summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* add DSA pubkey auth and other SSH2 fixes. use ssh-keygen -[xX]markus2000-04-261-31/+4
| | | | | for trading keys with the real and the original SSH, directly from the people who invented the SSH protocol.
* pid_tderaadt2000-04-191-4/+4
|
* whitespace cleanupmarkus2000-04-141-15/+15
|
* add Cipher and Protocol options to ssh/sshd, e.g.:markus2000-04-121-6/+8
| | | | ssh -o 'Protocol 1,2' if you prefer proto 1, ssh -o 'Ciphers arcfour,3des-cbc'
* ssh2 server side, see README.openssh2; enable with 'sshd -2'markus2000-04-061-1/+5
|
* replace big switch() with function tables (prepare for ssh2)markus2000-03-281-170/+1
|
* initial support for DSA keys. ok deraadt@, niels@markus2000-03-231-33/+3
|
* int atomicio -> ssize_t (for alpha). ok deraadt@d2000-02-011-2/+2
|
* ipv6 support: mostly gethostbyname->getaddrinfo/getnameinfo, new features:markus2000-01-041-5/+10
| | | | | | sshd allows multiple ListenAddress and Port options. note that libwrap is not IPv6-ready. (based on patches from <kick@kyoto.wide.ad.jp> and fujiwara@rcac.tdi.co.jp)
* type conflict for 'extern Type *options' in channels.c; dot@dotat.atmarkus1999-12-121-3/+3
|
* move atomicio into it's own file. wrap all socket write()s which were doingderaadt1999-12-061-2/+7
| | | | write(sock, buf, len) != len, with atomicio() calls.
* document $SSH_ASKPASS, reasonable defaultmarkus1999-12-021-1/+8
|
* move skey-auth from auth-passwd.c to auth-skey.c, same for krb4markus1999-12-011-1/+3
|
* ports are u_shortmarkus1999-12-011-6/+6
|
* KNF, final part 3markus1999-11-241-204/+320
|
* much more KNFderaadt1999-11-241-162/+174
|
* tranfer s/key challenge/response data in SSH_SMSG_AUTH_TIS_CHALLENGEmarkus1999-11-221-6/+5
| | | | | messages. allows use of s/key in windows (ttssh, securecrt) and ssh-1.2.27 clients without 'ssh -v', ok: niels@
* syslog changes:markus1999-11-221-8/+8
| | | | | | | | | | | * Unified Logmessage for all auth-types, for success and for failed * Standard connections get only ONE line in the LOG when level==LOG: Auth-attempts are logged only, if authentication is: a) successfull or b) with passwd or c) we had more than AUTH_FAIL_LOG failues * many log() became verbose() * old behaviour with level=VERBOSE
* bugfix: loglevels are per host in clientconfig,markus1999-11-191-1/+5
| | | | factor out common log-level parsing code.
* the keysize of rsa-parameter 'n' is passed implizit,markus1999-11-151-9/+6
| | | | a few more checks and warnings about 'pretended' keysizes.
* make all access to options via 'extern Options options'markus1999-11-111-65/+57
| | | | | | | | and 'extern ServerOptions options' respectively; options are no longer passed as arguments: * make options handling more consistent * remove #include "readconf.h" from ssh.h * readconf.h is only included if necessary
* IgnoreUserKnownHosts(default=no), used for RhostRSAAuth, ok deraadt,millertmarkus1999-11-111-3/+2
|
* add LogLevel {QUIET, FATAL, ERROR, INFO, CHAT, DEBUG} to ssh/sshd,markus1999-11-101-56/+56
| | | | obsoletes QuietMode and FascistLogging in sshd.
* remove x11- and krb-cleanup from fatal() + krb-cleanup cleanupmarkus1999-11-101-6/+4
|
* remove unused argument. ok dugsongmarkus1999-11-021-2/+2
|
* from niklas: Add -c -s and -k support, Create socket early to avoid race,markus1999-10-281-1/+5
| | | | Don't let child access std{in,out,err}
* remove prototypes for old/removed minfd functionsmarkus1999-10-251-12/+2
|
* support for SSH protocol 1.5 which is poorly documented, the RFC.troff lies.markus1999-10-161-3/+8
| | | | interops (x11,agent,etc) with 1.2.27 and protocol 1.3
* -Wall cleanupprovos1999-10-161-2/+2
|
* fix old connect() race security-bug for ssh-agent and agent-forwardingmarkus1999-10-141-2/+2
| | | | | | | | | | by removing the connect() junk, with the following restrictions: 1) change the version to "OpenSSH-1.1": agent-forwarding will work only between OpenSSH-1.1 client and OpenSSH-1.1 server 2) renamed the environment variable of OpenSSH-1.1 to "SSH_AUTH_SOCKET", since useing OpenSSH-1.0 ssh-add against the new ssh-agent does not work
* make sure ~/.ssh/authorized_keys is not writable for group/world (sshd)markus1999-10-111-2/+2
| | | | don't load private keys if they are group/world-{rwx} (ssh,sshd and ssh-add)
* add skey to sshd:markus1999-10-071-2/+7
| | | | | | | | | | | | | | | 1) pass *pw to auth_password() not user_name, do_authentication already keeps private copy of struct passwd for current user. 2) limit authentication attemps to 5, otherwise ssh -o 'NumberOfPasswordPrompts 100000' host lets you enter 100000 passwds 3) make s/key a run-time option in /etc/sshd_config 4) generate fake skeys, for s/key for nonexisting users, too limit auth-tries for nonexisting users, too. Note that % ssh -l nonexisting-user -o 'NumberOfPasswordPrompts 100000' host has NO limits in ssh-1.2.27
* move auth-sockets to private dirmarkus1999-10-051-15/+1
| | | | delete minfd residua
* nuke genminfd/AUTH_FDmarkus1999-10-041-4/+1
|
* add code to detect DNS spoofing:provos1999-10-031-6/+9
| | | | | | | | | | the main idea is to not only store the host key for the hostname but also for the according IP address. When we check the host key in the known_hosts file, we also check the key against the according IP address. When the server key changes, host_status = HOST_CHANGED. If check_host_in_hostfile() returns differing status for the IP address that means that either DNS was spoofed or that the IP address for the host and the host key changed at the same time.
* get rid of references to randomseedfile we dont need it. for sshdprovos1999-10-011-9/+1
| | | | just spit out a warning that the configuration option is obsolete.
* update krb4/AFS support to ssh-1.2.27-afs-kerberos-pl1 level, clean up unused variables, update manpagesdugsong1999-09-291-2/+11
|
* convert all uses of gmp to SSL bignumprovos1999-09-281-25/+19
| | | | | | convert all used of rsa to SSL rsa functions remove all use of randomstate to OpenBSD arc4random() and arc4_stir() all this done at a long long night in Canada.
* build ssh components using our build modelderaadt1999-09-261-1/+10
|
* i bet a lot of people didn't know what ssh 1.2.16 had a nice license.deraadt1999-09-261-0/+596
well, except for the patent issues. someone in sweden (forget their name at the moment) cleaned out most of the patented code, and now this code removes rsa code. when this is done, it will link against libssl, but the work isn't completely done yet. then we need to bring this up to modern days, featurewise.