Commit Graph

67 Commits

Author SHA1 Message Date
shin
bca215974d Add more dual stack consideration.
-Should retry as much as possible when some of source
     routing intermediate hosts' address families missmatch
     happened.
     (such as when a host has only A record, and another host
     has each of A and AAAA record.)

    -Should retry as much as possible when dest addr and
     source addr(specified with -s option) address family
     missmatch happend

Approved by: jkh
2000-02-10 20:06:36 +00:00
shin
67ff6efc68 Fix telnet core dump at invalid service name specified.
Added an error check to avoid it.

Approved by: jkh

Submitted by: Robert Muir <rmuir@gibralter.net>
2000-02-07 00:52:49 +00:00
shin
3859c2231c Add NI_NAMEREQD flag to getnameinfo() call. Without this flag,
getnameinfo() don't return error at name resolving failure.
But it is used at doaddrlookup(-N) case in telnet, error need to be
returned to correctly initialize hostname buffer.

Discovered at checking recent KAME repository change, noticed by itojun.
2000-01-29 18:21:05 +00:00
shin
ce15efb7c0 another tcp apps IPv6 updates.(should be make world safe)
ftp, telnet, ftpd, faithd
  also telnet related sync with crypto, secure, kerberosIV

Obtained from: KAME project
2000-01-27 09:28:38 +00:00
kris
2e01efe7c1 This commit was generated by cvs2svn to compensate for changes in r56083,
which included commits to RCS files with non-trunk default branches.
2000-01-16 05:14:57 +00:00
kris
7e4e44947b Import the RSA support code. There shouldn't be any actual RSA
cryptography here.
2000-01-16 05:14:57 +00:00
kris
f389ea9752 Fix for missing symbol in -DRSAref case. 2000-01-16 04:45:18 +00:00
kris
728ac76565 Fix breakage when NO_RSA specified.
Reviewed by:	Ben Laurie <ben@openssl.org>
2000-01-14 05:24:08 +00:00
kris
168e054f17 Zap NO_IDEA 2000-01-10 06:28:04 +00:00
cvs2svn
06e3860a5c This commit was manufactured by cvs2svn to create branch
'VENDOR-crypto-openssl'.
2000-01-10 06:27:13 +00:00
kris
4203a050f6 List of files to nuke prior to import. 2000-01-10 06:27:12 +00:00
kris
2e467dc342 Initial import of OpenSSL 0.9.4, sans IDEA and RSA code for patent
infringement reasons.
2000-01-10 06:22:05 +00:00
kris
ebe7c1ce23 This commit was generated by cvs2svn to compensate for changes in r55714,
which included commits to RCS files with non-trunk default branches.
2000-01-10 06:22:05 +00:00
kris
b8e601b240 Zap the IDEA stuff - it's patented internationally (at least in some
places), and we don't want people to get in trouble just for having it.
2000-01-10 05:36:35 +00:00
markm
5f68254a36 This commit was generated by cvs2svn to compensate for changes in r55682,
which included commits to RCS files with non-trunk default branches.
2000-01-09 20:58:00 +00:00
markm
4ecbd6db44 Import KTH Heimdal, which will be the core of our Kerberos5.
Userland to follow.
2000-01-09 20:58:00 +00:00
markm
469413f558 Fix path. 2000-01-09 13:52:56 +00:00
markm
3b8aea4be2 resolve conflicts. 2000-01-09 08:53:35 +00:00
markm
6ae78a5389 This commit was generated by cvs2svn to compensate for changes in r55643,
which included commits to RCS files with non-trunk default branches.
2000-01-09 08:31:47 +00:00
markm
ca616c603d Clean import of KTH Kerberos (eBones) v1.0. 2000-01-09 08:31:47 +00:00
green
8b8214b6d3 Upgrade to the pam_ssh module, version 1.1..
(From the author:)
Primarily, I have added built-in functions for manipulating the
environment, so putenv() is no longer used.  XDM and its variants
should now work without modification.  Note that the new code uses
the macros in <sys/queue.h>.

