]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
Darren Tucker [Sun, 3 Jul 2022 07:54:49 +0000 (17:54 +1000)]
Move checks for pollfd.fd and nfds_t.
Move the checks for struct pollfd.fd and nfds_t to before the sandboxing
checks. This groups all the sandbox checks together so we can skip them
all when sandboxing is disabled.
dtucker@openbsd.org [Fri, 1 Jul 2022 05:08:23 +0000 (05:08 +0000)]
upstream: Remove leftover line.
Remove extra line leftover from merge conflict. ok djm@
OpenBSD-Commit-ID:
460e2290875d7ae64971a7e669c244b1d1c0ae2e
djm@openbsd.org [Fri, 1 Jul 2022 04:45:50 +0000 (04:45 +0000)]
upstream: use consistent field names (s/char/byte)
in format description
OpenBSD-Commit-ID:
3de33572733ee7fcfd7db33d37db23d2280254f0
Darren Tucker [Fri, 1 Jul 2022 03:55:19 +0000 (13:55 +1000)]
Skip select+rlimit check if sandboxing is disabled
It's not needed in that case, and the test can fail when being built
with some compiler memory sanitizer flags. bz#3441
djm@openbsd.org [Fri, 1 Jul 2022 03:52:57 +0000 (03:52 +0000)]
upstream: bump up loglevel from debug to info when unable to open
authorized keys/principals file for errno != ENOENT; bz2042 ok dtucker
OpenBSD-Commit-ID:
e79aa550d91ade6a80f081bda689da24c086d66b
dtucker@openbsd.org [Fri, 1 Jul 2022 03:39:44 +0000 (03:39 +0000)]
upstream: Don't leak the strings allocated by order_hostkeyalgs()
and list_hostkey_types() that are passed to compat_pkalg_proposal(). Part of
github PR#324 from ZoltanFridrich, ok djm@
This is a roll-forward of the previous rollback now that the required
changes in compat.c have been done.
OpenBSD-Commit-ID:
c7cd93730b3b9f53cdad3ae32462922834ef73eb
dtucker@openbsd.org [Fri, 1 Jul 2022 03:35:45 +0000 (03:35 +0000)]
upstream: Always return allocated strings from the kex filtering so
that we can free them later. Fix one leak in compat_kex_proposal. Based on
github PR#324 from ZoltanFridrich with some simplications by me. ok djm@
OpenBSD-Commit-ID:
9171616da3307612d0ede086fd511142f91246e4
djm@openbsd.org [Fri, 1 Jul 2022 00:36:30 +0000 (00:36 +0000)]
upstream: ignore SIGPIPE earlier in main(), specifically before
muxclient() which performs operations that could cause one; Reported by Noam
Lewis via bz3454, ok dtucker@
OpenBSD-Commit-ID:
63d8e13276869eebac6d7a05d5a96307f9026e47
jmc@openbsd.org [Tue, 28 Jun 2022 06:09:14 +0000 (06:09 +0000)]
upstream: reflect the update to -D arg name in usage();
OpenBSD-Commit-ID:
abdcde4f92b1ef094ae44210ee99d3b0155aad9c
Darren Tucker [Wed, 29 Jun 2022 08:28:47 +0000 (18:28 +1000)]
Update OpenSSL tests to the most recent releases.
djm@openbsd.org [Mon, 27 Jun 2022 21:41:55 +0000 (21:41 +0000)]
upstream: allow arguments to sftp -D option, e.g. sftp -D
"/usr/libexec/sftp-server -el debug3"
ok markus@
OpenBSD-Commit-ID:
5a002b9f3a7aef2731fc0ffa9c921cf15f38ecce
dtucker@openbsd.org [Fri, 24 Jun 2022 10:45:06 +0000 (10:45 +0000)]
upstream: Roll back previous KEX changes as they aren't safe until
compat_pkalg_proposal and friends always allocate their returned strings.
Reported by Qualys.
