]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
3 days agoupstream: correctly quote wildcard host certificate principal name, master anongit/master
djm@openbsd.org [Mon, 22 Dec 2025 03:36:43 +0000 (03:36 +0000)] 
upstream: correctly quote wildcard host certificate principal name,

lest it expand to an unrelated filename in the working directory

OpenBSD-Regress-ID: 8a9eb716d3ea7986d26c1a931758b996aa93c58e

3 days agoupstream: return 0 in void function; spotted by clang -Wextra github-selfhosted/master github/master
djm@openbsd.org [Mon, 22 Dec 2025 03:12:05 +0000 (03:12 +0000)] 
upstream: return 0 in void function; spotted by clang -Wextra

OpenBSD-Commit-ID: fe7461c93dfaef98a007a246af837a8275a1e539

3 days agoupstream: regression tests for certificates with empty principals
djm@openbsd.org [Mon, 22 Dec 2025 01:50:46 +0000 (01:50 +0000)] 
upstream: regression tests for certificates with empty principals

sections (which are now unconditionally refused) and for certificates with
wildcard principals (which should only be accepted in host certs)

OpenBSD-Regress-ID: fdca88845a68424060547b4f9f32f90a7cf82e73

3 days agoupstream: don't try to test webauthn signatures. Nothing in OpenSSH
djm@openbsd.org [Mon, 22 Dec 2025 01:31:07 +0000 (01:31 +0000)] 
upstream: don't try to test webauthn signatures. Nothing in OpenSSH

generates these (yet)

OpenBSD-Regress-ID: 48d59b7c4768c2a22ce3d8cf3b455e6ada9fc7b0

3 days agoupstream: When certificate support was added to OpenSSH,
djm@openbsd.org [Mon, 22 Dec 2025 01:49:03 +0000 (01:49 +0000)] 
upstream: When certificate support was added to OpenSSH,

certificates were originally specified to represent any principal if the
principals list was empty.

This was, in retrospect, a mistake as it created a fail-open
situation if a CA could be convinced to accidentally sign a
certificate with no principals. This actually happened in a 3rd-
party CA product (CVE-2024-7594).

Somewhat fortunately, the main pathway for using certificates in
sshd (TrustedUserCAKeys) never supported empty-principals
certificates, so the blast radius of such mistakes was
substantially reduced.

This change removes this footcannon and requires all certificates
include principals sections. It also fixes interpretation of
wildcard principals, and properly enables them for host
certificates only.

This is a behaviour change that will permanently break uses of
certificates with empty principals sections.

ok markus@

OpenBSD-Commit-ID: 0a901f03c567c100724a492cf91e02939904712e

3 days agoupstream: Don't misuse the sftp limits extension's open-handles
djm@openbsd.org [Mon, 22 Dec 2025 01:20:39 +0000 (01:20 +0000)] 
upstream: Don't misuse the sftp limits extension's open-handles

field. This value is supposed to be the number of handles a server will allow
to be opened and not a number of outstanding read/write requests that can be
sent during an upload/download.

ok markus@

OpenBSD-Commit-ID: 14ebb6690acbd488e748ce8ce3302bd7e1e8a5b0

3 days agoupstream: add a "ssh -O channels user@host" multiplexing command to
djm@openbsd.org [Mon, 22 Dec 2025 01:17:31 +0000 (01:17 +0000)] 
upstream: add a "ssh -O channels user@host" multiplexing command to

get a running mux process to show information about what channels are
currently open; ok dtucker@ markus@

OpenBSD-Commit-ID: 80bb3953b306a50839f9a4bc5679faebc32e5bb8

6 days agoupstream: typo in comment
djm@openbsd.org [Fri, 19 Dec 2025 01:27:19 +0000 (01:27 +0000)] 
upstream: typo in comment

OpenBSD-Commit-ID: f72306b86953e74f358096db141b4f9c00d33ed7

6 days agoupstream: correctly check subsystem command is not the empty string
djm@openbsd.org [Fri, 19 Dec 2025 01:26:39 +0000 (01:26 +0000)] 
upstream: correctly check subsystem command is not the empty string

(was repeatedly checking the subsystem name) spotted by Coverity (CID 898836)

OpenBSD-Commit-ID: dabea2b499de8280f76f7291dd52086df6831cb0

6 days agoupstream: regression test for bz3906: sshd crashing at connection
djm@openbsd.org [Fri, 19 Dec 2025 00:57:42 +0000 (00:57 +0000)] 
upstream: regression test for bz3906: sshd crashing at connection

time if the config lacks a subsystem directive but one is defined in a match
block.

