]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
5 years agoupstream: markus suggests a simplification to previous
djm@openbsd.org [Wed, 29 Jan 2020 08:17:49 +0000 (08:17 +0000)] 
upstream: markus suggests a simplification to previous

OpenBSD-Commit-ID: 10bbfb6607ebbb9a018dcd163f0964941adf58de

5 years agoupstream: give more context to UpdateHostKeys messages, mentioning
djm@openbsd.org [Wed, 29 Jan 2020 07:51:30 +0000 (07:51 +0000)] 
upstream: give more context to UpdateHostKeys messages, mentioning

that the changes are validated by the existing trusted host key. Prompted by
espie@ feedback and ok markus@

OpenBSD-Commit-ID: b3d95f4a45f2692f4143b9e77bb241184dbb8dc5

5 years agoupstream: changes to support FIDO attestation
djm@openbsd.org [Tue, 28 Jan 2020 08:01:34 +0000 (08:01 +0000)] 
upstream: changes to support FIDO attestation

Allow writing to disk the attestation certificate that is generated by
the FIDO token at key enrollment time. These certificates may be used
by an out-of-band workflow to prove that a particular key is held in
trustworthy hardware.

Allow passing in a challenge that will be sent to the card during
key enrollment. These are needed to build an attestation workflow
that resists replay attacks.

ok markus@

OpenBSD-Commit-ID: 457dc3c3d689ba39eed328f0817ed9b91a5f78f6

5 years agoupstream: disable UpdateHostKeys=ask when in quiet mode; "work for
djm@openbsd.org [Tue, 28 Jan 2020 07:24:15 +0000 (07:24 +0000)] 
upstream: disable UpdateHostKeys=ask when in quiet mode; "work for

me" matthieu@

OpenBSD-Commit-ID: 60d7b5eb91accf935ed9852650a826d86db2ddc7

5 years agocompat for missing IPTOS_DSCP_LE in system headers
Damien Miller [Tue, 28 Jan 2020 01:57:25 +0000 (12:57 +1100)] 
compat for missing IPTOS_DSCP_LE in system headers

5 years agoupstream: make IPTOS_DSCP_LE available via IPQoS directive; bz2986,
djm@openbsd.org [Tue, 28 Jan 2020 01:49:36 +0000 (01:49 +0000)] 
upstream: make IPTOS_DSCP_LE available via IPQoS directive; bz2986,

based on patch by veegish AT cyberstorm.mu

OpenBSD-Commit-ID: 9902bf4fbb4ea51de2193ac2b1d965bc5d99c425

5 years agoupstream: disable UpdateHostKeys=ask if command is specified; ok
markus@openbsd.org [Mon, 27 Jan 2020 20:51:32 +0000 (20:51 +0000)] 
upstream: disable UpdateHostKeys=ask if command is specified; ok

djm@ sthen@

OpenBSD-Commit-ID: e5bcc45eadb78896637d4143d289f1e42c2ef5d7

5 years agoupstream: unbreak unittests for recent API / source file changes
djm@openbsd.org [Sun, 26 Jan 2020 00:09:50 +0000 (00:09 +0000)] 
upstream: unbreak unittests for recent API / source file changes

OpenBSD-Regress-ID: 075a899a01bbf7781d38bf0b33d8366faaf6d3c0

5 years agoMove definition of UINT32_MAX.
Darren Tucker [Sun, 26 Jan 2020 04:09:15 +0000 (15:09 +1100)] 
Move definition of UINT32_MAX.

This allows us to always define it if needed not just if we also
define the type ourself.

5 years agoupstream: unbreak unittests for recent API / source file changes
djm@openbsd.org [Sun, 26 Jan 2020 00:09:50 +0000 (00:09 +0000)] 
upstream: unbreak unittests for recent API / source file changes

OpenBSD-Regress-ID: 075a899a01bbf7781d38bf0b33d8366faaf6d3c0

5 years agoInclude signal.h to prevent redefintion of _NSIG.
Darren Tucker [Sun, 26 Jan 2020 03:09:17 +0000 (14:09 +1100)] 
Include signal.h to prevent redefintion of _NSIG.

5 years agoWrap stdint.h in tests inside HAVE_STDINT_H.
Darren Tucker [Sun, 26 Jan 2020 02:40:51 +0000 (13:40 +1100)] 
Wrap stdint.h in tests inside HAVE_STDINT_H.

