des
ee2afa8165
Upgrade to OpenSSH 5.8p2.
2011-05-04 07:34:44 +00:00
des
59d1af2322
Upgrade to OpenSSH 5.6p1.
2010-11-11 11:46:19 +00:00
des
fc607a2e80
Upgrade to OpenSSH 5.5p1.
2010-04-28 10:36:33 +00:00
des
c3510f9e73
Upgrade to OpenSSH 5.4p1.
...
MFC after: 1 month
2010-03-09 19:16:43 +00:00
des
9c86ec8748
Remove dupe.
2009-10-11 14:27:33 +00:00
des
c6a1085fef
Upgrade to OpenSSH 5.3p1.
2009-10-01 17:12:52 +00:00
des
8bf56a9772
Upgrade to OpenSSH 5.2p1.
...
MFC after: 3 months
2009-05-22 18:46:28 +00:00
des
b7aa600c41
Upgrade to OpenSSH 5.1p1.
...
I have worked hard to reduce diffs against the vendor branch. One
notable change in that respect is that we no longer prefer DSA over
RSA - the reasons for doing so went away years ago. This may cause
some surprises, as ssh will warn about unknown host keys even for
hosts whose keys haven't changed.
MFC after: 6 weeks
2008-08-01 02:48:36 +00:00
des
f1596419c2
Properly flatten openssh/dist.
2008-07-22 19:01:18 +00:00
des
666aa9cc16
Revert part of 180714 - the intent was to flatten dist, not to nuke it.
2008-07-22 18:58:19 +00:00
des
624d93001f
Flatten the OpenSSH vendor tree for 3.x and newer.
2008-07-22 17:13:05 +00:00
des
f486315183
Resolve conflicts.
2006-11-10 16:52:41 +00:00
des
e16bfbb7bc
Bump version addendum.
...
MFC after: 1 week
2006-09-30 13:39:07 +00:00
des
4ff234ef46
Merge conflicts.
...
MFC after: 1 week
2006-09-30 13:38:06 +00:00
des
2f35ce4773
Vendor import of OpenSSH 4.4p1.
2006-09-30 13:29:51 +00:00
des
7c07891caf
Merge conflicts.
2006-03-22 20:41:37 +00:00
des
448503722a
Vendor import of OpenSSH 4.3p1.
2006-03-22 19:46:12 +00:00
des
88c7c9558b
Resolve conflicts.
2005-09-03 07:04:25 +00:00
des
755a16fa86
Vendor import of OpenSSH 4.2p1.
2005-09-03 06:59:33 +00:00
des
983ad11a1c
Resolve conflicts.
2005-06-05 15:46:09 +00:00
des
11a09ab416
Vendor import of OpenSSH 4.0p1.
2005-06-05 15:40:50 +00:00
des
a744ec13ad
Resolve conflicts
2004-10-28 16:11:31 +00:00
des
d5d493f03a
Vendor import of OpenSSH 3.9p1.
2004-10-28 16:03:53 +00:00
des
efa3572464
Adjust version number and addendum.
2004-04-20 09:37:29 +00:00
des
2fe413a41a
Correctly document the default value of UsePAM.
2004-03-15 18:38:29 +00:00
des
437b8c0fdd
Update VersionAddendum in config files and man pages.
2004-02-26 11:54:03 +00:00
des
124c4a1415
Resolve conflicts.
2004-02-26 10:52:33 +00:00
des
7d1750f1d6
Vendor import of OpenSSH 3.8p1.
2004-02-26 10:38:49 +00:00
des
85717525b0
Pull asbesthos underpants on and disable protocol version 1 by default.
2004-02-26 10:24:07 +00:00
des
49dee586c1
Turn non-PAM password authentication off by default when USE_PAM is
...
defined. Too many users are getting bitten by it.
2004-02-19 15:53:31 +00:00
des
7545fb1c7e
Resolve conflicts and remove obsolete files.
...
Sponsored by: registrar.no
2004-01-07 11:16:27 +00:00
des
b5d16e7138
Vendor import of OpenSSH 3.7.1p2.
2004-01-07 11:10:17 +00:00
des
0b9dcf3092
Update version string.
2003-09-24 19:20:23 +00:00
des
58b9db3b6f
Resolve conflicts.
2003-04-23 17:13:13 +00:00
des
f4ca4d4385
document the current default value for VersionAddendum.
2003-02-11 12:11:15 +00:00
des
e08b64e978
Document the current default value for VersionAddendum.
2002-11-05 17:17:09 +00:00
des
279b0fa809
Resolve conflicts.
2002-10-29 10:16:02 +00:00
des
099d1a58f7
Vendor import of OpenSSH-portable 3.5p1.
2002-10-29 09:43:00 +00:00
fanf
b26a01d35d
FreeBSD doesn't use the host RSA key by default.
...
Reviewed by: des
2002-07-26 15:16:56 +00:00
des
f450aaf037
Two FreeBSD-specific nits in comments:
...
- ChallengeResponseAuthentication controls PAM, not S/Key
- We don't honor PAMAuthenticationViaKbdInt, because the code path it
controls doesn't make sense for us, so don't mention it.
Sponsored by: DARPA, NAI Labs
2002-07-03 00:08:19 +00:00
des
9cc7de0fcd
Forgot to update the addendum in the config files.
2002-06-30 10:32:09 +00:00
des
3f22fbc9c3
Document FreeBSD defaults.
...
Sponsored by: DARPA, NAI Labs
2002-06-29 10:55:18 +00:00
des
5ba29faa04
Forcibly revert to mainline.
2002-06-27 22:42:11 +00:00
des
bb02848f18
Vendor import of OpenSSH 3.3p1.
2002-06-27 22:31:32 +00:00
des
fa8aa6dfe7
Resolve conflicts. Known issues:
...
- sshd fails to set TERM correctly.
- privilege separation may break PAM and is currently turned off.
- man pages have not yet been updated
I will have these issues resolved, and privilege separation turned on by
default, in time for DP2.
Sponsored by: DARPA, NAI Labs
2002-06-23 16:09:08 +00:00
des
610201f50f
Vendor import of OpenSSH 3.3.
2002-06-23 14:01:54 +00:00
obrien
0908b99eb0
Usual after-import fixup of SCM IDs.
2002-05-01 22:39:53 +00:00
des
ec4b7563a5
Back out previous commit.
2002-04-25 16:53:25 +00:00
jkh
04da61f7a8
Change default challenge/response behavior of sshd by popular demand.
...
This brings us into sync with the behavior of sshd on other Unix platforms.
Submitted by: Joshua Goodall <joshua@roughtrade.net>
2002-04-25 05:59:53 +00:00
des
26f5df0f67
Change the FreeBSD version addendum to "FreeBSD-20020402". This shortens
...
the version string to 28 characters, which is below the 40-character limit
specified in the proposed SECSH standard. Some servers, however (like the
one built into the Foundry BigIron line of switches) will hang when
confronted with a version string longer than 24 characters, so some users
may need to shorten it further.
Sponsored by: DARPA, NAI Labs
2002-04-02 21:53:54 +00:00