head	1.99;
access;
symbols
	RELEASE_6_1_0:1.98
	RELEASE_5_5_0:1.98
	RELEASE_6_0_0:1.97
	RELEASE_5_4_0:1.96
	RELEASE_4_11_0:1.95
	old_RELEASE_5_3_0:1.92
	old_RELEASE_4_10_0:1.89
	old_RELEASE_5_2_1:1.85
	old_RELEASE_5_2_0:1.85
	old_RELEASE_4_9_0:1.76
	old_RELEASE_5_1_0:1.70
	old_RELEASE_4_8_0:1.61
	old_RELEASE_5_0_0:1.59
	old_RELEASE_4_7_0:1.56
	old_RELEASE_4_6_2:1.33
	old_RELEASE_4_6_1:1.33
	old_RELEASE_4_6_0:1.33
	old_RELEASE_5_0_DP1:1.29
	old_RELEASE_4_5_0:1.18
	old_RELEASE_4_4_0:1.7;
locks; strict;
comment	@# @;


1.99
date	2006.03.15.06.30.35;	author brooks;	state dead;
branches;
next	1.98;

1.98
date	2006.01.14.09.16.14;	author kris;	state Exp;
branches;
next	1.97;

1.97
date	2005.07.11.23.53.08;	author brooks;	state Exp;
branches;
next	1.96;

1.96
date	2005.01.17.19.12.43;	author brooks;	state Exp;
branches;
next	1.95;

1.95
date	2004.11.17.22.36.17;	author brooks;	state Exp;
branches;
next	1.94;

1.94
date	2004.10.14.05.26.27;	author dinoex;	state Exp;
branches;
next	1.93;

1.93
date	2004.10.12.04.43.52;	author dinoex;	state Exp;
branches;
next	1.92;

1.92
date	2004.08.18.11.35.53;	author dinoex;	state Exp;
branches;
next	1.91;

1.91
date	2004.04.29.03.48.57;	author dinoex;	state Exp;
branches;
next	1.90;

1.90
date	2004.04.29.03.04.27;	author dinoex;	state Exp;
branches;
next	1.89;

1.89
date	2004.04.03.05.18.28;	author dinoex;	state Exp;
branches;
next	1.88;

1.88
date	2004.03.26.19.56.41;	author dinoex;	state Exp;
branches;
next	1.87;

1.87
date	2004.02.26.05.47.06;	author dinoex;	state Exp;
branches;
next	1.86;

1.86
date	2004.02.25.12.32.57;	author dinoex;	state Exp;
branches;
next	1.85;

1.85
date	2003.10.18.10.45.34;	author dinoex;	state Exp;
branches;
next	1.84;

1.84
date	2003.10.13.14.16.40;	author dinoex;	state Exp;
branches;
next	1.83;

1.83
date	2003.10.13.04.05.54;	author dinoex;	state Exp;
branches;
next	1.82;

1.82
date	2003.10.12.11.53.30;	author dinoex;	state Exp;
branches;
next	1.81;

1.81
date	2003.10.10.03.52.03;	author dinoex;	state Exp;
branches;
next	1.80;

1.80
date	2003.09.28.18.41.51;	author dinoex;	state Exp;
branches;
next	1.79;

1.79
date	2003.09.26.18.13.52;	author dinoex;	state Exp;
branches;
next	1.78;

1.78
date	2003.09.26.02.42.39;	author dinoex;	state Exp;
branches;
next	1.77;

1.77
date	2003.09.25.17.08.02;	author dinoex;	state Exp;
branches;
next	1.76;

1.76
date	2003.09.23.19.16.49;	author dinoex;	state Exp;
branches;
next	1.75;

1.75
date	2003.09.17.16.07.48;	author nectar;	state Exp;
branches;
next	1.74;

1.74
date	2003.09.17.12.03.11;	author dinoex;	state Exp;
branches;
next	1.73;

1.73
date	2003.09.16.12.43.10;	author nectar;	state Exp;
branches;
next	1.72;

1.72
date	2003.08.30.08.02.38;	author dinoex;	state Exp;
branches;
next	1.71;

1.71
date	2003.08.28.15.38.18;	author dinoex;	state Exp;
branches;
next	1.70;

1.70
date	2003.05.07.20.04.49;	author dinoex;	state Exp;
branches;
next	1.69;

1.69
date	2003.04.30.05.44.38;	author dinoex;	state Exp;
branches;
next	1.68;

1.68
date	2003.04.15.18.50.02;	author dinoex;	state Exp;
branches;
next	1.67;

1.67
date	2003.04.13.11.47.23;	author dinoex;	state Exp;
branches;
next	1.66;

1.66
date	2003.04.03.19.35.36;	author dinoex;	state Exp;
branches;
next	1.65;

1.65
date	2003.04.02.04.26.55;	author dinoex;	state Exp;
branches;
next	1.64;

1.64
date	2003.04.01.04.10.29;	author dinoex;	state Exp;
branches;
next	1.63;

1.63
date	2003.04.01.03.02.56;	author dinoex;	state Exp;
branches;
next	1.62;

1.62
date	2003.03.23.04.48.27;	author dinoex;	state Exp;
branches;
next	1.61;

1.61
date	2003.02.20.18.26.41;	author dinoex;	state Exp;
branches;
next	1.60;

1.60
date	2003.01.02.04.21.59;	author dinoex;	state Exp;
branches;
next	1.59;

1.59
date	2002.11.21.22.00.45;	author dinoex;	state Exp;
branches;
next	1.58;

1.58
date	2002.10.20.16.02.10;	author dinoex;	state Exp;
branches;
next	1.57;

1.57
date	2002.10.17.04.40.18;	author dinoex;	state Exp;
branches;
next	1.56;

1.56
date	2002.08.06.19.31.24;	author dinoex;	state Exp;
branches;
next	1.55;

1.55
date	2002.07.27.06.20.28;	author dinoex;	state Exp;
branches;
next	1.54;

1.54
date	2002.07.24.20.47.21;	author dinoex;	state Exp;
branches;
next	1.53;

1.53
date	2002.07.22.05.28.52;	author dinoex;	state Exp;
branches;
next	1.52;

1.52
date	2002.07.15.20.08.01;	author dinoex;	state Exp;
branches;
next	1.51;

1.51
date	2002.07.07.18.55.26;	author dinoex;	state Exp;
branches;
next	1.50;

1.50
date	2002.07.04.18.29.18;	author dinoex;	state Exp;
branches;
next	1.49;

1.49
date	2002.06.30.19.31.10;	author dinoex;	state Exp;
branches;
next	1.48;

1.48
date	2002.06.28.06.18.24;	author dinoex;	state Exp;
branches;
next	1.47;

1.47
date	2002.06.28.05.28.07;	author dinoex;	state Exp;
branches;
next	1.46;

1.46
date	2002.06.26.17.32.02;	author dinoex;	state Exp;
branches;
next	1.45;

1.45
date	2002.06.26.15.21.27;	author dinoex;	state Exp;
branches;
next	1.44;

1.44
date	2002.06.26.12.22.24;	author dinoex;	state Exp;
branches;
next	1.43;

1.43
date	2002.06.26.07.06.14;	author dinoex;	state Exp;
branches;
next	1.42;

1.42
date	2002.06.26.04.05.57;	author dinoex;	state Exp;
branches;
next	1.41;

1.41
date	2002.06.25.04.59.10;	author dinoex;	state Exp;
branches;
next	1.40;

1.40
date	2002.06.24.23.04.37;	author dinoex;	state Exp;
branches;
next	1.39;

1.39
date	2002.06.22.16.24.04;	author dinoex;	state Exp;
branches;
next	1.38;

1.38
date	2002.06.16.15.03.10;	author dinoex;	state Exp;
branches;
next	1.37;

1.37
date	2002.06.08.05.22.20;	author dinoex;	state Exp;
branches;
next	1.36;

1.36
date	2002.06.04.06.54.36;	author dinoex;	state Exp;
branches;
next	1.35;

1.35
date	2002.05.31.20.51.48;	author dinoex;	state Exp;
branches;
next	1.34;

1.34
date	2002.05.31.07.28.46;	author dinoex;	state Exp;
branches;
next	1.33;

1.33
date	2002.05.09.10.28.18;	author dinoex;	state Exp;
branches;
next	1.32;

1.32
date	2002.05.07.09.18.40;	author sobomax;	state Exp;
branches;
next	1.31;

1.31
date	2002.05.04.04.38.11;	author dinoex;	state Exp;
branches;
next	1.30;

1.30
date	2002.05.03.03.02.30;	author dinoex;	state Exp;
branches;
next	1.29;

1.29
date	2002.03.25.05.39.16;	author dinoex;	state Exp;
branches;
next	1.28;

1.28
date	2002.03.23.04.08.33;	author dinoex;	state Exp;
branches;
next	1.27;

1.27
date	2002.03.17.20.24.24;	author dinoex;	state Exp;
branches;
next	1.26;

1.26
date	2002.03.15.19.39.21;	author dinoex;	state Exp;
branches;
next	1.25;

1.25
date	2002.03.09.12.51.44;	author dinoex;	state Exp;
branches;
next	1.24;

1.24
date	2002.03.08.17.45.47;	author wollman;	state Exp;
branches;
next	1.23;

1.23
date	2002.03.08.17.44.30;	author wollman;	state Exp;
branches;
next	1.22;

1.22
date	2002.03.08.05.54.04;	author dinoex;	state Exp;
branches;
next	1.21;

1.21
date	2002.03.06.13.53.38;	author nectar;	state Exp;
branches;
next	1.20;

1.20
date	2002.02.17.15.00.25;	author dinoex;	state Exp;
branches;
next	1.19;

1.19
date	2002.01.28.07.23.21;	author dinoex;	state Exp;
branches;
next	1.18;

1.18
date	2002.01.05.11.37.49;	author dinoex;	state Exp;
branches;
next	1.17;

1.17
date	2002.01.04.17.18.35;	author dinoex;	state Exp;
branches;
next	1.16;

1.16
date	2002.01.02.21.09.52;	author dinoex;	state Exp;
branches;
next	1.15;

1.15
date	2002.01.02.19.45.38;	author dinoex;	state Exp;
branches;
next	1.14;

1.14
date	2001.12.02.06.52.42;	author dinoex;	state Exp;
branches;
next	1.13;

1.13
date	2001.12.01.20.25.47;	author dinoex;	state Exp;
branches;
next	1.12;

1.12
date	2001.11.19.22.29.20;	author dwcjr;	state Exp;
branches;
next	1.11;

1.11
date	2001.11.18.08.43.00;	author dinoex;	state Exp;
branches;
next	1.10;

1.10
date	2001.11.07.13.47.51;	author dinoex;	state Exp;
branches;
next	1.9;

1.9
date	2001.10.24.07.16.46;	author dinoex;	state Exp;
branches;
next	1.8;

1.8
date	2001.10.03.15.19.23;	author dinoex;	state Exp;
branches;
next	1.7;

1.7
date	2001.08.19.17.22.37;	author dinoex;	state Exp;
branches;
next	1.6;

1.6
date	2001.08.19.15.46.02;	author dinoex;	state Exp;
branches;
next	1.5;

1.5
date	2001.08.01.10.56.24;	author dinoex;	state Exp;
branches;
next	1.4;

1.4
date	2001.06.10.20.08.31;	author dwcjr;	state Exp;
branches;
next	1.3;

1.3
date	2001.06.09.08.22.15;	author dinoex;	state Exp;
branches;
next	1.2;

1.2
date	2001.06.08.19.17.55;	author dwcjr;	state Exp;
branches;
next	1.1;

