Damien Miller
6434cb2cfb
- (djm) [sandbox-seccomp-filter.c] Not all Linux architectures define
...
__NR_shutdown; some go via the socketcall(2) multiplexer.
2014-02-06 11:17:50 +11:00
Darren Tucker
8d36f9ac71
- (dtucker) [openbsd-compat/bsd-poll.c] Don't bother checking for non-NULL
...
before freeing since free(NULL) is a no-op. ok djm.
2014-02-06 10:44:13 +11:00
Damien Miller
a0959da368
- (djm) [sandbox-capsicum.c] Don't fatal if Capsicum is offered by
...
headers/libc but not supported by the kernel. Patch from Loganaden
Velvindron @ AfriNIC
2014-02-05 10:33:45 +11:00
Damien Miller
9c449bc183
- (djm) [regress/setuid-allowed.c] Missing string.h for strerror()
2014-02-04 11:38:28 +11:00
Damien Miller
bf7e0f03be
- (djm) [openbsd-compat/Makefile.in] Add missing explicit_bzero.o
2014-02-04 11:37:50 +11:00
Damien Miller
eb6d870a0e
- djm@cvs.openbsd.org 2014/02/04 00:24:29
...
[ssh.c]
delay lowercasing of hostname until right before hostname
canonicalisation to unbreak case-sensitive matching of ssh_config;
reported by Ike Devolder; ok markus@
2014-02-04 11:26:34 +11:00
Damien Miller
db3c595ea7
- djm@cvs.openbsd.org 2014/02/02 03:44:31
...
[digest-libc.c digest-openssl.c]
convert memset of potentially-private data to explicit_bzero()
2014-02-04 11:25:45 +11:00
Damien Miller
aae07e2e20
- djm@cvs.openbsd.org 2014/02/03 23:28:00
...
[ssh-ecdsa.c]
fix memory leak; ECDSA_SIG_new() allocates 'r' and 's' for us, unlike
DSA_SIG_new. Reported by Batz Spear; ok markus@
2014-02-04 11:20:40 +11:00
Damien Miller
a5103f413b
- djm@cvs.openbsd.org 2014/02/02 03:44:32
...
[auth1.c auth2-chall.c auth2-passwd.c authfile.c bufaux.c bufbn.c]
[buffer.c cipher-3des1.c cipher.c clientloop.c gss-serv.c kex.c]
[kexdhc.c kexdhs.c kexecdhc.c kexgexc.c kexecdhs.c kexgexs.c key.c]
[monitor.c monitor_wrap.c packet.c readpass.c rsa.c serverloop.c]
[ssh-add.c ssh-agent.c ssh-dss.c ssh-ecdsa.c ssh-ed25519.c]
[ssh-keygen.c ssh-rsa.c sshconnect.c sshconnect1.c sshconnect2.c]
[sshd.c]
convert memset of potentially-private data to explicit_bzero()
2014-02-04 11:20:14 +11:00
Damien Miller
1d2c456426
- tedu@cvs.openbsd.org 2014/01/31 16:39:19
...
[auth2-chall.c authfd.c authfile.c bufaux.c bufec.c canohost.c]
[channels.c cipher-chachapoly.c clientloop.c configure.ac hostfile.c]
[kexc25519.c krl.c monitor.c sandbox-systrace.c session.c]
[sftp-client.c ssh-keygen.c ssh.c sshconnect2.c sshd.c sshlogin.c]
[openbsd-compat/explicit_bzero.c openbsd-compat/openbsd-compat.h]
replace most bzero with explicit_bzero, except a few that cna be memset
ok djm dtucker
2014-02-04 11:18:20 +11:00
Damien Miller
3928de067c
- djm@cvs.openbsd.org 2014/01/30 22:26:14
...
[sandbox-systrace.c]
allow shutdown(2) syscall in sandbox - it may be called by packet_close()
from portable
(Id sync only; change is already in portable)
2014-02-04 11:13:54 +11:00
Damien Miller
e1e480aee8
- jmc@cvs.openbsd.org 2014/01/29 14:04:51
...
[sshd_config.5]
document kbdinteractiveauthentication;
requested From: Ross L Richardson
dtucker/markus helped explain its workings;
2014-02-04 11:13:17 +11:00
Damien Miller
7cc194f70d
- djm@cvs.openbsd.org 2014/01/29 06:18:35
...
[Makefile.in auth.h auth2-jpake.c auth2.c jpake.c jpake.h monitor.c]
[monitor.h monitor_wrap.c monitor_wrap.h readconf.c readconf.h]
[schnorr.c schnorr.h servconf.c servconf.h ssh2.h sshconnect2.c]
remove experimental, never-enabled JPAKE code; ok markus@
2014-02-04 11:12:56 +11:00
Damien Miller
b0f26544cf
- djm@cvs.openbsd.org 2014/01/29 00:19:26
...
[sshd.c]
use kill(0, ...) instead of killpg(0, ...); on most operating systems
they are equivalent, but SUSv2 describes the latter as having undefined
behaviour; from portable; ok dtucker
(Id sync only; change is already in portable)
2014-02-04 11:10:01 +11:00
Damien Miller
f8f35bc471
- jmc@cvs.openbsd.org 2014/01/28 14:13:39
...
