mirror of
https://github.com/PowerShell/openssh-portable.git
synced 2025-07-31 01:35:11 +02:00
Sync remaining ChallengeResponse removal.
These were omitted from commit 88868fd131.
This commit is contained in:
parent
2c9e4b319f
commit
53237ac789
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: auth2-kbdint.c,v 1.12 2020/10/18 11:32:01 djm Exp $ */
|
/* $OpenBSD: auth2-kbdint.c,v 1.13 2021/07/02 05:11:20 dtucker Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
||||||
*
|
*
|
||||||
@ -56,7 +56,7 @@ userauth_kbdint(struct ssh *ssh)
|
|||||||
|
|
||||||
debug("keyboard-interactive devs %s", devs);
|
debug("keyboard-interactive devs %s", devs);
|
||||||
|
|
||||||
if (options.challenge_response_authentication)
|
if (options.kbd_interactive_authentication)
|
||||||
authenticated = auth2_challenge(ssh, devs);
|
authenticated = auth2_challenge(ssh, devs);
|
||||||
|
|
||||||
free(devs);
|
free(devs);
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: monitor.c,v 1.226 2021/04/30 04:02:52 dtucker Exp $ */
|
/* $OpenBSD: monitor.c,v 1.227 2021/07/02 05:11:20 dtucker Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright 2002 Niels Provos <provos@citi.umich.edu>
|
* Copyright 2002 Niels Provos <provos@citi.umich.edu>
|
||||||
* Copyright 2002 Markus Friedl <markus@openbsd.org>
|
* Copyright 2002 Markus Friedl <markus@openbsd.org>
|
||||||
@ -962,7 +962,7 @@ mm_answer_bsdauthrespond(struct ssh *ssh, int sock, struct sshbuf *m)
|
|||||||
|
|
||||||
if ((r = sshbuf_get_cstring(m, &response, NULL)) != 0)
|
if ((r = sshbuf_get_cstring(m, &response, NULL)) != 0)
|
||||||
fatal_fr(r, "parse");
|
fatal_fr(r, "parse");
|
||||||
authok = options.challenge_response_authentication &&
|
authok = options.kbd_interactive_authentication &&
|
||||||
auth_userresponse(authctxt->as, response, 0);
|
auth_userresponse(authctxt->as, response, 0);
|
||||||
authctxt->as = NULL;
|
authctxt->as = NULL;
|
||||||
debug3_f("<%s> = <%d>", response, authok);
|
debug3_f("<%s> = <%d>", response, authok);
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: readconf.h,v 1.140 2021/02/15 20:43:15 markus Exp $ */
|
/* $OpenBSD: readconf.h,v 1.141 2021/07/02 05:11:21 dtucker Exp $ */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
@ -38,8 +38,6 @@ typedef struct {
|
|||||||
struct ForwardOptions fwd_opts; /* forwarding options */
|
struct ForwardOptions fwd_opts; /* forwarding options */
|
||||||
int pubkey_authentication; /* Try ssh2 pubkey authentication. */
|
int pubkey_authentication; /* Try ssh2 pubkey authentication. */
|
||||||
int hostbased_authentication; /* ssh2's rhosts_rsa */
|
int hostbased_authentication; /* ssh2's rhosts_rsa */
|
||||||
int challenge_response_authentication;
|
|
||||||
/* Try S/Key or TIS, authentication. */
|
|
||||||
int gss_authentication; /* Try GSS authentication */
|
int gss_authentication; /* Try GSS authentication */
|
||||||
int gss_deleg_creds; /* Delegate GSS credentials */
|
int gss_deleg_creds; /* Delegate GSS credentials */
|
||||||
int password_authentication; /* Try password
|
int password_authentication; /* Try password
|
||||||
|
5
scp.1
5
scp.1
@ -8,9 +8,9 @@
|
|||||||
.\"
|
.\"
|
||||||
.\" Created: Sun May 7 00:14:37 1995 ylo
|
.\" Created: Sun May 7 00:14:37 1995 ylo
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: scp.1,v 1.95 2021/01/26 15:40:17 naddy Exp $
|
.\" $OpenBSD: scp.1,v 1.96 2021/07/02 05:11:21 dtucker Exp $
|
||||||
.\"
|
.\"
|
||||||
.Dd $Mdocdate: January 26 2021 $
|
.Dd $Mdocdate: July 2 2021 $
|
||||||
.Dt SCP 1
|
.Dt SCP 1
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -158,7 +158,6 @@ For full details of the options listed below, and their possible values, see
|
|||||||
.It CanonicalizePermittedCNAMEs
|
.It CanonicalizePermittedCNAMEs
|
||||||
.It CASignatureAlgorithms
|
.It CASignatureAlgorithms
|
||||||
.It CertificateFile
|
.It CertificateFile
|
||||||
.It ChallengeResponseAuthentication
|
|
||||||
.It CheckHostIP
|
.It CheckHostIP
|
||||||
.It Ciphers
|
.It Ciphers
|
||||||
.It Compression
|
.It Compression
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: servconf.h,v 1.154 2021/04/03 06:18:40 djm Exp $ */
|
/* $OpenBSD: servconf.h,v 1.155 2021/07/02 05:11:21 dtucker Exp $ */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
@ -146,7 +146,6 @@ typedef struct {
|
|||||||
int password_authentication; /* If true, permit password
|
int password_authentication; /* If true, permit password
|
||||||
* authentication. */
|
* authentication. */
|
||||||
int kbd_interactive_authentication; /* If true, permit */
|
int kbd_interactive_authentication; /* If true, permit */
|
||||||
int challenge_response_authentication;
|
|
||||||
int permit_empty_passwd; /* If false, do not permit empty
|
int permit_empty_passwd; /* If false, do not permit empty
|
||||||
* passwords. */
|
* passwords. */
|
||||||
int permit_user_env; /* If true, read ~/.ssh/environment */
|
int permit_user_env; /* If true, read ~/.ssh/environment */
|
||||||
|
5
sftp.1
5
sftp.1
@ -1,4 +1,4 @@
|
|||||||
.\" $OpenBSD: sftp.1,v 1.137 2021/02/12 03:49:09 djm Exp $
|
.\" $OpenBSD: sftp.1,v 1.138 2021/07/02 05:11:21 dtucker Exp $
|
||||||
.\"
|
.\"
|
||||||
.\" Copyright (c) 2001 Damien Miller. All rights reserved.
|
.\" Copyright (c) 2001 Damien Miller. All rights reserved.
|
||||||
.\"
|
.\"
|
||||||
@ -22,7 +22,7 @@
|
|||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.Dd $Mdocdate: February 12 2021 $
|
.Dd $Mdocdate: July 2 2021 $
|
||||||
.Dt SFTP 1
|
.Dt SFTP 1
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -232,7 +232,6 @@ For full details of the options listed below, and their possible values, see
|
|||||||
.It CanonicalizePermittedCNAMEs
|
.It CanonicalizePermittedCNAMEs
|
||||||
.It CASignatureAlgorithms
|
.It CASignatureAlgorithms
|
||||||
.It CertificateFile
|
.It CertificateFile
|
||||||
.It ChallengeResponseAuthentication
|
|
||||||
.It CheckHostIP
|
.It CheckHostIP
|
||||||
.It Ciphers
|
.It Ciphers
|
||||||
.It Compression
|
.It Compression
|
||||||
|
13
ssh.1
13
ssh.1
@ -33,8 +33,8 @@
|
|||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: ssh.1,v 1.420 2021/06/25 06:20:39 dtucker Exp $
|
.\" $OpenBSD: ssh.1,v 1.421 2021/07/02 05:11:21 dtucker Exp $
|
||||||
.Dd $Mdocdate: June 25 2021 $
|
.Dd $Mdocdate: July 2 2021 $
|
||||||
.Dt SSH 1
|
.Dt SSH 1
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -485,7 +485,6 @@ For full details of the options listed below, and their possible values, see
|
|||||||
.It CanonicalizePermittedCNAMEs
|
.It CanonicalizePermittedCNAMEs
|
||||||
.It CASignatureAlgorithms
|
.It CASignatureAlgorithms
|
||||||
.It CertificateFile
|
.It CertificateFile
|
||||||
.It ChallengeResponseAuthentication
|
|
||||||
.It CheckHostIP
|
.It CheckHostIP
|
||||||
.It Ciphers
|
.It Ciphers
|
||||||
.It ClearAllForwardings
|
.It ClearAllForwardings
|
||||||
@ -833,7 +832,7 @@ The methods available for authentication are:
|
|||||||
GSSAPI-based authentication,
|
GSSAPI-based authentication,
|
||||||
host-based authentication,
|
host-based authentication,
|
||||||
public key authentication,
|
public key authentication,
|
||||||
challenge-response authentication,
|
keyboard-interactive authentication,
|
||||||
and password authentication.
|
and password authentication.
|
||||||
Authentication methods are tried in the order specified above,
|
Authentication methods are tried in the order specified above,
|
||||||
though
|
though
|
||||||
@ -971,11 +970,11 @@ directive in
|
|||||||
.Xr ssh_config 5
|
.Xr ssh_config 5
|
||||||
for more information.
|
for more information.
|
||||||
.Pp
|
.Pp
|
||||||
Challenge-response authentication works as follows:
|
Keyboard-interactive authentication works as follows:
|
||||||
The server sends an arbitrary
|
The server sends an arbitrary
|
||||||
.Qq challenge
|
.Qq challenge
|
||||||
text, and prompts for a response.
|
text and prompts for a response, possibly multiple times.
|
||||||
Examples of challenge-response authentication include
|
Examples of keyboard-interactive authentication include
|
||||||
.Bx
|
.Bx
|
||||||
Authentication (see
|
Authentication (see
|
||||||
.Xr login.conf 5 )
|
.Xr login.conf 5 )
|
||||||
|
13
ssh_config.5
13
ssh_config.5
@ -33,8 +33,8 @@
|
|||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: ssh_config.5,v 1.354 2021/06/04 05:10:03 djm Exp $
|
.\" $OpenBSD: ssh_config.5,v 1.355 2021/07/02 05:11:21 dtucker Exp $
|
||||||
.Dd $Mdocdate: June 4 2021 $
|
.Dd $Mdocdate: July 2 2021 $
|
||||||
.Dt SSH_CONFIG 5
|
.Dt SSH_CONFIG 5
|
||||||
.Os
|
.Os
|
||||||
.Sh NAME
|
.Sh NAME
|
||||||
@ -412,13 +412,6 @@ Multiple
|
|||||||
.Cm CertificateFile
|
.Cm CertificateFile
|
||||||
directives will add to the list of certificates used for
|
directives will add to the list of certificates used for
|
||||||
authentication.
|
authentication.
|
||||||
.It Cm ChallengeResponseAuthentication
|
|
||||||
Specifies whether to use challenge-response authentication.
|
|
||||||
The argument to this keyword must be
|
|
||||||
.Cm yes
|
|
||||||
(the default)
|
|
||||||
or
|
|
||||||
.Cm no .
|
|
||||||
.It Cm CheckHostIP
|
.It Cm CheckHostIP
|
||||||
If set to
|
If set to
|
||||||
.Cm yes
|
.Cm yes
|
||||||
@ -1085,6 +1078,8 @@ The argument to this keyword must be
|
|||||||
(the default)
|
(the default)
|
||||||
or
|
or
|
||||||
.Cm no .
|
.Cm no .
|
||||||
|
.Cm ChallengeResponseAuthentication
|
||||||
|
is a deprecated alias for this.
|
||||||
.It Cm KbdInteractiveDevices
|
.It Cm KbdInteractiveDevices
|
||||||
Specifies the list of methods to use in keyboard-interactive authentication.
|
Specifies the list of methods to use in keyboard-interactive authentication.
|
||||||
Multiple method names must be comma-separated.
|
Multiple method names must be comma-separated.
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: sshconnect.c,v 1.354 2021/06/25 06:20:39 dtucker Exp $ */
|
/* $OpenBSD: sshconnect.c,v 1.355 2021/07/02 05:11:21 dtucker Exp $ */
|
||||||
/*
|
/*
|
||||||
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
||||||
@ -1298,13 +1298,6 @@ check_host_key(char *hostname, const struct ssh_conn_info *cinfo,
|
|||||||
error("Keyboard-interactive authentication is disabled"
|
error("Keyboard-interactive authentication is disabled"
|
||||||
" to avoid man-in-the-middle attacks.");
|
" to avoid man-in-the-middle attacks.");
|
||||||
options.kbd_interactive_authentication = 0;
|
options.kbd_interactive_authentication = 0;
|
||||||
options.challenge_response_authentication = 0;
|
|
||||||
cancelled_forwarding = 1;
|
|
||||||
}
|
|
||||||
if (options.challenge_response_authentication) {
|
|
||||||
error("Challenge/response authentication is disabled"
|
|
||||||
" to avoid man-in-the-middle attacks.");
|
|
||||||
options.challenge_response_authentication = 0;
|
|
||||||
cancelled_forwarding = 1;
|
cancelled_forwarding = 1;
|
||||||
}
|
}
|
||||||
if (options.forward_agent) {
|
if (options.forward_agent) {
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: sshconnect2.c,v 1.349 2021/06/07 03:38:38 djm Exp $ */
|
/* $OpenBSD: sshconnect2.c,v 1.350 2021/07/02 05:11:21 dtucker Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
||||||
* Copyright (c) 2008 Damien Miller. All rights reserved.
|
* Copyright (c) 2008 Damien Miller. All rights reserved.
|
||||||
@ -442,8 +442,6 @@ ssh_userauth2(struct ssh *ssh, const char *local_user,
|
|||||||
Authctxt authctxt;
|
Authctxt authctxt;
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
if (options.challenge_response_authentication)
|
|
||||||
options.kbd_interactive_authentication = 1;
|
|
||||||
if (options.preferred_authentications == NULL)
|
if (options.preferred_authentications == NULL)
|
||||||
options.preferred_authentications = authmethods_get();
|
options.preferred_authentications = authmethods_get();
|
||||||
|
|
||||||
|
6
sshd.c
6
sshd.c
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: sshd.c,v 1.576 2021/06/10 03:14:14 dtucker Exp $ */
|
/* $OpenBSD: sshd.c,v 1.577 2021/07/02 05:11:21 dtucker Exp $ */
|
||||||
/*
|
/*
|
||||||
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
||||||
@ -1753,10 +1753,6 @@ main(int ac, char **av)
|
|||||||
/* Fill in default values for those options not explicitly set. */
|
/* Fill in default values for those options not explicitly set. */
|
||||||
fill_default_server_options(&options);
|
fill_default_server_options(&options);
|
||||||
|
|
||||||
/* challenge-response is implemented via keyboard interactive */
|
|
||||||
if (options.challenge_response_authentication)
|
|
||||||
options.kbd_interactive_authentication = 1;
|
|
||||||
|
|
||||||
/* Check that options are sensible */
|
/* Check that options are sensible */
|
||||||
if (options.authorized_keys_command_user == NULL &&
|
if (options.authorized_keys_command_user == NULL &&
|
||||||
(options.authorized_keys_command != NULL &&
|
(options.authorized_keys_command != NULL &&
|
||||||
|
Loading…
x
Reference in New Issue
Block a user