]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
7 months agoinclude __builtin_popcount replacement function
Damien Miller [Sun, 2 Mar 2025 11:06:53 +0000 (22:06 +1100)] 
include __builtin_popcount replacement function

Some systems/compilers lack __builtin_popcount(), so replace it as
necessary. Reported by Dennis Clarke; ok dtucker@

7 months agoupstream: whitespace
djm@openbsd.org [Sun, 2 Mar 2025 11:03:13 +0000 (11:03 +0000)] 
upstream: whitespace

OpenBSD-Commit-ID: 1bd8953a37451ef7e0991f9fceec5e8005fe986a

7 months agoupstream: Make a copy of the user when handling ssh -l, so that
dtucker@openbsd.org [Sun, 2 Mar 2025 07:02:49 +0000 (07:02 +0000)] 
upstream: Make a copy of the user when handling ssh -l, so that

later during User token expansion we don't end up freeing a member of argv.
Spotted by anton@'s regress tests.

OpenBSD-Commit-ID: 2f671a4f5726b66d123b88b1fdd1a90581339955

7 months agoupstream: Allow %-token and environment variable expansion in User,
dtucker@openbsd.org [Sat, 1 Mar 2025 06:11:26 +0000 (06:11 +0000)] 
upstream: Allow %-token and environment variable expansion in User,

with the exception of %r and %C which are self-referential.  Requested in
bz#3477, ok djm@, man page improvements jmc@

OpenBSD-Commit-ID: caeb46251ee073662f6f5864c6f7b92d8ac80fa8

7 months agoRebuild config files if Makefile changes.
Darren Tucker [Fri, 28 Feb 2025 23:28:59 +0000 (10:28 +1100)] 
Rebuild config files if Makefile changes.

This ensures paths are updated if they are changed by re-running configure.
Patch from rapier at psc.edu.

8 months agoCheck for le32toh, le64toh, htole64 individually.
Darren Tucker [Wed, 26 Feb 2025 07:16:03 +0000 (18:16 +1100)] 
Check for le32toh, le64toh, htole64 individually.

It appears that at least some versions of endian.h in glibc do not have
the latter two, so check for and replace each one individually.
bz#3794, ok djm@

8 months agoupstream: ressurect fix for "match invalid-user" that got clobbered
djm@openbsd.org [Tue, 25 Feb 2025 06:25:30 +0000 (06:25 +0000)] 
upstream: ressurect fix for "match invalid-user" that got clobbered

by 1.423

OpenBSD-Commit-ID: d18bf0945976e0f3467d710d4bc8bdbe181c0567

8 months agoupstream: Also prohibit , (comma) in hostnames, proposed by David
deraadt@openbsd.org [Fri, 21 Feb 2025 18:22:41 +0000 (18:22 +0000)] 
upstream: Also prohibit , (comma) in hostnames, proposed by David

Leadbeater ok djm millert

OpenBSD-Commit-ID: 2837fa31dc6e81976f510f0a259edaa559b20b07

8 months agoTry to fix github tcmalloc target failure
Damien Miller [Mon, 24 Feb 2025 06:27:50 +0000 (17:27 +1100)] 
Try to fix github tcmalloc target failure

tcmalloc may, depending on the stacktrace generator it uses, create
pipe(2) fds during shared library initialisation. These will later
get clobbered by ssh/sshd calling closefrom() and chaos will ensue.
Tell tcmalloc to use an unwinder that doesn't pull this stuff.

8 months agocleanup last mention of ubuntu-20.04
Damien Miller [Fri, 21 Feb 2025 02:44:35 +0000 (13:44 +1100)] 
cleanup last mention of ubuntu-20.04

8 months agoprune gcc/clang versions to be tested
Damien Miller [Fri, 21 Feb 2025 02:44:13 +0000 (13:44 +1100)] 
prune gcc/clang versions to be tested

Test only the oldest and latest versions of each

8 months agoUpdate AWS-LC version number
Damien Miller [Fri, 21 Feb 2025 00:30:22 +0000 (11:30 +1100)] 
Update AWS-LC version number

Patch from Shubham Mittal bz bz3792

8 months agoadjust workflows for ubuntu version transition
Damien Miller [Fri, 21 Feb 2025 00:22:34 +0000 (11:22 +1100)] 
adjust workflows for ubuntu version transition

remove workflows for unsupported compilers, add a few for additional
supported compilers, move some workflows to run on ubuntu-latest

8 months agoAdd ubuntu-*-arm test runners
Damien Miller [Thu, 20 Feb 2025 06:10:32 +0000 (17:10 +1100)] 
Add ubuntu-*-arm test runners

