summaryrefslogtreecommitdiff
path: root/ChangeLog
diff options
context:
space:
mode:
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog12677
1 files changed, 12677 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
new file mode 100644
index 000000000..f283a8b3f
--- /dev/null
+++ b/ChangeLog
@@ -0,0 +1,12677 @@
1commit 9ca7e9c861775dd6c6312bc8aaab687403d24676
2Author: Damien Miller <djm@mindrot.org>
3Date: Wed May 27 10:38:00 2020 +1000
4
5 depend
6
7commit b6d251ed9af90e16c08a72c4aac2cb8ace8f94b1
8Author: djm@openbsd.org <djm@openbsd.org>
9Date: Mon May 18 04:29:35 2020 +0000
10
11 upstream: avoid possible NULL deref; from Pedro Martelletto
12
13 OpenBSD-Commit-ID: e6099c3fbb70aa67eb106e84d8b43f1fa919b721
14
15commit 3ab6fccc3935e9b778ff52f9c8d40f215d58e01d
16Author: Damien Miller <djm@mindrot.org>
17Date: Thu May 14 12:22:09 2020 +1000
18
19 prefer ln to cp for temporary copy of sshd
20
21 I saw failures on the reexec fallback test on Darwin 19.4 where
22 fork()ed children of a process that had it's executable removed
23 would instantly fail. Using ln to preserve the inode avoids this.
24
25commit f700d316c6b15a9cfbe87230d2dca81a5d916279
26Author: Darren Tucker <dtucker@dtucker.net>
27Date: Wed May 13 15:24:51 2020 +1000
28
29 Actually skip pty tests when needed.
30
31commit 08ce6b2210f46f795e7db747809f8e587429dfd2
32Author: Darren Tucker <dtucker@dtucker.net>
33Date: Wed May 13 13:56:45 2020 +1000
34
35 Skip building sk-dummy library if no SK support.
36
37commit 102d106bc2e50347d0e545fad6ff5ce408d67247
38Author: Damien Miller <djm@mindrot.org>
39Date: Wed May 13 12:08:34 2020 +1000
40
41 explicitly manage .depend and .depend.bak
42
43 Bring back removal of .depend to give the file a known state before
44 running makedepend, but manually move aside the current .depend file
45 and restore it as .depend.bak afterwards so the stale .depend check
46 works as expected.
47
48commit 83a6dc6ba1e03b3fa39d12a8522b8b0e68dd6390
49Author: Damien Miller <djm@mindrot.org>
50Date: Wed May 13 12:03:42 2020 +1000
51
52 make depend
53
54commit 7c0bbed967abed6301a63e0267cc64144357a99a
55Author: Damien Miller <djm@mindrot.org>
56Date: Wed May 13 12:01:10 2020 +1000
57
58 revert removal of .depend before makedepend
59
60 Commit 83657eac4 started removing .depend before running makedepend
61 to reset the contents of .depend to a known state. Unfortunately
62 this broke the depend-check step as now .depend.bak would only ever
63 be created as an empty file.
64
65 ok dtucker
66
67commit 58ad004acdcabf3b9f40bc3aaa206b25d998db8c
68Author: Damien Miller <djm@mindrot.org>
69Date: Tue May 12 12:58:46 2020 +1000
70
71 prepare for 8.3 release
72
73commit 4fa9e048c2af26beb7dc2ee9479ff3323e92a7b5
74Author: Darren Tucker <dtucker@dtucker.net>
75Date: Fri May 8 21:50:43 2020 +1000
76
77 Ensure SA_SIGNAL test only signals itself.
78
79 When the test's child signals its parent and it exits the result of
80 getppid changes. On Ubuntu 20.04 this results in the ppid being that
81 of the GDM session, causing it to exit. Analysis and testing from pedro
82 at ambientworks.net
83
84commit dc2da29aae76e170d22f38bb36f1f5d1edd5ec2b
85Author: Damien Miller <djm@mindrot.org>
86Date: Fri May 8 13:31:53 2020 +1000
87
88 sync config.guess/config.sub with latest versions
89
90 ok dtucker@
91
92commit a8265bd64c14881fc7f4fa592f46dfc66b911f17
93Author: djm@openbsd.org <djm@openbsd.org>
94Date: Wed May 6 20:58:01 2020 +0000
95
96 upstream: openssh-8.3; ok deraadt@
97
98 OpenBSD-Commit-ID: c8831ec88b9c750f5816aed9051031fb535d22c1
99
100commit 955854cafca88e0cdcd3d09ca1ad4ada465364a1
101Author: djm@openbsd.org <djm@openbsd.org>
102Date: Wed May 6 20:57:38 2020 +0000
103
104 upstream: another case where a utimes() failure could make scp send
105
106 a desynchronising error; reminded by Aymeric Vincent ok deraadt markus
107
108 OpenBSD-Commit-ID: 2ea611d34d8ff6d703a7a8bf858aa5dbfbfa7381
109
110commit 59d531553fd90196946743da391f3a27cf472f4e
111Author: Darren Tucker <dtucker@dtucker.net>
112Date: Thu May 7 15:34:12 2020 +1000
113
114 Check if -D_REENTRANT is needed for localtime_r.
115
116 On at least HP-UX 11.11, the localtime_r declararation is behind
117 ifdef _REENTRANT. Check for and add if needed.
118
119commit c13403e55de8cdbb9da628ed95017b1d4c0f205f
120Author: Darren Tucker <dtucker@dtucker.net>
121Date: Tue May 5 11:32:43 2020 +1000
122
123 Skip security key tests if ENABLE_SK not set.
124
125commit 4da393f87cd52d788c84112ee3f2191c9bcaaf30
126Author: djm@openbsd.org <djm@openbsd.org>
127Date: Fri May 1 04:03:14 2020 +0000
128
129 upstream: sure enough, some of the test data that we though were in
130
131 new format were actually in the old format; fix from Michael Forney
132
133 OpenBSD-Regress-ID: a41a5c43a61b0f0b1691994dbf16dfb88e8af933
134
135commit 15bfafc1db4c8792265ada9623a96f387990f732
136Author: djm@openbsd.org <djm@openbsd.org>
137Date: Fri May 1 04:00:29 2020 +0000
138
139 upstream: make mktestdata.sh generate old/new format keys that we
140
141 expect. This script was written before OpenSSH switched to new-format private
142 keys by default and was never updated to the change (until now) From Michael
143 Forney
144
145 OpenBSD-Regress-ID: 38cf354715c96852e5b71c2393fb6e7ad28b7ca7
146
147commit 7882d2eda6ad3eb82220a85294de545d20ef82db
148Author: djm@openbsd.org <djm@openbsd.org>
149Date: Fri May 1 03:58:02 2020 +0000
150
151 upstream: portability fix for sed that always emil a newline even
152
153 if the input does not contain one; from Michael Forney
154
155 OpenBSD-Regress-ID: 9190c3ddf0d2562ccc02c4a95fce0e392196bfc7
156
157commit 8074f9499e454df0acdacea33598858a1453a357
158Author: djm@openbsd.org <djm@openbsd.org>
159Date: Fri May 1 03:36:25 2020 +0000
160
161 upstream: remove obsolete RSA1 test keys; spotted by Michael Forney
162
163 OpenBSD-Regress-ID: 6384ba889594e217d166908ed8253718ab0866da
164
165commit c697e46c314aa94574af0d393d80f23e0ebc9748
166Author: Darren Tucker <dtucker@dtucker.net>
167Date: Sat May 2 18:34:47 2020 +1000
168
169 Update .depend.
170
171commit 83657eac42941f270c4b02b2c46d9a21f616ef99
172Author: Darren Tucker <dtucker@dtucker.net>
173Date: Sat May 2 18:29:40 2020 +1000
174
175 Remove use of tail for 'make depend'.
176
177 Not every tail supports +N and we can do with out it so just remove it.
178 Prompted by mforney at mforney.org.
179
180commit d25d630d24c5a1c64d4e646510e79dc22d6d7b88
181Author: djm@openbsd.org <djm@openbsd.org>
182Date: Sat May 2 07:19:43 2020 +0000
183
184 upstream: we have a sshkey_save_public() function to save public keys;
185
186 use it and save a bunch of redundant code.
187
188 Patch from loic AT venez.fr; ok markus@ djm@
189
190 OpenBSD-Commit-ID: f93e030a0ebcd0fd9054ab30db501ec63454ea5f
191
192commit e9dc9863723e111ae05e353d69df857f0169544a
193Author: Darren Tucker <dtucker@dtucker.net>
194Date: Fri May 1 18:32:25 2020 +1000
195
196 Use LONG_LONG_MAX and friends if available.
197
198 If we don't have LLONG_{MIN,MAX} but do have LONG_LONG_{MIN,MAX}
199 then use those instead. We do calculate these values in configure,
200 but it turns out that at least one compiler (old HP ANSI C) can't
201 parse "-9223372036854775808LL" without mangling it. (It can parse
202 "-9223372036854775807LL" which is presumably why its limits.h defines
203 LONG_LONG_MIN as the latter minus 1.)
204
205 Fixes rekey test when compiled with the aforementioned compiler.
206
207commit aad87b88fc2536b1ea023213729aaf4eaabe1894
208Author: djm@openbsd.org <djm@openbsd.org>
209Date: Fri May 1 06:31:42 2020 +0000
210
211 upstream: when receving a file in sink(), be careful to send at
212
213 most a single error response after the file has been opened. Otherwise the
214 source() and sink() can become desyncronised. Reported by Daniel Goujot,
215 Georges-Axel Jaloyan, Ryan Lahfa, and David Naccache.
216
217 ok deraadt@ markus@
218
219 OpenBSD-Commit-ID: 6c14d233c97349cb811a8f7921ded3ae7d9e0035
220
221commit 31909696c4620c431dd55f6cd15db65c4e9b98da
222Author: djm@openbsd.org <djm@openbsd.org>
223Date: Fri May 1 06:28:52 2020 +0000
224
225 upstream: expose vasnmprintf(); ok (as part of other commit) markus
226
227 deraadt
228
229 OpenBSD-Commit-ID: 2e80cea441c599631a870fd40307d2ade5a7f9b5
230
231commit 99ce9cefbe532ae979744c6d956b49f4b02aff82
232Author: djm@openbsd.org <djm@openbsd.org>
233Date: Fri May 1 04:23:11 2020 +0000
234
235 upstream: avoid NULL dereference when attempting to convert invalid
236
237 ssh.com private keys using "ssh-keygen -i"; spotted by Michael Forney
238
239 OpenBSD-Commit-ID: 2e56e6d26973967d11d13f56ea67145f435bf298
240
241commit 6c6072ba8b079e6f5caa38b011a6f4570c14ed38
242Author: Darren Tucker <dtucker@dtucker.net>
243Date: Fri May 1 15:09:26 2020 +1000
244
245 See if SA_RESTART signals will interrupt select().
246
247 On some platforms (at least older HP-UXes such as 11.11, possibly others)
248 setting SA_RESTART on signal handers will cause it to not interrupt
249 select(), at least for calls that do not specify a timeout. Try to
250 detect this and if found, don't use SA_RESTART.
251
252 POSIX says "If SA_RESTART has been set for the interrupting signal, it
253 is implementation-dependent whether select() restarts or returns with
254 [EINTR]" so this behaviour is within spec.
255
256commit 90a0b434ed41f9c505662dba8782591818599cb3
257Author: Damien Miller <djm@mindrot.org>
258Date: Fri May 1 13:55:03 2020 +1000
259
260 fix reversed test
261
262commit c0dfd18dd1c2107c73d18f70cd164f7ebd434b08
263Author: Damien Miller <djm@mindrot.org>
264Date: Fri May 1 13:29:16 2020 +1000
265
266 wrap sha2.h inclusion in #ifdef HAVE_SHA2_H
267
268commit a01817a9f63dbcbbc6293aacc4019993a4cdc7e3
269Author: djm@openbsd.org <djm@openbsd.org>
270Date: Tue Apr 28 04:59:29 2020 +0000
271
272 upstream: adapt dummy FIDO middleware to API change; ok markus@
273
274 OpenBSD-Regress-ID: 8bb84ee500c2eaa5616044314dd0247709a1790f
275
276commit 261571ddf02ea38fdb5e4a97c69ee53f847ca5b7
277Author: jmc@openbsd.org <jmc@openbsd.org>
278Date: Thu Apr 30 18:28:37 2020 +0000
279
280 upstream: tweak previous; ok markus
281
282 OpenBSD-Commit-ID: 41895450ce2294ec44a5713134491cc31f0c09fd
283
284commit 5de21c82e1d806d3e401b5338371e354b2e0a66f
285Author: markus@openbsd.org <markus@openbsd.org>
286Date: Thu Apr 30 17:12:20 2020 +0000
287
288 upstream: bring back debug() removed in rev 1.74; noted by pradeep
289
290 kumar
291
292 OpenBSD-Commit-ID: 8d134d22ab25979078a3b48d058557d49c402e65
293
294commit ea14103ce9a5e13492e805f7e9277516ff5a4273
295Author: markus@openbsd.org <markus@openbsd.org>
296Date: Thu Apr 30 17:07:10 2020 +0000
297
298 upstream: run the 2nd ssh with BatchMode for scp -3
299
300 OpenBSD-Commit-ID: 77994fc8c7ca02d88e6d0d06d0f0fe842a935748
301
302commit 59d2de956ed29aa5565ed5e5947a7abdb27ac013
303Author: djm@openbsd.org <djm@openbsd.org>
304Date: Tue Apr 28 04:02:29 2020 +0000
305
306 upstream: when signing a challenge using a FIDO toke, perform the
307
308 hashing in the middleware layer rather than in ssh code. This allows
309 middlewares that call APIs that perform the hashing implicitly (including
310 Microsoft's AFAIK). ok markus@
311
312 OpenBSD-Commit-ID: c9fc8630aba26c75d5016884932f08a5a237f37d
313
314commit c9d10dbc0ccfb1c7568bbb784f7aeb7a0b5ded12
315Author: dtucker@openbsd.org <dtucker@openbsd.org>
316Date: Sun Apr 26 09:38:14 2020 +0000
317
318 upstream: Fix comment typo. Patch from mforney at mforney.org.
319
320 OpenBSD-Commit-ID: 3565f056003707a5e678e60e03f7a3efd0464a2b
321
322commit 4d2c87b4d1bde019cdd0f00552fcf97dd8b39940
323Author: dtucker@openbsd.org <dtucker@openbsd.org>
324Date: Sat Apr 25 06:59:36 2020 +0000
325
326 upstream: We've standardized on memset over bzero, replace a couple
327
328 that had slipped in. ok deraadt markus djm.
329
330 OpenBSD-Commit-ID: f5be055554ee93e6cc66b0053b590bef3728dbd6
331
332commit 7f23f42123d64272a7b00754afa6b0841d676691
333Author: Darren Tucker <dtucker@dtucker.net>
334Date: Fri May 1 12:21:58 2020 +1000
335
336 Include sys/byteorder.h for htons and friends.
337
338 These are usually in netinet/in.h but on HP-UX they are not defined if
339 _XOPEN_SOURCE_EXTENDED is set. Only needed for netcat in the regression
340 tests.
341
342commit d27cba58c972d101a5de976777e518f34ac779cb
343Author: Darren Tucker <dtucker@dtucker.net>
344Date: Fri May 1 09:21:52 2020 +1000
345
346 Fix conditional for openssl-based chacha20.
347
348 Fixes warnings or link errors when building against older OpenSSLs.
349 ok djm
350
351commit 20819b962dc1467cd6fad5486a7020c850efdbee
352Author: Darren Tucker <dtucker@dtucker.net>
353Date: Fri Apr 24 15:07:55 2020 +1000
354
355 Error out if given RDomain if unsupported.
356
357 If the config contained 'RDomain %D' on a platform that did not support
358 it, the error would not be detected until runtime resulting in a broken
359 sshd. Detect this earlier and error out if found. bz#3126, based on a
360 patch from jjelen at redhat.com, tweaks and ok djm@
361
362commit 2c1690115a585c624eed2435075a93a463a894e2
363Author: dtucker@openbsd.org <dtucker@openbsd.org>
364Date: Fri Apr 24 03:33:21 2020 +0000
365
366 upstream: Fix incorrect error message for "too many known hosts files."
367
368 bz#3149, patch from jjelen at redhat.com.
369
370 OpenBSD-Commit-ID: e0fcb07ed5cf7fd54ce340471a747c24454235e5
371
372commit 3beb7276e7a8aedd3d4a49f9c03b97f643448c92
373Author: dtucker@openbsd.org <dtucker@openbsd.org>
374Date: Fri Apr 24 02:19:40 2020 +0000
375
376 upstream: Remove leave_non_blocking() which is now dead code
377
378 because nothing sets in_non_blocking_mode any more. Patch from
379 michaael.meeks at collabora.com, ok djm@
380
381 OpenBSD-Commit-ID: c403cefe97a5a99eca816e19cc849cdf926bd09c
382
383commit 8654e3561772f0656e7663a0bd6a1a8cb6d43300
384Author: jmc@openbsd.org <jmc@openbsd.org>
385Date: Thu Apr 23 21:28:09 2020 +0000
386
387 upstream: ce examples of "Ar arg Ar arg" with "Ar arg arg" and
388
389 stop the spread;
390
391 OpenBSD-Commit-ID: af0e952ea0f5e2019c2ce953ed1796eca47f0705
392
393commit 67697e4a8246dd8423e44b8785f3ee31fee72d07
394Author: Darren Tucker <dtucker@dtucker.net>
395Date: Fri Apr 24 11:10:18 2020 +1000
396
397 Update .depend.
398
399commit d6cc76176216fe3fac16cd20d148d75cb9c50876
400Author: Darren Tucker <dtucker@dtucker.net>
401Date: Wed Apr 22 14:07:00 2020 +1000
402
403 Mailing list is now closed to non-subscribers.
404
405 While there, add a reference to the bugzilla. ok djm@
406
407commit cecde6a41689d0ae585ec903b190755613a6de79
408Author: Darren Tucker <dtucker@dtucker.net>
409Date: Wed Apr 22 12:09:40 2020 +1000
410
411 Put the values from env vars back.
412
413 This merges the values from the recently removed environment into make's
414 command line arguments since we actually need those.
415
416commit 300c4322b92e98d3346efa0aec1c094c94d0f964
417Author: Darren Tucker <dtucker@dtucker.net>
418Date: Wed Apr 22 11:33:15 2020 +1000
419
420 Pass configure's egrep through to test-exec.sh.
421
422 Use it to create a wrapper function to call it from tests. Fixes the
423 keygen-comment test on platforms with impoverished default egrep (eg
424 Solaris).
425
426commit c8d9796cfe046f00eb8b2096d2b7028d6a523a84
427Author: Darren Tucker <dtucker@dtucker.net>
428Date: Wed Apr 22 10:56:44 2020 +1000
429
430 Remove unneeded env vars from t-exec invocation.
431
432commit 01d4cdcd4514e99a4b6eb9523cd832bbf008d1d7
433Author: dtucker@openbsd.org <dtucker@openbsd.org>
434Date: Tue Apr 21 23:14:58 2020 +0000
435
436 upstream: Backslash '$' at then end of string. Prevents warning on
437
438 some shells.
439
440 OpenBSD-Regress-ID: 5dc27ab624c09d34078fd326b10e38c1ce9c741f
441
442commit 8854724ccefc1fa16f10b37eda2e759c98148caa
443Author: Darren Tucker <dtucker@dtucker.net>
444Date: Tue Apr 21 18:27:23 2020 +1000
445
446 Sync rev 1.49.
447
448 Prevent infinite for loop since i went from ssize_t to size_t. Patch from
449 eagleoflqj via OpenSSH github PR#178, ok djm@, feedback & ok millert@
450
451commit d00d07b6744d3b4bb7aca46c734ecd670148da23
452Author: djm@openbsd.org <djm@openbsd.org>
453Date: Mon Apr 20 04:44:47 2020 +0000
454
455 upstream: regression test for printing of private key fingerprints and
456
457 key comments, mostly by loic AT venez.fr (slightly tweaked for portability)
458 ok dtucker@
459
460 OpenBSD-Regress-ID: 8dc6c4feaf4fe58b6d634cd89afac9a13fd19004
461
462commit a98d5ba31e5e7e01317352f85fa63b846a960f8c
463Author: djm@openbsd.org <djm@openbsd.org>
464Date: Mon Apr 20 04:43:57 2020 +0000
465
466 upstream: fix a bug I introduced in r1.406: when printing private key
467
468 fingerprint of old-format key, key comments were not being displayed. Spotted
469 by loic AT venez.fr, ok dtucker
470
471 OpenBSD-Commit-ID: 2d98e4f9eb168eea733d17e141e1ead9fe26e533
472
473commit 32f2d0aad42c15e19bd3b07496076ca891573a58
474Author: djm@openbsd.org <djm@openbsd.org>
475Date: Fri Apr 17 07:16:07 2020 +0000
476
477 upstream: repair private key fingerprint printing to also print
478
479 comment after regression caused by my recent pubkey loading refactor.
480 Reported by loic AT venez.fr, ok dtucker@
481
482 OpenBSD-Commit-ID: f8db49acbee6a6ccb2a4259135693b3cceedb89e
483
484commit 094dd513f4b42e6a3cebefd18d1837eb709b4d99
485Author: djm@openbsd.org <djm@openbsd.org>
486Date: Fri Apr 17 07:15:11 2020 +0000
487
488 upstream: refactor out some duplicate private key loading code;
489
490 based on patch from loic AT venez.fr, ok dtucker@
491
492 OpenBSD-Commit-ID: 5eff2476b0d8d0614924c55e350fb7bb9c84f45e
493
494commit 4e04f46f248f1708e39b900b76c9693c820eff68
495Author: jmc@openbsd.org <jmc@openbsd.org>
496Date: Fri Apr 17 06:12:41 2020 +0000
497
498 upstream: add space beteen macro arg and punctuation;
499
500 OpenBSD-Commit-ID: c93a6cbb4bf9468fc4c13e64bc1fd4efee201a44
501
502commit 44ae009a0112081d0d541aeaa90088bedb6f21ce
503Author: djm@openbsd.org <djm@openbsd.org>
504Date: Fri Apr 17 04:27:03 2020 +0000
505
506 upstream: auth2-pubkey r1.89 changed the order of operations to
507
508 checking AuthorizedKeysFile first and falling back to AuthorizedKeysCommand
509 if no key was found in a file. Document this order here; bz3134
510
511 OpenBSD-Commit-ID: afce0872cbfcfc1d4910ad7722e50f792a1dce12
512
513commit f96f17f920f38ceea6f3c5cb0b075c46b8929fdc
514Author: Damien Miller <djm@mindrot.org>
515Date: Fri Apr 17 14:07:15 2020 +1000
516
517 sys/sysctl.h is only used on OpenBSD
518
519 so change the preprocessor test used to include it to check
520 __OpenBSD__, matching the code that uses the symbols it declares.
521
522commit 54688e937a69c7aebef8a3d50cbd4c6345bab2ca
523Author: djm@openbsd.org <djm@openbsd.org>
524Date: Fri Apr 17 03:38:47 2020 +0000
525
526 upstream: fix reversed test that caused IdentitiesOnly=yes to not
527
528 apply to keys loaded from a PKCS11Provider; bz3141, ok dtucker@
529
530 OpenBSD-Commit-ID: e3dd6424b94685671fe84c9b9dbe352fb659f677
531
532commit 267cbc87b5b6e78973ac4d3c7a6f807ed226928c
533Author: djm@openbsd.org <djm@openbsd.org>
534Date: Fri Apr 17 03:34:42 2020 +0000
535
536 upstream: mention that /etc/hosts.equiv and /etc/shosts.equiv are
537
538 not considered for HostbasedAuthentication when the target user is root;
539 bz3148
540
541 OpenBSD-Commit-ID: fe4c1256929e53f23af17068fbef47852f4bd752
542
543commit c90f72d29e84b4a2709078bf5546a72c29a65177
544Author: djm@openbsd.org <djm@openbsd.org>
545Date: Fri Apr 17 03:30:05 2020 +0000
546
547 upstream: make IgnoreRhosts a tri-state option: "yes" ignore
548
549 rhosts/shosts, "no" allow rhosts/shosts or (new) "shosts-only" to allow
550 .shosts files but not .rhosts. ok dtucker@
551
552 OpenBSD-Commit-ID: d08d6930ed06377a80cf53923c1955e9589342e9
553
554commit 321c7147079270f3a154f91b59e66219aac3d514
555Author: djm@openbsd.org <djm@openbsd.org>
556Date: Fri Apr 17 03:23:13 2020 +0000
557
558 upstream: allow the IgnoreRhosts directive to appear anywhere in a
559
560 sshd_config, not just before any Match blocks; bz3148, ok dtucker@
561
562 OpenBSD-Commit-ID: e042467d703bce640b1f42c5d1a62bf3825736e8
563
564commit ca5403b085a735055ec7b7cdcd5b91f2662df94c
565Author: jmc@openbsd.org <jmc@openbsd.org>
566Date: Sat Apr 11 20:20:09 2020 +0000
567
568 upstream: add space between macro arg and punctuation;
569
570 OpenBSD-Commit-ID: e579e4d95eef13059c30931ea1f09ed8296b819c
571
572commit 8af0244d7b4a65eed2e62f9c89141c7c8e63f09d
573Author: Darren Tucker <dtucker@dtucker.net>
574Date: Wed Apr 15 10:58:02 2020 +1000
575
576 Add sys/syscall.h for syscall numbers.
577
578 In some architecture/libc configurations we need to explicitly include
579 sys/syscall.h for the syscall number (__NR_xxx) definitions. bz#3085,
580 patch from blowfist at xroutine.net.
581
582commit 3779b50ee952078018a5d9e1df20977f4355df17
583Author: djm@openbsd.org <djm@openbsd.org>
584Date: Sat Apr 11 10:16:11 2020 +0000
585
586 upstream: Refactor private key parsing. Eliminates a fair bit of
587
588 duplicated code and fixes oss-fuzz#20074 (NULL deref) caused by a missing key
589 type check in the ECDSA_CERT parsing path.
590
591 feedback and ok markus@
592
593 OpenBSD-Commit-ID: 4711981d88afb7196d228f7baad9be1d3b20f9c9
594
595commit b6a4013647db67ec622c144a9e05dd768f1966b3
596Author: dtucker@openbsd.org <dtucker@openbsd.org>
597Date: Fri Apr 10 00:54:03 2020 +0000
598
599 upstream: Add tests for TOKEN expansion of LocalForward and
600
601 RemoteForward.
602
603 OpenBSD-Regress-ID: 90fcbc60d510eb114a2b6eaf4a06ff87ecd80a89
604
605commit abc3e0a5179c13c0469a1b11fe17d832abc39999
606Author: dtucker@openbsd.org <dtucker@openbsd.org>
607Date: Mon Apr 6 09:43:55 2020 +0000
608
609 upstream: Add utf8.c for asmprintf used by krl.c
610
611 OpenBSD-Regress-ID: 433708d11165afdb189fe635151d21659dd37a37
612
613commit 990687a0336098566c3a854d23cce74a31ec6fe2
614Author: dtucker@openbsd.org <dtucker@openbsd.org>
615Date: Fri Apr 10 00:52:07 2020 +0000
616
617 upstream: Add TOKEN percent expansion to LocalFoward and RemoteForward
618
619 when used for Unix domain socket forwarding. Factor out the code for the
620 config keywords that use the most common subset of TOKENS into its own
621 function. bz#3014, ok jmc@ (man page bits) djm@
622
623 OpenBSD-Commit-ID: bffc9f7e7b5cf420309a057408bef55171fd0b97
624
625commit 2b13d3934d5803703c04803ca3a93078ecb5b715
626Author: djm@openbsd.org <djm@openbsd.org>
627Date: Wed Apr 8 00:10:37 2020 +0000
628
629 upstream: let sshkey_try_load_public() load public keys from the
630
631 unencrypted envelope of private key files if not sidecar public key file is
632 present.
633
634 ok markus@
635
636 OpenBSD-Commit-ID: 252a0a580e10b9a6311632530d63b5ac76592040
637
638commit d01f39304eaab0352793b490a25e1ab5f59a5366
639Author: djm@openbsd.org <djm@openbsd.org>
640Date: Wed Apr 8 00:09:24 2020 +0000
641
642 upstream: simplify sshkey_try_load_public()
643
644 ok markus@
645
646 OpenBSD-Commit-ID: 05a5d46562aafcd70736c792208b1856064f40ad
647
648commit f290ab0833e44355fc006e4e67b92446c14673ef
649Author: djm@openbsd.org <djm@openbsd.org>
650Date: Wed Apr 8 00:08:46 2020 +0000
651
652 upstream: add sshkey_parse_pubkey_from_private_fileblob_type()
653
654 Extracts a public key from the unencrypted envelope of a new-style
655 OpenSSH private key.
656
657 ok markus@
658
659 OpenBSD-Commit-ID: 44d7ab446e5e8c686aee96d5897b26b3939939aa
660
661commit 8d514eea4ae089626a55e11c7bc1745c8d9683e4
662Author: djm@openbsd.org <djm@openbsd.org>
663Date: Wed Apr 8 00:07:19 2020 +0000
664
665 upstream: simplify sshkey_parse_private_fileblob_type()
666
667 Try new format parser for all key types first, fall back to PEM
668 parser only for invalid format errors.
669
670 ok markus@
671
672 OpenBSD-Commit-ID: 0173bbb3a5cface77b0679d4dca0e15eb5600b77
673
674commit 421169d0e758351b105eabfcebf42378ebf17217
675Author: djm@openbsd.org <djm@openbsd.org>
676Date: Wed Apr 8 00:05:59 2020 +0000
677
678 upstream: check private key type against requested key type in
679
680 new-style private decoding; ok markus@
681
682 OpenBSD-Commit-ID: 04d44b3a34ce12ce5187fb6f6e441a88c8c51662
683
684commit 6aabfb6d22b36d07f584cba97f4cdc4363a829da
685Author: djm@openbsd.org <djm@openbsd.org>
686Date: Wed Apr 8 00:04:32 2020 +0000
687
688 upstream: check that pubkey in private key envelope matches actual
689
690 private key
691
692 (this public key is currently unusued)
693
694 ok markus@
695
696 OpenBSD-Commit-ID: 634a60b5e135d75f48249ccdf042f3555112049c
697
698commit c0f5b2294796451001fd328c44f0d00f1114eddf
699Author: djm@openbsd.org <djm@openbsd.org>
700Date: Wed Apr 8 00:01:52 2020 +0000
701
702 upstream: refactor private key parsing a little
703
704 Split out the base64 decoding and private section decryption steps in
705 to separate functions. This will make the decryption step easier to fuzz
706 as well as making it easier to write a "load public key from new-format
707 private key" function.
708
709 ok markus@
710
711 OpenBSD-Commit-ID: 7de31d80fb9062aa01901ddf040c286b64ff904e
712
713commit 8461a5b3db34ed0b5a4a18d82f64fd5ac8693ea8
714Author: Darren Tucker <dtucker@dtucker.net>
715Date: Mon Apr 6 20:54:34 2020 +1000
716
717 Include openssl-compat.h before checking ifdefs.
718
719 Fixes problem where unsuitable chacha20 code in libressl would be used
720 unintentionally.
721
722commit 931c50c5883a9910ea1ae9a371e4e815ec56b035
723Author: Damien Miller <djm@mindrot.org>
724Date: Mon Apr 6 10:04:56 2020 +1000
725
726 fix inverted test for LibreSSL version
727
728commit d1d5f728511e2338b7c994968d301d8723012264
729Author: dtucker@openbsd.org <dtucker@openbsd.org>
730Date: Sat Apr 4 23:04:41 2020 +0000
731
732 upstream: Indicate if we're using a cached key in trace output.
733
734 OpenBSD-Regress-ID: 409a7b0e59d1272890fda507651c0c3d2d3c0d89
735
736commit a398251a4627367c78bc483c70c2ec973223f82c
737Author: Darren Tucker <dtucker@dtucker.net>
738Date: Sun Apr 5 08:43:57 2020 +1000
739
740 Use /usr/bin/xp4g/id if necessary.
741
742 Solaris' native "id" doesn't support the options we use but the one
743 in /usr/bin/xp4g does, so use that instead.
744
745commit db0fdd48335b5b01114f78c1a73a195235910f81
746Author: dtucker@openbsd.org <dtucker@openbsd.org>
747Date: Sat Apr 4 22:14:26 2020 +0000
748
749 upstream: Some platforms don't have "hostname -s", so use cut to trim
750
751 short hostname instead.
752
753 OpenBSD-Regress-ID: ebcf36a6fdf287c9336b0d4f6fc9f793c05307a7
754
755commit e7e59a9cc8eb7fd5944ded28f4d7e3ae0a5fdecd
756Author: dtucker@openbsd.org <dtucker@openbsd.org>
757Date: Fri Apr 3 07:53:10 2020 +0000
758
759 upstream: Compute hash locally and re-enable %C tests.
760
761 OpenBSD-Regress-ID: 94d1366e8105274858b88a1f9ad2e62801e49770
762
763commit abe2b245b3ac6c4801e99bc0f13289cd28211e22
764Author: Damien Miller <djm@mindrot.org>
765Date: Fri Apr 3 17:25:46 2020 +1100
766
767 prefer libcrypto chacha20-poly1305 where possible
768
769commit bc5c5d01ad668981f9e554e62195383bc12e8528
770Author: dtucker@openbsd.org <dtucker@openbsd.org>
771Date: Fri Apr 3 05:43:11 2020 +0000
772
773 upstream: Temporarily remove tests for '%C' since the hash contains the
774
775 local hostname and it doesn't work on any machine except mine... spotted by
776 djm@
777
778 OpenBSD-Regress-ID: 2d4c3585b9fcbbff14f4a5a5fde51dbd0d690401
779
780commit 81624026989654955a657ebf2a1fe8b9994f3c87
781Author: djm@openbsd.org <djm@openbsd.org>
782Date: Fri Apr 3 06:07:57 2020 +0000
783
784 upstream: r1.522 deleted one too many lines; repair
785
786 OpenBSD-Commit-ID: 1af8851fd7a99e4a887b19aa8f4c41a6b3d25477
787
788commit 668cb3585ce829bd6e34d4a962c489bda1d16370
789Author: jmc@openbsd.org <jmc@openbsd.org>
790Date: Fri Apr 3 05:53:52 2020 +0000
791
792 upstream: sort -N and add it to usage();
793
794 OpenBSD-Commit-ID: 5b00e8db37c2b0a54c7831fed9e5f4db53ada332
795
796commit 338ccee1e7fefa47f3d128c2541e94c5270abe0c
797Author: djm@openbsd.org <djm@openbsd.org>
798Date: Fri Apr 3 05:48:57 2020 +0000
799
800 upstream: avoid another compiler warning spotted in -portable
801
802 OpenBSD-Commit-ID: 1d29c51ac844b287c4c8bcaf04c63c7d9ba3b8c7
803
804commit 9f8a42340bd9af86a99cf554dc39ecdf89287544
805Author: djm@openbsd.org <djm@openbsd.org>
806Date: Fri Apr 3 04:07:48 2020 +0000
807
808 upstream: this needs utf8.c too
809
810 OpenBSD-Regress-ID: 445040036cec714d28069a20da25553a04a28451
811
812commit 92115ea7c3a834374720c350841fc729e7d5c8b2
813Author: dtucker@openbsd.org <dtucker@openbsd.org>
814Date: Fri Apr 3 03:14:03 2020 +0000
815
816 upstream: Add percent_expand test for 'Match Exec'.
817
818 OpenBSD-Regress-ID: a41c14fd6a0b54d66aa1e9eebfb9ec962b41232f
819
820commit de34a440276ae855c38deb20f926d46752c62c9d
821Author: djm@openbsd.org <djm@openbsd.org>
822Date: Fri Apr 3 04:43:24 2020 +0000
823
824 upstream: fix format string (use %llu for uint64, not %lld). spotted by
825
826 Darren and his tinderbox tests
827
828 OpenBSD-Commit-ID: 3b4587c3d9d46a7be9bdf028704201943fba96c2
829
830commit 9cd40b829a5295cc81fbea8c7d632b2478db6274
831Author: djm@openbsd.org <djm@openbsd.org>
832Date: Fri Apr 3 04:34:15 2020 +0000
833
834 upstream: Add a flag to re-enable verbose output when in batch
835
836 mode; requested in bz3135; ok dtucker
837
838 OpenBSD-Commit-ID: 5ad2ed0e6440562ba9c84b666a5bbddc1afe2e2b
839
840commit 6ce51a5da5d333a44e7c74c027f3571f70c39b24
841Author: djm@openbsd.org <djm@openbsd.org>
842Date: Fri Apr 3 04:32:21 2020 +0000
843
844 upstream: chacha20-poly1305 AEAD using libcrypto EVP_chacha20
845
846 Based on patch from Yuriy M. Kaminskiy. ok + lots of assistance along the
847 way at a2k20 tb@
848
849 OpenBSD-Commit-ID: 5e08754c13d31258bae6c5e318cc96219d6b10f0
850
851commit eba523f0a130f1cce829e6aecdcefa841f526a1a
852Author: djm@openbsd.org <djm@openbsd.org>
853Date: Fri Apr 3 04:27:03 2020 +0000
854
855 upstream: make Chacha20-POLY1305 context struct opaque; ok tb@ as
856
857 part of a larger diff at a2k20
858
859 OpenBSD-Commit-ID: a4609b7263284f95c9417ef60ed7cdbb7bf52cfd
860
861commit ebd29e90129cf18fedfcfe1de86e324228669295
862Author: djm@openbsd.org <djm@openbsd.org>
863Date: Fri Apr 3 04:06:26 2020 +0000
864
865 upstream: fix debug statement
866
867 OpenBSD-Commit-ID: 42c6edeeda5ce88b51a20d88c93be3729ce6b916
868
869commit 7b4d8999f2e1a0cb7b065e3efa83e6edccfc7d82
870Author: djm@openbsd.org <djm@openbsd.org>
871Date: Fri Apr 3 04:03:51 2020 +0000
872
873 upstream: the tunnel-forwarding vs ExitOnForwardFailure fix that I
874
875 committed earlier had an off-by-one. Fix this and add some debugging that
876 would have made it apparent sooner.
877
878 OpenBSD-Commit-ID: 082f8f72b1423bd81bbdad750925b906e5ac6910
879
880commit eece243666d44ceb710d004624c5c7bdc05454bc
881Author: dtucker@openbsd.org <dtucker@openbsd.org>
882Date: Fri Apr 3 03:12:11 2020 +0000
883
884 upstream: %C expansion just added to Match Exec should include
885
886 remote user not local user.
887
888 OpenBSD-Commit-ID: 80f1d976938f2a55ee350c11d8b796836c8397e2
889
890commit d5318a784d016478fc8da90a38d9062c51c10432
891Author: dtucker@openbsd.org <dtucker@openbsd.org>
892Date: Fri Apr 3 02:33:31 2020 +0000
893
894 upstream: Add regression test for percent expansions where possible.
895
896 OpenBSD-Regress-ID: 7283be8b2733ac1cbefea3048a23d02594485288
897
898commit 663e84bb53de2a60e56a44d538d25b8152b5c1cc
899Author: djm@openbsd.org <djm@openbsd.org>
900Date: Fri Apr 3 02:40:32 2020 +0000
901
902 upstream: make failures when establishing "Tunnel" forwarding terminate
903
904 the connection when ExitOnForwardFailure is enabled; bz3116; ok dtucker
905
906 OpenBSD-Commit-ID: ef4b4808de0a419c17579b1081da768625c1d735
907
908commit ed833da176611a39d3376d62154eb88eb440d31c
909Author: dtucker@openbsd.org <dtucker@openbsd.org>
910Date: Fri Apr 3 02:27:12 2020 +0000
911
912 upstream: Make with config keywords support which
913
914 percent_expansions more consistent. - %C is moved into its own function and
915 added to Match Exec. - move the common (global) options into a macro. This
916 is ugly but it's the least-ugly way I could come up with. - move
917 IdentityAgent and ForwardAgent percent expansion to before the config dump
918 to make it regression-testable. - document all of the above
919
920 ok jmc@ for man page bits, "makes things less terrible" djm@ for the rest.
921
922 OpenBSD-Commit-ID: 4b65664bd6d8ae2a9afaf1a2438ddd1b614b1d75
923
924commit 6ec7457171468da2bbd908b8cd63d298b0e049ea
925Author: djm@openbsd.org <djm@openbsd.org>
926Date: Fri Apr 3 02:26:56 2020 +0000
927
928 upstream: give ssh-keygen the ability to dump the contents of a
929
930 binary key revocation list: ssh-keygen -lQf /path bz#3132; ok dtucker
931
932 OpenBSD-Commit-ID: b76afc4e3b74ab735dbde4e5f0cfa1f02356033b
933
934commit af628b8a6c3ef403644d83d205c80ff188c97f0c
935Author: djm@openbsd.org <djm@openbsd.org>
936Date: Fri Apr 3 02:25:21 2020 +0000
937
938 upstream: add allocating variant of the safe utf8 printer; ok
939
940 dtucker as part of a larger diff
941
942 OpenBSD-Commit-ID: 037e2965bd50eacc2ffb49889ecae41552744fa0
943
944commit d8ac9af645f5519ac5211e9e1e4dc1ed00e9cced
945Author: dtucker@openbsd.org <dtucker@openbsd.org>
946Date: Mon Mar 16 02:17:02 2020 +0000
947
948 upstream: Cast lifetime to u_long for comparison to prevent unsigned
949
950 comparison warning on 32bit arches. Spotted by deraadt, ok djm.
951
952 OpenBSD-Commit-ID: 7a75b2540bff5ab4fa00b4d595db1df13bb0515a
953
954commit 0eaca933ae08b0a515edfccd5cc4a6b667034813
955Author: Darren Tucker <dtucker@dtucker.net>
956Date: Sat Mar 14 20:58:46 2020 +1100
957
958 Include fido.h when checking for fido/credman.h.
959
960 It's required for fido_dev_t, otherwise configure fails with
961 when given --with-security-key-builtin.
962
963commit c7c099060f82ffe6a36d8785ecf6052e12fd92f0
964Author: djm@openbsd.org <djm@openbsd.org>
965Date: Fri Mar 13 03:18:45 2020 +0000
966
967 upstream: some more speeling mistakes from
968
969 OpenBSD-Regress-ID: 02471c079805471c546b7a69d9ab1d34e9a57443
970
971commit 1d89232a4aa97fe935cd60b8d24d75c2f70d56c5
972Author: djm@openbsd.org <djm@openbsd.org>
973Date: Fri Mar 13 04:16:27 2020 +0000
974
975 upstream: improve error messages for some common PKCS#11 C_Login
976
977 failure cases; based on patch from Jacob Hoffman-Andrews in bz3130; ok
978 dtucker
979
980 OpenBSD-Commit-ID: b8b849621b4a98e468942efd0a1c519c12ce089e
981
982commit 5becbec023f2037394987f85ed7f74b9a28699e0
983Author: djm@openbsd.org <djm@openbsd.org>
984Date: Fri Mar 13 04:01:56 2020 +0000
985
986 upstream: use sshpkt_fatal() for kex_exchange_identification()
987
988 errors. This ensures that the logged errors are consistent with other
989 transport- layer errors and that the relevant IP addresses are logged. bz3129
990 ok dtucker@
991
992 OpenBSD-Commit-ID: 2c22891f0b9e1a6cd46771cedbb26ac96ec2e6ab
993
994commit eef88418f9e5e51910af3c5b23b5606ebc17af55
995Author: dtucker@openbsd.org <dtucker@openbsd.org>
996Date: Fri Mar 13 03:24:49 2020 +0000
997
998 upstream: Don't clear alarm timers in listening sshd. Previously
999
1000 these timers were used for regenerating the SSH1 ephemeral host keys but
1001 those are now gone so there's no need to clear the timers either. ok
1002 deraadt@
1003
1004 OpenBSD-Commit-ID: 280d2b885e4a1ce404632e8cc38fcb17be7dafc0
1005
1006commit d081f017c20a3564255873ed99fd7d024cac540f
1007Author: djm@openbsd.org <djm@openbsd.org>
1008Date: Fri Mar 13 03:17:07 2020 +0000
1009
1010 upstream: spelling errors in comments; no code change from
1011
1012 OpenBSD-Commit-ID: 166ea64f6d84f7bac5636dbd38968592cb5eb924
1013
1014commit c084a2d040f160bc2b83f13297e3e3ca3f5dbac6
1015Author: djm@openbsd.org <djm@openbsd.org>
1016Date: Fri Mar 13 03:12:17 2020 +0000
1017
1018 upstream: when downloading FIDO2 resident keys from a token, don't
1019
1020 prompt for a PIN until the token has told us that it needs one. Avoids
1021 double-prompting on devices that implement on-device authentication (e.g. a
1022 touchscreen PIN pad on the Trezor Model T). ok dtucker@
1023
1024 OpenBSD-Commit-ID: 38b78903dd4422d7d3204095a31692fb69130817
1025
1026commit 955c4cf4c6a1417c28d4e1040702c4d9bf63645b
1027Author: Damien Miller <djm@mindrot.org>
1028Date: Fri Mar 13 14:30:16 2020 +1100
1029
1030 sync fnmatch.c with upstream to fix another typo
1031
1032commit 397f217e8640e75bb719a8e87111b4bd848fb3df
1033Author: Damien Miller <djm@mindrot.org>
1034Date: Fri Mar 13 14:24:23 2020 +1100
1035
1036 another spelling error in comment
1037
1038commit def31bc5427579ec3f7f2ce99f2da1338fdc0c9f
1039Author: Damien Miller <djm@mindrot.org>
1040Date: Fri Mar 13 14:23:07 2020 +1100
1041
1042 spelling mistakes
1043
1044 from https://fossies.org/linux/misc/openssh-8.2p1.tar.gz/codespell.html
1045
1046commit 8bdc3bb7cf4c82c3344cfcb82495a43406e87e83
1047Author: markus@openbsd.org <markus@openbsd.org>
1048Date: Fri Mar 6 18:29:54 2020 +0000
1049
1050 upstream: fix relative includes in sshd_config; ok djm
1051
1052 OpenBSD-Commit-ID: fa29b0da3c93cbc3a1d4c6bcd58af43c00ffeb5b
1053
1054commit e32ef97a56ae03febfe307688858badae3a70e5a
1055Author: markus@openbsd.org <markus@openbsd.org>
1056Date: Fri Mar 6 18:29:14 2020 +0000
1057
1058 upstream: fix use-after-free in do_download_sk; ok djm
1059
1060 OpenBSD-Commit-ID: 96b49623d297797d4fc069f1f09e13c8811f8863
1061
1062commit 5732d58020309364bf31fa125354e399361006db
1063Author: markus@openbsd.org <markus@openbsd.org>
1064Date: Fri Mar 6 18:28:50 2020 +0000
1065
1066 upstream: do not leak oprincipals; ok djm
1067
1068 OpenBSD-Commit-ID: 4691d9387eab36f8fda48f5d8009756ed13a7c4c
1069
1070commit 8fae395f34c2c52cdaf9919aa261d1848b4bb00b
1071Author: markus@openbsd.org <markus@openbsd.org>
1072Date: Fri Mar 6 18:28:27 2020 +0000
1073
1074 upstream: initialize seconds for debug message; ok djm
1075
1076 OpenBSD-Commit-ID: 293fbefe6d00b4812a180ba02e26170e4c855b81
1077
1078commit 46e5c4c8ffcd1569bcd5d04803abaa2ecf3e4cff
1079Author: markus@openbsd.org <markus@openbsd.org>
1080Date: Fri Mar 6 18:27:50 2020 +0000
1081
1082 upstream: correct return code; ok djm
1083
1084 OpenBSD-Commit-ID: 319d09e3b7f4b2bc920c67244d9ff6426b744810
1085
1086commit 31c39e7840893f1bfdcbe4f813b20d1d7e69ec3e
1087Author: markus@openbsd.org <markus@openbsd.org>
1088Date: Fri Mar 6 18:27:15 2020 +0000
1089
1090 upstream: principalsp is optional, pubkey required; ok djm
1091
1092 OpenBSD-Commit-ID: 2cc3ea5018c28ed97edaccd7f17d2cc796f01024
1093
1094commit e26a31757c5df2f58687cb9a4853d1418f39728e
1095Author: markus@openbsd.org <markus@openbsd.org>
1096Date: Fri Mar 6 18:26:21 2020 +0000
1097
1098 upstream: remove unused variables in ssh-pkcs11-helper; ok djm
1099
1100 OpenBSD-Commit-ID: 13e572846d0d1b28f1251ddd2165e9cf18135ae1
1101
1102commit 1b378c0d982d6ab522eda634b0e88cf1fca5e352
1103Author: markus@openbsd.org <markus@openbsd.org>
1104Date: Fri Mar 6 18:25:48 2020 +0000
1105
1106 upstream: return correct error in sshsk_ed25519_sig; ok djm
1107
1108 OpenBSD-Commit-ID: 52bf733df220303c260fee4f165ec64b4a977625
1109
1110commit fbff605e637b068061ab6784ff03e3874890c092
1111Author: markus@openbsd.org <markus@openbsd.org>
1112Date: Fri Mar 6 18:25:12 2020 +0000
1113
1114 upstream: fix possible null-deref in check_key_not_revoked; ok
1115
1116 djm
1117
1118 OpenBSD-Commit-ID: 80855e9d7af42bb6fcc16c074ba69876bfe5e3bf
1119
1120commit bc30b446841fc16e50ed6e75c56ccfbd37b9f281
1121Author: markus@openbsd.org <markus@openbsd.org>
1122Date: Fri Mar 6 18:24:39 2020 +0000
1123
1124 upstream: ssh_fetch_identitylist() returns the return value from
1125
1126 ssh_request_reply() so we should also check against != 0 ok djm
1127
1128 OpenBSD-Commit-ID: 28d0028769d03e665688c61bb5fd943e18614952
1129
1130commit 7b4f70ddeb59f35283d77d8d9c834ca58f8cf436
1131Author: markus@openbsd.org <markus@openbsd.org>
1132Date: Fri Mar 6 18:23:17 2020 +0000
1133
1134 upstream: sshkey_cert_check_authority requires reason to be set;
1135
1136 ok djm
1137
1138 OpenBSD-Commit-ID: 6f7a6f19540ed5749763c2f9530c0897c94aa552
1139
1140commit 05efe270df1e925db0af56a806d18b5063db4b6d
1141Author: markus@openbsd.org <markus@openbsd.org>
1142Date: Fri Mar 6 18:21:28 2020 +0000
1143
1144 upstream: passphrase depends on kdfname, not ciphername (possible
1145
1146 null-deref); ok djm
1147
1148 OpenBSD-Commit-ID: 0d39668edf5e790b5837df4926ee1141cec5471c
1149
1150commit 1ddf5682f3992bdacd29164891abb71a19c2cf61
1151Author: markus@openbsd.org <markus@openbsd.org>
1152Date: Fri Mar 6 18:20:44 2020 +0000
1153
1154 upstream: consistently check packet_timeout_ms against 0; ok djm
1155
1156 OpenBSD-Commit-ID: e8fb8cb2c96c980f075069302534eaf830929928
1157
1158commit 31f1ee54968ad84eb32375e4412e0318766b586b
1159Author: markus@openbsd.org <markus@openbsd.org>
1160Date: Fri Mar 6 18:20:02 2020 +0000
1161
1162 upstream: initialize cname in case ai_canonname is NULL or too
1163
1164 long; ok djm
1165
1166 OpenBSD-Commit-ID: c27984636fdb1035d1642283664193e91aab6e37
1167
1168commit a6134b02b5264b2611c8beae98bb392329452bba
1169Author: markus@openbsd.org <markus@openbsd.org>
1170Date: Fri Mar 6 18:19:21 2020 +0000
1171
1172 upstream: fix uninitialized pointers for forward_cancel; ok djm
1173
1174 OpenBSD-Commit-ID: 612778e6d87ee865d0ba97d0a335f141cee1aa37
1175
1176commit 16d4f9961c75680aab374dee762a5baa0ad507af
1177Author: markus@openbsd.org <markus@openbsd.org>
1178Date: Fri Mar 6 18:16:21 2020 +0000
1179
1180 upstream: exit on parse failures in input_service_request; ok djm
1181
1182 OpenBSD-Commit-ID: 6a7e1bfded26051d5aa893c030229b1ee6a0d5d2
1183
1184commit 5f25afe5216ba7f8921e04f79aa4ca0624eca820
1185Author: markus@openbsd.org <markus@openbsd.org>
1186Date: Fri Mar 6 18:15:38 2020 +0000
1187
1188 upstream: fix null-deref on calloc failure; ok djm
1189
1190 OpenBSD-Commit-ID: a313519579b392076b7831ec022dfdefbec8724a
1191
1192commit ff2acca039aef16a15fce409163df404858f7aa5
1193Author: markus@openbsd.org <markus@openbsd.org>
1194Date: Fri Mar 6 18:15:04 2020 +0000
1195
1196 upstream: exit if ssh_krl_revoke_key_sha256 fails; ok djm
1197
1198 OpenBSD-Commit-ID: 0864ad4fe8bf28ab21fd1df766e0365c11bbc0dc
1199
1200commit 31c860a0212af2d5b6a129e3e8fcead51392ee1d
1201Author: markus@openbsd.org <markus@openbsd.org>
1202Date: Fri Mar 6 18:14:13 2020 +0000
1203
1204 upstream: pkcs11_register_provider: return < 0 on error; ok djm
1205
1206 OpenBSD-Commit-ID: cfc8321315b787e4d40da4bdb2cbabd4154b0d97
1207
1208commit 15be29e1e3318737b0768ca37d5b4a3fbe868ef0
1209Author: markus@openbsd.org <markus@openbsd.org>
1210Date: Fri Mar 6 18:13:29 2020 +0000
1211
1212 upstream: sshsig: return correct error, fix null-deref; ok djm
1213
1214 OpenBSD-Commit-ID: 1d1af7cd538b8b23e621cf7ab84f11e7a923edcd
1215
1216commit 6fb6f186cb62a6370fba476b6a03478a1e95c30d
1217Author: markus@openbsd.org <markus@openbsd.org>
1218Date: Fri Mar 6 18:12:55 2020 +0000
1219
1220 upstream: vasnmprintf allocates str and returns -1; ok djm
1221
1222 OpenBSD-Commit-ID: dae4c9e83d88471bf3b3f89e3da7a107b44df11c
1223
1224commit 714e1cbca17daa13f4f98978cf9e0695d4b2e0a4
1225Author: markus@openbsd.org <markus@openbsd.org>
1226Date: Fri Mar 6 18:11:10 2020 +0000
1227
1228 upstream: sshpkt_fatal() does not return; ok djm
1229
1230 OpenBSD-Commit-ID: 7dfe847e28bd78208eb227b37f29f4a2a0929929
1231
1232commit 9b47bd7b09d191991ad9e0506bb66b74bbc93d34
1233Author: djm@openbsd.org <djm@openbsd.org>
1234Date: Fri Feb 28 01:07:28 2020 +0000
1235
1236 upstream: no-touch-required certificate option should be an
1237
1238 extension, not a critical option.
1239
1240 OpenBSD-Commit-ID: 626b22c5feb7be8a645e4b9a9bef89893b88600d
1241
1242commit dd992520bed35387fc010239abe1bdc0c2665e38
1243Author: djm@openbsd.org <djm@openbsd.org>
1244Date: Fri Feb 28 01:06:05 2020 +0000
1245
1246 upstream: better error message when trying to use a FIDO key
1247
1248 function and SecurityKeyProvider is empty
1249
1250 OpenBSD-Commit-ID: e56602c2ee8c82f835d30e4dc8ee2e4a7896be24
1251
1252commit b81e66dbe0345aef4717911abcb4f589fff33a0a
1253Author: dtucker@openbsd.org <dtucker@openbsd.org>
1254Date: Thu Feb 27 02:32:37 2020 +0000
1255
1256 upstream: Drop leading space from line count that was confusing
1257
1258 ssh-keygen's screen mode.
1259
1260 OpenBSD-Commit-ID: 3bcae7a754db3fc5ad3cab63dd46774edb35b8ae
1261
1262commit d5ba1c03278eb079438bb038266d80d7477d49cb
1263Author: jsg@openbsd.org <jsg@openbsd.org>
1264Date: Wed Feb 26 13:40:09 2020 +0000
1265
1266 upstream: change explicit_bzero();free() to freezero()
1267
1268 While freezero() returns early if the pointer is NULL the tests for
1269 NULL in callers are left to avoid warnings about passing an
1270 uninitialised size argument across a function boundry.
1271
1272 ok deraadt@ djm@
1273
1274 OpenBSD-Commit-ID: 2660fa334fcc7cd05ec74dd99cb036f9ade6384a
1275
1276commit 9e3220b585c5be19a7431ea4ff8884c137b3a81c
1277Author: dtucker@openbsd.org <dtucker@openbsd.org>
1278Date: Wed Feb 26 11:46:51 2020 +0000
1279
1280 upstream: Have sftp reject "-1" in the same way as ssh(1) and
1281
1282 scp(1) do instead of accepting and silently ignoring it since protocol 1
1283 support has been removed. Spotted by shivakumar2696 at gmail.com, ok
1284 deraadt@
1285
1286 OpenBSD-Commit-ID: b79f95559a1c993214f4ec9ae3c34caa87e9d5de
1287
1288commit ade8e67bb0f07b12e5e47e7baeafbdc898de639f
1289Author: dtucker@openbsd.org <dtucker@openbsd.org>
1290Date: Wed Feb 26 01:31:47 2020 +0000
1291
1292 upstream: Remove obsolete XXX comment. ok deraadt@
1293
1294 OpenBSD-Commit-ID: bc462cc843947feea26a2e21c750b3a7469ff01b
1295
1296commit 7eb903f51eba051d7f65790bab92a28970ac1ccc
1297Author: dtucker@openbsd.org <dtucker@openbsd.org>
1298Date: Mon Feb 24 04:27:58 2020 +0000
1299
1300 upstream: Fix typo. Patch from itoama at live.jp via github PR#173.
1301
1302 OpenBSD-Commit-ID: 5cdaafab38bbdea0d07e24777d00bfe6f972568a
1303
1304commit b2491c289dd1b557a18a2aca04eeff5c157fc5ef
1305Author: Nico Kadel-Garcia <nkadel@gmail.com>
1306Date: Sat Oct 12 17:51:01 2019 -0400
1307
1308 Switch %define to %global for redhat/openssh.spec
1309
1310commit b18dcf6cca7c7aba1cc22e668e04492090ef0255
1311Author: mkontani <itoama@live.jp>
1312Date: Fri Feb 21 00:54:49 2020 +0900
1313
1314 fix some typos and sentence
1315
1316commit 0001576a096f788d40c2c0a39121cff51bf961ad
1317Author: dtucker@openbsd.org <dtucker@openbsd.org>
1318Date: Fri Feb 21 00:04:43 2020 +0000
1319
1320 upstream: Fix some typos and an incorrect word in docs. Patch from
1321
1322 itoama at live.jp via github PR#172.
1323
1324 OpenBSD-Commit-ID: 166ee8f93a7201fef431b9001725ab8b269d5874
1325
1326commit 99ff8fefe4b2763a53778d06b5f74443c8701615
1327Author: dtucker@openbsd.org <dtucker@openbsd.org>
1328Date: Thu Feb 20 05:58:08 2020 +0000
1329
1330 upstream: Update moduli generation script to new ssh-keygen
1331
1332 generation and screening command line flags.
1333
1334 OpenBSD-Commit-ID: 5010ff08f7ad92082e87dde098b20f5c24921a8f
1335
1336commit 700d16f5e534d6de5a3b7105a74a7a6f4487b681
1337Author: dtucker@openbsd.org <dtucker@openbsd.org>
1338Date: Thu Feb 20 05:41:51 2020 +0000
1339
1340 upstream: Import regenerated moduli.
