]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
3 years agoupstream: split the low-level file handling functions out from
djm@openbsd.org [Fri, 27 May 2022 05:02:46 +0000 (05:02 +0000)] 
upstream: split the low-level file handling functions out from

auth2-pubkey.c

Put them in a new auth2-pubkeyfile.c to make it easier to refer to them
(e.g. in unit/fuzz tests) without having to refer to everything else
pubkey auth brings in.

ok dtucker@

OpenBSD-Commit-ID: 3fdca2c61ad97dc1b8d4a7346816f83dc4ce2217

3 years agoupstream: refactor authorized_keys/principals handling
djm@openbsd.org [Fri, 27 May 2022 05:01:25 +0000 (05:01 +0000)] 
upstream: refactor authorized_keys/principals handling

remove "struct ssh *" from arguments - this was only used to pass the
remote host/address. These can be passed in instead and the resulting
code is less tightly coupled to ssh_api.[ch]

ok dtucker@

OpenBSD-Commit-ID: 9d4373d013edc4cc4b5c21a599e1837ac31dda0d

3 years agoupstream: f sshpkt functions fail, then password is not cleared
dtucker@openbsd.org [Fri, 27 May 2022 04:29:40 +0000 (04:29 +0000)] 
upstream: f sshpkt functions fail, then password is not cleared

with freezero. Unconditionally call freezero to guarantee that password is
removed from RAM.

From tobias@ and c3h2_ctf via github PR#286, ok djm@

OpenBSD-Commit-ID: 6b093619c9515328e25b0f8093779c52402c89cd

3 years agoupstream: Avoid kill with -1 argument. The out_ctx label can be
dtucker@openbsd.org [Fri, 27 May 2022 04:27:49 +0000 (04:27 +0000)] 
upstream: Avoid kill with -1 argument. The out_ctx label can be

reached before fork has been called. If this happens, then kill -1 would be
called, sending SIGTERM to all processes reachable by the current process.

From tobias@ and c3h2_ctf via github PR#286, ok djm@

OpenBSD-Commit-ID: 6277af1207d81202f5daffdccfeeaed4c763b1a8

3 years agoupstream: Note that ProxyJump also accepts the same tokens as
dtucker@openbsd.org [Fri, 27 May 2022 04:13:24 +0000 (04:13 +0000)] 
upstream: Note that ProxyJump also accepts the same tokens as

ProxyCommand. From pallxk via github PR#305.

OpenBSD-Commit-ID: 7115ac351b129205f1f1ffa6bbfd62abd76be7c5

3 years agoupstream: revert previous; it was broken (spotted by Theo)
djm@openbsd.org [Wed, 25 May 2022 06:03:44 +0000 (06:03 +0000)] 
upstream: revert previous; it was broken (spotted by Theo)

OpenBSD-Commit-ID: 457c79afaca2f89ec2606405c1059b98b30d8b0d

3 years agoupstream: make SSHBUF_DBG/SSHBUF_TELL (off by default and only enabled
djm@openbsd.org [Wed, 25 May 2022 00:31:13 +0000 (00:31 +0000)] 
upstream: make SSHBUF_DBG/SSHBUF_TELL (off by default and only enabled

via #define) dump to stderr rather than stdout

OpenBSD-Commit-ID: 10298513ee32db8390aecb0397d782d68cb14318

3 years agoconfigure.ac: Add missing AC_DEFINE for caph_cache_tzdata test causing
Tim Rice [Tue, 24 May 2022 17:21:25 +0000 (10:21 -0700)] 
configure.ac: Add missing AC_DEFINE for caph_cache_tzdata test causing
HAVE_CAPH_CACHE_TZDATA to be missing from config.h.in.
Spotted by Bryan Drewery

3 years agoupstream: regress test for in-place transfers and clobbering larger
djm@openbsd.org [Sun, 15 May 2022 23:48:07 +0000 (23:48 +0000)] 
upstream: regress test for in-place transfers and clobbering larger

files with smaller ones; would have caught last regression in scp(1)

OpenBSD-Regress-ID: 19de4e88dd3a4f7e5c1618c9be3c32415bd93bc2

3 years agoupstream: Only run agent-ptrace.sh if gdb is available as all
anton@openbsd.org [Fri, 22 Apr 2022 05:08:43 +0000 (05:08 +0000)] 
upstream: Only run agent-ptrace.sh if gdb is available as all

architectures do not ship with gdb.

