summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshconnect2.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* more ssh v2 hostbased-auth interop: ssh.com >= 2.1.0 works nowmarkus2001-04-181-10/+6
| | | | (however the 2.1.0 server seems to work only if debug is enabled...)
* use FDQN with trailing dot in the hostbased auth packets, ok deraadt@markus2001-04-181-3/+6
|
* add HostKeyAlgorithms; based on patch from res@shore.net; ok provos@markus2001-04-171-1/+4
|
* some unused variable and typos; from tomh@po.crl.go.jpmarkus2001-04-151-3/+3
|
* implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2)markus2001-04-121-3/+108
| | | | | similar to RhostRSAAuthentication unless you enable (the experimental) HostbasedUsesNameFromPacketOnly option. please test. :)
* fix whitespace: unexpand + trailing spaces.markus2001-04-051-3/+3
|
* more robust rekeyingmarkus2001-04-041-2/+2
| | | | don't send channel data after rekeying is started.
* enable server side rekeying + some rekey related clientup.markus2001-04-041-7/+3
| | | | todo: we should not send any non-KEX messages after we send KEXINIT
* don't sent multiple kexinit-requests.markus2001-04-041-3/+3
| | | | | send newkeys, block while waiting for newkeys. fix comments.
* enable client rekeyingmarkus2001-04-041-1/+5
| | | | | | (1) force rekeying with ~R, or (2) if the server requests rekeying. works against ssh-2.0.12/2.0.13/2.1.0/2.2.0/2.3.0/2.3.1/2.4.0
* undo parts of recent my changes: main part of keyexchange does notmarkus2001-04-031-1/+4
| | | | | | | need dispatch-callbacks, since application data is delayed until the keyexchange completes (if i understand the drafts correctly). add some infrastructure for re-keying.
* move kex to kex*.c, used dispatch_set() callbacks for kex. shouldmarkus2001-04-031-381/+28
| | | | make rekeying easier.
* need to set both STOC and CTOS for SSH_BUG_BIGENDIANAES; ok markus@stevesk2001-03-291-4/+5
|
* use recommended defaultsprovos2001-03-291-2/+2
|
* forgot to include min and max params in hash, okay markus@provos2001-03-281-2/+9
|
* make dh group exchange more flexible, allow min and max group size,provos2001-03-271-6/+29
| | | | okay markus@, deraadt@
* simpler key load/save interface, see authfile.hmarkus2001-03-261-14/+8
|
* Compat for OpenSSH with broken Rijndael/AES. ok markus@djm2001-03-231-1/+4
|
* remove old key_fingerprint interface, s/_ex//markus2001-03-121-4/+5
|
* add PreferredAuthenticationsmarkus2001-03-101-77/+55
|
* ignore nonexisting private keys; report rjmooney@mediaone.netmarkus2001-03-101-1/+6
|
* implement client side of SSH2_MSG_USERAUTH_PK_OK (test public key ->markus2001-03-081-57/+215
| | | | | no need to do enter passphrase or do expensive sign operations if the server does not accept key).
* generate a 2*need size (~300 instead of 1024/2048) random privatemarkus2001-03-051-4/+4
| | | | | | | | | | | exponent during the DH key agreement. according to Niels (the great german advisor) this is safe since /etc/primes contains strong primes only. References: P. C. van Oorschot and M. J. Wiener, On Diffie-Hellman key agreement with short exponents, In Advances in Cryptology - EUROCRYPT'96, LNCS 1070, Springer-Verlag, 1996, pp.332-343.
* in ssh protocol v2 use ignore messages for padding (instead of trailing \0).markus2001-02-281-3/+5
|
* genericize password padding function for SSH1 and SSH2.markus2001-02-151-3/+3
| | | | add stylized echo to 2, too.
* 1) clean up the MAC support for SSH-2markus2001-02-111-3/+7
| | | | | | | 2) allow you to specify the MAC with 'ssh -m' 3) or the 'MACs' keyword in ssh(d)_config 4) add hmac-{md5,sha1}-96 ok stevesk@, provos@
* remove some linesmarkus2001-02-101-12/+5
|
* partial success: debug->log; "Permission denied" if no more auth methodsmarkus2001-02-091-3/+3
|
* do not free twice, thanks to /etc/malloc.confmarkus2001-02-091-2/+2
|
* %.30s is too short for IPv6 numeric address. use %.128s for now. markus okitojun2001-02-081-2/+2
|
* do not ask for passphrase in batch mode; report from ejb@ql.orgmarkus2001-02-061-5/+8
|
* unexpand and remove end-of-line whitespace; ok markus@stevesk2001-02-041-11/+11
|
* unusedmarkus2001-01-311-2/+1
|
* rename skey -> challenge response.markus2001-01-221-1/+4
| | | | auto-enable kbd-interactive for ssh2 if challenge-reponse is enabled.
* fix memory leaks in SSH2 key exchange; ok markus@stevesk2001-01-221-1/+7
|
* split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.markus2001-01-211-5/+6
| | | | rename util.[ch] -> misc.[ch]
* dh_new_group() does not return NULL. ok markus@stevesk2001-01-201-3/+2
|
* handle SSH2_MSG_USERAUTH_BANNER; fixes bug when connecting to a server that prints a banner (e.g. /etc/issue.net)markus2001-01-041-2/+16
|
* typomarkus2000-12-271-2/+2
|
* fix prototypes; from stevesk@pobox.commarkus2000-12-201-3/+3
|
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-21/+21
| | | | with u_char.
* compute diffie-hellman in parallel between server and client. okay markus@provos2000-12-151-1/+4
|
* support f-secure/ssh.com 2.0.12; ok niels@markus2000-12-031-7/+14
|
* complain about invalid ciphers for ssh1/ssh2, fall back to reasonable defaultsmarkus2000-11-231-9/+4
|
* add support for RSA to SSH2. please test.markus2000-11-121-34/+43
| | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
* don't reference freed memory. okay deraadt@provos2000-10-191-7/+8
|
* OpenSSH_2.3; note that is is not complete, but the version number needs to be changed for interoperability reasonsmarkus2000-10-141-5/+5
|
* enable DES in SSH-1 clients onlymarkus2000-10-121-1/+3
|
* new cipher frameworkmarkus2000-10-111-11/+9
|
* add support for s/key (kbd-interactive) to ssh2, based on work by mkiernan@avantgo.com and memarkus2000-10-111-24/+138
|