Age | Commit message (Collapse) | Author | |
---|---|---|---|
2015-03-23 | for ssh-keygen -A, don't try (and fail) to generate | Damien Miller | |
ssh v.1 keys when compiled without SSH1 support RSA/DSA/ECDSA keys when compiled without OpenSSL based on patch by Mike Frysinger; bz#2369 | |||
2015-03-18 | KRL support doesn't need OpenSSL anymore, remove #ifdefs | Damien Miller | |
from around call | |||
2015-03-16 | #if 0 some more arrays used only for decrypting (we don't use | Damien Miller | |
since we only need encrypt for AES-CTR) | |||
2015-03-11 | add back the changes from rev 1.206, djm reverted this by mistake in | Jonathan Gray | |
rev 1.207 | |||
2015-03-06 | fix sshkey_certify() return value for unsupported key types; | Damien Miller | |
ok markus@ deraadt@ | |||
2015-03-04 | make ssh-add -D work with !SSH1 agent | Damien Miller | |
2015-03-04 | crank; ok markus, deraadt | Damien Miller | |
2015-03-03 | add SSH1 Makefile knob to make it easier to build without SSH1 support; | Damien Miller | |
ok markus@ | |||
2015-03-03 | Allow "ssh -Q protocol-version" to list supported SSH protocol | Damien Miller | |
versions. Useful for detecting builds without SSH v.1 support; idea and ok markus@ | |||
2015-03-01 | Make sure we only call getnameinfo() for AF_INET or AF_INET6 sockets. | Todd C. Miller | |
getpeername() of a Unix domain socket may return without error on some systems without actually setting ss_family so getnameinfo() was getting called with ss_family set to AF_UNSPEC. OK djm@ | |||
2015-02-26 | don't printf NULL key comments; reported by Tom Christensen | Damien Miller | |
2015-02-25 | zero cmsgbuf before use; we initialise the bits we use but | Damien Miller | |
valgrind still spams warning on it | |||
2015-02-25 | fix small memory leak when UpdateHostkeys=no | Damien Miller | |
2015-02-25 | don't leak validity of user in "too many authentication failures" | Damien Miller | |
disconnect message; reported by Sebastian Reitenbach | |||
2015-02-24 | add -v (show ASCII art) to -l's synopsis; ok djm@ | Christian Weisgerber | |
2015-02-23 | further silence spurious error message even when -v is specified | Damien Miller | |
(e.g. to get visual host keys); reported by naddy@ | |||
2015-02-23 | add an XXX to remind me to improve sshkey_load_public | Damien Miller | |
2015-02-23 | silence a spurious error message when listing fingerprints for | Damien Miller | |
known_hosts; bz#2342 | |||
2015-02-23 | fix setting/clearing of TTY raw mode around UpdateHostKeys=ask | Damien Miller | |
confirmation question; reported by Herb Goldman | |||
2015-02-21 | make "ssh-add -d" properly remove a corresponding certificate, and also | Alexander Hall | |
not whine and fail if there is none ok djm@ | |||
2015-02-20 | sort options useable under Match case-insensitively; | Damien Miller | |
prodded jmc@ | |||
2015-02-20 | more options that are available under Match; | Damien Miller | |
bz#2353 reported by calestyo AT scientia.net | |||
2015-02-20 | UpdateHostKeys fixes: | Damien Miller | |
I accidentally changed the format of the hostkeys@openssh.com messages last week without changing the extension name, and this has been causing connection failures for people who are running -current. First reported by sthen@ s/hostkeys@openssh.com/hostkeys-00@openssh.com/ Change the name of the proof message too, and reorder it a little. Also, UpdateHostKeys=ask is incompatible with ControlPersist (no TTY available to read the response) so disable UpdateHostKeys if it is in ask mode and ControlPersist is active (and document this) | |||
2015-02-17 | Regression: I broke logging of public key fingerprints in 1.46. | Damien Miller | |
Pointed out by Pontus Lundkvist | |||
2015-02-16 | partial backout of: | Damien Miller | |
revision 1.441 date: 2015/01/31 20:30:05; author: djm; state: Exp; lines: +17 -10; commitid : x8klYPZMJSrVlt3O; Let sshd load public host keys even when private keys are missing. Allows sshd to advertise additional keys for future key rotation. Also log fingerprint of hostkeys loaded; ok markus@ hostkey updates now require access to the private key, so we can't load public keys only. The improved log messages (fingerprints of keys loaded) are kept. | |||
