]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
djm@openbsd.org [Fri, 27 May 2022 05:02:46 +0000 (05:02 +0000)]
upstream: split the low-level file handling functions out from
auth2-pubkey.c
Put them in a new auth2-pubkeyfile.c to make it easier to refer to them
(e.g. in unit/fuzz tests) without having to refer to everything else
pubkey auth brings in.
ok dtucker@
OpenBSD-Commit-ID:
3fdca2c61ad97dc1b8d4a7346816f83dc4ce2217
djm@openbsd.org [Fri, 27 May 2022 05:01:25 +0000 (05:01 +0000)]
upstream: refactor authorized_keys/principals handling
remove "struct ssh *" from arguments - this was only used to pass the
remote host/address. These can be passed in instead and the resulting
code is less tightly coupled to ssh_api.[ch]
ok dtucker@
OpenBSD-Commit-ID:
9d4373d013edc4cc4b5c21a599e1837ac31dda0d
dtucker@openbsd.org [Fri, 27 May 2022 04:29:40 +0000 (04:29 +0000)]
upstream: f sshpkt functions fail, then password is not cleared
with freezero. Unconditionally call freezero to guarantee that password is
removed from RAM.
From tobias@ and c3h2_ctf via github PR#286, ok djm@
OpenBSD-Commit-ID:
6b093619c9515328e25b0f8093779c52402c89cd
dtucker@openbsd.org [Fri, 27 May 2022 04:27:49 +0000 (04:27 +0000)]
upstream: Avoid kill with -1 argument. The out_ctx label can be
reached before fork has been called. If this happens, then kill -1 would be
called, sending SIGTERM to all processes reachable by the current process.
From tobias@ and c3h2_ctf via github PR#286, ok djm@
OpenBSD-Commit-ID:
6277af1207d81202f5daffdccfeeaed4c763b1a8
dtucker@openbsd.org [Fri, 27 May 2022 04:13:24 +0000 (04:13 +0000)]
upstream: Note that ProxyJump also accepts the same tokens as
ProxyCommand. From pallxk via github PR#305.
OpenBSD-Commit-ID:
7115ac351b129205f1f1ffa6bbfd62abd76be7c5
djm@openbsd.org [Wed, 25 May 2022 06:03:44 +0000 (06:03 +0000)]
upstream: revert previous; it was broken (spotted by Theo)
OpenBSD-Commit-ID:
457c79afaca2f89ec2606405c1059b98b30d8b0d
djm@openbsd.org [Wed, 25 May 2022 00:31:13 +0000 (00:31 +0000)]
upstream: make SSHBUF_DBG/SSHBUF_TELL (off by default and only enabled
via #define) dump to stderr rather than stdout
OpenBSD-Commit-ID:
10298513ee32db8390aecb0397d782d68cb14318
Tim Rice [Tue, 24 May 2022 17:21:25 +0000 (10:21 -0700)]
configure.ac: Add missing AC_DEFINE for caph_cache_tzdata test causing
HAVE_CAPH_CACHE_TZDATA to be missing from config.h.in.
Spotted by Bryan Drewery
djm@openbsd.org [Sun, 15 May 2022 23:48:07 +0000 (23:48 +0000)]
upstream: regress test for in-place transfers and clobbering larger
files with smaller ones; would have caught last regression in scp(1)
OpenBSD-Regress-ID:
19de4e88dd3a4f7e5c1618c9be3c32415bd93bc2
anton@openbsd.org [Fri, 22 Apr 2022 05:08:43 +0000 (05:08 +0000)]
upstream: Only run agent-ptrace.sh if gdb is available as all
architectures do not ship with gdb.
