#
93d5c996 |
| 06-Sep-2024 |
djm <djm@openbsd.org> |
make parsing user@host consistently look for the last '@' in the string rather than the first. This makes it possible to use usernames that contain '@' characters.
Prompted by Max Zettlmeißl; feedba
make parsing user@host consistently look for the last '@' in the string rather than the first. This makes it possible to use usernames that contain '@' characters.
Prompted by Max Zettlmeißl; feedback/ok millert@
show more ...
|
#
52113de9 |
| 11-Jan-2024 |
djm <djm@openbsd.org> |
make DSA key support compile-time optional, defaulting to on
ok markus@
|
#
0956b51c |
| 08-Jan-2024 |
djm <djm@openbsd.org> |
fix typo; spotted by Albert Chin
|
#
45032496 |
| 19-Dec-2023 |
jmc <jmc@openbsd.org> |
sort -C, and add to usage(); ok djm
|
#
eead3eb2 |
| 18-Dec-2023 |
djm <djm@openbsd.org> |
Make it possible to load certs from PKCS#11 tokens
Adds a protocol extension to allow grafting certificates supplied by ssh-add to keys loaded from PKCS#11 tokens in the agent.
feedback/ok markus@
|
#
228cff34 |
| 06-Jul-2023 |
dtucker <dtucker@openbsd.org> |
minleft and maxsign are u_int so cast appropriately. Prompted by github PR#410, ok deraadt.
|
#
8265defc |
| 08-Mar-2023 |
djm <djm@openbsd.org> |
use RSA/SHA256 when testing usability of private key in agent; with/ok dtucker
|
#
0c10332a |
| 18-Jun-2022 |
dtucker <dtucker@openbsd.org> |
Don't attempt to fprintf a null identity comment. From Martin Vahlensieck via tech@.
|
#
4344e822 |
| 04-Feb-2022 |
dtucker <dtucker@openbsd.org> |
Since they are deprecated, move DSA to the end of the default list of public keys so that they will be tried last. From github PR#295 from "ProBackup-nl", ok djm@
|
#
f361212a |
| 14-Jan-2022 |
djm <djm@openbsd.org> |
allow pin-required FIDO keys to be added to ssh-agent(1). ssh-askpass will be used to request the PIN at authentication time.
From Pedro Martelletto, ok djm
|
#
6c290b83 |
| 22-Dec-2021 |
jmc <jmc@openbsd.org> |
sort -H and -h in SYNOPSIS/usage(); tweak the -H text;
ok djm
|
#
82d651da |
| 19-Dec-2021 |
djm <djm@openbsd.org> |
ssh-add side of destination constraints
Have ssh-add accept a list of "destination constraints" that allow restricting where keys may be used in conjunction with a ssh-agent/ssh that supports sessio
ssh-add side of destination constraints
Have ssh-add accept a list of "destination constraints" that allow restricting where keys may be used in conjunction with a ssh-agent/ssh that supports session ID/hostkey binding.
Constraints are specified as either "[user@]host-pattern" or "host-pattern>[user@]host-pattern".
The first form permits a key to be used to authenticate as the specified user to the specified host.
The second form permits a key that has previously been permitted for use at a host to be available via a forwarded agent to an additional host.
For example, constraining a key with "user1@host_a" and "host_a>host_b". Would permit authentication as "user1" at "host_a", and allow the key to be available on an agent forwarded to "host_a" only for authentication to "host_b". The key would not be visible on agent forwarded to other hosts or usable for authentication there.
Internally, destination constraints use host keys to identify hosts. The host patterns are used to obtain lists of host keys for that destination that are communicated to the agent. The user/hostkeys are encoded using a new restrict-destination-v00@openssh.com key constraint.
host keys are looked up in the default client user/system known_hosts files. It is possible to override this set on the command-line.
feedback Jann Horn & markus@ ok markus@
show more ...
|
#
991d5a20 |
| 28-Oct-2021 |
djm <djm@openbsd.org> |
When downloading resident keys from a FIDO token, pass back the user ID that was used when the key was created and append it to the filename the key is written to (if it is not the default).
Avoids
When downloading resident keys from a FIDO token, pass back the user ID that was used when the key was created and append it to the filename the key is written to (if it is not the default).
