]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
djm@openbsd.org [Sat, 25 Jan 2020 07:01:00 +0000 (07:01 +0000)]
upstream: weaken the language for what HashKnownHosts provides with
regards to known_hosts name privacy, it's not practical for this option to
offer any guarantee that hostnames cannot be recovered from a disclosed
known_hosts file (e.g. by brute force).
OpenBSD-Commit-ID:
13f1e3285f8acf7244e9770074296bcf446c6972
djm@openbsd.org [Sat, 25 Jan 2020 06:40:20 +0000 (06:40 +0000)]
upstream: the GatewayPorts vs -R listen address selection logic is
still confusing people, so add another comment explaining the special
handling of "localhost"; bz#3258
OpenBSD-Commit-ID:
e6bf0f0fbf1c7092bf0dbd9c6eab105970b5b53a
djm@openbsd.org [Sat, 25 Jan 2020 06:03:10 +0000 (06:03 +0000)]
upstream: mention that permitopen=/PermitOpen do no name to address
translation; prompted by bz3099
OpenBSD-Commit-ID:
0dda8e54d566b29855e76bebf9cfecce573f5c23
Damien Miller [Sat, 25 Jan 2020 05:30:22 +0000 (16:30 +1100)]
include tunnel device path in error message
djm@openbsd.org [Sat, 25 Jan 2020 04:48:26 +0000 (04:48 +0000)]
upstream: unrevert this:
> revision 1.217
> date: 2019/11/27 03:34:04; author: dtucker; state: Exp; lines: +5 -7; commitid: wkiMn49XJyjzoJIs;
> Make channel_id u_int32_t and remove unnecessary check and cast that were
> left over from the type conversion. Noted by t-hashida@amiya.co.jp in
> bz#3098, ok markus@ djm@
Darren was right the first time; ok dtucker@ "agreed" markus@
OpenBSD-Commit-ID:
641dd1b99a6bbd85b7160da462ae1be83432c7c8
dtucker@openbsd.org [Sat, 25 Jan 2020 02:57:53 +0000 (02:57 +0000)]
upstream: Move setting $NC into test-exec since it's now used by
multiple tests, and in -portable we use our own local copy to avoid
portability problems.
OpenBSD-Regress-ID:
ceb78445fcaac317bec2fc51b3f0d9589048c114
Darren Tucker [Sat, 25 Jan 2020 02:05:42 +0000 (13:05 +1100)]
Put EC key export inside OPENSSL_HAS_ECC.
Fixes link error when building against an OpenSSL that does not have
ECC.
dtucker@openbsd.org [Sat, 25 Jan 2020 00:27:56 +0000 (00:27 +0000)]
upstream: Wait a bit longer for the multiplex master to become ready
since on very slow hosts the current delay is not sufficient and the test
will fail.
OpenBSD-Regress-ID:
6d90c7475d67ac3a95610b64af700629ece51a48
dtucker@openbsd.org [Fri, 24 Jan 2020 10:08:17 +0000 (10:08 +0000)]
upstream: Add a connection test for proxycommand. This would have
caught the problem caused by ssh.c rev 1.507 wherein Host and Hostname were
swapped. Prompted by beck@
OpenBSD-Regress-ID:
d218500ae6aca4c479c27318fb5b09ebc00f7aae
djm@openbsd.org [Sat, 25 Jan 2020 00:22:31 +0000 (00:22 +0000)]
upstream: set UpdateKnownHosts=ask by default; bz#2894; ok
markus@
OpenBSD-Commit-ID:
f09cb3177f3a14c96428e14f347e976a8a531fee
djm@openbsd.org [Sat, 25 Jan 2020 00:21:08 +0000 (00:21 +0000)]
upstream: allow UpdateKnownHosts=yes to function when multiple
known_hosts files are in use. When updating host keys, ssh will now search
subsequent known_hosts files, but will add new/changed host keys to the first
specified file only. bz#2738
ok markus@
OpenBSD-Commit-ID:
6ded6d878a03e57d5aa20bab9c31f92e929dbc6c
djm@openbsd.org [Sat, 25 Jan 2020 00:06:48 +0000 (00:06 +0000)]
upstream: process security key provider via realpath() in agent,
avoids malicious client from being able to cause agent to load arbitrary
libraries into ssh-sk-helper.