1341
1342 OpenBSD-Commit-ID: 7b7b619c1452a459310b0cf4391c5757c6bdbc0f
1343
1344commit 4753b74ba0f09e4aacdaab5e184cd540352004d5
1345Author: Darren Tucker <dtucker@dtucker.net>
1346Date: Thu Feb 20 16:42:50 2020 +1100
1347
1348 Import regenerated moduli.
1349
1350commit 11d427162778c18fa42917893a75d178679a2389
1351Author: HARUYAMA Seigo <haruyama@unixuser.org>
1352Date: Fri Feb 14 16:14:23 2020 +0900
1353
1354 Fix typos in INSTALL: s/avilable/available/ s/suppports/supports/
1355
1356commit 264a966216137c9f4f8220fd9142242d784ba059
1357Author: dtucker@openbsd.org <dtucker@openbsd.org>
1358Date: Tue Feb 18 08:58:33 2020 +0000
1359
1360 upstream: Ensure that the key lifetime provided fits within the
1361
1362 values allowed by the wire format (u32). Prevents integer wraparound of the
1363 timeout values. bz#3119, ok markus@ djm@
1364
1365 OpenBSD-Commit-ID: 8afe6038b5cdfcf63360788f012a7ad81acc46a2
1366
1367commit de1f3564cd85915b3002859873a37cb8d31ac9ce
1368Author: dtucker@openbsd.org <dtucker@openbsd.org>
1369Date: Tue Feb 18 08:49:49 2020 +0000
1370
1371 upstream: Detect and prevent simple configuration loops when using
1372
1373 ProxyJump. bz#3057, ok djm@
1374
1375 OpenBSD-Commit-ID: 077d21c564c886c98309d871ed6f8ef267b9f037
1376
1377commit 30144865bfa06b12239cfabc37c45e5ddc369d97
1378Author: naddy@openbsd.org <naddy@openbsd.org>
1379Date: Sun Feb 16 21:15:43 2020 +0000
1380
1381 upstream: document -F none; with jmc@
1382
1383 OpenBSD-Commit-ID: 0eb93b75473d2267aae9200e02588e57778c84f2
1384
1385commit 011052de73f3dbc53f50927ccf677266a9ade4f6
1386Author: Darren Tucker <dtucker@dtucker.net>
1387Date: Mon Feb 17 22:55:51 2020 +1100
1388
1389 Remove unused variable warning.
1390
1391commit 31c9348c5e4e94e9913ec64b3ca6e15f68ba19e5
1392Author: Darren Tucker <dtucker@dtucker.net>
1393Date: Mon Feb 17 22:53:24 2020 +1100
1394
1395 Constify aix_krb5_get_principal_name.
1396
1397 Prevents warning about discarding type qualifiers on AIX.
1398
1399commit 290c994336a2cfe03c5496bebb6580863f94b232
1400Author: Darren Tucker <dtucker@dtucker.net>
1401Date: Mon Feb 17 22:51:36 2020 +1100
1402
1403 Check if TILDE is already defined and undef.
1404
1405 Prevents redefinition warning on AIX.
1406
1407commit 41a2e64ae480eda73ee0e809bbe743d203890938
1408Author: Darren Tucker <dtucker@dtucker.net>
1409Date: Mon Feb 17 22:51:00 2020 +1100
1410
1411 Prevent unused variable warning.
1412
1413commit d4860ec4efd25ba194337082736797fce0bda016
1414Author: Darren Tucker <dtucker@dtucker.net>
1415Date: Mon Feb 17 22:48:50 2020 +1100
1416
1417 Check if getpeereid is actually declared.
1418
1419 Check in sys/socket.h (AIX) and unistd.h (FreeBSD, DragonFLy and OS X).
1420 Prevents undeclared function warning on at least some versions of AIX.
1421
1422commit 8aa3455b16fddea4c0144a7c4a1edb10ec67dcc8
1423Author: djm@openbsd.org <djm@openbsd.org>
1424Date: Fri Feb 14 00:39:20 2020 +0000
1425
1426 upstream: openssh-8.2
1427
1428 OpenBSD-Commit-ID: 0a1340ff65fad0d84b997ac58dd1b393dec7c19b
1429
1430commit 72f0ce33f0d5a37f31bad5800d1eb2fbdb732de6
1431Author: Damien Miller <djm@mindrot.org>
1432Date: Wed Feb 12 09:28:35 2020 +1100
1433
1434 crank version numbers
1435
1436commit b763ed05bd1f1f15ae1727c86a4498546bc36ca8
1437Author: Darren Tucker <dtucker@dtucker.net>
1438Date: Tue Feb 11 12:51:24 2020 +1100
1439
1440 Minor documentation update:
1441
1442 - remove duplication of dependency information (it's all in INSTALL).
1443 - SSHFP is now an RFC.
1444
1445commit 14ccfdb7248e33b1dc8bbac1425ace4598e094cb
1446Author: Darren Tucker <dtucker@dtucker.net>
1447Date: Sun Feb 9 11:23:35 2020 +1100
1448
1449 Check if UINT32_MAX is defined before redefining.
1450
1451commit be075110c735a451fd9d79a864e01e2e0d9f19d2
1452Author: Damien Miller <djm@mindrot.org>
1453Date: Fri Feb 7 15:07:27 2020 +1100
1454
1455 typo; reported by Phil Pennock
1456
1457commit 963d71851e727ffdd2a97fe0898fad61d4a70ba1
1458Author: djm@openbsd.org <djm@openbsd.org>
1459Date: Fri Feb 7 03:57:31 2020 +0000
1460
1461 upstream: sync the description of the $SSH_SK_PROVIDER environment
1462
1463 variable with that of the SecurityKeyProvider ssh/sshd_config(5) directive,
1464 as the latter was more descriptive.
1465
1466 OpenBSD-Commit-ID: 0488f09530524a7e53afca6b6e1780598022552f
1467
1468commit d4d9e1d40514e2746f9e05335d646512ea1020c6
1469Author: dtucker@openbsd.org <dtucker@openbsd.org>
1470Date: Fri Feb 7 03:54:44 2020 +0000
1471
1472 upstream: Add ssh -Q key-sig for all key and signature types.
1473
1474 Teach ssh -Q to accept ssh_config(5) and sshd_config(5) algorithm keywords as
1475 an alias for the corresponding query. Man page help jmc@, ok djm@.
1476
1477 OpenBSD-Commit-ID: 1e110aee3db2fc4bc5bee2d893b7128fd622e0f8
1478
1479commit fd68dc27864b099b552a6d9d507ca4b83afd6a76
1480Author: djm@openbsd.org <djm@openbsd.org>
1481Date: Fri Feb 7 03:27:54 2020 +0000
1482
1483 upstream: fix two PIN entry bugs on FIDO keygen: 1) it would allow more
1484
1485 than the intended number of prompts (3) and 2) it would SEGV too many
1486 incorrect PINs were entered; based on patch by Gabriel Kihlman
1487
1488 OpenBSD-Commit-ID: 9c0011f28ba8bd8adf2014424b64960333da1718
1489
1490commit 96bd895a0a0b3a36f81c14db8c91513578fc5563
1491Author: djm@openbsd.org <djm@openbsd.org>
1492Date: Thu Feb 6 22:48:23 2020 +0000
1493
1494 upstream: When using HostkeyAlgorithms to merely append or remove
1495
1496 algorithms from the default set (i.e. HostkeyAlgorithms=+/-...), retain the
1497 default behaviour of preferring those algorithms that have existing keys in
1498 known_hosts; ok markus
1499
1500 OpenBSD-Commit-ID: 040e7fcc38ea00146b5d224ce31ce7a1795ee6ed
1501
1502commit c7288486731734a864b58d024b1395029b55bbc5
1503Author: djm@openbsd.org <djm@openbsd.org>
1504Date: Thu Feb 6 22:46:31 2020 +0000
1505
1506 upstream: expand HostkeyAlgorithms prior to config dump, matching
1507
1508 other algorithm lists; ok markus@
1509
1510 OpenBSD-Commit-ID: a66f0fca8cc5ce30405a2867bc115fff600671d0
1511
1512commit a6ac5d36efc072b15690c65039754f8e44247bdf
1513Author: naddy@openbsd.org <naddy@openbsd.org>
1514Date: Thu Feb 6 22:34:58 2020 +0000
1515
1516 upstream: Add Include to the list of permitted keywords after a
1517
1518 Match keyword. ok markus@
1519
1520 OpenBSD-Commit-ID: 342e940538b13dd41e0fa167dc9ab192b9f6e2eb
1521
1522commit a47f6a6c0e06628eed0c2a08dc31a8923bcc37ba
1523Author: naddy@openbsd.org <naddy@openbsd.org>
1524Date: Thu Feb 6 22:30:54 2020 +0000
1525
1526 upstream: Replace "security key" with "authenticator" in program
1527
1528 messages.
1529
1530 This replaces "security key" in error/usage/verbose messages and
1531 distinguishes between "authenticator" and "authenticator-hosted key".
1532
1533 ok djm@
1534
1535 OpenBSD-Commit-ID: 7c63800e9c340c59440a054cde9790a78f18592e
1536
1537commit 849a9b87144f8a5b1771de6c85e44bfeb86be9a9
1538Author: Darren Tucker <dtucker@dtucker.net>
1539Date: Thu Feb 6 11:28:14 2020 +1100
1540
1541 Don't look for UINT32_MAX in inttypes.h
1542
1543 ... unless we are actually going to use it. Fixes build on HP-UX
1544 without the potential impact to other platforms of a header change
1545 shortly before release.
1546
1547commit a2437f8ed0c3be54ddd21630a93c68ebd168286f
1548Author: Damien Miller <djm@mindrot.org>
1549Date: Thu Feb 6 12:02:22 2020 +1100
1550
1551 depend
1552
1553commit 9716e8c4956acdd7b223d1642bfa376e07e7503d
1554Author: Michael Forney <mforney@mforney.org>
1555Date: Wed Nov 27 19:17:26 2019 -0800
1556
1557 Fix sha2 MAKE_CLONE no-op definition
1558
1559 The point of the dummy declaration is so that MAKE_CLONE(...) can have
1560 a trailing semicolon without introducing an empty declaration. So,
1561 the macro replacement text should *not* have a trailing semicolon,
1562 just like DEF_WEAK.
1563
1564commit d596b1d30dc158915a3979fa409d21ff2465b6ee
1565Author: djm@openbsd.org <djm@openbsd.org>
1566Date: Tue Feb 4 09:58:04 2020 +0000
1567
1568 upstream: require FIDO application strings to start with "ssh:"; ok
1569
1570 markus@
1571
1572 OpenBSD-Commit-ID: 94e9c1c066d42b76f035a3d58250a32b14000afb
1573
1574commit 501f3582438cb2cb1cb92be0f17be490ae96fb23
1575Author: djm@openbsd.org <djm@openbsd.org>
1576Date: Mon Feb 3 23:47:57 2020 +0000
1577
1578 upstream: revert enabling UpdateHostKeys by default - there are still
1579
1580 corner cases we need to address; ok markus
1581
1582 OpenBSD-Commit-ID: ff7ad941bfdc49fb1d8baa95fd0717a61adcad57
1583
1584commit 072f3b832d2a4db8d9880effcb6c4d0dad676504
1585Author: jmc@openbsd.org <jmc@openbsd.org>
1586Date: Mon Feb 3 08:15:37 2020 +0000
1587
1588 upstream: use better markup for challenge and write-attestation, and
1589
1590 rejig the challenge text a little;
1591
1592 ok djm
1593
1594 OpenBSD-Commit-ID: 9f351e6da9edfdc907d5c3fdaf2e9ff3ab0a7a6f
1595
1596commit 262eb05a22cb1fabc3bc1746c220566490b80229
1597Author: Damien Miller <djm@mindrot.org>
1598Date: Mon Feb 3 21:22:15 2020 +1100
1599
1600 mention libfido2 in dependencies section
1601
1602commit ccd3b247d59d3bde16c3bef0ea888213fbd6da86
1603Author: Damien Miller <djm@mindrot.org>
1604Date: Mon Feb 3 19:40:12 2020 +1100
1605
1606 add clock_gettime64(2) to sandbox allowed syscalls
1607
1608 bz3093
1609
1610commit adffbe1c645ad2887ba0b6d24c194aa7a40c5735
1611Author: dtucker@openbsd.org <dtucker@openbsd.org>
1612Date: Sun Feb 2 09:45:34 2020 +0000
1613
1614 upstream: Output (none) in debug in the case in the CheckHostIP=no case
1615
1616 as suggested by markus@
1617
1618 OpenBSD-Commit-ID: 4ab9117ee5261cbbd1868717fcc3142eea6385cf
1619
1620commit 58c819096a2167983e55ae686486ce317b69b2d1
1621Author: dtucker@openbsd.org <dtucker@openbsd.org>
1622Date: Sun Feb 2 09:22:22 2020 +0000
1623
1624 upstream: Prevent possible null pointer deref of ip_str in debug.
1625
1626 OpenBSD-Commit-ID: 37b252e2e6f690efed6682437ef75734dbc8addf
1627
1628commit 0facae7bc8d3f8f9d02d0f6bed3d163ff7f39806
1629Author: jmc@openbsd.org <jmc@openbsd.org>
1630Date: Sun Feb 2 07:36:50 2020 +0000
1631
1632 upstream: shuffle the challenge keyword to keep the -O list sorted;
1633
1634 OpenBSD-Commit-ID: 08efad608b790949a9a048d65578fae9ed5845fe
1635
1636commit 6fb3dd0ccda1c26b06223b87bcd1cab9ec8ec3cc
1637Author: jmc@openbsd.org <jmc@openbsd.org>
1638Date: Sat Feb 1 06:53:12 2020 +0000
1639
1640 upstream: tweak previous;
1641
1642 OpenBSD-Commit-ID: 0c42851cdc88583402b4ab2b110a6348563626d3
1643
1644commit 92725d4d3fde675acc0ca040b48f3d0c7be73b7f
1645Author: Darren Tucker <dtucker@dtucker.net>
1646Date: Sat Feb 1 17:25:09 2020 +1100
1647
1648 Use sys-queue.h from compat library.
1649
1650 Fixes build on platforms that don't have sys/queue.h (eg MUSL).
1651
1652commit 677d0ece67634262b3b96c3cd6410b19f3a603b7
1653Author: djm@openbsd.org <djm@openbsd.org>
1654Date: Fri Jan 31 23:25:08 2020 +0000
1655
1656 upstream: regress test for sshd_config Include directive; from Jakub
1657
1658 Jelen
1659
1660 OpenBSD-Regress-ID: 0d9224de3297c7a5f51ba68d6e3725a2a9345fa4
1661
1662commit d4f4cdd681ab6408a98419f398b75a55497ed324
1663Author: djm@openbsd.org <djm@openbsd.org>
1664Date: Fri Jan 31 23:13:04 2020 +0000
1665
1666 upstream: whitespace
1667
1668 OpenBSD-Commit-ID: 564cf7a5407ecf5da2d94ec15474e07427986772
1669
1670commit 245399dfb3ecebc6abfc2ef4ee2e650fa9f6942b
1671Author: djm@openbsd.org <djm@openbsd.org>
1672Date: Fri Jan 31 23:11:25 2020 +0000
1673
1674 upstream: force early logging to stderr if debug_flag (-d) is set;
1675
1676 avoids missing messages from re-exec config passing
1677
1678 OpenBSD-Commit-ID: 02484b8241c1f49010e7a543a7098e6910a8c9ff
1679
1680commit 7365f28a66d1c443723fbe6f4a2612ea6002901e
1681Author: djm@openbsd.org <djm@openbsd.org>
1682Date: Fri Jan 31 23:08:08 2020 +0000
1683
1684 upstream: mistake in previous: filling the incorrect buffer
1685
1686 OpenBSD-Commit-ID: 862ee84bd4b97b529f64aec5d800c3dcde952e3a
1687
1688commit c2bd7f74b0e0f3a3ee9d19ac549e6ba89013abaf
1689Author: djm@openbsd.org <djm@openbsd.org>
1690Date: Fri Jan 31 22:42:45 2020 +0000
1691
1692 upstream: Add a sshd_config "Include" directive to allow inclusion
1693
1694 of files. This has sensible semantics wrt Match blocks and accepts glob(3)
1695 patterns to specify the included files. Based on patch by Jakub Jelen in
1696 bz2468; feedback and ok markus@
1697
1698 OpenBSD-Commit-ID: 36ed0e845b872e33f03355b936a4fff02d5794ff
1699
1700commit ba261a1dd33266168ead4f8f40446dcece4d1600
1701Author: jmc@openbsd.org <jmc@openbsd.org>
1702Date: Fri Jan 31 22:25:59 2020 +0000
1703
1704 upstream: spelling fix;
1705
1706 OpenBSD-Commit-ID: 3c079523c4b161725a4b15dd06348186da912402
1707
1708commit 771891a044f763be0711493eca14b6b0082e030f
1709Author: djm@openbsd.org <djm@openbsd.org>
1710Date: Thu Jan 30 22:25:34 2020 +0000
1711
1712 upstream: document changed default for UpdateHostKeys
1713
1714 OpenBSD-Commit-ID: 25c390b21d142f78ac0106241d13441c4265fd2c
1715
1716commit d53a518536c552672c00e8892e2aea28f664148c
1717Author: djm@openbsd.org <djm@openbsd.org>
1718Date: Thu Jan 30 22:19:32 2020 +0000
1719
1720 upstream: enable UpdateKnownHosts=yes if the configuration
1721
1722 specifies only the default known_hosts files, otherwise select
1723 UpdateKnownHosts=ask; ok markus@
1724
1725 OpenBSD-Commit-ID: ab401a5ec4a33d2e1a9449eae6202e4b6d427df7
1726
1727commit bb63ff844e818d188da4fed3c016e0a4eecbbf25
1728Author: Darren Tucker <dtucker@dtucker.net>
1729Date: Thu Jan 30 18:54:42 2020 +1100
1730
1731 Look in inttypes.h for UINT32_MAX.
1732
1733 Should prevent warnings on at least some AIX versions.
1734
1735commit afeb6a960da23f0a5cbc4b80cca107c7504e932a
1736Author: djm@openbsd.org <djm@openbsd.org>
1737Date: Thu Jan 30 07:21:38 2020 +0000
1738
1739 upstream: use sshpkt_fatal() instead of plain fatal() for
1740
1741 ssh_packet_write_poll() failures here too as the former yields better error
1742 messages; ok dtucker@
1743
1744 OpenBSD-Commit-ID: 1f7a6ca95bc2b716c2e948fc1370753be772d8e3
1745
1746commit 65d6fd0a8a6f31c3ddf0c1192429a176575cf701
1747Author: djm@openbsd.org <djm@openbsd.org>
1748Date: Thu Jan 30 07:20:57 2020 +0000
1749
1750 upstream: check the return value of ssh_packet_write_poll() and
1751
1752 call sshpkt_fatal() if it fails; avoid potential busy-loop under some
1753 circumstances. Based on patch by Mike Frysinger; ok dtucker@
1754
1755 OpenBSD-Commit-ID: c79fe5cf4f0cd8074cb6db257c1394d5139408ec
1756
1757commit dce74eab0c0f9010dc84c62500a17771d0131ff3
1758Author: djm@openbsd.org <djm@openbsd.org>
1759Date: Thu Jan 30 07:20:05 2020 +0000
1760
1761 upstream: have sshpkt_fatal() save/restore errno before we
1762
1763 potentially call strerror() (via ssh_err()); ok dtucker
1764
1765 OpenBSD-Commit-ID: 5590df31d21405498c848245b85c24acb84ad787
1766
1767commit 14ef4efe2bf4180e085ea6738fdbebc199458b0c
1768Author: djm@openbsd.org <djm@openbsd.org>
1769Date: Wed Jan 29 08:17:49 2020 +0000
1770
1771 upstream: markus suggests a simplification to previous
1772
1773 OpenBSD-Commit-ID: 10bbfb6607ebbb9a018dcd163f0964941adf58de
1774
1775commit 101ebc3a8cfa78d2e615afffbef9861bbbabf1ff
1776Author: djm@openbsd.org <djm@openbsd.org>
1777Date: Wed Jan 29 07:51:30 2020 +0000
1778
1779 upstream: give more context to UpdateHostKeys messages, mentioning
1780
1781 that the changes are validated by the existing trusted host key. Prompted by
1782 espie@ feedback and ok markus@
1783
1784 OpenBSD-Commit-ID: b3d95f4a45f2692f4143b9e77bb241184dbb8dc5
1785
1786commit 24c0f752adf9021277a7b0a84931bb5fe48ea379
1787Author: djm@openbsd.org <djm@openbsd.org>
1788Date: Tue Jan 28 08:01:34 2020 +0000
1789
1790 upstream: changes to support FIDO attestation
1791
1792 Allow writing to disk the attestation certificate that is generated by
1793 the FIDO token at key enrollment time. These certificates may be used
1794 by an out-of-band workflow to prove that a particular key is held in
1795 trustworthy hardware.
1796
1797 Allow passing in a challenge that will be sent to the card during
1798 key enrollment. These are needed to build an attestation workflow
1799 that resists replay attacks.
1800
1801 ok markus@
1802
1803 OpenBSD-Commit-ID: 457dc3c3d689ba39eed328f0817ed9b91a5f78f6
1804
1805commit 156bef36f93a48212383235bb8e3d71eaf2b2777
1806Author: djm@openbsd.org <djm@openbsd.org>
1807Date: Tue Jan 28 07:24:15 2020 +0000
1808
1809 upstream: disable UpdateHostKeys=ask when in quiet mode; "work for
1810
1811 me" matthieu@
1812
1813 OpenBSD-Commit-ID: 60d7b5eb91accf935ed9852650a826d86db2ddc7
1814
1815commit ec8a759b4045e54d6b38e690ffee4cbffc53c7b7
1816Author: Damien Miller <djm@mindrot.org>
1817Date: Tue Jan 28 12:57:25 2020 +1100
1818
1819 compat for missing IPTOS_DSCP_LE in system headers
1820
1821commit 4594c7627680c4f41c2ad5fe412e55b7cc79b10c
1822Author: djm@openbsd.org <djm@openbsd.org>
1823Date: Tue Jan 28 01:49:36 2020 +0000
1824
1825 upstream: make IPTOS_DSCP_LE available via IPQoS directive; bz2986,
1826
1827 based on patch by veegish AT cyberstorm.mu
1828
1829 OpenBSD-Commit-ID: 9902bf4fbb4ea51de2193ac2b1d965bc5d99c425
1830
1831commit da22216b5db3613325aa7b639f40dc017e4c6f69
1832Author: markus@openbsd.org <markus@openbsd.org>
1833Date: Mon Jan 27 20:51:32 2020 +0000
1834
1835 upstream: disable UpdateHostKeys=ask if command is specified; ok
1836
1837 djm@ sthen@
1838
1839 OpenBSD-Commit-ID: e5bcc45eadb78896637d4143d289f1e42c2ef5d7
1840
1841commit 1e1db0544fdd788e2e3fc21d972a7ccb7de6b4ae
1842Author: djm@openbsd.org <djm@openbsd.org>
1843Date: Sun Jan 26 00:09:50 2020 +0000
1844
1845 upstream: unbreak unittests for recent API / source file changes
1846
1847 OpenBSD-Regress-ID: 075a899a01bbf7781d38bf0b33d8366faaf6d3c0
1848
1849commit 0d1144769151edf65f74aee9a4c8545c37861695
1850Author: Darren Tucker <dtucker@dtucker.net>
1851Date: Sun Jan 26 15:09:15 2020 +1100
1852
1853 Move definition of UINT32_MAX.
1854
1855 This allows us to always define it if needed not just if we also
1856 define the type ourself.
1857
1858commit f73ab8a811bc874c2fb403012aa8e4bfdcaf5ec7
1859Author: djm@openbsd.org <djm@openbsd.org>
1860Date: Sun Jan 26 00:09:50 2020 +0000
1861
1862 upstream: unbreak unittests for recent API / source file changes
1863
1864 OpenBSD-Regress-ID: 075a899a01bbf7781d38bf0b33d8366faaf6d3c0
1865
1866commit 0373f9eba2b63455dceedbd3ac3d5dca306789ff
1867Author: Darren Tucker <dtucker@dtucker.net>
1868Date: Sun Jan 26 14:09:17 2020 +1100
1869
1870 Include signal.h to prevent redefintion of _NSIG.
1871
1872commit 638a45b5c1e20a8539100ca44166caad8abf26f8
1873Author: Darren Tucker <dtucker@dtucker.net>
1874Date: Sun Jan 26 13:40:51 2020 +1100
1875
1876 Wrap stdint.h in tests inside HAVE_STDINT_H.
1877
1878commit 74dfc2c859c906eaab1f88a27fd883115ffb928f
1879Author: djm@openbsd.org <djm@openbsd.org>
1880Date: Sun Jan 26 00:14:45 2020 +0000
1881
1882 upstream: for UpdateHostKeys, don't report errors for unsupported
1883
1884 key types - just ignore them. spotted by and ok dtucker@
1885
1886 OpenBSD-Commit-ID: 91769e443f6197c983932fc8ae9d39948727d473
1887
1888commit b59618246c332e251160be0f1e0e88a7d4e2b0ae
1889Author: djm@openbsd.org <djm@openbsd.org>
1890Date: Sun Jan 26 00:13:20 2020 +0000
1891
1892 upstream: downgrade error() for missing subsequent known_hosts
1893
1894 files to debug() as it was intended to be; spotted by dtucker@
1895
1896 OpenBSD-Commit-ID: 18cfea382cb52f2da761be524e309cc3d5354ef9
1897
1898commit 469df611f778eec5950d556aabfe1d4efc227915
1899Author: djm@openbsd.org <djm@openbsd.org>
1900Date: Sat Jan 25 23:33:27 2020 +0000
1901
1902 upstream: clarify that BatchMode applies to all interactive prompts
1903
1904 (e.g. host key confirmation) and not just password prompts.
1905
1906 OpenBSD-Commit-ID: 97b001883d89d3fb1620d2e6b747c14a26aa9818
1907
1908commit de40876c4a5d7c519d3d7253557572fdfc13db76
1909Author: djm@openbsd.org <djm@openbsd.org>
1910Date: Sat Jan 25 23:28:06 2020 +0000
1911
1912 upstream: tidy headers; some junk snuck into sshbuf-misc.c and
1913
1914 sshbuf-io.c doesn't need SSHBUF_INTERNAL set
1915
1916 OpenBSD-Commit-ID: 27a724d2e0b2619c1a1490f44093bbd73580d9e6
1917
1918commit 6a107606355fa9547884cad6740e6144a7a7955b
1919Author: Damien Miller <djm@mindrot.org>
1920Date: Sun Jan 26 10:28:21 2020 +1100
1921
1922 depend
1923
1924commit 59d01f1d720ebede4da42882f592d1093dac7adc
1925Author: djm@openbsd.org <djm@openbsd.org>
1926Date: Sat Jan 25 23:13:09 2020 +0000
1927
1928 upstream: improve the error message for u2f enrollment errors by
1929
1930 making ssh-keygen be solely responsible for printing the error message and
1931 convertint some more common error responses from the middleware to a useful
1932 ssherr.h status code. more detail remains visible via -v of course.
1933
1934 also remove indepedent copy of sk-api.h declarations in sk-usbhid.c
1935 and just include it.
1936
1937 feedback & ok markus@
1938
1939 OpenBSD-Commit-ID: a4a8ffa870d9a3e0cfd76544bcdeef5c9fb1f1bb
1940
1941commit 99aa8035554ddb976348d2a9253ab3653019728d
1942Author: djm@openbsd.org <djm@openbsd.org>
1943Date: Sat Jan 25 23:02:13 2020 +0000
1944
1945 upstream: factor out reading/writing sshbufs to dedicated
1946
1947 functions; feedback and ok markus@
1948
1949 OpenBSD-Commit-ID: dc09e5f1950b7acc91b8fdf8015347782d2ecd3d
1950
1951commit 065064fcf455778b0918f783033b374d4ba37a92
1952Author: djm@openbsd.org <djm@openbsd.org>
1953Date: Sat Jan 25 22:49:38 2020 +0000
1954
1955 upstream: add a comment describing the ranges of channel IDs that
1956
1957 we use; requested by markus@
1958
1959 OpenBSD-Commit-ID: 83a1f09810ffa3a96a55fbe32675b34ba739e56b
1960
1961commit 69334996ae203c51c70bf01d414c918a44618f8e
1962Author: djm@openbsd.org <djm@openbsd.org>
1963Date: Sat Jan 25 22:41:01 2020 +0000
1964
1965 upstream: make sshd_config:ClientAliveCountMax=0 disable the
1966
1967 connection killing behaviour, rather than killing the connection after
1968 sending the first liveness test probe (regardless of whether the client was
1969 responsive) bz2627; ok markus
1970
1971 OpenBSD-Commit-ID: 5af79c35f4c9fa280643b6852f524bfcd9bccdaf
1972
1973commit bf986a9e2792555e0879a3145fa18d2b49436c74
1974Author: djm@openbsd.org <djm@openbsd.org>
1975Date: Sat Jan 25 22:36:22 2020 +0000
1976
1977 upstream: clarify order of AllowUsers/DenyUsers vs
1978
1979 AllowGroups/DenyGroups; bz1690, ok markus@
1980
1981 OpenBSD-Commit-ID: 5637584ec30db9cf64822460f41b3e42c8f9facd
1982
1983commit 022ce92fa0daa9d78830baeb2bd2dc3f83c724ba
1984Author: djm@openbsd.org <djm@openbsd.org>
1985Date: Sat Jan 25 07:17:18 2020 +0000
1986
1987 upstream: when AddKeysToAgent=yes is set and the key contains no
1988
1989 comment, add the key to the agent with the key's path as the comment. bz2564
1990
1991 OpenBSD-Commit-ID: 8dd8ca9340d7017631a27f4ed5358a4cfddec16f
1992
1993commit 0b813436bbf6546638b10c1fa71f54691bcf5e63
1994Author: tedu@openbsd.org <tedu@openbsd.org>
1995Date: Sat Jan 25 07:09:14 2020 +0000
1996
1997 upstream: group14-sha1 is no longer a default algorithm
1998
1999 OpenBSD-Commit-ID: a96f04d5e9c2ff760c6799579dc44f69b4ff431d
2000
2001commit 3432b6e05d5c583c91c566c5708fed487cec79ac
2002Author: djm@openbsd.org <djm@openbsd.org>
2003Date: Sat Jan 25 07:02:51 2020 +0000
2004
2005 upstream: reword HashKnownHosts description a little more; some
2006
2007 people found the wording confusing (bz#2560)
2008
2009 OpenBSD-Commit-ID: ac30896598694f07d498828690aecd424c496988
2010
2011commit f80d7d6aa98d6eddc5df02412efee6db75673d4c
2012Author: djm@openbsd.org <djm@openbsd.org>
2013Date: Sat Jan 25 07:01:00 2020 +0000
2014
2015 upstream: weaken the language for what HashKnownHosts provides with
2016
2017 regards to known_hosts name privacy, it's not practical for this option to
2018 offer any guarantee that hostnames cannot be recovered from a disclosed
2019 known_hosts file (e.g. by brute force).
2020
2021 OpenBSD-Commit-ID: 13f1e3285f8acf7244e9770074296bcf446c6972
2022
2023commit 846446bf3e7421e6671a4afd074bdf15eecd7832
2024Author: djm@openbsd.org <djm@openbsd.org>
2025Date: Sat Jan 25 06:40:20 2020 +0000
2026
2027 upstream: the GatewayPorts vs -R listen address selection logic is
2028
2029 still confusing people, so add another comment explaining the special
2030 handling of "localhost"; bz#3258
2031
2032 OpenBSD-Commit-ID: e6bf0f0fbf1c7092bf0dbd9c6eab105970b5b53a
2033
2034commit 734f2f83f5ff86f2967a99d67be9ce22dd0394dd
2035Author: djm@openbsd.org <djm@openbsd.org>
2036Date: Sat Jan 25 06:03:10 2020 +0000
2037
2038 upstream: mention that permitopen=/PermitOpen do no name to address
2039
2040 translation; prompted by bz3099
2041
2042 OpenBSD-Commit-ID: 0dda8e54d566b29855e76bebf9cfecce573f5c23
2043
2044commit e1e97cae19ff07b7a7f7e82556bc048c3c54af63
2045Author: Damien Miller <djm@mindrot.org>
2046Date: Sat Jan 25 16:30:22 2020 +1100
2047
2048 include tunnel device path in error message
2049
2050commit 0ecd20bc9f0b9c7c697c9eb014613516c8f65834
2051Author: djm@openbsd.org <djm@openbsd.org>
2052Date: Sat Jan 25 04:48:26 2020 +0000
2053
2054 upstream: unrevert this:
2055
2056 > revision 1.217
2057 > date: 2019/11/27 03:34:04; author: dtucker; state: Exp; lines: +5 -7; commitid: wkiMn49XJyjzoJIs;
2058 > Make channel_id u_int32_t and remove unnecessary check and cast that were
2059 > left over from the type conversion. Noted by t-hashida@amiya.co.jp in
2060 > bz#3098, ok markus@ djm@
2061
2062 Darren was right the first time; ok dtucker@ "agreed" markus@
2063
2064 OpenBSD-Commit-ID: 641dd1b99a6bbd85b7160da462ae1be83432c7c8
2065
2066commit a0c81d2402eedc514b9c9f25ef9604eb0576b86a
2067Author: dtucker@openbsd.org <dtucker@openbsd.org>
2068Date: Sat Jan 25 02:57:53 2020 +0000
2069
2070 upstream: Move setting $NC into test-exec since it's now used by
2071
2072 multiple tests, and in -portable we use our own local copy to avoid
2073 portability problems.
2074
2075 OpenBSD-Regress-ID: ceb78445fcaac317bec2fc51b3f0d9589048c114
2076
2077commit e16dfa94f86358033531c4a97dcb51508ef84d49
2078Author: Darren Tucker <dtucker@dtucker.net>
2079Date: Sat Jan 25 13:05:42 2020 +1100
2080
2081 Put EC key export inside OPENSSL_HAS_ECC.
2082
2083 Fixes link error when building against an OpenSSL that does not have
2084 ECC.
2085
2086commit 94a2e5951b374e1a89761ceaff72e66eb1946807
2087Author: dtucker@openbsd.org <dtucker@openbsd.org>
2088Date: Sat Jan 25 00:27:56 2020 +0000
2089
2090 upstream: Wait a bit longer for the multiplex master to become ready
2091
2092 since on very slow hosts the current delay is not sufficient and the test
2093 will fail.
2094
2095 OpenBSD-Regress-ID: 6d90c7475d67ac3a95610b64af700629ece51a48
2096
2097commit b2df804f571d77b07059f087b90955ffbc2f67d4
2098Author: dtucker@openbsd.org <dtucker@openbsd.org>
2099Date: Fri Jan 24 10:08:17 2020 +0000
2100
2101 upstream: Add a connection test for proxycommand. This would have
2102
2103 caught the problem caused by ssh.c rev 1.507 wherein Host and Hostname were
2104 swapped. Prompted by beck@
2105
2106 OpenBSD-Regress-ID: d218500ae6aca4c479c27318fb5b09ebc00f7aae
2107
2108commit c6f06fd38a257b9fcc7d6760f8fb6d505dccb628
2109Author: djm@openbsd.org <djm@openbsd.org>
2110Date: Sat Jan 25 00:22:31 2020 +0000
2111
2112 upstream: set UpdateKnownHosts=ask by default; bz#2894; ok
2113
2114 markus@
2115
2116 OpenBSD-Commit-ID: f09cb3177f3a14c96428e14f347e976a8a531fee
2117
2118commit 7955633a554397bc24913cec9fd7285002935f7e
2119Author: djm@openbsd.org <djm@openbsd.org>
2120Date: Sat Jan 25 00:21:08 2020 +0000
2121
2122 upstream: allow UpdateKnownHosts=yes to function when multiple
2123
2124 known_hosts files are in use. When updating host keys, ssh will now search
2125 subsequent known_hosts files, but will add new/changed host keys to the first
2126 specified file only. bz#2738
2127
2128 ok markus@
2129
2130 OpenBSD-Commit-ID: 6ded6d878a03e57d5aa20bab9c31f92e929dbc6c
2131
2132commit e5a278a62ab49dffe96929fa8d8506c6928dba90
2133Author: djm@openbsd.org <djm@openbsd.org>
2134Date: Sat Jan 25 00:06:48 2020 +0000
2135
2136 upstream: process security key provider via realpath() in agent,
2137
2138 avoids malicious client from being able to cause agent to load arbitrary
2139 libraries into ssh-sk-helper.
2140
2141 reported by puck AT puckipedia.com; ok markus
2142
2143 OpenBSD-Commit-ID: 1086643df1b7eee4870825c687cf0c26a6145d1c
2144
2145commit 89a8d4525e8edd9958ed3df60cf683551142eae0
2146Author: djm@openbsd.org <djm@openbsd.org>
2147Date: Sat Jan 25 00:03:36 2020 +0000
2148
2149 upstream: expose PKCS#11 key labels/X.509 subjects as comments
2150
2151 Extract the key label or X.509 subject string when PKCS#11 keys
2152 are retrieved from the token and plumb this through to places where
2153 it may be used as a comment.
2154
2155 based on https://github.com/openssh/openssh-portable/pull/138
2156 by Danielle Church
2157
2158 feedback and ok markus@
2159
2160 OpenBSD-Commit-ID: cae1fda10d9e10971dea29520916e27cfec7ca35
2161
2162commit a8c05c640873621681ab64d2e47a314592d5efa2
2163Author: djm@openbsd.org <djm@openbsd.org>
2164Date: Fri Jan 24 23:56:01 2020 +0000
2165
2166 upstream: tweak proctitle to include sshd arguments, as these are
2167
2168 frequently used to distinguish between multiple independent instances of the
2169 server. New proctitle looks like this:
2170
2171 $ pgrep -lf sshd
2172 12844 sshd: /usr/sbin/sshd -f /etc/ssh/sshd_config [listener] 0 of 10-100 startups
2173
2174 requested by sthen@ and aja@; ok aja@
2175
2176 OpenBSD-Commit-ID: cf235a561c655a3524a82003cf7244ecb48ccc1e
2177
2178commit 8075fccbd4f70a4371acabcfb47562471ff0de6f
2179Author: djm@openbsd.org <djm@openbsd.org>
2180Date: Fri Jan 24 23:54:40 2020 +0000
2181
2182 upstream: add xextendf() to extend a string with a format
2183
2184 (reallocating as necessary). ok aja@ as part of a larger diff
2185
2186 OpenBSD-Commit-ID: 30796b50d330b3e0e201747fe40cdf9aa70a77f9
2187
2188commit d15c8adf2c6f1a6b4845131074383eb9c3d05c3d
2189Author: djm@openbsd.org <djm@openbsd.org>
2190Date: Fri Jan 24 05:33:01 2020 +0000
2191
2192 upstream: minor tweaks to ssh-keygen -Y find-principals:
2193
2194 emit matched principals one per line to stdout rather than as comma-
2195 separated and with a free-text preamble (easy confusion opportunity)
2196
2197 emit "not found" error to stderr
2198
2199 fix up argument testing for -Y operations and improve error message for
2200 unsupported operations
2201
2202 OpenBSD-Commit-ID: 3d9c9a671ab07fc04a48f543edfa85eae77da69c
2203
2204commit c3368a5d5ec368ef6bdf9971d6330ca0e3bdca06
2205Author: djm@openbsd.org <djm@openbsd.org>
2206Date: Fri Jan 24 00:28:57 2020 +0000
2207
2208 upstream: remove ssh-rsa (SHA1) from the list of allowed CA
2209
2210 signature algorithms ok markus
2211
2212 OpenBSD-Commit-ID: da3481fca8c81e6951f319a86b7be67502237f57
2213
2214commit 4a41d245d6b13bd3882c8dc058dbd2e2b39a9f67
2215Author: djm@openbsd.org <djm@openbsd.org>
2216Date: Fri Jan 24 00:27:04 2020 +0000
2217
2218 upstream: when signing a certificate with an RSA key, default to
2219
2220 a safe signature algorithm (rsa-sha-512) if not is explicitly specified by
2221 the user; ok markus@
2222
2223 OpenBSD-Commit-ID: e05f638f0be6c0266e1d3d799716b461011e83a9
2224
2225commit 8dfb6a202c96cdf037c8ce05e53e32e0e0b7b454
2226Author: djm@openbsd.org <djm@openbsd.org>
2227Date: Fri Jan 24 00:00:31 2020 +0000
2228
2229 upstream: allow PEM export of DSA and ECDSA keys; bz3091, patch
2230
2231 from Jakub Jelen ok markus@
2232
2233 OpenBSD-Commit-ID: a58edec8b9f07acab4b962a71a5125830d321b51
2234
2235commit 72a8bea2d748c8bd7f076a8b39a52082c79ae95f
2236Author: djm@openbsd.org <djm@openbsd.org>
2237Date: Thu Jan 23 23:31:52 2020 +0000
2238
2239 upstream: ssh-keygen -Y find-principals fixes based on feedback
2240
2241 from Markus:
2242
2243 use "principals" instead of principal, as allowed_signers lines may list
2244 multiple.
2245
2246 When the signing key is a certificate, emit only principals that match
2247 the certificate principal list.
2248
2249 NB. the command -Y name changes: "find-principal" => "find-principals"
2250
2251 ok markus@
2252
2253 OpenBSD-Commit-ID: ab575946ff9a55624cd4e811bfd338bf3b1d0faf
2254
2255commit 0585b5697201f5d8b32e6f1b0fee7e188268d30d
2256Author: dtucker@openbsd.org <dtucker@openbsd.org>
2257Date: Fri Jan 24 01:29:23 2020 +0000
2258
2259 upstream: Do not warn about permissions on symlinks.
2260
2261 OpenBSD-Regress-ID: 339d4cbae224bd8743ffad9c3afb0cf3cb66c357
2262
2263commit 415192348a5737a960f6d1b292a17b64d55b542c
2264Author: dtucker@openbsd.org <dtucker@openbsd.org>
2265Date: Thu Jan 23 11:19:12 2020 +0000
2266
2267 upstream: Handle zlib compression being disabled now that it's
2268
2269 optional.
2270
2271 OpenBSD-Regress-ID: 0af4fbc5168e62f89d0350de524bff1cb00e707a
2272
2273commit fbce7c1a898ae75286349822950682cf46346121
2274Author: dtucker@openbsd.org <dtucker@openbsd.org>
2275Date: Thu Jan 23 10:53:04 2020 +0000
2276
2277 upstream: Fix typo in comment.
2278
2279 OpenBSD-Commit-ID: d1d7a6553208bf439378fd1cf686a828aceb353a
2280
2281commit ba247af8e9e302910e22881ef9d307a8afeef036
2282Author: dtucker@openbsd.org <dtucker@openbsd.org>
2283Date: Thu Jan 23 10:19:59 2020 +0000
2284
2285 upstream: When checking for unsafe directories, ignore non-directories
2286
2287 (ie symlinks, where permissions are not relevant).
2288
2289 OpenBSD-Regress-ID: fb6cfc8b022becb62b2dcb99ed3f072b3326e501
2290
2291commit 74deb7029be4c00810443114aac9308875a81dae
2292Author: Darren Tucker <dtucker@dtucker.net>
2293Date: Thu Jan 23 22:17:24 2020 +1100
2294
2295 zlib is now optional.
2296
2297commit 633a2af47ee90291aaf93969aeee1e5046074c7c
2298Author: Darren Tucker <dtucker@dtucker.net>
2299Date: Thu Jan 23 22:16:51 2020 +1100
2300
2301 Plumb WITH_ZLIB into configure.
2302
2303 This allows zlib support to be disabled by ./configure --without-zlib.
2304
2305commit 7f8e66fea8c4e2a910df9067cb7638999b7764d5
2306Author: dtucker@openbsd.org <dtucker@openbsd.org>
2307Date: Thu Jan 23 10:24:29 2020 +0000
2308
2309 upstream: Make zlib optional. This adds a "ZLIB" build time option
2310
2311 that allows building without zlib compression and associated options. With
2312 feedback from markus@, ok djm@
2313
2314 OpenBSD-Commit-ID: 44c6e1133a90fd15a3aa865bdedc53bab28b7910
2315
2316commit 69ac4e33023b379e9a8e9b4b6aeeffa6d1fcf6fa
2317Author: djm@openbsd.org <djm@openbsd.org>
2318Date: Thu Jan 23 07:54:04 2020 +0000
2319
2320 upstream: remove trailing period characters from pub/priv key
2321
2322 pathnames - they make them needlessly more difficult to cut and paste without
2323 error; ok markus@ & dtucker@
2324
2325 OpenBSD-Commit-ID: abdcfd1a5723fcac0711feee7665edc66ae2335a
2326
2327commit 945bf52c3c815d95b1e842ebf6c910c3524bd5bb
2328Author: Darren Tucker <dtucker@dtucker.net>
2329Date: Thu Jan 23 21:06:45 2020 +1100
2330
2331 Fix a couple of mysig_t leftovers.
2332
2333commit 84226b447d45fe4542613de68c2ca59a890d7c01
2334Author: Darren Tucker <dtucker@dtucker.net>
2335Date: Thu Jan 23 18:55:24 2020 +1100
2336
2337 Remove mysignal wrapper.
2338
2339 We switched the main code to use sigaction(), so the wrapper is no
2340 longer used.
2341
2342commit 5533c2fb7ef21172fa3708d66b03faa2c6b3d93f
2343Author: jmc@openbsd.org <jmc@openbsd.org>
2344Date: Thu Jan 23 07:16:38 2020 +0000
2345
2346 upstream: new sentence, new line;
2347
2348 OpenBSD-Commit-ID: b6c3f2f36ec77e99198619b38a9f146655281925
2349
2350commit 3bf2a6ac791d64046a537335a0f1d5e43579c5ad
2351Author: dtucker@openbsd.org <dtucker@openbsd.org>
2352Date: Thu Jan 23 07:10:22 2020 +0000
2353
2354 upstream: Replace all calls to signal(2) with a wrapper around
2355
2356 sigaction(2). This wrapper blocks all other signals during the handler
2357 preventing races between handlers, and sets SA_RESTART which should reduce
2358 the potential for short read/write operations.
2359
2360 OpenBSD-Commit-ID: 5e047663fd77a40d7b07bdabe68529df51fd2519
2361
2362commit e027c044c796f3a01081a91bee55741204283f28
2363Author: djm@openbsd.org <djm@openbsd.org>
2364Date: Thu Jan 23 04:54:34 2020 +0000
2365
2366 upstream: missing header change from previous; spotted by dtucker@
2367
2368 OpenBSD-Commit-ID: 321ce74c0a5bbd0f02fa3f20cb5cf2a952c6b96f
2369
2370commit 7e1323102b1b04eef391b01e180710a2d408a7ab
2371Author: dtucker@openbsd.org <dtucker@openbsd.org>
2372Date: Thu Jan 23 03:42:41 2020 +0000
2373
2374 upstream: Check for and warn about StrictModes permission problems. ok tb@
2375
2376 OpenBSD-Regress-ID: 4841704ccdee50ee7efc6035bc686695c6ac2991
2377
2378commit 84de1c27f845d15c859db44e7070a46f45504b66
2379Author: dtucker@openbsd.org <dtucker@openbsd.org>
2380Date: Thu Jan 23 03:35:07 2020 +0000
2381
2382 upstream: Also test PuTTY chacha20.
2383
2384 OpenBSD-Regress-ID: 7af6a0e8763b05f1f8eee6bca5f31fcb16151040
2385
2386commit c7ed15a39695ecd5f1f21842d8d9cd22246d4ee2
2387Author: dtucker@openbsd.org <dtucker@openbsd.org>
2388Date: Thu Jan 23 03:24:38 2020 +0000
2389
2390 upstream: Also test PuTTY ecdh kex methods.
2391
2392 OpenBSD-Regress-ID: ec4017dce612131842398a03e93007a869c2c133
2393
2394commit c4b3a128954ee1b7fbcbda167baf8aca1a3d1c84
2395Author: dtucker@openbsd.org <dtucker@openbsd.org>
2396Date: Thu Jan 23 02:46:49 2020 +0000
2397
2398 upstream: Remove unsupported algorithms from list of defaults at run
2399
2400 time and remove ifdef and distinct settings for OPENSSL=no case.
2401
2402 This will make things much simpler for -portable where the exact set
2403 of algos depends on the configuration of both OpenSSH and the libcrypto
2404 it's linked against (if any). ok djm@
2405
2406 OpenBSD-Commit-ID: e0116d0183dcafc7a9c40ba5fe9127805c5dfdd2
2407
2408commit 56cffcc09f8a2e661d2ba02e61364ae6f998b2b1
2409Author: djm@openbsd.org <djm@openbsd.org>
2410Date: Thu Jan 23 02:43:48 2020 +0000
2411
2412 upstream: add a new signature operations "find-principal" to look
2413
2414 up the principal associated with a signature from an allowed-signers file.
2415 Work by Sebastian Kinne; ok dtucker@
2416
2417 OpenBSD-Commit-ID: 6f782cc7e18e38fcfafa62af53246a1dcfe74e5d
2418
2419commit 65cf8730de6876a56595eef296e07a86c52534a6
2420Author: dtucker@openbsd.org <dtucker@openbsd.org>
2421Date: Wed Jan 22 07:38:30 2020 +0000
2422
2423 upstream: Ignore whitespace when checking explict fingerprint.
2424
2425 When confirming a host key using the fingerprint itself, ignore leading and
2426 trailing whitespace. ok deraadt@ djm@
2427
2428 OpenBSD-Commit-ID: cafd7f803bbdcd40c3a8f8f1a77747e6b6d8c011
2429
2430commit 8d3af6ebdf524b34087a0a3ae415b5141ba10572
2431Author: dtucker@openbsd.org <dtucker@openbsd.org>
2432Date: Wed Jan 22 07:31:27 2020 +0000
2433
2434 upstream: Increase keyscan timeout from default. On slow hosts 3
2435
2436 concurrent keyscans can hit the default 5 second timeout, so increase to 15
2437 seconds.
2438
2439 OpenBSD-Regress-ID: 16383dec166af369b7fb9948572856f5d544c93f
2440
2441commit 6c30c9adbeeed09a8a9e7a69974cfa1f1ddd1e9e
2442Author: tedu@openbsd.org <tedu@openbsd.org>
2443Date: Wed Jan 22 04:58:23 2020 +0000
2444
2445 upstream: remove diffie-hellman-group14-sha1 from default kex to
2446
2447 see what happens. general mostly ok
2448
2449 OpenBSD-Commit-ID: 216b7b8462d2ef5f4531f26cb2cb839b2153dad9
2450
2451commit 4a32c0ca44a2dc2a358f69b5d43c08e528b44b39
2452Author: claudio@openbsd.org <claudio@openbsd.org>
2453Date: Wed Jan 22 04:51:51 2020 +0000
2454
2455 upstream: For ssh-keygen -lF only add a space after key fingerprint
2456
2457 when there is a comment. This makes copy-paste of fingerprints into ssh
2458 easier. OK djm@
2459
2460 OpenBSD-Commit-ID: fa01d95624f65c1eb4dc7c575d20d77c78010dfd
2461
2462commit 37d3b736506760e4ebc7fe56255f7b8ea823a00c
2463Author: djm@openbsd.org <djm@openbsd.org>
2464Date: Wed Jan 22 04:49:16 2020 +0000
2465
2466 upstream: some __func__ and strerror(errno) here; no functional
2467
2468 change
2469
2470 OpenBSD-Commit-ID: 6c3ddd5f848b99ea560b31d3fba99ceed66cef37
2471
2472commit e2031b05c74c98b141179ceab13a323cf17d01e5
2473Author: djm@openbsd.org <djm@openbsd.org>
2474Date: Wed Jan 22 02:25:21 2020 +0000
2475
2476 upstream: factor out parsing of allowed-signers lines
2477
2478 OpenBSD-Commit-ID: 85ee6aeff608371826019ea85e55bfa87f79d06e
2479
2480commit 47160e1de8c2f638f0ef41cef42c976417b61778
2481Author: Damien Miller <djm@mindrot.org>
2482Date: Wed Jan 22 10:30:13 2020 +1100
2483
2484 unbreak fuzzer support for recent ssh-sk.h changes
2485
2486commit 70d38c3cfd4550e8ee66cc3bf1b91aa339c91df5
2487Author: djm@openbsd.org <djm@openbsd.org>
2488Date: Tue Jan 21 22:39:57 2020 +0000
2489
2490 upstream: expose the number of currently-authenticating connections
2491
2492 along with the MaxStartups limit in the proctitle; suggestion from Philipp
2493 Marek, w/ feedback from Craig Miskell ok dtucker@
2494
2495 OpenBSD-Commit-ID: a4a6db2dc1641a5df8eddf7d6652176e359dffb3
2496
2497commit a78c66d5d2144bd49779bc80a647346bd3d7233d
2498Author: naddy@openbsd.org <naddy@openbsd.org>
2499Date: Tue Jan 21 12:40:04 2020 +0000
2500
2501 upstream: document the default value of the ControlPersist option;
2502
2503 ok dtucker@ djm@
2504
2505 OpenBSD-Commit-ID: 0788e7f2b5a9d4e36d3d2ab378f73329320fef66
2506
2507commit b46a6325849e40aa2e4b0d962a6f00f708f6576a
2508Author: Damien Miller <djm@mindrot.org>
2509Date: Wed Jan 22 09:28:32 2020 +1100
2510
2511 remove accidental change in f8c11461
2512
2513commit 80d3bebcab96fe1d177e45906e10db16895da01d
2514Author: djm@openbsd.org <djm@openbsd.org>
2515Date: Tue Jan 21 11:06:09 2020 +0000
2516
2517 upstream: don't #ifdef out the KRL code when compiling without
2518
2519 libcrypto support; it works just fine and disabling it breaks a few tests. ok
2520 dtucker@
2521
2522 OpenBSD-Commit-ID: 65f6272c4241eb4b04de78b012fe98b2b555ad44
2523
2524commit f8c11461aa6db168fc5e7eeae448b4cbbf59642a
2525Author: djm@openbsd.org <djm@openbsd.org>
2526Date: Tue Jan 21 08:06:27 2020 +0000
2527
2528 upstream: pass SSH_SK_HELPER explicitly past $SUDO to avoid it getting
2529
2530 cleared; with dtucker@
2531
2532 OpenBSD-Regress-ID: 03178a0580324bf0dff28f7eac6c3edbc5407f8e
2533
2534commit b5fcb0ac1cc0ef01aeec1c089146298654ab3ae0
2535Author: djm@openbsd.org <djm@openbsd.org>
2536Date: Tue Jan 21 07:07:31 2020 +0000
2537
2538 upstream: check access(ssh-sk-helper, X_OK) to provide friendly
2539
2540 error message for misconfigured helper paths
2541
2542 OpenBSD-Commit-ID: 061bcc262155d12e726305c91394ac0aaf1f8341
2543
2544commit 56bced43c14dc6fa2bfa1816007e441644105609
2545Author: dtucker@openbsd.org <dtucker@openbsd.org>
2546Date: Tue Jan 21 06:09:56 2020 +0000
2547
2548 upstream: Document sntrup4591761x25519-sha512@tinyssh.org. Patch
2549
2550 from jtesta@positronsecurity.com via github PR#151.
2551
2552 OpenBSD-Commit-ID: f3d48168623045c258245c340a5a2af7dbb74edc
2553
2554commit 4a05d789b86314fef7303824f69defbc6b96ed60
2555Author: djm@openbsd.org <djm@openbsd.org>
2556Date: Tue Jan 21 05:56:56 2020 +0000
2557
2558 upstream: fix ssh-keygen not displaying authenticator touch
2559
2560 prompt; reported by jmc@
2561
2562 OpenBSD-Commit-ID: 04d4f582fc194eb3897ebcbfe286c49958ba2859
2563
2564commit 881aded0389d999375f926051491a944c6d8752b
2565Author: djm@openbsd.org <djm@openbsd.org>
2566Date: Tue Jan 21 05:56:27 2020 +0000
2567
2568 upstream: a little more verbosity in sign_and_send_pubkey() debug
2569
2570 messages
2571
2572 OpenBSD-Commit-ID: 6da47a0e6373f6683006f49bc2a516d197655508
2573
2574commit b715fdc71bbd009d0caff691ab3fc04903c4aee8
2575Author: naddy@openbsd.org <naddy@openbsd.org>
2576Date: Sat Jan 18 21:16:43 2020 +0000
2577
2578 upstream: one more replacement "(security) key" -> "(FIDO)
2579
2580 authenticator"
2581
2582 OpenBSD-Commit-ID: 031bca03c1d1f878ab929facd561911f1bc68dfd
2583
2584commit 84911da1beeb6ed258a43468efb316cd39fb6855
2585Author: naddy@openbsd.org <naddy@openbsd.org>
2586Date: Sat Jan 18 15:45:41 2020 +0000
2587
2588 upstream: undo merge error and replace the term "security key"
2589
2590 again
2591
2592 OpenBSD-Commit-ID: 341749062c089cc360a7877e9ee3a887aecde395
2593
2594commit e8c06c4ee708720efec12cd1a6f78a3c6d76b7f0
2595Author: naddy@openbsd.org <naddy@openbsd.org>
2596Date: Fri Jan 17 20:13:47 2020 +0000
2597
2598 upstream: Document loading of resident keys from a FIDO
2599
2600 authenticator.
2601
2602 * Rename -O to -K to keep "-O option" available.
2603 * Document -K.
2604 * Trim usage() message down to synopsis, like all other commands.
2605
2606 ok markus@
2607
2608 OpenBSD-Commit-ID: 015c2c4b28f8e19107adc80351b44b23bca4c78a
2609
2610commit 0d005d6372a067b59123dec8fc6dc905f2c09e1e
2611Author: naddy@openbsd.org <naddy@openbsd.org>
2612Date: Tue Jan 14 15:07:30 2020 +0000
2613
2614 upstream: sync ssh-keygen.1 and ssh-keygen's usage() with each
2615
2616 other and reality ok markus@
2617
2618 OpenBSD-Commit-ID: cdf64454f2c3604c25977c944e5b6262a3bcce92
2619
2620commit b8a4ca2ebfddab862f7eb1ea2a07fb9f70330429
2621Author: naddy@openbsd.org <naddy@openbsd.org>
2622Date: Sat Jan 11 16:23:10 2020 +0000
2623
2624 upstream: revise the fix for reversed arguments on
2625
2626 expand_proxy_command()
2627
2628 Always put 'host' before 'host_arg' for consistency. ok markus@ djm@
2629
2630 OpenBSD-Commit-ID: 1ba5b25472779f1b1957295fcc6907bb961472a3
2631
2632commit 57b181eaf2d34fd0a1b51ab30cb6983df784de5a
2633Author: djm@openbsd.org <djm@openbsd.org>
2634Date: Fri Jan 10 23:43:26 2020 +0000
2635
2636 upstream: pass the log-on-stderr flag and log level through to
2637
2638 ssh-sk-helper, making debugging a bit easier. ok markus@
2639
2640 OpenBSD-Commit-ID: 2e7aea6bf5770d3f38b7c7bba891069256c5a49a
2641
2642commit a8bd5fdbdb7581afc7123a042a7cd6ca25357388
2643Author: Damien Miller <djm@mindrot.org>
2644Date: Tue Jan 21 12:32:16 2020 +1100
2645
2646 Wrap copy_environment_blacklist() in #ifdef
2647
2648 It's only needed for USE_PAM or HAVE_CYGWIN cases and will cause compiler
2649 warnings otherwise.
2650
2651commit 10ecc647fc1db8d2dde9f6b9b826b201dfc48b62
2652Author: Damien Miller <djm@mindrot.org>
2653Date: Tue Jan 21 12:20:05 2020 +1100
2654
2655 depend
2656
2657commit b3f7009c9ffa5891283ed96e043001e09934a8d4
2658Author: Ruben Kerkhof <ruben@rubenkerkhof.com>
2659Date: Mon Jan 20 11:56:48 2020 +0100
2660
2661 Fix missing prototype warning for copy_environment
2662
2663 This function is only used in this file, and only on Cygwin, so make
2664 it static and hide it behind HAVE_CYGWIN. Prevents missing prototype
2665 warning.
2666
2667commit 0c428c0e991e2c4fabc48cf5d9b8f84c9412e0c3
2668Author: Ruben Kerkhof <ruben@rubenkerkhof.com>
2669Date: Mon Jan 20 13:58:11 2020 +0100
2670
2671 configure.ac: fix ldns test
2672
2673 When running ./configure --with-ldns, if ldns-config cannot be found, we
2674 add -Iyes/include to CPPFLAGS and -Lyes/lib to LDFLAGS. Fix that.
2675
2676commit 6089abf715e2784751c9f62697e09bb103295b93
2677Author: Ruben Kerkhof <ruben@rubenkerkhof.com>
2678Date: Mon Jan 20 12:13:26 2020 +0100
2679
2680 Make sshpam_password_change_required static.
2681
2682 sshpam_password_change_required is only used in auth-pam.c, so make it
2683 static to prevent a mising prototype warning.
2684
2685commit 5a9b9c82851b7bc219dc3a65962a80803c76c102
2686Author: Ruben Kerkhof <ruben@rubenkerkhof.com>
2687Date: Mon Jan 20 12:24:51 2020 +0100
2688
2689 sandbox-darwin.c: fix missing prototypes.
