christos
4d0c78dab0
PR/36624: Edgar Fu: sshd should not check pw_{expire,change} if UsePam is
...
enabled. This is what the "portable" version of openssh does.
2007-07-10 15:48:56 +00:00
christos
a39c84a8c3
PR/36623: Edgar Fu: ssh publickey authentification fails if homedir not present
...
Removed extra realpath check that was introduced by a bogus merge.
2007-07-10 14:56:25 +00:00
christos
30638c77c3
PR/36562: Takeshi Nakayama: sshd(8) HostbasedAuthentication fails after
...
upgrading to 4.0_BETA
Remove $HOME test since this is also used by sshd.
2007-06-26 18:28:34 +00:00
christos
d1cb3ec527
remove unused variable.
2007-06-25 01:42:31 +00:00
christos
c6b86acffc
don't use __progname for the pam service name. Hard-code it to "sshd"
2007-06-24 23:48:30 +00:00
christos
5d1825b2a1
Use RESCUEDIR if set.
2007-05-17 00:17:50 +00:00
christos
2cf8149db2
resurect files that we need and make things compile again.
2007-03-10 23:05:24 +00:00
christos
06993fb381
resolve conflicts.
2007-03-10 22:52:04 +00:00
wiz
15b0193490
Refer to RFC 4716 in two more places (instead of "IETF SECSH").
...
From jmc@openbsd.
2007-01-23 22:21:54 +00:00
alc
a740eb5ac0
CID-4268: `c' is EOF here, remove deadcode
2006-12-26 00:06:03 +00:00
wiz
a0a9492dc8
Talk of RFC 4716 SSH public key format instead of SECSH public key format.
...
From markus@openbsd via jmc@openbsd (rev 1.73).
2006-12-24 10:06:03 +00:00
wiz
7ce75c98d8
Mention RFC 4716. From markus@openbsd via jmc@openbsd (rev. 1.266).
2006-12-24 10:04:08 +00:00
adrianp
1be366570b
From http://www.openssh.org/txt/release-4.5 : (CVE-2006-5794)
...
* Fix a bug in the sshd privilege separation monitor that weakened its
verification of successful authentication. This bug is not known to
be exploitable in the absence of additional vulnerabilities.
Bump __NETBSDSSH_VERSION
2006-11-14 21:52:09 +00:00
agc
05ad853be0
one more to catch up with the new location for sha2.h
2006-10-28 23:07:23 +00:00
adrianp
9480ff5303
Change the default sshd configuration file so that only protocol version 2
...
is enabled by default. Users can manually add back support for protocol
version 1 in their sshd_config if they have a specific need for it.
Suggested by perry@ and ghen@. Ok'ed security-officer@ and christos@
2006-10-15 14:01:53 +00:00
christos
ee4546d741
unbreak gcc-3 builds.
2006-10-04 14:31:55 +00:00
christos
a9fc92da63
PR/34681: Scott Ellis: Explicitly include <sys/socket.h>
2006-10-04 14:30:35 +00:00
christos
1eafb02344
put back ignorerootrhosts
2006-10-04 14:26:31 +00:00
cube
55269b80c3
Grab a couple of lines from OpenSSH-portable that allow PAM authentication
...
to succeed. I guess the default configuration of NetBSD wasn't tested
before the import...
2006-09-29 22:47:21 +00:00
he
f1afbc1ee7
Use PRIu64 instead of llu when printing an u_int64_t.
...
Fixes a build problem for our LP64 ports, where u_int64_t is
typically an unsigned long.
2006-09-29 14:36:34 +00:00
he
a4970f4ee7
The "success" field in Authctxt needs to be a sig_atomic_t, not an int,
...
so that we don't get a type conflict on dispatch_run() invocation. Found
while building for alpha and amd64.
2006-09-29 14:34:25 +00:00
christos
229f040cb9
We need this again.
