]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
djm@openbsd.org [Wed, 22 Jan 2020 04:49:16 +0000 (04:49 +0000)]
upstream: some __func__ and strerror(errno) here; no functional
change
OpenBSD-Commit-ID:
6c3ddd5f848b99ea560b31d3fba99ceed66cef37
djm@openbsd.org [Wed, 22 Jan 2020 02:25:21 +0000 (02:25 +0000)]
upstream: factor out parsing of allowed-signers lines
OpenBSD-Commit-ID:
85ee6aeff608371826019ea85e55bfa87f79d06e
Damien Miller [Tue, 21 Jan 2020 23:30:13 +0000 (10:30 +1100)]
unbreak fuzzer support for recent ssh-sk.h changes
djm@openbsd.org [Tue, 21 Jan 2020 22:39:57 +0000 (22:39 +0000)]
upstream: expose the number of currently-authenticating connections
along with the MaxStartups limit in the proctitle; suggestion from Philipp
Marek, w/ feedback from Craig Miskell ok dtucker@
OpenBSD-Commit-ID:
a4a6db2dc1641a5df8eddf7d6652176e359dffb3
naddy@openbsd.org [Tue, 21 Jan 2020 12:40:04 +0000 (12:40 +0000)]
upstream: document the default value of the ControlPersist option;
ok dtucker@ djm@
OpenBSD-Commit-ID:
0788e7f2b5a9d4e36d3d2ab378f73329320fef66
Damien Miller [Tue, 21 Jan 2020 22:28:32 +0000 (09:28 +1100)]
remove accidental change in
f8c11461
djm@openbsd.org [Tue, 21 Jan 2020 11:06:09 +0000 (11:06 +0000)]
upstream: don't #ifdef out the KRL code when compiling without
libcrypto support; it works just fine and disabling it breaks a few tests. ok
dtucker@
OpenBSD-Commit-ID:
65f6272c4241eb4b04de78b012fe98b2b555ad44
djm@openbsd.org [Tue, 21 Jan 2020 08:06:27 +0000 (08:06 +0000)]
upstream: pass SSH_SK_HELPER explicitly past $SUDO to avoid it getting
cleared; with dtucker@
OpenBSD-Regress-ID:
03178a0580324bf0dff28f7eac6c3edbc5407f8e
djm@openbsd.org [Tue, 21 Jan 2020 07:07:31 +0000 (07:07 +0000)]
upstream: check access(ssh-sk-helper, X_OK) to provide friendly
error message for misconfigured helper paths
OpenBSD-Commit-ID:
061bcc262155d12e726305c91394ac0aaf1f8341
dtucker@openbsd.org [Tue, 21 Jan 2020 06:09:56 +0000 (06:09 +0000)]
upstream: Document sntrup4591761x25519-sha512@tinyssh.org. Patch
from jtesta@positronsecurity.com via github PR#151.
OpenBSD-Commit-ID:
f3d48168623045c258245c340a5a2af7dbb74edc
djm@openbsd.org [Tue, 21 Jan 2020 05:56:56 +0000 (05:56 +0000)]
upstream: fix ssh-keygen not displaying authenticator touch
prompt; reported by jmc@
OpenBSD-Commit-ID:
04d4f582fc194eb3897ebcbfe286c49958ba2859
djm@openbsd.org [Tue, 21 Jan 2020 05:56:27 +0000 (05:56 +0000)]
upstream: a little more verbosity in sign_and_send_pubkey() debug
messages
OpenBSD-Commit-ID:
6da47a0e6373f6683006f49bc2a516d197655508
naddy@openbsd.org [Sat, 18 Jan 2020 21:16:43 +0000 (21:16 +0000)]
upstream: one more replacement "(security) key" -> "(FIDO)
authenticator"
OpenBSD-Commit-ID:
031bca03c1d1f878ab929facd561911f1bc68dfd
naddy@openbsd.org [Sat, 18 Jan 2020 15:45:41 +0000 (15:45 +0000)]
upstream: undo merge error and replace the term "security key"
again
OpenBSD-Commit-ID:
341749062c089cc360a7877e9ee3a887aecde395
naddy@openbsd.org [Fri, 17 Jan 2020 20:13:47 +0000 (20:13 +0000)]
upstream: Document loading of resident keys from a FIDO
authenticator.
* Rename -O to -K to keep "-O option" available.
