Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | more u_* fixes | 2002-02-25 | 1 | -3/+3 | ||
| | ||||||
* | signed vs. unsigned: make size arguments u_int, ok stevesk@ | 2002-02-24 | 1 | -11/+13 | ||
| | ||||||
* | more cross checking if announced vs. used key type; ok stevesk@ | 2002-02-03 | 1 | -3/+9 | ||
| | ||||||
* | unused include | 2002-01-25 | 1 | -9/+1 | ||
| | ||||||
* | use buffer API and avoid static strings of fixed size; ok provos@/mouring@ | 2002-01-13 | 1 | -10/+11 | ||
| | ||||||
* | remove plen from the dispatch fn. it's no longer used. | 2001-12-28 | 1 | -13/+13 | ||
| | ||||||
* | packet_read* no longer return the packet length, since it's not used. | 2001-12-28 | 1 | -4/+3 | ||
| | ||||||
* | s/packet_done/packet_check_eom/ (end-of-message); ok djm@ | 2001-12-28 | 1 | -5/+5 | ||
| | ||||||
* | Conformance fix: we should send failing packet sequence number when | 2001-12-20 | 1 | -13/+13 | ||
| | | | | | responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by yakk@yakk.dot.net; ok markus@ | |||||
* | basic KNF done while i was looking for something else | 2001-12-19 | 1 | -4/+4 | ||
| | ||||||
* | minor KNF | 2001-12-05 | 1 | -4/+4 | ||
| | ||||||
* | make it compile with more strict prototype checking | 2001-12-05 | 1 | -13/+13 | ||
| | ||||||
* | pad using the padding field from the ssh2 packet instead of sending | 2001-11-07 | 1 | -3/+3 | ||
| | | | | extra ignore messages. tested against several other ssh servers. | |||||
* | hostbased: check for client hostkey before building chost | 2001-10-29 | 1 | -14/+15 | ||
| | ||||||
* | unify hostkey check error messages, simplify prompt. | 2001-10-06 | 1 | -2/+2 | ||
| | ||||||
* | disable kbd-interactive if we don't get SSH2_MSG_USERAUTH_INFO_REQUEST messages | 2001-08-31 | 1 | -1/+13 | ||
| | ||||||
* | reorder default sequence of userauth methods to match ssh behaviour: | 2001-07-23 | 1 | -9/+9 | ||
| | | | | hostbased,publickey,keyboard-interactive,password | |||||
* | add smartcard support to the client, too (now you can use both | 2001-06-26 | 1 | -1/+6 | ||
| | | | | the agent and the client). | |||||
* | prototype cleanup; ok markus@ | 2001-06-25 | 1 | -3/+4 | ||
| | ||||||
* | oops, missing format string | 2001-06-24 | 1 | -3/+3 | ||
| | ||||||
* | switch to readpassphrase(3) | 2001-06-24 | 1 | -5/+4 | ||
| | | | | 2.7/8-stable needs readpassphrase.[ch] from libc | |||||
* | more strict prototypes. raise warning level in Makefile.inc. markus ok'ed | 2001-06-23 | 1 | -19/+19 | ||
| | | | | TODO; cleanup headers | |||||
* | get rid of known_hosts2, use it for hostkey lookup, but do not modify. | 2001-06-23 | 1 | -5/+5 | ||
| | ||||||
* | change preferredauthentication order to | 2001-05-19 | 1 | -5/+5 | ||
| | | | | | publickey,hostbased,password,keyboard-interactive document that hostbased defaults to no, document order | |||||
* | improved kbd-interactive support. work by per@appgate.com and me | 2001-05-18 | 1 | -2/+3 | ||
| | ||||||
* | more ssh v2 hostbased-auth interop: ssh.com >= 2.1.0 works now | 2001-04-18 | 1 | -10/+6 | ||
| | | | | (however the 2.1.0 server seems to work only if debug is enabled...) | |||||
* | use FDQN with trailing dot in the hostbased auth packets, ok deraadt@ | 2001-04-18 | 1 | -3/+6 | ||
| | ||||||
* | add HostKeyAlgorithms; based on patch from res@shore.net; ok provos@ | 2001-04-17 | 1 | -1/+4 | ||
