]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
4 months agoAdd tcmalloc flags to TEST_SSH_SSHD_ENV.
Darren Tucker [Fri, 28 Mar 2025 05:46:40 +0000 (16:46 +1100)] 
Add tcmalloc flags to TEST_SSH_SSHD_ENV.

This will get passed to sshd via test-exec.sh.

4 months agoAdd PuTTY 0.81, 0.82 and 0.83 to tests.
Darren Tucker [Thu, 27 Mar 2025 12:04:44 +0000 (23:04 +1100)] 
Add PuTTY 0.81, 0.82 and 0.83 to tests.

4 months agoInclude TCMALLOC_STACKTRACE_METHOD in output.
Darren Tucker [Thu, 27 Mar 2025 11:30:40 +0000 (22:30 +1100)] 
Include TCMALLOC_STACKTRACE_METHOD in output.

If TCMALLOC_STACKTRACE_METHOD happens to be set, include it in the debug
output to make reproducing test cases easier.

4 months agoTest with-linux-memlock-onfault in kitchensink.
Darren Tucker [Thu, 27 Mar 2025 09:15:11 +0000 (20:15 +1100)] 
Test with-linux-memlock-onfault in kitchensink.

4 months agoInclude fcntl.h so AT_FDCWD does not get redefined.
Collin Funk [Thu, 27 Mar 2025 01:24:59 +0000 (18:24 -0700)] 
Include fcntl.h so AT_FDCWD does not get redefined.

4 months agoAdd support for locking memory on Linux
Daniil Tatianin [Thu, 27 Feb 2025 08:37:13 +0000 (11:37 +0300)] 
Add support for locking memory on Linux

Linux wakes up kcompactd threads in order to make more contiguous memory
available on the system, it does this by migrating live movable pages
(actively modifying live processes' page tables and constantly flooding
them with page invalidation IPIs, which can be up to millions per
second), which causes the process to become unresponsive for up to
seconds or even minutes in some severe cases. In case of sshd, we want
to always be able to connect to the system, even if it's under heavy
kcompactd load.

Introduce an option to protect sshd and its children sessions from being
compacted by kcompactd (this works in cojunction with
compact_unevictable_allowed = 0). Note that we depend on MCL_ONFAULT
being available, which was introduced in linux 4.4. MCL_ONFAULT allows
the system to lock pages lazily, thus drastically reducing memory usage
of a locked process (without MCL_ONFAULT, every existing mapping in the
process is instantly write-faulted).

4 months agoplatform: introduce a way to hook new session start
Daniil Tatianin [Thu, 27 Feb 2025 08:46:25 +0000 (11:46 +0300)] 
platform: introduce a way to hook new session start

Previously this was possible via post_fork_child, but ever since sshd
was split into multiple binaries, this is now no longer possible becase
of execv.

4 months agoupstream: Prevent theoretical NULL deref in throughlocal_sftp.
dtucker@openbsd.org [Wed, 19 Mar 2025 06:11:15 +0000 (06:11 +0000)] 
upstream: Prevent theoretical NULL deref in throughlocal_sftp.

Coverity CID 405019, although at the moment it's not reachable. ok djm@

OpenBSD-Commit-ID: 630d46c1021b69fbb470e349976c70e9a48b7644

4 months agoFix workflow syntax again.
Darren Tucker [Wed, 19 Mar 2025 06:35:10 +0000 (17:35 +1100)] 
Fix workflow syntax again.

5 months agoDifferentiate logfiles better.
Darren Tucker [Tue, 18 Mar 2025 09:54:48 +0000 (20:54 +1100)] 
Differentiate logfiles better.

5 months agoFix another typo in workflow.
Darren Tucker [Tue, 18 Mar 2025 09:27:46 +0000 (20:27 +1100)] 
Fix another typo in workflow.

5 months agoFix syntax error in workflow.
Darren Tucker [Tue, 18 Mar 2025 07:16:12 +0000 (18:16 +1100)] 
Fix syntax error in workflow.

5 months agoIdentify each logfile while printing them.
Darren Tucker [Tue, 18 Mar 2025 07:13:14 +0000 (18:13 +1100)] 
Identify each logfile while printing them.

