Commit Graph

860 Commits

Author SHA1 Message Date
kleink ac37001e7f As observed in other modules, pull in <sys/queue.h> explicitly rather
than relying on namespace pollution to do so.
2005-03-17 20:40:42 +00:00
manu d658ac5976 Updated ipsec-tools:
2005-03-16  Emmanuel Dreyfus <manu@netbsd.org>

        * src/racoon/{cftoken.l|localconf.h|privsep.c|racoon.conf.5}
          src/racoon/remoteconf.c: When running in privsep mode, check that
          private key and script paths match those given in the path section.

2005-03-15  Emmanuel Dreyfus <manu@netbsd.org>

        * src/racoon/{isakmp_cfg|isakmp_cfg.h|isakmp_xauth.c}: initialize
          RADIUS accounting at startup
        * src/racoon/privsep.c: fix minor bug in PAM cleanup
        * src/racoon/isakmp_cfg.c: only call cleanup_pam if PAM is used

2005-03-14  Emmanuel Dreyfus <manu@netbsd.org>

        * configure.ac: handle correctly dynamic libradius
        * src/racoon/cfparse.y: correctly initialize address pool
2005-03-16 23:53:12 +00:00
manu 8a98c83667 Updated ipsec-tools:
2005-03-16  Emmanuel Dreyfus <manu@netbsd.org>

        * src/racoon/{cftoken.l|localconf.h|privsep.c|racoon.conf.5}
          src/racoon/remoteconf.c: When running in privsep mode, check that
          private key and script paths match those given in the path section.

2005-03-15  Emmanuel Dreyfus <manu@netbsd.org>

        * src/racoon/{isakmp_cfg|isakmp_cfg.h|isakmp_xauth.c}: initialize
          RADIUS accounting at startup
        * src/racoon/privsep.c: fix minor bug in PAM cleanup
        * src/racoon/isakmp_cfg.c: only call cleanup_pam if PAM is used

2005-03-14  Emmanuel Dreyfus <manu@netbsd.org>

        * configure.ac: handle correctly dynamic libradius
        * src/racoon/cfparse.y: correctly initialize address pool
2005-03-16 23:52:42 +00:00
manu e4563075a5 Updated ipsec-tools:
2005-03-16  Emmanuel Dreyfus <manu@netbsd.org>

        * src/racoon/{cftoken.l|localconf.h|privsep.c|racoon.conf.5}
          src/racoon/remoteconf.c: When running in privsep mode, check that
          private key and script paths match those given in the path section.

2005-03-15  Emmanuel Dreyfus <manu@netbsd.org>

        * src/racoon/{isakmp_cfg|isakmp_cfg.h|isakmp_xauth.c}: initialize
          RADIUS accounting at startup
        * src/racoon/privsep.c: fix minor bug in PAM cleanup
        * src/racoon/isakmp_cfg.c: only call cleanup_pam if PAM is used

2005-03-14  Emmanuel Dreyfus <manu@netbsd.org>

        * configure.ac: handle correctly dynamic libradius
        * src/racoon/cfparse.y: correctly initialize address pool
2005-03-16 23:51:44 +00:00
manu e298dc4582 Import ipsec-tools ipsec-tools-0_6-20050314 2005-03-14 08:14:24 +00:00
christos daee9fbceb Add UsePam yes 2005-02-28 02:35:10 +00:00
manu 519aeb19a0 Resolve conflict 2005-02-24 20:59:24 +00:00
manu 6159f46a8d Import ipsec-tools ipsec-tools-0_6-20050224 2005-02-24 20:52:25 +00:00
manu 88856e235d Resolve conficts and remove autoconf files that were committed by mistake 2005-02-23 15:17:50 +00:00
manu 8006965b1b Import ipsec-tools 0.6 branch as of 2005/02/23. News from last imported version
according to ipsec-tools' ChangeLog:

2005-02-23  Emmanuel Dreyfus <manu@netbsd.org>

        * configure.ac, src/racoon/{Makefile.am|crypto_openssl.c}: optionnal
          support for patented algorithms: IDEA and RC5.
        * src/racoon/{isakmp_xauth.c|main.c}: don't initialize RADIUS if it
          is not required in the configuration
        * src/racoon/isakmp.c: do not reject addresses for which kernel
          refused UDP encapsulation, they can still be used for non NAT-T
          traffic (eg: NAT-T enabled racoon on non NAT-T enabled kernel)

2005-02-18  Emmanuel Dreyfus <manu@netbsd.org>

        * src/racoon/{main.c|eaytest.c|plairsa-gen.c}
          src/setkey/setkey.c: don't use fuzzy paths for package_version.h

2005-02-18  Yvan Vanhullebus  <vanhu@free.fr>

        * src/racoon/isakmp_inf.c: Purge generated SPDs when getting a
          related DELETE_SA
        * src/racoon/pfkey.c: do NOT unbindph12() when SA acquire

2005-02-17  Emmanuel Dreyfus <manu@netbsd.org>

        From Fred Senault <fred.letter@lacave.net>
        * src/racoon/remoteconf.c: Fix a bug in script init

