]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
5 years agoupstream: some __func__ and strerror(errno) here; no functional
djm@openbsd.org [Wed, 22 Jan 2020 04:49:16 +0000 (04:49 +0000)] 
upstream: some __func__ and strerror(errno) here; no functional

change

OpenBSD-Commit-ID: 6c3ddd5f848b99ea560b31d3fba99ceed66cef37

5 years agoupstream: factor out parsing of allowed-signers lines
djm@openbsd.org [Wed, 22 Jan 2020 02:25:21 +0000 (02:25 +0000)] 
upstream: factor out parsing of allowed-signers lines

OpenBSD-Commit-ID: 85ee6aeff608371826019ea85e55bfa87f79d06e

5 years agounbreak fuzzer support for recent ssh-sk.h changes
Damien Miller [Tue, 21 Jan 2020 23:30:13 +0000 (10:30 +1100)] 
unbreak fuzzer support for recent ssh-sk.h changes

5 years agoupstream: expose the number of currently-authenticating connections
djm@openbsd.org [Tue, 21 Jan 2020 22:39:57 +0000 (22:39 +0000)] 
upstream: expose the number of currently-authenticating connections

along with the MaxStartups limit in the proctitle; suggestion from Philipp
Marek, w/ feedback from Craig Miskell ok dtucker@

OpenBSD-Commit-ID: a4a6db2dc1641a5df8eddf7d6652176e359dffb3

5 years agoupstream: document the default value of the ControlPersist option;
naddy@openbsd.org [Tue, 21 Jan 2020 12:40:04 +0000 (12:40 +0000)] 
upstream: document the default value of the ControlPersist option;

ok dtucker@ djm@

OpenBSD-Commit-ID: 0788e7f2b5a9d4e36d3d2ab378f73329320fef66

5 years agoremove accidental change in f8c11461
Damien Miller [Tue, 21 Jan 2020 22:28:32 +0000 (09:28 +1100)] 
remove accidental change in f8c11461

5 years agoupstream: don't #ifdef out the KRL code when compiling without
djm@openbsd.org [Tue, 21 Jan 2020 11:06:09 +0000 (11:06 +0000)] 
upstream: don't #ifdef out the KRL code when compiling without

libcrypto support; it works just fine and disabling it breaks a few tests. ok
dtucker@

OpenBSD-Commit-ID: 65f6272c4241eb4b04de78b012fe98b2b555ad44

5 years agoupstream: pass SSH_SK_HELPER explicitly past $SUDO to avoid it getting
djm@openbsd.org [Tue, 21 Jan 2020 08:06:27 +0000 (08:06 +0000)] 
upstream: pass SSH_SK_HELPER explicitly past $SUDO to avoid it getting

cleared; with dtucker@

OpenBSD-Regress-ID: 03178a0580324bf0dff28f7eac6c3edbc5407f8e

5 years agoupstream: check access(ssh-sk-helper, X_OK) to provide friendly
djm@openbsd.org [Tue, 21 Jan 2020 07:07:31 +0000 (07:07 +0000)] 
upstream: check access(ssh-sk-helper, X_OK) to provide friendly

error message for misconfigured helper paths

OpenBSD-Commit-ID: 061bcc262155d12e726305c91394ac0aaf1f8341

5 years agoupstream: Document sntrup4591761x25519-sha512@tinyssh.org. Patch
dtucker@openbsd.org [Tue, 21 Jan 2020 06:09:56 +0000 (06:09 +0000)] 
upstream: Document sntrup4591761x25519-sha512@tinyssh.org. Patch

from jtesta@positronsecurity.com via github PR#151.

OpenBSD-Commit-ID: f3d48168623045c258245c340a5a2af7dbb74edc

5 years agoupstream: fix ssh-keygen not displaying authenticator touch
djm@openbsd.org [Tue, 21 Jan 2020 05:56:56 +0000 (05:56 +0000)] 
upstream: fix ssh-keygen not displaying authenticator touch

prompt; reported by jmc@

OpenBSD-Commit-ID: 04d4f582fc194eb3897ebcbfe286c49958ba2859

5 years agoupstream: a little more verbosity in sign_and_send_pubkey() debug
djm@openbsd.org [Tue, 21 Jan 2020 05:56:27 +0000 (05:56 +0000)] 
upstream: a little more verbosity in sign_and_send_pubkey() debug

messages

OpenBSD-Commit-ID: 6da47a0e6373f6683006f49bc2a516d197655508

5 years agoupstream: one more replacement "(security) key" -> "(FIDO)
naddy@openbsd.org [Sat, 18 Jan 2020 21:16:43 +0000 (21:16 +0000)] 
upstream: one more replacement "(security) key" -> "(FIDO)

authenticator"