OpenBSD-Regress-ID: 5290553665307ccddaec2499ec1eb196bb2efc84

6 days agoupstream: check that invalid subsystem directives inside Match
djm@openbsd.org [Fri, 19 Dec 2025 00:48:47 +0000 (00:48 +0000)] 
upstream: check that invalid subsystem directives inside Match

blocks are noticed at startup; bz#3906

OpenBSD-Regress-ID: b9171bde4cc24757a826b3da0e9eadc33995a453

6 days agoupstream: don't crash at connection time if the main sshd_config
djm@openbsd.org [Fri, 19 Dec 2025 00:56:34 +0000 (00:56 +0000)] 
upstream: don't crash at connection time if the main sshd_config

lacks any subsystem directive but one is defined in a Match block

bz#3906; ok dtucker

OpenBSD-Commit-ID: 2eb9024726d6f10eaa41958faeca9c9ba5ca7d8a

6 days agoupstream: detect invalid sshd_config Subsystem directives inside
djm@openbsd.org [Fri, 19 Dec 2025 00:48:04 +0000 (00:48 +0000)] 
upstream: detect invalid sshd_config Subsystem directives inside

Match blocks at startup rather than failing later at runtime;

noticed via bz#3906; ok dtucker

OpenBSD-Commit-ID: e6035ff0baa375de6c9f22c883ed530a8649dfed

6 days agoupstream: new sentence, new line
jsg@openbsd.org [Thu, 18 Dec 2025 23:54:10 +0000 (23:54 +0000)] 
upstream: new sentence, new line

OpenBSD-Commit-ID: 23974d7c98b2ba4fea7f5143676c34e04ffd4128

6 days agoupstream: fix markup, .CM -> .Cm
jsg@openbsd.org [Thu, 18 Dec 2025 23:51:56 +0000 (23:51 +0000)] 
upstream: fix markup, .CM -> .Cm

OpenBSD-Commit-ID: 4db8cb254792df8a4dce11825852e089ae3d053a

9 days agoupstream: Plug leak in ssh_digest_memory on error path.
dtucker@openbsd.org [Tue, 16 Dec 2025 08:36:43 +0000 (08:36 +0000)] 
upstream: Plug leak in ssh_digest_memory on error path.

Bonehead mistake spotted by otto@, ok djm@

OpenBSD-Commit-ID: 4ad67ac402e0b4c013f4f4e386d22b88969a5dd7

9 days agoupstream: Add 'invaliduser' penalty to PerSourcePenalties, which is
dtucker@openbsd.org [Tue, 16 Dec 2025 08:32:50 +0000 (08:32 +0000)] 
upstream: Add 'invaliduser' penalty to PerSourcePenalties, which is

applied to login attempts for usernames that do not match real accounts.
Defaults to 5s to match 'authfail' but allows administrators to block such
sources for longer if desired.  with & ok djm@

OpenBSD-Commit-ID: bb62797bcf2adceb96f608ce86d0bb042aff5834

2 weeks agoupstream: add a GssDelegateCreds option for the server, controlling
djm@openbsd.org [Mon, 8 Dec 2025 03:55:22 +0000 (03:55 +0000)] 
upstream: add a GssDelegateCreds option for the server, controlling

whether it accepts delgated credentials offered by the client. This option
mirrors GssDelegateCreds in ssh_config.

From Dmitry Belyavskiy via GHPR614; ok dtucker@

OpenBSD-Commit-ID: ac419354edb26cef9ad15692e0bed17a03997786

2 weeks agoupstream: errant line
djm@openbsd.org [Mon, 8 Dec 2025 00:45:00 +0000 (00:45 +0000)] 
upstream: errant line

OpenBSD-Commit-ID: 8542d59f5ba48a67c3ebd5de17f9fa408ec54ca5

2 weeks agoupstream: There is a warning next to the authorized_keys command=""
djm@openbsd.org [Mon, 8 Dec 2025 00:44:16 +0000 (00:44 +0000)] 
upstream: There is a warning next to the authorized_keys command=""

flag that forcing a command doesn't automatically disable forwarding. Add one
next to the sshd_config(5) ForceCommand directive too.

feedback deraadt@

OpenBSD-Commit-ID: bfe38b4d3cfbadbb8bafe38bc256f5a17a0ee75c

2 weeks agoupstream: increment correct variable when counting group
djm@openbsd.org [Mon, 8 Dec 2025 00:41:46 +0000 (00:41 +0000)] 
upstream: increment correct variable when counting group

memberships. Reported by Kevin Day via bz3903

OpenBSD-Commit-ID: 772b9aafd5165a7c407f08cb95f8b94cc5a4c1c0

2 weeks agoAdd OpenBSD 7.8 VM test target.
Darren Tucker [Sun, 7 Dec 2025 09:10:42 +0000 (20:10 +1100)] 
Add OpenBSD 7.8 VM test target.

2 weeks agoRemove generated compat includes during distclean.
Darren Tucker [Sun, 7 Dec 2025 02:43:02 +0000 (13:43 +1100)] 
Remove generated compat includes during distclean.

2 weeks agoDefine IPTOS_DSCP_VA if not already defined.
Darren Tucker [Sun, 7 Dec 2025 03:17:20 +0000 (14:17 +1100)] 
Define IPTOS_DSCP_VA if not already defined.