2690
2691 Include the right header just like the other sandbox files.
2692 Fixes missing prototype warnings for ssh_sandbox_* functions.
2693
2694commit 335dc93526942a650f6c69666b3f6ca44d0a2910
2695Author: Ruben Kerkhof <ruben@rubenkerkhof.com>
2696Date: Mon Jan 20 11:09:27 2020 +0100
2697
2698 Fix a few warnings when on Mac OS X.
2699
2700 Include stdlib.h for calloc, malloc, free and setenv.
2701
2702commit 0488dc2d3050ea1a99ef5cf44afc50ffbf3f1315
2703Author: Ruben Kerkhof <ruben@rubenkerkhof.com>
2704Date: Mon Jan 20 10:32:23 2020 +0100
2705
2706 Fix building without openssl.
2707
2708 This fixes the following when there are no openssl headers on the system:
2709 ssh-ecdsa-sk.c:34:10: fatal error: 'openssl/bn.h' file not found
2710
2711commit e6b7157b4ef29c83ec3a2d1d7c927e4b8898f9bb
2712Author: Ruben Kerkhof <ruben@rubenkerkhof.com>
2713Date: Wed Jan 15 16:08:55 2020 +0100
2714
2715 Add config.log to .gitignore
2716
2717commit 515e10ddf9644010b88cfd7ecf601f4306d42232
2718Author: Ruben Kerkhof <ruben@rubenkerkhof.com>
2719Date: Wed Jan 15 16:16:31 2020 +0100
2720
2721 Fix typo in README.md, s/crytpo/crypto/
2722
2723commit 1af3354aea3c4bfa5b5ecfb5d1ff3ad231c2073c
2724Author: Darren Tucker <dtucker@dtucker.net>
2725Date: Wed Jan 15 16:22:36 2020 +1100
2726
2727 Wrap stdint.h in ifdef HAVE_STDINT_H.
2728
2729commit 429170f273ce1b0140f8111a45ba69390d98de3a
2730Author: Darren Tucker <dtucker@dtucker.net>
2731Date: Tue Jan 14 14:41:47 2020 +1100
2732
2733 Wrap stdint.h inside HAVE_STDINT_H.
2734
2735commit a0989b60211b6f1c2313e1397c526d883a23a075
2736Author: Darren Tucker <dtucker@dtucker.net>
2737Date: Tue Jan 14 14:26:41 2020 +1100
2738
2739 Include compat header for definitions.
2740
2741commit e0cedcad51fe02683943bf4f1ad2961aa3f35313
2742Author: Darren Tucker <dtucker@dtucker.net>
2743Date: Tue Jan 14 09:42:52 2020 +1100
2744
2745 Improve search for 'struct timespec'.
2746
2747 Make struct timespec test consistent with existing timeval test.
2748 Include time.h for timespec in compat header where required.
2749
2750commit acaf9e058594310001ce64468ed2923dc6323e81
2751Author: Darren Tucker <dtucker@dtucker.net>
2752Date: Tue Jan 14 12:43:03 2020 +1100
2753
2754 Update depend to remove rmd160.h.
2755
2756commit 26b2675b0c3e3efea11a52609073aec01736ec84
2757Author: Darren Tucker <dtucker@dtucker.net>
2758Date: Tue Jan 14 07:24:46 2020 +1100
2759
2760 Remove configure test & compat code for ripemd160.
2761
2762 RIPEMD160 support was removed upstream in 2017, however we still had
2763 a configure test and compat code for it, so clean those up now.
2764
2765commit ed3ad71b17adcd1fb4431d145f53cee1c6a1135e
2766Author: djm@openbsd.org <djm@openbsd.org>
2767Date: Thu Jan 9 03:28:38 2020 +0000
2768
2769 upstream: fix reversed arguments on expand_proxy_command(); spotted
2770
2771 by anton@
2772
2773 OpenBSD-Commit-ID: db1c32478a01dfbc9c4db171de0f25907bea5775
2774
2775commit cd53476383f0cf475f40ba8ac8deb6b76dd5ce4e
2776Author: jmc@openbsd.org <jmc@openbsd.org>
2777Date: Mon Jan 6 07:43:28 2020 +0000
2778
2779 upstream: put the fido options in a list, and tidy up the text a
2780
2781 little; ok djm
2782
2783 OpenBSD-Commit-ID: 491ce15ae52a88b7a6a2b3b6708a14b4aacdeebb
2784
2785commit 30f704ebc0e9e32b3d12f5d9e8c1b705fdde2c89
2786Author: Jeremy Drake <github@jdrake.com>
2787Date: Fri Oct 11 18:31:05 2019 -0700
2788
2789 Deny (non-fatal) ipc in preauth privsep child.
2790
2791 As noted in openssh/openssh-portable#149, i386 does not have have
2792 _NR_shmget etc. Instead, it has a single ipc syscall (see man 2 ipc,
2793 https://linux.die.net/man/2/ipc). Add this syscall, if present, to the
2794 list of syscalls that seccomp will deny non-fatally.
2795
2796commit b110cefdfbf5a20f49b774a55062d6ded2fb6e22
2797Author: Khem Raj <raj.khem@gmail.com>
2798Date: Tue Jan 7 16:26:45 2020 -0800
2799
2800 seccomp: Allow clock_gettime64() in sandbox.
2801
2802 This helps sshd accept connections on mips platforms with
2803 upcoming glibc ( 2.31 )
2804
2805commit 3cc60c899a92a469e5118310ba6b74cb57215618
2806Author: djm@openbsd.org <djm@openbsd.org>
2807Date: Mon Jan 6 02:39:30 2020 +0000
2808
2809 upstream: missing else in check_enroll_options()
2810
2811 OpenBSD-Commit-ID: e058fb918fda56ddbbf0bee910101004cec421d4
2812
2813commit ff5784e2698d6c41e9f39ce4df24968c1beeb2bb
2814Author: djm@openbsd.org <djm@openbsd.org>
2815Date: Mon Jan 6 02:24:28 2020 +0000
2816
2817 upstream: fix error message
2818
2819 OpenBSD-Commit-ID: 1eb52025658eb78ea6223181e552862198d3d505
2820
2821commit dd2acc8b862c09751621995fba2d5fa6f4e24cc9
2822Author: djm@openbsd.org <djm@openbsd.org>
2823Date: Mon Jan 6 02:07:50 2020 +0000
2824
2825 upstream: adapt sk-dummy to SK API changes
2826
2827 also, make it pull prototypes directly from sk-api.c and #error
2828 if the expected version changes. This will make any future regress
2829 test breakage because of SK API changes much more apparent
2830
2831 OpenBSD-Regress-ID: 79b07055de4feb988e31da71a89051ad5969829d
2832
2833commit c312ca077cd2a6c15545cd6b4d34ee2f69289174
2834Author: djm@openbsd.org <djm@openbsd.org>
2835Date: Mon Jan 6 02:00:46 2020 +0000
2836
2837 upstream: Extends the SK API to accept a set of key/value options
2838
2839 for all operations. These are intended to future-proof the API a little by
2840 making it easier to specify additional fields for without having to change
2841 the API version for each.
2842
2843 At present, only two options are defined: one to explicitly specify
2844 the device for an operation (rather than accepting the middleware's
2845 autoselection) and another to specify the FIDO2 username that may
2846 be used when generating a resident key. These new options may be
2847 invoked at key generation time via ssh-keygen -O
2848
2849 This also implements a suggestion from Markus to avoid "int" in favour
2850 of uint32_t for the algorithm argument in the API, to make implementation
2851 of ssh-sk-client/helper a little easier.
2852
2853 feedback, fixes and ok markus@
2854
2855 OpenBSD-Commit-ID: 973ce11704609022ab36abbdeb6bc23c8001eabc
2856
2857commit 2ab335712d084d9ccaf3f53afc3fa9535329da87
2858Author: beck@openbsd.org <beck@openbsd.org>
2859Date: Sun Jan 5 16:28:22 2020 +0000
2860
2861 upstream: fix CanonicalizeHostname, broken by rev 1.507
2862
2863 Issue noticed and reported by Pierre-Olivier Martel <pom@apple.com>
2864 ok dtucker@ markus@ djm@
2865
2866 OpenBSD-Commit-ID: 749f3168ec520609c35b0c4e1984e5fa47f16094
2867
2868commit 69e44ba701b90b0f530d64c3fe4363ea86e50cd3
2869Author: Darren Tucker <dtucker@dtucker.net>
2870Date: Mon Jan 6 09:02:53 2020 +1100
2871
2872 Fix typo: 'you' -> 'your'.
2873
2874 bz#3108 from jmckitrick@gmail.com.
2875
2876commit 7652a57662969bd5c61448b3843ec6d407ad12be
2877Author: Darren Tucker <dtucker@dtucker.net>
2878Date: Mon Jan 6 08:56:46 2020 +1100
2879
2880 Remove auth-skey.c.
2881
2882 S/Key support was removed in OpenSSH 7.8 but this file was missed.
2883
2884commit c593cc5e826c9f4ec506e22b629d37cabfaacff9
2885Author: jmc@openbsd.org <jmc@openbsd.org>
2886Date: Fri Jan 3 07:33:33 2020 +0000
2887
2888 upstream: the download resident keys option is -K (upper) not -k
2889
2890 (lower); ok djm
2891
2892 OpenBSD-Commit-ID: 71dc28a3e1fa7c553844abc508845bcf5766e091
2893
2894commit ff31f15773ee173502eec4d7861ec56f26bba381
2895Author: djm@openbsd.org <djm@openbsd.org>
2896Date: Fri Jan 3 03:02:26 2020 +0000
2897
2898 upstream: what bozo decided to use 2020 as a future date in a regress
2899
2900 test?
2901
2902 OpenBSD-Regress-ID: 3b953df5a7e14081ff6cf495d4e8d40e153cbc3a
2903
2904commit 680eb7749a39d0e4d046e66cac4e51e8e3640b75
2905Author: djm@openbsd.org <djm@openbsd.org>
2906Date: Fri Jan 3 02:46:19 2020 +0000
2907
2908 upstream: implement recent SK API change to support resident keys
2909
2910 and PIN prompting in the dummy middleware that we use for the tests. Should
2911 fix breakage spotted by dtucker@
2912
2913 OpenBSD-Regress-ID: 379cf9eabfea57aaf7f3f59dafde59889566c484
2914
2915commit 86834fe6b54ac57b8528c30cf0b27e5cac5b7af7
2916Author: dtucker@openbsd.org <dtucker@openbsd.org>
2917Date: Thu Jan 2 13:25:38 2020 +0000
2918
2919 upstream: Update keygen moduli screen test to match recent command
2920
2921 line option change to ssh-keygen(1).
2922
2923 OpenBSD-Regress-ID: 744a72755004377e9669b662c13c6aa9ead8a0c3
2924
2925commit 9039971887cccd95b209c479296f772a3a93e8e7
2926Author: djm@openbsd.org <djm@openbsd.org>
2927Date: Thu Jan 2 22:40:09 2020 +0000
2928
2929 upstream: ability to download FIDO2 resident keys from a token via
2930
2931 "ssh-keygen -K". This will save public/private keys into the current
2932 directory.
2933
2934 This is handy if you move a token between hosts.
2935
2936 feedback & ok markus@
2937
2938 OpenBSD-Commit-ID: d57c1f9802f7850f00a117a1d36682a6c6d10da6
2939
2940commit 878ba4350d57e905d6bb1865d8ff31bdfe5deab4
2941Author: djm@openbsd.org <djm@openbsd.org>
2942Date: Thu Jan 2 22:38:33 2020 +0000
2943
2944 upstream: add sshkey_save_public(), to save a public key; ok
2945
2946 markus@
2947
2948 OpenBSD-Commit-ID: 5d6f96a966d10d7fa689ff9aa9e1d6767ad5a076
2949
2950commit 3b1382ffd5e71eff78db8cef0f3cada22ff29409
2951Author: jmc@openbsd.org <jmc@openbsd.org>
2952Date: Mon Dec 30 16:10:00 2019 +0000
2953
2954 upstream: simplify the list for moduli options - no need for
2955
2956 -compact;
2957
2958 OpenBSD-Commit-ID: 6492c72280482c6d072be46236b365cb359fc280
2959
2960commit 0248ec7c763dee9ff730a589e3d166eac5c74d7c
2961Author: Damien Miller <djm@mindrot.org>
2962Date: Thu Jan 2 13:41:31 2020 +1100
2963
2964 ssh-sk-null.cc needs extern "C" {}
2965
2966commit 5ca4b414effe4b56f0cfe3058c92391aa8a43871
2967Author: Damien Miller <djm@mindrot.org>
2968Date: Thu Jan 2 10:56:29 2020 +1100
2969
2970 add dummy ssh-sk API for linking with fuzzers
2971
2972commit c4b2664be7ba25e4c233315b25212dec29b727ab
2973Author: Damien Miller <djm@mindrot.org>
2974Date: Mon Dec 30 21:04:09 2019 +1100
2975
2976 refresh depend
2977
2978commit 3093d12ff80927cf45da08d9f262a26680fb14ee
2979Author: djm@openbsd.org <djm@openbsd.org>
2980Date: Mon Dec 30 09:49:52 2019 +0000
2981
2982 upstream: Remove the -x option currently used for
2983
2984 FIDO/U2F-specific key flags. Instead these flags may be specified via -O.
2985
2986 ok markus@
2987
2988 OpenBSD-Commit-ID: f23ebde2a8a7e1bf860a51055a711cffb8c328c1
2989
2990commit ef65e7dbaa8fac3245aa2bfc9f7e09be7cba0d9d
2991Author: djm@openbsd.org <djm@openbsd.org>
2992Date: Mon Dec 30 09:25:29 2019 +0000
2993
2994 upstream: document SK API changes in PROTOCOL.u2f
2995
2996 ok markus@
2997
2998 OpenBSD-Commit-ID: 52622363c103a3c4d3d546050480ffe978a32186
2999
3000commit 43ce96427b76c4918e39af654e2fc9ee18d5d478
3001Author: djm@openbsd.org <djm@openbsd.org>
3002Date: Mon Dec 30 09:24:45 2019 +0000
3003
3004 upstream: translate and return error codes; retry on bad PIN
3005
3006 Define some well-known error codes in the SK API and pass
3007 them back via ssh-sk-helper.
3008
3009 Use the new "wrong PIN" error code to retry PIN prompting during
3010 ssh-keygen of resident keys.
3011
3012 feedback and ok markus@
3013
3014 OpenBSD-Commit-ID: 9663c6a2bb7a0bc8deaccc6c30d9a2983b481620
3015
3016commit d433596736a2cd4818f538be11fc94783f5c5236
3017Author: djm@openbsd.org <djm@openbsd.org>
3018Date: Mon Dec 30 09:24:03 2019 +0000
3019
3020 upstream: improve some error messages; ok markus@
3021
3022 OpenBSD-Commit-ID: 4ccd8ddabb8df4f995107dd3b7ea58220e93cb81
3023
3024commit c54cd1892c3e7f268b21e1f07ada9f0d9816ffc0
3025Author: djm@openbsd.org <djm@openbsd.org>
3026Date: Mon Dec 30 09:23:28 2019 +0000
3027
3028 upstream: SK API and sk-helper error/PIN passing
3029
3030 Allow passing a PIN via the SK API (API major crank) and let the
3031 ssh-sk-helper API follow.
3032
3033 Also enhance the ssh-sk-helper API to support passing back an error
3034 code instead of a complete reply. Will be used to signal "wrong PIN",
3035 etc.
3036
3037 feedback and ok markus@
3038
3039 OpenBSD-Commit-ID: a1bd6b0a2421646919a0c139b8183ad76d28fb71
3040
3041commit 79fe22d9bc2868c5118f032ec1200ac9c2e3aaef
3042Author: djm@openbsd.org <djm@openbsd.org>
3043Date: Mon Dec 30 09:22:49 2019 +0000
3044
3045 upstream: implement loading resident keys in ssh-add
3046
3047 "ssh-add -O" will load resident keys from a FIDO2 token and add them
3048 to a ssh-agent.
3049
3050 feedback and ok markus@
3051
3052 OpenBSD-Commit-ID: 608104ae957a7d65cb84e0a3a26c8f60e0df3290
3053
3054commit 27753a8e21887d47fe6b5c78a4aed0efe558a850
3055Author: djm@openbsd.org <djm@openbsd.org>
3056Date: Mon Dec 30 09:21:59 2019 +0000
3057
3058 upstream: implement loading of resident keys in ssh-sk-helper
3059
3060 feedback and ok markus@
3061
3062 OpenBSD-Commit-ID: b273c23769ea182c55c4a7b8f9cbd9181722011a
3063
3064commit 14cea36df397677b8f8568204300ef654114fd76
3065Author: djm@openbsd.org <djm@openbsd.org>
3066Date: Mon Dec 30 09:21:16 2019 +0000
3067
3068 upstream: resident keys support in SK API
3069
3070 Adds a sk_load_resident_keys() function to the security key
3071 API that accepts a security key provider and a PIN and returns
3072 a list of keys.
3073
3074 Implement support for this in the usbhid middleware.
3075
3076 feedback and ok markus@
3077
3078 OpenBSD-Commit-ID: 67e984e4e87f4999ce447a6178c4249a9174eff0
3079
3080commit 2fe05fcb4a2695f190b4fcf27770b655586ab349
3081Author: djm@openbsd.org <djm@openbsd.org>
3082Date: Mon Dec 30 09:20:36 2019 +0000
3083
3084 upstream: Factor out parsing of struct sk_enroll_response
3085
3086 We'll reuse this for extracting resident keys from a device.
3087
3088 feedback and ok markus@
3089
3090 OpenBSD-Commit-ID: 9bc1efd9c6897eac4df0983746cf6578c1542273
3091
3092commit 4532bd01d57ee13c3ca881eceac1bf9da96a4d7e
3093Author: djm@openbsd.org <djm@openbsd.org>
3094Date: Mon Dec 30 09:19:52 2019 +0000
3095
3096 upstream: basic support for generating FIDO2 resident keys
3097
3098 "ssh-keygen -t ecdsa-sk|ed25519-sk -x resident" will generate a
3099 device-resident key.
3100
3101 feedback and ok markus@
3102
3103 OpenBSD-Commit-ID: 8e1b3c56a4b11d85047bd6c6c705b7eef4d58431
3104
3105commit 3e60d18fba1b502c21d64fc7e81d80bcd08a2092
3106Author: djm@openbsd.org <djm@openbsd.org>
3107Date: Mon Dec 30 03:30:09 2019 +0000
3108
3109 upstream: remove single-letter flags for moduli options
3110
3111 Move all moduli generation options to live under the -O flag.
3112
3113 Frees up seven single-letter flags.
3114
3115 NB. this change break existing ssh-keygen commandline syntax for moduli-
3116 related operations. Very few people use these fortunately.
3117
3118 feedback and ok markus@
3119
3120 OpenBSD-Commit-ID: d498f3eaf28128484826a4fcb343612764927935
3121
3122commit 1e645fe767f27725dc7fd7864526de34683f7daf
3123Author: djm@openbsd.org <djm@openbsd.org>
3124Date: Mon Dec 30 03:28:41 2019 +0000
3125
3126 upstream: prepare for use of ssh-keygen -O flag beyond certs
3127
3128 Move list of available certificate options in ssh-keygen.1 to the
3129 CERTIFICATES section.
3130
3131 Collect options specified by -O but delay parsing/validation of
3132 certificate options until we're sure that we're acting as a CA.
3133
3134 ok markus@
3135
3136 OpenBSD-Commit-ID: 33e6bcc29cfca43606f6fa09bd84b955ee3a4106
3137
3138commit 20ccd854245c598e2b47cc9f8d4955d645195055
3139Author: jmc@openbsd.org <jmc@openbsd.org>
3140Date: Fri Dec 27 08:28:44 2019 +0000
3141
3142 upstream: sort -Y internally in the options list, as is already
3143
3144 done in synopsis;
3145
3146 OpenBSD-Commit-ID: 86d033c5764404057616690d7be992e445b42274
3147
3148commit 5b6c954751dd3677466cda7adb92e4f05446c96c
3149Author: jmc@openbsd.org <jmc@openbsd.org>
3150Date: Fri Dec 27 08:25:07 2019 +0000
3151
3152 upstream: in the options list, sort -Y and -y;
3153
3154 OpenBSD-Commit-ID: 24c2e6a3aeab6e050a0271ffc73fdff91c10dcaa
3155
3156commit 141df487ba699cfd1ec3dcd98186e7c956e99024
3157Author: naddy@openbsd.org <naddy@openbsd.org>
3158Date: Sat Dec 21 20:22:34 2019 +0000
3159
3160 upstream: Replace the term "security key" with "(FIDO)
3161
3162 authenticator".
3163
3164 The polysemous use of "key" was too confusing. Input from markus@.
3165 ok jmc@
3166
3167 OpenBSD-Commit-ID: 12eea973a44c8232af89f86e4269d71ae900ca8f
3168
3169commit fbd9729d4eadf2f7097b6017156387ac64302453
3170Author: djm@openbsd.org <djm@openbsd.org>
3171Date: Sat Dec 21 02:33:07 2019 +0000
3172
3173 upstream: unit tests for ForwardAgent=/path; from Eric Chiang
3174
3175 OpenBSD-Regress-ID: 24f693f78290b2c17725dab2c614dffe4a88c8da
3176
3177commit e5b7cf8edca7e843adc125621e1dab14507f430a
3178Author: djm@openbsd.org <djm@openbsd.org>
3179Date: Mon Dec 16 02:39:05 2019 +0000
3180
3181 upstream: test security key host keys in addition to user keys
3182
3183 OpenBSD-Regress-ID: 9fb45326106669a27e4bf150575c321806e275b1
3184
3185commit 40be78f503277bd91c958fa25ea9ef918a2ffd3d
3186Author: djm@openbsd.org <djm@openbsd.org>
3187Date: Sat Dec 21 02:19:13 2019 +0000
3188
3189 upstream: Allow forwarding a different agent socket to the path
3190
3191 specified by $SSH_AUTH_SOCK, by extending the existing ForwardAgent option to
3192 accepting an explicit path or the name of an environment variable in addition
3193 to yes/no.
3194
3195 Patch by Eric Chiang, manpage by me; ok markus@
3196
3197 OpenBSD-Commit-ID: 98f2ed80bf34ea54d8b2ddd19ac14ebbf40e9265
3198
3199commit 416f15372bfb5be1709a0ad1d00ef5d8ebfb9e0e
3200Author: naddy@openbsd.org <naddy@openbsd.org>
3201Date: Fri Dec 20 20:28:55 2019 +0000
3202
3203 upstream: SSH U2F keys can now be used as host keys. Fix a garden
3204
3205 path sentence. ok markus@
3206
3207 OpenBSD-Commit-ID: 67d7971ca1a020acd6c151426c54bd29d784bd6b
3208
3209commit 68010acbcfe36167b3eece3115f3a502535f80df
3210Author: dtucker@openbsd.org <dtucker@openbsd.org>
3211Date: Fri Dec 20 02:42:42 2019 +0000
3212
3213 upstream: Move always unsupported keywords to be grouped with the other
3214
3215 ones. Move oSecurityProvider to match the order in the OpCodes enum. Patch
3216 from openbsd@academicsolutions.ch, ok djm@
3217
3218 OpenBSD-Commit-ID: 061e4505861ec1e02ba3a63e3d1b3be3cad458ec
3219
3220commit 8784b02dc49e1c98df4e7aca466be2f652ed4ad1
3221Author: dtucker@openbsd.org <dtucker@openbsd.org>
3222Date: Fri Dec 20 02:29:21 2019 +0000
3223
3224 upstream: Remove obsolete opcodes from the configuation enum.
3225
3226 Patch from openbsd@academicsolutions.ch, ok djm@
3227
3228 OpenBSD-Commit-ID: 395c202228872ce8d9044cc08552ac969f51e01b
3229
3230commit 345be6091bdc9be09c90a937d1320f97c01fab2a
3231Author: dtucker@openbsd.org <dtucker@openbsd.org>
3232Date: Fri Dec 20 02:11:38 2019 +0000
3233
3234 upstream: Remove now-obsolete config options from example in
3235
3236 comment. Patch from openbsd@academicsolutions.ch, ok djm@
3237
3238 OpenBSD-Commit-ID: 35862beb0927b1cb0af476ec23cc07f6e3006101
3239
3240commit ae024b22c4fd68e7f39681d605585889f9511108
3241Author: naddy@openbsd.org <naddy@openbsd.org>
3242Date: Thu Dec 19 15:09:30 2019 +0000
3243
3244 upstream: Document that security key-hosted keys can act as host
3245
3246 keys.
3247
3248 Update the list of default host key algorithms in ssh_config.5 and
3249 sshd_config.5. Copy the description of the SecurityKeyProvider
3250 option to sshd_config.5.
3251
3252 ok jmc@
3253
3254 OpenBSD-Commit-ID: edadf3566ab5e94582df4377fee3b8b702c7eca0
3255
3256commit bc2dc091e0ac4ff6245c43a61ebe12c7e9ea0b7f
3257Author: dtucker@openbsd.org <dtucker@openbsd.org>
3258Date: Thu Dec 19 03:50:01 2019 +0000
3259
3260 upstream: "Forward security" -> "Forward secrecy" since that's the
3261
3262 correct term. Add "MAC" since we use that acronym in other man pages. ok
3263 naddy@
3264
3265 OpenBSD-Commit-ID: c35529e511788586725fb63bda3459e10738c5f5
3266
3267commit e905f7260d72bc0e33ef5f10a0db737ff6e77ba7
3268Author: naddy@openbsd.org <naddy@openbsd.org>
3269Date: Tue Dec 17 16:21:07 2019 +0000
3270
3271 upstream: cut obsolete lists of crypto algorithms from outline of
3272
3273 how SSH works ok markus@ jmc@
3274
3275 OpenBSD-Commit-ID: 8e34973f232ab48c4d4f5d07df48d501708b9160
3276
3277commit f65cf1163ff01531ae02f3f9210391d0d692f699
3278Author: tobhe@openbsd.org <tobhe@openbsd.org>
3279Date: Mon Dec 16 13:58:53 2019 +0000
3280
3281 upstream: strdup may return NULL if memory allocation fails. Use
3282
3283 the safer xstrdup which fatals on allocation failures.
3284
3285 ok markus@
3286
3287 OpenBSD-Commit-ID: 8b608d387120630753cbcb8110e0b019c0c9a0d0
3288
3289commit 57634bfc5708477826c0be265ddc59b9d83e4886
3290Author: djm@openbsd.org <djm@openbsd.org>
3291Date: Mon Dec 16 03:16:58 2019 +0000
3292
3293 upstream: sort sk-* methods behind their plain key methods cousins
3294
3295 for now
3296
3297 OpenBSD-Commit-ID: c97e22c2b28c0d12ee389b8b4ef5f2ada7908828
3298
3299commit b8df8fe920e697edcc69c520390b78c3b7ad9d84
3300Author: Darren Tucker <dtucker@dtucker.net>
3301Date: Tue Dec 17 19:46:15 2019 +1100
3302
3303 Mac OS X has PAM too.
3304
3305commit bf8de8b8251af69b5ce96a8faa69145af156af4d
3306Author: Darren Tucker <dtucker@dtucker.net>
3307Date: Tue Dec 17 19:37:06 2019 +1100
3308
3309 Show portable tarball pattern in example.
3310
3311commit a19ef613e98141cc37c8acdeebe285b9dbe2531e
3312Author: Darren Tucker <dtucker@dtucker.net>
3313Date: Tue Dec 17 19:35:59 2019 +1100
3314
3315 OpenSSL is now optional.
3316
3317commit 1a7217ac063e48cf0082895aeee81ed2b8a57191
3318Author: djm@openbsd.org <djm@openbsd.org>
3319Date: Sun Dec 15 18:58:33 2019 +0000
3320
3321 upstream: adapt to ssh-sk-client change
3322
3323 OpenBSD-Regress-ID: 40481999a5928d635ab2e5b029e8239c112005ea
3324
3325commit a7fc1df246e80bfdabd09b069b91c72f9c578ca8
3326Author: djm@openbsd.org <djm@openbsd.org>
3327Date: Wed Dec 11 18:47:14 2019 +0000
3328
3329 upstream: it's no longer possible to disable privilege separation
3330
3331 in sshd, so don't double the tests' work by trying both off/on
3332
3333 OpenBSD-Regress-ID: d366665466dbd09e9b707305da884be3e7619c68
3334
3335commit 3145d38ea06820a66c0f5e068f49af14fd2b7ac1
3336Author: djm@openbsd.org <djm@openbsd.org>
3337Date: Sun Dec 15 20:59:23 2019 +0000
3338
3339 upstream: don't treat HostKeyAgent=none as a path either; avoids
3340
3341 spurious warnings from the cfgparse regress test
3342
3343 OpenBSD-Commit-ID: ba49ea7a5c92b8a16cb9c2e975dbb163853afc54
3344
3345commit 747e25192f436e71dd39e15d65aa32bca967533a
3346Author: djm@openbsd.org <djm@openbsd.org>
3347Date: Sun Dec 15 20:57:15 2019 +0000
3348
3349 upstream: do not attempt to find an absolute path for sshd_config
3350
3351 SecurityKeyProvider=internal - unbreaks cfgparse regress test
3352
3353 OpenBSD-Commit-ID: d2ddcf525c0dc3c8339522360c10b3c70f1fd641
3354
3355commit 9b6e30b96b094ad787511a5b989253e3b8fe1789
3356Author: djm@openbsd.org <djm@openbsd.org>
3357Date: Sun Dec 15 19:47:10 2019 +0000
3358
3359 upstream: allow ssh-keyscan to find security key hostkeys
3360
3361 OpenBSD-Commit-ID: 1fe822a7f714df19a7e7184e3a3bbfbf546811d3
3362
3363commit 56584cce75f3d20aaa30befc7cbd331d922927f3
3364Author: djm@openbsd.org <djm@openbsd.org>
3365Date: Sun Dec 15 18:57:30 2019 +0000
3366
3367 upstream: allow security keys to act as host keys as well as user
3368
3369 keys.
3370
3371 Previously we didn't do this because we didn't want to expose
3372 the attack surface presented by USB and FIDO protocol handling,
3373 but now that this is insulated behind ssh-sk-helper there is
3374 less risk.
3375
3376 ok markus@
3377
3378 OpenBSD-Commit-ID: 77b068dd133b8d87e0f010987bd5131e640ee64c
3379
3380commit 5af6fd5461bb709304e6979c8b7856c7af921c9e
3381Author: Darren Tucker <dtucker@dtucker.net>
3382Date: Mon Dec 16 13:55:56 2019 +1100
3383
3384 Allow clock_nanosleep_time64 in seccomp sandbox.
3385
3386 Needed on Linux ARM. bz#3100, patch from jjelen@redhat.com.
3387
3388commit fff8ff6dd580e1a72ba09a6775d185175cdc8d13
3389Author: Darren Tucker <dtucker@dtucker.net>
3390Date: Sun Dec 15 18:27:02 2019 +1100
3391
3392 Put SK ECDSA bits inside ifdef OPENSSL_HAS_ECC.
3393
3394 Fixes build when linking against OpenSSLs built with no-ec.
3395
3396commit 9244990ecdcfa36bb9371058111685b05f201c1e
3397Author: Damien Miller <djm@mindrot.org>
3398Date: Sat Dec 14 09:21:46 2019 +1100
3399
3400 remove a bunch of ENABLE_SK #ifdefs
3401
3402 The ssh-sk-helper client API gives us a nice place to disable
3403 security key support when it is wasn't enabled at compile time,
3404 so we don't need to check everywere.
3405
3406 Also, verification of security key signatures can remain enabled
3407 all the time - it has no additional dependencies. So sshd can
3408 accept security key pubkeys in authorized_keys, etc regardless of
3409 the host's support for dlopen, etc.
3410
3411commit a33ab1688b5c460a7e2a301418241ce1b13b2638
3412Author: Damien Miller <djm@mindrot.org>
3413Date: Sat Dec 14 09:15:06 2019 +1100
3414
3415 ssh-sk-client.c needs includes.h
3416
3417commit 633778d567ad50b63d2a3bca5e1b97d279d236d9
3418Author: Damien Miller <djm@mindrot.org>
3419Date: Sat Dec 14 08:40:33 2019 +1100
3420
3421 only link ssh-sk-helper against libfido2
3422
3423commit 7b47b40b170db4d6f41da0479575f6d99dd7228a
3424Author: Damien Miller <djm@mindrot.org>
3425Date: Sat Dec 14 08:20:52 2019 +1100
3426
3427 adapt Makefile to ssh-sk-client everywhere
3428
3429commit f45f3a8a12e2bee601046b916e6c5cd6eae08048
3430Author: Damien Miller <djm@mindrot.org>
3431Date: Sat Dec 14 07:53:11 2019 +1100
3432
3433 fixup
3434
3435commit d21434766764d5babf99fc3937c19b625c0f6334
3436Author: djm@openbsd.org <djm@openbsd.org>
3437Date: Fri Dec 13 20:16:56 2019 +0000
3438
3439 upstream: actually commit the ssh-sk-helper client code; ok markus
3440
3441 OpenBSD-Commit-ID: fd2ea776a5bbbf4d452989d3c3054cf25a5e0589
3442
3443commit 611073fb40ecaf4ac65094e403edea3a08deb700
3444Author: djm@openbsd.org <djm@openbsd.org>
3445Date: Fri Dec 13 19:11:14 2019 +0000
3446
3447 upstream: perform security key enrollment via ssh-sk-helper too.
3448
3449 This means that ssh-keygen no longer needs to link against ssh-sk-helper, and
3450 only ssh-sk-helper needs libfido2 and /dev/uhid* access;
3451
3452 feedback & ok markus@
3453
3454 OpenBSD-Commit-ID: 9464233fab95708d2ff059f8bee29c0d1f270800
3455
3456commit 612b1dd1ec91ffb1e01f58cca0c6eb1d47bf4423
3457Author: djm@openbsd.org <djm@openbsd.org>
3458Date: Fri Dec 13 19:09:37 2019 +0000
3459
3460 upstream: allow sshbuf_put_stringb(buf, NULL); ok markus@
3461
3462 OpenBSD-Commit-ID: 91482c1ada9adb283165d48dafbb88ae91c657bd
3463
3464commit b52ec0ba3983859514aa7b57d6100fa9759fe696
3465Author: djm@openbsd.org <djm@openbsd.org>
3466Date: Fri Dec 13 19:09:10 2019 +0000
3467
3468 upstream: use ssh-sk-helper for all security key signing operations
3469
3470 This extracts and refactors the client interface for ssh-sk-helper
3471 from ssh-agent and generalises it for use by the other programs.
3472 This means that most OpenSSH tools no longer need to link against
3473 libfido2 or directly interact with /dev/uhid*
3474
3475 requested by, feedback and ok markus@
3476
3477 OpenBSD-Commit-ID: 1abcd3aea9a7460eccfbf8ca154cdfa62f1dc93f
3478
3479commit c33d46868c3d88e04a92610cdb429094aeeb5847
3480Author: djm@openbsd.org <djm@openbsd.org>
3481Date: Wed Dec 11 22:19:47 2019 +0000
3482
3483 upstream: add a note about the 'extensions' field in the signed
3484
3485 object
3486
3487 OpenBSD-Commit-ID: 67c01e0565b258e0818c1ccfe1f1aeaf9a0d4c7b
3488
3489commit a62f4e1960691f3aeb1f972e009788b29e2ae464
3490Author: djm@openbsd.org <djm@openbsd.org>
3491Date: Tue Dec 10 23:37:31 2019 +0000
3492
3493 upstream: some more corrections for documentation problems spotted
3494
3495 by Ron Frederick
3496
3497 document certifiate private key format
3498 correct flags type for sk-ssh-ed25519@openssh.com keys
3499
3500 OpenBSD-Commit-ID: fc4e9a1ed7f9f7f9dd83e2e2c59327912e933e74
3501
3502commit 22d4beb79622fc82d7111ac941269861fc7aef8d
3503Author: djm@openbsd.org <djm@openbsd.org>
3504Date: Tue Dec 10 23:21:56 2019 +0000
3505
3506 upstream: loading security keys into ssh-agent used the extension
3507
3508 constraint "sk-provider@openssh.com", not "sk@openssh.com"; spotted by Ron
3509 Frederick
3510
3511 OpenBSD-Commit-ID: dbfba09edbe023abadd5f59c1492df9073b0e51d
3512
3513commit 75f7f22a43799f6d25dffd9d6683de1601da05a3
3514Author: djm@openbsd.org <djm@openbsd.org>
3515Date: Tue Dec 10 22:43:19 2019 +0000
3516
3517 upstream: add security key types to list of keys allowed to act as
3518
3519 CAs; spotted by Ron Frederick
3520
3521 OpenBSD-Commit-ID: 9bb0dfff927b4f7aa70679f983f84c69d45656c3
3522
3523commit 516605f2d596884cedc2beed6b262716ec76f63d
3524Author: djm@openbsd.org <djm@openbsd.org>
3525Date: Tue Dec 10 22:37:20 2019 +0000
3526
3527 upstream: when acting as a CA and using a security key as the CA
3528
3529 key, remind the user to touch they key to authorise the signature.
3530
3531 OpenBSD-Commit-ID: fe58733edd367362f9766b526a8b56827cc439c1
3532
3533commit c4036fe75ea5a4d03a2a40be1f3660dcbbfa01b2
3534Author: djm@openbsd.org <djm@openbsd.org>
3535Date: Tue Dec 10 22:36:08 2019 +0000
3536
3537 upstream: chop some unnecessary and confusing verbiage from the
3538
3539 security key protocol description; feedback from Ron Frederick
3540
3541 OpenBSD-Commit-ID: 048c9483027fbf9c995e5a51b3ac502989085a42
3542
3543commit 59175a350fe1091af7528b2971e3273aa7ca7295
3544Author: djm@openbsd.org <djm@openbsd.org>
3545Date: Fri Dec 6 03:06:08 2019 +0000
3546
3547 upstream: fix setting of $SSH_ASKPASS_PROMPT - it shouldn't be set
3548
3549 when asking passphrases, only when confirming the use of a key (i.e. for
3550 ssh-agent keys added with "ssh-add -c keyfile")
3551
3552 OpenBSD-Commit-ID: 6643c82960d9427d5972eb702c917b3b838ecf89
3553
3554commit 36eaa356d391a23a2d4e3a8aaa0223abc70b9822
3555Author: djm@openbsd.org <djm@openbsd.org>
3556Date: Fri Dec 6 02:55:21 2019 +0000
3557
3558 upstream: bring the __func__
3559
3560 OpenBSD-Commit-ID: 71a3a45b0fe1b8f680ff95cf264aa81f7abbff67
3561
3562commit 483cc723d1ff3b7fdafc6239348040a608ebc78d
3563Author: jmc@openbsd.org <jmc@openbsd.org>
3564Date: Sat Nov 30 07:07:59 2019 +0000
3565
3566 upstream: tweak the Nd lines for a bit of consistency; ok markus
3567
3568 OpenBSD-Commit-ID: 876651bdde06bc1e72dd4bd7ad599f42a6ce5a16
3569
3570commit afffd310360b155df2133d1f5f1ab2f4e939b570
3571Author: Darren Tucker <dtucker@dtucker.net>
3572Date: Wed Dec 11 13:22:06 2019 +1100
3573
3574 Check if memmem is declared in system headers.
3575
3576 If the system (or one of the dependencies) implements memmem but does
3577 not define the header, we would not declare it either resulting in
3578 compiler warnings. Check for declaration explicitly. bz#3102.
3579
3580commit ad8cd420797695f3b580aea1034b9de60bede9b9
3581Author: Darren Tucker <dtucker@dtucker.net>
3582Date: Wed Dec 11 13:12:01 2019 +1100
3583
3584 Sort depends.
3585
3586commit 5e3abff39e01817f6866494416f2ada25c316018
3587Author: Darren Tucker <dtucker@dtucker.net>
3588Date: Wed Dec 11 13:09:34 2019 +1100
3589
3590 Sort .depend when rebuilding.
3591
3592 This makes diffs more stable between makedepend implementations.
3593
3594commit 5df9d1f5c0943367d9b68435f4c82224ce11a73f
3595Author: Darren Tucker <dtucker@dtucker.net>
3596Date: Wed Dec 11 13:06:43 2019 +1100
3597
3598 Update depend to include sk files.
3599
3600commit 9a967c5bbfca35835165f7d8a6165009f5b21872
3601Author: Darren Tucker <dtucker@dtucker.net>
3602Date: Mon Dec 9 20:25:26 2019 +1100
3603
3604 Describe how to build libcrypto as PIC.
3605
3606 While there, move the OpenSSL 1.1.0g caveat closer to the other version
3607 information.
3608
3609commit b66fa5da25c4b5b67cf9f0ce7af513f5a6a6a686
3610Author: Darren Tucker <dtucker@dtucker.net>
3611Date: Mon Dec 9 17:23:22 2019 +1100
3612
3613 Recommend running LibreSSL or OpenSSL self-tests.
3614
3615commit fa7924008e838cded7e8a561356ffe5e06e0ed64
3616Author: Darren Tucker <dtucker@dtucker.net>
3617Date: Fri Dec 6 14:17:26 2019 +1100
3618
3619 Wrap ECC specific bits in ifdef.
3620
3621 Fixes tests when built against an OpenSSL configured with no-ec.
3622
3623commit 2ff822eabd7d4461743f22d3b9ba35ab76069df5
3624Author: Darren Tucker <dtucker@dtucker.net>
3625Date: Fri Nov 29 20:21:36 2019 +1100
3626
3627 Wrap sha2.h include in ifdef.
3628
3629 Fixes build --without-openssl on at least Fedora.
3630
3631commit 443848155ffcda65a6077aac118c861b503a093f
3632Author: Damien Miller <djm@mindrot.org>
3633Date: Fri Nov 29 15:10:21 2019 +1100
3634
3635 compile sk-dummy.so with no-PIE version of LDFLAGS
3636
3637 This lets it pick up the -L path to libcrypto for example.
3638
3639commit 37f5b5346e4cc6a894245aa89d2930649bb7045b
3640Author: Damien Miller <djm@mindrot.org>
3641Date: Fri Nov 29 14:48:46 2019 +1100
3642
3643 includes.h for sk-dummy.c, dummy
3644
3645commit b218055e59a7c1a1816f7a55ca18e3f3c05d63a4
3646Author: Damien Miller <djm@mindrot.org>
3647Date: Fri Nov 29 12:32:23 2019 +1100
3648
3649 (yet) another x-platform fix for sk-dummy.so
3650
3651 Check for -fPIC support from compiler
3652
3653 Compile libopenbsd-compat -fPIC
3654
3655 Don't mix -fPIE and -fPIC when compiling
3656
3657commit 0dedb703adcd98d0dbc4479f5f312a2bd3df2850
3658Author: Damien Miller <djm@mindrot.org>
3659Date: Fri Nov 29 11:53:57 2019 +1100
3660
3661 needs includes.h for WITH_OPENSSL
3662
3663commit ef3853bb94c2c72e7eda0de6cec0bcb1da62058f
3664Author: Damien Miller <djm@mindrot.org>
3665Date: Fri Nov 29 11:52:23 2019 +1100
3666
3667 another attempt at sk-dummy.so working x-platform
3668
3669 include a fatal() implementation to satisfy libopenbsd-compat
3670
3671 clean up .lo and .so files
3672
3673 .gitignore .lo and .so files
3674
3675commit d46ac56f1cbd5a855a2d5e7309f90d383dcf6431
3676Author: djm@openbsd.org <djm@openbsd.org>
3677Date: Fri Nov 29 00:13:29 2019 +0000
3678
3679 upstream: lots of dependencies go away here with ed25519 no longer
3680
3681 needing the ssh_digest API.
3682
3683 OpenBSD-Regress-ID: 785847ec78cb580d141e29abce351a436d6b5d49
3684
3685commit 7404b81f25a4a7847380c0f0cf7f1bea5f0a5cd3
3686Author: djm@openbsd.org <djm@openbsd.org>
3687Date: Fri Nov 29 00:11:21 2019 +0000
3688
3689 upstream: perform hashing directly in crypto_hash_sha512() using
3690
3691 libcrypto or libc SHA512 functions rather than calling ssh_digest_memory();
3692 avoids many dependencies on ssh code that complicate standalone use of
3693 ed25519, as we want to do in sk-dummy.so
3694
3695 OpenBSD-Commit-ID: 5a3c37593d3ba7add037b587cec44aaea088496d
3696
3697commit d39a865b7af93a7a9b5a64cf7cf0ef4396c80ba3
3698Author: jmc@openbsd.org <jmc@openbsd.org>
3699Date: Thu Nov 28 12:24:31 2019 +0000
3700
3701 upstream: improve the text for -A a little; input from naddy and
3702
3703 djm
3704
3705 OpenBSD-Commit-ID: f9cdfb1d6dbb9887c4bf3bb25f9c7a94294c988d
3706
3707commit 9a0e01bd0c61f553ead96b5af84abd73865847b8
3708Author: jmc@openbsd.org <jmc@openbsd.org>
3709Date: Thu Nov 28 12:23:25 2019 +0000
3710
3711 upstream: reshuffle the text to read better; input from naddy,
3712
3713 djmc, and dtucker
3714
3715 OpenBSD-Commit-ID: a0b2aca2b67614dda3d6618ea097bf0610c35013
3716
3717commit 5ca52c0f2e5e7f7d01d8d557b994b5c2087bed00
3718Author: Damien Miller <djm@mindrot.org>
3719Date: Thu Nov 28 18:09:07 2019 +1100
3720
3721 $< doesn't work as` I thought; explicily list objs
3722
3723commit 18e84bfdc5906a73405c3b42d7f840013bbffe34
3724Author: djm@openbsd.org <djm@openbsd.org>
3725Date: Thu Nov 28 05:20:54 2019 +0000
3726
3727 upstream: tweak wording
3728
3729 OpenBSD-Commit-ID: bd002ca1599b71331faca735ff5f6de29e32222e
3730
3731commit 8ef5bf9d03aa0f047711cff47f5ffbe3b33ff8c9
3732Author: Damien Miller <djm@mindrot.org>
3733Date: Thu Nov 28 13:12:30 2019 +1100
3734
3735 missing .SUFFIXES line makes make sad
3736
3737commit 323da82b8ea993b7f2c5793fd53b4f5ca105d19d
3738Author: Damien Miller <djm@mindrot.org>
3739Date: Thu Nov 28 09:53:42 2019 +1100
3740
3741 (hopefully) fix out of tree builds of sk-dummy.so
3742
3743commit d8b2838c5d19bf409d44ede4d32df8ee47aeb4cd
3744Author: djm@openbsd.org <djm@openbsd.org>
3745Date: Wed Nov 27 22:32:11 2019 +0000
3746
3747 upstream: remove stray semicolon after closing brace of function;
3748
3749 from Michael Forney
3750
3751 OpenBSD-Commit-ID: fda95acb799bb160d15e205ee126117cf33da3a7
3752
3753commit 6e1d1bbf5a3eca875005e0c87f341a0a03799809
3754Author: dtucker@openbsd.org <dtucker@openbsd.org>
3755Date: Wed Nov 27 05:38:43 2019 +0000
3756
3757 upstream: Revert previous commit. The channels code still uses int
3758
3759 in many places for channel ids so the INT_MAX check still makes sense.
3760
3761 OpenBSD-Commit-ID: 532e4b644791b826956c3c61d6ac6da39bac84bf
3762
3763commit 48989244658b9748b6801034ff4ffbdfc6b1520f
3764Author: Damien Miller <djm@mindrot.org>
3765Date: Wed Nov 27 16:03:12 2019 +1100
3766
3767 wire sk-dummy.so into test suite
3768
3769commit f79364bacaebde4f1c260318ab460fceacace02f
3770Author: djm@openbsd.org <djm@openbsd.org>
3771Date: Wed Nov 27 05:00:17 2019 +0000
3772
3773 upstream: use error()+_exit() instead of fatal() to avoid running
3774
3775 cleanup handlers in child process; spotted via weird regress failures in
3776 portable
3777
3778 OpenBSD-Commit-ID: 6902a9bb3987c7d347774444f7979b8a9ba7f412
3779
3780commit 70ec5e5e2681bcd409a9df94a2fec6f57a750945
3781Author: dtucker@openbsd.org <dtucker@openbsd.org>
3782Date: Wed Nov 27 03:34:04 2019 +0000
3783
3784 upstream: Make channel_id u_int32_t and remove unnecessary check
3785
3786 and cast that were left over from the type conversion. Noted by
3787 t-hashida@amiya.co.jp in bz#3098, ok markus@ djm@
3788
3789 OpenBSD-Commit-ID: 3ad105b6a905284e780b1fd7ff118e1c346e90b5
3790
3791commit ad44ca81bea83657d558aaef5a1d789a9032bac3
3792Author: djm@openbsd.org <djm@openbsd.org>
3793Date: Tue Nov 26 23:43:10 2019 +0000
3794
3795 upstream: test FIDO2/U2F key types; ok markus@
3796
3797 OpenBSD-Regress-ID: 367e06d5a260407619b4b113ea0bd7004a435474
3798
3799commit c6efa8a91af1d4fdb43909a23a0a4ffa012155ad
3800Author: djm@openbsd.org <djm@openbsd.org>
3801Date: Tue Nov 26 23:41:23 2019 +0000
3802
3803 upstream: add dummy security key middleware based on work by
3804
3805 markus@
3806
3807 This will allow us to test U2F/FIDO2 support in OpenSSH without
3808 requiring real hardware.
3809
3810 ok markus@
3811
3812 OpenBSD-Regress-ID: 88b309464b8850c320cf7513f26d97ee1fdf9aae
3813
3814commit 8635afa1cdc21366d61730d943f3cf61861899c8
3815Author: jmc@openbsd.org <jmc@openbsd.org>
3816Date: Tue Nov 26 22:42:26 2019 +0000
3817
3818 upstream: tweak previous;
3819
3820 OpenBSD-Commit-ID: a4c097364c75da320f1b291568db830fb1ee4883
3821
3822commit e0d38ae9bc8c0de421605b9021d8144e4d8ff22b
3823Author: djm@openbsd.org <djm@openbsd.org>
3824Date: Tue Nov 26 03:04:27 2019 +0000
3825
3826 upstream: more debugging; behind DEBUG_SK
3827
3828 OpenBSD-Commit-ID: a978896227118557505999ddefc1f4c839818b60
3829
3830commit 9281d4311b8abc63b88259f354944c53f9b0b3c7
3831Author: Damien Miller <djm@mindrot.org>
3832Date: Mon Nov 25 21:47:49 2019 +1100
3833
3834 unbreak fuzzers for recent security key changes
3835
3836commit c5f1cc993597fed0a9013743556b1567f476c677
3837Author: djm@openbsd.org <djm@openbsd.org>
3838Date: Mon Nov 25 10:32:35 2019 +0000
3839
3840 upstream: unbreak tests for recent security key changes
3841
3842 OpenBSD-Regress-ID: 2cdf2fcae9962ca4d711338f3ceec3c1391bdf95
3843
3844commit 64988266820cc90a45a21672be9d762cbde8d34d
3845Author: djm@openbsd.org <djm@openbsd.org>
3846Date: Mon Nov 25 06:53:04 2019 +0000
3847
3848 upstream: unbreak after security key support landed
3849
3850 OpenBSD-Regress-ID: 3ab578b0dbeb2aa6d9969b54a9c1bad329c0dcba
3851
3852commit e65e25c81e22ea622e89a142a303726a3882384f
3853Author: tb@openbsd.org <tb@openbsd.org>
3854Date: Thu Nov 21 05:18:47 2019 +0000
3855
3856 upstream: Remove workaround for broken 'openssl rsa -text' output
3857
3858 that was fixed in libcrypto/rsa/rsa_ameth.c r1.24.
3859
3860 ok dtucker inoguchi
3861
3862 OpenBSD-Regress-ID: c260edfac177daa8fcce90141587cf04a95c4f5f
3863
3864commit 21377ec2a9378579ba4b44a681af7bbca77581f4
3865Author: djm@openbsd.org <djm@openbsd.org>
3866Date: Mon Nov 25 10:23:36 2019 +0000
3867
3868 upstream: redundant test
3869
3870 OpenBSD-Commit-ID: 38fa7806c528a590d91ae560e67bd8b246c2d7a3
3871
3872commit 664deef95a2e770812533439b8bdd3f3c291ae59
3873Author: djm@openbsd.org <djm@openbsd.org>
3874Date: Mon Nov 25 00:57:51 2019 +0000
3875
3876 upstream: document the "no-touch-required" certificate extension;
3877
3878 ok markus, feedback deraadt
3879
3880 OpenBSD-Commit-ID: 47640122b13f825e9c404ea99803b2372246579d
3881
3882commit 26cb128b31efdd5395153f4943f5be3eddc07033
3883Author: djm@openbsd.org <djm@openbsd.org>
3884Date: Mon Nov 25 00:57:27 2019 +0000
3885
3886 upstream: Print a key touch reminder when generating a security
3887
3888 key. Most keys require a touch to authorize the operation.
3889
3890 OpenBSD-Commit-ID: 7fe8b23edbf33e1bb81741b9f25e9a63be5f6b68
3891
3892commit daeaf4136927c2a82af1399022103d67ff03f74a
3893Author: djm@openbsd.org <djm@openbsd.org>
3894Date: Mon Nov 25 00:55:58 2019 +0000
3895
3896 upstream: allow "ssh-keygen -x no-touch-required" when generating a
3897
3898 security key keypair to request one that does not require a touch for each
3899 authentication attempt. The default remains to require touch.
3900
3901 feedback deraadt; ok markus@
3902
3903 OpenBSD-Commit-ID: 887e7084b2e89c0c62d1598ac378aad8e434bcbd
3904
3905commit 2e71263b80fec7ad977e098004fef7d122169d40
3906Author: djm@openbsd.org <djm@openbsd.org>
3907Date: Mon Nov 25 00:54:23 2019 +0000
3908
3909 upstream: add a "no-touch-required" option for authorized_keys and
3910
3911 a similar extension for certificates. This option disables the default
3912 requirement that security key signatures attest that the user touched their
3913 key to authorize them.
3914
3915 feedback deraadt, ok markus
3916
3917 OpenBSD-Commit-ID: f1fb56151ba68d55d554d0f6d3d4dba0cf1a452e
3918
3919commit 0fddf2967ac51d518e300408a0d7e6adf4cd2634
3920Author: djm@openbsd.org <djm@openbsd.org>
3921Date: Mon Nov 25 00:52:46 2019 +0000
3922
3923 upstream: Add a sshd_config PubkeyAuthOptions directive
3924
3925 This directive has a single valid option "no-touch-required" that
3926 causes sshd to skip checking whether user presence was tested before
3927 a security key signature was made (usually by the user touching the
3928 key).
3929
3930 ok markus@
3931
3932 OpenBSD-Commit-ID: 46e434a49802d4ed82bc0aa38cb985c198c407de
3933
3934commit b7e74ea072919b31391bc0f5ff653f80b9f5e84f
3935Author: djm@openbsd.org <djm@openbsd.org>
3936Date: Mon Nov 25 00:51:37 2019 +0000
3937
3938 upstream: Add new structure for signature options
3939
3940 This is populated during signature verification with additional fields
3941 that are present in and covered by the signature. At the moment, it is
3942 only used to record security key-specific options, especially the flags
3943 field.
3944
3945 with and ok markus@
3946
3947 OpenBSD-Commit-ID: 338a1f0e04904008836130bedb9ece4faafd4e49
3948
3949commit d2b0f88178ec9e3f11b606bf1004ac2fe541a2c3
3950Author: djm@openbsd.org <djm@openbsd.org>
3951Date: Mon Nov 25 00:38:17 2019 +0000
3952
3953 upstream: memleak in error path
3954
3955 OpenBSD-Commit-ID: 93488431bf02dde85a854429362695d2d43d9112
3956
3957commit e2c0a21ade5e0bd7f0aab08d7eb9457f086681e9
3958Author: dtucker@openbsd.org <dtucker@openbsd.org>
3959Date: Fri Nov 22 06:50:30 2019 +0000
3960
3961 upstream: Wait for FD to be readable or writeable during a nonblocking
3962
3963 connect, not just readable. Prevents a timeout when the server doesn't
3964 immediately send a banner (eg multiplexers like sslh) but is also slightly
3965 quicker for other connections since, unlike ssh1, ssh2 doesn't specify
3966 that the client should parse the server banner before sending its own.
3967 Patch from mnissler@chromium.org, ok djm@
3968
3969 OpenBSD-Commit-ID: aba9cd8480d1d9dd31d0ca0422ea155c26c5df1d
3970
3971commit 2f95d43dc222ce194622b706682e8de07c9cfb42
3972Author: Darren Tucker <dtucker@dtucker.net>
3973Date: Wed Nov 20 16:34:11 2019 +1100
3974
3975 Include openssl compat header.
3976
3977 Fixes warning for ECDSA_SIG_set0 on OpenSSL versions prior to 1.1.
3978
3979commit a70d92f236576c032a45c39e68ca0d71e958d19d
3980Author: djm@openbsd.org <djm@openbsd.org>
3981Date: Tue Nov 19 22:23:19 2019 +0000
3982
3983 upstream: adjust on-wire signature encoding for ecdsa-sk keys to
3984
3985 better match ec25519-sk keys. Discussed with markus@ and Sebastian Kinne
3986
3987 NB. if you are depending on security keys (already?) then make sure you
3988 update both your clients and servers.
3989
3990 OpenBSD-Commit-ID: 53d88d8211f0dd02a7954d3af72017b1a79c0679
3991
3992commit 26369a5f7d9c4e4ef44a3e04910126e1bcea43d8
3993Author: djm@openbsd.org <djm@openbsd.org>
3994Date: Tue Nov 19 22:21:15 2019 +0000
3995
3996 upstream: a little more information from the monitor when signature
3997
3998 verification fails.
3999
4000 OpenBSD-Commit-ID: e6a30071e0518cac512f9e10be3dc3500e2003f3
4001
4002commit 4402d6c9b5bf128dcfae2429f1d41cdaa8849b6b
4003Author: jmc@openbsd.org <jmc@openbsd.org>
4004Date: Tue Nov 19 16:02:32 2019 +0000
4005
4006 upstream: revert previous: naddy pointed out what's meant to
4007
4008 happen. rethink needed...
4009
4010 OpenBSD-Commit-ID: fb0fede8123ea7f725fd65e00d49241c40bd3421
4011
4012commit 88056f881315233e990e4e04a815f8f96b4674e1
4013Author: jmc@openbsd.org <jmc@openbsd.org>
4014Date: Tue Nov 19 14:54:47 2019 +0000
4015
4016 upstream: -c and -s do not make sense with -k; reshuffle -k into
4017
4018 the main synopsis/usage; ok djm
4019
4020 OpenBSD-Commit-ID: f881ba253da015398ae8758d973e3390754869bc
4021
4022commit 2cf262c21f35296c2ff718cfdb52e0473a1c3983
4023Author: naddy@openbsd.org <naddy@openbsd.org>
4024Date: Mon Nov 18 23:17:48 2019 +0000
4025
4026 upstream: document '$' environment variable expansion for
4027
4028 SecurityKeyProvider; ok djm@
4029
4030 OpenBSD-Commit-ID: 76db507ebd336a573e1cd4146cc40019332c5799
4031
4032commit f0edda81c5ebccffcce52b182c3033531a1aab71
4033Author: naddy@openbsd.org <naddy@openbsd.org>
4034Date: Mon Nov 18 23:16:49 2019 +0000
4035
4036 upstream: more missing mentions of ed25519-sk; ok djm@
4037
4038 OpenBSD-Commit-ID: f242e53366f61697dffd53af881bc5daf78230ff
4039
4040commit 189550f5bc85148e85f4caa1f6b2fc623149a4ee
4041Author: naddy@openbsd.org <naddy@openbsd.org>
4042Date: Mon Nov 18 16:10:05 2019 +0000
4043
4044 upstream: additional missing stdarg.h includes when built without
4045
4046 WITH_OPENSSL; ok djm@
4047
4048 OpenBSD-Commit-ID: 881f9a2c4e2239849cee8bbf4faec9bab128f55b
4049
4050commit 723a5369864b338c48d22854bc2bb4ee5c083deb
4051Author: naddy@openbsd.org <naddy@openbsd.org>
4052Date: Mon Nov 18 16:08:57 2019 +0000
4053
4054 upstream: add the missing WITH_OPENSSL ifdefs after the ED25519-SK
4055
4056 addition; ok djm@
4057
4058 OpenBSD-Commit-ID: a9545e1c273e506cf70e328cbb9d0129b6d62474
4059
4060commit 478f4f98e4e93ae4ed1a8911dec4e5b75ea10f30
4061Author: Damien Miller <djm@mindrot.org>
4062Date: Tue Nov 19 08:52:24 2019 +1100
4063
4064 remove all EC algs from proposals, no just sk ones
4065
4066 ok dtucker@
4067
4068commit 6a7ef310da100f876a257b7367e3b0766dac3994
4069Author: Damien Miller <djm@mindrot.org>
4070Date: Mon Nov 18 22:22:04 2019 +1100
4071
4072 filter PUBKEY_DEFAULT_PK_ALG for ECC algorithms
4073
4074 Remove ECC algorithms from the PUBKEY_DEFAULT_PK_ALG list when
4075 compiling without ECC support in libcrypto.
4076
4077commit 64f56f1d1af3947a71a4c391f2c08747d19ee591
4078Author: dtucker@openbsd.org <dtucker@openbsd.org>
4079Date: Mon Nov 18 09:15:17 2019 +0000
4080
4081 upstream: LibreSSL change the format for openssl rsa -text output from
4082
4083 "publicExponent" to "Exponent" so accept either. with djm.