5 months agoupstream: fix NULL dereference for Match conditions missing
djm@openbsd.org [Tue, 18 Mar 2025 04:53:14 +0000 (04:53 +0000)] 
upstream: fix NULL dereference for Match conditions missing

arguments, e.g. "Match user". Spotted by Coverity (CID 477813)

OpenBSD-Commit-ID: 13584281cfa23b8ebc41f9d128a6b9464ae960d4

5 months agoupstream: Fix EVP_CIPHER_CTX_ctrl() return checks
tb@openbsd.org [Fri, 14 Mar 2025 09:49:49 +0000 (09:49 +0000)] 
upstream: Fix EVP_CIPHER_CTX_ctrl() return checks

While this API tries to translate negative return values (i.e. -1) to 0
in BoringSSL and LibreSSL, it is still possible for it to return negative
values in prinicple. We even incorrectly document that -1 can be returned
while Boring and OpenSSL plead the Fifth.

In OpenSSL 3 there are now code paths that explicitly return -1 and they
started shifting their return checks to <= 0 - of course they do this in
inconsistent and sometimes incorrect manner. While these paths aren't
reachable from ssh right now, who can really tell what happens in the two
hundred lines of inscrutable bloated mess this has become.

So error check with <= 0 to ensure that we don't accidentally translate an
error to success.

ok markus schwarze

OpenBSD-Commit-ID: a855c833cf4ecfce43bedc761f26ad924f70483c

5 months agoFix debug log path.
Darren Tucker [Mon, 17 Mar 2025 10:35:55 +0000 (21:35 +1100)] 
Fix debug log path.

5 months agoAlso lazily unmount workspace in case of straggers.
Darren Tucker [Fri, 14 Mar 2025 05:24:06 +0000 (16:24 +1100)] 
Also lazily unmount workspace in case of straggers.

5 months agoMake sure upstream tests run on correct hardware.
Darren Tucker [Fri, 14 Mar 2025 05:17:39 +0000 (16:17 +1100)] 
Make sure upstream tests run on correct hardware.

5 months agoAdd OpenBSD upstream test on obsdsnap-arm64.
Darren Tucker [Fri, 14 Mar 2025 02:47:27 +0000 (13:47 +1100)] 
Add OpenBSD upstream test on obsdsnap-arm64.

5 months agorebuild .depend
Damien Miller [Wed, 12 Mar 2025 23:45:53 +0000 (10:45 +1100)] 
rebuild .depend

5 months agoupstream: remove assumption that the sshd_config and any configs
djm@openbsd.org [Wed, 12 Mar 2025 22:43:44 +0000 (22:43 +0000)] 
upstream: remove assumption that the sshd_config and any configs

included from it can fit in a (possibly enlarged) socket buffer, by having
the sshd listener mainloop actively manage sending the configuration to the
sshd-session subprocess.

work by markus@ w/ a little feedback from me;
ok me and committing on his behalf

OpenBSD-Commit-ID: 8f54451483f64951853074adb76bc4f838eaf3ae

5 months agoupstream: Prime caches for DNS names needed for tests.
dtucker@openbsd.org [Tue, 11 Mar 2025 11:46:44 +0000 (11:46 +0000)] 
upstream: Prime caches for DNS names needed for tests.

When running the SSHFP tests, particularly on an ephemeral VM, the first
query or two can fail for some reason, presumably because something isn't
fully initialized or something.  To work around this, issue queries for the
names we'll need before we need them.

OpenBSD-Regress-ID: 900841133540e7dead253407db5a874a6ed09eca

5 months agoupstream: Some dd's don't understand "1m", so handle seperately.
dtucker@openbsd.org [Tue, 11 Mar 2025 09:06:50 +0000 (09:06 +0000)] 
upstream: Some dd's don't understand "1m", so handle seperately.

OpenBSD-Regress-ID: 1d983b27c96f28f69d3a288c19e8d8c58e1b2ee3

5 months agoLazily unmount github workspace at end of workflow.
Darren Tucker [Tue, 11 Mar 2025 08:17:46 +0000 (19:17 +1100)] 
Lazily unmount github workspace at end of workflow.

Sometimes when a test times out the workspace is still busy when we try
to unmount it, which leaves the runner unusable until it's cleaned up
manually. We try to unmount this in the first step, but that usually
doesn't work since it fails during setup before it starts our workflow.
Move it to the end and make it a lazy unmount so it hopefully works
eventually.

5 months agoupstream: Add regress test for sftp resume.
dtucker@openbsd.org [Tue, 11 Mar 2025 07:50:20 +0000 (07:50 +0000)] 
upstream: Add regress test for sftp resume.

OpenBSD-Regress-ID: 37f629b3014338fa23a85df1e1bb320ea12282e1

5 months agoupstream: Use ssh binary instead of the (smaller) script when
dtucker@openbsd.org [Tue, 11 Mar 2025 07:46:02 +0000 (07:46 +0000)] 
upstream: Use ssh binary instead of the (smaller) script when

preparing test data files since it's faster.

