|
Name |
|
Date |
Size |
#Lines |
LOC |
| .. | | - | - |
| .github/ | H | - | - | 1,089 | 935 |
| contrib/ | H | - | - | 5,022 | 3,516 |
| m4/ | H | - | - | 224 | 215 |
| openbsd-compat/ | H | - | - | 21,653 | 13,974 |
| regress/ | H | - | - | 26,533 | 21,446 |
| .depend | H A D | 05-Jan-2024 | 131.6 KiB | 180 | 178 |
| .git_allowed_signers | H A D | 19-Oct-2022 | 997 | 6 | 5 |
| .git_allowed_signers.asc | H A D | 19-Oct-2022 | 833 | 17 | 15 |
| .gitignore | H A D | 18-Mar-2024 | 465 | 39 | 38 |
| .skipped-commit-ids | H A D | 18-Mar-2024 | 3.3 KiB | 58 | 55 |
| CREDITS | H A D | 08-Sep-2021 | 5.4 KiB | 103 | 98 |
| ChangeLog | H A D | 18-Mar-2024 | 271.6 KiB | 8,301 | 5,342 |
| FREEBSD-upgrade | H A D | 18-Mar-2024 | 6.2 KiB | 193 | 123 |
| INSTALL | H A D | 11-Aug-2023 | 10 KiB | 294 | 201 |
| LICENCE | H A D | 19-Oct-2022 | 18.1 KiB | 372 | 328 |
| Makefile.in | H A D | 05-Jan-2024 | 29.2 KiB | 790 | 670 |
| OVERVIEW | H A D | 08-Sep-2021 | 6.2 KiB | 163 | 119 |
| PROTOCOL | H A D | 18-Mar-2024 | 27.8 KiB | 796 | 585 |
| PROTOCOL.agent | H A D | 18-Mar-2024 | 4.2 KiB | 116 | 86 |
| PROTOCOL.certkeys | H A D | 08-Sep-2021 | 12.8 KiB | 322 | 258 |
| PROTOCOL.chacha20poly1305 | H A D | 08-Sep-2021 | 4.5 KiB | 108 | 84 |
| PROTOCOL.key | H A D | 19-Oct-2022 | 1.6 KiB | 72 | 53 |
| PROTOCOL.krl | H A D | 11-Aug-2023 | 6.9 KiB | 223 | 154 |
| PROTOCOL.mux | H A D | 18-Mar-2024 | 8.8 KiB | 297 | 218 |
| PROTOCOL.sshsig | H A D | 08-Sep-2021 | 3.3 KiB | 101 | 74 |
| PROTOCOL.u2f | H A D | 08-Sep-2021 | 10.8 KiB | 310 | 243 |
| README | H A D | 18-Mar-2024 | 2.1 KiB | 54 | 38 |
| README.dns | H A D | 08-Sep-2021 | 1.6 KiB | 48 | 30 |
| README.md | H A D | 16-Mar-2023 | 5.1 KiB | 87 | 56 |
| README.platform | H A D | 18-Mar-2024 | 4 KiB | 98 | 74 |
| README.privsep | H A D | 08-Sep-2021 | 2.2 KiB | 52 | 39 |
| README.tun | H A D | 30-Sep-2006 | 4.8 KiB | 133 | 98 |
| SECURITY.md | H A D | 13-Apr-2022 | 163 | 6 | 3 |
| TODO | H A D | 11-Sep-2018 | 2.5 KiB | 81 | 61 |
| aclocal.m4 | H A D | 06-Feb-2023 | 694 | 16 | 11 |
| addr.c | H A D | 11-Aug-2023 | 10 KiB | 507 | 384 |
| addr.h | H A D | 06-Feb-2023 | 2.4 KiB | 65 | 43 |
| addrmatch.c | H A D | 08-Sep-2021 | 4.4 KiB | 170 | 109 |
| atomicio.c | H A D | 13-Apr-2022 | 4.7 KiB | 180 | 129 |
| atomicio.h | H A D | 08-Sep-2021 | 2.2 KiB | 54 | 14 |
| audit-bsm.c | H A D | 08-Sep-2021 | 11.7 KiB | 456 | 322 |
| audit-linux.c | H A D | 08-Sep-2021 | 3.4 KiB | 125 | 77 |
| audit.c | H A D | 08-Sep-2021 | 5.7 KiB | 185 | 105 |
| audit.h | H A D | 08-Sep-2021 | 2.3 KiB | 58 | 28 |
| auth-bsdauth.c | H A D | 08-Sep-2021 | 3.6 KiB | 144 | 98 |
| auth-krb5.c | H A D | 08-Sep-2021 | 6.9 KiB | 274 | 201 |
| auth-options.c | H A D | 11-Aug-2023 | 23.5 KiB | 913 | 749 |
| auth-options.h | H A D | 08-Sep-2021 | 3.1 KiB | 107 | 40 |
| auth-pam.c | H A D | 11-Aug-2023 | 36.8 KiB | 1,414 | 1,099 |
| auth-pam.h | H A D | 08-Sep-2021 | 1.9 KiB | 48 | 20 |
| auth-passwd.c | H A D | 08-Sep-2021 | 6.4 KiB | 224 | 147 |
| auth-rhosts.c | H A D | 06-Feb-2023 | 9.2 KiB | 339 | 225 |
| auth-shadow.c | H A D | 16-Mar-2023 | 4.3 KiB | 142 | 86 |
| auth-sia.c | H A D | 11-Sep-2018 | 3.2 KiB | 116 | 71 |
| auth-sia.h | H A D | 05-Jun-2005 | 1.4 KiB | 32 | 4 |
| auth.c | H A D | 16-Mar-2023 | 24.4 KiB | 880 | 682 |
| auth.h | H A D | 19-Oct-2022 | 8.2 KiB | 248 | 156 |
| auth2-chall.c | H A D | 08-Sep-2021 | 9.5 KiB | 383 | 305 |
| auth2-gss.c | H A D | 11-Aug-2023 | 9.8 KiB | 344 | 244 |
| auth2-hostbased.c | H A D | 16-Mar-2023 | 7.8 KiB | 260 | 203 |
| auth2-kbdint.c | H A D | 13-Apr-2022 | 2.2 KiB | 73 | 36 |
| auth2-none.c | H A D | 16-Mar-2023 | 2.3 KiB | 79 | 43 |
| auth2-passwd.c | H A D | 19-Oct-2022 | 2.4 KiB | 81 | 46 |
| auth2-pubkey.c | H A D | 11-Aug-2023 | 23.8 KiB | 821 | 667 |
| auth2-pubkeyfile.c | H A D | 16-Mar-2023 | 13.7 KiB | 501 | 361 |
