]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
Darren Tucker [Fri, 13 Jul 2018 03:40:20 +0000 (13:40 +1000)]
Include unistd.h for geteuid declaration.
Darren Tucker [Fri, 13 Jul 2018 03:38:10 +0000 (13:38 +1000)]
Fallout from buffer conversion in AUDIT_EVENTS.
Supply missing "int r" and fix error path for sshbuf_new().
djm@openbsd.org [Fri, 13 Jul 2018 02:13:50 +0000 (02:13 +0000)]
upstream: make this use ssh_proxy rather than starting/stopping a
daemon for each testcase
OpenBSD-Regress-ID:
608b7655ea65b1ba8fff5a13ce9caa60ef0c8166
djm@openbsd.org [Fri, 13 Jul 2018 02:13:19 +0000 (02:13 +0000)]
upstream: fix leaks in unit test; with this, all unit tests are
leak free (as far as valgrind can spot anyway)
OpenBSD-Regress-ID:
b824d8b27998365379963440e5d18b95ca03aa17
Damien Miller [Fri, 13 Jul 2018 01:39:25 +0000 (11:39 +1000)]
Enable leak checks for unit tests with valgrind
Leave the leak checking on unconditionally when running with valgrind.
The unit tests are leak-free and I want them to stay that way.
Damien Miller [Fri, 13 Jul 2018 01:38:59 +0000 (11:38 +1000)]
increase timeout to match cfgmatch.sh
lets test pass under valgrind (on my workstation at least)
Damien Miller [Thu, 12 Jul 2018 04:54:18 +0000 (14:54 +1000)]
rm regress/misc/kexfuzz/*.o in distclean target
Damien Miller [Thu, 12 Jul 2018 04:49:26 +0000 (14:49 +1000)]
repair !WITH_OPENSSL build
Damien Miller [Thu, 12 Jul 2018 04:49:14 +0000 (14:49 +1000)]
missing headers
Darren Tucker [Thu, 12 Jul 2018 04:57:46 +0000 (14:57 +1000)]
Remove key.h from portable files too.
Commit
5467fbcb removed key.h so stop including it in portable files
too. Fixes builds on lots of platforms.
djm@openbsd.org [Thu, 12 Jul 2018 04:35:25 +0000 (04:35 +0000)]
upstream: remove prototype to long-gone function
OpenBSD-Commit-ID:
0414642ac7ce01d176b9f359091a66a8bbb640bd
markus@openbsd.org [Wed, 11 Jul 2018 18:55:11 +0000 (18:55 +0000)]
upstream: treat ssh_packet_write_wait() errors as fatal; ok djm@
OpenBSD-Commit-ID:
f88ba43c9d54ed2d911218aa8d3f6285430629c3
markus@openbsd.org [Wed, 11 Jul 2018 18:53:29 +0000 (18:53 +0000)]
upstream: remove legacy key emulation layer; ok djm@
OpenBSD-Commit-ID:
2b1f9619259e222bbd4fe9a8d3a0973eafb9dd8d
martijn@openbsd.org [Wed, 11 Jul 2018 08:19:35 +0000 (08:19 +0000)]
upstream: s/wuth/with/ in comment
OpenBSD-Commit-ID:
9de41468afd75f54a7f47809d2ad664aa577902c
Darren Tucker [Wed, 11 Jul 2018 02:12:38 +0000 (12:12 +1000)]
Include stdlib.h for declaration of free.
Fixes build with -Werror on at least Fedora and probably others.
Damien Miller [Wed, 11 Jul 2018 00:19:56 +0000 (10:19 +1000)]
VALGRIND_CHECK_LEAKS logic was backwards :(
Darren Tucker [Wed, 11 Jul 2018 00:10:26 +0000 (10:10 +1000)]
Fix sshbuf_new error path in skey.
Darren Tucker [Wed, 11 Jul 2018 00:06:18 +0000 (10:06 +1000)]
Supply missing third arg in skey.
During the change to the new buffer api the third arg to
sshbuf_get_cstring was ommitted. Fixes build when configured with skey.
Darren Tucker [Wed, 11 Jul 2018 00:03:34 +0000 (10:03 +1000)]
Supply some more missing "int r" in skey
Damien Miller [Tue, 10 Jul 2018 23:56:36 +0000 (09:56 +1000)]
disable valgrind memleak checking by default
Add VALGRIND_CHECK_LEAKS knob to turn it back on.
