<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/crypto, branch release/9.0.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=release%2F9.0.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=release%2F9.0.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2011-12-23T15:00:37Z</updated>
<entry>
<title>Fix a problem whereby a corrupt DNS record can cause named to crash. [11:06]</title>
<updated>2011-12-23T15:00:37Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2011-12-23T15:00:37Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=7501ca43959525c0fffc939d2f3daf2fdf69e553'/>
<id>urn:sha1:7501ca43959525c0fffc939d2f3daf2fdf69e553</id>
<content type='text'>
Add an API for alerting internal libc routines to the presence of
"unsafe" paths post-chroot, and use it in ftpd. [11:07]

Fix a buffer overflow in telnetd. [11:08]

Make pam_ssh ignore unpassphrased keys unless the "nullok" option is
specified. [11:09]

Add sanity checking of service names in pam_start. [11:10]

Approved by:    so (cperciva)
Approved by:    re (bz)
Security:       FreeBSD-SA-11:06.bind
Security:       FreeBSD-SA-11:07.chroot
Security:       FreeBSD-SA-11:08.telnetd
Security:       FreeBSD-SA-11:09.pam_ssh
Security:       FreeBSD-SA-11:10.pam
</content>
</entry>
<entry>
<title>MFH r225852: regenerate after hpn patch</title>
<updated>2011-10-04T15:06:11Z</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2011-10-04T15:06:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=395604bd930a3656c7c965160c83c938701233a5'/>
<id>urn:sha1:395604bd930a3656c7c965160c83c938701233a5</id>
<content type='text'>
Approved by:	re (kib)
</content>
</entry>
<entry>
<title>Remove the svn:keywords property and restore the historical $FreeBSD$ tag.</title>
<updated>2011-09-16T11:14:10Z</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2011-09-16T11:14:10Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=45f3db2122c56592609e50e37e76144ff467db2e'/>
<id>urn:sha1:45f3db2122c56592609e50e37e76144ff467db2e</id>
<content type='text'>
Approved by:	re (kib)
MFC after:	3 weeks
</content>
</entry>
<entry>
<title>Fix SSL memory handlig for (EC)DH cipher suites, in particular for</title>
<updated>2011-09-08T09:33:49Z</updated>
<author>
<name>Xin LI</name>
<email>delphij@FreeBSD.org</email>
</author>
<published>2011-09-08T09:33:49Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=dfdd3320563293af72effba0ea2826a1a934106e'/>
<id>urn:sha1:dfdd3320563293af72effba0ea2826a1a934106e</id>
<content type='text'>
multi-threaded use of ECDH.

Security:	CVE-2011-3210
Reviewed by:	stas
Obtained from:	OpenSSL CVS
Approved by:	re (kib)
</content>
</entry>
<entry>
<title>Fix two more $FreeBSD$ keywords.</title>
<updated>2011-08-03T20:21:52Z</updated>
<author>
<name>Brooks Davis</name>
<email>brooks@FreeBSD.org</email>
</author>
<published>2011-08-03T20:21:52Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=8eb43d357c6e72a7fc89933059fdbfaf7829197c'/>
<id>urn:sha1:8eb43d357c6e72a7fc89933059fdbfaf7829197c</id>
<content type='text'>
Reported by:	pluknet
Approved by:	re (implicit)
</content>
</entry>
<entry>
<title>Add support for dynamically adjusted buffers to allow the full use of</title>
<updated>2011-08-03T19:14:22Z</updated>
<author>
<name>Brooks Davis</name>
<email>brooks@FreeBSD.org</email>
</author>
<published>2011-08-03T19:14:22Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=8998619212f3a1c489079256ef1f6a26a7d7612c'/>
<id>urn:sha1:8998619212f3a1c489079256ef1f6a26a7d7612c</id>
<content type='text'>
the bandwidth of long fat pipes (i.e. 100Mbps+ trans-oceanic or
trans-continental links).  Bandwidth-delay products up to 64MB are
supported.

Also add support (not compiled by default) for the None cypher.  The
None cypher can only be enabled on non-interactive sessions (those
without a pty where -T was not used) and must be enabled in both
the client and server configuration files and on the client command
line.  Additionally, the None cypher will only be activated after
authentication is complete.  To enable the None cypher you must add
-DNONE_CIPHER_ENABLED to CFLAGS via the make command line or in
/etc/make.conf.

This code is a style(9) compliant version of these features extracted
from the patches published at:

http://www.psc.edu/networking/projects/hpn-ssh/

Merging this patch has been a collaboration between me and Bjoern.

Reviewed by:	bz
Approved by:	re (kib), des (maintainer)
</content>
</entry>
<entry>
<title>Fix clang warning (why is there nowhere yyparse() is declared?).</title>
<updated>2011-05-18T20:57:23Z</updated>
<author>
<name>Ben Laurie</name>
<email>benl@FreeBSD.org</email>
</author>
<published>2011-05-18T20:57:23Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=198a158f99bb44be9ac17615a61542b41836e63e'/>
<id>urn:sha1:198a158f99bb44be9ac17615a61542b41836e63e</id>
<content type='text'>
Approved by:	philip (mentor)
</content>
</entry>
<entry>
<title>Merge two upstream patches from vendor branch.  No functional changes.</title>
<updated>2011-05-05T08:08:18Z</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2011-05-05T08:08:18Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=faa715d30ccfad973b8266301775d79df14a83b3'/>
<id>urn:sha1:faa715d30ccfad973b8266301775d79df14a83b3</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Upgrade to OpenSSH 5.8p2.</title>
<updated>2011-05-04T07:34:44Z</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2011-05-04T07:34:44Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=4a421b6336e5e0c2ff27024c30fe32c6f71dcf3d'/>
<id>urn:sha1:4a421b6336e5e0c2ff27024c30fe32c6f71dcf3d</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix Incorrectly formatted ClientHello SSL/TLS handshake messages could</title>
<updated>2011-02-12T21:30:46Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2011-02-12T21:30:46Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=0a70456882e4b46d78218f9c484dc739e6f272b5'/>
<id>urn:sha1:0a70456882e4b46d78218f9c484dc739e6f272b5</id>
<content type='text'>
cause OpenSSL to parse past the end of the message.

Note: Applications are only affected if they act as a server and call
SSL_CTX_set_tlsext_status_cb on the server's SSL_CTX. This includes
Apache httpd &gt;= 2.3.3, if configured with "SSLUseStapling On".

Security:	http://www.openssl.org/news/secadv_20110208.txt
Security:	CVE-2011-0014
Obtained from:	OpenSSL CVS
</content>
</entry>
</feed>