| auth2.c | H A D | 05-Jan-2024 | 23.2 KiB | 861 | 670 |
| authfd.c | H A D | 05-Jan-2024 | 19.6 KiB | 779 | 593 |
| authfd.h | H A D | 05-Jan-2024 | 4.1 KiB | 123 | 79 |
| authfile.c | H A D | 16-Mar-2023 | 12.5 KiB | 529 | 396 |
| authfile.h | H A D | 08-Sep-2021 | 2.4 KiB | 55 | 22 |
| bitmap.c | H A D | 11-May-2018 | 4.4 KiB | 215 | 171 |
| bitmap.h | H A D | 11-May-2018 | 1.9 KiB | 58 | 15 |
| blacklist.c | H A D | 23-Oct-2024 | 2.8 KiB | 98 | 50 |
| blacklist_client.h | H A D | 23-Oct-2024 | 2.1 KiB | 62 | 20 |
| buildpkg.sh.in | H A D | 08-Sep-2021 | 17.6 KiB | 678 | 526 |
| canohost.c | H A D | 11-Aug-2023 | 4.8 KiB | 210 | 147 |
| canohost.h | H A D | 02-Mar-2017 | 842 | 27 | 9 |
| chacha.c | H A D | 11-Aug-2023 | 5.3 KiB | 219 | 188 |
| chacha.h | H A D | 08-Sep-2021 | 994 | 37 | 22 |
| channels.c | H A D | 18-Mar-2024 | 146 KiB | 5,357 | 4,246 |
| channels.h | H A D | 05-Jan-2024 | 15 KiB | 402 | 260 |
| cipher-aes.c | H A D | 11-Aug-2023 | 4.5 KiB | 162 | 119 |
| cipher-aesctr.c | H A D | 22-Jan-2016 | 2.1 KiB | 84 | 50 |
| cipher-aesctr.h | H A D | 22-Jan-2016 | 1.3 KiB | 36 | 13 |
| cipher-chachapoly-libcrypto.c | H A D | 11-Aug-2023 | 4.9 KiB | 166 | 113 |
| cipher-chachapoly.c | H A D | 11-Aug-2023 | 4.1 KiB | 139 | 86 |
| cipher-chachapoly.h | H A D | 08-Sep-2021 | 1.6 KiB | 41 | 17 |
| cipher.c | H A D | 05-Jan-2024 | 12.9 KiB | 506 | 406 |
| cipher.h | H A D | 05-Jan-2024 | 3.2 KiB | 78 | 34 |
| cleanup.c | H A D | 30-Sep-2006 | 1 KiB | 33 | 10 |
| clientloop.c | H A D | 01-Jul-2024 | 83.1 KiB | 2,878 | 2,110 |
| clientloop.h | H A D | 08-Sep-2021 | 3.7 KiB | 85 | 32 |
| compat.c | H A D | 16-Mar-2023 | 5.1 KiB | 167 | 130 |
| compat.h | H A D | 16-Mar-2023 | 2.5 KiB | 66 | 22 |
| config.guess | H A D | 06-Feb-2023 | 48.8 KiB | 1,775 | 1,548 |
| config.h | H A D | 01-Jul-2024 | 56.3 KiB | 2,055 | 376 |
| config.sub | H A D | 06-Feb-2023 | 35 KiB | 1,908 | 1,720 |
| configure.ac | H A D | 18-Mar-2024 | 156.9 KiB | 5,805 | 5,455 |
| crypto_api.h | H A D | 06-Feb-2023 | 1.7 KiB | 57 | 38 |
| defines.h | H A D | 13-Apr-2022 | 23.7 KiB | 946 | 709 |
| dh.c | H A D | 08-Sep-2021 | 15.4 KiB | 506 | 403 |
| dh.h | H A D | 08-Sep-2021 | 2.7 KiB | 85 | 36 |
| digest-libc.c | H A D | 13-Apr-2022 | 6.1 KiB | 268 | 216 |
| digest-openssl.c | H A D | 08-Sep-2021 | 4.9 KiB | 208 | 160 |
| digest.h | H A D | 09-May-2018 | 2.5 KiB | 71 | 32 |
| dispatch.c | H A D | 16-Mar-2023 | 3.5 KiB | 135 | 95 |
| dispatch.h | H A D | 08-Sep-2021 | 2 KiB | 50 | 17 |
| dns.c | H A D | 16-Mar-2023 | 8.9 KiB | 345 | 246 |
| dns.h | H A D | 16-Mar-2023 | 2.1 KiB | 60 | 26 |
| ed25519.c | H A D | 06-Feb-2023 | 196.8 KiB | 2,031 | 1,760 |
| ed25519.sh | H A D | 06-Feb-2023 | 4.1 KiB | 120 | 95 |
| entropy.c | H A D | 06-Feb-2023 | 3 KiB | 110 | 56 |
| entropy.h | H A D | 11-Sep-2018 | 1.5 KiB | 35 | 7 |
| fatal.c | H A D | 08-Sep-2021 | 1.8 KiB | 47 | 14 |
| fixalgorithms | H A D | 30-Oct-2013 | 422 | 27 | 13 |
| fixpaths | H A D | 23-Apr-2003 | 499 | 23 | 12 |
| freebsd-configure.sh | H A D | 23-Apr-2022 | 1.8 KiB | 58 | 33 |
| freebsd-namespace.sh | H A D | 23-Apr-2022 | 1.9 KiB | 84 | 56 |
| groupaccess.c | H A D | 08-Sep-2021 | 3.5 KiB | 135 | 79 |
| groupaccess.h | H A D | 01-Aug-2008 | 1.5 KiB | 36 | 7 |
| gss-genr.c | H A D | 18-Mar-2024 | 7.9 KiB | 304 | 210 |
| gss-serv-krb5.c | H A D | 11-Sep-2018 | 5.6 KiB | 212 | 143 |
| gss-serv.c | H A D | 11-Aug-2023 | 10.3 KiB | 405 | 256 |
| hash.c | H A D | 08-Sep-2021 | 781 | 44 | 28 |
| hmac.c | H A D | 08-Sep-2021 | 5.1 KiB | 199 | 150 |
| hmac.h | H A D | 22-Jan-2016 | 1.6 KiB | 39 | 15 |
| hostfile.c | H A D | 16-Mar-2023 | 24.7 KiB | 947 | 734 |
| hostfile.h | H A D | 08-Sep-2021 | 4.4 KiB | 124 | 75 |
| includes.h | H A D | 13-Apr-2022 | 3.8 KiB | 179 | 135 |
| install-sh | H A D | 06-Feb-2023 | 15 KiB | 542 | 352 |