1.1
date	2001.06.01.14.49.32;	author dinoex;	state Exp;
branches;
next	;


desc
@@


1.99
log
@Remove the hpn-ssh port.  The functionality is now an option when
building the openssh-portable port.
@
text
@# New ports collection makefile for: openssh
# Date created:  18 Mar 1999
# Whom:   dwcjr@@inethouston.net
#
# $FreeBSD: ports/security/hpn-ssh/Makefile,v 1.98 2006/01/14 09:16:14 kris Exp $
#

PORTNAME=	hpn-ssh
PORTVERSION=	3.9.0.1.${HPNVERSION}
PORTEPOCH=	1
CATEGORIES=	security ipv6
MASTER_SITES=	ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/%SUBDIR%/ \
		ftp://carroll.cac.psu.edu/pub/OpenBSD/OpenSSH/portable/%SUBDIR%/
PKGNAMESUFFIX?=	${GSSAPI_SUFFIX}${BASE_SUFFIX}
DISTNAME=	openssh-${OPENSSHVERSION}

PATCHFILES+=	openssh-${OPENSSHVERSION}-hpn${HPNVERSION}.diff
.if defined(WITH_NONE_CIPHER)
PATCHFILES+=	openssh-${OPENSSHVERSION}-hpn${HPNVERSION}-none.diff
.endif
PATCH_SITES=	http://www.psc.edu/networking/projects/hpn-ssh/
PATCH_DIST_STRIP=-p1

MAINTAINER=	brooks@@FreeBSD.org
COMMENT=	High Performance Enabled SSH/SCP

BROKEN=		Checksum mismatch

HPNVERSION=	11
OPENSSHVERSION=	3.9p1
WRKSRC=		${WRKDIR}/openssh-${OPENSSHVERSION}

MAN1=	sftp.1 ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 scp.1 ssh.1
MLINKS=	ssh.1 slogin.1
MAN5=	ssh_config.5 sshd_config.5
MAN8=	sftp-server.8 sshd.8 ssh-keysign.8

CONFLICTS?=	openssh-3.* ssh-1.* ssh2-3.*
USE_OPENSSL=	yes
CRYPTOLIBS=	-L${OPENSSLLIB} -lcrypto
GNU_CONFIGURE=	yes
USE_REINPLACE=	yes
USE_PERL5_BUILD=	yes
CONFIGURE_ARGS+=	--prefix=${PREFIX} --with-md5-passwords
PRECIOUS=	ssh_config sshd_config \
		ssh_host_key ssh_host_key.pub \
		ssh_host_rsa_key ssh_host_rsa_key.pub \
		ssh_host_dsa_key ssh_host_dsa_key.pub
ETCOLD=		${PREFIX}/etc

.if exists(/usr/include/security/pam_modules.h)
CONFIGURE_ARGS+=	--with-pam
.endif

.if exists(/usr/include/tcpd.h)
CONFIGURE_ARGS+=	--with-tcp-wrappers
.endif

.if !defined(ENABLE_SUID_SSH)
CONFIGURE_ARGS+=	--disable-suid-ssh
.endif

CONFLICTS+=	openssh-*

.if defined(KRB5_HOME) && exists(${KRB5_HOME}) || defined(WITH_GSSAPI)
GSSAPI_SUFFIX=	-gssapi
CONFIGURE_ARGS+=	--with-kerberos5=${KRB5_HOME}
.else
.if !defined(WITHOUT_KERBEROS) && exists(/usr/include/krb5.h)
CONFIGURE_ARGS+=	--with-kerberos5
EXTRA_PATCHES+=		${FILESDIR}/gss-serv.c.patch
.endif
.endif

.if defined(BATCH)
EXTRA_PATCHES+=		${FILESDIR}/batch.patch
.endif

.if defined(WITH_OPENSSH_CHROOT)
CFLAGS+=		-DCHROOT
.endif

.if defined(OPENSSH_OVERWRITE_BASE)
WITH_OPENSSL_BASE=	yes
BASE_SUFFIX=	-overwrite-base
PREFIX=		/usr
MANPREFIX=	${PREFIX}/share
CONFIGURE_ARGS+=	--mandir=${MANPREFIX}/man --localstatedir=/var
EMPTYDIR=	/var/empty
ETCSSH=		/etc/ssh
PLIST_SUB+=	NOTBASE="@@comment "
PLIST_SUB+=	BASE=""
PKGMESSAGE=	pkg-message.empty
.else
.if exists(/var/empty)
EMPTYDIR=	/var/empty
.else
EMPTYDIR=	${PREFIX}/empty
.endif
ETCSSH=		${PREFIX}/etc/ssh
PLIST_SUB+=	NOTBASE=""
PLIST_SUB+=	BASE="@@comment "
.endif
PLIST_SUB+=	EMPTYDIR=${EMPTYDIR}
CONFIGURE_ARGS+=	--sysconfdir=${ETCSSH}
CONFIGURE_ARGS+=	--with-privsep-path=${EMPTYDIR}

post-patch:
	@@${REINPLACE_CMD} -e 's|-ldes|-lcrypto|g' ${WRKSRC}/configure

post-configure:
	${SED} -e 's:__PREFIX__:${PREFIX}:g' \
		${FILESDIR}/sshd.sh > ${WRKSRC}/sshd.sh

pre-install:
.if defined(OPENSSH_OVERWRITE_BASE)
	-${MKDIR} ${EMPTYDIR}
.else
	-${MKDIR} ${PREFIX}/empty
.endif
	if ! pw groupshow sshd; then pw groupadd sshd -g 22; fi
	if ! pw usershow sshd; then pw useradd sshd -g sshd -u 22 \
		-h - -d ${EMPTYDIR} -s /nonexistent -c "sshd privilege separation"; fi
	-@@[ ! -d ${ETCSSH} ] && ${MKDIR} ${ETCSSH}
.for i in ${PRECIOUS}
	-@@[ -f ${ETCOLD}/${i} ] && [ ! -f ${ETCSSH}/${i} ] && \
		${ECHO_MSG} ">> Linking ${ETCSSH}/${i} from old layout." && \
		${LN} ${ETCOLD}/${i} ${ETCSSH}/${i}
.endfor

post-install:
.if !defined(OPENSSH_OVERWRITE_BASE)
	${INSTALL_SCRIPT} ${WRKSRC}/sshd.sh ${PREFIX}/etc/rc.d/sshd.sh.sample
.endif
	${INSTALL_DATA} -c ${WRKSRC}/ssh_config.out ${ETCSSH}/ssh_config-dist
	${INSTALL_DATA} -c ${WRKSRC}/sshd_config.out ${ETCSSH}/sshd_config-dist
.if !defined(OPENSSH_OVERWRITE_BASE)
	@@${CAT} ${PKGMESSAGE}
.endif

test:
	(cd ${WRKSRC}/regress && ${SETENV} ${MAKE_ENV} \
	TEST_SHELL=/bin/sh \
	PATH=${WRKSRC}:${PREFIX}/bin:${PREFIX}/sbin:${PATH} \
	${MAKE} ${MAKE_FLAGS} ${MAKEFILE} ${MAKE_ARGS} )

.include <bsd.port.pre.mk>

SUDO?=
MAKE_ENV+=	SUDO="${SUDO}"

.if defined(KRB5_HOME) && exists(${KRB5_HOME}) || defined(WITH_GSSAPI)
.if ${OPENSSLBASE} == "/usr"
CONFIGURE_ARGS+=	--without-rpath
LDFLAGS=
.endif
.else
CONFIGURE_ARGS+=	--with-rpath=${OPENSSLRPATH}
.endif
CONFIGURE_ARGS+=	--with-ssl-dir=${OPENSSLBASE}

.include <bsd.port.post.mk>
@


1.98
log
@BROKEN: Checksum mismatch
@
text
@d5 1
a5 1
# $FreeBSD$
@


1.97
log
@Update to the latest hpn-ssh patches for 3.9p1.  The previous patches
were unfetchable.  An upgrade to 4.1p1 will follow soon.

Reported by:	pointyhat (via kris)
@
text
@d27 2
@


1.96
log
@Update to a new version of the none ciper patch.  The previous version
mistakenly allowed ssh to switch to the none ciper for interactive
sessions which could pose a security risk.  The new version corrects
this.  This code was only enabled when WANT_NONE_CIPHER was set in the
make environment.  Bump portrevision in this case.
@
text
@d9 1
a9 1
PORTVERSION=	3.9.0.1
a10 3
.if defined(WITH_NONE_CIPHER)
PORTREVISON=	1
.endif
d17 1
d19 1
a19 3
PATCHFILES=	openssh-${OPENSSHVERSION}-hpn-none-p2.diff
.else
PATCHFILES=	openssh-${OPENSSHVERSION}-hpn.diff
d27 1
@


1.95
log
@Add security/hpn-ssh, a high performance SSH based on OpenSSH, after a
repo-copy from security/openssh-portable.

HPN-SSH is a set of patches to improve the perfomance of bulk transfers
such as scp over long-fat pipes.

Repocopy by:	marcus
@
text
@d11 3
d19 1
d21 1
a21 1
PATCHFILES=	openssh-${OPENSSHVERSION}-hpn-none.diff
@


1.94
log
@- drop maintainership
@
text
@d8 1
a8 1
PORTNAME=	openssh
a9 3
.if defined(OPENSSH_SNAPSHOT)
PORTREVISION!=	date -v-1d +%Y%m%d
.endif
d14 9
a22 3
PKGNAMESUFFIX?=	${PORTABLE_SUFFIX}${GSSAPI_SUFFIX}${BASE_SUFFIX}${PKGNAMESUFFIX2}
MASTER_SITE_SUBDIR=	${MASTER_SITE_SUBDIR2}
DISTNAME=	${DISTNAME2}
d24 2
a25 2
MAINTAINER=	ports@@FreeBSD.org
COMMENT=	The portable version of OpenBSD's OpenSSH
d28 1
a28 10
.if defined(OPENSSH_SNAPSHOT)
MASTER_SITE_SUBDIR2=	snapshot/
DISTNAME2=	${PORTNAME}-SNAP-${PORTREVISION}
NO_CHECKSUM=	yes
WRKSRC=		${WRKDIR}/${PORTNAME}
.else
MASTER_SITE_SUBDIR2=	
DISTNAME2=	${PORTNAME}-${OPENSSHVERSION}
WRKSRC=		${WRKDIR}/${PORTNAME}-${OPENSSHVERSION}
.endif
a46 1
PORTABLE_SUFFIX=	-portable
d60 2
a62 1
PORTABLE_SUFFIX=
a63 1
CONFLICTS+=	openssh-portable-*
a65 1
CONFLICTS+=	openssh-gssapi-*
@


1.93
log
@- new option WITH_OPENSSH_CHROOT
Submitted by:	KANAI Makoto
@
text
@d21 1
a21 1
MAINTAINER=	dinoex@@FreeBSD.org
@


1.92
log
@- update to 3.9p1

set PORTVERSION 3.9.0.1 to avoid another
bump of PORTEPOCH if 3.9.1p1 come out.

