]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
djm@openbsd.org [Fri, 28 Feb 2020 01:07:28 +0000 (01:07 +0000)]
upstream: no-touch-required certificate option should be an
extension, not a critical option.
OpenBSD-Commit-ID:
626b22c5feb7be8a645e4b9a9bef89893b88600d
djm@openbsd.org [Fri, 28 Feb 2020 01:06:05 +0000 (01:06 +0000)]
upstream: better error message when trying to use a FIDO key
function and SecurityKeyProvider is empty
OpenBSD-Commit-ID:
e56602c2ee8c82f835d30e4dc8ee2e4a7896be24
djm@openbsd.org [Fri, 14 Feb 2020 00:39:20 +0000 (00:39 +0000)]
upstream: openssh-8.2
OpenBSD-Commit-ID:
0a1340ff65fad0d84b997ac58dd1b393dec7c19b
Damien Miller [Tue, 11 Feb 2020 22:28:35 +0000 (09:28 +1100)]
crank version numbers
Darren Tucker [Tue, 11 Feb 2020 01:51:24 +0000 (12:51 +1100)]
Minor documentation update:
- remove duplication of dependency information (it's all in INSTALL).
- SSHFP is now an RFC.
Darren Tucker [Sun, 9 Feb 2020 00:23:35 +0000 (11:23 +1100)]
Check if UINT32_MAX is defined before redefining.
Damien Miller [Fri, 7 Feb 2020 04:07:27 +0000 (15:07 +1100)]
typo; reported by Phil Pennock
djm@openbsd.org [Fri, 7 Feb 2020 03:57:31 +0000 (03:57 +0000)]
upstream: sync the description of the $SSH_SK_PROVIDER environment
variable with that of the SecurityKeyProvider ssh/sshd_config(5) directive,
as the latter was more descriptive.
OpenBSD-Commit-ID:
0488f09530524a7e53afca6b6e1780598022552f
dtucker@openbsd.org [Fri, 7 Feb 2020 03:54:44 +0000 (03:54 +0000)]
upstream: Add ssh -Q key-sig for all key and signature types.
Teach ssh -Q to accept ssh_config(5) and sshd_config(5) algorithm keywords as
an alias for the corresponding query. Man page help jmc@, ok djm@.
OpenBSD-Commit-ID:
1e110aee3db2fc4bc5bee2d893b7128fd622e0f8
djm@openbsd.org [Fri, 7 Feb 2020 03:27:54 +0000 (03:27 +0000)]
upstream: fix two PIN entry bugs on FIDO keygen: 1) it would allow more
than the intended number of prompts (3) and 2) it would SEGV too many
incorrect PINs were entered; based on patch by Gabriel Kihlman
OpenBSD-Commit-ID:
9c0011f28ba8bd8adf2014424b64960333da1718
djm@openbsd.org [Thu, 6 Feb 2020 22:48:23 +0000 (22:48 +0000)]
upstream: When using HostkeyAlgorithms to merely append or remove
algorithms from the default set (i.e. HostkeyAlgorithms=+/-...), retain the
default behaviour of preferring those algorithms that have existing keys in
known_hosts; ok markus
OpenBSD-Commit-ID:
040e7fcc38ea00146b5d224ce31ce7a1795ee6ed
djm@openbsd.org [Thu, 6 Feb 2020 22:46:31 +0000 (22:46 +0000)]
upstream: expand HostkeyAlgorithms prior to config dump, matching
other algorithm lists; ok markus@
OpenBSD-Commit-ID:
a66f0fca8cc5ce30405a2867bc115fff600671d0
naddy@openbsd.org [Thu, 6 Feb 2020 22:34:58 +0000 (22:34 +0000)]
upstream: Add Include to the list of permitted keywords after a
Match keyword. ok markus@
OpenBSD-Commit-ID:
342e940538b13dd41e0fa167dc9ab192b9f6e2eb
naddy@openbsd.org [Thu, 6 Feb 2020 22:30:54 +0000 (22:30 +0000)]
upstream: Replace "security key" with "authenticator" in program
messages.
