Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 24 Feb 2009 18:49:27 +0000 (UTC)
From:      Dag-Erling Smorgrav <des@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-vendor@freebsd.org
Subject:   svn commit: r189006 - in vendor-crypto/openssh/dist: . contrib contrib/caldera contrib/cygwin contrib/redhat contrib/suse openbsd-compat regress
Message-ID:  <200902241849.n1OInRVX073352@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: des
Date: Tue Feb 24 18:49:27 2009
New Revision: 189006
URL: http://svn.freebsd.org/changeset/base/189006

Log:
  Vendor import of OpenSSH 5.2p1

Added:
  vendor-crypto/openssh/dist/auth2-jpake.c   (contents, props changed)
  vendor-crypto/openssh/dist/jpake.c   (contents, props changed)
  vendor-crypto/openssh/dist/jpake.h   (contents, props changed)
  vendor-crypto/openssh/dist/schnorr.c   (contents, props changed)
Modified:
  vendor-crypto/openssh/dist/ChangeLog
  vendor-crypto/openssh/dist/Makefile.in
  vendor-crypto/openssh/dist/PROTOCOL
  vendor-crypto/openssh/dist/README
  vendor-crypto/openssh/dist/addrmatch.c
  vendor-crypto/openssh/dist/auth-options.c
  vendor-crypto/openssh/dist/auth.c
  vendor-crypto/openssh/dist/auth.h
  vendor-crypto/openssh/dist/auth2-chall.c
  vendor-crypto/openssh/dist/auth2.c
  vendor-crypto/openssh/dist/canohost.c
  vendor-crypto/openssh/dist/canohost.h
  vendor-crypto/openssh/dist/channels.c
  vendor-crypto/openssh/dist/channels.h
  vendor-crypto/openssh/dist/cipher.c
  vendor-crypto/openssh/dist/cipher.h
  vendor-crypto/openssh/dist/clientloop.c
  vendor-crypto/openssh/dist/compat.c
  vendor-crypto/openssh/dist/compat.h
  vendor-crypto/openssh/dist/config.guess
  vendor-crypto/openssh/dist/config.h.in
  vendor-crypto/openssh/dist/config.sub
  vendor-crypto/openssh/dist/configure
  vendor-crypto/openssh/dist/configure.ac
  vendor-crypto/openssh/dist/contrib/caldera/openssh.spec
  vendor-crypto/openssh/dist/contrib/caldera/ssh-host-keygen
  vendor-crypto/openssh/dist/contrib/caldera/sshd.pam
  vendor-crypto/openssh/dist/contrib/cygwin/Makefile
  vendor-crypto/openssh/dist/contrib/cygwin/ssh-host-config
  vendor-crypto/openssh/dist/contrib/redhat/openssh.spec
  vendor-crypto/openssh/dist/contrib/redhat/sshd.pam
  vendor-crypto/openssh/dist/contrib/ssh-copy-id
  vendor-crypto/openssh/dist/contrib/ssh-copy-id.1
  vendor-crypto/openssh/dist/contrib/sshd.pam.generic
  vendor-crypto/openssh/dist/contrib/suse/openssh.spec
  vendor-crypto/openssh/dist/contrib/suse/rc.sshd
  vendor-crypto/openssh/dist/defines.h
  vendor-crypto/openssh/dist/dispatch.c
  vendor-crypto/openssh/dist/kex.c
  vendor-crypto/openssh/dist/kexgexs.c
  vendor-crypto/openssh/dist/key.c
  vendor-crypto/openssh/dist/loginrec.c
  vendor-crypto/openssh/dist/misc.c
  vendor-crypto/openssh/dist/moduli.0
  vendor-crypto/openssh/dist/monitor.c
  vendor-crypto/openssh/dist/monitor.h
  vendor-crypto/openssh/dist/monitor_fdpass.c
  vendor-crypto/openssh/dist/monitor_wrap.c
  vendor-crypto/openssh/dist/monitor_wrap.h
  vendor-crypto/openssh/dist/myproposal.h
  vendor-crypto/openssh/dist/nchan.c
  vendor-crypto/openssh/dist/openbsd-compat/bsd-poll.c
  vendor-crypto/openssh/dist/openbsd-compat/port-uw.c
  vendor-crypto/openssh/dist/openbsd-compat/xcrypt.c
  vendor-crypto/openssh/dist/openbsd-compat/xmmap.c
  vendor-crypto/openssh/dist/packet.c
  vendor-crypto/openssh/dist/pathnames.h
  vendor-crypto/openssh/dist/readconf.c
  vendor-crypto/openssh/dist/readconf.h
  vendor-crypto/openssh/dist/regress/conch-ciphers.sh
  vendor-crypto/openssh/dist/regress/putty-ciphers.sh
  vendor-crypto/openssh/dist/regress/putty-kex.sh
  vendor-crypto/openssh/dist/regress/putty-transfer.sh
  vendor-crypto/openssh/dist/scp.0
  vendor-crypto/openssh/dist/scp.c
  vendor-crypto/openssh/dist/servconf.c
  vendor-crypto/openssh/dist/servconf.h
  vendor-crypto/openssh/dist/serverloop.c
  vendor-crypto/openssh/dist/session.c
  vendor-crypto/openssh/dist/sftp-server-main.c
  vendor-crypto/openssh/dist/sftp-server.0
  vendor-crypto/openssh/dist/sftp.0
  vendor-crypto/openssh/dist/sftp.1
  vendor-crypto/openssh/dist/sftp.c
  vendor-crypto/openssh/dist/ssh-add.0
  vendor-crypto/openssh/dist/ssh-agent.0
  vendor-crypto/openssh/dist/ssh-keygen.0
  vendor-crypto/openssh/dist/ssh-keygen.1
  vendor-crypto/openssh/dist/ssh-keygen.c
  vendor-crypto/openssh/dist/ssh-keyscan.0
  vendor-crypto/openssh/dist/ssh-keyscan.1
  vendor-crypto/openssh/dist/ssh-keyscan.c
  vendor-crypto/openssh/dist/ssh-keysign.0
  vendor-crypto/openssh/dist/ssh-rand-helper.0
  vendor-crypto/openssh/dist/ssh.0
  vendor-crypto/openssh/dist/ssh.1
  vendor-crypto/openssh/dist/ssh.c
  vendor-crypto/openssh/dist/ssh2.h
  vendor-crypto/openssh/dist/ssh_config
  vendor-crypto/openssh/dist/ssh_config.0
  vendor-crypto/openssh/dist/ssh_config.5
  vendor-crypto/openssh/dist/sshconnect.c
  vendor-crypto/openssh/dist/sshconnect2.c
  vendor-crypto/openssh/dist/sshd.0
  vendor-crypto/openssh/dist/sshd.8
  vendor-crypto/openssh/dist/sshd.c
  vendor-crypto/openssh/dist/sshd_config.0
  vendor-crypto/openssh/dist/sshd_config.5
  vendor-crypto/openssh/dist/sshpty.c
  vendor-crypto/openssh/dist/ttymodes.c
  vendor-crypto/openssh/dist/uidswap.c
  vendor-crypto/openssh/dist/version.h

Modified: vendor-crypto/openssh/dist/ChangeLog
==============================================================================
--- vendor-crypto/openssh/dist/ChangeLog	Tue Feb 24 18:48:10 2009	(r189005)
+++ vendor-crypto/openssh/dist/ChangeLog	Tue Feb 24 18:49:27 2009	(r189006)
@@ -1,3 +1,497 @@
+20090223
+ - (djm) OpenBSD CVS Sync
+   - djm@cvs.openbsd.org 2009/02/22 23:50:57
+     [ssh_config.5 sshd_config.5]
+     don't advertise experimental options
+   - djm@cvs.openbsd.org 2009/02/22 23:59:25
+     [sshd_config.5]
+     missing period
+   - djm@cvs.openbsd.org 2009/02/23 00:06:15
+     [version.h]
+     openssh-5.2
+ - (djm) [README] update for 5.2
+ - (djm) Release openssh-5.2p1
+
+20090222
+ - (djm) OpenBSD CVS Sync
+   - tobias@cvs.openbsd.org 2009/02/21 19:32:04
+     [misc.c sftp-server-main.c ssh-keygen.c]
+     Added missing newlines in error messages.
