]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
djm@openbsd.org [Wed, 26 Sep 2018 07:32:44 +0000 (07:32 +0000)]
upstream: remove big ugly TODO comment from start of file. Some of
the mentioned tasks are obsolete and, of the remainder, most are already
captured in PROTOCOL.mux where they better belong
OpenBSD-Commit-ID:
16d9d76dee42a5bb651c9d6740f7f0ef68aeb407
djm@openbsd.org [Wed, 26 Sep 2018 07:30:05 +0000 (07:30 +0000)]
upstream: Document mux proxy mode; added by Markus in openssh-7.4
Also add a little bit of information about the overall packet format
OpenBSD-Commit-ID:
bdb6f6ea8580ef96792e270cae7857786ad84a95
djm@openbsd.org [Wed, 26 Sep 2018 01:48:57 +0000 (01:48 +0000)]
upstream: s/process_mux_master/mux_master_process/ in mux master
function names,
Gives better symmetry with the existing mux_client_*() names and makes
it more obvious when a message comes from the master vs client (they
are interleved in ControlMaster=auto mode).
no functional change beyond prefixing a could of log messages with
__func__ where they were previously lacking.
OpenBSD-Commit-ID:
b01f7c3fdf92692e1713a822a89dc499333daf75
Darren Tucker [Sat, 22 Sep 2018 04:41:24 +0000 (14:41 +1000)]
Remove unused variable in _ssh_compat_fflush.
Darren Tucker [Thu, 20 Sep 2018 08:08:43 +0000 (18:08 +1000)]
Import updated moduli.
djm@openbsd.org [Fri, 21 Sep 2018 12:46:22 +0000 (12:46 +0000)]
upstream: Allow ssh_config ForwardX11Timeout=0 to disable the
timeout and allow X11 connections in untrusted mode indefinitely. ok dtucker@
OpenBSD-Commit-ID:
ea1ceed3f540b48e5803f933e59a03b20db10c69
djm@openbsd.org [Fri, 21 Sep 2018 12:23:17 +0000 (12:23 +0000)]
upstream: when compiled with GSSAPI support, cache supported method
OIDs by calling ssh_gssapi_prepare_supported_oids() regardless of whether
GSSAPI authentication is enabled in the main config.
This avoids sandbox violations for configurations that enable GSSAPI
auth later, e.g.
Match user djm
GSSAPIAuthentication yes
bz#2107; ok dtucker@
OpenBSD-Commit-ID:
a5dd42d87c74e27cfb712b15b0f97ab20e0afd1d
djm@openbsd.org [Fri, 21 Sep 2018 12:20:12 +0000 (12:20 +0000)]
upstream: In sshkey_in_file(), ignore keys that are considered for
being too short (i.e. SSH_ERR_KEY_LENGTH). These keys will not be considered
to be "in the file". This allows key revocation lists to contain short keys
without the entire revocation list being considered invalid.
bz#2897; ok dtucker
OpenBSD-Commit-ID:
d9f3d857d07194a42ad7e62889a74dc3f9d9924b
djm@openbsd.org [Fri, 21 Sep 2018 03:11:36 +0000 (03:11 +0000)]
upstream: Treat connections with ProxyJump specified the same as ones
with a ProxyCommand set with regards to hostname canonicalisation (i.e. don't
try to canonicalise the hostname unless CanonicalizeHostname is set to
'always').
Patch from Sven Wegener via bz#2896
OpenBSD-Commit-ID:
527ff501cf98bf65fb4b29ed0cb847dda10f4d37
djm@openbsd.org [Thu, 20 Sep 2018 23:40:16 +0000 (23:40 +0000)]
upstream: actually make CASignatureAlgorithms available as a config
option
OpenBSD-Commit-ID:
93fa7ff58314ed7b1ab7744090a6a91232e6ae52
dtucker@openbsd.org [Thu, 20 Sep 2018 08:07:03 +0000 (08:07 +0000)]
upstream: Import updated moduli.