OpenBSD-Commit-ID:
1c7a88a0d5033f42f88ab9bec58ef1cf72c81ad0
dtucker@openbsd.org [Fri, 24 Jun 2022 04:37:00 +0000 (04:37 +0000)]
upstream: Don't leak the strings allocated by order_hostkeyalgs()
and list_hostkey_types() that are passed to compat_pkalg_proposal(). Part of
github PR#324 from ZoltanFridrich, ok djm@
OpenBSD-Commit-ID:
b2f6e5f60f2bba293b831654328a8a0035ef4a1b
Darren Tucker [Sat, 25 Jun 2022 02:16:15 +0000 (12:16 +1000)]
Zero out LIBFIDO2 when SK support not usable.
Prevents us from trying to link them into ssh-sk-helper and failing to
build.
Darren Tucker [Sat, 25 Jun 2022 01:47:28 +0000 (11:47 +1000)]
Disable SK support if FIDO libs not found.
Damien Miller [Fri, 24 Jun 2022 04:43:54 +0000 (14:43 +1000)]
fix broken case statement in previous
Damien Miller [Fri, 24 Jun 2022 04:40:42 +0000 (14:40 +1000)]
request 1.1x API compatibility for OpenSSL >=3.x
idea/patch from Pedro Martelletto via GHPR#322; ok dtucker@
djm@openbsd.org [Fri, 24 Jun 2022 04:27:14 +0000 (04:27 +0000)]
upstream: make it clear that RekeyLimit applies to both transmitted
and received data. GHPR#328 from Jan Pazdziora
OpenBSD-Commit-ID:
d180a905fec9ff418a75c07bb96ea41c9308c3f9
tobhe@openbsd.org [Tue, 21 Jun 2022 14:52:13 +0000 (14:52 +0000)]
upstream: Make sure not to fclose() the same fd twice in case of an
error.
ok dtucker@
OpenBSD-Commit-ID:
e384c4e05d5521e7866b3d53ca59acd2a86eef99
dtucker@openbsd.org [Sat, 18 Jun 2022 02:17:16 +0000 (02:17 +0000)]
upstream: Don't attempt to fprintf a null identity comment. From
Martin Vahlensieck via tech@.
OpenBSD-Commit-ID:
4c54d20a8e8e4e9912c38a7b4ef5bfc5ca2e05c2
dtucker@openbsd.org [Fri, 17 Jun 2022 01:00:03 +0000 (01:00 +0000)]
upstream: Log an error if pipe() fails while accepting a
connection. bz#3447, from vincent-openssh at vinc17 net, ok djm@
OpenBSD-Commit-ID:
9d59f19872b94900a5c79da2d57850241ac5df94
Damien Miller [Fri, 24 Jun 2022 04:20:43 +0000 (14:20 +1000)]
automatically enable built-in FIDO support
If libfido2 is found and usable, then enable the built-in
security key support unless --without-security-key-builtin
was requested.
ok dtucker@
Damien Miller [Fri, 24 Jun 2022 03:46:39 +0000 (13:46 +1000)]
fix possible NULL deref when built without FIDO
Analysis/fix from kircher in bz3443; ok dtucker@
djm@openbsd.org [Wed, 15 Jun 2022 16:08:25 +0000 (16:08 +0000)]
upstream: make sure that UseDNS hostname lookup happens in the monitor
and not in the pledge(2)'d unprivileged process; fixes regression caused by
recent refactoring spotted by henning@
OpenBSD-Commit-ID:
a089870b95101cd8881a2dff65b2f1627d13e88d
djm@openbsd.org [Fri, 3 Jun 2022 04:47:21 +0000 (04:47 +0000)]
upstream: move auth_openprincipals() and auth_openkeyfile() over to
auth2-pubkeyfile.c too; they make more sense there.
OpenBSD-Commit-ID:
9970d99f900e1117fdaab13e9e910a621b7c60ee
djm@openbsd.org [Fri, 3 Jun 2022 04:31:54 +0000 (04:31 +0000)]
upstream: test setenv in both client and server, test first-match-wins
too
OpenBSD-Regress-ID:
4c8804f9db38a02db480b9923317457b377fe34b
djm@openbsd.org [Fri, 3 Jun 2022 04:30:46 +0000 (04:30 +0000)]
upstream: Make SetEnv directives first-match-wins in both
sshd_config and sshd_config; previously if the same name was reused then the
last would win (which is the opposite to how the config is supposed to work).
