]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
djm@openbsd.org [Fri, 5 Jul 2019 04:55:40 +0000 (04:55 +0000)]
upstream: add a local implementation of BSD realpath() for
sftp-server use ahead of OpenBSD's realpath changing to match POSIX;
ok deraadt@ (thanks for snaps testing)
OpenBSD-Commit-ID:
4f8cbf7ed8679f6237264301d104ecec64885d55
Darren Tucker [Sat, 6 Jul 2019 03:13:57 +0000 (13:13 +1000)]
Add prototype for strnlen to prevent warnings.
Darren Tucker [Sat, 6 Jul 2019 03:02:34 +0000 (13:02 +1000)]
Cast *ID types to unsigned long when printing.
UID and GID types vary by platform so cast to u_long and use %lu when
printing them to prevent warnings.
Darren Tucker [Sat, 6 Jul 2019 02:54:43 +0000 (12:54 +1000)]
Add prototype for compat strndup.(bz#3032).
Darren Tucker [Sat, 6 Jul 2019 02:00:41 +0000 (12:00 +1000)]
Add missing bracket in EGD seeding code.
When configured --with-prngd-socket the code had a missing bracket after
an API change. Fix that and a couple of warnings. bz#3032 , from
ole.weidner at protonmail.ch
dtucker@openbsd.org [Fri, 5 Jul 2019 04:19:39 +0000 (04:19 +0000)]
upstream: Add (recently added) rsa_oldfmt to CLEANFILES.
OpenBSD-Regress-ID:
405beda94e32aa6cc9c80969152fab91f7c54bd3
dtucker@openbsd.org [Fri, 5 Jul 2019 04:12:46 +0000 (04:12 +0000)]
upstream: Adapt the PuTTY/Conch tests to new key names.
A recent regress change (
2a9b3a2ce411d16cda9c79ab713c55f65b0ec257 in
portable) broke the PuTTY and Twisted Conch interop tests, because the
key they want to use is now called ssh-rsa rather than rsa. Adapt the
tests to the new file names. bz#3020, patch from cjwatson at debian.org.
OpenBSD-Regress-ID:
fd342a37db4d55aa4ec85316f73082c8eb96e64e
dtucker@openbsd.org [Fri, 5 Jul 2019 04:03:13 +0000 (04:03 +0000)]
upstream: Add a sleep to allow forwards to come up.
Currently when the multiplex client requests a forward it returns
once the request has been sent but not necessarily when the forward
is up. This causes intermittent text failures due to this race,
so add some sleeps to mitigate this until we can fix it properly.
OpenBSD-Regress-ID:
384c7d209d2443d25ea941d7f677e932621fb253
Darren Tucker [Fri, 5 Jul 2019 04:58:57 +0000 (14:58 +1000)]
Remove nc stderr redirection to resync w/OpenBSD.
Darren Tucker [Fri, 5 Jul 2019 03:21:45 +0000 (13:21 +1000)]
Do not fatal on failed lookup of group "tty".
Some platforms (eg AIX and Cygwin) do not have a "tty" group. In those
cases we will fall back to making the tty device the user's primary
group, so do not fatal if the group lookup fails. ok djm@
deraadt@openbsd.org [Thu, 4 Jul 2019 16:20:10 +0000 (16:20 +0000)]
upstream: fatal() if getgrnam() cannot find "tty"
OpenBSD-Commit-ID:
d148c1c052fa0ed7d105b5428b5c1bab91630048
deraadt@openbsd.org [Thu, 4 Jul 2019 16:16:51 +0000 (16:16 +0000)]
upstream: stat() returns precisely -1 to indicate error
OpenBSD-Commit-ID:
668e8d022ed4ab847747214f64119e5865365fa1
deraadt@openbsd.org [Wed, 3 Jul 2019 03:24:02 +0000 (03:24 +0000)]
upstream: snprintf/vsnprintf return < 0 on error, rather than -1.
