]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
Damien Miller [Sun, 2 Mar 2025 11:06:53 +0000 (22:06 +1100)]
include __builtin_popcount replacement function
Some systems/compilers lack __builtin_popcount(), so replace it as
necessary. Reported by Dennis Clarke; ok dtucker@
djm@openbsd.org [Sun, 2 Mar 2025 11:03:13 +0000 (11:03 +0000)]
upstream: whitespace
OpenBSD-Commit-ID:
1bd8953a37451ef7e0991f9fceec5e8005fe986a
dtucker@openbsd.org [Sun, 2 Mar 2025 07:02:49 +0000 (07:02 +0000)]
upstream: Make a copy of the user when handling ssh -l, so that
later during User token expansion we don't end up freeing a member of argv.
Spotted by anton@'s regress tests.
OpenBSD-Commit-ID:
2f671a4f5726b66d123b88b1fdd1a90581339955
dtucker@openbsd.org [Sat, 1 Mar 2025 06:11:26 +0000 (06:11 +0000)]
upstream: Allow %-token and environment variable expansion in User,
with the exception of %r and %C which are self-referential. Requested in
bz#3477, ok djm@, man page improvements jmc@
OpenBSD-Commit-ID:
caeb46251ee073662f6f5864c6f7b92d8ac80fa8
Darren Tucker [Fri, 28 Feb 2025 23:28:59 +0000 (10:28 +1100)]
Rebuild config files if Makefile changes.
This ensures paths are updated if they are changed by re-running configure.
Patch from rapier at psc.edu.
Darren Tucker [Wed, 26 Feb 2025 07:16:03 +0000 (18:16 +1100)]
Check for le32toh, le64toh, htole64 individually.
It appears that at least some versions of endian.h in glibc do not have
the latter two, so check for and replace each one individually.
bz#3794, ok djm@
djm@openbsd.org [Tue, 25 Feb 2025 06:25:30 +0000 (06:25 +0000)]
upstream: ressurect fix for "match invalid-user" that got clobbered
by 1.423
OpenBSD-Commit-ID:
d18bf0945976e0f3467d710d4bc8bdbe181c0567
deraadt@openbsd.org [Fri, 21 Feb 2025 18:22:41 +0000 (18:22 +0000)]
upstream: Also prohibit , (comma) in hostnames, proposed by David
Leadbeater ok djm millert
OpenBSD-Commit-ID:
2837fa31dc6e81976f510f0a259edaa559b20b07
Damien Miller [Mon, 24 Feb 2025 06:27:50 +0000 (17:27 +1100)]
Try to fix github tcmalloc target failure
tcmalloc may, depending on the stacktrace generator it uses, create
pipe(2) fds during shared library initialisation. These will later
get clobbered by ssh/sshd calling closefrom() and chaos will ensue.
Tell tcmalloc to use an unwinder that doesn't pull this stuff.
Damien Miller [Fri, 21 Feb 2025 02:44:35 +0000 (13:44 +1100)]
cleanup last mention of ubuntu-20.04
Damien Miller [Fri, 21 Feb 2025 02:44:13 +0000 (13:44 +1100)]
prune gcc/clang versions to be tested
Test only the oldest and latest versions of each
Damien Miller [Fri, 21 Feb 2025 00:30:22 +0000 (11:30 +1100)]
Update AWS-LC version number
Patch from Shubham Mittal bz bz3792
Damien Miller [Fri, 21 Feb 2025 00:22:34 +0000 (11:22 +1100)]
adjust workflows for ubuntu version transition
remove workflows for unsupported compilers, add a few for additional
supported compilers, move some workflows to run on ubuntu-latest
Damien Miller [Thu, 20 Feb 2025 06:10:32 +0000 (17:10 +1100)]
Add ubuntu-*-arm test runners
Damien Miller [Thu, 20 Feb 2025 06:03:28 +0000 (17:03 +1100)]
remove ubuntu-20.04 Github action runners
ubuntu-20.04 is deprecated now, so migrate all its unique runners
to ubuntu-22.04.
