]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
5 years agoupstream: no-touch-required certificate option should be an V_8_2 anongit/V_8_2 github-selfhosted/V_8_2 github/V_8_2
djm@openbsd.org [Fri, 28 Feb 2020 01:07:28 +0000 (01:07 +0000)] 
upstream: no-touch-required certificate option should be an
extension, not a critical option.

OpenBSD-Commit-ID: 626b22c5feb7be8a645e4b9a9bef89893b88600d

5 years agoupstream: better error message when trying to use a FIDO key
djm@openbsd.org [Fri, 28 Feb 2020 01:06:05 +0000 (01:06 +0000)] 
upstream: better error message when trying to use a FIDO key

function and SecurityKeyProvider is empty

OpenBSD-Commit-ID: e56602c2ee8c82f835d30e4dc8ee2e4a7896be24

5 years agoupstream: openssh-8.2 V_8_2_P1
djm@openbsd.org [Fri, 14 Feb 2020 00:39:20 +0000 (00:39 +0000)] 
upstream: openssh-8.2

OpenBSD-Commit-ID: 0a1340ff65fad0d84b997ac58dd1b393dec7c19b

5 years agocrank version numbers
Damien Miller [Tue, 11 Feb 2020 22:28:35 +0000 (09:28 +1100)] 
crank version numbers

5 years agoMinor documentation update:
Darren Tucker [Tue, 11 Feb 2020 01:51:24 +0000 (12:51 +1100)] 
Minor documentation update:

 - remove duplication of dependency information (it's all in INSTALL).
 - SSHFP is now an RFC.

5 years agoCheck if UINT32_MAX is defined before redefining.
Darren Tucker [Sun, 9 Feb 2020 00:23:35 +0000 (11:23 +1100)] 
Check if UINT32_MAX is defined before redefining.

5 years agotypo; reported by Phil Pennock
Damien Miller [Fri, 7 Feb 2020 04:07:27 +0000 (15:07 +1100)] 
typo; reported by Phil Pennock

5 years agoupstream: sync the description of the $SSH_SK_PROVIDER environment
djm@openbsd.org [Fri, 7 Feb 2020 03:57:31 +0000 (03:57 +0000)] 
upstream: sync the description of the $SSH_SK_PROVIDER environment

variable with that of the SecurityKeyProvider ssh/sshd_config(5) directive,
as the latter was more descriptive.

OpenBSD-Commit-ID: 0488f09530524a7e53afca6b6e1780598022552f

5 years agoupstream: Add ssh -Q key-sig for all key and signature types.
dtucker@openbsd.org [Fri, 7 Feb 2020 03:54:44 +0000 (03:54 +0000)] 
upstream: Add ssh -Q key-sig for all key and signature types.

Teach ssh -Q to accept ssh_config(5) and sshd_config(5) algorithm keywords as
an alias for the corresponding query.  Man page help jmc@, ok djm@.

OpenBSD-Commit-ID: 1e110aee3db2fc4bc5bee2d893b7128fd622e0f8

5 years agoupstream: fix two PIN entry bugs on FIDO keygen: 1) it would allow more
djm@openbsd.org [Fri, 7 Feb 2020 03:27:54 +0000 (03:27 +0000)] 
upstream: fix two PIN entry bugs on FIDO keygen: 1) it would allow more

than the intended number of prompts (3) and 2) it would SEGV too many
incorrect PINs were entered; based on patch by Gabriel Kihlman

OpenBSD-Commit-ID: 9c0011f28ba8bd8adf2014424b64960333da1718

5 years agoupstream: When using HostkeyAlgorithms to merely append or remove
djm@openbsd.org [Thu, 6 Feb 2020 22:48:23 +0000 (22:48 +0000)] 
upstream: When using HostkeyAlgorithms to merely append or remove

algorithms from the default set (i.e. HostkeyAlgorithms=+/-...), retain the
default behaviour of preferring those algorithms that have existing keys in
known_hosts; ok markus

OpenBSD-Commit-ID: 040e7fcc38ea00146b5d224ce31ce7a1795ee6ed

5 years agoupstream: expand HostkeyAlgorithms prior to config dump, matching
djm@openbsd.org [Thu, 6 Feb 2020 22:46:31 +0000 (22:46 +0000)] 
upstream: expand HostkeyAlgorithms prior to config dump, matching

other algorithm lists; ok markus@

OpenBSD-Commit-ID: a66f0fca8cc5ce30405a2867bc115fff600671d0

5 years agoupstream: Add Include to the list of permitted keywords after a
naddy@openbsd.org [Thu, 6 Feb 2020 22:34:58 +0000 (22:34 +0000)] 
upstream: Add Include to the list of permitted keywords after a

Match keyword. ok markus@

OpenBSD-Commit-ID: 342e940538b13dd41e0fa167dc9ab192b9f6e2eb

5 years agoupstream: Replace "security key" with "authenticator" in program
naddy@openbsd.org [Thu, 6 Feb 2020 22:30:54 +0000 (22:30 +0000)] 
upstream: Replace "security key" with "authenticator" in program

messages.

