]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
11 years ago - tedu@cvs.openbsd.org 2014/07/11 13:54:34
Damien Miller [Wed, 16 Jul 2014 23:52:07 +0000 (09:52 +1000)] 
   - tedu@cvs.openbsd.org 2014/07/11 13:54:34
     [myproposal.h]
     by popular demand, add back hamc-sha1 to server proposal for better compat
     with many clients still in use. ok deraadt

11 years ago - deraadt@cvs.openbsd.org 2014/07/11 08:09:54
Damien Miller [Wed, 16 Jul 2014 23:49:37 +0000 (09:49 +1000)] 
   - deraadt@cvs.openbsd.org 2014/07/11 08:09:54
     [sandbox-systrace.c]
     Permit use of SYS_sendsyslog from inside the sandbox.  Clock is ticking,
     update your kernels and sshd soon.. libc will start using sendsyslog()
     in about 4 days.

11 years ago - (djm) [digest-openssl.c] Preserve array order when disabling digests.
Damien Miller [Wed, 16 Jul 2014 23:01:25 +0000 (09:01 +1000)] 
 - (djm) [digest-openssl.c] Preserve array order when disabling digests.
   Reported by Petr Lautrbach.

11 years ago - (djm) [configure.ac] Delay checks for arc4random* until after libcrypto
Damien Miller [Tue, 15 Jul 2014 00:41:38 +0000 (10:41 +1000)] 
 - (djm) [configure.ac] Delay checks for arc4random* until after libcrypto
   has been located; fixes builds agains libressl-portable

11 years ago - OpenBSD CVS Sync
Damien Miller [Thu, 10 Jul 2014 23:19:04 +0000 (09:19 +1000)] 
 - OpenBSD CVS Sync
   - benno@cvs.openbsd.org 2014/07/09 14:15:56
     [ssh-add.c]
     fix ssh-add crash while loading more than one key
     ok markus@

11 years ago - djm@cvs.openbsd.org 2014/07/07 08:15:26
Damien Miller [Wed, 9 Jul 2014 03:22:31 +0000 (13:22 +1000)] 
   - djm@cvs.openbsd.org 2014/07/07 08:15:26
     [multiplex.sh]
     remove forced-fatal that I stuck in there to test the new cleanup
     logic and forgot to remove...

11 years ago - djm@cvs.openbsd.org 2014/07/06 07:42:03
Damien Miller [Wed, 9 Jul 2014 03:22:03 +0000 (13:22 +1000)] 
   - djm@cvs.openbsd.org 2014/07/06 07:42:03
     [multiplex.sh test-exec.sh]
     add a hook to the cleanup() function to kill $SSH_PID if it is set

     use it to kill the mux master started in multiplex.sh (it was being left
     around on fatal failures)

11 years ago - djm@cvs.openbsd.org 2014/07/09 03:02:15
Damien Miller [Wed, 9 Jul 2014 03:07:28 +0000 (13:07 +1000)] 
   - djm@cvs.openbsd.org 2014/07/09 03:02:15
     [key.c]
     downgrade more error() to debug() to better match what old authfile.c
     did; suppresses spurious errors with hostbased authentication enabled

11 years ago - djm@cvs.openbsd.org 2014/07/09 01:45:10
Damien Miller [Wed, 9 Jul 2014 03:07:06 +0000 (13:07 +1000)] 
   - djm@cvs.openbsd.org 2014/07/09 01:45:10
     [sftp.c]
     more useful error message when GLOB_NOSPACE occurs;
     bz#2254, patch from Orion Poplawski

11 years ago - djm@cvs.openbsd.org 2014/07/07 08:19:12
Damien Miller [Wed, 9 Jul 2014 03:06:25 +0000 (13:06 +1000)] 
   - djm@cvs.openbsd.org 2014/07/07 08:19:12
     [ssh_config.5]
     mention that ProxyCommand is executed using shell "exec" to avoid
     a lingering process; bz#1977

11 years ago - djm@cvs.openbsd.org 2014/07/05 23:11:48
Damien Miller [Sat, 5 Jul 2014 23:32:49 +0000 (09:32 +1000)] 
   - djm@cvs.openbsd.org 2014/07/05 23:11:48
     [channels.c]
     fix remote-forward cancel regression; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/07/03 23:18:35
Damien Miller [Sat, 5 Jul 2014 23:27:06 +0000 (09:27 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 23:18:35
     [authfile.h]
     remove leakmalloc droppings

11 years ago - djm@cvs.openbsd.org 2014/07/03 22:40:43
Damien Miller [Thu, 3 Jul 2014 23:00:04 +0000 (09:00 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 22:40:43
     [servconf.c servconf.h session.c sshd.8 sshd_config.5]
     Add a sshd_config PermitUserRC option to control whether ~/.ssh/rc is
     executed, mirroring the no-user-rc authorized_keys option;
     bz#2160; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/07/03 22:33:41
Damien Miller [Thu, 3 Jul 2014 22:59:41 +0000 (08:59 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 22:33:41
     [channels.c]
     allow explicit ::1 and 127.0.0.1 forwarding bind addresses when
     GatewayPorts=no; allows client to choose address family;
     bz#2222 ok markus@

11 years ago - djm@cvs.openbsd.org 2014/07/03 22:23:46
Damien Miller [Thu, 3 Jul 2014 22:59:24 +0000 (08:59 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 22:23:46
     [sshconnect.c]
     when rekeying, skip file/DNS lookup if it is the same as the key sent
     during initial key exchange. bz#2154 patch from Iain Morgan; ok markus@

11 years ago - jsing@cvs.openbsd.org 2014/07/03 12:42:16
Damien Miller [Thu, 3 Jul 2014 22:59:01 +0000 (08:59 +1000)] 
   - jsing@cvs.openbsd.org 2014/07/03 12:42:16
     [cipher-chachapoly.c]
     Call chacha_ivsetup() immediately before chacha_encrypt_bytes() - this
     makes it easier to verify that chacha_encrypt_bytes() is only called once
     per chacha_ivsetup() call.
     ok djm@