OpenBSD-Commit-ID:
a261c421140a0639bb2b66bbceca72bf8239749d
deraadt@openbsd.org [Fri, 28 Jun 2019 13:35:04 +0000 (13:35 +0000)]
upstream: When system calls indicate an error they return -1, not
some arbitrary value < 0. errno is only updated in this case. Change all
(most?) callers of syscalls to follow this better, and let's see if this
strictness helps us in the future.
OpenBSD-Commit-ID:
48081f00db7518e3b712a49dca06efc2a5428075
deraadt@openbsd.org [Fri, 28 Jun 2019 05:44:09 +0000 (05:44 +0000)]
upstream: asprintf returns -1, not an arbitrary value < 0. Also
upon error the (very sloppy specification) leaves an undefined value in *ret,
so it is wrong to inspect it, the error condition is enough. discussed a
little with nicm, and then much more with millert until we were exasperated
OpenBSD-Commit-ID:
29258fa51edf8115d244b9d4b84028487bf8923e
deraadt@openbsd.org [Fri, 28 Jun 2019 01:23:50 +0000 (01:23 +0000)]
upstream: oops, from asou
OpenBSD-Commit-ID:
702e765d1639b732370d8f003bb84a1c71c4d0c6
deraadt@openbsd.org [Thu, 27 Jun 2019 18:03:37 +0000 (18:03 +0000)]
upstream: Some asprintf() calls were checked < 0, rather than the
precise == -1. ok millert nicm tb, etc
OpenBSD-Commit-ID:
caecf8f57938685c04f125515b9f2806ad408d53
djm@openbsd.org [Thu, 27 Jun 2019 06:29:35 +0000 (06:29 +0000)]
upstream: fix NULL deference (bzero) on err
=?UTF-8?q?or=20path=
20added =20in=20last=20commit;=20spotted=20by=20Reynir?=
=?UTF-8?q?=20Bj=C3=B6rnsson?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
ok deraadt@ markus@ tb@
OpenBSD-Commit-ID:
b11b084bcc551b2c630560eb08618dd501027bbd
Jitendra Sharma [Fri, 21 Jun 2019 04:24:17 +0000 (09:54 +0530)]
Update README doc to include missing test cases
Readme regress document is missing various individual tests,
which are supported currently. Update README to
include those test cases.
dtucker@openbsd.org [Wed, 26 Jun 2019 22:29:43 +0000 (22:29 +0000)]
upstream: Remove unneeded unlink of xauthfile o
=?UTF-8?q?n=20error=20path.=20=20From=20Erik=20Sj=C3=B6lund=20via=20githu?=
=?UTF-8?q?b,=20ok=20djm@=20deraadt@?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
OpenBSD-Commit-ID:
62a4893cf83b29a4bbfedc40e7067c25c203e632
djm@openbsd.org [Sun, 23 Jun 2019 12:21:46 +0000 (12:21 +0000)]
upstream: fix mismatch proto/decl from key shielding change; spotted
via oss-fuzz
OpenBSD-Commit-ID:
1ea0ba05ded2c5557507bd844cd446e5c8b5b3b7
djm@openbsd.org [Fri, 21 Jun 2019 04:21:45 +0000 (04:21 +0000)]
upstream: adapt for key shielding API changes (const removal)
OpenBSD-Regress-ID:
298890bc52f0cd09dba76dc1022fabe89bc0ded6
djm@openbsd.org [Fri, 21 Jun 2019 04:21:04 +0000 (04:21 +0000)]
upstream: Add protection for private keys at rest in RAM against
speculation and memory sidechannel attacks like Spectre, Meltdown, Rowhammer
and Rambleed. This change encrypts private keys when they are not in use with
a symmetic key that is derived from a relatively large "prekey" consisting of
random data (currently 16KB).
Attackers must recover the entire prekey with high accuracy before
they can attempt to decrypt the shielded private key, but the current
generation of attacks have bit error rates that, when applied
cumulatively to the entire prekey, make this unlikely.
