]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
dtucker@openbsd.org [Fri, 20 Nov 2020 02:14:16 +0000 (02:14 +0000)]
upstream: Explicitly initialize all members of the
find_by_key_ctx struct. Initializing a single member should be enough
(the spec says the remainder should be initialized as per the static
rules) but some GCCs warn on this which prevents us testing with -Werror
on those. ok deraadt@ djm@
OpenBSD-Commit-ID:
687126e60a27d30f02614760ef3c3ae4e8d6af28
dtucker@openbsd.org [Thu, 19 Nov 2020 23:05:05 +0000 (23:05 +0000)]
upstream: draft-ietf-secsh-architecture is now RFC4251.
OpenBSD-Commit-ID:
cb0bb58c2711fb5ed519507659be1dcf179ed403
dtucker@openbsd.org [Tue, 17 Nov 2020 11:23:58 +0000 (11:23 +0000)]
upstream: Specify that the KDF function is bcrypt. Based on github
PR#214 from rafork, ok markus@, mdoc correction jmc@
OpenBSD-Commit-ID:
d8f2853e7edbcd483f31b50da77ab80ffa18b4ef
djm@openbsd.org [Sun, 15 Nov 2020 22:34:58 +0000 (22:34 +0000)]
upstream: revert r1.341; it breaks ProxyJump; reported by sthen@
OpenBSD-Commit-ID:
6ac2f945b26cb86d936eed338f77861d6da8356a
djm@openbsd.org [Fri, 13 Nov 2020 07:30:44 +0000 (07:30 +0000)]
upstream: scrub keyboard-interactive authentication prompts coming
from the server through asmprintf() prior to display; suggested by and ok
dtucker@
OpenBSD-Commit-ID:
31fe93367645c37fbfe4691596bf6cf1e3972a58
djm@openbsd.org [Fri, 13 Nov 2020 04:53:12 +0000 (04:53 +0000)]
upstream: prefix keyboard interactive prompts with (user@host) to
make it easier to determine which connection they are associated with in
cases like scp -3, ProxyJump, etc. bz#3224 ok dtucker
OpenBSD-Commit-ID:
67e6189b04b46c867662f8a6759cf3ecb5f59170
Darren Tucker [Fri, 13 Nov 2020 06:56:11 +0000 (17:56 +1100)]
Remove use of TIME_WITH_SYS_TIME.
It was only set by the recently removed AC_HEADER_TIME macro, replace
with simple inclusions of both sys/time.h and time.h. Should prevent
mis-detection of struct timespec.
Damien Miller [Fri, 13 Nov 2020 03:20:43 +0000 (14:20 +1100)]
Revert "detect Linux/X32 systems"
This reverts commit
5b56bd0affea7b02b540bdbc4d1d271b0e4fc885 .
The approach used was incorrect; discussion in bz#3085
Damien Miller [Fri, 13 Nov 2020 02:22:15 +0000 (13:22 +1100)]
SELinux has deprecated security_context_t
(it was only ever a char* anyway)
Darren Tucker [Fri, 13 Nov 2020 02:43:30 +0000 (13:43 +1100)]
Remove obsolete AC_HEADER_TIME macro.
AC_HEADER_TIME is marked as obsolete in autoconf-2.70 and as far as I
can tell everything we have that might be old enough to need it doesn't.
djm@openbsd.org [Thu, 12 Nov 2020 22:56:00 +0000 (22:56 +0000)]
upstream: when prompting the user to accept a new hostkey, display
any other host names/addresses already associated with the key. E.g.
> The authenticity of host 'test (10.0.0.1)' can't be established.
> ECDSA key fingerprint is SHA256:milU4MODXm8iJQI18wlsbPG7Yup+34fuNNmV08qDnax.
