OpenBSD CVS

CVS log for src/usr.bin/ssh/myproposal.h


[BACK] Up to [local] / src / usr.bin / ssh

Request diff between arbitrary revisions


Default branch: MAIN


Revision 1.71 / (download) - annotate - [select for diffs], Wed Mar 30 21:13:23 2022 UTC (2 years, 1 month ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_7_5_BASE, OPENBSD_7_5, OPENBSD_7_4_BASE, OPENBSD_7_4, OPENBSD_7_3_BASE, OPENBSD_7_3, OPENBSD_7_2_BASE, OPENBSD_7_2, OPENBSD_7_1_BASE, OPENBSD_7_1, HEAD
Changes since 1.70: +2 -2 lines
Diff to previous 1.70 (colored)

select post-quantum KEX sntrup761x25519-sha512@openssh.com as the
default; ok markus@

Revision 1.70 / (download) - annotate - [select for diffs], Wed Nov 10 06:29:25 2021 UTC (2 years, 6 months ago) by djm
Branch: MAIN
Changes since 1.69: +2 -1 lines
Diff to previous 1.69 (colored)

add the sntrup761x25519-sha512@openssh.com hybrid ECDH/x25519 +
Streamlined NTRU Prime post-quantum KEX to the default KEXAlgorithms
list (after the ECDH methods but before the prime-group DH ones).

ok markus@

Revision 1.69 / (download) - annotate - [select for diffs], Sun Aug 29 23:53:10 2021 UTC (2 years, 8 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_7_0_BASE, OPENBSD_7_0
Changes since 1.68: +2 -4 lines
Diff to previous 1.68 (colored)

After years of forewarning, disable the RSA/SHA-1 signature algorithm
by default. It is feasible to create colliding SHA1 hashes, so we
need to deprecate its use.

RSA/SHA-256/512 remains available and will be transparently selected
instead of RSA/SHA1 for most SSH servers released in the last five+
years. There is no need to regenerate RSA keys.

The use of RSA/SHA1 can be re-enabled by adding "ssh-rsa" to the
PubkeyAcceptedAlgorithms directives on the client and server.

ok dtucker deraadt

Revision 1.68 / (download) - annotate - [select for diffs], Sat Oct 3 04:15:06 2020 UTC (3 years, 7 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_9_BASE, OPENBSD_6_9
Changes since 1.67: +7 -7 lines
Diff to previous 1.67 (colored)

prefer ed25519 signature algorithm variants to ECDSA; ok markus@

Revision 1.67 / (download) - annotate - [select for diffs], Fri Jan 24 00:28:57 2020 UTC (4 years, 3 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_8_BASE, OPENBSD_6_8, OPENBSD_6_7_BASE, OPENBSD_6_7
Changes since 1.66: +2 -3 lines
Diff to previous 1.66 (colored)

remove ssh-rsa (SHA1) from the list of allowed CA signature algorithms
ok markus

Revision 1.66 / (download) - annotate - [select for diffs], Thu Jan 23 02:46:49 2020 UTC (4 years, 3 months ago) by dtucker
Branch: MAIN
Changes since 1.65: +1 -34 lines
Diff to previous 1.65 (colored)

Remove unsupported algorithms from list of defaults at run time and
remove ifdef and distinct settings for OPENSSL=no case.

This will make things much simpler for -portable where the exact set
of algos depends on the configuration of both OpenSSH and the libcrypto
it's linked against (if any).  ok djm@

Revision 1.65 / (download) - annotate - [select for diffs], Wed Jan 22 04:58:23 2020 UTC (4 years, 3 months ago) by tedu
Branch: MAIN
Changes since 1.64: +2 -3 lines
Diff to previous 1.64 (colored)

remove diffie-hellman-group14-sha1 from default kex to see what happens.
general mostly ok

Revision 1.64 / (download) - annotate - [select for diffs], Mon Dec 16 03:16:58 2019 UTC (4 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.63: +5 -5 lines
Diff to previous 1.63 (colored)

sort sk-* methods behind their plain key methods cousins for now

Revision 1.63 / (download) - annotate - [select for diffs], Sun Dec 15 18:57:30 2019 UTC (4 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.62: +5 -22 lines
Diff to previous 1.62 (colored)

allow security keys to act as host keys as well as user keys.

Previously we didn't do this because we didn't want to expose
the attack surface presented by USB and FIDO protocol handling,
but now that this is insulated behind ssh-sk-helper there is
less risk.

ok markus@

Revision 1.62 / (download) - annotate - [select for diffs], Tue Dec 10 22:43:19 2019 UTC (4 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.61: +4 -2 lines
Diff to previous 1.61 (colored)

add security key types to list of keys allowed to act as CAs;
spotted by Ron Frederick

Revision 1.61 / (download) - annotate - [select for diffs], Tue Nov 12 19:33:08 2019 UTC (4 years, 6 months ago) by markus
Branch: MAIN
Changes since 1.60: +3 -1 lines
Diff to previous 1.60 (colored)

enable ed25519 support; ok djm

Revision 1.60 / (download) - annotate - [select for diffs], Fri Nov 1 02:32:05 2019 UTC (4 years, 6 months ago) by djm
Branch: MAIN
Changes since 1.59: +1 -5 lines
Diff to previous 1.59 (colored)

remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL path

Revision 1.59 / (download) - annotate - [select for diffs], Thu Oct 31 21:17:49 2019 UTC (4 years, 6 months ago) by djm
Branch: MAIN
Changes since 1.58: +24 -1 lines
Diff to previous 1.58 (colored)