+     ok dtucker
+
+20090221
+ - (djm) OpenBSD CVS Sync
+   - djm@cvs.openbsd.org 2009/02/17 01:28:32
+     [ssh_config]
+     sync with revised default ciphers; pointed out by dkrause@
+   - djm@cvs.openbsd.org 2009/02/18 04:31:21
+     [schnorr.c]
+     signature should hash over the entire group, not just the generator
+     (this is still disabled code)
+ - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
+   [contrib/suse/openssh.spec] Prepare for 5.2p1
+
+20090216
+ - (djm) [regress/conch-ciphers.sh regress/putty-ciphers.sh]
+   [regress/putty-kex.sh regress/putty-transfer.sh] Downgrade disabled
+   interop tests from FATAL error to a warning. Allows some interop
+   tests to proceed if others are missing necessary prerequisites.
+ - (djm) [configure.ac] support GNU/kFreeBSD and GNU/kOpensolaris
+   systems; patch from Aurelien Jarno via rmh AT aybabtu.com
+
+20090214
+ - (djm) OpenBSD CVS Sync
+   - dtucker@cvs.openbsd.org 2009/02/02 11:15:14
+     [sftp.c]
+     Initialize a few variables to prevent spurious "may be used
+     uninitialized" warnings from newer gcc's.  ok djm@
+   - djm@cvs.openbsd.org 2009/02/12 03:00:56
+     [canohost.c canohost.h channels.c channels.h clientloop.c readconf.c]
+     [readconf.h serverloop.c ssh.c]
+     support remote port forwarding with a zero listen port (-R0:...) to
+     dyamically allocate a listen port at runtime (this is actually
+     specified in rfc4254); bz#1003 ok markus@
+   - djm@cvs.openbsd.org 2009/02/12 03:16:01
+     [serverloop.c]
+     tighten check for -R0:... forwarding: only allow dynamic allocation
+     if want_reply is set in the packet
+   - djm@cvs.openbsd.org 2009/02/12 03:26:22
+     [monitor.c]
+     some paranoia: check that the serialised key is really KEY_RSA before
+     diddling its internals
+   - djm@cvs.openbsd.org 2009/02/12 03:42:09
+     [ssh.1]
+     document -R0:... usage
+   - djm@cvs.openbsd.org 2009/02/12 03:44:25
+     [ssh.1]
+     consistency: Dq => Ql
+   - djm@cvs.openbsd.org 2009/02/12 03:46:17
+     [ssh_config.5]
+     document RemoteForward usage with 0 listen port
+   - jmc@cvs.openbsd.org 2009/02/12 07:34:20
+     [ssh_config.5]
+     kill trailing whitespace;
+   - markus@cvs.openbsd.org 2009/02/13 11:50:21
+     [packet.c]
+     check for enc !=NULL in packet_start_discard
+   - djm@cvs.openbsd.org 2009/02/14 06:35:49
+     [PROTOCOL]
+     mention that eow and no-more-sessions extensions are sent only to
+     OpenSSH peers
+
+20090212
+ - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically
+   set ownership and modes, so avoid explicitly setting them
+ - (djm) [configure.ac loginrec.c] bz#1421: fix lastlog support for OSX.
+   OSX provides a getlastlogxbyname function that automates the reading of
+   a lastlog file. Also, the pututxline function will update lastlog so
+   there is no need for loginrec.c to do it explicitly. Collapse some
+   overly verbose code while I'm in there.
+
+20090201
+ - (dtucker) [defines.h sshconnect.c] INET6_ADDRSTRLEN is now needed in
+   channels.c too, so move the definition for non-IP6 platforms to defines.h
+   where it can be shared.
+
+20090129
+ - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
+   If the CYGWIN environment variable is empty, the installer script
+   should not install the service with an empty CYGWIN variable, but
+   rather without setting CYGWNI entirely.
+ - (tim) [contrib/cygwin/ssh-host-config] Whitespace cleanup. No code changes.
+
+20090128
+ - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
+   Changes to work on Cygwin 1.5.x as well as on the new Cygwin 1.7.x.
+   The information given for the setting of the CYGWIN environment variable
+   is wrong for both releases so I just removed it, together with the
+   unnecessary (Cygwin 1.5.x) or wrong (Cygwin 1.7.x) default setting.
+
+20081228
+ - (djm) OpenBSD CVS Sync
+   - stevesk@cvs.openbsd.org 2008/12/09 03:20:42
+     [channels.c servconf.c]
+     channel_print_adm_permitted_opens() should deal with all the printing
+     for that config option.  suggested by markus@; ok markus@ djm@
+     dtucker@
+   - djm@cvs.openbsd.org 2008/12/09 04:32:22
+     [auth2-chall.c]
+     replace by-hand string building with xasprinf(); ok deraadt@
+   - sobrado@cvs.openbsd.org 2008/12/09 15:35:00
+     [sftp.1 sftp.c]
+     update for the synopses displayed by the 'help' command, there are a
+     few missing flags; add 'bye' to the output of 'help'; sorting and spacing.
+     jmc@ suggested replacing .Oo/.Oc with a single .Op macro.
+     ok jmc@
+   - stevesk@cvs.openbsd.org 2008/12/09 22:37:33
+     [clientloop.c]
+     fix typo in error message
+   - stevesk@cvs.openbsd.org 2008/12/10 03:55:20
+     [addrmatch.c]
+     o cannot be NULL here but use xfree() to be consistent; ok djm@
+   - stevesk@cvs.openbsd.org 2008/12/29 01:12:36
+     [ssh-keyscan.1]
+     fix example, default key type is rsa for 3+ years; from
+     frederic.perrin@resel.fr
+   - stevesk@cvs.openbsd.org 2008/12/29 02:23:26
+     [pathnames.h]
+     no need to escape single quotes in comments
+   - okan@cvs.openbsd.org 2008/12/30 00:46:56
+     [sshd_config.5]
+     add AllowAgentForwarding to available Match keywords list
+     ok djm
+   - djm@cvs.openbsd.org 2009/01/01 21:14:35
+     [channels.c]
+     call channel destroy callbacks on receipt of open failure messages.
