summaryrefslogtreecommitdiffstats
path: root/crypto/openssh/auth.c
Commit message (Collapse)AuthorAgeFilesLines
* MFH (r314306,r314720): Upgrade OpenSSH to 7.4p1.des2017-09-021-12/+21
|
* MFH (r314527,r314576,r314601,r317998): Upgrade OpenSSH to 7.3p1.des2017-09-021-13/+138
|
* MFC r318242: Refine and update blacklist support in sshdlidl2017-05-171-2/+2
| | | | | | | | | | | | Adjust notification points slightly to catch all auth failures, rather than just the ones caused by bad usernames. Modify notification point for bad usernames to send new type of BLACKLIST_BAD_USER. (Support in libblacklist will be forthcoming soon.) Add guards to allow library headers to expose the enum of action values. Reviewed by: des Relnotes: yes Sponsored by: The FreeBSD Foundation
* MFC r313965:lidl2017-02-221-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | Only notify blacklistd for successful logins in auth.c Before this change, every pass through auth.c resulted in a call to blacklist_notify(). In a normal remote login, there would be a failed login flagged for the printing of the "xxx login:" prompt, before the remote user could enter a password. If the user successfully entered a good password, then a good login would be flagged, and everything would be OK. If the user entered an incorrect password, there would be another failed login flagged in auth1.c (or auth2.c) for the actual bad password attempt. Finally, when sshd got around to issuing the second "xxx login:" prompt, there would be yet another failed login notice sent to blacklistd. So, if there was a 3 bad logins limit set (the default), the system would actually block the address after the first bad password attempt. Reported by: Rick Adams Reviewed by: des Sponsored by: The FreeBSD Foundation
* MFC r305065: Add refactored blacklist support to sshdlidl2016-09-061-1/+6
| | | | | | | | | | | | | | | | | | Change the calls to of blacklist_init() and blacklist_notify to be macros defined in the blacklist_client.h file. This avoids the need for #ifdef USE_BLACKLIST / #endif except in the blacklist.c file. Remove redundent initialization attempts from within blacklist_notify - everything always goes through blacklistd_init(). Added UseBlacklist option to sshd, which defaults to off. To enable the functionality, use '-o UseBlacklist=yes' on the command line, or uncomment in the sshd_config file. Approved by: des Sponsored by: The FreeBSD Foundation
* Revert r301551, which added blacklistd(8) to sshd(8).gjb2016-06-241-10/+0
| | | | | | | | | | This change has functional impact, and other concerns raised by the OpenSSH maintainer. Requested by: des PR: 210479 (related) Approved by: re (marius) Sponsored by: The FreeBSD Foundation
* Add blacklist support to sshdlidl2016-06-071-0/+10
| | | | | | | | Reviewed by: rpaulo Approved by: rpaulo (earlier version of changes) Relnotes: YES Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D5915
* Upgrade to OpenSSH 7.1p2.des2016-01-211-2/+2
|
* Upgrade to OpenSSH 7.0p1.des2016-01-201-2/+4
|
* Upgrade to OpenSSH 6.9p1.des2016-01-191-3/+2
|\
* \ Upgrade to OpenSSH 6.8p1.des2016-01-191-37/+35
|\ \ | |/
* | Upgrade to OpenSSH 6.7p1, retaining libwrap support (which has been removeddes2016-01-191-2/+20
|\ \ | |/ | | | | | | | | upstream) and a number of security fixes which we had already backported. MFC after: 1 week
* | Remove /* $FreeBSD$ */ from files that already have __RCSID("$FreeBSD$").des2015-11-111-1/+0
| |
* | Add a pre-merge script which reverts mechanical changes such as addeddes2014-03-241-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | $FreeBSD$ tags and man page dates. Add a post-merge script which reapplies these changes. Run both scripts to normalize the existing code base. As a result, many files which should have had $FreeBSD$ tags but didn't now have them. Partly rewrite the upgrade instructions and remove the now outdated list of tricks.
