summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/ssh.c
AgeCommit message (Collapse)Author
1999-11-15a note for legay systems about secuity issues with permanently_set_uid(),Markus Friedl
the private hostkey and ptrace()
1999-11-14print _all_ bad config-options in ssh(1), tooMarkus Friedl
1999-11-11make all access to options via 'extern Options options'Markus Friedl
and 'extern ServerOptions options' respectively; options are no longer passed as arguments: * make options handling more consistent * remove #include "readconf.h" from ssh.h * readconf.h is only included if necessary
1999-11-10add LogLevel {QUIET, FATAL, ERROR, INFO, CHAT, DEBUG} to ssh/sshd,Markus Friedl
obsoletes QuietMode and FascistLogging in sshd.
1999-10-28save a few lines when disabling rhosts-{rsa-}authMarkus Friedl
1999-10-26don't define original_real_uid twiceMarkus Friedl
1999-10-14fix old connect() race security-bug for ssh-agent and agent-forwardingMarkus Friedl
by removing the connect() junk, with the following restrictions: 1) change the version to "OpenSSH-1.1": agent-forwarding will work only between OpenSSH-1.1 client and OpenSSH-1.1 server 2) renamed the environment variable of OpenSSH-1.1 to "SSH_AUTH_SOCKET", since useing OpenSSH-1.0 ssh-add against the new ssh-agent does not work
1999-10-12-P/UsePrivilegedPort from 1.2.27, it turns of allocation of priv. portMarkus Friedl
and disabled rhosts/rhosts-rsa, ok deraadt@
1999-10-03add code to detect DNS spoofing:Niels Provos
the main idea is to not only store the host key for the hostname but also for the according IP address. When we check the host key in the known_hosts file, we also check the key against the according IP address. When the server key changes, host_status = HOST_CHANGED. If check_host_in_hostfile() returns differing status for the IP address that means that either DNS was spoofed or that the IP address for the host and the host key changed at the same time.
1999-09-30reorder usage, like real sshTheo de Raadt
1999-09-30better way to deal with authfile cipher; dugsong@Niels Provos
1999-09-30remove ``none''.Niels Provos
1999-09-30"ssh is a very large program" -- anonymousTheo de Raadt
1999-09-30wringing out all the waterTheo de Raadt
1999-09-30do not bother with dinosaur pacificationTheo de Raadt
1999-09-30cull more ancient garbage from pre-POSIX daysTheo de Raadt
1999-09-30more cullingTheo de Raadt
1999-09-30rely on paths.h moreTheo de Raadt
1999-09-29we have setsidTheo de Raadt
1999-09-29numerous sprintf, strncpy, strcpy cleanupsTheo de Raadt
1999-09-29global original_real_uidDug Song
1999-09-29update krb4/AFS support to ssh-1.2.27-afs-kerberos-pl1 level, clean up ↵Dug Song
unused variables, update manpages
1999-09-29-V in usage()Niels Provos
1999-09-29correct the usage, disable agent forwarding is -aNiels Provos
1999-09-29add -V optionTheo de Raadt
1999-09-29test for RSA in the ssl library, real early onTheo de Raadt
1999-09-29GatewayPorts and ssh -g; markus.friedl@informatik.uni-erlangen.deTheo de Raadt
1999-09-28user@host; aaronTheo de Raadt
1999-09-28convert all uses of gmp to SSL bignumNiels Provos
convert all used of rsa to SSL rsa functions remove all use of randomstate to OpenBSD arc4random() and arc4_stir() all this done at a long long night in Canada.
1999-09-26i bet a lot of people didn't know what ssh 1.2.16 had a nice license.Theo de Raadt
well, except for the patent issues. someone in sweden (forget their name at the moment) cleaned out most of the patented code, and now this code removes rsa code. when this is done, it will link against libssl, but the work isn't completely done yet. then we need to bring this up to modern days, featurewise.