groo
5a374ad0ce
Import OpenSSL 0.9.7d to address:
...
1. Null-pointer assignment during SSL handshake
2. Out-of-bounds read affects Kerberos ciphersuites
2004-03-20 04:22:06 +00:00
groo
0684427439
Import OpenSSL 0.9.7d to address:
...
1. Null-pointer assignment during SSL handshake
2. Out-of-bounds read affects Kerberos ciphersuites
2004-03-20 04:22:04 +00:00
wiz
eec56f3b12
Bump date for previous.
2004-03-06 23:38:40 +00:00
itojun
da6bd485cd
add missing description of "EnableSshKeysign".
2004-03-06 14:33:08 +00:00
itojun
c6a556a5b6
endian mismatch. from iij seil team
2004-01-16 02:25:14 +00:00
itojun
3c3791b847
validate hash on info exchange. bugtraq <20040113213940.GA1727@hzeroseven.org>
2004-01-14 09:17:42 +00:00
dyoung
4758291178
Fix the checkflist for builds without Kerberos 4 (MKKERBEROS4=no)
...
and without Kerberos 4 & 5 (MKKERBEROS=no). Previously checkflist
complained of missing files.
* move kerberos- and kerberos 4-only files into new flists,
distrib/sets/lists/*/krb.*
* make the flist generators grok MKKERBEROS{,4} variables
* fix Makefiles which treat MKKERBEROS=no as MKKERBEROS5=no.
9 out of 10 experts agree that it is ludicrous to build w/
KERBEROS4 and w/o KERBEROS5.
* fix header files, also, which treat MKKERBEROS=no as MKKERBEROS5=no.
* omit some Kerberos-only subdirectories from the build as
MKKERBEROS{,4} indicate
(I acknowledge the sentiment that flists are the wrong way to go,
and that the makefiles should produce the metalog directly. That
sounds to me like the right way to go, but I am not prepared to do
revamp all the makefiles. While my approach is expedient, it fits
painlessly within the current build architecture until we are
delivered from flist purgatory, and it does not postpone our
delivery. Fair enough?)
2003-12-11 09:46:26 +00:00
itojun
2a85abd333
avoid memory leak. hint from Andrew Lunn
2003-11-23 08:33:13 +00:00
itojun
5451f8a14e
do not malloc(0). Andrew Lunn
2003-11-23 08:23:02 +00:00
jonathan
dedf78268d
Patch OpenSSL to use opencrypto (aka /dev/crypto), if configured and
...
(per kernel policy) for crypto transforms for which hardware
acceleration is available. Affects:
crypto/dist/openssl/crypto/engine/eng_all.c
crypto/dist/openssl/crypto/engine/hw_cryptodev.c
crypto/dist/openssl/crypto/evp/c_all.c
as posted to tech-crypto for review/comment on 2003-08-21.
2003-11-20 00:55:51 +00:00
wiz
4bbfee09ca
Various typo fixes from Jonathon Gray via jmc@openbsd.
2003-11-17 11:16:10 +00:00
itojun
6de72ce0f8
typo. minoura
2003-11-13 10:35:40 +00:00
yamt
1356e8977e
pfkey_dump_sadb: when it get an error using sysctl,
...
mimic an error msg from keysock so that caller can process it correctly.
PR/23122.
2003-11-09 15:37:24 +00:00
itojun
aec01dda91
sync w/ openssl 0.9.7c. shlib minor bump for libcrypto.
...
(ERR_release_err_state_table() added)
2003-11-04 23:54:26 +00:00
itojun
385718bc5c
more unifdef
2003-11-04 23:45:56 +00:00
itojun
6b4e6697c9
openssl 0.9.7c. security changes are already in place
2003-11-04 23:25:09 +00:00
itojun
746d6bb953
bring in kame rev 1.32. PR 23122
2003-11-04 04:30:38 +00:00
thorpej
1244cc6c62
Fix NULL vs 0 mixup.
2003-10-25 20:48:10 +00:00
itojun
f90a2e28b1
do not build "null ESP and no AUTH" proposal. (racoon 174) by Tom Lendacky
2003-10-23 07:23:50 +00:00
fvdl
6a6c3ca82f
Don't assign NULL as an integer.
2003-10-21 03:06:55 +00:00
fvdl
73d47a4f07
Don't return NULL as an integer.
2003-10-21 03:03:39 +00:00
thorpej
eb3570747f
Make sure HAVE_OPENSSL is undefined, to avoid depending on both
...
libcrypto and libdes. Patch by lha@, posted to tech-userlevel.
2003-10-09 04:31:17 +00:00
itojun
ac0a546d0d
realloc error check failure; Greg Troxel, sync w/kame
2003-10-03 21:53:32 +00:00
itojun
48b0bfaad0
support policy w/o selector.
2003-10-02 19:53:01 +00:00
itojun
3c068c5948
correct unsafe realloc().
2003-10-02 19:52:43 +00:00
itojun
b3cd345741
more fixes from 0.9.7c, from openbsd
2003-10-02 02:26:17 +00:00
itojun
ae91503b5d
from openbsd:
...
