|
Revision tags: release/13.4.0-p5, release/13.5.0-p1, release/14.2.0-p3, release/13.5.0, release/14.2.0-p2, release/14.1.0-p8, release/13.4.0-p4, release/14.1.0-p7, release/14.2.0-p1, release/13.4.0-p3, release/14.2.0, release/13.4.0, release/14.1.0, release/13.3.0, release/14.0.0 |
|
| #
d0b2dbfa |
| 16-Aug-2023 |
Warner Losh <[email protected]> |
Remove $FreeBSD$: one-line sh pattern
Remove /^\s*#[#!]?\s*\$FreeBSD\$.*$\n/
|
|
Revision tags: release/13.2.0, release/12.4.0, release/13.1.0, release/12.3.0 |
|
| #
e9a99463 |
| 07-Oct-2021 |
Ed Maste <[email protected]> |
ssh: enable FIDO/U2F keys
Description of FIDO/U2F support (from OpenSSH 8.2 release notes, https://www.openssh.com/txt/release-8.2):
This release adds support for FIDO/U2F hardware authenticators
ssh: enable FIDO/U2F keys
Description of FIDO/U2F support (from OpenSSH 8.2 release notes, https://www.openssh.com/txt/release-8.2):
This release adds support for FIDO/U2F hardware authenticators to OpenSSH. U2F/FIDO are open standards for inexpensive two-factor authentication hardware that are widely used for website authentication. In OpenSSH FIDO devices are supported by new public key types "ecdsa-sk" and "ed25519-sk", along with corresponding certificate types.
ssh-keygen(1) may be used to generate a FIDO token-backed key, after which they may be used much like any other key type supported by OpenSSH, so long as the hardware token is attached when the keys are used. FIDO tokens also generally require the user explicitly authorise operations by touching or tapping them.
Generating a FIDO key requires the token be attached, and will usually require the user tap the token to confirm the operation:
$ ssh-keygen -t ecdsa-sk -f ~/.ssh/id_ecdsa_sk Generating public/private ecdsa-sk key pair. You may need to touch your security key to authorize key generation. Enter file in which to save the key (/home/djm/.ssh/id_ecdsa_sk): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/djm/.ssh/id_ecdsa_sk Your public key has been saved in /home/djm/.ssh/id_ecdsa_sk.pub
This will yield a public and private key-pair. The private key file should be useless to an attacker who does not have access to the physical token. After generation, this key may be used like any other supported key in OpenSSH and may be listed in authorized_keys, added to ssh-agent(1), etc. The only additional stipulation is that the FIDO token that the key belongs to must be attached when the key is used.
To enable FIDO/U2F support, this change regenerates ssh_namespace.h, adds ssh-sk-helper, and sets ENABLE_SK_INTERNAL (unless building WITHOUT_USB).
devd integration is not included in this change, and is under investigation for the base system. In the interim the security/u2f-devd port can be installed to provide appropriate devd rules.
Reviewed by: delphij, kevans Relnotes: Yes Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D32509
show more ...
|
|
Revision tags: release/13.0.0, release/12.2.0, release/11.4.0, release/12.1.0, release/11.3.0, release/12.0.0, release/11.2.0, release/10.4.0 |
|
| #
4b330699 |
| 02-Aug-2017 |
Enji Cooper <[email protected]> |
Convert traditional ${MK_TESTS} conditional idiom for including test directories to SUBDIR.${MK_TESTS} idiom
This is being done to pave the way for future work (and homogenity) in ^/projects/make-ch
Convert traditional ${MK_TESTS} conditional idiom for including test directories to SUBDIR.${MK_TESTS} idiom
This is being done to pave the way for future work (and homogenity) in ^/projects/make-check-sandbox .
No functional change intended.
MFC after: 1 weeks
show more ...
|
|
Revision tags: release/11.1.0, release/11.0.1, release/11.0.0, release/10.3.0 |
|
| #
aa92269e |
| 15-Oct-2015 |
Bryan Drewery <[email protected]> |
Add more SUBDIR_PARALLEL.
