summaryrefslogtreecommitdiff
path: root/usr.bin/ssh
AgeCommit message (Collapse)Author
2009-02-02Initialize a few variables to prevent spurious "may be used uninitialized"Darren Tucker
warnings from newer gcc's. ok djm@
2009-01-26Work around the CPNI-957037 Plaintext Recovery Attack by alwaysMarkus Friedl
reading 256K of data on packet size or HMAC errors (in CBC mode only). Help, feedback and ok djm@ Feedback from Martin Albrecht and Paterson Kenny
2009-01-24sync list of preferred ciphers; ok djm@Christian Weisgerber
2009-01-23prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBCDamien Miller
modes; ok markus@
2009-01-22another chunk of a2port() diff that got away. wtfdjm??Damien Miller
2009-01-22make a2port() return -1 when it encounters an invalid port numberDamien Miller
rather than 0, which it will now treat as valid (needed for future work) adjust current consumers of a2port() to check its return value is <= 0, which in turn required some things to be converted from u_short => int make use of int vs. u_short consistent in some other places too feedback & ok markus@
2009-01-22oops! I committed the wrong version of the Channel->path diff,Damien Miller
it was missing some tweaks suggested by stevesk@
2009-01-22make Channel->path an allocated string, saving a few bytes here andDamien Miller
there and fixing bz#1380 in the process; ok markus@
2009-01-151) use obsolete instead of alias for consistencyKevin Steves
2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is so move the comment. 3) reorder so like options are together ok djm@
2009-01-14support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482;Damien Miller
"looks ok" markus@
2009-01-01fix hash calculation for KEXGEX: hash over the original client-suppliedDamien Miller
values and not the sanity checked versions that we acutally use; bz#1540 reported by john.smith AT arrows.demon.co.uk ok markus@
2009-01-01call channel destroy callbacks on receipt of open failure messages.Damien Miller
fixes client hangs when connecting to a server that has MaxSessions=0 set spotted by imorgan AT nas.nasa.gov; ok markus@
2008-12-30add AllowAgentForwarding to available Match keywords listOkan Demirmen
ok djm
2008-12-29no need to escape single quotes in commentsKevin Steves
2008-12-29fix example, default key type is rsa for 3+ years; fromKevin Steves
frederic.perrin@resel.fr
2008-12-10o cannot be NULL here but use xfree() to be consistent; ok djm@Kevin Steves
2008-12-09fix typo in error messageKevin Steves
2008-12-09update for the synopses displayed by the 'help' command, there are aIgor Sobrado
few missing flags; add 'bye' to the output of 'help'; sorting and spacing. jmc@ suggested replacing .Oo/.Oc with a single .Op macro. ok jmc@
2008-12-09replace by-hand string building with xasprinf(); ok deraadt@Damien Miller
2008-12-09channel_print_adm_permitted_opens() should deal with all the printingKevin Steves
for that config option. suggested by markus@; ok markus@ djm@ dtucker@
2008-12-09correct sftp(1) and corresponding usage syntax;Damien Miller
bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@
2008-12-09correct sftp(1) and corresponding usage syntax;Damien Miller
bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@
2008-12-09don't leave junk (free'd) pointers around in Forward *fwd argument onDamien Miller
failure; avoids double-free in ~C -L handler when given an invalid forwarding specification; bz#1539 report from adejong AT debian.org via Colin Watson; ok markus@ dtucker@
2008-12-09Deal correctly with failures in remote stat() operation in sftp,Damien Miller
correcting fail-on-error behaviour in batchmode. bz#1541 report and fix from anedvedicky AT gmail.com; ok markus@
2008-12-09The ~C escape handler does not work correctly for multiplexed sessions -Damien Miller
it opens a commandline on the master session, instead of on the slave that requested it. Disable it on slave sessions until such time as it is fixed; bz#1543 report from Adrian Bridgett via Colin Watson ok markus@
2008-12-02s/remote_id/id/ to be more consistent with other code; ok djm@Markus Friedl
2008-12-02backout 1.149, since it's not necessary and openssh clients sendMarkus Friedl
broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
2008-12-02we have to use the recipient's channel number (RFC 4254) forMarkus Friedl
SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages, otherwise we trigger 'Non-public channel' error messages on sshd systems with clientkeepalive enabled; noticed by sturm; ok djm;
2008-11-30Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@Darren Tucker
2008-11-21packet_disconnect() on padding error, too. should reduce the successMarkus Friedl
probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18 ok djm@
2008-11-11for sshd -T print 'permitopen any' vs. 'permitopen' for case of noKevin Steves
permitopen's; ok and input dtucker@
2008-11-11USE_AFS not referenced so remove #ifdef. fixes sshd -T not printingKevin Steves
kerberosgetafstoken. ok dtucker@
2008-11-09typo fixed (overriden -> overridden)Tobias Stoeckmann
ok espie, jmc
2008-11-07Move JPAKE define to make life easier for portable. ok djm@Darren Tucker
2008-11-07add space to some log/debug messages for readability; ok djm@ markus@Kevin Steves
2008-11-07spelling/typo in commentKevin Steves
2008-11-05passord -> password;Jason McIntyre
fixes user/5975 from Rene Maroufi
2008-11-05add dynamic forward escape command line; ok djm@Kevin Steves
2008-11-04because parse_forward() is now used to parse all forward types (DLR),Kevin Steves
and it malloc's space for host variables, we don't need to malloc here. fixes small memory leaks. previously dynamic forwards were not parsed in parse_forward() and space was not malloc'd in that case. ok djm@
2008-11-04Add support for an experimental zero-knowledge password authenticationDamien Miller
method using the J-PAKE protocol described in F. Hao, P. Ryan, "Password Authenticated Key Exchange by Juggling", 16th Workshop on Security Protocols, Cambridge, April 2008. This method allows password-based authentication without exposing the password to the server. Instead, the client and server exchange cryptographic proofs to demonstrate of knowledge of the password while revealing nothing useful to an attacker or compromised endpoint. This is experimental, work-in-progress code and is presently compiled-time disabled (turn on -DJPAKE in Makefile.inc). "just commit it. It isn't too intrusive." deraadt@
2008-11-04need unistd.h for close() prototypeDamien Miller
2008-11-03include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.govDamien Miller
2008-11-03fix commentKevin Steves
2008-11-03remove valueless commentKevin Steves
2008-11-02protocol 2 tty modes support is now 7.5 years old so remove theseKevin Steves
debug3()s; ok deraadt@
2008-11-01merge dynamic forward parsing into parse_forward(); 'i think this is OK' djm@Kevin Steves
2008-11-01the ellipsis is not an optional argument; while here, improve spacing.Igor Sobrado
2008-11-01fix some typos in log messages; ok djm@Kevin Steves
2008-11-01sprinkle ARGSUSED on dispatch handlersDamien Miller
nuke stale unusued prototype
2008-10-31remove unused #define DISPATCH_MIN; ok markus@Kevin Steves