OpenBSD-Regress-ID: ec53e928803e6b87f9ac142d38888ca79a45348d

3 years agoupstream: fix in-place copies; r1.163 incorrectly skipped truncation in
djm@openbsd.org [Sun, 15 May 2022 23:47:21 +0000 (23:47 +0000)] 
upstream: fix in-place copies; r1.163 incorrectly skipped truncation in

all cases, not just at the start of a transfer. This could cause overwrites
of larger files to leave junk at the end. Spotted by tb@

OpenBSD-Commit-ID: b189f19cd68119548c8e24e39c79f61e115bf92c

3 years agoupstream: arrange for scp, when in sftp mode, to not ftruncate(3) files
djm@openbsd.org [Fri, 13 May 2022 06:31:50 +0000 (06:31 +0000)] 
upstream: arrange for scp, when in sftp mode, to not ftruncate(3) files

early

previous behavious of unconditionally truncating the destination file
would cause "scp ~/foo localhost:" and "scp localhost:foo ~/" to
delete all the contents of their destination.

spotted by solene@ sthen@, also bz3431; ok dtucker@

OpenBSD-Commit-ID: ca39fdd39e0ec1466b9666f15cbcfddea6aaa179

3 years agoupstream: Remove errant apostrophe. From haruyama at queen-ml org.
dtucker@openbsd.org [Mon, 9 May 2022 08:25:27 +0000 (08:25 +0000)] 
upstream: Remove errant apostrophe. From haruyama at queen-ml org.

OpenBSD-Commit-ID: dc6b294567cb84b384ad6ced9ca469f2bbf0bd10

3 years agoupstream: Allow existing -U (use agent) flag to work with "-Y sign"
djm@openbsd.org [Mon, 9 May 2022 03:09:53 +0000 (03:09 +0000)] 
upstream: Allow existing -U (use agent) flag to work with "-Y sign"

operations, where it will be interpreted to require that the private keys is
hosted in an agent; bz3429, suggested by Adam Szkoda; ok dtucker@

OpenBSD-Commit-ID: a7bc69873b99c32c42c7628ed9ea91565ba08c2f

3 years agoupstream: improve error message when 'ssh-keygen -Y sign' is unable to
djm@openbsd.org [Sun, 8 May 2022 22:58:35 +0000 (22:58 +0000)] 
upstream: improve error message when 'ssh-keygen -Y sign' is unable to

load a private key; bz3429, reported by Adam Szkoda ok dtucker@

OpenBSD-Commit-ID: bb57b285e67bea536ef81b1055467be2fc380e74

3 years agoRemove duplicate bcrypt_pbkdf.o from Makefile
Tobias Heider [Mon, 9 May 2022 00:00:01 +0000 (02:00 +0200)] 
Remove duplicate bcrypt_pbkdf.o from Makefile

bcrypt_pbkdf.o is duplicated in the openbsd-compat Makefile's object
file list.

3 years agoupstream: When performing operations that glob(3) a remote path, ensure
djm@openbsd.org [Sun, 8 May 2022 22:32:36 +0000 (22:32 +0000)] 
upstream: When performing operations that glob(3) a remote path, ensure

that the implicit working directory used to construct that path escapes
glob(3) characters.

This prevents glob characters from being processed in places they
shouldn't, e.g. "cd /tmp/a*/", "get *.txt" should have the get operation
treat the path "/tmp/a*" literally and not attempt to expand it.

Reported by Lusia Kundel; ok markus@

OpenBSD-Commit-ID: 4f647f58482cbad3d58b1eab7f6a1691433deeef

3 years agoAlso retest OpenBSD upstream on .yml changes.
Darren Tucker [Fri, 6 May 2022 04:50:18 +0000 (14:50 +1000)] 
Also retest OpenBSD upstream on .yml changes.

3 years agoNote that, for now, we need variadic macros.
Darren Tucker [Fri, 6 May 2022 04:46:09 +0000 (14:46 +1000)] 
Note that, for now, we need variadic macros.

3 years agoAdd ubsan minimal testcase on OpenBSD.
Darren Tucker [Fri, 6 May 2022 04:39:34 +0000 (14:39 +1000)] 
Add ubsan minimal testcase on OpenBSD.

As suggested by djm@.

3 years agoupstream: sshkey_unshield_private() contains a exact duplicate of
djm@openbsd.org [Thu, 5 May 2022 01:04:14 +0000 (01:04 +0000)] 
upstream: sshkey_unshield_private() contains a exact duplicate of

the code in private2_check_padding(). Pull private2_check_padding() up so the
code can be reused. From Martin Vahlensieck, ok deraadt@

OpenBSD-Commit-ID: 876884c3f0e62e8fd8d1594bab06900f971c9c85

3 years agoupstream: channel_new no longer frees remote_name. So update the
djm@openbsd.org [Thu, 5 May 2022 00:56:58 +0000 (00:56 +0000)] 
upstream: channel_new no longer frees remote_name. So update the

comment accordingly.  As remote_name is not modified, it can be const as
well. From Martin Vahlensieck