Separate myproposal.h userauth pubkey types

U2F/FIDO keys are not supported for host authentication, so we need
a separate list for user keys.

feedback & ok markus@

Revision 1.58 / (download) - annotate - [select for diffs], Sat Feb 23 08:20:43 2019 UTC (5 years, 2 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_6_BASE, OPENBSD_6_6, OPENBSD_6_5_BASE, OPENBSD_6_5
Changes since 1.57: +4 -9 lines
Diff to previous 1.57 (colored)

openssh-7.9 accidentally reused the server's algorithm lists in the
client for KEX, ciphers and MACs. The ciphers and MACs were
identical between the client and server, but the error accidentially
disabled the diffie-hellman-group-exchange-sha1 KEX method.

This fixes the client code to use the correct method list, but
because nobody complained, it also disables the
diffie-hellman-group-exchange-sha1 KEX method.

Reported by nuxi AT vault24.org via bz#2697; ok dtucker

Revision 1.57 / (download) - annotate - [select for diffs], Wed Sep 12 01:34:02 2018 UTC (5 years, 8 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_4_BASE, OPENBSD_6_4
Changes since 1.56: +13 -1 lines
Diff to previous 1.56 (colored)

add SSH_ALLOWED_CA_SIGALGS - the default list of signature algorithms
that are allowed for CA signatures. Notably excludes ssh-dsa.

ok markus@

Revision 1.56 / (download) - annotate - [select for diffs], Tue Jul 3 11:39:54 2018 UTC (5 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.55: +3 -1 lines
Diff to previous 1.55 (colored)

Improve strictness and control over RSA-SHA2 signature types:

In ssh, when an agent fails to return a RSA-SHA2 signature when
requested and falls back to RSA-SHA1 instead, retry the signature to
ensure that the public key algorithm sent in the SSH_MSG_USERAUTH
matches the one in the signature itself.

In sshd, strictly enforce that the public key algorithm sent in the
SSH_MSG_USERAUTH message matches what appears in the signature.

Make the sshd_config PubkeyAcceptedKeyTypes and
HostbasedAcceptedKeyTypes options control accepted signature algorithms
(previously they selected supported key types). This allows these
options to ban RSA-SHA1 in favour of RSA-SHA2.

Add new signature algorithms "rsa-sha2-256-cert-v01@openssh.com" and
"rsa-sha2-512-cert-v01@openssh.com" to force use of RSA-SHA2 signatures
with certificate keys.

feedback and ok markus@

Revision 1.55 / (download) - annotate - [select for diffs], Sun May 7 23:13:42 2017 UTC (7 years ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_3_BASE, OPENBSD_6_3, OPENBSD_6_2_BASE, OPENBSD_6_2
Changes since 1.54: +2 -3 lines
Diff to previous 1.54 (colored)

Don't offer CBC ciphers by default in the client. ok markus@

Revision 1.54 / (download) - annotate - [select for diffs], Wed Sep 28 16:33:07 2016 UTC (7 years, 7 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_1_BASE, OPENBSD_6_1
Changes since 1.53: +2 -2 lines
Diff to previous 1.53 (colored)

Remove support for pre-authentication compression. Doing compression
early in the protocol probably seemed reasonable in the 1990s, but
today it's clearly a bad idea in terms of both cryptography (cf.
multiple compression oracle attacks in TLS) and attack surface.

Moreover, to support it across privilege-separation zlib needed
the assistance of a complex shared-memory manager that made the
required attack surface considerably larger.

Prompted by Guido Vranken pointing out a compiler-elided security
check in the shared memory manager found by Stack
(http://css.csail.mit.edu/stack/); ok deraadt@ markus@

NB. pre-auth authentication has been disabled by default in sshd
for >10 years.

Revision 1.53 / (download) - annotate - [select for diffs], Thu Sep 22 17:52:53 2016 UTC (7 years, 7 months ago) by djm
Branch: MAIN
Changes since 1.52: +3 -1 lines
Diff to previous 1.52 (colored)

support plain curve25519-sha256 KEX algorithm now that it is
approaching standardisation (same algorithm is currently supported
as curve25519-sha256@libssh.org)

Revision 1.52 / (download) - annotate - [select for diffs], Mon Sep 5 14:02:42 2016 UTC (7 years, 8 months ago) by djm
Branch: MAIN
Changes since 1.51: +2 -2 lines
Diff to previous 1.51 (colored)

remove 3des-cbc from the client's default proposal; 64-bit block ciphers
are not safe in 2016 and we don't want to wait until attacks like sweet32
are extended to SSH.