2005-02-17  Yvan Vanhullebus  <vanhu@free.fr>

        * src/racoon/ipsec_doi.c: Workaround for phase1 lifetime checks

2005-02-15  Michal Ludvig  <michal@logix.cz>

        * configure.ac: Changed --enable-natt_NN to --enable-natt-versions=NN,NN
2005-02-23 14:53:33 +00:00
elric 3e9f769ad6 Turn protocol 1 krb5 support back on. 2005-02-22 02:29:32 +00:00
wiz 0e4368712b Fix Xref. 2005-02-20 21:10:54 +00:00
wiz 54c5fce210 Sort sections, whitespace nit, use .In. 2005-02-20 21:10:04 +00:00
manu a7d348371a Remove KAME racoon distribution, which is not used anymore 2005-02-20 15:50:02 +00:00
onoe 9bd25f488a re-enable smime encrypt. fix from openssl-0.9.7e 2005-02-20 03:33:47 +00:00
thorpej 3029ac0bc4 Use __inline instead of inline. 2005-02-19 22:02:59 +00:00
christos c4362dc746 Move duplicate block for pam to the 1.5 dispatch block where it belongs.
Restore KRB4 and KRB5 blocks to the 1.5 dispatch block.
XXX: Should we remove the KRB4 block from the 2.0 dispatch block?
2005-02-19 03:08:23 +00:00
thorpej 2a7ae5ee05 Fix package_version.h include path so it has a chance of working in
our source tree.
2005-02-18 06:28:52 +00:00
thorpej b4668e17e3 Alter the include path for package_version.h so that it has a chance
of working in our source tree.
2005-02-18 06:24:38 +00:00
elric 48f369dafd Put Kerberos configuration options back into client config parsing
routines.
2005-02-16 05:04:05 +00:00
he e4afa5eb28 A sig_atomic_t isn't necessarily compatible with a %d printf format;
on evbsh5 sig_atomic_t is an __int64_t.  Since this only stores a
signal number, cast to int before printing.
2005-02-15 16:22:12 +00:00
christos 0b6f3b5222 add moduli from openssh-3.9p1 2005-02-13 19:34:24 +00:00
christos d6e447b0f6 Add PAM hooks from portable OpenSSH. 2005-02-13 18:14:04 +00:00
christos b3a1b19bc5 Make this compile. 2005-02-13 18:13:34 +00:00
christos cb2bba8c62 Add pam files from portable openssh 3.9p1 2005-02-13 18:11:30 +00:00
christos ea7d905559 Bring back files we need from the dead. 2005-02-13 06:01:36 +00:00
christos 43dbbb7ed8 Merge conflicts. 2005-02-13 06:01:14 +00:00
christos 8b8ab8547b Resolve conflicts. 2005-02-13 05:57:25 +00:00
christos 797648d563 Change the order of the set{e,}{u,g}id calls. NetBSD is stricter and needs
to keep the euid until the end. Add a bit of debugging.
2005-02-13 05:54:27 +00:00
christos cad419c94d from ftp.openbsd.org 2005-02-13 00:52:40 +00:00
manu 1cbaff0bc3 Remove .cvsignore files commtted by mistake 2005-02-12 15:52:36 +00:00
manu a8f0ad3c37 Import ipsec-tools (tag ipsec-tools-0_6-base in ipsec-tools CVS)
ipsec-tools is a fork from KAME racoon/libipsec/setkey, with many
enhancements.
2005-02-12 11:11:11 +00:00
simonb 9cbc979889 Bring closer to reality. 2005-02-07 12:26:56 +00:00
christos 83da2f6968 don't throw const away for no reason. 2004-12-11 06:58:20 +00:00
christos fbed044c7e Grr, this was not updating lastlogx! 2004-11-11 22:08:39 +00:00
thorpej b454543f45 Apply patches as discussed on:
http://mail-index.netbsd.org/tech-net/2004/11/05/0004.html

Slightly modified to differentiate the version string from a stock racoon.