Darren Tucker [Tue, 10 Jul 2018 23:54:00 +0000 (09:54 +1000)]
Supply missing "int r" in skey code.
sf@openbsd.org [Tue, 10 Jul 2018 09:36:58 +0000 (09:36 +0000)]
upstream: re-remove some pre-auth compression bits
This time, make sure to not remove things that are necessary for
pre-auth compression on the client. Add a comment that pre-auth
compression is still supported in the client.
ok markus@
OpenBSD-Commit-ID:
282c6fec7201f18a5c333bbb68d9339734d2f784
Damien Miller [Tue, 10 Jul 2018 09:39:52 +0000 (19:39 +1000)]
Adapt portable to legacy buffer API removal
djm@openbsd.org [Tue, 10 Jul 2018 09:13:30 +0000 (09:13 +0000)]
upstream: kerberos/gssapi fixes for buffer removal
OpenBSD-Commit-ID:
1cdf56fec95801e4563c47f21696f04cd8b60c4c
djm@openbsd.org [Tue, 10 Jul 2018 06:45:29 +0000 (06:45 +0000)]
upstream: buffer.[ch] and bufaux.c are no more
OpenBSD-Commit-ID:
d1a1852284e554f39525eb4d4891b207cfb3d3a0
djm@openbsd.org [Tue, 10 Jul 2018 06:43:52 +0000 (06:43 +0000)]
upstream: one mention of Buffer that almost got away :)
OpenBSD-Commit-ID:
30d7c27a90b4544ad5dfacf654595710cd499f02
markus@openbsd.org [Mon, 9 Jul 2018 21:59:10 +0000 (21:59 +0000)]
upstream: replace cast with call to sshbuf_mutable_ptr(); ok djm@
OpenBSD-Commit-ID:
4dfe9d29fa93d9231645c89084f7217304f7ba29
markus@openbsd.org [Mon, 9 Jul 2018 21:56:06 +0000 (21:56 +0000)]
upstream: remove legacy buffer API emulation layer; ok djm@
OpenBSD-Commit-ID:
2dd5dc17cbc23195be4299fa93be2707a0e08ad9
markus@openbsd.org [Mon, 9 Jul 2018 21:53:45 +0000 (21:53 +0000)]
upstream: sshd: switch monitor to sshbuf API; lots of help & ok
djm@
OpenBSD-Commit-ID:
d89bd02d33974fd35ca0b8940d88572227b34a48
markus@openbsd.org [Mon, 9 Jul 2018 21:37:55 +0000 (21:37 +0000)]
upstream: sshd: switch GSSAPI to sshbuf API; ok djm@
OpenBSD-Commit-ID:
e48449ab4be3f006f7ba33c66241b7d652973e30
markus@openbsd.org [Mon, 9 Jul 2018 21:35:50 +0000 (21:35 +0000)]
upstream: sshd: switch authentication to sshbuf API; ok djm@
OpenBSD-Commit-ID:
880aa06bce4b140781e836bb56bec34873290641
markus@openbsd.org [Mon, 9 Jul 2018 21:29:36 +0000 (21:29 +0000)]
upstream: sshd: switch config to sshbuf API; ok djm@
OpenBSD-Commit-ID:
72b02017bac7feac48c9dceff8355056bea300bd
markus@openbsd.org [Mon, 9 Jul 2018 21:26:02 +0000 (21:26 +0000)]
upstream: sshd: switch loginmsg to sshbuf API; ok djm@
OpenBSD-Commit-ID:
f3cb4e54bff15c593602d95cc43e32ee1a4bac42
markus@openbsd.org [Mon, 9 Jul 2018 21:20:26 +0000 (21:20 +0000)]
upstream: ttymodes: switch to sshbuf API; ok djm@
OpenBSD-Commit-ID:
5df340c5965e822c9da21e19579d08dea3cbe429
markus@openbsd.org [Mon, 9 Jul 2018 21:18:10 +0000 (21:18 +0000)]
upstream: client: switch mux to sshbuf API; with & ok djm@
OpenBSD-Commit-ID:
5948fb98d704f9c4e075b92edda64e0290b5feb2
markus@openbsd.org [Mon, 9 Jul 2018 21:03:30 +0000 (21:03 +0000)]
upstream: client: switch to sshbuf API; ok djm@
OpenBSD-Commit-ID:
60cb0356114acc7625ab85105f6f6a7cd44a8d05
markus@openbsd.org [Mon, 9 Jul 2018 20:39:28 +0000 (20:39 +0000)]
upstream: pkcs11: switch to sshbuf API; ok djm@
OpenBSD-Commit-ID:
98cc4e800f1617c51caf59a6cb3006f14492db79
sf@openbsd.org [Mon, 9 Jul 2018 13:37:10 +0000 (13:37 +0000)]
upstream: Revert previous two commits
It turns out we still support pre-auth compression on the client.
