Commit Graph

12144 Commits

Author SHA1 Message Date
Tess Gauthier 6bd66d4685
update ssh-agent privileges to match install scripts for pkcs11/fido scenarios (#584) 2022-03-21 13:13:27 -07:00
pedro martelletto b314450fe5
skip check_sk_options() in sk_sign() when interfacing with webauthn.dll (#582) 2022-03-21 10:00:29 -07:00
bagajjal bd0d488a3c
Update MSI with ssh-sk-helper.exe, ssh-pkcs11-helper.exe, license.txt, notice.txt (#581) 2022-03-17 16:59:44 -07:00
bagajjal b90820169b
add ssh-pkcs11-helper.exe to build output, fix create_no_window for ssh-sk-helper.exe (#579) 2022-03-16 16:48:29 -07:00
Balu Gajjala 5d6a3f5641 Merge branch 'V8_9_test' into latestw_all 2022-03-15 16:31:47 -07:00
Balu Gajjala 73c976878e Crank V8.9 2022-03-15 13:13:19 -07:00
Balu Gajjala d328deb956 dummy commit to trigger ci 2022-03-12 16:40:36 -08:00
Balu Gajjala 78cf768fa9 remove unnecessary changes 2022-03-11 18:09:53 -08:00
Balu Gajjala 2771541a41 fix tests 2022-03-11 17:42:15 -08:00
Balu Gajjala affac5aedc fix tests 2022-03-11 17:15:47 -08:00
Balu Gajjala 9a8746842a Fix failed tests - 1 2022-03-11 13:53:27 -08:00
Andrew f392f20ecd
3rd party notices for releases (#575) 2022-03-08 12:42:44 -08:00
bagajjal 2d3ca752f9
V8 9 test (#574) 2022-03-07 10:48:41 -08:00
Balu Gajjala 9a85082806 V8.9 build errors, unit tests successful 2022-03-04 18:40:49 -08:00
bagajjal dcbfaa6d15
Create ssh-sk-helper.exe in user session (#573) 2022-03-04 16:59:08 -08:00
Tess Gauthier a3023c2d09
modify key event logic to fix ctrl+space not being sent (#569) 2022-03-02 10:40:36 -08:00
Andrew 4458bbc132
Merge pull request #571 from anmenaga/notice
Added NOTICE
2022-02-28 23:59:28 -08:00
unknown 346de3ea8e Added NOTICE 2022-02-28 23:58:28 -08:00
Balu Gajjala ee54e6bd06 Merge upstream V8_9 2022-02-24 16:57:16 -08:00
djm@openbsd.org 2ebf478107 upstream: free(3) wants stdlib.h
OpenBSD-Commit-ID: 227a8c70a95b4428c49e46863c9ef4bd318a3b8a
2022-02-24 08:24:35 +11:00
Damien Miller 166456ceda makedepend 2022-02-23 22:31:11 +11:00
djm@openbsd.org 32ebaa0dbc upstream: avoid integer overflow of auth attempts (harmless, caught
by monitor)

OpenBSD-Commit-ID: 488ad570b003b21e0cd9e7a00349cfc1003b4d86
2022-02-23 22:22:20 +11:00
djm@openbsd.org 6e0258c64c upstream: randomise the password used in fakepw
OpenBSD-Commit-ID: 34e159f73b1fbf0a924a9c042d8d61edde293947
2022-02-23 22:21:35 +11:00
djm@openbsd.org bf114d6f0a upstream: use asprintf to construct .rhosts paths
OpenBSD-Commit-ID: 8286e8d3d2c6ff916ff13d041d1713073f738a8b
2022-02-23 22:19:56 +11:00
djm@openbsd.org c07e154fbd upstream: openssh-8.9
OpenBSD-Commit-ID: 5c5f791c87c483cdab6d9266b43acdd9ca7bde0e
2022-02-23 22:08:26 +11:00
Darren Tucker bc16667b4a Extend select+rlimit sanbox test to include poll.
POSIX specifies that poll() shall fail if "nfds argument is greater
than {OPEN_MAX}".  The setrlimit sandbox sets this to effectively zero
so this causes poll() to fail in the preauth privsep process.

This is likely the underlying cause for the previously observed similar
behaviour of select() on plaforms where it is implement in userspace on
top of poll().
2022-02-22 15:39:37 +11:00
Darren Tucker 6520c488de Add Alpine Linux test VM. 2022-02-22 13:08:59 +11:00
Darren Tucker a4b325a3fc Include sys/param.h if present.
Needed for howmany() on MUSL systems such as Alpine.
2022-02-22 12:27:07 +11:00
Darren Tucker 5a102e9cb2 Only include sys/poll.h if we don't have poll.h.
Prevents warnings on MUSL based systems such as Alpine.
2022-02-22 12:25:52 +11:00
Damien Miller 7c0d4ce911 disable agent-restrict test on minix3
Minix seems to have a platform-wide limit on the number of
select(2) syscalls that can be concurrently issued. This test
seems to exceed this limit.

Refer to:

https://github.com/Stichting-MINIX-Research-Foundation/minix/blob/R3.3.0/minix/servers/vfs/select.c#L114
https://github.com/Stichting-MINIX-Research-Foundation/minix/blob/R3.3.0/minix/servers/vfs/select.c#L30-L31
2022-02-22 11:14:51 +11:00
Darren Tucker 81d33d8e3c Skip agent-getpeereid when running as root. 2022-02-21 21:27:20 +11:00
dtucker@openbsd.org fbd772570a upstream: Aproximate realpath on the expected output by deduping
leading slashes. Fixes test failure when user's home dir is / which is
possible in some portable configurations.

