Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | | (GH-737) Allow known_hosts to have empty lines and comments | donoghuc | 2020-02-15 | 1 | -1/+2 | |
| | | | | | | | | Previously empty lines in a known_hosts file would result in an exception parsing the file. This commit updates the parser to allow empty lines as well as comments. Note that comments were already supported. | |||||
* | | One more fix | Alexander Pyatkin | 2020-02-11 | 1 | -0/+1 | |
| | | ||||||
* | | Fix kex algorithm name | Alexander Pyatkin | 2020-02-11 | 1 | -1/+1 | |
| | | ||||||
* | | Merge pull request #733 from ↵ | Miklós Fazekas | 2020-02-11 | 1 | -2/+2 | |
|\ \ | | | | | | | | | | | | | hirura/fix-loggable_facility_to_use_to_s_method_instead_of_name_method_for_self_class Fix Loggable to use to_s method instead of name method for self.class | |||||
| * | | Fix Loggable to use to_s method instead of name method for self.class | hirura | 2020-01-11 | 1 | -2/+2 | |
| |/ | ||||||
* | | allow multiple newlines for OPENSSH PRIVATE KEY | sawanoboly | 2020-01-23 | 1 | -1/+2 | |
| | | ||||||
* | | beta2 preparev6.0.0.beta2 | Miklos Fazekas | 2020-01-19 | 1 | -1/+1 | |
| | | ||||||
* | | Merge pull request #722 from anderscarling/certkeys | Miklós Fazekas | 2020-01-19 | 4 | -26/+62 | |
|\ \ | |/ |/| | Support :certkeys and CertificateFile configuration option | |||||
| * | Reduce number of lines in method to satisfy rubocop | Anders Carling | 2019-10-31 | 1 | -21/+21 | |
| | | ||||||
| * | Restore accidentally reordered value | Anders Carling | 2019-10-31 | 1 | -1/+1 | |
| | | ||||||
| * | Reduce number of lines in block to satisfy rubocop | Anders Carling | 2019-10-31 | 1 | -6/+2 | |
| | | ||||||
| * | Place value in globals if we're in a global context | Anders Carling | 2019-10-31 | 1 | -1/+1 | |
| | | ||||||
| * | Fix rubocop complaints | Anders Carling | 2019-10-31 | 1 | -1/+0 | |
| | | ||||||
| * | Remove disused variable | Anders Carling | 2019-10-31 | 1 | -1/+1 | |
| | | ||||||
| * | Fix signing with private key file existing both on disk and in agent, ↵ | Anders Carling | 2019-10-31 | 1 | -7/+2 | |
| | | | | | | | | without corresponding public key on disk | |||||
| * | Support :certkeys and CertificateFile configuration option | Anders Carling | 2019-10-29 | 4 | -4/+50 | |
| | | ||||||
* | | Remove ruby_compat to comply with the new Ruby >= 2.3 requirement | Maxime Alay-Eddine | 2019-11-13 | 8 | -20/+0 | |
|/ | ||||||
* | 6.0.0 beta1 prepare | Miklos Fazekas | 2019-10-25 | 1 | -3/+3 | |
| | ||||||
* | Original (brbrady) Add support for all algorithms in ↵ | Brandon Weaver | 2019-10-25 | 1 | -2/+2 | |
| | | | | Transport::Algorithms#host_key_format | |||||
* | Define rubocop metric length | Florian Wininger | 2019-09-25 | 11 | -21/+48 | |
| | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
* | Add sha2-{256,512}-etm@openssh.com MAC algorithms | Hans de Graaff | 2019-09-17 | 6 | -22/+101 | |
| | | | | | | | | | | | | | | | Implement the Encrypt-Then-Mac versions of the SHA2-256 and SHA2-512 MACs. These MACs are implemented by openssh and may be the only MACs available on a hardened installation of openssh. With EtM the MAC is calculated over the unencrypted packet length and the encrypted payload (which includes padding length and padding). The main benefit of EtM schemes is that it allows the encrypted payload to be authenticated before it gets passed to the encryption engine. This patch does not implement that mechanism, but this can be added later to the poll_next_packet method. Note that all current MACs already pass unauthenticated data to the encryption engine. | |||||
* | Add Curve25519Sha256 | Florian Wininger | 2019-09-10 | 4 | -18/+99 | |
| | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
* | Merge pull request #708 from fwininger/refactoring_kex | Miklós Fazekas | 2019-09-04 | 4 | -65/+95 | |
|\ | | | | | Refactoring kex ecdh with RFC5656 | |||||
| * | Refactoring kex ecdh RFC5656 | Florian Wininger | 2019-08-28 | 4 | -65/+95 | |
| | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
* | | Disable by default unsecure algorithm | Florian Wininger | 2019-09-02 | 2 | -26/+42 | |
|/ | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
* | Merge pull request #704 from fwininger/rubocop_small_cop | Miklós Fazekas | 2019-08-28 | 1 | -7/+1 | |
|\ | | | | | Enhance some code | |||||
