summaryrefslogtreecommitdiff
path: root/usr.bin/ssh
AgeCommit message (Collapse)Author
2010-09-03add an EXIT STATUS section for /usr/bin;Jason McIntyre
2010-09-02Switch ECDSA default key size to 256 bits, which according to RFC5656Christian Weisgerber
should still be better than our current RSA-2048 default. ok djm@, markus@
2010-09-02unbreak ControlPersist=yes for ControlMaster=yes; ok djm@Markus Friedl
2010-09-02permit -b 256, 384 or 521 as key size for ECDSA; ok djm@Markus Friedl
2010-09-01prefer ECDH in a 256 bit curve field; prompted by naddy@Damien Miller
2010-09-01pick up ECDSA host key by default; ok djm@Christian Weisgerber
2010-08-31small text tweak to accommodate previous;Jason McIntyre
2010-08-31fix some macro abuse;Jason McIntyre
2010-08-31reintroduce commit from tedu@, which I pulled out for release engineering:Damien Miller
OpenSSL_add_all_algorithms is the name of the function we have a man page for, so use that. ok djm
2010-08-31Implement Elliptic Curve Cryptography modes for key exchange (ECDH) andDamien Miller
host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. Only the mandatory sections of RFC5656 are implemented, specifically the three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and ECDSA. Point compression (optional in RFC5656 is NOT implemented). Certificate host and user keys using the new ECDSA key types are supported. Note that this code has not been tested for interoperability and may be subject to change. feedback and ok markus@
2010-08-31Add buffer_get_cstring() and related functions that verify that theDamien Miller
string extracted from the buffer contains no embedded \0 characters* This prevents random (possibly malicious) crap from being appended to strings where it would not be noticed if the string is used with a string(3) function. Use the new API in a few sensitive places. * actually, we allow a single one at the end of the string for now because we don't know how many deployed implementations get this wrong, but don't count on this to remain indefinitely.
2010-08-16backout previous temporarily; discussed with deraadt@Damien Miller
2010-08-12OpenSSL_add_all_algorithms is the name of the function we have a man pageTed Unangst
for, so use that. ok djm
2010-08-12close any extra file descriptors inherited from parent at start andDamien Miller
reopen stdin/stdout to /dev/null when forking for ControlPersist. prevents tools that fork and run a captive ssh for communication from failing to exit when the ssh completes while they wait for these fds to close. The inherited fds may persist arbitrarily long if a background mux master has been started by ControlPersist. cvs and scp were effected by this. "please commit" markus@
2010-08-08use the same template for all FILES sections; i.e. -compact/.Pp where weJason McIntyre
have multiple items, and .Pa for path names;
2010-08-08crank to 5.6Damien Miller
2010-08-05Fix a trio of bugs in the local/remote window calculation for datagramDamien Miller
data channels (i.e. TunnelForward): Calculate local_consumed correctly in channel_handle_wfd() by measuring the delta to buffer_len(c->output) from when we start to when we finish. The proximal problem here is that the output_filter we use in portable modified the length of the dequeued datagram (to futz with the headers for !OpenBSD). In channel_output_poll(), don't enqueue datagrams that won't fit in the peer's advertised packet size (highly unlikely to ever occur) or which won't fit in the peer's remaining window (more likely). In channel_input_data(), account for the 4-byte string header in datagram packets that we accept from the peer and enqueue in c->output. report, analysis and testing 2/3 cases from wierbows AT us.ibm.com; "looks good" markus@
2010-08-04clean for -WuninitializedDamien Miller
2010-08-04Support CA keys in PKCS#11 tokens; feedback and ok markus@Damien Miller
2010-08-04commited the wrong version of the hostbased certificate diff; thisDamien Miller
version replaces some strlc{py,at} verbosity with xasprintf() at the request of markus@
2010-08-04enable certificates for hostbased authentication, from Iain Morgan;Damien Miller
"looks ok" markus@
2010-08-04tighten the rules for certificate encoding by requiring that optionsDamien Miller
appear in lexical order and make our ssh-keygen comply. ok markus@