OpenBSD-Commit-ID: 031bca03c1d1f878ab929facd561911f1bc68dfd

5 years agoupstream: undo merge error and replace the term "security key"
naddy@openbsd.org [Sat, 18 Jan 2020 15:45:41 +0000 (15:45 +0000)] 
upstream: undo merge error and replace the term "security key"

again

OpenBSD-Commit-ID: 341749062c089cc360a7877e9ee3a887aecde395

5 years agoupstream: Document loading of resident keys from a FIDO
naddy@openbsd.org [Fri, 17 Jan 2020 20:13:47 +0000 (20:13 +0000)] 
upstream: Document loading of resident keys from a FIDO

authenticator.

* Rename -O to -K to keep "-O option" available.
* Document -K.
* Trim usage() message down to synopsis, like all other commands.

ok markus@

OpenBSD-Commit-ID: 015c2c4b28f8e19107adc80351b44b23bca4c78a

5 years agoupstream: sync ssh-keygen.1 and ssh-keygen's usage() with each
naddy@openbsd.org [Tue, 14 Jan 2020 15:07:30 +0000 (15:07 +0000)] 
upstream: sync ssh-keygen.1 and ssh-keygen's usage() with each

other and reality ok markus@

OpenBSD-Commit-ID: cdf64454f2c3604c25977c944e5b6262a3bcce92

5 years agoupstream: revise the fix for reversed arguments on
naddy@openbsd.org [Sat, 11 Jan 2020 16:23:10 +0000 (16:23 +0000)] 
upstream: revise the fix for reversed arguments on

expand_proxy_command()

Always put 'host' before 'host_arg' for consistency.  ok markus@ djm@

OpenBSD-Commit-ID: 1ba5b25472779f1b1957295fcc6907bb961472a3

5 years agoupstream: pass the log-on-stderr flag and log level through to
djm@openbsd.org [Fri, 10 Jan 2020 23:43:26 +0000 (23:43 +0000)] 
upstream: pass the log-on-stderr flag and log level through to

ssh-sk-helper, making debugging a bit easier. ok markus@

OpenBSD-Commit-ID: 2e7aea6bf5770d3f38b7c7bba891069256c5a49a

5 years agoWrap copy_environment_blacklist() in #ifdef
Damien Miller [Tue, 21 Jan 2020 01:32:16 +0000 (12:32 +1100)] 
Wrap copy_environment_blacklist() in #ifdef

It's only needed for USE_PAM or HAVE_CYGWIN cases and will cause compiler
warnings otherwise.

5 years agodepend
Damien Miller [Tue, 21 Jan 2020 01:20:05 +0000 (12:20 +1100)] 
depend

5 years agoFix missing prototype warning for copy_environment
Ruben Kerkhof [Mon, 20 Jan 2020 10:56:48 +0000 (11:56 +0100)] 
Fix missing prototype warning for copy_environment

This function is only used in this file, and only on Cygwin, so make
it static and hide it behind HAVE_CYGWIN.  Prevents missing prototype
warning.

5 years agoconfigure.ac: fix ldns test
Ruben Kerkhof [Mon, 20 Jan 2020 12:58:11 +0000 (13:58 +0100)] 
configure.ac: fix ldns test

When running ./configure --with-ldns, if ldns-config cannot be found, we
add -Iyes/include to CPPFLAGS and -Lyes/lib to LDFLAGS. Fix that.

5 years agoMake sshpam_password_change_required static.
Ruben Kerkhof [Mon, 20 Jan 2020 11:13:26 +0000 (12:13 +0100)] 
Make sshpam_password_change_required static.

sshpam_password_change_required is only used in auth-pam.c, so make it
static to prevent a mising prototype warning.

5 years agosandbox-darwin.c: fix missing prototypes.
Ruben Kerkhof [Mon, 20 Jan 2020 11:24:51 +0000 (12:24 +0100)] 
sandbox-darwin.c: fix missing prototypes.

Include the right header just like the other sandbox files.
Fixes missing prototype warnings for ssh_sandbox_* functions.

5 years agoFix a few warnings when on Mac OS X.
Ruben Kerkhof [Mon, 20 Jan 2020 10:09:27 +0000 (11:09 +0100)] 
Fix a few warnings when on Mac OS X.

Include stdlib.h for calloc, malloc, free and setenv.

5 years agoFix building without openssl.
Ruben Kerkhof [Mon, 20 Jan 2020 09:32:23 +0000 (10:32 +0100)] 
Fix building without openssl.

