Commit graph

2594 commits

Author SHA1 Message Date
Dirk Meyer
cd87949d28 - Update to 0.9.6c
- more manpages
- shift FORBIDDEN

 Excerpt of Changes between 0.9.6b and 0.9.6c  [21 dec 2001]
  *) Fix BN_rand_range bug pointed out by Dominikus Scherkl
  *) Only add signing time to PKCS7 structures if it is not already present.
  *) Fix crypto/objects/objects.h: "ld-ce" should be "id-ce", OBJ_ld_ce
     should be OBJ_id_ce.  Also some ip-pda OIDs in crypto/objects/objects.txt
     were incorrect (cf. RFC 3039).
  *) Release CRYPTO_LOCK_DYNLOCK when CRYPTO_destroy_dynlockid()
     returns early because it has nothing to do.
  *) Fix mutex callback return values in crypto/engine/hw_ncipher.c.
  *) Change ssl/s2_clnt.c and ssl/s2_srvr.c so that received handshake
     messages are stored in a single piece (fixed-length part and
     variable-length part combined) and fix various bugs found on the way.
  *) Disable caching in BIO_gethostbyname(), directly use gethostbyname()
     instead.  BIO_gethostbyname() does not know what timeouts are
     appropriate, so entries would stay in cache even when they have
     become invalid.
  *) Change ssl23_get_client_hello (ssl/s23_srvr.c) behaviour when
     faced with a pathologically small ClientHello fragment that does
     not contain client_version: Instead of aborting with an error,
     simply choose the highest available protocol version (i.e.,
     TLS 1.0 unless it is disabled).
  *) Fix SSL handshake functions and SSL_clear() such that SSL_clear()
     never resets s->method to s->ctx->method when called from within
     one of the SSL handshake functions.
  *) In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert
     (sent using the client's version number) if client_version is
     smaller than the protocol version in use.  Also change
     ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0 if
     the client demanded SSL 3.0 but only TLS 1.0 is enabled; then
     the client will at least see that alert.
  *) Fix ssl3_get_message (ssl/s3_both.c) to handle message fragmentation
     correctly.
  *) Avoid infinite loop in ssl3_get_message (ssl/s3_both.c) if a
     client receives HelloRequest while in a handshake.
  *) Bugfix in ssl3_accept (ssl/s3_srvr.c): Case SSL3_ST_SW_HELLO_REQ_C
     should end in 'break', not 'goto end' which circuments various
     cleanups done in state SSL_ST_OK.   But session related stuff
     must be disabled for SSL_ST_OK in the case that we just sent a
     HelloRequest.  Also avoid some overhead by not calling
     ssl_init_wbio_buffer() before just sending a HelloRequest.
  *) Fix ssl/s3_enc.c, ssl/t1_enc.c and ssl/s3_pkt.c so that we don't
     reveal whether illegal block cipher padding was found or a MAC
     verification error occured.  (Neither SSLerr() codes nor alerts
     are directly visible to potential attackers, but the information
     may leak via logfiles.) ssl/s2_pkt.c failed to verify that the
     purported number of padding bytes is in the legal range.
  *) Improve RSA_padding_check_PKCS1_OAEP() check again to avoid
     'wristwatch attack' using huge encoding parameters (cf.
     James H. Manger's CRYPTO 2001 paper).  Note that the
     RSA_PKCS1_OAEP_PADDING case of RSA_private_decrypt() does not use
     encoding parameters and hence was not vulnerable.
  *) BN_sqr() bug fix.
  *) Rabin-Miller test analyses assume uniformly distributed witnesses,
     so use BN_pseudo_rand_range() instead of using BN_pseudo_rand()
     followed by modular reduction.
  *) Add BN_pseudo_rand_range() with obvious functionality: BN_rand_range()
     equivalent based on BN_pseudo_rand() instead of BN_rand().
  *) s3_srvr.c: allow sending of large client certificate lists (> 16 kB).
     This function was broken, as the check for a new client hello message
     to handle SGC did not allow these large messages.
  *) Add alert descriptions for TLSv1 to SSL_alert_desc_string[_long]().
  *) Fix buggy behaviour of BIO_get_num_renegotiates() and BIO_ctrl()
     for BIO_C_GET_WRITE_BUF_SIZE ("Stephen Hinton" <shinton@netopia.com>).
  *) In ssl3_get_key_exchange (ssl/s3_clnt.c), call ssl3_get_message()
     with the same message size as in ssl3_get_certificate_request().
     Otherwise, if no ServerKeyExchange message occurs, CertificateRequest
     messages might inadvertently be reject as too long.
  *) Modified SSL library such that the verify_callback that has been set
     specificly for an SSL object with SSL_set_verify() is actually being
     used. Before the change, a verify_callback set with this function was
     ignored and the verify_callback() set in the SSL_CTX at the time of
     the call was used. New function X509_STORE_CTX_set_verify_cb() introduced
     to allow the necessary settings.
  *) In OpenSSL 0.9.6a and 0.9.6b, crypto/dh/dh_key.c ignored
     dh->length and always used
          BN_rand_range(priv_key, dh->p).
     So switch back to
          BN_rand(priv_key, l, ...)
     where 'l' is dh->length if this is defined, or BN_num_bits(dh->p)-1
     otherwise.
  *) In RSA_eay_public_encrypt, RSA_eay_private_decrypt, RSA_eay_private_encrypt
     RSA_eay_public_decrypt always reject numbers >= n.
  *) In crypto/rand/md_rand.c, use a new short-time lock CRYPTO_LOCK_RAND2
     to synchronize access to 'locking_thread'.
  *) In crypto/rand/md_rand.c, set 'locking_thread' to current thread's ID
     *before* setting the 'crypto_lock_rand' flag.  The previous code had
     a race condition if 0 is a valid thread ID.
2002-04-21 13:02:08 +00:00
Anders Nordby
450bcc58e6 Update maintainer e-mail address.
PR:		37294
Submitted by:	maintainer
2002-04-20 20:41:23 +00:00
Cy Schubert
fddcce45a6 Update krb5-1.2.5-beta1 --> krb5-1.2.5-beta2 2002-04-20 06:33:53 +00:00
Kris Kennaway
66bcd1ef6c Patches from maintainer:
* HKP (WWW) key submissions disabled by default, enabled via
  configuration file
* nicer formatting of long (SHA-1) fingerprints
* pksdctl usage() shows available commands/arguments
* manual page fixes

Bump PORTREVISION.

PR:		ports/34970
Submitted by:	Jason Harris <jharris@widomaker.com>
2002-04-19 22:23:32 +00:00
Will Andrews
e05ed36727 Say goodbye to Qt 1.x and all of its dependents. The one port I found
which probably isn't supposed to be removed is misc/instant-workstation,
which had a dependency on audio/xamp (being removed), so I removed that
dependency and bumped PORTREVISION.  All other ports are real dependents
upon Qt 1.x, including KDE 1.x stuff.

Code in bsd.kde.mk supporting these ports is also removed or adjusted.
Also, some adjustments made to accomodate Qt3/KDE3 ports, which will be
committed Real Soon Now (TM), pending repo-copies.

This commit made in impending view of Qt3/KDE3 entering ports tree.
2002-04-19 02:30:02 +00:00
Jimmy Olgeni
650acf9b73 Update nessus-devel suite to version 1.2.0.
PR:		37237
Submitted by:	Udo Schweigert <udo.schweigert@siemens.com>
2002-04-18 23:03:36 +00:00
Ying-Chieh Liao
7467468397 libgmp3 -> libgmp4 2002-04-18 08:20:50 +00:00
Kris Kennaway
89b10cd027 Transfer maintainership to Jason Harris <jharris@widomaker.com> 2002-04-18 07:21:39 +00:00
Patrick Li
b4c65fcd5a Give maintainership back to ports@
PR:		37191
Submitted by:	maintainer
2002-04-17 20:48:29 +00:00
James E. Housley
4bfc56ffba Update to 4197 2002-04-17 17:44:11 +00:00
Jun Kuriyama
4d9355ef5d Check hidden dependency on libiconv.
Pointed out by:	Neil Darlow <neil@darlow.co.uk>
2002-04-16 13:00:39 +00:00
Kris Kennaway
4a9bf56335 Upgrade to snort 1.8.6. The previous two versions (1.8.4 and 1.8.5) were
buggy and short-lived; hopefully this one is better.
2002-04-13 22:17:58 +00:00
Cy Schubert
23fe8b5980 New MIT Kerberos V beta, V 1.2.5-beta1. 2002-04-13 16:33:14 +00:00
Ade Lovett
f18cbf2fa6 gettext upgrade uber-patch (stage 3)
- switch devel/gettext (0.11.1) on, installing full package
- flip devel/gettext-old (0.10.35) to installing only static binaries
  with a "-old" suffix -- gettext-old will have its deorbit burn
  sequence initiated just after 4.6-RELEASE
- fix up ports for the new world order

