]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
11 years ago - tedu@cvs.openbsd.org 2014/04/19 14:53:48
Damien Miller [Sun, 20 Apr 2014 03:27:53 +0000 (13:27 +1000)] 
   - tedu@cvs.openbsd.org 2014/04/19 14:53:48
     [ssh-keysign.c sshd.c]
     Delete futile calls to RAND_seed. ok djm
     NB. Id sync only. This only applies to OpenBSD's libcrypto slashathon

11 years ago - djm@cvs.openbsd.org 2014/04/19 05:54:59
Damien Miller [Sun, 20 Apr 2014 03:27:01 +0000 (13:27 +1000)] 
   - djm@cvs.openbsd.org 2014/04/19 05:54:59
     [compat.c]
     missing wildcard; pointed out by naddy@

11 years ago - djm@cvs.openbsd.org 2014/04/18 23:52:25
Damien Miller [Sun, 20 Apr 2014 03:25:30 +0000 (13:25 +1000)] 
   - djm@cvs.openbsd.org 2014/04/18 23:52:25
     [compat.c compat.h sshconnect2.c sshd.c version.h]
     OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections
     using the curve25519-sha256@libssh.org KEX exchange method to fail
     when connecting with something that implements the spec properly.

     Disable this KEX method when speaking to one of the affected
     versions.

     reported by Aris Adamantiadis; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/04/16 23:28:12
Damien Miller [Sun, 20 Apr 2014 03:25:09 +0000 (13:25 +1000)] 
   - djm@cvs.openbsd.org 2014/04/16 23:28:12
     [ssh-agent.1]
     remove the identity files from this manpage - ssh-agent doesn't deal
     with them at all and the same information is duplicated in ssh-add.1
     (which does deal with them); prodded by deraadt@

11 years ago - djm@cvs.openbsd.org 2014/04/16 23:22:45
Damien Miller [Sun, 20 Apr 2014 03:24:49 +0000 (13:24 +1000)] 
   - djm@cvs.openbsd.org 2014/04/16 23:22:45
     [bufaux.c]
     skip leading zero bytes in buffer_put_bignum2_from_string();
     reported by jan AT mojzis.com; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/04/12 04:55:53
Damien Miller [Sun, 20 Apr 2014 03:24:31 +0000 (13:24 +1000)] 
   - djm@cvs.openbsd.org 2014/04/12 04:55:53
     [sshd.c]
     avoid crash at exit: check that pmonitor!=NULL before dereferencing;
     bz#2225, patch from kavi AT juniper.net

11 years ago - djm@cvs.openbsd.org 2014/04/01 05:32:57
Damien Miller [Sun, 20 Apr 2014 03:24:01 +0000 (13:24 +1000)] 
   - djm@cvs.openbsd.org 2014/04/01 05:32:57
     [packet.c]
     demote a debug3 to PACKET_DEBUG; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/04/01 03:34:10
Damien Miller [Sun, 20 Apr 2014 03:23:43 +0000 (13:23 +1000)] 
   - djm@cvs.openbsd.org 2014/04/01 03:34:10
     [sshconnect.c]
     When using VerifyHostKeyDNS with a DNSSEC resolver, down-convert any
     certificate keys to plain keys and attempt SSHFP resolution.

     Prevents a server from skipping SSHFP lookup and forcing a new-hostkey
     dialog by offering only certificate keys.

     Reported by mcv21 AT cam.ac.uk

11 years ago - djm@cvs.openbsd.org 2014/04/01 02:05:27
Damien Miller [Sun, 20 Apr 2014 03:23:21 +0000 (13:23 +1000)] 
   - djm@cvs.openbsd.org 2014/04/01 02:05:27
     [ssh-keysign.c]
     include fingerprint of key not found
     use arc4random_buf() instead of loop+arc4random()

11 years ago - jmc@cvs.openbsd.org 2014/03/31 13:39:34
Damien Miller [Sun, 20 Apr 2014 03:23:03 +0000 (13:23 +1000)] 
   - jmc@cvs.openbsd.org 2014/03/31 13:39:34
     [ssh-keygen.1]
     the text for the -K option was inserted in the wrong place in -r1.108;
     fix From: Matthew Clarke

11 years ago - naddy@cvs.openbsd.org 2014/03/28 05:17:11
Damien Miller [Sun, 20 Apr 2014 03:22:46 +0000 (13:22 +1000)] 
   - naddy@cvs.openbsd.org 2014/03/28 05:17:11
     [ssh_config.5 sshd_config.5]
     sync available and default algorithms, improve algorithm list formatting
     help from jmc@ and schwarze@, ok deraadt@

11 years ago - tedu@cvs.openbsd.org 2014/03/26 19:58:37
Damien Miller [Sun, 20 Apr 2014 03:22:18 +0000 (13:22 +1000)] 
   - tedu@cvs.openbsd.org 2014/03/26 19:58:37
     [sshd.8 sshd.c]
     remove libwrap support. ok deraadt djm mfriedl