OpenBSD-Regress-ID:
ec53e928803e6b87f9ac142d38888ca79a45348d
djm@openbsd.org [Sun, 15 May 2022 23:47:21 +0000 (23:47 +0000)]
upstream: fix in-place copies; r1.163 incorrectly skipped truncation in
all cases, not just at the start of a transfer. This could cause overwrites
of larger files to leave junk at the end. Spotted by tb@
OpenBSD-Commit-ID:
b189f19cd68119548c8e24e39c79f61e115bf92c
djm@openbsd.org [Fri, 13 May 2022 06:31:50 +0000 (06:31 +0000)]
upstream: arrange for scp, when in sftp mode, to not ftruncate(3) files
early
previous behavious of unconditionally truncating the destination file
would cause "scp ~/foo localhost:" and "scp localhost:foo ~/" to
delete all the contents of their destination.
spotted by solene@ sthen@, also bz3431; ok dtucker@
OpenBSD-Commit-ID:
ca39fdd39e0ec1466b9666f15cbcfddea6aaa179
dtucker@openbsd.org [Mon, 9 May 2022 08:25:27 +0000 (08:25 +0000)]
upstream: Remove errant apostrophe. From haruyama at queen-ml org.
OpenBSD-Commit-ID:
dc6b294567cb84b384ad6ced9ca469f2bbf0bd10
djm@openbsd.org [Mon, 9 May 2022 03:09:53 +0000 (03:09 +0000)]
upstream: Allow existing -U (use agent) flag to work with "-Y sign"
operations, where it will be interpreted to require that the private keys is
hosted in an agent; bz3429, suggested by Adam Szkoda; ok dtucker@
OpenBSD-Commit-ID:
a7bc69873b99c32c42c7628ed9ea91565ba08c2f
djm@openbsd.org [Sun, 8 May 2022 22:58:35 +0000 (22:58 +0000)]
upstream: improve error message when 'ssh-keygen -Y sign' is unable to
load a private key; bz3429, reported by Adam Szkoda ok dtucker@
OpenBSD-Commit-ID:
bb57b285e67bea536ef81b1055467be2fc380e74
Tobias Heider [Mon, 9 May 2022 00:00:01 +0000 (02:00 +0200)]
Remove duplicate bcrypt_pbkdf.o from Makefile
bcrypt_pbkdf.o is duplicated in the openbsd-compat Makefile's object
file list.
djm@openbsd.org [Sun, 8 May 2022 22:32:36 +0000 (22:32 +0000)]
upstream: When performing operations that glob(3) a remote path, ensure
that the implicit working directory used to construct that path escapes
glob(3) characters.
This prevents glob characters from being processed in places they
shouldn't, e.g. "cd /tmp/a*/", "get *.txt" should have the get operation
treat the path "/tmp/a*" literally and not attempt to expand it.
Reported by Lusia Kundel; ok markus@
OpenBSD-Commit-ID:
4f647f58482cbad3d58b1eab7f6a1691433deeef
Darren Tucker [Fri, 6 May 2022 04:50:18 +0000 (14:50 +1000)]
Also retest OpenBSD upstream on .yml changes.
Darren Tucker [Fri, 6 May 2022 04:46:09 +0000 (14:46 +1000)]
Note that, for now, we need variadic macros.
Darren Tucker [Fri, 6 May 2022 04:39:34 +0000 (14:39 +1000)]
Add ubsan minimal testcase on OpenBSD.
As suggested by djm@.