* Document -K.
* Trim usage() message down to synopsis, like all other commands.
ok markus@
OpenBSD-Commit-ID:
015c2c4b28f8e19107adc80351b44b23bca4c78a
naddy@openbsd.org [Tue, 14 Jan 2020 15:07:30 +0000 (15:07 +0000)]
upstream: sync ssh-keygen.1 and ssh-keygen's usage() with each
other and reality ok markus@
OpenBSD-Commit-ID:
cdf64454f2c3604c25977c944e5b6262a3bcce92
naddy@openbsd.org [Sat, 11 Jan 2020 16:23:10 +0000 (16:23 +0000)]
upstream: revise the fix for reversed arguments on
expand_proxy_command()
Always put 'host' before 'host_arg' for consistency. ok markus@ djm@
OpenBSD-Commit-ID:
1ba5b25472779f1b1957295fcc6907bb961472a3
djm@openbsd.org [Fri, 10 Jan 2020 23:43:26 +0000 (23:43 +0000)]
upstream: pass the log-on-stderr flag and log level through to
ssh-sk-helper, making debugging a bit easier. ok markus@
OpenBSD-Commit-ID:
2e7aea6bf5770d3f38b7c7bba891069256c5a49a
Damien Miller [Tue, 21 Jan 2020 01:32:16 +0000 (12:32 +1100)]
Wrap copy_environment_blacklist() in #ifdef
It's only needed for USE_PAM or HAVE_CYGWIN cases and will cause compiler
warnings otherwise.
Damien Miller [Tue, 21 Jan 2020 01:20:05 +0000 (12:20 +1100)]
depend
Ruben Kerkhof [Mon, 20 Jan 2020 10:56:48 +0000 (11:56 +0100)]
Fix missing prototype warning for copy_environment
This function is only used in this file, and only on Cygwin, so make
it static and hide it behind HAVE_CYGWIN. Prevents missing prototype
warning.
Ruben Kerkhof [Mon, 20 Jan 2020 12:58:11 +0000 (13:58 +0100)]
configure.ac: fix ldns test
When running ./configure --with-ldns, if ldns-config cannot be found, we
add -Iyes/include to CPPFLAGS and -Lyes/lib to LDFLAGS. Fix that.
Ruben Kerkhof [Mon, 20 Jan 2020 11:13:26 +0000 (12:13 +0100)]
Make sshpam_password_change_required static.
sshpam_password_change_required is only used in auth-pam.c, so make it
static to prevent a mising prototype warning.
Ruben Kerkhof [Mon, 20 Jan 2020 11:24:51 +0000 (12:24 +0100)]
sandbox-darwin.c: fix missing prototypes.
Include the right header just like the other sandbox files.
Fixes missing prototype warnings for ssh_sandbox_* functions.
Ruben Kerkhof [Mon, 20 Jan 2020 10:09:27 +0000 (11:09 +0100)]
Fix a few warnings when on Mac OS X.
Include stdlib.h for calloc, malloc, free and setenv.
Ruben Kerkhof [Mon, 20 Jan 2020 09:32:23 +0000 (10:32 +0100)]
Fix building without openssl.
This fixes the following when there are no openssl headers on the system:
ssh-ecdsa-sk.c:34:10: fatal error: 'openssl/bn.h' file not found
Ruben Kerkhof [Wed, 15 Jan 2020 15:08:55 +0000 (16:08 +0100)]
Add config.log to .gitignore
Ruben Kerkhof [Wed, 15 Jan 2020 15:16:31 +0000 (16:16 +0100)]
Fix typo in README.md, s/crytpo/crypto/
Darren Tucker [Wed, 15 Jan 2020 05:22:36 +0000 (16:22 +1100)]
Wrap stdint.h in ifdef HAVE_STDINT_H.
Darren Tucker [Tue, 14 Jan 2020 03:41:47 +0000 (14:41 +1100)]
Wrap stdint.h inside HAVE_STDINT_H.
Darren Tucker [Tue, 14 Jan 2020 03:26:41 +0000 (14:26 +1100)]
Include compat header for definitions.
Darren Tucker [Mon, 13 Jan 2020 22:42:52 +0000 (09:42 +1100)]
Improve search for 'struct timespec'.
Make struct timespec test consistent with existing timeval test.
Include time.h for timespec in compat header where required.
