diff options
56 files changed, 266 insertions, 249 deletions
@@ -1,3 +1,121 @@ | |||
1 | commit e91346dc2bbf460246df2ab591b7613908c1b0ad | ||
2 | Author: Damien Miller <djm@mindrot.org> | ||
3 | Date: Fri Aug 21 14:49:03 2015 +1000 | ||
4 | |||
5 | we don't use Github for issues/pull-requests | ||
6 | |||
7 | commit a4f5b507c708cc3dc2c8dd2d02e4416d7514dc23 | ||
8 | Author: Damien Miller <djm@mindrot.org> | ||
9 | Date: Fri Aug 21 14:43:55 2015 +1000 | ||
10 | |||
11 | fix URL for connect.c | ||
12 | |||
13 | commit d026a8d3da0f8186598442997c7d0a28e7275414 | ||
14 | Author: Damien Miller <djm@mindrot.org> | ||
15 | Date: Fri Aug 21 13:47:10 2015 +1000 | ||
16 | |||
17 | update version numbers for 7.1 | ||
18 | |||
19 | commit 78f8f589f0ca1c9f41e5a9bae3cda5ce8a6b42ed | ||
20 | Author: djm@openbsd.org <djm@openbsd.org> | ||
21 | Date: Fri Aug 21 03:45:26 2015 +0000 | ||
22 | |||
23 | upstream commit | ||
24 | |||
25 | openssh-7.1 | ||
26 | |||
27 | Upstream-ID: ff7b1ef4b06caddfb45e08ba998128c88be3d73f | ||
28 | |||
29 | commit 32a181980c62fce94f7f9ffaf6a79d90f0c309cf | ||
30 | Author: djm@openbsd.org <djm@openbsd.org> | ||
31 | Date: Fri Aug 21 03:42:19 2015 +0000 | ||
32 | |||
33 | upstream commit | ||
34 | |||
35 | fix inverted logic that broke PermitRootLogin; reported | ||
36 | by Mantas Mikulenas; ok markus@ | ||
37 | |||
38 | Upstream-ID: 260dd6a904c1bb7e43267e394b1c9cf70bdd5ea5 | ||
39 | |||
40 | commit ce445b0ed927e45bd5bdce8f836eb353998dd65c | ||
41 | Author: deraadt@openbsd.org <deraadt@openbsd.org> | ||
42 | Date: Thu Aug 20 22:32:42 2015 +0000 | ||
43 | |||
44 | upstream commit | ||
45 | |||
46 | Do not cast result of malloc/calloc/realloc* if stdlib.h | ||
47 | is in scope ok krw millert | ||
48 | |||
49 | Upstream-ID: 5e50ded78cadf3841556649a16cc4b1cb6c58667 | ||
50 | |||
51 | commit 05291e5288704d1a98bacda269eb5a0153599146 | ||
52 | Author: naddy@openbsd.org <naddy@openbsd.org> | ||
53 | Date: Thu Aug 20 19:20:06 2015 +0000 | ||
54 | |||
55 | upstream commit | ||
56 | |||
57 | In the certificates section, be consistent about using | ||
58 | "host_key" and "user_key" for the respective key types. ok sthen@ deraadt@ | ||
59 | |||
60 | Upstream-ID: 9e037ea3b15577b238604c5533e082a3947f13cb | ||
61 | |||
62 | commit 8543d4ef6f2e9f98c3e6b77c894ceec30c5e4ae4 | ||
63 | Author: djm@openbsd.org <djm@openbsd.org> | ||
64 | Date: Wed Aug 19 23:21:42 2015 +0000 | ||
65 | |||
66 | upstream commit | ||
67 | |||
68 | Better compat matching for WinSCP, add compat matching | ||
69 | for FuTTY (fork of PuTTY); ok markus@ deraadt@ | ||
70 | |||
71 | Upstream-ID: 24001d1ac115fa3260fbdc329a4b9aeb283c5389 | ||
72 | |||
73 | commit ec6eda16ebab771aa3dfc90629b41953b999cb1e | ||
74 | Author: djm@openbsd.org <djm@openbsd.org> | ||
75 | Date: Wed Aug 19 23:19:01 2015 +0000 | ||
76 | |||
77 | upstream commit | ||
78 | |||
79 | fix double-free() in error path of DSA key generation | ||
80 | reported by Mateusz Kocielski; ok markus@ | ||
81 | |||
82 | Upstream-ID: 4735d8f888b10599a935fa1b374787089116713c | ||
83 | |||
84 | commit 45b0eb752c94954a6de046bfaaf129e518ad4b5b | ||
85 | Author: djm@openbsd.org <djm@openbsd.org> | ||
86 | Date: Wed Aug 19 23:18:26 2015 +0000 | ||
87 | |||
88 | upstream commit | ||
89 | |||
90 | fix free() of uninitialised pointer reported by Mateusz | ||
91 | Kocielski; ok markus@ | ||
92 | |||
93 | Upstream-ID: 519552b050618501a06b7b023de5cb104e2c5663 | ||
94 | |||
95 | commit c837643b93509a3ef538cb6624b678c5fe32ff79 | ||
96 | Author: djm@openbsd.org <djm@openbsd.org> | ||
97 | Date: Wed Aug 19 23:17:51 2015 +0000 | ||
98 | |||
99 | upstream commit | ||
100 | |||
101 | fixed unlink([uninitialised memory]) reported by Mateusz | ||
102 | Kocielski; ok markus@ | ||
103 | |||
104 | Upstream-ID: 14a0c4e7d891f5a8dabc4b89d4f6b7c0d5a20109 | ||
105 | |||
106 | commit 1f8d3d629cd553031021068eb9c646a5f1e50994 | ||
107 | Author: jmc@openbsd.org <jmc@openbsd.org> | ||
108 | Date: Fri Aug 14 15:32:41 2015 +0000 | ||
109 | |||
110 | upstream commit | ||
111 | |||
112 | match myproposal.h order; from brian conway (i snuck in a | ||
113 | tweak while here) | ||
114 | |||
115 | ok dtucker | ||
116 | |||
117 | Upstream-ID: 35174a19b5237ea36aa3798f042bf5933b772c67 | ||
118 | |||
1 | commit 1dc8d93ce69d6565747eb44446ed117187621b26 | 119 | commit 1dc8d93ce69d6565747eb44446ed117187621b26 |
2 | Author: deraadt@openbsd.org <deraadt@openbsd.org> | 120 | Author: deraadt@openbsd.org <deraadt@openbsd.org> |
3 | Date: Thu Aug 6 14:53:21 2015 +0000 | 121 | Date: Thu Aug 6 14:53:21 2015 +0000 |
@@ -9013,134 +9131,3 @@ Date: Wed Aug 28 12:49:43 2013 +1000 | |||
9013 | - (djm) [openbsd-compat/bsd-snprintf.c] teach our local snprintf code the | 9131 | - (djm) [openbsd-compat/bsd-snprintf.c] teach our local snprintf code the |
9014 | 'j' (intmax_t/uintmax_t) and 'z' (size_t/ssize_t) conversions in case we | 9132 | 'j' (intmax_t/uintmax_t) and 'z' (size_t/ssize_t) conversions in case we |
9015 | start to use them in the future. | 9133 | start to use them in the future. |
9016 | |||
9017 | commit f2f6c315a920a256937e1b6a3702757f3195a592 | ||
9018 | Author: Damien Miller <djm@mindrot.org> | ||
9019 | Date: Wed Aug 21 02:44:58 2013 +1000 | ||
9020 | |||
9021 | - jmc@cvs.openbsd.org 2013/08/20 06:56:07 | ||
9022 | [ssh.1 ssh_config.5] | ||
9023 | some proxyusefdpass tweaks; | ||
9024 | |||
9025 | commit 1262b6638f7d01ab110fd373dd90d915c882fe1a | ||
9026 | Author: Damien Miller <djm@mindrot.org> | ||
9027 | Date: Wed Aug 21 02:44:24 2013 +1000 | ||
9028 | |||
9029 | - djm@cvs.openbsd.org 2013/08/20 00:11:38 | ||
9030 | [readconf.c readconf.h ssh_config.5 sshconnect.c] | ||
9031 | Add a ssh_config ProxyUseFDPass option that supports the use of | ||
9032 | ProxyCommands that establish a connection and then pass a connected | ||
9033 | file descriptor back to ssh(1). This allows the ProxyCommand to exit | ||
9034 | rather than have to shuffle data back and forth and enables ssh to use | ||
9035 | getpeername, etc. to obtain address information just like it does with | ||
9036 | regular directly-connected sockets. ok markus@ | ||
9037 | |||
9038 | commit b7727df37efde4dbe4f5a33b19cbf42022aabf66 | ||
9039 | Author: Damien Miller <djm@mindrot.org> | ||
9040 | Date: Wed Aug 21 02:43:49 2013 +1000 | ||
9041 | |||
9042 | - jmc@cvs.openbsd.org 2013/08/14 08:39:27 | ||
9043 | [scp.1 ssh.1] | ||
9044 | some Bx/Ox conversion; | ||
9045 | From: Jan Stary | ||
9046 | |||
9047 | commit d5d9d7b1fdacf0551de4c747728bd159be40590a | ||
9048 | Author: Damien Miller <djm@mindrot.org> | ||
9049 | Date: Wed Aug 21 02:43:27 2013 +1000 | ||
9050 | |||
9051 | - djm@cvs.openbsd.org 2013/08/13 18:33:08 | ||
9052 | [ssh-keygen.c] | ||
9053 | another of the same typo | ||
9054 | |||
9055 | commit d234afb0b3a8de1be78cbeafed5fc86912594c3c | ||
9056 | Author: Damien Miller <djm@mindrot.org> | ||
9057 | Date: Wed Aug 21 02:42:58 2013 +1000 | ||
9058 | |||
9059 | - djm@cvs.openbsd.org 2013/08/13 18:32:08 | ||
9060 | [ssh-keygen.c] | ||
9061 | typo in error message; from Stephan Rickauer | ||
9062 | |||
9063 | commit e0ee727b8281a7c2ae20630ce83f6b200b404059 | ||
9064 | Author: Damien Miller <djm@mindrot.org> | ||
9065 | Date: Wed Aug 21 02:42:35 2013 +1000 | ||
9066 | |||
9067 | - djm@cvs.openbsd.org 2013/08/09 03:56:42 | ||
9068 | [sftp.c] | ||
9069 | enable ctrl-left-arrow and ctrl-right-arrow to move forward/back a word; | ||
9070 | matching ksh's relatively recent change. | ||
9071 | |||
9072 | commit fec029f1dc2c338f3fae3fa82aabc988dc07868c | ||
9073 | Author: Damien Miller <djm@mindrot.org> | ||
9074 | Date: Wed Aug 21 02:42:12 2013 +1000 | ||
9075 | |||
9076 | - djm@cvs.openbsd.org 2013/08/09 03:39:13 | ||
9077 | [sftp-client.c] | ||
9078 | two problems found by a to-be-committed regress test: 1) msg_id was not | ||
9079 | being initialised so was starting at a random value from the heap | ||
9080 | (harmless, but confusing). 2) some error conditions were not being | ||
9081 | propagated back to the caller | ||
9082 | |||
9083 | commit 036d30743fc914089f9849ca52d615891d47e616 | ||
9084 | Author: Damien Miller <djm@mindrot.org> | ||
9085 | Date: Wed Aug 21 02:41:46 2013 +1000 | ||
9086 | |||
9087 | - djm@cvs.openbsd.org 2013/08/09 03:37:25 | ||
9088 | [sftp.c] | ||
9089 | do getopt parsing for all sftp commands (with an empty optstring for | ||
9090 | commands without arguments) to ensure consistent behaviour | ||
9091 | |||
9092 | commit c7dba12bf95eb1d69711881a153cc286c1987663 | ||
9093 | Author: Damien Miller <djm@mindrot.org> | ||
9094 | Date: Wed Aug 21 02:41:15 2013 +1000 | ||
9095 | |||
9096 | - djm@cvs.openbsd.org 2013/08/08 05:04:03 | ||
9097 | [sftp-client.c sftp-client.h sftp.c] | ||
9098 | add a "-l" flag for the rename command to force it to use the silly | ||
9099 | standard SSH_FXP_RENAME command instead of the POSIX-rename- like | ||
9100 | posix-rename@openssh.com extension. | ||
9101 | |||
9102 | intended for use in regress tests, so no documentation. | ||
9103 | |||
9104 | commit 034f27a0c09e69fe3589045b41f03f6e345b63f5 | ||
9105 | Author: Damien Miller <djm@mindrot.org> | ||
9106 | Date: Wed Aug 21 02:40:44 2013 +1000 | ||
9107 | |||
9108 | - djm@cvs.openbsd.org 2013/08/08 04:52:04 | ||
9109 | [sftp.c] | ||
9110 | fix two year old regression: symlinking a file would incorrectly | ||
9111 | canonicalise the target path. bz#2129 report from delphij AT freebsd.org | ||
9112 | |||
9113 | commit c6895c5c67492144dd28589e5788f783be9152ed | ||
9114 | Author: Damien Miller <djm@mindrot.org> | ||
