summaryrefslogtreecommitdiffstats
path: root/crypto/openssh/sshd.c
Commit message (Collapse)AuthorAgeFilesLines
* Resolve conflicts.des2002-10-291-43/+50
|
* Resolve conflicts.des2002-06-291-11/+38
| | | | Sponsored by: DARPA, NAI Labs
* Forcibly revert to mainline.des2002-06-271-9/+48
|
* Resolve conflicts. Known issues:des2002-06-231-49/+309
| | | | | | | | | | | - sshd fails to set TERM correctly. - privilege separation may break PAM and is currently turned off. - man pages have not yet been updated I will have these issues resolved, and privilege separation turned on by default, in time for DP2. Sponsored by: DARPA, NAI Labs
* Fix conflicts.des2002-03-181-131/+177
|
* Make libssh.so useable (undefined reference to IPv4or6).ru2002-01-231-1/+1
| | | | | Reviewed by: des, markm Approved by: markm
* fix renamed options in some of the code that was #ifdef AFSassar2001-09-041-1/+1
| | | | | | also print an error if krb5 ticket passing is disabled Submitted by: Jonathan Chen <jon@spock.org>
* Fix conflicts for OpenSSH 2.9.green2001-05-041-532/+344
|
* Add code for being compatible with ssh.com's krb5 authentication.assar2001-03-041-12/+7
| | | | | | | | | It is done by using the same ssh messages for v4 and v5 authentication (since the ssh.com does not now anything about v4) and looking at the contents after unpacking it to see if it is v4 or v5. Based on code from Björn Grönvall <bg@sics.se> PR: misc/20504
* Patches backported from later development version of OpenSSH which preventkris2001-02-121-17/+37
| | | | | | | | (instead of just mitigating through connection limits) the Bleichenbacher attack which can lead to guessing of the server key (not host key) by regenerating it when an RSA failure is detected. Reviewed by: rwatson
* /Really/ deprecate ConnectionsPerPeriod, ripping out the code for itgreen2001-01-131-63/+0
| | | | and giving a dire error to its lingering users.
* Fix a long-standing bug that resulted in a dropped session sometimesgreen2001-01-061-0/+1
| | | | | | when an X11-forwarded client was closed. For some reason, sshd didn't disable the SIGPIPE exit handler and died a horrible death (well, okay, a silent death really). Set SIGPIPE's handler to SIG_IGN.
* Update to OpenSSH 2.3.0 with FreeBSD modifications. OpenSSH 2.3.0green2000-12-051-37/+221
| | | | | | | | | | | | | | | | | new features description elided in favor of checking out their website. Important new FreeBSD-version stuff: PAM support has been worked in, partially from the "Unix" OpenSSH version, and a lot due to the work of Eivind Eklend, too. This requires at least the following in pam.conf: sshd auth sufficient pam_skey.so sshd auth required pam_unix.so try_first_pass sshd session required pam_permit.so Parts by: Eivind Eklend <eivind@FreeBSD.org>
* Fix a few style oddities.green2000-09-101-6/+6
|
* Fix a goof in timevaldiff.green2000-09-101-1/+1
|
* Resolve conflicts and update for OpenSSH 2.2.0kris2000-09-101-100/+220
| | | | Reviewed by: gshapiro, peter, green
* Allow restarting on SIGHUP when the full path was not given as argv[0].green2000-07-041-0/+1
| | | | We do have /proc/curproc/file :)
* Also make sure to close the socket that exceeds your rate limit.green2000-06-261-0/+1
|
* Make rate limiting work per-listening-socket. Log better messages thangreen2000-06-261-29/+32
| | | | | | | before for this, requiring a new function (get_ipaddr()). canohost.c receives a $FreeBSD$ line. Suggested by: Niels Provos <niels@OpenBSD.org>
* Resolve conflictskris2000-06-031-58/+13
|
* Unbreak Kerberos5 compilation. This still remains untested.kris2000-05-171-3/+0
| | | | Noticed by: obrien
* Resolve conflicts and update for FreeBSD.kris2000-05-151-2041/+463
|
* Resolve conflicts.kris2000-03-261-23/+43
|
* Make LOGIN_CAP work properly.markm2000-03-091-18/+27
|
* Enable connection logging. FreeBSD's libwrap is IPv6 ready.ume2000-02-291-2/+1
| | | | | | | OpenSSH is in our source tree, now. It's a time to enable it. Reviewed by: markm, shin Approved by: jkh
* 1) Add kerberos5 functionality.markm2000-02-281-88/+342
| | | | | | by Daniel Kouril <kouril@informatics.muni.cz> 2) Add full LOGIN_CAP capability by Andrey Chernov
* Fix a bug that crawled in pretty recently (from the port). It madegreen2000-02-251-2/+2
| | | | sshd coredump :(
* Add the patches fom ports (QV: ports/security/openssh/patches/patch-*)markm2000-02-241-10/+191
|
* Vendor import of OpenSSH.markm2000-02-241-0/+2541
OpenPOWER on IntegriCloud