- new option OPENSSH_SNAPSHOT
@
text
@d84 4
@


1.91
log
@- bump PORTEPOCH
Reported by kriS
@
text
@d9 4
a12 1
PORTVERSION=	3.8.1p1
d15 2
a16 2
MASTER_SITES=	ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/ \
		ftp://carroll.cac.psu.edu/pub/OpenBSD/OpenSSH/portable/
d18 2
d24 12
d149 3
@


1.90
log
@- update to 3.8.1p1
@
text
@d10 1
@


1.89
log
@- force kerberos by option WITH_GSSAPI
@
text
@d9 1
a9 1
PORTVERSION=	3.8p1
@


1.88
log
@- make PKGNAMESUFFIX more flexible
@
text
@d49 1
a49 1
.if defined(KRB5_HOME) && exists(${KRB5_HOME})
d132 1
a132 1
.if defined(KRB5_HOME) && exists(${KRB5_HOME})
@


1.87
log
@- add SIZE
@
text
@d13 1
a13 1
PKGNAMESUFFIX?=	-portable
d35 1
d50 2
a51 1
PKGNAMESUFFIX=	-gssapi
d68 1
a68 1
PKGNAMESUFFIX=	-overwrite-base
d92 1
a92 1
	@@${REINPLACE_CMD} -e 's|-ldes||g' ${WRKSRC}/configure
@


1.86
log
@- update to 3.8p1
@
text
@d48 16
a87 16

.if defined(BATCH)
EXTRA_PATCHES+=		${FILESDIR}/batch.patch
.endif

.if defined(KRB5_HOME) && exists(${KRB5_HOME})
PKGNAMESUFFIX=	-gssapi
CONFLICTS+=	openssh-portable-*
CONFIGURE_ARGS+=	--with-kerberos5=${KRB5_HOME}
.else
CONFLICTS+=	openssh-gssapi-*
.if !defined(WITHOUT_KERBEROS) && exists(/usr/include/krb5.h)
CONFIGURE_ARGS+=	--with-kerberos5
EXTRA_PATCHES+=		${FILESDIR}/gss-serv.c.patch
.endif
.endif
@


1.85
log
@- new option WITHOUT_KERBEROS

PR:		58156
Submitted by:	matt@@peterson.org
@
text
@d9 1
a9 1
PORTVERSION=	3.7.1p2
d124 1
@


1.84
log
@- fix build with kerberos5 from base and missing libdes
- get rid of autoconf dependency
@
text
@d83 1
a83 1
.if exists(/usr/include/krb5.h)
@


1.83
log
@- fix spelling of gssapi
@
text
@d27 1
a79 2
BUILD_DEPENDS+=		autoreconf:${PORTSDIR}/devel/autoconf
# USE_AUTOCONF_VER=	252 # broken
a80 11
AUTORECONF=	autoreconf

post-patch:
	@@${ECHO_MSG} Applying extra patch for GSS-API key-exchange...
	@@${PATCH} ${PATCH_DIST_ARGS:S/-p0/-p1/} \
		< ${DISTDIR}/${GSSAPI_PATCH}

pre-configure:
	@@${ECHO_MSG} !!!! Warning this option uses autoreconf !!!
	(cd ${CONFIGURE_WRKSRC} && ${SETENV} ${AUTOCONF_ENV} ${AUTORECONF} \
		${AUTOCONF_ARGS})
d82 1
d85 1
a85 1
EXTRA_PATCHES+=	${FILESDIR}/gss-serv.c.patch
a86 2
.else
CONFLICTS+=	openssh-gssapi-*
d88 3
@


1.82
log
@- add CONFLICTS
Submitted by:	eikemeier@@fillmore-labs.com
@
text
@d78 1
a78 1
CONFILCTS+=	openssh-portable-*
d99 1
a99 1
CONFILCTS+=	openssh-gssapi-*
@


1.81
log
@- GSSAPI patch improved for kerbers5 and hemidal

Submitted by:	bg@@sics.se
@
text
@d23 1
d78 1
d95 2
a96 2
CONFIGURE_ARGS+=        --with-kerberos5
EXTRA_PATCHES+=         ${FILESDIR}/gss-serv.c.patch
d98 2
@


1.80
log
@- cleanup GSSAPI option
@
text
@d91 5
@


1.79
log
@- update to 3.7.1p2
more regressions tests successfull
@
text
@a76 6
GSSAPI_PATCH=	${PORTNAME}-3.6.1p2-gssapi-20030430.diff
GSSAPI_SITE=	http://www.sxw.org.uk/computing/patches/
MASTER_SITES+=	${GSSAPI_SITE}
DISTFILES=	${EXTRACT_ONLY} ${GSSAPI_PATCH}
EXTRACT_ONLY=	${PORTNAME}-${PORTVERSION}${EXTRACT_SUFX}
EXTRA_PATCHES+=		${FILESDIR}/servconf.c.patch
@


1.78
log
@- Security Fix in PAM handling
Obtained from:	des
@
text
@d9 1
a9 2
PORTVERSION=	3.6.1p2
PORTREVISION=	5
a32 1
ADDME+=		auth2-pam-freebsd.c
a73 5

post-extract:
.for i in ${ADDME}
	@@${CP} ${FILESDIR}/${i} ${WRKSRC}/
.endfor
@


1.77
log
@- mark FORBIDDEN until fixed.
@
text
@d10 1
a10 1
PORTREVISION=	4
a17 2

FORBIDDEN=	Security Problem with PAM
@


1.76
log
@- Security Fix obtained from OpenBSD
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/buffer.c.diff?r1=1.18&r2=1.19

Submitted by:	ash@@lab.poc.net
@
text
@d19 2
@


1.75
log
@Add Solar Designer's additional fixes to buffer management.
@
text
@d10 1
a10 1
PORTREVISION=	3
@


1.74
log
@- Securitry Fix revision 2
http://www.openssh.com/txt/buffer.adv
Approved by:	lioux (portmgr)
@
text
@d10 1
a10 1
PORTREVISION=	2
@


1.73
log
@Do not record expanded size before attempting to reallocate associated
memory.

Obtained from:	OpenBSD
@
text
@d10 1
a10 1
PORTREVISION=	1
@


1.72
log
@- use OPENSSLRPATH from bsd.openssl.mk
- strip CONFIGURE_ENV, LDFLAGS is set in bsd.openssl.mk
@
text
@d10 1
@


1.71
log
@- use hook for bsd.openssl.mk
@
text
@a25 1
CONFIGURE_ENV+=		LDFLAGS=${LDFLAGS}
d147 2
@


1.70
log
@- Update to gssapi-20030430
Submitted by:	wollman@@lcs.mit.edu
@
text
@d23 1
a142 1
.include "${PORTSDIR}/security/openssl/bsd.openssl.mk"
@


1.69
log
@- Update to 3.6.1p2
@
text
@a81 1
BROKEN=		patch conflicts with 3.5p1
d83 1
a83 1
GSSAPI_PATCH=	${PORTNAME}-3.4p1-gssapi-20020627.diff
d89 1
a89 1
BUILD_DEPENDS=		autoconf:${PORTSDIR}/devel/autoconf
d92 1
a92 2
AUTOCONF=	autoconf
AUTOHEADER=	autoheader
d100 2
a101 2
	@@${ECHO_MSG} !!!! Warning this option uses autoconf/autoheader !!!
	(cd ${CONFIGURE_WRKSRC} && ${SETENV} ${AUTOCONF_ENV} ${AUTOCONF} \
a102 1
	(cd ${CONFIGURE_WRKSRC} && ${SETENV} ${AUTOCONF_ENV} ${AUTOHEADER})
d143 6
@


1.68
log
@- honor any given LDFLAGS
@
text
@d9 1
a9 1
PORTVERSION=	3.6.1p1
@


1.67
log
@- Change all USE_OPENSSL_* to WITH_OPENSSL_*
@
text
@d25 1
@


1.66
log
@- use bsd.openssl.mk
@
text
@d47 1
a47 1
USE_OPENSSL_BASE=	yes
@


1.65
log
@- Update to 3.6.1p1
@
text
@d144 1
a144 1
.include "${PORTSDIR}/security/openssl/Makefile.ssl"
@


1.64
log
@- extend regression tests
@
text
@d9 1
a9 1
PORTVERSION=	3.6p1
@


1.63
log
@- Update to 3.6p1
@
text
@d139 1
a139 1
	PATH=${PREFIX}/bin:${PREFIX}/sbin:${PATH} \
@


1.62
log
@- add USE_PERL5_BUILD
@
text
@d9 1
a9 2
PORTVERSION=	3.5p1
PORTREVISION=	1
@


1.61
log
@- add COMMENT
@
text
@d26 1
@


1.60
log
@- openssh-3.5p1 doesn't log utmp for IPv6 connection correctly
Submitted by:	ume
@
text
@d17 1
@


1.59
log
@openssh-gssapi-3.5p1 is marked as broken
@
text
@d10 1
@


1.58
log
@remove an disfuntional MASTER_SITE
@
text
@d79 1
d81 1
a81 1
GSSAPI_PATCH=	${PORTNAME}-${PORTVERSION}-gssapi-20020627.diff
@


1.57
log
@Update to 3.5p1
@
text
@a11 1
		ftp://ftp.op.net/pub/OpenBSD/OpenSSH/portable/ \
@


1.56
log
@add bugfix from CURRENT
@
text
@d9 1
a9 2
PORTVERSION=	3.4p1
PORTREVISION=	8
@


1.55
log
@Fix resolver problem with privilege-separation.
PR:		39953
@
text
@d10 1
a10 1
PORTREVISION=	7
@


1.54
log
@- add pam_cleanup from CURRENT
- Fix build problems < 4.0
PR:		40576
@
text
@d10 1
a10 1
PORTREVISION=	6
@


1.53
log
@Add bits for regression tests
Fix build for /var/empty is schg and have open permissions.
@
text
@d10 1
a10 1
PORTREVISION=	5
@


1.52
log
@- Fix Problem with HAVE_HOST_IN_UTMP
- update monitor.c

PR:		40576
Submitted by:	lxv@@a-send-pr.sink.omut.org
@
text
@d136 5
@


1.51
log
@merge PAM buffer management from current.
@
text
@d10 1
a10 1
PORTREVISION=	4
@


1.50
log
@'PermitRootLogin no' is the new default for the OpenSSH port.
This now matches the PermitRootLogin configuration of OpenSSH in
the base system.  Please be aware of this when upgrading your
OpenSSH port, and if truly necessary, re-enable remote root login
by readjusting this option in your sshd_config.

Users are encouraged to create single-purpose users with ssh keys
and very narrowly defined sudo privileges instead of using root
for automated tasks.

- PKGNAMESUFFIX for GSSAPI set.
- Merged some patches from current to improve PAM.
- Fix BATCH=yes for bento.
@
text
@d10 1
a10 1
PORTREVISION=	3
@


1.49
log
@give Enviroment from login.conf priority over all others,
problem found by drs@@rucus.ru.ac.za.
@
text
@d10 1
a10 1
PORTREVISION=	2
d15 1
a15 1
PKGNAMESUFFIX=	-portable
d32 1
d75 5
d81 1
@


1.48
log
@Update gssapi patch
@
text
@d10 1
a10 1
PORTREVISION=	1
@


1.47
log
@Defaults changed: (Gregory Sutter)
 ChallengeResponseAuthentication no
 UseLogin no

patch for configure, to detect MAP_ANON submitted by:
Christophe Labouisse,Michael Handler,Gert Doering,Phil Oleson,Dave Baker

fix missing includes for "canohost.h"
@
text
@d75 1
a75 1
GSSAPI_PATCH=	${PORTNAME}-${PORTVERSION}-gssapi-20020527.diff
@


1.46
log
@Update to openssh-3.4
Update to openssh-3.4p1
@
text
@d10 1
@


1.45
log
@Security FIX, Please update to this Version.

Options for both:
USE_OPENSSL_BASE=yes
	uses an older opensssl in the base system.