OpenBSD-Commit-ID: e4e10dc8dc9f40c166ea5a8e991942bedc75a76a

3 years agoupstream: mux.c: mark argument as const; from Martin Vahlensieck
djm@openbsd.org [Thu, 5 May 2022 00:55:11 +0000 (00:55 +0000)] 
upstream: mux.c: mark argument as const; from Martin Vahlensieck

OpenBSD-Commit-ID: 69a1a93a55986c7c2ad9f733c093b46a47184341

3 years agoupstream: make sure stdout is non-blocking; ok djm@
markus@openbsd.org [Wed, 4 May 2022 07:31:22 +0000 (07:31 +0000)] 
upstream: make sure stdout is non-blocking; ok djm@

OpenBSD-Commit-ID: 64940fffbd1b882eda2d7c8c7a43c79368309c0d

3 years agoupstream: Add FIDO AUTHENTICATOR section and explain a bit how FIDO
florian@openbsd.org [Tue, 3 May 2022 07:42:27 +0000 (07:42 +0000)] 
upstream: Add FIDO AUTHENTICATOR section and explain a bit how FIDO

works. The wording came mostly from the 8.2 OpenSSH release notes, addapted
to fit the man page. Then move the -O bits into the new section as is already
done for CERTIFICATES and MODULI GENERATION. Finally we can explain the
trade-offs of resident keys. While here, consistently refer to the FIDO
thingies as "FIDO authenticators", not "FIDO tokens".

input & OK jmc, naddy

OpenBSD-Commit-ID: dd98748d7644df048f78dcf793b3b63db9ab1d25

3 years agoupstream: remove an obsolete rsa1 format example from an example;
jmc@openbsd.org [Mon, 2 May 2022 05:40:37 +0000 (05:40 +0000)] 
upstream: remove an obsolete rsa1 format example from an example;

from megan batty
ok djm

OpenBSD-Commit-ID: db2c89879c29bf083df996bd830abfb1e70d62bf

3 years agoupstream: fix some integer overflows in sieve_large() that show up when
djm@openbsd.org [Sun, 1 May 2022 23:20:30 +0000 (23:20 +0000)] 
upstream: fix some integer overflows in sieve_large() that show up when

trying to generate modp groups > 16k bits. Reported via GHPR#306 by Bertram
Felgenhauer, but fixed in a different way. feedback/ok tb@

OpenBSD-Commit-ID: 81cbc6dd3a21c57bd6fadea10e44afe37bca558e

3 years agoupstream: be stricter in which characters will be accepted in
djm@openbsd.org [Fri, 29 Apr 2022 04:55:07 +0000 (04:55 +0000)] 
upstream: be stricter in which characters will be accepted in

specifying a mask length; allow only 0-9. From khaleesicodes via GHPR#278; ok
dtucker@

OpenBSD-Commit-ID: e267746c047ea86665cdeccef795a8a56082eeb2

3 years agoAdd Mac OS X 12 test target.
Darren Tucker [Sat, 30 Apr 2022 00:56:41 +0000 (10:56 +1000)] 
Add Mac OS X 12 test target.

3 years agoOnly run tests when source files change.
Darren Tucker [Fri, 29 Apr 2022 08:27:34 +0000 (18:27 +1000)] 
Only run tests when source files change.

Also run tests on changes to V_9_0 branch.

3 years agoRemove now-empty int32_minmax.inc.
Darren Tucker [Fri, 29 Apr 2022 08:22:34 +0000 (18:22 +1000)] 
Remove now-empty int32_minmax.inc.

3 years agoupstream: mention that the helpers are used by ssh(1), ssh-agent(1)
djm@openbsd.org [Fri, 29 Apr 2022 03:24:30 +0000 (03:24 +0000)] 
upstream: mention that the helpers are used by ssh(1), ssh-agent(1)

and ssh-keygen(1). Previously only ssh(1) was mentioned. From Pedro
Martelletto

OpenBSD-Commit-ID: 30f880f989d4b329589c1c404315685960a5f153

3 years agoupstream: Don't leak SK device. Patch from Pedro Martelletto via
dtucker@openbsd.org [Fri, 29 Apr 2022 03:16:48 +0000 (03:16 +0000)] 
upstream: Don't leak SK device. Patch from Pedro Martelletto via

github PR#316. ok djm@

OpenBSD-Commit-ID: 17d11327545022e727d95fd08b213171c5a4585d

3 years agoupstream: fix memleak on session-bind path; from Pedro Martelletto, ok
djm@openbsd.org [Fri, 29 Apr 2022 03:13:32 +0000 (03:13 +0000)] 
upstream: fix memleak on session-bind path; from Pedro Martelletto, ok

dtucker@

OpenBSD-Commit-ID: e85899a26ba402b4c0717b531317e8fc258f0a7e

3 years agoupstream: avoid printing hash algorithm twice; from lucas AT sexy.is
djm@openbsd.org [Thu, 28 Apr 2022 02:53:31 +0000 (02:53 +0000)] 
upstream: avoid printing hash algorithm twice; from lucas AT sexy.is