4084
4085 OpenBSD-Regress-ID: b7e6c4bf700029a31c98be14600d4472fe0467e6
4086
4087commit 4bfc0503ad94a2a7190686a89649567c20b8534f
4088Author: djm@openbsd.org <djm@openbsd.org>
4089Date: Mon Nov 18 06:58:00 2019 +0000
4090
4091 upstream: fix a bug that prevented serialisation of ed25519-sk keys
4092
4093 OpenBSD-Commit-ID: 066682b79333159cac04fcbe03ebd9c8dcc152a9
4094
4095commit d88205417084f523107fbe1bc92061635cd57fd2
4096Author: djm@openbsd.org <djm@openbsd.org>
4097Date: Mon Nov 18 06:39:36 2019 +0000
4098
4099 upstream: Fix incorrect error message when key certification fails
4100
4101 OpenBSD-Commit-ID: 7771bd77ee73f7116df37c734c41192943a73cee
4102
4103commit 740c4bc9875cbb4b9fc03fd5eac19df080f20df5
4104Author: djm@openbsd.org <djm@openbsd.org>
4105Date: Mon Nov 18 06:39:02 2019 +0000
4106
4107 upstream: fix bug that prevented certification of ed25519-sk keys
4108
4109 OpenBSD-Commit-ID: 64c8cc6f5de2cdd0ee3a81c3a9dee8d862645996
4110
4111commit 85409cbb505d8c463ab6e2284b4039764c7243de
4112Author: djm@openbsd.org <djm@openbsd.org>
4113Date: Mon Nov 18 06:24:17 2019 +0000
4114
4115 upstream: allow *-sk key types to be turned into certificates
4116
4117 OpenBSD-Commit-ID: cd365ee343934862286d0b011aa77fa739d2a945
4118
4119commit e2e1283404e06a22ac6135d057199e70dcadb8dd
4120Author: djm@openbsd.org <djm@openbsd.org>
4121Date: Mon Nov 18 04:55:02 2019 +0000
4122
4123 upstream: mention ed25519-sk key/cert types here too; prompted by
4124
4125 jmc@
4126
4127 OpenBSD-Commit-ID: e281977e4a4f121f3470517cbd5e483eee37b818
4128
4129commit 97dc5d1d82865a7d20f1eb193b5c62ce684024e5
4130Author: djm@openbsd.org <djm@openbsd.org>
4131Date: Mon Nov 18 04:50:45 2019 +0000
4132
4133 upstream: mention ed25519-sk in places where it is accepted;
4134
4135 prompted by jmc@
4136
4137 OpenBSD-Commit-ID: 076d386739ebe7336c2137e583bc7a5c9538a442
4138
4139commit 130664344862a8c7afd3e24d8d36ce40af41a99f
4140Author: djm@openbsd.org <djm@openbsd.org>
4141Date: Mon Nov 18 04:34:47 2019 +0000
4142
4143 upstream: document ed25519-sk pubkey, private key and certificate
4144
4145 formats
4146
4147 OpenBSD-Commit-ID: 795a7c1c80315412e701bef90e31e376ea2f3c88
4148
4149commit 71856e1142fc01628ce53098f8cfc74765464b35
4150Author: djm@openbsd.org <djm@openbsd.org>
4151Date: Mon Nov 18 04:29:50 2019 +0000
4152
4153 upstream: correct order or ecdsa-sk private key fields
4154
4155 OpenBSD-Commit-ID: 4d4a0c13226a79f0080ce6cbe74f73b03ed8092e
4156
4157commit 93fa2a6649ae3e0626cbff25c985a4573d63e3f2
4158Author: djm@openbsd.org <djm@openbsd.org>
4159Date: Mon Nov 18 04:16:53 2019 +0000
4160
4161 upstream: correct description of fields in pub/private keys (was
4162
4163 missing curve name); spotted by Sebastian Kinne
4164
4165 OpenBSD-Commit-ID: 2a11340dc7ed16200342d384fb45ecd4fcce26e7
4166
4167commit b497e920b409250309c4abe64229237b8f2730ba
4168Author: Damien Miller <djm@mindrot.org>
4169Date: Mon Nov 18 15:05:04 2019 +1100
4170
4171 Teach the GTK2/3 ssh-askpass the new prompt hints
4172
4173 ssh/ssh-agent now sets a hint environment variable $SSH_ASKPASS_PROMPT
4174 when running the askpass program. This is intended to allow the
4175 askpass to vary its UI across the three cases it supports: asking for
4176 a passphrase, confirming the use of a key and (recently) reminding
4177 a user to touch their security key.
4178
4179 This adapts the gnome-ssh-askpass[23] to use these hints. Specifically,
4180 for SSH_ASKPASS_PROMPT=confirm it will skip the text input box and show
4181 only "yes"/"no" buttons. For SSH_ASKPASS_PROMPT=none (used to remind
4182 users to tap their security key), it shows only a "close" button.
4183
4184 Help wanted: adapt the other askpass programs in active use, including
4185 x11-ssh-askpass, lxqt-openssh-askpass, etc.
4186
4187commit 857f49e91eeae6feb781ef5f5e26c38ca3d953ec
4188Author: Darren Tucker <dtucker@dtucker.net>
4189Date: Mon Nov 18 14:15:26 2019 +1100
4190
4191 Move ifdef OPENSSL_HAS_ECC.
4192
4193 Found by -Wimplicit-fallthrough: one ECC case was not inside the ifdef.
4194 ok djm@
4195
4196commit 6cf1c40096a79e5eedcf897c7cdb46bb32d4a3ee
4197Author: Darren Tucker <dtucker@dtucker.net>
4198Date: Mon Nov 18 14:14:18 2019 +1100
4199
4200 Enable -Wimplicit-fallthrough if supported
4201
4202 Suggested by djm.
4203
4204commit 103c51fd5f5ddc01cd6b5c1132e711765b921bf5
4205Author: djm@openbsd.org <djm@openbsd.org>
4206Date: Mon Nov 18 01:59:48 2019 +0000
4207
4208 upstream: missing break in getopt switch; spotted by Sebastian Kinne
4209
4210 OpenBSD-Commit-ID: f002dbf14dba5586e8407e90f0141148ade8e8fc
4211
4212commit 9a1225e8ca2ce1fe809910874935302234399a6d
4213Author: djm@openbsd.org <djm@openbsd.org>
4214Date: Sat Nov 16 23:17:20 2019 +0000
4215
4216 upstream: tweak debug message
4217
4218 OpenBSD-Commit-ID: 2bf336d3be0b7e3dd97920d7e7471146a281d2b9
4219
4220commit 4103a3ec7c68493dbc4f0994a229507e943a86d3
4221Author: djm@openbsd.org <djm@openbsd.org>
4222Date: Sat Nov 16 22:42:30 2019 +0000
4223
4224 upstream: a little debug() in the security key interface
4225
4226 OpenBSD-Commit-ID: 4c70300609a5c8b19707207bb7ad4109e963b0e8
4227
4228commit 05daa211de926f66f50b7380d637f84dc6341574
4229Author: djm@openbsd.org <djm@openbsd.org>
4230Date: Sat Nov 16 22:36:48 2019 +0000
4231
4232 upstream: always use ssh-sk-helper, even for the internal USB HID
4233
4234 support. This avoid the need for a wpath pledge in ssh-agent.
4235
4236 reported by jmc@
4237
4238 OpenBSD-Commit-ID: 19f799c4d020b870741d221335dbfa5e76691c23
4239
4240commit d431778a561d90131814f986b646299f9af33c8c
4241Author: markus@openbsd.org <markus@openbsd.org>
4242Date: Fri Nov 15 15:41:01 2019 +0000
4243
4244 upstream: fix typos in sk_enroll
4245
4246 OpenBSD-Commit-ID: faa9bf779e008b3e64e2eb1344d9b7d83b3c4487
4247
4248commit af90aec0443ec51e6b2d804cb91771d3905f8a6f
4249Author: jmc@openbsd.org <jmc@openbsd.org>
4250Date: Fri Nov 15 11:16:28 2019 +0000
4251
4252 upstream: double word;
4253
4254 OpenBSD-Commit-ID: 43d09bafa4ea9002078cb30ca9adc3dcc0b9c2b9
4255
4256commit fd1a96490cef7f945a1b3b5df4e90c8a1070f425
4257Author: djm@openbsd.org <djm@openbsd.org>
4258Date: Fri Nov 15 06:00:20 2019 +0000
4259
4260 upstream: remove most uses of BN_CTX
4261
4262 We weren't following the rules re BN_CTX_start/BN_CTX_end and the places
4263 we were using it didn't benefit from its use anyway. ok dtucker@
4264
4265 OpenBSD-Commit-ID: ea9ba6c0d2e6f6adfe00b309a8f41842fe12fc7a
4266
4267commit 39b87104cdd47baf79ef77dc81de62cea07d119f
4268Author: Darren Tucker <dtucker@dtucker.net>
4269Date: Fri Nov 15 18:56:54 2019 +1100
4270
4271 Add wrappers for other ultrix headers.
4272
4273 Wrappers protect against multiple inclusions for headers that don't do
4274 it themselves.
4275
4276commit 134a74f4e0cf750931f1125beb2a3f40c54c8809
4277Author: Darren Tucker <dtucker@dtucker.net>
4278Date: Fri Nov 15 18:55:13 2019 +1100
4279
4280 Add SSIZE_MAX when we define ssize_t.
4281
4282commit 9c6d0a3a1ed77989d8c5436d8c3cc6c7045c0197
4283Author: Darren Tucker <dtucker@dtucker.net>
4284Date: Fri Nov 15 17:13:19 2019 +1100
4285
4286 Remove ultrix realpath hack.
4287
4288commit c63fba5e3472307167850bbd84187186af7fa9f0
4289Author: djm@openbsd.org <djm@openbsd.org>
4290Date: Fri Nov 15 05:37:27 2019 +0000
4291
4292 upstream: unshield security key privkey before attempting signature
4293
4294 in agent. spotted by dtucker@
4295
4296 OpenBSD-Commit-ID: fb67d451665385b8a0a55371231c50aac67b91d2
4297
4298commit d165bb5396e3f718480e6039ca2cf77f5a2c2885
4299Author: deraadt@openbsd.org <deraadt@openbsd.org>
4300Date: Fri Nov 15 05:26:56 2019 +0000
4301
4302 upstream: rewrite c99-ism
4303
4304 OpenBSD-Commit-ID: d0c70cca29cfa7e6d9f7ec1d6d5dabea112499b3
4305
4306commit 03e06dd0e6e1c0a9f4b4b9de7def8a44dcbf93a7
4307Author: deraadt@openbsd.org <deraadt@openbsd.org>
4308Date: Fri Nov 15 05:25:52 2019 +0000
4309
4310 upstream: only clang understands those new -W options
4311
4312 OpenBSD-Commit-ID: d9b910e412d139141b072a905e66714870c38ac0
4313
4314commit 5c0bc273cba53f822b7d777bbb6c35d160d3b505
4315Author: Damien Miller <djm@mindrot.org>
4316Date: Fri Nov 15 16:08:00 2019 +1100
4317
4318 configure flag to built-in security key support
4319
4320 Require --with-security-key-builtin before enabling the built-in
4321 security key support (and consequent dependency on libfido2).
4322
4323commit fbcb9a7fa55300b8bd4c18bee024c6104c5a25d7
4324Author: Damien Miller <djm@mindrot.org>
4325Date: Fri Nov 15 16:06:30 2019 +1100
4326
4327 upstream commit
4328
4329 revision 1.48
4330 date: 2019/02/04 16:45:40; author: millert; state: Exp; lines: +16 -17; commitid: cpNtVC7erojNyctw;
4331 Make gl_pathc, gl_matchc and gl_offs size_t in glob_t to match POSIX.
4332 This requires a libc major version bump. OK deraadt@
4333
4334commit 2cfb11abac85885de0cb888bbeb9a3e4303105ea
4335Author: Damien Miller <djm@mindrot.org>
4336Date: Fri Nov 15 16:05:07 2019 +1100
4337
4338 upstream commit
4339
4340 revision 1.47
4341 date: 2017/05/08 14:53:27; author: millert; state: Exp; lines: +34 -21; commitid: sYfxfyUHAfarP8sE;
4342 Fix exponential CPU use with repeated '*' operators by changing '*'
4343 handling to be interative instead of recursive.
4344 Fix by Yves Orton, ported to OpenBSD glob.c by Ray Lai. OK tb@
4345
4346commit 228dd595c7882bb9b161dbb7d4dca15c8a5f03f5
4347Author: Damien Miller <djm@mindrot.org>
4348Date: Fri Nov 15 16:04:28 2019 +1100
4349
4350 upstream commit
4351
4352 revision 1.46
4353 date: 2015/12/28 22:08:18; author: mmcc; state: Exp; lines: +5 -9; commitid: 0uXuF2O13NH9q2e1;
4354 Remove NULL-checks before free() and a few related dead assignments.
4355
4356 ok and valuable input from millert@
4357
4358commit a16f748690139b9f452485d97511ad5e578f59b2
4359Author: Damien Miller <djm@mindrot.org>
4360Date: Fri Nov 15 16:02:43 2019 +1100
4361
4362 upstream commit
4363
4364 revision 1.44
4365 date: 2015/09/14 16:09:13; author: tedu; state: Exp; lines: +3 -5; commitid: iWfSX2BIn0sLw62l;
4366 remove null check before free. from Michael McConville
4367 ok semarie
4368
4369commit fd37cdeafe25adfcdc752280f535d28de7997ff1
4370Author: Damien Miller <djm@mindrot.org>
4371Date: Fri Nov 15 16:02:27 2019 +1100
4372
4373 upstream commit
4374
4375 revision 1.43
4376 date: 2015/06/13 16:57:04; author: deraadt; state: Exp; lines: +4 -4; commitid: zOUKuqWBdOPOz1SZ;
4377 in glob() initialize the glob_t before the first failure check.
4378 from j@pureftpd.org
4379 ok millert stsp
4380
4381commit fd62769c3882adea118dccaff80a06009874a2d1
4382Author: Damien Miller <djm@mindrot.org>
4383Date: Fri Nov 15 16:01:20 2019 +1100
4384
4385 upstream commit
4386
4387 revision 1.42
4388 date: 2015/02/05 12:59:57; author: millert; state: Exp; lines: +2 -1; commitid: DTQbfd4poqBW8iSJ;
4389 Include stdint.h, not limits.h to get SIZE_MAX. OK guenther@
4390
4391commit 2b6cba7ee2b8b36f393be739c860a9d2e5d8eb48
4392Author: Damien Miller <djm@mindrot.org>
4393Date: Fri Nov 15 16:00:07 2019 +1100
4394
4395 upstream commit
4396
4397 revision 1.41
4398 date: 2014/10/08 05:35:27; author: deraadt; state: Exp; lines: +3 -3; commitid: JwTGarRLHQKDgPh2;
4399 obvious realloc -> reallocarray conversion
4400
4401commit ab3600665387ae34785498558c4409e27f495b0b
4402Author: djm@openbsd.org <djm@openbsd.org>
4403Date: Fri Nov 15 04:12:32 2019 +0000
4404
4405 upstream: don't consult dlopen whitelist for internal security key
4406
4407 provider; spotted by dtucker@
4408
4409 OpenBSD-Commit-ID: bfe5fbd17e4ff95dd85b9212181652b54444192e
4410
4411commit 19f8ec428db835f68c1cfd63587e9880ccd6486c
4412Author: Damien Miller <djm@mindrot.org>
4413Date: Fri Nov 15 15:08:28 2019 +1100
4414
4415 upstream commit
4416
4417 revision 1.40
4418 date: 2013/09/30 12:02:34; author: millert; state: Exp; lines: +14 -15;
4419 Use PATH_MAX, NAME_MAX and LOGIN_NAME_MAX not MAXPATHNAMELEN,
4420 MAXNAMLEN or MAXLOGNAME where possible. OK deraadt@
4421
4422commit bb7413db98e418d4af791244660abf6c829783f5
4423Author: Damien Miller <djm@mindrot.org>
4424Date: Fri Nov 15 15:07:30 2019 +1100
4425
4426 upstream commit
4427
4428 revision 1.39
4429 date: 2012/01/20 07:09:42; author: tedu; state: Exp; lines: +4 -4;
4430 the glob stat limit is way too low. bump to 2048.
4431 while here, failed stats should count against the limit too.
4432 ok deraadt sthen stsp
4433
4434commit 01362cf7cb979525c014714e2bccf799a46e772e
4435Author: djm@openbsd.org <djm@openbsd.org>
4436Date: Fri Nov 15 03:41:57 2019 +0000
4437
4438 upstream: U2F tokens may return FIDO_ERR_USER_PRESENCE_REQUIRED when
4439
4440 probed to see if they own a key handle. Handle this case so the find_device()
4441 look can work for them. Reported by Michael Forney
4442
4443 OpenBSD-Commit-ID: 2ccd5b30a6ddfe4dba228b7159bf168601bd9166
4444
4445commit cf62307bc9758105913dcb91b418e4968ac2244d
4446Author: Darren Tucker <dtucker@dtucker.net>
4447Date: Fri Nov 15 14:01:00 2019 +1100
4448
4449 Add libfido2 to INSTALL.
4450
4451commit 69fbda1894349d1f420c842dfcbcc883239d1aa7
4452Author: Darren Tucker <dtucker@dtucker.net>
4453Date: Fri Nov 15 13:42:15 2019 +1100
4454
4455 libcrypto is now optional.
4456
4457commit 45ffa369886e37930776d7c15dd8b973242d6ecc
4458Author: djm@openbsd.org <djm@openbsd.org>
4459Date: Fri Nov 15 02:38:07 2019 +0000
4460
4461 upstream: show the "please touch your security key" notifier when
4462
4463 using the (default) build-in security key support.
4464
4465 OpenBSD-Commit-ID: 4707643aaa7124501d14e92d1364b20f312a6428
4466
4467commit 49dc9fa928d77807c53bdc2898db7fb515fe5eb3
4468Author: djm@openbsd.org <djm@openbsd.org>
4469Date: Fri Nov 15 02:37:24 2019 +0000
4470
4471 upstream: close the "touch your security key" notifier on the error
4472
4473 path too
4474
4475 OpenBSD-Commit-ID: c7628bf80505c1aefbb1de7abc8bb5ee51826829
4476
4477commit 22a82712e89bf17c27427aeba15795fb4011a0c2
4478Author: djm@openbsd.org <djm@openbsd.org>
4479Date: Fri Nov 15 02:20:06 2019 +0000
4480
4481 upstream: correct function name in debug message
4482
4483 OpenBSD-Commit-ID: 2482c99d2ce448f39282493050f8a01e3ffc39ab
4484
4485commit 018e2902a65c22faded215a7c588492c948f108c
4486Author: djm@openbsd.org <djm@openbsd.org>
4487Date: Fri Nov 15 00:32:40 2019 +0000
4488
4489 upstream: follow existing askpass logic for security key notifier:
4490
4491 fall back to _PATH_SSH_ASKPASS_DEFAULT if no $SSH_ASKPASS environment
4492 variable is set.
4493
4494 OpenBSD-Commit-ID: cda753726b13fb797bf7a9f7a0b3022d9ade4520
4495
4496commit 575d0042a94997c1eeb86a6dcfb30b3c7bdbcba3
4497Author: djm@openbsd.org <djm@openbsd.org>
4498Date: Thu Nov 14 21:56:52 2019 +0000
4499
4500 upstream: remove debugging goop that snuck in to last commit
4501
4502 OpenBSD-Commit-ID: 8ea4455a2d9364a0a04f9e4a2cbfa4c9fcefe77e
4503
4504commit 63a5b24f2dbdc9a4bf2182ac3db26731ddc617e8
4505Author: Damien Miller <djm@mindrot.org>
4506Date: Fri Nov 15 11:21:26 2019 +1100
4507
4508 don't fatal if libfido2 not found
4509
4510 spotted by dtucker@
4511
4512commit 129952a81c00c332721b4ba3ede868c720ad7f4e
4513Author: Damien Miller <djm@mindrot.org>
4514Date: Fri Nov 15 11:17:12 2019 +1100
4515
4516 correct object dependency
4517
4518commit 6bff9521ab9a9f7396d635755c342b72373bb4f9
4519Author: djm@openbsd.org <djm@openbsd.org>
4520Date: Thu Nov 14 21:27:29 2019 +0000
4521
4522 upstream: directly support U2F/FIDO2 security keys in OpenSSH by
4523
4524 linking against the (previously external) USB HID middleware. The dlopen()
4525 capability still exists for alternate middlewares, e.g. for Bluetooth, NFC
4526 and test/debugging.
4527
4528 OpenBSD-Commit-ID: 14446cf170ac0351f0d4792ba0bca53024930069
4529
4530commit 4f5e331cb8e11face3025aa6578662dde489c3ad
4531Author: markus@openbsd.org <markus@openbsd.org>
4532Date: Wed Nov 13 22:00:21 2019 +0000
4533
4534 upstream: in order to be able to figure out the number of
4535
4536 signatures left on a shielded key, we need to transfer the number of
4537 signatures left from the private to the public key. ok djm@
4538
4539 OpenBSD-Commit-ID: 8a5d0d260aeace47d372695fdae383ce9b962574
4540
4541commit dffd02e297e6c2a4e86775f293eb1b0ff01fb3df
4542Author: markus@openbsd.org <markus@openbsd.org>
4543Date: Wed Nov 13 20:25:45 2019 +0000
4544
4545 upstream: fix check for sig_s; noted by qsa at qualys.com
4546
4547 OpenBSD-Commit-ID: 34198084e4afb424a859f52c04bb2c9668a52867
4548
4549commit fc173aeb1526d4268db89ec5dfebaf8750dd26cd
4550Author: dtucker@openbsd.org <dtucker@openbsd.org>
4551Date: Wed Nov 13 11:25:11 2019 +0000
4552
4553 upstream: When clients get denied by MaxStartups, send a
4554
4555 noification prior to the SSH2 protocol banner according to RFC4253 section
4556 4.2. ok djm@ deraadt@ markus@
4557
4558 OpenBSD-Commit-ID: e5dabcb722d54dea18eafb336d50b733af4f9c63
4559
4560commit bf219920b70cafbf29ebc9890ef67d0efa54e738
4561Author: markus@openbsd.org <markus@openbsd.org>
4562Date: Wed Nov 13 07:53:10 2019 +0000
4563
4564 upstream: fix shield/unshield for xmss keys: - in ssh-agent we need
4565
4566 to delay the call to shield until we have received key specific options. -
4567 when serializing xmss keys for shield we need to deal with all optional
4568 components (e.g. state might not be loaded). ok djm@
4569
4570 OpenBSD-Commit-ID: cc2db82524b209468eb176d6b4d6b9486422f41f
4571
4572commit 40598b85d72a509566b7b2a6d57676c7231fed34
4573Author: deraadt@openbsd.org <deraadt@openbsd.org>
4574Date: Wed Nov 13 05:42:26 2019 +0000
4575
4576 upstream: remove size_t gl_pathc < 0 test, it is invalid. the
4577
4578 return value from glob() is sufficient. discussed with djm
4579
4580 OpenBSD-Commit-ID: c91203322db9caaf7efaf5ae90c794a91070be3c
4581
4582commit 72687c8e7c38736e3e64e833ee7aa8f9cd9efed1
4583Author: deraadt@openbsd.org <deraadt@openbsd.org>
4584Date: Wed Nov 13 04:47:52 2019 +0000
4585
4586 upstream: stdarg.h required more broadly; ok djm
4587
4588 OpenBSD-Commit-ID: b5b15674cde1b54d6dbbae8faf30d47e6e5d6513
4589
4590commit 1e0b248d47c96be944868a735553af8482300a07
4591Author: Darren Tucker <dtucker@dtucker.net>
4592Date: Thu Nov 14 16:08:17 2019 +1100
4593
4594 Put sshsk_sign call inside ifdef ENABLE_SK.
4595
4596 Fixes build against OpenSSL configured without ECC.
4597
4598commit 546274a6f89489d2e6be8a8b62f2bb63c87a61fd
4599Author: Darren Tucker <dtucker@dtucker.net>
4600Date: Wed Nov 13 23:27:31 2019 +1100
4601
4602 Remove duplicate __NR_clock_nanosleep
4603
4604commit b1c82f4b8adf3f42476d8a1f292df33fb7aa1a56
4605Author: Darren Tucker <dtucker@dtucker.net>
4606Date: Wed Nov 13 23:19:35 2019 +1100
4607
4608 seccomp: Allow clock_nanosleep() in sandbox.
4609
4610 seccomp: Allow clock_nanosleep() to make OpenSSH working with latest
4611 glibc. Patch from Jakub Jelen <jjelen@redhat.com> via bz #3093.
4612
4613commit 2b523d23804c13cb68db135b919fcf312c42b580
4614Author: Darren Tucker <dtucker@dtucker.net>
4615Date: Wed Nov 13 11:56:56 2019 +1100
4616
4617 Include stdarg.h for va_list in xmalloc.h.
4618
4619commit 245dcbdca5374296bdb9c48be6e24bdf6b1c0af7
4620Author: Darren Tucker <dtucker@dtucker.net>
4621Date: Wed Nov 13 11:19:26 2019 +1100
4622
4623 Put headers inside ifdef _AIX.
4624
4625 Prevents compile errors due to missing definitions (eg va_list) on
4626 non-AIX platforms.
4627
4628commit a4cc579c6ad2b2e54bdd6cc0d5e12c2288113a56
4629Author: Darren Tucker <dtucker@dtucker.net>
4630Date: Wed Nov 13 10:41:41 2019 +1100
4631
4632 Fix comment in match_usergroup_pattern_list.
4633
4634 Spotted by balu.gajjala@gmail.com via bz#3092.
4635
4636commit fccff339cab5aa66f2554e0188b83f980683490b
4637Author: djm@openbsd.org <djm@openbsd.org>
4638Date: Tue Nov 12 22:38:19 2019 +0000
4639
4640 upstream: allow an empty attestation certificate returned by a
4641
4642 security key enrollment - these are possible for tokens that only offer self-
4643 attestation. This also needs support from the middleware.
4644
4645 ok markus@
4646
4647 OpenBSD-Commit-ID: 135eeeb937088ef6830a25ca0bbe678dfd2c57cc
4648
4649commit e44bb61824e36d0d181a08489c16c378c486a974
4650Author: djm@openbsd.org <djm@openbsd.org>
4651Date: Tue Nov 12 22:36:44 2019 +0000
4652
4653 upstream: security keys typically need to be tapped/touched in
4654
4655 order to perform a signature operation. Notify the user when this is expected
4656 via the TTY (if available) or $SSH_ASKPASS if we can.
4657
4658 ok markus@
4659
4660 OpenBSD-Commit-ID: 0ef90a99a85d4a2a07217a58efb4df8444818609
4661
4662commit 4671211068441519011ac0e38c588317f4157ba1
4663Author: djm@openbsd.org <djm@openbsd.org>
4664Date: Tue Nov 12 22:35:02 2019 +0000
4665
4666 upstream: pass SSH_ASKPASS_PROMPT hint to y/n key confirm too
4667
4668 OpenBSD-Commit-ID: 08d46712e5e5f1bad0aea68e7717b7bec1ab8959
4669
4670commit 5d1c1590d736694f41b03e686045f08fcae20d62
4671Author: djm@openbsd.org <djm@openbsd.org>
4672Date: Tue Nov 12 22:34:20 2019 +0000
4673
4674 upstream: dd API for performing one-shot notifications via tty or
4675
4676 SSH_ASKPASS
4677
4678 OpenBSD-Commit-ID: 9484aea33aff5b62ce3642bf259546c7639f23f3
4679
4680commit 166927fd410823eec8a7b2472463db51e0e6fef5
4681Author: djm@openbsd.org <djm@openbsd.org>
4682Date: Tue Nov 12 22:32:48 2019 +0000
4683
4684 upstream: add xvasprintf()
4685
4686 OpenBSD-Commit-ID: e5e3671c05c121993b034db935bce1a7aa372247
4687
4688commit 782093ec6cf64cc6c4078410093359869ea9329f
4689Author: Darren Tucker <dtucker@dtucker.net>
4690Date: Wed Nov 13 09:08:55 2019 +1100
4691
4692 Remove leftover if statement from sync.
4693
4694commit b556cc3cbf0c43f073bb41bba4e92ca709a1ec13
4695Author: markus@openbsd.org <markus@openbsd.org>
4696Date: Tue Nov 12 19:34:40 2019 +0000
4697
4698 upstream: remove extra layer for ed25519 signature; ok djm@
4699
4700 OpenBSD-Commit-ID: 7672d9d0278b4bf656a12d3aab0c0bfe92a8ae47
4701
4702commit 3fcf69ace19e75cf9dcd7206f396adfcb29611a8
4703Author: markus@openbsd.org <markus@openbsd.org>
4704Date: Tue Nov 12 19:34:00 2019 +0000
4705
4706 upstream: check sig_r and sig_s for ssh-sk keys; ok djm
4707
4708 OpenBSD-Commit-ID: 1a1e6a85b5f465d447a3800f739e35c5b74e0abc
4709
4710commit 2c55744a56de0ffc81fe445a1e7fc5cd308712b3
4711Author: markus@openbsd.org <markus@openbsd.org>
4712Date: Tue Nov 12 19:33:08 2019 +0000
4713
4714 upstream: enable ed25519 support; ok djm
4715
4716 OpenBSD-Commit-ID: 1a399c5b3ef15bd8efb916110cf5a9e0b554ab7e
4717
4718commit fd1a3b5e38721b1d69aae2d9de1a1d9155dfa5c7
4719Author: markus@openbsd.org <markus@openbsd.org>
4720Date: Tue Nov 12 19:32:30 2019 +0000
4721
4722 upstream: update sk-api to version 2 for ed25519 support; ok djm
4723
4724 OpenBSD-Commit-ID: 77aa4d5b6ab17987d8a600907b49573940a0044a
4725
4726commit 7c32b51edbed5bd57870249c0a45dffd06be0002
4727Author: markus@openbsd.org <markus@openbsd.org>
4728Date: Tue Nov 12 19:31:45 2019 +0000
4729
4730 upstream: implement sshsk_ed25519_assemble(); ok djm
4731
4732 OpenBSD-Commit-ID: af9ec838b9bc643786310b5caefc4ca4754e68c6
4733
4734commit fe05a36dc0ea884c8c2395d53d804fe4f4202b26
4735Author: markus@openbsd.org <markus@openbsd.org>
4736Date: Tue Nov 12 19:31:18 2019 +0000
4737
4738 upstream: implement sshsk_ed25519_inner_sig(); ok djm
4739
4740 OpenBSD-Commit-ID: f422d0052c6d948fe0e4b04bc961f37fdffa0910
4741
4742commit e03a29e6554cd0c9cdbac0dae53dd79e6eb4ea47
4743Author: markus@openbsd.org <markus@openbsd.org>
4744Date: Tue Nov 12 19:30:50 2019 +0000
4745
4746 upstream: rename sshsk_ecdsa_sign() to sshsk_sign(); ok djm
4747
4748 OpenBSD-Commit-ID: 1524042e09d81e54c4470d7bfcc0194c5b46fe19
4749
4750commit bc7b5d6187de625c086b5f639b25bbad17bbabfc
4751Author: markus@openbsd.org <markus@openbsd.org>
4752Date: Tue Nov 12 19:30:21 2019 +0000
4753
4754 upstream: factor out sshsk_ecdsa_inner_sig(); ok djm@
4755
4756 OpenBSD-Commit-ID: 07e41997b542f670a15d7e2807143fe01efef584
4757
4758commit cef84a062db8cfeece26f067235dc440f6992c17
4759Author: markus@openbsd.org <markus@openbsd.org>
4760Date: Tue Nov 12 19:29:54 2019 +0000
4761
4762 upstream: factor out sshsk_ecdsa_assemble(); ok djm@
4763
4764 OpenBSD-Commit-ID: 2313761a3a84ccfe032874d638d3c363e0f14026
4765
4766commit 7c096c456f33f3d2682736d4735cc10e790276e9
4767Author: markus@openbsd.org <markus@openbsd.org>
4768Date: Tue Nov 12 19:29:24 2019 +0000
4769
4770 upstream: implement ssh-ed25519-sk verification; ok djm@
4771
4772 OpenBSD-Commit-ID: 37906d93948a1e3d237c20e713d6ca8fbf7d13f6
4773
4774commit ba5fb02bed1e556d0ce7b1740ae8a5f87b737491
4775Author: Damien Miller <djm@mindrot.org>
4776Date: Wed Nov 13 08:48:30 2019 +1100
4777
4778 ignore ssh-sk-helper
4779
4780commit 78c96498947f711141f493a40d202c482cc59438
4781Author: deraadt@openbsd.org <deraadt@openbsd.org>
4782Date: Mon Nov 11 19:53:37 2019 +0000
4783
4784 upstream: skip demanding -fstack-protector-all on hppa. we never
4785
4786 wrote a stack protector for reverse-stack architectures, and i don't think
4787 anyone else did either. a warning per compiled file is just annoying.
4788
4789 OpenBSD-Commit-ID: 14806a59353152f843eb349e618abbf6f4dd3ada
4790
4791commit aa1c9e37789f999979fe59df74ce5c8424861ac8
4792Author: djm@openbsd.org <djm@openbsd.org>
4793Date: Fri Nov 8 03:54:02 2019 +0000
4794
4795 upstream: duplicate 'x' character in getopt(3) optstring
4796
4797 OpenBSD-Commit-ID: 64c81caa0cb5798de3621eca16b7dd22e5d0d8a7
4798
4799commit aa4c640dc362816d63584a16e786d5e314e24390
4800Author: naddy@openbsd.org <naddy@openbsd.org>
4801Date: Thu Nov 7 08:38:38 2019 +0000
4802
4803 upstream: Fill in missing man page bits for U2F security key support:
4804
4805 Mention the new key types, the ~/.ssh/id_ecdsa_sk file, ssh's
4806 SecurityKeyProvider keyword, the SSH_SK_PROVIDER environment variable,
4807 and ssh-keygen's new -w and -x options.
4808
4809 Copy the ssh-sk-helper man page from ssh-pkcs11-helper with minimal
4810 substitutions.
4811
4812 ok djm@
4813
4814 OpenBSD-Commit-ID: ef2e8f83d0c0ce11ad9b8c28945747e5ca337ac4
4815
4816commit b236b27d6dada7f0542214003632b4e9b7aa1380
4817Author: Darren Tucker <dtucker@dtucker.net>
4818Date: Sun Nov 3 00:10:43 2019 +1100
4819
4820 Put sftp-realpath in libssh.a
4821
4822 and remove it from the specific binary targets.
4823
4824commit 382c18c20cdcec45b5d21ff25b4a5e0df91a68c4
4825Author: Darren Tucker <dtucker@dtucker.net>
4826Date: Sun Nov 3 00:09:21 2019 +1100
4827
4828 statfs might be defined in sys/mount.h.
4829
4830 eg on old NetBSDs.
4831
4832commit 03ffc0951c305c8e3b5fdc260d65312a57f8f7ea
4833Author: Darren Tucker <dtucker@dtucker.net>
4834Date: Sat Nov 2 23:25:01 2019 +1100
4835
4836 Put stdint.h inside ifdef HAVE_STDINT_H.
4837
4838commit 19cb64c4b42d4312ce12091fd9436dbd6898998c
4839Author: Darren Tucker <dtucker@dtucker.net>
4840Date: Sat Nov 2 22:45:44 2019 +1100
4841
4842 Rebuild .depend.
4843
4844commit 3611bfe89b92ada5914526d8ff0919aeb967cfa7
4845Author: Darren Tucker <dtucker@dtucker.net>
4846Date: Sat Nov 2 22:42:05 2019 +1100
4847
4848 Define __BSD_VISIBLE in fnmatch.h.
4849
4850 .. since we use symbols defined only when it is when using the compat
4851 fnmatch.
4852
4853commit f5cc5816aaddb8eca3cba193f53e99d6a0b37d05
4854Author: Darren Tucker <dtucker@dtucker.net>
4855Date: Sat Nov 2 16:39:38 2019 +1100
4856
4857 Only enable U2F if OpenSSL supports ECC.
4858
4859 This requires moving the U2F bits to below the OpenSSL parts so we have
4860 the required information. ok djm@
4861
4862commit ad38406fc95fa223b0ef2edf8ff50508f8ab1cb6
4863Author: naddy@openbsd.org <naddy@openbsd.org>
4864Date: Fri Nov 1 12:10:43 2019 +0000
4865
4866 upstream: fix miscellaneous text problems; ok djm@
4867
4868 OpenBSD-Commit-ID: 0cbf411a14d8fa0b269b69cbb1b4fc0ca699fe9f
4869
4870commit 9cac151c2dc76b8e5b727b2fa216f572e372170f
4871Author: Darren Tucker <dtucker@dtucker.net>
4872Date: Fri Nov 1 18:26:07 2019 +1100
4873
4874 Add flags needed to build and work on Ultrix.
4875
4876commit 0e3c5bc50907d2058407641b5a3581b7eda91b7e
4877Author: Darren Tucker <dtucker@dtucker.net>
4878Date: Fri Nov 1 18:24:29 2019 +1100
4879
4880 Hook up fnmatch for platforms that don't have it.
4881
4882commit b56dbfd9d967e5b6ce7be9f81f206112e19e1030
4883Author: Darren Tucker <dtucker@dtucker.net>
4884Date: Fri Nov 1 18:17:42 2019 +1100
4885
4886 Add missing bracket in realpath macro.
4887
4888commit 59ccb56f15e5e530e7c1b5a0b361749d8c6217d5
4889Author: Darren Tucker <dtucker@dtucker.net>
4890Date: Fri Nov 1 17:32:47 2019 +1100
4891
4892 Import fnmatch.c from OpenBSD.
4893
4894commit 79d46de9fbea0f3c0e8ae7cf84effaba089071b0
4895Author: Darren Tucker <dtucker@dtucker.net>
4896Date: Fri Nov 1 15:22:32 2019 +1100
4897
4898 Use sftp_realpath if no native realpath.
4899
4900commit bb4f003ed8c5f61ec74a66bcedc8ab19bf5b35c4
4901Author: Darren Tucker <dtucker@dtucker.net>
4902Date: Fri Nov 1 15:06:16 2019 +1100
4903
4904 Configure flags for haiku from haikuports.
4905
4906 Should build with the default flags with ./configure
4907
4908commit 4332b4fe49360679647a8705bc08f4e81323f6b4
4909Author: djm@openbsd.org <djm@openbsd.org>
4910Date: Fri Nov 1 03:54:33 2019 +0000
4911
4912 upstream: fix a race condition in the SIGCHILD handler that could turn
4913
4914 in to a kill(-1); bz3084, reported by Gao Rui, ok dtucker@
4915
4916 OpenBSD-Commit-ID: ac2742e04a69d4c34223505b6a32f6d686e18896
4917
4918commit 03f9205f0fb49ea2507eacc143737a8511ae5a4e
4919Author: Damien Miller <djm@mindrot.org>
4920Date: Fri Nov 1 14:49:25 2019 +1100
4921
4922 conditionalise SK sign/verify on ENABLE_SK
4923
4924 Spotted by Darren and his faux-Vax
4925
4926commit 5eb7b9563ff818e17de24231bf2d347d9db302c5
4927Author: Darren Tucker <dtucker@dtucker.net>
4928Date: Fri Nov 1 14:41:07 2019 +1100
4929
4930 Add prototype for localtime_r if needed.
4931
4932commit d500b59a825f6a58f2abf7b04eb1992d81e45d58
4933Author: Darren Tucker <dtucker@dtucker.net>
4934Date: Fri Nov 1 13:42:12 2019 +1100
4935
4936 Check if IP_TOS is defined before using.
4937
4938commit 764d51e04460ec0da12e05e4777bc90c116accb9
4939Author: Damien Miller <djm@mindrot.org>
4940Date: Fri Nov 1 13:34:49 2019 +1100
4941
4942 autoconf pieces for U2F support
4943
4944 Mostly following existing logic for PKCS#11 - turning off support
4945 when either libcrypto or dlopen(3) are unavailable.
4946
4947commit 45f17a159acfc5a8e450bfbcc2cffe72950ed7a3
4948Author: djm@openbsd.org <djm@openbsd.org>
4949Date: Fri Nov 1 02:32:05 2019 +0000
4950
4951 upstream: remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL path
4952
4953 OpenBSD-Commit-ID: 95a7cafad2a4665d57cabacc28031fabc0bea9fc
4954
4955commit db8d13f7925da7337df87248995c533e111637ec
4956Author: djm@openbsd.org <djm@openbsd.org>
4957Date: Fri Nov 1 02:06:52 2019 +0000
4958
4959 upstream: more additional source files
4960
4961 OpenBSD-Regress-ID: 8eaa25fb901594aee23b76eda99dca5b8db94c6f
4962
4963commit f89c5df65dd307739ff22319c2cf847d3b0c5ab4
4964Author: djm@openbsd.org <djm@openbsd.org>
4965Date: Fri Nov 1 02:04:25 2019 +0000
4966
4967 upstream: additional source files here too
4968
4969 OpenBSD-Regress-ID: 8809f8e1c8f7459e7096ab6b58d8e56cb2f483fd
4970
4971commit 02275afa1ecbfbd39f27d34c97090e76bec232ec
4972Author: djm@openbsd.org <djm@openbsd.org>
4973Date: Fri Nov 1 02:03:27 2019 +0000
4974
4975 upstream: additional source files here too
4976
4977 OpenBSD-Regress-ID: 09297e484327f911fd353489518cceaa0c1b95ce
4978
4979commit dfc8f01b9886c7999e6e20acf3f7492cb8c80796
4980Author: djm@openbsd.org <djm@openbsd.org>
4981Date: Fri Nov 1 01:57:59 2019 +0000
4982
4983 upstream: adapt to extra sshkey_sign() argument and additional
4984
4985 dependencies
4986
4987 OpenBSD-Regress-ID: 7a25604968486c4d6f81d06e8fbc7d17519de50e
4988
4989commit afa59e26eeb44a93f36f043f60b936eaddae77c4
4990Author: djm@openbsd.org <djm@openbsd.org>
4991Date: Fri Nov 1 01:55:41 2019 +0000
4992
4993 upstream: skip security-key key types for tests until we have a
4994
4995 dummy U2F middleware to use.
4996
4997 OpenBSD-Regress-ID: 37200462b44334a4ad45e6a1f7ad1bd717521a95
4998
4999commit de871e4daf346a712c78fa4ab8f18b231a47cb85
5000Author: jmc@openbsd.org <jmc@openbsd.org>
5001Date: Fri Nov 1 00:52:35 2019 +0000
5002
5003 upstream: sort;
5004
5005 OpenBSD-Commit-ID: 8264b0be01ec5a60602bd50fd49cc3c81162ea16
5006
5007commit 2aae149a34b1b5dfbef423d3b7999a96818969bb
5008Author: djm@openbsd.org <djm@openbsd.org>
5009Date: Thu Oct 31 21:37:33 2019 +0000
5010
5011 upstream: undo debugging bits that shouldn't have been committed
5012
5013 OpenBSD-Commit-ID: 4bd5551b306df55379afe17d841207990eb773bf
5014
5015commit 3420e0464bd0e8fedcfa5fd20ad37bdc740ad5b4
5016Author: Damien Miller <djm@mindrot.org>
5017Date: Fri Nov 1 09:24:58 2019 +1100
5018
5019 depend
5020
5021commit b923a90abc7bccb11a513dc8b5c0f13a0ea9682c
5022Author: djm@openbsd.org <djm@openbsd.org>
5023Date: Thu Oct 31 21:28:27 2019 +0000
5024
5025 upstream: fix -Wshadow warning
5026
5027 OpenBSD-Commit-ID: 3441eb04f872a00c2483c11a5f1570dfe775103c
5028
5029commit 9a14c64c38fc14d0029f1c7bc70cf62cc7f0fdf9
5030Author: djm@openbsd.org <djm@openbsd.org>
5031Date: Thu Oct 31 21:23:19 2019 +0000
5032
5033 upstream: Refactor signing - use sshkey_sign for everything,
5034
5035 including the new U2F signatures.
5036
5037 Don't use sshsk_ecdsa_sign() directly, instead make it reachable via
5038 sshkey_sign() like all other signature operations. This means that
5039 we need to add a provider argument to sshkey_sign(), so most of this
5040 change is mechanically adding that.
5041
5042 Suggested by / ok markus@
5043
5044 OpenBSD-Commit-ID: d5193a03fcfa895085d91b2b83d984a9fde76c8c
5045
5046commit 07da39f71d36fb547749a5b16aa8892e621a7e4a
5047Author: djm@openbsd.org <djm@openbsd.org>
5048Date: Thu Oct 31 21:22:01 2019 +0000
5049
5050 upstream: ssh-agent support for U2F/FIDO keys
5051
5052 feedback & ok markus@
5053
5054 OpenBSD-Commit-ID: bb544a44bc32e45d2ec8bf652db2046f38360acb
5055
5056commit eebec620c9519c4839d781c4d5b6082152998f82
5057Author: djm@openbsd.org <djm@openbsd.org>
5058Date: Thu Oct 31 21:20:38 2019 +0000
5059
5060 upstream: ssh AddKeysToAgent support for U2F/FIDO keys
5061
5062 feedback & ok markus@
5063
5064 OpenBSD-Commit-ID: ac08e45c7f995fa71f8d661b3f582e38cc0a2f91
5065
5066commit 486164d060314a7f8bca2a00f53be9e900c5e74d
5067Author: djm@openbsd.org <djm@openbsd.org>
5068Date: Thu Oct 31 21:19:56 2019 +0000
5069
5070 upstream: ssh-add support for U2F/FIDO keys
5071
5072 OpenBSD-Commit-ID: 7f88a5181c982687afedf3130c6ab2bba60f7644
5073
5074commit b9dd14d3091e31fb836f69873d3aa622eb7b4a1c
5075Author: djm@openbsd.org <djm@openbsd.org>
5076Date: Thu Oct 31 21:19:14 2019 +0000
5077
5078 upstream: add new agent key constraint for U2F/FIDO provider
5079
5080 feedback & ok markus@
5081
5082 OpenBSD-Commit-ID: d880c380170704280b4003860a1744d286c7a172
5083
5084commit 884416bdb10468f1252e4d7c13d51b43dccba7f6
5085Author: djm@openbsd.org <djm@openbsd.org>
5086Date: Thu Oct 31 21:18:28 2019 +0000
5087
5088 upstream: ssh client support for U2F/FIDO keys
5089
5090 OpenBSD-Commit-ID: eb2cfa6cf7419a1895e06e398ea6d41516c5b0bc
5091
5092commit 01a0670f69c5b86e471e033b92145d6c7cc77c58
5093Author: djm@openbsd.org <djm@openbsd.org>
5094Date: Thu Oct 31 21:17:49 2019 +0000
5095
5096 upstream: Separate myproposal.h userauth pubkey types
5097
5098 U2F/FIDO keys are not supported for host authentication, so we need
5099 a separate list for user keys.
5100
5101 feedback & ok markus@
5102
5103 OpenBSD-Commit-ID: 7fe2e6ab85f9f2338866e5af8ca2d312abbf0429
5104
5105commit 23f38c2d8cda3fad24e214e1f0133c42435b54ee
5106Author: djm@openbsd.org <djm@openbsd.org>
5107Date: Thu Oct 31 21:17:09 2019 +0000
5108
5109 upstream: ssh-keygen support for generating U2F/FIDO keys
5110
5111 OpenBSD-Commit-ID: 6ce04f2b497ac9dd8c327f76f1e6c724fb1d1b37
5112
5113commit ed3467c1e16b7396ff7fcf12d2769261512935ec
5114Author: djm@openbsd.org <djm@openbsd.org>
5115Date: Thu Oct 31 21:16:20 2019 +0000
5116
5117 upstream: U2F/FIDO middleware interface
5118
5119 Supports enrolling (generating) keys and signatures.
5120
5121 feedback & ok markus@
5122
5123 OpenBSD-Commit-ID: 73d1dd5939454f9c7bd840f48236cba41e8ad592
5124
5125commit 02bb0768a937e50bbb236efc2bbdddb1991b1c85
5126Author: djm@openbsd.org <djm@openbsd.org>
5127Date: Thu Oct 31 21:15:14 2019 +0000
5128
5129 upstream: Initial infrastructure for U2F/FIDO support
5130
5131 Key library support: including allocation, marshalling public/private
5132 keys and certificates, signature validation.
5133
5134 feedback & ok markus@
5135
5136 OpenBSD-Commit-ID: a17615ba15e0f7932ac4360cb18fc9a9544e68c7
5137
5138commit 57ecc10628b04c384cbba2fbc87d38b74cd1199d
5139Author: djm@openbsd.org <djm@openbsd.org>
5140Date: Thu Oct 31 21:14:17 2019 +0000
5141
5142 upstream: Protocol documentation for U2F/FIDO keys in OpenSSH
5143
5144 OpenBSD-Commit-ID: 8f3247317c2909870593aeb306dff848bc427915
5145
5146commit f4fdcd2b7a2bbf5d8770d44565173ca5158d4dcb
5147Author: Damien Miller <djm@mindrot.org>
5148Date: Fri Nov 1 08:36:16 2019 +1100
5149
5150 Missing unit test files
5151
5152commit 1bcd1169c5221688418fa38606e9c69055b72451
5153Author: Darren Tucker <dtucker@dtucker.net>
5154Date: Tue Oct 29 19:45:03 2019 +1100
5155
5156 Add implementation of localtime_r.
5157
5158commit 2046ed16c1202431b0307674c33a123a113e8297
5159Author: dtucker@openbsd.org <dtucker@openbsd.org>
5160Date: Tue Oct 29 07:47:27 2019 +0000
5161
5162 upstream: Signal handler cleanup: remove leftover support for
5163
5164 unreliable signals and now-unneeded save and restore of errno. ok deraadt@
5165 markus@
5166
5167 OpenBSD-Commit-ID: 01dd8a1ebdd991c8629ba1f5237283341a93cd88
5168
5169commit 70fc9a6ca4dd33cb2dd400a4dad5db9683a3d284
5170Author: jmc@openbsd.org <jmc@openbsd.org>
5171Date: Tue Oct 22 08:50:35 2019 +0000
5172
5173 upstream: fixes from lucas;
5174
5175 OpenBSD-Commit-ID: 4c4bfd2806c5bbc753788ffe19c5ee13aaf418b2
5176
5177commit 702368aa4381c3b482368257ac574a87b5a80938
5178Author: dtucker@openbsd.org <dtucker@openbsd.org>
5179Date: Tue Oct 22 07:06:35 2019 +0000
5180
5181 upstream: Import regenerated moduli file.
5182
5183 OpenBSD-Commit-ID: 58ec755be4e51978ecfee73539090eb68652a987
5184
5185commit 5fe81da22652f8caa63e9e3a1af519a85d36337e
5186Author: Darren Tucker <dtucker@dtucker.net>
5187Date: Mon Oct 28 21:19:47 2019 +1100
5188
5189 Fix ifdefs to not mask needed bits.
5190
5191commit 7694e9d2fb5785bbdd0920dce7a160bd79feaf00
5192Author: Darren Tucker <dtucker@dtucker.net>
5193Date: Mon Oct 28 17:05:36 2019 +1100
5194
5195 Only use RLIMIT_NOFILE if it's defined.
5196
5197commit d561b0b2fa2531b4cc3bc70a7d657c6485c9fd0b
5198Author: Darren Tucker <dtucker@dtucker.net>
5199Date: Mon Oct 28 16:09:04 2019 +1100
5200
5201 Make sure we have struct statfs before using.
5202
5203commit 2912596aecfcf48e5115c7a906d1e664f7717a4b
5204Author: Darren Tucker <dtucker@dtucker.net>
5205Date: Mon Oct 28 16:06:59 2019 +1100
5206
5207 Define UINT32_MAX if needed.
5208
5209commit 7169e31121e8c8cc729b55154deb722ae495b316
5210Author: Darren Tucker <dtucker@dtucker.net>
5211Date: Mon Oct 28 16:00:45 2019 +1100
5212
5213 Move utimensat definition into timespec section.
5214
5215 Since utimensat uses struct timespec, move it to the section where we
5216 define struct timespec when needed.
5217
5218commit 850ec1773d656cbff44d78a79e369dc262ce5853
5219Author: Darren Tucker <dtucker@dtucker.net>
5220Date: Mon Oct 28 15:57:22 2019 +1100
5221
5222 Wrap OpenSSL bits in WITH_OPENSSL.
5223
5224commit 6fc7e1c6fec3ba589869ae98e968c0e5e2e4695b
5225Author: Darren Tucker <dtucker@dtucker.net>
5226Date: Mon Oct 28 15:53:25 2019 +1100
5227
5228 Wrap poll.h includes in HAVE_POLL_H.
5229
5230commit 9239a18f96905cc1a353e861e33af093652f24e7
5231Author: Darren Tucker <dtucker@dtucker.net>
5232Date: Thu Oct 24 14:39:49 2019 +1100
5233
5234 Add a function call stackprotector tests.
5235
5236 Including a function call in the test programs for the gcc stack
5237 protector flag tests exercises more of the compiler and makes it more
5238 likely it'll detect problems.
5239
5240commit b9705393be4612fd5e29d0cd8e7cf2b66ed19eb7
5241Author: Darren Tucker <dtucker@dtucker.net>
5242Date: Tue Oct 22 18:09:22 2019 +1100
5243
5244 Import regenerated moduli file.
5245
5246commit 76ed2199491397e0f9902ade80d5271e4a9b2630
5247Author: djm@openbsd.org <djm@openbsd.org>
5248Date: Wed Oct 16 06:05:39 2019 +0000
5249
5250 upstream: potential NULL dereference for revoked hostkeys; reported
5251
5252 by krishnaiah bommu
5253
5254 OpenBSD-Commit-ID: 35ff685e7cc9dd2e3fe2e3dfcdcb9bc5c79f6506
5255
5256commit 6500c3bc71bf4fe14972c1177e6b93f1164d07a4
5257Author: djm@openbsd.org <djm@openbsd.org>
5258Date: Wed Oct 16 06:03:30 2019 +0000
5259
5260 upstream: free buf before return; reported by krishnaiah bommu
5261
5262 OpenBSD-Commit-ID: 091bb23a6e913af5d4f72c50030b53ce1cef4de1
5263
5264commit d7d116b6d9e6cb79cc235e9801caa683d3db3181
5265Author: djm@openbsd.org <djm@openbsd.org>
5266Date: Mon Oct 14 06:00:02 2019 +0000
5267
5268 upstream: memleak in error path; spotted by oss-fuzz, ok markus@
5269
5270 OpenBSD-Commit-ID: d6ed260cbbc297ab157ad63931802fb1ef7a4266
5271
5272commit 9b9e3ca6945351eefb821ff783a4a8e6d9b98b9a
5273Author: Darren Tucker <dtucker@dtucker.net>
5274Date: Fri Oct 11 14:12:16 2019 +1100
5275
5276 Re-add SA_RESTART to mysignal.
5277
5278 This makes mysignal implement reliable BSD semantics according to
5279 Stevens' APUE. This was first attempted in 2001 but was reverted
5280 due to problems with HP-UX 10.20 and select() and possibly grantpt().
5281 Modern systems should be fine with it, but if any current platforms have
5282 a problem with it now we can disable it just for those. ok djm@
5283
5284commit 0bd312a362168c1eae3cd6b3889395a78e6fd0f8
5285Author: Darren Tucker <dtucker@dtucker.net>
5286Date: Thu Oct 10 09:42:03 2019 +1100
5287
5288 Fix ifdef typo for declaration of memmem.
5289
5290 Fixes build on IRIX. bz#3081.
5291
5292commit 01ce1cd402d5eecde2bba35b67e08f5b266b37fd
5293Author: Abhishek Arya <inferno@chromium.org>
5294Date: Tue Oct 8 20:19:18 2019 -0700
5295
5296 Update README.md
5297
5298commit 1ba130ac8fb2884307f658126f04578f8aef409e
5299Author: Damien Miller <djm@mindrot.org>
5300Date: Wed Oct 9 13:49:35 2019 +1100
5301
5302 add a fuzzer for private key parsing
5303
5304commit cdf1d0a9f5d18535e0a18ff34860e81a6d83aa5c
5305Author: Damien Miller <djm@mindrot.org>
5306Date: Wed Oct 9 11:31:03 2019 +1100
5307
5308 prepare for 8.1 release
5309
5310commit 3b4e56d740b74324e2d7542957cad5a11518f455
5311Author: djm@openbsd.org <djm@openbsd.org>
5312Date: Wed Oct 9 00:04:57 2019 +0000
5313
5314 upstream: openssh-8.1
5315
5316 OpenBSD-Commit-ID: 3356bb34e2aa287f0e6d6773c9ae659dc680147d
5317
5318commit 29e0ecd9b4eb3b9f305e2240351f0c59cad9ef81
5319Author: djm@openbsd.org <djm@openbsd.org>
5320Date: Wed Oct 9 00:04:42 2019 +0000
5321
5322 upstream: fix an unreachable integer overflow similar to the XMSS
5323
5324 case, and some other NULL dereferences found by fuzzing.
5325
5326 fix with and ok markus@
5327
5328 OpenBSD-Commit-ID: 0f81adbb95ef887ce586953e1cb225fa45c7a47b
5329
5330commit a546b17bbaeb12beac4c9aeed56f74a42b18a93a
5331Author: djm@openbsd.org <djm@openbsd.org>
5332Date: Wed Oct 9 00:02:57 2019 +0000
5333
5334 upstream: fix integer overflow in XMSS private key parsing.
5335
5336 Reported by Adam Zabrocki via SecuriTeam's SSH program.
5337
5338 Note that this code is experimental and not compiled by default.
5339
5340 ok markus@
5341
5342 OpenBSD-Commit-ID: cd0361896d15e8a1bac495ac583ff065ffca2be1
5343
5344commit c2cc25480ba36ab48c1a577bebb12493865aad87
5345Author: dtucker@openbsd.org <dtucker@openbsd.org>
5346Date: Tue Oct 8 22:40:39 2019 +0000
5347
5348 upstream: Correct type for end-of-list sentinel; fixes initializer
5349
5350 warnings on some platforms. ok deraadt.
5351
5352 OpenBSD-Commit-ID: a990dbc2dac25bdfa07e79321349c73fd991efa2
5353
5354commit e827aedf8818e75c0016b47ed8fc231427457c43
5355Author: djm@openbsd.org <djm@openbsd.org>
5356Date: Mon Oct 7 23:10:38 2019 +0000
5357
5358 upstream: reversed test yielded incorrect debug message
5359
5360 OpenBSD-Commit-ID: 78bb512d04cfc238adb2c5b7504ac93eecf523b3
5361
5362commit 8ca491d29fbe26e5909ce22b344c0a848dc28d55
5363Author: Damien Miller <djm@mindrot.org>
5364Date: Tue Oct 8 17:05:57 2019 +1100
5365
5366 depend
5367
5368commit 86a0323374cbd404629e75bb320b3fa1c16aaa6b
5369Author: Darren Tucker <dtucker@dtucker.net>
5370Date: Wed Oct 9 09:36:06 2019 +1100
5371
5372 Make MAKE_CLONE no-op macro more correct.
5373
5374 Similar to the previous change to DEF_WEAK, some compilers don't like
5375 the empty statement, so convert into a no-op function prototype.
5376
5377commit cfc1897a2002ec6c4dc879b24e8b3153c87ea2cf
5378Author: Damien Miller <djm@mindrot.org>
5379Date: Wed Oct 9 09:06:35 2019 +1100
5380
5381 wrap stdint.h include in HAVE_STDINT_H
5382
5383 make the indenting a little more consistent too..
5384
5385 Fixes Solaris 2.6; reported by Tom G. Christensen
5386
5387commit 13b3369830a43b89a503915216a23816d1b25744
5388Author: Damien Miller <djm@mindrot.org>
5389Date: Tue Oct 8 15:32:02 2019 +1100
5390
5391 avoid "return (value)" in void-declared function
5392
5393 spotted by Tim Rice; ok dtucker
5394
5395commit 0c7f8d2326d812b371f7afd63aff846973ec80a4
5396Author: Darren Tucker <dtucker@dtucker.net>
5397Date: Tue Oct 8 14:44:50 2019 +1100
5398
5399 Make DEF_WEAK more likely to be correct.
5400
5401 Completely nop-ing out DEF_WEAK leaves an empty statemment which some
5402 compilers don't like. Replace with a no-op function template. ok djm@
5403
5404commit b1e79ea8fae9c252399677a28707661d85c7d00c
5405Author: dtucker@openbsd.org <dtucker@openbsd.org>
5406Date: Sun Oct 6 11:49:50 2019 +0000
5407
5408 upstream: Instead of running sed over the whole log to remove CRs,
5409
5410 remove them only where it's needed (and confuses test(1) on at least OS X in
5411 portable).
5412
5413 OpenBSD-Regress-ID: a6ab9b4bd1d33770feaf01b2dfb96f9e4189d2d0
5414
5415commit 8dc7d6b75a7f746fdd056acd41dffc0a13557a4c
5416Author: Eduardo Barretto <ebarretto@linux.vnet.ibm.com>
5417Date: Tue May 9 13:33:30 2017 -0300
5418
5419 Enable specific ioctl call for EP11 crypto card (s390)
5420
5421 The EP11 crypto card needs to make an ioctl call, which receives an
5422 specific argument. This crypto card is for s390 only.