	* auth_gssapi.h (GSSAPI_DEF_NAME): Change from "ike" to "host".
	(gssapi_get_default_id): Rename to gssapi_get_id.
	(gssapi_get_default_gss_id): New prototype.
	* cfparse.y (GSSAPI_ID): Rename to GSS_ID.
	(GSS_ID_ENC, GSS_ID_ENCTYPE): New tokens.
	(gssenc_statement): New statement.
	(isakmpproposal_spec): Use GSS_ID token.
	(expand_isakmpspec): Fill in gssid in the new proposal only
	if authmethod is OAKLEY_ATTR_AUTH_METHOD_GSSAPI_KRB.  If the
	GSS ID is not provided, call gssapi_get_default_gss_id() to
	place the default ID in the proposal.
	* cftoken.l (S_GSSENC): New start condition.
	(<S_RMTP>gss_id): New, return the GSS_ID token.
	(<S_RMTP>gssapi_id): Return the GSS_ID token.
	(<S_INI>gss_id_enc, <S_GSSENC>latin1, <S_GSSENC>utf-16le)
	(<S_GSSENC>{semi}): New, tokenize the "gss_id_enc enctype;"
	statement.
	* gssapi.c: Include <unistd.h>.
	(gssapi_get_default_gss_id): New function.
	(gssapi_init): Disable a broken debugging message.  Make
	printf formats consistent in their handling of non-NUL-terminated
	strings.
	(gssapi_get_default_id): Rename to...
	(gssapi_get_id): ...this.  If the proposal has a gssid, vdup()
	that and return it.  Disable a broken debugging message.  Make
	printf formats consistent in their handling of non-NUL-terminated
	strings.
	* ipsec_doi.c: Include <iconv.h>.
	(get_ph1approval): Make printf formats consistent in their handling
	of non-NUL-terminated strings.  Call gssapi_get_id() instead of
	gssapi_get_default_id(), and remove some complexity that has been
	pushed into that function.
	(t2isakmpsa): When parsing the OAKLEY_ATTR_GSS_ID attribute,
	check convert the attribute from UTF-16LE to ISO-Latin-1, unless
	we are configured to assume the attribute is already ISO-Latin-1
	encoded.
	(setph1attr): When setting the OAKLEY_ATTR_GSS_ID attribute,
	convert the attribute from ISO-Latin-1 to UTF-16LE, unless we
	are configured to encode the attribute in ISO-Latin-1.
	* localconf.c (setdefault): Set the default GSS ID encoding type
	to UTF-16LE.
	* localconf.h (LC_GSSENC_UTF16LE, LC_GSSENC_LATIN1)
	(LC_GSSENC_MAX): New constants.
	(struct localconf): Add gss_id_enc member.
	* main.c (RACOON_VERSION): Append " - NetBSD 20041110" to the
	version string.
	* racoon.conf.5: Document changes to GSS ID encoding and default
	GSS ID computation.  Document "gss_id_enc enctype;" statement.
	* samples/racoon.conf.sample-gssapi: Update and add comments to
	provide more information.
2004-11-10 20:23:28 +00:00
christos d08f4201ee For ptys of the form /dev/pts/n, print foo@pts/n instead of foo@n. Check
that strrchr() returns non null before using it.
2004-11-10 16:55:55 +00:00
dsl 1869f0e146 Add (unsigned char) cast to ctype functions 2004-11-05 21:56:01 +00:00
dsl 3d446c0f42 Add (unsigned char) cast to ctype functions 2004-11-03 21:01:45 +00:00
dsl e2f49bd9e2 Add (unsigned char) cast to ctype functions 2004-10-30 15:15:37 +00:00
dsl 8668419e38 Add (unsigned char) cast to ctype functions 2004-10-30 08:34:24 +00:00
lha 2c875217bb Merge in changes between 0.6.2 and 0.6.3 2004-09-14 08:08:19 +00:00
lha ac5d4384ae remove generated files 2004-09-14 07:50:24 +00:00
lha a53f6df83e Import heimdal 0.6.3
Changes in release 0.6.3

 * fix vulnerabilities in ftpd
 * support for linux AFS /proc "syscalls"
 * support for RFC3244 (Windows 2000 Kerberos Change/Set Password) in
   kpasswdd
 * fix possible KDC denial of service
 * bug fixes
2004-09-14 07:45:53 +00:00
mycroft 6e317e9e72 Disable the "may kill you" message, because:
1) It's not documented anywhere.
2) The problem it's attempting to warn about is not documented anywhere.
3) There are no example configs (or any I found with Google) that use the
   "listen" directive.
4) In any event, it's poorly worded and unclear what it's talking about.
2004-08-06 13:57:05 +00:00
drochner 14c8904f79 rename local pow10 function to avoid conflicts with the C99 libm one;
while not implemented in NetBSD yet is is considered reserved by gcc-3.4
2004-08-05 16:55:34 +00:00
wiz e8e1e9c2fe Sync with Heimdal: krb5_set_password.3,v 1.7 (except for a reference to
a man page we don't have yet):
Document krb5_set_password_using_ccache and krb5_passwd_result_to_string.
Ok'd by lha.
2004-07-18 15:08:50 +00:00
wiz 258b1bfb2e Remove superfluous comma; grammar fixes; split sentence
in two for better understanding.
XXX: krb5_set_password_using_ccache not described.
2004-07-14 09:21:59 +00:00
jonathan 8045e967b9 Fix typo (space added at beginning of line in an editor window under
the shell where I retested the Makefile changes, sigh...)
2004-07-14 07:12:25 +00:00
jonathan f17171cf5d Restore Heimdal Id as $Heimdal:, add NetBSD ID. 2004-07-14 07:06:44 +00:00
jonathan 98b92eb4a5 Commit manpage for krb5_set_password(3), based on Heimdal-20040606,
with small revisions by myself, reviewed/approved by Love.
2004-07-14 07:02:07 +00:00
he 8416ac87c6 Print ssize_t-typed variables using %zd format, not just %d.
Fixes build problem observed when compiling for hpcarm.
2004-07-13 14:15:17 +00:00
jonathan e5f57f3a70 Commit changes from Heimdal-current, as per discussion with Love
(lha@NetBSD.ORG), to incorporate contemporary (last-year-ish)
set-password and change-password extensions derived RFC-3244
(Microsoft set-password/change-password extensions), and the
subsequent MIT-KRB5 APIs for changing and setting passwords.

