]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
6 years agoupstream: weaken the language for what HashKnownHosts provides with
djm@openbsd.org [Sat, 25 Jan 2020 07:01:00 +0000 (07:01 +0000)] 
upstream: weaken the language for what HashKnownHosts provides with

regards to known_hosts name privacy, it's not practical for this option to
offer any guarantee that hostnames cannot be recovered from a disclosed
known_hosts file (e.g. by brute force).

OpenBSD-Commit-ID: 13f1e3285f8acf7244e9770074296bcf446c6972

6 years agoupstream: the GatewayPorts vs -R listen address selection logic is
djm@openbsd.org [Sat, 25 Jan 2020 06:40:20 +0000 (06:40 +0000)] 
upstream: the GatewayPorts vs -R listen address selection logic is

still confusing people, so add another comment explaining the special
handling of "localhost"; bz#3258

OpenBSD-Commit-ID: e6bf0f0fbf1c7092bf0dbd9c6eab105970b5b53a

6 years agoupstream: mention that permitopen=/PermitOpen do no name to address
djm@openbsd.org [Sat, 25 Jan 2020 06:03:10 +0000 (06:03 +0000)] 
upstream: mention that permitopen=/PermitOpen do no name to address

translation; prompted by bz3099

OpenBSD-Commit-ID: 0dda8e54d566b29855e76bebf9cfecce573f5c23

6 years agoinclude tunnel device path in error message
Damien Miller [Sat, 25 Jan 2020 05:30:22 +0000 (16:30 +1100)] 
include tunnel device path in error message

6 years agoupstream: unrevert this:
djm@openbsd.org [Sat, 25 Jan 2020 04:48:26 +0000 (04:48 +0000)] 
upstream: unrevert this:

> revision 1.217
> date: 2019/11/27 03:34:04;  author: dtucker;  state: Exp;  lines: +5 -7;  commitid: wkiMn49XJyjzoJIs;
> Make channel_id u_int32_t and remove unnecessary check and cast that were
> left over from the type conversion.  Noted by t-hashida@amiya.co.jp in
> bz#3098, ok markus@ djm@

Darren was right the first time; ok dtucker@ "agreed" markus@

OpenBSD-Commit-ID: 641dd1b99a6bbd85b7160da462ae1be83432c7c8

6 years agoupstream: Move setting $NC into test-exec since it's now used by
dtucker@openbsd.org [Sat, 25 Jan 2020 02:57:53 +0000 (02:57 +0000)] 
upstream: Move setting $NC into test-exec since it's now used by

multiple tests, and in -portable we use our own local copy to avoid
portability problems.

OpenBSD-Regress-ID: ceb78445fcaac317bec2fc51b3f0d9589048c114

6 years agoPut EC key export inside OPENSSL_HAS_ECC.
Darren Tucker [Sat, 25 Jan 2020 02:05:42 +0000 (13:05 +1100)] 
Put EC key export inside OPENSSL_HAS_ECC.

Fixes link error when building against an OpenSSL that does not have
ECC.

6 years agoupstream: Wait a bit longer for the multiplex master to become ready
dtucker@openbsd.org [Sat, 25 Jan 2020 00:27:56 +0000 (00:27 +0000)] 
upstream: Wait a bit longer for the multiplex master to become ready

since on very slow hosts the current delay is not sufficient and the test
will fail.

OpenBSD-Regress-ID: 6d90c7475d67ac3a95610b64af700629ece51a48

6 years agoupstream: Add a connection test for proxycommand. This would have
dtucker@openbsd.org [Fri, 24 Jan 2020 10:08:17 +0000 (10:08 +0000)] 
upstream: Add a connection test for proxycommand. This would have

caught the problem caused by ssh.c rev 1.507 wherein Host and Hostname were
swapped.  Prompted by beck@

OpenBSD-Regress-ID: d218500ae6aca4c479c27318fb5b09ebc00f7aae

6 years agoupstream: set UpdateKnownHosts=ask by default; bz#2894; ok
djm@openbsd.org [Sat, 25 Jan 2020 00:22:31 +0000 (00:22 +0000)] 
upstream: set UpdateKnownHosts=ask by default; bz#2894; ok

markus@

OpenBSD-Commit-ID: f09cb3177f3a14c96428e14f347e976a8a531fee

6 years agoupstream: allow UpdateKnownHosts=yes to function when multiple
djm@openbsd.org [Sat, 25 Jan 2020 00:21:08 +0000 (00:21 +0000)] 
upstream: allow UpdateKnownHosts=yes to function when multiple

known_hosts files are in use. When updating host keys, ssh will now search
subsequent known_hosts files, but will add new/changed host keys to the first
specified file only. bz#2738

ok markus@

OpenBSD-Commit-ID: 6ded6d878a03e57d5aa20bab9c31f92e929dbc6c

6 years agoupstream: process security key provider via realpath() in agent,
djm@openbsd.org [Sat, 25 Jan 2020 00:06:48 +0000 (00:06 +0000)] 
upstream: process security key provider via realpath() in agent,

avoids malicious client from being able to cause agent to load arbitrary
libraries into ssh-sk-helper.

