]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
11 years ago - (dtucker) Fix typo in #ifndef.
Darren Tucker [Fri, 17 Jan 2014 07:00:40 +0000 (18:00 +1100)] 
 - (dtucker) Fix typo in #ifndef.

11 years ago - (dtucker) [configure.ac digest.c openbsd-compat/openssl-compat.c
Darren Tucker [Fri, 17 Jan 2014 06:32:30 +0000 (17:32 +1100)] 
 - (dtucker) [configure.ac digest.c openbsd-compat/openssl-compat.c
   openbsd-compat/openssl-compat.h]  Add compatibility layer for older
   openssl versions.  ok djm@

11 years ago - (djm) [Makefile.in configure.ac sandbox-capsicum.c sandbox-darwin.c]
Damien Miller [Fri, 17 Jan 2014 05:47:04 +0000 (16:47 +1100)] 
 - (djm) [Makefile.in configure.ac sandbox-capsicum.c sandbox-darwin.c]
   [sandbox-null.c sandbox-rlimit.c sandbox-seccomp-filter.c]
   [sandbox-systrace.c ssh-sandbox.h sshd.c] Support preauth sandboxing
   using the Capsicum API introduced in FreeBSD 10. Patch by Dag-Erling
   Smorgrav, updated by Loganaden Velvindron @ AfriNIC; ok dtucker@

11 years ago - dtucker@cvs.openbsd.org 2014/01/17 05:26:41
Darren Tucker [Fri, 17 Jan 2014 05:30:49 +0000 (16:30 +1100)] 
   - dtucker@cvs.openbsd.org 2014/01/17 05:26:41
     [digest.c]
     remove unused includes.  ok djm@

11 years ago - djm@cvs.openbsd.org 2014/01/17 00:21:06
Darren Tucker [Fri, 17 Jan 2014 05:29:45 +0000 (16:29 +1100)] 
   - djm@cvs.openbsd.org 2014/01/17 00:21:06
     [sftp-client.c]
     signed/unsigned comparison warning fix; from portable (Id sync only)

11 years ago - (dtucker) [configure.ac] Split AC_CHECK_FUNCS for OpenSSL functions into
Darren Tucker [Fri, 17 Jan 2014 04:12:16 +0000 (15:12 +1100)] 
 - (dtucker) [configure.ac] Split AC_CHECK_FUNCS for OpenSSL functions into
   separate lines and alphabetize for easier diffing of changes.

11 years ago - (dtucker) [defines.h] Add typedefs for uintXX_t types for platforms that
Darren Tucker [Fri, 17 Jan 2014 03:20:05 +0000 (14:20 +1100)] 
 - (dtucker) [defines.h] Add typedefs for uintXX_t types for platforms that
   don't have them.

11 years ago - (dtucker) [openbsd-compat/bcrypt_pbkdf.c] Wrap stdlib.h include inside
Darren Tucker [Fri, 17 Jan 2014 03:18:45 +0000 (14:18 +1100)] 
 - (dtucker) [openbsd-compat/bcrypt_pbkdf.c] Wrap stdlib.h include inside
   #ifdef HAVE_STDINT_H.

11 years ago - (dtucker) [blocks.c fe25519.c ge25519.c hash.c sc25519.c verify.c] Include
Darren Tucker [Fri, 17 Jan 2014 01:43:43 +0000 (12:43 +1100)] 
 - (dtucker) [blocks.c fe25519.c ge25519.c hash.c sc25519.c verify.c] Include
   includes.h to pull in all of the compatibility stuff.

11 years ago - (dtucker) [poly1305.c] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.
Darren Tucker [Fri, 17 Jan 2014 01:42:17 +0000 (12:42 +1100)] 
 - (dtucker) [poly1305.c] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.

11 years ago - (dtucker) [crypto_api.h] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.
Darren Tucker [Fri, 17 Jan 2014 01:31:33 +0000 (12:31 +1100)] 
 - (dtucker) [crypto_api.h] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.

11 years ago - (dtucker) [loginrec.c] Cast to the types specfied in the format
Darren Tucker [Fri, 17 Jan 2014 01:23:23 +0000 (12:23 +1100)] 
 - (dtucker) [loginrec.c] Cast to the types specfied in the format
    specification to prevent warnings.

11 years ago - (djm) [sftp-client.c] signed/unsigned comparison fix
Damien Miller [Fri, 17 Jan 2014 00:20:26 +0000 (11:20 +1100)] 
 - (djm) [sftp-client.c] signed/unsigned comparison fix

11 years ago - (dtucker) [aclocal.m4 configure.ac] Add some additional compiler/toolchain
Darren Tucker [Thu, 16 Jan 2014 22:53:24 +0000 (09:53 +1100)] 
 - (dtucker) [aclocal.m4 configure.ac] Add some additional compiler/toolchain
   hardening flags including -fstack-protector-strong.  These default to on
   if the toolchain supports them, but there is a configure-time knob
   (--without-hardening) to disable them if necessary.  ok djm@

11 years ago - (djm) [README] update release notes URL.
Damien Miller [Thu, 16 Jan 2014 07:51:44 +0000 (18:51 +1100)] 
 - (djm) [README] update release notes URL.

