]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
djm@openbsd.org [Fri, 31 Jan 2020 23:11:25 +0000 (23:11 +0000)]
upstream: force early logging to stderr if debug_flag (-d) is set;
avoids missing messages from re-exec config passing
OpenBSD-Commit-ID:
02484b8241c1f49010e7a543a7098e6910a8c9ff
djm@openbsd.org [Fri, 31 Jan 2020 23:08:08 +0000 (23:08 +0000)]
upstream: mistake in previous: filling the incorrect buffer
OpenBSD-Commit-ID:
862ee84bd4b97b529f64aec5d800c3dcde952e3a
djm@openbsd.org [Fri, 31 Jan 2020 22:42:45 +0000 (22:42 +0000)]
upstream: Add a sshd_config "Include" directive to allow inclusion
of files. This has sensible semantics wrt Match blocks and accepts glob(3)
patterns to specify the included files. Based on patch by Jakub Jelen in
bz2468; feedback and ok markus@
OpenBSD-Commit-ID:
36ed0e845b872e33f03355b936a4fff02d5794ff
jmc@openbsd.org [Fri, 31 Jan 2020 22:25:59 +0000 (22:25 +0000)]
upstream: spelling fix;
OpenBSD-Commit-ID:
3c079523c4b161725a4b15dd06348186da912402
djm@openbsd.org [Thu, 30 Jan 2020 22:25:34 +0000 (22:25 +0000)]
upstream: document changed default for UpdateHostKeys
OpenBSD-Commit-ID:
25c390b21d142f78ac0106241d13441c4265fd2c
djm@openbsd.org [Thu, 30 Jan 2020 22:19:32 +0000 (22:19 +0000)]
upstream: enable UpdateKnownHosts=yes if the configuration
specifies only the default known_hosts files, otherwise select
UpdateKnownHosts=ask; ok markus@
OpenBSD-Commit-ID:
ab401a5ec4a33d2e1a9449eae6202e4b6d427df7
Darren Tucker [Thu, 30 Jan 2020 07:54:42 +0000 (18:54 +1100)]
Look in inttypes.h for UINT32_MAX.
Should prevent warnings on at least some AIX versions.
djm@openbsd.org [Thu, 30 Jan 2020 07:21:38 +0000 (07:21 +0000)]
upstream: use sshpkt_fatal() instead of plain fatal() for
ssh_packet_write_poll() failures here too as the former yields better error
messages; ok dtucker@
OpenBSD-Commit-ID:
1f7a6ca95bc2b716c2e948fc1370753be772d8e3
djm@openbsd.org [Thu, 30 Jan 2020 07:20:57 +0000 (07:20 +0000)]
upstream: check the return value of ssh_packet_write_poll() and
call sshpkt_fatal() if it fails; avoid potential busy-loop under some
circumstances. Based on patch by Mike Frysinger; ok dtucker@
OpenBSD-Commit-ID:
c79fe5cf4f0cd8074cb6db257c1394d5139408ec
djm@openbsd.org [Thu, 30 Jan 2020 07:20:05 +0000 (07:20 +0000)]
upstream: have sshpkt_fatal() save/restore errno before we
potentially call strerror() (via ssh_err()); ok dtucker
OpenBSD-Commit-ID:
5590df31d21405498c848245b85c24acb84ad787
djm@openbsd.org [Wed, 29 Jan 2020 08:17:49 +0000 (08:17 +0000)]
upstream: markus suggests a simplification to previous
OpenBSD-Commit-ID:
10bbfb6607ebbb9a018dcd163f0964941adf58de
djm@openbsd.org [Wed, 29 Jan 2020 07:51:30 +0000 (07:51 +0000)]
upstream: give more context to UpdateHostKeys messages, mentioning
that the changes are validated by the existing trusted host key. Prompted by
espie@ feedback and ok markus@
OpenBSD-Commit-ID:
b3d95f4a45f2692f4143b9e77bb241184dbb8dc5
djm@openbsd.org [Tue, 28 Jan 2020 08:01:34 +0000 (08:01 +0000)]
upstream: changes to support FIDO attestation
Allow writing to disk the attestation certificate that is generated by
the FIDO token at key enrollment time. These certificates may be used
by an out-of-band workflow to prove that a particular key is held in
trustworthy hardware.
