13355 Commits

Author SHA1 Message Date
Tess Gauthier
bbb76f5c67 increase debug of failing pester test 2022-10-19 14:22:39 -04:00
Tess Gauthier
a88ae8d841 appveyor.yml 2022-10-18 14:07:12 -04:00
Tess Gauthier
803e013b3b make key_lookup compatible with winhello 2022-10-18 14:04:50 -04:00
Darren Tucker
614252b05d
OpenSSL dev branch now identifies as 3.2.0. 2022-10-18 06:29:16 +11:00
Damien Miller
195e5a65fd
revert c64b62338b4 and guard POLL* defines instead
c64b62338b4 broke OSX builds, which do have poll.h but lack ppoll(2)
Spotted by dtucker
2022-10-17 09:41:47 +11:00
Damien Miller
bc2e480d99
undef _get{short,long} before redefining 2022-10-14 14:52:22 +11:00
Harmen Stoppels
5eb796a369
Fix snprintf configure test for clang 15
Clang 15 -Wimplicit-int defaults to an error in C99 mode and above.
A handful of tests have "main(..." and not "int main(..." which caused
the tests to produce incorrect results.
2022-10-14 07:37:16 +11:00
Tess Gauthier
ca9f04bd94 add ifdef to sftp-server.c 2022-10-13 15:51:05 -04:00
Tess Gauthier
0488165b5e remove rdp block from appveyor since we are no longer debugging 2022-10-13 12:57:31 -04:00
Tess Gauthier
302dc2f2b4 add windows preprocessor definition in key_lookup 2022-10-13 12:36:04 -04:00
Tess Gauthier
eb2f6238fb revert preprocessor definition for winhello 2022-10-13 12:35:46 -04:00
Tess Gauthier
0bde9952c7 add preprocessor for WinHello 2022-10-13 11:04:47 -04:00
Tess Gauthier
9b344f4466 add windows specific code back into method moved from auth.c to auth2-pubkeyfile.c 2022-10-12 11:55:55 -04:00
Tess Gauthier
5e2b081a49 modify -p tests to only run for Windows OS version 10 and above 2022-10-11 18:40:39 -04:00
Damien Miller
c64b62338b
skip bsd-poll.h if poll.h found; ok dtucker 2022-10-10 12:32:43 +11:00
Tess Gauthier
2653b08c59 remove extra sleep time from debugging scp pester tests 2022-10-07 12:45:46 -04:00
Tess Gauthier
47620db2c4
remove keys for upstream tests (#624) 2022-10-07 11:25:23 -04:00
djm@openbsd.org
5ee2b8ccfc
upstream: honour user's umask if it is more restrictive then the ssh
default (022); based on patch from Alex Henrie, ok dtucker@ deraadt@

OpenBSD-Commit-ID: fe1b9e15fc9a4f49fc338e848ce14d8727abe82d
2022-10-07 09:45:02 +11:00
Tess Gauthier
43bbf692c6 disable -p pester tests due to unreliability on older Windows versions 2022-10-06 15:47:12 -04:00
Tess Gauthier
3e3b110485 fix 9.1 compilation errors 2022-10-06 15:43:21 -04:00
Darren Tucker
a75cffc270
Add LibreSSL 3.6.0 to test suite.
While there, bump OpenSSL to latest 1.1.1q release.
2022-10-07 03:54:56 +11:00
Darren Tucker
fcc0f0c0e9
Add 9.1 branch to CI status page. 2022-10-06 21:18:16 +11:00
Darren Tucker
ef211eee63
Test commits to all branches of portable.
Only test OpenBSD upstream on commits to master since that's what it
tracks.
2022-10-05 06:31:48 +11:00
Damien Miller
fe646de03c
whitespace at EOL 2022-10-05 03:47:26 +11:00
Damien Miller
a6e1852d10
mention libfido2 autodetection 2022-10-05 03:40:01 +11:00
Damien Miller
7360c2c206
remove mention of --with-security-key-builtin
it is enabled by default when libfido2 is installed
2022-10-05 03:37:36 +11:00
Tess Gauthier
df96e7c7e2 attempt to fix merge conflicts 2022-10-04 12:19:24 -04:00
Damien Miller
0ffb46f2ee
update .depend 2022-10-04 01:51:42 +11:00
Damien Miller
657e676ff6
update release notes URL 2022-10-04 01:45:52 +11:00
Damien Miller
f059da2b29
crank versions in RPM spec files 2022-10-04 01:45:41 +11:00
djm@openbsd.org
b51f3f172d
upstream: openssh-9.1
OpenBSD-Commit-ID: 5a467b2ee81da01a86adf1ad93b62b1728494e56
2022-09-27 19:37:13 +10:00
dtucker@openbsd.org
4cf8d0c0f3
upstream: Fix typo. From AlexanderStohr via github PR#343.
OpenBSD-Commit-ID: a134c9b4039e48803fc6a87f955b0f4a03181497
2022-09-27 08:16:44 +10:00
djm@openbsd.org
8179fed326
upstream: add RequiredRSASize to the list of keywords accepted by
-o; spotted by jmc@