This replaces "security key" in error/usage/verbose messages and
distinguishes between "authenticator" and "authenticator-hosted key".
ok djm@
OpenBSD-Commit-ID:
7c63800e9c340c59440a054cde9790a78f18592e
Darren Tucker [Thu, 6 Feb 2020 00:28:14 +0000 (11:28 +1100)]
Don't look for UINT32_MAX in inttypes.h
... unless we are actually going to use it. Fixes build on HP-UX
without the potential impact to other platforms of a header change
shortly before release.
Damien Miller [Thu, 6 Feb 2020 01:02:22 +0000 (12:02 +1100)]
depend
Michael Forney [Thu, 28 Nov 2019 03:17:26 +0000 (19:17 -0800)]
Fix sha2 MAKE_CLONE no-op definition
The point of the dummy declaration is so that MAKE_CLONE(...) can have
a trailing semicolon without introducing an empty declaration. So,
the macro replacement text should *not* have a trailing semicolon,
just like DEF_WEAK.
djm@openbsd.org [Tue, 4 Feb 2020 09:58:04 +0000 (09:58 +0000)]
upstream: require FIDO application strings to start with "ssh:"; ok
markus@
OpenBSD-Commit-ID:
94e9c1c066d42b76f035a3d58250a32b14000afb
djm@openbsd.org [Mon, 3 Feb 2020 23:47:57 +0000 (23:47 +0000)]
upstream: revert enabling UpdateHostKeys by default - there are still
corner cases we need to address; ok markus
OpenBSD-Commit-ID:
ff7ad941bfdc49fb1d8baa95fd0717a61adcad57
jmc@openbsd.org [Mon, 3 Feb 2020 08:15:37 +0000 (08:15 +0000)]
upstream: use better markup for challenge and write-attestation, and
rejig the challenge text a little;
ok djm
OpenBSD-Commit-ID:
9f351e6da9edfdc907d5c3fdaf2e9ff3ab0a7a6f
Damien Miller [Mon, 3 Feb 2020 10:22:15 +0000 (21:22 +1100)]
mention libfido2 in dependencies section
Damien Miller [Mon, 3 Feb 2020 08:40:12 +0000 (19:40 +1100)]
add clock_gettime64(2) to sandbox allowed syscalls
bz3093
dtucker@openbsd.org [Sun, 2 Feb 2020 09:45:34 +0000 (09:45 +0000)]
upstream: Output (none) in debug in the case in the CheckHostIP=no case
as suggested by markus@
OpenBSD-Commit-ID:
4ab9117ee5261cbbd1868717fcc3142eea6385cf
dtucker@openbsd.org [Sun, 2 Feb 2020 09:22:22 +0000 (09:22 +0000)]
upstream: Prevent possible null pointer deref of ip_str in debug.
OpenBSD-Commit-ID:
37b252e2e6f690efed6682437ef75734dbc8addf
jmc@openbsd.org [Sun, 2 Feb 2020 07:36:50 +0000 (07:36 +0000)]
upstream: shuffle the challenge keyword to keep the -O list sorted;
OpenBSD-Commit-ID:
08efad608b790949a9a048d65578fae9ed5845fe
jmc@openbsd.org [Sat, 1 Feb 2020 06:53:12 +0000 (06:53 +0000)]
upstream: tweak previous;
OpenBSD-Commit-ID:
0c42851cdc88583402b4ab2b110a6348563626d3
Darren Tucker [Sat, 1 Feb 2020 06:25:09 +0000 (17:25 +1100)]
Use sys-queue.h from compat library.