Allow passing in a challenge that will be sent to the card during
key enrollment. These are needed to build an attestation workflow
that resists replay attacks.
ok markus@
OpenBSD-Commit-ID:
457dc3c3d689ba39eed328f0817ed9b91a5f78f6
djm@openbsd.org [Tue, 28 Jan 2020 07:24:15 +0000 (07:24 +0000)]
upstream: disable UpdateHostKeys=ask when in quiet mode; "work for
me" matthieu@
OpenBSD-Commit-ID:
60d7b5eb91accf935ed9852650a826d86db2ddc7
Damien Miller [Tue, 28 Jan 2020 01:57:25 +0000 (12:57 +1100)]
compat for missing IPTOS_DSCP_LE in system headers
djm@openbsd.org [Tue, 28 Jan 2020 01:49:36 +0000 (01:49 +0000)]
upstream: make IPTOS_DSCP_LE available via IPQoS directive; bz2986,
based on patch by veegish AT cyberstorm.mu
OpenBSD-Commit-ID:
9902bf4fbb4ea51de2193ac2b1d965bc5d99c425
markus@openbsd.org [Mon, 27 Jan 2020 20:51:32 +0000 (20:51 +0000)]
upstream: disable UpdateHostKeys=ask if command is specified; ok
djm@ sthen@
OpenBSD-Commit-ID:
e5bcc45eadb78896637d4143d289f1e42c2ef5d7
djm@openbsd.org [Sun, 26 Jan 2020 00:09:50 +0000 (00:09 +0000)]
upstream: unbreak unittests for recent API / source file changes
OpenBSD-Regress-ID:
075a899a01bbf7781d38bf0b33d8366faaf6d3c0
Darren Tucker [Sun, 26 Jan 2020 04:09:15 +0000 (15:09 +1100)]
Move definition of UINT32_MAX.
This allows us to always define it if needed not just if we also
define the type ourself.
djm@openbsd.org [Sun, 26 Jan 2020 00:09:50 +0000 (00:09 +0000)]
upstream: unbreak unittests for recent API / source file changes
OpenBSD-Regress-ID:
075a899a01bbf7781d38bf0b33d8366faaf6d3c0
Darren Tucker [Sun, 26 Jan 2020 03:09:17 +0000 (14:09 +1100)]
Include signal.h to prevent redefintion of _NSIG.
Darren Tucker [Sun, 26 Jan 2020 02:40:51 +0000 (13:40 +1100)]
Wrap stdint.h in tests inside HAVE_STDINT_H.
djm@openbsd.org [Sun, 26 Jan 2020 00:14:45 +0000 (00:14 +0000)]
upstream: for UpdateHostKeys, don't report errors for unsupported
key types - just ignore them. spotted by and ok dtucker@
OpenBSD-Commit-ID:
91769e443f6197c983932fc8ae9d39948727d473
djm@openbsd.org [Sun, 26 Jan 2020 00:13:20 +0000 (00:13 +0000)]
upstream: downgrade error() for missing subsequent known_hosts
files to debug() as it was intended to be; spotted by dtucker@
OpenBSD-Commit-ID:
18cfea382cb52f2da761be524e309cc3d5354ef9
djm@openbsd.org [Sat, 25 Jan 2020 23:33:27 +0000 (23:33 +0000)]
upstream: clarify that BatchMode applies to all interactive prompts
(e.g. host key confirmation) and not just password prompts.
