd.org 2001/03/05 17:17:21
...
[kex.c kex.h sshconnect2.c sshd.c]
generate a 2*need size (~300 instead of 1024/2048) random private
exponent during the DH key agreement. according to Niels (the great
german advisor) this is safe since /etc/primes contains strong
primes only.
References:
P. C. van Oorschot and M. J. Wiener, On Diffie-Hellman key
agreement with short exponents, In Advances in Cryptology
- EUROCRYPT'96, LNCS 1070, Springer-Verlag, 1996, pp.332-343.
2001-03-06 01:09:20 +00:00
Ben Lindstrom
6df8ef4196
- millert@cvs.openbsd.org 2001/03/04 17:42:28
...
[authfd.c channels.c dh.c log.c readconf.c servconf.c sftp-int.c
ssh.c sshconnect.c sshd.c]
log functions should not be passed strings that end in newline as they
get passed on to syslog() and when logging to stderr, do_log() appends
its own newline.
2001-03-05 07:47:23 +00:00