summaryrefslogtreecommitdiffstats
path: root/crypto/openssh/monitor.c
Commit message (Collapse)AuthorAgeFilesLines
* Upgrade to OpenSSH 7.2p2.des2016-03-111-21/+18
|\
* \ Upgrade to OpenSSH 6.9p1.des2016-01-191-9/+13
|\ \ | |/
* | Upgrade to OpenSSH 6.8p1.des2016-01-191-252/+143
|\ \ | |/
* | Upgrade to OpenSSH 6.7p1, retaining libwrap support (which has been removeddes2016-01-191-3/+30
|\ \ | |/ | | | | | | | | upstream) and a number of security fixes which we had already backported. MFC after: 1 week
* | Fix OpenSSH multiple vulnerabilities by backporting three changesdelphij2015-08-251-3/+3
| | | | | | | | | | | | | | | | | | | | from OpenSSH-portable master. Git revisions: 45b0eb752c94954a6de046bfaaf129e518ad4b5b 5e75f5198769056089fb06c4d738ab0e5abc66f7 d4697fe9a28dab7255c60433e4dd23cf7fce8a8b Reviewed by: des Security: FreeBSD-SA-15:22.openssh
* | Upgrade to OpenSSH 6.6p1.des2014-03-251-229/+5
|\ \ | |/
* | Upgrade to OpenSSH 6.5p1.des2014-01-311-1/+2
|\ \ | |/
* | Upgrade to 6.3p1.des2013-09-211-97/+117
|\ \ | |/ | | | | Approved by: re (gjb)
* | Upgrade to OpenSSH 6.2p1. The most important new features are supportdes2013-03-221-14/+50
|\ \ | |/ | | | | for a key revocation list and more fine-grained authentication control.
* | Upgrade OpenSSH to 6.1p1.des2012-09-031-4/+2
| |
* | Upgrade to OpenSSH 5.9p1.des2011-10-051-23/+133
|\ \ | |/ | | | | MFC after: 3 months
* | Upgrade to OpenSSH 5.8p2.des2011-05-041-4/+5
|\ \ | |/
* | Upgrade to OpenSSH 5.6p1.des2010-11-111-10/+10
|\ \ | |/
* | Upgrade to OpenSSH 5.4p1.des2010-03-091-17/+3
|\ \ | |/ | | | | MFC after: 1 month
* | Upgrade to OpenSSH 5.3p1.des2009-10-011-6/+19
|\ \ | |/
* | Upgrade to OpenSSH 5.2p1.des2009-05-221-2/+229
|\ \ | |/ | | | | MFC after: 3 months
* | Upgrade to OpenSSH 5.1p1.des2008-08-011-8/+25
|\ \ | |/ | | | | | | | | | | | | | | | | I have worked hard to reduce diffs against the vendor branch. One notable change in that respect is that we no longer prefer DSA over RSA - the reasons for doing so went away years ago. This may cause some surprises, as ssh will warn about unknown host keys even for hosts whose keys haven't changed. MFC after: 6 weeks
| * Properly flatten openssh/dist.des2008-07-221-1954/+0
| |
| * Revert part of 180714 - the intent was to flatten dist, not to nuke it.des2008-07-221-0/+1954
| |
| * Flatten the OpenSSH vendor tree for 3.x and newer.des2008-07-221-1954/+0
| |
| * Vendor import of OpenSSH 4.5p1.des2006-11-101-4/+4
| |
| * Vendor import of OpenSSH 4.4p1.des2006-09-301-20/+61
| |
| * Vendor patch for a problem that prevented using protocol version 1 whendes2006-09-161-4/+1
| | | | | | | | BSM was enabled.
| * Vendor import of OpenSSH 4.3p1.des2006-03-221-8/+6
| |
| * Vendor import of OpenSSH 4.2p1.des2005-09-031-4/+4
| |
| * Vendor import of OpenSSH 4.1p1.des2005-06-051-4/+4
| |
| * Vendor import of OpenSSH 4.0p1.des2005-06-051-2/+71
| |
| * Vendor import of OpenSSH 3.9p1.des2004-10-281-75/+81
| |
| * Vendor import of OpenSSH 3.8.1p1.des2004-04-201-8/+9
| |
| * Vendor import of OpenSSH 3.8p1.des2004-02-261-17/+46
| |
| * Vendor import of OpenSSH 3.7.1p2.des2004-01-071-108/+271
| |
| * Vendor import of OpenSSH-portable 3.6.1p1.des2003-04-231-16/+26
| |
| * Vendor import of OpenSSH-portable 3.5p1.des2002-10-291-16/+114
| |
| * Vendor import of OpenSSH 3.4p1.des2002-06-291-7/+8
| |
| * Vendor import of OpenSSH 3.3p1.des2002-06-271-0/+43
| |
* | Revert an old hack I put in to replace S/Key with OPIE. We haven't useddes2008-08-011-9/+0
| | | | | | | | that code in ages - we use pam_opie(8) instead - so this is a NOP.
* | Resolve conflicts.des2006-11-101-4/+4
| |
* | Merge conflicts.des2006-09-301-22/+63
| | | | | | | | MFC after: 1 week
* | Merge vendor patch for BSM problem in protocol version 1.des2006-09-161-4/+1
| | | | | | | | MFC after: 1 week
* | Merge conflicts.des2006-03-221-8/+6
| |
* | Resolve conflicts.des2005-09-031-4/+4
| |
* | Resolve conflicts.des2005-06-051-3/+72
| |
* | Resolve conflictsdes2004-10-281-75/+81
| |
* | Resolve conflicts.des2004-04-201-8/+9
| |
* | Resolve conflicts.des2004-02-261-17/+46
| |
* | Resolve conflicts and remove obsolete files.des2004-01-071-120/+178
| | | | | | | | Sponsored by: registrar.no
* | Resolve conflicts.des2003-04-231-16/+26
| |
* | Fix keyboard-interactive authentication for ssh1. The problem was twofold:des2003-01-311-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - The PAM kbdint device sometimes doesn't know authentication succeeded until you re-query it. The ssh1 kbdint code would never re-query the device, so authentication would always fail. This patch has been submitted to the OpenSSH developers. - The monitor code for PAM sometimes forgot to tell the monitor that authentication had succeeded. This caused the monitor to veto the privsep child's decision to allow the connection. These patches have been tested with OpenSSH clients on -STABLE, NetBSD and Linux, and with ssh.com's ssh1 on Solaris. Sponsored by: DARPA, NAI Labs
* | Resolve conflicts.des2002-10-291-14/+112
| |
* | sshd didn't handle actual size of struct sockaddr correctly,ume2002-09-091-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | and did copy it as long as just size of struct sockaddr. So, If connection is via IPv6, sshd didn't log hostname into utmp correctly. This problem occured only under FreeBSD because of our hack. However, this is potential problem of OpenSSH-portable, and they agreed to fix this. Though, there is no fixed version of OpenSSH-portable available yet, since this problem is serious for IPv6 users, I commit the fix. Reported by: many people Reviewed by: current@ and stable@ (no objection) MFC after: 3 days
OpenPOWER on IntegriCloud