As 3des-cbc was the only mandatory cipher in the SSH RFCs, this may
cause problems connecting to older devices using the defaults, but
it's highly likely that such devices already need explicit
configuration for KEX and hostkeys anyway.

ok deraadt, markus, dtucker

Revision 1.51 / (download) - annotate - [select for diffs], Mon May 2 10:26:04 2016 UTC (8 years ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_0_BASE, OPENBSD_6_0
Changes since 1.50: +6 -2 lines
Diff to previous 1.50 (colored)

add support for additional fixed DH groups from
draft-ietf-curdle-ssh-kex-sha2-03

diffie-hellman-group14-sha256 (2K group)
diffie-hellman-group16-sha512 (4K group)
diffie-hellman-group18-sha512 (8K group)

based on patch from Mark D. Baushke and Darren Tucker
ok markus@

Revision 1.50 / (download) - annotate - [select for diffs], Tue Feb 9 05:30:04 2016 UTC (8 years, 3 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_5_9_BASE, OPENBSD_5_9
Changes since 1.49: +4 -15 lines
Diff to previous 1.49 (colored)

turn off more old crypto in the client: hmac-md5, ripemd, truncated
HMACs, RC4, blowfish. ok markus@ dtucker@

Revision 1.49 / (download) - annotate - [select for diffs], Sat Dec 5 20:53:21 2015 UTC (8 years, 5 months ago) by markus
Branch: MAIN
Changes since 1.48: +2 -2 lines
Diff to previous 1.48 (colored)

prefer rsa-sha2-512 over -256 for hostkeys, too; noticed by naddy@

Revision 1.48 / (download) - annotate - [select for diffs], Fri Dec 4 16:41:28 2015 UTC (8 years, 5 months ago) by markus
Branch: MAIN
Changes since 1.47: +3 -1 lines
Diff to previous 1.47 (colored)

implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)
based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt;
with & ok djm@

Revision 1.47 / (download) - annotate - [select for diffs], Fri Jul 10 06:21:53 2015 UTC (8 years, 10 months ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_5_8_BASE, OPENBSD_5_8
Changes since 1.46: +2 -4 lines
Diff to previous 1.46 (colored)

Turn off DSA by default; add HostKeyAlgorithms to the server and
PubkeyAcceptedKeyTypes to the client side, so it still can be
tested or turned back on; feedback and ok djm@

Revision 1.46 / (download) - annotate - [select for diffs], Fri Jul 3 03:47:00 2015 UTC (8 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.45: +2 -3 lines
Diff to previous 1.45 (colored)

turn off 1024 bit diffie-hellman-group1-sha1 key exchange method
(already off in server, this turns it off in the client by default too)
ok dtucker@

Revision 1.45 / (download) - annotate - [select for diffs], Fri Jul 3 03:43:18 2015 UTC (8 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.44: +1 -3 lines
Diff to previous 1.44 (colored)

delete support for legacy v00 certificates; "sure" markus@ dtucker@

Revision 1.44 / (download) - annotate - [select for diffs], Wed May 27 23:51:10 2015 UTC (8 years, 11 months ago) by dtucker
Branch: MAIN
Changes since 1.43: +8 -5 lines
Diff to previous 1.43 (colored)

Reorder client proposal to prefer diffie-hellman-group-exchange-sha1 over
diffie-hellman-group14-sha1.  ok djm@

Revision 1.43 / (download) - annotate - [select for diffs], Tue Apr 21 07:01:00 2015 UTC (9 years ago) by jsg
Branch: MAIN
Changes since 1.42: +2 -2 lines
Diff to previous 1.42 (colored)

Add back a backslash removed in rev 1.42 so KEX_SERVER_ENCRYPT will
include aes again.

ok deraadt@

Revision 1.42 / (download) - annotate - [select for diffs], Tue Mar 24 09:17:21 2015 UTC (9 years, 1 month ago) by djm
Branch: MAIN
Changes since 1.41: +5 -5 lines
Diff to previous 1.41 (colored)

promote chacha20-poly1305@openssh.com to be the default cipher;
ok markus

Revision 1.41 / (download) - annotate - [select for diffs], Fri Jul 11 13:54:34 2014 UTC (9 years, 10 months ago) by tedu
Branch: MAIN
CVS Tags: OPENBSD_5_7_BASE, OPENBSD_5_7, OPENBSD_5_6_BASE, OPENBSD_5_6
Changes since 1.40: +8 -8 lines
Diff to previous 1.40 (colored)

by popular demand, add back hamc-sha1 to server proposal for better compat
with many clients still in use. ok deraadt

Revision 1.40 / (download) - annotate - [select for diffs], Wed Apr 30 19:07:48 2014 UTC (10 years ago) by naddy
Branch: MAIN
Changes since 1.39: +5 -1 lines
Diff to previous 1.39 (colored)

UMAC can use our local fallback implementation of AES when OpenSSL isn't
available.  Glue code straight from Ted Krovetz's original umac.c.
ok markus@

Revision 1.39 / (download) - annotate - [select for diffs], Tue Apr 29 18:01:49 2014 UTC (10 years ago) by markus
Branch: MAIN
Changes since 1.38: +27 -1 lines
Diff to previous 1.38 (colored)

make compiling against OpenSSL optional (make OPENSSL=no);
reduces algorithms to curve25519, aes-ctr, chacha, ed25519;
allows us to explore further options; with and ok djm

Revision 1.38 / (download) - annotate - [select for diffs], Thu Mar 27 23:01:27 2014 UTC (10 years, 1 month ago) by markus
Branch: MAIN
Changes since 1.37: +41 -24 lines
Diff to previous 1.37 (colored)

disable weak proposals in sshd, but keep them in ssh; ok djm@

Revision 1.37 / (download) - annotate - [select for diffs], Wed Mar 26 17:16:26 2014 UTC (10 years, 1 month ago) by deraadt
Branch: MAIN
Changes since 1.36: +19 -4 lines
Diff to previous 1.36 (colored)

The current sharing of myproposal[] between both client and server code
makes the previous diff highly unpallatable.  We want to go in that
direction for the server, but not for the client.  Sigh.
Brought up by naddy.

