]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
5 years agoupstream: allow sshbuf_put_stringb(buf, NULL); ok markus@
djm@openbsd.org [Fri, 13 Dec 2019 19:09:37 +0000 (19:09 +0000)] 
upstream: allow sshbuf_put_stringb(buf, NULL); ok markus@

OpenBSD-Commit-ID: 91482c1ada9adb283165d48dafbb88ae91c657bd

5 years agoupstream: use ssh-sk-helper for all security key signing operations
djm@openbsd.org [Fri, 13 Dec 2019 19:09:10 +0000 (19:09 +0000)] 
upstream: use ssh-sk-helper for all security key signing operations

This extracts and refactors the client interface for ssh-sk-helper
from ssh-agent and generalises it for use by the other programs.
This means that most OpenSSH tools no longer need to link against
libfido2 or directly interact with /dev/uhid*

requested by, feedback and ok markus@

OpenBSD-Commit-ID: 1abcd3aea9a7460eccfbf8ca154cdfa62f1dc93f

5 years agoupstream: add a note about the 'extensions' field in the signed
djm@openbsd.org [Wed, 11 Dec 2019 22:19:47 +0000 (22:19 +0000)] 
upstream: add a note about the 'extensions' field in the signed

object

OpenBSD-Commit-ID: 67c01e0565b258e0818c1ccfe1f1aeaf9a0d4c7b

5 years agoupstream: some more corrections for documentation problems spotted
djm@openbsd.org [Tue, 10 Dec 2019 23:37:31 +0000 (23:37 +0000)] 
upstream: some more corrections for documentation problems spotted

by Ron Frederick

document certifiate private key format
correct flags type for sk-ssh-ed25519@openssh.com keys

OpenBSD-Commit-ID: fc4e9a1ed7f9f7f9dd83e2e2c59327912e933e74

5 years agoupstream: loading security keys into ssh-agent used the extension
djm@openbsd.org [Tue, 10 Dec 2019 23:21:56 +0000 (23:21 +0000)] 
upstream: loading security keys into ssh-agent used the extension

constraint "sk-provider@openssh.com", not "sk@openssh.com"; spotted by Ron
Frederick

OpenBSD-Commit-ID: dbfba09edbe023abadd5f59c1492df9073b0e51d

5 years agoupstream: add security key types to list of keys allowed to act as
djm@openbsd.org [Tue, 10 Dec 2019 22:43:19 +0000 (22:43 +0000)] 
upstream: add security key types to list of keys allowed to act as

CAs; spotted by Ron Frederick

OpenBSD-Commit-ID: 9bb0dfff927b4f7aa70679f983f84c69d45656c3

5 years agoupstream: when acting as a CA and using a security key as the CA
djm@openbsd.org [Tue, 10 Dec 2019 22:37:20 +0000 (22:37 +0000)] 
upstream: when acting as a CA and using a security key as the CA

key, remind the user to touch they key to authorise the signature.

OpenBSD-Commit-ID: fe58733edd367362f9766b526a8b56827cc439c1

5 years agoupstream: chop some unnecessary and confusing verbiage from the
djm@openbsd.org [Tue, 10 Dec 2019 22:36:08 +0000 (22:36 +0000)] 
upstream: chop some unnecessary and confusing verbiage from the

security key protocol description; feedback from Ron Frederick

OpenBSD-Commit-ID: 048c9483027fbf9c995e5a51b3ac502989085a42

5 years agoupstream: fix setting of $SSH_ASKPASS_PROMPT - it shouldn't be set
djm@openbsd.org [Fri, 6 Dec 2019 03:06:08 +0000 (03:06 +0000)] 
upstream: fix setting of $SSH_ASKPASS_PROMPT - it shouldn't be set

when asking passphrases, only when confirming the use of a key (i.e. for
ssh-agent keys added with "ssh-add -c keyfile")

OpenBSD-Commit-ID: 6643c82960d9427d5972eb702c917b3b838ecf89

5 years agoupstream: bring the __func__
djm@openbsd.org [Fri, 6 Dec 2019 02:55:21 +0000 (02:55 +0000)] 
upstream: bring the __func__

OpenBSD-Commit-ID: 71a3a45b0fe1b8f680ff95cf264aa81f7abbff67

5 years agoupstream: tweak the Nd lines for a bit of consistency; ok markus
jmc@openbsd.org [Sat, 30 Nov 2019 07:07:59 +0000 (07:07 +0000)] 
upstream: tweak the Nd lines for a bit of consistency; ok markus

OpenBSD-Commit-ID: 876651bdde06bc1e72dd4bd7ad599f42a6ce5a16

5 years agoCheck if memmem is declared in system headers.
Darren Tucker [Wed, 11 Dec 2019 02:22:06 +0000 (13:22 +1100)] 
Check if memmem is declared in system headers.