OpenBSD-Commit-ID:
97b001883d89d3fb1620d2e6b747c14a26aa9818
djm@openbsd.org [Sat, 25 Jan 2020 23:28:06 +0000 (23:28 +0000)]
upstream: tidy headers; some junk snuck into sshbuf-misc.c and
sshbuf-io.c doesn't need SSHBUF_INTERNAL set
OpenBSD-Commit-ID:
27a724d2e0b2619c1a1490f44093bbd73580d9e6
Damien Miller [Sat, 25 Jan 2020 23:28:21 +0000 (10:28 +1100)]
depend
djm@openbsd.org [Sat, 25 Jan 2020 23:13:09 +0000 (23:13 +0000)]
upstream: improve the error message for u2f enrollment errors by
making ssh-keygen be solely responsible for printing the error message and
convertint some more common error responses from the middleware to a useful
ssherr.h status code. more detail remains visible via -v of course.
also remove indepedent copy of sk-api.h declarations in sk-usbhid.c
and just include it.
feedback & ok markus@
OpenBSD-Commit-ID:
a4a8ffa870d9a3e0cfd76544bcdeef5c9fb1f1bb
djm@openbsd.org [Sat, 25 Jan 2020 23:02:13 +0000 (23:02 +0000)]
upstream: factor out reading/writing sshbufs to dedicated
functions; feedback and ok markus@
OpenBSD-Commit-ID:
dc09e5f1950b7acc91b8fdf8015347782d2ecd3d
djm@openbsd.org [Sat, 25 Jan 2020 22:49:38 +0000 (22:49 +0000)]
upstream: add a comment describing the ranges of channel IDs that
we use; requested by markus@
OpenBSD-Commit-ID:
83a1f09810ffa3a96a55fbe32675b34ba739e56b
djm@openbsd.org [Sat, 25 Jan 2020 22:41:01 +0000 (22:41 +0000)]
upstream: make sshd_config:ClientAliveCountMax=0 disable the
connection killing behaviour, rather than killing the connection after
sending the first liveness test probe (regardless of whether the client was
responsive) bz2627; ok markus
OpenBSD-Commit-ID:
5af79c35f4c9fa280643b6852f524bfcd9bccdaf
djm@openbsd.org [Sat, 25 Jan 2020 22:36:22 +0000 (22:36 +0000)]
upstream: clarify order of AllowUsers/DenyUsers vs
AllowGroups/DenyGroups; bz1690, ok markus@
OpenBSD-Commit-ID:
5637584ec30db9cf64822460f41b3e42c8f9facd
djm@openbsd.org [Sat, 25 Jan 2020 07:17:18 +0000 (07:17 +0000)]
upstream: when AddKeysToAgent=yes is set and the key contains no
comment, add the key to the agent with the key's path as the comment. bz2564
OpenBSD-Commit-ID:
8dd8ca9340d7017631a27f4ed5358a4cfddec16f
tedu@openbsd.org [Sat, 25 Jan 2020 07:09:14 +0000 (07:09 +0000)]
upstream: group14-sha1 is no longer a default algorithm
OpenBSD-Commit-ID:
a96f04d5e9c2ff760c6799579dc44f69b4ff431d
djm@openbsd.org [Sat, 25 Jan 2020 07:02:51 +0000 (07:02 +0000)]
upstream: reword HashKnownHosts description a little more; some
people found the wording confusing (bz#2560)
OpenBSD-Commit-ID:
ac30896598694f07d498828690aecd424c496988
djm@openbsd.org [Sat, 25 Jan 2020 07:01:00 +0000 (07:01 +0000)]
upstream: weaken the language for what HashKnownHosts provides with
regards to known_hosts name privacy, it's not practical for this option to
offer any guarantee that hostnames cannot be recovered from a disclosed
known_hosts file (e.g. by brute force).
