Displaying 20 results from an estimated 78 matches for "deraadt".
2000 Aug 23
14
Test snapshot
...em. Reports from Lutz Jaenicke
<Lutz.Jaenicke at aet.TU-Cottbus.DE> and Tamito KAJIYAMA
<kajiyama at grad.sccs.chukyo-u.ac.jp>
- (djm) Pick up LOGIN_PROGRAM from environment or PATH if not set by headers
- (djm) Add local version to version.h
- (djm) OpenBSD CVS updates:
- deraadt at cvs.openbsd.org 2000/08/18 20:07:23
[ssh.c]
accept remsh as a valid name as well; roman at buildpoint.com
- deraadt at cvs.openbsd.org 2000/08/18 20:17:13
[deattack.c crc32.c packet.c]
rename crc32() to ssh_crc32() to avoid zlib name clash. do not move to
libz crc32...
2000 Jul 12
0
Announce: portable OpenSSH 2.1.1p3
...dit their /etc/ssh_config or ~/.ssh/config files to achieve the
same behavior.
Again, thanks to those who reported bugs, tested the snapshot and sent
fixes.
Regards,
Damien Miller
------------------ Changelog
20000712
- (djm) Remove -lresolve for Reliant Unix
- (djm) OpenBSD CVS Updates:
- deraadt at cvs.openbsd.org 2000/07/11 02:11:34
[session.c sshd.c ]
make MaxStartups code still work with -d; djm
- deraadt at cvs.openbsd.org 2000/07/11 13:17:45
[readconf.c ssh_config]
disable FallBackToRsh by default
- (djm) Replace in_addr_t with u_int32_t in bsd-inet_aton.c. Rep...
2000 Jul 12
0
Announce: portable OpenSSH 2.1.1p3
...dit their /etc/ssh_config or ~/.ssh/config files to achieve the
same behavior.
Again, thanks to those who reported bugs, tested the snapshot and sent
fixes.
Regards,
Damien Miller
------------------ Changelog
20000712
- (djm) Remove -lresolve for Reliant Unix
- (djm) OpenBSD CVS Updates:
- deraadt at cvs.openbsd.org 2000/07/11 02:11:34
[session.c sshd.c ]
make MaxStartups code still work with -d; djm
- deraadt at cvs.openbsd.org 2000/07/11 13:17:45
[readconf.c ssh_config]
disable FallBackToRsh by default
- (djm) Replace in_addr_t with u_int32_t in bsd-inet_aton.c. Rep...
2000 May 09
1
2.9: remote port forwarding doesn't work
...xp $
$OpenBSD: auth-chall.c,v 1.7 2001/04/05 10:42:47 markus Exp $
$OpenBSD: auth2-chall.c,v 1.4 2001/03/28 22:43:31 markus Exp $
$OpenBSD: auth-krb4.c,v 1.23 2001/01/22 08:15:00 markus Exp $
$OpenBSD: mpaux.c,v 1.16 2001/02/08 19:30:52 itojun Exp $
$OpenBSD: radix.c,v 1.15 2001/01/16 23:58:09 deraadt Exp $
$OpenBSD: ttymodes.c,v 1.13 2001/04/15 01:35:22 stevesk Exp $
$OpenBSD: authfile.c,v 1.32 2001/04/18 23:44:51 markus Exp $
$OpenBSD: hostfile.c,v 1.26 2001/04/12 19:15:24 markus Exp $
$OpenBSD: tildexpand.c,v 1.11 2001/02/08 19:30:53 itojun Exp $
$OpenBSD: rsa.c,v 1.22 2001/03/26 23:23:2...
2005 Mar 04
4
Fwd: FreeBSD hiding security stuff
FYI
>To: misc@openbsd.org
>Subject: FreeBSD hiding security stuff
>Date: Fri, 04 Mar 2005 03:51:42 -0700
>From: Theo de Raadt <deraadt@cvs.openbsd.org>
>
>A few FreeBSD developers apparently have found some security issue
>of some sort affecting i386 operating systems in some cases.
>
>They have refused to give us real details.
>
>A promise is now being made.
>
>If a bug is found in OpenSSH, which we...