OpenBSD-Commit-ID:
04431e8e7872f49a2129bf080a6b73c19d576d40
jmc@openbsd.org [Thu, 20 Sep 2018 06:58:48 +0000 (06:58 +0000)]
upstream: reorder CASignatureAlgorithms, and add them to the
various -o lists; ok djm
OpenBSD-Commit-ID:
ecb88baecc3c54988b4d1654446ea033da359288
djm@openbsd.org [Thu, 20 Sep 2018 03:31:49 +0000 (03:31 +0000)]
upstream: fix "ssh -Q sig" to show correct signature algorithm list
(it was erroneously showing certificate algorithms); prompted by markus@
OpenBSD-Commit-ID:
1cdee002f2f0c21456979deeb887fc889afb154d
djm@openbsd.org [Thu, 20 Sep 2018 03:30:44 +0000 (03:30 +0000)]
upstream: add CASignatureAlgorithms option for the client, allowing
it to specify which signature algorithms may be used by CAs when signing
certificates. Useful if you want to ban RSA/SHA1; ok markus@
OpenBSD-Commit-ID:
9159e5e9f67504829bf53ff222057307a6e3230f
djm@openbsd.org [Thu, 20 Sep 2018 03:28:06 +0000 (03:28 +0000)]
upstream: Add sshd_config CASignatureAlgorithms option to allow
control over which signature algorithms a CA may use when signing
certificates. In particular, this allows a sshd to ban certificates signed
with RSA/SHA1.
ok markus@
OpenBSD-Commit-ID:
b05c86ef8b52b913ed48d54a9b9c1a7714d96bac
djm@openbsd.org [Wed, 19 Sep 2018 02:03:02 +0000 (02:03 +0000)]
upstream: Make "ssh-add -q" do what it says on the tin: silence
output from successful operations.
Based on patch from Thijs van Dijk; ok dtucker@ deraadt@
OpenBSD-Commit-ID:
c4f754ecc055c10af166116ce7515104aa8522e1
millert@openbsd.org [Mon, 17 Sep 2018 15:40:14 +0000 (15:40 +0000)]
upstream: When choosing a prime from the moduli file, avoid
re-using the linenum variable for something that is not a line number to
avoid the confusion that resulted in the bug in rev. 1.64. This also lets us
pass the actual linenum to parse_prime() so the error messages include the
correct line number. OK markus@ some time ago.
OpenBSD-Commit-ID:
4d8e5d3e924d6e8eb70053e3defa23c151a00084
Darren Tucker [Sat, 15 Sep 2018 09:44:06 +0000 (19:44 +1000)]
Fix openssl-1.1 fallout for --without-openssl.
ok djm@
Damien Miller [Sat, 15 Sep 2018 09:37:48 +0000 (19:37 +1000)]
add futex(2) syscall to seccomp sandbox
Apparently needed for some glibc/openssl combinations.
Patch from Arkadiusz MiĆkiewicz
Damien Miller [Sat, 15 Sep 2018 09:36:55 +0000 (19:36 +1000)]
really add source for authopt_fuzz this time
Damien Miller [Sat, 15 Sep 2018 09:35:40 +0000 (19:35 +1000)]
remove accidentally checked-in authopt_fuzz binary
djm@openbsd.org [Fri, 14 Sep 2018 05:26:27 +0000 (05:26 +0000)]
upstream: second try, deals properly with missing and private-only
Use consistent format in debug log for keys readied, offered and
received during public key authentication.
This makes it a little easier to see what is going on, as each message
now contains (where available) the key filename, its type and fingerprint,
and whether the key is hosted in an agent or a token.
OpenBSD-Commit-ID:
f1c6a8e9cfc4e108c359db77f24f9a40e1e25ea7
Damien Miller [Fri, 14 Sep 2018 05:16:34 +0000 (15:16 +1000)]
fuzzer harness for authorized_keys option parsing
djm@openbsd.org [Fri, 14 Sep 2018 04:44:04 +0000 (04:44 +0000)]
upstream: revert following; deals badly with agent keys
revision 1.285
date: 2018/09/14 04:17:12; author: djm; state: Exp; lines: +47 -26; commitid: lflGFcNb2X2HebaK;
Use consistent format in debug log for keys readied, offered and
received during public key authentication.