Therefore revert the previous two commits:
date: 2018/07/06 09:06:14; author: sf; commitid: yZVYKIRtUZWD9CmE;
Rename COMP_DELAYED to COMP_ZLIB
Only delayed compression is supported nowadays.
ok markus@
date: 2018/07/06 09:05:01; author: sf; commitid: rEGuT5UgI9f6kddP;
Remove leftovers from pre-authentication compression
Support for this has been removed in 2016.
COMP_DELAYED will be renamed in a later commit.
ok markus@
OpenBSD-Commit-ID:
cdfef526357e4e1483c86cf599491b2dafb77772
sf@openbsd.org [Fri, 6 Jul 2018 09:06:14 +0000 (09:06 +0000)]
upstream: Rename COMP_DELAYED to COMP_ZLIB
Only delayed compression is supported nowadays.
ok markus@
OpenBSD-Commit-ID:
5b1dbaf3d9a4085aaa10fec0b7a4364396561821
sf@openbsd.org [Fri, 6 Jul 2018 09:05:01 +0000 (09:05 +0000)]
upstream: Remove leftovers from pre-authentication compression
Support for this has been removed in 2016.
COMP_DELAYED will be renamed in a later commit.
ok markus@
OpenBSD-Commit-ID:
6a99616c832627157113fcb0cf5a752daf2e6b58
sf@openbsd.org [Fri, 6 Jul 2018 09:03:02 +0000 (09:03 +0000)]
upstream: Remove unused ssh_packet_start_compression()
ok markus@
OpenBSD-Commit-ID:
9d34cf2f59aca5422021ae2857190578187dc2b4
Darren Tucker [Fri, 6 Jul 2018 03:32:02 +0000 (13:32 +1000)]
Defer setting bufsiz in getdelim.
Do not write to bufsiz until we are sure the malloc has succeeded,
in case any callers rely on it (which they shouldn't). ok djm@
Darren Tucker [Thu, 5 Jul 2018 03:32:01 +0000 (13:32 +1000)]
Fix other callers of read_environment_file.
read_environment_file recently gained an extra argument Some platform
specific code also calls it so add the argument to those too. Fixes
build on Solaris and AIX.
djm@openbsd.org [Wed, 4 Jul 2018 13:51:45 +0000 (13:51 +0000)]
upstream: deal with API rename: match_filter_list() =>
match_filter_blacklist()
OpenBSD-Regress-ID:
2da342be913efeb51806351af906fab01ba4367f
djm@openbsd.org [Wed, 4 Jul 2018 13:51:12 +0000 (13:51 +0000)]
upstream: exercise new expansion behaviour of
PubkeyAcceptedKeyTypes and, by proxy, test kex_assemble_names()
ok markus@
OpenBSD-Regress-ID:
292978902e14d5729aa87e492dd166c842f72736
djm@openbsd.org [Tue, 3 Jul 2018 13:53:26 +0000 (13:53 +0000)]
upstream: add a comment that could have saved me 45 minutes of wild
goose chasing
OpenBSD-Regress-ID:
d469b29ffadd3402c090e21b792d627d46fa5297
djm@openbsd.org [Wed, 4 Jul 2018 13:49:31 +0000 (13:49 +0000)]
upstream: repair PubkeyAcceptedKeyTypes (and friends) after RSA
signature work - returns ability to add/remove/specify algorithms by
wildcard.
Algorithm lists are now fully expanded when the server/client configs
are finalised, so errors are reported early and the config dumps
(e.g. "ssh -G ...") now list the actual algorithms selected.
Clarify that, while wildcards are accepted in algorithm lists, they
aren't full pattern-lists that support negation.