While there, make the ssh_config parsing more like sshd_config.
bz3438, ok dtucker
OpenBSD-Commit-ID:
797909c1e0262c0d00e09280459d7ab00f18273b
dtucker@openbsd.org [Fri, 3 Jun 2022 04:00:15 +0000 (04:00 +0000)]
upstream: Add missing *-sk types to ssh-keyscan manpage. From
skazi0 via github PR#294.
OpenBSD-Commit-ID:
fda2c869cdb871f3c90a89fb3f985370bb5d25c0
dtucker@openbsd.org [Fri, 3 Jun 2022 03:21:09 +0000 (03:21 +0000)]
upstream: Add period at end of "not known by any other names"
message. github PR#320 from jschauma, ok djm@
OpenBSD-Commit-ID:
bd60809803c4bfd3ebb7c5c4d918b10e275266f2
dtucker@openbsd.org [Fri, 3 Jun 2022 03:17:42 +0000 (03:17 +0000)]
upstream: ssh-keygen -A: do not generate DSA keys by default.
Based on github PR#303 from jsegitz with man page text from jmc@, ok markus@
djm@
OpenBSD-Commit-ID:
5c4c57bdd7063ff03381cfb6696659dd3f9f5b9f
naddy@openbsd.org [Tue, 31 May 2022 14:05:12 +0000 (14:05 +0000)]
upstream: ssh-keygen: implement "verify-required" certificate option.
This was already documented when support for user-verified FIDO
keys was added, but the ssh-keygen(1) code was missing.
ok djm@
OpenBSD-Commit-ID:
f660f973391b593fea4b7b25913c9a15c3eb8a06
jmc@openbsd.org [Sat, 28 May 2022 05:57:56 +0000 (05:57 +0000)]
upstream: keywords ref ssh_config.5;
from caspar schutijser
OpenBSD-Commit-ID:
f146a19d7d5c9374c3b9c520da43b2732d7d1a4e
Damien Miller [Sun, 29 May 2022 23:29:09 +0000 (09:29 +1000)]
fix some bugs in the fuzzer
Darren Tucker [Fri, 27 May 2022 08:19:48 +0000 (18:19 +1000)]
Test against OpenSSL 1.1.1o and 3.0.3.
Darren Tucker [Fri, 27 May 2022 08:18:31 +0000 (18:18 +1000)]
Test against LibreSSL 3.5.3.
Damien Miller [Fri, 27 May 2022 07:00:43 +0000 (17:00 +1000)]
fuzzer for authorized_keys parsing
mostly redundant to authopt_fuzz, but it's sensitive code so IMO it
makes sense to test this layer too
djm@openbsd.org [Fri, 27 May 2022 05:02:46 +0000 (05:02 +0000)]
upstream: split the low-level file handling functions out from
auth2-pubkey.c
Put them in a new auth2-pubkeyfile.c to make it easier to refer to them
(e.g. in unit/fuzz tests) without having to refer to everything else
pubkey auth brings in.
ok dtucker@
OpenBSD-Commit-ID:
3fdca2c61ad97dc1b8d4a7346816f83dc4ce2217
djm@openbsd.org [Fri, 27 May 2022 05:01:25 +0000 (05:01 +0000)]
upstream: refactor authorized_keys/principals handling
remove "struct ssh *" from arguments - this was only used to pass the
remote host/address. These can be passed in instead and the resulting
code is less tightly coupled to ssh_api.[ch]
ok dtucker@
OpenBSD-Commit-ID:
9d4373d013edc4cc4b5c21a599e1837ac31dda0d
dtucker@openbsd.org [Fri, 27 May 2022 04:29:40 +0000 (04:29 +0000)]
upstream: f sshpkt functions fail, then password is not cleared
with freezero. Unconditionally call freezero to guarantee that password is
removed from RAM.
