summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/sshd.c
AgeCommit message (Collapse)Author
2015-07-17fix incorrect test for SSH1 keys when compiled without SSH1 supportDamien Miller
2015-07-15fix NULL-deref when SSH1 reenabledDamien Miller
2015-07-10Turn off DSA by default; add HostKeyAlgorithms to the server andMarkus Friedl
PubkeyAcceptedKeyTypes to the client side, so it still can be tested or turned back on; feedback and ok djm@
2015-07-03refuse to generate or accept RSA keys smaller than 1024 bits;Damien Miller
feedback and ok dtucker@
2015-07-03turn off 1024 bit diffie-hellman-group1-sha1 key exchange methodDamien Miller
(already off in server, this turns it off in the client by default too) ok dtucker@
2015-07-03delete support for legacy v00 certificates; "sure" markus@ dtucker@Damien Miller
2015-05-24add missing 'c' option to getopt(), case statement was alreadyDamien Miller
there; from Felix Bolte
2015-05-21add AuthorizedPrincipalsCommand that allows getting authorized_principalsDamien Miller
from a subprocess rather than a file, which is quite useful in deployments with large userbases feedback and ok markus@
2015-04-27allow "sshd -f none" to skip reading the config file, much likeDamien Miller
"ssh -F none" does. ok dtucker
2015-04-15Plug leak of address passed to logging. bz#2373, patch from jjelen at redhat,Darren Tucker
ok markus@
2015-04-10Don't send hostkey advertisments (hostkeys-00@openssh.com) to currentDarren Tucker
versions of Tera Term as they can't handle them. Newer versions should be OK. Patch from Bryan Drewery and IWAMOTO Kouichi, ok djm@
2015-03-31don't fatal when a !ssh1 sshd is reexeced from a w/ssh1 listener;Damien Miller
reported by miod@; ok miod@ markus@
2015-02-20UpdateHostKeys fixes:Damien Miller
I accidentally changed the format of the hostkeys@openssh.com messages last week without changing the extension name, and this has been causing connection failures for people who are running -current. First reported by sthen@ s/hostkeys@openssh.com/hostkeys-00@openssh.com/ Change the name of the proof message too, and reorder it a little. Also, UpdateHostKeys=ask is incompatible with ControlPersist (no TTY available to read the response) so disable UpdateHostKeys if it is in ask mode and ControlPersist is active (and document this)
2015-02-16partial backout of:Damien Miller
revision 1.441 date: 2015/01/31 20:30:05; author: djm; state: Exp; lines: +17 -10; commitid : x8klYPZMJSrVlt3O; Let sshd load public host keys even when private keys are missing. Allows sshd to advertise additional keys for future key rotation. Also log fingerprint of hostkeys loaded; ok markus@ hostkey updates now require access to the private key, so we can't load public keys only. The improved log messages (fingerprints of keys loaded) are kept.
2015-02-16Revise hostkeys@openssh.com hostkey learning extension.Damien Miller
The client will not ask the server to prove ownership of the private halves of any hitherto-unseen hostkeys it offers to the client. Allow UpdateHostKeys option to take an 'ask' argument to let the user manually review keys offered. ok markus@
2015-01-31Let sshd load public host keys even when private keys are missing.Damien Miller
Allows sshd to advertise additional keys for future key rotation. Also log fingerprint of hostkeys loaded; ok markus@
2015-01-26correctly match ECDSA subtype (== curve) for offered/receviedDamien Miller
host keys. Fixes connection-killing host key mismatches when a server offers multiple ECDSA keys with different curve type (an extremely unlikely configuration). ok markus, "looks mechanical" deraadt@
2015-01-26Host key rotation support.Damien Miller
Add a hostkeys@openssh.com protocol extension (global request) for a server to inform a client of all its available host key after authentication has completed. The client may record the keys in known_hosts, allowing it to upgrade to better host key algorithms and a server to gracefully rotate its keys. The client side of this is controlled by a UpdateHostkeys config option (default on). ok markus@
2015-01-20Reduce use of <sys/param.h> and transition to <limits.h> throughout.Theo de Raadt
ok djm markus
2015-01-20kex_setup errors are fatal()Markus Friedl
2015-01-19store compat flags in struct ssh; ok djm@Markus Friedl
2015-01-19adapt kex to sshbuf and struct ssh; ok djm@Markus Friedl
2015-01-19update packet.c & isolate, introduce struct sshMarkus Friedl