This fixes the following when there are no openssl headers on the system:
ssh-ecdsa-sk.c:34:10: fatal error: 'openssl/bn.h' file not found

5 years agoAdd config.log to .gitignore
Ruben Kerkhof [Wed, 15 Jan 2020 15:08:55 +0000 (16:08 +0100)] 
Add config.log to .gitignore

5 years agoFix typo in README.md, s/crytpo/crypto/
Ruben Kerkhof [Wed, 15 Jan 2020 15:16:31 +0000 (16:16 +0100)] 
Fix typo in README.md, s/crytpo/crypto/

5 years agoWrap stdint.h in ifdef HAVE_STDINT_H.
Darren Tucker [Wed, 15 Jan 2020 05:22:36 +0000 (16:22 +1100)] 
Wrap stdint.h in ifdef HAVE_STDINT_H.

5 years agoWrap stdint.h inside HAVE_STDINT_H. 162/head
Darren Tucker [Tue, 14 Jan 2020 03:41:47 +0000 (14:41 +1100)] 
Wrap stdint.h inside HAVE_STDINT_H.

5 years agoInclude compat header for definitions.
Darren Tucker [Tue, 14 Jan 2020 03:26:41 +0000 (14:26 +1100)] 
Include compat header for definitions.

5 years agoImprove search for 'struct timespec'.
Darren Tucker [Mon, 13 Jan 2020 22:42:52 +0000 (09:42 +1100)] 
Improve search for 'struct timespec'.

Make struct timespec test consistent with existing timeval test.
Include time.h for timespec in compat header where required.

5 years agoUpdate depend to remove rmd160.h.
Darren Tucker [Tue, 14 Jan 2020 01:43:03 +0000 (12:43 +1100)] 
Update depend to remove rmd160.h.

5 years agoRemove configure test & compat code for ripemd160.
Darren Tucker [Mon, 13 Jan 2020 20:24:46 +0000 (07:24 +1100)] 
Remove configure test & compat code for ripemd160.

RIPEMD160 support was removed upstream in 2017, however we still had
a configure test and compat code for it, so clean those up now.

5 years agoupstream: fix reversed arguments on expand_proxy_command(); spotted
djm@openbsd.org [Thu, 9 Jan 2020 03:28:38 +0000 (03:28 +0000)] 
upstream: fix reversed arguments on expand_proxy_command(); spotted

by anton@

OpenBSD-Commit-ID: db1c32478a01dfbc9c4db171de0f25907bea5775

5 years agoupstream: put the fido options in a list, and tidy up the text a
jmc@openbsd.org [Mon, 6 Jan 2020 07:43:28 +0000 (07:43 +0000)] 
upstream: put the fido options in a list, and tidy up the text a

little; ok djm

OpenBSD-Commit-ID: 491ce15ae52a88b7a6a2b3b6708a14b4aacdeebb

5 years agoDeny (non-fatal) ipc in preauth privsep child.
Jeremy Drake [Sat, 12 Oct 2019 01:31:05 +0000 (18:31 -0700)] 
Deny (non-fatal) ipc in preauth privsep child.

As noted in openssh/openssh-portable#149, i386 does not have have
_NR_shmget etc.  Instead, it has a single ipc syscall (see man 2 ipc,
https://linux.die.net/man/2/ipc).  Add this syscall, if present, to the
list of syscalls that seccomp will deny non-fatally.

5 years agoseccomp: Allow clock_gettime64() in sandbox.
Khem Raj [Wed, 8 Jan 2020 00:26:45 +0000 (16:26 -0800)] 
seccomp: Allow clock_gettime64() in sandbox.

This helps sshd accept connections on mips platforms with
upcoming glibc ( 2.31 )

5 years agoupstream: missing else in check_enroll_options()
djm@openbsd.org [Mon, 6 Jan 2020 02:39:30 +0000 (02:39 +0000)] 
upstream: missing else in check_enroll_options()

OpenBSD-Commit-ID: e058fb918fda56ddbbf0bee910101004cec421d4

5 years agoupstream: fix error message
djm@openbsd.org [Mon, 6 Jan 2020 02:24:28 +0000 (02:24 +0000)] 
upstream: fix error message

OpenBSD-Commit-ID: 1eb52025658eb78ea6223181e552862198d3d505

5 years agoupstream: adapt sk-dummy to SK API changes
djm@openbsd.org [Mon, 6 Jan 2020 02:07:50 +0000 (02:07 +0000)] 
upstream: adapt sk-dummy to SK API changes

also, make it pull prototypes directly from sk-api.c and #error
if the expected version changes. This will make any future regress
test breakage because of SK API changes much more apparent

OpenBSD-Regress-ID: 79b07055de4feb988e31da71a89051ad5969829d

5 years agoupstream: Extends the SK API to accept a set of key/value options
djm@openbsd.org [Mon, 6 Jan 2020 02:00:46 +0000 (02:00 +0000)] 
upstream: Extends the SK API to accept a set of key/value options

for all operations. These are intended to future-proof the API a little by
making it easier to specify additional fields for without having to change
the API version for each.

