index
:
src
cvs/HEAD
kms/intel
kms/radeon
master
OpenBSD base system
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
usr.bin
/
ssh
/
myproposal.h
Age
Commit message (
Expand
)
Author
2024-10-25
promote mlkem768x25519-sha256 to be the default key exchange;
Damien Miller
2024-10-06
Turn off finite field (a.k.a modp) Diffie-Hellman key exchange in sshd
Damien Miller
2024-09-09
pull post-quantum ML-KEM/x25519 key exchange out from compile-time
Damien Miller
2024-08-22
sntrup761x25519-sha512 now has an IANA codepoint assigned,
Damien Miller
2022-03-30
select post-quantum KEX sntrup761x25519-sha512@openssh.com as the
Damien Miller
2021-11-10
add the sntrup761x25519-sha512@openssh.com hybrid ECDH/x25519 +
Damien Miller
2021-08-29
After years of forewarning, disable the RSA/SHA-1 signature algorithm
Damien Miller
2020-10-03
prefer ed25519 signature algorithm variants to ECDSA; ok markus@
Damien Miller
2020-01-24
remove ssh-rsa (SHA1) from the list of allowed CA signature algorithms
Damien Miller
2020-01-23
Remove unsupported algorithms from list of defaults at run time and
Darren Tucker
2020-01-22
remove diffie-hellman-group14-sha1 from default kex to see what happens.
Ted Unangst
2019-12-16
sort sk-* methods behind their plain key methods cousins for now
Damien Miller
2019-12-15
allow security keys to act as host keys as well as user keys.
Damien Miller
2019-12-10
add security key types to list of keys allowed to act as CAs;
Damien Miller
2019-11-12
enable ed25519 support; ok djm
Markus Friedl
2019-11-01
remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL path
Damien Miller
2019-10-31
Separate myproposal.h userauth pubkey types
Damien Miller
2019-02-23
openssh-7.9 accidentally reused the server's algorithm lists in the
Damien Miller
2018-09-12
add SSH_ALLOWED_CA_SIGALGS - the default list of signature algorithms
Damien Miller
2018-07-03
Improve strictness and control over RSA-SHA2 signature types:
Damien Miller
2017-05-07
Don't offer CBC ciphers by default in the client. ok markus@
Damien Miller
2016-09-28
Remove support for pre-authentication compression. Doing compression
Damien Miller
2016-09-22
support plain curve25519-sha256 KEX algorithm now that it is
Damien Miller
2016-09-05
remove 3des-cbc from the client's default proposal; 64-bit block ciphers
Damien Miller
2016-05-02
add support for additional fixed DH groups from
Damien Miller
2016-02-09
turn off more old crypto in the client: hmac-md5, ripemd, truncated
Damien Miller
2015-12-05
prefer rsa-sha2-512 over -256 for hostkeys, too; noticed by naddy@
Markus Friedl
2015-12-04
implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)
Markus Friedl
2015-07-10
Turn off DSA by default; add HostKeyAlgorithms to the server and
Markus Friedl
2015-07-03
turn off 1024 bit diffie-hellman-group1-sha1 key exchange method
Damien Miller
2015-07-03
delete support for legacy v00 certificates; "sure" markus@ dtucker@
Damien Miller
2015-05-27
Reorder client proposal to prefer diffie-hellman-group-exchange-sha1 over
Darren Tucker
2015-04-21
Add back a backslash removed in rev 1.42 so KEX_SERVER_ENCRYPT will
Jonathan Gray
2015-03-24
promote chacha20-poly1305@openssh.com to be the default cipher;
Damien Miller
2014-07-11
by popular demand, add back hamc-sha1 to server proposal for better compat
Ted Unangst
2014-04-30
UMAC can use our local fallback implementation of AES when OpenSSL isn't
Christian Weisgerber
2014-04-29
make compiling against OpenSSL optional (make OPENSSL=no);
Markus Friedl
2014-03-27
disable weak proposals in sshd, but keep them in ssh; ok djm@
Markus Friedl
2014-03-26
The current sharing of myproposal[] between both client and server code
Theo de Raadt
2014-03-25
trimm default proposals.
Markus Friedl
2013-12-06
support ed25519 keys (hostkeys and user identities) using the public domain
Markus Friedl
2013-11-21
Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com"
Damien Miller
2013-11-02
use curve25519 for default key exchange (curve25519-sha256@libssh.org);
Markus Friedl
2013-01-08
support AES-GCM as defined in RFC 5647 (but with simpler KEX handling)
Markus Friedl
2012-12-11
add encrypt-then-mac (EtM) modes to openssh by defining new mac algorithms
Markus Friedl
2012-10-04
add umac128 variant; ok djm@ at n2k12
Markus Friedl
2012-06-28
Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs since they were removed
Darren Tucker
2011-08-02
Add new SHA256 and SHA512 based HMAC modes from
Damien Miller
2010-09-01
prefer ECDH in a 256 bit curve field; prompted by naddy@
Damien Miller
2010-08-31
Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and
Damien Miller
[next]