summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshconnect.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* move #include <sys/wait.h> out of includes.h; ok markus@stevesk2006-02-101-1/+4
|
* <openssl/bn.h> not neededstevesk2006-02-081-3/+1
|
* move #include <paths.h> out of includes.h; ok markus@stevesk2006-02-081-1/+3
|
* Add support for tun(4) forwarding over OpenSSH, based on an idea andreyk2005-12-061-1/+37
| | | | | | | | | | | | initial channel code bits by markus@. This is a simple and easy way to use OpenSSH for ad hoc virtual private network connections, e.g. administrative tunnels or secure wireless access. It's based on a new ssh channel and works similar to the existing TCP forwarding support, except that it depends on the tun(4) network interface on both ends of the connection for layer 2 or layer 3 tunneling. This diff also adds support for LocalCommand in the ssh(1) client. ok djm@, markus@, jmc@ (manpages), tested and discussed with others
* no need to escape single quotes in comments, no binary changedjm2005-10-301-2/+2
|
* make external definition static; ok deraadt@stevesk2005-10-151-3/+2
|
* knf says that a 2nd level indent is four (not three or five) spacesdjm2005-07-171-4/+4
|
* spacingdjm2005-07-161-2/+2
|
* Fix ControlPath's %p expanding to "0" for a default port,djm2005-06-171-10/+1
| | | | spotted dwmw2 AT infradead.org; ok markus@
* make this -Wsign-compare clean; ok avsm@ markus@djm2005-06-171-2/+3
|
* introduce a generic %foo expansion function. replace existing % expansion anddjm2005-06-061-30/+11
| | | | add expansion to ControlPath; ok markus@
* Switch atomicio to use a simpler interface; it now returns a size_tavsm2005-05-241-6/+7
| | | | | | | | | | | (containing number of bytes read/written), and indicates error by returning 0. EOF is signalled by errno==EPIPE. Typical use now becomes: if (atomicio(read, ..., len) != len) err(1,"read"); ok deraadt@, cloder@, djm@
* spacingderaadt2005-03-101-3/+3
|
* fix addition of new hashed hostnames when CheckHostIP=yes;djm2005-03-021-10/+25
| | | | found and ok dtucker@
* add support for hashing host names and addresses added to known_hosts files,djm2005-03-011-3/+4
| | | | to improve privacy of which hosts user have been visiting; ok markus@ deraadt@
* remove dead code, log connect() failures with level error, ok djm@markus2005-01-051-17/+3
|
* make ssh -Wshadow clean, no functional changesavsm2004-06-211-6/+6
| | | | markus@ ok
* kill a tiny header; ok deraadt@djm2004-05-081-2/+1
|
* reset nonblocking flag after ConnectTimeout > 0 connect; (bugzilla #785)djm2004-01-251-5/+6
| | | | from jclonguet AT free.fr; ok millert@
* rename keepalive to tcpkeepalive; the old name causes too muchmarkus2003-12-091-3/+3
| | | | confusion; ok djm, dtucker; with help from jmc@
* unexpand and delete whitespace at EOL; ok markus@djm2003-11-211-5/+5
|
* update SSHFP validation. ok markus@jakob2003-11-121-19/+21
|
* constify. ok markus@ & djm@jakob2003-11-101-2/+2
|
* do not free static type pointer in warn_changed_key()jakob2003-11-031-3/+2
|
* move changed key warning into warn_changed_key(). ok markus@jakob2003-11-031-12/+25
|
* include SSHFP lookup code (not enabled by default). ok markus@jakob2003-10-141-9/+1
|
* missing {}; bug #656; jclonguet at free.frmarkus2003-09-181-2/+3
|
* memset 0, not \0; andrushock@korovino.netmarkus2003-06-291-2/+2
|
* deal with typing of write vs read in atomicioderaadt2003-06-281-2/+2
|
* clean up check_host_key() and improve SSHFP feedback. ok markus@jakob2003-06-111-8/+34
|
* disable challenge/response and keyboard-interactive auth methods upon hostkeydjm2003-06-041-2/+13
| | | | mismatch. based on patch from fcusack AT fcusack.com. bz #580; ok markus@
* fix format strings; ok markus@djm2003-05-261-3/+3
|
* fix leak; ok markus@djm2003-05-231-7/+9
|
* add a ConnectTimeout option to ssh, based on patch fromdjm2003-05-151-2/+68
| | | | Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
* add experimental support for verifying hos keys using DNS as describedjakob2003-05-141-1/+22
| | | | | in draft-ietf-secsh-dns-xx.txt. more information in README.dns. ok markus@ and henning@
* avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTPmarkus2003-04-141-8/+10
|
* rename log() into logit() to avoid name conflict. markus ok, from netbsditojun2003-04-081-11/+11
|
* KNFderaadt2002-11-211-5/+5
|
* debug->debug2, unify debug messagesmarkus2002-11-211-2/+2
|
* bugzilla.mindrot.org #223 - ProxyCommands don't exit.djm2002-09-191-3/+13
| | | | Patch from dtucker@zip.com.au; ok markus@
* remove use of SO_LINGER, it should not be needed. error checkstevesk2002-09-131-11/+1
| | | | SO_REUSEADDR. fixup comments. ok markus@
* print file:linemarkus2002-07-291-2/+2
|
* print out all known keys for a host if we get a unknown host key,markus2002-07-241-4/+69
| | | | | | | | | | | see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4 the ssharp mitm tool attacks users in a similar way, so i'd like to pointed out again: A MITM attack is always possible if the ssh client prints: The authenticity of host 'bla' can't be established. (protocol version 2 with pubkey authentication allows you to detect MITM attacks)
* print connect failure during debugging mode.itojun2002-07-121-14/+3
|
* bark if all connection attempt fails.itojun2002-07-101-7/+5
|
* ed static function (less warnings)itojun2002-07-091-1/+3
|
* silently try next address on connect(2). markus okitojun2002-07-091-1/+3
|
* more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@markus2002-06-271-2/+2
|
* various KNF and %d for unsignedderaadt2002-06-231-3/+2
|
* KNF done automatically while reading....deraadt2002-06-191-2/+2
|