At present, only two options are defined: one to explicitly specify
the device for an operation (rather than accepting the middleware's
autoselection) and another to specify the FIDO2 username that may
be used when generating a resident key. These new options may be
invoked at key generation time via ssh-keygen -O

This also implements a suggestion from Markus to avoid "int" in favour
of uint32_t for the algorithm argument in the API, to make implementation
of ssh-sk-client/helper a little easier.

feedback, fixes and ok markus@

OpenBSD-Commit-ID: 973ce11704609022ab36abbdeb6bc23c8001eabc

5 years agoupstream: fix CanonicalizeHostname, broken by rev 1.507
beck@openbsd.org [Sun, 5 Jan 2020 16:28:22 +0000 (16:28 +0000)] 
upstream: fix CanonicalizeHostname, broken by rev 1.507

Issue noticed and reported by Pierre-Olivier Martel <pom@apple.com>
ok dtucker@ markus@ djm@

OpenBSD-Commit-ID: 749f3168ec520609c35b0c4e1984e5fa47f16094

5 years agoFix typo: 'you' -> 'your'.
Darren Tucker [Sun, 5 Jan 2020 22:02:53 +0000 (09:02 +1100)] 
Fix typo: 'you' -> 'your'.

bz#3108 from jmckitrick@gmail.com.

5 years agoRemove auth-skey.c.
Darren Tucker [Sun, 5 Jan 2020 21:56:46 +0000 (08:56 +1100)] 
Remove auth-skey.c.

S/Key support was removed in OpenSSH 7.8 but this file was missed.

5 years agoupstream: the download resident keys option is -K (upper) not -k
jmc@openbsd.org [Fri, 3 Jan 2020 07:33:33 +0000 (07:33 +0000)] 
upstream: the download resident keys option is -K (upper) not -k

(lower); ok djm

OpenBSD-Commit-ID: 71dc28a3e1fa7c553844abc508845bcf5766e091

5 years agoupstream: what bozo decided to use 2020 as a future date in a regress
djm@openbsd.org [Fri, 3 Jan 2020 03:02:26 +0000 (03:02 +0000)] 
upstream: what bozo decided to use 2020 as a future date in a regress

test?

OpenBSD-Regress-ID: 3b953df5a7e14081ff6cf495d4e8d40e153cbc3a

5 years agoupstream: implement recent SK API change to support resident keys
djm@openbsd.org [Fri, 3 Jan 2020 02:46:19 +0000 (02:46 +0000)] 
upstream: implement recent SK API change to support resident keys

and PIN prompting in the dummy middleware that we use for the tests. Should
fix breakage spotted by dtucker@

OpenBSD-Regress-ID: 379cf9eabfea57aaf7f3f59dafde59889566c484

5 years agoupstream: Update keygen moduli screen test to match recent command
dtucker@openbsd.org [Thu, 2 Jan 2020 13:25:38 +0000 (13:25 +0000)] 
upstream: Update keygen moduli screen test to match recent command

line option change to ssh-keygen(1).

OpenBSD-Regress-ID: 744a72755004377e9669b662c13c6aa9ead8a0c3

5 years agoupstream: ability to download FIDO2 resident keys from a token via
djm@openbsd.org [Thu, 2 Jan 2020 22:40:09 +0000 (22:40 +0000)] 
upstream: ability to download FIDO2 resident keys from a token via

"ssh-keygen -K". This will save public/private keys into the current
directory.

This is handy if you move a token between hosts.

feedback & ok markus@

OpenBSD-Commit-ID: d57c1f9802f7850f00a117a1d36682a6c6d10da6

5 years agoupstream: add sshkey_save_public(), to save a public key; ok
djm@openbsd.org [Thu, 2 Jan 2020 22:38:33 +0000 (22:38 +0000)] 
upstream: add sshkey_save_public(), to save a public key; ok

markus@

OpenBSD-Commit-ID: 5d6f96a966d10d7fa689ff9aa9e1d6767ad5a076

5 years agoupstream: simplify the list for moduli options - no need for
jmc@openbsd.org [Mon, 30 Dec 2019 16:10:00 +0000 (16:10 +0000)] 
upstream: simplify the list for moduli options - no need for

