summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/PROTOCOL
AgeCommit message (Collapse)Author
2018-10-02mention INFO@openssh.com for sending SIGINFODamien Miller
2018-08-10improveDamien Miller
2018-08-10Describe pubkey format, prompted by bz#2853Damien Miller
While I'm here, describe and link to the remaining local PROTOCOL.* docs that weren't already mentioned (PROTOCOL.key, PROTOCOL.krl and PROTOCOL.mux)
2018-08-10fix numberingDamien Miller
2018-02-19emphasise that the hostkey rotation may send key types that the clientDamien Miller
may not support, and that the client should simply disregard such keys (this is what ssh does already).
2017-05-26fix references to obsolete v00 cert format; spotted by Jakub JelenDamien Miller
2016-04-08We accidentally send an empty string and a zero uint32 with everyDamien Miller
direct-streamlocal@openssh.com channel open, in contravention of our own spec. Fixing this is too hard wrt existing versions that expect these fields to be present and fatal() if they aren't, so document them as "reserved" fields in the PROTOCOL spec as though we always intended this and let us never speak of it again. bz#2529, reported by Ron Frederick
2015-07-17direct-streamlocal@openssh.com Unix domain foward messages do notDamien Miller
contain a "reserved for future use" field and in fact, serverloop.c checks that there isn't one. Remove erroneous mention from PROTOCOL description. bz#2421 from Daniel Black
2015-05-08whitespace at EOLDamien Miller
2015-02-20UpdateHostKeys fixes:Damien Miller
I accidentally changed the format of the hostkeys@openssh.com messages last week without changing the extension name, and this has been causing connection failures for people who are running -current. First reported by sthen@ s/hostkeys@openssh.com/hostkeys-00@openssh.com/ Change the name of the proof message too, and reorder it a little. Also, UpdateHostKeys=ask is incompatible with ControlPersist (no TTY available to read the response) so disable UpdateHostKeys if it is in ask mode and ControlPersist is active (and document this)
2015-02-16Revise hostkeys@openssh.com hostkey learning extension.Damien Miller
The client will not ask the server to prove ownership of the private halves of any hitherto-unseen hostkeys it offers to the client. Allow UpdateHostKeys option to take an 'ask' argument to let the user manually review keys offered. ok markus@
2015-01-26Host key rotation support.Damien Miller
Add a hostkeys@openssh.com protocol extension (global request) for a server to inform a client of all its available host key after authentication has completed. The client may record the keys in known_hosts, allowing it to upgrade to better host key algorithms and a server to gracefully rotate its keys. The client side of this is controlled by a UpdateHostkeys config option (default on). ok markus@
2014-07-15Add support for Unix domain socket forwarding. A remote TCP portTodd C. Miller
may be forwarded to a local Unix domain socket and vice versa or both ends may be a Unix domain socket. This is a reimplementation of the streamlocal patches by William Ahern from: http://www.25thandclement.com/~william/projects/streamlocal.html OK djm@ markus@
2013-12-01mention curve25519-sha256@libssh.org key exchange algorithmDamien Miller
2013-11-21Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com"Damien Miller
that combines Daniel Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an authenticated encryption mode. Inspired by and similar to Adam Langley's proposal for TLS: http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03 but differs in layout used for the MAC calculation and the use of a second ChaCha20 instance to separately encrypt packet lengths. Details are in the PROTOCOL.chacha20poly1305 file. Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC ok markus@ naddy@
2013-10-17fsync@openssh.com protocol extension for sftp-serverDamien Miller
client support to allow calling fsync() faster successful transfer patch mostly by imorgan AT nas.nasa.gov; bz#1798 "fine" markus@ "grumble OK" deraadt@ "doesn't sound bad to me" millert@
2013-01-08support AES-GCM as defined in RFC 5647 (but with simpler KEX handling)Markus Friedl
ok and feedback djm@
2013-01-03fix description of MAC calculation for EtM modes; ok markus@Damien Miller
2012-12-11add encrypt-then-mac (EtM) modes to openssh by defining new mac algorithmsMarkus Friedl
that change the packet format and compute the MAC over the encrypted message (including the packet size) instead of the plaintext data; these EtM modes are considered more secure and used by default. feedback and ok djm@
2010-12-04add a protocol extension to support a hard link operation. It isDamien Miller
available through the "ln" command in the client. The old "ln" behaviour of creating a symlink is available using its "-s" option or through the preexisting "symlink" command; based on a patch from miklos AT szeredi.hu in bz#1555; ok markus@
2010-08-31Implement Elliptic Curve Cryptography modes for key exchange (ECDH) andDamien Miller
host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. Only the mandatory sections of RFC5656 are implemented, specifically the three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and ECDSA. Point compression (optional in RFC5656 is NOT implemented). Certificate host and user keys using the new ECDSA key types are supported. Note that this code has not been tested for interoperability and may be subject to change. feedback and ok markus@
2010-02-26Add support for certificate key types for users and hosts.Damien Miller
OpenSSH certificate key types are not X.509 certificates, but a much simpler format that encodes a public key, identity information and some validity constraints and signs it with a CA key. CA keys are regular SSH keys. This certificate style avoids the attack surface of X.509 certificates and is very easy to deploy. Certified host keys allow automatic acceptance of new host keys when a CA certificate is marked as trusted in ~/.ssh/known_hosts. see VERIFYING HOST KEYS in ssh(1) for details. Certified user keys allow authentication of users when the signing CA key is marked as trusted in authorized_keys. See "AUTHORIZED_KEYS FILE FORMAT" in sshd(8) for details. Certificates are minted using ssh-keygen(1), documentation is in the "CERTIFICATES" section of that manpage. Documentation on the format of certificates is in the file PROTOCOL.certkeys feedback and ok markus@
2010-01-09tweak languageDamien Miller
2009-12-20fix an incorrect magic number and typo in PROTOCOL; bz#1688Damien Miller
report and fix from ueno AT unixuser.org
2009-02-14mention that eow and no-more-sessions extensions are sent only toDamien Miller
OpenSSH peers
2008-07-05grammarDamien Miller
2008-06-30clarify that eow@openssh.com is only sent on session channelsDamien Miller
2008-06-28document the protocol used by ssh-agent; "looks ok" markus@Damien Miller
2008-06-28spelling fixesDamien Miller
2008-06-12document tun@openssh.com forwarding methodDamien Miller
2008-06-10Add a no-more-sessions@openssh.com global request extension that theDamien Miller
client sends when it knows that it will never request another session (i.e. when session multiplexing is disabled). This allows a server to disallow further session requests and terminate the session. Why would a non-multiplexing client ever issue additional session requests? It could have been attacked with something like SSH'jack: http://www.storm.net.nz/projects/7 feedback & ok markus
2008-06-09Use a $OpenBSD tag so our scripts will sync changes.Darren Tucker
2008-06-08Have the sftp client store the statvfs replies in wire format,Darren Tucker
which prevents problems when the server's native sizes exceed the client's. Also extends the sizes of the remaining 32bit wire format to 64bit, they're specified as unsigned long in the standard.
2008-06-07statvfs member fsid needs to be wider, increase it to 64 bits andDamien Miller
crank extension revision number to 2; prodded and ok dtucker@
2008-05-17grammar and correctness fixes from stevesk@Damien Miller
2008-05-16document our protocol extensions and deviations; ok markus@Damien Miller