ok dtucker@
Damien Miller [Tue, 18 Feb 2025 08:03:42 +0000 (19:03 +1100)]
openssh-9.9p2
djm@openbsd.org [Tue, 18 Feb 2025 08:02:48 +0000 (08:02 +0000)]
upstream: Fix cases where error codes were not correctly set
Reported by the Qualys Security Advisory team. ok markus@
OpenBSD-Commit-ID:
7bcd4ffe0fa1e27ff98d451fb9c22f5fae6e610d
djm@openbsd.org [Tue, 18 Feb 2025 08:02:12 +0000 (08:02 +0000)]
upstream: Don't reply to PING in preauth phase or during KEX
Reported by the Qualys Security Advisory team. ok markus@
OpenBSD-Commit-ID:
c656ac4abd1504389d1733d85152044b15830217
jmc@openbsd.org [Sat, 15 Feb 2025 06:48:56 +0000 (06:48 +0000)]
upstream: - use \& when contructs like "e.g." end a line, to avoid
double spacing - macro is Qq not Oq
OpenBSD-Commit-ID:
17e5d2d7f288cc7fc536e3af252224525f9fb43a
Damien Miller [Sat, 15 Feb 2025 02:12:40 +0000 (13:12 +1100)]
depend
djm@openbsd.org [Sat, 15 Feb 2025 01:52:07 +0000 (01:52 +0000)]
upstream: add "Match version" support to ssh_config. Allows
matching on the local version of OpenSSH, e.g. "Match version OpenSSH_10.*"
ok markus@
OpenBSD-Commit-ID:
c0cb504d0b9e43ccf12e68a544a7cd625e89758d
djm@openbsd.org [Sat, 15 Feb 2025 01:50:47 +0000 (01:50 +0000)]
upstream: Add support for "Match sessiontype" to ssh_config. Allows
matching on the type of session requested, either "shell" for interactive
sessions, "exec" for command execution sessions, "subsystem" for subsystem
requests, such as sftp, or "none" for transport/forwarding-only sessions.
ok markus@
OpenBSD-Commit-ID:
eff5c001aecb2283d36639cfb28c0935a8bfd468
djm@openbsd.org [Sat, 15 Feb 2025 01:48:30 +0000 (01:48 +0000)]
upstream: "Match command ..." support for ssh_config to allow
matching on the remote command specified on the commandline.
Also relaxes matching rules for `Match tagged` to allow
`Match tagged ""` to match an empty tag value. This also works
for command.
ok markus@
OpenBSD-Commit-ID:
00dcfea425bf58d824bf5e3464cfc2409121b60d
Damien Miller [Mon, 10 Feb 2025 23:32:26 +0000 (10:32 +1100)]
depend
djm@openbsd.org [Mon, 10 Feb 2025 23:19:26 +0000 (23:19 +0000)]
upstream: include arguments the command was invoked with, and
operating system name, version and architecture in startup debugging output;
ok dtucker
OpenBSD-Commit-ID:
2a509d319aaf31a6bf9998e1842832883fbc3edd
djm@openbsd.org [Mon, 10 Feb 2025 23:16:51 +0000 (23:16 +0000)]
upstream: include line number in Match debug messages, makes it a
little easier to see what's going on
OpenBSD-Commit-ID:
1fcf4aa2ee667711b9497ded0fa52d757c69b1df
djm@openbsd.org [Mon, 10 Feb 2025 23:00:29 +0000 (23:00 +0000)]
upstream: fix "Match invalid-user" from incorrectly being activated
in initial configuration pass when no other predicates were present on the
match line
OpenBSD-Commit-ID:
02703b4bd207fafd03788bc4e7774bf80be6c9a8
schwarze@openbsd.org [Sun, 9 Feb 2025 18:24:08 +0000 (18:24 +0000)]
upstream: In a section 1 manual, use the plain English words
"standard output" rather than the overly technical abbreviation "stdout" - we
are not talking about a device file or a FILE * object here. Issue reported
by <onf at disroot dot org> on the groff mailing list.
OpenBSD-Commit-ID:
a0816999f970e6159523bed8484f62c42ec93109
dtucker@openbsd.org [Fri, 17 Jan 2025 00:09:41 +0000 (00:09 +0000)]
upstream: Fix debug logging of user specific delay. Patch from
Achim Leitner (fjl5) via github PR#552.