Required for compatibility with recent (2002/2003-ish) open-source
code which uses the MIT KRB5 APIs for setting passwords, or for
joining Microsoft domains as a  "computer account".

Modified files (for pullup tracking purposes):
	lib/libasn1/Makefile
	crypto/dist/heimdal/lib/asn1/k5.asn1
 	crypto/dist/heimdal/lib/krb5/changepw.c
 	crypto/dist/heimdal/lib/krb5/krb5-protos.h
 	crypto/dist/heimdal/lib/krb5/krb5.h
2004-07-12 20:44:56 +00:00
christos 763b8e76a6 Now that we have addrlen, use it. 2004-07-06 02:59:55 +00:00
drochner c62dff1bf7 fix a const'ification inconsistency, noticed by gcc-3.4 2004-07-01 21:27:42 +00:00
drochner 5e420ba772 restore behaviour before the 0.9.7d import: fall back to /dev/urandom
if ~/.rnd is not present.
(This code is with #ifdef __OpenBSD__ in openssl now; this change just
generalizes it.)
(approved by tls)
2004-06-21 15:14:16 +00:00
itojun 166adfa9e5 sync w/ 20040617. 2004-06-17 03:42:55 +00:00
itojun f7968a3c82 version 20040617a, includes important fix about cert handling 2004-06-17 03:38:44 +00:00
lha 76164d845a Now that we have res_nsearch, use it. Thanks christos for adding it. 2004-05-25 11:15:43 +00:00
lha bba70dc29c Merge changes between Heimdal 0.6.1 and 0.6.2 2004-05-08 13:27:58 +00:00
lha 0575824546 Import of Heimdal release 0.6.2
* Fix possible buffer overrun in v4 kadmin (which now defaults to off)
2004-05-08 13:15:02 +00:00
jonb e0bc90b23e Set LoginGraceTime back to 600 like it used to be. This should
help slow machines with long keys to still work like they did with
NetBSD 1.6 and before.
2004-05-01 06:06:33 +00:00
itojun b4a3a9e6c1 properly validate phase 1 signature.
http://www.vuxml.org/freebsd/d8769838-8814-11d8-90d1-0020ed76ef5a.html
2004-04-12 03:34:05 +00:00
itojun 604a0b444a KAME racoon as of 2004/4/12 2004-04-12 03:26:57 +00:00
lha e4e583e45c From Heimdal, cast size_t to unsigned long for LP64 platforms. 2004-04-02 20:58:36 +00:00
lha 8aa367e8da more text how to do imports 2004-04-02 15:11:21 +00:00
lha 4d21efe5f7 Merge changes between heimdal-0.6 and heimdal-0.6.1 2004-04-02 14:59:46 +00:00
lha a08e247c98 Import heimdal-0.6.1
Changes in release 0.6.1
 * Fixed ARCFOUR suppport
 * Cross realm vulnerability
 * kdc: fix denial of service attack
 * kdc: stop clients from renewing kerberos 4 tickets into the future
 * bug fixes
2004-04-02 14:47:00 +00:00
itojun 7fba5a69cf reject packet with too big isakmp message length field. 2004-03-31 07:19:27 +00:00
groo 4b32eb44a7 Resolve conflicts. In particular, prefer OpenSSL's BIO_strl* and
BIO_strncpy over ours.
2004-03-20 04:32:34 +00:00
groo 5a374ad0ce Import OpenSSL 0.9.7d to address:
1. Null-pointer assignment during SSL handshake
	2. Out-of-bounds read affects Kerberos ciphersuites
2004-03-20 04:22:06 +00:00
groo 0684427439 Import OpenSSL 0.9.7d to address:
1. Null-pointer assignment during SSL handshake
	2. Out-of-bounds read affects Kerberos ciphersuites
2004-03-20 04:22:04 +00:00
wiz eec56f3b12 Bump date for previous. 2004-03-06 23:38:40 +00:00
itojun da6bd485cd add missing description of "EnableSshKeysign". 2004-03-06 14:33:08 +00:00
itojun c6a556a5b6 endian mismatch. from iij seil team 2004-01-16 02:25:14 +00:00
itojun 3c3791b847 validate hash on info exchange. bugtraq <20040113213940.GA1727@hzeroseven.org> 2004-01-14 09:17:42 +00:00
dyoung 4758291178 Fix the checkflist for builds without Kerberos 4 (MKKERBEROS4=no)
and without Kerberos 4 & 5 (MKKERBEROS=no). Previously checkflist
complained of missing files.

