History log of /openbsd/usr.bin/ssh/sshd_config (Results 76 – 100 of 104)
Revision Date Author Comments
# 26cbb3ff 03-Feb-2001 markus <markus@openbsd.org>

make ReverseMappingCheck optional in sshd_config; ok djm@,dugsong@


# e04d4d00 02-Feb-2001 deraadt <deraadt@openbsd.org>

point at sshd(8) and ssh(1)


# d4e7c603 29-Jan-2001 niklas <niklas@openbsd.org>

$OpenBSD$


# 0147faa9 13-Jan-2001 markus <markus@openbsd.org>

oops


# dab2ecfa 13-Jan-2001 markus <markus@openbsd.org>

support supplementary group in {Allow,Deny}Groups
from stevesk@pobox.com


# eb25b263 08-Jan-2001 markus <markus@openbsd.org>

implement option 'Banner /etc/issue.net' for ssh2, move version to
2.3.1 (needed for bugcompat detection, 2.3.0 would fail if Banner
is enabled).


# b9e7ebc8 15-Nov-2000 markus <markus@openbsd.org>

add entry for HostKey /etc/ssh_host_dsa_key, and comment for ssh-2 rsa keys


# 34713819 12-Nov-2000 markus <markus@openbsd.org>

add support for RSA to SSH2. please test.

there are now 3 types of keys: RSA1 is used by ssh-1 only,
RSA and DSA are used by SSH2.

you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA

add support for RSA to SSH2. please test.

there are now 3 types of keys: RSA1 is used by ssh-1 only,
RSA and DSA are used by SSH2.

you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA
keys for SSH2 and use the RSA keys for hostkeys or for user keys.

SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before.

IdentityFile2, HostDsaKey and DSAAuthentication are obsolete.
you can use multiple IdentityFile and HostKey for all types of keys.

the option DSAAuthentication is replaced by PubkeyAuthetication.

show more ...


# 405b073c 11-Oct-2000 markus <markus@openbsd.org>

add support for s/key (kbd-interactive) to ssh2, based on work by mkiernan@avantgo.com and me


# b66fbe9e 31-Aug-2000 markus <markus@openbsd.org>

implement a SFTP server. interops with sftp2, scp2 and the windows
client from ssh.com


# ba8af415 04-Aug-2000 markus <markus@openbsd.org>

MaxStartups


# 554d4eca 22-Jul-2000 markus <markus@openbsd.org>

random early drop; ok theo, niels


# 8af8e4c2 17-Jun-2000 jakob <jakob@openbsd.org>

add support for ssh v2 subsystems. ok markus@.


# 5d5c64a5 17-Apr-2000 todd <todd@openbsd.org>

show 'Protocol' as an example, ok markus@


# 1d2eb45a 04-Jan-2000 markus <markus@openbsd.org>

ipv6 support: mostly gethostbyname->getaddrinfo/getnameinfo, new features:
sshd allows multiple ListenAddress and Port options. note that libwrap is
not IPv6-ready. (based on patches from fujiwara@r

ipv6 support: mostly gethostbyname->getaddrinfo/getnameinfo, new features:
sshd allows multiple ListenAddress and Port options. note that libwrap is
not IPv6-ready. (based on patches from fujiwara@rcac.tdi.co.jp)

show more ...


# 547aa377 11-Nov-1999 markus <markus@openbsd.org>

IgnoreUserKnownHosts(default=no), used for RhostRSAAuth, ok deraadt,millert


# f3aefa53 10-Nov-1999 markus <markus@openbsd.org>

add LogLevel {QUIET, FATAL, ERROR, INFO, CHAT, DEBUG} to ssh/sshd,
obsoletes QuietMode and FascistLogging in sshd.


# aa196a67 17-Oct-1999 dugsong <dugsong@openbsd.org>

remove AllowHosts, DenyHosts, SilentDeny server access control cruft - replace with LIBWRAP moved to child. ok markus@ deraat@


# 63a857bd 11-Oct-1999 markus <markus@openbsd.org>

UseLogin, default=no, from kpa@gmx.net, ok deraadt@


# 498ce403 07-Oct-1999 markus <markus@openbsd.org>

You have Mail. Email fuer Dich. Karsten Patzwaldt <kpa@gmx.net> default=no


# 2cbe402d 07-Oct-1999 markus <markus@openbsd.org>

add skey to sshd:

1) pass *pw to auth_password() not user_name, do_authentication already
keeps private copy of struct passwd for current user.
2) limit authentication attemps to 5, otherwise

add skey to sshd:

1) pass *pw to auth_password() not user_name, do_authentication already
keeps private copy of struct passwd for current user.
2) limit authentication attemps to 5, otherwise
ssh -o 'NumberOfPasswordPrompts 100000' host
lets you enter 100000 passwds
3) make s/key a run-time option in /etc/sshd_config
4) generate fake skeys,
for s/key for nonexisting users, too
limit auth-tries for nonexisting users, too.
Note that
% ssh -l nonexisting-user -o 'NumberOfPasswordPrompts 100000' host
has NO limits in ssh-1.2.27

show more ...


# 174e91d4 04-Oct-1999 deraadt <deraadt@openbsd.org>

nicer default


# 9f660971 01-Oct-1999 deraadt <deraadt@openbsd.org>

randomseed is really gone now


# ee396a25 29-Sep-1999 deraadt <deraadt@openbsd.org>

show other krb options


# b4a66c4c 28-Sep-1999 deraadt <deraadt@openbsd.org>

PasswordAuthentication on by default


12345