This replaces "security key" in error/usage/verbose messages and
distinguishes between "authenticator" and "authenticator-hosted key".

ok djm@

OpenBSD-Commit-ID: 7c63800e9c340c59440a054cde9790a78f18592e

5 years agoDon't look for UINT32_MAX in inttypes.h
Darren Tucker [Thu, 6 Feb 2020 00:28:14 +0000 (11:28 +1100)] 
Don't look for UINT32_MAX in inttypes.h

... unless we are actually going to use it.  Fixes build on HP-UX
without the potential impact to other platforms of a header change
shortly before release.

5 years agodepend
Damien Miller [Thu, 6 Feb 2020 01:02:22 +0000 (12:02 +1100)] 
depend

5 years agoFix sha2 MAKE_CLONE no-op definition
Michael Forney [Thu, 28 Nov 2019 03:17:26 +0000 (19:17 -0800)] 
Fix sha2 MAKE_CLONE no-op definition

The point of the dummy declaration is so that MAKE_CLONE(...) can have
a trailing semicolon without introducing an empty declaration. So,
the macro replacement text should *not* have a trailing semicolon,
just like DEF_WEAK.

5 years agoupstream: require FIDO application strings to start with "ssh:"; ok
djm@openbsd.org [Tue, 4 Feb 2020 09:58:04 +0000 (09:58 +0000)] 
upstream: require FIDO application strings to start with "ssh:"; ok

markus@

OpenBSD-Commit-ID: 94e9c1c066d42b76f035a3d58250a32b14000afb

5 years agoupstream: revert enabling UpdateHostKeys by default - there are still
djm@openbsd.org [Mon, 3 Feb 2020 23:47:57 +0000 (23:47 +0000)] 
upstream: revert enabling UpdateHostKeys by default - there are still

corner cases we need to address; ok markus

OpenBSD-Commit-ID: ff7ad941bfdc49fb1d8baa95fd0717a61adcad57

5 years agoupstream: use better markup for challenge and write-attestation, and
jmc@openbsd.org [Mon, 3 Feb 2020 08:15:37 +0000 (08:15 +0000)] 
upstream: use better markup for challenge and write-attestation, and

rejig the challenge text a little;

ok djm

OpenBSD-Commit-ID: 9f351e6da9edfdc907d5c3fdaf2e9ff3ab0a7a6f

5 years agomention libfido2 in dependencies section
Damien Miller [Mon, 3 Feb 2020 10:22:15 +0000 (21:22 +1100)] 
mention libfido2 in dependencies section

5 years agoadd clock_gettime64(2) to sandbox allowed syscalls
Damien Miller [Mon, 3 Feb 2020 08:40:12 +0000 (19:40 +1100)] 
add clock_gettime64(2) to sandbox allowed syscalls

bz3093

5 years agoupstream: Output (none) in debug in the case in the CheckHostIP=no case
dtucker@openbsd.org [Sun, 2 Feb 2020 09:45:34 +0000 (09:45 +0000)] 
upstream: Output (none) in debug in the case in the CheckHostIP=no case

as suggested by markus@

OpenBSD-Commit-ID: 4ab9117ee5261cbbd1868717fcc3142eea6385cf

5 years agoupstream: Prevent possible null pointer deref of ip_str in debug.
dtucker@openbsd.org [Sun, 2 Feb 2020 09:22:22 +0000 (09:22 +0000)] 
upstream: Prevent possible null pointer deref of ip_str in debug.

OpenBSD-Commit-ID: 37b252e2e6f690efed6682437ef75734dbc8addf

5 years agoupstream: shuffle the challenge keyword to keep the -O list sorted;
jmc@openbsd.org [Sun, 2 Feb 2020 07:36:50 +0000 (07:36 +0000)] 
upstream: shuffle the challenge keyword to keep the -O list sorted;

OpenBSD-Commit-ID: 08efad608b790949a9a048d65578fae9ed5845fe

5 years agoupstream: tweak previous;
jmc@openbsd.org [Sat, 1 Feb 2020 06:53:12 +0000 (06:53 +0000)] 
upstream: tweak previous;

OpenBSD-Commit-ID: 0c42851cdc88583402b4ab2b110a6348563626d3

5 years agoUse sys-queue.h from compat library.
Darren Tucker [Sat, 1 Feb 2020 06:25:09 +0000 (17:25 +1100)] 
Use sys-queue.h from compat library.

Fixes build on platforms that don't have sys/queue.h (eg MUSL).

