summaryrefslogtreecommitdiff
path: root/lib
Commit message (Collapse)AuthorAgeFilesLines
* Revert "Make hmac-sha2-{256,512}-etm opt-in"revert-757-opt-in-etm-hmacMiklós Fazekas2020-04-251-4/+3
|
* Fix corrupted hmac detectedMiklos Fazekas2020-04-251-1/+1
|
* Merge pull request #751 from maxfierke/mf-support_algo_subtractionMiklós Fazekas2020-04-241-3/+17
|\ | | | | Support algorithm subtraction syntax from ssh_config
| * Support algorithm subtraction syntax from ssh_configMax Fierke2020-04-141-3/+17
| | | | | | | | | | | | | | | | | | | | As per `man ssh_config` for KexAlgorithms, MACs, and similar options: ``` Multiple algorithms must be comma-separated. Alternately if the specified value begins with a '+' character, then the specified methods will be appended to the default set instead of replacing them. If the specified value begins with a '-' character, then the specified methods (including wildcards) will be removed from the default set instead of replacing them. ``` Without this, having these subtraction options in your SSH config will replace the default algorithms and cause Net::SSH to raise with `Net::SSH::Exception` and "could not settle on host_key algorithm". i.e. it uses `-ssh-rsa` as the algorithm, rather than removing `ssh-rsa` from the algorithm preferences.
* | 6.0.1v6.0.1Miklos Fazekas2020-04-241-1/+1
| |
* | Make hmac-md5-96 hmac-sha2-512-etm@openssh.com hmac-sha2-256-etm@openssh.com ↵Miklos Fazekas2020-04-241-3/+4
| | | | | | | | opt in instead of default because of the currpoted hmac issue
* | Added new basic hmac integration test for etmMiklos Fazekas2020-04-201-1/+3
| |
* | Final releasev6.0.0Miklos Fazekas2020-04-201-1/+1
|/
* Update version.rbMiklós Fazekas2020-03-181-1/+1
|
* Merge pull request #745 from uzxmx/masterMiklós Fazekas2020-03-163-3/+16
|\ | | | | Add set_env option
| * Add integration test for set_env optionMingxiang Xue2020-03-112-5/+0
| | | | | | | | Signed-off-by: Mingxiang Xue <mingxiangxue@gmail.com>
| * Fix rubocop stylesMingxiang Xue2020-03-092-0/+5
| | | | | | | | Signed-off-by: Mingxiang Xue <mingxiangxue@gmail.com>
| * Add set_env optionMingxiang Xue2020-03-093-3/+16
| | | | | | | | Signed-off-by: Mingxiang Xue <mingxiangxue@gmail.com>
* | Merge pull request #746 from sskousen/masterMiklós Fazekas2020-03-161-1/+10
|\ \ | | | | | | Limit cert.valid_before to max supported by JRuby
| * | Only limit value if on JRubySeth Skousen2020-03-121-3/+4
| | |
| * | Only limit valid_before if on JRubySeth Skousen2020-03-121-5/+5
| | |
| * | Only limit value if on JRubySeth Skousen2020-03-121-1/+6
| | |
| * | Limit cert.valid_before to max supported by JRubySeth Skousen2020-03-111-1/+4
| |/
* | RbNacl dependecy was replaced with ed25519Popa Marius Adrian2020-03-131-1/+1
|/
* (GH-737) Allow known_hosts to have empty lines and commentsdonoghuc2020-02-151-1/+2
| | | | Previously empty lines in a known_hosts file would result in an exception parsing the file. This commit updates the parser to allow empty lines as well as comments. Note that comments were already supported.
