summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/servconf.c
AgeCommit message (Collapse)Author
2001-05-03remove "\n" from fatal()Kevin Steves
2001-04-15use fatal() or error() vs. fprintf(); ok markus@Kevin Steves
2001-04-13Add options ClientAliveInterval and ClientAliveCountMax to sshd.Bob Beck
This gives the ability to do a "keepalive" via the encrypted channel which can't be spoofed (unlike TCP keepalives). Useful for when you want to use ssh connections to authenticate people for something, and know relatively quickly when they are no longer authenticated. Disabled by default (of course). ok markus@
2001-04-12robust port validation; ok markus@ jakob@Kevin Steves
2001-04-12implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2)Markus Friedl
similar to RhostRSAAuthentication unless you enable (the experimental) HostbasedUsesNameFromPacketOnly option. please test. :)
2001-04-06in addition to:Kevin Steves
ListenAddress host|ipv4_addr|ipv6_addr permit: ListenAddress [host|ipv4_addr|ipv6_addr]:port ListenAddress host|ipv4_addr:port sshd.8 updates coming. ok markus@
2001-04-02correct comment; ok markus@Kevin Steves
2001-03-25PrintLastLog option; from chip@valinux.com with some minorKevin Steves
changes by me. ok markus@
2001-03-05sync error message; ok markus@Kevin Steves
2001-03-04log functions should not be passed strings that end in newline as theyTodd C. Miller
get passed on to syslog() and when logging to stderr, do_log() appends its own newline.
2001-03-04kill obsolete RandomSeed; ok markus@ deraadt@Kevin Steves
2001-02-22grammar; slade@shore.netTheo de Raadt
2001-02-12PermitRootLogin={yes,without-password,forced-commands-only,no}Markus Friedl
(before this change, root could login even if PermitRootLogin==no)
2001-02-111) clean up the MAC support for SSH-2Markus Friedl
2) allow you to specify the MAC with 'ssh -m' 3) or the 'MACs' keyword in ssh(d)_config 4) add hmac-{md5,sha1}-96 ok stevesk@, provos@
2001-02-04unexpand and remove end-of-line whitespace; ok markus@Kevin Steves
2001-02-03make ReverseMappingCheck optional in sshd_config; ok djm@,dugsong@Markus Friedl
2001-01-22rename skey -> challenge response.Markus Friedl
auto-enable kbd-interactive for ssh2 if challenge-reponse is enabled.
2001-01-21split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.Markus Friedl
rename util.[ch] -> misc.[ch]
2001-01-20Check for NULL return from strdelim; ok markusDamien Miller
2001-01-19move ssh1 definitions to ssh1.h, pathnames to pathnames.hMarkus Friedl
2001-01-19only auth-chall.c needs #ifdef SKEYMarkus Friedl
2001-01-18log() is at pri=LOG_INFO, since LOG_NOTICE goes to /dev/console on many systemsMarkus Friedl
2001-01-08implement option 'Banner /etc/issue.net' for ssh2, move version toMarkus Friedl
2.3.1 (needed for bugcompat detection, 2.3.0 would fail if Banner is enabled).
2001-01-07rename SYSLOG_LEVEL_INFO->SYSLOG_LEVEL_NOTICEMarkus Friedl
syslog priority changes: fatal() LOG_ERR -> LOG_CRIT log() LOG_INFO -> LOG_NOTICE
2000-12-19replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'Markus Friedl
with u_char.
2000-11-12add support for RSA to SSH2. please test.Markus Friedl
there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
2000-10-14AllowTcpForwarding; from naddy@Markus Friedl
2000-10-11add support for s/key (kbd-interactive) to ssh2, based on work by ↵Markus Friedl
mkiernan@avantgo.com and me
2000-09-07cleanup copyright notices on all files. I have attempted to be accurate withTheo de Raadt
the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
2000-07-22random early drop; ok theo, nielsMarkus Friedl
2000-07-14 allow leading whitespace. ok nielsMarkus Friedl
2000-07-13allow multiple whitespace but only one '=' between tokens, bug report fromNiels Provos
Ralf S. Engelschall <rse@engelschall.com> but different fix. okay deraadt@
2000-07-10strtok() --> strsep(). (niels@ ok)Hakan Olsson
2000-06-26MaxStartups: limit number of unauthenticated connections, work by theo and meMarkus Friedl
2000-06-20OpenBSD tagMarkus Friedl
2000-06-18include = in WHITESPACE; markus okTheo de Raadt
2000-06-17add support for ssh v2 subsystems. ok markus@.Jakob Schlyter
2000-05-31xauth_location support; pr 1234Markus Friedl
2000-05-22check strtok() != NULL; ok niels@Markus Friedl
2000-05-08complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)Markus Friedl
2000-05-06add DSAAuthetication option to ssh/sshd, document SSH2 in sshd.8Markus Friedl
2000-05-03GatewayPorts for sshd, ok deraadt@Markus Friedl
2000-05-03s/DsaKey/HostDSAKey/, document optionMarkus Friedl
2000-05-01PidFile, pr 1210Markus Friedl
2000-04-26ssh/sshd default to proto 1 and 2Markus Friedl
2000-04-14whitespace cleanupMarkus Friedl
2000-04-12add Cipher and Protocol options to ssh/sshd, e.g.:Markus Friedl
ssh -o 'Protocol 1,2' if you prefer proto 1, ssh -o 'Ciphers arcfour,3des-cbc'
2000-04-06ssh2 server side, see README.openssh2; enable with 'sshd -2'Markus Friedl
2000-03-07typo: ignore_user_known_hosts int->flag; naddy@mips.rhein-neckar.deMarkus Friedl
2000-02-24sync with sshd_configMarkus Friedl