summaryrefslogtreecommitdiff
path: root/clientloop.c
Commit message (Collapse)AuthorAgeFilesLines
* - reyk@cvs.openbsd.org 2005/12/30 15:56:37Damien Miller2005-12-311-2/+2
| | | | | | [channels.c channels.h clientloop.c] add channel output filter interface. ok djm@, suggested by markus@
* - (djm) OpenBSD CVS SyncDamien Miller2005-12-311-3/+3
| | | | | | - stevesk@cvs.openbsd.org 2005/12/28 22:46:06 [canohost.c channels.c clientloop.c] use 'break-in' for consistency; ok deraadt@ ok and input jmc@
* - djm@cvs.openbsd.org 2005/12/07 03:52:22Damien Miller2005-12-131-1/+2
| | | | | [clientloop.c] reyk forgot to compile with -Werror (missing header)
* - reyk@cvs.openbsd.org 2005/12/06 22:38:28Damien Miller2005-12-131-1/+10
| | | | | | | | | | | | | | | | | [auth-options.c auth-options.h channels.c channels.h clientloop.c] [misc.c misc.h readconf.c readconf.h scp.c servconf.c servconf.h] [serverloop.c sftp.c ssh.1 ssh.c ssh_config ssh_config.5 sshconnect.c] [sshconnect.h sshd.8 sshd_config sshd_config.5] Add support for tun(4) forwarding over OpenSSH, based on an idea and initial channel code bits by markus@. This is a simple and easy way to use OpenSSH for ad hoc virtual private network connections, e.g. administrative tunnels or secure wireless access. It's based on a new ssh channel and works similar to the existing TCP forwarding support, except that it depends on the tun(4) network interface on both ends of the connection for layer 2 or layer 3 tunneling. This diff also adds support for LocalCommand in the ssh(1) client. ok djm@, markus@, jmc@ (manpages), tested and discussed with others
* - djm@cvs.openbsd.org 2005/10/30 08:52:18Damien Miller2005-11-051-2/+2
| | | | | | [clientloop.c packet.c serverloop.c session.c ssh-agent.c ssh-keygen.c] [ssh.c sshconnect.c sshconnect1.c sshd.c] no need to escape single quotes in comments, no binary change
* - stevesk@cvs.openbsd.org 2005/10/14 02:29:37Damien Miller2005-11-051-4/+4
| | | | | [channels.c clientloop.c] free()->xfree(); ok djm@
* - djm@cvs.openbsd.org 2005/10/10 10:23:08Damien Miller2005-11-051-2/+2
| | | | | | | [channels.c channels.h clientloop.c serverloop.c session.c] fix regression I introduced in 4.2: X11 forwardings initiated after a session has exited (e.g. "(sleep 5; xterm) &") would not start. bz #1086 reported by t8m AT centrum.cz; ok markus@ dtucker@
* - markus@cvs.openbsd.org 2005/09/09 19:18:05Darren Tucker2005-10-031-2/+2
| | | | | [clientloop.c] typo; from mark at mcs.vuw.ac.nz, bug #1082
* - djm@cvs.openbsd.org 2005/07/16 01:35:24Damien Miller2005-07-171-2/+2
| | | | | | [auth1.c channels.c cipher.c clientloop.c kex.c session.c ssh.c] [sshconnect.c] spacing
* - djm@cvs.openbsd.org 2005/07/04 00:58:43Damien Miller2005-07-061-6/+29
| | | | | | | | | [channels.c clientloop.c clientloop.h misc.c misc.h ssh.c ssh_config.5] implement support for X11 and agent forwarding over multiplex slave connections. Because of protocol limitations, the slave connections inherit the master's DISPLAY and SSH_AUTH_SOCK rather than distinctly forwarding their own. ok dtucker@ "put it in" deraadt@
* - djm@cvs.openbsd.org 2005/06/17 02:44:33Damien Miller2005-06-171-4/+7
