summaryrefslogtreecommitdiff
path: root/ssh.c
AgeCommit message (Collapse)Author
2006-03-15 - (djm) [auth-pam.c clientloop.c includes.h monitor.c session.c]Damien Miller
[sftp-client.c ssh-keysign.c ssh.c sshconnect.c sshconnect2.c] [sshd.c openbsd-compat/bsd-misc.c openbsd-compat/bsd-openpty.c] [openbsd-compat/glob.c openbsd-compat/mktemp.c] [openbsd-compat/readpassphrase.c] Lots of include fixes for OpenSolaris
2006-03-15 - djm@cvs.openbsd.org 2006/03/12 04:23:07Damien Miller
[ssh.c] knf nit
2006-03-15 - stevesk@cvs.openbsd.org 2006/02/22 00:04:45Damien Miller
[canohost.c clientloop.c includes.h match.c readconf.c scp.c ssh.c] [sshconnect.c] move #include <ctype.h> out of includes.h; ok djm@
2006-03-15oops, this commit is really:Damien Miller
- stevesk@cvs.openbsd.org 2006/02/20 17:02:44 [clientloop.c includes.h monitor.c progressmeter.c scp.c] [serverloop.c session.c sftp.c ssh-agent.c ssh.c sshd.c] move #include <signal.h> out of includes.h; ok markus@ the previous was: - stevesk@cvs.openbsd.org 2006/02/20 17:19:54 [auth-rhosts.c auth-rsa.c auth.c auth2-none.c auth2-pubkey.c] [authfile.c clientloop.c includes.h readconf.c scp.c session.c] [sftp-client.c sftp-common.c sftp-common.h sftp-glob.c] [sftp-server.c sftp.c ssh-add.c ssh-keygen.c ssh.c sshconnect.c] [sshconnect2.c sshd.c sshpty.c] move #include <sys/stat.h> out of includes.h; ok markus@
2006-03-15 - stevesk@cvs.openbsd.org 2006/02/20 17:02:44Damien Miller
[clientloop.c includes.h monitor.c progressmeter.c scp.c] [serverloop.c session.c sftp.c ssh-agent.c ssh.c sshd.c] move #include <signal.h> out of includes.h; ok markus@
2006-03-15 - stevesk@cvs.openbsd.org 2006/02/20 16:36:15Damien Miller
[authfd.c channels.c includes.h session.c ssh-agent.c ssh.c] move #include <sys/un.h> out of includes.h; ok djm@
2006-03-15 - djm@cvs.openbsd.org 2006/02/12 06:45:34Damien Miller
[ssh.c ssh_config.5] add a %l expansion code to the ControlPath, which is filled in with the local hostname at runtime. Requested by henning@ to avoid some problems with /home on NFS; ok dtucker@
2006-03-15 - stevesk@cvs.openbsd.org 2006/02/10 00:27:13Damien Miller
[channels.c clientloop.c includes.h misc.c progressmeter.c sftp.c] [ssh.c sshd.c sshpty.c] move #include <sys/ioctl.h> out of includes.h; ok markus@
2006-03-15 - stevesk@cvs.openbsd.org 2006/02/08 14:31:30Damien Miller
[includes.h ssh-agent.c ssh-keyscan.c ssh.c] move #include <sys/resource.h> out of includes.h; ok markus@
2006-03-15 - stevesk@cvs.openbsd.org 2006/02/08 12:15:27Damien Miller
[auth.c clientloop.c includes.h misc.c monitor.c readpass.c] [session.c sftp.c ssh-agent.c ssh-keysign.c ssh.c sshconnect.c] [sshd.c sshpty.c] move #include <paths.h> out of includes.h; ok markus@
2005-12-31 - (djm) [openbsd-compat/port-tun.c openbsd-compat/port-tun.h configure.ac]Damien Miller
[serverloop.c ssh.c openbsd-compat/Makefile.in] [openbsd-compat/openbsd-compat.h] Implement tun(4) forwarding compatability support for Linux, diff from reyk@
2005-12-20 - dtucker@cvs.openbsd.org 2005/12/20 04:41:07Darren Tucker
[ssh.c] exit(255) on error to match description in ssh(1); bz #1137; ok deraadt@
2005-12-13 - reyk@cvs.openbsd.org 2005/12/08 18:34:11Damien Miller
[auth-options.c includes.h misc.c misc.h readconf.c servconf.c] [serverloop.c ssh.c ssh_config.5 sshd_config.5 configure.ac] two changes to the new ssh tunnel support. this breaks compatibility with the initial commit but is required for a portable approach. - make the tunnel id u_int and platform friendly, use predefined types. - support configuration of layer 2 (ethernet) or layer 3 (point-to-point, default) modes. configuration is done using the Tunnel (yes|point-to-point|ethernet|no) option is ssh_config(5) and restricted by the PermitTunnel (yes|point-to-point|ethernet|no) option in sshd_config(5). ok djm@, man page bits by jmc@
2005-12-13 - reyk@cvs.openbsd.org 2005/12/06 22:38:28Damien Miller
[auth-options.c auth-options.h channels.c channels.h clientloop.c] [misc.c misc.h readconf.c readconf.h scp.c servconf.c servconf.h] [serverloop.c sftp.c ssh.1 ssh.c ssh_config ssh_config.5 sshconnect.c] [sshconnect.h sshd.8 sshd_config sshd_config.5] Add support for tun(4) forwarding over OpenSSH, based on an idea and initial channel code bits by markus@. This is a simple and easy way to use OpenSSH for ad hoc virtual private network connections, e.g. administrative tunnels or secure wireless access. It's based on a new ssh channel and works similar to the existing TCP forwarding support, except that it depends on the tun(4) network interface on both ends of the connection for layer 2 or layer 3 tunneling. This diff also adds support for LocalCommand in the ssh(1) client. ok djm@, markus@, jmc@ (manpages), tested and discussed with others