Fixes build on platforms that don't have sys/queue.h (eg MUSL).
djm@openbsd.org [Fri, 31 Jan 2020 23:25:08 +0000 (23:25 +0000)]
upstream: regress test for sshd_config Include directive; from Jakub
Jelen
OpenBSD-Regress-ID:
0d9224de3297c7a5f51ba68d6e3725a2a9345fa4
djm@openbsd.org [Fri, 31 Jan 2020 23:13:04 +0000 (23:13 +0000)]
upstream: whitespace
OpenBSD-Commit-ID:
564cf7a5407ecf5da2d94ec15474e07427986772
djm@openbsd.org [Fri, 31 Jan 2020 23:11:25 +0000 (23:11 +0000)]
upstream: force early logging to stderr if debug_flag (-d) is set;
avoids missing messages from re-exec config passing
OpenBSD-Commit-ID:
02484b8241c1f49010e7a543a7098e6910a8c9ff
djm@openbsd.org [Fri, 31 Jan 2020 23:08:08 +0000 (23:08 +0000)]
upstream: mistake in previous: filling the incorrect buffer
OpenBSD-Commit-ID:
862ee84bd4b97b529f64aec5d800c3dcde952e3a
djm@openbsd.org [Fri, 31 Jan 2020 22:42:45 +0000 (22:42 +0000)]
upstream: Add a sshd_config "Include" directive to allow inclusion
of files. This has sensible semantics wrt Match blocks and accepts glob(3)
patterns to specify the included files. Based on patch by Jakub Jelen in
bz2468; feedback and ok markus@
OpenBSD-Commit-ID:
36ed0e845b872e33f03355b936a4fff02d5794ff
jmc@openbsd.org [Fri, 31 Jan 2020 22:25:59 +0000 (22:25 +0000)]
upstream: spelling fix;
OpenBSD-Commit-ID:
3c079523c4b161725a4b15dd06348186da912402
djm@openbsd.org [Thu, 30 Jan 2020 22:25:34 +0000 (22:25 +0000)]
upstream: document changed default for UpdateHostKeys
OpenBSD-Commit-ID:
25c390b21d142f78ac0106241d13441c4265fd2c
djm@openbsd.org [Thu, 30 Jan 2020 22:19:32 +0000 (22:19 +0000)]
upstream: enable UpdateKnownHosts=yes if the configuration
specifies only the default known_hosts files, otherwise select
UpdateKnownHosts=ask; ok markus@
OpenBSD-Commit-ID:
ab401a5ec4a33d2e1a9449eae6202e4b6d427df7
Darren Tucker [Thu, 30 Jan 2020 07:54:42 +0000 (18:54 +1100)]
Look in inttypes.h for UINT32_MAX.
Should prevent warnings on at least some AIX versions.
djm@openbsd.org [Thu, 30 Jan 2020 07:21:38 +0000 (07:21 +0000)]
upstream: use sshpkt_fatal() instead of plain fatal() for
ssh_packet_write_poll() failures here too as the former yields better error
messages; ok dtucker@
OpenBSD-Commit-ID:
1f7a6ca95bc2b716c2e948fc1370753be772d8e3
djm@openbsd.org [Thu, 30 Jan 2020 07:20:57 +0000 (07:20 +0000)]
upstream: check the return value of ssh_packet_write_poll() and
call sshpkt_fatal() if it fails; avoid potential busy-loop under some
circumstances. Based on patch by Mike Frysinger; ok dtucker@
OpenBSD-Commit-ID:
c79fe5cf4f0cd8074cb6db257c1394d5139408ec
djm@openbsd.org [Thu, 30 Jan 2020 07:20:05 +0000 (07:20 +0000)]
upstream: have sshpkt_fatal() save/restore errno before we
potentially call strerror() (via ssh_err()); ok dtucker
OpenBSD-Commit-ID:
5590df31d21405498c848245b85c24acb84ad787
djm@openbsd.org [Wed, 29 Jan 2020 08:17:49 +0000 (08:17 +0000)]
upstream: markus suggests a simplification to previous
OpenBSD-Commit-ID:
10bbfb6607ebbb9a018dcd163f0964941adf58de
djm@openbsd.org [Wed, 29 Jan 2020 07:51:30 +0000 (07:51 +0000)]
upstream: give more context to UpdateHostKeys messages, mentioning
that the changes are validated by the existing trusted host key. Prompted by
espie@ feedback and ok markus@
OpenBSD-Commit-ID:
b3d95f4a45f2692f4143b9e77bb241184dbb8dc5
djm@openbsd.org [Tue, 28 Jan 2020 08:01:34 +0000 (08:01 +0000)]
upstream: changes to support FIDO attestation
Allow writing to disk the attestation certificate that is generated by
the FIDO token at key enrollment time. These certificates may be used
by an out-of-band workflow to prove that a particular key is held in
trustworthy hardware.
