Commit Graph

546 Commits

Author SHA1 Message Date
itojun 9d1e759d63 typo: get correct counters; introduced during rekeying change. (openbsd rev 1.26) 2003-05-26 07:57:38 +00:00
lha 49838f37b9 adapt to heimdal 0.6 2003-05-25 22:07:56 +00:00
itojun 3f62dc6d24 strlcpy 2003-05-17 18:19:20 +00:00
itojun 93851338f2 sscanf overrun 2003-05-17 01:12:28 +00:00
lha b224fef26e Fix up rcsid lossage 2003-05-15 21:36:30 +00:00
lha f80f84e684 no longer used 2003-05-15 20:56:45 +00:00
lha 28d69ea823 merge in heimdal 0.6 2003-05-15 20:44:06 +00:00
lha 245a590853 import of heimdal 0.6 2003-05-15 20:28:38 +00:00
itojun dec326ca84 64bit issue; reported by Havard Eidnes and Juergen Hannken-Illjes, sync w/
openssh master tree
2003-05-15 14:10:24 +00:00
itojun 56d0ea03cf >implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
>server interops with commercial client; ok jakob@ djm@

markus@openbsd
2003-05-14 18:22:07 +00:00
itojun d6fa2807d4 markus@openbsd, for PR 20550
>change key_load_public to try to read a public from:
>rsa1 private or rsa1 public and ssh2 keys.
>this makes ssh-keygen -e fail for ssh1 keys more gracefully
>for example; report from itojun (netbsd pr 20550).
2003-05-14 18:17:02 +00:00
itojun 5e9a67bb93 OpenSSH 3.6.1 as of 20030514 - krb5 over ssh2 2003-05-14 18:12:50 +00:00
wiz d75f1336b3 Uppercase URL. 2003-05-14 14:30:59 +00:00
wiz 5b3e029874 setup -> set up. 2003-05-14 13:10:57 +00:00
wiz bb2f5dbc31 setup -> set up. 2003-05-14 12:06:11 +00:00
itojun 0230a54dfb plug memory leak. jgraessley at apple.com 2003-05-09 05:32:36 +00:00
itojun a59c37eb75 parse EOS before performing #include. Joshua Graessley of apple (via kame) 2003-05-08 07:58:54 +00:00
wiz c42e1fac66 Management, not managment. Mostly from jmc@openbsd. 2003-04-26 22:07:12 +00:00
itojun 5116f9caae fix "round up to 8" code. from kame 2003-04-24 02:22:26 +00:00
itojun bf3ca3dcee do not assume 32bit (%d fits into 12 chars); sumikawa@freebsd 2003-04-17 07:37:05 +00:00
wiz 3fd1d09240 Fix typo, and break overly long line. 2003-04-16 13:10:40 +00:00
itojun 670e872d62 10 char is not sufficient here. sync w/ kame 2003-04-15 07:31:23 +00:00
itojun 5a6a4446f8 avoid hardcoded SOCK_xx; with markus; should allow ssh over SCTP 2003-04-14 14:36:47 +00:00
itojun 6605cddb45 new copyright notice (w/ TNF copyright). thanks millert 2003-04-08 01:19:08 +00:00
wiz 07d13217f3 Some e.g. cleanup: replace "eg" with "e.g.,". From Igor Sobrado in PR 19692. 2003-04-07 06:56:38 +00:00
wiz 2b75215a67 IPsec, not IPSEC. From Igor Sobrado in PR 19691. 2003-04-06 20:24:35 +00:00
itojun fcb31fad16 sync w/ 3.6.1 (remove files that are removed on openssh repo) 2003-04-03 06:33:42 +00:00
itojun e7e7c84a6a sync w/ 3.6.1 2003-04-03 06:21:31 +00:00
itojun f9930e137b OpenSSH 3.6.1 as of 2003/4/3
* The 'kex guesses' bugfix from OpenSSH 3.6 triggers a bug
  in a few other SSH v2 implementations and causes connections to
  stall.  OpenSSH 3.6.1 disables this bugfix when interoperating
  with these implementations.
* RSA blinding is now used by ssh(1), sshd(8) and ssh-agent(1).
  in order to avoid potential timing attacks against the RSA keys.
  Older versions of OpenSSH have been using RSA blinding in
  ssh-keysign(1) only.
* ssh-agent(1) optionally requires user confirmation if a key gets
  used, see '-c' in ssh-add(1).
* sshd(8) now handles PermitRootLogin correctly when UsePrivilegeSeparation
  is enabled.
* sshd(8) now removes X11 cookies when a session gets closed.
* ssh-keysign(8) is disabled by default and only enabled if the
  new EnableSSHKeysign option is set in the global ssh_config(5)
  file.
* ssh(1) and sshd(8) now handle 'kex guesses' correctly (key exchange
  guesses).
* ssh(1) no longer overwrites SIG_IGN.  This matches behaviour from
  rsh(1) and is used by backup tools.
* setting ProxyCommand to 'none' disables the proxy feature, see
  ssh_config(5).
* scp(1) supports add -1 and -2.
* scp(1) supports bandwidth limiting.
* sftp(1) displays a progressmeter.
* sftp(1) has improved error handling for scripting.
2003-04-03 05:57:11 +00:00
mycroft 6012957147 Don't build crypt() on NetBSD either. 2003-04-02 20:28:00 +00:00
perry 0ac531f887 beeing->being from Igor Sobrado, PR misc/19814 2003-03-31 18:54:15 +00:00
perry 0fe9c931b1 authenication->authentication, Instititute->Institute
from Igor Sobrado, PR misc/19814
2003-03-31 18:52:13 +00:00
perry 5ffdabb8bc kefile->keyfile (Igor Sobrado, PR misc/19909) 2003-03-31 16:54:47 +00:00
wiz 6653459566 principal, not pricipal. 2003-03-31 09:34:09 +00:00
perry 7287c6007d crential->credential princial->principal (Igor Sobrado, PR misc/19700) 2003-03-31 02:30:50 +00:00
perry 9ef7047603 spelling fixes, one from PR misc/20753 (Igor Sobrado) + others 2003-03-31 00:04:03 +00:00
perry 3ba55178f8 encype->enctype, from PR misc/20754 by Igor Sobrado 2003-03-30 23:57:54 +00:00
wiz 0acfa3bb9e Consistently spell occurrence with two rs. 2003-03-29 22:48:37 +00:00
lukem d544e20194 Support populating the environment from login.conf(5)'s "setenv"
capability, using a variation of setuserenv() from login_cap.c.
From Jim Bernard <jbernard@mines.edu>.
2003-03-26 11:16:13 +00:00
lukem fe8a628004 Add missing
hp = strtok(NULL, ",");
to end of while loop which parses "host.allow" from login.conf(5).
Otherwise, sshd(8) would just infinite loop unless there was a
(positive or negative) match in the first word of the "host.allow" list...
2003-03-24 18:31:39 +00:00
lukem 829c77a0ca * Add log messages for password or account expiry; it makes it much easier
to debug (on the server) why a login failed with this information.