2010-08-04Remove mentions of weird "addr/port" alternate address format for IPv6Damien Miller
addresses combinations. It hasn't worked for ages and we have supported the more commen "[addr]:port" format for a long time. ok jmc@ markus@
2010-07-23Ciphers is documented in ssh_config(5) these daysDarren Tucker
2010-07-21sync timingsafe_bcmp() with the one dempsky@ committed to sys/lib/libkernDamien Miller
2010-07-19add a "ControlPersist" option that automatically starts a backgroundDamien Miller
ssh(1) multiplex master when connecting. This connection can stay alive indefinitely, or can be set to automatically close after a user-specified duration of inactivity. bz#1330 - patch by dwmw2 AT infradead.org, but further hacked on by wmertens AT cisco.com, apb AT cequrux.com, martin-mindrot-bugzilla AT earth.li and myself; "looks ok" markus@
2010-07-19bz#1797: fix swapped args in upload_dir_internal(), breaking recursiveDamien Miller
upload depth checks and causing verbose printing of transfers to always be turned on; patch from imorgan AT nas.nasa.gov
2010-07-16more timing paranoia - compare all parts of the expected decryptedDamien Miller
data before returning. AFAIK not exploitable in the SSH protocol. "groovy" deraadt@
2010-07-16avoid bogus compiler warningDamien Miller
2010-07-15repair incorrect block nesting, which screwed up indentation;Ingo Schwarze
problem reported and fix OK by jmc@
2010-07-14finally ssh synopsis looks nice again! this commit just removes a ton ofJason McIntyre
hacks we had in place to make it work with old groff;
2010-07-13s/timing_safe_cmp/timingsafe_bcmp/gDamien Miller
2010-07-13implement a timing_safe_cmp() function to compare memory without leakingDamien Miller
timing information by short-circuiting like memcmp() and use it for some of the more sensitive comparisons (though nothing high-value was readily attackable anyway); "looks ok" markus@
2010-07-12expand %h to the hostname in ssh_config Hostname options. While thisDamien Miller
sounds useless, it is actually handy for working with unqualified hostnames: Host *.* Hostname %h Host * Hostname %h.example.org "I like it" markus@
2010-07-12Make ExitOnForwardFailure work with fork-after-authentication ("ssh -f")Damien Miller
for protocol 2. ok markus@
2010-07-02unbreak strdelim() skipping past quoted strings, e.g.Damien Miller
AllowUsers "blah blah" blah was broken; report and fix in bz#1757 from bitman.zhou AT centrify.com ok dtucker;
2010-07-01Fix a longstanding problem where if you suspend scp at theTodd C. Miller
password/passphrase prompt the terminal mode is not restored. OK djm@
2010-06-30tweak previous;Jason McIntyre
2010-06-30sort usage();Jason McIntyre
2010-06-30tweak previous;Jason McIntyre
2010-06-29allow key options (command="..." and friends) in AuthorizedPrincipals;Damien Miller
ok markus@
2010-06-29allow import (-i) and export (-e) of PEM and PKCS#8 encoded keys;Damien Miller
bz#1749; ok markus@
2010-06-26oops, forgot to #include <canohost.h>; spotted and patch from chl@Damien Miller
2010-06-26tweak previous;Jason McIntyre
2010-06-25Add X11ForwardTimeout option to specify timeout for untrusted X11Damien Miller
authentication cookies to avoid fallback in X11 code to fully-trusted implicit authentication using SO_PEERCRED described at: http://lists.x.org/archives/xorg-devel/2010-May/008636.html After the X11ForwardTimeout has expired the client will now refuse incoming X11 channel opens. based on patch from Tavis Ormandy; "nice" markus@
2010-06-25log the hostname and address that we connected to at LogLevel=verboseDamien Miller
after authentication is successful to mitigate "phishing" attacks by servers with trusted keys that accept authentication silently and automatically before presenting fake password/passphrase prompts; "nice!" markus@
2010-06-25skip the initial check for access with an empty password whenDamien Miller
PermitEmptyPasswords=no;
2010-06-25bz#1750: fix requirement for /dev/null inside ChrootDirectory forDamien Miller
internal-sftp accidentally introduced in r1.253 by removing the code that opens and dup /dev/null to stderr and modifying the channels code to read stderr but discard it instead; ok markus@
2010-06-25bz#1327: remove hardcoded limit of 100 permitopen clauses and portDamien Miller
forwards per direction; ok markus@ stevesk@
2010-06-23fix printing of extensions in v01 certificates that I broke in r1.190Damien Miller