11 years ago - djm@cvs.openbsd.org 2014/03/26 04:55:35
Damien Miller [Sun, 20 Apr 2014 03:21:22 +0000 (13:21 +1000)] 
   - djm@cvs.openbsd.org 2014/03/26 04:55:35
     [chacha.h cipher-chachapoly.h digest.h hmac.h kex.h kexc25519.c
     [misc.h poly1305.h ssh-pkcs11.c]
     use __bounded(...) attribute recently added to sys/cdefs.h instead of
     longform __attribute__(__bounded(...));

     for brevity and a warning free compilation with llvm/clang

11 years agoThree commits in one (since they touch the same heavily-diverged file
Damien Miller [Sun, 20 Apr 2014 03:17:20 +0000 (13:17 +1000)] 
Three commits in one (since they touch the same heavily-diverged file
repeatedly):

   - markus@cvs.openbsd.org 2014/03/25 09:40:03
     [myproposal.h]
     trimm default proposals.

     This commit removes the weaker pre-SHA2 hashes, the broken ciphers
     (arcfour), and the broken modes (CBC) from the default configuration
     (the patch only changes the default, all the modes are still available
     for the config files).

     ok djm@, reminded by tedu@ & naddy@ and discussed with many
   - deraadt@cvs.openbsd.org 2014/03/26 17:16:26
     [myproposal.h]
     The current sharing of myproposal[] between both client and server code
     makes the previous diff highly unpallatable.  We want to go in that
     direction for the server, but not for the client.  Sigh.
     Brought up by naddy.
   - markus@cvs.openbsd.org 2014/03/27 23:01:27
     [myproposal.h ssh-keyscan.c sshconnect2.c sshd.c]
     disable weak proposals in sshd, but keep them in ssh; ok djm@

11 years ago - tedu@cvs.openbsd.org 2014/03/19 14:42:44
Damien Miller [Sun, 20 Apr 2014 03:02:58 +0000 (13:02 +1000)] 
   - tedu@cvs.openbsd.org 2014/03/19 14:42:44
     [scp.1]
     there is no need for rcp anymore
     ok deraadt millert

11 years ago - tedu@cvs.openbsd.org 2014/03/17 19:44:10
Damien Miller [Sun, 20 Apr 2014 03:02:26 +0000 (13:02 +1000)] 
   - tedu@cvs.openbsd.org 2014/03/17 19:44:10
     [ssh.1]
     old descriptions of des and blowfish are old. maybe ok deraadt

11 years ago - deraadt@cvs.openbsd.org 2014/03/15 17:28:26
Damien Miller [Sun, 20 Apr 2014 03:01:30 +0000 (13:01 +1000)] 
   - deraadt@cvs.openbsd.org 2014/03/15 17:28:26
     [ssh-agent.c ssh-keygen.1 ssh-keygen.c]
     Improve usage() and documentation towards the standard form.
     In particular, this line saves a lot of man page reading time.
       usage: ssh-keygen [-q] [-b bits] [-t dsa | ecdsa | ed25519 | rsa | rsa1]
                         [-N new_passphrase] [-C comment] [-f output_keyfile]
     ok schwarze jmc

11 years ago - naddy@cvs.openbsd.org 2014/03/12 13:06:59
Damien Miller [Sun, 20 Apr 2014 03:00:51 +0000 (13:00 +1000)] 
   - naddy@cvs.openbsd.org 2014/03/12 13:06:59
     [ssh-keyscan.1]
     scan for Ed25519 keys by default too

11 years ago - djm@cvs.openbsd.org 2014/03/12 04:51:12
Damien Miller [Sun, 20 Apr 2014 03:00:28 +0000 (13:00 +1000)] 
   - djm@cvs.openbsd.org 2014/03/12 04:51:12
     [authfile.c]
     correct test that kdf name is not "none" or "bcrypt"

11 years ago - djm@cvs.openbsd.org 2014/03/12 04:50:32
Damien Miller [Sun, 20 Apr 2014 03:00:11 +0000 (13:00 +1000)] 
   - djm@cvs.openbsd.org 2014/03/12 04:50:32
     [auth-bsdauth.c ssh-keygen.c]
     don't count on things that accept arguments by reference to clear
     things for us on error; most things do, but it's unsafe form.

11 years ago - djm@cvs.openbsd.org 2014/03/12 04:44:58
Damien Miller [Sun, 20 Apr 2014 02:59:46 +0000 (12:59 +1000)] 
   - djm@cvs.openbsd.org 2014/03/12 04:44:58
     [ssh-keyscan.c]
     scan for Ed25519 keys by default too

11 years ago - djm@cvs.openbsd.org 2014/03/03 22:22:30
Damien Miller [Sun, 20 Apr 2014 02:58:04 +0000 (12:58 +1000)] 
   - djm@cvs.openbsd.org 2014/03/03 22:22:30
     [session.c]
     ignore enviornment variables with embedded '=' or '\0' characters;
     spotted by Jann Horn; ok deraadt@
     Id sync only - portable already has this.