11 years ago - djm@cvs.openbsd.org 2014/07/03 11:16:55
Damien Miller [Thu, 3 Jul 2014 11:29:38 +0000 (21:29 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 11:16:55
     [auth.c auth.h auth1.c auth2.c]
     make the "Too many authentication failures" message include the
     user, source address, port and protocol in a format similar to the
     authentication success / failure messages; bz#2199, ok dtucker

11 years ago - jmc@cvs.openbsd.org 2014/07/03 07:45:27
Damien Miller [Thu, 3 Jul 2014 11:28:09 +0000 (21:28 +1000)] 
   - jmc@cvs.openbsd.org 2014/07/03 07:45:27
     [ssh_config.5]
     escape %C since groff thinks it part of an Rs/Re block;

11 years ago - djm@cvs.openbsd.org 2014/07/03 06:39:19
Damien Miller [Thu, 3 Jul 2014 11:27:46 +0000 (21:27 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 06:39:19
     [ssh.c ssh_config.5]
     Add a %C escape sequence for LocalCommand and ControlPath that expands
     to a unique identifer based on a has of the tuple of (local host,
     remote user, hostname, port).

     Helps avoid exceeding sockaddr_un's miserly pathname limits for mux
     control paths.

     bz#2220, based on patch from mancha1 AT zoho.com; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/07/03 05:38:17
Damien Miller [Thu, 3 Jul 2014 11:26:42 +0000 (21:26 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 05:38:17
     [ssh.1]
     document that -g will only work in the multiplexed case if applied to
     the mux master

11 years ago - djm@cvs.openbsd.org 2014/07/03 05:32:36
Damien Miller [Thu, 3 Jul 2014 11:26:21 +0000 (21:26 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 05:32:36
     [ssh_config.5]
     mention '%%' escape sequence in HostName directives and how it may
     be used to specify IPv6 link-local addresses

11 years ago - djm@cvs.openbsd.org 2014/07/03 04:36:45
Damien Miller [Thu, 3 Jul 2014 11:25:03 +0000 (21:25 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 04:36:45
     [digest.h]
     forward-declare struct sshbuf so consumers don't need to include sshbuf.h

11 years ago - djm@cvs.openbsd.org 2014/07/03 03:47:27
Damien Miller [Thu, 3 Jul 2014 11:24:40 +0000 (21:24 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 03:47:27
     [ssh-keygen.c]
     When hashing or removing hosts using ssh-keygen, don't choke on
     @revoked markers and don't remove @cert-authority markers;
     bz#2241, reported by mlindgren AT runelind.net

11 years ago - djm@cvs.openbsd.org 2014/07/03 03:34:09
Damien Miller [Thu, 3 Jul 2014 11:24:19 +0000 (21:24 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 03:34:09
     [gss-serv.c session.c ssh-keygen.c]
     standardise on NI_MAXHOST for gethostname() string lengths; about
     1/2 the cases were using it already. Fixes bz#2239 en passant

11 years ago - djm@cvs.openbsd.org 2014/07/03 03:26:43
Damien Miller [Thu, 3 Jul 2014 11:23:24 +0000 (21:23 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 03:26:43
     [digest-openssl.c]
     use EVP_Digest() for one-shot hash instead of creating, updating,
     finalising and destroying a context.
     bz#2231, based on patch from Timo Teras

11 years ago - djm@cvs.openbsd.org 2014/07/03 03:15:01
Damien Miller [Thu, 3 Jul 2014 11:23:01 +0000 (21:23 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 03:15:01
     [ssh-add.c]
     make stdout line-buffered; saves partial output getting lost when
     ssh-add fatal()s part-way through (e.g. when listing keys from an
     agent that supports key types that ssh-add doesn't);
     bz#2234, reported by Phil Pennock

11 years ago - djm@cvs.openbsd.org 2014/07/03 03:11:03
Damien Miller [Thu, 3 Jul 2014 11:22:40 +0000 (21:22 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 03:11:03
     [ssh-agent.c]
     Only cleanup agent socket in the main agent process and not in any
     subprocesses it may have started (e.g. forked askpass). Fixes
     agent sockets being zapped when askpass processes fatal();
     bz#2236 patch from Dmitry V. Levin

11 years ago - djm@cvs.openbsd.org 2014/07/03 01:45:38
Damien Miller [Thu, 3 Jul 2014 11:22:22 +0000 (21:22 +1000)] 
   - djm@cvs.openbsd.org 2014/07/03 01:45:38
     [sshkey.c]
     make Ed25519 keys' title fit properly in the randomart border; bz#2247
     based on patch from Christian Hesse

11 years ago - (djm) [monitor_fdpass.c] Use sys/poll.h if poll.h doesn't exist;
Damien Miller [Thu, 3 Jul 2014 03:29:50 +0000 (13:29 +1000)] 
 - (djm) [monitor_fdpass.c] Use sys/poll.h if poll.h doesn't exist;
   bz#2237

11 years ago - (djm) [digest-openssl.c configure.ac] Disable RIPEMD160 if libcrypto
Damien Miller [Thu, 3 Jul 2014 01:54:19 +0000 (11:54 +1000)] 
 - (djm) [digest-openssl.c configure.ac] Disable RIPEMD160 if libcrypto
   doesn't support it.

