Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 18 Nov 2001 00:43:00 -0800 (PST)
From:      Dirk Meyer <dinoex@FreeBSD.org>
To:        cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/security/openssh Makefile distinfo ports/security/openssh/files patch-ad patch-am ports/security/openssh-portable Makefile distinfo
Message-ID:  <200111180843.fAI8h0F22727@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
dinoex      2001/11/18 00:43:00 PST

  Modified files:
    security/openssh     Makefile distinfo 
    security/openssh/files patch-ad patch-am 
    security/openssh-portable Makefile distinfo 
  Log:
  Update to openssh-3.0.1 and openssh-portable-3.0.1p1
  
  - now in protocol2:
  Background ssh at logout when waiting for forwarded connection / X11 sessions
  to terminate
  
  disabled -DSKEY
  
  from Changelog (not complete):
  
  20011115
   - (djm) Fix IPv4 default in ssh-keyscan. Spotted by Dan Astoorian
     <djast@cs.toronto.edu> Fix from markus@
   - (djm) Release 3.0.1p1
  
  20011113
   - (djm) Fix early (and double) free of remote user when using Kerberos.
     Patch from Simon Wilkinson <simon@sxw.org.uk>
   - (djm) AIX login{success,failed} changes. Move loginsuccess call to
     do_authenticated. Call loginfailed for protocol 2 failures > MAX like
     we do for protocol 1. Reports from Ralf Wenk <wera0003@fh-karlsruhe.de>,
     K.Wolkersdorfer@fz-juelich.de and others
   - (djm) OpenBSD CVS Sync
     - dugsong@cvs.openbsd.org 2001/11/11 18:47:10
       [auth-krb5.c]
       fix krb5 authorization check. found by <jhawk@MIT.EDU>. from
       art@, deraadt@ ok
     - markus@cvs.openbsd.org  2001/11/12 11:17:07
       [servconf.c]
       enable authorized_keys2 again. tested by fries@
  
  20011112
   - OpenBSD CVS Sync
     - markus@cvs.openbsd.org 2001/10/24 08:41:41
       [sshd.c]
       mention remote port in debug message
     - markus@cvs.openbsd.org 2001/10/24 08:51:35
       [clientloop.c ssh.c]
       ignore SIGPIPE early, makes ssh work if agent dies, netbsd-pr via itojun@
     - markus@cvs.openbsd.org 2001/10/24 19:57:40
       [clientloop.c]
       make ~& (backgrounding) work again for proto v1; add support ~& for v2, too
     - markus@cvs.openbsd.org 2001/10/25 21:14:32
       [ssh-keygen.1 ssh-keygen.c]
       better docu for fingerprinting, ok deraadt@
     - markus@cvs.openbsd.org 2001/10/29 19:27:15
       [sshconnect2.c]
       hostbased: check for client hostkey before building chost
     - markus@cvs.openbsd.org 2001/11/07 16:03:17
       [packet.c packet.h sshconnect2.c]
       pad using the padding field from the ssh2 packet instead of sending
       extra ignore messages. tested against several other ssh servers.
     - markus@cvs.openbsd.org 2001/11/07 21:40:21
       [ssh-rsa.c]
       ssh_rsa_sign/verify: SSH_BUG_SIGBLOB not supported
     - markus@cvs.openbsd.org 2001/11/07 22:10:28
       [ssh-dss.c ssh-rsa.c]
       missing free and sync dss/rsa code.
     - markus@cvs.openbsd.org 2001/11/07 22:53:21
       [channels.h]
       crank c->path to 256 so they can hold a full hostname; dwd@bell-labs.com
     - markus@cvs.openbsd.org 2001/11/08 10:51:08
       [readpass.c]
       don't strdup too much data; from gotoh@taiyo.co.jp; ok millert.
     - markus@cvs.openbsd.org 2001/11/10 13:22:42
       [ssh-rsa.c]
       KNF (unexpand)
     - markus@cvs.openbsd.org 2001/11/11 13:02:31
       [servconf.c]
       make AuthorizedKeysFile2 fallback to AuthorizedKeysFile if
       AuthorizedKeysFile is specified.
  
  20011109
   - (stevesk) auth-pam.c: use do_pam_authenticate(PAM_DISALLOW_NULL_AUTHTOK)
     if permit_empty_passwd == 0 so null password check cannot be bypassed.
     jayaraj@amritapuri.com OpenBSD bug 2168
  
  Revision  Changes    Path
  1.11      +1 -1      ports/security/openssh-portable/Makefile
  1.5       +1 -1      ports/security/openssh-portable/distinfo
  1.74      +2 -1      ports/security/openssh/Makefile
  1.26      +2 -1      ports/security/openssh/distinfo
  1.14      +6 -9      ports/security/openssh/files/patch-ad
  1.8       +10 -12    ports/security/openssh/files/patch-am

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200111180843.fAI8h0F22727>