Allow passing in a challenge that will be sent to the card during
key enrollment. These are needed to build an attestation workflow
that resists replay attacks.
ok markus@
OpenBSD-Commit-ID:
457dc3c3d689ba39eed328f0817ed9b91a5f78f6
djm@openbsd.org [Tue, 28 Jan 2020 07:24:15 +0000 (07:24 +0000)]
upstream: disable UpdateHostKeys=ask when in quiet mode; "work for
me" matthieu@
OpenBSD-Commit-ID:
60d7b5eb91accf935ed9852650a826d86db2ddc7
Damien Miller [Tue, 28 Jan 2020 01:57:25 +0000 (12:57 +1100)]
compat for missing IPTOS_DSCP_LE in system headers
djm@openbsd.org [Tue, 28 Jan 2020 01:49:36 +0000 (01:49 +0000)]
upstream: make IPTOS_DSCP_LE available via IPQoS directive; bz2986,
based on patch by veegish AT cyberstorm.mu
OpenBSD-Commit-ID:
9902bf4fbb4ea51de2193ac2b1d965bc5d99c425
markus@openbsd.org [Mon, 27 Jan 2020 20:51:32 +0000 (20:51 +0000)]
upstream: disable UpdateHostKeys=ask if command is specified; ok
djm@ sthen@
OpenBSD-Commit-ID:
e5bcc45eadb78896637d4143d289f1e42c2ef5d7
djm@openbsd.org [Sun, 26 Jan 2020 00:09:50 +0000 (00:09 +0000)]
upstream: unbreak unittests for recent API / source file changes
OpenBSD-Regress-ID:
075a899a01bbf7781d38bf0b33d8366faaf6d3c0
Darren Tucker [Sun, 26 Jan 2020 04:09:15 +0000 (15:09 +1100)]
Move definition of UINT32_MAX.
This allows us to always define it if needed not just if we also
define the type ourself.
djm@openbsd.org [Sun, 26 Jan 2020 00:09:50 +0000 (00:09 +0000)]
upstream: unbreak unittests for recent API / source file changes
OpenBSD-Regress-ID:
075a899a01bbf7781d38bf0b33d8366faaf6d3c0
Darren Tucker [Sun, 26 Jan 2020 03:09:17 +0000 (14:09 +1100)]
Include signal.h to prevent redefintion of _NSIG.
Darren Tucker [Sun, 26 Jan 2020 02:40:51 +0000 (13:40 +1100)]
Wrap stdint.h in tests inside HAVE_STDINT_H.
djm@openbsd.org [Sun, 26 Jan 2020 00:14:45 +0000 (00:14 +0000)]
upstream: for UpdateHostKeys, don't report errors for unsupported
key types - just ignore them. spotted by and ok dtucker@
OpenBSD-Commit-ID:
91769e443f6197c983932fc8ae9d39948727d473
djm@openbsd.org [Sun, 26 Jan 2020 00:13:20 +0000 (00:13 +0000)]
upstream: downgrade error() for missing subsequent known_hosts
files to debug() as it was intended to be; spotted by dtucker@
OpenBSD-Commit-ID:
18cfea382cb52f2da761be524e309cc3d5354ef9
djm@openbsd.org [Sat, 25 Jan 2020 23:33:27 +0000 (23:33 +0000)]
upstream: clarify that BatchMode applies to all interactive prompts
(e.g. host key confirmation) and not just password prompts.
