From owner-cvs-all Mon Mar 19 18: 6:47 2001 Delivered-To: cvs-all@freebsd.org Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id B9D1F37B727; Mon, 19 Mar 2001 18:06:41 -0800 (PST) (envelope-from green@FreeBSD.org) Received: (from green@localhost) by freefall.freebsd.org (8.11.1/8.11.1) id f2K26fZ49793; Mon, 19 Mar 2001 18:06:41 -0800 (PST) (envelope-from green) Message-Id: <200103200206.f2K26fZ49793@freefall.freebsd.org> From: Brian Feldman Date: Mon, 19 Mar 2001 18:06:41 -0800 (PST) To: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: src/crypto/openssh channels.c channels.h compat.c compat.h serverloop.c sshconnect.c sshconnect.h sshconnect1.c sshconnect2.c X-FreeBSD-CVS-Branch: HEAD Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG green 2001/03/19 18:06:41 PST Modified files: crypto/openssh channels.c channels.h compat.c compat.h serverloop.c sshconnect.c sshconnect.h sshconnect1.c sshconnect2.c Log: Make password attacks based on traffic analysis harder by requiring that "non-echoed" characters are still echoed back in a null packet, as well as pad passwords sent to not give hints to the length otherwise. Obtained from: OpenBSD Revision Changes Path 1.2 +1367 -620 src/crypto/openssh/channels.c 1.2 +262 -10 src/crypto/openssh/channels.h 1.3 +2 -0 src/crypto/openssh/compat.c 1.2 +20 -6 src/crypto/openssh/compat.h 1.2 +397 -158 src/crypto/openssh/serverloop.c 1.14 +16 -1 src/crypto/openssh/sshconnect.c 1.3 +2 -0 src/crypto/openssh/sshconnect.h 1.8 +3 -3 src/crypto/openssh/sshconnect1.c 1.2 +756 -200 src/crypto/openssh/sshconnect2.c To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message