OpenBSD-Regress-ID: 53b8c53734f8893806961475c7106397f98d9f63
2022-02-20 15:10:19 +11:00
Darren Tucker 336685d223 Really move DSA to end of list.
In commit ad16a84e syncing from OpenBSD, RSA was accidentally moved to
the end of the list instead of DSA.  Spotted by andrew at fyfe.gb.net.
2022-02-20 13:30:52 +11:00
bagajjal 3a33ea8dee
Bagajjal/fix minor issues (#568) 2022-02-18 17:33:28 -08:00
Vivian Thiebaut f4606c802d
SCP: avoid error when file mode set to Read-Only (#566) 2022-02-18 16:39:09 -08:00
Tess Gauthier 96a3b6f802
add libcborVersion for compliance tasks (#567) 2022-02-18 11:34:51 -08:00
Vivian Thiebaut ac7bceff6f
Fix SCP stack overflow when copying over directories (#565) 2022-02-17 17:32:35 -08:00
Yan Tesis c89890c3a4
Adding PKCS11 support to SSH agent (#537) 2022-02-17 17:31:50 -08:00
Darren Tucker 63bf4f49ed Add test configs for MUSL C library. 2022-02-18 12:12:21 +11:00
Damien Miller f7fc6a43f1 minix needs BROKEN_POLL too; chokes on /dev/null 2022-02-17 22:54:19 +11:00
djm@openbsd.org 667fec5d4f upstream: check for EINTR/EAGAIN failures in the rfd fast-path; caught
by dtucker's minix3 vm :) ok dtucker@

OpenBSD-Commit-ID: 2e2c895a3e82ef347aa6694394a76a438be91361
2022-02-17 22:17:36 +11:00
Darren Tucker 41417dbda9 Comment hurd test, the VM is currently broken. 2022-02-17 22:05:29 +11:00
Damien Miller b2aee35a1f find sk-dummy.so when build_dir != src_dir
spotted by Corinna Vinschen; feedback & ok dtucker@
2022-02-17 21:15:16 +11:00
Tess Gauthier 5c32823fb9
Binskim add compiler option (#564) 2022-02-16 09:51:49 -08:00
Damien Miller 62a2d4e50b update versions in preparation for 8.9 release 2022-02-16 16:26:17 +11:00
djm@openbsd.org dd6d3dded7 upstream: document the unbound/host-bound options to
PubkeyAuthentication; spotted by HARUYAMA Seigo

OpenBSD-Commit-ID: 298f681b66a9ecd498f0700082c7a6c46e948981
2022-02-15 16:14:40 +11:00
Darren Tucker df93529dd7 Test if sshd accidentally acquires controlling tty
When SSHD_ACQUIRES_CTTY is defined, test for the problematic behaviour
in the STREAMS code before activating the workaround.  ok djm@
2022-02-14 14:19:40 +11:00
Darren Tucker 766176cfdb Add cygwin-release test config.
This tests the flags used to build the cygwin release binaries.
2022-02-12 10:24:56 +11:00
Darren Tucker b30698662b Move SSHD_ACQUIRES_CTTY workaround into compat.
On some (most? all?) SysV based systems with STREAMS based ptys,
sshd could acquire a controlling terminal during pty setup when
it pushed the "ptem" module, due to what is probably a bug in
the STREAMS driver that's old enough to vote.  Because it was the
privileged sshd's controlling terminal, it was not available for
the user's session, which ended up without one.  This is known to
affect at least Solaris <=10, derivatives such as OpenIndiana and
several other SysV systems.  See bz#245 for the backstory.

In the we past worked around that by not calling setsid in the
privileged sshd child, which meant it was not a session or process
group leader.  This solved controlling terminal problem because sshd
was not eligble to acquire one, but had other side effects such as
not cleaning up helper subprocesses in the SIGALRM handler since it
was not PG leader.  Recent cleanups in the signal handler uncovered
this, resulting in the LoginGraceTime timer not cleaning up privsep
unprivileged processes.

This change moves the workaround into the STREAMS pty allocation code,
by allocating a sacrificial pty to act as sshd's controlling terminal
before allocating user ptys, so those are still available for users'
sessions.

On the down side:
 - this will waste a pty per ssh connection on affected platforms.

On the up side:
 - it makes the process group behaviour consistent between platforms.

 - it puts the workaround nearest the code that actually causes the
   problem and competely out of the mainline code.

 - the workaround is only activated if you use the STREAMS code.  If,
   say, Solaris 11 has the bug but also a working openpty() it doesn't
   matter that we defined SSHD_ACQUIRES_CTTY.

 - the workaround is only activated when the fist pty is allocated,
   ie in the post-auth privsep monitor.  This means there's no risk
   of fd leaks to the unprivileged processes, and there's no effect on
   sessions that do not allocate a pty.

Based on analysis and work by djm@, ok djm@
2022-02-11 21:00:35 +11:00
Darren Tucker cd00b48cf1 Simplify handling of --with-ssl-dir.
ok djm@
2022-02-11 20:09:32 +11:00