summaryrefslogtreecommitdiff
path: root/auth2.c
Commit message (Collapse)AuthorAgeFilesLines
* - dtucker@cvs.openbsd.org 2004/05/23 23:59:53Darren Tucker2004-05-241-2/+2
| | | | | [auth.c auth.h auth1.c auth2.c servconf.c servconf.h sshd_config sshd_config.5] Add MaxAuthTries sshd config option; ok markus@
* - (dtucker) [auth-pam.c auth-pam.h auth1.c auth2.c monitor.c monitor_wrap.cDarren Tucker2004-03-081-3/+3
| | | | | | | monitor_wrap.h] Bug #808: Ensure force_pwchange is correctly initialized even if keyboard-interactive is not used by the client. Prevents segfaults in some cases where the user's password is expired (note this is not considered a security exposure). ok djm@
* - djm@cvs.openbsd.org 2003/11/04 08:54:09Damien Miller2003-11-171-2/+1
| | | | | | | | [auth1.c auth2.c auth2-pubkey.c auth.h auth-krb5.c auth-passwd.c] [auth-rhosts.c auth-rh-rsa.c auth-rsa.c monitor.c serverloop.c] [session.c] standardise arguments to auth methods - they should all take authctxt. check authctxt->valid rather then pw != NULL; ok markus@
* - markus@cvs.openbsd.org 2003/09/23 20:17:11Darren Tucker2003-10-021-19/+3
| | | | | | | | | | | [Makefile.in auth1.c auth2.c auth.c auth.h auth-krb5.c canohost.c cleanup.c clientloop.c fatal.c gss-serv.c log.c log.h monitor.c monitor.h monitor_wrap.c monitor_wrap.h packet.c serverloop.c session.c session.h ssh-agent.c sshd.c] replace fatal_cleanup() and linked list of fatal callbacks with static cleanup_exit() function. re-refine cleanup_exit() where appropriate, allocate sshd's authctxt eary to allow simpler cleanup in sshd. tested by many, ok deraadt@
* - markus@cvs.openbsd.org 2003/08/26 09:58:43Damien Miller2003-09-031-1/+2
| | | | | | | [auth-passwd.c auth.c auth.h auth1.c auth2-none.c auth2-passwd.c] [auth2.c monitor.c] fix passwd auth for 'username leaks via timing'; with djm@, original patches from solar
* - markus@cvs.openbsd.org 2003/08/22 13:22:27Darren Tucker2003-08-261-7/+1
| | | | | [auth2.c] (auth2-krb5.c removed) nuke "kerberos-2@ssh.com"
* - markus@cvs.openbsd.org 2003/08/22 10:56:09Darren Tucker2003-08-261-1/+17
| | | | | | | | | [auth2.c auth2-gss.c auth.h compat.c compat.h gss-genr.c gss-serv-krb5.c gss-serv.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h readconf.c readconf.h servconf.c servconf.h session.c session.h ssh-gss.h ssh_config.5 sshconnect2.c sshd_config sshd_config.5] support GSS API user authentication; patches from Simon Wilkinson, stripped down and tested by Jakob and myself.
* - (djm) Bug #564: Perform PAM account checks for all authentications whenDamien Miller2003-08-251-0/+5
| | | | UsePAM=yes; ok dtucker
* - markus@cvs.openbsd.org 2003/06/24 08:23:46Darren Tucker2003-06-281-2/+2
| | | | | | [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c] int -> u_int; ok djm@, deraadt@, mouring@
* - (djm) Add new UsePAM configuration directive to allow runtime controlDamien Miller2003-05-141-12/+4
| | | | | over usage of PAM. This allows non-root use of sshd when built with --with-pam
* - markus@cvs.openbsd.org 2003/05/14 02:15:47Damien Miller2003-05-141-1/+7
| | | | | | [auth2.c monitor.c sshconnect2.c auth2-krb5.c] implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@ server interops with commercial client; ok jakob@ djm@
* - (djm) RCSID sync w/ OpenBSDDamien Miller2003-05-141-1/+1
|
* - (djm) Bug #117: Don't lie to PAM about usernameDamien Miller2003-05-141-1/+1
|
* - (dtucker) Move handling of bad password authentications into a platformDarren Tucker2003-05-021-4/+0
| | | | specific record_failed_login() function (affects AIX & Unicos).
