summaryrefslogtreecommitdiff
path: root/ssh_config.5
AgeCommit message (Collapse)Author
2008-11-03 - stevesk@cvs.openbsd.org 2008/10/17 18:36:24Damien Miller
[ssh_config.5] correct and clarify VisualHostKey; ok jmc@
2008-11-03 - stevesk@cvs.openbsd.org 2008/10/10 16:43:27Damien Miller
[ssh_config.5] use 'Privileged ports can be forwarded only when logging in as root on the remote machine.' for RemoteForward just like ssh.1 -R. ok djm@ jmc@
2008-11-03 - krw@cvs.openbsd.org 2008/08/02 04:29:51Damien Miller
[ssh_config.5] whitepsace -> whitespace. From Matthew Clarke via bugs@.
2008-06-30 - grunk@cvs.openbsd.org 2008/06/26 11:46:31Damien Miller
[readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c] Move SSH Fingerprint Visualization away from sharing the config option CheckHostIP to an own config option named VisualHostKey. While there, fix the behaviour that ssh would draw a random art picture on every newly seen host even when the option was not enabled. prodded by deraadt@, discussions, help and ok markus@ djm@ dtucker@
2008-06-13 - jmc@cvs.openbsd.org 2008/06/12 19:10:09Darren Tucker
[ssh_config.5 ssh-keygen.1] tweak the ascii art text; ok grunk
2008-06-13 - dtucker@cvs.openbsd.org 2008/06/12 16:35:31Darren Tucker
[ssh_config.5 ssh.c] keyword expansion for localcommand. ok djm@
2008-06-13 - grunk@cvs.openbsd.org 2008/06/11 23:03:56Darren Tucker
[ssh_config.5] CheckHostIP set to ``fingerprint'' will display both hex and random art spotted by naddy@
2008-06-13 - grunk@cvs.openbsd.org 2008/06/11 21:01:35Darren Tucker
[ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c sshconnect.c] Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the graphical hash visualization schemes known as "random art", and by Dan Kaminsky's musings on the subject during a BlackOp talk at the 23C3 in Berlin. Scientific publication (original paper): "Hash Visualization: a New Technique to improve Real-World Security", Perrig A. and Song D., 1999, International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99) http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf The algorithm used here is a worm crawling over a discrete plane, leaving a trace (augmenting the field) everywhere it goes. Movement is taken from dgst_raw 2bit-wise. Bumping into walls makes the respective movement vector be ignored for this turn, thus switching to the other color of the chessboard. Graphs are not unambiguous for now, because circles in graphs can be walked in either direction. discussions with several people, help, corrections and ok markus@ djm@
2008-06-11 - dtucker@cvs.openbsd.org 2008/06/10 18:21:24Darren Tucker
[ssh_config.5] clarify that Host patterns are space-separated. ok deraadt
2007-12-02 - jmc@cvs.openbsd.org 2007/10/29 07:48:19Darren Tucker
[ssh_config.5] clean up after previous macro removal;
2007-12-02 - dtucker@cvs.openbsd.org 2007/10/29 06:51:59Darren Tucker
[ssh_config.5] ProxyCommand and LocalCommand use the user's shell, not /bin/sh; ok djm@
2007-10-26 - djm@cvs.openbsd.org 2007/09/21 03:05:23Damien Miller
[ssh_config.5] document KbdInteractiveAuthentication in ssh_config.5; patch from dkg AT fifthhorseman.net
2007-08-15 - stevesk@cvs.openbsd.org 2007/08/15 12:13:41Darren Tucker
[ssh_config.5] tun device forwarding now honours ExitOnForwardFailure; ok markus@
2007-06-11 - jmc@cvs.openbsd.org 2007/06/08 07:43:46Damien Miller
[ssh_config.5] put the MAC list into a display, like we do for ciphers, since groff has trouble handling wide lines;
2007-06-11 - pvalchev@cvs.openbsd.org 2007/06/07 19:37:34Damien Miller
[kex.h mac.c mac.h monitor_wrap.c myproposal.h packet.c ssh.1] [ssh_config.5 sshd.8 sshd_config.5] Add a new MAC algorithm for data integrity, UMAC-64 (not default yet, must specify umac-64@openssh.com). Provides about 20% end-to-end speedup compared to hmac-md5. Represents a different approach to message authentication to that of HMAC that may be beneficial if HMAC based on one of its underlying hash algorithms is found to be vulnerable to a new attack. http://www.ietf.org/rfc/rfc4418.txt in conjunction with and OK djm@
2007-06-05 - jmc@cvs.openbsd.org 2007/05/31 19:20:16Darren Tucker
[scp.1 ssh_config.5 sftp-server.8 ssh-agent.1 sshd_config.5 sftp.1 ssh-keygen.1 ssh-keyscan.1 ssh-add.1 sshd.8 ssh.1 ssh-keysign.8] convert to new .Dd format; (We will need to teach mdoc2man.awk to understand this too.)