OpenBSD-Regress-ID: 4215e42682fdb73e131e10645d4a1a23a91d64f5

5 months agoupstream: Set up dbclient's known_hosts as it expects.
dtucker@openbsd.org [Tue, 11 Mar 2025 07:43:45 +0000 (07:43 +0000)] 
upstream: Set up dbclient's known_hosts as it expects.

OpenBSD-Regress-ID: 9e0898e8423237ce5023be53787bb4062e0d0418

5 months agoupstream: Use $DBCLIENT to access dbclient for consistency.
dtucker@openbsd.org [Tue, 11 Mar 2025 07:43:03 +0000 (07:43 +0000)] 
upstream: Use $DBCLIENT to access dbclient for consistency.

OpenBSD-Regress-ID: 81e1b41e1ffc49aba1e6fcaeb6242f3b7875ea3c

5 months agoupstream: Check if dbclient supports SHA1 before trying SHA1-based
dtucker@openbsd.org [Tue, 11 Mar 2025 07:42:08 +0000 (07:42 +0000)] 
upstream: Check if dbclient supports SHA1 before trying SHA1-based

KEX.

Dropbear 2025.87 removed SHA1 support by default, which means
diffie-hellman-group14-sha1 is not available.  Unfortunately there isn't a
flag to query supported KEX, so instead check MACs and if it doesn't have
SHA1 methods, assuming SHA1 based KEXes are likewise not available.  Spotted
by anton@.

OpenBSD-Regress-ID: acfa8e26c001cb18b9fb81a27271c3b51288d304

5 months agoupstream: Set highwater when resuming a "put". Prevents bogus "server
dtucker@openbsd.org [Tue, 11 Mar 2025 07:48:51 +0000 (07:48 +0000)] 
upstream: Set highwater when resuming a "put". Prevents bogus "server

reordered acks" debug message.  ok djm@

OpenBSD-Commit-ID: aa7f6d0fc2e893c8c278ea3e6e0974c2eca83f5d

5 months agoupstream: Test for %-token and env var expansion in SetEnv.
dtucker@openbsd.org [Mon, 3 Mar 2025 06:54:37 +0000 (06:54 +0000)] 
upstream: Test for %-token and env var expansion in SetEnv.

OpenBSD-Regress-ID: bd6139a6177ac4afb29a0ce4afc23567b22ef9f9

5 months agoupstream: Also test User expansions when supplied via -l option and
dtucker@openbsd.org [Sun, 2 Mar 2025 07:41:06 +0000 (07:41 +0000)] 
upstream: Also test User expansions when supplied via -l option and

user@host.

OpenBSD-Regress-ID: 56415859260b53ef0dd20f71225ba5fdf6320f50

5 months agoupstream: Tests for User expansion of %-tokens and environment
dtucker@openbsd.org [Sat, 1 Mar 2025 06:12:47 +0000 (06:12 +0000)] 
upstream: Tests for User expansion of %-tokens and environment

variables.

OpenBSD-Regress-ID: 7ed21dd0e09fb1f3537b8b177f171018aa501628

5 months agoupstream: use glob(3) wildcards in AuthorizedKeys/PrincipalsFile
djm@openbsd.org [Fri, 6 Dec 2024 16:25:58 +0000 (16:25 +0000)] 
upstream: use glob(3) wildcards in AuthorizedKeys/PrincipalsFile

tests to exercise this feature; ok dtucker

OpenBSD-Regress-ID: 7f7b19c0b05b1862cc6521ce61b2b301a3f9cc3b

5 months agoupstream: implement attestation verification for ED25519 keys
djm@openbsd.org [Fri, 6 Dec 2024 10:37:42 +0000 (10:37 +0000)] 
upstream: implement attestation verification for ED25519 keys

OpenBSD-Regress-ID: c44fa5cdb434375a8b5545fdb4fc651061afca1f

5 months agoupstream: Add %-token and environment variable expansion to SetEnv.
dtucker@openbsd.org [Mon, 3 Mar 2025 06:53:09 +0000 (06:53 +0000)] 
upstream: Add %-token and environment variable expansion to SetEnv.

feedback deraadt@ jmc@, nits and ok djm@

OpenBSD-Commit-ID: 2f6e5070481cb73e6f35fd1c6608c1eeff88a5c1

5 months agoupstream: fix PerSourcePenalty incorrectly using "crash" penalty when
djm@openbsd.org [Sun, 2 Mar 2025 22:44:00 +0000 (22:44 +0000)] 
upstream: fix PerSourcePenalty incorrectly using "crash" penalty when

