summaryrefslogtreecommitdiffstats
path: root/contrib/telnet
Commit message (Collapse)AuthorAgeFilesLines
* NI_WITHSCOPEID cleanupume2005-05-211-1/+1
|
* Correct a pair of buffer overflows in the telnet(1) command:nectar2005-03-281-6/+24
| | | | | | | | | | | | | | | | | | | | (CAN-2005-0468) A heap buffer overflow in env_opt_add() and related functions. (CAN-2005-0469) A global uninitialized data section buffer overflow in slc_add_reply() and related functions. As a result of these vulnerabilities, it may be possible for a malicious telnet server or active network attacker to cause telnet(1) to execute arbitrary code with the privileges of the user running it. Security: CAN-2005-0468, CAN-2005-0469 Security: FreeBSD-SA-05:01.telnet Security: http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities Security: http://www.idefense.com/application/poi/display?id=221&type=vulnerabilities These fixes are based in part on patches Submitted by: Solar Designer <solar@openwall.com>
* Increase usefulness of telnet(1) as a protocol tester. By prependingtobez2005-02-283-4/+23
| | | | | | | | | | "+" to the port number, disable option negotiation and allow transferring of data with high bit set. OKed by: markm (maintainer) PR: 52032 Submitted by: Valentin Nechayev <netch maybe-at netch stop kiev stop ua> MFC After: 2 weeks
* - Soften sentence breaks.ru2005-01-212-71/+112
| | | | | - Remove double whitespace. - Sort sections.
* o Make telnet[d] -S (IP TOS) flag really work. We do not havemaxim2005-01-093-10/+32
| | | | | | | | | /etc/iptos implementation so only numeric values supported. o telnetd.8: steal the -S flag description from telnet.1, bump the date of the document. MFC after: 6 weeks
* o Add -4 and -6 flags to a man page and usage(). Bump the man pagemaxim2005-01-052-3/+12
| | | | date.
* o Remove -t flag from getopt(3), it was killed in rev. 1.15 threemaxim2005-01-051-1/+1
| | | | years ago.
* o Print a correct status for unix domain sockets.maxim2005-01-041-0/+2
| | | | | | | | | o Restore input mode when return from the command one. PR: bin/49983 Submitted by: Volker Stolz OK in general from: markm MFC after: 1 month
* Add missing () to function invocation.kan2004-07-281-1/+1
|
* Switch Advanced Sockets API for IPv6 from RFC2292 to RFC3542ume2003-10-241-16/+9
| | | | | | | | | | (aka RFC2292bis). Though I believe this commit doesn't break backward compatibility againt existing binaries, it breaks backward compatibility of API. Now, the applications which use Advanced Sockets API such as telnet, ping6, mld6query and traceroute6 use RFC3542 API. Obtained from: KAME
* EAI_ADDRFAMILY and EAI_NODATA was deprecated in RFC3493ume2003-10-231-2/+2
| | | | | | | | (aka RFC2553bis). Now, getaddrinfo(3) returns EAI_NONAME instead of EAI_NODATA. Our getaddrinfo(3) nor getnameinfo(3) didn't use EAI_ADDRFAMILY. Obtained from: KAME
* Implement what has been documented for a long time: make -debug switchharti2003-08-131-0/+5
| | | | | | on socket debugging. Okay'ed by: markm
* Fix up external variables named "debug" that have a horrible habitmarkm2003-05-115-8/+8
| | | | | | | | of conflicting with other, similarly named functions in static libraries. This is done mostly by renaming the var if it is shared amongst modules, or making it static otherwise. OK'ed by: re(scottl)
* Use __FBSDID vs. rcsid[]. Also protect sccs[] and copyright[] from GCC 3.3.obrien2003-05-0419-81/+79
|
* Unbreak Kerberos 5 authentication in telnet.nectar2003-03-061-0/+24
| | | | | | (Credential forwarding is still broken.) PR: bin/45397
* Background:nectar2003-01-292-14/+2
| | | | | | | | | | | | | | | | | | | | | When libdes was replaced with OpenSSL's libcrypto, there were a few interfaces that the former implemented but the latter did not. Because some software in the base system still depended upon these interfaces, we simply included them in our libcrypto (rnd_keys.c). Now, finally get around to removing the dependencies on these interfaces. There were basically two cases: des_new_random_key -- This is just a wrapper for des_random_key, and these calls were replaced. des_init_random_number_generator et. al. -- A few functions were used by the application to seed libdes's PRNG. These are not necessary when using libcrypto, as OpenSSL internally seeds the PRNG from /dev/random. These calls were simply removed. Again, some of the Kerberos 4 files have been taken off the vendor branch. I do not expect there to be future imports of KTH Kerberos 4.
