OpenBSD CVS

CVS log for src/usr.bin/ssh/servconf.h


[BACK] Up to [local] / src / usr.bin / ssh

Request diff between arbitrary revisions


Default branch: MAIN


Revision 1.161 / (download) - annotate - [select for diffs], Fri May 17 00:30:24 2024 UTC (4 hours, 11 minutes ago) by djm
Branch: MAIN
CVS Tags: HEAD
Changes since 1.160: +4 -9 lines
Diff to previous 1.160 (colored)

Start the process of splitting sshd into separate binaries. This step
splits sshd into a listener and a session binary. More splits are
planned.

After this changes, the listener binary will validate the configuration,
load the hostkeys, listen on port 22 and manage MaxStartups only. All
session handling will be performed by a new sshd-session binary that the
listener fork+execs.

This reduces the listener process to the minimum necessary and sets us
up for future work on the sshd-session binary.

feedback/ok markus@ deraadt@

NB. if you're updating via source, please restart sshd after installing,
otherwise you run the risk of locking yourself out.

Revision 1.160 / (download) - annotate - [select for diffs], Wed Sep 6 23:35:35 2023 UTC (8 months, 1 week ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_7_5_BASE, OPENBSD_7_5, OPENBSD_7_4_BASE, OPENBSD_7_4
Changes since 1.159: +8 -6 lines
Diff to previous 1.159 (colored)

allow override of Sybsystem directives in sshd Match blocks

Revision 1.159 / (download) - annotate - [select for diffs], Tue Jan 17 09:44:48 2023 UTC (15 months, 4 weeks ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_7_3_BASE, OPENBSD_7_3
Changes since 1.158: +3 -1 lines
Diff to previous 1.158 (colored)

Add a sshd_config UnusedConnectionTimeout option to terminate
client connections that have no open channels for some length
of time. This complements the recently-added ChannelTimeout
option that terminates inactive channels after a timeout.

ok markus@

Revision 1.158 / (download) - annotate - [select for diffs], Fri Jan 6 02:47:19 2023 UTC (16 months, 1 week ago) by djm
Branch: MAIN
Changes since 1.157: +6 -1 lines
Diff to previous 1.157 (colored)

Implement channel inactivity timeouts

This adds a sshd_config ChannelTimeouts directive that allows channels that
have not seen traffic in a configurable interval to be automatically closed.
Different timeouts may be applied to session, X11, agent and TCP forwarding
channels.

Note: this only affects channels over an opened SSH connection and not
the connection itself. Most clients close the connection when their channels
go away, with a notable exception being ssh(1) in multiplexing mode.

ok markus dtucker

Revision 1.157 / (download) - annotate - [select for diffs], Sat Sep 17 10:34:29 2022 UTC (19 months, 4 weeks ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_7_2_BASE, OPENBSD_7_2
Changes since 1.156: +2 -1 lines
Diff to previous 1.156 (colored)

Add RequiredRSASize for sshd(8); RSA keys that fall beneath this limit
will be ignored for user and host-based authentication.

Feedback deraadt@ ok markus@

Revision 1.156 / (download) - annotate - [select for diffs], Fri Mar 18 04:04:11 2022 UTC (2 years, 2 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_7_1_BASE, OPENBSD_7_1
Changes since 1.155: +2 -2 lines
Diff to previous 1.155 (colored)

don't try to resolve ListenAddress directives in the sshd re-exec
path - we're never going to use the result and if the operation fails
then it can prevent connections from being accepted. Reported by
Aaron Poffenberger; with / ok dtucker@

Revision 1.155 / (download) - annotate - [select for diffs], Fri Jul 2 05:11:21 2021 UTC (2 years, 10 months ago) by dtucker
Branch: MAIN
CVS Tags: OPENBSD_7_0_BASE, OPENBSD_7_0
Changes since 1.154: +1 -2 lines
Diff to previous 1.154 (colored)

Remove references to ChallengeResponseAuthentication in favour of
KbdInteractiveAuthentication.  The former is what was in SSHv1, the
latter is what is in SSHv2 (RFC4256) and they were treated as somewhat
but not entirely equivalent.  We retain the old name as deprecated alias
so config files continue to work and a reference in the man page for
people looking for it.

Prompted by bz#3303 which pointed out the discrepancy between the two
when used with Match.  Man page help & ok jmc@, with & ok djm@

Revision 1.154 / (download) - annotate - [select for diffs], Sat Apr 3 06:18:40 2021 UTC (3 years, 1 month ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_9_BASE, OPENBSD_6_9
Changes since 1.153: +4 -4 lines
Diff to previous 1.153 (colored)

highly polished whitespace, mostly fixing spaces-for-tab and bad
indentation on continuation lines. Prompted by GHPR#185

Revision 1.153 / (download) - annotate - [select for diffs], Sat Apr 3 05:54:14 2021 UTC (3 years, 1 month ago) by djm
Branch: MAIN
Changes since 1.152: +2 -2 lines
Diff to previous 1.152 (colored)

whitespace (tab after space)

Revision 1.152 / (download) - annotate - [select for diffs], Fri Mar 12 04:08:19 2021 UTC (3 years, 2 months ago) by dtucker
Branch: MAIN
Changes since 1.151: +2 -1 lines
Diff to previous 1.151 (colored)

Add ModuliFile keyword to sshd_config to specify the location of the
"moduli" file containing the groups for DH-GEX.  This will allow us to
run tests against arbitrary moduli files without having to install them.
ok djm@

Revision 1.151 / (download) - annotate - [select for diffs], Tue Jan 26 05:32:21 2021 UTC (3 years, 3 months ago) by dtucker
Branch: MAIN
Changes since 1.150: +3 -3 lines
Diff to previous 1.150 (colored)

Rename HostbasedKeyTypes (ssh) and HostbasedAcceptedKeyTypes (sshd) to
HostbasedAcceptedAlgorithms, which more accurately reflects its effect.
This matches a previous change to PubkeyAcceptedAlgorithms.  The previous
names are retained as aliases.  ok djm@

Revision 1.150 / (download) - annotate - [select for diffs], Fri Jan 22 02:44:58 2021 UTC (3 years, 3 months ago) by dtucker
Branch: MAIN
Changes since 1.149: +3 -3 lines
Diff to previous 1.149 (colored)

Rename PubkeyAcceptedKeyTypes keyword to PubkeyAcceptedAlgorithms.
While the two were originally equivalent, this actually specifies the
signature algorithms that are accepted.  Some key types (eg RSA) can be
used by multiple algorithms (eg ssh-rsa, rsa-sha2-512) so the old name is
becoming increasingly misleading.  The old name is retained as an alias.
Prompted by bz#3253, help & ok djm@, man page help jmc@

Revision 1.149 / (download) - annotate - [select for diffs], Sat Jan 9 12:10:02 2021 UTC (3 years, 4 months ago) by dtucker
Branch: MAIN
Changes since 1.148: +4 -1 lines
Diff to previous 1.148 (colored)

Add PerSourceMaxStartups and PerSourceNetBlockSize options which provide
more fine grained MaxStartups limits.  Man page help jmc@, feedback &
ok djm@

Revision 1.148 / (download) - annotate - [select for diffs], Thu Oct 29 03:13:06 2020 UTC (3 years, 6 months ago) by djm
Branch: MAIN
Changes since 1.147: +2 -1 lines
Diff to previous 1.147 (colored)

fix sshd_config SetEnv directive inside Match blocks; part of github
PR#201 from github user manuelm

Revision 1.147 / (download) - annotate - [select for diffs], Fri Oct 16 13:26:13 2020 UTC (3 years, 7 months ago) by djm
Branch: MAIN
Changes since 1.146: +4 -1 lines
Diff to previous 1.146 (colored)

LogVerbose keyword for ssh and sshd

Allows forcing maximum debug logging by file/function/line pattern-
lists.

ok markus@

Revision 1.146 / (download) - annotate - [select for diffs], Thu Aug 27 01:07:10 2020 UTC (3 years, 8 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_8_BASE, OPENBSD_6_8
Changes since 1.145: +3 -2 lines
Diff to previous 1.145 (colored)

support for requiring user verified FIDO keys in sshd

This adds a "verify-required" authorized_keys flag and a corresponding
sshd_config option that tells sshd to require that FIDO keys verify the
user identity before completing the signing/authentication attempt.
Whether or not user verification was performed is already baked into the
signature made on the FIDO token, so this is just plumbing that flag
through and adding ways to require it.

feedback and ok markus@

Revision 1.145 / (download) - annotate - [select for diffs], Sun Jul 5 23:59:45 2020 UTC (3 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.144: +4 -4 lines
Diff to previous 1.144 (colored)

some language improvements; ok markus

Revision 1.144 / (download) - annotate - [select for diffs], Fri Apr 17 03:30:05 2020 UTC (4 years, 1 month ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_7_BASE, OPENBSD_6_7
Changes since 1.143: +6 -1 lines
Diff to previous 1.143 (colored)

make IgnoreRhosts a tri-state option: "yes" ignore rhosts/shosts,
"no" allow rhosts/shosts or (new) "shosts-only" to allow .shosts
files but not .rhosts. ok dtucker@

Revision 1.143 / (download) - annotate - [select for diffs], Fri Jan 31 22:42:45 2020 UTC (4 years, 3 months ago) by djm
Branch: MAIN
Changes since 1.142: +16 -4 lines
Diff to previous 1.142 (colored)

Add a sshd_config "Include" directive to allow inclusion of files.
This has sensible semantics wrt Match blocks and accepts glob(3)
patterns to specify the included files. Based on patch by Jakub
Jelen in bz2468; feedback and ok markus@

Revision 1.142 / (download) - annotate - [select for diffs], Sun Dec 15 18:57:30 2019 UTC (4 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.141: +2 -1 lines
Diff to previous 1.141 (colored)

allow security keys to act as host keys as well as user keys.