* move kerberos- and kerberos 4-only files into new flists,
  distrib/sets/lists/*/krb.*

* make the flist generators grok MKKERBEROS{,4} variables

* fix Makefiles which treat MKKERBEROS=no as MKKERBEROS5=no.
  9 out of 10 experts agree that it is ludicrous to build w/
  KERBEROS4 and w/o KERBEROS5.

* fix header files, also, which treat MKKERBEROS=no as MKKERBEROS5=no.

* omit some Kerberos-only subdirectories from the build as
  MKKERBEROS{,4} indicate

(I acknowledge the sentiment that flists are the wrong way to go,
and that the makefiles should produce the metalog directly.  That
sounds to me like the right way to go, but I am not prepared to do
revamp all the makefiles.  While my approach is expedient, it fits
painlessly within the current build architecture until we are
delivered from flist purgatory, and it does not postpone our
delivery. Fair enough?)
2003-12-11 09:46:26 +00:00
itojun 2a85abd333 avoid memory leak. hint from Andrew Lunn 2003-11-23 08:33:13 +00:00
itojun 5451f8a14e do not malloc(0). Andrew Lunn 2003-11-23 08:23:02 +00:00
jonathan dedf78268d Patch OpenSSL to use opencrypto (aka /dev/crypto), if configured and
(per kernel policy) for crypto transforms for which hardware
acceleration is available. Affects:

   crypto/dist/openssl/crypto/engine/eng_all.c
   crypto/dist/openssl/crypto/engine/hw_cryptodev.c
   crypto/dist/openssl/crypto/evp/c_all.c

as posted to tech-crypto for review/comment on 2003-08-21.
2003-11-20 00:55:51 +00:00
wiz 4bbfee09ca Various typo fixes from Jonathon Gray via jmc@openbsd. 2003-11-17 11:16:10 +00:00
itojun 6de72ce0f8 typo. minoura 2003-11-13 10:35:40 +00:00
yamt 1356e8977e pfkey_dump_sadb: when it get an error using sysctl,
mimic an error msg from keysock so that caller can process it correctly.

PR/23122.
2003-11-09 15:37:24 +00:00
itojun aec01dda91 sync w/ openssl 0.9.7c. shlib minor bump for libcrypto.
(ERR_release_err_state_table() added)
2003-11-04 23:54:26 +00:00
itojun 385718bc5c more unifdef 2003-11-04 23:45:56 +00:00
itojun 6b4e6697c9 openssl 0.9.7c. security changes are already in place 2003-11-04 23:25:09 +00:00
itojun 746d6bb953 bring in kame rev 1.32. PR 23122 2003-11-04 04:30:38 +00:00
thorpej 1244cc6c62 Fix NULL vs 0 mixup. 2003-10-25 20:48:10 +00:00
itojun f90a2e28b1 do not build "null ESP and no AUTH" proposal. (racoon 174) by Tom Lendacky 2003-10-23 07:23:50 +00:00
fvdl 6a6c3ca82f Don't assign NULL as an integer. 2003-10-21 03:06:55 +00:00
fvdl 73d47a4f07 Don't return NULL as an integer. 2003-10-21 03:03:39 +00:00
thorpej eb3570747f Make sure HAVE_OPENSSL is undefined, to avoid depending on both
libcrypto and libdes.  Patch by lha@, posted to tech-userlevel.
2003-10-09 04:31:17 +00:00
itojun ac0a546d0d realloc error check failure; Greg Troxel, sync w/kame 2003-10-03 21:53:32 +00:00
itojun 48b0bfaad0 support policy w/o selector. 2003-10-02 19:53:01 +00:00
itojun 3c068c5948 correct unsafe realloc(). 2003-10-02 19:52:43 +00:00
itojun b3cd345741 more fixes from 0.9.7c, from openbsd 2003-10-02 02:26:17 +00:00
itojun ae91503b5d from openbsd:
Correct some off-by-ones.  They currently don't matter, but this
is for future safety and consistency.
OK krw@, markus@
2003-10-02 02:25:05 +00:00
christos 0a7cc0d7d1 Apply security fix: http://www.openssl.org/news/secadv_20030930.txt
Changelog from: http://cvs.openssl.org/chngview?cn=11471
2003-09-30 15:59:53 +00:00
mycroft 5749c53775 Fix what is obviously a bug: valloc() -> vmalloc(). Now racoon(8) doesn't core
dump all the time.
2003-09-25 01:00:32 +00:00
itojun 34439bf0c9 off-by-one. from openbsd 2003-09-22 22:12:05 +00:00
itojun 28c3d43114 typo. markus@openbsd 2003-09-18 12:42:33 +00:00
itojun 841f7944e5 protect against double free; #660; zardoz at users.sf.net
from openbsd
2003-09-18 08:16:40 +00:00
itojun c2011dbc01 missing buffer_free(&encrypted); #662; zardoz at users.sf.net
from openbsd
2003-09-18 08:16:15 +00:00
christos 898af9fa6c make sure we init nalloc. 2003-09-18 01:41:56 +00:00
christos 3171afa413 fix problem in previous patch 2003-09-18 01:35:07 +00:00
christos d4d840dd36 More buffer size adjusted before allocation succeeded fixes. Bump to 20030917.
From FreeBSD (with an additional one from me).
2003-09-17 23:19:02 +00:00
christos 51b1a61a2d dammit, don't apply patches blindly. 2003-09-16 23:18:24 +00:00
christos 08d244b791 bring more fixes from 3.7.1 2003-09-16 23:16:59 +00:00
lukem 5de000c8d7 crank __NETBSDSSH_VERSION for buffer.c fix 2003-09-16 17:39:32 +00:00
christos 325fccf53f Do not record expanded size before attempting to reallocate the associated
memory. From OpenBSD, via FreeBSD.
2003-09-16 13:22:57 +00:00
itojun 249c9d88ea use sysctl to dump SAs if possible (not really tested) 2003-09-12 08:44:34 +00:00
itojun efbe374b9f SKEY and BSDAUTH #ifdef mixup 2003-09-08 21:00:41 +00:00
itojun f13cb0c7b2 bzero() 2nd arg mistake. found by openbsd guys. from kame 2003-09-04 00:12:56 +00:00
itojun ca14877c77 reject rc5/idea/mdc2 commands if OPENSSL_NO_xx is specified 2003-08-27 21:05:02 +00:00
wiz 31fd31ccf7 Make getlastlogx have the pathname to the lastlogx database as first
argument, to be consistent with updlastlogx.

