=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/plus.html,v retrieving revision 1.640 retrieving revision 1.641 diff -u -r1.640 -r1.641 --- www/plus.html 2000/08/31 07:47:58 1.640 +++ www/plus.html 2000/08/31 08:10:44 1.641 @@ -69,7 +69,7 @@
  • Performance improvements to sis(4).
  • Correctly match Promise Ultra/100 on pciide(4).
  • Fix shared library creation problems on mips. -
  • Fix IPSEC flow deletion problem when using -transport. +
  • Fix IPSEC flow deletion problem when using -transport.
    [To be applied to stable]
  • On scp(1), fix files bigger than 2GB.
  • Crack some defaults on login.conf(5). @@ -86,18 +86,25 @@ [Applied to stable]
  • Proper template file creation on ksh(1).
  • Implement resource limits in several daemons. -
  • Add login.conf(5) support, making possible limiting resources per class. +
  • Add login.conf(5) support, making possible limiting resources per class.
  • Minor bug fixes associated with the use of the UseLogin directive in sshd_config.
  • Bypass key generation if SSL is not enabled in any server.
  • Add SSH2/DSA support to ssh-agent(1) and some DSA related cleanups.
  • Resolve a driver name conflict in the pmax platform. The pmax dc(4) driver has been renamed to dz.
  • Many updates to the ubsec(4) code.
  • Various IPv6 fixes. -
  • Add -S option to scp(1) and ssh(1) to use a program for encrypted connections. +
  • Add -S option to scp(1) and ssh(1) to use a program for encrypted connections.
  • Lot of manpage updates.
  • Various improvements to linux emulation.
  • Add IPv6 support to telnetd(8).
  • Allow ppp(8) to be used without SUID privs. +
  • Make pcibios(4) a real device making possible the use of flags. +
  • Avoid duplicate utmp entries in ssh(1). +
  • Update awi(4) driver. +
  • Various ppp(8) improvements. +
  • More fixes to ubsec(4) auth+enc. +
  • Convert pccom(4) to new timeouts. +
  • Implement -a option on wicontrol(8), was documented but not present.
  • ... more missing updates here..
  • SECURITY ISSUE: format string localhost root vulnerability in xlock(1).
    A patch is available.
    @@ -507,7 +514,7 @@
    OpenBSD www@openbsd.org -
    $OpenBSD: plus.html,v 1.640 2000/08/31 07:47:58 fgsch Exp $ +
    $OpenBSD: plus.html,v 1.641 2000/08/31 08:10:44 fgsch Exp $