Previously we didn't do this because we didn't want to expose
the attack surface presented by USB and FIDO protocol handling,
but now that this is insulated behind ssh-sk-helper there is
less risk.

ok markus@

Revision 1.141 / (download) - annotate - [select for diffs], Mon Nov 25 00:52:46 2019 UTC (4 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.140: +5 -1 lines
Diff to previous 1.140 (colored)

Add a sshd_config PubkeyAuthOptions directive

This directive has a single valid option "no-touch-required" that
causes sshd to skip checking whether user presence was tested before
a security key signature was made (usually by the user touching the
key).

ok markus@

Revision 1.140 / (download) - annotate - [select for diffs], Thu Apr 18 18:56:16 2019 UTC (5 years ago) by dtucker
Branch: MAIN
CVS Tags: OPENBSD_6_6_BASE, OPENBSD_6_6
Changes since 1.139: +3 -1 lines
Diff to previous 1.139 (colored)

When running sshd -T, assume any attibute not provided by -C does not match,
which allows it to work when sshd_config contains a Match directive with or
without -C.  bz#2858, ok djm@

Revision 1.139 / (download) - annotate - [select for diffs], Sat Jan 19 21:37:48 2019 UTC (5 years, 3 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_5_BASE, OPENBSD_6_5
Changes since 1.138: +2 -2 lines
Diff to previous 1.138 (colored)

convert servconf.c to new packet API

with & ok markus@

Revision 1.138 / (download) - annotate - [select for diffs], Mon Nov 19 04:12:32 2018 UTC (5 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.137: +3 -2 lines
Diff to previous 1.137 (colored)

silence (to log level debug2) failure messages when loading the default
hostkeys. Hostkeys explicitly specified in the configuration or on
the command-line are still reported as errors, and failure to load at
least one host key remains a fatal error.

Based on patch from Dag-Erling Smørgrav via
https://github.com/openssh/openssh-portable/pull/103

ok markus@

Revision 1.137 / (download) - annotate - [select for diffs], Thu Sep 20 03:28:06 2018 UTC (5 years, 7 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_4_BASE, OPENBSD_6_4
Changes since 1.136: +3 -1 lines
Diff to previous 1.136 (colored)

Add sshd_config CASignatureAlgorithms option to allow control over
which signature algorithms a CA may use when signing certificates.
In particular, this allows a sshd to ban certificates signed with
RSA/SHA1.

ok markus@

Revision 1.136 / (download) - annotate - [select for diffs], Mon Jul 9 21:26:02 2018 UTC (5 years, 10 months ago) by markus
Branch: MAIN
Changes since 1.135: +3 -3 lines
Diff to previous 1.135 (colored)

sshd: switch loginmsg to sshbuf API; ok djm@

Revision 1.135 / (download) - annotate - [select for diffs], Tue Jul 3 10:59:35 2018 UTC (5 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.134: +3 -1 lines
Diff to previous 1.134 (colored)

allow sshd_config PermitUserEnvironment to accept a pattern-list of
whitelisted environment variable names in addition to yes|no.

bz#1800, feedback and ok markus@

Revision 1.134 / (download) - annotate - [select for diffs], Sat Jun 9 03:03:10 2018 UTC (5 years, 11 months ago) by djm
Branch: MAIN
Changes since 1.133: +3 -1 lines
Diff to previous 1.133 (colored)

add a SetEnv directive for sshd_config to allow an administrator to
explicitly specify environment variables set in sessions started by
sshd. These override the default environment and any variables set
by user configuration (PermitUserEnvironment, etc), but not the SSH_*
variables set by sshd itself.

ok markus@

Revision 1.133 / (download) - annotate - [select for diffs], Wed Jun 6 18:23:32 2018 UTC (5 years, 11 months ago) by djm
Branch: MAIN
Changes since 1.132: +4 -5 lines
Diff to previous 1.132 (colored)

permitlisten option for authorized_keys; ok markus@

Revision 1.132 / (download) - annotate - [select for diffs], Wed Jun 6 18:22:41 2018 UTC (5 years, 11 months ago) by djm
Branch: MAIN
Changes since 1.131: +7 -9 lines
Diff to previous 1.131 (colored)

Add a PermitListen directive to control which server-side addresses
may be listened on when the client requests remote forwarding (ssh -R).

This is the converse of the existing PermitOpen directive and this
includes some refactoring to share much of its implementation.

feedback and ok markus@

Revision 1.131 / (download) - annotate - [select for diffs], Fri Apr 13 03:57:26 2018 UTC (6 years, 1 month ago) by dtucker
Branch: MAIN
Changes since 1.130: +2 -1 lines
Diff to previous 1.130 (colored)

Defend against user enumeration timing attacks.
This establishes a minimum time for each failed authentication
attempt (5ms) and adds a per-user constant derived from a host
secret (0-4ms).  Based on work by joona.kannisto at tut.fi, ok
markus@ djm@.

Revision 1.130 / (download) - annotate - [select for diffs], Wed Oct 25 00:19:47 2017 UTC (6 years, 6 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_3_BASE, OPENBSD_6_3
Changes since 1.129: +2 -1 lines
Diff to previous 1.129 (colored)

add a "rdomain" criteria for the sshd_config Match keyword to allow
conditional configuration that depends on which rdomain(4) a connection
was recevied on. ok markus@

Revision 1.129 / (download) - annotate - [select for diffs], Wed Oct 25 00:17:08 2017 UTC (6 years, 6 months ago) by djm
Branch: MAIN
Changes since 1.128: +4 -1 lines
Diff to previous 1.128 (colored)

add sshd_config RDomain keyword to place sshd and the subsequent
user session (including the shell and any TCP/IP forwardings) into
the specified rdomain(4)

ok markus@

Revision 1.128 / (download) - annotate - [select for diffs], Wed Oct 25 00:15:35 2017 UTC (6 years, 6 months ago) by djm
Branch: MAIN
Changes since 1.127: +21 -4 lines
Diff to previous 1.127 (colored)

Add optional rdomain qualifier to sshd_config's ListenAddress option
to allow listening on a different rdomain(4), e.g.

ListenAddress 0.0.0.0 rdomain 4

Revision 1.127 / (download) - annotate - [select for diffs], Thu Oct 5 15:52:03 2017 UTC (6 years, 7 months ago) by djm
Branch: MAIN
Changes since 1.126: +24 -28 lines
Diff to previous 1.126 (colored)

replace statically-sized arrays in ServerOptions with dynamic ones
managed by xrecallocarray, removing some arbitrary (though large)
limits and saving a bit of memory; "much nicer" markus@

Revision 1.126 / (download) - annotate - [select for diffs], Mon Oct 2 19:33:20 2017 UTC (6 years, 7 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_2_BASE, OPENBSD_6_2
Changes since 1.125: +2 -2 lines
Diff to previous 1.125 (colored)

Fix PermitOpen crash; spotted by benno@, ok dtucker@ deraadt@

Revision 1.125 / (download) - annotate - [select for diffs], Tue Sep 12 06:32:07 2017 UTC (6 years, 8 months ago) by djm
Branch: MAIN
Changes since 1.124: +12 -2 lines
Diff to previous 1.124 (colored)

refactor channels.c

Move static state to a "struct ssh_channels" that is allocated at
runtime and tracked as a member of struct ssh.

Explicitly pass "struct ssh" to all channels functions.

Replace use of the legacy packet APIs in channels.c.

Rework sshd_config PermitOpen handling: previously the configuration
parser would call directly into the channels layer. After the refactor
this is not possible, as the channels structures are allocated at
connection time and aren't available when the configuration is parsed.
The server config parser now tracks PermitOpen itself and explicitly
configures the channels code later.

ok markus@

Revision 1.124 / (download) - annotate - [select for diffs], Sat Jun 24 06:34:38 2017 UTC (6 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.123: +2 -1 lines
Diff to previous 1.123 (colored)

refactor authentication logging

optionally record successful auth methods and public credentials
used in a file accessible to user sessions

feedback and ok markus@

Revision 1.123 / (download) - annotate - [select for diffs], Wed Nov 30 03:00:05 2016 UTC (7 years, 5 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_1_BASE, OPENBSD_6_1
Changes since 1.122: +2 -1 lines
Diff to previous 1.122 (colored)

Add a sshd_config DisableForwaring option that disables X11, agent,
TCP, tunnel and Unix domain socket forwarding, as well as anything
else we might implement in the future.

This, like the 'restrict' authorized_keys flag, is intended to be a
simple and future-proof way of restricting an account. Suggested as
a complement to 'restrict' by Jann Horn; ok markus@

Revision 1.122 / (download) - annotate - [select for diffs], Fri Aug 19 03:18:06 2016 UTC (7 years, 8 months ago) by djm
Branch: MAIN
Changes since 1.121: +1 -2 lines
Diff to previous 1.121 (colored)

remove UseLogin option and support for having /bin/login manage
login sessions; ok deraadt markus dtucker

Revision 1.121 / (download) - annotate - [select for diffs], Mon Aug 15 12:27:56 2016 UTC (7 years, 9 months ago) by naddy
Branch: MAIN
Changes since 1.120: +1 -7 lines
Diff to previous 1.120 (colored)

Remove more SSH1 server code:
* Drop sshd's -k option.
* Retire configuration keywords that only apply to protocol 1, as well as
  the "protocol" keyword.
* Remove some related vestiges of protocol 1 support.

ok markus@

Revision 1.120 / (download) - annotate - [select for diffs], Fri Jul 10 06:21:53 2015 UTC (8 years, 10 months ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_6_0_BASE, OPENBSD_6_0, OPENBSD_5_9_BASE, OPENBSD_5_9, OPENBSD_5_8_BASE, OPENBSD_5_8
Changes since 1.119: +2 -1 lines
Diff to previous 1.119 (colored)

Turn off DSA by default; add HostKeyAlgorithms to the server and
PubkeyAcceptedKeyTypes to the client side, so it still can be
tested or turned back on; feedback and ok djm@

Revision 1.119 / (download) - annotate - [select for diffs], Fri May 22 03:50:02 2015 UTC (8 years, 11 months ago) by djm
Branch: MAIN
Changes since 1.118: +2 -1 lines
Diff to previous 1.118 (colored)

add knob to relax GSSAPI host credential check for multihomed hosts
bz#928, patch by Simon Wilkinson; ok dtucker
(kerberos/GSSAPI is not compiled by default on OpenBSD)

Revision 1.118 / (download) - annotate - [select for diffs], Thu May 21 06:43:31 2015 UTC (8 years, 11 months ago) by djm
Branch: MAIN
Changes since 1.117: +7 -3 lines
Diff to previous 1.117 (colored)

add AuthorizedPrincipalsCommand that allows getting authorized_principals
from a subprocess rather than a file, which is quite useful in
deployments with large userbases

feedback and ok markus@

Revision 1.117 / (download) - annotate - [select for diffs], Wed Apr 29 03:48:56 2015 UTC (9 years ago) by dtucker
Branch: MAIN
Changes since 1.116: +4 -2 lines
Diff to previous 1.116 (colored)

Allow ListenAddress, Port and AddressFamily in any order.  bz#68,
ok djm@, jmc@ (for the man page bit).

