]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
7 years agoInclude unistd.h for geteuid declaration.
Darren Tucker [Fri, 13 Jul 2018 03:40:20 +0000 (13:40 +1000)] 
Include unistd.h for geteuid declaration.

7 years agoFallout from buffer conversion in AUDIT_EVENTS.
Darren Tucker [Fri, 13 Jul 2018 03:38:10 +0000 (13:38 +1000)] 
Fallout from buffer conversion in AUDIT_EVENTS.

Supply missing "int r" and fix error path for sshbuf_new().

7 years agoupstream: make this use ssh_proxy rather than starting/stopping a
djm@openbsd.org [Fri, 13 Jul 2018 02:13:50 +0000 (02:13 +0000)] 
upstream: make this use ssh_proxy rather than starting/stopping a

daemon for each testcase

OpenBSD-Regress-ID: 608b7655ea65b1ba8fff5a13ce9caa60ef0c8166

7 years agoupstream: fix leaks in unit test; with this, all unit tests are
djm@openbsd.org [Fri, 13 Jul 2018 02:13:19 +0000 (02:13 +0000)] 
upstream: fix leaks in unit test; with this, all unit tests are

leak free (as far as valgrind can spot anyway)

OpenBSD-Regress-ID: b824d8b27998365379963440e5d18b95ca03aa17

7 years agoEnable leak checks for unit tests with valgrind
Damien Miller [Fri, 13 Jul 2018 01:39:25 +0000 (11:39 +1000)] 
Enable leak checks for unit tests with valgrind

Leave the leak checking on unconditionally when running with valgrind.
The unit tests are leak-free and I want them to stay that way.

7 years agoincrease timeout to match cfgmatch.sh
Damien Miller [Fri, 13 Jul 2018 01:38:59 +0000 (11:38 +1000)] 
increase timeout to match cfgmatch.sh

lets test pass under valgrind (on my workstation at least)

7 years agorm regress/misc/kexfuzz/*.o in distclean target
Damien Miller [Thu, 12 Jul 2018 04:54:18 +0000 (14:54 +1000)] 
rm regress/misc/kexfuzz/*.o in distclean target

7 years agorepair !WITH_OPENSSL build
Damien Miller [Thu, 12 Jul 2018 04:49:26 +0000 (14:49 +1000)] 
repair !WITH_OPENSSL build

7 years agomissing headers
Damien Miller [Thu, 12 Jul 2018 04:49:14 +0000 (14:49 +1000)] 
missing headers

7 years agoRemove key.h from portable files too.
Darren Tucker [Thu, 12 Jul 2018 04:57:46 +0000 (14:57 +1000)] 
Remove key.h from portable files too.

Commit 5467fbcb removed key.h so stop including it in portable files
too.  Fixes builds on lots of platforms.

7 years agoupstream: remove prototype to long-gone function
djm@openbsd.org [Thu, 12 Jul 2018 04:35:25 +0000 (04:35 +0000)] 
upstream: remove prototype to long-gone function

OpenBSD-Commit-ID: 0414642ac7ce01d176b9f359091a66a8bbb640bd

7 years agoupstream: treat ssh_packet_write_wait() errors as fatal; ok djm@
markus@openbsd.org [Wed, 11 Jul 2018 18:55:11 +0000 (18:55 +0000)] 
upstream: treat ssh_packet_write_wait() errors as fatal; ok djm@

OpenBSD-Commit-ID: f88ba43c9d54ed2d911218aa8d3f6285430629c3

7 years agoupstream: remove legacy key emulation layer; ok djm@
markus@openbsd.org [Wed, 11 Jul 2018 18:53:29 +0000 (18:53 +0000)] 
upstream: remove legacy key emulation layer; ok djm@

OpenBSD-Commit-ID: 2b1f9619259e222bbd4fe9a8d3a0973eafb9dd8d

7 years agoupstream: s/wuth/with/ in comment
martijn@openbsd.org [Wed, 11 Jul 2018 08:19:35 +0000 (08:19 +0000)] 
upstream: s/wuth/with/ in comment

OpenBSD-Commit-ID: 9de41468afd75f54a7f47809d2ad664aa577902c

7 years agoInclude stdlib.h for declaration of free.
Darren Tucker [Wed, 11 Jul 2018 02:12:38 +0000 (12:12 +1000)] 
Include stdlib.h for declaration of free.

Fixes build with -Werror on at least Fedora and probably others.

7 years agoVALGRIND_CHECK_LEAKS logic was backwards :(
Damien Miller [Wed, 11 Jul 2018 00:19:56 +0000 (10:19 +1000)] 
VALGRIND_CHECK_LEAKS logic was backwards :(

7 years agoFix sshbuf_new error path in skey.
Darren Tucker [Wed, 11 Jul 2018 00:10:26 +0000 (10:10 +1000)] 
Fix sshbuf_new error path in skey.