Implementation-wise, keys are encrypted "shielded" when loaded and then
automatically and transparently unshielded when used for signatures or
when being saved/serialised.
Hopefully we can remove this in a few years time when computer
architecture has become less unsafe.
been in snaps for a bit already; thanks deraadt@
ok dtucker@ deraadt@
OpenBSD-Commit-ID:
19767213c312e46f94b303a512ef8e9218a39bd4
djm@openbsd.org [Fri, 21 Jun 2019 03:19:59 +0000 (03:19 +0000)]
upstream: print the correct AuthorizedPrincipalsCommand rather than
an uninitialised variable; spotted by dtucker@
OpenBSD-Commit-ID:
02802018784250f68202f01c8561de82e17b0638
jmc@openbsd.org [Wed, 19 Jun 2019 20:12:44 +0000 (20:12 +0000)]
upstream: from tim: - for reput, it is remote-path which is
optional, not local-path - sync help
from deraadt:
- prefer -R and undocument -r (but add a comment for future editors)
from schwarze:
- prefer -p and undocument -P (as above. the comment was schwarze's too)
more:
- add the -f flag to reput and reget
- sort help (i can;t remember who suggested this originally)
djm and deraadt were ok with earlier versions of this;
tim and schwarze ok
OpenBSD-Commit-ID:
3c699b53b46111f5c57eed4533f132e7e58bacdd
djm@openbsd.org [Fri, 14 Jun 2019 04:03:48 +0000 (04:03 +0000)]
upstream: check for convtime() refusing to accept times that
resolve to LONG_MAX Reported by Kirk Wolf bz2977; ok dtucker
OpenBSD-Regress-ID:
15c9fe87be1ec241d24707006a31123d3a3117e0
dtucker@openbsd.org [Sun, 28 Apr 2019 22:53:26 +0000 (22:53 +0000)]
upstream: Add unit tests for user@host and URI parsing.
OpenBSD-Regress-ID:
69d5b6f278e04ed32377046f7692c714c2d07a68
dtucker@openbsd.org [Thu, 18 Apr 2019 18:57:16 +0000 (18:57 +0000)]
upstream: Add tests for sshd -T -C with Match.
OpenBSD-Regress-ID:
d4c34916fe20d717692f10ef50b5ae5a271c12c7
Darren Tucker [Sun, 16 Jun 2019 02:55:27 +0000 (12:55 +1000)]
Include stdio.h for vsnprintf.
Patch from mforney at mforney.org.
Darren Tucker [Fri, 7 Jun 2019 23:07:04 +0000 (09:07 +1000)]
upstream rev 1.27: fix integer overflow.
Cast bitcount to u_in64_t before bit shifting to prevent integer overflow
on 32bit platforms which cause incorrect results when adding a block
>=512M in size. sha1 patch from ante84 at gmail.com via openssh github,
sha2 with djm@, ok tedu@
Darren Tucker [Fri, 7 Jun 2019 23:06:06 +0000 (09:06 +1000)]
upstream rev 1.25: add DEF_WEAK.