Revision 1.36 / (download) - annotate - [select for diffs], Tue Mar 25 09:40:03 2014 UTC (10 years, 1 month ago) by markus
Branch: MAIN
Changes since 1.35: +5 -20 lines
Diff to previous 1.35 (colored)

trimm default proposals.

This commit removes the weaker pre-SHA2 hashes, the broken ciphers
(arcfour), and the broken modes (CBC) from the default configuration
(the patch only changes the default, all the modes are still available
for the config files).

ok djm@, reminded by tedu@ & naddy@ and discussed with many

Revision 1.35 / (download) - annotate - [select for diffs], Fri Dec 6 13:39:49 2013 UTC (10 years, 5 months ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_5_5_BASE, OPENBSD_5_5
Changes since 1.34: +3 -1 lines
Diff to previous 1.34 (colored)

support ed25519 keys (hostkeys and user identities) using the public domain
ed25519 reference code from SUPERCOP, see http://ed25519.cr.yp.to/software.html
feedback, help & ok djm@

Revision 1.34 / (download) - annotate - [select for diffs], Thu Nov 21 00:45:44 2013 UTC (10 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.33: +2 -1 lines
Diff to previous 1.33 (colored)

Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com"
that combines Daniel Bernstein's ChaCha20 stream cipher and Poly1305 MAC
to build an authenticated encryption mode.

Inspired by and similar to Adam Langley's proposal for TLS:
http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03
but differs in layout used for the MAC calculation and the use of a
second ChaCha20 instance to separately encrypt packet lengths.
Details are in the PROTOCOL.chacha20poly1305 file.

Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC
ok markus@ naddy@

Revision 1.33 / (download) - annotate - [select for diffs], Sat Nov 2 21:59:15 2013 UTC (10 years, 6 months ago) by markus
Branch: MAIN
Changes since 1.32: +2 -1 lines
Diff to previous 1.32 (colored)

use curve25519 for default key exchange (curve25519-sha256@libssh.org);
initial patch from Aris Adamantiadis; ok djm@

Revision 1.32 / (download) - annotate - [select for diffs], Tue Jan 8 18:49:04 2013 UTC (11 years, 4 months ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_5_4_BASE, OPENBSD_5_4, OPENBSD_5_3_BASE, OPENBSD_5_3
Changes since 1.31: +2 -1 lines
Diff to previous 1.31 (colored)

support AES-GCM as defined in RFC 5647 (but with simpler KEX handling)
ok and feedback djm@

Revision 1.31 / (download) - annotate - [select for diffs], Tue Dec 11 22:31:18 2012 UTC (11 years, 5 months ago) by markus
Branch: MAIN
Changes since 1.30: +10 -1 lines
Diff to previous 1.30 (colored)

add encrypt-then-mac (EtM) modes to openssh by defining new mac algorithms
that change the packet format and compute the MAC over the encrypted
message (including the packet size) instead of the plaintext data;
these EtM modes are considered more secure and used by default.
feedback and ok djm@

Revision 1.30 / (download) - annotate - [select for diffs], Thu Oct 4 13:21:50 2012 UTC (11 years, 7 months ago) by markus
Branch: MAIN
Changes since 1.29: +2 -1 lines
Diff to previous 1.29 (colored)

add umac128 variant; ok djm@ at n2k12

Revision 1.29 / (download) - annotate - [select for diffs], Thu Jun 28 05:07:45 2012 UTC (11 years, 10 months ago) by dtucker
Branch: MAIN
CVS Tags: OPENBSD_5_2_BASE, OPENBSD_5_2
Changes since 1.28: +1 -3 lines
Diff to previous 1.28 (colored)

Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs since they were removed
from draft6 of the spec and will not be in the RFC when published.  Patch
from mdb at juniper net via bz#2023, ok markus.

Revision 1.28 / (download) - annotate - [select for diffs], Tue Aug 2 01:22:11 2011 UTC (12 years, 9 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_5_1_BASE, OPENBSD_5_1, OPENBSD_5_0_BASE, OPENBSD_5_0
Changes since 1.27: +12 -3 lines
Diff to previous 1.27 (colored)

Add new SHA256 and SHA512 based HMAC modes from
http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt

feedback and ok markus@

Revision 1.27 / (download) - annotate - [select for diffs], Wed Sep 1 22:42:13 2010 UTC (13 years, 8 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_4_9_BASE, OPENBSD_4_9
Changes since 1.26: +2 -2 lines
Diff to previous 1.26 (colored)

prefer ECDH in a 256 bit curve field; prompted by naddy@

Revision 1.26 / (download) - annotate - [select for diffs], Tue Aug 31 11:54:45 2010 UTC (13 years, 8 months ago) by djm
Branch: MAIN
Changes since 1.25: +18 -6 lines
Diff to previous 1.25 (colored)

Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and
host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer
better performance than plain DH and DSA at the same equivalent symmetric
key length, as well as much shorter keys.