| | ||||||
* | some unused variable and typos; from tomh@po.crl.go.jp | 2001-04-15 | 1 | -3/+3 | ||
| | ||||||
* | implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2) | 2001-04-12 | 1 | -3/+108 | ||
| | | | | | similar to RhostRSAAuthentication unless you enable (the experimental) HostbasedUsesNameFromPacketOnly option. please test. :) | |||||
* | fix whitespace: unexpand + trailing spaces. | 2001-04-05 | 1 | -3/+3 | ||
| | ||||||
* | more robust rekeying | 2001-04-04 | 1 | -2/+2 | ||
| | | | | don't send channel data after rekeying is started. | |||||
* | enable server side rekeying + some rekey related clientup. | 2001-04-04 | 1 | -7/+3 | ||
| | | | | todo: we should not send any non-KEX messages after we send KEXINIT | |||||
* | don't sent multiple kexinit-requests. | 2001-04-04 | 1 | -3/+3 | ||
| | | | | | send newkeys, block while waiting for newkeys. fix comments. | |||||
* | enable client rekeying | 2001-04-04 | 1 | -1/+5 | ||
| | | | | | | (1) force rekeying with ~R, or (2) if the server requests rekeying. works against ssh-2.0.12/2.0.13/2.1.0/2.2.0/2.3.0/2.3.1/2.4.0 | |||||
* | undo parts of recent my changes: main part of keyexchange does not | 2001-04-03 | 1 | -1/+4 | ||
| | | | | | | | need dispatch-callbacks, since application data is delayed until the keyexchange completes (if i understand the drafts correctly). add some infrastructure for re-keying. | |||||
* | move kex to kex*.c, used dispatch_set() callbacks for kex. should | 2001-04-03 | 1 | -381/+28 | ||
| | | | | make rekeying easier. | |||||
* | need to set both STOC and CTOS for SSH_BUG_BIGENDIANAES; ok markus@ | 2001-03-29 | 1 | -4/+5 | ||
| | ||||||
* | use recommended defaults | 2001-03-29 | 1 | -2/+2 | ||
| | ||||||
* | forgot to include min and max params in hash, okay markus@ | 2001-03-28 | 1 | -2/+9 | ||
| | ||||||
* | make dh group exchange more flexible, allow min and max group size, | 2001-03-27 | 1 | -6/+29 | ||
| | | | | okay markus@, deraadt@ | |||||
* | simpler key load/save interface, see authfile.h | 2001-03-26 | 1 | -14/+8 | ||
| | ||||||
* | Compat for OpenSSH with broken Rijndael/AES. ok markus@ | 2001-03-23 | 1 | -1/+4 | ||
| | ||||||
* | remove old key_fingerprint interface, s/_ex// | 2001-03-12 | 1 | -4/+5 | ||
| | ||||||
* | add PreferredAuthentications | 2001-03-10 | 1 | -77/+55 | ||
| | ||||||
* | ignore nonexisting private keys; report rjmooney@mediaone.net | 2001-03-10 | 1 | -1/+6 | ||
| | ||||||
* | implement client side of SSH2_MSG_USERAUTH_PK_OK (test public key -> | 2001-03-08 | 1 | -57/+215 | ||
| | | | | | no need to do enter passphrase or do expensive sign operations if the server does not accept key). | |||||
* | generate a 2*need size (~300 instead of 1024/2048) random private | 2001-03-05 | 1 | -4/+4 | ||
| | | | | | | | | | | | exponent during the DH key agreement. according to Niels (the great german advisor) this is safe since /etc/primes contains strong primes only. References: P. C. van Oorschot and M. J. Wiener, On Diffie-Hellman key agreement with short exponents, In Advances in Cryptology - EUROCRYPT'96, LNCS 1070, Springer-Verlag, 1996, pp.332-343. | |||||
* | in ssh protocol v2 use ignore messages for padding (instead of trailing \0). | 2001-02-28 | 1 | -3/+5 | ||
| | ||||||
* | genericize password padding function for SSH1 and SSH2. | 2001-02-15 | 1 | -3/+3 | ||
| | | | | add stylized echo to 2, too. |