11 years ago - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
Damien Miller [Thu, 16 Jan 2014 07:51:07 +0000 (18:51 +1100)] 
 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
   [contrib/suse/openssh.spec] Crank RPM spec version numbers.

11 years ago - djm@cvs.openbsd.org 2014/01/16 07:32:00
Damien Miller [Thu, 16 Jan 2014 07:42:31 +0000 (18:42 +1100)] 
   - djm@cvs.openbsd.org 2014/01/16 07:32:00
     [version.h]
     openssh-6.5

11 years ago - djm@cvs.openbsd.org 2014/01/16 07:31:09
Damien Miller [Thu, 16 Jan 2014 07:42:10 +0000 (18:42 +1100)] 
   - djm@cvs.openbsd.org 2014/01/16 07:31:09
     [sftp-client.c]
     needless and incorrect cast to size_t can break resumption of
     large download; patch from tobias@

11 years ago - djm@cvs.openbsd.org 2014/01/12 08:13:13
Damien Miller [Sun, 12 Jan 2014 08:21:22 +0000 (19:21 +1100)] 
   - djm@cvs.openbsd.org 2014/01/12 08:13:13
     [bufaux.c buffer.h kex.c kex.h kexc25519.c kexc25519c.c kexc25519s.c]
     [kexdhc.c kexdhs.c kexecdhc.c kexecdhs.c kexgexc.c kexgexs.c]
     avoid use of OpenSSL BIGNUM type and functions for KEX with
     Curve25519 by adding a buffer_put_bignum2_from_string() that stores
     a string using the bignum encoding rules. Will make it easier to
     build a reduced-feature OpenSSH without OpenSSL in the future;
     ok markus@

11 years ago - djm@cvs.openbsd.org 2014/01/10 05:59:19
Damien Miller [Sun, 12 Jan 2014 08:20:47 +0000 (19:20 +1100)] 
   - djm@cvs.openbsd.org 2014/01/10 05:59:19
     [sshd_config]
     the /etc/ssh/ssh_host_ed25519_key is loaded by default too

11 years ago - djm@cvs.openbsd.org 2014/01/09 23:26:48
Damien Miller [Thu, 9 Jan 2014 23:59:24 +0000 (10:59 +1100)] 
   - djm@cvs.openbsd.org 2014/01/09 23:26:48
     [sshconnect.c sshd.c]
     ban clients/servers that suffer from SSH_BUG_DERIVEKEY, they are ancient,
     deranged and might make some attacks on KEX easier; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/01/09 23:20:00
Damien Miller [Thu, 9 Jan 2014 23:58:53 +0000 (10:58 +1100)] 
   - djm@cvs.openbsd.org 2014/01/09 23:20:00
     [digest.c digest.h hostfile.c kex.c kex.h kexc25519.c kexc25519c.c]
     [kexc25519s.c kexdh.c kexecdh.c kexecdhc.c kexecdhs.c kexgex.c kexgexc.c]
     [kexgexs.c key.c key.h roaming_client.c roaming_common.c schnorr.c]
     [schnorr.h ssh-dss.c ssh-ecdsa.c ssh-rsa.c sshconnect2.c]
     Introduce digest API and use it to perform all hashing operations
     rather than calling OpenSSL EVP_Digest* directly. Will make it easier
     to build a reduced-feature OpenSSH without OpenSSL in future;
     feedback, ok markus@

11 years ago - guenther@cvs.openbsd.org 2014/01/09 03:26:00
Damien Miller [Thu, 9 Jan 2014 23:40:45 +0000 (10:40 +1100)] 
   - guenther@cvs.openbsd.org 2014/01/09 03:26:00
     [sftp-common.c]
     When formating the time for "ls -l"-style output, show dates in the future
     with the year, and rearrange a comparison to avoid a potentional signed
     arithmetic overflow that would give the wrong result.

     ok djm@

11 years ago - tedu@cvs.openbsd.org 2014/01/04 17:50:55
Damien Miller [Thu, 9 Jan 2014 23:37:05 +0000 (10:37 +1100)] 
   - tedu@cvs.openbsd.org 2014/01/04 17:50:55
     [mac.c monitor_mm.c monitor_mm.h xmalloc.c]
     use standard types and formats for size_t like variables. ok dtucker

11 years ago - (djm) [regress/.cvsignore] Ignore regress test droppings; ok dtucker@
Damien Miller [Wed, 8 Jan 2014 05:13:12 +0000 (16:13 +1100)] 
 - (djm) [regress/.cvsignore] Ignore regress test droppings; ok dtucker@