* - (bal) auth2.c same changed as above.Ben Lindstrom2003-04-271-2/+1
|
* *** empty log message ***Damien Miller2003-04-091-1/+1
|
* - markus@cvs.openbsd.org 2003/02/06 21:22:43Damien Miller2003-02-241-3/+2
| | | | | [auth1.c auth2.c] undo broken fix for #387, fixes #486
* Cray fixes (bug 367) based on patch from Wendy Palm @ cray.Tim Rice2002-09-251-0/+11
| | | | This does not include the deattack.c fixes.
* - markus@cvs.openbsd.org 2002/08/22 21:33:58Damien Miller2002-09-041-2/+3
| | | | | | [auth1.c auth2.c] auth_root_allowed() is handled by the monitor in the privsep case, so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325
* - (bal) Failed password attempts don't increment counter on AIX. Bug #145Ben Lindstrom2002-07-041-6/+0
|
* - deraadt@cvs.openbsd.org 2002/06/30 21:54:16Ben Lindstrom2002-07-041-4/+4
| | | | | [auth2.c session.c sshd.c] lint asks that we use names that do not overlap
* some xxx's for future privsep cleanupDamien Miller2002-06-211-0/+1
|
* - (bal) Refixed auth2.c. It was never fully commited while spliting outBen Lindstrom2002-06-071-321/+0
| | | | authentication to different files.
* - markus@cvs.openbsd.org 2002/05/31 11:35:15Ben Lindstrom2002-06-061-40/+32
| | | | | | | [auth.h auth2.c] move Authmethod definitons to per-method file. NOTE: The rest of this patch is with the import of the auth2-*.c files.
* - markus@cvs.openbsd.org 2002/05/25 18:51:07Ben Lindstrom2002-06-061-185/+1
| | | | | | | | | [auth.h auth2.c auth2-hostbased.c auth2-kbdint.c auth2-none.c auth2-passwd.c auth2-pubkey.c Makefile.in] split auth2.c into one file per method; ok provos@/deraadt@ NOTE: Merged back noticable cygwin and pam stuff. May need review to ensure I did not miss anything.
* - itojun@cvs.openbsd.org 2002/05/13 02:37:39Ben Lindstrom2002-05-151-1/+2
| | | | | [auth-skey.c auth2.c] less warnings. skey_{respond,query} are public (in auth.h)
* - (djm) Bug #231: UsePrivilegeSeparation turns off Banner.Damien Miller2002-05-131-12/+31
|
* - (djm) Disable PAM kbd-int auth if privsep is turned on (it doesn't work)Damien Miller2002-05-091-0/+2
|
* - (djm) Make privsep work with PAM (still experimental)Damien Miller2002-04-231-4/+4
|
* - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.hKevin Steves2002-04-041-12/+0
| | | | auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm.
* - (stevesk) [auth2.c] merge cleanup/syncKevin Steves2002-03-221-5/+3
|
* - markus@cvs.openbsd.org 2002/03/19 14:27:39Ben Lindstrom2002-03-221-8/+2
| | | | | [auth.c auth1.c auth2.c] make getpwnamallow() allways call pwcopy()
* - provos@cvs.openbsd.org 2002/03/18 17:50:31Ben Lindstrom2002-03-221-15/+28
| | | | | | | | | | | [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c kexgex.c servconf.c session.h servconf.h serverloop.c session.c sshd.c] integrate privilege separated openssh; its turned off by default for now. work done by me and markus@ applied, but outside of ensure that smaller code bits migrated with their owners.. no work was tried to 'fix' it to work. =) Later project!