8 months agoremove ubuntu-20.04 Github action runners
Damien Miller [Thu, 20 Feb 2025 06:03:28 +0000 (17:03 +1100)] 
remove ubuntu-20.04 Github action runners

ubuntu-20.04 is deprecated now, so migrate all its unique runners
to ubuntu-22.04.

ok dtucker@

8 months agoopenssh-9.9p2
Damien Miller [Tue, 18 Feb 2025 08:03:42 +0000 (19:03 +1100)] 
openssh-9.9p2

8 months agoupstream: Fix cases where error codes were not correctly set
djm@openbsd.org [Tue, 18 Feb 2025 08:02:48 +0000 (08:02 +0000)] 
upstream: Fix cases where error codes were not correctly set

Reported by the Qualys Security Advisory team. ok markus@

OpenBSD-Commit-ID: 7bcd4ffe0fa1e27ff98d451fb9c22f5fae6e610d

8 months agoupstream: Don't reply to PING in preauth phase or during KEX
djm@openbsd.org [Tue, 18 Feb 2025 08:02:12 +0000 (08:02 +0000)] 
upstream: Don't reply to PING in preauth phase or during KEX

Reported by the Qualys Security Advisory team. ok markus@

OpenBSD-Commit-ID: c656ac4abd1504389d1733d85152044b15830217

8 months agoupstream: - use \& when contructs like "e.g." end a line, to avoid
jmc@openbsd.org [Sat, 15 Feb 2025 06:48:56 +0000 (06:48 +0000)] 
upstream: - use \& when contructs like "e.g." end a line, to avoid

double spacing - macro is Qq not Oq

OpenBSD-Commit-ID: 17e5d2d7f288cc7fc536e3af252224525f9fb43a

8 months agodepend
Damien Miller [Sat, 15 Feb 2025 02:12:40 +0000 (13:12 +1100)] 
depend

8 months agoupstream: add "Match version" support to ssh_config. Allows
djm@openbsd.org [Sat, 15 Feb 2025 01:52:07 +0000 (01:52 +0000)] 
upstream: add "Match version" support to ssh_config. Allows

matching on the local version of OpenSSH, e.g. "Match version OpenSSH_10.*"

ok markus@

OpenBSD-Commit-ID: c0cb504d0b9e43ccf12e68a544a7cd625e89758d

8 months agoupstream: Add support for "Match sessiontype" to ssh_config. Allows
djm@openbsd.org [Sat, 15 Feb 2025 01:50:47 +0000 (01:50 +0000)] 
upstream: Add support for "Match sessiontype" to ssh_config. Allows

matching on the type of session requested, either "shell" for interactive
sessions, "exec" for command execution sessions, "subsystem" for subsystem
requests, such as sftp, or "none" for transport/forwarding-only sessions.

ok markus@

OpenBSD-Commit-ID: eff5c001aecb2283d36639cfb28c0935a8bfd468

8 months agoupstream: "Match command ..." support for ssh_config to allow
djm@openbsd.org [Sat, 15 Feb 2025 01:48:30 +0000 (01:48 +0000)] 
upstream: "Match command ..." support for ssh_config to allow

matching on the remote command specified on the commandline.

Also relaxes matching rules for `Match tagged` to allow
`Match tagged ""` to match an empty tag value. This also works
for command.

ok markus@

OpenBSD-Commit-ID: 00dcfea425bf58d824bf5e3464cfc2409121b60d

8 months agodepend
Damien Miller [Mon, 10 Feb 2025 23:32:26 +0000 (10:32 +1100)] 
depend

8 months agoupstream: include arguments the command was invoked with, and
djm@openbsd.org [Mon, 10 Feb 2025 23:19:26 +0000 (23:19 +0000)] 
upstream: include arguments the command was invoked with, and

operating system name, version and architecture in startup debugging output;
ok dtucker

OpenBSD-Commit-ID: 2a509d319aaf31a6bf9998e1842832883fbc3edd

8 months agoupstream: include line number in Match debug messages, makes it a
djm@openbsd.org [Mon, 10 Feb 2025 23:16:51 +0000 (23:16 +0000)] 
upstream: include line number in Match debug messages, makes it a

little easier to see what's going on

OpenBSD-Commit-ID: 1fcf4aa2ee667711b9497ded0fa52d757c69b1df

8 months agoupstream: fix "Match invalid-user" from incorrectly being activated
djm@openbsd.org [Mon, 10 Feb 2025 23:00:29 +0000 (23:00 +0000)] 
upstream: fix "Match invalid-user" from incorrectly being activated

in initial configuration pass when no other predicates were present on the
match line

OpenBSD-Commit-ID: 02703b4bd207fafd03788bc4e7774bf80be6c9a8

8 months agoupstream: In a section 1 manual, use the plain English words
schwarze@openbsd.org [Sun, 9 Feb 2025 18:24:08 +0000 (18:24 +0000)] 
upstream: In a section 1 manual, use the plain English words

"standard output" rather than the overly technical abbreviation "stdout" - we
are not talking about a device file or a FILE * object here. Issue reported
by <onf at disroot dot org> on the groff mailing list.

