]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
djm@openbsd.org [Tue, 7 Mar 2023 21:47:42 +0000 (21:47 +0000)]
upstream: refactor to be more readable top to bottom. Prompted by
Coverity CID 405048 which was a false-positive fd leak; ok dtucker@
OpenBSD-Commit-ID:
fc55ec2af622a017defb9b768bf26faefc792c00
Darren Tucker [Tue, 7 Mar 2023 07:34:41 +0000 (18:34 +1100)]
Add header changes missed in previous.
dtucker@openbsd.org [Tue, 7 Mar 2023 06:09:14 +0000 (06:09 +0000)]
upstream: Fix mem leak in environment setup.
From jjelen at redhat.com via bz#2687, ok djm@
OpenBSD-Commit-ID:
9f9e4ba3cac003e6f81da3bcebd1b9ec43e7f353
dtucker@openbsd.org [Mon, 6 Mar 2023 12:15:47 +0000 (12:15 +0000)]
upstream: Unit test for kex_proposal_populate_entries.
OpenBSD-Regress-ID:
bdb211d80d572a08bf14b49fe2a58b9ff265c006
djm@openbsd.org [Tue, 7 Mar 2023 05:37:26 +0000 (05:37 +0000)]
upstream: fix memory leak in process_read() path; Spotted by James
Robinson in GHPR363; ok markus@
OpenBSD-Commit-ID:
cdc2d98e6478b7e7f3a36976845adae3820429d8
djm@openbsd.org [Tue, 7 Mar 2023 01:30:52 +0000 (01:30 +0000)]
upstream: correct size for array argument when changing
UMAC_OUTPUT_LEN Coverity CID 291845; ok dtucker@
OpenBSD-Commit-ID:
2eb017d10705bb623d4418691f961c930eafaec0
dtucker@openbsd.org [Mon, 6 Mar 2023 12:14:48 +0000 (12:14 +0000)]
upstream: Refactor creation of KEX proposal.
This adds kex_proposal_populate_entries (and corresponding free) which
populates the KEX proposal array with dynamically allocated strings.
This replaces the previous mix of static and dynamic that has been the
source of previous leaks and bugs. Remove unused compat functions.
With & ok djm@.
OpenBSD-Commit-ID:
f2f99da4aae2233cb18bf9c749320c5e040a9c7b
dtucker@openbsd.org [Sun, 5 Mar 2023 09:24:35 +0000 (09:24 +0000)]
upstream: Fix mem and FILE leaks in moduli screening.
If multiple -Ocheckpoint= options are passed, the earlier ones would
be overwritten and leaked. If we use an input file that wasn't stdin,
close that. From Coverity CIDs 291884 and 291894.
OpenBSD-Commit-ID:
a4d9d15f572926f841788912e2b282485ad09e8b
dtucker@openbsd.org [Sun, 5 Mar 2023 08:18:58 +0000 (08:18 +0000)]
upstream: Plug mem leak in moduli checkpoint option parsing.
From Coverity CID 291894.
OpenBSD-Commit-ID:
9b1aba2d049741ae21c8dc4560a7e29ab17310f4
dtucker@openbsd.org [Sun, 5 Mar 2023 05:34:09 +0000 (05:34 +0000)]
upstream: Remove unused compat.h includes.
We've previously removed a lot of the really old compatibility code,
and with it went the need to include compat.h in most of the files that
have it.
OpenBSD-Commit-ID:
5af8baa194be00a3092d17598e88a5b29f7ea2b4
dtucker@openbsd.org [Sat, 4 Mar 2023 03:22:59 +0000 (03:22 +0000)]
upstream: Use time_t for x11 timeout.
Use time_t instead of u_int for remaining x11 timeout checks for 64bit
time_t safety. From Coverity CIDs 405197 and 405028, ok djm@
OpenBSD-Commit-ID:
356685bfa1fc3d81bd95722d3fc47101cc1a4972
dtucker@openbsd.org [Fri, 3 Mar 2023 10:23:42 +0000 (10:23 +0000)]
upstream: Ensure ms_remain is always initialized
similar to what we do in ssh_packet_write_wait. bz#2687, from jjelen
at redhat.com.
