| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
ok markus@
|
|
|
|
| |
sshd(8). bz#2705, patch from erahn at arista.com, ok djm@
|
|
|
|
|
| |
excluding SHA2 RSA signature methods. bz#2680, patch from Nuno
Goncalves; ok dtucker@
|
|
|
|
|
| |
characters can confuse some shells (e.g. zsh).
Reported by Lauri Tirkkonen via bugs@
|
|
|
|
| |
literal IPv6 addresses. From Dick Visser; ok dtucker@
|
|
|
|
|
|
|
| |
corresponding bare public key. E.g. just a private id_rsa and certificate
id_rsa-cert.pub (and no id_rsa.pub).
bz#2617 ok dtucker@
|
|
|
|
|
|
|
|
|
| |
- mux client speaks the ssh-packet protocol directly over unix-domain socket.
- mux server acts as a proxy, translates channel IDs and relays to the server.
- no filedescriptor passing necessary.
- combined with unix-domain forwarding it's even possible to run mux client
and server on different machines.
feedback & ok djm@
|
|
|
|
|
| |
Reported by mb AT smartftp.com in bz#2547 and (independantly)
Ron Frederick; ok markus@
|
|
|
|
|
|
| |
safe fmprintf printer; bz#2058
feedback schwarze@ ok dtucker@
|
|
|
|
|
|
|
| |
- formatting fixes
- update usage()
ok djm
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
command-line flag to allow simplified indirection through a
SSH bastion or "jump host".
These options construct a proxy command that connects to the
specified jump host(s) (more than one may be specified) and uses
port-forwarding to establish a connection to the next destination.
This codifies the safest way of indirecting connections through SSH
servers and makes it easy to use.
ok markus@
|
|
|
|
| |
using ssh -W (but still default to yes in that case). bz#2577, ok djm@.
|
|
|
|
| |
This will make future changes a bit easier. ok djm@
|
| |
|
| |
|
|
|
|
|
| |
debug mode or when logging to a file or syslog.
bz#1988 ok dtucker
|
|
|
|
|
|
|
| |
places that use them (authn and session code). After this, no state is
cached in canohost.c
feedback and ok markus@
|
|
|
|
| |
deraadt@, something similar has been in the snaps for a while.
|
| |
|
|
|
|
|
|
| |
disabled/gutted for years already, but this aspect was surprisingly
forgotten.
Thanks for report from Qualys
|
|
|
|
|
| |
forwarding when the X server disables the SECURITY extension;
Reported by Thomas Hoger; ok deraadt@
|
|
|
|
| |
support. From Iain Morgan bz#2505
|
|
|
|
| |
ok dtucker@
|
|
|
|
|
| |
ssh_connect_direct() to print an uninitialised stack variable;
bz#2500 reported by dvw AT phas.ubc.ca
|
|
|
|
|
|
| |
identity file exists. This means that if the shell doesn't do the expansion
(eg because the option and filename were given as a single argument) then
we'll still add the key. bz#2481, ok markus@
|
|
|
|
|
| |
canonicalisation - treat them as already canonical and remove the
trailing '.' before matching ssh_config; ok markus@
|
|
|
|
| |
strings; reported by Nicholas Lemonias
|
|
|
|
| |
a certificate; patch from Meghana Bhat on bz#2436; ok markus@
|
|
|
|
|
| |
i've reformatted the block to sync with the man (80 cols) and
saved a line;
|
| |
|
|
|
|
| |
patch from Christian Hesse w/ feedback from dtucker@
|
|
|
|
| |
patch from Tiago Cunha, ok deraadt djm
|
|
|
|
| |
ssh could previously silently hang for a while. bz#2433
|
|
|
|
|
|
|
| |
by a '+' to indicate that the specified items be appended to the
default rather than replacing it.
approach suggested by dtucker@, feedback dlg@, ok markus@
|
| |
|
|
|
|
|
|
|
|
|
|
| |
we only ever use it for strlen(pattern).
Prompted by hanno AT hboeck.de pointing an out-of-bound read
error caused by an incorrect pattern length found using AFL
and his own tools.
ok markus@
|
|
|
|
| |
requested; bz#1682 ok dtucker@
|
|
|
|
|
| |
versions. Useful for detecting builds without SSH v.1 support;
idea and ok markus@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
I accidentally changed the format of the hostkeys@openssh.com messages
last week without changing the extension name, and this has been causing
connection failures for people who are running -current. First reported
by sthen@
s/hostkeys@openssh.com/hostkeys-00@openssh.com/
Change the name of the proof message too, and reorder it a little.
Also, UpdateHostKeys=ask is incompatible with ControlPersist (no TTY
available to read the response) so disable UpdateHostKeys if it is in
ask mode and ControlPersist is active (and document this)
|
|
|
|
| |
ok djm markus
|
|
|
|
|
|
| |
as addresses before looking them up for canonicalisation.
fixes bz#2074 and avoids needless DNS lookups in some cases;
ok markus
|
|
|
|
| |
ok markus@
|
|
|
|
| |
hostkey algorithms order in myproposal.h; ok markus@
|
|
|
|
| |
ok deraadt@ millert@ tedu@
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Make the second pass through the config files always run when
hostname canonicalisation is enabled.
Add a "Match canonical" criteria that allows ssh_config Match
blocks to trigger only in the second config pass.
Add a -G option to ssh that causes it to parse its configuration
and dump the result to stdout, similar to "sshd -T"
Allow ssh_config Port options set in the second config parse
phase to be applied (they were being ignored).
bz#2267 bz#2286; ok markus
|
|
|
|
|
| |
previously we were always returning 0. bz#2255 reported by Brendan
Germain; ok dtucker
|
|
|
|
|
|
|
|
| |
may be forwarded to a local Unix domain socket and vice versa or
both ends may be a Unix domain socket. This is a reimplementation
of the streamlocal patches by William Ahern from:
http://www.25thandclement.com/~william/projects/streamlocal.html
OK djm@ markus@
|
|
|
|
|
|
|
|
|
|
| |
to a unique identifer based on a has of the tuple of (local host,
remote user, hostname, port).
Helps avoid exceeding sockaddr_un's miserly pathname limits for mux
control paths.
bz#2220, based on patch from mancha1 AT zoho.com; ok markus@
|
|
|
|
| |
with gerhard@, ok djm@
|