9115 | Date: Wed Aug 21 02:40:21 2013 +1000 | ||
9116 | |||
9117 | - jmc@cvs.openbsd.org 2013/08/07 06:24:51 | ||
9118 | [sftp.1 sftp.c] | ||
9119 | sort -a; | ||
9120 | |||
9121 | commit a6d6c1f38ac9b4a5e1bd4df889e1020a8370ed55 | ||
9122 | Author: Damien Miller <djm@mindrot.org> | ||
9123 | Date: Wed Aug 21 02:40:01 2013 +1000 | ||
9124 | |||
9125 | - djm@cvs.openbsd.org 2013/08/06 23:06:01 | ||
9126 | [servconf.c] | ||
9127 | add cast to avoid format warning; from portable | ||
9128 | |||
9129 | commit eec840673bce3f69ad269672fba7ed8ff05f154f | ||
9130 | Author: Damien Miller <djm@mindrot.org> | ||
9131 | Date: Wed Aug 21 02:39:39 2013 +1000 | ||
9132 | |||
9133 | - djm@cvs.openbsd.org 2013/08/06 23:05:01 | ||
9134 | [sftp.1] | ||
9135 | document top-level -a option (the -a option to 'get' was already | ||
9136 | documented) | ||
9137 | |||
9138 | commit 02e878070d0eddad4e11f2c82644b275418eb112 | ||
9139 | Author: Damien Miller <djm@mindrot.org> | ||
9140 | Date: Wed Aug 21 02:38:51 2013 +1000 | ||
9141 | |||
9142 | - djm@cvs.openbsd.org 2013/08/06 23:03:49 | ||
9143 | [sftp.c] | ||
9144 | fix some whitespace at EOL | ||
9145 | make list of commands an enum rather than a long list of defines | ||
9146 | add -a to usage() | ||
@@ -1,4 +1,8 @@ | |||
1 | See http://www.openssh.com/txt/release-7.0 for the release notes. | 1 | See http://www.openssh.com/txt/release-7.1 for the release notes. |
2 | |||
3 | Please read http://www.openssh.com/report.html for bug reporting | ||
4 | instructions and note that we do not use Github for bug reporting or | ||
5 | patch/pull-request management. | ||
2 | 6 | ||
3 | - A Japanese translation of this document and of the OpenSSH FAQ is | 7 | - A Japanese translation of this document and of the OpenSSH FAQ is |
4 | - available at http://www.unixuser.org/~haruyama/security/openssh/index.html | 8 | - available at http://www.unixuser.org/~haruyama/security/openssh/index.html |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: auth.c,v 1.112 2015/08/06 14:53:21 deraadt Exp $ */ | 1 | /* $OpenBSD: auth.c,v 1.113 2015/08/21 03:42:19 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -354,7 +354,7 @@ auth_root_allowed(const char *method) | |||
354 | case PERMIT_NO_PASSWD: | 354 | case PERMIT_NO_PASSWD: |
355 | if (strcmp(method, "publickey") == 0 || | 355 | if (strcmp(method, "publickey") == 0 || |
356 | strcmp(method, "hostbased") == 0 || | 356 | strcmp(method, "hostbased") == 0 || |
357 | strcmp(method, "gssapi-with-mic")) | 357 | strcmp(method, "gssapi-with-mic") == 0) |
358 | return 1; | 358 | return 1; |
359 | break; | 359 | break; |
360 | case PERMIT_FORCED_ONLY: | 360 | case PERMIT_FORCED_ONLY: |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: compat.c,v 1.96 2015/07/28 23:20:42 djm Exp $ */ | 1 | /* $OpenBSD: compat.c,v 1.97 2015/08/19 23:21:42 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 1999, 2000, 2001, 2002 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 1999, 2000, 2001, 2002 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -176,6 +176,7 @@ compat_datafellows(const char *version) | |||
176 | "PuTTY_Release_0.63*," | 176 | "PuTTY_Release_0.63*," |
177 | "PuTTY_Release_0.64*", | 177 | "PuTTY_Release_0.64*", |
178 | SSH_OLD_DHGEX }, | 178 | SSH_OLD_DHGEX }, |
179 | { "FuTTY*", SSH_OLD_DHGEX }, /* Putty Fork */ | ||
179 | { "Probe-*", | 180 | { "Probe-*", |
180 | SSH_BUG_PROBE }, | 181 | SSH_BUG_PROBE }, |
181 | { "TeraTerm SSH*," | 182 | { "TeraTerm SSH*," |
@@ -189,7 +190,17 @@ compat_datafellows(const char *version) | |||
189 | "TTSSH/2.70*," | 190 | "TTSSH/2.70*," |
190 | "TTSSH/2.71*," | 191 | "TTSSH/2.71*," |
191 | "TTSSH/2.72*", SSH_BUG_HOSTKEYS }, | 192 | "TTSSH/2.72*", SSH_BUG_HOSTKEYS }, |
192 | { "WinSCP*", SSH_OLD_DHGEX }, | 193 | { "WinSCP_release_4*," |
194 | "WinSCP_release_5.0*," | ||
195 | "WinSCP_release_5.1*," | ||
196 | "WinSCP_release_5.5*," | ||
197 | "WinSCP_release_5.6*," | ||
198 | "WinSCP_release_5.7," | ||
199 | "WinSCP_release_5.7.1," | ||
200 | "WinSCP_release_5.7.2," | ||
201 | "WinSCP_release_5.7.3," | ||
202 | "WinSCP_release_5.7.4", | ||
203 | SSH_OLD_DHGEX }, | ||
193 | { NULL, 0 } | 204 | { NULL, 0 } |
194 | }; | 205 | }; |
195 | 206 | ||
diff --git a/contrib/README b/contrib/README index c00223865..60e19ba9f 100644 --- a/contrib/README +++ b/contrib/README | |||
@@ -11,7 +11,7 @@ which allows the use of outbound SSH from behind a SOCKS4, SOCKS5 or | |||
11 | https CONNECT style proxy server. His page for connect.c has extensive | 11 | https CONNECT style proxy server. His page for connect.c has extensive |
12 | documentation on its use as well as compiled versions for Win32. | 12 | documentation on its use as well as compiled versions for Win32. |
13 | 13 | ||
14 | http://www.taiyo.co.jp/~gotoh/ssh/connect.html | 14 | https://bitbucket.org/gotoh/connect/wiki/Home |
15 | 15 | ||
16 | 16 | ||
17 | X11 SSH Askpass: | 17 | X11 SSH Askpass: |
diff --git a/contrib/redhat/openssh.spec b/contrib/redhat/openssh.spec index 5de787555..5b27106fb 100644 --- a/contrib/redhat/openssh.spec +++ b/contrib/redhat/openssh.spec | |||
@@ -1,4 +1,4 @@ | |||
1 | %define ver 7.0p1 | 1 | %define ver 7.1p1 |
2 | %define rel 1 | 2 | %define rel 1 |
3 | 3 | ||
4 | # OpenSSH privilege separation requires a user & group ID | 4 | # OpenSSH privilege separation requires a user & group ID |
diff --git a/contrib/suse/openssh.spec b/contrib/suse/openssh.spec index dd9692da1..596895882 100644 --- a/contrib/suse/openssh.spec +++ b/contrib/suse/openssh.spec | |||
@@ -13,7 +13,7 @@ | |||
13 | 13 | ||
14 | Summary: OpenSSH, a free Secure Shell (SSH) protocol implementation | 14 | Summary: OpenSSH, a free Secure Shell (SSH) protocol implementation |
15 | Name: openssh | 15 | Name: openssh |
16 | Version: 7.0p1 | 16 | Version: 7.1p1 |
17 | URL: http://www.openssh.com/ | 17 | URL: http://www.openssh.com/ |
18 | Release: 1 | 18 | Release: 1 |
19 | Source0: openssh-%{version}.tar.gz | 19 | Source0: openssh-%{version}.tar.gz |
diff --git a/debian/.git-dpm b/debian/.git-dpm index 77f37fc00..3e36366c8 100644 --- a/debian/.git-dpm +++ b/debian/.git-dpm | |||
@@ -1,8 +1,8 @@ | |||
1 | # see git-dpm(1) from git-dpm package | 1 | # see git-dpm(1) from git-dpm package |
2 | 6d0faf6dc76ac8cc73d6f8e478db7c97f7013a2d | 2 | 733c4de05612fe398ac3dc7d31d318d7012fda05 |
3 | 6d0faf6dc76ac8cc73d6f8e478db7c97f7013a2d | 3 | 733c4de05612fe398ac3dc7d31d318d7012fda05 |
4 | 58ddb8ad21f21f5358db0204c4ba9abf94a1ca11 | 4 | 651211fd4a199b299540c00c54a46e27fadb04be |
5 | 58ddb8ad21f21f5358db0204c4ba9abf94a1ca11 | 5 | 651211fd4a199b299540c00c54a46e27fadb04be |
6 | openssh_7.0p1.orig.tar.gz | 6 | openssh_7.1p1.orig.tar.gz |
7 | d8337c9eab91d360d104f6dd805f8b32089c063c | 7 | ed22af19f962262c493fcc6ed8c8826b2761d9b6 |
8 | 1493376 | 8 | 1493170 |
diff --git a/debian/README.Debian b/debian/README.Debian index 9d029585c..d26e5a39d 100644 --- a/debian/README.Debian +++ b/debian/README.Debian | |||
@@ -20,7 +20,7 @@ PermitRootLogin | |||
20 | 20 | ||
21 | As of 1:6.6p1-1, new installations will be set to "PermitRootLogin | 21 | As of 1:6.6p1-1, new installations will be set to "PermitRootLogin |
22 | without-password" (or the synonymous "PermitRootLogin prohibit-password" as | 22 | without-password" (or the synonymous "PermitRootLogin prohibit-password" as |
23 | of 1:7.0p1-1). This disables password authentication for root, foiling | 23 | of 1:7.1p1-1). This disables password authentication for root, foiling |
24 | password dictionary attacks on the root user. Some sites may wish to use | 24 | password dictionary attacks on the root user. Some sites may wish to use |
25 | the stronger "PermitRootLogin forced-commands-only" or "PermitRootLogin no", | 25 | the stronger "PermitRootLogin forced-commands-only" or "PermitRootLogin no", |
26 | but note that "PermitRootLogin no" will break setups that SSH to root with a | 26 | but note that "PermitRootLogin no" will break setups that SSH to root with a |
diff --git a/debian/changelog b/debian/changelog index 262b74285..2ce43a7f9 100644 --- a/debian/changelog +++ b/debian/changelog | |||
@@ -1,4 +1,4 @@ | |||
1 | openssh (1:7.0p1-1) UNRELEASED; urgency=medium | 1 | openssh (1:7.1p1-1) UNRELEASED; urgency=medium |
2 | 2 | ||
3 | * New upstream release (http://www.openssh.com/txt/release-7.0, closes: | 3 | * New upstream release (http://www.openssh.com/txt/release-7.0, closes: |
4 | #785190): | 4 | #785190): |
@@ -43,6 +43,17 @@ openssh (1:7.0p1-1) UNRELEASED; urgency=medium | |||
43 | - sshd(8): Clarify documentation for UseDNS option. | 43 | - sshd(8): Clarify documentation for UseDNS option. |
44 | - Check realpath(3) behaviour matches what sftp-server requires and use | 44 | - Check realpath(3) behaviour matches what sftp-server requires and use |
45 | a replacement if necessary. | 45 | a replacement if necessary. |
46 | * New upstream release (http://www.openssh.com/txt/release-7.1): | ||
47 | - sshd(8): OpenSSH 7.0 contained a logic error in PermitRootLogin= | ||
48 | prohibit-password/without-password that could, depending on | ||
49 | compile-time configuration, permit password authentication to root | ||
50 | while preventing other forms of authentication. This problem was | ||
51 | reported by Mantas Mikulenas. | ||
52 | - ssh(1), sshd(8): Add compatibility workarounds for FuTTY. | ||
53 | - ssh(1), sshd(8): Refine compatibility workarounds for WinSCP. | ||
54 | - Fix a number of memory faults (double-free, free of uninitialised | ||
55 | memory, etc) in ssh(1) and ssh-keygen(1). Reported by Mateusz | ||
56 | Kocielski. | ||