11 years ago - djm@cvs.openbsd.org 2013/12/30 23:52:28
Damien Miller [Tue, 31 Dec 2013 01:25:40 +0000 (12:25 +1100)] 
   - djm@cvs.openbsd.org 2013/12/30 23:52:28
     [auth2-hostbased.c auth2-pubkey.c compat.c compat.h ssh-rsa.c]
     [sshconnect.c sshconnect2.c sshd.c]
     refuse RSA keys from old proprietary clients/servers that use the
     obsolete RSA+MD5 signature scheme. it will still be possible to connect
     with these clients/servers but only DSA keys will be accepted, and we'll
     deprecate them entirely in a future release. ok markus@

11 years ago - (djm) [regress/Makefile] Add some generated files for cleaning
Damien Miller [Sun, 29 Dec 2013 06:57:46 +0000 (17:57 +1100)] 
 - (djm) [regress/Makefile] Add some generated files for cleaning

11 years ago - djm@cvs.openbsd.org 2013/12/29 05:57:02
Damien Miller [Sun, 29 Dec 2013 06:54:03 +0000 (17:54 +1100)] 
   - djm@cvs.openbsd.org 2013/12/29 05:57:02
     [sshconnect.c]
     when showing other hostkeys, don't forget Ed25519 keys

11 years ago - djm@cvs.openbsd.org 2013/12/29 05:42:16
Damien Miller [Sun, 29 Dec 2013 06:53:39 +0000 (17:53 +1100)] 
   - djm@cvs.openbsd.org 2013/12/29 05:42:16
     [ssh.c]
     don't forget to load Ed25519 certs too

11 years ago - djm@cvs.openbsd.org 2013/12/29 04:35:50
Damien Miller [Sun, 29 Dec 2013 06:50:15 +0000 (17:50 +1100)] 
   - djm@cvs.openbsd.org 2013/12/29 04:35:50
     [authfile.c]
     don't refuse to load Ed25519 certificates

11 years ago - djm@cvs.openbsd.org 2013/12/29 04:29:25
Damien Miller [Sun, 29 Dec 2013 06:49:55 +0000 (17:49 +1100)] 
   - djm@cvs.openbsd.org 2013/12/29 04:29:25
     [authfd.c]
     allow deletion of ed25519 keys from the agent

11 years ago - djm@cvs.openbsd.org 2013/12/29 04:20:04
Damien Miller [Sun, 29 Dec 2013 06:49:31 +0000 (17:49 +1100)] 
   - djm@cvs.openbsd.org 2013/12/29 04:20:04
     [key.c]
     to make sure we don't omit any key types as valid CA keys again,
     factor the valid key type check into a key_type_is_valid_ca()
     function

11 years ago - djm@cvs.openbsd.org 2013/12/29 02:49:52
Damien Miller [Sun, 29 Dec 2013 06:49:13 +0000 (17:49 +1100)] 
   - djm@cvs.openbsd.org 2013/12/29 02:49:52
     [key.c]
     correct comment for key_drop_cert()

11 years ago - djm@cvs.openbsd.org 2013/12/29 02:37:04
Damien Miller [Sun, 29 Dec 2013 06:48:55 +0000 (17:48 +1100)] 
   - djm@cvs.openbsd.org 2013/12/29 02:37:04
     [key.c]
     correct comment for key_to_certified()

11 years ago - djm@cvs.openbsd.org 2013/12/29 02:28:10
Damien Miller [Sun, 29 Dec 2013 06:48:38 +0000 (17:48 +1100)] 
   - djm@cvs.openbsd.org 2013/12/29 02:28:10
     [key.c]
     allow ed25519 keys to appear as certificate authorities

11 years ago - djm@cvs.openbsd.org 2013/12/27 22:37:18
Damien Miller [Sun, 29 Dec 2013 06:48:15 +0000 (17:48 +1100)] 
   - djm@cvs.openbsd.org 2013/12/27 22:37:18
     [ssh-rsa.c]
     correct comment

11 years ago - djm@cvs.openbsd.org 2013/12/27 22:30:17
Damien Miller [Sun, 29 Dec 2013 06:47:50 +0000 (17:47 +1100)] 
   - djm@cvs.openbsd.org 2013/12/27 22:30:17
     [ssh-dss.c ssh-ecdsa.c ssh-rsa.c]
     make the original RSA and DSA signing/verification code look more like
     the ECDSA/Ed25519 ones: use key_type_plain() when checking the key type
     rather than tediously listing all variants, use __func__ for debug/
     error messages

11 years ago - tedu@cvs.openbsd.org 2013/12/21 07:10:47
Damien Miller [Sun, 29 Dec 2013 06:47:14 +0000 (17:47 +1100)] 
   - tedu@cvs.openbsd.org 2013/12/21 07:10:47
     [ssh-keygen.1]
     small typo

11 years ago - djm@cvs.openbsd.org 2013/12/19 22:57:13
Damien Miller [Sun, 29 Dec 2013 06:46:49 +0000 (17:46 +1100)] 
   - djm@cvs.openbsd.org 2013/12/19 22:57:13
     [poly1305.c poly1305.h]
     use full name for author, with his permission