Submitted by:	Andrew J. Korty <ajk@iu.edu>
1999-12-28 05:32:54 +00:00
kris
e829abb179 Initial import of OpenSSL v0.9.4 1999-12-25 16:37:36 +00:00
kris
4562f83d3b This commit was generated by cvs2svn to compensate for changes in r55099,
which included commits to RCS files with non-trunk default branches.
1999-12-25 16:37:36 +00:00
green
bcc4466e40 Add the PAM SSH RSA key authentication module. For example, you can add,
"login  auth    sufficient      pam_ssh.so" to your /etc/pam.conf, and
users with a ~/.ssh/identity can login(1) with their SSH key :)

PR:		15158
Submitted by:	Andrew J. Korty <ajk@waterspout.com>
Reviewed by:	obrien
1999-11-29 07:09:44 +00:00
markm
7df5ada37c Merge anf fix for build. 1999-09-19 21:56:09 +00:00
markm
fe83e8abf3 Clean import of KTH krb4-0.10.1. 1999-09-19 14:19:32 +00:00
markm
c171f3b182 This commit was generated by cvs2svn to compensate for changes in r51415,
which included commits to RCS files with non-trunk default branches.
1999-09-19 14:19:32 +00:00
markm
4f947d680a Big OpenSSL/KTH/FreeBSD merge, badly poisoned by $FreeBSD$'s. 1999-09-19 13:04:49 +00:00
markm
69cafd82fe This commit was generated by cvs2svn to compensate for changes in r50894,
which included commits to RCS files with non-trunk default branches.
1999-09-04 12:45:43 +00:00
markm
aebb972b81 Vendor import EAY's LIBSSL to fix comments, etc. 1999-09-04 12:45:43 +00:00
markm
101cc573f4 Add macro originally provided externally. 1999-09-04 11:06:07 +00:00
markm
a00f78e661 Add includes to to silence warnings. Bit hackish. 1999-09-04 11:03:01 +00:00
markm
d7d8526858 Add some includes to shut up warnings. 1999-09-04 10:46:27 +00:00
markm
145a94070b Drat. Import this into the right place. Pass me the pointy hat. 1999-09-01 19:59:25 +00:00
markm
3083434d3d This commit was generated by cvs2svn to compensate for changes in r50760,
which included commits to RCS files with non-trunk default branches.
1999-09-01 19:59:25 +00:00
markm
05435ef431 Termcap header no longer needed. 1999-09-01 18:57:38 +00:00
peter
efabb9ccb1 $Id$ -> $FreeBSD$ 1999-08-28 01:35:59 +00:00
markm
43201bf2b8 Add virtual MAINTAINER line. 1999-08-16 19:05:02 +00:00
nsayer
6cf65828c9 According to Mark Murray, Makefiles do not belong here. I guess we're
going to have to figure something else out.
1999-08-16 18:59:05 +00:00
nsayer
189690bcce Add SRA authentication to src/crypto/telnet.
SRA does a Diffie-Hellmen exchange and then DES-encrypts the
authentication data. If the authentication is successful, it also
sets up a session key for DES encryption.

SRA was originally developed at Texas A&M University.

This code is probably export restricted (despite the fact that I
originally found it at a University in Germany).

SRA is not perfect. It is vulnerable to monkey-in-the-middle attacks
and does not use tremendously large DH constants (and thus an individual
exchange probably could be factored in a few days on modern CPU
horsepower). It does not, however, require any changes in user or
administrative behavior and foils session hijacking and sniffing.
The goal of this commit is that telnet and telnetd end up in the DES
distribution and that therefore an encrypted session telnet becomes
standard issue for FreeBSD.
1999-08-16 11:24:29 +00:00
nsayer
8528b2a710 Fix int function without return (make consistent with neighbors) 1999-08-16 02:15:29 +00:00
nik
668aec5d3d Document the "skey" command in telnet(1).
PR:             docs/12360
Submitted by:   kjm@rins.ryukoku.ac.jp (KOJIMA Hajime)
Nagged by:      markm :-)
1999-07-30 21:24:03 +00:00
ru
c7b22dab8b Merge from non-crypto version:
- "-N" option
- "-E" security fix
- "-s src_addr" option

Requested by:	markm
1999-06-17 09:24:37 +00:00
brian
7670f1eab4 MF libexec/telnetd: Determine the host name using an array size of
MAXHOSTNAMELEN and call trimdomain() before implementing
                    the -u option.
1999-04-08 21:39:34 +00:00
brian
88f6c1a7e8 MF libexec/telnetd: MAXHOSTNAMELEN & -u fixes. 1999-04-07 10:17:24 +00:00
brian
07625d3f4d Use realhostname(). 1999-04-06 23:35:21 +00:00
brian
290eeb0e06 MF src/libexec/telnetd: Verify the reverse DNS lookup
ala rlogind.
Suggested by: markm
1999-04-06 12:41:27 +00:00
peter
e133ecebec Old stuff laying around: Don't use getstr which can conflict with some
curses/termcap/terminfo implementations and causes recursion.
1998-12-16 06:06:06 +00:00
peter
f3847d7306 Old stuff from a source tree: copy (verbatum) the code to expand the
%s/%m in the default /etc/gettytab.
1998-12-16 06:01:33 +00:00
gpalmer
be7570dbc1 Remove redundant decl. of time(). Causes problems on alpha 1998-09-01 15:17:28 +00:00