Age | Commit message (Collapse) | Author |
|
|
|
markus@ ok
|
|
|
|
|
|
but keep kerberos passwd auth for ssh1 and 2; ok djm, hin, henning, ...
|
|
fgsch@, miod@, henning@, jakob@ and others
|
|
test+ok henning@
|
|
|
|
|
|
authentication
in protocol v2 (needs to access the hostkeys).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
the agent and the client).
|
|
<assar@freebsd.org> and Bjorn Gronvall <bg@sics.se>. markus@ ok
|
|
retry num_of_passwd_prompt times if passphrase is wrong. ok fgsch@
|
|
TODO; cleanup headers
|
|
|
|
|
|
|
|
|
|
similar to RhostRSAAuthentication unless you enable (the experimental)
HostbasedUsesNameFromPacketOnly option. please test. :)
|
|
|
|
no need to do enter passphrase or do expensive sign operations if the
server does not accept key).
|
|
add stylized echo to 2, too.
|
|
|
|
ok provos@
|
|
- more strict prototypes, include necessary headers
- use paths.h/pathnames.h decls
- size_t typecase to int -> u_long
|
|
|
|
|
|
attack
|
|
auto-enable kbd-interactive for ssh2 if challenge-reponse is enabled.
|
|
|
|
rename util.[ch] -> misc.[ch]
|
|
|
|
harder with /usr/libexec/auth/login_XXX
2) share/unify code used in ssh-1 and ssh-2 authentication (server side)
3) make addition of BSD_AUTH and other challenge reponse methods
easier.
|
|
|
|
1) try_agent_authentication() for loop will overwrite key just
allocated with key_new(); don't alloc
2) call ssh_close_authentication_connection() before exit
try_agent_authentication()
3) free mem on bad passphrase in try_rsa_authentication()
|
|
with u_char.
|
|
other implementations; report from roth@feep.net
|
|
|