11 years ago - djm@cvs.openbsd.org 2013/12/19 01:19:41
Damien Miller [Sun, 29 Dec 2013 06:45:51 +0000 (17:45 +1100)] 
   - djm@cvs.openbsd.org 2013/12/19 01:19:41
     [ssh-agent.c]
     bz#2186: don't crash (NULL deref) when deleting PKCS#11 keys from an agent
     that has a mix of normal and PKCS#11 keys; fix from jay AT slushpupie.com;
     ok dtucker

11 years ago - djm@cvs.openbsd.org 2013/12/19 01:04:36
Damien Miller [Sun, 29 Dec 2013 06:45:26 +0000 (17:45 +1100)] 
   - djm@cvs.openbsd.org 2013/12/19 01:04:36
     [channels.c]
     bz#2147: fix multiple remote forwardings with dynamically assigned
     listen ports. In the s->c message to open the channel we were sending
     zero (the magic number to request a dynamic port) instead of the actual
     listen port. The client therefore had no way of discriminating between
     them.

     Diagnosis and fix by ronf AT timeheart.net

11 years ago - djm@cvs.openbsd.org 2013/12/19 00:27:57
Damien Miller [Sun, 29 Dec 2013 06:44:56 +0000 (17:44 +1100)] 
   - djm@cvs.openbsd.org 2013/12/19 00:27:57
     [auth-options.c]
     simplify freeing of source-address certificate restriction

11 years ago - dtucker@cvs.openbsd.org 2013/12/19 00:19:12
Damien Miller [Sun, 29 Dec 2013 06:44:29 +0000 (17:44 +1100)] 
   - dtucker@cvs.openbsd.org 2013/12/19 00:19:12
     [serverloop.c]
     Cast client_alive_interval to u_int64_t before assinging to
     max_time_milliseconds to avoid potential integer overflow in the timeout.
     bz#2170, patch from Loganaden Velvindron, ok djm@

11 years ago - djm@cvs.openbsd.org 2013/12/19 00:10:30
Damien Miller [Sun, 29 Dec 2013 06:44:07 +0000 (17:44 +1100)] 
   - djm@cvs.openbsd.org 2013/12/19 00:10:30
     [ssh-add.c]
     skip requesting smartcard PIN when removing keys from agent; bz#2187
     patch from jay AT slushpupie.com; ok dtucker

11 years ago - (djm) [loginrec.c] Check for username truncation when looking up lastlog
Damien Miller [Sun, 29 Dec 2013 06:40:18 +0000 (17:40 +1100)] 
 - (djm) [loginrec.c] Check for username truncation when looking up lastlog
   entries

11 years ago20131221
Darren Tucker [Sat, 21 Dec 2013 06:02:39 +0000 (17:02 +1100)] 
20131221
 - (dtucker) [regress/keytype.sh] Actually test ecdsa key types.

11 years ago - (dtucker) [auth-pam.c] bz#2163: check return value from pam_get_item().
Darren Tucker [Thu, 19 Dec 2013 00:31:44 +0000 (11:31 +1100)] 
 - (dtucker) [auth-pam.c] bz#2163: check return value from pam_get_item().
   Patch from Loganaden Velvindron.

11 years ago - (dtucker) [configure.ac] bz#2178: Don't try to use BSM on Solaris versions
Darren Tucker [Thu, 19 Dec 2013 00:00:12 +0000 (11:00 +1100)] 
 - (dtucker) [configure.ac] bz#2178: Don't try to use BSM on Solaris versions
   greater than 11 either rather than just 11.  Patch from Tomas Kuthan.

11 years ago - markus@cvs.openbsd.org 2013/12/17 10:36:38
Damien Miller [Wed, 18 Dec 2013 06:50:39 +0000 (17:50 +1100)] 
   - markus@cvs.openbsd.org 2013/12/17 10:36:38
     [crypto_api.h]
     I've assempled the header file by cut&pasting from generated headers
     and the source files.

11 years ago - djm@cvs.openbsd.org 2013/12/15 21:42:35
Damien Miller [Wed, 18 Dec 2013 06:50:13 +0000 (17:50 +1100)] 
   - djm@cvs.openbsd.org 2013/12/15 21:42:35
     [cipher-chachapoly.c]
     add some comments and constify a constant

11 years ago - pascal@cvs.openbsd.org 2013/12/15 18:17:26
Damien Miller [Wed, 18 Dec 2013 06:49:48 +0000 (17:49 +1100)] 
   - pascal@cvs.openbsd.org 2013/12/15 18:17:26
     [ssh-add.c]
     Make ssh-add also add .ssh/id_ed25519; fixes lie in manual page.
     ok markus@

11 years ago - markus@cvs.openbsd.org 2013/12/09 11:08:17
Damien Miller [Wed, 18 Dec 2013 06:48:32 +0000 (17:48 +1100)] 
   - markus@cvs.openbsd.org 2013/12/09 11:08:17
     [crypto_api.h]
     remove unused defines

11 years ago - markus@cvs.openbsd.org 2013/12/09 11:03:45
Damien Miller [Wed, 18 Dec 2013 06:48:11 +0000 (17:48 +1100)] 
   - markus@cvs.openbsd.org 2013/12/09 11:03:45
     [blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]
     [ge25519_base.data hash.c sc25519.c sc25519.h verify.c]
     Add Authors for the public domain ed25519/nacl code.
     see also http://nacl.cr.yp.to/features.html
        All of the NaCl software is in the public domain.
     and http://ed25519.cr.yp.to/software.html
        The Ed25519 software is in the public domain.

