summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/serverloop.c
AgeCommit message (Expand)Author
2020-07-03start ClientAliveInterval bookkeeping before first pass throughDamien Miller
2020-01-30use sshpkt_fatal() instead of plain fatal() for ssh_packet_write_poll()Damien Miller
2020-01-25make sshd_config:ClientAliveCountMax=0 disable the connection killingDamien Miller
2020-01-25unrevert this:Damien Miller
2020-01-23Replace all calls to signal(2) with a wrapper around sigaction(2).Darren Tucker
2019-11-27Revert previous commit. The channels code still uses int in many placesDarren Tucker
2019-11-27Make channel_id u_int32_t and remove unnecessary check and cast that wereDarren Tucker
2019-06-28When system calls indicate an error they return -1, not some arbitraryTheo de Raadt
2019-03-27fix interaction between ClientAliveInterval and RekeyLimit that couldDamien Miller
2019-03-06Reset last-seen time when sending a keepalive. Prevents sending twoDarren Tucker
2019-01-19fix error in refactor: use ssh_packet_disconnect() instead ofDamien Miller
2019-01-19remove last references to active_stateDamien Miller
2019-01-19convert serverloop.c to new packet APIDamien Miller
2019-01-19begin landing remaining refactoring of packet parsing API, startedDamien Miller
2018-07-27Remove uid checks from low port binds. Now that ssh cannot beDarren Tucker
2018-07-11remove legacy key emulation layer; ok djm@Markus Friedl
2018-07-09sshd: switch config to sshbuf API; ok djm@Markus Friedl
2018-06-08fix some over-long lines and __func__ up some debug messagesDamien Miller
2018-03-03switch over to the new authorized_keys options API and remove theDamien Miller
2018-02-11Don't reset signal handlers inside handlers.Darren Tucker
2018-01-23Drop compatibility hacks for some ancient SSH implementations, includingDamien Miller
2017-12-18unbreak hostkey rotation; attempting to sign with a desired signatureDamien Miller
2017-12-18pass negotiated signing algorithm though to sshkey_verify() andDamien Miller
2017-12-10Put remote client info back into the ClientAlive connection terminationDarren Tucker
2017-10-23Expose devices allocated for tun/tap forwarding.Damien Miller
2017-09-12Make remote channel ID a u_intDamien Miller
2017-09-12refactor channels.cDamien Miller
2017-08-30pass packet state down to some of the channels function (moreDamien Miller
2017-08-11Tweak previous keepalive commit: if last_time + keepalive <= nowDarren Tucker
2017-08-11Keep track of the last time we actually heard from the client andDarren Tucker
2017-05-31remove now obsolete ctx from ssh_dispatch_run; ok djm@Markus Friedl
2017-05-30protocol handlers all get struct ssh passed; ok djm@Markus Friedl
2017-02-01Return true reason for port forwarding failures where feasible ratherDarren Tucker
2017-01-04unbreak Unix domain socket forwarding for root; ok markus@Damien Miller
2016-12-14disable Unix-domain socket forwarding when privsep is disabledDamien Miller
2016-11-30Add a sshd_config DisableForwaring option that disables X11, agent,Damien Miller
2016-10-23Factor out "can bind to low ports" check into its own function. This will makeDarren Tucker
2016-09-12Add MAXIMUM(), MINIMUM(), and ROUNDUP() to misc.h, then use those definitionsTheo de Raadt
2016-08-13remove ssh1 server code; ok djm@Markus Friedl
2016-03-07refactor canohost.c: move functions that cache results closer to theDamien Miller
2016-03-04fix ClientAliveInterval when a time-based RekeyLimit is set;Damien Miller
2016-02-08refactor activation of rekeyingDamien Miller
2016-01-14remove roaming support; ok djm@Markus Friedl
2015-12-04implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)Markus Friedl
2015-11-28don't include port number in tcpip-forward replies for requestsDamien Miller
2015-02-20UpdateHostKeys fixes:Damien Miller
2015-02-16Revise hostkeys@openssh.com hostkey learning extension.Damien Miller
2015-01-20Reduce use of <sys/param.h> and transition to <limits.h> throughout.Theo de Raadt
2015-01-19adapt kex to sshbuf and struct ssh; ok djm@Markus Friedl
2015-01-19move dispatch to struct ssh; ok djm@Markus Friedl