7 years agoSupply missing third arg in skey.
Darren Tucker [Wed, 11 Jul 2018 00:06:18 +0000 (10:06 +1000)] 
Supply missing third arg in skey.

During the change to the new buffer api the third arg to
sshbuf_get_cstring was ommitted.  Fixes build when configured with skey.

7 years agoSupply some more missing "int r" in skey
Darren Tucker [Wed, 11 Jul 2018 00:03:34 +0000 (10:03 +1000)] 
Supply some more missing "int r" in skey

7 years agodisable valgrind memleak checking by default
Damien Miller [Tue, 10 Jul 2018 23:56:36 +0000 (09:56 +1000)] 
disable valgrind memleak checking by default

Add VALGRIND_CHECK_LEAKS knob to turn it back on.

7 years agoSupply missing "int r" in skey code.
Darren Tucker [Tue, 10 Jul 2018 23:54:00 +0000 (09:54 +1000)] 
Supply missing "int r" in skey code.

7 years agoupstream: re-remove some pre-auth compression bits
sf@openbsd.org [Tue, 10 Jul 2018 09:36:58 +0000 (09:36 +0000)] 
upstream: re-remove some pre-auth compression bits

This time, make sure to not remove things that are necessary for
pre-auth compression on the client. Add a comment that pre-auth
compression is still supported in the client.

ok markus@

OpenBSD-Commit-ID: 282c6fec7201f18a5c333bbb68d9339734d2f784

7 years agoAdapt portable to legacy buffer API removal
Damien Miller [Tue, 10 Jul 2018 09:39:52 +0000 (19:39 +1000)] 
Adapt portable to legacy buffer API removal

7 years agoupstream: kerberos/gssapi fixes for buffer removal
djm@openbsd.org [Tue, 10 Jul 2018 09:13:30 +0000 (09:13 +0000)] 
upstream: kerberos/gssapi fixes for buffer removal

OpenBSD-Commit-ID: 1cdf56fec95801e4563c47f21696f04cd8b60c4c

7 years agoupstream: buffer.[ch] and bufaux.c are no more
djm@openbsd.org [Tue, 10 Jul 2018 06:45:29 +0000 (06:45 +0000)] 
upstream: buffer.[ch] and bufaux.c are no more

OpenBSD-Commit-ID: d1a1852284e554f39525eb4d4891b207cfb3d3a0

7 years agoupstream: one mention of Buffer that almost got away :)
djm@openbsd.org [Tue, 10 Jul 2018 06:43:52 +0000 (06:43 +0000)] 
upstream: one mention of Buffer that almost got away :)

OpenBSD-Commit-ID: 30d7c27a90b4544ad5dfacf654595710cd499f02

7 years agoupstream: replace cast with call to sshbuf_mutable_ptr(); ok djm@
markus@openbsd.org [Mon, 9 Jul 2018 21:59:10 +0000 (21:59 +0000)] 
upstream: replace cast with call to sshbuf_mutable_ptr(); ok djm@

OpenBSD-Commit-ID: 4dfe9d29fa93d9231645c89084f7217304f7ba29

7 years agoupstream: remove legacy buffer API emulation layer; ok djm@
markus@openbsd.org [Mon, 9 Jul 2018 21:56:06 +0000 (21:56 +0000)] 
upstream: remove legacy buffer API emulation layer; ok djm@

OpenBSD-Commit-ID: 2dd5dc17cbc23195be4299fa93be2707a0e08ad9

7 years agoupstream: sshd: switch monitor to sshbuf API; lots of help & ok
markus@openbsd.org [Mon, 9 Jul 2018 21:53:45 +0000 (21:53 +0000)] 
upstream: sshd: switch monitor to sshbuf API; lots of help & ok

djm@

OpenBSD-Commit-ID: d89bd02d33974fd35ca0b8940d88572227b34a48

7 years agoupstream: sshd: switch GSSAPI to sshbuf API; ok djm@
markus@openbsd.org [Mon, 9 Jul 2018 21:37:55 +0000 (21:37 +0000)] 
upstream: sshd: switch GSSAPI to sshbuf API; ok djm@

OpenBSD-Commit-ID: e48449ab4be3f006f7ba33c66241b7d652973e30

7 years agoupstream: sshd: switch authentication to sshbuf API; ok djm@
markus@openbsd.org [Mon, 9 Jul 2018 21:35:50 +0000 (21:35 +0000)] 
upstream: sshd: switch authentication to sshbuf API; ok djm@