5 years agoupstream: for UpdateHostKeys, don't report errors for unsupported
djm@openbsd.org [Sun, 26 Jan 2020 00:14:45 +0000 (00:14 +0000)] 
upstream: for UpdateHostKeys, don't report errors for unsupported

key types - just ignore them. spotted by and ok dtucker@

OpenBSD-Commit-ID: 91769e443f6197c983932fc8ae9d39948727d473

5 years agoupstream: downgrade error() for missing subsequent known_hosts
djm@openbsd.org [Sun, 26 Jan 2020 00:13:20 +0000 (00:13 +0000)] 
upstream: downgrade error() for missing subsequent known_hosts

files to debug() as it was intended to be; spotted by dtucker@

OpenBSD-Commit-ID: 18cfea382cb52f2da761be524e309cc3d5354ef9

5 years agoupstream: clarify that BatchMode applies to all interactive prompts
djm@openbsd.org [Sat, 25 Jan 2020 23:33:27 +0000 (23:33 +0000)] 
upstream: clarify that BatchMode applies to all interactive prompts

(e.g. host key confirmation) and not just password prompts.

OpenBSD-Commit-ID: 97b001883d89d3fb1620d2e6b747c14a26aa9818

5 years agoupstream: tidy headers; some junk snuck into sshbuf-misc.c and
djm@openbsd.org [Sat, 25 Jan 2020 23:28:06 +0000 (23:28 +0000)] 
upstream: tidy headers; some junk snuck into sshbuf-misc.c and

sshbuf-io.c doesn't need SSHBUF_INTERNAL set

OpenBSD-Commit-ID: 27a724d2e0b2619c1a1490f44093bbd73580d9e6

5 years agodepend
Damien Miller [Sat, 25 Jan 2020 23:28:21 +0000 (10:28 +1100)] 
depend

5 years agoupstream: improve the error message for u2f enrollment errors by
djm@openbsd.org [Sat, 25 Jan 2020 23:13:09 +0000 (23:13 +0000)] 
upstream: improve the error message for u2f enrollment errors by

making ssh-keygen be solely responsible for printing the error message and
convertint some more common error responses from the middleware to a useful
ssherr.h status code. more detail remains visible via -v of course.

also remove indepedent copy of sk-api.h declarations in sk-usbhid.c
and just include it.

feedback & ok markus@

OpenBSD-Commit-ID: a4a8ffa870d9a3e0cfd76544bcdeef5c9fb1f1bb

5 years agoupstream: factor out reading/writing sshbufs to dedicated
djm@openbsd.org [Sat, 25 Jan 2020 23:02:13 +0000 (23:02 +0000)] 
upstream: factor out reading/writing sshbufs to dedicated

functions; feedback and ok markus@

OpenBSD-Commit-ID: dc09e5f1950b7acc91b8fdf8015347782d2ecd3d

5 years agoupstream: add a comment describing the ranges of channel IDs that
djm@openbsd.org [Sat, 25 Jan 2020 22:49:38 +0000 (22:49 +0000)] 
upstream: add a comment describing the ranges of channel IDs that

we use; requested by markus@

OpenBSD-Commit-ID: 83a1f09810ffa3a96a55fbe32675b34ba739e56b

5 years agoupstream: make sshd_config:ClientAliveCountMax=0 disable the
djm@openbsd.org [Sat, 25 Jan 2020 22:41:01 +0000 (22:41 +0000)] 
upstream: make sshd_config:ClientAliveCountMax=0 disable the

connection killing behaviour, rather than killing the connection after
sending the first liveness test probe (regardless of whether the client was
responsive) bz2627; ok markus

OpenBSD-Commit-ID: 5af79c35f4c9fa280643b6852f524bfcd9bccdaf

5 years agoupstream: clarify order of AllowUsers/DenyUsers vs
djm@openbsd.org [Sat, 25 Jan 2020 22:36:22 +0000 (22:36 +0000)] 
upstream: clarify order of AllowUsers/DenyUsers vs

AllowGroups/DenyGroups; bz1690, ok markus@

OpenBSD-Commit-ID: 5637584ec30db9cf64822460f41b3e42c8f9facd

5 years agoupstream: when AddKeysToAgent=yes is set and the key contains no
djm@openbsd.org [Sat, 25 Jan 2020 07:17:18 +0000 (07:17 +0000)] 
upstream: when AddKeysToAgent=yes is set and the key contains no

comment, add the key to the agent with the key's path as the comment. bz2564

OpenBSD-Commit-ID: 8dd8ca9340d7017631a27f4ed5358a4cfddec16f

5 years agoupstream: group14-sha1 is no longer a default algorithm
tedu@openbsd.org [Sat, 25 Jan 2020 07:09:14 +0000 (07:09 +0000)] 
upstream: group14-sha1 is no longer a default algorithm

OpenBSD-Commit-ID: a96f04d5e9c2ff760c6799579dc44f69b4ff431d

5 years agoupstream: reword HashKnownHosts description a little more; some
djm@openbsd.org [Sat, 25 Jan 2020 07:02:51 +0000 (07:02 +0000)] 
upstream: reword HashKnownHosts description a little more; some

people found the wording confusing (bz#2560)

OpenBSD-Commit-ID: ac30896598694f07d498828690aecd424c496988

5 years agoupstream: weaken the language for what HashKnownHosts provides with
djm@openbsd.org [Sat, 25 Jan 2020 07:01:00 +0000 (07:01 +0000)] 
upstream: weaken the language for what HashKnownHosts provides with

regards to known_hosts name privacy, it's not practical for this option to
offer any guarantee that hostnames cannot be recovered from a disclosed
known_hosts file (e.g. by brute force).