OpenBSD-Commit-ID:
97b001883d89d3fb1620d2e6b747c14a26aa9818
djm@openbsd.org [Sat, 25 Jan 2020 23:28:06 +0000 (23:28 +0000)]
upstream: tidy headers; some junk snuck into sshbuf-misc.c and
sshbuf-io.c doesn't need SSHBUF_INTERNAL set
OpenBSD-Commit-ID:
27a724d2e0b2619c1a1490f44093bbd73580d9e6
Damien Miller [Sat, 25 Jan 2020 23:28:21 +0000 (10:28 +1100)]
depend
djm@openbsd.org [Sat, 25 Jan 2020 23:13:09 +0000 (23:13 +0000)]
upstream: improve the error message for u2f enrollment errors by
making ssh-keygen be solely responsible for printing the error message and
convertint some more common error responses from the middleware to a useful
ssherr.h status code. more detail remains visible via -v of course.
also remove indepedent copy of sk-api.h declarations in sk-usbhid.c
and just include it.
feedback & ok markus@
OpenBSD-Commit-ID:
a4a8ffa870d9a3e0cfd76544bcdeef5c9fb1f1bb
djm@openbsd.org [Sat, 25 Jan 2020 23:02:13 +0000 (23:02 +0000)]
upstream: factor out reading/writing sshbufs to dedicated
functions; feedback and ok markus@
OpenBSD-Commit-ID:
dc09e5f1950b7acc91b8fdf8015347782d2ecd3d
djm@openbsd.org [Sat, 25 Jan 2020 22:49:38 +0000 (22:49 +0000)]
upstream: add a comment describing the ranges of channel IDs that
we use; requested by markus@
OpenBSD-Commit-ID:
83a1f09810ffa3a96a55fbe32675b34ba739e56b
djm@openbsd.org [Sat, 25 Jan 2020 22:41:01 +0000 (22:41 +0000)]
upstream: make sshd_config:ClientAliveCountMax=0 disable the
connection killing behaviour, rather than killing the connection after
sending the first liveness test probe (regardless of whether the client was
responsive) bz2627; ok markus
OpenBSD-Commit-ID:
5af79c35f4c9fa280643b6852f524bfcd9bccdaf
djm@openbsd.org [Sat, 25 Jan 2020 22:36:22 +0000 (22:36 +0000)]
upstream: clarify order of AllowUsers/DenyUsers vs
AllowGroups/DenyGroups; bz1690, ok markus@
OpenBSD-Commit-ID:
5637584ec30db9cf64822460f41b3e42c8f9facd
djm@openbsd.org [Sat, 25 Jan 2020 07:17:18 +0000 (07:17 +0000)]
upstream: when AddKeysToAgent=yes is set and the key contains no
comment, add the key to the agent with the key's path as the comment. bz2564
OpenBSD-Commit-ID:
8dd8ca9340d7017631a27f4ed5358a4cfddec16f
tedu@openbsd.org [Sat, 25 Jan 2020 07:09:14 +0000 (07:09 +0000)]
upstream: group14-sha1 is no longer a default algorithm
OpenBSD-Commit-ID:
a96f04d5e9c2ff760c6799579dc44f69b4ff431d
djm@openbsd.org [Sat, 25 Jan 2020 07:02:51 +0000 (07:02 +0000)]
upstream: reword HashKnownHosts description a little more; some
people found the wording confusing (bz#2560)
OpenBSD-Commit-ID:
ac30896598694f07d498828690aecd424c496988
djm@openbsd.org [Sat, 25 Jan 2020 07:01:00 +0000 (07:01 +0000)]
upstream: weaken the language for what HashKnownHosts provides with
regards to known_hosts name privacy, it's not practical for this option to
offer any guarantee that hostnames cannot be recovered from a disclosed
known_hosts file (e.g. by brute force).
