search for: deraadt

Displaying 20 results from an estimated 77 matches for "deraadt".

2000 Aug 23
14
Test snapshot
...em. Reports from Lutz Jaenicke <Lutz.Jaenicke at aet.TU-Cottbus.DE> and Tamito KAJIYAMA <kajiyama at grad.sccs.chukyo-u.ac.jp> - (djm) Pick up LOGIN_PROGRAM from environment or PATH if not set by headers - (djm) Add local version to version.h - (djm) OpenBSD CVS updates: - deraadt at cvs.openbsd.org 2000/08/18 20:07:23 [ssh.c] accept remsh as a valid name as well; roman at buildpoint.com - deraadt at cvs.openbsd.org 2000/08/18 20:17:13 [deattack.c crc32.c packet.c] rename crc32() to ssh_crc32() to avoid zlib name clash. do not move to libz crc32...
2000 Jul 12
0
Announce: portable OpenSSH 2.1.1p3
...dit their /etc/ssh_config or ~/.ssh/config files to achieve the same behavior. Again, thanks to those who reported bugs, tested the snapshot and sent fixes. Regards, Damien Miller ------------------ Changelog 20000712 - (djm) Remove -lresolve for Reliant Unix - (djm) OpenBSD CVS Updates: - deraadt at cvs.openbsd.org 2000/07/11 02:11:34 [session.c sshd.c ] make MaxStartups code still work with -d; djm - deraadt at cvs.openbsd.org 2000/07/11 13:17:45 [readconf.c ssh_config] disable FallBackToRsh by default - (djm) Replace in_addr_t with u_int32_t in bsd-inet_aton.c. Rep...
2000 Jul 12
0
Announce: portable OpenSSH 2.1.1p3
...dit their /etc/ssh_config or ~/.ssh/config files to achieve the same behavior. Again, thanks to those who reported bugs, tested the snapshot and sent fixes. Regards, Damien Miller ------------------ Changelog 20000712 - (djm) Remove -lresolve for Reliant Unix - (djm) OpenBSD CVS Updates: - deraadt at cvs.openbsd.org 2000/07/11 02:11:34 [session.c sshd.c ] make MaxStartups code still work with -d; djm - deraadt at cvs.openbsd.org 2000/07/11 13:17:45 [readconf.c ssh_config] disable FallBackToRsh by default - (djm) Replace in_addr_t with u_int32_t in bsd-inet_aton.c. Rep...
2000 May 09
1
2.9: remote port forwarding doesn't work
...xp $ $OpenBSD: auth-chall.c,v 1.7 2001/04/05 10:42:47 markus Exp $ $OpenBSD: auth2-chall.c,v 1.4 2001/03/28 22:43:31 markus Exp $ $OpenBSD: auth-krb4.c,v 1.23 2001/01/22 08:15:00 markus Exp $ $OpenBSD: mpaux.c,v 1.16 2001/02/08 19:30:52 itojun Exp $ $OpenBSD: radix.c,v 1.15 2001/01/16 23:58:09 deraadt Exp $ $OpenBSD: ttymodes.c,v 1.13 2001/04/15 01:35:22 stevesk Exp $ $OpenBSD: authfile.c,v 1.32 2001/04/18 23:44:51 markus Exp $ $OpenBSD: hostfile.c,v 1.26 2001/04/12 19:15:24 markus Exp $ $OpenBSD: tildexpand.c,v 1.11 2001/02/08 19:30:53 itojun Exp $ $OpenBSD: rsa.c,v 1.22 2001/03/26 23:23:2...
2005 Mar 04
4
Fwd: FreeBSD hiding security stuff
FYI >To: misc@openbsd.org >Subject: FreeBSD hiding security stuff >Date: Fri, 04 Mar 2005 03:51:42 -0700 >From: Theo de Raadt <deraadt@cvs.openbsd.org> > >A few FreeBSD developers apparently have found some security issue >of some sort affecting i386 operating systems in some cases. > >They have refused to give us real details. > >A promise is now being made. > >If a bug is found in OpenSSH, which we...