11 years ago - (djm) Use full release (e.g. 6.5p1) in debug output rather than just
Damien Miller [Tue, 1 Apr 2014 03:42:46 +0000 (14:42 +1100)] 
 - (djm) Use full release (e.g. 6.5p1) in debug output rather than just
    version. From des@des.no

11 years ago - (djm) On platforms that support it, use prctl() to prevent sftp-server
Damien Miller [Tue, 1 Apr 2014 03:38:07 +0000 (14:38 +1100)] 
 - (djm) On platforms that support it, use prctl() to prevent sftp-server
    from accessing /proc/self/{mem,maps}; patch from jann AT thejh.net

11 years ago - (djm) [sandbox-seccomp-filter.c] Soft-fail stat() syscalls. Add XXX to
Damien Miller [Mon, 17 Mar 2014 03:45:56 +0000 (14:45 +1100)] 
 - (djm) [sandbox-seccomp-filter.c] Soft-fail stat() syscalls. Add XXX to
   remind myself to add sandbox violation logging via the log socket.

11 years ago20140314
Tim Rice [Fri, 14 Mar 2014 19:45:01 +0000 (12:45 -0700)] 
20140314
 - (tim) [opensshd.init.in] Add support for ed25519

11 years ago - (djm) Release OpenSSH 6.6 V_6_6_P1
Damien Miller [Thu, 13 Mar 2014 02:14:21 +0000 (13:14 +1100)] 
 - (djm) Release OpenSSH 6.6

11 years ago - djm@cvs.openbsd.org 2014/03/03 22:22:30
Damien Miller [Mon, 3 Mar 2014 22:35:17 +0000 (09:35 +1100)] 
   - djm@cvs.openbsd.org 2014/03/03 22:22:30
     [session.c]
     ignore enviornment variables with embedded '=' or '\0' characters;
     spotted by Jann Horn; ok deraadt@

11 years ago - (djm) [regress/Makefile] Disable dhgex regress test; it breaks when
Damien Miller [Sat, 1 Mar 2014 17:01:00 +0000 (04:01 +1100)] 
 - (djm) [regress/Makefile] Disable dhgex regress test; it breaks when
   no moduli file exists at the expected location.

11 years ago - (djm) [regress/host-expand.sh] Add RCS Id
Damien Miller [Thu, 27 Feb 2014 23:34:03 +0000 (10:34 +1100)] 
 - (djm) [regress/host-expand.sh] Add RCS Id

11 years ago - djm@cvs.openbsd.org 2014/02/27 21:21:25
Damien Miller [Thu, 27 Feb 2014 23:25:16 +0000 (10:25 +1100)] 
   - djm@cvs.openbsd.org 2014/02/27 21:21:25
     [agent-ptrace.sh agent.sh]
     keep return values that are printed in error messages;
     from portable
     (Id sync only)

11 years ago - djm@cvs.openbsd.org 2014/02/27 20:04:16
Damien Miller [Thu, 27 Feb 2014 23:24:11 +0000 (10:24 +1100)] 
   - djm@cvs.openbsd.org 2014/02/27 20:04:16
     [login-timeout.sh]
     remove any existing LoginGraceTime from sshd_config before adding
     a specific one for the test back in

11 years ago - djm@cvs.openbsd.org 2014/01/26 10:49:17
Damien Miller [Thu, 27 Feb 2014 23:23:26 +0000 (10:23 +1100)] 
   - djm@cvs.openbsd.org 2014/01/26 10:49:17
     [scp-ssh-wrapper.sh scp.sh]
     make sure $SCP is tested on the remote end rather than whichever one
     happens to be in $PATH; from portable
     (Id sync only)

11 years ago - djm@cvs.openbsd.org 2014/01/26 10:22:10
Damien Miller [Thu, 27 Feb 2014 23:22:37 +0000 (10:22 +1100)] 
   - djm@cvs.openbsd.org 2014/01/26 10:22:10
     [regress/cert-hostkey.sh]
     automatically generate revoked keys from listed keys rather than
     manually specifying each type; from portable
     (Id sync only)

11 years ago - dtucker@cvs.openbsd.org 2014/01/25 04:35:32
Damien Miller [Thu, 27 Feb 2014 23:21:26 +0000 (10:21 +1100)] 
   - dtucker@cvs.openbsd.org 2014/01/25 04:35:32
     [regress/Makefile regress/dhgex.sh]
     Add a test for DH GEX sizes

11 years ago - dtucker@cvs.openbsd.org 2014/01/20 00:00:30
Damien Miller [Thu, 27 Feb 2014 23:19:51 +0000 (10:19 +1100)] 
   - dtucker@cvs.openbsd.org 2014/01/20 00:00:30
     [sftp-chroot.sh]
     append to rather than truncating the log file

11 years ago - dtucker@cvs.openbsd.org 2014/01/19 23:43:02
Damien Miller [Thu, 27 Feb 2014 23:19:11 +0000 (10:19 +1100)] 
   - dtucker@cvs.openbsd.org 2014/01/19 23:43:02
     [regress/sftp-chroot.sh]
     Don't use -q on sftp as it suppresses logging, instead redirect the
     output to the regress logfile.

