summaryrefslogtreecommitdiff
path: root/PROTOCOL.agent
Commit message (Collapse)AuthorAgeFilesLines
* upstream: fix double words ok dtucker@jsg@openbsd.org2023-04-171-2/+2
| | | | OpenBSD-Commit-ID: 44d3223902fbce5276422bdc8063ab72a4078489
* upstream: Fix typo. From AlexanderStohr via github PR#343.dtucker@openbsd.org2022-09-271-2/+2
| | | | OpenBSD-Commit-ID: a134c9b4039e48803fc6a87f955b0f4a03181497
* upstream: Remove errant apostrophe. From haruyama at queen-ml org.dtucker@openbsd.org2022-05-131-2/+2
| | | | OpenBSD-Commit-ID: dc6b294567cb84b384ad6ced9ca469f2bbf0bd10
* upstream: spelling ok dtucker@jsg@openbsd.org2022-01-011-4/+4
| | | | OpenBSD-Commit-ID: bfc7ba74c22c928de2e257328b3f1274a3dfdf19
* upstream: document agent protocol extensionsdjm@openbsd.org2021-12-201-3/+82
| | | | OpenBSD-Commit-ID: 09e8bb391bbaf24c409b75a4af44e0cac65405a7
* upstream: Agent protocol draft is now at rev 4. ok djm@dtucker@openbsd.org2020-10-071-5/+3
| | | | OpenBSD-Commit-ID: 8c01ea3aae48aab45e01b7421b0fca2dad5e7837
* upstream: Add RCS IDs to the few files that are missing them; fromdjm@openbsd.org2020-08-311-0/+2
| | | | | | Pedro Martelletto OpenBSD-Commit-ID: 39aa37a43d0c75ec87f1659f573d3b5867e4a3b3
* update URL againDamien Miller2017-10-011-1/+1
| | | | I spotted a typo in the draft so uploaded a new version...
* update agent draft URLDamien Miller2017-10-011-2/+4
|
* upstream commitdjm@openbsd.org2017-05-201-582/+3
| | | | | | | | | | Now that we no longer support SSHv1, replace the contents of this file with a pointer to https://tools.ietf.org/html/draft-miller-ssh-agent-00 It's better edited, doesn't need to document stuff we no longer implement and does document stuff that we do implement (RSA SHA256/512 signature flags) Upstream-ID: da8cdc46bbcc266efabd565ddddd0d8e556f846e
* upstream commitdjm@openbsd.org2016-05-191-5/+8
| | | | | | fix type of ed25519 values Upstream-ID: b32d0cb372bbe918ca2de56906901eae225a59b0
* upstream commitdjm@openbsd.org2016-05-051-3/+3
| | | | | | fix junk characters after quotes Upstream-ID: cc4d0cd32cb6b55a2ef98975d2f7ae857d0dc578
* upstream commitdjm@openbsd.org2016-05-031-1/+20
| | | | | | | add ed25519 keys that are supported but missing from this documents; from Peter Moody Upstream-ID: 8caac2d8e8cfd2fca6dc304877346e0a064b014b
* upstream commitdjm@openbsd.org2015-05-081-2/+2
| | | | whitespace at EOL
* - djm@cvs.openbsd.org 2013/01/02 00:33:49Damien Miller2013-01-091-2/+2
| | | | | | [PROTOCOL.agent] correct format description for SSH_AGENTC_ADD_RSA_ID_CONSTRAINED bz#2051 from david AT lechnology.com
* - djm@cvs.openbsd.org 2010/08/31 11:54:45Damien Miller2010-08-311-11/+33
| | | | | | | | | | | | | | | | | | | | | | | | | [PROTOCOL PROTOCOL.agent PROTOCOL.certkeys auth2-jpake.c authfd.c] [authfile.c buffer.h dns.c kex.c kex.h key.c key.h monitor.c] [monitor_wrap.c myproposal.h packet.c packet.h pathnames.h readconf.c] [ssh-add.1 ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh-keygen.c] [ssh-keyscan.1 ssh-keyscan.c ssh-keysign.8 ssh.1 ssh.c ssh2.h] [ssh_config.5 sshconnect.c sshconnect2.c sshd.8 sshd.c sshd_config.5] [uuencode.c uuencode.h bufec.c kexecdh.c kexecdhc.c kexecdhs.c ssh-ecdsa.c] Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. Only the mandatory sections of RFC5656 are implemented, specifically the three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and ECDSA. Point compression (optional in RFC5656 is NOT implemented). Certificate host and user keys using the new ECDSA key types are supported. Note that this code has not been tested for interoperability and may be subject to change. feedback and ok markus@
* - OpenBSD CVS SyncDamien Miller2010-02-271-1/+23
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | - djm@cvs.openbsd.org 2010/02/26 20:29:54 [PROTOCOL PROTOCOL.agent PROTOCOL.certkeys addrmatch.c auth-options.c] [auth-options.h auth.h auth2-pubkey.c authfd.c dns.c dns.h hostfile.c] [hostfile.h kex.h kexdhs.c kexgexs.c key.c key.h match.h monitor.c] [myproposal.h servconf.c servconf.h ssh-add.c ssh-agent.c ssh-dss.c] [ssh-keygen.1 ssh-keygen.c ssh-rsa.c ssh.1 ssh.c ssh2.h sshconnect.c] [sshconnect2.c sshd.8 sshd.c sshd_config.5] Add support for certificate key types for users and hosts. OpenSSH certificate key types are not X.509 certificates, but a much simpler format that encodes a public key, identity information and some validity constraints and signs it with a CA key. CA keys are regular SSH keys. This certificate style avoids the attack surface of X.509 certificates and is very easy to deploy. Certified host keys allow automatic acceptance of new host keys when a CA certificate is marked as sh/known_hosts. see VERIFYING HOST KEYS in ssh(1) for details. Certified user keys allow authentication of users when the signing CA key is marked as trusted in authorized_keys. See "AUTHORIZED_KEYS FILE FORMAT" in sshd(8) for details. Certificates are minted using ssh-keygen(1), documentation is in the "CERTIFICATES" section of that manpage. Documentation on the format of certificates is in the file PROTOCOL.certkeys feedback and ok markus@
* - stevesk@cvs.openbsd.org 2008/07/01 23:12:47Darren Tucker2008-07-021-17/+17
| | | | | [PROTOCOL.agent] fix some typos; ok djm@
* - djm@cvs.openbsd.org 2008/06/30 08:05:59Darren Tucker2008-07-021-4/+4
| | | | | [PROTOCOL.agent] typo: s/constraint_date/constraint_data/
* - djm@cvs.openbsd.org 2008/06/28 14:08:30Damien Miller2008-06-301-0/+516
[PROTOCOL PROTOCOL.agent] document the protocol used by ssh-agent; "looks ok" markus@