If the system (or one of the dependencies) implements memmem but does
not define the header, we would not declare it either resulting in
compiler warnings.  Check for declaration explicitly.  bz#3102.

5 years agoSort depends.
Darren Tucker [Wed, 11 Dec 2019 02:12:01 +0000 (13:12 +1100)] 
Sort depends.

5 years agoSort .depend when rebuilding.
Darren Tucker [Wed, 11 Dec 2019 02:09:34 +0000 (13:09 +1100)] 
Sort .depend when rebuilding.

This makes diffs more stable between makedepend implementations.

5 years agoUpdate depend to include sk files.
Darren Tucker [Wed, 11 Dec 2019 02:06:43 +0000 (13:06 +1100)] 
Update depend to include sk files.

5 years agoDescribe how to build libcrypto as PIC.
Darren Tucker [Mon, 9 Dec 2019 09:25:26 +0000 (20:25 +1100)] 
Describe how to build libcrypto as PIC.

While there, move the OpenSSL 1.1.0g caveat closer to the other version
information.

5 years agoRecommend running LibreSSL or OpenSSL self-tests.
Darren Tucker [Mon, 9 Dec 2019 06:23:22 +0000 (17:23 +1100)] 
Recommend running LibreSSL or OpenSSL self-tests.

5 years agoWrap ECC specific bits in ifdef.
Darren Tucker [Fri, 6 Dec 2019 03:17:26 +0000 (14:17 +1100)] 
Wrap ECC specific bits in ifdef.

Fixes tests when built against an OpenSSL configured with no-ec.

5 years agoWrap sha2.h include in ifdef.
Darren Tucker [Fri, 29 Nov 2019 09:21:36 +0000 (20:21 +1100)] 
Wrap sha2.h include in ifdef.

Fixes build --without-openssl on at least Fedora.

5 years agocompile sk-dummy.so with no-PIE version of LDFLAGS
Damien Miller [Fri, 29 Nov 2019 04:10:21 +0000 (15:10 +1100)] 
compile sk-dummy.so with no-PIE version of LDFLAGS

This lets it pick up the -L path to libcrypto for example.

5 years agoincludes.h for sk-dummy.c, dummy
Damien Miller [Fri, 29 Nov 2019 03:48:46 +0000 (14:48 +1100)] 
includes.h for sk-dummy.c, dummy

5 years ago(yet) another x-platform fix for sk-dummy.so
Damien Miller [Fri, 29 Nov 2019 01:32:23 +0000 (12:32 +1100)] 
(yet) another x-platform fix for sk-dummy.so

Check for -fPIC support from compiler

Compile libopenbsd-compat -fPIC

Don't mix -fPIE and -fPIC when compiling

5 years agoneeds includes.h for WITH_OPENSSL
Damien Miller [Fri, 29 Nov 2019 00:53:57 +0000 (11:53 +1100)] 
needs includes.h for WITH_OPENSSL

5 years agoanother attempt at sk-dummy.so working x-platform
Damien Miller [Fri, 29 Nov 2019 00:52:23 +0000 (11:52 +1100)] 
another attempt at sk-dummy.so working x-platform

include a fatal() implementation to satisfy libopenbsd-compat

clean up .lo and .so files

.gitignore .lo and .so files

5 years agoupstream: lots of dependencies go away here with ed25519 no longer
djm@openbsd.org [Fri, 29 Nov 2019 00:13:29 +0000 (00:13 +0000)] 
upstream: lots of dependencies go away here with ed25519 no longer

needing the ssh_digest API.