OpenBSD-Commit-ID: 880aa06bce4b140781e836bb56bec34873290641

7 years agoupstream: sshd: switch config to sshbuf API; ok djm@
markus@openbsd.org [Mon, 9 Jul 2018 21:29:36 +0000 (21:29 +0000)] 
upstream: sshd: switch config to sshbuf API; ok djm@

OpenBSD-Commit-ID: 72b02017bac7feac48c9dceff8355056bea300bd

7 years agoupstream: sshd: switch loginmsg to sshbuf API; ok djm@
markus@openbsd.org [Mon, 9 Jul 2018 21:26:02 +0000 (21:26 +0000)] 
upstream: sshd: switch loginmsg to sshbuf API; ok djm@

OpenBSD-Commit-ID: f3cb4e54bff15c593602d95cc43e32ee1a4bac42

7 years agoupstream: ttymodes: switch to sshbuf API; ok djm@
markus@openbsd.org [Mon, 9 Jul 2018 21:20:26 +0000 (21:20 +0000)] 
upstream: ttymodes: switch to sshbuf API; ok djm@

OpenBSD-Commit-ID: 5df340c5965e822c9da21e19579d08dea3cbe429

7 years agoupstream: client: switch mux to sshbuf API; with & ok djm@
markus@openbsd.org [Mon, 9 Jul 2018 21:18:10 +0000 (21:18 +0000)] 
upstream: client: switch mux to sshbuf API; with & ok djm@

OpenBSD-Commit-ID: 5948fb98d704f9c4e075b92edda64e0290b5feb2

7 years agoupstream: client: switch to sshbuf API; ok djm@
markus@openbsd.org [Mon, 9 Jul 2018 21:03:30 +0000 (21:03 +0000)] 
upstream: client: switch to sshbuf API; ok djm@

OpenBSD-Commit-ID: 60cb0356114acc7625ab85105f6f6a7cd44a8d05

7 years agoupstream: pkcs11: switch to sshbuf API; ok djm@
markus@openbsd.org [Mon, 9 Jul 2018 20:39:28 +0000 (20:39 +0000)] 
upstream: pkcs11: switch to sshbuf API; ok djm@

OpenBSD-Commit-ID: 98cc4e800f1617c51caf59a6cb3006f14492db79

7 years agoupstream: Revert previous two commits
sf@openbsd.org [Mon, 9 Jul 2018 13:37:10 +0000 (13:37 +0000)] 
upstream: Revert previous two commits

It turns out we still support pre-auth compression on the client.
Therefore revert the previous two commits:

date: 2018/07/06 09:06:14;  author: sf;  commitid: yZVYKIRtUZWD9CmE;
 Rename COMP_DELAYED to COMP_ZLIB

 Only delayed compression is supported nowadays.

 ok markus@

date: 2018/07/06 09:05:01;  author: sf;  commitid: rEGuT5UgI9f6kddP;
 Remove leftovers from pre-authentication compression

 Support for this has been removed in 2016.
 COMP_DELAYED will be renamed in a later commit.

 ok markus@

OpenBSD-Commit-ID: cdfef526357e4e1483c86cf599491b2dafb77772

7 years agoupstream: Rename COMP_DELAYED to COMP_ZLIB
sf@openbsd.org [Fri, 6 Jul 2018 09:06:14 +0000 (09:06 +0000)] 
upstream: Rename COMP_DELAYED to COMP_ZLIB

Only delayed compression is supported nowadays.

ok markus@

OpenBSD-Commit-ID: 5b1dbaf3d9a4085aaa10fec0b7a4364396561821

7 years agoupstream: Remove leftovers from pre-authentication compression
sf@openbsd.org [Fri, 6 Jul 2018 09:05:01 +0000 (09:05 +0000)] 
upstream: Remove leftovers from pre-authentication compression

Support for this has been removed in 2016.
COMP_DELAYED will be renamed in a later commit.

ok markus@

OpenBSD-Commit-ID: 6a99616c832627157113fcb0cf5a752daf2e6b58

7 years agoupstream: Remove unused ssh_packet_start_compression()
sf@openbsd.org [Fri, 6 Jul 2018 09:03:02 +0000 (09:03 +0000)] 
upstream: Remove unused ssh_packet_start_compression()

ok markus@

OpenBSD-Commit-ID: 9d34cf2f59aca5422021ae2857190578187dc2b4

7 years agoDefer setting bufsiz in getdelim.
Darren Tucker [Fri, 6 Jul 2018 03:32:02 +0000 (13:32 +1000)] 
Defer setting bufsiz in getdelim.