Wrap blowfish, sha*, md5, and rmd160 so that internal calls go direct
ok deraadt@
Darren Tucker [Fri, 7 Jun 2019 23:02:24 +0000 (09:02 +1000)]
upstream rev 1.25: add sys/types.h
Darren Tucker [Fri, 7 Jun 2019 23:01:14 +0000 (09:01 +1000)]
upstream: Use explicit_bzero instead of memset
in hash Final and End functions. OK deraadt@ djm@
djm@openbsd.org [Fri, 14 Jun 2019 04:13:58 +0000 (04:13 +0000)]
upstream: slightly more instructive error message when the user
specifies multiple -J options on the commandline. bz3015 ok dtucker@
OpenBSD-Commit-ID:
181c15a65cac3b575819bc8d9a56212c3c748179
djm@openbsd.org [Fri, 14 Jun 2019 03:51:47 +0000 (03:51 +0000)]
upstream: process agent requests for RSA certificate private keys using
correct signature algorithm when requested. Patch from Jakub Jelen in bz3016
ok dtucker markus
OpenBSD-Commit-ID:
61f86efbeb4a1857a3e91298c1ccc6cf49b79624
djm@openbsd.org [Fri, 14 Jun 2019 03:39:59 +0000 (03:39 +0000)]
upstream: for public key authentication, check AuthorizedKeysFiles
files before consulting AuthorizedKeysCommand; ok dtucker markus
OpenBSD-Commit-ID:
13652998bea5cb93668999c39c3c48e8429db8b3
djm@openbsd.org [Fri, 14 Jun 2019 03:28:19 +0000 (03:28 +0000)]
upstream: if passed a bad fd, log what it was
OpenBSD-Commit-ID:
582e2bd05854e49365195b58989b68ac67f09140
jmc@openbsd.org [Wed, 12 Jun 2019 11:31:50 +0000 (11:31 +0000)]
upstream: Hostname->HostName cleanup; from lauri tirkkonen ok
dtucker
OpenBSD-Commit-ID:
4ade73629ede63b691f36f9a929f943d4e7a44e4
jmc@openbsd.org [Wed, 12 Jun 2019 05:53:21 +0000 (05:53 +0000)]
upstream: deraadt noticed some inconsistency in the way we denote
the "Hostname" and "X11UseLocalhost" keywords; this makes things consistent
(effectively reversing my commit of yesterday);
ok deraadt markus djm
OpenBSD-Commit-ID:
255c02adb29186ac91dcf47dfad7adb1b1e54667
jmc@openbsd.org [Tue, 11 Jun 2019 13:39:40 +0000 (13:39 +0000)]
upstream: consistent lettering for "HostName" keyword; from lauri
tirkkonen
OpenBSD-Commit-ID:
0c267a1257ed7482b13ef550837b6496e657d563
Darren Tucker [Fri, 7 Jun 2019 14:10:59 +0000 (00:10 +1000)]
Typo fixes in error messages.
Patch from knweiss at gmail.com via github pull req #97 (portable-
specific parts).
dtucker@openbsd.org [Fri, 7 Jun 2019 14:18:48 +0000 (14:18 +0000)]
upstream: Typo and spelling fixes in comments and error messages.
Patch from knweiss at gmail.com via -portable.
OpenBSD-Commit-ID:
2577465442f761a39703762c4f87a8dfcb918b4b
Darren Tucker [Fri, 7 Jun 2019 14:47:07 +0000 (00:47 +1000)]
Include missed bits from previous sync.
dtucker@openbsd.org [Fri, 7 Jun 2019 03:47:12 +0000 (03:47 +0000)]
upstream: Check for user@host when parsing sftp target. This
allows user@[1.2.3.4] to work without a path in addition to with one.
bz#2999, ok djm@
OpenBSD-Commit-ID:
d989217110932490ba8ce92127a9a6838878928b
otto@openbsd.org [Thu, 6 Jun 2019 05:13:13 +0000 (05:13 +0000)]
upstream: Replace calls to ssh_malloc_init() by a static init of
malloc_options. Prepares for changes in the way malloc is initialized. ok
guenther@ dtucker@
OpenBSD-Commit-ID:
154f4e3e174f614b09f792d4d06575e08de58a6b
djm@openbsd.org [Fri, 31 May 2019 03:20:07 +0000 (03:20 +0000)]
upstream: fix ssh-keysign fd handling problem introduced in r1.304
caused by a typo (STDIN_FILENO vs STDERR_FILENO)
OpenBSD-Commit-ID:
57a0b4be7bef23963afe24150e24bf014fdd9cb0
lum@openbsd.org [Wed, 29 May 2019 08:30:26 +0000 (08:30 +0000)]
upstream: Make the standard output messages of both methods of
changing a key pair's comments (using -c and -C) more applicable to both
methods. ok and suggestions djm@ dtucker@
OpenBSD-Commit-ID:
b379338118109eb36e14a65bc0a12735205b3de6
Darren Tucker [Fri, 7 Jun 2019 14:03:07 +0000 (00:03 +1000)]
Always clean up before and after utimensat test.