OpenBSD-Regress-ID: 785847ec78cb580d141e29abce351a436d6b5d49

5 years agoupstream: perform hashing directly in crypto_hash_sha512() using
djm@openbsd.org [Fri, 29 Nov 2019 00:11:21 +0000 (00:11 +0000)] 
upstream: perform hashing directly in crypto_hash_sha512() using

libcrypto or libc SHA512 functions rather than calling ssh_digest_memory();
avoids many dependencies on ssh code that complicate standalone use of
ed25519, as we want to do in sk-dummy.so

OpenBSD-Commit-ID: 5a3c37593d3ba7add037b587cec44aaea088496d

5 years agoupstream: improve the text for -A a little; input from naddy and
jmc@openbsd.org [Thu, 28 Nov 2019 12:24:31 +0000 (12:24 +0000)] 
upstream: improve the text for -A a little; input from naddy and

djm

OpenBSD-Commit-ID: f9cdfb1d6dbb9887c4bf3bb25f9c7a94294c988d

5 years agoupstream: reshuffle the text to read better; input from naddy,
jmc@openbsd.org [Thu, 28 Nov 2019 12:23:25 +0000 (12:23 +0000)] 
upstream: reshuffle the text to read better; input from naddy,

djmc, and dtucker

OpenBSD-Commit-ID: a0b2aca2b67614dda3d6618ea097bf0610c35013

5 years ago$< doesn't work as` I thought; explicily list objs
Damien Miller [Thu, 28 Nov 2019 07:09:07 +0000 (18:09 +1100)] 
$< doesn't work as` I thought; explicily list objs

5 years agoupstream: tweak wording
djm@openbsd.org [Thu, 28 Nov 2019 05:20:54 +0000 (05:20 +0000)] 
upstream: tweak wording

OpenBSD-Commit-ID: bd002ca1599b71331faca735ff5f6de29e32222e

5 years agomissing .SUFFIXES line makes make sad
Damien Miller [Thu, 28 Nov 2019 02:12:30 +0000 (13:12 +1100)] 
missing .SUFFIXES line makes make sad

5 years ago(hopefully) fix out of tree builds of sk-dummy.so
Damien Miller [Wed, 27 Nov 2019 22:53:42 +0000 (09:53 +1100)] 
(hopefully) fix out of tree builds of sk-dummy.so

5 years agoupstream: remove stray semicolon after closing brace of function;
djm@openbsd.org [Wed, 27 Nov 2019 22:32:11 +0000 (22:32 +0000)] 
upstream: remove stray semicolon after closing brace of function;

from Michael Forney

OpenBSD-Commit-ID: fda95acb799bb160d15e205ee126117cf33da3a7

5 years agoupstream: Revert previous commit. The channels code still uses int
dtucker@openbsd.org [Wed, 27 Nov 2019 05:38:43 +0000 (05:38 +0000)] 
upstream: Revert previous commit. The channels code still uses int

in many places for channel ids so the INT_MAX check still makes sense.

OpenBSD-Commit-ID: 532e4b644791b826956c3c61d6ac6da39bac84bf

5 years agowire sk-dummy.so into test suite
Damien Miller [Wed, 27 Nov 2019 05:03:12 +0000 (16:03 +1100)] 
wire sk-dummy.so into test suite

5 years agoupstream: use error()+_exit() instead of fatal() to avoid running
djm@openbsd.org [Wed, 27 Nov 2019 05:00:17 +0000 (05:00 +0000)] 
upstream: use error()+_exit() instead of fatal() to avoid running

cleanup handlers in child process; spotted via weird regress failures in
portable

OpenBSD-Commit-ID: 6902a9bb3987c7d347774444f7979b8a9ba7f412

5 years agoupstream: Make channel_id u_int32_t and remove unnecessary check
dtucker@openbsd.org [Wed, 27 Nov 2019 03:34:04 +0000 (03:34 +0000)] 
upstream: Make channel_id u_int32_t and remove unnecessary check

and cast that were left over from the type conversion.  Noted by
t-hashida@amiya.co.jp in bz#3098, ok markus@ djm@

OpenBSD-Commit-ID: 3ad105b6a905284e780b1fd7ff118e1c346e90b5

5 years agoupstream: test FIDO2/U2F key types; ok markus@
djm@openbsd.org [Tue, 26 Nov 2019 23:43:10 +0000 (23:43 +0000)] 
upstream: test FIDO2/U2F key types; ok markus@

OpenBSD-Regress-ID: 367e06d5a260407619b4b113ea0bd7004a435474

5 years agoupstream: add dummy security key middleware based on work by
djm@openbsd.org [Tue, 26 Nov 2019 23:41:23 +0000 (23:41 +0000)] 
upstream: add dummy security key middleware based on work by

markus@

This will allow us to test U2F/FIDO2 support in OpenSSH without
requiring real hardware.

ok markus@

OpenBSD-Regress-ID: 88b309464b8850c320cf7513f26d97ee1fdf9aae

5 years agoupstream: tweak previous;
jmc@openbsd.org [Tue, 26 Nov 2019 22:42:26 +0000 (22:42 +0000)] 
upstream: tweak previous;

