| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
other similar level. bz#2599, patch from cgallek at gmail.com, ok markus@
|
|
|
|
|
|
| |
safe fmprintf printer; bz#2058
feedback schwarze@ ok dtucker@
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
draft-ietf-curdle-ssh-kex-sha2-03
diffie-hellman-group14-sha256 (2K group)
diffie-hellman-group16-sha512 (4K group)
diffie-hellman-group18-sha512 (8K group)
based on patch from Mark D. Baushke and Darren Tucker
ok markus@
|
|
|
|
|
|
| |
sshbuf_dup_string() to replace a common idiom of
strdup(sshbuf_ptr()) with better safety checking;
feedback and ok markus@
|
| |
|
|
|
|
|
|
|
|
| |
when attempting pubkey auth with a certificate, if no separate
private key is found among the keys then try with the certificate
key itself.
bz#2550 reported by Peter Moody
|
|
|
|
| |
keys; reported by espie@ ok deraadt@
|
|
|
|
| |
ok markus@ djm@
|
| |
|
| |
|
|
|
|
| |
ok djm@
|
| |
|
|
|
|
| |
ok dtucker@
|
|
|
|
| |
ok dtucker@
|
|
|
|
|
| |
based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt;
with & ok djm@
|
|
|
|
|
|
| |
make tests consistent
ok markus@
|
|
|
|
|
|
|
|
|
|
| |
'ask', or 'confirm', and defaults to 'no'. When enabled, a private
key that is used during authentication will be added to ssh-agent if
it is running (with confirmation enabled if set to 'confirm').
Initial version from Joachim Schipper many years ago.
ok markus@
|
|
|
|
| |
keys are noted before pubkey authentication starts. ok dtucker@
|
|
|
|
| |
a certificate; patch from Meghana Bhat on bz#2436; ok markus@
|
|
|
|
|
|
|
| |
by a '+' to indicate that the specified items be appended to the
default rather than replacing it.
approach suggested by dtucker@, feedback dlg@, ok markus@
|
|
|
|
|
| |
PubkeyAcceptedKeyTypes to the client side, so it still can be
tested or turned back on; feedback and ok djm@
|
|
|
|
|
|
|
|
|
|
| |
we only ever use it for strlen(pattern).
Prompted by hanno AT hboeck.de pointing an out-of-bound read
error caused by an incorrect pattern length found using AFL
and his own tools.
ok markus@
|
|
|
|
|
|
|
|
|
| |
host public key types are tried during hostbased authentication.
This may be used to prevent too many keys being sent to the server,
and blowing past its MaxAuthTries limit.
bz#2211 based on patch by Iain Morgan; ok markus@
|
|
|
|
|
| |
check sshkey_fingerprint return values;
ok markus
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
a) switch packet.c to buffer api and isolate per-connection info into struct ssh
b) (de)serialization of the state is moved from monitor to packet.c
c) the old packet.c API is implemented in opacket.[ch]
d) compress.c/h is removed and integrated into packet.c
with and ok djm@
|
| |
|
|
|
|
| |
agent present
|
|
|
|
| |
ok markus@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
interfaces. Refactor the generic key loading API to not require
pathnames to be specified (they weren't really used).
Fixes a few other things en passant:
Makes ed25519 keys work for hostbased authentication (ssh-keysign
previously used the PEM-only routines).
Fixes key comment regression bz#2306: key pathnames were being lost as
comment fields.
ok markus@
|
|
|
|
|
|
|
| |
fingerprints. Default changes from MD5 to SHA256 and format
from hex to base64.
Feedback and ok naddy@ markus@
|
|
|
|
| |
hostbased auth; patch from Iain Morgan
|
|
|
|
|
|
|
|
| |
may be forwarded to a local Unix domain socket and vice versa or
both ends may be a Unix domain socket. This is a reimplementation
of the streamlocal patches by William Ahern from:
http://www.25thandclement.com/~william/projects/streamlocal.html
OK djm@ markus@
|
|
|
|
|
|
|
|
|
| |
existing API is offered as a set of wrappers.
with and ok markus@
Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
Dempsky and Ron Bowes for a detailed review a few months ago.
|
|
|
|
| |
not to be preferred. Reported by Dirk-Willem van Gulik
|
|
|
|
|
| |
reduces algorithms to curve25519, aes-ctr, chacha, ed25519;
allows us to explore further options; with and ok djm
|
|
|
|
|
|
|
|
|
|
| |
using the curve25519-sha256@libssh.org KEX exchange method to fail
when connecting with something that implements the spec properly.
Disable this KEX method when speaking to one of the affected
versions.
reported by Aris Adamantiadis; ok markus@
|
| |
|
| |
|
|
|
|
| |
ok djm dtucker
|
| |
|
|
|
|
|
|
| |
rather than calling OpenSSL EVP_Digest* directly. Will make it easier
to build a reduced-feature OpenSSH without OpenSSL in future;
feedback, ok markus@
|
|
|
|
|
|
| |
obsolete RSA+MD5 signature scheme. it will still be possible to connect
with these clients/servers but only DSA keys will be accepted, and we'll
deprecate them entirely in a future release. ok markus@
|
|
|
|
| |
initial patch from Aris Adamantiadis; ok djm@
|
| |
|