Only the mandatory sections of RFC5656 are implemented, specifically the
three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and
ECDSA. Point compression (optional in RFC5656 is NOT implemented).

Certificate host and user keys using the new ECDSA key types are supported.

Note that this code has not been tested for interoperability and may be
subject to change.

feedback and ok markus@

Revision 1.25 / (download) - annotate - [select for diffs], Fri Apr 16 01:47:26 2010 UTC (14 years, 1 month ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_4_8_BASE, OPENBSD_4_8
Changes since 1.24: +5 -2 lines
Diff to previous 1.24 (colored)

revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with the
following changes:

move the nonce field to the beginning of the certificate where it can
better protect against chosen-prefix attacks on the signature hash

Rename "constraints" field to "critical options"

Add a new non-critical "extensions" field

Add a serial number

The older format is still support for authentication and cert generation
(use "ssh-keygen -t v00 -s ca_key ..." to generate a v00 certificate)

ok markus@

Revision 1.24 / (download) - annotate - [select for diffs], Fri Feb 26 20:29:54 2010 UTC (14 years, 2 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_4_7_BASE, OPENBSD_4_7
Changes since 1.23: +4 -2 lines
Diff to previous 1.23 (colored)

Add support for certificate key types for users and hosts.

OpenSSH certificate key types are not X.509 certificates, but a much
simpler format that encodes a public key, identity information and
some validity constraints and signs it with a CA key. CA keys are
regular SSH keys. This certificate style avoids the attack surface
of X.509 certificates and is very easy to deploy.

Certified host keys allow automatic acceptance of new host keys
when a CA certificate is marked as trusted in ~/.ssh/known_hosts.
see VERIFYING HOST KEYS in ssh(1) for details.

Certified user keys allow authentication of users when the signing
CA key is marked as trusted in authorized_keys. See "AUTHORIZED_KEYS
FILE FORMAT" in sshd(8) for details.

Certificates are minted using ssh-keygen(1), documentation is in
the "CERTIFICATES" section of that manpage.

Documentation on the format of certificates is in the file
PROTOCOL.certkeys

feedback and ok markus@

Revision 1.23 / (download) - annotate - [select for diffs], Fri Jan 23 07:58:11 2009 UTC (15 years, 3 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_4_6_BASE, OPENBSD_4_6, OPENBSD_4_5_BASE, OPENBSD_4_5
Changes since 1.22: +5 -4 lines
Diff to previous 1.22 (colored)

prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC
modes; ok markus@

Revision 1.22 / (download) - annotate - [select for diffs], Thu Jun 7 19:37:34 2007 UTC (16 years, 11 months ago) by pvalchev
Branch: MAIN
CVS Tags: OPENBSD_4_4_BASE, OPENBSD_4_4, OPENBSD_4_3_BASE, OPENBSD_4_3, OPENBSD_4_2_BASE, OPENBSD_4_2
Changes since 1.21: +2 -2 lines
Diff to previous 1.21 (colored)

Add a new MAC algorithm for data integrity, UMAC-64 (not default yet, must
specify umac-64@openssh.com). Provides about 20% end-to-end speedup
compared to hmac-md5. Represents a different approach to message
authentication to that of HMAC that may be beneficial if HMAC based on one
of its underlying hash algorithms is found to be vulnerable to a new attack.
http://www.ietf.org/rfc/rfc4418.txt

in conjunction with and OK djm@

Revision 1.18.2.1 / (download) - annotate - [select for diffs], Fri Oct 6 03:19:32 2006 UTC (17 years, 7 months ago) by brad
Branch: OPENBSD_3_8
Changes since 1.18: +4 -2 lines
Diff to previous 1.18 (colored) next main 1.19 (colored)

upgrade to OpenSSH 4.4

Revision 1.18.4.1 / (download) - annotate - [select for diffs], Sat Sep 30 04:06:50 2006 UTC (17 years, 7 months ago) by brad
Branch: OPENBSD_3_9
Changes since 1.18: +4 -2 lines
Diff to previous 1.18 (colored) next main 1.19 (colored)

upgrade to OpenSSH 4.4

Revision 1.21 / (download) - annotate - [select for diffs], Sat Mar 25 22:22:43 2006 UTC (18 years, 1 month ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_4_1_BASE, OPENBSD_4_1, OPENBSD_4_0_BASE, OPENBSD_4_0
Changes since 1.20: +1 -1 lines
Diff to previous 1.20 (colored)

standardise spacing in $OpenBSD$ tags; requested by deraadt@

Revision 1.20 / (download) - annotate - [select for diffs], Sun Mar 19 18:53:12 2006 UTC (18 years, 2 months ago) by deraadt
Branch: MAIN
Changes since 1.19: +3 -3 lines
Diff to previous 1.19 (colored)

spacing

Revision 1.19 / (download) - annotate - [select for diffs], Tue Mar 7 09:07:40 2006 UTC (18 years, 2 months ago) by djm
Branch: MAIN
Changes since 1.18: +6 -4 lines
Diff to previous 1.18 (colored)

