summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/ssh.h
AgeCommit message (Collapse)Author
1999-11-24KNF, final part 3Markus Friedl
1999-11-24much more KNFTheo de Raadt
1999-11-22tranfer s/key challenge/response data in SSH_SMSG_AUTH_TIS_CHALLENGEMarkus Friedl
messages. allows use of s/key in windows (ttssh, securecrt) and ssh-1.2.27 clients without 'ssh -v', ok: niels@
1999-11-22syslog changes:Markus Friedl
* Unified Logmessage for all auth-types, for success and for failed * Standard connections get only ONE line in the LOG when level==LOG: Auth-attempts are logged only, if authentication is: a) successfull or b) with passwd or c) we had more than AUTH_FAIL_LOG failues * many log() became verbose() * old behaviour with level=VERBOSE
1999-11-19bugfix: loglevels are per host in clientconfig,Markus Friedl
factor out common log-level parsing code.
1999-11-15the keysize of rsa-parameter 'n' is passed implizit,Markus Friedl
a few more checks and warnings about 'pretended' keysizes.
1999-11-11make all access to options via 'extern Options options'Markus Friedl
and 'extern ServerOptions options' respectively; options are no longer passed as arguments: * make options handling more consistent * remove #include "readconf.h" from ssh.h * readconf.h is only included if necessary
1999-11-11IgnoreUserKnownHosts(default=no), used for RhostRSAAuth, ok deraadt,millertMarkus Friedl
1999-11-10add LogLevel {QUIET, FATAL, ERROR, INFO, CHAT, DEBUG} to ssh/sshd,Markus Friedl
obsoletes QuietMode and FascistLogging in sshd.
1999-11-10remove x11- and krb-cleanup from fatal() + krb-cleanup cleanupMarkus Friedl
1999-11-02remove unused argument. ok dugsongMarkus Friedl
1999-10-28from niklas: Add -c -s and -k support, Create socket early to avoid race,Markus Friedl
Don't let child access std{in,out,err}
1999-10-25remove prototypes for old/removed minfd functionsMarkus Friedl
1999-10-16support for SSH protocol 1.5 which is poorly documented, the RFC.troff lies.Markus Friedl
interops (x11,agent,etc) with 1.2.27 and protocol 1.3
1999-10-16-Wall cleanupNiels Provos
1999-10-14fix old connect() race security-bug for ssh-agent and agent-forwardingMarkus Friedl
by removing the connect() junk, with the following restrictions: 1) change the version to "OpenSSH-1.1": agent-forwarding will work only between OpenSSH-1.1 client and OpenSSH-1.1 server 2) renamed the environment variable of OpenSSH-1.1 to "SSH_AUTH_SOCKET", since useing OpenSSH-1.0 ssh-add against the new ssh-agent does not work
1999-10-11make sure ~/.ssh/authorized_keys is not writable for group/world (sshd)Markus Friedl
don't load private keys if they are group/world-{rwx} (ssh,sshd and ssh-add)
1999-10-07add skey to sshd:Markus Friedl
1) pass *pw to auth_password() not user_name, do_authentication already keeps private copy of struct passwd for current user. 2) limit authentication attemps to 5, otherwise ssh -o 'NumberOfPasswordPrompts 100000' host lets you enter 100000 passwds 3) make s/key a run-time option in /etc/sshd_config 4) generate fake skeys, for s/key for nonexisting users, too limit auth-tries for nonexisting users, too. Note that % ssh -l nonexisting-user -o 'NumberOfPasswordPrompts 100000' host has NO limits in ssh-1.2.27
1999-10-05move auth-sockets to private dirMarkus Friedl
delete minfd residua
1999-10-04nuke genminfd/AUTH_FDMarkus Friedl
1999-10-03add code to detect DNS spoofing:Niels Provos
the main idea is to not only store the host key for the hostname but also for the according IP address. When we check the host key in the known_hosts file, we also check the key against the according IP address. When the server key changes, host_status = HOST_CHANGED. If check_host_in_hostfile() returns differing status for the IP address that means that either DNS was spoofed or that the IP address for the host and the host key changed at the same time.
1999-10-01get rid of references to randomseedfile we dont need it. for sshdNiels Provos
just spit out a warning that the configuration option is obsolete.
1999-09-29update krb4/AFS support to ssh-1.2.27-afs-kerberos-pl1 level, clean up ↵Dug Song
unused variables, update manpages
1999-09-28convert all uses of gmp to SSL bignumNiels Provos
convert all used of rsa to SSL rsa functions remove all use of randomstate to OpenBSD arc4random() and arc4_stir() all this done at a long long night in Canada.
1999-09-26build ssh components using our build modelTheo de Raadt
1999-09-26i bet a lot of people didn't know what ssh 1.2.16 had a nice license.Theo de Raadt
well, except for the patent issues. someone in sweden (forget their name at the moment) cleaned out most of the patented code, and now this code removes rsa code. when this is done, it will link against libssl, but the work isn't completely done yet. then we need to bring this up to modern days, featurewise.