Darren Tucker [Fri, 7 Jun 2019 13:47:37 +0000 (23:47 +1000)]
Update utimensat test.
POSIX specifies that when given a symlink, AT_SYMLINK_NOFOLLOW should
update the symlink and not the destination. The compat code doesn't
have a way to do this, so where possible it fails instead of following a
symlink when explicitly asked not to. Instead of checking for an explicit
failure, check that it does not update the destination, which both the
real and compat implmentations should honour.
Inspired by github pull req #125 from chutzpah at gentoo.org.
Darren Tucker [Fri, 7 Jun 2019 04:26:54 +0000 (14:26 +1000)]
Have pthread_create return errno on failure.
According to POSIX, pthread_create returns the failure reason in
the non-zero function return code so make the fork wrapper do that.
Matches previous change.
Elliott Hughes [Thu, 25 Apr 2019 20:36:27 +0000 (13:36 -0700)]
pthread_create(3) returns positive values on failure.
Found by inspection after finding similar bugs in other code used by
Android.
Harald Freudenberger [Fri, 24 May 2019 08:11:15 +0000 (10:11 +0200)]
allow s390 specific ioctl for ecc hardware support
Adding another s390 specific ioctl to be able to support ECC hardware
acceleration to the sandbox seccomp filter rules.
Now the ibmca openssl engine provides elliptic curve cryptography
support with the help of libica and CCA crypto cards. This is done via
jet another ioctl call to the zcrypt device driver and so there is a
need to enable this on the openssl sandbox.
Code is s390 specific and has been tested, verified and reviewed.
Please note that I am also the originator of the previous changes in
that area. I posted these changes to Eduardo and he forwarded the
patches to the openssl community.
Signed-off-by: Harald Freudenberger <freude@linux.ibm.com>
Reviewed-by: Joerg Schmidbauer <jschmidb@de.ibm.com>
Sorin Adrian Savu [Sun, 26 May 2019 18:50:08 +0000 (21:50 +0300)]
openssl-devel is obsoleted by libssl-devel
openssl-devel is no longer installable via the cygwin setup and
it's hidden by default, so you can't see the replacement very easy.
jmc@openbsd.org [Mon, 20 May 2019 06:01:59 +0000 (06:01 +0000)]
upstream: tweak previous;
OpenBSD-Commit-ID:
42f39f22f53cfcb913bce401ae0f1bb93e08dd6c
djm@openbsd.org [Mon, 20 May 2019 00:25:55 +0000 (00:25 +0000)]
upstream: embiggen format buffer size for certificate serial number so
that it will fit a full 64 bit integer. bz#3012 from Manoel Domingues Junior
OpenBSD-Commit-ID:
a51f3013056d05b976e5af6b978dcb9e27bbc12b
djm@openbsd.org [Mon, 20 May 2019 00:20:35 +0000 (00:20 +0000)]
upstream: When signing certificates with an RSA key, default to
using the rsa-sha2-512 signature algorithm. Certificates signed by RSA keys
will therefore be incompatible with OpenSSH < 7.2 unless the default is
overridden.
Document the ability of the ssh-keygen -t flag to override the
signature algorithm when signing certificates, and the new default.
ok deraadt@
OpenBSD-Commit-ID:
400c9c15013978204c2cb80f294b03ae4cfc8b95
Darren Tucker [Fri, 17 May 2019 03:14:12 +0000 (13:14 +1000)]
Add no-op implementation of pam_putenv.
Some platforms such as HP-UX do not have pam_putenv. Currently the
calls are ifdef'ed out, but a new one was recently added. Remove the
ifdefs and add a no-op implementation. bz#3008, ok djm.