OpenBSD-Commit-ID: a4c097364c75da320f1b291568db830fb1ee4883

5 years agoupstream: more debugging; behind DEBUG_SK
djm@openbsd.org [Tue, 26 Nov 2019 03:04:27 +0000 (03:04 +0000)] 
upstream: more debugging; behind DEBUG_SK

OpenBSD-Commit-ID: a978896227118557505999ddefc1f4c839818b60

5 years agounbreak fuzzers for recent security key changes
Damien Miller [Mon, 25 Nov 2019 10:47:49 +0000 (21:47 +1100)] 
unbreak fuzzers for recent security key changes

5 years agoupstream: unbreak tests for recent security key changes
djm@openbsd.org [Mon, 25 Nov 2019 10:32:35 +0000 (10:32 +0000)] 
upstream: unbreak tests for recent security key changes

OpenBSD-Regress-ID: 2cdf2fcae9962ca4d711338f3ceec3c1391bdf95

5 years agoupstream: unbreak after security key support landed
djm@openbsd.org [Mon, 25 Nov 2019 06:53:04 +0000 (06:53 +0000)] 
upstream: unbreak after security key support landed

OpenBSD-Regress-ID: 3ab578b0dbeb2aa6d9969b54a9c1bad329c0dcba

5 years agoupstream: Remove workaround for broken 'openssl rsa -text' output
tb@openbsd.org [Thu, 21 Nov 2019 05:18:47 +0000 (05:18 +0000)] 
upstream: Remove workaround for broken 'openssl rsa -text' output

that was fixed in libcrypto/rsa/rsa_ameth.c r1.24.

ok dtucker inoguchi

OpenBSD-Regress-ID: c260edfac177daa8fcce90141587cf04a95c4f5f

5 years agoupstream: redundant test
djm@openbsd.org [Mon, 25 Nov 2019 10:23:36 +0000 (10:23 +0000)] 
upstream: redundant test

OpenBSD-Commit-ID: 38fa7806c528a590d91ae560e67bd8b246c2d7a3

5 years agoupstream: document the "no-touch-required" certificate extension;
djm@openbsd.org [Mon, 25 Nov 2019 00:57:51 +0000 (00:57 +0000)] 
upstream: document the "no-touch-required" certificate extension;

ok markus, feedback deraadt

OpenBSD-Commit-ID: 47640122b13f825e9c404ea99803b2372246579d

5 years agoupstream: Print a key touch reminder when generating a security
djm@openbsd.org [Mon, 25 Nov 2019 00:57:27 +0000 (00:57 +0000)] 
upstream: Print a key touch reminder when generating a security

key. Most keys require a touch to authorize the operation.

OpenBSD-Commit-ID: 7fe8b23edbf33e1bb81741b9f25e9a63be5f6b68

5 years agoupstream: allow "ssh-keygen -x no-touch-required" when generating a
djm@openbsd.org [Mon, 25 Nov 2019 00:55:58 +0000 (00:55 +0000)] 
upstream: allow "ssh-keygen -x no-touch-required" when generating a

security key keypair to request one that does not require a touch for each
authentication attempt. The default remains to require touch.

feedback deraadt; ok markus@

OpenBSD-Commit-ID: 887e7084b2e89c0c62d1598ac378aad8e434bcbd

5 years agoupstream: add a "no-touch-required" option for authorized_keys and
djm@openbsd.org [Mon, 25 Nov 2019 00:54:23 +0000 (00:54 +0000)] 
upstream: add a "no-touch-required" option for authorized_keys and

a similar extension for certificates. This option disables the default
requirement that security key signatures attest that the user touched their
key to authorize them.

feedback deraadt, ok markus

OpenBSD-Commit-ID: f1fb56151ba68d55d554d0f6d3d4dba0cf1a452e

5 years agoupstream: Add a sshd_config PubkeyAuthOptions directive
djm@openbsd.org [Mon, 25 Nov 2019 00:52:46 +0000 (00:52 +0000)] 
upstream: Add a sshd_config PubkeyAuthOptions directive

This directive has a single valid option "no-touch-required" that
causes sshd to skip checking whether user presence was tested before
a security key signature was made (usually by the user touching the
key).

ok markus@

OpenBSD-Commit-ID: 46e434a49802d4ed82bc0aa38cb985c198c407de

5 years agoupstream: Add new structure for signature options
djm@openbsd.org [Mon, 25 Nov 2019 00:51:37 +0000 (00:51 +0000)] 
upstream: Add new structure for signature options

