summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/ssh.h
AgeCommit message (Collapse)Author
2000-04-26add DSA pubkey auth and other SSH2 fixes. use ssh-keygen -[xX]Markus Friedl
for trading keys with the real and the original SSH, directly from the people who invented the SSH protocol.
2000-04-19pid_tTheo de Raadt
2000-04-14whitespace cleanupMarkus Friedl
2000-04-12add Cipher and Protocol options to ssh/sshd, e.g.:Markus Friedl
ssh -o 'Protocol 1,2' if you prefer proto 1, ssh -o 'Ciphers arcfour,3des-cbc'
2000-04-06ssh2 server side, see README.openssh2; enable with 'sshd -2'Markus Friedl
2000-03-28replace big switch() with function tables (prepare for ssh2)Markus Friedl
2000-03-23initial support for DSA keys. ok deraadt@, niels@Markus Friedl
2000-02-01int atomicio -> ssize_t (for alpha). ok deraadt@David Leonard
2000-01-04ipv6 support: mostly gethostbyname->getaddrinfo/getnameinfo, new features:Markus Friedl
sshd allows multiple ListenAddress and Port options. note that libwrap is not IPv6-ready. (based on patches from <kick@kyoto.wide.ad.jp> and fujiwara@rcac.tdi.co.jp)
1999-12-12type conflict for 'extern Type *options' in channels.c; dot@dotat.atMarkus Friedl
1999-12-06move atomicio into it's own file. wrap all socket write()s which were doingTheo de Raadt
write(sock, buf, len) != len, with atomicio() calls.
1999-12-02document $SSH_ASKPASS, reasonable defaultMarkus Friedl
1999-12-01move skey-auth from auth-passwd.c to auth-skey.c, same for krb4Markus Friedl
1999-12-01ports are u_shortMarkus Friedl
1999-11-24KNF, final part 3Markus Friedl
1999-11-24much more KNFTheo de Raadt
1999-11-22tranfer s/key challenge/response data in SSH_SMSG_AUTH_TIS_CHALLENGEMarkus Friedl
messages. allows use of s/key in windows (ttssh, securecrt) and ssh-1.2.27 clients without 'ssh -v', ok: niels@
1999-11-22syslog changes:Markus Friedl
* Unified Logmessage for all auth-types, for success and for failed * Standard connections get only ONE line in the LOG when level==LOG: Auth-attempts are logged only, if authentication is: a) successfull or b) with passwd or c) we had more than AUTH_FAIL_LOG failues * many log() became verbose() * old behaviour with level=VERBOSE
1999-11-19bugfix: loglevels are per host in clientconfig,Markus Friedl
factor out common log-level parsing code.
1999-11-15the keysize of rsa-parameter 'n' is passed implizit,Markus Friedl
a few more checks and warnings about 'pretended' keysizes.
1999-11-11make all access to options via 'extern Options options'Markus Friedl
and 'extern ServerOptions options' respectively; options are no longer passed as arguments: * make options handling more consistent * remove #include "readconf.h" from ssh.h * readconf.h is only included if necessary
1999-11-11IgnoreUserKnownHosts(default=no), used for RhostRSAAuth, ok deraadt,millertMarkus Friedl
1999-11-10add LogLevel {QUIET, FATAL, ERROR, INFO, CHAT, DEBUG} to ssh/sshd,Markus Friedl
obsoletes QuietMode and FascistLogging in sshd.
1999-11-10remove x11- and krb-cleanup from fatal() + krb-cleanup cleanupMarkus Friedl
1999-11-02remove unused argument. ok dugsongMarkus Friedl
1999-10-28from niklas: Add -c -s and -k support, Create socket early to avoid race,Markus Friedl
Don't let child access std{in,out,err}
1999-10-25remove prototypes for old/removed minfd functionsMarkus Friedl
1999-10-16support for SSH protocol 1.5 which is poorly documented, the RFC.troff lies.Markus Friedl
interops (x11,agent,etc) with 1.2.27 and protocol 1.3
1999-10-16-Wall cleanupNiels Provos
1999-10-14fix old connect() race security-bug for ssh-agent and agent-forwardingMarkus Friedl
by removing the connect() junk, with the following restrictions: 1) change the version to "OpenSSH-1.1": agent-forwarding will work only between OpenSSH-1.1 client and OpenSSH-1.1 server 2) renamed the environment variable of OpenSSH-1.1 to "SSH_AUTH_SOCKET", since useing OpenSSH-1.0 ssh-add against the new ssh-agent does not work
1999-10-11make sure ~/.ssh/authorized_keys is not writable for group/world (sshd)Markus Friedl
don't load private keys if they are group/world-{rwx} (ssh,sshd and ssh-add)
1999-10-07add skey to sshd:Markus Friedl
1) pass *pw to auth_password() not user_name, do_authentication already keeps private copy of struct passwd for current user. 2) limit authentication attemps to 5, otherwise ssh -o 'NumberOfPasswordPrompts 100000' host lets you enter 100000 passwds 3) make s/key a run-time option in /etc/sshd_config 4) generate fake skeys, for s/key for nonexisting users, too limit auth-tries for nonexisting users, too. Note that % ssh -l nonexisting-user -o 'NumberOfPasswordPrompts 100000' host has NO limits in ssh-1.2.27
1999-10-05move auth-sockets to private dirMarkus Friedl
delete minfd residua
1999-10-04nuke genminfd/AUTH_FDMarkus Friedl
1999-10-03add code to detect DNS spoofing:Niels Provos
the main idea is to not only store the host key for the hostname but also for the according IP address. When we check the host key in the known_hosts file, we also check the key against the according IP address. When the server key changes, host_status = HOST_CHANGED. If check_host_in_hostfile() returns differing status for the IP address that means that either DNS was spoofed or that the IP address for the host and the host key changed at the same time.
1999-10-01get rid of references to randomseedfile we dont need it. for sshdNiels Provos
just spit out a warning that the configuration option is obsolete.
1999-09-29update krb4/AFS support to ssh-1.2.27-afs-kerberos-pl1 level, clean up ↵Dug Song
unused variables, update manpages
1999-09-28convert all uses of gmp to SSL bignumNiels Provos
convert all used of rsa to SSL rsa functions remove all use of randomstate to OpenBSD arc4random() and arc4_stir() all this done at a long long night in Canada.
1999-09-26build ssh components using our build modelTheo de Raadt
1999-09-26i bet a lot of people didn't know what ssh 1.2.16 had a nice license.Theo de Raadt
well, except for the patent issues. someone in sweden (forget their name at the moment) cleaned out most of the patented code, and now this code removes rsa code. when this is done, it will link against libssl, but the work isn't completely done yet. then we need to bring this up to modern days, featurewise.