Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | remove global variable used to stash compat flags and use the | 2021-01-27 | 1 | -4/+3 | |
| | | | | purpose-built ssh->compat variable instead; feedback/ok markus@ | ||||
* | Update/replace the experimental post-quantim hybrid key exchange | 2020-12-29 | 1 | -2/+2 | |
| | | | | | | | | | | | | | | | | | | method based on Streamlined NTRU Prime (coupled with X25519). The previous sntrup4591761x25519-sha512@tinyssh.org method is replaced with sntrup761x25519-sha512@openssh.com. Per the authors, sntrup4591761 was replaced almost two years ago by sntrup761. The sntrup761 implementaion, like sntrup4591761 before it, is public domain code extracted from the SUPERCOP cryptography benchmark suite (https://bench.cr.yp.to/supercop.html). Thanks for Daniel J Bernstein for guidance on algorithm selection. Patch from Tobias Heider; feedback & ok markus@ and myself (note this both the updated method and the one that it replaced are disabled by default) | ||||
* | fix SEGV on fatal() errors spotted by dtucker@ | 2020-10-19 | 1 | -2/+2 | |
| | |||||
* | use the new variant log macros instead of prepending __func__ and | 2020-10-18 | 1 | -7/+5 | |
| | | | | appending ssh_err(r) manually; ok markus@ | ||||
* | variants of the log methods that append a ssherr.h string from | 2020-10-18 | 1 | -3/+3 | |
| | | | | a supplied error code; ok markus@ | ||||
* | make the log functions that exit (sshlogdie(), sshfatal(), etc) have | 2020-10-17 | 1 | -4/+4 | |
| | | | | identical signatures. Makes things a bit more consistent... | ||||
* | revised log infrastructure for OpenSSH | 2020-10-16 | 1 | -4/+5 | |
| | | | | | | | log functions receive function, filename and line number of caller. We can use this to selectively enable logging via pattern-lists. ok markus@ | ||||
* | ssh-keyscan(1): simplify conloop() with timercmp(3), timersub(3); ok djm@ | 2020-08-12 | 1 | -13/+5 | |
| | |||||
* | allow ssh-keyscan to find security key hostkeys | 2019-12-15 | 1 | -3/+21 | |
| | |||||
* | fixes for !WITH_OPENSSL compilation; ok dtucker@ | 2019-09-06 | 1 | -1/+3 | |
| | |||||
* | include SHA2-variant RSA key algorithms in KEX proposal; allows | 2019-07-12 | 1 | -2/+7 | |
| | | | | | ssh-keyscan to harvest keys from servers that disable olde SHA1 ssh-rsa. bz#3029 from Jakub Jelen | ||||
* | When system calls indicate an error they return -1, not some arbitrary | 2019-06-28 | 1 | -6/+6 | |
| | | | | | | value < 0. errno is only updated in this case. Change all (most?) callers of syscalls to follow this better, and let's see if this strictness helps us in the future. | ||||
* | Replace calls to ssh_malloc_init() by a static init of malloc_options. | 2019-06-06 | 1 | -2/+1 | |
| | | | | Prepares for changes in the way malloc is initialized. ok guenther@ dtucker@ | ||||
* | make ssh-keyscan return a non-zero exit status if it finds no keys. | 2019-01-26 | 1 | -2/+6 | |
| | | | | bz#2903 | ||||
* | merge kexkem[cs] into kexgen | 2019-01-21 | 1 | -9/+9 | |
| | | | | from markus@ ok djm@ | ||||
* | use KEM API for vanilla ECDH | 2019-01-21 | 1 | -2/+2 | |
| | | | | from markus@ ok djm@ | ||||
* | use KEM API for vanilla DH KEX | 2019-01-21 | 1 | -6/+6 | |
| | | | | from markus@ ok djm@ | ||||
* | use KEM API for vanilla c25519 KEX | 2019-01-21 | 1 | -2/+2 | |
| | |||||
* | Add support for a PQC KEX/KEM: sntrup4591761x25519-sha512@tinyssh.org | 2019-01-21 | 1 | -1/+2 | |
| | | | | | | | | | using the Streamlined NTRU Prime 4591^761 implementation from SUPERCOP coupled with X25519 as a stop-loss. Not enabled by default. introduce KEM API; a simplified framework for DH-ish KEX methods. from markus@ feedback & ok djm@ | ||||
* | switch config file parsing to getline(3) as this avoids static limits | 2018-06-06 | 1 | -7/+5 | |
| | | | | noted by gerhard@; ok dtucker@, djm@ | ||||
* | apply a lick of paint; tweaks/ok dtucker | 2018-03-02 | 1 | -2/+2 | |
| | |||||
* | Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures) | 2018-02-23 | 1 | -2/+10 | |
| | | | | | | | The code is not compiled in by default (see WITH_XMSS in Makefile.inc) Joint work with stefan-lukas_gazdag at genua.eu See https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-signatures-12 ok djm@ | ||||