This is populated during signature verification with additional fields
that are present in and covered by the signature. At the moment, it is
only used to record security key-specific options, especially the flags
field.

with and ok markus@

OpenBSD-Commit-ID: 338a1f0e04904008836130bedb9ece4faafd4e49

5 years agoupstream: memleak in error path
djm@openbsd.org [Mon, 25 Nov 2019 00:38:17 +0000 (00:38 +0000)] 
upstream: memleak in error path

OpenBSD-Commit-ID: 93488431bf02dde85a854429362695d2d43d9112

5 years agoupstream: Wait for FD to be readable or writeable during a nonblocking
dtucker@openbsd.org [Fri, 22 Nov 2019 06:50:30 +0000 (06:50 +0000)] 
upstream: Wait for FD to be readable or writeable during a nonblocking

connect, not just readable.  Prevents a timeout when the server doesn't
immediately send a banner (eg multiplexers like sslh) but is also slightly
quicker for other connections since, unlike ssh1, ssh2 doesn't specify
that the client should parse the server banner before sending its own.
Patch from mnissler@chromium.org, ok djm@

OpenBSD-Commit-ID: aba9cd8480d1d9dd31d0ca0422ea155c26c5df1d

5 years agoInclude openssl compat header.
Darren Tucker [Wed, 20 Nov 2019 05:34:11 +0000 (16:34 +1100)] 
Include openssl compat header.

Fixes warning for ECDSA_SIG_set0 on OpenSSL versions prior to 1.1.

5 years agoupstream: adjust on-wire signature encoding for ecdsa-sk keys to
djm@openbsd.org [Tue, 19 Nov 2019 22:23:19 +0000 (22:23 +0000)] 
upstream: adjust on-wire signature encoding for ecdsa-sk keys to

better match ec25519-sk keys. Discussed with markus@ and Sebastian Kinne

NB. if you are depending on security keys (already?) then make sure you
update both your clients and servers.

OpenBSD-Commit-ID: 53d88d8211f0dd02a7954d3af72017b1a79c0679

5 years agoupstream: a little more information from the monitor when signature
djm@openbsd.org [Tue, 19 Nov 2019 22:21:15 +0000 (22:21 +0000)] 
upstream: a little more information from the monitor when signature

verification fails.

OpenBSD-Commit-ID: e6a30071e0518cac512f9e10be3dc3500e2003f3

5 years agoupstream: revert previous: naddy pointed out what's meant to
jmc@openbsd.org [Tue, 19 Nov 2019 16:02:32 +0000 (16:02 +0000)] 
upstream: revert previous: naddy pointed out what's meant to

happen. rethink needed...

OpenBSD-Commit-ID: fb0fede8123ea7f725fd65e00d49241c40bd3421

5 years agoupstream: -c and -s do not make sense with -k; reshuffle -k into
jmc@openbsd.org [Tue, 19 Nov 2019 14:54:47 +0000 (14:54 +0000)] 
upstream: -c and -s do not make sense with -k; reshuffle -k into

the main synopsis/usage; ok djm

OpenBSD-Commit-ID: f881ba253da015398ae8758d973e3390754869bc

5 years agoupstream: document '$' environment variable expansion for
naddy@openbsd.org [Mon, 18 Nov 2019 23:17:48 +0000 (23:17 +0000)] 
upstream: document '$' environment variable expansion for

SecurityKeyProvider; ok djm@

OpenBSD-Commit-ID: 76db507ebd336a573e1cd4146cc40019332c5799

5 years agoupstream: more missing mentions of ed25519-sk; ok djm@
naddy@openbsd.org [Mon, 18 Nov 2019 23:16:49 +0000 (23:16 +0000)] 
upstream: more missing mentions of ed25519-sk; ok djm@

OpenBSD-Commit-ID: f242e53366f61697dffd53af881bc5daf78230ff

5 years agoupstream: additional missing stdarg.h includes when built without
naddy@openbsd.org [Mon, 18 Nov 2019 16:10:05 +0000 (16:10 +0000)] 
upstream: additional missing stdarg.h includes when built without