OpenBSD-Commit-ID:
13f1e3285f8acf7244e9770074296bcf446c6972
djm@openbsd.org [Sat, 25 Jan 2020 06:40:20 +0000 (06:40 +0000)]
upstream: the GatewayPorts vs -R listen address selection logic is
still confusing people, so add another comment explaining the special
handling of "localhost"; bz#3258
OpenBSD-Commit-ID:
e6bf0f0fbf1c7092bf0dbd9c6eab105970b5b53a
djm@openbsd.org [Sat, 25 Jan 2020 06:03:10 +0000 (06:03 +0000)]
upstream: mention that permitopen=/PermitOpen do no name to address
translation; prompted by bz3099
OpenBSD-Commit-ID:
0dda8e54d566b29855e76bebf9cfecce573f5c23
Damien Miller [Sat, 25 Jan 2020 05:30:22 +0000 (16:30 +1100)]
include tunnel device path in error message
djm@openbsd.org [Sat, 25 Jan 2020 04:48:26 +0000 (04:48 +0000)]
upstream: unrevert this:
> revision 1.217
> date: 2019/11/27 03:34:04; author: dtucker; state: Exp; lines: +5 -7; commitid: wkiMn49XJyjzoJIs;
> Make channel_id u_int32_t and remove unnecessary check and cast that were
> left over from the type conversion. Noted by t-hashida@amiya.co.jp in
> bz#3098, ok markus@ djm@
Darren was right the first time; ok dtucker@ "agreed" markus@
OpenBSD-Commit-ID:
641dd1b99a6bbd85b7160da462ae1be83432c7c8
dtucker@openbsd.org [Sat, 25 Jan 2020 02:57:53 +0000 (02:57 +0000)]
upstream: Move setting $NC into test-exec since it's now used by
multiple tests, and in -portable we use our own local copy to avoid
portability problems.
OpenBSD-Regress-ID:
ceb78445fcaac317bec2fc51b3f0d9589048c114
Darren Tucker [Sat, 25 Jan 2020 02:05:42 +0000 (13:05 +1100)]
Put EC key export inside OPENSSL_HAS_ECC.
Fixes link error when building against an OpenSSL that does not have
ECC.
dtucker@openbsd.org [Sat, 25 Jan 2020 00:27:56 +0000 (00:27 +0000)]
upstream: Wait a bit longer for the multiplex master to become ready
since on very slow hosts the current delay is not sufficient and the test
will fail.
OpenBSD-Regress-ID:
6d90c7475d67ac3a95610b64af700629ece51a48
dtucker@openbsd.org [Fri, 24 Jan 2020 10:08:17 +0000 (10:08 +0000)]
upstream: Add a connection test for proxycommand. This would have
caught the problem caused by ssh.c rev 1.507 wherein Host and Hostname were
swapped. Prompted by beck@
OpenBSD-Regress-ID:
d218500ae6aca4c479c27318fb5b09ebc00f7aae
djm@openbsd.org [Sat, 25 Jan 2020 00:22:31 +0000 (00:22 +0000)]
upstream: set UpdateKnownHosts=ask by default; bz#2894; ok
markus@
OpenBSD-Commit-ID:
f09cb3177f3a14c96428e14f347e976a8a531fee
djm@openbsd.org [Sat, 25 Jan 2020 00:21:08 +0000 (00:21 +0000)]
upstream: allow UpdateKnownHosts=yes to function when multiple
known_hosts files are in use. When updating host keys, ssh will now search
subsequent known_hosts files, but will add new/changed host keys to the first
specified file only. bz#2738
ok markus@
OpenBSD-Commit-ID:
6ded6d878a03e57d5aa20bab9c31f92e929dbc6c
djm@openbsd.org [Sat, 25 Jan 2020 00:06:48 +0000 (00:06 +0000)]
upstream: process security key provider via realpath() in agent,
avoids malicious client from being able to cause agent to load arbitrary
libraries into ssh-sk-helper.
reported by puck AT puckipedia.com; ok markus
OpenBSD-Commit-ID:
1086643df1b7eee4870825c687cf0c26a6145d1c
djm@openbsd.org [Sat, 25 Jan 2020 00:03:36 +0000 (00:03 +0000)]
upstream: expose PKCS#11 key labels/X.509 subjects as comments
Extract the key label or X.509 subject string when PKCS#11 keys
are retrieved from the token and plumb this through to places where
it may be used as a comment.