OpenBSD-Commit-ID:
a50e0541cf823f8d1c72f71ccde925d3dbe6dfac
dtucker@openbsd.org [Fri, 3 Mar 2023 09:48:51 +0000 (09:48 +0000)]
upstream: Check for non-NULL before string
comparison. From jjelen at redhat.com via bz#2687.
OpenBSD-Commit-ID:
0d9b2e0cac88a311b5766b1aef737082583c285f
djm@openbsd.org [Fri, 3 Mar 2023 05:00:34 +0000 (05:00 +0000)]
upstream: guard against getsockname(-1, ...) from Coverity CID
291832
OpenBSD-Commit-ID:
e58d5227327917d189229b7f0b37d2780f360d5f
djm@openbsd.org [Fri, 3 Mar 2023 04:36:20 +0000 (04:36 +0000)]
upstream: some options are not first-match-wins. Mention that there
are exceptions at the start of the manpage and label some of them in the
option description.
OpenBSD-Commit-ID:
3b74728446fa6fc8742769eeb8c3674e233e84c4
djm@openbsd.org [Fri, 3 Mar 2023 04:34:49 +0000 (04:34 +0000)]
upstream: actually print "channeltimeout none" in config dump mode;
spotted via Coverity CID 405022
OpenBSD-Commit-ID:
b074b52bf138b75f08264e8da15880b29c7a630f
Darren Tucker [Fri, 3 Mar 2023 03:50:03 +0000 (14:50 +1100)]
Add Coverity badges.
dtucker@openbsd.org [Fri, 3 Mar 2023 03:12:24 +0000 (03:12 +0000)]
upstream: Check return values of dup2. Spotted by Coverity, ok djm@
OpenBSD-Commit-ID:
19fb1b53072826d00c67df677731d2f6c1dd602b
dtucker@openbsd.org [Fri, 3 Mar 2023 02:37:58 +0000 (02:37 +0000)]
upstream: Use time_t for x11_refuse_time timeout. We need
SSH_TIME_T_MAX for this, so move from misc.c to misc.h so it's available.
Fixes a Coverity warning for 64bit time_t safety, ok djm@
OpenBSD-Commit-ID:
c69c4c3152cdaab953706db4ccf4d5fd682f7d8d
dtucker@openbsd.org [Fri, 3 Mar 2023 02:34:29 +0000 (02:34 +0000)]
upstream: Check return value from fctnl and warn on failure.
Spotted by Coverity, ok djm@
OpenBSD-Commit-ID:
2097c7db3cf657f1e3a6c5077041bacc63143cab
dtucker@openbsd.org [Thu, 2 Mar 2023 11:10:27 +0000 (11:10 +0000)]
upstream: Remove SUDO in proxy command wrapper. Anything that needs
sudo is already run by it, and it breaks if root isn't in sudoers.
OpenBSD-Regress-ID:
6cf22fda32a89c16915f31a6ed9bbdbef2a3bac9
dtucker@openbsd.org [Thu, 2 Mar 2023 08:24:41 +0000 (08:24 +0000)]
upstream: Fix breakage on dhgex test.
This was due to the sshd logs being written to the wrong log file.
While there, make save_debug_logs less verbose, write the name of the
tarball to regress.log and use $SUDO to remove the old symlinks (which
shouldn't be needed, but won't hurt). Initial problem spotted by anton@.
OpenBSD-Regress-ID:
9c44fb9cd418e6ff31165e7a6c1f9f11a6d19f5b
dtucker@openbsd.org [Thu, 2 Mar 2023 08:14:52 +0000 (08:14 +0000)]
upstream: Quote grep and log message better.
OpenBSD-Regress-ID:
3823d9063127169736aa274b1784cb28e15b64d4
dtucker@openbsd.org [Thu, 2 Mar 2023 06:41:56 +0000 (06:41 +0000)]
upstream: Always call fclose on checkpoints.