reported by puck AT puckipedia.com; ok markus

OpenBSD-Commit-ID: 1086643df1b7eee4870825c687cf0c26a6145d1c

6 years agoupstream: expose PKCS#11 key labels/X.509 subjects as comments
djm@openbsd.org [Sat, 25 Jan 2020 00:03:36 +0000 (00:03 +0000)] 
upstream: expose PKCS#11 key labels/X.509 subjects as comments

Extract the key label or X.509 subject string when PKCS#11 keys
are retrieved from the token and plumb this through to places where
it may be used as a comment.

based on https://github.com/openssh/openssh-portable/pull/138
by Danielle Church

feedback and ok markus@

OpenBSD-Commit-ID: cae1fda10d9e10971dea29520916e27cfec7ca35

6 years agoupstream: tweak proctitle to include sshd arguments, as these are
djm@openbsd.org [Fri, 24 Jan 2020 23:56:01 +0000 (23:56 +0000)] 
upstream: tweak proctitle to include sshd arguments, as these are

frequently used to distinguish between multiple independent instances of the
server. New proctitle looks like this:

$ pgrep -lf sshd
12844 sshd: /usr/sbin/sshd -f /etc/ssh/sshd_config [listener] 0 of 10-100 startups

requested by sthen@ and aja@; ok aja@

OpenBSD-Commit-ID: cf235a561c655a3524a82003cf7244ecb48ccc1e

6 years agoupstream: add xextendf() to extend a string with a format
djm@openbsd.org [Fri, 24 Jan 2020 23:54:40 +0000 (23:54 +0000)] 
upstream: add xextendf() to extend a string with a format

(reallocating as necessary). ok aja@ as part of a larger diff

OpenBSD-Commit-ID: 30796b50d330b3e0e201747fe40cdf9aa70a77f9

6 years agoupstream: minor tweaks to ssh-keygen -Y find-principals:
djm@openbsd.org [Fri, 24 Jan 2020 05:33:01 +0000 (05:33 +0000)] 
upstream: minor tweaks to ssh-keygen -Y find-principals:

emit matched principals one per line to stdout rather than as comma-
separated and with a free-text preamble (easy confusion opportunity)

emit "not found" error to stderr

fix up argument testing for -Y operations and improve error message for
unsupported operations

OpenBSD-Commit-ID: 3d9c9a671ab07fc04a48f543edfa85eae77da69c

6 years agoupstream: remove ssh-rsa (SHA1) from the list of allowed CA
djm@openbsd.org [Fri, 24 Jan 2020 00:28:57 +0000 (00:28 +0000)] 
upstream: remove ssh-rsa (SHA1) from the list of allowed CA

signature algorithms ok markus

OpenBSD-Commit-ID: da3481fca8c81e6951f319a86b7be67502237f57

6 years agoupstream: when signing a certificate with an RSA key, default to
djm@openbsd.org [Fri, 24 Jan 2020 00:27:04 +0000 (00:27 +0000)] 
upstream: when signing a certificate with an RSA key, default to

a safe signature algorithm (rsa-sha-512) if not is explicitly specified by
the user; ok markus@

OpenBSD-Commit-ID: e05f638f0be6c0266e1d3d799716b461011e83a9

6 years agoupstream: allow PEM export of DSA and ECDSA keys; bz3091, patch
djm@openbsd.org [Fri, 24 Jan 2020 00:00:31 +0000 (00:00 +0000)] 
upstream: allow PEM export of DSA and ECDSA keys; bz3091, patch

from Jakub Jelen ok markus@

OpenBSD-Commit-ID: a58edec8b9f07acab4b962a71a5125830d321b51

6 years agoupstream: ssh-keygen -Y find-principals fixes based on feedback
djm@openbsd.org [Thu, 23 Jan 2020 23:31:52 +0000 (23:31 +0000)] 
upstream: ssh-keygen -Y find-principals fixes based on feedback

from Markus:

use "principals" instead of principal, as allowed_signers lines may list
multiple.

When the signing key is a certificate, emit only principals that match
the certificate principal list.

NB. the command -Y name changes: "find-principal" => "find-principals"

ok markus@

OpenBSD-Commit-ID: ab575946ff9a55624cd4e811bfd338bf3b1d0faf

6 years agoupstream: Do not warn about permissions on symlinks.
dtucker@openbsd.org [Fri, 24 Jan 2020 01:29:23 +0000 (01:29 +0000)] 
upstream: Do not warn about permissions on symlinks.