> This host key is known by the following other names/addresses:
> ~/.ssh/known_hosts:1: host.example.org,10.0.0.1
> ~/.ssh/known_hosts:2: [hashed name]
> ~/.ssh/known_hosts:3: [hashed name]
> ~/.ssh/known_hosts:4: host
> ~/.ssh/known_hosts:5: [host]:2222
> Are you sure you want to continue connecting (yes/no/[fingerprint])?
feedback and ok markus@
OpenBSD-Commit-ID:
f6f58a77b49f1368b5883b3a1f776447cfcc7ef4
dtucker@openbsd.org [Thu, 12 Nov 2020 22:38:57 +0000 (22:38 +0000)]
upstream: Prevent integer overflow when ridiculously large
ConnectTimeout is specified, capping the effective value (for most platforms)
at 24 days. bz#3229, ok djm@
OpenBSD-Commit-ID:
62d4c4b7b87d111045f8e9f28b5b532d17ac5bc0
djm@openbsd.org [Wed, 11 Nov 2020 05:22:32 +0000 (05:22 +0000)]
upstream: fix logic error that broke URI parsing in ProxyJump
directives; ok dtucker@
OpenBSD-Commit-ID:
96d48839b1704882a0e9a77898f5e14b2d222705
claudio@openbsd.org [Tue, 10 Nov 2020 07:46:20 +0000 (07:46 +0000)]
upstream: Free the previously allocated msg buffer after writing it
out. OK djm@
OpenBSD-Commit-ID:
18c055870fc75e4cb9f926c86c7543e2e21d7fa4
Darren Tucker [Wed, 11 Nov 2020 01:30:46 +0000 (12:30 +1100)]
Prevent excessively long username going to PAM.
This is a mitigation for a buffer overflow in Solaris' PAM username
handling (CVE-2020-14871), and is only enabled for Sun-derived PAM
implementations. This is not a problem in sshd itself, it only
prevents sshd from being used as a vector to attack Solaris' PAM.
It does not prevent the bug in PAM from being exploited via some other
PAM application.
Based on github PR#212 from Mike Scott but implemented slightly
differently. ok tim@ djm@
djm@openbsd.org [Sun, 8 Nov 2020 23:19:03 +0000 (23:19 +0000)]
upstream: unbreak; missing NULL check
OpenBSD-Commit-ID:
6613dfab488123f454d348ef496824476b8c11c0
djm@openbsd.org [Sun, 8 Nov 2020 22:37:24 +0000 (22:37 +0000)]
upstream: when requesting a security key touch on stderr, inform the
user once the touch has been recorded; requested by claudio@ ok markus@
OpenBSD-Commit-ID:
3b76ee444490e546b9ea7f879e4092ee0d256233
Darren Tucker [Sun, 8 Nov 2020 13:33:35 +0000 (00:33 +1100)]
Remove preprocessor directive from log macro calls.
Preprocessor directives inside macro calls, such as the new log macros,
are undefined behaviour and do not work with, eg old GCCs. Put the
entire log call inside the ifdef for OPENSSL_HAS_NISTP521.
dtucker@openbsd.org [Sun, 8 Nov 2020 12:10:20 +0000 (12:10 +0000)]
upstream: Add a comment documenting the source of the moduli group
sizes.
OpenBSD-Commit-ID:
aec0725ce607630caaa62682624c6763b350391c
dtucker@openbsd.org [Sun, 8 Nov 2020 11:46:12 +0000 (11:46 +0000)]
upstream: Replace WITH_OPENSSL ifdefs in log calls with a macro.
The log calls are themselves now macros, and preprocessor directives inside
macro arguments are undefined behaviour which some compilers (eg old GCCs)
choke on. It also makes the code tidier. ok deraadt@
OpenBSD-Commit-ID:
cc12a9029833d222043aecd252d654965c351a69
Darren Tucker [Fri, 6 Nov 2020 06:11:16 +0000 (17:11 +1100)]
Fix function body for variadic macro test.
AC_LANG_PROGRAM puts its second argument inside main() so we don't need
to do it ourselves.
Darren Tucker [Fri, 6 Nov 2020 05:53:24 +0000 (16:53 +1100)]
Remove AC_PROC_CC_C99 obsoleted in autoconf 2.70.
