summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/readconf.h
AgeCommit message (Expand)Author
2005-06-08add ControlMaster=auto/autoask options to support opportunistic multiplexing;Damien Miller
2005-03-01add support for hashing host names and addresses added to known_hosts files,Damien Miller
2005-03-01bz#413: allow optional specification of bind address for port forwardings.Damien Miller
2004-07-11spacesTheo de Raadt
2004-06-13implement session multiplexing in the client (the server has supported thisDamien Miller
2004-04-27bz #815: implement ability to pass specified environment variables from theDamien Miller
2004-04-18perform strict ownership and modes checks for ~/.ssh/config files, as theseDamien Miller
2004-03-05add IdentitiesOnly; ok djm@, pb@Markus Friedl
2003-12-16application layer keep alive (ServerAliveInterval ServerAliveCountMax)Markus Friedl
2003-12-09rename keepalive to tcpkeepalive; the old name causes too muchMarkus Friedl
2003-11-21unexpand and delete whitespace at EOL; ok markus@Damien Miller
2003-10-11remote x11 clients are now untrusted by default, uses xauth(8) to generateMarkus Friedl
2003-09-01remove unused kerberos code; ok henning@Markus Friedl
2003-08-22support GSS API user authentication; patches from Simon Wilkinson,Markus Friedl
2003-08-13remove RhostsAuthentication; suggested by djm@ before; ok djm@, deraadt@,Markus Friedl
2003-07-22remove (already disabled) KRB4/AFS support, re-enable -k in ssh(1);Markus Friedl
2003-07-03fix AddressFamily option in config file, from brent@graveland.net; ok markus@Damien Miller
2003-05-15add a ConnectTimeout option to ssh, based on patch fromDamien Miller
2003-05-15always parse kerberos options. ok djm@ markus@Jakob Schlyter
2003-05-14add experimental support for verifying hos keys using DNS as describedJakob Schlyter
2003-04-02reapply rekeying chage, tested by henning@, ok djm@Markus Friedl
2003-04-01backout rekeying changes (for 3.6.1)Markus Friedl
2003-04-01rekeying bugfixes and automatic rekeying:Markus Friedl
2002-11-07we cannot use HostbasedAuthentication for enabling ssh-keysign(8),Markus Friedl
2002-06-08deprecate FallBackToRsh and UseRsh; patch from djm@Markus Friedl
2002-03-04$OpenBSD$ and RCSID() cleanup: don't use RCSID() in .h files; addKevin Steves
2002-02-10more /etc/ssh; openbsd@davidkrause.comTheo de Raadt
2001-10-01add NoHostAuthenticationForLocalhost; note that the hostkey isMarkus Friedl
2001-09-19add ClearAllForwardings ssh option and set it in scp and sftp; ok markus@Kevin Steves
2001-09-03fatal() for nonexistent -Fssh_config. ok markus@Kevin Steves
2001-08-01use strings instead of ints for smartcard reader idsMarkus Friedl
2001-07-31add 'SmartcardDevice' client option to specify which smartcard device is usedJakob Schlyter
2001-06-26remove comments from .h, since they are cut&paste from the .c filesMarkus Friedl
2001-06-26Kerberos v5 support for SSH1, mostly from Assar Westerlund <assar@freebsd.org...Dug Song
2001-06-26prototype pedant. not very creative...Jun-ichiro itojun Hagino
2001-05-18improved kbd-interactive support. work by per@appgate.com and meMarkus Friedl
2001-04-30implement 'ssh -b bind_address' like 'telnet -b'Markus Friedl
2001-04-17add HostKeyAlgorithms; based on patch from res@shore.net; ok provos@Markus Friedl
2001-04-12implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2)Markus Friedl
2001-03-10add PreferredAuthenticationsMarkus Friedl
2001-03-08implement client side of SSH2_MSG_USERAUTH_PK_OK (test public key ->Markus Friedl
2001-02-111) clean up the MAC support for SSH-2Markus Friedl
2001-01-22rename skey -> challenge response.Markus Friedl
2000-12-27new option: HostKeyAlias: allows the user to record the host keyMarkus Friedl
2000-11-12add support for RSA to SSH2. please test.Markus Friedl
2000-10-11add support for s/key (kbd-interactive) to ssh2, based on work by mkiernan@av...Markus Friedl
2000-09-07cleanup copyright notices on all files. I have attempted to be accurate withTheo de Raadt
2000-06-20OpenBSD tagMarkus Friedl
2000-05-31xauth_location support; pr 1234Markus Friedl
2000-05-08complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)Markus Friedl