WITH_OPENSSL; ok djm@

OpenBSD-Commit-ID: 881f9a2c4e2239849cee8bbf4faec9bab128f55b

5 years agoupstream: add the missing WITH_OPENSSL ifdefs after the ED25519-SK
naddy@openbsd.org [Mon, 18 Nov 2019 16:08:57 +0000 (16:08 +0000)] 
upstream: add the missing WITH_OPENSSL ifdefs after the ED25519-SK

addition; ok djm@

OpenBSD-Commit-ID: a9545e1c273e506cf70e328cbb9d0129b6d62474

5 years agoremove all EC algs from proposals, no just sk ones
Damien Miller [Mon, 18 Nov 2019 21:52:24 +0000 (08:52 +1100)] 
remove all EC algs from proposals, no just sk ones

ok dtucker@

5 years agofilter PUBKEY_DEFAULT_PK_ALG for ECC algorithms
Damien Miller [Mon, 18 Nov 2019 11:22:04 +0000 (22:22 +1100)] 
filter PUBKEY_DEFAULT_PK_ALG for ECC algorithms

Remove ECC algorithms from the PUBKEY_DEFAULT_PK_ALG list when
compiling without ECC support in libcrypto.

5 years agoupstream: LibreSSL change the format for openssl rsa -text output from
dtucker@openbsd.org [Mon, 18 Nov 2019 09:15:17 +0000 (09:15 +0000)] 
upstream: LibreSSL change the format for openssl rsa -text output from

"publicExponent" to "Exponent" so accept either.  with djm.

OpenBSD-Regress-ID: b7e6c4bf700029a31c98be14600d4472fe0467e6

5 years agoupstream: fix a bug that prevented serialisation of ed25519-sk keys
djm@openbsd.org [Mon, 18 Nov 2019 06:58:00 +0000 (06:58 +0000)] 
upstream: fix a bug that prevented serialisation of ed25519-sk keys

OpenBSD-Commit-ID: 066682b79333159cac04fcbe03ebd9c8dcc152a9

5 years agoupstream: Fix incorrect error message when key certification fails
djm@openbsd.org [Mon, 18 Nov 2019 06:39:36 +0000 (06:39 +0000)] 
upstream: Fix incorrect error message when key certification fails

OpenBSD-Commit-ID: 7771bd77ee73f7116df37c734c41192943a73cee

5 years agoupstream: fix bug that prevented certification of ed25519-sk keys
djm@openbsd.org [Mon, 18 Nov 2019 06:39:02 +0000 (06:39 +0000)] 
upstream: fix bug that prevented certification of ed25519-sk keys

OpenBSD-Commit-ID: 64c8cc6f5de2cdd0ee3a81c3a9dee8d862645996

5 years agoupstream: allow *-sk key types to be turned into certificates
djm@openbsd.org [Mon, 18 Nov 2019 06:24:17 +0000 (06:24 +0000)] 
upstream: allow *-sk key types to be turned into certificates

OpenBSD-Commit-ID: cd365ee343934862286d0b011aa77fa739d2a945

5 years agoupstream: mention ed25519-sk key/cert types here too; prompted by
djm@openbsd.org [Mon, 18 Nov 2019 04:55:02 +0000 (04:55 +0000)] 
upstream: mention ed25519-sk key/cert types here too; prompted by

jmc@

OpenBSD-Commit-ID: e281977e4a4f121f3470517cbd5e483eee37b818

5 years agoupstream: mention ed25519-sk in places where it is accepted;
djm@openbsd.org [Mon, 18 Nov 2019 04:50:45 +0000 (04:50 +0000)] 
upstream: mention ed25519-sk in places where it is accepted;

prompted by jmc@

OpenBSD-Commit-ID: 076d386739ebe7336c2137e583bc7a5c9538a442

5 years agoupstream: document ed25519-sk pubkey, private key and certificate
djm@openbsd.org [Mon, 18 Nov 2019 04:34:47 +0000 (04:34 +0000)] 
upstream: document ed25519-sk pubkey, private key and certificate

formats

OpenBSD-Commit-ID: 795a7c1c80315412e701bef90e31e376ea2f3c88

5 years agoupstream: correct order or ecdsa-sk private key fields
djm@openbsd.org [Mon, 18 Nov 2019 04:29:50 +0000 (04:29 +0000)] 
upstream: correct order or ecdsa-sk private key fields

OpenBSD-Commit-ID: 4d4a0c13226a79f0080ce6cbe74f73b03ed8092e

5 years agoupstream: correct description of fields in pub/private keys (was
djm@openbsd.org [Mon, 18 Nov 2019 04:16:53 +0000 (04:16 +0000)] 
upstream: correct description of fields in pub/private keys (was

missing curve name); spotted by Sebastian Kinne

OpenBSD-Commit-ID: 2a11340dc7ed16200342d384fb45ecd4fcce26e7

5 years agoTeach the GTK2/3 ssh-askpass the new prompt hints
Damien Miller [Mon, 18 Nov 2019 04:05:04 +0000 (15:05 +1100)] 
Teach the GTK2/3 ssh-askpass the new prompt hints

ssh/ssh-agent now sets a hint environment variable $SSH_ASKPASS_PROMPT
when running the askpass program. This is intended to allow the
askpass to vary its UI across the three cases it supports: asking for
a passphrase, confirming the use of a key and (recently) reminding
a user to touch their security key.