2 weeks agoupstream: allow network programs select DSCP_VA for network ToS
phessler@openbsd.org [Fri, 5 Dec 2025 17:48:47 +0000 (17:48 +0000)] 
upstream: allow network programs select DSCP_VA for network ToS

OK stsp@

OpenBSD-Commit-ID: 8019fd6e8c522b4b5f291a2c0e3bf2437cc70dc1

2 weeks agoupstream: Avoid "if ! thing || ! otherthing; then" constructs since
dtucker@openbsd.org [Sun, 7 Dec 2025 02:59:53 +0000 (02:59 +0000)] 
upstream: Avoid "if ! thing || ! otherthing; then" constructs since

they seem to cause portability problems.

OpenBSD-Regress-ID: ff001be683de43bf396cd5f9f6a54e0c7a99c3cf

2 weeks agoupstream: spaces->tab
dtucker@openbsd.org [Sun, 7 Dec 2025 02:49:41 +0000 (02:49 +0000)] 
upstream: spaces->tab

OpenBSD-Regress-ID: c78eb430da0ec2c4b6919ff4d27ef8e565ef52ff

2 weeks agoupstream: Append a newline, otherwise some sed's won't output anything.
dtucker@openbsd.org [Sat, 6 Dec 2025 07:10:24 +0000 (07:10 +0000)] 
upstream: Append a newline, otherwise some sed's won't output anything.

OpenBSD-Regress-ID: 507cb8c36bb7fc338f60a55bf7040f479536b3f7

2 weeks agoupstream: Don't check compressions stats when ssh does not support
dtucker@openbsd.org [Sat, 6 Dec 2025 03:23:27 +0000 (03:23 +0000)] 
upstream: Don't check compressions stats when ssh does not support

compression.

OpenBSD-Regress-ID: 026db51b2654a949e9a10b908443dab83b64c74a

2 weeks agoupstream: ASSERT_DOUBLE_* test helpers
djm@openbsd.org [Fri, 5 Dec 2025 11:13:35 +0000 (11:13 +0000)] 
upstream: ASSERT_DOUBLE_* test helpers

OpenBSD-Regress-ID: cdb5c4e95c0f00efb773ddba4056a49e33702cf9

2 weeks agoSet SSH_REGRESS_TMP after making tmpdir.
Darren Tucker [Fri, 5 Dec 2025 09:02:39 +0000 (20:02 +1100)] 
Set SSH_REGRESS_TMP after making tmpdir.

Put both of these later in the script so the cvsids don't cause
conflicts on every synced patch.

2 weeks agoupstream: Shell compatibility fix.
dtucker@openbsd.org [Fri, 5 Dec 2025 08:09:34 +0000 (08:09 +0000)] 
upstream: Shell compatibility fix.

OpenBSD-Regress-ID: bceaeb267d49c13e4a797c42e93b8f0cdb14dbd7

2 weeks agoupstream: unit tests for convtime_double()
djm@openbsd.org [Fri, 5 Dec 2025 07:43:24 +0000 (07:43 +0000)] 
upstream: unit tests for convtime_double()

OpenBSD-Regress-ID: d3ba7b894019b4128845d638c78fca37b3b6eecf

2 weeks agoupstream: convert PerSourcePenalties to using floating point time,
djm@openbsd.org [Fri, 5 Dec 2025 07:49:45 +0000 (07:49 +0000)] 
upstream: convert PerSourcePenalties to using floating point time,

allowing penalties to be less than a second. This is useful if you need to
penalise things you expect to occur at >=1 QPS.

feedback dtucker / deraadt; ok deraadt@

OpenBSD-Commit-ID: 89198be755722131b45a52d22d548e4c602201f0

2 weeks agoupstream: Add convtime_double() that converts a string interval,
djm@openbsd.org [Fri, 5 Dec 2025 07:43:12 +0000 (07:43 +0000)] 
upstream: Add convtime_double() that converts a string interval,

such as "3w2d4h5m10.5s", into a floating point number of seconds.

Reimplement the existing convtime() function using convtime_double()
(it just drops the fractional seconds)

lots of feedback deraadt@ / dtucker@; ok deraadt@

OpenBSD-Commit-ID: 053cdd0c72325a20efc6613caa847473fb89e36f

2 weeks agoupstream: Add test for ssh -Oconninfo mux command.
dtucker@openbsd.org [Fri, 5 Dec 2025 06:55:22 +0000 (06:55 +0000)] 
upstream: Add test for ssh -Oconninfo mux command.

