summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/ssh.h
AgeCommit message (Collapse)Author
2001-01-07rename SYSLOG_LEVEL_INFO->SYSLOG_LEVEL_NOTICEMarkus Friedl
syslog priority changes: fatal() LOG_ERR -> LOG_CRIT log() LOG_INFO -> LOG_NOTICE
2000-12-19replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'Markus Friedl
with u_char.
2000-11-25print keytype when generating a key.Markus Friedl
reasonable defaults for RSA1/RSA/DSA keys.
2000-10-11new cipher frameworkMarkus Friedl
2000-10-11add support for s/key (kbd-interactive) to ssh2, based on work by ↵Markus Friedl
mkiernan@avantgo.com and me
2000-10-11First rough implementation of the diffie-hellman group exchange. TheNiels Provos
client can ask the server for bigger groups to perform the diffie-hellman in, thus increasing the attack complexity when using ciphers with longer keys. University of Windsor provided network, T the company.
2000-09-12multiple debug levelsMarkus Friedl
2000-09-07cleanup copyright notices on all files. I have attempted to be accurate withTheo de Raadt
the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
2000-08-19support for ~. in ssh2Markus Friedl
2000-07-13allow multiple whitespace but only one '=' between tokens, bug report fromNiels Provos
Ralf S. Engelschall <rse@engelschall.com> but different fix. okay deraadt@
2000-06-20OpenBSD tagMarkus Friedl
2000-05-17enable nonblocking IO for sshd w/ proto 1, too; split out common codeMarkus Friedl
2000-05-08complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)Markus Friedl
2000-05-04replace broken uuencode w/ libc b64_ntopMarkus Friedl
2000-05-03s/DsaKey/HostDSAKey/, document optionMarkus Friedl
2000-05-02default DSA key file ~/.ssh/id_dsaMarkus Friedl
2000-04-26host key becomes /etc/ssh_host_dsa_keyTheo de Raadt
2000-04-26add DSA pubkey auth and other SSH2 fixes. use ssh-keygen -[xX]Markus Friedl
for trading keys with the real and the original SSH, directly from the people who invented the SSH protocol.
2000-04-19pid_tTheo de Raadt
2000-04-14whitespace cleanupMarkus Friedl
2000-04-12add Cipher and Protocol options to ssh/sshd, e.g.:Markus Friedl
ssh -o 'Protocol 1,2' if you prefer proto 1, ssh -o 'Ciphers arcfour,3des-cbc'
2000-04-06ssh2 server side, see README.openssh2; enable with 'sshd -2'Markus Friedl
2000-03-28replace big switch() with function tables (prepare for ssh2)Markus Friedl
2000-03-23initial support for DSA keys. ok deraadt@, niels@Markus Friedl
2000-02-01int atomicio -> ssize_t (for alpha). ok deraadt@David Leonard
2000-01-04ipv6 support: mostly gethostbyname->getaddrinfo/getnameinfo, new features:Markus Friedl
sshd allows multiple ListenAddress and Port options. note that libwrap is not IPv6-ready. (based on patches from <kick@kyoto.wide.ad.jp> and fujiwara@rcac.tdi.co.jp)
1999-12-12type conflict for 'extern Type *options' in channels.c; dot@dotat.atMarkus Friedl
1999-12-06move atomicio into it's own file. wrap all socket write()s which were doingTheo de Raadt
write(sock, buf, len) != len, with atomicio() calls.
1999-12-02document $SSH_ASKPASS, reasonable defaultMarkus Friedl
1999-12-01move skey-auth from auth-passwd.c to auth-skey.c, same for krb4Markus Friedl
1999-12-01ports are u_shortMarkus Friedl
1999-11-24KNF, final part 3Markus Friedl
1999-11-24much more KNFTheo de Raadt
1999-11-22tranfer s/key challenge/response data in SSH_SMSG_AUTH_TIS_CHALLENGEMarkus Friedl
messages. allows use of s/key in windows (ttssh, securecrt) and ssh-1.2.27 clients without 'ssh -v', ok: niels@
1999-11-22syslog changes:Markus Friedl
* Unified Logmessage for all auth-types, for success and for failed * Standard connections get only ONE line in the LOG when level==LOG: Auth-attempts are logged only, if authentication is: a) successfull or b) with passwd or c) we had more than AUTH_FAIL_LOG failues * many log() became verbose() * old behaviour with level=VERBOSE
1999-11-19bugfix: loglevels are per host in clientconfig,Markus Friedl
factor out common log-level parsing code.
1999-11-15the keysize of rsa-parameter 'n' is passed implizit,Markus Friedl
a few more checks and warnings about 'pretended' keysizes.
1999-11-11make all access to options via 'extern Options options'Markus Friedl
and 'extern ServerOptions options' respectively; options are no longer passed as arguments: * make options handling more consistent * remove #include "readconf.h" from ssh.h * readconf.h is only included if necessary
1999-11-11IgnoreUserKnownHosts(default=no), used for RhostRSAAuth, ok deraadt,millertMarkus Friedl
1999-11-10add LogLevel {QUIET, FATAL, ERROR, INFO, CHAT, DEBUG} to ssh/sshd,Markus Friedl
obsoletes QuietMode and FascistLogging in sshd.
1999-11-10remove x11- and krb-cleanup from fatal() + krb-cleanup cleanupMarkus Friedl
1999-11-02remove unused argument. ok dugsongMarkus Friedl
1999-10-28from niklas: Add -c -s and -k support, Create socket early to avoid race,Markus Friedl
Don't let child access std{in,out,err}
1999-10-25remove prototypes for old/removed minfd functionsMarkus Friedl
1999-10-16support for SSH protocol 1.5 which is poorly documented, the RFC.troff lies.Markus Friedl
interops (x11,agent,etc) with 1.2.27 and protocol 1.3
1999-10-16-Wall cleanupNiels Provos
1999-10-14fix old connect() race security-bug for ssh-agent and agent-forwardingMarkus Friedl
by removing the connect() junk, with the following restrictions: 1) change the version to "OpenSSH-1.1": agent-forwarding will work only between OpenSSH-1.1 client and OpenSSH-1.1 server 2) renamed the environment variable of OpenSSH-1.1 to "SSH_AUTH_SOCKET", since useing OpenSSH-1.0 ssh-add against the new ssh-agent does not work
1999-10-11make sure ~/.ssh/authorized_keys is not writable for group/world (sshd)Markus Friedl
don't load private keys if they are group/world-{rwx} (ssh,sshd and ssh-add)
1999-10-07add skey to sshd:Markus Friedl
1) pass *pw to auth_password() not user_name, do_authentication already keeps private copy of struct passwd for current user. 2) limit authentication attemps to 5, otherwise ssh -o 'NumberOfPasswordPrompts 100000' host lets you enter 100000 passwds 3) make s/key a run-time option in /etc/sshd_config 4) generate fake skeys, for s/key for nonexisting users, too limit auth-tries for nonexisting users, too. Note that % ssh -l nonexisting-user -o 'NumberOfPasswordPrompts 100000' host has NO limits in ssh-1.2.27
1999-10-05move auth-sockets to private dirMarkus Friedl
delete minfd residua