2000 Mar 25
1
ANNOUNCE: openssh-1.2.3
...ct RSAref - OpenBSD CVS change [sshd.c] - disallow guessing of root password - More configure fixes - IPv6 workarounds from Hideaki YOSHIFUJI <yoshfuji at ecei.tohoku.ac.jp> 20000309 - OpenBSD CVS updates to v1.2.3 [ssh.h atomicio.c] - int atomicio -> ssize_t (for alpha). ok deraadt@ [auth-rsa.c] - delay MD5 computation until client sends response, free() early, cleanup. [cipher.c] - void* -> unsigned char*, ok niels@ [hostfile.c] - remove unused variable 'len'. fix comments. - remove unused variable [log-client.c log-server.c] - rename a cpp symbol, t...
2000 Mar 25
1
ANNOUNCE: openssh-1.2.3
...ct RSAref - OpenBSD CVS change [sshd.c] - disallow guessing of root password - More configure fixes - IPv6 workarounds from Hideaki YOSHIFUJI <yoshfuji at ecei.tohoku.ac.jp> 20000309 - OpenBSD CVS updates to v1.2.3 [ssh.h atomicio.c] - int atomicio -> ssize_t (for alpha). ok deraadt@ [auth-rsa.c] - delay MD5 computation until client sends response, free() early, cleanup. [cipher.c] - void* -> unsigned char*, ok niels@ [hostfile.c] - remove unused variable 'len'. fix comments. - remove unused variable [log-client.c log-server.c] - rename a cpp symbol, t...
2003 Jun 03
0
[Bug 549] Login Delay / Remove unwanted reverse map check
...g] [sshd_config.5] deprecate VerifyReverseMapping since it's dangerous if combined with IP based access control as noted by Mike Harding; replace with a UseDNS option, UseDNS is on by default and includes the VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@ ok deraadt@, djm@ Switch UseDNS off if you don't want any DNS lookups. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2004 May 02
2
[Bug 859] getaddrinfo(host, "0", &hints, &res) may take extra cycles
http://bugzilla.mindrot.org/show_bug.cgi?id=859 Summary: getaddrinfo(host, "0", &hints, &res) may take extra cycles Product: Portable OpenSSH Version: 3.8p1 Platform: All OS/Version: other Status: NEW Severity: normal Priority: P2 Component: Miscellaneous
2000 Aug 28
1
[OpenSSH] sample line about ForwardX11 in ssh_config file is not fit to default setting
...11-fwd for the client, too. But ssh_config (src/usr.bin/ssh/ssh_config) was not changed and currently ForwardX11 yes. 17 # ForwardX11 yes ~~~ I think that markus forgot to change ssh_config file. ---------- For example, ``FallBackToRsh'' was changed by deraadt at Jul 11 2000, he changed both readconf.c and ssh_config files. readconf.c Rev.1.41 ssh_config Rev.1.5 Thank you. --- MIHIRA, Sanpei Yoshiro Yokohama, Japan.
2001 Feb 08
1
openbsd-compat/vis.c fails to build (patch)
...0010208 snap fails to build under OpenBSD 2.8. apply the following in the openssh root to fix: --- openbsd-compat/vis.c.old Thu Feb 8 09:21:18 2001 +++ openbsd-compat/vis.c Thu Feb 8 09:21:26 2001 @@ -35,9 +35,9 @@ static char rcsid[] = "$OpenBSD: vis.c,v 1.5 2000/07/19 15:25:13 deraadt Exp $"; #endif /* LIBC_SCCS and not lint */ -#ifndef HAVE_VIS - #include "includes.h" + +#ifndef HAVE_VIS #define isoctal(c)
2001 Mar 07
3
protocol 2 performance gain?
has anyone noticed a performance gain with protocol 2? -David Higdon
2003 Apr 11
1
Patch for 'packet.c' in openssh-3.6.1p1
Hello, I just managed to compile openssh-3.6.1p1 on Ultrix/MIPS. One of the fixes needed for this is the following. It's because of: --- According to the Changelog - markus at cvs.openbsd.org 2002/12/10 19:26:50 [packet.c] move tos handling to packet_set_tos; ok provos/henning/deraadt --- This IP_TOS is now nicely stuffed in a function, but that function should be #defined away for systems without IP_TOS or with a broken implementation. Greetings, Bert diff -c packet.c packet.c.orig *** packet.c 2003-04-11 12:21:23.000000000 +0200 --- packet.c.orig 2003-04-11 13:31:5...