OpenBSD-Commit-ID:
834a869ed9b15058d3c1ef0cd75402ef989255d8
dtucker@openbsd.org [Thu, 16 Jan 2025 06:37:10 +0000 (06:37 +0000)]
upstream: Call log_init in sshd-auth and sshd-session immediately
after parsing the config file so that any log settings set in the config file
take effect immediately. Move version banners to immediately after that, and
make them distinct per binary. ok djm@
OpenBSD-Commit-ID:
acf3d090638edf9b6e6f78eed96b537fe671f0f5
dtucker@openbsd.org [Wed, 15 Jan 2025 22:23:13 +0000 (22:23 +0000)]
upstream: Use strprefix helper when processing sshd -C test args
instead of counting bytes by hand. ok djm@
OpenBSD-Commit-ID:
2866d369d96fe04bf76112260ac37e489f98a9a9
Damien Miller [Wed, 5 Feb 2025 22:38:09 +0000 (09:38 +1100)]
add support for AWS-LC (AWS libcrypto)
Patch from Shubham Mittal via bz3784; ok dtucker
Tim Rice [Mon, 16 Dec 2024 23:36:54 +0000 (15:36 -0800)]
fix old typo (s/SYSVINITSTOPT/SYSVINITSTOP/)
dtucker@openbsd.org [Thu, 12 Dec 2024 09:09:09 +0000 (09:09 +0000)]
upstream: Plug leak on error path, spotted by Coverity. ok djm@
OpenBSD-Commit-ID:
b1859959374b4709569760cae0866d22a16606d3
Xavier Hsinyuan [Mon, 9 Dec 2024 03:21:05 +0000 (11:21 +0800)]
Add $(srcdir) for standalone sk-libfido2 make target.
Fix out-of-tree build failure due to incorrect path for `sk-usbhid.c`.
djm@openbsd.org [Sat, 7 Dec 2024 10:12:19 +0000 (10:12 +0000)]
upstream: replace bespoke logging of MaxSessions enforcement with
new ratelimited logging infrastructure.
Add ratelimits to logging of connections dropped by PerSourcePenalties
ok dtucker
OpenBSD-Commit-ID:
f22fe7c39607e4361aadf95e33773ffd68c59489
djm@openbsd.org [Sat, 7 Dec 2024 10:05:36 +0000 (10:05 +0000)]
upstream: add infrastructure for ratelimited logging; feedback/ok
dtucker
OpenBSD-Commit-ID:
18a83e5ac09d59aaf1e834fd6b796db89dd842e7
djm@openbsd.org [Fri, 6 Dec 2024 16:24:27 +0000 (16:24 +0000)]
upstream: allow glob(3) patterns for sshd_config AuthorizedKeysFile
and AuthorizedPrincipalsFile directives; bz2755 ok dtucker
OpenBSD-Commit-ID:
3e3e05a17fca39bba78b993a07b44664519adf7f
djm@openbsd.org [Fri, 6 Dec 2024 16:21:48 +0000 (16:21 +0000)]
upstream: support VersionAddendum in the client, mirroring the
option of the same name in the server; bz2745 ok dtucker@
OpenBSD-Commit-ID:
6ff7905b3f9806649bde750515786553fb89cdf4
djm@openbsd.org [Fri, 6 Dec 2024 16:02:12 +0000 (16:02 +0000)]
upstream: clarify encoding of options/extensions; bz2389
OpenBSD-Commit-ID:
c4e92356d44dfe6d0a4416deecb33d1d1eba016c
djm@openbsd.org [Fri, 6 Dec 2024 15:17:15 +0000 (15:17 +0000)]
upstream: ignore SIGPIPE here; some downstreams have had this for
years...
OpenBSD-Commit-ID:
73674ee4f8ceb8fc9cb8de71d8ddea0c721eb035
djm@openbsd.org [Fri, 6 Dec 2024 15:12:56 +0000 (15:12 +0000)]
upstream: sync -o option lists with ssh.1; requested jmc@
OpenBSD-Commit-ID:
a7ac295b444da7b2ca7a33a52370594f6897f6bb
Fabio Pedretti [Mon, 16 Oct 2023 15:12:24 +0000 (17:12 +0200)]
Remove ancient RHL 6.x config in RPM spec.
It looks like build6x options were intended for RHL 6.x
(the Red Hat distro predating Fedora, not RHEL), but were
then applied to RHEL.
Completely remove support for this ancient configuration.
Successfully built, installed and run on RHEL 6. This also
remove a build warning about deprecation of PreReq.