OpenBSD-Regress-ID: 339d4cbae224bd8743ffad9c3afb0cf3cb66c357

6 years agoupstream: Handle zlib compression being disabled now that it's
dtucker@openbsd.org [Thu, 23 Jan 2020 11:19:12 +0000 (11:19 +0000)] 
upstream: Handle zlib compression being disabled now that it's

optional.

OpenBSD-Regress-ID: 0af4fbc5168e62f89d0350de524bff1cb00e707a

6 years agoupstream: Fix typo in comment.
dtucker@openbsd.org [Thu, 23 Jan 2020 10:53:04 +0000 (10:53 +0000)] 
upstream: Fix typo in comment.

OpenBSD-Commit-ID: d1d7a6553208bf439378fd1cf686a828aceb353a

6 years agoupstream: When checking for unsafe directories, ignore non-directories
dtucker@openbsd.org [Thu, 23 Jan 2020 10:19:59 +0000 (10:19 +0000)] 
upstream: When checking for unsafe directories, ignore non-directories

(ie symlinks, where permissions are not relevant).

OpenBSD-Regress-ID: fb6cfc8b022becb62b2dcb99ed3f072b3326e501

6 years agozlib is now optional.
Darren Tucker [Thu, 23 Jan 2020 11:17:24 +0000 (22:17 +1100)] 
zlib is now optional.

6 years agoPlumb WITH_ZLIB into configure.
Darren Tucker [Thu, 23 Jan 2020 11:16:51 +0000 (22:16 +1100)] 
Plumb WITH_ZLIB into configure.

This allows zlib support to be disabled by ./configure --without-zlib.

6 years agoupstream: Make zlib optional. This adds a "ZLIB" build time option
dtucker@openbsd.org [Thu, 23 Jan 2020 10:24:29 +0000 (10:24 +0000)] 
upstream: Make zlib optional. This adds a "ZLIB" build time option

that allows building without zlib compression and associated options.  With
feedback from markus@, ok djm@

OpenBSD-Commit-ID: 44c6e1133a90fd15a3aa865bdedc53bab28b7910

6 years agoupstream: remove trailing period characters from pub/priv key
djm@openbsd.org [Thu, 23 Jan 2020 07:54:04 +0000 (07:54 +0000)] 
upstream: remove trailing period characters from pub/priv key

pathnames - they make them needlessly more difficult to cut and paste without
error; ok markus@ & dtucker@

OpenBSD-Commit-ID: abdcfd1a5723fcac0711feee7665edc66ae2335a

6 years agoFix a couple of mysig_t leftovers.
Darren Tucker [Thu, 23 Jan 2020 10:06:45 +0000 (21:06 +1100)] 
Fix a couple of mysig_t leftovers.

6 years agoRemove mysignal wrapper.
Darren Tucker [Thu, 23 Jan 2020 07:55:24 +0000 (18:55 +1100)] 
Remove mysignal wrapper.

We switched the main code to use sigaction(), so the wrapper is no
longer used.

6 years agoupstream: new sentence, new line;
jmc@openbsd.org [Thu, 23 Jan 2020 07:16:38 +0000 (07:16 +0000)] 
upstream: new sentence, new line;

OpenBSD-Commit-ID: b6c3f2f36ec77e99198619b38a9f146655281925

6 years agoupstream: Replace all calls to signal(2) with a wrapper around
dtucker@openbsd.org [Thu, 23 Jan 2020 07:10:22 +0000 (07:10 +0000)] 
upstream: Replace all calls to signal(2) with a wrapper around

sigaction(2). This wrapper blocks all other signals during the handler
preventing races between handlers, and sets SA_RESTART which should reduce
the potential for short read/write operations.

OpenBSD-Commit-ID: 5e047663fd77a40d7b07bdabe68529df51fd2519

6 years agoupstream: missing header change from previous; spotted by dtucker@
djm@openbsd.org [Thu, 23 Jan 2020 04:54:34 +0000 (04:54 +0000)] 
upstream: missing header change from previous; spotted by dtucker@

OpenBSD-Commit-ID: 321ce74c0a5bbd0f02fa3f20cb5cf2a952c6b96f

6 years agoupstream: Check for and warn about StrictModes permission problems. ok tb@
dtucker@openbsd.org [Thu, 23 Jan 2020 03:42:41 +0000 (03:42 +0000)] 
upstream: Check for and warn about StrictModes permission problems. ok tb@

OpenBSD-Regress-ID: 4841704ccdee50ee7efc6035bc686695c6ac2991

6 years agoupstream: Also test PuTTY chacha20.
dtucker@openbsd.org [Thu, 23 Jan 2020 03:35:07 +0000 (03:35 +0000)] 
upstream: Also test PuTTY chacha20.

