History log of /openbsd/usr.bin/ssh/ssh2.h (Results 1 – 22 of 22)
Revision Date Author Comments
# c58cfe51 10-Oct-2023 djm <djm@openbsd.org>

Reserve a range of "local extension" message numbers that OpenSSH promises
not to use (comment change only)


# 56f6b460 28-Aug-2023 djm <djm@openbsd.org>

Introduce a transport-level ping facility

This adds a pair of SSH transport protocol messages SSH2_MSG_PING/PONG
to implement a ping capability. These messages use numbers in the "local
extensions"

Introduce a transport-level ping facility

This adds a pair of SSH transport protocol messages SSH2_MSG_PING/PONG
to implement a ping capability. These messages use numbers in the "local
extensions" number space and are advertised using a "ping@openssh.com"
ext-info message with a string version number of "0".

ok markus@

show more ...


# 8e19764e 14-Aug-2023 djm <djm@openbsd.org>

add message number of SSH2_MSG_NEWCOMPRESS defined in RFC8308


# bc1d6040 19-Nov-2020 dtucker <dtucker@openbsd.org>

draft-ietf-secsh-architecture is now RFC4251.


# 39c1575d 04-May-2016 markus <markus@openbsd.org>

move SSH_MSG_NONE, so we don't have to include ssh1.h; ok deraadt@


# 9068ae8f 14-Jan-2016 markus <markus@openbsd.org>

remove roaming support; ok djm@


# 321f30e3 04-Dec-2015 markus <markus@openbsd.org>

implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)
based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt;
with & ok djm@


# 79b68f81 29-Jan-2014 djm <djm@openbsd.org>

remove experimental, never-enabled JPAKE code; ok markus@


# f6c05033 31-Aug-2010 djm <djm@openbsd.org>

Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and
host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer
better performance than plain DH and DSA at the same equiv

Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and
host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer
better performance than plain DH and DSA at the same equivalent symmetric
key length, as well as much shorter keys.

Only the mandatory sections of RFC5656 are implemented, specifically the
three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and
ECDSA. Point compression (optional in RFC5656 is NOT implemented).

Certificate host and user keys using the new ECDSA key types are supported.

Note that this code has not been tested for interoperability and may be
subject to change.

feedback and ok markus@

show more ...


# b94e498e 26-Feb-2010 djm <djm@openbsd.org>

Add support for certificate key types for users and hosts.

OpenSSH certificate key types are not X.509 certificates, but a much
simpler format that encodes a public key, identity information and
som

Add support for certificate key types for users and hosts.

OpenSSH certificate key types are not X.509 certificates, but a much
simpler format that encodes a public key, identity information and
some validity constraints and signs it with a CA key. CA keys are
regular SSH keys. This certificate style avoids the attack surface
of X.509 certificates and is very easy to deploy.

Certified host keys allow automatic acceptance of new host keys
when a CA certificate is marked as trusted in ~/.ssh/known_hosts.
see VERIFYING HOST KEYS in ssh(1) for details.

Certified user keys allow authentication of users when the signing
CA key is marked as trusted in authorized_keys. See "AUTHORIZED_KEYS
FILE FORMAT" in sshd(8) for details.

Certificates are minted using ssh-keygen(1), documentation is in
the "CERTIFICATES" section of that manpage.

Documentation on the format of certificates is in the file
PROTOCOL.certkeys

feedback and ok markus@

show more ...


# 65658dc8 24-Oct-2009 andreas <andreas@openbsd.org>

Define the KEX messages used when resuming a suspended connection.
ok markus@


# 5e1e7a52 04-Nov-2008 djm <djm@openbsd.org>

Add support for an experimental zero-knowledge password authentication
method using the J-PAKE protocol described in F. Hao, P. Ryan,
"Password Authenticated Key Exchange by Juggling", 16th Workshop

Add support for an experimental zero-knowledge password authentication
method using the J-PAKE protocol described in F. Hao, P. Ryan,
"Password Authenticated Key Exchange by Juggling", 16th Workshop on
Security Protocols, Cambridge, April 2008.

This method allows password-based authentication without exposing
the password to the server. Instead, the client and server exchange
cryptographic proofs to demonstrate of knowledge of the password while
revealing nothing useful to an attacker or compromised endpoint.

This is experimental, work-in-progress code and is presently
compiled-time disabled (turn on -DJPAKE in Makefile.inc).

"just commit it. It isn't too intrusive." deraadt@

show more ...


# 84cabb10 25-Mar-2006 djm <djm@openbsd.org>

standardise spacing in $OpenBSD$ tags; requested by deraadt@


# 63289d4f 14-May-2003 markus <markus@openbsd.org>

ranges for per auth method messages


# 617bdbdb 04-Mar-2002 stevesk <stevesk@openbsd.org>

$OpenBSD$ and RCSID() cleanup: don't use RCSID() in .h files; add
missing RCSID() to .c files and remove dup /*$OpenBSD$*/ from .c
files. ok markus@


# e913741f 11-Jan-2002 markus <markus@openbsd.org>

add defines for msg type ranges


# fae517c9 27-Mar-2001 provos <provos@openbsd.org>

make dh group exchange more flexible, allow min and max group size,
okay markus@, deraadt@


# 1998e7a9 11-Oct-2000 provos <provos@openbsd.org>

First rough implementation of the diffie-hellman group exchange. The
client can ask the server for bigger groups to perform the diffie-hellman
in, thus increasing the attack complexity when using ci

First rough implementation of the diffie-hellman group exchange. The
client can ask the server for bigger groups to perform the diffie-hellman
in, thus increasing the attack complexity when using ciphers with longer
keys. University of Windsor provided network, T the company.

show more ...


# 607fba6c 07-Sep-2000 deraadt <deraadt@openbsd.org>

cleanup copyright notices on all files. I have attempted to be accurate with
the details. everything is now under Tatu's licence (which I copied from his
readme), and/or the core-sdi bsd-ish thing

cleanup copyright notices on all files. I have attempted to be accurate with
the details. everything is now under Tatu's licence (which I copied from his
readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd
developers under a 2-term bsd licence. We're not changing any rules, just
being accurate.

show more ...


# 5831e9dc 15-May-2000 markus <markus@openbsd.org>

draft-ietf-secsh-architecture-05.txt


# 722a5a05 14-Apr-2000 markus <markus@openbsd.org>

whitespace cleanup


# 7995e0a9 27-Mar-2000 markus <markus@openbsd.org>

ssh2 message type codes