| #
1c497181 |
| 08-Jan-2024 |
djm <djm@openbsd.org> |
fix missing field in users-groups-by-id@openssh.com reply documentation
GHPR441 from TJ Saunders
|
| #
80afb6f5 |
| 08-Jan-2024 |
djm <djm@openbsd.org> |
make kex-strict section more explicit about its intent: banning all messages not strictly required in KEX
|
| #
0a3ea9a3 |
| 20-Dec-2023 |
jsg <jsg@openbsd.org> |
spelling; ok markus@
|
| #
1ad9269c |
| 19-Dec-2023 |
djm <djm@openbsd.org> |
correct section numbers; from Ed Maste
|
| #
31381235 |
| 18-Dec-2023 |
djm <djm@openbsd.org> |
add "ext-info-in-auth@openssh.com" extension
This adds another transport protocol extension to allow a sshd to send SSH2_MSG_EXT_INFO during user authentication, after the server has learned the use
add "ext-info-in-auth@openssh.com" extension
This adds another transport protocol extension to allow a sshd to send SSH2_MSG_EXT_INFO during user authentication, after the server has learned the username that is being logged in to.
This lets sshd to update the acceptable signature algoritms for public key authentication, and allows these to be varied via sshd_config(5) "Match" directives, which are evaluated after the server learns the username being authenticated.
Full details in the PROTOCOL file
show more ...
|
| #
622b8b35 |
| 18-Dec-2023 |
djm <djm@openbsd.org> |
implement "strict key exchange" in ssh and sshd
This adds a protocol extension to improve the integrity of the SSH transport protocol, particular in and around the initial key exchange (KEX) phase.
implement "strict key exchange" in ssh and sshd
This adds a protocol extension to improve the integrity of the SSH transport protocol, particular in and around the initial key exchange (KEX) phase.
Full details of the extension are in the PROTOCOL file.
with markus@
show more ...
|
| #
56f6b460 |
| 28-Aug-2023 |
djm <djm@openbsd.org> |
Introduce a transport-level ping facility
This adds a pair of SSH transport protocol messages SSH2_MSG_PING/PONG to implement a ping capability. These messages use numbers in the "local extensions"
Introduce a transport-level ping facility
This adds a pair of SSH transport protocol messages SSH2_MSG_PING/PONG to implement a ping capability. These messages use numbers in the "local extensions" number space and are advertised using a "ping@openssh.com" ext-info message with a string version number of "0".
ok markus@
show more ...
|
| #
70271b41 |
| 07-Nov-2022 |
dtucker <dtucker@openbsd.org> |
Fix typo. From pablomh via -portable github PR#344.
|
| #
78d13d3a |
| 19-Sep-2022 |
djm <djm@openbsd.org> |
sftp-server(8): add a "users-groups-by-id@openssh.com" extension request that allows the client to obtain user/group names that correspond to a set of uids/gids.
Will be used to make directory listi
sftp-server(8): add a "users-groups-by-id@openssh.com" extension request that allows the client to obtain user/group names that correspond to a set of uids/gids.
Will be used to make directory listings more useful and consistent in sftp(1).
ok markus@
show more ...
|
| #
d71621f6 |
| 12-Aug-2022 |
djm <djm@openbsd.org> |
sftp-server: support home-directory request
Add support to the sftp-server for the home-directory extension defined in draft-ietf-secsh-filexfer-extensions-00. This overlaps a bit with the existing
sftp-server: support home-directory request
Add support to the sftp-server for the home-directory extension defined in draft-ietf-secsh-filexfer-extensions-00. This overlaps a bit with the existing expand-path@openssh.com, but uses a more official protocol name, and so is a bit more likely to be implemented by non-OpenSSH clients.
From Mike Frysinger, ok dtucker@
show more ...
|
| #
5f2fb3a3 |
| 08-Apr-2022 |
dtucker <dtucker@openbsd.org> |
Note that curve25519-sha256 was later published in RFC8731. ok djm@
|
| #
2ac6810f |
| 31-Mar-2022 |
djm <djm@openbsd.org> |
add support for the "corp-data" protocol extension to allow server-side copies to be performed without having to go via the client. Patch by Mike Frysinger, ok dtucker@
|
| #
caafdf97 |
| 19-Dec-2021 |
djm <djm@openbsd.org> |
document host-bound publickey authentication
|
| #
e4383b47 |
| 09-Aug-2021 |
djm <djm@openbsd.org> |
SFTP protocol extension to allow the server to expand ~-prefixed paths, in particular ~user ones. Allows scp in sftp mode to accept these paths, like scp in rcp mode does.
prompted by and much discu
SFTP protocol extension to allow the server to expand ~-prefixed paths, in particular ~user ones. Allows scp in sftp mode to accept these paths, like scp in rcp mode does.
prompted by and much discussion deraadt@ ok markus@
show more ...
|
| #
2514f071 |
| 18-Feb-2021 |
djm <djm@openbsd.org> |
Fix the hostkeys rotation extension documentation
The documentation was lacking the needed want-reply field in the initial global request.
https://github.com/openssh/openssh-portable/pull/218 by db
Fix the hostkeys rotation extension documentation
The documentation was lacking the needed want-reply field in the initial global request.
https://github.com/openssh/openssh-portable/pull/218 by dbussink
show more ...
|
| #
029b49a0 |
| 18-Feb-2021 |
djm <djm@openbsd.org> |
sftp-server: implement limits@openssh.com extension
This is a simple extension that allows the server to clearly communicate transfer limits it is imposing so the client doesn't have to guess, or fo
sftp-server: implement limits@openssh.com extension
This is a simple extension that allows the server to clearly communicate transfer limits it is imposing so the client doesn't have to guess, or force the user to manually tune. This is particularly useful when an attempt to use too large of a value causes the server to abort the connection.
Patch from Mike Frysinger; ok dtucker@
show more ...
|
| #
4dc35148 |
| 12-Feb-2021 |
djm <djm@openbsd.org> |
sftp: add missing lsetstat@openssh.com documentation patch from Mike Frysinger
|
| #
5bde2954 |
| 05-Jul-2020 |
djm <djm@openbsd.org> |
some language improvements; ok markus
|
| #
38ea1073 |
| 21-Feb-2020 |
dtucker <dtucker@openbsd.org> |
Fix some typos and an incorrect word in docs. Patch from itoama at live.jp via github PR#172.
|
| #
a098558b |
| 02-Oct-2018 |
djm <djm@openbsd.org> |
mention INFO@openssh.com for sending SIGINFO
|
| #
62766785 |
| 10-Aug-2018 |
djm <djm@openbsd.org> |
improve
|
| #
7cf46ae9 |
| 10-Aug-2018 |
djm <djm@openbsd.org> |
Describe pubkey format, prompted by bz#2853
While I'm here, describe and link to the remaining local PROTOCOL.* docs that weren't already mentioned (PROTOCOL.key, PROTOCOL.krl and PROTOCOL.mux)
|
| #
30155e07 |
| 10-Aug-2018 |
djm <djm@openbsd.org> |
fix numbering
|
| #
61185547 |
| 19-Feb-2018 |
djm <djm@openbsd.org> |
emphasise that the hostkey rotation may send key types that the client may not support, and that the client should simply disregard such keys (this is what ssh does already).
|
| #
9d14aae5 |
| 26-May-2017 |
djm <djm@openbsd.org> |
fix references to obsolete v00 cert format; spotted by Jakub Jelen
|