11 years ago - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
Damien Miller [Thu, 27 Feb 2014 23:03:52 +0000 (10:03 +1100)] 
 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
   [contrib/suse/openssh.spec] Crank version numbers

11 years ago - djm@cvs.openbsd.org 2014/02/27 22:57:40
Damien Miller [Thu, 27 Feb 2014 23:01:53 +0000 (10:01 +1100)] 
   - djm@cvs.openbsd.org 2014/02/27 22:57:40
     [version.h]
     openssh-6.6

11 years ago - djm@cvs.openbsd.org 2014/02/27 22:47:07
Damien Miller [Thu, 27 Feb 2014 23:01:28 +0000 (10:01 +1100)] 
   - djm@cvs.openbsd.org 2014/02/27 22:47:07
     [sshd_config.5]
     bz#2184 clarify behaviour of a keyword that appears in multiple
     matching Match blocks; ok dtucker@

11 years ago - djm@cvs.openbsd.org 2014/02/27 08:25:09
Damien Miller [Thu, 27 Feb 2014 23:00:57 +0000 (10:00 +1100)] 
   - djm@cvs.openbsd.org 2014/02/27 08:25:09
     [bufbn.c]
     off by one in range check

11 years ago - djm@cvs.openbsd.org 2014/02/27 00:41:49
Damien Miller [Thu, 27 Feb 2014 23:00:27 +0000 (10:00 +1100)] 
   - djm@cvs.openbsd.org 2014/02/27 00:41:49
     [bufbn.c]
     fix unsigned overflow that could lead to reading a short ssh protocol
     1 bignum value; found by Ben Hawkes; ok deraadt@

11 years ago - markus@cvs.openbsd.org 2014/02/26 21:53:37
Damien Miller [Wed, 26 Feb 2014 23:20:07 +0000 (10:20 +1100)] 
   - markus@cvs.openbsd.org 2014/02/26 21:53:37
     [sshd.c]
     ssh_gssapi_prepare_supported_oids needs GSSAPI

11 years ago - djm@cvs.openbsd.org 2014/02/26 20:29:29
Damien Miller [Wed, 26 Feb 2014 23:18:32 +0000 (10:18 +1100)] 
   - djm@cvs.openbsd.org 2014/02/26 20:29:29
     [channels.c]
     don't assume that the socks4 username is \0 terminated;
     spotted by Ben Hawkes; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/02/26 20:28:44
Damien Miller [Wed, 26 Feb 2014 23:17:49 +0000 (10:17 +1100)] 
   - djm@cvs.openbsd.org 2014/02/26 20:28:44
     [auth2-gss.c gss-serv.c ssh-gss.h sshd.c]
     bz#2107 - cache OIDs of supported GSSAPI mechanisms before privsep
     sandboxing, as running this code in the sandbox can cause violations;
     ok markus@

11 years ago - djm@cvs.openbsd.org 2014/02/26 20:18:37
Damien Miller [Wed, 26 Feb 2014 23:17:13 +0000 (10:17 +1100)] 
   - djm@cvs.openbsd.org 2014/02/26 20:18:37
     [ssh.c]
     bz#2205: avoid early hostname lookups unless canonicalisation is enabled;
     ok dtucker@ markus@

11 years ago - djm@cvs.openbsd.org 2014/02/23 20:11:36
Damien Miller [Mon, 24 Feb 2014 04:57:55 +0000 (15:57 +1100)] 
   - djm@cvs.openbsd.org 2014/02/23 20:11:36
     [readconf.c readconf.h ssh.c ssh_config.5]
     reparse ssh_config and ~/.ssh/config if hostname canonicalisation changes
     the hostname. This allows users to write configurations that always
     refer to canonical hostnames, e.g.

     CanonicalizeHostname yes
     CanonicalDomains int.example.org example.org
     CanonicalizeFallbackLocal no

     Host *.int.example.org
         Compression off
     Host *.example.org
         User djm

     ok markus@

11 years ago - djm@cvs.openbsd.org 2014/02/23 20:03:42
Damien Miller [Mon, 24 Feb 2014 04:57:22 +0000 (15:57 +1100)] 
   - djm@cvs.openbsd.org 2014/02/23 20:03:42
     [ssh-ed25519.c]
     check for unsigned overflow; not reachable in OpenSSH but others might
     copy our code...