OpenBSD-Regress-ID: 7af6a0e8763b05f1f8eee6bca5f31fcb16151040

6 years agoupstream: Also test PuTTY ecdh kex methods.
dtucker@openbsd.org [Thu, 23 Jan 2020 03:24:38 +0000 (03:24 +0000)] 
upstream: Also test PuTTY ecdh kex methods.

OpenBSD-Regress-ID: ec4017dce612131842398a03e93007a869c2c133

6 years agoupstream: Remove unsupported algorithms from list of defaults at run
dtucker@openbsd.org [Thu, 23 Jan 2020 02:46:49 +0000 (02:46 +0000)] 
upstream: Remove unsupported algorithms from list of defaults at run

time and remove ifdef and distinct settings for OPENSSL=no case.

This will make things much simpler for -portable where the exact set
of algos depends on the configuration of both OpenSSH and the libcrypto
it's linked against (if any).  ok djm@

OpenBSD-Commit-ID: e0116d0183dcafc7a9c40ba5fe9127805c5dfdd2

6 years agoupstream: add a new signature operations "find-principal" to look
djm@openbsd.org [Thu, 23 Jan 2020 02:43:48 +0000 (02:43 +0000)] 
upstream: add a new signature operations "find-principal" to look

up the principal associated with a signature from an allowed-signers file.
Work by Sebastian Kinne; ok dtucker@

OpenBSD-Commit-ID: 6f782cc7e18e38fcfafa62af53246a1dcfe74e5d

6 years agoupstream: Ignore whitespace when checking explict fingerprint.
dtucker@openbsd.org [Wed, 22 Jan 2020 07:38:30 +0000 (07:38 +0000)] 
upstream: Ignore whitespace when checking explict fingerprint.

When confirming a host key using the fingerprint itself, ignore leading and
trailing whitespace. ok deraadt@ djm@

OpenBSD-Commit-ID: cafd7f803bbdcd40c3a8f8f1a77747e6b6d8c011

6 years agoupstream: Increase keyscan timeout from default. On slow hosts 3
dtucker@openbsd.org [Wed, 22 Jan 2020 07:31:27 +0000 (07:31 +0000)] 
upstream: Increase keyscan timeout from default. On slow hosts 3

concurrent keyscans can hit the default 5 second timeout, so increase to 15
seconds.

OpenBSD-Regress-ID: 16383dec166af369b7fb9948572856f5d544c93f

6 years agoupstream: remove diffie-hellman-group14-sha1 from default kex to
tedu@openbsd.org [Wed, 22 Jan 2020 04:58:23 +0000 (04:58 +0000)] 
upstream: remove diffie-hellman-group14-sha1 from default kex to

see what happens. general mostly ok

OpenBSD-Commit-ID: 216b7b8462d2ef5f4531f26cb2cb839b2153dad9

6 years agoupstream: For ssh-keygen -lF only add a space after key fingerprint
claudio@openbsd.org [Wed, 22 Jan 2020 04:51:51 +0000 (04:51 +0000)] 
upstream: For ssh-keygen -lF only add a space after key fingerprint

when there is a comment. This makes copy-paste of fingerprints into ssh
easier. OK djm@

OpenBSD-Commit-ID: fa01d95624f65c1eb4dc7c575d20d77c78010dfd

6 years agoupstream: some __func__ and strerror(errno) here; no functional
djm@openbsd.org [Wed, 22 Jan 2020 04:49:16 +0000 (04:49 +0000)] 
upstream: some __func__ and strerror(errno) here; no functional

change

OpenBSD-Commit-ID: 6c3ddd5f848b99ea560b31d3fba99ceed66cef37

6 years agoupstream: factor out parsing of allowed-signers lines
djm@openbsd.org [Wed, 22 Jan 2020 02:25:21 +0000 (02:25 +0000)] 
upstream: factor out parsing of allowed-signers lines

OpenBSD-Commit-ID: 85ee6aeff608371826019ea85e55bfa87f79d06e

6 years agounbreak fuzzer support for recent ssh-sk.h changes
Damien Miller [Tue, 21 Jan 2020 23:30:13 +0000 (10:30 +1100)] 
unbreak fuzzer support for recent ssh-sk.h changes

6 years agoupstream: expose the number of currently-authenticating connections
djm@openbsd.org [Tue, 21 Jan 2020 22:39:57 +0000 (22:39 +0000)] 
upstream: expose the number of currently-authenticating connections

along with the MaxStartups limit in the proctitle; suggestion from Philipp
Marek, w/ feedback from Craig Miskell ok dtucker@