Correct some off-by-ones. They currently don't matter, but this
is for future safety and consistency.
OK krw@, markus@
2003-10-02 02:25:05 +00:00
christos
0a7cc0d7d1
Apply security fix: http://www.openssl.org/news/secadv_20030930.txt
...
Changelog from: http://cvs.openssl.org/chngview?cn=11471
2003-09-30 15:59:53 +00:00
mycroft
5749c53775
Fix what is obviously a bug: valloc() -> vmalloc(). Now racoon(8) doesn't core
...
dump all the time.
2003-09-25 01:00:32 +00:00
itojun
34439bf0c9
off-by-one. from openbsd
2003-09-22 22:12:05 +00:00
itojun
28c3d43114
typo. markus@openbsd
2003-09-18 12:42:33 +00:00
itojun
841f7944e5
protect against double free; #660 ; zardoz at users.sf.net
...
from openbsd
2003-09-18 08:16:40 +00:00
itojun
c2011dbc01
missing buffer_free(&encrypted); #662 ; zardoz at users.sf.net
...
from openbsd
2003-09-18 08:16:15 +00:00
christos
898af9fa6c
make sure we init nalloc.
2003-09-18 01:41:56 +00:00
christos
3171afa413
fix problem in previous patch
2003-09-18 01:35:07 +00:00
christos
d4d840dd36
More buffer size adjusted before allocation succeeded fixes. Bump to 20030917.
...
From FreeBSD (with an additional one from me).
2003-09-17 23:19:02 +00:00
christos
51b1a61a2d
dammit, don't apply patches blindly.
2003-09-16 23:18:24 +00:00
christos
08d244b791
bring more fixes from 3.7.1
2003-09-16 23:16:59 +00:00
lukem
5de000c8d7
crank __NETBSDSSH_VERSION for buffer.c fix
2003-09-16 17:39:32 +00:00
christos
325fccf53f
Do not record expanded size before attempting to reallocate the associated
...
memory. From OpenBSD, via FreeBSD.
2003-09-16 13:22:57 +00:00
itojun
249c9d88ea
use sysctl to dump SAs if possible (not really tested)
2003-09-12 08:44:34 +00:00
itojun
efbe374b9f
SKEY and BSDAUTH #ifdef mixup
2003-09-08 21:00:41 +00:00
itojun
f13cb0c7b2
bzero() 2nd arg mistake. found by openbsd guys. from kame
2003-09-04 00:12:56 +00:00
itojun
ca14877c77
reject rc5/idea/mdc2 commands if OPENSSL_NO_xx is specified
2003-08-27 21:05:02 +00:00
wiz
31fd31ccf7
Make getlastlogx have the pathname to the lastlogx database as first
...
argument, to be consistent with updlastlogx.
Approved by christos, reviewed by kleink.
[The lastlogxname function should not be used any longer.]
2003-08-26 16:48:32 +00:00
itojun
d9c46578d1
update racoon to 2003/8/26 version. mostly minor bugfixes.
2003-08-26 03:31:50 +00:00
itojun
2cfb643fda
KAME racoon, as of 2003/08/26
2003-08-26 03:27:01 +00:00
itojun
b5f8b9a7c0
KAME libipsec/libpfkey, 2003/08/26
2003-08-26 03:25:29 +00:00
itojun
eb24db53ab
style; total size of buf is (num + 3)
2003-08-13 01:29:41 +00:00
simonb
658a8c458e
Fix bad use of "sizeof(pointer)" where the length of a buffer was the
...
intention. Fixes problems with least ssh's known_hosts file and factor.
Patch from Berndt Josef Wulf's PR lib/22347.
2003-08-12 03:25:24 +00:00
agc
dc4f8c2e1a
Move UCB-licensed code from 4-clause to 3-clause licence.
...
Patches provided by Joel Baker in PR 22252, verified by myself.
2003-08-07 09:15:17 +00:00
itojun
5de5abdd3d
consistently use new DES API, re-enable des regression test
2003-07-31 08:53:58 +00:00
itojun
965395c9f3
re-enable __RCSID, sys/cdefs_elf.h rev 1.15 fixed the problem
2003-07-30 00:34:16 +00:00
itojun
f33c57af22
disable __RCSID for now, somehow it puts some of integer variables
...
into .text region
2003-07-29 23:17:39 +00:00
itojun
308bb7eb39
remove unused macro. PR 21150
2003-07-29 04:45:39 +00:00
itojun
4c43ef4ce1
xx_keylen has to return bits, not bytes. KAME-PR-488
2003-07-29 04:30:54 +00:00
jwise
3514116803
Apply patch from lha@, via OpenBSD portable SSH's revision 1.11 of this file:
...
mcc -> fcc; from Love Hörnquist Åstrand <lha@it.su.se>
otherwise the kerberos credentinal is stored in a memory cache
in the privileged sshd.
Presumably, this will also come in as part of a later OpenSSH release via
`cvs import', but this is worth having now.