OpenBSD-Commit-ID: a0816999f970e6159523bed8484f62c42ec93109

8 months agoupstream: Fix debug logging of user specific delay. Patch from
dtucker@openbsd.org [Fri, 17 Jan 2025 00:09:41 +0000 (00:09 +0000)] 
upstream: Fix debug logging of user specific delay. Patch from

Achim Leitner (fjl5) via github PR#552.

OpenBSD-Commit-ID: 834a869ed9b15058d3c1ef0cd75402ef989255d8

8 months agoupstream: Call log_init in sshd-auth and sshd-session immediately
dtucker@openbsd.org [Thu, 16 Jan 2025 06:37:10 +0000 (06:37 +0000)] 
upstream: Call log_init in sshd-auth and sshd-session immediately

after parsing the config file so that any log settings set in the config file
take effect immediately.  Move version banners to immediately after that, and
make them distinct per binary.  ok djm@

OpenBSD-Commit-ID: acf3d090638edf9b6e6f78eed96b537fe671f0f5

8 months agoupstream: Use strprefix helper when processing sshd -C test args
dtucker@openbsd.org [Wed, 15 Jan 2025 22:23:13 +0000 (22:23 +0000)] 
upstream: Use strprefix helper when processing sshd -C test args

instead of counting bytes by hand.  ok djm@

OpenBSD-Commit-ID: 2866d369d96fe04bf76112260ac37e489f98a9a9

8 months agoadd support for AWS-LC (AWS libcrypto)
Damien Miller [Wed, 5 Feb 2025 22:38:09 +0000 (09:38 +1100)] 
add support for AWS-LC (AWS libcrypto)

Patch from Shubham Mittal via bz3784; ok dtucker

10 months agofix old typo (s/SYSVINITSTOPT/SYSVINITSTOP/)
Tim Rice [Mon, 16 Dec 2024 23:36:54 +0000 (15:36 -0800)] 
fix old typo (s/SYSVINITSTOPT/SYSVINITSTOP/)

10 months agoupstream: Plug leak on error path, spotted by Coverity. ok djm@
dtucker@openbsd.org [Thu, 12 Dec 2024 09:09:09 +0000 (09:09 +0000)] 
upstream: Plug leak on error path, spotted by Coverity. ok djm@

OpenBSD-Commit-ID: b1859959374b4709569760cae0866d22a16606d3

10 months agoAdd $(srcdir) for standalone sk-libfido2 make target.
Xavier Hsinyuan [Mon, 9 Dec 2024 03:21:05 +0000 (11:21 +0800)] 
Add $(srcdir) for standalone sk-libfido2 make target.

Fix out-of-tree build failure due to incorrect path for `sk-usbhid.c`.

10 months agoupstream: replace bespoke logging of MaxSessions enforcement with
djm@openbsd.org [Sat, 7 Dec 2024 10:12:19 +0000 (10:12 +0000)] 
upstream: replace bespoke logging of MaxSessions enforcement with

new ratelimited logging infrastructure.

Add ratelimits to logging of connections dropped by PerSourcePenalties

ok dtucker

OpenBSD-Commit-ID: f22fe7c39607e4361aadf95e33773ffd68c59489

10 months agoupstream: add infrastructure for ratelimited logging; feedback/ok
djm@openbsd.org [Sat, 7 Dec 2024 10:05:36 +0000 (10:05 +0000)] 
upstream: add infrastructure for ratelimited logging; feedback/ok

dtucker

OpenBSD-Commit-ID: 18a83e5ac09d59aaf1e834fd6b796db89dd842e7

10 months agoupstream: allow glob(3) patterns for sshd_config AuthorizedKeysFile
djm@openbsd.org [Fri, 6 Dec 2024 16:24:27 +0000 (16:24 +0000)] 
upstream: allow glob(3) patterns for sshd_config AuthorizedKeysFile

and AuthorizedPrincipalsFile directives; bz2755 ok dtucker

OpenBSD-Commit-ID: 3e3e05a17fca39bba78b993a07b44664519adf7f

10 months agoupstream: support VersionAddendum in the client, mirroring the
djm@openbsd.org [Fri, 6 Dec 2024 16:21:48 +0000 (16:21 +0000)] 
upstream: support VersionAddendum in the client, mirroring the

option of the same name in the server; bz2745 ok dtucker@

OpenBSD-Commit-ID: 6ff7905b3f9806649bde750515786553fb89cdf4

10 months agoupstream: clarify encoding of options/extensions; bz2389
djm@openbsd.org [Fri, 6 Dec 2024 16:02:12 +0000 (16:02 +0000)] 
upstream: clarify encoding of options/extensions; bz2389