[ssh-keyscan.1]
kill some bad Pa;
From: Jan Stary
2014-02-04 11:09:12 +11:00
Damien Miller
ec93d15170
- markus@cvs.openbsd.org 2014/01/27 20:13:46
...
[digest.c digest-openssl.c digest-libc.c Makefile.in]
rename digest.c to digest-openssl.c and add libc variant; ok djm@
2014-02-04 11:07:13 +11:00
Damien Miller
4a1c7aa640
- markus@cvs.openbsd.org 2014/01/27 19:18:54
...
[auth-rsa.c cipher.c ssh-agent.c sshconnect1.c sshd.c]
replace openssl MD5 with our ssh_digest_*; ok djm@
2014-02-04 11:03:36 +11:00
Damien Miller
4e8d937af7
- markus@cvs.openbsd.org 2014/01/27 18:58:14
...
[Makefile.in digest.c digest.h hostfile.c kex.h mac.c hmac.c hmac.h]
replace openssl HMAC with an implementation based on our ssh_digest_*
ok and feedback djm@
2014-02-04 11:02:42 +11:00
Tim Rice
69d0d09f76
- (tim) [Makefile.in] build regress/setuid-allow.
2014-01-31 14:25:18 -08:00
Darren Tucker
0eeafcd76b
- (dtucker) [readconf.c] Include <arpa/inet.h> for the hton macros. Fixes
...
build with HP-UX's compiler. Patch from Kevin Brott.
2014-01-31 14:18:51 +11:00
Damien Miller
7e5cec6070
- (djm) [sandbox-seccomp-filter.c sandbox-systrace.c] Allow shutdown(2)
...
syscall from sandboxes; it may be called by packet_close.
2014-01-31 09:25:34 +11:00
Damien Miller
cdb6c90811
- (djm) Release openssh-6.5p1
2014-01-30 12:50:17 +11:00
Damien Miller
996ea80b18
trim entries prior to openssh-6.0p1
2014-01-30 12:49:55 +11:00
Damien Miller
f5bbd3b657
- (djm) [configure.ac atomicio.c] Kludge around NetBSD offering
...
different symbols for 'read' when various compiler flags are
in use, causing atomicio.c comparisons against it to break and
read/write operations to hang; ok dtucker
2014-01-30 11:26:46 +11:00
Damien Miller
c2868192dd
- (djm) [configure.ac] Only check for width-specified integer types
...
in headers that actually exist. patch from Tom G. Christensen;
ok dtucker@
2014-01-30 10:21:19 +11:00
Damien Miller
c161fc90fc
- (djm) [configure.ac] Fix broken shell test '==' vs '='; patch from
...
Tom G. Christensen
2014-01-29 21:01:33 +11:00
Tim Rice
6f917ad376
- (tim) [regress/agent.sh regress/agent-ptrace.sh] Assign $? to a variable
...
when used as an error message inside an if statement so we display the
correct into. agent.sh patch from Petr Lautrbach.
2014-01-28 10:26:25 -08:00
Damien Miller
ab16ef4152
- (djm) [sshd.c] Use kill(0, ...) instead of killpg(0, ...); the
...
latter being specified to have undefined behaviour in SUSv3;
ok dtucker
2014-01-28 15:08:12 +11:00
Damien Miller
ab03949058
- (djm) [configure.ac] Search for inet_ntop in libnsl and libresovl;
...
ok dtucker
2014-01-28 15:07:10 +11:00
Darren Tucker
4ab20a82d4
- (dtucker) [Makefile.in] Remove trailing backslash which some make
...
implementations (eg older Solaris) do not cope with.
2014-01-27 17:35:04 +11:00
Darren Tucker
e7e8b3cfe9
Welcome to 2014
2014-01-27 17:32:50 +11:00
Damien Miller
5b447c0aac
- (djm) [configure.ac] correct AC_DEFINE for previous.
2014-01-26 09:46:53 +11:00
Damien Miller
2035b2236d
- (djm) [configure.ac sandbox-capsicum.c sandbox-rlimit.c] Disable
...
RLIMIT_NOFILE pseudo-sandbox on FreeBSD. In some configurations,
libc will attempt to open additional file descriptors for crypto
offload and crash if they cannot be opened.
2014-01-26 09:39:53 +11:00
Damien Miller
a92ac74104
- markus@cvs.openbsd.org 2014/01/25 20:35:37
...
[kex.c]
dh_need needs to be set to max(seclen, blocksize, ivlen, mac_len)
ok dtucker@, noted by mancha
2014-01-26 09:38:03 +11:00
Damien Miller
76eea4ab4e
- dtucker@cvs.openbsd.org 2014/01/25 10:12:50
...
[cipher.c cipher.h kex.c kex.h kexgexc.c]
Add a special case for the DH group size for 3des-cbc, which has an
effective strength much lower than the key size. This causes problems
with some cryptlib implementations, which don't support group sizes larger
than 4k but also don't use the largest group size it does support as
specified in the RFC. Based on a patch from Petr Lautrbach at Redhat,
reduced by me with input from Markus. ok djm@ markus@
2014-01-26 09:37:25 +11:00
Damien Miller
603b8f47f1
- (djm) [configure.ac] autoconf sets finds to 'yes' not '1', so test
...
against the correct thing.
