summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/ssh.c
AgeCommit message (Collapse)Author
2007-09-04make ssh(1)'s ConnectTimeout option apply to both the TCP connection andDamien Miller
SSH banner exchange (previously it just covered the TCP connection). This allows callers of ssh(1) to better detect and deal with stuck servers that accept a TCP connection but don't progress the protocol, and also makes ConnectTimeout useful for connections via a ProxyCommand; feedback and "looks ok" markus@
2007-09-04make file descriptor passing code return an error rather than call fatal()Damien Miller
when it encounters problems, and use this to make session multiplexing masters survive slaves failing to pass all stdio FDs; ok markus@
2007-08-07bz#1232: ensure that any specified LocalCommand is executed after theDamien Miller
tunnel device is opened. Also, make failures to open a tunnel device fatal when ExitOnForwardFailure is active. Reported by h.goebel AT goebel-consult.de; ok dtucker markus reyk deraadt
2007-06-14when waiting for the multiplex exit status, read until the master endDamien Miller
writes an entire int of data *and* closes the client_fd; fixes mux regression spotted by dtucker, ok dtucker@
2007-06-14handle EINTR when waiting for mux exit status properlyDamien Miller
2007-06-12improved exit message from multiplex slave sessions; bz #1262Damien Miller
reported by alexandre.nunes AT gmail.com; ok dtucker@
2007-06-12Add "-K" flag for ssh to set GSSAPIAuthentication=yes andDamien Miller
GSSAPIDelegateCredentials=yes. This is symmetric with -k (disable GSSAPI) and is useful for hosts with /home on Kerberised NFS; bz #1312 patch from Markus.Kuhn AT cl.cam.ac.uk; ok dtucker@ markus@
2007-06-12fix slave exit value when a control master goes away without passing theDamien Miller
full exit status by ensuring that the slave reads a full int. bz#1261 reported by frekko AT gmail.com; ok markus@ dtucker@
2007-01-03spacesKevin Steves
2006-10-06sys/resource.h needs sys/time.h; prompted by brad@Damien Miller
2006-08-03almost entirely get rid of the culture of ".h files that include .h files"Theo de Raadt
ok djm, sort of ok stevesk makes the pain stop in one easy step
2006-08-01clean extra spacesKevin Steves
2006-08-01move #include <stdio.h> out of includes.hKevin Steves
2006-07-26move #include <stdlib.h> out of includes.hKevin Steves
2006-07-22move #include <string.h> out of includes.hKevin Steves
2006-07-17move #include <unistd.h> out of includes.hKevin Steves
2006-07-12move #include <stddef.h> out of includes.hKevin Steves
2006-07-12move #include <netdb.h> out of includes.h; ok djm@Kevin Steves
2006-07-11need <errno.h> here also (it's also included in <openssl/err.h>)Kevin Steves
2006-07-11cast asterisk field precision argument to int to remove warning;Kevin Steves
ok markus@
2006-07-11add ExitOnForwardFailure: terminate the connection if ssh(1)Markus Friedl
cannot set up all requested dynamic, local, and remote port forwardings. ok djm, dtucker, stevesk, jmc
2006-07-11Only copy the part of environment variable that we actually use. PreventsDarren Tucker
ssh bailing when SendEnv is used and an environment variable with a really long value exists. ok djm@
2006-07-09move #include <fcntl.h> out of includes.hKevin Steves
2006-07-08move #include <sys/socket.h> out of includes.hKevin Steves
2006-07-06move #include <pwd.h> out of includes.h; ok markus@Kevin Steves
2006-07-03move #include "version.h" out of includes.h; ok markus@Kevin Steves
2006-07-02more details and clarity for tun(4) device forwarding; ok and helpKevin Steves
jmc@
2006-04-25Prevent ssh from trying to open private keys with bad permissions more thanDarren Tucker
once or prompting for their passphrases (which it subsequently ignores anyway), similar to a previous change in ssh-add. bz #1186, ok djm@
2006-03-30add percent escape chars to the IdentityFile option, bz #1159 basedDamien Miller
on a patch by imaging AT math.ualberta.ca; feedback and ok dtucker@
2006-03-28spacingTheo de Raadt
2006-03-25Put $OpenBSD$ tags back (as comments) to replace the RCSID()s thatDamien Miller
Theo nuked - our scripts to sync -portable need them in the files
2006-03-25introduce xcalloc() and xasprintf() failure-checked allocations functionsDamien Miller
and use them throughout openssh xcalloc is particularly important because malloc(nmemb * size) is a dangerous idiom (subject to integer overflow) and it is time for it to die feedback and ok deraadt@
2006-03-20be strict with tolower() castingTheo de Raadt
2006-03-20annoying spacing fixes getting in the way of real diffsTheo de Raadt
2006-03-20sprinkle u_int throughout pty subsystem, ok markusTheo de Raadt
2006-03-19spacingTheo de Raadt
2006-03-19RCSID() can dieTheo de Raadt
2006-03-12knf nitDamien Miller
2006-02-22move #include <ctype.h> out of includes.h; ok djm@Kevin Steves
2006-02-20move #include <sys/stat.h> out of includes.h; ok markus@Kevin Steves
2006-02-20move #include <signal.h> out of includes.h; ok markus@Kevin Steves
2006-02-20move #include <sys/un.h> out of includes.h; ok djm@Kevin Steves
2006-02-12add a %l expansion code to the ControlPath, which is filled in with theDamien Miller
local hostname at runtime. Requested by henning@ to avoid some problems with /home on NFS; ok dtucker@
2006-02-10move #include <sys/ioctl.h> out of includes.h; ok markus@Kevin Steves
2006-02-08move #include <sys/resource.h> out of includes.h; ok markus@Kevin Steves
2006-02-08move #include <paths.h> out of includes.h; ok markus@Kevin Steves
2005-12-20exit(255) on error to match description in ssh(1); bz #1137; ok deraadt@Darren Tucker
2005-12-08two changes to the new ssh tunnel support. this breaks compatibilityReyk Floeter
with the initial commit but is required for a portable approach. - make the tunnel id u_int and platform friendly, use predefined types. - support configuration of layer 2 (ethernet) or layer 3 (point-to-point, default) modes. configuration is done using the Tunnel (yes|point-to-point|ethernet|no) option is ssh_config(5) and restricted by the PermitTunnel (yes|point-to-point|ethernet|no) option in sshd_config(5). ok djm@, man page bits by jmc@
2005-12-06Add support for tun(4) forwarding over OpenSSH, based on an idea andReyk Floeter
initial channel code bits by markus@. This is a simple and easy way to use OpenSSH for ad hoc virtual private network connections, e.g. administrative tunnels or secure wireless access. It's based on a new ssh channel and works similar to the existing TCP forwarding support, except that it depends on the tun(4) network interface on both ends of the connection for layer 2 or layer 3 tunneling. This diff also adds support for LocalCommand in the ssh(1) client. ok djm@, markus@, jmc@ (manpages), tested and discussed with others
2005-10-30no need to escape single quotes in comments, no binary changeDamien Miller