OpenBSD-Commit-ID: c4e92356d44dfe6d0a4416deecb33d1d1eba016c

10 months agoupstream: ignore SIGPIPE here; some downstreams have had this for
djm@openbsd.org [Fri, 6 Dec 2024 15:17:15 +0000 (15:17 +0000)] 
upstream: ignore SIGPIPE here; some downstreams have had this for

years...

OpenBSD-Commit-ID: 73674ee4f8ceb8fc9cb8de71d8ddea0c721eb035

10 months agoupstream: sync -o option lists with ssh.1; requested jmc@
djm@openbsd.org [Fri, 6 Dec 2024 15:12:56 +0000 (15:12 +0000)] 
upstream: sync -o option lists with ssh.1; requested jmc@

OpenBSD-Commit-ID: a7ac295b444da7b2ca7a33a52370594f6897f6bb

10 months agoRemove ancient RHL 6.x config in RPM spec.
Fabio Pedretti [Mon, 16 Oct 2023 15:12:24 +0000 (17:12 +0200)] 
Remove ancient RHL 6.x config in RPM spec.

It looks like build6x options were intended for RHL 6.x
(the Red Hat distro predating Fedora, not RHEL), but were
then applied to RHEL.

Completely remove support for this ancient configuration.

Successfully built, installed and run on RHEL 6. This also
remove a build warning about deprecation of PreReq.

10 months agoAdd new hardware-backed signing key for myself.
Darren Tucker [Fri, 6 Dec 2024 12:54:45 +0000 (23:54 +1100)] 
Add new hardware-backed signing key for myself.

Retire old non-hardware based signing key.

10 months agoFix configure implicit declaration and format warnings.
Jonas 'Sortie' Termansen [Sat, 2 Nov 2024 21:05:45 +0000 (22:05 +0100)] 
Fix configure implicit declaration and format warnings.

10 months agoupstream: Expand $SSH to absolute path if it's not already.
dtucker@openbsd.org [Fri, 6 Dec 2024 07:05:54 +0000 (07:05 +0000)] 
upstream: Expand $SSH to absolute path if it's not already.

Prevents problem later in increase_datafile_size if ssh is not in
the path.  Patch from quaresmajose via GHPR#510.

OpenBSD-Regress-ID: 2670a66af8b827410ca7139f0a89f4501cece77b

10 months agoupstream: Change "login again" to "log in again"
dtucker@openbsd.org [Fri, 6 Dec 2024 06:55:28 +0000 (06:55 +0000)] 
upstream: Change "login again" to "log in again"

in password change message.  From ThinLinc-Zeijlon via github PR#532.

OpenBSD-Commit-ID: fea5e9bc04caf613a118c419f16863733b340cf1

10 months agoupstream: catch up documentation: AES-GCM is preferred to AES-CTR
naddy@openbsd.org [Thu, 5 Dec 2024 22:45:03 +0000 (22:45 +0000)] 
upstream: catch up documentation: AES-GCM is preferred to AES-CTR

OpenBSD-Commit-ID: 63360924b6834507fe70020edb936f5075043a9e

10 months agoChange text from "login to" to "log in to".
Darren Tucker [Fri, 6 Dec 2024 06:56:17 +0000 (17:56 +1100)] 
Change text from "login to" to "log in to".

From ThinLinc-Zeijlon via GHPR#532.

10 months agoFix configure message typo in sk-libfido2 standalone.
Xavier Hsinyuan [Fri, 6 Dec 2024 03:56:34 +0000 (11:56 +0800)] 
Fix configure message typo in sk-libfido2 standalone.

10 months agoSkip 2038 key expiry test on 64 bit time_t systems.
Alexander Kanavin [Thu, 5 Dec 2024 15:26:46 +0000 (16:26 +0100)] 
Skip 2038 key expiry test on 64 bit time_t systems.

This allows testing Y2038 with system time set to after that (i.e. 2040),
so that actual Y2038 issues can be exposed, and not masked by key expiry
errors.