Reviewed by:	portmgr
2002-04-12 17:10:20 +00:00
Peter Pentchev
827337d5de Update the download site and URL.
PR:		36687
Submitted by:	Kimura Fuyuki <fuyuki@mj.0038.net>
Approved by:	maintainer
2002-04-11 12:13:12 +00:00
Anders Nordby
15cf2b7eb4 Mark as broken for -current with OpenPAM. Does not work yet. 2002-04-10 22:28:01 +00:00
James E. Housley
790f5083d2 Upgrade to 4196 2002-04-10 19:45:33 +00:00
Ying-Chieh Liao
d1c0c6dc10 upgrade to 0.9.5 2002-04-10 05:20:58 +00:00
Patrick Li
ddc479d484 Fix another case when build breaks when qt versions 1 and 2 coexist 2002-04-10 03:06:58 +00:00
Cy Schubert
149ce449af Add fwanalog 0.5.1, a firewall log summarizer that uses Analog.
PR:		35758
Submitted by:	Kimura Fuyuki <fuyuki@mj.0038.net>
2002-04-07 02:55:07 +00:00
Cy Schubert
c2fc27cd09 Fixup pkg-plist.
Pointy hat to:	myself
2002-04-06 20:30:01 +00:00
Joe Marcus Clarke
82c3291614 Change my ports to use my FreeBSD.org address.
Approved by:	sobomax
2002-04-05 23:26:36 +00:00
Dag-Erling Smørgrav
bd860384a9 Nuked at maintainer's request now that pam_passwdqc is in the base system. 2002-04-04 19:30:49 +00:00
Ying-Chieh Liao
7d997e7631 upgrade to 1.14
PR:		36742
Submitted by:	maintainer
2002-04-04 17:47:33 +00:00
James E. Housley
745067e401 Update to 4195 2002-04-03 23:59:42 +00:00
Patrick Li
d4d6adf588 Update to 20020403
PR:		36693
Submitted by:	Martti Kuparinen <martti.kuparinen@iki.fi>
2002-04-03 21:11:50 +00:00
David E. O'Brien
740ec3103f Update to version 2.54 Beta 32. 2002-04-02 19:49:58 +00:00
Munechika SUMIKAWA
f60fc31a58 This port needs python from building, not running. 2002-04-02 15:39:26 +00:00
Mark Pulford
30cda655e2 Add vlog 1.1f, a curses based real-time logfile viewer.
PR:		36616
Submitted by:	hannes sowa <satbran@web.de>
2002-04-02 12:58:21 +00:00
Akinori MUSHA
5e7984ac3c ssh_askpass2 is built only when X11 is installed. Support
{WITH,WITHOUT}_X11 and detect ${X11BASE}/lib/libX11.a.

Reported by:	bento
Obtained from:	security/ssh (partly)
2002-04-02 04:49:20 +00:00
Kris Kennaway
f37b25c1d3 Remove this port at the request of the maintainer. The version of pam_ssh
in the base system is more up-to-date and is being actively maintained.
2002-04-01 21:53:39 +00:00
Patrick Li
bef868fb31 Unbreak pam_ldap on -CURRENT after the latest OpenPAM patch
PR:		36613
Submitted by:	maintainer
2002-04-01 17:30:37 +00:00
Patrick Li
f4ae410928 Add new port security/pam_passwdqc - A pam module to validate passwords
for quality

PR:		36597
Submitted by:	Dominic Marks <dominic_marks@btinernet.com>
2002-04-01 05:03:15 +00:00
David W. Chapman Jr.
b9adee9a1b Update to 2.0.3
PR:		36595
Submitted by:	maintainer
2002-04-01 02:10:44 +00:00
Patrick Li
cc9b51f474 Update to 0.6.6 2002-03-31 06:42:30 +00:00
Kris Kennaway
0d40931381 Add #include <arpa/inet.h> to unbreak build 2002-03-31 06:40:03 +00:00
Patrick Li
c62a8ab834 Add option for jumbo patch kit and pass maintainership to submitter
PR:		36514
Submitted by:	ago <a.go@wish.net>
2002-03-31 01:00:39 +00:00
Patrick Li
fcc7c84916 Update to 20020203 and give maintainership back to ports@
PR:		36548
Submitted by:	maintainer
2002-03-30 21:30:23 +00:00
Will Andrews
97e6d16408 Fix the KDE ports to not use objprelink, if OSVERSION >= 500029. This is
not tested other than for syntax, but should DTRT from what I understand
of the problem.

Submitted by:	bento
2002-03-30 09:07:53 +00:00
Dirk Meyer
24b7840a21 - Fix build for 5.0-CURRENT 2002-03-30 05:18:23 +00:00
Cy Schubert
341484d039 www.crypto-publish.org does not have krb5-1.2.4.{tar,tar.Z,tar.gz,tar.bz2}.
Reported by:	bento
2002-03-29 13:23:08 +00:00
Pete Fritchman
55726ef289 - add a patch to let this build with OpenPAM, but mark as broken for
-currents with OpenPAM because functionality is broken.
- touch -> ${TOUCH}

PR:		36469
Submitted by:	maintainer
2002-03-29 07:46:57 +00:00
Michael Haro
266d45a29b Update port to 0.80
Maintainer timeout: 6 months, 17 days
2002-03-29 06:05:40 +00:00
Patrick Li
3d18342831 Install config file as a sample file
PR:		36442
Submitted by:	ago <a.go@wish.net>
2002-03-28 23:04:51 +00:00
James E. Housley
3aaaa263dc Update to 4194 2002-03-27 20:34:17 +00:00
Dirk Meyer
719a821efb remove obsolete patch: openssh/files/patch-cipher.c 2002-03-27 20:03:29 +00:00
Dirk Meyer
bb59716b3b Updated Patch on openBSD website,
patch openssh/files/patch-cipher.c is now obsolete.
2002-03-27 20:02:41 +00:00
Pete Fritchman
570668daae Update MASTER_SITES and WWW: tag.
PR:		36358
Submitted by:	Kimura Fuyuki <fuyuki@mj.0038.net>
2002-03-27 06:13:27 +00:00
Ying-Chieh Liao
4d4a5773b5 upgrade to 0.9.3 2002-03-26 06:14:22 +00:00
Maxim Sobolev
62f2687e21 Add USE_SUBMAKE, where it might be necessary. 2002-03-25 09:19:20 +00:00
Dirk Meyer
0a075bed87 Fix problem with auth_ttyok and ttyname 2002-03-25 05:40:50 +00:00
Dirk Meyer
8f8caf8dcb - Make KERBEROS patch build with heimdal port 2002-03-25 05:39:39 +00:00
Dirk Meyer
108bf0f7d5 - Fix problem with auth_ttyok and ttyname
- Make KERBEROS patch build with heimdal port
2002-03-25 05:39:17 +00:00
Anders Nordby
2cd6758010 Remove lib/alat dir upon deinstallation if it exists. 2002-03-24 17:58:25 +00:00
Anders Nordby
9daf0ba398 Add audit, tools for remote and centralized audit data collection. 2002-03-24 15:32:45 +00:00
Kris Kennaway
c3cbac4e38 Remove krb5-beta, which was deleted from the tree.
Pointy hat to:	cy
Submitted by:	bento
2002-03-24 08:20:56 +00:00
Mikhail Teterin
7fd1fa1461 Search in the ${LOCABASE}/include too, not just include/pgsql.
Submitted by:	Anders Nordby
2002-03-23 22:41:04 +00:00
Patrick Li
1133aea38b Set where to look for ldap secret file
PR:		36029
Submitted by:	maintainer
2002-03-23 10:09:41 +00:00
Dirk Meyer
aeadfb0c48 - Update patches for Option KRB5_HOME
openssh-3.1p1-gssapi-20020321.diff
	openssh-mit-krb5-20020319.diff
2002-03-23 04:08:33 +00:00
James E. Housley
4c84cf2973 4193 Emergency Dat release due to W32/MyLife.b@MM 2002-03-22 17:16:52 +00:00
Cy Schubert
554ba79d4d Update nessus-*-devel 1.1.13 --> 1.1.14.
PR:		36192
Submitted by:	MAINTAINER:  Udo Schweigert <udo.schweigert@siemens.com>
2002-03-22 16:12:46 +00:00
David E. O'Brien
6461124331 Update to version 2.54 Beta 31. 2002-03-21 01:39:49 +00:00
James E. Housley
a06df11d1b Update to 4192 2002-03-21 01:34:38 +00:00
Akinori MUSHA
c62bf270e0 Update to 1.4. 2002-03-20 11:16:07 +00:00
Cy Schubert
a50d121378 MIT currently distributes their KRB5 distribution in a tarball (.tar)
that contains the distribution itself, in a tar.gz file, and a signature
certificate, contained in a detached .tar.gz.asc file.  Prior to this
patch, users installing MIT KRB5 had to extract the tarball into
/usr/ports/distfiles, then proceed with the installation.  This caused
confusion among those installing the port.  This patch addresses the
problem by extracting the .tar.gz file from the tarball, then unpacking
the .tar.gz file before continuing with the build.
2002-03-18 22:52:43 +00:00
Akinori MUSHA
21d944be5c Bump PORTREVISION to reflect the (lib)iconv upgrade. 2002-03-18 10:27:58 +00:00
Maxim Sobolev
8493a5819b Iconv cleanup, stage 1b: correct {BUILD,LIB,RUN}_DEPENDS of all ports that need
libiconv.
2002-03-18 09:46:46 +00:00
Dirk Meyer
74642142e3 Merged patches for HAVE_LOGIN_CAP from stable
PR:		35904
2002-03-17 20:24:24 +00:00
Dirk Meyer
465131a92c Merge patches from -stable with USE_PAM and HAVE_LOGIN_CAP
Bump PORTREVISION