-compact;

OpenBSD-Commit-ID: 6492c72280482c6d072be46236b365cb359fc280

5 years agossh-sk-null.cc needs extern "C" {}
Damien Miller [Thu, 2 Jan 2020 02:41:31 +0000 (13:41 +1100)] 
ssh-sk-null.cc needs extern "C" {}

5 years agoadd dummy ssh-sk API for linking with fuzzers
Damien Miller [Wed, 1 Jan 2020 23:56:29 +0000 (10:56 +1100)] 
add dummy ssh-sk API for linking with fuzzers

5 years agorefresh depend
Damien Miller [Mon, 30 Dec 2019 10:04:09 +0000 (21:04 +1100)] 
refresh depend

5 years agoupstream: Remove the -x option currently used for
djm@openbsd.org [Mon, 30 Dec 2019 09:49:52 +0000 (09:49 +0000)] 
upstream: Remove the -x option currently used for

FIDO/U2F-specific key flags. Instead these flags may be specified via -O.

ok markus@

OpenBSD-Commit-ID: f23ebde2a8a7e1bf860a51055a711cffb8c328c1

5 years agoupstream: document SK API changes in PROTOCOL.u2f
djm@openbsd.org [Mon, 30 Dec 2019 09:25:29 +0000 (09:25 +0000)] 
upstream: document SK API changes in PROTOCOL.u2f

ok markus@

OpenBSD-Commit-ID: 52622363c103a3c4d3d546050480ffe978a32186

5 years agoupstream: translate and return error codes; retry on bad PIN
djm@openbsd.org [Mon, 30 Dec 2019 09:24:45 +0000 (09:24 +0000)] 
upstream: translate and return error codes; retry on bad PIN

Define some well-known error codes in the SK API and pass
them back via ssh-sk-helper.

Use the new "wrong PIN" error code to retry PIN prompting during
ssh-keygen of resident keys.

feedback and ok markus@

OpenBSD-Commit-ID: 9663c6a2bb7a0bc8deaccc6c30d9a2983b481620

5 years agoupstream: improve some error messages; ok markus@
djm@openbsd.org [Mon, 30 Dec 2019 09:24:03 +0000 (09:24 +0000)] 
upstream: improve some error messages; ok markus@

OpenBSD-Commit-ID: 4ccd8ddabb8df4f995107dd3b7ea58220e93cb81

5 years agoupstream: SK API and sk-helper error/PIN passing
djm@openbsd.org [Mon, 30 Dec 2019 09:23:28 +0000 (09:23 +0000)] 
upstream: SK API and sk-helper error/PIN passing

Allow passing a PIN via the SK API (API major crank) and let the
ssh-sk-helper API follow.

Also enhance the ssh-sk-helper API to support passing back an error
code instead of a complete reply. Will be used to signal "wrong PIN",
etc.

feedback and ok markus@

OpenBSD-Commit-ID: a1bd6b0a2421646919a0c139b8183ad76d28fb71

5 years agoupstream: implement loading resident keys in ssh-add
djm@openbsd.org [Mon, 30 Dec 2019 09:22:49 +0000 (09:22 +0000)] 
upstream: implement loading resident keys in ssh-add

"ssh-add -O" will load resident keys from a FIDO2 token and add them
to a ssh-agent.

feedback and ok markus@

OpenBSD-Commit-ID: 608104ae957a7d65cb84e0a3a26c8f60e0df3290

5 years agoupstream: implement loading of resident keys in ssh-sk-helper
djm@openbsd.org [Mon, 30 Dec 2019 09:21:59 +0000 (09:21 +0000)] 
upstream: implement loading of resident keys in ssh-sk-helper

feedback and ok markus@

OpenBSD-Commit-ID: b273c23769ea182c55c4a7b8f9cbd9181722011a

5 years agoupstream: resident keys support in SK API
djm@openbsd.org [Mon, 30 Dec 2019 09:21:16 +0000 (09:21 +0000)] 
upstream: resident keys support in SK API

Adds a sk_load_resident_keys() function to the security key
API that accepts a security key provider and a PIN and returns
a list of keys.