5423
5424 Signed-off-by: Eduardo Barretto <ebarretto@linux.vnet.ibm.com>
5425
5426commit 07f2c7f34951c04d2cd796ac6c80e47c56c4969e
5427Author: djm@openbsd.org <djm@openbsd.org>
5428Date: Fri Oct 4 04:31:59 2019 +0000
5429
5430 upstream: fix memory leak in error path; bz#3074 patch from
5431
5432 krishnaiah.bommu@intel.com, ok dtucker
5433
5434 OpenBSD-Commit-ID: d031853f3ecf47b35a0669588f4d9d8e3b307b3c
5435
5436commit b7fbc75e119170f4d15c94a7fda4a1050e0871d6
5437Author: djm@openbsd.org <djm@openbsd.org>
5438Date: Fri Oct 4 04:13:39 2019 +0000
5439
5440 upstream: space
5441
5442 OpenBSD-Commit-ID: 350648bcf00a2454e7ef998b7d88e42552b348ac
5443
5444commit 643ab68c79ac1644f4a31e36928c2bfc8a51db3c
5445Author: djm@openbsd.org <djm@openbsd.org>
5446Date: Fri Oct 4 03:39:19 2019 +0000
5447
5448 upstream: more sshsig regress tests: check key revocation, the
5449
5450 check-novalidate signature test mode and signing keys in ssh-agent.
5451
5452 From Sebastian Kinne (slightly tweaked)
5453
5454 OpenBSD-Regress-ID: b39566f5cec70140674658cdcedf38752a52e2e2
5455
5456commit 714031a10bbe378a395a93cf1040f4ee1451f45f
5457Author: dtucker@openbsd.org <dtucker@openbsd.org>
5458Date: Fri Oct 4 03:26:58 2019 +0000
5459
5460 upstream: Check for gmtime failure in moduli generation. Based on
5461
5462 patch from krishnaiah.bommu@intel.com, ok djm@
5463
5464 OpenBSD-Commit-ID: 4c6a4cde0022188ac83737de08da0e875704eeaa
5465
5466commit 6918974405cc28ed977f802fd97a9c9a9b2e141b
5467Author: jmc@openbsd.org <jmc@openbsd.org>
5468Date: Thu Oct 3 17:07:50 2019 +0000
5469
5470 upstream: use a more common options order in SYNOPSIS and sync
5471
5472 usage(); while here, no need for Bk/Ek;
5473
5474 ok dtucker
5475
5476 OpenBSD-Commit-ID: 38715c3f10b166f599a2283eb7bc14860211bb90
5477
5478commit feff96b7d4c0b99307f0459cbff128aede4a8984
5479Author: djm@openbsd.org <djm@openbsd.org>
5480Date: Wed Oct 2 09:50:50 2019 +0000
5481
5482 upstream: thinko in previous; spotted by Mantas
5483
5484 =?UTF-8?q?=20Mikul=C4=97nas?=
5485 MIME-Version: 1.0
5486 Content-Type: text/plain; charset=UTF-8
5487 Content-Transfer-Encoding: 8bit
5488
5489 OpenBSD-Commit-ID: ffa3f5a45e09752fc47d9041e2203ee2ec15b24d
5490
5491commit b5a89eec410967d6b712665f8cf0cb632928d74b
5492Author: djm@openbsd.org <djm@openbsd.org>
5493Date: Wed Oct 2 08:07:13 2019 +0000
5494
5495 upstream: make signature format match PROTOCO
5496
5497 =?UTF-8?q?=20as=20a=20string,=20not=20raw=20bytes.=20Spotted=20by=20Manta?=
5498 =?UTF-8?q?s=20Mikul=C4=97nas?=
5499 MIME-Version: 1.0
5500 Content-Type: text/plain; charset=UTF-8
5501 Content-Transfer-Encoding: 8bit
5502
5503 OpenBSD-Commit-ID: 80fcc6d52893f80c6de2bedd65353cebfebcfa8f
5504
5505commit dc6f81ee94995deb11bbf7e19801022c5f6fd90a
5506Author: djm@openbsd.org <djm@openbsd.org>
5507Date: Wed Oct 2 08:05:50 2019 +0000
5508
5509 upstream: ban empty namespace strings for s
5510
5511 =?UTF-8?q?shsig;=20spotted=20by=20Mantas=20Mikul=C4=97nas?=
5512 MIME-Version: 1.0
5513 Content-Type: text/plain; charset=UTF-8
5514 Content-Transfer-Encoding: 8bit
5515
5516 OpenBSD-Commit-ID: 7c5bcf40bed8f4e826230176f4aa353c52aeb698
5517
5518commit fa5bd8107e0e2b3e1e184f55d0f9320c119f65f0
5519Author: Darren Tucker <dtucker@dtucker.net>
5520Date: Wed Oct 2 14:30:55 2019 +1000
5521
5522 Put ssherr.h back as it's actually needed.
5523
5524commit 3ef92a657444f172b61f92d5da66d94fa8265602
5525Author: Lonnie Abelbeck <lonnie@abelbeck.com>
5526Date: Tue Oct 1 09:05:09 2019 -0500
5527
5528 Deny (non-fatal) shmget/shmat/shmdt in preauth privsep child.
5529
5530 New wait_random_seeded() function on OpenSSL 1.1.1d uses shmget, shmat, and shmdt
5531 in the preauth codepath, deny (non-fatal) in seccomp_filter sandbox.
5532
5533commit edd1d3a6261aecbf9a55944fd7be1db83571b46e
5534Author: Damien Miller <djm@mindrot.org>
5535Date: Wed Oct 2 10:54:28 2019 +1000
5536
5537 remove duplicate #includes
5538
5539 Prompted by Jakub Jelen
5540
5541commit 13c508dfed9f25e6e54c984ad00a74ef08539e70
5542Author: Damien Miller <djm@mindrot.org>
5543Date: Wed Oct 2 10:51:15 2019 +1000
5544
5545 typo in comment
5546
5547commit d0c3ac427f6c52b872d6617421421dd791664445
5548Author: djm@openbsd.org <djm@openbsd.org>
5549Date: Wed Oct 2 00:42:30 2019 +0000
5550
5551 upstream: remove some duplicate #includes
5552
5553 OpenBSD-Commit-ID: ed6827ab921eff8027669848ef4f70dc1da4098c
5554
5555commit 084682786d9275552ee93857cb36e43c446ce92c
5556Author: djm@openbsd.org <djm@openbsd.org>
5557Date: Tue Oct 1 10:22:53 2019 +0000
5558
5559 upstream: revert unconditional forced login implemented in r1.41 of
5560
5561 ssh-pkcs11.c; r1.45 added a forced login as a fallback for cases where the
5562 token returns no objects and this is less disruptive for users of tokens
5563 directly in ssh (rather than via ssh-agent) and in ssh-keygen
5564
5565 bz3006, patch from Jakub Jelen; ok markus
5566
5567 OpenBSD-Commit-ID: 33d6df589b072094384631ff93b1030103b3d02e
5568
5569commit 6c91d42cce3f055917dc3fd2c305dfc5b3b584b3
5570Author: jmc@openbsd.org <jmc@openbsd.org>
5571Date: Sun Sep 29 16:31:57 2019 +0000
5572
5573 upstream: group and sort single letter options; ok deraadt
5574
5575 OpenBSD-Commit-ID: e1480e760a2b582f79696cdcff70098e23fc603f
5576
5577commit 3b44bf39ff4d7ef5d50861e2e9dda62d2926d2fe
5578Author: jmc@openbsd.org <jmc@openbsd.org>
5579Date: Fri Sep 27 20:03:24 2019 +0000
5580
5581 upstream: fix the DH-GEX text in -a; because this required a comma,
5582
5583 i added a comma to the first part, for balance...
5584
5585 OpenBSD-Commit-ID: 2c3464e9e82a41e8cdfe8f0a16d94266e43dbb58
5586
5587commit 3e53ef28fab53094e3b19622ba0e9c3d5fe71273
5588Author: deraadt@openbsd.org <deraadt@openbsd.org>
5589Date: Tue Sep 24 12:50:46 2019 +0000
5590
5591 upstream: identity_file[] should be PATH_MAX, not the arbitrary
5592
5593 number 1024
5594
5595 OpenBSD-Commit-ID: e775f94ad47ce9ab37bd1410d7cf3b7ea98b11b7
5596
5597commit 90d4b2541e8c907793233d9cbd4963f7624f4174
5598Author: jmc@openbsd.org <jmc@openbsd.org>
5599Date: Fri Sep 20 18:50:58 2019 +0000
5600
5601 upstream: new sentence, new line;
5602
5603 OpenBSD-Commit-ID: c35ca5ec07be460e95e7406af12eee04a77b6698
5604
5605commit fbec7dba01b70b49ac47f56031310865dff86200
5606Author: Darren Tucker <dtucker@dtucker.net>
5607Date: Mon Sep 30 18:01:12 2019 +1000
5608
5609 Include stdio.h for snprintf.
5610
5611 Patch from vapier@gentoo.org.
5612
5613commit 0a403bfde71c4b82147473298d3a60b4171468bd
5614Author: Darren Tucker <dtucker@dtucker.net>
5615Date: Mon Sep 30 14:11:42 2019 +1000
5616
5617 Add SKIP_LTESTS for skipping specific tests.
5618
5619commit 4d59f7a5169c451ebf559aedec031ac9da2bf80c
5620Author: dtucker@openbsd.org <dtucker@openbsd.org>
5621Date: Fri Sep 27 05:25:12 2019 +0000
5622
5623 upstream: Test for empty result in expected bits. Remove CRs from log
5624
5625 as they confuse tools on some platforms. Re-enable the 3des-cbc test.
5626
5627 OpenBSD-Regress-ID: edf536d4f29fc1ba412889b37247a47f1b49d250
5628
5629commit 7c817d129e2d48fc8a6f7965339313023ec45765
5630Author: Darren Tucker <dtucker@dtucker.net>
5631Date: Fri Sep 27 15:26:22 2019 +1000
5632
5633 Re-enable dhgex test.
5634
5635 Since we've added larger fallback groups to dh.c this test will pass
5636 even if there is no moduli file installed on the system.
5637
5638commit c1e0a32fa852de6d1c82ece4f76add0ab0ca0eae
5639Author: Darren Tucker <dtucker@dtucker.net>
5640Date: Tue Sep 24 21:17:20 2019 +1000
5641
5642 Add more ToS bits, currently only used by netcat.
5643
5644commit 5a273a33ca1410351cb484af7db7c13e8b4e8e4e
5645Author: Darren Tucker <dtucker@dtucker.net>
5646Date: Thu Sep 19 15:41:23 2019 +1000
5647
5648 Privsep is now required.
5649
5650commit 8aa2aa3cd4d27d14e74b247c773696349472ef20
5651Author: djm@openbsd.org <djm@openbsd.org>
5652Date: Mon Sep 16 03:23:02 2019 +0000
5653
5654 upstream: Allow testing signature syntax and validity without verifying
5655
5656 that a signature came from a trusted signer. To discourage accidental or
5657 unintentional use, this is invoked by the deliberately ugly option name
5658 "check-novalidate"
5659
5660 from Sebastian Kinne
5661
5662 OpenBSD-Commit-ID: cea42c36ab7d6b70890e2d8635c1b5b943adcc0b
5663
5664commit 7047d5afe3103f0f07966c05b810682d92add359
5665Author: djm@openbsd.org <djm@openbsd.org>
5666Date: Fri Sep 13 04:52:34 2019 +0000
5667
5668 upstream: clarify that IdentitiesOnly also applies to the default
5669
5670 ~/.ssh/id_* keys; bz#3062
5671
5672 OpenBSD-Commit-ID: 604be570e04646f0f4a17026f8b2aada6a585dfa
5673
5674commit b36ee3fcb2f1601693b1b7fd60dd6bd96006ea75
5675Author: dtucker@openbsd.org <dtucker@openbsd.org>
5676Date: Fri Sep 13 04:36:43 2019 +0000
5677
5678 upstream: Plug mem leaks on error paths, based in part on github
5679
5680 pr#120 from David Carlier. ok djm@.
5681
5682 OpenBSD-Commit-ID: c57adeb1022a8148fc86e5a88837b3b156dbdb7e
5683
5684commit 2aefdf1aef906cf7548a2e5927d35aacb55948d4
5685Author: djm@openbsd.org <djm@openbsd.org>
5686Date: Fri Sep 13 04:31:19 2019 +0000
5687
5688 upstream: whitespace
5689
5690 OpenBSD-Commit-ID: 57a71dd5f4cae8d61e0ac631a862589fb2bfd700
5691
5692commit fbe24b142915331ceb2a3a76be3dc5b6d204fddf
5693Author: djm@openbsd.org <djm@openbsd.org>
5694Date: Fri Sep 13 04:27:35 2019 +0000
5695
5696 upstream: allow %n to be expanded in ProxyCommand strings
5697
5698 From Zachary Harmany via github.com/openssh/openssh-portable/pull/118
5699 ok dtucker@
5700
5701 OpenBSD-Commit-ID: 7eebf1b7695f50c66d42053d352a4db9e8fb84b6
5702
5703commit 2ce1d11600e13bee0667d6b717ffcc18a057b821
5704Author: djm@openbsd.org <djm@openbsd.org>
5705Date: Fri Sep 13 04:07:42 2019 +0000
5706
5707 upstream: clarify that ConnectTimeout applies both to the TCP
5708
5709 connection and to the protocol handshake/KEX. From Jean-Charles Longuet via
5710 Github PR140
5711
5712 OpenBSD-Commit-ID: ce1766abc6da080f0d88c09c2c5585a32b2256bf
5713
5714commit df780114278f406ef7cb2278802a2660092fff09
5715Author: dtucker@openbsd.org <dtucker@openbsd.org>
5716Date: Mon Sep 9 02:31:19 2019 +0000
5717
5718 upstream: Fix potential truncation warning. ok deraadt.
5719
5720 OpenBSD-Commit-ID: d87b7e3a94ec935e8194e7fce41815e22804c3ff
5721
5722commit ec0e6243660bf2df30c620a6a0d83eded376c9c6
5723Author: Damien Miller <djm@mindrot.org>
5724Date: Fri Sep 13 13:14:39 2019 +1000
5725
5726 memleak of buffer in sshpam_query
5727
5728 coverity report via Ed Maste; ok dtucker@
5729
5730commit c17e4638e5592688264fc0349f61bfc7b4425aa5
5731Author: Damien Miller <djm@mindrot.org>
5732Date: Fri Sep 13 13:12:42 2019 +1000
5733
5734 explicitly test set[ug]id() return values
5735
5736 Legacy !_POSIX_SAVED_IDS path only; coverity report via Ed Maste
5737 ok dtucker@
5738
5739commit 91a2135f32acdd6378476c5bae475a6e7811a6a2
5740Author: naddy@openbsd.org <naddy@openbsd.org>
5741Date: Fri Sep 6 14:45:34 2019 +0000
5742
5743 upstream: Allow prepending a list of algorithms to the default set
5744
5745 by starting the list with the '^' character, e.g.
5746
5747 HostKeyAlgorithms ^ssh-ed25519
5748 Ciphers ^aes128-gcm@openssh.com,aes256-gcm@openssh.com
5749
5750 ok djm@ dtucker@
5751
5752 OpenBSD-Commit-ID: 1e1996fac0dc8a4b0d0ff58395135848287f6f97
5753
5754commit c8bdd2db77ac2369d5cdee237656f266c8f41552
5755Author: djm@openbsd.org <djm@openbsd.org>
5756Date: Fri Sep 6 07:53:40 2019 +0000
5757
5758 upstream: key conversion should fail for !openssl builds, not fall
5759
5760 through to the key generation code
5761
5762 OpenBSD-Commit-ID: b957436adc43c4941e61d61958a193a708bc83c9
5763
5764commit 823f6c37eb2d8191d45539f7b6fa877a4cb4ed3d
5765Author: djm@openbsd.org <djm@openbsd.org>
5766Date: Fri Sep 6 06:08:11 2019 +0000
5767
5768 upstream: typo in previous
5769
5770 OpenBSD-Commit-ID: 7c3b94110864771a6b80a0d8acaca34037c3c96e
5771
5772commit 6a710d3e06fd375e2c2ae02546b9541c488a2cdb
5773Author: Damien Miller <djm@mindrot.org>
5774Date: Sun Sep 8 14:48:11 2019 +1000
5775
5776 needs time.h for --without-openssl
5777
5778commit f61f29afda6c71eda26effa54d3c2e5306fd0833
5779Author: Damien Miller <djm@mindrot.org>
5780Date: Sat Sep 7 19:25:00 2019 +1000
5781
5782 make unittests pass for no-openssl case
5783
5784commit 105e1c9218940eb53473f55a9177652d889ddbad
5785Author: djm@openbsd.org <djm@openbsd.org>
5786Date: Fri Sep 6 05:59:41 2019 +0000
5787
5788 upstream: avoid compiling certain files that deeply depend on
5789
5790 libcrypto when WITH_OPENSSL isn't set
5791
5792 OpenBSD-Commit-ID: 569f08445c27124ec7c7f6c0268d844ec56ac061
5793
5794commit 670104b923dd97b1c06c0659aef7c3e52af571b2
5795Author: djm@openbsd.org <djm@openbsd.org>
5796Date: Fri Sep 6 05:23:55 2019 +0000
5797
5798 upstream: fixes for !WITH_OPENSSL compilation; ok dtucker@
5799
5800 OpenBSD-Commit-ID: 7fd68eaa9e0f7482b5d4c7e8d740aed4770a839f
5801
5802commit be02d7cbde3d211ec2ed2320a1f7d86b2339d758
5803Author: djm@openbsd.org <djm@openbsd.org>
5804Date: Fri Sep 6 04:53:27 2019 +0000
5805
5806 upstream: lots of things were relying on libcrypto headers to
5807
5808 transitively include various system headers (mostly stdlib.h); include them
5809 explicitly
5810
5811 OpenBSD-Commit-ID: 5b522f4f2d844f78bf1cc4f3f4cc392e177b2080
5812
5813commit d05aaaaadcad592abfaa44540928e0c61ef72ebb
5814Author: djm@openbsd.org <djm@openbsd.org>
5815Date: Fri Sep 6 03:30:42 2019 +0000
5816
5817 upstream: remove leakmalloc reference; we used this early when
5818
5819 refactoring but not since
5820
5821 OpenBSD-Commit-ID: bb28ebda8f7c490b87b37954044a6cdd43a7eb2c
5822
5823commit 1268f0bcd8fc844ac6c27167888443c8350005eb
5824Author: dtucker@openbsd.org <dtucker@openbsd.org>
5825Date: Fri Sep 6 04:24:06 2019 +0000
5826
5827 upstream: Check for RSA support before using it for the user key,
5828
5829 otherwise use ed25519 which is supported when built without OpenSSL.
5830
5831 OpenBSD-Regress-ID: 3d23ddfe83c5062f00ac845d463f19a2ec78c0f7
5832
5833commit fd7a2dec652b9efc8e97f03f118f935dce732c60
5834Author: Darren Tucker <dtucker@dtucker.net>
5835Date: Fri Sep 6 14:07:10 2019 +1000
5836
5837 Provide explicit path to configure-check.
5838
5839 On some platforms (at least OpenBSD) make won't search VPATH for target
5840 files, so building out-of-tree will fail at configure-check. Provide
5841 explicit path. ok djm@
5842
5843commit 00865c29690003b4523cc09a0e104724b9f911a4
5844Author: djm@openbsd.org <djm@openbsd.org>
5845Date: Fri Sep 6 01:58:50 2019 +0000
5846
5847 upstream: better error code for bad arguments; inspired by
5848
5849 OpenBSD-Commit-ID: dfc263b6041de7f0ed921a1de0b81ddebfab1e0a
5850
5851commit afdf27f5aceb4973b9f5308f4310c6e3fd8db1fb
5852Author: Damien Miller <djm@mindrot.org>
5853Date: Thu Sep 5 21:38:40 2019 +1000
5854
5855 revert config.h/config.h.in freshness checks
5856
5857 turns out autoreconf and configure don't touch some files if their content
5858 doesn't change, so the mtime can't be relied upon in a makefile rule
5859
5860commit a97609e850c57bd2cc2fe7e175fc35cb865bc834
5861Author: Damien Miller <djm@mindrot.org>
5862Date: Thu Sep 5 20:54:39 2019 +1000
5863
5864 extend autoconf freshness test
5865
5866 make it cover config.h.in and config.h separately
5867
5868commit 182297c10edb21c4856c6a38326fd04d81de41a5
5869Author: Damien Miller <djm@mindrot.org>
5870Date: Thu Sep 5 20:34:54 2019 +1000
5871
5872 check that configure/config.h is up to date
5873
5874 Ensure they are newer than the configure.ac / aclocal.m4 source
5875
5876commit 7d6034bd020248e9fc0f8c39c71c858debd0d0c1
5877Author: djm@openbsd.org <djm@openbsd.org>
5878Date: Thu Sep 5 10:05:51 2019 +0000
5879
5880 upstream: if a PKCS#11 token returns no keys then try to login and
5881
5882 refetch them. Based on patch from Jakub Jelen; bz#2430 ok markus@
5883
5884 OpenBSD-Commit-ID: ab53bd6ddd54dd09e54a8bfbed1a984496f08b43
5885
5886commit 76f09bd95917862101b740afb19f4db5ccc752bf
5887Author: djm@openbsd.org <djm@openbsd.org>
5888Date: Thu Sep 5 09:35:19 2019 +0000
5889
5890 upstream: sprinkle in some explicit errors here, otherwise the
5891
5892 percolate all the way up to dispatch_run_fatal() and lose all meaninful
5893 context
5894
5895 to help with bz#3063; ok dtucker@
5896
5897 OpenBSD-Commit-ID: 5b2da83bb1c4a3471444b7910b2120ae36438a0a
5898
5899commit 0ea332497b2b2fc3995f72f6bafe9d664c0195b3
5900Author: djm@openbsd.org <djm@openbsd.org>
5901Date: Thu Sep 5 09:25:13 2019 +0000
5902
5903 upstream: only send ext_info for KEX_INITIAL; bz#2929 ok dtucker
5904
5905 OpenBSD-Commit-ID: 00f5c6062f6863769f5447c6346f78c05d2e4a63
5906
5907commit f23d91f9fa7f6f42e70404e000fac88aebfe3076
5908Author: jmc@openbsd.org <jmc@openbsd.org>
5909Date: Thu Sep 5 05:47:23 2019 +0000
5910
5911 upstream: macro fix; ok djm
5912
5913 OpenBSD-Commit-ID: e891dd6c7996114cb32f0924cb7898ab55efde6e
5914
5915commit 8b57337c1c1506df2bb9f039d0628a6de618566b
5916Author: Damien Miller <djm@mindrot.org>
5917Date: Thu Sep 5 15:46:39 2019 +1000
5918
5919 update fuzzing makefile to more recent clang
5920
5921commit ae631ad77daf8fd39723d15a687cd4b1482cbae8
5922Author: Damien Miller <djm@mindrot.org>
5923Date: Thu Sep 5 15:45:32 2019 +1000
5924
5925 fuzzer for sshsig allowed_signers option parsing
5926
5927commit 69159afe24120c97e5ebaf81016c85968afb903e
5928Author: djm@openbsd.org <djm@openbsd.org>
5929Date: Thu Sep 5 05:42:59 2019 +0000
5930
5931 upstream: memleak on error path; found by libfuzzer
5932
5933 OpenBSD-Commit-ID: 34d44cb0fb5bdb5fcbc6b02b804e71b20a7a5fc7
5934
5935commit bab6feb01f9924758ca7129dba708298a53dde5f
5936Author: djm@openbsd.org <djm@openbsd.org>
5937Date: Thu Sep 5 04:55:32 2019 +0000
5938
5939 upstream: expose allowed_signers options parsing code in header for
5940
5941 fuzzing
5942
5943 rename to make more consistent with philosophically-similar auth
5944 options parsing API.
5945
5946 OpenBSD-Commit-ID: 0c67600ef04187f98e2912ca57b60c22a8025b7c
5947
5948commit 4f9d75fbafde83d428e291516f8ce98e6b3a7c4b
5949Author: naddy@openbsd.org <naddy@openbsd.org>
5950Date: Wed Sep 4 20:31:15 2019 +0000
5951
5952 upstream: Call comma-separated lists as such to clarify semantics.
5953
5954 Options such as Ciphers take values that may be a list of ciphers; the
5955 complete list, not indiviual elements, may be prefixed with a dash or plus
5956 character to remove from or append to the default list, respectively.
5957
5958 Users might read the current text as if each elment took an optional prefix,
5959 so tweak the wording from "values" to "list" to prevent such ambiguity for
5960 all options supporting these semantics.
5961
5962 Fix instances missed in first commit. ok jmc@ kn@
5963
5964 OpenBSD-Commit-ID: 7112522430a54fb9f15a7a26d26190ed84d5e417
5965
5966commit db1e6f60f03641b2d17e0ab062242609f4ed4598
5967Author: jmc@openbsd.org <jmc@openbsd.org>
5968Date: Wed Sep 4 05:56:54 2019 +0000
5969
5970 upstream: tweak previous;
5971
5972 OpenBSD-Commit-ID: 0abd728aef6b5b35f6db43176aa83b7e3bf3ce27
5973
5974commit 0f44e5956c7c816f6600f2a47be4d7bb5a8d711d
5975Author: naddy@openbsd.org <naddy@openbsd.org>
5976Date: Tue Sep 3 20:51:49 2019 +0000
5977
5978 upstream: repair typo and editing mishap
5979
5980 OpenBSD-Commit-ID: d125ab720ca71ccf9baf83e08ddc8c12a328597e
5981
5982commit f4846dfc6a79f84bbc6356ae3184f142bacedc24
5983Author: Damien Miller <djm@mindrot.org>
5984Date: Thu Sep 5 11:09:28 2019 +1000
5985
5986 Fuzzer harness for sshsig
5987
5988commit b08a6bc1cc7750c6f8a425d1cdbd86552fffc637
5989Author: Damien Miller <djm@mindrot.org>
5990Date: Tue Sep 3 18:45:42 2019 +1000
5991
5992 oops; missed including the actual file
5993
5994commit 1a72c0dd89f09754df443c9576dde624a17d7dd0
5995Author: Damien Miller <djm@mindrot.org>
5996Date: Tue Sep 3 18:44:10 2019 +1000
5997
5998 portability fixes for sshsig
5999
6000commit 6d6427d01304d967e58544cf1c71d2b4394c0522
6001Author: djm@openbsd.org <djm@openbsd.org>
6002Date: Tue Sep 3 08:37:45 2019 +0000
6003
6004 upstream: regress test for sshsig; feedback and ok markus@
6005
6006 OpenBSD-Regress-ID: 74c0974f2cdae8d9599b9d76a09680bae55d8a8b
6007
6008commit 59650f0eaf65115afe04c39abfb93a4fc994ec55
6009Author: djm@openbsd.org <djm@openbsd.org>
6010Date: Tue Sep 3 08:37:06 2019 +0000
6011
6012 upstream: only add plain keys to prevent any certs laying around
6013
6014 from confusing the test.
6015
6016 OpenBSD-Regress-ID: b8f1508f822bc560b98dea910e61ecd76f34100f
6017
6018commit d637c4aee6f9b5280c13c020d7653444ac1fcaa5
6019Author: djm@openbsd.org <djm@openbsd.org>
6020Date: Tue Sep 3 08:35:27 2019 +0000
6021
6022 upstream: sshsig tweaks and improvements from and suggested by
6023
6024 Markus
6025
6026 ok markus/me
6027
6028 OpenBSD-Commit-ID: ea4f46ad5a16b27af96e08c4877423918c4253e9
6029
6030commit 2a9c9f7272c1e8665155118fe6536bebdafb6166
6031Author: djm@openbsd.org <djm@openbsd.org>
6032Date: Tue Sep 3 08:34:19 2019 +0000
6033
6034 upstream: sshsig: lightweight signature and verification ability
6035
6036 for OpenSSH
6037
6038 This adds a simple manual signature scheme to OpenSSH.
6039 Signatures can be made and verified using ssh-keygen -Y sign|verify
6040
6041 Signatures embed the key used to make them. At verification time, this
6042 is matched via principal name against an authorized_keys-like list
6043 of allowed signers.
6044
6045 Mostly by Sebastian Kinne w/ some tweaks by me
6046
6047 ok markus@
6048
6049 OpenBSD-Commit-ID: 2ab568e7114c933346616392579d72be65a4b8fb
6050
6051commit 5485f8d50a5bc46aeed829075ebf5d9c617027ea
6052Author: djm@openbsd.org <djm@openbsd.org>
6053Date: Tue Sep 3 08:32:11 2019 +0000
6054
6055 upstream: move authorized_keys option parsing helpsers to misc.c
6056
6057 and make them public; ok markus@
6058
6059 OpenBSD-Commit-ID: c18bcb2a687227b3478377c981c2d56af2638ea2
6060
6061commit f8df0413f0a057b6a3d3dd7bd8bc7c5d80911d3a
6062Author: djm@openbsd.org <djm@openbsd.org>
6063Date: Tue Sep 3 08:31:20 2019 +0000
6064
6065 upstream: make get_sigtype public as sshkey_get_sigtype(); ok
6066
6067 markus@
6068
6069 OpenBSD-Commit-ID: 01f8cdbec63350490d2249f41112c5780d1cfbb8
6070
6071commit dd8002fbe63d903ffea5be7b7f5fc2714acab4a0
6072Author: djm@openbsd.org <djm@openbsd.org>
6073Date: Tue Sep 3 08:30:47 2019 +0000
6074
6075 upstream: move advance_past_options to authfile.c and make it
6076
6077 public; ok markus@
6078
6079 OpenBSD-Commit-ID: edda2fbba2c5b1f48e60f857a2010479e80c5f3c
6080
6081commit c72d78ccbe642e08591a626e5de18381489716e0
6082Author: djm@openbsd.org <djm@openbsd.org>
6083Date: Tue Sep 3 08:29:58 2019 +0000
6084
6085 upstream: move skip_space() to misc.c and make it public; ok
6086
6087 markus@
6088
6089 OpenBSD-Commit-ID: caa77e8a3b210948e29ad3e28c5db00852961eae
6090
6091commit 06af3583f46e2c327fdd44d8a95b8b4e8dfd8db5
6092Author: djm@openbsd.org <djm@openbsd.org>
6093Date: Tue Sep 3 08:29:15 2019 +0000
6094
6095 upstream: authfd: add function to check if key is in agent
6096
6097 This commit adds a helper function which allows the caller to
6098 check if a given public key is present in ssh-agent.
6099
6100 work by Sebastian Kinne; ok markus@
6101
6102 OpenBSD-Commit-ID: d43c5826353e1fdc1af71eb42961b30782c7bd13
6103
6104commit 2ab5a8464870cc4b29ddbe849bbbc255729437bf
6105Author: djm@openbsd.org <djm@openbsd.org>
6106Date: Tue Sep 3 08:28:30 2019 +0000
6107
6108 upstream: fix memleak in ssh_free_identitylist(); ok markus@
6109
6110 OpenBSD-Commit-ID: aa51f77ae2c5330a1f61b2d22933f24a443f9abf
6111
6112commit 85443f165b4169b2a448b3e24bc1d4dc5b3156a4
6113Author: djm@openbsd.org <djm@openbsd.org>
6114Date: Tue Sep 3 08:27:52 2019 +0000
6115
6116 upstream: factor out confirm_overwrite(); ok markus@
6117
6118 OpenBSD-Commit-ID: 304e95381b39c774c8fced7e5328b106a3ff0400
6119
6120commit 9a396e33685633581c67d5ad9664570ef95281f2
6121Author: djm@openbsd.org <djm@openbsd.org>
6122Date: Mon Sep 2 23:46:46 2019 +0000
6123
6124 upstream: constify an argument
6125
6126 OpenBSD-Commit-ID: 724bafc9f993746ad4303e95bede2c030de6233b
6127
6128commit b52c0c2e64988277a35a955a474d944967059aeb
6129Author: djm@openbsd.org <djm@openbsd.org>
6130Date: Mon Sep 2 00:19:25 2019 +0000
6131
6132 upstream: downgrade PKCS#11 "provider returned no slots" warning
6133
6134 from log level error to debug. This is common when attempting to enumerate
6135 keys on smartcard readers with no cards plugged in. bz#3058 ok dtucker@
6136
6137 OpenBSD-Commit-ID: bb8839ddeb77c271390488af1b771041d43e49c6
6138
6139commit 0713322e18162463c5ab5ddfb9f935055ca775d8
6140Author: djm@openbsd.org <djm@openbsd.org>
6141Date: Sun Sep 1 23:47:32 2019 +0000
6142
6143 upstream: print comment when printing pubkey from private
6144
6145 bz#3052; ok dtucker
6146
6147 OpenBSD-Commit-ID: a91b2a8d5f1053d34d7fce44523c53fb534ba914
6148
6149commit 368f1cc2fbd6ad10c66bc1b67c2c04aebf8a04a8
6150Author: Damien Miller <djm@mindrot.org>
6151Date: Mon Sep 2 10:28:42 2019 +1000
6152
6153 fixed test in OSX closefrom() replacement
6154
6155 from likan_999.student AT sina.com
6156
6157commit 6b7c53498def19a14dd9587bf521ab6dbee8988f
6158Author: Damien Miller <djm@mindrot.org>
6159Date: Mon Sep 2 10:22:02 2019 +1000
6160
6161 retain Solaris PRIV_FILE_LINK_ANY in sftp-server
6162
6163 Dropping this privilege removes the ability to create hard links to
6164 files owned by other users. This is required for the legacy sftp rename
6165 operation.
6166
6167 bz#3036; approach ok Alex Wilson (the original author of the Solaris
6168 sandbox/pledge replacement code)
6169
6170commit e50f808712393e86d69e42e9847cdf8d473412d7
6171Author: dtucker@openbsd.org <dtucker@openbsd.org>
6172Date: Fri Aug 30 05:08:28 2019 +0000
6173
6174 upstream: Use ed25519 for most hostkey rotation tests since it's
6175
6176 supported even when built without OpenSSL. Use RSA for the secondary type
6177 test if supported, otherwise skip it. Fixes this test for !OpenSSL builds.
6178
6179 OpenBSD-Regress-ID: 101cb34a84fd974c623bdb2e496f25a6e91be109
6180
6181commit 5e4796c47dd8d6c38fb2ff0b3e817525fed6040d
6182Author: bluhm@openbsd.org <bluhm@openbsd.org>
6183Date: Thu Aug 22 21:47:27 2019 +0000
6184
6185 upstream: Test did not compile due to missing symbols. Add source
6186
6187 sshbuf-misc.c to regress as it was done in ssh make file. from Moritz Buhl
6188
6189 OpenBSD-Regress-ID: 9e1c23476bb845f3cf3d15d9032da3ed0cb2fcf5
6190
6191commit e0e7e3d0e26f2c30697e6d0cfc293414908963c7
6192Author: Damien Miller <djm@mindrot.org>
6193Date: Fri Aug 30 14:26:19 2019 +1000
6194
6195 tweak warning flags
6196
6197 Enable -Wextra if compiler supports it
6198
6199 Set -Wno-error=format-truncation if available to prevent expected
6200 string truncations in openbsd-compat from breaking -Werror builds
6201
6202commit 28744182cf90e0073b76a9e98de58a47e688b2c4
6203Author: Damien Miller <djm@mindrot.org>
6204Date: Fri Aug 30 13:21:38 2019 +1000
6205
6206 proc_pidinfo()-based closefrom() for OS X
6207
6208 Refactor closefrom() to use a single brute-force close() loop fallback.
6209
6210 Based on patch from likan_999.student@sina.com in bz#3049. ok dtucker@
6211
6212commit dc2ca588144f088a54febebfde3414568dc73d5f
6213Author: kn@openbsd.org <kn@openbsd.org>
6214Date: Fri Aug 16 11:16:32 2019 +0000
6215
6216 upstream: Call comma-separated lists as such to clarify semantics
6217
6218 Options such as Ciphers take values that may be a list of ciphers; the
6219 complete list, not indiviual elements, may be prefixed with a dash or plus
6220 character to remove from or append to the default list respectively.
6221
6222 Users might read the current text as if each elment took an optional prefix,
6223 so tweak the wording from "values" to "list" to prevent such ambiguity for
6224 all options supporting this semantics (those that provide a list of
6225 available elements via "ssh -Q ...").
6226
6227 Input and OK jmc
6228
6229 OpenBSD-Commit-ID: 4fdd175b0e5f5cb10ab3f26ccc38a93bb6515d57
6230
6231commit c4736f39e66729ce2bf5b06ee6b391e092b48f47
6232Author: djm@openbsd.org <djm@openbsd.org>
6233Date: Fri Aug 16 06:35:27 2019 +0000
6234
6235 upstream: include sshbuf-misc.c in SRCS_BASE
6236
6237 OpenBSD-Commit-ID: 99dd10e72c04e93849981d43d64c946619efa474
6238
6239commit d0e51810f332fe44ebdba41113aacf319d35f5a5
6240Author: Darren Tucker <dtucker@dtucker.net>
6241Date: Sat Aug 24 15:12:11 2019 +1000
6242
6243 Fix pasto in fallback code.
6244
6245 There is no parameter called "pathname", it should simply be "path".
6246 bz#3059, patch from samuel at cendio.se.
6247
6248commit e83c989bfd9fc9838b7dfb711d1dc6da81814045
6249Author: Damien Miller <djm@mindrot.org>
6250Date: Fri Aug 23 10:19:30 2019 +1000
6251
6252 use SC_ALLOW_ARG_MASK to limit mmap protections
6253
6254 Restrict to PROT_(READ|WRITE|NONE), i.e. exclude PROT_EXEC
6255
6256commit f6906f9bf12c968debec3671bbf19926ff8a235b
6257Author: Damien Miller <djm@mindrot.org>
6258Date: Fri Aug 23 10:08:48 2019 +1000
6259
6260 allow mprotect(2) with PROT_(READ|WRITE|NONE) only
6261
6262 Used by some hardened heap allocators. Requested by Yegor
6263 Timoshenko in https://github.com/openssh/openssh-portable/pull/142
6264
6265commit e3b6c966b79c3ea5d51b923c3bbdc41e13b96ea0
6266Author: djm@openbsd.org <djm@openbsd.org>
6267Date: Fri Aug 16 06:13:15 2019 +0000
6268
6269 upstream: switch percent_expand() to use sshbuf instead of a limited
6270
6271 fixed buffer; ok markus@
6272
6273 OpenBSD-Commit-ID: 3f9ef20bca5ef5058b48c1cac67c53b9a1d15711
6274
6275commit 9ab5b9474779ac4f581d402ae397f871ed16b383
6276Author: djm@openbsd.org <djm@openbsd.org>
6277Date: Fri Aug 9 05:05:54 2019 +0000
6278
6279 upstream: produce a useful error message if the user's shell is set
6280
6281 incorrectly during "match exec" processing. bz#2791 reported by Dario
6282 Bertini; ok dtucker
6283
6284 OpenBSD-Commit-ID: cf9eddd6a6be726cb73bd9c3936f3888cd85c03d
6285
6286commit 8fdbc7247f432578abaaca1b72a0dbf5058d67e5
6287Author: dtucker@openbsd.org <dtucker@openbsd.org>
6288Date: Fri Aug 9 04:24:03 2019 +0000
6289
6290 upstream: Change description of TCPKeepAlive from "inactive" to
6291
6292 "unresponsive" to clarify what it checks for. Patch from jblaine at
6293 kickflop.net via github pr#129, ok djm@.
6294
6295 OpenBSD-Commit-ID: 3682f8ec7227f5697945daa25d11ce2d933899e9
6296
6297commit 7afc45c3ed72672690014dc432edc223b23ae288
6298Author: dtucker@openbsd.org <dtucker@openbsd.org>
6299Date: Thu Aug 8 08:02:57 2019 +0000
6300
6301 upstream: Allow the maximimum uint32 value for the argument passed to
6302
6303 -b which allows better error messages from later validation. bz#3050, ok
6304 djm@
6305
6306 OpenBSD-Commit-ID: 10adf6876b2401b3dc02da580ebf67af05861673
6307
6308commit c31e4f5fb3915c040061981a67224de7650ab34b
6309Author: naddy@openbsd.org <naddy@openbsd.org>
6310Date: Mon Aug 5 21:45:27 2019 +0000
6311
6312 upstream: Many key types are supported now, so take care to check
6313
6314 the size restrictions and apply the default size only to the matching key
6315 type. tweak and ok dtucker@
6316
6317 OpenBSD-Commit-ID: b825de92d79cc4cba19b298c61e99909488ff57e
6318
6319commit 6b39a7b49ebacec4e70e24bfc8ea2f11057aac22
6320Author: dtucker@openbsd.org <dtucker@openbsd.org>
6321Date: Mon Aug 5 11:50:33 2019 +0000
6322
6323 upstream: Remove now-redundant perm_ok arg since
6324
6325 sshkey_load_private_type will now return SSH_ERR_KEY_BAD_PERMISSIONS in that
6326 case. Patch from jitendra.sharma at intel.com, ok djm@
6327
6328 OpenBSD-Commit-ID: 07916a17ed0a252591b71e7fb4be2599cb5b0c77
6329
6330commit d46075b923bf25e6f25959a3f5b458852161cb3e
6331Author: Darren Tucker <dtucker@dtucker.net>
6332Date: Mon Aug 5 21:36:48 2019 +1000
6333
6334 Fix mem leak in unit test.
6335
6336 Patch from jitendra.sharma at intel.com.
6337
6338commit c4ffb72593c08921cf9291bc05a5ef1d0aaa6891
6339Author: djm@openbsd.org <djm@openbsd.org>
6340Date: Fri Aug 2 01:41:24 2019 +0000
6341
6342 upstream: fix some memleaks in test_helper code
6343
6344 bz#3037 from Jitendra Sharma
6345
6346 OpenBSD-Regress-ID: 71440fa9186f5842a65ce9a27159385c6cb6f751
6347
6348commit 6e76e69dc0c7712e9ac599af34bd091b0e7dcdb5
6349Author: djm@openbsd.org <djm@openbsd.org>
6350Date: Fri Aug 2 01:23:19 2019 +0000
6351
6352 upstream: typo; from Christian Hesse
6353
6354 OpenBSD-Commit-ID: 82f6de7438ea7ee5a14f44fdf5058ed57688fdc3
6355
6356commit 49fa065a1bfaeb88a59abdfa4432d3b9c35b0655
6357Author: djm@openbsd.org <djm@openbsd.org>
6358Date: Tue Jul 30 05:04:49 2019 +0000
6359
6360 upstream: let sshbuf_find/cmp take a void* for the
6361
6362 search/comparison argument, instead of a u_char*. Saves callers needing to
6363 cast.
6364
6365 OpenBSD-Commit-ID: d63b69b7c5dd570963e682f758f5a47b825605ed
6366
6367commit 7adf6c430d6fc17901e167bc0789d31638f5c2f8
6368Author: mestre@openbsd.org <mestre@openbsd.org>
6369Date: Wed Jul 24 08:57:00 2019 +0000
6370
6371 upstream: When using a combination of a Yubikey+GnuPG+remote
6372
6373 forwarding the gpg-agent (and options ControlMaster+RemoteForward in
6374 ssh_config(5)) then the codepath taken will call mux_client_request_session
6375 -> mm_send_fd -> sendmsg(2). Since sendmsg(2) is not allowed in that codepath
6376 then pledge(2) kills the process.
6377
6378 The solution is to add "sendfd" to pledge(2), which is not too bad considering
6379 a little bit later we reduce pledge(2) to only "stdio proc tty" in that
6380 codepath.
6381
6382 Problem reported and diff provided by Timothy Brown <tbrown at freeshell.org>
6383
6384 OK deraadt@
6385
6386 OpenBSD-Commit-ID: 7ce38b6542bbec00e441595d0a178e970a9472ac
6387
6388commit 0e2fe18acc1da853a9120c2e9af68e8d05e6503e
6389Author: dtucker@openbsd.org <dtucker@openbsd.org>
6390Date: Tue Jul 23 23:06:57 2019 +0000
6391
6392 upstream: Fix typo in CASignatureAlgorithms wherein what should be
6393
6394 a comma is a dot. Patch from hnj2 via github pr#141.
6395
6396 OpenBSD-Commit-ID: 01f5a460438ff1af09aab483c0a70065309445f0
6397
6398commit e93ffd1a19fc47c49d68ae2fb332433690ecd389
6399Author: Darren Tucker <dtucker@dtucker.net>
6400Date: Mon Jul 29 16:04:01 2019 +1000
6401
6402 Report success of individual tests as well as all.
6403
6404 This puts the "all tests passed" message back at the end where the
6405 test harnesses can find it.
6406
6407commit 2ad5b36b18bddf2965fe60384c29b3f1d451b4ed
6408Author: Damien Miller <djm@mindrot.org>
6409Date: Mon Jul 29 09:49:23 2019 +1000
6410
6411 convert to UTF-8; from Mike Frysinger
6412
6413commit d31e7c937ba0b97534f373cf5dea34675bcec602
6414Author: dtucker@openbsd.org <dtucker@openbsd.org>
6415Date: Fri Jul 26 04:22:21 2019 +0000
6416
6417 upstream: Restrict limit-keytype to types supported by build. This
6418
6419 means we have to skip a couple tests when only one key type is supported.
6420
6421 OpenBSD-Regress-ID: 22d05befb9c7ce21ce8dc22acf1ffe9e2ef2e95e
6422
6423commit 0967a233b8a28907ae8a4a6773c89f21d2ace11b
6424Author: Darren Tucker <dtucker@dtucker.net>
6425Date: Thu Jul 25 18:36:28 2019 +1000
6426
6427 Remove override disabling DH-GEX.
6428
6429 The DH-GEX override doesn't work when build without OpenSSL, and
6430 we'll prefer curve25519 these days, removing the need for it.
6431
6432commit 061407efc19b41ab4a7485e5adcff2a12befacdb
6433Author: dtucker@openbsd.org <dtucker@openbsd.org>
6434Date: Thu Jul 25 09:17:35 2019 +0000
6435
6436 upstream: Only use supported key types during KRL test, preferring
6437
6438 ed25519 since it's supported by both OpenSSL and non-OpenSSL builds.
6439
6440 OpenBSD-Regress-ID: 9f2bb3eadd50fcc8245b1bd8fd6f0e53602f71aa
6441
6442commit 47f8ff1fa5b76790c1d785815fd13ee6009f8012
6443Author: dtucker@openbsd.org <dtucker@openbsd.org>
6444Date: Thu Jul 25 08:48:11 2019 +0000
6445
6446 upstream: Switch keys-command test from rsa to ed25519 since it's
6447
6448 supported for both OpenSSL and non-OpenSSL builds.
6449
6450 OpenBSD-Regress-ID: 174be4be876edd493e4a5c851e5bc579885e7a0a
6451
6452commit 1e94afdfa8df774ab7dd3bad52912b636dc31bbd
6453Author: dtucker@openbsd.org <dtucker@openbsd.org>
6454Date: Thu Jul 25 08:28:15 2019 +0000
6455
6456 upstream: Make certificate tests work with the supported key
6457
6458 algorithms. Allows tests to pass when built without OpenSSL.
6459
6460 OpenBSD-Regress-ID: 617169a6dd9d06db3697a449d9a26c284eca20fc
6461
6462commit 26bf693661a48b97b6023f702b2af643676ac21a
6463Author: dtucker@openbsd.org <dtucker@openbsd.org>
6464Date: Tue Jul 23 13:49:14 2019 +0000
6465
6466 upstream: Construct list of key types to test based on the types
6467
6468 supported by the binaries.
6469
6470 OpenBSD-Regress-ID: fcbd115efacec8ab0ecbdb3faef79ac696cb1d62
6471
6472commit 773c55b3d1230e8f7714a1b33873c37b85049c74
6473Author: dtucker@openbsd.org <dtucker@openbsd.org>
6474Date: Tue Jul 23 13:32:48 2019 +0000
6475
6476 upstream: Only use DSA key type in tests if binaries support it.
6477
6478 OpenBSD-Regress-ID: 770e31fe61dc33ed8eea9c04ce839b33ddb4dc96
6479
6480commit 159e987a54d92ccd73875e7581ffc64e8927a715
6481Author: Darren Tucker <dtucker@dtucker.net>
6482Date: Wed Jul 24 14:21:19 2019 +1000
6483
6484 Split test targets further.
6485
6486 Splits test into file-tests, t-exec, unit and interop-tests and their
6487 respective dependencies. Should allow running any set individually
6488 without having to build the other dependencies that are not needed
6489 for that specific test.
6490
6491commit 520d4550a2470106d63e30079bb05ce82f3a4f7d
6492Author: Darren Tucker <dtucker@dtucker.net>
6493Date: Wed Jul 24 11:20:18 2019 +1000
6494
6495 Add lib dependencies for regress binary targets.
6496
6497commit 4e8d0dd78d5f6142841a07dc8b8c6b4730eaf587
6498Author: Darren Tucker <dtucker@dtucker.net>
6499Date: Wed Jul 24 00:12:51 2019 +1000
6500
6501 Make "unit" a dependency of "test".
6502
6503commit 4317b2a0480e293e58ba115e47b49d3a384b6568
6504Author: Darren Tucker <dtucker@dtucker.net>
6505Date: Tue Jul 23 23:24:47 2019 +1000
6506
6507 upstream rev 1.28: fix comment typo.
6508
6509commit e0055af2bd39fdb44566ff6594147664e1fac8b8
6510Author: Darren Tucker <dtucker@dtucker.net>
6511Date: Tue Jul 23 23:06:22 2019 +1000
6512
6513 Split regress-binaries into two targets.
6514
6515 Split the binaries for the unit tests out into a regress-unit-binaries
6516 target, and add a dependency on it for only the unit tests. This allows
6517 us to run the integration tests only ("make t-exec") without building
6518 the unit tests, which allows us to run a subset of the tests when
6519 building --without-openssl without trying (and failing) to build the
6520 unit tests.
6521
6522 This means there are two targets for "unit" which I *think* is valid
6523 (it works in testing, and makedepend will generate Makefiles of this
6524 form)a but I could be wrong.
6525
6526commit 7cdf9fdcf11aaaa98c2bd22c92882ea559e772ad
6527Author: dtucker@openbsd.org <dtucker@openbsd.org>
6528Date: Tue Jul 23 08:19:29 2019 +0000
6529
6530 upstream: Skip DH group generation test if binaries don't support
6531
6532 DH-GEX.
6533
6534 OpenBSD-Regress-ID: 7c918230d969ecf7656babd6191a74526bffbffd
6535
6536commit 3a3eab8bb0da3d2f0f32cb85a1a268bcca6e4d69
6537Author: dtucker@openbsd.org <dtucker@openbsd.org>
6538Date: Tue Jul 23 07:55:29 2019 +0000
6539
6540 upstream: Only test conversion of key types supported by the
6541
6542 binaries.
6543
6544 OpenBSD-Regress-ID: e3f0938a0a7407e2dfbb90abc3ec979ab6e8eeea
6545
6546commit 7e66b7d98c6e3f48a1918c3e1940c9b11b10ec63
6547Author: dtucker@openbsd.org <dtucker@openbsd.org>
6548Date: Tue Jul 23 07:39:43 2019 +0000
6549
6550 upstream: Only add ssh-dss to allowed key types if it's supported
6551
6552 by the binary.
6553
6554 OpenBSD-Regress-ID: 395a54cab16e9e4ece9aec047ab257954eebd413
6555
6556commit fd0684b319e664d8821dc4ca3026126dfea3ccf4
6557Author: Darren Tucker <dtucker@dtucker.net>
6558Date: Tue Jul 23 22:36:39 2019 +1000
6559
6560 Remove sys/cdefs.h include.
6561
6562 It's not needed on -portable (that's handled by includes.h) and not all
6563 platforms have it.
6564
6565commit 9634ffbf29b3c2493e69d10b37077b09a8cbf5ff
6566Author: Darren Tucker <dtucker@dtucker.net>
6567Date: Tue Jul 23 22:25:44 2019 +1000
6568
6569 Add headers to prevent warnings w/out OpenSSL.
6570
6571commit 2ea60312e1c08dea88982fec68244f89a40912ff
6572Author: Darren Tucker <dtucker@dtucker.net>
6573Date: Tue Jul 23 22:11:50 2019 +1000
6574
6575 Include stdlib.h for free() and calloc().
6576
6577commit 11cba2a4523fda447e2554ea457484655bedc831
6578Author: Darren Tucker <dtucker@dtucker.net>
6579Date: Tue Jul 23 21:51:22 2019 +1000
6580
6581 Re-apply portability changes to current sha2.{c,h}.
6582
6583 Rather than attempt to apply 14 years' worth of changes to OpenBSD's sha2
6584 I imported the current versions directly then re-applied the portability
6585 changes. This also allowed re-syncing digest-libc.c against upstream.
6586
6587commit 09159594a3bbd363429ee6fafde57ce77986dd7c
6588Author: Darren Tucker <dtucker@dtucker.net>
6589Date: Tue Jul 23 20:27:51 2019 +1000
6590
6591 Import current sha2.c and sha2.h from OpenBSD.
6592
6593 These are not changed from their original state, the next commit will
6594 re-apply the portable changes.
6595
6596commit 2e6035b900cc9d7432d95084e03993d1b426f812
6597Author: Darren Tucker <dtucker@dtucker.net>
6598Date: Tue Jul 23 08:11:22 2019 +1000
6599
6600 Rename valgrind "errors" to "failures".
6601
6602 When valgrind is enabled, test-exec.sh counts the number of invocations
6603 that valgrind detects failures in, not the total number of errors detected.
6604 This makes the name to be more accurate.
6605
6606commit e82c9bb9ffa65725cc2e03ea81cb79ce3387f66b
6607Author: Darren Tucker <dtucker@dtucker.net>
6608Date: Fri Jul 19 18:51:18 2019 +1000
6609
6610 Skip running sftp-chroot under Valgrind.
6611
6612commit 41e22c2e05cb950b704945ac9408f6109c9b7848
6613Author: dtucker@openbsd.org <dtucker@openbsd.org>
6614Date: Sat Jul 20 09:50:58 2019 +0000
6615
6616 upstream: Remove the sleeps and thus races from the forwarding
6617
6618 test. They were originally required to work with Protocol 1, but now we can
6619 use ssh -N and the control socket without the sleeps. While there, suppress
6620 output fro the control exit commands.
6621
6622 OpenBSD-Regress-ID: 4c51a1d651242f12c90074c18c61008a74c1c790
6623
6624commit 0423043c5e54293f4dd56041304fd0046c317be9
6625Author: dtucker@openbsd.org <dtucker@openbsd.org>
6626Date: Sat Jul 20 09:37:31 2019 +0000
6627
6628 upstream: Allow SLEEPTIME to be overridden.
6629
6630 OpenBSD-Regress-ID: 1596ab168729954be3d219933b2d01cc93687e76
6631
6632commit d466b6a5cfba17a83c7aae9f584ab164e2ece0a1
6633Author: dtucker@openbsd.org <dtucker@openbsd.org>
6634Date: Sat Jul 20 09:14:40 2019 +0000
6635
6636 upstream: Move sleep time into a variable so that we can increase
6637
6638 it for platforms or configurations that are much slower then usual.
6639
6640 OpenBSD-Regress-ID: 88586cabc800062c260d0b876bdcd4ca3f58a872
6641
6642commit b4a7c9d2b5f928e0b902b580d35dc8b244a3aae0
6643Author: djm@openbsd.org <djm@openbsd.org>
6644Date: Fri Jul 19 03:45:44 2019 +0000
6645
6646 upstream: add regression tests for scp for out-of-destination path file
6647
6648 creation by Harry Sintonen via Jakub Jelen in bz3007
6649
6650 OpenBSD-Regress-ID: 01ae5fbc6ce400b2df5a84dc3152a9e31f354c07
6651
6652commit bca0582063f148c7ddf409ec51435a5a726bee4c
6653Author: djm@openbsd.org <djm@openbsd.org>
6654Date: Fri Jul 19 03:38:01 2019 +0000
6655
6656 upstream: Accept the verbose flag when searching for host keys in known
6657
6658 hosts (i.e. "ssh-keygen -vF host") to print the matching host's random- art
6659 signature too. bz#3003 "amusing, pretty" deraadt@
6660
6661 OpenBSD-Commit-ID: 686221a5447d6507f40a2ffba5393984d889891f
6662
6663commit 5299a09fa2879a068af200c91028fcfa9283c0f0
6664Author: Darren Tucker <dtucker@dtucker.net>
6665Date: Fri Jul 19 13:50:25 2019 +1000
6666
6667 Revert one dependency per line change.
6668
6669 It turns out that having such a large number of lines in the .depend
6670 file will cause the memory usage of awk during AC_SUBST to blow up on at
6671 least NetBSD's awk, causing configure to fail.
6672
6673commit 01dddb231f23b4a7b616f9d33a0b9d937f9eaf0e
6674Author: Damien Miller <djm@mindrot.org>
6675Date: Fri Jul 19 13:19:19 2019 +1000
6676
6677 fix SIGWINCH delivery of Solaris for mux sessions
6678
6679 Remove PRIV_PROC_SESSION which was limiting ability to send SIGWINCH
6680 signals to other sessions. bz#3030; report and fix from Darren Moffat
6681
6682commit 05500af21d27c1a3ddac232b018cc23da7b1ee95
6683Author: Darren Tucker <dtucker@dtucker.net>
6684Date: Fri Jul 19 13:20:03 2019 +1000
6685
6686 Force dependencies one per line.
6687
6688 Force makedepend to output one dependency per line, which will make
6689 reading diffs against it much easier. ok djm@
6690
6691commit b5bc5d016bbb83eb7f8e685390044e78b1ea1427
6692Author: Darren Tucker <dtucker@dtucker.net>
6693Date: Fri Jul 19 13:18:07 2019 +1000
6694
6695 make depend.
6696
6697commit 65333f7454365fe40f7367630e7dd10903b9d99e
6698Author: Darren Tucker <dtucker@dtucker.net>
6699Date: Fri Jul 19 13:16:11 2019 +1000
6700
6701 Show when skipping valgrind for a test.
6702
6703commit fccb7eb3436da8ef3dcd22e5936ba1abc7ae6730
6704Author: Darren Tucker <dtucker@dtucker.net>
6705Date: Fri Jul 19 10:41:56 2019 +1000
6706
6707 Enable connect-privsep test with valgrind.
6708
6709 connect-privsep seems to work OK with valgrind now so don't skip
6710 valgrind on it.
6711
6712commit d7423017265c5ae6d0be39340feb6c9f016b1f71
6713Author: Darren Tucker <dtucker@dtucker.net>
6714Date: Fri Jul 19 07:43:07 2019 +1000
6715
6716 Show valgrind results and error counts.
6717
6718commit 22b9b3e944880db906c6ac5527c4228bd92b293a
6719Author: Darren Tucker <dtucker@dtucker.net>
6720Date: Thu Jul 18 13:40:12 2019 +1000
6721
6722 Fix format string integer type in error message.
6723
6724commit ed46a0c0705895834d3f47a46faa89c2a71b760a
6725Author: djm@openbsd.org <djm@openbsd.org>
6726Date: Thu Jul 18 13:26:00 2019 +0000
6727
6728 upstream: fix off-by-one in sshbuf_dtob64() base64 wrapping that could
6729
6730 cause extra newlines to be appended at the end of the base64 text (ugly, but
6731 harmless). Found and fixed by Sebastian Kinne
6732
6733 OpenBSD-Commit-ID: 9fe290bd68f706ed8f986a7704ca5a2bd32d7b68
6734
6735commit a192021fedead23c375077f92346336d531f8cad
6736Author: Darren Tucker <dtucker@dtucker.net>
6737Date: Thu Jul 18 11:09:38 2019 +1000
6738
6739 Fail tests if Valgrind enabled and reports errors.
6740
6741 Also dump the failing valgrind report to stdout (not the cleanest
6742 solution, but better than nothing).
6743
6744commit d1c491ecb939ee10b341fa7bb6205dff19d297e5
6745Author: Darren Tucker <dtucker@dtucker.net>
6746Date: Thu Jul 18 10:17:54 2019 +1000
6747
6748 Allow low-priv tests to write to pipe dir.
6749
6750 When running regression tests with Valgrind and SUDO, the low-priv agent
6751 tests need to be able to create pipes in the appropriate directory.
6752
6753commit 8a5bb3e78191cc206f970c26d2a26c949971e91a
6754Author: Darren Tucker <dtucker@dtucker.net>
6755Date: Wed Jul 17 21:24:55 2019 +1000
6756
6757 Put valgrind vgdb files to a specific directory.
6758
6759 Valgrind by default puts vgdb files and pipes under /tmp, however it
6760 is not always able to clean them up, which can cause test failures when
6761 there's a pid/file collision. Using a specific directory ensures that
6762 we can clean up and start clean.
6763
6764commit f8829fe57fb0479d6103cfe1190095da3c032c6d
6765Author: djm@openbsd.org <djm@openbsd.org>
6766Date: Tue Jul 16 22:16:49 2019 +0000
6767
6768 upstream: adapt to sshbuf_dtob64() change
6769
6770 OpenBSD-Regress-ID: 82374a83edf0955fd1477169eee3f5d6467405a6
6771
6772commit 1254fcbb2f005f745f2265016ee9fa52e16d37b0
6773Author: dtucker@openbsd.org <dtucker@openbsd.org>
6774Date: Tue Jul 16 03:21:54 2019 +0000
6775
6776 upstream: Remove ssh1 files from CLEANFILES since ssh1 no longer
6777
6778 supported.
