]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
5 years agoWrap stdint.h inside HAVE_STDINT_H. 162/head
Darren Tucker [Tue, 14 Jan 2020 03:41:47 +0000 (14:41 +1100)] 
Wrap stdint.h inside HAVE_STDINT_H.

5 years agoInclude compat header for definitions.
Darren Tucker [Tue, 14 Jan 2020 03:26:41 +0000 (14:26 +1100)] 
Include compat header for definitions.

5 years agoImprove search for 'struct timespec'.
Darren Tucker [Mon, 13 Jan 2020 22:42:52 +0000 (09:42 +1100)] 
Improve search for 'struct timespec'.

Make struct timespec test consistent with existing timeval test.
Include time.h for timespec in compat header where required.

5 years agoUpdate depend to remove rmd160.h.
Darren Tucker [Tue, 14 Jan 2020 01:43:03 +0000 (12:43 +1100)] 
Update depend to remove rmd160.h.

5 years agoRemove configure test & compat code for ripemd160.
Darren Tucker [Mon, 13 Jan 2020 20:24:46 +0000 (07:24 +1100)] 
Remove configure test & compat code for ripemd160.

RIPEMD160 support was removed upstream in 2017, however we still had
a configure test and compat code for it, so clean those up now.

5 years agoupstream: fix reversed arguments on expand_proxy_command(); spotted
djm@openbsd.org [Thu, 9 Jan 2020 03:28:38 +0000 (03:28 +0000)] 
upstream: fix reversed arguments on expand_proxy_command(); spotted

by anton@

OpenBSD-Commit-ID: db1c32478a01dfbc9c4db171de0f25907bea5775

5 years agoupstream: put the fido options in a list, and tidy up the text a
jmc@openbsd.org [Mon, 6 Jan 2020 07:43:28 +0000 (07:43 +0000)] 
upstream: put the fido options in a list, and tidy up the text a

little; ok djm

OpenBSD-Commit-ID: 491ce15ae52a88b7a6a2b3b6708a14b4aacdeebb

5 years agoDeny (non-fatal) ipc in preauth privsep child.
Jeremy Drake [Sat, 12 Oct 2019 01:31:05 +0000 (18:31 -0700)] 
Deny (non-fatal) ipc in preauth privsep child.

As noted in openssh/openssh-portable#149, i386 does not have have
_NR_shmget etc.  Instead, it has a single ipc syscall (see man 2 ipc,
https://linux.die.net/man/2/ipc).  Add this syscall, if present, to the
list of syscalls that seccomp will deny non-fatally.

5 years agoseccomp: Allow clock_gettime64() in sandbox.
Khem Raj [Wed, 8 Jan 2020 00:26:45 +0000 (16:26 -0800)] 
seccomp: Allow clock_gettime64() in sandbox.

This helps sshd accept connections on mips platforms with
upcoming glibc ( 2.31 )

5 years agoupstream: missing else in check_enroll_options()
djm@openbsd.org [Mon, 6 Jan 2020 02:39:30 +0000 (02:39 +0000)] 
upstream: missing else in check_enroll_options()

OpenBSD-Commit-ID: e058fb918fda56ddbbf0bee910101004cec421d4

5 years agoupstream: fix error message
djm@openbsd.org [Mon, 6 Jan 2020 02:24:28 +0000 (02:24 +0000)] 
upstream: fix error message

OpenBSD-Commit-ID: 1eb52025658eb78ea6223181e552862198d3d505

5 years agoupstream: adapt sk-dummy to SK API changes
djm@openbsd.org [Mon, 6 Jan 2020 02:07:50 +0000 (02:07 +0000)] 
upstream: adapt sk-dummy to SK API changes

also, make it pull prototypes directly from sk-api.c and #error
if the expected version changes. This will make any future regress
test breakage because of SK API changes much more apparent

OpenBSD-Regress-ID: 79b07055de4feb988e31da71a89051ad5969829d

5 years agoupstream: Extends the SK API to accept a set of key/value options
djm@openbsd.org [Mon, 6 Jan 2020 02:00:46 +0000 (02:00 +0000)] 
upstream: Extends the SK API to accept a set of key/value options

for all operations. These are intended to future-proof the API a little by
making it easier to specify additional fields for without having to change
the API version for each.

