summaryrefslogtreecommitdiffstats
path: root/crypto/openssh/sshd.c
Commit message (Collapse)AuthorAgeFilesLines
* MFC r318242: Refine and update blacklist support in sshdlidl2017-05-171-1/+1
| | | | | | | | | | | | Adjust notification points slightly to catch all auth failures, rather than just the ones caused by bad usernames. Modify notification point for bad usernames to send new type of BLACKLIST_BAD_USER. (Support in libblacklist will be forthcoming soon.) Add guards to allow library headers to expose the enum of action values. Reviewed by: des Relnotes: yes Sponsored by: The FreeBSD Foundation
* MFC r305065: Add refactored blacklist support to sshdlidl2016-09-061-0/+5
| | | | | | | | | | | | | | | | | | Change the calls to of blacklist_init() and blacklist_notify to be macros defined in the blacklist_client.h file. This avoids the need for #ifdef USE_BLACKLIST / #endif except in the blacklist.c file. Remove redundent initialization attempts from within blacklist_notify - everything always goes through blacklistd_init(). Added UseBlacklist option to sshd, which defaults to off. To enable the functionality, use '-o UseBlacklist=yes' on the command line, or uncomment in the sshd_config file. Approved by: des Sponsored by: The FreeBSD Foundation
* Revert r301551, which added blacklistd(8) to sshd(8).gjb2016-06-241-13/+0
| | | | | | | | | | This change has functional impact, and other concerns raised by the OpenSSH maintainer. Requested by: des PR: 210479 (related) Approved by: re (marius) Sponsored by: The FreeBSD Foundation
* Add blacklist support to sshdlidl2016-06-071-0/+13
| | | | | | | | Reviewed by: rpaulo Approved by: rpaulo (earlier version of changes) Relnotes: YES Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D5915
* Upgrade to OpenSSH 7.2p2.des2016-03-111-37/+39
|\
* | Upgrade to OpenSSH 7.1p2.des2016-01-211-2/+8
| |
* | Upgrade to OpenSSH 7.0p1.des2016-01-201-29/+22
| |
* | Upgrade to OpenSSH 6.9p1.des2016-01-191-8/+17
|\ \ | |/
* | Upgrade to OpenSSH 6.8p1.des2016-01-191-111/+192
|\ \ | |/
* | Upgrade to OpenSSH 6.7p1, retaining libwrap support (which has been removeddes2016-01-191-13/+45
|\ \ | |/ | | | | | | | | upstream) and a number of security fixes which we had already backported. MFC after: 1 week
* | As previously threatened, remove the HPN patch from OpenSSH.des2016-01-191-16/+6
| |
* | Retire the NONE cipher option.des2015-11-231-6/+0
| |
* | Remove /* $FreeBSD$ */ from files that already have __RCSID("$FreeBSD$").des2015-11-111-1/+0
| |
* | Apply upstream patch for EC calculation bug and bump version addendum.des2014-04-201-0/+3
| |
* | Upgrade to OpenSSH 6.6p1.des2014-03-251-20/+33
|\ \ | |/
* | Upgrade to OpenSSH 6.5p1.des2014-01-311-19/+37
|\ \ | |/
* | Unbreak the WITHOUT_KERBEROS build and try to reduce the odds of ades2013-09-231-3/+3
| | | | | | | | | | | | | | | | | | repeat performance by introducing a script that runs configure with and without Kerberos, diffs the result and generates krb5_config.h, which contains the preprocessor macros that need to be defined in the Kerberos case and undefined otherwise. Approved by: re (marius)
* | Upgrade to 6.3p1.des2013-09-211-21/+104
|\ \ | |/ | | | | Approved by: re (gjb)
* | Upgrade to OpenSSH 6.2p1. The most important new features are supportdes2013-03-221-3/+41
|\ \ | |/ | | | | for a key revocation list and more fine-grained authentication control.