* - provos@cvs.openbsd.org 2002/03/18 01:12:14Ben Lindstrom2002-03-221-3/+4
| | | | | | [auth.h auth1.c auth2.c sshd.c] have the authentication functions return the authentication context and then do_authenticated; okay millert@
* - provos@cvs.openbsd.org 2002/03/17 20:25:56Ben Lindstrom2002-03-221-3/+3
| | | | | [auth.c auth.h auth1.c auth2.c] getpwnamallow returns struct passwd * only if user valid; okay markus@
* Stupid djm commits experimental code to head instead of branchDamien Miller2002-03-131-80/+39
| | | | revert
* Import of Niels Provos' 20020312 ssh-complete.diffDamien Miller2002-03-131-39/+80
| | | | PAM, Cygwin and OSF SIA will not work for sure
* - markus@cvs.openbsd.org 2002/02/24 19:14:59Ben Lindstrom2002-02-261-4/+5
| | | | | | [auth2.c authfd.c authfd.h authfile.c kexdh.c kexgex.c key.c key.h ssh-dss.c ssh-dss.h ssh-keygen.c ssh-rsa.c ssh-rsa.h sshconnect2.c] signed vs. unsigned: make size arguments u_int, ok stevesk@
* - (djm) Cleanup after sync:Damien Miller2002-02-051-1/+1
| | | | - :%s/reverse_mapping_check/verify_reverse_mapping/g
* - markus@cvs.openbsd.org 2002/02/04 11:58:10Damien Miller2002-02-051-65/+78
| | | | | [auth2.c] cross checking of announced vs actual pktype in pubkey/hostbaed auth; ok stevesk@
* - markus@cvs.openbsd.org 2002/01/29 14:32:03Damien Miller2002-02-051-2/+2
| | | | | [auth2.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c canohost.c servconf.c servconf.h session.c sshd.8 sshd_config] s/ReverseMappingCheck/VerifyReverseMapping/ and avoid confusion; ok stevesk@
* - markus@cvs.openbsd.org 2002/01/13 17:57:37Damien Miller2002-01-221-18/+9
| | | | | [auth2.c auth2-chall.c compat.c sshconnect2.c sshd.c] use buffer API and avoid static strings of fixed size; ok provos@/mouring@
* - markus@cvs.openbsd.org 2002/01/11 13:39:36Damien Miller2002-01-221-14/+3
| | | | | | | | | [auth2.c dispatch.c dispatch.h kex.c] a single dispatch_protocol_error() that sends a message of type 'UNIMPLEMENTED' dispatch_range(): set handler for a ranges message types use dispatch_protocol_ignore() for authentication requests after successful authentication (the drafts requirement). serverloop/clientloop now send a 'UNIMPLEMENTED' message instead of exiting.
* - markus@cvs.openbsd.org 2001/12/28 15:06:00Damien Miller2002-01-221-8/+8
| | | | | [auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c dispatch.h kex.c kex.h serverloop.c ssh.c sshconnect2.c] remove plen from the dispatch fn. it's no longer used.
* - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller2002-01-221-7/+7
| | | | | [auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
* - (djm) Apply Cygwin pointer deref fix from Corinna VinschenDamien Miller2001-12-291-4/+4
| | | | <vinschen@redhat.com> Could be abused to guess valid usernames
* - djm@cvs.openbsd.org 2001/12/20 22:50:24Damien Miller2001-12-211-8/+8
| | | | | | | | | [auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c] [dispatch.h kex.c kex.h packet.c packet.h serverloop.c ssh.c] [sshconnect2.c] Conformance fix: we should send failing packet sequence number when responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by yakk@yakk.dot.net; ok markus@
* - deraadt@cvs.openbsd.org 2001/12/19 07:18:56Damien Miller2001-12-211-2/+2
| | | | | | | | | | | | [auth1.c auth2.c auth2-chall.c auth-bsdauth.c auth.c authfile.c auth.h] [auth-krb4.c auth-rhosts.c auth-skey.c bufaux.c canohost.c channels.c] [cipher.c clientloop.c compat.c compress.c deattack.c key.c log.c mac.c] [match.c misc.c nchan.c packet.c readconf.c rijndael.c rijndael.h scard.c] [servconf.c servconf.h serverloop.c session.c sftp.c sftp-client.c] [sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c] [sshconnect1.c sshconnect2.c sshconnect.c sshd.8 sshd.c sshd_config] [ssh-keygen.c sshlogin.c sshpty.c sshtty.c ttymodes.c uidswap.c] basic KNF done while i was looking for something else
* - jakob@cvs.openbsd.org 2001/12/18 10:05:15Damien Miller2001-12-211-1/+6
| | | | | [auth2.c] log fingerprint on successful public key authentication; ok markus@
* - markus@cvs.openbsd.org 2001/12/09 18:45:56Damien Miller2001-12-211-8/+2
| | | | | | [auth2.c auth2-chall.c auth.h] add auth2_challenge_stop(), simplifies cleanup of kbd-int sessions, fixes memleak.