OpenBSD-Commit-ID:
13f1e3285f8acf7244e9770074296bcf446c6972
djm@openbsd.org [Sat, 25 Jan 2020 06:40:20 +0000 (06:40 +0000)]
upstream: the GatewayPorts vs -R listen address selection logic is
still confusing people, so add another comment explaining the special
handling of "localhost"; bz#3258
OpenBSD-Commit-ID:
e6bf0f0fbf1c7092bf0dbd9c6eab105970b5b53a
djm@openbsd.org [Sat, 25 Jan 2020 06:03:10 +0000 (06:03 +0000)]
upstream: mention that permitopen=/PermitOpen do no name to address
translation; prompted by bz3099
OpenBSD-Commit-ID:
0dda8e54d566b29855e76bebf9cfecce573f5c23
Damien Miller [Sat, 25 Jan 2020 05:30:22 +0000 (16:30 +1100)]
include tunnel device path in error message
djm@openbsd.org [Sat, 25 Jan 2020 04:48:26 +0000 (04:48 +0000)]
upstream: unrevert this:
> revision 1.217
> date: 2019/11/27 03:34:04; author: dtucker; state: Exp; lines: +5 -7; commitid: wkiMn49XJyjzoJIs;
> Make channel_id u_int32_t and remove unnecessary check and cast that were
> left over from the type conversion. Noted by t-hashida@amiya.co.jp in
> bz#3098, ok markus@ djm@
Darren was right the first time; ok dtucker@ "agreed" markus@
OpenBSD-Commit-ID:
641dd1b99a6bbd85b7160da462ae1be83432c7c8
dtucker@openbsd.org [Sat, 25 Jan 2020 02:57:53 +0000 (02:57 +0000)]
upstream: Move setting $NC into test-exec since it's now used by
multiple tests, and in -portable we use our own local copy to avoid
portability problems.
OpenBSD-Regress-ID:
ceb78445fcaac317bec2fc51b3f0d9589048c114
Darren Tucker [Sat, 25 Jan 2020 02:05:42 +0000 (13:05 +1100)]
Put EC key export inside OPENSSL_HAS_ECC.
Fixes link error when building against an OpenSSL that does not have
ECC.
dtucker@openbsd.org [Sat, 25 Jan 2020 00:27:56 +0000 (00:27 +0000)]
upstream: Wait a bit longer for the multiplex master to become ready
since on very slow hosts the current delay is not sufficient and the test
will fail.
OpenBSD-Regress-ID:
6d90c7475d67ac3a95610b64af700629ece51a48
dtucker@openbsd.org [Fri, 24 Jan 2020 10:08:17 +0000 (10:08 +0000)]
upstream: Add a connection test for proxycommand. This would have
caught the problem caused by ssh.c rev 1.507 wherein Host and Hostname were
swapped. Prompted by beck@
OpenBSD-Regress-ID:
d218500ae6aca4c479c27318fb5b09ebc00f7aae
djm@openbsd.org [Sat, 25 Jan 2020 00:22:31 +0000 (00:22 +0000)]
upstream: set UpdateKnownHosts=ask by default; bz#2894; ok
markus@
OpenBSD-Commit-ID:
f09cb3177f3a14c96428e14f347e976a8a531fee
djm@openbsd.org [Sat, 25 Jan 2020 00:21:08 +0000 (00:21 +0000)]
upstream: allow UpdateKnownHosts=yes to function when multiple
known_hosts files are in use. When updating host keys, ssh will now search
subsequent known_hosts files, but will add new/changed host keys to the first
specified file only. bz#2738
ok markus@
OpenBSD-Commit-ID:
6ded6d878a03e57d5aa20bab9c31f92e929dbc6c
djm@openbsd.org [Sat, 25 Jan 2020 00:06:48 +0000 (00:06 +0000)]
upstream: process security key provider via realpath() in agent,
avoids malicious client from being able to cause agent to load arbitrary
libraries into ssh-sk-helper.
