]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
15 years ago - djm@cvs.openbsd.org 2010/10/05 05:13:18
Damien Miller [Thu, 7 Oct 2010 11:07:11 +0000 (22:07 +1100)] 
   - djm@cvs.openbsd.org 2010/10/05 05:13:18
     [sftp.c sshconnect.c]
     use default shell /bin/sh if $SHELL is ""; ok markus@

15 years ago - djm@cvs.openbsd.org 2010/10/01 23:05:32
Damien Miller [Thu, 7 Oct 2010 11:06:42 +0000 (22:06 +1100)] 
   - djm@cvs.openbsd.org 2010/10/01 23:05:32
     [cipher-3des1.c cipher-bf1.c cipher-ctr.c openbsd-compat/openssl-compat.h]
     adapt to API changes in openssl-1.0.0a
     NB. contains compat code to select correct API for older OpenSSL

15 years ago - (djm) [ssh-agent.c] Fix type for curve name.
Damien Miller [Thu, 7 Oct 2010 11:05:11 +0000 (22:05 +1100)] 
 - (djm) [ssh-agent.c] Fix type for curve name.

15 years agosadly, two typos on one line is not my best record
Damien Miller [Thu, 7 Oct 2010 11:00:24 +0000 (22:00 +1100)] 
sadly, two typos on one line is not my best record

15 years agounbreak previous
Damien Miller [Thu, 7 Oct 2010 10:59:40 +0000 (21:59 +1100)] 
unbreak previous

15 years ago - djm@cvs.openbsd.org 2010/09/30 11:04:51
Damien Miller [Thu, 7 Oct 2010 10:40:17 +0000 (21:40 +1100)] 
   - djm@cvs.openbsd.org 2010/09/30 11:04:51
     [servconf.c]
     prevent free() of string in .rodata when overriding AuthorizedKeys in
     a Match block; patch from rein AT basefarm.no

15 years ago - djm@cvs.openbsd.org 2010/09/26 22:26:33
Damien Miller [Thu, 7 Oct 2010 10:39:55 +0000 (21:39 +1100)] 
   - djm@cvs.openbsd.org 2010/09/26 22:26:33
     [sftp.c]
     when performing an "ls" in columnated (short) mode, only call
     ioctl(TIOCGWINSZ) once to get the window width instead of per-
     filename

15 years ago - djm@cvs.openbsd.org 2010/09/25 09:30:16
Damien Miller [Thu, 7 Oct 2010 10:39:17 +0000 (21:39 +1100)] 
   - djm@cvs.openbsd.org 2010/09/25 09:30:16
     [sftp.c configure.ac openbsd-compat/glob.c openbsd-compat/glob.h]
     make use of new glob(3) GLOB_KEEPSTAT extension to save extra server
     rountrips to fetch per-file stat(2) information.
     NB. update openbsd-compat/ glob(3) implementation from OpenBSD libc to
     match.

15 years ago - matthew@cvs.openbsd.org 2010/09/24 13:33:00
Damien Miller [Thu, 7 Oct 2010 10:25:27 +0000 (21:25 +1100)] 
   - matthew@cvs.openbsd.org 2010/09/24 13:33:00
     [misc.c misc.h configure.ac openbsd-compat/openbsd-compat.h]
     [openbsd-compat/timingsafe_bcmp.c]
     Add timingsafe_bcmp(3) to libc, mention that it's already in the
     kernel in kern(9), and remove it from OpenSSH.
     ok deraadt@, djm@
     NB. re-added under openbsd-compat/ for portable OpenSSH

15 years ago - jmc@cvs.openbsd.org 2010/09/23 13:36:46
Damien Miller [Fri, 24 Sep 2010 12:16:03 +0000 (22:16 +1000)] 
   - jmc@cvs.openbsd.org 2010/09/23 13:36:46
     [scp.1 sftp.1]
     add KexAlgorithms to the -o list;

15 years ago - jmc@cvs.openbsd.org 2010/09/23 13:34:43
Damien Miller [Fri, 24 Sep 2010 12:15:39 +0000 (22:15 +1000)] 
   - jmc@cvs.openbsd.org 2010/09/23 13:34:43
     [sftp.c]
     add [-l limit] to usage();

15 years ago - djm@cvs.openbsd.org 2010/09/22 22:58:51
Damien Miller [Fri, 24 Sep 2010 12:15:11 +0000 (22:15 +1000)] 
   - djm@cvs.openbsd.org 2010/09/22 22:58:51
     [atomicio.c atomicio.h misc.c misc.h scp.c sftp-client.c]
     [sftp-client.h sftp.1 sftp.c]
     add an option per-read/write callback to atomicio

     factor out bandwidth limiting code from scp(1) into a generic bandwidth
     limiter that can be attached using the atomicio callback mechanism

     add a bandwidth limit option to sftp(1) using the above
     "very nice" markus@

15 years ago - jmc@cvs.openbsd.org 2010/09/22 08:30:08
Damien Miller [Fri, 24 Sep 2010 12:11:53 +0000 (22:11 +1000)] 
   - jmc@cvs.openbsd.org 2010/09/22 08:30:08
     [ssh.1 ssh_config.5]
     ssh.1: add kexalgorithms to the -o list
     ssh_config.5: format the kexalgorithms in a more consistent
     (prettier!) way
     ok djm