6779
6780 OpenBSD-Regress-ID: 5b9ae869dc669bac05939b4a2fdf44ee067acfa0
6781
6782commit 9dc81a5adabc9a7d611ed2e63fbf4c85d43b15c6
6783Author: dtucker@openbsd.org <dtucker@openbsd.org>
6784Date: Tue Jul 16 02:09:29 2019 +0000
6785
6786 upstream: Update names of host key files in CLEANFILES to match
6787
6788 recent changes to the tests.
6789
6790 OpenBSD-Regress-ID: 28743052de3acf70b06f18333561497cd47c4ecf
6791
6792commit e44e4ad1190db22ed407a79f32a8cff5bcd2b815
6793Author: Damien Miller <djm@mindrot.org>
6794Date: Tue Jul 16 23:26:53 2019 +1000
6795
6796 depend
6797
6798commit 16dd8b2c78a0de106c7429e2a294d203f6bda3c7
6799Author: djm@openbsd.org <djm@openbsd.org>
6800Date: Tue Jul 16 13:18:39 2019 +0000
6801
6802 upstream: remove mostly vestigal uuencode.[ch]; moving the only unique
6803
6804 functionality there (wrapping of base64-encoded data) to sshbuf functions;
6805 feedback and ok markus@
6806
6807 OpenBSD-Commit-ID: 4dba6735d88c57232f6fccec8a08bdcfea44ac4c
6808
6809commit 45478898f9590b5cc8bc7104e573b84be67443b0
6810Author: Darren Tucker <dtucker@dtucker.net>
6811Date: Tue Jul 16 09:20:23 2019 +1000
6812
6813 Hook memmem compat code into build.
6814
6815 This fixes builds on platforms that don't have it (at least old DragonFly,
6816 probably others).
6817
6818commit c7bd4617293a903bd3fac3394a7e72d439af49a5
6819Author: Darren Tucker <dtucker@dtucker.net>
6820Date: Tue Jul 16 09:07:18 2019 +1000
6821
6822 Import memmem.c from OpenBSD.
6823
6824commit 477e2a3be8b10df76e8d76f0427b043280d73d68
6825Author: djm@openbsd.org <djm@openbsd.org>
6826Date: Mon Jul 15 13:12:02 2019 +0000
6827
6828 upstream: unit tests for sshbuf_cmp() and sshbuf_find(); ok markus
6829
6830 OpenBSD-Regress-ID: b52d36bc3ab6dc158c1e59a9a4735f821cf9e1fd
6831
6832commit eb0d8e708a1f958aecd2d6e2ff2450af488d4c2a
6833Author: djm@openbsd.org <djm@openbsd.org>
6834Date: Mon Jul 15 13:16:29 2019 +0000
6835
6836 upstream: support PKCS8 as an optional format for storage of
6837
6838 private keys, enabled via "ssh-keygen -m PKCS8" on operations that save
6839 private keys to disk.
6840
6841 The OpenSSH native key format remains the default, but PKCS8 is a
6842 superior format to PEM if interoperability with non-OpenSSH software
6843 is required, as it may use a less terrible KDF (IIRC PEM uses a single
6844 round of MD5 as a KDF).
6845
6846 adapted from patch by Jakub Jelen via bz3013; ok markus
6847
6848 OpenBSD-Commit-ID: 027824e3bc0b1c243dc5188504526d73a55accb1
6849
6850commit e18a27eedccb024acb3cd9820b650a5dff323f01
6851Author: djm@openbsd.org <djm@openbsd.org>
6852Date: Mon Jul 15 13:11:38 2019 +0000
6853
6854 upstream: two more bounds-checking sshbuf counterparts to common
6855
6856 string operations: sshbuf_cmp() (bcmp-like) and sshbuf_find() (memmem like)
6857
6858 feedback and ok markus@
6859
6860 OpenBSD-Commit-ID: fd071ec2485c7198074a168ff363a0d6052a706a
6861
6862commit bc551dfebb55845537b1095cf3ccd01640a147b7
6863Author: Darren Tucker <dtucker@dtucker.net>
6864Date: Mon Jul 15 12:52:45 2019 +1000
6865
6866 Clear valgrind-out dir to prevent collisions.
6867
6868commit 5db9ba718e983661a9114ae1418f6e412d1f52d5
6869Author: Darren Tucker <dtucker@dtucker.net>
6870Date: Mon Jul 15 12:02:27 2019 +1000
6871
6872 Allow agent tests to write to valgrind dir.
6873
6874commit 121e48fa5305f41f0477d9908e3d862987a68a84
6875Author: djm@openbsd.org <djm@openbsd.org>
6876Date: Sun Jul 14 23:33:19 2019 +0000
6877
6878 upstream: unit tests for sshbuf_peek/poke bounds-checked random access
6879
6880 functions. ok markus@
6881
6882 OpenBSD-Regress-ID: 034c4284b1da6b12e25c762a6b958efacdafbaef
6883
6884commit 101d164723ffbc38f8036b6f3ea3bfef771ba250
6885Author: djm@openbsd.org <djm@openbsd.org>
6886Date: Sun Jul 14 23:32:27 2019 +0000
6887
6888 upstream: add some functions to perform random-access read/write
6889
6890 operations inside buffers with bounds checking. Intended to replace manual
6891 pointer arithmetic wherever possible.
6892
6893 feedback and ok markus@
6894
6895 OpenBSD-Commit-ID: 91771fde7732738f1ffed078aa5d3bee6d198409
6896
6897commit 7250879c72d28275a53f2f220e49646c3e42ef18
6898Author: djm@openbsd.org <djm@openbsd.org>
6899Date: Fri Jul 12 04:08:39 2019 +0000
6900
6901 upstream: include SHA2-variant RSA key algorithms in KEX proposal;
6902
6903 allows ssh-keyscan to harvest keys from servers that disable olde SHA1
6904 ssh-rsa. bz#3029 from Jakub Jelen
6905
6906 OpenBSD-Commit-ID: 9f95ebf76a150c2f727ca4780fb2599d50bbab7a
6907
6908commit a0876bd994cab9ba6e47ba2a163a4417c7597487
6909Author: djm@openbsd.org <djm@openbsd.org>
6910Date: Fri Jul 12 03:56:21 2019 +0000
6911
6912 upstream: print explicit "not modified" message if a file was
6913
6914 requested for resumed download but was considered already complete.
6915
6916 bz#2978 ok dtucker
6917
6918 OpenBSD-Commit-ID: f32084b26a662f16215ee4ca4a403d67e49ab986
6919
6920commit b9b0f2ac9625933db53a35b1c1ce423876630558
6921Author: tb@openbsd.org <tb@openbsd.org>
6922Date: Wed Jul 10 07:04:27 2019 +0000
6923
6924 upstream: Fix a typo and make <esc><right> move right to the
6925
6926 closest end of a word just like <esc><left> moves left to the closest
6927 beginning of a word.
6928
6929 ok djm
6930
6931 OpenBSD-Commit-ID: 6afe01b05ed52d8b12eb1fda6e9af5afb5e198ee
6932
6933commit 8729498a5d239980a91d32f031b34e8c58c52f62
6934Author: Damien Miller <djm@mindrot.org>
6935Date: Wed Jul 10 09:43:19 2019 +1000
6936
6937 fix typo that prevented detection of Linux VRF
6938
6939 Reported by hexiaowen AT huawei.com
6940
6941commit 5b2b79ff7c057ee101518545727ed3023372891d
6942Author: djm@openbsd.org <djm@openbsd.org>
6943Date: Tue Jul 9 04:15:00 2019 +0000
6944
6945 upstream: cap the number of permiopen/permitlisten directives we're
6946
6947 willing to parse on a single authorized_keys line; ok deraadt@
6948
6949 OpenBSD-Commit-ID: a43a752c2555d26aa3fc754805a476f6e3e30f46
6950
6951commit eb0b51dac408fadd1fd13fa6d726ab8fdfcc4152
6952Author: Darren Tucker <dtucker@dtucker.net>
6953Date: Mon Jul 8 17:27:26 2019 +1000
6954
6955 Move log.h include inside ifdefs.
6956
6957 Fixes build on some other platforms that don't have va_list immediately
6958 available (eg NetBSD).
6959
6960commit 43702f8e6fa22a258e25c4dd950baaae0bc656b7
6961Author: Darren Tucker <dtucker@dtucker.net>
6962Date: Sat Jul 6 23:07:04 2019 +1000
6963
6964 Include log.h for debug() and friends.
6965
6966 Should fix some compiler warnings on IRIX (bz#3032).
6967
6968commit 53a6ebf1445a857f5e487b18ee5e5830a9575149
6969Author: Damien Miller <djm@mindrot.org>
6970Date: Mon Jul 8 13:44:32 2019 +1000
6971
6972 sftp-realpath.c needs includes.h
6973
6974commit 4efe1adf05ee5d3fce44320fcff68735891f4ee6
6975Author: Damien Miller <djm@mindrot.org>
6976Date: Mon Jul 8 13:38:39 2019 +1000
6977
6978 remove realpath() compat replacement
6979
6980 We shipped a BSD implementation of realpath() because sftp-server
6981 depended on its behaviour.
6982
6983 OpenBSD is now moving to a more strictly POSIX-compliant realpath(2),
6984 so sftp-server now unconditionally requires its own BSD-style realpath
6985 implementation. As such, there is no need to carry another independant
6986 implementation in openbsd-compat.
6987
6988 ok dtucker@
6989
6990commit 696fb4298e80f2ebcd188986a91b49af3b7ca14c
6991Author: dtucker@openbsd.org <dtucker@openbsd.org>
6992Date: Sun Jul 7 01:05:00 2019 +0000
6993
6994 upstream: Remove some set but never used variables. ok daraadt@
6995
6996 OpenBSD-Commit-ID: 824baf9c59afc66a4637017e397b9b74a41684e7
6997
6998commit 156e9e85e92b46ca90226605d9eff49e8ec31b22
6999Author: deraadt@openbsd.org <deraadt@openbsd.org>
7000Date: Fri Jul 5 12:35:40 2019 +0000
7001
7002 upstream: still compile uuencode.c, unbreaks build
7003
7004 OpenBSD-Commit-ID: 5ea3d63ab972691f43e9087ab5fd8376d48e898f
7005
7006commit cec9ee527a12b1f6c2e0a1c155fec64a38d71cf6
7007Author: djm@openbsd.org <djm@openbsd.org>
7008Date: Fri Jul 5 07:32:01 2019 +0000
7009
7010 upstream: revert header removal that snuck into previous
7011
7012 OpenBSD-Commit-ID: 3919cdd58989786660b8269b325646ef8856428e
7013
7014commit 569b650f93b561c09c655f83f128e1dfffe74101
7015Author: djm@openbsd.org <djm@openbsd.org>
7016Date: Fri Jul 5 04:55:40 2019 +0000
7017
7018 upstream: add a local implementation of BSD realpath() for
7019
7020 sftp-server use ahead of OpenBSD's realpath changing to match POSIX;
7021
7022 ok deraadt@ (thanks for snaps testing)
7023
7024 OpenBSD-Commit-ID: 4f8cbf7ed8679f6237264301d104ecec64885d55
7025
7026commit b8e2b797362526437e0642a6c2f2970d794f2561
7027Author: Darren Tucker <dtucker@dtucker.net>
7028Date: Sat Jul 6 13:13:57 2019 +1000
7029
7030 Add prototype for strnlen to prevent warnings.
7031
7032commit 4c3e00b1ed7e596610f34590eb5d54ee50d77878
7033Author: Darren Tucker <dtucker@dtucker.net>
7034Date: Sat Jul 6 13:02:34 2019 +1000
7035
7036 Cast *ID types to unsigned long when printing.
7037
7038 UID and GID types vary by platform so cast to u_long and use %lu when
7039 printing them to prevent warnings.
7040
7041commit 2753521e899f30d1d58b5da0b4e68fde6fcf341e
7042Author: Darren Tucker <dtucker@dtucker.net>
7043Date: Sat Jul 6 12:54:43 2019 +1000
7044
7045 Add prototype for compat strndup.(bz#3032).
7046
7047commit 01a1e21cd55d99293c8ff8ed7c590f2ee440da43
7048Author: Darren Tucker <dtucker@dtucker.net>
7049Date: Sat Jul 6 12:00:41 2019 +1000
7050
7051 Add missing bracket in EGD seeding code.
7052
7053 When configured --with-prngd-socket the code had a missing bracket after
7054 an API change. Fix that and a couple of warnings. bz#3032 , from
7055 ole.weidner at protonmail.ch
7056
7057commit e187b1d4607392cf2c19243afe0d0311a4ff3591
7058Author: dtucker@openbsd.org <dtucker@openbsd.org>
7059Date: Fri Jul 5 04:19:39 2019 +0000
7060
7061 upstream: Add (recently added) rsa_oldfmt to CLEANFILES.
7062
7063 OpenBSD-Regress-ID: 405beda94e32aa6cc9c80969152fab91f7c54bd3
7064
7065commit 74b541bfabdcb57c1683cd9b3f1d1f4d5e41563e
7066Author: dtucker@openbsd.org <dtucker@openbsd.org>
7067Date: Fri Jul 5 04:12:46 2019 +0000
7068
7069 upstream: Adapt the PuTTY/Conch tests to new key names.
7070
7071 A recent regress change (2a9b3a2ce411d16cda9c79ab713c55f65b0ec257 in
7072 portable) broke the PuTTY and Twisted Conch interop tests, because the
7073 key they want to use is now called ssh-rsa rather than rsa. Adapt the
7074 tests to the new file names. bz#3020, patch from cjwatson at debian.org.
7075
7076 OpenBSD-Regress-ID: fd342a37db4d55aa4ec85316f73082c8eb96e64e
7077
7078commit de08335a4cfaa9b7081e94ea4a8b7153c230546d
7079Author: dtucker@openbsd.org <dtucker@openbsd.org>
7080Date: Fri Jul 5 04:03:13 2019 +0000
7081
7082 upstream: Add a sleep to allow forwards to come up.
7083
7084 Currently when the multiplex client requests a forward it returns
7085 once the request has been sent but not necessarily when the forward
7086 is up. This causes intermittent text failures due to this race,
7087 so add some sleeps to mitigate this until we can fix it properly.
7088
7089 OpenBSD-Regress-ID: 384c7d209d2443d25ea941d7f677e932621fb253
7090
7091commit 4d249284729f864faa2e8f3e015f9a41b674544a
7092Author: Darren Tucker <dtucker@dtucker.net>
7093Date: Fri Jul 5 14:58:57 2019 +1000
7094
7095 Remove nc stderr redirection to resync w/OpenBSD.
7096
7097commit c5cfa90e03432181ffcc7ad3f9f815179bd0c626
7098Author: Darren Tucker <dtucker@dtucker.net>
7099Date: Fri Jul 5 13:21:45 2019 +1000
7100
7101 Do not fatal on failed lookup of group "tty".
7102
7103 Some platforms (eg AIX and Cygwin) do not have a "tty" group. In those
7104 cases we will fall back to making the tty device the user's primary
7105 group, so do not fatal if the group lookup fails. ok djm@
7106
7107commit 8b4cc4bdc8a70bf209a274fa2b2a49c1e3c8d8a2
7108Author: deraadt@openbsd.org <deraadt@openbsd.org>
7109Date: Thu Jul 4 16:20:10 2019 +0000
7110
7111 upstream: fatal() if getgrnam() cannot find "tty"
7112
7113 OpenBSD-Commit-ID: d148c1c052fa0ed7d105b5428b5c1bab91630048
7114
7115commit 48cccc275c6a1e91d3f80fdb0dc0d5baf529aeca
7116Author: deraadt@openbsd.org <deraadt@openbsd.org>
7117Date: Thu Jul 4 16:16:51 2019 +0000
7118
7119 upstream: stat() returns precisely -1 to indicate error
7120
7121 OpenBSD-Commit-ID: 668e8d022ed4ab847747214f64119e5865365fa1
7122
7123commit 8142fcaf9ed8ff66252deecbfd29fc59d5f2df4f
7124Author: deraadt@openbsd.org <deraadt@openbsd.org>
7125Date: Wed Jul 3 03:24:02 2019 +0000
7126
7127 upstream: snprintf/vsnprintf return < 0 on error, rather than -1.
7128
7129 OpenBSD-Commit-ID: a261c421140a0639bb2b66bbceca72bf8239749d
7130
7131commit 4d28fa78abce2890e136281950633fae2066cc29
7132Author: deraadt@openbsd.org <deraadt@openbsd.org>
7133Date: Fri Jun 28 13:35:04 2019 +0000
7134
7135 upstream: When system calls indicate an error they return -1, not
7136
7137 some arbitrary value < 0. errno is only updated in this case. Change all
7138 (most?) callers of syscalls to follow this better, and let's see if this
7139 strictness helps us in the future.
7140
7141 OpenBSD-Commit-ID: 48081f00db7518e3b712a49dca06efc2a5428075
7142
7143commit e8c974043c1648eab0ad67a7ba6a3e444fe79d2d
7144Author: deraadt@openbsd.org <deraadt@openbsd.org>
7145Date: Fri Jun 28 05:44:09 2019 +0000
7146
7147 upstream: asprintf returns -1, not an arbitrary value < 0. Also
7148
7149 upon error the (very sloppy specification) leaves an undefined value in *ret,
7150 so it is wrong to inspect it, the error condition is enough. discussed a
7151 little with nicm, and then much more with millert until we were exasperated
7152
7153 OpenBSD-Commit-ID: 29258fa51edf8115d244b9d4b84028487bf8923e
7154
7155commit 1b2d55d15c6240c15a1e1cf4203b82e54a766272
7156Author: deraadt@openbsd.org <deraadt@openbsd.org>
7157Date: Fri Jun 28 01:23:50 2019 +0000
7158
7159 upstream: oops, from asou
7160
7161 OpenBSD-Commit-ID: 702e765d1639b732370d8f003bb84a1c71c4d0c6
7162
7163commit 5cdbaa78fcb718c39af4522d98016ad89d065427
7164Author: deraadt@openbsd.org <deraadt@openbsd.org>
7165Date: Thu Jun 27 18:03:37 2019 +0000
7166
7167 upstream: Some asprintf() calls were checked < 0, rather than the
7168
7169 precise == -1. ok millert nicm tb, etc
7170
7171 OpenBSD-Commit-ID: caecf8f57938685c04f125515b9f2806ad408d53
7172
7173commit b2e3e57be4a933d9464bccbe592573725765486f
7174Author: djm@openbsd.org <djm@openbsd.org>
7175Date: Thu Jun 27 06:29:35 2019 +0000
7176
7177 upstream: fix NULL deference (bzero) on err
7178
7179 =?UTF-8?q?or=20path=20added=20in=20last=20commit;=20spotted=20by=20Reynir?=
7180 =?UTF-8?q?=20Bj=C3=B6rnsson?=
7181 MIME-Version: 1.0
7182 Content-Type: text/plain; charset=UTF-8
7183 Content-Transfer-Encoding: 8bit
7184
7185 ok deraadt@ markus@ tb@
7186
7187 OpenBSD-Commit-ID: b11b084bcc551b2c630560eb08618dd501027bbd
7188
7189commit 58ceacdcbaebefc77d120712de55c6fc6aa32bb1
7190Author: Jitendra Sharma <jitendra.sharma@intel.com>
7191Date: Fri Jun 21 09:54:17 2019 +0530
7192
7193 Update README doc to include missing test cases
7194
7195 Readme regress document is missing various individual tests,
7196 which are supported currently. Update README to
7197 include those test cases.
7198
7199commit 7959330a554051b5587f8af3fec0c2c0d5820f64
7200Author: dtucker@openbsd.org <dtucker@openbsd.org>
7201Date: Wed Jun 26 22:29:43 2019 +0000
7202
7203 upstream: Remove unneeded unlink of xauthfile o
7204
7205 =?UTF-8?q?n=20error=20path.=20=20From=20Erik=20Sj=C3=B6lund=20via=20githu?=
7206 =?UTF-8?q?b,=20ok=20djm@=20deraadt@?=
7207 MIME-Version: 1.0
7208 Content-Type: text/plain; charset=UTF-8
7209 Content-Transfer-Encoding: 8bit
7210
7211 OpenBSD-Commit-ID: 62a4893cf83b29a4bbfedc40e7067c25c203e632
7212
7213commit 8de52eb224143783a49f9bddd9ab7800022a8276
7214Author: djm@openbsd.org <djm@openbsd.org>
7215Date: Sun Jun 23 12:21:46 2019 +0000
7216
7217 upstream: fix mismatch proto/decl from key shielding change; spotted
7218
7219 via oss-fuzz
7220
7221 OpenBSD-Commit-ID: 1ea0ba05ded2c5557507bd844cd446e5c8b5b3b7
7222
7223commit 1dfadb9b57c2985c95838a0292d1c2f6a501896e
7224Author: djm@openbsd.org <djm@openbsd.org>
7225Date: Fri Jun 21 04:21:45 2019 +0000
7226
7227 upstream: adapt for key shielding API changes (const removal)
7228
7229 OpenBSD-Regress-ID: 298890bc52f0cd09dba76dc1022fabe89bc0ded6
7230
7231commit 4f7a56d5e02e3d04ab69eac1213817a7536d0562
7232Author: djm@openbsd.org <djm@openbsd.org>
7233Date: Fri Jun 21 04:21:04 2019 +0000
7234
7235 upstream: Add protection for private keys at rest in RAM against
7236
7237 speculation and memory sidechannel attacks like Spectre, Meltdown, Rowhammer
7238 and Rambleed. This change encrypts private keys when they are not in use with
7239 a symmetic key that is derived from a relatively large "prekey" consisting of
7240 random data (currently 16KB).
7241
7242 Attackers must recover the entire prekey with high accuracy before
7243 they can attempt to decrypt the shielded private key, but the current
7244 generation of attacks have bit error rates that, when applied
7245 cumulatively to the entire prekey, make this unlikely.
7246
7247 Implementation-wise, keys are encrypted "shielded" when loaded and then
7248 automatically and transparently unshielded when used for signatures or
7249 when being saved/serialised.
7250
7251 Hopefully we can remove this in a few years time when computer
7252 architecture has become less unsafe.
7253
7254 been in snaps for a bit already; thanks deraadt@
7255
7256 ok dtucker@ deraadt@
7257
7258 OpenBSD-Commit-ID: 19767213c312e46f94b303a512ef8e9218a39bd4
7259
7260commit 4cd6b12cc9c10bf59c8b425041f3ea5091285a0f
7261Author: djm@openbsd.org <djm@openbsd.org>
7262Date: Fri Jun 21 03:19:59 2019 +0000
7263
7264 upstream: print the correct AuthorizedPrincipalsCommand rather than
7265
7266 an uninitialised variable; spotted by dtucker@
7267
7268 OpenBSD-Commit-ID: 02802018784250f68202f01c8561de82e17b0638
7269
7270commit 5f68ab436b0e01751d564e9a9041e6ac3673e45a
7271Author: jmc@openbsd.org <jmc@openbsd.org>
7272Date: Wed Jun 19 20:12:44 2019 +0000
7273
7274 upstream: from tim: - for reput, it is remote-path which is
7275
7276 optional, not local-path - sync help
7277
7278 from deraadt:
7279 - prefer -R and undocument -r (but add a comment for future editors)
7280
7281 from schwarze:
7282 - prefer -p and undocument -P (as above. the comment was schwarze's too)
7283
7284 more:
7285 - add the -f flag to reput and reget
7286 - sort help (i can;t remember who suggested this originally)
7287
7288 djm and deraadt were ok with earlier versions of this;
7289 tim and schwarze ok
7290
7291 OpenBSD-Commit-ID: 3c699b53b46111f5c57eed4533f132e7e58bacdd
7292
7293commit 99bcbbc77fbd5a5027031f42a5931b21b07c947e
7294Author: djm@openbsd.org <djm@openbsd.org>
7295Date: Fri Jun 14 04:03:48 2019 +0000
7296
7297 upstream: check for convtime() refusing to accept times that
7298
7299 resolve to LONG_MAX Reported by Kirk Wolf bz2977; ok dtucker
7300
7301 OpenBSD-Regress-ID: 15c9fe87be1ec241d24707006a31123d3a3117e0
7302
7303commit e5cccb2410247c9b8151b9510a876abdf5424b24
7304Author: dtucker@openbsd.org <dtucker@openbsd.org>
7305Date: Sun Apr 28 22:53:26 2019 +0000
7306
7307 upstream: Add unit tests for user@host and URI parsing.
7308
7309 OpenBSD-Regress-ID: 69d5b6f278e04ed32377046f7692c714c2d07a68
7310
7311commit 0bb7e38834e3f9886302bbaea630a6b0f8cfb520
7312Author: dtucker@openbsd.org <dtucker@openbsd.org>
7313Date: Thu Apr 18 18:57:16 2019 +0000
7314
7315 upstream: Add tests for sshd -T -C with Match.
7316
7317 OpenBSD-Regress-ID: d4c34916fe20d717692f10ef50b5ae5a271c12c7
7318
7319commit 73eb6cef41daba0359c1888e4756108d41b4e819
7320Author: Darren Tucker <dtucker@dtucker.net>
7321Date: Sun Jun 16 12:55:27 2019 +1000
7322
7323 Include stdio.h for vsnprintf.
7324
7325 Patch from mforney at mforney.org.
7326
7327commit adcaf40fd0a180e6cb5798317fdf479b52e3c09a
7328Author: Darren Tucker <dtucker@dtucker.net>
7329Date: Sat Jun 8 09:07:04 2019 +1000
7330
7331 upstream rev 1.27: fix integer overflow.
7332
7333 Cast bitcount to u_in64_t before bit shifting to prevent integer overflow
7334 on 32bit platforms which cause incorrect results when adding a block
7335 >=512M in size. sha1 patch from ante84 at gmail.com via openssh github,
7336 sha2 with djm@, ok tedu@
7337
7338commit 7689048e6103d3c34cba24ac5aeea7bf8405d19a
7339Author: Darren Tucker <dtucker@dtucker.net>
7340Date: Sat Jun 8 09:06:06 2019 +1000
7341
7342 upstream rev 1.25: add DEF_WEAK.
7343
7344 Wrap blowfish, sha*, md5, and rmd160 so that internal calls go direct
7345 ok deraadt@
7346
7347commit 55f3153393ac7e072a4b4b21b194864460d8f44a
7348Author: Darren Tucker <dtucker@dtucker.net>
7349Date: Sat Jun 8 09:02:24 2019 +1000
7350
7351 upstream rev 1.25: add sys/types.h
7352
7353commit 10974f986fa842a3a3a693e3d5761072540002b4
7354Author: Darren Tucker <dtucker@dtucker.net>
7355Date: Sat Jun 8 09:01:14 2019 +1000
7356
7357 upstream: Use explicit_bzero instead of memset
7358
7359 in hash Final and End functions. OK deraadt@ djm@
7360
7361commit cb8f56570f70b00abae4267d4bcce2bfae7dfff6
7362Author: djm@openbsd.org <djm@openbsd.org>
7363Date: Fri Jun 14 04:13:58 2019 +0000
7364
7365 upstream: slightly more instructive error message when the user
7366
7367 specifies multiple -J options on the commandline. bz3015 ok dtucker@
7368
7369 OpenBSD-Commit-ID: 181c15a65cac3b575819bc8d9a56212c3c748179
7370
7371commit 2317ce4b0ed7d8c4b0c684e2d47bff5006bd1178
7372Author: djm@openbsd.org <djm@openbsd.org>
7373Date: Fri Jun 14 03:51:47 2019 +0000
7374
7375 upstream: process agent requests for RSA certificate private keys using
7376
7377 correct signature algorithm when requested. Patch from Jakub Jelen in bz3016
7378 ok dtucker markus
7379
7380 OpenBSD-Commit-ID: 61f86efbeb4a1857a3e91298c1ccc6cf49b79624
7381
7382commit c95b90d40170473825904be561b1eafba354f376
7383Author: djm@openbsd.org <djm@openbsd.org>
7384Date: Fri Jun 14 03:39:59 2019 +0000
7385
7386 upstream: for public key authentication, check AuthorizedKeysFiles
7387
7388 files before consulting AuthorizedKeysCommand; ok dtucker markus
7389
7390 OpenBSD-Commit-ID: 13652998bea5cb93668999c39c3c48e8429db8b3
7391
7392commit a5a53914989ddd3521b6edc452bc3291784a4f4f
7393Author: djm@openbsd.org <djm@openbsd.org>
7394Date: Fri Jun 14 03:28:19 2019 +0000
7395
7396 upstream: if passed a bad fd, log what it was
7397
7398 OpenBSD-Commit-ID: 582e2bd05854e49365195b58989b68ac67f09140
7399
7400commit 7349149da1074d82b71722338e05b6a282f126cc
7401Author: jmc@openbsd.org <jmc@openbsd.org>
7402Date: Wed Jun 12 11:31:50 2019 +0000
7403
7404 upstream: Hostname->HostName cleanup; from lauri tirkkonen ok
7405
7406 dtucker
7407
7408 OpenBSD-Commit-ID: 4ade73629ede63b691f36f9a929f943d4e7a44e4
7409
7410commit 76af9c57387243556d38935555c227d0b34062c5
7411Author: jmc@openbsd.org <jmc@openbsd.org>
7412Date: Wed Jun 12 05:53:21 2019 +0000
7413
7414 upstream: deraadt noticed some inconsistency in the way we denote
7415
7416 the "Hostname" and "X11UseLocalhost" keywords; this makes things consistent
7417 (effectively reversing my commit of yesterday);
7418
7419 ok deraadt markus djm
7420
7421 OpenBSD-Commit-ID: 255c02adb29186ac91dcf47dfad7adb1b1e54667
7422
7423commit d1bbfdd932db9b9b799db865ee1ff50060dfc895
7424Author: jmc@openbsd.org <jmc@openbsd.org>
7425Date: Tue Jun 11 13:39:40 2019 +0000
7426
7427 upstream: consistent lettering for "HostName" keyword; from lauri
7428
7429 tirkkonen
7430
7431 OpenBSD-Commit-ID: 0c267a1257ed7482b13ef550837b6496e657d563
7432
7433commit fc0340f7c4ee29bfb12bd1de9f99defa797e16b4
7434Author: Darren Tucker <dtucker@dtucker.net>
7435Date: Sat Jun 8 00:10:59 2019 +1000
7436
7437 Typo fixes in error messages.
7438
7439 Patch from knweiss at gmail.com via github pull req #97 (portable-
7440 specific parts).
7441
7442commit 4b7dd22b02b64b1ededd3c0e98a6e7ae21e31d38
7443Author: dtucker@openbsd.org <dtucker@openbsd.org>
7444Date: Fri Jun 7 14:18:48 2019 +0000
7445
7446 upstream: Typo and spelling fixes in comments and error messages.
7447
7448 Patch from knweiss at gmail.com via -portable.
7449
7450 OpenBSD-Commit-ID: 2577465442f761a39703762c4f87a8dfcb918b4b
7451
7452commit 130ef0695e1731392ca33831939fe89e8b70cc17
7453Author: Darren Tucker <dtucker@dtucker.net>
7454Date: Sat Jun 8 00:47:07 2019 +1000
7455
7456 Include missed bits from previous sync.
7457
7458commit 25e3bccbaa63d27b9d5e09c123f1eb28594d2bd6
7459Author: dtucker@openbsd.org <dtucker@openbsd.org>
7460Date: Fri Jun 7 03:47:12 2019 +0000
7461
7462 upstream: Check for user@host when parsing sftp target. This
7463
7464 allows user@[1.2.3.4] to work without a path in addition to with one.
7465 bz#2999, ok djm@
7466
7467 OpenBSD-Commit-ID: d989217110932490ba8ce92127a9a6838878928b
7468
7469commit 0323d9b619d512f80c57575b810a05791891f657
7470Author: otto@openbsd.org <otto@openbsd.org>
7471Date: Thu Jun 6 05:13:13 2019 +0000
7472
7473 upstream: Replace calls to ssh_malloc_init() by a static init of
7474
7475 malloc_options. Prepares for changes in the way malloc is initialized. ok
7476 guenther@ dtucker@
7477
7478 OpenBSD-Commit-ID: 154f4e3e174f614b09f792d4d06575e08de58a6b
7479
7480commit c586d2d3129265ea64b12960c379d634bccb6535
7481Author: djm@openbsd.org <djm@openbsd.org>
7482Date: Fri May 31 03:20:07 2019 +0000
7483
7484 upstream: fix ssh-keysign fd handling problem introduced in r1.304
7485
7486 caused by a typo (STDIN_FILENO vs STDERR_FILENO)
7487
7488 OpenBSD-Commit-ID: 57a0b4be7bef23963afe24150e24bf014fdd9cb0
7489
7490commit 410b231aa41ff830b2f5b09b5aaf5e5cdc1ab86b
7491Author: lum@openbsd.org <lum@openbsd.org>
7492Date: Wed May 29 08:30:26 2019 +0000
7493
7494 upstream: Make the standard output messages of both methods of
7495
7496 changing a key pair's comments (using -c and -C) more applicable to both
7497 methods. ok and suggestions djm@ dtucker@
7498
7499 OpenBSD-Commit-ID: b379338118109eb36e14a65bc0a12735205b3de6
7500
7501commit 2b3402dc9f1d9b0df70291b424f36e436cdfa7e0
7502Author: Darren Tucker <dtucker@dtucker.net>
7503Date: Sat Jun 8 00:03:07 2019 +1000
7504
7505 Always clean up before and after utimensat test.
7506
7507commit 182898192d4b720e4faeafd5b39c2cfb3b92aa21
7508Author: Darren Tucker <dtucker@dtucker.net>
7509Date: Fri Jun 7 23:47:37 2019 +1000
7510
7511 Update utimensat test.
7512
7513 POSIX specifies that when given a symlink, AT_SYMLINK_NOFOLLOW should
7514 update the symlink and not the destination. The compat code doesn't
7515 have a way to do this, so where possible it fails instead of following a
7516 symlink when explicitly asked not to. Instead of checking for an explicit
7517 failure, check that it does not update the destination, which both the
7518 real and compat implmentations should honour.
7519
7520 Inspired by github pull req #125 from chutzpah at gentoo.org.
7521
7522commit d220b675205185e0b4d6b6524acc2e5c599ef0e2
7523Author: Darren Tucker <dtucker@dtucker.net>
7524Date: Fri Jun 7 14:26:54 2019 +1000
7525
7526 Have pthread_create return errno on failure.
7527
7528 According to POSIX, pthread_create returns the failure reason in
7529 the non-zero function return code so make the fork wrapper do that.
7530 Matches previous change.
7531
7532commit 1bd4f7f25f653e0cadb2e6f25d79bc3c35c6aa4d
7533Author: Elliott Hughes <enh@google.com>
7534Date: Thu Apr 25 13:36:27 2019 -0700
7535
7536 pthread_create(3) returns positive values on failure.
7537
7538 Found by inspection after finding similar bugs in other code used by
7539 Android.
7540
7541commit b3a77b25e5f7880222b179431a74fad76d2cf60c
7542Author: Harald Freudenberger <freude@linux.ibm.com>
7543Date: Fri May 24 10:11:15 2019 +0200
7544
7545 allow s390 specific ioctl for ecc hardware support
7546
7547 Adding another s390 specific ioctl to be able to support ECC hardware
7548 acceleration to the sandbox seccomp filter rules.
7549
7550 Now the ibmca openssl engine provides elliptic curve cryptography
7551 support with the help of libica and CCA crypto cards. This is done via
7552 jet another ioctl call to the zcrypt device driver and so there is a
7553 need to enable this on the openssl sandbox.
7554
7555 Code is s390 specific and has been tested, verified and reviewed.
7556
7557 Please note that I am also the originator of the previous changes in
7558 that area. I posted these changes to Eduardo and he forwarded the
7559 patches to the openssl community.
7560
7561 Signed-off-by: Harald Freudenberger <freude@linux.ibm.com>
7562 Reviewed-by: Joerg Schmidbauer <jschmidb@de.ibm.com>
7563
7564commit 2459df9aa11820f8092a8651aeb381af7ebbccb1
7565Author: Sorin Adrian Savu <sorin25@users.noreply.github.com>
7566Date: Sun May 26 21:50:08 2019 +0300
7567
7568 openssl-devel is obsoleted by libssl-devel
7569
7570 openssl-devel is no longer installable via the cygwin setup and
7571 it's hidden by default, so you can't see the replacement very easy.
7572
7573commit 85ceb0e64bff672558fc87958cd548f135c83cdd
7574Author: jmc@openbsd.org <jmc@openbsd.org>
7575Date: Mon May 20 06:01:59 2019 +0000
7576
7577 upstream: tweak previous;
7578
7579 OpenBSD-Commit-ID: 42f39f22f53cfcb913bce401ae0f1bb93e08dd6c
7580
7581commit 30615295609f5c57b3137b3021fe63bfa45c1985
7582Author: djm@openbsd.org <djm@openbsd.org>
7583Date: Mon May 20 00:25:55 2019 +0000
7584
7585 upstream: embiggen format buffer size for certificate serial number so
7586
7587 that it will fit a full 64 bit integer. bz#3012 from Manoel Domingues Junior
7588
7589 OpenBSD-Commit-ID: a51f3013056d05b976e5af6b978dcb9e27bbc12b
7590
7591commit 476e3551b2952ef73acc43d995e832539bf9bc4d
7592Author: djm@openbsd.org <djm@openbsd.org>
7593Date: Mon May 20 00:20:35 2019 +0000
7594
7595 upstream: When signing certificates with an RSA key, default to
7596
7597 using the rsa-sha2-512 signature algorithm. Certificates signed by RSA keys
7598 will therefore be incompatible with OpenSSH < 7.2 unless the default is
7599 overridden.
7600
7601 Document the ability of the ssh-keygen -t flag to override the
7602 signature algorithm when signing certificates, and the new default.
7603
7604 ok deraadt@
7605
7606 OpenBSD-Commit-ID: 400c9c15013978204c2cb80f294b03ae4cfc8b95
7607
7608commit 606077ee1e77af5908431d003fb28461ef7be092
7609Author: Darren Tucker <dtucker@dtucker.net>
7610Date: Fri May 17 13:14:12 2019 +1000
7611
7612 Add no-op implementation of pam_putenv.
7613
7614 Some platforms such as HP-UX do not have pam_putenv. Currently the
7615 calls are ifdef'ed out, but a new one was recently added. Remove the
7616 ifdefs and add a no-op implementation. bz#3008, ok djm.
7617
7618commit 1ac98be8724c9789d770ddb8e7f0dbf1b55e05a0
7619Author: Darren Tucker <dtucker@dtucker.net>
7620Date: Fri May 17 12:42:17 2019 +1000
7621
7622 Use the correct macro for SSH_ALLOWED_CA_SIGALGS.
7623
7624commit 97370f6c2c3b825f8c577b7e6c00b1a98d30a6cf
7625Author: Darren Tucker <dtucker@dtucker.net>
7626Date: Fri May 17 10:54:51 2019 +1000
7627
7628 Fix building w/out ECC.
7629
7630 Ifdef out ECC specific code so that that it'll build against an OpenSSL
7631 configured w/out ECC. With & ok djm@
7632
7633commit 633703babf8d9a88da85f23b800e1b88dec7cdbd
7634Author: Darren Tucker <dtucker@dtucker.net>
7635Date: Fri May 17 10:50:29 2019 +1000
7636
7637 Conditionalize ECDH methods in CA algos.
7638
7639 When building against an OpenSSL configured without ECC, don't include
7640 those algos in CASignatureAlgorithms. ok djm@
7641
7642commit 5c8d14c512f5d413095b22bdba08a6bb990f1e97
7643Author: dtucker@openbsd.org <dtucker@openbsd.org>
7644Date: Thu May 16 08:47:27 2019 +0000
7645
7646 upstream: Move a variable declaration to the block where it's used
7647
7648 to make things a little tidier for -portable.
7649
7650 OpenBSD-Commit-ID: 616379861be95619e5358768b7dee4793e2f3a75
7651
7652commit a1d29cc36a5e6eeabc935065a8780e1ba5b67014
7653Author: deraadt@openbsd.org <deraadt@openbsd.org>
7654Date: Wed May 15 04:43:31 2019 +0000
7655
7656 upstream: When doing the fork+exec'ing for ssh-keysign, rearrange
7657
7658 the socket into fd3, so as to not mistakenly leak other fd forward
7659 accidentally. ok djm
7660
7661 OpenBSD-Commit-ID: 24cc753f5aa2c6a7d0fbf62766adbc75cd785296
7662
7663commit db7606d4a62fee67b0cb2f32dfcbd7b3642bfef5
7664Author: schwarze@openbsd.org <schwarze@openbsd.org>
7665Date: Tue May 14 12:47:17 2019 +0000
7666
7667 upstream: Delete some .Sx macros that were used in a wrong way.
7668
7669 Part of a patch from Stephen Gregoratto <dev at sgregoratto dot me>.
7670
7671 OpenBSD-Commit-ID: 15501ed13c595f135e7610b1a5d8345ccdb513b7
7672
7673commit cb4accb1233865d9151f8a50cc5f0c61a3fd4077
7674Author: florian@openbsd.org <florian@openbsd.org>
7675Date: Fri May 10 18:55:17 2019 +0000
7676
7677 upstream: For PermitOpen violations add the remote host and port to
7678
7679 be able to find out from where the request was comming.
7680
7681 Add the same logging for PermitListen violations which where not
7682 logged at all.
7683
7684 Pointed out by Robert Kisteleki (robert AT ripe.net)
7685
7686 input markus
7687 OK deraadt
7688
7689 OpenBSD-Commit-ID: 8a7d0f1b7175504c0d1dca8d9aca1588b66448c8
7690
7691commit cd16aceec148d55088fc8df6be88335578d85258
7692Author: Darren Tucker <dtucker@dtucker.net>
7693Date: Thu May 16 07:53:20 2019 +1000
7694
7695 Add OpenSSL 1.1.1 to the supported list.
7696
7697 Clarify the language around prngd and egd.
7698
7699commit 6fd4aa2aafbce90acb11a328ca0aa0696cb01c6b
7700Author: Darren Tucker <dtucker@dtucker.net>
7701Date: Wed May 15 16:19:14 2019 +1000
7702
7703 Fix typo in man page formatter selector.
7704
7705commit 285546b73e2c172565c992a695927ac8cf3b4cc6
7706Author: Darren Tucker <dtucker@dtucker.net>
7707Date: Fri May 10 15:04:42 2019 +1000
7708
7709 Use "doc" man page format if mandoc present.
7710
7711 Previously configure would not select the "doc" man page format if
7712 mandoc was present but nroff was not. This checks for mandoc first
7713 and removes a now-superflous AC_PATH_PROG. Based on a patch from
7714 vehk at vehk.de and feedback from schwarze at usta.de.
7715
7716commit 62dd70613b77b229f53db3cc1c3e8a206fa2b582
7717Author: dtucker@openbsd.org <dtucker@openbsd.org>
7718Date: Fri May 3 06:06:30 2019 +0000
7719
7720 upstream: Use the correct (according to POSIX) format for
7721
7722 left-justification in snmprintf. bz#3002, patch from velemas at gmail.com, ok
7723 markus@.
7724
7725 OpenBSD-Commit-ID: 65d252b799be0cc8f68b6c47cece0a57bb00fea7
7726
7727commit 62be1ffe5ffc68cfaac183320503c00a8c72e0b1
7728Author: dtucker@openbsd.org <dtucker@openbsd.org>
7729Date: Fri May 3 04:11:00 2019 +0000
7730
7731 upstream: Free channel objects on exit path. Patch from markus at
7732
7733 blueflash.cc, ok deraadt
7734
7735 OpenBSD-Commit-ID: dbe4db381603909482211ffdd2b48abd72169117
7736
7737commit 1c554a5d94b9de6bd5374e2992a5662746cc39ba
7738Author: dtucker@openbsd.org <dtucker@openbsd.org>
7739Date: Fri May 3 03:27:38 2019 +0000
7740
7741 upstream: Free host on exit path. Patch from markus at
7742
7743 blueflash.cc, ok djm@
7744
7745 OpenBSD-Commit-ID: c54e9945d93c4ce28350d8b9fa8b71f744ef2b5a
7746
7747commit 99043bd64e5e0f427173f4fa83ef25a4676624a3
7748Author: dtucker@openbsd.org <dtucker@openbsd.org>
7749Date: Fri May 3 03:25:18 2019 +0000
7750
7751 upstream: Wrap XMSS including in ifdef. Patch from markus at
7752
7753 blueflash.cc, ok djm
7754
7755 OpenBSD-Commit-ID: e3b34fc35cf12d33bde91ac03633210a3bc0f8b5
7756
7757commit 8fcfb7789c43a19d24162a7a4055cd09ee951b34
7758Author: dtucker@openbsd.org <dtucker@openbsd.org>
7759Date: Fri Apr 26 08:37:17 2019 +0000
7760
7761 upstream: Import regenerated moduli.
7762
7763 OpenBSD-Commit-ID: db6375fc302e3bdf07d96430c63c991b2c2bd3ff
7764
7765commit 3a7db919d5dd09f797971b3cf8ee301767459774
7766Author: dtucker@openbsd.org <dtucker@openbsd.org>
7767Date: Tue Apr 23 11:56:41 2019 +0000
7768
7769 upstream: Use the LogLevel typdef instead of int where appropriate. Patch from Markus Schmidt via openssh-unix-dev, ok markus@
7770
7771 OpenBSD-Commit-ID: 4c0f0f458e3da7807806b35e3eb5c1e8403c968a
7772
7773commit d7c6e38b87efab1f140745fd8b1106b82e6e4a68
7774Author: dtucker@openbsd.org <dtucker@openbsd.org>
7775Date: Fri Apr 19 05:47:44 2019 +0000
7776
7777 upstream: Document new default RSA key size. From
7778
7779 sebastiaanlokhorst at gmail.com via bz#2997.
7780
7781 OpenBSD-Commit-ID: bdd62ff5d4d649d2147904e91bf7cefa82fe11e1
7782
7783commit e826bbcafe26dac349a8593da5569e82faa45ab8
7784Author: dtucker@openbsd.org <dtucker@openbsd.org>
7785Date: Thu Apr 18 18:56:16 2019 +0000
7786
7787 upstream: When running sshd -T, assume any attibute not provided by
7788
7789 -C does not match, which allows it to work when sshd_config contains a Match
7790 directive with or without -C. bz#2858, ok djm@
7791
7792 OpenBSD-Commit-ID: 1a701f0a33e3bc96753cfda2fe0b0378520b82eb
7793
7794commit 5696512d7ad57e85e89f8011ce8dec617be686aa
7795Author: dtucker@openbsd.org <dtucker@openbsd.org>
7796Date: Thu Apr 18 07:32:56 2019 +0000
7797
7798 upstream: Remove crc32.{c,h} which were only used by the now-gone
7799
7800 SSH1 protocol. Patch from yumkam at gmail.com, ok deraadt.
7801
7802 OpenBSD-Commit-ID: cceda5876c5ba6b4d8abcd52335329198cee3240
7803
7804commit 34e87fb5d9ce607f5701ab4c31d837ad8133e2d1
7805Author: Darren Tucker <dtucker@dtucker.net>
7806Date: Tue Apr 30 12:27:57 2019 +1000
7807
7808 Remove unused variables from RLIMIT_NOFILE test.
7809
7810commit 35e82e62c1ef53cfa457473a4c4d957d6197371a
7811Author: Darren Tucker <dtucker@dtucker.net>
7812Date: Fri Apr 26 18:38:27 2019 +1000
7813
7814 Import regenerated moduli.
7815
7816commit 5590f53f99219e95dc23b0ebd220f19a6f46b101
7817Author: Darren Tucker <dtucker@dtucker.net>
7818Date: Fri Apr 26 18:22:10 2019 +1000
7819
7820 Whitespace resync w/OpenBSD.
7821
7822 Patch from markus at blueflash.cc via openssh-unix-dev.
7823
7824commit b7b8334914fb9397a6725f3b5d2de999b0bb69ac
7825Author: Darren Tucker <dtucker@dtucker.net>
7826Date: Fri Apr 26 18:06:34 2019 +1000
7827
7828 Don't install duplicate STREAMS modules on Solaris
7829
7830 Check if STREAMS modules are already installed on pty before installing
7831 since when compiling with XPG>=4 they will likely be installed already.
7832 Prevents hangs and duplicate lines on the terminal. bz#2945 and bz#2998,
7833 patch from djm@
7834
7835commit fd0fa130ecf06d7d092932adcd5d77f1549bfc8d
7836Author: Damien Miller <djm@mindrot.org>
7837Date: Thu Apr 18 08:52:57 2019 +1000
7838
7839 makedepend
7840
7841commit 5de397a876b587ba05a9169237deffdc71f273b0
7842Author: Damien Miller <djm@mindrot.org>
7843Date: Fri Apr 5 11:29:51 2019 -0700
7844
7845 second thoughts: leave README in place
7846
7847 A number of contrib/* files refer to the existing README so let's leave
7848 it in place for release and add the new markdown version in parallel.
7849
7850 I'll get rid of README after release.
7851
7852commit 5d3127d9274519b25ed10e320f45045ba8d7f3be
7853Author: Damien Miller <djm@mindrot.org>
7854Date: Fri Apr 5 11:29:31 2019 -0700
7855
7856 Revert "rewrite README"
7857
7858 This reverts commit 9444d82678cb7781820da4d1c23b3c2b9fb1e12f.
7859
7860commit 9444d82678cb7781820da4d1c23b3c2b9fb1e12f
7861Author: Damien Miller <djm@mindrot.org>
7862Date: Fri Apr 5 11:21:48 2019 -0700
7863
7864 rewrite README
7865
7866 Include basic build instructions and comments on commonly-used build-
7867 time flags, links to the manual pages and other resources.
7868
7869 Now in Markdown format for better viewing on github, etc.
7870
7871commit a924de0c4908902433813ba205bee1446bd1a157
7872Author: Damien Miller <djm@mindrot.org>
7873Date: Fri Apr 5 03:41:52 2019 +1100
7874
7875 update versions
7876
7877commit 312dcee739bca5d6878c536537b2a8a497314b75
7878Author: djm@openbsd.org <djm@openbsd.org>
7879Date: Wed Apr 3 15:48:45 2019 +0000
7880
7881 upstream: openssh-8.0
7882
7883 OpenBSD-Commit-ID: 5aafdf218679dab982fea20771afd643be9a127b
7884
7885commit 885bc114692046d55e2a170b932bdc0092fa3456
7886Author: Damien Miller <djm@mindrot.org>
7887Date: Thu Apr 4 02:47:40 2019 +1100
7888
7889 session: Do not use removed API
7890
7891 from Jakub Jelen
7892
7893commit 9d7b2882b0c9a5e9bf8312ce4075bf178e2b98be
7894Author: djm@openbsd.org <djm@openbsd.org>
7895Date: Fri Mar 29 11:31:40 2019 +0000
7896
7897 upstream: when logging/fataling on error, include a bit more detail
7898
7899 than just the function name and the error message
7900
7901 OpenBSD-Commit-ID: dd72d7eba2215fcb89be516c378f633ea5bcca9f
7902
7903commit 79a87d32783d6c9db40af8f35e091d9d30365ae7
7904Author: Darren Tucker <dtucker@dtucker.net>
7905Date: Wed Apr 3 06:27:45 2019 +1100
7906
7907 Remove "struct ssh" from sys_auth_record_login.
7908
7909 It's not needed, and is not available from the call site in loginrec.c
7910 Should only affect AIX, spotted by Kevin Brott.
7911
7912commit 138c0d52cdc90f9895333b82fc57d81cce7a3d90
7913Author: Darren Tucker <dtucker@dtucker.net>
7914Date: Tue Apr 2 18:21:35 2019 +1100
7915
7916 Adapt custom_failed_login to new prototype.
7917
7918 Spotted by Kevin Brott.
7919
7920commit a0ca4009ab2f0b1007ec8ab6864dbf9b760a8ed5
7921Author: Darren Tucker <dtucker@dtucker.net>
7922Date: Mon Apr 1 20:07:23 2019 +1100
7923
7924 Add includes.h for compat layer.
7925
7926 Should fix build on AIX 7.2.
7927
7928commit 00991151786ce9b1d577bdad1f83a81d19c8236d
7929Author: Tim Rice <tim@multitalents.net>
7930Date: Sun Mar 31 22:14:22 2019 -0700
7931
7932 Stop USL compilers for erroring with "integral constant expression expected"
7933
7934commit 43f47ebbdd4037b569c23b8f4f7981f53b567f1d
7935Author: Tim Rice <tim@multitalents.net>
7936Date: Sun Mar 31 19:22:19 2019 -0700
7937
7938 Only use O_NOFOLLOW in fchownat and fchmodat if defined
7939
7940commit 342d6e51589b184c337cccfc4c788b60ff8b3765
7941Author: Jakub Jelen <jjelen@redhat.com>
7942Date: Fri Mar 29 12:29:41 2019 +0100
7943
7944 Adjust softhsm2 path on Fedora Linux for regress
7945
7946 The SoftHSM lives in Fedora in /usr/lib64/pkcs11/libsofthsm2.so
7947
7948commit f5abb05f8c7358dacdcb866fe2813f6d8efd5830
7949Author: Darren Tucker <dtucker@dtucker.net>
7950Date: Thu Mar 28 09:26:14 2019 +1100
7951
7952 Only use O_NOFOLLOW in utimensat if defined.
7953
7954 Fixes build on systems that don't have it (Solaris <=9) Found by
7955 Tom G. Christensen.
7956
7957commit 786cd4c1837fdc3fe7b4befe54a3f37db7df8715
7958Author: Corinna Vinschen <vinschen@redhat.com>
7959Date: Wed Mar 27 18:18:21 2019 +0100
7960
7961 drop old Cygwin considerations
7962
7963 - Cygwin supports non-DOS characters in filenames
7964 - Cygwin does not support Windows XP anymore
7965
7966 Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
7967
7968commit 21da87f439b48a85b951ef1518fe85ac0273e719
7969Author: djm@openbsd.org <djm@openbsd.org>
7970Date: Wed Mar 27 09:29:14 2019 +0000
7971
7972 upstream: fix interaction between ClientAliveInterval and RekeyLimit
7973
7974 that could cause connection to close incorrectly; Report and patch from Jakub
7975 Jelen in bz#2757; ok dtucker@ markus@
7976
7977 OpenBSD-Commit-ID: 17229a8a65bd8e6c2080318ec2b7a61e1aede3fb
7978
7979commit 4f0019a9afdb4a94d83b75e82dbbbe0cbe826c56
7980Author: djm@openbsd.org <djm@openbsd.org>
7981Date: Mon Mar 25 22:34:52 2019 +0000
7982
7983 upstream: Fix authentication failures when "AuthenticationMethods
7984
7985 any" in a Match block overrides a more restrictive global default.
7986
7987 Spotted by jmc@, ok markus@
7988
7989 OpenBSD-Commit-ID: a90a4fe2ab81d0eeeb8fdfc21af81f7eabda6666
7990
7991commit d6e5def308610f194c0ec3ef97a34a3e9630e190
7992Author: djm@openbsd.org <djm@openbsd.org>
7993Date: Mon Mar 25 22:33:44 2019 +0000
7994
7995 upstream: whitespace
7996
7997 OpenBSD-Commit-ID: 106e853ae8a477e8385bc53824d3884a8159db07
7998
7999commit 26e0cef07b04479537c971dec898741df1290fe5
8000Author: dtucker@openbsd.org <dtucker@openbsd.org>
8001Date: Mon Mar 25 16:19:44 2019 +0000
8002
8003 upstream: Expand comment to document rationale for default key
8004
8005 sizes. "seems worthwhile" deraadt.
8006
8007 OpenBSD-Commit-ID: 72e5c0983d7da1fb72f191870f36cb58263a2456
8008
8009commit f47269ea67eb4ff87454bf0d2a03e55532786482
8010Author: dtucker@openbsd.org <dtucker@openbsd.org>
8011Date: Mon Mar 25 15:49:00 2019 +0000
8012
8013 upstream: Increase the default RSA key size to 3072 bits. Based on
8014
8015 the estimates from NIST Special Publication 800-57, 3k bits provides security
8016 equivalent to 128 bits which is the smallest symmetric cipher we enable by
8017 default. ok markus@ deraadt@
8018
8019 OpenBSD-Commit-ID: 461dd32ebe808f88f4fc3ec74749b0e6bef2276b
8020
8021commit 62949c5b37af28d8490d94866e314a76be683a5e
8022Author: jmc@openbsd.org <jmc@openbsd.org>
8023Date: Fri Mar 22 20:58:34 2019 +0000
8024
8025 upstream: full stop in the wrong place;
8026
8027 OpenBSD-Commit-ID: 478a0567c83553a2aebf95d0f1bd67ac1b1253e4
8028
8029commit 1b1332b5bb975d759a50b37f0e8bc8cfb07a0bb0
8030Author: jmc@openbsd.org <jmc@openbsd.org>
8031Date: Sat Mar 16 19:14:21 2019 +0000
8032
8033 upstream: benno helped me clean up the tcp forwarding section;
8034
8035 OpenBSD-Commit-ID: d4bec27edefde636fb632b7f0b7c656b9c7b7f08
8036
8037commit 2aee9a49f668092ac5c9d34e904ef7a9722e541d
8038Author: markus@openbsd.org <markus@openbsd.org>
8039Date: Fri Mar 8 17:24:43 2019 +0000
8040
8041 upstream: fix use-after-free in ssh-pkcs11; found by hshoexer w/AFL
8042
8043 OpenBSD-Commit-ID: febce81cca72b71f70513fbee4ff52ca050f675c
8044
8045commit 9edbd7821e6837e98e7e95546cede804dac96754
8046Author: Darren Tucker <dtucker@dtucker.net>
8047Date: Thu Mar 14 10:17:28 2019 +1100
8048
8049 Fix build when configured --without-openssl.
8050
8051 ok djm@
8052
8053commit 825ab32f0d04a791e9d19d743c61ff8ed9b4d8e5
8054Author: Darren Tucker <dtucker@dtucker.net>
8055Date: Thu Mar 14 08:51:17 2019 +1100
8056
8057 On Cygwin run sshd as SYSTEM where possible.
8058
8059 Seteuid now creates user token using S4U. We don't create a token
8060 from scratch anymore, so we don't need the "Create a process token"
8061 privilege. The service can run under SYSTEM again...
8062
8063 ...unless Cygwin is running on Windows Vista or Windows 7 in the
8064 WOW64 32 bit emulation layer. It turns out that WOW64 on these systems
8065 didn't implement MsV1_0 S4U Logon so we still need the fallback
8066 to NtCreateToken for these systems.
8067
8068 Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
8069
8070commit a212107bfdf4d3e870ab7a443e4d906e5b9578c3
8071Author: Darren Tucker <dtucker@dtucker.net>
8072Date: Wed Mar 13 10:49:16 2019 +1100
8073
8074 Replace alloca with xcalloc.
8075
8076 The latter checks for memory exhaustion and integer overflow and may be
8077 at a less predictable place. Sanity check by vinschen at redhat.com, ok
8078 djm@
8079
8080commit daa7505aadca68ba1a2c70cbdfce423208eb91ee
8081Author: Darren Tucker <dtucker@dtucker.net>
8082Date: Tue Mar 12 09:19:19 2019 +1100
8083
8084 Use Cygwin-specific matching only for users+groups.
8085
8086 Patch from vinschen at redhat.com, updated a little by me.
8087
8088commit fd10cf027b56f9aaa80c9e3844626a05066589a4
8089Author: dtucker@openbsd.org <dtucker@openbsd.org>
8090Date: Wed Mar 6 22:14:23 2019 +0000
8091
8092 upstream: Move checks for lists of users or groups into their own
8093
8094 function. This is a no-op on OpenBSD but will make things easier in
8095 -portable, eg on systems where these checks should be case-insensitive. ok
8096 djm@
8097
8098 OpenBSD-Commit-ID: 8bc9c8d98670e23f8eaaaefe29c1f98e7ba0487e
8099
8100commit ab5fee8eb6a011002fd9e32b1597f02aa8804a25
8101Author: dtucker@openbsd.org <dtucker@openbsd.org>
8102Date: Wed Mar 6 21:06:59 2019 +0000
8103
8104 upstream: Reset last-seen time when sending a keepalive. Prevents
8105
8106 sending two keepalives successively and prematurely terminating connection
8107 when ClientAliveCount=1. While there, collapse two similar tests into one.
8108 ok markus@
8109
8110 OpenBSD-Commit-ID: 043670d201dfe222537a2a4bed16ce1087de5ddd
8111
8112commit c13b74530f9f1d9df7aeae012004b31b2de4438e
8113Author: naddy@openbsd.org <naddy@openbsd.org>
8114Date: Tue Mar 5 16:17:12 2019 +0000
8115
8116 upstream: PKCS#11 support is no longer limited to RSA; ok benno@
8117
8118 kn@
8119
8120 OpenBSD-Commit-ID: 1a9bec64d530aed5f434a960e7515a3e80cbc826
8121
8122commit e9552d6043db7cd170ac6ba1b4d2c7a5eb2c3201
8123Author: djm@openbsd.org <djm@openbsd.org>
8124Date: Fri Mar 1 03:29:32 2019 +0000
8125
8126 upstream: in ssh_set_newkeys(), mention the direction that we're
8127
8128 keying in debug messages. Previously it would be difficult to tell which
8129 direction it was talking about
8130
8131 OpenBSD-Commit-ID: c2b71bfcceb2a7389b9d0b497fb2122a406a522d
8132
8133commit 76a24b3fa193a9ca3e47a8779d497cb06500798b
8134Author: djm@openbsd.org <djm@openbsd.org>
8135Date: Fri Mar 1 02:32:39 2019 +0000
8136
8137 upstream: Fix two race conditions in sshd relating to SIGHUP:
8138
8139 1. Recently-forked child processes will briefly remain listening to
8140 listen_socks. If the main server sshd process completes its restart
8141 via execv() before these sockets are closed by the child processes
8142 then it can fail to listen at the desired addresses/ports and/or
8143 fail to restart.