PR:		35904
2002-03-17 19:36:40 +00:00
Trevor Johnson
1725d28635 Correct master site.
PR:		35976
Submitted by:	Kimura Fuyuki <fuyuki@mj.0038.net>
2002-03-16 14:33:39 +00:00
Ying-Chieh Liao
ad278c3fa9 add py-cryptkit 0.9
A Cryptographic Toolkit for Python
2002-03-16 10:14:44 +00:00
Ade Lovett
9210b7cb07 Stage 1 of gettext update.
Move gettext (0.10.35) with gettext-old
Update gettext from gettext-devel (0.10.40)
Remove gettext-devel
Fix dependencies

Stage 2 will involve upgraded gettext to 0.11 and fixing issues
Stage 3 involves a de-orbit burn sequence for gettext-old

Reviewed by:	portmgr
2002-03-15 19:44:29 +00:00
Dirk Meyer
b46611d8cf Fixed Build in 4.2
Add correct Version of OPENSSL in dependencies if older than 4.3
(bsd.ports.mk) is still not sufficent.
2002-03-15 19:39:21 +00:00
Cy Schubert
a2166cbe3c Change MAINTAINER from me at work to me at FreeBSD.org. 2002-03-15 15:17:58 +00:00
Ying-Chieh Liao
8a2e1cba18 add nofgpg 0.4
No One Fears GPG
2002-03-15 13:13:12 +00:00
Anders Nordby
6a7f3a5015 Master site updates: www.freenix.no => atreides.freenix.no for these
files.
2002-03-15 00:31:54 +00:00
David E. O'Brien
9d235696c5 Spelling error and whitespace changes.
PR:		35888
Submitted by:	Peter J. Avalos <pavalos@theshell.com>
2002-03-14 18:18:08 +00:00
Ying-Chieh Liao
e633179c52 add p5-Crypt-DES_EDE3 0.01
Perl5 interface to a implementing 3-DES EDE encryption and decryption

PR:		35891
Submitted by:	jesper
2002-03-14 15:00:57 +00:00
Ying-Chieh Liao
c22e7f25dc add p5-Crypt-DH 0.03
Perl5 interface to a Diffie-Hellman key exchange system

PR:		35890
Submitted by:	jesper
2002-03-14 14:58:35 +00:00
Ying-Chieh Liao
13cf6fb6d1 add p5-Digest-BubbleBabble 0.0.1
Perl5 interface to a fingerprint in "bubble babble" format

PR:		35889
Submitted by:	jesper
2002-03-14 14:55:13 +00:00
James E. Housley
21381b4c6a Update to 4191
4191 Emergency Dat release due to W32/Fbound.c@MM
2002-03-14 13:06:19 +00:00
Anders Nordby
ad6b4799b4 Correct MAINTAINER e-mail address for ports I maintain. 2002-03-14 00:11:40 +00:00
James E. Housley
07b4875157 Upgrade to 4190 2002-03-13 21:43:15 +00:00
Patrick Li
cf3c2dbf3a Fix installing translations to unbreak install
Noticed by:	bento
2002-03-13 10:22:57 +00:00
Dirk Meyer
5b2b1d7808 Rename Patches to make navigation much more easier. 2002-03-12 17:54:07 +00:00
Dirk Meyer
0bb6535e08 create ssh_config-dist and sshd_config-dist
make sure that package install and deinstall
don't temper existing configuration files.
install sshd.sh now as sample.

Package changed, but no need to update
if you have PORTREVISION=2
2002-03-12 17:50:42 +00:00
Dirk Meyer
2153ca77b9 Add etc/moduli if it does not exist already.
sshd complainied about it.
2002-03-11 15:16:48 +00:00
Patrick Li
18edf8155b Update to 1.9
PR:		35734
Submitted by:	Patrik Backlund <pbacklun@cc.hut.fi>
2002-03-10 16:00:57 +00:00
Dirk Meyer
a3f4492eca Extend the description for openssh-portable
Fix description for openssh
2002-03-10 04:54:09 +00:00
Patrick Li
996563db79 Update to 0.6.6 2002-03-10 04:25:12 +00:00
Patrick Li
a9c5b21221 Add sample startup script
PR:		35701
Submitted by:	Kimura Fuyuki <fuyuki@mj.0038.net>
2002-03-09 17:57:58 +00:00
Dirk Meyer
b0f1b90bd7 Allow IPv6 connection if detected by configure.
Submitted by:	ume
2002-03-09 12:51:44 +00:00
Dirk Meyer
b04ff45912 - Fix Problem with 3des chiper
- Patch from openssh-portable, which works fine.
- bump PORTREVISION
2002-03-09 06:38:34 +00:00
Dirk Meyer
6ecd1db2e7 fix patch for build on bento 2002-03-08 21:06:29 +00:00
Dirk Meyer
d645ac0bfa - add defines for comatibility with older FreeBSD releases 3.x and 2.2.8
SHUT_RD, SHUT_WR, SHUT_RDWR
	INET_ADDRSTRLEN
- add dirname() from FreeBSD 4.5
- use utimes instead of futimes fore FreeBSD < 4.x
2002-03-08 20:51:56 +00:00
Dirk Meyer
00ab21c036 - patch to fix undefined (ulong)
- builds now for FreeBSD 2.2.8
2002-03-08 18:24:12 +00:00
Garrett Wollman
ea3d920c0a Fix thinko and make it possible to disable Kerberos support on the
make command line even if KRB5_HOME is set in make.conf.
2002-03-08 17:45:47 +00:00
Garrett Wollman
1bda92506f Mark BROKEN in Kerberos case: Simon Wilkinson has not released
updated patches yet.  (I hope dinoex doesn't mind my committing this.)
2002-03-08 17:44:30 +00:00
Dirk Meyer
fa10b7c0f8 - Add more INET6 #ifdef's
- Suggested patch modified and extended

PR:		35673
Submitted by:	scheidell@secnap.net
2002-03-08 17:21:59 +00:00
Dirk Meyer
e52b8b908a Pass option to generate rsa1 keys, which is now required.
PR:		35676
Submitted by:	sysadmin@alexdupre.com
2002-03-08 17:00:16 +00:00
Vanilla I. Shu
e13769d7b8 Upgrade to 0.6.
PR:		ports/35665
Submitted by:	Kimura Fuyuki <fuyuki@mj.0038.net>
Some part by:	me
2002-03-08 15:51:04 +00:00
Cy Schubert
100b2507d9 Removing krb5-beta port. Krb5-beta is a "test" port to allow FreeBSD users
the opportunity to use/test the upcoming krb5 before it is released.
Krb5-1.2.4 was released over a week ago superceeding this port.  This port
will be resurrected when a new krb5-beta becomes available.
2002-03-08 14:38:43 +00:00
Patrick Li
ecdbd20337 Update to 1.4.0
PR:		35663
Submitted by:	maintainer
2002-03-08 06:11:13 +00:00
Dirk Meyer
e95e5c70ff Update to OpenSSH 3.1 OpennSSH-portable 3.1p1
- update patch-au,patch-session.c for password changes.
- patch-channel.c is now integrated

Excerpt from Changelog:

20020304
 - OpenBSD CVS Sync
   - deraadt@cvs.openbsd.org 2002/02/26 18:52:32
     [sftp.1]
     Ic cannot have that many arguments; spotted by mouring@etoh.eviladmin.org
   - mouring@cvs.openbsd.org 2002/02/26 19:04:37
     [sftp.1]
     > Ic cannot have that many arguments; spotted by mouring@etoh.eviladmin.org
     Last Ic on the first line should not have a space between it and the final
     comma.
   - deraadt@cvs.openbsd.org 2002/02/26 19:06:43
     [sftp.1]
     no, look closely.  the comma was highlighted. split .Ic even more
   - stevesk@cvs.openbsd.org 2002/02/26 20:03:51
     [misc.c]
     use socklen_t
   - stevesk@cvs.openbsd.org 2002/02/27 21:23:13
     [canohost.c channels.c packet.c sshd.c]
     remove unneeded casts in [gs]etsockopt(); ok markus@
   - markus@cvs.openbsd.org 2002/02/28 15:46:33
     [authfile.c kex.c kexdh.c kexgex.c key.c ssh-dss.c]
     add some const EVP_MD for openssl-0.9.7
   - stevesk@cvs.openbsd.org 2002/02/28 19:36:28
     [auth.c match.c match.h]
     delay hostname lookup until we see a ``@'' in DenyUsers and AllowUsers
     for sshd -u0; ok markus@
   - stevesk@cvs.openbsd.org 2002/02/28 20:36:42
     [sshd.8]
     DenyUsers allows user@host pattern also
   - stevesk@cvs.openbsd.org 2002/02/28 20:46:10
     [sshd.8]
     -u0 DNS for user@host
   - stevesk@cvs.openbsd.org 2002/02/28 20:56:00
     [auth.c]
     log user not allowed details, from dwd@bell-labs.com; ok markus@
   - markus@cvs.openbsd.org 2002/03/01 13:12:10
     [auth.c match.c match.h]
     undo the 'delay hostname lookup' change
     match.c must not use compress.c (via canonhost.c/packet.c)
     thanks to wilfried@
   - markus@cvs.openbsd.org 2002/03/04 12:43:06
     [auth-passwd.c auth-rh-rsa.c auth-rhosts.c]
   - markus@cvs.openbsd.org 2002/03/04 13:10:46
     [misc.c]
     error-> debug, because O_NONBLOCK for /dev/null causes too many different
     errnos; ok stevesk@, deraadt@
     unused include
   - stevesk@cvs.openbsd.org 2002/03/04 17:27:39
     [auth-krb5.c auth-options.h auth.h authfd.h authfile.h bufaux.h buffer.h
      channels.h cipher.h compat.h compress.h crc32.h deattack.c getput.h
      groupaccess.c misc.c mpaux.h packet.h readconf.h rsa.h scard.h
      servconf.h ssh-agent.c ssh.h ssh2.h sshpty.h sshtty.c ttymodes.h
      uuencode.c xmalloc.h]
     $OpenBSD$ and RCSID() cleanup: don't use RCSID() in .h files; add
     missing RCSID() to .c files and remove dup /*$OpenBSD$*/ from .c
     files.  ok markus@
   - stevesk@cvs.openbsd.org 2002/03/04 18:30:23
     [ssh-keyscan.c]
     handle connection close during read of protocol version string.
     fixes erroneous "bad greeting".  ok markus@
   - markus@cvs.openbsd.org 2002/03/04 19:37:58
     [channels.c]
     off by one; thanks to joost@pine.nl
20020226
 - (tim) Bug 12 [configure.ac] add sys/bitypes.h to int64_t tests
   based on patch by mooney@dogbert.cc.ndsu.nodak.edu (Tim Mooney)
   Bug 45 [configure.ac] modify skey test to work around conflict with autoconf
   reported by nolan@naic.edu (Michael Nolan)
   patch by  Pekka Savola <pekkas@netcore.fi>
   Bug 74 [configure.ac defines.h] add sig_atomic_t test
   reported by dwd@bell-labs.com (Dave Dykstra)
   Bug 102 [defines.h] UNICOS fixes. patch by wendyp@cray.com
   [configure.ac Makefile.in] link libwrap only with sshd
   based on patch by Maciej W. Rozycki <macro@ds2.pg.gda.pl>
   Bug 123 link libpam only with sshd
   reported by peak@argo.troja.mff.cuni.cz (Pavel Kankovsky)
   [configure.ac defines.h] modify previous SCO3 fix to not break Solaris 7
   [acconfig.h] remove unused HAVE_REGCOMP
   [configure.ac] put back in search for prngd-socket
 - (stevesk) openbsd-compat/base64.h: typo in comment
 - (bal) OpenBSD CVS Sync
   - markus@cvs.openbsd.org 2002/02/15 23:54:10
     [auth-krb5.c]
     krb5_get_err_text() does not like context==NULL; he@nordu.net via google;
     ok provos@
   - markus@cvs.openbsd.org 2002/02/22 12:20:34
     [log.c log.h ssh-keyscan.c]
     overwrite fatal() in ssh-keyscan.c; fixes pr 2354; ok provos@
   - markus@cvs.openbsd.org 2002/02/23 17:59:02
     [kex.c kexdh.c kexgex.c]
     don't allow garbage after payload.
   - stevesk@cvs.openbsd.org 2002/02/24 16:09:52
     [sshd.c]
     use u_char* here; ok markus@
   - markus@cvs.openbsd.org 2002/02/24 16:57:19
     [sftp-client.c]
     early close(), missing free; ok stevesk@
   - markus@cvs.openbsd.org 2002/02/24 16:58:32
     [packet.c]
     make 'cp' unsigned and merge with 'ucp'; ok stevesk@
   - markus@cvs.openbsd.org 2002/02/24 18:31:09
     [uuencode.c]
     typo in comment
   - markus@cvs.openbsd.org 2002/02/24 19:14:59
     [auth2.c authfd.c authfd.h authfile.c kexdh.c kexgex.c key.c key.h
      ssh-dss.c ssh-dss.h ssh-keygen.c ssh-rsa.c ssh-rsa.h sshconnect2.c]
     signed vs. unsigned: make size arguments u_int, ok stevesk@
   - stevesk@cvs.openbsd.org 2002/02/24 19:59:42
     [channels.c misc.c]
     disable Nagle in connect_to() and channel_post_port_listener() (port
     forwarding endpoints).  the intention is to preserve the on-the-wire
     appearance to applications at either end; the applications can then
     enable TCP_NODELAY according to their requirements. ok markus@
   - markus@cvs.openbsd.org 2002/02/25 16:33:27
     [ssh-keygen.c sshconnect2.c uuencode.c uuencode.h]
     more u_* fixes
 - (bal) Imported missing fatal.c and fixed up Makefile.in
 - (tim) [configure.ac] correction to Bug 123 fix
     [configure.ac] correction to sig_atomic_t test

20020224
 - (tim) [loginrec.c session.c sshlogin.c sshlogin.h] Bug 84
   patch by wknox@mitre.org (William Knox).
   [sshlogin.h] declare record_utmp_only for session.c

20020219
 - (djm) OpenBSD CVS Sync
   - mpech@cvs.openbsd.org 2002/02/13 08:33:47
     [ssh-keyscan.1]
     When you give command examples and etc., in a manual page prefix them with:     $ command
     or
     # command
   - markus@cvs.openbsd.org 2002/02/14 23:27:59
     [channels.c]
     increase the SSH v2 window size to 4 packets. comsumes a little
     bit more memory for slow receivers but increases througput.
   - markus@cvs.openbsd.org 2002/02/14 23:28:00
     [channels.h session.c ssh.c]
     increase the SSH v2 window size to 4 packets. comsumes a little
     bit more memory for slow receivers but increases througput.
   - markus@cvs.openbsd.org 2002/02/14 23:41:01
     [authfile.c cipher.c cipher.h kex.c kex.h packet.c]
     hide some more implementation details of cipher.[ch] and prepares for move
     to EVP, ok deraadt@
   - stevesk@cvs.openbsd.org 2002/02/16 14:53:37
     [ssh-keygen.1]
     -t required now for key generation
   - stevesk@cvs.openbsd.org 2002/02/16 20:40:08
     [ssh-keygen.c]
     default to rsa keyfile path for non key generation operations where
     keyfile not specified.  fixes core dump in those cases.  ok markus@
   - millert@cvs.openbsd.org 2002/02/16 21:27:53
     [auth.h]
     Part one of userland __P removal.  Done with a simple regexp with
     some minor hand editing to make comments line up correctly.  Another
     pass is forthcoming that handles the cases that could not be done
     automatically.
   - millert@cvs.openbsd.org 2002/02/17 19:42:32
     [auth.h]
     Manual cleanup of remaining userland __P use (excluding packages
     maintained outside the tree)
   - markus@cvs.openbsd.org 2002/02/18 13:05:32
     [cipher.c cipher.h]
     switch to EVP, ok djm@ deraadt@
   - markus@cvs.openbsd.org 2002/02/18 17:55:20
     [ssh.1]
     -q: Fatal errors are _not_ displayed.
   - deraadt@cvs.openbsd.org 2002/02/19 02:50:59
     [sshd_config]
     stategy is not an english word
 - (bal) OpenBSD CVS Sync
   - markus@cvs.openbsd.org 2002/02/15 23:11:26
     [session.c]
     split do_child(), ok mouring@
   - markus@cvs.openbsd.org 2002/02/16 00:51:44
     [session.c]
     typo

