12659 Commits

Author SHA1 Message Date
Tess Gauthier
67598092eb remove rdp debug from appveyor 2022-10-19 17:49:45 -04:00
Tess Gauthier
5742e1cd57 remove in place tests from scp.sh 2022-10-19 17:28:21 -04:00
Tess Gauthier
691218cd2d modify new scp.sh tests for windows 2022-10-19 16:16:17 -04:00
Tess Gauthier
2116c820ca add #ifdef SUPPORT_CRLF back into auth_check_principals_line method that was moved/renamed 2022-10-19 15:56:48 -04:00
Tess Gauthier
bbb76f5c67 increase debug of failing pester test 2022-10-19 14:22:39 -04:00
Tess Gauthier
a88ae8d841 appveyor.yml 2022-10-18 14:07:12 -04:00
Tess Gauthier
803e013b3b make key_lookup compatible with winhello 2022-10-18 14:04:50 -04:00
Darren Tucker
614252b05d
OpenSSL dev branch now identifies as 3.2.0. 2022-10-18 06:29:16 +11:00
Damien Miller
195e5a65fd
revert c64b62338b4 and guard POLL* defines instead
c64b62338b4 broke OSX builds, which do have poll.h but lack ppoll(2)
Spotted by dtucker
2022-10-17 09:41:47 +11:00
Damien Miller
bc2e480d99
undef _get{short,long} before redefining 2022-10-14 14:52:22 +11:00
Harmen Stoppels
5eb796a369
Fix snprintf configure test for clang 15
Clang 15 -Wimplicit-int defaults to an error in C99 mode and above.
A handful of tests have "main(..." and not "int main(..." which caused
the tests to produce incorrect results.
2022-10-14 07:37:16 +11:00
Tess Gauthier
ca9f04bd94 add ifdef to sftp-server.c 2022-10-13 15:51:05 -04:00
Tess Gauthier
0488165b5e remove rdp block from appveyor since we are no longer debugging 2022-10-13 12:57:31 -04:00
Tess Gauthier
302dc2f2b4 add windows preprocessor definition in key_lookup 2022-10-13 12:36:04 -04:00
Tess Gauthier
eb2f6238fb revert preprocessor definition for winhello 2022-10-13 12:35:46 -04:00
Tess Gauthier
0bde9952c7 add preprocessor for WinHello 2022-10-13 11:04:47 -04:00
Tess Gauthier
9b344f4466 add windows specific code back into method moved from auth.c to auth2-pubkeyfile.c 2022-10-12 11:55:55 -04:00
Tess Gauthier
5e2b081a49 modify -p tests to only run for Windows OS version 10 and above 2022-10-11 18:40:39 -04:00
Damien Miller
c64b62338b
skip bsd-poll.h if poll.h found; ok dtucker 2022-10-10 12:32:43 +11:00
Tess Gauthier
2653b08c59 remove extra sleep time from debugging scp pester tests 2022-10-07 12:45:46 -04:00
Tess Gauthier
47620db2c4
remove keys for upstream tests (#624) 2022-10-07 11:25:23 -04:00
djm@openbsd.org
5ee2b8ccfc
upstream: honour user's umask if it is more restrictive then the ssh
default (022); based on patch from Alex Henrie, ok dtucker@ deraadt@

OpenBSD-Commit-ID: fe1b9e15fc9a4f49fc338e848ce14d8727abe82d
2022-10-07 09:45:02 +11:00
Tess Gauthier
43bbf692c6 disable -p pester tests due to unreliability on older Windows versions 2022-10-06 15:47:12 -04:00
Tess Gauthier
3e3b110485 fix 9.1 compilation errors 2022-10-06 15:43:21 -04:00
Darren Tucker
a75cffc270
Add LibreSSL 3.6.0 to test suite.
While there, bump OpenSSL to latest 1.1.1q release.
2022-10-07 03:54:56 +11:00
Darren Tucker
fcc0f0c0e9
Add 9.1 branch to CI status page. 2022-10-06 21:18:16 +11:00
Darren Tucker
ef211eee63
Test commits to all branches of portable.
Only test OpenBSD upstream on commits to master since that's what it
tracks.
2022-10-05 06:31:48 +11:00
Damien Miller
fe646de03c
whitespace at EOL 2022-10-05 03:47:26 +11:00
Damien Miller
a6e1852d10
mention libfido2 autodetection 2022-10-05 03:40:01 +11:00
Damien Miller
7360c2c206
remove mention of --with-security-key-builtin
it is enabled by default when libfido2 is installed
2022-10-05 03:37:36 +11:00
Tess Gauthier
df96e7c7e2 attempt to fix merge conflicts 2022-10-04 12:19:24 -04:00
Damien Miller
0ffb46f2ee
update .depend 2022-10-04 01:51:42 +11:00
Damien Miller
657e676ff6
update release notes URL 2022-10-04 01:45:52 +11:00
Damien Miller
f059da2b29
crank versions in RPM spec files 2022-10-04 01:45:41 +11:00
djm@openbsd.org
b51f3f172d
upstream: openssh-9.1
OpenBSD-Commit-ID: 5a467b2ee81da01a86adf1ad93b62b1728494e56
2022-09-27 19:37:13 +10:00
dtucker@openbsd.org
4cf8d0c0f3
upstream: Fix typo. From AlexanderStohr via github PR#343.
OpenBSD-Commit-ID: a134c9b4039e48803fc6a87f955b0f4a03181497
2022-09-27 08:16:44 +10:00
djm@openbsd.org
8179fed326
upstream: add RequiredRSASize to the list of keywords accepted by
-o; spotted by jmc@