(lots of) feedback, ok markus@
OpenBSD-Commit-ID:
a8894c5c81f399a002f02ff4fe6b4fa46b1f3207
djm@openbsd.org [Tue, 3 Jul 2018 11:43:49 +0000 (11:43 +0000)]
upstream: some magic for RSA-SHA2 checks
OpenBSD-Regress-ID:
e5a9b11368ff6d86e7b25ad10ebe43359b471cd4
Damien Miller [Tue, 3 Jul 2018 13:27:11 +0000 (23:27 +1000)]
depend
djm@openbsd.org [Tue, 3 Jul 2018 13:20:25 +0000 (13:20 +0000)]
upstream: some finesse to fix RSA-SHA2 certificate authentication
for certs hosted in ssh-agent
OpenBSD-Commit-ID:
e5fd5edd726137dda2d020e1cdebc464110a010f
djm@openbsd.org [Tue, 3 Jul 2018 13:07:58 +0000 (13:07 +0000)]
upstream: check correct variable; unbreak agent keys
OpenBSD-Commit-ID:
c36981fdf1f3ce04966d3310826a3e1e6233d93e
djm@openbsd.org [Tue, 3 Jul 2018 11:42:12 +0000 (11:42 +0000)]
upstream: crank version number to 7.8; needed for new compat flag
for prior version; part of RSA-SHA2 strictification, ok markus@
OpenBSD-Commit-ID:
84a11fc0efd2674c050712336b5093f5d408e32b
djm@openbsd.org [Tue, 3 Jul 2018 11:39:54 +0000 (11:39 +0000)]
upstream: Improve strictness and control over RSA-SHA2 signature
In ssh, when an agent fails to return a RSA-SHA2 signature when
requested and falls back to RSA-SHA1 instead, retry the signature to
ensure that the public key algorithm sent in the SSH_MSG_USERAUTH
matches the one in the signature itself.
In sshd, strictly enforce that the public key algorithm sent in the
SSH_MSG_USERAUTH message matches what appears in the signature.
Make the sshd_config PubkeyAcceptedKeyTypes and
HostbasedAcceptedKeyTypes options control accepted signature algorithms
(previously they selected supported key types). This allows these
options to ban RSA-SHA1 in favour of RSA-SHA2.
Add new signature algorithms "rsa-sha2-256-cert-v01@openssh.com" and
"rsa-sha2-512-cert-v01@openssh.com" to force use of RSA-SHA2 signatures
with certificate keys.
feedback and ok markus@
OpenBSD-Commit-ID:
c6e9f6d45eed8962ad502d315d7eaef32c419dde
djm@openbsd.org [Tue, 3 Jul 2018 10:59:35 +0000 (10:59 +0000)]
upstream: allow sshd_config PermitUserEnvironment to accept a
pattern-list of whitelisted environment variable names in addition to yes|no.
bz#1800, feedback and ok markus@
OpenBSD-Commit-ID:
77dc2b468e0bf04b53f333434ba257008a1fdf24
millert@openbsd.org [Tue, 26 Jun 2018 11:23:59 +0000 (11:23 +0000)]
upstream: Fix "WARNING: line 6 disappeared in /etc/moduli, giving up"
when choosing a prime. An extra increment of linenum snuck in as part of the
conversion to getline(). OK djm@ markus@
OpenBSD-Commit-ID:
0019225cb52ed621b71cd9f19ee2e78e57e3dd38
dtucker@openbsd.org [Mon, 2 Jul 2018 14:13:30 +0000 (14:13 +0000)]
upstream: One ampersand is enough to backgroud an process. OpenBSD
doesn't seem to mind, but some platforms in -portable object to the second.
OpenBSD-Regress-ID:
d6c3e404871764343761dc25c3bbe29c2621ff74
Darren Tucker [Mon, 2 Jul 2018 11:16:58 +0000 (21:16 +1000)]
Add implementation of getline.
Add getline for the benefit of platforms that don't have it. Sourced
from NetBSD (OpenBSD's implementation is a little too chummy with the
internals of FILE).
djm@openbsd.org [Tue, 26 Jun 2018 02:02:36 +0000 (02:02 +0000)]
upstream: whitespace
OpenBSD-Commit-ID:
9276951caf4daf555f6d262e95720e7f79244572
djm@openbsd.org [Mon, 25 Jun 2018 22:28:33 +0000 (22:28 +0000)]
upstream: fix NULL dereference in open_listen_match_tcpip()
OpenBSD-Commit-ID:
c968c1d29e392352383c0f9681fcc1e93620c4a9
jmc@openbsd.org [Tue, 19 Jun 2018 05:36:57 +0000 (05:36 +0000)]
djm@openbsd.org [Tue, 19 Jun 2018 03:02:17 +0000 (03:02 +0000)]
upstream: test PermitListen with bare port numbers
OpenBSD-Regress-ID:
4b50a02dfb0ccaca08247f3877c444126ba901b3
djm@openbsd.org [Tue, 19 Jun 2018 02:59:41 +0000 (02:59 +0000)]
upstream: allow bare port numbers to appear in PermitListen directives,
e.g.
