OpenPKG CVS Repository http://cvs.openpkg.org/ ____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 31-Mar-2008 09:00:52 Branch: HEAD Handle: 2008033108005000 Modified files: openpkg-src/openssh openssh.patch openssh.patch.alias openssh.patch.chroot openssh.patch.scpbindir openssh.patch.sftplogging openssh.spec Log: upgrading package: openssh 4.7p1 -> 4.9p1 Summary: Revision Changes Path 1.22 +6 -6 openpkg-src/openssh/openssh.patch 1.12 +22 -22 openpkg-src/openssh/openssh.patch.alias 1.12 +20 -21 openpkg-src/openssh/openssh.patch.chroot 1.15 +4 -4 openpkg-src/openssh/openssh.patch.scpbindir 1.13 +61 -62 openpkg-src/openssh/openssh.patch.sftplogging 1.207 +2 -2 openpkg-src/openssh/openssh.spec ____________________________________________________________________________ patch -p0 <<'@@ .' Index: openpkg-src/openssh/openssh.patch ============================================================================ $ cvs diff -u -r1.21 -r1.22 openssh.patch --- openpkg-src/openssh/openssh.patch 5 Sep 2007 06:48:39 -0000 1.21 +++ openpkg-src/openssh/openssh.patch 31 Mar 2008 07:00:50 -0000 1.22 @@ -1,6 +1,6 @@ Index: Makefile.in ---- Makefile.in.orig 2007-06-11 06:01:42 +0200 -+++ Makefile.in 2007-09-05 08:39:34 +0200 +--- Makefile.in.orig 2008-03-13 02:41:31 +0100 ++++ Makefile.in 2008-03-31 08:36:38 +0200 @@ -231,7 +231,7 @@ -rm -rf autom4te.cache (cd scard && $(MAKE) -f Makefile.in distprep) @@ -12,7 +12,7 @@ Index: auth-pam.h --- auth-pam.h.orig 2004-09-11 14:17:26 +0200 -+++ auth-pam.h 2007-09-05 08:39:34 +0200 ++++ auth-pam.h 2008-03-31 08:36:38 +0200 @@ -28,7 +28,7 @@ #ifdef USE_PAM @@ -23,10 +23,10 @@ void start_pam(Authctxt *); Index: version.h ---- version.h.orig 2007-08-15 11:14:52 +0200 -+++ version.h 2007-09-05 08:39:34 +0200 +--- version.h.orig 2008-03-27 01:18:13 +0100 ++++ version.h 2008-03-31 08:36:38 +0200 @@ -3,4 +3,4 @@ - #define SSH_VERSION "OpenSSH_4.7" + #define SSH_VERSION "OpenSSH_4.9" #define SSH_PORTABLE "p1" -#define SSH_RELEASE SSH_VERSION SSH_PORTABLE @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssh/openssh.patch.alias ============================================================================ $ cvs diff -u -r1.11 -r1.12 openssh.patch.alias --- openpkg-src/openssh/openssh.patch.alias 5 Sep 2007 06:48:40 -0000 1.11 +++ openpkg-src/openssh/openssh.patch.alias 31 Mar 2008 07:00:50 -0000 1.12 @@ -1,6 +1,6 @@ Index: auth1.c ---- auth1.c.orig 2006-09-01 07:38:36 +0200 -+++ auth1.c 2007-09-05 08:40:36 +0200 +--- auth1.c.orig 2007-10-26 06:25:13 +0200 ++++ auth1.c 2008-03-31 08:34:25 +0200 @@ -39,6 +39,9 @@ #endif #include "monitor_wrap.h" @@ -49,8 +49,8 @@ authctxt->style = style; Index: auth2.c ---- auth2.c.orig 2007-05-20 06:58:41 +0200 -+++ auth2.c 2007-09-05 08:40:36 +0200 +--- auth2.c.orig 2007-10-26 06:26:16 +0200 ++++ auth2.c 2008-03-31 