2005-11-05 - djm@cvs.openbsd.org 2005/10/30 08:52:18Damien Miller
[clientloop.c packet.c serverloop.c session.c ssh-agent.c ssh-keygen.c] [ssh.c sshconnect.c sshconnect1.c sshd.c] no need to escape single quotes in comments, no binary change
2005-11-05 - djm@cvs.openbsd.org 2005/10/30 04:03:24Damien Miller
[ssh.c] fix misleading debug message; ok dtucker@
2005-11-05 - stevesk@cvs.openbsd.org 2005/10/14 02:17:59Damien Miller
[ssh-keygen.c ssh.c sshconnect2.c] no trailing "\n" for log functions; ok djm@
2005-10-03 - jmc@cvs.openbsd.org 2005/09/19 15:42:44Darren Tucker
[ssh.c] update -D usage here too;
2005-10-03 - djm@cvs.openbsd.org 2005/09/13 23:40:07Darren Tucker
[sshd.c ssh.c misc.h sftp.c ssh-keygen.c ssh-keysign.c sftp-server.c scp.c misc.c ssh-keyscan.c ssh-add.c ssh-agent.c] ensure that stdio fds are attached; ok deraadt@
2005-08-12 - djm@cvs.openbsd.org 2005/07/30 01:26:16Damien Miller
[ssh.c] fix -D listen_host initialisation, so it picks up gateway_ports setting correctly
2005-07-17 - djm@cvs.openbsd.org 2005/07/16 01:35:24Damien Miller
[auth1.c channels.c cipher.c clientloop.c kex.c session.c ssh.c] [sshconnect.c] spacing
2005-07-06 - djm@cvs.openbsd.org 2005/07/04 00:58:43Damien Miller
[channels.c clientloop.c clientloop.h misc.c misc.h ssh.c ssh_config.5] implement support for X11 and agent forwarding over multiplex slave connections. Because of protocol limitations, the slave connections inherit the master's DISPLAY and SSH_AUTH_SOCK rather than distinctly forwarding their own. ok dtucker@ "put it in" deraadt@
2005-06-26 - djm@cvs.openbsd.org 2005/06/25 22:47:49Damien Miller
[ssh.c] do the default port filling code a few lines earlier, so it really does fix %p
2005-06-26 - djm@cvs.openbsd.org 2005/06/18 04:30:36Damien Miller
[ssh.c ssh_config.5] allow ControlPath=none, patch from dwmw2 AT infradead.org; ok dtucker@
2005-06-26 - (djm) OpenBSD CVS SyncDamien Miller
- djm@cvs.openbsd.org 2005/06/17 22:53:47 [ssh.c sshconnect.c] Fix ControlPath's %p expanding to "0" for a default port, spotted dwmw2 AT infradead.org; ok markus@
2005-06-17 - (djm) OpenBSD CVS SyncDamien Miller
- djm@cvs.openbsd.org 2005/06/16 03:38:36 [channels.c channels.h clientloop.c clientloop.h ssh.c] move x11_get_proto from ssh.c to clientloop.c, to make muliplexed xfwd easier later; ok deraadt@
2005-06-16 - djm@cvs.openbsd.org 2005/06/08 11:25:09Damien Miller
[clientloop.c readconf.c readconf.h ssh.c ssh_config.5] add ControlMaster=auto/autoask options to support opportunistic multiplexing; tested avsm@ and jakob@, ok markus@
2005-06-16 - djm@cvs.openbsd.org 2005/06/06 11:20:36Damien Miller
[auth.c auth.h misc.c misc.h ssh.c ssh_config.5 sshconnect.c] introduce a generic %foo expansion function. replace existing % expansion and add expansion to ControlPath; ok markus@
2005-06-01 - djm@cvs.openbsd.org 2005/05/27 08:30:37Darren Tucker
[ssh.c] fix -O for cases where no ControlPath has been specified or socket at ControlPath is not contactable; spotted by and ok avsm@
2005-05-26 - djm@cvs.openbsd.org 2005/05/10 10:30:43Damien Miller
[ssh.c] report real errors on fallback from ControlMaster=no to normal connect
2005-05-26 - djm@cvs.openbsd.org 2005/05/10 10:28:11Damien Miller
[ssh.c] print nice error message for EADDRINUSE as well (ID sync only)
2005-05-26 - jakob@cvs.openbsd.org 2005/04/26 13:08:37Damien Miller
[ssh.c ssh_config.5] fallback gracefully if client cannot connect to ControlPath. ok djm@
2005-05-26 - djm@cvs.openbsd.org 2005/04/21 11:47:19Damien Miller
[ssh.c] don't allocate a pty when -n flag (/dev/null stdin) is set, patch from ignasi.roca AT fujitsu-siemens.com (bz #829); ok dtucker@
2005-05-26 - dtucker@cvs.openbsd.org 2005/04/06 12:26:06Damien Miller
[ssh.c] Fix debug call for port forwards; patch from pete at seebeyond.com, ok djm@ (ID sync only - change already in portable)
2005-05-04 - (djm) [ssh.c] some systems return EADDRINUSE on a bind to an already-usedDamien Miller
unix domain socket, so catch that too; from jakob@ ok dtucker@
2005-03-31 - (dtucker) [ssh.c] Prevent null pointer deref in port forwarding debugDarren Tucker
message on some platforms. Patch from pete at seebeyond.com via djm.