Implement the diffie-hellman-group-exchange-sha256 key exchange method
using the SHA256 code in libc (and wrapper to make it into an OpenSSL
EVP), interop tested against CVS PuTTY

Revision 1.16.4.1 / (download) - annotate - [select for diffs], Sun Sep 4 18:40:02 2005 UTC (18 years, 8 months ago) by brad
Branch: OPENBSD_3_7
Changes since 1.16: +4 -3 lines
Diff to previous 1.16 (colored) next main 1.17 (colored)

upgrade to OpenSSH 4.2

Revision 1.16.2.1 / (download) - annotate - [select for diffs], Fri Sep 2 03:45:00 2005 UTC (18 years, 8 months ago) by brad
Branch: OPENBSD_3_6
Changes since 1.16: +4 -3 lines
Diff to previous 1.16 (colored) next main 1.17 (colored)

upgrade to OpenSSH 4.2

Revision 1.18 / (download) - annotate - [select for diffs], Mon Jul 25 11:59:39 2005 UTC (18 years, 9 months ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_3_9_BASE, OPENBSD_3_8_BASE
Branch point for: OPENBSD_3_9, OPENBSD_3_8
Changes since 1.17: +2 -2 lines
Diff to previous 1.17 (colored)

add a new compression method that delays compression until the user
has been authenticated successfully and set compression to 'delayed'
for sshd.

this breaks older openssh clients (< 3.5) if they insist on
compression, so you have to re-enable compression in sshd_config.
ok djm@

Revision 1.17 / (download) - annotate - [select for diffs], Mon May 23 23:32:46 2005 UTC (18 years, 11 months ago) by djm
Branch: MAIN
Changes since 1.16: +3 -2 lines
Diff to previous 1.16 (colored)

add support for draft-harris-ssh-arcfour-fixes-02 improved arcfour modes;
ok markus@

Revision 1.15.2.1 / (download) - annotate - [select for diffs], Thu Aug 19 22:37:31 2004 UTC (19 years, 9 months ago) by brad
Branch: OPENBSD_3_4
Changes since 1.15: +4 -2 lines
Diff to previous 1.15 (colored) next main 1.16 (colored)

upgrade to OpenSSH 3.9

Revision 1.15.4.1 / (download) - annotate - [select for diffs], Thu Aug 19 04:13:26 2004 UTC (19 years, 9 months ago) by brad
Branch: OPENBSD_3_5
Changes since 1.15: +4 -2 lines
Diff to previous 1.15 (colored) next main 1.16 (colored)

upgrade to OpenSSH 3.9

Revision 1.16 / (download) - annotate - [select for diffs], Sun Jun 13 12:53:24 2004 UTC (19 years, 11 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_3_7_BASE, OPENBSD_3_6_BASE
Branch point for: OPENBSD_3_7, OPENBSD_3_6
Changes since 1.15: +4 -2 lines
Diff to previous 1.15 (colored)

implement diffie-hellman-group14-sha1 kex method (trivial extension to
existing diffie-hellman-group1-sha1); ok markus@

Revision 1.14.6.2 / (download) - annotate - [select for diffs], Thu Mar 4 18:18:16 2004 UTC (20 years, 2 months ago) by brad
Branch: OPENBSD_3_3
Changes since 1.14.6.1: +0 -0 lines
Diff to previous 1.14.6.1 (colored) to branchpoint 1.14 (colored) next main 1.15 (colored)

upgrade to OpenSSH 3.8upgrade to OpenSSH 3.8upgrade to OpenSSH 3.8

Revision 1.14.4.1 / (download) - annotate - [select for diffs], Tue Sep 16 21:20:26 2003 UTC (20 years, 8 months ago) by brad
Branch: OPENBSD_3_2
Changes since 1.14: +3 -2 lines
Diff to previous 1.14 (colored) next main 1.15 (colored)

upgrade to OpenSSH 3.7

Revision 1.14.6.1 / (download) - annotate - [select for diffs], Tue Sep 16 20:50:43 2003 UTC (20 years, 8 months ago) by brad
Branch: OPENBSD_3_3
Changes since 1.14: +3 -2 lines
Diff to previous 1.14 (colored)

upgrade to OpenSSH 3.7

Revision 1.15 / (download) - annotate - [select for diffs], Sat May 17 04:27:52 2003 UTC (21 years ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_3_5_BASE, OPENBSD_3_4_BASE
Branch point for: OPENBSD_3_5, OPENBSD_3_4
Changes since 1.14: +3 -2 lines
Diff to previous 1.14 (colored)

experimental support for aes-ctr modes from
http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
ok djm@

Revision 1.12.2.2 / (download) - annotate - [select for diffs], Sun Jun 2 22:56:10 2002 UTC (21 years, 11 months ago) by miod
Branch: OPENBSD_2_9
Changes since 1.12.2.1: +2 -2 lines
Diff to previous 1.12.2.1 (colored) to branchpoint 1.12 (colored) next main 1.13 (colored)

Upgrade to OpenSSH 3.2.3.

Except for improbable compilation error fixes, this should be the last
commit made to the 2.9-STABLE branche. Have fun upgrading.