* | Upgrade to 6.3p1.des2013-09-211-12/+36
|\ \ | |/ | | | | Approved by: re (gjb)
* | Upgrade to OpenSSH 6.2p1. The most important new features are supportdes2013-03-221-20/+57
|\ \ | |/ | | | | for a key revocation list and more fine-grained authentication control.
* | Upgrade OpenSSH to 6.1p1.des2012-09-031-4/+6
| |
* | Upgrade to OpenSSH 5.9p1.des2011-10-051-19/+4
|\ \ | |/ | | | | MFC after: 3 months
* | Upgrade to OpenSSH 5.8p2.des2011-05-041-13/+19
|\ \ | |/
* | Upgrade to OpenSSH 5.6p1.des2010-11-111-13/+35
|\ \ | |/
* | Upgrade to OpenSSH 5.4p1.des2010-03-091-19/+79
|\ \ | |/ | | | | MFC after: 1 month
* | Upgrade to OpenSSH 5.2p1.des2009-05-221-1/+1
|\ \ | |/ | | | | MFC after: 3 months
* | Upgrade to OpenSSH 5.1p1.des2008-08-011-10/+51
|\ \ | |/ | | | | | | | | | | | | | | | | I have worked hard to reduce diffs against the vendor branch. One notable change in that respect is that we no longer prefer DSA over RSA - the reasons for doing so went away years ago. This may cause some surprises, as ssh will warn about unknown host keys even for hosts whose keys haven't changed. MFC after: 6 weeks
| * Properly flatten openssh/dist.des2008-07-221-581/+0
| |
| * Revert part of 180714 - the intent was to flatten dist, not to nuke it.des2008-07-221-0/+581
| |
| * Flatten the OpenSSH vendor tree for 3.x and newer.des2008-07-221-581/+0
| |
| * Vendor import of OpenSSH 4.5p1.des2006-11-101-2/+0
| |
| * Vendor import of OpenSSH 4.4p1.des2006-09-301-49/+43
| |
| * Vendor import of OpenSSH 4.2p1.des2005-09-031-42/+26
| |
| * Vendor import of OpenSSH 4.1p1.des2005-06-051-2/+3
| |
| * Vendor import of OpenSSH 4.0p1.des2005-06-051-15/+66
| |
| * Vendor import of OpenSSH 3.9p1.des2004-10-281-32/+10
| |
| * Vendor import of OpenSSH 3.8p1.des2004-02-261-51/+14
| |
| * Vendor import of OpenSSH 3.7.1p2.des2004-01-071-56/+102
| |
| * Vendor import of OpenSSH-portable 3.6.1p1.des2003-04-231-18/+32
| |
| * Vendor import of OpenSSH-portable 3.5p1.des2002-10-291-3/+16
| |
| * Vendor import of OpenSSH 3.3p1.des2002-06-271-0/+69
| |
| * Vendor import of OpenSSH 3.3.des2002-06-231-6/+88
| |
| * Vendor import of OpenSSH 3.1des2002-03-181-8/+222
| |
| * Say "hi" to the latest in the OpenSSH series, version 2.9!green2001-05-041-57/+89
| | | | | | | | Happy birthday to: rwatson
| * Import of OpenSSH 2.3.0 (virgin OpenBSD source release).green2000-12-051-2/+1
| |
| * Initial import of OpenSSH post-2.2.0 snapshot dated 2000-09-09kris2000-09-101-4/+29
| |
| * Initial import of OpenSSH snapshot from 2000/05/30kris2000-06-031-2/+9
| | | | | | | | Obtained from: OpenBSD
* | Resolve conflicts.des2006-11-101-2/+0
| |
* | Merge conflicts.des2006-09-301-50/+44
| | | | | | | | MFC after: 1 week
* | Resolve conflicts.des2005-09-031-42/+26
| |
* | Resolve conflicts.des2005-06-051-16/+68
| |
* | Resolve conflictsdes2004-10-281-32/+10
| |
* | Resolve conflicts.des2004-02-261-51/+14
| |
* | Resolve conflicts and remove obsolete files.des2004-01-071-56/+102
| | | | | | | | Sponsored by: registrar.no
OpenPOWER on IntegriCloud