Since we only use it to make sure we can handle variadic macros,
explicitly check only for that. with & ok djm@
Darren Tucker [Fri, 6 Nov 2020 02:56:41 +0000 (13:56 +1100)]
Replace AC_TRY_COMPILE obsoleted in autoconf 2.70.
Replace with the equivalent AC_COMPILE_IFELSE.
Darren Tucker [Fri, 6 Nov 2020 02:55:33 +0000 (13:55 +1100)]
Move AC_PROG_CC_C99 to immediately afer AC_PROG_CC.
This puts the related C version selection output in the same place.
Darren Tucker [Fri, 6 Nov 2020 02:54:17 +0000 (13:54 +1100)]
AC_CHECK_HEADER() is obsoleted in autoconf 2.70.
Replace with the non-obsoleted AC_CHECK_HEADERS().
djm@openbsd.org [Tue, 3 Nov 2020 22:53:12 +0000 (22:53 +0000)]
upstream: fold consecutive '*' wildcards to mitigate combinatorial
explosion of recursive searches; ok dtucker
OpenBSD-Commit-ID:
d18bcb39c40fb8a1ab61153db987e7d11dd3792b
djm@openbsd.org [Fri, 30 Oct 2020 01:50:07 +0000 (01:50 +0000)]
upstream: print reason in fatal error message when
kex_assemble_namelist() fails
OpenBSD-Commit-ID:
a9975ee8db6c98d6f32233d88051b2077ca63dab
djm@openbsd.org [Thu, 29 Oct 2020 03:13:06 +0000 (03:13 +0000)]
upstream: fix sshd_config SetEnv directive inside Match blocks; part of
github PR#201 from github user manuelm
OpenBSD-Commit-ID:
9772e3748abff3ad65ae8fc43d026ed569b1d2bc
djm@openbsd.org [Thu, 29 Oct 2020 03:01:18 +0000 (03:01 +0000)]
upstream: fix type of nid in type_bits_valid(); github PR#202 from
github user thingsconnected
OpenBSD-Commit-ID:
769d2b040dec7ab32d323daf54b854dd5dcb5485
djm@openbsd.org [Thu, 29 Oct 2020 02:52:43 +0000 (02:52 +0000)]
upstream: whitespace; no code change
OpenBSD-Commit-ID:
efefc1c47e880887bdee8cd2127ca93177eaad79
djm@openbsd.org [Thu, 29 Oct 2020 02:47:23 +0000 (02:47 +0000)]
upstream: UpdateHostkeys: fixed/better detection of host keys that
exist under other names and addresses; spotted by and debugged with lots of
help from jca@
OpenBSD-Commit-ID:
5113d7f550bbd48243db1705afbf16b63792d4b7
Duncan Eastoe [Wed, 21 Oct 2020 09:11:10 +0000 (10:11 +0100)]
session.c: use "denylist" terminology
Follow upstream (
6d755706a0059eb9e2d63517f288b75cbc3b4701 ) language
improvements in this portable-specific code.
Damien Miller [Tue, 27 Oct 2020 05:46:31 +0000 (16:46 +1100)]
Remove checks for strict POSIX mkdtemp()
We needed a mkdtemp() that accepted template paths that did not
end in XXXXXX a long time ago for KRB4, but that code is long
deprecated. We no longer need to replace mkdtemp() for strictly
following POSIX. ok dtucker@
dtucker@openbsd.org [Mon, 26 Oct 2020 00:39:04 +0000 (00:39 +0000)]
upstream: Minor man page fixes (capitalization, commas) identified by
the manpage-l10n project via bz#3223. feedback deraadt@, ok jmc@
OpenBSD-Commit-ID:
ab83af0daf18369244a72daaec6c4a58a9eb7e2c
dtucker@openbsd.org [Mon, 19 Oct 2020 22:49:23 +0000 (22:49 +0000)]
upstream: Adapt XMSS to new logging infrastructure. With markus@, ok
djm@.