20020218
 - (tim) newer config.guess from ftp://ftp.gnu.org/gnu/config/config.guess

20020213
 - (djm) Bug #114 - not starting PAM for SSH protocol 1 invalid users

20020213
 - (djm) OpenBSD CVS Sync
   - markus@cvs.openbsd.org 2002/02/11 16:10:15
     [kex.c]
     restore kexinit handler if we reset the dispatcher, this unbreaks
     rekeying s/kex_clear_dispatch/kex_reset_dispatch/
   - markus@cvs.openbsd.org 2002/02/11 16:15:46
     [sshconnect1.c]
     include md5.h, not evp.h
   - markus@cvs.openbsd.org 2002/02/11 16:17:55
     [sshd.c]
     do not complain about port > 1024 if rhosts-auth is disabled
   - markus@cvs.openbsd.org 2002/02/11 16:19:39
     [sshd.c]
     include md5.h not hmac.h
   - markus@cvs.openbsd.org 2002/02/11 16:21:42
     [match.c]
     support up to 40 algorithms per proposal
   - djm@cvs.openbsd.org 2002/02/12 12:32:27
     [sftp.1 sftp.c sftp-client.c sftp-client.h sftp-int.c]
     Perform multiple overlapping read/write requests in file transfer. Mostly
     done by Tobias Ringstrom <tori@ringstrom.mine.nu>; ok markus@
   - djm@cvs.openbsd.org 2002/02/12 12:44:46
     [sftp-client.c]
     Let overlapped upload path handle servers which reorder ACKs. This may be
     permitted by the protocol spec; ok markus@
   - markus@cvs.openbsd.org 2002/02/13 00:28:13
     [sftp-server.c]
     handle SSH2_FILEXFER_ATTR_SIZE in SSH2_FXP_(F)SETSTAT; ok djm@
   - markus@cvs.openbsd.org 2002/02/13 00:39:15
     [readpass.c]
     readpass.c is not longer from UCB, since we now use readpassphrase(3)
   - djm@cvs.openbsd.org 2002/02/13 00:59:23
     [sftp-client.c sftp-client.h sftp-glob.c sftp-glob.h sftp.h]
     [sftp-int.c sftp-int.h]
     API cleanup and backwards compat for filexfer v.0 servers; ok markus@
 - (djm) Sync openbsd-compat with OpenBSD CVS too
 - (djm) Bug #106: Add --without-rpath configure option. Patch from
   Nicolas.Williams@ubsw.com

20020210
 - (djm) OpenBSD CVS Sync
   - deraadt@cvs.openbsd.org 2002/02/09 17:37:34
     [pathnames.h session.c ssh.1 sshd.8 sshd_config ssh-keyscan.1]
     move ssh config files to /etc/ssh
 - (djm) Adjust portable Makefile.in tnd ssh-rand-helper.c o match
   - deraadt@cvs.openbsd.org 2002/02/10 01:07:05
     [readconf.h sshd.8]
     more /etc/ssh; openbsd@davidkrause.com

20020208
 - (djm) OpenBSD CVS Sync
   - markus@cvs.openbsd.org 2002/02/04 12:15:25
     [sshd.c]
     add SYSLOG_FACILITY_NOT_SET = -1, SYSLOG_LEVEL_NOT_SET = -1,
     fixes arm/netbsd; based on patch from bjh21@netbsd.org; ok djm@
   - stevesk@cvs.openbsd.org 2002/02/04 20:41:16
     [ssh-agent.1]
     more sync for default ssh-add identities; ok markus@
   - djm@cvs.openbsd.org 2002/02/05 00:00:46
     [sftp.1 sftp.c sftp-client.c sftp-client.h sftp-int.c]
     Add "-B" option to specify copy buffer length (default 32k); ok markus@
   - markus@cvs.openbsd.org 2002/02/05 14:32:55
     [channels.c channels.h ssh.c]
     merge channel_request() into channel_request_start()
   - markus@cvs.openbsd.org 2002/02/06 14:22:42
     [sftp.1]
     sort options; ok mpech@, stevesk@
   - mpech@cvs.openbsd.org 2002/02/06 14:27:23
     [sftp.c]
     sync usage() with manual.
   - markus@cvs.openbsd.org 2002/02/06 14:37:22
     [session.c]
     minor KNF
   - markus@cvs.openbsd.org 2002/02/06 14:55:16
     [channels.c clientloop.c serverloop.c ssh.c]
     channel_new never returns NULL, mouring@; ok djm@
   - markus@cvs.openbsd.org 2002/02/07 09:35:39
     [ssh.c]
     remove bogus comments

20020205
 - (djm) Cleanup after sync:
   - :%s/reverse_mapping_check/verify_reverse_mapping/g
 - (djm) OpenBSD CVS Sync
   - stevesk@cvs.openbsd.org 2002/01/24 21:09:25
     [channels.c misc.c misc.h packet.c]
     add set_nodelay() to set TCP_NODELAY on a socket (prep for nagle tuning).
     no nagle changes just yet; ok djm@ markus@
   - stevesk@cvs.openbsd.org 2002/01/24 21:13:23
     [packet.c]
     need misc.h for set_nodelay()
   - markus@cvs.openbsd.org 2002/01/25 21:00:24
     [sshconnect2.c]
     unused include
   - markus@cvs.openbsd.org 2002/01/25 21:42:11
     [ssh-dss.c ssh-rsa.c]
     use static EVP_MAX_MD_SIZE buffers for EVP_DigestFinal; ok stevesk@
     don't use evp_md->md_size, it's not public.
   - markus@cvs.openbsd.org 2002/01/25 22:07:40
     [kex.c kexdh.c kexgex.c key.c mac.c]
     use EVP_MD_size(evp_md) and not evp_md->md_size; ok steveks@
   - stevesk@cvs.openbsd.org 2002/01/26 16:44:22
     [includes.h session.c]
     revert code to add x11 localhost display authorization entry for
     hostname/unix:d and uts.nodename/unix:d if nodename was different than
     hostname.  just add entry for unix:d instead.  ok markus@
   - stevesk@cvs.openbsd.org 2002/01/27 14:57:46
     [channels.c servconf.c servconf.h session.c sshd.8 sshd_config]
     add X11UseLocalhost; ok markus@
   - stevesk@cvs.openbsd.org 2002/01/27 18:08:17
     [ssh.c]
     handle simple case to identify FamilyLocal display; ok markus@
   - markus@cvs.openbsd.org 2002/01/29 14:27:57
     [ssh-add.c]
     exit 2 if no agent, exit 1 if list fails; debian#61078; ok djm@
   - markus@cvs.openbsd.org 2002/01/29 14:32:03
     [auth2.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c canohost.c]
     [servconf.c servconf.h session.c sshd.8 sshd_config]
     s/ReverseMappingCheck/VerifyReverseMapping/ and avoid confusion;
     ok stevesk@
   - stevesk@cvs.openbsd.org 2002/01/29 16:29:02
     [session.c]
     limit subsystem length in log; ok markus@
   - markus@cvs.openbsd.org 2002/01/29 16:41:19
     [ssh-add.1]
     add DIAGNOSTICS; ok stevesk@
   - markus@cvs.openbsd.org 2002/01/29 22:46:41
     [session.c]
     don't depend on servconf.c; ok djm@
   - markus@cvs.openbsd.org 2002/01/29 23:50:37
     [scp.1 ssh.1]
     mention exit status; ok stevesk@
   - markus@cvs.openbsd.org 2002/01/31 13:35:11
     [kexdh.c kexgex.c]
     cross check announced key type and type from key blob
   - markus@cvs.openbsd.org 2002/01/31 15:00:05
     [serverloop.c]
     no need for WNOHANG; ok stevesk@
   - markus@cvs.openbsd.org 2002/02/03 17:53:25
     [auth1.c serverloop.c session.c session.h]
     don't use channel_input_channel_request and callback
     use new server_input_channel_req() instead:
     	server_input_channel_req does generic request parsing on server side
     	session_input_channel_req handles just session specific things now
     ok djm@
   - markus@cvs.openbsd.org 2002/02/03 17:55:55
     [channels.c channels.h]
     remove unused channel_input_channel_request
   - markus@cvs.openbsd.org 2002/02/03 17:58:21
     [channels.c channels.h ssh.c]
     generic callbacks are not really used, remove and
     add a callback for msg of type SSH2_MSG_CHANNEL_OPEN_CONFIRMATION
     ok djm@
   - markus@cvs.openbsd.org 2002/02/03 17:59:23
     [sshconnect2.c]
     more cross checking if announced vs. used key type; ok stevesk@
   - stevesk@cvs.openbsd.org 2002/02/03 22:35:57
     [ssh.1 sshd.8]
     some KeepAlive cleanup/clarify; ok markus@
   - stevesk@cvs.openbsd.org 2002/02/03 23:22:59
     [ssh-agent.1]
     ssh-add also adds $HOME/.ssh/id_rsa and $HOME/.ssh/id_dsa now.
   - stevesk@cvs.openbsd.org 2002/02/04 00:53:39
     [ssh-agent.c]
     unneeded includes
   - markus@cvs.openbsd.org 2002/02/04 11:58:10
     [auth2.c]
     cross checking of announced vs actual pktype in pubkey/hostbaed auth;
     ok stevesk@
   - markus@cvs.openbsd.org 2002/02/04 12:15:25
     [log.c log.h readconf.c servconf.c]
     add SYSLOG_FACILITY_NOT_SET = -1, SYSLOG_LEVEL_NOT_SET = -1,
     fixes arm/netbsd; based on patch from bjh21@netbsd.org; ok djm@
   - stevesk@cvs.openbsd.org 2002/02/04 20:41:16
     [ssh-add.1]
     more sync for default ssh-add identities; ok markus@
   - djm@cvs.openbsd.org 2002/02/04 21:53:12
     [sftp.1 sftp.c]
     Add "-P" option to directly connect to a local sftp-server. Should be
     useful for regression testing; ok markus@
   - djm@cvs.openbsd.org 2002/02/05 00:00:46
     [sftp.1 sftp.c sftp-client.c sftp-client.h sftp-int.c]
     Add "-B" option to specify copy buffer length (default 32k); ok markus@