Signed-off-by: Alexander Kanavin <alex@linutronix.de>
10 months agoSkip 64bit expiry time test on 32bit time_t.
Darren Tucker [Thu, 5 Dec 2024 14:45:52 +0000 (01:45 +1100)] 
Skip 64bit expiry time test on 32bit time_t.

10 months agoupstream: Add key expiry test in the 64bit time_t range for additional
dtucker@openbsd.org [Thu, 5 Dec 2024 14:28:39 +0000 (14:28 +0000)] 
upstream: Add key expiry test in the 64bit time_t range for additional

coverage. From Alexander Kanavin via bz#3684.

OpenBSD-Regress-ID: bdf6eb3c2421f2e1e11483d03b34c7931d1bccf7

10 months agotypo
Damien Miller [Thu, 5 Dec 2024 08:24:56 +0000 (19:24 +1100)] 
typo

10 months agoadd a Makefile target for ssh-verify-attestation
Damien Miller [Wed, 4 Dec 2024 21:47:02 +0000 (08:47 +1100)] 
add a Makefile target for ssh-verify-attestation

Not built by default, but easier than doing it by hand

10 months agoupstream: De-magic the x11 base port number into a define. ok djm@
dtucker@openbsd.org [Thu, 5 Dec 2024 06:49:26 +0000 (06:49 +0000)] 
upstream: De-magic the x11 base port number into a define. ok djm@

OpenBSD-Commit-ID: 23b85ca9d222cb739b9c33ee5e4d6ac9fdeecbfa

10 months agoupstream: Prevent integer overflow in x11 port handling. These are
dtucker@openbsd.org [Thu, 5 Dec 2024 06:47:00 +0000 (06:47 +0000)] 
upstream: Prevent integer overflow in x11 port handling. These are

theoretically possible if the admin misconfigures X11DisplayOffset or the
user misconfigures their own $DISPLAY, but don't happen in normal operation.
From Suhov Roman via bz#3730, ok djm@

OpenBSD-Commit-ID: e9e3860f1a19b862ccf07dc8ecbe8f1e1034f4ed

10 months agoupstream: add a work-in-progress tool to verify FIDO attestation
djm@openbsd.org [Wed, 4 Dec 2024 16:42:49 +0000 (16:42 +0000)] 
upstream: add a work-in-progress tool to verify FIDO attestation

blobs that ssh-keygen can write when enrolling FIDO keys.

OpenBSD-Regress-ID: 6c97bf3f46e48866677ad69f54b77683eb92437f

10 months agoupstream: Don't assume existence of SK provider in test. Patch from
dtucker@openbsd.org [Wed, 4 Dec 2024 10:51:13 +0000 (10:51 +0000)] 
upstream: Don't assume existence of SK provider in test. Patch from

balu.gajjala at gmail via bz#3402.

OpenBSD-Regress-ID: d571932016d07d135b54433d07520b9e1901db43

10 months agoupstream: sync the list of options accepted by -o with ssh_config.5
djm@openbsd.org [Wed, 4 Dec 2024 14:37:55 +0000 (14:37 +0000)] 
upstream: sync the list of options accepted by -o with ssh_config.5

prompted by bz3455

OpenBSD-Commit-ID: 0ecbfa70aea6c769bcc259defe07182edf461f57

10 months agoupstream: don't screw up ssh-keygen -l output when the file
djm@openbsd.org [Wed, 4 Dec 2024 14:24:20 +0000 (14:24 +0000)] 
upstream: don't screw up ssh-keygen -l output when the file

contains CR characters; GHPR236 bz3385, fix from Dmitry Belyavskiy

OpenBSD-Commit-ID: e458cf6b0adcea5b69ef4c7ba38e590841d02ef4

10 months agoupstream: spelling; ok djm@
jsg@openbsd.org [Tue, 3 Dec 2024 22:30:03 +0000 (22:30 +0000)] 
upstream: spelling; ok djm@

OpenBSD-Commit-ID: c8ff3f70020451eef214e598117b7ce1a29853ef

10 months agoupstream: Remove fallback to compiled-in gropup for dhgex when the
dtucker@openbsd.org [Tue, 3 Dec 2024 16:27:53 +0000 (16:27 +0000)] 
upstream: Remove fallback to compiled-in gropup for dhgex when the

moduli file exists, but does not contain moduli within the client-requested
range. The fallback behaviour remains for the case where the moduli file does
not exist (typically, running tests prior to installing). From bz#2793, based
in part on patch from Joe Testa, ok djm@