Revision 1.116 / (download) - annotate - [select for diffs], Tue Jan 13 07:39:19 2015 UTC (9 years, 4 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_5_7_BASE, OPENBSD_5_7
Changes since 1.115: +5 -1 lines
Diff to previous 1.115 (colored)

add sshd_config HostbasedAcceptedKeyTypes and PubkeyAcceptedKeyTypes
options to allow sshd to control what public key types will be
accepted. Currently defaults to all. Feedback & ok markus@

Revision 1.115 / (download) - annotate - [select for diffs], Sun Dec 21 22:27:56 2014 UTC (9 years, 4 months ago) by djm
Branch: MAIN
Changes since 1.114: +3 -1 lines
Diff to previous 1.114 (colored)

Add FingerprintHash option to control algorithm used for key
fingerprints. Default changes from MD5 to SHA256 and format
from hex to base64.

Feedback and ok naddy@ markus@

Revision 1.114 / (download) - annotate - [select for diffs], Tue Jul 15 15:54:14 2014 UTC (9 years, 10 months ago) by millert
Branch: MAIN
CVS Tags: OPENBSD_5_6_BASE, OPENBSD_5_6
Changes since 1.113: +3 -2 lines
Diff to previous 1.113 (colored)

Add support for Unix domain socket forwarding.  A remote TCP port
may be forwarded to a local Unix domain socket and vice versa or
both ends may be a Unix domain socket.  This is a reimplementation
of the streamlocal patches by William Ahern from:
    http://www.25thandclement.com/~william/projects/streamlocal.html
OK djm@ markus@

Revision 1.113 / (download) - annotate - [select for diffs], Thu Jul 3 22:40:43 2014 UTC (9 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.112: +2 -1 lines
Diff to previous 1.112 (colored)

Add a sshd_config PermitUserRC option to control whether ~/.ssh/rc is
executed, mirroring the no-user-rc authorized_keys option;
bz#2160; ok markus@

Revision 1.112 / (download) - annotate - [select for diffs], Wed Jan 29 06:18:35 2014 UTC (10 years, 3 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_5_5_BASE, OPENBSD_5_5
Changes since 1.111: +1 -3 lines
Diff to previous 1.111 (colored)

remove experimental, never-enabled JPAKE code; ok markus@

Revision 1.111 / (download) - annotate - [select for diffs], Thu Dec 5 01:16:41 2013 UTC (10 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.110: +4 -1 lines
Diff to previous 1.110 (colored)

bz#2161 - fix AuthorizedKeysCommand inside a Match block and
rearrange things so the same error is harder to make next time;
with and ok dtucker@

Revision 1.110 / (download) - annotate - [select for diffs], Tue Oct 29 09:48:02 2013 UTC (10 years, 6 months ago) by djm
Branch: MAIN
Changes since 1.109: +2 -1 lines
Diff to previous 1.109 (colored)

shd_config PermitTTY to disallow TTY allocation, mirroring the
longstanding no-pty authorized_keys option;
bz#2070, patch from Teran McKinney; ok markus@

Revision 1.109 / (download) - annotate - [select for diffs], Fri Jul 19 07:37:48 2013 UTC (10 years, 10 months ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_5_4_BASE, OPENBSD_5_4
Changes since 1.108: +2 -1 lines
Diff to previous 1.108 (colored)

add ssh-agent(1) support to sshd(8); allows encrypted hostkeys,
or hostkeys on smartcards; most of the work by Zev Weiss; bz #1974
ok djm@

Revision 1.108 / (download) - annotate - [select for diffs], Thu May 16 04:09:14 2013 UTC (11 years ago) by dtucker
Branch: MAIN
Changes since 1.107: +4 -1 lines
Diff to previous 1.107 (colored)

Add RekeyLimit to sshd with the same syntax as the client allowing rekeying
based on traffic volume or time.  ok djm@, help & ok jmc@ for the man page.

Revision 1.107 / (download) - annotate - [select for diffs], Thu Jan 3 05:49:36 2013 UTC (11 years, 4 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_5_3_BASE, OPENBSD_5_3
Changes since 1.106: +3 -1 lines
Diff to previous 1.106 (colored)

add a couple of ServerOptions members that should be copied to the privsep
child (for consistency, in this case they happen only to be accessed in the
monitor); ok dtucker@

Revision 1.106 / (download) - annotate - [select for diffs], Sun Dec 2 20:46:11 2012 UTC (11 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.105: +8 -2 lines
Diff to previous 1.105 (colored)

make AllowTcpForwarding accept "local" and "remote" in addition to its
current "yes"/"no" to allow the server to specify whether just local or
remote TCP forwarding is enabled. ok markus@

Revision 1.105 / (download) - annotate - [select for diffs], Sun Nov 4 11:09:15 2012 UTC (11 years, 6 months ago) by djm
Branch: MAIN
Changes since 1.104: +6 -1 lines
Diff to previous 1.104 (colored)

Support multiple required authentication via an AuthenticationMethods
option. This option lists one or more comma-separated lists of
authentication method names. Successful completion of all the methods in
any list is required for authentication to complete;
feedback and ok markus@

Revision 1.104 / (download) - annotate - [select for diffs], Tue Oct 30 21:29:55 2012 UTC (11 years, 6 months ago) by djm
Branch: MAIN
Changes since 1.103: +3 -1 lines
Diff to previous 1.103 (colored)

new sshd_config option AuthorizedKeysCommand to support fetching
authorized_keys from a command in addition to (or instead of) from
the filesystem. The command is run as the target server user unless
another specified via a new AuthorizedKeysCommandUser option.

patch originally by jchadima AT redhat.com, reworked by me; feedback
and ok markus@

Revision 1.103 / (download) - annotate - [select for diffs], Tue Jul 10 02:19:15 2012 UTC (11 years, 10 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_5_2_BASE, OPENBSD_5_2
Changes since 1.102: +2 -2 lines
Diff to previous 1.102 (colored)

Turn on systrace sandboxing of pre-auth sshd by default for new installs
by shipping a config that overrides the current UsePrivilegeSeparation=yes
default. Make it easier to flip the default in the future by adding too.
prodded markus@ feedback dtucker@ "get it in" deraadt@

Revision 1.102 / (download) - annotate - [select for diffs], Tue Jun 19 18:25:28 2012 UTC (11 years, 10 months ago) by markus
Branch: MAIN
Changes since 1.101: +6 -1 lines
Diff to previous 1.101 (colored)

sshd_config: extend Match to allow AcceptEnv and {Allow,Deny}{Users,Groups}
this allows 'Match LocalPort 1022' combined with 'AllowUser bauer'
ok djm@ (back in March)

Revision 1.101 / (download) - annotate - [select for diffs], Sun May 13 01:42:32 2012 UTC (12 years ago) by dtucker
Branch: MAIN
Changes since 1.100: +17 -5 lines
Diff to previous 1.100 (colored)

Add "Match LocalAddress" and "Match LocalPort" to sshd and adjust tests
to match.  Feedback and ok djm@ markus@.

Revision 1.100 / (download) - annotate - [select for diffs], Thu Apr 12 02:42:32 2012 UTC (12 years, 1 month ago) by djm
Branch: MAIN
Changes since 1.99: +3 -1 lines
Diff to previous 1.99 (colored)

VersionAddendum option to allow server operators to append some arbitrary
text to the SSH-... banner; ok deraadt@ "don't care" markus@

Revision 1.99 / (download) - annotate - [select for diffs], Wed Jun 22 21:57:01 2011 UTC (12 years, 10 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_5_1_BASE, OPENBSD_5_1, OPENBSD_5_0_BASE, OPENBSD_5_0
Changes since 1.98: +6 -1 lines
Diff to previous 1.98 (colored)

introduce sandboxing of the pre-auth privsep child using systrace(4).

This introduces a new "UsePrivilegeSeparation=sandbox" option for
sshd_config that applies mandatory restrictions on the syscalls the
privsep child can perform. This prevents a compromised privsep child
from being used to attack other hosts (by opening sockets and proxying)
or probing local kernel attack surface.

The sandbox is implemented using systrace(4) in unsupervised "fast-path"
mode, where a list of permitted syscalls is supplied. Any syscall not
on the list results in SIGKILL being sent to the privsep child. Note
that this requires a kernel with the new SYSTR_POLICY_KILL option.

UsePrivilegeSeparation=sandbox will become the default in the future
so please start testing it now.

feedback dtucker@; ok markus@

Revision 1.98 / (download) - annotate - [select for diffs], Mon May 23 03:30:07 2011 UTC (12 years, 11 months ago) by djm
Branch: MAIN
Changes since 1.97: +5 -3 lines
Diff to previous 1.97 (colored)

allow AuthorizedKeysFile to specify multiple files, separated by spaces.
Bring back authorized_keys2 as a default search path (to avoid breaking
existing users of this file), but override this in sshd_config so it will
be no longer used on fresh installs. Maybe in 2015 we can remove it
entierly :)

feedback and ok markus@ dtucker@

Revision 1.97 / (download) - annotate - [select for diffs], Fri May 20 03:25:45 2011 UTC (13 years ago) by djm
Branch: MAIN
Changes since 1.96: +15 -1 lines
Diff to previous 1.96 (colored)

use a macro to define which string options to copy between configs
for Match. This avoids problems caused by forgetting to keep three
code locations in perfect sync and ordering

"this is at once beautiful and horrible" + ok dtucker@

Revision 1.96 / (download) - annotate - [select for diffs], Wed May 11 04:47:06 2011 UTC (13 years ago) by djm
Branch: MAIN
Changes since 1.95: +1 -2 lines
Diff to previous 1.95 (colored)

remove support for authorized_keys2; it is a relic from the early days
of protocol v.2 support and has been undocumented for many years;
ok markus@

Revision 1.95 / (download) - annotate - [select for diffs], Sat Nov 13 23:27:50 2010 UTC (13 years, 6 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_4_9_BASE, OPENBSD_4_9
Changes since 1.94: +3 -1 lines
Diff to previous 1.94 (colored)

allow ssh and sshd to set arbitrary TOS/DSCP/QoS values instead of
hardcoding lowdelay/throughput.

bz#1733 patch from philipp AT redfish-solutions.com; ok markus@ deraadt@

Revision 1.94 / (download) - annotate - [select for diffs], Wed Sep 22 05:01:29 2010 UTC (13 years, 7 months ago) by djm
Branch: MAIN
Changes since 1.93: +2 -1 lines
Diff to previous 1.93 (colored)

add a KexAlgorithms knob to the client and server configuration to allow
selection of which key exchange methods are used by ssh(1) and sshd(8)
and their order of preference.

ok markus@

Revision 1.93 / (download) - annotate - [select for diffs], Fri May 7 11:30:30 2010 UTC (14 years ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_4_8_BASE, OPENBSD_4_8
Changes since 1.92: +2 -1 lines
Diff to previous 1.92 (colored)

add some optional indirection to matching of principal names listed
in certificates. Currently, a certificate must include the a user's name
to be accepted for authentication. This change adds the ability to
specify a list of certificate principal names that are acceptable.