2014-01-25 13:16:59 +11:00
Damien Miller
c96d85376d
- (djm) [configure.ac] Do not attempt to use capsicum sandbox unless
...
sys/capability.h exists and cap_rights_limit is in libc. Fixes
build on FreeBSD9x which provides the header but not the libc
support.
2014-01-25 13:12:28 +11:00
Damien Miller
f62ecef993
- (djm) [configure.ac] Fix detection of capsicum sandbox on FreeBSD
2014-01-25 12:34:38 +11:00
Damien Miller
b0e0f760b8
- (djm) [Makefile.in regress/scp-ssh-wrapper.sh regress/scp.sh] Make
...
the scp regress test actually test the built scp rather than the one
in $PATH. ok dtucker@
2014-01-24 14:27:04 +11:00
Darren Tucker
42a0925301
- (dtucker) [configure.ac] NetBSD's (and FreeBSD's) strnvis is gratuitously
...
incompatible with OpenBSD's despite post-dating it by more than a decade.
Declare it as broken, and document FreeBSD's as the same. ok djm@
2014-01-23 23:14:39 +11:00
Tim Rice
617da33c20
- (tim) [session.c] Improve error reporting on set_id().
2014-01-22 19:16:10 -08:00
Damien Miller
5c2ff5e31f
- (djm) [configure.ac aclocal.m4] More tests to detect fallout from
...
platform hardening options: include some long long int arithmatic
to detect missing support functions for -ftrapv in libgcc and
equivalents, actually test linking when -ftrapv is supplied and
set either both -pie/-fPIE or neither. feedback and ok dtucker@
2014-01-22 21:30:12 +11:00
Damien Miller
852472a54b
- (djm) [configure.ac] Unless specifically requested, only attempt
...
to build Position Independent Executables on gcc >= 4.x; ok dtucker
2014-01-22 16:31:18 +11:00
Damien Miller
ee87838786
- (djm) [openbsd-compat/setproctitle.c] Don't fail to compile if a
...
platform that is expected to use the reuse-argv style setproctitle
hack surprises us by providing a setproctitle in libc; ok dtucker
2014-01-22 16:30:15 +11:00
Damien Miller
5c96a154c7
- (djm) [aclocal.m4] Flesh out the code run in the OSSH_CHECK_CFLAG_COMPILE
...
and OSSH_CHECK_LDFLAG_LINK tests to give them a better chance of
detecting toolchain-related problems; ok dtucker
2014-01-21 13:10:26 +11:00
Tim Rice
9464ba6fb3
- (tim) [platform.c session.c] Fix bug affecting SVR5 platforms introduced
...
with sftp chroot support. Move set_id call after chroot.
2014-01-20 17:59:28 -08:00
Darren Tucker
a6d573caa1
- (dtucker) [aclocal.m4] Differentiate between compile-time and link-time
...
tests in the configure output. ok djm.
2014-01-21 12:50:46 +11:00
Darren Tucker
096118dc73
- (dtucker) [configure.ac] Make PIE a configure-time option which defaults
...
to on platforms where it's known to be reliably detected and off elsewhere.
Works around platforms such as FreeBSD 9.1 where it does not interop with
-ftrapv (it seems to work but fails when trying to link ssh). ok djm@
2014-01-21 12:48:51 +11:00
Damien Miller
f9df7f6f47
- (djm) [regress/cert-hostkey.sh] Fix regress failure on platforms that
...
skip one or more key types (e.g. RHEL/CentOS 6.5); ok dtucker@
2014-01-20 20:07:15 +11:00
Darren Tucker
c74e70eb52
- (dtucker) [gss-serv-krb5.c] Fall back to krb5_cc_gen_new if the Kerberos
...
implementation does not have krb5_cc_new_unique, similar to what we do
in auth-krb5.c.
2014-01-20 13:18:09 +11:00
Damien Miller
3510979e83
- djm@cvs.openbsd.org 2014/01/20 00:08:48
...
[digest.c]
memleak; found by Loganaden Velvindron @ AfriNIC; ok markus@
2014-01-20 12:41:53 +11:00
Darren Tucker
7eee358d7a
- dtucker@cvs.openbsd.org 2014/01/19 11:21:51
...
[addrmatch.c]
Cast the sizeof to socklen_t so it'll work even if the supplied len is
negative. Suggested by and ok djm, ok deraadt.
2014-01-19 22:37:02 +11:00
Darren Tucker
b7e01c09b5
- djm@cvs.openbsd.org 2014/01/19 04:48:08
...
[ssh_config.5]
fix inverted meaning of 'no' and 'yes' for CanonicalizeFallbackLocal
2014-01-19 22:36:13 +11:00
Darren Tucker
7b1ded04ad
- dtucker@cvs.openbsd.org 2014/01/19 04:17:29
...
[canohost.c addrmatch.c]
Cast socklen_t when comparing to size_t and use socklen_t to iterate over
the ip options, both to prevent signed/unsigned comparison warnings.
Patch from vinschen at redhat via portable openssh, begrudging ok deraadt.
2014-01-19 15:30:02 +11:00
Darren Tucker
293ee3c9f0
- dtucker@cvs.openbsd.org 2014/01/18 09:36:26
...
[session.c]
explicitly define USE_PIPES to 1 to prevent redefinition warnings in
portable on platforms that use pipes for everything. From redhat @
redhat.