46 | * Change "PermitRootLogin without-password" to the new preferred spelling | 57 | * Change "PermitRootLogin without-password" to the new preferred spelling |
47 | of "PermitRootLogin prohibit-password" in sshd_config, and update | 58 | of "PermitRootLogin prohibit-password" in sshd_config, and update |
48 | documentation to reflect the new upstream default. | 59 | documentation to reflect the new upstream default. |
diff --git a/debian/openssh-server.postinst b/debian/openssh-server.postinst index 72e993d0a..2c6c53d88 100644 --- a/debian/openssh-server.postinst +++ b/debian/openssh-server.postinst | |||
@@ -314,7 +314,7 @@ if [ "$action" = configure ]; then | |||
314 | db_get openssh-server/permit-root-login && [ "$RET" = true ]; then | 314 | db_get openssh-server/permit-root-login && [ "$RET" = true ]; then |
315 | set_config_option PermitRootLogin prohibit-password | 315 | set_config_option PermitRootLogin prohibit-password |
316 | fi | 316 | fi |
317 | if dpkg --compare-versions "$2" lt-nl 1:7.0p1-1 && \ | 317 | if dpkg --compare-versions "$2" lt-nl 1:7.1p1-1 && \ |
318 | [ "$(get_config_option PermitRootLogin)" = without-password ]; then | 318 | [ "$(get_config_option PermitRootLogin)" = without-password ]; then |
319 | set_config_option PermitRootLogin prohibit-password | 319 | set_config_option PermitRootLogin prohibit-password |
320 | fi | 320 | fi |
diff --git a/debian/patches/auth-log-verbosity.patch b/debian/patches/auth-log-verbosity.patch index 2ed4f2a4c..e5cbafbfe 100644 --- a/debian/patches/auth-log-verbosity.patch +++ b/debian/patches/auth-log-verbosity.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 1b41ad6426301c5131aa93d0915f6c5e69cff645 Mon Sep 17 00:00:00 2001 | 1 | From 36dac160eeb9000539ca78f9734bb220258df146 Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:10:02 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:02 +0000 |
4 | Subject: Quieten logs when multiple from= restrictions are used | 4 | Subject: Quieten logs when multiple from= restrictions are used |
diff --git a/debian/patches/authorized-keys-man-symlink.patch b/debian/patches/authorized-keys-man-symlink.patch index 6d2e5b544..b1d1dac27 100644 --- a/debian/patches/authorized-keys-man-symlink.patch +++ b/debian/patches/authorized-keys-man-symlink.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 0eeaf623887ccabc08ba20150618daca817fcba5 Mon Sep 17 00:00:00 2001 | 1 | From ca0198a88f1eaae2962454c228e79437dc6080bf Mon Sep 17 00:00:00 2001 |
2 | From: Tomas Pospisek <tpo_deb@sourcepole.ch> | 2 | From: Tomas Pospisek <tpo_deb@sourcepole.ch> |
3 | Date: Sun, 9 Feb 2014 16:10:07 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:07 +0000 |
4 | Subject: Install authorized_keys(5) as a symlink to sshd(8) | 4 | Subject: Install authorized_keys(5) as a symlink to sshd(8) |
diff --git a/debian/patches/debian-banner.patch b/debian/patches/debian-banner.patch index 35659cd33..59de3b115 100644 --- a/debian/patches/debian-banner.patch +++ b/debian/patches/debian-banner.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From bb18ca3880d333834c89f535032cdf12bc362fdf Mon Sep 17 00:00:00 2001 | 1 | From e4e2b402150f28abadcd565941ab51c2bcbac8ce Mon Sep 17 00:00:00 2001 |
2 | From: Kees Cook <kees@debian.org> | 2 | From: Kees Cook <kees@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:10:06 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:06 +0000 |
4 | Subject: Add DebianBanner server configuration option | 4 | Subject: Add DebianBanner server configuration option |
@@ -80,7 +80,7 @@ index 778ba17..161fa37 100644 | |||
80 | 80 | ||
81 | /* Information about the incoming connection as used by Match */ | 81 | /* Information about the incoming connection as used by Match */ |
82 | diff --git a/sshd.c b/sshd.c | 82 | diff --git a/sshd.c b/sshd.c |
83 | index e3ac37b..d9f5199 100644 | 83 | index 0d4fb7f..6024e0e 100644 |
84 | --- a/sshd.c | 84 | --- a/sshd.c |
85 | +++ b/sshd.c | 85 | +++ b/sshd.c |
86 | @@ -443,7 +443,8 @@ sshd_exchange_identification(int sock_in, int sock_out) | 86 | @@ -443,7 +443,8 @@ sshd_exchange_identification(int sock_in, int sock_out) |
@@ -94,7 +94,7 @@ index e3ac37b..d9f5199 100644 | |||
94 | options.version_addendum, newline); | 94 | options.version_addendum, newline); |
95 | 95 | ||
96 | diff --git a/sshd_config.5 b/sshd_config.5 | 96 | diff --git a/sshd_config.5 b/sshd_config.5 |
97 | index 154e87e..641e1fa 100644 | 97 | index c8ee35d..b149bd3 100644 |
98 | --- a/sshd_config.5 | 98 | --- a/sshd_config.5 |
99 | +++ b/sshd_config.5 | 99 | +++ b/sshd_config.5 |
100 | @@ -533,6 +533,11 @@ or | 100 | @@ -533,6 +533,11 @@ or |
diff --git a/debian/patches/debian-config.patch b/debian/patches/debian-config.patch index aae4e7d34..ddc9de44a 100644 --- a/debian/patches/debian-config.patch +++ b/debian/patches/debian-config.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 6d0faf6dc76ac8cc73d6f8e478db7c97f7013a2d Mon Sep 17 00:00:00 2001 | 1 | From 733c4de05612fe398ac3dc7d31d318d7012fda05 Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:10:18 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:18 +0000 |
4 | Subject: Various Debian-specific configuration changes | 4 | Subject: Various Debian-specific configuration changes |
@@ -107,7 +107,7 @@ index 228e5ab..c9386aa 100644 | |||
107 | + GSSAPIAuthentication yes | 107 | + GSSAPIAuthentication yes |
108 | + GSSAPIDelegateCredentials no | 108 | + GSSAPIDelegateCredentials no |
109 | diff --git a/ssh_config.5 b/ssh_config.5 | 109 | diff --git a/ssh_config.5 b/ssh_config.5 |
110 | index 5bc04b0..aaa435a 100644 | 110 | index 680ca17..981197d 100644 |
111 | --- a/ssh_config.5 | 111 | --- a/ssh_config.5 |
112 | +++ b/ssh_config.5 | 112 | +++ b/ssh_config.5 |
113 | @@ -74,6 +74,22 @@ Since the first obtained value for each parameter is used, more | 113 | @@ -74,6 +74,22 @@ Since the first obtained value for each parameter is used, more |
@@ -144,7 +144,7 @@ index 5bc04b0..aaa435a 100644 | |||
144 | See the X11 SECURITY extension specification for full details on | 144 | See the X11 SECURITY extension specification for full details on |
145 | the restrictions imposed on untrusted clients. | 145 | the restrictions imposed on untrusted clients. |
146 | diff --git a/sshd_config.5 b/sshd_config.5 | 146 | diff --git a/sshd_config.5 b/sshd_config.5 |
147 | index 7e40a27..92c23bc 100644 | 147 | index 0828592..0be7250 100644 |
148 | --- a/sshd_config.5 | 148 | --- a/sshd_config.5 |
149 | +++ b/sshd_config.5 | 149 | +++ b/sshd_config.5 |
150 | @@ -57,6 +57,31 @@ Arguments may optionally be enclosed in double quotes | 150 | @@ -57,6 +57,31 @@ Arguments may optionally be enclosed in double quotes |
diff --git a/debian/patches/dnssec-sshfp.patch b/debian/patches/dnssec-sshfp.patch index 922798aea..3d4341ff2 100644 --- a/debian/patches/dnssec-sshfp.patch +++ b/debian/patches/dnssec-sshfp.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 460260ae3681984ef9fbc0f19fb5d46668eede4e Mon Sep 17 00:00:00 2001 | 1 | From a8e8eba67d79734c2f0b85c54aa5d60132b6e2e8 Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:10:01 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:01 +0000 |
4 | Subject: Force use of DNSSEC even if "options edns0" isn't in resolv.conf | 4 | Subject: Force use of DNSSEC even if "options edns0" isn't in resolv.conf |
@@ -18,7 +18,7 @@ Patch-Name: dnssec-sshfp.patch | |||
18 | 3 files changed, 21 insertions(+), 6 deletions(-) | 18 | 3 files changed, 21 insertions(+), 6 deletions(-) |
19 | 19 | ||
20 | diff --git a/dns.c b/dns.c | 20 | diff --git a/dns.c b/dns.c |
21 | index f201b60..a406f58 100644 | 21 | index e813afe..fce2e30 100644 |
22 | --- a/dns.c | 22 | --- a/dns.c |
23 | +++ b/dns.c | 23 | +++ b/dns.c |
24 | @@ -206,6 +206,7 @@ verify_host_key_dns(const char *hostname, struct sockaddr *address, | 24 | @@ -206,6 +206,7 @@ verify_host_key_dns(const char *hostname, struct sockaddr *address, |
diff --git a/debian/patches/doc-hash-tab-completion.patch b/debian/patches/doc-hash-tab-completion.patch index b27e19f2b..42d83959b 100644 --- a/debian/patches/doc-hash-tab-completion.patch +++ b/debian/patches/doc-hash-tab-completion.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From def9d74686cb82e98686c1357babd9d24b8b7c54 Mon Sep 17 00:00:00 2001 | 1 | From 133721fc651693820cf41563418d26fccdedd742 Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:10:11 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:11 +0000 |
4 | Subject: Document that HashKnownHosts may break tab-completion | 4 | Subject: Document that HashKnownHosts may break tab-completion |
@@ -13,7 +13,7 @@ Patch-Name: doc-hash-tab-completion.patch | |||
13 | 1 file changed, 3 insertions(+) | 13 | 1 file changed, 3 insertions(+) |
14 | 14 | ||
15 | diff --git a/ssh_config.5 b/ssh_config.5 | 15 | diff --git a/ssh_config.5 b/ssh_config.5 |
16 | index b07e866..5bc04b0 100644 | 16 | index 37f3ab8..680ca17 100644 |
17 | --- a/ssh_config.5 | 17 | --- a/ssh_config.5 |
18 | +++ b/ssh_config.5 | 18 | +++ b/ssh_config.5 |
19 | @@ -809,6 +809,9 @@ Note that existing names and addresses in known hosts files | 19 | @@ -809,6 +809,9 @@ Note that existing names and addresses in known hosts files |
diff --git a/debian/patches/doc-upstart.patch b/debian/patches/doc-upstart.patch index c1fcbcd37..357d7318e 100644 --- a/debian/patches/doc-upstart.patch +++ b/debian/patches/doc-upstart.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 49f2be4bc5297798aa3cd54ba1417804c14f8d38 Mon Sep 17 00:00:00 2001 | 1 | From fc8c21a1b1b6710b2b41a8daef56d00bfb19885d Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@ubuntu.com> | 2 | From: Colin Watson <cjwatson@ubuntu.com> |