LoginGraceTime was exceeded. Reported by irwin AT princeton.edu via bz3797

OpenBSD-Commit-ID: 1ba3e490a5a9451359618c550d995380af454d25

5 months agoinclude __builtin_popcount replacement function
Damien Miller [Sun, 2 Mar 2025 11:06:53 +0000 (22:06 +1100)] 
include __builtin_popcount replacement function

Some systems/compilers lack __builtin_popcount(), so replace it as
necessary. Reported by Dennis Clarke; ok dtucker@

5 months agoupstream: whitespace
djm@openbsd.org [Sun, 2 Mar 2025 11:03:13 +0000 (11:03 +0000)] 
upstream: whitespace

OpenBSD-Commit-ID: 1bd8953a37451ef7e0991f9fceec5e8005fe986a

5 months agoupstream: Make a copy of the user when handling ssh -l, so that
dtucker@openbsd.org [Sun, 2 Mar 2025 07:02:49 +0000 (07:02 +0000)] 
upstream: Make a copy of the user when handling ssh -l, so that

later during User token expansion we don't end up freeing a member of argv.
Spotted by anton@'s regress tests.

OpenBSD-Commit-ID: 2f671a4f5726b66d123b88b1fdd1a90581339955

5 months agoupstream: Allow %-token and environment variable expansion in User,
dtucker@openbsd.org [Sat, 1 Mar 2025 06:11:26 +0000 (06:11 +0000)] 
upstream: Allow %-token and environment variable expansion in User,

with the exception of %r and %C which are self-referential.  Requested in
bz#3477, ok djm@, man page improvements jmc@

OpenBSD-Commit-ID: caeb46251ee073662f6f5864c6f7b92d8ac80fa8

5 months agoRebuild config files if Makefile changes.
Darren Tucker [Fri, 28 Feb 2025 23:28:59 +0000 (10:28 +1100)] 
Rebuild config files if Makefile changes.

This ensures paths are updated if they are changed by re-running configure.
Patch from rapier at psc.edu.

5 months agoCheck for le32toh, le64toh, htole64 individually.
Darren Tucker [Wed, 26 Feb 2025 07:16:03 +0000 (18:16 +1100)] 
Check for le32toh, le64toh, htole64 individually.

It appears that at least some versions of endian.h in glibc do not have
the latter two, so check for and replace each one individually.
bz#3794, ok djm@

5 months agoupstream: ressurect fix for "match invalid-user" that got clobbered
djm@openbsd.org [Tue, 25 Feb 2025 06:25:30 +0000 (06:25 +0000)] 
upstream: ressurect fix for "match invalid-user" that got clobbered

by 1.423

OpenBSD-Commit-ID: d18bf0945976e0f3467d710d4bc8bdbe181c0567

5 months agoupstream: Also prohibit , (comma) in hostnames, proposed by David
deraadt@openbsd.org [Fri, 21 Feb 2025 18:22:41 +0000 (18:22 +0000)] 
upstream: Also prohibit , (comma) in hostnames, proposed by David

Leadbeater ok djm millert

OpenBSD-Commit-ID: 2837fa31dc6e81976f510f0a259edaa559b20b07

5 months agoTry to fix github tcmalloc target failure
Damien Miller [Mon, 24 Feb 2025 06:27:50 +0000 (17:27 +1100)] 
Try to fix github tcmalloc target failure

tcmalloc may, depending on the stacktrace generator it uses, create
pipe(2) fds during shared library initialisation. These will later
get clobbered by ssh/sshd calling closefrom() and chaos will ensue.
Tell tcmalloc to use an unwinder that doesn't pull this stuff.

5 months agocleanup last mention of ubuntu-20.04
Damien Miller [Fri, 21 Feb 2025 02:44:35 +0000 (13:44 +1100)] 
cleanup last mention of ubuntu-20.04

5 months agoprune gcc/clang versions to be tested
Damien Miller [Fri, 21 Feb 2025 02:44:13 +0000 (13:44 +1100)] 
prune gcc/clang versions to be tested

Test only the oldest and latest versions of each

5 months agoUpdate AWS-LC version number
Damien Miller [Fri, 21 Feb 2025 00:30:22 +0000 (11:30 +1100)] 
Update AWS-LC version number

Patch from Shubham Mittal bz bz3792

5 months agoadjust workflows for ubuntu version transition
Damien Miller [Fri, 21 Feb 2025 00:22:34 +0000 (11:22 +1100)] 
adjust workflows for ubuntu version transition

remove workflows for unsupported compilers, add a few for additional
supported compilers, move some workflows to run on ubuntu-latest

5 months agoAdd ubuntu-*-arm test runners
Damien Miller [Thu, 20 Feb 2025 06:10:32 +0000 (17:10 +1100)] 
Add ubuntu-*-arm test runners