In the case of an fprintf failure we would not call fclose which would
leak the FILE pointer. While we're there, try to clean up the temp file
on failure. Spotted by Coverity, ok djm@
OpenBSD-Commit-ID:
73c7ccc5d4fcc235f54c6b20767a2815408525ef
dtucker@openbsd.org [Wed, 1 Mar 2023 21:54:50 +0000 (21:54 +0000)]
upstream: Remove old log symlinks
before creating new ones. In -portable some platforms don't like
overwriting existing symlinks.
OpenBSD-Regress-ID:
7e7ddc0beb73e945e1c4c58d51c8a125b518120f
Darren Tucker [Wed, 1 Mar 2023 12:23:02 +0000 (23:23 +1100)]
Adjust test jobs for new log directory.
dtucker@openbsd.org [Wed, 1 Mar 2023 09:29:32 +0000 (09:29 +0000)]
upstream: Rework logging for the regression tests.
Previously we would log to ssh.log and sshd.log, but that is insufficient
for tests that have more than one concurent ssh/sshd.
Instead, we'll log to separate datestamped files in a $OBJ/log/ and
leave a symlink at the previous location pointing at the most recent
instance with an entry in regress.log showing which files were created
at each point. This should be sufficient to reconstruct what happened
even for tests that use multiple instances of each program. If the test
fails, tar up all of the logs for later analysis.
This will let us also capture the output from some of the other tools
which was previously sent to /dev/null although most of those will be
in future commits.
OpenBSD-Regress-ID:
f802aa9e7fa51d1a01225c05fb0412d015c33e24
dtucker@openbsd.org [Tue, 28 Feb 2023 21:31:50 +0000 (21:31 +0000)]
upstream: fatal out if allocating banner string fails to avoid
potential null deref later in sscanf. Spotted by Coverity, ok deraadt@
OpenBSD-Commit-ID:
74e8d228ac00552e96e9e968dfcccf8dd1f46ad5
dtucker@openbsd.org [Tue, 28 Feb 2023 08:45:24 +0000 (08:45 +0000)]
upstream: Explicitly ignore return from fchmod
similar to other calls to prevent warning.
OpenBSD-Commit-ID:
fdc5287dcee0860b5a493186414226c655b0eb0a
dtucker@openbsd.org [Mon, 27 Feb 2023 22:12:40 +0000 (22:12 +0000)]
upstream: Plug mem leak on globbed ls error path.
Spotted by Coverity, ok deraadt@
OpenBSD-Commit-ID:
de28476025db29820a9a2e56e98b964d8a02861c
Darren Tucker [Mon, 27 Feb 2023 10:04:22 +0000 (21:04 +1100)]
Cast time_t's in debug output to long long.
Should fix Coverity warning about truncation of 64bit time_t.
Darren Tucker [Mon, 27 Feb 2023 06:28:59 +0000 (17:28 +1100)]
Do shadow expiry calcs using "long long".
Coverity flags these as potentially not 64bit time_t safe so use
long long for the calculations and debug output. ok djm@
Damien Miller [Mon, 27 Feb 2023 06:07:52 +0000 (17:07 +1100)]
avoid clash between for getopt's struct option
Since we don't use getopt_long() nothing outside the getopt()
implementation itself uses this structure, so move it into the
source to remove it from visibility and clashes with libc's
ok dtucker@
Darren Tucker [Sat, 25 Feb 2023 03:45:41 +0000 (14:45 +1100)]
Revert explicit chmods on private keys.
This should no longer be needed on Cygwin test runners due to previous
commit.
Darren Tucker [Sat, 25 Feb 2023 03:43:28 +0000 (14:43 +1100)]
Remove extended ACLs from working dirs.
This should allow umask to work as expected and prevent tests from
failing due to excessive permissions on private keys.
Darren Tucker [Fri, 24 Feb 2023 02:44:13 +0000 (13:44 +1100)]
Explicitly set permissions on user and host keys.