reported by puck AT puckipedia.com; ok markus
OpenBSD-Commit-ID:
1086643df1b7eee4870825c687cf0c26a6145d1c
djm@openbsd.org [Sat, 25 Jan 2020 00:03:36 +0000 (00:03 +0000)]
upstream: expose PKCS#11 key labels/X.509 subjects as comments
Extract the key label or X.509 subject string when PKCS#11 keys
are retrieved from the token and plumb this through to places where
it may be used as a comment.
based on https://github.com/openssh/openssh-portable/pull/138
by Danielle Church
feedback and ok markus@
OpenBSD-Commit-ID:
cae1fda10d9e10971dea29520916e27cfec7ca35
djm@openbsd.org [Fri, 24 Jan 2020 23:56:01 +0000 (23:56 +0000)]
upstream: tweak proctitle to include sshd arguments, as these are
frequently used to distinguish between multiple independent instances of the
server. New proctitle looks like this:
$ pgrep -lf sshd
12844 sshd: /usr/sbin/sshd -f /etc/ssh/sshd_config [listener] 0 of 10-100 startups
requested by sthen@ and aja@; ok aja@
OpenBSD-Commit-ID:
cf235a561c655a3524a82003cf7244ecb48ccc1e
djm@openbsd.org [Fri, 24 Jan 2020 23:54:40 +0000 (23:54 +0000)]
upstream: add xextendf() to extend a string with a format
(reallocating as necessary). ok aja@ as part of a larger diff
OpenBSD-Commit-ID:
30796b50d330b3e0e201747fe40cdf9aa70a77f9
djm@openbsd.org [Fri, 24 Jan 2020 05:33:01 +0000 (05:33 +0000)]
upstream: minor tweaks to ssh-keygen -Y find-principals:
emit matched principals one per line to stdout rather than as comma-
separated and with a free-text preamble (easy confusion opportunity)
emit "not found" error to stderr
fix up argument testing for -Y operations and improve error message for
unsupported operations
OpenBSD-Commit-ID:
3d9c9a671ab07fc04a48f543edfa85eae77da69c
djm@openbsd.org [Fri, 24 Jan 2020 00:28:57 +0000 (00:28 +0000)]
upstream: remove ssh-rsa (SHA1) from the list of allowed CA
signature algorithms ok markus
OpenBSD-Commit-ID:
da3481fca8c81e6951f319a86b7be67502237f57
djm@openbsd.org [Fri, 24 Jan 2020 00:27:04 +0000 (00:27 +0000)]
upstream: when signing a certificate with an RSA key, default to
a safe signature algorithm (rsa-sha-512) if not is explicitly specified by
the user; ok markus@
OpenBSD-Commit-ID:
e05f638f0be6c0266e1d3d799716b461011e83a9
djm@openbsd.org [Fri, 24 Jan 2020 00:00:31 +0000 (00:00 +0000)]
upstream: allow PEM export of DSA and ECDSA keys; bz3091, patch
from Jakub Jelen ok markus@
OpenBSD-Commit-ID:
a58edec8b9f07acab4b962a71a5125830d321b51
djm@openbsd.org [Thu, 23 Jan 2020 23:31:52 +0000 (23:31 +0000)]
upstream: ssh-keygen -Y find-principals fixes based on feedback
from Markus:
use "principals" instead of principal, as allowed_signers lines may list
multiple.
When the signing key is a certificate, emit only principals that match
the certificate principal list.