2006-09-28 21:23:13 +00:00
christos
c5a8b87f73
Resolve conflicts
2006-09-28 21:22:14 +00:00
christos
49b7694919
from www.openssh.org
2006-09-28 21:14:57 +00:00
wiz
85f4c6eabf
Pull over OpenBSD v1.97, forwarded by jmc@openbsd:
...
avoid confusing wording in HashKnownHosts:
originally spotted by alan amesbury;
ok deraadt
2006-08-10 00:34:32 +00:00
ginsbach
a697e6653a
Adapt to new return value from socket(2) for an unsupported
...
protocol/address family.
2006-06-14 15:36:00 +00:00
christos
b943fcf792
XXX: GCC uninitialized variables
2006-05-14 02:17:32 +00:00
mrg
54e9f4ccbc
wait_until_can_do_something() wants u_int * for it's 4th argument.
2006-05-11 09:27:06 +00:00
mrg
965a873335
avoid lvalue casts.
2006-05-11 00:05:45 +00:00
mrg
084c052803
quell GCC 4.1 uninitialised variable warnings.
...
XXX: we should audit the tree for which old ones are no longer needed
after getting the older compilers out of the tree..
2006-05-10 21:53:14 +00:00
tsutsui
4cd8515cfc
Add a NetBSD RCS ID.
2006-04-15 13:43:11 +00:00
elad
504a2dd02c
Pull in from djm@OpenBSD:
...
remove IV support from the CRC attack detector, OpenSSH has never used
it - it only applied to IDEA-CFB, which we don't support.
Thanks to deraadt@OpenBSD for looking into this one.
2006-03-22 23:04:39 +00:00
christos
e13746b11b
Fix krb4 compilation (although krb4 is removed, this leaves the code compiling)
2006-03-21 00:01:29 +00:00
elad
dc4926056e
plug leak, coverity cid 2014.
2006-03-20 16:42:34 +00:00
elad
204152ace9
plug leak, coverity cid 2027.
2006-03-20 16:41:46 +00:00
elad
04b503af06
plug leaks, coverity cids 2030, 2031.
2006-03-20 16:40:25 +00:00
elad
3a008ccc30
plug leak, coverity cid 2019.
2006-03-20 16:39:05 +00:00
elad
9266948705
plug leaks, coverity cids 2012, 2013.
2006-03-20 16:36:31 +00:00
elad
14c3ee98a9
fix null deref, coverity cid 953.
2006-03-20 16:31:45 +00:00
elad
2ff3564ba8
fix memory leak, coverity cid 2032.
2006-03-19 16:48:36 +00:00
elad
0a2d3f7a19
fix memory leaks, coverity cid 2016.
2006-03-19 16:47:09 +00:00
elad
f6bc7e7627
fix memory leaks, coverity cids 2028, 2029.
2006-03-19 16:40:32 +00:00
elad
2741a951b4
fix fd leak, coverity cid 2015.
2006-03-19 16:33:26 +00:00
elad
be71d6bbfd
fix null deref, coverity cid 1341.
2006-03-19 16:29:43 +00:00
elad
8a41610291
fix null deref, coverity cid 1339.
2006-03-19 16:23:19 +00:00
elad
28788b89c7
fix null deref, coverity cid 1340.
2006-03-19 16:20:47 +00:00
elad
6c6e841e30
Don't dereference NULL pointer, found by Coverity, CID 954.
2006-03-18 21:09:57 +00:00
dan
ccd53bd92b
reform a loop to be prettier and appease coverity CID 2618
2006-03-18 10:41:24 +00:00
jnemeth
79787ff03b
Fix Coverity run 5, issue 2021 -- memory leak.
...
Approved by christos@.
2006-03-18 10:22:46 +00:00
is
2de2502171
Make sure the right error is reported later, if all socket() calls fail.
...
If we close the invalid sock, we'll report EBADF later in that case.
2006-03-01 15:39:00 +00:00