5 months agoremove ubuntu-20.04 Github action runners
Damien Miller [Thu, 20 Feb 2025 06:03:28 +0000 (17:03 +1100)] 
remove ubuntu-20.04 Github action runners

ubuntu-20.04 is deprecated now, so migrate all its unique runners
to ubuntu-22.04.

ok dtucker@

5 months agoopenssh-9.9p2
Damien Miller [Tue, 18 Feb 2025 08:03:42 +0000 (19:03 +1100)] 
openssh-9.9p2

5 months agoupstream: Fix cases where error codes were not correctly set
djm@openbsd.org [Tue, 18 Feb 2025 08:02:48 +0000 (08:02 +0000)] 
upstream: Fix cases where error codes were not correctly set

Reported by the Qualys Security Advisory team. ok markus@

OpenBSD-Commit-ID: 7bcd4ffe0fa1e27ff98d451fb9c22f5fae6e610d

5 months agoupstream: Don't reply to PING in preauth phase or during KEX
djm@openbsd.org [Tue, 18 Feb 2025 08:02:12 +0000 (08:02 +0000)] 
upstream: Don't reply to PING in preauth phase or during KEX

Reported by the Qualys Security Advisory team. ok markus@

OpenBSD-Commit-ID: c656ac4abd1504389d1733d85152044b15830217

5 months agoupstream: - use \& when contructs like "e.g." end a line, to avoid
jmc@openbsd.org [Sat, 15 Feb 2025 06:48:56 +0000 (06:48 +0000)] 
upstream: - use \& when contructs like "e.g." end a line, to avoid

double spacing - macro is Qq not Oq

OpenBSD-Commit-ID: 17e5d2d7f288cc7fc536e3af252224525f9fb43a

6 months agodepend
Damien Miller [Sat, 15 Feb 2025 02:12:40 +0000 (13:12 +1100)] 
depend

6 months agoupstream: add "Match version" support to ssh_config. Allows
djm@openbsd.org [Sat, 15 Feb 2025 01:52:07 +0000 (01:52 +0000)] 
upstream: add "Match version" support to ssh_config. Allows

matching on the local version of OpenSSH, e.g. "Match version OpenSSH_10.*"

ok markus@

OpenBSD-Commit-ID: c0cb504d0b9e43ccf12e68a544a7cd625e89758d

6 months agoupstream: Add support for "Match sessiontype" to ssh_config. Allows
djm@openbsd.org [Sat, 15 Feb 2025 01:50:47 +0000 (01:50 +0000)] 
upstream: Add support for "Match sessiontype" to ssh_config. Allows

matching on the type of session requested, either "shell" for interactive
sessions, "exec" for command execution sessions, "subsystem" for subsystem
requests, such as sftp, or "none" for transport/forwarding-only sessions.

ok markus@

OpenBSD-Commit-ID: eff5c001aecb2283d36639cfb28c0935a8bfd468

6 months agoupstream: "Match command ..." support for ssh_config to allow
djm@openbsd.org [Sat, 15 Feb 2025 01:48:30 +0000 (01:48 +0000)] 
upstream: "Match command ..." support for ssh_config to allow

matching on the remote command specified on the commandline.

Also relaxes matching rules for `Match tagged` to allow
`Match tagged ""` to match an empty tag value. This also works
for command.

ok markus@

OpenBSD-Commit-ID: 00dcfea425bf58d824bf5e3464cfc2409121b60d

6 months agodepend
Damien Miller [Mon, 10 Feb 2025 23:32:26 +0000 (10:32 +1100)] 
depend

6 months agoupstream: include arguments the command was invoked with, and
djm@openbsd.org [Mon, 10 Feb 2025 23:19:26 +0000 (23:19 +0000)] 
upstream: include arguments the command was invoked with, and

operating system name, version and architecture in startup debugging output;
ok dtucker

OpenBSD-Commit-ID: 2a509d319aaf31a6bf9998e1842832883fbc3edd

6 months agoupstream: include line number in Match debug messages, makes it a
djm@openbsd.org [Mon, 10 Feb 2025 23:16:51 +0000 (23:16 +0000)] 
upstream: include line number in Match debug messages, makes it a

little easier to see what's going on

OpenBSD-Commit-ID: 1fcf4aa2ee667711b9497ded0fa52d757c69b1df

6 months agoupstream: fix "Match invalid-user" from incorrectly being activated
djm@openbsd.org [Mon, 10 Feb 2025 23:00:29 +0000 (23:00 +0000)] 
upstream: fix "Match invalid-user" from incorrectly being activated

in initial configuration pass when no other predicates were present on the
match line

OpenBSD-Commit-ID: 02703b4bd207fafd03788bc4e7774bf80be6c9a8

6 months agoupstream: In a section 1 manual, use the plain English words
schwarze@openbsd.org [Sun, 9 Feb 2025 18:24:08 +0000 (18:24 +0000)] 
upstream: In a section 1 manual, use the plain English words

"standard output" rather than the overly technical abbreviation "stdout" - we
are not talking about a device file or a FILE * object here. Issue reported
by <onf at disroot dot org> on the groff mailing list.