Avoids keys being clobbered if the user created multiple resident keys with the same application string but different user IDs.
feedback Pedro Martelletto; ok markus
NB. increments SSH_SK_VERSION_MAJOR
show more ...
|
#
74cb32ae |
| 03-Apr-2021 |
djm <djm@openbsd.org> |
highly polished whitespace, mostly fixing spaces-for-tab and bad indentation on continuation lines. Prompted by GHPR#185
|
#
ca5450d6 |
| 11-Jan-2021 |
dtucker <dtucker@openbsd.org> |
Change convtime() from returning long to returning int. On platforms where sizeof(int) != sizeof(long), convtime could accept values >MAX_INT which subsequently truncate when stored in an int during
Change convtime() from returning long to returning int. On platforms where sizeof(int) != sizeof(long), convtime could accept values >MAX_INT which subsequently truncate when stored in an int during config parsing. bz#3250, ok djm@
show more ...
|
#
48e6b99d |
| 18-Oct-2020 |
djm <djm@openbsd.org> |
use the new variant log macros instead of prepending __func__ and appending ssh_err(r) manually; ok markus@
|
#
8b827e99 |
| 31-Aug-2020 |
djm <djm@openbsd.org> |
refuse to add verify-required (PINful) FIDO keys to ssh-agent until the agent supports them properly
|
#
e6d0367b |
| 26-Jun-2020 |
djm <djm@openbsd.org> |
allow "ssh-add -d -" to read keys to be deleted from stdin bz#3180; ok dtucker@
|
#
75a70985 |
| 16-Mar-2020 |
dtucker <dtucker@openbsd.org> |
Cast lifetime to u_long for comparison to prevent unsigned comparison warning on 32bit arches. Spotted by deraadt, ok djm.
|
#
c9831b39 |
| 26-Feb-2020 |
jsg <jsg@openbsd.org> |
change explicit_bzero();free() to freezero()
While freezero() returns early if the pointer is NULL the tests for NULL in callers are left to avoid warnings about passing an uninitialised size argume
change explicit_bzero();free() to freezero()
While freezero() returns early if the pointer is NULL the tests for NULL in callers are left to avoid warnings about passing an uninitialised size argument across a function boundry.
ok deraadt@ djm@
show more ...
|
#
b0acf2e1 |
| 18-Feb-2020 |
dtucker <dtucker@openbsd.org> |
Ensure that the key lifetime provided fits within the values allowed by the wire format (u32). Prevents integer wraparound of the timeout values. bz#3119, ok markus@ djm@
|
#
5f47a660 |
| 06-Feb-2020 |
naddy <naddy@openbsd.org> |
Replace "security key" with "authenticator" in program messages.
This replaces "security key" in error/usage/verbose messages and distinguishes between "authenticator" and "authenticator-hosted key"
Replace "security key" with "authenticator" in program messages.
This replaces "security key" in error/usage/verbose messages and distinguishes between "authenticator" and "authenticator-hosted key".
ok djm@
show more ...
|
#
62af2284 |
| 25-Jan-2020 |
djm <djm@openbsd.org> |
factor out reading/writing sshbufs to dedicated functions; feedback and ok markus@
|
#
eb0971ce |
| 17-Jan-2020 |
naddy <naddy@openbsd.org> |
Document loading of resident keys from a FIDO authenticator.
* Rename -O to -K to keep "-O option" available. * Document -K. * Trim usage() message down to synopsis, like all other commands.
ok mar
Document loading of resident keys from a FIDO authenticator.
* Rename -O to -K to keep "-O option" available. * Document -K. * Trim usage() message down to synopsis, like all other commands.
ok markus@
show more ...
|
#
a0caf565 |
| 06-Jan-2020 |
djm <djm@openbsd.org> |
Extends the SK API to accept a set of key/value options for all operations. These are intended to future-proof the API a little by making it easier to specify additional fields for without having to
Extends the SK API to accept a set of key/value options for all operations. These are intended to future-proof the API a little by making it easier to specify additional fields for without having to change the API version for each.
At present, only two options are defined: one to explicitly specify the device for an operation (rather than accepting the middleware's autoselection) and another to specify the FIDO2 username that may be used when generating a resident key. These new options may be invoked at key generation time via ssh-keygen -O
This also implements a suggestion from Markus to avoid "int" in favour of uint32_t for the algorithm argument in the API, to make implementation of ssh-sk-client/helper a little easier.
feedback, fixes and ok markus@
show more ...
|