15 years ago - djm@cvs.openbsd.org 2010/09/22 05:01:30
Damien Miller [Fri, 24 Sep 2010 12:11:14 +0000 (22:11 +1000)] 
   - djm@cvs.openbsd.org 2010/09/22 05:01:30
     [kex.c kex.h kexecdh.c kexecdhc.c kexecdhs.c readconf.c readconf.h]
     [servconf.c servconf.h ssh_config.5 sshconnect2.c sshd.c sshd_config.5]
     add a KexAlgorithms knob to the client and server configuration to allow
     selection of which key exchange methods are used by ssh(1) and sshd(8)
     and their order of preference.
     ok markus@

15 years ago - djm@cvs.openbsd.org 2010/09/20 07:19:27
Damien Miller [Fri, 24 Sep 2010 12:07:55 +0000 (22:07 +1000)] 
   - djm@cvs.openbsd.org 2010/09/20 07:19:27
     [mux.c]
     "atomically" create the listening mux socket by binding it on a temorary
     name and then linking it into position after listen() has succeeded.
     this allows the mux clients to determine that the server socket is
     either ready or stale without races. stale server sockets are now
     automatically removed
     ok deraadt

15 years ago - djm@cvs.openbsd.org 2010/09/20 04:54:07
Damien Miller [Fri, 24 Sep 2010 12:07:17 +0000 (22:07 +1000)] 
   - djm@cvs.openbsd.org 2010/09/20 04:54:07
     [jpake.c]
     missing #include

15 years ago - djm@cvs.openbsd.org 2010/09/20 04:50:53
Damien Miller [Fri, 24 Sep 2010 12:03:24 +0000 (22:03 +1000)] 
   - djm@cvs.openbsd.org 2010/09/20 04:50:53
     [jpake.c schnorr.c]
     check that received values are smaller than the group size in the
     disabled and unfinished J-PAKE code.
     avoids catastrophic security failure found by Sebastien Martini

15 years ago - djm@cvs.openbsd.org 2010/09/20 04:41:47
Damien Miller [Fri, 24 Sep 2010 12:02:56 +0000 (22:02 +1000)] 
   - djm@cvs.openbsd.org 2010/09/20 04:41:47
     [ssh.c]
     install a SIGCHLD handler to reap expiried child process; ok markus@

15 years ago - jmc@cvs.openbsd.org 2010/09/19 21:30:05
Damien Miller [Fri, 24 Sep 2010 12:01:54 +0000 (22:01 +1000)] 
   - jmc@cvs.openbsd.org 2010/09/19 21:30:05
     [sftp.1]
     more wacky macro fixing;

15 years ago - djm@cvs.openbsd.org 2010/09/11 21:44:20
Damien Miller [Fri, 24 Sep 2010 12:01:22 +0000 (22:01 +1000)] 
   - djm@cvs.openbsd.org 2010/09/11 21:44:20
     [ssh.1]
     mention RFC 5656 for ECC stuff

15 years ago - naddy@cvs.openbsd.org 2010/09/10 15:19:29
Damien Miller [Fri, 24 Sep 2010 12:00:54 +0000 (22:00 +1000)] 
   - naddy@cvs.openbsd.org 2010/09/10 15:19:29
     [ssh-keygen.1]
     * mention ECDSA in more places
     * less repetition in FILES section
     * SSHv1 keys are still encrypted with 3DES
     help and ok jmc@

15 years ago - (dtucker) [kex.h key.c packet.h ssh-agent.c ssh.c] A few more ECC ifdefs
Darren Tucker [Fri, 10 Sep 2010 02:28:24 +0000 (12:28 +1000)] 
 - (dtucker) [kex.h key.c packet.h ssh-agent.c ssh.c] A few more ECC ifdefs
   for missing headers and compiler warnings.

15 years ago - (djm) [authfd.c authfile.c bufec.c buffer.h configure.ac kex.h kexecdh.c]
Damien Miller [Fri, 10 Sep 2010 01:39:26 +0000 (11:39 +1000)] 
 - (djm) [authfd.c authfile.c bufec.c buffer.h configure.ac kex.h kexecdh.c]
   [kexecdhc.c kexecdhs.c key.c key.h myproposal.h packet.c readconf.c]
   [ssh-agent.c ssh-ecdsa.c ssh-keygen.c ssh.c] Disable ECDH and ECDSA on
   platforms that don't have the requisite OpenSSL support. ok dtucker@

15 years ago - djm@cvs.openbsd.org 2010/09/09 10:45:45
Damien Miller [Fri, 10 Sep 2010 01:23:34 +0000 (11:23 +1000)] 
   - djm@cvs.openbsd.org 2010/09/09 10:45:45
     [kex.c kex.h kexecdh.c key.c key.h monitor.c ssh-ecdsa.c]
     ECDH/ECDSA compliance fix: these methods vary the hash function they use
     (SHA256/384/512) depending on the length of the curve in use. The previous
     code incorrectly used SHA256 in all cases.