This makes it a little easier to see what is going on, as each message
now contains the key filename, its type and fingerprint, and whether
the key is hosted in an agent or a token.
OpenBSD-Commit-ID:
e496bd004e452d4b051f33ed9ae6a54ab918f56d
djm@openbsd.org [Fri, 14 Sep 2018 04:17:44 +0000 (04:17 +0000)]
upstream: garbage-collect moribund ssh_new_private() API.
OpenBSD-Commit-ID:
7c05bf13b094093dfa01848a9306c82eb6e95f6c
djm@openbsd.org [Fri, 14 Sep 2018 04:17:12 +0000 (04:17 +0000)]
upstream: Use consistent format in debug log for keys readied,
offered and received during public key authentication.
This makes it a little easier to see what is going on, as each message
now contains the key filename, its type and fingerprint, and whether
the key is hosted in an agent or a token.
OpenBSD-Commit-ID:
2a01d59285a8a7e01185bb0a43316084b4f06a1f
millert@openbsd.org [Thu, 13 Sep 2018 15:23:32 +0000 (15:23 +0000)]
upstream: Fix warnings caused by user_from_uid() and group_from_gid()
now returning const char *.
OpenBSD-Commit-ID:
b5fe571ea77cfa7b9035062829ab05eb87d7cc6f
Damien Miller [Fri, 14 Sep 2018 00:31:47 +0000 (10:31 +1000)]
allow SIGUSR1 as synonym for SIGINFO
Lets users on those unfortunate operating systems that lack SIGINFO
still be able to obtain progress information from unit tests :)
Damien Miller [Thu, 13 Sep 2018 09:05:48 +0000 (19:05 +1000)]
add compat header
djm@openbsd.org [Thu, 13 Sep 2018 09:03:20 +0000 (09:03 +0000)]
upstream: missed a bit of openssl-1.0.x API in this unittest
OpenBSD-Regress-ID:
a73a54d7f7381856a3f3a2d25947bee7a9a5dbc9
djm@openbsd.org [Thu, 13 Sep 2018 05:06:51 +0000 (05:06 +0000)]
upstream: use only openssl-1.1.x API here too
OpenBSD-Regress-ID:
ae877064597c349954b1b443769723563cecbc8f
Damien Miller [Thu, 13 Sep 2018 02:13:50 +0000 (12:13 +1000)]
adapt -portable to OpenSSL 1.1x API
Polyfill missing API with replacement functions extracted from LibreSSL
Damien Miller [Thu, 13 Sep 2018 02:12:42 +0000 (12:12 +1000)]
forgot to stage these test files in commit
d70d061
djm@openbsd.org [Thu, 13 Sep 2018 02:08:33 +0000 (02:08 +0000)]
upstream: hold our collective noses and use the openssl-1.1.x API in
OpenSSH; feedback and ok tb@ jsing@ markus@
OpenBSD-Commit-ID:
cacbcac87ce5da0d3ca7ef1b38a6f7fb349e4417
djm@openbsd.org [Wed, 12 Sep 2018 01:36:45 +0000 (01:36 +0000)]
upstream: Include certs with multiple RSA signature variants in
test data Ensure that cert->signature_key is populated correctly
OpenBSD-Regress-ID:
56e68f70fe46cb3a193ca207385bdb301fd6603a
djm@openbsd.org [Wed, 12 Sep 2018 01:23:48 +0000 (01:23 +0000)]
upstream: test revocation by explicit hash and by fingerprint
OpenBSD-Regress-ID:
079c18a9ab9663f4af419327c759fc1e2bc78fd8
djm@openbsd.org [Wed, 12 Sep 2018 01:22:43 +0000 (01:22 +0000)]
upstream: s/sshkey_demote/sshkey_from_private/g
OpenBSD-Regress-ID:
782bde7407d94a87aa8d1db7c23750e09d4443c4
Damien Miller [Wed, 12 Sep 2018 06:50:01 +0000 (16:50 +1000)]
delete the correct thing; kexfuzz binary
djm@openbsd.org [Wed, 12 Sep 2018 06:18:59 +0000 (06:18 +0000)]
upstream: fix edit mistake; spotted by jmc@
OpenBSD-Commit-ID:
dd724e1c52c9d6084f4cd260ec7e1b2b138261c6
djm@openbsd.org [Wed, 12 Sep 2018 01:34:02 +0000 (01:34 +0000)]
upstream: add SSH_ALLOWED_CA_SIGALGS - the default list of
signature algorithms that are allowed for CA signatures. Notably excludes
ssh-dsa.