OpenBSD-Commit-ID: a4a6db2dc1641a5df8eddf7d6652176e359dffb3

6 years agoupstream: document the default value of the ControlPersist option;
naddy@openbsd.org [Tue, 21 Jan 2020 12:40:04 +0000 (12:40 +0000)] 
upstream: document the default value of the ControlPersist option;

ok dtucker@ djm@

OpenBSD-Commit-ID: 0788e7f2b5a9d4e36d3d2ab378f73329320fef66

6 years agoremove accidental change in f8c11461
Damien Miller [Tue, 21 Jan 2020 22:28:32 +0000 (09:28 +1100)] 
remove accidental change in f8c11461

6 years agoupstream: don't #ifdef out the KRL code when compiling without
djm@openbsd.org [Tue, 21 Jan 2020 11:06:09 +0000 (11:06 +0000)] 
upstream: don't #ifdef out the KRL code when compiling without

libcrypto support; it works just fine and disabling it breaks a few tests. ok
dtucker@

OpenBSD-Commit-ID: 65f6272c4241eb4b04de78b012fe98b2b555ad44

6 years agoupstream: pass SSH_SK_HELPER explicitly past $SUDO to avoid it getting
djm@openbsd.org [Tue, 21 Jan 2020 08:06:27 +0000 (08:06 +0000)] 
upstream: pass SSH_SK_HELPER explicitly past $SUDO to avoid it getting

cleared; with dtucker@

OpenBSD-Regress-ID: 03178a0580324bf0dff28f7eac6c3edbc5407f8e

6 years agoupstream: check access(ssh-sk-helper, X_OK) to provide friendly
djm@openbsd.org [Tue, 21 Jan 2020 07:07:31 +0000 (07:07 +0000)] 
upstream: check access(ssh-sk-helper, X_OK) to provide friendly

error message for misconfigured helper paths

OpenBSD-Commit-ID: 061bcc262155d12e726305c91394ac0aaf1f8341

6 years agoupstream: Document sntrup4591761x25519-sha512@tinyssh.org. Patch
dtucker@openbsd.org [Tue, 21 Jan 2020 06:09:56 +0000 (06:09 +0000)] 
upstream: Document sntrup4591761x25519-sha512@tinyssh.org. Patch

from jtesta@positronsecurity.com via github PR#151.

OpenBSD-Commit-ID: f3d48168623045c258245c340a5a2af7dbb74edc

6 years agoupstream: fix ssh-keygen not displaying authenticator touch
djm@openbsd.org [Tue, 21 Jan 2020 05:56:56 +0000 (05:56 +0000)] 
upstream: fix ssh-keygen not displaying authenticator touch

prompt; reported by jmc@

OpenBSD-Commit-ID: 04d4f582fc194eb3897ebcbfe286c49958ba2859

6 years agoupstream: a little more verbosity in sign_and_send_pubkey() debug
djm@openbsd.org [Tue, 21 Jan 2020 05:56:27 +0000 (05:56 +0000)] 
upstream: a little more verbosity in sign_and_send_pubkey() debug

messages

OpenBSD-Commit-ID: 6da47a0e6373f6683006f49bc2a516d197655508

6 years agoupstream: one more replacement "(security) key" -> "(FIDO)
naddy@openbsd.org [Sat, 18 Jan 2020 21:16:43 +0000 (21:16 +0000)] 
upstream: one more replacement "(security) key" -> "(FIDO)

authenticator"

OpenBSD-Commit-ID: 031bca03c1d1f878ab929facd561911f1bc68dfd

6 years agoupstream: undo merge error and replace the term "security key"
naddy@openbsd.org [Sat, 18 Jan 2020 15:45:41 +0000 (15:45 +0000)] 
upstream: undo merge error and replace the term "security key"

again

OpenBSD-Commit-ID: 341749062c089cc360a7877e9ee3a887aecde395

6 years agoupstream: Document loading of resident keys from a FIDO
naddy@openbsd.org [Fri, 17 Jan 2020 20:13:47 +0000 (20:13 +0000)] 
upstream: Document loading of resident keys from a FIDO

authenticator.

* Rename -O to -K to keep "-O option" available.
* Document -K.
* Trim usage() message down to synopsis, like all other commands.

ok markus@

OpenBSD-Commit-ID: 015c2c4b28f8e19107adc80351b44b23bca4c78a

6 years agoupstream: sync ssh-keygen.1 and ssh-keygen's usage() with each
naddy@openbsd.org [Tue, 14 Jan 2020 15:07:30 +0000 (15:07 +0000)] 
upstream: sync ssh-keygen.1 and ssh-keygen's usage() with each

other and reality ok markus@

OpenBSD-Commit-ID: cdf64454f2c3604c25977c944e5b6262a3bcce92

6 years agoupstream: revise the fix for reversed arguments on
naddy@openbsd.org [Sat, 11 Jan 2020 16:23:10 +0000 (16:23 +0000)] 
upstream: revise the fix for reversed arguments on

expand_proxy_command()