OpenBSD-Commit-ID: a0816999f970e6159523bed8484f62c42ec93109

6 months agoupstream: Fix debug logging of user specific delay. Patch from
dtucker@openbsd.org [Fri, 17 Jan 2025 00:09:41 +0000 (00:09 +0000)] 
upstream: Fix debug logging of user specific delay. Patch from

Achim Leitner (fjl5) via github PR#552.

OpenBSD-Commit-ID: 834a869ed9b15058d3c1ef0cd75402ef989255d8

6 months agoupstream: Call log_init in sshd-auth and sshd-session immediately
dtucker@openbsd.org [Thu, 16 Jan 2025 06:37:10 +0000 (06:37 +0000)] 
upstream: Call log_init in sshd-auth and sshd-session immediately

after parsing the config file so that any log settings set in the config file
take effect immediately.  Move version banners to immediately after that, and
make them distinct per binary.  ok djm@

OpenBSD-Commit-ID: acf3d090638edf9b6e6f78eed96b537fe671f0f5

6 months agoupstream: Use strprefix helper when processing sshd -C test args
dtucker@openbsd.org [Wed, 15 Jan 2025 22:23:13 +0000 (22:23 +0000)] 
upstream: Use strprefix helper when processing sshd -C test args

instead of counting bytes by hand.  ok djm@

OpenBSD-Commit-ID: 2866d369d96fe04bf76112260ac37e489f98a9a9

6 months agoadd support for AWS-LC (AWS libcrypto)
Damien Miller [Wed, 5 Feb 2025 22:38:09 +0000 (09:38 +1100)] 
add support for AWS-LC (AWS libcrypto)

Patch from Shubham Mittal via bz3784; ok dtucker

8 months agofix old typo (s/SYSVINITSTOPT/SYSVINITSTOP/)
Tim Rice [Mon, 16 Dec 2024 23:36:54 +0000 (15:36 -0800)] 
fix old typo (s/SYSVINITSTOPT/SYSVINITSTOP/)

8 months agoupstream: Plug leak on error path, spotted by Coverity. ok djm@
dtucker@openbsd.org [Thu, 12 Dec 2024 09:09:09 +0000 (09:09 +0000)] 
upstream: Plug leak on error path, spotted by Coverity. ok djm@

OpenBSD-Commit-ID: b1859959374b4709569760cae0866d22a16606d3

8 months agoAdd $(srcdir) for standalone sk-libfido2 make target.
Xavier Hsinyuan [Mon, 9 Dec 2024 03:21:05 +0000 (11:21 +0800)] 
Add $(srcdir) for standalone sk-libfido2 make target.

Fix out-of-tree build failure due to incorrect path for `sk-usbhid.c`.

8 months agoupstream: replace bespoke logging of MaxSessions enforcement with
djm@openbsd.org [Sat, 7 Dec 2024 10:12:19 +0000 (10:12 +0000)] 
upstream: replace bespoke logging of MaxSessions enforcement with

new ratelimited logging infrastructure.

Add ratelimits to logging of connections dropped by PerSourcePenalties

ok dtucker

OpenBSD-Commit-ID: f22fe7c39607e4361aadf95e33773ffd68c59489

8 months agoupstream: add infrastructure for ratelimited logging; feedback/ok
djm@openbsd.org [Sat, 7 Dec 2024 10:05:36 +0000 (10:05 +0000)] 
upstream: add infrastructure for ratelimited logging; feedback/ok

dtucker

OpenBSD-Commit-ID: 18a83e5ac09d59aaf1e834fd6b796db89dd842e7

8 months agoupstream: allow glob(3) patterns for sshd_config AuthorizedKeysFile
djm@openbsd.org [Fri, 6 Dec 2024 16:24:27 +0000 (16:24 +0000)] 
upstream: allow glob(3) patterns for sshd_config AuthorizedKeysFile

and AuthorizedPrincipalsFile directives; bz2755 ok dtucker

OpenBSD-Commit-ID: 3e3e05a17fca39bba78b993a07b44664519adf7f

8 months agoupstream: support VersionAddendum in the client, mirroring the
djm@openbsd.org [Fri, 6 Dec 2024 16:21:48 +0000 (16:21 +0000)] 
upstream: support VersionAddendum in the client, mirroring the

option of the same name in the server; bz2745 ok dtucker@

OpenBSD-Commit-ID: 6ff7905b3f9806649bde750515786553fb89cdf4

8 months agoupstream: clarify encoding of options/extensions; bz2389
djm@openbsd.org [Fri, 6 Dec 2024 16:02:12 +0000 (16:02 +0000)] 
upstream: clarify encoding of options/extensions; bz2389