ok markus@
OpenBSD-Commit-ID:
1628e4181dc8ab71909378eafe5d06159a22deb4
djm@openbsd.org [Wed, 12 Sep 2018 01:32:54 +0000 (01:32 +0000)]
upstream: add sshkey_check_cert_sigtype() that checks a
cert->signature_type against a supplied whitelist; ok markus
OpenBSD-Commit-ID:
caadb8073292ed7a9535e5adc067d11d356d9302
djm@openbsd.org [Wed, 12 Sep 2018 01:31:30 +0000 (01:31 +0000)]
upstream: add cert->signature_type field and keep it in sync with
certificate signature wrt loading and certification operations; ok markus@
OpenBSD-Commit-ID:
e8b8b9f76b66707a0cd926109c4383db8f664df3
djm@openbsd.org [Wed, 12 Sep 2018 01:30:10 +0000 (01:30 +0000)]
upstream: Add "ssh -Q sig" to allow listing supported signature
algorithms ok markus@
OpenBSD-Commit-ID:
7a8c6eb6c249dc37823ba5081fce64876d10fe2b
djm@openbsd.org [Wed, 12 Sep 2018 01:21:34 +0000 (01:21 +0000)]
upstream: allow key revocation by SHA256 hash and allow ssh-keygen
to create KRLs using SHA256/base64 key fingerprints; ok markus@
OpenBSD-Commit-ID:
a0590fd34e7f1141f2873ab3acc57442560e6a94
djm@openbsd.org [Wed, 12 Sep 2018 01:19:12 +0000 (01:19 +0000)]
upstream: log certificate fingerprint in authentication
success/failure message (previously we logged only key ID and CA key
fingerprint).
ok markus@
OpenBSD-Commit-ID:
a8ef2d172b7f1ddbcce26d6434b2de6d94f6c05d
dtucker@openbsd.org [Fri, 7 Sep 2018 04:26:56 +0000 (04:26 +0000)]
upstream: Add FALLTHROUGH comments where appropriate. Patch from
jjelen at redhat via bz#2687.
OpenBSD-Commit-ID:
c48eb457be697a19d6d2950c6d0879f3ccc851d3
djm@openbsd.org [Fri, 7 Sep 2018 01:42:54 +0000 (01:42 +0000)]
upstream: ssh -MM requires confirmation for all operations that
change the multiplexing state, not just new sessions.
mention that confirmation is checked via ssh-askpass
OpenBSD-Commit-ID:
0f1b45551ebb9cc5c9a4fe54ad3b23ce90f1f5c2
mestre@openbsd.org [Tue, 28 Aug 2018 12:25:53 +0000 (12:25 +0000)]
upstream: fix misplaced parenthesis inside if-clause. it's harmless
and the only issue is showing an unknown error (since it's not defined)
during fatal(), if it ever an error occurs inside that condition.
OK deraadt@ markus@ djm@
OpenBSD-Commit-ID:
acb0a8e6936bfbe590504752d01d1d251a7101d8
mestre@openbsd.org [Tue, 28 Aug 2018 12:17:45 +0000 (12:17 +0000)]
upstream: fix build with DEBUG_PK enabled
OK dtucker@
OpenBSD-Commit-ID:
ec1568cf27726e9638a0415481c20c406e7b441c
Darren Tucker [Fri, 7 Sep 2018 04:41:53 +0000 (14:41 +1000)]
Handle ngroups>_SC_NGROUPS_MAX.
Based on github pull request #99 from Darren Maffat at Oracle: Solaris'
getgrouplist considers _SC_NGROUPS_MAX more of a guideline and can return
a larger number of groups. In this case, retry getgrouplist with a
larger array and defer allocating groups_byname. ok djm@
Darren Tucker [Fri, 7 Sep 2018 04:06:57 +0000 (14:06 +1000)]
Initial len for the fmt=NULL case.