PermitListen 2222 8080
is equivalent to:
PermitListen *:2222 *:8080
Some bonus manpage improvements, mostly from markus@
"looks fine" markus@
OpenBSD-Commit-ID:
6546b0cc5aab7f53d65ad0a348ca0ae591d6dd24
djm@openbsd.org [Fri, 15 Jun 2018 07:01:11 +0000 (07:01 +0000)]
upstream: invalidate supplemental group cache used by
temporarily_use_uid() when the target uid differs; could cause failure to
read authorized_keys under some configurations. patch by Jakub Jelen via
bz2873; ok dtucker, markus
OpenBSD-Commit-ID:
48a345f0ee90f6c465a078eb5e89566b23abd8a1
djm@openbsd.org [Sun, 10 Jun 2018 23:45:41 +0000 (23:45 +0000)]
upstream: unbreak SendEnv; patch from tb@
OpenBSD-Commit-ID:
fc808daced813242563b80976e1478de95940056
jmc@openbsd.org [Sat, 9 Jun 2018 06:36:31 +0000 (06:36 +0000)]
upstream: sort previous;
OpenBSD-Commit-ID:
27d80d8b8ca99bc33971dee905e8ffd0053ec411
djm@openbsd.org [Sat, 9 Jun 2018 03:18:11 +0000 (03:18 +0000)]
upstream: slightly better wording re handing of $TERM, from Jakub
Jelen via bz2386
OpenBSD-Commit-ID:
14bea3f069a93c8be66a7b97794255a91fece964
djm@openbsd.org [Sat, 9 Jun 2018 03:03:10 +0000 (03:03 +0000)]
upstream: add a SetEnv directive for sshd_config to allow an
administrator to explicitly specify environment variables set in sessions
started by sshd. These override the default environment and any variables set
by user configuration (PermitUserEnvironment, etc), but not the SSH_*
variables set by sshd itself.
ok markus@
OpenBSD-Commit-ID:
b6a96c0001ccd7dd211df6cae9e961c20fd718c0
djm@openbsd.org [Sat, 9 Jun 2018 03:01:12 +0000 (03:01 +0000)]
upstream: add a SetEnv directive to ssh_config that allows setting
environment variables for the remote session (subject to the server accepting
them)
refactor SendEnv to remove the arbitrary limit of variable names.
ok markus@
OpenBSD-Commit-ID:
cfbb00d9b0e10c1ffff1d83424351fd961d1f2be
djm@openbsd.org [Sat, 9 Jun 2018 02:58:02 +0000 (02:58 +0000)]
upstream: reorder child environment preparation so that variables
read from ~/.ssh/environment (if enabled) do not override SSH_* variables set
by the server.
OpenBSD-Commit-ID:
59f9d4c213cdcef2ef21f4b4ae006594dcf2aa7a
djm@openbsd.org [Fri, 8 Jun 2018 03:35:36 +0000 (03:35 +0000)]
upstream: fix incorrect expansion of %i in
load_public_identity_files(); reported by Roumen Petrov
OpenBSD-Commit-ID:
a827289e77149b5e0850d72a350c8b0300e7ef25
djm@openbsd.org [Fri, 8 Jun 2018 01:55:40 +0000 (01:55 +0000)]
upstream: fix some over-long lines and __func__ up some debug
messages
OpenBSD-Commit-ID:
c70a60b4c8207d9f242fc2351941ba50916bb267
jmc@openbsd.org [Thu, 7 Jun 2018 11:26:14 +0000 (11:26 +0000)]
upstream: tweak previous;
OpenBSD-Commit-ID:
f98f16af10b28e24bcecb806cb71ea994b648fd6
Darren Tucker [Fri, 8 Jun 2018 07:43:36 +0000 (17:43 +1000)]
Remove ability to override $LD.
Since autoconf always uses $CC to link C programs, allowing users to
override LD caused mismatches between what LD_LINK_IFELSE thought worked
and what ld thought worked. If you do need to do this kind of thing you
need to set a compiler flag such as gcc's -fuse-ld in LDFLAGS.