NB. the command -Y name changes: "find-principal" => "find-principals"
ok markus@
OpenBSD-Commit-ID:
ab575946ff9a55624cd4e811bfd338bf3b1d0faf
dtucker@openbsd.org [Fri, 24 Jan 2020 01:29:23 +0000 (01:29 +0000)]
upstream: Do not warn about permissions on symlinks.
OpenBSD-Regress-ID:
339d4cbae224bd8743ffad9c3afb0cf3cb66c357
dtucker@openbsd.org [Thu, 23 Jan 2020 11:19:12 +0000 (11:19 +0000)]
upstream: Handle zlib compression being disabled now that it's
optional.
OpenBSD-Regress-ID:
0af4fbc5168e62f89d0350de524bff1cb00e707a
dtucker@openbsd.org [Thu, 23 Jan 2020 10:53:04 +0000 (10:53 +0000)]
upstream: Fix typo in comment.
OpenBSD-Commit-ID:
d1d7a6553208bf439378fd1cf686a828aceb353a
dtucker@openbsd.org [Thu, 23 Jan 2020 10:19:59 +0000 (10:19 +0000)]
upstream: When checking for unsafe directories, ignore non-directories
(ie symlinks, where permissions are not relevant).
OpenBSD-Regress-ID:
fb6cfc8b022becb62b2dcb99ed3f072b3326e501
Darren Tucker [Thu, 23 Jan 2020 11:17:24 +0000 (22:17 +1100)]
zlib is now optional.
Darren Tucker [Thu, 23 Jan 2020 11:16:51 +0000 (22:16 +1100)]
Plumb WITH_ZLIB into configure.
This allows zlib support to be disabled by ./configure --without-zlib.
dtucker@openbsd.org [Thu, 23 Jan 2020 10:24:29 +0000 (10:24 +0000)]
upstream: Make zlib optional. This adds a "ZLIB" build time option
that allows building without zlib compression and associated options. With
feedback from markus@, ok djm@
OpenBSD-Commit-ID:
44c6e1133a90fd15a3aa865bdedc53bab28b7910
djm@openbsd.org [Thu, 23 Jan 2020 07:54:04 +0000 (07:54 +0000)]
upstream: remove trailing period characters from pub/priv key
pathnames - they make them needlessly more difficult to cut and paste without
error; ok markus@ & dtucker@
OpenBSD-Commit-ID:
abdcfd1a5723fcac0711feee7665edc66ae2335a
Darren Tucker [Thu, 23 Jan 2020 10:06:45 +0000 (21:06 +1100)]
Fix a couple of mysig_t leftovers.
Darren Tucker [Thu, 23 Jan 2020 07:55:24 +0000 (18:55 +1100)]
Remove mysignal wrapper.
We switched the main code to use sigaction(), so the wrapper is no
longer used.
jmc@openbsd.org [Thu, 23 Jan 2020 07:16:38 +0000 (07:16 +0000)]
upstream: new sentence, new line;
OpenBSD-Commit-ID:
b6c3f2f36ec77e99198619b38a9f146655281925
dtucker@openbsd.org [Thu, 23 Jan 2020 07:10:22 +0000 (07:10 +0000)]
upstream: Replace all calls to signal(2) with a wrapper around
sigaction(2). This wrapper blocks all other signals during the handler
preventing races between handlers, and sets SA_RESTART which should reduce
the potential for short read/write operations.
OpenBSD-Commit-ID:
5e047663fd77a40d7b07bdabe68529df51fd2519
djm@openbsd.org [Thu, 23 Jan 2020 04:54:34 +0000 (04:54 +0000)]
upstream: missing header change from previous; spotted by dtucker@
OpenBSD-Commit-ID:
321ce74c0a5bbd0f02fa3f20cb5cf2a952c6b96f
dtucker@openbsd.org [Thu, 23 Jan 2020 03:42:41 +0000 (03:42 +0000)]
upstream: Check for and warn about StrictModes permission problems. ok tb@
OpenBSD-Regress-ID:
4841704ccdee50ee7efc6035bc686695c6ac2991
dtucker@openbsd.org [Thu, 23 Jan 2020 03:35:07 +0000 (03:35 +0000)]
upstream: Also test PuTTY chacha20.
