diff options
author | Colin Watson <cjwatson@debian.org> | 2010-03-31 10:46:28 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2010-03-31 10:46:28 +0100 |
commit | efd3d4522636ae029488c2e9730b60c88e257d2e (patch) | |
tree | 31e02ac3f16090ce8c53448677356b2b7f423683 /PROTOCOL.agent | |
parent | bbec4db36d464ea1d464a707625125f9fd5c7b5e (diff) | |
parent | d1a87e462e1db89f19cd960588d0c6b287cb5ccc (diff) |
* New upstream release (LP: #535029).
- After a transition period of about 10 years, this release disables SSH
protocol 1 by default. Clients and servers that need to use the
legacy protocol must explicitly enable it in ssh_config / sshd_config
or on the command-line.
- Remove the libsectok/OpenSC-based smartcard code and add support for
PKCS#11 tokens. This support is enabled by default in the Debian
packaging, since it now doesn't involve additional library
dependencies (closes: #231472, LP: #16918).
- Add support for certificate authentication of users and hosts using a
new, minimal OpenSSH certificate format (closes: #482806).
- Added a 'netcat mode' to ssh(1): "ssh -W host:port ...".
- Add the ability to revoke keys in sshd(8) and ssh(1). (For the Debian
package, this overlaps with the key blacklisting facility added in
openssh 1:4.7p1-9, but with different file formats and slightly
different scopes; for the moment, I've roughly merged the two.)
- Various multiplexing improvements, including support for requesting
port-forwardings via the multiplex protocol (closes: #360151).
- Allow setting an explicit umask on the sftp-server(8) commandline to
override whatever default the user has (closes: #496843).
- Many sftp client improvements, including tab-completion, more options,
and recursive transfer support for get/put (LP: #33378). The old
mget/mput commands never worked properly and have been removed
(closes: #270399, #428082).
- Do not prompt for a passphrase if we fail to open a keyfile, and log
the reason why the open failed to debug (closes: #431538).
- Prevent sftp from crashing when given a "-" without a command. Also,
allow whitespace to follow a "-" (closes: #531561).
Diffstat (limited to 'PROTOCOL.agent')
-rw-r--r-- | PROTOCOL.agent | 24 |
1 files changed, 23 insertions, 1 deletions
diff --git a/PROTOCOL.agent b/PROTOCOL.agent index 49adbdd5c..b34fcd318 100644 --- a/PROTOCOL.agent +++ b/PROTOCOL.agent | |||
@@ -173,6 +173,15 @@ be added using the following request | |||
173 | string key_comment | 173 | string key_comment |
174 | constraint[] key_constraints | 174 | constraint[] key_constraints |
175 | 175 | ||
176 | DSA certificates may be added with: | ||
177 | byte SSH2_AGENTC_ADD_IDENTITY or | ||
178 | SSH2_AGENTC_ADD_ID_CONSTRAINED | ||
179 | string "ssh-dss-cert-v00@openssh.com" | ||
180 | string certificate | ||
181 | mpint dsa_private_key | ||
182 | string key_comment | ||
183 | constraint[] key_constraints | ||
184 | |||
176 | RSA keys may be added with this request: | 185 | RSA keys may be added with this request: |
177 | 186 | ||
178 | byte SSH2_AGENTC_ADD_IDENTITY or | 187 | byte SSH2_AGENTC_ADD_IDENTITY or |
@@ -187,6 +196,19 @@ RSA keys may be added with this request: | |||
187 | string key_comment | 196 | string key_comment |
188 | constraint[] key_constraints | 197 | constraint[] key_constraints |
189 | 198 | ||
199 | RSA certificates may be added with this request: | ||
200 | |||
201 | byte SSH2_AGENTC_ADD_IDENTITY or | ||
202 | SSH2_AGENTC_ADD_ID_CONSTRAINED | ||
203 | string "ssh-rsa-cert-v00@openssh.com" | ||
204 | string certificate | ||
205 | mpint rsa_d | ||
206 | mpint rsa_iqmp | ||
207 | mpint rsa_p | ||
208 | mpint rsa_q | ||
209 | string key_comment | ||
210 | constraint[] key_constraints | ||
211 | |||
190 | Note that the 'rsa_p' and 'rsa_q' parameters are sent in the reverse | 212 | Note that the 'rsa_p' and 'rsa_q' parameters are sent in the reverse |
191 | order to the protocol 1 add keys message. As with the corresponding | 213 | order to the protocol 1 add keys message. As with the corresponding |
192 | protocol 1 "add key" request, the private key is overspecified to avoid | 214 | protocol 1 "add key" request, the private key is overspecified to avoid |
@@ -513,4 +535,4 @@ Locking and unlocking affects both protocol 1 and protocol 2 keys. | |||
513 | SSH_AGENT_CONSTRAIN_LIFETIME 1 | 535 | SSH_AGENT_CONSTRAIN_LIFETIME 1 |
514 | SSH_AGENT_CONSTRAIN_CONFIRM 2 | 536 | SSH_AGENT_CONSTRAIN_CONFIRM 2 |
515 | 537 | ||
516 | $OpenBSD: PROTOCOL.agent,v 1.4 2008/07/01 23:12:47 stevesk Exp $ | 538 | $OpenBSD: PROTOCOL.agent,v 1.5 2010/02/26 20:29:54 djm Exp $ |