reported by puck AT puckipedia.com; ok markus
OpenBSD-Commit-ID:
1086643df1b7eee4870825c687cf0c26a6145d1c
djm@openbsd.org [Sat, 25 Jan 2020 00:03:36 +0000 (00:03 +0000)]
upstream: expose PKCS#11 key labels/X.509 subjects as comments
Extract the key label or X.509 subject string when PKCS#11 keys
are retrieved from the token and plumb this through to places where
it may be used as a comment.
based on https://github.com/openssh/openssh-portable/pull/138
by Danielle Church
feedback and ok markus@
OpenBSD-Commit-ID:
cae1fda10d9e10971dea29520916e27cfec7ca35
djm@openbsd.org [Fri, 24 Jan 2020 23:56:01 +0000 (23:56 +0000)]
upstream: tweak proctitle to include sshd arguments, as these are
frequently used to distinguish between multiple independent instances of the
server. New proctitle looks like this:
$ pgrep -lf sshd
12844 sshd: /usr/sbin/sshd -f /etc/ssh/sshd_config [listener] 0 of 10-100 startups
requested by sthen@ and aja@; ok aja@
OpenBSD-Commit-ID:
cf235a561c655a3524a82003cf7244ecb48ccc1e
djm@openbsd.org [Fri, 24 Jan 2020 23:54:40 +0000 (23:54 +0000)]
upstream: add xextendf() to extend a string with a format
(reallocating as necessary). ok aja@ as part of a larger diff
OpenBSD-Commit-ID:
30796b50d330b3e0e201747fe40cdf9aa70a77f9
djm@openbsd.org [Fri, 24 Jan 2020 05:33:01 +0000 (05:33 +0000)]
upstream: minor tweaks to ssh-keygen -Y find-principals:
emit matched principals one per line to stdout rather than as comma-
separated and with a free-text preamble (easy confusion opportunity)
emit "not found" error to stderr
fix up argument testing for -Y operations and improve error message for
unsupported operations
OpenBSD-Commit-ID:
3d9c9a671ab07fc04a48f543edfa85eae77da69c
djm@openbsd.org [Fri, 24 Jan 2020 00:28:57 +0000 (00:28 +0000)]
upstream: remove ssh-rsa (SHA1) from the list of allowed CA
signature algorithms ok markus
OpenBSD-Commit-ID:
da3481fca8c81e6951f319a86b7be67502237f57
djm@openbsd.org [Fri, 24 Jan 2020 00:27:04 +0000 (00:27 +0000)]
upstream: when signing a certificate with an RSA key, default to
a safe signature algorithm (rsa-sha-512) if not is explicitly specified by
the user; ok markus@
OpenBSD-Commit-ID:
e05f638f0be6c0266e1d3d799716b461011e83a9
djm@openbsd.org [Fri, 24 Jan 2020 00:00:31 +0000 (00:00 +0000)]
upstream: allow PEM export of DSA and ECDSA keys; bz3091, patch
from Jakub Jelen ok markus@
OpenBSD-Commit-ID:
a58edec8b9f07acab4b962a71a5125830d321b51
djm@openbsd.org [Thu, 23 Jan 2020 23:31:52 +0000 (23:31 +0000)]
upstream: ssh-keygen -Y find-principals fixes based on feedback
from Markus:
use "principals" instead of principal, as allowed_signers lines may list
multiple.
When the signing key is a certificate, emit only principals that match
the certificate principal list.
NB. the command -Y name changes: "find-principal" => "find-principals"
ok markus@
OpenBSD-Commit-ID:
ab575946ff9a55624cd4e811bfd338bf3b1d0faf
dtucker@openbsd.org [Fri, 24 Jan 2020 01:29:23 +0000 (01:29 +0000)]
upstream: Do not warn about permissions on symlinks.
OpenBSD-Regress-ID:
339d4cbae224bd8743ffad9c3afb0cf3cb66c357
dtucker@openbsd.org [Thu, 23 Jan 2020 11:19:12 +0000 (11:19 +0000)]
upstream: Handle zlib compression being disabled now that it's
optional.