2014-01-19 15:28:01 +11:00
Darren Tucker
2aca159d05
- dtucker@cvs.openbsd.org 2014/01/17 06:23:24
...
[sftp-server.c]
fix log message statvfs. ok djm
2014-01-19 15:25:34 +11:00
Darren Tucker
841f7da89a
- (dtucker) [sandbox-capsicum.c] Correct some error messages and make the
...
return value check for cap_enter() consistent with the other uses in
FreeBSD. From by Loganaden Velvindron @ AfriNIC via bz#2140.
2014-01-18 22:12:15 +11:00
Darren Tucker
fdce373166
- (dtucker) [configure.ac] On Cygwin the getopt variables (like optargs,
...
optind) are defined in getopt.h already. Unfortunately they are defined as
"declspec(dllimport)" for historical reasons, because the GNU linker didn't
allow auto-import on PE/COFF targets way back when. The problem is the
dllexport attributes collide with the definitions in the various source
files in OpenSSH, which obviousy define the variables without
declspec(dllimport). The least intrusive way to get rid of these warnings
is to disable warnings for GCC compiler attributes when building on Cygwin.
Patch from vinschen at redhat.com.
2014-01-18 21:12:42 +11:00
Darren Tucker
1411c9263f
- (dtucker) [openbsd-compat/bsd-cygwin_util.h] Add missing function
...
declarations that stopped being included when we stopped including
<windows.h> from openbsd-compat/bsd-cygwin_util.h. Patch from vinschen at
redhat.com.
2014-01-18 21:03:59 +11:00
Darren Tucker
89c532d843
- (dtucker) [uidswap.c] Prevent unused variable warnings on Cygwin. Patch
...
from vinschen at redhat.com
2014-01-18 20:43:49 +11:00
Darren Tucker
355f861022
- (dtucker) [defines.h] Move our definitions of uintXX_t types down to after
...
they're defined if we have to define them ourselves. Fixes builds on old
AIX.
2014-01-18 00:12:38 +11:00
Darren Tucker
a3357661ee
- (dtucker) [readconf.c] Wrap paths.h inside an ifdef. Allows building on
...
Solaris.
2014-01-18 00:03:57 +11:00
Darren Tucker
9edcbff46f
- (dtucker) [configure.ac] Have --without-toolchain-hardening not turn off
...
stack-protector since that has a separate flag that's been around a while.
2014-01-17 21:54:32 +11:00
Darren Tucker
6d725687c4
- (dtucker) [configure.ac] Also look in inttypes.h for uintXX_t types.
2014-01-17 19:17:34 +11:00
Darren Tucker
5055699c7f
- (dtucker) [openbsd-compat/bsd-statvfs.h] Only start including headers if we
...
need them to cut down on the name collisions.
2014-01-17 18:48:22 +11:00
Darren Tucker
a5cf1e220d
- (dtucker) [configure.ac openbsd-compat/bsd-statvfs.c
...
openbsd-compat/bsd-statvfs.h] Implement enough of statvfs on top of statfs
to be useful (and for the regression tests to pass) on platforms that
have statfs and fstatfs. ok djm@
2014-01-17 18:10:58 +11:00
Darren Tucker
1357d71d7b
- (dtucker) Fix typo in #ifndef.
2014-01-17 18:00:40 +11:00
Darren Tucker
d23a91ffb2
- (dtucker) [configure.ac digest.c openbsd-compat/openssl-compat.c
...
openbsd-compat/openssl-compat.h] Add compatibility layer for older
openssl versions. ok djm@
2014-01-17 17:32:30 +11:00
Damien Miller
868ea1ea1c
- (djm) [Makefile.in configure.ac sandbox-capsicum.c sandbox-darwin.c]
...
[sandbox-null.c sandbox-rlimit.c sandbox-seccomp-filter.c]
[sandbox-systrace.c ssh-sandbox.h sshd.c] Support preauth sandboxing
using the Capsicum API introduced in FreeBSD 10. Patch by Dag-Erling
Smorgrav, updated by Loganaden Velvindron @ AfriNIC; ok dtucker@
2014-01-17 16:47:04 +11:00
Darren Tucker
a9d186a8b5
- dtucker@cvs.openbsd.org 2014/01/17 05:26:41
...
[digest.c]
remove unused includes. ok djm@
2014-01-17 16:30:49 +11:00
Darren Tucker
5f1c57a7a7
- djm@cvs.openbsd.org 2014/01/17 00:21:06
...
[sftp-client.c]
signed/unsigned comparison warning fix; from portable (Id sync only)
2014-01-17 16:29:45 +11:00
Darren Tucker
c548722361
- (dtucker) [configure.ac] Split AC_CHECK_FUNCS for OpenSSL functions into
...
separate lines and alphabetize for easier diffing of changes.
2014-01-17 15:12:16 +11:00
Darren Tucker
acad351a5b
- (dtucker) [defines.h] Add typedefs for uintXX_t types for platforms that
...
don't have them.
2014-01-17 14:20:05 +11:00
Darren Tucker
c3ed065ce8
- (dtucker) [openbsd-compat/bcrypt_pbkdf.c] Wrap stdlib.h include inside
...
#ifdef HAVE_STDINT_H.
2014-01-17 14:18:45 +11:00
Darren Tucker
f45f78ae43
- (dtucker) [blocks.c fe25519.c ge25519.c hash.c sc25519.c verify.c] Include
...
includes.h to pull in all of the compatibility stuff.