5 years agoupstream: regress test for sshd_config Include directive; from Jakub
djm@openbsd.org [Fri, 31 Jan 2020 23:25:08 +0000 (23:25 +0000)] 
upstream: regress test for sshd_config Include directive; from Jakub

Jelen

OpenBSD-Regress-ID: 0d9224de3297c7a5f51ba68d6e3725a2a9345fa4

5 years agoupstream: whitespace
djm@openbsd.org [Fri, 31 Jan 2020 23:13:04 +0000 (23:13 +0000)] 
upstream: whitespace

OpenBSD-Commit-ID: 564cf7a5407ecf5da2d94ec15474e07427986772

5 years agoupstream: force early logging to stderr if debug_flag (-d) is set;
djm@openbsd.org [Fri, 31 Jan 2020 23:11:25 +0000 (23:11 +0000)] 
upstream: force early logging to stderr if debug_flag (-d) is set;

avoids missing messages from re-exec config passing

OpenBSD-Commit-ID: 02484b8241c1f49010e7a543a7098e6910a8c9ff

5 years agoupstream: mistake in previous: filling the incorrect buffer
djm@openbsd.org [Fri, 31 Jan 2020 23:08:08 +0000 (23:08 +0000)] 
upstream: mistake in previous: filling the incorrect buffer

OpenBSD-Commit-ID: 862ee84bd4b97b529f64aec5d800c3dcde952e3a

5 years agoupstream: Add a sshd_config "Include" directive to allow inclusion
djm@openbsd.org [Fri, 31 Jan 2020 22:42:45 +0000 (22:42 +0000)] 
upstream: Add a sshd_config "Include" directive to allow inclusion

of files. This has sensible semantics wrt Match blocks and accepts glob(3)
patterns to specify the included files. Based on patch by Jakub Jelen in
bz2468; feedback and ok markus@

OpenBSD-Commit-ID: 36ed0e845b872e33f03355b936a4fff02d5794ff

5 years agoupstream: spelling fix;
jmc@openbsd.org [Fri, 31 Jan 2020 22:25:59 +0000 (22:25 +0000)] 
upstream: spelling fix;

OpenBSD-Commit-ID: 3c079523c4b161725a4b15dd06348186da912402

5 years agoupstream: document changed default for UpdateHostKeys
djm@openbsd.org [Thu, 30 Jan 2020 22:25:34 +0000 (22:25 +0000)] 
upstream: document changed default for UpdateHostKeys

OpenBSD-Commit-ID: 25c390b21d142f78ac0106241d13441c4265fd2c

5 years agoupstream: enable UpdateKnownHosts=yes if the configuration
djm@openbsd.org [Thu, 30 Jan 2020 22:19:32 +0000 (22:19 +0000)] 
upstream: enable UpdateKnownHosts=yes if the configuration

specifies only the default known_hosts files, otherwise select
UpdateKnownHosts=ask; ok markus@

OpenBSD-Commit-ID: ab401a5ec4a33d2e1a9449eae6202e4b6d427df7

5 years agoLook in inttypes.h for UINT32_MAX.
Darren Tucker [Thu, 30 Jan 2020 07:54:42 +0000 (18:54 +1100)] 
Look in inttypes.h for UINT32_MAX.

Should prevent warnings on at least some AIX versions.

5 years agoupstream: use sshpkt_fatal() instead of plain fatal() for
djm@openbsd.org [Thu, 30 Jan 2020 07:21:38 +0000 (07:21 +0000)] 
upstream: use sshpkt_fatal() instead of plain fatal() for

ssh_packet_write_poll() failures here too as the former yields better error
messages; ok dtucker@

OpenBSD-Commit-ID: 1f7a6ca95bc2b716c2e948fc1370753be772d8e3

5 years agoupstream: check the return value of ssh_packet_write_poll() and
djm@openbsd.org [Thu, 30 Jan 2020 07:20:57 +0000 (07:20 +0000)] 
upstream: check the return value of ssh_packet_write_poll() and

call sshpkt_fatal() if it fails; avoid potential busy-loop under some
circumstances. Based on patch by Mike Frysinger; ok dtucker@

OpenBSD-Commit-ID: c79fe5cf4f0cd8074cb6db257c1394d5139408ec

5 years agoupstream: have sshpkt_fatal() save/restore errno before we
djm@openbsd.org [Thu, 30 Jan 2020 07:20:05 +0000 (07:20 +0000)] 
upstream: have sshpkt_fatal() save/restore errno before we

potentially call strerror() (via ssh_err()); ok dtucker

OpenBSD-Commit-ID: 5590df31d21405498c848245b85c24acb84ad787

5 years agoupstream: markus suggests a simplification to previous
djm@openbsd.org [Wed, 29 Jan 2020 08:17:49 +0000 (08:17 +0000)] 
upstream: markus suggests a simplification to previous