     This fix will cause authentication failure when using 384 or 521-bit curve
     keys if one peer hasn't been upgraded and the other has. (256-bit curve
     keys work ok). In particular you may need to specify HostkeyAlgorithms
     when connecting to a server that has not been upgraded from an upgraded
     client.

     ok naddy@

15 years ago - deraadt@cvs.openbsd.org 2010/09/08 04:13:31
Damien Miller [Fri, 10 Sep 2010 01:20:59 +0000 (11:20 +1000)] 
   - deraadt@cvs.openbsd.org 2010/09/08 04:13:31
     [compress.c]
     work around name-space collisions some buggy compilers (looking at you
     gcc, at least in earlier versions, but this does not forgive your current
     transgressions) seen between zlib and openssl
     ok djm

15 years ago - djm@cvs.openbsd.org 2010/09/08 03:54:36
Damien Miller [Fri, 10 Sep 2010 01:20:38 +0000 (11:20 +1000)] 
   - djm@cvs.openbsd.org 2010/09/08 03:54:36
     [authfile.c]
     typo

15 years ago - naddy@cvs.openbsd.org 2010/09/06 17:10:19
Damien Miller [Fri, 10 Sep 2010 01:20:11 +0000 (11:20 +1000)] 
   - naddy@cvs.openbsd.org 2010/09/06 17:10:19
     [sshd_config]
     add ssh_host_ecdsa_key to /etc; from Mattieu Baptiste
     <mattieu.b@gmail.com>
     ok deraadt@

15 years ago - jmc@cvs.openbsd.org 2010/09/04 09:38:34
Damien Miller [Fri, 10 Sep 2010 01:19:33 +0000 (11:19 +1000)] 
   - jmc@cvs.openbsd.org 2010/09/04 09:38:34
     [ssh-add.1 ssh.1]
     two more EXIT STATUS sections;

15 years ago - jmc@cvs.openbsd.org 2010/09/03 11:09:29
Damien Miller [Fri, 10 Sep 2010 01:17:54 +0000 (11:17 +1000)] 
   - jmc@cvs.openbsd.org 2010/09/03 11:09:29
     [scp.1]
     add an EXIT STATUS section for /usr/bin;

15 years ago - naddy@cvs.openbsd.org 2010/09/02 17:21:50
Damien Miller [Fri, 10 Sep 2010 01:17:38 +0000 (11:17 +1000)] 
   - naddy@cvs.openbsd.org 2010/09/02 17:21:50
     [ssh-keygen.c]
     Switch ECDSA default key size to 256 bits, which according to RFC5656
     should still be better than our current RSA-2048 default.
     ok djm@, markus@

15 years ago - markus@cvs.openbsd.org 2010/09/02 16:08:39
Damien Miller [Fri, 10 Sep 2010 01:17:02 +0000 (11:17 +1000)] 
  - markus@cvs.openbsd.org 2010/09/02 16:08:39
     [ssh.c]
     unbreak ControlPersist=yes for ControlMaster=yes; ok djm@

15 years ago - markus@cvs.openbsd.org 2010/09/02 16:07:25
Damien Miller [Fri, 10 Sep 2010 01:16:37 +0000 (11:16 +1000)] 
  - markus@cvs.openbsd.org 2010/09/02 16:07:25
     [ssh-keygen.c]
     permit -b 256, 384 or 521 as key size for ECDSA; ok djm@

15 years ago - djm@cvs.openbsd.org 2010/09/01 22:42:13
Damien Miller [Fri, 10 Sep 2010 01:16:09 +0000 (11:16 +1000)] 
   - djm@cvs.openbsd.org 2010/09/01 22:42:13
     [myproposal.h]
     prefer ECDH in a 256 bit curve field; prompted by naddy@

15 years ago - naddy@cvs.openbsd.org 2010/09/01 15:21:35
Damien Miller [Fri, 10 Sep 2010 01:15:33 +0000 (11:15 +1000)] 
   - naddy@cvs.openbsd.org 2010/09/01 15:21:35
     [servconf.c]
     pick up ECDSA host key by default; ok djm@

15 years ago - jmc@cvs.openbsd.org 2010/08/31 21:14:58
Damien Miller [Fri, 10 Sep 2010 01:15:10 +0000 (11:15 +1000)] 
   - jmc@cvs.openbsd.org 2010/08/31 21:14:58
     [ssh.1]
     small text tweak to accommodate previous;

15 years ago - jmc@cvs.openbsd.org 2010/08/31 17:40:54
Damien Miller [Fri, 10 Sep 2010 01:12:38 +0000 (11:12 +1000)] 
   - jmc@cvs.openbsd.org 2010/08/31 17:40:54
     [ssh-agent.1]
     fix some macro abuse;

15 years ago - djm@cvs.openbsd.org 2010/08/31 12:33:38
Damien Miller [Fri, 10 Sep 2010 01:12:09 +0000 (11:12 +1000)] 
   - djm@cvs.openbsd.org 2010/08/31 12:33:38
     [ssh-add.c ssh-agent.c ssh-keygen.c ssh-keysign.c ssh.c sshd.c]
     reintroduce commit from tedu@, which I pulled out for release
     engineering:
       OpenSSL_add_all_algorithms is the name of the function we have a
       man page for, so use that.  ok djm

15 years ago - (dtucker) [openbsd-compat/port-linux.c] Check is_selinux_enabled for exact
Darren Tucker [Fri, 10 Sep 2010 00:30:25 +0000 (10:30 +1000)] 
 - (dtucker) [openbsd-compat/port-linux.c] Check is_selinux_enabled for exact
   return code since it can apparently return -1 under some conditions.  From
   openssh bugs werbittewas de, ok djm@

15 years ago - (djm) [bufec.c kexecdh.c kexecdhc.c kexecdhs.c ssh-ecdsa.c] include
Damien Miller [Tue, 31 Aug 2010 12:50:48 +0000 (22:50 +1000)] 
 - (djm) [bufec.c kexecdh.c kexecdhc.c kexecdhs.c ssh-ecdsa.c] include
   includes.h