| kex.c | H A D | 18-Mar-2024 | 43.9 KiB | 1,691 | 1,424 |
| kex.h | H A D | 18-Mar-2024 | 9 KiB | 277 | 219 |
| kexc25519.c | H A D | 08-Sep-2021 | 5.7 KiB | 200 | 149 |
| kexdh.c | H A D | 08-Sep-2021 | 5 KiB | 204 | 161 |
| kexecdh.c | H A D | 08-Sep-2021 | 6.1 KiB | 240 | 188 |
| kexgen.c | H A D | 13-Apr-2022 | 10.4 KiB | 372 | 304 |
| kexgex.c | H A D | 08-Sep-2021 | 3.7 KiB | 105 | 70 |
| kexgexc.c | H A D | 13-Apr-2022 | 7 KiB | 242 | 186 |
| kexgexs.c | H A D | 11-Aug-2023 | 6.3 KiB | 217 | 158 |
| kexsntrup761x25519.c | H A D | 13-Apr-2022 | 7.6 KiB | 252 | 199 |
| krb5_config.h | H A D | 23-Apr-2022 | 299 | 11 | 10 |
| krl.c | H A D | 11-Aug-2023 | 35.6 KiB | 1,387 | 1,157 |
| krl.h | H A D | 11-Aug-2023 | 2.7 KiB | 68 | 38 |
| log.c | H A D | 01-Jul-2024 | 12 KiB | 505 | 400 |
| log.h | H A D | 08-Sep-2021 | 7 KiB | 133 | 103 |
| loginrec.c | H A D | 13-Apr-2022 | 42.1 KiB | 1,731 | 1,106 |
| loginrec.h | H A D | 08-Sep-2021 | 4.6 KiB | 135 | 53 |
| logintest.c | H A D | 08-Sep-2021 | 8.5 KiB | 309 | 214 |
| mac.c | H A D | 08-Sep-2021 | 7.2 KiB | 263 | 209 |
| mac.h | H A D | 02-Mar-2017 | 2 KiB | 54 | 24 |
| match.c | H A D | 11-Aug-2023 | 9.6 KiB | 368 | 206 |
| match.h | H A D | 08-Sep-2021 | 1.2 KiB | 31 | 14 |
| mdoc2man.awk | H A D | 11-May-2018 | 8.4 KiB | 371 | 341 |
| misc.c | H A D | 18-Mar-2024 | 66 KiB | 3,079 | 2,416 |
| misc.h | H A D | 18-Mar-2024 | 8.9 KiB | 252 | 190 |
| mkinstalldirs | H A D | 11-May-2018 | 633 | 39 | 23 |
| moduli | H A D | 05-Jan-2024 | 605.6 KiB | 456 | 455 |
| moduli.5 | H A D | 19-Oct-2022 | 3.6 KiB | 127 | 126 |
| moduli.c | H A D | 16-Mar-2023 | 20.7 KiB | 817 | 501 |
| monitor.c | H A D | 09-Oct-2023 | 51.8 KiB | 1,957 | 1,560 |
| monitor.h | H A D | 08-Sep-2021 | 3.9 KiB | 96 | 56 |
| monitor_fdpass.c | H A D | 08-Sep-2021 | 4.6 KiB | 186 | 144 |
| monitor_fdpass.h | H A D | 01-Aug-2008 | 1.5 KiB | 35 | 5 |
| monitor_wrap.c | H A D | 05-Jan-2024 | 26 KiB | 1,021 | 806 |
| monitor_wrap.h | H A D | 19-Oct-2022 | 3.8 KiB | 103 | 61 |
| msg.c | H A D | 08-Sep-2021 | 2.7 KiB | 95 | 60 |
| msg.h | H A D | 22-Jan-2016 | 1.5 KiB | 33 | 6 |
| mux.c | H A D | 05-Jan-2024 | 62.8 KiB | 2,375 | 1,983 |
| myproposal.h | H A D | 15-Apr-2022 | 3.7 KiB | 117 | 79 |
| nchan.c | H A D | 18-Mar-2024 | 11.8 KiB | 444 | 343 |
| nchan.ms | H A D | 30-Oct-2013 | 3.9 KiB | 100 | 74 |
| nchan2.ms | H A D | 30-Oct-2013 | 3.4 KiB | 89 | 64 |
| openssh.xml.in | H A D | 30-Oct-2013 | 2.8 KiB | 91 | 61 |
| opensshd.init.in | H A D | 19-Dec-2021 | 1.2 KiB | 69 | 46 |
| packet.c | H A D | 18-Dec-2023 | 72.3 KiB | 2,768 | 2,129 |
| packet.h | H A D | 18-Dec-2023 | 7.6 KiB | 224 | 159 |
| pathnames.h | H A D | 23-Apr-2022 | 6 KiB | 180 | 74 |
| pkcs11.h | H A D | 03-Jun-2014 | 41.4 KiB | 1,358 | 1,119 |
| platform-misc.c | H A D | 09-May-2018 | 1.1 KiB | 36 | 13 |
| platform-pledge.c | H A D | 14-Mar-2016 | 1.9 KiB | 72 | 27 |
| platform-tracing.c | H A D | 09-Nov-2022 | 2.5 KiB | 77 | 47 |
| platform.c | H A D | 15-Apr-2022 | 5.8 KiB | 251 | 173 |
| platform.h | H A D | 15-Apr-2022 | 1.5 KiB | 39 | 18 |
| poly1305.c | H A D | 11-Aug-2023 | 4.5 KiB | 160 | 121 |
| poly1305.h | H A D | 22-Jan-2016 | 645 | 23 | 11 |
| progressmeter.c | H A D | 11-Aug-2023 | 7.5 KiB | 303 | 219 |
| progressmeter.h | H A D | 08-Sep-2021 | 1.5 KiB | 29 | 3 |
| readconf.c | H A D | 18-Mar-2024 | 104.2 KiB | 3,724 | 3,147 |
| readconf.h | H A D | 18-Mar-2024 | 9 KiB | 259 | 191 |
| readpass.c | H A D | 19-Oct-2022 | 8.3 KiB | 333 | 256 |
| rijndael.c | H A D | 22-Jan-2016 | 51.6 KiB | 1,130 | 1,009 |
| rijndael.h | H A D | 13-Apr-2022 | 2 KiB | 56 | 20 |
| sandbox-capsicum.c | H A D | 19-Oct-2022 | 3.4 KiB | 129 | 83 |
| sandbox-darwin.c | H A D | 08-Sep-2021 | 2.5 KiB | 100 | 58 |
| sandbox-null.c | H A D | 03-Jun-2014 | 1.6 KiB | 73 | 36 |