11 years ago - (djm) [regress/Makefile] fix execution of sshkey unit/fuzz test
Damien Miller [Wed, 2 Jul 2014 07:45:55 +0000 (17:45 +1000)] 
 - (djm) [regress/Makefile] fix execution of sshkey unit/fuzz test

11 years ago - (djm) [sshkey.c] Conditionalise inclusion of util.h
Damien Miller [Wed, 2 Jul 2014 07:43:41 +0000 (17:43 +1000)] 
 - (djm) [sshkey.c] Conditionalise inclusion of util.h

11 years ago - djm@cvs.openbsd.org 2014/06/24 01:14:17
Damien Miller [Wed, 2 Jul 2014 07:38:31 +0000 (17:38 +1000)] 
   - djm@cvs.openbsd.org 2014/06/24 01:14:17
     [Makefile.in regress/Makefile regress/unittests/Makefile]
     [regress/unittests/sshkey/Makefile]
     [regress/unittests/sshkey/common.c]
     [regress/unittests/sshkey/common.h]
     [regress/unittests/sshkey/mktestdata.sh]
     [regress/unittests/sshkey/test_file.c]
     [regress/unittests/sshkey/test_fuzz.c]
     [regress/unittests/sshkey/test_sshkey.c]
     [regress/unittests/sshkey/tests.c]
     [regress/unittests/sshkey/testdata/dsa_1]
     [regress/unittests/sshkey/testdata/dsa_1-cert.fp]
     [regress/unittests/sshkey/testdata/dsa_1-cert.pub]
     [regress/unittests/sshkey/testdata/dsa_1.fp]
     [regress/unittests/sshkey/testdata/dsa_1.fp.bb]
     [regress/unittests/sshkey/testdata/dsa_1.param.g]
     [regress/unittests/sshkey/testdata/dsa_1.param.priv]
     [regress/unittests/sshkey/testdata/dsa_1.param.pub]
     [regress/unittests/sshkey/testdata/dsa_1.pub]
     [regress/unittests/sshkey/testdata/dsa_1_pw]
     [regress/unittests/sshkey/testdata/dsa_2]
     [regress/unittests/sshkey/testdata/dsa_2.fp]
     [regress/unittests/sshkey/testdata/dsa_2.fp.bb]
     [regress/unittests/sshkey/testdata/dsa_2.pub]
     [regress/unittests/sshkey/testdata/dsa_n]
     [regress/unittests/sshkey/testdata/dsa_n_pw]
     [regress/unittests/sshkey/testdata/ecdsa_1]
     [regress/unittests/sshkey/testdata/ecdsa_1-cert.fp]
     [regress/unittests/sshkey/testdata/ecdsa_1-cert.pub]
     [regress/unittests/sshkey/testdata/ecdsa_1.fp]
     [regress/unittests/sshkey/testdata/ecdsa_1.fp.bb]
     [regress/unittests/sshkey/testdata/ecdsa_1.param.curve]
     [regress/unittests/sshkey/testdata/ecdsa_1.param.priv]
     [regress/unittests/sshkey/testdata/ecdsa_1.param.pub]
     [regress/unittests/sshkey/testdata/ecdsa_1.pub]
     [regress/unittests/sshkey/testdata/ecdsa_1_pw]
     [regress/unittests/sshkey/testdata/ecdsa_2]
     [regress/unittests/sshkey/testdata/ecdsa_2.fp]
     [regress/unittests/sshkey/testdata/ecdsa_2.fp.bb]
     [regress/unittests/sshkey/testdata/ecdsa_2.param.curve]
     [regress/unittests/sshkey/testdata/ecdsa_2.param.priv]
     [regress/unittests/sshkey/testdata/ecdsa_2.param.pub]
     [regress/unittests/sshkey/testdata/ecdsa_2.pub]
     [regress/unittests/sshkey/testdata/ecdsa_n]
     [regress/unittests/sshkey/testdata/ecdsa_n_pw]
     [regress/unittests/sshkey/testdata/ed25519_1]
     [regress/unittests/sshkey/testdata/ed25519_1-cert.fp]
     [regress/unittests/sshkey/testdata/ed25519_1-cert.pub]
     [regress/unittests/sshkey/testdata/ed25519_1.fp]
     [regress/unittests/sshkey/testdata/ed25519_1.fp.bb]
     [regress/unittests/sshkey/testdata/ed25519_1.pub]
     [regress/unittests/sshkey/testdata/ed25519_1_pw]
     [regress/unittests/sshkey/testdata/ed25519_2]
     [regress/unittests/sshkey/testdata/ed25519_2.fp]
     [regress/unittests/sshkey/testdata/ed25519_2.fp.bb]
     [regress/unittests/sshkey/testdata/ed25519_2.pub]
     [regress/unittests/sshkey/testdata/pw]
     [regress/unittests/sshkey/testdata/rsa1_1]
     [regress/unittests/sshkey/testdata/rsa1_1.fp]
     [regress/unittests/sshkey/testdata/rsa1_1.fp.bb]
     [regress/unittests/sshkey/testdata/rsa1_1.param.n]
     [regress/unittests/sshkey/testdata/rsa1_1.pub]
     [regress/unittests/sshkey/testdata/rsa1_1_pw]
     [regress/unittests/sshkey/testdata/rsa1_2]
     [regress/unittests/sshkey/testdata/rsa1_2.fp]
     [regress/unittests/sshkey/testdata/rsa1_2.fp.bb]
     [regress/unittests/sshkey/testdata/rsa1_2.param.n]
     [regress/unittests/sshkey/testdata/rsa1_2.pub]
     [regress/unittests/sshkey/testdata/rsa_1]
     [regress/unittests/sshkey/testdata/rsa_1-cert.fp]
     [regress/unittests/sshkey/testdata/rsa_1-cert.pub]
     [regress/unittests/sshkey/testdata/rsa_1.fp]
     [regress/unittests/sshkey/testdata/rsa_1.fp.bb]
     [regress/unittests/sshkey/testdata/rsa_1.param.n]
     [regress/unittests/sshkey/testdata/rsa_1.param.p]
     [regress/unittests/sshkey/testdata/rsa_1.param.q]
     [regress/unittests/sshkey/testdata/rsa_1.pub]
     [regress/unittests/sshkey/testdata/rsa_1_pw]
     [regress/unittests/sshkey/testdata/rsa_2]
     [regress/unittests/sshkey/testdata/rsa_2.fp]
     [regress/unittests/sshkey/testdata/rsa_2.fp.bb]
     [regress/unittests/sshkey/testdata/rsa_2.param.n]
     [regress/unittests/sshkey/testdata/rsa_2.param.p]
     [regress/unittests/sshkey/testdata/rsa_2.param.q]
     [regress/unittests/sshkey/testdata/rsa_2.pub]
     [regress/unittests/sshkey/testdata/rsa_n]
     [regress/unittests/sshkey/testdata/rsa_n_pw]
     unit and fuzz tests for new key API