2007-02-19 - jmc@cvs.openbsd.org 2007/01/10 13:23:22Darren Tucker
[ssh_config.5] do not use a list for SYNOPSIS; this is actually part of a larger report sent by eric s. raymond and forwarded by brad, but i only read half of it. spotted by brad.
2006-08-05 - jmc@cvs.openbsd.org 2006/07/27 08:00:50Damien Miller
[ssh_config.5] avoid confusing wording in HashKnownHosts: originally spotted by alan amesbury; ok deraadt
2006-07-12 - markus@cvs.openbsd.org 2006/07/11 18:50:48Darren Tucker
[clientloop.c ssh.1 ssh.c channels.c ssh_config.5 readconf.h session.c channels.h readconf.c] add ExitOnForwardFailure: terminate the connection if ssh(1) cannot set up all requested dynamic, local, and remote port forwardings. ok djm, dtucker, stevesk, jmc
2006-07-10 - stevesk@cvs.openbsd.org 2006/07/02 17:12:58Damien Miller
[ssh.1 ssh.c ssh_config.5 sshd_config.5] more details and clarity for tun(4) device forwarding; ok and help jmc@
2006-06-13 - jmc@cvs.openbsd.org 2006/05/29 16:10:03Damien Miller
[ssh_config.5] oops - previous was too long; split the list of auths up
2006-06-13 - dtucker@cvs.openbsd.org 2006/05/29 12:54:08Damien Miller
[ssh_config.5] Add gssapi-with-mic to PreferredAuthentications default list; ok jmc
2006-03-31 - djm@cvs.openbsd.org 2006/03/31 09:13:56Damien Miller
[ssh_config.5] remote user escape is %r not %h; spotted by jmc@
2006-03-31 - jmc@cvs.openbsd.org 2006/03/31 09:09:30Damien Miller
[ssh_config.5] kill trailing whitespace;
2006-03-31 - djm@cvs.openbsd.org 2006/03/30 10:41:25Damien Miller
[ssh.c ssh_config.5] add percent escape chars to the IdentityFile option, bz #1159 based on a patch by imaging AT math.ualberta.ca; feedback and ok dtucker@
2006-03-15 - markus@cvs.openbsd.org 2006/03/14 16:32:48Damien Miller
[ssh_config.5 sshd_config.5] *AliveCountMax applies to protcol v2 only; ok dtucker, djm
2006-03-15 - dtucker@cvs.openbsd.org 2006/03/13 10:14:29Damien Miller
[misc.c ssh_config.5 sshd_config.5] Allow config directives to contain whitespace by surrounding them by double quotes. mindrot #482, man page help from jmc@, ok djm@
2006-03-15 - jmc@cvs.openbsd.org 2006/02/26 18:03:10Damien Miller
[ssh_config.5] comma;
2006-03-15 - jmc@cvs.openbsd.org 2006/02/26 17:17:18Damien Miller
[ssh_config.5] move PATTERNS to the end of the main body; requested by dtucker
2006-03-15 - jmc@cvs.openbsd.org 2006/02/25 12:26:17Damien Miller
[ssh_config.5] document the possible values for KbdInteractiveDevices;
2006-03-15 - jmc@cvs.openbsd.org 2006/02/24 23:20:07Damien Miller
[ssh_config.5] some grammar/wording fixes;
2006-03-15 - jmc@cvs.openbsd.org 2006/02/24 20:31:31Damien Miller
[ssh.1 ssh_config.5 sshd.8 sshd_config.5] more consistency fixes;
2006-03-15 - jmc@cvs.openbsd.org 2006/02/24 20:22:16Damien Miller
[ssh-keysign.8 ssh_config.5 sshd_config.5] some consistency fixes;
2006-03-15 - jmc@cvs.openbsd.org 2006/02/24 10:37:07Damien Miller
[ssh_config.5] tidy up the refs to PATTERNS;
2006-03-15 - jmc@cvs.openbsd.org 2006/02/24 10:25:14Damien Miller
[ssh_config.5] add section on patterns; from dtucker + myself
2006-03-15 - jmc@cvs.openbsd.org 2006/02/19 20:12:25Damien Miller
[ssh_config.5] add some vertical space;
2006-03-15 - jmc@cvs.openbsd.org 2006/02/12 10:49:44Damien Miller
[ssh_config.5] slight rewording; ok djm