OpenBSD-Commit-ID: fe871408cf6f9d3699afeda876f8adbac86a035e
2022-09-27 08:16:44 +10:00
Tess Gauthier
d215e7333f add sleep to pester test 2022-09-21 13:09:53 -04:00
Tess Gauthier
bb847f99bc add debug on appveyor 2022-09-20 13:40:48 -04:00
Damien Miller
5f954929e9
no need for glob.h here
it also causes portability problems
2022-09-19 20:59:34 +10:00
Damien Miller
03d94a4720
avoid Wuninitialized false positive in gcc-12ish 2022-09-19 20:59:04 +10:00
djm@openbsd.org
9d95252911
upstream: use users-groups-by-id@openssh.com sftp-server extension
(when available) to fill in user/group names for directory listings.
Implement a client-side cache of see uid/gid=>user/group names. ok markus@

OpenBSD-Commit-ID: f239aeeadfa925a37ceee36ee8b256b8ccf4466e
2022-09-19 20:51:14 +10:00
djm@openbsd.org
8ff680368b
upstream: sftp client library support for
users-groups-by-id@openssh.com; ok markus@

OpenBSD-Commit-ID: ddb2f33a2da6349a9a89a8b5bcb9ca7c999394de
2022-09-19 20:49:14 +10:00
djm@openbsd.org
488f6e1c58
upstream: extend sftp-common.c:extend ls_file() to support supplied
user/group names; ok markus@

OpenBSD-Commit-ID: c70c70498b1fdcf158531117e405b6245863bfb0
2022-09-19 20:49:13 +10:00
djm@openbsd.org
74b77f7497
upstream: sftp-server(8): add a "users-groups-by-id@openssh.com"
extension request that allows the client to obtain user/group names that
correspond to a set of uids/gids.

Will be used to make directory listings more useful and consistent
in sftp(1).

ok markus@

OpenBSD-Commit-ID: 7ebabde0bcb95ef949c4840fe89e697e30df47d3
2022-09-19 20:49:13 +10:00
djm@openbsd.org
231a346c0c
upstream: better debugging for connect_next()
OpenBSD-Commit-ID: d16a307a0711499c971807f324484ed3a6036640
2022-09-19 19:25:14 +10:00
djm@openbsd.org
1875042c52
upstream: Add RequiredRSASize for sshd(8); RSA keys that fall
beneath this limit will be ignored for user and host-based authentication.

Feedback deraadt@ ok markus@

OpenBSD-Commit-ID: 187931dfc19d51873df5930a04f2d972adf1f7f1
2022-09-17 20:39:02 +10:00
djm@openbsd.org
54b333d12e
upstream: add a RequiredRSASize for checking RSA key length in
ssh(1). User authentication keys that fall beneath this limit will be
ignored. If a host presents a host key beneath this limit then the connection
will be terminated (unfortunately there are no fallbacks in the protocol for
host authentication).

feedback deraadt, Dmitry Belyavskiy; ok markus@

OpenBSD-Commit-ID: 430e339b2a79fa9ecc63f2837b06fdd88a7da13a
2022-09-17 20:39:02 +10:00
djm@openbsd.org
07d8771bac
upstream: Add a sshkey_check_rsa_length() call for checking the
length of an RSA key; ok markus@

OpenBSD-Commit-ID: de77cd5b11594297eda82edc594b0d32b8535134
2022-09-17 20:38:40 +10:00
djm@openbsd.org
3991a0cf94
upstream: actually hook up restrict_websafe; the command-line flag
was never actually used. Spotted by Matthew Garrett

OpenBSD-Commit-ID: 0b363518ac4c2819dbaa3dfad4028633ab9cdff1
2022-09-17 20:37:20 +10:00
djm@openbsd.org
30b2a7e429
upstream: correct error value
OpenBSD-Commit-ID: 780efcbad76281f11f14b2a5ff04eb6db3dfdad4
2022-09-17 20:37:19 +10:00
djm@openbsd.org
ac1ec95459
upstream: sftp: Be a bit more clever about completions
There are commands (e.g. "get" or "put") that accept two
arguments, a local path and a remote path. However, the way
current completion is written doesn't take this distinction into
account and always completes remote or local paths.

By expanding CMD struct and "cmds" array this distinction can be
reflected and with small adjustment to completer code the correct
path can be completed.

By Michal Privoznik, ok dtucker@

OpenBSD-Commit-ID: 1396d921c4eb1befd531f5c4a8ab47e7a74b610b
2022-09-16 13:35:22 +10:00
djm@openbsd.org
590db83384
upstream: sftp: Don't attempt to complete arguments for
non-existent commands

If user entered a non-existent command (e.g. because they made a
typo) there is no point in trying to complete its arguments. Skip
calling complete_match() if that's the case.

From Michal Privoznik

OpenBSD-Commit-ID: cf39c811a68cde2aeb98fc85addea4000ef6b07a
2022-09-16 13:35:21 +10:00
Tess Gauthier
b006c8d8f4 define HAVE_KILLPG 2022-09-14 17:30:12 -04:00