summaryrefslogtreecommitdiffstats
path: root/crypto/openssh/sshd.c
Commit message (Collapse)AuthorAgeFilesLines
* MFS (r296781):des2016-03-141-37/+39
| | | | | | | | | | MFH (r296633): upgrade to 7.2p2 (fixes xauth command injection bug) MFH (r296634): re-add aes-cbc to server-side default cipher list MFH (r296651, r296657): fix gcc build of pam_ssh PR: 207679 Security: CVE-2016-3115 Approved by: re (marius)
* MFH (r265214, r294333, r294407, r294467): misc prop fixesdes2016-02-071-156/+277
| | | | | | | | | | | | | | | | MFH (r285975, r287143): register mergeinfo for security fixes MFH (r294497, r294498, r295139): internal documentation MFH (r294328): upgrade to openssh 6.7p1, re-add libwrap MFH (r294332): upgrade to openssh 6.8p1 MFH (r294367): update pam_ssh for api changes MFH (r294909): switch usedns back on MFH (r294336): upgrade to openssh 6.9p1 MFH (r294495): re-enable dsa keys MFH (r294464): upgrade to openssh 7.0p1 MFH (r294496): upgrade to openssh 7.1p2 Approved by: re (gjb) Relnotes: yes
* MFH (r291198, r291260, r291261, r291375, r294325, r294335, r294563)des2016-01-241-22/+6
| | | | Remove the HPN and None cipher patches.
* MFH (r263234, r263691, r266465, r290671, r290672, r290673, r290674,des2016-01-241-1/+0
| | | | | | r294320, r294322, r294324, r294330, r294469, r294494, r294466) Reduce diffs to head in preparation for removing HPN and None.
* MFH (r264691): merge upstream patch for EC calculation bugdes2014-04-201-0/+3
|
* MFH (r263712): upgrade openssh to 6.6p1des2014-04-121-20/+33
| | | | MFH (r264308): restore p level in debugging output
* MFH (r261320): upgrade openssh to 6.5p1des2014-02-271-19/+37
| | | | MFH (r261340): enable sandboxing by default
* Unbreak the WITHOUT_KERBEROS build and try to reduce the odds of ades2013-09-231-3/+3
| | | | | | | | | repeat performance by introducing a script that runs configure with and without Kerberos, diffs the result and generates krb5_config.h, which contains the preprocessor macros that need to be defined in the Kerberos case and undefined otherwise. Approved by: re (marius)
* Upgrade to 6.3p1.des2013-09-211-21/+104
|\ | | | | | | Approved by: re (gjb)
* \ Upgrade to OpenSSH 6.2p1. The most important new features are supportdes2013-03-221-3/+41
|\ \ | |/ | | | | for a key revocation list and more fine-grained authentication control.
* | Upgrade OpenSSH to 6.1p1.des2012-09-031-41/+54
| |
* | OpenSSH: allow VersionAddendum to be used againrea2012-05-271-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Prior to this, setting VersionAddendum will be a no-op: one will always have BASE_VERSION + " " + VERSION_HPN for VersionAddendum set in the config and a bare BASE_VERSION + VERSION_HPN when there is no VersionAddendum is set. HPN patch requires both parties to have the "hpn" inside their advertized versions, so we add VERSION_HPN to the VERSION_BASE if HPN is enabled and omitting it if HPN is disabled. VersionAddendum now uses the following logics: * unset (default value): append " " and VERSION_ADDENDUM; * VersionAddendum is set and isn't empty: append " " and VersionAddendum; * VersionAddendum is set and empty: don't append anything. Approved by: des Reviewed by: bz MFC after: 3 days
* | Polish diff against upstream.ed2012-02-131-3/+3
| | | | | | | | | | | | | | | | | | | | - Revert unneeded whitespace changes. - Revert modifications to loginrec.c, as the upstream version already does the right thing. - Fix indentation and whitespace of local changes. Approved by: des MFC after: 1 month
* | Upgrade to OpenSSH 5.9p1.des2011-10-051-11/+33
|\ \ | |/ | | | | MFC after: 3 months
* | Add support for dynamically adjusted buffers to allow the full use ofbrooks2011-08-031-1/+18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | the bandwidth of long fat pipes (i.e. 100Mbps+ trans-oceanic or trans-continental links). Bandwidth-delay products up to 64MB are supported. Also add support (not compiled by default) for the None cypher. The None cypher can only be enabled on non-interactive sessions (those without a pty where -T was not used) and must be enabled in both the client and server configuration files and on the client command line. Additionally, the None cypher will only be activated after authentication is complete. To enable the None cypher you must add -DNONE_CIPHER_ENABLED to CFLAGS via the make command line or in /etc/make.conf. This code is a style(9) compliant version of these features extracted from the patches published at: http://www.psc.edu/networking/projects/hpn-ssh/ Merging this patch has been a collaboration between me and Bjoern. Reviewed by: bz Approved by: re (kib), des (maintainer)
* | Upgrade to OpenSSH 5.8p2.des2011-05-041-3/+11
|\ \ | |/
* | Upgrade to OpenSSH 5.6p1.des2010-11-111-3/+12
|\ \ | |/
* | Enhance r199804 by marking the daemonised child as immune to OOM insteadkib2010-04-081-4/+4
| | | | | | | | | | | | | | | | | | of short-living parent. Only mark the master process that accepts connections, do not protect connection handlers spawned from inetd. Submitted by: Mykola Dzham <i levsha me> Reviewed by: attilio MFC after: 1 week
* | Upgrade to OpenSSH 5.4p1.des2010-03-091-22/+115
|\ \ | |/ | | | | MFC after: 1 month
* | Make OpenSSH work with utmpx.ed2010-01-131-2/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Partially revert r184122 (sshd.c). Our ut_host is now big enough to fit proper hostnames. - Change config.h to match reality. - defines.h requires UTMPX_FILE to be set by <utmpx.h> before it allows the utmpx code to work. This makes no sense to me. I've already mentioned this upstream. - Add our own platform-specific handling of lastlog. The version I will send to the OpenSSH folks will use proper autoconf generated definitions instead of `#if 1'.