3 | Date: Sun, 9 Feb 2014 16:10:12 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:12 +0000 |
4 | Subject: Refer to ssh's Upstart job as well as its init script | 4 | Subject: Refer to ssh's Upstart job as well as its init script |
diff --git a/debian/patches/gnome-ssh-askpass2-icon.patch b/debian/patches/gnome-ssh-askpass2-icon.patch index 91fb20bb3..ba9825f40 100644 --- a/debian/patches/gnome-ssh-askpass2-icon.patch +++ b/debian/patches/gnome-ssh-askpass2-icon.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 820ff9bbc530c4f736c883caf4a773fa397ffacc Mon Sep 17 00:00:00 2001 | 1 | From d45f510086dc79305ea6cfd336908798fbbda563 Mon Sep 17 00:00:00 2001 |
2 | From: Vincent Untz <vuntz@ubuntu.com> | 2 | From: Vincent Untz <vuntz@ubuntu.com> |
3 | Date: Sun, 9 Feb 2014 16:10:16 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:16 +0000 |
4 | Subject: Give the ssh-askpass-gnome window a default icon | 4 | Subject: Give the ssh-askpass-gnome window a default icon |
diff --git a/debian/patches/gssapi.patch b/debian/patches/gssapi.patch index 3d6dfac9a..4ab9ca373 100644 --- a/debian/patches/gssapi.patch +++ b/debian/patches/gssapi.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 233e78235070e871b658c8f289e600bd52a99711 Mon Sep 17 00:00:00 2001 | 1 | From 09c4d9b7d41ab3c9973f07e0109e931f57c59c43 Mon Sep 17 00:00:00 2001 |
2 | From: Simon Wilkinson <simon@sxw.org.uk> | 2 | From: Simon Wilkinson <simon@sxw.org.uk> |
3 | Date: Sun, 9 Feb 2014 16:09:48 +0000 | 3 | Date: Sun, 9 Feb 2014 16:09:48 +0000 |
4 | Subject: GSSAPI key exchange support | 4 | Subject: GSSAPI key exchange support |
@@ -2540,7 +2540,7 @@ index 03a228f..228e5ab 100644 | |||
2540 | # CheckHostIP yes | 2540 | # CheckHostIP yes |
2541 | # AddressFamily any | 2541 | # AddressFamily any |
2542 | diff --git a/ssh_config.5 b/ssh_config.5 | 2542 | diff --git a/ssh_config.5 b/ssh_config.5 |
2543 | index 5b0975f..b2dc49b 100644 | 2543 | index a47f3ca..cac8cda 100644 |
2544 | --- a/ssh_config.5 | 2544 | --- a/ssh_config.5 |
2545 | +++ b/ssh_config.5 | 2545 | +++ b/ssh_config.5 |
2546 | @@ -749,11 +749,45 @@ Specifies whether user authentication based on GSSAPI is allowed. | 2546 | @@ -749,11 +749,45 @@ Specifies whether user authentication based on GSSAPI is allowed. |
@@ -2793,7 +2793,7 @@ index 7751031..e2ea826 100644 | |||
2793 | 2793 | ||
2794 | int | 2794 | int |
2795 | diff --git a/sshd.c b/sshd.c | 2795 | diff --git a/sshd.c b/sshd.c |
2796 | index c7dd8cb..32adb1f 100644 | 2796 | index 65ef7e8..839c2e0 100644 |
2797 | --- a/sshd.c | 2797 | --- a/sshd.c |
2798 | +++ b/sshd.c | 2798 | +++ b/sshd.c |
2799 | @@ -126,6 +126,10 @@ | 2799 | @@ -126,6 +126,10 @@ |
@@ -2959,7 +2959,7 @@ index 4d77f05..64786c9 100644 | |||
2959 | # Set this to 'yes' to enable PAM authentication, account processing, | 2959 | # Set this to 'yes' to enable PAM authentication, account processing, |
2960 | # and session processing. If this is enabled, PAM authentication will | 2960 | # and session processing. If this is enabled, PAM authentication will |
2961 | diff --git a/sshd_config.5 b/sshd_config.5 | 2961 | diff --git a/sshd_config.5 b/sshd_config.5 |
2962 | index 58e277f..712f620 100644 | 2962 | index b18d340..5491c89 100644 |
2963 | --- a/sshd_config.5 | 2963 | --- a/sshd_config.5 |
2964 | +++ b/sshd_config.5 | 2964 | +++ b/sshd_config.5 |
2965 | @@ -621,6 +621,12 @@ Specifies whether user authentication based on GSSAPI is allowed. | 2965 | @@ -621,6 +621,12 @@ Specifies whether user authentication based on GSSAPI is allowed. |
@@ -2988,7 +2988,7 @@ index 58e277f..712f620 100644 | |||
2988 | Specifies the key types that will be accepted for hostbased authentication | 2988 | Specifies the key types that will be accepted for hostbased authentication |
2989 | as a comma-separated pattern list. | 2989 | as a comma-separated pattern list. |
2990 | diff --git a/sshkey.c b/sshkey.c | 2990 | diff --git a/sshkey.c b/sshkey.c |
2991 | index dbb16e2..14b6dc3 100644 | 2991 | index 32dd8f2..5368e7c 100644 |
2992 | --- a/sshkey.c | 2992 | --- a/sshkey.c |
2993 | +++ b/sshkey.c | 2993 | +++ b/sshkey.c |
2994 | @@ -112,6 +112,7 @@ static const struct keytype keytypes[] = { | 2994 | @@ -112,6 +112,7 @@ static const struct keytype keytypes[] = { |
diff --git a/debian/patches/helpful-wait-terminate.patch b/debian/patches/helpful-wait-terminate.patch index 504abe68d..a5ea56083 100644 --- a/debian/patches/helpful-wait-terminate.patch +++ b/debian/patches/helpful-wait-terminate.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 9fb8297943f1b331129f26606867c5dec2d05317 Mon Sep 17 00:00:00 2001 | 1 | From 4ba040812693f5823bc8643cfb82a581a5e8e5db Mon Sep 17 00:00:00 2001 |
2 | From: Matthew Vernon <matthew@debian.org> | 2 | From: Matthew Vernon <matthew@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:09:56 +0000 | 3 | Date: Sun, 9 Feb 2014 16:09:56 +0000 |
4 | Subject: Mention ~& when waiting for forwarded connections to terminate | 4 | Subject: Mention ~& when waiting for forwarded connections to terminate |
diff --git a/debian/patches/keepalive-extensions.patch b/debian/patches/keepalive-extensions.patch index 9c6fdca0b..81c8935b1 100644 --- a/debian/patches/keepalive-extensions.patch +++ b/debian/patches/keepalive-extensions.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 25698ed1091d932244f94e7c802dce05c458749a Mon Sep 17 00:00:00 2001 | 1 | From 5664b20b9d8ee691d664333b83ebb5e7560933a4 Mon Sep 17 00:00:00 2001 |
2 | From: Richard Kettlewell <rjk@greenend.org.uk> | 2 | From: Richard Kettlewell <rjk@greenend.org.uk> |
3 | Date: Sun, 9 Feb 2014 16:09:52 +0000 | 3 | Date: Sun, 9 Feb 2014 16:09:52 +0000 |
4 | Subject: Various keepalive extensions | 4 | Subject: Various keepalive extensions |
@@ -72,7 +72,7 @@ index 522ad37..46c343f 100644 | |||
72 | options->server_alive_count_max = 3; | 72 | options->server_alive_count_max = 3; |
73 | if (options->control_master == -1) | 73 | if (options->control_master == -1) |
74 | diff --git a/ssh_config.5 b/ssh_config.5 | 74 | diff --git a/ssh_config.5 b/ssh_config.5 |
75 | index 82dcf0c..f517159 100644 | 75 | index 673d0b7..4e34115 100644 |
76 | --- a/ssh_config.5 | 76 | --- a/ssh_config.5 |
77 | +++ b/ssh_config.5 | 77 | +++ b/ssh_config.5 |
78 | @@ -233,8 +233,12 @@ Valid arguments are | 78 | @@ -233,8 +233,12 @@ Valid arguments are |
@@ -120,7 +120,7 @@ index 82dcf0c..f517159 100644 | |||
120 | connections will die if the route is down temporarily, and some people | 120 | connections will die if the route is down temporarily, and some people |
121 | find it annoying. | 121 | find it annoying. |
122 | diff --git a/sshd_config.5 b/sshd_config.5 | 122 | diff --git a/sshd_config.5 b/sshd_config.5 |
123 | index 712f620..154e87e 100644 | 123 | index 5491c89..c8ee35d 100644 |
124 | --- a/sshd_config.5 | 124 | --- a/sshd_config.5 |
125 | +++ b/sshd_config.5 | 125 | +++ b/sshd_config.5 |
126 | @@ -1510,6 +1510,9 @@ This avoids infinitely hanging sessions. | 126 | @@ -1510,6 +1510,9 @@ This avoids infinitely hanging sessions. |
diff --git a/debian/patches/lintian-symlink-pickiness.patch b/debian/patches/lintian-symlink-pickiness.patch index 7c288b452..14e704132 100644 --- a/debian/patches/lintian-symlink-pickiness.patch +++ b/debian/patches/lintian-symlink-pickiness.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 2b5cab64ee1a2c917bf1b076fb81709cc0ea97d9 Mon Sep 17 00:00:00 2001 | 1 | From 615714e35f934eb8f212070549f396c624a64b26 Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:10:08 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:08 +0000 |
4 | Subject: Fix picky lintian errors about slogin symlinks | 4 | Subject: Fix picky lintian errors about slogin symlinks |
diff --git a/debian/patches/mention-ssh-keygen-on-keychange.patch b/debian/patches/mention-ssh-keygen-on-keychange.patch index 418a5d1b2..50e128020 100644 --- a/debian/patches/mention-ssh-keygen-on-keychange.patch +++ b/debian/patches/mention-ssh-keygen-on-keychange.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 20ba3686f33c1dbb34583b8731582fdc7181a831 Mon Sep 17 00:00:00 2001 | 1 | From a28ed57e3db85165476dddad441fc55f683fbaf4 Mon Sep 17 00:00:00 2001 |
2 | From: Scott Moser <smoser@ubuntu.com> | 2 | From: Scott Moser <smoser@ubuntu.com> |
3 | Date: Sun, 9 Feb 2014 16:10:03 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:03 +0000 |
4 | Subject: Mention ssh-keygen in ssh fingerprint changed warning | 4 | Subject: Mention ssh-keygen in ssh fingerprint changed warning |
@@ -13,7 +13,7 @@ Patch-Name: mention-ssh-keygen-on-keychange.patch | |||
13 | 1 file changed, 7 insertions(+), 1 deletion(-) | 13 | 1 file changed, 7 insertions(+), 1 deletion(-) |
14 | 14 | ||
15 | diff --git a/sshconnect.c b/sshconnect.c | 15 | diff --git a/sshconnect.c b/sshconnect.c |
16 | index 8adc943..4aff104 100644 | 16 | index cd467fd..bbde8af 100644 |
17 | --- a/sshconnect.c | 17 | --- a/sshconnect.c |
18 | +++ b/sshconnect.c | 18 | +++ b/sshconnect.c |
19 | @@ -1078,9 +1078,13 @@ check_host_key(char *hostname, struct sockaddr *hostaddr, u_short port, | 19 | @@ -1078,9 +1078,13 @@ check_host_key(char *hostname, struct sockaddr *hostaddr, u_short port, |
diff --git a/debian/patches/no-openssl-version-status.patch b/debian/patches/no-openssl-version-status.patch index 6bc7618fd..ad3164cab 100644 --- a/debian/patches/no-openssl-version-status.patch +++ b/debian/patches/no-openssl-version-status.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 151c2cd6257c44a9ba51bf7af75bb7d2761cf492 Mon Sep 17 00:00:00 2001 | 1 | From 576cbedac5684f24e6ff61fe70edfc81945fd7dd Mon Sep 17 00:00:00 2001 |