based on https://github.com/openssh/openssh-portable/pull/138
by Danielle Church
feedback and ok markus@
OpenBSD-Commit-ID:
cae1fda10d9e10971dea29520916e27cfec7ca35
djm@openbsd.org [Fri, 24 Jan 2020 23:56:01 +0000 (23:56 +0000)]
upstream: tweak proctitle to include sshd arguments, as these are
frequently used to distinguish between multiple independent instances of the
server. New proctitle looks like this:
$ pgrep -lf sshd
12844 sshd: /usr/sbin/sshd -f /etc/ssh/sshd_config [listener] 0 of 10-100 startups
requested by sthen@ and aja@; ok aja@
OpenBSD-Commit-ID:
cf235a561c655a3524a82003cf7244ecb48ccc1e
djm@openbsd.org [Fri, 24 Jan 2020 23:54:40 +0000 (23:54 +0000)]
upstream: add xextendf() to extend a string with a format
(reallocating as necessary). ok aja@ as part of a larger diff
OpenBSD-Commit-ID:
30796b50d330b3e0e201747fe40cdf9aa70a77f9
djm@openbsd.org [Fri, 24 Jan 2020 05:33:01 +0000 (05:33 +0000)]
upstream: minor tweaks to ssh-keygen -Y find-principals:
emit matched principals one per line to stdout rather than as comma-
separated and with a free-text preamble (easy confusion opportunity)
emit "not found" error to stderr
fix up argument testing for -Y operations and improve error message for
unsupported operations
OpenBSD-Commit-ID:
3d9c9a671ab07fc04a48f543edfa85eae77da69c
djm@openbsd.org [Fri, 24 Jan 2020 00:28:57 +0000 (00:28 +0000)]
upstream: remove ssh-rsa (SHA1) from the list of allowed CA
signature algorithms ok markus
OpenBSD-Commit-ID:
da3481fca8c81e6951f319a86b7be67502237f57
djm@openbsd.org [Fri, 24 Jan 2020 00:27:04 +0000 (00:27 +0000)]
upstream: when signing a certificate with an RSA key, default to
a safe signature algorithm (rsa-sha-512) if not is explicitly specified by
the user; ok markus@
OpenBSD-Commit-ID:
e05f638f0be6c0266e1d3d799716b461011e83a9
djm@openbsd.org [Fri, 24 Jan 2020 00:00:31 +0000 (00:00 +0000)]
upstream: allow PEM export of DSA and ECDSA keys; bz3091, patch
from Jakub Jelen ok markus@
OpenBSD-Commit-ID:
a58edec8b9f07acab4b962a71a5125830d321b51
djm@openbsd.org [Thu, 23 Jan 2020 23:31:52 +0000 (23:31 +0000)]
upstream: ssh-keygen -Y find-principals fixes based on feedback
from Markus:
use "principals" instead of principal, as allowed_signers lines may list
multiple.
When the signing key is a certificate, emit only principals that match
the certificate principal list.
NB. the command -Y name changes: "find-principal" => "find-principals"
ok markus@
OpenBSD-Commit-ID:
ab575946ff9a55624cd4e811bfd338bf3b1d0faf
dtucker@openbsd.org [Fri, 24 Jan 2020 01:29:23 +0000 (01:29 +0000)]
upstream: Do not warn about permissions on symlinks.
OpenBSD-Regress-ID:
339d4cbae224bd8743ffad9c3afb0cf3cb66c357
dtucker@openbsd.org [Thu, 23 Jan 2020 11:19:12 +0000 (11:19 +0000)]
upstream: Handle zlib compression being disabled now that it's
optional.
OpenBSD-Regress-ID:
0af4fbc5168e62f89d0350de524bff1cb00e707a
dtucker@openbsd.org [Thu, 23 Jan 2020 10:53:04 +0000 (10:53 +0000)]
upstream: Fix typo in comment.
OpenBSD-Commit-ID:
d1d7a6553208bf439378fd1cf686a828aceb353a
dtucker@openbsd.org [Thu, 23 Jan 2020 10:19:59 +0000 (10:19 +0000)]
upstream: When checking for unsafe directories, ignore non-directories
(ie symlinks, where permissions are not relevant).
OpenBSD-Regress-ID:
fb6cfc8b022becb62b2dcb99ed3f072b3326e501
Darren Tucker [Thu, 23 Jan 2020 11:17:24 +0000 (22:17 +1100)]
zlib is now optional.
