Damien Miller 0a80ca190a - OpenBSD CVS Sync
- djm@cvs.openbsd.org 2010/02/26 20:29:54
     [PROTOCOL PROTOCOL.agent PROTOCOL.certkeys addrmatch.c auth-options.c]
     [auth-options.h auth.h auth2-pubkey.c authfd.c dns.c dns.h hostfile.c]
     [hostfile.h kex.h kexdhs.c kexgexs.c key.c key.h match.h monitor.c]
     [myproposal.h servconf.c servconf.h ssh-add.c ssh-agent.c ssh-dss.c]
     [ssh-keygen.1 ssh-keygen.c ssh-rsa.c ssh.1 ssh.c ssh2.h sshconnect.c]
     [sshconnect2.c sshd.8 sshd.c sshd_config.5]
     Add support for certificate key types for users and hosts.

     OpenSSH certificate key types are not X.509 certificates, but a much
     simpler format that encodes a public key, identity information and
     some validity constraints and signs it with a CA key. CA keys are
     regular SSH keys. This certificate style avoids the attack surface
     of X.509 certificates and is very easy to deploy.

     Certified host keys allow automatic acceptance of new host keys
     when a CA certificate is marked as sh/known_hosts.
     see VERIFYING HOST KEYS in ssh(1) for details.

     Certified user keys allow authentication of users when the signing
     CA key is marked as trusted in authorized_keys. See "AUTHORIZED_KEYS
     FILE FORMAT" in sshd(8) for details.

     Certificates are minted using ssh-keygen(1), documentation is in
     the "CERTIFICATES" section of that manpage.

     Documentation on the format of certificates is in the file
     PROTOCOL.certkeys

     feedback and ok markus@
2010-02-27 07:55:05 +11:00
2010-02-24 18:21:45 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2006-08-19 00:21:46 +10:00
2008-06-29 22:47:04 +10:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2003-05-19 00:46:46 +10:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2009-02-22 08:47:02 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2009-10-11 21:51:08 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2010-02-27 07:55:05 +11:00
2005-05-26 11:47:54 +10:00

See http://www.openssh.com/txt/release-5.3 for the release notes.

- A Japanese translation of this document and of the OpenSSH FAQ is
- available at http://www.unixuser.org/~haruyama/security/openssh/index.html
- Thanks to HARUYAMA Seigo <haruyama@unixuser.org>

This is the port of OpenBSD's excellent OpenSSH[0] to Linux and other
Unices.

OpenSSH is based on the last free version of Tatu Ylonen's sample
implementation with all patent-encumbered algorithms removed (to
external libraries), all known security bugs fixed, new features
reintroduced and many other clean-ups.  OpenSSH has been created by
Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo de Raadt,
and Dug Song. It has a homepage at http://www.openssh.com/

This port consists of the re-introduction of autoconf support, PAM
support, EGD[1]/PRNGD[2] support and replacements for OpenBSD library
functions that are (regrettably) absent from other unices. This port
has been best tested on AIX, Cygwin, HP-UX, Linux, MacOS/X,
NetBSD, OpenBSD, OpenServer, Solaris, Unicos, and UnixWare.

This version actively tracks changes in the OpenBSD CVS repository.

The PAM support is now more functional than the popular packages of
commercial ssh-1.2.x. It checks "account" and "session" modules for
all logins, not just when using password authentication.

OpenSSH depends on Zlib[3], OpenSSL[4] and optionally PAM[5].

There is now several mailing lists for this port of OpenSSH. Please
refer to http://www.openssh.com/list.html for details on how to join.

Please send bug reports and patches to the mailing list
openssh-unix-dev@mindrot.org. The list is open to posting by
unsubscribed users.Code contribution are welcomed, but please follow the 
OpenBSD style guidelines[6].

Please refer to the INSTALL document for information on how to install
OpenSSH on your system. There are a number of differences between this
port of OpenSSH and F-Secure SSH 1.x, please refer to the OpenSSH FAQ[7]
for details and general tips.

Damien Miller <djm@mindrot.org>

Miscellania -

This version of OpenSSH is based upon code retrieved from the OpenBSD
CVS repository which in turn was based on the last free sample
implementation released by Tatu Ylonen.

References -

[0] http://www.openssh.com/faq.html
[1] http://www.lothar.com/tech/crypto/
[2] http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls/prngd.html
[3] http://www.gzip.org/zlib/
[4] http://www.openssl.org/
[5] http://www.openpam.org
    http://www.kernel.org/pub/linux/libs/pam/ 
    (PAM also is standard on Solaris and HP-UX 11)
[6] http://www.openbsd.org/cgi-bin/man.cgi?query=style&sektion=9
[7] http://www.openssh.com/faq.html

$Id: README,v 1.71 2009/10/02 01:49:03 djm Exp $
Description
Portable OpenSSH, all Win32-OpenSSH releases and wiki are managed at https://github.com/powershell/Win32-OpenSSH
Readme 87 MiB
Languages
C 78.3%
Shell 6.7%
PowerShell 5.3%
Roff 4.9%
M4 2.4%
Other 2.4%