OpenBSD-Commit-ID: c4e92356d44dfe6d0a4416deecb33d1d1eba016c

8 months agoupstream: ignore SIGPIPE here; some downstreams have had this for
djm@openbsd.org [Fri, 6 Dec 2024 15:17:15 +0000 (15:17 +0000)] 
upstream: ignore SIGPIPE here; some downstreams have had this for

years...

OpenBSD-Commit-ID: 73674ee4f8ceb8fc9cb8de71d8ddea0c721eb035

8 months agoupstream: sync -o option lists with ssh.1; requested jmc@
djm@openbsd.org [Fri, 6 Dec 2024 15:12:56 +0000 (15:12 +0000)] 
upstream: sync -o option lists with ssh.1; requested jmc@

OpenBSD-Commit-ID: a7ac295b444da7b2ca7a33a52370594f6897f6bb

8 months agoRemove ancient RHL 6.x config in RPM spec.
Fabio Pedretti [Mon, 16 Oct 2023 15:12:24 +0000 (17:12 +0200)] 
Remove ancient RHL 6.x config in RPM spec.

It looks like build6x options were intended for RHL 6.x
(the Red Hat distro predating Fedora, not RHEL), but were
then applied to RHEL.

Completely remove support for this ancient configuration.

Successfully built, installed and run on RHEL 6. This also
remove a build warning about deprecation of PreReq.

8 months agoAdd new hardware-backed signing key for myself.
Darren Tucker [Fri, 6 Dec 2024 12:54:45 +0000 (23:54 +1100)] 
Add new hardware-backed signing key for myself.

Retire old non-hardware based signing key.

8 months agoFix configure implicit declaration and format warnings.
Jonas 'Sortie' Termansen [Sat, 2 Nov 2024 21:05:45 +0000 (22:05 +0100)] 
Fix configure implicit declaration and format warnings.

8 months agoupstream: Expand $SSH to absolute path if it's not already.
dtucker@openbsd.org [Fri, 6 Dec 2024 07:05:54 +0000 (07:05 +0000)] 
upstream: Expand $SSH to absolute path if it's not already.

Prevents problem later in increase_datafile_size if ssh is not in
the path.  Patch from quaresmajose via GHPR#510.

OpenBSD-Regress-ID: 2670a66af8b827410ca7139f0a89f4501cece77b

8 months agoupstream: Change "login again" to "log in again"
dtucker@openbsd.org [Fri, 6 Dec 2024 06:55:28 +0000 (06:55 +0000)] 
upstream: Change "login again" to "log in again"

in password change message.  From ThinLinc-Zeijlon via github PR#532.

OpenBSD-Commit-ID: fea5e9bc04caf613a118c419f16863733b340cf1

8 months agoupstream: catch up documentation: AES-GCM is preferred to AES-CTR
naddy@openbsd.org [Thu, 5 Dec 2024 22:45:03 +0000 (22:45 +0000)] 
upstream: catch up documentation: AES-GCM is preferred to AES-CTR

OpenBSD-Commit-ID: 63360924b6834507fe70020edb936f5075043a9e

8 months agoChange text from "login to" to "log in to".
Darren Tucker [Fri, 6 Dec 2024 06:56:17 +0000 (17:56 +1100)] 
Change text from "login to" to "log in to".

From ThinLinc-Zeijlon via GHPR#532.

8 months agoFix configure message typo in sk-libfido2 standalone.
Xavier Hsinyuan [Fri, 6 Dec 2024 03:56:34 +0000 (11:56 +0800)] 
Fix configure message typo in sk-libfido2 standalone.

8 months agoSkip 2038 key expiry test on 64 bit time_t systems.
Alexander Kanavin [Thu, 5 Dec 2024 15:26:46 +0000 (16:26 +0100)] 
Skip 2038 key expiry test on 64 bit time_t systems.

This allows testing Y2038 with system time set to after that (i.e. 2040),
so that actual Y2038 issues can be exposed, and not masked by key expiry
errors.

