Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | UsePrivilegeSeparation defaults to sandbox now. | 2015-10-07 | 1 | -4/+9 | |
| | | | | ok djm@ | ||||
* | more clarity on what AuthorizedKeysFile=none does; | 2015-09-11 | 1 | -2/+5 | |
| | | | | based on diff by Thiebaud Weksteen | ||||
* | match myproposal.h order; from brian conway | 2015-08-14 | 1 | -5/+5 | |
| | | | | | | (i snuck in a tweak while here) ok dtucker | ||||
* | add prohibit-password as a synonymn for without-password, since the | 2015-08-06 | 1 | -4/+7 | |
| | | | | | | without-password is causing too many questions. Harden it to ban all but pubkey, hostbased, and GSSAPI auth (when the latter is enabled) from djm, ok markus | ||||
* | change default: PermitRootLogin without-password | 2015-07-30 | 1 | -2/+2 | |
| | | | | | matching install script changes coming as well ok djm markus | ||||
* | Allow ssh_config and sshd_config kex parameters options be prefixed | 2015-07-30 | 1 | -2/+24 | |
| | | | | | | | by a '+' to indicate that the specified items be appended to the default rather than replacing it. approach suggested by dtucker@, feedback dlg@, ok markus@ | ||||
* | mention that the default of UseDNS=no implies that hostnames cannot | 2015-07-20 | 1 | -5/+14 | |
| | | | | | be used for host matching in sshd_config and authorized_keys; bz#2045, ok dtucker@ | ||||
* | Turn off DSA by default; add HostKeyAlgorithms to the server and | 2015-07-10 | 1 | -9/+51 | |
| | | | | | PubkeyAcceptedKeyTypes to the client side, so it still can be tested or turned back on; feedback and ok djm@ | ||||
* | refuse to generate or accept RSA keys smaller than 1024 bits; | 2015-07-03 | 1 | -3/+3 | |
| | | | | feedback and ok dtucker@ | ||||
* | typo: accidental repetition; bz#2386 | 2015-06-05 | 1 | -3/+3 | |
| | |||||
* | add knob to relax GSSAPI host credential check for multihomed hosts | 2015-05-22 | 1 | -2/+17 | |
| | | | | | bz#928, patch by Simon Wilkinson; ok dtucker (kerberos/GSSAPI is not compiled by default on OpenBSD) | ||||
* | add AuthorizedPrincipalsCommand that allows getting authorized_principals | 2015-05-21 | 1 | -1/+37 | |
| | | | | | | | from a subprocess rather than a file, which is quite useful in deployments with large userbases feedback and ok markus@ | ||||
* | support arguments to AuthorizedKeysCommand | 2015-05-21 | 1 | -5/+17 | |
| | | | | | bz#2081 loosely based on patch by Sami Hartikainen feedback and ok markus@ | ||||
* | Allow ListenAddress, Port and AddressFamily in any order. bz#68, | 2015-04-29 | 1 | -6/+3 | |
| | | | | ok djm@, jmc@ (for the man page bit). | ||||
* | enviroment -> environment: apologies to darren for not spotting that first | 2015-04-28 | 1 | -2/+2 | |
| | | | | time round... | ||||
* | Fix typo in previous | 2015-04-28 | 1 | -2/+2 | |
| | |||||
* | Document that the TERM environment variable is not subject to SendEnv | 2015-04-28 | 1 | -3/+7 | |
| | | | | | and AcceptEnv. bz#2386, based loosely on a patch from jjelen at redhat, help and ok jmc@ | ||||
* | Make sshd default to PermitRootLogin=no; | 2015-04-27 | 1 | -3/+3 | |
| | | | | ok deraadt@ rpe@ | ||||
* | Document "none" for PidFile XAuthLocation TrustedUserCAKeys and RevokedKeys. | 2015-04-16 | 1 | -6/+14 | |
| | | | | bz#2382, feedback from jmc@, ok djm@ | ||||
* | sort options useable under Match case-insensitively; | 2015-02-20 | 1 | -3/+3 | |
| | | | | prodded jmc@ | ||||
* | more options that are available under Match; | 2015-02-20 | 1 | -4/+10 | |
| | | | | bz#2353 reported by calestyo AT scientia.net | ||||
* | increasing encounters with difficult DNS setups in darknets has | 2015-02-02 | 1 | -3/+3 | |
| | | | | | convinced me UseDNS off by default is better ok djm | ||||
* | heirarchy -> hierarchy; | 2015-01-22 | 1 | -2/+2 | |
| | |||||
* | Provide a warning about chroot misuses (which sadly, seem to have become | 2015-01-22 | 1 | -4/+13 | |
| | | | | | | quite popular because shiny). sshd cannot detect/manage/do anything about these cases, best we can do is warn in the right spot in the man page. ok markus | ||||
* | add sshd_config HostbasedAcceptedKeyTypes and PubkeyAcceptedKeyTypes | 2015-01-13 | 1 | -2/+26 | |
| | | | | | options to allow sshd to control what public key types will be accepted. Currently defaults to all. Feedback & ok markus@ | ||||