2003-07-28 15:50:17 +00:00
cjep
c6912d0211
remove duplicate manual
2003-07-26 15:11:43 +00:00
itojun
08a1c4bcd3
empty commit, just to update timestamp and force rebuild of krb.h.
2003-07-26 01:07:35 +00:00
itojun
805c102737
fix compilation on sparc64. reported by Juergen Hannken-Illjes
2003-07-25 09:06:02 +00:00
itojun
e8876f361f
avoid "unsigned u_int32_t"
2003-07-25 02:02:43 +00:00
itojun
88ec7d3792
bring back krb4 support, just to suppress unwanted noise from other developers.
...
note that official openssh distribution have already dropped kerberosIV support,
therefore maintenance cost needs to be paid by us. and have no intent to help.
2003-07-24 15:31:52 +00:00
itojun
f4401cd869
upgrade openssl to 0.9.7b. (AES is now supported)
...
alter des.h to be friendly with openssl/des.h (you can include both in the
same file)
make libkrb to depend on libdes. bump major.
massage various portioin of heimdal to be friendly with openssl 0.9.7b.
2003-07-24 14:16:30 +00:00
itojun
2836295a36
OpenSSL 0.9.7b, major API changes included
2003-07-24 08:25:41 +00:00
itojun
0f3017142e
use snprintf (actually, "addr" can be supplied from outside, and if "addr"
...
points to shorter-than-24 buffer we will overrun buffer. bad API)
2003-07-24 04:41:13 +00:00
itojun
7b7c18c4c5
the block is just for krb4 (not for krb5) so should be removed. lha
2003-07-23 21:25:08 +00:00
itojun
c55f89ad19
typo on #if condition converesion
2003-07-23 21:03:03 +00:00
itojun
0091553542
define symbols even when !KRB4, to simplify shlib management. lha
2003-07-23 20:48:34 +00:00
itojun
8556dff80c
remove KRB4 and AFS support. sync w/ openssh main tree
2003-07-23 03:52:16 +00:00
itojun
a9503412ba
license clarification (UCB 3-clause, and progressmeter)
2003-07-23 03:51:27 +00:00
itojun
46471dc1e9
cast for signed/unsigned mixup
2003-07-14 18:27:48 +00:00
itojun
1bffbcd4a1
correct ^@ incorrectly committed
2003-07-14 18:26:05 +00:00
itojun
a157f97782
unifdef VMS/WIN16/WIN32 in public headers, at least
2003-07-14 14:06:14 +00:00
itojun
c187ba994b
use bounded string op (only one sprintf remains - still no clue)
2003-07-14 13:24:00 +00:00
itojun
a395b35ba2
delint
2003-07-14 13:07:05 +00:00
itojun
848c8ac0ef
use bounded string ops (especially libraries)
2003-07-14 13:05:19 +00:00
itojun
afdee9affa
__RCSID. add missing copyright in *.y and *.l (sync w/kame)
2003-07-12 09:37:09 +00:00
itojun
03eefe2ecf
sync w/ latest racoon
2003-07-12 09:02:24 +00:00
itojun
dc30725eaf
kame racoon 2003/7/12. lots of lots of stability fixes.
2003-07-12 08:45:39 +00:00
lukem
b1395375fd
add __RCSID("$NetBSD$"), because it's hard to track our changes in a
...
binary when we only have the vendor's RCSID.
2003-07-10 01:09:41 +00:00
wiz
fc3229a199
Undo unintended commit.
2003-07-04 21:57:16 +00:00
wiz
ee8924aa2e
Fix off-by-one. From William Allen Simpson in PR 22012.
2003-07-04 21:56:48 +00:00
wiz
f9cc3a858b
Bump date for recent changes.
2003-07-04 12:33:11 +00:00
wiz
de2728383c
Punctuation fixes.
2003-07-04 12:31:33 +00:00
wiz
d9fb607438
Quote punctuation so it gets marked up.
2003-06-30 11:52:01 +00:00
wiz
ed9861f855
Remove dot from middle of sentence.
2003-06-27 23:10:37 +00:00
wiz
554f6e9041
Quote question mark; punctuation fix; new sentence, new line.
2003-06-27 22:37:13 +00:00
wiz
a4fd08f60c
Quote question mark.
2003-06-27 22:35:48 +00:00
wiz
5e88ad0f63
Remove superfluous macro calls, add newline where missing, and
...
use \&[ (and similar) instead of \*(lB, since it works with both old and new groff.
2003-06-27 22:31:29 +00:00
wiz
bb64da9790
Drop trailing spaces; fix punctuation problems;
...
put Nd argument in double quotes since it contains more than 9 words; spell out month.
2003-06-27 14:46:55 +00:00
wiz
e6ecde23a1
Be consistent in how we call .rhosts authentication.
2003-06-27 09:14:56 +00:00
wiz
7e3682db3e
Sort sections; replace man macro with mdoc macro;
...
sort SEE ALSO; empty line -> .Pp.
2003-06-26 10:03:39 +00:00
aymeric
9bdcb47acd
add missing #ifdef __RCSID
...