11 years ago - djm@cvs.openbsd.org 2014/06/24 01:04:43
Damien Miller [Wed, 2 Jul 2014 07:02:03 +0000 (17:02 +1000)] 
   - djm@cvs.openbsd.org 2014/06/24 01:04:43
     [regress/krl.sh]
     regress test for broken consecutive revoked serial number ranges

11 years ago - djm@cvs.openbsd.org 2014/05/21 07:04:21
Damien Miller [Wed, 2 Jul 2014 07:01:08 +0000 (17:01 +1000)] 
   - djm@cvs.openbsd.org 2014/05/21 07:04:21
     [regress/integrity.sh]
     when failing because of unexpected output, show the offending output

11 years ago - djm@cvs.openbsd.org 2014/04/30 05:32:00
Damien Miller [Wed, 2 Jul 2014 05:38:05 +0000 (15:38 +1000)] 
   - djm@cvs.openbsd.org 2014/04/30 05:32:00
     [regress/Makefile]
     unit tests for new buffer API; including basic fuzz testing
     NB. Id sync only.

11 years ago - djm@cvs.openbsd.org 2014/06/30 12:54:39
Damien Miller [Wed, 2 Jul 2014 05:33:09 +0000 (15:33 +1000)] 
   - djm@cvs.openbsd.org 2014/06/30 12:54:39
     [key.c]
     suppress spurious error message when loading key with a passphrase;
     reported by kettenis@ ok markus@
   - djm@cvs.openbsd.org 2014/07/02 04:59:06
     [cipher-3des1.c]
     fix ssh protocol 1 on the server that regressed with the sshkey change
     (sometimes fatal() after auth completed), make file return useful status
     codes.
     NB. Id sync only for these two. They were bundled into the sshkey merge
     above, since it was easier to sync the entire file and then apply
     portable-specific changed atop it.

11 years ago - markus@cvs.openbsd.org 2014/06/27 18:50:39
Damien Miller [Wed, 2 Jul 2014 05:30:00 +0000 (15:30 +1000)] 
   - markus@cvs.openbsd.org 2014/06/27 18:50:39
     [ssh-add.c]
     fix loading of private keys

11 years ago - markus@cvs.openbsd.org 2014/06/27 16:41:56
Damien Miller [Wed, 2 Jul 2014 05:29:40 +0000 (15:29 +1000)] 
   - markus@cvs.openbsd.org 2014/06/27 16:41:56
     [channels.c channels.h clientloop.c ssh.c]
     fix remote fwding with same listen port but different listen address
     with gerhard@, ok djm@

11 years ago - deraadt@cvs.openbsd.org 2014/06/25 14:16:09
Damien Miller [Wed, 2 Jul 2014 05:29:21 +0000 (15:29 +1000)] 
   - deraadt@cvs.openbsd.org 2014/06/25 14:16:09
     [sshbuf.c]
     unblock SIGSEGV before raising it
     ok djm

11 years ago - djm@cvs.openbsd.org 2014/06/24 02:21:01
Damien Miller [Wed, 2 Jul 2014 05:29:01 +0000 (15:29 +1000)] 
   - djm@cvs.openbsd.org 2014/06/24 02:21:01
     [scp.c]
     when copying local->remote fails during read, don't send uninitialised
     heap to the remote end. Reported by Jann Horn

11 years ago - djm@cvs.openbsd.org 2014/06/24 02:19:48
Damien Miller [Wed, 2 Jul 2014 05:28:40 +0000 (15:28 +1000)] 
   - djm@cvs.openbsd.org 2014/06/24 02:19:48
     [ssh.c]
     don't fatal() when hostname canonicalisation fails with a
     ProxyCommand in use; continue and allow the ProxyCommand to
     connect anyway (e.g. to a host with a name outside the DNS
     behind a bastion)

11 years ago - djm@cvs.openbsd.org 2014/06/24 01:13:21
Damien Miller [Wed, 2 Jul 2014 05:28:02 +0000 (15:28 +1000)] 
   - djm@cvs.openbsd.org 2014/06/24 01:13:21
     [Makefile.in auth-bsdauth.c auth-chall.c auth-options.c auth-rsa.c
     [auth2-none.c auth2-pubkey.c authfile.c authfile.h cipher-3des1.c
     [cipher-chachapoly.c cipher-chachapoly.h cipher.c cipher.h
     [digest-libc.c digest-openssl.c digest.h dns.c entropy.c hmac.h
     [hostfile.c key.c key.h krl.c monitor.c packet.c rsa.c rsa.h
     [ssh-add.c ssh-agent.c ssh-dss.c ssh-ecdsa.c ssh-ed25519.c
     [ssh-keygen.c ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c
     [ssh-rsa.c sshbuf-misc.c sshbuf.h sshconnect.c sshconnect1.c
     [sshconnect2.c sshd.c sshkey.c sshkey.h
     [openbsd-compat/openssl-compat.c openbsd-compat/openssl-compat.h]
     New key API: refactor key-related functions to be more library-like,
     existing API is offered as a set of wrappers.

     with and ok markus@

     Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
     Dempsky and Ron Bowes for a detailed review a few months ago.

     NB. This commit also removes portable OpenSSH support for OpenSSL
     <0.9.8e.