2000 Mar 25
1
ANNOUNCE: openssh-1.2.3
...ct RSAref
- OpenBSD CVS change
[sshd.c]
- disallow guessing of root password
- More configure fixes
- IPv6 workarounds from Hideaki YOSHIFUJI <yoshfuji at ecei.tohoku.ac.jp>
20000309
- OpenBSD CVS updates to v1.2.3
[ssh.h atomicio.c]
- int atomicio -> ssize_t (for alpha). ok deraadt@
[auth-rsa.c]
- delay MD5 computation until client sends response, free() early, cleanup.
[cipher.c]
- void* -> unsigned char*, ok niels@
[hostfile.c]
- remove unused variable 'len'. fix comments.
- remove unused variable
[log-client.c log-server.c]
- rename a cpp symbol, t...
2000 Mar 25
1
ANNOUNCE: openssh-1.2.3
...ct RSAref
- OpenBSD CVS change
[sshd.c]
- disallow guessing of root password
- More configure fixes
- IPv6 workarounds from Hideaki YOSHIFUJI <yoshfuji at ecei.tohoku.ac.jp>
20000309
- OpenBSD CVS updates to v1.2.3
[ssh.h atomicio.c]
- int atomicio -> ssize_t (for alpha). ok deraadt@
[auth-rsa.c]
- delay MD5 computation until client sends response, free() early, cleanup.
[cipher.c]
- void* -> unsigned char*, ok niels@
[hostfile.c]
- remove unused variable 'len'. fix comments.
- remove unused variable
[log-client.c log-server.c]
- rename a cpp symbol, t...
2003 Jun 03
0
[Bug 549] Login Delay / Remove unwanted reverse map check
...g]
[sshd_config.5]
deprecate VerifyReverseMapping since it's dangerous if combined
with IP based access control as noted by Mike Harding; replace with
a UseDNS option, UseDNS is on by default and includes the
VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
ok deraadt@, djm@
Switch UseDNS off if you don't want any DNS lookups.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2004 May 02
2
[Bug 859] getaddrinfo(host, "0", &hints, &res) may take extra cycles
http://bugzilla.mindrot.org/show_bug.cgi?id=859
Summary: getaddrinfo(host, "0", &hints, &res) may take extra
cycles
Product: Portable OpenSSH
Version: 3.8p1
Platform: All
OS/Version: other
Status: NEW
Severity: normal
Priority: P2
Component: Miscellaneous
2000 Aug 28
1
[OpenSSH] sample line about ForwardX11 in ssh_config file is not fit to default setting
...11-fwd for the client, too.
But ssh_config (src/usr.bin/ssh/ssh_config) was not changed and
currently ForwardX11 yes.
17 # ForwardX11 yes
~~~
I think that markus forgot to change ssh_config file.
----------
For example, ``FallBackToRsh'' was changed by deraadt at Jul 11
2000, he changed both readconf.c and ssh_config files.
readconf.c Rev.1.41
ssh_config Rev.1.5
Thank you.
---
MIHIRA, Sanpei Yoshiro
Yokohama, Japan.
2001 Feb 08
1
openbsd-compat/vis.c fails to build (patch)
...0010208 snap fails to build under OpenBSD 2.8. apply the following in the openssh root to fix:
--- openbsd-compat/vis.c.old Thu Feb 8 09:21:18 2001
+++ openbsd-compat/vis.c Thu Feb 8 09:21:26 2001
@@ -35,9 +35,9 @@
static char rcsid[] = "$OpenBSD: vis.c,v 1.5 2000/07/19 15:25:13 deraadt Exp $";
#endif /* LIBC_SCCS and not lint */
-#ifndef HAVE_VIS
-
#include "includes.h"
+
+#ifndef HAVE_VIS
#define isoctal(c)
2001 Mar 07
3
protocol 2 performance gain?
has anyone noticed a performance gain with protocol 2?
-David Higdon
2003 Apr 11
1
Patch for 'packet.c' in openssh-3.6.1p1
Hello,
I just managed to compile openssh-3.6.1p1 on Ultrix/MIPS. One of the fixes
needed for this is the following. It's because of:
--- According to the Changelog
- markus at cvs.openbsd.org 2002/12/10 19:26:50
[packet.c]
move tos handling to packet_set_tos; ok provos/henning/deraadt
---
This IP_TOS is now nicely stuffed in a function, but that function should
be #defined away for systems without IP_TOS or with a broken implementation.
Greetings, Bert
diff -c packet.c packet.c.orig
*** packet.c 2003-04-11 12:21:23.000000000 +0200
--- packet.c.orig 2003-04-11 13:31:5...
