comparison CHANGES @ 910:89555751c489 asm

merge up to 2013.63, improve ASM makefile rules a bit
author Matt Johnston <matt@ucc.asn.au>
date Thu, 27 Feb 2014 21:35:58 +0800
parents f98618496f82
children 8664fea5072f
comparison
equal deleted inserted replaced
909:e4b75744acab 910:89555751c489
1 2014.63 - Wednesday 19 February 2014
2
3 - Fix ~. to terminate a client interactive session after waking a laptop
4 from sleep.
5
6 - Changed port separator syntax again, now using host^port. This is because
7 IPv6 link-local addresses use %. Reported by Gui Iribarren
8
9 - Avoid constantly relinking dropbearmulti target, fix "make install"
10 for multi target, thanks to Mike Frysinger
11
12 - Avoid getting stuck in a loop writing huge key files, reported by Bruno
13 Thomsen
14
15 - Don't link dropbearkey or dropbearconvert to libz or libutil,
16 thanks to Nicolas Boos
17
18 - Fix linking -lcrypt on systems without /usr/lib, thanks to Nicolas Boos
19
20 - Avoid crash on exit due to cleaned up keys before last packets are sent,
21 debugged by Ronald Wahl
22
23 - Fix a race condition in rekeying where Dropbear would exit if it received a
24 still-in-flight packet after initiating rekeying. Reported by Oliver Metz.
25 This is a longstanding bug but is triggered more easily since 2013.57
26
27 - Fix README for ecdsa keys, from Catalin Patulea
28
29 - Ensure that generated RSA keys are always exactly the length
30 requested. Previously Dropbear always generated N+16 or N+15 bit keys.
31 Thanks to Unit 193
32
33 - Fix DROPBEAR_CLI_IMMEDIATE_AUTH mode which saves a network round trip if the
34 first public key succeeds. Still not enabled by default, needs more
35 compatibility testing with other implementations.
36
37 - Fix for port 0 forwarding in the client and port forwarding with Apache MINA SSHD. Thanks to
38
39 - Fix for bad system linux/pkt-sched.h header file with older Linux
40 kernels, from Steve Dover
41
42 - Fix signal handlers so that errno is saved, thanks to Erik Ahlén for a patch
43 and Mark Wickham for independently spotting the same problem.
44
45 2013.62 - Tuesday 3 December 2013
46
47 - Disable "interactive" QoS connection options when a connection doesn't
48 have a PTY (eg scp, rsync). Thanks to Catalin Patulea for the patch.
49
50 - Log when a hostkey is generated with -R, fix some bugs in handling server
51 hostkey commandline options
52
53 - Fix crash in Dropbearconvert and 521 bit key, reported by NiLuJe
54
55 - Update config.guess and config.sub again
56
57 2013.61test - Thursday 14 November 2013
58
59 - ECC (elliptic curve) support. Supports ECDSA hostkeys (requires new keys to
60 be generated) and ECDH for setting up encryption keys (no intervention
61 required). This is significantly faster.
62
63 - [email protected] support for setting up encryption keys. This is
64 another elliptic curve mode with less potential of NSA interference in
65 algorithm parameters. curve25519-donna code thanks to Adam Langley
66
67 - -R option to automatically generate hostkeys. This is recommended for
68 embedded platforms since it allows the system random number device
69 /dev/urandom a longer startup time to generate a secure seed before the
70 hostkey is required.
71
72 - Compile fixes for old vendor compilers like Tru64 from Daniel Richard G.