Darren Tucker [Fri, 6 Dec 2024 12:54:45 +0000 (23:54 +1100)]
Add new hardware-backed signing key for myself.
Retire old non-hardware based signing key.
Jonas 'Sortie' Termansen [Sat, 2 Nov 2024 21:05:45 +0000 (22:05 +0100)]
Fix configure implicit declaration and format warnings.
dtucker@openbsd.org [Fri, 6 Dec 2024 07:05:54 +0000 (07:05 +0000)]
upstream: Expand $SSH to absolute path if it's not already.
Prevents problem later in increase_datafile_size if ssh is not in
the path. Patch from quaresmajose via GHPR#510.
OpenBSD-Regress-ID:
2670a66af8b827410ca7139f0a89f4501cece77b
dtucker@openbsd.org [Fri, 6 Dec 2024 06:55:28 +0000 (06:55 +0000)]
upstream: Change "login again" to "log in again"
in password change message. From ThinLinc-Zeijlon via github PR#532.
OpenBSD-Commit-ID:
fea5e9bc04caf613a118c419f16863733b340cf1
naddy@openbsd.org [Thu, 5 Dec 2024 22:45:03 +0000 (22:45 +0000)]
upstream: catch up documentation: AES-GCM is preferred to AES-CTR
OpenBSD-Commit-ID:
63360924b6834507fe70020edb936f5075043a9e
Darren Tucker [Fri, 6 Dec 2024 06:56:17 +0000 (17:56 +1100)]
Change text from "login to" to "log in to".
From ThinLinc-Zeijlon via GHPR#532.
Xavier Hsinyuan [Fri, 6 Dec 2024 03:56:34 +0000 (11:56 +0800)]
Fix configure message typo in sk-libfido2 standalone.
Alexander Kanavin [Thu, 5 Dec 2024 15:26:46 +0000 (16:26 +0100)]
Skip 2038 key expiry test on 64 bit time_t systems.
This allows testing Y2038 with system time set to after that (i.e. 2040),
so that actual Y2038 issues can be exposed, and not masked by key expiry
errors.
Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Darren Tucker [Thu, 5 Dec 2024 14:45:52 +0000 (01:45 +1100)]
Skip 64bit expiry time test on 32bit time_t.
dtucker@openbsd.org [Thu, 5 Dec 2024 14:28:39 +0000 (14:28 +0000)]
upstream: Add key expiry test in the 64bit time_t range for additional
coverage. From Alexander Kanavin via bz#3684.
OpenBSD-Regress-ID:
bdf6eb3c2421f2e1e11483d03b34c7931d1bccf7
Damien Miller [Thu, 5 Dec 2024 08:24:56 +0000 (19:24 +1100)]
typo
Damien Miller [Wed, 4 Dec 2024 21:47:02 +0000 (08:47 +1100)]
add a Makefile target for ssh-verify-attestation
Not built by default, but easier than doing it by hand
dtucker@openbsd.org [Thu, 5 Dec 2024 06:49:26 +0000 (06:49 +0000)]
upstream: De-magic the x11 base port number into a define. ok djm@
OpenBSD-Commit-ID:
23b85ca9d222cb739b9c33ee5e4d6ac9fdeecbfa
dtucker@openbsd.org [Thu, 5 Dec 2024 06:47:00 +0000 (06:47 +0000)]
upstream: Prevent integer overflow in x11 port handling. These are
theoretically possible if the admin misconfigures X11DisplayOffset or the
user misconfigures their own $DISPLAY, but don't happen in normal operation.
From Suhov Roman via bz#3730, ok djm@
OpenBSD-Commit-ID:
e9e3860f1a19b862ccf07dc8ecbe8f1e1034f4ed
djm@openbsd.org [Wed, 4 Dec 2024 16:42:49 +0000 (16:42 +0000)]
upstream: add a work-in-progress tool to verify FIDO attestation
blobs that ssh-keygen can write when enrolling FIDO keys.
OpenBSD-Regress-ID:
6c97bf3f46e48866677ad69f54b77683eb92437f
dtucker@openbsd.org [Wed, 4 Dec 2024 10:51:13 +0000 (10:51 +0000)]
upstream: Don't assume existence of SK provider in test. Patch from
balu.gajjala at gmail via bz#3402.
