summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshd (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Don't redefine Makefile choices which come correct from bsd.*.mkderaadt2018-07-251-3/+1
| | | | ok markus
* Remove support for running ssh(1) setuid and fatal if attempted.dtucker2018-07-181-2/+2
| | | | | Do not link uidwap.c into ssh any more. Neuters UsePrivilegedPort, which will be marked as deprecated shortly. ok markus@ djm@
* remove legacy key emulation layer; ok djm@markus2018-07-111-2/+2
|
* remove legacy buffer API emulation layer; ok djm@markus2018-07-091-2/+2
|
* group shared source files (e.g. SRCS_KEX) and allow compilation w/o OPENSSLmarkus2018-01-081-18/+9
| | | | ok djm@
* split client/server kex; only ssh-keygen needs uuencode.o;markus2018-01-081-5/+5
| | | | only scp/sftp use progressmeter.o; ok djm@
* Replace ED25519's private SHA-512 implementation with a call to thenaddy2017-12-141-2/+2
| | | | | regular digest code. This speeds up compilation considerably. ok markus@
* Create a persistent umac128.c source file: #define the output size andnaddy2017-12-121-10/+1
| | | | | | the name of the entry points for UMAC-128 before including umac.c. Idea from FreeBSD. ok dtucker@
* ssh/lib hasn't worked towards our code-sharing goals for a quit while,deraadt2017-12-101-12/+29
| | | | | | | | | perhaps it is too verbose? Change each */Makefile to specifying exactly what sources that program requires, compiling it seperate. Maybe we'll iterate by sorting those into seperatable chunks, splitting up files which contain common code + server/client specific code, or whatnot. But this isn't one step, or we'd have done it a long time ago.. ok dtucker markus djm
* Remove support for pre-authentication compression. Doing compressiondjm2016-09-281-2/+2
| | | | | | | | | | | | | | | | | early in the protocol probably seemed reasonable in the 1990s, but today it's clearly a bad idea in terms of both cryptography (cf. multiple compression oracle attacks in TLS) and attack surface. Moreover, to support it across privilege-separation zlib needed the assistance of a complex shared-memory manager that made the required attack surface considerably larger. Prompted by Guido Vranken pointing out a compiler-elided security check in the shared memory manager found by Stack (http://css.csail.mit.edu/stack/); ok deraadt@ markus@ NB. pre-auth authentication has been disabled by default in sshd for >10 years.
* remove ssh1 server code; ok djm@markus2016-08-131-6/+2
|
* remove roaming support; ok djm@markus2016-01-141-2/+2
|
* Change all tame callers to namechange to pledge(2).deraadt2015-10-091-2/+2
|
* switch from using the systrace-based sandbox to the tame-based sandbox.deraadt2015-10-031-2/+2
| | | | | discussed it at length with djm -- i think it is time to give this a trial in snapshots.
* add SSH1 Makefile knob to make it easier to build without SSH1 support;djm2015-03-031-2/+2
| | | | ok markus@
* add experimental api for packet layer; ok djm@markus2015-01-191-5/+3
|
* make compiling against OpenSSL optional (make OPENSSL=no);markus2014-04-291-6/+17
| | | | | reduces algorithms to curve25519, aes-ctr, chacha, ed25519; allows us to explore further options; with and ok djm
* remove libwrap support. ok deraadt djm mfriedltedu2014-03-261-7/+1
|
* remove experimental, never-enabled JPAKE code; ok markus@djm2014-01-291-2/+2
|
* use curve25519 for default key exchange (curve25519-sha256@libssh.org);markus2013-11-021-2/+3
| | | | initial patch from Aris Adamantiadis; ok djm@
* libkafs5 -> libkafs (unused in build, so no functional change)ajacoutot2013-08-101-2/+2
|
* fix kerberos/GSSAPI deprecation warnings and linking; "looks okay" millert@djm2013-07-201-3/+4
|
* add missing library dependenciesmarkus2013-07-021-2/+2
|
* stop doing kerberos in ssh and sshdderaadt2013-06-191-1/+2
| | | | | the code bloat makes that no longer trustworthy functionality ok guenther
* Shuffle library link order to appease the static arch deities.miod2013-06-181-3/+3
|
* link to the new kerberos librariesrobert2013-06-171-2/+3
|
* introduce sandboxing of the pre-auth privsep child using systrace(4).djm2011-06-221-2/+2