+     fixes client hangs when connecting to a server that has MaxSessions=0
+     set spotted by imorgan AT nas.nasa.gov; ok markus@
+   - djm@cvs.openbsd.org 2009/01/01 21:17:36
+     [kexgexs.c]
+     fix hash calculation for KEXGEX: hash over the original client-supplied
+     values and not the sanity checked versions that we acutally use;
+     bz#1540 reported by john.smith AT arrows.demon.co.uk
+     ok markus@
+   - djm@cvs.openbsd.org 2009/01/14 01:38:06
+     [channels.c]
+     support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482;
+     "looks ok" markus@
+   - stevesk@cvs.openbsd.org 2009/01/15 17:38:43
+     [readconf.c]
+     1) use obsolete instead of alias for consistency
+     2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is
+        so move the comment.
+     3) reorder so like options are together
+     ok djm@
+   - djm@cvs.openbsd.org 2009/01/22 09:46:01
+     [channels.c channels.h session.c]
+     make Channel->path an allocated string, saving a few bytes here and
+     there and fixing bz#1380 in the process; ok markus@
+   - djm@cvs.openbsd.org 2009/01/22 09:49:57
+     [channels.c]
+     oops! I committed the wrong version of the Channel->path diff,
+     it was missing some tweaks suggested by stevesk@
+   - djm@cvs.openbsd.org 2009/01/22 10:02:34
+     [clientloop.c misc.c readconf.c readconf.h servconf.c servconf.h]
+     [serverloop.c ssh-keyscan.c ssh.c sshd.c]
+     make a2port() return -1 when it encounters an invalid port number
+     rather than 0, which it will now treat as valid (needed for future work)
+     adjust current consumers of a2port() to check its return value is <= 0,
+     which in turn required some things to be converted from u_short => int
+     make use of int vs. u_short consistent in some other places too
+     feedback & ok markus@
+   - djm@cvs.openbsd.org 2009/01/22 10:09:16
+     [auth-options.c]
+     another chunk of a2port() diff that got away. wtfdjm??
+   - djm@cvs.openbsd.org 2009/01/23 07:58:11
+     [myproposal.h]
+     prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC
+     modes; ok markus@
+   - naddy@cvs.openbsd.org 2009/01/24 17:10:22
+     [ssh_config.5 sshd_config.5]
+     sync list of preferred ciphers; ok djm@
+   - markus@cvs.openbsd.org 2009/01/26 09:58:15
+     [cipher.c cipher.h packet.c]
+     Work around the CPNI-957037 Plaintext Recovery Attack by always
+     reading 256K of data on packet size or HMAC errors (in CBC mode only).
+     Help, feedback and ok djm@
+     Feedback from Martin Albrecht and Paterson Kenny
+
+20090107
+ - (djm) [uidswap.c] bz#1412: Support >16 supplemental groups in OS X.
+   Patch based on one from vgiffin AT apple.com; ok dtucker@
+ - (djm) [channels.c] bz#1419: support "on demand" X11 forwarding via
+   launchd on OS X; patch from vgiffin AT apple.com, slightly tweaked;
+   ok dtucker@
+ - (djm) [contrib/ssh-copy-id.1 contrib/ssh-copy-id] bz#1492: Make
+   ssh-copy-id copy id_rsa.pub by default (instead of the legacy "identity"
+   key). Patch from cjwatson AT debian.org
+
+20090107
+ - (tim) [configure.ac defines.h openbsd-compat/port-uw.c
+   openbsd-compat/xcrypt.c] Add SECUREWARE support to OpenServer 6 SVR5 ABI.
+   OK djm@ dtucker@
+ - (tim) [configure.ac] Move check_for_libcrypt_later=1 in *-*-sysv5*) section.
+   OpenServer 6 doesn't need libcrypt.
+
+20081209
+ - (djm) OpenBSD CVS Sync
+   - djm@cvs.openbsd.org 2008/12/09 02:38:18
+     [clientloop.c]
+     The ~C escape handler does not work correctly for multiplexed sessions -
+     it opens a commandline on the master session, instead of on the slave
+     that requested it. Disable it on slave sessions until such time as it
+     is fixed; bz#1543 report from Adrian Bridgett via Colin Watson
+     ok markus@
+   - djm@cvs.openbsd.org 2008/12/09 02:39:59
+     [sftp.c]
+     Deal correctly with failures in remote stat() operation in sftp,
+     correcting fail-on-error behaviour in batchmode. bz#1541 report and
+     fix from anedvedicky AT gmail.com; ok markus@
+   - djm@cvs.openbsd.org 2008/12/09 02:58:16
+     [readconf.c]
+     don't leave junk (free'd) pointers around in Forward *fwd argument on
+     failure; avoids double-free in ~C -L handler when given an invalid
+     forwarding specification; bz#1539 report from adejong AT debian.org
+     via Colin Watson; ok markus@ dtucker@
+   - djm@cvs.openbsd.org 2008/12/09 03:02:37
+     [sftp.1 sftp.c]
+     correct sftp(1) and corresponding usage syntax;
+     bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@
+
+20081208
+ - (djm) [configure.ac] bz#1538: better test for ProPolice/SSP: actually
+   use some stack in main().
+   Report and suggested fix from vapier AT gentoo.org
+ - (djm) OpenBSD CVS Sync
+   - markus@cvs.openbsd.org 2008/12/02 19:01:07
+     [clientloop.c]
+     we have to use the recipient's channel number (RFC 4254) for
+     SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages,
+     otherwise we trigger 'Non-public channel' error messages on sshd
+     systems with clientkeepalive enabled; noticed by sturm; ok djm;
+   - markus@cvs.openbsd.org 2008/12/02 19:08:59
+     [serverloop.c]
+     backout 1.149, since it's not necessary and openssh clients send
+     broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
+   - markus@cvs.openbsd.org 2008/12/02 19:09:38
+     [channels.c]
+     s/remote_id/id/ to be more consistent with other code; ok djm@
+
+20081201
+ - (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}]  Add new doc files
+   and tweak the is-sshd-running check in ssh-host-config.  Patch from
+   vinschen at redhat com.
+ - (dtucker) OpenBSD CVS Sync
+   - markus@cvs.openbsd.org 2008/11/21 15:47:38
+     [packet.c]
+     packet_disconnect() on padding error, too.  should reduce the success
+     probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18
+     ok djm@
+   - dtucker@cvs.openbsd.org 2008/11/30 11:59:26
+     [monitor_fdpass.c]
+     Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@
+
+20081123
+ - (dtucker) [monitor_fdpass.c] Reduce diff vs OpenBSD by moving some
+    declarations, removing an unnecessary union member and adding whitespace.
+    cmsgbuf.tmp thing spotted by des at des no, ok djm some time ago.