2 | From: Kurt Roeckx <kurt@roeckx.be> | 2 | From: Kurt Roeckx <kurt@roeckx.be> |
3 | Date: Sun, 9 Feb 2014 16:10:14 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:14 +0000 |
4 | Subject: Don't check the status field of the OpenSSL version | 4 | Subject: Don't check the status field of the OpenSSL version |
diff --git a/debian/patches/openbsd-docs.patch b/debian/patches/openbsd-docs.patch index 389e8e73f..887e93aac 100644 --- a/debian/patches/openbsd-docs.patch +++ b/debian/patches/openbsd-docs.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From d4a383b11e186c0db65b9a2779ad5f5889563ceb Mon Sep 17 00:00:00 2001 | 1 | From b2f2bca0fb145fbf2ffdfadc3b206f212be0a7dc Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:10:09 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:09 +0000 |
4 | Subject: Adjust various OpenBSD-specific references in manual pages | 4 | Subject: Adjust various OpenBSD-specific references in manual pages |
@@ -44,7 +44,7 @@ index ef0de08..149846c 100644 | |||
44 | .Sh SEE ALSO | 44 | .Sh SEE ALSO |
45 | .Xr ssh-keygen 1 , | 45 | .Xr ssh-keygen 1 , |
46 | diff --git a/ssh-keygen.1 b/ssh-keygen.1 | 46 | diff --git a/ssh-keygen.1 b/ssh-keygen.1 |
47 | index 8c3317b..1a8644e 100644 | 47 | index ed17a08..c560179 100644 |
48 | --- a/ssh-keygen.1 | 48 | --- a/ssh-keygen.1 |
49 | +++ b/ssh-keygen.1 | 49 | +++ b/ssh-keygen.1 |
50 | @@ -174,9 +174,7 @@ key in | 50 | @@ -174,9 +174,7 @@ key in |
@@ -133,7 +133,7 @@ index 2105979..42ba596 100644 | |||
133 | .Xr sshd_config 5 , | 133 | .Xr sshd_config 5 , |
134 | .Xr inetd 8 , | 134 | .Xr inetd 8 , |
135 | diff --git a/sshd_config.5 b/sshd_config.5 | 135 | diff --git a/sshd_config.5 b/sshd_config.5 |
136 | index 641e1fa..7e40a27 100644 | 136 | index b149bd3..0828592 100644 |
137 | --- a/sshd_config.5 | 137 | --- a/sshd_config.5 |
138 | +++ b/sshd_config.5 | 138 | +++ b/sshd_config.5 |
139 | @@ -374,8 +374,7 @@ This option is only available for protocol version 2. | 139 | @@ -374,8 +374,7 @@ This option is only available for protocol version 2. |
diff --git a/debian/patches/package-versioning.patch b/debian/patches/package-versioning.patch index e2b40654c..02f11bec0 100644 --- a/debian/patches/package-versioning.patch +++ b/debian/patches/package-versioning.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 4e80e6a84e57783718ca225021a597713c44c2a2 Mon Sep 17 00:00:00 2001 | 1 | From 40fc1212b3c06063cf3926aa8e8209e1fa05436f Mon Sep 17 00:00:00 2001 |
2 | From: Matthew Vernon <matthew@debian.org> | 2 | From: Matthew Vernon <matthew@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:10:05 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:05 +0000 |
4 | Subject: Include the Debian version in our identification | 4 | Subject: Include the Debian version in our identification |
@@ -19,7 +19,7 @@ Patch-Name: package-versioning.patch | |||
19 | 3 files changed, 9 insertions(+), 4 deletions(-) | 19 | 3 files changed, 9 insertions(+), 4 deletions(-) |
20 | 20 | ||
21 | diff --git a/sshconnect.c b/sshconnect.c | 21 | diff --git a/sshconnect.c b/sshconnect.c |
22 | index 4aff104..2999061 100644 | 22 | index bbde8af..0ec1e54 100644 |
23 | --- a/sshconnect.c | 23 | --- a/sshconnect.c |
24 | +++ b/sshconnect.c | 24 | +++ b/sshconnect.c |
25 | @@ -524,10 +524,10 @@ send_client_banner(int connection_out, int minor1) | 25 | @@ -524,10 +524,10 @@ send_client_banner(int connection_out, int minor1) |
@@ -36,7 +36,7 @@ index 4aff104..2999061 100644 | |||
36 | if (roaming_atomicio(vwrite, connection_out, client_version_string, | 36 | if (roaming_atomicio(vwrite, connection_out, client_version_string, |
37 | strlen(client_version_string)) != strlen(client_version_string)) | 37 | strlen(client_version_string)) != strlen(client_version_string)) |
38 | diff --git a/sshd.c b/sshd.c | 38 | diff --git a/sshd.c b/sshd.c |
39 | index f60c9e0..e3ac37b 100644 | 39 | index 0537bc9..0d4fb7f 100644 |
40 | --- a/sshd.c | 40 | --- a/sshd.c |
41 | +++ b/sshd.c | 41 | +++ b/sshd.c |
42 | @@ -443,7 +443,7 @@ sshd_exchange_identification(int sock_in, int sock_out) | 42 | @@ -443,7 +443,7 @@ sshd_exchange_identification(int sock_in, int sock_out) |
@@ -49,11 +49,11 @@ index f60c9e0..e3ac37b 100644 | |||
49 | options.version_addendum, newline); | 49 | options.version_addendum, newline); |
50 | 50 | ||
51 | diff --git a/version.h b/version.h | 51 | diff --git a/version.h b/version.h |
52 | index 7a5dbc8..f665356 100644 | 52 | index d917ca1..5c22d90 100644 |
53 | --- a/version.h | 53 | --- a/version.h |
54 | +++ b/version.h | 54 | +++ b/version.h |
55 | @@ -3,4 +3,9 @@ | 55 | @@ -3,4 +3,9 @@ |
56 | #define SSH_VERSION "OpenSSH_7.0" | 56 | #define SSH_VERSION "OpenSSH_7.1" |
57 | 57 | ||
58 | #define SSH_PORTABLE "p1" | 58 | #define SSH_PORTABLE "p1" |
59 | -#define SSH_RELEASE SSH_VERSION SSH_PORTABLE | 59 | -#define SSH_RELEASE SSH_VERSION SSH_PORTABLE |
diff --git a/debian/patches/quieter-signals.patch b/debian/patches/quieter-signals.patch index b457610f4..cc10ef7b8 100644 --- a/debian/patches/quieter-signals.patch +++ b/debian/patches/quieter-signals.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 5ddd42354edfbe0d5cc607d007f8c655ec351e2f Mon Sep 17 00:00:00 2001 | 1 | From f7d2bb35f07cfcab63fc8cf3cd9bef646065482c Mon Sep 17 00:00:00 2001 |
2 | From: Peter Samuelson <peter@p12n.org> | 2 | From: Peter Samuelson <peter@p12n.org> |
3 | Date: Sun, 9 Feb 2014 16:09:55 +0000 | 3 | Date: Sun, 9 Feb 2014 16:09:55 +0000 |
4 | Subject: Reduce severity of "Killed by signal %d" | 4 | Subject: Reduce severity of "Killed by signal %d" |
diff --git a/debian/patches/restore-tcp-wrappers.patch b/debian/patches/restore-tcp-wrappers.patch index 21c30a0ef..5778440b9 100644 --- a/debian/patches/restore-tcp-wrappers.patch +++ b/debian/patches/restore-tcp-wrappers.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 206272ccede7e6fac5d7fda30ea305349b8ad781 Mon Sep 17 00:00:00 2001 | 1 | From 2cd06c4a70dfb22fd1d54779173b5e086c52e08f Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Tue, 7 Oct 2014 13:22:41 +0100 | 3 | Date: Tue, 7 Oct 2014 13:22:41 +0100 |
4 | Subject: Restore TCP wrappers support | 4 | Subject: Restore TCP wrappers support |
@@ -128,7 +128,7 @@ index 213b5fc..2105979 100644 | |||
128 | .Xr moduli 5 , | 128 | .Xr moduli 5 , |
129 | .Xr sshd_config 5 , | 129 | .Xr sshd_config 5 , |
130 | diff --git a/sshd.c b/sshd.c | 130 | diff --git a/sshd.c b/sshd.c |
131 | index 32adb1f..4d8a5e8 100644 | 131 | index 839c2e0..0e30e6e 100644 |
132 | --- a/sshd.c | 132 | --- a/sshd.c |
133 | +++ b/sshd.c | 133 | +++ b/sshd.c |
134 | @@ -130,6 +130,13 @@ | 134 | @@ -130,6 +130,13 @@ |
diff --git a/debian/patches/scp-quoting.patch b/debian/patches/scp-quoting.patch index ec9c62e6b..c45aad58f 100644 --- a/debian/patches/scp-quoting.patch +++ b/debian/patches/scp-quoting.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 39649ea621545db3692a0ecdb2e3e9bf1bec21d5 Mon Sep 17 00:00:00 2001 | 1 | From a4fade6aaf7df4c6a01fc353a5cd689e0073e367 Mon Sep 17 00:00:00 2001 |
2 | From: =?UTF-8?q?Nicolas=20Valc=C3=A1rcel?= <nvalcarcel@ubuntu.com> | 2 | From: =?UTF-8?q?Nicolas=20Valc=C3=A1rcel?= <nvalcarcel@ubuntu.com> |
3 | Date: Sun, 9 Feb 2014 16:09:59 +0000 | 3 | Date: Sun, 9 Feb 2014 16:09:59 +0000 |
4 | Subject: Adjust scp quoting in verbose mode | 4 | Subject: Adjust scp quoting in verbose mode |
diff --git a/debian/patches/selinux-role.patch b/debian/patches/selinux-role.patch index a8b214fb4..aee443d87 100644 --- a/debian/patches/selinux-role.patch +++ b/debian/patches/selinux-role.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 10dec1266aa5cf1ad906b1bef6f67edc322c00cb Mon Sep 17 00:00:00 2001 | 1 | From d55bc528ac450324522f02d90a2bdc4832d1eef8 Mon Sep 17 00:00:00 2001 |
2 | From: Manoj Srivastava <srivasta@debian.org> | 2 | From: Manoj Srivastava <srivasta@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:09:49 +0000 | 3 | Date: Sun, 9 Feb 2014 16:09:49 +0000 |
4 | Subject: Handle SELinux authorisation roles | 4 | Subject: Handle SELinux authorisation roles |
@@ -458,7 +458,7 @@ index 6a2f35e..ef6593c 100644 | |||
458 | const char *value); | 458 | const char *value); |
459 | 459 | ||
460 | diff --git a/sshd.c b/sshd.c | 460 | diff --git a/sshd.c b/sshd.c |
461 | index 4d8a5e8..f60c9e0 100644 | 461 | index 0e30e6e..0537bc9 100644 |
462 | --- a/sshd.c | 462 | --- a/sshd.c |
463 | +++ b/sshd.c | 463 | +++ b/sshd.c |
464 | @@ -782,7 +782,7 @@ privsep_postauth(Authctxt *authctxt) | 464 | @@ -782,7 +782,7 @@ privsep_postauth(Authctxt *authctxt) |
diff --git a/debian/patches/shell-path.patch b/debian/patches/shell-path.patch index d75268651..56f85c14e 100644 --- a/debian/patches/shell-path.patch +++ b/debian/patches/shell-path.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From e6ac786efa1922c3a4846023b85b4425c3b27624 Mon Sep 17 00:00:00 2001 | 1 | From e4ba682033c1e53b52cf4b03924b69f54945f1b5 Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:10:00 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:00 +0000 |
4 | Subject: Look for $SHELL on the path for ProxyCommand/LocalCommand | 4 | Subject: Look for $SHELL on the path for ProxyCommand/LocalCommand |
@@ -16,7 +16,7 @@ Patch-Name: shell-path.patch | |||
16 | 1 file changed, 2 insertions(+), 2 deletions(-) | 16 | 1 file changed, 2 insertions(+), 2 deletions(-) |
17 | 17 | ||