djm@openbsd.org [Thu, 5 May 2022 01:04:14 +0000 (01:04 +0000)]
upstream: sshkey_unshield_private() contains a exact duplicate of
the code in private2_check_padding(). Pull private2_check_padding() up so the
code can be reused. From Martin Vahlensieck, ok deraadt@
OpenBSD-Commit-ID:
876884c3f0e62e8fd8d1594bab06900f971c9c85
djm@openbsd.org [Thu, 5 May 2022 00:56:58 +0000 (00:56 +0000)]
upstream: channel_new no longer frees remote_name. So update the
comment accordingly. As remote_name is not modified, it can be const as
well. From Martin Vahlensieck
OpenBSD-Commit-ID:
e4e10dc8dc9f40c166ea5a8e991942bedc75a76a
djm@openbsd.org [Thu, 5 May 2022 00:55:11 +0000 (00:55 +0000)]
upstream: mux.c: mark argument as const; from Martin Vahlensieck
OpenBSD-Commit-ID:
69a1a93a55986c7c2ad9f733c093b46a47184341
markus@openbsd.org [Wed, 4 May 2022 07:31:22 +0000 (07:31 +0000)]
upstream: make sure stdout is non-blocking; ok djm@
OpenBSD-Commit-ID:
64940fffbd1b882eda2d7c8c7a43c79368309c0d
florian@openbsd.org [Tue, 3 May 2022 07:42:27 +0000 (07:42 +0000)]
upstream: Add FIDO AUTHENTICATOR section and explain a bit how FIDO
works. The wording came mostly from the 8.2 OpenSSH release notes, addapted
to fit the man page. Then move the -O bits into the new section as is already
done for CERTIFICATES and MODULI GENERATION. Finally we can explain the
trade-offs of resident keys. While here, consistently refer to the FIDO
thingies as "FIDO authenticators", not "FIDO tokens".
input & OK jmc, naddy
OpenBSD-Commit-ID:
dd98748d7644df048f78dcf793b3b63db9ab1d25
jmc@openbsd.org [Mon, 2 May 2022 05:40:37 +0000 (05:40 +0000)]
upstream: remove an obsolete rsa1 format example from an example;
from megan batty
ok djm
OpenBSD-Commit-ID:
db2c89879c29bf083df996bd830abfb1e70d62bf
djm@openbsd.org [Sun, 1 May 2022 23:20:30 +0000 (23:20 +0000)]
upstream: fix some integer overflows in sieve_large() that show up when
trying to generate modp groups > 16k bits. Reported via GHPR#306 by Bertram
Felgenhauer, but fixed in a different way. feedback/ok tb@
OpenBSD-Commit-ID:
81cbc6dd3a21c57bd6fadea10e44afe37bca558e
djm@openbsd.org [Fri, 29 Apr 2022 04:55:07 +0000 (04:55 +0000)]
upstream: be stricter in which characters will be accepted in
specifying a mask length; allow only 0-9. From khaleesicodes via GHPR#278; ok
dtucker@
OpenBSD-Commit-ID:
e267746c047ea86665cdeccef795a8a56082eeb2
Darren Tucker [Sat, 30 Apr 2022 00:56:41 +0000 (10:56 +1000)]
Add Mac OS X 12 test target.
Darren Tucker [Fri, 29 Apr 2022 08:27:34 +0000 (18:27 +1000)]
Only run tests when source files change.
Also run tests on changes to V_9_0 branch.
Darren Tucker [Fri, 29 Apr 2022 08:22:34 +0000 (18:22 +1000)]
Remove now-empty int32_minmax.inc.