2014-01-17 12:43:43 +11:00
Darren Tucker
99df369d03
- (dtucker) [poly1305.c] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.
2014-01-17 12:42:17 +11:00
Darren Tucker
ac413b62ea
- (dtucker) [crypto_api.h] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.
2014-01-17 12:31:33 +11:00
Darren Tucker
1c4a011e9c
- (dtucker) [loginrec.c] Cast to the types specfied in the format
...
specification to prevent warnings.
2014-01-17 12:23:23 +11:00
Damien Miller
c3d483f9a8
- (djm) [sftp-client.c] signed/unsigned comparison fix
2014-01-17 11:20:26 +11:00
Darren Tucker
fd994379dd
- (dtucker) [aclocal.m4 configure.ac] Add some additional compiler/toolchain
...
hardening flags including -fstack-protector-strong. These default to on
if the toolchain supports them, but there is a configure-time knob
(--without-hardening) to disable them if necessary. ok djm@
2014-01-17 09:53:24 +11:00
Damien Miller
366224d217
- (djm) [README] update release notes URL.
2014-01-16 18:51:44 +11:00
Damien Miller
2ae77e64f8
- (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
...
[contrib/suse/openssh.spec] Crank RPM spec version numbers.
2014-01-16 18:51:07 +11:00
Damien Miller
0fa29e6d77
- djm@cvs.openbsd.org 2014/01/16 07:32:00
...
[version.h]
openssh-6.5
2014-01-16 18:42:31 +11:00
Damien Miller
52c371cd6d
- djm@cvs.openbsd.org 2014/01/16 07:31:09
...
[sftp-client.c]
needless and incorrect cast to size_t can break resumption of
large download; patch from tobias@
2014-01-16 18:42:10 +11:00
Damien Miller
91b580e4be
- djm@cvs.openbsd.org 2014/01/12 08:13:13
...
[bufaux.c buffer.h kex.c kex.h kexc25519.c kexc25519c.c kexc25519s.c]
[kexdhc.c kexdhs.c kexecdhc.c kexecdhs.c kexgexc.c kexgexs.c]
avoid use of OpenSSL BIGNUM type and functions for KEX with
Curve25519 by adding a buffer_put_bignum2_from_string() that stores
a string using the bignum encoding rules. Will make it easier to
build a reduced-feature OpenSSH without OpenSSL in the future;
ok markus@
2014-01-12 19:21:22 +11:00
Damien Miller
af5d4481f4
- djm@cvs.openbsd.org 2014/01/10 05:59:19
...
[sshd_config]
the /etc/ssh/ssh_host_ed25519_key is loaded by default too
2014-01-12 19:20:47 +11:00
Damien Miller
58cd63bc63
- djm@cvs.openbsd.org 2014/01/09 23:26:48
...
[sshconnect.c sshd.c]
ban clients/servers that suffer from SSH_BUG_DERIVEKEY, they are ancient,
deranged and might make some attacks on KEX easier; ok markus@
2014-01-10 10:59:24 +11:00
Damien Miller
b3051d01e5
- djm@cvs.openbsd.org 2014/01/09 23:20:00
...
[digest.c digest.h hostfile.c kex.c kex.h kexc25519.c kexc25519c.c]
[kexc25519s.c kexdh.c kexecdh.c kexecdhc.c kexecdhs.c kexgex.c kexgexc.c]
[kexgexs.c key.c key.h roaming_client.c roaming_common.c schnorr.c]
[schnorr.h ssh-dss.c ssh-ecdsa.c ssh-rsa.c sshconnect2.c]
Introduce digest API and use it to perform all hashing operations
rather than calling OpenSSL EVP_Digest* directly. Will make it easier
to build a reduced-feature OpenSSH without OpenSSL in future;
feedback, ok markus@
2014-01-10 10:58:53 +11:00
Damien Miller
e00e413dd1
- guenther@cvs.openbsd.org 2014/01/09 03:26:00
...
[sftp-common.c]
When formating the time for "ls -l"-style output, show dates in the future
with the year, and rearrange a comparison to avoid a potentional signed
arithmetic overflow that would give the wrong result.
ok djm@
2014-01-10 10:40:45 +11:00
Damien Miller
3e49853650
- tedu@cvs.openbsd.org 2014/01/04 17:50:55
...
[mac.c monitor_mm.c monitor_mm.h xmalloc.c]
use standard types and formats for size_t like variables. ok dtucker
2014-01-10 10:37:05 +11:00
Damien Miller
a9c1e500ef
- (djm) [regress/.cvsignore] Ignore regress test droppings; ok dtucker@
2014-01-08 16:13:12 +11:00
Damien Miller
324541e526
- djm@cvs.openbsd.org 2013/12/30 23:52:28
...
[auth2-hostbased.c auth2-pubkey.c compat.c compat.h ssh-rsa.c]
[sshconnect.c sshconnect2.c sshd.c]
refuse RSA keys from old proprietary clients/servers that use the
obsolete RSA+MD5 signature scheme. it will still be possible to connect
with these clients/servers but only DSA keys will be accepted, and we'll
deprecate them entirely in a future release. ok markus@
2013-12-31 12:25:40 +11:00
Damien Miller
9f4c8e797e
- (djm) [regress/Makefile] Add some generated files for cleaning
2013-12-29 17:57:46 +11:00
Damien Miller
106bf1ca3c
- djm@cvs.openbsd.org 2013/12/29 05:57:02
...