(these files are compiled as host tools)
from Nicolas Ollinger, fixes PR#21892
2003-06-23 20:02:53 +00:00
itojun
1430af815a
discourage the use of aggressive mode
2003-06-16 08:40:11 +00:00
itojun
9d1e759d63
typo: get correct counters; introduced during rekeying change. (openbsd rev 1.26)
2003-05-26 07:57:38 +00:00
lha
49838f37b9
adapt to heimdal 0.6
2003-05-25 22:07:56 +00:00
itojun
3f62dc6d24
strlcpy
2003-05-17 18:19:20 +00:00
itojun
93851338f2
sscanf overrun
2003-05-17 01:12:28 +00:00
lha
b224fef26e
Fix up rcsid lossage
2003-05-15 21:36:30 +00:00
lha
f80f84e684
no longer used
2003-05-15 20:56:45 +00:00
lha
28d69ea823
merge in heimdal 0.6
2003-05-15 20:44:06 +00:00
lha
245a590853
import of heimdal 0.6
2003-05-15 20:28:38 +00:00
itojun
dec326ca84
64bit issue; reported by Havard Eidnes and Juergen Hannken-Illjes, sync w/
...
openssh master tree
2003-05-15 14:10:24 +00:00
itojun
56d0ea03cf
>implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
...
>server interops with commercial client; ok jakob@ djm@
markus@openbsd
2003-05-14 18:22:07 +00:00
itojun
d6fa2807d4
markus@openbsd, for PR 20550
...
>change key_load_public to try to read a public from:
>rsa1 private or rsa1 public and ssh2 keys.
>this makes ssh-keygen -e fail for ssh1 keys more gracefully
>for example; report from itojun (netbsd pr 20550).
2003-05-14 18:17:02 +00:00
itojun
5e9a67bb93
OpenSSH 3.6.1 as of 20030514 - krb5 over ssh2
2003-05-14 18:12:50 +00:00
wiz
d75f1336b3
Uppercase URL.
2003-05-14 14:30:59 +00:00
wiz
5b3e029874
setup -> set up.
2003-05-14 13:10:57 +00:00
wiz
bb2f5dbc31
setup -> set up.
2003-05-14 12:06:11 +00:00
itojun
0230a54dfb
plug memory leak. jgraessley at apple.com
2003-05-09 05:32:36 +00:00
itojun
a59c37eb75
parse EOS before performing #include. Joshua Graessley of apple (via kame)
2003-05-08 07:58:54 +00:00
wiz
c42e1fac66
Management, not managment. Mostly from jmc@openbsd.
2003-04-26 22:07:12 +00:00
itojun
5116f9caae
fix "round up to 8" code. from kame
2003-04-24 02:22:26 +00:00
itojun
bf3ca3dcee
do not assume 32bit (%d fits into 12 chars); sumikawa@freebsd
2003-04-17 07:37:05 +00:00
wiz
3fd1d09240
Fix typo, and break overly long line.
2003-04-16 13:10:40 +00:00
itojun
670e872d62
10 char is not sufficient here. sync w/ kame
2003-04-15 07:31:23 +00:00
itojun
5a6a4446f8
avoid hardcoded SOCK_xx; with markus; should allow ssh over SCTP
2003-04-14 14:36:47 +00:00
itojun
6605cddb45
new copyright notice (w/ TNF copyright). thanks millert
2003-04-08 01:19:08 +00:00
wiz
07d13217f3
Some e.g. cleanup: replace "eg" with "e.g.,". From Igor Sobrado in PR 19692.
2003-04-07 06:56:38 +00:00
wiz
2b75215a67
IPsec, not IPSEC. From Igor Sobrado in PR 19691.
2003-04-06 20:24:35 +00:00
itojun
fcb31fad16
sync w/ 3.6.1 (remove files that are removed on openssh repo)
2003-04-03 06:33:42 +00:00
itojun
e7e7c84a6a
sync w/ 3.6.1
2003-04-03 06:21:31 +00:00
itojun
f9930e137b
OpenSSH 3.6.1 as of 2003/4/3
...
* The 'kex guesses' bugfix from OpenSSH 3.6 triggers a bug
in a few other SSH v2 implementations and causes connections to
stall. OpenSSH 3.6.1 disables this bugfix when interoperating
with these implementations.
* RSA blinding is now used by ssh(1), sshd(8) and ssh-agent(1).
in order to avoid potential timing attacks against the RSA keys.
Older versions of OpenSSH have been using RSA blinding in
ssh-keysign(1) only.
* ssh-agent(1) optionally requires user confirmation if a key gets
used, see '-c' in ssh-add(1).
* sshd(8) now handles PermitRootLogin correctly when UsePrivilegeSeparation
is enabled.
* sshd(8) now removes X11 cookies when a session gets closed.
* ssh-keysign(8) is disabled by default and only enabled if the
new EnableSSHKeysign option is set in the global ssh_config(5)
file.
* ssh(1) and sshd(8) now handle 'kex guesses' correctly (key exchange
guesses).
* ssh(1) no longer overwrites SIG_IGN. This matches behaviour from
rsh(1) and is used by backup tools.