At present, only two options are defined: one to explicitly specify
the device for an operation (rather than accepting the middleware's
autoselection) and another to specify the FIDO2 username that may
be used when generating a resident key. These new options may be
invoked at key generation time via ssh-keygen -O

This also implements a suggestion from Markus to avoid "int" in favour
of uint32_t for the algorithm argument in the API, to make implementation
of ssh-sk-client/helper a little easier.

feedback, fixes and ok markus@

OpenBSD-Commit-ID: 973ce11704609022ab36abbdeb6bc23c8001eabc

5 years agoupstream: fix CanonicalizeHostname, broken by rev 1.507
beck@openbsd.org [Sun, 5 Jan 2020 16:28:22 +0000 (16:28 +0000)] 
upstream: fix CanonicalizeHostname, broken by rev 1.507

Issue noticed and reported by Pierre-Olivier Martel <pom@apple.com>
ok dtucker@ markus@ djm@

OpenBSD-Commit-ID: 749f3168ec520609c35b0c4e1984e5fa47f16094

5 years agoFix typo: 'you' -> 'your'.
Darren Tucker [Sun, 5 Jan 2020 22:02:53 +0000 (09:02 +1100)] 
Fix typo: 'you' -> 'your'.

bz#3108 from jmckitrick@gmail.com.

5 years agoRemove auth-skey.c.
Darren Tucker [Sun, 5 Jan 2020 21:56:46 +0000 (08:56 +1100)] 
Remove auth-skey.c.

S/Key support was removed in OpenSSH 7.8 but this file was missed.

5 years agoupstream: the download resident keys option is -K (upper) not -k
jmc@openbsd.org [Fri, 3 Jan 2020 07:33:33 +0000 (07:33 +0000)] 
upstream: the download resident keys option is -K (upper) not -k

(lower); ok djm

OpenBSD-Commit-ID: 71dc28a3e1fa7c553844abc508845bcf5766e091

5 years agoupstream: what bozo decided to use 2020 as a future date in a regress
djm@openbsd.org [Fri, 3 Jan 2020 03:02:26 +0000 (03:02 +0000)] 
upstream: what bozo decided to use 2020 as a future date in a regress

test?

OpenBSD-Regress-ID: 3b953df5a7e14081ff6cf495d4e8d40e153cbc3a

5 years agoupstream: implement recent SK API change to support resident keys
djm@openbsd.org [Fri, 3 Jan 2020 02:46:19 +0000 (02:46 +0000)] 
upstream: implement recent SK API change to support resident keys

and PIN prompting in the dummy middleware that we use for the tests. Should
fix breakage spotted by dtucker@

OpenBSD-Regress-ID: 379cf9eabfea57aaf7f3f59dafde59889566c484

5 years agoupstream: Update keygen moduli screen test to match recent command
dtucker@openbsd.org [Thu, 2 Jan 2020 13:25:38 +0000 (13:25 +0000)] 
upstream: Update keygen moduli screen test to match recent command

line option change to ssh-keygen(1).

OpenBSD-Regress-ID: 744a72755004377e9669b662c13c6aa9ead8a0c3

5 years agoupstream: ability to download FIDO2 resident keys from a token via
djm@openbsd.org [Thu, 2 Jan 2020 22:40:09 +0000 (22:40 +0000)] 
upstream: ability to download FIDO2 resident keys from a token via

"ssh-keygen -K". This will save public/private keys into the current
directory.

This is handy if you move a token between hosts.

feedback & ok markus@

OpenBSD-Commit-ID: d57c1f9802f7850f00a117a1d36682a6c6d10da6

5 years agoupstream: add sshkey_save_public(), to save a public key; ok
djm@openbsd.org [Thu, 2 Jan 2020 22:38:33 +0000 (22:38 +0000)] 
upstream: add sshkey_save_public(), to save a public key; ok

markus@

OpenBSD-Commit-ID: 5d6f96a966d10d7fa689ff9aa9e1d6767ad5a076

5 years agoupstream: simplify the list for moduli options - no need for
jmc@openbsd.org [Mon, 30 Dec 2019 16:10:00 +0000 (16:10 +0000)] 
upstream: simplify the list for moduli options - no need for

-compact;

OpenBSD-Commit-ID: 6492c72280482c6d072be46236b365cb359fc280

5 years agossh-sk-null.cc needs extern "C" {}
Damien Miller [Thu, 2 Jan 2020 02:41:31 +0000 (13:41 +1100)] 
ssh-sk-null.cc needs extern "C" {}

5 years agoadd dummy ssh-sk API for linking with fuzzers
Damien Miller [Wed, 1 Jan 2020 23:56:29 +0000 (10:56 +1100)] 
add dummy ssh-sk API for linking with fuzzers

5 years agorefresh depend
Damien Miller [Mon, 30 Dec 2019 10:04:09 +0000 (21:04 +1100)] 
refresh depend