djm@openbsd.org [Fri, 29 Apr 2022 03:24:30 +0000 (03:24 +0000)]
upstream: mention that the helpers are used by ssh(1), ssh-agent(1)
and ssh-keygen(1). Previously only ssh(1) was mentioned. From Pedro
Martelletto
OpenBSD-Commit-ID:
30f880f989d4b329589c1c404315685960a5f153
dtucker@openbsd.org [Fri, 29 Apr 2022 03:16:48 +0000 (03:16 +0000)]
upstream: Don't leak SK device. Patch from Pedro Martelletto via
github PR#316. ok djm@
OpenBSD-Commit-ID:
17d11327545022e727d95fd08b213171c5a4585d
djm@openbsd.org [Fri, 29 Apr 2022 03:13:32 +0000 (03:13 +0000)]
upstream: fix memleak on session-bind path; from Pedro Martelletto, ok
dtucker@
OpenBSD-Commit-ID:
e85899a26ba402b4c0717b531317e8fc258f0a7e
djm@openbsd.org [Thu, 28 Apr 2022 02:53:31 +0000 (02:53 +0000)]
upstream: avoid printing hash algorithm twice; from lucas AT sexy.is
OpenBSD-Commit-ID:
9d24671e10a84141b7c504396cabad600e47a941
dtucker@openbsd.org [Wed, 27 Apr 2022 11:08:55 +0000 (11:08 +0000)]
upstream: Add authfd path to debug output. ok markus@
OpenBSD-Commit-ID:
f735a17d1a6f2bee63bfc609d76ef8db8c090890
dtucker@openbsd.org [Tue, 26 Apr 2022 07:41:44 +0000 (07:41 +0000)]
upstream: Check sshauthopt_new() for NULL. bz#3425, from
tessgauthier at microsoft.com. ok djm@
OpenBSD-Commit-ID:
af0315bc3e44aa406daa7e0ae7c2d719a974483f
millert@openbsd.org [Wed, 20 Apr 2022 16:00:25 +0000 (16:00 +0000)]
upstream: Remove unnecessary includes: openssl/hmac.h and
openssl/evp.h. From Martin Vahlensieck.
OpenBSD-Commit-ID:
a6debb5fb0c8a44e43e8d5ca7cc70ad2f3ea31c3
millert@openbsd.org [Wed, 20 Apr 2022 15:59:18 +0000 (15:59 +0000)]
upstream: Add missing includes of stdlib.h and stdint.h. We need
stdlib.h for malloc(3) and stdint.h for SIZE_MAX. Unlike the other xmss
files, ssh-xmss.c does not include xmss_commons.h so ssh-xmss.c must include
those headers itself. From Martin Vahlensieck
OpenBSD-Commit-ID:
70e28a9818cee3da1be2ef6503d4b396dd421e6b
millert@openbsd.org [Wed, 20 Apr 2022 15:56:49 +0000 (15:56 +0000)]
upstream: Avoid an unnecessary xstrdup in rm_env() when matching
patterns. Since match_pattern() doesn't modify its arguments (they are
const), there is no need to make an extra copy of the strings in
options->send_env. From Martin Vahlensieck
OpenBSD-Commit-ID:
2c9db31e3f4d3403b49642c64ee048b2a0a39351
Darren Tucker [Tue, 26 Apr 2022 13:30:59 +0000 (23:30 +1000)]
Add debian-riscv64 test target.
Darren Tucker [Mon, 25 Apr 2022 07:20:06 +0000 (17:20 +1000)]
Update OpenSSL and LibreSSL versions in tests.
Darren Tucker [Sat, 23 Apr 2022 10:40:28 +0000 (20:40 +1000)]
Include stdlib.h for free() prototype.
... which is used inside the CUSTOM_SYS_AUTH_GET_LASTLOGIN_MSG block.
Darren Tucker [Sat, 23 Apr 2022 10:17:26 +0000 (20:17 +1000)]
Cache timezone data in capsicum sandbox.
From emaste at freebsd.org, originally part of FreeBSD commit r339216
/
fc3c19a9 with autoconf bits added by me.
dtucker@openbsd.org [Thu, 21 Apr 2022 01:36:46 +0000 (01:36 +0000)]
upstream: It looks like we can't completely avoid
waiting for processes to exit so retrieve the pid via controlmaster and
use that.
OpenBSD-Regress-ID:
8246f00f22b14e49d2ff1744c94897ead33d457b
dtucker@openbsd.org [Wed, 20 Apr 2022 13:25:55 +0000 (13:25 +0000)]
upstream: Use ssh -f and ControlPersist ..
to start up test forwards and ssh -O stop to shut them down intead of
sleep loops. This speeds up the test by an order of magnitude.
OpenBSD-Regress-ID:
eb3db5f805100919b092a3b2579c611fba3e83e7
dtucker@openbsd.org [Wed, 20 Apr 2022 05:24:13 +0000 (05:24 +0000)]
upstream: Simplify forward-control test.