Patch from jjelen at redhat via bz#2687. (OpenSSH never calls
setproctitle with a null format so len is always initialized).
Darren Tucker [Fri, 7 Sep 2018 04:01:39 +0000 (14:01 +1000)]
Include stdlib.h.
Patch from jjelen at redhat via bz#2687.
Damien Miller [Mon, 27 Aug 2018 03:08:01 +0000 (13:08 +1000)]
document some more regress control env variables
Specifically SKIP_UNIT, USE_VALGRING and LTESTS. Sort the list of
environment variables.
Based on patch from Jakub Jelen
Damien Miller [Thu, 23 Aug 2018 05:41:42 +0000 (15:41 +1000)]
shorten temporary SSH_REGRESS_TMP path
Previous path was exceeding max socket length on at least one platform (OSX)
Damien Miller [Thu, 23 Aug 2018 03:06:02 +0000 (13:06 +1000)]
rebuild dependencies
Damien Miller [Thu, 23 Aug 2018 03:03:32 +0000 (13:03 +1000)]
fix path in distclean target
Patch from Jakub Jelen
djm@openbsd.org [Thu, 23 Aug 2018 03:01:08 +0000 (03:01 +0000)]
upstream: memleak introduced in r1.83; from Colin Watson
OpenBSD-Commit-ID:
5c019104c280cbd549a264a7217b67665e5732dc
schwarze@openbsd.org [Tue, 21 Aug 2018 13:56:27 +0000 (13:56 +0000)]
upstream: AIX reports the CODESET as "ISO8859-1" in the POSIX locale.
Treating that as a safe encoding is OK because even when other systems return
that string for real ISO8859-1, it is still safe in the sense that it is
ASCII-compatible and stateless.
Issue reported by Val dot Baranov at duke dot edu. Additional
information provided by Michael dot Felt at felt dot demon dot nl.
Tested by Michael Felt on AIX 6.1 and by Val Baranov on AIX 7.1.
Tweak and OK djm@.
OpenBSD-Commit-ID:
36f1210e0b229817d10eb490d6038f507b8256a7
Tim Rice [Tue, 21 Aug 2018 15:57:24 +0000 (08:57 -0700)]
modified: openbsd-compat/port-uw.c
remove obsolete and un-needed include
Damien Miller [Mon, 20 Aug 2018 05:57:29 +0000 (15:57 +1000)]
Missing unistd.h for regress/mkdtemp.c
Damien Miller [Thu, 16 Aug 2018 19:45:20 +0000 (05:45 +1000)]
update version numbers in anticipation of release
Corinna Vinschen [Mon, 13 Aug 2018 15:08:51 +0000 (17:08 +0200)]
configure: work around GCC shortcoming on Cygwin
Cygwin's latest 7.x GCC allows to specify -mfunction-return=thunk
as well as -mindirect-branch=thunk on the command line, albeit
producing invalid code, leading to an error at link stage.
The check in configure.ac only checks if the option is present,
but not if it produces valid code.
This patch fixes it by special-casing Cygwin. Another solution
may be to change these to linker checks.
Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
Corinna Vinschen [Mon, 13 Aug 2018 15:05:05 +0000 (17:05 +0200)]
cygwin: add missing stdarg.h include
Further header file standarization in Cygwin uncovered a lazy
indirect include in bsd-cygwin_util.c
Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
djm@openbsd.org [Mon, 13 Aug 2018 02:41:05 +0000 (02:41 +0000)]
upstream: revert compat.[ch] section of the following change. It
causes double-free under some circumstances.
