]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
6 years agoupstream: remove big ugly TODO comment from start of file. Some of
djm@openbsd.org [Wed, 26 Sep 2018 07:32:44 +0000 (07:32 +0000)] 
upstream: remove big ugly TODO comment from start of file. Some of

the mentioned tasks are obsolete and, of the remainder, most are already
captured in PROTOCOL.mux where they better belong

OpenBSD-Commit-ID: 16d9d76dee42a5bb651c9d6740f7f0ef68aeb407

6 years agoupstream: Document mux proxy mode; added by Markus in openssh-7.4
djm@openbsd.org [Wed, 26 Sep 2018 07:30:05 +0000 (07:30 +0000)] 
upstream: Document mux proxy mode; added by Markus in openssh-7.4

Also add a little bit of information about the overall packet format

OpenBSD-Commit-ID: bdb6f6ea8580ef96792e270cae7857786ad84a95

6 years agoupstream: s/process_mux_master/mux_master_process/ in mux master
djm@openbsd.org [Wed, 26 Sep 2018 01:48:57 +0000 (01:48 +0000)] 
upstream: s/process_mux_master/mux_master_process/ in mux master

function names,

Gives better symmetry with the existing mux_client_*() names and makes
it more obvious when a message comes from the master vs client (they
are interleved in ControlMaster=auto mode).

no functional change beyond prefixing a could of log messages with
__func__ where they were previously lacking.

OpenBSD-Commit-ID: b01f7c3fdf92692e1713a822a89dc499333daf75

6 years agoRemove unused variable in _ssh_compat_fflush.
Darren Tucker [Sat, 22 Sep 2018 04:41:24 +0000 (14:41 +1000)] 
Remove unused variable in _ssh_compat_fflush.

6 years agoImport updated moduli.
Darren Tucker [Thu, 20 Sep 2018 08:08:43 +0000 (18:08 +1000)] 
Import updated moduli.

6 years agoupstream: Allow ssh_config ForwardX11Timeout=0 to disable the
djm@openbsd.org [Fri, 21 Sep 2018 12:46:22 +0000 (12:46 +0000)] 
upstream: Allow ssh_config ForwardX11Timeout=0 to disable the

timeout and allow X11 connections in untrusted mode indefinitely. ok dtucker@

OpenBSD-Commit-ID: ea1ceed3f540b48e5803f933e59a03b20db10c69

6 years agoupstream: when compiled with GSSAPI support, cache supported method
djm@openbsd.org [Fri, 21 Sep 2018 12:23:17 +0000 (12:23 +0000)] 
upstream: when compiled with GSSAPI support, cache supported method

OIDs by calling ssh_gssapi_prepare_supported_oids() regardless of whether
GSSAPI authentication is enabled in the main config.

This avoids sandbox violations for configurations that enable GSSAPI
auth later, e.g.

Match user djm
GSSAPIAuthentication yes

bz#2107; ok dtucker@

OpenBSD-Commit-ID: a5dd42d87c74e27cfb712b15b0f97ab20e0afd1d

6 years agoupstream: In sshkey_in_file(), ignore keys that are considered for
djm@openbsd.org [Fri, 21 Sep 2018 12:20:12 +0000 (12:20 +0000)] 
upstream: In sshkey_in_file(), ignore keys that are considered for

being too short (i.e. SSH_ERR_KEY_LENGTH). These keys will not be considered
to be "in the file". This allows key revocation lists to contain short keys
without the entire revocation list being considered invalid.

bz#2897; ok dtucker

OpenBSD-Commit-ID: d9f3d857d07194a42ad7e62889a74dc3f9d9924b

6 years agoupstream: Treat connections with ProxyJump specified the same as ones
djm@openbsd.org [Fri, 21 Sep 2018 03:11:36 +0000 (03:11 +0000)] 
upstream: Treat connections with ProxyJump specified the same as ones

with a ProxyCommand set with regards to hostname canonicalisation (i.e. don't
try to canonicalise the hostname unless CanonicalizeHostname is set to
'always').

Patch from Sven Wegener via bz#2896

OpenBSD-Commit-ID: 527ff501cf98bf65fb4b29ed0cb847dda10f4d37

6 years agoupstream: actually make CASignatureAlgorithms available as a config
djm@openbsd.org [Thu, 20 Sep 2018 23:40:16 +0000 (23:40 +0000)] 
upstream: actually make CASignatureAlgorithms available as a config

option

OpenBSD-Commit-ID: 93fa7ff58314ed7b1ab7744090a6a91232e6ae52

6 years agoupstream: Import updated moduli.
dtucker@openbsd.org [Thu, 20 Sep 2018 08:07:03 +0000 (08:07 +0000)] 
upstream: Import updated moduli.