Do not write to bufsiz until we are sure the malloc has succeeded,
in case any callers rely on it (which they shouldn't).  ok djm@

7 years agoFix other callers of read_environment_file.
Darren Tucker [Thu, 5 Jul 2018 03:32:01 +0000 (13:32 +1000)] 
Fix other callers of read_environment_file.

read_environment_file recently gained an extra argument   Some platform
specific code also calls it so add the argument to those too.  Fixes
build on Solaris and AIX.

7 years agoupstream: deal with API rename: match_filter_list() =>
djm@openbsd.org [Wed, 4 Jul 2018 13:51:45 +0000 (13:51 +0000)] 
upstream: deal with API rename: match_filter_list() =>

match_filter_blacklist()

OpenBSD-Regress-ID: 2da342be913efeb51806351af906fab01ba4367f

7 years agoupstream: exercise new expansion behaviour of
djm@openbsd.org [Wed, 4 Jul 2018 13:51:12 +0000 (13:51 +0000)] 
upstream: exercise new expansion behaviour of

PubkeyAcceptedKeyTypes and, by proxy, test kex_assemble_names()

ok markus@

OpenBSD-Regress-ID: 292978902e14d5729aa87e492dd166c842f72736

7 years agoupstream: add a comment that could have saved me 45 minutes of wild
djm@openbsd.org [Tue, 3 Jul 2018 13:53:26 +0000 (13:53 +0000)] 
upstream: add a comment that could have saved me 45 minutes of wild

goose chasing

OpenBSD-Regress-ID: d469b29ffadd3402c090e21b792d627d46fa5297

7 years agoupstream: repair PubkeyAcceptedKeyTypes (and friends) after RSA
djm@openbsd.org [Wed, 4 Jul 2018 13:49:31 +0000 (13:49 +0000)] 
upstream: repair PubkeyAcceptedKeyTypes (and friends) after RSA

signature work - returns ability to add/remove/specify algorithms by
wildcard.

Algorithm lists are now fully expanded when the server/client configs
are finalised, so errors are reported early and the config dumps
(e.g. "ssh -G ...") now list the actual algorithms selected.

Clarify that, while wildcards are accepted in algorithm lists, they
aren't full pattern-lists that support negation.

(lots of) feedback, ok markus@

OpenBSD-Commit-ID: a8894c5c81f399a002f02ff4fe6b4fa46b1f3207

7 years agoupstream: some magic for RSA-SHA2 checks
djm@openbsd.org [Tue, 3 Jul 2018 11:43:49 +0000 (11:43 +0000)] 
upstream: some magic for RSA-SHA2 checks

OpenBSD-Regress-ID: e5a9b11368ff6d86e7b25ad10ebe43359b471cd4

7 years agodepend
Damien Miller [Tue, 3 Jul 2018 13:27:11 +0000 (23:27 +1000)] 
depend

7 years agoupstream: some finesse to fix RSA-SHA2 certificate authentication
djm@openbsd.org [Tue, 3 Jul 2018 13:20:25 +0000 (13:20 +0000)] 
upstream: some finesse to fix RSA-SHA2 certificate authentication

for certs hosted in ssh-agent

OpenBSD-Commit-ID: e5fd5edd726137dda2d020e1cdebc464110a010f

7 years agoupstream: check correct variable; unbreak agent keys
djm@openbsd.org [Tue, 3 Jul 2018 13:07:58 +0000 (13:07 +0000)] 
upstream: check correct variable; unbreak agent keys

OpenBSD-Commit-ID: c36981fdf1f3ce04966d3310826a3e1e6233d93e

7 years agoupstream: crank version number to 7.8; needed for new compat flag
djm@openbsd.org [Tue, 3 Jul 2018 11:42:12 +0000 (11:42 +0000)] 
upstream: crank version number to 7.8; needed for new compat flag

for prior version; part of RSA-SHA2 strictification, ok markus@

OpenBSD-Commit-ID: 84a11fc0efd2674c050712336b5093f5d408e32b

7 years agoupstream: Improve strictness and control over RSA-SHA2 signature
djm@openbsd.org [Tue, 3 Jul 2018 11:39:54 +0000 (11:39 +0000)] 
upstream: Improve strictness and control over RSA-SHA2 signature

In ssh, when an agent fails to return a RSA-SHA2 signature when
requested and falls back to RSA-SHA1 instead, retry the signature to
ensure that the public key algorithm sent in the SSH_MSG_USERAUTH
matches the one in the signature itself.

In sshd, strictly enforce that the public key algorithm sent in the
SSH_MSG_USERAUTH message matches what appears in the signature.

Make the sshd_config PubkeyAcceptedKeyTypes and
HostbasedAcceptedKeyTypes options control accepted signature algorithms
(previously they selected supported key types). This allows these
options to ban RSA-SHA1 in favour of RSA-SHA2.