Darren Tucker [Thu, 23 Jan 2020 11:16:51 +0000 (22:16 +1100)]
Plumb WITH_ZLIB into configure.
This allows zlib support to be disabled by ./configure --without-zlib.
dtucker@openbsd.org [Thu, 23 Jan 2020 10:24:29 +0000 (10:24 +0000)]
upstream: Make zlib optional. This adds a "ZLIB" build time option
that allows building without zlib compression and associated options. With
feedback from markus@, ok djm@
OpenBSD-Commit-ID:
44c6e1133a90fd15a3aa865bdedc53bab28b7910
djm@openbsd.org [Thu, 23 Jan 2020 07:54:04 +0000 (07:54 +0000)]
upstream: remove trailing period characters from pub/priv key
pathnames - they make them needlessly more difficult to cut and paste without
error; ok markus@ & dtucker@
OpenBSD-Commit-ID:
abdcfd1a5723fcac0711feee7665edc66ae2335a
Darren Tucker [Thu, 23 Jan 2020 10:06:45 +0000 (21:06 +1100)]
Fix a couple of mysig_t leftovers.
Darren Tucker [Thu, 23 Jan 2020 07:55:24 +0000 (18:55 +1100)]
Remove mysignal wrapper.
We switched the main code to use sigaction(), so the wrapper is no
longer used.
jmc@openbsd.org [Thu, 23 Jan 2020 07:16:38 +0000 (07:16 +0000)]
upstream: new sentence, new line;
OpenBSD-Commit-ID:
b6c3f2f36ec77e99198619b38a9f146655281925
dtucker@openbsd.org [Thu, 23 Jan 2020 07:10:22 +0000 (07:10 +0000)]
upstream: Replace all calls to signal(2) with a wrapper around
sigaction(2). This wrapper blocks all other signals during the handler
preventing races between handlers, and sets SA_RESTART which should reduce
the potential for short read/write operations.
OpenBSD-Commit-ID:
5e047663fd77a40d7b07bdabe68529df51fd2519
djm@openbsd.org [Thu, 23 Jan 2020 04:54:34 +0000 (04:54 +0000)]
upstream: missing header change from previous; spotted by dtucker@
OpenBSD-Commit-ID:
321ce74c0a5bbd0f02fa3f20cb5cf2a952c6b96f
dtucker@openbsd.org [Thu, 23 Jan 2020 03:42:41 +0000 (03:42 +0000)]
upstream: Check for and warn about StrictModes permission problems. ok tb@
OpenBSD-Regress-ID:
4841704ccdee50ee7efc6035bc686695c6ac2991
dtucker@openbsd.org [Thu, 23 Jan 2020 03:35:07 +0000 (03:35 +0000)]
upstream: Also test PuTTY chacha20.
OpenBSD-Regress-ID:
7af6a0e8763b05f1f8eee6bca5f31fcb16151040
dtucker@openbsd.org [Thu, 23 Jan 2020 03:24:38 +0000 (03:24 +0000)]
upstream: Also test PuTTY ecdh kex methods.
OpenBSD-Regress-ID:
ec4017dce612131842398a03e93007a869c2c133
dtucker@openbsd.org [Thu, 23 Jan 2020 02:46:49 +0000 (02:46 +0000)]
upstream: Remove unsupported algorithms from list of defaults at run
time and remove ifdef and distinct settings for OPENSSL=no case.
This will make things much simpler for -portable where the exact set
of algos depends on the configuration of both OpenSSH and the libcrypto
it's linked against (if any). ok djm@
OpenBSD-Commit-ID:
e0116d0183dcafc7a9c40ba5fe9127805c5dfdd2
djm@openbsd.org [Thu, 23 Jan 2020 02:43:48 +0000 (02:43 +0000)]
upstream: add a new signature operations "find-principal" to look
up the principal associated with a signature from an allowed-signers file.
Work by Sebastian Kinne; ok dtucker@
OpenBSD-Commit-ID:
6f782cc7e18e38fcfafa62af53246a1dcfe74e5d
dtucker@openbsd.org [Wed, 22 Jan 2020 07:38:30 +0000 (07:38 +0000)]
upstream: Ignore whitespace when checking explict fingerprint.
