Age | Commit message (Collapse) | Author | |
---|---|---|---|
1999-11-15 | a note for legay systems about secuity issues with permanently_set_uid(), | Markus Friedl | |
the private hostkey and ptrace() | |||
1999-11-14 | print _all_ bad config-options in ssh(1), too | Markus Friedl | |
1999-11-11 | make all access to options via 'extern Options options' | Markus Friedl | |
and 'extern ServerOptions options' respectively; options are no longer passed as arguments: * make options handling more consistent * remove #include "readconf.h" from ssh.h * readconf.h is only included if necessary | |||
1999-11-10 | add LogLevel {QUIET, FATAL, ERROR, INFO, CHAT, DEBUG} to ssh/sshd, | Markus Friedl | |
obsoletes QuietMode and FascistLogging in sshd. | |||
1999-10-28 | save a few lines when disabling rhosts-{rsa-}auth | Markus Friedl | |
1999-10-26 | don't define original_real_uid twice | Markus Friedl | |
1999-10-14 | fix old connect() race security-bug for ssh-agent and agent-forwarding | Markus Friedl | |
by removing the connect() junk, with the following restrictions: 1) change the version to "OpenSSH-1.1": agent-forwarding will work only between OpenSSH-1.1 client and OpenSSH-1.1 server 2) renamed the environment variable of OpenSSH-1.1 to "SSH_AUTH_SOCKET", since useing OpenSSH-1.0 ssh-add against the new ssh-agent does not work | |||
1999-10-12 | -P/UsePrivilegedPort from 1.2.27, it turns of allocation of priv. port | Markus Friedl | |
and disabled rhosts/rhosts-rsa, ok deraadt@ | |||
1999-10-03 | add code to detect DNS spoofing: | Niels Provos | |
the main idea is to not only store the host key for the hostname but also for the according IP address. When we check the host key in the known_hosts file, we also check the key against the according IP address. When the server key changes, host_status = HOST_CHANGED. If check_host_in_hostfile() returns differing status for the IP address that means that either DNS was spoofed or that the IP address for the host and the host key changed at the same time. | |||
1999-09-30 | reorder usage, like real ssh | Theo de Raadt | |
1999-09-30 | better way to deal with authfile cipher; dugsong@ | Niels Provos | |
1999-09-30 | remove ``none''. | Niels Provos | |
1999-09-30 | "ssh is a very large program" -- anonymous | Theo de Raadt | |
1999-09-30 | wringing out all the water | Theo de Raadt | |
1999-09-30 | do not bother with dinosaur pacification | Theo de Raadt | |
1999-09-30 | cull more ancient garbage from pre-POSIX days | Theo de Raadt | |
1999-09-30 | more culling | Theo de Raadt | |
1999-09-30 | rely on paths.h more | Theo de Raadt | |
1999-09-29 | we have setsid | Theo de Raadt | |
1999-09-29 | numerous sprintf, strncpy, strcpy cleanups | Theo de Raadt | |
1999-09-29 | global original_real_uid | Dug Song | |
1999-09-29 | update krb4/AFS support to ssh-1.2.27-afs-kerberos-pl1 level, clean up ↵ | Dug Song | |
unused variables, update manpages | |||
1999-09-29 | -V in usage() | Niels Provos | |
1999-09-29 | correct the usage, disable agent forwarding is -a | Niels Provos | |
1999-09-29 | add -V option | Theo de Raadt | |
1999-09-29 | test for RSA in the ssl library, real early on | Theo de Raadt | |
1999-09-29 | GatewayPorts and ssh -g; markus.friedl@informatik.uni-erlangen.de | Theo de Raadt | |
1999-09-28 | user@host; aaron | Theo de Raadt | |
1999-09-28 | convert all uses of gmp to SSL bignum | Niels Provos | |
convert all used of rsa to SSL rsa functions remove all use of randomstate to OpenBSD arc4random() and arc4_stir() all this done at a long long night in Canada. | |||
1999-09-26 | i bet a lot of people didn't know what ssh 1.2.16 had a nice license. | Theo de Raadt | |
well, except for the patent issues. someone in sweden (forget their name at the moment) cleaned out most of the patented code, and now this code removes rsa code. when this is done, it will link against libssl, but the work isn't completely done yet. then we need to bring this up to modern days, featurewise. |