2005 Mar 17
1
no patch whats going on
...the freebsd-security mailing list. > >Kris > Hello, Click on the "Discussion" and "Solution" links for the details. Nothing has been said about this on the security@ list. According to the site, this hole was disclosed 28.2.05. I wonder if this is the issue that Theo deRaadt was complaining about.... Regards, stheg __________________________________ Do you Yahoo!? Make Yahoo! your home page http://www.yahoo.com/r/hs
2013 May 10
0
Candidate tarball for openssh-6.2p2
...ok markus@ - dtucker at cvs.openbsd.org 2013/02/19 02:12:47 [krl.c] Remove bogus include. ok djm - dtucker at cvs.openbsd.org 2013/02/22 04:45:09 [ssh.c readconf.c readconf.h] Don't complain if IdentityFiles specified in system-wide configs are missing. ok djm, deraadt. - markus at cvs.openbsd.org 2013/02/22 19:13:56 [sshconnect.c] support ProxyCommand=- (stdin/out already point to the proxy); ok djm@ - djm at cvs.openbsd.org 2013/02/22 22:09:01 [ssh.c] Allow IdenityFile=none; ok markus deraadt (and dtucker for an earlier version)...
2000 Jul 11
3
Test snapshot
...- markus at cvs.openbsd.org 2000/06/26 03:22:29 [authfd.c] cleanup, less cut&paste - markus at cvs.openbsd.org 2000/06/26 15:59:19 [servconf.c servconf.h session.c sshd.8 sshd.c] MaxStartups: limit number of unauthenticated connections, work by theo and me - deraadt at cvs.openbsd.org 2000/07/05 14:18:07 [session.c] use no_x11_forwarding_flag correctly; provos ok - provos at cvs.openbsd.org 2000/07/05 15:35:57 [sshd.c] typo - aaron at cvs.openbsd.org 2000/07/05 22:06:58 [scp.1 ssh-agent.1 ssh-keygen.1 sshd.8] Insert more...
2002 Sep 04
4
Determining Local IP Address within .profile
...many Interfaces where a remote client could connect and we like to know within .profile which interface the client has connected to. I've looked at the sourcecode and maybe the following could do something I described : session.c:871 RCSID("$OpenBSD: session.c,v 1.142 2002/06/26 13:49:26 deraadt Exp $"); do_setup_env child_set_env(&env, &envsize, "SSH_LOCAL_IP", get_local_ipaddr(packet_get_connection_in()); what do you think of it ? thanx, mario
2000 Sep 16
15
Snapshot
...hlogin) - markus at cvs.openbsd.org 2000/09/05 13:18:48 [authfile.c ssh-add.c] enable ssh-add -d for DSA keys - markus at cvs.openbsd.org 2000/09/05 13:20:49 [sftp-server.c] cleanup - markus at cvs.openbsd.org 2000/09/06 03:46:41 [authfile.h] prototype - deraadt at cvs.openbsd.org 2000/09/07 14:27:56 [ALL] cleanup copyright notices on all files. I have attempted to be accurate with the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or variou...
2005 Oct 11
5
scp bug: newly created dirs do not inherit sgid bit
Dear developers, I discovered that directories created by scp when recursive copying into a sgid directory do not inherit the sgid bit. I believe this is a bug. A patch to fix this is attached. Regards, Petr Skovron -------------- next part -------------- --- scp.c.orig 2005-10-11 16:50:17.000000000 +0200 +++ scp.c 2005-10-11 16:57:25.000000000 +0200 @@ -876,8 +876,12 @@
2006 Mar 23
1
Funding OpenSSH
..., you can help ensure that OpenSSH continues to extend its functionality and proactively improve security. If you are interested, please email myself, Markus Friedl and/or Theo de Raadt: - Damien Miller <djm at openbsd.org> - Markus Friedl <markus at openbsd.org> - Theo de Raadt <deraadt at openbsd.org> If you work for a vendor who uses or has integrated OpenSSH, please consider this request and forward it to anyone else in your organisation who is able to assist. Thanks, Damien Miller