OpenBSD-Regress-ID:
7af6a0e8763b05f1f8eee6bca5f31fcb16151040
dtucker@openbsd.org [Thu, 23 Jan 2020 03:24:38 +0000 (03:24 +0000)]
upstream: Also test PuTTY ecdh kex methods.
OpenBSD-Regress-ID:
ec4017dce612131842398a03e93007a869c2c133
dtucker@openbsd.org [Thu, 23 Jan 2020 02:46:49 +0000 (02:46 +0000)]
upstream: Remove unsupported algorithms from list of defaults at run
time and remove ifdef and distinct settings for OPENSSL=no case.
This will make things much simpler for -portable where the exact set
of algos depends on the configuration of both OpenSSH and the libcrypto
it's linked against (if any). ok djm@
OpenBSD-Commit-ID:
e0116d0183dcafc7a9c40ba5fe9127805c5dfdd2
djm@openbsd.org [Thu, 23 Jan 2020 02:43:48 +0000 (02:43 +0000)]
upstream: add a new signature operations "find-principal" to look
up the principal associated with a signature from an allowed-signers file.
Work by Sebastian Kinne; ok dtucker@
OpenBSD-Commit-ID:
6f782cc7e18e38fcfafa62af53246a1dcfe74e5d
dtucker@openbsd.org [Wed, 22 Jan 2020 07:38:30 +0000 (07:38 +0000)]
upstream: Ignore whitespace when checking explict fingerprint.
When confirming a host key using the fingerprint itself, ignore leading and
trailing whitespace. ok deraadt@ djm@
OpenBSD-Commit-ID:
cafd7f803bbdcd40c3a8f8f1a77747e6b6d8c011
dtucker@openbsd.org [Wed, 22 Jan 2020 07:31:27 +0000 (07:31 +0000)]
upstream: Increase keyscan timeout from default. On slow hosts 3
concurrent keyscans can hit the default 5 second timeout, so increase to 15
seconds.
OpenBSD-Regress-ID:
16383dec166af369b7fb9948572856f5d544c93f
tedu@openbsd.org [Wed, 22 Jan 2020 04:58:23 +0000 (04:58 +0000)]
upstream: remove diffie-hellman-group14-sha1 from default kex to
see what happens. general mostly ok
OpenBSD-Commit-ID:
216b7b8462d2ef5f4531f26cb2cb839b2153dad9
claudio@openbsd.org [Wed, 22 Jan 2020 04:51:51 +0000 (04:51 +0000)]
upstream: For ssh-keygen -lF only add a space after key fingerprint
when there is a comment. This makes copy-paste of fingerprints into ssh
easier. OK djm@
OpenBSD-Commit-ID:
fa01d95624f65c1eb4dc7c575d20d77c78010dfd
djm@openbsd.org [Wed, 22 Jan 2020 04:49:16 +0000 (04:49 +0000)]
upstream: some __func__ and strerror(errno) here; no functional
change
OpenBSD-Commit-ID:
6c3ddd5f848b99ea560b31d3fba99ceed66cef37
djm@openbsd.org [Wed, 22 Jan 2020 02:25:21 +0000 (02:25 +0000)]
upstream: factor out parsing of allowed-signers lines
OpenBSD-Commit-ID:
85ee6aeff608371826019ea85e55bfa87f79d06e
Damien Miller [Tue, 21 Jan 2020 23:30:13 +0000 (10:30 +1100)]
unbreak fuzzer support for recent ssh-sk.h changes