When confirming a host key using the fingerprint itself, ignore leading and
trailing whitespace. ok deraadt@ djm@
OpenBSD-Commit-ID:
cafd7f803bbdcd40c3a8f8f1a77747e6b6d8c011
dtucker@openbsd.org [Wed, 22 Jan 2020 07:31:27 +0000 (07:31 +0000)]
upstream: Increase keyscan timeout from default. On slow hosts 3
concurrent keyscans can hit the default 5 second timeout, so increase to 15
seconds.
OpenBSD-Regress-ID:
16383dec166af369b7fb9948572856f5d544c93f
tedu@openbsd.org [Wed, 22 Jan 2020 04:58:23 +0000 (04:58 +0000)]
upstream: remove diffie-hellman-group14-sha1 from default kex to
see what happens. general mostly ok
OpenBSD-Commit-ID:
216b7b8462d2ef5f4531f26cb2cb839b2153dad9
claudio@openbsd.org [Wed, 22 Jan 2020 04:51:51 +0000 (04:51 +0000)]
upstream: For ssh-keygen -lF only add a space after key fingerprint
when there is a comment. This makes copy-paste of fingerprints into ssh
easier. OK djm@
OpenBSD-Commit-ID:
fa01d95624f65c1eb4dc7c575d20d77c78010dfd
djm@openbsd.org [Wed, 22 Jan 2020 04:49:16 +0000 (04:49 +0000)]
upstream: some __func__ and strerror(errno) here; no functional
change
OpenBSD-Commit-ID:
6c3ddd5f848b99ea560b31d3fba99ceed66cef37
djm@openbsd.org [Wed, 22 Jan 2020 02:25:21 +0000 (02:25 +0000)]
upstream: factor out parsing of allowed-signers lines
OpenBSD-Commit-ID:
85ee6aeff608371826019ea85e55bfa87f79d06e
Damien Miller [Tue, 21 Jan 2020 23:30:13 +0000 (10:30 +1100)]
unbreak fuzzer support for recent ssh-sk.h changes
djm@openbsd.org [Tue, 21 Jan 2020 22:39:57 +0000 (22:39 +0000)]
upstream: expose the number of currently-authenticating connections
along with the MaxStartups limit in the proctitle; suggestion from Philipp
Marek, w/ feedback from Craig Miskell ok dtucker@
OpenBSD-Commit-ID:
a4a6db2dc1641a5df8eddf7d6652176e359dffb3
naddy@openbsd.org [Tue, 21 Jan 2020 12:40:04 +0000 (12:40 +0000)]
upstream: document the default value of the ControlPersist option;
ok dtucker@ djm@
OpenBSD-Commit-ID:
0788e7f2b5a9d4e36d3d2ab378f73329320fef66
Damien Miller [Tue, 21 Jan 2020 22:28:32 +0000 (09:28 +1100)]
remove accidental change in
f8c11461
djm@openbsd.org [Tue, 21 Jan 2020 11:06:09 +0000 (11:06 +0000)]
upstream: don't #ifdef out the KRL code when compiling without
libcrypto support; it works just fine and disabling it breaks a few tests. ok
dtucker@
OpenBSD-Commit-ID:
65f6272c4241eb4b04de78b012fe98b2b555ad44
djm@openbsd.org [Tue, 21 Jan 2020 08:06:27 +0000 (08:06 +0000)]
upstream: pass SSH_SK_HELPER explicitly past $SUDO to avoid it getting
cleared; with dtucker@
OpenBSD-Regress-ID:
03178a0580324bf0dff28f7eac6c3edbc5407f8e
djm@openbsd.org [Tue, 21 Jan 2020 07:07:31 +0000 (07:07 +0000)]
upstream: check access(ssh-sk-helper, X_OK) to provide friendly
error message for misconfigured helper paths
OpenBSD-Commit-ID:
061bcc262155d12e726305c91394ac0aaf1f8341
dtucker@openbsd.org [Tue, 21 Jan 2020 06:09:56 +0000 (06:09 +0000)]
upstream: Document sntrup4591761x25519-sha512@tinyssh.org. Patch
from jtesta@positronsecurity.com via github PR#151.
