Simon Tatham
|
a36dd9c01c
Couple of additional fixes for the more embarrassing bugs.
|
20 éve |
Simon Tatham
|
f12be80774
Yet more trunk merges. Jacob's SSH signals stuff, some docs changes,
|
20 éve |
Simon Tatham
|
5db33359a2
Further merges from trunk: Jacob's specials menu work, Jacob's extra
|
20 éve |
Simon Tatham
|
a56a15df92
I've started an 0.56 release branch from just before my recent
|
20 éve |
Jacob Nevins
|
e375ba107d
`ssh-log-pw-blank': known password fields are now omitted from SSH packet logs
|
20 éve |
Jacob Nevins
|
fb92f118bd
Mention the negotiated SSH-2 MAC algorithm(s) in the Event Log.
|
20 éve |
Simon Tatham
|
05696aabfd
Report details in Event Log when receiving SSH2_MSG_CHANNEL_OPEN_FAILURE.
|
20 éve |
Jacob Nevins
|
57c34f0872
Add `OSU_1.5alpha4' to BUG_CHOKES_ON_SSH1_IGNORE; this is apparently enough to
|
20 éve |
Jacob Nevins
|
27193c4bf0
Improved diagnostics in port-forwarding: we now log any error returned by
|
20 éve |
Jacob Nevins
|
47997ad904
In SSH-2, list each compression algorithm only once. (No particular reason
|
20 éve |
Simon Tatham
|
e2cd7e404e
More sensible error handling when we receive an SSH1 public key
|
20 éve |
Jacob Nevins
|
1af5523edc
Someone complained that their keyboard-interactive password prompt was being
|
20 éve |
Simon Tatham
|
f16d8aff82
ssh_free() should not call log_free(); it's for the front end to
|
20 éve |
Jacob Nevins
|
f17522be6c
Extra logging in SSH-2 port-forwarding. Most obviously, the opening of a
|
20 éve |
Jacob Nevins
|
11f628b075
When using remote forwarding with SSH-1, you'd get bogus 'SSH1 cannot
|
20 éve |
Simon Tatham
|
4217269931
Merged SSH1 robustness changes from 0.55 release branch on to trunk.
|
20 éve |
Jacob Nevins
|
20f433efac
Add a configuration option for TCP keepalives (SO_KEEPALIVE), default off.
|
20 éve |
Simon Tatham
|
78dbf5df0e
`Authenticating with key' message when using a local key file in
|
20 éve |
Jacob Nevins
|
14d9628130
Spotted by Dimitry Andric: `ssh-termspeed' implementation was not taking
|
20 éve |
Jacob Nevins
|
3867e5956e
In SSH, we now send terminal speeds to the server when requesting a pty
|
20 éve |
Simon Tatham
|
a326264500
Two small memory leaks, also noticed by Martin Prikryl.
|
21 éve |
Simon Tatham
|
b424ea234f
Martin Prikryl points out that need_pw may be used uninitialised.
|
21 éve |
Simon Tatham
|
33a59e78f1
Memory management fixes. Fixed a segfault in SSH1 compression
|
21 éve |
Simon Tatham
|
c53056f95c
Joe Yates's memory leak patch was overenthusiastically freeing
|
21 éve |
Simon Tatham
|
7a1eae7ff2
Joe Yates's memory leak patches.
|
21 éve |
Simon Tatham
|
f9f6763a0e
Trivial braino in parsing of the port forwarding config data. Was
|
21 éve |
Jacob Nevins
|
eebc7529ed
Work towards wish `keyfile-diagnostic'. Many sshpubk.c keyfile-loading
|
21 éve |
Jacob Nevins
|
92db92af5a
Control of 'addr' is now handed over to {platform_,}new_connection() and
|
21 éve |
Jacob Nevins
|
d534d4e104
Add SSH-1 password camouflage bug detection for version OSU_1.4alpha3 of the
|
21 éve |
Simon Tatham
|
d02ea52abc
Fix a segfault (non-security-critical - null dereference for
|
21 éve |