summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/readconf.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* implement 'ssh -b bind_address' like 'telnet -b'markus2001-04-301-2/+8
|
* add HostKeyAlgorithms; based on patch from res@shore.net; ok provos@markus2001-04-171-2/+17
|
* use fatal() or error() vs. fprintf(); ok markus@stevesk2001-04-151-3/+3
|
* robust port validation; ok markus@ jakob@stevesk2001-04-121-7/+7
|
* typomarkus2001-04-121-2/+2
|
* implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2)markus2001-04-121-4/+12
| | | | | similar to RhostRSAAuthentication unless you enable (the experimental) HostbasedUsesNameFromPacketOnly option. please test. :)
* allow the ssh client act as a SOCKS4 proxy (dynamic local portforwarding).markus2001-04-071-2/+15
| | | | | | work by Dan Kaminsky <dankamin@cisco.com> and me. thanks to Dan for this great patch: use 'ssh -D 1080 host' and make netscape use localhost:1080 as a socks proxy.
* correct comment; ok markus@stevesk2001-04-021-3/+2
|
* default to SSH protocol version 2markus2001-03-201-2/+2
|
* undo /etc/shell and proto 2,1 change for openssh-2.5.2markus2001-03-191-2/+2
|
* add PreferredAuthenticationsmarkus2001-03-101-2/+10
|
* default to SSH2, now that m68k runs fastderaadt2001-03-101-2/+2
|
* turn off useprivilegedports by default. only rhost-auth needsmarkus2001-03-081-2/+2
| | | | this. older sshd's may need this, too.
* log functions should not be passed strings that end in newline as theymillert2001-03-041-4/+4
| | | | | get passed on to syslog() and when logging to stderr, do_log() appends its own newline.
* look for id_rsa by default, before id_dsaderaadt2001-02-241-1/+7
|
* 1) clean up the MAC support for SSH-2markus2001-02-111-2/+18
| | | | | | | 2) allow you to specify the MAC with 'ssh -m' 3) or the 'MACs' keyword in ssh(d)_config 4) add hmac-{md5,sha1}-96 ok stevesk@, provos@
* snprintfderaadt2001-02-081-7/+11
|
* ``StrictHostKeyChecking ask'' documentation and small cleanup.stevesk2001-01-281-2/+2
| | | | ok markus@
* rename skey -> challenge response.markus2001-01-221-14/+13
| | | | auto-enable kbd-interactive for ssh2 if challenge-reponse is enabled.
* split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.markus2001-01-211-3/+6
| | | | rename util.[ch] -> misc.[ch]
* KNF; ok markusdjm2001-01-201-3/+2
|
* fix SIGSEGV from -o ""; problem noted by jehsom@togetherweb.comderaadt2001-01-201-2/+2
|
* move ssh1 definitions to ssh1.h, pathnames to pathnames.hmarkus2001-01-191-9/+10
|
* log() is at pri=LOG_INFO, since LOG_NOTICE goes to /dev/console on many systemsmarkus2001-01-181-2/+2
|
* rename SYSLOG_LEVEL_INFO->SYSLOG_LEVEL_NOTICEmarkus2001-01-071-2/+2
| | | | | | syslog priority changes: fatal() LOG_ERR -> LOG_CRIT log() LOG_INFO -> LOG_NOTICE
* new option: HostKeyAlias: allows the user to record the host keymarkus2000-12-271-2/+9
| | | | | | under a different name. This is useful for ssh tunneling over forwarded connections or if you run multiple sshd's on different ports on the same machine.
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-5/+5
| | | | with u_char.
* add support for RSA to SSH2. please test.markus2000-11-121-29/+26
| | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
* new cipher frameworkmarkus2000-10-111-2/+1
|
* add support for s/key (kbd-interactive) to ssh2, based on work by mkiernan@avantgo.com and memarkus2000-10-111-2/+17
|
* some more Copyright fixesmarkus2000-09-071-24/+1
|
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-7/+28
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* disallow kerberos authentication if we can't verify the TGT; fromprovos2000-08-021-2/+2
| | | | | dugsong@ kerberos authentication is on by default only if you have a srvtab.
* disable kerberos authentication by defaultprovos2000-08-021-2/+2
|
* allow leading whitespace. ok nielsmarkus2000-07-141-2/+2
|
* allow multiple whitespace but only one '=' between tokens, bug report fromprovos2000-07-131-28/+26
| | | | Ralf S. Engelschall <rse@engelschall.com> but different fix. okay deraadt@
* disable FallBackToRsh by defaultderaadt2000-07-111-2/+2
|
* Get the correct message on errors. (niels@ ok)ho2000-07-101-17/+17
|
* Better conditions for strsep() ending.ho2000-07-091-4/+6
|
* replace strtok with strsep; from David Young <dyoung@onthejob.net>provos2000-07-081-73/+73
|
* OpenBSD tagmarkus2000-06-201-1/+1
|
* include = in WHITESPACE; markus okderaadt2000-06-181-2/+2
|
* typo, unusedmarkus2000-05-311-2/+2
|
* xauth_location support; pr 1234markus2000-05-311-2/+12
|
* forwardagent defaults to no, add ssh -Amarkus2000-05-291-2/+2
|
* check strtok() != NULL; ok niels@markus2000-05-221-1/+7
|
* complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)markus2000-05-081-2/+3
|
* add DSAAuthetication option to ssh/sshd, document SSH2 in sshd.8markus2000-05-061-2/+10
|
* default DSA key file ~/.ssh/id_dsamarkus2000-05-021-5/+3
|
* ssh/sshd default to proto 1 and 2markus2000-04-261-2/+2
|