18 | diff --git a/sshconnect.c b/sshconnect.c | 18 | diff --git a/sshconnect.c b/sshconnect.c |
19 | index f41960c..8adc943 100644 | 19 | index 17fbe39..cd467fd 100644 |
20 | --- a/sshconnect.c | 20 | --- a/sshconnect.c |
21 | +++ b/sshconnect.c | 21 | +++ b/sshconnect.c |
22 | @@ -231,7 +231,7 @@ ssh_proxy_connect(const char *host, u_short port, const char *proxy_command) | 22 | @@ -231,7 +231,7 @@ ssh_proxy_connect(const char *host, u_short port, const char *proxy_command) |
diff --git a/debian/patches/sigstop.patch b/debian/patches/sigstop.patch index 07cc502ea..4873a0527 100644 --- a/debian/patches/sigstop.patch +++ b/debian/patches/sigstop.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 28b42c7cc08dd3dbdc149281912a41ae65594301 Mon Sep 17 00:00:00 2001 | 1 | From 7ce7aa96b03196d9d799f4caf6e4c7c6c2bed7da Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:10:17 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:17 +0000 |
4 | Subject: Support synchronisation with service supervisor using SIGSTOP | 4 | Subject: Support synchronisation with service supervisor using SIGSTOP |
@@ -13,7 +13,7 @@ Patch-Name: sigstop.patch | |||
13 | 1 file changed, 10 insertions(+) | 13 | 1 file changed, 10 insertions(+) |
14 | 14 | ||
15 | diff --git a/sshd.c b/sshd.c | 15 | diff --git a/sshd.c b/sshd.c |
16 | index d9f5199..b345c9f 100644 | 16 | index 6024e0e..7e72b9b 100644 |
17 | --- a/sshd.c | 17 | --- a/sshd.c |
18 | +++ b/sshd.c | 18 | +++ b/sshd.c |
19 | @@ -2042,6 +2042,16 @@ main(int ac, char **av) | 19 | @@ -2042,6 +2042,16 @@ main(int ac, char **av) |
diff --git a/debian/patches/ssh-agent-setgid.patch b/debian/patches/ssh-agent-setgid.patch index 5cabd8ead..8d40231f8 100644 --- a/debian/patches/ssh-agent-setgid.patch +++ b/debian/patches/ssh-agent-setgid.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From ffd0bdfb5e16b792de4f98ca19f94d9e2fb8b281 Mon Sep 17 00:00:00 2001 | 1 | From 76ec1a4c34296f1485ce98e301a3d35c9779c2ea Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:10:13 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:13 +0000 |
4 | Subject: Document consequences of ssh-agent being setgid in ssh-agent(1) | 4 | Subject: Document consequences of ssh-agent being setgid in ssh-agent(1) |
diff --git a/debian/patches/ssh-argv0.patch b/debian/patches/ssh-argv0.patch index e2c977c72..8e77dadb4 100644 --- a/debian/patches/ssh-argv0.patch +++ b/debian/patches/ssh-argv0.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From c243ac551b1f62aae59ee8ae29166fd410d4e9d4 Mon Sep 17 00:00:00 2001 | 1 | From 80872a9a228eee6b7f189e9770fcf89fb8bca7fa Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:10:10 +0000 | 3 | Date: Sun, 9 Feb 2014 16:10:10 +0000 |
4 | Subject: ssh(1): Refer to ssh-argv0(1) | 4 | Subject: ssh(1): Refer to ssh-argv0(1) |
diff --git a/debian/patches/ssh-vulnkey-compat.patch b/debian/patches/ssh-vulnkey-compat.patch index 8fb05d4c4..f9736f7d6 100644 --- a/debian/patches/ssh-vulnkey-compat.patch +++ b/debian/patches/ssh-vulnkey-compat.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 89dd60ab74e7ebfe4f234c4068fa941479535d8e Mon Sep 17 00:00:00 2001 | 1 | From 250d744e08a4f88cd547023cb2f036b2cdfd569b Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@ubuntu.com> | 2 | From: Colin Watson <cjwatson@ubuntu.com> |
3 | Date: Sun, 9 Feb 2014 16:09:50 +0000 | 3 | Date: Sun, 9 Feb 2014 16:09:50 +0000 |
4 | Subject: Accept obsolete ssh-vulnkey configuration options | 4 | Subject: Accept obsolete ssh-vulnkey configuration options |
diff --git a/debian/patches/ssh1-keepalive.patch b/debian/patches/ssh1-keepalive.patch index cf414d4d5..e58de3d56 100644 --- a/debian/patches/ssh1-keepalive.patch +++ b/debian/patches/ssh1-keepalive.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From f1b6288dd90b72d4cad7e65f35d05148a5ba1874 Mon Sep 17 00:00:00 2001 | 1 | From 5e3b425ba1e334c987c5e15abf3d90e9eb776ab3 Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:09:51 +0000 | 3 | Date: Sun, 9 Feb 2014 16:09:51 +0000 |
4 | Subject: Partial server keep-alive implementation for SSH1 | 4 | Subject: Partial server keep-alive implementation for SSH1 |
@@ -57,7 +57,7 @@ index fba1b54..9e45d24 100644 | |||
57 | server_alive_time = now + options.server_alive_interval; | 57 | server_alive_time = now + options.server_alive_interval; |
58 | } | 58 | } |
59 | diff --git a/ssh_config.5 b/ssh_config.5 | 59 | diff --git a/ssh_config.5 b/ssh_config.5 |
60 | index b2dc49b..82dcf0c 100644 | 60 | index cac8cda..673d0b7 100644 |
61 | --- a/ssh_config.5 | 61 | --- a/ssh_config.5 |
62 | +++ b/ssh_config.5 | 62 | +++ b/ssh_config.5 |
63 | @@ -1468,7 +1468,10 @@ If, for example, | 63 | @@ -1468,7 +1468,10 @@ If, for example, |
diff --git a/debian/patches/syslog-level-silent.patch b/debian/patches/syslog-level-silent.patch index aca618985..18efd6804 100644 --- a/debian/patches/syslog-level-silent.patch +++ b/debian/patches/syslog-level-silent.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 19ab567e88d730a6862aab3fb33e399a9c3f67b2 Mon Sep 17 00:00:00 2001 | 1 | From 063fd3991309c88df5ea2625d663c3958e79b841 Mon Sep 17 00:00:00 2001 |
2 | From: Jonathan David Amery <jdamery@ysolde.ucam.org> | 2 | From: Jonathan David Amery <jdamery@ysolde.ucam.org> |
3 | Date: Sun, 9 Feb 2014 16:09:54 +0000 | 3 | Date: Sun, 9 Feb 2014 16:09:54 +0000 |
4 | Subject: "LogLevel SILENT" compatibility | 4 | Subject: "LogLevel SILENT" compatibility |
diff --git a/debian/patches/user-group-modes.patch b/debian/patches/user-group-modes.patch index b147b45eb..d70822b79 100644 --- a/debian/patches/user-group-modes.patch +++ b/debian/patches/user-group-modes.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From d0e69ff6f823231b121af1fe8bbe9442bfed4fe8 Mon Sep 17 00:00:00 2001 | 1 | From 68538f6919550b36ae9d812a1c2c52dbe9354608 Mon Sep 17 00:00:00 2001 |
2 | From: Colin Watson <cjwatson@debian.org> | 2 | From: Colin Watson <cjwatson@debian.org> |
3 | Date: Sun, 9 Feb 2014 16:09:58 +0000 | 3 | Date: Sun, 9 Feb 2014 16:09:58 +0000 |
4 | Subject: Allow harmless group-writability | 4 | Subject: Allow harmless group-writability |
@@ -52,7 +52,7 @@ index ee9e827..2ff2cff 100644 | |||
52 | pw->pw_name, buf); | 52 | pw->pw_name, buf); |
53 | auth_debug_add("Bad file modes for %.200s", buf); | 53 | auth_debug_add("Bad file modes for %.200s", buf); |
54 | diff --git a/auth.c b/auth.c | 54 | diff --git a/auth.c b/auth.c |
55 | index fc32f6c..8255d22 100644 | 55 | index 214c2c7..25be632 100644 |
56 | --- a/auth.c | 56 | --- a/auth.c |
57 | +++ b/auth.c | 57 | +++ b/auth.c |
58 | @@ -424,8 +424,7 @@ check_key_in_hostfiles(struct passwd *pw, Key *key, const char *host, | 58 | @@ -424,8 +424,7 @@ check_key_in_hostfiles(struct passwd *pw, Key *key, const char *host, |
@@ -252,7 +252,7 @@ index 2ea0a20..ff80022 100644 | |||
252 | .It Pa ~/.ssh/environment | 252 | .It Pa ~/.ssh/environment |
253 | Contains additional definitions for environment variables; see | 253 | Contains additional definitions for environment variables; see |
254 | diff --git a/ssh_config.5 b/ssh_config.5 | 254 | diff --git a/ssh_config.5 b/ssh_config.5 |
255 | index f517159..b07e866 100644 | 255 | index 4e34115..37f3ab8 100644 |
256 | --- a/ssh_config.5 | 256 | --- a/ssh_config.5 |
257 | +++ b/ssh_config.5 | 257 | +++ b/ssh_config.5 |
258 | @@ -1760,6 +1760,8 @@ The format of this file is described above. | 258 | @@ -1760,6 +1760,8 @@ The format of this file is described above. |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: dns.c,v 1.34 2015/01/28 22:36:00 djm Exp $ */ | 1 | /* $OpenBSD: dns.c,v 1.35 2015/08/20 22:32:42 deraadt Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 2003 Wesley Griffin. All rights reserved. | 4 | * Copyright (c) 2003 Wesley Griffin. All rights reserved. |
@@ -154,7 +154,7 @@ dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, | |||
154 | *digest_len = rdata_len - 2; | 154 | *digest_len = rdata_len - 2; |
155 | 155 | ||
156 | if (*digest_len > 0) { | 156 | if (*digest_len > 0) { |
157 | *digest = (u_char *) xmalloc(*digest_len); | 157 | *digest = xmalloc(*digest_len); |
158 | memcpy(*digest, rdata + 2, *digest_len); | 158 | memcpy(*digest, rdata + 2, *digest_len); |
159 | } else { | 159 | } else { |
160 | *digest = (u_char *)xstrdup(""); | 160 | *digest = (u_char *)xstrdup(""); |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: mux.c,v 1.53 2015/05/01 04:03:20 djm Exp $ */ | 1 | /* $OpenBSD: mux.c,v 1.54 2015/08/19 23:18:26 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2002-2008 Damien Miller <djm@openbsd.org> | 3 | * Copyright (c) 2002-2008 Damien Miller <djm@openbsd.org> |
4 | * | 4 | * |
@@ -665,6 +665,8 @@ process_mux_open_fwd(u_int rid, Channel *c, Buffer *m, Buffer *r) | |||
665 | u_int lport, cport; | 665 | u_int lport, cport; |
666 | int i, ret = 0, freefwd = 1; | 666 | int i, ret = 0, freefwd = 1; |
667 | 667 | ||
668 | memset(&fwd, 0, sizeof(fwd)); | ||
669 | |||
668 | /* XXX - lport/cport check redundant */ | 670 | /* XXX - lport/cport check redundant */ |
669 | if (buffer_get_int_ret(&ftype, m) != 0 || | 671 | if (buffer_get_int_ret(&ftype, m) != 0 || |
670 | (listen_addr = buffer_get_string_ret(m, NULL)) == NULL || | 672 | (listen_addr = buffer_get_string_ret(m, NULL)) == NULL || |
@@ -832,6 +834,8 @@ process_mux_close_fwd(u_int rid, Channel *c, Buffer *m, Buffer *r) | |||
832 | int i, ret = 0; | 834 | int i, ret = 0; |
833 | u_int lport, cport; | 835 | u_int lport, cport; |
834 | 836 | ||
837 | memset(&fwd, 0, sizeof(fwd)); | ||
838 | |||
835 | if (buffer_get_int_ret(&ftype, m) != 0 || | 839 | if (buffer_get_int_ret(&ftype, m) != 0 || |
