Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | move #include <sys/wait.h> out of includes.h; ok markus@ | 2006-02-10 | 1 | -1/+4 | ||
| | ||||||
* | move #include <termios.h> out of includes.h; ok markus@ | 2006-02-07 | 1 | -1/+3 | ||
| | ||||||
* | if forced_tun_device is not set, it is -1 and not SSH_TUNID_ANY | 2005-12-13 | 1 | -2/+2 | ||
| | ||||||
* | two changes to the new ssh tunnel support. this breaks compatibility | 2005-12-08 | 1 | -7/+18 | ||
| | | | | | | | | | | | | with the initial commit but is required for a portable approach. - make the tunnel id u_int and platform friendly, use predefined types. - support configuration of layer 2 (ethernet) or layer 3 (point-to-point, default) modes. configuration is done using the Tunnel (yes|point-to-point|ethernet|no) option is ssh_config(5) and restricted by the PermitTunnel (yes|point-to-point|ethernet|no) option in sshd_config(5). ok djm@, man page bits by jmc@ | |||||
* | Add support for tun(4) forwarding over OpenSSH, based on an idea and | 2005-12-06 | 1 | -1/+33 | ||
| | | | | | | | | | | | | initial channel code bits by markus@. This is a simple and easy way to use OpenSSH for ad hoc virtual private network connections, e.g. administrative tunnels or secure wireless access. It's based on a new ssh channel and works similar to the existing TCP forwarding support, except that it depends on the tun(4) network interface on both ends of the connection for layer 2 or layer 3 tunneling. This diff also adds support for LocalCommand in the ssh(1) client. ok djm@, markus@, jmc@ (manpages), tested and discussed with others | |||||
* | make sure we clean up wtmp, etc. file when we receive a SIGTERM, | 2005-10-31 | 1 | -1/+35 | ||
| | | | | | | SIGINT or SIGQUIT when running without privilege separation (the normal privsep case is already OK). Patch mainly by dtucker@ and senthilkumar_sen AT hotpop.com; ok dtucker@ | |||||
* | no need to escape single quotes in comments, no binary change | 2005-10-30 | 1 | -2/+2 | ||
| | ||||||
* | fix regression I introduced in 4.2: X11 forwardings initiated after | 2005-10-10 | 1 | -2/+2 | ||
| | | | | | a session has exited (e.g. "(sleep 5; xterm) &") would not start. bz #1086 reported by t8m AT centrum.cz; ok markus@ dtucker@ | |||||
* | knf says that a 2nd level indent is four (not three or five) spaces | 2005-07-17 | 1 | -2/+2 | ||
| | ||||||
* | some signed/unsigned int comparison cleanups; markus@ ok | 2004-08-11 | 1 | -3/+4 | ||
| | ||||||
* | bz #756: add support for the cancel-tcpip-forward request for the server and | 2004-05-21 | 1 | -1/+12 | ||
| | | | | | the client (through the ~C commandline). reported by z3p AT twistedmatrix.com; ok markus@ | |||||
* | fix mem leaks; some fixes from Pete Flugstad; tested dtucker@ | 2004-01-19 | 1 | -7/+7 | ||
| | ||||||
* | make ClientKeepAlive work for ssh -N, too (no login shell requested). | 2003-12-09 | 1 | -17/+15 | ||
| | | | | | | 1) send a bogus channel request if we find a channel 2) send a bogus global request if we don't have a channel ok + test beck@ | |||||
* | Correct check for authctxt->valid. ok djm@ | 2003-11-18 | 1 | -2/+2 | ||
| | ||||||
* | standardise arguments to auth methods - they should all take authctxt. | 2003-11-04 | 1 | -3/+3 | ||
| | | | | check authctxt->valid rather then pw != NULL; ok markus@ | |||||
* | replace fatal_cleanup() and linked list of fatal callbacks with static | 2003-09-23 | 1 | -8/+6 | ||
| | | | | | | cleanup_exit() function. re-refine cleanup_exit() where appropriate, allocate sshd's authctxt eary to allow simpler cleanup in sshd. tested by many, ok deraadt@ | |||||
* | int -> u_int; ok djm@, deraadt@, mouring@ | 2003-06-24 | 1 | -3/+3 | ||
| | ||||||
* | remove bitrotten commet; ok markus@ | 2003-06-04 | 1 | -2/+2 | ||
| | ||||||
* | make channel_new() strdup the 'remote_name' (not the caller); ok theo | 2003-05-11 | 1 | -3/+3 | ||
| | ||||||
* | reapply rekeying chage, tested by henning@, ok djm@ | 2003-04-02 | 1 | -2/+8 | ||
| | ||||||
* | backout rekeying changes (for 3.6.1) | 2003-04-01 | 1 | -8/+2 | ||
| | ||||||
* | rekeying bugfixes and automatic rekeying: | 2003-04-01 | 1 | -2/+8 | ||