djm@openbsd.org [Tue, 21 Jan 2020 22:39:57 +0000 (22:39 +0000)]
upstream: expose the number of currently-authenticating connections
along with the MaxStartups limit in the proctitle; suggestion from Philipp
Marek, w/ feedback from Craig Miskell ok dtucker@
OpenBSD-Commit-ID:
a4a6db2dc1641a5df8eddf7d6652176e359dffb3
naddy@openbsd.org [Tue, 21 Jan 2020 12:40:04 +0000 (12:40 +0000)]
upstream: document the default value of the ControlPersist option;
ok dtucker@ djm@
OpenBSD-Commit-ID:
0788e7f2b5a9d4e36d3d2ab378f73329320fef66
Damien Miller [Tue, 21 Jan 2020 22:28:32 +0000 (09:28 +1100)]
remove accidental change in
f8c11461
djm@openbsd.org [Tue, 21 Jan 2020 11:06:09 +0000 (11:06 +0000)]
upstream: don't #ifdef out the KRL code when compiling without
libcrypto support; it works just fine and disabling it breaks a few tests. ok
dtucker@
OpenBSD-Commit-ID:
65f6272c4241eb4b04de78b012fe98b2b555ad44
djm@openbsd.org [Tue, 21 Jan 2020 08:06:27 +0000 (08:06 +0000)]
upstream: pass SSH_SK_HELPER explicitly past $SUDO to avoid it getting
cleared; with dtucker@
OpenBSD-Regress-ID:
03178a0580324bf0dff28f7eac6c3edbc5407f8e
djm@openbsd.org [Tue, 21 Jan 2020 07:07:31 +0000 (07:07 +0000)]
upstream: check access(ssh-sk-helper, X_OK) to provide friendly
error message for misconfigured helper paths
OpenBSD-Commit-ID:
061bcc262155d12e726305c91394ac0aaf1f8341
dtucker@openbsd.org [Tue, 21 Jan 2020 06:09:56 +0000 (06:09 +0000)]
upstream: Document sntrup4591761x25519-sha512@tinyssh.org. Patch
from jtesta@positronsecurity.com via github PR#151.
OpenBSD-Commit-ID:
f3d48168623045c258245c340a5a2af7dbb74edc
djm@openbsd.org [Tue, 21 Jan 2020 05:56:56 +0000 (05:56 +0000)]
upstream: fix ssh-keygen not displaying authenticator touch
prompt; reported by jmc@
OpenBSD-Commit-ID:
04d4f582fc194eb3897ebcbfe286c49958ba2859
djm@openbsd.org [Tue, 21 Jan 2020 05:56:27 +0000 (05:56 +0000)]
upstream: a little more verbosity in sign_and_send_pubkey() debug
messages
OpenBSD-Commit-ID:
6da47a0e6373f6683006f49bc2a516d197655508
naddy@openbsd.org [Sat, 18 Jan 2020 21:16:43 +0000 (21:16 +0000)]
upstream: one more replacement "(security) key" -> "(FIDO)
authenticator"
OpenBSD-Commit-ID:
031bca03c1d1f878ab929facd561911f1bc68dfd
naddy@openbsd.org [Sat, 18 Jan 2020 15:45:41 +0000 (15:45 +0000)]
upstream: undo merge error and replace the term "security key"
again
OpenBSD-Commit-ID:
341749062c089cc360a7877e9ee3a887aecde395
naddy@openbsd.org [Fri, 17 Jan 2020 20:13:47 +0000 (20:13 +0000)]
upstream: Document loading of resident keys from a FIDO
authenticator.
* Rename -O to -K to keep "-O option" available.
* Document -K.