+
+20081118
+ - (tim) [addrmatch.c configure.ac] Some platforms do not have sin6_scope_id
+   member of sockaddr_in6. Also reported in Bug 1491 by David Leonard. OK and
+   feedback by djm@
+
+20081111
+ - (dtucker) OpenBSD CVS Sync
+   - jmc@cvs.openbsd.org 2008/11/05 11:22:54
+     [servconf.c]
+     passord -> password;
+     fixes user/5975 from Rene Maroufi
+   - stevesk@cvs.openbsd.org 2008/11/07 00:42:12
+     [ssh-keygen.c]
+     spelling/typo in comment
+   - stevesk@cvs.openbsd.org 2008/11/07 18:50:18
+     [nchan.c]
+     add space to some log/debug messages for readability; ok djm@ markus@
+   - dtucker@cvs.openbsd.org 2008/11/07 23:34:48
+     [auth2-jpake.c]
+     Move JPAKE define to make life easier for portable.  ok djm@
+   - tobias@cvs.openbsd.org 2008/11/09 12:34:47
+     [session.c ssh.1]
+     typo fixed (overriden -> overridden)
+     ok espie, jmc
+   - stevesk@cvs.openbsd.org 2008/11/11 02:58:09
+     [servconf.c]
+     USE_AFS not referenced so remove #ifdef.  fixes sshd -T not printing
+     kerberosgetafstoken. ok dtucker@
+     (Id sync only, we still want the ifdef in portable)
+   - stevesk@cvs.openbsd.org 2008/11/11 03:55:11
+     [channels.c]
+     for sshd -T print 'permitopen any' vs. 'permitopen' for case of no
+     permitopen's; ok and input dtucker@
+   - djm@cvs.openbsd.org 2008/11/10 02:06:35
+     [regress/putty-ciphers.sh]
+     PuTTY supports AES CTR modes, so interop test against them too
+
+20081105
+ - OpenBSD CVS Sync
+   - djm@cvs.openbsd.org 2008/11/03 08:59:41
+     [servconf.c]
+     include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.gov
+   - djm@cvs.openbsd.org 2008/11/04 07:58:09
+     [auth.c]
+     need unistd.h for close() prototype
+     (ID sync only)
+   - djm@cvs.openbsd.org 2008/11/04 08:22:13
+     [auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h]
+     [readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5]
+     [sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c]
+     [Makefile.in]
+     Add support for an experimental zero-knowledge password authentication
+     method using the J-PAKE protocol described in F. Hao, P. Ryan,
+     "Password Authenticated Key Exchange by Juggling", 16th Workshop on
+     Security Protocols, Cambridge, April 2008.
+     
+     This method allows password-based authentication without exposing
+     the password to the server. Instead, the client and server exchange
+     cryptographic proofs to demonstrate of knowledge of the password while
+     revealing nothing useful to an attacker or compromised endpoint.
+     
+     This is experimental, work-in-progress code and is presently
+     compiled-time disabled (turn on -DJPAKE in Makefile.inc).
+     
+     "just commit it.  It isn't too intrusive." deraadt@
+   - stevesk@cvs.openbsd.org 2008/11/04 19:18:00
+     [readconf.c]
+     because parse_forward() is now used to parse all forward types (DLR),
+     and it malloc's space for host variables, we don't need to malloc
+     here.  fixes small memory leaks.
+     
+     previously dynamic forwards were not parsed in parse_forward() and
+     space was not malloc'd in that case.
+     
+     ok djm@
+   - stevesk@cvs.openbsd.org 2008/11/05 03:23:09
+     [clientloop.c ssh.1]
+     add dynamic forward escape command line; ok djm@
+
+20081103
+ - OpenBSD CVS Sync
+   - sthen@cvs.openbsd.org 2008/07/24 23:55:30
+     [ssh-keygen.1]
+     Add "ssh-keygen -F -l" to synopsis (displays fingerprint from
+     known_hosts).  ok djm@
+   - grunk@cvs.openbsd.org 2008/07/25 06:56:35
+     [ssh_config]
+     Add VisualHostKey to example file, ok djm@
+   - grunk@cvs.openbsd.org 2008/07/25 07:05:16
+     [key.c]
+     In random art visualization, make sure to use the end marker only at the
+     end.  Initial diff by Dirk Loss, tweaks and ok djm@
+  - markus@cvs.openbsd.org 2008/07/31 14:48:28
+     [sshconnect2.c]
+     don't allocate space for empty banners; report t8m at centrum.cz;
+     ok deraadt
+   - krw@cvs.openbsd.org 2008/08/02 04:29:51
+     [ssh_config.5]
+     whitepsace -> whitespace. From Matthew Clarke via bugs@.
+   - djm@cvs.openbsd.org 2008/08/21 04:09:57
+     [session.c]
+     allow ForceCommand internal-sftp with arguments. based on patch from
+     michael.barabanov AT gmail.com; ok markus@
+   - djm@cvs.openbsd.org 2008/09/06 12:24:13
+     [kex.c]
+     OpenSSL 0.9.8h supplies a real EVP_sha256 so we do not need our
+     replacement anymore
+     (ID sync only for portable - we still need this)
+   - markus@cvs.openbsd.org 2008/09/11 14:22:37
+     [compat.c compat.h nchan.c ssh.c]
+     only send eow and no-more-sessions requests to openssh 5 and newer;
+     fixes interop problems with broken ssh v2 implementations; ok djm@
+   - millert@cvs.openbsd.org 2008/10/02 14:39:35
+     [session.c]
+     Convert an unchecked strdup to xstrdup.  OK deraadt@
+  - jmc@cvs.openbsd.org 2008/10/03 13:08:12
+     [sshd.8]
+     do not give an example of how to chmod files: we can presume the user
+     knows that. removes an ambiguity in the permission of authorized_keys;
+     ok deraadt
+   - deraadt@cvs.openbsd.org 2008/10/03 23:56:28
+     [sshconnect2.c]
+     Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the
+     function.
+     spotted by des@freebsd, who commited an incorrect fix to the freebsd tree
+     and (as is fairly typical) did not report the problem to us.  But this fix
+     is correct.
+     ok djm
+   - djm@cvs.openbsd.org 2008/10/08 23:34:03
+     [ssh.1 ssh.c]
+     Add -y option to force logging via syslog rather than stderr.
+     Useful for daemonised ssh connection (ssh -f). Patch originally from
+     and ok'd by markus@
+   - djm@cvs.openbsd.org 2008/10/09 03:50:54
+     [servconf.c sshd_config.5]
+     support setting PermitEmptyPasswords in a Match block
+     requested in PR3891; ok dtucker@
+   - jmc@cvs.openbsd.org 2008/10/09 06:54:22
+     [ssh.c]
+     add -y to usage();
+   - stevesk@cvs.openbsd.org 2008/10/10 04:55:16
+     [scp.c]
+     spelling in comment; ok djm@
+   - stevesk@cvs.openbsd.org 2008/10/10 05:00:12
+     [key.c]
+     typo in error message; ok djm@
+   - stevesk@cvs.openbsd.org 2008/10/10 16:43:27
+     [ssh_config.5]
+     use 'Privileged ports can be forwarded only when logging in as root on
+     the remote machine.' for RemoteForward just like ssh.1 -R.
+     ok djm@ jmc@
+   - stevesk@cvs.openbsd.org 2008/10/14 18:11:33
+     [sshconnect.c]
+     use #define ROQUIET here; no binary change. ok dtucker@
+   - stevesk@cvs.openbsd.org 2008/10/17 18:36:24
+     [ssh_config.5]
+     correct and clarify VisualHostKey; ok jmc@
+   - stevesk@cvs.openbsd.org 2008/10/30 19:31:16
+     [clientloop.c sshd.c]
+     don't need to #include "monitor_fdpass.h"
+   - stevesk@cvs.openbsd.org 2008/10/31 15:05:34
+     [dispatch.c]
+     remove unused #define DISPATCH_MIN; ok markus@
+   - djm@cvs.openbsd.org 2008/11/01 04:50:08
+     [sshconnect2.c]
+     sprinkle ARGSUSED on dispatch handlers
+     nuke stale unusued prototype
+   - stevesk@cvs.openbsd.org 2008/11/01 06:43:33
+     [channels.c]
+     fix some typos in log messages; ok djm@
+   - sobrado@cvs.openbsd.org 2008/11/01 11:14:36
+     [ssh-keyscan.1 ssh-keyscan.c]
+     the ellipsis is not an optional argument; while here, improve spacing.