OpenBSD-Commit-ID: 04431e8e7872f49a2129bf080a6b73c19d576d40

6 years agoupstream: reorder CASignatureAlgorithms, and add them to the
jmc@openbsd.org [Thu, 20 Sep 2018 06:58:48 +0000 (06:58 +0000)] 
upstream: reorder CASignatureAlgorithms, and add them to the

various -o lists; ok djm

OpenBSD-Commit-ID: ecb88baecc3c54988b4d1654446ea033da359288

6 years agoupstream: fix "ssh -Q sig" to show correct signature algorithm list
djm@openbsd.org [Thu, 20 Sep 2018 03:31:49 +0000 (03:31 +0000)] 
upstream: fix "ssh -Q sig" to show correct signature algorithm list

(it was erroneously showing certificate algorithms); prompted by markus@

OpenBSD-Commit-ID: 1cdee002f2f0c21456979deeb887fc889afb154d

6 years agoupstream: add CASignatureAlgorithms option for the client, allowing
djm@openbsd.org [Thu, 20 Sep 2018 03:30:44 +0000 (03:30 +0000)] 
upstream: add CASignatureAlgorithms option for the client, allowing

it to specify which signature algorithms may be used by CAs when signing
certificates. Useful if you want to ban RSA/SHA1; ok markus@

OpenBSD-Commit-ID: 9159e5e9f67504829bf53ff222057307a6e3230f

6 years agoupstream: Add sshd_config CASignatureAlgorithms option to allow
djm@openbsd.org [Thu, 20 Sep 2018 03:28:06 +0000 (03:28 +0000)] 
upstream: Add sshd_config CASignatureAlgorithms option to allow

control over which signature algorithms a CA may use when signing
certificates. In particular, this allows a sshd to ban certificates signed
with RSA/SHA1.

ok markus@

OpenBSD-Commit-ID: b05c86ef8b52b913ed48d54a9b9c1a7714d96bac

6 years agoupstream: Make "ssh-add -q" do what it says on the tin: silence
djm@openbsd.org [Wed, 19 Sep 2018 02:03:02 +0000 (02:03 +0000)] 
upstream: Make "ssh-add -q" do what it says on the tin: silence

output from successful operations.

Based on patch from Thijs van Dijk; ok dtucker@ deraadt@

OpenBSD-Commit-ID: c4f754ecc055c10af166116ce7515104aa8522e1

6 years agoupstream: When choosing a prime from the moduli file, avoid
millert@openbsd.org [Mon, 17 Sep 2018 15:40:14 +0000 (15:40 +0000)] 
upstream: When choosing a prime from the moduli file, avoid

re-using the linenum variable for something that is not a line number to
avoid the confusion that resulted in the bug in rev. 1.64.  This also lets us
pass the actual linenum to parse_prime() so the error messages include the
correct line number.  OK markus@ some time ago.

OpenBSD-Commit-ID: 4d8e5d3e924d6e8eb70053e3defa23c151a00084

6 years agoFix openssl-1.1 fallout for --without-openssl.
Darren Tucker [Sat, 15 Sep 2018 09:44:06 +0000 (19:44 +1000)] 
Fix openssl-1.1 fallout for --without-openssl.

ok djm@

6 years agoadd futex(2) syscall to seccomp sandbox
Damien Miller [Sat, 15 Sep 2018 09:37:48 +0000 (19:37 +1000)] 
add futex(2) syscall to seccomp sandbox

Apparently needed for some glibc/openssl combinations.

Patch from Arkadiusz Miƛkiewicz

6 years agoreally add source for authopt_fuzz this time
Damien Miller [Sat, 15 Sep 2018 09:36:55 +0000 (19:36 +1000)] 
really add source for authopt_fuzz this time

6 years agoremove accidentally checked-in authopt_fuzz binary
Damien Miller [Sat, 15 Sep 2018 09:35:40 +0000 (19:35 +1000)] 
remove accidentally checked-in authopt_fuzz binary

6 years agoupstream: second try, deals properly with missing and private-only
djm@openbsd.org [Fri, 14 Sep 2018 05:26:27 +0000 (05:26 +0000)] 
upstream: second try, deals properly with missing and private-only

Use consistent format in debug log for keys readied, offered and
received during public key authentication.

This makes it a little easier to see what is going on, as each message
now contains (where available) the key filename, its type and fingerprint,
and whether the key is hosted in an agent or a token.

OpenBSD-Commit-ID: f1c6a8e9cfc4e108c359db77f24f9a40e1e25ea7

6 years agofuzzer harness for authorized_keys option parsing
Damien Miller [Fri, 14 Sep 2018 05:16:34 +0000 (15:16 +1000)] 
fuzzer harness for authorized_keys option parsing

6 years agoupstream: revert following; deals badly with agent keys
djm@openbsd.org [Fri, 14 Sep 2018 04:44:04 +0000 (04:44 +0000)] 
upstream: revert following; deals badly with agent keys

revision 1.285
date: 2018/09/14 04:17:12;  author: djm;  state: Exp;  lines: +47 -26;  commitid: lflGFcNb2X2HebaK;
Use consistent format in debug log for keys readied, offered and
received during public key authentication.

This makes it a little easier to see what is going on, as each message
now contains the key filename, its type and fingerprint, and whether
the key is hosted in an agent or a token.