This adapts the gnome-ssh-askpass[23] to use these hints. Specifically,
for SSH_ASKPASS_PROMPT=confirm it will skip the text input box and show
only "yes"/"no" buttons. For SSH_ASKPASS_PROMPT=none (used to remind
users to tap their security key), it shows only a "close" button.

Help wanted: adapt the other askpass programs in active use, including
x11-ssh-askpass, lxqt-openssh-askpass, etc.

5 years agoMove ifdef OPENSSL_HAS_ECC.
Darren Tucker [Mon, 18 Nov 2019 03:15:26 +0000 (14:15 +1100)] 
Move ifdef OPENSSL_HAS_ECC.

Found by -Wimplicit-fallthrough: one ECC case was not inside the ifdef.
ok djm@

5 years agoEnable -Wimplicit-fallthrough if supported
Darren Tucker [Mon, 18 Nov 2019 03:14:18 +0000 (14:14 +1100)] 
Enable -Wimplicit-fallthrough if supported

Suggested by djm.

5 years agoupstream: missing break in getopt switch; spotted by Sebastian Kinne
djm@openbsd.org [Mon, 18 Nov 2019 01:59:48 +0000 (01:59 +0000)] 
upstream: missing break in getopt switch; spotted by Sebastian Kinne

OpenBSD-Commit-ID: f002dbf14dba5586e8407e90f0141148ade8e8fc

5 years agoupstream: tweak debug message
djm@openbsd.org [Sat, 16 Nov 2019 23:17:20 +0000 (23:17 +0000)] 
upstream: tweak debug message

OpenBSD-Commit-ID: 2bf336d3be0b7e3dd97920d7e7471146a281d2b9

5 years agoupstream: a little debug() in the security key interface
djm@openbsd.org [Sat, 16 Nov 2019 22:42:30 +0000 (22:42 +0000)] 
upstream: a little debug() in the security key interface

OpenBSD-Commit-ID: 4c70300609a5c8b19707207bb7ad4109e963b0e8

5 years agoupstream: always use ssh-sk-helper, even for the internal USB HID
djm@openbsd.org [Sat, 16 Nov 2019 22:36:48 +0000 (22:36 +0000)] 
upstream: always use ssh-sk-helper, even for the internal USB HID

support. This avoid the need for a wpath pledge in ssh-agent.

reported by jmc@

OpenBSD-Commit-ID: 19f799c4d020b870741d221335dbfa5e76691c23

5 years agoupstream: fix typos in sk_enroll
markus@openbsd.org [Fri, 15 Nov 2019 15:41:01 +0000 (15:41 +0000)] 
upstream: fix typos in sk_enroll

OpenBSD-Commit-ID: faa9bf779e008b3e64e2eb1344d9b7d83b3c4487

5 years agoupstream: double word;
jmc@openbsd.org [Fri, 15 Nov 2019 11:16:28 +0000 (11:16 +0000)] 
upstream: double word;

OpenBSD-Commit-ID: 43d09bafa4ea9002078cb30ca9adc3dcc0b9c2b9

5 years agoupstream: remove most uses of BN_CTX
djm@openbsd.org [Fri, 15 Nov 2019 06:00:20 +0000 (06:00 +0000)] 
upstream: remove most uses of BN_CTX

We weren't following the rules re BN_CTX_start/BN_CTX_end and the places
we were using it didn't benefit from its use anyway. ok dtucker@

OpenBSD-Commit-ID: ea9ba6c0d2e6f6adfe00b309a8f41842fe12fc7a

5 years agoAdd wrappers for other ultrix headers.
Darren Tucker [Fri, 15 Nov 2019 07:56:54 +0000 (18:56 +1100)] 
Add wrappers for other ultrix headers.

Wrappers protect against multiple inclusions for headers that don't do
it themselves.