From tobias@ and c3h2_ctf via github PR#286, ok djm@
OpenBSD-Commit-ID:
6b093619c9515328e25b0f8093779c52402c89cd
dtucker@openbsd.org [Fri, 27 May 2022 04:27:49 +0000 (04:27 +0000)]
upstream: Avoid kill with -1 argument. The out_ctx label can be
reached before fork has been called. If this happens, then kill -1 would be
called, sending SIGTERM to all processes reachable by the current process.
From tobias@ and c3h2_ctf via github PR#286, ok djm@
OpenBSD-Commit-ID:
6277af1207d81202f5daffdccfeeaed4c763b1a8
dtucker@openbsd.org [Fri, 27 May 2022 04:13:24 +0000 (04:13 +0000)]
upstream: Note that ProxyJump also accepts the same tokens as
ProxyCommand. From pallxk via github PR#305.
OpenBSD-Commit-ID:
7115ac351b129205f1f1ffa6bbfd62abd76be7c5
djm@openbsd.org [Wed, 25 May 2022 06:03:44 +0000 (06:03 +0000)]
upstream: revert previous; it was broken (spotted by Theo)
OpenBSD-Commit-ID:
457c79afaca2f89ec2606405c1059b98b30d8b0d
djm@openbsd.org [Wed, 25 May 2022 00:31:13 +0000 (00:31 +0000)]
upstream: make SSHBUF_DBG/SSHBUF_TELL (off by default and only enabled
via #define) dump to stderr rather than stdout
OpenBSD-Commit-ID:
10298513ee32db8390aecb0397d782d68cb14318
Tim Rice [Tue, 24 May 2022 17:21:25 +0000 (10:21 -0700)]
configure.ac: Add missing AC_DEFINE for caph_cache_tzdata test causing
HAVE_CAPH_CACHE_TZDATA to be missing from config.h.in.
Spotted by Bryan Drewery
djm@openbsd.org [Sun, 15 May 2022 23:48:07 +0000 (23:48 +0000)]
upstream: regress test for in-place transfers and clobbering larger
files with smaller ones; would have caught last regression in scp(1)
OpenBSD-Regress-ID:
19de4e88dd3a4f7e5c1618c9be3c32415bd93bc2
anton@openbsd.org [Fri, 22 Apr 2022 05:08:43 +0000 (05:08 +0000)]
upstream: Only run agent-ptrace.sh if gdb is available as all
architectures do not ship with gdb.
OpenBSD-Regress-ID:
ec53e928803e6b87f9ac142d38888ca79a45348d
djm@openbsd.org [Sun, 15 May 2022 23:47:21 +0000 (23:47 +0000)]
upstream: fix in-place copies; r1.163 incorrectly skipped truncation in
all cases, not just at the start of a transfer. This could cause overwrites
of larger files to leave junk at the end. Spotted by tb@
OpenBSD-Commit-ID:
b189f19cd68119548c8e24e39c79f61e115bf92c
djm@openbsd.org [Fri, 13 May 2022 06:31:50 +0000 (06:31 +0000)]
upstream: arrange for scp, when in sftp mode, to not ftruncate(3) files
early
previous behavious of unconditionally truncating the destination file
would cause "scp ~/foo localhost:" and "scp localhost:foo ~/" to
delete all the contents of their destination.
spotted by solene@ sthen@, also bz3431; ok dtucker@
OpenBSD-Commit-ID:
ca39fdd39e0ec1466b9666f15cbcfddea6aaa179
dtucker@openbsd.org [Mon, 9 May 2022 08:25:27 +0000 (08:25 +0000)]
upstream: Remove errant apostrophe. From haruyama at queen-ml org.