73
74 - Make authorized_keys handling more robust, don't exit encountering
75 malformed lines. Thanks to Lorin Hochstein and Mark Stillwell
76
77 2013.60 - Wednesday 16 October 2013
78
79 - Fix "make install" so that it doesn't always install to /bin and /sbin
80
81 - Fix "make install MULTI=1", installing manpages failed
82
83 - Fix "make install" when scp is included since it has no manpage
84
85 - Make --disable-bundled-libtom work
86
1 2013.59 - Friday 4 October 2013 87 2013.59 - Friday 4 October 2013
2 88
3 - Fix crash from -J command 89 - Fix crash from -J command
4 Thanks to Lluís Batlle i Rossell and Arnaud Mouiche for patches 90 Thanks to Lluís Batlle i Rossell and Arnaud Mouiche for patches
5 91
12 - Send a banner message to report PAM error messages intended for the user 98 - Send a banner message to report PAM error messages intended for the user
13 Patch from Martin Donnelly 99 Patch from Martin Donnelly
14 100
15 - Limit the size of decompressed payloads, avoids memory exhaustion denial 101 - Limit the size of decompressed payloads, avoids memory exhaustion denial
16 of service 102 of service
17 Thanks to Logan Lamb for reporting and investigating it 103 Thanks to Logan Lamb for reporting and investigating it. CVE-2013-4421
18 104
19 - Avoid disclosing existence of valid users through inconsistent delays 105 - Avoid disclosing existence of valid users through inconsistent delays
20 Thanks to Logan Lamb for reporting 106 Thanks to Logan Lamb for reporting. CVE-2013-4434
21 107
22 - Update config.guess and config.sub for newer architectures 108 - Update config.guess and config.sub for newer architectures
23 109
24 - Avoid segfault in server for locked accounts 110 - Avoid segfault in server for locked accounts
25 111
316 402
317 0.49 - Fri 23 February 2007 403 0.49 - Fri 23 February 2007
318 404
319 - Security: dbclient previously would prompt to confirm a 405 - Security: dbclient previously would prompt to confirm a
320 mismatching hostkey but wouldn't warn loudly. It will now 406 mismatching hostkey but wouldn't warn loudly. It will now
321 exit upon a mismatch. 407 exit upon a mismatch. CVE-2007-1099
322 408
323 - Compile fixes, make sure that all variable definitions are at the start 409 - Compile fixes, make sure that all variable definitions are at the start
324 of a scope. 410 of a scope.
325 411
326 - Added -P pidfile argument to the server (from Swen Schillig) 412 - Added -P pidfile argument to the server (from Swen Schillig)
378 - Check that the circular buffer is properly empty before 464 - Check that the circular buffer is properly empty before
379 closing a channel, which could cause truncated transfers 465 closing a channel, which could cause truncated transfers
380 (thanks to Tomas Vanek for helping track it down) 466 (thanks to Tomas Vanek for helping track it down)
381 467
382 - Implement per-IP pre-authentication connection limits 468 - Implement per-IP pre-authentication connection limits
383 (after some poking from Pablo Fernandez) 469 (after some poking from Pablo Fernandez) CVE-2006-1206
384 470
385 - Exit gracefully if trying to connect to as SSH v1 server 471 - Exit gracefully if trying to connect to as SSH v1 server
386 (reported by Rushi Lala) 472 (reported by Rushi Lala)
387 473
388 - Only read /dev/random once at startup when in non-inetd mode 474 - Only read /dev/random once at startup when in non-inetd mode
399 0.47 - Thurs Dec 8 2005 485 0.47 - Thurs Dec 8 2005
400 486
401 - SECURITY: fix for buffer allocation error in server code, could potentially 487 - SECURITY: fix for buffer allocation error in server code, could potentially
402 allow authenticated users to gain elevated privileges. All multi-user systems 488 allow authenticated users to gain elevated privileges. All multi-user systems
403 running the server should upgrade (or apply the patch available on the 489 running the server should upgrade (or apply the patch available on the
404 Dropbear webpage). 490 Dropbear webpage). CVE-2005-4178
405 491
406 - Fix channel handling code so that redirecting to /dev/null doesn't use 492 - Fix channel handling code so that redirecting to /dev/null doesn't use
407 100% CPU. 493 100% CPU.
408 494
409 - Turn on zlib compression for dbclient. 495 - Turn on zlib compression for dbclient.
606 0.43 - Fri Jul 16 2004 17:44:54 +0800 692 0.43 - Fri Jul 16 2004 17:44:54 +0800
607 693
608 - SECURITY: Don't try to free() uninitialised variables in DSS verification 694 - SECURITY: Don't try to free() uninitialised variables in DSS verification
609 code. Thanks to Arne Bernin for pointing out this bug. This is possibly 695 code. Thanks to Arne Bernin for pointing out this bug. This is possibly
610 exploitable, all users with DSS and pubkey-auth compiled in are advised to 696 exploitable, all users with DSS and pubkey-auth compiled in are advised to
611 upgrade. 697 upgrade. CVE-2004-2486
612 698
613 - Clean up agent forwarding socket files correctly, patch from Gerrit Pape. 699 - Clean up agent forwarding socket files correctly, patch from Gerrit Pape.
614 700
615 - Don't go into an infinite loop when portforwarding to servers which don't 701 - Don't go into an infinite loop when portforwarding to servers which don't
616 send any initial data/banner. Patch from Nikola Vladov 702 send any initial data/banner. Patch from Nikola Vladov