* If _PASSWORD_CHGNOW is defined (it's -1 in NetBSD), check that pw_change
  is not set to that before testing if the password has expired.
  Still prevent the login, but log a different failure message in this case.
  XXX:	we need to decide if we let interactive logins occur in this case,
	but force a password change, a la login(1).
2003-03-24 18:25:21 +00:00
lha 6e22da944c Fix Kerberos 4 procotocol problem mentioned in
[MIT krb5 Security Advisory 2003-004]/[heimdal-0.5.2 release notes]
by disable support for it.
2003-03-20 19:20:59 +00:00
itojun 359e4b88f5 OpenSSL Security Advisory [19 March 2003]
Klima-Pokorny-Rosa attack on RSA in SSL/TLS
2003-03-19 23:06:33 +00:00
itojun 9e2d007f93 enable RSA blinding by defualt. from bugtraq posting <3E758B85.6090300@algroup.co.uk> 2003-03-17 14:33:50 +00:00
wiz 990562bfef .Nm does not need a dummy argument ("") before punctuation or
for correct formatting of the SYNOPSIS any longer.
2003-02-25 10:34:36 +00:00
wiz 658b9c6d28 In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
via timing by performing a MAC computation even if incorrect
block cipher padding has been found.  This is a countermeasure
against active attacks where the attacker has to distinguish
between bad padding and a MAC verification error. (CAN-2003-0078)
2003-02-20 07:39:17 +00:00
perry 8a49ec08e4 "Utilize" has exactly the same meaning as "use," but it is more
difficult to read and understand. Most manuals of English style
therefore say that you should use "use".
2003-02-04 23:07:28 +00:00
wiz 86932ac56e allocate, not alocate. Noted by mjl, not mjll. 2003-01-28 22:26:33 +00:00
elric bcc72a236b The last change I made was a little aggressive in changing the paths of
the includes and broke cross builds from non-NetBSD arches.  In this I
revert the problem section.  (pointed out by uwe.)
2003-01-27 06:19:40 +00:00
elric 0e936e5ed7 Fix password return values.
Addresses PR: lib/20074
2003-01-27 03:33:36 +00:00