* | Avoid sshd, cron, syslogd and inetd to be killed under high-pressure swapattilio2009-11-251-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | environments. Please note that this can't be done while such processes run in jails. Note: in future it would be interesting to find a way to do that selectively for any desired proccess (choosen by user himself), probabilly via a ptrace interface or whatever. Obtained from: Sandvine Incorporated Reviewed by: emaste, arch@ Sponsored by: Sandvine Incorporated MFC: 1 month
* | Upgrade to OpenSSH 5.3p1.des2009-10-011-4/+5
|\ \ | |/
* | Upgrade to OpenSSH 5.2p1.des2009-05-221-3/+2
|\ \ | |/ | | | | MFC after: 3 months
* | At some point, construct_utmp() was changed to use realhostname() to filldes2008-10-211-1/+2
| | | | | | | | | | | | | | | | | | | | | | | | in the struct utmp due to concerns about the length of the hostname buffer. However, this breaks the UseDNS option. There is a simpler and better solution: initialize utmp_len to the correct value (UT_HOSTSIZE instead of MAXHOSTNAMELEN) and let get_remote_name_or_ip() worry about the size of the buffer. PR: bin/97499 Submitted by: Bruce Cran <bruce@cran.org.uk> MFC after: 1 week
* | Upgrade to OpenSSH 5.1p1.des2008-08-011-40/+123
|\ \ | |/ | | | | | | | | | | | | | | | | I have worked hard to reduce diffs against the vendor branch. One notable change in that respect is that we no longer prefer DSA over RSA - the reasons for doing so went away years ago. This may cause some surprises, as ssh will warn about unknown host keys even for hosts whose keys haven't changed. MFC after: 6 weeks
| * Properly flatten openssh/dist.des2008-07-221-2156/+0
| |
| * Revert part of 180714 - the intent was to flatten dist, not to nuke it.des2008-07-221-0/+2156
| |
| * Flatten the OpenSSH vendor tree for 3.x and newer.des2008-07-221-2156/+0
| |
| * Vendor import of OpenSSH 4.5p1.des2006-11-101-10/+14
| |
| * Vendor import of OpenSSH 4.4p1.des2006-09-301-346/+428
| |
| * Vendor import of OpenSSH 4.3p1.des2006-03-221-15/+37
| |
| * Vendor import of OpenSSH 4.2p1.des2005-09-031-12/+26
| |
| * Vendor import of OpenSSH 4.1p1.des2005-06-051-0/+2
| |
| * Vendor import of OpenSSH 4.0p1.des2005-06-051-32/+43
| |
| * Vendor import of OpenSSH 3.9p1.des2004-10-281-33/+246
| |
| * Vendor import of OpenSSH 3.8.1p1.des2004-04-201-27/+18
| |
| * Vendor import of OpenSSH 3.8p1.des2004-02-261-44/+64
| |
| * Vendor import of OpenSSH 3.7.1p2.des2004-01-071-114/+67
| |
| * Vendor import of OpenSSH-portable 3.6.1p1.des2003-04-231-9/+23
| |
| * Vendor import of OpenSSH-portable 3.5p1.des2002-10-291-43/+50
| |
| * Vendor import of OpenSSH 3.4p1.des2002-06-291-11/+37
| |
| * Vendor import of OpenSSH 3.3p1.des2002-06-271-3/+52
| |
| * Vendor import of OpenSSH 3.3.des2002-06-231-49/+309
| |
| * Vendor import of OpenSSH 3.1des2002-03-181-124/+178
| |
| * Say "hi" to the latest in the OpenSSH series, version 2.9!green2001-05-041-537/+370
| | | | | | | | Happy birthday to: rwatson
| * Import of OpenSSH 2.3.0 (virgin OpenBSD source release).green2000-12-051-37/+216
| |
| * Initial import of OpenSSH post-2.2.0 snapshot dated 2000-09-09kris2000-09-101-64/+186
| |
| * Initial import of OpenSSH snapshot from 2000/05/30kris2000-06-031-58/+13
| | | | | | | | Obtained from: OpenBSD
| * Initial import of OpenSSH v2.1.kris2000-05-151-1671/+463
| |
| * Virgin import of OpenSSH sources dated 2000/03/25kris2000-03-261-31/+43
| |
OpenPOWER on IntegriCloud