Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | implement 'ssh -b bind_address' like 'telnet -b' | 2001-04-30 | 1 | -2/+8 | |
| | |||||
* | add HostKeyAlgorithms; based on patch from res@shore.net; ok provos@ | 2001-04-17 | 1 | -2/+17 | |
| | |||||
* | use fatal() or error() vs. fprintf(); ok markus@ | 2001-04-15 | 1 | -3/+3 | |
| | |||||
* | robust port validation; ok markus@ jakob@ | 2001-04-12 | 1 | -7/+7 | |
| | |||||
* | typo | 2001-04-12 | 1 | -2/+2 | |
| | |||||
* | implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2) | 2001-04-12 | 1 | -4/+12 | |
| | | | | | similar to RhostRSAAuthentication unless you enable (the experimental) HostbasedUsesNameFromPacketOnly option. please test. :) | ||||
* | allow the ssh client act as a SOCKS4 proxy (dynamic local portforwarding). | 2001-04-07 | 1 | -2/+15 | |
| | | | | | | work by Dan Kaminsky <dankamin@cisco.com> and me. thanks to Dan for this great patch: use 'ssh -D 1080 host' and make netscape use localhost:1080 as a socks proxy. | ||||
* | correct comment; ok markus@ | 2001-04-02 | 1 | -3/+2 | |
| | |||||
* | default to SSH protocol version 2 | 2001-03-20 | 1 | -2/+2 | |
| | |||||
* | undo /etc/shell and proto 2,1 change for openssh-2.5.2 | 2001-03-19 | 1 | -2/+2 | |
| | |||||
* | add PreferredAuthentications | 2001-03-10 | 1 | -2/+10 | |
| | |||||
* | default to SSH2, now that m68k runs fast | 2001-03-10 | 1 | -2/+2 | |
| | |||||
* | turn off useprivilegedports by default. only rhost-auth needs | 2001-03-08 | 1 | -2/+2 | |
| | | | | this. older sshd's may need this, too. | ||||
* | log functions should not be passed strings that end in newline as they | 2001-03-04 | 1 | -4/+4 | |
| | | | | | get passed on to syslog() and when logging to stderr, do_log() appends its own newline. | ||||
* | look for id_rsa by default, before id_dsa | 2001-02-24 | 1 | -1/+7 | |
| | |||||
* | 1) clean up the MAC support for SSH-2 | 2001-02-11 | 1 | -2/+18 | |
| | | | | | | | 2) allow you to specify the MAC with 'ssh -m' 3) or the 'MACs' keyword in ssh(d)_config 4) add hmac-{md5,sha1}-96 ok stevesk@, provos@ | ||||
* | snprintf | 2001-02-08 | 1 | -7/+11 | |
| | |||||
* | ``StrictHostKeyChecking ask'' documentation and small cleanup. | 2001-01-28 | 1 | -2/+2 | |
| | | | | ok markus@ | ||||
* | rename skey -> challenge response. | 2001-01-22 | 1 | -14/+13 | |
| | | | | auto-enable kbd-interactive for ssh2 if challenge-reponse is enabled. | ||||
* | split ssh.h and try to cleanup the #include mess. remove unnecessary #includes. | 2001-01-21 | 1 | -3/+6 | |
| | | | | rename util.[ch] -> misc.[ch] | ||||
* | KNF; ok markus | 2001-01-20 | 1 | -3/+2 | |
| | |||||
* | fix SIGSEGV from -o ""; problem noted by jehsom@togetherweb.com | 2001-01-20 | 1 | -2/+2 | |
| | |||||
* | move ssh1 definitions to ssh1.h, pathnames to pathnames.h | 2001-01-19 | 1 | -9/+10 | |
| | |||||
* | log() is at pri=LOG_INFO, since LOG_NOTICE goes to /dev/console on many systems | 2001-01-18 | 1 | -2/+2 | |
| | |||||
* | rename SYSLOG_LEVEL_INFO->SYSLOG_LEVEL_NOTICE | 2001-01-07 | 1 | -2/+2 | |
| | | | | | | syslog priority changes: fatal() LOG_ERR -> LOG_CRIT log() LOG_INFO -> LOG_NOTICE | ||||
* | new option: HostKeyAlias: allows the user to record the host key | 2000-12-27 | 1 | -2/+9 | |
| | | | | | | under a different name. This is useful for ssh tunneling over forwarded connections or if you run multiple sshd's on different ports on the same machine. | ||||
* | replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned' | 2000-12-19 | 1 | -5/+5 | |
| | | | | with u_char. | ||||
* | add support for RSA to SSH2. please test. | 2000-11-12 | 1 | -29/+26 | |
| | | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication. | ||||
* | new cipher framework | 2000-10-11 | 1 | -2/+1 | |
| | |||||
* | add support for s/key (kbd-interactive) to ssh2, based on work by mkiernan@avantgo.com and me | 2000-10-11 | 1 | -2/+17 | |
| | |||||
* | some more Copyright fixes | 2000-09-07 | 1 | -24/+1 | |
| | |||||
* | cleanup copyright notices on all files. I have attempted to be accurate with | 2000-09-07 | 1 | -7/+28 | |
| | | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate. | ||||
* | disallow kerberos authentication if we can't verify the TGT; from | 2000-08-02 | 1 | -2/+2 | |
| | | | | | dugsong@ kerberos authentication is on by default only if you have a srvtab. | ||||
* | disable kerberos authentication by default | 2000-08-02 | 1 | -2/+2 | |
| | |||||
* | allow leading whitespace. ok niels | 2000-07-14 | 1 | -2/+2 | |
| | |||||
* | allow multiple whitespace but only one '=' between tokens, bug report from | 2000-07-13 | 1 | -28/+26 | |
| | | | | Ralf S. Engelschall <rse@engelschall.com> but different fix. okay deraadt@ | ||||
* | disable FallBackToRsh by default | 2000-07-11 | 1 | -2/+2 | |
| | |||||
* | Get the correct message on errors. (niels@ ok) | 2000-07-10 | 1 | -17/+17 | |
| | |||||
* | Better conditions for strsep() ending. | 2000-07-09 | 1 | -4/+6 | |
| | |||||
* | replace strtok with strsep; from David Young <dyoung@onthejob.net> | 2000-07-08 | 1 | -73/+73 | |
| | |||||
* | OpenBSD tag | 2000-06-20 | 1 | -1/+1 | |
| | |||||
* | include = in WHITESPACE; markus ok | 2000-06-18 | 1 | -2/+2 | |
| | |||||
* | typo, unused | 2000-05-31 | 1 | -2/+2 | |
| | |||||
* | xauth_location support; pr 1234 | 2000-05-31 | 1 | -2/+12 | |
| | |||||
* | forwardagent defaults to no, add ssh -A | 2000-05-29 | 1 | -2/+2 | |
| | |||||
* | check strtok() != NULL; ok niels@ | 2000-05-22 | 1 | -1/+7 | |
| | |||||
* | complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only) | 2000-05-08 | 1 | -2/+3 | |
| | |||||
* | add DSAAuthetication option to ssh/sshd, document SSH2 in sshd.8 | 2000-05-06 | 1 | -2/+10 | |
| | |||||
* | default DSA key file ~/.ssh/id_dsa | 2000-05-02 | 1 | -5/+3 | |
| | |||||
* | ssh/sshd default to proto 1 and 2 | 2000-04-26 | 1 | -2/+2 | |
| |