OpenBSD-Regress-ID:
d571932016d07d135b54433d07520b9e1901db43
djm@openbsd.org [Wed, 4 Dec 2024 14:37:55 +0000 (14:37 +0000)]
upstream: sync the list of options accepted by -o with ssh_config.5
prompted by bz3455
OpenBSD-Commit-ID:
0ecbfa70aea6c769bcc259defe07182edf461f57
djm@openbsd.org [Wed, 4 Dec 2024 14:24:20 +0000 (14:24 +0000)]
upstream: don't screw up ssh-keygen -l output when the file
contains CR characters; GHPR236 bz3385, fix from Dmitry Belyavskiy
OpenBSD-Commit-ID:
e458cf6b0adcea5b69ef4c7ba38e590841d02ef4
jsg@openbsd.org [Tue, 3 Dec 2024 22:30:03 +0000 (22:30 +0000)]
upstream: spelling; ok djm@
OpenBSD-Commit-ID:
c8ff3f70020451eef214e598117b7ce1a29853ef
dtucker@openbsd.org [Tue, 3 Dec 2024 16:27:53 +0000 (16:27 +0000)]
upstream: Remove fallback to compiled-in gropup for dhgex when the
moduli file exists, but does not contain moduli within the client-requested
range. The fallback behaviour remains for the case where the moduli file does
not exist (typically, running tests prior to installing). From bz#2793, based
in part on patch from Joe Testa, ok djm@
OpenBSD-Commit-ID:
b1a8c5dbbedf249b42474679ebaf14db7332b1ab
tb@openbsd.org [Tue, 3 Dec 2024 15:53:51 +0000 (15:53 +0000)]
upstream: Remove redundant field of definition check
This will allow us to get rid of EC_GROUP_method_of() in the near future.
ok djm
OpenBSD-Commit-ID:
b4a3d2e00990cf5c2ec6881c21ddca67327c2df8
Damien Miller [Wed, 4 Dec 2024 13:59:19 +0000 (00:59 +1100)]
don't ignore changes in regress Makefiles
reported by Torben Hansen in bz2880
Damien Miller [Wed, 4 Dec 2024 13:01:33 +0000 (00:01 +1100)]
Support systemd-style socket activation in agent
Adds support for systemd LISTEN_PID/LISTEN_FDS socket activation to
ssh-agent. Activated when these environment variables are set and
the agent is started with the -d or -D option and no socket path
is set.
Based on GHPR502 by Daniel Kahn Gillmor, ok dtucker
Darren Tucker [Wed, 4 Dec 2024 10:36:01 +0000 (21:36 +1100)]
Update readme files to better reflect reality.
Prompted by bz#3738, ok djm@.
dtucker@openbsd.org [Tue, 3 Dec 2024 14:12:47 +0000 (14:12 +0000)]
upstream: Improve description of KbdInteractiveAuthentication.
Based on bz#3658, fixes jmc@ ok markus@ djm@.
OpenBSD-Commit-ID:
9fadb56b9afed554d501acbba911c685acd6ffc2
Jonas 'Sortie' Termansen [Sat, 2 Nov 2024 16:53:23 +0000 (17:53 +0100)]
Inherit DESTDIR from the environment.
autoconf packages conventionally inherit the DESTDIR variable from the
environment.
Jonas 'Sortie' Termansen [Sat, 2 Nov 2024 21:10:39 +0000 (22:10 +0100)]
Define u_short and u_long if needed.
djm@openbsd.org [Tue, 3 Dec 2024 08:31:49 +0000 (08:31 +0000)]
upstream: support FIDO tokens that return no attestation data, e.g.
recent WinHello. From Michael Braun via GHPR542
OpenBSD-Commit-ID:
a71b0542f2f7819ba0e33a88908e01b6fc49e4ce
Thorsten Kukuk [Tue, 19 Nov 2024 09:53:28 +0000 (10:53 +0100)]
Add wtmpdb support as Y2038 safe wtmp replacement
djm@openbsd.org [Mon, 2 Dec 2024 14:06:42 +0000 (14:06 +0000)]
djm@openbsd.org [Mon, 2 Dec 2024 13:37:18 +0000 (13:37 +0000)]
upstream: prefer AES-GCM to AES-CTR; ok deraadt markus
OpenBSD-Commit-ID:
8366a72e0f300ee31c5dab2c95025387ec15bbc9
Shiva Kaul [Mon, 2 Dec 2024 07:04:20 +0000 (02:04 -0500)]
Fix compilation with DEBUG_SK enabled
In `ssh_ecdsa_sk_verify`, the `datalen` variable was renamed to `dlen` -- but not in this debugging block.
dtucker@openbsd.org [Fri, 29 Nov 2024 00:13:36 +0000 (00:13 +0000)]
upstream: Import regenerated moduli.