* | mention ssh -Q feature to list supported { MAC, cipher, KEX, key } | 2014-12-22 | 1 | -2/+18 | |
| | | | | | algorithms in more places and include the query string used to list the relevant information; bz#2288 | ||||
* | tweak previous; | 2014-12-22 | 1 | -2/+2 | |
| | |||||
* | correct description of what will happen when a AuthorizedKeysCommand is | 2014-12-22 | 1 | -3/+7 | |
| | | | | specified but AuthorizedKeysCommandUser is not (sshd will refuse to start) | ||||
* | remember which public keys have been used for authentication and | 2014-12-22 | 1 | -2/+14 | |
| | | | | | | | | | refuse to accept previously-used keys. This allows AuthenticationMethods=publickey,publickey to require that users authenticate using two _different_ pubkeys. ok markus@ | ||||
* | tweak previous; | 2014-12-21 | 1 | -2/+1 | |
| | |||||
* | Add FingerprintHash option to control algorithm used for key | 2014-12-21 | 1 | -2/+11 | |
| | | | | | | | fingerprints. Default changes from MD5 to SHA256 and format from hex to base64. Feedback and ok naddy@ markus@ | ||||
* | revert chunk I didn't mean to commit yet; via jmc@ | 2014-12-12 | 1 | -14/+2 | |
| | |||||
* | mention AuthorizedKeysCommandUser must be set for | 2014-12-11 | 1 | -2/+17 | |
| | | | | AuthorizedKeysCommand to be run; bz#2287 | ||||
* | restore word zapped in previous, and remove some useless "No" macros; | 2014-11-22 | 1 | -4/+5 | |
| | |||||
* | /dev/random has created the same effect as /dev/arandom (and /dev/urandom) | 2014-11-22 | 1 | -4/+2 | |
| | | | | | for quite some time. Mop up the last few, by using /dev/random where we actually want it, or not even mentioning arandom where it is irrelevant. | ||||
* | mention permissions on tun(4) devices in PermitTunnel documentation; | 2014-09-09 | 1 | -2/+6 | |
| | | | | bz#2273 | ||||
* | typo. | 2014-08-30 | 1 | -3/+3 | |
| | |||||
* | some systems no longer need /dev/log; | 2014-07-28 | 1 | -4/+4 | |
| | | | | | issue noticed by jirib; ok deraadt | ||||
* | Add support for Unix domain socket forwarding. A remote TCP port | 2014-07-15 | 1 | -2/+49 | |
| | | | | | | | | may be forwarded to a local Unix domain socket and vice versa or both ends may be a Unix domain socket. This is a reimplementation of the streamlocal patches by William Ahern from: http://www.25thandclement.com/~william/projects/streamlocal.html OK djm@ markus@ | ||||
* | Add a sshd_config PermitUserRC option to control whether ~/.ssh/rc is | 2014-07-03 | 1 | -2/+9 | |
| | | | | | executed, mirroring the no-user-rc authorized_keys option; bz#2160; ok markus@ | ||||
* | sync available and default algorithms, improve algorithm list formatting | 2014-03-28 | 1 | -33/+103 | |
| | | | | help from jmc@ and schwarze@, ok deraadt@ | ||||
* | bz#2184 clarify behaviour of a keyword that appears in multiple | 2014-02-27 | 1 | -2/+6 | |
| | | | | matching Match blocks; ok dtucker@ | ||||
* | document kbdinteractiveauthentication; | 2014-01-29 | 1 | -2/+13 | |
| | | | | | | requested From: Ross L Richardson dtucker/markus helped explain its workings; | ||||
* | Use a literal for the default value of KEXAlgorithms. ok deraadt jmc | 2013-12-08 | 1 | -10/+10 | |
| | |||||
* | add missing mentions of ed25519; ok djm@ | 2013-12-07 | 1 | -4/+6 | |
| | |||||
* | no need for .Pp before displays; | 2013-11-21 | 1 | -2/+1 | |
| | |||||
* | Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com" | 2013-11-21 | 1 | -4/+14 | |
| | | | | | | | | | | | | | | that combines Daniel Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an authenticated encryption mode. Inspired by and similar to Adam Langley's proposal for TLS: http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03 but differs in layout used for the MAC calculation and the use of a second ChaCha20 instance to separately encrypt packet lengths. Details are in the PROTOCOL.chacha20poly1305 file. Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC ok markus@ naddy@ | ||||
* | the default kex is now curve25519-sha256@libssh.org | 2013-11-02 | 1 | -2/+3 | |
| | |||||
* | pty(4), not pty(7); | 2013-10-29 | 1 | -2/+2 | |
| | |||||
* | shd_config PermitTTY to disallow TTY allocation, mirroring the | 2013-10-29 | 1 | -2/+9 | |
| | | | | | longstanding no-pty authorized_keys option; bz#2070, patch from Teran McKinney; ok markus@ |