--
date: 2018/07/31 03:07:24; author: djm; state: Exp; lines: +33 -18; commitid: f7g4UI8eeOXReTPh;
fix some memory leaks spotted by Coverity via Jakub Jelen in bz#2366
feedback and ok dtucker@
OpenBSD-Commit-ID:
1e77547f60fdb5e2ffe23e2e4733c54d8d2d1137
djm@openbsd.org [Sun, 12 Aug 2018 20:19:13 +0000 (20:19 +0000)]
upstream: better diagnosics on alg list assembly errors; ok
deraadt@ markus@
OpenBSD-Commit-ID:
5a557e74b839daf13cc105924d2af06a1560faee
Damien Miller [Sun, 12 Aug 2018 01:08:45 +0000 (18:08 -0700)]
Some AIX fixes; report from Michael Felt
dtucker@openbsd.org [Fri, 10 Aug 2018 01:35:49 +0000 (01:35 +0000)]
upstream: The script that cooks up PuTTY format host keys does not
understand the new key format so convert back to old format to create the
PuTTY key and remove it once done.
OpenBSD-Regress-ID:
2a449a18846c3a144bc645135b551ba6177e38d3
djm@openbsd.org [Fri, 10 Aug 2018 00:44:01 +0000 (00:44 +0000)]
djm@openbsd.org [Fri, 10 Aug 2018 00:42:29 +0000 (00:42 +0000)]
upstream: Describe pubkey format, prompted by bz#2853
While I'm here, describe and link to the remaining local PROTOCOL.*
docs that weren't already mentioned (PROTOCOL.key, PROTOCOL.krl and
PROTOCOL.mux)
OpenBSD-Commit-ID:
2a900f9b994ba4d53e7aeb467d44d75829fd1231
djm@openbsd.org [Fri, 10 Aug 2018 00:27:15 +0000 (00:27 +0000)]
upstream: fix numbering
OpenBSD-Commit-ID:
bc7a1764dff23fa4c5ff0e3379c9c4d5b63c9596
djm@openbsd.org [Wed, 8 Aug 2018 01:16:01 +0000 (01:16 +0000)]
upstream: Use new private key format by default. This format is
suported by OpenSSH >= 6.5 (released January 2014), so it should be supported
by most OpenSSH versions in active use.
It is possible to convert new-format private keys to the older
format using "ssh-keygen -f /path/key -pm PEM".
ok deraadt dtucker
OpenBSD-Commit-ID:
e3bd4f2509a2103bfa2f710733426af3ad6d8ab8
djm@openbsd.org [Sat, 4 Aug 2018 00:55:06 +0000 (00:55 +0000)]
upstream: invalidate dh->priv_key after freeing it in error path;
avoids unlikely double-free later. Reported by Viktor Dukhovni via
https://github.com/openssh/openssh-portable/pull/96 feedback jsing@ tb@
OpenBSD-Commit-ID:
e317eb17c3e05500ae851f279ef6486f0457c805
djm@openbsd.org [Tue, 31 Jul 2018 03:10:27 +0000 (03:10 +0000)]
upstream: delay bailout for invalid authentic
=?UTF-8?q?ating=20user=20until=20after=20the=20packet=20containing=20the?=
=?UTF-8?q?=20request=20has=20been=20fully=20parsed.=20Reported=20by=20Dar?=
=?UTF-8?q?iusz=20Tytko=20and=20Micha=C5=82=20Sajdak;=20ok=20deraadt?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
OpenBSD-Commit-ID:
b4891882fbe413f230fe8ac8a37349b03bd0b70d
djm@openbsd.org [Tue, 31 Jul 2018 03:07:24 +0000 (03:07 +0000)]
upstream: fix some memory leaks spotted by Coverity via Jakub Jelen
in bz#2366 feedback and ok dtucker@
OpenBSD-Commit-ID:
8402bbae67d578bedbadb0ce68ff7c5a136ef563
Damien Miller [Fri, 20 Jul 2018 03:18:28 +0000 (13:18 +1000)]
Remove support for S/Key
Most people will 1) be using modern multi-factor authentication methods
like TOTP/OATH etc and 2) be getting support for multi-factor
authentication via PAM or BSD Auth.