8144
8145 2. When a SIGHUP is received, there may be forked child processes that
8146 are awaiting their reexecution state. If the main server sshd
8147 process restarts before passing this state, these child processes
8148 will yield errors and use a fallback path of reading the current
8149 sshd_config from the filesystem rather than use the one that sshd
8150 was started with.
8151
8152 To fix both of these cases, we reuse the startup_pipes that are shared
8153 between the main server sshd and forked children. Previously this was
8154 used solely to implement tracking of pre-auth child processes for
8155 MaxStartups, but this extends the messaging over these pipes to include
8156 a child->parent message that the parent process is safe to restart. This
8157 message is sent from the child after it has completed its preliminaries:
8158 closing listen_socks and receiving its reexec state.
8159
8160 bz#2953, reported by Michal Koutný; ok markus@ dtucker@
8161
8162 OpenBSD-Commit-ID: 7df09eacfa3ce13e9a7b1e9f17276ecc924d65ab
8163
8164commit de817e9dfab99473017d28cdf69e60397d00ea21
8165Author: djm@openbsd.org <djm@openbsd.org>
8166Date: Fri Mar 1 02:16:47 2019 +0000
8167
8168 upstream: mention PKCS11Provide=none, reword a little and remove
8169
8170 mention of RSA keys only (since we support ECDSA now and might support others
8171 in the future). Inspired by Jakub Jelen via bz#2974
8172
8173 OpenBSD-Commit-ID: a92e3686561bf624ccc64ab320c96c9e9a263aa5
8174
8175commit 95a8058c1a90a27acbb91392ba206854abc85226
8176Author: djm@openbsd.org <djm@openbsd.org>
8177Date: Fri Mar 1 02:08:50 2019 +0000
8178
8179 upstream: let PKCS11Provider=none do what users expect
8180
8181 print PKCS11Provider instead of obsolete SmartcardDevice in config dump.
8182
8183 bz#2974 ok dtucker@
8184
8185 OpenBSD-Commit-ID: c303d6f0230a33aa2dd92dc9b68843d56a64f846
8186
8187commit 8e7bac35aa576d2fd7560836da83733e864ce649
8188Author: markus@openbsd.org <markus@openbsd.org>
8189Date: Wed Feb 27 19:37:01 2019 +0000
8190
8191 upstream: dup stdout/in for proxycommand=-, otherwise stdout might
8192
8193 be redirected to /dev/null; ok djm@
8194
8195 OpenBSD-Commit-ID: 97dfce4c47ed4055042de8ebde85b7d88793e595
8196
8197commit 9b61130fbd95d196bce81ebeca94a4cb7c0d5ba0
8198Author: djm@openbsd.org <djm@openbsd.org>
8199Date: Sat Feb 23 08:20:43 2019 +0000
8200
8201 upstream: openssh-7.9 accidentally reused the server's algorithm lists
8202
8203 in the client for KEX, ciphers and MACs. The ciphers and MACs were identical
8204 between the client and server, but the error accidentially disabled the
8205 diffie-hellman-group-exchange-sha1 KEX method.
8206
8207 This fixes the client code to use the correct method list, but
8208 because nobody complained, it also disables the
8209 diffie-hellman-group-exchange-sha1 KEX method.
8210
8211 Reported by nuxi AT vault24.org via bz#2697; ok dtucker
8212
8213 OpenBSD-Commit-ID: e30c33a23c10fd536fefa120e86af1842e33fd57
8214
8215commit 37638c752041d591371900df820f070037878a2d
8216Author: Corinna Vinschen <vinschen@redhat.com>
8217Date: Wed Feb 20 13:41:25 2019 +0100
8218
8219 Cygwin: implement case-insensitive Unicode user and group name matching
8220
8221 The previous revert enabled case-insensitive user names again. This
8222 patch implements the case-insensitive user and group name matching.
8223 To allow Unicode chars, implement the matcher using wchar_t chars in
8224 Cygwin-specific code. Keep the generic code changes as small as possible.
8225 Cygwin: implement case-insensitive Unicode user and group name matching
8226
8227 Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
8228
8229commit bed1d43698807a07bb4ddb93a46b0bd84b9970b3
8230Author: Darren Tucker <dtucker@dtucker.net>
8231Date: Fri Feb 22 15:21:21 2019 +1100
8232
8233 Revert unintended parts of previous commit.
8234
8235commit f02afa350afac1b2f2d1413259a27a4ba1e2ca24
8236Author: Corinna Vinschen <vinschen@redhat.com>
8237Date: Wed Feb 20 13:41:24 2019 +0100
8238
8239 Revert "[auth.c] On Cygwin, refuse usernames that have differences in case"
8240
8241 This reverts commit acc9b29486dfd649dfda474e5c1a03b317449f1c.
8242
8243 Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
8244
8245commit 4c55b674835478eb80a1a7aeae588aa654e2a433
8246Author: Corinna Vinschen <vinschen@redhat.com>
8247Date: Sat Feb 16 14:13:43 2019 +0100
8248
8249 Add tags to .gitignore
8250
8251 Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
8252
8253commit 625b62634c33eaef4b80d07529954fe5c6435fe5
8254Author: djm@openbsd.org <djm@openbsd.org>
8255Date: Fri Feb 22 03:37:11 2019 +0000
8256
8257 upstream: perform removal of agent-forwarding directory in forward
8258
8259 setup error path with user's privileged. This is a no-op as this code always
8260 runs with user privilege now that we no longer support running sshd with
8261 privilege separation disabled, but as long as the privsep skeleton is there
8262 we should follow the rules.
8263 MIME-Version: 1.0
8264 Content-Type: text/plain; charset=UTF-8
8265 Content-Transfer-Encoding: 8bit
8266
8267 bz#2969 with patch from Erik Sjölund
8268
8269 OpenBSD-Commit-ID: 2b708401a5a8d6133c865d7698d9852210dca846
8270
8271commit d9ecfaba0b2f1887d20e4368230632e709ca83be
8272Author: jmc@openbsd.org <jmc@openbsd.org>
8273Date: Mon Feb 18 07:02:34 2019 +0000
8274
8275 upstream: sync the description of ~/.ssh/config with djm's updated
8276
8277 description in ssh.1; issue pointed out by andreas kahari
8278
8279 ok dtucker djm
8280
8281 OpenBSD-Commit-ID: 1b01ef0ae2c6328165150badae317ec92e52b01c
8282
8283commit 38e83e4f219c752ebb1560633b73f06f0392018b
8284Author: djm@openbsd.org <djm@openbsd.org>
8285Date: Tue Feb 12 23:53:10 2019 +0000
8286
8287 upstream: fix regression in r1.302 reported by naddy@ - only the first
8288
8289 public key from the agent was being attempted for use.
8290
8291 OpenBSD-Commit-ID: 07116aea521a04888718b2157f1ca723b2f46c8d
8292
8293commit 5c68ea8da790d711e6dd5f4c30d089c54032c59a
8294Author: djm@openbsd.org <djm@openbsd.org>
8295Date: Mon Feb 11 09:44:42 2019 +0000
8296
8297 upstream: cleanup GSSAPI authentication context after completion of the
8298
8299 authmethod. Move function-static GSSAPI state to the client Authctxt
8300 structure. Make static a bunch of functions that aren't used outside this
8301 file.
8302
8303 Based on patch from Markus Schmidt <markus@blueflash.cc>; ok markus@
8304
8305 OpenBSD-Commit-ID: 497fb792c0ddb4f1ba631b6eed526861f115dbe5
8306
8307commit a8c807f1956f81a92a758d3d0237d0ff06d0be5d
8308Author: benno@openbsd.org <benno@openbsd.org>
8309Date: Sun Feb 10 16:35:41 2019 +0000
8310
8311 upstream: ssh-keygen -D pkcs11.so needs to initialize pkcs11
8312
8313 interactive, so it can ask for the smartcards PIN. ok markus@
8314
8315 OpenBSD-Commit-ID: 1be7ccf88f1876e0fc4d7c9b3f96019ac5655bab
8316
8317commit 3d896c157c722bc47adca51a58dca859225b5874
8318Author: djm@openbsd.org <djm@openbsd.org>
8319Date: Sun Feb 10 11:15:52 2019 +0000
8320
8321 upstream: when checking that filenames sent by the server side
8322
8323 match what the client requested, be prepared to handle shell-style brace
8324 alternations, e.g. "{foo,bar}".
8325
8326 "looks good to me" millert@ + in snaps for the last week courtesy
8327 deraadt@
8328
8329 OpenBSD-Commit-ID: 3b1ce7639b0b25b2248e3a30f561a548f6815f3e
8330
8331commit 318e4f8548a4f5c0c913f61e27d4fc21ffb1eaae
8332Author: djm@openbsd.org <djm@openbsd.org>
8333Date: Sun Feb 10 11:10:57 2019 +0000
8334
8335 upstream: syslog when connection is dropped for attempting to run a
8336
8337 command when ForceCommand=internal-sftp is in effect; bz2960; ok dtucker@
8338
8339 OpenBSD-Commit-ID: 8c87fa66d7fc6c0fffa3a3c28e8ab5e8dde234b8
8340
8341commit 2ff2e19653b8c0798b8b8eff209651bdb1be2761
8342Author: Damien Miller <djm@mindrot.org>
8343Date: Fri Feb 8 14:53:35 2019 +1100
8344
8345 don't set $MAIL if UsePam=yes
8346
8347 PAM typically specifies the user environment if it's enabled, so don't
8348 second guess. bz#2937; ok dtucker@
8349
8350commit 03e92dd27d491fe6d1a54e7b2f44ef1b0a916e52
8351Author: Damien Miller <djm@mindrot.org>
8352Date: Fri Feb 8 14:50:36 2019 +1100
8353
8354 use same close logic for stderr as stdout
8355
8356 Avoids sending SIGPIPE to child processes after their parent exits
8357 if they attempt to write to stderr.
8358
8359 Analysis and patch from JD Paul; patch reworked by Jakub Jelen and
8360 myself. bz#2071; ok dtucker@
8361
8362commit 8c53d409baeeaf652c0c125a9b164edc9dbeb6de
8363Author: dtucker@openbsd.org <dtucker@openbsd.org>
8364Date: Tue Feb 5 11:35:56 2019 +0000
8365
8366 upstream: Adapt code in the non-USE_PIPES codepath to the new packet
8367
8368 API. This code is not normally reachable since USE_PIPES is always defined.
8369 bz#2961, patch from adrian.fita at gmail com.
8370
8371 OpenBSD-Commit-ID: 8d8428d678d1d5eb4bb21921df34e8173e6d238a
8372
8373commit 7a7fdca78de4b4774950be056099e579ef595414
8374Author: djm@openbsd.org <djm@openbsd.org>
8375Date: Mon Feb 4 23:37:54 2019 +0000
8376
8377 upstream: fix NULL-deref crash in PKCS#11 code when attempting
8378
8379 login to a token requiring a PIN; reported by benno@ fix mostly by markus@
8380
8381 OpenBSD-Commit-ID: 438d0b114b1b4ba25a9869733db1921209aa9a31
8382
8383commit cac302a4b42a988e54d32eb254b29b79b648dbf5
8384Author: dtucker@openbsd.org <dtucker@openbsd.org>
8385Date: Mon Feb 4 02:39:42 2019 +0000
8386
8387 upstream: Remove obsolete "Protocol" from commented out examples. Patch
8388
8389 from samy.mahmoudi at gmail com.
8390
8391 OpenBSD-Commit-ID: 16aede33dae299725a03abdac5dcb4d73f5d0cbf
8392
8393commit 483b3b638500fd498b4b529356e5a0e18cf76891
8394Author: dtucker@openbsd.org <dtucker@openbsd.org>
8395Date: Fri Feb 1 03:52:23 2019 +0000
8396
8397 upstream: Save connection timeout and restore for 2nd and
8398
8399 subsequent attempts, preventing them from having no timeout. bz#2918, ok
8400 djm@
8401
8402 OpenBSD-Commit-ID: 4977f1d0521d9b6bba0c9a20d3d226cefac48292
8403
8404commit 5f004620fdc1b2108139300ee12f4014530fb559
8405Author: markus@openbsd.org <markus@openbsd.org>
8406Date: Wed Jan 30 19:51:15 2019 +0000
8407
8408 upstream: Add authors for public domain sntrup4591761 code;
8409
8410 confirmed by Daniel J. Bernstein
8411
8412 OpenBSD-Commit-ID: b4621f22b8b8ef13e063c852af5e54dbbfa413c1
8413
8414commit 2c21b75a7be6ebdcbceaebb43157c48dbb36f3d8
8415Author: jmc@openbsd.org <jmc@openbsd.org>
8416Date: Sun Jan 27 07:14:11 2019 +0000
8417
8418 upstream: add -T to usage();
8419
8420 OpenBSD-Commit-ID: a7ae14d9436c64e1bd05022329187ea3a0ce1899
8421
8422commit 19a0f0529d3df04118da829528cac7ceff380b24
8423Author: dtucker@openbsd.org <dtucker@openbsd.org>
8424Date: Mon Jan 28 03:50:39 2019 +0000
8425
8426 upstream: The test sshd_config in in $OBJ.
8427
8428 OpenBSD-Regress-ID: 1e5d908a286d8e7de3a15a0020c8857f3a7c9172
8429
8430commit 8fe25440206319d15b52d12b948a5dfdec14dca3
8431Author: dtucker@openbsd.org <dtucker@openbsd.org>
8432Date: Mon Jan 28 03:28:10 2019 +0000
8433
8434 upstream: Remove leftover debugging.
8435
8436 OpenBSD-Regress-ID: 3d86c3d4867e46b35af3fd2ac8c96df0ffdcfeb9
8437
8438commit e30d32364d12c351eec9e14be6c61116f9d6cc90
8439Author: dtucker@openbsd.org <dtucker@openbsd.org>
8440Date: Mon Jan 28 00:12:36 2019 +0000
8441
8442 upstream: Enable ssh-dss for the agent test. Disable it for the
8443
8444 certificate test.
8445
8446 OpenBSD-Regress-ID: 388c1e03e1def539d350f139b37d69f12334668d
8447
8448commit ffdde469ed56249f5dc8af98da468dde35531398
8449Author: dtucker@openbsd.org <dtucker@openbsd.org>
8450Date: Mon Jan 28 00:08:26 2019 +0000
8451
8452 upstream: Count the number of key types instead of assuming there
8453
8454 are only two.
8455
8456 OpenBSD-Regress-ID: 0998702c41235782cf0beee396ec49b5056eaed9
8457
8458commit 1d05b4adcba08ab068466e5c08dee2f5417ec53a
8459Author: Corinna Vinschen <vinschen@redhat.com>
8460Date: Sat Jan 26 23:42:40 2019 +0100
8461
8462 Cygwin: only tweak sshd_config file if it's new, drop creating sshd user
8463
8464 The sshd_config tweaks were executed even if the old file was
8465 still in place. Fix that. Also disable sshd user creation.
8466 It's not used on Cygwin.
8467
8468commit 89843de0c4c733501f6b4f988098e6e06963df37
8469Author: Corinna Vinschen <vinschen@redhat.com>
8470Date: Sat Jan 26 23:03:12 2019 +0100
8471
8472 Cygwin: Change service name to cygsshd
8473
8474 Microsoft hijacked the sshd service name without asking.
8475
8476commit 2a9b3a2ce411d16cda9c79ab713c55f65b0ec257
8477Author: dtucker@openbsd.org <dtucker@openbsd.org>
8478Date: Sun Jan 27 06:30:53 2019 +0000
8479
8480 upstream: Generate all key supported key types and enable for keyscan
8481
8482 test.
8483
8484 OpenBSD-Regress-ID: 72f72ff49946c61bc949e1692dd9e3d71370891b
8485
8486commit 391ffc4b9d31fa1f4ad566499fef9176ff8a07dc
8487Author: djm@openbsd.org <djm@openbsd.org>
8488Date: Sat Jan 26 22:41:28 2019 +0000
8489
8490 upstream: check in scp client that filenames sent during
8491
8492 remote->local directory copies satisfy the wildcard specified by the user.
8493
8494 This checking provides some protection against a malicious server
8495 sending unexpected filenames, but it comes at a risk of rejecting wanted
8496 files due to differences between client and server wildcard expansion rules.
8497
8498 For this reason, this also adds a new -T flag to disable the check.
8499
8500 reported by Harry Sintonen
8501 fix approach suggested by markus@;
8502 has been in snaps for ~1wk courtesy deraadt@
8503
8504 OpenBSD-Commit-ID: 00f44b50d2be8e321973f3c6d014260f8f7a8eda
8505
8506commit c2c18a39683db382a15b438632afab3f551d50ce
8507Author: djm@openbsd.org <djm@openbsd.org>
8508Date: Sat Jan 26 22:35:01 2019 +0000
8509
8510 upstream: make ssh-keyscan return a non-zero exit status if it
8511
8512 finds no keys. bz#2903
8513
8514 OpenBSD-Commit-ID: 89f1081fb81d950ebb48e6e73d21807b2723d488
8515
8516commit 05b9a466700b44d49492edc2aa415fc2e8913dfe
8517Author: dtucker@openbsd.org <dtucker@openbsd.org>
8518Date: Thu Jan 24 17:00:29 2019 +0000
8519
8520 upstream: Accept the host key fingerprint as a synonym for "yes"
8521
8522 when accepting an unknown host key. This allows you to paste a fingerprint
8523 obtained out of band into the yes/no prompt and have the client do the
8524 comparison for you. ok markus@ djm@
8525
8526 OpenBSD-Commit-ID: 3c47d10b9f43d3d345e044fd9ec09709583a2767
8527
8528commit bdc6c63c80b55bcbaa66b5fde31c1cb1d09a41eb
8529Author: dtucker@openbsd.org <dtucker@openbsd.org>
8530Date: Thu Jan 24 16:52:17 2019 +0000
8531
8532 upstream: Have progressmeter force an update at the beginning and
8533
8534 end of each transfer. Fixes the problem recently introduces where very quick
8535 transfers do not display the progressmeter at all. Spotted by naddy@
8536
8537 OpenBSD-Commit-ID: 68dc46c259e8fdd4f5db3ec2a130f8e4590a7a9a
8538
8539commit 258e6ca003e47f944688ad8b8de087b58a7d966c
8540Author: dtucker@openbsd.org <dtucker@openbsd.org>
8541Date: Thu Jan 24 02:42:23 2019 +0000
8542
8543 upstream: Check for both EAGAIN and EWOULDBLOCK. This is a no-op
8544
8545 in OpenBSD (they are the same value) but makes things easier in -portable
8546 where they may be distinct values. "sigh ok" deraadt@
8547
8548 (ID sync only, portable already had this change).
8549
8550 OpenBSD-Commit-ID: 91f2bc7c0ecec905915ed59fa37feb9cc90e17d7
8551
8552commit 281ce042579b834cdc1e74314f1fb2eeb75d2612
8553Author: dtucker@openbsd.org <dtucker@openbsd.org>
8554Date: Thu Jan 24 02:34:52 2019 +0000
8555
8556 upstream: Always initialize 2nd arg to hpdelim2. It populates that
8557
8558 *ONLY IF* there's a delimiter. If there's not (the common case) it checked
8559 uninitialized memory, which usually passed, but if not would cause spurious
8560 failures when the uninitialized memory happens to contain "/". ok deraadt.
8561
8562 OpenBSD-Commit-ID: 4291611eaf2a53d4c92f4a57c7f267c9f944e0d3
8563
8564commit d05ea255678d9402beda4416cd0360f3e5dfe938
8565Author: dtucker@openbsd.org <dtucker@openbsd.org>
8566Date: Wed Jan 23 21:50:56 2019 +0000
8567
8568 upstream: Remove support for obsolete host/port syntax.
8569
8570 host/port was added in 2001 as an alternative to host:port syntax for
8571 the benefit of IPv6 users. These days there are establised standards
8572 for this like [::1]:22 and the slash syntax is easily mistaken for CIDR
8573 notation, which OpenSSH now supports for some things. Remove the slash
8574 notation from ListenAddress and PermitOpen. bz#2335, patch from jjelen
8575 at redhat.com, ok markus@
8576
8577 OpenBSD-Commit-ID: fae5f4e23c51a368d6b2d98376069ac2b10ad4b7
8578
8579commit 177d6c80c557a5e060cd343a0c116a2f1a7f43db
8580Author: dtucker@openbsd.org <dtucker@openbsd.org>
8581Date: Wed Jan 23 20:48:52 2019 +0000
8582
8583 upstream: Remove duplicate word. bz#2958, patch from jjelen at
8584
8585 redhat.com
8586
8587 OpenBSD-Commit-ID: cca3965a8333f2b6aae48b79ec1d72f7a830dd2c
8588
8589commit be3e6cba95dffe5fcf190c713525b48c837e7875
8590Author: dtucker@openbsd.org <dtucker@openbsd.org>
8591Date: Wed Jan 23 09:49:00 2019 +0000
8592
8593 upstream: Remove 3 as a guess for possible generator during moduli
8594
8595 generation. It's not mentioned in RFC4419 and it's not possible for
8596 Sophie-Germain primes greater than 5. bz#2330, from Christian Wittenhorst ,
8597 ok djm@ tb@
8598
8599 OpenBSD-Commit-ID: 1467652e6802ad3333b0959282d8d49dfe22c8cd
8600
8601commit 8976f1c4b2721c26e878151f52bdf346dfe2d54c
8602Author: dtucker@openbsd.org <dtucker@openbsd.org>
8603Date: Wed Jan 23 08:01:46 2019 +0000
8604
8605 upstream: Sanitize scp filenames via snmprintf. To do this we move
8606
8607 the progressmeter formatting outside of signal handler context and have the
8608 atomicio callback called for EINTR too. bz#2434 with contributions from djm
8609 and jjelen at redhat.com, ok djm@
8610
8611 OpenBSD-Commit-ID: 1af61c1f70e4f3bd8ab140b9f1fa699481db57d8
8612
8613commit 6249451f381755f792c6b9e2c2f80cdc699c14e2
8614Author: Darren Tucker <dtucker@dtucker.net>
8615Date: Thu Jan 24 10:00:20 2019 +1100
8616
8617 For broken read/readv comparisons, poll(RW).
8618
8619 In the cases where we can't compare to read or readv function pointers
8620 for some reason we currently ifdef out the poll() used to block while
8621 waiting for reads or writes, falling back to busy waiting. This restores
8622 the poll() in this case, but has it always check for read or write,
8623 removing an inline ifdef in the process.
8624
8625commit 5cb503dff4db251520e8bf7d23b9c97c06eee031
8626Author: Darren Tucker <dtucker@dtucker.net>
8627Date: Thu Jan 24 09:55:16 2019 +1100
8628
8629 Include unistd.h for strmode().
8630
8631commit f236ca2741f29b5c443c0b2db3aa9afb9ad9befe
8632Author: Darren Tucker <dtucker@dtucker.net>
8633Date: Thu Jan 24 09:50:58 2019 +1100
8634
8635 Also undef SIMPLEQ_FOREACH_SAFE.
8636
8637 Prevents macro redefinition warning on at least NetBSD 6.1.
8638
8639commit be063945e4e7d46b1734d973bf244c350fae172a
8640Author: djm@openbsd.org <djm@openbsd.org>
8641Date: Wed Jan 23 04:51:02 2019 +0000
8642
8643 upstream: allow auto-incrementing certificate serial number for certs
8644
8645 signed in a single commandline.
8646
8647 OpenBSD-Commit-ID: 39881087641efb8cd83c7ec13b9c98280633f45b
8648
8649commit 851f80328931975fe68f71af363c4537cb896da2
8650Author: djm@openbsd.org <djm@openbsd.org>
8651Date: Wed Jan 23 04:16:22 2019 +0000
8652
8653 upstream: move a bunch of global flag variables to main(); make the
8654
8655 rest static
8656
8657 OpenBSD-Commit-ID: fa431d92584e81fe99f95882f4c56b43fe3242dc
8658
8659commit 2265402dc7d701a9aca9f8a7b7b0fd45b65c479f
8660Author: Damien Miller <djm@mindrot.org>
8661Date: Wed Jan 23 13:03:16 2019 +1100
8662
8663 depend
8664
8665commit 2c223878e53cc46def760add459f5f7c4fb43e35
8666Author: djm@openbsd.org <djm@openbsd.org>
8667Date: Wed Jan 23 02:01:10 2019 +0000
8668
8669 upstream: switch mainloop from select(2) to poll(2); ok deraadt@
8670
8671 OpenBSD-Commit-ID: 37645419a330037d297f6f0adc3b3663e7ae7b2e
8672
8673commit bb956eaa94757ad058ff43631c3a7d6c94d38c2f
8674Author: djm@openbsd.org <djm@openbsd.org>
8675Date: Wed Jan 23 00:30:41 2019 +0000
8676
8677 upstream: pass most arguments to the KEX hash functions as sshbuf
8678
8679 rather than pointer+length; ok markus@
8680
8681 OpenBSD-Commit-ID: ef0c89c52ccc89817a13a5205725148a28492bf7
8682
8683commit d691588b8e29622c66abf8932362b522cf7f4051
8684Author: djm@openbsd.org <djm@openbsd.org>
8685Date: Tue Jan 22 22:58:50 2019 +0000
8686
8687 upstream: backoff reading messages from active connections when the
8688
8689 input buffer is too full to read one, or if the output buffer is too full to
8690 enqueue a response; feedback & ok dtucker@
8691
8692 OpenBSD-Commit-ID: df3c5b6d57c968975875de40d8955cbfed05a6c8
8693
8694commit f99ef8de967949a1fc25a5c28263ea32736e5943
8695Author: djm@openbsd.org <djm@openbsd.org>
8696Date: Tue Jan 22 20:48:01 2019 +0000
8697
8698 upstream: add -m to usage(); reminded by jmc@
8699
8700 OpenBSD-Commit-ID: bca476a5236e8f94210290b3e6a507af0434613e
8701
8702commit 41923ce06ac149453debe472238e0cca7d5a2e5f
8703Author: djm@openbsd.org <djm@openbsd.org>
8704Date: Tue Jan 22 12:03:58 2019 +0000
8705
8706 upstream: Correct some bugs in PKCS#11 token PIN handling at
8707
8708 initial login, the attempt at reading the PIN could be skipped in some cases
8709 especially on devices with integrated PIN readers.
8710
8711 based on patch from Daniel Kucera in bz#2652; ok markus@
8712
8713 OpenBSD-Commit-ID: fad70a61c60610afe8bb0db538c90e343e75e58e
8714
8715commit 2162171ad517501ba511fa9f8191945d01857bb4
8716Author: djm@openbsd.org <djm@openbsd.org>
8717Date: Tue Jan 22 12:00:50 2019 +0000
8718
8719 upstream: Support keys that set the CKA_ALWAYS_AUTHENTICATE by
8720
8721 requring a fresh login after the C_SignInit operation.
8722
8723 based on patch from Jakub Jelen in bz#2638; ok markus
8724
8725 OpenBSD-Commit-ID: a76e66996ba7c0923b46b74d46d499b811786661
8726
8727commit 7a2cb18a215b2cb335da3dc99489c52a91f4925b
8728Author: djm@openbsd.org <djm@openbsd.org>
8729Date: Tue Jan 22 11:51:25 2019 +0000
8730
8731 upstream: Mention that configuration for the destination host is
8732
8733 not applied to any ProxyJump/-J hosts. This has confused a few people...
8734
8735 OpenBSD-Commit-ID: 03f4f641df6ca236c1bfc69836a256b873db868b
8736
8737commit ecd2f33cb772db4fa76776543599f1c1ab6f9fa0
8738Author: djm@openbsd.org <djm@openbsd.org>
8739Date: Tue Jan 22 11:40:42 2019 +0000
8740
8741 upstream: Include -m in the synopsis for a few more commands that
8742
8743 support it
8744
8745 Be more explicit in the description of -m about where it may be used
8746
8747 Prompted by Jakub Jelen in bz2904
8748
8749 OpenBSD-Commit-ID: 3b398ac5e05d8a6356710d0ff114536c9d71046c
8750
8751commit ff5d2cf4ca373bb4002eef395ed2cbe2ff0826c1
8752Author: djm@openbsd.org <djm@openbsd.org>
8753Date: Tue Jan 22 11:26:16 2019 +0000
8754
8755 upstream: print the full pubkey being attempted at loglevel >=
8756
8757 debug2; bz2939
8758
8759 OpenBSD-Commit-ID: ac0fe5ca1429ebf4d460bad602adc96de0d7e290
8760
8761commit 180b520e2bab33b566b4b0cbac7d5f9940935011
8762Author: djm@openbsd.org <djm@openbsd.org>
8763Date: Tue Jan 22 11:19:42 2019 +0000
8764
8765 upstream: clarify: ssh-keygen -e only writes public keys, never
8766
8767 private
8768
8769 OpenBSD-Commit-ID: 7de7ff6d274d82febf9feb641e2415ffd6a30bfb
8770
8771commit c45616a199c322ca674315de88e788f1d2596e26
8772Author: djm@openbsd.org <djm@openbsd.org>
8773Date: Tue Jan 22 11:00:15 2019 +0000
8774
8775 upstream: mention the new vs. old key formats in the introduction
8776
8777 and give some hints on how keys may be converted or written in the old
8778 format.
8779
8780 OpenBSD-Commit-ID: 9c90a9f92eddc249e07fad1204d0e15c8aa13823
8781
8782commit fd8eb1383a34c986a00ef13d745ae9bd3ea21760
8783Author: jmc@openbsd.org <jmc@openbsd.org>
8784Date: Tue Jan 22 06:58:31 2019 +0000
8785
8786 upstream: tweak previous;
8787
8788 OpenBSD-Commit-ID: d2a80e389da8e7ed71978643d8cbaa8605b597a8
8789
8790commit 68e924d5473c00057f8532af57741d258c478223
8791Author: tb@openbsd.org <tb@openbsd.org>
8792Date: Mon Jan 21 23:55:12 2019 +0000
8793
8794 upstream: Forgot to add -J to the synopsis.
8795
8796 OpenBSD-Commit-ID: 26d95e409a0b72526526fc56ca1caca5cc3d3c5e
8797
8798commit 622dedf1a884f2927a9121e672bd9955e12ba108
8799Author: tb@openbsd.org <tb@openbsd.org>
8800Date: Mon Jan 21 22:50:42 2019 +0000
8801
8802 upstream: Add a -J option as a shortcut for -o Proxyjump= to scp(1)
8803
8804 and sftp(1) to match ssh(1)'s interface.
8805
8806 ok djm
8807
8808 OpenBSD-Commit-ID: a75bc2d5f329caa7229a7e9fe346c4f41c2663fc
8809
8810commit c882d74652800150d538e22c80dd2bd3cdd5fae2
8811Author: Darren Tucker <dtucker@dtucker.net>
8812Date: Tue Jan 22 20:38:40 2019 +1100
8813
8814 Allow building against OpenSSL dev (3.x) version.
8815
8816commit d5520393572eb24aa0e001a1c61f49b104396e45
8817Author: Damien Miller <djm@mindrot.org>
8818Date: Tue Jan 22 10:50:40 2019 +1100
8819
8820 typo
8821
8822commit 2de9cec54230998ab10161576f77860a2559ccb7
8823Author: Damien Miller <djm@mindrot.org>
8824Date: Tue Jan 22 10:49:52 2019 +1100
8825
8826 add missing header
8827
8828commit 533cfb01e49a2a30354e191669dc3159e03e99a7
8829Author: djm@openbsd.org <djm@openbsd.org>
8830Date: Mon Jan 21 22:18:24 2019 +0000
8831
8832 upstream: switch sntrup implementation source from supercop to
8833
8834 libpqcrypto; the latter is almost identical but doesn't rely on signed
8835 underflow to implement an optimised integer sort; from markus@
8836
8837 OpenBSD-Commit-ID: cd09bbf0e0fcef1bedca69fdf7990dc360567cf8
8838
8839commit d50ab3cd6fb859888a26b4d4e333239b4f6bf573
8840Author: Damien Miller <djm@mindrot.org>
8841Date: Tue Jan 22 00:02:23 2019 +1100
8842
8843 new files need includes.h
8844
8845commit c7670b091a7174760d619ef6738b4f26b2093301
8846Author: djm@openbsd.org <djm@openbsd.org>
8847Date: Mon Jan 21 12:53:35 2019 +0000
8848
8849 upstream: add "-v" flags to ssh-add and ssh-pkcs11-helper to turn up
8850
8851 debug verbosity.
8852
8853 Make ssh-agent turn on ssh-pkcs11-helper's verbosity when it is run
8854 in debug mode ("ssh-agent -d"), so we get to see errors from the
8855 PKCS#11 code.
8856
8857 ok markus@
8858
8859 OpenBSD-Commit-ID: 0a798643c6a92a508df6bd121253ba1c8bee659d
8860
8861commit 49d8c8e214d39acf752903566b105d06c565442a
8862Author: djm@openbsd.org <djm@openbsd.org>
8863Date: Mon Jan 21 12:50:12 2019 +0000
8864
8865 upstream: adapt to changes in KEX APIs and file removals
8866
8867 OpenBSD-Regress-ID: 54d6857e7c58999c7a6d40942ab0fed3529f43ca
8868
8869commit 35ecc53a83f8e8baab2e37549addfd05c73c30f1
8870Author: djm@openbsd.org <djm@openbsd.org>
8871Date: Mon Jan 21 12:35:20 2019 +0000
8872
8873 upstream: adapt to changes in KEX API and file removals
8874
8875 OpenBSD-Regress-ID: 92cad022d3b0d11e08f3e0055d6a14b8f994c0d7
8876
8877commit 7d69aae64c35868cc4f644583ab973113a79480e
8878Author: djm@openbsd.org <djm@openbsd.org>
8879Date: Mon Jan 21 12:29:35 2019 +0000
8880
8881 upstream: adapt to bignum1 API removal and bignum2 API change
8882
8883 OpenBSD-Regress-ID: cea6ff270f3d560de86b355a87a2c95b55a5ca63
8884
8885commit beab553f0a9578ef9bffe28b2c779725e77b39ec
8886Author: djm@openbsd.org <djm@openbsd.org>
8887Date: Mon Jan 21 09:13:41 2019 +0000
8888
8889 upstream: remove hack to use non-system libcrypto
8890
8891 OpenBSD-Regress-ID: ce72487327eee4dfae1ab0212a1f33871fe0809f
8892
8893commit 4dc06bd57996f1a46b4c3bababe0d09bc89098f7
8894Author: Damien Miller <djm@mindrot.org>
8895Date: Mon Jan 21 23:14:04 2019 +1100
8896
8897 depend
8898
8899commit 70edd73edc4df54e5eee50cd27c25427b34612f8
8900Author: djm@openbsd.org <djm@openbsd.org>
8901Date: Mon Jan 21 12:08:13 2019 +0000
8902
8903 upstream: fix reversed arguments to kex_load_hostkey(); manifested as
8904
8905 errors in cert-hostkey.sh regress failures.
8906
8907 OpenBSD-Commit-ID: 12dab63850b844f84d5a67e86d9e21a42fba93ba
8908
8909commit f1185abbf0c9108e639297addc77f8757ee00eb3
8910Author: djm@openbsd.org <djm@openbsd.org>
8911Date: Mon Jan 21 11:22:00 2019 +0000
8912
8913 upstream: forgot to cvs add this file in previous series of commits;
8914
8915 grrr
8916
8917 OpenBSD-Commit-ID: bcff316c3e7da8fd15333e05d244442c3aaa66b0
8918
8919commit 7bef390b625bdc080f0fd4499ef03cef60fca4fa
8920Author: djm@openbsd.org <djm@openbsd.org>
8921Date: Mon Jan 21 10:44:21 2019 +0000
8922
8923 upstream: nothing shall escape this purge
8924
8925 OpenBSD-Commit-ID: 4795b0ff142b45448f7e15f3c2f77a947191b217
8926
8927commit aaca72d6f1279b842066e07bff797019efeb2c23
8928Author: djm@openbsd.org <djm@openbsd.org>
8929Date: Mon Jan 21 10:40:11 2019 +0000
8930
8931 upstream: rename kex->kem_client_pub -> kex->client_pub now that
8932
8933 KEM has been renamed to kexgen
8934
8935 from markus@ ok djm@
8936
8937 OpenBSD-Commit-ID: fac6da5dc63530ad0da537db022a9a4cfbe8bed8
8938
8939commit 70867e1ca2eb08bbd494fe9c568df4fd3b35b867
8940Author: djm@openbsd.org <djm@openbsd.org>
8941Date: Mon Jan 21 10:38:54 2019 +0000
8942
8943 upstream: merge kexkem[cs] into kexgen
8944
8945 from markus@ ok djm@
8946
8947 OpenBSD-Commit-ID: 87d886b7f1812ff9355fda1435f6ea9b71a0ac89
8948
8949commit 71e67fff946396caa110a7964da23480757258ff
8950Author: djm@openbsd.org <djm@openbsd.org>
8951Date: Mon Jan 21 10:35:09 2019 +0000
8952
8953 upstream: pass values used in KEX hash computation as sshbuf
8954
8955 rather than pointer+len
8956
8957 suggested by me; implemented by markus@ ok me
8958
8959 OpenBSD-Commit-ID: 994f33c464f4a9e0f1d21909fa3e379f5a0910f0
8960
8961commit 4b83e2a2cc0c12e671a77eaba1c1245894f4e884
8962Author: djm@openbsd.org <djm@openbsd.org>
8963Date: Mon Jan 21 10:33:49 2019 +0000
8964
8965 upstream: remove kex_derive_keys_bn wrapper; no unused since the
8966
8967 DH-like KEX methods have moved to KEM
8968
8969 from markus@ ok djm@
8970
8971 OpenBSD-Commit-ID: bde9809103832f349545e4f5bb733d316db9a060
8972
8973commit 92dda34e373832f34a1944e5d9ebbebb184dedc1
8974Author: djm@openbsd.org <djm@openbsd.org>
8975Date: Mon Jan 21 10:29:56 2019 +0000
8976
8977 upstream: use KEM API for vanilla ECDH
8978
8979 from markus@ ok djm@
8980
8981 OpenBSD-Commit-ID: 6fbff96339a929835536b5730585d1d6057a352c
8982
8983commit b72357217cbe510a3ae155307a7be6b9181f1d1b
8984Author: Damien Miller <djm@mindrot.org>
8985Date: Mon Jan 21 23:11:21 2019 +1100
8986
8987 fixup missing ssherr.h
8988
8989commit 9c9c97e14fe190931f341876ad98213e1e1dc19f
8990Author: djm@openbsd.org <djm@openbsd.org>
8991Date: Mon Jan 21 10:28:01 2019 +0000
8992
8993 upstream: use KEM API for vanilla DH KEX
8994
8995 from markus@ ok djm@
8996
8997 OpenBSD-Commit-ID: af56466426b08a8be275412ae2743319e3d277c9
8998
8999commit 2f6a9ddbbf6ca8623c53c323ff17fb6d68d66970
9000Author: djm@openbsd.org <djm@openbsd.org>
9001Date: Mon Jan 21 10:24:09 2019 +0000
9002
9003 upstream: use KEM API for vanilla c25519 KEX
9004
9005 OpenBSD-Commit-ID: 38d937b85ff770886379dd66a8f32ab0c1c35c1f
9006
9007commit dfd591618cdf2c96727ac0eb65f89cf54af0d97e
9008Author: djm@openbsd.org <djm@openbsd.org>
9009Date: Mon Jan 21 10:20:12 2019 +0000
9010
9011 upstream: Add support for a PQC KEX/KEM:
9012
9013 sntrup4591761x25519-sha512@tinyssh.org using the Streamlined NTRU Prime
9014 4591^761 implementation from SUPERCOP coupled with X25519 as a stop-loss. Not
9015 enabled by default.
9016
9017 introduce KEM API; a simplified framework for DH-ish KEX methods.
9018
9019 from markus@ feedback & ok djm@
9020
9021 OpenBSD-Commit-ID: d687f76cffd3561dd73eb302d17a1c3bf321d1a7
9022
9023commit b1b2ff4ed559051d1035419f8f236275fa66d5d6
9024Author: djm@openbsd.org <djm@openbsd.org>
9025Date: Mon Jan 21 10:07:22 2019 +0000
9026
9027 upstream: factor out kex_verify_hostkey() - again, duplicated
9028
9029 almost exactly across client and server for several KEX methods.
9030
9031 from markus@ ok djm@
9032
9033 OpenBSD-Commit-ID: 4e4a16d949dadde002a0aacf6d280a684e20829c
9034
9035commit bb39bafb6dc520cc097780f4611a52da7f19c3e2
9036Author: djm@openbsd.org <djm@openbsd.org>
9037Date: Mon Jan 21 10:05:09 2019 +0000
9038
9039 upstream: factor out kex_load_hostkey() - this is duplicated in
9040
9041 both the client and server implementations for most KEX methods.
9042
9043 from markus@ ok djm@
9044
9045 OpenBSD-Commit-ID: 8232fa7c21fbfbcaf838313b0c166dc6c8762f3c
9046
9047commit dec5e9d33891e3bc3f1395d7db0e56fdc7f86dfc
9048Author: djm@openbsd.org <djm@openbsd.org>
9049Date: Mon Jan 21 10:03:37 2019 +0000
9050
9051 upstream: factor out kex_dh_compute_key() - it's shared between
9052
9053 plain DH KEX and DH GEX in both the client and server implementations
9054
9055 from markus@ ok djm@
9056
9057 OpenBSD-Commit-ID: 12186e18791fffcd4642c82e7e0cfdd7ea37e2ec
9058
9059commit e93bd98eab79b9a78f64ee8dd4dffc4d3979c7ae
9060Author: djm@openbsd.org <djm@openbsd.org>
9061Date: Mon Jan 21 10:00:23 2019 +0000
9062
9063 upstream: factor out DH keygen; it's identical between the client
9064
9065 and the server
9066
9067 from markus@ ok djm@
9068
9069 OpenBSD-Commit-ID: 2be57f6a0d44f1ab2c8de2b1b5d6f530c387fae9
9070
9071commit 5ae3f6d314465026d028af82609c1d49ad197655
9072Author: djm@openbsd.org <djm@openbsd.org>
9073Date: Mon Jan 21 09:55:52 2019 +0000
9074
9075 upstream: save the derived session id in kex_derive_keys() rather
9076
9077 than making each kex method implementation do it.
9078
9079 from markus@ ok djm@
9080
9081 OpenBSD-Commit-ID: d61ade9c8d1e13f665f8663c552abff8c8a30673
9082
9083commit 7be8572b32a15d5c3dba897f252e2e04e991c307
9084Author: djm@openbsd.org <djm@openbsd.org>
9085Date: Mon Jan 21 09:54:11 2019 +0000
9086
9087 upstream: Make sshpkt_get_bignum2() allocate the bignum it is
9088
9089 parsing rather than make the caller do it. Saves a lot of boilerplate code.
9090
9091 from markus@ ok djm@
9092
9093 OpenBSD-Commit-ID: 576bf784f9a240f5a1401f7005364e59aed3bce9
9094
9095commit 803178bd5da7e72be94ba5b4c4c196d4b542da4d
9096Author: djm@openbsd.org <djm@openbsd.org>
9097Date: Mon Jan 21 09:52:25 2019 +0000
9098
9099 upstream: remove obsolete (SSH v.1) sshbuf_get/put_bignum1
9100
9101 functions
9102
9103 from markus@ ok djm@
9104
9105 OpenBSD-Commit-ID: 0380b1b2d9de063de3c5a097481a622e6a04943e
9106
9107commit f3ebaffd8714be31d4345f90af64992de4b3bba2
9108Author: djm@openbsd.org <djm@openbsd.org>
9109Date: Mon Jan 21 09:49:37 2019 +0000
9110
9111 upstream: fix all-zero check in kexc25519_shared_key
9112
9113 from markus@ ok djm@
9114
9115 OpenBSD-Commit-ID: 60b1d364e0d9d34d1d1ef1620cb92e36cf06712d
9116
9117commit 9d1a9771d0ad3a83af733bf3d2650b53f43c269f
9118Author: jmc@openbsd.org <jmc@openbsd.org>
9119Date: Mon Jan 21 07:09:10 2019 +0000
9120
9121 upstream: - -T was added to the first synopsis by mistake - since
9122
9123 "..." denotes optional, no need to surround it in []
9124
9125 ok djm
9126
9127 OpenBSD-Commit-ID: 918f6d8eed4e0d8d9ef5eadae1b8983d796f0e25
9128
9129commit 2f0bad2bf85391dbb41315ab55032ec522660617
9130Author: Darren Tucker <dtucker@dtucker.net>
9131Date: Mon Jan 21 21:28:27 2019 +1100
9132
9133 Make --with-rpath take a flag instead of yes/no.
9134
9135 Linkers need various flags for -rpath and similar, so make --with-rpath
9136 take an optional flag argument which is passed to the linker. ok djm@
9137
9138commit 23490a6c970ea1d03581a3b4208f2eb7a675f453
9139Author: Damien Miller <djm@mindrot.org>
9140Date: Mon Jan 21 15:05:43 2019 +1100
9141
9142 fix previous test
9143
9144commit b6dd3277f2c49f9584a2097bc792e8f480397e87
9145Author: Darren Tucker <dtucker@dtucker.net>
9146Date: Mon Jan 21 13:50:17 2019 +1100
9147
9148 Wrap ECC static globals in EC_KEY_METHOD_NEW too.
9149
9150commit b2eb9db35b7191613f2f4b934d57b25938bb34b3
9151Author: Damien Miller <djm@mindrot.org>
9152Date: Mon Jan 21 12:53:40 2019 +1100
9153
9154 pass TEST_SSH_SSHPKCS11HELPER to regress tests
9155
9156commit ba58a529f45b3dae2db68607d8c54ae96e90e705
9157Author: Damien Miller <djm@mindrot.org>
9158Date: Mon Jan 21 12:31:29 2019 +1100
9159
9160 make agent-pkcs11 search harder for softhsm2.so
9161
9162commit 662be40c62339ab645113c930ce689466f028938
9163Author: djm@openbsd.org <djm@openbsd.org>
9164Date: Mon Jan 21 02:05:38 2019 +0000
9165
9166 upstream: always print the caller's error message in ossl_error(),
9167
9168 even when there are no libcrypto errors to report.
9169
9170 OpenBSD-Commit-ID: 09ebaa8f706e0eccedd209775baa1eee2ada806a
9171
9172commit ce46c3a077dfb4c531ccffcfff03f37775725b75
9173Author: djm@openbsd.org <djm@openbsd.org>
9174Date: Mon Jan 21 02:01:03 2019 +0000
9175
9176 upstream: get the ex_data (pkcs11_key object) back from the keys at
9177
9178 the index at which it was inserted, rather than assuming index 0
9179
9180 OpenBSD-Commit-ID: 1f3a6ce0346c8014e895e50423bef16401510aa8
9181
9182commit 0a5f2ea35626022299ece3c8817a1abe8cf37b3e
9183Author: djm@openbsd.org <djm@openbsd.org>
9184Date: Mon Jan 21 01:05:00 2019 +0000
9185
9186 upstream: GSSAPI code got missed when converting to new packet API
9187
9188 OpenBSD-Commit-ID: 37e4f06ab4a0f4214430ff462ba91acba28b7851
9189
9190commit 2efcf812b4c1555ca3aff744820a3b3bccd68298
9191Author: Damien Miller <djm@mindrot.org>
9192Date: Mon Jan 21 11:57:21 2019 +1100
9193
9194 Fix -Wunused when compiling PKCS#11 without ECDSA
9195
9196commit 3c0c657ed7cd335fc05c0852d88232ca7e92a5d9
9197Author: djm@openbsd.org <djm@openbsd.org>
9198Date: Sun Jan 20 23:26:44 2019 +0000
9199
9200 upstream: allow override of ssh-pkcs11-helper binary via
9201
9202 $TEST_SSH_SSHPKCS11HELPER from markus@
9203
9204 OpenBSD-Regress-ID: 7382a3d76746f5a792d106912a5819fd5e49e469
9205
9206commit 760ae37b4505453c6fa4faf1aa39a8671ab053af
9207Author: djm@openbsd.org <djm@openbsd.org>
9208Date: Sun Jan 20 23:25:25 2019 +0000
9209
9210 upstream: adapt agent-pkcs11.sh test to softhsm2 and add support
9211
9212 for ECDSA keys
9213
9214 work by markus@, ok djm@
9215
9216 OpenBSD-Regress-ID: 1ebc2be0e88eff1b6d8be2f9c00cdc60723509fe
9217
9218commit b2ce8b31a1f974a13e6d12e0a0c132b50bc45115
9219Author: djm@openbsd.org <djm@openbsd.org>
9220Date: Sun Jan 20 23:24:19 2019 +0000
9221
9222 upstream: add "extra:" target to run some extra tests that are not
9223
9224 enabled by default (currently includes agent-pkcs11.sh); from markus@
9225
9226 OpenBSD-Regress-ID: 9a969e1adcd117fea174d368dcb9c61eb50a2a3c
9227
9228commit 632976418d60b7193597bbc6ac7ca33981a41aab
9229Author: djm@openbsd.org <djm@openbsd.org>
9230Date: Mon Jan 21 00:47:34 2019 +0000
9231
9232 upstream: use ECDSA_SIG_set0() instead of poking signature values into
9233
9234 structure directly; the latter works on LibreSSL but not on OpenSSL. From
9235 portable.
9236
9237 OpenBSD-Commit-ID: 5b22a1919d9cee907d3f8a029167f70a481891c6
9238
9239commit 5de6ac2bad11175135d9b819b3546db0ca0b4878
9240Author: Damien Miller <djm@mindrot.org>
9241Date: Mon Jan 21 11:44:19 2019 +1100
9242
9243 remove HAVE_DLOPEN that snuck in
9244
9245 portable doesn't use this
9246
9247commit e2cb445d786f7572da2af93e3433308eaed1093a
9248Author: Damien Miller <djm@mindrot.org>
9249Date: Mon Jan 21 11:32:28 2019 +1100
9250
9251 conditionalise ECDSA PKCS#11 support
9252
9253 Require EC_KEY_METHOD support in libcrypto, evidenced by presence
9254 of EC_KEY_METHOD_new() function.
9255
9256commit fcb1b0937182d0137a3c357c89735d0dc5869d54
9257Author: djm@openbsd.org <djm@openbsd.org>
9258Date: Sun Jan 20 23:12:35 2019 +0000
9259
9260 upstream: we use singleton pkcs#11 RSA_METHOD and EC_KEY_METHOD
9261
9262 now, so there is no need to keep a copy of each in the pkcs11_key object.
9263
9264 work by markus@, ok djm@
9265
9266 OpenBSD-Commit-ID: 43b4856516e45c0595f17a8e95b2daee05f12faa
9267
9268commit 6529409e85890cd6df7e5e81d04e393b1d2e4b0b
9269Author: djm@openbsd.org <djm@openbsd.org>
9270Date: Sun Jan 20 23:11:11 2019 +0000
9271
9272 upstream: KNF previous; from markus@
9273
9274 OpenBSD-Commit-ID: 3dfe35e25b310c3968b1e4e53a0cb1d03bda5395
9275
9276commit 58622a8c82f4e2aad630580543f51ba537c1f39e
9277Author: djm@openbsd.org <djm@openbsd.org>
9278Date: Sun Jan 20 23:10:33 2019 +0000
9279
9280 upstream: use OpenSSL's RSA reference counting hooks to
9281
9282 implicitly clean up pkcs11_key objects when their owning RSA object's
9283 reference count drops to zero. Simplifies the cleanup path and makes it more
9284 like ECDSA's
9285
9286 work by markus@, ok djm@
9287
9288 OpenBSD-Commit-ID: 74b9c98f405cd78f7148e9e4a4982336cd3df25c
9289
9290commit f118542fc82a3b3ab0360955b33bc5a271ea709f
9291Author: djm@openbsd.org <djm@openbsd.org>
9292Date: Sun Jan 20 23:08:24 2019 +0000
9293
9294 upstream: make the PKCS#11 RSA code more like the new PKCS#11
9295
9296 ECDSA code: use a single custom RSA_METHOD instead of a method per key
9297
9298 suggested by me, but markus@ did all the work.
9299 ok djm@
9300
9301 OpenBSD-Commit-ID: 8aafcebe923dc742fc5537a995cee549d07e4b2e
9302
9303commit 445cfce49dfc904c6b8ab25afa2f43130296c1a5
9304Author: djm@openbsd.org <djm@openbsd.org>
9305Date: Sun Jan 20 23:05:52 2019 +0000
9306
9307 upstream: fix leak of ECDSA pkcs11_key objects
9308
9309 work by markus, ok djm@
9310
9311 OpenBSD-Commit-ID: 9fc0c4f1d640aaa5f19b8d70f37ea19b8ad284a1
9312
9313commit 8a2467583f0b5760787273796ec929190c3f16ee
9314Author: djm@openbsd.org <djm@openbsd.org>
9315Date: Sun Jan 20 23:03:26 2019 +0000
9316
9317 upstream: use EVP_PKEY_get0_EC_KEY() instead of direct access of
9318
9319 EC_KEY internals as that won't work on OpenSSL
9320
9321 work by markus@, feedback and ok djm@
9322
9323 OpenBSD-Commit-ID: 4a99cdb89fbd6f5155ef8c521c99dc66e2612700
9324
9325commit 24757c1ae309324e98d50e5935478655be04e549
9326Author: djm@openbsd.org <djm@openbsd.org>
9327Date: Sun Jan 20 23:01:59 2019 +0000
9328
9329 upstream: cleanup PKCS#11 ECDSA pubkey loading: the returned
9330
9331 object should never have a DER header
9332
9333 work by markus; feedback and ok djm@
9334
9335 OpenBSD-Commit-ID: b617fa585eddbbf0b1245b58b7a3c4b8d613db17
9336
9337commit 749aef30321595435ddacef2f31d7a8f2b289309
9338Author: djm@openbsd.org <djm@openbsd.org>
9339Date: Sun Jan 20 23:00:12 2019 +0000
9340
9341 upstream: cleanup unnecessary code in ECDSA pkcs#11 signature
9342
9343 work by markus@, feedback and ok djm@
9344
9345 OpenBSD-Commit-ID: affa5ca7d58d59fbd16169f77771dcdbd2b0306d
9346
9347commit 0c50992af49b562970dd0ba3f8f151f1119e260e
9348Author: djm@openbsd.org <djm@openbsd.org>
9349Date: Sun Jan 20 22:57:45 2019 +0000
9350
9351 upstream: cleanup pkcs#11 client code: use sshkey_new in instead
9352
9353 of stack- allocating a sshkey
9354
9355 work by markus@, ok djm@
9356
9357 OpenBSD-Commit-ID: a048eb6ec8aa7fa97330af927022c0da77521f91
9358
9359commit 854bd8674ee5074a239f7cadf757d55454802e41
9360Author: djm@openbsd.org <djm@openbsd.org>
9361Date: Sun Jan 20 22:54:30 2019 +0000
9362
9363 upstream: allow override of the pkcs#11 helper binary via
9364
9365 $SSH_PKCS11_HELPER; needed for regress tests.
9366
9367 work by markus@, ok me
9368
9369 OpenBSD-Commit-ID: f78d8185500bd7c37aeaf7bd27336db62f0f7a83
9370
9371commit 93f02107f44d63a016d8c23ebd2ca9205c495c48
9372Author: djm@openbsd.org <djm@openbsd.org>
9373Date: Sun Jan 20 22:51:37 2019 +0000
9374
9375 upstream: add support for ECDSA keys in PKCS#11 tokens
9376
9377 Work by markus@ and Pedro Martelletto, feedback and ok me@
9378
9379 OpenBSD-Commit-ID: a37d651e221341376636056512bddfc16efb4424
9380
9381commit aa22c20e0c36c2fc610cfcc793b0d14079c38814
9382Author: djm@openbsd.org <djm@openbsd.org>
9383Date: Sun Jan 20 22:03:29 2019 +0000
9384
9385 upstream: add option to test whether keys in an agent are usable,
9386
9387 by performing a signature and a verification using each key "ssh-add -T
9388 pubkey [...]"
9389
9390 work by markus@, ok djm@
9391
9392 OpenBSD-Commit-ID: 931b888a600b6a883f65375bd5f73a4776c6d19b
9393
9394commit a36b0b14a12971086034d53c0c3dfbad07665abe
9395Author: tb@openbsd.org <tb@openbsd.org>
9396Date: Sun Jan 20 02:01:59 2019 +0000
9397
9398 upstream: Fix BN_is_prime_* calls in SSH, the API returns -1 on
9399
9400 error.
9401
9402 Found thanks to BoringSSL's commit 53409ee3d7595ed37da472bc73b010cd2c8a5ffd
9403 by David Benjamin.
9404
9405 ok djm, dtucker
9406
9407 OpenBSD-Commit-ID: 1ee832be3c44b1337f76b8562ec6d203f3b072f8
9408
9409commit ec4776bb01dd8d61fddc7d2a31ab10bf3d3d829a
9410Author: dtucker@openbsd.org <dtucker@openbsd.org>
9411Date: Sun Jan 20 01:12:40 2019 +0000
9412
9413 upstream: DH-GEX min value is now specified in RFC8270. ok djm@
9414
9415 OpenBSD-Commit-ID: 1229d0feb1d0ecefe05bf67a17578b263e991acc
9416
9417commit c90a7928c4191303e76a8c58b9008d464287ae1b
9418Author: Darren Tucker <dtucker@dtucker.net>
9419Date: Mon Jan 21 09:22:36 2019 +1100
9420
9421 Check for cc before gcc.
9422
9423 If cc is something other than gcc and is the system compiler prefer using
9424 that, unless otherwise told via $CC. ok djm@
9425
9426commit 9b655dc9c9a353f0a527f0c6c43a5e35653c9503
9427Author: Damien Miller <djm@mindrot.org>
9428Date: Sun Jan 20 14:55:27 2019 +1100
9429
9430 last bits of old packet API / active_state global
9431
9432commit 3f0786bbe73609ac96e5a0d91425ee21129f8e04
9433Author: Damien Miller <djm@mindrot.org>
9434Date: Sun Jan 20 10:22:18 2019 +1100
9435
9436 remove PAM dependencies on old packet API
9437
9438 Requires some caching of values, because the PAM code isn't
9439 always called with packet context.
9440
9441commit 08f66d9f17e12c1140d1f1cf5c4dce67e915d3cc
9442Author: Damien Miller <djm@mindrot.org>
9443Date: Sun Jan 20 09:58:45 2019 +1100
9444
9445 remove vestiges of old packet API from loginrec.c
9446
9447commit c327813ea1d740e3e367109c17873815aba1328e
9448Author: Damien Miller <djm@mindrot.org>
9449Date: Sun Jan 20 09:45:38 2019 +1100
9450
9451 depend
9452
9453commit 135e302cfdbe91817294317c337cc38c3ff01cba
9454Author: djm@openbsd.org <djm@openbsd.org>
9455Date: Sat Jan 19 22:30:52 2019 +0000
9456
9457 upstream: fix error in refactor: use ssh_packet_disconnect() instead of
9458
9459 sshpkt_error(). The first one logs the error and exits (what we want) instead
9460 of just logging and blundering on.
9461
9462 OpenBSD-Commit-ID: 39f51b43641dce9ce0f408ea6c0e6e077e2e91ae
9463
9464commit 245c6a0b220b58686ee35bc5fc1c359e9be2faaa
9465Author: djm@openbsd.org <djm@openbsd.org>
9466Date: Sat Jan 19 21:45:31 2019 +0000
9467
9468 upstream: remove last traces of old packet API!