* add more RFC defined telnet optionsbillf2003-01-181-3/+8
| | | | Reviewed by: ps
* Merge argument parsing changes into this copy of telnet.eric2002-11-271-2/+6
| | | | | Submitted by: markm Approved by: bmah
* Permit the argument to the -s option to be a hostname. I see nodd2002-10-021-1/+0
| | | | | | | | reason to restrict this to a numeric address. PR: 41841 Submitted by: Dmitry Pryanishnikov <dmitry@atlantis.dp.ua>, Maxim Maximov <mcsi@agava.com>
* Catch up with "base" telnet.markm2002-09-251-3/+3
| | | | s/FALL THROUGH/FALLTHROUGH/ for lint(1).
* Catch up with "base" telnet.markm2002-09-253-12/+8
| | | | | s/FALL THROUGH/FALLTHROUGH/ for lint(1). s/Usage/usage/ for consistency.
* From the requestor:markm2002-09-251-1/+1
| | | | | | | | "Could you do me a favor and fix sys_bsd.c to get the howmany() macro from <sys/param.h>, instead of <sys/types.h>? This will save me from having to worry about the unsync'd bits before making the change." Requested by: mike
* Encrypted strings (after hex decoding) aren't null terminated, becausensayer2002-08-221-4/+0
| | | | | | | | 0 might simply be part of the ciphertext. PR: bin/40266 Submitted by: andr@dgap.mipt.ru MFC after: 3 days
* Warnings fixes. Sort out some variable types.markm2002-06-261-6/+7
|
* Help fix warnings by marking an argument as unused.markm2002-06-261-0/+1
|
* Don't risk catching a signal while handling a signal for a dying child, as wejmallett2002-05-271-0/+8
| | | | | | | | | can then end up not properly clearing wtmp/utmp entries. PR: bin/37934 Submitted by: Sandeep Kumar <skumar@juniper.net> Reviewed by: markm MFC after: 2 weeks
* unbreak build:alfred2002-05-115-3/+7
| | | | | commands.c, sys_bsd.c: comment out/remove junk after #endif/#else network.c, terminal.c, utlities.c: include stdlib.h for exit(3)
* Fix an external declaration that was causing telnetd to core dump.markm2002-05-061-1/+1
| | | | | MFC after: 1 week PR: 37766
* Update build after import of Heimdal Kerberos 2002/02/17.nectar2002-02-191-1/+1
|
* Don't use non-signal-safe functions (exit(3) in this case) insheldonh2002-02-051-1/+1
| | | | | | | | | | | signal handlers. In this case, use _exit(2) instead, following the call to shutdown(2). This fixes rare telnetd hangs. PR: misc/33672 Submitted by: Umesh Krishnaswamy <umesh@juniper.net> MFC after: 1 month
* mdoc(7) police: remove -r from SYNOPSIS, sort -p in DESCRIPTION.ru2001-12-141-6/+5
|
* Don't assume that the number of fds to select on is known quantity (injkh2001-12-091-32/+56
| | | | | | | | this case 16). Use dynamic FD_SETs and calculated high-water marks throughout. There are also too many versions of telnet in the tree. Obtained from: OpenBSD and Apple's Radar database MFC after: 2 days
* Fixed bugs from previous revision.ru2001-12-041-1/+2
| | | | Removed -s from SYNOPSIS and restored -S in DESCRIPTION.
* Protect variables and function prototypes that are only used in the INET6jhay2001-12-031-1/+7
| | | | | | | | case with an ifdef INET6. This make the fixit floppy compile again. Reviewed by: markm
* More help for alpha WARNS=2. This code is, erm, unusual. Anyone whomarkm2001-12-031-4/+4
| | | | feels like rewriting it will meet no objection from me.
* help the alphas out with the WARNS=2 stuff.markm2001-12-032-2/+2
|
* Damn. The previous mega-commit was incomplete WRT ANSIfication. Thismarkm2001-11-3013-281/+250
| | | | fixes that.
