summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/myproposal.h
AgeCommit message (Expand)Author
2019-12-10add security key types to list of keys allowed to act as CAs;Damien Miller
2019-11-12enable ed25519 support; ok djmMarkus Friedl
2019-11-01remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL pathDamien Miller
2019-10-31Separate myproposal.h userauth pubkey typesDamien Miller
2019-02-23openssh-7.9 accidentally reused the server's algorithm lists in theDamien Miller
2018-09-12add SSH_ALLOWED_CA_SIGALGS - the default list of signature algorithmsDamien Miller
2018-07-03Improve strictness and control over RSA-SHA2 signature types:Damien Miller
2017-05-07Don't offer CBC ciphers by default in the client. ok markus@Damien Miller
2016-09-28Remove support for pre-authentication compression. Doing compressionDamien Miller
2016-09-22support plain curve25519-sha256 KEX algorithm now that it isDamien Miller
2016-09-05remove 3des-cbc from the client's default proposal; 64-bit block ciphersDamien Miller
2016-05-02add support for additional fixed DH groups fromDamien Miller
2016-02-09turn off more old crypto in the client: hmac-md5, ripemd, truncatedDamien Miller
2015-12-05prefer rsa-sha2-512 over -256 for hostkeys, too; noticed by naddy@Markus Friedl
2015-12-04implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)Markus Friedl
2015-07-10Turn off DSA by default; add HostKeyAlgorithms to the server andMarkus Friedl
2015-07-03turn off 1024 bit diffie-hellman-group1-sha1 key exchange methodDamien Miller
2015-07-03delete support for legacy v00 certificates; "sure" markus@ dtucker@Damien Miller
2015-05-27Reorder client proposal to prefer diffie-hellman-group-exchange-sha1 overDarren Tucker
2015-04-21Add back a backslash removed in rev 1.42 so KEX_SERVER_ENCRYPT willJonathan Gray
2015-03-24promote chacha20-poly1305@openssh.com to be the default cipher;Damien Miller
2014-07-11by popular demand, add back hamc-sha1 to server proposal for better compatTed Unangst
2014-04-30UMAC can use our local fallback implementation of AES when OpenSSL isn'tChristian Weisgerber
2014-04-29make compiling against OpenSSL optional (make OPENSSL=no);Markus Friedl
2014-03-27disable weak proposals in sshd, but keep them in ssh; ok djm@Markus Friedl
2014-03-26The current sharing of myproposal[] between both client and server codeTheo de Raadt
2014-03-25trimm default proposals.Markus Friedl
2013-12-06support ed25519 keys (hostkeys and user identities) using the public domainMarkus Friedl
2013-11-21Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com"Damien Miller
2013-11-02use curve25519 for default key exchange (curve25519-sha256@libssh.org);Markus Friedl
2013-01-08support AES-GCM as defined in RFC 5647 (but with simpler KEX handling)Markus Friedl
2012-12-11add encrypt-then-mac (EtM) modes to openssh by defining new mac algorithmsMarkus Friedl
2012-10-04add umac128 variant; ok djm@ at n2k12Markus Friedl
2012-06-28Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs since they were removedDarren Tucker
2011-08-02Add new SHA256 and SHA512 based HMAC modes fromDamien Miller
2010-09-01prefer ECDH in a 256 bit curve field; prompted by naddy@Damien Miller
2010-08-31Implement Elliptic Curve Cryptography modes for key exchange (ECDH) andDamien Miller
2010-04-16revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with theDamien Miller
2010-02-26Add support for certificate key types for users and hosts.Damien Miller
2009-01-23prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBCDamien Miller
2007-06-07Add a new MAC algorithm for data integrity, UMAC-64 (not default yet, mustPeter Valchev
2006-03-25standardise spacing in $OpenBSD$ tags; requested by deraadt@Damien Miller
2006-03-19spacingTheo de Raadt
2006-03-07Implement the diffie-hellman-group-exchange-sha256 key exchange methodDamien Miller
2005-07-25add a new compression method that delays compression until the userMarkus Friedl
2005-05-23add support for draft-harris-ssh-arcfour-fixes-02 improved arcfour modes;Damien Miller
2004-06-13implement diffie-hellman-group14-sha1 kex method (trivial extension toDamien Miller
2003-05-17experimental support for aes-ctr modes fromMarkus Friedl
2002-04-03re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.netMarkus Friedl
2002-01-21remove "rijndael-*", just use "aes-" since this how rijndael is calledMarkus Friedl