Signed-off-by: Alexander Kanavin <alex@linutronix.de>
8 months agoSkip 64bit expiry time test on 32bit time_t.
Darren Tucker [Thu, 5 Dec 2024 14:45:52 +0000 (01:45 +1100)] 
Skip 64bit expiry time test on 32bit time_t.

8 months agoupstream: Add key expiry test in the 64bit time_t range for additional
dtucker@openbsd.org [Thu, 5 Dec 2024 14:28:39 +0000 (14:28 +0000)] 
upstream: Add key expiry test in the 64bit time_t range for additional

coverage. From Alexander Kanavin via bz#3684.

OpenBSD-Regress-ID: bdf6eb3c2421f2e1e11483d03b34c7931d1bccf7

8 months agotypo
Damien Miller [Thu, 5 Dec 2024 08:24:56 +0000 (19:24 +1100)] 
typo

8 months agoadd a Makefile target for ssh-verify-attestation
Damien Miller [Wed, 4 Dec 2024 21:47:02 +0000 (08:47 +1100)] 
add a Makefile target for ssh-verify-attestation

Not built by default, but easier than doing it by hand

8 months agoupstream: De-magic the x11 base port number into a define. ok djm@
dtucker@openbsd.org [Thu, 5 Dec 2024 06:49:26 +0000 (06:49 +0000)] 
upstream: De-magic the x11 base port number into a define. ok djm@

OpenBSD-Commit-ID: 23b85ca9d222cb739b9c33ee5e4d6ac9fdeecbfa

8 months agoupstream: Prevent integer overflow in x11 port handling. These are
dtucker@openbsd.org [Thu, 5 Dec 2024 06:47:00 +0000 (06:47 +0000)] 
upstream: Prevent integer overflow in x11 port handling. These are

theoretically possible if the admin misconfigures X11DisplayOffset or the
user misconfigures their own $DISPLAY, but don't happen in normal operation.
From Suhov Roman via bz#3730, ok djm@

OpenBSD-Commit-ID: e9e3860f1a19b862ccf07dc8ecbe8f1e1034f4ed

8 months agoupstream: add a work-in-progress tool to verify FIDO attestation
djm@openbsd.org [Wed, 4 Dec 2024 16:42:49 +0000 (16:42 +0000)] 
upstream: add a work-in-progress tool to verify FIDO attestation

blobs that ssh-keygen can write when enrolling FIDO keys.

OpenBSD-Regress-ID: 6c97bf3f46e48866677ad69f54b77683eb92437f

8 months agoupstream: Don't assume existence of SK provider in test. Patch from
dtucker@openbsd.org [Wed, 4 Dec 2024 10:51:13 +0000 (10:51 +0000)] 
upstream: Don't assume existence of SK provider in test. Patch from

balu.gajjala at gmail via bz#3402.

OpenBSD-Regress-ID: d571932016d07d135b54433d07520b9e1901db43

8 months agoupstream: sync the list of options accepted by -o with ssh_config.5
djm@openbsd.org [Wed, 4 Dec 2024 14:37:55 +0000 (14:37 +0000)] 
upstream: sync the list of options accepted by -o with ssh_config.5

prompted by bz3455

OpenBSD-Commit-ID: 0ecbfa70aea6c769bcc259defe07182edf461f57

8 months agoupstream: don't screw up ssh-keygen -l output when the file
djm@openbsd.org [Wed, 4 Dec 2024 14:24:20 +0000 (14:24 +0000)] 
upstream: don't screw up ssh-keygen -l output when the file

contains CR characters; GHPR236 bz3385, fix from Dmitry Belyavskiy

OpenBSD-Commit-ID: e458cf6b0adcea5b69ef4c7ba38e590841d02ef4

8 months agoupstream: spelling; ok djm@
jsg@openbsd.org [Tue, 3 Dec 2024 22:30:03 +0000 (22:30 +0000)] 
upstream: spelling; ok djm@

OpenBSD-Commit-ID: c8ff3f70020451eef214e598117b7ce1a29853ef

8 months agoupstream: Remove fallback to compiled-in gropup for dhgex when the
dtucker@openbsd.org [Tue, 3 Dec 2024 16:27:53 +0000 (16:27 +0000)] 
upstream: Remove fallback to compiled-in gropup for dhgex when the

moduli file exists, but does not contain moduli within the client-requested
range. The fallback behaviour remains for the case where the moduli file does
not exist (typically, running tests prior to installing). From bz#2793, based
in part on patch from Joe Testa, ok djm@

OpenBSD-Commit-ID: b1a8c5dbbedf249b42474679ebaf14db7332b1ab