* | Upgrade OpenSSH to 6.1p1.des2012-09-031-41/+54
| |
* | OpenSSH: allow VersionAddendum to be used againrea2012-05-271-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Prior to this, setting VersionAddendum will be a no-op: one will always have BASE_VERSION + " " + VERSION_HPN for VersionAddendum set in the config and a bare BASE_VERSION + VERSION_HPN when there is no VersionAddendum is set. HPN patch requires both parties to have the "hpn" inside their advertized versions, so we add VERSION_HPN to the VERSION_BASE if HPN is enabled and omitting it if HPN is disabled. VersionAddendum now uses the following logics: * unset (default value): append " " and VERSION_ADDENDUM; * VersionAddendum is set and isn't empty: append " " and VersionAddendum; * VersionAddendum is set and empty: don't append anything. Approved by: des Reviewed by: bz MFC after: 3 days
* | Polish diff against upstream.ed2012-02-131-3/+3
| | | | | | | | | | | | | | | | | | | | - Revert unneeded whitespace changes. - Revert modifications to loginrec.c, as the upstream version already does the right thing. - Fix indentation and whitespace of local changes. Approved by: des MFC after: 1 month
* | Upgrade to OpenSSH 5.9p1.des2011-10-051-11/+33
|\ \ | |/ | | | | MFC after: 3 months
* | Add support for dynamically adjusted buffers to allow the full use ofbrooks2011-08-031-1/+18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | the bandwidth of long fat pipes (i.e. 100Mbps+ trans-oceanic or trans-continental links). Bandwidth-delay products up to 64MB are supported. Also add support (not compiled by default) for the None cypher. The None cypher can only be enabled on non-interactive sessions (those without a pty where -T was not used) and must be enabled in both the client and server configuration files and on the client command line. Additionally, the None cypher will only be activated after authentication is complete. To enable the None cypher you must add -DNONE_CIPHER_ENABLED to CFLAGS via the make command line or in /etc/make.conf. This code is a style(9) compliant version of these features extracted from the patches published at: http://www.psc.edu/networking/projects/hpn-ssh/ Merging this patch has been a collaboration between me and Bjoern. Reviewed by: bz Approved by: re (kib), des (maintainer)
* | Upgrade to OpenSSH 5.8p2.des2011-05-041-3/+11
|\ \ | |/
* | Upgrade to OpenSSH 5.6p1.des2010-11-111-3/+12
|\ \ | |/
* | Enhance r199804 by marking the daemonised child as immune to OOM insteadkib2010-04-081-4/+4
| | | | | | | | | | | | | | | | | | of short-living parent. Only mark the master process that accepts connections, do not protect connection handlers spawned from inetd. Submitted by: Mykola Dzham <i levsha me> Reviewed by: attilio MFC after: 1 week
* | Upgrade to OpenSSH 5.4p1.des2010-03-091-22/+115
|\ \ | |/ | | | | MFC after: 1 month
* | Make OpenSSH work with utmpx.ed2010-01-131-2/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - Partially revert r184122 (sshd.c). Our ut_host is now big enough to fit proper hostnames. - Change config.h to match reality. - defines.h requires UTMPX_FILE to be set by <utmpx.h> before it allows the utmpx code to work. This makes no sense to me. I've already mentioned this upstream. - Add our own platform-specific handling of lastlog. The version I will send to the OpenSSH folks will use proper autoconf generated definitions instead of `#if 1'.
* | Avoid sshd, cron, syslogd and inetd to be killed under high-pressure swapattilio2009-11-251-0/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | environments. Please note that this can't be done while such processes run in jails. Note: in future it would be interesting to find a way to do that selectively for any desired proccess (choosen by user himself), probabilly via a ptrace interface or whatever. Obtained from: Sandvine Incorporated Reviewed by: emaste, arch@ Sponsored by: Sandvine Incorporated MFC: 1 month
* | Upgrade to OpenSSH 5.3p1.des2009-10-011-4/+5
|\ \ | |/
* | Upgrade to OpenSSH 5.2p1.des2009-05-221-3/+2
|\ \ | |/ | | | | MFC after: 3 months
* | At some point, construct_utmp() was changed to use realhostname() to filldes2008-10-211-1/+2
| | | | | | | | | | | | | | | | | | | | | | | | in the struct utmp due to concerns about the length of the hostname buffer. However, this breaks the UseDNS option. There is a simpler and better solution: initialize utmp_len to the correct value (UT_HOSTSIZE instead of MAXHOSTNAMELEN) and let get_remote_name_or_ip() worry about the size of the buffer. PR: bin/97499 Submitted by: Bruce Cran <bruce@cran.org.uk> MFC after: 1 week
* | Upgrade to OpenSSH 5.1p1.des2008-08-011-40/+123
|\ \ | |/ | | | | | | | | | | | | | | | | I have worked hard to reduce diffs against the vendor branch. One notable change in that respect is that we no longer prefer DSA over RSA - the reasons for doing so went away years ago. This may cause some surprises, as ssh will warn about unknown host keys even for hosts whose keys haven't changed. MFC after: 6 weeks
| * Properly flatten openssh/dist.des2008-07-221-2156/+0
| |
| * Revert part of 180714 - the intent was to flatten dist, not to nuke it.des2008-07-221-0/+2156
| |
| * Flatten the OpenSSH vendor tree for 3.x and newer.des2008-07-221-2156/+0
| |
| * Vendor import of OpenSSH 4.5p1.des2006-11-101-10/+14
| |
| * Vendor import of OpenSSH 4.4p1.des2006-09-301-346/+428
| |
| * Vendor import of OpenSSH 4.3p1.des2006-03-221-15/+37
| |
| * Vendor import of OpenSSH 4.2p1.des2005-09-031-12/+26
| |
| * Vendor import of OpenSSH 4.1p1.des2005-06-051-0/+2
| |
| * Vendor import of OpenSSH 4.0p1.des2005-06-051-32/+43
| |
| * Vendor import of OpenSSH 3.9p1.des2004-10-281-33/+246
| |
| * Vendor import of OpenSSH 3.8.1p1.des2004-04-201-27/+18
| |
| * Vendor import of OpenSSH 3.8p1.des2004-02-261-44/+64
| |
| * Vendor import of OpenSSH 3.7.1p2.des2004-01-071-114/+67
| |
| * Vendor import of OpenSSH-portable 3.6.1p1.des2003-04-231-9/+23
| |
| * Vendor import of OpenSSH-portable 3.5p1.des2002-10-291-43/+50
| |
| * Vendor import of OpenSSH 3.4p1.des2002-06-291-11/+37
| |
OpenPOWER on IntegriCloud