Always put 'host' before 'host_arg' for consistency.  ok markus@ djm@

OpenBSD-Commit-ID: 1ba5b25472779f1b1957295fcc6907bb961472a3

6 years agoupstream: pass the log-on-stderr flag and log level through to
djm@openbsd.org [Fri, 10 Jan 2020 23:43:26 +0000 (23:43 +0000)] 
upstream: pass the log-on-stderr flag and log level through to

ssh-sk-helper, making debugging a bit easier. ok markus@

OpenBSD-Commit-ID: 2e7aea6bf5770d3f38b7c7bba891069256c5a49a

6 years agoWrap copy_environment_blacklist() in #ifdef
Damien Miller [Tue, 21 Jan 2020 01:32:16 +0000 (12:32 +1100)] 
Wrap copy_environment_blacklist() in #ifdef

It's only needed for USE_PAM or HAVE_CYGWIN cases and will cause compiler
warnings otherwise.

6 years agodepend
Damien Miller [Tue, 21 Jan 2020 01:20:05 +0000 (12:20 +1100)] 
depend

6 years agoFix missing prototype warning for copy_environment
Ruben Kerkhof [Mon, 20 Jan 2020 10:56:48 +0000 (11:56 +0100)] 
Fix missing prototype warning for copy_environment

This function is only used in this file, and only on Cygwin, so make
it static and hide it behind HAVE_CYGWIN.  Prevents missing prototype
warning.

6 years agoconfigure.ac: fix ldns test
Ruben Kerkhof [Mon, 20 Jan 2020 12:58:11 +0000 (13:58 +0100)] 
configure.ac: fix ldns test

When running ./configure --with-ldns, if ldns-config cannot be found, we
add -Iyes/include to CPPFLAGS and -Lyes/lib to LDFLAGS. Fix that.

6 years agoMake sshpam_password_change_required static.
Ruben Kerkhof [Mon, 20 Jan 2020 11:13:26 +0000 (12:13 +0100)] 
Make sshpam_password_change_required static.

sshpam_password_change_required is only used in auth-pam.c, so make it
static to prevent a mising prototype warning.

6 years agosandbox-darwin.c: fix missing prototypes.
Ruben Kerkhof [Mon, 20 Jan 2020 11:24:51 +0000 (12:24 +0100)] 
sandbox-darwin.c: fix missing prototypes.

Include the right header just like the other sandbox files.
Fixes missing prototype warnings for ssh_sandbox_* functions.

6 years agoFix a few warnings when on Mac OS X.
Ruben Kerkhof [Mon, 20 Jan 2020 10:09:27 +0000 (11:09 +0100)] 
Fix a few warnings when on Mac OS X.

Include stdlib.h for calloc, malloc, free and setenv.

6 years agoFix building without openssl.
Ruben Kerkhof [Mon, 20 Jan 2020 09:32:23 +0000 (10:32 +0100)] 
Fix building without openssl.

This fixes the following when there are no openssl headers on the system:
ssh-ecdsa-sk.c:34:10: fatal error: 'openssl/bn.h' file not found

6 years agoAdd config.log to .gitignore
Ruben Kerkhof [Wed, 15 Jan 2020 15:08:55 +0000 (16:08 +0100)] 
Add config.log to .gitignore

6 years agoFix typo in README.md, s/crytpo/crypto/
Ruben Kerkhof [Wed, 15 Jan 2020 15:16:31 +0000 (16:16 +0100)] 
Fix typo in README.md, s/crytpo/crypto/

6 years agoWrap stdint.h in ifdef HAVE_STDINT_H.
Darren Tucker [Wed, 15 Jan 2020 05:22:36 +0000 (16:22 +1100)] 
Wrap stdint.h in ifdef HAVE_STDINT_H.

6 years agoWrap stdint.h inside HAVE_STDINT_H. 162/head
Darren Tucker [Tue, 14 Jan 2020 03:41:47 +0000 (14:41 +1100)] 
Wrap stdint.h inside HAVE_STDINT_H.

6 years agoInclude compat header for definitions.
Darren Tucker [Tue, 14 Jan 2020 03:26:41 +0000 (14:26 +1100)] 
Include compat header for definitions.

6 years agoImprove search for 'struct timespec'.
Darren Tucker [Mon, 13 Jan 2020 22:42:52 +0000 (09:42 +1100)] 
Improve search for 'struct timespec'.

Make struct timespec test consistent with existing timeval test.
Include time.h for timespec in compat header where required.

6 years agoUpdate depend to remove rmd160.h.
Darren Tucker [Tue, 14 Jan 2020 01:43:03 +0000 (12:43 +1100)] 
Update depend to remove rmd160.h.

