summaryrefslogtreecommitdiff
path: root/usr.bin/ssh
AgeCommit message (Collapse)Author
2005-10-17more cleanups; ok jakob@Kevin Steves
2005-10-17remove #ifdef LWRES; ok jakob@Kevin Steves
2005-10-17fix memory leaks from 2 sources:Kevin Steves
1) key_fingerprint_raw() 2) malloc in dns_read_rdata() ok jakob@
2005-10-15make external definition static; ok deraadt@Kevin Steves
2005-10-14free()->xfree(); ok djm@Kevin Steves
2005-10-14no trailing "\n" for log functions; ok djm@Kevin Steves
2005-10-13KNF; ok djm@Kevin Steves
2005-10-13unneeded #include, unused declaration, little knf; ok deraadt@Kevin Steves
2005-10-13unused declarations; ok deraadt@Kevin Steves
2005-10-13spelling in commentsKevin Steves
2005-10-13remove unneeded #includes; ok markus@Kevin Steves
2005-10-11bz #1076 set SO_REUSEADDR on X11 forwarding listner sockets, preventingDamien Miller
bind() failure when a previous connection's listeners are in TIME_WAIT, reported by plattner AT inf.ethz.ch; ok dtucker@
2005-10-10fix regression I introduced in 4.2: X11 forwardings initiated afterDamien Miller
a session has exited (e.g. "(sleep 5; xterm) &") would not start. bz #1086 reported by t8m AT centrum.cz; ok markus@ dtucker@
2005-10-07change DSA default back to 1024, as it's defined for 1024 bits onlyMarkus Friedl
and this causes interop problems with other clients. moreover, in order to improve the security of DSA you need to change more components of DSA key generation (e.g. the internal SHA1 hash); ok deraadt
2005-10-03Relocate check_ip_options call to prevent logging of garbage for connectionsDarren Tucker
with IP options set. bz#1092 from David Leonard, "looks good" deraadt@
2005-09-30deploy .An -nosplit; ok jmcJared Yanovich
2005-09-21change label at markus@'s requestDamien Miller
2005-09-21aquire -> acquire, from stevesk@Damien Miller
2005-09-19spelling nit from stevesk@Damien Miller
2005-09-19update -D usage here too;Jason McIntyre
2005-09-19some more .Bk/.Ek to avoid ugly line split;Jason McIntyre
2005-09-19typoDamien Miller
2005-09-19stop connection abort on rekey with delayed compression enabled whenDamien Miller
post-auth privsep is disabled (e.g. when root is logged in); ok dtucker@
2005-09-19mention ability to specify bind_address for DynamicForward and -D options;Damien Miller
bz#1077 spotted by Haruyama Seigo
2005-09-13ensure that stdio fds are attached; ok deraadt@Damien Miller
2005-09-09typo; from mark at mcs.vuw.ac.nz, bug #1082Markus Friedl
2005-09-07enforce chanid != NULL; ok djmMarkus Friedl
2005-08-314.2Markus Friedl
2005-08-30destroy credentials if krb5_kuserok() call fails. Stops credentials beingDamien Miller
delegated to users who are not authorised for GSSAPIAuthentication when GSSAPIDeletegateCredentials=yes and another authentication mechanism succeeds; bz#1073 reported by paul.moore AT centrify.com, fix by simon AT sxw.org.uk, tested todd@ biorn@ jakob@; ok deraadt@
2005-08-08sftp prompt enhancements:Jared Yanovich
- in non-interactive mode, do not print an empty prompt at the end before finishing - print newline after EOF in editline mode - call el_end() in editline mode ok dtucker djm
2005-08-06Unbreak sshd ListenAddress for bare IPv6 addresses.Darren Tucker
Report from Janusz Mucka; ok djm@
2005-07-30listen_hosts initialisation here too; spotted greg AT y2005.nest.cxDamien Miller
2005-07-30fix -D listen_host initialisation, so it picks up gateway_ports settingDamien Miller
correctly
2005-07-28missing packet_init_compression(); from solarMarkus Friedl
2005-07-27Silence bogus -Wuninitialized warnings; ok djm@Darren Tucker
2005-07-25add a new compression method that delays compression until the userMarkus Friedl
has been authenticated successfully and set compression to 'delayed' for sshd. this breaks older openssh clients (< 3.5) if they insist on compression, so you have to re-enable compression in sshd_config. ok djm@
2005-07-19auth_usercheck(3) can return NULL, so check for that. Report fromOtto Moerbeek
mpech@. ok markus@
2005-07-17knf says that a 2nd level indent is four (not three or five) spacesDamien Miller
2005-07-17Fix a number of X11 forwarding channel leaks:Damien Miller
1. Refuse multiple X11 forwarding requests on the same session 2. Clean up all listeners after a single_connection X11 forward, not just the one that made the single connection 3. Destroy X11 listeners when the session owning them goes away testing and ok dtucker@
2005-07-16spacingDamien Miller
2005-07-14use __sentinel__ attribute; ok deraadt@ djm@ markus@Darren Tucker
2005-07-08new sentence, new line;Jason McIntyre
2005-07-08change BindAddress to match recent ssh -b change; prompted by markus@Darren Tucker
2005-07-08race when efd gets closed while there is still buffered data:Markus Friedl
change CHANNEL_EFD_OUTPUT_ACTIVE() 1) c->efd must always be valid AND 2a) no EOF has been seen OR 2b) there is buffered data report, initial fix and testing Chuck Cranor
2005-07-08Make comment match code; ok djm@Darren Tucker
2005-07-06clarify meaning of ssh -b ; with & ok jmc@Darren Tucker
2005-07-04don't forget to set x11_saved_displayMarkus Friedl
2005-07-04fix Xr and a little grammar;Jason McIntyre
2005-07-04implement support for X11 and agent forwarding over multiplex slaveDamien Miller
connections. Because of protocol limitations, the slave connections inherit the master's DISPLAY and SSH_AUTH_SOCK rather than distinctly forwarding their own. ok dtucker@ "put it in" deraadt@
2005-07-01don't free() if getaddrinfo() fails; report mpech@Markus Friedl