5 years agoupstream: Remove the -x option currently used for
djm@openbsd.org [Mon, 30 Dec 2019 09:49:52 +0000 (09:49 +0000)] 
upstream: Remove the -x option currently used for

FIDO/U2F-specific key flags. Instead these flags may be specified via -O.

ok markus@

OpenBSD-Commit-ID: f23ebde2a8a7e1bf860a51055a711cffb8c328c1

5 years agoupstream: document SK API changes in PROTOCOL.u2f
djm@openbsd.org [Mon, 30 Dec 2019 09:25:29 +0000 (09:25 +0000)] 
upstream: document SK API changes in PROTOCOL.u2f

ok markus@

OpenBSD-Commit-ID: 52622363c103a3c4d3d546050480ffe978a32186

5 years agoupstream: translate and return error codes; retry on bad PIN
djm@openbsd.org [Mon, 30 Dec 2019 09:24:45 +0000 (09:24 +0000)] 
upstream: translate and return error codes; retry on bad PIN

Define some well-known error codes in the SK API and pass
them back via ssh-sk-helper.

Use the new "wrong PIN" error code to retry PIN prompting during
ssh-keygen of resident keys.

feedback and ok markus@

OpenBSD-Commit-ID: 9663c6a2bb7a0bc8deaccc6c30d9a2983b481620

5 years agoupstream: improve some error messages; ok markus@
djm@openbsd.org [Mon, 30 Dec 2019 09:24:03 +0000 (09:24 +0000)] 
upstream: improve some error messages; ok markus@

OpenBSD-Commit-ID: 4ccd8ddabb8df4f995107dd3b7ea58220e93cb81

5 years agoupstream: SK API and sk-helper error/PIN passing
djm@openbsd.org [Mon, 30 Dec 2019 09:23:28 +0000 (09:23 +0000)] 
upstream: SK API and sk-helper error/PIN passing

Allow passing a PIN via the SK API (API major crank) and let the
ssh-sk-helper API follow.

Also enhance the ssh-sk-helper API to support passing back an error
code instead of a complete reply. Will be used to signal "wrong PIN",
etc.

feedback and ok markus@

OpenBSD-Commit-ID: a1bd6b0a2421646919a0c139b8183ad76d28fb71

5 years agoupstream: implement loading resident keys in ssh-add
djm@openbsd.org [Mon, 30 Dec 2019 09:22:49 +0000 (09:22 +0000)] 
upstream: implement loading resident keys in ssh-add

"ssh-add -O" will load resident keys from a FIDO2 token and add them
to a ssh-agent.

feedback and ok markus@

OpenBSD-Commit-ID: 608104ae957a7d65cb84e0a3a26c8f60e0df3290

5 years agoupstream: implement loading of resident keys in ssh-sk-helper
djm@openbsd.org [Mon, 30 Dec 2019 09:21:59 +0000 (09:21 +0000)] 
upstream: implement loading of resident keys in ssh-sk-helper

feedback and ok markus@

OpenBSD-Commit-ID: b273c23769ea182c55c4a7b8f9cbd9181722011a

5 years agoupstream: resident keys support in SK API
djm@openbsd.org [Mon, 30 Dec 2019 09:21:16 +0000 (09:21 +0000)] 
upstream: resident keys support in SK API

Adds a sk_load_resident_keys() function to the security key
API that accepts a security key provider and a PIN and returns
a list of keys.

Implement support for this in the usbhid middleware.

feedback and ok markus@

OpenBSD-Commit-ID: 67e984e4e87f4999ce447a6178c4249a9174eff0

5 years agoupstream: Factor out parsing of struct sk_enroll_response
djm@openbsd.org [Mon, 30 Dec 2019 09:20:36 +0000 (09:20 +0000)] 
upstream: Factor out parsing of struct sk_enroll_response

We'll reuse this for extracting resident keys from a device.

feedback and ok markus@

OpenBSD-Commit-ID: 9bc1efd9c6897eac4df0983746cf6578c1542273

5 years agoupstream: basic support for generating FIDO2 resident keys
djm@openbsd.org [Mon, 30 Dec 2019 09:19:52 +0000 (09:19 +0000)] 
upstream: basic support for generating FIDO2 resident keys

"ssh-keygen -t ecdsa-sk|ed25519-sk -x resident" will generate a
device-resident key.

feedback and ok markus@

OpenBSD-Commit-ID: 8e1b3c56a4b11d85047bd6c6c705b7eef4d58431

5 years agoupstream: remove single-letter flags for moduli options
djm@openbsd.org [Mon, 30 Dec 2019 03:30:09 +0000 (03:30 +0000)] 
upstream: remove single-letter flags for moduli options

Move all moduli generation options to live under the -O flag.