On cygwin, the umask might not be sufficient. Should fix tests on
Github runners.
djm@openbsd.org [Wed, 22 Feb 2023 03:56:43 +0000 (03:56 +0000)]
upstream: fix progressmeter corruption on wide displays; bz3534
feedback/ok dtucker@
OpenBSD-Commit-ID:
f4affee067cec7c182f3e0b307d758e0472762a3
dtucker@openbsd.org [Tue, 21 Feb 2023 06:48:18 +0000 (06:48 +0000)]
upstream: fseek to end of known_hosts before writing to it.
POSIX and ANSI C require that applications call fseek or similar between
read and writing to a RW file. OpenBSD doesn't enforce this, but some
(System V derived) platforms need this to prevent it from writing a
spurious extra byte (in this case, a newline). ok djm@ deraadt@
OpenBSD-Commit-ID:
33e680dcd8110582a93a40a8491024e961f45137
Darren Tucker [Tue, 21 Feb 2023 06:51:09 +0000 (17:51 +1100)]
Also run unit tests on AIX VMs.
In the past these tests took too long, but these days it only adds
about 5 min to the run.
Darren Tucker [Tue, 21 Feb 2023 06:38:55 +0000 (17:38 +1100)]
Wrap stdint.h inside ifdef.
Mayank Sharma [Mon, 20 Feb 2023 12:07:15 +0000 (17:37 +0530)]
Add includes to ptimeout test.
Fixes test failures on AIX due to type mismatches.
Darren Tucker [Mon, 20 Feb 2023 07:24:39 +0000 (18:24 +1100)]
Always use the openssl binary configure tells us.
This fixes tests on platforms that do not have the openssl tool
installed at all.
dtucker@openbsd.org [Fri, 17 Feb 2023 04:22:50 +0000 (04:22 +0000)]
upstream: Remove now-unused compat bit SSH_BUG_RSASIGMD5. The code
to set this was removed in OpenSSH 7.7 when support for SSH implementations
dating back to before RFC standardization were removed. "burn it all" djm@
OpenBSD-Commit-ID:
6330935fbe23dd00be79891505e06d1ffdac7cda
dtucker@openbsd.org [Fri, 17 Feb 2023 03:06:18 +0000 (03:06 +0000)]
upstream: Remove now-unused compat bit SSH_BUG_BIGENDIANAES. This
was previously set for OpenSSH 2.3 (released in 2000) but this check was
removed in OpenSSH 7.7 (2018). ok djm@ deraadt@
OpenBSD-Commit-ID:
326426ea328707fc9e83305291ab135c87f678af
Damien Miller [Thu, 16 Feb 2023 23:12:40 +0000 (10:12 +1100)]
whitespace fixes
Damien Miller [Thu, 16 Feb 2023 23:02:08 +0000 (10:02 +1100)]
whitespace at EOL
dtucker@openbsd.org [Thu, 16 Feb 2023 10:10:00 +0000 (10:10 +0000)]
upstream: Remove SSH_BUG_PASSWORDPAD compat bit
since it's no longer used. ok markus@
OpenBSD-Commit-ID:
b92c21f56fe4b7f9a54790d6a9650725c226820b
dtucker@openbsd.org [Thu, 16 Feb 2023 07:55:15 +0000 (07:55 +0000)]
upstream: Remove SSH_BUG_IGNOREMSG compat flag
since it's only applicable to SSH1 and thus no longer used. ok markus@
"kill it with fire" djm@
OpenBSD-Commit-ID:
ea13318b1937795d9db4790d3ce0a6ed01584dab
jmc@openbsd.org [Fri, 10 Feb 2023 06:41:53 +0000 (06:41 +0000)]
upstream: space between macro and punctuation; sort usage();
OpenBSD-Commit-ID:
6141610cfca037700730e41f868d1d9124958f8c
jmc@openbsd.org [Fri, 10 Feb 2023 06:40:48 +0000 (06:40 +0000)]
upstream: space between macro and punctuation;
OpenBSD-Commit-ID:
abc95e550be9e6d9a7ff64b65c104c7be21ab19e
jmc@openbsd.org [Fri, 10 Feb 2023 06:39:27 +0000 (06:39 +0000)]
upstream: sort SYNOPSIS;
OpenBSD-Commit-ID:
dacd9da33277d5669a51213d880632599c890c1e
Darren Tucker [Sat, 11 Feb 2023 01:32:19 +0000 (12:32 +1100)]
Improve seccomp compat on older systems.