| sandbox-pledge.c | H A D | 08-Sep-2021 | 1.8 KiB | 78 | 47 |
| sandbox-rlimit.c | H A D | 08-Sep-2021 | 2.4 KiB | 97 | 59 |
| sandbox-seccomp-filter.c | H A D | 16-Mar-2023 | 15.8 KiB | 544 | 446 |
| sandbox-solaris.c | H A D | 09-May-2018 | 2.9 KiB | 115 | 77 |
| sandbox-systrace.c | H A D | 08-Sep-2021 | 6.3 KiB | 219 | 163 |
| scp.1 | H A D | 06-Feb-2023 | 7.9 KiB | 326 | 325 |
| scp.c | H A D | 05-Jan-2024 | 53.5 KiB | 2,276 | 1,862 |
| servconf.c | H A D | 18-Mar-2024 | 96.7 KiB | 3,277 | 2,844 |
| servconf.h | H A D | 09-Oct-2023 | 11.7 KiB | 326 | 229 |
| serverloop.c | H A D | 09-Oct-2023 | 28.6 KiB | 933 | 711 |
| serverloop.h | H A D | 09-May-2018 | 1,000 | 29 | 5 |
| session.c | H A D | 18-Mar-2024 | 67.9 KiB | 2,751 | 2,038 |
| session.h | H A D | 06-Feb-2023 | 2.6 KiB | 85 | 48 |
| sftp-client.c | H A D | 05-Jan-2024 | 79 KiB | 3,010 | 2,440 |
| sftp-client.h | H A D | 09-Oct-2023 | 6.5 KiB | 208 | 83 |
| sftp-common.c | H A D | 11-Aug-2023 | 6.9 KiB | 266 | 212 |
| sftp-common.h | H A D | 19-Oct-2022 | 2.1 KiB | 54 | 20 |
| sftp-glob.c | H A D | 09-Oct-2023 | 4.3 KiB | 181 | 112 |
| sftp-realpath.c | H A D | 19-Dec-2021 | 6 KiB | 226 | 147 |
| sftp-server-main.c | H A D | 19-Oct-2022 | 1.4 KiB | 53 | 27 |
| sftp-server.8 | H A D | 08-Sep-2021 | 5 KiB | 171 | 170 |
| sftp-server.c | H A D | 11-Aug-2023 | 51.9 KiB | 2,109 | 1,793 |
| sftp-usergroup.c | H A D | 09-Oct-2023 | 5.5 KiB | 240 | 187 |
| sftp-usergroup.h | H A D | 19-Oct-2022 | 1.1 KiB | 26 | 4 |
| sftp.1 | H A D | 06-Feb-2023 | 16.9 KiB | 729 | 728 |
| sftp.c | H A D | 18-Mar-2024 | 63.7 KiB | 2,697 | 2,224 |
| sftp.h | H A D | 01-Aug-2008 | 3.3 KiB | 102 | 55 |
| sk-api.h | H A D | 19-Oct-2022 | 2.9 KiB | 104 | 65 |
| sk-usbhid.c | H A D | 11-Aug-2023 | 38.3 KiB | 1,480 | 1,321 |
| sk_config.h | H A D | 19-Oct-2022 | 338 | 10 | 9 |
| smult_curve25519_ref.c | H A D | 03-Jun-2014 | 6.7 KiB | 266 | 227 |
| sntrup761.c | H A D | 06-Feb-2023 | 25.3 KiB | 1,274 | 886 |
| sntrup761.sh | H A D | 06-Feb-2023 | 2.8 KiB | 87 | 67 |
| srclimit.c | H A D | 08-Sep-2021 | 3.8 KiB | 141 | 100 |
| srclimit.h | H A D | 08-Sep-2021 | 895 | 19 | 3 |
| ssh-add.1 | H A D | 18-Mar-2024 | 10.5 KiB | 351 | 350 |
| ssh-add.c | H A D | 18-Mar-2024 | 27 KiB | 1,056 | 903 |
| ssh-agent.1 | H A D | 09-Oct-2023 | 8.1 KiB | 277 | 276 |
| ssh-agent.c | H A D | 18-Mar-2024 | 65.6 KiB | 2,505 | 2,099 |
| ssh-dss.c | H A D | 18-Mar-2024 | 11.8 KiB | 458 | 379 |
| ssh-ecdsa-sk.c | H A D | 16-Mar-2023 | 13.6 KiB | 468 | 363 |
| ssh-ecdsa.c | H A D | 16-Mar-2023 | 12.1 KiB | 469 | 392 |
| ssh-ed25519-sk.c | H A D | 06-Feb-2023 | 7.6 KiB | 289 | 239 |
| ssh-ed25519.c | H A D | 06-Feb-2023 | 7.8 KiB | 314 | 261 |
| ssh-gss.h | H A D | 23-Apr-2022 | 4.7 KiB | 140 | 92 |
| ssh-keygen.1 | H A D | 07-Sep-2023 | 41 KiB | 1,350 | 1,349 |
| ssh-keygen.c | H A D | 18-Mar-2024 | 106.7 KiB | 3,968 | 3,469 |
| ssh-keyscan.1 | H A D | 16-Mar-2023 | 4.7 KiB | 194 | 193 |
| ssh-keyscan.c | H A D | 18-Mar-2024 | 20.2 KiB | 893 | 749 |
| ssh-keysign.8 | H A D | 15-Apr-2022 | 2.9 KiB | 94 | 93 |
| ssh-keysign.c | H A D | 18-Mar-2024 | 8.1 KiB | 312 | 233 |
| ssh-pkcs11-client.c | H A D | 18-Mar-2024 | 17.2 KiB | 657 | 559 |
| ssh-pkcs11-helper.8 | H A D | 19-Oct-2022 | 1.7 KiB | 72 | 71 |
| ssh-pkcs11-helper.c | H A D | 13-Apr-2022 | 10.5 KiB | 447 | 362 |
| ssh-pkcs11.c | H A D | 11-Aug-2023 | 47.3 KiB | 1,889 | 1,544 |
| ssh-pkcs11.h | H A D | 05-Jan-2024 | 1.7 KiB | 44 | 22 |
| ssh-rsa.c | H A D | 16-Mar-2023 | 19.6 KiB | 769 | 643 |
| ssh-sandbox.h | H A D | 03-Jun-2014 | 1.1 KiB | 25 | 6 |
| ssh-sk-client.c | H A D | 13-Apr-2022 | 11.2 KiB | 481 | 409 |
| ssh-sk-helper.8 | H A D | 19-Oct-2022 | 1.7 KiB | 72 | 71 |
| ssh-sk-helper.c | H A D | 06-Feb-2023 | 10 KiB | 368 | 288 |
| ssh-sk.c | H A D | 11-Aug-2023 | 22.5 KiB | 880 | 767 |
