des
ae82763de4
Upgrade to OpenSSH 6.6p1.
2014-03-25 11:05:34 +00:00
des
7573e91b12
Upgrade to OpenSSH 6.5p1.
2014-01-31 13:12:02 +00:00
des
cda41f674d
Upgrade to 6.3p1.
...
Approved by: re (gjb)
2013-09-21 21:36:09 +00:00
des
b291eafe8d
Upgrade to OpenSSH 6.2p1. The most important new features are support
...
for a key revocation list and more fine-grained authentication control.
2013-03-22 17:55:38 +00:00
des
00f3582ac6
Upgrade OpenSSH to 6.1p1.
2012-09-03 16:51:41 +00:00
des
038442ad80
Upgrade to OpenSSH 5.9p1.
...
MFC after: 3 months
2011-10-05 22:08:17 +00:00
des
ee2afa8165
Upgrade to OpenSSH 5.8p2.
2011-05-04 07:34:44 +00:00
des
59d1af2322
Upgrade to OpenSSH 5.6p1.
2010-11-11 11:46:19 +00:00
des
c3510f9e73
Upgrade to OpenSSH 5.4p1.
...
MFC after: 1 month
2010-03-09 19:16:43 +00:00
des
c6a1085fef
Upgrade to OpenSSH 5.3p1.
2009-10-01 17:12:52 +00:00
des
8bf56a9772
Upgrade to OpenSSH 5.2p1.
...
MFC after: 3 months
2009-05-22 18:46:28 +00:00
des
b7aa600c41
Upgrade to OpenSSH 5.1p1.
...
I have worked hard to reduce diffs against the vendor branch. One
notable change in that respect is that we no longer prefer DSA over
RSA - the reasons for doing so went away years ago. This may cause
some surprises, as ssh will warn about unknown host keys even for
hosts whose keys haven't changed.
MFC after: 6 weeks
2008-08-01 02:48:36 +00:00
des
e253d923d4
Revert an old hack I put in to replace S/Key with OPIE. We haven't used
...
that code in ages - we use pam_opie(8) instead - so this is a NOP.
2008-08-01 00:27:48 +00:00
des
f1596419c2
Properly flatten openssh/dist.
2008-07-22 19:01:18 +00:00
des
666aa9cc16
Revert part of 180714 - the intent was to flatten dist, not to nuke it.
2008-07-22 18:58:19 +00:00
des
624d93001f
Flatten the OpenSSH vendor tree for 3.x and newer.
2008-07-22 17:13:05 +00:00
des
f486315183
Resolve conflicts.
2006-11-10 16:52:41 +00:00
des
f591b3e29c
Vendor import of OpenSSH 4.5p1.
2006-11-10 16:39:21 +00:00
des
4ff234ef46
Merge conflicts.
...
MFC after: 1 week
2006-09-30 13:38:06 +00:00
des
2f35ce4773
Vendor import of OpenSSH 4.4p1.
2006-09-30 13:29:51 +00:00
des
97a1b8f884
Merge vendor patch for BSM problem in protocol version 1.
...
MFC after: 1 week
2006-09-16 15:12:58 +00:00
des
03ef9d989b
Vendor patch for a problem that prevented using protocol version 1 when
...
BSM was enabled.
2006-09-16 15:10:13 +00:00
des
7c07891caf
Merge conflicts.
2006-03-22 20:41:37 +00:00
des
448503722a
Vendor import of OpenSSH 4.3p1.
2006-03-22 19:46:12 +00:00
des
88c7c9558b
Resolve conflicts.
2005-09-03 07:04:25 +00:00
des
755a16fa86
Vendor import of OpenSSH 4.2p1.
2005-09-03 06:59:33 +00:00
des
983ad11a1c
Resolve conflicts.
2005-06-05 15:46:09 +00:00
des
c4dfc1ed3b
Vendor import of OpenSSH 4.1p1.