OpenBSD-Regress-ID: e939edc41caad8b6ad00ff294f33b61ed32a1edd

2 weeks agoupstream: Add an ssh -Oconninfo command
dtucker@openbsd.org [Fri, 5 Dec 2025 06:16:27 +0000 (06:16 +0000)] 
upstream: Add an ssh -Oconninfo command

that shows connection information, similar to the ~I escapechar.
This is the first use of the mux extension mechanism, so it should be
both forward and backward compatible: a new client talking to an old
server will not allow the "conninfo" request to be sent, but everything
else should work seamlessly.  feedback and ok djm@

OpenBSD-Commit-ID: 50f047a85da277360558cabdfed59cb66f754341

3 weeks agoupstream: correctly quote filenames in verbose output for local->local
djm@openbsd.org [Wed, 3 Dec 2025 06:29:50 +0000 (06:29 +0000)] 
upstream: correctly quote filenames in verbose output for local->local

copies; from Colin Watson via bz3900; ok dtucker@

OpenBSD-Commit-ID: 5c09b030e2024651ebc8c1f9af6a8a2d37912150

3 weeks agoupstream: Add local hostname and pid to ~I escape connection info,
dtucker@openbsd.org [Sat, 29 Nov 2025 06:49:56 +0000 (06:49 +0000)] 
upstream: Add local hostname and pid to ~I escape connection info,

only display peer information for TCP connections including source address
and port This provides enough information to uniquely identify a connection
on the host or network.

OpenBSD-Commit-ID: aa18a4af2de41c298d1195d2566808585f8ce964

3 weeks agoupstream: Add compression stats to ~I connection info escape
dtucker@openbsd.org [Sat, 29 Nov 2025 05:00:50 +0000 (05:00 +0000)] 
upstream: Add compression stats to ~I connection info escape

option.

OpenBSD-Commit-ID: 83424b71fc226ea6b3dc8dda39f993475fdbd775

4 weeks agoupstream: Add Escape option ~I that shows information about the current
dtucker@openbsd.org [Thu, 27 Nov 2025 02:18:48 +0000 (02:18 +0000)] 
upstream: Add Escape option ~I that shows information about the current

SSH connection. ok djm@, "I like/want" sthen@ florian@

OpenBSD-Commit-ID: 0483fc0188ec899077e4bc8e1e353f7dfa9f5c1d

4 weeks agoupstream: move mention of default MaxStartups (which uses the
djm@openbsd.org [Tue, 25 Nov 2025 01:14:33 +0000 (01:14 +0000)] 
upstream: move mention of default MaxStartups (which uses the

form.

GHPR568 from Santiago Vila

OpenBSD-Commit-ID: 7e68771f3cad61ec67303607afb3b85639288b29

4 weeks agoupstream: Support writing ED25519 keys in PKCS8 format. GHPR570 from
djm@openbsd.org [Tue, 25 Nov 2025 01:08:35 +0000 (01:08 +0000)] 
upstream: Support writing ED25519 keys in PKCS8 format. GHPR570 from

Josh Brobst

OpenBSD-Commit-ID: 4f36019a38074b2929335fbe9cb8d9801e3177af

4 weeks agoupstream: avoid leak of fingerprint on error path; from Lidong Yan via
djm@openbsd.org [Tue, 25 Nov 2025 00:57:04 +0000 (00:57 +0000)] 
upstream: avoid leak of fingerprint on error path; from Lidong Yan via

GHPR611

OpenBSD-Commit-ID: 253f6f7d729d8636da23ac9925b60b494e85a810

4 weeks agoupstream: don't set the PerSourceNetBlockSize IPv6 mask if sscanf
djm@openbsd.org [Tue, 25 Nov 2025 00:52:00 +0000 (00:52 +0000)] 
upstream: don't set the PerSourceNetBlockSize IPv6 mask if sscanf

didn't decode it. From Mingjie Shen via GHPR598

OpenBSD-Commit-ID: c722014e735cbd87adb2fa968ce4c47b43cf98b0

4 weeks agoupstream: give ssh-agent more time to start in tests; requested in
djm@openbsd.org [Mon, 24 Nov 2025 23:56:58 +0000 (23:56 +0000)] 
upstream: give ssh-agent more time to start in tests; requested in

GHPR602

OpenBSD-Regress-ID: 7d771db2c1d4a422e83c3f632ba1e96f72a262b8

4 weeks agoupstream: When testing PKCS11, explicitly allow the module path in
djm@openbsd.org [Mon, 24 Nov 2025 23:54:15 +0000 (23:54 +0000)] 
upstream: When testing PKCS11, explicitly allow the module path in

ssh-agent.

Allows testing of PKCS11 modules outside system directories.

