⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 changelog

📁 OpenSSH 是 SSH (Secure SHell) 协议的免费开源实现。它用安全、加密的网络连接工具代替了 telnet、ftp、 rlogin、rsh 和 rcp 工具。OpenSSH 支持
💻
📖 第 1 页 / 共 5 页
字号:
     Import new moduli; requested by deraadt@ a week ago   - dtucker@cvs.openbsd.org 2005/01/24 11:47:13     [auth-passwd.c]     #if -> #ifdef so builds without HAVE_LOGIN_CAP work too; ok djm@ otto@20050120 - (dtucker) OpenBSD CVS Sync   - markus@cvs.openbsd.org 2004/12/23 17:35:48     [session.c]     check for NULL; from mpech   - markus@cvs.openbsd.org 2004/12/23 17:38:07     [ssh-keygen.c]     leak; from mpech   - djm@cvs.openbsd.org 2004/12/23 23:11:00     [servconf.c servconf.h sshd.c sshd_config sshd_config.5]     bz #898: support AddressFamily in sshd_config. from     peak@argo.troja.mff.cuni.cz; ok deraadt@   - markus@cvs.openbsd.org 2005/01/05 08:51:32     [sshconnect.c]     remove dead code, log connect() failures with level error, ok djm@   - jmc@cvs.openbsd.org 2005/01/08 00:41:19     [sshd_config.5]     `login'(n) -> `log in'(v);   - dtucker@cvs.openbsd.org 2005/01/17 03:25:46     [moduli.c]     Correct spelling: SCHNOOR->SCHNORR; ok djm@   - dtucker@cvs.openbsd.org 2005/01/17 22:48:39     [sshd.c]     Make debugging output continue after reexec; ok djm@   - dtucker@cvs.openbsd.org 2005/01/19 13:11:47     [auth-bsdauth.c auth2-chall.c]     Have keyboard-interactive code call the drivers even for responses for     invalid logins.  This allows the drivers themselves to decide how to     handle them and prevent leaking information where possible.  Existing     behaviour for bsdauth is maintained by checking authctxt->valid in the     bsdauth driver.  Note that any third-party kbdint drivers will now need     to be able to handle responses for invalid logins.  ok markus@   - djm@cvs.openbsd.org 2004/12/22 02:13:19     [cipher-ctr.c cipher.c]     remove fallback AES support for old OpenSSL, as OpenBSD has had it for     many years now; ok deraadt@     (Id sync only: Portable will continue to support older OpenSSLs) - (dtucker) [auth-pam.c] Bug #971: Prevent leaking information about user   existence via keyboard-interactive/pam, in conjunction with previous   auth2-chall.c change; with Colin Watson and djm. - (dtucker) [loginrec.h] Bug #952: Increase size of username field to 128   bytes to prevent errors from login_init_entry() when the username is   exactly 64 bytes(!) long.  From brhamon at cisco.com, ok djm@ - (dtucker) [auth-chall.c auth.h auth2-chall.c] Bug #936: Remove pam from   the list of available kbdint devices if UsePAM=no.  ok djm@20050118 - (dtucker) [INSTALL Makefile.in configure.ac survey.sh.in] Implement   "make survey" and "make send-survey".  This will provide data on the   configure parameters, platform and platform features to the development   team, which will allow (among other things) better targetting of testing.   It's entirely voluntary and is off be default. ok djm@ - (dtucker) [survey.sh.in] Remove any blank lines from the output of   ccver-v and ccver-V.20041220 - (dtucker) [ssh-rand-helper.c] Fall back to command-based seeding if reading   from prngd is enabled at compile time but fails at run time, eg because   prngd is not running.  Note that if you have prngd running when OpenSSH is   built, OpenSSL will consider itself internally seeded and rand-helper won't   be built at all unless explicitly enabled via --with-rand-helper.  ok djm@ - (dtucker) [regress/rekey.sh] Touch datafile before filling with dd, since   on some wacky platforms (eg old AIXes), dd will refuse to create an output   file if it doesn't exist.20041213 - (dtucker) [contrib/findssh.sh] Clean up on interrupt; from   amarendra.godbole at ge com.20041211 - (dtucker) OpenBSD CVS Sync   - markus@cvs.openbsd.org 2004/12/06 16:00:43     [bufaux.c]     use 0x00 not \0 since buf[] is a bignum   - fgsch@cvs.openbsd.org 2004/12/10 03:10:42     [sftp.c]     - fix globbed ls for paths the same lenght as the globbed path when       we have a unique matching.     - fix globbed ls in case of a directory when we have a unique matching.     - as a side effect, if the path does not exist error (used to silently       ignore).     - don't do extra do_lstat() if we only have one matching file.     djm@ ok   - dtucker@cvs.openbsd.org 2004/12/11 01:48:56     [auth-rsa.c auth2-pubkey.c authfile.c misc.c misc.h]     Fix debug call in error path of authorized_keys processing and fix related     warnings; ok djm@20041208 - (tim) [configure.ac] Comment some non obvious platforms in the target-specific case statement. Suggested and OK by dtucker@20041207 - (dtucker) [regress/scp.sh] Use portable-friendly $DIFFOPTs in new test.20041206 - (dtucker) [TODO WARNING.RNG] Update to reflect current reality.  ok djm@ - (dtucker) OpenBSD CVS Sync   - markus@cvs.openbsd.org 2004/11/25 22:22:14     [sftp-client.c sftp.c]     leak; from mpech   - jmc@cvs.openbsd.org 2004/11/29 00:05:17     [sftp.1]     missing full stop;   - djm@cvs.openbsd.org 2004/11/29 07:41:24     [sftp-client.h sftp.c]     Some small fixes from moritz@jodeit.org. ok deraadt@   - jaredy@cvs.openbsd.org 2004/12/05 23:55:07     [sftp.1]     - explain that patterns can be used as arguments in get/put/ls/etc       commands (prodded by Michael Knudsen)     - describe ls flags as a list     - other minor improvements     ok jmc, djm   - dtucker@cvs.openbsd.org 2004/12/06 11:41:03     [auth-rsa.c auth2-pubkey.c authfile.c misc.c misc.h ssh.h sshd.8]     Discard over-length authorized_keys entries rather than complaining when     they don't decode.  bz #884, with & ok djm@ - (dtucker) OpenBSD CVS Sync (regress/)   - djm@cvs.openbsd.org 2004/06/26 06:16:07     [reexec.sh]     don't change the name of the copied sshd for the reexec fallback test,     makes life simpler for portable   - dtucker@cvs.openbsd.org 2004/07/08 12:59:35     [scp.sh]     Regress test for bz #863 (scp double-error), requires $SUDO.  ok markus@   - david@cvs.openbsd.org 2004/07/09 19:45:43     [Makefile]     add a missing CLEANFILES used in the re-exec test   - djm@cvs.openbsd.org 2004/10/08 02:01:50     [reexec.sh]     shrink and tidy; ok dtucker@   - djm@cvs.openbsd.org 2004/10/29 23:59:22     [Makefile added brokenkeys.sh]     regression test for handling of corrupt keys in authorized_keys file   - djm@cvs.openbsd.org 2004/11/07 00:32:41     [multiplex.sh]     regression tests for new multiplex commands   - dtucker@cvs.openbsd.org 2004/11/25 09:39:27     [test-exec.sh]     Remove obsolete RhostsAuthentication from test config; ok markus@   - dtucker@cvs.openbsd.org 2004/12/06 10:49:56     [test-exec.sh]     Check if TEST_SSH_SSHD is a full path to sshd before searching; ok markus@20041203 - (dtucker) OpenBSD CVS Sync   - jmc@cvs.openbsd.org 2004/11/07 17:42:36     [ssh.1]     options sort, and whitespace;   - jmc@cvs.openbsd.org 2004/11/07 17:57:30     [ssh.c]     usage():     - add -O     - sync -S w/ manpage     - remove -h - (dtucker) [auth1.c auth2.c] If the user successfully authenticates but is   subsequently denied by the PAM auth stack, send the PAM message to the   user via packet_disconnect (Protocol 1) or userauth_banner (Protocol 2).   ok djm@20041107 - (dtucker) OpenBSD CVS Sync   - djm@cvs.openbsd.org 2004/11/05 12:19:56     [sftp.c]     command editing and history support via libedit; ok markus@     thanks to hshoexer@ and many testers on tech@ too   - djm@cvs.openbsd.org 2004/11/07 00:01:46     [clientloop.c clientloop.h ssh.1 ssh.c]     add basic control of a running multiplex master connection; including the     ability to check its status and request it to exit; ok markus@ - (dtucker) [INSTALL Makefile.in configure.ac] Add --with-libedit configure   option and supporting makefile bits and documentation.20041105 - (dtucker) OpenBSD CVS Sync   - markus@cvs.openbsd.org 2004/08/30 09:18:08     [LICENCE]     s/keygen/keyscan/   - jmc@cvs.openbsd.org 2004/08/30 21:22:49     [ssh-add.1 ssh.1]     .Xsession -> .xsession;     originally from a pr from f at obiit dot org, but missed by myself;     ok markus@ matthieu@   - djm@cvs.openbsd.org 2004/09/07 23:41:30     [clientloop.c ssh.c]     cleanup multiplex control socket on SIGHUP too, spotted by sturm@     ok markus@ deraadt@   - deraadt@cvs.openbsd.org 2004/09/15 00:46:01     [ssh.c]     /* fallthrough */ is something a programmer understands.  But     /* FALLTHROUGH */ is also understood by lint, so that is better.   - jaredy@cvs.openbsd.org 2004/09/15 03:25:41     [sshd_config.5]     mention PrintLastLog only prints last login time for interactive     sessions, like PrintMotd mentions.     From Michael Knudsen, with wording changed slightly to match the     PrintMotd description.     