Since we no longer need to support SSH1 we don't need to run shell
commands on the other end of the connection and can use ssh -N instead.
This also makes the test less racy.
OpenBSD-Regress-ID:
32e94ce272820cc398f30b848b2b0f080d10302c
djm@openbsd.org [Thu, 31 Mar 2022 03:07:33 +0000 (03:07 +0000)]
upstream: regression test for sftp cp command
OpenBSD-Regress-ID:
c96bea9edde3a384b254785e7f9b2b24a81cdf82
dtucker@openbsd.org [Wed, 20 Apr 2022 01:13:47 +0000 (01:13 +0000)]
upstream: Import regenerated moduli
OpenBSD-Commit-ID:
f9a0726d957cf10692a231996a1f34e7f9cdfeb0
djm@openbsd.org [Wed, 20 Apr 2022 04:19:11 +0000 (04:19 +0000)]
upstream: Try to continue running local I/O for channels in state
OPEN during SSH transport rekeying. The most visible benefit is that it
should make ~-escapes work in the client (e.g. to exit) if the connection
happened to have stalled during a rekey event. Based work by and ok dtucker@
OpenBSD-Commit-ID:
a66e8f254e92edd4ce09c9f750883ec8f1ea5f45
dtucker@openbsd.org [Wed, 20 Apr 2022 01:13:47 +0000 (01:13 +0000)]
upstream: Import regenerated moduli
OpenBSD-Commit-ID:
f9a0726d957cf10692a231996a1f34e7f9cdfeb0
tj@openbsd.org [Sat, 16 Apr 2022 00:22:31 +0000 (00:22 +0000)]
upstream: list the correct version number
for when usage of the sftp protocol became default and fix a typo
from ed maste
OpenBSD-Commit-ID:
24e1795ed2283fdeacf16413c2f07503bcdebb31
dtucker@openbsd.org [Tue, 12 Apr 2022 05:09:49 +0000 (05:09 +0000)]
upstream: Correct path for system known hosts file in description
of IgnoreUserKnownHosts. Patch from Martin Vahlensieck via tech@
OpenBSD-Commit-ID:
9b7784f054fa5aa4d63cb36bd563889477127215
Darren Tucker [Sat, 16 Apr 2022 04:33:20 +0000 (14:33 +1000)]
Resync moduli.5 with upstream.
1.18: remove duplicate publication year; carsten dot kunze at arcor dot de
1.19: ssh-keygen's -G/-T have been replaced with -M generate/screen.
Darren Tucker [Sat, 16 Apr 2022 04:31:13 +0000 (14:31 +1000)]
Retire fbsd6 test VM.
It's long since out of support, relatively slow (it's i686) and the
compiler has trouble with PIE.
djm@openbsd.org [Mon, 11 Apr 2022 22:52:08 +0000 (22:52 +0000)]
upstream: clear io_want/io_ready flags at start of poll() cycle;
avoids plausible spin during rekeying if channel io_want flags are reused
across cycles. ok markus@ deraadt@
OpenBSD-Commit-ID:
91034f855b7c73cd2591657c49ac30f10322b967
dtucker@openbsd.org [Fri, 8 Apr 2022 05:43:39 +0000 (05:43 +0000)]
upstream: Note that curve25519-sha256 was later published in
RFC8731. ok djm@
OpenBSD-Commit-ID:
2ac2b5d642d4cf5918eaec8653cad9a4460b2743
djm@openbsd.org [Fri, 8 Apr 2022 04:40:40 +0000 (04:40 +0000)]
upstream: two defensive changes from Tobias Stoeckmann via GHPR287
enforce stricter invarient for sshbuf_set_parent() - never allow
a buffer to have a previously-set parent changed.
In sshbuf_reset(), if the reallocation fails, then zero the entire
buffer and not the (potentially smaller) default initial alloc size.