* Very large style makeover.markm2001-11-3045-5317/+2469
| | | | | | | | | | | | | 1) ANSIfy. 2) Clean up ifdefs so that a) ones that never/always apply are appropriately either fully removed, or just the #if junk is removed. b) change #if defined(FOO) for appropiate values of FOO. (currently AUTHENTICATION and ENCRYPTION) 3) WARNS=2 fixing 4) GC other unused stuff This code can now be unifdef(1)ed to make non-crypto telnet.
* Fix world by trimming an extra comment terminator.jhb2001-10-291-1/+1
|
* Add Berkeley copyright to SRA.nsayer2001-10-293-1/+91
| | | | | | | | | | | | | | | | | | | | | | This is by the kind permission of Dave Safford, formerly of TAMU who wrote the original code. Here is an excerpt of the e-mail exchange concerning this issue: Dave Safford wrote: >Nick Sayer wrote: >> Some time ago we spoke about SRA and importing it into FreeBSD. I forgot to >> ask if you had a prefered license boilerplate for the top of the files. It >> has come up recently, and the SRA code in FreeBSD doesn't have one. >I really have no preference - use whatever is most convenient in the >FreeBSD environment. >dave safford This is the standard BSD license with clause 3 removed and clause 4 suitably renumbered. MFC after: 1 day
* Diff-reduce these two.markm2001-10-271-3/+3
| | | | | | | Really, one of them needs to disappear. I'll figure out which later. Reported by: bde
* Add __FBSDID() to diff-reduce with "base" telnet.markm2001-10-0114-28/+40
|
* Manually unifdef(1) CRAY, UNICOS, hpux and sun uselsess code.markm2001-08-2911-936/+7
|
* Remove description of an option that only applies to UNICOS < 7.0.dd2001-08-251-13/+0
| | | | | | | That define may still be present in the source, but I don't think anyone has plans to try to use it. Obtained from: NetBSD
* Code merge and diff reduce with "base" telnet. This is the "later"markm2001-08-2025-290/+283
| | | | | telnet, so it was treated as the reference code, except where later commits were made to "base" telnet.
* Removal of following export controll related sentences:horikawa2001-08-151-10/+0
| | | | | | | | | | | | | | | o Because of export controls, TELNET ENCRYPT option is not supported outside of the United States and Canada. o Because of export controls, data encryption is not supported outside of the United States and Canada. src/crypto/README revision 1.5 commit log says: > Crypto sources are no longer export controlled: > Explain, why crypto sources are still in crypto/. and actually telnet encryption is used outside of US and Canada now. Pointed out by: OHSAWA Chitoshi <ohsawa@catv1.ccn-net.ne.jp> Reviewed by: no objection on doc
* mdoc(7) police: s/BSD/.Bx/ where appropriate.ru2001-08-141-3/+6
|
* output_data(), output_datalen() and netflush() didn't actually guaranteekris2001-07-236-45/+50
| | | | | | | | | | | | | to do what they are supposed to: under some circumstances output data would be truncated, or the buffer would not actually be flushed (possibly leading to overflows when the caller assumes the operation succeeded). Change the semantics so that these functions ensure they complete the operation before returning. Comment out diagnostic code enabled by '-D reports' which causes an infinite recursion and an eventual crash. Patch developed with assistance from ru and assar.
* More potential buffer overflow fixes.ru2001-07-204-35/+7
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | o Fixed `nfrontp' calculations in output_data(). If `remaining' is initially zero, it was possible for `nfrontp' to be decremented. Noticed by: dillon o Replaced leaking writenet() with output_datalen(): : * writenet : * : * Just a handy little function to write a bit of raw data to the net. : * It will force a transmit of the buffer if necessary : * : * arguments : * ptr - A pointer to a character string to write : * len - How many bytes to write : */ : void : writenet(ptr, len) : register unsigned char *ptr; : register int len; : { : /* flush buffer if no room for new data) */ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ : if ((&netobuf[BUFSIZ] - nfrontp) < len) { : /* if this fails, don't worry, buffer is a little big */ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ : netflush(); : } : : memmove(nfrontp, ptr, len); : nfrontp += len; : : } /* end of writenet */ What an irony! :-) o Optimized output_datalen() a bit.
* vsnprintf() can return a value larger than the buffer size.ru2001-07-191-1/+1
| | | | | Submitted by: assar Obtained from: OpenBSD
OpenPOWER on IntegriCloud