summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* rhosts-rsa is no longer automagically disabled if ssh is not privileged.markus2000-12-121-12/+7
| | | | | UsePrivilegedPort=no disables rhosts-rsa _only_ for old servers. these changes should not change the visible default behaviour of the ssh client.
* consistently use __progname; from stevesk@pobox.commarkus2000-12-121-13/+4
|
* check -T before isatty()markus2000-11-301-4/+4
|
* complain about invalid ciphers for ssh1/ssh2, fall back to reasonable defaultsmarkus2000-11-231-4/+10
|
* just ignore non existing user keysmarkus2000-11-151-2/+2
|
* add support for RSA to SSH2. please test.markus2000-11-121-37/+45
| | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
* do not disabled rhosts(rsa) if server port > 1024; from pekkas@netcore.fimarkus2000-11-061-1/+3
|
* agent forwarding and -R for ssh2, based on work from jhuuskon@messi.uku.fimarkus2000-11-061-51/+60
|
* enable non-blocking IO on channels, and tty's (except for the client ttys).markus2000-10-271-2/+10
|
* new cipher frameworkmarkus2000-10-111-3/+4
|
* do not resolve canonname, i have no idea why this was added oin osshmarkus2000-10-031-17/+1
|
* multiple debug levelsmarkus2000-09-121-3/+12
|
* cleanup window and packet sizes for ssh2 flow control; ok nielsmarkus2000-09-071-9/+7
|
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-3/+31
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* allow combination of -N and -fmarkus2000-08-281-2/+2
|
* enable -n and -f for ssh2markus2000-08-281-8/+12
|
* Add calls to setusercontext() and login_get*(). We basically callmillert2000-08-201-1/+2
| | | | | setusercontext() in most places where previously we did a setlogin(). Add default login.conf file and put root in the "daemon" login class.
* support for ~. in ssh2markus2000-08-191-7/+14
|
* accept remsh as a valid name as well; roman@buildpoint.comderaadt2000-08-191-3/+3
|
* make ssh-add accept dsa keys (the agent does not)markus2000-07-161-2/+2
|
* Always create ~/.ssh with mode 700; ok Markusdjm2000-07-151-2/+2
|
* OpenBSD tagmarkus2000-06-201-1/+1
|
* xauth_location support; pr 1234markus2000-05-311-12/+12
|
* remove dependency on openssl-0.9.5a; green@FreeBSD.org via kris@FreeBSD.orgmarkus2000-05-301-2/+2
|
* forwardagent defaults to no, add ssh -Amarkus2000-05-291-1/+5
|
* fix usage()markus2000-05-151-2/+3
|
* complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)markus2000-05-081-1/+2
|
* support for x11-fwding, client+servermarkus2000-04-281-43/+59
|
* add DSA pubkey auth and other SSH2 fixes. use ssh-keygen -[xX]markus2000-04-261-18/+49
| | | | | for trading keys with the real and the original SSH, directly from the people who invented the SSH protocol.
* whitespace cleanupmarkus2000-04-141-31/+8
|
* ssh -2markus2000-04-141-1/+6
|
* add Cipher and Protocol options to ssh/sshd, e.g.:markus2000-04-121-3/+6
| | | | ssh -o 'Protocol 1,2' if you prefer proto 1, ssh -o 'Ciphers arcfour,3des-cbc'
* ssh2 client implementation, interops w/ ssh.com and lsh servers.markus2000-04-041-15/+147
|
* replace big switch() with function tables (prepare for ssh2)markus2000-03-281-1/+2
|
* switch to raw mode only if he _get_ a pty (not if we _want_ a pty).markus2000-03-231-4/+6
|
* remove unused cipher_attack_detected codemarkus2000-03-221-4/+1
|
* turn off x11-fwd for the client, too.markus2000-02-281-1/+2
|
* suppress AAAA query host when '-4' is used; from shin@nd.net.fujitsu.co.jpmarkus2000-02-201-2/+2
|
* more hints (hints.ai_socktype=SOCK_STREAM) for getaddrinfo, from itojun@markus2000-01-041-1/+2
|
* 'ssh @host' is illegal (null user name), from karsten@gedankenpolizei.demarkus2000-01-041-1/+3
|
* ipv6 support: mostly gethostbyname->getaddrinfo/getnameinfo, new features:markus2000-01-041-15/+36
| | | | | | sshd allows multiple ListenAddress and Port options. note that libwrap is not IPv6-ready. (based on patches from <kick@kyoto.wide.ad.jp> and fujiwara@rcac.tdi.co.jp)
* type conflict for 'extern Type *options' in channels.c; dot@dotat.atmarkus1999-12-121-2/+3
|
* ports are u_shortmarkus1999-12-011-10/+6
|
* postpone fork_after_authentication until command execution,markus1999-11-241-10/+6
| | | | | request/patch from jahakala@cc.jyu.fi via damien@ibs.com.au plus: use daemon() for backgrounding
* KNF, final part 3markus1999-11-241-67/+100
|
* much more KNFderaadt1999-11-241-23/+18
|
* KNF part 1markus1999-11-231-702/+649
|
* a note for legay systems about secuity issues with permanently_set_uid(),markus1999-11-151-1/+8
| | | | the private hostkey and ptrace()
* print _all_ bad config-options in ssh(1), toomarkus1999-11-141-3/+4
|
* make all access to options via 'extern Options options'markus1999-11-111-2/+2
| | | | | | | | and 'extern ServerOptions options' respectively; options are no longer passed as arguments: * make options handling more consistent * remove #include "readconf.h" from ssh.h * readconf.h is only included if necessary