* setting ProxyCommand to 'none' disables the proxy feature, see
ssh_config(5).
* scp(1) supports add -1 and -2.
* scp(1) supports bandwidth limiting.
* sftp(1) displays a progressmeter.
* sftp(1) has improved error handling for scripting.
2003-04-03 05:57:11 +00:00
mycroft
6012957147
Don't build crypt() on NetBSD either.
2003-04-02 20:28:00 +00:00
perry
0ac531f887
beeing->being from Igor Sobrado, PR misc/19814
2003-03-31 18:54:15 +00:00
perry
0fe9c931b1
authenication->authentication, Instititute->Institute
...
from Igor Sobrado, PR misc/19814
2003-03-31 18:52:13 +00:00
perry
5ffdabb8bc
kefile->keyfile (Igor Sobrado, PR misc/19909)
2003-03-31 16:54:47 +00:00
wiz
6653459566
principal, not pricipal.
2003-03-31 09:34:09 +00:00
perry
7287c6007d
crential->credential princial->principal (Igor Sobrado, PR misc/19700)
2003-03-31 02:30:50 +00:00
perry
9ef7047603
spelling fixes, one from PR misc/20753 (Igor Sobrado) + others
2003-03-31 00:04:03 +00:00
perry
3ba55178f8
encype->enctype, from PR misc/20754 by Igor Sobrado
2003-03-30 23:57:54 +00:00
wiz
0acfa3bb9e
Consistently spell occurrence with two rs.
2003-03-29 22:48:37 +00:00
lukem
d544e20194
Support populating the environment from login.conf(5)'s "setenv"
...
capability, using a variation of setuserenv() from login_cap.c.
From Jim Bernard <jbernard@mines.edu>.
2003-03-26 11:16:13 +00:00
lukem
fe8a628004
Add missing
...
hp = strtok(NULL, ",");
to end of while loop which parses "host.allow" from login.conf(5).
Otherwise, sshd(8) would just infinite loop unless there was a
(positive or negative) match in the first word of the "host.allow" list...
2003-03-24 18:31:39 +00:00
lukem
829c77a0ca
* Add log messages for password or account expiry; it makes it much easier
...
to debug (on the server) why a login failed with this information.
* If _PASSWORD_CHGNOW is defined (it's -1 in NetBSD), check that pw_change
is not set to that before testing if the password has expired.
Still prevent the login, but log a different failure message in this case.
XXX: we need to decide if we let interactive logins occur in this case,
but force a password change, a la login(1).
2003-03-24 18:25:21 +00:00
lha
6e22da944c
Fix Kerberos 4 procotocol problem mentioned in
...
[MIT krb5 Security Advisory 2003-004]/[heimdal-0.5.2 release notes]
by disable support for it.
2003-03-20 19:20:59 +00:00
itojun
359e4b88f5
OpenSSL Security Advisory [19 March 2003]
...
Klima-Pokorny-Rosa attack on RSA in SSL/TLS
2003-03-19 23:06:33 +00:00
itojun
9e2d007f93
enable RSA blinding by defualt. from bugtraq posting <3E758B85.6090300@algroup.co.uk>
2003-03-17 14:33:50 +00:00
wiz
990562bfef
.Nm does not need a dummy argument ("") before punctuation or
...
for correct formatting of the SYNOPSIS any longer.
2003-02-25 10:34:36 +00:00
wiz
658b9c6d28
In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
...
via timing by performing a MAC computation even if incorrect
block cipher padding has been found. This is a countermeasure
against active attacks where the attacker has to distinguish
between bad padding and a MAC verification error. (CAN-2003-0078)
2003-02-20 07:39:17 +00:00
perry
8a49ec08e4
"Utilize" has exactly the same meaning as "use," but it is more
...
difficult to read and understand. Most manuals of English style
therefore say that you should use "use".
2003-02-04 23:07:28 +00:00
wiz
86932ac56e
allocate, not alocate. Noted by mjl, not mjll.
2003-01-28 22:26:33 +00:00
elric
bcc72a236b
The last change I made was a little aggressive in changing the paths of
...
the includes and broke cross builds from non-NetBSD arches. In this I
revert the problem section. (pointed out by uwe.)
2003-01-27 06:19:40 +00:00
elric
0e936e5ed7
Fix password return values.
...
Addresses PR: lib/20074
2003-01-27 03:33:36 +00:00
elric
3e20adf4a8
Prepend krb5/ to include paths that live in /usr/include/krb5/ so that
...
we can deprecate the requirement of -I/usr/include/krb5 when building
kerberos apps.
2003-01-26 22:06:39 +00:00
elric
e218521496
Forgot one include file from the last change.
2003-01-26 21:59:49 +00:00
elric
ebf72d8cce
Update script to modify include file paths to start the process of
...
deprecating the need to -I/usr/include/krb5.
2003-01-26 20:51:58 +00:00
jschauma
5832481e3d
posesses -> possesses
...
Noted by Igor Sobrado in PR misc/19641
2003-01-03 04:20:09 +00:00
wiz
addd3c9aaa
Use standard section headers.