MFC after: 3 weeks Sponsored by: EMC / Isilon Storage Division
|
|
Revision tags: release/10.2.0, release/10.1.0, release/9.3.0 |
|
| #
c6063d0d |
| 06-May-2014 |
Warner Losh <[email protected]> |
Use src.opts.mk in preference to bsd.own.mk except where we need stuff from the latter.
|
| #
38f0b757 |
| 21-Apr-2014 |
Julio Merino <[email protected]> |
Add placeholder Kyuafiles for various top-level hierarchies.
This change adds tests/ directories in the source tree to create various subdirectories in /usr/tests/ and to install placeholder Kyuafil
Add placeholder Kyuafiles for various top-level hierarchies.
This change adds tests/ directories in the source tree to create various subdirectories in /usr/tests/ and to install placeholder Kyuafiles for them.
the relevant hierarchies are: cddl, etc, games, gnu and secure.
The reason for this is to simplify the addition of new test programs for utilities or libraries under any of these directories. Doing so on a case by case basis is unnecessary and is quite an obscure process.
show more ...
|
|
Revision tags: release/10.0.0, release/9.2.0, release/8.4.0, release/9.1.0, release/8.3.0_cvs, release/8.3.0, release/9.0.0, release/7.4.0_cvs, release/8.2.0_cvs, release/7.4.0, release/8.2.0, release/8.1.0_cvs, release/8.1.0 |
|
| #
124981e1 |
| 21-Apr-2010 |
Dag-Erling Smørgrav <[email protected]> |
MFH OpenSSH 5.4p1
|
|
Revision tags: release/7.3.0_cvs, release/7.3.0 |
|
| #
b911c45c |
| 10-Mar-2010 |
Dag-Erling Smørgrav <[email protected]> |
Revert r204939
|
| #
32202de7 |
| 10-Mar-2010 |
Doug Barton <[email protected]> |
Fix the build. The ssh-pkcs11-helper directory is empty, which is causing confusion.
|
|
Revision tags: release/8.0.0_cvs, release/8.0.0, release/7.2.0_cvs, release/7.2.0, release/7.1.0_cvs, release/7.1.0, release/6.4.0_cvs, release/6.4.0, release/7.0.0_cvs, release/7.0.0, release/6.3.0_cvs, release/6.3.0, release/6.2.0_cvs, release/6.2.0, release/5.5.0_cvs, release/5.5.0, release/6.1.0_cvs, release/6.1.0 |
|
| #
e1fe3dba |
| 17-Mar-2006 |
Ruslan Ermilov <[email protected]> |
Reimplementation of world/kernel build options. For details, see:
http://lists.freebsd.org/pipermail/freebsd-current/2006-March/061725.html
The src.conf(5) manpage is to follow in a few days.
Bro
Reimplementation of world/kernel build options. For details, see:
http://lists.freebsd.org/pipermail/freebsd-current/2006-March/061725.html
The src.conf(5) manpage is to follow in a few days.
Brought to you by: imp, jhb, kris, phk, ru (all bugs are mine)
show more ...
|
|
Revision tags: release/6.0.0_cvs, release/6.0.0, release/5.4.0_cvs, release/5.4.0, release/4.11.0_cvs, release/4.11.0, release/5.3.0_cvs, release/5.3.0, release/4.10.0_cvs, release/4.10.0, release/5.2.1_cvs, release/5.2.1, release/5.2.0_cvs, release/5.2.0, release/4.9.0_cvs, release/4.9.0 |
|
| #
4afa3718 |
| 16-Jul-2003 |
Mark Murray <[email protected]> |
Very big makeover in the way telnet, telnetd and libtelnet are built.
Previously, there were two copies of telnet; a non-crypto version that lived in the usual places, and a crypto version that live
Very big makeover in the way telnet, telnetd and libtelnet are built.
Previously, there were two copies of telnet; a non-crypto version that lived in the usual places, and a crypto version that lived in crypto/telnet/. The latter was built in a broken manner somewhat akin to other "contribified" sources. This meant that there were 4 telnets competing with each other at build time - KerberosIV, Kerberos5, plain-old-secure and base. KerberosIV is no longer in the running, but the other three took it in turns to jump all over each other during a "make buildworld".
As the crypto issue has been clarified, and crypto _calls_ are not a problem, crypto/telnet has been repo-copied to contrib/telnet, and with this commit, all telnets are now "contribified". The contrib path was chosen to not destroy history in the repository, and differs from other contrib/ entries in that it may be worked on as "normal" BSD code. There is no dangerous crypto in these sources, only a very weak system less strong than enigma(1).