+   - stevesk@cvs.openbsd.org 2008/11/01 17:40:33
+     [clientloop.c readconf.c readconf.h ssh.c]
+     merge dynamic forward parsing into parse_forward();
+     'i think this is OK' djm@
+   - stevesk@cvs.openbsd.org 2008/11/02 00:16:16
+     [ttymodes.c]
+     protocol 2 tty modes support is now 7.5 years old so remove these
+     debug3()s; ok deraadt@
+   - stevesk@cvs.openbsd.org 2008/11/03 01:07:02
+     [readconf.c]
+     remove valueless comment
+   - stevesk@cvs.openbsd.org 2008/11/03 02:44:41
+     [readconf.c]
+     fix comment
+ - (djm) [contrib/caldera/ssh-host-keygen contrib/suse/rc.sshd]
+   Make example scripts generate keys with default sizes rather than fixed,
+   non-default 1024 bits; patch from imorgan AT nas.nasa.gov
+ - (djm) [contrib/sshd.pam.generic contrib/caldera/sshd.pam]
+   [contrib/redhat/sshd.pam] Move pam_nologin to account group from
+   incorrect auth group in example files;
+   patch from imorgan AT nas.nasa.gov
+
+20080906
+ - (dtucker) [config.guess config.sub] Update to latest versions from
+   http://git.savannah.gnu.org/gitweb/ (2008-04-14 and 2008-06-16
+   respectively).
+
+20080830
+ - (dtucker) [openbsd-compat/bsd-poll.c] correctly check for number of FDs
+   larger than FD_SETSIZE (OpenSSH only ever uses poll with one fd).  Patch
+   from Nicholas Marriott.
+
+20080721
+ - (djm) OpenBSD CVS Sync
+   - djm@cvs.openbsd.org 2008/07/23 07:36:55
+     [servconf.c]
+     do not try to print options that have been compile-time disabled
+     in config test mode (sshd -T); report from nix-corp AT esperi.org.uk
+     ok dtucker@
+ - (djm) [servconf.c] Print UsePAM option in config test mode (when it
+   has been compiled in); report from nix-corp AT esperi.org.uk
+   ok dtucker@
+
 20080721
  - (djm) OpenBSD CVS Sync
    - jmc@cvs.openbsd.org 2008/07/18 22:51:01
@@ -873,3841 +1367,3 @@
    [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
  - (djm) [README] Update link to release notes
  - (djm) Release 5.0p1
-
-20080315
- - (djm) [regress/test-exec.sh] Quote putty-related variables in case they are
-   empty; report and patch from Peter Stuge
- - (djm) [regress/test-exec.sh] Silence noise from detection of putty
-   commands; report from Peter Stuge
- - (djm) [session.c] Relocate incorrectly-placed closefrom() that was causing
-   crashes when used with ChrootDirectory
-
-
-20080327
- - (dtucker) Cache selinux status earlier so we know if it's enabled after a
-   chroot.  Allows ChrootDirectory to work with selinux support compiled in
-   but not enabled.  Using it with selinux enabled will require some selinux
-   support inside the chroot.  "looks sane" djm@
- - (djm) Fix RCS ident in sftp-server-main.c
- - (djm) OpenBSD CVS sync:
-   - jmc@cvs.openbsd.org 2008/02/11 07:58:28
-     [ssh.1 sshd.8 sshd_config.5]
-     bump Mdocdate for pages committed in "febuary", necessary because
-     of a typo in rcs.c;
-   - deraadt@cvs.openbsd.org 2008/03/13 01:49:53
-     [monitor_fdpass.c]
-     Correct CMSG_SPACE and CMSG_LEN usage everywhere in the tree. Due to
-     an extensive discussion with otto, kettenis, millert, and hshoexer
-   - deraadt@cvs.openbsd.org 2008/03/15 16:19:02
-     [monitor_fdpass.c]
-     Repair the simple cases for msg_controllen where it should just be
-     CMSG_SIZE(sizeof(int)), not sizeof(buffer) which may be larger because
-     of alignment; ok kettenis hshoexer
-   - djm@cvs.openbsd.org 2008/03/23 12:54:01
-     [sftp-client.c]
-     prefer POSIX-style file renaming over filexfer rename behaviour if the
-     server supports the posix-rename@openssh.com extension.
-     Note that the old (filexfer) behaviour would refuse to clobber an
-     existing file. Users who depended on this should adjust their sftp(1)
-     usage.
-     ok deraadt@ markus@
-   - deraadt@cvs.openbsd.org 2008/03/24 16:11:07
-     [monitor_fdpass.c]
-     msg_controllen has to be CMSG_SPACE so that the kernel can account for
-     each cmsg_len (ie. msg_controllen = sum of CMSG_ALIGN(cmsg_len).  This
-     works now that kernel fd passing has been fixed to accept a bit of
-     sloppiness because of this ABI repair.
-     lots of discussion with kettenis
-   - djm@cvs.openbsd.org 2008/03/25 11:58:02
-     [session.c sshd_config.5]
-     ignore ~/.ssh/rc if a sshd_config ForceCommand is specified;
-     from dtucker@ ok deraadt@ djm@
-   - djm@cvs.openbsd.org 2008/03/25 23:01:41
-     [session.c]
-     last patch had backwards test; spotted by termim AT gmail.com
-   - djm@cvs.openbsd.org 2008/03/26 21:28:14
-     [auth-options.c auth-options.h session.c sshd.8]
-     add no-user-rc authorized_keys option to disable execution of ~/.ssh/rc
-   - djm@cvs.openbsd.org 2008/03/27 00:16:49
-     [version.h]
-     openssh-4.9
-   - djm@cvs.openbsd.org 2008/03/24 21:46:54
-     [regress/sftp-badcmds.sh]
-     disable no-replace rename test now that we prefer a POSIX rename; spotted
-     by dkrause@
- - (djm) [configure.ac] fix alignment of --without-stackprotect description
- - (djm) [configure.ac] --with-selinux too
- - (djm) [regress/Makefile] cleanup PuTTY interop test droppings
- - (djm) [README] Update link to release notes
- - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
-   [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
- - (djm) Release 4.9p1
-
-20080315
- - (djm) [regress/test-exec.sh] Quote putty-related variables in case they are
-   empty; report and patch from Peter Stuge
- - (djm) [regress/test-exec.sh] Silence noise from detection of putty
-   commands; report from Peter Stuge
- - (djm) [session.c] Relocate incorrectly-placed closefrom() that was causing
-   crashes when used with ChrootDirectory
-
-20080314
- - (tim) [regress/sftp-cmds.sh] s/cd/lcd/ in lls test. Reported by
-   vinschen at redhat.com. Add () to put echo commands in subshell for lls test
-   I mistakenly left out of last commit.
- - (tim) [regress/localcommand.sh] Shell portability fix. Reported by imorgan at
-   nas.nasa.gov
-
-20080313
- - (djm) [Makefile.in regress/Makefile] Fix interop-tests target (note to
-   self: make changes to Makefile.in next time, not the generated Makefile).