OpenBSD-Commit-ID: e496bd004e452d4b051f33ed9ae6a54ab918f56d

6 years agoupstream: garbage-collect moribund ssh_new_private() API.
djm@openbsd.org [Fri, 14 Sep 2018 04:17:44 +0000 (04:17 +0000)] 
upstream: garbage-collect moribund ssh_new_private() API.

OpenBSD-Commit-ID: 7c05bf13b094093dfa01848a9306c82eb6e95f6c

6 years agoupstream: Use consistent format in debug log for keys readied,
djm@openbsd.org [Fri, 14 Sep 2018 04:17:12 +0000 (04:17 +0000)] 
upstream: Use consistent format in debug log for keys readied,

offered and received during public key authentication.

This makes it a little easier to see what is going on, as each message
now contains the key filename, its type and fingerprint, and whether
the key is hosted in an agent or a token.

OpenBSD-Commit-ID: 2a01d59285a8a7e01185bb0a43316084b4f06a1f

6 years agoupstream: Fix warnings caused by user_from_uid() and group_from_gid()
millert@openbsd.org [Thu, 13 Sep 2018 15:23:32 +0000 (15:23 +0000)] 
upstream: Fix warnings caused by user_from_uid() and group_from_gid()

now returning const char *.

OpenBSD-Commit-ID: b5fe571ea77cfa7b9035062829ab05eb87d7cc6f

6 years agoallow SIGUSR1 as synonym for SIGINFO
Damien Miller [Fri, 14 Sep 2018 00:31:47 +0000 (10:31 +1000)] 
allow SIGUSR1 as synonym for SIGINFO

Lets users on those unfortunate operating systems that lack SIGINFO
still be able to obtain progress information from unit tests :)

6 years agoadd compat header
Damien Miller [Thu, 13 Sep 2018 09:05:48 +0000 (19:05 +1000)] 
add compat header

6 years agoupstream: missed a bit of openssl-1.0.x API in this unittest
djm@openbsd.org [Thu, 13 Sep 2018 09:03:20 +0000 (09:03 +0000)] 
upstream: missed a bit of openssl-1.0.x API in this unittest

OpenBSD-Regress-ID: a73a54d7f7381856a3f3a2d25947bee7a9a5dbc9

6 years agoupstream: use only openssl-1.1.x API here too
djm@openbsd.org [Thu, 13 Sep 2018 05:06:51 +0000 (05:06 +0000)] 
upstream: use only openssl-1.1.x API here too

OpenBSD-Regress-ID: ae877064597c349954b1b443769723563cecbc8f

6 years agoadapt -portable to OpenSSL 1.1x API
Damien Miller [Thu, 13 Sep 2018 02:13:50 +0000 (12:13 +1000)] 
adapt -portable to OpenSSL 1.1x API

Polyfill missing API with replacement functions extracted from LibreSSL

6 years agoforgot to stage these test files in commit d70d061
Damien Miller [Thu, 13 Sep 2018 02:12:42 +0000 (12:12 +1000)] 
forgot to stage these test files in commit d70d061

6 years agoupstream: hold our collective noses and use the openssl-1.1.x API in
djm@openbsd.org [Thu, 13 Sep 2018 02:08:33 +0000 (02:08 +0000)] 
upstream: hold our collective noses and use the openssl-1.1.x API in

OpenSSH; feedback and ok tb@ jsing@ markus@

OpenBSD-Commit-ID: cacbcac87ce5da0d3ca7ef1b38a6f7fb349e4417

6 years agoupstream: Include certs with multiple RSA signature variants in
djm@openbsd.org [Wed, 12 Sep 2018 01:36:45 +0000 (01:36 +0000)] 
upstream: Include certs with multiple RSA signature variants in

test data Ensure that cert->signature_key is populated correctly

OpenBSD-Regress-ID: 56e68f70fe46cb3a193ca207385bdb301fd6603a

6 years agoupstream: test revocation by explicit hash and by fingerprint
djm@openbsd.org [Wed, 12 Sep 2018 01:23:48 +0000 (01:23 +0000)] 
upstream: test revocation by explicit hash and by fingerprint

OpenBSD-Regress-ID: 079c18a9ab9663f4af419327c759fc1e2bc78fd8

6 years agoupstream: s/sshkey_demote/sshkey_from_private/g
djm@openbsd.org [Wed, 12 Sep 2018 01:22:43 +0000 (01:22 +0000)] 
upstream: s/sshkey_demote/sshkey_from_private/g

OpenBSD-Regress-ID: 782bde7407d94a87aa8d1db7c23750e09d4443c4

6 years agodelete the correct thing; kexfuzz binary
Damien Miller [Wed, 12 Sep 2018 06:50:01 +0000 (16:50 +1000)] 
delete the correct thing; kexfuzz binary

6 years agoupstream: fix edit mistake; spotted by jmc@
djm@openbsd.org [Wed, 12 Sep 2018 06:18:59 +0000 (06:18 +0000)] 
upstream: fix edit mistake; spotted by jmc@