Approved by christos, reviewed by kleink.

[The lastlogxname function should not be used any longer.]
2003-08-26 16:48:32 +00:00
itojun d9c46578d1 update racoon to 2003/8/26 version. mostly minor bugfixes. 2003-08-26 03:31:50 +00:00
itojun 2cfb643fda KAME racoon, as of 2003/08/26 2003-08-26 03:27:01 +00:00
itojun b5f8b9a7c0 KAME libipsec/libpfkey, 2003/08/26 2003-08-26 03:25:29 +00:00
itojun eb24db53ab style; total size of buf is (num + 3) 2003-08-13 01:29:41 +00:00
simonb 658a8c458e Fix bad use of "sizeof(pointer)" where the length of a buffer was the
intention.  Fixes problems with least ssh's known_hosts file and factor.

Patch from Berndt Josef Wulf's PR lib/22347.
2003-08-12 03:25:24 +00:00
agc dc4f8c2e1a Move UCB-licensed code from 4-clause to 3-clause licence.
Patches provided by Joel Baker in PR 22252, verified by myself.
2003-08-07 09:15:17 +00:00
itojun 5de5abdd3d consistently use new DES API, re-enable des regression test 2003-07-31 08:53:58 +00:00
itojun 965395c9f3 re-enable __RCSID, sys/cdefs_elf.h rev 1.15 fixed the problem 2003-07-30 00:34:16 +00:00
itojun f33c57af22 disable __RCSID for now, somehow it puts some of integer variables
into .text region
2003-07-29 23:17:39 +00:00
itojun 308bb7eb39 remove unused macro. PR 21150 2003-07-29 04:45:39 +00:00
itojun 4c43ef4ce1 xx_keylen has to return bits, not bytes. KAME-PR-488 2003-07-29 04:30:54 +00:00
jwise 3514116803 Apply patch from lha@, via OpenBSD portable SSH's revision 1.11 of this file:
mcc -> fcc; from Love Hörnquist Åstrand <lha@it.su.se>
  otherwise the kerberos credentinal is stored in a memory cache
  in the privileged sshd.