Darren Tucker [Fri, 8 Jun 2018 03:55:59 +0000 (13:55 +1000)]
Better detection of unsupported compiler options.
Should prevent "unsupported -Wl,-z,retpoline" warnings during linking.
ok djm@
djm@openbsd.org [Thu, 7 Jun 2018 14:29:43 +0000 (14:29 +0000)]
upstream: test the correct configuration option name
OpenBSD-Regress-ID:
492279ea9f65657f97a970e0e7c7fd0b339fee23
djm@openbsd.org [Thu, 7 Jun 2018 09:26:42 +0000 (09:26 +0000)]
upstream: some permitlisten fixes from markus@ that I missed in my
insomnia-fueled commits last night
OpenBSD-Commit-ID:
26f23622e928996086e85b1419cc1c0f136e359c
djm@openbsd.org [Thu, 7 Jun 2018 04:46:34 +0000 (04:46 +0000)]
upstream: permitlisten/PermitListen unit test from Markus
OpenBSD-Regress-ID:
ab12eb42f0e14926980441cf7c058a6d1d832ea5
djm@openbsd.org [Thu, 7 Jun 2018 04:31:51 +0000 (04:31 +0000)]
upstream: fix regression caused by recent permitlisten option commit:
authorized_keys lines that contained permitopen/permitlisten were being
treated as invalid.
OpenBSD-Commit-ID:
7ef41d63a5a477b405d142dc925b67d9e7aaa31b
markus@openbsd.org [Wed, 6 Jun 2018 18:29:18 +0000 (18:29 +0000)]
upstream: switch config file parsing to getline(3) as this avoids
static limits noted by gerhard@; ok dtucker@, djm@
OpenBSD-Commit-ID:
6d702eabef0fa12e5a1d75c334a8c8b325298b5c
djm@openbsd.org [Wed, 6 Jun 2018 18:25:33 +0000 (18:25 +0000)]
upstream: regress test for PermitOpen
OpenBSD-Regress-ID:
ce8b5f28fc039f09bb297fc4a92319e65982ddaf
djm@openbsd.org [Wed, 6 Jun 2018 18:24:15 +0000 (18:24 +0000)]
upstream: man bits for permitlisten authorized_keys option
OpenBSD-Commit-ID:
86910af8f781a4ac5980fea125442eb25466dd78
djm@openbsd.org [Wed, 6 Jun 2018 18:24:00 +0000 (18:24 +0000)]
upstream: man bits for PermitListen
OpenBSD-Commit-ID:
35b200cba4e46a16a4db6a80ef11838ab0fad67c
djm@openbsd.org [Wed, 6 Jun 2018 18:23:32 +0000 (18:23 +0000)]
upstream: permitlisten option for authorized_keys; ok markus@
OpenBSD-Commit-ID:
8650883018d7aa893173d703379e4456a222c672
djm@openbsd.org [Wed, 6 Jun 2018 18:22:41 +0000 (18:22 +0000)]
upstream: Add a PermitListen directive to control which server-side
addresses may be listened on when the client requests remote forwarding (ssh
-R).
This is the converse of the existing PermitOpen directive and this
includes some refactoring to share much of its implementation.
feedback and ok markus@
OpenBSD-Commit-ID:
15a931238c61a3f2ac74ea18a98c933e358e277f
Darren Tucker [Wed, 6 Jun 2018 06:04:29 +0000 (16:04 +1000)]
Use ssh-keygen -A to generate missing host keys.
Instead of testing for each specific key type, use ssh-keygen -A to
generate any missing host key types.