20020130
 - (djm) Delay PRNG seeding until we need it in ssh-keygen, from markus@
 - (tim) [configure.ac] fix logic on when ssh-rand-helper is installed.
   [sshd_config] put back in line that tells what PATH was compiled into sshd.

20020125
 - (djm) Don't grab Xserver or pointer by default. x11-ssh-askpass doesn't
   and grabbing can cause deadlocks with kinput2.

20020124
 - (stevesk) Makefile.in: bug #61; delete commented line for now.

20020123
 - (djm) Fix non-standard shell syntax in autoconf. Patch from
   Dave Dykstra <dwd@bell-labs.com>
 - (stevesk) fix --with-zlib=
 - (djm) Use case statements in autoconf to clean up some tests

20020122
 - (djm) autoconf hacking:
   - We don't support --without-zlib currently, so don't allow it.
   - Rework cryptographic random number support detection. We now detect
     whether OpenSSL seeds itself. If it does, then we don't bother with
     the ssh-rand-helper program. You can force the use of ssh-rand-helper
     using the --with-rand-helper configure argument
   - Simplify and clean up ssh-rand-helper configuration
   - Add OpenSSL sanity check: verify that header version matches version
     reported by library
 - (djm) Fix some bugs I introduced into ssh-rand-helper yesterday
 - OpenBSD CVS Sync
   - djm@cvs.openbsd.org 2001/12/21 08:52:22
     [ssh-keygen.1 ssh-keygen.c]
     Remove default (rsa1) key type; ok markus@
   - djm@cvs.openbsd.org 2001/12/21 08:53:45
     [readpass.c]
     Avoid interruptable passphrase read; ok markus@
   - djm@cvs.openbsd.org 2001/12/21 10:06:43
     [ssh-add.1 ssh-add.c]
     Try all standard key files (id_rsa, id_dsa, identity) when invoked with
     no arguments; ok markus@
   - markus@cvs.openbsd.org 2001/12/21 12:17:33
     [serverloop.c]
     remove ifdef for USE_PIPES since fdin != fdout; ok djm@
   - deraadt@cvs.openbsd.org 2001/12/24 07:29:43
     [ssh-add.c]
     try all listed keys.. how did this get broken?
   - markus@cvs.openbsd.org 2001/12/25 18:49:56
     [key.c]
     be more careful on allocation
   - markus@cvs.openbsd.org 2001/12/25 18:53:00
     [auth1.c]
     be more carefull on allocation
   - markus@cvs.openbsd.org 2001/12/27 18:10:29
     [ssh-keygen.c]
     -t is only needed for key generation (unbreaks -i, -e, etc).
   - markus@cvs.openbsd.org 2001/12/27 18:22:16
     [auth1.c authfile.c auth-rsa.c dh.c kexdh.c kexgex.c key.c rsa.c]
     [scard.c ssh-agent.c sshconnect1.c sshd.c ssh-dss.c]
     call fatal() for openssl allocation failures
   - stevesk@cvs.openbsd.org 2001/12/27 18:22:53
     [sshd.8]
     clarify -p; ok markus@
   - markus@cvs.openbsd.org 2001/12/27 18:26:13
     [authfile.c]
     missing include
   - markus@cvs.openbsd.org 2001/12/27 19:37:23
     [dh.c kexdh.c kexgex.c]
     always use BN_clear_free instead of BN_free
   - markus@cvs.openbsd.org 2001/12/27 19:54:53
     [auth1.c auth.h auth-rh-rsa.c]
     auth_rhosts_rsa now accept generic keys.
   - markus@cvs.openbsd.org 2001/12/27 20:39:58
     [auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h]
     [serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
     get rid of packet_integrity_check, use packet_done() instead.
   - markus@cvs.openbsd.org 2001/12/28 12:14:27
     [auth1.c auth2.c auth2-chall.c auth-rsa.c channels.c clientloop.c]
     [kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c]
     [ssh.c sshconnect1.c sshconnect2.c sshd.c]
     s/packet_done/packet_check_eom/ (end-of-message); ok djm@
   - markus@cvs.openbsd.org 2001/12/28 13:57:33
     [auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c]
     packet_get_bignum* no longer returns a size
   - markus@cvs.openbsd.org 2001/12/28 14:13:13
     [bufaux.c bufaux.h packet.c]
     buffer_get_bignum: int -> void
   - markus@cvs.openbsd.org 2001/12/28 14:50:54
     [auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c]
     [packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c]
     [sshconnect2.c sshd.c]
     packet_read* no longer return the packet length, since it's not used.
   - markus@cvs.openbsd.org 2001/12/28 15:06:00
     [auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c]
     [dispatch.h kex.c kex.h serverloop.c ssh.c sshconnect2.c]
     remove plen from the dispatch fn. it's no longer used.
   - stevesk@cvs.openbsd.org 2001/12/28 22:37:48
     [ssh.1 sshd.8]
     document LogLevel DEBUG[123]; ok markus@
   - stevesk@cvs.openbsd.org 2001/12/29 21:56:01
     [authfile.c channels.c compress.c packet.c sftp-server.c]
     [ssh-agent.c ssh-keygen.c]
     remove unneeded casts and some char->u_char cleanup; ok markus@
   - stevesk@cvs.openbsd.org 2002/01/03 04:11:08
     [ssh_config]
     grammar in comment
   - stevesk@cvs.openbsd.org 2002/01/04 17:59:17
     [readconf.c servconf.c]
     remove #ifdef _PATH_XAUTH/#endif; ok markus@
   - stevesk@cvs.openbsd.org 2002/01/04 18:14:16
     [servconf.c sshd.8]
     protocol 2 HostKey code default is now /etc/ssh_host_rsa_key and
     /etc/ssh_host_dsa_key like we have in sshd_config.  ok markus@
   - markus@cvs.openbsd.org 2002/01/05 10:43:40
     [channels.c]
     fix hanging x11 channels for rejected cookies (e.g.
     XAUTHORITY=/dev/null xbiff) bug #36, based on patch from
     djast@cs.toronto.edu
   - stevesk@cvs.openbsd.org 2002/01/05 21:51:56
     [ssh.1 sshd.8]
     some missing and misplaced periods
   - markus@cvs.openbsd.org 2002/01/09 13:49:27
     [ssh-keygen.c]
     append \n only for public keys
   - markus@cvs.openbsd.org 2002/01/09 17:16:00
     [channels.c]
     merge channel_pre_open_15/channel_pre_open_20; ok provos@
   - markus@cvs.openbsd.org 2002/01/09 17:26:35
     [channels.c nchan.c]
     replace buffer_consume(b, buffer_len(b)) with buffer_clear(b);
     ok provos@
   - markus@cvs.openbsd.org 2002/01/10 11:13:29
     [serverloop.c]
     skip client_alive_check until there are channels; ok beck@
   - markus@cvs.openbsd.org 2002/01/10 11:24:04
     [clientloop.c]
     handle SSH2_MSG_GLOBAL_REQUEST (just reply with failure); ok djm@
   - markus@cvs.openbsd.org 2002/01/10 12:38:26
     [nchan.c]
     remove dead code (skip drain)
   - markus@cvs.openbsd.org 2002/01/10 12:47:59
     [nchan.c]
     more unused code (with channels.c:1.156)
   - markus@cvs.openbsd.org 2002/01/11 10:31:05
     [packet.c]
     handle received SSH2_MSG_UNIMPLEMENTED messages; ok djm@
   - markus@cvs.openbsd.org 2002/01/11 13:36:43
     [ssh2.h]
     add defines for msg type ranges
   - markus@cvs.openbsd.org 2002/01/11 13:39:36
     [auth2.c dispatch.c dispatch.h kex.c]
     a single dispatch_protocol_error() that sends a message of
     type 'UNIMPLEMENTED'
     dispatch_range(): set handler for a ranges message types
     use dispatch_protocol_ignore() for authentication requests after
     successful authentication (the drafts requirement).
     serverloop/clientloop now send a 'UNIMPLEMENTED' message instead
     of exiting.
