summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/auth-rh-rsa.c
AgeCommit message (Collapse)Author
2001-02-03make ReverseMappingCheck optional in sshd_config; ok djm@,dugsong@Markus Friedl
2001-01-21split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.Markus Friedl
rename util.[ch] -> misc.[ch]
2001-01-19move ssh1 definitions to ssh1.h, pathnames to pathnames.hMarkus Friedl
2000-12-21print keyfile:line for changed hostkeys, for deraadt@; ok deraadt@Markus Friedl
2000-11-12add support for RSA to SSH2. please test.Markus Friedl
there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
2000-10-03move fake-auth from auth1.c to individual auth methods, disables s/key in ↵Markus Friedl
debug-msg
2000-09-07some more Copyright fixesMarkus Friedl
2000-09-07cleanup copyright notices on all files. I have attempted to be accurate withTheo de Raadt
the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
2000-06-20OpenBSD tagMarkus Friedl
2000-04-14whitespace cleanupMarkus Friedl
2000-04-12#include <ssl/foo.h> -> <openssh/foo.h>Markus Friedl
2000-03-23initial support for DSA keys. ok deraadt@, niels@Markus Friedl
1999-11-24KNF, final part 3Markus Friedl
1999-11-24much more KNFTheo de Raadt
1999-11-23KNF part 1Markus Friedl
1999-11-22syslog changes:Markus Friedl
* Unified Logmessage for all auth-types, for success and for failed * Standard connections get only ONE line in the LOG when level==LOG: Auth-attempts are logged only, if authentication is: a) successfull or b) with passwd or c) we had more than AUTH_FAIL_LOG failues * many log() became verbose() * old behaviour with level=VERBOSE
1999-11-15the keysize of rsa-parameter 'n' is passed implizit,Markus Friedl
a few more checks and warnings about 'pretended' keysizes.
1999-11-11make all access to options via 'extern Options options'Markus Friedl
and 'extern ServerOptions options' respectively; options are no longer passed as arguments: * make options handling more consistent * remove #include "readconf.h" from ssh.h * readconf.h is only included if necessary
1999-11-11IgnoreUserKnownHosts(default=no), used for RhostRSAAuth, ok deraadt,millertMarkus Friedl
1999-11-09user/958: check ~/.ssh/known_hosts for rhosts-rsa, too, ok niels/millertMarkus Friedl
1999-10-03add code to detect DNS spoofing:Niels Provos
the main idea is to not only store the host key for the hostname but also for the according IP address. When we check the host key in the known_hosts file, we also check the key against the according IP address. When the server key changes, host_status = HOST_CHANGED. If check_host_in_hostfile() returns differing status for the IP address that means that either DNS was spoofed or that the IP address for the host and the host key changed at the same time.
1999-09-28convert all uses of gmp to SSL bignumNiels Provos
convert all used of rsa to SSL rsa functions remove all use of randomstate to OpenBSD arc4random() and arc4_stir() all this done at a long long night in Canada.