Age | Commit message (Collapse) | Author | |
---|---|---|---|
2001-02-24 | ssh2 rsa key before dsa key | Theo de Raadt | |
2001-02-22 | activate RSA 2 key | Theo de Raadt | |
2001-02-06 | enable sftp-server by default | Theo de Raadt | |
2001-02-04 | type: ok markus@ | Damien Miller | |
2001-02-03 | Skey is now called ChallengeResponse | Markus Friedl | |
2001-02-03 | make ReverseMappingCheck optional in sshd_config; ok djm@,dugsong@ | Markus Friedl | |
2001-02-02 | point at sshd(8) and ssh(1) | Theo de Raadt | |
2001-01-29 | $OpenBSD$ | Niklas Hallqvist | |
2001-01-13 | oops | Markus Friedl | |
2001-01-13 | support supplementary group in {Allow,Deny}Groups | Markus Friedl | |
from stevesk@pobox.com | |||
2001-01-08 | implement option 'Banner /etc/issue.net' for ssh2, move version to | Markus Friedl | |
2.3.1 (needed for bugcompat detection, 2.3.0 would fail if Banner is enabled). | |||
2000-11-15 | add entry for HostKey /etc/ssh_host_dsa_key, and comment for ssh-2 rsa keys | Markus Friedl | |
2000-11-12 | add support for RSA to SSH2. please test. | Markus Friedl | |
there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication. | |||
2000-10-11 | add support for s/key (kbd-interactive) to ssh2, based on work by ↵ | Markus Friedl | |
mkiernan@avantgo.com and me | |||
2000-08-31 | implement a SFTP server. interops with sftp2, scp2 and the windows | Markus Friedl | |
client from ssh.com | |||
2000-08-04 | MaxStartups | Markus Friedl | |
2000-07-22 | random early drop; ok theo, niels | Markus Friedl | |
2000-06-17 | add support for ssh v2 subsystems. ok markus@. | Jakob Schlyter | |
2000-04-17 | show 'Protocol' as an example, ok markus@ | Todd T. Fries | |
2000-01-04 | ipv6 support: mostly gethostbyname->getaddrinfo/getnameinfo, new features: | Markus Friedl | |
sshd allows multiple ListenAddress and Port options. note that libwrap is not IPv6-ready. (based on patches from fujiwara@rcac.tdi.co.jp) | |||
1999-11-11 | IgnoreUserKnownHosts(default=no), used for RhostRSAAuth, ok deraadt,millert | Markus Friedl | |
1999-11-10 | add LogLevel {QUIET, FATAL, ERROR, INFO, CHAT, DEBUG} to ssh/sshd, | Markus Friedl | |
obsoletes QuietMode and FascistLogging in sshd. | |||
1999-10-17 | remove AllowHosts, DenyHosts, SilentDeny server access control cruft - ↵ | Dug Song | |
replace with LIBWRAP moved to child. ok markus@ deraat@ | |||
1999-10-11 | UseLogin, default=no, from kpa@gmx.net, ok deraadt@ | Markus Friedl | |
1999-10-07 | You have Mail. Email fuer Dich. Karsten Patzwaldt <kpa@gmx.net> default=no | Markus Friedl | |
1999-10-07 | add skey to sshd: | Markus Friedl | |
1) pass *pw to auth_password() not user_name, do_authentication already keeps private copy of struct passwd for current user. 2) limit authentication attemps to 5, otherwise ssh -o 'NumberOfPasswordPrompts 100000' host lets you enter 100000 passwds 3) make s/key a run-time option in /etc/sshd_config 4) generate fake skeys, for s/key for nonexisting users, too limit auth-tries for nonexisting users, too. Note that % ssh -l nonexisting-user -o 'NumberOfPasswordPrompts 100000' host has NO limits in ssh-1.2.27 | |||
1999-10-04 | nicer default | Theo de Raadt | |
1999-10-01 | randomseed is really gone now | Theo de Raadt | |
1999-09-29 | show other krb options | Theo de Raadt | |
1999-09-28 | PasswordAuthentication on by default | Theo de Raadt | |
1999-09-28 | correct defaults | Theo de Raadt | |
1999-09-28 | change X options to nice defaults | Theo de Raadt | |
1999-09-26 | /etc has always been in the same place | Theo de Raadt | |
1999-09-26 | distribution target | Theo de Raadt | |