Skip to content
Snippets Groups Projects
  1. Nov 25, 2024
  2. Sep 30, 2024
  3. Aug 27, 2024
  4. Jul 04, 2024
  5. May 20, 2024
  6. May 17, 2024
  7. May 06, 2024
    • Mohd Mehdi's avatar
      openssh: extend uci with more options · 5e7006f2
      Mohd Mehdi authored
      Add support and set defaults for following in default sshd config:
      
      * Ciphers:		aes256-ctr, aes192-ctr, aes128-ctr
      
      * HostKeyAlgorithms:	ssh-dss, ssh-rsa, ecdsa-sha2-nistp521,
      			ecdsa-sha2-nistp384,ecdsa-sha2-nistp256
      
      * HostKeyFiles:		default is empty
      
      * KexAlgorithms:	diffie-hellman-group-exchange-sha256,
      			diffie-hellman-group14-sha1,
      			ecdh-sha2-nistp521,ecdh-sha2-nistp384,
      			ecdh-sha2-nistp256
      5e7006f2
  8. May 02, 2024
    • Mohd Mehdi's avatar
      openssh: add migration script · e996dfd7
      Mohd Mehdi authored
      * add uci-default script that will generate an sshd config from
        dropbear config, if present (to preserve settings from previous
        image which had dropbear), or with default values if sshd config
        is also not present
      
      * the script will also check for dropbear key file and if found,
        place them where sshd expects them
      e996dfd7
  9. Apr 27, 2024
  10. Apr 26, 2024
  11. Apr 02, 2024
    • Mohd Mehdi's avatar
      openssh: add uci and multi-instance support · 993bded9
      Mohd Mehdi authored and Rahul Thakur's avatar Rahul Thakur committed
      * openssh package is missing uci support in openwrt,
      this commit implements the same. The init script
      now reads from the uci and passes the arguments to
      openssh.
      * support for handling multiple instances is also
      added.
      
      note: the same has been up-streamed and has also got
      1 approval already.
      993bded9
  12. Feb 07, 2024
  13. Oct 07, 2023
  14. Sep 15, 2023
  15. May 17, 2023
  16. May 01, 2023
  17. Apr 25, 2023
    • Glen Huang's avatar
      openssh: preserve authorized_keys · e36a55c9
      Glen Huang authored
      
      The root user is usually the user that clients ssh into with, so in most
      cases its authorized_keys determines what clients are allowed to ssh
      into this device. Without preserving this file, they could potentially
      be locked out after upgrading.
      
      Signed-off-by: default avatarGlen Huang <me@glenhuang.com>
      e36a55c9
  18. Mar 18, 2023
  19. Feb 03, 2023
  20. Dec 13, 2022
  21. Apr 13, 2022
  22. Mar 17, 2022
  23. Feb 11, 2022
  24. Nov 12, 2021
  25. Sep 27, 2021
  26. Aug 25, 2021
  27. Apr 20, 2021
  28. Mar 03, 2021
  29. Jan 06, 2021
    • Linos Giannopoulos's avatar
      openssh: Add FIDO2 hardware token support · 855db864
      Linos Giannopoulos authored
      Version 8.2[0] added support for two new key types: "ecdsa-sk" and
      "ed25519-sk". These two type enable the usage of hardware tokens that
      implement the FIDO (or FIDO2) standard, as an authentication method for
      SSH.
      
      Since we're already on version 8.4 all we need to do is to explicitly enable
      the support for hardware keys when compiling OpenSSH and add all the
      missing dependencies OpenSSH requires.
      
      OpenSSH depends on libfido2[1], to communicate with the FIDO devices
      over USB. In turn, libfido2 depends on libcbor, a C implementation of
      the CBOR protocol[2] and OpenSSL.
      
      [0]: https://lwn.net/Articles/812537/
      [1]: https://github.com/Yubico/libfido2
      
      
      [2]: tools.ietf.org/html/rfc7049
      
      Signed-off-by: default avatarLinos Giannopoulos <linosgian00@gmail.com>
      855db864
  30. Dec 15, 2020
  31. Oct 08, 2020
  32. Oct 05, 2020
  33. Jul 07, 2020
Loading