- - (djm) [Makefile.in regress/test-exec.sh] Find installed plink(1) and
-   puttygen(1) by $PATH
- - (tim) [scp.c] Use poll.h if available, fall back to sys/poll.h if not. Patch
-   by vinschen at redhat.com.
- - (tim) [regress/sftp-cmds.sh regress/ssh2putty.sh] Shell portability fixes
-   from vinschen at redhat.com and imorgan at nas.nasa.gov
-
-20080312
- - (djm) OpenBSD CVS Sync
-   - dtucker@cvs.openbsd.org 2007/10/29 06:57:13
-     [regress/Makefile regress/localcommand.sh]
-     Add simple regress test for LocalCommand; ok djm@
-   - jmc@cvs.openbsd.org 2007/11/25 15:35:09
-     [regress/agent-getpeereid.sh regress/agent.sh]
-     more existant -> existent, from Martynas Venckus;
-     pfctl changes: ok henning
-     ssh changes: ok deraadt
-   - djm@cvs.openbsd.org 2007/12/12 05:04:03
-     [regress/sftp-cmds.sh]
-     unbreak lls command and add a regress test that would have caught the
-     breakage; spotted by mouring@
-     NB. sftp code change already committed.
-   - djm@cvs.openbsd.org 2007/12/21 04:13:53
-     [regress/Makefile regress/test-exec.sh regress/putty-ciphers.sh]
-     [regress/putty-kex.sh regress/putty-transfer.sh regress/ssh2putty.sh]
-     basic (crypto, kex and transfer) interop regression tests against putty
-     To run these, install putty and run "make interop-tests" from the build
-     directory - the tests aren't run by default yet.
-
-20080311
- - (dtucker) [auth-pam.c monitor.c session.c sshd.c] Bug #926: Move
-   pam_open_session and pam_close_session into the privsep monitor, which
-   will ensure that pam_session_close is called as root.  Patch from Tomas
-   Mraz.
-
-20080309
- - (dtucker) [configure.ac] It turns out gcc's -fstack-protector-all doesn't
-   always work for all platforms and versions, so test what we can and
-   add a configure flag to turn it of if needed.  ok djm@
- - (dtucker) [openbsd-compat/port-aix.{c,h}] Remove AIX specific initgroups
-   implementation.  It's not needed to fix bug #1081 and breaks the build
-   on some AIX configurations.
- - (dtucker) [openbsd-compat/regress/strtonumtest.c] Bug #1347: Use platform's
-   equivalent of LLONG_MAX for the compat regression tests, which makes them
-   run on AIX and HP-UX.  Patch from David Leonard.
- - (dtucker) [configure.ac] Run stack-protector tests with -Werror to catch
-   platforms where gcc understands the option but it's not supported (and
-   thus generates a warning).
-
-20080307
- - (djm) OpenBSD CVS Sync
-   - jmc@cvs.openbsd.org 2008/02/11 07:58:28
-     [ssh.1 sshd.8 sshd_config.5]
-     bump Mdocdate for pages committed in "febuary", necessary because
-     of a typo in rcs.c;
-   - djm@cvs.openbsd.org 2008/02/13 22:38:17
-     [servconf.h session.c sshd.c]
-     rekey arc4random and OpenSSL RNG in postauth child
-     closefrom fds > 2 before shell/command execution
-     ok markus@
-   - mbalmer@cvs.openbsd.org 2008/02/14 13:10:31
-     [sshd.c]
-     When started in configuration test mode (-t) do not check that sshd is
-     being started with an absolute path.
-     ok djm
-   - markus@cvs.openbsd.org 2008/02/20 15:25:26
-     [session.c]
-     correct boolean encoding for coredump; der Mouse via dugsong
-   - djm@cvs.openbsd.org 2008/02/22 05:58:56
-     [session.c]
-     closefrom() call was too early, delay it until just before we execute
-     the user's rc files (if any).
-   - dtucker@cvs.openbsd.org 2008/02/22 20:44:02
-     [clientloop.c packet.c packet.h serverloop.c]
-     Allow all SSH2 packet types, including UNIMPLEMENTED to reset the
-     keepalive timer (bz #1307).  ok markus@
-   - djm@cvs.openbsd.org 2008/02/27 20:21:15
-     [sftp-server.c]
-     add an extension method "posix-rename@openssh.com" to perform POSIX atomic
-     rename() operations. based on patch from miklos AT szeredi.hu in bz#1400;
-     ok dtucker@ markus@
-   - deraadt@cvs.openbsd.org 2008/03/02 18:19:35
-     [monitor_fdpass.c]
-     use a union to ensure alignment of the cmsg (pay attention: various other
-     parts of the tree need this treatment too); ok djm
-   - deraadt@cvs.openbsd.org 2008/03/04 21:15:42
-     [version.h]
-     crank version; from djm
- - (tim) [regress/sftp-glob.sh] Shell portability fix.
-
-20080302
- - (dtucker) [configure.ac] FreeBSD's glob() doesn't behave the way we expect
-   either, so use our own.
-
-20080229
- - (dtucker) [openbsd-compat/bsd-poll.c] We don't check for select(2) in
-   configure (and there's not much point, as openssh won't work without it)
-   so HAVE_SELECT is not defined and the poll(2) compat code doesn't get
-   built in.  Remove HAVE_SELECT so we can build on platforms without poll.
- - (dtucker) [scp.c] Include sys/poll.h inside HAVE_SYS_POLL_H.
- - (djm) [contrib/gnome-ssh-askpass2.h] Keep askpass windown on top. From
-   Debian patch via bernd AT openbsd.org
-
-20080228
- - (dtucker) [configure.ac] Add -fstack-protector to LDFLAGS too, fixes
-   linking problems on AIX with gcc 4.1.x.
- - (dtucker) [includes.h ssh-add.c ssh-agent.c ssh-keygen.c ssh.c sshd.c
-   openbsd-compat/openssl-compat.{c,h}] Bug #1437 Move the OpenSSL compat
-   header to after OpenSSL headers, since some versions of OpenSSL have
-   SSLeay_add_all_algorithms as a macro already.
- - (dtucker) [key.c defines.h openbsd-compat/openssl-compat.h] Move old OpenSSL
-   compat glue into openssl-compat.h.
- - (dtucker) [configure.ac openbsd-compat/port-aix.{c,h}] Bug #1081: Implement
-   getgrouplist via getgrset on AIX, rather than iterating over getgrent.
-   This allows, eg, Match and AllowGroups directives to work with NIS and
-   LDAP groups.
- - (dtucker) [sshd.c] Bug #1042: make log messages for tcpwrappers use the
-   same SyslogFacility as the rest of sshd.  Patch from William Knox,
-   ok djm@.
-
-20080225
- - (dtucker) [openbsd-compat/fake-rfc2553.h] rename ssh_gai_strerror hack
-   since it now conflicts with the helper function in misc.c.  From
-   vinschen AT redhat.com.
- - (dtucker) [configure.ac audit-bsm.c] Bug #1420: Add a local implementation
-   of aug_get_machine for systems that don't have their own (eg OS X, FreeBSD).
-   Help and testing from csjp at FreeBSD org, vgiffin at apple com.  ok djm@
- - (dtucker) [includes.h openbsd-compat/openssl-compat.c] Bug #1437: reshuffle
-   headers so ./configure --with-ssl-engine actually works.  Patch from
-   Ian Lister.