markus@openbsd.org [Fri, 27 Jul 2018 12:03:17 +0000 (12:03 +0000)]
upstream: avoid expensive channel_open_message() calls; ok djm@
OpenBSD-Commit-ID:
aea3b5512ad681cd8710367d743e8a753d4425d9
dtucker@openbsd.org [Fri, 27 Jul 2018 05:34:42 +0000 (05:34 +0000)]
upstream: Now that ssh can't be setuid, remove the
original_real_uid and original_effective_uid globals and replace with calls
to plain getuid(). ok djm@
OpenBSD-Commit-ID:
92561c0cd418d34e6841e20ba09160583e27b68c
dtucker@openbsd.org [Fri, 27 Jul 2018 05:13:02 +0000 (05:13 +0000)]
upstream: Remove uid checks from low port binds. Now that ssh
cannot be setuid and sshd always has privsep on, we can remove the uid checks
for low port binds and just let the system do the check. We leave a sanity
check for the !privsep case so long as the code is stil there. with & ok
djm@
OpenBSD-Commit-ID:
9535cfdbd1cd54486fdbedfaee44ce4367ec7ca0
dtucker@openbsd.org [Fri, 27 Jul 2018 03:55:22 +0000 (03:55 +0000)]
upstream: ssh(1) no longer supports being setuid root. Remove reference
to crc32 which went with protocol 1. Pointed out by deraadt@.
OpenBSD-Commit-ID:
f8763c25fd96ed91dd1abdab5667fd2e27e377b6
Damien Miller [Fri, 27 Jul 2018 04:15:28 +0000 (14:15 +1000)]
correct snprintf truncation check in closefrom()
Truncation cannot happen unless the system has set PATH_MAX to some
nonsensically low value.
bz#2862, patch from Daniel Le
Darren Tucker [Fri, 27 Jul 2018 03:46:06 +0000 (13:46 +1000)]
Include stdarg.h in mkdtemp for va_list.
deraadt@openbsd.org [Wed, 25 Jul 2018 17:12:35 +0000 (17:12 +0000)]
upstream: Don't redefine Makefile choices which come correct from
bsd.*.mk ok markus
OpenBSD-Commit-ID:
814b2f670df75759e1581ecef530980b2b3d7e0f
deraadt@openbsd.org [Wed, 25 Jul 2018 13:56:23 +0000 (13:56 +0000)]
upstream: fix indent; Clemens Goessnitzer
OpenBSD-Commit-ID:
b5149a6d92b264d35f879d24608087b254857a83
beck@openbsd.org [Wed, 25 Jul 2018 13:10:56 +0000 (13:10 +0000)]
upstream: Use the caller provided (copied) pwent struct in
load_public_identity_files instead of calling getpwuid() again and discarding
the argument. This prevents a client crash where tilde_expand_filename calls
getpwuid() again before the pwent pointer is used. Issue noticed and reported
by Pierre-Olivier Martel <pom@apple.com> ok djm@ deraadt@
OpenBSD-Commit-ID:
a067d74b5b098763736c94cc1368de8ea3f0b157
jmc@openbsd.org [Mon, 23 Jul 2018 19:53:55 +0000 (19:53 +0000)]
upstream: oops, failed to notice that SEE ALSO got messed up;
OpenBSD-Commit-ID:
61c1306542cefdc6e59ac331751afe961557427d
kn@openbsd.org [Mon, 23 Jul 2018 19:02:49 +0000 (19:02 +0000)]
upstream: Point to glob in section 7 for the actual list of special
characters instead the C API in section 3.
OK millert jmc nicm, "the right idea" deraadt
OpenBSD-Commit-ID:
a74fd215488c382809e4d041613aeba4a4b1ffc6
dtucker@openbsd.org [Sun, 22 Jul 2018 12:16:59 +0000 (12:16 +0000)]
upstream: Switch authorized_keys example from ssh-dss to ssh-rsa
since the former is no longer enabled by default. Pointed out by Daniel A.
Maierhofer, ok jmc
OpenBSD-Commit-ID:
6a196cef53d7524e0c9b58cdbc1b5609debaf8c7
djm@openbsd.org [Fri, 20 Jul 2018 05:01:10 +0000 (05:01 +0000)]
upstream: slightly-clearer description for AuthenticationMethods - the
lists have comma-separated elements; bz#2663 from Hans Meier
OpenBSD-Commit-ID:
931c983d0fde4764d0942fb2c2b5017635993b5a
Damien Miller [Fri, 20 Jul 2018 04:53:42 +0000 (14:53 +1000)]
Create control sockets in clean temp directories
Adds a regress/mkdtemp tool and uses it to create empty temp
directories for tests needing control sockets.