OpenBSD-Commit-ID: 13f1e3285f8acf7244e9770074296bcf446c6972

5 years agoupstream: the GatewayPorts vs -R listen address selection logic is
djm@openbsd.org [Sat, 25 Jan 2020 06:40:20 +0000 (06:40 +0000)] 
upstream: the GatewayPorts vs -R listen address selection logic is

still confusing people, so add another comment explaining the special
handling of "localhost"; bz#3258

OpenBSD-Commit-ID: e6bf0f0fbf1c7092bf0dbd9c6eab105970b5b53a

5 years agoupstream: mention that permitopen=/PermitOpen do no name to address
djm@openbsd.org [Sat, 25 Jan 2020 06:03:10 +0000 (06:03 +0000)] 
upstream: mention that permitopen=/PermitOpen do no name to address

translation; prompted by bz3099

OpenBSD-Commit-ID: 0dda8e54d566b29855e76bebf9cfecce573f5c23

5 years agoinclude tunnel device path in error message
Damien Miller [Sat, 25 Jan 2020 05:30:22 +0000 (16:30 +1100)] 
include tunnel device path in error message

5 years agoupstream: unrevert this:
djm@openbsd.org [Sat, 25 Jan 2020 04:48:26 +0000 (04:48 +0000)] 
upstream: unrevert this:

> revision 1.217
> date: 2019/11/27 03:34:04;  author: dtucker;  state: Exp;  lines: +5 -7;  commitid: wkiMn49XJyjzoJIs;
> Make channel_id u_int32_t and remove unnecessary check and cast that were
> left over from the type conversion.  Noted by t-hashida@amiya.co.jp in
> bz#3098, ok markus@ djm@

Darren was right the first time; ok dtucker@ "agreed" markus@

OpenBSD-Commit-ID: 641dd1b99a6bbd85b7160da462ae1be83432c7c8

5 years agoupstream: Move setting $NC into test-exec since it's now used by
dtucker@openbsd.org [Sat, 25 Jan 2020 02:57:53 +0000 (02:57 +0000)] 
upstream: Move setting $NC into test-exec since it's now used by

multiple tests, and in -portable we use our own local copy to avoid
portability problems.

OpenBSD-Regress-ID: ceb78445fcaac317bec2fc51b3f0d9589048c114

5 years agoPut EC key export inside OPENSSL_HAS_ECC.
Darren Tucker [Sat, 25 Jan 2020 02:05:42 +0000 (13:05 +1100)] 
Put EC key export inside OPENSSL_HAS_ECC.

Fixes link error when building against an OpenSSL that does not have
ECC.

5 years agoupstream: Wait a bit longer for the multiplex master to become ready
dtucker@openbsd.org [Sat, 25 Jan 2020 00:27:56 +0000 (00:27 +0000)] 
upstream: Wait a bit longer for the multiplex master to become ready

since on very slow hosts the current delay is not sufficient and the test
will fail.

OpenBSD-Regress-ID: 6d90c7475d67ac3a95610b64af700629ece51a48

5 years agoupstream: Add a connection test for proxycommand. This would have
dtucker@openbsd.org [Fri, 24 Jan 2020 10:08:17 +0000 (10:08 +0000)] 
upstream: Add a connection test for proxycommand. This would have

caught the problem caused by ssh.c rev 1.507 wherein Host and Hostname were
swapped.  Prompted by beck@

OpenBSD-Regress-ID: d218500ae6aca4c479c27318fb5b09ebc00f7aae

5 years agoupstream: set UpdateKnownHosts=ask by default; bz#2894; ok
djm@openbsd.org [Sat, 25 Jan 2020 00:22:31 +0000 (00:22 +0000)] 
upstream: set UpdateKnownHosts=ask by default; bz#2894; ok

markus@

OpenBSD-Commit-ID: f09cb3177f3a14c96428e14f347e976a8a531fee

5 years agoupstream: allow UpdateKnownHosts=yes to function when multiple
djm@openbsd.org [Sat, 25 Jan 2020 00:21:08 +0000 (00:21 +0000)] 
upstream: allow UpdateKnownHosts=yes to function when multiple

known_hosts files are in use. When updating host keys, ssh will now search
subsequent known_hosts files, but will add new/changed host keys to the first
specified file only. bz#2738

ok markus@

OpenBSD-Commit-ID: 6ded6d878a03e57d5aa20bab9c31f92e929dbc6c

5 years agoupstream: process security key provider via realpath() in agent,
djm@openbsd.org [Sat, 25 Jan 2020 00:06:48 +0000 (00:06 +0000)] 
upstream: process security key provider via realpath() in agent,

avoids malicious client from being able to cause agent to load arbitrary
libraries into ssh-sk-helper.