OpenBSD-Commit-ID:
dc6b294567cb84b384ad6ced9ca469f2bbf0bd10
djm@openbsd.org [Mon, 9 May 2022 03:09:53 +0000 (03:09 +0000)]
upstream: Allow existing -U (use agent) flag to work with "-Y sign"
operations, where it will be interpreted to require that the private keys is
hosted in an agent; bz3429, suggested by Adam Szkoda; ok dtucker@
OpenBSD-Commit-ID:
a7bc69873b99c32c42c7628ed9ea91565ba08c2f
djm@openbsd.org [Sun, 8 May 2022 22:58:35 +0000 (22:58 +0000)]
upstream: improve error message when 'ssh-keygen -Y sign' is unable to
load a private key; bz3429, reported by Adam Szkoda ok dtucker@
OpenBSD-Commit-ID:
bb57b285e67bea536ef81b1055467be2fc380e74
Tobias Heider [Mon, 9 May 2022 00:00:01 +0000 (02:00 +0200)]
Remove duplicate bcrypt_pbkdf.o from Makefile
bcrypt_pbkdf.o is duplicated in the openbsd-compat Makefile's object
file list.
djm@openbsd.org [Sun, 8 May 2022 22:32:36 +0000 (22:32 +0000)]
upstream: When performing operations that glob(3) a remote path, ensure
that the implicit working directory used to construct that path escapes
glob(3) characters.
This prevents glob characters from being processed in places they
shouldn't, e.g. "cd /tmp/a*/", "get *.txt" should have the get operation
treat the path "/tmp/a*" literally and not attempt to expand it.
Reported by Lusia Kundel; ok markus@
OpenBSD-Commit-ID:
4f647f58482cbad3d58b1eab7f6a1691433deeef
Darren Tucker [Fri, 6 May 2022 04:50:18 +0000 (14:50 +1000)]
Also retest OpenBSD upstream on .yml changes.
Darren Tucker [Fri, 6 May 2022 04:46:09 +0000 (14:46 +1000)]
Note that, for now, we need variadic macros.
Darren Tucker [Fri, 6 May 2022 04:39:34 +0000 (14:39 +1000)]
Add ubsan minimal testcase on OpenBSD.
As suggested by djm@.
djm@openbsd.org [Thu, 5 May 2022 01:04:14 +0000 (01:04 +0000)]
upstream: sshkey_unshield_private() contains a exact duplicate of
the code in private2_check_padding(). Pull private2_check_padding() up so the
code can be reused. From Martin Vahlensieck, ok deraadt@
OpenBSD-Commit-ID:
876884c3f0e62e8fd8d1594bab06900f971c9c85
djm@openbsd.org [Thu, 5 May 2022 00:56:58 +0000 (00:56 +0000)]
upstream: channel_new no longer frees remote_name. So update the
comment accordingly. As remote_name is not modified, it can be const as
well. From Martin Vahlensieck
OpenBSD-Commit-ID:
e4e10dc8dc9f40c166ea5a8e991942bedc75a76a
djm@openbsd.org [Thu, 5 May 2022 00:55:11 +0000 (00:55 +0000)]
upstream: mux.c: mark argument as const; from Martin Vahlensieck
OpenBSD-Commit-ID:
69a1a93a55986c7c2ad9f733c093b46a47184341
markus@openbsd.org [Wed, 4 May 2022 07:31:22 +0000 (07:31 +0000)]
upstream: make sure stdout is non-blocking; ok djm@
OpenBSD-Commit-ID:
64940fffbd1b882eda2d7c8c7a43c79368309c0d
florian@openbsd.org [Tue, 3 May 2022 07:42:27 +0000 (07:42 +0000)]
upstream: Add FIDO AUTHENTICATOR section and explain a bit how FIDO
works. The wording came mostly from the 8.2 OpenSSH release notes, addapted
to fit the man page. Then move the -O bits into the new section as is already
done for CERTIFICATES and MODULI GENERATION. Finally we can explain the
trade-offs of resident keys. While here, consistently refer to the FIDO
thingies as "FIDO authenticators", not "FIDO tokens".