Options for portable:
OPENSSH_OVERWRITE_BASE=yes
	includes USE_OPENSSL_BASE=yes
	installls in the paths of the base system
@
text
@d9 1
a9 2
PORTVERSION=	3.3p1
PORTREVISION=	5
@


1.44
log
@Thanks to max@@wide.ad.jp, maxim, obraun@@informatik.unibw-muenchen.de, fjoe
Patch from current, noted by drs@@rucus.ru.ac.za:
environment variables in the 'setenv' field of login.conf are set now.
@
text
@d10 1
a10 1
PORTREVISION=	3
d54 2
d64 1
d125 1
d127 1
@


1.43
log
@Streamline OPENSSH_OVERWRITE_BASE=yes
@
text
@d10 1
a10 1
PORTREVISION=	2
d101 3
d105 1
d117 1
a117 1
.if defined(OPENSSH_OVERWRITE_BASE)
@


1.42
log
@Migrate configuration files to $PREFIX/etc/ssh/
Add ${PREFIX}/etc/rc.d/sshd.sh.sample
@
text
@d53 1
d61 1
d113 1
d115 1
@


1.41
log
@change --with-privsep-path if OPENSSH_OVERWRITE_BASE is in effect.
Submitted by:	brad@@brad-x.com
@
text
@d10 1
a10 1
PORTREVISION=	1
d27 5
a31 4
CLEAN=		etc/ssh_config etc/sshd_config etc/moduli \
		etc/ssh_host_key etc/ssh_host_key.pub \
		etc/ssh_host_dsa_key etc/ssh_host_dsa_key.pub \
		etc/ssh_host_rsa_key etc/ssh_host_rsa_key.pub
d50 3
a52 3
CONFIGURE_ARGS+=	--mandir=${MANPREFIX}/man \
		--sysconfdir=/etc/ssh --localstatedir=/var
EMPTYDIR=	${PREFIX}/empty
d54 1
d56 4
d61 2
d90 1
a90 1
                ${AUTOCONF_ARGS})
d94 4
d99 1
a99 1
	-${MKDIR} ${EMPTYDIR}
d103 6
d111 3
@


1.40
log
@Create user for privsep
@
text
@a26 1
CONFIGURE_ARGS+=	--with-privsep-path=${PREFIX}/empty
d51 3
d55 1
d87 1
d90 1
a90 2
		-h - -d ${PREFIX}/empty -s /nonexistent -c "sshd privilege separation"; fi
	${MKDIR} ${PREFIX}/empty
@


1.39
log
@Update: openssh-3.2.3p1
New manpages: ssh-keysign.8 sftp-server.8 sshd.8
New program ssh-keysign
@
text
@d10 1
d27 1
d82 6
@


1.38
log
@- Get rid of PERL and use SED
@
text
@d9 1
a9 2
PORTREVISION=	2
PORTVERSION=	3.2.3p1
d20 2
a21 1
MAN8=	sftp-server.8 sshd.8
@


1.37
log
@Fix typing error in OPTION

Submitted by:	joseph@@randomnetworks.com
@
text
@d86 1
a86 1
.include <${PORTSDIR}/security/openssl/Makefile.ssl>
@


1.36
log
@Honor Option ENABLE_SUID_SSH
Build defaults witouth SUID
@
text
@d44 1
a44 1
USE_OPELSSL_BASE=	yes
@


1.35
log
@- get rid of duplicate code in Makefiles.
- Fix USE_OPENSSL_PORT and USE_OPENSSL_BASE
- drop obsolete/broken USE_OPENSSL
@
text
@d9 1
a9 1
PORTREVISION=	1
d37 4
@


1.34
log
@Update to OpenSSH 3.2.3

- patch openssh-3.1-adv.token.patch is now obsolete.
- remerged PAM changes form previous port
- declare CMSG_* macros.
- fixed bad type in function input_userauth_passwd_changereq

Update to OpenSSH-portable-3.2.3p1

- patch openssh-3.1p1-adv.token.patch is now obsolete
- keep previously declared CONFIGURE_ARGS
- remove openssh-mit-krb5-20020326.diff (should be in the distribution now)
- patch patch-readpassphrase.c is now in teh distribution
- merged previous patches.
- extend CONFIGURE_ARGS so it find OPENSSL again.
- new patches for GSSAPI, not fully tested.

If you have the patch applied:
http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/36080

Builds with openssl-0.9.6d under:
2.2.8-RELEASE
3.2-RELEASE
4.2-RELEASE
4.6-RC
@
text
@d9 1
a23 1
USE_OPENSSL=	yes
d40 1
d82 2
a83 11
.if ${OSVERSION} < 430000 || exists(${LOCALBASE}/lib/libcrypto.so.3)
OPENSSLBASE=	${LOCALBASE}
OPENSSLDIR=	${OPENSSLBASE}/openssl
LIB_DEPENDS+=	crypto.3:${PORTSDIR}/security/openssl
OPENSSLLIB=	${OPENSSLBASE}/lib
OPENSSLINC=	${OPENSSLBASE}/include
MAKE_ENV+=	OPENSSLLIB=${OPENSSLLIB} OPENSSLINC=${OPENSSLINC} \
		OPENSSLBASE=${OPENSSLBASE} OPENSSLDIR=${OPENSSLDIR}
CONFIGURE_ARGS+=	--with-ssl=${OPENSSLBASE}
.endif

@


1.33
log
@Use crypto.3 as dependeny.
To keep consistent with USE_SSL in bsd.port.mk
@
text
@d9 1
a9 2
PORTVERSION=	3.1p1
PORTREVISION=	4
a15 3
PATCH_SITES=	${MASTER_SITES}
PATCHFILES=	openssh-3.1p1-adv.token.patch

d25 1
a25 1
CONFIGURE_ARGS?=	--prefix=${PREFIX} --with-md5-passwords
d52 1
d55 1
a55 1
DISTFILES=	${EXTRACT_ONLY} ${PORTNAME}-${PORTVERSION}-gssapi-20020321.diff
a56 2
PATCH_SITES+=	${GSSAPI_SITE}
PATCHFILES+=	${PORTNAME}-mit-krb5-20020319.diff
d67 1
a67 1
		< ${DISTDIR}/${PORTNAME}-${PORTVERSION}-gssapi-20020321.diff
d89 1
d91 1
@


1.32
log
@Chase openssl shlib version increase.

Pointy hat to:	dinoex
@
text
@d89 1
a89 1
LIB_DEPENDS+=	ssl.3:${PORTSDIR}/security/openssl
@


1.31
log
@openssl:
- some configure scripts check the version of the lib
  so we need to update SHLIBVER
- bump PORTREVISION

openssh:
- build ports with local openssl, if it exists
@
text
@d89 1
a89 1
LIB_DEPENDS+=	crypto.3:${PORTSDIR}/security/openssl
@


1.30
log
@Security fix for token passing, see bugtraq for details.
- fetch and use openssh-3.1-adv.token.patch to build.
- bump PORTREVISION
@
text
@d86 2
a87 2
.if ${OSVERSION} < 430000
OPENSSLBASE=	/usr/local
d89 1
a89 1
LIB_DEPENDS+=	crypto.2:${PORTSDIR}/security/openssl
@


1.29
log
@- Fix problem with auth_ttyok and ttyname
- Make KERBEROS patch build with heimdal port
@
text
@d10 1
a10 1
PORTREVISION=	3
d17 3
d56 2
a57 1
MASTER_SITES+=	${PATCH_SITES}
d60 2
a61 2
PATCH_SITES=	http://www.sxw.org.uk/computing/patches/
PATCHFILES=	${PORTNAME}-mit-krb5-20020319.diff
@


1.28
log
@- Update patches for Option KRB5_HOME
	openssh-3.1p1-gssapi-20020321.diff
	openssh-mit-krb5-20020319.diff
@
text
@d10 1
a10 1
PORTREVISION=	2
d58 1
@


1.27
log
@Merged patches for HAVE_LOGIN_CAP from stable

PR:		35904
@
text
@a52 1
BROKEN=		Need updated patches from Simon Wilkinson
d54 1
a54 1
DISTFILES=	${EXTRACT_ONLY} ${PORTNAME}-${PORTVERSION}-gssapi.patch
d57 1
a57 1
PATCHFILES=	${PORTNAME}-${PORTVERSION}-krb5.patch
d67 1
a67 1
		< ${DISTDIR}/${PORTNAME}-${PORTVERSION}-gssapi.patch
@


1.26
log
@Fixed Build in 4.2
Add correct Version of OPENSSL in dependencies if older than 4.3
(bsd.ports.mk) is still not sufficent.
@
text
@d10 1
a10 1
PORTREVISION=	1
@


1.25
log
@Allow IPv6 connection if detected by configure.

Submitted by:	ume
@
text
@d80 13
a92 1
.include <bsd.port.mk>
@


1.24
log
@Fix thinko and make it possible to disable Kerberos support on the
make command line even if KRB5_HOME is set in make.conf.
@
text
@d10 1
@


1.23
log
@Mark BROKEN in Kerberos case: Simon Wilkinson has not released
updated patches yet.  (I hope dinoex doesn't mind my committing this.)
@
text
@d51 1
a51 1
.if defined(KRB5_HOME) && exists(KRB5_HOME)
@


1.22
log
@Update to OpenSSH 3.1 OpennSSH-portable 3.1p1

- update patch-au,patch-session.c for password changes.
- patch-channel.c is now integrated

Excerpt from Changelog:

20020304
 - OpenBSD CVS Sync
   - deraadt@@cvs.openbsd.org 2002/02/26 18:52:32
     [sftp.1]
     Ic cannot have that many arguments; spotted by mouring@@etoh.eviladmin.org
   - mouring@@cvs.openbsd.org 2002/02/26 19:04:37
     [sftp.1]
     > Ic cannot have that many arguments; spotted by mouring@@etoh.eviladmin.org
     Last Ic on the first line should not have a space between it and the final
     comma.
   - deraadt@@cvs.openbsd.org 2002/02/26 19:06:43
     [sftp.1]
     no, look closely.  the comma was highlighted. split .Ic even more
   - stevesk@@cvs.openbsd.org 2002/02/26 20:03:51
     [misc.c]
     use socklen_t
   - stevesk@@cvs.openbsd.org 2002/02/27 21:23:13
     [canohost.c channels.c packet.c sshd.c]
     remove unneeded casts in [gs]etsockopt(); ok markus@@
   - markus@@cvs.openbsd.org 2002/02/28 15:46:33
     [authfile.c kex.c kexdh.c kexgex.c key.c ssh-dss.c]
     add some const EVP_MD for openssl-0.9.7
   - stevesk@@cvs.openbsd.org 2002/02/28 19:36:28
     [auth.c match.c match.h]
     delay hostname lookup until we see a ``@@'' in DenyUsers and AllowUsers
     for sshd -u0; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/02/28 20:36:42
     [sshd.8]
     DenyUsers allows user@@host pattern also
   - stevesk@@cvs.openbsd.org 2002/02/28 20:46:10
     [sshd.8]
     -u0 DNS for user@@host
   - stevesk@@cvs.openbsd.org 2002/02/28 20:56:00
     [auth.c]
     log user not allowed details, from dwd@@bell-labs.com; ok markus@@
   - markus@@cvs.openbsd.org 2002/03/01 13:12:10
     [auth.c match.c match.h]
     undo the 'delay hostname lookup' change
     match.c must not use compress.c (via canonhost.c/packet.c)
     thanks to wilfried@@
   - markus@@cvs.openbsd.org 2002/03/04 12:43:06
     [auth-passwd.c auth-rh-rsa.c auth-rhosts.c]
   - markus@@cvs.openbsd.org 2002/03/04 13:10:46
     [misc.c]
     error-> debug, because O_NONBLOCK for /dev/null causes too many different
     errnos; ok stevesk@@, deraadt@@
     unused include
   - stevesk@@cvs.openbsd.org 2002/03/04 17:27:39
     [auth-krb5.c auth-options.h auth.h authfd.h authfile.h bufaux.h buffer.h
      channels.h cipher.h compat.h compress.h crc32.h deattack.c getput.h
      groupaccess.c misc.c mpaux.h packet.h readconf.h rsa.h scard.h
      servconf.h ssh-agent.c ssh.h ssh2.h sshpty.h sshtty.c ttymodes.h
      uuencode.c xmalloc.h]
     $OpenBSD$ and RCSID() cleanup: don't use RCSID() in .h files; add
     missing RCSID() to .c files and remove dup /*$OpenBSD$*/ from .c
     files.  ok markus@@
   - stevesk@@cvs.openbsd.org 2002/03/04 18:30:23
     [ssh-keyscan.c]
     handle connection close during read of protocol version string.
     fixes erroneous "bad greeting".  ok markus@@
   - markus@@cvs.openbsd.org 2002/03/04 19:37:58
     [channels.c]
     off by one; thanks to joost@@pine.nl
20020226
 - (tim) Bug 12 [configure.ac] add sys/bitypes.h to int64_t tests
   based on patch by mooney@@dogbert.cc.ndsu.nodak.edu (Tim Mooney)
   Bug 45 [configure.ac] modify skey test to work around conflict with autoconf
   reported by nolan@@naic.edu (Michael Nolan)
   patch by  Pekka Savola <pekkas@@netcore.fi>
   Bug 74 [configure.ac defines.h] add sig_atomic_t test
   reported by dwd@@bell-labs.com (Dave Dykstra)
   Bug 102 [defines.h] UNICOS fixes. patch by wendyp@@cray.com
   [configure.ac Makefile.in] link libwrap only with sshd
   based on patch by Maciej W. Rozycki <macro@@ds2.pg.gda.pl>
   Bug 123 link libpam only with sshd
   reported by peak@@argo.troja.mff.cuni.cz (Pavel Kankovsky)
   [configure.ac defines.h] modify previous SCO3 fix to not break Solaris 7
   [acconfig.h] remove unused HAVE_REGCOMP
   [configure.ac] put back in search for prngd-socket
 - (stevesk) openbsd-compat/base64.h: typo in comment
 - (bal) OpenBSD CVS Sync
   - markus@@cvs.openbsd.org 2002/02/15 23:54:10
     [auth-krb5.c]
     krb5_get_err_text() does not like context==NULL; he@@nordu.net via google;
     ok provos@@
   - markus@@cvs.openbsd.org 2002/02/22 12:20:34
     [log.c log.h ssh-keyscan.c]
     overwrite fatal() in ssh-keyscan.c; fixes pr 2354; ok provos@@
   - markus@@cvs.openbsd.org 2002/02/23 17:59:02
     [kex.c kexdh.c kexgex.c]
     don't allow garbage after payload.
   - stevesk@@cvs.openbsd.org 2002/02/24 16:09:52
     [sshd.c]
     use u_char* here; ok markus@@
   - markus@@cvs.openbsd.org 2002/02/24 16:57:19
     [sftp-client.c]
     early close(), missing free; ok stevesk@@
   - markus@@cvs.openbsd.org 2002/02/24 16:58:32
     [packet.c]
     make 'cp' unsigned and merge with 'ucp'; ok stevesk@@
   - markus@@cvs.openbsd.org 2002/02/24 18:31:09
     [uuencode.c]
     typo in comment
   - markus@@cvs.openbsd.org 2002/02/24 19:14:59
     [auth2.c authfd.c authfd.h authfile.c kexdh.c kexgex.c key.c key.h
      ssh-dss.c ssh-dss.h ssh-keygen.c ssh-rsa.c ssh-rsa.h sshconnect2.c]
     signed vs. unsigned: make size arguments u_int, ok stevesk@@
   - stevesk@@cvs.openbsd.org 2002/02/24 19:59:42
     [channels.c misc.c]
     disable Nagle in connect_to() and channel_post_port_listener() (port
     forwarding endpoints).  the intention is to preserve the on-the-wire
     appearance to applications at either end; the applications can then
     enable TCP_NODELAY according to their requirements. ok markus@@
   - markus@@cvs.openbsd.org 2002/02/25 16:33:27
     [ssh-keygen.c sshconnect2.c uuencode.c uuencode.h]
     more u_* fixes
 - (bal) Imported missing fatal.c and fixed up Makefile.in
 - (tim) [configure.ac] correction to Bug 123 fix
     [configure.ac] correction to sig_atomic_t test

20020224
 - (tim) [loginrec.c session.c sshlogin.c sshlogin.h] Bug 84
   patch by wknox@@mitre.org (William Knox).
   [sshlogin.h] declare record_utmp_only for session.c

20020219
 - (djm) OpenBSD CVS Sync
   - mpech@@cvs.openbsd.org 2002/02/13 08:33:47
     [ssh-keyscan.1]
     When you give command examples and etc., in a manual page prefix them with:     $ command
     or
     # command
   - markus@@cvs.openbsd.org 2002/02/14 23:27:59
     [channels.c]
     increase the SSH v2 window size to 4 packets. comsumes a little
     bit more memory for slow receivers but increases througput.
   - markus@@cvs.openbsd.org 2002/02/14 23:28:00
     [channels.h session.c ssh.c]
     increase the SSH v2 window size to 4 packets. comsumes a little
     bit more memory for slow receivers but increases througput.
   - markus@@cvs.openbsd.org 2002/02/14 23:41:01
     [authfile.c cipher.c cipher.h kex.c kex.h packet.c]
     hide some more implementation details of cipher.[ch] and prepares for move
     to EVP, ok deraadt@@
   - stevesk@@cvs.openbsd.org 2002/02/16 14:53:37
     [ssh-keygen.1]
     -t required now for key generation
   - stevesk@@cvs.openbsd.org 2002/02/16 20:40:08
     [ssh-keygen.c]
     default to rsa keyfile path for non key generation operations where
     keyfile not specified.  fixes core dump in those cases.  ok markus@@
   - millert@@cvs.openbsd.org 2002/02/16 21:27:53
     [auth.h]
     Part one of userland __P removal.  Done with a simple regexp with
     some minor hand editing to make comments line up correctly.  Another
     pass is forthcoming that handles the cases that could not be done
     automatically.
   - millert@@cvs.openbsd.org 2002/02/17 19:42:32
     [auth.h]
     Manual cleanup of remaining userland __P use (excluding packages
     maintained outside the tree)
   - markus@@cvs.openbsd.org 2002/02/18 13:05:32
     [cipher.c cipher.h]
     switch to EVP, ok djm@@ deraadt@@
   - markus@@cvs.openbsd.org 2002/02/18 17:55:20
     [ssh.1]
     -q: Fatal errors are _not_ displayed.
   - deraadt@@cvs.openbsd.org 2002/02/19 02:50:59
     [sshd_config]
     stategy is not an english word
 - (bal) OpenBSD CVS Sync
   - markus@@cvs.openbsd.org 2002/02/15 23:11:26
     [session.c]
     split do_child(), ok mouring@@
   - markus@@cvs.openbsd.org 2002/02/16 00:51:44
     [session.c]
     typo

20020218
 - (tim) newer config.guess from ftp://ftp.gnu.org/gnu/config/config.guess

20020213
 - (djm) Bug #114 - not starting PAM for SSH protocol 1 invalid users

20020213
 - (djm) OpenBSD CVS Sync
   - markus@@cvs.openbsd.org 2002/02/11 16:10:15
     [kex.c]
     restore kexinit handler if we reset the dispatcher, this unbreaks
     rekeying s/kex_clear_dispatch/kex_reset_dispatch/
   - markus@@cvs.openbsd.org 2002/02/11 16:15:46
     [sshconnect1.c]
     include md5.h, not evp.h
   - markus@@cvs.openbsd.org 2002/02/11 16:17:55
     [sshd.c]
     do not complain about port > 1024 if rhosts-auth is disabled
   - markus@@cvs.openbsd.org 2002/02/11 16:19:39
     [sshd.c]
     include md5.h not hmac.h
   - markus@@cvs.openbsd.org 2002/02/11 16:21:42
     [match.c]
     support up to 40 algorithms per proposal
   - djm@@cvs.openbsd.org 2002/02/12 12:32:27
     [sftp.1 sftp.c sftp-client.c sftp-client.h sftp-int.c]
     Perform multiple overlapping read/write requests in file transfer. Mostly
     done by Tobias Ringstrom <tori@@ringstrom.mine.nu>; ok markus@@
   - djm@@cvs.openbsd.org 2002/02/12 12:44:46
     [sftp-client.c]
     Let overlapped upload path handle servers which reorder ACKs. This may be
     permitted by the protocol spec; ok markus@@
   - markus@@cvs.openbsd.org 2002/02/13 00:28:13
     [sftp-server.c]
     handle SSH2_FILEXFER_ATTR_SIZE in SSH2_FXP_(F)SETSTAT; ok djm@@
   - markus@@cvs.openbsd.org 2002/02/13 00:39:15
     [readpass.c]
     readpass.c is not longer from UCB, since we now use readpassphrase(3)
   - djm@@cvs.openbsd.org 2002/02/13 00:59:23
     [sftp-client.c sftp-client.h sftp-glob.c sftp-glob.h sftp.h]
     [sftp-int.c sftp-int.h]
     API cleanup and backwards compat for filexfer v.0 servers; ok markus@@
 - (djm) Sync openbsd-compat with OpenBSD CVS too
 - (djm) Bug #106: Add --without-rpath configure option. Patch from
   Nicolas.Williams@@ubsw.com

20020210
 - (djm) OpenBSD CVS Sync
   - deraadt@@cvs.openbsd.org 2002/02/09 17:37:34
     [pathnames.h session.c ssh.1 sshd.8 sshd_config ssh-keyscan.1]
     move ssh config files to /etc/ssh
 - (djm) Adjust portable Makefile.in tnd ssh-rand-helper.c o match
   - deraadt@@cvs.openbsd.org 2002/02/10 01:07:05
     [readconf.h sshd.8]
     more /etc/ssh; openbsd@@davidkrause.com

20020208
 - (djm) OpenBSD CVS Sync
   - markus@@cvs.openbsd.org 2002/02/04 12:15:25
     [sshd.c]
     add SYSLOG_FACILITY_NOT_SET = -1, SYSLOG_LEVEL_NOT_SET = -1,
     fixes arm/netbsd; based on patch from bjh21@@netbsd.org; ok djm@@
   - stevesk@@cvs.openbsd.org 2002/02/04 20:41:16
     [ssh-agent.1]
     more sync for default ssh-add identities; ok markus@@
   - djm@@cvs.openbsd.org 2002/02/05 00:00:46
     [sftp.1 sftp.c sftp-client.c sftp-client.h sftp-int.c]
     Add "-B" option to specify copy buffer length (default 32k); ok markus@@
   - markus@@cvs.openbsd.org 2002/02/05 14:32:55
     [channels.c channels.h ssh.c]
     merge channel_request() into channel_request_start()
   - markus@@cvs.openbsd.org 2002/02/06 14:22:42
     [sftp.1]
     sort options; ok mpech@@, stevesk@@
   - mpech@@cvs.openbsd.org 2002/02/06 14:27:23
     [sftp.c]
     sync usage() with manual.
   - markus@@cvs.openbsd.org 2002/02/06 14:37:22
     [session.c]
     minor KNF
   - markus@@cvs.openbsd.org 2002/02/06 14:55:16
     [channels.c clientloop.c serverloop.c ssh.c]
     channel_new never returns NULL, mouring@@; ok djm@@
   - markus@@cvs.openbsd.org 2002/02/07 09:35:39
     [ssh.c]
     remove bogus comments