* Trim usage() message down to synopsis, like all other commands.
ok markus@
OpenBSD-Commit-ID:
015c2c4b28f8e19107adc80351b44b23bca4c78a
naddy@openbsd.org [Tue, 14 Jan 2020 15:07:30 +0000 (15:07 +0000)]
upstream: sync ssh-keygen.1 and ssh-keygen's usage() with each
other and reality ok markus@
OpenBSD-Commit-ID:
cdf64454f2c3604c25977c944e5b6262a3bcce92
naddy@openbsd.org [Sat, 11 Jan 2020 16:23:10 +0000 (16:23 +0000)]
upstream: revise the fix for reversed arguments on
expand_proxy_command()
Always put 'host' before 'host_arg' for consistency. ok markus@ djm@
OpenBSD-Commit-ID:
1ba5b25472779f1b1957295fcc6907bb961472a3
djm@openbsd.org [Fri, 10 Jan 2020 23:43:26 +0000 (23:43 +0000)]
upstream: pass the log-on-stderr flag and log level through to
ssh-sk-helper, making debugging a bit easier. ok markus@
OpenBSD-Commit-ID:
2e7aea6bf5770d3f38b7c7bba891069256c5a49a
Damien Miller [Tue, 21 Jan 2020 01:32:16 +0000 (12:32 +1100)]
Wrap copy_environment_blacklist() in #ifdef
It's only needed for USE_PAM or HAVE_CYGWIN cases and will cause compiler
warnings otherwise.
Damien Miller [Tue, 21 Jan 2020 01:20:05 +0000 (12:20 +1100)]
depend
Ruben Kerkhof [Mon, 20 Jan 2020 10:56:48 +0000 (11:56 +0100)]
Fix missing prototype warning for copy_environment
This function is only used in this file, and only on Cygwin, so make
it static and hide it behind HAVE_CYGWIN. Prevents missing prototype
warning.
Ruben Kerkhof [Mon, 20 Jan 2020 12:58:11 +0000 (13:58 +0100)]
configure.ac: fix ldns test
When running ./configure --with-ldns, if ldns-config cannot be found, we
add -Iyes/include to CPPFLAGS and -Lyes/lib to LDFLAGS. Fix that.
Ruben Kerkhof [Mon, 20 Jan 2020 11:13:26 +0000 (12:13 +0100)]
Make sshpam_password_change_required static.
sshpam_password_change_required is only used in auth-pam.c, so make it
static to prevent a mising prototype warning.
Ruben Kerkhof [Mon, 20 Jan 2020 11:24:51 +0000 (12:24 +0100)]
sandbox-darwin.c: fix missing prototypes.
Include the right header just like the other sandbox files.
Fixes missing prototype warnings for ssh_sandbox_* functions.
Ruben Kerkhof [Mon, 20 Jan 2020 10:09:27 +0000 (11:09 +0100)]
Fix a few warnings when on Mac OS X.
Include stdlib.h for calloc, malloc, free and setenv.
Ruben Kerkhof [Mon, 20 Jan 2020 09:32:23 +0000 (10:32 +0100)]
Fix building without openssl.
This fixes the following when there are no openssl headers on the system:
ssh-ecdsa-sk.c:34:10: fatal error: 'openssl/bn.h' file not found
Ruben Kerkhof [Wed, 15 Jan 2020 15:08:55 +0000 (16:08 +0100)]
Add config.log to .gitignore
Ruben Kerkhof [Wed, 15 Jan 2020 15:16:31 +0000 (16:16 +0100)]
Fix typo in README.md, s/crytpo/crypto/
Darren Tucker [Wed, 15 Jan 2020 05:22:36 +0000 (16:22 +1100)]
Wrap stdint.h in ifdef HAVE_STDINT_H.
Darren Tucker [Tue, 14 Jan 2020 03:41:47 +0000 (14:41 +1100)]
Wrap stdint.h inside HAVE_STDINT_H.
Darren Tucker [Tue, 14 Jan 2020 03:26:41 +0000 (14:26 +1100)]
Include compat header for definitions.
Darren Tucker [Mon, 13 Jan 2020 22:42:52 +0000 (09:42 +1100)]
Improve search for 'struct timespec'.
Make struct timespec test consistent with existing timeval test.
Include time.h for timespec in compat header where required.
Darren Tucker [Tue, 14 Jan 2020 01:43:03 +0000 (12:43 +1100)]
Update depend to remove rmd160.h.