| * | Refactoring style unlesselse. | Florian Wininger | 2019-08-23 | 1 | -7/+1 | |
| | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
* | | Merge pull request #703 from fwininger/openssl4 | Miklós Fazekas | 2019-08-28 | 1 | -11/+9 | |
|\ \ | | | | | | | Modernize OpenSSL SHA2 implementation | |||||
| * | | Modernize OpenSSL SHA2 implementation | Florian Wininger | 2019-08-23 | 1 | -11/+9 | |
| |/ | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
* | | Merge pull request #702 from fwininger/refactoring_kex2 | Miklós Fazekas | 2019-08-28 | 5 | -136/+130 | |
|\ \ | | | | | | | Refactoring kex | |||||
| * | | Add Abstract Kex class | Florian Wininger | 2019-08-24 | 3 | -113/+121 | |
| | | | | | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
| * | | Refactor DH get_parameters | Florian Wininger | 2019-08-23 | 1 | -16/+5 | |
| | | | | | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
| * | | Update digester | Florian Wininger | 2019-08-23 | 4 | -11/+8 | |
| |/ | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
* | | Remove check because Openssl 1.0.1 introduice aes-ctr | Florian Wininger | 2019-08-23 | 1 | -9/+8 | |
|/ | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
* | Merge pull request #699 from fwininger/refactoring_kex | Miklós Fazekas | 2019-08-23 | 7 | -48/+27 | |
|\ | | | | | Refactoring kex | |||||
| * | Remove include already include. | Florian Wininger | 2019-08-23 | 1 | -5/+1 | |
| | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
| * | Remove already include modules | Florian Wininger | 2019-08-23 | 3 | -20/+14 | |
| | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
| * | Define properly the get_p and get_g method to handle inheritance. | Florian Wininger | 2019-08-23 | 2 | -12/+2 | |
| | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
| * | Move KEXDH Constant into the Constants Modules | Florian Wininger | 2019-08-23 | 2 | -11/+10 | |
| | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
* | | Remove unnecessary defined?(OpenSSL::PKey::EC) in Kex | Florian Wininger | 2019-08-23 | 1 | -13/+10 | |
| | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
* | | Remove unnecessary defined?(OpenSSL::PKey::EC) in OpenSSL override | Florian Wininger | 2019-08-23 | 1 | -105/+99 | |
| | | | | | | | | Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
* | | Remove unnecessary defined?(OpenSSL::PKey::EC) and ↵ | Florian Wininger | 2019-08-23 | 10 | -95/+56 | |
|/ | | | | | | defined?(OpenSSL::Digest::SHA256) Signed-off-by: Florian Wininger <fw.centrale@gmail.com> | |||||
* | Extract proxy setup into method | Joshua Morgan | 2019-08-20 | 1 | -11/+15 | |
| | ||||||
* | Fix style violations | Joshua Morgan | 2019-08-20 | 1 | -2/+2 | |
| | ||||||
* | Remove nil value check | Joshua Morgan | 2019-08-20 | 1 | -5/+3 | |
| | | | | Check in now done when inserting the proxy values | |||||
* | Consider ProxyCommand and ProxyJump togeather | Joshua Morgan | 2019-08-18 | 1 | -10/+21 | |
| | | | | | ProxyCommand and ProxyJump override each other so they need to be tracked together so the first one set takes precedence | |||||
* | Improve performance of known_hosts parsing | Nick Lewis | 2019-07-11 | 1 | -20/+18 | |
| | | | | | | | | | | | | | This makes two changes to known_hosts parsing: * Only go through the work of building a regex for pattern matching if the entry has pattern characters (* and ?). This was ~75% performance improvement in the case where no patterns are being used. * Use simple string splitting instead of a string scanner when parsing a single line. This was ~20% performance improvement. Together these changes entail ~80% reduction in parsing time with no change in behavior. In a case with a large (20k entries) known_hosts file, the time was reduced from 350ms to 65ms. | |||||
* | Expose StrictHostKeyChecking from SSH config | Michael Smith | 2019-06-20 | 1 | -0/+2 | |
| | | | | | | | | Make this setting available so it can be used when deciding how to configure `verify_host_key` so that users of this library can enable behavior consistent with `ssh`. Resolves #678. | |||||
* | Merge pull request #671 from jmutkawoa/master | Miklós Fazekas | 2019-05-29 | 3 | -20/+5 | |
|\ | | | | | Deprecating RC4 as per https://tools.ietf.org/html/draft-ietf-curdle-rc4-die-die-die-10 | |||||
| * | fix to key_len_override | jmutkawoa | 2019-03-23 | 1 | -1/+1 | |
| | |