20020205
 - (djm) Cleanup after sync:
   - :%s/reverse_mapping_check/verify_reverse_mapping/g
 - (djm) OpenBSD CVS Sync
   - stevesk@@cvs.openbsd.org 2002/01/24 21:09:25
     [channels.c misc.c misc.h packet.c]
     add set_nodelay() to set TCP_NODELAY on a socket (prep for nagle tuning).
     no nagle changes just yet; ok djm@@ markus@@
   - stevesk@@cvs.openbsd.org 2002/01/24 21:13:23
     [packet.c]
     need misc.h for set_nodelay()
   - markus@@cvs.openbsd.org 2002/01/25 21:00:24
     [sshconnect2.c]
     unused include
   - markus@@cvs.openbsd.org 2002/01/25 21:42:11
     [ssh-dss.c ssh-rsa.c]
     use static EVP_MAX_MD_SIZE buffers for EVP_DigestFinal; ok stevesk@@
     don't use evp_md->md_size, it's not public.
   - markus@@cvs.openbsd.org 2002/01/25 22:07:40
     [kex.c kexdh.c kexgex.c key.c mac.c]
     use EVP_MD_size(evp_md) and not evp_md->md_size; ok steveks@@
   - stevesk@@cvs.openbsd.org 2002/01/26 16:44:22
     [includes.h session.c]
     revert code to add x11 localhost display authorization entry for
     hostname/unix:d and uts.nodename/unix:d if nodename was different than
     hostname.  just add entry for unix:d instead.  ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/27 14:57:46
     [channels.c servconf.c servconf.h session.c sshd.8 sshd_config]
     add X11UseLocalhost; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/27 18:08:17
     [ssh.c]
     handle simple case to identify FamilyLocal display; ok markus@@
   - markus@@cvs.openbsd.org 2002/01/29 14:27:57
     [ssh-add.c]
     exit 2 if no agent, exit 1 if list fails; debian#61078; ok djm@@
   - markus@@cvs.openbsd.org 2002/01/29 14:32:03
     [auth2.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c canohost.c]
     [servconf.c servconf.h session.c sshd.8 sshd_config]
     s/ReverseMappingCheck/VerifyReverseMapping/ and avoid confusion;
     ok stevesk@@
   - stevesk@@cvs.openbsd.org 2002/01/29 16:29:02
     [session.c]
     limit subsystem length in log; ok markus@@
   - markus@@cvs.openbsd.org 2002/01/29 16:41:19
     [ssh-add.1]
     add DIAGNOSTICS; ok stevesk@@
   - markus@@cvs.openbsd.org 2002/01/29 22:46:41
     [session.c]
     don't depend on servconf.c; ok djm@@
   - markus@@cvs.openbsd.org 2002/01/29 23:50:37
     [scp.1 ssh.1]
     mention exit status; ok stevesk@@
   - markus@@cvs.openbsd.org 2002/01/31 13:35:11
     [kexdh.c kexgex.c]
     cross check announced key type and type from key blob
   - markus@@cvs.openbsd.org 2002/01/31 15:00:05
     [serverloop.c]
     no need for WNOHANG; ok stevesk@@
   - markus@@cvs.openbsd.org 2002/02/03 17:53:25
     [auth1.c serverloop.c session.c session.h]
     don't use channel_input_channel_request and callback
     use new server_input_channel_req() instead:
     	server_input_channel_req does generic request parsing on server side
     	session_input_channel_req handles just session specific things now
     ok djm@@
   - markus@@cvs.openbsd.org 2002/02/03 17:55:55
     [channels.c channels.h]
     remove unused channel_input_channel_request
   - markus@@cvs.openbsd.org 2002/02/03 17:58:21
     [channels.c channels.h ssh.c]
     generic callbacks are not really used, remove and
     add a callback for msg of type SSH2_MSG_CHANNEL_OPEN_CONFIRMATION
     ok djm@@
   - markus@@cvs.openbsd.org 2002/02/03 17:59:23
     [sshconnect2.c]
     more cross checking if announced vs. used key type; ok stevesk@@
   - stevesk@@cvs.openbsd.org 2002/02/03 22:35:57
     [ssh.1 sshd.8]
     some KeepAlive cleanup/clarify; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/02/03 23:22:59
     [ssh-agent.1]
     ssh-add also adds $HOME/.ssh/id_rsa and $HOME/.ssh/id_dsa now.
   - stevesk@@cvs.openbsd.org 2002/02/04 00:53:39
     [ssh-agent.c]
     unneeded includes
   - markus@@cvs.openbsd.org 2002/02/04 11:58:10
     [auth2.c]
     cross checking of announced vs actual pktype in pubkey/hostbaed auth;
     ok stevesk@@
   - markus@@cvs.openbsd.org 2002/02/04 12:15:25
     [log.c log.h readconf.c servconf.c]
     add SYSLOG_FACILITY_NOT_SET = -1, SYSLOG_LEVEL_NOT_SET = -1,
     fixes arm/netbsd; based on patch from bjh21@@netbsd.org; ok djm@@
   - stevesk@@cvs.openbsd.org 2002/02/04 20:41:16
     [ssh-add.1]
     more sync for default ssh-add identities; ok markus@@
   - djm@@cvs.openbsd.org 2002/02/04 21:53:12
     [sftp.1 sftp.c]
     Add "-P" option to directly connect to a local sftp-server. Should be
     useful for regression testing; ok markus@@
   - djm@@cvs.openbsd.org 2002/02/05 00:00:46
     [sftp.1 sftp.c sftp-client.c sftp-client.h sftp-int.c]
     Add "-B" option to specify copy buffer length (default 32k); ok markus@@

20020130
 - (djm) Delay PRNG seeding until we need it in ssh-keygen, from markus@@
 - (tim) [configure.ac] fix logic on when ssh-rand-helper is installed.
   [sshd_config] put back in line that tells what PATH was compiled into sshd.

20020125
 - (djm) Don't grab Xserver or pointer by default. x11-ssh-askpass doesn't
   and grabbing can cause deadlocks with kinput2.

20020124
 - (stevesk) Makefile.in: bug #61; delete commented line for now.

20020123
 - (djm) Fix non-standard shell syntax in autoconf. Patch from
   Dave Dykstra <dwd@@bell-labs.com>
 - (stevesk) fix --with-zlib=
 - (djm) Use case statements in autoconf to clean up some tests

20020122
 - (djm) autoconf hacking:
   - We don't support --without-zlib currently, so don't allow it.
   - Rework cryptographic random number support detection. We now detect
     whether OpenSSL seeds itself. If it does, then we don't bother with
     the ssh-rand-helper program. You can force the use of ssh-rand-helper
     using the --with-rand-helper configure argument
   - Simplify and clean up ssh-rand-helper configuration
   - Add OpenSSL sanity check: verify that header version matches version
     reported by library
 - (djm) Fix some bugs I introduced into ssh-rand-helper yesterday
 - OpenBSD CVS Sync
   - djm@@cvs.openbsd.org 2001/12/21 08:52:22
     [ssh-keygen.1 ssh-keygen.c]
     Remove default (rsa1) key type; ok markus@@
   - djm@@cvs.openbsd.org 2001/12/21 08:53:45
     [readpass.c]
     Avoid interruptable passphrase read; ok markus@@
   - djm@@cvs.openbsd.org 2001/12/21 10:06:43
     [ssh-add.1 ssh-add.c]
     Try all standard key files (id_rsa, id_dsa, identity) when invoked with
     no arguments; ok markus@@
   - markus@@cvs.openbsd.org 2001/12/21 12:17:33
     [serverloop.c]
     remove ifdef for USE_PIPES since fdin != fdout; ok djm@@
   - deraadt@@cvs.openbsd.org 2001/12/24 07:29:43
     [ssh-add.c]
     try all listed keys.. how did this get broken?
   - markus@@cvs.openbsd.org 2001/12/25 18:49:56
     [key.c]
     be more careful on allocation
   - markus@@cvs.openbsd.org 2001/12/25 18:53:00
     [auth1.c]
     be more carefull on allocation
   - markus@@cvs.openbsd.org 2001/12/27 18:10:29
     [ssh-keygen.c]
     -t is only needed for key generation (unbreaks -i, -e, etc).
   - markus@@cvs.openbsd.org 2001/12/27 18:22:16
     [auth1.c authfile.c auth-rsa.c dh.c kexdh.c kexgex.c key.c rsa.c]
     [scard.c ssh-agent.c sshconnect1.c sshd.c ssh-dss.c]
     call fatal() for openssl allocation failures
   - stevesk@@cvs.openbsd.org 2001/12/27 18:22:53
     [sshd.8]
     clarify -p; ok markus@@
   - markus@@cvs.openbsd.org 2001/12/27 18:26:13
     [authfile.c]
     missing include
   - markus@@cvs.openbsd.org 2001/12/27 19:37:23
     [dh.c kexdh.c kexgex.c]
     always use BN_clear_free instead of BN_free
   - markus@@cvs.openbsd.org 2001/12/27 19:54:53
     [auth1.c auth.h auth-rh-rsa.c]
     auth_rhosts_rsa now accept generic keys.
   - markus@@cvs.openbsd.org 2001/12/27 20:39:58
     [auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h]
     [serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
     get rid of packet_integrity_check, use packet_done() instead.
   - markus@@cvs.openbsd.org 2001/12/28 12:14:27
     [auth1.c auth2.c auth2-chall.c auth-rsa.c channels.c clientloop.c]
     [kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c]
     [ssh.c sshconnect1.c sshconnect2.c sshd.c]
     s/packet_done/packet_check_eom/ (end-of-message); ok djm@@
   - markus@@cvs.openbsd.org 2001/12/28 13:57:33
     [auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c]
     packet_get_bignum* no longer returns a size
   - markus@@cvs.openbsd.org 2001/12/28 14:13:13
     [bufaux.c bufaux.h packet.c]
     buffer_get_bignum: int -> void
   - markus@@cvs.openbsd.org 2001/12/28 14:50:54
     [auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c]
     [packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c]
     [sshconnect2.c sshd.c]
     packet_read* no longer return the packet length, since it's not used.
   - markus@@cvs.openbsd.org 2001/12/28 15:06:00
     [auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c]
     [dispatch.h kex.c kex.h serverloop.c ssh.c sshconnect2.c]
     remove plen from the dispatch fn. it's no longer used.
   - stevesk@@cvs.openbsd.org 2001/12/28 22:37:48
     [ssh.1 sshd.8]
     document LogLevel DEBUG[123]; ok markus@@
   - stevesk@@cvs.openbsd.org 2001/12/29 21:56:01
     [authfile.c channels.c compress.c packet.c sftp-server.c]
     [ssh-agent.c ssh-keygen.c]
     remove unneeded casts and some char->u_char cleanup; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/03 04:11:08
     [ssh_config]
     grammar in comment
   - stevesk@@cvs.openbsd.org 2002/01/04 17:59:17
     [readconf.c servconf.c]
     remove #ifdef _PATH_XAUTH/#endif; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/04 18:14:16
     [servconf.c sshd.8]
     protocol 2 HostKey code default is now /etc/ssh_host_rsa_key and
     /etc/ssh_host_dsa_key like we have in sshd_config.  ok markus@@
   - markus@@cvs.openbsd.org 2002/01/05 10:43:40
     [channels.c]
     fix hanging x11 channels for rejected cookies (e.g.
     XAUTHORITY=/dev/null xbiff) bug #36, based on patch from
     djast@@cs.toronto.edu
   - stevesk@@cvs.openbsd.org 2002/01/05 21:51:56
     [ssh.1 sshd.8]
     some missing and misplaced periods
   - markus@@cvs.openbsd.org 2002/01/09 13:49:27
     [ssh-keygen.c]
     append \n only for public keys
   - markus@@cvs.openbsd.org 2002/01/09 17:16:00
     [channels.c]
     merge channel_pre_open_15/channel_pre_open_20; ok provos@@
   - markus@@cvs.openbsd.org 2002/01/09 17:26:35
     [channels.c nchan.c]
     replace buffer_consume(b, buffer_len(b)) with buffer_clear(b);
     ok provos@@
   - markus@@cvs.openbsd.org 2002/01/10 11:13:29
     [serverloop.c]
     skip client_alive_check until there are channels; ok beck@@
   - markus@@cvs.openbsd.org 2002/01/10 11:24:04
     [clientloop.c]
     handle SSH2_MSG_GLOBAL_REQUEST (just reply with failure); ok djm@@
   - markus@@cvs.openbsd.org 2002/01/10 12:38:26
     [nchan.c]
     remove dead code (skip drain)
   - markus@@cvs.openbsd.org 2002/01/10 12:47:59
     [nchan.c]
     more unused code (with channels.c:1.156)
   - markus@@cvs.openbsd.org 2002/01/11 10:31:05
     [packet.c]
     handle received SSH2_MSG_UNIMPLEMENTED messages; ok djm@@
   - markus@@cvs.openbsd.org 2002/01/11 13:36:43
     [ssh2.h]
     add defines for msg type ranges
   - markus@@cvs.openbsd.org 2002/01/11 13:39:36
     [auth2.c dispatch.c dispatch.h kex.c]
     a single dispatch_protocol_error() that sends a message of
     type 'UNIMPLEMENTED'
     dispatch_range(): set handler for a ranges message types
     use dispatch_protocol_ignore() for authentication requests after
     successful authentication (the drafts requirement).
     serverloop/clientloop now send a 'UNIMPLEMENTED' message instead
     of exiting.
   - markus@@cvs.openbsd.org 2002/01/11 20:14:11
     [auth2-chall.c auth-skey.c]
     use strlcpy not strlcat; mouring@@
   - markus@@cvs.openbsd.org 2002/01/11 23:02:18
     [readpass.c]
     use _PATH_TTY
   - markus@@cvs.openbsd.org 2002/01/11 23:02:51
     [auth2-chall.c]
     use snprintf; mouring@@
   - markus@@cvs.openbsd.org 2002/01/11 23:26:30
     [auth-skey.c]
     use snprintf; mouring@@
   - markus@@cvs.openbsd.org 2002/01/12 13:10:29
     [auth-skey.c]
     undo local change
   - provos@@cvs.openbsd.org 2002/01/13 17:27:07
     [ssh-agent.c]
     change to use queue.h macros; okay markus@@
   - markus@@cvs.openbsd.org 2002/01/13 17:57:37
     [auth2.c auth2-chall.c compat.c sshconnect2.c sshd.c]
     use buffer API and avoid static strings of fixed size;
     ok provos@@/mouring@@
   - markus@@cvs.openbsd.org 2002/01/13 21:31:20
     [channels.h nchan.c]
     add chan_set_[io]state(), order states, state is now an u_int,
     simplifies debugging messages; ok provos@@
   - markus@@cvs.openbsd.org 2002/01/14 13:22:35
     [nchan.c]
     chan_send_oclose1() no longer calls chan_shutdown_write(); ok provos@@
   - markus@@cvs.openbsd.org 2002/01/14 13:34:07
     [nchan.c]
     merge chan_[io]buf_empty[12]; ok provos@@
   - markus@@cvs.openbsd.org 2002/01/14 13:40:10
     [nchan.c]
     correct fn names for ssh2, do not switch from closed to closed;
     ok provos@@
   - markus@@cvs.openbsd.org 2002/01/14 13:41:13
     [nchan.c]
     remove duplicated code; ok provos@@
   - markus@@cvs.openbsd.org 2002/01/14 13:55:55
     [channels.c channels.h nchan.c]
     remove function pointers for events, remove chan_init*; ok provos@@
   - markus@@cvs.openbsd.org 2002/01/14 13:57:03
     [channels.h nchan.c]
     (c) 2002
   - markus@@cvs.openbsd.org 2002/01/16 13:17:51
     [channels.c channels.h serverloop.c ssh.c]
     wrapper for channel_setup_fwd_listener
   - stevesk@@cvs.openbsd.org 2002/01/16 17:40:23
     [sshd_config]
     The stategy now used for options in the default sshd_config shipped
     with OpenSSH is to specify options with their default value where
     possible, but leave them commented.  Uncommented options change a
     default value.  Subsystem is currently the only default option
     changed.  ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/16 17:42:33
     [ssh.1]
     correct defaults for -i/IdentityFile; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/16 17:55:33
     [ssh_config]
     correct some commented defaults.  add Ciphers default.  ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/17 04:27:37
     [log.c]
     casts to silence enum type warnings for bugzilla bug 37; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/18 17:14:16
     [sshd.8]
     correct Ciphers default; paola.mannaro@@ubs.com
   - stevesk@@cvs.openbsd.org 2002/01/18 18:14:17
     [authfd.c bufaux.c buffer.c cipher.c packet.c ssh-agent.c ssh-keygen.c]
     unneeded cast cleanup; ok markus@@
   - stevesk@@cvs.openbsd.org 2002/01/18 20:46:34
     [sshd.8]
     clarify Allow(Groups|Users) and Deny(Groups|Users); suggestion from
     allard@@oceanpark.com; ok markus@@
   - markus@@cvs.openbsd.org 2002/01/21 15:13:51
     [sshconnect.c]
     use read_passphrase+ECHO in confirm(), allows use of ssh-askpass
     for hostkey confirm.
   - markus@@cvs.openbsd.org 2002/01/21 22:30:12
     [cipher.c compat.c myproposal.h]
     remove "rijndael-*", just use "aes-" since this how rijndael is called
     in the drafts; ok stevesk@@
   - markus@@cvs.openbsd.org 2002/01/21 23:27:10
     [channels.c nchan.c]
     cleanup channels faster if the are empty and we are in drain-state;
     ok deraadt@@
   - stevesk@@cvs.openbsd.org 2002/01/22 02:52:41
     [servconf.c]
     typo in error message; from djast@@cs.toronto.edu
 - (djm) Make auth2-pam.c compile again after dispatch.h and packet.h
   changes
 - (djm) Recent Glibc includes an incompatible sys/queue.h. Treat it as
   bogus in configure
 - (djm) Use local sys/queue.h if necessary in ssh-agent.c