11 years ago - djm@cvs.openbsd.org 2014/06/24 00:52:02
Damien Miller [Wed, 2 Jul 2014 02:48:30 +0000 (12:48 +1000)] 
   - djm@cvs.openbsd.org 2014/06/24 00:52:02
     [krl.c]
     fix bug in KRL generation: multiple consecutive revoked certificate
     serial number ranges could be serialised to an invalid format.

     Readers of a broken KRL caused by this bug will fail closed, so no
     should-have-been-revoked key will be accepted.

11 years ago - naddy@cvs.openbsd.org 2014/06/18 15:42:09
Damien Miller [Wed, 2 Jul 2014 02:48:04 +0000 (12:48 +1000)] 
   - naddy@cvs.openbsd.org 2014/06/18 15:42:09
     [sshbuf-getput-crypto.c]
     The ssh_get_bignum functions must accept the same range of bignums
     the corresponding ssh_put_bignum functions create.  This fixes the
     use of 16384-bit RSA keys (bug reported by Eivind Evensen).
     ok djm@

11 years ago - matthew@cvs.openbsd.org 2014/06/18 02:59:13
Damien Miller [Wed, 2 Jul 2014 02:47:48 +0000 (12:47 +1000)] 
   - matthew@cvs.openbsd.org 2014/06/18 02:59:13
     [sandbox-systrace.c]
     Now that we have a dedicated getentropy(2) system call for
     arc4random(3), we can disallow __sysctl(2) in OpenSSH's systrace
     sandbox.

     ok djm

11 years ago - deraadt@cvs.openbsd.org 2014/06/13 08:26:29
Damien Miller [Wed, 2 Jul 2014 02:47:25 +0000 (12:47 +1000)] 
   - deraadt@cvs.openbsd.org 2014/06/13 08:26:29
     [sandbox-systrace.c]
     permit SYS_getentropy
     from matthew

11 years ago - (tim) [openssh/session.c] Work around to get chroot sftp working on UnixWare
Tim Rice [Wed, 18 Jun 2014 23:17:28 +0000 (16:17 -0700)] 
 - (tim) [openssh/session.c] Work around to get chroot sftp working on UnixWare

11 years ago - (dtucker) [entropy.c openbsd-compat/openssl-compat.{c,h}
Darren Tucker [Tue, 17 Jun 2014 13:06:07 +0000 (23:06 +1000)] 
 - (dtucker) [entropy.c openbsd-compat/openssl-compat.{c,h}
   openbsd-compat/regress/{.cvsignore,Makefile.in,opensslvertest.c}]
   Move the OpenSSL header/library version test into its own function and add
   tests for it. Fix it to allow fix version upgrades (but not downgrades).
   Prompted by chl@ via OpenSMTPD (issue #462) and Debian (bug #748150).
   ok djm@ chl@

11 years ago - (dtucker) [defines.h] Fix undef of _PATH_MAILDIR. From rak at debian via
Darren Tucker [Mon, 16 Jun 2014 12:50:55 +0000 (22:50 +1000)] 
 - (dtucker) [defines.h] Fix undef of _PATH_MAILDIR.  From rak at debian via
   OpenSMTPD and chl@

11 years ago - (dtucker) [configure.ac] Remove tcpwrappers support, support has already
Darren Tucker [Fri, 13 Jun 2014 01:06:04 +0000 (11:06 +1000)] 
 - (dtucker) [configure.ac] Remove tcpwrappers support, support has already
   been removed from sshd.c.

11 years ago - (tim) [regress/unittests/test_helper/test_helper.h] Add includes.h for
Tim Rice [Thu, 12 Jun 2014 01:31:10 +0000 (18:31 -0700)] 
 - (tim) [regress/unittests/test_helper/test_helper.h] Add includes.h for
   u_intXX_t types.

11 years ago - (dtucker) [regress/unittests/sshbuf/*.c regress/unittests/test_helper/*]
Darren Tucker [Wed, 11 Jun 2014 19:32:29 +0000 (05:32 +1000)] 
 - (dtucker) [regress/unittests/sshbuf/*.c regress/unittests/test_helper/*]
   Wrap stdlib.h include an ifdef for platforms that don't have it.

11 years ago - (dtucker) [defines.h] Add va_copy if we don't already have it, taken from
Darren Tucker [Wed, 11 Jun 2014 19:22:49 +0000 (05:22 +1000)] 
 - (dtucker) [defines.h] Add va_copy if we don't already have it, taken from
   openbsd-compat/bsd-asprintf.c.

11 years ago - (dtucker) [bufaux.c bufbn.c bufec.c buffer.c] Pull in includes.h for
Darren Tucker [Wed, 11 Jun 2014 03:39:24 +0000 (13:39 +1000)] 
 - (dtucker) [bufaux.c bufbn.c bufec.c buffer.c] Pull in includes.h for
   compat stuff, specifically whether or not OpenSSL has ECC.

11 years ago - (dtucker) [openbsd-compat/arc4random.c] Use explicit_bzero instead of an
Darren Tucker [Wed, 11 Jun 2014 03:10:00 +0000 (13:10 +1000)] 
 - (dtucker) [openbsd-compat/arc4random.c] Use explicit_bzero instead of an
   assigment that might get optimized out.  ok djm@

11 years ago - (dtucker) [sshbuf.h] Only declare ECC functions if building without
Darren Tucker [Tue, 10 Jun 2014 22:04:02 +0000 (08:04 +1000)] 
 - (dtucker) [sshbuf.h] Only declare ECC functions if building without
   OpenSSL or if OpenSSL has ECC.