Darren Tucker [Mon, 13 Jan 2020 20:24:46 +0000 (07:24 +1100)]
Remove configure test & compat code for ripemd160.
RIPEMD160 support was removed upstream in 2017, however we still had
a configure test and compat code for it, so clean those up now.
djm@openbsd.org [Thu, 9 Jan 2020 03:28:38 +0000 (03:28 +0000)]
upstream: fix reversed arguments on expand_proxy_command(); spotted
by anton@
OpenBSD-Commit-ID:
db1c32478a01dfbc9c4db171de0f25907bea5775
jmc@openbsd.org [Mon, 6 Jan 2020 07:43:28 +0000 (07:43 +0000)]
upstream: put the fido options in a list, and tidy up the text a
little; ok djm
OpenBSD-Commit-ID:
491ce15ae52a88b7a6a2b3b6708a14b4aacdeebb
Jeremy Drake [Sat, 12 Oct 2019 01:31:05 +0000 (18:31 -0700)]
Deny (non-fatal) ipc in preauth privsep child.
As noted in openssh/openssh-portable#149, i386 does not have have
_NR_shmget etc. Instead, it has a single ipc syscall (see man 2 ipc,
https://linux.die.net/man/2/ipc). Add this syscall, if present, to the
list of syscalls that seccomp will deny non-fatally.
Khem Raj [Wed, 8 Jan 2020 00:26:45 +0000 (16:26 -0800)]
seccomp: Allow clock_gettime64() in sandbox.
This helps sshd accept connections on mips platforms with
upcoming glibc ( 2.31 )
djm@openbsd.org [Mon, 6 Jan 2020 02:39:30 +0000 (02:39 +0000)]
upstream: missing else in check_enroll_options()
OpenBSD-Commit-ID:
e058fb918fda56ddbbf0bee910101004cec421d4
djm@openbsd.org [Mon, 6 Jan 2020 02:24:28 +0000 (02:24 +0000)]
upstream: fix error message
OpenBSD-Commit-ID:
1eb52025658eb78ea6223181e552862198d3d505
djm@openbsd.org [Mon, 6 Jan 2020 02:07:50 +0000 (02:07 +0000)]
upstream: adapt sk-dummy to SK API changes
also, make it pull prototypes directly from sk-api.c and #error
if the expected version changes. This will make any future regress
test breakage because of SK API changes much more apparent
OpenBSD-Regress-ID:
79b07055de4feb988e31da71a89051ad5969829d
djm@openbsd.org [Mon, 6 Jan 2020 02:00:46 +0000 (02:00 +0000)]
upstream: Extends the SK API to accept a set of key/value options
for all operations. These are intended to future-proof the API a little by
making it easier to specify additional fields for without having to change
the API version for each.
At present, only two options are defined: one to explicitly specify
the device for an operation (rather than accepting the middleware's
autoselection) and another to specify the FIDO2 username that may
be used when generating a resident key. These new options may be
invoked at key generation time via ssh-keygen -O
This also implements a suggestion from Markus to avoid "int" in favour
of uint32_t for the algorithm argument in the API, to make implementation
of ssh-sk-client/helper a little easier.
feedback, fixes and ok markus@
OpenBSD-Commit-ID:
973ce11704609022ab36abbdeb6bc23c8001eabc
beck@openbsd.org [Sun, 5 Jan 2020 16:28:22 +0000 (16:28 +0000)]
upstream: fix CanonicalizeHostname, broken by rev 1.507
Issue noticed and reported by Pierre-Olivier Martel <pom@apple.com>
ok dtucker@ markus@ djm@
OpenBSD-Commit-ID:
749f3168ec520609c35b0c4e1984e5fa47f16094
Darren Tucker [Sun, 5 Jan 2020 22:02:53 +0000 (09:02 +1100)]
Fix typo: 'you' -> 'your'.
bz#3108 from jmckitrick@gmail.com.
Darren Tucker [Sun, 5 Jan 2020 21:56:46 +0000 (08:56 +1100)]
Remove auth-skey.c.