reported by puck AT puckipedia.com; ok markus

OpenBSD-Commit-ID: 1086643df1b7eee4870825c687cf0c26a6145d1c

5 years agoupstream: expose PKCS#11 key labels/X.509 subjects as comments
djm@openbsd.org [Sat, 25 Jan 2020 00:03:36 +0000 (00:03 +0000)] 
upstream: expose PKCS#11 key labels/X.509 subjects as comments

Extract the key label or X.509 subject string when PKCS#11 keys
are retrieved from the token and plumb this through to places where
it may be used as a comment.

based on https://github.com/openssh/openssh-portable/pull/138
by Danielle Church

feedback and ok markus@

OpenBSD-Commit-ID: cae1fda10d9e10971dea29520916e27cfec7ca35

5 years agoupstream: tweak proctitle to include sshd arguments, as these are
djm@openbsd.org [Fri, 24 Jan 2020 23:56:01 +0000 (23:56 +0000)] 
upstream: tweak proctitle to include sshd arguments, as these are

frequently used to distinguish between multiple independent instances of the
server. New proctitle looks like this:

$ pgrep -lf sshd
12844 sshd: /usr/sbin/sshd -f /etc/ssh/sshd_config [listener] 0 of 10-100 startups

requested by sthen@ and aja@; ok aja@

OpenBSD-Commit-ID: cf235a561c655a3524a82003cf7244ecb48ccc1e

5 years agoupstream: add xextendf() to extend a string with a format
djm@openbsd.org [Fri, 24 Jan 2020 23:54:40 +0000 (23:54 +0000)] 
upstream: add xextendf() to extend a string with a format

(reallocating as necessary). ok aja@ as part of a larger diff

OpenBSD-Commit-ID: 30796b50d330b3e0e201747fe40cdf9aa70a77f9

5 years agoupstream: minor tweaks to ssh-keygen -Y find-principals:
djm@openbsd.org [Fri, 24 Jan 2020 05:33:01 +0000 (05:33 +0000)] 
upstream: minor tweaks to ssh-keygen -Y find-principals:

emit matched principals one per line to stdout rather than as comma-
separated and with a free-text preamble (easy confusion opportunity)

emit "not found" error to stderr

fix up argument testing for -Y operations and improve error message for
unsupported operations

OpenBSD-Commit-ID: 3d9c9a671ab07fc04a48f543edfa85eae77da69c

5 years agoupstream: remove ssh-rsa (SHA1) from the list of allowed CA
djm@openbsd.org [Fri, 24 Jan 2020 00:28:57 +0000 (00:28 +0000)] 
upstream: remove ssh-rsa (SHA1) from the list of allowed CA

signature algorithms ok markus

OpenBSD-Commit-ID: da3481fca8c81e6951f319a86b7be67502237f57

5 years agoupstream: when signing a certificate with an RSA key, default to
djm@openbsd.org [Fri, 24 Jan 2020 00:27:04 +0000 (00:27 +0000)] 
upstream: when signing a certificate with an RSA key, default to

a safe signature algorithm (rsa-sha-512) if not is explicitly specified by
the user; ok markus@

OpenBSD-Commit-ID: e05f638f0be6c0266e1d3d799716b461011e83a9

5 years agoupstream: allow PEM export of DSA and ECDSA keys; bz3091, patch
djm@openbsd.org [Fri, 24 Jan 2020 00:00:31 +0000 (00:00 +0000)] 
upstream: allow PEM export of DSA and ECDSA keys; bz3091, patch

from Jakub Jelen ok markus@

OpenBSD-Commit-ID: a58edec8b9f07acab4b962a71a5125830d321b51

5 years agoupstream: ssh-keygen -Y find-principals fixes based on feedback
djm@openbsd.org [Thu, 23 Jan 2020 23:31:52 +0000 (23:31 +0000)] 
upstream: ssh-keygen -Y find-principals fixes based on feedback

from Markus:

use "principals" instead of principal, as allowed_signers lines may list
multiple.

When the signing key is a certificate, emit only principals that match
the certificate principal list.

NB. the command -Y name changes: "find-principal" => "find-principals"

ok markus@

OpenBSD-Commit-ID: ab575946ff9a55624cd4e811bfd338bf3b1d0faf

5 years agoupstream: Do not warn about permissions on symlinks.
dtucker@openbsd.org [Fri, 24 Jan 2020 01:29:23 +0000 (01:29 +0000)] 
upstream: Do not warn about permissions on symlinks.