OpenBSD-Commit-ID:
14583203aa5d50ad38d2e209ae10abaf8955e6a9
Damien Miller [Mon, 11 Apr 2022 06:07:09 +0000 (16:07 +1000)]
Revert "update build-aux files to match autoconf-2.71"
This reverts commit
0a8ca39fac6ad19096b6c263436f8b2dd51606f2 .
It turns out that the checked-in copies of these files are actually newer
than autoconf-2.71's copies, so this was effectively a downgrade.
Spotted by Bo Anderson via github
Damien Miller [Fri, 8 Apr 2022 04:48:58 +0000 (14:48 +1000)]
update build-aux files to match autoconf-2.71
i.e. config.guess, config.sub and install-sh
Damien Miller [Wed, 6 Apr 2022 00:47:48 +0000 (10:47 +1000)]
update version numbers for release
djm@openbsd.org [Mon, 4 Apr 2022 22:45:25 +0000 (22:45 +0000)]
upstream: openssh-9.0
OpenBSD-Commit-ID:
0dfb461188f4513ec024c1534da8c1ce14c20b64
naddy@openbsd.org [Thu, 31 Mar 2022 17:58:44 +0000 (17:58 +0000)]
upstream: ssh: document sntrup761x25519-sha512@openssh.com as
default KEX
OpenBSD-Commit-ID:
12545bfa10bcbf552d04d9d9520d0f4e98b0e171
naddy@openbsd.org [Thu, 31 Mar 2022 17:27:27 +0000 (17:27 +0000)]
upstream: man pages: add missing commas between subordinate and
main clauses
jmc@ dislikes a comma before "then" in a conditional, so leave those
untouched.
ok jmc@
OpenBSD-Commit-ID:
9520801729bebcb3c9fe43ad7f9776ab4dd05ea3
Darren Tucker [Mon, 4 Apr 2022 13:52:11 +0000 (23:52 +1000)]
Disable security key on fbsd6 test host.
Darren Tucker [Mon, 4 Apr 2022 05:16:51 +0000 (15:16 +1000)]
Specify TEST_SHELL=bash on AIX.
The system shells cause the agent-restrict test to fail due to some
quoting so explicitly specify bash until we can get configure to
autmatically work around that.
Darren Tucker [Fri, 1 Apr 2022 12:38:44 +0000 (23:38 +1100)]
Only return events from ppoll that were requested.
If the underlying system's select() returns bits that were not in the
request set, our ppoll() implementation can return revents for events
not requested, which can apparently cause a hang. Only return revents
for activity in the requested event set. bz#3416, analysis and fix by
yaroslav.kuzmin at vmssoftware com, ok djm@
Darren Tucker [Fri, 1 Apr 2022 12:21:40 +0000 (23:21 +1100)]
Only run regression tests on slow VMs.
Darren Tucker [Fri, 1 Apr 2022 12:21:06 +0000 (23:21 +1100)]
Increase test timeout to allow slow VMs to finish
Darren Tucker [Fri, 1 Apr 2022 05:27:38 +0000 (16:27 +1100)]
Use bash or ksh if available for SH in Makefile.
Darren Tucker [Fri, 1 Apr 2022 03:56:54 +0000 (14:56 +1100)]
Set Makefile SHELL as determined by configure.
This should improve compatibility for users with non-POSIX shells. If
using Makefile.in directly (eg make -f Makefile.in distprep) then SHELL
will need to be specified on the command line (along with MANFMT in that
particular case). ok djm@
Darren Tucker [Fri, 1 Apr 2022 02:16:47 +0000 (13:16 +1100)]
Skip slow tests on (very) slow test targets.
Damien Miller [Thu, 31 Mar 2022 03:11:36 +0000 (14:11 +1100)]
depend
djm@openbsd.org [Thu, 31 Mar 2022 03:07:03 +0000 (03:07 +0000)]
upstream: add a sftp client "cp" command that supports server-side
copying of files. Useful for this task and for testing the copy-data
extension. Patch from Mike Frysinger; ok dtucker@
OpenBSD-Commit-ID:
1bb1b950af0d49f0d5425b1f267e197aa1b57444
djm@openbsd.org [Thu, 31 Mar 2022 03:05:49 +0000 (03:05 +0000)]
upstream: add support for the "corp-data" protocol extension to
allow server-side copies to be performed without having to go via the client.