11 years ago - dtucker@cvs.openbsd.org 2014/06/10 21:46:11
Darren Tucker [Tue, 10 Jun 2014 21:58:35 +0000 (07:58 +1000)] 
   - dtucker@cvs.openbsd.org 2014/06/10 21:46:11
     [sshbuf.h]
     Group ECC functions together to make things a little easier in -portable.
     "doesn't bother me" deraadt@

11 years ago - djm@cvs.openbsd.org 2014/06/05 22:17:50
Darren Tucker [Tue, 10 Jun 2014 21:57:58 +0000 (07:57 +1000)] 
   - djm@cvs.openbsd.org 2014/06/05 22:17:50
     [sshconnect2.c]
     fix inverted test that caused PKCS#11 keys that were explicitly listed
     not to be preferred. Reported by Dirk-Willem van Gulik

11 years ago - (dtucker) [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] ifdef
Darren Tucker [Tue, 10 Jun 2014 21:38:49 +0000 (07:38 +1000)] 
 - (dtucker) [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] ifdef
   ECC variable too.

11 years ago - (dtucker) [myprosal.h] Don't include curve25519-sha256@libssh.org in
Darren Tucker [Tue, 10 Jun 2014 21:37:25 +0000 (07:37 +1000)] 
 - (dtucker) [myprosal.h] Don't include curve25519-sha256@libssh.org in
   the proposal if the version of OpenSSL we're using doesn't support ECC.

11 years ago - (dtucker) [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c
Darren Tucker [Tue, 10 Jun 2014 20:27:16 +0000 (06:27 +1000)] 
 - (dtucker) [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c
   regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] Only do NISTP256
   curve tests if OpenSSL has them.

11 years ago - (djm) [configure.ac openbsd-compat/bsd-cygwin_util.c]
Damien Miller [Tue, 27 May 2014 04:34:42 +0000 (14:34 +1000)] 
 - (djm) [configure.ac openbsd-compat/bsd-cygwin_util.c]
      [openbsd-compat/bsd-cygwin_util.h] On Cygwin, determine privilege
         separation user at runtime, since it may need to be a domain account.
            Patch from Corinna Vinschen.

11 years ago - (djm) [contrib/cygwin/ssh-host-config] Updated Cygwin ssh-host-config
Damien Miller [Tue, 27 May 2014 04:31:58 +0000 (14:31 +1000)] 
 - (djm) [contrib/cygwin/ssh-host-config] Updated Cygwin ssh-host-config
   from Corinna Vinschen, fixing a number of bugs and preparing for
   Cygwin 1.7.30.

11 years ago - (djm) [cipher.c] Fix merge botch.
Damien Miller [Tue, 27 May 2014 04:27:02 +0000 (14:27 +1000)] 
 - (djm) [cipher.c] Fix merge botch.

11 years ago - (djm) [Makefile.in] typo in path
Damien Miller [Wed, 21 May 2014 22:23:59 +0000 (08:23 +1000)] 
 - (djm) [Makefile.in] typo in path

11 years agorevert a diff I didn't mean to commit
Damien Miller [Wed, 21 May 2014 07:13:36 +0000 (17:13 +1000)] 
revert a diff I didn't mean to commit

11 years ago - (djm) [misc.c] Use CLOCK_BOOTTIME in preference to CLOCK_MONOTONIC
Damien Miller [Wed, 21 May 2014 07:12:53 +0000 (17:12 +1000)] 
 - (djm) [misc.c] Use CLOCK_BOOTTIME in preference to CLOCK_MONOTONIC
   when it is available. It takes into account time spent suspended,
   thereby ensuring timeouts (e.g. for expiring agent keys) fire
   correctly. bz#2228 reported by John Haxby

11 years ago - (djm) [commit configure.ac defines.h sshpty.c] don't attempt to use
Damien Miller [Wed, 21 May 2014 07:06:46 +0000 (17:06 +1000)] 
 - (djm) [commit configure.ac defines.h sshpty.c] don't attempt to use
   vhangup on Linux. It doens't work for non-root users, and for them
   it just messes up the tty settings.

11 years ago - (djm) [sshbuf.c] need __predict_false
Damien Miller [Thu, 15 May 2014 08:01:52 +0000 (18:01 +1000)] 
 - (djm) [sshbuf.c] need __predict_false

11 years ago - (djm) [regress/Makefile Makefile.in]
Damien Miller [Thu, 15 May 2014 08:01:01 +0000 (18:01 +1000)] 
 - (djm) [regress/Makefile Makefile.in]
   [regress/unittests/sshbuf/test_sshbuf.c
   [regress/unittests/sshbuf/test_sshbuf_fixed.c]
   [regress/unittests/sshbuf/test_sshbuf_fuzz.c]
   [regress/unittests/sshbuf/test_sshbuf_getput_basic.c]
   [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c]
   [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c]
   [regress/unittests/sshbuf/test_sshbuf_misc.c]
   [regress/unittests/sshbuf/tests.c]
   [regress/unittests/test_helper/fuzz.c]
   [regress/unittests/test_helper/test_helper.c]
   Hook new unit tests into the build and "make tests"

11 years ago - (djm) [regress/unittests/Makefile]
Damien Miller [Thu, 15 May 2014 05:17:15 +0000 (15:17 +1000)] 
 - (djm) [regress/unittests/Makefile]
   [regress/unittests/Makefile.inc]
   [regress/unittests/sshbuf/Makefile]
   [regress/unittests/sshbuf/test_sshbuf.c]
   [regress/unittests/sshbuf/test_sshbuf_fixed.c]
   [regress/unittests/sshbuf/test_sshbuf_fuzz.c]
   [regress/unittests/sshbuf/test_sshbuf_getput_basic.c]
   [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c]
   [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c]
   [regress/unittests/sshbuf/test_sshbuf_misc.c]
   [regress/unittests/sshbuf/tests.c]
   [regress/unittests/test_helper/Makefile]
   [regress/unittests/test_helper/fuzz.c]
   [regress/unittests/test_helper/test_helper.c]
   [regress/unittests/test_helper/test_helper.h]
   Import new unit tests from OpenBSD; not yet hooked up to build.

