Commit Graph

931 Commits

Author SHA1 Message Date
Ben Lindstrom 5fc6270fe9 - deraadt@cvs.openbsd.org 2001/03/09 03:14:39
[ssh-keygen.c]
     create *.pub files with umask 0644, so that you can mv them to
     authorized_keys
2001-03-09 18:19:24 +00:00
Ben Lindstrom 266dfdfd62 - markus@cvs.openbsd.org 2001/03/08 21:42:33
[compat.c compat.h readconf.h ssh.c sshconnect1.c sshconnect2.c]
     implement client side of SSH2_MSG_USERAUTH_PK_OK (test public key ->
     no need to do enter passphrase or do expensive sign operations if the
     server does not accept key).
2001-03-09 00:12:22 +00:00
Ben Lindstrom 283cb821cd - stevesk@cvs.openbsd.org 2001/03/08 20:44:48
[sftp.1]
     spelling, cleanup; ok deraadt@
2001-03-09 00:09:02 +00:00
Ben Lindstrom a038498797 - stevesk@cvs.openbsd.org 2001/03/08 18:47:12
[auth1.c]
     unused; ok markus@
2001-03-08 20:37:22 +00:00
Kevin Steves 52dd46855d - (stevesk) Reliant Unix (SNI) needs HAVE_BOGUS_SYS_QUEUE_H;
Dirk Markwardt <D.Markwardt@tu-bs.de>
2001-03-08 18:26:57 +00:00
Ben Lindstrom cebc858ca2 - OpenBSD CVS Sync
- markus@cvs.openbsd.org 2001/03/08 00:15:48
     [readconf.c ssh.1]
     turn off useprivilegedports by default. only rhost-auth needs
     this. older sshd's may need this, too.
2001-03-08 03:39:10 +00:00
Damien Miller 058316f0f1 - OpenBSD CVS Sync
- djm@cvs.openbsd.org 2001/03/07 10:11:23
    [sftp-client.c sftp-client.h sftp-int.c sftp-server.c sftp.1 sftp.c sftp.h]
    Support for new draft (draft-ietf-secsh-filexfer-01). New symlink handling
    functions and small protocol change.
2001-03-08 10:08:49 +11:00
Damien Miller 8ac0a7ec44 - Cygwin contrib improvements from Corinna Vinschen <vinschen@redhat.com> 2001-03-07 21:38:19 +11:00
Ben Lindstrom b29e34d1e4 - deraadt@cvs.openbsd.org 2001/03/07 04:05:58
[ssh.1]
     removed dated comment
2001-03-07 06:08:50 +00:00
Ben Lindstrom d58eb5f50e - deraadt@cvs.openbsd.org 2001/03/07 01:19:06
[ssh.1 sshd.8]
     the name "secure shell" is boring, noone ever uses it
2001-03-07 06:07:22 +00:00
Ben Lindstrom c9b6eabb49 - deraadt@cvs.openbsd.org 2001/03/06 15:10:42
[sftp.1]
     order things
2001-03-07 01:29:17 +00:00
Ben Lindstrom 562c26bccf - deraadt@cvs.openbsd.org 2001/03/06 06:11:44
[sftp-int.c sftp.1 sftp.c]
     sftp -b batchfile; mouring@etoh.eviladmin.org
2001-03-07 01:26:48 +00:00
Ben Lindstrom e21c4adaac - deraadt@cvs.openbsd.org 2001/03/06 06:11:18
[ssh-keyscan.c]
     appease gcc
2001-03-07 01:23:30 +00:00
Ben Lindstrom ebc882757b - millert@cvs.openbsd.org 2001/03/06 01:08:27
[clientloop.c]
     If read() fails with EINTR deal with it the same way we treat EAGAIN
2001-03-06 03:34:40 +00:00
Ben Lindstrom 884a4aca88 - millert@cvs.openbsd.org 2001/03/06 01:06:03
[ssh-keyscan.c]
     Don't assume we wil get the version string all in one read().