input & OK jmc, naddy
OpenBSD-Commit-ID:
dd98748d7644df048f78dcf793b3b63db9ab1d25
jmc@openbsd.org [Mon, 2 May 2022 05:40:37 +0000 (05:40 +0000)]
upstream: remove an obsolete rsa1 format example from an example;
from megan batty
ok djm
OpenBSD-Commit-ID:
db2c89879c29bf083df996bd830abfb1e70d62bf
djm@openbsd.org [Sun, 1 May 2022 23:20:30 +0000 (23:20 +0000)]
upstream: fix some integer overflows in sieve_large() that show up when
trying to generate modp groups > 16k bits. Reported via GHPR#306 by Bertram
Felgenhauer, but fixed in a different way. feedback/ok tb@
OpenBSD-Commit-ID:
81cbc6dd3a21c57bd6fadea10e44afe37bca558e
djm@openbsd.org [Fri, 29 Apr 2022 04:55:07 +0000 (04:55 +0000)]
upstream: be stricter in which characters will be accepted in
specifying a mask length; allow only 0-9. From khaleesicodes via GHPR#278; ok
dtucker@
OpenBSD-Commit-ID:
e267746c047ea86665cdeccef795a8a56082eeb2
Darren Tucker [Sat, 30 Apr 2022 00:56:41 +0000 (10:56 +1000)]
Add Mac OS X 12 test target.
Darren Tucker [Fri, 29 Apr 2022 08:27:34 +0000 (18:27 +1000)]
Only run tests when source files change.
Also run tests on changes to V_9_0 branch.
Darren Tucker [Fri, 29 Apr 2022 08:22:34 +0000 (18:22 +1000)]
Remove now-empty int32_minmax.inc.
djm@openbsd.org [Fri, 29 Apr 2022 03:24:30 +0000 (03:24 +0000)]
upstream: mention that the helpers are used by ssh(1), ssh-agent(1)
and ssh-keygen(1). Previously only ssh(1) was mentioned. From Pedro
Martelletto
OpenBSD-Commit-ID:
30f880f989d4b329589c1c404315685960a5f153
dtucker@openbsd.org [Fri, 29 Apr 2022 03:16:48 +0000 (03:16 +0000)]
upstream: Don't leak SK device. Patch from Pedro Martelletto via
github PR#316. ok djm@
OpenBSD-Commit-ID:
17d11327545022e727d95fd08b213171c5a4585d
djm@openbsd.org [Fri, 29 Apr 2022 03:13:32 +0000 (03:13 +0000)]
upstream: fix memleak on session-bind path; from Pedro Martelletto, ok
dtucker@
OpenBSD-Commit-ID:
e85899a26ba402b4c0717b531317e8fc258f0a7e
djm@openbsd.org [Thu, 28 Apr 2022 02:53:31 +0000 (02:53 +0000)]
upstream: avoid printing hash algorithm twice; from lucas AT sexy.is
OpenBSD-Commit-ID:
9d24671e10a84141b7c504396cabad600e47a941
dtucker@openbsd.org [Wed, 27 Apr 2022 11:08:55 +0000 (11:08 +0000)]
upstream: Add authfd path to debug output. ok markus@
OpenBSD-Commit-ID:
f735a17d1a6f2bee63bfc609d76ef8db8c090890
dtucker@openbsd.org [Tue, 26 Apr 2022 07:41:44 +0000 (07:41 +0000)]
upstream: Check sshauthopt_new() for NULL. bz#3425, from
tessgauthier at microsoft.com. ok djm@
OpenBSD-Commit-ID:
af0315bc3e44aa406daa7e0ae7c2d719a974483f
millert@openbsd.org [Wed, 20 Apr 2022 16:00:25 +0000 (16:00 +0000)]
upstream: Remove unnecessary includes: openssl/hmac.h and
openssl/evp.h. From Martin Vahlensieck.