5 years agoAdd SSIZE_MAX when we define ssize_t.
Darren Tucker [Fri, 15 Nov 2019 07:55:13 +0000 (18:55 +1100)] 
Add SSIZE_MAX when we define ssize_t.

5 years agoRemove ultrix realpath hack.
Darren Tucker [Fri, 15 Nov 2019 06:13:19 +0000 (17:13 +1100)] 
Remove ultrix realpath hack.

5 years agoupstream: unshield security key privkey before attempting signature
djm@openbsd.org [Fri, 15 Nov 2019 05:37:27 +0000 (05:37 +0000)] 
upstream: unshield security key privkey before attempting signature

in agent. spotted by dtucker@

OpenBSD-Commit-ID: fb67d451665385b8a0a55371231c50aac67b91d2

5 years agoupstream: rewrite c99-ism
deraadt@openbsd.org [Fri, 15 Nov 2019 05:26:56 +0000 (05:26 +0000)] 
upstream: rewrite c99-ism

OpenBSD-Commit-ID: d0c70cca29cfa7e6d9f7ec1d6d5dabea112499b3

5 years agoupstream: only clang understands those new -W options
deraadt@openbsd.org [Fri, 15 Nov 2019 05:25:52 +0000 (05:25 +0000)] 
upstream: only clang understands those new -W options

OpenBSD-Commit-ID: d9b910e412d139141b072a905e66714870c38ac0

5 years agoconfigure flag to built-in security key support
Damien Miller [Fri, 15 Nov 2019 05:08:00 +0000 (16:08 +1100)] 
configure flag to built-in security key support

Require --with-security-key-builtin before enabling the built-in
security key support (and consequent dependency on libfido2).

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:06:30 +0000 (16:06 +1100)] 
upstream commit

revision 1.48
date: 2019/02/04 16:45:40;  author: millert;  state: Exp;  lines: +16 -17;  commitid: cpNtVC7erojNyctw;
Make gl_pathc, gl_matchc and gl_offs size_t in glob_t to match POSIX.
This requires a libc major version bump.  OK deraadt@

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:05:07 +0000 (16:05 +1100)] 
upstream commit

revision 1.47
date: 2017/05/08 14:53:27;  author: millert;  state: Exp;  lines: +34 -21;  commitid: sYfxfyUHAfarP8sE;
Fix exponential CPU use with repeated '*' operators by changing '*'
handling to be interative instead of recursive.
Fix by Yves Orton, ported to OpenBSD glob.c by Ray Lai.  OK tb@

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:04:28 +0000 (16:04 +1100)] 
upstream commit

revision 1.46
date: 2015/12/28 22:08:18;  author: mmcc;  state: Exp;  lines: +5 -9;  commitid: 0uXuF2O13NH9q2e1;
Remove NULL-checks before free() and a few related dead assignments.

ok and valuable input from millert@

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:02:43 +0000 (16:02 +1100)] 
upstream commit

revision 1.44
date: 2015/09/14 16:09:13;  author: tedu;  state: Exp;  lines: +3 -5;  commitid: iWfSX2BIn0sLw62l;
remove null check before free. from Michael McConville
ok semarie

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:02:27 +0000 (16:02 +1100)] 
upstream commit

revision 1.43
date: 2015/06/13 16:57:04;  author: deraadt;  state: Exp;  lines: +4 -4;  commitid: zOUKuqWBdOPOz1SZ;
in glob() initialize the glob_t before the first failure check.
from j@pureftpd.org
ok millert stsp

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:01:20 +0000 (16:01 +1100)] 
upstream commit

revision 1.42
date: 2015/02/05 12:59:57;  author: millert;  state: Exp;  lines: +2 -1;  commitid: DTQbfd4poqBW8iSJ;
Include stdint.h, not limits.h to get SIZE_MAX.  OK guenther@

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:00:07 +0000 (16:00 +1100)] 
upstream commit

revision 1.41
date: 2014/10/08 05:35:27;  author: deraadt;  state: Exp;  lines: +3 -3;  commitid: JwTGarRLHQKDgPh2;
obvious realloc -> reallocarray conversion

5 years agoupstream: don't consult dlopen whitelist for internal security key
djm@openbsd.org [Fri, 15 Nov 2019 04:12:32 +0000 (04:12 +0000)] 
upstream: don't consult dlopen whitelist for internal security key

provider; spotted by dtucker@

OpenBSD-Commit-ID: bfe5fbd17e4ff95dd85b9212181652b54444192e