Patch by Mike Frysinger, ok dtucker@
OpenBSD-Commit-ID:
00aa510940fedd66dab1843b58682de4eb7156d5
djm@openbsd.org [Wed, 30 Mar 2022 21:13:23 +0000 (21:13 +0000)]
upstream: select post-quantum KEX
sntrup761x25519-sha512@openssh.com as the default; ok markus@
OpenBSD-Commit-ID:
f02d99cbfce22dffec2e2ab1b60905fbddf48fb9
djm@openbsd.org [Wed, 30 Mar 2022 21:10:25 +0000 (21:10 +0000)]
upstream: fix poll() spin when a channel's output fd closes without
data in the channel buffer. Introduce more exact packing of channel fds into
the pollfd array. fixes bz3405 and bz3411; ok deraadt@ markus@
OpenBSD-Commit-ID:
06740737849c9047785622ad5d472cb6a3907d10
djm@openbsd.org [Wed, 30 Mar 2022 04:33:09 +0000 (04:33 +0000)]
upstream: ssh is almost out of getopt() characters; note the
remaining remaining available ones in a comment
OpenBSD-Commit-ID:
48d38cef59d6bc8e84c6c066f6d601875d3253fd
djm@openbsd.org [Wed, 30 Mar 2022 04:27:51 +0000 (04:27 +0000)]
upstream: avoid NULL deref via ssh-keygen -Y find-principals.
bz3409, reported by Mateusz Adamowski
OpenBSD-Commit-ID:
a3b2c02438052ee858e0ee18e5a288586b5df2c5
Darren Tucker [Mon, 28 Mar 2022 06:51:03 +0000 (17:51 +1100)]
Add AIX 5.1 test target.
Darren Tucker [Sat, 26 Mar 2022 11:01:31 +0000 (22:01 +1100)]
Drop leading "v" from release version identifier.
It's present in the git tags but not in the release tarball names.
Also drop extra "/" from URL path.
Darren Tucker [Sat, 26 Mar 2022 05:28:04 +0000 (16:28 +1100)]
Use tarballs when testing LibreSSL releases.
This means they'll still work when the combination of -portable and
openbsd github repos no longer match.
Darren Tucker [Sat, 26 Mar 2022 04:02:45 +0000 (15:02 +1100)]
Remove now-unused passwd variable.
Darren Tucker [Sat, 26 Mar 2022 02:15:44 +0000 (13:15 +1100)]
Missing semicolon.
Darren Tucker [Sat, 26 Mar 2022 01:49:50 +0000 (12:49 +1100)]
Factor out platform-specific locked account check.
Also fixes an incorrect free on platforms with both libiaf and shadow
passwords (probably only Unixware). Prompted by github PR#284,
originally from @c3h2_ctf and stoeckmann@.
Darren Tucker [Fri, 25 Mar 2022 21:13:46 +0000 (08:13 +1100)]
Add OpenWRT mips and mipsel test targets.