OpenBSD-Regress-ID: 339d4cbae224bd8743ffad9c3afb0cf3cb66c357

5 years agoupstream: Handle zlib compression being disabled now that it's
dtucker@openbsd.org [Thu, 23 Jan 2020 11:19:12 +0000 (11:19 +0000)] 
upstream: Handle zlib compression being disabled now that it's

optional.

OpenBSD-Regress-ID: 0af4fbc5168e62f89d0350de524bff1cb00e707a

5 years agoupstream: Fix typo in comment.
dtucker@openbsd.org [Thu, 23 Jan 2020 10:53:04 +0000 (10:53 +0000)] 
upstream: Fix typo in comment.

OpenBSD-Commit-ID: d1d7a6553208bf439378fd1cf686a828aceb353a

5 years agoupstream: When checking for unsafe directories, ignore non-directories
dtucker@openbsd.org [Thu, 23 Jan 2020 10:19:59 +0000 (10:19 +0000)] 
upstream: When checking for unsafe directories, ignore non-directories

(ie symlinks, where permissions are not relevant).

OpenBSD-Regress-ID: fb6cfc8b022becb62b2dcb99ed3f072b3326e501

5 years agozlib is now optional.
Darren Tucker [Thu, 23 Jan 2020 11:17:24 +0000 (22:17 +1100)] 
zlib is now optional.

5 years agoPlumb WITH_ZLIB into configure.
Darren Tucker [Thu, 23 Jan 2020 11:16:51 +0000 (22:16 +1100)] 
Plumb WITH_ZLIB into configure.

This allows zlib support to be disabled by ./configure --without-zlib.

5 years agoupstream: Make zlib optional. This adds a "ZLIB" build time option
dtucker@openbsd.org [Thu, 23 Jan 2020 10:24:29 +0000 (10:24 +0000)] 
upstream: Make zlib optional. This adds a "ZLIB" build time option

that allows building without zlib compression and associated options.  With
feedback from markus@, ok djm@

OpenBSD-Commit-ID: 44c6e1133a90fd15a3aa865bdedc53bab28b7910

5 years agoupstream: remove trailing period characters from pub/priv key
djm@openbsd.org [Thu, 23 Jan 2020 07:54:04 +0000 (07:54 +0000)] 
upstream: remove trailing period characters from pub/priv key

pathnames - they make them needlessly more difficult to cut and paste without
error; ok markus@ & dtucker@

OpenBSD-Commit-ID: abdcfd1a5723fcac0711feee7665edc66ae2335a

5 years agoFix a couple of mysig_t leftovers.
Darren Tucker [Thu, 23 Jan 2020 10:06:45 +0000 (21:06 +1100)] 
Fix a couple of mysig_t leftovers.

5 years agoRemove mysignal wrapper.
Darren Tucker [Thu, 23 Jan 2020 07:55:24 +0000 (18:55 +1100)] 
Remove mysignal wrapper.

We switched the main code to use sigaction(), so the wrapper is no
longer used.

5 years agoupstream: new sentence, new line;
jmc@openbsd.org [Thu, 23 Jan 2020 07:16:38 +0000 (07:16 +0000)] 
upstream: new sentence, new line;

OpenBSD-Commit-ID: b6c3f2f36ec77e99198619b38a9f146655281925

5 years agoupstream: Replace all calls to signal(2) with a wrapper around
dtucker@openbsd.org [Thu, 23 Jan 2020 07:10:22 +0000 (07:10 +0000)] 
upstream: Replace all calls to signal(2) with a wrapper around

sigaction(2). This wrapper blocks all other signals during the handler
preventing races between handlers, and sets SA_RESTART which should reduce
the potential for short read/write operations.

OpenBSD-Commit-ID: 5e047663fd77a40d7b07bdabe68529df51fd2519

5 years agoupstream: missing header change from previous; spotted by dtucker@
djm@openbsd.org [Thu, 23 Jan 2020 04:54:34 +0000 (04:54 +0000)] 
upstream: missing header change from previous; spotted by dtucker@

OpenBSD-Commit-ID: 321ce74c0a5bbd0f02fa3f20cb5cf2a952c6b96f

5 years agoupstream: Check for and warn about StrictModes permission problems. ok tb@
dtucker@openbsd.org [Thu, 23 Jan 2020 03:42:41 +0000 (03:42 +0000)] 
upstream: Check for and warn about StrictModes permission problems. ok tb@

OpenBSD-Regress-ID: 4841704ccdee50ee7efc6035bc686695c6ac2991

5 years agoupstream: Also test PuTTY chacha20.
dtucker@openbsd.org [Thu, 23 Jan 2020 03:35:07 +0000 (03:35 +0000)] 
upstream: Also test PuTTY chacha20.