11 years ago - djm@cvs.openbsd.org 2014/02/22 01:32:19
Damien Miller [Mon, 24 Feb 2014 04:56:45 +0000 (15:56 +1100)] 
   - djm@cvs.openbsd.org 2014/02/22 01:32:19
     [readconf.c]
     when processing Match blocks, skip 'exec' clauses if previous predicates
     failed to match; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/02/15 23:05:36
Damien Miller [Mon, 24 Feb 2014 04:56:07 +0000 (15:56 +1100)] 
   - djm@cvs.openbsd.org 2014/02/15 23:05:36
     [channels.c]
     avoid spurious "getsockname failed: Bad file descriptor" errors in ssh -W;
     bz#2200, debian#738692 via Colin Watson; ok dtucker@

11 years ago - djm@cvs.openbsd.org 2014/02/07 06:55:54
Damien Miller [Mon, 24 Feb 2014 04:55:36 +0000 (15:55 +1100)] 
   - djm@cvs.openbsd.org 2014/02/07 06:55:54
     [cipher.c mac.c]
     remove some logging that makes ssh debugging output very verbose;
     ok markus

11 years ago20140221
Tim Rice [Fri, 21 Feb 2014 17:09:34 +0000 (09:09 -0800)] 
20140221
 - (tim) [configure.ac]  Fix cut-and-paste error. Patch from Bryan Drewery.

11 years ago - (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}] Add compat
Darren Tucker [Thu, 13 Feb 2014 05:38:32 +0000 (16:38 +1100)] 
 - (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}]  Add compat
   code for older OpenSSL versions that don't have EVP_MD_CTX_copy_ex.

11 years ago - djm@cvs.openbsd.org 2014/02/06 22:21:01
Damien Miller [Thu, 6 Feb 2014 22:24:33 +0000 (09:24 +1100)] 
   - djm@cvs.openbsd.org 2014/02/06 22:21:01
     [sshconnect.c]
     in ssh_create_socket(), only do the getaddrinfo for BindAddress when
     BindAddress is actually specified. Fixes regression in 6.5 for
     UsePrivilegedPort=yes; patch from Corinna Vinschen

11 years ago - naddy@cvs.openbsd.org 2014/02/05 20:13:25
Damien Miller [Thu, 6 Feb 2014 22:24:14 +0000 (09:24 +1100)] 
   - naddy@cvs.openbsd.org 2014/02/05 20:13:25
     [ssh-keygen.1 ssh-keygen.c]
     tweak synopsis: calling ssh-keygen without any arguments is fine; ok jmc@
     while here, fix ordering in usage(); requested by jmc@

11 years ago - (djm) [sandbox-seccomp-filter.c] Not all Linux architectures define
Damien Miller [Thu, 6 Feb 2014 00:17:50 +0000 (11:17 +1100)] 
 - (djm) [sandbox-seccomp-filter.c] Not all Linux architectures define
    __NR_shutdown; some go via the socketcall(2) multiplexer.

11 years ago - (dtucker) [openbsd-compat/bsd-poll.c] Don't bother checking for non-NULL
Darren Tucker [Wed, 5 Feb 2014 23:44:13 +0000 (10:44 +1100)] 
 - (dtucker) [openbsd-compat/bsd-poll.c] Don't bother checking for non-NULL
   before freeing since free(NULL) is a no-op.  ok djm.

11 years ago - (djm) [sandbox-capsicum.c] Don't fatal if Capsicum is offered by
Damien Miller [Tue, 4 Feb 2014 23:33:45 +0000 (10:33 +1100)] 
 - (djm) [sandbox-capsicum.c] Don't fatal if Capsicum is offered by
   headers/libc but not supported by the kernel. Patch from Loganaden
   Velvindron @ AfriNIC

11 years ago - (djm) [regress/setuid-allowed.c] Missing string.h for strerror()
Damien Miller [Tue, 4 Feb 2014 00:38:28 +0000 (11:38 +1100)] 
 - (djm) [regress/setuid-allowed.c] Missing string.h for strerror()

11 years ago - (djm) [openbsd-compat/Makefile.in] Add missing explicit_bzero.o
Damien Miller [Tue, 4 Feb 2014 00:37:50 +0000 (11:37 +1100)] 
 - (djm) [openbsd-compat/Makefile.in] Add missing explicit_bzero.o

11 years ago - djm@cvs.openbsd.org 2014/02/04 00:24:29
Damien Miller [Tue, 4 Feb 2014 00:26:34 +0000 (11:26 +1100)] 
   - djm@cvs.openbsd.org 2014/02/04 00:24:29
     [ssh.c]
     delay lowercasing of hostname until right before hostname
     canonicalisation to unbreak case-sensitive matching of ssh_config;
     reported by Ike Devolder; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/02/04 00:24:29
Damien Miller [Tue, 4 Feb 2014 00:26:04 +0000 (11:26 +1100)] 
   - djm@cvs.openbsd.org 2014/02/04 00:24:29
     [ssh.c]
     delay lowercasing of hostname until right before hostname
     canonicalisation to unbreak case-sensitive matching of ssh_config;
     reported by Ike Devolder; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/02/02 03:44:31
Damien Miller [Tue, 4 Feb 2014 00:25:45 +0000 (11:25 +1100)] 
   - djm@cvs.openbsd.org 2014/02/02 03:44:31
     [digest-libc.c digest-openssl.c]
     convert memset of potentially-private data to explicit_bzero()