djm@openbsd.org [Sun, 20 Mar 2022 08:52:17 +0000 (08:52 +0000)]
upstream: don't leak argument list; bz3404, reported by Balu
Gajjala ok dtucker@
OpenBSD-Commit-ID:
fddc32d74e5dd5cff1a49ddd6297b0867eae56a6
djm@openbsd.org [Sun, 20 Mar 2022 08:51:21 +0000 (08:51 +0000)]
upstream: make addargs() and replacearg() a little more robust and
improve error reporting
make freeargs(NULL) a noop like the other free functions
ok dtucker as part of bz3403
OpenBSD-Commit-ID:
15f86da83176978b4d1d288caa24c766dfa2983d
djm@openbsd.org [Fri, 18 Mar 2022 04:04:11 +0000 (04:04 +0000)]
upstream: don't try to resolve ListenAddress directives in the sshd
re-exec path - we're never going to use the result and if the operation fails
then it can prevent connections from being accepted. Reported by Aaron
Poffenberger; with / ok dtucker@
OpenBSD-Commit-ID:
44c53a43909a328e2f5ab26070fdef3594eded60
djm@openbsd.org [Fri, 18 Mar 2022 02:50:21 +0000 (02:50 +0000)]
upstream: remove blank line
OpenBSD-Commit-ID:
d5e0182965b2fbfb03ad5f256d1a1ce5706bcddf
djm@openbsd.org [Fri, 18 Mar 2022 02:32:22 +0000 (02:32 +0000)]
upstream: helpful comment
OpenBSD-Commit-ID:
e3315a45cb04e7feeb614d76ec80a9fe4ca0e8c7
djm@openbsd.org [Fri, 18 Mar 2022 02:31:25 +0000 (02:31 +0000)]
upstream: ssh-keygen -Y check-novalidate requires namespace or SEGV
will ensue. Patch from Mateusz Adamowski via GHPR#307
OpenBSD-Commit-ID:
99e8ec38f9feb38bce6de240335be34aedeba5fd
djm@openbsd.org [Tue, 15 Mar 2022 05:27:37 +0000 (05:27 +0000)]
upstream: improve DEBUG_CHANNEL_POLL debugging message
OpenBSD-Commit-ID:
2275eb7bc4707d019b1a0194b9c92c0b78da848f
cheloha@openbsd.org [Sun, 13 Mar 2022 23:27:54 +0000 (23:27 +0000)]
upstream: ssh: xstrdup(): use memcpy(3)
Copying the given string into the buffer with strlcpy(3) confers no
benefit in this context because we have already determined the
string's length with strlen(3) in order to allocate that buffer.
Thread: https://marc.info/?l=openbsd-tech&m=
164687525802691 &w=2
ok dtucker@ millert@
OpenBSD-Commit-ID:
f8bfc082e36e2d2dc4e1feece02fe274155ca11a
Darren Tucker [Fri, 11 Mar 2022 07:43:58 +0000 (18:43 +1100)]
Resync fmt_scaled. with OpenBSD.
Fixes underflow reported in bz#3401.
Darren Tucker [Tue, 8 Mar 2022 22:41:56 +0000 (09:41 +1100)]
Provide killpg implementation.
Based on github PR#301 for Tandem NonStop.
Darren Tucker [Tue, 8 Mar 2022 22:29:30 +0000 (09:29 +1100)]
Check for missing ftruncate prototype.
From github PR#301 in conjunction with rsbeckerca.
Darren Tucker [Tue, 8 Mar 2022 09:04:06 +0000 (20:04 +1100)]
Default to not using sandbox when cross compiling.
On most systems poll(2) does not work when the number of FDs is reduced
with setrlimit, so assume it doesn't when cross compiling and we can't
run the test. bz#3398.
djm@openbsd.org [Tue, 1 Mar 2022 01:59:19 +0000 (01:59 +0000)]
upstream: pack pollfd array before server_accept_loop() ppoll()
call, and terminate sshd if ppoll() returns errno==EINVAL
avoids spin in ppoll when MaxStartups > RLIMIT_NOFILE, reported by
Daniel Micay
feedback/ok deraadt
OpenBSD-Commit-ID:
dbab1c24993ac977ec24d83283b8b7528f7c2c15
naddy@openbsd.org [Sun, 27 Feb 2022 01:33:59 +0000 (01:33 +0000)]
upstream: include rejected signature algorithm in error message and
not the (useless) key type; ok djm@
OpenBSD-Commit-ID:
d0c0f552a4d9161203e07e95d58a76eb602a76ff