aboutsummaryrefslogtreecommitdiffstats
path: root/security/openssh/files/patch-ap
Commit message (Collapse)AuthorAgeFilesLines
* In the meantime (while things are being worked and decided on on theBrian Feldman1999-12-061-0/+138
| | | | | | | | | | | | | | | OpenBSD OpenSSH front), add ConnectionsPerPeriod to prevent DoS via running the system out of resources. In reality, this wouldn't be a full DoS, but would make a system slower, but this is a better thing to do than let the system get loaded down. So here we are, rate-limiting. The default settings are now: Five connections are allowed to authenticate (and not be rejected) in a period of ten seconds. One minute is given for login grace time. More work in this area is being done by alfred@FreeBSD.org and markus@OpenBSD.org, at the very least. This is, essentially, a stopgap solution; however, it is a properly implemented and documented one, and has an easily modifiable framework.
* Update the CVS_DATE. This brings in support for TIS authentication,Brian Feldman1999-11-241-36/+0
| | | | | | | | | | | | | | | | | | obsoleting a couple patches (it's the same code, though, except for additions). This also brings in KNFization of everything (please hold the cheering down :) and made me reroll all my patches. My patches have been almost entirely rewritten. The places are the same, but the code's rewritten. It fits with the style (KNF) now, and looks better. I've also added strlcat.c to the build, which, just like strlcpy.c, is necessary for compatibility with older libcs. After strlcat() snuck into the OpenSSH code recently, this would prevent OpenSSH from building on (e.g.) FreeBSD 3.2. Adding it to ssh/lib/ makes it work yet again :)
* Make some various cleanups. Note that I did not add RESTRICTED since this isBrian Feldman1999-11-091-7/+15
| | | | | | | in no way cryptographically encumbered code. The fact that it's redistributed by me from freefall is completely coincidental. Submitted by: obrien, Christian Weisgerber <naddy@unix-ag.uni-kl.de>
* Say hello to OpenSSH! It's more secure, has a better license, andBrian Feldman1999-11-081-0/+28
is actively maintained by members of the OpenBSD project.