Darren Tucker [Tue, 14 Jan 2020 01:43:03 +0000 (12:43 +1100)]
Update depend to remove rmd160.h.
Darren Tucker [Mon, 13 Jan 2020 20:24:46 +0000 (07:24 +1100)]
Remove configure test & compat code for ripemd160.
RIPEMD160 support was removed upstream in 2017, however we still had
a configure test and compat code for it, so clean those up now.
djm@openbsd.org [Thu, 9 Jan 2020 03:28:38 +0000 (03:28 +0000)]
upstream: fix reversed arguments on expand_proxy_command(); spotted
by anton@
OpenBSD-Commit-ID:
db1c32478a01dfbc9c4db171de0f25907bea5775
jmc@openbsd.org [Mon, 6 Jan 2020 07:43:28 +0000 (07:43 +0000)]
upstream: put the fido options in a list, and tidy up the text a
little; ok djm
OpenBSD-Commit-ID:
491ce15ae52a88b7a6a2b3b6708a14b4aacdeebb
Jeremy Drake [Sat, 12 Oct 2019 01:31:05 +0000 (18:31 -0700)]
Deny (non-fatal) ipc in preauth privsep child.
As noted in openssh/openssh-portable#149, i386 does not have have
_NR_shmget etc. Instead, it has a single ipc syscall (see man 2 ipc,
https://linux.die.net/man/2/ipc). Add this syscall, if present, to the
list of syscalls that seccomp will deny non-fatally.
Khem Raj [Wed, 8 Jan 2020 00:26:45 +0000 (16:26 -0800)]
seccomp: Allow clock_gettime64() in sandbox.
This helps sshd accept connections on mips platforms with
upcoming glibc ( 2.31 )
djm@openbsd.org [Mon, 6 Jan 2020 02:39:30 +0000 (02:39 +0000)]
upstream: missing else in check_enroll_options()
OpenBSD-Commit-ID:
e058fb918fda56ddbbf0bee910101004cec421d4
djm@openbsd.org [Mon, 6 Jan 2020 02:24:28 +0000 (02:24 +0000)]
upstream: fix error message
OpenBSD-Commit-ID:
1eb52025658eb78ea6223181e552862198d3d505
djm@openbsd.org [Mon, 6 Jan 2020 02:07:50 +0000 (02:07 +0000)]
upstream: adapt sk-dummy to SK API changes
also, make it pull prototypes directly from sk-api.c and #error
if the expected version changes. This will make any future regress
test breakage because of SK API changes much more apparent
OpenBSD-Regress-ID:
79b07055de4feb988e31da71a89051ad5969829d
djm@openbsd.org [Mon, 6 Jan 2020 02:00:46 +0000 (02:00 +0000)]
upstream: Extends the SK API to accept a set of key/value options
for all operations. These are intended to future-proof the API a little by
making it easier to specify additional fields for without having to change
the API version for each.
At present, only two options are defined: one to explicitly specify
the device for an operation (rather than accepting the middleware's
autoselection) and another to specify the FIDO2 username that may
be used when generating a resident key. These new options may be
invoked at key generation time via ssh-keygen -O
This also implements a suggestion from Markus to avoid "int" in favour
of uint32_t for the algorithm argument in the API, to make implementation
of ssh-sk-client/helper a little easier.
feedback, fixes and ok markus@
OpenBSD-Commit-ID:
973ce11704609022ab36abbdeb6bc23c8001eabc
beck@openbsd.org [Sun, 5 Jan 2020 16:28:22 +0000 (16:28 +0000)]
upstream: fix CanonicalizeHostname, broken by rev 1.507
Issue noticed and reported by Pierre-Olivier Martel <pom@apple.com>
ok dtucker@ markus@ djm@
OpenBSD-Commit-ID:
749f3168ec520609c35b0c4e1984e5fa47f16094
Darren Tucker [Sun, 5 Jan 2020 22:02:53 +0000 (09:02 +1100)]
Fix typo: 'you' -> 'your'.
bz#3108 from jmckitrick@gmail.com.
Darren Tucker [Sun, 5 Jan 2020 21:56:46 +0000 (08:56 +1100)]
Remove auth-skey.c.