From Morgan Jones via GHPR602

OpenBSD-Regress-ID: 548d6e0362a8d9f7d1cc01444b697a00811ff488

4 weeks agoupstream: When loading FIDO2 resident keys, set the comment to the
djm@openbsd.org [Mon, 24 Nov 2025 23:43:10 +0000 (23:43 +0000)] 
upstream: When loading FIDO2 resident keys, set the comment to the

FIDO application string. This matches the behaviour of ssh-keygen -K

From Arian van Putten via GHPR608

OpenBSD-Commit-ID: 3fda54b44ed6a8a6f94cd3e39e69c1e672095712

4 weeks agoupstream: pkcs11_fetch_ecdsa_pubkey: use ASN1_STRING accessors
tb@openbsd.org [Sun, 23 Nov 2025 07:04:18 +0000 (07:04 +0000)] 
upstream: pkcs11_fetch_ecdsa_pubkey: use ASN1_STRING accessors

In anticipation of davidben and beck making ASN1_STRING opaque in
OpenSSL 4 with the aim of enabling surgery to make the X509 data
structure less bad [1], we need to use dumb accessors to avoid build
breakage. Fortunately only in one spot.

This is OpenSSL 1.1 API and available in all members of the fork family.

ok beck djm

[1]: https://github.com/openssl/openssl/issues/29117

OpenBSD-Commit-ID: 0bcaf691d20624ef43f3515c983cd5aa69547d4f

4 weeks agoUpdate OSSFuzz link to current bug tracker.
Darren Tucker [Fri, 21 Nov 2025 03:28:20 +0000 (14:28 +1100)] 
Update OSSFuzz link to current bug tracker.

4 weeks agoAdd VM CI and CIFuzz status badges.
Darren Tucker [Fri, 21 Nov 2025 03:21:07 +0000 (14:21 +1100)] 
Add VM CI and CIFuzz status badges.

4 weeks agoupstream: unit tests for sshbuf_get_nulterminated_string()
djm@openbsd.org [Fri, 21 Nov 2025 01:29:27 +0000 (01:29 +0000)] 
upstream: unit tests for sshbuf_get_nulterminated_string()

OpenBSD-Regress-ID: cb0af1e4d6dcc94e263942bc4dcf5f4466d1f086

4 weeks agoupstream: add a sshbuf_get_nulterminated_string() function to pull a
djm@openbsd.org [Fri, 21 Nov 2025 01:29:06 +0000 (01:29 +0000)] 
upstream: add a sshbuf_get_nulterminated_string() function to pull a

\0- terminated string from a sshbuf. Intended to be used to improve parsing
of SOCKS headers for dynamic forwarding.

ok deraadt; feedback Tim van der Molen

OpenBSD-Commit-ID: cf93d6db4730f7518d5269c279e16b172b484b36

5 weeks agoupstream: Free opts in FAIL_TEST. It should always be NULL anyway so
dtucker@openbsd.org [Thu, 20 Nov 2025 05:07:57 +0000 (05:07 +0000)] 
upstream: Free opts in FAIL_TEST. It should always be NULL anyway so

this is a no-op, but it should placate Coverity CID 405064.

OpenBSD-Regress-ID: 06789754de0741f26432c668fad8b9881c14c153

5 weeks agoupstream: Plug leaks while parsing Match blocks. Coverity CID
dtucker@openbsd.org [Thu, 20 Nov 2025 05:10:56 +0000 (05:10 +0000)] 
upstream: Plug leaks while parsing Match blocks. Coverity CID

469304, ok djm@

OpenBSD-Commit-ID: f9b79b86879a953ad034e6b92a398265b251bea7

5 weeks agoupstream: Plug leaks while parsing Match blocks. Coverity CID
dtucker@openbsd.org [Thu, 20 Nov 2025 05:10:11 +0000 (05:10 +0000)] 
upstream: Plug leaks while parsing Match blocks. Coverity CID

515634, ok miod@ djm@

OpenBSD-Commit-ID: c7932eddecd47e5122e945246a40c56ffa42a546

5 weeks agoPull in rev 1.17 for spelling fix.
Darren Tucker [Tue, 18 Nov 2025 09:14:44 +0000 (20:14 +1100)] 
Pull in rev 1.17 for spelling fix.

Prompted by github PR#609 from Edge-Seven.

5 weeks agoupstream: Export XDG_RUNTIME_DIR to child ssh sessions
jca@openbsd.org [Mon, 17 Nov 2025 12:59:29 +0000 (12:59 +0000)] 
upstream: Export XDG_RUNTIME_DIR to child ssh sessions

Currently setusercontext(LOGIN_SETALL) does create the directory in
/tmp/run/user, since LOGIN_SETXDGENV is part of LOGIN_SETALL, but the
env variable wasn't exported.

ok djm@

OpenBSD-Commit-ID: 02b8433f72759b3a07b55cbc5a7cdb84391b0017

5 weeks agoupstream: don't strnvis() log messages that are going to be logged
djm@openbsd.org [Mon, 17 Nov 2025 05:24:42 +0000 (05:24 +0000)] 
upstream: don't strnvis() log messages that are going to be logged

by sshd-auth via its parent sshd-session process, as the parent will also run
them though strnvis().