jmc@openbsd.org [Fri, 1 Jun 2018 06:23:10 +0000 (06:23 +0000)]
upstream: add missing punctuation after %i in ssh_config.5, and
make the grammatical format in sshd_config.5 match that in ssh_config.5;
OpenBSD-Commit-ID:
e325663b9342f3d556e223e5306e0d5fa1a74fa0
jmc@openbsd.org [Fri, 1 Jun 2018 05:52:26 +0000 (05:52 +0000)]
upstream: oops - further adjustment to text neccessary;
OpenBSD-Commit-ID:
23585576c807743112ab956be0fb3c786bdef025
jmc@openbsd.org [Fri, 1 Jun 2018 05:50:18 +0000 (05:50 +0000)]
upstream: %U needs to be escaped; tweak text;
OpenBSD-Commit-ID:
30887b73ece257273fb619ab6f4e86dc92ddc15e
dtucker@openbsd.org [Fri, 1 Jun 2018 04:31:48 +0000 (04:31 +0000)]
upstream: Apply umask to all incoming files and directories not
just files. This makes sure it gets applied to directories too, and prevents
a race where files get chmodded after creation. bz#2839, ok djm@
OpenBSD-Commit-ID:
3168ee6c7c39093adac4fd71039600cfa296203b
djm@openbsd.org [Fri, 1 Jun 2018 03:52:37 +0000 (03:52 +0000)]
upstream: Adapt to extra default verboisity from ssh-keygen when
searching for and hashing known_hosts entries in a single operation
(ssh-keygen -HF ...) Patch from Anton Kremenetsky
OpenBSD-Regress-ID:
519585a4de35c4611285bd6a7272766c229b19dd
djm@openbsd.org [Tue, 22 May 2018 00:22:49 +0000 (00:22 +0000)]
upstream: Add TEST_SSH_FAIL_FATAL variable, to force all failures
to instantly abort the test. Useful in capturing clean logs for individual
failure cases.
OpenBSD-Regress-ID:
feba18cf338c2328b9601bd4093cabdd9baa3af1
dtucker@openbsd.org [Fri, 11 May 2018 03:51:06 +0000 (03:51 +0000)]
upstream: Clean up comment.
OpenBSD-Regress-ID:
6adb35f384d447e7dcb9f170d4f0d546d3973e10
djm@openbsd.org [Fri, 1 Jun 2018 04:21:29 +0000 (04:21 +0000)]
upstream: whitespace
OpenBSD-Commit-ID:
e5edb5e843ddc9b73a8e46518899be41d5709add
djm@openbsd.org [Fri, 1 Jun 2018 04:05:29 +0000 (04:05 +0000)]
upstream: make ssh_remote_ipaddr() capable of being called after
the ssh->state has been torn down; bz#2773
OpenBSD-Commit-ID:
167f12523613ca3d16d7716a690e7afa307dc7eb
djm@openbsd.org [Fri, 1 Jun 2018 03:51:34 +0000 (03:51 +0000)]
upstream: return correct exit code when searching for and hashing
known_hosts entries in a single operation (ssh-keygen -HF hostname); bz2772
Report and fix from Anton Kremenetsky
OpenBSD-Commit-ID:
ac10ca13eb9bb0bc50fcd42ad11c56c317437b58
djm@openbsd.org [Fri, 1 Jun 2018 03:33:53 +0000 (03:33 +0000)]
upstream: make UID available as a %-expansion everywhere that the
username is available currently. In the client this is via %i, in the server
%U (since %i was already used in the client in some places for this, but used
for something different in the server); bz#2870, ok dtucker@
OpenBSD-Commit-ID:
c7e912b0213713316cb55db194b3a6415b3d4b95
djm@openbsd.org [Fri, 1 Jun 2018 03:11:49 +0000 (03:11 +0000)]
upstream: prefer argv0 to "ssh" when re-executing ssh for ProxyJump
directive; bz2831, feedback and ok dtucker@
OpenBSD-Commit-ID:
3cec709a131499fbb0c1ea8a0a9e0b0915ce769e
djm@openbsd.org [Fri, 25 May 2018 07:11:01 +0000 (07:11 +0000)]
upstream: Do not ban PTY allocation when a sshd session is restricted
because the user password is expired as it breaks password change dialog.
regression in openssh-7.7 reported by Daniel Wagner
OpenBSD-Commit-ID:
9fc09c584c6f1964b00595e3abe7f83db4d90d73
djm@openbsd.org [Fri, 25 May 2018 04:25:46 +0000 (04:25 +0000)]
upstream: Fix return value confusion in several functions (readdir,
download and fsync). These should return -1 on error, not a sftp status code.
patch from Petr Cerny in bz#2871
OpenBSD-Commit-ID:
651aa0220ad23c9167d9297a436162d741f97a09
dtucker@openbsd.org [Fri, 25 May 2018 03:20:59 +0000 (03:20 +0000)]
upstream: If select() fails in ssh_packet_read_seqnr go directly to
the error path instead of trying to read from the socket on the way out,
which resets errno and causes the true error to be misreported. ok djm@
OpenBSD-Commit-ID:
2614edaadbd05a957aa977728aa7a030af7c6f0a