Check if flags to mmap and madvise are defined before using them.
Should fix problems building on older Linux systems that don't have
these. bz#3537, with & ok djm@.
djm@openbsd.org [Fri, 10 Feb 2023 05:06:03 +0000 (05:06 +0000)]
upstream: test -Ohashalg=... and that the default output contains both
specified hash algorithms; prompted by dtucker@
OpenBSD-Regress-ID:
26f309208c8d8b8fa9c5f419767b85f1e9b22f51
djm@openbsd.org [Fri, 10 Feb 2023 04:56:30 +0000 (04:56 +0000)]
upstream: let ssh-keygen and ssh-keyscan accept
-Ohashalg=sha1|sha256 when outputting SSHFP fingerprints to allow algorithm
selection. bz3493 ok dtucker@
OpenBSD-Commit-ID:
e6e07fe21318a873bd877f333e189eb963a11b3d
djm@openbsd.org [Fri, 10 Feb 2023 04:47:19 +0000 (04:47 +0000)]
upstream: add a `sshd -G` option that parses and prints the
effective configuration without attempting to load private keys and perform
other checks. This allows usage of the option before keys have been
generated.
bz3460 feedback/ok dtucker@
OpenBSD-Commit-ID:
774504f629023fc25a559ab1d95401adb3a7fb29
djm@openbsd.org [Fri, 10 Feb 2023 04:40:28 +0000 (04:40 +0000)]
upstream: make `ssh -Q CASignatureAlgorithms` work as the manpage says
it should bz3532
OpenBSD-Commit-ID:
0ddb17b3fcbd99bfb5baea4ac5e449620cbd3adc
Darren Tucker [Fri, 10 Feb 2023 03:26:44 +0000 (14:26 +1100)]
Add CentOS 7 test targets.
dtucker@openbsd.org [Thu, 9 Feb 2023 09:55:33 +0000 (09:55 +0000)]
upstream: Test adding terminating newline to known_hosts.
OpenBSD-Regress-ID:
5fc3010ac450195b3fbdeb68e875564968800365
dtucker@openbsd.org [Wed, 8 Feb 2023 08:06:03 +0000 (08:06 +0000)]
upstream: ssh-agent doesn't actually take -v,
so the recently-added ones will result in the test not cleaning up
after itself. Patch from cjwatson at debian.org vi bz#3536.
OpenBSD-Regress-ID:
1fc8283568f5bf2f918517c2c1e778072cf61b1a
dtucker@openbsd.org [Thu, 9 Feb 2023 09:54:11 +0000 (09:54 +0000)]
upstream: Ensure that there is a terminating newline when adding a new
entry to known_hosts. bz#3529, with git+openssh at limpsquid.nl, ok deraadt@
markus@
OpenBSD-Commit-ID:
fa8d90698da1886570512b96f051e266eac105e0
Darren Tucker [Mon, 6 Feb 2023 21:43:47 +0000 (08:43 +1100)]
Replace 9.1 with 9.2 on CI status page.
Damien Miller [Fri, 3 Feb 2023 05:33:09 +0000 (16:33 +1100)]
harden Linux seccomp sandbox
Linux mmap(2) and madvise(2) syscalls support quite a number of funky
flags that we don't expect that sshd/libc will ever need. We can
exclude this kernel attack surface by filtering the mmap(2) flags
and the madvise(2) advice arguments.
Similarly, the sandboxed process in sshd is a single-threaded program
that does not use shared memory for synchronisation or communication.
Therefore, there should be no reason for the advanced priority
inheritance futex(2) operations to be necessary. These can also be
excluded.
Motivated by Jann Horn pointing out that there have been kernel bugs
in nearby Linux kernel code, e.g. CVE-2020-29368, CVE-2020-29374 and
CVE-2022-42703.