OpenBSD-Commit-ID:
311d271bf0fab8a119e84f4f696d8cd40731692f
Jeremy Stott [Fri, 18 Oct 2024 23:10:52 +0000 (12:10 +1300)]
Add make target for standalone sk-libfido2
Add a Makefile target for sk-libfido2, the standalone fido2 security
key shared library, suitable for use with the SecurityKeyProvider
option.
Add a new configure option `--with-security-key-standalone` that
optionally sets the shared library target sk-libfido2$(SHLIBEXT), and
adds it to $(TARGETS).
misc.h is required when SK_STANDALONE is defined, because of the use
of `monotime_tv` in `sk_select_by_touch`.
Sets the shared library extension for sk-libfido2 is by setting
`SHLIBEXT` depending on the platform in configure.ac.
Add the shared library to the CI builds in the `sk` target config to
make sure it can compile under the same conditions as
`--with-security-key-builtin`.
Add a libssh-pic.a static library that compiles with `-fPIC` reusing
.c.lo method in sk-dummy.so for use in the shared library sk-libfido2.
Note, a separate static library libssh-pic.a is needed, since defining
-DSK_STANDALONE excludes some symbols needed in sshkey.lo.
Arnout Engelen [Fri, 18 Oct 2024 11:42:38 +0000 (13:42 +0200)]
mdoc2man: balance nested square brackets
I noticed the square brackets in `destination [command [argument...]`
in the synopsis for the `ssh.1` manpage were not balanced,
this balances them.
Signed-off-by: Arnout Engelen <arnout@bzzt.net>
djm@openbsd.org [Wed, 27 Nov 2024 16:07:08 +0000 (16:07 +0000)]
upstream: fix argument of "Compression" directive in ssh -G config
dump, which used to work but broke in 9.8
OpenBSD-Commit-ID:
c79936242d29c70d01941b28d2d07fd0b85fe46f
djm@openbsd.org [Wed, 27 Nov 2024 13:27:34 +0000 (13:27 +0000)]
upstream: new name/link for agent I-D
OpenBSD-Commit-ID:
e3420f3925a297a1b2ab7dfe7c7d274cfc8e1193
djm@openbsd.org [Wed, 27 Nov 2024 13:00:23 +0000 (13:00 +0000)]
upstream: mention that biometrics may be used for FIDO key user
verification as well as PIN. Prompted by Zack Newman, ok jmc@
OpenBSD-Commit-ID:
b774a4438c9be70012661ee278450790d21277b8
djm@openbsd.org [Tue, 26 Nov 2024 22:05:51 +0000 (22:05 +0000)]
upstream: g/c outdated XXX comments
OpenBSD-Commit-ID:
74d0c0b74994d9a4343c4d7ea4948cb34f609a6c
djm@openbsd.org [Tue, 26 Nov 2024 22:02:28 +0000 (22:02 +0000)]
upstream: regression test for UpdateHostkeys with multiple keys backed
by ssh-agent. Patch from Maxime Rey.
OpenBSD-Regress-ID:
1777ab6e639e57c0e20cbcb6df60455b49fd8bb3
djm@openbsd.org [Tue, 26 Nov 2024 22:01:37 +0000 (22:01 +0000)]
upstream: Explicitly specify the signature algorithm when signing
hostkeys-prove requests.
Fixes a corner-case triggered by UpdateHostKeys with one or more unknown
host keys stored in ssh-agent where sshd refuses to accept the signature
coming back from the agent.
Report/fix from Maxime Rey
OpenBSD-Commit-ID:
460c7d527a24f92b7e5f68ca1a2fa242ebf0d086
djm@openbsd.org [Tue, 26 Nov 2024 21:23:35 +0000 (21:23 +0000)]
upstream: when using RSA keys to sign messages, select the
signature algorithm based on the requested hash algorithm ("-Ohashalg=xxx").