08:34:25 +0200 @@ -44,6 +44,9 @@ #include "dispatch.h" #include "pathnames.h" @@ -61,7 +61,7 @@ #ifdef GSSAPI #include "ssh-gss.h" -@@ -143,6 +146,10 @@ +@@ -142,6 +145,10 @@ Authmethod *m = NULL; char *user, *service, *method, *style = NULL; int authenticated = 0; @@ -72,7 +72,7 @@ if (authctxt == NULL) fatal("input_userauth_request: no authctxt"); -@@ -156,6 +163,25 @@ +@@ -155,6 +162,25 @@ if ((style = strchr(user, ':')) != NULL) *style++ = 0; @@ -99,21 +99,21 @@ /* setup auth context */ authctxt->pw = PRIVSEP(getpwnamallow(user)); Index: servconf.c ---- servconf.c.orig 2007-05-20 07:03:16 +0200 -+++ servconf.c 2007-09-05 08:40:36 +0200 -@@ -122,6 +122,9 @@ - options->permit_tun = -1; +--- servconf.c.orig 2008-02-10 12:48:55 +0100 ++++ servconf.c 2008-03-31 08:35:14 +0200 +@@ -123,6 +123,9 @@ options->num_permitted_opens = -1; options->adm_forced_command = NULL; + options->chroot_directory = NULL; +#ifdef USE_ALIAS + options->num_alias = 0; +#endif } void -@@ -293,6 +296,9 @@ +@@ -294,6 +297,9 @@ sGssAuthentication, sGssCleanupCreds, sAcceptEnv, sPermitTunnel, - sMatch, sPermitOpen, sForceCommand, + sMatch, sPermitOpen, sForceCommand, sChrootDirectory, sUsePrivilegeSeparation, +#ifdef USE_ALIAS + sAlias, @@ -121,17 +121,17 @@ sDeprecated, sUnsupported } ServerOpCodes; -@@ -403,6 +409,9 @@ - { "match", sMatch, SSHCFG_ALL }, +@@ -405,6 +411,9 @@ { "permitopen", sPermitOpen, SSHCFG_ALL }, { "forcecommand", sForceCommand, SSHCFG_ALL }, + { "chrootdirectory", sChrootDirectory, SSHCFG_ALL }, +#ifdef USE_ALIAS + { "alias", sAlias }, +#endif { NULL, sBadOption, 0 } }; -@@ -1260,6 +1269,26 @@ +@@ -1276,6 +1285,26 @@ arg = strdelim(&cp); break; @@ -159,12 +159,12 @@ logit("%s line %d: Unsupported option %s", filename, linenum, arg); Index: servconf.h ---- servconf.h.orig 2007-02-19 12:25:38 +0100 -+++ servconf.h 2007-09-05 08:40:36 +0200 -@@ -141,6 +141,14 @@ - int permit_tun; - +--- servconf.h.orig 2008-03-07 08:31:24 +0100 ++++ servconf.h 2008-03-31 08:34:49 +0200 +@@ -146,6 +146,14 @@ int num_permitted_opens; + + char *chroot_directory; +#ifdef USE_ALIAS +#define MAX_ALIAS 256 + u_int num_alias; @@ -177,8 +177,8 @@ void initialize_server_options(ServerOptions *); Index: sshd_config.5 ---- sshd_config.5.orig 2007-06-11 06:07:13 +0200 -+++ sshd_config.5 2007-09-05 08:40:36 +0200 +--- sshd_config.5.orig 2008-03-27 01:02:02 +0100 ++++ sshd_config.5 2008-03-31 08:34:25 +0200 @@ -95,6 +95,15 @@ (use IPv6 only). The default is @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssh/openssh.patch.chroot ============================================================================ $ cvs diff -u -r1.11 -r1.12 openssh.patch.chroot --- openpkg-src/openssh/openssh.patch.chroot 5 Sep 2007 06:48:40 -0000 1.11 +++ openpkg-src/openssh/openssh.patch.chroot 31 Mar 2008 07:00:50 -0000 1.12 @@ -1,7 +1,7 @@ Index: scp.c ---- scp.c.orig 2007-08-08 06:29:58 +0200 -+++ scp.c 2007-09-05 08:41:00 +0200 -@@ -131,6 +131,11 @@ +--- scp.c.orig 2008-03-14 01:59:50 +0100 ++++ scp.c 2008-03-31 08:37:01 +0200 +@@ -140,6 +140,11 @@ /* This is the program to execute for the secured connection. ("ssh" or -S) */ char *ssh_program = _PATH_SSH_PROGRAM; @@ -13,7 +13,7 @@ /* This is used to store the pid of ssh_program */ pid_t do_cmd_pid = -1; -@@ -313,7 +318,11 @@ +@@ -323,7 +328,11 @@ addargs(&args, "-oClearAllForwardings yes"); fflag = tflag = 0; @@ -25,7 +25,7 @@ switch (ch) { /* User-visible flags. */ case '1': -@@ -374,6 +383,11 @@ +@@ -384,6 +393,11 @@ setmode(0, O_BINARY); #endif break; @@ -37,7 +37,7 @@ default: usage(); } -@@ -389,6 +403,19 @@ +@@ -399,6 +413,19 @@ remin = STDIN_FILENO; remout = STDOUT_FILENO; @@ -58,12 +58,12 @@ /* Follow "protocol", send data. */ (void) response(); Index: session.c ---- session.c.orig 2007-08-16 15:28:04 +0200 -+++ session.c 2007-09-05 08:41:00 +0200 -@@ -1337,6 +1337,26 @@ - exit(1); +--- session.c.orig 2008-03-27 01:03:05 +0100 ++++ session.c 2008-03-31 08:39:07 +0200 +@@ -1426,6 +1426,25 @@ + free(tmp); + free(chroot_path); } - endgrent(); +# ifdef USE_CHROOT + { + char *user_dir; @@ -75,8 +75,7 @@ + if (strncmp(new_root, "/./", 3) == 0) { + *new_root = '\0'; + new_root += 2; -+ if (chroot(user_dir) == -1) -+ fatal("Couldn't chroot to user directory \"%s\"", user_dir); ++ safe_chroot(user_dir, pw->pw_uid); + pw->pw_dir = new_root; + break; + } @@ -84,15 +83,15 @@ + } + } +# endif /* USE_CHROOT */ - #ifdef GSSAPI - if (options.gss_authentication) { - temporarily_use_uid(pw); -Index: sftp-server.c ---- sftp-server.c.orig 2007-05-20 07:09:05 +0200 -+++ sftp-server.c 2007-09-05 08:41:00 +0200 -@@ -1273,6 +1273,38 @@ - handle_init(); + #ifdef HAVE_LOGIN_CAP + if (setusercontext(lc, pw, pw->pw_uid, LOGIN_SETUSER) < 0) { +Index: sftp-server.c +--- sftp-server.c.orig 2008-03-07 08:33:53 +0100 ++++ sftp-server.c 2008-03-31 08:37:01 +0200 +@@ -1302,6 +1302,38 @@ + logit("session opened for local user %s from [%s]", + pw->pw_name, client_addr); +#ifdef USE_CHROOT +{ @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssh/openssh.patch.scpbindir ============================================================================ $ cvs diff -u -r1.14 -r1.15 openssh.patch.scpbindir --- openpkg-src/openssh/openssh.patch.scpbindir 5 Sep 2007 06:48:40 -0000 1.14 +++ openpkg-src/openssh/openssh.patch.scpbindir 31 Mar 2008 07:00:50 -0000 1.15 @@ -1,7 +1,7 @@ Index: session.c ---- session.c.orig 2007-08-16 15:28:04 +0200 -+++ session.c 2007-09-05 08:41:17 +0200 -@@ -92,6 +92,10 @@ +--- session.c.orig 2008-03-27 01:03:05 +0100 ++++ session.c 2008-03-31 08:56:59 +0200 +@@ -94,6 +94,10 @@ #include <kafs.h> #endif @@ -12,7 +12,7 @@ /* func */ Session *session_new(void); -@@ -680,6 +684,21 @@ +@@ -673,6 +677,21 @@ void do_exec(Session *s, const char *command) { @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssh/openssh.patch.sftplogging ============================================================================ $ cvs diff -u -r1.12 -r1.13 openssh.patch.sftplogging --- openpkg-src/openssh/openssh.patch.sftplogging 5 Sep 2007 06:48:40 -0000 1.12 +++ openpkg-src/openssh/openssh.patch.sftplogging 31 Mar 2008 07:00:50 -0000 1.13 @@ -1,20 +1,20 @@ Index: servconf.c ---- servconf.c.orig 2007-05-20 07:03:16 +0200 -+++ servconf.c 2007-09-05 08:41:42 +0200 -@@ -122,6 +122,12 @@ - options->permit_tun = -1; +--- servconf.c.orig 2008-02-10 12:48:55 +0100 ++++ servconf.c 2008-03-31 08:58:32 +0200 +@@ -123,6 +123,12 @@ options->num_permitted_opens = -1; options->adm_forced_command = NULL; -+ options->log_sftp = LOG_SFTP_NOT_SET; -+ options->sftp_log_facility = SYSLOG_FACILITY_NOT_SET; -+ options->sftp_log_level = SYSLOG_LEVEL_NOT_SET; -+ memset(options->sftp_umask, 0, SFTP_UMASK_LENGTH); -+ options->sftp_permit_chmod = SFTP_PERMIT_NOT_SET; -+ options->sftp_permit_chown = SFTP_PERMIT_NOT_SET; + options->chroot_directory = NULL; ++ options->log_sftp = LOG_SFTP_NOT_SET; ++ options->sftp_log_facility = SYSLOG_FACILITY_NOT_SET; ++ options->sftp_log_level = SYSLOG_LEVEL_NOT_SET; ++ memset(options->sftp_umask, 0, SFTP_UMASK_LENGTH); ++ options->sftp_permit_chmod = SFTP_PERMIT_NOT_SET; ++ options->sftp_permit_chown = SFTP_PERMIT_NOT_SET; } void -@@ -250,6 +256,24 @@ +@@ -251,6 +257,24 @@ if (options->permit_tun == -1) options->permit_tun = SSH_TUNMODE_NO; @@ -39,9 +39,9 @@ /* Turn privilege separation on by default */ if (use_privsep == -1) use_privsep = 1; -@@ -293,6 +317,9 @@ +@@ -294,6 +318,9 @@ sGssAuthentication, sGssCleanupCreds, sAcceptEnv, sPermitTunnel, - sMatch, sPermitOpen, sForceCommand, + sMatch, sPermitOpen, sForceCommand, sChrootDirectory, sUsePrivilegeSeparation, + sLogSftp, sSftpLogFacility, sSftpLogLevel, + sSftpUmask, @@ -49,7 +49,7 @@ sDeprecated, sUnsupported } ServerOpCodes; -@@ -307,6 +334,12 @@ +@@ -308,6 +335,12 @@ u_int flags; } keywords[] = { /* Portable-specific options */ @@ -62,7 +62,7 @@ #ifdef USE_PAM { "usepam", sUsePAM, SSHCFG_GLOBAL }, #else -@@ -625,6 +658,8 @@ +@@ -629,6 +662,8 @@ u_short port; u_int i, flags = 0; size_t len; @@ -71,11 +71,10 @@ cp = line; if ((arg = strdelim(&cp)) == NULL) -@@ -1145,6 +1180,58 @@ - case sBanner: +@@ -1150,6 +1185,58 @@ charptr = &options->banner; goto parse_filename; -+ + + case sLogSftp: + intptr = &options->log_sftp; + goto parse_flag; @@ -127,12 +126,13 @@ + intptr = &options->sftp_permit_chown; + goto parse_flag; + ++ /* * These options can contain %X options expanded at * connect time, so that you can specify paths like: Index: servconf.h ---- servconf.h.orig 