Kerberos5 telnet and Secure telnet are now selected by using the usual macros in /etc/make.conf, and the build process is unsurprising and less treacherous.
show more ...
|
|
Revision tags: release/5.1.0_cvs, release/5.1.0 |
|
| #
dbf104e6 |
| 05-May-2003 |
Mark Murray <[email protected]> |
Turn MAKE_KERBEROS5 into NO_KERBEROS by negating the logic. Some extra cleanups were necessary in release/Makefile, and the tinderbox code was syntax checked, not run checked.
|
| #
6402d39a |
| 30-Apr-2003 |
Ruslan Ermilov <[email protected]> |
Most things depend on !defined(NO_OPENSSL); make it look so.
|
| #
bce0c927 |
| 30-Apr-2003 |
Ruslan Ermilov <[email protected]> |
NOSECURE is implied by NOCRYPT, meaning if the latter is defined we won't be here.
|
| #
581ff5e3 |
| 23-Apr-2003 |
Dag-Erling Smørgrav <[email protected]> |
Remove Kerberos IV shims.
|
|
Revision tags: release/4.8.0_cvs, release/4.8.0, release/5.0.0_cvs, release/5.0.0, release/4.7.0_cvs, release/4.6.2_cvs, release/4.6.2, release/4.6.1 |
|
| #
81d85817 |
| 05-Jul-2002 |
Dag-Erling Smørgrav <[email protected]> |
ssh-keysign(8) belongs in /usr/libexec, not in /usr/bin, and needs to be setuid so ssh(1) doesn't have to be.
Pointy hat to: des Submitted by: Katsuyuki TATEISHI <[email protected]>
|
|
Revision tags: release/4.6.0_cvs, release/4.5.0_cvs, release/4.4.0_cvs |
|
| #
563df952 |
| 03-Aug-2001 |
Mark Murray <[email protected]> |
Revamp and diff-reduce the various secure telnets. Make sure that Kerberos5 has _a_ telnet (which is not currently K5 enabled). Incorporate BDE's static linking fixes.
|
|
Revision tags: release/4.3.0_cvs, release/4.3.0, release/4.2.0, release/4.1.1_cvs |
|
| #
65c9b74c |
| 16-Sep-2000 |
Kris Kennaway <[email protected]> |
Only build sftp-server conditionally
|
| #
89cdeb29 |
| 15-Sep-2000 |
Andrey A. Chernov <[email protected]> |
Add sftp-server
|
|
Revision tags: release/4.1.0 |
|
| #
abe829c0 |
| 25-Jul-2000 |
Kris Kennaway <[email protected]> |
Don't build crypto-enabled telnetd if NO_OPENSSL is defined, since it attempts to link against libcrypto.
|
|
Revision tags: release/3.5.0_cvs, release/4.0.0_cvs, release/3.4.0_cvs |
|
| #
1a19815c |
| 12-Oct-1999 |
Mark Murray <[email protected]> |
Dont build telenet if we are going for kerberised telnet; this just jumps all over kerberised telnet otherwise.
|
| #
d14fc57c |
| 07-Oct-1999 |
Mark Murray <[email protected]> |
Make telnet with SRA work.
Submitted by: Nick Sayer
|
|
Revision tags: release/3.3.0_cvs, release/3.2.0, release/3.1.0, release/3.0.0, release/2.2.8, release/2.2.7, release/2.2.6, release/2.2.5_cvs, release/2.2.2_cvs, release/2.2.1_cvs, release/2.2.0, release/2.1.7_cvs, release/2.1.6_cvs, release/2.1.6.1, release/2.1.5_cvs, release/2.1.0_cvs |
|
| #
d5fc4d2a |
| 29-Jul-1995 |
Mark Murray <[email protected]> |
After pst and ache fixed secure telnet, it was still not in the main makefiles. This puts it in.
PLEASE NOTE - YOU WILL NEED TO BUILD AND INSTALL THE libtelnet IN secure/ Reviewed by: Submitted by:
After pst and ache fixed secure telnet, it was still not in the main makefiles. This puts it in.
PLEASE NOTE - YOU WILL NEED TO BUILD AND INSTALL THE libtelnet IN secure/ Reviewed by: Submitted by: Obtained from:
show more ...
|