Implement support for this in the usbhid middleware.

feedback and ok markus@

OpenBSD-Commit-ID: 67e984e4e87f4999ce447a6178c4249a9174eff0

5 years agoupstream: Factor out parsing of struct sk_enroll_response
djm@openbsd.org [Mon, 30 Dec 2019 09:20:36 +0000 (09:20 +0000)] 
upstream: Factor out parsing of struct sk_enroll_response

We'll reuse this for extracting resident keys from a device.

feedback and ok markus@

OpenBSD-Commit-ID: 9bc1efd9c6897eac4df0983746cf6578c1542273

5 years agoupstream: basic support for generating FIDO2 resident keys
djm@openbsd.org [Mon, 30 Dec 2019 09:19:52 +0000 (09:19 +0000)] 
upstream: basic support for generating FIDO2 resident keys

"ssh-keygen -t ecdsa-sk|ed25519-sk -x resident" will generate a
device-resident key.

feedback and ok markus@

OpenBSD-Commit-ID: 8e1b3c56a4b11d85047bd6c6c705b7eef4d58431

5 years agoupstream: remove single-letter flags for moduli options
djm@openbsd.org [Mon, 30 Dec 2019 03:30:09 +0000 (03:30 +0000)] 
upstream: remove single-letter flags for moduli options

Move all moduli generation options to live under the -O flag.

Frees up seven single-letter flags.

NB. this change break existing ssh-keygen commandline syntax for moduli-
related operations. Very few people use these fortunately.

feedback and ok markus@

OpenBSD-Commit-ID: d498f3eaf28128484826a4fcb343612764927935

5 years agoupstream: prepare for use of ssh-keygen -O flag beyond certs
djm@openbsd.org [Mon, 30 Dec 2019 03:28:41 +0000 (03:28 +0000)] 
upstream: prepare for use of ssh-keygen -O flag beyond certs

Move list of available certificate options in ssh-keygen.1 to the
CERTIFICATES section.

Collect options specified by -O but delay parsing/validation of
certificate options until we're sure that we're acting as a CA.

ok markus@

OpenBSD-Commit-ID: 33e6bcc29cfca43606f6fa09bd84b955ee3a4106

5 years agoupstream: sort -Y internally in the options list, as is already
jmc@openbsd.org [Fri, 27 Dec 2019 08:28:44 +0000 (08:28 +0000)] 
upstream: sort -Y internally in the options list, as is already

done in synopsis;

OpenBSD-Commit-ID: 86d033c5764404057616690d7be992e445b42274

5 years agoupstream: in the options list, sort -Y and -y;
jmc@openbsd.org [Fri, 27 Dec 2019 08:25:07 +0000 (08:25 +0000)] 
upstream: in the options list, sort -Y and -y;

OpenBSD-Commit-ID: 24c2e6a3aeab6e050a0271ffc73fdff91c10dcaa

5 years agoupstream: Replace the term "security key" with "(FIDO)
naddy@openbsd.org [Sat, 21 Dec 2019 20:22:34 +0000 (20:22 +0000)] 
upstream: Replace the term "security key" with "(FIDO)

authenticator".

The polysemous use of "key" was too confusing.  Input from markus@.
ok jmc@

OpenBSD-Commit-ID: 12eea973a44c8232af89f86e4269d71ae900ca8f

5 years agoupstream: unit tests for ForwardAgent=/path; from Eric Chiang
djm@openbsd.org [Sat, 21 Dec 2019 02:33:07 +0000 (02:33 +0000)] 
upstream: unit tests for ForwardAgent=/path; from Eric Chiang

OpenBSD-Regress-ID: 24f693f78290b2c17725dab2c614dffe4a88c8da

5 years agoupstream: test security key host keys in addition to user keys
djm@openbsd.org [Mon, 16 Dec 2019 02:39:05 +0000 (02:39 +0000)] 
upstream: test security key host keys in addition to user keys

OpenBSD-Regress-ID: 9fb45326106669a27e4bf150575c321806e275b1

5 years agoupstream: Allow forwarding a different agent socket to the path
djm@openbsd.org [Sat, 21 Dec 2019 02:19:13 +0000 (02:19 +0000)] 
upstream: Allow forwarding a different agent socket to the path

specified by $SSH_AUTH_SOCK, by extending the existing ForwardAgent option to
accepting an explicit path or the name of an environment variable in addition
to yes/no.

Patch by Eric Chiang, manpage by me; ok markus@

OpenBSD-Commit-ID: 98f2ed80bf34ea54d8b2ddd19ac14ebbf40e9265

5 years agoupstream: SSH U2F keys can now be used as host keys. Fix a garden
naddy@openbsd.org [Fri, 20 Dec 2019 20:28:55 +0000 (20:28 +0000)] 
upstream: SSH U2F keys can now be used as host keys. Fix a garden

path sentence. ok markus@

OpenBSD-Commit-ID: 67d7971ca1a020acd6c151426c54bd29d784bd6b

5 years agoupstream: Move always unsupported keywords to be grouped with the other
dtucker@openbsd.org [Fri, 20 Dec 2019 02:42:42 +0000 (02:42 +0000)] 
upstream: Move always unsupported keywords to be grouped with the other

ones. Move oSecurityProvider to match the order in the OpCodes enum. Patch
from openbsd@academicsolutions.ch, ok djm@

OpenBSD-Commit-ID: 061e4505861ec1e02ba3a63e3d1b3be3cad458ec

5 years agoupstream: Remove obsolete opcodes from the configuation enum.
dtucker@openbsd.org [Fri, 20 Dec 2019 02:29:21 +0000 (02:29 +0000)] 
upstream: Remove obsolete opcodes from the configuation enum.

