summaryrefslogtreecommitdiffhomepage
path: root/sysoptions.h
AgeCommit message (Collapse)Author
2020-10-29Changelog for 2020.81Matt Johnston
2020-10-23Increase MAX_PROPOSED_ALGO to 50, warn if exceededMatt Johnston
2020-06-26version 2020.80Matt Johnston
2020-06-15changelog for 2020.79Matt Johnston
2020-05-26merge rsa-sha256Matt Johnston
2020-05-25Add Chacha20-Poly1305, AES128-GCM and AES256-GCM support (#93)Vladislav Grishenko
* Add Chacha20-Poly1305 authenticated encryption * Add general AEAD approach. * Add chacha20-poly1305@openssh.com algo using LibTomCrypt chacha and poly1305 routines. Chacha20-Poly1305 is generally faster than AES256 on CPU w/o dedicated AES instructions, having the same key size. Compiling in will add ~5,5kB to binary size on x86-64. function old new delta chacha_crypt - 1397 +1397 _poly1305_block - 608 +608 poly1305_done - 595 +595 dropbear_chachapoly_crypt - 457 +457 .rodata 26976 27392 +416 poly1305_process - 290 +290 poly1305_init - 221 +221 chacha_setup - 218 +218 encrypt_packet 1068 1270 +202 dropbear_chachapoly_getlength - 147 +147 decrypt_packet 756 897 +141 chacha_ivctr64 - 137 +137 read_packet 543 637 +94 dropbear_chachapoly_start - 94 +94 read_kex_algos 792 880 +88 chacha_keystream - 69 +69 dropbear_mode_chachapoly - 48 +48 sshciphers 280 320 +40 dropbear_mode_none 24 48 +24 dropbear_mode_ctr 24 48 +24 dropbear_mode_cbc 24 48 +24 dropbear_chachapoly_mac - 24 +24 dropbear_chachapoly - 24 +24 gen_new_keys 848 854 +6 ------------------------------------------------------------------------------ (add/remove: 14/0 grow/shrink: 10/0 up/down: 5388/0) Total: 5388 bytes * Add AES128-GCM and AES256-GCM authenticated encryption * Add general AES-GCM mode. * Add aes128-gcm@openssh.com and aes256-gcm@openssh.com algo using LibTomCrypt gcm routines. AES-GCM is combination of AES CTR mode and GHASH, slower than AES-CTR on CPU w/o dedicated AES/GHASH instructions therefore disabled by default. Compiling in will add ~6kB to binary size on x86-64. function old new delta gcm_process - 1060 +1060 .rodata 26976 27808 +832 gcm_gf_mult - 820 +820 gcm_add_aad - 660 +660 gcm_shift_table - 512 +512 gcm_done - 471 +471 gcm_add_iv - 384 +384 gcm_init - 347 +347 dropbear_gcm_crypt - 309 +309 encrypt_packet 1068 1270 +202 decrypt_packet 756 897 +141 gcm_reset - 118 +118 read_packet 543 637 +94 read_kex_algos 792 880 +88 sshciphers 280 360 +80 gcm_mult_h - 80 +80 dropbear_gcm_start - 62 +62 dropbear_mode_gcm - 48 +48 dropbear_mode_none 24 48 +24 dropbear_mode_ctr 24 48 +24 dropbear_mode_cbc 24 48 +24 dropbear_ghash - 24 +24 dropbear_gcm_getlength - 24 +24 gen_new_keys 848 854 +6 ------------------------------------------------------------------------------ (add/remove: 14/0 grow/shrink: 10/0 up/down: 6434/0) Total: 6434 bytes
2020-05-24send and handle SSH_MSG_EXT_INFO only at the correct pointMatt Johnston
- other fixes for rsa pubkey auth - only include ext-info handling when rsa pubkey auth is compiled
2020-04-06use sigtype where appropriateMatt Johnston
2020-03-12Add Ed25519 support (#91)Vladislav Grishenko
* Add support for Ed25519 as a public key type Ed25519 is a elliptic curve signature scheme that offers better security than ECDSA and DSA and good performance. It may be used for both user and host keys. OpenSSH key import and fuzzer are not supported yet. Initially inspired by Peter Szabo. * Add curve25519 and ed25519 fuzzers * Add import and export of Ed25519 keys
2019-05-15Rename EPKA -> PluginMatt Johnston
2019-05-15External Public-Key Authentication API (#72)fabriziobertocci
* Implemented dynamic loading of an external plug-in shared library to delegate public key authentication * Moved conditional compilation of the plugin infrastructure into the configure.ac script to be able to add -ldl to dropbear build only when the flag is enabled * Added tags file to the ignore list * Updated API to have the constructor to return function pointers in the pliugin instance. Added support for passing user name to the checkpubkey function. Added options to the session returned by the plugin and have dropbear to parse and process them * Added -rdynamic to the linker flags when EPKA is enabled * Changed the API to pass a previously created session to the checkPubKey function (created during preauth) * Added documentation to the API * Added parameter addrstring to plugin creation function * Modified the API to retrieve the auth options. Instead of having them as field of the EPKASession struct, they are stored internally (plugin-dependent) in the plugin/session and retrieved through a pointer to a function (in the session) * Changed option string to be a simple char * instead of unsigned char *