OpenBSD-Commit-ID: b1a8c5dbbedf249b42474679ebaf14db7332b1ab

10 months agoupstream: Remove redundant field of definition check
tb@openbsd.org [Tue, 3 Dec 2024 15:53:51 +0000 (15:53 +0000)] 
upstream: Remove redundant field of definition check

This will allow us to get rid of EC_GROUP_method_of() in the near future.

ok djm

OpenBSD-Commit-ID: b4a3d2e00990cf5c2ec6881c21ddca67327c2df8

10 months agodon't ignore changes in regress Makefiles
Damien Miller [Wed, 4 Dec 2024 13:59:19 +0000 (00:59 +1100)] 
don't ignore changes in regress Makefiles

reported by Torben Hansen in bz2880

10 months agoSupport systemd-style socket activation in agent
Damien Miller [Wed, 4 Dec 2024 13:01:33 +0000 (00:01 +1100)] 
Support systemd-style socket activation in agent

Adds support for systemd LISTEN_PID/LISTEN_FDS socket activation to
ssh-agent. Activated when these environment variables are set and
the agent is started with the -d or -D option and no socket path
is set.

Based on GHPR502 by Daniel Kahn Gillmor, ok dtucker

10 months agoUpdate readme files to better reflect reality.
Darren Tucker [Wed, 4 Dec 2024 10:36:01 +0000 (21:36 +1100)] 
Update readme files to better reflect reality.

Prompted by bz#3738, ok djm@.

10 months agoupstream: Improve description of KbdInteractiveAuthentication.
dtucker@openbsd.org [Tue, 3 Dec 2024 14:12:47 +0000 (14:12 +0000)] 
upstream: Improve description of KbdInteractiveAuthentication.

Based on bz#3658, fixes jmc@ ok markus@ djm@.

OpenBSD-Commit-ID: 9fadb56b9afed554d501acbba911c685acd6ffc2

10 months agoInherit DESTDIR from the environment.
Jonas 'Sortie' Termansen [Sat, 2 Nov 2024 16:53:23 +0000 (17:53 +0100)] 
Inherit DESTDIR from the environment.

autoconf packages conventionally inherit the DESTDIR variable from the
environment.

10 months agoDefine u_short and u_long if needed.
Jonas 'Sortie' Termansen [Sat, 2 Nov 2024 21:10:39 +0000 (22:10 +0100)] 
Define u_short and u_long if needed.

10 months agoupstream: support FIDO tokens that return no attestation data, e.g.
djm@openbsd.org [Tue, 3 Dec 2024 08:31:49 +0000 (08:31 +0000)] 
upstream: support FIDO tokens that return no attestation data, e.g.

recent WinHello. From Michael Braun via GHPR542

OpenBSD-Commit-ID: a71b0542f2f7819ba0e33a88908e01b6fc49e4ce

10 months agoAdd wtmpdb support as Y2038 safe wtmp replacement
Thorsten Kukuk [Tue, 19 Nov 2024 09:53:28 +0000 (10:53 +0100)] 
Add wtmpdb support as Y2038 safe wtmp replacement

10 months agoupstream: unbreak
djm@openbsd.org [Mon, 2 Dec 2024 14:06:42 +0000 (14:06 +0000)] 
upstream: unbreak

OpenBSD-Commit-ID: 05b6c31f4a6e385338f43cc0e08776cea75802a1

10 months agoupstream: prefer AES-GCM to AES-CTR; ok deraadt markus
djm@openbsd.org [Mon, 2 Dec 2024 13:37:18 +0000 (13:37 +0000)] 
upstream: prefer AES-GCM to AES-CTR; ok deraadt markus

OpenBSD-Commit-ID: 8366a72e0f300ee31c5dab2c95025387ec15bbc9

10 months agoFix compilation with DEBUG_SK enabled
Shiva Kaul [Mon, 2 Dec 2024 07:04:20 +0000 (02:04 -0500)] 
Fix compilation with DEBUG_SK enabled

In `ssh_ecdsa_sk_verify`, the `datalen` variable was renamed to `dlen` -- but not in this debugging block.

10 months agoupstream: Import regenerated moduli.
dtucker@openbsd.org [Fri, 29 Nov 2024 00:13:36 +0000 (00:13 +0000)] 
upstream: Import regenerated moduli.

OpenBSD-Commit-ID: 311d271bf0fab8a119e84f4f696d8cd40731692f

10 months agoAdd make target for standalone sk-libfido2
Jeremy Stott [Fri, 18 Oct 2024 23:10:52 +0000 (12:10 +1300)] 
Add make target for standalone sk-libfido2

Add a Makefile target for sk-libfido2, the standalone fido2 security
key shared library, suitable for use with the SecurityKeyProvider
option.