-
-20080224
- - (tim) [contrib/cygwin/ssh-host-config]
-   Grammar changes on SYSCONFDIR LOCALSTATEDIR messages.
-   Check more thoroughly that it's possible to create the /var/empty directory.
-   Patch by vinschen AT redhat.com
-
-20080210
- - OpenBSD CVS Sync
-   - chl@cvs.openbsd.org 2008/01/11 07:22:28
-     [sftp-client.c sftp-client.h]
-     disable unused functions
-     initially from tobias@, but disabled them by placing them in
-     "#ifdef notyet" which was asked by djm@
-     ok djm@ tobias@
-   - djm@cvs.openbsd.org 2008/01/19 19:13:28
-     [ssh.1]
-     satisfy the pedants: -q does not suppress all diagnostic messages (e.g.
-     some commandline parsing warnings go unconditionally to stdout).
-   - djm@cvs.openbsd.org 2008/01/19 20:48:53
-     [clientloop.c]
-     fd leak on session multiplexing error path. Report and patch from
-     gregory_shively AT fanniemae.com
-   - djm@cvs.openbsd.org 2008/01/19 20:51:26
-     [ssh.c]
-     ignore SIGPIPE in multiplex client mode - we can receive this if the
-     server runs out of fds on us midway. Report and patch from
-     gregory_shively AT fanniemae.com
-   - djm@cvs.openbsd.org 2008/01/19 22:04:57
-     [sftp-client.c]
-     fix remote handle leak in do_download() local file open error path;
-     report and fix from sworley AT chkno.net
-   - djm@cvs.openbsd.org 2008/01/19 22:22:58
-     [ssh-keygen.c]
-     when hashing individual hosts (ssh-keygen -Hf hostname), make sure we
-     hash just the specified hostname and not the entire hostspec from the
-     keyfile. It may be of the form "hostname,ipaddr", which would lead to
-     a hash that never matches. report and fix from jp AT devnull.cz
-   - djm@cvs.openbsd.org 2008/01/19 22:37:19
-     [ssh-keygen.c]
-     unbreak line numbering (broken in revision 1.164), fix error message
-   - djm@cvs.openbsd.org 2008/01/19 23:02:40
-     [channels.c]
-     When we added support for specified bind addresses for port forwards, we
-     added a quirk SSH_OLD_FORWARD_ADDR. There is a bug in our handling of
-     this for -L port forwards that causes the client to listen on both v4
-     and v6 addresses when connected to a server with this quirk, despite
-     having set 0.0.0.0 as a bind_address.
-     report and patch from Jan.Pechanec AT Sun.COM; ok dtucker@
-   - djm@cvs.openbsd.org 2008/01/19 23:09:49
-     [readconf.c readconf.h sshconnect2.c]
-     promote rekeylimit to a int64 so it can hold the maximum useful limit
-     of 2^32; report and patch from Jan.Pechanec AT Sun.COM, ok dtucker@
-   - djm@cvs.openbsd.org 2008/01/20 00:38:30
-     [sftp.c]
-     When uploading, correctly handle the case of an unquoted filename with
-     glob metacharacters that match a file exactly but not as a glob, e.g. a
-     file called "[abcd]". report and test cases from duncan2nd AT gmx.de
-   - djm@cvs.openbsd.org 2008/01/21 17:24:30
-     [sftp-server.c]
-     Remove the fixed 100 handle limit in sftp-server and allocate as many
-     as we have available file descriptors. Patch from miklos AT szeredi.hu;
-     ok dtucker@ markus@
-   - djm@cvs.openbsd.org 2008/01/21 19:20:17
-     [sftp-client.c]
-     when a remote write error occurs during an upload, ensure that ACKs for
-     all issued requests are properly drained. patch from t8m AT centrum.cz
-   - dtucker@cvs.openbsd.org 2008/01/23 01:56:54
-     [clientloop.c packet.c serverloop.c]
-     Revert the change for bz #1307 as it causes connection aborts if an IGNORE
-     packet arrives while we're waiting in packet_read_expect (and possibly
-     elsewhere).
-   - jmc@cvs.openbsd.org 2008/01/31 20:06:50
-     [scp.1]
-     explain how to handle local file names containing colons;
-     requested by Tamas TEVESZ
-     ok dtucker
-   - markus@cvs.openbsd.org 2008/02/04 21:53:00
-     [session.c sftp-server.c sftp.h]
-     link sftp-server into sshd; feedback and ok djm@
-   - mcbride@cvs.openbsd.org 2008/02/09 12:15:43
-     [ssh.1 sshd.8]
-     Document the correct permissions for the ~/.ssh/ directory.
-     ok jmc
-   - djm@cvs.openbsd.org 2008/02/10 09:55:37
-     [sshd_config.5]
-     mantion that "internal-sftp" is useful with ForceCommand too
-   - djm@cvs.openbsd.org 2008/02/10 10:54:29
-     [servconf.c session.c]
-     delay ~ expansion for ChrootDirectory so it expands to the logged-in user's
-     home, rather than the user who starts sshd (probably root)
-
-20080119
- - (djm) Silence noice from expr in ssh-copy-id; patch from
-   mikel AT mikelward.com
- - (djm) Only listen for IPv6 connections on AF_INET6 sockets; patch from
-   tsr2600 AT gmail.com
-
-20080102
- - (dtucker) [configure.ac] Fix message for -fstack-protector-all test.
-
-20080101
- - (dtucker) OpenBSD CVS Sync
-   - dtucker@cvs.openbsd.org 2007/12/31 10:41:31
-     [readconf.c servconf.c]
-     Prevent strict-aliasing warnings on newer gcc versions.  bz #1355, patch
-     from Dmitry V. Levin, ok djm@
-   - dtucker@cvs.openbsd.org 2007/12/31 15:27:04
-     [sshd.c]
-     When in inetd mode, have sshd generate a Protocol 1 ephemeral server
-     key only for connections where the client chooses Protocol 1 as opposed
-     to when it's enabled in the server's config.  Speeds up Protocol 2
-     connections to inetd-mode servers that also allow Protocol 1.  bz #440,
-     based on a patch from bruno at wolff.to, ok markus@
-   - dtucker@cvs.openbsd.org 2008/01/01 08:47:04
-     [misc.c]
-     spaces -> tabs from my previous commit
-   - dtucker@cvs.openbsd.org 2008/01/01 09:06:39
-     [scp.c]
-     If scp -p encounters a pre-epoch timestamp, use the epoch which is
-     as close as we can get given that it's used unsigned.  Add a little
-     debugging while there.  bz #828, ok djm@
-   - dtucker@cvs.openbsd.org 2008/01/01 09:27:33
-     [sshd_config.5 servconf.c]
-     Allow PermitRootLogin in a Match block.  Allows for, eg, permitting root
-     only from the local network.  ok markus@, man page bit ok jmc@
-   - dtucker@cvs.openbsd.org 2008/01/01 08:51:20
-     [moduli]
-     Updated moduli file; ok djm@
-
-20071231
- - (dtucker) [configure.ac openbsd-compat/glob.{c,h}] Bug #1407: force use of
-   builtin glob implementation on Mac OS X.  Based on a patch from
-   vgiffin at apple.