* | Add ssh-keyscan -D option to make it print its results in SSHFP format | 2018-02-23 | 1 | -4/+16 | |
| | | | | bz#2821, ok dtucker@ | ||||
* | Add monotime_ts and monotime_tv that return monotonic timespec and | 2017-11-25 | 1 | -4/+4 | |
| | | | | | | | timeval respectively. Replace calls to gettimeofday() in packet timing with monotime_tv so that the callers will work over a clock step. Should prevent integer overflow during clock steps reported by wangle6 at huawei.com. "I like" markus@ | ||||
* | Only call close once in confree(). ssh_packet_close will close the FD | 2017-06-30 | 1 | -3/+3 | |
| | | | | | so only explicitly close non-SSH channels. bz#2734, from bagajjal at microsoft.com, ok djm@ | ||||
* | remove now obsolete ctx from ssh_dispatch_run; ok djm@ | 2017-05-31 | 1 | -2/+2 | |
| | |||||
* | obliterate ssh1.h and some dead code that used it | 2017-04-30 | 1 | -2/+1 | |
| | | | | ok markus@ | ||||
* | remove KEY_RSA1 | 2017-04-30 | 1 | -36/+28 | |
| | | | | ok markus@ | ||||
* | remove compat20/compat13/compat15 variables | 2017-04-30 | 1 | -2/+1 | |
| | | | | ok markus@ | ||||
* | unifdef WITH_SSH1 | 2017-04-30 | 1 | -58/+1 | |
| | | | | ok markus@ | ||||
* | ensure hostname is lower-case before hashing it; bz#2591 reported by | 2017-03-10 | 1 | -1/+2 | |
| | | | | Griff Miller II; ok dtucker@ | ||||
* | correctly hash hosts with a port number. Reported by Josh Powers in | 2017-03-10 | 1 | -6/+7 | |
| | | | | bz#2692; ok dtucker@ | ||||
* | Avoid confusing error message when attempting to use ssh-keyscan built | 2017-01-06 | 1 | -2/+6 | |
| | | | | without SSH protocol v.1 to scan for v.1 keys; bz#2583 | ||||
* | add support for additional fixed DH groups from | 2016-05-02 | 1 | -1/+4 | |
| | | | | | | | | | | | draft-ietf-curdle-ssh-kex-sha2-03 diffie-hellman-group14-sha256 (2K group) diffie-hellman-group16-sha512 (4K group) diffie-hellman-group18-sha512 (8K group) based on patch from Mark D. Baushke and Darren Tucker ok markus@ | ||||
* | Add a function to enable security-related malloc_options. With and ok | 2016-02-15 | 1 | -1/+2 | |
| | | | | deraadt@, something similar has been in the snaps for a while. | ||||
* | -c before -H, in SYNOPSIS and usage(); | 2015-11-08 | 1 | -2/+2 | |
| | |||||
* | Add "ssh-keyscan -c ..." flag to allow fetching certificates instead | 2015-11-08 | 1 | -10/+37 | |
| | | | | of plain keys; ok markus@ | ||||
* | fix keyscan output for multiple hosts/addrs on one line when | 2015-10-24 | 1 | -6/+21 | |
| | | | | host hashing or a non standard port is in use; bz#2479 ok dtucker@ | ||||
* | include port number if a non-default one has been specified; | 2015-04-10 | 1 | -3/+6 | |
| | | | | based on patch from Michael Handler | ||||
* | Do not use int for sig_atomic_t; spotted by christos@netbsd; ok markus@ | 2015-04-05 | 1 | -2/+2 | |
| | |||||
* | set a timeout to prevent hangs when talking to busted servers; | 2015-01-30 | 1 | -1/+2 | |
| | | | | ok markus@ | ||||
* | avoid more fatal/exit in the packet.c paths that ssh-keyscan | 2015-01-30 | 1 | -2/+3 | |
| | | | | uses; feedback and "looks good" markus@ | ||||
* | avoid fatal() calls in packet code | 2015-01-28 | 1 | -3/+5 | |
| | | | | | makes ssh-keyscan more reliable against server failures ok dtucker@ markus@ | ||||
* | Reduce use of <sys/param.h> and transition to <limits.h> throughout. | 2015-01-20 | 1 | -2/+1 | |
| | | | | ok djm markus | ||||
* | switch ssh-keyscan from setjmp to multiple ssh transport layer instances | 2015-01-19 | 1 | -68/+81 | |
| | | | | ok djm@ | ||||
* | adapt kex to sshbuf and struct ssh; ok djm@ | 2015-01-19 | 1 | -6/+8 | |
| | |||||
* | explicitly include sys/param.h in files that use the howmany() macro; | 2014-12-11 | 1 | -1/+2 | |
| | | | | from portable | ||||
* | make compiling against OpenSSL optional (make OPENSSL=no); | 2014-04-29 | 1 | -1/+7 | |
| | | | | | reduces algorithms to curve25519, aes-ctr, chacha, ed25519; allows us to explore further options; with and ok djm | ||||
* | disable weak proposals in sshd, but keep them in ssh; ok djm@ | 2014-03-27 | 1 | -1/+2 | |
| | |||||
* | scan for Ed25519 keys by default too | 2014-03-12 | 1 | -2/+2 | |
| |