OpenBSD-Commit-ID:
9c35ec3aa0f710e4e3325187ceff4fa3791686de
djm@openbsd.org [Mon, 19 Oct 2020 08:07:08 +0000 (08:07 +0000)]
upstream: fix SEGV on fatal() errors spotted by dtucker@
OpenBSD-Commit-ID:
75f155a1ac61e364ed00dc379e2c42df81067ce2
Darren Tucker [Sun, 18 Oct 2020 23:54:41 +0000 (10:54 +1100)]
Use fatal_fr not fatal_r when passing r.
Caught by the PAM -Werror tinderbox build.
djm@openbsd.org [Sun, 18 Oct 2020 11:32:01 +0000 (11:32 +0000)]
upstream: use the new variant log macros instead of prepending
__func__ and appending ssh_err(r) manually; ok markus@
OpenBSD-Commit-ID:
1f14b80bcfa85414b2a1a6ff714fb5362687ace8
djm@openbsd.org [Sun, 18 Oct 2020 11:21:59 +0000 (11:21 +0000)]
upstream: variants of the log methods that append a ssherr.h string
from a supplied error code; ok markus@
OpenBSD-Commit-ID:
aed98c4435d48d036ae6740300f6a8357b7cc0bf
djm@openbsd.org [Sun, 18 Oct 2020 11:14:27 +0000 (11:14 +0000)]
upstream: remove a level of macro indirection; ok markus@
OpenBSD-Commit-ID:
0c529d06e902c5d1a6b231e1bec6157f76dc67c9
djm@openbsd.org [Sun, 18 Oct 2020 11:13:45 +0000 (11:13 +0000)]
upstream: add some variant log.h calls that prepend the calling
function name; ok markus@
OpenBSD-Commit-ID:
4be1b2e2455b271ddb7457bc195c5367644f4e48
Damien Miller [Sat, 17 Oct 2020 11:55:24 +0000 (22:55 +1100)]
missing header
Damien Miller [Sat, 17 Oct 2020 11:47:52 +0000 (22:47 +1100)]
sync regress/misc/sk-dummy/fatal.c
djm@openbsd.org [Sat, 17 Oct 2020 01:28:20 +0000 (01:28 +0000)]
upstream: make the log functions that exit (sshlogdie(),
sshfatal(), etc) have identical signatures. Makes things a bit more
consistent...
OpenBSD-Commit-ID:
bd0ae124733389d7c0042e135c71ee9091362eb9
jmc@openbsd.org [Fri, 16 Oct 2020 14:34:33 +0000 (14:34 +0000)]
upstream: add space between macro arg and punctuation;
OpenBSD-Commit-ID:
bb81e2ed5a77832fe62ab30a915ae67cda57633e
Damien Miller [Sat, 17 Oct 2020 01:03:34 +0000 (12:03 +1100)]
check for and require a C99 capable compiler
recent logging changes use __VA_ARGS__.
Damien Miller [Sat, 17 Oct 2020 00:51:20 +0000 (11:51 +1100)]
logging is now macros, remove function pointers
Damien Miller [Sat, 17 Oct 2020 00:42:26 +0000 (11:42 +1100)]
adapt sk-dummy's fatal implementation to changes
Damien Miller [Sat, 17 Oct 2020 00:33:13 +0000 (11:33 +1100)]
fix netcat build problem
djm@openbsd.org [Fri, 16 Oct 2020 13:26:13 +0000 (13:26 +0000)]
upstream: LogVerbose keyword for ssh and sshd
Allows forcing maximum debug logging by file/function/line pattern-
lists.
ok markus@
OpenBSD-Commit-ID:
c294c25732d1b4fe7e345cb3e044df00531a6356
djm@openbsd.org [Fri, 16 Oct 2020 13:24:45 +0000 (13:24 +0000)]
upstream: revised log infrastructure for OpenSSH
log functions receive function, filename and line number of caller.