OpenBSD-Commit-ID:
a6debb5fb0c8a44e43e8d5ca7cc70ad2f3ea31c3
millert@openbsd.org [Wed, 20 Apr 2022 15:59:18 +0000 (15:59 +0000)]
upstream: Add missing includes of stdlib.h and stdint.h. We need
stdlib.h for malloc(3) and stdint.h for SIZE_MAX. Unlike the other xmss
files, ssh-xmss.c does not include xmss_commons.h so ssh-xmss.c must include
those headers itself. From Martin Vahlensieck
OpenBSD-Commit-ID:
70e28a9818cee3da1be2ef6503d4b396dd421e6b
millert@openbsd.org [Wed, 20 Apr 2022 15:56:49 +0000 (15:56 +0000)]
upstream: Avoid an unnecessary xstrdup in rm_env() when matching
patterns. Since match_pattern() doesn't modify its arguments (they are
const), there is no need to make an extra copy of the strings in
options->send_env. From Martin Vahlensieck
OpenBSD-Commit-ID:
2c9db31e3f4d3403b49642c64ee048b2a0a39351
Darren Tucker [Tue, 26 Apr 2022 13:30:59 +0000 (23:30 +1000)]
Add debian-riscv64 test target.
Darren Tucker [Mon, 25 Apr 2022 07:20:06 +0000 (17:20 +1000)]
Update OpenSSL and LibreSSL versions in tests.
Darren Tucker [Sat, 23 Apr 2022 10:40:28 +0000 (20:40 +1000)]
Include stdlib.h for free() prototype.
... which is used inside the CUSTOM_SYS_AUTH_GET_LASTLOGIN_MSG block.
Darren Tucker [Sat, 23 Apr 2022 10:17:26 +0000 (20:17 +1000)]
Cache timezone data in capsicum sandbox.
From emaste at freebsd.org, originally part of FreeBSD commit r339216
/
fc3c19a9 with autoconf bits added by me.
dtucker@openbsd.org [Thu, 21 Apr 2022 01:36:46 +0000 (01:36 +0000)]
upstream: It looks like we can't completely avoid
waiting for processes to exit so retrieve the pid via controlmaster and
use that.
OpenBSD-Regress-ID:
8246f00f22b14e49d2ff1744c94897ead33d457b
dtucker@openbsd.org [Wed, 20 Apr 2022 13:25:55 +0000 (13:25 +0000)]
upstream: Use ssh -f and ControlPersist ..
to start up test forwards and ssh -O stop to shut them down intead of
sleep loops. This speeds up the test by an order of magnitude.
OpenBSD-Regress-ID:
eb3db5f805100919b092a3b2579c611fba3e83e7
dtucker@openbsd.org [Wed, 20 Apr 2022 05:24:13 +0000 (05:24 +0000)]
upstream: Simplify forward-control test.
Since we no longer need to support SSH1 we don't need to run shell
commands on the other end of the connection and can use ssh -N instead.
This also makes the test less racy.
OpenBSD-Regress-ID:
32e94ce272820cc398f30b848b2b0f080d10302c
djm@openbsd.org [Thu, 31 Mar 2022 03:07:33 +0000 (03:07 +0000)]
upstream: regression test for sftp cp command
OpenBSD-Regress-ID:
c96bea9edde3a384b254785e7f9b2b24a81cdf82
dtucker@openbsd.org [Wed, 20 Apr 2022 01:13:47 +0000 (01:13 +0000)]
upstream: Import regenerated moduli
OpenBSD-Commit-ID:
f9a0726d957cf10692a231996a1f34e7f9cdfeb0
djm@openbsd.org [Wed, 20 Apr 2022 04:19:11 +0000 (04:19 +0000)]
upstream: Try to continue running local I/O for channels in state
OPEN during SSH transport rekeying. The most visible benefit is that it
should make ~-escapes work in the client (e.g. to exit) if the connection
happened to have stalled during a rekey event. Based work by and ok dtucker@
OpenBSD-Commit-ID:
a66e8f254e92edd4ce09c9f750883ec8f1ea5f45
dtucker@openbsd.org [Wed, 20 Apr 2022 01:13:47 +0000 (01:13 +0000)]
upstream: Import regenerated moduli
OpenBSD-Commit-ID:
f9a0726d957cf10692a231996a1f34e7f9cdfeb0
tj@openbsd.org [Sat, 16 Apr 2022 00:22:31 +0000 (00:22 +0000)]
upstream: list the correct version number
for when usage of the sftp protocol became default and fix a typo
from ed maste
OpenBSD-Commit-ID:
24e1795ed2283fdeacf16413c2f07503bcdebb31
dtucker@openbsd.org [Tue, 12 Apr 2022 05:09:49 +0000 (05:09 +0000)]
upstream: Correct path for system known hosts file in description
of IgnoreUserKnownHosts. Patch from Martin Vahlensieck via tech@
OpenBSD-Commit-ID:
9b7784f054fa5aa4d63cb36bd563889477127215
Darren Tucker [Sat, 16 Apr 2022 04:33:20 +0000 (14:33 +1000)]
Resync moduli.5 with upstream.