11 years ago - dtucker@cvs.openbsd.org 2013/12/08 09:53:27
Damien Miller [Wed, 18 Dec 2013 06:47:02 +0000 (17:47 +1100)] 
   - dtucker@cvs.openbsd.org 2013/12/08 09:53:27
     [sshd_config.5]
     Use a literal for the default value of KEXAlgorithms.  ok deraadt jmc

11 years ago - naddy@cvs.openbsd.org 2013/12/07 11:58:46
Damien Miller [Wed, 18 Dec 2013 06:46:27 +0000 (17:46 +1100)] 
   - naddy@cvs.openbsd.org 2013/12/07 11:58:46
     [ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8 ssh.1]
     [ssh_config.5 sshd.8 sshd_config.5]
     add missing mentions of ed25519; ok djm@

11 years ago - djm@cvs.openbsd.org 2013/12/07 08:08:26
Damien Miller [Wed, 18 Dec 2013 06:45:35 +0000 (17:45 +1100)] 
   - djm@cvs.openbsd.org 2013/12/07 08:08:26
     [ssh-keygen.1]
     document -a and -o wrt new key format

11 years ago - (djm) [Makefile.in regress/Makefile regress/agent-ptrace.sh]
Damien Miller [Sun, 8 Dec 2013 04:53:28 +0000 (15:53 +1100)] 
 - (djm) [Makefile.in regress/Makefile regress/agent-ptrace.sh]
   [regress/setuid-allowed.c] Check that ssh-agent is not on a no-setuid
   filesystem before running agent-ptrace.sh; ok dtucker

11 years ago - (djm) [openbsd-compat/bsd-setres_id.c] Missing header; from Corinna
Damien Miller [Sat, 7 Dec 2013 21:23:08 +0000 (08:23 +1100)] 
 - (djm) [openbsd-compat/bsd-setres_id.c] Missing header; from Corinna
    Vinschen

11 years ago - (djm) [Makefile.in] PATHSUBS and keygen bits for Ed25519; from
Damien Miller [Sat, 7 Dec 2013 10:43:46 +0000 (21:43 +1100)] 
 - (djm) [Makefile.in] PATHSUBS and keygen bits for Ed25519; from
    Loganaden Velvindron @ AfriNIC in bz#2179

11 years ago - (djm) [regress/cert-hostkey.sh] Fix merge botch
Damien Miller [Sat, 7 Dec 2013 06:07:15 +0000 (17:07 +1100)] 
 - (djm) [regress/cert-hostkey.sh] Fix merge botch

11 years ago - markus@cvs.openbsd.org 2013/12/06 13:52:46
Damien Miller [Sat, 7 Dec 2013 05:32:44 +0000 (16:32 +1100)] 
   - markus@cvs.openbsd.org 2013/12/06 13:52:46
     [regress/Makefile regress/agent.sh regress/cert-hostkey.sh]
     [regress/cert-userkey.sh regress/keytype.sh]
     test ed25519 support; from djm@

11 years ago - (djm) [ed25519.c ssh-ed25519.c openbsd-compat/Makefile.in]
Damien Miller [Sat, 7 Dec 2013 01:37:53 +0000 (12:37 +1100)] 
 - (djm) [ed25519.c ssh-ed25519.c openbsd-compat/Makefile.in]
    [openbsd-compat/bcrypt_pbkdf.c] Make ed25519/new key format compile on
       Linux

11 years ago - [configure.ac openbsd-compat/Makefile.in openbsd-compat/bcrypt_pbkdf.c]
Damien Miller [Sat, 7 Dec 2013 00:51:51 +0000 (11:51 +1100)] 
 - [configure.ac openbsd-compat/Makefile.in openbsd-compat/bcrypt_pbkdf.c]
   [openbsd-compat/blf.h openbsd-compat/blowfish.c]
   [openbsd-compat/openbsd-compat.h] Start at supporting bcrypt_pbkdf in
   portable.