Feedback Jann Horn, ok dtucker@
Damien Miller [Thu, 2 Feb 2023 12:21:54 +0000 (23:21 +1100)]
crank versions in RPM specs
Damien Miller [Thu, 2 Feb 2023 12:21:45 +0000 (23:21 +1100)]
update version in README
Damien Miller [Thu, 2 Feb 2023 12:17:49 +0000 (23:17 +1100)]
adapt compat_kex_proposal() test to portable
djm@openbsd.org [Thu, 2 Feb 2023 12:12:52 +0000 (12:12 +0000)]
upstream: test compat_kex_proposal(); by dtucker@
OpenBSD-Regress-ID:
0e404ee264db546f9fdbf53390689ab5f8d38bf2
dtucker@openbsd.org [Thu, 19 Jan 2023 07:53:45 +0000 (07:53 +0000)]
upstream: Check if we can copy sshd or need to use sudo to do so
during reexec test. Skip test if neither can work. Patch from anton@, tweaks
from me.
OpenBSD-Regress-ID:
731b96ae74d02d5744e1f1a8e51d09877ffd9b6d
djm@openbsd.org [Thu, 2 Feb 2023 12:10:22 +0000 (12:10 +0000)]
upstream: openssh-9.2
OpenBSD-Commit-ID:
f7389f32413c74d6e2055f05cf65e7082de03923
djm@openbsd.org [Thu, 2 Feb 2023 12:10:05 +0000 (12:10 +0000)]
upstream: fix double-free caused by compat_kex_proposal(); bz3522
by dtucker@, ok me
OpenBSD-Commit-ID:
2bfc37cd2d41f67dad64c17a64cf2cd3806a5c80
Darren Tucker [Wed, 1 Feb 2023 06:17:26 +0000 (17:17 +1100)]
Skip connection-timeout test on minix3.
Minix 3's Unix domain sockets don't seem to work the way we expect, so
skip connection-timeout test on that platform. While there, group
together all similarly skipped tests and explicitly comment.
Damien Miller [Wed, 1 Feb 2023 01:12:05 +0000 (12:12 +1100)]
fix libfido2 detection without pkg-config
Place libfido2 before additional libraries (that it may depend upon)
and not after. bz3530 from James Zhang; ok dtucker@
deraadt@openbsd.org [Wed, 18 Jan 2023 20:56:36 +0000 (20:56 +0000)]
upstream: delete useless dependency
OpenBSD-Commit-ID:
e1dc11143f83082e3154d6094f9136d0dc2637ad
deraadt@openbsd.org [Wed, 18 Jan 2023 20:43:15 +0000 (20:43 +0000)]
upstream: Create and install sshd random relink kit.
../Makefile.inc and Makfile are concatenated for reuse, which hopefully won't
be too fragile, we'll see if we need a different approach. The resulting sshd
binary is tested with the new sshd -V option before installation. As the
binary layout is now semi-unknown (meaning relative, fixed, and gadget
offsets are not precisely known), change the filesystem permissions to 511 to
prevent what I call "logged in BROP". I have ideas for improving this further
but this is a first step ok djm
OpenBSD-Commit-ID:
1e0a2692b7e20b126dda60bf04999d1d30d959d8
jmc@openbsd.org [Wed, 18 Jan 2023 06:55:32 +0000 (06:55 +0000)]
upstream: tweak previous; ok djm
OpenBSD-Commit-ID:
df71ce4180c58202dfdc1d92626cfe900b91b7c3
Darren Tucker [Tue, 31 Jan 2023 08:35:44 +0000 (19:35 +1100)]
Skip connection-timeout test under Valgrind.
Valgrind slows things down so much that the timeout test fails. Skip
this test until we figure out if we can make it work.
Darren Tucker [Wed, 25 Jan 2023 10:58:40 +0000 (21:58 +1100)]
Skip connection-timeout when missing FD passing.
