summaryrefslogtreecommitdiff
path: root/ssh.c
AgeCommit message (Collapse)Author
2005-12-31 - (djm) [openbsd-compat/port-tun.c openbsd-compat/port-tun.h configure.ac]Damien Miller
[serverloop.c ssh.c openbsd-compat/Makefile.in] [openbsd-compat/openbsd-compat.h] Implement tun(4) forwarding compatability support for Linux, diff from reyk@
2005-12-20 - dtucker@cvs.openbsd.org 2005/12/20 04:41:07Darren Tucker
[ssh.c] exit(255) on error to match description in ssh(1); bz #1137; ok deraadt@
2005-12-13 - reyk@cvs.openbsd.org 2005/12/08 18:34:11Damien Miller
[auth-options.c includes.h misc.c misc.h readconf.c servconf.c] [serverloop.c ssh.c ssh_config.5 sshd_config.5 configure.ac] two changes to the new ssh tunnel support. this breaks compatibility with the initial commit but is required for a portable approach. - make the tunnel id u_int and platform friendly, use predefined types. - support configuration of layer 2 (ethernet) or layer 3 (point-to-point, default) modes. configuration is done using the Tunnel (yes|point-to-point|ethernet|no) option is ssh_config(5) and restricted by the PermitTunnel (yes|point-to-point|ethernet|no) option in sshd_config(5). ok djm@, man page bits by jmc@
2005-12-13 - reyk@cvs.openbsd.org 2005/12/06 22:38:28Damien Miller
[auth-options.c auth-options.h channels.c channels.h clientloop.c] [misc.c misc.h readconf.c readconf.h scp.c servconf.c servconf.h] [serverloop.c sftp.c ssh.1 ssh.c ssh_config ssh_config.5 sshconnect.c] [sshconnect.h sshd.8 sshd_config sshd_config.5] Add support for tun(4) forwarding over OpenSSH, based on an idea and initial channel code bits by markus@. This is a simple and easy way to use OpenSSH for ad hoc virtual private network connections, e.g. administrative tunnels or secure wireless access. It's based on a new ssh channel and works similar to the existing TCP forwarding support, except that it depends on the tun(4) network interface on both ends of the connection for layer 2 or layer 3 tunneling. This diff also adds support for LocalCommand in the ssh(1) client. ok djm@, markus@, jmc@ (manpages), tested and discussed with others
2005-11-05 - djm@cvs.openbsd.org 2005/10/30 08:52:18Damien Miller
[clientloop.c packet.c serverloop.c session.c ssh-agent.c ssh-keygen.c] [ssh.c sshconnect.c sshconnect1.c sshd.c] no need to escape single quotes in comments, no binary change
2005-11-05 - djm@cvs.openbsd.org 2005/10/30 04:03:24Damien Miller
[ssh.c] fix misleading debug message; ok dtucker@
2005-11-05 - stevesk@cvs.openbsd.org 2005/10/14 02:17:59Damien Miller
[ssh-keygen.c ssh.c sshconnect2.c] no trailing "\n" for log functions; ok djm@
2005-10-03 - jmc@cvs.openbsd.org 2005/09/19 15:42:44Darren Tucker
[ssh.c] update -D usage here too;
2005-10-03 - djm@cvs.openbsd.org 2005/09/13 23:40:07Darren Tucker
[sshd.c ssh.c misc.h sftp.c ssh-keygen.c ssh-keysign.c sftp-server.c scp.c misc.c ssh-keyscan.c ssh-add.c ssh-agent.c] ensure that stdio fds are attached; ok deraadt@
2005-08-12 - djm@cvs.openbsd.org 2005/07/30 01:26:16Damien Miller
[ssh.c] fix -D listen_host initialisation, so it picks up gateway_ports setting correctly
2005-07-17 - djm@cvs.openbsd.org 2005/07/16 01:35:24Damien Miller
[auth1.c channels.c cipher.c clientloop.c kex.c session.c ssh.c] [sshconnect.c] spacing
2005-07-06 - djm@cvs.openbsd.org 2005/07/04 00:58:43Damien Miller
[channels.c clientloop.c clientloop.h misc.c misc.h ssh.c ssh_config.5] implement support for X11 and agent forwarding over multiplex slave connections. Because of protocol limitations, the slave connections inherit the master's DISPLAY and SSH_AUTH_SOCK rather than distinctly forwarding their own. ok dtucker@ "put it in" deraadt@
2005-06-26 - djm@cvs.openbsd.org 2005/06/25 22:47:49Damien Miller
[ssh.c] do the default port filling code a few lines earlier, so it really does fix %p
2005-06-26 - djm@cvs.openbsd.org 2005/06/18 04:30:36Damien Miller
[ssh.c ssh_config.5] allow ControlPath=none, patch from dwmw2 AT infradead.org; ok dtucker@