Add a new configure option `--with-security-key-standalone` that
optionally sets the shared library target sk-libfido2$(SHLIBEXT), and
adds it to $(TARGETS).

misc.h is required when SK_STANDALONE is defined, because of the use
of `monotime_tv` in `sk_select_by_touch`.

Sets the shared library extension for sk-libfido2 is by setting
`SHLIBEXT` depending on the platform in configure.ac.

Add the shared library to the CI builds in the `sk` target config to
make sure it can compile under the same conditions as
`--with-security-key-builtin`.

Add a libssh-pic.a static library that compiles with `-fPIC` reusing
.c.lo method in sk-dummy.so for use in the shared library sk-libfido2.

Note, a separate static library libssh-pic.a is needed, since defining
-DSK_STANDALONE excludes some symbols needed in sshkey.lo.

11 months agomdoc2man: balance nested square brackets
Arnout Engelen [Fri, 18 Oct 2024 11:42:38 +0000 (13:42 +0200)] 
mdoc2man: balance nested square brackets

I noticed the square brackets in `destination [command [argument...]`
in the synopsis for the `ssh.1` manpage were not balanced,
this balances them.

Signed-off-by: Arnout Engelen <arnout@bzzt.net>
11 months agoupstream: fix argument of "Compression" directive in ssh -G config
djm@openbsd.org [Wed, 27 Nov 2024 16:07:08 +0000 (16:07 +0000)] 
upstream: fix argument of "Compression" directive in ssh -G config

dump, which used to work but broke in 9.8

OpenBSD-Commit-ID: c79936242d29c70d01941b28d2d07fd0b85fe46f

11 months agoupstream: new name/link for agent I-D
djm@openbsd.org [Wed, 27 Nov 2024 13:27:34 +0000 (13:27 +0000)] 
upstream: new name/link for agent I-D

OpenBSD-Commit-ID: e3420f3925a297a1b2ab7dfe7c7d274cfc8e1193

11 months agoupstream: mention that biometrics may be used for FIDO key user
djm@openbsd.org [Wed, 27 Nov 2024 13:00:23 +0000 (13:00 +0000)] 
upstream: mention that biometrics may be used for FIDO key user

verification as well as PIN. Prompted by Zack Newman, ok jmc@

OpenBSD-Commit-ID: b774a4438c9be70012661ee278450790d21277b8

11 months agoupstream: g/c outdated XXX comments
djm@openbsd.org [Tue, 26 Nov 2024 22:05:51 +0000 (22:05 +0000)] 
upstream: g/c outdated XXX comments

OpenBSD-Commit-ID: 74d0c0b74994d9a4343c4d7ea4948cb34f609a6c

11 months agoupstream: regression test for UpdateHostkeys with multiple keys backed
djm@openbsd.org [Tue, 26 Nov 2024 22:02:28 +0000 (22:02 +0000)] 
upstream: regression test for UpdateHostkeys with multiple keys backed

by ssh-agent. Patch from Maxime Rey.

OpenBSD-Regress-ID: 1777ab6e639e57c0e20cbcb6df60455b49fd8bb3

11 months agoupstream: Explicitly specify the signature algorithm when signing
djm@openbsd.org [Tue, 26 Nov 2024 22:01:37 +0000 (22:01 +0000)] 
upstream: Explicitly specify the signature algorithm when signing

hostkeys-prove requests.

Fixes a corner-case triggered by UpdateHostKeys with one or more unknown
host keys stored in ssh-agent where sshd refuses to accept the signature
coming back from the agent.

Report/fix from Maxime Rey

OpenBSD-Commit-ID: 460c7d527a24f92b7e5f68ca1a2fa242ebf0d086

11 months agoupstream: when using RSA keys to sign messages, select the
djm@openbsd.org [Tue, 26 Nov 2024 21:23:35 +0000 (21:23 +0000)] 
upstream: when using RSA keys to sign messages, select the

signature algorithm based on the requested hash algorithm ("-Ohashalg=xxx").

This allows using something other than rsa-sha2-512, which may not
be supported on all signing backends, e.g. some smartcards only
support SHA256.

Patch from Morten Linderud; ok markus@

OpenBSD-Commit-ID: 246353fac24e92629263996558c6788348363ad7

11 months agoupstream: turn off CDIAGFLAGS and turn back on INSTALL_STRIP
djm@openbsd.org [Sun, 24 Nov 2024 23:47:50 +0000 (23:47 +0000)] 
upstream: turn off CDIAGFLAGS and turn back on INSTALL_STRIP

accidentally changed in last commit

OpenBSD-Commit-ID: 6d07e4606997e36b860621a14dd41975f2902f8f

11 months agoDisable security key for bigendian interop. 403/head
Darren Tucker [Sat, 9 Nov 2024 00:41:44 +0000 (11:41 +1100)] 
Disable security key for bigendian interop.

