| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
| |
HostbasedAcceptedAlgorithms, which more accurately reflects its effect.
This matches a previous change to PubkeyAcceptedAlgorithms. The previous
names are retained as aliases. ok djm@
|
|
|
|
|
|
|
|
| |
While the two were originally equivalent, this actually specifies the
signature algorithms that are accepted. Some key types (eg RSA) can be
used by multiple algorithms (eg ssh-rsa, rsa-sha2-512) so the old name is
becoming increasingly misleading. The old name is retained as an alias.
Prompted by bz#3253, help & ok djm@, man page help jmc@
|
|
|
|
|
|
| |
entries for it to the -O list in scp.1 and sftp.1;
ok djm
|
|
|
|
|
|
| |
issue, which cannot be fully fixed and really requires completely
replacing scp with a completely different subsystem.
team effort to find the right words..
|
|
|
|
|
| |
default remains to not forward an agent, even when ssh_config enables
it. ok jmc dtucker markus
|
| |
|
| |
|
|
|
|
| |
ok markus
|
|
|
|
| |
ok dtucker
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
copies satisfy the wildcard specified by the user.
This checking provides some protection against a malicious server
sending unexpected filenames, but it comes at a risk of rejecting wanted
files due to differences between client and server wildcard expansion rules.
For this reason, this also adds a new -T flag to disable the check.
reported by Harry Sintonen
fix approach suggested by markus@;
has been in snaps for ~1wk courtesy deraadt@
|
| |
|
| |
|
|
|
|
|
|
| |
to match ssh(1)'s interface.
ok djm
|
|
|
|
| |
ok djm
|
|
|
|
|
|
|
|
|
|
|
| |
setuid has been removed, remove supporting code and clean up
references to it in the man pages
We have not shipped ssh(1) the setuid bit since 2002. If ayone
really needs to make connections from a low port number this can
be implemented via a small setuid ProxyCommand.
ok markus@ jmc@ djm@
|
| |
|
|
|
|
|
|
|
|
| |
variables for the remote session (subject to the server accepting them)
refactor SendEnv to remove the arbitrary limit of variable names.
ok markus@
|
| |
|
|
|
|
|
|
| |
bit more readable;
issue reported by - and diff ok - millert
|
|
|
|
|
|
|
| |
or sftp://user@host/path. The connection parameters described in
draft-ietf-secsh-scp-sftp-ssh-uri-04 are not implemented since the
ssh fingerprint format in the draft uses md5 with no way to specify
the hash function type. OK djm@
|
|
|
|
| |
ok markus@
|
| |
|
|
|
|
| |
ok markus@
|
|
|
|
|
|
|
| |
- formatting fixes
- update usage()
ok djm
|
| |
|
| |
|
| |
|
|
|
|
|
| |
PubkeyAcceptedKeyTypes to the client side, so it still can be
tested or turned back on; feedback and ok djm@
|
|
|
|
|
|
|
|
|
| |
host public key types are tried during hostbased authentication.
This may be used to prevent too many keys being sent to the server,
and blowing past its MaxAuthTries limit.
bz#2211 based on patch by Iain Morgan; ok markus@
|
| |
|
|
|
|
|
| |
add it to -o lists for ssh, scp and sftp;
pointed out by jmc@
|
| |
|
|
|
|
| |
ok deraadt millert
|
| |
|
|
|
|
| |
From: Jan Stary
|
| |
|
| |
|
|
|
|
| |
verbiage in these pages too (prompted by jmc@)
|
|
|
|
| |
scp.c: add -3 to usage()
|
|
|
|
|
| |
transferred through the local host. Without this option the data
is copied directly between the two remote hosts. ok djm@ (bugzilla #1837)
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-11/v2-20/pkcs-11v2-20.pdf
ssh(1) and ssh-keygen(1) use dlopen(3) directly to talk to a PKCS#11
provider (shared library) while ssh-agent(1) delegates PKCS#11 to
a forked a ssh-pkcs11-helper process.
PKCS#11 is currently a compile time option.
feedback and ok djm@; inspired by patches from Alon Bar-Lev
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
with "route exec" or "nc -V" as a proxycommand. "route exec" also ensures
that trafic such as DNS lookups stays withing the specified routingdomain.
For example (from reyk):
# route -T 2 exec /usr/sbin/sshd
or inherited from the parent process
$ route -T 2 exec sh
$ ssh 10.1.2.3
ok deraadt@ markus@ stevesk@ reyk@
|
|
|
|
|
|
|
|
|
| |
consistent with other options.
NOTE: if you currently use RDomain in the ssh client or server config,
or ssh/sshd -o, you must update to use RoutingDomain.
ok markus@ djm@
|
|
|
|
| |
ok markus@
|
|
|
|
| |
s/RSA authentication/public key authentication/
|