OpenBSD-Commit-ID: 10bbfb6607ebbb9a018dcd163f0964941adf58de

5 years agoupstream: give more context to UpdateHostKeys messages, mentioning
djm@openbsd.org [Wed, 29 Jan 2020 07:51:30 +0000 (07:51 +0000)] 
upstream: give more context to UpdateHostKeys messages, mentioning

that the changes are validated by the existing trusted host key. Prompted by
espie@ feedback and ok markus@

OpenBSD-Commit-ID: b3d95f4a45f2692f4143b9e77bb241184dbb8dc5

5 years agoupstream: changes to support FIDO attestation
djm@openbsd.org [Tue, 28 Jan 2020 08:01:34 +0000 (08:01 +0000)] 
upstream: changes to support FIDO attestation

Allow writing to disk the attestation certificate that is generated by
the FIDO token at key enrollment time. These certificates may be used
by an out-of-band workflow to prove that a particular key is held in
trustworthy hardware.

Allow passing in a challenge that will be sent to the card during
key enrollment. These are needed to build an attestation workflow
that resists replay attacks.

ok markus@

OpenBSD-Commit-ID: 457dc3c3d689ba39eed328f0817ed9b91a5f78f6

5 years agoupstream: disable UpdateHostKeys=ask when in quiet mode; "work for
djm@openbsd.org [Tue, 28 Jan 2020 07:24:15 +0000 (07:24 +0000)] 
upstream: disable UpdateHostKeys=ask when in quiet mode; "work for

me" matthieu@

OpenBSD-Commit-ID: 60d7b5eb91accf935ed9852650a826d86db2ddc7

5 years agocompat for missing IPTOS_DSCP_LE in system headers
Damien Miller [Tue, 28 Jan 2020 01:57:25 +0000 (12:57 +1100)] 
compat for missing IPTOS_DSCP_LE in system headers

5 years agoupstream: make IPTOS_DSCP_LE available via IPQoS directive; bz2986,
djm@openbsd.org [Tue, 28 Jan 2020 01:49:36 +0000 (01:49 +0000)] 
upstream: make IPTOS_DSCP_LE available via IPQoS directive; bz2986,

based on patch by veegish AT cyberstorm.mu

OpenBSD-Commit-ID: 9902bf4fbb4ea51de2193ac2b1d965bc5d99c425

5 years agoupstream: disable UpdateHostKeys=ask if command is specified; ok
markus@openbsd.org [Mon, 27 Jan 2020 20:51:32 +0000 (20:51 +0000)] 
upstream: disable UpdateHostKeys=ask if command is specified; ok

djm@ sthen@

OpenBSD-Commit-ID: e5bcc45eadb78896637d4143d289f1e42c2ef5d7

5 years agoupstream: unbreak unittests for recent API / source file changes
djm@openbsd.org [Sun, 26 Jan 2020 00:09:50 +0000 (00:09 +0000)] 
upstream: unbreak unittests for recent API / source file changes

OpenBSD-Regress-ID: 075a899a01bbf7781d38bf0b33d8366faaf6d3c0

5 years agoMove definition of UINT32_MAX.
Darren Tucker [Sun, 26 Jan 2020 04:09:15 +0000 (15:09 +1100)] 
Move definition of UINT32_MAX.

This allows us to always define it if needed not just if we also
define the type ourself.

5 years agoupstream: unbreak unittests for recent API / source file changes
djm@openbsd.org [Sun, 26 Jan 2020 00:09:50 +0000 (00:09 +0000)] 
upstream: unbreak unittests for recent API / source file changes

OpenBSD-Regress-ID: 075a899a01bbf7781d38bf0b33d8366faaf6d3c0

5 years agoInclude signal.h to prevent redefintion of _NSIG.
Darren Tucker [Sun, 26 Jan 2020 03:09:17 +0000 (14:09 +1100)] 
Include signal.h to prevent redefintion of _NSIG.

5 years agoWrap stdint.h in tests inside HAVE_STDINT_H.
Darren Tucker [Sun, 26 Jan 2020 02:40:51 +0000 (13:40 +1100)] 
Wrap stdint.h in tests inside HAVE_STDINT_H.

5 years agoupstream: for UpdateHostKeys, don't report errors for unsupported
djm@openbsd.org [Sun, 26 Jan 2020 00:14:45 +0000 (00:14 +0000)] 
upstream: for UpdateHostKeys, don't report errors for unsupported

key types - just ignore them. spotted by and ok dtucker@

OpenBSD-Commit-ID: 91769e443f6197c983932fc8ae9d39948727d473

5 years agoupstream: downgrade error() for missing subsequent known_hosts
djm@openbsd.org [Sun, 26 Jan 2020 00:13:20 +0000 (00:13 +0000)] 
upstream: downgrade error() for missing subsequent known_hosts

files to debug() as it was intended to be; spotted by dtucker@

OpenBSD-Commit-ID: 18cfea382cb52f2da761be524e309cc3d5354ef9

5 years agoupstream: clarify that BatchMode applies to all interactive prompts
djm@openbsd.org [Sat, 25 Jan 2020 23:33:27 +0000 (23:33 +0000)] 
upstream: clarify that BatchMode applies to all interactive prompts

(e.g. host key confirmation) and not just password prompts.