Prevents double-escaping of non-printing characters in some log
messages. bz3896 ok dtucker@

OpenBSD-Commit-ID: d78faad96a98af5269d66ddceee553cf7d396dfe

5 weeks agoRemove obsolete CVSID.
Darren Tucker [Mon, 17 Nov 2025 10:36:45 +0000 (21:36 +1100)] 
Remove obsolete CVSID.

5 weeks agoupstream: Ensure both sides of the test are non-NULL instead of just
dtucker@openbsd.org [Mon, 17 Nov 2025 09:59:13 +0000 (09:59 +0000)] 
upstream: Ensure both sides of the test are non-NULL instead of just

either. Coverity CID 443285.

OpenBSD-Regress-ID: aa90e57b1bc8efce9e50734a07a8ffec0680059a

6 weeks agoMove libcrypto init check into entropy.c.
Darren Tucker [Thu, 13 Nov 2025 12:30:48 +0000 (23:30 +1100)] 
Move libcrypto init check into entropy.c.

This prevents link errors with the openbsd-compat tests when the linker
tries to bring in all the logging bits.

6 weeks agoseccomp sandbox: allow uname(3)
Icenowy Zheng [Fri, 7 Nov 2025 06:27:35 +0000 (14:27 +0800)] 
seccomp sandbox: allow uname(3)

The uname(3) syscall is utilized by zlib-ng on RISC-V to decide whether
the kernel handles VILL bit of V extension properly (by checking the
kernel version against 6.5).

Allow it in the seccomp sandbox.

Signed-off-by: Icenowy Zheng <uwu@icenowy.me>
6 weeks agoRemove remaining OpenSSL_add_all_algorithms() calls.
Darren Tucker [Thu, 13 Nov 2025 11:04:19 +0000 (22:04 +1100)] 
Remove remaining OpenSSL_add_all_algorithms() calls.

We already have OPENSSL_init_crypto() in the compat layer (now with a
check of its return code, prompted by tb@). Prompted by github PR#606
from Dimitri John Ledkov.  ok beck@

6 weeks agoupstream: Remove calls to OpenSSL_add_all_algorithms()
dtucker@openbsd.org [Thu, 13 Nov 2025 10:35:14 +0000 (10:35 +0000)] 
upstream: Remove calls to OpenSSL_add_all_algorithms()

and ERR_load_crypto_strings(). These are no-ops in LibreSSL, and in
Portable have been mostly replaced by a call to OPENSSL_init_crypto()
in the compat layer.  ok tb@

OpenBSD-Commit-ID: 4c3e0af10fe276766054eda34428a37a5606d3ea

6 weeks agoupstream: sync support for systems that lack __builtin_popcount() from
djm@openbsd.org [Thu, 13 Nov 2025 05:13:06 +0000 (05:13 +0000)] 
upstream: sync support for systems that lack __builtin_popcount() from

portable

unused on OpenBSD (nothing sets MISSING_BUILTIN_POPCOUNT), but it
makes syncing much easier.

OpenBSD-Commit-ID: 496446300d82615b24f83eca886b8fabdbee445b

6 weeks agoupstream: update our ML-KEM implementation to upstream libcrux
djm@openbsd.org [Thu, 13 Nov 2025 04:56:23 +0000 (04:56 +0000)] 
upstream: update our ML-KEM implementation to upstream libcrux

v0.0.4

tested/ok tb@

OpenBSD-Commit-ID: 525a62549efbf53492adcb2c57e4872cdbaeed62

6 weeks agoupstream: sshkey_ec_validate_public: zap trailing blank I missed on
tb@openbsd.org [Fri, 7 Nov 2025 06:29:45 +0000 (06:29 +0000)] 
upstream: sshkey_ec_validate_public: zap trailing blank I missed on

review

OpenBSD-Commit-ID: b296bd6056f33fd567ca0d5e9123dac1ec00f037

6 weeks agoSimplify git command to avoid yaml syntax error.
Darren Tucker [Wed, 12 Nov 2025 23:23:45 +0000 (10:23 +1100)] 
Simplify git command to avoid yaml syntax error.

6 weeks agoDon't use OpenSSL's ed25519 if built without EC.
Darren Tucker [Wed, 12 Nov 2025 22:53:17 +0000 (09:53 +1100)] 
Don't use OpenSSL's ed25519 if built without EC.

Explicitly check for OPENSSL_NO_EC, since otherwise the test will link
but then fail at runtime.

6 weeks agooctal-escape the colon character
Damien Miller [Fri, 7 Nov 2025 04:49:55 +0000 (15:49 +1100)] 
octal-escape the colon character

Apparently these are YAML magic when followed by whitespace

6 weeks agotry single quotes instead of escaped quotes
Damien Miller [Fri, 7 Nov 2025 04:44:18 +0000 (15:44 +1100)] 
try single quotes instead of escaped quotes

6 weeks agoescape quotes in yaml
Damien Miller [Fri, 7 Nov 2025 04:42:57 +0000 (15:42 +1100)] 
escape quotes in yaml

6 weeks agoupstream: Escape SSH_AUTH_SOCK paths that are sent to the shell as
djm@openbsd.org [Fri, 7 Nov 2025 04:33:52 +0000 (04:33 +0000)] 
upstream: Escape SSH_AUTH_SOCK paths that are sent to the shell as

setenv commands.