2006-03-15 - djm@cvs.openbsd.org 2006/02/12 06:45:34Damien Miller
[ssh.c ssh_config.5] add a %l expansion code to the ControlPath, which is filled in with the local hostname at runtime. Requested by henning@ to avoid some problems with /home on NFS; ok dtucker@
2006-01-31 - jmc@cvs.openbsd.org 2006/01/20 11:21:45Damien Miller
[ssh_config.5] - word change, agreed w/ markus - consistency fixes
2006-01-20 - dtucker@cvs.openbsd.org 2006/01/20 00:14:55Darren Tucker
[scp.1 ssh.1 ssh_config.5 sftp.1] Document RekeyLimit. Based on patch from jan.iven at cern.ch from mindrot #1056 with feedback from jmc, djm and markus; ok jmc@ djm@
2006-01-14 - jmc@cvs.openbsd.org 2006/01/12 22:26:02Damien Miller
[ssh_config.5] refer to TCP forwarding, rather than TCP/IP forwarding;
2006-01-03 - (djm) OpenBSD CVS SyncDamien Miller
- jmc@cvs.openbsd.org 2006/01/02 17:09:49 [ssh_config.5 sshd_config.5] some corrections from michael knudsen;
2005-12-24 - jmc@cvs.openbsd.org 2005/12/22 10:31:40Damien Miller
[ssh_config.5] put the description of "UsePrivilegedPort" in the correct place;
2005-12-20 - stevesk@cvs.openbsd.org 2005/12/17 21:36:42Darren Tucker
[ssh_config.5] spelling: intented -> intended
2005-12-20 - stevesk@cvs.openbsd.org 2005/12/17 21:13:05Darren Tucker
[ssh_config.5 session.c] spelling: fowarding, fowarded
2005-12-13 - jmc@cvs.openbsd.org 2005/12/08 21:37:50Damien Miller
[ssh_config.5] new sentence, new line;
2005-12-13 - reyk@cvs.openbsd.org 2005/12/08 18:34:11Damien Miller
[auth-options.c includes.h misc.c misc.h readconf.c servconf.c] [serverloop.c ssh.c ssh_config.5 sshd_config.5 configure.ac] two changes to the new ssh tunnel support. this breaks compatibility with the initial commit but is required for a portable approach. - make the tunnel id u_int and platform friendly, use predefined types. - support configuration of layer 2 (ethernet) or layer 3 (point-to-point, default) modes. configuration is done using the Tunnel (yes|point-to-point|ethernet|no) option is ssh_config(5) and restricted by the PermitTunnel (yes|point-to-point|ethernet|no) option in sshd_config(5). ok djm@, man page bits by jmc@
2005-12-13 - jmc@cvs.openbsd.org 2005/12/08 15:06:29Damien Miller
[ssh_config.5] keep options in order;
2005-12-13 - jmc@cvs.openbsd.org 2005/12/08 14:59:44Damien Miller
[ssh.1 ssh_config.5] make `!command' a little clearer; ok reyk
2005-12-13 - reyk@cvs.openbsd.org 2005/12/06 22:38:28Damien Miller
[auth-options.c auth-options.h channels.c channels.h clientloop.c] [misc.c misc.h readconf.c readconf.h scp.c servconf.c servconf.h] [serverloop.c sftp.c ssh.1 ssh.c ssh_config ssh_config.5 sshconnect.c] [sshconnect.h sshd.8 sshd_config sshd_config.5] Add support for tun(4) forwarding over OpenSSH, based on an idea and initial channel code bits by markus@. This is a simple and easy way to use OpenSSH for ad hoc virtual private network connections, e.g. administrative tunnels or secure wireless access. It's based on a new ssh channel and works similar to the existing TCP forwarding support, except that it depends on the tun(4) network interface on both ends of the connection for layer 2 or layer 3 tunneling. This diff also adds support for LocalCommand in the ssh(1) client. ok djm@, markus@, jmc@ (manpages), tested and discussed with others