15 years ago - (djm) [Makefile.in] Add new ECC files
Damien Miller [Tue, 31 Aug 2010 12:47:15 +0000 (22:47 +1000)] 
 - (djm) [Makefile.in] Add new ECC files

15 years ago - djm@cvs.openbsd.org 2010/08/31 11:54:45
Damien Miller [Tue, 31 Aug 2010 12:41:14 +0000 (22:41 +1000)] 
   - djm@cvs.openbsd.org 2010/08/31 11:54:45
     [PROTOCOL PROTOCOL.agent PROTOCOL.certkeys auth2-jpake.c authfd.c]
     [authfile.c buffer.h dns.c kex.c kex.h key.c key.h monitor.c]
     [monitor_wrap.c myproposal.h packet.c packet.h pathnames.h readconf.c]
     [ssh-add.1 ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh-keygen.c]
     [ssh-keyscan.1 ssh-keyscan.c ssh-keysign.8 ssh.1 ssh.c ssh2.h]
     [ssh_config.5 sshconnect.c sshconnect2.c sshd.8 sshd.c sshd_config.5]
     [uuencode.c uuencode.h bufec.c kexecdh.c kexecdhc.c kexecdhs.c ssh-ecdsa.c]
     Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and
     host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer
     better performance than plain DH and DSA at the same equivalent symmetric
     key length, as well as much shorter keys.

     Only the mandatory sections of RFC5656 are implemented, specifically the
     three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and
     ECDSA. Point compression (optional in RFC5656 is NOT implemented).

     Certificate host and user keys using the new ECDSA key types are supported.

     Note that this code has not been tested for interoperability and may be
     subject to change.

     feedback and ok markus@

15 years ago - djm@cvs.openbsd.org 2010/08/31 09:58:37
Damien Miller [Tue, 31 Aug 2010 12:36:39 +0000 (22:36 +1000)] 
   - djm@cvs.openbsd.org 2010/08/31 09:58:37
     [auth-options.c auth1.c auth2.c bufaux.c buffer.h kex.c key.c packet.c]
     [packet.h ssh-dss.c ssh-rsa.c]
     Add buffer_get_cstring() and related functions that verify that the
     string extracted from the buffer contains no embedded \0 characters*
     This prevents random (possibly malicious) crap from being appended to
     strings where it would not be noticed if the string is used with
     a string(3) function.

     Use the new API in a few sensitive places.

     * actually, we allow a single one at the end of the string for now because
     we don't know how many deployed implementations get this wrong, but don't
     count on this to remain indefinitely.

15 years ago - djm@cvs.openbsd.org 2010/08/16 04:06:06
Damien Miller [Tue, 31 Aug 2010 12:32:12 +0000 (22:32 +1000)] 
   - djm@cvs.openbsd.org 2010/08/16 04:06:06
     [ssh-add.c ssh-agent.c ssh-keygen.c ssh-keysign.c ssh.c sshd.c]
     backout previous temporarily; discussed with deraadt@

15 years ago - tedu@cvs.openbsd.org 2010/08/12 23:34:39
Damien Miller [Tue, 31 Aug 2010 12:31:37 +0000 (22:31 +1000)] 
   - tedu@cvs.openbsd.org 2010/08/12 23:34:39
     [ssh-add.c ssh-agent.c ssh-keygen.c ssh-keysign.c ssh.c sshd.c]
     OpenSSL_add_all_algorithms is the name of the function we have a man page
     for, so use that.  ok djm

15 years ago - jmc@cvs.openbsd.org 2010/08/08 19:36:30
Damien Miller [Tue, 31 Aug 2010 12:31:14 +0000 (22:31 +1000)] 
   - jmc@cvs.openbsd.org 2010/08/08 19:36:30
     [ssh-keysign.8 ssh.1 sshd.8]
     use the same template for all FILES sections; i.e. -compact/.Pp where we
     have multiple items, and .Pa for path names;

15 years ago - (dtucker) [contrib/redhat/sshd.init] Bug #1810: initlog is deprecated,
Darren Tucker [Fri, 27 Aug 2010 00:12:54 +0000 (10:12 +1000)] 
 - (dtucker) [contrib/redhat/sshd.init] Bug #1810: initlog is deprecated,
   remove.  Patch from martynas at venck us.

15 years ago - (djm) Release OpenSSH-5.6p1
Damien Miller [Mon, 23 Aug 2010 11:20:20 +0000 (21:20 +1000)] 
 - (djm) Release OpenSSH-5.6p1

15 years ago- (djm) [regress/README.regress] typo
Damien Miller [Mon, 16 Aug 2010 21:04:28 +0000 (07:04 +1000)] 
- (djm) [regress/README.regress] typo

15 years ago - djm@cvs.openbsd.org 2010/08/12 21:49:44
Damien Miller [Mon, 16 Aug 2010 15:59:31 +0000 (01:59 +1000)] 
   - djm@cvs.openbsd.org 2010/08/12 21:49:44
     [ssh.c]
     close any extra file descriptors inherited from parent at start and
     reopen stdin/stdout to /dev/null when forking for ControlPersist.

     prevents tools that fork and run a captive ssh for communication from
     failing to exit when the ssh completes while they wait for these fds to
     close. The inherited fds may persist arbitrarily long if a background
     mux master has been started by ControlPersist. cvs and scp were effected
     by this.