Unbreaks ssh-agent for home directory paths that contain whitespace.

Based on fix from Beat Bolli via bz3884; feedback/ok dtucker@

OpenBSD-Commit-ID: aaf06594e299940df8b4c4b9f0a1d14bef427e02

6 weeks agoupstream: sk-dummy.so needs sshlog() stub after ed25519-openssl.c
djm@openbsd.org [Thu, 6 Nov 2025 17:24:28 +0000 (17:24 +0000)] 
upstream: sk-dummy.so needs sshlog() stub after ed25519-openssl.c

change

OpenBSD-Regress-ID: 50b7f49021b8085728d0544275e141fb1bf4a2b5

6 weeks agoupstream: unit test for stringlist_append() and stringlist_free()
djm@openbsd.org [Thu, 6 Nov 2025 01:33:26 +0000 (01:33 +0000)] 
upstream: unit test for stringlist_append() and stringlist_free()

OpenBSD-Regress-ID: a3a4dae538c831b3810f69abc34ad8504dc3c460

6 weeks agoupstream: link against ed25519-openssl.c instead of ed25519.c
djm@openbsd.org [Thu, 6 Nov 2025 01:33:03 +0000 (01:33 +0000)] 
upstream: link against ed25519-openssl.c instead of ed25519.c

OpenBSD-Regress-ID: f789d46e99d2598929e3c2d00b45c47cc3102501

6 weeks agoupstream: Cope with recent changes and don't link hash.c.
anton@openbsd.org [Sat, 1 Nov 2025 05:39:25 +0000 (05:39 +0000)] 
upstream: Cope with recent changes and don't link hash.c.

OpenBSD-Regress-ID: 577ef2f36ee592528448e8c0f33499e2e3512054

6 weeks agoupstream: Remove some unnecessary checks in
djm@openbsd.org [Fri, 7 Nov 2025 04:11:59 +0000 (04:11 +0000)] 
upstream: Remove some unnecessary checks in

sshkey_ec_validate_public()
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Checking nQ == infinity is not needed for cofactor 1 curves.
Checking x and y coordinates against order is not needed either.

patch from Szilárd Pfeiffer, with further refinement by tb@
ok tb@

OpenBSD-Commit-ID: ef985e2be7c64e215d064757d3fc65eb181e8ede

6 weeks agoupstream: move stringlist_append() and stringlist_free() to misc.c
djm@openbsd.org [Thu, 6 Nov 2025 01:31:11 +0000 (01:31 +0000)] 
upstream: move stringlist_append() and stringlist_free() to misc.c

OpenBSD-Commit-ID: 7d047bbff6964b9abbc04e9b3e2e1b4cc1db0aea

6 weeks agoupstream: cleanup file descriptors across PKCS#11 client/helper
djm@openbsd.org [Fri, 31 Oct 2025 01:50:43 +0000 (01:50 +0000)] 
upstream: cleanup file descriptors across PKCS#11 client/helper

execution; ok markus

OpenBSD-Commit-ID: 993628a5b361e30aa48bbb4c07667a280f3f23ab

7 weeks agoSupport using git for OpenBSD src tree tests.
Darren Tucker [Fri, 31 Oct 2025 21:34:15 +0000 (08:34 +1100)] 
Support using git for OpenBSD src tree tests.

7 weeks agoAdd OpenBSD 7.8 test target.
Darren Tucker [Fri, 31 Oct 2025 21:33:07 +0000 (08:33 +1100)] 
Add OpenBSD 7.8 test target.

7 weeks agocheck PAM user against previous user, not pw_name
Damien Miller [Fri, 31 Oct 2025 02:47:49 +0000 (13:47 +1100)] 
check PAM user against previous user, not pw_name

Avoids early fatal() if the user doesn't exist.

Reported by Viswesh Narayanan; ok dtucker@

7 weeks agoskip pkcs11 tests when built --without-openssl
Damien Miller [Fri, 31 Oct 2025 01:19:47 +0000 (12:19 +1100)] 
skip pkcs11 tests when built --without-openssl

7 weeks agoadd sshlog() replacement to sk-dummy.so
Damien Miller [Fri, 31 Oct 2025 01:19:34 +0000 (12:19 +1100)] 
add sshlog() replacement to sk-dummy.so

7 weeks agorename openbsd-compat sha2.h -> bsd-sha2.h
Damien Miller [Fri, 31 Oct 2025 00:16:29 +0000 (11:16 +1100)] 
rename openbsd-compat sha2.h -> bsd-sha2.h

avoids confusion with system header when included from files under
openbsd-compat/