OpenBSD-Commit-ID: 9d24671e10a84141b7c504396cabad600e47a941

3 years agoupstream: Add authfd path to debug output. ok markus@
dtucker@openbsd.org [Wed, 27 Apr 2022 11:08:55 +0000 (11:08 +0000)] 
upstream: Add authfd path to debug output. ok markus@

OpenBSD-Commit-ID: f735a17d1a6f2bee63bfc609d76ef8db8c090890

3 years agoupstream: Check sshauthopt_new() for NULL. bz#3425, from
dtucker@openbsd.org [Tue, 26 Apr 2022 07:41:44 +0000 (07:41 +0000)] 
upstream: Check sshauthopt_new() for NULL. bz#3425, from

tessgauthier at microsoft.com.  ok djm@

OpenBSD-Commit-ID: af0315bc3e44aa406daa7e0ae7c2d719a974483f

3 years agoupstream: Remove unnecessary includes: openssl/hmac.h and
millert@openbsd.org [Wed, 20 Apr 2022 16:00:25 +0000 (16:00 +0000)] 
upstream: Remove unnecessary includes: openssl/hmac.h and

openssl/evp.h. From Martin Vahlensieck.

OpenBSD-Commit-ID: a6debb5fb0c8a44e43e8d5ca7cc70ad2f3ea31c3

3 years agoupstream: Add missing includes of stdlib.h and stdint.h. We need
millert@openbsd.org [Wed, 20 Apr 2022 15:59:18 +0000 (15:59 +0000)] 
upstream: Add missing includes of stdlib.h and stdint.h. We need

stdlib.h for malloc(3) and stdint.h for SIZE_MAX. Unlike the other xmss
files, ssh-xmss.c does not include xmss_commons.h so ssh-xmss.c must include
those headers itself. From Martin Vahlensieck

OpenBSD-Commit-ID: 70e28a9818cee3da1be2ef6503d4b396dd421e6b

3 years agoupstream: Avoid an unnecessary xstrdup in rm_env() when matching
millert@openbsd.org [Wed, 20 Apr 2022 15:56:49 +0000 (15:56 +0000)] 
upstream: Avoid an unnecessary xstrdup in rm_env() when matching

patterns. Since match_pattern() doesn't modify its arguments (they are
const), there is no need to make an extra copy of the strings in
options->send_env. From Martin Vahlensieck

OpenBSD-Commit-ID: 2c9db31e3f4d3403b49642c64ee048b2a0a39351

3 years agoAdd debian-riscv64 test target.
Darren Tucker [Tue, 26 Apr 2022 13:30:59 +0000 (23:30 +1000)] 
Add debian-riscv64 test target.

3 years agoUpdate OpenSSL and LibreSSL versions in tests.
Darren Tucker [Mon, 25 Apr 2022 07:20:06 +0000 (17:20 +1000)] 
Update OpenSSL and LibreSSL versions in tests.

3 years agoInclude stdlib.h for free() prototype.
Darren Tucker [Sat, 23 Apr 2022 10:40:28 +0000 (20:40 +1000)] 
Include stdlib.h for free() prototype.

... which is used inside the CUSTOM_SYS_AUTH_GET_LASTLOGIN_MSG block.

3 years agoCache timezone data in capsicum sandbox.
Darren Tucker [Sat, 23 Apr 2022 10:17:26 +0000 (20:17 +1000)] 
Cache timezone data in capsicum sandbox.

From emaste at freebsd.org, originally part of FreeBSD commit r339216
fc3c19a9 with autoconf bits added by me.

3 years agoupstream: It looks like we can't completely avoid
dtucker@openbsd.org [Thu, 21 Apr 2022 01:36:46 +0000 (01:36 +0000)] 
upstream: It looks like we can't completely avoid

waiting for processes to exit so retrieve the pid via controlmaster and
use that.

OpenBSD-Regress-ID: 8246f00f22b14e49d2ff1744c94897ead33d457b

3 years agoupstream: Use ssh -f and ControlPersist ..
dtucker@openbsd.org [Wed, 20 Apr 2022 13:25:55 +0000 (13:25 +0000)] 
upstream: Use ssh -f and ControlPersist ..

to start up test forwards and ssh -O stop to shut them down intead of
sleep loops.  This speeds up the test by an order of magnitude.

OpenBSD-Regress-ID: eb3db5f805100919b092a3b2579c611fba3e83e7

3 years agoupstream: Simplify forward-control test.
dtucker@openbsd.org [Wed, 20 Apr 2022 05:24:13 +0000 (05:24 +0000)] 
upstream: Simplify forward-control test.