Presumably, this will also come in as part of a later OpenSSH release via
`cvs import', but this is worth having now.
2003-07-28 15:50:17 +00:00
cjep c6912d0211 remove duplicate manual 2003-07-26 15:11:43 +00:00
itojun 08a1c4bcd3 empty commit, just to update timestamp and force rebuild of krb.h. 2003-07-26 01:07:35 +00:00
itojun 805c102737 fix compilation on sparc64. reported by Juergen Hannken-Illjes 2003-07-25 09:06:02 +00:00
itojun e8876f361f avoid "unsigned u_int32_t" 2003-07-25 02:02:43 +00:00
itojun 88ec7d3792 bring back krb4 support, just to suppress unwanted noise from other developers.
note that official openssh distribution have already dropped kerberosIV support,
therefore maintenance cost needs to be paid by us.  and have no intent to help.
2003-07-24 15:31:52 +00:00
itojun f4401cd869 upgrade openssl to 0.9.7b. (AES is now supported)
alter des.h to be friendly with openssl/des.h (you can include both in the
same file)
make libkrb to depend on libdes.  bump major.
massage various portioin of heimdal to be friendly with openssl 0.9.7b.
2003-07-24 14:16:30 +00:00
itojun 2836295a36 OpenSSL 0.9.7b, major API changes included 2003-07-24 08:25:41 +00:00
itojun 0f3017142e use snprintf (actually, "addr" can be supplied from outside, and if "addr"
points to shorter-than-24 buffer we will overrun buffer.  bad API)
2003-07-24 04:41:13 +00:00
itojun 7b7c18c4c5 the block is just for krb4 (not for krb5) so should be removed. lha 2003-07-23 21:25:08 +00:00
itojun c55f89ad19 typo on #if condition converesion 2003-07-23 21:03:03 +00:00
itojun 0091553542 define symbols even when !KRB4, to simplify shlib management. lha 2003-07-23 20:48:34 +00:00
itojun 8556dff80c remove KRB4 and AFS support. sync w/ openssh main tree 2003-07-23 03:52:16 +00:00
itojun a9503412ba license clarification (UCB 3-clause, and progressmeter) 2003-07-23 03:51:27 +00:00
itojun 46471dc1e9 cast for signed/unsigned mixup 2003-07-14 18:27:48 +00:00
itojun 1bffbcd4a1 correct ^@ incorrectly committed 2003-07-14 18:26:05 +00:00
itojun a157f97782 unifdef VMS/WIN16/WIN32 in public headers, at least 2003-07-14 14:06:14 +00:00
itojun c187ba994b use bounded string op (only one sprintf remains - still no clue) 2003-07-14 13:24:00 +00:00
itojun a395b35ba2 delint 2003-07-14 13:07:05 +00:00
itojun 848c8ac0ef use bounded string ops (especially libraries) 2003-07-14 13:05:19 +00:00
itojun afdee9affa __RCSID. add missing copyright in *.y and *.l (sync w/kame) 2003-07-12 09:37:09 +00:00
itojun 03eefe2ecf sync w/ latest racoon 2003-07-12 09:02:24 +00:00
itojun dc30725eaf kame racoon 2003/7/12. lots of lots of stability fixes. 2003-07-12 08:45:39 +00:00
lukem b1395375fd add __RCSID("$NetBSD$"), because it's hard to track our changes in a
binary when we only have the vendor's RCSID.
2003-07-10 01:09:41 +00:00
wiz fc3229a199 Undo unintended commit. 2003-07-04 21:57:16 +00:00
wiz ee8924aa2e Fix off-by-one. From William Allen Simpson in PR 22012. 2003-07-04 21:56:48 +00:00
wiz f9cc3a858b Bump date for recent changes. 2003-07-04 12:33:11 +00:00
wiz de2728383c Punctuation fixes. 2003-07-04 12:31:33 +00:00
wiz d9fb607438 Quote punctuation so it gets marked up. 2003-06-30 11:52:01 +00:00
wiz ed9861f855 Remove dot from middle of sentence. 2003-06-27 23:10:37 +00:00
wiz 554f6e9041 Quote question mark; punctuation fix; new sentence, new line. 2003-06-27 22:37:13 +00:00
wiz a4fd08f60c Quote question mark. 2003-06-27 22:35:48 +00:00
wiz 5e88ad0f63 Remove superfluous macro calls, add newline where missing, and
use \&[ (and similar) instead of \*(lB, since it works with both old and new groff.
2003-06-27 22:31:29 +00:00
wiz bb64da9790 Drop trailing spaces; fix punctuation problems;
put Nd argument in double quotes since it contains more than 9 words; spell out month.
2003-06-27 14:46:55 +00:00
wiz e6ecde23a1 Be consistent in how we call .rhosts authentication. 2003-06-27 09:14:56 +00:00
wiz 7e3682db3e Sort sections; replace man macro with mdoc macro;
sort SEE ALSO; empty line -> .Pp.
2003-06-26 10:03:39 +00:00
aymeric 9bdcb47acd add missing #ifdef __RCSID
(these files are compiled as host tools)
from Nicolas Ollinger, fixes PR#21892
2003-06-23 20:02:53 +00:00
itojun 1430af815a discourage the use of aggressive mode 2003-06-16 08:40:11 +00:00
itojun 9d1e759d63 typo: get correct counters; introduced during rekeying change. (openbsd rev 1.26) 2003-05-26 07:57:38 +00:00
lha 49838f37b9 adapt to heimdal 0.6 2003-05-25 22:07:56 +00:00
itojun 3f62dc6d24 strlcpy 2003-05-17 18:19:20 +00:00
itojun 93851338f2 sscanf overrun 2003-05-17 01:12:28 +00:00
lha b224fef26e Fix up rcsid lossage 2003-05-15 21:36:30 +00:00
lha f80f84e684 no longer used 2003-05-15 20:56:45 +00:00
lha 28d69ea823 merge in heimdal 0.6 2003-05-15 20:44:06 +00:00
lha 245a590853 import of heimdal 0.6 2003-05-15 20:28:38 +00:00
itojun dec326ca84 64bit issue; reported by Havard Eidnes and Juergen Hannken-Illjes, sync w/
openssh master tree
2003-05-15 14:10:24 +00:00
itojun 56d0ea03cf >implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
>server interops with commercial client; ok jakob@ djm@