Revision 1.12.4.2 / (download) - annotate - [select for diffs], Fri May 17 00:03:23 2002 UTC (22 years ago) by miod
Branch: OPENBSD_3_0
Changes since 1.12.4.1: +2 -2 lines
Diff to previous 1.12.4.1 (colored) to branchpoint 1.12 (colored) next main 1.13 (colored)

Update OpenSSH to version 3.2.2.

Revision 1.14 / (download) - annotate - [select for diffs], Wed Apr 3 09:26:11 2002 UTC (22 years, 1 month ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_3_3_BASE, OPENBSD_3_2_BASE, OPENBSD_3_1_BASE, OPENBSD_3_1
Branch point for: OPENBSD_3_3, OPENBSD_3_2
Changes since 1.13: +2 -2 lines
Diff to previous 1.13 (colored)

re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net

Revision 1.12.2.1 / (download) - annotate - [select for diffs], Sat Mar 9 00:20:44 2002 UTC (22 years, 2 months ago) by miod
Branch: OPENBSD_2_9
Changes since 1.12: +2 -4 lines
Diff to previous 1.12 (colored)

Merge OpenSSH 3.1, keeping /etc as configuration files directory.
(i.e. OpenSSH 3.1 + openbsd29_3.1.patch)

Revision 1.8.2.6 / (download) - annotate - [select for diffs], Fri Mar 8 17:04:42 2002 UTC (22 years, 2 months ago) by brad
Branch: OPENBSD_2_8
Changes since 1.8.2.5: +2 -4 lines
Diff to previous 1.8.2.5 (colored) to branchpoint 1.8 (colored) next main 1.9 (colored)

Merge OpenSSH 3.1.

Revision 1.12.4.1 / (download) - annotate - [select for diffs], Thu Mar 7 17:37:46 2002 UTC (22 years, 2 months ago) by jason
Branch: OPENBSD_3_0
Changes since 1.12: +2 -4 lines
Diff to previous 1.12 (colored)

Update to OpenSSH-3.1 on 3.0-stable branch

Revision 1.13 / (download) - annotate - [select for diffs], Mon Jan 21 22:30:12 2002 UTC (22 years, 3 months ago) by markus
Branch: MAIN
Changes since 1.12: +2 -4 lines
Diff to previous 1.12 (colored)

remove "rijndael-*", just use "aes-" since this how rijndael is called
in the drafts; ok stevesk@

Revision 1.8.2.5 / (download) - annotate - [select for diffs], Thu Sep 27 00:15:42 2001 UTC (22 years, 7 months ago) by miod
Branch: OPENBSD_2_8
Changes since 1.8.2.4: +0 -0 lines
Diff to previous 1.8.2.4 (colored) to branchpoint 1.8 (colored)

Pull in OpenSSH 2.9.9 to the 2.8 branch.

Revision 1.8.2.4 / (download) - annotate - [select for diffs], Mon May 7 21:09:31 2001 UTC (23 years ago) by jason
Branch: OPENBSD_2_8
Changes since 1.8.2.3: +0 -0 lines
Diff to previous 1.8.2.3 (colored) to branchpoint 1.8 (colored)

Pull in OpenSSH-2.9 to 2.8 branch.

Revision 1.8.2.3 / (download) - annotate - [select for diffs], Wed Mar 21 19:46:26 2001 UTC (23 years, 2 months ago) by jason
Branch: OPENBSD_2_8
Changes since 1.8.2.2: +4 -4 lines
Diff to previous 1.8.2.2 (colored) to branchpoint 1.8 (colored)

Pull in OpenSSH-2.5.2 for 2.8 branch.

Revision 1.2.2.4 / (download) - annotate - [select for diffs], Wed Mar 21 18:52:53 2001 UTC (23 years, 2 months ago) by jason
Branch: OPENBSD_2_7
Changes since 1.2.2.3: +4 -4 lines
Diff to previous 1.2.2.3 (colored) to branchpoint 1.2 (colored) next main 1.3 (colored)

Pull in OpenSSH-2.5.2 for 2.7 branch.

Revision 1.2.2.3 / (download) - annotate - [select for diffs], Mon Mar 12 15:44:12 2001 UTC (23 years, 2 months ago) by jason
Branch: OPENBSD_2_7
Changes since 1.2.2.2: +7 -2 lines
Diff to previous 1.2.2.2 (colored) to branchpoint 1.2 (colored)

OpenSSH-2.5.1 for 2.7 patch branch

Revision 1.12 / (download) - annotate - [select for diffs], Mon Mar 5 15:56:16 2001 UTC (23 years, 2 months ago) by deraadt
Branch: MAIN
CVS Tags: OPENBSD_3_0_BASE, OPENBSD_2_9_BASE
Branch point for: OPENBSD_3_0, OPENBSD_2_9
Changes since 1.11: +4 -4 lines
Diff to previous 1.11 (colored)

switch to aes128-cbc/hmac-md5 by default in SSH2 -- faster; provos & markus ok

Revision 1.8.2.2 / (download) - annotate - [select for diffs], Mon Feb 19 17:19:08 2001 UTC (23 years, 3 months ago) by jason
Branch: OPENBSD_2_8
Changes since 1.8.2.1: +0 -0 lines
Diff to previous 1.8.2.1 (colored) to branchpoint 1.8 (colored)

