bagajjal
921aafc728
fix for #561 and code cleanup ( #151 )
...
https://github.com/PowerShell/Win32-OpenSSH/issues/561
2017-05-25 12:41:44 -07:00
Manoj Ampalam
4df71693c2
Fix agent to recognize calls from sshd service ( #149 )
...
https://github.com/PowerShell/Win32-OpenSSH/issues/734
2017-05-24 21:52:20 -07:00
Manoj Ampalam
2060a413d5
updated .gitignore to ignore LibreSSL
2017-05-23 22:02:34 -07:00
Yanbing
81bcaaa7cf
Add mode support in open() and onboard file perm related changes and tests ( #145 )
...
PowerShell/Win32-OpenSSH#710
PowerShell/Win32-OpenSSH#725
PowerShell/Win32-OpenSSH#729
PowerShell/Win32-OpenSSH#731
PowerShell/Win32-OpenSSH#732
2017-05-23 21:45:38 -07:00
Markus Kuhn
a4250afadc
strip drive letter from %HOMEPATH% ( #103 )
...
Many programs access the user's home directory as %HOMEDRIVE%%HOMEPATH%.
Without removing the drive letter from %HOMEPATH%, the result of this
concatenation is something like "C:C:\Users\mgkuhn" and results
in applications not finding the home directory.
After this change, OpenSSH will set %HOMEPATH% without a drive letter,
like Windows does, as documented at
https://support.microsoft.com/en-us/help/101507/how-windows-nt-determines-a-user-s-home-directory
I also added a safety check to test that pw_dir_w is not empty.
2017-05-23 12:04:23 -07:00
bagajjal
e296463fc8
Add new unit testcases ( #139 )
...
PowerShell/Win32-OpenSSH#605
PowerShell/Win32-OpenSSH#602
PowerShell/Win32-OpenSSH#603
2017-05-22 22:50:51 -07:00
bagajjal
4dbee0d15a
Onboard sshkeyscan ( #143 )
...
PowerShell/Win32-OpenSSH#124
PowerShell/Win32-OpenSSH#728
2017-05-22 22:18:41 -07:00
Manoj Ampalam
ba7cf86417
Merge branch 'master' of https://github.com/openssh/openssh-portable into latestw
2017-05-19 23:08:42 -07:00
Manoj Ampalam
894f6dd79c
Changes to remove Impersonation Privilege requirement in sshd ( #142 )
...
https://github.com/PowerShell/Win32-OpenSSH/issues/726
2017-05-18 22:57:42 -07:00
Yanbing
afc6ca91f7
Fixes for #648 and #718
...
PowerShell/Win32-OpenSSH#648
PowerShell/Win32-OpenSSH#718
2017-05-18 12:15:18 -07:00
djm@openbsd.org
54cd41a466
upstream commit
...
allow LogLevel in sshd_config Match blocks; ok dtucker
bz#2717
Upstream-ID: 662e303be63148f47db1aa78ab81c5c2e732baa8
2017-05-17 11:25:22 +10:00
djm@openbsd.org
277abcda3f
upstream commit
...
remove duplicate check; spotted by Jakub Jelen
Upstream-ID: 30c2996c1767616a8fdc49d4cee088efac69c3b0
2017-05-17 11:25:22 +10:00
djm@openbsd.org
adb47ce839
upstream commit
...
mention that Ed25519 keys are valid as CA keys; spotted
by Jakub Jelen
Upstream-ID: d3f6db58b30418cb1c3058211b893a1ffed3dfd4
2017-05-17 11:25:22 +10:00
Yanbing
79662b9a6f
Suspended File permissions logic, cranked version.
2017-05-15 22:08:01 -07:00
Manoj Ampalam
b4a38796b9
Fixed ssh client title
...
https://github.com/PowerShell/Win32-OpenSSH/issues/722
2017-05-15 11:25:41 -07:00
Manoj Ampalam
742bf63d1a
E2E test updates
...
Updated README for test case indexing guidelines, added ssh_config and updated existing test cases
2017-05-12 14:09:50 -07:00
Manoj Ampalam
17efb12f6f
ssh client E2E tests ( #138 )
...
https://github.com/PowerShell/Win32-OpenSSH/issues/619
PowerShell/Win32-OpenSSH#623
* C2
* C3
* C4
* C5
2017-05-12 10:31:59 -07:00
Manoj Ampalam
9c0031de34
E2E tests for ssh key management
...