S/Key support was removed in OpenSSH 7.8 but this file was missed.
jmc@openbsd.org [Fri, 3 Jan 2020 07:33:33 +0000 (07:33 +0000)]
upstream: the download resident keys option is -K (upper) not -k
(lower); ok djm
OpenBSD-Commit-ID:
71dc28a3e1fa7c553844abc508845bcf5766e091
djm@openbsd.org [Fri, 3 Jan 2020 03:02:26 +0000 (03:02 +0000)]
upstream: what bozo decided to use 2020 as a future date in a regress
test?
OpenBSD-Regress-ID:
3b953df5a7e14081ff6cf495d4e8d40e153cbc3a
djm@openbsd.org [Fri, 3 Jan 2020 02:46:19 +0000 (02:46 +0000)]
upstream: implement recent SK API change to support resident keys
and PIN prompting in the dummy middleware that we use for the tests. Should
fix breakage spotted by dtucker@
OpenBSD-Regress-ID:
379cf9eabfea57aaf7f3f59dafde59889566c484
dtucker@openbsd.org [Thu, 2 Jan 2020 13:25:38 +0000 (13:25 +0000)]
upstream: Update keygen moduli screen test to match recent command
line option change to ssh-keygen(1).
OpenBSD-Regress-ID:
744a72755004377e9669b662c13c6aa9ead8a0c3
djm@openbsd.org [Thu, 2 Jan 2020 22:40:09 +0000 (22:40 +0000)]
upstream: ability to download FIDO2 resident keys from a token via
"ssh-keygen -K". This will save public/private keys into the current
directory.
This is handy if you move a token between hosts.
feedback & ok markus@
OpenBSD-Commit-ID:
d57c1f9802f7850f00a117a1d36682a6c6d10da6
djm@openbsd.org [Thu, 2 Jan 2020 22:38:33 +0000 (22:38 +0000)]
upstream: add sshkey_save_public(), to save a public key; ok
markus@
OpenBSD-Commit-ID:
5d6f96a966d10d7fa689ff9aa9e1d6767ad5a076
jmc@openbsd.org [Mon, 30 Dec 2019 16:10:00 +0000 (16:10 +0000)]
upstream: simplify the list for moduli options - no need for
-compact;
OpenBSD-Commit-ID:
6492c72280482c6d072be46236b365cb359fc280
Damien Miller [Thu, 2 Jan 2020 02:41:31 +0000 (13:41 +1100)]
ssh-sk-null.cc needs extern "C" {}
Damien Miller [Wed, 1 Jan 2020 23:56:29 +0000 (10:56 +1100)]
add dummy ssh-sk API for linking with fuzzers
Damien Miller [Mon, 30 Dec 2019 10:04:09 +0000 (21:04 +1100)]
refresh depend
djm@openbsd.org [Mon, 30 Dec 2019 09:49:52 +0000 (09:49 +0000)]
upstream: Remove the -x option currently used for
FIDO/U2F-specific key flags. Instead these flags may be specified via -O.
ok markus@
OpenBSD-Commit-ID:
f23ebde2a8a7e1bf860a51055a711cffb8c328c1
djm@openbsd.org [Mon, 30 Dec 2019 09:25:29 +0000 (09:25 +0000)]
upstream: document SK API changes in PROTOCOL.u2f
ok markus@
OpenBSD-Commit-ID:
52622363c103a3c4d3d546050480ffe978a32186
djm@openbsd.org [Mon, 30 Dec 2019 09:24:45 +0000 (09:24 +0000)]
upstream: translate and return error codes; retry on bad PIN
Define some well-known error codes in the SK API and pass
them back via ssh-sk-helper.
Use the new "wrong PIN" error code to retry PIN prompting during
ssh-keygen of resident keys.
feedback and ok markus@
OpenBSD-Commit-ID:
9663c6a2bb7a0bc8deaccc6c30d9a2983b481620
djm@openbsd.org [Mon, 30 Dec 2019 09:24:03 +0000 (09:24 +0000)]
upstream: improve some error messages; ok markus@
OpenBSD-Commit-ID:
4ccd8ddabb8df4f995107dd3b7ea58220e93cb81
djm@openbsd.org [Mon, 30 Dec 2019 09:23:28 +0000 (09:23 +0000)]
upstream: SK API and sk-helper error/PIN passing
Allow passing a PIN via the SK API (API major crank) and let the
ssh-sk-helper API follow.
