summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/myproposal.h
AgeCommit message (Collapse)Author
2001-03-05switch to aes128-cbc/hmac-md5 by default in SSH2 -- faster; provos & markus okTheo de Raadt
2001-02-111) clean up the MAC support for SSH-2Markus Friedl
2) allow you to specify the MAC with 'ssh -m' 3) or the 'MACs' keyword in ssh(d)_config 4) add hmac-{md5,sha1}-96 ok stevesk@, provos@
2001-01-29$OpenBSD$Niklas Hallqvist
2000-11-12add support for RSA to SSH2. please test.Markus Friedl
there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
2000-10-13prefer no compressionMarkus Friedl
2000-10-13rijndael/aes supportMarkus Friedl
2000-10-11new cipher frameworkMarkus Friedl
2000-10-11First rough implementation of the diffie-hellman group exchange. TheNiels Provos
client can ask the server for bigger groups to perform the diffie-hellman in, thus increasing the attack complexity when using ciphers with longer keys. University of Windsor provided network, T the company.
2000-09-07cleanup copyright notices on all files. I have attempted to be accurate withTheo de Raadt
the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
2000-05-25split kexinit/kexdh, factor out common codeMarkus Friedl
2000-05-08complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)Markus Friedl
2000-04-04ssh2 client implementation, interops w/ ssh.com and lsh servers.Markus Friedl