History log of /openssh-portable/ (Results 176 - 200 of 10777)
Revision (<<< Hide revision tags) (Show revision tags >>>)Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
f1a4798915-Jul-2020 dtucker@openbsd.org

upstream: Update test to match recent change in match.c

OpenBSD-Regress-ID: 965bda1f95f09a765050707340c73ad755f41167

d7e71be415-Jul-2020 Darren Tucker

Adjust portable code to match changes in 939d787d,

fec89f3215-Jul-2020 dtucker@openbsd.org

upstream: Add default for number of rounds (-a). ok djm@

OpenBSD-Commit-ID: cb7e9aa04ace01a98e63e4bd77f34a42ab169b15

aaa8b60914-Jul-2020 djm@openbsd.org

upstream: allow some additional control over the use of ssh-askpass

via $SSH_ASKPASS_REQUIRE, including force-enable/disable. bz#69 ok markus@

OpenBSD-Commit-ID: 3a1e6cbbf6241ddc440

upstream: allow some additional control over the use of ssh-askpass

via $SSH_ASKPASS_REQUIRE, including force-enable/disable. bz#69 ok markus@

OpenBSD-Commit-ID: 3a1e6cbbf6241ddc4405c4246caa2c249f149eb2

show more ...

6368022c06-Jul-2020 deraadt@openbsd.org

upstream: correct recently broken comments

OpenBSD-Commit-ID: 964d9a88f7de1d0eedd3f8070b43fb6e426351f1

6d75570605-Jul-2020 djm@openbsd.org

upstream: some language improvements; ok markus

OpenBSD-Commit-ID: 939d787d571b4d5da50b3b721fd0b2ac236acaa8

b0c1e83803-Jul-2020 markus@openbsd.org

upstream: update setproctitle after re-exec; ok djm

OpenBSD-Commit-ID: bc92d122f9184ec2a9471ade754b80edd034ce8b

cd119a5e03-Jul-2020 markus@openbsd.org

upstream: keep ignoring HUP after fork+exec; ok djm

OpenBSD-Commit-ID: 7679985a84ee5ceb09839905bb6f3ddd568749a2

8af4a74303-Jul-2020 markus@openbsd.org

upstream: don't exit the listener on send_rexec_state errors; ok

djm

OpenBSD-Commit-ID: 57cbd757d130d3f45b7d41310b3a15eeec137d5c

03da4c2b15-Jul-2020 dtucker@openbsd.org

upstream: Use $OBJ to find key files. Fixes test when run on an obj

directory (on OpenBSD) or out of tree (in Portable).

OpenBSD-Regress-ID: 938fa8ac86adaa527d64a305bd2135cfbb1c0a17

73f20f1904-Jul-2020 Darren Tucker

Wrap stdint.h in ifdef HAVE_STDINT_H.

aa6fa4bf03-Jul-2020 djm@openbsd.org

upstream: put back the mux_ctx memleak fix, but only for channels of

type SSH_CHANNEL_MUX_LISTENER; Specifically SSH_CHANNEL_MUX_PROXY channels
should not have this structure freed.

upstream: put back the mux_ctx memleak fix, but only for channels of

type SSH_CHANNEL_MUX_LISTENER; Specifically SSH_CHANNEL_MUX_PROXY channels
should not have this structure freed.

OpenBSD-Commit-ID: f3b213ae60405f77439e2b06262f054760c9d325

show more ...

d819591403-Jul-2020 djm@openbsd.org

upstream: revert r1.399 - the lifetime of c->mux_ctx is more complex;

simply freeing it here causes other problems

OpenBSD-Commit-ID: c6fee8ca94e2485faa783839541962be2834c5ed

20b5fab903-Jul-2020 djm@openbsd.org

upstream: avoid tilde_expand_filename() in expanding ~/.ssh/rc - if

sshd is in chroot mode, the likely absence of a password database will cause
tilde_expand_filename() to fatal; ok dtuc

upstream: avoid tilde_expand_filename() in expanding ~/.ssh/rc - if

sshd is in chroot mode, the likely absence of a password database will cause
tilde_expand_filename() to fatal; ok dtucker@

