summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/auth-rsa.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* remove ssh1 server code; ok djm@markus2016-08-131-342/+0
|
* update to new API (key_fingerprint => sshkey_fingerprint)djm2015-01-281-3/+4
| | | | | check sshkey_fingerprint return values; ok markus
* Add FingerprintHash option to control algorithm used for keydjm2014-12-211-2/+3
| | | | | | | fingerprints. Default changes from MD5 to SHA256 and format from hex to base64. Feedback and ok naddy@ markus@
* Add support for Unix domain socket forwarding. A remote TCP portmillert2014-07-151-2/+2
| | | | | | | | may be forwarded to a local Unix domain socket and vice versa or both ends may be a Unix domain socket. This is a reimplementation of the streamlocal patches by William Ahern from: http://www.25thandclement.com/~william/projects/streamlocal.html OK djm@ markus@
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-2/+3
| | | | | | | | | existing API is offered as a set of wrappers. with and ok markus@ Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew Dempsky and Ron Bowes for a detailed review a few months ago.
* replace openssl MD5 with our ssh_digest_*; ok djm@markus2014-01-271-9/+13
|
* fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@djm2013-07-121-4/+3
|
* for hostbased authentication, print the client host and user ondjm2013-06-211-2/+2
| | | | the auth success/failure line; bz#2064, ok dtucker@
* Standardise logging of supplemental information during userauth. Keysdjm2013-05-191-8/+8
| | | | | | | | | | and ruser is now logged in the auth success/failure message alongside the local username, remote host/port and protocol in use. Certificates contents and CA are logged too. Pushing all logging onto a single line simplifies log analysis as it is no longer necessary to relate information scattered across multiple log entries. "I like it" markus@
* bye, bye xfree(); ok markus@djm2013-05-171-3/+3
|
* new sshd_config option AuthorizedKeysCommand to support fetchingdjm2012-10-301-1/+3
| | | | | | | | | authorized_keys from a command in addition to (or instead of) from the filesystem. The command is run as the target server user unless another specified via a new AuthorizedKeysCommandUser option. patch originally by jchadima AT redhat.com, reworked by me; feedback and ok markus@
* allow AuthorizedKeysFile to specify multiple files, separated by spaces.djm2011-05-231-31/+39
| | | | | | | | | Bring back authorized_keys2 as a default search path (to avoid breaking existing users of this file), but override this in sshd_config so it will be no longer used on fresh installs. Maybe in 2015 we can remove it entierly :) feedback and ok markus@ dtucker@
* move check for revoked keys to run earlier (in auth_rsa_key_allowed)djm2010-12-031-4/+5
| | | | bz#1829; patch from ldv AT altlinux.org; ok markus@
* s/timing_safe_cmp/timingsafe_bcmp/gdjm2010-07-131-2/+2
|
* implement a timing_safe_cmp() function to compare memory without leakingdjm2010-07-131-2/+2
| | | | | | timing information by short-circuiting like memcmp() and use it for some of the more sensitive comparisons (though nothing high-value was readily attackable anyway); "looks ok" markus@
* don't accept certificates marked as "cert-authority" here; ok markus@djm2010-05-111-2/+3
|
* revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with thedjm2010-04-161-2/+2
| | | | | | | | | | | | | | | | | | following changes: move the nonce field to the beginning of the certificate where it can better protect against chosen-prefix attacks on the signature hash Rename "constraints" field to "critical options" Add a new non-critical "extensions" field Add a serial number The older format is still support for authentication and cert generation (use "ssh-keygen -t v00 -s ca_key ..." to generate a v00 certificate) ok markus@
* Add a TrustedUserCAKeys option to sshd_config to specify CA keys thatdjm2010-03-041-1/+4
| | | | | | | | | | | are trusted to authenticate users (in addition than doing it per-user in authorized_keys). Add a RevokedKeys option to sshd_config and a @revoked marker to known_hosts to allow keys to me revoked and banned for user or host authentication. feedback and ok markus@
* Merge duplicate host key file checks, based in part on a patch from Robdtucker2008-07-021-21/+2
| | | | | Holland via bz #1348 . Also checks for non-regular files during protocol 1 RSA auth. ok djm@
* add missing checks for openssl return codes; with & ok djm@markus2006-11-061-4/+6
|
* almost entirely get rid of the culture of ".h files that include .h files"deraadt2006-08-031-5/+8
| | | | | ok djm, sort of ok stevesk makes the pain stop in one easy step
* move #include <stdio.h> out of includes.hstevesk2006-08-011-1/+2
|
* move #include <string.h> out of includes.hstevesk2006-07-221-1/+2
|
* move #include <pwd.h> out of includes.h; ok markus@stevesk2006-07-061-1/+3
|
* needed casts (always will be needed)deraadt2006-03-251-2/+2
|
* Put $OpenBSD$ tags back (as comments) to replace the RCSID()s thatdjm2006-03-251-0/+1
| | | | Theo nuked - our scripts to sync -portable need them in the files
* RCSID() can diederaadt2006-03-191-1/+0
|
* move #include <sys/stat.h> out of includes.h; ok markus@stevesk2006-02-201-1/+4
|
* make this -Wsign-compare clean; ok avsm@ markus@djm2005-06-171-2/+4
|
* Fix debug call in error path of authorized_keys processing and fix relateddtucker2004-12-111-1/+2
| | | | warnings; ok djm@
* Discard over-length authorized_keys entries rather than complaining whendtucker2004-12-061-6/+4
| | | | they don't decode. bz #884, with & ok djm@
* make ssh -Wshadow clean, no functional changesavsm2004-06-211-5/+5
| | | | markus@ ok
* kill some more tiny files; ok deraadt@djm2004-05-091-2/+1
|
* standardise arguments to auth methods - they should all take authctxt.djm2003-11-041-3/+4
| | | | check authctxt->valid rather then pw != NULL; ok markus@
* rename log() into logit() to avoid name conflict. markus ok, from netbsditojun2003-04-081-3/+3
|
* display minimum RSA modulus in error(); ok markus@stevesk2002-06-101-3/+3
|
* make RSA modulus minimum #define; ok markus@stevesk2002-03-291-2/+3
|
* disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)markus2002-03-261-1/+8
|
* return 0 (not NULL); tomh@po.crl.go.jpmarkus2002-03-251-4/+4
|
* integrate privilege separated openssh; its turned off by default for now.provos2002-03-181-8/+9
| | | | work done by me and markus@
* split auth_rsa() for better readability and privsep; ok provos@markus2002-03-141-85/+117
|
* packet_read* no longer return the packet length, since it's not used.markus2001-12-281-3/+3
|
* s/packet_done/packet_check_eom/ (end-of-message); ok djm@markus2001-12-281-2/+2
|
* get rid of packet_integrity_check, use packet_done() instead.markus2001-12-271-2/+2
|
* call fatal() for openssl allocation failuresmarkus2001-12-271-4/+7
|
* log fingerprint on successful public key authentication, simplify usage of key structs; ok markus@jakob2001-12-181-11/+17
|
* fix protocol error: send 'failed' message instead of a 2nd challengemarkus2001-11-291-2/+6
| | | | | (happens if the same key is in authorized_keys twice). reported Ralf_Meister@genua.de; ok djm@
* use %lu; ok markus@stevesk2001-07-231-2/+2
|
* terminate secure_filename checking after checking homedir. that way itprovos2001-06-251-2/+2
| | | | works on AFS. okay markus@
* merge authorized_keys2 into authorized_keys.markus2001-06-221-4/+2
| | | | | authorized_keys2 is used for backward compat. (just append authorized_keys2 to authorized_keys).