2005-06-26 - (djm) OpenBSD CVS SyncDamien Miller
- djm@cvs.openbsd.org 2005/06/17 22:53:47 [ssh.c sshconnect.c] Fix ControlPath's %p expanding to "0" for a default port, spotted dwmw2 AT infradead.org; ok markus@
2005-06-17 - (djm) OpenBSD CVS SyncDamien Miller
- djm@cvs.openbsd.org 2005/06/16 03:38:36 [channels.c channels.h clientloop.c clientloop.h ssh.c] move x11_get_proto from ssh.c to clientloop.c, to make muliplexed xfwd easier later; ok deraadt@
2005-06-16 - djm@cvs.openbsd.org 2005/06/08 11:25:09Damien Miller
[clientloop.c readconf.c readconf.h ssh.c ssh_config.5] add ControlMaster=auto/autoask options to support opportunistic multiplexing; tested avsm@ and jakob@, ok markus@
2005-06-16 - djm@cvs.openbsd.org 2005/06/06 11:20:36Damien Miller
[auth.c auth.h misc.c misc.h ssh.c ssh_config.5 sshconnect.c] introduce a generic %foo expansion function. replace existing % expansion and add expansion to ControlPath; ok markus@
2005-06-01 - djm@cvs.openbsd.org 2005/05/27 08:30:37Darren Tucker
[ssh.c] fix -O for cases where no ControlPath has been specified or socket at ControlPath is not contactable; spotted by and ok avsm@
2005-05-26 - djm@cvs.openbsd.org 2005/05/10 10:30:43Damien Miller
[ssh.c] report real errors on fallback from ControlMaster=no to normal connect
2005-05-26 - djm@cvs.openbsd.org 2005/05/10 10:28:11Damien Miller
[ssh.c] print nice error message for EADDRINUSE as well (ID sync only)
2005-05-26 - jakob@cvs.openbsd.org 2005/04/26 13:08:37Damien Miller
[ssh.c ssh_config.5] fallback gracefully if client cannot connect to ControlPath. ok djm@
2005-05-26 - djm@cvs.openbsd.org 2005/04/21 11:47:19Damien Miller
[ssh.c] don't allocate a pty when -n flag (/dev/null stdin) is set, patch from ignasi.roca AT fujitsu-siemens.com (bz #829); ok dtucker@
2005-05-26 - dtucker@cvs.openbsd.org 2005/04/06 12:26:06Damien Miller
[ssh.c] Fix debug call for port forwards; patch from pete at seebeyond.com, ok djm@ (ID sync only - change already in portable)
2005-05-04 - (djm) [ssh.c] some systems return EADDRINUSE on a bind to an already-usedDamien Miller
unix domain socket, so catch that too; from jakob@ ok dtucker@
2005-03-31 - (dtucker) [ssh.c] Prevent null pointer deref in port forwarding debugDarren Tucker
message on some platforms. Patch from pete at seebeyond.com via djm.
2005-03-14 - deraadt@cvs.openbsd.org 2005/03/10 22:01:05Darren Tucker
[misc.c ssh-keygen.c servconf.c clientloop.c auth-options.c ssh-add.c monitor.c sftp-client.c bufaux.h hostfile.c ssh.c sshconnect.c channels.c readconf.c bufaux.c sftp.c] spacing
2005-03-02 - jmc@cvs.openbsd.org 2005/03/01 17:22:06Damien Miller
[ssh.c] sync usage() w/ man SYNOPSIS; ok markus@
2005-03-01 - djm@cvs.openbsd.org 2005/03/01 10:09:52Damien Miller
[auth-options.c channels.c channels.h clientloop.c compat.c compat.h] [misc.c misc.h readconf.c readconf.h servconf.c ssh.1 ssh.c ssh_config.5] [sshd_config.5] bz#413: allow optional specification of bind address for port forwardings. Patch originally by Dan Astorian, but worked on by several people Adds GatewayPorts=clientspecified option on server to allow remote forwards to bind to client-specified ports.
2005-03-01 - otto@cvs.openbsd.org 2005/02/16 09:56:44Damien Miller
[ssh.c] Better diagnostic if an identity file is not accesible. ok markus@ djm@
2004-12-03 - jmc@cvs.openbsd.org 2004/11/07 17:57:30Darren Tucker
[ssh.c] usage(): - add -O - sync -S w/ manpage - remove -h
2004-11-07 - djm@cvs.openbsd.org 2004/11/07 00:01:46Darren Tucker
[clientloop.c clientloop.h ssh.1 ssh.c] add basic control of a running multiplex master connection; including the ability to check its status and request it to exit; ok markus@
2004-11-05 - djm@cvs.openbsd.org 2004/09/23 13:00:04Darren Tucker
[ssh.c] correctly honour -n in multiplex client mode; spotted by sturm@ ok markus@
2004-11-05 - deraadt@cvs.openbsd.org 2004/09/15 00:46:01Darren Tucker
[ssh.c] /* fallthrough */ is something a programmer understands. But /* FALLTHROUGH */ is also understood by lint, so that is better.