11 years ago - djm@cvs.openbsd.org 2014/02/03 23:28:00
Damien Miller [Tue, 4 Feb 2014 00:20:40 +0000 (11:20 +1100)] 
   - djm@cvs.openbsd.org 2014/02/03 23:28:00
     [ssh-ecdsa.c]
     fix memory leak; ECDSA_SIG_new() allocates 'r' and 's' for us, unlike
     DSA_SIG_new. Reported by Batz Spear; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/02/02 03:44:32
Damien Miller [Tue, 4 Feb 2014 00:20:14 +0000 (11:20 +1100)] 
   - djm@cvs.openbsd.org 2014/02/02 03:44:32
     [auth1.c auth2-chall.c auth2-passwd.c authfile.c bufaux.c bufbn.c]
     [buffer.c cipher-3des1.c cipher.c clientloop.c gss-serv.c kex.c]
     [kexdhc.c kexdhs.c kexecdhc.c kexgexc.c kexecdhs.c kexgexs.c key.c]
     [monitor.c monitor_wrap.c packet.c readpass.c rsa.c serverloop.c]
     [ssh-add.c ssh-agent.c ssh-dss.c ssh-ecdsa.c ssh-ed25519.c]
     [ssh-keygen.c ssh-rsa.c sshconnect.c sshconnect1.c sshconnect2.c]
     [sshd.c]
     convert memset of potentially-private data to explicit_bzero()

11 years ago - tedu@cvs.openbsd.org 2014/01/31 16:39:19
Damien Miller [Tue, 4 Feb 2014 00:18:20 +0000 (11:18 +1100)] 
   - tedu@cvs.openbsd.org 2014/01/31 16:39:19
     [auth2-chall.c authfd.c authfile.c bufaux.c bufec.c canohost.c]
     [channels.c cipher-chachapoly.c clientloop.c configure.ac hostfile.c]
     [kexc25519.c krl.c monitor.c sandbox-systrace.c session.c]
     [sftp-client.c ssh-keygen.c ssh.c sshconnect2.c sshd.c sshlogin.c]
     [openbsd-compat/explicit_bzero.c openbsd-compat/openbsd-compat.h]
     replace most bzero with explicit_bzero, except a few that cna be memset
     ok djm dtucker

11 years ago - djm@cvs.openbsd.org 2014/01/30 22:26:14
Damien Miller [Tue, 4 Feb 2014 00:13:54 +0000 (11:13 +1100)] 
   - djm@cvs.openbsd.org 2014/01/30 22:26:14
     [sandbox-systrace.c]
     allow shutdown(2) syscall in sandbox - it may be called by packet_close()
     from portable
     (Id sync only; change is already in portable)

11 years ago - jmc@cvs.openbsd.org 2014/01/29 14:04:51
Damien Miller [Tue, 4 Feb 2014 00:13:17 +0000 (11:13 +1100)] 
   - jmc@cvs.openbsd.org 2014/01/29 14:04:51
     [sshd_config.5]
     document kbdinteractiveauthentication;
     requested From: Ross L Richardson

     dtucker/markus helped explain its workings;

11 years ago - djm@cvs.openbsd.org 2014/01/29 06:18:35
Damien Miller [Tue, 4 Feb 2014 00:12:56 +0000 (11:12 +1100)] 
   - djm@cvs.openbsd.org 2014/01/29 06:18:35
     [Makefile.in auth.h auth2-jpake.c auth2.c jpake.c jpake.h monitor.c]
     [monitor.h monitor_wrap.c monitor_wrap.h readconf.c readconf.h]
     [schnorr.c schnorr.h servconf.c servconf.h ssh2.h sshconnect2.c]
     remove experimental, never-enabled JPAKE code; ok markus@

11 years ago - djm@cvs.openbsd.org 2014/01/29 00:19:26
Damien Miller [Tue, 4 Feb 2014 00:10:01 +0000 (11:10 +1100)] 
   - djm@cvs.openbsd.org 2014/01/29 00:19:26
     [sshd.c]
     use kill(0, ...) instead of killpg(0, ...); on most operating systems
     they are equivalent, but SUSv2 describes the latter as having undefined
     behaviour; from portable; ok dtucker
     (Id sync only; change is already in portable)

11 years ago - jmc@cvs.openbsd.org 2014/01/28 14:13:39
Damien Miller [Tue, 4 Feb 2014 00:09:12 +0000 (11:09 +1100)] 
   - jmc@cvs.openbsd.org 2014/01/28 14:13:39
     [ssh-keyscan.1]
     kill some bad Pa;
     From: Jan Stary

11 years agoignore a few more regress droppings
Damien Miller [Tue, 4 Feb 2014 00:08:38 +0000 (11:08 +1100)] 
ignore a few more regress droppings

11 years ago - markus@cvs.openbsd.org 2014/01/27 20:13:46
Damien Miller [Tue, 4 Feb 2014 00:07:13 +0000 (11:07 +1100)] 
   - markus@cvs.openbsd.org 2014/01/27 20:13:46
     [digest.c digest-openssl.c digest-libc.c Makefile.in]
     rename digest.c to digest-openssl.c and add libc variant; ok djm@