Patch from Colin Watson via bz#2660; ok dtucker
djm@openbsd.org [Fri, 20 Jul 2018 03:46:34 +0000 (03:46 +0000)]
upstream: remove unused zlib.h
OpenBSD-Commit-ID:
8d274a9b467c7958df12668b49144056819f79f1
dtucker@openbsd.org [Thu, 19 Jul 2018 23:03:16 +0000 (23:03 +0000)]
upstream: Fix typo in comment. From Alexandru Iacob via github.
OpenBSD-Commit-ID:
eff4ec07c6c8c5483533da43a4dda37d72ef7f1d
Darren Tucker [Fri, 20 Jul 2018 03:48:51 +0000 (13:48 +1000)]
Explicitly include openssl before zlib.
Some versions of OpenSSL have "free_func" in their headers, which zlib
typedefs. Including openssl after zlib (eg via sshkey.h) results in
"syntax error before `free_func'", which this fixes.
dtucker@openbsd.org [Thu, 19 Jul 2018 10:28:47 +0000 (10:28 +0000)]
upstream: Deprecate UsePrivilegedPort now that support for running
ssh(1) setuid has been removed, remove supporting code and clean up
references to it in the man pages
We have not shipped ssh(1) the setuid bit since 2002. If ayone
really needs to make connections from a low port number this can
be implemented via a small setuid ProxyCommand.
ok markus@ jmc@ djm@
OpenBSD-Commit-ID:
d03364610b7123ae4c6792f5274bd147b6de717e
dtucker@openbsd.org [Wed, 18 Jul 2018 11:34:04 +0000 (11:34 +0000)]
upstream: Remove support for running ssh(1) setuid and fatal if
attempted. Do not link uidwap.c into ssh any more. Neuters
UsePrivilegedPort, which will be marked as deprecated shortly. ok markus@
djm@
OpenBSD-Commit-ID:
c4ba5bf9c096f57a6ed15b713a1d7e9e2e373c42
dtucker@openbsd.org [Mon, 16 Jul 2018 22:25:01 +0000 (22:25 +0000)]
upstream: Slot 0 in the hostbased key array was previously RSA1,
but that is now gone and the slot is unused so remove it. Remove two
now-unused macros, and add an array bounds check to the two remaining ones
(array is statically sized, so mostly a safety check on future changes). ok
markus@
OpenBSD-Commit-ID:
2e4c0ca6cc1d8daeccead2aa56192a3f9d5e1e7a
dtucker@openbsd.org [Mon, 16 Jul 2018 11:05:41 +0000 (11:05 +0000)]
upstream: Remove support for loading HostBasedAuthentication keys
directly in ssh(1) and always use ssh-keysign. This removes one of the few
remaining reasons why ssh(1) might be setuid. ok markus@
OpenBSD-Commit-ID:
97f01e1448707129a20d75f86bad5d27c3cf0b7d
djm@openbsd.org [Mon, 16 Jul 2018 07:06:50 +0000 (07:06 +0000)]
upstream: keep options.identity_file_userprovided array in sync when we
load keys, fixing some spurious error messages; ok markus
OpenBSD-Commit-ID:
c63e3d5200ee2cf9e35bda98de847302566c6a00
djm@openbsd.org [Mon, 16 Jul 2018 03:09:59 +0000 (03:09 +0000)]
upstream: memleak in unittest; found by valgrind
OpenBSD-Regress-ID:
168c23b0fb09fc3d0b438628990d3fd9260a8a5e
djm@openbsd.org [Mon, 16 Jul 2018 03:09:13 +0000 (03:09 +0000)]
upstream: memleaks; found by valgrind
OpenBSD-Commit-ID:
6c3ba22be53e753c899545f771e8399fc93cd844
Darren Tucker [Sat, 14 Jul 2018 06:49:01 +0000 (16:49 +1000)]
Undef a few new macros in sys-queue.h.
Prevents macro redefinition warnings on OSX.