History log of /openbsd/usr.bin/ssh/packet.h (Results 26 – 50 of 99)
Revision Date Author Comments
# ec610c87 11-Oct-2016 djm <djm@openbsd.org>

Add a per-packet input hook that is called with the decrypted packet
contents. This will be used for fuzzing; ok markus@


# e5d05752 30-Sep-2016 markus <markus@openbsd.org>

ssh proxy mux mode (-O proxy; idea from Simon Tatham):
- mux client speaks the ssh-packet protocol directly over unix-domain socket.
- mux server acts as a proxy, translates channel IDs and relays to

ssh proxy mux mode (-O proxy; idea from Simon Tatham):
- mux client speaks the ssh-packet protocol directly over unix-domain socket.
- mux server acts as a proxy, translates channel IDs and relays to the server.
- no filedescriptor passing necessary.
- combined with unix-domain forwarding it's even possible to run mux client
and server on different machines.
feedback & ok djm@

show more ...


# 3095060f 28-Sep-2016 djm <djm@openbsd.org>

Remove support for pre-authentication compression. Doing compression
early in the protocol probably seemed reasonable in the 1990s, but
today it's clearly a bad idea in terms of both cryptography (cf

Remove support for pre-authentication compression. Doing compression
early in the protocol probably seemed reasonable in the 1990s, but
today it's clearly a bad idea in terms of both cryptography (cf.
multiple compression oracle attacks in TLS) and attack surface.

Moreover, to support it across privilege-separation zlib needed
the assistance of a complex shared-memory manager that made the
required attack surface considerably larger.

Prompted by Guido Vranken pointing out a compiler-elided security
check in the shared memory manager found by Stack
(http://css.csail.mit.edu/stack/); ok deraadt@ markus@

NB. pre-auth authentication has been disabled by default in sshd
for >10 years.

show more ...


# 1667b834 07-Mar-2016 djm <djm@openbsd.org>

refactor canohost.c: move functions that cache results closer to the
places that use them (authn and session code). After this, no state is
cached in canohost.c

feedback and ok markus@


# 5dce5bc0 08-Feb-2016 djm <djm@openbsd.org>

refactor activation of rekeying

This makes automatic rekeying internal to the packet code (previously
the server and client loops needed to assist). In doing to it makes
application of rekey limits

refactor activation of rekeying

This makes automatic rekeying internal to the packet code (previously
the server and client loops needed to assist). In doing to it makes
application of rekey limits more accurate by accounting for packets
about to be sent as well as packets queued during rekeying events
themselves.

Based on a patch from dtucker@ which was in turn based on a patch
Aleksander Adamowski in bz#2521; ok markus@

show more ...


# f4a3b94f 29-Jan-2016 dtucker <dtucker@openbsd.org>

Allow RekeyLimits in excess of 4G up to 2**63 bits (limited by the return
type of scan_scaled). Part of bz#2521, ok djm.


# 9068ae8f 14-Jan-2016 markus <markus@openbsd.org>

remove roaming support; ok djm@


# 244854f5 11-Dec-2015 djm <djm@openbsd.org>

include remote port number in a few more messages; makes tying log
messages together into a session a bit easier; bz#2503 ok dtucker@


# 7b0d3b43 30-Jan-2015 djm <djm@openbsd.org>

avoid more fatal/exit in the packet.c paths that ssh-keyscan
uses; feedback and "looks good" markus@


# 42dab86d 28-Jan-2015 djm <djm@openbsd.org>

avoid fatal() calls in packet code
makes ssh-keyscan more reliable against server failures
ok dtucker@ markus@


# d9c3c4c1 19-Jan-2015 markus <markus@openbsd.org>

add experimental api for packet layer; ok djm@


# b4c826f7 19-Jan-2015 markus <markus@openbsd.org>

move dispatch to struct ssh; ok djm@


# 8eeb9388 19-Jan-2015 markus <markus@openbsd.org>

update packet.c & isolate, introduce struct ssh
a) switch packet.c to buffer api and isolate per-connection info into struct ssh
b) (de)serialization of the state is moved from monitor to packet.c
c)

update packet.c & isolate, introduce struct ssh
a) switch packet.c to buffer api and isolate per-connection info into struct ssh
b) (de)serialization of the state is moved from monitor to packet.c
c) the old packet.c API is implemented in opacket.[ch]
d) compress.c/h is removed and integrated into packet.c
with and ok djm@

show more ...