Also enhance the ssh-sk-helper API to support passing back an error
code instead of a complete reply. Will be used to signal "wrong PIN",
etc.
feedback and ok markus@
OpenBSD-Commit-ID:
a1bd6b0a2421646919a0c139b8183ad76d28fb71
djm@openbsd.org [Mon, 30 Dec 2019 09:22:49 +0000 (09:22 +0000)]
upstream: implement loading resident keys in ssh-add
"ssh-add -O" will load resident keys from a FIDO2 token and add them
to a ssh-agent.
feedback and ok markus@
OpenBSD-Commit-ID:
608104ae957a7d65cb84e0a3a26c8f60e0df3290
djm@openbsd.org [Mon, 30 Dec 2019 09:21:59 +0000 (09:21 +0000)]
upstream: implement loading of resident keys in ssh-sk-helper
feedback and ok markus@
OpenBSD-Commit-ID:
b273c23769ea182c55c4a7b8f9cbd9181722011a
djm@openbsd.org [Mon, 30 Dec 2019 09:21:16 +0000 (09:21 +0000)]
upstream: resident keys support in SK API
Adds a sk_load_resident_keys() function to the security key
API that accepts a security key provider and a PIN and returns
a list of keys.
Implement support for this in the usbhid middleware.
feedback and ok markus@
OpenBSD-Commit-ID:
67e984e4e87f4999ce447a6178c4249a9174eff0
djm@openbsd.org [Mon, 30 Dec 2019 09:20:36 +0000 (09:20 +0000)]
upstream: Factor out parsing of struct sk_enroll_response
We'll reuse this for extracting resident keys from a device.
feedback and ok markus@
OpenBSD-Commit-ID:
9bc1efd9c6897eac4df0983746cf6578c1542273
djm@openbsd.org [Mon, 30 Dec 2019 09:19:52 +0000 (09:19 +0000)]
upstream: basic support for generating FIDO2 resident keys
"ssh-keygen -t ecdsa-sk|
ed25519 -sk -x resident" will generate a
device-resident key.
feedback and ok markus@
OpenBSD-Commit-ID:
8e1b3c56a4b11d85047bd6c6c705b7eef4d58431
djm@openbsd.org [Mon, 30 Dec 2019 03:30:09 +0000 (03:30 +0000)]
upstream: remove single-letter flags for moduli options
Move all moduli generation options to live under the -O flag.
Frees up seven single-letter flags.
NB. this change break existing ssh-keygen commandline syntax for moduli-
related operations. Very few people use these fortunately.
feedback and ok markus@
OpenBSD-Commit-ID:
d498f3eaf28128484826a4fcb343612764927935
djm@openbsd.org [Mon, 30 Dec 2019 03:28:41 +0000 (03:28 +0000)]
upstream: prepare for use of ssh-keygen -O flag beyond certs
Move list of available certificate options in ssh-keygen.1 to the
CERTIFICATES section.
Collect options specified by -O but delay parsing/validation of
certificate options until we're sure that we're acting as a CA.
ok markus@
OpenBSD-Commit-ID:
33e6bcc29cfca43606f6fa09bd84b955ee3a4106
jmc@openbsd.org [Fri, 27 Dec 2019 08:28:44 +0000 (08:28 +0000)]
upstream: sort -Y internally in the options list, as is already
done in synopsis;
OpenBSD-Commit-ID:
86d033c5764404057616690d7be992e445b42274
jmc@openbsd.org [Fri, 27 Dec 2019 08:25:07 +0000 (08:25 +0000)]
upstream: in the options list, sort -Y and -y;
OpenBSD-Commit-ID:
24c2e6a3aeab6e050a0271ffc73fdff91c10dcaa
naddy@openbsd.org [Sat, 21 Dec 2019 20:22:34 +0000 (20:22 +0000)]
upstream: Replace the term "security key" with "(FIDO)
authenticator".