Add new signature algorithms "rsa-sha2-256-cert-v01@openssh.com" and
"rsa-sha2-512-cert-v01@openssh.com" to force use of RSA-SHA2 signatures
with certificate keys.

feedback and ok markus@

OpenBSD-Commit-ID: c6e9f6d45eed8962ad502d315d7eaef32c419dde

7 years agoupstream: allow sshd_config PermitUserEnvironment to accept a
djm@openbsd.org [Tue, 3 Jul 2018 10:59:35 +0000 (10:59 +0000)] 
upstream: allow sshd_config PermitUserEnvironment to accept a

pattern-list of whitelisted environment variable names in addition to yes|no.

bz#1800, feedback and ok markus@

OpenBSD-Commit-ID: 77dc2b468e0bf04b53f333434ba257008a1fdf24

7 years agoupstream: Fix "WARNING: line 6 disappeared in /etc/moduli, giving up"
millert@openbsd.org [Tue, 26 Jun 2018 11:23:59 +0000 (11:23 +0000)] 
upstream: Fix "WARNING: line 6 disappeared in /etc/moduli, giving up"

when choosing a prime.  An extra increment of linenum snuck in as part of the
conversion to getline().  OK djm@ markus@

OpenBSD-Commit-ID: 0019225cb52ed621b71cd9f19ee2e78e57e3dd38

7 years agoupstream: One ampersand is enough to backgroud an process. OpenBSD
dtucker@openbsd.org [Mon, 2 Jul 2018 14:13:30 +0000 (14:13 +0000)] 
upstream: One ampersand is enough to backgroud an process. OpenBSD

doesn't seem to mind, but some platforms in -portable object to the second.

OpenBSD-Regress-ID: d6c3e404871764343761dc25c3bbe29c2621ff74

7 years agoAdd implementation of getline.
Darren Tucker [Mon, 2 Jul 2018 11:16:58 +0000 (21:16 +1000)] 
Add implementation of getline.

Add getline for the benefit of platforms that don't have it.  Sourced
from NetBSD (OpenBSD's implementation is a little too chummy with the
internals of FILE).

7 years agoupstream: whitespace
djm@openbsd.org [Tue, 26 Jun 2018 02:02:36 +0000 (02:02 +0000)] 
upstream: whitespace

OpenBSD-Commit-ID: 9276951caf4daf555f6d262e95720e7f79244572

7 years agoupstream: fix NULL dereference in open_listen_match_tcpip()
djm@openbsd.org [Mon, 25 Jun 2018 22:28:33 +0000 (22:28 +0000)] 
upstream: fix NULL dereference in open_listen_match_tcpip()

OpenBSD-Commit-ID: c968c1d29e392352383c0f9681fcc1e93620c4a9

7 years agoupstream: spelling;
jmc@openbsd.org [Tue, 19 Jun 2018 05:36:57 +0000 (05:36 +0000)] 
upstream: spelling;

OpenBSD-Commit-ID: db542918185243bea17202383a581851736553cc

7 years agoupstream: test PermitListen with bare port numbers
djm@openbsd.org [Tue, 19 Jun 2018 03:02:17 +0000 (03:02 +0000)] 
upstream: test PermitListen with bare port numbers

OpenBSD-Regress-ID: 4b50a02dfb0ccaca08247f3877c444126ba901b3

7 years agoupstream: allow bare port numbers to appear in PermitListen directives,
djm@openbsd.org [Tue, 19 Jun 2018 02:59:41 +0000 (02:59 +0000)] 
upstream: allow bare port numbers to appear in PermitListen directives,

e.g.

PermitListen 2222 8080

is equivalent to:

PermitListen *:2222 *:8080

Some bonus manpage improvements, mostly from markus@

"looks fine" markus@

OpenBSD-Commit-ID: 6546b0cc5aab7f53d65ad0a348ca0ae591d6dd24

7 years agoupstream: invalidate supplemental group cache used by
djm@openbsd.org [Fri, 15 Jun 2018 07:01:11 +0000 (07:01 +0000)] 
upstream: invalidate supplemental group cache used by

temporarily_use_uid() when the target uid differs; could cause failure to
read authorized_keys under some configurations. patch by Jakub Jelen via
bz2873; ok dtucker, markus

OpenBSD-Commit-ID: 48a345f0ee90f6c465a078eb5e89566b23abd8a1

7 years agoupstream: unbreak SendEnv; patch from tb@
djm@openbsd.org [Sun, 10 Jun 2018 23:45:41 +0000 (23:45 +0000)] 
upstream: unbreak SendEnv; patch from tb@

OpenBSD-Commit-ID: fc808daced813242563b80976e1478de95940056

7 years agoupstream: sort previous;
jmc@openbsd.org [Sat, 9 Jun 2018 06:36:31 +0000 (06:36 +0000)] 
upstream: sort previous;