Patch from openbsd@academicsolutions.ch, ok djm@

OpenBSD-Commit-ID: 395c202228872ce8d9044cc08552ac969f51e01b

5 years agoupstream: Remove now-obsolete config options from example in
dtucker@openbsd.org [Fri, 20 Dec 2019 02:11:38 +0000 (02:11 +0000)] 
upstream: Remove now-obsolete config options from example in

comment.  Patch from openbsd@academicsolutions.ch, ok djm@

OpenBSD-Commit-ID: 35862beb0927b1cb0af476ec23cc07f6e3006101

5 years agoupstream: Document that security key-hosted keys can act as host
naddy@openbsd.org [Thu, 19 Dec 2019 15:09:30 +0000 (15:09 +0000)] 
upstream: Document that security key-hosted keys can act as host

keys.

Update the list of default host key algorithms in ssh_config.5 and
sshd_config.5.  Copy the description of the SecurityKeyProvider
option to sshd_config.5.

ok jmc@

OpenBSD-Commit-ID: edadf3566ab5e94582df4377fee3b8b702c7eca0

5 years agoupstream: "Forward security" -> "Forward secrecy" since that's the
dtucker@openbsd.org [Thu, 19 Dec 2019 03:50:01 +0000 (03:50 +0000)] 
upstream: "Forward security" -> "Forward secrecy" since that's the

correct term. Add "MAC" since we use that acronym in other man pages.  ok
naddy@

OpenBSD-Commit-ID: c35529e511788586725fb63bda3459e10738c5f5

5 years agoupstream: cut obsolete lists of crypto algorithms from outline of
naddy@openbsd.org [Tue, 17 Dec 2019 16:21:07 +0000 (16:21 +0000)] 
upstream: cut obsolete lists of crypto algorithms from outline of

how SSH works ok markus@ jmc@

OpenBSD-Commit-ID: 8e34973f232ab48c4d4f5d07df48d501708b9160

5 years agoupstream: strdup may return NULL if memory allocation fails. Use
tobhe@openbsd.org [Mon, 16 Dec 2019 13:58:53 +0000 (13:58 +0000)] 
upstream: strdup may return NULL if memory allocation fails. Use

the safer xstrdup which fatals on allocation failures.

ok markus@

OpenBSD-Commit-ID: 8b608d387120630753cbcb8110e0b019c0c9a0d0

5 years agoupstream: sort sk-* methods behind their plain key methods cousins
djm@openbsd.org [Mon, 16 Dec 2019 03:16:58 +0000 (03:16 +0000)] 
upstream: sort sk-* methods behind their plain key methods cousins

for now

OpenBSD-Commit-ID: c97e22c2b28c0d12ee389b8b4ef5f2ada7908828

5 years agoMac OS X has PAM too.
Darren Tucker [Tue, 17 Dec 2019 08:46:15 +0000 (19:46 +1100)] 
Mac OS X has PAM too.

5 years agoShow portable tarball pattern in example.
Darren Tucker [Tue, 17 Dec 2019 08:37:06 +0000 (19:37 +1100)] 
Show portable tarball pattern in example.

5 years agoOpenSSL is now optional.
Darren Tucker [Tue, 17 Dec 2019 08:35:59 +0000 (19:35 +1100)] 
OpenSSL is now optional.

5 years agoupstream: adapt to ssh-sk-client change
djm@openbsd.org [Sun, 15 Dec 2019 18:58:33 +0000 (18:58 +0000)] 
upstream: adapt to ssh-sk-client change