Darren Tucker [Fri, 17 May 2019 02:42:17 +0000 (12:42 +1000)]
Use the correct macro for SSH_ALLOWED_CA_SIGALGS.
Darren Tucker [Fri, 17 May 2019 00:54:51 +0000 (10:54 +1000)]
Fix building w/out ECC.
Ifdef out ECC specific code so that that it'll build against an OpenSSL
configured w/out ECC. With & ok djm@
Darren Tucker [Fri, 17 May 2019 00:50:29 +0000 (10:50 +1000)]
Conditionalize ECDH methods in CA algos.
When building against an OpenSSL configured without ECC, don't include
those algos in CASignatureAlgorithms. ok djm@
dtucker@openbsd.org [Thu, 16 May 2019 08:47:27 +0000 (08:47 +0000)]
upstream: Move a variable declaration to the block where it's used
to make things a little tidier for -portable.
OpenBSD-Commit-ID:
616379861be95619e5358768b7dee4793e2f3a75
deraadt@openbsd.org [Wed, 15 May 2019 04:43:31 +0000 (04:43 +0000)]
upstream: When doing the fork+exec'ing for ssh-keysign, rearrange
the socket into fd3, so as to not mistakenly leak other fd forward
accidentally. ok djm
OpenBSD-Commit-ID:
24cc753f5aa2c6a7d0fbf62766adbc75cd785296
schwarze@openbsd.org [Tue, 14 May 2019 12:47:17 +0000 (12:47 +0000)]
upstream: Delete some .Sx macros that were used in a wrong way.
Part of a patch from Stephen Gregoratto <dev at sgregoratto dot me>.
OpenBSD-Commit-ID:
15501ed13c595f135e7610b1a5d8345ccdb513b7
florian@openbsd.org [Fri, 10 May 2019 18:55:17 +0000 (18:55 +0000)]
upstream: For PermitOpen violations add the remote host and port to
be able to find out from where the request was comming.
Add the same logging for PermitListen violations which where not
logged at all.
Pointed out by Robert Kisteleki (robert AT ripe.net)
input markus
OK deraadt
OpenBSD-Commit-ID:
8a7d0f1b7175504c0d1dca8d9aca1588b66448c8
Darren Tucker [Wed, 15 May 2019 21:53:20 +0000 (07:53 +1000)]
Add OpenSSL 1.1.1 to the supported list.
Clarify the language around prngd and egd.
Darren Tucker [Wed, 15 May 2019 06:19:14 +0000 (16:19 +1000)]
Fix typo in man page formatter selector.
Darren Tucker [Fri, 10 May 2019 05:04:42 +0000 (15:04 +1000)]
Use "doc" man page format if mandoc present.
Previously configure would not select the "doc" man page format if
mandoc was present but nroff was not. This checks for mandoc first
and removes a now-superflous AC_PATH_PROG. Based on a patch from
vehk at vehk.de and feedback from schwarze at usta.de.
dtucker@openbsd.org [Fri, 3 May 2019 06:06:30 +0000 (06:06 +0000)]
upstream: Use the correct (according to POSIX) format for
left-justification in snmprintf. bz#3002, patch from velemas at gmail.com, ok
markus@.
OpenBSD-Commit-ID:
65d252b799be0cc8f68b6c47cece0a57bb00fea7
dtucker@openbsd.org [Fri, 3 May 2019 04:11:00 +0000 (04:11 +0000)]
upstream: Free channel objects on exit path. Patch from markus at
blueflash.cc, ok deraadt
OpenBSD-Commit-ID:
dbe4db381603909482211ffdd2b48abd72169117
dtucker@openbsd.org [Fri, 3 May 2019 03:27:38 +0000 (03:27 +0000)]
upstream: Free host on exit path. Patch from markus at
blueflash.cc, ok djm@
OpenBSD-Commit-ID:
c54e9945d93c4ce28350d8b9fa8b71f744ef2b5a
dtucker@openbsd.org [Fri, 3 May 2019 03:25:18 +0000 (03:25 +0000)]
upstream: Wrap XMSS including in ifdef. Patch from markus at
blueflash.cc, ok djm
OpenBSD-Commit-ID:
e3b34fc35cf12d33bde91ac03633210a3bc0f8b5
dtucker@openbsd.org [Fri, 26 Apr 2019 08:37:17 +0000 (08:37 +0000)]
upstream: Import regenerated moduli.