OpenBSD-Commit-ID: 27d80d8b8ca99bc33971dee905e8ffd0053ec411

7 years agoupstream: slightly better wording re handing of $TERM, from Jakub
djm@openbsd.org [Sat, 9 Jun 2018 03:18:11 +0000 (03:18 +0000)] 
upstream: slightly better wording re handing of $TERM, from Jakub

Jelen via bz2386

OpenBSD-Commit-ID: 14bea3f069a93c8be66a7b97794255a91fece964

7 years agoupstream: add a SetEnv directive for sshd_config to allow an
djm@openbsd.org [Sat, 9 Jun 2018 03:03:10 +0000 (03:03 +0000)] 
upstream: add a SetEnv directive for sshd_config to allow an

administrator to explicitly specify environment variables set in sessions
started by sshd. These override the default environment and any variables set
by user configuration (PermitUserEnvironment, etc), but not the SSH_*
variables set by sshd itself.

ok markus@

OpenBSD-Commit-ID: b6a96c0001ccd7dd211df6cae9e961c20fd718c0

7 years agoupstream: add a SetEnv directive to ssh_config that allows setting
djm@openbsd.org [Sat, 9 Jun 2018 03:01:12 +0000 (03:01 +0000)] 
upstream: add a SetEnv directive to ssh_config that allows setting

environment variables for the remote session (subject to the server accepting
them)

refactor SendEnv to remove the arbitrary limit of variable names.

ok markus@

OpenBSD-Commit-ID: cfbb00d9b0e10c1ffff1d83424351fd961d1f2be

7 years agoupstream: reorder child environment preparation so that variables
djm@openbsd.org [Sat, 9 Jun 2018 02:58:02 +0000 (02:58 +0000)] 
upstream: reorder child environment preparation so that variables

read from ~/.ssh/environment (if enabled) do not override SSH_* variables set
by the server.

OpenBSD-Commit-ID: 59f9d4c213cdcef2ef21f4b4ae006594dcf2aa7a

7 years agoupstream: fix incorrect expansion of %i in
djm@openbsd.org [Fri, 8 Jun 2018 03:35:36 +0000 (03:35 +0000)] 
upstream: fix incorrect expansion of %i in

load_public_identity_files(); reported by Roumen Petrov

OpenBSD-Commit-ID: a827289e77149b5e0850d72a350c8b0300e7ef25

7 years agoupstream: fix some over-long lines and __func__ up some debug
djm@openbsd.org [Fri, 8 Jun 2018 01:55:40 +0000 (01:55 +0000)] 
upstream: fix some over-long lines and __func__ up some debug

messages

OpenBSD-Commit-ID: c70a60b4c8207d9f242fc2351941ba50916bb267

7 years agoupstream: tweak previous;
jmc@openbsd.org [Thu, 7 Jun 2018 11:26:14 +0000 (11:26 +0000)] 
upstream: tweak previous;

OpenBSD-Commit-ID: f98f16af10b28e24bcecb806cb71ea994b648fd6

7 years agoRemove ability to override $LD.
Darren Tucker [Fri, 8 Jun 2018 07:43:36 +0000 (17:43 +1000)] 
Remove ability to override $LD.

Since autoconf always uses $CC to link C programs, allowing users to
override LD caused mismatches between what LD_LINK_IFELSE thought worked
and what ld thought worked.  If you do need to do this kind of thing you
need to set a compiler flag such as gcc's -fuse-ld in LDFLAGS.

7 years agoBetter detection of unsupported compiler options.
Darren Tucker [Fri, 8 Jun 2018 03:55:59 +0000 (13:55 +1000)] 
Better detection of unsupported compiler options.

Should prevent "unsupported -Wl,-z,retpoline" warnings during linking.
ok djm@

7 years agoupstream: test the correct configuration option name
djm@openbsd.org [Thu, 7 Jun 2018 14:29:43 +0000 (14:29 +0000)] 
upstream: test the correct configuration option name

OpenBSD-Regress-ID: 492279ea9f65657f97a970e0e7c7fd0b339fee23

7 years agoupstream: some permitlisten fixes from markus@ that I missed in my
djm@openbsd.org [Thu, 7 Jun 2018 09:26:42 +0000 (09:26 +0000)] 
upstream: some permitlisten fixes from markus@ that I missed in my

insomnia-fueled commits last night

OpenBSD-Commit-ID: 26f23622e928996086e85b1419cc1c0f136e359c

7 years agoupstream: permitlisten/PermitListen unit test from Markus
djm@openbsd.org [Thu, 7 Jun 2018 04:46:34 +0000 (04:46 +0000)] 
upstream: permitlisten/PermitListen unit test from Markus

OpenBSD-Regress-ID: ab12eb42f0e14926980441cf7c058a6d1d832ea5

7 years agoupstream: fix regression caused by recent permitlisten option commit:
djm@openbsd.org [Thu, 7 Jun 2018 04:31:51 +0000 (04:31 +0000)] 
upstream: fix regression caused by recent permitlisten option commit:

authorized_keys lines that contained permitopen/permitlisten were being
treated as invalid.