   - markus@cvs.openbsd.org 2002/01/11 20:14:11
     [auth2-chall.c auth-skey.c]
     use strlcpy not strlcat; mouring@
   - markus@cvs.openbsd.org 2002/01/11 23:02:18
     [readpass.c]
     use _PATH_TTY
   - markus@cvs.openbsd.org 2002/01/11 23:02:51
     [auth2-chall.c]
     use snprintf; mouring@
   - markus@cvs.openbsd.org 2002/01/11 23:26:30
     [auth-skey.c]
     use snprintf; mouring@
   - markus@cvs.openbsd.org 2002/01/12 13:10:29
     [auth-skey.c]
     undo local change
   - provos@cvs.openbsd.org 2002/01/13 17:27:07
     [ssh-agent.c]
     change to use queue.h macros; okay markus@
   - markus@cvs.openbsd.org 2002/01/13 17:57:37
     [auth2.c auth2-chall.c compat.c sshconnect2.c sshd.c]
     use buffer API and avoid static strings of fixed size;
     ok provos@/mouring@
   - markus@cvs.openbsd.org 2002/01/13 21:31:20
     [channels.h nchan.c]
     add chan_set_[io]state(), order states, state is now an u_int,
     simplifies debugging messages; ok provos@
   - markus@cvs.openbsd.org 2002/01/14 13:22:35
     [nchan.c]
     chan_send_oclose1() no longer calls chan_shutdown_write(); ok provos@
   - markus@cvs.openbsd.org 2002/01/14 13:34:07
     [nchan.c]
     merge chan_[io]buf_empty[12]; ok provos@
   - markus@cvs.openbsd.org 2002/01/14 13:40:10
     [nchan.c]
     correct fn names for ssh2, do not switch from closed to closed;
     ok provos@
   - markus@cvs.openbsd.org 2002/01/14 13:41:13
     [nchan.c]
     remove duplicated code; ok provos@
   - markus@cvs.openbsd.org 2002/01/14 13:55:55
     [channels.c channels.h nchan.c]
     remove function pointers for events, remove chan_init*; ok provos@
   - markus@cvs.openbsd.org 2002/01/14 13:57:03
     [channels.h nchan.c]
     (c) 2002
   - markus@cvs.openbsd.org 2002/01/16 13:17:51
     [channels.c channels.h serverloop.c ssh.c]
     wrapper for channel_setup_fwd_listener
   - stevesk@cvs.openbsd.org 2002/01/16 17:40:23
     [sshd_config]
     The stategy now used for options in the default sshd_config shipped
     with OpenSSH is to specify options with their default value where
     possible, but leave them commented.  Uncommented options change a
     default value.  Subsystem is currently the only default option
     changed.  ok markus@
   - stevesk@cvs.openbsd.org 2002/01/16 17:42:33
     [ssh.1]
     correct defaults for -i/IdentityFile; ok markus@
   - stevesk@cvs.openbsd.org 2002/01/16 17:55:33
     [ssh_config]
     correct some commented defaults.  add Ciphers default.  ok markus@
   - stevesk@cvs.openbsd.org 2002/01/17 04:27:37
     [log.c]
     casts to silence enum type warnings for bugzilla bug 37; ok markus@
   - stevesk@cvs.openbsd.org 2002/01/18 17:14:16
     [sshd.8]
     correct Ciphers default; paola.mannaro@ubs.com
   - stevesk@cvs.openbsd.org 2002/01/18 18:14:17
     [authfd.c bufaux.c buffer.c cipher.c packet.c ssh-agent.c ssh-keygen.c]
     unneeded cast cleanup; ok markus@
   - stevesk@cvs.openbsd.org 2002/01/18 20:46:34
     [sshd.8]
     clarify Allow(Groups|Users) and Deny(Groups|Users); suggestion from
     allard@oceanpark.com; ok markus@
   - markus@cvs.openbsd.org 2002/01/21 15:13:51
     [sshconnect.c]
     use read_passphrase+ECHO in confirm(), allows use of ssh-askpass
     for hostkey confirm.
   - markus@cvs.openbsd.org 2002/01/21 22:30:12
     [cipher.c compat.c myproposal.h]
     remove "rijndael-*", just use "aes-" since this how rijndael is called
     in the drafts; ok stevesk@
   - markus@cvs.openbsd.org 2002/01/21 23:27:10
     [channels.c nchan.c]
     cleanup channels faster if the are empty and we are in drain-state;
     ok deraadt@
   - stevesk@cvs.openbsd.org 2002/01/22 02:52:41
     [servconf.c]
     typo in error message; from djast@cs.toronto.edu
 - (djm) Make auth2-pam.c compile again after dispatch.h and packet.h
   changes
 - (djm) Recent Glibc includes an incompatible sys/queue.h. Treat it as
   bogus in configure
 - (djm) Use local sys/queue.h if necessary in ssh-agent.c

20020121
 - (djm) Rework ssh-rand-helper:
   - Reduce quantity of ifdef code, in preparation for ssh_rand_conf
   - Always seed from system calls, even when doing PRNGd seeding
   - Tidy and comment #define knobs
   - Remove unused facility for multiple runs through command list
   - KNF, cleanup, update copyright

20020114
 - (djm) Bug #50 - make autoconf entropy path checks more robust

20020108
 - (djm) Merge Cygwin copy_environment with do_pam_environment, removing
   fixed env var size limit in the process. Report from Corinna Vinschen
   <vinschen@redhat.com>
 - (stevesk) defines.h: use "/var/spool/sockets/X11/%u" for HP-UX.  does
   not depend on transition links.  from Lutz Jaenicke.

20020106
 - (stevesk) defines.h: determine _PATH_UNIX_X; currently "/tmp/.X11-unix/X%u"
   for all platforms except HP-UX, which is "/usr/spool/sockets/X11/%u".

20020103
 - (djm) Use bigcrypt() on systems with SCO_PROTECTED_PW. Patch from
   Roger Cornelius <rac@tenzing.org>
2002-03-08 05:54:04 +00:00
Patrick Li
ed1eab53fb Update to 0.6.5 2002-03-08 05:33:45 +00:00
Patrick Li
91f7e27546 Update to 0.4.4 and fix email address
PR:		35630
Submitted by:	maintainer
2002-03-08 01:12:30 +00:00
Brian Feldman
ec2eacea1a Update to 0.2. 2002-03-07 18:03:02 +00:00
Brian Feldman
848e771601 Shortened description.
Submitted by:	will
2002-03-07 14:52:21 +00:00
Brian Feldman
99d2f05131 Add pam_alreadyloggedin 0.1,
This PAM module provides authorization based on a user already being currently logged in already.
2002-03-07 02:21:42 +00:00
Dag-Erling Smørgrav
013dc72487 Upgrade to 0.13. This makes PORTVERSION go backwards, but since the
distfile for the previous version disappeared within hours of the port
being committed, I'll just pretend that the previous commit never
happened.
2002-03-06 22:38:04 +00:00
James E. Housley
5b57e5bc04 Update to 4189 2002-03-06 20:24:46 +00:00
Jacques Vidrine
1a07b54104 Fix off-by-one error.
Obtained from:	OpenBSD

Bump PORTREVISION.
2002-03-06 13:53:39 +00:00
Ying-Chieh Liao
f302ab328d upgrade to 0.9.2 2002-03-06 07:04:07 +00:00
Dag-Erling Smørgrav
0cb2528e88 Grab unmaintained port, and upgrade to OpenPAM-aware 0.13.pre2. 2002-03-05 12:54:37 +00:00
Cy Schubert
bf53ff4bec Use my FreeBSD.org email address for MAINTAINER. 2002-03-04 16:56:20 +00:00
Cy Schubert
23b0170470 Fixup the line containing $FreeBSD$. It was missing a comment character. 2002-03-04 16:55:21 +00:00
Cy Schubert
eb8835ad1d Update 1.1.12 --> 1.1.13
PR:		ports/35313
Submitted by:	MAINTAINER:  Udo Schweigert <udo.schweigert@siemens.com>
2002-03-03 20:24:09 +00:00
Patrick Li
b76ea8545b Update to 2.4.22
PR:		35499
Submitted by:	KATO Tsuguru <tkato@prontomail.com>
2002-03-03 06:51:45 +00:00
Cy Schubert
4aa8bcaf49 Update 1.2.3 --> 1.2.4 2002-03-01 13:23:47 +00:00
Cy Schubert
a6459ea267 Update from 1.2 (academic source release) to 2.3.1-2 (open source Linux
release).  In relation to Tripwire 1.x, 2.x is a complete rewrite.