11 years ago - logan@cvs.openbsd.org 2014/05/04 10:40:59
Damien Miller [Thu, 15 May 2014 05:08:40 +0000 (15:08 +1000)] 
   - logan@cvs.openbsd.org 2014/05/04 10:40:59
     [connect-privsep.sh]
     Remove the Z flag from the list of malloc options as it
     was removed from malloc.c 10 days ago.

     OK from miod@

11 years ago - dtucker@cvs.openbsd.org 2014/05/03 18:46:14
Damien Miller [Thu, 15 May 2014 05:08:19 +0000 (15:08 +1000)] 
   - dtucker@cvs.openbsd.org 2014/05/03 18:46:14
     [proxy-connect.sh]
     Add tests for with and without compression, with and without privsep.

11 years ago - djm@cvs.openbsd.org 2014/04/21 22:15:37
Damien Miller [Thu, 15 May 2014 05:07:53 +0000 (15:07 +1000)] 
   - djm@cvs.openbsd.org 2014/04/21 22:15:37
     [dhgex.sh integrity.sh kextype.sh rekey.sh try-ciphers.sh]
     repair regress tests broken by server-side default cipher/kex/mac changes
     by ensuring that the option under test is included in the server's
     algorithm list

11 years ago - djm@cvs.openbsd.org 2014/03/13 20:44:49
Damien Miller [Thu, 15 May 2014 05:07:33 +0000 (15:07 +1000)] 
   - djm@cvs.openbsd.org 2014/03/13 20:44:49
     [login-timeout.sh]
     this test is a sorry mess of race conditions; add another sleep
     to avoid a failure on slow machines (at least until I find a
     better way)

11 years ago - (djm) [Makefile.in configure.ac sshbuf-getput-basic.c]
Damien Miller [Thu, 15 May 2014 04:58:07 +0000 (14:58 +1000)] 
 - (djm) [Makefile.in configure.ac sshbuf-getput-basic.c]
   [sshbuf-getput-crypto.c sshbuf.c] compilation and portability fixes

11 years ago - (djm) [configure.ac] Unconditionally define WITH_OPENSSL until we write
Damien Miller [Thu, 15 May 2014 04:43:37 +0000 (14:43 +1000)] 
 - (djm) [configure.ac] Unconditionally define WITH_OPENSSL until we write
   portability glue to support building without libcrypto

11 years ago - logan@cvs.openbsd.org 2014/05/05 07:02:30
Damien Miller [Thu, 15 May 2014 04:37:59 +0000 (14:37 +1000)] 
   - logan@cvs.openbsd.org 2014/05/05 07:02:30
     [sftp.c]
     Zap extra whitespace.

     OK from djm@ and dtucker@

11 years ago - markus@cvs.openbsd.org 2014/05/03 17:20:34
Damien Miller [Thu, 15 May 2014 04:37:39 +0000 (14:37 +1000)] 
   - markus@cvs.openbsd.org 2014/05/03 17:20:34
     [monitor.c packet.c packet.h]
     unbreak compression, by re-init-ing the compression code in the
     post-auth child. the new buffer code is more strict, and requires
     buffer_init() while the old code was happy after a bzero();
     originally from djm@

11 years ago - djm@cvs.openbsd.org 2014/05/02 03:27:54
Damien Miller [Thu, 15 May 2014 04:37:03 +0000 (14:37 +1000)] 
   - djm@cvs.openbsd.org 2014/05/02 03:27:54
     [chacha.h cipher-chachapoly.h digest.h hmac.h kex.h kexc25519.c]
     [misc.h poly1305.h ssh-pkcs11.c defines.h]
     revert __bounded change; it causes way more problems for portable than
     it solves; pointed out by dtucker@

11 years ago - naddy@cvs.openbsd.org 2014/04/30 19:07:48
Damien Miller [Thu, 15 May 2014 04:35:03 +0000 (14:35 +1000)] 
   - naddy@cvs.openbsd.org 2014/04/30 19:07:48
     [mac.c myproposal.h umac.c]
     UMAC can use our local fallback implementation of AES when OpenSSL isn't
     available.  Glue code straight from Ted Krovetz's original umac.c.
     ok markus@

11 years ago - djm@cvs.openbsd.org 2014/04/30 05:29:56
Damien Miller [Thu, 15 May 2014 04:33:43 +0000 (14:33 +1000)] 
   - djm@cvs.openbsd.org 2014/04/30 05:29:56
     [bufaux.c bufbn.c bufec.c buffer.c buffer.h sshbuf-getput-basic.c]
     [sshbuf-getput-crypto.c sshbuf-misc.c sshbuf.c sshbuf.h ssherr.c]
     [ssherr.h]
     New buffer API; the first installment of the conversion/replacement
     of OpenSSH's internals to make them usable as a standalone library.

     This includes a set of wrappers to make it compatible with the
     existing buffer API so replacement can occur incrementally.

     With and ok markus@

     Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
     Dempsky and Ron Bowes for a detailed review.

11 years ago - dtucker@cvs.openbsd.org 2014/04/29 20:36:51
Damien Miller [Thu, 15 May 2014 04:25:18 +0000 (14:25 +1000)] 
   - dtucker@cvs.openbsd.org 2014/04/29 20:36:51
     [sftp.c]
     Don't attempt to append a nul quote char to the filename.  Should prevent
     fatal'ing with "el_insertstr failed" when there's a single quote char
     somewhere in the string.  bz#2238, ok markus@

11 years ago - dtucker@cvs.openbsd.org 2014/04/29 19:58:50
Damien Miller [Thu, 15 May 2014 04:24:59 +0000 (14:24 +1000)] 
   - dtucker@cvs.openbsd.org 2014/04/29 19:58:50
     [sftp.c]
     Move nulling of variable next to where it's freed.  ok markus@