OpenBSD-Regress-ID: 7af6a0e8763b05f1f8eee6bca5f31fcb16151040

5 years agoupstream: Also test PuTTY ecdh kex methods.
dtucker@openbsd.org [Thu, 23 Jan 2020 03:24:38 +0000 (03:24 +0000)] 
upstream: Also test PuTTY ecdh kex methods.

OpenBSD-Regress-ID: ec4017dce612131842398a03e93007a869c2c133

5 years agoupstream: Remove unsupported algorithms from list of defaults at run
dtucker@openbsd.org [Thu, 23 Jan 2020 02:46:49 +0000 (02:46 +0000)] 
upstream: Remove unsupported algorithms from list of defaults at run

time and remove ifdef and distinct settings for OPENSSL=no case.

This will make things much simpler for -portable where the exact set
of algos depends on the configuration of both OpenSSH and the libcrypto
it's linked against (if any).  ok djm@

OpenBSD-Commit-ID: e0116d0183dcafc7a9c40ba5fe9127805c5dfdd2

5 years agoupstream: add a new signature operations "find-principal" to look
djm@openbsd.org [Thu, 23 Jan 2020 02:43:48 +0000 (02:43 +0000)] 
upstream: add a new signature operations "find-principal" to look

up the principal associated with a signature from an allowed-signers file.
Work by Sebastian Kinne; ok dtucker@

OpenBSD-Commit-ID: 6f782cc7e18e38fcfafa62af53246a1dcfe74e5d

5 years agoupstream: Ignore whitespace when checking explict fingerprint.
dtucker@openbsd.org [Wed, 22 Jan 2020 07:38:30 +0000 (07:38 +0000)] 
upstream: Ignore whitespace when checking explict fingerprint.

When confirming a host key using the fingerprint itself, ignore leading and
trailing whitespace. ok deraadt@ djm@

OpenBSD-Commit-ID: cafd7f803bbdcd40c3a8f8f1a77747e6b6d8c011

5 years agoupstream: Increase keyscan timeout from default. On slow hosts 3
dtucker@openbsd.org [Wed, 22 Jan 2020 07:31:27 +0000 (07:31 +0000)] 
upstream: Increase keyscan timeout from default. On slow hosts 3

concurrent keyscans can hit the default 5 second timeout, so increase to 15
seconds.

OpenBSD-Regress-ID: 16383dec166af369b7fb9948572856f5d544c93f

5 years agoupstream: remove diffie-hellman-group14-sha1 from default kex to
tedu@openbsd.org [Wed, 22 Jan 2020 04:58:23 +0000 (04:58 +0000)] 
upstream: remove diffie-hellman-group14-sha1 from default kex to

see what happens. general mostly ok

OpenBSD-Commit-ID: 216b7b8462d2ef5f4531f26cb2cb839b2153dad9

5 years agoupstream: For ssh-keygen -lF only add a space after key fingerprint
claudio@openbsd.org [Wed, 22 Jan 2020 04:51:51 +0000 (04:51 +0000)] 
upstream: For ssh-keygen -lF only add a space after key fingerprint

when there is a comment. This makes copy-paste of fingerprints into ssh
easier. OK djm@

OpenBSD-Commit-ID: fa01d95624f65c1eb4dc7c575d20d77c78010dfd

5 years agoupstream: some __func__ and strerror(errno) here; no functional
djm@openbsd.org [Wed, 22 Jan 2020 04:49:16 +0000 (04:49 +0000)] 
upstream: some __func__ and strerror(errno) here; no functional

change

OpenBSD-Commit-ID: 6c3ddd5f848b99ea560b31d3fba99ceed66cef37

5 years agoupstream: factor out parsing of allowed-signers lines
djm@openbsd.org [Wed, 22 Jan 2020 02:25:21 +0000 (02:25 +0000)] 
upstream: factor out parsing of allowed-signers lines

OpenBSD-Commit-ID: 85ee6aeff608371826019ea85e55bfa87f79d06e

5 years agounbreak fuzzer support for recent ssh-sk.h changes
Damien Miller [Tue, 21 Jan 2020 23:30:13 +0000 (10:30 +1100)] 
unbreak fuzzer support for recent ssh-sk.h changes

5 years agoupstream: expose the number of currently-authenticating connections
djm@openbsd.org [Tue, 21 Jan 2020 22:39:57 +0000 (22:39 +0000)] 
upstream: expose the number of currently-authenticating connections

along with the MaxStartups limit in the proctitle; suggestion from Philipp
Marek, w/ feedback from Craig Miskell ok dtucker@

