#
c58cfe51 |
| 10-Oct-2023 |
djm <djm@openbsd.org> |
Reserve a range of "local extension" message numbers that OpenSSH promises not to use (comment change only)
|
#
56f6b460 |
| 28-Aug-2023 |
djm <djm@openbsd.org> |
Introduce a transport-level ping facility
This adds a pair of SSH transport protocol messages SSH2_MSG_PING/PONG to implement a ping capability. These messages use numbers in the "local extensions"
Introduce a transport-level ping facility
This adds a pair of SSH transport protocol messages SSH2_MSG_PING/PONG to implement a ping capability. These messages use numbers in the "local extensions" number space and are advertised using a "ping@openssh.com" ext-info message with a string version number of "0".
ok markus@
show more ...
|
#
8e19764e |
| 14-Aug-2023 |
djm <djm@openbsd.org> |
add message number of SSH2_MSG_NEWCOMPRESS defined in RFC8308
|
#
bc1d6040 |
| 19-Nov-2020 |
dtucker <dtucker@openbsd.org> |
draft-ietf-secsh-architecture is now RFC4251.
|
#
39c1575d |
| 04-May-2016 |
markus <markus@openbsd.org> |
move SSH_MSG_NONE, so we don't have to include ssh1.h; ok deraadt@
|
#
9068ae8f |
| 14-Jan-2016 |
markus <markus@openbsd.org> |
remove roaming support; ok djm@
|
#
321f30e3 |
| 04-Dec-2015 |
markus <markus@openbsd.org> |
implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth) based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt; with & ok djm@
|
#
79b68f81 |
| 29-Jan-2014 |
djm <djm@openbsd.org> |
remove experimental, never-enabled JPAKE code; ok markus@
|
#
f6c05033 |
| 31-Aug-2010 |
djm <djm@openbsd.org> |
Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equiv
Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys.
Only the mandatory sections of RFC5656 are implemented, specifically the three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and ECDSA. Point compression (optional in RFC5656 is NOT implemented).
Certificate host and user keys using the new ECDSA key types are supported.
Note that this code has not been tested for interoperability and may be subject to change.
feedback and ok markus@
show more ...
|
#
b94e498e |
| 26-Feb-2010 |
djm <djm@openbsd.org> |
Add support for certificate key types for users and hosts.
OpenSSH certificate key types are not X.509 certificates, but a much simpler format that encodes a public key, identity information and som
Add support for certificate key types for users and hosts.
OpenSSH certificate key types are not X.509 certificates, but a much simpler format that encodes a public key, identity information and some validity constraints and signs it with a CA key. CA keys are regular SSH keys. This certificate style avoids the attack surface of X.509 certificates and is very easy to deploy.
Certified host keys allow automatic acceptance of new host keys when a CA certificate is marked as trusted in ~/.ssh/known_hosts. see VERIFYING HOST KEYS in ssh(1) for details.
Certified user keys allow authentication of users when the signing CA key is marked as trusted in authorized_keys. See "AUTHORIZED_KEYS FILE FORMAT" in sshd(8) for details.
Certificates are minted using ssh-keygen(1), documentation is in the "CERTIFICATES" section of that manpage.
Documentation on the format of certificates is in the file PROTOCOL.certkeys
feedback and ok markus@
show more ...
|
#
65658dc8 |
| 24-Oct-2009 |
andreas <andreas@openbsd.org> |
Define the KEX messages used when resuming a suspended connection. ok markus@
|
#
5e1e7a52 |
| 04-Nov-2008 |
djm <djm@openbsd.org> |
Add support for an experimental zero-knowledge password authentication method using the J-PAKE protocol described in F. Hao, P. Ryan, "Password Authenticated Key Exchange by Juggling", 16th Workshop
Add support for an experimental zero-knowledge password authentication method using the J-PAKE protocol described in F. Hao, P. Ryan, "Password Authenticated Key Exchange by Juggling", 16th Workshop on Security Protocols, Cambridge, April 2008.
This method allows password-based authentication without exposing the password to the server. Instead, the client and server exchange cryptographic proofs to demonstrate of knowledge of the password while revealing nothing useful to an attacker or compromised endpoint.
This is experimental, work-in-progress code and is presently compiled-time disabled (turn on -DJPAKE in Makefile.inc).
"just commit it. It isn't too intrusive." deraadt@
show more ...
|
#
84cabb10 |
| 25-Mar-2006 |
djm <djm@openbsd.org> |
standardise spacing in $OpenBSD$ tags; requested by deraadt@
|
#
63289d4f |
| 14-May-2003 |
markus <markus@openbsd.org> |
ranges for per auth method messages
|
#
617bdbdb |
| 04-Mar-2002 |
stevesk <stevesk@openbsd.org> |
$OpenBSD$ and RCSID() cleanup: don't use RCSID() in .h files; add missing RCSID() to .c files and remove dup /*$OpenBSD$*/ from .c files. ok markus@
|
#
e913741f |
| 11-Jan-2002 |
markus <markus@openbsd.org> |
add defines for msg type ranges
|
#
fae517c9 |
| 27-Mar-2001 |
provos <provos@openbsd.org> |
make dh group exchange more flexible, allow min and max group size, okay markus@, deraadt@
|
#
1998e7a9 |
| 11-Oct-2000 |
provos <provos@openbsd.org> |
First rough implementation of the diffie-hellman group exchange. The client can ask the server for bigger groups to perform the diffie-hellman in, thus increasing the attack complexity when using ci
First rough implementation of the diffie-hellman group exchange. The client can ask the server for bigger groups to perform the diffie-hellman in, thus increasing the attack complexity when using ciphers with longer keys. University of Windsor provided network, T the company.
show more ...
|
#
607fba6c |
| 07-Sep-2000 |
deraadt <deraadt@openbsd.org> |
cleanup copyright notices on all files. I have attempted to be accurate with the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing
cleanup copyright notices on all files. I have attempted to be accurate with the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
show more ...
|
#
5831e9dc |
| 15-May-2000 |
markus <markus@openbsd.org> |
draft-ietf-secsh-architecture-05.txt
|
#
722a5a05 |
| 14-Apr-2000 |
markus <markus@openbsd.org> |
whitespace cleanup
|
#
7995e0a9 |
| 27-Mar-2000 |
markus <markus@openbsd.org> |
ssh2 message type codes
|