     deraadt@ OK'd
2001-03-06 03:33:04 +00:00
Ben Lindstrom b3144e58e7 - deraadt@cvs.openbsd.org 2001/03/06 00:33:04
[authfd.c cli.c ssh-agent.c]
     EINTR/EAGAIN handling is required in more cases
2001-03-06 03:31:34 +00:00
Ben Lindstrom be6a5a6dfe - stevesk@cvs.openbsd.org 2001/03/05 17:58:22
[dh.c]
     spelling
2001-03-06 01:13:06 +00:00
Ben Lindstrom 1e62174af1 - stevesk@cvs.openbsd.org 2001/03/05 17:40:48
[ssh.1]
     more ssh_known_hosts2 documentation; ok markus@
2001-03-06 01:10:53 +00:00
Ben Lindstrom 4c4f05e096 - markus@cvs.openbsd.org 2001/03/05 17:17:21
[kex.c kex.h sshconnect2.c sshd.c]
     generate a 2*need size (~300 instead of 1024/2048) random private
     exponent during the DH key agreement. according to Niels (the great
     german advisor) this is safe since /etc/primes contains strong
     primes only.

     References:
             P. C. van Oorschot and M. J. Wiener, On Diffie-Hellman key
             agreement with short exponents, In Advances in Cryptology
             - EUROCRYPT'96, LNCS 1070, Springer-Verlag, 1996, pp.332-343.
2001-03-06 01:09:20 +00:00
Ben Lindstrom c78a187b17 - deraadt@cvs.openbsd.org 2001/03/05 16:07:15
[sshd.8]
     detail default hmac setup too
2001-03-06 01:06:58 +00:00
Ben Lindstrom ec26fb1667 - deraadt@cvs.openbsd.org 2001/03/05 15:56:16
[myproposal.h ssh.1]
     switch to aes128-cbc/hmac-md5 by default in SSH2 -- faster;
     provos & markus ok
2001-03-06 01:05:23 +00:00
Ben Lindstrom 35f1f4e2b8 - stevesk@cvs.openbsd.org 2001/03/05 15:44:51
[servconf.c]
     sync error message; ok markus@
2001-03-06 01:02:41 +00:00
Ben Lindstrom ff8b4940ab - deraadt@cvs.openbsd.org 2001/03/05 14:28:47
[sshd.8]
     alpha order; jcs@rt.fm
2001-03-06 01:00:03 +00:00
Kevin Steves 12888d1fc8 - (stevesk) sftp.c: handle __progname 2001-03-05 19:50:57 +00:00
Kevin Steves 935aa24bf4 - (stevesk) OpenBSD sync:
- deraadt@cvs.openbsd.org 2001/03/05 08:37:27
     [ssh-keyscan.c]
     skip inlining, why bother
2001-03-05 19:46:37 +00:00
Damien Miller 30246a8f2b - (djm) Fix up LOG_AUTHPRIV for systems that have it 2001-03-05 21:23:31 +11:00
Ben Lindstrom 2d9bfb17be - (bal) Fix up logging since it changed. removed log-*.c 2001-03-05 08:16:54 +00:00
Ben Lindstrom 0f68db4e9e - (bal) Put HAVE_PW_CLASS_IN_PASSWD back into pwcopy() 2001-03-05 07:57:09 +00:00
Ben Lindstrom fd2e05b95e - deraadt@cvs.openbsd.org 2001/03/04 18:21:28
[sshd.8]
     list SSH2 ciphers
2001-03-05 07:48:45 +00:00
Ben Lindstrom 6df8ef4196 - millert@cvs.openbsd.org 2001/03/04 17:42:28
[authfd.c channels.c dh.c log.c readconf.c servconf.c sftp-int.c
      ssh.c sshconnect.c sshd.c]
     log functions should not be passed strings that end in newline as they
     get passed on to syslog() and when logging to stderr, do_log() appends
     its own newline.