We can use this to selectively enable logging via pattern-lists.
ok markus@
OpenBSD-Commit-ID:
51a472610cbe37834ce6ce4a3f0e0b1ccc95a349
djm@openbsd.org [Fri, 16 Oct 2020 02:37:12 +0000 (02:37 +0000)]
upstream: use do_log2 instead of function pointers to different log
functions
OpenBSD-Commit-ID:
88077b826d348c58352a6b394755520f4e484480
djm@openbsd.org [Wed, 14 Oct 2020 00:55:17 +0000 (00:55 +0000)]
upstream: make UpdateHostkeys still more conservative: refuse to
proceed if one of the keys offered by the server is already in known_hosts
under another name. This avoid collisions between address entries for
different host aliases when CheckHostIP=yes
Also, do not attempt to fix known_hosts with incomplete host/ip matches
when there are no new or deprecated hostkeys.
OpenBSD-Commit-ID:
95c19842f7c41f9bd9c92aa6441a278c0fd0c4a3
kn@openbsd.org [Mon, 12 Oct 2020 08:36:36 +0000 (08:36 +0000)]
upstream: Zap unused family parameter from ssh_connect_direct()
sshconnect.c r1.241 from 2013 made it unused; found while reading code.
OK djm
OpenBSD-Commit-ID:
219ba6d7f9925d0b7992918612680399d86712b5
Philip Hands [Sat, 3 Oct 2020 22:15:46 +0000 (00:15 +0200)]
shift contents of long $() into filter_ids()
This was prompted by the fact that posh does not deal with $()
that contains comments where the comment includes an odd number
of single-quotes. It seems to get befuddled into trying to find
the matching quote.
Regardless, making a function for filtering the unneeded ids
seems much neater than avoiding apostrophes,
so that's what I've done.
SSH-Copy-ID-Upstream:
3dab3366a584427045c8a690a93282f02c09cf24
Philip Hands [Sat, 3 Oct 2020 21:15:16 +0000 (23:15 +0200)]
combine if/elif to avoid duplication of the action
SSH-Copy-ID-Upstream:
42aeb1cc53d3f7f6e78edc210fb121fda0834914
Philip Hands [Sat, 3 Oct 2020 19:45:16 +0000 (21:45 +0200)]
shellcheck tidyage
SSH-Copy-ID-Upstream:
5b08f840e78ac544288b3983010a1b0585e966fd
Philip Hands [Sat, 3 Oct 2020 19:10:03 +0000 (21:10 +0200)]
tidy up test of $SCRATCH_DIR creation
SSH-Copy-ID-Upstream:
2d8b22d96c105d87743ffe8874887b06f8989b93
Philip Hands [Wed, 16 Sep 2020 14:13:30 +0000 (16:13 +0200)]
add -s flag: to install keys via SFTP
This is prompted by:
https://bugzilla.mindrot.org/show_bug.cgi?id=3201
Thanks go to Matthias Blümel for the idea, and the helpful patch, from
which this patch grew.
SSH-Copy-ID-Upstream:
f7c76dc64427cd20287a6868f672423b62057614
djm@openbsd.org [Sun, 11 Oct 2020 22:14:38 +0000 (22:14 +0000)]
upstream: UpdateHostkeys: check for keys under other names
Stop UpdateHostkeys from automatically removing deprecated keys from
known_hosts files if the same keys exist under a different name or
address to the host that is being connected to.
This avoids UpdateHostkeys from making known_hosts inconsistent in
some cases. For example, multiple host aliases sharing address-based
known_hosts on different lines, or hosts that resolves to multiple
addresses.
ok markus@
OpenBSD-Commit-ID:
6444a705ba504c3c8ccddccd8d1b94aa33bd11c1
djm@openbsd.org [Sun, 11 Oct 2020 22:13:37 +0000 (22:13 +0000)]
upstream: UpdateHostkeys: better CheckHostIP handling
When preparing to update the known_hosts file, fully check both
entries for both the host and the address (if CheckHostIP enabled)
and ensure that, at the end of the operation, entries for both are
recorded.
