Age | Commit message (Collapse) | Author |
|
|
|
from jclonguet AT free.fr; ok millert@
|
|
confusion; ok djm, dtucker; with help from jmc@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
mismatch. based on patch from fcusack AT fcusack.com. bz #580; ok markus@
|
|
|
|
|
|
Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
|
|
in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
ok markus@ and henning@
|
|
|
|
|
|
|
|
|
|
Patch from dtucker@zip.com.au; ok markus@
|
|
SO_REUSEADDR. fixup comments. ok markus@
|
|
|
|
see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
the ssharp mitm tool attacks users in a similar way, so i'd like to
pointed out again:
A MITM attack is always possible if the ssh client prints:
The authenticity of host 'bla' can't be established.
(protocol version 2 with pubkey authentication allows you to detect
MITM attacks)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
run less code with euid==0 if ssh is installed setuid root
just switch the euid, don't switch the complete set of groups
(this is only needed by sshd). ok provos@
|
|
|
|
|
|
|
|
authentication
in protocol v2 (needs to access the hostkeys).
|
|
for hostkey confirm.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
now check for localhost, too.
|
|
|
|
TODO; cleanup headers
|
|
|