* One more fixAlexander Pyatkin2020-02-111-0/+1
|
* Fix kex algorithm nameAlexander Pyatkin2020-02-111-1/+1
|
* Merge pull request #733 from ↵Miklós Fazekas2020-02-111-2/+2
|\ | | | | | | | | hirura/fix-loggable_facility_to_use_to_s_method_instead_of_name_method_for_self_class Fix Loggable to use to_s method instead of name method for self.class
| * Fix Loggable to use to_s method instead of name method for self.classhirura2020-01-111-2/+2
| |
* | allow multiple newlines for OPENSSH PRIVATE KEYsawanoboly2020-01-231-1/+2
| |
* | beta2 preparev6.0.0.beta2Miklos Fazekas2020-01-191-1/+1
| |
* | Merge pull request #722 from anderscarling/certkeysMiklós Fazekas2020-01-194-26/+62
|\ \ | |/ |/| Support :certkeys and CertificateFile configuration option
| * Reduce number of lines in method to satisfy rubocopAnders Carling2019-10-311-21/+21
| |
| * Restore accidentally reordered valueAnders Carling2019-10-311-1/+1
| |
| * Reduce number of lines in block to satisfy rubocopAnders Carling2019-10-311-6/+2
| |
| * Place value in globals if we're in a global contextAnders Carling2019-10-311-1/+1
| |
| * Fix rubocop complaintsAnders Carling2019-10-311-1/+0
| |
| * Remove disused variableAnders Carling2019-10-311-1/+1
| |
| * Fix signing with private key file existing both on disk and in agent, ↵Anders Carling2019-10-311-7/+2
| | | | | | | | without corresponding public key on disk
| * Support :certkeys and CertificateFile configuration optionAnders Carling2019-10-294-4/+50
| |
* | Remove ruby_compat to comply with the new Ruby >= 2.3 requirementMaxime Alay-Eddine2019-11-138-20/+0
|/
* 6.0.0 beta1 prepareMiklos Fazekas2019-10-251-3/+3
|
* Original (brbrady) Add support for all algorithms in ↵Brandon Weaver2019-10-251-2/+2
| | | | Transport::Algorithms#host_key_format
* Define rubocop metric lengthFlorian Wininger2019-09-2511-21/+48
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Add sha2-{256,512}-etm@openssh.com MAC algorithmsHans de Graaff2019-09-176-22/+101
| | | | | | | | | | | | | | | Implement the Encrypt-Then-Mac versions of the SHA2-256 and SHA2-512 MACs. These MACs are implemented by openssh and may be the only MACs available on a hardened installation of openssh. With EtM the MAC is calculated over the unencrypted packet length and the encrypted payload (which includes padding length and padding). The main benefit of EtM schemes is that it allows the encrypted payload to be authenticated before it gets passed to the encryption engine. This patch does not implement that mechanism, but this can be added later to the poll_next_packet method. Note that all current MACs already pass unauthenticated data to the encryption engine.
* Add Curve25519Sha256Florian Wininger2019-09-104-18/+99
| | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Merge pull request #708 from fwininger/refactoring_kexMiklós Fazekas2019-09-044-65/+95
|\ | | | | Refactoring kex ecdh with RFC5656
| * Refactoring kex ecdh RFC5656Florian Wininger2019-08-284-65/+95
| | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* | Disable by default unsecure algorithmFlorian Wininger2019-09-022-26/+42
|/ | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* Merge pull request #704 from fwininger/rubocop_small_copMiklós Fazekas2019-08-281-7/+1
|\ | | | | Enhance some code
| * Refactoring style unlesselse.Florian Wininger2019-08-231-7/+1
| | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* | Merge pull request #703 from fwininger/openssl4Miklós Fazekas2019-08-281-11/+9
|\ \ | | | | | | Modernize OpenSSL SHA2 implementation
| * | Modernize OpenSSL SHA2 implementationFlorian Wininger2019-08-231-11/+9
| |/ | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>
* | Merge pull request #702 from fwininger/refactoring_kex2Miklós Fazekas2019-08-285-136/+130
|\ \ | | | | | | Refactoring kex
| * | Add Abstract Kex classFlorian Wininger2019-08-243-113/+121
| | | | | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com>