summaryrefslogtreecommitdiff
path: root/usr.bin/ssh
AgeCommit message (Collapse)Author
2001-12-18log fingerprint on successful public key authentication, simplify usage of ↵Jakob Schlyter
key structs; ok markus@
2001-12-18log fingerprint on successful public key authentication; ok markus@Jakob Schlyter
2001-12-18remove auth_rsa_read_key, make hostfile_ready_key non static; ok markus@Jakob Schlyter
2001-12-10check that server supports v1 for -t rsa1, report from wirth@dfki.deMarkus Friedl
2001-12-10possible fd leak on error; ok markus@Kevin Steves
2001-12-09add auth2_challenge_stop(), simplifies cleanup of kbd-int sessions,Markus Friedl
fixes memleak.
2001-12-08use only one path to X11 UNIX domain socket vs. an array of pathsKevin Steves
to try. report from djast@cs.toronto.edu. ok markus@
2001-12-06disable nagle for X11 fake server and client TCPs. from netbsd.Kevin Steves
ok markus@
2001-12-06strncpy->strlcpy. remaining strncpy's are necessary. ok markus@Kevin Steves
2001-12-06shutdown(sock, SHUT_RDWR) not needed here; ok markus@Kevin Steves
2001-12-06add -o to sshd, too. ok deraadt@Markus Friedl
2001-12-05make theo and djm happy: bye bye regexpMarkus Friedl
2001-12-05post 3.0.2Markus Friedl
2001-12-05minor KNFTheo de Raadt
2001-12-05make it compile with more strict prototype checkingJun-ichiro itojun Hagino
2001-12-05deal with LP64 printf issue with sig_atomic_t. from thorpejJun-ichiro itojun Hagino
2001-12-02zap };Theo de Raadt
2001-12-01don't pass user defined variables to /usr/bin/loginMarkus Friedl
2001-11-30sscanf() length dependencies are clearer now; can also shrink protoKevin Steves
and data if desired, but i have not done that. ok markus@
2001-11-29fix protocol error: send 'failed' message instead of a 2nd challengeMarkus Friedl
(happens if the same key is in authorized_keys twice). reported Ralf_Meister@genua.de; ok djm@
2001-11-29sshd X11 fake server will now listen on localhost by default:Kevin Steves
$ echo $DISPLAY localhost:12.0 $ netstat -an|grep 6012 tcp 0 0 127.0.0.1.6012 *.* LISTEN tcp6 0 0 ::1.6012 *.* LISTEN sshd_config gatewayports=yes can be used to revert back to the old behavior. will control this with another option later. ok markus@
2001-11-29remove dead function prototype; ok markus@Kevin Steves
2001-11-22volatile sig_atomic_tMarkus Friedl
2001-11-22don't use "\n" in fatal()Kevin Steves
2001-11-21more on passphrase construction; ok markus@Kevin Steves
2001-11-21mem leakMarkus Friedl
2001-11-19kill more registersMike Pechkin
millert@ ok
2001-11-19clarify/state that private keys are not exposed to clients using the agent;Kevin Steves
ok markus@
2001-11-19fd leak on HUP; ok stevesk@Markus Friedl
2001-11-17enum/int type cleanup where it made sense to do so; ok markus@Kevin Steves
2001-11-16handle empty lines instead of dumping core; report from sha@sha-1.netMarkus Friedl
2001-11-14errno saving wrapping in a signal handlerTheo de Raadt
2001-11-13enter 3.0.1Markus Friedl
2001-11-12enable authorized_keys2 again. tested by fries@Markus Friedl
2001-11-12fix krb5 authorization check. found by <jhawk@MIT.EDU>. from art@, deraadt@ okDug Song
2001-11-11make AuthorizedKeysFile2 fallback to AuthorizedKeysFile if ↵Markus Friedl
AuthorizedKeysFile is specified.
2001-11-10remove extra debug()Markus Friedl
2001-11-10KNF (unexpand)Markus Friedl
2001-11-10cleanup libwrap support (remove bogus comment, bogus close(), add debug, etc).Markus Friedl
2001-11-09remove extra trailing dot from log message; pilot@naughty.monkey.orgMarkus Friedl
2001-11-09don't memset too much memory, ok millert@Markus Friedl
original patch from jlk@kamens.brookline.ma.us via nalin@redhat.com
2001-11-08don't print ROOT in CAPS for the authentication messages, i.e.Markus Friedl
Accepted publickey for ROOT from 127.0.0.1 port 42734 ssh2 becomes Accepted publickey for root from 127.0.0.1 port 42734 ssh2
2001-11-08mention setuid root requirements; noted by cnorris@csc.UVic.ca; ok stevesk@Markus Friedl
2001-11-08don't strdup too much data; from gotoh@taiyo.co.jp; ok millert.Markus Friedl
2001-11-07crank c->path to 256 so they can hold a full hostname; dwd@bell-labs.comMarkus Friedl
2001-11-07unused includesMarkus Friedl
2001-11-07s/Keepalive/KeepAlive/; from openbsd@davidkrause.comMarkus Friedl
2001-11-07missing free and sync dss/rsa code.Markus Friedl
2001-11-07ssh_rsa_sign/verify: SSH_BUG_SIGBLOB not supportedMarkus Friedl
2001-11-07pad using the padding field from the ssh2 packet instead of sendingMarkus Friedl
extra ignore messages. tested against several other ssh servers.