2007-02-19 12:25:38 +0100 -+++ servconf.h 2007-09-05 08:41:42 +0200 +--- servconf.h.orig 2008-03-07 08:31:24 +0100 ++++ servconf.h 2008-03-31 08:58:54 +0200 @@ -34,6 +34,19 @@ #define PERMIT_NO_PASSWD 2 #define PERMIT_YES 3 @@ -152,25 +152,24 @@ + #define DEFAULT_AUTH_FAIL_MAX 6 /* Default for MaxAuthTries */ - typedef struct { -@@ -141,6 +154,13 @@ - int permit_tun; - + /* Magic name for internal sftp-server */ +@@ -146,6 +159,12 @@ int num_permitted_opens; + + char *chroot_directory; + int log_sftp; /* perform sftp-server logging */ + SyslogFacility sftp_log_facility; /* Facility for sftp subsystem logging. */ + LogLevel sftp_log_level; /* Level for sftp subsystem logging. */ + char sftp_umask[SFTP_UMASK_LENGTH]; /* Sftp Umask */ + int sftp_permit_chmod; + int sftp_permit_chown; -+ } ServerOptions; void initialize_server_options(ServerOptions *); Index: session.c ---- session.c.orig 2007-08-16 15:28:04 +0200 -+++ session.c 2007-09-05 08:41:42 +0200 -@@ -138,6 +138,15 @@ +--- session.c.orig 2008-03-27 01:03:05 +0100 ++++ session.c 2008-03-31 08:57:29 +0200 +@@ -144,6 +144,15 @@ static int is_child = 0; @@ -186,7 +185,7 @@ /* Name and directory of socket for authentication agent forwarding. */ static char *auth_sock_name = NULL; static char *auth_sock_dir = NULL; -@@ -1011,6 +1020,7 @@ +@@ -1012,6 +1021,7 @@ env = xcalloc(envsize, sizeof(char *)); env[0] = NULL; @@ -194,7 +193,7 @@ #ifdef HAVE_CYGWIN /* * The Windows environment contains some setting which are -@@ -1171,6 +1181,67 @@ +@@ -1172,6 +1182,67 @@ child_set_env(&env, &envsize, SSH_AUTHSOCKET_ENV_NAME, auth_sock_name); @@ -264,7 +263,7 @@ snprintf(buf, sizeof buf, "%.200s/.ssh/environment", Index: sftp-server.8 --- sftp-server.8.orig 2007-06-05 10:27:13 +0200 -+++ sftp-server.8 2007-09-05 08:41:42 +0200 ++++ sftp-server.8 2008-03-31 08:57:29 +0200 @@ -49,6 +49,20 @@ .Cm Subsystem declaration. @@ -287,8 +286,8 @@ for more information. .Pp Index: sftp-server.c ---- sftp-server.c.orig 2007-05-20 07:09:05 +0200 -+++ sftp-server.c 2007-09-05 08:42:11 +0200 +--- sftp-server.c.orig 2008-03-07 08:33:53 +0100 ++++ sftp-server.c 2008-03-31 08:57:29 +0200 @@ -53,6 +53,12 @@ /* Our verbosity */ LogLevel log_level = SYSLOG_LEVEL_ERROR; @@ -302,7 +301,7 @@ /* Our client */ struct passwd *pw = NULL; char *client_addr = NULL; -@@ -499,6 +505,12 @@ +@@ -509,6 +515,12 @@ a = get_attrib(); flags = flags_from_portable(pflags); mode = (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ? a->perm : 0666; @@ -315,7 +314,7 @@ logit("open \"%s\" flags %s mode 0%o", name, string_from_portable(pflags), mode); fd = open(name, flags, mode); -@@ -513,6 +525,8 @@ +@@ -523,6 +535,8 @@ status = SSH2_FX_OK; } } @@ -324,7 +323,7 @@ if (status != SSH2_FX_OK) send_status(id, status); xfree(name); -@@ -570,6 +584,8 @@ +@@ -580,6 +594,8 @@ } } } @@ -333,7 +332,7 @@ if (status != SSH2_FX_OK) send_status(id, status); } -@@ -609,6 +625,8 @@ +@@ -619,6 +635,8 @@ } } } @@ -342,7 +341,7 @@ send_status(id, status); xfree(data); } -@@ -710,10 +728,19 @@ +@@ -720,10 +738,19 @@ status = errno_to_portable(errno); } if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) { @@ -362,7 +361,7 @@ } if (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME) { char buf[64]; -@@ -727,11 +754,20 @@ +@@ -737,11 +764,20 @@ status = errno_to_portable(errno); } if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) { @@ -383,7 +382,7 @@ } send_status(id, status); xfree(name); -@@ -745,6 +781,9 @@ +@@ -755,6 +791,9 @@ int handle, fd, ret; int status = SSH2_FX_OK; @@ -393,7 +392,7 @@ id = get_int(); handle = get_handle(); a = get_attrib(); -@@ -763,6 +802,7 @@ +@@ -773,6 +812,7 @@ status = errno_to_portable(errno); } if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) { @@ -401,7 +400,7 @@ logit("set \"%s\" mode %04o", name, a->perm); #ifdef HAVE_FCHMOD ret = fchmod(fd, a->perm & 0777); -@@ -771,6 +811,14 @@ +@@ -781,6 +821,14 @@ #endif if (ret == -1) status = errno_to_portable(errno); @@ -416,7 +415,7 @@ } if (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME) { char buf[64]; -@@ -788,6 +836,7 @@ +@@ -798,6 +846,7 @@ status = errno_to_portable(errno); } if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) { @@ -424,7 +423,7 @@ logit("set \"%s\" owner %lu group %lu", name, (u_long)a->uid, (u_long)a->gid); #ifdef HAVE_FCHOWN -@@ -797,6 +846,14 @@ +@@ -807,6 +856,14 @@ #endif if (ret == -1) status = errno_to_portable(errno); @@ -439,7 +438,7 @@ } } send_status(id, status); -@@ -827,6 +884,8 @@ +@@ -837,6 +894,8 @@ } } @@ -448,7 +447,7 @@ if (status != SSH2_FX_OK) send_status(id, status); xfree(path); -@@ -902,6 +961,8 @@ +@@ -912,6 +971,8 @@ logit("remove name \"%s\"", name); ret = unlink(name); status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK; @@ -457,7 +456,7 @@ send_status(id, status); xfree(name); } -@@ -919,6 +980,12 @@ +@@ -929,6 +990,12 @@ a = get_attrib(); mode = (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ? a->perm & 0777 : 0777; @@ -470,7 +469,7 @@ debug3("request %u: mkdir", id); logit("mkdir name \"%s\" mode 0%o", name, mode); ret = mkdir(name, mode); -@@ -940,6 +1007,8 @@ +@@ -950,6 +1017,8 @@ logit("rmdir name \"%s\"", name); ret = rmdir(name); status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK; @@ -479,7 +478,7 @@ send_status(id, status); xfree(name); } -@@ -967,6 +1036,8 @@ +@@ -977,6 +1046,8 @@ s.name = s.long_name = resolvedname; send_names(id, 1, &s); } @@ -488,7 +487,7 @@ xfree(path); } -@@ -1023,6 +1094,8 @@ +@@ -1033,6 +1104,8 @@ status = SSH2_FX_OK; } send_status(id, status); @@ -497,7 +496,7 @@ xfree(oldpath); xfree(newpath); } -@@ -1049,6 +1122,8 @@ +@@ -1059,6 +1132,8 @@ s.name = s.long_name = buf; send_names(id, 1, &s); } @@ -506,7 +505,7 @@ xfree(path); } -@@ -1068,6 +1143,8 @@ +@@ -1078,6 +1153,8 @@ ret = symlink(oldpath, newpath); status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK; send_status(id, status); @@ -515,7 +514,7 @@ xfree(oldpath); xfree(newpath); } -@@ -1215,6 +1292,8 @@ +@@ -1249,6 +1326,8 @@ ssize_t len, olen, set_size; SyslogFacility log_facility = SYSLOG_FACILITY_AUTH; char *cp, buf[4*4096]; @@ -524,7 +523,7 @@ extern char *optarg; extern char *__progname; -@@ -1253,6 +1332,12 @@ +@@ -1284,6 +1363,12 @@ } } @@ -537,7 +536,7 @@ log_init(__progname, log_level, log_facility, log_stderr); if ((cp = getenv("SSH_CONNECTION")) != NULL) { -@@ -1276,6 +1361,39 @@ +@@ -1305,6 +1390,39 @@ in = dup(STDIN_FILENO); out = dup(STDOUT_FILENO); @@ -578,9 +577,9 @@ setmode(in, O_BINARY); setmode(out, O_BINARY); Index: sshd_config.5 ---- sshd_config.5.orig 2007-06-11 06:07:13 +0200 -+++ sshd_config.5 2007-09-05 08:41:42 +0200 -@@ -483,6 +483,10 @@ +--- sshd_config.5.orig 2008-03-27 01:02:02 +0100 ++++ sshd_config.5 2008-03-31 08:57:29 +0200 +@@ -530,6 +530,10 @@ DEBUG and DEBUG1 are equivalent. DEBUG2 and DEBUG3 each specify higher levels of debugging output. Logging with a DEBUG level violates the privacy of users and is not recommended. @@ -591,7 +590,7 @@ .It Cm MACs Specifies the available MAC (message authentication code) algorithms. The MAC algorithm is used in protocol version 2 -@@ -725,6 +729,37 @@ +@@ -773,6 +777,37 @@ .It Cm ServerKeyBits Defines the number of bits in the ephemeral protocol version 1 server key. The minimum value is 512, and the default is 768. @@ -630,9 +629,9 @@ Specifies whether .Xr sshd 8 Index: sshd_config ---- sshd_config.orig 2007-03-21 10:42:25 +0100 -+++ sshd_config 2007-09-05 08:41:42 +0200 -@@ -109,6 +109,17 @@ +--- sshd_config.orig 2008-02-10 12:40:12 +0100 ++++ sshd_config 2008-03-31 08:57:29 +0200 +@@ -110,6 +110,17 @@ # override default of no subsystems Subsystem sftp /usr/libexec/sftp-server @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssh/openssh.spec ============================================================================ $ cvs diff -u -r1.206 -r1.207 openssh.spec --- openpkg-src/openssh/openssh.spec 8 Feb 2008 06:48:05 -0000 1.206 +++ openpkg-src/openssh/openssh.spec 31 Mar 2008 07:00:50 -0000 1.207 @@ -22,7 +22,7 @@ ## # package versions -%define V_base 4.7 +%define V_base 4.9 %define V_portable p1 %define V_watchdog 4.4p1 %define V_ldap_base 4.6p1 @@ -41,7 +41,7 @@ Group: SSH License: BSD Version: %{V_base}%{V_portable} -Release: 20080208 +Release: 20080331 # package options %option with_fsl yes @@ . ______________________________________________________________________ OpenPKG http://openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org