OpenBSD-Commit-ID: e20aee6159e8b79190d18dba1513fc1b7c8b7ee1

show more ...

c893508103-Jul-2020 djm@openbsd.org

upstream: when redirecting sshd's log output to a file, undo this

redirection after the session child process is forked(); ok dtucker@

OpenBSD-Commit-ID: 6df86dd653c91f5bc8ac1916e76

upstream: when redirecting sshd's log output to a file, undo this

redirection after the session child process is forked(); ok dtucker@

OpenBSD-Commit-ID: 6df86dd653c91f5bc8ac1916e7680d9d24690865

show more ...

183c4aae03-Jul-2020 djm@openbsd.org

upstream: start ClientAliveInterval bookkeeping before first pass

through select() loop; fixed theoretical case where busy sshd may ignore
timeouts from client; inspired by and ok dtucke

upstream: start ClientAliveInterval bookkeeping before first pass

through select() loop; fixed theoretical case where busy sshd may ignore
timeouts from client; inspired by and ok dtucker

OpenBSD-Commit-ID: 96bfc4b1f86c7da313882a84755b2b47eb31957f

show more ...

6fcfd30303-Jul-2020 Damien Miller

add check for fido_cred_set_prot() to configure

f11b233403-Jul-2020 dtucker@openbsd.org

upstream: Only reset the serveralive check when we receive traffic from

the server and ignore traffic from a port forwarding client, preventing a
client from keeping a connection alive w

upstream: Only reset the serveralive check when we receive traffic from

the server and ignore traffic from a port forwarding client, preventing a
client from keeping a connection alive when it should be terminated. Based
on a patch from jxraynor at gmail.com via openssh-unix-dev and bz#2265, ok
djm@

OpenBSD-Commit-ID: a941a575a5cbc244c0ef5d7abd0422bbf02c2dcd

show more ...

adfdbf1203-Jul-2020 Damien Miller

sync sys-queue.h with OpenBSD upstream

needed for TAILQ_CONCAT

1b90ddde03-Jul-2020 djm@openbsd.org

upstream: fix memory leak of mux_ctx; patch from Sergiy Lozovsky

via bz3189 ok dtucker

OpenBSD-Commit-ID: db249bd4526fd42d0f4f43f72f7b8b7705253bde

55ef3e9c01-Jul-2020 markus@openbsd.org

upstream: free kex in ssh_packet_close; ok djm semarie

OpenBSD-Commit-ID: dbc181e90d3d32fd97b10d75e68e374270e070a2

e1c4011027-Jun-2020 bket@openbsd.org

upstream: Replace TAILQ concatenation loops with TAILQ_CONCAT

OK djm@

OpenBSD-Commit-ID: 454b40e09a117ddb833794358970a65b14c431ef

14beca5726-Jun-2020 semarie@openbsd.org

upstream: backout 1.293 fix kex mem-leak in ssh_packet_close at markus

request

the change introduced a NULL deref in sshpkt_vfatal() (uses of ssh->kex after
calling ssh_packet_c

upstream: backout 1.293 fix kex mem-leak in ssh_packet_close at markus

request

the change introduced a NULL deref in sshpkt_vfatal() (uses of ssh->kex after
calling ssh_packet_clear_keys())

OpenBSD-Commit-ID: 9c9a6721411461b0b1c28dc00930d7251a798484

show more ...

598c3a5e26-Jun-2020 Damien Miller

document a PAM spec problem in a frustrated comment

976c4f8626-Jun-2020 djm@openbsd.org

upstream: avoid spurious error message when ssh-keygen creates files

outside ~/.ssh; with dtucker@

OpenBSD-Commit-ID: ac0c662d44607e00ec78c266ee60752beb1c7e08

12345678910>>...432