| | | | | | | | | | | [auth-rsa.c auth.c auth1.c auth2-chall.c auth2-gss.c authfd.c authfile.c] [bufaux.c canohost.c channels.c cipher.c clientloop.c dns.c gss-serv.c] [kex.c kex.h key.c mac.c match.c misc.c packet.c packet.h scp.c] [servconf.c session.c session.h sftp-client.c sftp-server.c sftp.c] [ssh-keyscan.c ssh-rsa.c sshconnect.c sshconnect1.c sshconnect2.c sshd.c] make this -Wsign-compare clean; ok avsm@ markus@ NB. auth1.c changes not committed yet (conflicts with uncommitted sync) NB2. more work may be needed to make portable Wsign-compare clean
* - (djm) OpenBSD CVS SyncDamien Miller2005-06-171-1/+104
| | | | | | | - djm@cvs.openbsd.org 2005/06/16 03:38:36 [channels.c channels.h clientloop.c clientloop.h ssh.c] move x11_get_proto from ssh.c to clientloop.c, to make muliplexed xfwd easier later; ok deraadt@
* - djm@cvs.openbsd.org 2005/06/08 11:25:09Damien Miller2005-06-161-3/+5
| | | | | | [clientloop.c readconf.c readconf.h ssh.c ssh_config.5] add ControlMaster=auto/autoask options to support opportunistic multiplexing; tested avsm@ and jakob@, ok markus@
* - deraadt@cvs.openbsd.org 2005/03/10 22:01:05Darren Tucker2005-03-141-2/+2
| | | | | | | [misc.c ssh-keygen.c servconf.c clientloop.c auth-options.c ssh-add.c monitor.c sftp-client.c bufaux.h hostfile.c ssh.c sshconnect.c channels.c readconf.c bufaux.c sftp.c] spacing
* - djm@cvs.openbsd.org 2005/03/01 10:09:52Damien Miller2005-03-011-24/+25
| | | | | | | | | | [auth-options.c channels.c channels.h clientloop.c compat.c compat.h] [misc.c misc.h readconf.c readconf.h servconf.c ssh.1 ssh.c ssh_config.5] [sshd_config.5] bz#413: allow optional specification of bind address for port forwardings. Patch originally by Dan Astorian, but worked on by several people Adds GatewayPorts=clientspecified option on server to allow remote forwards to bind to client-specified ports.
* - djm@cvs.openbsd.org 2004/11/07 00:01:46Darren Tucker2004-11-071-15/+71
| | | | | | [clientloop.c clientloop.h ssh.1 ssh.c] add basic control of a running multiplex master connection; including the ability to check its status and request it to exit; ok markus@
* - djm@cvs.openbsd.org 2004/10/29 22:53:56Darren Tucker2004-11-051-19/+4
| | | | | [clientloop.c misc.h readpass.c ssh-agent.c] factor out common permission-asking code to separate function; ok markus@
* - djm@cvs.openbsd.org 2004/10/29 21:47:15Darren Tucker2004-11-051-17/+10
| | | | | | | | [channels.c channels.h clientloop.c] fix some window size change bugs for multiplexed connections: windows sizes were not being updated if they had changed after ~^Z suspends and SIGWINCH was not being processed unless the first connection had requested a tty; ok markus
* - djm@cvs.openbsd.org 2004/09/07 23:41:30Darren Tucker2004-11-051-1/+3
| | | | | | [clientloop.c ssh.c] cleanup multiplex control socket on SIGHUP too, spotted by sturm@ ok markus@ deraadt@
* - avsm@cvs.openbsd.org 2004/08/11 21:43:05Darren Tucker2004-08-131-3/+4
| | | | | [channels.c channels.h clientloop.c misc.c misc.h serverloop.c ssh-agent.c] some signed/unsigned int comparison cleanups; markus@ ok
* - deraadt@cvs.openbsd.org 2004/07/11 17:48:47Darren Tucker2004-07-171-9/+9
| | | | | | | | [channels.c cipher.c clientloop.c clientloop.h compat.h moduli.c readconf.c nchan.c pathnames.h progressmeter.c readconf.h servconf.c session.c sftp-client.c sftp.c ssh-agent.1 ssh-keygen.c ssh.c ssh1.h sshd.c ttymodes.h] spaces
* - djm@cvs.openbsd.org 2004/06/18 11:11:54Damien Miller2004-06-181-4/+5