Since we no longer need to support SSH1 we don't need to run shell
commands on the other end of the connection and can use ssh -N instead.
This also makes the test less racy.

OpenBSD-Regress-ID: 32e94ce272820cc398f30b848b2b0f080d10302c

3 years agoupstream: regression test for sftp cp command
djm@openbsd.org [Thu, 31 Mar 2022 03:07:33 +0000 (03:07 +0000)] 
upstream: regression test for sftp cp command

OpenBSD-Regress-ID: c96bea9edde3a384b254785e7f9b2b24a81cdf82

3 years agoupstream: Import regenerated moduli
dtucker@openbsd.org [Wed, 20 Apr 2022 01:13:47 +0000 (01:13 +0000)] 
upstream: Import regenerated moduli

OpenBSD-Commit-ID: f9a0726d957cf10692a231996a1f34e7f9cdfeb0

3 years agoupstream: Try to continue running local I/O for channels in state
djm@openbsd.org [Wed, 20 Apr 2022 04:19:11 +0000 (04:19 +0000)] 
upstream: Try to continue running local I/O for channels in state

OPEN during SSH transport rekeying. The most visible benefit is that it
should make ~-escapes work in the client (e.g. to exit) if the connection
happened to have stalled during a rekey event. Based work by and ok dtucker@

OpenBSD-Commit-ID: a66e8f254e92edd4ce09c9f750883ec8f1ea5f45

3 years agoupstream: Import regenerated moduli
dtucker@openbsd.org [Wed, 20 Apr 2022 01:13:47 +0000 (01:13 +0000)] 
upstream: Import regenerated moduli

OpenBSD-Commit-ID: f9a0726d957cf10692a231996a1f34e7f9cdfeb0

3 years agoupstream: list the correct version number
tj@openbsd.org [Sat, 16 Apr 2022 00:22:31 +0000 (00:22 +0000)] 
upstream: list the correct version number

for when usage of the sftp protocol became default and fix a typo
from ed maste

OpenBSD-Commit-ID: 24e1795ed2283fdeacf16413c2f07503bcdebb31

3 years agoupstream: Correct path for system known hosts file in description
dtucker@openbsd.org [Tue, 12 Apr 2022 05:09:49 +0000 (05:09 +0000)] 
upstream: Correct path for system known hosts file in description

of IgnoreUserKnownHosts.  Patch from Martin Vahlensieck via tech@

OpenBSD-Commit-ID: 9b7784f054fa5aa4d63cb36bd563889477127215

3 years agoResync moduli.5 with upstream.
Darren Tucker [Sat, 16 Apr 2022 04:33:20 +0000 (14:33 +1000)] 
Resync moduli.5 with upstream.

1.18: remove duplicate publication year; carsten dot kunze at arcor dot de
1.19: ssh-keygen's -G/-T have been replaced with -M generate/screen.

3 years agoRetire fbsd6 test VM.
Darren Tucker [Sat, 16 Apr 2022 04:31:13 +0000 (14:31 +1000)] 
Retire fbsd6 test VM.

It's long since out of support, relatively slow (it's i686) and the
compiler has trouble with PIE.

3 years agoupstream: clear io_want/io_ready flags at start of poll() cycle;
djm@openbsd.org [Mon, 11 Apr 2022 22:52:08 +0000 (22:52 +0000)] 
upstream: clear io_want/io_ready flags at start of poll() cycle;

avoids plausible spin during rekeying if channel io_want flags are reused
across cycles. ok markus@ deraadt@

OpenBSD-Commit-ID: 91034f855b7c73cd2591657c49ac30f10322b967

3 years agoupstream: Note that curve25519-sha256 was later published in
dtucker@openbsd.org [Fri, 8 Apr 2022 05:43:39 +0000 (05:43 +0000)] 
upstream: Note that curve25519-sha256 was later published in

RFC8731.  ok djm@

OpenBSD-Commit-ID: 2ac2b5d642d4cf5918eaec8653cad9a4460b2743

3 years agoupstream: two defensive changes from Tobias Stoeckmann via GHPR287
djm@openbsd.org [Fri, 8 Apr 2022 04:40:40 +0000 (04:40 +0000)] 
upstream: two defensive changes from Tobias Stoeckmann via GHPR287

enforce stricter invarient for sshbuf_set_parent() - never allow
a buffer to have a previously-set parent changed.

In sshbuf_reset(), if the reallocation fails, then zero the entire
buffer and not the (potentially smaller) default initial alloc size.

