summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/myproposal.h
AgeCommit message (Expand)Author
2024-10-25promote mlkem768x25519-sha256 to be the default key exchange;Damien Miller
2024-10-06Turn off finite field (a.k.a modp) Diffie-Hellman key exchange in sshdDamien Miller
2024-09-09pull post-quantum ML-KEM/x25519 key exchange out from compile-timeDamien Miller
2024-08-22sntrup761x25519-sha512 now has an IANA codepoint assigned,Damien Miller
2022-03-30select post-quantum KEX sntrup761x25519-sha512@openssh.com as theDamien Miller
2021-11-10add the sntrup761x25519-sha512@openssh.com hybrid ECDH/x25519 +Damien Miller
2021-08-29After years of forewarning, disable the RSA/SHA-1 signature algorithmDamien Miller
2020-10-03prefer ed25519 signature algorithm variants to ECDSA; ok markus@Damien Miller
2020-01-24remove ssh-rsa (SHA1) from the list of allowed CA signature algorithmsDamien Miller
2020-01-23Remove unsupported algorithms from list of defaults at run time andDarren Tucker
2020-01-22remove diffie-hellman-group14-sha1 from default kex to see what happens.Ted Unangst
2019-12-16sort sk-* methods behind their plain key methods cousins for nowDamien Miller
2019-12-15allow security keys to act as host keys as well as user keys.Damien Miller
2019-12-10add security key types to list of keys allowed to act as CAs;Damien Miller
2019-11-12enable ed25519 support; ok djmMarkus Friedl
2019-11-01remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL pathDamien Miller
2019-10-31Separate myproposal.h userauth pubkey typesDamien Miller
2019-02-23openssh-7.9 accidentally reused the server's algorithm lists in theDamien Miller
2018-09-12add SSH_ALLOWED_CA_SIGALGS - the default list of signature algorithmsDamien Miller
2018-07-03Improve strictness and control over RSA-SHA2 signature types:Damien Miller
2017-05-07Don't offer CBC ciphers by default in the client. ok markus@Damien Miller
2016-09-28Remove support for pre-authentication compression. Doing compressionDamien Miller
2016-09-22support plain curve25519-sha256 KEX algorithm now that it isDamien Miller
2016-09-05remove 3des-cbc from the client's default proposal; 64-bit block ciphersDamien Miller
2016-05-02add support for additional fixed DH groups fromDamien Miller
2016-02-09turn off more old crypto in the client: hmac-md5, ripemd, truncatedDamien Miller
2015-12-05prefer rsa-sha2-512 over -256 for hostkeys, too; noticed by naddy@Markus Friedl
2015-12-04implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)Markus Friedl
2015-07-10Turn off DSA by default; add HostKeyAlgorithms to the server andMarkus Friedl
2015-07-03turn off 1024 bit diffie-hellman-group1-sha1 key exchange methodDamien Miller
2015-07-03delete support for legacy v00 certificates; "sure" markus@ dtucker@Damien Miller
2015-05-27Reorder client proposal to prefer diffie-hellman-group-exchange-sha1 overDarren Tucker
2015-04-21Add back a backslash removed in rev 1.42 so KEX_SERVER_ENCRYPT willJonathan Gray
2015-03-24promote chacha20-poly1305@openssh.com to be the default cipher;Damien Miller
2014-07-11by popular demand, add back hamc-sha1 to server proposal for better compatTed Unangst
2014-04-30UMAC can use our local fallback implementation of AES when OpenSSL isn'tChristian Weisgerber
2014-04-29make compiling against OpenSSL optional (make OPENSSL=no);Markus Friedl
2014-03-27disable weak proposals in sshd, but keep them in ssh; ok djm@Markus Friedl
2014-03-26The current sharing of myproposal[] between both client and server codeTheo de Raadt
2014-03-25trimm default proposals.Markus Friedl
2013-12-06support ed25519 keys (hostkeys and user identities) using the public domainMarkus Friedl
2013-11-21Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com"Damien Miller
2013-11-02use curve25519 for default key exchange (curve25519-sha256@libssh.org);Markus Friedl
2013-01-08support AES-GCM as defined in RFC 5647 (but with simpler KEX handling)Markus Friedl
2012-12-11add encrypt-then-mac (EtM) modes to openssh by defining new mac algorithmsMarkus Friedl
2012-10-04add umac128 variant; ok djm@ at n2k12Markus Friedl
2012-06-28Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs since they were removedDarren Tucker
2011-08-02Add new SHA256 and SHA512 based HMAC modes fromDamien Miller
2010-09-01prefer ECDH in a 256 bit curve field; prompted by naddy@Damien Miller
2010-08-31Implement Elliptic Curve Cryptography modes for key exchange (ECDH) andDamien Miller