OpenBSD-Commit-ID:
db6375fc302e3bdf07d96430c63c991b2c2bd3ff
dtucker@openbsd.org [Tue, 23 Apr 2019 11:56:41 +0000 (11:56 +0000)]
upstream: Use the LogLevel typdef instead of int where appropriate. Patch from Markus Schmidt via openssh-unix-dev, ok markus@
OpenBSD-Commit-ID:
4c0f0f458e3da7807806b35e3eb5c1e8403c968a
dtucker@openbsd.org [Fri, 19 Apr 2019 05:47:44 +0000 (05:47 +0000)]
upstream: Document new default RSA key size. From
sebastiaanlokhorst at gmail.com via bz#2997.
OpenBSD-Commit-ID:
bdd62ff5d4d649d2147904e91bf7cefa82fe11e1
dtucker@openbsd.org [Thu, 18 Apr 2019 18:56:16 +0000 (18:56 +0000)]
upstream: When running sshd -T, assume any attibute not provided by
-C does not match, which allows it to work when sshd_config contains a Match
directive with or without -C. bz#2858, ok djm@
OpenBSD-Commit-ID:
1a701f0a33e3bc96753cfda2fe0b0378520b82eb
dtucker@openbsd.org [Thu, 18 Apr 2019 07:32:56 +0000 (07:32 +0000)]
upstream: Remove crc32.{c,h} which were only used by the now-gone
SSH1 protocol. Patch from yumkam at gmail.com, ok deraadt.
OpenBSD-Commit-ID:
cceda5876c5ba6b4d8abcd52335329198cee3240
Darren Tucker [Tue, 30 Apr 2019 02:27:57 +0000 (12:27 +1000)]
Remove unused variables from RLIMIT_NOFILE test.
Darren Tucker [Fri, 26 Apr 2019 08:38:27 +0000 (18:38 +1000)]
Import regenerated moduli.
Darren Tucker [Fri, 26 Apr 2019 08:22:10 +0000 (18:22 +1000)]
Whitespace resync w/OpenBSD.
Patch from markus at blueflash.cc via openssh-unix-dev.
Darren Tucker [Fri, 26 Apr 2019 08:06:34 +0000 (18:06 +1000)]
Don't install duplicate STREAMS modules on Solaris
Check if STREAMS modules are already installed on pty before installing
since when compiling with XPG>=4 they will likely be installed already.
Prevents hangs and duplicate lines on the terminal. bz#2945 and bz#2998,
patch from djm@
Damien Miller [Wed, 17 Apr 2019 22:52:57 +0000 (08:52 +1000)]
makedepend
Damien Miller [Fri, 5 Apr 2019 18:29:51 +0000 (11:29 -0700)]
second thoughts: leave README in place
A number of contrib/* files refer to the existing README so let's leave
it in place for release and add the new markdown version in parallel.
I'll get rid of README after release.
Damien Miller [Fri, 5 Apr 2019 18:29:31 +0000 (11:29 -0700)]
Revert "rewrite README"
This reverts commit
9444d82678cb7781820da4d1c23b3c2b9fb1e12f .
Damien Miller [Fri, 5 Apr 2019 18:21:48 +0000 (11:21 -0700)]
rewrite README
Include basic build instructions and comments on commonly-used build-
time flags, links to the manual pages and other resources.
Now in Markdown format for better viewing on github, etc.
