Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | implement 'ssh -b bind_address' like 'telnet -b' | 2001-04-30 | 1 | -2/+6 | |
| | |||||
* | undo socks5 and https support since they are not really used and | 2001-04-17 | 1 | -5/+1 | |
| | | | | only bloat ssh. remove -D from usage(), since '-D' is experimental. | ||||
* | protocol 2 tty modes support; ok markus@ | 2001-04-14 | 1 | -3/+6 | |
| | |||||
* | missing \n in error message | 2001-04-13 | 1 | -2/+2 | |
| | |||||
* | robust port validation; ok markus@ jakob@ | 2001-04-12 | 1 | -7/+7 | |
| | |||||
* | implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2) | 2001-04-12 | 1 | -10/+32 | |
| | | | | | similar to RhostRSAAuthentication unless you enable (the experimental) HostbasedUsesNameFromPacketOnly option. please test. :) | ||||
* | show debug output during option processing, report from pekkas@netcore.fi | 2001-04-12 | 1 | -2/+3 | |
| | |||||
* | https-connect and socks5 support. i feel so bad. | 2001-04-11 | 1 | -3/+4 | |
| | |||||
* | use strtol() for ports, thanks jakob@ | 2001-04-11 | 1 | -4/+12 | |
| | |||||
* | allow the ssh client act as a SOCKS4 proxy (dynamic local portforwarding). | 2001-04-07 | 1 | -2/+11 | |
| | | | | | | work by Dan Kaminsky <dankamin@cisco.com> and me. thanks to Dan for this great patch: use 'ssh -D 1080 host' and make netscape use localhost:1080 as a socks proxy. | ||||
* | do gid/groups-swap in addition to uid-swap, should help if /home/group | 2001-04-06 | 1 | -17/+15 | |
| | | | | | is chmod 750 + chgrp grp /home/group/, work be deraadt and me, thanks to olar@openwall.com is comments. we had many requests for this. | ||||
* | don't request a session for 'ssh -N', pointed out slade@shore.net | 2001-04-05 | 1 | -15/+23 | |
| | |||||
* | simpler key load/save interface, see authfile.h | 2001-03-26 | 1 | -45/+9 | |
| | |||||
* | implement client side of SSH2_MSG_USERAUTH_PK_OK (test public key -> | 2001-03-08 | 1 | -11/+35 | |
| | | | | | no need to do enter passphrase or do expensive sign operations if the server does not accept key). | ||||
* | log functions should not be passed strings that end in newline as they | 2001-03-04 | 1 | -4/+4 | |
| | | | | | get passed on to syslog() and when logging to stderr, do_log() appends its own newline. | ||||
* | add -m to usage; ok markus@ | 2001-03-04 | 1 | -1/+2 | |
| | |||||
* | log*.c -> log.c | 2001-03-03 | 1 | -5/+7 | |
| | |||||
* | don't truncate remote ssh-2 commands; from mkubita@securities.cz | 2001-03-01 | 1 | -3/+4 | |
| | | | | use min, not max for logging, fixes overflow. | ||||
* | shorten usage by a line | 2001-03-01 | 1 | -5/+4 | |
| | |||||
* | use pwcopy in ssh.c, too | 2001-02-22 | 1 | -11/+3 | |
| | |||||
* | -i supports DSA identities now; ok markus@ | 2001-02-21 | 1 | -2/+3 | |
| | |||||
* | cleanup -V output; noted by millert | 2001-02-17 | 1 | -4/+5 | |
| | |||||
* | 1) clean up the MAC support for SSH-2 | 2001-02-11 | 1 | -2/+12 | |
| | | | | | | | 2) allow you to specify the MAC with 'ssh -m' 3) or the 'MACs' keyword in ssh(d)_config 4) add hmac-{md5,sha1}-96 ok stevesk@, provos@ | ||||
* | remove mapping of argv[0] -> hostname | 2001-02-10 | 1 | -7/+1 | |
| | |||||
* | sync with netbsd tree changes. | 2001-02-08 | 1 | -5/+5 | |
| | | | | | | - more strict prototypes, include necessary headers - use paths.h/pathnames.h decls - size_t typecase to int -> u_long | ||||
* | reorder -{1,2,4,6} options. ok markus@ | 2001-02-06 | 1 | -3/+3 | |
| | |||||
* | add -1 option (force protocol version 1). ok markus@ | 2001-02-06 | 1 | -1/+5 | |
| | |||||
* | remove confusing callback code | 2001-02-06 | 1 | -2/+2 | |
| | |||||
* | fatal() if subsystem fails | 2001-02-06 | 1 | -2/+21 | |
| | |||||
* | unexpand and remove end-of-line whitespace; ok markus@ | 2001-02-04 | 1 | -3/+3 | |
| | |||||
* | make the alpha happy | 2001-02-04 | 1 | -2/+2 | |
| | |||||
* | do not disconnect if local port forwarding fails, e.g. if port is already in use | 2001-01-31 | 1 | -2/+6 | |
| | |||||
* | Allow invocation of sybsystem by commandline (-s); ok markus@ | 2001-01-29 | 1 | -3/+19 | |
| | |||||
* | split ssh.h and try to cleanup the #include mess. remove unnecessary #includes. | 2001-01-21 | 1 | -9/+11 | |
| | | | | rename util.[ch] -> misc.[ch] | ||||
* | move ssh1 definitions to ssh1.h, pathnames to pathnames.h | 2001-01-19 | 1 | -5/+7 | |
| | |||||
* | use log() instead of stderr | 2001-01-15 | 1 | -3/+3 | |
| | |||||
* | move callback to headerfile | 2001-01-13 | 1 | -4/+3 | |
| | |||||
* | split out keepalive from packet_interactive (from dale@accentre.com) | 2001-01-13 | 1 | -3/+7 | |
| | | | | set IPTOS_LOWDELAY TCP_NODELAY IPTOS_THROUGHPUT for ssh2, too. | ||||
* | multiple -t force pty allocation, document ORIGINAL_COMMAND | 2000-12-27 | 1 | -3/+6 | |
| | |||||
* | replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned' | 2000-12-19 | 1 | -4/+4 | |
| | | | | with u_char. | ||||
* | rhosts-rsa is no longer automagically disabled if ssh is not privileged. | 2000-12-12 | 1 | -12/+7 | |
| | | | | | UsePrivilegedPort=no disables rhosts-rsa _only_ for old servers. these changes should not change the visible default behaviour of the ssh client. | ||||
* | consistently use __progname; from stevesk@pobox.com | 2000-12-12 | 1 | -13/+4 | |
| | |||||
* | check -T before isatty() | 2000-11-30 | 1 | -4/+4 | |
| | |||||
* | complain about invalid ciphers for ssh1/ssh2, fall back to reasonable defaults | 2000-11-23 | 1 | -4/+10 | |
| | |||||
* | just ignore non existing user keys | 2000-11-15 | 1 | -2/+2 | |
| | |||||
* | add support for RSA to SSH2. please test. | 2000-11-12 | 1 | -37/+45 | |
| | | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication. | ||||
* | do not disabled rhosts(rsa) if server port > 1024; from pekkas@netcore.fi | 2000-11-06 | 1 | -1/+3 | |
| | |||||
* | agent forwarding and -R for ssh2, based on work from jhuuskon@messi.uku.fi | 2000-11-06 | 1 | -51/+60 | |
| | |||||
* | enable non-blocking IO on channels, and tty's (except for the client ttys). | 2000-10-27 | 1 | -2/+10 | |
| | |||||
* | new cipher framework | 2000-10-11 | 1 | -3/+4 | |
| |