The polysemous use of "key" was too confusing. Input from markus@.
ok jmc@
OpenBSD-Commit-ID:
12eea973a44c8232af89f86e4269d71ae900ca8f
djm@openbsd.org [Sat, 21 Dec 2019 02:33:07 +0000 (02:33 +0000)]
upstream: unit tests for ForwardAgent=/path; from Eric Chiang
OpenBSD-Regress-ID:
24f693f78290b2c17725dab2c614dffe4a88c8da
djm@openbsd.org [Mon, 16 Dec 2019 02:39:05 +0000 (02:39 +0000)]
upstream: test security key host keys in addition to user keys
OpenBSD-Regress-ID:
9fb45326106669a27e4bf150575c321806e275b1
djm@openbsd.org [Sat, 21 Dec 2019 02:19:13 +0000 (02:19 +0000)]
upstream: Allow forwarding a different agent socket to the path
specified by $SSH_AUTH_SOCK, by extending the existing ForwardAgent option to
accepting an explicit path or the name of an environment variable in addition
to yes/no.
Patch by Eric Chiang, manpage by me; ok markus@
OpenBSD-Commit-ID:
98f2ed80bf34ea54d8b2ddd19ac14ebbf40e9265
naddy@openbsd.org [Fri, 20 Dec 2019 20:28:55 +0000 (20:28 +0000)]
upstream: SSH U2F keys can now be used as host keys. Fix a garden
path sentence. ok markus@
OpenBSD-Commit-ID:
67d7971ca1a020acd6c151426c54bd29d784bd6b
dtucker@openbsd.org [Fri, 20 Dec 2019 02:42:42 +0000 (02:42 +0000)]
upstream: Move always unsupported keywords to be grouped with the other
ones. Move oSecurityProvider to match the order in the OpCodes enum. Patch
from openbsd@academicsolutions.ch, ok djm@
OpenBSD-Commit-ID:
061e4505861ec1e02ba3a63e3d1b3be3cad458ec
dtucker@openbsd.org [Fri, 20 Dec 2019 02:29:21 +0000 (02:29 +0000)]
upstream: Remove obsolete opcodes from the configuation enum.
Patch from openbsd@academicsolutions.ch, ok djm@
OpenBSD-Commit-ID:
395c202228872ce8d9044cc08552ac969f51e01b
dtucker@openbsd.org [Fri, 20 Dec 2019 02:11:38 +0000 (02:11 +0000)]
upstream: Remove now-obsolete config options from example in
comment. Patch from openbsd@academicsolutions.ch, ok djm@
OpenBSD-Commit-ID:
35862beb0927b1cb0af476ec23cc07f6e3006101
naddy@openbsd.org [Thu, 19 Dec 2019 15:09:30 +0000 (15:09 +0000)]
upstream: Document that security key-hosted keys can act as host
keys.
Update the list of default host key algorithms in ssh_config.5 and
sshd_config.5. Copy the description of the SecurityKeyProvider
option to sshd_config.5.
ok jmc@
OpenBSD-Commit-ID:
edadf3566ab5e94582df4377fee3b8b702c7eca0
dtucker@openbsd.org [Thu, 19 Dec 2019 03:50:01 +0000 (03:50 +0000)]
upstream: "Forward security" -> "Forward secrecy" since that's the
correct term. Add "MAC" since we use that acronym in other man pages. ok
naddy@
OpenBSD-Commit-ID:
c35529e511788586725fb63bda3459e10738c5f5
naddy@openbsd.org [Tue, 17 Dec 2019 16:21:07 +0000 (16:21 +0000)]
upstream: cut obsolete lists of crypto algorithms from outline of
how SSH works ok markus@ jmc@
OpenBSD-Commit-ID:
8e34973f232ab48c4d4f5d07df48d501708b9160
tobhe@openbsd.org [Mon, 16 Dec 2019 13:58:53 +0000 (13:58 +0000)]
upstream: strdup may return NULL if memory allocation fails. Use
the safer xstrdup which fatals on allocation failures.
ok markus@
OpenBSD-Commit-ID:
8b608d387120630753cbcb8110e0b019c0c9a0d0
djm@openbsd.org [Mon, 16 Dec 2019 03:16:58 +0000 (03:16 +0000)]
upstream: sort sk-* methods behind their plain key methods cousins
for now
OpenBSD-Commit-ID:
c97e22c2b28c0d12ee389b8b4ef5f2ada7908828
Darren Tucker [Tue, 17 Dec 2019 08:46:15 +0000 (19:46 +1100)]
Mac OS X has PAM too.
Darren Tucker [Tue, 17 Dec 2019 08:37:06 +0000 (19:37 +1100)]
Show portable tarball pattern in example.
