summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* implement 'ssh -b bind_address' like 'telnet -b'markus2001-04-301-2/+6
|
* undo socks5 and https support since they are not really used andmarkus2001-04-171-5/+1
| | | | only bloat ssh. remove -D from usage(), since '-D' is experimental.
* protocol 2 tty modes support; ok markus@stevesk2001-04-141-3/+6
|
* missing \n in error messagestevesk2001-04-131-2/+2
|
* robust port validation; ok markus@ jakob@stevesk2001-04-121-7/+7
|
* implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2)markus2001-04-121-10/+32
| | | | | similar to RhostRSAAuthentication unless you enable (the experimental) HostbasedUsesNameFromPacketOnly option. please test. :)
* show debug output during option processing, report from pekkas@netcore.fimarkus2001-04-121-2/+3
|
* https-connect and socks5 support. i feel so bad.markus2001-04-111-3/+4
|
* use strtol() for ports, thanks jakob@markus2001-04-111-4/+12
|
* allow the ssh client act as a SOCKS4 proxy (dynamic local portforwarding).markus2001-04-071-2/+11
| | | | | | work by Dan Kaminsky <dankamin@cisco.com> and me. thanks to Dan for this great patch: use 'ssh -D 1080 host' and make netscape use localhost:1080 as a socks proxy.
* do gid/groups-swap in addition to uid-swap, should help if /home/groupmarkus2001-04-061-17/+15
| | | | | is chmod 750 + chgrp grp /home/group/, work be deraadt and me, thanks to olar@openwall.com is comments. we had many requests for this.
* don't request a session for 'ssh -N', pointed out slade@shore.netmarkus2001-04-051-15/+23
|
* simpler key load/save interface, see authfile.hmarkus2001-03-261-45/+9
|
* implement client side of SSH2_MSG_USERAUTH_PK_OK (test public key ->markus2001-03-081-11/+35
| | | | | no need to do enter passphrase or do expensive sign operations if the server does not accept key).
* log functions should not be passed strings that end in newline as theymillert2001-03-041-4/+4
| | | | | get passed on to syslog() and when logging to stderr, do_log() appends its own newline.
* add -m to usage; ok markus@stevesk2001-03-041-1/+2
|
* log*.c -> log.cmarkus2001-03-031-5/+7
|
* don't truncate remote ssh-2 commands; from mkubita@securities.czmarkus2001-03-011-3/+4
| | | | use min, not max for logging, fixes overflow.
* shorten usage by a linederaadt2001-03-011-5/+4
|
* use pwcopy in ssh.c, toomarkus2001-02-221-11/+3
|
* -i supports DSA identities now; ok markus@stevesk2001-02-211-2/+3
|
* cleanup -V output; noted by millertderaadt2001-02-171-4/+5
|
* 1) clean up the MAC support for SSH-2markus2001-02-111-2/+12
| | | | | | | 2) allow you to specify the MAC with 'ssh -m' 3) or the 'MACs' keyword in ssh(d)_config 4) add hmac-{md5,sha1}-96 ok stevesk@, provos@
* remove mapping of argv[0] -> hostnamemarkus2001-02-101-7/+1
|
* sync with netbsd tree changes.itojun2001-02-081-5/+5
| | | | | | - more strict prototypes, include necessary headers - use paths.h/pathnames.h decls - size_t typecase to int -> u_long
* reorder -{1,2,4,6} options. ok markus@jakob2001-02-061-3/+3
|
* add -1 option (force protocol version 1). ok markus@jakob2001-02-061-1/+5
|
* remove confusing callback codemarkus2001-02-061-2/+2
|
* fatal() if subsystem failsmarkus2001-02-061-2/+21
|
* unexpand and remove end-of-line whitespace; ok markus@stevesk2001-02-041-3/+3
|
* make the alpha happyderaadt2001-02-041-2/+2
|
* do not disconnect if local port forwarding fails, e.g. if port is already in usemarkus2001-01-311-2/+6
|
* Allow invocation of sybsystem by commandline (-s); ok markus@djm2001-01-291-3/+19
|
* split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.markus2001-01-211-9/+11
| | | | rename util.[ch] -> misc.[ch]
* move ssh1 definitions to ssh1.h, pathnames to pathnames.hmarkus2001-01-191-5/+7
|
* use log() instead of stderrmarkus2001-01-151-3/+3
|
* move callback to headerfilemarkus2001-01-131-4/+3
|
* split out keepalive from packet_interactive (from dale@accentre.com)markus2001-01-131-3/+7
| | | | set IPTOS_LOWDELAY TCP_NODELAY IPTOS_THROUGHPUT for ssh2, too.
* multiple -t force pty allocation, document ORIGINAL_COMMANDmarkus2000-12-271-3/+6
|
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-4/+4
| | | | with u_char.
* rhosts-rsa is no longer automagically disabled if ssh is not privileged.markus2000-12-121-12/+7
| | | | | UsePrivilegedPort=no disables rhosts-rsa _only_ for old servers. these changes should not change the visible default behaviour of the ssh client.
* consistently use __progname; from stevesk@pobox.commarkus2000-12-121-13/+4
|
* check -T before isatty()markus2000-11-301-4/+4
|
* complain about invalid ciphers for ssh1/ssh2, fall back to reasonable defaultsmarkus2000-11-231-4/+10
|
* just ignore non existing user keysmarkus2000-11-151-2/+2
|
* add support for RSA to SSH2. please test.markus2000-11-121-37/+45
| | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
* do not disabled rhosts(rsa) if server port > 1024; from pekkas@netcore.fimarkus2000-11-061-1/+3
|
* agent forwarding and -R for ssh2, based on work from jhuuskon@messi.uku.fimarkus2000-11-061-51/+60
|
* enable non-blocking IO on channels, and tty's (except for the client ttys).markus2000-10-271-2/+10
|
* new cipher frameworkmarkus2000-10-111-3/+4
|