Age | Commit message (Collapse) | Author | |
---|---|---|---|
2000-07-26 | typo | Theo de Raadt | |
2000-05-31 | xauth_location support; pr 1234 | Markus Friedl | |
2000-05-29 | forwardagent defaults to no, add ssh -A | Markus Friedl | |
2000-05-15 | document ssh -T -N (ssh2 only) | Markus Friedl | |
2000-05-08 | zap typo | Hugh Graham | |
2000-05-08 | complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only) | Markus Friedl | |
2000-05-06 | add DSAAuthetication option to ssh/sshd, document SSH2 in sshd.8 | Markus Friedl | |
2000-05-03 | more info on proto 2 | Markus Friedl | |
2000-05-03 | more doc on: DSA, id_dsa, known_hosts2, authorized_keys2 | Markus Friedl | |
2000-05-02 | update AUTHOR | Markus Friedl | |
2000-04-14 | ssh -2 | Markus Friedl | |
2000-04-12 | document Protocol, Ciphers | Markus Friedl | |
2000-04-12 | Trailing whitespace begone! | Aaron Campbell | |
2000-03-24 | fix spelling errors, From: FreeBSD | Brad Smith | |
2000-03-23 | More pedantic man page formatting insanity, lalala | Aaron Campbell | |
2000-03-23 | Fix some formatting problems I missed before. | Aaron Campbell | |
2000-03-11 | Various cleanups and standardizations. | Aaron Campbell | |
2000-03-04 | Change invalid 'CHAT' loglevel to 'VERBOSE' | Damien Miller | |
2000-02-28 | turn off x11-fwd for the client, too. | Markus Friedl | |
2000-02-21 | do not link to a commercial page.. | Theo de Raadt | |
2000-02-15 | consistent indent. ok aaron@ | Markus Friedl | |
2000-01-22 | ie. -> i.e., | Aaron Campbell | |
2000-01-14 | sort options, from paskalis@di.uoa.gr; .Xr gzip 1 | Markus Friedl | |
2000-01-14 | port:host:hostport in SYNOPSIS, from mep@netsec.net | Markus Friedl | |
2000-01-04 | document -4, -6, and 'ssh -L 2022/::1/22' | Markus Friedl | |
1999-12-25 | remove ref to .ssh/random_seed, mention .ssh/environment in .Sh FILES, too | Markus Friedl | |
1999-12-10 | typo; mark.baushke@solipsa.com | Niels Provos | |
1999-12-02 | CheckHostIP is not available for connects via proxy command | Markus Friedl | |
1999-11-24 | postpone fork_after_authentication until command execution, | Markus Friedl | |
request/patch from jahakala@cc.jyu.fi via damien@ibs.com.au plus: use daemon() for backgrounding | |||
1999-11-22 | tranfer s/key challenge/response data in SSH_SMSG_AUTH_TIS_CHALLENGE | Markus Friedl | |
messages. allows use of s/key in windows (ttssh, securecrt) and ssh-1.2.27 clients without 'ssh -v', ok: niels@ | |||
1999-11-17 | Spell my name right. | Aaron Campbell | |
1999-11-16 | add OpenSSH information to AUTHOR section. okay markus@ | Niels Provos | |
1999-11-10 | add LogLevel {QUIET, FATAL, ERROR, INFO, CHAT, DEBUG} to ssh/sshd, | Markus Friedl | |
obsoletes QuietMode and FascistLogging in sshd. | |||
1999-11-09 | user/958: check ~/.ssh/known_hosts for rhosts-rsa, too, ok niels/millert | Markus Friedl | |
1999-10-17 | mention that verbose mode can be used s/key authentication | Niels Provos | |
1999-10-17 | update trailer, and copy to other pages | Theo de Raadt | |
1999-10-17 | mention OpenSSH, plus added features. | Niels Provos | |
1999-10-16 | typo, add '-f' to SYNOPSIS | Markus Friedl | |
1999-10-16 | support for SSH protocol 1.5 which is poorly documented, the RFC.troff lies. | Markus Friedl | |
interops (x11,agent,etc) with 1.2.27 and protocol 1.3 | |||
1999-10-14 | fix old connect() race security-bug for ssh-agent and agent-forwarding | Markus Friedl | |
by removing the connect() junk, with the following restrictions: 1) change the version to "OpenSSH-1.1": agent-forwarding will work only between OpenSSH-1.1 client and OpenSSH-1.1 server 2) renamed the environment variable of OpenSSH-1.1 to "SSH_AUTH_SOCKET", since useing OpenSSH-1.0 ssh-add against the new ssh-agent does not work | |||
1999-10-12 | -P/UsePrivilegedPort from 1.2.27, it turns of allocation of priv. port | Markus Friedl | |
and disabled rhosts/rhosts-rsa, ok deraadt@ | |||
1999-10-11 | document reality (no askpass, ignore group-world-accessible private keys) | Markus Friedl | |
1999-10-06 | implement client NumberOfPasswordPrompts option | Dug Song | |
1999-10-03 | add code to detect DNS spoofing: | Niels Provos | |
the main idea is to not only store the host key for the hostname but also for the according IP address. When we check the host key in the known_hosts file, we also check the key against the according IP address. When the server key changes, host_status = HOST_CHANGED. If check_host_in_hostfile() returns differing status for the IP address that means that either DNS was spoofed or that the IP address for the host and the host key changed at the same time. | |||
1999-10-03 | - Fix up SYNOPSIS sections. | Aaron Campbell | |
- Remove refereces to /etc/environment and /etc/default/login; markus@ - Document X11DisplayOffset in sshd(8). - Some other fixes... | |||
1999-10-02 | rhosts-rsa-auth ignores ~/.ssh/known_hosts; ↵ | Theo de Raadt | |
markus.friedl@informatik.uni-erlangen.de | |||
1999-10-02 | remove mention of 'none' cipher. | Niels Provos | |
1999-10-02 | detail how we manage to not include RSA, and point people at ssl(8) | Theo de Raadt | |
1999-10-01 | s/IDEA/3DES/ | Theo de Raadt | |
1999-09-30 | oops, misremembered history. 1.2.12 was the last free version; beck | Theo de Raadt | |