This allows using something other than rsa-sha2-512, which may not
be supported on all signing backends, e.g. some smartcards only
support SHA256.
Patch from Morten Linderud; ok markus@
OpenBSD-Commit-ID:
246353fac24e92629263996558c6788348363ad7
djm@openbsd.org [Sun, 24 Nov 2024 23:47:50 +0000 (23:47 +0000)]
upstream: turn off CDIAGFLAGS and turn back on INSTALL_STRIP
accidentally changed in last commit
OpenBSD-Commit-ID:
6d07e4606997e36b860621a14dd41975f2902f8f
Darren Tucker [Sat, 9 Nov 2024 00:41:44 +0000 (11:41 +1100)]
Disable security key for bigendian interop.
It doesn't currently work. It's not clear why, but I suspect
sk-dummy.so ends up being built for the wrong architecture.
Darren Tucker [Fri, 8 Nov 2024 18:14:16 +0000 (05:14 +1100)]
Reshuffle OpenWRT test configs.
Move the the flags used by the OpenWRT distro to mipsel target and
enable OpenSSL on all targets to improve coverage.
Explicitly disable security key and openssl on mips target so that host
end of the bigendian interop tests don't attempt them and fail (since
they're not enabled on the target side).
Darren Tucker [Fri, 8 Nov 2024 16:26:08 +0000 (03:26 +1100)]
Add keytype to bigendian interop test.
Darren Tucker [Fri, 8 Nov 2024 16:24:29 +0000 (03:24 +1100)]
Ignore chown failure, eg due to dangling symlinks.
Darren Tucker [Sat, 2 Nov 2024 07:05:41 +0000 (18:05 +1100)]
Test bigendian interop.
Where our test target is a bigendian system, do an additional build on
the runner host (which is little endian) and test interop between the two.
Should hopefully catch obvious endianness bugs.
Darren Tucker [Fri, 1 Nov 2024 08:44:29 +0000 (19:44 +1100)]
Allow overridding TEST_SSH_SSHD.
This will allow tests to specify an alternative sshd, eg on a remote
machine with different endianness.
djm@openbsd.org [Wed, 6 Nov 2024 22:51:26 +0000 (22:51 +0000)]
upstream: ssh-agent implemented an all-or-nothing allow-list of
FIDO application IDs for security key-backed keys, to prevent web key handles
from being used remotely as this would likely lead to unpleasant surprises.
By default, only application IDs that start with "ssh:*" are allowed.
This adds a -Owebsafe-allow=... argument that can override the default
list with a more or less restrictive one. The default remains unchanged.
ok markus@
OpenBSD-Commit-ID:
957c1ed92a8d7c87453b9341f70cb3f4e6b23e8d
jca@openbsd.org [Mon, 4 Nov 2024 21:59:15 +0000 (21:59 +0000)]
upstream: Ignore extra groups that don't fit in the buffer passed
to getgrouplist(3)
Our kernel supports 16 groups (NGROUPS_MAX), but nothing prevents
an admin from adding a user to more groups. With that tweak we'll keep
on ignoring them instead of potentially reading past the buffer passed to
getgrouplist(3). That behavior is explicitely described in initgroups(3).
ok millert@ gilles@
OpenBSD-Commit-ID:
a959fc45ea3431b36f52eda04faefc58bcde00db
Damien Miller [Mon, 4 Nov 2024 03:39:27 +0000 (14:39 +1100)]
Add git signing key for Tim Rice
Darren Tucker [Fri, 1 Nov 2024 07:51:22 +0000 (18:51 +1100)]
Correct path to c-cpp.yml file in workflow config.
Darren Tucker [Fri, 1 Nov 2024 07:44:42 +0000 (18:44 +1100)]
Test new OpenSSL and LibreSSL releases.`
Darren Tucker [Fri, 1 Nov 2024 07:44:00 +0000 (18:44 +1100)]
Add nbsd10 default test config.
Damien Miller [Wed, 30 Oct 2024 03:25:14 +0000 (14:25 +1100)]
fix uint64_t types; reported by Tom G. Christensen
Damien Miller [Sun, 27 Oct 2024 02:28:11 +0000 (13:28 +1100)]
htole64() etc for systems without endian.h