OpenBSD-Commit-ID: 14583203aa5d50ad38d2e209ae10abaf8955e6a9

3 years agoRevert "update build-aux files to match autoconf-2.71"
Damien Miller [Mon, 11 Apr 2022 06:07:09 +0000 (16:07 +1000)] 
Revert "update build-aux files to match autoconf-2.71"

This reverts commit 0a8ca39fac6ad19096b6c263436f8b2dd51606f2.

It turns out that the checked-in copies of these files are actually newer
than autoconf-2.71's copies, so this was effectively a downgrade.
Spotted by Bo Anderson via github

3 years agoupdate build-aux files to match autoconf-2.71
Damien Miller [Fri, 8 Apr 2022 04:48:58 +0000 (14:48 +1000)] 
update build-aux files to match autoconf-2.71

i.e. config.guess, config.sub and install-sh

3 years agoupdate version numbers for release V_9_0_P1
Damien Miller [Wed, 6 Apr 2022 00:47:48 +0000 (10:47 +1000)] 
update version numbers for release

3 years agoupstream: openssh-9.0
djm@openbsd.org [Mon, 4 Apr 2022 22:45:25 +0000 (22:45 +0000)] 
upstream: openssh-9.0

OpenBSD-Commit-ID: 0dfb461188f4513ec024c1534da8c1ce14c20b64

3 years agoupstream: ssh: document sntrup761x25519-sha512@openssh.com as
naddy@openbsd.org [Thu, 31 Mar 2022 17:58:44 +0000 (17:58 +0000)] 
upstream: ssh: document sntrup761x25519-sha512@openssh.com as

default KEX

OpenBSD-Commit-ID: 12545bfa10bcbf552d04d9d9520d0f4e98b0e171

3 years agoupstream: man pages: add missing commas between subordinate and
naddy@openbsd.org [Thu, 31 Mar 2022 17:27:27 +0000 (17:27 +0000)] 
upstream: man pages: add missing commas between subordinate and

main clauses

jmc@ dislikes a comma before "then" in a conditional, so leave those
untouched.

ok jmc@

OpenBSD-Commit-ID: 9520801729bebcb3c9fe43ad7f9776ab4dd05ea3

3 years agoDisable security key on fbsd6 test host.
Darren Tucker [Mon, 4 Apr 2022 13:52:11 +0000 (23:52 +1000)] 
Disable security key on fbsd6 test host.

3 years agoSpecify TEST_SHELL=bash on AIX.
Darren Tucker [Mon, 4 Apr 2022 05:16:51 +0000 (15:16 +1000)] 
Specify TEST_SHELL=bash on AIX.

The system shells cause the agent-restrict test to fail due to some
quoting so explicitly specify bash until we can get configure to
autmatically work around that.

3 years agoOnly return events from ppoll that were requested.
Darren Tucker [Fri, 1 Apr 2022 12:38:44 +0000 (23:38 +1100)] 
Only return events from ppoll that were requested.

If the underlying system's select() returns bits that were not in the
request set, our ppoll() implementation can return revents for events
not requested, which can apparently cause a hang.  Only return revents
for activity in the requested event set.  bz#3416, analysis and fix by
yaroslav.kuzmin at vmssoftware com, ok djm@

3 years agoOnly run regression tests on slow VMs.
Darren Tucker [Fri, 1 Apr 2022 12:21:40 +0000 (23:21 +1100)] 
Only run regression tests on slow VMs.

3 years agoIncrease test timeout to allow slow VMs to finish
Darren Tucker [Fri, 1 Apr 2022 12:21:06 +0000 (23:21 +1100)] 
Increase test timeout to allow slow VMs to finish

3 years agoUse bash or ksh if available for SH in Makefile.
Darren Tucker [Fri, 1 Apr 2022 05:27:38 +0000 (16:27 +1100)] 
Use bash or ksh if available for SH in Makefile.

3 years agoSet Makefile SHELL as determined by configure.
Darren Tucker [Fri, 1 Apr 2022 03:56:54 +0000 (14:56 +1100)] 
Set Makefile SHELL as determined by configure.

This should improve compatibility for users with non-POSIX shells.  If
using Makefile.in directly (eg make -f Makefile.in distprep) then SHELL
will need to be specified on the command line (along with MANFMT in that
particular case).  ok djm@

3 years agoSkip slow tests on (very) slow test targets.
Darren Tucker [Fri, 1 Apr 2022 02:16:47 +0000 (13:16 +1100)] 
Skip slow tests on (very) slow test targets.