11 years ago - markus@cvs.openbsd.org 2014/04/29 18:01:49
Damien Miller [Thu, 15 May 2014 04:24:09 +0000 (14:24 +1000)] 
   - markus@cvs.openbsd.org 2014/04/29 18:01:49
     [auth.c authfd.c authfile.c bufaux.c cipher.c cipher.h hostfile.c]
     [kex.c key.c mac.c monitor.c monitor_wrap.c myproposal.h packet.c]
     [roaming_client.c ssh-agent.c ssh-keygen.c ssh-keyscan.c ssh-keysign.c]
     [ssh-pkcs11.h ssh.c sshconnect.c sshconnect2.c sshd.c]
     make compiling against OpenSSL optional (make OPENSSL=no);
     reduces algorithms to curve25519, aes-ctr, chacha, ed25519;
     allows us to explore further options; with and ok djm

11 years ago - djm@cvs.openbsd.org 2014/04/29 13:10:30
Damien Miller [Thu, 15 May 2014 03:48:49 +0000 (13:48 +1000)] 
   - djm@cvs.openbsd.org 2014/04/29 13:10:30
     [clientloop.c serverloop.c]
     bz#1818 - don't send channel success/failre replies on channels that
     have sent a close already; analysis and patch from Simon Tatham;
     ok markus@

11 years ago - djm@cvs.openbsd.org 2014/04/28 03:09:18
Damien Miller [Thu, 15 May 2014 03:48:26 +0000 (13:48 +1000)] 
   - djm@cvs.openbsd.org 2014/04/28 03:09:18
     [authfile.c bufaux.c buffer.h channels.c krl.c mux.c packet.c packet.h]
     [ssh-keygen.c]
     buffer_get_string_ptr's return should be const to remind
     callers that futzing with it will futz with the actual buffer
     contents

11 years ago - djm@cvs.openbsd.org 2014/04/23 12:42:34
Damien Miller [Thu, 15 May 2014 03:47:56 +0000 (13:47 +1000)] 
   - djm@cvs.openbsd.org 2014/04/23 12:42:34
     [readconf.c]
     don't record duplicate IdentityFiles

11 years ago - jmc@cvs.openbsd.org 2014/04/22 14:16:30
Damien Miller [Thu, 15 May 2014 03:47:37 +0000 (13:47 +1000)] 
   - jmc@cvs.openbsd.org 2014/04/22 14:16:30
     [sftp.1]
     zap eol whitespace;

11 years ago - logan@cvs.openbsd.org 2014/04/22 12:42:04
Damien Miller [Thu, 15 May 2014 03:47:15 +0000 (13:47 +1000)] 
   - logan@cvs.openbsd.org 2014/04/22 12:42:04
     [sftp.1]
     Document sftp upload resume.
     OK from djm@, with feedback from okan@.

11 years ago - logan@cvs.openbsd.org 2014/04/22 10:07:12
Damien Miller [Thu, 15 May 2014 03:46:52 +0000 (13:46 +1000)] 
   - logan@cvs.openbsd.org 2014/04/22 10:07:12
     [sftp.c]
     Sort the sftp command list.
     OK from djm@

11 years ago - logan@cvs.openbsd.org 2014/04/21 14:36:16
Damien Miller [Thu, 15 May 2014 03:46:25 +0000 (13:46 +1000)] 
   - logan@cvs.openbsd.org 2014/04/21 14:36:16
     [sftp-client.c sftp-client.h sftp.c]
     Implement sftp upload resume support.
     OK from djm@, with input from guenther@, mlarkin@ and
     okan@

11 years ago - logan@cvs.openbsd.org 2014/04/20 09:24:26
Damien Miller [Thu, 15 May 2014 03:45:58 +0000 (13:45 +1000)] 
   - logan@cvs.openbsd.org 2014/04/20 09:24:26
     [dns.c dns.h ssh-keygen.c]
     Add support for SSHFP DNS records for ED25519 key types.
     OK from djm@

11 years ago - (djm) [rijndael.c rijndael.h] Sync with newly-ressurected versions ine
Damien Miller [Thu, 15 May 2014 03:45:26 +0000 (13:45 +1000)] 
 - (djm) [rijndael.c rijndael.h] Sync with newly-ressurected versions ine
   OpenBSD

11 years ago - (dtucker) [defines.h] Define __GNUC_PREREQ__ macro if we don't already
Darren Tucker [Wed, 30 Apr 2014 16:24:35 +0000 (02:24 +1000)] 
 - (dtucker) [defines.h] Define __GNUC_PREREQ__ macro if we don't already
   have it.  Only attempt to use __attribute__(__bounded__) for gcc.

11 years ago - djm@cvs.openbsd.org 2014/04/20 02:49:32
Damien Miller [Sun, 20 Apr 2014 03:33:58 +0000 (13:33 +1000)] 
   - djm@cvs.openbsd.org 2014/04/20 02:49:32
     [compat.c]
     add a canonical 6.6 + curve25519 bignum fix fake version that I can
     recommend people use ahead of the openssh-6.7 release

11 years ago - djm@cvs.openbsd.org 2014/04/20 02:30:25
Damien Miller [Sun, 20 Apr 2014 03:33:19 +0000 (13:33 +1000)] 
   - djm@cvs.openbsd.org 2014/04/20 02:30:25
     [misc.c misc.h umac.c]
     use get/put_u32 to load values rather than *((UINT32 *)p) that breaks on
     strict-alignment architectures; reported by and ok stsp@

11 years ago - tedu@cvs.openbsd.org 2014/04/19 18:42:19
Damien Miller [Sun, 20 Apr 2014 03:29:28 +0000 (13:29 +1000)] 
   - tedu@cvs.openbsd.org 2014/04/19 18:42:19
     [ssh.1]
     delete .xr to hosts.equiv. there's still an unfortunate amount of
     documentation referring to rhosts equivalency in here.

11 years ago - tedu@cvs.openbsd.org 2014/04/19 18:15:16
Damien Miller [Sun, 20 Apr 2014 03:29:06 +0000 (13:29 +1000)] 
   - tedu@cvs.openbsd.org 2014/04/19 18:15:16
     [sshd.8]
     remove some really old rsh references