PR:		ports/29137
Submitted by:	nectar (first review), cjc (second review)
2002-03-01 01:47:15 +00:00
Patrick Li
16a8a6bc78 Update to 0.60.0
PR:		35423
Submitted by:	maintainer
2002-02-28 21:51:03 +00:00
James E. Housley
79605a95ea Upgrade to 4188 2002-02-27 19:58:37 +00:00
Eivind Eklund
86661f5bb4 Update to version 1.3 - better docs, and cosmetic improvements 2002-02-27 14:34:51 +00:00
Michael Haro
143ba8d562 Update to 1.48 and add missing dependency
PR:		34978, 35122
Submitted by:	Seamus Venasse <svenasse@polaris.ca>, Jason Harris <jharris@widomaker.com>
2002-02-26 07:41:44 +00:00
Cy Schubert
4b2350e6a6 Maintainer-update: New MASTER_SITE for the port security/bugs.
PR:		ports/35275
Submitted by:	MAINTAINER:  Stephane Legrand <stephane.legrand@bigfoot.com>
2002-02-24 14:08:53 +00:00
Cy Schubert
faf3c013fa Update krb5-1.2.4-beta1 --> krb5-1.2.4-beta2 2002-02-24 13:56:37 +00:00
Dmitry Sivachenko
d407148f65 Respect CFLAGS. 2002-02-24 12:35:05 +00:00
Crist J. Clark
536f99d4bd Add some files installed by the port that were not included in the
pkg-plist.

Approved by:	obrien
2002-02-23 06:05:04 +00:00
Crist J. Clark
4f3bf60ae3 Do not try to install any parts of nmapfe from the nmap port. There is
a separate port for nmapfe. Even though the attempt in the nmap port
mostly fails since no nmapfe executable would have been built, files
not appearing in the pkg-plist were being added to the system.

PR:		ports/35207
Approved by:	obrien
2002-02-23 06:04:44 +00:00
Crist J. Clark
b142db9c37 Only the nmap port should try to strip nmap. The nmapfe port also
uses this make file. It should not try to strip the ${PREFIX}/bin/nmap
executable. The install of nmapfe would fail if nmap did not exist.

PR:		ports/35207
Approved by:	obrien
2002-02-23 06:03:24 +00:00
Cy Schubert
54afb8f2ea Add configuration options to Tripwire 1.3.1 install:
- Add the TWCONFIG variable to install a user defined tw.config instead
  of the one supplied with the port.
- Add the NO_DB_BUILD variable to skip the database build during install
  for users upgrading or reinstalling the port who wish to use an existing
  or previously installed Tripwire database.

PR:		ports/35127
Submitted by:	cjc
Approved by:	jgreco@ns.sol.net
2002-02-22 14:45:40 +00:00
Cy Schubert
b85b675900 Add configuration options to Tripwire 1.3.1 install:
- Add the TWCONFIG variable to install a user defined tw.config instead
  of the one supplied with the port.
- Add the NO_DB_BUILD variable to skip the database build during install
  for users upgrading or reinstalling the port who wish to use an existing
  or previously installed Tripwire database.

PR:		ports/35127
Submitted by:	cjc
Approved by:	jgreco@ns.sol.net
2002-02-22 14:20:19 +00:00
Akinori MUSHA
2658ba9c3c - Update to 3.1.0.
PR:		ports/34740
  Submitted by:	larse@ISI.EDU

- Add %%PORTDOCS%% to pkg-plist.

- Assign MAINTAINER to the submitter.

  Requested by:	issei (previous MAINTAINER)
2002-02-22 02:52:25 +00:00
Munechika SUMIKAWA
338b47199f fsh -- Fast remote command execution
The problem: logging in to a remote system with a cryptographic
solution such as lsh or ssh takes time, due to the computationally
expensive key exchanges that occur when the connection is
established. It is common to trigger a lot of remote logins while
using remote CVS, which makes it painfully slow compared to having the
repository locally.

The solution: reuse the secure tunnel once it has been
established. fsh is a drop-in rsh-compatible replacement for ssh that
automatically resuses ssh tunnels.

WWW: http://www.lysator.liu.se/fsh/
2002-02-21 17:40:58 +00:00
Nick Sayer
27fc2aa9ce Fix damaged patch. Oopsie. 2002-02-21 15:13:16 +00:00
James E. Housley
0f7a39cbc4 Update to 4187 2002-02-21 03:45:11 +00:00
Andrey A. Chernov
fbdd9e12b1 Tune for -current sendmail 8.12.2 2002-02-20 23:02:51 +00:00
Kevin Lo
27e87e07e1 Update to version 1.13
Approved by: MAINTAINER
2002-02-20 15:41:07 +00:00
Cy Schubert
12df4b76d3 Add configuration options to Tripwire 1.3.1 install:
- Add the TWCONFIG variable to install a user defined tw.config instead
  of the one supplied with the port.
- Add the NO_DB_BUILD variable to skip the database build during install
  for users upgrading or reinstalling the port who wish to use an existing
  or previously installed Tripwire database.

Change MAINTAINER from me (Cy.Schubert@uumail.gov.bc.ca) to
me (cy@FreeBSD.org).

PR:             ports/35127
Submitted by:   cjc
2002-02-20 14:47:04 +00:00
Peter Pentchev
ba5574060f Update to 0.9.13.
In the process, fix an autoconf-2.52 bug in using $target_alias
as a program prefix even if it is exactly the same as $host_alias.
Also, remove the installation of the library .la file.

Based on a patch by:	ijliao
2002-02-20 11:03:42 +00:00
Nick Sayer
987640f7cc Fix port being broken on -current
Submitted by:	tre@netlands.de
2002-02-20 06:56:19 +00:00
Akinori MUSHA
d6689b08c6 Add ruby-hmac, a Ruby library which implements the HMAC algorithm. 2002-02-20 06:24:20 +00:00
Patrick Li
9909a89b31 Update to 0.05
PR:		35123
Submitted by:	Jason Harris <jharris@widomaker.com>
2002-02-20 02:47:14 +00:00
Jun Kuriyama
0ef62b9ca7 Update to 2.01.
Change maintainer's addresss.

Submitted by:	Yen-Ming Lee <leeym@utopia.leeym.com>
PR:		ports/35086
2002-02-19 02:01:27 +00:00
Dirk Meyer
f90e5def7f Add option to support patches:
OpenSSH supports Kerberos v5 authentication, but this is not
        enabled in the portable version.  A patch is available to
        correct this deficiency for those wishing to use this port
        with Kerberos.  In addition, a patch is also available from
        Simon Wilkinson to implement the GSS-API key-exchange
        mechanism for SSHv2, which is currently being standardized.
        Use of this mechanism with Kerberos v5 obviates the need for
        manual management of host keys, a considerable improvement for
        large Kerberos sites.

PR:		34363
Submitted by:	wollman@hergotha.lcs.mit.edu
2002-02-17 15:00:25 +00:00
Mark Pulford
215ca0d946 Add mussh 0.4, a tool for easily running the same commands on multiple
hosts.

PR:		34217
Submitted by:	Yen-Ming Lee <leeym@leeym.com>
2002-02-17 09:21:47 +00:00
Patrick Li
34f14b210c Update to 0.6.0 2002-02-17 06:44:50 +00:00
Issei Suzuki
69d5c39546 Remove myself from MAINTAINER 2002-02-16 05:32:08 +00:00
Kris Kennaway
380ade2cae Update to snortsnarf 020126 2002-02-16 02:49:42 +00:00
Akinori MUSHA
a7972c2b87 Add a missing entry: "krb5-beta". 2002-02-14 15:05:23 +00:00