OpenBSD-Commit-ID: 7ef41d63a5a477b405d142dc925b67d9e7aaa31b

7 years agoupstream: switch config file parsing to getline(3) as this avoids
markus@openbsd.org [Wed, 6 Jun 2018 18:29:18 +0000 (18:29 +0000)] 
upstream: switch config file parsing to getline(3) as this avoids

static limits noted by gerhard@; ok dtucker@, djm@

OpenBSD-Commit-ID: 6d702eabef0fa12e5a1d75c334a8c8b325298b5c

7 years agoupstream: regress test for PermitOpen
djm@openbsd.org [Wed, 6 Jun 2018 18:25:33 +0000 (18:25 +0000)] 
upstream: regress test for PermitOpen

OpenBSD-Regress-ID: ce8b5f28fc039f09bb297fc4a92319e65982ddaf

7 years agoupstream: man bits for permitlisten authorized_keys option
djm@openbsd.org [Wed, 6 Jun 2018 18:24:15 +0000 (18:24 +0000)] 
upstream: man bits for permitlisten authorized_keys option

OpenBSD-Commit-ID: 86910af8f781a4ac5980fea125442eb25466dd78

7 years agoupstream: man bits for PermitListen
djm@openbsd.org [Wed, 6 Jun 2018 18:24:00 +0000 (18:24 +0000)] 
upstream: man bits for PermitListen

OpenBSD-Commit-ID: 35b200cba4e46a16a4db6a80ef11838ab0fad67c

7 years agoupstream: permitlisten option for authorized_keys; ok markus@
djm@openbsd.org [Wed, 6 Jun 2018 18:23:32 +0000 (18:23 +0000)] 
upstream: permitlisten option for authorized_keys; ok markus@

OpenBSD-Commit-ID: 8650883018d7aa893173d703379e4456a222c672

7 years agoupstream: Add a PermitListen directive to control which server-side
djm@openbsd.org [Wed, 6 Jun 2018 18:22:41 +0000 (18:22 +0000)] 
upstream: Add a PermitListen directive to control which server-side

addresses may be listened on when the client requests remote forwarding (ssh
-R).

This is the converse of the existing PermitOpen directive and this
includes some refactoring to share much of its implementation.

feedback and ok markus@

OpenBSD-Commit-ID: 15a931238c61a3f2ac74ea18a98c933e358e277f

7 years agoUse ssh-keygen -A to generate missing host keys.
Darren Tucker [Wed, 6 Jun 2018 06:04:29 +0000 (16:04 +1000)] 
Use ssh-keygen -A to generate missing host keys.

Instead of testing for each specific key type, use ssh-keygen -A to
generate any missing host key types.

7 years agoupstream: add missing punctuation after %i in ssh_config.5, and
jmc@openbsd.org [Fri, 1 Jun 2018 06:23:10 +0000 (06:23 +0000)] 
upstream: add missing punctuation after %i in ssh_config.5, and

make the grammatical format in sshd_config.5 match that in ssh_config.5;

OpenBSD-Commit-ID: e325663b9342f3d556e223e5306e0d5fa1a74fa0

7 years agoupstream: oops - further adjustment to text neccessary;
jmc@openbsd.org [Fri, 1 Jun 2018 05:52:26 +0000 (05:52 +0000)] 
upstream: oops - further adjustment to text neccessary;

OpenBSD-Commit-ID: 23585576c807743112ab956be0fb3c786bdef025

7 years agoupstream: %U needs to be escaped; tweak text;
jmc@openbsd.org [Fri, 1 Jun 2018 05:50:18 +0000 (05:50 +0000)] 
upstream: %U needs to be escaped; tweak text;

OpenBSD-Commit-ID: 30887b73ece257273fb619ab6f4e86dc92ddc15e

7 years agoupstream: Apply umask to all incoming files and directories not
dtucker@openbsd.org [Fri, 1 Jun 2018 04:31:48 +0000 (04:31 +0000)] 
upstream: Apply umask to all incoming files and directories not

just files. This makes sure it gets applied to directories too, and prevents
a race where files get chmodded after creation.  bz#2839, ok djm@