This tests uses multiplexing which uses file descriptor passing, so
skip it if we don't have that. Fixes test failures on Cygwin.
djm@openbsd.org [Wed, 18 Jan 2023 02:00:10 +0000 (02:00 +0000)]
upstream: when restoring non-blocking mode to stdio fds, restore
exactly the flags that ssh started with and don't just clobber them with
zero, as this could also remove the append flag from the set;
bz3523; ok dtucker@
OpenBSD-Commit-ID:
1336b03e881db7564a4b66014eb24c5230e9a0c0
millert@openbsd.org [Wed, 18 Jan 2023 01:50:21 +0000 (01:50 +0000)]
upstream: Add a -V (version) option to sshd like the ssh client
has. OK markus@ deraadt@
OpenBSD-Commit-ID:
abe990ec3e636fb040132aab8cbbede98f0c413e
millert@openbsd.org [Tue, 17 Jan 2023 18:52:44 +0000 (18:52 +0000)]
upstream: For "ssh -V" always exit 0, there is no need to check opt
again. This was missed when the fallthrough in the switch case above it was
removed. OK deraadt@
OpenBSD-Commit-ID:
5583e5d8f6d62a8a4215cfa95a69932f344c8120
djm@openbsd.org [Tue, 17 Jan 2023 10:15:10 +0000 (10:15 +0000)]
upstream: also check that an active session inhibits
UnusedConnectionTimeout idea markus@
OpenBSD-Regress-ID:
55c0fb61f3bf9e092b0a53f9041d3d2012f14003
djm@openbsd.org [Tue, 17 Jan 2023 10:02:34 +0000 (10:02 +0000)]
upstream: regression test for UnusedConnectionTimeout
OpenBSD-Regress-ID:
7f29001374a68e71e5e078f69e4520cf4bcca084
djm@openbsd.org [Mon, 16 Jan 2023 04:11:29 +0000 (04:11 +0000)]
upstream: unbreak test: cannot access shell positional parameters
past $9 without wrapping the position in braces (i.e. need ${10}, etc.)
OpenBSD-Regress-ID:
3750ec98d5d409ce6a93406fedde6f220d2ea2ac
djm@openbsd.org [Tue, 17 Jan 2023 09:44:48 +0000 (09:44 +0000)]
upstream: Add a sshd_config UnusedConnectionTimeout option to terminate
client connections that have no open channels for some length of time. This
complements the recently-added ChannelTimeout option that terminates inactive
channels after a timeout.
ok markus@
OpenBSD-Commit-ID:
ca983be74c0350364c11f8ba3bd692f6f24f5da9
djm@openbsd.org [Sun, 15 Jan 2023 23:35:10 +0000 (23:35 +0000)]
upstream: adapt to
ed25519 changes in src/usr.bin/ssh
OpenBSD-Regress-ID:
4b3e7ba7ee486ae8a0b4790f8112eded2bb7dcd5
djm@openbsd.org [Sun, 15 Jan 2023 23:05:32 +0000 (23:05 +0000)]
upstream: update OpenSSH's
Ed25519 code to the last version of SUPERCOP
(
20221122 ) and change the import approach to the same one we use for
Streamlined NTRUPrime: use a shell script to extract the bits we need from
SUPERCOP, make some minor adjustments and squish them all into a single file.
ok tb@ tobhe@
OpenBSD-Commit-ID:
1bc0fd624cb6af440905b8ba74ac7c03311b8e3b
Darren Tucker [Sat, 14 Jan 2023 11:02:44 +0000 (22:02 +1100)]
Allow writev is seccomp sandbox.
This seems to be used by recent glibcs at least in some configurations.
From bz#3512, ok djm@
dtucker@openbsd.org [Sat, 14 Jan 2023 10:05:54 +0000 (10:05 +0000)]
upstream: Shell syntax fix. From ren mingshuai vi github PR#369.
OpenBSD-Regress-ID:
6696b2eeefe128099fc3d7ea9f23252cc35156f9
dtucker@openbsd.org [Sat, 14 Jan 2023 09:57:08 +0000 (09:57 +0000)]
upstream: Instead of skipping the all-tokens test if we don't have
OpenSSL (since we use it to compute the hash), put the hash at the end and
just omit it if we don't have it. Prompted by bz#3521.