OpenBSD-Commit-ID: dd724e1c52c9d6084f4cd260ec7e1b2b138261c6

6 years agoupstream: add SSH_ALLOWED_CA_SIGALGS - the default list of
djm@openbsd.org [Wed, 12 Sep 2018 01:34:02 +0000 (01:34 +0000)] 
upstream: add SSH_ALLOWED_CA_SIGALGS - the default list of

signature algorithms that are allowed for CA signatures. Notably excludes
ssh-dsa.

ok markus@

OpenBSD-Commit-ID: 1628e4181dc8ab71909378eafe5d06159a22deb4

6 years agoupstream: add sshkey_check_cert_sigtype() that checks a
djm@openbsd.org [Wed, 12 Sep 2018 01:32:54 +0000 (01:32 +0000)] 
upstream: add sshkey_check_cert_sigtype() that checks a

cert->signature_type against a supplied whitelist; ok markus

OpenBSD-Commit-ID: caadb8073292ed7a9535e5adc067d11d356d9302

6 years agoupstream: add cert->signature_type field and keep it in sync with
djm@openbsd.org [Wed, 12 Sep 2018 01:31:30 +0000 (01:31 +0000)] 
upstream: add cert->signature_type field and keep it in sync with

certificate signature wrt loading and certification operations; ok markus@

OpenBSD-Commit-ID: e8b8b9f76b66707a0cd926109c4383db8f664df3

6 years agoupstream: Add "ssh -Q sig" to allow listing supported signature
djm@openbsd.org [Wed, 12 Sep 2018 01:30:10 +0000 (01:30 +0000)] 
upstream: Add "ssh -Q sig" to allow listing supported signature

algorithms ok markus@

OpenBSD-Commit-ID: 7a8c6eb6c249dc37823ba5081fce64876d10fe2b

6 years agoupstream: allow key revocation by SHA256 hash and allow ssh-keygen
djm@openbsd.org [Wed, 12 Sep 2018 01:21:34 +0000 (01:21 +0000)] 
upstream: allow key revocation by SHA256 hash and allow ssh-keygen

to create KRLs using SHA256/base64 key fingerprints; ok markus@

OpenBSD-Commit-ID: a0590fd34e7f1141f2873ab3acc57442560e6a94

6 years agoupstream: log certificate fingerprint in authentication
djm@openbsd.org [Wed, 12 Sep 2018 01:19:12 +0000 (01:19 +0000)] 
upstream: log certificate fingerprint in authentication

success/failure message (previously we logged only key ID and CA key
fingerprint).

ok markus@

OpenBSD-Commit-ID: a8ef2d172b7f1ddbcce26d6434b2de6d94f6c05d

6 years agoupstream: Add FALLTHROUGH comments where appropriate. Patch from
dtucker@openbsd.org [Fri, 7 Sep 2018 04:26:56 +0000 (04:26 +0000)] 
upstream: Add FALLTHROUGH comments where appropriate. Patch from

jjelen at redhat via bz#2687.

OpenBSD-Commit-ID: c48eb457be697a19d6d2950c6d0879f3ccc851d3

6 years agoupstream: ssh -MM requires confirmation for all operations that
djm@openbsd.org [Fri, 7 Sep 2018 01:42:54 +0000 (01:42 +0000)] 
upstream: ssh -MM requires confirmation for all operations that

change the multiplexing state, not just new sessions.

mention that confirmation is checked via ssh-askpass

OpenBSD-Commit-ID: 0f1b45551ebb9cc5c9a4fe54ad3b23ce90f1f5c2

6 years agoupstream: fix misplaced parenthesis inside if-clause. it's harmless
mestre@openbsd.org [Tue, 28 Aug 2018 12:25:53 +0000 (12:25 +0000)] 
upstream: fix misplaced parenthesis inside if-clause. it's harmless

and the only issue is showing an unknown error (since it's not defined)
during fatal(), if it ever an error occurs inside that condition.

OK deraadt@ markus@ djm@

OpenBSD-Commit-ID: acb0a8e6936bfbe590504752d01d1d251a7101d8

6 years agoupstream: fix build with DEBUG_PK enabled
mestre@openbsd.org [Tue, 28 Aug 2018 12:17:45 +0000 (12:17 +0000)] 
upstream: fix build with DEBUG_PK enabled

OK dtucker@

OpenBSD-Commit-ID: ec1568cf27726e9638a0415481c20c406e7b441c

7 years agoHandle ngroups>_SC_NGROUPS_MAX.
Darren Tucker [Fri, 7 Sep 2018 04:41:53 +0000 (14:41 +1000)] 
Handle ngroups>_SC_NGROUPS_MAX.

Based on github pull request #99 from Darren Maffat at Oracle: Solaris'
getgrouplist considers _SC_NGROUPS_MAX more of a guideline and can return
a larger number of groups.  In this case, retry getgrouplist with a
larger array and defer allocating groups_byname.  ok djm@

7 years agoInitial len for the fmt=NULL case.
Darren Tucker [Fri, 7 Sep 2018 04:06:57 +0000 (14:06 +1000)] 
Initial len for the fmt=NULL case.