11 years ago - [authfile.c] Conditionalise inclusion of util.h
Damien Miller [Sat, 7 Dec 2013 00:38:03 +0000 (11:38 +1100)] 
 - [authfile.c] Conditionalise inclusion of util.h

11 years ago - [Makefile.in] Add ed25519 sources
Damien Miller [Sat, 7 Dec 2013 00:35:36 +0000 (11:35 +1100)] 
 - [Makefile.in] Add ed25519 sources

11 years ago - djm@cvs.openbsd.org 2013/12/07 00:19:15
Damien Miller [Sat, 7 Dec 2013 00:29:09 +0000 (11:29 +1100)] 
   - djm@cvs.openbsd.org 2013/12/07 00:19:15
     [key.c]
     set k->cert = NULL after freeing it

11 years ago - [blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]
Damien Miller [Sat, 7 Dec 2013 00:27:47 +0000 (11:27 +1100)] 
 - [blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]
   [ge25519_base.data hash.c sc25519.c sc25519.h verify.c] Fix RCS idents

11 years ago - jmc@cvs.openbsd.org 2013/12/06 15:29:07
Damien Miller [Sat, 7 Dec 2013 00:24:30 +0000 (11:24 +1100)] 
   - jmc@cvs.openbsd.org 2013/12/06 15:29:07
     [sshd.8]
     missing comma;

11 years ago - markus@cvs.openbsd.org 2013/12/06 13:39:49
Damien Miller [Sat, 7 Dec 2013 00:24:01 +0000 (11:24 +1100)] 
   - markus@cvs.openbsd.org 2013/12/06 13:39:49
     [authfd.c authfile.c key.c key.h myproposal.h pathnames.h readconf.c]
     [servconf.c ssh-agent.c ssh-keygen.c ssh-keyscan.1 ssh-keyscan.c]
     [ssh-keysign.c ssh.c ssh_config.5 sshd.8 sshd.c verify.c ssh-ed25519.c]
     [sc25519.h sc25519.c hash.c ge25519_base.data ge25519.h ge25519.c]
     [fe25519.h fe25519.c ed25519.c crypto_api.h blocks.c]
     support ed25519 keys (hostkeys and user identities) using the public
     domain ed25519 reference code from SUPERCOP, see
     http://ed25519.cr.yp.to/software.html
     feedback, help & ok djm@

11 years ago - markus@cvs.openbsd.org 2013/12/06 13:34:54
Damien Miller [Fri, 6 Dec 2013 23:41:55 +0000 (10:41 +1100)] 
   - markus@cvs.openbsd.org 2013/12/06 13:34:54
     [authfile.c authfile.h cipher.c cipher.h key.c packet.c ssh-agent.c]
     [ssh-keygen.c PROTOCOL.key] new private key format, bcrypt as KDF by
     default; details in PROTOCOL.key; feedback and lots help from djm;
     ok djm@

11 years ago - markus@cvs.openbsd.org 2013/12/06 13:30:08
Damien Miller [Fri, 6 Dec 2013 23:40:26 +0000 (10:40 +1100)] 
   - markus@cvs.openbsd.org 2013/12/06 13:30:08
     [authfd.c key.c key.h ssh-agent.c]
     move private key (de)serialization to key.c; ok djm

11 years ago - djm@cvs.openbsd.org 2013/12/06 03:40:51
Damien Miller [Fri, 6 Dec 2013 23:31:37 +0000 (10:31 +1100)] 
   - djm@cvs.openbsd.org 2013/12/06 03:40:51
     [ssh-keygen.c]
     remove duplicated character ('g') in getopt() string;
     document the (few) remaining option characters so we don't have to
     rummage next time.

11 years ago - djm@cvs.openbsd.org 2013/12/05 22:59:45
Damien Miller [Fri, 6 Dec 2013 23:31:08 +0000 (10:31 +1100)] 
   - djm@cvs.openbsd.org 2013/12/05 22:59:45
     [sftp-client.c]
     fix memory leak in error path in do_readdir(); pointed out by
     Loganaden Velvindron @ AfriNIC in bz#2163

11 years ago - djm@cvs.openbsd.org 2013/12/05 01:16:41
Damien Miller [Thu, 5 Dec 2013 03:07:27 +0000 (14:07 +1100)] 
   - djm@cvs.openbsd.org 2013/12/05 01:16:41
     [servconf.c servconf.h]
     bz#2161 - fix AuthorizedKeysCommand inside a Match block and
     rearrange things so the same error is harder to make next time;
     with and ok dtucker@

11 years ago - (dtucker) [configure.ac] bz#2173: use pkg-config --libs to include correct
Darren Tucker [Thu, 5 Dec 2013 00:00:16 +0000 (11:00 +1100)] 
 - (dtucker) [configure.ac] bz#2173: use pkg-config --libs to include correct
   -L location for libedit.  Patch from Serge van den Boom.

11 years ago - djm@cvs.openbsd.org 2013/12/04 04:20:01
Damien Miller [Wed, 4 Dec 2013 23:26:32 +0000 (10:26 +1100)] 
   - djm@cvs.openbsd.org 2013/12/04 04:20:01
     [sftp-client.c]
     bz#2171: don't leak local_fd on error; from Loganaden Velvindron @
     AfriNIC

11 years ago - djm@cvs.openbsd.org 2013/12/02 03:13:14
Damien Miller [Wed, 4 Dec 2013 23:26:14 +0000 (10:26 +1100)] 
   - djm@cvs.openbsd.org 2013/12/02 03:13:14
     [cipher.c]
     correct bzero of chacha20+poly1305 key context. bz#2177 from
     Loganaden Velvindron @ AfriNIC