2003-01-02 13:00:49 +00:00
wiz
a04a0d4f28
Use standard section headers; sort sections.
2003-01-02 13:00:16 +00:00
wiz
cbe71a4b1a
Use standard section headers; space before punctuation in macro arguments.
2003-01-02 12:59:59 +00:00
wiz
1b6cc917f0
Use standard section headers.
2003-01-02 12:59:31 +00:00
wiz
0f34826bec
Sort sections.
2003-01-02 12:58:56 +00:00
wiz
a366ee7021
Fix Xref section, use standard section headers.
2003-01-02 12:57:31 +00:00
wiz
65e190048a
Add RCS Id.
2003-01-02 12:57:03 +00:00
jschauma
432d470724
Fix typos pointed out by Igor Sobrado in PR misc/19621.
2003-01-02 00:22:29 +00:00
jschauma
ec3682baa1
interal -> internal
...
equvalent -> equivalent
Pointed out by Igor Sobrado in PR misc/19629
2003-01-01 22:06:27 +00:00
kristerw
50526e4837
It is not valid C++ to have a semicolon after
...
extern "C" {}
so remove it from __END_DECLS.
Noted by Andrew Pinski.
2002-12-31 02:13:20 +00:00
wiz
4027f3ad48
compatibility, not compatability; from Adrian Mrva.
2002-12-21 13:22:20 +00:00
wiz
7023f7abe2
described, not decribed.
2002-12-21 13:21:38 +00:00
wiz
d83bca180e
Two typos from Adrian Mrva.
2002-12-21 13:20:09 +00:00
wiz
1b706e9293
charcted probably means character.
2002-12-21 13:17:23 +00:00
wiz
c511c34d7c
securely, not securly. From Adrian Mrva.
2002-12-21 13:16:09 +00:00
wiz
8f9e9a2299
Correct misspellings of authentication and available. From Adrian Mrva.
2002-12-21 12:22:12 +00:00
wiz
5e3e5e1ae9
ther -> their, from Adrian Mrva.
2002-12-21 12:19:33 +00:00
thorpej
b33be07056
Avoid conflict with reserved identifier "log".
2002-12-06 03:39:06 +00:00
thorpej
5da0736e3a
Avoid strict alias warning.
2002-12-06 01:27:10 +00:00
elric
512a461832
Change all functions that call gssapi_krb5_init() to call one of
...
two macros GSSAPI_KRB5_INIT() or GSSAPI_KRB5_INIT_MS() which call
the former, check its return code and bail on error.
Addresses PR lib/19191
Given a quick look by joda@.
2002-11-28 11:21:16 +00:00
darrenr
8084625896
racoon.conf can be found in /etc/racoon, not /etc
2002-11-27 09:51:50 +00:00
itojun
a426f44395
sync w/ kame source from 2002/11/20.
...
- plug some memory leaks
- correct phase 2 proposal reqid handling
- check for fd_set overrun
2002-11-20 03:35:57 +00:00
itojun
7285409e64
KAME racoon as of 2002/11/20
2002-11-20 03:30:18 +00:00
itojun
314a4f35b5
correct panic() condition - it was backwards. remove kame-local diff
...
which was committed by mistake.
From: Rafal Boni <rafal@attbi.com>
2002-11-18 23:36:18 +00:00
joda
bc13d2aefa
don't blindly trust rlen; from Heimdal 0.5.1
2002-10-21 19:39:51 +00:00
provos
32b88027c7
use readlink with bufsize - 1; approved thorpej.
2002-10-19 20:33:17 +00:00
itojun
df884fac23
revert previous. need more time to think.
2002-10-18 23:51:07 +00:00
itojun
8201174690
condition to panic() was backwards. sync w/kame
...
From: Rafal Boni <rafal@attbi.com>
2002-10-18 23:44:58 +00:00
itojun
4752a4465b
discourage the use of aggressive mode for identity disclosure.
2002-10-18 14:34:04 +00:00
manu
a2e26d6e11
back out the previous change. We really don't want to enable login on a
...
mode 666 tty.
In order to use sshd logins with a read-only /dev, the administrator has to
make the tty mode 600 root/wheel before the partition gets read-only.
2002-10-15 15:33:04 +00:00
manu
9dc3c4ee08
Re-allow connection when /dev is read-only, and the tty is owned by the
...
user or owned by root.
2002-10-15 15:19:02 +00:00
itojun
173446ddd0
use cast to unsigned long long, instead of PRIu64
...
(to make it easier to move the change back to main openssh distribution)
2002-10-04 02:22:05 +00:00
petrov
31b9b01a31
use PRIu64 for u_int64_t.
2002-10-03 07:41:10 +00:00
elric
f07ce00ec5
Turn on strict alignment #define's, because racoon reliably core
...
dumps on machines which require strict alignment such as sparc64.
2002-10-02 17:53:11 +00:00
itojun
ef7d24574a
upgrade to openssh 3.5. major changes include:
...
- krb4/5 support for privsep (krb5 diff was already applied)
includes fake implementaation of getpeereid() from openssh-portable, which
does nothing useful - need improvement.