Damien Miller [Thu, 4 Apr 2019 16:41:52 +0000 (03:41 +1100)]
update versions
djm@openbsd.org [Wed, 3 Apr 2019 15:48:45 +0000 (15:48 +0000)]
upstream: openssh-8.0
OpenBSD-Commit-ID:
5aafdf218679dab982fea20771afd643be9a127b
Damien Miller [Wed, 3 Apr 2019 15:47:40 +0000 (02:47 +1100)]
session: Do not use removed API
from Jakub Jelen
djm@openbsd.org [Fri, 29 Mar 2019 11:31:40 +0000 (11:31 +0000)]
upstream: when logging/fataling on error, include a bit more detail
than just the function name and the error message
OpenBSD-Commit-ID:
dd72d7eba2215fcb89be516c378f633ea5bcca9f
Darren Tucker [Tue, 2 Apr 2019 19:27:45 +0000 (06:27 +1100)]
Remove "struct ssh" from sys_auth_record_login.
It's not needed, and is not available from the call site in loginrec.c
Should only affect AIX, spotted by Kevin Brott.
Darren Tucker [Tue, 2 Apr 2019 07:21:35 +0000 (18:21 +1100)]
Adapt custom_failed_login to new prototype.
Spotted by Kevin Brott.
Darren Tucker [Mon, 1 Apr 2019 09:07:23 +0000 (20:07 +1100)]
Add includes.h for compat layer.
Should fix build on AIX 7.2.
Tim Rice [Mon, 1 Apr 2019 05:14:22 +0000 (22:14 -0700)]
Stop USL compilers for erroring with "integral constant expression expected"
Tim Rice [Mon, 1 Apr 2019 02:22:19 +0000 (19:22 -0700)]
Only use O_NOFOLLOW in fchownat and fchmodat if defined
Jakub Jelen [Fri, 29 Mar 2019 11:29:41 +0000 (12:29 +0100)]
Adjust softhsm2 path on Fedora Linux for regress
The SoftHSM lives in Fedora in /usr/lib64/pkcs11/libsofthsm2.so
Darren Tucker [Wed, 27 Mar 2019 22:26:14 +0000 (09:26 +1100)]
Only use O_NOFOLLOW in utimensat if defined.
Fixes build on systems that don't have it (Solaris <=9) Found by
Tom G. Christensen.
Corinna Vinschen [Wed, 27 Mar 2019 17:18:21 +0000 (18:18 +0100)]
drop old Cygwin considerations
- Cygwin supports non-DOS characters in filenames
- Cygwin does not support Windows XP anymore
Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
djm@openbsd.org [Wed, 27 Mar 2019 09:29:14 +0000 (09:29 +0000)]
upstream: fix interaction between ClientAliveInterval and RekeyLimit
that could cause connection to close incorrectly; Report and patch from Jakub
Jelen in bz#2757; ok dtucker@ markus@
OpenBSD-Commit-ID:
17229a8a65bd8e6c2080318ec2b7a61e1aede3fb
djm@openbsd.org [Mon, 25 Mar 2019 22:34:52 +0000 (22:34 +0000)]
upstream: Fix authentication failures when "AuthenticationMethods
any" in a Match block overrides a more restrictive global default.
Spotted by jmc@, ok markus@
OpenBSD-Commit-ID:
a90a4fe2ab81d0eeeb8fdfc21af81f7eabda6666
djm@openbsd.org [Mon, 25 Mar 2019 22:33:44 +0000 (22:33 +0000)]
upstream: whitespace
OpenBSD-Commit-ID:
106e853ae8a477e8385bc53824d3884a8159db07
dtucker@openbsd.org [Mon, 25 Mar 2019 16:19:44 +0000 (16:19 +0000)]
upstream: Expand comment to document rationale for default key
sizes. "seems worthwhile" deraadt.
OpenBSD-Commit-ID:
72e5c0983d7da1fb72f191870f36cb58263a2456