     "please commit" markus@

15 years ago - (dtucker) [configure.ac openbsd-compat/Makefile.in
Darren Tucker [Mon, 16 Aug 2010 03:15:23 +0000 (13:15 +1000)] 
 - (dtucker) [configure.ac openbsd-compat/Makefile.in
   openbsd-compat/openbsd-compat.h openbsd-compat/strptime.c] Add strptime to
   the compat library which helps on platforms like old IRIX.  Based on work
   by djm, tested by Tom Christensen.

15 years ago - (tim) [auth.c] add cast to quiet compiler. Change only affects SVR5 systems.
Tim Rice [Thu, 12 Aug 2010 17:33:01 +0000 (10:33 -0700)] 
 - (tim) [auth.c] add cast to quiet compiler. Change only affects SVR5 systems.

15 years ago - (tim) [regress/login-timeout.sh regress/reconfigure.sh regress/reexec.sh
Tim Rice [Thu, 12 Aug 2010 16:43:13 +0000 (09:43 -0700)] 
 - (tim) [regress/login-timeout.sh regress/reconfigure.sh regress/reexec.sh
   regress/test-exec.sh] Under certain conditions when testing with sudo
   tests would fail because the pidfile could not be read by a regular user.
   "cat: cannot open ...../regress/pidfile: Permission denied (error 13)"
   Make sure cat is run by $SUDO.  no objection from me. djm@

15 years ago - (dtucker) bug #1530: strip trailing ":" from hostname in ssh-copy-id.
Darren Tucker [Tue, 10 Aug 2010 03:36:09 +0000 (13:36 +1000)] 
 - (dtucker) bug #1530: strip trailing ":" from hostname in ssh-copy-id.
   based in part on a patch from Colin Watson, ok djm@

15 years ago - (djm) bz#1561: don't bother setting IFF_UP on tun(4) device if it is
Damien Miller [Tue, 10 Aug 2010 02:47:40 +0000 (12:47 +1000)] 
 - (djm) bz#1561: don't bother setting IFF_UP on tun(4) device if it is
   already set. Makes FreeBSD user openable tunnels useful; patch from
   richard.burakowski+ossh AT mrburak.net, ok dtucker@

15 years ago - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
Damien Miller [Sun, 8 Aug 2010 16:32:05 +0000 (02:32 +1000)] 
 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
   [contrib/suse/openssh.spec] Crank version numbers

15 years ago - OpenBSD CVS Sync
Damien Miller [Sun, 8 Aug 2010 16:28:37 +0000 (02:28 +1000)] 
 - OpenBSD CVS Sync
   - djm@cvs.openbsd.org 2010/08/08 16:26:42
     [version.h]
     crank to 5.6

15 years agounbreak datestamps
Damien Miller [Sun, 8 Aug 2010 16:28:10 +0000 (02:28 +1000)] 
unbreak datestamps

15 years ago - djm@cvs.openbsd.org 2010/08/05 13:08:42
Damien Miller [Thu, 5 Aug 2010 13:09:48 +0000 (23:09 +1000)] 
   - djm@cvs.openbsd.org 2010/08/05 13:08:42
     [channels.c]
     Fix a trio of bugs in the local/remote window calculation for datagram
     data channels (i.e. TunnelForward):

     Calculate local_consumed correctly in channel_handle_wfd() by measuring
     the delta to buffer_len(c->output) from when we start to when we finish.
     The proximal problem here is that the output_filter we use in portable
     modified the length of the dequeued datagram (to futz with the headers
     for !OpenBSD).

     In channel_output_poll(), don't enqueue datagrams that won't fit in the
     peer's advertised packet size (highly unlikely to ever occur) or which
     won't fit in the peer's remaining window (more likely).

     In channel_input_data(), account for the 4-byte string header in
     datagram packets that we accept from the peer and enqueue in c->output.

     report, analysis and testing 2/3 cases from wierbows AT us.ibm.com;
     "looks good" markus@

15 years ago - djm@cvs.openbsd.org 2010/08/04 06:08:40
Damien Miller [Thu, 5 Aug 2010 03:06:20 +0000 (13:06 +1000)] 
   - djm@cvs.openbsd.org 2010/08/04 06:08:40
     [ssh-keysign.c]
     clean for -Wuninitialized (Id sync only; portable had this change)

15 years ago - djm@cvs.openbsd.org 2010/08/04 06:07:11
Damien Miller [Thu, 5 Aug 2010 03:05:31 +0000 (13:05 +1000)] 
   - djm@cvs.openbsd.org 2010/08/04 06:07:11
     [ssh-keygen.1 ssh-keygen.c]
     Support CA keys in PKCS#11 tokens; feedback and ok markus@

15 years ago - djm@cvs.openbsd.org 2010/08/04 05:49:22
Damien Miller [Thu, 5 Aug 2010 03:05:15 +0000 (13:05 +1000)] 
   - djm@cvs.openbsd.org 2010/08/04 05:49:22
     [authfile.c]
     commited the wrong version of the hostbased certificate diff; this
     version replaces some strlc{py,at} verbosity with xasprintf() at
     the request of markus@

15 years ago - djm@cvs.openbsd.org 2010/08/04 05:42:47
Damien Miller [Thu, 5 Aug 2010 03:04:50 +0000 (13:04 +1000)] 
   - djm@cvs.openbsd.org 2010/08/04 05:42:47
     [auth.c auth2-hostbased.c authfile.c authfile.h ssh-keysign.8]
     [ssh-keysign.c ssh.c]
     enable certificates for hostbased authentication, from Iain Morgan;
     "looks ok" markus@