PowerShell/Win32-OpenSSH#613
2017-05-10 14:47:03 -07:00
Clouds
77cdb7086d
Fix RegEnumValueW returned 234 ( #131 )
...
RegEnumValueW may return ERROR_MORE_DATA (234).
If lpData is NULL and lpcbData is non-NULL, the function stores the size of the data, in bytes, in the variable pointed to by lpcbData. This enables an application to determine the best way to allocate a buffer for the data.
If the buffer specified by lpData is not large enough to hold the data, the function returns ERROR_MORE_DATA and stores the required buffer size in the variable pointed to by lpcbData. In this case, the contents of lpData are undefined.
2017-05-09 22:00:32 -07:00
Manoj Ampalam
9491729542
Revert recent change and run sshd back in service account ( #134 )
...
https://github.com/PowerShell/Win32-OpenSSH/issues/681
2017-05-09 21:46:46 -07:00
Damien Miller
6bdf70f01e
clean up regress files and add a .gitignore
2017-05-09 18:41:54 -07:00
djm@openbsd.org
7bdb2eeb1d
upstream commit
...
remove hmac-ripemd160; ok dtucker
Upstream-ID: 896e737ea0bad6e23327d1c127e02d5e9e9c654d
2017-05-10 11:41:21 +10:00
djm@openbsd.org
5f02bb1f99
upstream commit
...
make requesting bad ECDSA bits yield the same error
(SSH_ERR_KEY_LENGTH) as the same mistake for RSA/DSA
Upstream-ID: bf40d3fee567c271e33f05ef8e4e0fa0b6f0ece6
2017-05-10 11:40:18 +10:00
bagajjal
0fe590b192
multiple fixes ( #132 )
...
PowerShell/Win32-OpenSSH#715
PowerShell/Win32-OpenSSH#714
2017-05-09 14:08:22 -07:00
djm@openbsd.org
d757a4b633
upstream commit
...
fix for new SSH_ERR_KEY_LENGTH error value
Upstream-Regress-ID: c38a6e6174d4c3feca3518df150d4fbae0dca8dc
2017-05-08 16:11:26 +10:00
djm@openbsd.org
2e58a69508
upstream commit
...
helps if I commit the correct version of the file. fix
missing return statement.
Upstream-ID: c86394a3beeb1ec6611e659bfa830254f325546c
2017-05-08 16:09:20 +10:00
bagajjal
7d929c2954
Fix sshd logging ( #128 )
...
PowerShell/Win32-OpenSSH#709
https://github.com/PowerShell/Win32-OpenSSH/issues/708
2017-05-07 22:51:24 -07:00
djm@openbsd.org
effaf526bf
upstream commit
...
remove arcfour, blowfish and CAST here too
Upstream-Regress-ID: c613b3bcbef75df1fe84ca4dc2d3ef253dc5e920
2017-05-08 11:54:17 +10:00
djm@openbsd.org
7461a5bc57
upstream commit
...
I was too aggressive with the scalpel in the last commit;
unbreak sshd, spotted quickly by naddy@
Upstream-ID: fb7e75d2b2c7e6ca57dee00ca645e322dd49adbf
2017-05-08 10:23:17 +10:00
djm@openbsd.org
bd636f4091
upstream commit
...
Refuse RSA keys <1024 bits in length. Improve reporting
for keys that do not meet this requirement. ok markus@
Upstream-ID: b385e2a7b13b1484792ee681daaf79e1e203df6c
2017-05-08 09:21:22 +10:00
djm@openbsd.org
70c1218fc4
upstream commit
...
Don't offer CBC ciphers by default in the client. ok
markus@
Upstream-ID: 94c9ce8d0d1a085052e11c7f3307950fdc0901ef
2017-05-08 09:21:11 +10:00
djm@openbsd.org
acaf34fd82
upstream commit
...