S/Key support was removed in OpenSSH 7.8 but this file was missed.
jmc@openbsd.org [Fri, 3 Jan 2020 07:33:33 +0000 (07:33 +0000)]
upstream: the download resident keys option is -K (upper) not -k
(lower); ok djm
OpenBSD-Commit-ID:
71dc28a3e1fa7c553844abc508845bcf5766e091
djm@openbsd.org [Fri, 3 Jan 2020 03:02:26 +0000 (03:02 +0000)]
upstream: what bozo decided to use 2020 as a future date in a regress
test?
OpenBSD-Regress-ID:
3b953df5a7e14081ff6cf495d4e8d40e153cbc3a
djm@openbsd.org [Fri, 3 Jan 2020 02:46:19 +0000 (02:46 +0000)]
upstream: implement recent SK API change to support resident keys
and PIN prompting in the dummy middleware that we use for the tests. Should
fix breakage spotted by dtucker@
OpenBSD-Regress-ID:
379cf9eabfea57aaf7f3f59dafde59889566c484
dtucker@openbsd.org [Thu, 2 Jan 2020 13:25:38 +0000 (13:25 +0000)]
upstream: Update keygen moduli screen test to match recent command
line option change to ssh-keygen(1).
OpenBSD-Regress-ID:
744a72755004377e9669b662c13c6aa9ead8a0c3
djm@openbsd.org [Thu, 2 Jan 2020 22:40:09 +0000 (22:40 +0000)]
upstream: ability to download FIDO2 resident keys from a token via
"ssh-keygen -K". This will save public/private keys into the current
directory.
This is handy if you move a token between hosts.
feedback & ok markus@
OpenBSD-Commit-ID:
d57c1f9802f7850f00a117a1d36682a6c6d10da6
djm@openbsd.org [Thu, 2 Jan 2020 22:38:33 +0000 (22:38 +0000)]
upstream: add sshkey_save_public(), to save a public key; ok
markus@
OpenBSD-Commit-ID:
5d6f96a966d10d7fa689ff9aa9e1d6767ad5a076
jmc@openbsd.org [Mon, 30 Dec 2019 16:10:00 +0000 (16:10 +0000)]
upstream: simplify the list for moduli options - no need for
-compact;
OpenBSD-Commit-ID:
6492c72280482c6d072be46236b365cb359fc280
Damien Miller [Thu, 2 Jan 2020 02:41:31 +0000 (13:41 +1100)]
ssh-sk-null.cc needs extern "C" {}
Damien Miller [Wed, 1 Jan 2020 23:56:29 +0000 (10:56 +1100)]
add dummy ssh-sk API for linking with fuzzers
Damien Miller [Mon, 30 Dec 2019 10:04:09 +0000 (21:04 +1100)]
refresh depend
djm@openbsd.org [Mon, 30 Dec 2019 09:49:52 +0000 (09:49 +0000)]
upstream: Remove the -x option currently used for
FIDO/U2F-specific key flags. Instead these flags may be specified via -O.
ok markus@
OpenBSD-Commit-ID:
f23ebde2a8a7e1bf860a51055a711cffb8c328c1
djm@openbsd.org [Mon, 30 Dec 2019 09:25:29 +0000 (09:25 +0000)]
upstream: document SK API changes in PROTOCOL.u2f
ok markus@
OpenBSD-Commit-ID:
52622363c103a3c4d3d546050480ffe978a32186
djm@openbsd.org [Mon, 30 Dec 2019 09:24:45 +0000 (09:24 +0000)]
upstream: translate and return error codes; retry on bad PIN
Define some well-known error codes in the SK API and pass
them back via ssh-sk-helper.
Use the new "wrong PIN" error code to retry PIN prompting during
ssh-keygen of resident keys.
feedback and ok markus@
OpenBSD-Commit-ID:
9663c6a2bb7a0bc8deaccc6c30d9a2983b481620