| | | | | | | | | | | | | | | | | | This introduces a new "UsePrivilegeSeparation=sandbox" option for sshd_config that applies mandatory restrictions on the syscalls the privsep child can perform. This prevents a compromised privsep child from being used to attack other hosts (by opening sockets and proxying) or probing local kernel attack surface. The sandbox is implemented using systrace(4) in unsupervised "fast-path" mode, where a list of permitted syscalls is supplied. Any syscall not on the list results in SIGKILL being sent to the privsep child. Note that this requires a kernel with the new SYSTR_POLICY_KILL option. UsePrivilegeSeparation=sandbox will become the default in the future so please start testing it now. feedback dtucker@; ok markus@
* The heimdal code switched to using DES from libcrypto when 0.7.2jsg2010-10-131-3/+3
| | | | | | | was imported over four years ago, so we don't need to link libdes for kerberos anymore. ok mikeb@ deraadt@
* Implement Elliptic Curve Cryptography modes for key exchange (ECDH) anddjm2010-08-311-3/+3
| | | | | | | | | | | | | | | | | host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. Only the mandatory sections of RFC5656 are implemented, specifically the three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and ECDSA. Point compression (optional in RFC5656 is NOT implemented). Certificate host and user keys using the new ECDSA key types are supported. Note that this code has not been tested for interoperability and may be subject to change. feedback and ok markus@
* Dummy implementation of wait_for_roaming_reconnect() for the server side.andreas2009-10-241-2/+2
| | | | | | It doesn't do anything yet but is needed for upcoming changes in roaming_common.c ok markus@
* Keep track of number of bytes read and written. Needed for upcomingandreas2009-05-281-2/+3
| | | | | changes. Most code from Martin Forssen, maf at appgate dot com. ok markus@
* Add support for an experimental zero-knowledge password authenticationdjm2008-11-041-2/+2
| | | | | | | | | | | | | | | | method using the J-PAKE protocol described in F. Hao, P. Ryan, "Password Authenticated Key Exchange by Juggling", 16th Workshop on Security Protocols, Cambridge, April 2008. This method allows password-based authentication without exposing the password to the server. Instead, the client and server exchange cryptographic proofs to demonstrate of knowledge of the password while revealing nothing useful to an attacker or compromised endpoint. This is experimental, work-in-progress code and is presently compiled-time disabled (turn on -DJPAKE in Makefile.inc). "just commit it. It isn't too intrusive." deraadt@
* link sftp-server into sshd; feedback and ok djm@markus2008-02-041-2/+2
|
* unifdef -DBSD_AUTHdjm2007-09-211-9/+2
| | | | | | | unifdef -USKEY These options have been in use for some years; ok markus@ "no objection" millert@
* unifdef HAVE_LOGIN_CAP; ok deraadt@ millert@djm2007-08-231-2/+2
|
* Use permanently_set_uid() in ssh and ssh-keysign for consistency, matchesdtucker2004-08-231-2/+2
| | | | change in Portable; ok markus@
* implement session multiplexing in the client (the server has supported thisdjm2004-06-131-2/+2
| | | | since 2.0); ok markus@
* implement KerberosGetAFSToken server option. ok markus@, beck@jakob2003-12-231-2/+2
|
* re-organize Makefiles so that static builds actually workderaadt2003-08-241-12/+9
|
* nuke "kerberos-2@ssh.com"markus2003-08-221-2/+2
|
* support GSS API user authentication; patches from Simon Wilkinson,markus2003-08-221-3/+9
| | | | stripped down and tested by Jakob and myself.
* some minor DPADD changesderaadt2003-07-161-5/+5
|
* stop using libcom_err, it is built into krb5deraadt2003-07-151-3/+3
|
* Don't link with unneeded kerberos librarieshin2003-05-171-2/+2
|
* implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@markus2003-05-141-2/+2
| | | | server interops with commercial client; ok jakob@ djm@
* unbreak linking on elf - stupid kerberospvalchev2003-04-101-2/+2
|
* Disable Kerberos 4 support.hin2003-04-091-13/+1
| | | | ok markus@
* move server only kex and monitor code to sshd.markus2003-02-211-3/+4
|
* move configuration file options from ssh.1/sshd.8 tostevesk2002-06-201-2/+2
| | | | ssh_config.5/sshd_config.5; ok deraadt@ millert@
* no longer use uidswap.[ch] from the ssh clientmarkus2002-06-111-2/+2
| | | | | | run less code with euid==0 if ssh is installed setuid root just switch the euid, don't switch the complete set of groups (this is only needed by sshd). ok provos@