Make sure this works with HashKnownHosts too, which requires maintaining
a list of entry-types seen across the whole file for each key.
ok markus@
OpenBSD-Commit-ID:
374dc263103f6b343d9671f87dbf81ffd0d6abdd
djm@openbsd.org [Sun, 11 Oct 2020 22:12:44 +0000 (22:12 +0000)]
upstream: UpdateHostkeys: better detect manual host entries
Disable UpdateHostkeys if the known_hosts line has more than two
entries in the pattern-list. ssh(1) only writes "host" or "host,ip"
lines so anything else was added by a different tool or by a human.
ok markus@
OpenBSD-Commit-ID:
e434828191fb5f3877d4887c218682825aa59820
djm@openbsd.org [Thu, 8 Oct 2020 01:15:16 +0000 (01:15 +0000)]
upstream: don't misdetect comma-separated hostkey names as wildcards;
spotted by naddy@
OpenBSD-Commit-ID:
4b874edfec7fc324a21b130bdb42f912177739ce
wangxp006 [Thu, 8 Oct 2020 09:49:59 +0000 (17:49 +0800)]
fix TEST_MALLOC_OPTIONS var
djm@openbsd.org [Thu, 8 Oct 2020 00:31:05 +0000 (00:31 +0000)]
upstream: clarify conditions for UpdateHostkeys
OpenBSD-Commit-ID:
9cba714cf6aeed769f998ccbe8c483077a618e27
djm@openbsd.org [Wed, 7 Oct 2020 06:38:16 +0000 (06:38 +0000)]
upstream: remove GlobalKnownHostsFile for this test after
UpdateHostkeys change
OpenBSD-Regress-ID:
a940ad79d59343319613ba8fc46b6ef24aa3f8e1
djm@openbsd.org [Wed, 7 Oct 2020 02:26:28 +0000 (02:26 +0000)]
upstream: Disable UpdateHostkeys when hostkey checking fails
If host key checking fails (i.e. a wrong host key is recorded for the
server) and the user elects to continue (via StrictHostKeyChecking=no),
then disable UpdateHostkeys for the session.
reminded by Mark D. Baushke; ok markus@
OpenBSD-Commit-ID:
98b524f121f4252309dd21becd8c4cacb0c6042a
djm@openbsd.org [Wed, 7 Oct 2020 02:25:43 +0000 (02:25 +0000)]
upstream: Fix UpdateHostkeys/HashKnownHosts/CheckHostIP bug
When all of UpdateHostkeys, HashKnownHosts and ChechHostIP
were enabled and new host keys were learned, known_hosts IP
entries were not being recorded for new host keys.
reported by matthieu@ ok markus@
OpenBSD-Commit-ID:
a654a8290bd1c930aac509e8158cf85e42e49cb7
djm@openbsd.org [Wed, 7 Oct 2020 02:24:51 +0000 (02:24 +0000)]
upstream: don't UpdateHostkeys when the hostkey is verified by the
GlobalKnownHostsFile file, support only UserKnownHostsFile matches
suggested by Mark D. Baushke; feedback and ok markus@
OpenBSD-Commit-ID:
eabb771a6add676c398d38a143a1aff5f04abbb9
djm@openbsd.org [Wed, 7 Oct 2020 02:22:23 +0000 (02:22 +0000)]
upstream: revert kex->flags cert hostkey downgrade back to a plain
key (commitid VtF8vozGOF8DMKVg). We now do this a simpler way that needs less
plumbing.
ok markus@
OpenBSD-Commit-ID:
fb92d25b216bff8c136da818ac2221efaadf18ed
djm@openbsd.org [Wed, 7 Oct 2020 02:20:35 +0000 (02:20 +0000)]
upstream: simply disable UpdateHostkeys when a certificate
successfully authenticated the host; simpler than the complicated plumbing
via kex->flags we have now.
