summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/auth2-pubkey.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* allow key options (command="..." and friends) in AuthorizedPrincipals;djm2010-06-291-7/+27
| | | | ok markus@
* fix logspam when key options (from="..." especially) deny non-matching keys;djm2010-05-201-6/+12
| | | | reported by henning@ also bz#1765; ok markus@ dtucker@
* add some optional indirection to matching of principal names listeddjm2010-05-071-8/+94
| | | | | | | | | | | | | | | | | | | | | in certificates. Currently, a certificate must include the a user's name to be accepted for authentication. This change adds the ability to specify a list of certificate principal names that are acceptable. When authenticating using a CA trusted through ~/.ssh/authorized_keys, this adds a new principals="name1[,name2,...]" key option. For CAs listed through sshd_config's TrustedCAKeys option, a new config option "AuthorizedPrincipalsFile" specifies a per-user file containing the list of acceptable names. If either option is absent, the current behaviour of requiring the username to appear in principals continues to apply. These options are useful for role accounts, disjoint account namespaces and "user@realm"-style naming policies in certificates. feedback and ok markus@
* revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with thedjm2010-04-161-5/+4
| | | | | | | | | | | | | | | | | | following changes: move the nonce field to the beginning of the certificate where it can better protect against chosen-prefix attacks on the signature hash Rename "constraints" field to "critical options" Add a new non-critical "extensions" field Add a serial number The older format is still support for authentication and cert generation (use "ssh-keygen -t v00 -s ca_key ..." to generate a v00 certificate) ok markus@
* correct certificate logging and make it more consistent betweendjm2010-03-101-14/+17
| | | | authorized_keys and TrustedCAKeys; ok markus@
* Add a TrustedUserCAKeys option to sshd_config to specify CA keys thatdjm2010-03-041-1/+52
| | | | | | | | | | | are trusted to authenticate users (in addition than doing it per-user in authorized_keys). Add a RevokedKeys option to sshd_config and a @revoked marker to known_hosts to allow keys to me revoked and banned for user or host authentication. feedback and ok markus@
* Add support for certificate key types for users and hosts.djm2010-02-261-4/+33
| | | | | | | | | | | | | | | | | | | | | | | | OpenSSH certificate key types are not X.509 certificates, but a much simpler format that encodes a public key, identity information and some validity constraints and signs it with a CA key. CA keys are regular SSH keys. This certificate style avoids the attack surface of X.509 certificates and is very easy to deploy. Certified host keys allow automatic acceptance of new host keys when a CA certificate is marked as trusted in ~/.ssh/known_hosts. see VERIFYING HOST KEYS in ssh(1) for details. Certified user keys allow authentication of users when the signing CA key is marked as trusted in authorized_keys. See "AUTHORIZED_KEYS FILE FORMAT" in sshd(8) for details. Certificates are minted using ssh-keygen(1), documentation is in the "CERTIFICATES" section of that manpage. Documentation on the format of certificates is in the file PROTOCOL.certkeys feedback and ok markus@
* avoid nasty double free; ok dtucker@ djm@otto2008-07-031-2/+1
|
* Merge duplicate host key file checks, based in part on a patch from Robdtucker2008-07-021-33/+5
| | | | | Holland via bz #1348 . Also checks for non-regular files during protocol 1 RSA auth. ok djm@
* Include unistd.h for close(), prevents warnings in -portabledtucker2008-06-131-1/+2
|
* refuse to read ~/.shosts or ~/.ssh/authorized_keys that are notdjm2008-06-131-9/+23
| | | | | regular files; report from Solar Designer via Colin Watson in bz#1471 ok dtucker@ deraadt@
* almost entirely get rid of the culture of ".h files that include .h files"deraadt2006-08-031-5/+8
| | | | | ok djm, sort of ok stevesk makes the pain stop in one easy step
* move #include <stdio.h> out of includes.hstevesk2006-08-011-1/+2
|
* move #include <pwd.h> out of includes.h; ok markus@stevesk2006-07-061-1/+3
|
* Put $OpenBSD$ tags back (as comments) to replace the RCSID()s thatdjm2006-03-251-0/+1
| | | | Theo nuked - our scripts to sync -portable need them in the files
* RCSID() can diederaadt2006-03-191-1/+0
|
* move #include <sys/stat.h> out of includes.h; ok markus@stevesk2006-02-201-1/+4
|
* Fix debug call in error path of authorized_keys processing and fix relateddtucker2004-12-111-1/+2
| | | | warnings; ok djm@
* Discard over-length authorized_keys entries rather than complaining whendtucker2004-12-061-4/+5
| | | | they don't decode. bz #884, with & ok djm@
* make ssh -Wshadow clean, no functional changesavsm2004-06-211-4/+4
| | | | markus@ ok
* fix mem leaks; some fixes from Pete Flugstad; tested dtucker@markus2004-01-191-3/+3
|
* standardise arguments to auth methods - they should all take authctxt.djm2003-11-041-4/+1
| | | | check authctxt->valid rather then pw != NULL; ok markus@
* int -> u_int; ok djm@, deraadt@, mouring@markus2003-06-241-2/+2
|
* rename log() into logit() to avoid name conflict. markus ok, from netbsditojun2003-04-081-3/+3
|
* move Authmethod definitons to per-method file.markus2002-05-311-2/+8
|
* split auth2.c into one file per method; ok provos@/deraadt@markus2002-05-251-0/+273