Pull in OpenSSH-2.5.1

Revision 1.8.2.1 / (download) - annotate - [select for diffs], Fri Feb 16 20:13:08 2001 UTC (23 years, 3 months ago) by jason
Branch: OPENBSD_2_8
Changes since 1.8: +7 -2 lines
Diff to previous 1.8 (colored)

Pull in OpenSSH 2.5.0

Revision 1.11 / (download) - annotate - [select for diffs], Sun Feb 11 12:59:24 2001 UTC (23 years, 3 months ago) by markus
Branch: MAIN
Changes since 1.10: +5 -2 lines
Diff to previous 1.10 (colored)

1) clean up the MAC support for SSH-2
2) allow you to specify the MAC with 'ssh -m'
3) or the 'MACs' keyword in ssh(d)_config
4) add hmac-{md5,sha1}-96
	ok stevesk@, provos@

Revision 1.10 / (download) - annotate - [select for diffs], Mon Jan 29 01:58:17 2001 UTC (23 years, 3 months ago) by niklas
Branch: MAIN
Changes since 1.9: +2 -0 lines
Diff to previous 1.9 (colored)

$OpenBSD$

Revision 1.9 / (download) - annotate - [select for diffs], Sun Nov 12 19:50:37 2000 UTC (23 years, 6 months ago) by markus
Branch: MAIN
Changes since 1.8: +1 -1 lines
Diff to previous 1.8 (colored)

add support for RSA to SSH2.  please test.

there are now 3 types of keys: RSA1 is used by ssh-1 only,
RSA and DSA are used by SSH2.

you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA
keys for SSH2 and use the RSA keys for hostkeys or for user keys.

SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before.

IdentityFile2, HostDsaKey and DSAAuthentication are obsolete.
you can use multiple IdentityFile and HostKey for all types of keys.

the option DSAAuthentication is replaced by PubkeyAuthetication.

Revision 1.2.2.2 / (download) - annotate - [select for diffs], Wed Nov 8 21:30:59 2000 UTC (23 years, 6 months ago) by jason
Branch: OPENBSD_2_7
Changes since 1.2.2.1: +30 -3 lines
Diff to previous 1.2.2.1 (colored) to branchpoint 1.2 (colored)

openssh-2.3.0 (again) for 2.7 branch

Revision 1.8 / (download) - annotate - [select for diffs], Fri Oct 13 19:12:02 2000 UTC (23 years, 7 months ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_2_8_BASE
Branch point for: OPENBSD_2_8
Changes since 1.7: +1 -1 lines
Diff to previous 1.7 (colored)

prefer no compression

Revision 1.7 / (download) - annotate - [select for diffs], Fri Oct 13 18:59:14 2000 UTC (23 years, 7 months ago) by markus
Branch: MAIN
Changes since 1.6: +5 -1 lines
Diff to previous 1.6 (colored)

rijndael/aes support

Revision 1.6 / (download) - annotate - [select for diffs], Wed Oct 11 20:27:23 2000 UTC (23 years, 7 months ago) by markus
Branch: MAIN
Changes since 1.5: +1 -1 lines
Diff to previous 1.5 (colored)

new cipher framework

Revision 1.5 / (download) - annotate - [select for diffs], Wed Oct 11 04:02:17 2000 UTC (23 years, 7 months ago) by provos
Branch: MAIN
Changes since 1.4: +1 -1 lines
Diff to previous 1.4 (colored)

First rough implementation of the diffie-hellman group exchange.  The
client can ask the server for bigger groups to perform the diffie-hellman
in, thus increasing the attack complexity when using ciphers with longer
keys.  University of Windsor provided network, T the company.

Revision 1.4 / (download) - annotate - [select for diffs], Thu Sep 7 20:27:52 2000 UTC (23 years, 8 months ago) by deraadt
Branch: MAIN
Changes since 1.3: +23 -0 lines
Diff to previous 1.3 (colored)

cleanup copyright notices on all files.  I have attempted to be accurate with
the details.  everything is now under Tatu's licence (which I copied from his
readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd
developers under a 2-term bsd licence.  We're not changing any rules, just
being accurate.

Revision 1.2.2.1 / (download) - annotate - [select for diffs], Mon Jun 12 02:37:34 2000 UTC (23 years, 11 months ago) by jason
Branch: OPENBSD_2_7
Changes since 1.2: +1 -1 lines
Diff to previous 1.2 (colored)

lovin' CVS... update patch branch to OpenSSH-2.1.1

Revision 1.3 / (download) - annotate - [select for diffs], Thu May 25 20:45:20 2000 UTC (23 years, 11 months ago) by markus
Branch: MAIN
Changes since 1.2: +1 -1 lines
Diff to previous 1.2 (colored)

split kexinit/kexdh, factor out common code

Revision 1.2 / (download) - annotate - [select for diffs], Mon May 8 17:12:15 2000 UTC (24 years ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_2_7_BASE
Branch point for: OPENBSD_2_7
Changes since 1.1: +1 -1 lines
Diff to previous 1.1 (colored)

complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)

Revision 1.1 / (download) - annotate - [select for diffs], Tue Apr 4 15:19:42 2000 UTC (24 years, 1 month ago) by markus
Branch: MAIN

ssh2 client implementation, interops w/ ssh.com and lsh servers.

This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.