It doesn't currently work.  It's not clear why, but I suspect
sk-dummy.so ends up being built for the wrong architecture.

11 months agoReshuffle OpenWRT test configs.
Darren Tucker [Fri, 8 Nov 2024 18:14:16 +0000 (05:14 +1100)] 
Reshuffle OpenWRT test configs.

Move the the flags used by the OpenWRT distro to mipsel target and
enable OpenSSL on all targets to improve coverage.

Explicitly disable security key and openssl on mips target so that host
end of the bigendian interop tests don't attempt them and fail (since
they're not enabled on the target side).

11 months agoAdd keytype to bigendian interop test.
Darren Tucker [Fri, 8 Nov 2024 16:26:08 +0000 (03:26 +1100)] 
Add keytype to bigendian interop test.

11 months agoIgnore chown failure, eg due to dangling symlinks.
Darren Tucker [Fri, 8 Nov 2024 16:24:29 +0000 (03:24 +1100)] 
Ignore chown failure, eg due to dangling symlinks.

11 months agoTest bigendian interop.
Darren Tucker [Sat, 2 Nov 2024 07:05:41 +0000 (18:05 +1100)] 
Test bigendian interop.

Where our test target is a bigendian system, do an additional build on
the runner host (which is little endian) and test interop between the two.
Should hopefully catch obvious endianness bugs.

11 months agoAllow overridding TEST_SSH_SSHD.
Darren Tucker [Fri, 1 Nov 2024 08:44:29 +0000 (19:44 +1100)] 
Allow overridding TEST_SSH_SSHD.

This will allow tests to specify an alternative sshd, eg on a remote
machine with different endianness.

11 months agoupstream: ssh-agent implemented an all-or-nothing allow-list of
djm@openbsd.org [Wed, 6 Nov 2024 22:51:26 +0000 (22:51 +0000)] 
upstream: ssh-agent implemented an all-or-nothing allow-list of

FIDO application IDs for security key-backed keys, to prevent web key handles
from being used remotely as this would likely lead to unpleasant surprises.
By default, only application IDs that start with "ssh:*" are allowed.

This adds a -Owebsafe-allow=... argument that can override the default
list with a more or less restrictive one. The default remains unchanged.

ok markus@

OpenBSD-Commit-ID: 957c1ed92a8d7c87453b9341f70cb3f4e6b23e8d

11 months agoupstream: Ignore extra groups that don't fit in the buffer passed
jca@openbsd.org [Mon, 4 Nov 2024 21:59:15 +0000 (21:59 +0000)] 
upstream: Ignore extra groups that don't fit in the buffer passed

to getgrouplist(3)

Our kernel supports 16 groups (NGROUPS_MAX), but nothing prevents
an admin from adding a user to more groups.  With that tweak we'll keep
on ignoring them instead of potentially reading past the buffer passed to
getgrouplist(3).  That behavior is explicitely described in initgroups(3).

ok millert@ gilles@

OpenBSD-Commit-ID: a959fc45ea3431b36f52eda04faefc58bcde00db

11 months agoAdd git signing key for Tim Rice
Damien Miller [Mon, 4 Nov 2024 03:39:27 +0000 (14:39 +1100)] 
Add git signing key for Tim Rice

11 months agoCorrect path to c-cpp.yml file in workflow config.
Darren Tucker [Fri, 1 Nov 2024 07:51:22 +0000 (18:51 +1100)] 
Correct path to c-cpp.yml file in workflow config.

11 months agoTest new OpenSSL and LibreSSL releases.`
Darren Tucker [Fri, 1 Nov 2024 07:44:42 +0000 (18:44 +1100)] 
Test new OpenSSL and LibreSSL releases.`

11 months agoAdd nbsd10 default test config.
Darren Tucker [Fri, 1 Nov 2024 07:44:00 +0000 (18:44 +1100)] 
Add nbsd10 default test config.

11 months agofix uint64_t types; reported by Tom G. Christensen 526/head
Damien Miller [Wed, 30 Oct 2024 03:25:14 +0000 (14:25 +1100)] 
fix uint64_t types; reported by Tom G. Christensen

12 months agohtole64() etc for systems without endian.h
Damien Miller [Sun, 27 Oct 2024 02:28:11 +0000 (13:28 +1100)] 
htole64() etc for systems without endian.h