OpenBSD-Commit-ID: 97b001883d89d3fb1620d2e6b747c14a26aa9818

5 years agoupstream: tidy headers; some junk snuck into sshbuf-misc.c and
djm@openbsd.org [Sat, 25 Jan 2020 23:28:06 +0000 (23:28 +0000)] 
upstream: tidy headers; some junk snuck into sshbuf-misc.c and

sshbuf-io.c doesn't need SSHBUF_INTERNAL set

OpenBSD-Commit-ID: 27a724d2e0b2619c1a1490f44093bbd73580d9e6

5 years agodepend
Damien Miller [Sat, 25 Jan 2020 23:28:21 +0000 (10:28 +1100)] 
depend

5 years agoupstream: improve the error message for u2f enrollment errors by
djm@openbsd.org [Sat, 25 Jan 2020 23:13:09 +0000 (23:13 +0000)] 
upstream: improve the error message for u2f enrollment errors by

making ssh-keygen be solely responsible for printing the error message and
convertint some more common error responses from the middleware to a useful
ssherr.h status code. more detail remains visible via -v of course.

also remove indepedent copy of sk-api.h declarations in sk-usbhid.c
and just include it.

feedback & ok markus@

OpenBSD-Commit-ID: a4a8ffa870d9a3e0cfd76544bcdeef5c9fb1f1bb

5 years agoupstream: factor out reading/writing sshbufs to dedicated
djm@openbsd.org [Sat, 25 Jan 2020 23:02:13 +0000 (23:02 +0000)] 
upstream: factor out reading/writing sshbufs to dedicated

functions; feedback and ok markus@

OpenBSD-Commit-ID: dc09e5f1950b7acc91b8fdf8015347782d2ecd3d

5 years agoupstream: add a comment describing the ranges of channel IDs that
djm@openbsd.org [Sat, 25 Jan 2020 22:49:38 +0000 (22:49 +0000)] 
upstream: add a comment describing the ranges of channel IDs that

we use; requested by markus@

OpenBSD-Commit-ID: 83a1f09810ffa3a96a55fbe32675b34ba739e56b

5 years agoupstream: make sshd_config:ClientAliveCountMax=0 disable the
djm@openbsd.org [Sat, 25 Jan 2020 22:41:01 +0000 (22:41 +0000)] 
upstream: make sshd_config:ClientAliveCountMax=0 disable the

connection killing behaviour, rather than killing the connection after
sending the first liveness test probe (regardless of whether the client was
responsive) bz2627; ok markus

OpenBSD-Commit-ID: 5af79c35f4c9fa280643b6852f524bfcd9bccdaf

5 years agoupstream: clarify order of AllowUsers/DenyUsers vs
djm@openbsd.org [Sat, 25 Jan 2020 22:36:22 +0000 (22:36 +0000)] 
upstream: clarify order of AllowUsers/DenyUsers vs

AllowGroups/DenyGroups; bz1690, ok markus@

OpenBSD-Commit-ID: 5637584ec30db9cf64822460f41b3e42c8f9facd

5 years agoupstream: when AddKeysToAgent=yes is set and the key contains no
djm@openbsd.org [Sat, 25 Jan 2020 07:17:18 +0000 (07:17 +0000)] 
upstream: when AddKeysToAgent=yes is set and the key contains no

comment, add the key to the agent with the key's path as the comment. bz2564

OpenBSD-Commit-ID: 8dd8ca9340d7017631a27f4ed5358a4cfddec16f

5 years agoupstream: group14-sha1 is no longer a default algorithm
tedu@openbsd.org [Sat, 25 Jan 2020 07:09:14 +0000 (07:09 +0000)] 
upstream: group14-sha1 is no longer a default algorithm

OpenBSD-Commit-ID: a96f04d5e9c2ff760c6799579dc44f69b4ff431d

5 years agoupstream: reword HashKnownHosts description a little more; some
djm@openbsd.org [Sat, 25 Jan 2020 07:02:51 +0000 (07:02 +0000)] 
upstream: reword HashKnownHosts description a little more; some

people found the wording confusing (bz#2560)

OpenBSD-Commit-ID: ac30896598694f07d498828690aecd424c496988

5 years agoupstream: weaken the language for what HashKnownHosts provides with
djm@openbsd.org [Sat, 25 Jan 2020 07:01:00 +0000 (07:01 +0000)] 
upstream: weaken the language for what HashKnownHosts provides with

regards to known_hosts name privacy, it's not practical for this option to
offer any guarantee that hostnames cannot be recovered from a disclosed
known_hosts file (e.g. by brute force).

