summaryrefslogtreecommitdiffstats
path: root/contrib/Makefile (unfollow)
Commit message (Collapse)AuthorFilesLines
2010-03-03 - (djm) [regress/cert-userkey.sh] s/echo -n/echon/ here tooDamien Miller2-1/+2
2010-03-03 - djm@cvs.openbsd.org 2010/03/02 23:20:57Damien Miller1-4/+20
[ssh-keygen.c] POSIX strptime is stricter than OpenBSD's so do a little dance to appease it.
2010-03-03 - djm@cvs.openbsd.org 2010/03/02 23:20:57Damien Miller1-0/+4
[ssh-keygen.c] POSIX strptime is stricter than OpenBSD's so do a little dance to appease it.
2010-03-03 - otto@cvs.openbsd.org 2010/03/01 11:07:06Damien Miller2-3/+5
[ssh-add.c] zap what seems to be a left-over debug message; ok markus@
2010-03-03 - jmc@cvs.openbsd.org 2010/02/26 22:09:28Damien Miller4-21/+27
[ssh-keygen.1 ssh.1 sshd.8] tweak previous;
2010-03-03 - (djm) [PROTOCOL.certkeys] Add RCS IdentDamien Miller2-0/+5
2010-03-02 - (tim) [config.guess config.sub] Bug 1722: Update to latest versions fromTim Rice3-151/+173
http://git.savannah.gnu.org/gitweb/ (2009-12-30 and 2010-01-22 respectively).
2010-03-01 - (dtucker) [openbsd-compat/port-linux.c] Make failure to write to the OOMDarren Tucker2-4/+7
adjust log at verbose only, since according to cjwatson in bug #1470 some virtualization platforms don't allow writes.
2010-03-01 - (dtucker) [regress/{cert-hostkey,cfgmatch,cipher-speed}.sh} ReplaceDarren Tucker4-7/+11
"echo -n" with "echon" for portability.
2010-02-28 - (tim) [ssh-pkcs11-helper.c] Move declarations before calling functionsTim Rice2-3/+5
to make older compilers (gcc 2.95) happy.
2010-02-28 - (djm) [auth.c] On Cygwin, refuse usernames that have differences inDamien Miller2-0/+20
case from that matched in the system password database. On this platform, passwords are stored case-insensitively, but sshd requires exact case matching for Match blocks in sshd_config(5). Based on a patch from vinschen AT redhat.com.
2010-02-27 - (djm) [openbsd-compat/bsd-cygwin_util.c] Reduce the set of environmentDamien Miller2-10/+3
variables copied into sshd child processes. From vinschen AT redhat.com
2010-02-27- (djm) [ssh-pkcs11-helper.c ] Ensure RNG is initialised and seededDamien Miller2-0/+5
2010-02-26 - djm@cvs.openbsd.org 2010/02/26 20:33:21Damien Miller4-2/+219
[Makefile regress/cert-hostkey.sh regress/cert-userkey.sh] regression tests for certified keys
2010-02-26 - OpenBSD CVS SyncDamien Miller38-188/+2164
- djm@cvs.openbsd.org 2010/02/26 20:29:54 [PROTOCOL PROTOCOL.agent PROTOCOL.certkeys addrmatch.c auth-options.c] [auth-options.h auth.h auth2-pubkey.c authfd.c dns.c dns.h hostfile.c] [hostfile.h kex.h kexdhs.c kexgexs.c key.c key.h match.h monitor.c] [myproposal.h servconf.c servconf.h ssh-add.c ssh-agent.c ssh-dss.c] [ssh-keygen.1 ssh-keygen.c ssh-rsa.c ssh.1 ssh.c ssh2.h sshconnect.c] [sshconnect2.c sshd.8 sshd.c sshd_config.5] Add support for certificate key types for users and hosts. OpenSSH certificate key types are not X.509 certificates, but a much simpler format that encodes a public key, identity information and some validity constraints and signs it with a CA key. CA keys are regular SSH keys. This certificate style avoids the attack surface of X.509 certificates and is very easy to deploy. Certified host keys allow automatic acceptance of new host keys when a CA certificate is marked as sh/known_hosts. see VERIFYING HOST KEYS in ssh(1) for details. Certified user keys allow authentication of users when the signing CA key is marked as trusted in authorized_keys. See "AUTHORIZED_KEYS FILE FORMAT" in sshd(8) for details. Certificates are minted using ssh-keygen(1), documentation is in the "CERTIFICATES" section of that manpage. Documentation on the format of certificates is in the file PROTOCOL.certkeys feedback and ok markus@
2010-02-24contrib/caldera/openssh.specDamien Miller4-1/+9
contrib/redhat/openssh.spec contrib/suse/openssh.spec
2010-02-24 - (djm) [Makefile.in ssh-pkcs11-helper.8] Add manpage for PKCS#11 helperDamien Miller3-3/+49