[sshconnect.c]
when showing other hostkeys, don't forget Ed25519 keys
2013-12-29 17:54:03 +11:00
Damien Miller
0fa47cfb32
- djm@cvs.openbsd.org 2013/12/29 05:42:16
...
[ssh.c]
don't forget to load Ed25519 certs too
2013-12-29 17:53:39 +11:00
Damien Miller
b9a95490da
- djm@cvs.openbsd.org 2013/12/29 04:35:50
...
[authfile.c]
don't refuse to load Ed25519 certificates
2013-12-29 17:50:15 +11:00
Damien Miller
f72cdde6e6
- djm@cvs.openbsd.org 2013/12/29 04:29:25
...
[authfd.c]
allow deletion of ed25519 keys from the agent
2013-12-29 17:49:55 +11:00
Damien Miller
29ace1cb68
- djm@cvs.openbsd.org 2013/12/29 04:20:04
...
[key.c]
to make sure we don't omit any key types as valid CA keys again,
factor the valid key type check into a key_type_is_valid_ca()
function
2013-12-29 17:49:31 +11:00
Damien Miller
9de4fcdc5a
- djm@cvs.openbsd.org 2013/12/29 02:49:52
...
[key.c]
correct comment for key_drop_cert()
2013-12-29 17:49:13 +11:00
Damien Miller
5baeacf8a8
- djm@cvs.openbsd.org 2013/12/29 02:37:04
...
[key.c]
correct comment for key_to_certified()
2013-12-29 17:48:55 +11:00
Damien Miller
83f2fe26cb
- djm@cvs.openbsd.org 2013/12/29 02:28:10
...
[key.c]
allow ed25519 keys to appear as certificate authorities
2013-12-29 17:48:38 +11:00
Damien Miller
06122e9a74
- djm@cvs.openbsd.org 2013/12/27 22:37:18
...
[ssh-rsa.c]
correct comment
2013-12-29 17:48:15 +11:00
Damien Miller
3e19295c3a
- djm@cvs.openbsd.org 2013/12/27 22:30:17
...
[ssh-dss.c ssh-ecdsa.c ssh-rsa.c]
make the original RSA and DSA signing/verification code look more like
the ECDSA/Ed25519 ones: use key_type_plain() when checking the key type
rather than tediously listing all variants, use __func__ for debug/
error messages
2013-12-29 17:47:50 +11:00
Damien Miller
137977180b
- tedu@cvs.openbsd.org 2013/12/21 07:10:47
...
[ssh-keygen.1]
small typo
2013-12-29 17:47:14 +11:00
Damien Miller
339a48fe7f
- djm@cvs.openbsd.org 2013/12/19 22:57:13
...
[poly1305.c poly1305.h]
use full name for author, with his permission
2013-12-29 17:46:49 +11:00
Damien Miller
0b36c83148
- djm@cvs.openbsd.org 2013/12/19 01:19:41
...
[ssh-agent.c]
bz#2186: don't crash (NULL deref) when deleting PKCS#11 keys from an agent
that has a mix of normal and PKCS#11 keys; fix from jay AT slushpupie.com;
ok dtucker
2013-12-29 17:45:51 +11:00
Damien Miller
4def184e9b
- djm@cvs.openbsd.org 2013/12/19 01:04:36
...
[channels.c]
bz#2147: fix multiple remote forwardings with dynamically assigned
listen ports. In the s->c message to open the channel we were sending
zero (the magic number to request a dynamic port) instead of the actual
listen port. The client therefore had no way of discriminating between
them.
Diagnosis and fix by ronf AT timeheart.net
2013-12-29 17:45:26 +11:00
Damien Miller
bf25d114e2
- djm@cvs.openbsd.org 2013/12/19 00:27:57
...
[auth-options.c]
simplify freeing of source-address certificate restriction
2013-12-29 17:44:56 +11:00
Damien Miller
bb3dafe702
- dtucker@cvs.openbsd.org 2013/12/19 00:19:12
...
[serverloop.c]
Cast client_alive_interval to u_int64_t before assinging to
max_time_milliseconds to avoid potential integer overflow in the timeout.
bz#2170, patch from Loganaden Velvindron, ok djm@
2013-12-29 17:44:29 +11:00
Damien Miller
ef275ead3d
- djm@cvs.openbsd.org 2013/12/19 00:10:30
...
[ssh-add.c]
skip requesting smartcard PIN when removing keys from agent; bz#2187
patch from jay AT slushpupie.com; ok dtucker
2013-12-29 17:44:07 +11:00
Damien Miller
7d97fd9a1c
- (djm) [loginrec.c] Check for username truncation when looking up lastlog
...
entries
2013-12-29 17:40:18 +11:00
Darren Tucker
77244afe3b
20131221
...
- (dtucker) [regress/keytype.sh] Actually test ecdsa key types.
2013-12-21 17:02:39 +11:00
Darren Tucker
53f8e784dc
- (dtucker) [auth-pam.c] bz#2163: check return value from pam_get_item().
...
Patch from Loganaden Velvindron.