20020121
 - (djm) Rework ssh-rand-helper:
   - Reduce quantity of ifdef code, in preparation for ssh_rand_conf
   - Always seed from system calls, even when doing PRNGd seeding
   - Tidy and comment #define knobs
   - Remove unused facility for multiple runs through command list
   - KNF, cleanup, update copyright

20020114
 - (djm) Bug #50 - make autoconf entropy path checks more robust

20020108
 - (djm) Merge Cygwin copy_environment with do_pam_environment, removing
   fixed env var size limit in the process. Report from Corinna Vinschen
   <vinschen@@redhat.com>
 - (stevesk) defines.h: use "/var/spool/sockets/X11/%u" for HP-UX.  does
   not depend on transition links.  from Lutz Jaenicke.

20020106
 - (stevesk) defines.h: determine _PATH_UNIX_X; currently "/tmp/.X11-unix/X%u"
   for all platforms except HP-UX, which is "/usr/spool/sockets/X11/%u".

20020103
 - (djm) Use bigcrypt() on systems with SCO_PROTECTED_PW. Patch from
   Roger Cornelius <rac@@tenzing.org>
@
text
@d51 2
a52 1
.if defined(KRB5_HOME)
@


1.21
log
@Fix off-by-one error.

Obtained from:	OpenBSD

Bump PORTREVISION.
@
text
@d9 1
a9 2
PORTVERSION=	3.0.2p1
PORTREVISION=	1
@


1.20
log
@Add option to support patches:

        OpenSSH supports Kerberos v5 authentication, but this is not
        enabled in the portable version.  A patch is available to
        correct this deficiency for those wishing to use this port
        with Kerberos.  In addition, a patch is also available from
        Simon Wilkinson to implement the GSS-API key-exchange
        mechanism for SSHv2, which is currently being standardized.
        Use of this mechanism with Kerberos v5 obviates the need for
        manual management of host keys, a considerable improvement for
        large Kerberos sites.

PR:		34363
Submitted by:	wollman@@hergotha.lcs.mit.edu
@
text
@d10 1
@


1.19
log
@Add patch for: readpassphrase.h
	Someone in the OpenSSH world doesn't understand the difference
between application and implementation namespaces.  This causes
conflicts with <readpassphrase.h>.

PR:		34362
Submitted by:	wollman@@hergotha.lcs.mit.edu
@
text
@d51 24
@


1.18
log
@PKGNAMESUFFIX set for Option OPENSSH_OVERWRITE_BASE
@
text
@d23 1
a23 1
USE_OPENSSL=	YES
@


1.17
log
@Fix MANPREFIX, so manpages are compressed
@
text
@d40 1
@


1.16
log
@strip trailing \
@
text
@d41 2
a42 1
CONFIGURE_ARGS+=	--mandir=${PREFIX}/share/man \
@


1.15
log
@adding a knob to the OpenSSH port to allow people
to overwrite the ssh in the base system.
	make OPENSSH_OVERWRITE_BASE=yes

Submitted by:	n@@nectar.cc (Jacques A. Vidrine)
@
text
@d42 1
a42 1
		--sysconfdir=/etc/ssh --localstatedir=/var \
@


1.14
log
@- Udate to OpenSSH-3.0.2
- make batch-processing cleaner

20011202
 - (djm) Syn with OpenBSD OpenSSH-3.0.2
   - markus@@cvs.openbsd.org
     [session.c sshd.8 version.h]
     Don't allow authorized_keys specified environment variables when
     UseLogin in active
@
text
@d39 6
@


1.13
log
@In BATCH mode - clean generated host keys.
@
text
@d9 1
a9 1
PORTVERSION=	3.0.1p1
d39 4
a44 3
.if defined(BATCH)
	@@(cd ${PREFIX} && ${RM} -f ${CLEAN})
.endif
@


1.12
log
@Give dinoex@@ maintainership since he's really been maintaining it and
is better suited for maintaining this port.
@
text
@d16 1
a16 1
MAINTAINER= dinoex@@FreeBSD.org
d26 4
d41 3
@


1.11
log
@Update to openssh-3.0.1 and openssh-portable-3.0.1p1

- now in protocol2:
Background ssh at logout when waiting for forwarded connection / X11 sessions
to terminate

disabled -DSKEY

from Changelog (not complete):

20011115
 - (djm) Fix IPv4 default in ssh-keyscan. Spotted by Dan Astoorian
   <djast@@cs.toronto.edu> Fix from markus@@
 - (djm) Release 3.0.1p1

20011113
 - (djm) Fix early (and double) free of remote user when using Kerberos.
   Patch from Simon Wilkinson <simon@@sxw.org.uk>
 - (djm) AIX login{success,failed} changes. Move loginsuccess call to
   do_authenticated. Call loginfailed for protocol 2 failures > MAX like
   we do for protocol 1. Reports from Ralf Wenk <wera0003@@fh-karlsruhe.de>,
   K.Wolkersdorfer@@fz-juelich.de and others
 - (djm) OpenBSD CVS Sync
   - dugsong@@cvs.openbsd.org 2001/11/11 18:47:10
     [auth-krb5.c]
     fix krb5 authorization check. found by <jhawk@@MIT.EDU>. from
     art@@, deraadt@@ ok
   - markus@@cvs.openbsd.org  2001/11/12 11:17:07
     [servconf.c]
     enable authorized_keys2 again. tested by fries@@

20011112
 - OpenBSD CVS Sync
   - markus@@cvs.openbsd.org 2001/10/24 08:41:41
     [sshd.c]
     mention remote port in debug message
   - markus@@cvs.openbsd.org 2001/10/24 08:51:35
     [clientloop.c ssh.c]
     ignore SIGPIPE early, makes ssh work if agent dies, netbsd-pr via itojun@@
   - markus@@cvs.openbsd.org 2001/10/24 19:57:40
     [clientloop.c]
     make ~& (backgrounding) work again for proto v1; add support ~& for v2, too
   - markus@@cvs.openbsd.org 2001/10/25 21:14:32
     [ssh-keygen.1 ssh-keygen.c]
     better docu for fingerprinting, ok deraadt@@
   - markus@@cvs.openbsd.org 2001/10/29 19:27:15
     [sshconnect2.c]
     hostbased: check for client hostkey before building chost
   - markus@@cvs.openbsd.org 2001/11/07 16:03:17
     [packet.c packet.h sshconnect2.c]
     pad using the padding field from the ssh2 packet instead of sending
     extra ignore messages. tested against several other ssh servers.
   - markus@@cvs.openbsd.org 2001/11/07 21:40:21
     [ssh-rsa.c]
     ssh_rsa_sign/verify: SSH_BUG_SIGBLOB not supported
   - markus@@cvs.openbsd.org 2001/11/07 22:10:28
     [ssh-dss.c ssh-rsa.c]
     missing free and sync dss/rsa code.
   - markus@@cvs.openbsd.org 2001/11/07 22:53:21
     [channels.h]
     crank c->path to 256 so they can hold a full hostname; dwd@@bell-labs.com
   - markus@@cvs.openbsd.org 2001/11/08 10:51:08
     [readpass.c]
     don't strdup too much data; from gotoh@@taiyo.co.jp; ok millert.
   - markus@@cvs.openbsd.org 2001/11/10 13:22:42
     [ssh-rsa.c]
     KNF (unexpand)
   - markus@@cvs.openbsd.org 2001/11/11 13:02:31
     [servconf.c]
     make AuthorizedKeysFile2 fallback to AuthorizedKeysFile if
     AuthorizedKeysFile is specified.