2002-10-01 14:07:26 +00:00
itojun
604e45f4cd
OpenSSH 3.5 as of Oct 1, 2002
2002-10-01 13:39:55 +00:00
elric
75bc91b4e4
Changed documentation of the default setting for PermitRootLogin
...
to ``no'', to match our actual default setting.
Addresses PR: bin/18445
2002-09-28 15:07:33 +00:00
itojun
5431e7941f
tweak the example $HOME/.ssh/rc script to not show on any cmdline the
...
sensitive data it handles. This fixes bug # 402 as reported by
kolya@mit.edu (Nickolai Zeldovich).
2002-09-25 03:43:19 +00:00
mycroft
1268ff2729
select() -> poll()
2002-09-20 22:16:02 +00:00
mycroft
c83fcd876c
select() -> poll()
2002-09-20 22:05:59 +00:00
mycroft
016f903642
select() -> poll()
2002-09-20 21:48:58 +00:00
mycroft
ee48615074
select() -> poll()
2002-09-20 21:34:31 +00:00
joda
ee1dfded94
change unconfigured error code back to ENXIO
2002-09-19 19:48:33 +00:00
joda
7417b5942f
de-__P and comment out all parameter names
2002-09-19 19:22:53 +00:00
itojun
17e856961c
don't quit while creating X11 listening socket.
...
address (first) problem described in
http://mail-index.netbsd.org/current-users/2002/09/16/0005.html
2002-09-17 06:26:18 +00:00
thorpej
f603ddfaad
__RCSID is not a portable macro to be using in a host tool (which
...
these files are). As a short-term work-around, only use it if it
is defined. A better solution will be worked out with the Heimdal
folks later.
Fixes building these host tools on Solaris 8.
2002-09-13 19:09:00 +00:00
joda
72be5e0769
invert detach flag to match previous NetBSD behaviour
2002-09-12 17:16:38 +00:00
joda
cae4f88ee0
kill some warnings
2002-09-12 15:35:02 +00:00
joda
2c3a59b23a
krb5_socklen_t and krb5_ssize_t should not go here
2002-09-12 14:52:33 +00:00
joda
91f0927074
make this actually do something
2002-09-12 14:12:18 +00:00
joda
58cc4c1950
alias dns functions so we don't have to bump major
2002-09-12 14:10:25 +00:00
joda
da086653ff
resolve import conflicts
2002-09-12 13:18:49 +00:00
joda
0444766465
import heimdal 0.5
2002-09-12 12:41:31 +00:00
joda
5146dc79e7
import helper
2002-09-12 12:35:03 +00:00
joda
3cc6c8c775
resolve import conflicts
2002-09-12 12:33:10 +00:00
joda
cfa4cd31bb
import krb4 1.2
2002-09-12 12:22:01 +00:00
itojun
32e004f92a
kerberos support w/ privsep. confirmed to work by lha@stacken.kth.se
2002-09-09 06:45:17 +00:00
itojun
42ebaa698b
don't touch free'ed memory. From: wang.zhong3@zte.com.cn, sync w/kame
2002-09-03 14:38:13 +00:00
itojun
2b9b8f5bd3
reduce #ifdef related to OPENSSLDIR - we want it be static
2002-09-01 11:38:34 +00:00
itojun
50d422c24f
e_os.h is not part of exported openssl interface, so don't install it into
...
/usr/include/openssl (e_os.h has an explicit comment about it). it obviously
is a bug in openssl 0.9.6 Makefile.
based on openssl 0.9.7 snapshot.
2002-08-31 10:46:36 +00:00
itojun
e1754c22c2
if () statement error. From: Krister Walfridsson <cato@df.lth.se>
...
(not compiled) sync w/kame
2002-08-31 07:56:14 +00:00
itojun
7049b3bdab
blank commit to force rebuild of krb.h
2002-08-29 14:34:11 +00:00
itojun
f613969b8a
somehow main trunk was not in sync with 0.9.6f for this file. noted by havard.
2002-08-28 23:10:30 +00:00
itojun
bcb0cf6929
tighten isakmp header length validation. from kame
2002-08-28 04:44:04 +00:00
wiz
b57bfa3f73
Drop superfluous Ns, sort sections.
2002-08-20 16:05:46 +00:00
wiz
4f40f42275
Remove superfluous Ns, drop trailing whitespace, fix a Xr, don't let lines
...
get longer than 80 characters.
2002-08-20 16:04:13 +00:00
wiz
2610a5c4d8
Remove superfluous Ns; while here, remove trailing whitespace and fix a
...
punctuation problem.
2002-08-20 15:59:37 +00:00
wiz
158398c921
Fix Ns abuse.
2002-08-20 15:32:12 +00:00
wiz
9bf08abfd4
Remove some unnecessary .Ns and trailing whitespace.
2002-08-20 15:24:38 +00:00
itojun
a6315c15ad
utmpx.ut_id is required.
...