| | | | | | [channels.c clientloop.c] Don't explode in clientloop when we receive a bogus channel id, but also don't generate them to begin with; ok markus@
* - djm@cvs.openbsd.org 2004/06/17 15:10:14Damien Miller2004-06-181-4/+34
| | | | | | [clientloop.c misc.h readconf.c readpass.c ssh.c ssh_config.5] Add option for confirmation (ControlMaster=ask) via ssh-askpass before opening shared connections; ok markus@
* - (djm) OpenBSD CVS SyncDamien Miller2004-06-181-11/+27
| | | | | | - djm@cvs.openbsd.org 2004/06/17 14:52:48 [clientloop.c clientloop.h ssh.c] support environment passing over shared connections; ok markus@
* - djm@cvs.openbsd.org 2004/06/15 05:45:04Damien Miller2004-06-151-2/+2
| | | | | [clientloop.c] missed one unset_nonblock; spotted by Tim Rice
* - djm@cvs.openbsd.org 2004/06/14 01:44:39Damien Miller2004-06-151-2/+2
| | | | | | [channels.c clientloop.c misc.c misc.h packet.c ssh-agent.c ssh-keyscan.c] [sshd.c] set_nonblock() instead of fnctl(...,O_NONBLOCK); "looks sane" deraadt@
* - djm@cvs.openbsd.org 2004/06/13 15:03:02Damien Miller2004-06-151-23/+304
| | | | | | | [channels.c channels.h clientloop.c clientloop.h includes.h readconf.c] [readconf.h scp.1 sftp.1 ssh.1 ssh.c ssh_config.5] implement session multiplexing in the client (the server has supported this since 2.0); ok markus@
* - djm@cvs.openbsd.org 2004/05/22 06:32:12Darren Tucker2004-05-241-2/+2
| | | | | [clientloop.c ssh.1] use '-h' for help in ~C commandline instead of '-?'; inspired by jmc@
* - djm@cvs.openbsd.org 2004/05/21 11:33:11Darren Tucker2004-05-241-25/+59
| | | | | | | [channels.c channels.h clientloop.c serverloop.c ssh.1] bz #756: add support for the cancel-tcpip-forward request for the server and the client (through the ~C commandline). reported by z3p AT twistedmatrix.com; ok markus@
* - dtucker@cvs.openbsd.org 2004/05/20 10:58:05Darren Tucker2004-05-241-2/+2
| | | | | [clientloop.c] Trivial type fix 0 -> '\0'; ok markus@
* - djm@cvs.openbsd.org 2004/05/08 00:21:31Darren Tucker2004-05-131-2/+1
| | | | | | [clientloop.c misc.h readpass.c scard.c ssh-add.c ssh-agent.c ssh-keygen.c sshconnect.c sshconnect1.c sshconnect2.c] removed: readpass.h kill a tiny header; ok deraadt@
* - deraadt@cvs.openbsd.org 2004/05/08 00:01:37Darren Tucker2004-05-131-2/+2
| | | | | | [auth.c clientloop.c misc.h servconf.c ssh.c sshpty.h sshtty.c tildexpand.c], removed: sshtty.h tildexpand.h make two tiny header files go away; djm ok
* - markus@cvs.openbsd.org 2003/12/16 15:49:51Damien Miller2003-12-171-8/+37
| | | | | | | | [clientloop.c clientloop.h readconf.c readconf.h scp.1 sftp.1 ssh.1] [ssh.c ssh_config.5] application layer keep alive (ServerAliveInterval ServerAliveCountMax) for ssh(1), similar to the sshd(8) option; ok beck@; with help from jmc and dtucker@
* - dtucker@cvs.openbsd.org 2003/12/09 23:45:32Damien Miller2003-12-171-1/+14
| | | | | [clientloop.c] Clear exit code when ssh -N is terminated with a SIGTERM. ok markus@
* - markus@cvs.openbsd.org 2003/09/23 20:41:11Darren Tucker2003-10-021-2/+42
| | | | | [channels.c channels.h clientloop.c] move client only agent code to clientloop.c
* - markus@cvs.openbsd.org 2003/09/23 20:17:11Darren Tucker2003-10-021-8/+3