Patch from jjelen at redhat via bz#2687.  (OpenSSH never calls
setproctitle with a null format so len is always initialized).

7 years agoInclude stdlib.h.
Darren Tucker [Fri, 7 Sep 2018 04:01:39 +0000 (14:01 +1000)] 
Include stdlib.h.

Patch from jjelen at redhat via bz#2687.

7 years agodocument some more regress control env variables
Damien Miller [Mon, 27 Aug 2018 03:08:01 +0000 (13:08 +1000)] 
document some more regress control env variables

Specifically SKIP_UNIT, USE_VALGRING and LTESTS. Sort the list of
environment variables.

Based on patch from Jakub Jelen

7 years agoshorten temporary SSH_REGRESS_TMP path V_7_8 288/head anongit/V_7_8 github-selfhosted/V_7_8 github/V_7_8 V_7_8_P1
Damien Miller [Thu, 23 Aug 2018 05:41:42 +0000 (15:41 +1000)] 
shorten temporary SSH_REGRESS_TMP path

Previous path was exceeding max socket length on at least one platform (OSX)

7 years agorebuild dependencies
Damien Miller [Thu, 23 Aug 2018 03:06:02 +0000 (13:06 +1000)] 
rebuild dependencies

7 years agofix path in distclean target
Damien Miller [Thu, 23 Aug 2018 03:03:32 +0000 (13:03 +1000)] 
fix path in distclean target

Patch from Jakub Jelen

7 years agoupstream: memleak introduced in r1.83; from Colin Watson
djm@openbsd.org [Thu, 23 Aug 2018 03:01:08 +0000 (03:01 +0000)] 
upstream: memleak introduced in r1.83; from Colin Watson

OpenBSD-Commit-ID: 5c019104c280cbd549a264a7217b67665e5732dc

7 years agoupstream: AIX reports the CODESET as "ISO8859-1" in the POSIX locale.
schwarze@openbsd.org [Tue, 21 Aug 2018 13:56:27 +0000 (13:56 +0000)] 
upstream: AIX reports the CODESET as "ISO8859-1" in the POSIX locale.

Treating that as a safe encoding is OK because even when other systems return
that string for real ISO8859-1, it is still safe in the sense that it is
ASCII-compatible and stateless.

Issue reported by Val dot Baranov at duke dot edu.  Additional
information provided by Michael dot Felt at felt dot demon dot nl.
Tested by Michael Felt on AIX 6.1 and by Val Baranov on AIX 7.1.
Tweak and OK djm@.

OpenBSD-Commit-ID: 36f1210e0b229817d10eb490d6038f507b8256a7

7 years ago modified: openbsd-compat/port-uw.c
Tim Rice [Tue, 21 Aug 2018 15:57:24 +0000 (08:57 -0700)] 
modified:   openbsd-compat/port-uw.c
remove obsolete and un-needed include

7 years agoMissing unistd.h for regress/mkdtemp.c
Damien Miller [Mon, 20 Aug 2018 05:57:29 +0000 (15:57 +1000)] 
Missing unistd.h for regress/mkdtemp.c

7 years agoupdate version numbers in anticipation of release
Damien Miller [Thu, 16 Aug 2018 19:45:20 +0000 (05:45 +1000)] 
update version numbers in anticipation of release

7 years agoconfigure: work around GCC shortcoming on Cygwin
Corinna Vinschen [Mon, 13 Aug 2018 15:08:51 +0000 (17:08 +0200)] 
configure: work around GCC shortcoming on Cygwin

Cygwin's latest 7.x GCC allows to specify -mfunction-return=thunk
as well as -mindirect-branch=thunk on the command line, albeit
producing invalid code, leading to an error at link stage.

The check in configure.ac only checks if the option is present,
but not if it produces valid code.

This patch fixes it by special-casing Cygwin.  Another solution
may be to change these to linker checks.

Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
7 years agocygwin: add missing stdarg.h include
Corinna Vinschen [Mon, 13 Aug 2018 15:05:05 +0000 (17:05 +0200)] 
cygwin: add missing stdarg.h include

Further header file standarization in Cygwin uncovered a lazy
indirect include in bsd-cygwin_util.c

Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
7 years agoupstream: revert compat.[ch] section of the following change. It
djm@openbsd.org [Mon, 13 Aug 2018 02:41:05 +0000 (02:41 +0000)] 
upstream: revert compat.[ch] section of the following change. It

causes double-free under some circumstances.