3 years agodepend
Damien Miller [Thu, 31 Mar 2022 03:11:36 +0000 (14:11 +1100)] 
depend

3 years agoupstream: add a sftp client "cp" command that supports server-side
djm@openbsd.org [Thu, 31 Mar 2022 03:07:03 +0000 (03:07 +0000)] 
upstream: add a sftp client "cp" command that supports server-side

copying of files. Useful for this task and for testing the copy-data
extension. Patch from Mike Frysinger; ok dtucker@

OpenBSD-Commit-ID: 1bb1b950af0d49f0d5425b1f267e197aa1b57444

3 years agoupstream: add support for the "corp-data" protocol extension to
djm@openbsd.org [Thu, 31 Mar 2022 03:05:49 +0000 (03:05 +0000)] 
upstream: add support for the "corp-data" protocol extension to

allow server-side copies to be performed without having to go via the client.
Patch by Mike Frysinger, ok dtucker@

OpenBSD-Commit-ID: 00aa510940fedd66dab1843b58682de4eb7156d5

3 years agoupstream: select post-quantum KEX
djm@openbsd.org [Wed, 30 Mar 2022 21:13:23 +0000 (21:13 +0000)] 
upstream: select post-quantum KEX

sntrup761x25519-sha512@openssh.com as the default; ok markus@

OpenBSD-Commit-ID: f02d99cbfce22dffec2e2ab1b60905fbddf48fb9

3 years agoupstream: fix poll() spin when a channel's output fd closes without
djm@openbsd.org [Wed, 30 Mar 2022 21:10:25 +0000 (21:10 +0000)] 
upstream: fix poll() spin when a channel's output fd closes without

data in the channel buffer. Introduce more exact packing of channel fds into
the pollfd array. fixes bz3405 and bz3411; ok deraadt@ markus@

OpenBSD-Commit-ID: 06740737849c9047785622ad5d472cb6a3907d10

3 years agoupstream: ssh is almost out of getopt() characters; note the
djm@openbsd.org [Wed, 30 Mar 2022 04:33:09 +0000 (04:33 +0000)] 
upstream: ssh is almost out of getopt() characters; note the

remaining remaining available ones in a comment

OpenBSD-Commit-ID: 48d38cef59d6bc8e84c6c066f6d601875d3253fd

3 years agoupstream: avoid NULL deref via ssh-keygen -Y find-principals.
djm@openbsd.org [Wed, 30 Mar 2022 04:27:51 +0000 (04:27 +0000)] 
upstream: avoid NULL deref via ssh-keygen -Y find-principals.

bz3409, reported by Mateusz Adamowski

OpenBSD-Commit-ID: a3b2c02438052ee858e0ee18e5a288586b5df2c5

3 years agoAdd AIX 5.1 test target.
Darren Tucker [Mon, 28 Mar 2022 06:51:03 +0000 (17:51 +1100)] 
Add AIX 5.1 test target.

3 years agoDrop leading "v" from release version identifier.
Darren Tucker [Sat, 26 Mar 2022 11:01:31 +0000 (22:01 +1100)] 
Drop leading "v" from release version identifier.

It's present in the git tags but not in the release tarball names.
Also drop extra "/" from URL path.

3 years agoUse tarballs when testing LibreSSL releases.
Darren Tucker [Sat, 26 Mar 2022 05:28:04 +0000 (16:28 +1100)] 
Use tarballs when testing LibreSSL releases.

This means they'll still work when the combination of -portable and
openbsd github repos no longer match.

3 years agoRemove now-unused passwd variable.
Darren Tucker [Sat, 26 Mar 2022 04:02:45 +0000 (15:02 +1100)] 
Remove now-unused passwd variable.

3 years agoMissing semicolon.
Darren Tucker [Sat, 26 Mar 2022 02:15:44 +0000 (13:15 +1100)] 
Missing semicolon.

3 years agoFactor out platform-specific locked account check.
Darren Tucker [Sat, 26 Mar 2022 01:49:50 +0000 (12:49 +1100)] 
Factor out platform-specific locked account check.

Also fixes an incorrect free on platforms with both libiaf and shadow
passwords (probably only Unixware).  Prompted by github PR#284,
originally from @c3h2_ctf and stoeckmann@.

3 years agoAdd OpenWRT mips and mipsel test targets.
Darren Tucker [Fri, 25 Mar 2022 21:13:46 +0000 (08:13 +1100)] 
Add OpenWRT mips and mipsel test targets.