1.18: remove duplicate publication year; carsten dot kunze at arcor dot de
1.19: ssh-keygen's -G/-T have been replaced with -M generate/screen.
Darren Tucker [Sat, 16 Apr 2022 04:31:13 +0000 (14:31 +1000)]
Retire fbsd6 test VM.
It's long since out of support, relatively slow (it's i686) and the
compiler has trouble with PIE.
djm@openbsd.org [Mon, 11 Apr 2022 22:52:08 +0000 (22:52 +0000)]
upstream: clear io_want/io_ready flags at start of poll() cycle;
avoids plausible spin during rekeying if channel io_want flags are reused
across cycles. ok markus@ deraadt@
OpenBSD-Commit-ID:
91034f855b7c73cd2591657c49ac30f10322b967
dtucker@openbsd.org [Fri, 8 Apr 2022 05:43:39 +0000 (05:43 +0000)]
upstream: Note that curve25519-sha256 was later published in
RFC8731. ok djm@
OpenBSD-Commit-ID:
2ac2b5d642d4cf5918eaec8653cad9a4460b2743
djm@openbsd.org [Fri, 8 Apr 2022 04:40:40 +0000 (04:40 +0000)]
upstream: two defensive changes from Tobias Stoeckmann via GHPR287
enforce stricter invarient for sshbuf_set_parent() - never allow
a buffer to have a previously-set parent changed.
In sshbuf_reset(), if the reallocation fails, then zero the entire
buffer and not the (potentially smaller) default initial alloc size.
OpenBSD-Commit-ID:
14583203aa5d50ad38d2e209ae10abaf8955e6a9
Damien Miller [Mon, 11 Apr 2022 06:07:09 +0000 (16:07 +1000)]
Revert "update build-aux files to match autoconf-2.71"
This reverts commit
0a8ca39fac6ad19096b6c263436f8b2dd51606f2 .
It turns out that the checked-in copies of these files are actually newer
than autoconf-2.71's copies, so this was effectively a downgrade.
Spotted by Bo Anderson via github
Damien Miller [Fri, 8 Apr 2022 04:48:58 +0000 (14:48 +1000)]
update build-aux files to match autoconf-2.71
i.e. config.guess, config.sub and install-sh
Damien Miller [Wed, 6 Apr 2022 00:47:48 +0000 (10:47 +1000)]
update version numbers for release
djm@openbsd.org [Mon, 4 Apr 2022 22:45:25 +0000 (22:45 +0000)]
upstream: openssh-9.0
OpenBSD-Commit-ID:
0dfb461188f4513ec024c1534da8c1ce14c20b64
naddy@openbsd.org [Thu, 31 Mar 2022 17:58:44 +0000 (17:58 +0000)]
upstream: ssh: document sntrup761x25519-sha512@openssh.com as
default KEX
OpenBSD-Commit-ID:
12545bfa10bcbf552d04d9d9520d0f4e98b0e171
naddy@openbsd.org [Thu, 31 Mar 2022 17:27:27 +0000 (17:27 +0000)]
upstream: man pages: add missing commas between subordinate and
main clauses
jmc@ dislikes a comma before "then" in a conditional, so leave those
untouched.
ok jmc@
OpenBSD-Commit-ID:
9520801729bebcb3c9fe43ad7f9776ab4dd05ea3