11 years ago - markus@cvs.openbsd.org 2014/01/27 19:18:54
Damien Miller [Tue, 4 Feb 2014 00:03:36 +0000 (11:03 +1100)] 
   - markus@cvs.openbsd.org 2014/01/27 19:18:54
     [auth-rsa.c cipher.c ssh-agent.c sshconnect1.c sshd.c]
     replace openssl MD5 with our ssh_digest_*; ok djm@

11 years ago - markus@cvs.openbsd.org 2014/01/27 18:58:14
Damien Miller [Tue, 4 Feb 2014 00:02:42 +0000 (11:02 +1100)] 
   - markus@cvs.openbsd.org 2014/01/27 18:58:14
     [Makefile.in digest.c digest.h hostfile.c kex.h mac.c hmac.c hmac.h]
     replace openssl HMAC with an implementation based on our ssh_digest_*
     ok and feedback djm@

11 years ago - (tim) [Makefile.in] build regress/setuid-allow.
Tim Rice [Fri, 31 Jan 2014 22:25:18 +0000 (14:25 -0800)] 
 - (tim) [Makefile.in] build regress/setuid-allow.

11 years ago - (dtucker) [readconf.c] Include <arpa/inet.h> for the hton macros. Fixes
Darren Tucker [Fri, 31 Jan 2014 03:18:51 +0000 (14:18 +1100)] 
 - (dtucker) [readconf.c] Include <arpa/inet.h> for the hton macros.  Fixes
   build with HP-UX's compiler.  Patch from Kevin Brott.

11 years ago - (djm) [sandbox-seccomp-filter.c sandbox-systrace.c] Allow shutdown(2)
Damien Miller [Thu, 30 Jan 2014 22:25:34 +0000 (09:25 +1100)] 
 - (djm) [sandbox-seccomp-filter.c sandbox-systrace.c] Allow shutdown(2)
   syscall from sandboxes; it may be called by packet_close.

11 years ago - (djm) Release openssh-6.5p1 V_6_5_P1
Damien Miller [Thu, 30 Jan 2014 01:50:17 +0000 (12:50 +1100)] 
 - (djm) Release openssh-6.5p1

11 years agotrim entries prior to openssh-6.0p1
Damien Miller [Thu, 30 Jan 2014 01:49:55 +0000 (12:49 +1100)] 
trim entries prior to openssh-6.0p1

11 years ago - (djm) [configure.ac atomicio.c] Kludge around NetBSD offering
Damien Miller [Thu, 30 Jan 2014 00:26:46 +0000 (11:26 +1100)] 
 - (djm) [configure.ac atomicio.c] Kludge around NetBSD offering
   different symbols for 'read' when various compiler flags are
   in use, causing atomicio.c comparisons against it to break and
   read/write operations to hang; ok dtucker

11 years ago - (djm) [configure.ac] Only check for width-specified integer types
Damien Miller [Wed, 29 Jan 2014 23:21:19 +0000 (10:21 +1100)] 
 - (djm) [configure.ac] Only check for width-specified integer types
   in headers that actually exist. patch from Tom G. Christensen;
   ok dtucker@

11 years ago - (djm) [configure.ac] Fix broken shell test '==' vs '='; patch from
Damien Miller [Wed, 29 Jan 2014 10:01:33 +0000 (21:01 +1100)] 
 - (djm) [configure.ac] Fix broken shell test '==' vs '='; patch from
   Tom G. Christensen

11 years ago - (tim) [regress/agent.sh regress/agent-ptrace.sh] Assign $? to a variable
Tim Rice [Tue, 28 Jan 2014 18:26:25 +0000 (10:26 -0800)] 
 - (tim) [regress/agent.sh regress/agent-ptrace.sh] Assign $? to a variable
   when used as an error message inside an if statement so we display the
   correct into. agent.sh patch from Petr Lautrbach.

11 years ago - (djm) [sshd.c] Use kill(0, ...) instead of killpg(0, ...); the
Damien Miller [Tue, 28 Jan 2014 04:08:12 +0000 (15:08 +1100)] 
 - (djm) [sshd.c] Use kill(0, ...) instead of killpg(0, ...); the
   latter being specified to have undefined behaviour in SUSv3;
   ok dtucker

11 years ago - (djm) [configure.ac] Search for inet_ntop in libnsl and libresovl;
Damien Miller [Tue, 28 Jan 2014 04:07:10 +0000 (15:07 +1100)] 
 - (djm) [configure.ac] Search for inet_ntop in libnsl and libresovl;
   ok dtucker

11 years ago - (dtucker) [Makefile.in] Remove trailing backslash which some make
Darren Tucker [Mon, 27 Jan 2014 06:35:04 +0000 (17:35 +1100)] 
 - (dtucker) [Makefile.in] Remove trailing backslash which some make
   implementations (eg older Solaris) do not cope with.