--

date: 2018/07/31 03:07:24;  author: djm;  state: Exp;  lines: +33 -18;  commitid: f7g4UI8eeOXReTPh;
fix some memory leaks spotted by Coverity via Jakub Jelen in bz#2366
feedback and ok dtucker@

OpenBSD-Commit-ID: 1e77547f60fdb5e2ffe23e2e4733c54d8d2d1137

7 years agoupstream: better diagnosics on alg list assembly errors; ok
djm@openbsd.org [Sun, 12 Aug 2018 20:19:13 +0000 (20:19 +0000)] 
upstream: better diagnosics on alg list assembly errors; ok

deraadt@ markus@

OpenBSD-Commit-ID: 5a557e74b839daf13cc105924d2af06a1560faee

7 years agoSome AIX fixes; report from Michael Felt
Damien Miller [Sun, 12 Aug 2018 01:08:45 +0000 (18:08 -0700)] 
Some AIX fixes; report from Michael Felt

7 years agoupstream: The script that cooks up PuTTY format host keys does not
dtucker@openbsd.org [Fri, 10 Aug 2018 01:35:49 +0000 (01:35 +0000)] 
upstream: The script that cooks up PuTTY format host keys does not

understand the new key format so convert back to old format to create the
PuTTY key and remove it once done.

OpenBSD-Regress-ID: 2a449a18846c3a144bc645135b551ba6177e38d3

7 years agoupstream: improve
djm@openbsd.org [Fri, 10 Aug 2018 00:44:01 +0000 (00:44 +0000)] 
upstream: improve

OpenBSD-Commit-ID: 40d839db0977b4e7ac8b647b16d5411d4faf2f60

7 years agoupstream: Describe pubkey format, prompted by bz#2853
djm@openbsd.org [Fri, 10 Aug 2018 00:42:29 +0000 (00:42 +0000)] 
upstream: Describe pubkey format, prompted by bz#2853

While I'm here, describe and link to the remaining local PROTOCOL.*
docs that weren't already mentioned (PROTOCOL.key, PROTOCOL.krl and
PROTOCOL.mux)

OpenBSD-Commit-ID: 2a900f9b994ba4d53e7aeb467d44d75829fd1231

7 years agoupstream: fix numbering
djm@openbsd.org [Fri, 10 Aug 2018 00:27:15 +0000 (00:27 +0000)] 
upstream: fix numbering

OpenBSD-Commit-ID: bc7a1764dff23fa4c5ff0e3379c9c4d5b63c9596

7 years agoupstream: Use new private key format by default. This format is
djm@openbsd.org [Wed, 8 Aug 2018 01:16:01 +0000 (01:16 +0000)] 
upstream: Use new private key format by default. This format is

suported by OpenSSH >= 6.5 (released January 2014), so it should be supported
by most OpenSSH versions in active use.

It is possible to convert new-format private keys to the older
format using "ssh-keygen -f /path/key -pm PEM".

ok deraadt dtucker

OpenBSD-Commit-ID: e3bd4f2509a2103bfa2f710733426af3ad6d8ab8

7 years agoupstream: invalidate dh->priv_key after freeing it in error path;
djm@openbsd.org [Sat, 4 Aug 2018 00:55:06 +0000 (00:55 +0000)] 
upstream: invalidate dh->priv_key after freeing it in error path;

avoids unlikely double-free later. Reported by Viktor Dukhovni via
https://github.com/openssh/openssh-portable/pull/96 feedback jsing@ tb@

OpenBSD-Commit-ID: e317eb17c3e05500ae851f279ef6486f0457c805

7 years agoupstream: delay bailout for invalid authentic
djm@openbsd.org [Tue, 31 Jul 2018 03:10:27 +0000 (03:10 +0000)] 
upstream: delay bailout for invalid authentic

=?UTF-8?q?ating=20user=20until=20after=20the=20packet=20containing=20the?=
=?UTF-8?q?=20request=20has=20been=20fully=20parsed.=20Reported=20by=20Dar?=
=?UTF-8?q?iusz=20Tytko=20and=20Micha=C5=82=20Sajdak;=20ok=20deraadt?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

OpenBSD-Commit-ID: b4891882fbe413f230fe8ac8a37349b03bd0b70d

7 years agoupstream: fix some memory leaks spotted by Coverity via Jakub Jelen
djm@openbsd.org [Tue, 31 Jul 2018 03:07:24 +0000 (03:07 +0000)] 
upstream: fix some memory leaks spotted by Coverity via Jakub Jelen

in bz#2366 feedback and ok dtucker@

OpenBSD-Commit-ID: 8402bbae67d578bedbadb0ce68ff7c5a136ef563

7 years agoRemove support for S/Key
Damien Miller [Fri, 20 Jul 2018 03:18:28 +0000 (13:18 +1000)] 
Remove support for S/Key

Most people will 1) be using modern multi-factor authentication methods
like TOTP/OATH etc and 2) be getting support for multi-factor
authentication via PAM or BSD Auth.