2005-03-14 - deraadt@cvs.openbsd.org 2005/03/10 22:01:05Darren Tucker
[misc.c ssh-keygen.c servconf.c clientloop.c auth-options.c ssh-add.c monitor.c sftp-client.c bufaux.h hostfile.c ssh.c sshconnect.c channels.c readconf.c bufaux.c sftp.c] spacing
2005-03-02 - jmc@cvs.openbsd.org 2005/03/01 17:22:06Damien Miller
[ssh.c] sync usage() w/ man SYNOPSIS; ok markus@
2005-03-01 - djm@cvs.openbsd.org 2005/03/01 10:09:52Damien Miller
[auth-options.c channels.c channels.h clientloop.c compat.c compat.h] [misc.c misc.h readconf.c readconf.h servconf.c ssh.1 ssh.c ssh_config.5] [sshd_config.5] bz#413: allow optional specification of bind address for port forwardings. Patch originally by Dan Astorian, but worked on by several people Adds GatewayPorts=clientspecified option on server to allow remote forwards to bind to client-specified ports.
2005-03-01 - otto@cvs.openbsd.org 2005/02/16 09:56:44Damien Miller
[ssh.c] Better diagnostic if an identity file is not accesible. ok markus@ djm@
2004-12-03 - jmc@cvs.openbsd.org 2004/11/07 17:57:30Darren Tucker
[ssh.c] usage(): - add -O - sync -S w/ manpage - remove -h
2004-11-07 - djm@cvs.openbsd.org 2004/11/07 00:01:46Darren Tucker
[clientloop.c clientloop.h ssh.1 ssh.c] add basic control of a running multiplex master connection; including the ability to check its status and request it to exit; ok markus@
2004-11-05 - djm@cvs.openbsd.org 2004/09/23 13:00:04Darren Tucker
[ssh.c] correctly honour -n in multiplex client mode; spotted by sturm@ ok markus@
2004-11-05 - deraadt@cvs.openbsd.org 2004/09/15 00:46:01Darren Tucker
[ssh.c] /* fallthrough */ is something a programmer understands. But /* FALLTHROUGH */ is also understood by lint, so that is better.
2004-11-05 - djm@cvs.openbsd.org 2004/09/07 23:41:30Darren Tucker
[clientloop.c ssh.c] cleanup multiplex control socket on SIGHUP too, spotted by sturm@ ok markus@ deraadt@
2004-09-12 - (djm) [ssh.c sshd.c version.h] Don't divulge portable version in protocolDamien Miller
banner. Suggested by deraadt@, ok mouring@, dtucker@
2004-08-29 - dtucker@cvs.openbsd.org 2004/08/23 14:26:38Darren Tucker
[ssh-keysign.c ssh.c] Use permanently_set_uid() in ssh and ssh-keysign for consistency, matches change in Portable; ok markus@ (CVS ID sync only)
2004-08-15 - (dtucker) [Makefile.in ssh-keysign.c ssh.c] Use permanently_set_uid() sinceDarren Tucker
it does the right thing on all platforms. ok djm@
2004-08-12 - markus@cvs.openbsd.org 2004/07/28 09:40:29Darren Tucker
[auth.c auth1.c auth2.c cipher.c cipher.h key.c session.c ssh.c sshconnect1.c] more s/illegal/invalid/
2004-07-17 - deraadt@cvs.openbsd.org 2004/07/11 17:48:47Darren Tucker
[channels.c cipher.c clientloop.c clientloop.h compat.h moduli.c readconf.c nchan.c pathnames.h progressmeter.c readconf.h servconf.c session.c sftp-client.c sftp.c ssh-agent.1 ssh-keygen.c ssh.c ssh1.h sshd.c ttymodes.h] spaces