15 years ago - djm@cvs.openbsd.org 2010/08/04 05:40:39
Damien Miller [Thu, 5 Aug 2010 03:03:51 +0000 (13:03 +1000)] 
   - djm@cvs.openbsd.org 2010/08/04 05:40:39
     [PROTOCOL.certkeys ssh-keygen.c]
     tighten the rules for certificate encoding by requiring that options
     appear in lexical order and make our ssh-keygen comply. ok markus@

15 years ago - djm@cvs.openbsd.org 2010/08/04 05:37:01
Damien Miller [Thu, 5 Aug 2010 03:03:13 +0000 (13:03 +1000)] 
   - djm@cvs.openbsd.org 2010/08/04 05:37:01
     [ssh.1 ssh_config.5 sshd.8]
     Remove mentions of weird "addr/port" alternate address format for IPv6
     addresses combinations. It hasn't worked for ages and we have supported
     the more commen "[addr]:port" format for a long time. ok jmc@ markus@

15 years ago - dtucker@cvs.openbsd.org 2010/07/23 08:49:25
Damien Miller [Tue, 3 Aug 2010 06:05:25 +0000 (16:05 +1000)] 
   - dtucker@cvs.openbsd.org 2010/07/23 08:49:25
     [ssh.1]
     Ciphers is documented in ssh_config(5) these days

15 years ago - djm@cvs.openbsd.org 2010/07/21 02:10:58
Damien Miller [Tue, 3 Aug 2010 06:05:05 +0000 (16:05 +1000)] 
   - djm@cvs.openbsd.org 2010/07/21 02:10:58
     [misc.c]
     sync timingsafe_bcmp() with the one dempsky@ committed to sys/lib/libkern

15 years ago - djm@cvs.openbsd.org 2010/07/19 09:15:12
Damien Miller [Tue, 3 Aug 2010 06:04:46 +0000 (16:04 +1000)] 
   - djm@cvs.openbsd.org 2010/07/19 09:15:12
     [clientloop.c readconf.c readconf.h ssh.c ssh_config.5]
     add a "ControlPersist" option that automatically starts a background
     ssh(1) multiplex master when connecting. This connection can stay alive
     indefinitely, or can be set to automatically close after a user-specified
     duration of inactivity. bz#1330 - patch by dwmw2 AT infradead.org, but
     further hacked on by wmertens AT cisco.com, apb AT cequrux.com,
     martin-mindrot-bugzilla AT earth.li and myself; "looks ok" markus@

15 years ago - djm@cvs.openbsd.org 2010/07/19 03:16:33
Damien Miller [Tue, 3 Aug 2010 06:04:22 +0000 (16:04 +1000)] 
   - djm@cvs.openbsd.org 2010/07/19 03:16:33
     [sftp-client.c]
     bz#1797: fix swapped args in upload_dir_internal(), breaking recursive
     upload depth checks and causing verbose printing of transfers to always
     be turned on; patch from imorgan AT nas.nasa.gov

15 years ago - djm@cvs.openbsd.org 2010/07/16 14:07:35
Damien Miller [Tue, 3 Aug 2010 06:04:03 +0000 (16:04 +1000)] 
   - djm@cvs.openbsd.org 2010/07/16 14:07:35
     [ssh-rsa.c]
     more timing paranoia - compare all parts of the expected decrypted
     data before returning. AFAIK not exploitable in the SSH protocol.
     "groovy" deraadt@

15 years ago - OpenBSD CVS Sync
Damien Miller [Tue, 3 Aug 2010 06:03:29 +0000 (16:03 +1000)] 
 - OpenBSD CVS Sync
   - djm@cvs.openbsd.org 2010/07/16 04:45:30
     [ssh-keygen.c]
     avoid bogus compiler warning

15 years ago - (dtucker) [monitor.c] Bug #1795: Initialize the values to be returned from
Darren Tucker [Tue, 3 Aug 2010 05:50:16 +0000 (15:50 +1000)] 
 - (dtucker) [monitor.c] Bug #1795: Initialize the values to be returned from
   PAM to sane values in case the PAM method doesn't write to them.  Spotted by
   Bitman Zhou, ok djm@.

15 years ago - (dtucker) [contrib/ssh-copy-ud.1] Bug #1786: update ssh-copy-id.1 with more
Darren Tucker [Mon, 19 Jul 2010 11:24:13 +0000 (21:24 +1000)] 
 - (dtucker) [contrib/ssh-copy-ud.1] Bug #1786: update ssh-copy-id.1 with more
   details about its behaviour WRT existing directories.  Patch from
   asguthrie at gmail com, ok djm.

15 years ago - schwarze@cvs.openbsd.org 2010/07/15 21:20:38
Damien Miller [Fri, 16 Jul 2010 03:59:59 +0000 (13:59 +1000)] 
   - schwarze@cvs.openbsd.org 2010/07/15 21:20:38
     [ssh-keygen.1]
     repair incorrect block nesting, which screwed up indentation;
     problem reported and fix OK by jmc@

15 years ago - jmc@cvs.openbsd.org 2010/07/14 17:06:58
Damien Miller [Fri, 16 Jul 2010 03:59:11 +0000 (13:59 +1000)] 
   - jmc@cvs.openbsd.org 2010/07/14 17:06:58
     [ssh.1]
     finally ssh synopsis looks nice again! this commit just removes a ton of
     hacks we had in place to make it work with old groff;