Frees up seven single-letter flags.

NB. this change break existing ssh-keygen commandline syntax for moduli-
related operations. Very few people use these fortunately.

feedback and ok markus@

OpenBSD-Commit-ID: d498f3eaf28128484826a4fcb343612764927935

5 years agoupstream: prepare for use of ssh-keygen -O flag beyond certs
djm@openbsd.org [Mon, 30 Dec 2019 03:28:41 +0000 (03:28 +0000)] 
upstream: prepare for use of ssh-keygen -O flag beyond certs

Move list of available certificate options in ssh-keygen.1 to the
CERTIFICATES section.

Collect options specified by -O but delay parsing/validation of
certificate options until we're sure that we're acting as a CA.

ok markus@

OpenBSD-Commit-ID: 33e6bcc29cfca43606f6fa09bd84b955ee3a4106

5 years agoupstream: sort -Y internally in the options list, as is already
jmc@openbsd.org [Fri, 27 Dec 2019 08:28:44 +0000 (08:28 +0000)] 
upstream: sort -Y internally in the options list, as is already

done in synopsis;

OpenBSD-Commit-ID: 86d033c5764404057616690d7be992e445b42274

5 years agoupstream: in the options list, sort -Y and -y;
jmc@openbsd.org [Fri, 27 Dec 2019 08:25:07 +0000 (08:25 +0000)] 
upstream: in the options list, sort -Y and -y;

OpenBSD-Commit-ID: 24c2e6a3aeab6e050a0271ffc73fdff91c10dcaa

5 years agoupstream: Replace the term "security key" with "(FIDO)
naddy@openbsd.org [Sat, 21 Dec 2019 20:22:34 +0000 (20:22 +0000)] 
upstream: Replace the term "security key" with "(FIDO)

authenticator".

The polysemous use of "key" was too confusing.  Input from markus@.
ok jmc@

OpenBSD-Commit-ID: 12eea973a44c8232af89f86e4269d71ae900ca8f

5 years agoupstream: unit tests for ForwardAgent=/path; from Eric Chiang
djm@openbsd.org [Sat, 21 Dec 2019 02:33:07 +0000 (02:33 +0000)] 
upstream: unit tests for ForwardAgent=/path; from Eric Chiang

OpenBSD-Regress-ID: 24f693f78290b2c17725dab2c614dffe4a88c8da

5 years agoupstream: test security key host keys in addition to user keys
djm@openbsd.org [Mon, 16 Dec 2019 02:39:05 +0000 (02:39 +0000)] 
upstream: test security key host keys in addition to user keys

OpenBSD-Regress-ID: 9fb45326106669a27e4bf150575c321806e275b1

5 years agoupstream: Allow forwarding a different agent socket to the path
djm@openbsd.org [Sat, 21 Dec 2019 02:19:13 +0000 (02:19 +0000)] 
upstream: Allow forwarding a different agent socket to the path

specified by $SSH_AUTH_SOCK, by extending the existing ForwardAgent option to
accepting an explicit path or the name of an environment variable in addition
to yes/no.

Patch by Eric Chiang, manpage by me; ok markus@

OpenBSD-Commit-ID: 98f2ed80bf34ea54d8b2ddd19ac14ebbf40e9265

5 years agoupstream: SSH U2F keys can now be used as host keys. Fix a garden
naddy@openbsd.org [Fri, 20 Dec 2019 20:28:55 +0000 (20:28 +0000)] 
upstream: SSH U2F keys can now be used as host keys. Fix a garden

path sentence. ok markus@

OpenBSD-Commit-ID: 67d7971ca1a020acd6c151426c54bd29d784bd6b

5 years agoupstream: Move always unsupported keywords to be grouped with the other
dtucker@openbsd.org [Fri, 20 Dec 2019 02:42:42 +0000 (02:42 +0000)] 
upstream: Move always unsupported keywords to be grouped with the other

ones. Move oSecurityProvider to match the order in the OpCodes enum. Patch
from openbsd@academicsolutions.ch, ok djm@

OpenBSD-Commit-ID: 061e4505861ec1e02ba3a63e3d1b3be3cad458ec

5 years agoupstream: Remove obsolete opcodes from the configuation enum.
dtucker@openbsd.org [Fri, 20 Dec 2019 02:29:21 +0000 (02:29 +0000)] 
upstream: Remove obsolete opcodes from the configuation enum.