PR 17998 with slight modification (deal with ttyname shorter than 4)
2002-08-20 07:42:53 +00:00
itojun
1146a80999
more NO_xx cleanup. can't catch these by openssl-unifdef.pl
2002-08-17 21:41:59 +00:00
itojun
08597903ce
sync with 0.9.6g
2002-08-09 15:58:46 +00:00
itojun
5eb341dcb6
openssl 0.9.6g, build framework fixes
2002-08-09 15:45:08 +00:00
itojun
182c0b6e08
sync with 0.9.6f. prevents DoS attack and regen of manpages.
2002-08-08 23:47:34 +00:00
itojun
f5e63fe4c2
openssl 0.9.6f, with security fixes
2002-08-08 23:14:54 +00:00
itojun
7bab20a582
bitmask operation audit (s/&&/&/). from openbsd
2002-08-08 15:12:09 +00:00
itojun
e8859ea868
remove files mistakenly shipped with openssl 0.9.6e.
...
(it won't affect the build)
2002-08-05 11:21:29 +00:00
itojun
85c4496982
http://marc.theaimsgroup.com/?l=openssl-cvs&m=102831422608153&w=2
...
*) Fix ASN1 checks. Check for overflow by comparing with LONG_MAX
and get fix the header length calculation.
[Florian Weimer <Weimer@CERT.Uni-Stuttgart.DE>,
Alon Kantor <alonk@checkpoint.com> (and others),
Steve Henson]
(critical)
2002-08-03 12:56:23 +00:00
itojun
e7f66af2b2
fix incorrect overrun check.
...
http://marc.theaimsgroup.com/?l=openssl-cvs&m=102831516309127&w=2
(thank todd!)
2002-08-02 23:09:03 +00:00
itojun
d103e0b575
plug memory leak. from ebisawa@iij. sync w/kame
2002-07-31 07:01:26 +00:00
itojun
ef920a0913
sync with 0.9.6e.
2002-07-31 01:29:37 +00:00
itojun
25e766824a
OpenSSL 0.9.6e. includes major security fixes (already applied)
2002-07-30 23:57:34 +00:00
itojun
e9316c8858
apply patch supplied with OpenSSL Security Advisory [30 July 2002]
...
advisory 1: four potentially remotely-exploitable vulnerability in
SSL2/SSL3 code
advisory 2: ASN1 parser vulnerability (all SSL/TLS apps affected)
2002-07-30 12:55:08 +00:00
christos
3fd219f644
add utmpx support.
2002-07-28 23:43:33 +00:00
grant
6742cb1812
sweep of errx/warnx, remove unnecessary trailing \n
2002-07-20 08:36:17 +00:00
itojun
24ef72afbf
print connect failure on debugging mode. sync w/openbsd
2002-07-12 13:28:36 +00:00
wiz
4b20971f01
Spell acquire with a 'c'.
2002-07-10 23:16:32 +00:00
itojun
bdfa549223
bark if all connection attemp fails. sync w/openbsd
2002-07-10 10:28:00 +00:00
itojun
92b7524e7d
silently connect(2) to next address. sync w/openbsd
2002-07-09 12:04:10 +00:00
itojun
a2a47b15ce
don't warn even if reverse lookup fails. sync w/openbsd
2002-07-09 12:03:54 +00:00
itojun
9a2478a3b0
/var/empty -> /var/chroot/sshd. PR 17519
2002-07-08 14:39:53 +00:00
itojun
968294e218
>make ssh-keysign read /etc/ssh/ssh_config
...
>and exit if HostbasedAuthentication is disabled globally. based on discussions
>with deraadt, itojun and sommerfeld; ok itojun@
sync w/openbsd
2002-07-03 14:23:13 +00:00
itojun
92ea28e291
>for compression=yes, we fallback to no-compression if the server does
...
>not support compression, vice versa for compression=no. ok mouring@
sync w/openbsd
2002-07-03 10:07:48 +00:00
itojun
673c1a7ac1
>use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
...
>in order to avoid a possible Kocher timing attack pointed out by Charles
>Hannum; ok provos@
2002-07-03 10:06:39 +00:00
itojun
c28e7ac1f6
correct signed/unsigned mixup; openbsd
2002-07-03 10:05:58 +00:00
itojun
8d3378688a
pednatic check on command line args. correct signed/unsigned mixup.
...
sync w/ openbsd
2002-07-01 06:17:11 +00:00
itojun
84559971ee
make use of xfree() consistent. from openbsd
2002-07-01 05:56:45 +00:00
itojun
11792b93b1
don't use freed memory. sync w/openbsd
2002-07-01 05:54:03 +00:00
itojun
5bdd56b128
sync with 3.4
2002-06-26 14:08:29 +00:00
itojun
b8f8e01057
OpenSSH 3.4 around 2002/6/26.
...
most significant change:
>make sure # of response matches # of queries, fixes int overflow; from ISS
as we have already enabled privsep by default, we should have been safe.
2002-06-26 14:02:54 +00:00
itojun
603dca2ed2
sync whitespace w/ openbsd tree
2002-06-24 15:47:25 +00:00
itojun
bc7b65a647
don't lose information while we cast
2002-06-24 15:46:34 +00:00