11 years agoWelcome to 2014
Darren Tucker [Mon, 27 Jan 2014 06:32:50 +0000 (17:32 +1100)] 
Welcome to 2014

11 years ago - (djm) [configure.ac] correct AC_DEFINE for previous.
Damien Miller [Sat, 25 Jan 2014 22:46:53 +0000 (09:46 +1100)] 
 - (djm) [configure.ac] correct AC_DEFINE for previous.

11 years ago - (djm) [configure.ac sandbox-capsicum.c sandbox-rlimit.c] Disable
Damien Miller [Sat, 25 Jan 2014 22:39:53 +0000 (09:39 +1100)] 
  - (djm) [configure.ac sandbox-capsicum.c sandbox-rlimit.c] Disable
    RLIMIT_NOFILE pseudo-sandbox on FreeBSD. In some configurations,
    libc will attempt to open additional file descriptors for crypto
    offload and crash if they cannot be opened.

11 years ago - markus@cvs.openbsd.org 2014/01/25 20:35:37
Damien Miller [Sat, 25 Jan 2014 22:38:03 +0000 (09:38 +1100)] 
   - markus@cvs.openbsd.org 2014/01/25 20:35:37
     [kex.c]
     dh_need needs to be set to max(seclen, blocksize, ivlen, mac_len)
     ok dtucker@, noted by mancha

11 years ago - dtucker@cvs.openbsd.org 2014/01/25 10:12:50
Damien Miller [Sat, 25 Jan 2014 22:37:25 +0000 (09:37 +1100)] 
   - dtucker@cvs.openbsd.org 2014/01/25 10:12:50
     [cipher.c cipher.h kex.c kex.h kexgexc.c]
     Add a special case for the DH group size for 3des-cbc, which has an
     effective strength much lower than the key size.  This causes problems
     with some cryptlib implementations, which don't support group sizes larger
     than 4k but also don't use the largest group size it does support as
     specified in the RFC.  Based on a patch from Petr Lautrbach at Redhat,
     reduced by me with input from Markus.  ok djm@ markus@

11 years ago - (djm) [configure.ac] autoconf sets finds to 'yes' not '1', so test
Damien Miller [Sat, 25 Jan 2014 02:16:59 +0000 (13:16 +1100)] 
 - (djm) [configure.ac] autoconf sets finds to 'yes' not '1', so test
   against the correct thing.

11 years ago - (djm) [configure.ac] Do not attempt to use capsicum sandbox unless
Damien Miller [Sat, 25 Jan 2014 02:12:28 +0000 (13:12 +1100)] 
 - (djm) [configure.ac] Do not attempt to use capsicum sandbox unless
   sys/capability.h exists and cap_rights_limit is in libc. Fixes
   build on FreeBSD9x which provides the header but not the libc
   support.

11 years ago - (djm) [configure.ac] Fix detection of capsicum sandbox on FreeBSD
Damien Miller [Sat, 25 Jan 2014 01:34:38 +0000 (12:34 +1100)] 
 - (djm) [configure.ac] Fix detection of capsicum sandbox on FreeBSD

11 years ago - (djm) [Makefile.in regress/scp-ssh-wrapper.sh regress/scp.sh] Make
Damien Miller [Fri, 24 Jan 2014 03:27:04 +0000 (14:27 +1100)] 
 - (djm) [Makefile.in regress/scp-ssh-wrapper.sh regress/scp.sh] Make
   the scp regress test actually test the built scp rather than the one
   in $PATH. ok dtucker@

11 years ago - (dtucker) [configure.ac] NetBSD's (and FreeBSD's) strnvis is gratuitously
Darren Tucker [Thu, 23 Jan 2014 12:14:39 +0000 (23:14 +1100)] 
 - (dtucker) [configure.ac] NetBSD's (and FreeBSD's) strnvis is gratuitously
   incompatible with OpenBSD's despite post-dating it by more than a decade.
   Declare it as broken, and document FreeBSD's as the same.  ok djm@

11 years ago - (tim) [session.c] Improve error reporting on set_id().
Tim Rice [Thu, 23 Jan 2014 03:16:10 +0000 (19:16 -0800)] 
 - (tim) [session.c] Improve error reporting on set_id().

11 years ago - (djm) [configure.ac aclocal.m4] More tests to detect fallout from
Damien Miller [Wed, 22 Jan 2014 10:30:12 +0000 (21:30 +1100)] 
 - (djm) [configure.ac aclocal.m4] More tests to detect fallout from
   platform hardening options: include some long long int arithmatic
   to detect missing support functions for -ftrapv in libgcc and
   equivalents, actually test linking when -ftrapv is supplied and
   set either both -pie/-fPIE or neither. feedback and ok dtucker@

11 years ago - (djm) [configure.ac] Unless specifically requested, only attempt
Damien Miller [Wed, 22 Jan 2014 05:31:18 +0000 (16:31 +1100)] 
 - (djm) [configure.ac] Unless specifically requested, only attempt
   to build Position Independent Executables on gcc >= 4.x; ok dtucker