836 | (listen_addr = buffer_get_string_ret(m, NULL)) == NULL || | 840 | (listen_addr = buffer_get_string_ret(m, NULL)) == NULL || |
837 | buffer_get_int_ret(&lport, m) != 0 || | 841 | buffer_get_int_ret(&lport, m) != 0 || |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: packet.c,v 1.213 2015/07/29 04:43:06 djm Exp $ */ | 1 | /* $OpenBSD: packet.c,v 1.214 2015/08/20 22:32:42 deraadt Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -1272,7 +1272,7 @@ ssh_packet_read_seqnr(struct ssh *ssh, u_char *typep, u_int32_t *seqnr_p) | |||
1272 | 1272 | ||
1273 | DBG(debug("packet_read()")); | 1273 | DBG(debug("packet_read()")); |
1274 | 1274 | ||
1275 | setp = (fd_set *)calloc(howmany(state->connection_in + 1, | 1275 | setp = calloc(howmany(state->connection_in + 1, |
1276 | NFDBITS), sizeof(fd_mask)); | 1276 | NFDBITS), sizeof(fd_mask)); |
1277 | if (setp == NULL) | 1277 | if (setp == NULL) |
1278 | return SSH_ERR_ALLOC_FAIL; | 1278 | return SSH_ERR_ALLOC_FAIL; |
@@ -2036,7 +2036,7 @@ ssh_packet_write_wait(struct ssh *ssh) | |||
2036 | struct timeval start, timeout, *timeoutp = NULL; | 2036 | struct timeval start, timeout, *timeoutp = NULL; |
2037 | struct session_state *state = ssh->state; | 2037 | struct session_state *state = ssh->state; |
2038 | 2038 | ||
2039 | setp = (fd_set *)calloc(howmany(state->connection_out + 1, | 2039 | setp = calloc(howmany(state->connection_out + 1, |
2040 | NFDBITS), sizeof(fd_mask)); | 2040 | NFDBITS), sizeof(fd_mask)); |
2041 | if (setp == NULL) | 2041 | if (setp == NULL) |
2042 | return SSH_ERR_ALLOC_FAIL; | 2042 | return SSH_ERR_ALLOC_FAIL; |
diff --git a/sftp-server.c b/sftp-server.c index d1831bf8d..eac11d7e6 100644 --- a/sftp-server.c +++ b/sftp-server.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sftp-server.c,v 1.106 2015/04/24 01:36:01 deraadt Exp $ */ | 1 | /* $OpenBSD: sftp-server.c,v 1.107 2015/08/20 22:32:42 deraadt Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2000-2004 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2000-2004 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -1632,8 +1632,8 @@ sftp_server_main(int argc, char **argv, struct passwd *user_pw) | |||
1632 | fatal("%s: sshbuf_new failed", __func__); | 1632 | fatal("%s: sshbuf_new failed", __func__); |
1633 | 1633 | ||
1634 | set_size = howmany(max + 1, NFDBITS) * sizeof(fd_mask); | 1634 | set_size = howmany(max + 1, NFDBITS) * sizeof(fd_mask); |
1635 | rset = (fd_set *)xmalloc(set_size); | 1635 | rset = xmalloc(set_size); |
1636 | wset = (fd_set *)xmalloc(set_size); | 1636 | wset = xmalloc(set_size); |
1637 | 1637 | ||
1638 | if (homedir != NULL) { | 1638 | if (homedir != NULL) { |
1639 | if (chdir(homedir) != 0) { | 1639 | if (chdir(homedir) != 0) { |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sftp.c,v 1.170 2015/01/20 23:14:00 deraadt Exp $ */ | 1 | /* $OpenBSD: sftp.c,v 1.171 2015/08/20 22:32:42 deraadt Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org> | 3 | * Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org> |
4 | * | 4 | * |
@@ -1958,7 +1958,7 @@ complete(EditLine *el, int ch) | |||
1958 | 1958 | ||
1959 | /* Figure out which argument the cursor points to */ | 1959 | /* Figure out which argument the cursor points to */ |
1960 | cursor = lf->cursor - lf->buffer; | 1960 | cursor = lf->cursor - lf->buffer; |
1961 | line = (char *)xmalloc(cursor + 1); | 1961 | line = xmalloc(cursor + 1); |
1962 | memcpy(line, lf->buffer, cursor); | 1962 | memcpy(line, lf->buffer, cursor); |
1963 | line[cursor] = '\0'; | 1963 | line[cursor] = '\0'; |
1964 | argv = makeargv(line, &carg, 1, "e, &terminated); | 1964 | argv = makeargv(line, &carg, 1, "e, &terminated); |
@@ -1966,7 +1966,7 @@ complete(EditLine *el, int ch) | |||
1966 | 1966 | ||
1967 | /* Get all the arguments on the line */ | 1967 | /* Get all the arguments on the line */ |
1968 | len = lf->lastchar - lf->buffer; | 1968 | len = lf->lastchar - lf->buffer; |
1969 | line = (char *)xmalloc(len + 1); | 1969 | line = xmalloc(len + 1); |
1970 | memcpy(line, lf->buffer, len); | 1970 | memcpy(line, lf->buffer, len); |
1971 | line[len] = '\0'; | 1971 | line[len] = '\0'; |
1972 | argv = makeargv(line, &argc, 1, NULL, NULL); | 1972 | argv = makeargv(line, &argc, 1, NULL, NULL); |
diff --git a/ssh-keygen.0 b/ssh-keygen.0 index a471a4055..07a45b36b 100644 --- a/ssh-keygen.0 +++ b/ssh-keygen.0 | |||
@@ -426,7 +426,7 @@ CERTIFICATES | |||
426 | providing the token library using -D and identifying the CA key by | 426 | providing the token library using -D and identifying the CA key by |
427 | providing its public half as an argument to -s: | 427 | providing its public half as an argument to -s: |
428 | 428 | ||
429 | $ ssh-keygen -s ca_key.pub -D libpkcs11.so -I key_id host_key.pub | 429 | $ ssh-keygen -s ca_key.pub -D libpkcs11.so -I key_id user_key.pub |
430 | 430 | ||
431 | In all cases, key_id is a "key identifier" that is logged by the server | 431 | In all cases, key_id is a "key identifier" that is logged by the server |
432 | when the certificate is used for authentication. | 432 | when the certificate is used for authentication. |
@@ -437,7 +437,7 @@ CERTIFICATES | |||
437 | principals: | 437 | principals: |
438 | 438 | ||
439 | $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub | 439 | $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub |
440 | $ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub | 440 | $ ssh-keygen -s ca_key -I key_id -h -n host.domain host_key.pub |
441 | 441 | ||
442 | Additional limitations on the validity and use of user certificates may | 442 | Additional limitations on the validity and use of user certificates may |
443 | be specified through certificate options. A certificate option may | 443 | be specified through certificate options. A certificate option may |
@@ -563,4 +563,4 @@ AUTHORS | |||
563 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 563 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
564 | versions 1.5 and 2.0. | 564 | versions 1.5 and 2.0. |
565 | 565 | ||
566 | OpenBSD 5.8 July 3, 2015 OpenBSD 5.8 | 566 | OpenBSD 5.8 August 20, 2015 OpenBSD 5.8 |
diff --git a/ssh-keygen.1 b/ssh-keygen.1 index 1a8644e21..c560179c8 100644 --- a/ssh-keygen.1 +++ b/ssh-keygen.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: ssh-keygen.1,v 1.126 2015/07/03 03:49:45 djm Exp $ | 1 | .\" $OpenBSD: ssh-keygen.1,v 1.127 2015/08/20 19:20:06 naddy Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | .\" Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -35,7 +35,7 @@ | |||
35 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 35 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
36 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 36 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
37 | .\" | 37 | .\" |
38 | .Dd $Mdocdate: July 3 2015 $ | 38 | .Dd $Mdocdate: August 20 2015 $ |
39 | .Dt SSH-KEYGEN 1 | 39 | .Dt SSH-KEYGEN 1 |
40 | .Os | 40 | .Os |
41 | .Sh NAME | 41 | .Sh NAME |
@@ -676,7 +676,7 @@ and identifying the CA key by providing its public half as an argument | |||
676 | to | 676 | to |
677 | .Fl s : | 677 | .Fl s : |
678 | .Pp | 678 | .Pp |
679 | .Dl $ ssh-keygen -s ca_key.pub -D libpkcs11.so -I key_id host_key.pub | 679 | .Dl $ ssh-keygen -s ca_key.pub -D libpkcs11.so -I key_id user_key.pub |
680 | .Pp | 680 | .Pp |
681 | In all cases, | 681 | In all cases, |
682 | .Ar key_id | 682 | .Ar key_id |
@@ -689,7 +689,7 @@ By default, generated certificates are valid for all users or hosts. | |||
689 | To generate a certificate for a specified set of principals: | 689 | To generate a certificate for a specified set of principals: |
690 | .Pp | 690 | .Pp |
691 | .Dl $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub | 691 | .Dl $ ssh-keygen -s ca_key -I key_id -n user1,user2 user_key.pub |
692 | .Dl "$ ssh-keygen -s ca_key -I key_id -h -n host.domain user_key.pub" | 692 | .Dl "$ ssh-keygen -s ca_key -I key_id -h -n host.domain host_key.pub" |
693 | .Pp | 693 | .Pp |
694 | Additional limitations on the validity and use of user certificates may | 694 | Additional limitations on the validity and use of user certificates may |
695 | be specified through certificate options. | 695 | be specified through certificate options. |
diff --git a/ssh-keygen.c b/ssh-keygen.c index ea5f1e49e..4e0a85554 100644 --- a/ssh-keygen.c +++ b/ssh-keygen.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-keygen.c,v 1.276 2015/07/03 03:49:45 djm Exp $ */ | 1 | /* $OpenBSD: ssh-keygen.c,v 1.277 2015/08/19 23:17:51 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1994 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -1201,7 +1201,8 @@ do_known_hosts(struct passwd *pw, const char *name) | |||
1201 | exit(1); | 1201 | exit(1); |
1202 | } else if (delete_host && !ctx.found_key) { | 1202 | } else if (delete_host && !ctx.found_key) { |
1203 | logit("Host %s not found in %s", name, identity_file); | 1203 | logit("Host %s not found in %s", name, identity_file); |
1204 | unlink(tmp); | 1204 | if (inplace) |
1205 | unlink(tmp); | ||
1205 | } else if (inplace) { | 1206 | } else if (inplace) { |
1206 | /* Backup existing file */ | 1207 | /* Backup existing file */ |
1207 | if (unlink(old) == -1 && errno != ENOENT) | 1208 | if (unlink(old) == -1 && errno != ENOENT) |