3 years agoupstream: don't leak argument list; bz3404, reported by Balu
djm@openbsd.org [Sun, 20 Mar 2022 08:52:17 +0000 (08:52 +0000)] 
upstream: don't leak argument list; bz3404, reported by Balu

Gajjala ok dtucker@

OpenBSD-Commit-ID: fddc32d74e5dd5cff1a49ddd6297b0867eae56a6

3 years agoupstream: make addargs() and replacearg() a little more robust and
djm@openbsd.org [Sun, 20 Mar 2022 08:51:21 +0000 (08:51 +0000)] 
upstream: make addargs() and replacearg() a little more robust and

improve error reporting

make freeargs(NULL) a noop like the other free functions

ok dtucker as part of bz3403

OpenBSD-Commit-ID: 15f86da83176978b4d1d288caa24c766dfa2983d

3 years agoupstream: don't try to resolve ListenAddress directives in the sshd
djm@openbsd.org [Fri, 18 Mar 2022 04:04:11 +0000 (04:04 +0000)] 
upstream: don't try to resolve ListenAddress directives in the sshd

re-exec path - we're never going to use the result and if the operation fails
then it can prevent connections from being accepted. Reported by Aaron
Poffenberger; with / ok dtucker@

OpenBSD-Commit-ID: 44c53a43909a328e2f5ab26070fdef3594eded60

3 years agoupstream: remove blank line
djm@openbsd.org [Fri, 18 Mar 2022 02:50:21 +0000 (02:50 +0000)] 
upstream: remove blank line

OpenBSD-Commit-ID: d5e0182965b2fbfb03ad5f256d1a1ce5706bcddf

3 years agoupstream: helpful comment
djm@openbsd.org [Fri, 18 Mar 2022 02:32:22 +0000 (02:32 +0000)] 
upstream: helpful comment

OpenBSD-Commit-ID: e3315a45cb04e7feeb614d76ec80a9fe4ca0e8c7

3 years agoupstream: ssh-keygen -Y check-novalidate requires namespace or SEGV
djm@openbsd.org [Fri, 18 Mar 2022 02:31:25 +0000 (02:31 +0000)] 
upstream: ssh-keygen -Y check-novalidate requires namespace or SEGV

will ensue. Patch from Mateusz Adamowski via GHPR#307

OpenBSD-Commit-ID: 99e8ec38f9feb38bce6de240335be34aedeba5fd

3 years agoupstream: improve DEBUG_CHANNEL_POLL debugging message
djm@openbsd.org [Tue, 15 Mar 2022 05:27:37 +0000 (05:27 +0000)] 
upstream: improve DEBUG_CHANNEL_POLL debugging message

OpenBSD-Commit-ID: 2275eb7bc4707d019b1a0194b9c92c0b78da848f

3 years agoupstream: ssh: xstrdup(): use memcpy(3)
cheloha@openbsd.org [Sun, 13 Mar 2022 23:27:54 +0000 (23:27 +0000)] 
upstream: ssh: xstrdup(): use memcpy(3)

Copying the given string into the buffer with strlcpy(3) confers no
benefit in this context because we have already determined the
string's length with strlen(3) in order to allocate that buffer.

Thread: https://marc.info/?l=openbsd-tech&m=164687525802691&w=2

ok dtucker@ millert@

OpenBSD-Commit-ID: f8bfc082e36e2d2dc4e1feece02fe274155ca11a

3 years agoResync fmt_scaled. with OpenBSD.
Darren Tucker [Fri, 11 Mar 2022 07:43:58 +0000 (18:43 +1100)] 
Resync fmt_scaled. with OpenBSD.

Fixes underflow reported in bz#3401.

3 years agoProvide killpg implementation.
Darren Tucker [Tue, 8 Mar 2022 22:41:56 +0000 (09:41 +1100)] 
Provide killpg implementation.

Based on github PR#301 for Tandem NonStop.

3 years agoCheck for missing ftruncate prototype.
Darren Tucker [Tue, 8 Mar 2022 22:29:30 +0000 (09:29 +1100)] 
Check for missing ftruncate prototype.

From github PR#301 in conjunction with rsbeckerca.

3 years agoDefault to not using sandbox when cross compiling.
Darren Tucker [Tue, 8 Mar 2022 09:04:06 +0000 (20:04 +1100)] 
Default to not using sandbox when cross compiling.

On most systems poll(2) does not work when the number of FDs is reduced
with setrlimit, so assume it doesn't when cross compiling and we can't
run the test.  bz#3398.

3 years agoupstream: pack pollfd array before server_accept_loop() ppoll()
djm@openbsd.org [Tue, 1 Mar 2022 01:59:19 +0000 (01:59 +0000)] 
upstream: pack pollfd array before server_accept_loop() ppoll()

call, and terminate sshd if ppoll() returns errno==EINVAL

avoids spin in ppoll when MaxStartups > RLIMIT_NOFILE, reported by
Daniel Micay

feedback/ok deraadt

OpenBSD-Commit-ID: dbab1c24993ac977ec24d83283b8b7528f7c2c15

3 years agoupstream: include rejected signature algorithm in error message and
naddy@openbsd.org [Sun, 27 Feb 2022 01:33:59 +0000 (01:33 +0000)] 
upstream: include rejected signature algorithm in error message and

not the (useless) key type; ok djm@

OpenBSD-Commit-ID: d0c0f552a4d9161203e07e95d58a76eb602a76ff