     Also make it a memset for consistency with the rest of cipher.c

11 years ago - djm@cvs.openbsd.org 2013/12/02 03:09:22
Damien Miller [Wed, 4 Dec 2013 23:25:51 +0000 (10:25 +1100)] 
   - djm@cvs.openbsd.org 2013/12/02 03:09:22
     [key.c]
     make key_to_blob() return a NULL blob on failure; part of
     bz#2175 from Loganaden Velvindron @ AfriNIC

11 years ago - djm@cvs.openbsd.org 2013/12/02 02:56:17
Damien Miller [Wed, 4 Dec 2013 23:23:21 +0000 (10:23 +1100)] 
   - djm@cvs.openbsd.org 2013/12/02 02:56:17
     [ssh-pkcs11-helper.c]
     use-after-free; bz#2175 patch from Loganaden Velvindron @ AfriNIC

11 years ago - djm@cvs.openbsd.org 2013/12/02 02:50:27
Damien Miller [Wed, 4 Dec 2013 23:22:57 +0000 (10:22 +1100)] 
   - djm@cvs.openbsd.org 2013/12/02 02:50:27
     [PROTOCOL.chacha20poly1305]
     typo; from Jon Cave

11 years ago - djm@cvs.openbsd.org 2013/12/01 23:19:05
Damien Miller [Wed, 4 Dec 2013 23:22:39 +0000 (10:22 +1100)] 
   - djm@cvs.openbsd.org 2013/12/01 23:19:05
     [PROTOCOL]
     mention curve25519-sha256@libssh.org key exchange algorithm

11 years ago - deraadt@cvs.openbsd.org 2013/11/26 19:15:09
Damien Miller [Wed, 4 Dec 2013 23:22:03 +0000 (10:22 +1100)] 
   - deraadt@cvs.openbsd.org 2013/11/26 19:15:09
     [pkcs11.h]
     cleanup 1 << 31 idioms.  Resurrection of this issue pointed out by
     Eitan Adler ok markus for ssh, implies same change in kerberosV

11 years ago - jmc@cvs.openbsd.org 2013/11/26 12:14:54
Damien Miller [Wed, 4 Dec 2013 23:20:52 +0000 (10:20 +1100)] 
   - jmc@cvs.openbsd.org 2013/11/26 12:14:54
     [ssh.1 ssh.c]
     - put -Q in the right place
     - Ar was a poor choice for the arguments to -Q. i've chosen an
       admittedly equally poor Cm, at least consistent with the rest
       of the docs. also no need for multiple instances
     - zap a now redundant Nm
     - usage() sync

11 years ago - deraadt@cvs.openbsd.org 2013/11/25 18:04:21
Damien Miller [Wed, 4 Dec 2013 23:19:54 +0000 (10:19 +1100)] 
   - deraadt@cvs.openbsd.org 2013/11/25 18:04:21
     [ssh.1 ssh.c]
     improve -Q usage and such.  One usage change is that the option is now
     case-sensitive
     ok dtucker markus djm

11 years ago - jmc@cvs.openbsd.org 2013/11/21 08:05:09
Damien Miller [Wed, 4 Dec 2013 23:18:43 +0000 (10:18 +1100)] 
   - jmc@cvs.openbsd.org 2013/11/21 08:05:09
     [ssh_config.5 sshd_config.5]
     no need for .Pp before displays;

11 years ago - djm@cvs.openbsd.org 2013/11/21 03:18:51
Damien Miller [Thu, 21 Nov 2013 03:26:18 +0000 (14:26 +1100)] 
   - djm@cvs.openbsd.org 2013/11/21 03:18:51
     [regress/cipher-speed.sh regress/integrity.sh regress/rekey.sh]
     [regress/try-ciphers.sh]
     use new "ssh -Q cipher-auth" query to obtain lists of authenticated
     encryption ciphers instead of specifying them manually; ensures that
     the new chacha20poly1305@openssh.com mode is tested;

     ok markus@ and naddy@ as part of the diff to add
     chacha20poly1305@openssh.com

11 years ago - djm@cvs.openbsd.org 2013/11/21 03:16:47
Damien Miller [Thu, 21 Nov 2013 03:25:15 +0000 (14:25 +1100)] 
   - djm@cvs.openbsd.org 2013/11/21 03:16:47
     [regress/modpipe.c]
     use unsigned long long instead of u_int64_t here to avoid warnings
     on some systems portable OpenSSH is built on.