OpenBSD-Regress-ID: 40481999a5928d635ab2e5b029e8239c112005ea

5 years agoupstream: it's no longer possible to disable privilege separation
djm@openbsd.org [Wed, 11 Dec 2019 18:47:14 +0000 (18:47 +0000)] 
upstream: it's no longer possible to disable privilege separation

in sshd, so don't double the tests' work by trying both off/on

OpenBSD-Regress-ID: d366665466dbd09e9b707305da884be3e7619c68

5 years agoupstream: don't treat HostKeyAgent=none as a path either; avoids
djm@openbsd.org [Sun, 15 Dec 2019 20:59:23 +0000 (20:59 +0000)] 
upstream: don't treat HostKeyAgent=none as a path either; avoids

spurious warnings from the cfgparse regress test

OpenBSD-Commit-ID: ba49ea7a5c92b8a16cb9c2e975dbb163853afc54

5 years agoupstream: do not attempt to find an absolute path for sshd_config
djm@openbsd.org [Sun, 15 Dec 2019 20:57:15 +0000 (20:57 +0000)] 
upstream: do not attempt to find an absolute path for sshd_config

SecurityKeyProvider=internal - unbreaks cfgparse regress test

OpenBSD-Commit-ID: d2ddcf525c0dc3c8339522360c10b3c70f1fd641

5 years agoupstream: allow ssh-keyscan to find security key hostkeys
djm@openbsd.org [Sun, 15 Dec 2019 19:47:10 +0000 (19:47 +0000)] 
upstream: allow ssh-keyscan to find security key hostkeys

OpenBSD-Commit-ID: 1fe822a7f714df19a7e7184e3a3bbfbf546811d3

5 years agoupstream: allow security keys to act as host keys as well as user
djm@openbsd.org [Sun, 15 Dec 2019 18:57:30 +0000 (18:57 +0000)] 
upstream: allow security keys to act as host keys as well as user

keys.

Previously we didn't do this because we didn't want to expose
the attack surface presented by USB and FIDO protocol handling,
but now that this is insulated behind ssh-sk-helper there is
less risk.

ok markus@

OpenBSD-Commit-ID: 77b068dd133b8d87e0f010987bd5131e640ee64c

5 years agoAllow clock_nanosleep_time64 in seccomp sandbox.
Darren Tucker [Mon, 16 Dec 2019 02:55:56 +0000 (13:55 +1100)] 
Allow clock_nanosleep_time64 in seccomp sandbox.

Needed on Linux ARM.  bz#3100, patch from jjelen@redhat.com.

5 years agoPut SK ECDSA bits inside ifdef OPENSSL_HAS_ECC.
Darren Tucker [Sun, 15 Dec 2019 07:27:02 +0000 (18:27 +1100)] 
Put SK ECDSA bits inside ifdef OPENSSL_HAS_ECC.

Fixes build when linking against OpenSSLs built with no-ec.

5 years agoremove a bunch of ENABLE_SK #ifdefs
Damien Miller [Fri, 13 Dec 2019 22:21:46 +0000 (09:21 +1100)] 
remove a bunch of ENABLE_SK #ifdefs

The ssh-sk-helper client API gives us a nice place to disable
security key support when it is wasn't enabled at compile time,
so we don't need to check everywere.

Also, verification of security key signatures can remain enabled
all the time - it has no additional dependencies. So sshd can
accept security key pubkeys in authorized_keys, etc regardless of
the host's support for dlopen, etc.

5 years agossh-sk-client.c needs includes.h
Damien Miller [Fri, 13 Dec 2019 22:15:06 +0000 (09:15 +1100)] 
ssh-sk-client.c needs includes.h

5 years agoonly link ssh-sk-helper against libfido2
Damien Miller [Fri, 13 Dec 2019 21:40:33 +0000 (08:40 +1100)] 
only link ssh-sk-helper against libfido2

5 years agoadapt Makefile to ssh-sk-client everywhere
Damien Miller [Fri, 13 Dec 2019 21:20:52 +0000 (08:20 +1100)] 
adapt Makefile to ssh-sk-client everywhere

5 years agofixup
Damien Miller [Fri, 13 Dec 2019 20:53:11 +0000 (07:53 +1100)] 
fixup

5 years agoupstream: actually commit the ssh-sk-helper client code; ok markus
djm@openbsd.org [Fri, 13 Dec 2019 20:16:56 +0000 (20:16 +0000)] 
upstream: actually commit the ssh-sk-helper client code; ok markus

OpenBSD-Commit-ID: fd2ea776a5bbbf4d452989d3c3054cf25a5e0589

5 years agoupstream: perform security key enrollment via ssh-sk-helper too.
djm@openbsd.org [Fri, 13 Dec 2019 19:11:14 +0000 (19:11 +0000)] 
upstream: perform security key enrollment via ssh-sk-helper too.

This means that ssh-keygen no longer needs to link against ssh-sk-helper, and
only ssh-sk-helper needs libfido2 and /dev/uhid* access;

feedback & ok markus@

OpenBSD-Commit-ID: 9464233fab95708d2ff059f8bee29c0d1f270800