When authenticating using a CA trusted through ~/.ssh/authorized_keys,
this adds a new principals="name1[,name2,...]" key option.

For CAs listed through sshd_config's TrustedCAKeys option, a new config
option "AuthorizedPrincipalsFile" specifies a per-user file containing
the list of acceptable names.

If either option is absent, the current behaviour of requiring the
username to appear in principals continues to apply.

These options are useful for role accounts, disjoint account namespaces
and "user@realm"-style naming policies in certificates.

feedback and ok markus@

Revision 1.92 / (download) - annotate - [select for diffs], Thu Mar 4 10:36:03 2010 UTC (14 years, 2 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_4_7_BASE, OPENBSD_4_7
Changes since 1.91: +3 -1 lines
Diff to previous 1.91 (colored)

Add a TrustedUserCAKeys option to sshd_config to specify CA keys that
are trusted to authenticate users (in addition than doing it per-user
in authorized_keys).

Add a RevokedKeys option to sshd_config and a @revoked marker to
known_hosts to allow keys to me revoked and banned for user or host
authentication.

feedback and ok markus@

Revision 1.91 / (download) - annotate - [select for diffs], Fri Feb 26 20:29:54 2010 UTC (14 years, 2 months ago) by djm
Branch: MAIN
Changes since 1.90: +4 -1 lines
Diff to previous 1.90 (colored)

Add support for certificate key types for users and hosts.

OpenSSH certificate key types are not X.509 certificates, but a much
simpler format that encodes a public key, identity information and
some validity constraints and signs it with a CA key. CA keys are
regular SSH keys. This certificate style avoids the attack surface
of X.509 certificates and is very easy to deploy.

Certified host keys allow automatic acceptance of new host keys
when a CA certificate is marked as trusted in ~/.ssh/known_hosts.
see VERIFYING HOST KEYS in ssh(1) for details.

Certified user keys allow authentication of users when the signing
CA key is marked as trusted in authorized_keys. See "AUTHORIZED_KEYS
FILE FORMAT" in sshd(8) for details.

Certificates are minted using ssh-keygen(1), documentation is in
the "CERTIFICATES" section of that manpage.

Documentation on the format of certificates is in the file
PROTOCOL.certkeys

feedback and ok markus@

Revision 1.90 / (download) - annotate - [select for diffs], Wed Jan 13 03:48:13 2010 UTC (14 years, 4 months ago) by djm
Branch: MAIN
Changes since 1.89: +2 -1 lines
Diff to previous 1.89 (colored)

avoid run-time failures when specifying hostkeys via a relative
path by prepending the cwd in these cases; bz#1290; ok dtucker@

Revision 1.89 / (download) - annotate - [select for diffs], Sat Jan 9 23:04:13 2010 UTC (14 years, 4 months ago) by dtucker
Branch: MAIN
Changes since 1.88: +0 -2 lines
Diff to previous 1.88 (colored)

Remove RoutingDomain from ssh since it's now not needed.  It can be replaced
with "route exec" or "nc -V" as a proxycommand.  "route exec" also ensures
that trafic such as DNS lookups stays withing the specified routingdomain.

For example (from reyk):
# route -T 2 exec /usr/sbin/sshd
or inherited from the parent process
$ route -T 2 exec sh
$ ssh 10.1.2.3

ok deraadt@ markus@ stevesk@ reyk@

Revision 1.88 / (download) - annotate - [select for diffs], Wed Oct 28 16:38:18 2009 UTC (14 years, 6 months ago) by reyk
Branch: MAIN
Changes since 1.87: +3 -1 lines
Diff to previous 1.87 (colored)

Allow to set the rdomain in ssh/sftp/scp/sshd and ssh-keyscan.

ok markus@

Revision 1.87 / (download) - annotate - [select for diffs], Thu Jan 22 10:02:34 2009 UTC (15 years, 3 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_4_6_BASE, OPENBSD_4_6, OPENBSD_4_5_BASE, OPENBSD_4_5
Changes since 1.86: +4 -4 lines
Diff to previous 1.86 (colored)

make a2port() return -1 when it encounters an invalid port number
rather than 0, which it will now treat as valid (needed for future work)

adjust current consumers of a2port() to check its return value is <= 0,
which in turn required some things to be converted from u_short => int

make use of int vs. u_short consistent in some other places too

feedback & ok markus@

Revision 1.86 / (download) - annotate - [select for diffs], Tue Nov 4 08:22:13 2008 UTC (15 years, 6 months ago) by djm
Branch: MAIN
Changes since 1.85: +3 -1 lines
Diff to previous 1.85 (colored)

Add support for an experimental zero-knowledge password authentication
method using the J-PAKE protocol described in F. Hao, P. Ryan,
"Password Authenticated Key Exchange by Juggling", 16th Workshop on
Security Protocols, Cambridge, April 2008.

This method allows password-based authentication without exposing
the password to the server. Instead, the client and server exchange
cryptographic proofs to demonstrate of knowledge of the password while
revealing nothing useful to an attacker or compromised endpoint.

This is experimental, work-in-progress code and is presently
compiled-time disabled (turn on -DJPAKE in Makefile.inc).

"just commit it.  It isn't too intrusive." deraadt@

Revision 1.85 / (download) - annotate - [select for diffs], Tue Jun 10 04:50:25 2008 UTC (15 years, 11 months ago) by dtucker
Branch: MAIN
CVS Tags: OPENBSD_4_4_BASE, OPENBSD_4_4
Changes since 1.84: +2 -1 lines
Diff to previous 1.84 (colored)

Add extended test mode (-T) and connection parameters for test mode (-C).
-T causes sshd to write its effective configuration to stdout and exit.
-C causes any relevant Match rules to be applied before output.  The
combination allows tesing of the parser and config files.  ok deraadt djm

Revision 1.84 / (download) - annotate - [select for diffs], Thu May 8 12:21:16 2008 UTC (16 years ago) by djm
Branch: MAIN
Changes since 1.83: +3 -1 lines
Diff to previous 1.83 (colored)

Make the maximum number of sessions run-time controllable via
a sshd_config MaxSessions knob. This is useful for disabling
login/shell/subsystem access while leaving port-forwarding working
(MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or
simply increasing the number of allows multiplexed sessions.

Because some bozos are sure to configure MaxSessions in excess of the
number of available file descriptors in sshd (which, at peak, might be
as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds
on error paths, and make it fail gracefully on out-of-fd conditions -
sending channel errors instead of than exiting with fatal().

bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com

ok markus@

Revision 1.83 / (download) - annotate - [select for diffs], Wed May 7 05:49:37 2008 UTC (16 years ago) by pyr
Branch: MAIN
Changes since 1.82: +2 -1 lines
Diff to previous 1.82 (colored)

Enable the AllowAgentForwarding option in sshd_config (global and match
context), to specify if agents should be permitted on the server.
As the man page states:

``Note that disabling Agent forwarding does not improve security
unless users are also denied shell access, as they can always install
their own forwarders.''

ok djm@, ok and a mild frown markus@

Revision 1.82 / (download) - annotate - [select for diffs], Wed Feb 13 22:38:17 2008 UTC (16 years, 3 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_4_3_BASE, OPENBSD_4_3
Changes since 1.81: +4 -1 lines
Diff to previous 1.81 (colored)

rekey arc4random and OpenSSL RNG in postauth child
closefrom fds > 2 before shell/command execution
ok markus@

Revision 1.81 / (download) - annotate - [select for diffs], Fri Feb 8 23:24:08 2008 UTC (16 years, 3 months ago) by djm
Branch: MAIN
Changes since 1.80: +3 -1 lines
Diff to previous 1.80 (colored)

add sshd_config ChrootDirectory option to chroot(2) users to a directory and
tweak internal sftp server to work with it (no special files in chroot
required). ok markus@

Revision 1.80 / (download) - annotate - [select for diffs], Mon Feb 19 10:45:58 2007 UTC (17 years, 3 months ago) by dtucker
Branch: MAIN
CVS Tags: OPENBSD_4_2_BASE, OPENBSD_4_2, OPENBSD_4_1_BASE, OPENBSD_4_1
Changes since 1.79: +2 -2 lines
Diff to previous 1.79 (colored)

Teach Match how handle config directives that are used before authentication.
This allows configurations such as permitting password authentication from
the local net only while requiring pubkey from offsite.  ok djm@, man page
bits ok jmc@

Revision 1.71.4.2 / (download) - annotate - [select for diffs], Fri Oct 6 03:19:33 2006 UTC (17 years, 7 months ago) by brad
Branch: OPENBSD_3_8
Changes since 1.71.4.1: +14 -5 lines
Diff to previous 1.71.4.1 (colored) to branchpoint 1.71 (colored) next main 1.72 (colored)

upgrade to OpenSSH 4.4

Revision 1.72.2.1 / (download) - annotate - [select for diffs], Sat Sep 30 04:06:51 2006 UTC (17 years, 7 months ago) by brad
Branch: OPENBSD_3_9
Changes since 1.72: +14 -5 lines
Diff to previous 1.72 (colored) next main 1.73 (colored)

upgrade to OpenSSH 4.4

Revision 1.79 / (download) - annotate - [select for diffs], Mon Aug 14 12:40:25 2006 UTC (17 years, 9 months ago) by dtucker
Branch: MAIN
CVS Tags: OPENBSD_4_0_BASE, OPENBSD_4_0
Changes since 1.78: +2 -1 lines
Diff to previous 1.78 (colored)

Add ability to match groups to Match keyword in sshd_config.  Feedback djm@,
stevesk@, ok stevesk@.