OpenBSD-Regress-ID:
c79ecba64250ed3b6417294b6c965e6b12ca5eea
jmc@openbsd.org [Fri, 13 Jan 2023 07:13:40 +0000 (07:13 +0000)]
upstream: fix double phrase in previous;
OpenBSD-Commit-ID:
671e6c8dc5e9230518b2bbfa143daaa88adc66c2
dtucker@openbsd.org [Fri, 13 Jan 2023 03:16:29 +0000 (03:16 +0000)]
upstream: Document "UserKnownHostsFile none". ok djm@
OpenBSD-Commit-ID:
f695742d39e34ecdcc3c861c3739a84648a4bce5
Darren Tucker [Fri, 13 Jan 2023 12:02:34 +0000 (23:02 +1100)]
Retry package installation 3 times.
When setting up the CI environment, retry package installation 3 times
before going up. Should help prevent spurious failures during
infrastructure issues.
dtucker@openbsd.org [Fri, 13 Jan 2023 04:47:34 +0000 (04:47 +0000)]
upstream: Move scp path setting to a helper function. The previous
commit to add scp to the test sshd's path causes the t-envpass test to fail
when the test scp is given using a fully qualified path. Put this in a
helper function and only call it from the scp tests.
OpenBSD-Regress-ID:
7533dc1c4265c1de716abb062957994195b36df4
dtucker@openbsd.org [Fri, 13 Jan 2023 04:23:00 +0000 (04:23 +0000)]
upstream: Add scp's path to test sshd's PATH.
If the scp we're testing is fully qualified (eg it's not in the system
PATH) then add its path to the under-test sshd's PATH so we can find
it. Prompted by bz#3518.
OpenBSD-Regress-ID:
7df4f5a0be3aa135495b7e5a6719d3cbc26cc4c0
Darren Tucker [Fri, 13 Jan 2023 04:49:48 +0000 (15:49 +1100)]
Remove skipping test when scp not in path.
An upcoming change renders this obsolete by adding scp's path to the
test sshd's PATH, and removing this first will make the subsequent sync
easier.
dtucker@openbsd.org [Fri, 13 Jan 2023 02:58:20 +0000 (02:58 +0000)]
upstream: Add a "Host" line to the output of ssh -G showing the
original host arg. Inspired by patch from vincent at bernat.ch via bz#3343,
ok djm@
OpenBSD-Commit-ID:
59c0f60a222113a44d0650cd394376e3beecc883
djm@openbsd.org [Fri, 13 Jan 2023 02:44:02 +0000 (02:44 +0000)]
upstream: avoid printf("%s", NULL) if using ssh
-oUserKnownHostsFile=none and a hostkey in one of the system known hosts file
changes; ok dtucker@
OpenBSD-Commit-ID:
7ca87614bfc6da491315536a7f2301434a9fe614
djm@openbsd.org [Wed, 11 Jan 2023 05:39:38 +0000 (05:39 +0000)]
upstream: clamp the minimum buffer lengths and number of inflight
requests too
OpenBSD-Commit-ID:
c4965f62fa0ba850940fd66ae3f60cf516bbcd56
djm@openbsd.org [Wed, 11 Jan 2023 05:36:50 +0000 (05:36 +0000)]
upstream: ignore bogus upload/download buffer lengths in the limits
extension
OpenBSD-Commit-ID:
c5b023e0954693ba9a5376e4280c739b5db575f8
djm@openbsd.org [Wed, 11 Jan 2023 02:13:52 +0000 (02:13 +0000)]
upstream: remove whitespace at EOL from code extracted from SUPERCOP
OpenBSD-Commit-ID:
1ec524ff2fbb9387d731601437c82008f35a60f4
djm@openbsd.org [Wed, 11 Jan 2023 00:51:27 +0000 (00:51 +0000)]
upstream: rewrite this test to use a multiplexed ssh session so we can
control its lifecycle without risk of race conditions; fixes some of the
Github integration tests for openssh-portable
OpenBSD-Regress-ID:
5451cad59ba0d43ae9eeda48ec80f54405fee969