Darren Tucker [Tue, 17 Dec 2019 08:35:59 +0000 (19:35 +1100)]
OpenSSL is now optional.
djm@openbsd.org [Sun, 15 Dec 2019 18:58:33 +0000 (18:58 +0000)]
upstream: adapt to ssh-sk-client change
OpenBSD-Regress-ID:
40481999a5928d635ab2e5b029e8239c112005ea
djm@openbsd.org [Wed, 11 Dec 2019 18:47:14 +0000 (18:47 +0000)]
upstream: it's no longer possible to disable privilege separation
in sshd, so don't double the tests' work by trying both off/on
OpenBSD-Regress-ID:
d366665466dbd09e9b707305da884be3e7619c68
djm@openbsd.org [Sun, 15 Dec 2019 20:59:23 +0000 (20:59 +0000)]
upstream: don't treat HostKeyAgent=none as a path either; avoids
spurious warnings from the cfgparse regress test
OpenBSD-Commit-ID:
ba49ea7a5c92b8a16cb9c2e975dbb163853afc54
djm@openbsd.org [Sun, 15 Dec 2019 20:57:15 +0000 (20:57 +0000)]
upstream: do not attempt to find an absolute path for sshd_config
SecurityKeyProvider=internal - unbreaks cfgparse regress test
OpenBSD-Commit-ID:
d2ddcf525c0dc3c8339522360c10b3c70f1fd641
djm@openbsd.org [Sun, 15 Dec 2019 19:47:10 +0000 (19:47 +0000)]
upstream: allow ssh-keyscan to find security key hostkeys
OpenBSD-Commit-ID:
1fe822a7f714df19a7e7184e3a3bbfbf546811d3
djm@openbsd.org [Sun, 15 Dec 2019 18:57:30 +0000 (18:57 +0000)]
upstream: allow security keys to act as host keys as well as user
keys.
Previously we didn't do this because we didn't want to expose
the attack surface presented by USB and FIDO protocol handling,
but now that this is insulated behind ssh-sk-helper there is
less risk.
ok markus@
OpenBSD-Commit-ID:
77b068dd133b8d87e0f010987bd5131e640ee64c
Darren Tucker [Mon, 16 Dec 2019 02:55:56 +0000 (13:55 +1100)]
Allow clock_nanosleep_time64 in seccomp sandbox.
Needed on Linux ARM. bz#3100, patch from jjelen@redhat.com.
Darren Tucker [Sun, 15 Dec 2019 07:27:02 +0000 (18:27 +1100)]
Put SK ECDSA bits inside ifdef OPENSSL_HAS_ECC.
Fixes build when linking against OpenSSLs built with no-ec.
Damien Miller [Fri, 13 Dec 2019 22:21:46 +0000 (09:21 +1100)]
remove a bunch of ENABLE_SK #ifdefs
The ssh-sk-helper client API gives us a nice place to disable
security key support when it is wasn't enabled at compile time,
so we don't need to check everywere.
Also, verification of security key signatures can remain enabled
all the time - it has no additional dependencies. So sshd can
accept security key pubkeys in authorized_keys, etc regardless of
the host's support for dlopen, etc.
Damien Miller [Fri, 13 Dec 2019 22:15:06 +0000 (09:15 +1100)]
ssh-sk-client.c needs includes.h
Damien Miller [Fri, 13 Dec 2019 21:40:33 +0000 (08:40 +1100)]
only link ssh-sk-helper against libfido2
Damien Miller [Fri, 13 Dec 2019 21:20:52 +0000 (08:20 +1100)]
adapt Makefile to ssh-sk-client everywhere
Damien Miller [Fri, 13 Dec 2019 20:53:11 +0000 (07:53 +1100)]
fixup
djm@openbsd.org [Fri, 13 Dec 2019 20:16:56 +0000 (20:16 +0000)]
upstream: actually commit the ssh-sk-helper client code; ok markus
OpenBSD-Commit-ID:
fd2ea776a5bbbf4d452989d3c3054cf25a5e0589
djm@openbsd.org [Fri, 13 Dec 2019 19:11:14 +0000 (19:11 +0000)]
upstream: perform security key enrollment via ssh-sk-helper too.
This means that ssh-keygen no longer needs to link against ssh-sk-helper, and
only ssh-sk-helper needs libfido2 and /dev/uhid* access;
feedback & ok markus@
OpenBSD-Commit-ID:
9464233fab95708d2ff059f8bee29c0d1f270800