OpenBSD-Commit-ID: 3168ee6c7c39093adac4fd71039600cfa296203b

7 years agoupstream: Adapt to extra default verboisity from ssh-keygen when
djm@openbsd.org [Fri, 1 Jun 2018 03:52:37 +0000 (03:52 +0000)] 
upstream: Adapt to extra default verboisity from ssh-keygen when

searching for and hashing known_hosts entries in a single operation
(ssh-keygen -HF ...) Patch from Anton Kremenetsky

OpenBSD-Regress-ID: 519585a4de35c4611285bd6a7272766c229b19dd

7 years agoupstream: Add TEST_SSH_FAIL_FATAL variable, to force all failures
djm@openbsd.org [Tue, 22 May 2018 00:22:49 +0000 (00:22 +0000)] 
upstream: Add TEST_SSH_FAIL_FATAL variable, to force all failures

to instantly abort the test. Useful in capturing clean logs for individual
failure cases.

OpenBSD-Regress-ID: feba18cf338c2328b9601bd4093cabdd9baa3af1

7 years agoupstream: Clean up comment.
dtucker@openbsd.org [Fri, 11 May 2018 03:51:06 +0000 (03:51 +0000)] 
upstream: Clean up comment.

OpenBSD-Regress-ID: 6adb35f384d447e7dcb9f170d4f0d546d3973e10

7 years agoupstream: whitespace
djm@openbsd.org [Fri, 1 Jun 2018 04:21:29 +0000 (04:21 +0000)] 
upstream: whitespace

OpenBSD-Commit-ID: e5edb5e843ddc9b73a8e46518899be41d5709add

7 years agoupstream: make ssh_remote_ipaddr() capable of being called after
djm@openbsd.org [Fri, 1 Jun 2018 04:05:29 +0000 (04:05 +0000)] 
upstream: make ssh_remote_ipaddr() capable of being called after

the ssh->state has been torn down; bz#2773

OpenBSD-Commit-ID: 167f12523613ca3d16d7716a690e7afa307dc7eb

7 years agoupstream: return correct exit code when searching for and hashing
djm@openbsd.org [Fri, 1 Jun 2018 03:51:34 +0000 (03:51 +0000)] 
upstream: return correct exit code when searching for and hashing

known_hosts entries in a single operation (ssh-keygen -HF hostname); bz2772
Report and fix from Anton Kremenetsky

OpenBSD-Commit-ID: ac10ca13eb9bb0bc50fcd42ad11c56c317437b58

7 years agoupstream: make UID available as a %-expansion everywhere that the
djm@openbsd.org [Fri, 1 Jun 2018 03:33:53 +0000 (03:33 +0000)] 
upstream: make UID available as a %-expansion everywhere that the

username is available currently. In the client this is via %i, in the server
%U (since %i was already used in the client in some places for this, but used
for something different in the server); bz#2870, ok dtucker@

OpenBSD-Commit-ID: c7e912b0213713316cb55db194b3a6415b3d4b95

7 years agoupstream: prefer argv0 to "ssh" when re-executing ssh for ProxyJump
djm@openbsd.org [Fri, 1 Jun 2018 03:11:49 +0000 (03:11 +0000)] 
upstream: prefer argv0 to "ssh" when re-executing ssh for ProxyJump

directive; bz2831, feedback and ok dtucker@

OpenBSD-Commit-ID: 3cec709a131499fbb0c1ea8a0a9e0b0915ce769e

7 years agoupstream: Do not ban PTY allocation when a sshd session is restricted
djm@openbsd.org [Fri, 25 May 2018 07:11:01 +0000 (07:11 +0000)] 
upstream: Do not ban PTY allocation when a sshd session is restricted

because the user password is expired as it breaks password change dialog.

regression in openssh-7.7 reported by Daniel Wagner

OpenBSD-Commit-ID: 9fc09c584c6f1964b00595e3abe7f83db4d90d73

7 years agoupstream: Fix return value confusion in several functions (readdir,
djm@openbsd.org [Fri, 25 May 2018 04:25:46 +0000 (04:25 +0000)] 
upstream: Fix return value confusion in several functions (readdir,

download and fsync). These should return -1 on error, not a sftp status code.

patch from Petr Cerny in bz#2871

OpenBSD-Commit-ID: 651aa0220ad23c9167d9297a436162d741f97a09

7 years agoupstream: If select() fails in ssh_packet_read_seqnr go directly to
dtucker@openbsd.org [Fri, 25 May 2018 03:20:59 +0000 (03:20 +0000)] 
upstream: If select() fails in ssh_packet_read_seqnr go directly to

the error path instead of trying to read from the socket on the way out,
which resets errno and causes the true error to be misreported.  ok djm@

OpenBSD-Commit-ID: 2614edaadbd05a957aa977728aa7a030af7c6f0a