OpenBSD-Commit-ID: 13f1e3285f8acf7244e9770074296bcf446c6972

5 years agoupstream: the GatewayPorts vs -R listen address selection logic is
djm@openbsd.org [Sat, 25 Jan 2020 06:40:20 +0000 (06:40 +0000)] 
upstream: the GatewayPorts vs -R listen address selection logic is

still confusing people, so add another comment explaining the special
handling of "localhost"; bz#3258

OpenBSD-Commit-ID: e6bf0f0fbf1c7092bf0dbd9c6eab105970b5b53a

5 years agoupstream: mention that permitopen=/PermitOpen do no name to address
djm@openbsd.org [Sat, 25 Jan 2020 06:03:10 +0000 (06:03 +0000)] 
upstream: mention that permitopen=/PermitOpen do no name to address

translation; prompted by bz3099

OpenBSD-Commit-ID: 0dda8e54d566b29855e76bebf9cfecce573f5c23

5 years agoinclude tunnel device path in error message
Damien Miller [Sat, 25 Jan 2020 05:30:22 +0000 (16:30 +1100)] 
include tunnel device path in error message

5 years agoupstream: unrevert this:
djm@openbsd.org [Sat, 25 Jan 2020 04:48:26 +0000 (04:48 +0000)] 
upstream: unrevert this:

> revision 1.217
> date: 2019/11/27 03:34:04;  author: dtucker;  state: Exp;  lines: +5 -7;  commitid: wkiMn49XJyjzoJIs;
> Make channel_id u_int32_t and remove unnecessary check and cast that were
> left over from the type conversion.  Noted by t-hashida@amiya.co.jp in
> bz#3098, ok markus@ djm@

Darren was right the first time; ok dtucker@ "agreed" markus@

OpenBSD-Commit-ID: 641dd1b99a6bbd85b7160da462ae1be83432c7c8

5 years agoupstream: Move setting $NC into test-exec since it's now used by
dtucker@openbsd.org [Sat, 25 Jan 2020 02:57:53 +0000 (02:57 +0000)] 
upstream: Move setting $NC into test-exec since it's now used by

multiple tests, and in -portable we use our own local copy to avoid
portability problems.

OpenBSD-Regress-ID: ceb78445fcaac317bec2fc51b3f0d9589048c114

5 years agoPut EC key export inside OPENSSL_HAS_ECC.
Darren Tucker [Sat, 25 Jan 2020 02:05:42 +0000 (13:05 +1100)] 
Put EC key export inside OPENSSL_HAS_ECC.

Fixes link error when building against an OpenSSL that does not have
ECC.

5 years agoupstream: Wait a bit longer for the multiplex master to become ready
dtucker@openbsd.org [Sat, 25 Jan 2020 00:27:56 +0000 (00:27 +0000)] 
upstream: Wait a bit longer for the multiplex master to become ready

since on very slow hosts the current delay is not sufficient and the test
will fail.

OpenBSD-Regress-ID: 6d90c7475d67ac3a95610b64af700629ece51a48

5 years agoupstream: Add a connection test for proxycommand. This would have
dtucker@openbsd.org [Fri, 24 Jan 2020 10:08:17 +0000 (10:08 +0000)] 
upstream: Add a connection test for proxycommand. This would have

caught the problem caused by ssh.c rev 1.507 wherein Host and Hostname were
swapped.  Prompted by beck@

OpenBSD-Regress-ID: d218500ae6aca4c479c27318fb5b09ebc00f7aae

5 years agoupstream: set UpdateKnownHosts=ask by default; bz#2894; ok
djm@openbsd.org [Sat, 25 Jan 2020 00:22:31 +0000 (00:22 +0000)] 
upstream: set UpdateKnownHosts=ask by default; bz#2894; ok

markus@

OpenBSD-Commit-ID: f09cb3177f3a14c96428e14f347e976a8a531fee

5 years agoupstream: allow UpdateKnownHosts=yes to function when multiple
djm@openbsd.org [Sat, 25 Jan 2020 00:21:08 +0000 (00:21 +0000)] 
upstream: allow UpdateKnownHosts=yes to function when multiple

known_hosts files are in use. When updating host keys, ssh will now search
subsequent known_hosts files, but will add new/changed host keys to the first
specified file only. bz#2738

ok markus@

OpenBSD-Commit-ID: 6ded6d878a03e57d5aa20bab9c31f92e929dbc6c

5 years agoupstream: process security key provider via realpath() in agent,
djm@openbsd.org [Sat, 25 Jan 2020 00:06:48 +0000 (00:06 +0000)] 
upstream: process security key provider via realpath() in agent,

avoids malicious client from being able to cause agent to load arbitrary
libraries into ssh-sk-helper.