Patch from openbsd@academicsolutions.ch, ok djm@

OpenBSD-Commit-ID: 395c202228872ce8d9044cc08552ac969f51e01b

5 years agoupstream: Remove now-obsolete config options from example in
dtucker@openbsd.org [Fri, 20 Dec 2019 02:11:38 +0000 (02:11 +0000)] 
upstream: Remove now-obsolete config options from example in

comment.  Patch from openbsd@academicsolutions.ch, ok djm@

OpenBSD-Commit-ID: 35862beb0927b1cb0af476ec23cc07f6e3006101

5 years agoupstream: Document that security key-hosted keys can act as host
naddy@openbsd.org [Thu, 19 Dec 2019 15:09:30 +0000 (15:09 +0000)] 
upstream: Document that security key-hosted keys can act as host

keys.

Update the list of default host key algorithms in ssh_config.5 and
sshd_config.5.  Copy the description of the SecurityKeyProvider
option to sshd_config.5.

ok jmc@

OpenBSD-Commit-ID: edadf3566ab5e94582df4377fee3b8b702c7eca0

5 years agoupstream: "Forward security" -> "Forward secrecy" since that's the
dtucker@openbsd.org [Thu, 19 Dec 2019 03:50:01 +0000 (03:50 +0000)] 
upstream: "Forward security" -> "Forward secrecy" since that's the

correct term. Add "MAC" since we use that acronym in other man pages.  ok
naddy@

OpenBSD-Commit-ID: c35529e511788586725fb63bda3459e10738c5f5

5 years agoupstream: cut obsolete lists of crypto algorithms from outline of
naddy@openbsd.org [Tue, 17 Dec 2019 16:21:07 +0000 (16:21 +0000)] 
upstream: cut obsolete lists of crypto algorithms from outline of

how SSH works ok markus@ jmc@

OpenBSD-Commit-ID: 8e34973f232ab48c4d4f5d07df48d501708b9160

5 years agoupstream: strdup may return NULL if memory allocation fails. Use
tobhe@openbsd.org [Mon, 16 Dec 2019 13:58:53 +0000 (13:58 +0000)] 
upstream: strdup may return NULL if memory allocation fails. Use

the safer xstrdup which fatals on allocation failures.

ok markus@

OpenBSD-Commit-ID: 8b608d387120630753cbcb8110e0b019c0c9a0d0

5 years agoupstream: sort sk-* methods behind their plain key methods cousins
djm@openbsd.org [Mon, 16 Dec 2019 03:16:58 +0000 (03:16 +0000)] 
upstream: sort sk-* methods behind their plain key methods cousins

for now

OpenBSD-Commit-ID: c97e22c2b28c0d12ee389b8b4ef5f2ada7908828

5 years agoMac OS X has PAM too.
Darren Tucker [Tue, 17 Dec 2019 08:46:15 +0000 (19:46 +1100)] 
Mac OS X has PAM too.

5 years agoShow portable tarball pattern in example.
Darren Tucker [Tue, 17 Dec 2019 08:37:06 +0000 (19:37 +1100)] 
Show portable tarball pattern in example.

5 years agoOpenSSL is now optional.
Darren Tucker [Tue, 17 Dec 2019 08:35:59 +0000 (19:35 +1100)] 
OpenSSL is now optional.

5 years agoupstream: adapt to ssh-sk-client change
djm@openbsd.org [Sun, 15 Dec 2019 18:58:33 +0000 (18:58 +0000)] 
upstream: adapt to ssh-sk-client change

OpenBSD-Regress-ID: 40481999a5928d635ab2e5b029e8239c112005ea

5 years agoupstream: it's no longer possible to disable privilege separation
djm@openbsd.org [Wed, 11 Dec 2019 18:47:14 +0000 (18:47 +0000)] 
upstream: it's no longer possible to disable privilege separation

in sshd, so don't double the tests' work by trying both off/on

OpenBSD-Regress-ID: d366665466dbd09e9b707305da884be3e7619c68

5 years agoupstream: don't treat HostKeyAgent=none as a path either; avoids
djm@openbsd.org [Sun, 15 Dec 2019 20:59:23 +0000 (20:59 +0000)] 
upstream: don't treat HostKeyAgent=none as a path either; avoids

spurious warnings from the cfgparse regress test

OpenBSD-Commit-ID: ba49ea7a5c92b8a16cb9c2e975dbb163853afc54

5 years agoupstream: do not attempt to find an absolute path for sshd_config
djm@openbsd.org [Sun, 15 Dec 2019 20:57:15 +0000 (20:57 +0000)] 
upstream: do not attempt to find an absolute path for sshd_config

SecurityKeyProvider=internal - unbreaks cfgparse regress test

OpenBSD-Commit-ID: d2ddcf525c0dc3c8339522360c10b3c70f1fd641

5 years agoupstream: allow ssh-keyscan to find security key hostkeys
djm@openbsd.org [Sun, 15 Dec 2019 19:47:10 +0000 (19:47 +0000)] 
upstream: allow ssh-keyscan to find security key hostkeys

OpenBSD-Commit-ID: 1fe822a7f714df19a7e7184e3a3bbfbf546811d3

5 years agoupstream: allow security keys to act as host keys as well as user
djm@openbsd.org [Sun, 15 Dec 2019 18:57:30 +0000 (18:57 +0000)] 
upstream: allow security keys to act as host keys as well as user

keys.

