| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
| |
redirected to /dev/null; ok djm@
|
|
|
|
| |
preventing them from having no timeout. bz#2918, ok djm@
|
|
|
|
|
|
| |
an unknown host key. This allows you to paste a fingerprint obtained
out of band into the yes/no prompt and have the client do the comparison
for you. ok markus@ djm@
|
|
|
|
| |
with & ok markus@
|
|
|
|
|
|
|
|
|
|
|
| |
almost exactly six years ago.
This change stops including the old packet_* API by default and makes
each file that requires the old API include it explicitly. We will
commit file-by-file refactoring to remove the old API in consistent
steps.
with & ok markus@
|
|
|
|
|
|
|
|
|
|
|
| |
out the banner exchange. This eliminates some common code from the
client and server.
Also be more strict about handling \r characters - these should only
be accepted immediately before \n (pointed out by Jann Horn).
Inspired by a patch from Markus Schmidt.
(lots of) feedback and ok markus@
|
|
|
|
|
| |
Fixes mosh in proxycommand mode that was broken by the previous
ProxyCommand change that was reported by matthieu@. ok djm@ danj@
|
|
|
|
| |
ControlPersist; based on patch from Steffen Prohaska
|
|
|
|
|
| |
the size.
OK kn, deraadt
|
|
|
|
|
| |
which signature algorithms may be used by CAs when signing certificates.
Useful if you want to ban RSA/SHA1; ok markus@
|
|
|
|
|
| |
original_effective_uid globals and replace with calls to plain getuid().
ok djm@
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
setuid has been removed, remove supporting code and clean up
references to it in the man pages
We have not shipped ssh(1) the setuid bit since 2002. If ayone
really needs to make connections from a low port number this can
be implemented via a small setuid ProxyCommand.
ok markus@ jmc@ djm@
|
|
|
|
|
| |
Do not link uidwap.c into ssh any more. Neuters UsePrivilegedPort,
which will be marked as deprecated shortly. ok markus@ djm@
|
| |
|
| |
|
|
|
|
| |
with codespell tool (https://github.com/lucasdemarchi/codespell)
|
|
|
|
|
|
|
| |
The code is not compiled in by default (see WITH_XMSS in Makefile.inc)
Joint work with stefan-lukas_gazdag at genua.eu
See https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-signatures-12
ok djm@
|
|
|
|
| |
Caught by the tinderbox's -Werror=misleading-indentation, ok djm@
|
|
|
|
|
|
|
|
|
|
|
| |
to ssh(1) that directs it to bind its outgoing connection to the
address of the specified network interface.
BindInterface prefers to use addresses that aren't loopback or link-
local, but will fall back to those if no other addresses of the
required family are available on that interface.
Based on patch by Mike Manning in bz#2820, ok dtucker@
|
|
|
|
| |
https://github.com/openssh/openssh-portable/pull/56 by Vincent Brillault
|
|
|
|
| |
callers. ok djm@
|
|
|
|
| |
ok deraadt@
|
|
|
|
|
|
|
|
|
|
| |
ssh.com <=2.* and OpenSSH <= 3.*.
These versions were all released in or before 2001 and predate the
final SSH RFCs. The hacks in question aren't necessary for RFC-
compliant SSH implementations.
ok markus@
|
|
|
|
| |
final error message possibly accurate; bz#2814, ok dtucker@
|
|
|
|
| |
bz#2803 reported by Maksim Derbasov; ok dtucker@
|
|
|
|
|
|
|
| |
timeval respectively. Replace calls to gettimeofday() in packet timing
with monotime_tv so that the callers will work over a clock step.
Should prevent integer overflow during clock steps reported by wangle6
at huawei.com. "I like" markus@
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
-------------
identify the case where SSHFP records are missing but other DNS RR
types are present and display a more useful error message for this
case; patch by Thordur Bjornsson; bz#2501; ok dtucker@
-------------
This caused unexpected failures when VerifyHostKeyDNS=yes, SSHFP results
are missing but the user already has the key in known_hosts
Spotted by dtucker@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Move static state to a "struct ssh_channels" that is allocated at
runtime and tracked as a member of struct ssh.
Explicitly pass "struct ssh" to all channels functions.
Replace use of the legacy packet APIs in channels.c.
Rework sshd_config PermitOpen handling: previously the configuration
parser would call directly into the channels layer. After the refactor
this is not possible, as the channels structures are allocated at
connection time and aren't available when the configuration is parsed.
The server config parser now tracks PermitOpen itself and explicitly
configures the channels code later.
ok markus@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
StrictModes=accept-new will automatically accept hitherto-unseen keys
but will refuse connections for changed or invalid hostkeys.
StrictModes=off is the same as StrictModes=no
Motivation:
StrictModes=no combines two behaviours for host key processing:
automatically learning new hostkeys and continuing to connect to hosts
with invalid/changed hostkeys. The latter behaviour is quite dangerous
since it removes most of the protections the SSH protocol is supposed to
provide.
Quite a few users want to automatically learn hostkeys however, so
this makes that feature available with less danger.
At some point in the future, StrictModes=no will change to be a synonym
for accept-new, with its current behaviour remaining available via
StrictModes=off.
bz#2400, suggested by Michael Samuel; ok markus
|
|
|
|
|
| |
types are present and display a more useful error message for this
case; patch by Thordur Bjornsson; bz#2501; ok dtucker@
|
|
|
|
| |
remaining bit that it still used into ssh-rsa.c; ok markus
|
|
|
|
| |
ok deraadt@ a while back
|
|
|
|
| |
certificate principal names; bz#2728; ok dtucker@
|
| |
|
| |
|
| |
|
|
|
|
| |
ok markus@
|
|
|
|
| |
ok markus@
|
|
|
|
| |
ok markus@
|
|
|
|
| |
ok markus@
|
|
|
|
| |
bz#2687, ok djm@
|
|
|
|
|
| |
rather than pulling <sys/param.h> and unknown namespace pollution.
ok djm markus dtucker
|
| |
|
| |
|
| |
|
|
|
|
|
| |
ssh_connect_direct() to print an uninitialised stack variable;
bz#2500 reported by dvw AT phas.ubc.ca
|
| |
|
|
|
|
|
|
|
|
|
|
| |
'ask', or 'confirm', and defaults to 'no'. When enabled, a private
key that is used during authentication will be added to ssh-agent if
it is running (with confirmation enabled if set to 'confirm').
Initial version from Joachim Schipper many years ago.
ok markus@
|