OpenBSD-Commit-ID: a4a6db2dc1641a5df8eddf7d6652176e359dffb3

5 years agoupstream: document the default value of the ControlPersist option;
naddy@openbsd.org [Tue, 21 Jan 2020 12:40:04 +0000 (12:40 +0000)] 
upstream: document the default value of the ControlPersist option;

ok dtucker@ djm@

OpenBSD-Commit-ID: 0788e7f2b5a9d4e36d3d2ab378f73329320fef66

5 years agoremove accidental change in f8c11461
Damien Miller [Tue, 21 Jan 2020 22:28:32 +0000 (09:28 +1100)] 
remove accidental change in f8c11461

5 years agoupstream: don't #ifdef out the KRL code when compiling without
djm@openbsd.org [Tue, 21 Jan 2020 11:06:09 +0000 (11:06 +0000)] 
upstream: don't #ifdef out the KRL code when compiling without

libcrypto support; it works just fine and disabling it breaks a few tests. ok
dtucker@

OpenBSD-Commit-ID: 65f6272c4241eb4b04de78b012fe98b2b555ad44

5 years agoupstream: pass SSH_SK_HELPER explicitly past $SUDO to avoid it getting
djm@openbsd.org [Tue, 21 Jan 2020 08:06:27 +0000 (08:06 +0000)] 
upstream: pass SSH_SK_HELPER explicitly past $SUDO to avoid it getting

cleared; with dtucker@

OpenBSD-Regress-ID: 03178a0580324bf0dff28f7eac6c3edbc5407f8e

5 years agoupstream: check access(ssh-sk-helper, X_OK) to provide friendly
djm@openbsd.org [Tue, 21 Jan 2020 07:07:31 +0000 (07:07 +0000)] 
upstream: check access(ssh-sk-helper, X_OK) to provide friendly

error message for misconfigured helper paths

OpenBSD-Commit-ID: 061bcc262155d12e726305c91394ac0aaf1f8341

5 years agoupstream: Document sntrup4591761x25519-sha512@tinyssh.org. Patch
dtucker@openbsd.org [Tue, 21 Jan 2020 06:09:56 +0000 (06:09 +0000)] 
upstream: Document sntrup4591761x25519-sha512@tinyssh.org. Patch

from jtesta@positronsecurity.com via github PR#151.

OpenBSD-Commit-ID: f3d48168623045c258245c340a5a2af7dbb74edc

5 years agoupstream: fix ssh-keygen not displaying authenticator touch
djm@openbsd.org [Tue, 21 Jan 2020 05:56:56 +0000 (05:56 +0000)] 
upstream: fix ssh-keygen not displaying authenticator touch

prompt; reported by jmc@

OpenBSD-Commit-ID: 04d4f582fc194eb3897ebcbfe286c49958ba2859

5 years agoupstream: a little more verbosity in sign_and_send_pubkey() debug
djm@openbsd.org [Tue, 21 Jan 2020 05:56:27 +0000 (05:56 +0000)] 
upstream: a little more verbosity in sign_and_send_pubkey() debug

messages

OpenBSD-Commit-ID: 6da47a0e6373f6683006f49bc2a516d197655508

5 years agoupstream: one more replacement "(security) key" -> "(FIDO)
naddy@openbsd.org [Sat, 18 Jan 2020 21:16:43 +0000 (21:16 +0000)] 
upstream: one more replacement "(security) key" -> "(FIDO)

authenticator"

OpenBSD-Commit-ID: 031bca03c1d1f878ab929facd561911f1bc68dfd

5 years agoupstream: undo merge error and replace the term "security key"
naddy@openbsd.org [Sat, 18 Jan 2020 15:45:41 +0000 (15:45 +0000)] 
upstream: undo merge error and replace the term "security key"

again

OpenBSD-Commit-ID: 341749062c089cc360a7877e9ee3a887aecde395

5 years agoupstream: Document loading of resident keys from a FIDO
naddy@openbsd.org [Fri, 17 Jan 2020 20:13:47 +0000 (20:13 +0000)] 
upstream: Document loading of resident keys from a FIDO

authenticator.

* Rename -O to -K to keep "-O option" available.
* Document -K.
* Trim usage() message down to synopsis, like all other commands.

ok markus@

OpenBSD-Commit-ID: 015c2c4b28f8e19107adc80351b44b23bca4c78a

5 years agoupstream: sync ssh-keygen.1 and ssh-keygen's usage() with each
naddy@openbsd.org [Tue, 14 Jan 2020 15:07:30 +0000 (15:07 +0000)] 
upstream: sync ssh-keygen.1 and ssh-keygen's usage() with each

other and reality ok markus@

OpenBSD-Commit-ID: cdf64454f2c3604c25977c944e5b6262a3bcce92

5 years agoupstream: revise the fix for reversed arguments on
naddy@openbsd.org [Sat, 11 Jan 2020 16:23:10 +0000 (16:23 +0000)] 
upstream: revise the fix for reversed arguments on

expand_proxy_command()