Revision 1.78 / (download) - annotate - [select for diffs], Thu Aug 3 03:34:42 2006 UTC (17 years, 9 months ago) by deraadt
Branch: MAIN
Changes since 1.77: +1 -3 lines
Diff to previous 1.77 (colored)

almost entirely get rid of the culture of ".h files that include .h files"
ok djm, sort of ok stevesk
makes the pain stop in one easy step

Revision 1.77 / (download) - annotate - [select for diffs], Fri Jul 21 12:43:36 2006 UTC (17 years, 10 months ago) by dtucker
Branch: MAIN
Changes since 1.76: +3 -1 lines
Diff to previous 1.76 (colored)

Make PermitOpen take a list of permitted ports and act more like most other
keywords (ie the first match is the effective setting).  This also makes it
easier to override a previously set PermitOpen.  ok djm@

Revision 1.76 / (download) - annotate - [select for diffs], Wed Jul 19 13:07:10 2006 UTC (17 years, 10 months ago) by dtucker
Branch: MAIN
Changes since 1.75: +3 -1 lines
Diff to previous 1.75 (colored)

Add ForceCommand keyword to sshd_config, equivalent to the "command="
key option, man page entry and example in sshd_config.  Feedback & ok djm@,
man page corrections & ok jmc@

Revision 1.75 / (download) - annotate - [select for diffs], Wed Jul 12 11:34:58 2006 UTC (17 years, 10 months ago) by dtucker
Branch: MAIN
Changes since 1.74: +8 -3 lines
Diff to previous 1.74 (colored)

Add support for conditional directives to sshd_config via a "Match" keyword,
which works similarly to the "Host" directive in ssh_config.

Lines after a Match line override the default set in the main section
if the condition on the Match line is true, eg

AllowTcpForwarding yes
Match User anoncvs
        AllowTcpForwarding no

will allow port forwarding by all users except "anoncvs".

Currently only a very small subset of directives are supported.

ok djm@

Revision 1.74 / (download) - annotate - [select for diffs], Thu Jul 6 10:47:05 2006 UTC (17 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.73: +2 -1 lines
Diff to previous 1.73 (colored)

support arguments to Subsystem commands; ok markus@

Revision 1.73 / (download) - annotate - [select for diffs], Sat Mar 25 22:22:43 2006 UTC (18 years, 1 month ago) by djm
Branch: MAIN
Changes since 1.72: +1 -1 lines
Diff to previous 1.72 (colored)

standardise spacing in $OpenBSD$ tags; requested by deraadt@

Revision 1.71.4.1 / (download) - annotate - [select for diffs], Fri Feb 3 03:01:57 2006 UTC (18 years, 3 months ago) by brad
Branch: OPENBSD_3_8
Changes since 1.71: +3 -1 lines
Diff to previous 1.71 (colored)

upgrade to OpenSSH 4.3

Revision 1.71.2.1 / (download) - annotate - [select for diffs], Fri Feb 3 02:53:45 2006 UTC (18 years, 3 months ago) by brad
Branch: OPENBSD_3_7
Changes since 1.71: +3 -1 lines
Diff to previous 1.71 (colored) next main 1.72 (colored)

upgrade to OpenSSH 4.3

Revision 1.72 / (download) - annotate - [select for diffs], Tue Dec 6 22:38:27 2005 UTC (18 years, 5 months ago) by reyk
Branch: MAIN
CVS Tags: OPENBSD_3_9_BASE
Branch point for: OPENBSD_3_9
Changes since 1.71: +3 -1 lines
Diff to previous 1.71 (colored)

Add support for tun(4) forwarding over OpenSSH, based on an idea and
initial channel code bits by markus@. This is a simple and easy way to
use OpenSSH for ad hoc virtual private network connections, e.g.
administrative tunnels or secure wireless access. It's based on a new
ssh channel and works similar to the existing TCP forwarding support,
except that it depends on the tun(4) network interface on both ends of
the connection for layer 2 or layer 3 tunneling. This diff also adds
support for LocalCommand in the ssh(1) client.

ok djm@, markus@, jmc@ (manpages), tested and discussed with others

Revision 1.67.2.2 / (download) - annotate - [select for diffs], Thu Mar 10 17:15:04 2005 UTC (19 years, 2 months ago) by brad
Branch: OPENBSD_3_5
Changes since 1.67.2.1: +2 -1 lines
Diff to previous 1.67.2.1 (colored) to branchpoint 1.67 (colored) next main 1.68 (colored)

upgrade to OpenSSH 4.0

Revision 1.70.2.1 / (download) - annotate - [select for diffs], Thu Mar 10 16:28:27 2005 UTC (19 years, 2 months ago) by brad
Branch: OPENBSD_3_6
Changes since 1.70: +2 -1 lines
Diff to previous 1.70 (colored) next main 1.71 (colored)

upgrade to OpenSSH 4.0

Revision 1.71 / (download) - annotate - [select for diffs], Thu Dec 23 23:11:00 2004 UTC (19 years, 4 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_3_8_BASE, OPENBSD_3_7_BASE
Branch point for: OPENBSD_3_8, OPENBSD_3_7
Changes since 1.70: +2 -1 lines
Diff to previous 1.70 (colored)

bz #898: support AddressFamily in sshd_config. from peak@argo.troja.mff.cuni.cz
ok deraadt@

Revision 1.65.2.2 / (download) - annotate - [select for diffs], Thu Aug 19 22:37:32 2004 UTC (19 years, 9 months ago) by brad
Branch: OPENBSD_3_4
Changes since 1.65.2.1: +11 -3 lines
Diff to previous 1.65.2.1 (colored) to branchpoint 1.65 (colored) next main 1.66 (colored)

upgrade to OpenSSH 3.9

Revision 1.67.2.1 / (download) - annotate - [select for diffs], Thu Aug 19 04:13:27 2004 UTC (19 years, 9 months ago) by brad
Branch: OPENBSD_3_5
Changes since 1.67: +11 -3 lines
Diff to previous 1.67 (colored)

upgrade to OpenSSH 3.9

Revision 1.70 / (download) - annotate - [select for diffs], Thu Jun 24 19:30:54 2004 UTC (19 years, 10 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_3_6_BASE
Branch point for: OPENBSD_3_6
Changes since 1.69: +5 -3 lines
Diff to previous 1.69 (colored)

re-exec sshd on accept(); initial work, final debugging and ok markus@

Revision 1.69 / (download) - annotate - [select for diffs], Sun May 23 23:59:53 2004 UTC (19 years, 11 months ago) by dtucker
Branch: MAIN
Changes since 1.68: +3 -1 lines
Diff to previous 1.68 (colored)

Add MaxAuthTries sshd config option; ok markus@

Revision 1.68 / (download) - annotate - [select for diffs], Tue Apr 27 09:46:37 2004 UTC (20 years ago) by djm
Branch: MAIN
Changes since 1.67: +5 -1 lines
Diff to previous 1.67 (colored)

bz #815: implement ability to pass specified environment variables from the
client to the server; ok markus@

Revision 1.59.4.2 / (download) - annotate - [select for diffs], Thu Mar 4 18:18:16 2004 UTC (20 years, 2 months ago) by brad
Branch: OPENBSD_3_3
Changes since 1.59.4.1: +4 -2 lines
Diff to previous 1.59.4.1 (colored) to branchpoint 1.59 (colored) next main 1.60 (colored)

upgrade to OpenSSH 3.8upgrade to OpenSSH 3.8upgrade to OpenSSH 3.8

Revision 1.65.2.1 / (download) - annotate - [select for diffs], Sat Feb 28 03:51:33 2004 UTC (20 years, 2 months ago) by brad
Branch: OPENBSD_3_4
Changes since 1.65: +4 -2 lines
Diff to previous 1.65 (colored)

upgrade to OpenSSH 3.8

Revision 1.67 / (download) - annotate - [select for diffs], Tue Dec 23 16:12:10 2003 UTC (20 years, 4 months ago) by jakob
Branch: MAIN
CVS Tags: OPENBSD_3_5_BASE
Branch point for: OPENBSD_3_5
Changes since 1.66: +3 -1 lines
Diff to previous 1.66 (colored)

implement KerberosGetAFSToken server option. ok markus@, beck@

Revision 1.66 / (download) - annotate - [select for diffs], Tue Dec 9 21:53:37 2003 UTC (20 years, 5 months ago) by markus
Branch: MAIN
Changes since 1.65: +2 -2 lines
Diff to previous 1.65 (colored)

rename keepalive to tcpkeepalive; the old name causes too much
confusion; ok djm, dtucker; with help from jmc@

Revision 1.59.2.1 / (download) - annotate - [select for diffs], Tue Sep 16 21:20:27 2003 UTC (20 years, 8 months ago) by brad
Branch: OPENBSD_3_2
Changes since 1.59: +4 -13 lines
Diff to previous 1.59 (colored) next main 1.60 (colored)

upgrade to OpenSSH 3.7

Revision 1.59.4.1 / (download) - annotate - [select for diffs], Tue Sep 16 20:50:43 2003 UTC (20 years, 8 months ago) by brad
Branch: OPENBSD_3_3
Changes since 1.59: +4 -13 lines
Diff to previous 1.59 (colored)

upgrade to OpenSSH 3.7

Revision 1.65 / (download) - annotate - [select for diffs], Mon Sep 1 18:15:50 2003 UTC (20 years, 8 months ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_3_4_BASE
Branch point for: OPENBSD_3_4
Changes since 1.64: +1 -3 lines
Diff to previous 1.64 (colored)

remove unused kerberos code; ok henning@

Revision 1.64 / (download) - annotate - [select for diffs], Fri Aug 22 10:56:09 2003 UTC (20 years, 8 months ago) by markus
Branch: MAIN
Changes since 1.63: +3 -1 lines
Diff to previous 1.63 (colored)

support GSS API user authentication; patches from Simon Wilkinson,
stripped down and tested by Jakob and myself.

