History log of /openssh-portable/ (Results 101 - 125 of 10777)
Revision (<<< Hide revision tags) (Show revision tags >>>)Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
279261e127-Sep-2020 Damien Miller

update version numbers

58ca6ab627-Sep-2020 djm@openbsd.org

upstream: openssh 8.4

OpenBSD-Commit-ID: a29e5b372d2c00e297da8a35a3b87c9beb3b4a58

9bb8a30321-Sep-2020 Damien Miller

sync with upstream ssh-copy-id rev f0da1a1b7

0a4a557121-Sep-2020 djm@openbsd.org

upstream: close stdin when forking after authentication too; ok markus

OpenBSD-Commit-ID: 43db17e4abc3e6b4a7b033aa8cdab326a7cb6c24

d14fe25e20-Sep-2020 djm@openbsd.org

upstream: close stdout/stderr after "ssh -f ..." forking

bz#3137, ok markus

OpenBSD-Commit-ID: e2d83cc4dea1665651a7aa924ad1ed6bcaaab3e2

53a33a0d20-Sep-2020 Damien Miller

.depend

107eb3ee20-Sep-2020 djm@openbsd.org

upstream: cap channel input buffer size at 16MB; avoids high memory use

when peer advertises a large window but is slow to consume the data we send
(e.g. because of a slow network)

upstream: cap channel input buffer size at 16MB; avoids high memory use

when peer advertises a large window but is slow to consume the data we send
(e.g. because of a slow network)

reported by Pierre-Yves David

fix with & ok markus@

OpenBSD-Commit-ID: 1452771f5e5e768876d3bfe2544e3866d6ade216

show more ...

acfe2ac518-Sep-2020 Damien Miller

libfido2 1.5.0 is recommended

52a03e9f18-Sep-2020 djm@openbsd.org

upstream: handle multiple messages in a single read()

PR#183 by Dennis Kaarsemaker; feedback and ok markus@

OpenBSD-Commit-ID: 8570bb4d02d00cf70b98590716ea6a7d1cce68d1

dc09840518-Sep-2020 pedro martelletto

configure.ac: add missing includes

when testing, make sure to include the relevant header files that
declare the types of the functions used by the test:

- stdio.h for printf();

configure.ac: add missing includes

when testing, make sure to include the relevant header files that
declare the types of the functions used by the test:

- stdio.h for printf();
- stdlib.h for exit();
- string.h for strcmp();
- unistd.h for unlink(), _exit(), fork(), getppid(), sleep().

show more ...

b3855ff018-Sep-2020 djm@openbsd.org

upstream: tweak the client hostkey preference ordering algorithm to

prefer the default ordering if the user has a key that matches the
best-preference default algorithm.

feedbac

upstream: tweak the client hostkey preference ordering algorithm to

prefer the default ordering if the user has a key that matches the
best-preference default algorithm.

feedback and ok markus@

OpenBSD-Commit-ID: a92dd7d7520ddd95c0a16786a7519e6d0167d35f

show more ...

f93b187a18-Sep-2020 Damien Miller

control over the colours in gnome-ssh-askpass[23]

Optionally set the textarea colours via $GNOME_SSH_ASKPASS_FG_COLOR and
$GNOME_SSH_ASKPASS_BG_COLOR. These accept the usual three or six

control over the colours in gnome-ssh-askpass[23]

Optionally set the textarea colours via $GNOME_SSH_ASKPASS_FG_COLOR and
$GNOME_SSH_ASKPASS_BG_COLOR. These accept the usual three or six digit
hex colours.

show more ...

9d3d36bd18-Sep-2020 Damien Miller

focus improvement for gnome-ssh-askpass[23]

When serving a SSH_ASKPASS_PROMPT=none information dialog, ensure
then <enter> doesn't immediately close the dialog. Instead, require an
e

focus improvement for gnome-ssh-askpass[23]

When serving a SSH_ASKPASS_PROMPT=none information dialog, ensure
then <enter> doesn't immediately close the dialog. Instead, require an
explicit <tab> to reach the close button, or <esc>.

show more ...

d6f507f315-Sep-2020 dtucker@openbsd.org

upstream: Remove unused buf, last user was removed when switching

to the sshbuf API. Patch from Sebastian Andrzej Siewior.

