summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* add LogLevel {QUIET, FATAL, ERROR, INFO, CHAT, DEBUG} to ssh/sshd,markus1999-11-101-7/+9
| | | | obsoletes QuietMode and FascistLogging in sshd.
* save a few lines when disabling rhosts-{rsa-}authmarkus1999-10-281-9/+3
|
* don't define original_real_uid twicemarkus1999-10-261-3/+1
|
* fix old connect() race security-bug for ssh-agent and agent-forwardingmarkus1999-10-141-2/+2
| | | | | | | | | | by removing the connect() junk, with the following restrictions: 1) change the version to "OpenSSH-1.1": agent-forwarding will work only between OpenSSH-1.1 client and OpenSSH-1.1 server 2) renamed the environment variable of OpenSSH-1.1 to "SSH_AUTH_SOCKET", since useing OpenSSH-1.0 ssh-add against the new ssh-agent does not work
* -P/UsePrivilegedPort from 1.2.27, it turns of allocation of priv. portmarkus1999-10-121-2/+14
| | | | and disabled rhosts/rhosts-rsa, ok deraadt@
* add code to detect DNS spoofing:provos1999-10-031-3/+6
| | | | | | | | | | the main idea is to not only store the host key for the hostname but also for the according IP address. When we check the host key in the known_hosts file, we also check the key against the according IP address. When the server key changes, host_status = HOST_CHANGED. If check_host_in_hostfile() returns differing status for the IP address that means that either DNS was spoofed or that the IP address for the host and the host key changed at the same time.
* reorder usage, like real sshderaadt1999-09-301-2/+2
|
* better way to deal with authfile cipher; dugsong@provos1999-09-301-3/+1
|
* remove ``none''.provos1999-09-301-11/+4
|
* "ssh is a very large program" -- anonymousderaadt1999-09-301-3/+1
|
* wringing out all the waterderaadt1999-09-301-5/+1
|
* do not bother with dinosaur pacificationderaadt1999-09-301-3/+1
|
* cull more ancient garbage from pre-POSIX daysderaadt1999-09-301-7/+1
|
* more cullingderaadt1999-09-301-6/+1
|
* rely on paths.h morederaadt1999-09-301-8/+4
|
* we have setsidderaadt1999-09-291-3/+1
|
* numerous sprintf, strncpy, strcpy cleanupsderaadt1999-09-291-12/+8
|
* global original_real_uiddugsong1999-09-291-2/+3
|
* update krb4/AFS support to ssh-1.2.27-afs-kerberos-pl1 level, clean up unused variables, update manpagesdugsong1999-09-291-11/+10
|
* -V in usage()provos1999-09-291-1/+2
|
* correct the usage, disable agent forwarding is -aprovos1999-09-291-2/+2
|
* add -V optionderaadt1999-09-291-1/+4
|
* test for RSA in the ssl library, real early onderaadt1999-09-291-1/+11
|
* GatewayPorts and ssh -g; markus.friedl@informatik.uni-erlangen.dederaadt1999-09-291-1/+6
|
* user@host; aaronderaadt1999-09-281-2/+8
|
* convert all uses of gmp to SSL bignumprovos1999-09-281-32/+26
| | | | | | convert all used of rsa to SSL rsa functions remove all use of randomstate to OpenBSD arc4random() and arc4_stir() all this done at a long long night in Canada.
* i bet a lot of people didn't know what ssh 1.2.16 had a nice license.deraadt1999-09-261-0/+813
well, except for the patent issues. someone in sweden (forget their name at the moment) cleaned out most of the patented code, and now this code removes rsa code. when this is done, it will link against libssl, but the work isn't completely done yet. then we need to bring this up to modern days, featurewise.