# 87f0df62 03-May-2014 markus <markus@openbsd.org>

unbreak compression, by re-init-ing the compression code in the
post-auth child. the new buffer code is more strict, and requires
buffer_init() while the old code was happy after a bzero();
originall

unbreak compression, by re-init-ing the compression code in the
post-auth child. the new buffer code is more strict, and requires
buffer_init() while the old code was happy after a bzero();
originally from djm@

show more ...


# a06cba94 28-Apr-2014 djm <djm@openbsd.org>

buffer_get_string_ptr's return should be const to remind
callers that futzing with it will futz with the actual buffer
contents


# 2d917344 12-Jul-2013 djm <djm@openbsd.org>

fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@


# 522a5c19 16-May-2013 dtucker <dtucker@openbsd.org>

Add an optional second argument to RekeyLimit in the client to allow
rekeying based on elapsed time in addition to amount of traffic.
with djm@ jmc@, ok djm


# de0b1e28 25-Jan-2012 markus <markus@openbsd.org>

packet_read_poll() is not used anymore.


# d89dcbf3 06-May-2011 djm <djm@openbsd.org>

set traffic class for IPv6 traffic as we do for IPv4 TOS;
patch from lionel AT mamane.lu via Colin Watson in bz#1855;
ok markus@


# 86c6b382 13-Nov-2010 djm <djm@openbsd.org>

allow ssh and sshd to set arbitrary TOS/DSCP/QoS values instead of
hardcoding lowdelay/throughput.

bz#1733 patch from philipp AT redfish-solutions.com; ok markus@ deraadt@


# f6c05033 31-Aug-2010 djm <djm@openbsd.org>

Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and
host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer
better performance than plain DH and DSA at the same equiv

Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and
host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer
better performance than plain DH and DSA at the same equivalent symmetric
key length, as well as much shorter keys.

Only the mandatory sections of RFC5656 are implemented, specifically the
three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and
ECDSA. Point compression (optional in RFC5656 is NOT implemented).

Certificate host and user keys using the new ECDSA key types are supported.

Note that this code has not been tested for interoperability and may be
subject to change.

feedback and ok markus@

show more ...


# 867f0cff 31-Aug-2010 djm <djm@openbsd.org>

Add buffer_get_cstring() and related functions that verify that the
string extracted from the buffer contains no embedded \0 characters*
This prevents random (possibly malicious) crap from being appe

Add buffer_get_cstring() and related functions that verify that the
string extracted from the buffer contains no embedded \0 characters*
This prevents random (possibly malicious) crap from being appended to
strings where it would not be noticed if the string is used with
a string(3) function.

Use the new API in a few sensitive places.

* actually, we allow a single one at the end of the string for now because
we don't know how many deployed implementations get this wrong, but don't
count on this to remain indefinitely.

show more ...


# 16fb6186 27-Jun-2009 andreas <andreas@openbsd.org>

packet_bacup_state() and packet_restore_state() will be used to
temporarily save the current state ren resuming a suspended connection.
ok markus@


# baf8b2e2 27-May-2009 andreas <andreas@openbsd.org>

Add packet_put_int64() and packet_get_int64(), part of a larger change
from Martin Forssen.
ok markus@


# bd3c5045 25-May-2009 andreas <andreas@openbsd.org>

Put the globals in packet.c into a struct and don't access it directly
from other files. No functional changes.
ok markus@ djm@


1234