2013-12-19 11:31:44 +11:00
Darren Tucker
1fcec9d4f2
- (dtucker) [configure.ac] bz#2178: Don't try to use BSM on Solaris versions
...
greater than 11 either rather than just 11. Patch from Tomas Kuthan.
2013-12-19 11:00:12 +11:00
Damien Miller
6674eb9683
- markus@cvs.openbsd.org 2013/12/17 10:36:38
...
[crypto_api.h]
I've assempled the header file by cut&pasting from generated headers
and the source files.
2013-12-18 17:50:39 +11:00
Damien Miller
d58a596442
- djm@cvs.openbsd.org 2013/12/15 21:42:35
...
[cipher-chachapoly.c]
add some comments and constify a constant
2013-12-18 17:50:13 +11:00
Damien Miller
059321d19a
- pascal@cvs.openbsd.org 2013/12/15 18:17:26
...
[ssh-add.c]
Make ssh-add also add .ssh/id_ed25519; fixes lie in manual page.
ok markus@
2013-12-18 17:49:48 +11:00
Damien Miller
155b5a5bf1
- markus@cvs.openbsd.org 2013/12/09 11:08:17
...
[crypto_api.h]
remove unused defines
2013-12-18 17:48:32 +11:00
Damien Miller
8a56dc2b6b
- markus@cvs.openbsd.org 2013/12/09 11:03:45
...
[blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]
[ge25519_base.data hash.c sc25519.c sc25519.h verify.c]
Add Authors for the public domain ed25519/nacl code.
see also http://nacl.cr.yp.to/features.html
All of the NaCl software is in the public domain.
and http://ed25519.cr.yp.to/software.html
The Ed25519 software is in the public domain.
2013-12-18 17:48:11 +11:00
Damien Miller
6575c3acf3
- dtucker@cvs.openbsd.org 2013/12/08 09:53:27
...
[sshd_config.5]
Use a literal for the default value of KEXAlgorithms. ok deraadt jmc
2013-12-18 17:47:02 +11:00
Damien Miller
8ba0ead698
- naddy@cvs.openbsd.org 2013/12/07 11:58:46
...
[ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8 ssh.1]
[ssh_config.5 sshd.8 sshd_config.5]
add missing mentions of ed25519; ok djm@
2013-12-18 17:46:27 +11:00
Damien Miller
4f752cf71c
- djm@cvs.openbsd.org 2013/12/07 08:08:26
...
[ssh-keygen.1]
document -a and -o wrt new key format
2013-12-18 17:45:35 +11:00
Damien Miller
6d6fcd14e2
- (djm) [Makefile.in regress/Makefile regress/agent-ptrace.sh]
...
[regress/setuid-allowed.c] Check that ssh-agent is not on a no-setuid
filesystem before running agent-ptrace.sh; ok dtucker
2013-12-08 15:53:28 +11:00
Damien Miller
7e6e42fb53
- (djm) [openbsd-compat/bsd-setres_id.c] Missing header; from Corinna
...
Vinschen
2013-12-08 08:23:08 +11:00
Damien Miller
da3ca351b4
- (djm) [Makefile.in] PATHSUBS and keygen bits for Ed25519; from
...
Loganaden Velvindron @ AfriNIC in bz#2179
2013-12-07 21:43:46 +11:00
Damien Miller
eb401585bb
- (djm) [regress/cert-hostkey.sh] Fix merge botch
2013-12-07 17:07:15 +11:00
Damien Miller
f54542af3a
- markus@cvs.openbsd.org 2013/12/06 13:52:46
...
[regress/Makefile regress/agent.sh regress/cert-hostkey.sh]
[regress/cert-userkey.sh regress/keytype.sh]
test ed25519 support; from djm@
2013-12-07 16:32:44 +11:00
Damien Miller
f104da263d
- (djm) [ed25519.c ssh-ed25519.c openbsd-compat/Makefile.in]
...
[openbsd-compat/bcrypt_pbkdf.c] Make ed25519/new key format compile on
Linux
2013-12-07 12:37:53 +11:00
Damien Miller
1ff130dac9
- [configure.ac openbsd-compat/Makefile.in openbsd-compat/bcrypt_pbkdf.c]
...
[openbsd-compat/blf.h openbsd-compat/blowfish.c]
[openbsd-compat/openbsd-compat.h] Start at supporting bcrypt_pbkdf in
portable.
2013-12-07 11:51:51 +11:00
Damien Miller
4260828a29
- [authfile.c] Conditionalise inclusion of util.h
2013-12-07 11:38:03 +11:00
Damien Miller
a913442bac
- [Makefile.in] Add ed25519 sources
2013-12-07 11:35:36 +11:00
Damien Miller
ca570a519c
- djm@cvs.openbsd.org 2013/12/07 00:19:15
...
[key.c]
set k->cert = NULL after freeing it
2013-12-07 11:29:09 +11:00
Damien Miller
3cccc0e155
- [blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]
...
[ge25519_base.data hash.c sc25519.c sc25519.h verify.c] Fix RCS idents
2013-12-07 11:27:47 +11:00
Damien Miller
a7827c11b3
- jmc@cvs.openbsd.org 2013/12/06 15:29:07
...
[sshd.8]
missing comma;
2013-12-07 11:24:30 +11:00
Damien Miller
5be9d9e3cb
- markus@cvs.openbsd.org 2013/12/06 13:39:49
...