Revision 1.63 / (download) - annotate - [select for diffs], Wed Aug 13 08:46:30 2003 UTC (20 years, 9 months ago) by markus
Branch: MAIN
Changes since 1.62: +1 -3 lines
Diff to previous 1.62 (colored)

remove RhostsAuthentication; suggested by djm@ before; ok djm@, deraadt@,
fgsch@, miod@, henning@, jakob@ and others

Revision 1.62 / (download) - annotate - [select for diffs], Tue Jul 22 13:35:22 2003 UTC (20 years, 10 months ago) by markus
Branch: MAIN
Changes since 1.61: +1 -2 lines
Diff to previous 1.61 (colored)

remove (already disabled) KRB4/AFS support, re-enable -k in ssh(1);
test+ok henning@

Revision 1.61 / (download) - annotate - [select for diffs], Mon Jun 2 09:17:34 2003 UTC (20 years, 11 months ago) by markus
Branch: MAIN
Changes since 1.60: +2 -2 lines
Diff to previous 1.60 (colored)

deprecate VerifyReverseMapping since it's dangerous if combined
with IP based access control as noted by Mike Harding; replace with
a UseDNS option, UseDNS is on by default and includes the
VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
ok deraadt@, djm@

Revision 1.60 / (download) - annotate - [select for diffs], Thu May 15 01:48:10 2003 UTC (21 years ago) by jakob
Branch: MAIN
Changes since 1.59: +1 -7 lines
Diff to previous 1.59 (colored)

always parse kerberos options. ok djm@ markus@

Revision 1.49.2.4 / (download) - annotate - [select for diffs], Fri Oct 11 14:53:07 2002 UTC (21 years, 7 months ago) by miod
Branch: OPENBSD_3_0
Changes since 1.49.2.3: +2 -1 lines
Diff to previous 1.49.2.3 (colored) to branchpoint 1.49 (colored) next main 1.50 (colored)

Update to OpenSSH 3.5

Revision 1.57.2.2 / (download) - annotate - [select for diffs], Fri Oct 11 14:51:52 2002 UTC (21 years, 7 months ago) by miod
Branch: OPENBSD_3_1
Changes since 1.57.2.1: +2 -1 lines
Diff to previous 1.57.2.1 (colored) to branchpoint 1.57 (colored) next main 1.58 (colored)

Update to OpenSSH 3.5

Revision 1.59 / (download) - annotate - [select for diffs], Tue Jul 30 17:03:55 2002 UTC (21 years, 9 months ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_3_3_BASE, OPENBSD_3_2_BASE
Branch point for: OPENBSD_3_3, OPENBSD_3_2
Changes since 1.58: +2 -1 lines
Diff to previous 1.58 (colored)

add PermitUserEnvironment (off by default!); from dot@dotat.at; ok provos, deraadt

Revision 1.57.2.1 / (download) - annotate - [select for diffs], Wed Jun 26 15:30:38 2002 UTC (21 years, 10 months ago) by jason
Branch: OPENBSD_3_1
Changes since 1.57: +2 -1 lines
Diff to previous 1.57 (colored)

Pull in OpenSSH-3.4

Revision 1.49.2.3 / (download) - annotate - [select for diffs], Sat Jun 22 07:23:17 2002 UTC (21 years, 11 months ago) by miod
Branch: OPENBSD_3_0
Changes since 1.49.2.2: +2 -1 lines
Diff to previous 1.49.2.2 (colored) to branchpoint 1.49 (colored)

Update OpenSSH to version 3.3 (with local changes, configuration files still
living in /etc and privsep user being nobody).

Revision 1.58 / (download) - annotate - [select for diffs], Thu Jun 20 23:05:55 2002 UTC (21 years, 11 months ago) by markus
Branch: MAIN
Changes since 1.57: +2 -1 lines
Diff to previous 1.57 (colored)

allow Compression=yes/no in sshd_config

Revision 1.41.2.3 / (download) - annotate - [select for diffs], Sun Jun 2 22:56:10 2002 UTC (21 years, 11 months ago) by miod
Branch: OPENBSD_2_9
Changes since 1.41.2.2: +1 -2 lines
Diff to previous 1.41.2.2 (colored) to branchpoint 1.41 (colored) next main 1.42 (colored)

Upgrade to OpenSSH 3.2.3.

Except for improbable compilation error fixes, this should be the last
commit made to the 2.9-STABLE branche. Have fun upgrading.

Revision 1.49.2.2 / (download) - annotate - [select for diffs], Fri May 17 00:03:24 2002 UTC (22 years ago) by miod
Branch: OPENBSD_3_0
Changes since 1.49.2.1: +1 -2 lines
Diff to previous 1.49.2.1 (colored) to branchpoint 1.49 (colored)

Update OpenSSH to version 3.2.2.

Revision 1.57 / (download) - annotate - [select for diffs], Wed Mar 20 19:12:25 2002 UTC (22 years, 2 months ago) by stevesk
Branch: MAIN
CVS Tags: OPENBSD_3_1_BASE
Branch point for: OPENBSD_3_1
Changes since 1.56: +1 -4 lines
Diff to previous 1.56 (colored)

for unprivileged user, group do:
pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw).  ok provos@

Revision 1.56 / (download) - annotate - [select for diffs], Tue Mar 19 03:03:43 2002 UTC (22 years, 2 months ago) by stevesk
Branch: MAIN
Changes since 1.55: +1 -2 lines
Diff to previous 1.55 (colored)

_PATH_PRIVSEP_CHROOT_DIR; ok provos@

Revision 1.55 / (download) - annotate - [select for diffs], Mon Mar 18 17:50:31 2002 UTC (22 years, 2 months ago) by provos
Branch: MAIN
Changes since 1.54: +4 -1 lines
Diff to previous 1.54 (colored)

integrate privilege separated openssh; its turned off by default for now.
work done by me and markus@

Revision 1.41.2.2 / (download) - annotate - [select for diffs], Sat Mar 9 00:20:44 2002 UTC (22 years, 2 months ago) by miod
Branch: OPENBSD_2_9
Changes since 1.41.2.1: +9 -6 lines
Diff to previous 1.41.2.1 (colored) to branchpoint 1.41 (colored)

Merge OpenSSH 3.1, keeping /etc as configuration files directory.
(i.e. OpenSSH 3.1 + openbsd29_3.1.patch)

Revision 1.30.2.6 / (download) - annotate - [select for diffs], Fri Mar 8 17:04:43 2002 UTC (22 years, 2 months ago) by brad
Branch: OPENBSD_2_8
Changes since 1.30.2.5: +9 -6 lines
Diff to previous 1.30.2.5 (colored) to branchpoint 1.30 (colored) next main 1.31 (colored)

Merge OpenSSH 3.1.

Revision 1.49.2.1 / (download) - annotate - [select for diffs], Thu Mar 7 17:37:47 2002 UTC (22 years, 2 months ago) by jason
Branch: OPENBSD_3_0
Changes since 1.49: +9 -6 lines
Diff to previous 1.49 (colored)

Update to OpenSSH-3.1 on 3.0-stable branch

Revision 1.54 / (download) - annotate - [select for diffs], Mon Mar 4 17:27:39 2002 UTC (22 years, 2 months ago) by stevesk
Branch: MAIN
Changes since 1.53: +2 -2 lines
Diff to previous 1.53 (colored)

$OpenBSD$ and RCSID() cleanup: don't use RCSID() in .h files; add
missing RCSID() to .c files and remove dup /*$OpenBSD$*/ from .c
files.  ok markus@

Revision 1.53 / (download) - annotate - [select for diffs], Tue Jan 29 14:32:03 2002 UTC (22 years, 3 months ago) by markus
Branch: MAIN
Changes since 1.52: +2 -2 lines
Diff to previous 1.52 (colored)

s/ReverseMappingCheck/VerifyReverseMapping/ and avoid confusion; ok stevesk@

Revision 1.52 / (download) - annotate - [select for diffs], Sun Jan 27 14:57:46 2002 UTC (22 years, 3 months ago) by stevesk
Branch: MAIN
Changes since 1.51: +2 -1 lines
Diff to previous 1.51 (colored)

add X11UseLocalhost; ok markus@

Revision 1.51 / (download) - annotate - [select for diffs], Wed Dec 19 07:18:56 2001 UTC (22 years, 5 months ago) by deraadt
Branch: MAIN
Changes since 1.50: +4 -4 lines
Diff to previous 1.50 (colored)

basic KNF done while i was looking for something else

Revision 1.50 / (download) - annotate - [select for diffs], Thu Dec 6 13:30:05 2001 UTC (22 years, 5 months ago) by markus
Branch: MAIN
Changes since 1.49: +3 -1 lines
Diff to previous 1.49 (colored)

add -o to sshd, too. ok deraadt@

Revision 1.41.2.1 / (download) - annotate - [select for diffs], Thu Sep 27 19:03:55 2001 UTC (22 years, 7 months ago) by jason
Branch: OPENBSD_2_9
Changes since 1.41: +16 -22 lines
Diff to previous 1.41 (colored)

Pull in OpenSSH-2.9.9

Revision 1.30.2.5 / (download) - annotate - [select for diffs], Thu Sep 27 00:15:42 2001 UTC (22 years, 7 months ago) by miod
Branch: OPENBSD_2_8
Changes since 1.30.2.4: +16 -22 lines
Diff to previous 1.30.2.4 (colored) to branchpoint 1.30 (colored)

Pull in OpenSSH 2.9.9 to the 2.8 branch.

Revision 1.49 / (download) - annotate - [select for diffs], Fri Aug 17 18:59:47 2001 UTC (22 years, 9 months ago) by stevesk
Branch: MAIN
CVS Tags: OPENBSD_3_0_BASE
Branch point for: OPENBSD_3_0
Changes since 1.48: +4 -4 lines
Diff to previous 1.48 (colored)

typo in comment

Revision 1.48 / (download) - annotate - [select for diffs], Thu Aug 16 19:18:34 2001 UTC (22 years, 9 months ago) by jakob
Branch: MAIN
Changes since 1.47: +1 -2 lines
Diff to previous 1.47 (colored)

deprecate CheckMail. ok markus@
----------------------------------------------------------------------

Revision 1.47 / (download) - annotate - [select for diffs], Tue Jun 26 17:27:24 2001 UTC (22 years, 10 months ago) by markus
Branch: MAIN
Changes since 1.46: +4 -14 lines
Diff to previous 1.46 (colored)

remove comments from .h, since they are cut&paste from the .c files
and out of sync

Revision 1.46 / (download) - annotate - [select for diffs], Tue Jun 26 16:15:24 2001 UTC (22 years, 10 months ago) by dugsong
Branch: MAIN
Changes since 1.45: +6 -4 lines
Diff to previous 1.45 (colored)

Kerberos v5 support for SSH1, mostly from Assar Westerlund <assar@freebsd.org> and Bjorn Gronvall <bg@sics.se>. markus@ ok

Revision 1.45 / (download) - annotate - [select for diffs], Tue Jun 26 06:33:00 2001 UTC (22 years, 10 months ago) by itojun
Branch: MAIN
Changes since 1.44: +4 -4 lines
Diff to previous 1.44 (colored)

prototype pedant.  not very creative...
- () -> (void)
- no variable names

Revision 1.44 / (download) - annotate - [select for diffs], Sat Jun 23 02:34:31 2001 UTC (22 years, 10 months ago) by markus
Branch: MAIN
Changes since 1.43: +3 -3 lines
Diff to previous 1.43 (colored)

get rid of known_hosts2, use it for hostkey lookup, but do not modify.