11 years ago - djm@cvs.openbsd.org 2013/11/21 03:15:46
Damien Miller [Thu, 21 Nov 2013 03:24:42 +0000 (14:24 +1100)] 
   - djm@cvs.openbsd.org 2013/11/21 03:15:46
     [regress/krl.sh]
     add some reminders for additional tests that I'd like to implement

11 years ago - naddy@cvs.openbsd.org 2013/11/18 05:09:32
Damien Miller [Thu, 21 Nov 2013 03:24:08 +0000 (14:24 +1100)] 
   - naddy@cvs.openbsd.org 2013/11/18 05:09:32
     [regress/forward-control.sh]
     bump timeout to 10 seconds to allow slow machines (e.g. Alpha PC164)
     to successfully run this; ok djm@
     (ID sync only; our timeouts are already longer)

11 years ago - djm@cvs.openbsd.org 2013/11/21 00:45:44
Damien Miller [Thu, 21 Nov 2013 03:12:23 +0000 (14:12 +1100)] 
   - djm@cvs.openbsd.org 2013/11/21 00:45:44
     [Makefile.in PROTOCOL PROTOCOL.chacha20poly1305 authfile.c chacha.c]
     [chacha.h cipher-chachapoly.c cipher-chachapoly.h cipher.c cipher.h]
     [dh.c myproposal.h packet.c poly1305.c poly1305.h servconf.c ssh.1]
     [ssh.c ssh_config.5 sshd_config.5] Add a new protocol 2 transport
     cipher "chacha20-poly1305@openssh.com" that combines Daniel
     Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an
     authenticated encryption mode.

     Inspired by and similar to Adam Langley's proposal for TLS:
     http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03
     but differs in layout used for the MAC calculation and the use of a
     second ChaCha20 instance to separately encrypt packet lengths.
     Details are in the PROTOCOL.chacha20poly1305 file.

     Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC
     ok markus@ naddy@

11 years ago - deraadt@cvs.openbsd.org 2013/11/20 20:54:10
Damien Miller [Thu, 21 Nov 2013 02:57:15 +0000 (13:57 +1100)] 
   - deraadt@cvs.openbsd.org 2013/11/20 20:54:10
     [canohost.c clientloop.c match.c readconf.c sftp.c]
     unsigned casts for ctype macros where neccessary
     ok guenther millert markus

11 years ago - deraadt@cvs.openbsd.org 2013/11/20 20:53:10
Damien Miller [Thu, 21 Nov 2013 02:56:49 +0000 (13:56 +1100)] 
   - deraadt@cvs.openbsd.org 2013/11/20 20:53:10
     [scp.c]
     unsigned casts for ctype macros where neccessary
     ok guenther millert markus

11 years ago - djm@cvs.openbsd.org 2013/11/20 02:19:01
Damien Miller [Thu, 21 Nov 2013 02:56:28 +0000 (13:56 +1100)] 
   - djm@cvs.openbsd.org 2013/11/20 02:19:01
     [sshd.c]
     delay closure of in/out fds until after "Bad protocol version
     identification..." message, as get_remote_ipaddr/get_remote_port
     require them open.

11 years ago - markus@cvs.openbsd.org 2013/11/13 13:48:20
Damien Miller [Thu, 21 Nov 2013 02:56:06 +0000 (13:56 +1100)] 
   - markus@cvs.openbsd.org 2013/11/13 13:48:20
     [ssh-pkcs11.c]
     add missing braces found by pedro

11 years ago - dtucker@cvs.openbsd.org 2013/11/08 11:15:19
Damien Miller [Thu, 21 Nov 2013 02:55:43 +0000 (13:55 +1100)] 
   - dtucker@cvs.openbsd.org 2013/11/08 11:15:19
     [bufaux.c bufbn.c buffer.c sftp-client.c sftp-common.c sftp-glob.c]
     [uidswap.c] Include stdlib.h for free() as per the man page.

11 years ago - (dtucker) [regress/keytype.sh] Populate ECDSA key types to be tested by
Darren Tucker [Sun, 10 Nov 2013 09:25:22 +0000 (20:25 +1100)] 
 - (dtucker) [regress/keytype.sh] Populate ECDSA key types to be tested by
   querying the ones that are compiled in.

11 years ago - (dtucker) [key.c] Check for the correct defines for NID_secp521r1.
Darren Tucker [Sun, 10 Nov 2013 01:38:42 +0000 (12:38 +1100)] 
 - (dtucker) [key.c] Check for the correct defines for NID_secp521r1.

11 years ago - (dtucker) [configure.ac] Add missing "test".
Darren Tucker [Sat, 9 Nov 2013 11:32:51 +0000 (22:32 +1100)] 
 - (dtucker) [configure.ac] Add missing "test".

11 years ago - (dtucker) [configure.ac] Fix brackets in NID_secp521r1 test.
Darren Tucker [Sat, 9 Nov 2013 11:02:31 +0000 (22:02 +1100)] 
 - (dtucker) [configure.ac] Fix brackets in NID_secp521r1 test.

11 years ago - (dtucker) [configure.ac kex.c key.c myproposal.h] Test for the presence of
Darren Tucker [Sat, 9 Nov 2013 07:39:25 +0000 (18:39 +1100)] 
 - (dtucker) [configure.ac kex.c key.c myproposal.h] Test for the presence of
   NID_X9_62_prime256v1, NID_secp384r1 and NID_secp521r1 and test that the
   latter actually works before using it.  Fedora (at least) has NID_secp521r1
   that doesn't work (see https://bugzilla.redhat.com/show_bug.cgi?id=1021897).