OpenBSD-Commit-ID: 250fa17f0cec01039cc4abd95917d9746e24c889

c3c786c309-Sep-2020 djm@openbsd.org

upstream: For the hostkey confirmation message:

> Are you sure you want to continue connecting (yes/no/[fingerprint])?

compare the fingerprint case sensitively; spotted Patrik Lundi

upstream: For the hostkey confirmation message:

> Are you sure you want to continue connecting (yes/no/[fingerprint])?

compare the fingerprint case sensitively; spotted Patrik Lundin
ok dtucker

OpenBSD-Commit-ID: 73097afee1b3a5929324e345ba4a4a42347409f2

show more ...

f2950baf11-Sep-2020 Darren Tucker

New config-build-time dependency on automake.

600c1c2706-Sep-2020 Darren Tucker

Add aclocal.m4 and config.h.in~ to .gitignore.

aclocal.m4 is now generated by autoreconf.

4bf7e1d005-Sep-2020 Sebastian Andrzej Siewior

Quote the definition of OSSH_CHECK_HEADER_FOR_FIELD

autoreconf complains about underquoted definition of
OSSH_CHECK_HEADER_FOR_FIELD after aclocal.m4 has been and now is beeing
recre

Quote the definition of OSSH_CHECK_HEADER_FOR_FIELD

autoreconf complains about underquoted definition of
OSSH_CHECK_HEADER_FOR_FIELD after aclocal.m4 has been and now is beeing
recreated.

Quote OSSH_CHECK_HEADER_FOR_FIELD as suggested.

Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>

show more ...

a2f3ae3805-Sep-2020 Sebastian Andrzej Siewior

Move the local m4 macros

The `aclocal' step is skipped during `autoreconf' because aclocal.m4 is
present.
Move the current aclocal.m4 which contains local macros into the m4/
fol

Move the local m4 macros

The `aclocal' step is skipped during `autoreconf' because aclocal.m4 is
present.
Move the current aclocal.m4 which contains local macros into the m4/
folder. With this change the aclocal.m4 will be re-created during
changes to the m4/ macro.
This is needed so the `aclocal' can fetch m4 macros from the system if
they are references in the configure script. This is a prerequisite to
use PKG_CHECK_MODULES.

Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>

show more ...

8372bff305-Sep-2020 Sebastian Andrzej Siewior

Remove HAVE_MMAP and BROKEN_MMAP

BROKEN_MMAP is no longer defined since commit
1cfd5c06efb12 ("Remove portability support for mmap")

this commit also removed other HAVE_MMAP

Remove HAVE_MMAP and BROKEN_MMAP

BROKEN_MMAP is no longer defined since commit
1cfd5c06efb12 ("Remove portability support for mmap")

this commit also removed other HAVE_MMAP user. I didn't find anything
that defines HAVE_MMAP. The check does not trigger because compression
on server side is by default COMP_DELAYED (2) so it never triggers.

Remove remaining HAVE_MMAP and BROKEN_MMAP bits.

Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>

show more ...

bbf20ac808-Sep-2020 djm@openbsd.org

upstream: adapt to SSH_SK_VERSION_MAJOR crank

OpenBSD-Regress-ID: 0f3e76bdc8f9dbd9d22707c7bdd86051d5112ab8

9afe2a1527-Aug-2020 dtucker@openbsd.org

upstream: Ensure that address/mask mismatches are flagged at

config-check time. ok djm@

OpenBSD-Regress-ID: 8f5f4c2c0bf00e6ceae7a1755a444666de0ea5c2

c767735208-Sep-2020 djm@openbsd.org

upstream: when writing an attestation blob for a FIDO key, record all

the data needed to verify the attestation. Previously we were missing the
"authenticator data" that is included in t

upstream: when writing an attestation blob for a FIDO key, record all

the data needed to verify the attestation. Previously we were missing the
"authenticator data" that is included in the signature.

spotted by Ian Haken
feedback Pedro Martelletto and Ian Haken; ok markus@

OpenBSD-Commit-ID: 8439896e63792b2db99c6065dd9a45eabbdb7e0a

show more ...

c1c44eee01-Sep-2020 pedro martelletto

configure.ac: fix libfido2 back-compat

- HAVE_FIDO_CRED_PROD -> HAVE_FIDO_CRED_PROT;
- check for fido_dev_get_touch_begin(), so that
HAVE_FIDO_DEV_GET_TOUCH_BEGIN gets defined.

785f0f3131-Aug-2020 djm@openbsd.org

upstream: refuse to add verify-required (PINful) FIDO keys to

ssh-agent until the agent supports them properly

OpenBSD-Commit-ID: 125bd55a8df32c87c3ec33c6ebe437673a3d037e

12345678910>>...432