Always put 'host' before 'host_arg' for consistency.  ok markus@ djm@

OpenBSD-Commit-ID: 1ba5b25472779f1b1957295fcc6907bb961472a3

5 years agoupstream: pass the log-on-stderr flag and log level through to
djm@openbsd.org [Fri, 10 Jan 2020 23:43:26 +0000 (23:43 +0000)] 
upstream: pass the log-on-stderr flag and log level through to

ssh-sk-helper, making debugging a bit easier. ok markus@

OpenBSD-Commit-ID: 2e7aea6bf5770d3f38b7c7bba891069256c5a49a

5 years agoWrap copy_environment_blacklist() in #ifdef
Damien Miller [Tue, 21 Jan 2020 01:32:16 +0000 (12:32 +1100)] 
Wrap copy_environment_blacklist() in #ifdef

It's only needed for USE_PAM or HAVE_CYGWIN cases and will cause compiler
warnings otherwise.

5 years agodepend
Damien Miller [Tue, 21 Jan 2020 01:20:05 +0000 (12:20 +1100)] 
depend

5 years agoFix missing prototype warning for copy_environment
Ruben Kerkhof [Mon, 20 Jan 2020 10:56:48 +0000 (11:56 +0100)] 
Fix missing prototype warning for copy_environment

This function is only used in this file, and only on Cygwin, so make
it static and hide it behind HAVE_CYGWIN.  Prevents missing prototype
warning.

5 years agoconfigure.ac: fix ldns test
Ruben Kerkhof [Mon, 20 Jan 2020 12:58:11 +0000 (13:58 +0100)] 
configure.ac: fix ldns test

When running ./configure --with-ldns, if ldns-config cannot be found, we
add -Iyes/include to CPPFLAGS and -Lyes/lib to LDFLAGS. Fix that.

5 years agoMake sshpam_password_change_required static.
Ruben Kerkhof [Mon, 20 Jan 2020 11:13:26 +0000 (12:13 +0100)] 
Make sshpam_password_change_required static.

sshpam_password_change_required is only used in auth-pam.c, so make it
static to prevent a mising prototype warning.

5 years agosandbox-darwin.c: fix missing prototypes.
Ruben Kerkhof [Mon, 20 Jan 2020 11:24:51 +0000 (12:24 +0100)] 
sandbox-darwin.c: fix missing prototypes.

Include the right header just like the other sandbox files.
Fixes missing prototype warnings for ssh_sandbox_* functions.

5 years agoFix a few warnings when on Mac OS X.
Ruben Kerkhof [Mon, 20 Jan 2020 10:09:27 +0000 (11:09 +0100)] 
Fix a few warnings when on Mac OS X.

Include stdlib.h for calloc, malloc, free and setenv.

5 years agoFix building without openssl.
Ruben Kerkhof [Mon, 20 Jan 2020 09:32:23 +0000 (10:32 +0100)] 
Fix building without openssl.

This fixes the following when there are no openssl headers on the system:
ssh-ecdsa-sk.c:34:10: fatal error: 'openssl/bn.h' file not found

5 years agoAdd config.log to .gitignore
Ruben Kerkhof [Wed, 15 Jan 2020 15:08:55 +0000 (16:08 +0100)] 
Add config.log to .gitignore

5 years agoFix typo in README.md, s/crytpo/crypto/
Ruben Kerkhof [Wed, 15 Jan 2020 15:16:31 +0000 (16:16 +0100)] 
Fix typo in README.md, s/crytpo/crypto/

5 years agoWrap stdint.h in ifdef HAVE_STDINT_H.
Darren Tucker [Wed, 15 Jan 2020 05:22:36 +0000 (16:22 +1100)] 
Wrap stdint.h in ifdef HAVE_STDINT_H.

5 years agoWrap stdint.h inside HAVE_STDINT_H. 162/head
Darren Tucker [Tue, 14 Jan 2020 03:41:47 +0000 (14:41 +1100)] 
Wrap stdint.h inside HAVE_STDINT_H.

5 years agoInclude compat header for definitions.
Darren Tucker [Tue, 14 Jan 2020 03:26:41 +0000 (14:26 +1100)] 
Include compat header for definitions.

5 years agoImprove search for 'struct timespec'.
Darren Tucker [Mon, 13 Jan 2020 22:42:52 +0000 (09:42 +1100)] 
Improve search for 'struct timespec'.

Make struct timespec test consistent with existing timeval test.
Include time.h for timespec in compat header where required.

5 years agoUpdate depend to remove rmd160.h.
Darren Tucker [Tue, 14 Jan 2020 01:43:03 +0000 (12:43 +1100)] 
Update depend to remove rmd160.h.