Revision 1.43 / (download) - annotate - [select for diffs], Sun May 20 17:20:35 2001 UTC (23 years ago) by markus
Branch: MAIN
Changes since 1.42: +4 -1 lines
Diff to previous 1.42 (colored)

configurable authorized_keys{,2} location; originally from peter@; ok djm@

Revision 1.42 / (download) - annotate - [select for diffs], Fri May 18 14:13:29 2001 UTC (23 years ago) by markus
Branch: MAIN
Changes since 1.41: +2 -2 lines
Diff to previous 1.41 (colored)

improved kbd-interactive support. work by per@appgate.com and me

Revision 1.30.2.4 / (download) - annotate - [select for diffs], Mon May 7 21:09:33 2001 UTC (23 years ago) by jason
Branch: OPENBSD_2_8
Changes since 1.30.2.3: +13 -1 lines
Diff to previous 1.30.2.3 (colored) to branchpoint 1.30 (colored)

Pull in OpenSSH-2.9 to 2.8 branch.

Revision 1.41 / (download) - annotate - [select for diffs], Fri Apr 13 22:46:53 2001 UTC (23 years, 1 month ago) by beck
Branch: MAIN
CVS Tags: OPENBSD_2_9_BASE
Branch point for: OPENBSD_2_9
Changes since 1.40: +10 -1 lines
Diff to previous 1.40 (colored)

Add options ClientAliveInterval and ClientAliveCountMax to sshd.
This gives the ability to do a "keepalive" via the encrypted channel
which can't be spoofed (unlike TCP keepalives). Useful for when you want
to use ssh connections to authenticate people for something, and know
relatively quickly when they are no longer authenticated. Disabled
by default (of course). ok markus@

Revision 1.40 / (download) - annotate - [select for diffs], Thu Apr 12 19:15:25 2001 UTC (23 years, 1 month ago) by markus
Branch: MAIN
Changes since 1.39: +3 -1 lines
Diff to previous 1.39 (colored)

implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2)
similar to RhostRSAAuthentication unless you enable (the experimental)
HostbasedUsesNameFromPacketOnly option.  please test. :)

Revision 1.39 / (download) - annotate - [select for diffs], Sun Mar 25 13:16:10 2001 UTC (23 years, 1 month ago) by stevesk
Branch: MAIN
Changes since 1.38: +2 -1 lines
Diff to previous 1.38 (colored)

PrintLastLog option; from chip@valinux.com with some minor
changes by me.  ok markus@

Revision 1.30.2.3 / (download) - annotate - [select for diffs], Wed Mar 21 19:46:28 2001 UTC (23 years, 2 months ago) by jason
Branch: OPENBSD_2_8
Changes since 1.30.2.2: +0 -0 lines
Diff to previous 1.30.2.2 (colored) to branchpoint 1.30 (colored)

Pull in OpenSSH-2.5.2 for 2.8 branch.

Revision 1.22.2.5 / (download) - annotate - [select for diffs], Wed Mar 21 18:53:02 2001 UTC (23 years, 2 months ago) by jason
Branch: OPENBSD_2_7
Changes since 1.22.2.4: +0 -0 lines
Diff to previous 1.22.2.4 (colored) to branchpoint 1.22 (colored) next main 1.23 (colored)

Pull in OpenSSH-2.5.2 for 2.7 branch.

Revision 1.22.2.4 / (download) - annotate - [select for diffs], Mon Mar 12 15:44:14 2001 UTC (23 years, 2 months ago) by jason
Branch: OPENBSD_2_7
Changes since 1.22.2.3: +27 -18 lines
Diff to previous 1.22.2.3 (colored) to branchpoint 1.22 (colored)

OpenSSH-2.5.1 for 2.7 patch branch

Revision 1.30.2.2 / (download) - annotate - [select for diffs], Mon Feb 19 17:19:19 2001 UTC (23 years, 3 months ago) by jason
Branch: OPENBSD_2_8
Changes since 1.30.2.1: +0 -0 lines
Diff to previous 1.30.2.1 (colored) to branchpoint 1.30 (colored)

Pull in OpenSSH-2.5.1

Revision 1.30.2.1 / (download) - annotate - [select for diffs], Fri Feb 16 20:13:13 2001 UTC (23 years, 3 months ago) by jason
Branch: OPENBSD_2_8
Changes since 1.30: +27 -18 lines
Diff to previous 1.30 (colored)

Pull in OpenSSH 2.5.0

Revision 1.38 / (download) - annotate - [select for diffs], Mon Feb 12 16:16:23 2001 UTC (23 years, 3 months ago) by markus
Branch: MAIN
Changes since 1.37: +10 -2 lines
Diff to previous 1.37 (colored)

PermitRootLogin={yes,without-password,forced-commands-only,no}
(before this change, root could login even if PermitRootLogin==no)

Revision 1.37 / (download) - annotate - [select for diffs], Sun Feb 11 12:59:25 2001 UTC (23 years, 3 months ago) by markus
Branch: MAIN
Changes since 1.36: +4 -3 lines
Diff to previous 1.36 (colored)

1) clean up the MAC support for SSH-2
2) allow you to specify the MAC with 'ssh -m'
3) or the 'MACs' keyword in ssh(d)_config
4) add hmac-{md5,sha1}-96
	ok stevesk@, provos@

Revision 1.36 / (download) - annotate - [select for diffs], Sat Feb 3 10:08:37 2001 UTC (23 years, 3 months ago) by markus
Branch: MAIN
Changes since 1.35: +2 -1 lines
Diff to previous 1.35 (colored)

make ReverseMappingCheck optional in sshd_config; ok djm@,dugsong@

Revision 1.35 / (download) - annotate - [select for diffs], Mon Jan 22 23:06:40 2001 UTC (23 years, 3 months ago) by markus
Branch: MAIN
Changes since 1.34: +2 -3 lines
Diff to previous 1.34 (colored)

rename skey -> challenge response.
auto-enable kbd-interactive for ssh2 if challenge-reponse is enabled.

Revision 1.34 / (download) - annotate - [select for diffs], Fri Jan 19 12:45:27 2001 UTC (23 years, 4 months ago) by markus
Branch: MAIN
Changes since 1.33: +1 -3 lines
Diff to previous 1.33 (colored)

only auth-chall.c needs #ifdef SKEY

Revision 1.33 / (download) - annotate - [select for diffs], Mon Jan 8 22:29:05 2001 UTC (23 years, 4 months ago) by markus
Branch: MAIN
Changes since 1.32: +2 -1 lines
Diff to previous 1.32 (colored)

implement option 'Banner /etc/issue.net' for ssh2, move version to
2.3.1 (needed for bugcompat detection, 2.3.0 would fail if Banner
is enabled).

Revision 1.32 / (download) - annotate - [select for diffs], Tue Dec 19 23:17:58 2000 UTC (23 years, 5 months ago) by markus
Branch: MAIN
Changes since 1.31: +8 -8 lines
Diff to previous 1.31 (colored)

replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'
with u_char.

Revision 1.31 / (download) - annotate - [select for diffs], Sun Nov 12 19:50:38 2000 UTC (23 years, 6 months ago) by markus
Branch: MAIN
Changes since 1.30: +5 -4 lines
Diff to previous 1.30 (colored)

add support for RSA to SSH2.  please test.

there are now 3 types of keys: RSA1 is used by ssh-1 only,
RSA and DSA are used by SSH2.

you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA
keys for SSH2 and use the RSA keys for hostkeys or for user keys.

SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before.

IdentityFile2, HostDsaKey and DSAAuthentication are obsolete.
you can use multiple IdentityFile and HostKey for all types of keys.

the option DSAAuthentication is replaced by PubkeyAuthetication.

Revision 1.22.2.3 / (download) - annotate - [select for diffs], Wed Nov 8 21:31:13 2000 UTC (23 years, 6 months ago) by jason
Branch: OPENBSD_2_7
Changes since 1.22.2.2: +8 -8 lines
Diff to previous 1.22.2.2 (colored) to branchpoint 1.22 (colored)

openssh-2.3.0 (again) for 2.7 branch

Revision 1.30 / (download) - annotate - [select for diffs], Sat Oct 14 12:12:09 2000 UTC (23 years, 7 months ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_2_8_BASE
Branch point for: OPENBSD_2_8
Changes since 1.29: +2 -1 lines
Diff to previous 1.29 (colored)

AllowTcpForwarding; from naddy@

Revision 1.29 / (download) - annotate - [select for diffs], Wed Oct 11 20:14:39 2000 UTC (23 years, 7 months ago) by markus
Branch: MAIN
Changes since 1.28: +2 -1 lines
Diff to previous 1.28 (colored)

add support for s/key (kbd-interactive) to ssh2, based on work by mkiernan@avantgo.com and me

Revision 1.28 / (download) - annotate - [select for diffs], Thu Sep 7 20:27:53 2000 UTC (23 years, 8 months ago) by deraadt
Branch: MAIN
Changes since 1.27: +6 -8 lines
Diff to previous 1.27 (colored)

cleanup copyright notices on all files.  I have attempted to be accurate with
the details.  everything is now under Tatu's licence (which I copied from his
readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd
developers under a 2-term bsd licence.  We're not changing any rules, just
being accurate.

Revision 1.22.2.2 / (download) - annotate - [select for diffs], Fri Sep 1 18:23:22 2000 UTC (23 years, 8 months ago) by jason
Branch: OPENBSD_2_7
Changes since 1.22.2.1: +11 -1 lines
Diff to previous 1.22.2.1 (colored) to branchpoint 1.22 (colored)

Pull in the rest of openssh-2.2.0 to 2.7 branch (luvin' cvs...)