a) switch packet.c to buffer api and isolate per-connection info into struct ssh b) (de)serialization of the state is moved from monitor to packet.c c) the old packet.c API is implemented in opacket.[ch] d) compress.c/h is removed and integrated into packet.c with and ok djm@
2015-01-17fix hostkeys on ssh agent; found by unit test I'm about to commitDamien Miller
2015-01-14move authfd.c and its tentacles to the new buffer/key API;Damien Miller
ok markus@
2015-01-07workaround for the Meyer, et al, Bleichenbacher Side Channel Attack.Ted Unangst
fake up a bignum key before RSA decryption. discussed/ok djm markus
2014-12-22make internal handling of filename arguments of "none" more consistentDamien Miller
with ssh. "none" arguments are now replaced with NULL when the configuration is finalised. Simplifies checking later on (just need to test not-NULL rather than that + strcmp) and cleans up some inconsistencies. ok markus@
2014-12-11explicitly include sys/param.h in files that use the howmany() macro;Damien Miller
from portable
2014-07-15Add support for Unix domain socket forwarding. A remote TCP portTodd C. Miller
may be forwarded to a local Unix domain socket and vice versa or both ends may be a Unix domain socket. This is a reimplementation of the streamlocal patches by William Ahern from: http://www.25thandclement.com/~william/projects/streamlocal.html OK djm@ markus@
2014-06-24New key API: refactor key-related functions to be more library-like,Damien Miller
existing API is offered as a set of wrappers. with and ok markus@ Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew Dempsky and Ron Bowes for a detailed review a few months ago.
2014-04-29make compiling against OpenSSL optional (make OPENSSL=no);Markus Friedl
reduces algorithms to curve25519, aes-ctr, chacha, ed25519; allows us to explore further options; with and ok djm
2014-04-19Delete futile calls to RAND_seed. ok djmTed Unangst
2014-04-18OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connectionsDamien Miller
using the curve25519-sha256@libssh.org KEX exchange method to fail when connecting with something that implements the spec properly. Disable this KEX method when speaking to one of the affected versions. reported by Aris Adamantiadis; ok markus@
2014-04-12avoid crash at exit: check that pmonitor!=NULL before dereferencing;Damien Miller
bz#2225, patch from kavi AT juniper.net
2014-03-27disable weak proposals in sshd, but keep them in ssh; ok djm@Markus Friedl
2014-03-26remove libwrap support. ok deraadt djm mfriedlTed Unangst
2014-02-26ssh_gssapi_prepare_supported_oids needs GSSAPIMarkus Friedl
2014-02-26bz#2107 - cache OIDs of supported GSSAPI mechanisms before privsepDamien Miller
sandboxing, as running this code in the sandbox can cause violations; ok markus@
2014-02-02convert memset of potentially-private data to explicit_bzero()Damien Miller
2014-01-31replace most bzero with explicit_bzero, except a few that cna be memsetTed Unangst
ok djm dtucker
2014-01-29use kill(0, ...) instead of killpg(0, ...); on most operating systemsDamien Miller
they are equivalent, but SUSv2 describes the latter as having undefined behaviour; from portable; ok dtucker
2014-01-27replace openssl MD5 with our ssh_digest_*; ok djm@Markus Friedl
2014-01-09ban clients/servers that suffer from SSH_BUG_DERIVEKEY, they are ancient,Damien Miller
deranged and might make some attacks on KEX easier; ok markus@
2013-12-30refuse RSA keys from old proprietary clients/servers that use theDamien Miller
obsolete RSA+MD5 signature scheme. it will still be possible to connect with these clients/servers but only DSA keys will be accepted, and we'll deprecate them entirely in a future release. ok markus@
2013-12-06support ed25519 keys (hostkeys and user identities) using the public domainMarkus Friedl
ed25519 reference code from SUPERCOP, see http://ed25519.cr.yp.to/software.html feedback, help & ok djm@
2013-11-20delay closure of in/out fds until after "Bad protocol versionDamien Miller
identification..." message, as get_remote_ipaddr/get_remote_port require them open.
2013-11-02use curve25519 for default key exchange (curve25519-sha256@libssh.org);Markus Friedl
initial patch from Aris Adamantiadis; ok djm@
2013-10-23include local address and port in "Connection from ..." message (onlyDamien Miller
shown at loglevel>=verbose)
2013-10-17include remote port in bad banner message; bz#2162Damien Miller
2013-10-10bz#2139: fix re-exec fallback by ensuring that startup_pipe is correctlyDamien Miller
updated; ok dtucker@