forked from Lainports/freebsd-ports
- now in protocol2:
Background ssh at logout when waiting for forwarded connection / X11 sessions
to terminate
disabled -DSKEY
from Changelog (not complete):
20011115
- (djm) Fix IPv4 default in ssh-keyscan. Spotted by Dan Astoorian
<djast@cs.toronto.edu> Fix from markus@
- (djm) Release 3.0.1p1
20011113
- (djm) Fix early (and double) free of remote user when using Kerberos.
Patch from Simon Wilkinson <simon@sxw.org.uk>
- (djm) AIX login{success,failed} changes. Move loginsuccess call to
do_authenticated. Call loginfailed for protocol 2 failures > MAX like
we do for protocol 1. Reports from Ralf Wenk <wera0003@fh-karlsruhe.de>,
K.Wolkersdorfer@fz-juelich.de and others
- (djm) OpenBSD CVS Sync
- dugsong@cvs.openbsd.org 2001/11/11 18:47:10
[auth-krb5.c]
fix krb5 authorization check. found by <jhawk@MIT.EDU>. from
art@, deraadt@ ok
- markus@cvs.openbsd.org 2001/11/12 11:17:07
[servconf.c]
enable authorized_keys2 again. tested by fries@
20011112
- OpenBSD CVS Sync
- markus@cvs.openbsd.org 2001/10/24 08:41:41
[sshd.c]
mention remote port in debug message
- markus@cvs.openbsd.org 2001/10/24 08:51:35
[clientloop.c ssh.c]
ignore SIGPIPE early, makes ssh work if agent dies, netbsd-pr via itojun@
- markus@cvs.openbsd.org 2001/10/24 19:57:40
[clientloop.c]
make ~& (backgrounding) work again for proto v1; add support ~& for v2, too
- markus@cvs.openbsd.org 2001/10/25 21:14:32
[ssh-keygen.1 ssh-keygen.c]
better docu for fingerprinting, ok deraadt@
- markus@cvs.openbsd.org 2001/10/29 19:27:15
[sshconnect2.c]
hostbased: check for client hostkey before building chost
- markus@cvs.openbsd.org 2001/11/07 16:03:17
[packet.c packet.h sshconnect2.c]
pad using the padding field from the ssh2 packet instead of sending
extra ignore messages. tested against several other ssh servers.
- markus@cvs.openbsd.org 2001/11/07 21:40:21
[ssh-rsa.c]
ssh_rsa_sign/verify: SSH_BUG_SIGBLOB not supported
- markus@cvs.openbsd.org 2001/11/07 22:10:28
[ssh-dss.c ssh-rsa.c]
missing free and sync dss/rsa code.
- markus@cvs.openbsd.org 2001/11/07 22:53:21
[channels.h]
crank c->path to 256 so they can hold a full hostname; dwd@bell-labs.com
- markus@cvs.openbsd.org 2001/11/08 10:51:08
[readpass.c]
don't strdup too much data; from gotoh@taiyo.co.jp; ok millert.
- markus@cvs.openbsd.org 2001/11/10 13:22:42
[ssh-rsa.c]
KNF (unexpand)
- markus@cvs.openbsd.org 2001/11/11 13:02:31
[servconf.c]
make AuthorizedKeysFile2 fallback to AuthorizedKeysFile if
AuthorizedKeysFile is specified.
20011109
- (stevesk) auth-pam.c: use do_pam_authenticate(PAM_DISALLOW_NULL_AUTHTOK)
if permit_empty_passwd == 0 so null password check cannot be bypassed.
jayaraj@amritapuri.com OpenBSD bug 2168
40 lines
910 B
Text
40 lines
910 B
Text
--- sshd/Makefile.orig Fri Nov 16 06:02:09 2001
|
|
+++ sshd/Makefile Fri Nov 16 06:03:51 2001
|
|
@@ -5,8 +5,8 @@
|
|
PROG= sshd
|
|
BINOWN= root
|
|
BINMODE=555
|
|
-BINDIR= /usr/sbin
|
|
-MAN= sshd.8
|
|
+BINDIR= /sbin
|
|
+MAN8= sshd.8
|
|
CFLAGS+=-DHAVE_LOGIN_CAP
|
|
#CFLAGS+=-DBSD_AUTH
|
|
|
|
@@ -17,6 +17,7 @@
|
|
auth-skey.c auth-bsdauth.c
|
|
|
|
.include <bsd.own.mk> # for KERBEROS and AFS
|
|
+.include "../Makefile.inc"
|
|
|
|
.if (${KERBEROS5:L} == "yes")
|
|
CFLAGS+=-DKRB5 -I${DESTDIR}/usr/include/kerberosV
|
|
@@ -31,15 +32,15 @@
|
|
LDADD+= -lkafs
|
|
DPADD+= ${LIBKRBAFS}
|
|
.endif # AFS
|
|
-CFLAGS+= -DKRB4 -I${DESTDIR}/usr/include/kerberosIV
|
|
+CFLAGS+= -DKRB4 -I/usr/include/kerberosIV
|
|
SRCS+= auth-krb4.c
|
|
-LDADD+= -lkrb
|
|
+LDADD+= -lkrb -lcom_err
|
|
DPADD+= ${LIBKRB}
|
|
.endif # KERBEROS
|
|
|
|
.include <bsd.prog.mk>
|
|
|
|
-LDADD+= -lcrypto -lutil -lz
|
|
+LDADD+= ${CRYPTOLIBS} -lcrypt -lutil -lz
|
|
DPADD+= ${LIBCRYPTO} ${LIBUTIL} ${LIBZ}
|
|
|
|
.if (${TCP_WRAPPERS:L} == "yes")
|