2015-02-16 | Revise hostkeys@openssh.com hostkey learning extension. | Damien Miller | |
The client will not ask the server to prove ownership of the private halves of any hitherto-unseen hostkeys it offers to the client. Allow UpdateHostKeys option to take an 'ask' argument to let the user manually review keys offered. ok markus@ | |||
2015-02-16 | Refactor hostkeys_foreach() and dependent code | Damien Miller | |
Deal with IP addresses (i.e. CheckHostIP) Don't clobber known_hosts when nothing changed ok markus@ as part of larger commit | |||
2015-02-16 | Declare ge25519_base as extern, to prevent it from becoming a common. Gets us | Miod Vallat | |
rid of ``lignment 4 of symbol `crypto_sign_ed25519_ref_ge25519_base' in mod_ge25519.o is smaller than 16 in mod_ed25519.o'' warnings at link time. | |||
2015-02-13 | make rekey_limit for sshd w/privsep work; ok djm@ dtucker@ | Markus Friedl | |
2015-02-12 | Prevent sshd spamming syslog with "ssh_dispatch_run_fatal: disconnected". | Darren Tucker | |
ok markus@ | |||
2015-02-11 | Some packet error messages show the address of the peer, but might be | Damien Miller | |
generated after the socket to the peer has suffered a TCP reset. In these cases, getpeername() won't work so cache the address earlier. spotted in the wild via deraadt@ and tedu@ | |||
2015-02-09 | fix some leaks in error paths | Jonathan Gray | |
ok markus@ | |||
2015-02-06 | SIZE_MAX is standard, we should be using it in preference to the | Todd C. Miller | |
obsolete SIZE_T_MAX. OK miod@ beck@ | |||
2015-02-05 | Include stdint.h, not limits.h to get SIZE_MAX. OK guenther@ | Todd C. Miller | |
2015-02-03 | missing ; | Theo de Raadt | |
djm and mlarkin really having great interactions recently | |||
2015-02-03 | slightly extend the passphrase prompt if running with -c in order to | Alexander Hall | |
give the user a chance to notice if unintentionally running without it wording tweak and ok djm@ | |||
2015-02-02 | handle PKCS#11 C_Login returning CKR_USER_ALREADY_LOGGED_IN; | Damien Miller | |
based on patch from Yuri Samoilenko; ok markus@ | |||
2015-02-02 | turn UpdateHostkeys off by default until I figure out mlarkin@'s | Damien Miller | |
warning message; requested by deraadt@ | |||
2015-02-02 | increasing encounters with difficult DNS setups in darknets has | Theo de Raadt | |
convinced me UseDNS off by default is better ok djm | |||
2015-01-31 | Let sshd load public host keys even when private keys are missing. | Damien Miller | |
Allows sshd to advertise additional keys for future key rotation. Also log fingerprint of hostkeys loaded; ok markus@ | |||
2015-01-30 | Add a ssh_config HostbasedKeyType option to control which | Damien Miller | |
host public key types are tried during hostbased authentication. This may be used to prevent too many keys being sent to the server, and blowing past its MaxAuthTries limit. bz#2211 based on patch by Iain Morgan; ok markus@ | |||
2015-01-30 | set a timeout to prevent hangs when talking to busted servers; | Damien Miller | |
ok markus@ | |||
2015-01-30 | avoid more fatal/exit in the packet.c paths that ssh-keyscan | Damien Miller | |
uses; feedback and "looks good" markus@ | |||
2015-01-30 | permit KRLs that revoke certificates by serial number or key ID | Damien Miller | |
without scoping to a particular CA; ok markus@ | |||
2015-01-30 | missing parentheses after if in do_convert_from() broke | Damien Miller | |
private key conversion from other formats some time in 2010; bz#2345 reported by jjelen AT redhat.com | |||
2015-01-30 | fix ssh protocol 1, spotted by miod@ | Damien Miller | |
2015-01-28 | update to new API (key_fingerprint => sshkey_fingerprint) | Damien Miller | |
check sshkey_fingerprint return values; ok markus | |||
2015-01-28 | avoid fatal() calls in packet code | Damien Miller | |
makes ssh-keyscan more reliable against server failures ok dtucker@ markus@ | |||
2015-01-28 | avoid fatal() calls in packet code | Damien Miller | |
makes ssh-keyscan more reliable against server failures ok dtucker@ markus@ | |||
2015-01-28 | remove obsolete comment | Damien Miller | |