6 years agoRemove configure test & compat code for ripemd160.
Darren Tucker [Mon, 13 Jan 2020 20:24:46 +0000 (07:24 +1100)] 
Remove configure test & compat code for ripemd160.

RIPEMD160 support was removed upstream in 2017, however we still had
a configure test and compat code for it, so clean those up now.

6 years agoupstream: fix reversed arguments on expand_proxy_command(); spotted
djm@openbsd.org [Thu, 9 Jan 2020 03:28:38 +0000 (03:28 +0000)] 
upstream: fix reversed arguments on expand_proxy_command(); spotted

by anton@

OpenBSD-Commit-ID: db1c32478a01dfbc9c4db171de0f25907bea5775

6 years agoupstream: put the fido options in a list, and tidy up the text a
jmc@openbsd.org [Mon, 6 Jan 2020 07:43:28 +0000 (07:43 +0000)] 
upstream: put the fido options in a list, and tidy up the text a

little; ok djm

OpenBSD-Commit-ID: 491ce15ae52a88b7a6a2b3b6708a14b4aacdeebb

6 years agoDeny (non-fatal) ipc in preauth privsep child.
Jeremy Drake [Sat, 12 Oct 2019 01:31:05 +0000 (18:31 -0700)] 
Deny (non-fatal) ipc in preauth privsep child.

As noted in openssh/openssh-portable#149, i386 does not have have
_NR_shmget etc.  Instead, it has a single ipc syscall (see man 2 ipc,
https://linux.die.net/man/2/ipc).  Add this syscall, if present, to the
list of syscalls that seccomp will deny non-fatally.

6 years agoseccomp: Allow clock_gettime64() in sandbox.
Khem Raj [Wed, 8 Jan 2020 00:26:45 +0000 (16:26 -0800)] 
seccomp: Allow clock_gettime64() in sandbox.

This helps sshd accept connections on mips platforms with
upcoming glibc ( 2.31 )

6 years agoupstream: missing else in check_enroll_options()
djm@openbsd.org [Mon, 6 Jan 2020 02:39:30 +0000 (02:39 +0000)] 
upstream: missing else in check_enroll_options()

OpenBSD-Commit-ID: e058fb918fda56ddbbf0bee910101004cec421d4

6 years agoupstream: fix error message
djm@openbsd.org [Mon, 6 Jan 2020 02:24:28 +0000 (02:24 +0000)] 
upstream: fix error message

OpenBSD-Commit-ID: 1eb52025658eb78ea6223181e552862198d3d505

6 years agoupstream: adapt sk-dummy to SK API changes
djm@openbsd.org [Mon, 6 Jan 2020 02:07:50 +0000 (02:07 +0000)] 
upstream: adapt sk-dummy to SK API changes

also, make it pull prototypes directly from sk-api.c and #error
if the expected version changes. This will make any future regress
test breakage because of SK API changes much more apparent

OpenBSD-Regress-ID: 79b07055de4feb988e31da71a89051ad5969829d

6 years agoupstream: Extends the SK API to accept a set of key/value options
djm@openbsd.org [Mon, 6 Jan 2020 02:00:46 +0000 (02:00 +0000)] 
upstream: Extends the SK API to accept a set of key/value options

for all operations. These are intended to future-proof the API a little by
making it easier to specify additional fields for without having to change
the API version for each.

At present, only two options are defined: one to explicitly specify
the device for an operation (rather than accepting the middleware's
autoselection) and another to specify the FIDO2 username that may
be used when generating a resident key. These new options may be
invoked at key generation time via ssh-keygen -O

This also implements a suggestion from Markus to avoid "int" in favour
of uint32_t for the algorithm argument in the API, to make implementation
of ssh-sk-client/helper a little easier.

feedback, fixes and ok markus@

OpenBSD-Commit-ID: 973ce11704609022ab36abbdeb6bc23c8001eabc

6 years agoupstream: fix CanonicalizeHostname, broken by rev 1.507
beck@openbsd.org [Sun, 5 Jan 2020 16:28:22 +0000 (16:28 +0000)] 
upstream: fix CanonicalizeHostname, broken by rev 1.507

Issue noticed and reported by Pierre-Olivier Martel <pom@apple.com>
ok dtucker@ markus@ djm@

OpenBSD-Commit-ID: 749f3168ec520609c35b0c4e1984e5fa47f16094

6 years agoFix typo: 'you' -> 'your'.
Darren Tucker [Sun, 5 Jan 2020 22:02:53 +0000 (09:02 +1100)] 
Fix typo: 'you' -> 'your'.

bz#3108 from jmckitrick@gmail.com.

6 years agoRemove auth-skey.c.
Darren Tucker [Sun, 5 Jan 2020 21:56:46 +0000 (08:56 +1100)] 
Remove auth-skey.c.