OpenBSD-Commit-ID:
f3d48168623045c258245c340a5a2af7dbb74edc
djm@openbsd.org [Tue, 21 Jan 2020 05:56:56 +0000 (05:56 +0000)]
upstream: fix ssh-keygen not displaying authenticator touch
prompt; reported by jmc@
OpenBSD-Commit-ID:
04d4f582fc194eb3897ebcbfe286c49958ba2859
djm@openbsd.org [Tue, 21 Jan 2020 05:56:27 +0000 (05:56 +0000)]
upstream: a little more verbosity in sign_and_send_pubkey() debug
messages
OpenBSD-Commit-ID:
6da47a0e6373f6683006f49bc2a516d197655508
naddy@openbsd.org [Sat, 18 Jan 2020 21:16:43 +0000 (21:16 +0000)]
upstream: one more replacement "(security) key" -> "(FIDO)
authenticator"
OpenBSD-Commit-ID:
031bca03c1d1f878ab929facd561911f1bc68dfd
naddy@openbsd.org [Sat, 18 Jan 2020 15:45:41 +0000 (15:45 +0000)]
upstream: undo merge error and replace the term "security key"
again
OpenBSD-Commit-ID:
341749062c089cc360a7877e9ee3a887aecde395
naddy@openbsd.org [Fri, 17 Jan 2020 20:13:47 +0000 (20:13 +0000)]
upstream: Document loading of resident keys from a FIDO
authenticator.
* Rename -O to -K to keep "-O option" available.
* Document -K.
* Trim usage() message down to synopsis, like all other commands.
ok markus@
OpenBSD-Commit-ID:
015c2c4b28f8e19107adc80351b44b23bca4c78a
naddy@openbsd.org [Tue, 14 Jan 2020 15:07:30 +0000 (15:07 +0000)]
upstream: sync ssh-keygen.1 and ssh-keygen's usage() with each
other and reality ok markus@
OpenBSD-Commit-ID:
cdf64454f2c3604c25977c944e5b6262a3bcce92
naddy@openbsd.org [Sat, 11 Jan 2020 16:23:10 +0000 (16:23 +0000)]
upstream: revise the fix for reversed arguments on
expand_proxy_command()
Always put 'host' before 'host_arg' for consistency. ok markus@ djm@
OpenBSD-Commit-ID:
1ba5b25472779f1b1957295fcc6907bb961472a3
djm@openbsd.org [Fri, 10 Jan 2020 23:43:26 +0000 (23:43 +0000)]
upstream: pass the log-on-stderr flag and log level through to
ssh-sk-helper, making debugging a bit easier. ok markus@
OpenBSD-Commit-ID:
2e7aea6bf5770d3f38b7c7bba891069256c5a49a
Damien Miller [Tue, 21 Jan 2020 01:32:16 +0000 (12:32 +1100)]
Wrap copy_environment_blacklist() in #ifdef
It's only needed for USE_PAM or HAVE_CYGWIN cases and will cause compiler
warnings otherwise.
Damien Miller [Tue, 21 Jan 2020 01:20:05 +0000 (12:20 +1100)]
depend
Ruben Kerkhof [Mon, 20 Jan 2020 10:56:48 +0000 (11:56 +0100)]
Fix missing prototype warning for copy_environment
This function is only used in this file, and only on Cygwin, so make
it static and hide it behind HAVE_CYGWIN. Prevents missing prototype
warning.
Ruben Kerkhof [Mon, 20 Jan 2020 12:58:11 +0000 (13:58 +0100)]
configure.ac: fix ldns test
When running ./configure --with-ldns, if ldns-config cannot be found, we
add -Iyes/include to CPPFLAGS and -Lyes/lib to LDFLAGS. Fix that.
Ruben Kerkhof [Mon, 20 Jan 2020 11:13:26 +0000 (12:13 +0100)]
Make sshpam_password_change_required static.
sshpam_password_change_required is only used in auth-pam.c, so make it
static to prevent a mising prototype warning.