20011109
 - (stevesk) auth-pam.c: use do_pam_authenticate(PAM_DISALLOW_NULL_AUTHTOK)
   if permit_empty_passwd == 0 so null password check cannot be bypassed.
   jayaraj@@amritapuri.com OpenBSD bug 2168
@
text
@d16 1
a16 1
MAINTAINER= dwcjr@@FreeBSD.org
@


1.10
log
@Update to OpenSSH 3.0 and OpenSSH-portable 3.0p1
Extracted from Changelog (not complete):

20011012
   - markus@@cvs.openbsd.org 2001/10/10 22:18:47
     [channels.c channels.h clientloop.c nchan.c serverloop.c]
     [session.c session.h]
     try to keep channels open until an exit-status message is sent.
     don't kill the login shells if the shells stdin/out/err is closed.
     this should now work:
     ssh -2n localhost 'exec > /dev/null 2>&1; sleep 10; exit 5'; echo ?
   - markus@@cvs.openbsd.org 2001/10/11 13:45:21
     [session.c]
     delay detach of session if a channel gets closed but the child is
     still alive.  however, release pty, since the fd's to the child are
     already closed.
   - markus@@cvs.openbsd.org 2001/10/11 15:24:00
     [clientloop.c]
     clear select masks if we return before calling select().

20011010
   - markus@@cvs.openbsd.org 2001/10/04 14:34:16
     [key.c]
     call OPENSSL_free() for memory allocated by openssl; from chombier@@mac.com
   - markus@@cvs.openbsd.org 2001/10/04 15:05:40
     [channels.c serverloop.c]
     comment out bogus conditions for selecting on connection_in
   - markus@@cvs.openbsd.org 2001/10/04 15:12:37
     [serverloop.c]
     client_alive_check cleanup
   - markus@@cvs.openbsd.org 2001/10/06 00:14:50
     [sshconnect.c]
     remove unused argument
   - markus@@cvs.openbsd.org 2001/10/06 00:36:42
     [session.c]
     fix typo in error message, sync with do_exec_nopty
   - markus@@cvs.openbsd.org 2001/10/06 11:18:19
     [sshconnect1.c sshconnect2.c sshconnect.c]
     unify hostkey check error messages, simplify prompt.
   - markus@@cvs.openbsd.org 2001/10/07 10:29:52
     [authfile.c]
     grammer; Matthew_Clarke@@mindlink.bc.ca
   - markus@@cvs.openbsd.org 2001/10/07 17:49:40
     [channels.c channels.h]
     avoid possible FD_ISSET overflow for channels established
     during channnel_after_select() (used for dynamic channels).
   - markus@@cvs.openbsd.org 2001/10/08 11:48:57
     [channels.c]
     better debug
   - markus@@cvs.openbsd.org 2001/10/08 16:15:47
     [sshconnect.c]
     use correct family for -b option
   - markus@@cvs.openbsd.org 2001/10/08 19:05:05
     [ssh.c sshconnect.c sshconnect.h ssh-keyscan.c]
     some more IPv4or6 cleanup
   - markus@@cvs.openbsd.org 2001/10/09 10:12:08
     [session.c]
     chdir $HOME after krb_afslog(); from bbense@@networking.stanford.edu
   - markus@@cvs.openbsd.org 2001/10/09 19:32:49
     [session.c]
     stat subsystem command before calling do_exec, and return error to client.
   - markus@@cvs.openbsd.org 2001/10/09 19:51:18
     [serverloop.c]
     close all channels if the connection to the remote host has been closed,
     should fix sshd's hanging with WCHAN==wait
   - markus@@cvs.openbsd.org 2001/10/09 21:59:41
     [channels.c channels.h serverloop.c session.c session.h]
     simplify session close: no more delayed session_close, no more
     blocking wait() calls.
 - (bal) seed_init() and seed_rng() required in ssh-keyscan.c

20011003
   - markus@@cvs.openbsd.org 2001/09/27 11:58:16
     [compress.c]
     mem leak; chombier@@mac.com
   - markus@@cvs.openbsd.org 2001/09/27 11:59:37
     [packet.c]
     missing called=1; chombier@@mac.com
   - markus@@cvs.openbsd.org 2001/09/27 15:31:17
     [auth2.c auth2-chall.c sshconnect1.c]
     typos; from solar
   - camield@@cvs.openbsd.org 2001/09/27 17:53:24
     [sshd.8]
     don't talk about compile-time options
     ok markus@@
   - djm@@cvs.openbsd.org 2001/09/28 12:07:09
     [ssh-keygen.c]
     bzero private key after loading to smartcard; ok markus@@
   - markus@@cvs.openbsd.org 2001/09/28 15:46:29
     [ssh.c]
     bug: read user config first; report kaukasoi@@elektroni.ee.tut.fi
   - markus@@cvs.openbsd.org 2001/10/01 08:06:28
     [scp.c]
     skip filenames containing \n; report jdamery@@chiark.greenend.org.uk
     and matthew@@debian.org
   - markus@@cvs.openbsd.org 2001/10/01 21:38:53
     [channels.c channels.h ssh.c sshd.c]
     remove ugliness; vp@@drexel.edu via angelos
   - markus@@cvs.openbsd.org 2001/10/01 21:51:16
     [readconf.c readconf.h ssh.1 sshconnect.c]
     add NoHostAuthenticationForLocalhost; note that the hostkey is
     now check for localhost, too.
   - djm@@cvs.openbsd.org 2001/10/02 08:38:50
     [ssh-add.c]
     return non-zero exit code on error; ok markus@@
   - stevesk@@cvs.openbsd.org 2001/10/02 22:56:09
     [sshd.c]
     #include "channels.h" for channel_set_af()
   - markus@@cvs.openbsd.org 2001/10/03 10:01:20
     [auth.c]
     use realpath() for homedir, too. from jinmei@@isl.rdc.toshiba.co.jp

20011001
 - (stevesk) loginrec.c: fix type conversion problems exposed when using
   64-bit off_t.

20010928
   - djm@@cvs.openbsd.org 2001/09/28 09:49:31
     [scard.c]
     Fix segv when smartcard communication error occurs during key load.
     ok markus@@
 - (djm) Update spec files for new x11-askpass

20010927
 - (stevesk) session.c: declare do_pre_login() before use
   wayned@@users.sourceforge.net

20010925
 - (djm) Pull in auth-krb5.c from OpenBSD CVS. NB. it is not currently used.
 - (djm) Sync $sysconfdir/moduli
 - (djm) Avoid bad and unportable sprintf usage in compat code
@
text
@d9 1
a9 1
PORTVERSION=	3.0p1
@


1.9
log
@- included an patch that solves a coredump in sshd
- Bumped PORTREVISION

Submitted by:	ryanb@@goddamnbastard.org
@
text
@d9 1
a9 2
PORTVERSION=	2.9.9p2
PORTREVISION=	1
@


1.8
log
@- Update to OpenSSH 2.9.9p2
- security-patch for cookie files obsolete
- MD5 password support activated

Approved by:	dwcjr@@FreeBSD.org
@
text
@d5 1
a5 1
# $FreeBSD: ports/security/openssh-portable/Makefile,v 1.7 2001/08/19 17:22:37 dinoex Exp $
d10 1
@


1.7
log
@- Update to p2:
- stripped down some patches

20010617
 - (djm) Pull in small fix from -CURRENT for session.c:
    typo, use pid not s->pid, mstone@@cs.loyola.edu

20010615
 - (stevesk) don't set SA_RESTART and set SIGCHLD to SIG_DFL
   around grantpt().

20010614
 - (bal) Applied X11 Cookie Patch.  X11 Cookie behavior has changed to
   no longer use /tmp/ssh-XXXXX/

20010528
 - (tim) [conifgure.in] add setvbuf test needed for sftp-int.c
   Patch by Corinna Vinschen <vinschen@@redhat.com>

Approved by:	dwcjr@@freebsd.org
@
text
@d5 1
a5 1
# $FreeBSD: ports/security/openssh-portable/Makefile,v 1.6 2001/08/19 15:46:02 dinoex Exp $
d9 1
a9 1
PORTVERSION=	2.9p2
d25 1
a25 1
CONFIGURE_ARGS?=	--prefix=${PREFIX}
@


1.6
log
@Fix package building, slogin and its manpage is an link
@
text
@d5 1
a5 1
# $FreeBSD: ports/security/openssh-portable/Makefile,v 1.5 2001/08/01 10:56:24 dinoex Exp $
d9 1
a9 2
PORTVERSION=	2.9p1
PORTREVISION=	3
@


1.5
log
@- slogin and manpage added to package, bumped PORTREVISION
@
text
@d5 1
a5 1
# $FreeBSD: ports/security/openssh-portable/Makefile,v 1.4 2001/06/10 20:08:31 dwcjr Exp $
d19 2
a20 1
MAN1=	sftp.1 ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 scp.1 ssh.1 slogin.1
@


1.4
log
@Fix FreeBSD specific patch, exit now if change of password fails.

Submitted by:	Udo.Schweigert@@cert.siemens.de
Reviewed by:	dinoex,will
@
text
@d5 1
a5 1
# $FreeBSD: ports/security/openssh-portable/Makefile,v 1.3 2001/06/09 08:22:15 dinoex Exp $
d10 1
a10 1
PORTREVISION=	2
d19 1
a19 1
MAN1=	sftp.1 ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 scp.1 ssh.1
@


1.3
log
@- Switch to the user's uid before attempting to unlink the auth forwarding
  file, nullifying the effects of a race.
- Bump PORTREVISION

Submitted by:	green@@FreeBSD.org
Approved by:	dwcjr@@inethouston.net
@
text
@d5 1
a5 1
# $FreeBSD: ports/security/openssh-portable/Makefile,v 1.2 2001/06/08 19:17:55 dwcjr Exp $
d10 1
a10 1
PORTREVISION=	1
@


1.2
log
@Update maintainer email

Reviewed by:	will
@
text
@d5 1
a5 1
# $FreeBSD: ports/security/openssh-portable/Makefile,v 1.1 2001/06/01 14:49:32 dinoex Exp $
d10 1
@


1.1
log
@New port:
OpenSSH portable, which has GNU-configure and more.
Diffs to OpenSSH-OPenBSD are huge.
So this is here a complete diffrent branch, no repro-copy
- Did a bit cleanup in the Makefile

Submitted by:	dwcjr@@inethouston.net
@
text
@d5 1
a5 1
# $FreeBSD: $
d16 1
a16 1
MAINTAINER= dwcjr@@inethouston.net
@