| ssh-sk.h | H A D | 13-Apr-2022 | 2.7 KiB | 80 | 27 |
| ssh-xmss.c | H A D | 11-Aug-2023 | 10.1 KiB | 390 | 332 |
| ssh.1 | H A D | 05-Jan-2024 | 46.3 KiB | 1,798 | 1,797 |
| ssh.c | H A D | 18-Mar-2024 | 72.6 KiB | 2,493 | 1,960 |
| ssh.h | H A D | 08-Sep-2021 | 2.8 KiB | 105 | 22 |
| ssh2.h | H A D | 05-Jan-2024 | 5.8 KiB | 181 | 81 |
| ssh_api.c | H A D | 18-Mar-2024 | 14.8 KiB | 581 | 461 |
| ssh_api.h | H A D | 11-Sep-2018 | 4.3 KiB | 138 | 31 |
| ssh_config | H A D | 11-Aug-2023 | 1.5 KiB | 47 | 42 |
| ssh_config.5 | H A D | 18-Mar-2024 | 66.5 KiB | 2,358 | 2,357 |
| ssh_namespace.h | H A D | 18-Mar-2024 | 51.5 KiB | 1,024 | 1,019 |
| sshbuf-getput-basic.c | H A D | 19-Oct-2022 | 12.2 KiB | 634 | 527 |
| sshbuf-getput-crypto.c | H A D | 18-Mar-2024 | 4.4 KiB | 181 | 141 |
| sshbuf-io.c | H A D | 08-Sep-2021 | 2.7 KiB | 118 | 86 |
| sshbuf-misc.c | H A D | 13-Apr-2022 | 7 KiB | 309 | 260 |
| sshbuf.c | H A D | 06-Feb-2023 | 9.8 KiB | 428 | 337 |
| sshbuf.h | H A D | 06-Feb-2023 | 13.5 KiB | 394 | 171 |
| sshconnect.c | H A D | 18-Mar-2024 | 49 KiB | 1,732 | 1,346 |
| sshconnect.h | H A D | 05-Jan-2024 | 3.2 KiB | 97 | 57 |
| sshconnect2.c | H A D | 18-Mar-2024 | 65 KiB | 2,366 | 1,905 |
| sshd.8 | H A D | 09-Oct-2023 | 32.1 KiB | 1,053 | 1,052 |
| sshd.c | H A D | 01-Aug-2024 | 69.1 KiB | 2,565 | 1,850 |
| sshd_config | H A D | 06-Aug-2024 | 3.2 KiB | 122 | 97 |
| sshd_config.5 | H A D | 06-Aug-2024 | 59.4 KiB | 2,146 | 2,145 |
| ssherr.c | H A D | 08-Sep-2021 | 5.2 KiB | 152 | 133 |
| ssherr.h | H A D | 08-Sep-2021 | 3.4 KiB | 90 | 65 |
| sshkey-xmss.c | H A D | 06-Feb-2023 | 29.7 KiB | 1,114 | 975 |
| sshkey-xmss.h | H A D | 06-Feb-2023 | 2.9 KiB | 57 | 28 |
| sshkey.c | H A D | 18-Mar-2024 | 91.1 KiB | 3,715 | 3,081 |
| sshkey.h | H A D | 11-Aug-2023 | 12.3 KiB | 352 | 267 |
| sshlogin.c | H A D | 19-Oct-2022 | 5.3 KiB | 175 | 100 |
| sshlogin.h | H A D | 30-Oct-2013 | 935 | 24 | 8 |
| sshpty.c | H A D | 08-Sep-2021 | 5.7 KiB | 233 | 165 |
| sshpty.h | H A D | 06-Mar-2017 | 1 KiB | 29 | 10 |
| sshsig.c | H A D | 18-Mar-2024 | 29.4 KiB | 1,158 | 1,001 |
| sshsig.h | H A D | 13-Apr-2022 | 4 KiB | 112 | 36 |
| sshtty.c | H A D | 28-Apr-2010 | 2.9 KiB | 97 | 52 |
| survey.sh.in | H A D | 30-Oct-2013 | 1.7 KiB | 70 | 49 |
| ttymodes.c | H A D | 08-Sep-2021 | 9.7 KiB | 451 | 328 |
| ttymodes.h | H A D | 09-May-2018 | 4.9 KiB | 170 | 104 |
| uidswap.c | H A D | 08-Sep-2021 | 7.3 KiB | 239 | 158 |
| uidswap.h | H A D | 11-Sep-2018 | 680 | 18 | 3 |
| umac.c | H A D | 16-Mar-2023 | 44.9 KiB | 1,284 | 770 |
| umac.h | H A D | 13-Apr-2022 | 4.6 KiB | 130 | 42 |
| umac128.c | H A D | 23-Apr-2022 | 398 | 18 | 12 |
| utf8.c | H A D | 08-Sep-2021 | 8.2 KiB | 356 | 240 |
| utf8.h | H A D | 08-Sep-2021 | 1.3 KiB | 29 | 11 |
| version.h | H A D | 06-Aug-2024 | 219 | 9 | 4 |
| xmalloc.c | H A D | 15-Apr-2022 | 2.5 KiB | 119 | 86 |
| xmalloc.h | H A D | 08-Sep-2021 | 1.1 KiB | 28 | 9 |
| xmss_commons.c | H A D | 08-Sep-2021 | 631 | 37 | 25 |
| xmss_commons.h | H A D | 11-May-2018 | 450 | 22 | 13 |
| xmss_fast.c | H A D | 08-Sep-2021 | 32.2 KiB | 1,107 | 734 |
| xmss_fast.h | H A D | 11-May-2018 | 3.6 KiB | 112 | 50 |
| xmss_hash.c | H A D | 18-Mar-2024 | 3.3 KiB | 138 | 97 |
| xmss_hash.h | H A D | 11-May-2018 | 841 | 23 | 11 |
| xmss_hash_address.c | H A D | 08-Sep-2021 | 1.2 KiB | 67 | 42 |
| xmss_hash_address.h | H A D | 11-May-2018 | 836 | 41 | 15 |
| xmss_wots.c | H A D | 08-Sep-2021 | 4.7 KiB | 193 | 135 |
| xmss_wots.h | H A D | 11-May-2018 | 1.9 KiB | 65 | 21 |
README
1See https://www.openssh.com/releasenotes.html#9.7p1 for the release
2notes.
3
4Please read https://www.openssh.com/report.html for bug reporting
5instructions and note that we do not use Github for bug reporting or
6patch/pull-request management.
7
8This is the port of OpenBSD's excellent OpenSSH[0] to Linux and other
9Unices.
