| #
eeca08d0 |
| 19-Dec-2021 |
djm <djm@openbsd.org> |
ssh-add side of destination constraints
Have ssh-add accept a list of "destination constraints" that allow restricting where keys may be used in conjunction with a ssh-agent/ssh that supports sessio
ssh-add side of destination constraints
Have ssh-add accept a list of "destination constraints" that allow restricting where keys may be used in conjunction with a ssh-agent/ssh that supports session ID/hostkey binding.
Constraints are specified as either "[user@]host-pattern" or "host-pattern>[user@]host-pattern".
The first form permits a key to be used to authenticate as the specified user to the specified host.
The second form permits a key that has previously been permitted for use at a host to be available via a forwarded agent to an additional host.
For example, constraining a key with "user1@host_a" and "host_a>host_b". Would permit authentication as "user1" at "host_a", and allow the key to be available on an agent forwarded to "host_a" only for authentication to "host_b". The key would not be visible on agent forwarded to other hosts or usable for authentication there.
Internally, destination constraints use host keys to identify hosts. The host patterns are used to obtain lists of host keys for that destination that are communicated to the agent. The user/hostkeys are encoded using a new restrict-destination-v00@openssh.com key constraint.
host keys are looked up in the default client user/system known_hosts files. It is possible to override this set on the command-line.
feedback Jann Horn & markus@ ok markus@
show more ...
|
| #
6e2e0391 |
| 03-Apr-2020 |
djm <djm@openbsd.org> |
give ssh-keygen the ability to dump the contents of a binary key revocation list: ssh-keygen -lQf /path bz#3132; ok dtucker
|
| #
62af2284 |
| 25-Jan-2020 |
djm <djm@openbsd.org> |
factor out reading/writing sshbufs to dedicated functions; feedback and ok markus@
|
| #
4852100a |
| 13-Dec-2019 |
djm <djm@openbsd.org> |
use ssh-sk-helper for all security key signing operations
This extracts and refactors the client interface for ssh-sk-helper from ssh-agent and generalises it for use by the other programs. This mea
use ssh-sk-helper for all security key signing operations
This extracts and refactors the client interface for ssh-sk-helper from ssh-agent and generalises it for use by the other programs. This means that most OpenSSH tools no longer need to link against libfido2 or directly interact with /dev/uhid*
requested by, feedback and ok markus@
show more ...
|
| #
094c80e0 |
| 14-Nov-2019 |
djm <djm@openbsd.org> |
directly support U2F/FIDO2 security keys in OpenSSH by linking against the (previously external) USB HID middleware. The dlopen() capability still exists for alternate middlewares, e.g. for Bluetooth
directly support U2F/FIDO2 security keys in OpenSSH by linking against the (previously external) USB HID middleware. The dlopen() capability still exists for alternate middlewares, e.g. for Bluetooth, NFC and test/debugging.
show more ...
|
| #
e3a62e69 |
| 31-Oct-2019 |
djm <djm@openbsd.org> |
Refactor signing - use sshkey_sign for everything, including the new U2F signatures.
Don't use sshsk_ecdsa_sign() directly, instead make it reachable via sshkey_sign() like all other signature opera
Refactor signing - use sshkey_sign for everything, including the new U2F signatures.
Don't use sshsk_ecdsa_sign() directly, instead make it reachable via sshkey_sign() like all other signature operations. This means that we need to add a provider argument to sshkey_sign(), so most of this change is mechanically adding that.
Suggested by / ok markus@
show more ...
|
| #
8867a42f |
| 31-Oct-2019 |
djm <djm@openbsd.org> |
ssh-add support for U2F/FIDO keys
|
| #
4ae7035e |
| 25-Jul-2018 |
deraadt <deraadt@openbsd.org> |
Don't redefine Makefile choices which come correct from bsd.*.mk ok markus
|
| #
9938e17f |
| 08-Jan-2018 |
markus <markus@openbsd.org> |
group shared source files (e.g. SRCS_KEX) and allow compilation w/o OPENSSL ok djm@
|
| #
c0c5a1b7 |
| 14-Dec-2017 |
naddy <naddy@openbsd.org> |
Replace ED25519's private SHA-512 implementation with a call to the regular digest code. This speeds up compilation considerably. ok markus@
|
| #
e34d2894 |
| 10-Dec-2017 |
deraadt <deraadt@openbsd.org> |
ssh/lib hasn't worked towards our code-sharing goals for a quit while, perhaps it is too verbose? Change each */Makefile to specifying exactly what sources that program requires, compiling it sepera
ssh/lib hasn't worked towards our code-sharing goals for a quit while, perhaps it is too verbose? Change each */Makefile to specifying exactly what sources that program requires, compiling it seperate. Maybe we'll iterate by sorting those into seperatable chunks, splitting up files which contain common code + server/client specific code, or whatnot. But this isn't one step, or we'd have done it a long time ago.. ok dtucker markus djm
show more ...
|
| #
db0c671b |
| 10-Jul-2017 |
espie <espie@openbsd.org> |
zap redundant Makefile variables. okay djm@
|
| #
076d84dc |
| 04-Mar-2001 |
markus <markus@openbsd.org> |
don't link unused libs
|
| #
9a241266 |
| 03-Mar-2001 |
markus <markus@openbsd.org> |
log*.c -> log.c
|
| #
d4e7c603 |
| 29-Jan-2001 |
niklas <niklas@openbsd.org> |
$OpenBSD$
|
| #
911ba6f1 |
| 29-Jun-2000 |
todd <todd@openbsd.org> |
no longer needed; good riddance for static archs
|
| #
3f9d1bb0 |
| 06-Dec-1999 |
deraadt <deraadt@openbsd.org> |
atomicio() via lib
|
| #
b84216c7 |
| 06-Dec-1999 |
deraadt <deraadt@openbsd.org> |
move atomicio into it's own file. wrap all socket write()s which were doing write(sock, buf, len) != len, with atomicio() calls.
|
| #
cebcbd21 |
| 27-Oct-1999 |
deraadt <deraadt@openbsd.org> |
fix for stupid binutils linker
|
| #
492e465e |
| 25-Oct-1999 |
markus <markus@openbsd.org> |
move common files to ./lib and link libssh.a, tested with and w/o obj
|
| #
ec5851cd |
| 07-Oct-1999 |
deraadt <deraadt@openbsd.org> |
on static machines, install these as mode 0
|
| #
546de495 |
| 06-Oct-1999 |
deraadt <deraadt@openbsd.org> |
scp should not link against kerberos stuff
|
| #
1e11c2e6 |
| 04-Oct-1999 |
deraadt <deraadt@openbsd.org> |
more shrinking
|
| #
84f5e31b |
| 04-Oct-1999 |
markus <markus@openbsd.org> |
nuked minfd. sigh. hope this is the last one.
|
| #
eb4dabb9 |
| 01-Oct-1999 |
beck <beck@openbsd.org> |
Remove kerberos libdes - it's all in libcrypto
|