7 years agoupstream: avoid expensive channel_open_message() calls; ok djm@
markus@openbsd.org [Fri, 27 Jul 2018 12:03:17 +0000 (12:03 +0000)] 
upstream: avoid expensive channel_open_message() calls; ok djm@

OpenBSD-Commit-ID: aea3b5512ad681cd8710367d743e8a753d4425d9

7 years agoupstream: Now that ssh can't be setuid, remove the
dtucker@openbsd.org [Fri, 27 Jul 2018 05:34:42 +0000 (05:34 +0000)] 
upstream: Now that ssh can't be setuid, remove the

original_real_uid and original_effective_uid globals and replace with calls
to plain getuid(). ok djm@

OpenBSD-Commit-ID: 92561c0cd418d34e6841e20ba09160583e27b68c

7 years agoupstream: Remove uid checks from low port binds. Now that ssh
dtucker@openbsd.org [Fri, 27 Jul 2018 05:13:02 +0000 (05:13 +0000)] 
upstream: Remove uid checks from low port binds. Now that ssh

cannot be setuid and sshd always has privsep on, we can remove the uid checks
for low port binds and just let the system do the check. We leave a sanity
check for the !privsep case so long as the code is stil there.  with & ok
djm@

OpenBSD-Commit-ID: 9535cfdbd1cd54486fdbedfaee44ce4367ec7ca0

7 years agoupstream: ssh(1) no longer supports being setuid root. Remove reference
dtucker@openbsd.org [Fri, 27 Jul 2018 03:55:22 +0000 (03:55 +0000)] 
upstream: ssh(1) no longer supports being setuid root. Remove reference

to crc32 which went with protocol 1.  Pointed out by deraadt@.

OpenBSD-Commit-ID: f8763c25fd96ed91dd1abdab5667fd2e27e377b6

7 years agocorrect snprintf truncation check in closefrom()
Damien Miller [Fri, 27 Jul 2018 04:15:28 +0000 (14:15 +1000)] 
correct snprintf truncation check in closefrom()

Truncation cannot happen unless the system has set PATH_MAX to some
nonsensically low value.

bz#2862, patch from Daniel Le

7 years agoInclude stdarg.h in mkdtemp for va_list.
Darren Tucker [Fri, 27 Jul 2018 03:46:06 +0000 (13:46 +1000)] 
Include stdarg.h in mkdtemp for va_list.

7 years agoupstream: Don't redefine Makefile choices which come correct from
deraadt@openbsd.org [Wed, 25 Jul 2018 17:12:35 +0000 (17:12 +0000)] 
upstream: Don't redefine Makefile choices which come correct from

bsd.*.mk ok markus

OpenBSD-Commit-ID: 814b2f670df75759e1581ecef530980b2b3d7e0f

7 years agoupstream: fix indent; Clemens Goessnitzer
deraadt@openbsd.org [Wed, 25 Jul 2018 13:56:23 +0000 (13:56 +0000)] 
upstream: fix indent; Clemens Goessnitzer

OpenBSD-Commit-ID: b5149a6d92b264d35f879d24608087b254857a83

7 years agoupstream: Use the caller provided (copied) pwent struct in
beck@openbsd.org [Wed, 25 Jul 2018 13:10:56 +0000 (13:10 +0000)] 
upstream: Use the caller provided (copied) pwent struct in

load_public_identity_files instead of calling getpwuid() again and discarding
the argument. This prevents a client crash where tilde_expand_filename calls
getpwuid() again before the pwent pointer is used. Issue noticed and reported
by Pierre-Olivier Martel <pom@apple.com> ok djm@ deraadt@

OpenBSD-Commit-ID: a067d74b5b098763736c94cc1368de8ea3f0b157

7 years agoupstream: oops, failed to notice that SEE ALSO got messed up;
jmc@openbsd.org [Mon, 23 Jul 2018 19:53:55 +0000 (19:53 +0000)] 
upstream: oops, failed to notice that SEE ALSO got messed up;

OpenBSD-Commit-ID: 61c1306542cefdc6e59ac331751afe961557427d

7 years agoupstream: Point to glob in section 7 for the actual list of special
kn@openbsd.org [Mon, 23 Jul 2018 19:02:49 +0000 (19:02 +0000)] 
upstream: Point to glob in section 7 for the actual list of special

characters instead the C API in section 3.

OK millert jmc nicm, "the right idea" deraadt

OpenBSD-Commit-ID: a74fd215488c382809e4d041613aeba4a4b1ffc6

7 years agoupstream: Switch authorized_keys example from ssh-dss to ssh-rsa
dtucker@openbsd.org [Sun, 22 Jul 2018 12:16:59 +0000 (12:16 +0000)] 
upstream: Switch authorized_keys example from ssh-dss to ssh-rsa

since the former is no longer enabled by default.  Pointed out by Daniel A.
Maierhofer, ok jmc

OpenBSD-Commit-ID: 6a196cef53d7524e0c9b58cdbc1b5609debaf8c7

7 years agoupstream: slightly-clearer description for AuthenticationMethods - the
djm@openbsd.org [Fri, 20 Jul 2018 05:01:10 +0000 (05:01 +0000)] 
upstream: slightly-clearer description for AuthenticationMethods - the

lists have comma-separated elements; bz#2663 from Hans Meier

OpenBSD-Commit-ID: 931c983d0fde4764d0942fb2c2b5017635993b5a

7 years agoCreate control sockets in clean temp directories
Damien Miller [Fri, 20 Jul 2018 04:53:42 +0000 (14:53 +1000)] 
Create control sockets in clean temp directories

Adds a regress/mkdtemp tool and uses it to create empty temp
directories for tests needing control sockets.