ok markus@
OpenBSD-Commit-ID:
80e39644eed75717d563a7f177e8117a0e14f42c
djm@openbsd.org [Wed, 7 Oct 2020 02:18:45 +0000 (02:18 +0000)]
upstream: disable UpdateHostkeys by default if VerifyHostKeyDNS is
enabled; suggested by Mark D. Baushke
OpenBSD-Commit-ID:
85a1b88592c81bc85df7ee7787dbbe721a0542bf
dtucker@openbsd.org [Tue, 6 Oct 2020 07:12:04 +0000 (07:12 +0000)]
upstream: Agent protocol draft is now at rev 4. ok djm@
OpenBSD-Commit-ID:
8c01ea3aae48aab45e01b7421b0fca2dad5e7837
djm@openbsd.org [Sun, 4 Oct 2020 09:45:01 +0000 (09:45 +0000)]
upstream: when ordering host key algorithms in the client, consider
the ECDSA key subtype; ok markus@
OpenBSD-Commit-ID:
3097686f853c61ff61772ea35f8b699931392ece
dtucker@openbsd.org [Sun, 4 Oct 2020 03:04:02 +0000 (03:04 +0000)]
upstream: Allow full range of UIDs and GIDs for sftp chown and
chgrp on 32bit platforms instead of being limited by LONG_MAX. bz#3206,
found by booking00 at sina.cn, ok markus@
OpenBSD-Commit-ID:
373b7bbf1f15ae482d39567ce30d18b51c9229b5
djm@openbsd.org [Sat, 3 Oct 2020 09:22:26 +0000 (09:22 +0000)]
upstream: There are lots of place where we want to redirect stdin,
stdout and/or stderr to /dev/null. Factor all these out to a single
stdfd_devnull() function that allows selection of which of these to redirect.
ok markus@
OpenBSD-Commit-ID:
3033ba5a4c47cacfd5def020d42cabc52fad3099
djm@openbsd.org [Sat, 3 Oct 2020 08:30:47 +0000 (08:30 +0000)]
upstream: enable UpdateHostkeys by default when the configuration
has not overridden UserKnownHostsFile; ok markus@ "The timing is perfect"
deraadt@
OpenBSD-Commit-ID:
62df71c9c5242da5763cb473c2a2deefbd0cef60
djm@openbsd.org [Sat, 3 Oct 2020 08:12:59 +0000 (08:12 +0000)]
upstream: disable UpdateHostkeys when a wildcard hostname pattern
is encountered or when a certificate host key is in use. feedback/ok markus@
OpenBSD-Commit-ID:
b6e5575af7e6732322be82ec299e09051a5413bd
djm@openbsd.org [Sat, 3 Oct 2020 08:11:28 +0000 (08:11 +0000)]
upstream: record when the host key checking code downgrades a
certificate host key to a plain key. This occurs when the user connects to a
host with a certificate host key but no corresponding CA key configured in
known_hosts; feedback and ok markus@
OpenBSD-Commit-ID:
2ada81853ff9ee7824c62f440bcf4ad62030c901
djm@openbsd.org [Sat, 3 Oct 2020 04:15:06 +0000 (04:15 +0000)]
upstream: prefer
ed25519 signature algorithm variants to ECDSA; ok
markus@
OpenBSD-Commit-ID:
82187926fca96d35a5b5afbc091afa84e0966e5b
djm@openbsd.org [Sat, 3 Oct 2020 03:40:38 +0000 (03:40 +0000)]
upstream: want time.h here too
OpenBSD-Commit-ID:
fafee8f1108c64ad8b282f9a1ed5ea830d8c58a7
deraadt@openbsd.org [Sat, 3 Oct 2020 02:18:33 +0000 (02:18 +0000)]
upstream: split introductory paragraph, and insert ominous words about
the glob issue, which cannot be fully fixed and really requires completely
replacing scp with a completely different subsystem. team effort to find the
right words..