OpenBSD-Commit-ID: fe871408cf6f9d3699afeda876f8adbac86a035e
2022-09-27 08:16:44 +10:00
Tess Gauthier
d215e7333f add sleep to pester test 2022-09-21 13:09:53 -04:00
Tess Gauthier
bb847f99bc add debug on appveyor 2022-09-20 13:40:48 -04:00
Damien Miller
5f954929e9
no need for glob.h here
it also causes portability problems
2022-09-19 20:59:34 +10:00
Damien Miller
03d94a4720
avoid Wuninitialized false positive in gcc-12ish 2022-09-19 20:59:04 +10:00
djm@openbsd.org
9d95252911
upstream: use users-groups-by-id@openssh.com sftp-server extension
(when available) to fill in user/group names for directory listings.
Implement a client-side cache of see uid/gid=>user/group names. ok markus@

OpenBSD-Commit-ID: f239aeeadfa925a37ceee36ee8b256b8ccf4466e
2022-09-19 20:51:14 +10:00
djm@openbsd.org
8ff680368b
upstream: sftp client library support for
users-groups-by-id@openssh.com; ok markus@

OpenBSD-Commit-ID: ddb2f33a2da6349a9a89a8b5bcb9ca7c999394de
2022-09-19 20:49:14 +10:00
djm@openbsd.org
488f6e1c58
upstream: extend sftp-common.c:extend ls_file() to support supplied
user/group names; ok markus@

OpenBSD-Commit-ID: c70c70498b1fdcf158531117e405b6245863bfb0
2022-09-19 20:49:13 +10:00
djm@openbsd.org
74b77f7497
upstream: sftp-server(8): add a "users-groups-by-id@openssh.com"
extension request that allows the client to obtain user/group names that
correspond to a set of uids/gids.

Will be used to make directory listings more useful and consistent
in sftp(1).

ok markus@

OpenBSD-Commit-ID: 7ebabde0bcb95ef949c4840fe89e697e30df47d3
2022-09-19 20:49:13 +10:00
djm@openbsd.org
231a346c0c
upstream: better debugging for connect_next()
OpenBSD-Commit-ID: d16a307a0711499c971807f324484ed3a6036640
2022-09-19 19:25:14 +10:00
djm@openbsd.org
1875042c52
upstream: Add RequiredRSASize for sshd(8); RSA keys that fall
beneath this limit will be ignored for user and host-based authentication.

Feedback deraadt@ ok markus@

OpenBSD-Commit-ID: 187931dfc19d51873df5930a04f2d972adf1f7f1
2022-09-17 20:39:02 +10:00
djm@openbsd.org
54b333d12e
upstream: add a RequiredRSASize for checking RSA key length in
ssh(1). User authentication keys that fall beneath this limit will be
ignored. If a host presents a host key beneath this limit then the connection
will be terminated (unfortunately there are no fallbacks in the protocol for
host authentication).

feedback deraadt, Dmitry Belyavskiy; ok markus@

OpenBSD-Commit-ID: 430e339b2a79fa9ecc63f2837b06fdd88a7da13a
2022-09-17 20:39:02 +10:00
djm@openbsd.org
07d8771bac
upstream: Add a sshkey_check_rsa_length() call for checking the
length of an RSA key; ok markus@

OpenBSD-Commit-ID: de77cd5b11594297eda82edc594b0d32b8535134
2022-09-17 20:38:40 +10:00
djm@openbsd.org
3991a0cf94
upstream: actually hook up restrict_websafe; the command-line flag
was never actually used. Spotted by Matthew Garrett

OpenBSD-Commit-ID: 0b363518ac4c2819dbaa3dfad4028633ab9cdff1
2022-09-17 20:37:20 +10:00