[authfd.c authfile.c key.c key.h myproposal.h pathnames.h readconf.c]
[servconf.c ssh-agent.c ssh-keygen.c ssh-keyscan.1 ssh-keyscan.c]
[ssh-keysign.c ssh.c ssh_config.5 sshd.8 sshd.c verify.c ssh-ed25519.c]
[sc25519.h sc25519.c hash.c ge25519_base.data ge25519.h ge25519.c]
[fe25519.h fe25519.c ed25519.c crypto_api.h blocks.c]
support ed25519 keys (hostkeys and user identities) using the public
domain ed25519 reference code from SUPERCOP, see
http://ed25519.cr.yp.to/software.html
feedback, help & ok djm@
2013-12-07 11:24:01 +11:00
Damien Miller
bcd00abd84
- markus@cvs.openbsd.org 2013/12/06 13:34:54
...
[authfile.c authfile.h cipher.c cipher.h key.c packet.c ssh-agent.c]
[ssh-keygen.c PROTOCOL.key] new private key format, bcrypt as KDF by
default; details in PROTOCOL.key; feedback and lots help from djm;
ok djm@
2013-12-07 10:41:55 +11:00
Damien Miller
f0e9060d23
- markus@cvs.openbsd.org 2013/12/06 13:30:08
...
[authfd.c key.c key.h ssh-agent.c]
move private key (de)serialization to key.c; ok djm
2013-12-07 10:40:26 +11:00
Damien Miller
0f8536da23
- djm@cvs.openbsd.org 2013/12/06 03:40:51
...
[ssh-keygen.c]
remove duplicated character ('g') in getopt() string;
document the (few) remaining option characters so we don't have to
rummage next time.
2013-12-07 10:31:37 +11:00
Damien Miller
393920745f
- djm@cvs.openbsd.org 2013/12/05 22:59:45
...
[sftp-client.c]
fix memory leak in error path in do_readdir(); pointed out by
Loganaden Velvindron @ AfriNIC in bz#2163
2013-12-07 10:31:08 +11:00
Damien Miller
534b2ccade
- djm@cvs.openbsd.org 2013/12/05 01:16:41
...
[servconf.c servconf.h]
bz#2161 - fix AuthorizedKeysCommand inside a Match block and
rearrange things so the same error is harder to make next time;
with and ok dtucker@
2013-12-05 14:07:27 +11:00
Darren Tucker
8369c8e61a
- (dtucker) [configure.ac] bz#2173: use pkg-config --libs to include correct
...
-L location for libedit. Patch from Serge van den Boom.
2013-12-05 11:00:16 +11:00
Damien Miller
9275df3e0a
- djm@cvs.openbsd.org 2013/12/04 04:20:01
...
[sftp-client.c]
bz#2171: don't leak local_fd on error; from Loganaden Velvindron @
AfriNIC
2013-12-05 10:26:32 +11:00
Damien Miller
960f6a2b52
- djm@cvs.openbsd.org 2013/12/02 03:13:14
...
[cipher.c]
correct bzero of chacha20+poly1305 key context. bz#2177 from
Loganaden Velvindron @ AfriNIC
Also make it a memset for consistency with the rest of cipher.c
2013-12-05 10:26:14 +11:00
Damien Miller
f7e8a8796d
- djm@cvs.openbsd.org 2013/12/02 03:09:22
...
[key.c]
make key_to_blob() return a NULL blob on failure; part of
bz#2175 from Loganaden Velvindron @ AfriNIC
2013-12-05 10:25:51 +11:00
Damien Miller
f1e44ea9d9
- djm@cvs.openbsd.org 2013/12/02 02:56:17
...
[ssh-pkcs11-helper.c]
use-after-free; bz#2175 patch from Loganaden Velvindron @ AfriNIC
2013-12-05 10:23:21 +11:00
Damien Miller
114e540b15
- djm@cvs.openbsd.org 2013/12/02 02:50:27
...
[PROTOCOL.chacha20poly1305]
typo; from Jon Cave
2013-12-05 10:22:57 +11:00
Damien Miller
e4870c0906
- djm@cvs.openbsd.org 2013/12/01 23:19:05
...
[PROTOCOL]
mention curve25519-sha256@libssh.org key exchange algorithm
2013-12-05 10:22:39 +11:00
Damien Miller
1d2f8804a6
- deraadt@cvs.openbsd.org 2013/11/26 19:15:09
...
[pkcs11.h]
cleanup 1 << 31 idioms. Resurrection of this issue pointed out by
Eitan Adler ok markus for ssh, implies same change in kerberosV
2013-12-05 10:22:03 +11:00
Damien Miller
bdb352a54f
- jmc@cvs.openbsd.org 2013/11/26 12:14:54
...
[ssh.1 ssh.c]
- put -Q in the right place
- Ar was a poor choice for the arguments to -Q. i've chosen an
admittedly equally poor Cm, at least consistent with the rest
of the docs. also no need for multiple instances
- zap a now redundant Nm
- usage() sync
2013-12-05 10:20:52 +11:00
Damien Miller
d937dc084a
- deraadt@cvs.openbsd.org 2013/11/25 18:04:21
...
[ssh.1 ssh.c]
improve -Q usage and such. One usage change is that the option is now
case-sensitive
ok dtucker markus djm
2013-12-05 10:19:54 +11:00