ok djm   - mickey@cvs.openbsd.org 2004/09/15 18:42:27     [sshd.c]     use less doubles in daemons; markus@ ok   - deraadt@cvs.openbsd.org 2004/09/15 18:46:04     [scp.c]     scratch that do { } while (0) wrapper in this case   - djm@cvs.openbsd.org 2004/09/23 13:00:04     [ssh.c]     correctly honour -n in multiplex client mode; spotted by sturm@ ok markus@   - djm@cvs.openbsd.org 2004/09/25 03:45:14     [sshd.c]     these printf args are no longer double; ok deraadt@ markus@   - djm@cvs.openbsd.org 2004/10/07 10:10:24     [scp.1 sftp.1 ssh.1 ssh_config.5]     document KbdInteractiveDevices; ok markus@   - djm@cvs.openbsd.org 2004/10/07 10:12:36     [ssh-agent.c]     don't unlink agent socket when bind() fails, spotted by rich AT     rich-paul.net, ok markus@   - markus@cvs.openbsd.org 2004/10/20 11:48:53     [packet.c ssh1.h]     disconnect for invalid (out of range) message types.   - djm@cvs.openbsd.org 2004/10/29 21:47:15     [channels.c channels.h clientloop.c]     fix some window size change bugs for multiplexed connections: windows sizes     were not being updated if they had changed after ~^Z suspends and SIGWINCH     was not being processed unless the first connection had requested a tty;     ok markus   - djm@cvs.openbsd.org 2004/10/29 22:53:56     [clientloop.c misc.h readpass.c ssh-agent.c]     factor out common permission-asking code to separate function; ok markus@   - djm@cvs.openbsd.org 2004/10/29 23:56:17     [bufaux.c bufaux.h buffer.c buffer.h]     introduce a new buffer API that returns an error rather than fatal()ing     when presented with bad data; ok markus@   - djm@cvs.openbsd.org 2004/10/29 23:57:05     [key.c]     use new buffer API to avoid fatal errors on corrupt keys in authorized_keys     files; ok markus@20041102 - (dtucker) [configure.ac includes.h] Bug #947: Fix compile error on HP-UX   10.x by testing for conflicts in shadow.h and undef'ing _INCLUDE__STDC__   only if a conflict is detected.20041019 - (dtucker) [uidswap.c] Don't test dropping of gids for the root user or   on Cygwin.  Cygwin parts from vinschen at redhat com; ok djm@20041016 - (djm) [auth-pam.c] snprintf->strl*, fix server message length calculations;   ok dtucker@20041006 - (dtucker) [README.privsep] Bug #939: update info about HP-UX Trusted Mode   and other PAM platforms. - (dtucker) [monitor_mm.c openbsd-compat/xmmap.c] Bug #940: cast constants   to void * to appease picky compilers (eg Tru64's "cc -std1").20040930 - (dtucker) [configure.ac] Set AC_PACKAGE_NAME.  ok djm@20040923 - (dtucker) [openbsd-compat/bsd-snprintf.c] Previous change was off by one,   which could have caused the justification to be wrong.  ok djm@20040921 - (dtucker) [openbsd-compat/bsd-snprintf.c] Check for max length too.   ok djm@ - (dtucker) [contrib/cygwin/ssh-host-config] Update to match current Cygwin   install process.  Patch from vinschen at redhat.com.20040912 - (djm) [loginrec.c] Start KNF and tidy up of this long-neglected file.   No change in resultant binary - (djm) [loginrec.c] __func__ifiy - (djm) [loginrec.c] xmalloc - (djm) [ssh.c sshd.c version.h] Don't divulge portable version in protocol   banner. Suggested by deraadt@, ok mouring@, dtucker@ - (dtucker) [configure.ac] Fix incorrect quoting and tests for cross-compile.   Partly by & ok djm@.20040911 - (djm) [ssh-agent.c] unifdef some cygwin code; ok dtucker@ - (dtucker) [auth-pam.c auth-pam.h session.c] Bug #890: Send output from   failing PAM session modules to user then exit, similar to the way   /etc/nologin is handled.  ok djm@ - (dtucker) [auth-pam.c] Relocate sshpam_store_conv(), no code change. - (djm) [auth2-kbdint.c auth2-none.c  auth2-passwd.c auth2-pubkey.c]    Make cygwin code more consistent with that which surrounds it - (dtucker) [auth-pam.c auth.h auth2-none.c auth2.c monitor.c monitor_wrap.c]   Bug #892: Send messages from failing PAM account modules to the client via   SSH2_MSG_USERAUTH_BANNER messages.  Note that this will not happen with   SSH2 kbdint authentication, which need to be dealt with separately.  ok djm@ - (dtucker) [session.c] Bug #927: make .hushlogin silent again.  ok djm@ - (dtucker) [configure.ac] Bug #321: Add cross-compile support to configure.   Parts by chua at ayrnetworks.com, astrand at lysator.liu.se and me.  ok djm@

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -