Tess Gauthier
bbb76f5c67
increase debug of failing pester test
2022-10-19 14:22:39 -04:00
Tess Gauthier
a88ae8d841
appveyor.yml
2022-10-18 14:07:12 -04:00
Tess Gauthier
803e013b3b
make key_lookup compatible with winhello
2022-10-18 14:04:50 -04:00
Darren Tucker
614252b05d
OpenSSL dev branch now identifies as 3.2.0.
2022-10-18 06:29:16 +11:00
Damien Miller
195e5a65fd
revert c64b62338b4 and guard POLL* defines instead
...
c64b62338b4 broke OSX builds, which do have poll.h but lack ppoll(2)
Spotted by dtucker
2022-10-17 09:41:47 +11:00
Damien Miller
bc2e480d99
undef _get{short,long} before redefining
2022-10-14 14:52:22 +11:00
Harmen Stoppels
5eb796a369
Fix snprintf configure test for clang 15
...
Clang 15 -Wimplicit-int defaults to an error in C99 mode and above.
A handful of tests have "main(..." and not "int main(..." which caused
the tests to produce incorrect results.
2022-10-14 07:37:16 +11:00
Tess Gauthier
ca9f04bd94
add ifdef to sftp-server.c
2022-10-13 15:51:05 -04:00
Tess Gauthier
0488165b5e
remove rdp block from appveyor since we are no longer debugging
2022-10-13 12:57:31 -04:00
Tess Gauthier
302dc2f2b4
add windows preprocessor definition in key_lookup
2022-10-13 12:36:04 -04:00
Tess Gauthier
eb2f6238fb
revert preprocessor definition for winhello
2022-10-13 12:35:46 -04:00
Tess Gauthier
0bde9952c7
add preprocessor for WinHello
2022-10-13 11:04:47 -04:00
Tess Gauthier
9b344f4466
add windows specific code back into method moved from auth.c to auth2-pubkeyfile.c
2022-10-12 11:55:55 -04:00
Tess Gauthier
5e2b081a49
modify -p tests to only run for Windows OS version 10 and above
2022-10-11 18:40:39 -04:00
Damien Miller
c64b62338b
skip bsd-poll.h if poll.h found; ok dtucker
2022-10-10 12:32:43 +11:00
Tess Gauthier
2653b08c59
remove extra sleep time from debugging scp pester tests
2022-10-07 12:45:46 -04:00
Tess Gauthier
47620db2c4
remove keys for upstream tests ( #624 )
2022-10-07 11:25:23 -04:00
djm@openbsd.org
5ee2b8ccfc
upstream: honour user's umask if it is more restrictive then the ssh
...
default (022); based on patch from Alex Henrie, ok dtucker@ deraadt@
OpenBSD-Commit-ID: fe1b9e15fc9a4f49fc338e848ce14d8727abe82d
2022-10-07 09:45:02 +11:00
Tess Gauthier
43bbf692c6
disable -p pester tests due to unreliability on older Windows versions
2022-10-06 15:47:12 -04:00
Tess Gauthier
3e3b110485
fix 9.1 compilation errors
2022-10-06 15:43:21 -04:00
Darren Tucker
a75cffc270
Add LibreSSL 3.6.0 to test suite.
...
While there, bump OpenSSL to latest 1.1.1q release.
2022-10-07 03:54:56 +11:00
Darren Tucker
fcc0f0c0e9
Add 9.1 branch to CI status page.
2022-10-06 21:18:16 +11:00
Darren Tucker
ef211eee63
Test commits to all branches of portable.
...
Only test OpenBSD upstream on commits to master since that's what it
tracks.
2022-10-05 06:31:48 +11:00
Damien Miller
fe646de03c
whitespace at EOL
2022-10-05 03:47:26 +11:00
Damien Miller
a6e1852d10
mention libfido2 autodetection
2022-10-05 03:40:01 +11:00
Damien Miller
7360c2c206
remove mention of --with-security-key-builtin
...
it is enabled by default when libfido2 is installed
2022-10-05 03:37:36 +11:00
Tess Gauthier
df96e7c7e2
attempt to fix merge conflicts
2022-10-04 12:19:24 -04:00
Damien Miller
0ffb46f2ee
update .depend
2022-10-04 01:51:42 +11:00
Damien Miller
657e676ff6
update release notes URL
2022-10-04 01:45:52 +11:00
Damien Miller
f059da2b29
crank versions in RPM spec files
2022-10-04 01:45:41 +11:00
djm@openbsd.org
b51f3f172d
upstream: openssh-9.1
...
OpenBSD-Commit-ID: 5a467b2ee81da01a86adf1ad93b62b1728494e56
2022-09-27 19:37:13 +10:00
dtucker@openbsd.org
4cf8d0c0f3
upstream: Fix typo. From AlexanderStohr via github PR#343.
...
OpenBSD-Commit-ID: a134c9b4039e48803fc6a87f955b0f4a03181497
2022-09-27 08:16:44 +10:00
djm@openbsd.org
8179fed326
upstream: add RequiredRSASize to the list of keywords accepted by
...