2019-03-27Bump to 2019.78Matt Johnston
2019-03-232019.77Matt Johnston
2019-03-21limit password length to 100Matt Johnston
2018-08-23Merge bugfix delay invalid usersMatt Johnston
2018-08-23fix error message to say localoptions.hMatt Johnston
2018-03-06workaround memory sanitizer FD_ZERO false positivesMatt Johnston
2018-03-01Only use malloc wrapper if fuzzingMatt Johnston
2018-02-27Bump versionMatt Johnston
2018-02-26Fix restricted group code for BSDs, move to separate functionMatt Johnston
2018-02-18clean up some default optionsMatt Johnston
- move hmac-sha2-512, hmac-md5, twofish_ctr to sysoptions.h, off by default - try and improve text for KEX methods
2018-02-18rename some options and move some to sysoptions.hMatt Johnston
2018-02-16options: Complete the transition to numeric toggles (`#if')Michael Witten
For the sake of review, this commit alters only the code; the affiliated comments within the source files also need to be updated, but doing so now would obscure the operational changes that have been made here. * All on/off options have been switched to the numeric `#if' variant; that is the only way to make this `default_options.h.in' thing work in a reasonable manner. * There is now some very minor compile-time checking of the user's choice of options. * NO_FAST_EXPTMOD doesn't seem to be used, so it has been removed. * ENABLE_USER_ALGO_LIST was supposed to be renamed DROPBEAR_USER_ALGO_LIST, and this commit completes that work. * DROPBEAR_FUZZ seems to be a relatively new, as-yet undocumented option, which was added by the following commit: commit 6e0b539e9ca0b5628c6c5a3d118ad6a2e79e8039 Author: Matt Johnston <matt@ucc.asn.au> Date: Tue May 23 22:29:21 2017 +0800 split out checkpubkey_line() separately It has now been added to `sysoptions.h' and defined as `0' by default. * The configuration option `DROPBEAR_PASSWORD_ENV' is no longer listed in `default_options.h.in'; it is no longer meant to be set by the user, and is instead left to be defined in `sysoptions.h' (where it was already being defined) as merely the name of the environment variable in question: DROPBEAR_PASSWORD To enable or disable use of that environment variable, the user must now toggle `DROPBEAR_USE_DROPBEAR_PASSWORD'. * The sFTP support is now toggled by setting `DROPBEAR_SFTPSERVER', and the path of the sFTP server program is set independently through the usual SFTPSERVER_PATH.
2018-02-09Remove none cipherMatt Johnston
2017-06-25Merge pull request #45 from bengardner/DROPBEAR_LISTEN_BACKLOGMatt Johnston
sysoptions.h: Add ability to override DROPBEAR_LISTEN_BACKLOG
2017-06-05sysoptions.h: Add ability to override DROPBEAR_LISTEN_BACKLOGBen Gardner
This change allows adding DROPBEAR_LISTEN_BACKLOG to localoptions.h to force the value.
2017-06-16increase min DSS and RSA lengthsMatt Johnston
2017-05-18merge 2017.75Matt Johnston
2017-05-17bump version to 2017.75Matt Johnston
2016-07-21merge 2016.74Matt Johnston
2016-07-21bump versionMatt Johnston
2016-05-04Convert #ifdef to #if, other build changesMatt Johnston
2016-05-02options for disabling "normal" DHMatt Johnston
2016-05-02move group14 and group16 to options.h, group14-sha256 on by defaultMatt Johnston
2016-03-18update for 2016.73Matt Johnston
2016-03-12Get rid of group15, move group16 to sha512.Matt Johnston
New groups are disabled by default pending draft-ietf-curdle-ssh-kex-sha2-02 being finalised
2016-03-092016.72Matt Johnston
2015-12-032015.71Matt Johnston
2015-11-262015.70Matt Johnston
2015-11-252015.69Matt Johnston
2015-11-19Increase channel limit to 1000Matt Johnston
2015-08-08changelog and version 2015.68Matt Johnston
2015-08-03increase MAX_CMD_LEN to 9000Matt Johnston
2015-05-29separate client/server fastopen optionsMatt Johnston
2015-02-28merge from defaultMatt Johnston
--HG-- branch : fastopen
2015-02-24Free memory before exiting. Based on patch from Thorsten Horstmann.Matt Johnston
Client side is not complete.
2015-02-20Fixes for backwards compatibilityMatt Johnston
--HG-- branch : fastopen
2015-01-28bump versionMatt Johnston
2014-10-23changelog, version number bumpMatt Johnston
2014-10-23increae MAX_STRING_LEN for sun sshMatt Johnston