2005-06-05 15:41:57 +00:00
des
11a09ab416
Vendor import of OpenSSH 4.0p1.
2005-06-05 15:40:50 +00:00
des
a744ec13ad
Resolve conflicts
2004-10-28 16:11:31 +00:00
des
d5d493f03a
Vendor import of OpenSSH 3.9p1.
2004-10-28 16:03:53 +00:00
des
e5d801b2d6
Resolve conflicts.
2004-04-20 09:46:41 +00:00
des
c69db9c5a2
Vendor import of OpenSSH 3.8.1p1.
2004-04-20 09:35:04 +00:00
des
124c4a1415
Resolve conflicts.
2004-02-26 10:52:33 +00:00
des
7d1750f1d6
Vendor import of OpenSSH 3.8p1.
2004-02-26 10:38:49 +00:00
des
7545fb1c7e
Resolve conflicts and remove obsolete files.
...
Sponsored by: registrar.no
2004-01-07 11:16:27 +00:00
des
b5d16e7138
Vendor import of OpenSSH 3.7.1p2.
2004-01-07 11:10:17 +00:00
des
58b9db3b6f
Resolve conflicts.
2003-04-23 17:13:13 +00:00
des
85b37b9574
Vendor import of OpenSSH-portable 3.6.1p1.
2003-04-23 16:53:02 +00:00
des
a428b35290
Fix keyboard-interactive authentication for ssh1. The problem was twofold:
...
- The PAM kbdint device sometimes doesn't know authentication succeeded
until you re-query it. The ssh1 kbdint code would never re-query the
device, so authentication would always fail. This patch has been
submitted to the OpenSSH developers.
- The monitor code for PAM sometimes forgot to tell the monitor that
authentication had succeeded. This caused the monitor to veto the
privsep child's decision to allow the connection.
These patches have been tested with OpenSSH clients on -STABLE, NetBSD and
Linux, and with ssh.com's ssh1 on Solaris.
Sponsored by: DARPA, NAI Labs
2003-01-31 11:08:07 +00:00
des
279b0fa809
Resolve conflicts.
2002-10-29 10:16:02 +00:00
des
099d1a58f7
Vendor import of OpenSSH-portable 3.5p1.
2002-10-29 09:43:00 +00:00
ume
03b3b78217
sshd didn't handle actual size of struct sockaddr correctly,
...
and did copy it as long as just size of struct sockaddr. So,
If connection is via IPv6, sshd didn't log hostname into utmp
correctly.
This problem occured only under FreeBSD because of our hack.
However, this is potential problem of OpenSSH-portable, and
they agreed to fix this.
Though, there is no fixed version of OpenSSH-portable available
yet, since this problem is serious for IPv6 users, I commit the
fix.
Reported by: many people
Reviewed by: current@ and stable@ (no objection)
MFC after: 3 days
2002-09-09 16:49:11 +00:00
des
1983859ac6
Don't forget to clear the buffer before reusing it.
2002-07-10 23:04:07 +00:00
des
7523600be4
Fix a braino in mm_answer_pam_respond() which would cause sshd to abort if
...
PAM authentication failed due to an incorrect response.
2002-07-02 13:07:17 +00:00
des
72a8e501f7
Resolve conflicts.
...
Sponsored by: DARPA, NAI Labs
2002-06-29 11:48:59 +00:00
des
1ba793a7c0
Vendor import of OpenSSH 3.4p1.
2002-06-29 11:34:13 +00:00
des
3003a57dbb
PAM support, the FreeBSD way.
...
Sponsored by: DARPA, NAI Labs
2002-06-29 10:56:23 +00:00
des
4d49e874a9
Support OPIE as an alternative to S/Key.
...
Sponsored by: DARPA, NAI Labs
2002-06-29 10:44:37 +00:00
des
5ba29faa04
Forcibly revert to mainline.
2002-06-27 22:42:11 +00:00