10
11OpenSSH is based on the last free version of Tatu Ylonen's sample
12implementation with all patent-encumbered algorithms removed (to
13external libraries), all known security bugs fixed, new features
14reintroduced and many other clean-ups. OpenSSH has been created by
15Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo de Raadt,
16and Dug Song. It has a homepage at https://www.openssh.com/
17
18This port consists of the re-introduction of autoconf support, PAM
19support, EGD/PRNGD support and replacements for OpenBSD library
20functions that are (regrettably) absent from other unices. This port
21has been best tested on AIX, Cygwin, HP-UX, Linux, MacOS/X,
22FreeBSD, NetBSD, OpenBSD, OpenServer, Solaris and UnixWare.
23
24This version actively tracks changes in the OpenBSD CVS repository.
25
26The PAM support is now more functional than the popular packages of
27commercial ssh-1.2.x. It checks "account" and "session" modules for
28all logins, not just when using password authentication.
29
30There is now several mailing lists for this port of OpenSSH. Please
31refer to https://www.openssh.com/list.html for details on how to join.
32
33Please send bug reports and patches to https://bugzilla.mindrot.org or
34the mailing list openssh-unix-dev@mindrot.org. To mitigate spam, the
35list only allows posting from subscribed addresses. Code contribution
36are welcomed, but please follow the OpenBSD style guidelines[1].
37
38Please refer to the INSTALL document for information on dependencies and
39how to install OpenSSH on your system.
40
41Damien Miller <djm@mindrot.org>
42
43Miscellania -
44
45This version of OpenSSH is based upon code retrieved from the OpenBSD CVS
46repository which in turn was based on the last free sample implementation
47released by Tatu Ylonen.
48
49References -
50
51[0] https://www.openssh.com/
52[1] https://man.openbsd.org/style.9
53
54
README.dns
1How to verify host keys using OpenSSH and DNS
2---------------------------------------------
3
4OpenSSH contains support for verifying host keys using DNS as described
5in https://tools.ietf.org/html/rfc4255. The document contains very brief
6instructions on how to use this feature. Configuring DNS is out of the
7scope of this document.
8
9
10(1) Server: Generate and publish the DNS RR
11
12To create a DNS resource record (RR) containing a fingerprint of the
13public host key, use the following command:
14
15 ssh-keygen -r hostname -f keyfile -g
16
17where "hostname" is your fully qualified hostname and "keyfile" is the
18file containing the public host key file. If you have multiple keys,
19you should generate one RR for each key.
20
21In the example above, ssh-keygen will print the fingerprint in a
22generic DNS RR format parsable by most modern name server
23implementations. If your nameserver has support for the SSHFP RR
24you can omit the -g flag and ssh-keygen will print a standard SSHFP RR.
25
26To publish the fingerprint using the DNS you must add the generated RR
27to your DNS zone file and sign your zone.
28
29
30(2) Client: Enable ssh to verify host keys using DNS
31
32To enable the ssh client to verify host keys using DNS, you have to
33add the following option to the ssh configuration file
34($HOME/.ssh/config or /etc/ssh/ssh_config):
35
36 VerifyHostKeyDNS yes
37
38Upon connection the client will try to look up the fingerprint RR
39using DNS. If the fingerprint received from the DNS server matches
40the remote host key, the user will be notified.
41
42
43 Jakob Schlyter
44 Wesley Griffin
45
46
47$OpenBSD: README.dns,v 1.2 2003/10/14 19:43:23 jakob Exp $
48
README.md
1# Portable OpenSSH
2
3[![C/C++ CI](https://github.com/openssh/openssh-portable/actions/workflows/c-cpp.yml/badge.svg)](https://github.com/openssh/openssh-portable/actions/workflows/c-cpp.yml)
4[![Fuzzing Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/openssh.svg)](https://bugs.chromium.org/p/oss-fuzz/issues/list?sort=-opened&can=1&q=proj:openssh)
5[![Coverity Status](https://scan.coverity.com/projects/21341/badge.svg)](https://scan.coverity.com/projects/openssh-portable)
6
7OpenSSH is a complete implementation of the SSH protocol (version 2) for secure remote login, command execution and file transfer. It includes a client ``ssh`` and server ``sshd``, file transfer utilities ``scp`` and ``sftp`` as well as tools for key generation (``ssh-keygen``), run-time key storage (``ssh-agent``) and a number of supporting programs.
8
9This is a port of OpenBSD's [OpenSSH](https://openssh.com) to most Unix-like operating systems, including Linux, OS X and Cygwin. Portable OpenSSH polyfills OpenBSD APIs that are not available elsewhere, adds sshd sandboxing for more operating systems and includes support for OS-native authentication and auditing (e.g. using PAM).
10
11## Documentation
12
13The official documentation for OpenSSH are the man pages for each tool:
14
15* [ssh(1)](https://man.openbsd.org/ssh.1)
16* [sshd(8)](https://man.openbsd.org/sshd.8)
17* [ssh-keygen(1)](https://man.openbsd.org/ssh-keygen.1)
18* [ssh-agent(1)](https://man.openbsd.org/ssh-agent.1)
19* [scp(1)](https://man.openbsd.org/scp.1)
20* [sftp(1)](https://man.openbsd.org/sftp.1)
21* [ssh-keyscan(8)](https://man.openbsd.org/ssh-keyscan.8)
22* [sftp-server(8)](https://man.openbsd.org/sftp-server.8)
23
24## Stable Releases
25
26Stable release tarballs are available from a number of [download mirrors](https://www.openssh.com/portable.html#downloads). We recommend the use of a stable release for most users. Please read the [release notes](https://www.openssh.com/releasenotes.html) for details of recent changes and potential incompatibilities.
27
28## Building Portable OpenSSH
29
30### Dependencies
31
32Portable OpenSSH is built using autoconf and make. It requires a working C compiler, standard library and headers.
33
34``libcrypto`` from either [LibreSSL](https://www.libressl.org/) or [OpenSSL](https://www.openssl.org) may also be used. OpenSSH may be built without either of these, but the resulting binaries will have only a subset of the cryptographic algorithms normally available.
35
36[zlib](https://www.zlib.net/) is optional; without it transport compression is not supported.
37
38FIDO security token support needs [libfido2](https://github.com/Yubico/libfido2) and its dependencies and will be enabled automatically if they are found.
39
40In addition, certain platforms and build-time options may require additional dependencies; see README.platform for details about your platform.
41
42### Building a release
43
44Releases include a pre-built copy of the ``configure`` script and may be built using:
45
46```
47tar zxvf openssh-X.YpZ.tar.gz
48cd openssh
49./configure # [options]
50make && make tests
51```
52
53See the [Build-time Customisation](#build-time-customisation) section below for configure options. If you plan on installing OpenSSH to your system, then you will usually want to specify destination paths.
54
55### Building from git
56
57If building from git, you'll need [autoconf](https://www.gnu.org/software/autoconf/) installed to build the ``configure`` script. The following commands will check out and build portable OpenSSH from git:
58
59```
60git clone https://github.com/openssh/openssh-portable # or https://anongit.mindrot.org/openssh.git
61cd openssh-portable
62autoreconf
63./configure
64make && make tests
65```
66
67### Build-time Customisation
68
69There are many build-time customisation options available. All Autoconf destination path flags (e.g. ``--prefix``) are supported (and are usually required if you want to install OpenSSH).
70
71For a full list of available flags, run ``./configure --help`` but a few of the more frequently-used ones are described below. Some of these flags will require additional libraries and/or headers be installed.
72
73Flag | Meaning
74--- | ---
75``--with-pam`` | Enable [PAM](https://en.wikipedia.org/wiki/Pluggable_authentication_module) support. [OpenPAM](https://www.openpam.org/), [Linux PAM](http://www.linux-pam.org/) and Solaris PAM are supported.
76``--with-libedit`` | Enable [libedit](https://www.thrysoee.dk/editline/) support for sftp.
77``--with-kerberos5`` | Enable Kerberos/GSSAPI support. Both [Heimdal](https://www.h5l.org/) and [MIT](https://web.mit.edu/kerberos/) Kerberos implementations are supported.
78``--with-selinux`` | Enable [SELinux](https://en.wikipedia.org/wiki/Security-Enhanced_Linux) support.
79
80## Development
81
82Portable OpenSSH development is discussed on the [openssh-unix-dev mailing list](https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev) ([archive mirror](https://marc.info/?l=openssh-unix-dev)). Bugs and feature requests are tracked on our [Bugzilla](https://bugzilla.mindrot.org/).
83
84## Reporting bugs
85
86_Non-security_ bugs may be reported to the developers via [Bugzilla](https://bugzilla.mindrot.org/) or via the mailing list above. Security bugs should be reported to [openssh@openssh.com](mailto:openssh.openssh.com).
87
README.platform
1This file contains notes about OpenSSH on specific platforms.
2
3AIX
4
5Beginning with OpenSSH 3.8p1, sshd will honour an account's password
6expiry settings, where prior to that it did not. Because of this,
7it's possible for sites that have used OpenSSH's sshd exclusively to
8have accounts which have passwords expired longer than the inactive time
9(ie the "Weeks between password EXPIRATION and LOCKOUT" setting in SMIT
10or the maxexpired chuser attribute).
11
12Accounts in this state must have their passwords reset manually by the
13administrator. As a precaution, it is recommended that the administrative
14passwords be reset before upgrading from OpenSSH <3.8.
15
16As of OpenSSH 4.0p1, configure will attempt to detect if your version
17and maintenance level of AIX has a working getaddrinfo, and will use it
18if found. This will enable IPv6 support. If for some reason configure
19gets it wrong, or if you want to build binaries to work on earlier MLs
20than the build host then you can add "-DBROKEN_GETADDRINFO" to CFLAGS
21to force the previous IPv4-only behaviour.
22
23IPv6 known to work: 5.1ML7 5.2ML2 5.2ML5
24IPv6 known broken: 4.3.3ML11 5.1ML4
25
26If you wish to use dynamic libraries that aren't in the normal system
27locations (eg IBM's OpenSSL and zlib packages) then you will need to
28define the environment variable blibpath before running configure, eg
29
30blibpath=/lib:/usr/lib:/opt/freeware/lib ./configure \
31 --with-ssl-dir=/opt/freeware --with-zlib=/opt/freeware
32
33If sshd is built with the WITH_AIXAUTHENTICATE option (which is enabled
34by default) then sshd checks that users are permitted via the
35loginrestrictions() function, in particular that the user has the
36"rlogin" attribute set. This check is not done for the root account,
37instead the PermitRootLogin setting in sshd_config is used.
38
39If you are using the IBM compiler you probably want to use CC=xlc rather
40than the default of cc.
41
42
43Cygwin
44------
45To build on Cygwin, OpenSSH requires the following packages:
46gcc, gcc-mingw-core, mingw-runtime, binutils, make, openssl,
47openssl-devel, zlib, minres, minires-devel.
48
49
50Darwin and MacOS X
51------------------
52Darwin does not provide a tun(4) driver required for OpenSSH-based
53virtual private networks. The BSD manpage still exists, but the driver
54has been removed in recent releases of Darwin and MacOS X.
55
56Tunnel support is known to work with Darwin 8 and MacOS X 10.4 in
57Point-to-Point (Layer 3) and Ethernet (Layer 2) mode using a third
58party driver. More information is available at:
59 https://tuntaposx.sourceforge.net
60
61Recent Darwin/MacOS X versions are likely unsupported.
62
63Linux
64-----
65
66Some Linux distributions (including Red Hat/Fedora/CentOS) include
67headers and library links in the -devel RPMs rather than the main
68binary RPMs. If you get an error about headers, or complaining about a
69missing prerequisite then you may need to install the equivalent
70development packages. On Redhat based distros these may be openssl-devel,
71zlib-devel and pam-devel, on Debian based distros these may be
72libssl-dev, libz-dev and libpam-dev.
73
74
75Solaris
76-------
77If you enable BSM auditing on Solaris, you need to update audit_event(4)
78for praudit(1m) to give sensible output. The following line needs to be
79added to /etc/security/audit_event:
80
81 32800:AUE_openssh:OpenSSH login:lo
82
83The BSM audit event range available for third party TCB applications is
8432768 - 65535. Event number 32800 has been chosen for AUE_openssh.
85There is no official registry of 3rd party event numbers, so if this
86number is already in use on your system, you may change it at build time
87by configure'ing --with-cflags=-DAUE_openssh=32801 then rebuilding.
88
89
90Platforms using PAM
91-------------------
92As of OpenSSH 4.3p1, sshd will no longer check /etc/nologin itself when
93PAM is enabled. To maintain existing behaviour, pam_nologin should be
94added to sshd's session stack which will prevent users from starting shell
95sessions. Alternatively, pam_nologin can be added to either the auth or
96account stacks which will prevent authentication entirely, but will still
97return the output from pam_nologin to the client.
98
README.privsep
1Privilege separation, or privsep, is method in OpenSSH by which
2operations that require root privilege are performed by a separate
3privileged monitor process. Its purpose is to prevent privilege
4escalation by containing corruption to an unprivileged process.