| | | | | | | | | | | | | * both client and server rekey _automatically_ (a) after 2^31 packets, because after 2^32 packets the sequence number for packets wraps (b) after 2^(blocksize_in_bits/4) blocks (see: http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt) (a) and (b) are _enabled_ by default, and only disabled for known openssh versions, that don't support rekeying properly. * client option 'RekeyLimit' * do not reply to requests during rekeying | |||||
* | log IP address also; ok markus@ | 2002-09-19 | 1 | -3/+7 | ||
| | ||||||
* | move channel counter to u_int | 2002-06-24 | 1 | -4/+2 | ||
| | ||||||
* | pid_t cleanup. Markus need this now to keep hacking. | 2002-06-11 | 1 | -3/+3 | ||
| | | | | | | | markus@, millert@ ok Note: big usr.bin/ cleanup is comming. Now I'm waiting Ok from espie@ for make/. | |||||
* | check waitpid for EINTR; based on patch from peter@ifm.liu.se | 2002-03-30 | 1 | -7/+9 | ||
| | ||||||
* | remove unused debug | 2002-03-24 | 1 | -4/+1 | ||
| | ||||||
* | integrate privilege separated openssh; its turned off by default for now. | 2002-03-18 | 1 | -2/+2 | ||
| | | | | work done by me and markus@ | |||||
* | channel_new never returns NULL, mouring@; ok djm@ | 2002-02-06 | 1 | -9/+1 | ||
| | ||||||
* | don't use channel_input_channel_request and callback | 2002-02-03 | 1 | -4/+29 | ||
| | | | | | | | use new server_input_channel_req() instead: server_input_channel_req does generic request parsing on server side session_input_channel_req handles just session specific things now ok djm@ | |||||
* | no need for WNOHANG; ok stevesk@ | 2002-01-31 | 1 | -2/+2 | ||
| | ||||||
* | wrapper for channel_setup_fwd_listener | 2002-01-16 | 1 | -6/+3 | ||
| | ||||||
* | skip client_alive_check until there are channels; ok beck@ | 2002-01-10 | 1 | -4/+10 | ||
| | ||||||
* | remove plen from the dispatch fn. it's no longer used. | 2001-12-28 | 1 | -7/+7 | ||
| | ||||||
* | packet_read* no longer return the packet length, since it's not used. | 2001-12-28 | 1 | -3/+2 | ||
| | ||||||
* | s/packet_done/packet_check_eom/ (end-of-message); ok djm@ | 2001-12-28 | 1 | -6/+6 | ||
| | ||||||
* | get rid of packet_integrity_check, use packet_done() instead. | 2001-12-27 | 1 | -4/+4 | ||
| | ||||||
* | remove ifdef for USE_PIPES since fdin != fdout; ok djm@ | 2001-12-21 | 1 | -9/+1 | ||
| | ||||||
* | Conformance fix: we should send failing packet sequence number when | 2001-12-20 | 1 | -7/+7 | ||
| | | | | | responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by yakk@yakk.dot.net; ok markus@ | |||||
* | fix race between SIGCHLD and select with an additional pipe. writing | 2001-12-19 | 1 | -1/+57 | ||
| | | | | | | to the pipe on SIGCHLD wakes up select(). using pselect() is not portable and siglongjmp() ugly. W. R. Stevens suggests similar solution. initial idea by pmenage@ensim.com; ok deraadt@, djm@ | |||||
* | basic KNF done while i was looking for something else | 2001-12-19 | 1 | -6/+6 | ||
| | ||||||
* | deal with LP64 printf issue with sig_atomic_t. from thorpej | 2001-12-05 | 1 | -2/+3 | ||
| | ||||||
* | volatile sig_atomic_t | 2001-11-22 | 1 | -2/+2 | ||
| | ||||||
* | don't memset too much memory, ok millert@ | 2001-11-09 | 1 | -3/+3 | ||
| | | | | original patch from jlk@kamens.brookline.ma.us via nalin@redhat.com | |||||
* | try to keep channels open until an exit-status message is sent. | 2001-10-10 | 1 | -28/+29 | ||
| | | | | | | don't kill the login shells if the shells stdin/out/err is closed. this should now work: ssh -2n localhost 'exec > /dev/null 2>&1; sleep 10; exit 5'; echo ? | |||||
* | simplify session close: no more delayed session_close, no more blocking wait() calls. | 2001-10-09 | 1 | -23/+15 | ||
| | ||||||
* | close all channels if the connection to the remote host has been closed, | 2001-10-09 | 1 | -4/+8 | ||
| | | | | should fix sshd's hanging with WCHAN==wait | |||||
* | client_alive_check cleanup | 2001-10-04 | 1 | -27/+24 | ||
| | ||||||
* | comment out bogus conditions for selecting on connection_in | 2001-10-04 | 1 | -2/+4 | ||
| | ||||||
* | don't send fake dummy packets on CR (\r) | 2001-09-17 | 1 | -4/+8 | ||
| | | | | bugreport from yyua@cs.sfu.ca via solar@@openwall.com |