Previously we didn't do this because we didn't want to expose
the attack surface presented by USB and FIDO protocol handling,
but now that this is insulated behind ssh-sk-helper there is
less risk.

ok markus@

OpenBSD-Commit-ID: 77b068dd133b8d87e0f010987bd5131e640ee64c

5 years agoAllow clock_nanosleep_time64 in seccomp sandbox.
Darren Tucker [Mon, 16 Dec 2019 02:55:56 +0000 (13:55 +1100)] 
Allow clock_nanosleep_time64 in seccomp sandbox.

Needed on Linux ARM.  bz#3100, patch from jjelen@redhat.com.

5 years agoPut SK ECDSA bits inside ifdef OPENSSL_HAS_ECC.
Darren Tucker [Sun, 15 Dec 2019 07:27:02 +0000 (18:27 +1100)] 
Put SK ECDSA bits inside ifdef OPENSSL_HAS_ECC.

Fixes build when linking against OpenSSLs built with no-ec.

5 years agoremove a bunch of ENABLE_SK #ifdefs
Damien Miller [Fri, 13 Dec 2019 22:21:46 +0000 (09:21 +1100)] 
remove a bunch of ENABLE_SK #ifdefs

The ssh-sk-helper client API gives us a nice place to disable
security key support when it is wasn't enabled at compile time,
so we don't need to check everywere.

Also, verification of security key signatures can remain enabled
all the time - it has no additional dependencies. So sshd can
accept security key pubkeys in authorized_keys, etc regardless of
the host's support for dlopen, etc.

5 years agossh-sk-client.c needs includes.h
Damien Miller [Fri, 13 Dec 2019 22:15:06 +0000 (09:15 +1100)] 
ssh-sk-client.c needs includes.h

5 years agoonly link ssh-sk-helper against libfido2
Damien Miller [Fri, 13 Dec 2019 21:40:33 +0000 (08:40 +1100)] 
only link ssh-sk-helper against libfido2

5 years agoadapt Makefile to ssh-sk-client everywhere
Damien Miller [Fri, 13 Dec 2019 21:20:52 +0000 (08:20 +1100)] 
adapt Makefile to ssh-sk-client everywhere

5 years agofixup
Damien Miller [Fri, 13 Dec 2019 20:53:11 +0000 (07:53 +1100)] 
fixup

5 years agoupstream: actually commit the ssh-sk-helper client code; ok markus
djm@openbsd.org [Fri, 13 Dec 2019 20:16:56 +0000 (20:16 +0000)] 
upstream: actually commit the ssh-sk-helper client code; ok markus

OpenBSD-Commit-ID: fd2ea776a5bbbf4d452989d3c3054cf25a5e0589

5 years agoupstream: perform security key enrollment via ssh-sk-helper too.
djm@openbsd.org [Fri, 13 Dec 2019 19:11:14 +0000 (19:11 +0000)] 
upstream: perform security key enrollment via ssh-sk-helper too.

This means that ssh-keygen no longer needs to link against ssh-sk-helper, and
only ssh-sk-helper needs libfido2 and /dev/uhid* access;

feedback & ok markus@

OpenBSD-Commit-ID: 9464233fab95708d2ff059f8bee29c0d1f270800

5 years agoupstream: allow sshbuf_put_stringb(buf, NULL); ok markus@
djm@openbsd.org [Fri, 13 Dec 2019 19:09:37 +0000 (19:09 +0000)] 
upstream: allow sshbuf_put_stringb(buf, NULL); ok markus@

OpenBSD-Commit-ID: 91482c1ada9adb283165d48dafbb88ae91c657bd

5 years agoupstream: use ssh-sk-helper for all security key signing operations
djm@openbsd.org [Fri, 13 Dec 2019 19:09:10 +0000 (19:09 +0000)] 
upstream: use ssh-sk-helper for all security key signing operations