Patch from Colin Watson via bz#2660; ok dtucker

7 years agoupstream: remove unused zlib.h
djm@openbsd.org [Fri, 20 Jul 2018 03:46:34 +0000 (03:46 +0000)] 
upstream: remove unused zlib.h

OpenBSD-Commit-ID: 8d274a9b467c7958df12668b49144056819f79f1

7 years agoupstream: Fix typo in comment. From Alexandru Iacob via github.
dtucker@openbsd.org [Thu, 19 Jul 2018 23:03:16 +0000 (23:03 +0000)] 
upstream: Fix typo in comment. From Alexandru Iacob via github.

OpenBSD-Commit-ID: eff4ec07c6c8c5483533da43a4dda37d72ef7f1d

7 years agoExplicitly include openssl before zlib.
Darren Tucker [Fri, 20 Jul 2018 03:48:51 +0000 (13:48 +1000)] 
Explicitly include openssl before zlib.

Some versions of OpenSSL have "free_func" in their headers, which zlib
typedefs.  Including openssl after zlib (eg via sshkey.h) results in
"syntax error before `free_func'", which this fixes.

7 years agoupstream: Deprecate UsePrivilegedPort now that support for running
dtucker@openbsd.org [Thu, 19 Jul 2018 10:28:47 +0000 (10:28 +0000)] 
upstream: Deprecate UsePrivilegedPort now that support for running

ssh(1) setuid has been removed, remove supporting code and clean up
references to it in the man pages

We have not shipped ssh(1) the setuid bit since 2002.  If ayone
really needs to make connections from a low port number this can
be implemented via a small setuid ProxyCommand.

ok markus@ jmc@ djm@

OpenBSD-Commit-ID: d03364610b7123ae4c6792f5274bd147b6de717e

7 years agoupstream: Remove support for running ssh(1) setuid and fatal if
dtucker@openbsd.org [Wed, 18 Jul 2018 11:34:04 +0000 (11:34 +0000)] 
upstream: Remove support for running ssh(1) setuid and fatal if

attempted. Do not link uidwap.c into ssh any more.  Neuters
UsePrivilegedPort, which will be marked as deprecated shortly. ok markus@
djm@

OpenBSD-Commit-ID: c4ba5bf9c096f57a6ed15b713a1d7e9e2e373c42

7 years agoupstream: Slot 0 in the hostbased key array was previously RSA1,
dtucker@openbsd.org [Mon, 16 Jul 2018 22:25:01 +0000 (22:25 +0000)] 
upstream: Slot 0 in the hostbased key array was previously RSA1,

but that is now gone and the slot is unused so remove it.  Remove two
now-unused macros, and add an array bounds check to the two remaining ones
(array is statically sized, so mostly a safety check on future changes). ok
markus@

OpenBSD-Commit-ID: 2e4c0ca6cc1d8daeccead2aa56192a3f9d5e1e7a

7 years agoupstream: Remove support for loading HostBasedAuthentication keys
dtucker@openbsd.org [Mon, 16 Jul 2018 11:05:41 +0000 (11:05 +0000)] 
upstream: Remove support for loading HostBasedAuthentication keys

directly in ssh(1) and always use ssh-keysign.  This removes one of the few
remaining reasons why ssh(1) might be setuid.  ok markus@

OpenBSD-Commit-ID: 97f01e1448707129a20d75f86bad5d27c3cf0b7d

7 years agoupstream: keep options.identity_file_userprovided array in sync when we
djm@openbsd.org [Mon, 16 Jul 2018 07:06:50 +0000 (07:06 +0000)] 
upstream: keep options.identity_file_userprovided array in sync when we

load keys, fixing some spurious error messages; ok markus

OpenBSD-Commit-ID: c63e3d5200ee2cf9e35bda98de847302566c6a00

7 years agoupstream: memleak in unittest; found by valgrind
djm@openbsd.org [Mon, 16 Jul 2018 03:09:59 +0000 (03:09 +0000)] 
upstream: memleak in unittest; found by valgrind

OpenBSD-Regress-ID: 168c23b0fb09fc3d0b438628990d3fd9260a8a5e

7 years agoupstream: memleaks; found by valgrind
djm@openbsd.org [Mon, 16 Jul 2018 03:09:13 +0000 (03:09 +0000)] 
upstream: memleaks; found by valgrind

OpenBSD-Commit-ID: 6c3ba22be53e753c899545f771e8399fc93cd844

7 years agoUndef a few new macros in sys-queue.h.
Darren Tucker [Sat, 14 Jul 2018 06:49:01 +0000 (16:49 +1000)] 
Undef a few new macros in sys-queue.h.

Prevents macro redefinition warnings on OSX.