| | | | | | | | | | | [Makefile.in auth1.c auth2.c auth.c auth.h auth-krb5.c canohost.c cleanup.c clientloop.c fatal.c gss-serv.c log.c log.h monitor.c monitor.h monitor_wrap.c monitor_wrap.h packet.c serverloop.c session.c session.h ssh-agent.c sshd.c] replace fatal_cleanup() and linked list of fatal callbacks with static cleanup_exit() function. re-refine cleanup_exit() where appropriate, allocate sshd's authctxt eary to allow simpler cleanup in sshd. tested by many, ok deraadt@
* - markus@cvs.openbsd.org 2003/09/19 17:43:35Darren Tucker2003-09-221-9/+17
| | | | | [clientloop.c sshtty.c sshtty.h] remove fatal callbacks from client code; ok deraadt
* - deraadt@cvs.openbsd.org 2003/06/28 16:23:06Darren Tucker2003-07-031-3/+3
| | | | | | | [atomicio.c atomicio.h authfd.c clientloop.c monitor_wrap.c msg.c progressmeter.c scp.c sftp-client.c ssh-keyscan.c ssh.h sshconnect.c sshd.c] deal with typing of write vs read in atomicio
* - markus@cvs.openbsd.org 2003/05/14 22:24:42Damien Miller2003-05-151-2/+16
| | | | | [clientloop.c session.c ssh.1] allow to send a BREAK to the remote system; ok various
* - markus@cvs.openbsd.org 2003/05/11 20:30:25Damien Miller2003-05-141-5/+4
| | | | | [channels.c clientloop.c serverloop.c session.c ssh.c] make channel_new() strdup the 'remote_name' (not the caller); ok theo
* - (djm) RCSID sync w/ OpenBSDDamien Miller2003-05-141-1/+1
|
* *** empty log message ***Damien Miller2003-04-091-7/+7
|
* - (djm) OpenBSD CVS SyncDamien Miller2003-04-091-4/+3
| | | | | | | - markus@cvs.openbsd.org 2003/04/02 09:48:07 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] [readconf.h serverloop.c sshconnect2.c] reapply rekeying chage, tested by henning@, ok djm@
* - markus@cvs.openbsd.org 2003/04/01 10:10:23Damien Miller2003-04-011-1/+1
| | | | | | | | | | | | | | | | | | | [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] [readconf.h serverloop.c sshconnect2.c] rekeying bugfixes and automatic rekeying: * both client and server rekey _automatically_ (a) after 2^31 packets, because after 2^32 packets the sequence number for packets wraps (b) after 2^(blocksize_in_bits/4) blocks (see: draft-ietf-secsh-newmodes-00.txt) (a) and (b) are _enabled_ by default, and only disabled for known openssh versions, that don't support rekeying properly. * client option 'RekeyLimit' * do not reply to requests during rekeying - markus@cvs.openbsd.org 2003/04/01 10:22:21 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] [readconf.h serverloop.c sshconnect2.c] backout rekeying changes (for 3.6.1)
* - markus@cvs.openbsd.org 2002/11/18 16:43:44Ben Lindstrom2002-12-231-5/+11
| | | | | | [clientloop.c] don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN; e.g. if ssh is used for backup; report Joerg Schilling; ok millert@
* - stevesk@cvs.openbsd.org 2002/08/22 19:38:42Damien Miller2002-09-041-10/+12
| | | | | | [clientloop.c] format with current EscapeChar; bugzilla #388 from wknox@mitre.org. ok markus@
* - deraadt@cvs.openbsd.org 2002/06/30 21:59:45Ben Lindstrom2002-07-041-4/+4
| | | | | | | [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c sshconnect2.c sshd.c] minor KNF
* - markus@cvs.openbsd.org 2002/06/24 14:33:27Ben Lindstrom2002-06-251-4/+2
| | | | | [channels.c channels.h clientloop.c serverloop.c] move channel counter to u_int
* - (bal) RCSID tag updates on channels.c, clientloop.c, nchan.c,Ben Lindstrom2002-06-091-1/+1
| | | | | sftp-client.c, ssh-agenet.c, ssh-keygen.c and connect.h (we did unexpand independant of them)
* unexpandBen Lindstrom2002-06-091-1/+1
|