This extracts and refactors the client interface for ssh-sk-helper
from ssh-agent and generalises it for use by the other programs.
This means that most OpenSSH tools no longer need to link against
libfido2 or directly interact with /dev/uhid*

requested by, feedback and ok markus@

OpenBSD-Commit-ID: 1abcd3aea9a7460eccfbf8ca154cdfa62f1dc93f

5 years agoupstream: add a note about the 'extensions' field in the signed
djm@openbsd.org [Wed, 11 Dec 2019 22:19:47 +0000 (22:19 +0000)] 
upstream: add a note about the 'extensions' field in the signed

object

OpenBSD-Commit-ID: 67c01e0565b258e0818c1ccfe1f1aeaf9a0d4c7b

5 years agoupstream: some more corrections for documentation problems spotted
djm@openbsd.org [Tue, 10 Dec 2019 23:37:31 +0000 (23:37 +0000)] 
upstream: some more corrections for documentation problems spotted

by Ron Frederick

document certifiate private key format
correct flags type for sk-ssh-ed25519@openssh.com keys

OpenBSD-Commit-ID: fc4e9a1ed7f9f7f9dd83e2e2c59327912e933e74

5 years agoupstream: loading security keys into ssh-agent used the extension
djm@openbsd.org [Tue, 10 Dec 2019 23:21:56 +0000 (23:21 +0000)] 
upstream: loading security keys into ssh-agent used the extension

constraint "sk-provider@openssh.com", not "sk@openssh.com"; spotted by Ron
Frederick

OpenBSD-Commit-ID: dbfba09edbe023abadd5f59c1492df9073b0e51d

5 years agoupstream: add security key types to list of keys allowed to act as
djm@openbsd.org [Tue, 10 Dec 2019 22:43:19 +0000 (22:43 +0000)] 
upstream: add security key types to list of keys allowed to act as

CAs; spotted by Ron Frederick

OpenBSD-Commit-ID: 9bb0dfff927b4f7aa70679f983f84c69d45656c3

5 years agoupstream: when acting as a CA and using a security key as the CA
djm@openbsd.org [Tue, 10 Dec 2019 22:37:20 +0000 (22:37 +0000)] 
upstream: when acting as a CA and using a security key as the CA

key, remind the user to touch they key to authorise the signature.

OpenBSD-Commit-ID: fe58733edd367362f9766b526a8b56827cc439c1

5 years agoupstream: chop some unnecessary and confusing verbiage from the
djm@openbsd.org [Tue, 10 Dec 2019 22:36:08 +0000 (22:36 +0000)] 
upstream: chop some unnecessary and confusing verbiage from the

security key protocol description; feedback from Ron Frederick

OpenBSD-Commit-ID: 048c9483027fbf9c995e5a51b3ac502989085a42

5 years agoupstream: fix setting of $SSH_ASKPASS_PROMPT - it shouldn't be set
djm@openbsd.org [Fri, 6 Dec 2019 03:06:08 +0000 (03:06 +0000)] 
upstream: fix setting of $SSH_ASKPASS_PROMPT - it shouldn't be set

when asking passphrases, only when confirming the use of a key (i.e. for
ssh-agent keys added with "ssh-add -c keyfile")

OpenBSD-Commit-ID: 6643c82960d9427d5972eb702c917b3b838ecf89

5 years agoupstream: bring the __func__
djm@openbsd.org [Fri, 6 Dec 2019 02:55:21 +0000 (02:55 +0000)] 
upstream: bring the __func__

OpenBSD-Commit-ID: 71a3a45b0fe1b8f680ff95cf264aa81f7abbff67

5 years agoupstream: tweak the Nd lines for a bit of consistency; ok markus
jmc@openbsd.org [Sat, 30 Nov 2019 07:07:59 +0000 (07:07 +0000)] 
upstream: tweak the Nd lines for a bit of consistency; ok markus

OpenBSD-Commit-ID: 876651bdde06bc1e72dd4bd7ad599f42a6ce5a16

5 years agoCheck if memmem is declared in system headers.
Darren Tucker [Wed, 11 Dec 2019 02:22:06 +0000 (13:22 +1100)] 
Check if memmem is declared in system headers.

If the system (or one of the dependencies) implements memmem but does
not define the header, we would not declare it either resulting in
compiler warnings.  Check for declaration explicitly.  bz#3102.

5 years agoSort depends.
Darren Tucker [Wed, 11 Dec 2019 02:12:01 +0000 (13:12 +1100)] 
Sort depends.

5 years agoSort .depend when rebuilding.
Darren Tucker [Wed, 11 Dec 2019 02:09:34 +0000 (13:09 +1100)] 
Sort .depend when rebuilding.

