freebsd-skq/crypto/openssh
Jacques Vidrine b33edd3956 Bug fix: When the client connects to a server and Kerberos
authentication is  enabled, the  client effectively ignores  any error
from krb5_rd_rep due to a missing branch.

In  theory  this could  result  in  an  ssh  client using  Kerberos  5
authentication accepting  a spoofed  AP-REP.  I doubt  this is  a real
possiblity, however, because  the AP-REP is passed from  the server to
the client via the SSH  encrypted channel.  Any tampering should cause
the decryption or MAC to fail.

Approved by:	green
MFC after:	1 week
2001-07-13 18:12:13 +00:00
..
lib
pam_ssh
scp
sftp
sftp-server
ssh
ssh-add
ssh-agent
ssh-keygen
ssh-keyscan
sshd
atomicio.c
atomicio.h
auth1.c
auth2-chall.c
auth2.c
auth-chall.c
auth-krb4.c
auth-krb5.c
auth-options.c
auth-options.h
auth-pam.c
auth-pam.h
auth-passwd.c
auth-rh-rsa.c
auth-rhosts.c
auth-rsa.c
auth.c
auth.h
authfd.c
authfd.h
authfile.c
authfile.h
bufaux.c
bufaux.h
buffer.c
buffer.h
canohost.c
canohost.h
channels.c
channels.h
cipher.c
cipher.h
cli.c
cli.h
clientloop.c
clientloop.h
compat.c
compat.h
compress.c
compress.h
crc32.c
crc32.h
deattack.c
deattack.h
dh.c
dh.h
dispatch.c
dispatch.h
getput.h
groupaccess.c
groupaccess.h
hostfile.c
hostfile.h
includes.h
kex.c
kex.h
kexdh.c
kexgex.c
key.c
key.h
LICENCE
log.c
log.h
mac.c
mac.h
Makefile
Makefile.inc
match.c
match.h
misc.c
misc.h
mpaux.c
mpaux.h
myproposal.h
nchan2.ms
nchan.c
nchan.h
nchan.ms
OVERVIEW
packet.c
packet.h
pathnames.h
radix.c
radix.h
readconf.c
readconf.h
README
readpass.c
readpass.h
RFC.nroff
rijndael.c
rijndael.h
rsa.c
rsa.h
scp-common.c
scp-common.h
scp.1
scp.c
servconf.c
servconf.h
serverloop.c
serverloop.h
session.c
session.h
sftp-client.c
sftp-client.h
sftp-common.c
sftp-common.h
sftp-glob.c
sftp-glob.h
sftp-int.c
sftp-int.h
sftp-server.8
sftp-server.c
sftp.1
sftp.c
sftp.h
ssh1.h
ssh2.h
ssh_config
ssh-add.1
ssh-add.c
ssh-agent.1
ssh-agent.c
ssh-dss.c
ssh-dss.h
ssh-keygen.1
ssh-keygen.c
ssh-keyscan.1
ssh-keyscan.c
ssh-rsa.c
ssh-rsa.h
ssh.1
ssh.c
ssh.h
sshconnect1.c Fix an incorrect conflict resolution which prevented TISAuthentication 2001-07-07 14:19:53 +00:00
sshconnect2.c
sshconnect.c Bug fix: When the client connects to a server and Kerberos 2001-07-13 18:12:13 +00:00
sshconnect.h
sshd_config
sshd.8
sshd.c
sshlogin.c
sshlogin.h
sshpty.c
sshpty.h
sshtty.c
sshtty.h
tildexpand.c
tildexpand.h
ttymodes.c
ttymodes.h
uidswap.c
uidswap.h
uuencode.c
uuencode.h
version.c
version.h
xmalloc.c
xmalloc.h

This release of OpenSSH is for OpenBSD systems only.

Please read
        http://www.openssh.com/portable.html
if you want to install OpenSSH on other operating systems.

To extract and install this release on your OpenBSD system use:

      # cd /usr/src/usr.bin
      # tar xvfz .../openssh-x.y.tgz
      # cd ssh
      # make obj
      # make cleandir
      # make depend
      # make
      # make install
      # cp ssh_config sshd_config /etc

OpenSSH is a derivative of the original and free ssh 1.2.12 release
by Tatu Ylonen.  Aaron Campbell, Bob Beck, Markus Friedl, Niels
Provos, Theo de Raadt and Dug Song removed many bugs, re-added newer
features and created OpenSSH.  Markus Friedl contributed the support
for SSH protocol versions 1.5 and 2.0.

See http://www.openssh.com/ for more information.