Revision 1.27 / (download) - annotate - [select for diffs], Sat Jul 22 09:14:36 2000 UTC (23 years, 10 months ago) by markus
Branch: MAIN
Changes since 1.26: +3 -1 lines
Diff to previous 1.26 (colored)

random early drop; ok theo, niels

Revision 1.26 / (download) - annotate - [select for diffs], Mon Jun 26 21:59:18 2000 UTC (23 years, 10 months ago) by markus
Branch: MAIN
Changes since 1.25: +4 -1 lines
Diff to previous 1.25 (colored)

MaxStartups: limit number of unauthenticated connections, work by theo and me

Revision 1.25 / (download) - annotate - [select for diffs], Tue Jun 20 01:39:44 2000 UTC (23 years, 11 months ago) by markus
Branch: MAIN
Changes since 1.24: +1 -1 lines
Diff to previous 1.24 (colored)

OpenBSD tag

Revision 1.24 / (download) - annotate - [select for diffs], Sat Jun 17 22:52:33 2000 UTC (23 years, 11 months ago) by jakob
Branch: MAIN
Changes since 1.23: +6 -1 lines
Diff to previous 1.23 (colored)

add support for ssh v2 subsystems. ok markus@.

Revision 1.22.2.1 / (download) - annotate - [select for diffs], Mon Jun 12 02:37:35 2000 UTC (23 years, 11 months ago) by jason
Branch: OPENBSD_2_7
Changes since 1.22: +2 -1 lines
Diff to previous 1.22 (colored)

lovin' CVS... update patch branch to OpenSSH-2.1.1

Revision 1.23 / (download) - annotate - [select for diffs], Wed May 31 06:36:40 2000 UTC (23 years, 11 months ago) by markus
Branch: MAIN
Changes since 1.22: +2 -1 lines
Diff to previous 1.22 (colored)

xauth_location support; pr 1234

Revision 1.22 / (download) - annotate - [select for diffs], Sat May 6 17:45:37 2000 UTC (24 years ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_2_7_BASE
Branch point for: OPENBSD_2_7
Changes since 1.21: +2 -1 lines
Diff to previous 1.21 (colored)

add DSAAuthetication option to ssh/sshd, document SSH2 in sshd.8

Revision 1.21 / (download) - annotate - [select for diffs], Wed May 3 18:03:07 2000 UTC (24 years ago) by markus
Branch: MAIN
Changes since 1.20: +2 -1 lines
Diff to previous 1.20 (colored)

GatewayPorts for sshd, ok deraadt@

Revision 1.20 / (download) - annotate - [select for diffs], Wed May 3 10:21:48 2000 UTC (24 years ago) by markus
Branch: MAIN
Changes since 1.19: +2 -2 lines
Diff to previous 1.19 (colored)

s/DsaKey/HostDSAKey/, document option

Revision 1.19 / (download) - annotate - [select for diffs], Mon May 1 18:50:59 2000 UTC (24 years ago) by markus
Branch: MAIN
Changes since 1.18: +2 -1 lines
Diff to previous 1.18 (colored)

PidFile, pr 1210

Revision 1.18 / (download) - annotate - [select for diffs], Fri Apr 14 10:30:33 2000 UTC (24 years, 1 month ago) by markus
Branch: MAIN
Changes since 1.17: +7 -7 lines
Diff to previous 1.17 (colored)

whitespace cleanup

Revision 1.17 / (download) - annotate - [select for diffs], Wed Apr 12 07:45:44 2000 UTC (24 years, 1 month ago) by markus
Branch: MAIN
Changes since 1.16: +3 -1 lines
Diff to previous 1.16 (colored)

add Cipher and Protocol options to ssh/sshd, e.g.:
ssh -o 'Protocol 1,2' if you prefer proto 1, ssh -o 'Ciphers arcfour,3des-cbc'

Revision 1.16 / (download) - annotate - [select for diffs], Thu Apr 6 08:55:22 2000 UTC (24 years, 1 month ago) by markus
Branch: MAIN
Changes since 1.15: +2 -1 lines
Diff to previous 1.15 (colored)

ssh2 server side, see README.openssh2; enable with 'sshd -2'

Revision 1.15 / (download) - annotate - [select for diffs], Tue Jan 4 00:08:00 2000 UTC (24 years, 4 months ago) by markus
Branch: MAIN
Changes since 1.14: +8 -4 lines
Diff to previous 1.14 (colored)

ipv6 support: mostly gethostbyname->getaddrinfo/getnameinfo, new features:
sshd allows multiple ListenAddress and Port options.  note that libwrap is
not IPv6-ready. (based on patches from <kick@kyoto.wide.ad.jp> and
fujiwara@rcac.tdi.co.jp)

Revision 1.14 / (download) - annotate - [select for diffs], Wed Nov 24 19:53:51 1999 UTC (24 years, 5 months ago) by markus
Branch: MAIN
Changes since 1.13: +9 -5 lines
Diff to previous 1.13 (colored)

KNF, final part 3

Revision 1.13 / (download) - annotate - [select for diffs], Wed Nov 24 00:26:03 1999 UTC (24 years, 5 months ago) by deraadt
Branch: MAIN
Changes since 1.12: +78 -66 lines
Diff to previous 1.12 (colored)

much more KNF

Revision 1.12 / (download) - annotate - [select for diffs], Thu Nov 11 22:58:38 1999 UTC (24 years, 6 months ago) by markus
Branch: MAIN
Changes since 1.11: +2 -1 lines
Diff to previous 1.11 (colored)

IgnoreUserKnownHosts(default=no), used for RhostRSAAuth, ok deraadt,millert

Revision 1.11 / (download) - annotate - [select for diffs], Wed Nov 10 23:36:44 1999 UTC (24 years, 6 months ago) by markus
Branch: MAIN
Changes since 1.10: +2 -3 lines
Diff to previous 1.10 (colored)

add LogLevel {QUIET, FATAL, ERROR, INFO, CHAT, DEBUG} to ssh/sshd,
obsoletes QuietMode and FascistLogging in sshd.

Revision 1.10 / (download) - annotate - [select for diffs], Sun Oct 17 20:48:07 1999 UTC (24 years, 7 months ago) by dugsong
Branch: MAIN
CVS Tags: OPENBSD_2_6_BASE, OPENBSD_2_6
Changes since 1.9: +1 -8 lines
Diff to previous 1.9 (colored)

remove AllowHosts, DenyHosts, SilentDeny server access control cruft - replace with LIBWRAP moved to child. ok markus@ deraat@

Revision 1.9 / (download) - annotate - [select for diffs], Tue Oct 12 18:11:54 1999 UTC (24 years, 7 months ago) by markus
Branch: MAIN
Changes since 1.8: +2 -1 lines
Diff to previous 1.8 (colored)

SilentDeny, don't log/answer refused connections, deraadt@

Revision 1.8 / (download) - annotate - [select for diffs], Mon Oct 11 21:48:29 1999 UTC (24 years, 7 months ago) by markus
Branch: MAIN
Changes since 1.7: +13 -1 lines
Diff to previous 1.7 (colored)

Allow/Deny Users/Groups, from zzlevo@dd.chalmers.se, ok deraadt@

Revision 1.7 / (download) - annotate - [select for diffs], Mon Oct 11 21:07:37 1999 UTC (24 years, 7 months ago) by markus
Branch: MAIN
Changes since 1.6: +2 -1 lines
Diff to previous 1.6 (colored)

UseLogin, default=no, from kpa@gmx.net, ok deraadt@

Revision 1.6 / (download) - annotate - [select for diffs], Thu Oct 7 22:46:32 1999 UTC (24 years, 7 months ago) by markus
Branch: MAIN
Changes since 1.5: +2 -1 lines
Diff to previous 1.5 (colored)

You have Mail. Email fuer Dich. Karsten Patzwaldt <kpa@gmx.net> default=no

Revision 1.5 / (download) - annotate - [select for diffs], Thu Oct 7 21:45:02 1999 UTC (24 years, 7 months ago) by markus
Branch: MAIN
Changes since 1.4: +4 -1 lines
Diff to previous 1.4 (colored)

add skey to sshd:

1) pass *pw to auth_password() not user_name, do_authentication already
   keeps private copy of struct passwd for current user.
2) limit authentication attemps to 5, otherwise
        ssh -o 'NumberOfPasswordPrompts 100000' host
   lets you enter 100000 passwds
3) make s/key a run-time option in /etc/sshd_config
4) generate fake skeys,
   for s/key for nonexisting users, too
   limit auth-tries for nonexisting users, too.
Note that
% ssh -l nonexisting-user -o 'NumberOfPasswordPrompts 100000' host
has NO limits in ssh-1.2.27

Revision 1.4 / (download) - annotate - [select for diffs], Fri Oct 1 02:38:09 1999 UTC (24 years, 7 months ago) by provos
Branch: MAIN
Changes since 1.3: +1 -2 lines
Diff to previous 1.3 (colored)

get rid of references to randomseedfile we dont need it.  for sshd
just spit out a warning that the configuration option is obsolete.

Revision 1.3 / (download) - annotate - [select for diffs], Wed Sep 29 18:16:20 1999 UTC (24 years, 7 months ago) by dugsong
Branch: MAIN
Changes since 1.2: +5 -7 lines
Diff to previous 1.2 (colored)

update krb4/AFS support to ssh-1.2.27-afs-kerberos-pl1 level, clean up unused variables, update manpages

Revision 1.2 / (download) - annotate - [select for diffs], Tue Sep 28 07:56:47 1999 UTC (24 years, 7 months ago) by deraadt
Branch: MAIN
Changes since 1.1: +2 -1 lines
Diff to previous 1.1 (colored)

X11DisplayOffset; aaron

Revision 1.1 / (download) - annotate - [select for diffs], Sun Sep 26 20:53:37 1999 UTC (24 years, 7 months ago) by deraadt
Branch: MAIN

i bet a lot of people didn't know what ssh 1.2.16 had a nice license.
well, except for the patent issues.  someone in sweden (forget their
name at the moment) cleaned out most of the patented code, and now
this code removes rsa code.  when this is done, it will link against
libssl, but the work isn't completely done yet.  then we need to bring
this up to modern days, featurewise.

This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.