This makes diffs more stable between makedepend implementations.

5 years agoUpdate depend to include sk files.
Darren Tucker [Wed, 11 Dec 2019 02:06:43 +0000 (13:06 +1100)] 
Update depend to include sk files.

5 years agoDescribe how to build libcrypto as PIC.
Darren Tucker [Mon, 9 Dec 2019 09:25:26 +0000 (20:25 +1100)] 
Describe how to build libcrypto as PIC.

While there, move the OpenSSL 1.1.0g caveat closer to the other version
information.

5 years agoRecommend running LibreSSL or OpenSSL self-tests.
Darren Tucker [Mon, 9 Dec 2019 06:23:22 +0000 (17:23 +1100)] 
Recommend running LibreSSL or OpenSSL self-tests.

5 years agoWrap ECC specific bits in ifdef.
Darren Tucker [Fri, 6 Dec 2019 03:17:26 +0000 (14:17 +1100)] 
Wrap ECC specific bits in ifdef.

Fixes tests when built against an OpenSSL configured with no-ec.

5 years agoWrap sha2.h include in ifdef.
Darren Tucker [Fri, 29 Nov 2019 09:21:36 +0000 (20:21 +1100)] 
Wrap sha2.h include in ifdef.

Fixes build --without-openssl on at least Fedora.

5 years agocompile sk-dummy.so with no-PIE version of LDFLAGS
Damien Miller [Fri, 29 Nov 2019 04:10:21 +0000 (15:10 +1100)] 
compile sk-dummy.so with no-PIE version of LDFLAGS

This lets it pick up the -L path to libcrypto for example.

5 years agoincludes.h for sk-dummy.c, dummy
Damien Miller [Fri, 29 Nov 2019 03:48:46 +0000 (14:48 +1100)] 
includes.h for sk-dummy.c, dummy

5 years ago(yet) another x-platform fix for sk-dummy.so
Damien Miller [Fri, 29 Nov 2019 01:32:23 +0000 (12:32 +1100)] 
(yet) another x-platform fix for sk-dummy.so

Check for -fPIC support from compiler

Compile libopenbsd-compat -fPIC

Don't mix -fPIE and -fPIC when compiling

5 years agoneeds includes.h for WITH_OPENSSL
Damien Miller [Fri, 29 Nov 2019 00:53:57 +0000 (11:53 +1100)] 
needs includes.h for WITH_OPENSSL

5 years agoanother attempt at sk-dummy.so working x-platform
Damien Miller [Fri, 29 Nov 2019 00:52:23 +0000 (11:52 +1100)] 
another attempt at sk-dummy.so working x-platform

include a fatal() implementation to satisfy libopenbsd-compat

clean up .lo and .so files

.gitignore .lo and .so files

5 years agoupstream: lots of dependencies go away here with ed25519 no longer
djm@openbsd.org [Fri, 29 Nov 2019 00:13:29 +0000 (00:13 +0000)] 
upstream: lots of dependencies go away here with ed25519 no longer

needing the ssh_digest API.

OpenBSD-Regress-ID: 785847ec78cb580d141e29abce351a436d6b5d49

5 years agoupstream: perform hashing directly in crypto_hash_sha512() using
djm@openbsd.org [Fri, 29 Nov 2019 00:11:21 +0000 (00:11 +0000)] 
upstream: perform hashing directly in crypto_hash_sha512() using

libcrypto or libc SHA512 functions rather than calling ssh_digest_memory();
avoids many dependencies on ssh code that complicate standalone use of
ed25519, as we want to do in sk-dummy.so

OpenBSD-Commit-ID: 5a3c37593d3ba7add037b587cec44aaea088496d

5 years agoupstream: improve the text for -A a little; input from naddy and
jmc@openbsd.org [Thu, 28 Nov 2019 12:24:31 +0000 (12:24 +0000)] 
upstream: improve the text for -A a little; input from naddy and

djm

OpenBSD-Commit-ID: f9cdfb1d6dbb9887c4bf3bb25f9c7a94294c988d

5 years agoupstream: reshuffle the text to read better; input from naddy,
jmc@openbsd.org [Thu, 28 Nov 2019 12:23:25 +0000 (12:23 +0000)] 
upstream: reshuffle the text to read better; input from naddy,

djmc, and dtucker

OpenBSD-Commit-ID: a0b2aca2b67614dda3d6618ea097bf0610c35013

5 years ago$< doesn't work as` I thought; explicily list objs
Damien Miller [Thu, 28 Nov 2019 07:09:07 +0000 (18:09 +1100)] 
$< doesn't work as` I thought; explicily list objs