15 years ago - djm@cvs.openbsd.org 2010/07/13 23:13:16
Damien Miller [Fri, 16 Jul 2010 03:58:37 +0000 (13:58 +1000)] 
   - djm@cvs.openbsd.org 2010/07/13 23:13:16
     [auth-rsa.c channels.c jpake.c key.c misc.c misc.h monitor.c packet.c]
     [ssh-rsa.c]
     s/timing_safe_cmp/timingsafe_bcmp/g

15 years ago - djm@cvs.openbsd.org 2010/07/13 11:52:06
Damien Miller [Fri, 16 Jul 2010 03:57:51 +0000 (13:57 +1000)] 
   - djm@cvs.openbsd.org 2010/07/13 11:52:06
     [auth-rsa.c channels.c jpake.c key.c misc.c misc.h monitor.c]
     [packet.c ssh-rsa.c]
     implement a timing_safe_cmp() function to compare memory without leaking
     timing information by short-circuiting like memcmp() and use it for
     some of the more sensitive comparisons (though nothing high-value was
     readily attackable anyway); "looks ok" markus@

15 years ago - djm@cvs.openbsd.org 2010/07/12 22:41:13
Damien Miller [Fri, 16 Jul 2010 03:56:43 +0000 (13:56 +1000)] 
   - djm@cvs.openbsd.org 2010/07/12 22:41:13
     [ssh.c ssh_config.5]
     expand %h to the hostname in ssh_config Hostname options. While this
     sounds useless, it is actually handy for working with unqualified
     hostnames:

     Host *.*
        Hostname %h
     Host *
        Hostname %h.example.org

     "I like it" markus@

15 years ago - djm@cvs.openbsd.org 2010/07/12 22:38:52
Damien Miller [Fri, 16 Jul 2010 03:56:23 +0000 (13:56 +1000)] 
   - djm@cvs.openbsd.org 2010/07/12 22:38:52
     [ssh.c]
     Make ExitOnForwardFailure work with fork-after-authentication ("ssh -f")
     for protocol 2. ok markus@

15 years ago - djm@cvs.openbsd.org 2010/07/02 04:32:44
Damien Miller [Fri, 16 Jul 2010 03:56:01 +0000 (13:56 +1000)] 
   - djm@cvs.openbsd.org 2010/07/02 04:32:44
     [misc.c]
     unbreak strdelim() skipping past quoted strings, e.g.
     AllowUsers "blah blah" blah
     was broken; report and fix in bz#1757 from bitman.zhou AT centrify.com
     ok dtucker;

15 years ago - (tim) [contrib/redhat/openssh.spec] Bug 1796: Test for skip_x11_askpass
Tim Rice [Wed, 14 Jul 2010 20:42:28 +0000 (13:42 -0700)] 
 - (tim) [contrib/redhat/openssh.spec] Bug 1796: Test for skip_x11_askpass
   (line 77) should have been for no_x11_askpass.

15 years ago - djm@cvs.openbsd.org 2010/06/29 23:59:54
Damien Miller [Fri, 2 Jul 2010 03:42:18 +0000 (13:42 +1000)] 
   - djm@cvs.openbsd.org 2010/06/29 23:59:54
     [cert-userkey.sh]
     regress tests for key options in AuthorizedPrincipals

15 years ago - phessler@cvs.openbsd.org 2010/06/27 19:19:56
Damien Miller [Fri, 2 Jul 2010 03:40:16 +0000 (13:40 +1000)] 
   - phessler@cvs.openbsd.org 2010/06/27 19:19:56
     [Makefile]
     fix how we run the tests so we can successfully use SUDO='sudo -E'
     in our env

15 years ago - millert@cvs.openbsd.org 2010/07/01 13:06:59
Damien Miller [Fri, 2 Jul 2010 03:37:33 +0000 (13:37 +1000)] 
   - millert@cvs.openbsd.org 2010/07/01 13:06:59
     [scp.c]
     Fix a longstanding problem where if you suspend scp at the
     password/passphrase prompt the terminal mode is not restored.
     OK djm@

15 years ago - jmc@cvs.openbsd.org 2010/06/30 07:28:34
Damien Miller [Fri, 2 Jul 2010 03:37:17 +0000 (13:37 +1000)] 
   - jmc@cvs.openbsd.org 2010/06/30 07:28:34
     [sshd_config.5]
     tweak previous;

15 years ago - jmc@cvs.openbsd.org 2010/06/30 07:26:03
Damien Miller [Fri, 2 Jul 2010 03:37:01 +0000 (13:37 +1000)] 
   - jmc@cvs.openbsd.org 2010/06/30 07:26:03
     [ssh-keygen.c]
     sort usage();

15 years ago - jmc@cvs.openbsd.org 2010/06/30 07:24:25
Damien Miller [Fri, 2 Jul 2010 03:35:34 +0000 (13:35 +1000)] 
   - jmc@cvs.openbsd.org 2010/06/30 07:24:25
     [ssh-keygen.1]
     tweak previous;

15 years ago - djm@cvs.openbsd.org 2010/06/29 23:16:46
Damien Miller [Fri, 2 Jul 2010 03:35:19 +0000 (13:35 +1000)] 
   - djm@cvs.openbsd.org 2010/06/29 23:16:46
     [auth2-pubkey.c sshd_config.5]
     allow key options (command="..." and friends) in AuthorizedPrincipals;
     ok markus@