reported by puck AT puckipedia.com; ok markus

OpenBSD-Commit-ID: 1086643df1b7eee4870825c687cf0c26a6145d1c

5 years agoupstream: expose PKCS#11 key labels/X.509 subjects as comments
djm@openbsd.org [Sat, 25 Jan 2020 00:03:36 +0000 (00:03 +0000)] 
upstream: expose PKCS#11 key labels/X.509 subjects as comments

Extract the key label or X.509 subject string when PKCS#11 keys
are retrieved from the token and plumb this through to places where
it may be used as a comment.

based on https://github.com/openssh/openssh-portable/pull/138
by Danielle Church

feedback and ok markus@

OpenBSD-Commit-ID: cae1fda10d9e10971dea29520916e27cfec7ca35

5 years agoupstream: tweak proctitle to include sshd arguments, as these are
djm@openbsd.org [Fri, 24 Jan 2020 23:56:01 +0000 (23:56 +0000)] 
upstream: tweak proctitle to include sshd arguments, as these are

frequently used to distinguish between multiple independent instances of the
server. New proctitle looks like this:

$ pgrep -lf sshd
12844 sshd: /usr/sbin/sshd -f /etc/ssh/sshd_config [listener] 0 of 10-100 startups

requested by sthen@ and aja@; ok aja@

OpenBSD-Commit-ID: cf235a561c655a3524a82003cf7244ecb48ccc1e

5 years agoupstream: add xextendf() to extend a string with a format
djm@openbsd.org [Fri, 24 Jan 2020 23:54:40 +0000 (23:54 +0000)] 
upstream: add xextendf() to extend a string with a format

(reallocating as necessary). ok aja@ as part of a larger diff

OpenBSD-Commit-ID: 30796b50d330b3e0e201747fe40cdf9aa70a77f9

5 years agoupstream: minor tweaks to ssh-keygen -Y find-principals:
djm@openbsd.org [Fri, 24 Jan 2020 05:33:01 +0000 (05:33 +0000)] 
upstream: minor tweaks to ssh-keygen -Y find-principals:

emit matched principals one per line to stdout rather than as comma-
separated and with a free-text preamble (easy confusion opportunity)

emit "not found" error to stderr

fix up argument testing for -Y operations and improve error message for
unsupported operations

OpenBSD-Commit-ID: 3d9c9a671ab07fc04a48f543edfa85eae77da69c

5 years agoupstream: remove ssh-rsa (SHA1) from the list of allowed CA
djm@openbsd.org [Fri, 24 Jan 2020 00:28:57 +0000 (00:28 +0000)] 
upstream: remove ssh-rsa (SHA1) from the list of allowed CA

signature algorithms ok markus

OpenBSD-Commit-ID: da3481fca8c81e6951f319a86b7be67502237f57

5 years agoupstream: when signing a certificate with an RSA key, default to
djm@openbsd.org [Fri, 24 Jan 2020 00:27:04 +0000 (00:27 +0000)] 
upstream: when signing a certificate with an RSA key, default to

a safe signature algorithm (rsa-sha-512) if not is explicitly specified by
the user; ok markus@

OpenBSD-Commit-ID: e05f638f0be6c0266e1d3d799716b461011e83a9

5 years agoupstream: allow PEM export of DSA and ECDSA keys; bz3091, patch
djm@openbsd.org [Fri, 24 Jan 2020 00:00:31 +0000 (00:00 +0000)] 
upstream: allow PEM export of DSA and ECDSA keys; bz3091, patch

from Jakub Jelen ok markus@

OpenBSD-Commit-ID: a58edec8b9f07acab4b962a71a5125830d321b51

5 years agoupstream: ssh-keygen -Y find-principals fixes based on feedback
djm@openbsd.org [Thu, 23 Jan 2020 23:31:52 +0000 (23:31 +0000)] 
upstream: ssh-keygen -Y find-principals fixes based on feedback

from Markus:

use "principals" instead of principal, as allowed_signers lines may list
multiple.

When the signing key is a certificate, emit only principals that match
the certificate principal list.

NB. the command -Y name changes: "find-principal" => "find-principals"

ok markus@

OpenBSD-Commit-ID: ab575946ff9a55624cd4e811bfd338bf3b1d0faf

5 years agoupstream: Do not warn about permissions on symlinks.
dtucker@openbsd.org [Fri, 24 Jan 2020 01:29:23 +0000 (01:29 +0000)] 
upstream: Do not warn about permissions on symlinks.

OpenBSD-Regress-ID: 339d4cbae224bd8743ffad9c3afb0cf3cb66c357

5 years agoupstream: Handle zlib compression being disabled now that it's
dtucker@openbsd.org [Thu, 23 Jan 2020 11:19:12 +0000 (11:19 +0000)] 
upstream: Handle zlib compression being disabled now that it's

optional.