2001-03-05 07:47:23 +00:00
Ben Lindstrom fafea18d68 - stevesk@cvs.openbsd.org 2001/03/04 12:54:04
[sshd.8]
     spelling
2001-03-05 07:43:27 +00:00
Ben Lindstrom d9cae22d1a - stevesk@cvs.openbsd.org 2001/03/04 11:16:06
[servconf.c sshd.8]
     kill obsolete RandomSeed; ok markus@ deraadt@
2001-03-05 07:42:03 +00:00
Ben Lindstrom 323c98f4a7 - stevesk@cvs.openbsd.org 2001/03/04 11:04:41
[sshd.8]
     small cleanup and clarify for PermitRootLogin; ok markus@
2001-03-05 07:40:40 +00:00
Ben Lindstrom 3d73a34931 - stevesk@cvs.openbsd.org 2001/03/04 10:57:53
[ssh.c]
     add -m to usage; ok markus@
2001-03-05 07:39:01 +00:00
Ben Lindstrom 9c5324422e - (bal) CVS ID touch up on auth2.c, serverloop.c, session.c & sshd.c 2001-03-05 07:33:14 +00:00
Ben Lindstrom b1131e9329 - markus@cvs.openbsd.org 2001/03/04 00:03:59
[channels.c]
     debug1->2
2001-03-05 07:27:13 +00:00
Ben Lindstrom 8a432f5fe0 - markus@cvs.openbsd.org 2001/03/03 23:59:34
[log.c ssh.c]
     log*.c -> log.c
2001-03-05 07:24:46 +00:00
Ben Lindstrom 46d6e09099 - markus@cvs.openbsd.org 2001/03/03 23:52:22
[sftp.c]
     clean up arg processing. based on work by Christophe_Moret@hp.com
2001-03-05 07:10:47 +00:00
Ben Lindstrom 1addabd491 - deraadt@cvs.openbsd.org 2001/03/03 22:07:50
[sftp-server.c]
     KNF
2001-03-05 07:09:11 +00:00
Ben Lindstrom cb978aa057 - millert@cvs.openbsd.org 2001/03/03 21:41:07
[packet.c]
     Dynamically allocate fd_set; deraadt@ OK
2001-03-05 07:07:49 +00:00
Ben Lindstrom cb80bdf6d5 - millert@cvs.openbsd.org 2001/03/03 21:40:30
[sftp-server.c]
     Dynamically allocate fd_set; deraadt@ OK
2001-03-05 07:06:12 +00:00
Ben Lindstrom c1e0421cb4 - millert@cvs.openbsd.org 2001/03/03 21:19:41
[ssh-keyscan.c]
     Dynamically allocate read_wait and its copies.  Since maxfd is
     based on resource limits it is often (usually?) larger than FD_SETSIZE.
2001-03-05 07:04:38 +00:00
Ben Lindstrom d20b855bc6 - deraadt@cvs.openbsd.org 2001/03/03 06:53:12
[ssh-keyscan.c]
     standard theo sweep
2001-03-05 07:01:18 +00:00
Ben Lindstrom 92a2e38f8e - deraadt@cvs.openbsd.org 2001/03/02 18:54:31
[atomicio.c atomicio.h auth-chall.c auth.c auth2-chall.c crc32.h
      scp.c serverloop.c session.c sftp-server.8 sftp.1 ssh-add.1 ssh-add.c
      ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh.1 sshd.8]
     make copyright lines the same format
2001-03-05 06:59:27 +00:00
Ben Lindstrom d7f5b517d5 - deraadt@cvs.openbsd.org 2001/03/02 09:42:49
[sshd.8]
     doc the dsa/rsa key pair files
2001-03-05 06:57:23 +00:00
Ben Lindstrom 49a098d1b2 - deraadt@cvs.openbsd.org 2001/03/02 06:21:01
[sshd.8]
     explain SIGHUP better
2001-03-05 06:55:18 +00:00
Ben Lindstrom 4040fe10a9 - markus@cvs.openbsd.org 2001/03/01 22:46:37
[ssh.c]
     don't truncate remote ssh-2 commands; from mkubita@securities.cz
     use min, not max for logging, fixes overflow.
2001-03-05 06:52:57 +00:00
Ben Lindstrom b22c2b86af - deraadt@cvs.openbsd.org 2001/03/01 03:38:33
[cli.c cli.h rijndael.h ssh-keyscan.1]
     copyright notices on all source files
2001-03-05 06:50:47 +00:00
Ben Lindstrom 204e48851a - deraadt@cvs.openbsd.org 2001/03/01 02:45:10
[auth-rsa.c auth2.c deattack.c packet.c]
     KNF
2001-03-05 06:47:00 +00:00
Ben Lindstrom 0ab2a01079 - deraadt@cvs.openbsd.org 2001/03/01 02:29:04
[ssh.c]
     shorten usage by a line
2001-03-05 06:45:21 +00:00