5More information is available at:
6 http://www.citi.umich.edu/u/provos/ssh/privsep.html
7
8Privilege separation is now mandatory. During the pre-authentication
9phase sshd will chroot(2) to "/var/empty" and change its privileges to the
10"sshd" user and its primary group. sshd is a pseudo-account that should
11not be used by other daemons, and must be locked and should contain a
12"nologin" or invalid shell.
13
14You should do something like the following to prepare the privsep
15preauth environment:
16
17 # mkdir /var/empty
18 # chown root:sys /var/empty
19 # chmod 755 /var/empty
20 # groupadd sshd
21 # useradd -g sshd -c 'sshd privsep' -d /var/empty -s /bin/false sshd
22
23/var/empty should not contain any files.
24
25configure supports the following options to change the default
26privsep user and chroot directory:
27
28 --with-privsep-path=xxx Path for privilege separation chroot
29 --with-privsep-user=user Specify non-privileged user for privilege separation
30
31PAM-enabled OpenSSH is known to function with privsep on AIX, FreeBSD,
32HP-UX (including Trusted Mode), Linux, NetBSD and Solaris.
33
34On Cygwin, Tru64 Unix and OpenServer only the pre-authentication part
35of privsep is supported. Post-authentication privsep is disabled
36automatically (so you won't see the additional process mentioned below).
37
38Note that for a normal interactive login with a shell, enabling privsep
39will require 1 additional process per login session.
40
41Given the following process listing (from HP-UX):
42
43 UID PID PPID C STIME TTY TIME COMMAND
44 root 1005 1 0 10:45:17 ? 0:08 /opt/openssh/sbin/sshd -u0
45 root 6917 1005 0 15:19:16 ? 0:00 sshd: stevesk [priv]
46 stevesk 6919 6917 0 15:19:17 ? 0:03 sshd: stevesk@2
47 stevesk 6921 6919 0 15:19:17 pts/2 0:00 -bash
48
49process 1005 is the sshd process listening for new connections.
50process 6917 is the privileged monitor process, 6919 is the user owned
51sshd process and 6921 is the shell process.
52
README.tun
1How to use OpenSSH-based virtual private networks
2-------------------------------------------------
3
4OpenSSH contains support for VPN tunneling using the tun(4) network
5tunnel pseudo-device which is available on most platforms, either for
6layer 2 or 3 traffic.
7
8The following brief instructions on how to use this feature use
9a network configuration specific to the OpenBSD operating system.
10
11(1) Server: Enable support for SSH tunneling
12
13To enable the ssh server to accept tunnel requests from the client, you
14have to add the following option to the ssh server configuration file
15(/etc/ssh/sshd_config):
16
17 PermitTunnel yes
18
19Restart the server or send the hangup signal (SIGHUP) to let the server
20reread it's configuration.
21
22(2) Server: Restrict client access and assign the tunnel
23
24The OpenSSH server simply uses the file /root/.ssh/authorized_keys to
25restrict the client to connect to a specified tunnel and to
26automatically start the related interface configuration command. These
27settings are optional but recommended:
28
29 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... reyk@openbsd.org
30
31(3) Client: Configure the local network tunnel interface
32
33Use the hostname.if(5) interface-specific configuration file to set up
34the network tunnel configuration with OpenBSD. For example, use the
35following configuration in /etc/hostname.tun0 to set up the layer 3
36tunnel on the client:
37
38 inet 192.168.5.1 255.255.255.252 192.168.5.2
39
40OpenBSD also supports layer 2 tunneling over the tun device by adding
41the link0 flag:
42
43 inet 192.168.1.78 255.255.255.0 192.168.1.255 link0
44
45Layer 2 tunnels can be used in combination with an Ethernet bridge(4)
46interface, like the following example for /etc/bridgename.bridge0:
47
48 add tun0
49 add sis0
50 up
51
52(4) Client: Configure the OpenSSH client
53
54To establish tunnel forwarding for connections to a specified
55remote host by default, use the following ssh client configuration for
56the privileged user (in /root/.ssh/config):
57
58 Host sshgateway
59 Tunnel yes
60 TunnelDevice 0:any
61 PermitLocalCommand yes
62 LocalCommand sh /etc/netstart tun0
63
64A more complicated configuration is possible to establish a tunnel to
65a remote host which is not directly accessible by the client.
66The following example describes a client configuration to connect to
67the remote host over two ssh hops in between. It uses the OpenSSH
68ProxyCommand in combination with the nc(1) program to forward the final
69ssh tunnel destination over multiple ssh sessions.
70
71 Host access.somewhere.net
72 User puffy
73 Host dmzgw
74 User puffy
75 ProxyCommand ssh access.somewhere.net nc dmzgw 22
76 Host sshgateway
77 Tunnel Ethernet
78 TunnelDevice 0:any
79 PermitLocalCommand yes
80 LocalCommand sh /etc/netstart tun0
81 ProxyCommand ssh dmzgw nc sshgateway 22
82
83The following network plan illustrates the previous configuration in
84combination with layer 2 tunneling and Ethernet bridging.
85
86+--------+ ( ) +----------------------+
87| Client |------( Internet )-----| access.somewhere.net |
88+--------+ ( ) +----------------------+
89 : 192.168.1.78 |
90 :............................. +-------+
91 Forwarded ssh connection : | dmzgw |
92 Layer 2 tunnel : +-------+
93 : |
94 : |
95 : +------------+
96 :......| sshgateway |
97 | +------------+
98--- real connection Bridge -> | +----------+
99... "virtual connection" [ X ]--------| somehost |
100[X] switch +----------+
101 192.168.1.25
102
103(5) Client: Connect to the server and establish the tunnel
104
105Finally connect to the OpenSSH server to establish the tunnel by using
106the following command:
107
108 ssh sshgateway
109
110It is also possible to tell the client to fork into the background after
111the connection has been successfully established:
112
113 ssh -f sshgateway true
114
115Without the ssh configuration done in step (4), it is also possible
116to use the following command lines:
117
118 ssh -fw 0:1 sshgateway true
119 ifconfig tun0 192.168.5.1 192.168.5.2 netmask 255.255.255.252
120
121Using OpenSSH tunnel forwarding is a simple way to establish secure
122and ad hoc virtual private networks. Possible fields of application
123could be wireless networks or administrative VPN tunnels.
124
125Nevertheless, ssh tunneling requires some packet header overhead and
126runs on top of TCP. It is still suggested to use the IP Security
127Protocol (IPSec) for robust and permanent VPN connections and to
128interconnect corporate networks.
129
130 Reyk Floeter
131
132$OpenBSD: README.tun,v 1.4 2006/03/28 00:12:31 deraadt Exp $
133