OpenBSD-Commit-ID:
58e1f72d292687f63eb357183036ee242513691c
Damien Miller [Sat, 3 Oct 2020 03:38:55 +0000 (13:38 +1000)]
use relative rather than system include here
Damien Miller [Sat, 3 Oct 2020 03:38:41 +0000 (13:38 +1000)]
add some openbsd-compat licenses we missed
Philip Hands [Fri, 2 Oct 2020 22:20:07 +0000 (00:20 +0200)]
un-nest $() to make ksh cheerful
Philip Hands [Fri, 2 Oct 2020 19:30:10 +0000 (21:30 +0200)]
ksh doesn't grok 'local'
and AFAICT it's not actually doing anything useful in the code, so let's
see how things go without it.
Oleg [Thu, 1 Oct 2020 09:09:08 +0000 (12:09 +0300)]
Fix `EOF: command not found` error in ssh-copy-id
dtucker@openbsd.org [Wed, 30 Sep 2020 09:11:39 +0000 (09:11 +0000)]
upstream: Regen moduli.
OpenBSD-Commit-ID:
04967f8c43e9854ac34b917bcd6f5ac96c53a693
HARUYAMA Seigo [Sun, 27 Sep 2020 11:06:20 +0000 (20:06 +0900)]
Restore first section title of INSTALL
Damien Miller [Sun, 27 Sep 2020 07:25:01 +0000 (17:25 +1000)]
update version numbers
djm@openbsd.org [Sun, 27 Sep 2020 07:22:05 +0000 (07:22 +0000)]
upstream: openssh 8.4
OpenBSD-Commit-ID:
a29e5b372d2c00e297da8a35a3b87c9beb3b4a58
Damien Miller [Tue, 22 Sep 2020 00:07:43 +0000 (10:07 +1000)]
sync with upstream ssh-copy-id rev
f0da1a1b7
djm@openbsd.org [Mon, 21 Sep 2020 07:29:09 +0000 (07:29 +0000)]
upstream: close stdin when forking after authentication too; ok markus
OpenBSD-Commit-ID:
43db17e4abc3e6b4a7b033aa8cdab326a7cb6c24
djm@openbsd.org [Sun, 20 Sep 2020 23:31:46 +0000 (23:31 +0000)]
upstream: close stdout/stderr after "ssh -f ..." forking
bz#3137, ok markus
OpenBSD-Commit-ID:
e2d83cc4dea1665651a7aa924ad1ed6bcaaab3e2
Damien Miller [Sun, 20 Sep 2020 05:57:09 +0000 (15:57 +1000)]
.depend
djm@openbsd.org [Sun, 20 Sep 2020 05:47:25 +0000 (05:47 +0000)]
upstream: cap channel input buffer size at 16MB; avoids high memory use
when peer advertises a large window but is slow to consume the data we send
(e.g. because of a slow network)
reported by Pierre-Yves David
fix with & ok markus@
OpenBSD-Commit-ID:
1452771f5e5e768876d3bfe2544e3866d6ade216
Damien Miller [Fri, 18 Sep 2020 12:02:53 +0000 (22:02 +1000)]
libfido2 1.5.0 is recommended
djm@openbsd.org [Fri, 18 Sep 2020 08:16:38 +0000 (08:16 +0000)]
upstream: handle multiple messages in a single read()
PR#183 by Dennis Kaarsemaker; feedback and ok markus@
OpenBSD-Commit-ID:
8570bb4d02d00cf70b98590716ea6a7d1cce68d1
pedro martelletto [Fri, 18 Sep 2020 06:57:29 +0000 (08:57 +0200)]
configure.ac: add missing includes
when testing, make sure to include the relevant header files that
declare the types of the functions used by the test:
- stdio.h for printf();
- stdlib.h for exit();
- string.h for strcmp();
- unistd.h for unlink(), _exit(), fork(), getppid(), sleep().
djm@openbsd.org [Fri, 18 Sep 2020 05:23:03 +0000 (05:23 +0000)]
upstream: tweak the client hostkey preference ordering algorithm to
prefer the default ordering if the user has a key that matches the
best-preference default algorithm.
feedback and ok markus@
OpenBSD-Commit-ID:
a92dd7d7520ddd95c0a16786a7519e6d0167d35f