-
-20071229
- - (dtucker) OpenBSD CVS Sync
-   - djm@cvs.openbsd.org 2007/12/12 05:04:03
-     [sftp.c]
-     unbreak lls command and add a regress test that would have caught the
-     breakage; spotted by mouring@
-   - dtucker@cvs.openbsd.org 2007/12/27 14:22:08
-     [servconf.c canohost.c misc.c channels.c sshconnect.c misc.h ssh-keyscan.c
-      sshd.c]
-     Add a small helper function to consistently handle the EAI_SYSTEM error
-     code of getaddrinfo.  Prompted by vgiffin at apple com via bz #1417.
-     ok markus@ stevesk@
-   - dtucker@cvs.openbsd.org 2007/12/28 15:32:24
-     [clientloop.c serverloop.c packet.c]
-     Make SSH2_MSG_UNIMPLEMENTED and SSH2_MSG_IGNORE messages reset the
-     ServerAlive and ClientAlive timers.  Prevents dropping a connection
-     when these are enabled but the peer does not support our keepalives.
-     bz #1307, ok djm@.
-   - dtucker@cvs.openbsd.org 2007/12/28 22:34:47
-     [clientloop.c]
-     Use the correct packet maximum sizes for remote port and agent forwarding.
-     Prevents the server from killing the connection if too much data is queued
-     and an excessively large packet gets sent.  bz #1360, ok djm@.
-
-20071202
- - (dtucker) [configure.ac] Enable -fstack-protector-all on systems where
-   gcc supports it.  ok djm@
- - (dtucker) [scp.c] Update $OpenBSD tag missing from rev 1.175 and remove
-   leftover debug code.
- - (dtucker) OpenBSD CVS Sync
-   - dtucker@cvs.openbsd.org 2007/10/29 00:52:45
-     [auth2-gss.c]
-     Allow build without -DGSSAPI; ok deraadt@
-     (Id sync only, Portable already has the ifdefs)
-   - dtucker@cvs.openbsd.org 2007/10/29 01:55:04
-     [ssh.c]
-     Plug tiny mem leaks in ControlPath and ProxyCommand option processing;
-     ok djm@
-   - dtucker@cvs.openbsd.org 2007/10/29 04:08:08
-     [monitor_wrap.c monitor.c]
-     Send config block back to slave for invalid users too so options
-     set by a Match block (eg Banner) behave the same for non-existent
-     users.  Found by and ok djm@
-   - dtucker@cvs.openbsd.org 2007/10/29 06:51:59
-     [ssh_config.5]
-     ProxyCommand and LocalCommand use the user's shell, not /bin/sh; ok djm@
-   - dtucker@cvs.openbsd.org 2007/10/29 06:54:50
-     [ssh.c]
-     Make LocalCommand work for Protocol 1 too; ok djm@
-   - jmc@cvs.openbsd.org 2007/10/29 07:48:19
-     [ssh_config.5]
-     clean up after previous macro removal;
-   - djm@cvs.openbsd.org 2007/11/03 00:36:14
-     [clientloop.c]
-     fix memory leak in process_cmdline(), patch from Jan.Pechanec AT Sun.COM;
-     ok dtucker@
-   - deraadt@cvs.openbsd.org 2007/11/03 01:24:06
-     [ssh.c]
-     bz #1377: getpwuid results were being clobbered by another getpw* call
-     inside tilde_expand_filename(); save the data we need carefully
-     ok djm
-   - dtucker@cvs.openbsd.org 2007/11/03 02:00:32
-     [ssh.c]
-     Use xstrdup/xfree when saving pwname and pwdir; ok deraadt@
-   - deraadt@cvs.openbsd.org 2007/11/03 02:03:49
-     [ssh.c]
-     avoid errno trashing in signal handler; ok dtucker
-
-20071030
- - (djm) OpenBSD CVS Sync
-   - djm@cvs.openbsd.org 2007/10/29 23:49:41
-     [openbsd-compat/sys-tree.h]
-     remove extra backslash at the end of RB_PROTOTYPE, report from
-     Jan.Pechanec AT Sun.COM; ok deraadt@
-
-20071026
- - (djm) OpenBSD CVS Sync
-   - stevesk@cvs.openbsd.org 2007/09/11 23:49:09
-     [sshpty.c]
-     remove #if defined block not needed; ok markus@ dtucker@
-     (NB. RCD ID sync only for portable)
-   - djm@cvs.openbsd.org 2007/09/21 03:05:23
-     [ssh_config.5]
-     document KbdInteractiveAuthentication in ssh_config.5;
-     patch from dkg AT fifthhorseman.net
-   - djm@cvs.openbsd.org 2007/09/21 08:15:29
-     [auth-bsdauth.c auth-passwd.c auth.c auth.h auth1.c auth2-chall.c]
-     [monitor.c monitor_wrap.c]
-     unifdef -DBSD_AUTH
-     unifdef -USKEY
-     These options have been in use for some years;
-     ok markus@ "no objection" millert@
-     (NB. RCD ID sync only for portable)
-   - canacar@cvs.openbsd.org 2007/09/25 23:48:57
-     [ssh-agent.c]
-     When adding a key that already exists, update the properties
-     (time, confirm, comment) instead of discarding them. ok djm@ markus@
-   - ray@cvs.openbsd.org 2007/09/27 00:15:57
-     [dh.c]
-     Don't return -1 on error in dh_pub_is_valid(), since it evaluates
-     to true.
-     Also fix a typo.
-     Initial diff from Matthew Dempsky, input from djm.
-     OK djm, markus.
-   - dtucker@cvs.openbsd.org 2007/09/29 00:25:51
-     [auth2.c]
-     Remove unused prototype.  ok djm@
-   - chl@cvs.openbsd.org 2007/10/02 17:49:58
-     [ssh-keygen.c]
-     handles zero-sized strings that fgets can return
-     properly removes trailing newline
-     removes an unused variable
-     correctly counts line number
-     "looks ok" ray@ markus@
-   - markus@cvs.openbsd.org 2007/10/22 19:10:24
-     [readconf.c]
-     make sure that both the local and remote port are correct when
-     parsing -L; Jan Pechanec (bz #1378)
-   - djm@cvs.openbsd.org 2007/10/24 03:30:02
-     [sftp.c]
-     rework argument splitting and parsing to cope correctly with common
-     shell escapes and make handling of escaped characters consistent
-     with sh(1) and between sftp commands (especially between ones that
-     glob their arguments and ones that don't).
-     parse command flags using getopt(3) rather than hand-rolled parsers.
-     ok dtucker@
-  - djm@cvs.openbsd.org 2007/10/24 03:44:02
-     [scp.c]
-     factor out network read/write into an atomicio()-like function, and
-     use it to handle short reads, apply bandwidth limits and update
-     counters. make network IO non-blocking, so a small trickle of
-     reads/writes has a chance of updating the progress meter; bz #799
-     ok dtucker@
-   - djm@cvs.openbsd.org 2006/08/29 09:44:00
-     [regress/sftp-cmds.sh]
-     clean up our mess
-   - markus@cvs.openbsd.org 2006/11/06 09:27:43
-     [regress/cfgmatch.sh]
-     fix quoting for non-(c)sh login shells.
-   - dtucker@cvs.openbsd.org 2006/12/13 08:36:36
-     [regress/cfgmatch.sh]
-     Additional test for multiple PermitOpen entries.  ok djm@
-   - pvalchev@cvs.openbsd.org 2007/06/07 19:41:46

*** DIFF OUTPUT TRUNCATED AT 1000 LINES ***



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200902241849.n1OInRVX073352>