15 years ago - djm@cvs.openbsd.org 2010/06/29 23:15:30
Damien Miller [Fri, 2 Jul 2010 03:35:01 +0000 (13:35 +1000)] 
   - djm@cvs.openbsd.org 2010/06/29 23:15:30
     [ssh-keygen.1 ssh-keygen.c]
     allow import (-i) and export (-e) of PEM and PKCS#8 encoded keys;
     bz#1749; ok markus@

15 years ago - djm@cvs.openbsd.org 2010/06/26 23:04:04
Damien Miller [Fri, 2 Jul 2010 03:34:24 +0000 (13:34 +1000)] 
   - djm@cvs.openbsd.org 2010/06/26 23:04:04
     [ssh.c]
     oops, forgot to #include <canohost.h>; spotted and patch from chl@

15 years ago - jmc@cvs.openbsd.org 2010/06/26 00:57:07
Damien Miller [Fri, 2 Jul 2010 03:33:48 +0000 (13:33 +1000)] 
   - jmc@cvs.openbsd.org 2010/06/26 00:57:07
     [ssh_config.5]
     tweak previous;

15 years ago - (tim) [openbsd-compat/port-uw.c] Reorder includes. auth-options.h now needs
Tim Rice [Sat, 26 Jun 2010 23:45:15 +0000 (16:45 -0700)] 
 - (tim) [openbsd-compat/port-uw.c] Reorder includes. auth-options.h now needs
   key.h.

15 years ago - djm@cvs.openbsd.org 2010/06/25 23:10:30
Damien Miller [Sat, 26 Jun 2010 00:02:24 +0000 (10:02 +1000)] 
   - djm@cvs.openbsd.org 2010/06/25 23:10:30
     [ssh.c]
     log the hostname and address that we connected to at LogLevel=verbose
     after authentication is successful to mitigate "phishing" attacks by
     servers with trusted keys that accept authentication silently and
     automatically before presenting fake password/passphrase prompts;
     "nice!" markus@

15 years ago - djm@cvs.openbsd.org 2010/06/25 23:10:30
Damien Miller [Sat, 26 Jun 2010 00:02:03 +0000 (10:02 +1000)] 
   - djm@cvs.openbsd.org 2010/06/25 23:10:30
     [ssh.c]
     log the hostname and address that we connected to at LogLevel=verbose
     after authentication is successful to mitigate "phishing" attacks by
     servers with trusted keys that accept authentication silently and
     automatically before presenting fake password/passphrase prompts;
     "nice!" markus@

15 years ago - djm@cvs.openbsd.org 2010/06/25 08:46:17
Damien Miller [Sat, 26 Jun 2010 00:01:33 +0000 (10:01 +1000)] 
   - djm@cvs.openbsd.org 2010/06/25 08:46:17
     [auth1.c auth2-none.c]
     skip the initial check for access with an empty password when
     PermitEmptyPasswords=no; bz#1638; ok markus@

15 years ago - djm@cvs.openbsd.org 2010/06/25 07:20:04
Damien Miller [Sat, 26 Jun 2010 00:00:14 +0000 (10:00 +1000)] 
   - djm@cvs.openbsd.org 2010/06/25 07:20:04
     [channels.c session.c]
     bz#1750: fix requirement for /dev/null inside ChrootDirectory for
     internal-sftp accidentally introduced in r1.253 by removing the code
     that opens and dup /dev/null to stderr and modifying the channels code
     to read stderr but discard it instead; ok markus@

15 years ago - djm@cvs.openbsd.org 2010/06/25 07:14:46
Damien Miller [Fri, 25 Jun 2010 23:50:30 +0000 (09:50 +1000)] 
   - djm@cvs.openbsd.org 2010/06/25 07:14:46
     [channels.c mux.c readconf.c readconf.h ssh.h]
     bz#1327: remove hardcoded limit of 100 permitopen clauses and port
     forwards per direction; ok markus@ stevesk@

15 years ago - djm@cvs.openbsd.org 2010/06/23 02:59:02
Damien Miller [Fri, 25 Jun 2010 23:48:02 +0000 (09:48 +1000)] 
   - djm@cvs.openbsd.org 2010/06/23 02:59:02
     [ssh-keygen.c]
     fix printing of extensions in v01 certificates that I broke in r1.190

15 years ago - djm@cvs.openbsd.org 2010/06/22 04:59:12
Damien Miller [Fri, 25 Jun 2010 23:47:43 +0000 (09:47 +1000)] 
   - djm@cvs.openbsd.org 2010/06/22 04:59:12
     [session.c]
     include the user name on "subsystem request for ..." log messages;
     bz#1571; ok dtucker@

15 years ago - djm@cvs.openbsd.org 2010/06/22 04:54:30
Damien Miller [Fri, 25 Jun 2010 23:39:59 +0000 (09:39 +1000)] 
   - djm@cvs.openbsd.org 2010/06/22 04:54:30
     [ssh-keyscan.c]
     replace verbose and overflow-prone Linebuf code with read_keyfile_line()
     based on patch from joachim AT joachimschipper.nl; bz#1565; ok dtucker@

15 years ago - djm@cvs.openbsd.org 2010/06/22 04:49:47
Damien Miller [Fri, 25 Jun 2010 23:39:25 +0000 (09:39 +1000)] 
   - djm@cvs.openbsd.org 2010/06/22 04:49:47
     [auth.c]
     queue auth debug messages for bad ownership or permissions on the user's
     keyfiles. These messages will be sent after the user has successfully
     authenticated (where our client will display them with LogLevel=debug).