7 weeks agofix linking for sk-dummy.so, used in tests
Damien Miller [Fri, 31 Oct 2025 00:07:17 +0000 (11:07 +1100)] 
fix linking for sk-dummy.so, used in tests

7 weeks agoupstream: don't link hash.c
djm@openbsd.org [Thu, 30 Oct 2025 23:55:09 +0000 (23:55 +0000)] 
upstream: don't link hash.c

OpenBSD-Regress-ID: a145f09c1efb1fcd3924544463f1f94f5d4805c0

7 weeks agoupstream: Prepare for gcc 3 leaving the building, COMPILER_VERSION
miod@openbsd.org [Thu, 23 Oct 2025 19:06:10 +0000 (19:06 +0000)] 
upstream: Prepare for gcc 3 leaving the building, COMPILER_VERSION

can no longer get set to "gcc3".

OpenBSD-Regress-ID: 02351ea947975b80be60b9a8c6e4dbb57789e890

7 weeks agoupstream: Check tmux version and skip if too old. ok djm@
dtucker@openbsd.org [Thu, 23 Oct 2025 06:15:26 +0000 (06:15 +0000)] 
upstream: Check tmux version and skip if too old. ok djm@

OpenBSD-Regress-ID: fb62024eb753c61b4d78402ec8378af839fad26c

7 weeks agoupstream: move crypto_hash_sha512() to be inline in crypto_api.h, saves
djm@openbsd.org [Thu, 30 Oct 2025 23:19:33 +0000 (23:19 +0000)] 
upstream: move crypto_hash_sha512() to be inline in crypto_api.h, saves

about 0.5kb per binary and makes life easier for portable; with/ok dtucker@

OpenBSD-Commit-ID: 672d7390f78bb6581c12661d7f5adc8a9c6be564

7 weeks agoupstream: support ed25519 signatures via libcrypto. Mostly by Jeremy
djm@openbsd.org [Thu, 30 Oct 2025 20:49:10 +0000 (20:49 +0000)] 
upstream: support ed25519 signatures via libcrypto. Mostly by Jeremy

Allison Feedback tb@, ok tb@ markus@

OpenBSD-Commit-ID: e8edf8adffd5975d05769dde897df882d7933526

8 weeks agoupstream: Activate UnusedConnectionTimeout only after last channel
djm@openbsd.org [Thu, 30 Oct 2025 03:19:54 +0000 (03:19 +0000)] 
upstream: Activate UnusedConnectionTimeout only after last channel

has closed. Previously UnusedConnectionTimeout could fire early after a
ChannelTimeout.

This was not a problem for the OpenSSH client because it terminates
once all channels have closed but could cause problems for other
clients (e.g. API clients) that do things differently.

bz3827; ok dtucker

OpenBSD-Commit-ID: ff2e4607cbd4e600de3c8a5ece3b0e4bb641ed8f

8 weeks agoupstream: Prepare for gcc 3 leaving the building, COMPILER_VERSION
miod@openbsd.org [Thu, 23 Oct 2025 19:06:10 +0000 (19:06 +0000)] 
upstream: Prepare for gcc 3 leaving the building, COMPILER_VERSION

can no longer get set to "gcc3".

OpenBSD-Commit-ID: 98eefed432ff8253b307002e20d28da14b93e7e3

2 months agoupstream: more explicit synchronisation around killing tmux sessions
djm@openbsd.org [Wed, 22 Oct 2025 06:22:58 +0000 (06:22 +0000)] 
upstream: more explicit synchronisation around killing tmux sessions

between runs.

OpenBSD-Regress-ID: 1735f5cb13ad281e869ab998c7d49b692ee3ed47

2 months agoupstream: remove debugging junk
djm@openbsd.org [Wed, 22 Oct 2025 05:22:31 +0000 (05:22 +0000)] 
upstream: remove debugging junk

OpenBSD-Regress-ID: 3247e0ac98ae4cfe4eede871ef424d166e29e828

2 months agoupstream: just skip the test if $PATH or $HOME has whitespace in it
djm@openbsd.org [Tue, 21 Oct 2025 23:30:01 +0000 (23:30 +0000)] 
upstream: just skip the test if $PATH or $HOME has whitespace in it

OpenBSD-Regress-ID: ccf75a29d1a300a35f63be0e4f11ad5276756275

2 months agoupstream: quote paths; avoids test failure when run from a path with a
djm@openbsd.org [Tue, 21 Oct 2025 22:13:27 +0000 (22:13 +0000)] 
upstream: quote paths; avoids test failure when run from a path with a

space in it

OpenBSD-Regress-ID: e4b7bffc289f10d47c50c02dd70b0323078a83b4

2 months agoupstream: fix test for executability of tmux
djm@openbsd.org [Tue, 21 Oct 2025 08:35:22 +0000 (08:35 +0000)] 
upstream: fix test for executability of tmux

OpenBSD-Regress-ID: a18119876ecfd95edb78225b086ac668eb0977ab