OpenBSD-Regress-ID:
0af4fbc5168e62f89d0350de524bff1cb00e707a
dtucker@openbsd.org [Thu, 23 Jan 2020 10:53:04 +0000 (10:53 +0000)]
upstream: Fix typo in comment.
OpenBSD-Commit-ID:
d1d7a6553208bf439378fd1cf686a828aceb353a
dtucker@openbsd.org [Thu, 23 Jan 2020 10:19:59 +0000 (10:19 +0000)]
upstream: When checking for unsafe directories, ignore non-directories
(ie symlinks, where permissions are not relevant).
OpenBSD-Regress-ID:
fb6cfc8b022becb62b2dcb99ed3f072b3326e501
Darren Tucker [Thu, 23 Jan 2020 11:17:24 +0000 (22:17 +1100)]
zlib is now optional.
Darren Tucker [Thu, 23 Jan 2020 11:16:51 +0000 (22:16 +1100)]
Plumb WITH_ZLIB into configure.
This allows zlib support to be disabled by ./configure --without-zlib.
dtucker@openbsd.org [Thu, 23 Jan 2020 10:24:29 +0000 (10:24 +0000)]
upstream: Make zlib optional. This adds a "ZLIB" build time option
that allows building without zlib compression and associated options. With
feedback from markus@, ok djm@
OpenBSD-Commit-ID:
44c6e1133a90fd15a3aa865bdedc53bab28b7910
djm@openbsd.org [Thu, 23 Jan 2020 07:54:04 +0000 (07:54 +0000)]
upstream: remove trailing period characters from pub/priv key
pathnames - they make them needlessly more difficult to cut and paste without
error; ok markus@ & dtucker@
OpenBSD-Commit-ID:
abdcfd1a5723fcac0711feee7665edc66ae2335a
Darren Tucker [Thu, 23 Jan 2020 10:06:45 +0000 (21:06 +1100)]
Fix a couple of mysig_t leftovers.
Darren Tucker [Thu, 23 Jan 2020 07:55:24 +0000 (18:55 +1100)]
Remove mysignal wrapper.
We switched the main code to use sigaction(), so the wrapper is no
longer used.
jmc@openbsd.org [Thu, 23 Jan 2020 07:16:38 +0000 (07:16 +0000)]
upstream: new sentence, new line;
OpenBSD-Commit-ID:
b6c3f2f36ec77e99198619b38a9f146655281925
dtucker@openbsd.org [Thu, 23 Jan 2020 07:10:22 +0000 (07:10 +0000)]
upstream: Replace all calls to signal(2) with a wrapper around
sigaction(2). This wrapper blocks all other signals during the handler
preventing races between handlers, and sets SA_RESTART which should reduce
the potential for short read/write operations.
OpenBSD-Commit-ID:
5e047663fd77a40d7b07bdabe68529df51fd2519
djm@openbsd.org [Thu, 23 Jan 2020 04:54:34 +0000 (04:54 +0000)]
upstream: missing header change from previous; spotted by dtucker@
OpenBSD-Commit-ID:
321ce74c0a5bbd0f02fa3f20cb5cf2a952c6b96f
dtucker@openbsd.org [Thu, 23 Jan 2020 03:42:41 +0000 (03:42 +0000)]
upstream: Check for and warn about StrictModes permission problems. ok tb@
OpenBSD-Regress-ID:
4841704ccdee50ee7efc6035bc686695c6ac2991
dtucker@openbsd.org [Thu, 23 Jan 2020 03:35:07 +0000 (03:35 +0000)]
upstream: Also test PuTTY chacha20.
OpenBSD-Regress-ID:
7af6a0e8763b05f1f8eee6bca5f31fcb16151040
dtucker@openbsd.org [Thu, 23 Jan 2020 03:24:38 +0000 (03:24 +0000)]
upstream: Also test PuTTY ecdh kex methods.
OpenBSD-Regress-ID:
ec4017dce612131842398a03e93007a869c2c133