As promised in last release announcement: remove
support for Blowfish, RC4 and CAST ciphers. ok markus@ deraadt@
Upstream-ID: 21f8facdba3fd8da248df6417000867cec6ba222
2017-05-08 09:21:00 +10:00
naddy@openbsd.org
3e371bd212
upstream commit
...
more simplification and removal of SSHv1-related code;
ok djm@
Upstream-ID: d2f041aa0b79c0ebd98c68a01e5a0bfab2cf3b55
2017-05-08 09:18:27 +10:00
naddy@openbsd.org
2e9c324b3a
upstream commit
...
remove superfluous protocol 2 mentions; ok jmc@
Upstream-ID: 0aaf7567c9f2e50fac5906b6a500a39c33c4664d
2017-05-08 09:18:27 +10:00
djm@openbsd.org
744bde79c3
upstream commit
...
since a couple of people have asked, leave a comment
explaining why we retain SSH v.1 support in the "delete all keys from agent"
path.
Upstream-ID: 4b42dcfa339813c15fe9248a2c1b7ed41c21bbb4
2017-05-08 09:18:27 +10:00
djm@openbsd.org
0c378ff6d9
upstream commit
...
another tentacle: cipher_set_key_string() was only ever
used for SSHv1
Upstream-ID: 7fd31eb6c48946f7e7cc12af0699fe8eb637e94a
2017-05-08 09:18:27 +10:00
naddy@openbsd.org
9a82e24b98
upstream commit
...
restore mistakenly deleted description of the
ConnectionAttempts option ok markus@
Upstream-ID: 943002b1b7c470caea3253ba7b7348c359de0348
2017-05-08 09:18:27 +10:00
naddy@openbsd.org
768405fddf
upstream commit
...
remove miscellaneous SSH1 leftovers; ok markus@
Upstream-ID: af23696022ae4d45a1abc2fb8b490d8d9dd63b7c
2017-05-08 09:18:27 +10:00
jmc@openbsd.org
1a1b24f822
upstream commit
...
more protocol 1 bits removed; ok djm
Upstream-ID: b5b977eaf756915acb56aef3604a650e27f7c2b9
2017-05-08 09:18:05 +10:00
jmc@openbsd.org
2b6f799e9b
upstream commit
...
more protocol 1 stuff to go; ok djm
Upstream-ID: 307a30441d2edda480fd1661d998d36665671e47
2017-05-08 09:18:05 +10:00
jmc@openbsd.org
f10c0d32cd
upstream commit
...
rsa1 is no longer valid;
Upstream-ID: 9953d09ed9841c44b7dcf7019fa874783a709d89
2017-05-08 09:18:05 +10:00
jmc@openbsd.org
42b690b4fd
upstream commit
...
add PubKeyAcceptedKeyTypes to the -o list: scp(1) has
it, so i guess this should too;
Upstream-ID: 7fab32e869ca5831d09ab0c40d210b461d527a2c
2017-05-08 09:18:04 +10:00
jmc@openbsd.org
d852603214
upstream commit
...
remove now obsolete protocol1 options from the -o
lists;
Upstream-ID: 828e478a440bc5f9947672c392420510a362b3dd
2017-05-08 09:18:04 +10:00
jmc@openbsd.org
8b60ce8d81
upstream commit
...
more -O shuffle; ok djm
Upstream-ID: c239991a3a025cdbb030b73e990188dd9bfbeceb
2017-05-08 09:18:04 +10:00
djm@openbsd.org
3575f0b12a
upstream commit
...
remove -1 / -2 options; pointed out by jmc@
Upstream-ID: 65d2a816000741a95df1c7cfdb5fa8469fcc7daa
2017-05-08 09:18:04 +10:00
jmc@openbsd.org
4f1ca823ba
upstream commit
...
remove options -12 from usage();
Upstream-ID: db7ceef25132e63b50ed05289bf447fece1d1270
2017-05-08 09:18:04 +10:00
jmc@openbsd.org
6b84897f7f
upstream commit
...
tidy up -O somewhat; ok djm
Upstream-ID: 804405f716bf7ef15c1f36ab48581ca16aeb4d52
2017-05-08 09:18:04 +10:00
Yanbing
fae64876f3
cranck version
2017-05-04 11:39:00 -07:00
Yanbing
ba4ee6f3de
Fixed bug in Administrators group lookup logic
2017-05-04 11:38:03 -07:00
djm@openbsd.org
d1c6b7fdbd
upstream commit
...
when freeing a bitmap, zero all it bytes; spotted by Ilya
Kaliman
Upstream-ID: 834ac024f2c82389d6ea6b1c7d6701b3836e28e4
2017-05-02 13:39:36 +10:00