-o; spotted by jmc@
OpenBSD-Commit-ID: fe871408cf6f9d3699afeda876f8adbac86a035e
2022-09-27 08:16:44 +10:00
Tess Gauthier
d215e7333f
add sleep to pester test
2022-09-21 13:09:53 -04:00
Tess Gauthier
bb847f99bc
add debug on appveyor
2022-09-20 13:40:48 -04:00
Damien Miller
5f954929e9
no need for glob.h here
...
it also causes portability problems
2022-09-19 20:59:34 +10:00
Damien Miller
03d94a4720
avoid Wuninitialized false positive in gcc-12ish
2022-09-19 20:59:04 +10:00
djm@openbsd.org
9d95252911
upstream: use users-groups-by-id@openssh.com sftp-server extension
...
(when available) to fill in user/group names for directory listings.
Implement a client-side cache of see uid/gid=>user/group names. ok markus@
OpenBSD-Commit-ID: f239aeeadfa925a37ceee36ee8b256b8ccf4466e
2022-09-19 20:51:14 +10:00
djm@openbsd.org
8ff680368b
upstream: sftp client library support for
...
users-groups-by-id@openssh.com ; ok markus@
OpenBSD-Commit-ID: ddb2f33a2da6349a9a89a8b5bcb9ca7c999394de
2022-09-19 20:49:14 +10:00
djm@openbsd.org
488f6e1c58
upstream: extend sftp-common.c:extend ls_file() to support supplied
...
user/group names; ok markus@
OpenBSD-Commit-ID: c70c70498b1fdcf158531117e405b6245863bfb0
2022-09-19 20:49:13 +10:00
djm@openbsd.org
74b77f7497
upstream: sftp-server(8): add a "users-groups-by-id@openssh.com"
...
extension request that allows the client to obtain user/group names that
correspond to a set of uids/gids.
Will be used to make directory listings more useful and consistent
in sftp(1).
ok markus@
OpenBSD-Commit-ID: 7ebabde0bcb95ef949c4840fe89e697e30df47d3
2022-09-19 20:49:13 +10:00
djm@openbsd.org
231a346c0c
upstream: better debugging for connect_next()
...
OpenBSD-Commit-ID: d16a307a0711499c971807f324484ed3a6036640
2022-09-19 19:25:14 +10:00
djm@openbsd.org
1875042c52
upstream: Add RequiredRSASize for sshd(8); RSA keys that fall
...
beneath this limit will be ignored for user and host-based authentication.
Feedback deraadt@ ok markus@
OpenBSD-Commit-ID: 187931dfc19d51873df5930a04f2d972adf1f7f1
2022-09-17 20:39:02 +10:00
djm@openbsd.org
54b333d12e
upstream: add a RequiredRSASize for checking RSA key length in
...
ssh(1). User authentication keys that fall beneath this limit will be
ignored. If a host presents a host key beneath this limit then the connection
will be terminated (unfortunately there are no fallbacks in the protocol for
host authentication).
feedback deraadt, Dmitry Belyavskiy; ok markus@
OpenBSD-Commit-ID: 430e339b2a79fa9ecc63f2837b06fdd88a7da13a
2022-09-17 20:39:02 +10:00
djm@openbsd.org
07d8771bac
upstream: Add a sshkey_check_rsa_length() call for checking the
...
length of an RSA key; ok markus@
OpenBSD-Commit-ID: de77cd5b11594297eda82edc594b0d32b8535134
2022-09-17 20:38:40 +10:00
djm@openbsd.org
3991a0cf94
upstream: actually hook up restrict_websafe; the command-line flag
...
was never actually used. Spotted by Matthew Garrett
OpenBSD-Commit-ID: 0b363518ac4c2819dbaa3dfad4028633ab9cdff1
2022-09-17 20:37:20 +10:00
djm@openbsd.org
30b2a7e429
upstream: correct error value
...
OpenBSD-Commit-ID: 780efcbad76281f11f14b2a5ff04eb6db3dfdad4
2022-09-17 20:37:19 +10:00
djm@openbsd.org
ac1ec95459
upstream: sftp: Be a bit more clever about completions
...
There are commands (e.g. "get" or "put") that accept two
arguments, a local path and a remote path. However, the way
current completion is written doesn't take this distinction into
account and always completes remote or local paths.
By expanding CMD struct and "cmds" array this distinction can be
reflected and with small adjustment to completer code the correct
path can be completed.
By Michal Privoznik, ok dtucker@
OpenBSD-Commit-ID: 1396d921c4eb1befd531f5c4a8ab47e7a74b610b
2022-09-16 13:35:22 +10:00
djm@openbsd.org
590db83384
upstream: sftp: Don't attempt to complete arguments for
...
non-existent commands
If user entered a non-existent command (e.g. because they made a
typo) there is no point in trying to complete its arguments. Skip
calling complete_match() if that's the case.
From Michal Privoznik
OpenBSD-Commit-ID: cf39c811a68cde2aeb98fc85addea4000ef6b07a
2022-09-16 13:35:21 +10:00
Tess Gauthier
b006c8d8f4
define HAVE_KILLPG
2022-09-14 17:30:12 -04:00