2004-11-05 - djm@cvs.openbsd.org 2004/09/07 23:41:30Darren Tucker
[clientloop.c ssh.c] cleanup multiplex control socket on SIGHUP too, spotted by sturm@ ok markus@ deraadt@
2004-09-12 - (djm) [ssh.c sshd.c version.h] Don't divulge portable version in protocolDamien Miller
banner. Suggested by deraadt@, ok mouring@, dtucker@
2004-08-29 - dtucker@cvs.openbsd.org 2004/08/23 14:26:38Darren Tucker
[ssh-keysign.c ssh.c] Use permanently_set_uid() in ssh and ssh-keysign for consistency, matches change in Portable; ok markus@ (CVS ID sync only)
2004-08-15 - (dtucker) [Makefile.in ssh-keysign.c ssh.c] Use permanently_set_uid() sinceDarren Tucker
it does the right thing on all platforms. ok djm@
2004-08-12 - markus@cvs.openbsd.org 2004/07/28 09:40:29Darren Tucker
[auth.c auth1.c auth2.c cipher.c cipher.h key.c session.c ssh.c sshconnect1.c] more s/illegal/invalid/
2004-07-17 - deraadt@cvs.openbsd.org 2004/07/11 17:48:47Darren Tucker
[channels.c cipher.c clientloop.c clientloop.h compat.h moduli.c readconf.c nchan.c pathnames.h progressmeter.c readconf.h servconf.c session.c sftp-client.c sftp.c ssh-agent.1 ssh-keygen.c ssh.c ssh1.h sshd.c ttymodes.h] spaces
2004-07-17 - (dtucker) [logintest.c scp.c sftp-server.c sftp.c ssh-add.c ssh-agent.cDarren Tucker
ssh-keygen.c ssh-keyscan.c ssh-keysign.c ssh-rand-helper.c ssh.c sshd.c openbsd-compat/bsd-misc.c] Move "char *__progname" to bsd-misc.c. Reduces diff vs OpenBSD; ok mouring@, tested by tim@ too.
2004-06-24 - dtucker@cvs.openbsd.org 2004/06/23 14:31:01Darren Tucker
[ssh.c] Fix counting in master/slave when passing environment variables; ok djm@
2004-06-22 - avsm@cvs.openbsd.org 2004/06/21 17:36:31Darren Tucker
[auth-rsa.c auth2-gss.c auth2-pubkey.c authfile.c canohost.c channels.c cipher.c dns.c kex.c monitor.c monitor_fdpass.c monitor_wrap.c monitor_wrap.h nchan.c packet.c progressmeter.c scp.c sftp-server.c sftp.c ssh-gss.h ssh-keygen.c ssh.c sshconnect.c sshconnect1.c sshlogin.c sshpty.c] make ssh -Wshadow clean, no functional changes markus@ ok There are also some portable-specific -Wshadow warnings to be fixed in monitor.c and montior_wrap.c.
2004-06-22 - djm@cvs.openbsd.org 2004/06/20 17:36:59Darren Tucker
[ssh.c] filter passed env vars at slave in connection sharing case; ok markus@
2004-06-18 - markus@cvs.openbsd.org 2004/06/18 10:55:43Damien Miller
[ssh.1 ssh.c] trim synopsis for -S, allow -S and -oControlMaster, -MM means 'ask'; ok djm
2004-06-18 - (djm) OpenBSD CVS SyncDamien Miller
- djm@cvs.openbsd.org 2004/06/18 10:40:19 [ssh.c] delay signal handler setup until we have finished talking to the master. allow interrupting of setup (e.g. if master is stuck); ok markus@
2004-06-18 - djm@cvs.openbsd.org 2004/06/17 23:56:57Darren Tucker
[ssh.1 ssh.c] sync usage() and SYNPOSIS with connection sharing changes
2004-06-18 - djm@cvs.openbsd.org 2004/06/17 15:10:14Damien Miller
[clientloop.c misc.h readconf.c readpass.c ssh.c ssh_config.5] Add option for confirmation (ControlMaster=ask) via ssh-askpass before opening shared connections; ok markus@
2004-06-18 - (djm) OpenBSD CVS SyncDamien Miller
- djm@cvs.openbsd.org 2004/06/17 14:52:48 [clientloop.c clientloop.h ssh.c] support environment passing over shared connections; ok markus@
2004-06-15 - (djm) [ssh.c] Use separate var for address lengthDamien Miller