OpenBSD-Regress-ID: 0af4fbc5168e62f89d0350de524bff1cb00e707a

5 years agoupstream: Fix typo in comment.
dtucker@openbsd.org [Thu, 23 Jan 2020 10:53:04 +0000 (10:53 +0000)] 
upstream: Fix typo in comment.

OpenBSD-Commit-ID: d1d7a6553208bf439378fd1cf686a828aceb353a

5 years agoupstream: When checking for unsafe directories, ignore non-directories
dtucker@openbsd.org [Thu, 23 Jan 2020 10:19:59 +0000 (10:19 +0000)] 
upstream: When checking for unsafe directories, ignore non-directories

(ie symlinks, where permissions are not relevant).

OpenBSD-Regress-ID: fb6cfc8b022becb62b2dcb99ed3f072b3326e501

5 years agozlib is now optional.
Darren Tucker [Thu, 23 Jan 2020 11:17:24 +0000 (22:17 +1100)] 
zlib is now optional.

5 years agoPlumb WITH_ZLIB into configure.
Darren Tucker [Thu, 23 Jan 2020 11:16:51 +0000 (22:16 +1100)] 
Plumb WITH_ZLIB into configure.

This allows zlib support to be disabled by ./configure --without-zlib.

5 years agoupstream: Make zlib optional. This adds a "ZLIB" build time option
dtucker@openbsd.org [Thu, 23 Jan 2020 10:24:29 +0000 (10:24 +0000)] 
upstream: Make zlib optional. This adds a "ZLIB" build time option

that allows building without zlib compression and associated options.  With
feedback from markus@, ok djm@

OpenBSD-Commit-ID: 44c6e1133a90fd15a3aa865bdedc53bab28b7910

5 years agoupstream: remove trailing period characters from pub/priv key
djm@openbsd.org [Thu, 23 Jan 2020 07:54:04 +0000 (07:54 +0000)] 
upstream: remove trailing period characters from pub/priv key

pathnames - they make them needlessly more difficult to cut and paste without
error; ok markus@ & dtucker@

OpenBSD-Commit-ID: abdcfd1a5723fcac0711feee7665edc66ae2335a

5 years agoFix a couple of mysig_t leftovers.
Darren Tucker [Thu, 23 Jan 2020 10:06:45 +0000 (21:06 +1100)] 
Fix a couple of mysig_t leftovers.

5 years agoRemove mysignal wrapper.
Darren Tucker [Thu, 23 Jan 2020 07:55:24 +0000 (18:55 +1100)] 
Remove mysignal wrapper.

We switched the main code to use sigaction(), so the wrapper is no
longer used.

5 years agoupstream: new sentence, new line;
jmc@openbsd.org [Thu, 23 Jan 2020 07:16:38 +0000 (07:16 +0000)] 
upstream: new sentence, new line;

OpenBSD-Commit-ID: b6c3f2f36ec77e99198619b38a9f146655281925

5 years agoupstream: Replace all calls to signal(2) with a wrapper around
dtucker@openbsd.org [Thu, 23 Jan 2020 07:10:22 +0000 (07:10 +0000)] 
upstream: Replace all calls to signal(2) with a wrapper around

sigaction(2). This wrapper blocks all other signals during the handler
preventing races between handlers, and sets SA_RESTART which should reduce
the potential for short read/write operations.

OpenBSD-Commit-ID: 5e047663fd77a40d7b07bdabe68529df51fd2519

5 years agoupstream: missing header change from previous; spotted by dtucker@
djm@openbsd.org [Thu, 23 Jan 2020 04:54:34 +0000 (04:54 +0000)] 
upstream: missing header change from previous; spotted by dtucker@

OpenBSD-Commit-ID: 321ce74c0a5bbd0f02fa3f20cb5cf2a952c6b96f

5 years agoupstream: Check for and warn about StrictModes permission problems. ok tb@
dtucker@openbsd.org [Thu, 23 Jan 2020 03:42:41 +0000 (03:42 +0000)] 
upstream: Check for and warn about StrictModes permission problems. ok tb@

OpenBSD-Regress-ID: 4841704ccdee50ee7efc6035bc686695c6ac2991

5 years agoupstream: Also test PuTTY chacha20.
dtucker@openbsd.org [Thu, 23 Jan 2020 03:35:07 +0000 (03:35 +0000)] 
upstream: Also test PuTTY chacha20.

OpenBSD-Regress-ID: 7af6a0e8763b05f1f8eee6bca5f31fcb16151040

5 years agoupstream: Also test PuTTY ecdh kex methods.
dtucker@openbsd.org [Thu, 23 Jan 2020 03:24:38 +0000 (03:24 +0000)] 
upstream: Also test PuTTY ecdh kex methods.

OpenBSD-Regress-ID: ec4017dce612131842398a03e93007a869c2c133