S/Key support was removed in OpenSSH 7.8 but this file was missed.

6 years agoupstream: the download resident keys option is -K (upper) not -k
jmc@openbsd.org [Fri, 3 Jan 2020 07:33:33 +0000 (07:33 +0000)] 
upstream: the download resident keys option is -K (upper) not -k

(lower); ok djm

OpenBSD-Commit-ID: 71dc28a3e1fa7c553844abc508845bcf5766e091

6 years agoupstream: what bozo decided to use 2020 as a future date in a regress
djm@openbsd.org [Fri, 3 Jan 2020 03:02:26 +0000 (03:02 +0000)] 
upstream: what bozo decided to use 2020 as a future date in a regress

test?

OpenBSD-Regress-ID: 3b953df5a7e14081ff6cf495d4e8d40e153cbc3a

6 years agoupstream: implement recent SK API change to support resident keys
djm@openbsd.org [Fri, 3 Jan 2020 02:46:19 +0000 (02:46 +0000)] 
upstream: implement recent SK API change to support resident keys

and PIN prompting in the dummy middleware that we use for the tests. Should
fix breakage spotted by dtucker@

OpenBSD-Regress-ID: 379cf9eabfea57aaf7f3f59dafde59889566c484

6 years agoupstream: Update keygen moduli screen test to match recent command
dtucker@openbsd.org [Thu, 2 Jan 2020 13:25:38 +0000 (13:25 +0000)] 
upstream: Update keygen moduli screen test to match recent command

line option change to ssh-keygen(1).

OpenBSD-Regress-ID: 744a72755004377e9669b662c13c6aa9ead8a0c3

6 years agoupstream: ability to download FIDO2 resident keys from a token via
djm@openbsd.org [Thu, 2 Jan 2020 22:40:09 +0000 (22:40 +0000)] 
upstream: ability to download FIDO2 resident keys from a token via

"ssh-keygen -K". This will save public/private keys into the current
directory.

This is handy if you move a token between hosts.

feedback & ok markus@

OpenBSD-Commit-ID: d57c1f9802f7850f00a117a1d36682a6c6d10da6

6 years agoupstream: add sshkey_save_public(), to save a public key; ok
djm@openbsd.org [Thu, 2 Jan 2020 22:38:33 +0000 (22:38 +0000)] 
upstream: add sshkey_save_public(), to save a public key; ok

markus@

OpenBSD-Commit-ID: 5d6f96a966d10d7fa689ff9aa9e1d6767ad5a076

6 years agoupstream: simplify the list for moduli options - no need for
jmc@openbsd.org [Mon, 30 Dec 2019 16:10:00 +0000 (16:10 +0000)] 
upstream: simplify the list for moduli options - no need for

-compact;

OpenBSD-Commit-ID: 6492c72280482c6d072be46236b365cb359fc280

6 years agossh-sk-null.cc needs extern "C" {}
Damien Miller [Thu, 2 Jan 2020 02:41:31 +0000 (13:41 +1100)] 
ssh-sk-null.cc needs extern "C" {}

6 years agoadd dummy ssh-sk API for linking with fuzzers
Damien Miller [Wed, 1 Jan 2020 23:56:29 +0000 (10:56 +1100)] 
add dummy ssh-sk API for linking with fuzzers

6 years agorefresh depend
Damien Miller [Mon, 30 Dec 2019 10:04:09 +0000 (21:04 +1100)] 
refresh depend

6 years agoupstream: Remove the -x option currently used for
djm@openbsd.org [Mon, 30 Dec 2019 09:49:52 +0000 (09:49 +0000)] 
upstream: Remove the -x option currently used for

FIDO/U2F-specific key flags. Instead these flags may be specified via -O.

ok markus@

OpenBSD-Commit-ID: f23ebde2a8a7e1bf860a51055a711cffb8c328c1

6 years agoupstream: document SK API changes in PROTOCOL.u2f
djm@openbsd.org [Mon, 30 Dec 2019 09:25:29 +0000 (09:25 +0000)] 
upstream: document SK API changes in PROTOCOL.u2f

ok markus@

OpenBSD-Commit-ID: 52622363c103a3c4d3d546050480ffe978a32186

6 years agoupstream: translate and return error codes; retry on bad PIN
djm@openbsd.org [Mon, 30 Dec 2019 09:24:45 +0000 (09:24 +0000)] 
upstream: translate and return error codes; retry on bad PIN

Define some well-known error codes in the SK API and pass
them back via ssh-sk-helper.

Use the new "wrong PIN" error code to retry PIN prompting during
ssh-keygen of resident keys.

feedback and ok markus@

OpenBSD-Commit-ID: 9663c6a2bb7a0bc8deaccc6c30d9a2983b481620