diff --git a/ssh-pkcs11-helper.c b/ssh-pkcs11-helper.c index ceabc8ba7..f2d586395 100644 --- a/ssh-pkcs11-helper.c +++ b/ssh-pkcs11-helper.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-pkcs11-helper.c,v 1.10 2015/01/20 23:14:00 deraadt Exp $ */ | 1 | /* $OpenBSD: ssh-pkcs11-helper.c,v 1.11 2015/08/20 22:32:42 deraadt Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2010 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2010 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -301,8 +301,8 @@ main(int argc, char **argv) | |||
301 | buffer_init(&oqueue); | 301 | buffer_init(&oqueue); |
302 | 302 | ||
303 | set_size = howmany(max + 1, NFDBITS) * sizeof(fd_mask); | 303 | set_size = howmany(max + 1, NFDBITS) * sizeof(fd_mask); |
304 | rset = (fd_set *)xmalloc(set_size); | 304 | rset = xmalloc(set_size); |
305 | wset = (fd_set *)xmalloc(set_size); | 305 | wset = xmalloc(set_size); |
306 | 306 | ||
307 | for (;;) { | 307 | for (;;) { |
308 | memset(rset, 0, set_size); | 308 | memset(rset, 0, set_size); |
diff --git a/ssh_config.0 b/ssh_config.0 index 654807779..67133cd4d 100644 --- a/ssh_config.0 +++ b/ssh_config.0 | |||
@@ -205,9 +205,9 @@ DESCRIPTION | |||
205 | 205 | ||
206 | The default is: | 206 | The default is: |
207 | 207 | ||
208 | chacha20-poly1305@openssh.com, | ||
208 | aes128-ctr,aes192-ctr,aes256-ctr, | 209 | aes128-ctr,aes192-ctr,aes256-ctr, |
209 | aes128-gcm@openssh.com,aes256-gcm@openssh.com, | 210 | aes128-gcm@openssh.com,aes256-gcm@openssh.com, |
210 | chacha20-poly1305@openssh.com, | ||
211 | arcfour256,arcfour128, | 211 | arcfour256,arcfour128, |
212 | aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc, | 212 | aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc, |
213 | aes192-cbc,aes256-cbc,arcfour | 213 | aes192-cbc,aes256-cbc,arcfour |
@@ -1023,4 +1023,4 @@ AUTHORS | |||
1023 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 1023 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
1024 | versions 1.5 and 2.0. | 1024 | versions 1.5 and 2.0. |
1025 | 1025 | ||
1026 | OpenBSD 5.8 July 30, 2015 OpenBSD 5.8 | 1026 | OpenBSD 5.8 August 14, 2015 OpenBSD 5.8 |
diff --git a/ssh_config.5 b/ssh_config.5 index aaa435a9d..981197ddf 100644 --- a/ssh_config.5 +++ b/ssh_config.5 | |||
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: ssh_config.5,v 1.214 2015/07/30 00:01:34 djm Exp $ | 36 | .\" $OpenBSD: ssh_config.5,v 1.215 2015/08/14 15:32:41 jmc Exp $ |
37 | .Dd $Mdocdate: July 30 2015 $ | 37 | .Dd $Mdocdate: August 14 2015 $ |
38 | .Dt SSH_CONFIG 5 | 38 | .Dt SSH_CONFIG 5 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -435,9 +435,9 @@ chacha20-poly1305@openssh.com | |||
435 | .Pp | 435 | .Pp |
436 | The default is: | 436 | The default is: |
437 | .Bd -literal -offset indent | 437 | .Bd -literal -offset indent |
438 | chacha20-poly1305@openssh.com, | ||
438 | aes128-ctr,aes192-ctr,aes256-ctr, | 439 | aes128-ctr,aes192-ctr,aes256-ctr, |
439 | aes128-gcm@openssh.com,aes256-gcm@openssh.com, | 440 | aes128-gcm@openssh.com,aes256-gcm@openssh.com, |
440 | chacha20-poly1305@openssh.com, | ||
441 | arcfour256,arcfour128, | 441 | arcfour256,arcfour128, |
442 | aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc, | 442 | aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc, |
443 | aes192-cbc,aes256-cbc,arcfour | 443 | aes192-cbc,aes256-cbc,arcfour |
diff --git a/sshconnect.c b/sshconnect.c index 2999061b3..0ec1e54e9 100644 --- a/sshconnect.c +++ b/sshconnect.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sshconnect.c,v 1.262 2015/05/28 05:41:29 dtucker Exp $ */ | 1 | /* $OpenBSD: sshconnect.c,v 1.263 2015/08/20 22:32:42 deraadt Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -356,7 +356,7 @@ timeout_connect(int sockfd, const struct sockaddr *serv_addr, | |||
356 | goto done; | 356 | goto done; |
357 | } | 357 | } |
358 | 358 | ||
359 | fdset = (fd_set *)xcalloc(howmany(sockfd + 1, NFDBITS), | 359 | fdset = xcalloc(howmany(sockfd + 1, NFDBITS), |
360 | sizeof(fd_mask)); | 360 | sizeof(fd_mask)); |
361 | FD_SET(sockfd, fdset); | 361 | FD_SET(sockfd, fdset); |
362 | ms_to_timeval(&tv, *timeoutp); | 362 | ms_to_timeval(&tv, *timeoutp); |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sshd.c,v 1.457 2015/07/30 00:01:34 djm Exp $ */ | 1 | /* $OpenBSD: sshd.c,v 1.458 2015/08/20 22:32:42 deraadt Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -1265,7 +1265,7 @@ server_accept_loop(int *sock_in, int *sock_out, int *newsock, int *config_s) | |||
1265 | sighup_restart(); | 1265 | sighup_restart(); |
1266 | if (fdset != NULL) | 1266 | if (fdset != NULL) |
1267 | free(fdset); | 1267 | free(fdset); |
1268 | fdset = (fd_set *)xcalloc(howmany(maxfd + 1, NFDBITS), | 1268 | fdset = xcalloc(howmany(maxfd + 1, NFDBITS), |
1269 | sizeof(fd_mask)); | 1269 | sizeof(fd_mask)); |
1270 | 1270 | ||
1271 | for (i = 0; i < num_listen_socks; i++) | 1271 | for (i = 0; i < num_listen_socks; i++) |
diff --git a/sshd_config.0 b/sshd_config.0 index 1cc7459f8..aae7fb6af 100644 --- a/sshd_config.0 +++ b/sshd_config.0 | |||
@@ -286,9 +286,9 @@ DESCRIPTION | |||
286 | 286 | ||
287 | The default is: | 287 | The default is: |
288 | 288 | ||
289 | chacha20-poly1305@openssh.com, | ||
289 | aes128-ctr,aes192-ctr,aes256-ctr, | 290 | aes128-ctr,aes192-ctr,aes256-ctr, |
290 | aes128-gcm@openssh.com,aes256-gcm@openssh.com, | 291 | aes128-gcm@openssh.com,aes256-gcm@openssh.com |
291 | chacha20-poly1305@openssh.com | ||
292 | 292 | ||
293 | The list of available ciphers may also be obtained using the -Q | 293 | The list of available ciphers may also be obtained using the -Q |
294 | option of ssh(1) with an argument of M-bM-^@M-^\cipherM-bM-^@M-^]. | 294 | option of ssh(1) with an argument of M-bM-^@M-^\cipherM-bM-^@M-^]. |
@@ -927,7 +927,7 @@ DESCRIPTION | |||
927 | 927 | ||
928 | If this option is set to M-bM-^@M-^\noM-bM-^@M-^] (the default) then only addresses | 928 | If this option is set to M-bM-^@M-^\noM-bM-^@M-^] (the default) then only addresses |
929 | and not host names may be used in ~/.ssh/known_hosts from and | 929 | and not host names may be used in ~/.ssh/known_hosts from and |
930 | sshd_config(5) Match Host directives. | 930 | sshd_config Match Host directives. |
931 | 931 | ||
932 | UseLogin | 932 | UseLogin |
933 | Specifies whether login(1) is used for interactive login | 933 | Specifies whether login(1) is used for interactive login |
@@ -1049,4 +1049,4 @@ AUTHORS | |||
1049 | versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support | 1049 | versions 1.5 and 2.0. Niels Provos and Markus Friedl contributed support |
1050 | for privilege separation. | 1050 | for privilege separation. |
1051 | 1051 | ||
1052 | OpenBSD 5.8 August 6, 2015 OpenBSD 5.8 | 1052 | OpenBSD 5.8 August 14, 2015 OpenBSD 5.8 |
diff --git a/sshd_config.5 b/sshd_config.5 index 92c23bc46..0be7250b0 100644 --- a/sshd_config.5 +++ b/sshd_config.5 | |||
@@ -33,8 +33,8 @@ | |||
33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 33 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 34 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
35 | .\" | 35 | .\" |
36 | .\" $OpenBSD: sshd_config.5,v 1.210 2015/08/06 14:53:21 deraadt Exp $ | 36 | .\" $OpenBSD: sshd_config.5,v 1.211 2015/08/14 15:32:41 jmc Exp $ |
37 | .Dd $Mdocdate: August 6 2015 $ | 37 | .Dd $Mdocdate: August 14 2015 $ |
38 | .Dt SSHD_CONFIG 5 | 38 | .Dt SSHD_CONFIG 5 |
39 | .Os | 39 | .Os |
40 | .Sh NAME | 40 | .Sh NAME |
@@ -500,9 +500,9 @@ chacha20-poly1305@openssh.com | |||
500 | .Pp | 500 | .Pp |
501 | The default is: | 501 | The default is: |
502 | .Bd -literal -offset indent | 502 | .Bd -literal -offset indent |
503 | chacha20-poly1305@openssh.com, | ||
503 | aes128-ctr,aes192-ctr,aes256-ctr, | 504 | aes128-ctr,aes192-ctr,aes256-ctr, |
504 | aes128-gcm@openssh.com,aes256-gcm@openssh.com, | 505 | aes128-gcm@openssh.com,aes256-gcm@openssh.com |
505 | chacha20-poly1305@openssh.com | ||
506 | .Ed | 506 | .Ed |
507 | .Pp | 507 | .Pp |
508 | The list of available ciphers may also be obtained using the | 508 | The list of available ciphers may also be obtained using the |
@@ -1571,7 +1571,7 @@ If this option is set to | |||
1571 | .Pa ~/.ssh/known_hosts | 1571 | .Pa ~/.ssh/known_hosts |
1572 | .Cm from | 1572 | .Cm from |
1573 | and | 1573 | and |
1574 | .Xr sshd_config 5 | 1574 | .Nm |
1575 | .Cm Match | 1575 | .Cm Match |
1576 | .Cm Host | 1576 | .Cm Host |
1577 | directives. | 1577 | directives. |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sshkey.c,v 1.20 2015/07/03 03:43:18 djm Exp $ */ | 1 | /* $OpenBSD: sshkey.c,v 1.21 2015/08/19 23:19:01 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. |
4 | * Copyright (c) 2008 Alexander von Gernler. All rights reserved. | 4 | * Copyright (c) 2008 Alexander von Gernler. All rights reserved. |
@@ -1557,7 +1557,6 @@ dsa_generate_private_key(u_int bits, DSA **dsap) | |||
1557 | *dsap = NULL; | 1557 | *dsap = NULL; |
1558 | if (!DSA_generate_parameters_ex(private, bits, NULL, 0, NULL, | 1558 | if (!DSA_generate_parameters_ex(private, bits, NULL, 0, NULL, |
1559 | NULL, NULL) || !DSA_generate_key(private)) { | 1559 | NULL, NULL) || !DSA_generate_key(private)) { |
1560 | DSA_free(private); | ||
1561 | ret = SSH_ERR_LIBCRYPTO_ERROR; | 1560 | ret = SSH_ERR_LIBCRYPTO_ERROR; |
1562 | goto out; | 1561 | goto out; |
1563 | } | 1562 | } |
@@ -1,6 +1,6 @@ | |||
1 | /* $OpenBSD: version.h,v 1.74 2015/08/02 09:56:42 djm Exp $ */ | 1 | /* $OpenBSD: version.h,v 1.75 2015/08/21 03:45:26 djm Exp $ */ |
2 | 2 | ||
3 | #define SSH_VERSION "OpenSSH_7.0" | 3 | #define SSH_VERSION "OpenSSH_7.1" |
4 | 4 | ||
5 | #define SSH_PORTABLE "p1" | 5 | #define SSH_PORTABLE "p1" |
6 | #define SSH_RELEASE_MINIMUM SSH_VERSION SSH_PORTABLE | 6 | #define SSH_RELEASE_MINIMUM SSH_VERSION SSH_PORTABLE |