markus@openbsd
2003-05-14 18:22:07 +00:00
itojun d6fa2807d4 markus@openbsd, for PR 20550
>change key_load_public to try to read a public from:
>rsa1 private or rsa1 public and ssh2 keys.
>this makes ssh-keygen -e fail for ssh1 keys more gracefully
>for example; report from itojun (netbsd pr 20550).
2003-05-14 18:17:02 +00:00
itojun 5e9a67bb93 OpenSSH 3.6.1 as of 20030514 - krb5 over ssh2 2003-05-14 18:12:50 +00:00
wiz d75f1336b3 Uppercase URL. 2003-05-14 14:30:59 +00:00
wiz 5b3e029874 setup -> set up. 2003-05-14 13:10:57 +00:00
wiz bb2f5dbc31 setup -> set up. 2003-05-14 12:06:11 +00:00
itojun 0230a54dfb plug memory leak. jgraessley at apple.com 2003-05-09 05:32:36 +00:00
itojun a59c37eb75 parse EOS before performing #include. Joshua Graessley of apple (via kame) 2003-05-08 07:58:54 +00:00
wiz c42e1fac66 Management, not managment. Mostly from jmc@openbsd. 2003-04-26 22:07:12 +00:00
itojun 5116f9caae fix "round up to 8" code. from kame 2003-04-24 02:22:26 +00:00
itojun bf3ca3dcee do not assume 32bit (%d fits into 12 chars); sumikawa@freebsd 2003-04-17 07:37:05 +00:00
wiz 3fd1d09240 Fix typo, and break overly long line. 2003-04-16 13:10:40 +00:00
itojun 670e872d62 10 char is not sufficient here. sync w/ kame 2003-04-15 07:31:23 +00:00
itojun 5a6a4446f8 avoid hardcoded SOCK_xx; with markus; should allow ssh over SCTP 2003-04-14 14:36:47 +00:00
itojun 6605cddb45 new copyright notice (w/ TNF copyright). thanks millert 2003-04-08 01:19:08 +00:00
wiz 07d13217f3 Some e.g. cleanup: replace "eg" with "e.g.,". From Igor Sobrado in PR 19692. 2003-04-07 06:56:38 +00:00
wiz 2b75215a67 IPsec, not IPSEC. From Igor Sobrado in PR 19691. 2003-04-06 20:24:35 +00:00
itojun fcb31fad16 sync w/ 3.6.1 (remove files that are removed on openssh repo) 2003-04-03 06:33:42 +00:00
itojun e7e7c84a6a sync w/ 3.6.1 2003-04-03 06:21:31 +00:00
itojun f9930e137b OpenSSH 3.6.1 as of 2003/4/3
* The 'kex guesses' bugfix from OpenSSH 3.6 triggers a bug
  in a few other SSH v2 implementations and causes connections to
  stall.  OpenSSH 3.6.1 disables this bugfix when interoperating
  with these implementations.
* RSA blinding is now used by ssh(1), sshd(8) and ssh-agent(1).
  in order to avoid potential timing attacks against the RSA keys.
  Older versions of OpenSSH have been using RSA blinding in
  ssh-keysign(1) only.
* ssh-agent(1) optionally requires user confirmation if a key gets
  used, see '-c' in ssh-add(1).
* sshd(8) now handles PermitRootLogin correctly when UsePrivilegeSeparation
  is enabled.
* sshd(8) now removes X11 cookies when a session gets closed.
* ssh-keysign(8) is disabled by default and only enabled if the
  new EnableSSHKeysign option is set in the global ssh_config(5)
  file.
* ssh(1) and sshd(8) now handle 'kex guesses' correctly (key exchange
  guesses).
* ssh(1) no longer overwrites SIG_IGN.  This matches behaviour from
  rsh(1) and is used by backup tools.
* setting ProxyCommand to 'none' disables the proxy feature, see
  ssh_config(5).
* scp(1) supports add -1 and -2.
* scp(1) supports bandwidth limiting.
* sftp(1) displays a progressmeter.
* sftp(1) has improved error handling for scripting.
2003-04-03 05:57:11 +00:00
mycroft 6012957147 Don't build crypt() on NetBSD either. 2003-04-02 20:28:00 +00:00
perry 0ac531f887 beeing->being from Igor Sobrado, PR misc/19814 2003-03-31 18:54:15 +00:00
perry 0fe9c931b1 authenication->authentication, Instititute->Institute
from Igor Sobrado, PR misc/19814
2003-03-31 18:52:13 +00:00
perry 5ffdabb8bc kefile->keyfile (Igor Sobrado, PR misc/19909) 2003-03-31 16:54:47 +00:00
wiz 6653459566 principal, not pricipal. 2003-03-31 09:34:09 +00:00
perry 7287c6007d crential->credential princial->principal (Igor Sobrado, PR misc/19700) 2003-03-31 02:30:50 +00:00
perry 9ef7047603 spelling fixes, one from PR misc/20753 (Igor Sobrado) + others 2003-03-31 00:04:03 +00:00