2005 Mar 17
1
no patch whats going on
...the freebsd-security mailing list.
>
>Kris
>
Hello,
Click on the "Discussion" and "Solution" links for the details.
Nothing has been said about this on the security@ list.
According to the site, this hole was disclosed 28.2.05. I wonder
if this is the issue that Theo deRaadt was complaining about....
Regards,
stheg
__________________________________
Do you Yahoo!?
Make Yahoo! your home page
http://www.yahoo.com/r/hs
2013 May 10
0
Candidate tarball for openssh-6.2p2
...ok markus@
- dtucker at cvs.openbsd.org 2013/02/19 02:12:47
[krl.c]
Remove bogus include. ok djm
- dtucker at cvs.openbsd.org 2013/02/22 04:45:09
[ssh.c readconf.c readconf.h]
Don't complain if IdentityFiles specified in system-wide configs are
missing. ok djm, deraadt.
- markus at cvs.openbsd.org 2013/02/22 19:13:56
[sshconnect.c]
support ProxyCommand=- (stdin/out already point to the proxy); ok djm@
- djm at cvs.openbsd.org 2013/02/22 22:09:01
[ssh.c]
Allow IdenityFile=none; ok markus deraadt (and dtucker for an earlier
version)...
2000 Jul 11
3
Test snapshot
...- markus at cvs.openbsd.org 2000/06/26 03:22:29
[authfd.c]
cleanup, less cut&paste
- markus at cvs.openbsd.org 2000/06/26 15:59:19
[servconf.c servconf.h session.c sshd.8 sshd.c]
MaxStartups: limit number of unauthenticated connections, work by
theo and me
- deraadt at cvs.openbsd.org 2000/07/05 14:18:07
[session.c]
use no_x11_forwarding_flag correctly; provos ok
- provos at cvs.openbsd.org 2000/07/05 15:35:57
[sshd.c]
typo
- aaron at cvs.openbsd.org 2000/07/05 22:06:58
[scp.1 ssh-agent.1 ssh-keygen.1 sshd.8]
Insert more...
2002 Sep 04
4
Determining Local IP Address within .profile
...many Interfaces where a remote client could connect and we like to know within .profile which interface the client has connected to.
I've looked at the sourcecode and maybe the following could do something I described :
session.c:871 RCSID("$OpenBSD: session.c,v 1.142 2002/06/26 13:49:26 deraadt Exp $");
do_setup_env
child_set_env(&env, &envsize, "SSH_LOCAL_IP", get_local_ipaddr(packet_get_connection_in());
what do you think of it ?
thanx, mario
2000 Sep 16
15
Snapshot
...hlogin)
- markus at cvs.openbsd.org 2000/09/05 13:18:48
[authfile.c ssh-add.c]
enable ssh-add -d for DSA keys
- markus at cvs.openbsd.org 2000/09/05 13:20:49
[sftp-server.c]
cleanup
- markus at cvs.openbsd.org 2000/09/06 03:46:41
[authfile.h]
prototype
- deraadt at cvs.openbsd.org 2000/09/07 14:27:56
[ALL]
cleanup copyright notices on all files. I have attempted to be
accurate with the details. everything is now under Tatu's licence
(which I copied from his readme), and/or the core-sdi bsd-ish thing
for deattack, or variou...
2005 Oct 11
5
scp bug: newly created dirs do not inherit sgid bit
Dear developers,
I discovered that directories created by scp when recursive
copying into a sgid directory do not inherit the sgid bit. I believe
this is a bug. A patch to fix this is attached.
Regards,
Petr Skovron
-------------- next part --------------
--- scp.c.orig 2005-10-11 16:50:17.000000000 +0200
+++ scp.c 2005-10-11 16:57:25.000000000 +0200
@@ -876,8 +876,12 @@
2006 Mar 23
1
Funding OpenSSH
..., you can help ensure that OpenSSH
continues to extend its functionality and proactively improve security.
If you are interested, please email myself, Markus Friedl and/or Theo de
Raadt:
- Damien Miller <djm at openbsd.org>
- Markus Friedl <markus at openbsd.org>
- Theo de Raadt <deraadt at openbsd.org>
If you work for a vendor who uses or has integrated OpenSSH, please
consider this request and forward it to anyone else in your organisation
who is able to assist.
Thanks,
Damien Miller