9469
9470 with & ok markus@
9471
9472 OpenBSD-Commit-ID: 9bd10437026423eb8245636ad34797a20fbafd7d
9473
9474commit 04c091fc199f17dacf8921df0a06634b454e2722
9475Author: djm@openbsd.org <djm@openbsd.org>
9476Date: Sat Jan 19 21:43:56 2019 +0000
9477
9478 upstream: remove last references to active_state
9479
9480 with & ok markus@
9481
9482 OpenBSD-Commit-ID: 78619a50ea7e4ca2f3b54d4658b3227277490ba2
9483
9484commit ec00f918b8ad90295044266c433340a8adc93452
9485Author: djm@openbsd.org <djm@openbsd.org>
9486Date: Sat Jan 19 21:43:07 2019 +0000
9487
9488 upstream: convert monitor.c to new packet API
9489
9490 with & ok markus@
9491
9492 OpenBSD-Commit-ID: 61ecd154bd9804461a0cf5f495a29d919e0014d5
9493
9494commit 6350e0316981489d4205952d6904d6fedba5bfe0
9495Author: djm@openbsd.org <djm@openbsd.org>
9496Date: Sat Jan 19 21:42:30 2019 +0000
9497
9498 upstream: convert sshd.c to new packet API
9499
9500 with & ok markus@
9501
9502 OpenBSD-Commit-ID: ea569d3eaf9b5cf1bad52779fbfa5fa0b28af891
9503
9504commit a5e2ad88acff2b7d131ee6d5dc5d339b0f8c6a6d
9505Author: djm@openbsd.org <djm@openbsd.org>
9506Date: Sat Jan 19 21:41:53 2019 +0000
9507
9508 upstream: convert session.c to new packet API
9509
9510 with & ok markus@
9511
9512 OpenBSD-Commit-ID: fae817207e23099ddd248960c984f7b7f26ea68e
9513
9514commit 3a00a921590d4c4b7e96df11bb10e6f9253ad45e
9515Author: djm@openbsd.org <djm@openbsd.org>
9516Date: Sat Jan 19 21:41:18 2019 +0000
9517
9518 upstream: convert auth.c to new packet API
9519
9520 with & ok markus@
9521
9522 OpenBSD-Commit-ID: 7e10359f614ff522b52a3f05eec576257794e8e4
9523
9524commit 7ec5cb4d15ed2f2c5c9f5d00e6b361d136fc1e2d
9525Author: djm@openbsd.org <djm@openbsd.org>
9526Date: Sat Jan 19 21:40:48 2019 +0000
9527
9528 upstream: convert serverloop.c to new packet API
9529
9530 with & ok markus@
9531
9532 OpenBSD-Commit-ID: c92dd19b55457541478f95c0d6b318426d86d885
9533
9534commit 64c9598ac05332d1327cbf55334dee4172d216c4
9535Author: djm@openbsd.org <djm@openbsd.org>
9536Date: Sat Jan 19 21:40:21 2019 +0000
9537
9538 upstream: convert the remainder of sshconnect2.c to new packet
9539
9540 API
9541
9542 with & ok markus@
9543
9544 OpenBSD-Commit-ID: 0986d324f2ceb5e8a12ac21c1bb10b3b4b1e0f71
9545
9546commit bc5e1169d101d16e3a5962a928db2bc49a8ef5a3
9547Author: djm@openbsd.org <djm@openbsd.org>
9548Date: Sat Jan 19 21:39:12 2019 +0000
9549
9550 upstream: convert the remainder of clientloop.c to new packet API
9551
9552 with & ok markus@
9553
9554 OpenBSD-Commit-ID: ce2fbbacb86a290f31da1e7bf04cddf2bdae3d1e
9555
9556commit 5ebce136a6105f084db8f0d7ee41981d42daec40
9557Author: Damien Miller <djm@mindrot.org>
9558Date: Sun Jan 20 09:44:53 2019 +1100
9559
9560 upstream: convert auth2.c to new packet API
9561
9562 OpenBSD-Commit-ID: ed831bb95ad228c6791bc18b60ce7a2edef2c999
9563
9564commit 172a592a53ebe8649c4ac0d7946e6c08eb151af6
9565Author: djm@openbsd.org <djm@openbsd.org>
9566Date: Sat Jan 19 21:37:48 2019 +0000
9567
9568 upstream: convert servconf.c to new packet API
9569
9570 with & ok markus@
9571
9572 OpenBSD-Commit-ID: 126553aecca302c9e02fd77e333b9cb217e623b4
9573
9574commit 8cc7a679d29cf6ecccfa08191e688c7f81ef95c2
9575Author: djm@openbsd.org <djm@openbsd.org>
9576Date: Sat Jan 19 21:37:13 2019 +0000
9577
9578 upstream: convert channels.c to new packet API
9579
9580 with & ok markus@
9581
9582 OpenBSD-Commit-ID: 0b8279b56113cbd4011fc91315c0796b63dc862c
9583
9584commit 06232038c794c7dfcb087be0ab0b3e65b09fd396
9585Author: djm@openbsd.org <djm@openbsd.org>
9586Date: Sat Jan 19 21:36:38 2019 +0000
9587
9588 upstream: convert sshconnect.c to new packet API
9589
9590 with & ok markus@
9591
9592 OpenBSD-Commit-ID: 222337cf6c96c347f1022d976fac74b4257c061f
9593
9594commit 25b2ed667216314471bb66752442c55b95792dc3
9595Author: djm@openbsd.org <djm@openbsd.org>
9596Date: Sat Jan 19 21:36:06 2019 +0000
9597
9598 upstream: convert ssh.c to new packet API
9599
9600 with & ok markus@
9601
9602 OpenBSD-Commit-ID: eb146878b24e85c2a09ee171afa6797c166a2e21
9603
9604commit e3128b38623eef2fa8d6e7ae934d3bd08c7e973e
9605Author: djm@openbsd.org <djm@openbsd.org>
9606Date: Sat Jan 19 21:35:25 2019 +0000
9607
9608 upstream: convert mux.c to new packet API
9609
9610 with & ok markus@
9611
9612 OpenBSD-Commit-ID: 4e3893937bae66416e984b282d8f0f800aafd802
9613
9614commit ed1df7226caf3a943a36d580d4d4e9275f8a61ee
9615Author: djm@openbsd.org <djm@openbsd.org>
9616Date: Sat Jan 19 21:34:45 2019 +0000
9617
9618 upstream: convert sshconnect2.c to new packet API
9619
9620 with & ok markus@
9621
9622 OpenBSD-Commit-ID: 1cb869e0d6e03539f943235641ea070cae2ebc58
9623
9624commit 23f22a4aaa923c61ec49a99ebaa383656e87fa40
9625Author: djm@openbsd.org <djm@openbsd.org>
9626Date: Sat Jan 19 21:33:57 2019 +0000
9627
9628 upstream: convert clientloop.c to new packet API
9629
9630 with & ok markus@
9631
9632 OpenBSD-Commit-ID: 497b36500191f452a22abf283aa8d4a9abaee7fa
9633
9634commit ad60b1179c9682ca5aef0b346f99ef68cbbbc4e5
9635Author: djm@openbsd.org <djm@openbsd.org>
9636Date: Sat Jan 19 21:33:13 2019 +0000
9637
9638 upstream: allow sshpkt_fatal() to take a varargs format; we'll
9639
9640 use this to give packet-related fatal error messages more context (esp. the
9641 remote endpoint) ok markus@
9642
9643 OpenBSD-Commit-ID: de57211f9543426b515a8a10a4f481666b2b2a50
9644
9645commit 0fa174ebe129f3d0aeaf4e2d1dd8de745870d0ff
9646Author: djm@openbsd.org <djm@openbsd.org>
9647Date: Sat Jan 19 21:31:32 2019 +0000
9648
9649 upstream: begin landing remaining refactoring of packet parsing
9650
9651 API, started almost exactly six years ago.
9652
9653 This change stops including the old packet_* API by default and makes
9654 each file that requires the old API include it explicitly. We will
9655 commit file-by-file refactoring to remove the old API in consistent
9656 steps.
9657
9658 with & ok markus@
9659
9660 OpenBSD-Commit-ID: 93c98a6b38f6911fd1ae025a1ec57807fb4d4ef4
9661
9662commit 4ae7f80dfd02f2bde912a67c9f338f61e90fa79f
9663Author: tb@openbsd.org <tb@openbsd.org>
9664Date: Sat Jan 19 04:15:56 2019 +0000
9665
9666 upstream: Print an \r in front of the password prompt so parts of
9667
9668 a password that was entered too early are likely clobbered by the prompt.
9669 Idea from doas.
9670
9671 from and ok djm
9672 "i like it" deraadt
9673
9674 OpenBSD-Commit-ID: 5fb97c68df6d8b09ab37f77bca1d84d799c4084e
9675
9676commit a6258e5dc314c7d504ac9f0fbc3be96475581dbe
9677Author: Darren Tucker <dtucker@dtucker.net>
9678Date: Fri Jan 18 11:09:01 2019 +1100
9679
9680 Add minimal fchownat and fchmodat implementations.
9681
9682 Fixes builds on at least OS X Lion, NetBSD 6 and Solaris 10.
9683
9684commit 091093d25802b87d3b2b09f2c88d9f33e1ae5562
9685Author: Darren Tucker <dtucker@dtucker.net>
9686Date: Fri Jan 18 12:11:42 2019 +1300
9687
9688 Add a minimal implementation of utimensat().
9689
9690 Some systems (eg older OS X) do not have utimensat, so provide minimal
9691 implementation in compat layer. Fixes build on at least El Capitan.
9692
9693commit 609644027dde1f82213699cb6599e584c7efcb75
9694Author: djm@openbsd.org <djm@openbsd.org>
9695Date: Tue Jan 1 22:20:16 2019 +0000
9696
9697 upstream: regress bits for banner processing refactor (this test was
9698
9699 depending on ssh returning a particular error message for banner parsing
9700 failure)
9701
9702 reminded by bluhm@
9703
9704 OpenBSD-Regress-ID: f24fc303d40931157431df589b386abf5e1be575
9705
9706commit f47d72ddad75b93d3cbc781718b0fa9046c03df8
9707Author: djm@openbsd.org <djm@openbsd.org>
9708Date: Thu Jan 17 04:45:09 2019 +0000
9709
9710 upstream: tun_fwd_ifnames variable should b
9711
9712 =?UTF-8?q?e=20extern;=20from=20Hanno=20B=C3=B6ck?=
9713 MIME-Version: 1.0
9714 Content-Type: text/plain; charset=UTF-8
9715 Content-Transfer-Encoding: 8bit
9716
9717 OpenBSD-Commit-ID: d53dede6e521161bf04d39d09947db6253a38271
9718
9719commit 943d0965263cae1c080ce5a9d0b5aa341885e55d
9720Author: djm@openbsd.org <djm@openbsd.org>
9721Date: Thu Jan 17 04:20:53 2019 +0000
9722
9723 upstream: include time.h for time(3)/nanosleep(2); from Ian
9724
9725 McKellar
9726
9727 OpenBSD-Commit-ID: 6412ccd06a88f65b207a1089345f51fa1244ea51
9728
9729commit dbb4dec6d5d671b5e9d67ef02162a610ad052068
9730Author: djm@openbsd.org <djm@openbsd.org>
9731Date: Thu Jan 17 01:50:24 2019 +0000
9732
9733 upstream: many of the global variables in this file can be made static;
9734
9735 patch from Markus Schmidt
9736
9737 OpenBSD-Commit-ID: f3db619f67beb53257b21bac0e92b4fb7d5d5737
9738
9739commit 60d8c84e0887514c99c9ce071965fafaa1c3d34a
9740Author: djm@openbsd.org <djm@openbsd.org>
9741Date: Wed Jan 16 23:23:45 2019 +0000
9742
9743 upstream: Add "-h" flag to sftp chown/chgrp/chmod commands to
9744
9745 request they do not follow symlinks. Requires recently-committed
9746 lsetstat@openssh.com extension on the server side.
9747
9748 ok markus@ dtucker@
9749
9750 OpenBSD-Commit-ID: f93bb3f6f7eb2fb7ef1e59126e72714f1626d604
9751
9752commit dbbc7e0eab7262f34b8e0cd6efecd1c77b905ed0
9753Author: djm@openbsd.org <djm@openbsd.org>
9754Date: Wed Jan 16 23:22:10 2019 +0000
9755
9756 upstream: add support for a "lsetstat@openssh.com" extension. This
9757
9758 replicates the functionality of the existing SSH2_FXP_SETSTAT operation but
9759 does not follow symlinks. Based on a patch from Bert Haverkamp in bz#2067 but
9760 with more attribute modifications supported.
9761
9762 ok markus@ dtucker@
9763
9764 OpenBSD-Commit-ID: f7234f6e90db19655d55d936a115ee4ccb6aaf80
9765
9766commit 4a526941d328fc3d97068c6a4cbd9b71b70fe5e1
9767Author: djm@openbsd.org <djm@openbsd.org>
9768Date: Fri Jan 4 03:27:50 2019 +0000
9769
9770 upstream: eliminate function-static attempt counters for
9771
9772 passwd/kbdint authmethods by moving them to the client authctxt; Patch from
9773 Markus Schmidt, ok markus@
9774
9775 OpenBSD-Commit-ID: 4df4404a5d5416eb056f68e0e2f4fa91ba3b3f7f
9776
9777commit 8a8183474c41bd6cebaa917346b549af2239ba2f
9778Author: djm@openbsd.org <djm@openbsd.org>
9779Date: Fri Jan 4 03:23:00 2019 +0000
9780
9781 upstream: fix memory leak of ciphercontext when rekeying; bz#2942
9782
9783 Patch from Markus Schmidt; ok markus@
9784
9785 OpenBSD-Commit-ID: 7877f1b82e249986f1ef98d0ae76ce987d332bdd
9786
9787commit 5bed70afce0907b6217418d0655724c99b683d93
9788Author: djm@openbsd.org <djm@openbsd.org>
9789Date: Tue Jan 1 23:10:53 2019 +0000
9790
9791 upstream: static on global vars, const on handler tables that contain
9792
9793 function pointers; from Mike Frysinger
9794
9795 OpenBSD-Commit-ID: 7ef2305e50d3caa6326286db43cf2cfaf03960e0
9796
9797commit 007a88b48c97d092ed2f501bbdcb70d9925277be
9798Author: djm@openbsd.org <djm@openbsd.org>
9799Date: Thu Dec 27 23:02:11 2018 +0000
9800
9801 upstream: Request RSA-SHA2 signatures for
9802
9803 rsa-sha2-{256|512}-cert-v01@openssh.com cert algorithms; ok markus@
9804
9805 OpenBSD-Commit-ID: afc6f7ca216ccd821656d1c911d2a3deed685033
9806
9807commit eb347d086c35428c47fe52b34588cbbc9b49d9a6
9808Author: djm@openbsd.org <djm@openbsd.org>
9809Date: Thu Dec 27 03:37:49 2018 +0000
9810
9811 upstream: ssh_packet_set_state() now frees ssh->kex implicitly, so
9812
9813 don't do explicit kex_free() beforehand
9814
9815 OpenBSD-Regress-ID: f2f73bad47f62a2040ccba0a72cadcb12eda49cf
9816
9817commit bb542f0cf6f7511a22a08c492861e256a82376a9
9818Author: tedu@openbsd.org <tedu@openbsd.org>
9819Date: Sat Dec 15 00:50:21 2018 +0000
9820
9821 upstream: remove unused and problematic sudo clean. ok espie
9822
9823 OpenBSD-Regress-ID: ca90c20a15a85b661e13e98b80c10e65cd662f7b
9824
9825commit 0a843d9a0e805f14653a555f5c7a8ba99d62c12d
9826Author: djm@openbsd.org <djm@openbsd.org>
9827Date: Thu Dec 27 03:25:24 2018 +0000
9828
9829 upstream: move client/server SSH-* banners to buffers under
9830
9831 ssh->kex and factor out the banner exchange. This eliminates some common code
9832 from the client and server.
9833
9834 Also be more strict about handling \r characters - these should only
9835 be accepted immediately before \n (pointed out by Jann Horn).
9836
9837 Inspired by a patch from Markus Schmidt.
9838 (lots of) feedback and ok markus@
9839
9840 OpenBSD-Commit-ID: 1cc7885487a6754f63641d7d3279b0941890275b
9841
9842commit 434b587afe41c19391821e7392005068fda76248
9843Author: dtucker@openbsd.org <dtucker@openbsd.org>
9844Date: Fri Dec 7 04:36:09 2018 +0000
9845
9846 upstream: Fix calculation of initial bandwidth limits. Account for
9847
9848 written bytes before the initial timer check so that the first buffer written
9849 is accounted. Set the threshold after which the timer is checked such that
9850 the limit starts being computed as soon as possible, ie after the second
9851 buffer is written. This prevents an initial burst of traffic and provides a
9852 more accurate bandwidth limit. bz#2927, ok djm.
9853
9854 OpenBSD-Commit-ID: ff3ef76e4e43040ec198c2718d5682c36b255cb6
9855
9856commit a6a0788cbbe8dfce2819ee43b09c80725742e21c
9857Author: djm@openbsd.org <djm@openbsd.org>
9858Date: Fri Dec 7 03:39:40 2018 +0000
9859
9860 upstream: only consider the ext-info-c extension during the initial
9861
9862 KEX. It shouldn't be sent in subsequent ones, but if it is present we should
9863 ignore it.
9864
9865 This prevents sshd from sending a SSH_MSG_EXT_INFO for REKEX for buggy
9866 these clients. Reported by Jakub Jelen via bz2929; ok dtucker@
9867
9868 OpenBSD-Commit-ID: 91564118547f7807030ec537480303e2371902f9
9869
9870commit 63bba57a32c5bb6158d57cf4c47022daf89c14a0
9871Author: djm@openbsd.org <djm@openbsd.org>
9872Date: Fri Dec 7 03:33:18 2018 +0000
9873
9874 upstream: fix option letter pasto in previous
9875
9876 OpenBSD-Commit-ID: e26c8bf2f2a808f3c47960e1e490d2990167ec39
9877
9878commit 737e4edd82406595815efadc28ed5161b8b0c01a
9879Author: djm@openbsd.org <djm@openbsd.org>
9880Date: Fri Dec 7 03:32:26 2018 +0000
9881
9882 upstream: mention that the ssh-keygen -F (find host in
9883
9884 authorized_keys) and -R (remove host from authorized_keys) options may accept
9885 either a bare hostname or a [hostname]:port combo. bz#2935
9886
9887 OpenBSD-Commit-ID: 5535cf4ce78375968b0d2cd7aa316fa3eb176780
9888
9889commit 8a22ffaa13391cfe5b40316d938fe0fb931e9296
9890Author: Damien Miller <djm@mindrot.org>
9891Date: Fri Dec 7 15:41:16 2018 +1100
9892
9893 expose $SSH_CONNECTION in the PAM environment
9894
9895 This makes the connection 4-tuple available to PAM modules that
9896 wish to use it in decision-making. bz#2741
9897
9898commit a784fa8c7a7b084d63bae82ccfea902131bb45c5
9899Author: Kevin Adler <kadler@us.ibm.com>
9900Date: Wed Dec 12 22:12:45 2018 -0600
9901
9902 Don't pass loginmsg by address now that it's an sshbuf*
9903
9904 In 120a1ec74, loginmsg was changed from the legacy Buffer type
9905 to struct sshbuf*, but it missed changing calls to
9906 sys_auth_allowed_user and sys_auth_record_login which passed
9907 loginmsg by address. Now that it's a pointer, just pass it directly.
9908
9909 This only affects AIX, unless there are out of tree users.
9910
9911commit 285310b897969a63ef224d39e7cc2b7316d86940
9912Author: djm@openbsd.org <djm@openbsd.org>
9913Date: Fri Dec 7 02:31:20 2018 +0000
9914
9915 upstream: no need to allocate channels_pre/channels_post in
9916
9917 channel_init_channels() as we do it anyway in channel_handler_init() that we
9918 call at the end of the function. Fix from Markus Schmidt via bz#2938
9919
9920 OpenBSD-Commit-ID: 74893638af49e3734f1e33a54af1b7ea533373ed
9921
9922commit 87d6cf1cbc91df6815db8fe0acc7c910bc3d18e4
9923Author: djm@openbsd.org <djm@openbsd.org>
9924Date: Fri Nov 30 02:24:52 2018 +0000
9925
9926 upstream: don't attempt to connect to empty SSH_AUTH_SOCK; bz#293
9927
9928 OpenBSD-Commit-ID: 0e8fc8f19f14b21adef7109e0faa583d87c0e929
9929
9930commit 91b19198c3f604f5eef2c56dbe36f29478243141
9931Author: djm@openbsd.org <djm@openbsd.org>
9932Date: Wed Nov 28 06:00:38 2018 +0000
9933
9934 upstream: don't truncate user or host name in "user@host's
9935
9936 OpenBSD-Commit-ID: e6ca01a8d58004b7f2cac0b1b7ce8f87e425e360
9937
9938commit dd0cf6318d9b4b3533bda1e3bc021b2cd7246b7a
9939Author: jmc@openbsd.org <jmc@openbsd.org>
9940Date: Fri Nov 23 06:58:28 2018 +0000
9941
9942 upstream: tweak previous;
9943
9944 OpenBSD-Commit-ID: 08f096922eb00c98251501c193ff9e83fbb5de4f
9945
9946commit 8a85f5458d1c802471ca899c97f89946f6666e61
9947Author: Darren Tucker <dtucker@dtucker.net>
9948Date: Sun Nov 25 21:44:05 2018 +1100
9949
9950 Include stdio.h for FILE if needed.
9951
9952commit 16fb23f25454991272bfe4598cc05d20fcd25116
9953Author: Darren Tucker <dtucker@dtucker.net>
9954Date: Sun Nov 25 14:05:57 2018 +1100
9955
9956 Reverse order of OpenSSL init functions.
9957
9958 Try the new init function (OPENSSL_init_crypto) before falling back to
9959 the old one (OpenSSL_add_all_algorithms).
9960
9961commit 98f878d2272bf8dff21f2a0265d963c29e33fed2
9962Author: Darren Tucker <dtucker@dtucker.net>
9963Date: Sun Nov 25 14:05:08 2018 +1100
9964
9965 Improve OpenSSL_add_all_algorithms check.
9966
9967 OpenSSL_add_all_algorithms() may be a macro so check for that too.
9968
9969commit 9e34e0c59ab04514f9de9934a772283f7f372afe
9970Author: djm@openbsd.org <djm@openbsd.org>
9971Date: Fri Nov 23 05:08:07 2018 +0000
9972
9973 upstream: add a ssh_config "Match final" predicate
9974
9975 Matches in same pass as "Match canonical" but doesn't require
9976 hostname canonicalisation be enabled. bz#2906 ok markus
9977
9978 OpenBSD-Commit-ID: fba1dfe9f6e0cabcd0e2b3be13f7a434199beffa
9979
9980commit 4da58d58736b065b1182b563d10ad6765d811c6d
9981Author: dtucker@openbsd.org <dtucker@openbsd.org>
9982Date: Fri Nov 23 02:53:57 2018 +0000
9983
9984 upstream: Remove now-unneeded ifdef SIGINFO around handler since it is
9985
9986 now always used for SIGUSR1 even when SIGINFO is not defined. This will make
9987 things simpler in -portable.
9988
9989 OpenBSD-Regress-ID: 4ff0265b335820b0646d37beb93f036ded0dc43f
9990
9991commit c721d5877509875c8515df0215fa1dab862013bc
9992Author: Darren Tucker <dtucker@dtucker.net>
9993Date: Fri Nov 23 14:11:20 2018 +1100
9994
9995 Move RANDOM_SEED_SIZE outside ifdef.
9996
9997 RANDOM_SEED_SIZE is used by both the OpenSSL and non-OpenSSL code
9998 This fixes the build with configureed --without-openssl.
9999
10000commit deb51552c3ce7ce72c8d0232e4f36f2e7c118c7d
10001Author: Darren Tucker <dtucker@dtucker.net>
10002Date: Thu Nov 22 19:59:28 2018 +1100
10003
10004 Resync with OpenBSD by pulling in an ifdef SIGINFO.
10005
10006commit 28c7b2cd050f4416bfcf3869a20e3ea138aa52fe
10007Author: Damien Miller <djm@mindrot.org>
10008Date: Fri Nov 23 10:45:20 2018 +1100
10009
10010 fix configure test for OpenSSL version
10011
10012 square brackets in case statements may be eaten by autoconf.
10013
10014 Report and fix from Filipp Gunbin; tweaked by naddy@
10015
10016commit 42c5ec4b97b6a1bae70f323952d0646af16ce710
10017Author: Damien Miller <djm@mindrot.org>
10018Date: Fri Nov 23 10:40:06 2018 +1100
10019
10020 refactor libcrypto initialisation
10021
10022 Don't call OpenSSL_add_all_algorithms() unless OpenSSL actually
10023 supports it.
10024
10025 Move all libcrypto initialisation to a single function, and call that
10026 from seed_rng() that is called early in each tool's main().
10027
10028 Prompted by patch from Rosen Penev
10029
10030commit 5b60b6c02009547a3e2a99d4886965de2a4719da
10031Author: dtucker@openbsd.org <dtucker@openbsd.org>
10032Date: Thu Nov 22 08:59:11 2018 +0000
10033
10034 upstream: Output info on SIGUSR1 as well as
10035
10036 SIGINFO to resync with portable. (ID sync only).
10037
10038 OpenBSD-Regress-ID: 699d153e2de22dce51a1b270c40a98472d1a1b16
10039
10040commit e4ae345dc75b34fd870c2e8690d831d2c1088eb7
10041Author: dtucker@openbsd.org <dtucker@openbsd.org>
10042Date: Thu Nov 22 08:48:32 2018 +0000
10043
10044 upstream: Append pid to temp files in /var/run and set a cleanup
10045
10046 trap for them. This allows multiple instances of tests to run without
10047 colliding.
10048
10049 OpenBSD-Regress-ID: 57add105ecdfc54752d8003acdd99eb68c3e0b4c
10050
10051commit f72d0f52effca5aa20a193217346615ecd3eed53
10052Author: dtucker@openbsd.org <dtucker@openbsd.org>
10053Date: Wed Oct 31 11:09:27 2018 +0000
10054
10055 upstream: UsePrivilegeSeparation no is deprecated
10056
10057 test "yes" and "sandbox".
10058
10059 OpenBSD-Regress-ID: 80e685ed8990766527dc629b1affc09a75bfe2da
10060
10061commit 35d0e5fefc419bddcbe09d7fc163d8cd3417125b
10062Author: djm@openbsd.org <djm@openbsd.org>
10063Date: Wed Oct 17 23:28:05 2018 +0000
10064
10065 upstream: add some knobs:
10066
10067 UNITTEST_FAST?= no # Skip slow tests (e.g. less intensive fuzzing).
10068 UNITTEST_SLOW?= no # Include slower tests (e.g. more intensive fuzzing).
10069 UNITTEST_VERBOSE?= no # Verbose test output (inc. per-test names).
10070
10071 useful if you want to run the tests as a smoke test to exercise the
10072 functionality without waiting for all the fuzzers to run.
10073
10074 OpenBSD-Regress-ID: e04d82ebec86068198cd903acf1c67563c57315e
10075
10076commit c1941293d9422a14dda372b4c21895e72aa7a063
10077Author: Darren Tucker <dtucker@dtucker.net>
10078Date: Thu Nov 22 15:52:26 2018 +1100
10079
10080 Resync Makefile.inc with upstream.
10081
10082 It's unused in -portable, but having it out of sync makes other syncs
10083 fail to apply.
10084
10085commit 928f1231f65f88cd4c73e6e0edd63d2cf6295d77
10086Author: djm@openbsd.org <djm@openbsd.org>
10087Date: Mon Nov 19 04:12:32 2018 +0000
10088
10089 upstream: silence (to log level debug2) failure messages when
10090
10091 loading the default hostkeys. Hostkeys explicitly specified in the
10092 configuration or on the command-line are still reported as errors, and
10093 failure to load at least one host key remains a fatal error.
10094 MIME-Version: 1.0
10095 Content-Type: text/plain; charset=UTF-8
10096 Content-Transfer-Encoding: 8bit
10097
10098 Based on patch from Dag-Erling Smørgrav via
10099 https://github.com/openssh/openssh-portable/pull/103
10100
10101 ok markus@
10102
10103 OpenBSD-Commit-ID: ffc2e35a75d1008effaf05a5e27425041c27b684
10104
10105commit 7fca94edbe8ca9f879da9fdd2afd959c4180f4c7
10106Author: dtucker@openbsd.org <dtucker@openbsd.org>
10107Date: Sun Nov 18 22:43:29 2018 +0000
10108
10109 upstream: Fix inverted logic for redirecting ProxyCommand stderr to
10110
10111 /dev/null. Fixes mosh in proxycommand mode that was broken by the previous
10112 ProxyCommand change that was reported by matthieu@. ok djm@ danj@
10113
10114 OpenBSD-Commit-ID: c6fc9641bc250221a0a81c6beb2e72d603f8add6
10115
10116commit ccef7c4faf914993b53035cd2b25ce02ab039c9d
10117Author: djm@openbsd.org <djm@openbsd.org>
10118Date: Fri Nov 16 06:17:38 2018 +0000
10119
10120 upstream: redirect stderr of ProxyCommands to /dev/null when ssh is
10121
10122 started with ControlPersist; based on patch from Steffen Prohaska
10123
10124 OpenBSD-Commit-ID: 1bcaa14a03ae80369d31021271ec75dce2597957
10125
10126commit 15182fd96845a03216d7ac5a2cf31c4e77e406e3
10127Author: djm@openbsd.org <djm@openbsd.org>
10128Date: Fri Nov 16 06:10:29 2018 +0000
10129
10130 upstream: make grandparent-parent-child sshbuf chains robust to
10131
10132 use-after-free faults if the ancestors are freed before the descendents.
10133 Nothing in OpenSSH uses this deallocation pattern. Reported by Jann Horn
10134
10135 OpenBSD-Commit-ID: d93501d1d2734245aac802a252b9bb2eccdba0f2
10136
10137commit 2a35862e664afde774d4a72497d394fe7306ccb5
10138Author: djm@openbsd.org <djm@openbsd.org>
10139Date: Fri Nov 16 03:26:01 2018 +0000
10140
10141 upstream: use path_absolute() for pathname checks; from Manoj Ampalam
10142
10143 OpenBSD-Commit-ID: 482ce71a5ea5c5f3bc4d00fd719481a6a584d925
10144
10145commit d0d1dfa55be1c5c0d77ab3096b198a64235f936d
10146Author: Darren Tucker <dtucker@dtucker.net>
10147Date: Fri Nov 16 14:11:44 2018 +1100
10148
10149 Test for OPENSSL_init_crypto before using.
10150
10151 Check for the presence of OPENSSL_init_crypto and all the flags we want
10152 before trying to use it (bz#2931).
10153
10154commit 6010c0303a422a9c5fa8860c061bf7105eb7f8b2
10155Author: djm@openbsd.org <djm@openbsd.org>
10156Date: Fri Nov 16 03:03:10 2018 +0000
10157
10158 upstream: disallow empty incoming filename or ones that refer to the
10159
10160 current directory; based on report/patch from Harry Sintonen
10161
10162 OpenBSD-Commit-ID: f27651b30eaee2df49540ab68d030865c04f6de9
10163
10164commit aaed635e3a401cfcc4cc97f33788179c458901c3
10165Author: djm@openbsd.org <djm@openbsd.org>
10166Date: Fri Nov 16 02:46:20 2018 +0000
10167
10168 upstream: fix bug in client that was keeping a redundant ssh-agent
10169
10170 socket around for the life of the connection; bz#2912; reported by Simon
10171 Tatham; ok dtucker@
10172
10173 OpenBSD-Commit-ID: 4ded588301183d343dce3e8c5fc1398e35058478
10174
10175commit e76135e3007f1564427b2956c628923d8dc2f75a
10176Author: djm@openbsd.org <djm@openbsd.org>
10177Date: Fri Nov 16 02:43:56 2018 +0000
10178
10179 upstream: fix bug in HostbasedAcceptedKeyTypes and
10180
10181 PubkeyAcceptedKeyTypes options. If only RSA-SHA2 siganture types were
10182 specified, then authentication would always fail for RSA keys as the monitor
10183 checks only the base key (not the signature algorithm) type against
10184 *AcceptedKeyTypes. bz#2746; reported by Jakub Jelen; ok dtucker
10185
10186 OpenBSD-Commit-ID: 117bc3dc54578dbdb515a1d3732988cb5b00461b
10187
10188commit 5c1a63562cac0574c226224075b0829a50b48c9d
10189Author: djm@openbsd.org <djm@openbsd.org>
10190Date: Fri Nov 16 02:30:20 2018 +0000
10191
10192 upstream: support a prefix of '@' to suppress echo of sftp batch
10193
10194 commands; bz#2926; ok dtucker@
10195
10196 OpenBSD-Commit-ID: 9d635636bc84aeae796467e059f7634de990a79d
10197
10198commit 90ef45f7aac33eaf55ec344e101548a01e570f29
10199Author: schwarze@openbsd.org <schwarze@openbsd.org>
10200Date: Tue Nov 13 07:22:45 2018 +0000
10201
10202 upstream: fix markup error (missing blank before delimiter); from
10203
10204 Mike Frysinger <vapier at gentoo dot org>
10205
10206 OpenBSD-Commit-ID: 1bc5392f795ca86318d695e0947eaf71a5a4f6d9
10207
10208commit 960e7c672dc106f3b759c081de3edb4d1138b36e
10209Author: djm@openbsd.org <djm@openbsd.org>
10210Date: Fri Nov 9 02:57:58 2018 +0000
10211
10212 upstream: typo in error message; caught by Debian lintian, via
10213
10214 Colin Watson
10215
10216 OpenBSD-Commit-ID: bff614c7bd1f4ca491a84e9b5999f848d0d66758
10217
10218commit 81f1620c836e6c79c0823ba44acca605226a80f1
10219Author: djm@openbsd.org <djm@openbsd.org>
10220Date: Fri Nov 9 02:56:22 2018 +0000
10221
10222 upstream: correct local variable name; from yawang AT microsoft.com
10223
10224 OpenBSD-Commit-ID: a0c228390856a215bb66319c89cb3959d3af8c87
10225
10226commit 1293740e800fa2e5ccd38842a2e4970c6f3b9831
10227Author: dtucker@openbsd.org <dtucker@openbsd.org>
10228Date: Wed Oct 31 11:20:05 2018 +0000
10229
10230 upstream: Import new moduli.
10231
10232 OpenBSD-Commit-ID: c07772f58028fda683ee6abd41c73da3ff70d403
10233
10234commit 46925ae28e53fc9add336a4fcdb7ed4b86c3591c
10235Author: djm@openbsd.org <djm@openbsd.org>
10236Date: Fri Oct 26 01:23:03 2018 +0000
10237
10238 upstream: mention ssh-ed25519-cert-v01@openssh.com in list of cert
10239
10240 key type at start of doc
10241
10242 OpenBSD-Commit-ID: b46b0149256d67f05f2d5d01e160634ed1a67324
10243
10244commit 8d8340e2c215155637fe19cb1a837f71b2d55f7b
10245Author: Darren Tucker <dtucker@dtucker.net>
10246Date: Fri Nov 16 13:32:13 2018 +1100
10247
10248 Remove fallback check for /usr/local/ssl.
10249
10250 If configure could not find a working OpenSSL installation it would
10251 fall back to checking in /usr/local/ssl. This made sense back when
10252 systems did not ship with OpenSSL, but most do and OpenSSL 1.1 doesn't
10253 use that as a default any more. The fallback behaviour also meant
10254 that if you pointed --with-ssl-dir at a specific directory and it
10255 didn't work, it would silently use either the system libs or the ones
10256 in /usr/local/ssl. If you want to use /usr/local/ssl you'll need to
10257 pass configure --with-ssl-dir=/usr/local/ssl. ok djm@
10258
10259commit ce93472134fb22eff73edbcd173a21ae38889331
10260Author: Darren Tucker <dtucker@dtucker.net>
10261Date: Fri Nov 16 12:44:01 2018 +1100
10262
10263 Fix check for OpenSSL 1.0.1 exactly.
10264
10265 Both INSTALL and configure.ac claim OpenSSL >= 1.0.1 is supported; fix
10266 compile-time check for 1.0.1 to match.
10267
10268commit f2970868f86161a22b2c377057fa3891863a692a
10269Author: Darren Tucker <dtucker@dtucker.net>
10270Date: Sun Nov 11 15:58:20 2018 +1100
10271
10272 Improve warnings in cygwin service setup.
10273
10274 bz#2922, patch from vinschen at redhat.com.
10275
10276commit bd2d54fc1eee84bf87158a1277a50e6c8a303339
10277Author: Darren Tucker <dtucker@dtucker.net>
10278Date: Sun Nov 11 15:54:54 2018 +1100
10279
10280 Remove hardcoded service name in cygwin setup.
10281
10282 bz#2922, patch from Christian.Lupien at USherbrooke.ca, sanity check
10283 by vinschen at redhat.com.
10284
10285commit d0153c77bf7964e694f1d26c56c41a571b8e9466
10286Author: Dag-Erling Smørgrav <des@des.no>
10287Date: Tue Oct 9 23:03:40 2018 +0200
10288
10289 AC_CHECK_SIZEOF() no longer needs a second argument.
10290
10291commit 9b47b083ca9d866249ada9f02dbd57c87b13806e
10292Author: Manoj Ampalam <manojamp@microsoft.com>
10293Date: Thu Nov 8 22:41:59 2018 -0800
10294
10295 Fix error message w/out nistp521.
10296
10297 Correct error message when OpenSSL doesn't support certain ECDSA key
10298 lengths.
10299
10300commit 624d19ac2d56fa86a22417c35536caceb3be346f
10301Author: Eneas U de Queiroz <cote2004-github@yahoo.com>
10302Date: Tue Oct 9 16:17:42 2018 -0300
10303
10304 fix compilation with openssl built without ECC
10305
10306 ECDSA code in openssh-compat.h and libressl-api-compat.c needs to be
10307 guarded by OPENSSL_HAS_ECC
10308
10309 Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
10310
10311commit 1801cd11d99d05a66ab5248c0555f55909a355ce
10312Author: Darren Tucker <dtucker@dtucker.net>
10313Date: Thu Nov 8 15:03:11 2018 +1100
10314
10315 Simplify OpenSSL 1.1 function checks.
10316
10317 Replace AC_SEARCH_LIBS checks for OpenSSL 1.1 functions with a single
10318 AC_CHECK_FUNCS. ok djm@
10319
10320commit bc32f118d484e4d71d2a0828fd4eab7e4176c9af
10321Author: Darren Tucker <dtucker@dtucker.net>
10322Date: Mon Nov 5 17:31:24 2018 +1100
10323
10324 Fix pasto for HAVE_EVP_CIPHER_CTX_SET_IV.
10325
10326 Prevents unnecessary redefinition. Patch from mforney at mforney.org.
10327
10328commit 3719df60c66abc4b47200d41f571d67772f293ba
10329Author: Darren Tucker <dtucker@dtucker.net>
10330Date: Wed Oct 31 22:21:03 2018 +1100
10331
10332 Import new moduli.
10333
10334commit 595605d4abede475339d6a1f07a8cc674c11d1c3
10335Author: Darren Tucker <dtucker@dtucker.net>
10336Date: Sun Oct 28 15:18:13 2018 +1100
10337
10338 Update check for minimum OpenSSL version.
10339
10340commit 6ab75aba340d827140d7ba719787aabaf39a0355
10341Author: Darren Tucker <dtucker@dtucker.net>
10342Date: Sun Oct 28 15:16:31 2018 +1100
10343
10344 Update required OpenSSL versions to match current.
10345
10346commit c801b0e38eae99427f37869370151b78f8e15c5d
10347Author: Darren Tucker <dtucker@dtucker.net>
10348Date: Sun Oct 28 14:34:12 2018 +1100
10349
10350 Use detected version functions in openssl compat.
10351
10352 Use detected functions in compat layer instead of guessing based on
10353 versions. Really fixes builds with LibreSSL, not just configure.
10354
10355commit 262d81a259d4aa1507c709ec9d5caa21c7740722
10356Author: Darren Tucker <dtucker@dtucker.net>
10357Date: Sat Oct 27 16:45:59 2018 +1100
10358
10359 Check for the existence of openssl version funcs.
10360
10361 Check for the existence of openssl version functions and use the ones
10362 detected instead of trying to guess based on the int32 version
10363 identifier. Fixes builds with LibreSSL.
10364
10365commit 406a24b25d6a2bdd70cacd16de7e899dcb2a8829
10366Author: Damien Miller <djm@mindrot.org>
10367Date: Fri Oct 26 13:43:28 2018 +1100
10368
10369 fix builds on OpenSSL <= 1.0.x
10370
10371 I thought OpenSSL 1.0.x offered the new-style OpenSSL_version_num() API
10372 to obtain version number, but they don't.
10373
10374commit 859754bdeb41373d372e36b5dc89c547453addb3
10375Author: Damien Miller <djm@mindrot.org>
10376Date: Tue Oct 23 17:10:41 2018 +1100
10377
10378 remove remaining references to SSLeay
10379
10380 Prompted by Rosen Penev
10381
10382commit b9fea45a68946c8dfeace72ad1f6657c18f2a98a
10383Author: Damien Miller <djm@mindrot.org>
10384Date: Tue Oct 23 17:10:35 2018 +1100
10385
10386 regen depend
10387
10388commit a65784c9f9c5d00cf1a0e235090170abc8d07c73
10389Author: djm@openbsd.org <djm@openbsd.org>
10390Date: Tue Oct 23 05:56:35 2018 +0000
10391
10392 upstream: refer to OpenSSL not SSLeay;
10393
10394 we're old, but we don't have to act it
10395
10396 OpenBSD-Commit-ID: 9ca38d11f8ed19e61a55108d1e892d696cee08ec
10397
10398commit c0a35265907533be10ca151ac797f34ae0d68969
10399Author: Damien Miller <djm@mindrot.org>
10400Date: Mon Oct 22 11:22:50 2018 +1100
10401
10402 fix compile for openssl 1.0.x w/ --with-ssl-engine
10403
10404 bz#2921, patch from cotequeiroz
10405
10406commit 31b49525168245abe16ad49d7b7f519786b53a38
10407Author: Darren Tucker <dtucker@dtucker.net>
10408Date: Mon Oct 22 20:05:18 2018 +1100
10409
10410 Include openssl compatibility.
10411
10412 Patch from rosenp at gmail.com via openssh-unix-dev.
10413
10414commit a4fc253f5f44f0e4c47aafe2a17d2c46481d3c04
10415Author: djm@openbsd.org <djm@openbsd.org>
10416Date: Fri Oct 19 03:12:42 2018 +0000
10417
10418 upstream: when printing certificate contents "ssh-keygen -Lf
10419
10420 /path/certificate", include the algorithm that the CA used to sign the cert.
10421
10422 OpenBSD-Commit-ID: 1ea20b5048a851a7a0758dcb9777a211a2c0dddd
10423
10424commit 83b3d99d2b47321b7ebb8db6f6ea04f3808bc069
10425Author: florian@openbsd.org <florian@openbsd.org>
10426Date: Mon Oct 15 11:28:50 2018 +0000
10427
10428 upstream: struct sockaddr_storage is guaranteed to be large enough,
10429
10430 no need to check the size. OK kn, deraadt
10431
10432 OpenBSD-Commit-ID: 0aa56e92eb49c79f495b31a5093109ec5841f439
10433
10434commit aede1c34243a6f7feae2fb2cb686ade5f9be6f3d
10435Author: Damien Miller <djm@mindrot.org>
10436Date: Wed Oct 17 11:01:20 2018 +1100
10437
10438 Require OpenSSL 1.1.x series 1.1.0g or greater
10439
10440 Previous versions have a bug with EVP_CipherInit() when passed a
10441 NULL EVP_CIPHER, per https://github.com/openssl/openssl/pull/4613
10442
10443 ok dtucker@
10444
10445commit 08300c211409c212e010fe2e2f2883e573a04ce2
10446Author: Damien Miller <djm@mindrot.org>
10447Date: Wed Oct 17 08:12:02 2018 +1100
10448
10449 unbreak compilation with --with-ssl-engine
10450
10451 Missing last argument to OPENSSL_init_crypto()
10452
10453commit 1673274aee67ce0eb6f00578b6f3d2bcbd58f937
10454Author: Darren Tucker <dtucker@dtucker.net>
10455Date: Tue Oct 16 14:45:57 2018 +1100
10456
10457 Remove gcc spectre mitigation flags.
10458
10459 Current impementions of the gcc spectre mitigation flags cause
10460 miscompilations when combined with other flags and do not provide much
10461 protection. Found by fweimer at redhat.com, ok djm@
10462
10463commit 4e23deefd7959ef83c73ed9cce574423438f6133
10464Author: Damien Miller <djm@mindrot.org>
10465Date: Tue Oct 16 10:51:52 2018 +1100
10466
10467 Avoid deprecated OPENSSL_config when using 1.1.x
10468
10469 OpenSSL 1.1.x soft-deprecated OPENSSL_config in favour of
10470 OPENSSL_init_crypto; pointed out by Jakub Jelen
10471
10472commit 797cdd9c8468ed1125ce60d590ae3f1397866af4
10473Author: Darren Tucker <dtucker@dtucker.net>
10474Date: Fri Oct 12 16:58:47 2018 +1100
10475
10476 Don't avoid our *sprintf replacements.
10477
10478 Don't let systems with broken printf(3) avoid our replacements
10479 via asprintf(3)/vasprintf(3) calling libc internally. From djm@
10480
10481commit e526127cbd2f8ad88fb41229df0c9b850c722830
10482Author: Darren Tucker <dtucker@dtucker.net>
10483Date: Fri Oct 12 16:43:35 2018 +1100
10484
10485 Check if snprintf understands %zu.
10486
10487 If the platforms snprintf and friends don't understand %zu, use the
10488 compat replacement. Prevents segfaults on those platforms.
10489
10490commit cf39f875191708c5f2f1a3c1c9019f106e74aea3
10491Author: Damien Miller <djm@mindrot.org>
10492Date: Fri Oct 12 09:48:05 2018 +1100
10493
10494 remove stale link, tweak
10495
10496commit a7205e68decf7de2005810853b4ce6b222b65e2a
10497Author: Damien Miller <djm@mindrot.org>
10498Date: Fri Oct 12 09:47:20 2018 +1100
10499
10500 update version numbers ahead of release
10501
10502commit 1a4a9cf80f5b92b9d1dadd0bfa8867c04d195391
10503Author: djm@openbsd.org <djm@openbsd.org>
10504Date: Thu Oct 11 03:48:04 2018 +0000
10505
10506 upstream: don't send new-style rsa-sha2-*-cert-v01@openssh.com names to
10507
10508 older OpenSSH that can't handle them. spotted by Adam Eijdenberg; ok dtucker
10509
10510 OpenBSD-Commit-ID: 662bbc402e3d7c9b6c322806269698106a6ae631
10511
10512commit dc8ddcdf1a95e011c263486c25869bb5bf4e30ec
10513Author: Damien Miller <djm@mindrot.org>
10514Date: Thu Oct 11 13:08:59 2018 +1100
10515
10516 update depends
10517
10518commit 26841ac265603fd2253e6832e03602823dbb4022
10519Author: Damien Miller <djm@mindrot.org>
10520Date: Thu Oct 11 13:02:11 2018 +1100
10521
10522 some more duplicated key algorithm lines
10523
10524 From Adam Eijdenberg
10525
10526commit 5d9d17603bfbb620195a4581025052832b4c4adc
10527Author: Damien Miller <djm@mindrot.org>
10528Date: Thu Oct 11 11:56:36 2018 +1100
10529
10530 fix duplicated algorithm specification lines
10531
10532 Spotted by Adam Eijdenberg
10533
10534commit ebfafd9c7a5b2a7fb515ee95dbe0e44e11d0a663
10535Author: djm@openbsd.org <djm@openbsd.org>
10536Date: Thu Oct 11 00:52:46 2018 +0000
10537
10538 upstream: typo in plain RSA algorithm counterpart names for
10539
10540 certificates; spotted by Adam Eijdenberg; ok dtucker@
10541
10542 OpenBSD-Commit-ID: bfcdeb6f4fc9e7607f5096574c8f118f2e709e00
10543
10544commit c29b111e7d87c2324ff71c80653dd8da168c13b9
10545Author: Damien Miller <djm@mindrot.org>
10546Date: Thu Oct 11 11:29:35 2018 +1100
10547
10548 check pw_passwd != NULL here too
10549
10550 Again, for systems with broken NIS implementations.
10551
10552 Prompted by coolbugcheckers AT gmail.com
10553
10554commit fe8e8f349a553ef4c567acd418aac769a82b7729
10555Author: Damien Miller <djm@mindrot.org>
10556Date: Thu Oct 11 11:03:15 2018 +1100
10557
10558 check for NULL return from shadow_pw()
10559
10560 probably unreachable on this platform; pointed out by
10561 coolbugcheckers AT gmail.com
10562
10563commit acc59cbe7a1fb169e1c3caba65a39bd74d6e030d
10564Author: deraadt@openbsd.org <deraadt@openbsd.org>
10565Date: Wed Oct 10 16:43:49 2018 +0000
10566
10567 upstream: introducing openssh 7.9
10568
10569 OpenBSD-Commit-ID: 42d526a9fe01a40dd299ac58014d3349adf40e25
10570
10571commit 12731158c75c8760a8bea06350eeb3e763fe1a07
10572Author: Damien Miller <djm@mindrot.org>
10573Date: Thu Oct 11 10:29:29 2018 +1100
10574
10575 supply callback to PEM_read_bio_PrivateKey
10576
10577 OpenSSL 1.1.0i has changed the behaviour of their PEM APIs,
10578 so that empty passphrases are interpreted differently. This
10579 probabalistically breaks loading some keys, because the PEM format
10580 is terrible and doesn't include a proper MAC.
10581
10582 Avoid this by providing a basic callback to avoid passing empty
10583 passphrases to OpenSSL in cases where one is required.
10584
10585 Based on patch from Jakub Jelen in bz#2913; ok dtucker@
10586
10587commit d1d301a1dd5d6cc3a9ed93ab7ab09dda4cb456e0
10588Author: Damien Miller <djm@mindrot.org>
10589Date: Wed Oct 10 14:57:00 2018 +1100
10590
10591 in pick_salt() avoid dereference of NULL passwords
10592
10593 Apparently some NIS implementations can leave pw->pw_passwd (or the
10594 shadow equivalent) NULL.
10595
10596 bz#2909; based on patch from Todd Eigenschink
10597
10598commit edbb6febccee084d212fdc0cb05b40cb1c646ab1
10599Author: djm@openbsd.org <djm@openbsd.org>
10600Date: Tue Oct 9 05:42:23 2018 +0000
10601
10602 upstream: Treat all PEM_read_bio_PrivateKey() errors when a passphrase
10603
10604 is specified as "incorrect passphrase" instead of trying to choose between
10605 that and "invalid format".
10606
10607 libcrypto can return ASN1 parsing errors rather than the expected
10608 decrypt error in certain infrequent cases when trying to decrypt/parse
10609 PEM private keys when supplied with an invalid passphrase.
10610
10611 Report and repro recipe from Thomas Deutschmann in bz#2901
10612
10613 ok markus@
10614
10615 OpenBSD-Commit-ID: b1d4cd92395f9743f81c0d23aab2524109580870
10616
10617commit 2581333d564d8697837729b3d07d45738eaf5a54
10618Author: naddy@openbsd.org <naddy@openbsd.org>
10619Date: Fri Oct 5 14:26:09 2018 +0000
10620
10621 upstream: Support using service names for port numbers.
10622
10623 * Try to resolve a port specification with getservbyname(3) if a
10624 numeric conversion fails.
10625 * Make the "Port" option in ssh_config handle its argument as a
10626 port rather than a plain integer.
10627
10628 ok dtucker@ deraadt@
10629
10630 OpenBSD-Commit-ID: e7f03633133205ab3dfbc67f9df7475fabae660d
10631
10632commit e0d6501e86734c48c8c503f81e1c0926e98c5c4c
10633Author: djm@openbsd.org <djm@openbsd.org>
10634Date: Thu Oct 4 07:47:35 2018 +0000
10635
10636 upstream: when the peer sends a channel-close message, make sure we
10637
10638 close the local extended read fd (stderr) along with the regular read fd
10639 (stdout). Avoids weird stuck processed in multiplexing mode.
10640
10641 Report and analysis by Nelson Elhage and Geoffrey Thomas in bz#2863
10642
10643 ok dtucker@ markus@
10644
10645 OpenBSD-Commit-ID: a48a2467fe938de4de69d2e7193d5fa701f12ae9
10646
10647commit 6f1aabb128246f445e33b8844fad3de9cb1d18cb
10648Author: djm@openbsd.org <djm@openbsd.org>
10649Date: Thu Oct 4 01:04:52 2018 +0000
10650
10651 upstream: factor out channel status formatting from
10652
10653 channel_open_message() so we can use it in other debug messages
10654
10655 OpenBSD-Commit-ID: 9c3903ca28fcabad57f566c9d0045b41ab7d52ba
10656
10657commit f1dd179e122bdfdb7ca3072d9603607740efda05
10658Author: djm@openbsd.org <djm@openbsd.org>
10659Date: Thu Oct 4 00:10:11 2018 +0000
10660
10661 upstream: include a little more information about the status and
10662
10663 disposition of channel's extended (stderr) fd; makes debugging some things a
10664 bit easier. No behaviour change.
10665
10666 OpenBSD-Commit-ID: 483eb6467dc7d5dbca8eb109c453e7a43075f7ce
10667
10668commit 2d1428b11c8b6f616f070f2ecedce12328526944
10669Author: djm@openbsd.org <djm@openbsd.org>
10670Date: Thu Oct 4 00:04:41 2018 +0000
10671
10672 upstream: explicit_bzero here to be consistent with other kex*.c;
10673
10674 report from coolbugcheckers AT gmail.com
10675
10676 OpenBSD-Commit-ID: a90f146c5b5f5b1408700395e394f70b440856cb
10677
10678commit 5eff5b858e717e901e6af6596306a114de9f79f2
10679Author: djm@openbsd.org <djm@openbsd.org>
10680Date: Wed Oct 3 06:38:35 2018 +0000
10681
10682 upstream: Allow ssh_config IdentityAgent directive to accept
10683
10684 environment variable names as well as explicit paths. ok dtucker@
10685
10686 OpenBSD-Commit-ID: 2f0996e103876c53d8c9dd51dcce9889d700767b
10687
10688commit a46ac4d86b25414d78b632e8173578b37e5f8a83
10689Author: djm@openbsd.org <djm@openbsd.org>
10690Date: Tue Oct 2 12:51:58 2018 +0000
10691
10692 upstream: mention INFO@openssh.com for sending SIGINFO
10693
10694 OpenBSD-Commit-ID: 132471eeb0df658210afd27852fe65131b26e900
10695
10696commit ff3a411cae0b484274b7900ef52ff4dad3e12876
10697Author: Damien Miller <djm@mindrot.org>
10698Date: Tue Oct 2 22:49:40 2018 +1000
10699
10700 only support SIGINFO on systems with SIGINFO
10701
10702commit cd98925c6405e972dc9f211afc7e75e838abe81c
10703Author: djm@openbsd.org <djm@openbsd.org>
10704Date: Tue Oct 2 12:40:07 2018 +0000
10705
10706 upstream: Add server support for signalling sessions via the SSH
10707
10708 channel/ session protocol. Signalling is only supported to sesssions that are
10709 not subsystems and were not started with a forced command.
10710
10711 Long requested in bz#1424
10712
10713 Based on a patch from markus@ and reworked by dtucker@;
10714 ok markus@ dtucker@
10715
10716 OpenBSD-Commit-ID: 4bea826f575862eaac569c4bedd1056a268be1c3
10717
10718commit dba50258333f2604a87848762af07ba2cc40407a
10719Author: djm@openbsd.org <djm@openbsd.org>
10720Date: Wed Sep 26 07:32:44 2018 +0000
10721
10722 upstream: remove big ugly TODO comment from start of file. Some of
10723
10724 the mentioned tasks are obsolete and, of the remainder, most are already
10725 captured in PROTOCOL.mux where they better belong
10726
10727 OpenBSD-Commit-ID: 16d9d76dee42a5bb651c9d6740f7f0ef68aeb407
10728
10729commit 92b61a38ee9b765f5049f03cd1143e13f3878905
10730Author: djm@openbsd.org <djm@openbsd.org>
10731Date: Wed Sep 26 07:30:05 2018 +0000
10732
10733 upstream: Document mux proxy mode; added by Markus in openssh-7.4
10734
10735 Also add a little bit of information about the overall packet format
10736
10737 OpenBSD-Commit-ID: bdb6f6ea8580ef96792e270cae7857786ad84a95
10738
10739commit 9d883a1ce4f89b175fd77405ff32674620703fb2
10740Author: djm@openbsd.org <djm@openbsd.org>
10741Date: Wed Sep 26 01:48:57 2018 +0000
10742
10743 upstream: s/process_mux_master/mux_master_process/ in mux master
10744
10745 function names,
10746
10747 Gives better symmetry with the existing mux_client_*() names and makes
10748 it more obvious when a message comes from the master vs client (they
10749 are interleved in ControlMaster=auto mode).
10750
10751 no functional change beyond prefixing a could of log messages with
10752 __func__ where they were previously lacking.
10753
10754 OpenBSD-Commit-ID: b01f7c3fdf92692e1713a822a89dc499333daf75
10755
10756commit c2fa53cd6462da82d3a851dc3a4a3f6b920337c8
10757Author: Darren Tucker <dtucker@dtucker.net>
10758Date: Sat Sep 22 14:41:24 2018 +1000
10759
10760 Remove unused variable in _ssh_compat_fflush.
10761
10762commit d1b3540c21212624af907488960d703c7d987b42
10763Author: Darren Tucker <dtucker@dtucker.net>
10764Date: Thu Sep 20 18:08:43 2018 +1000
10765
10766 Import updated moduli.
10767
10768commit b5e412a8993ad17b9e1141c78408df15d3d987e1
10769Author: djm@openbsd.org <djm@openbsd.org>
10770Date: Fri Sep 21 12:46:22 2018 +0000
10771
10772 upstream: Allow ssh_config ForwardX11Timeout=0 to disable the
10773
10774 timeout and allow X11 connections in untrusted mode indefinitely. ok dtucker@
10775
10776 OpenBSD-Commit-ID: ea1ceed3f540b48e5803f933e59a03b20db10c69
10777
10778commit cb24d9fcc901429d77211f274031653476864ec6
10779Author: djm@openbsd.org <djm@openbsd.org>
10780Date: Fri Sep 21 12:23:17 2018 +0000
10781
10782 upstream: when compiled with GSSAPI support, cache supported method
10783
10784 OIDs by calling ssh_gssapi_prepare_supported_oids() regardless of whether
10785 GSSAPI authentication is enabled in the main config.
10786
10787 This avoids sandbox violations for configurations that enable GSSAPI
10788 auth later, e.g.
10789
10790 Match user djm
10791 GSSAPIAuthentication yes
10792
10793 bz#2107; ok dtucker@
10794
10795 OpenBSD-Commit-ID: a5dd42d87c74e27cfb712b15b0f97ab20e0afd1d
10796
10797commit bbc8af72ba68da014d4de6e21a85eb5123384226
10798Author: djm@openbsd.org <djm@openbsd.org>
10799Date: Fri Sep 21 12:20:12 2018 +0000
10800
10801 upstream: In sshkey_in_file(), ignore keys that are considered for
10802
10803 being too short (i.e. SSH_ERR_KEY_LENGTH). These keys will not be considered
10804 to be "in the file". This allows key revocation lists to contain short keys
10805 without the entire revocation list being considered invalid.
10806
10807 bz#2897; ok dtucker
10808
10809 OpenBSD-Commit-ID: d9f3d857d07194a42ad7e62889a74dc3f9d9924b
10810
10811commit 383a33d160cefbfd1b40fef81f72eadbf9303a66
10812Author: djm@openbsd.org <djm@openbsd.org>
10813Date: Fri Sep 21 03:11:36 2018 +0000
10814
10815 upstream: Treat connections with ProxyJump specified the same as ones
10816
10817 with a ProxyCommand set with regards to hostname canonicalisation (i.e. don't
10818 try to canonicalise the hostname unless CanonicalizeHostname is set to
10819 'always').
10820
10821 Patch from Sven Wegener via bz#2896
10822
10823 OpenBSD-Commit-ID: 527ff501cf98bf65fb4b29ed0cb847dda10f4d37
10824
10825commit 0cbed248ed81584129b67c348dbb801660f25a6a
10826Author: djm@openbsd.org <djm@openbsd.org>
10827Date: Thu Sep 20 23:40:16 2018 +0000
10828
10829 upstream: actually make CASignatureAlgorithms available as a config
10830
10831 option
10832
10833 OpenBSD-Commit-ID: 93fa7ff58314ed7b1ab7744090a6a91232e6ae52
10834
10835commit 62528870c0ec48cd86a37dd7320fb85886c3e6ee
10836Author: dtucker@openbsd.org <dtucker@openbsd.org>
10837Date: Thu Sep 20 08:07:03 2018 +0000
10838
10839 upstream: Import updated moduli.
10840
10841 OpenBSD-Commit-ID: 04431e8e7872f49a2129bf080a6b73c19d576d40
10842
10843commit e6933a2ffa0659d57f3c7b7c457b2c62b2a84613
10844Author: jmc@openbsd.org <jmc@openbsd.org>
10845Date: Thu Sep 20 06:58:48 2018 +0000
10846
10847 upstream: reorder CASignatureAlgorithms, and add them to the
10848
10849 various -o lists; ok djm
10850
10851 OpenBSD-Commit-ID: ecb88baecc3c54988b4d1654446ea033da359288
10852
10853commit aa083aa9624ea7b764d5a81c4c676719a1a3e42b
10854Author: djm@openbsd.org <djm@openbsd.org>
10855Date: Thu Sep 20 03:31:49 2018 +0000
10856
10857 upstream: fix "ssh -Q sig" to show correct signature algorithm list
10858
10859 (it was erroneously showing certificate algorithms); prompted by markus@
10860
10861 OpenBSD-Commit-ID: 1cdee002f2f0c21456979deeb887fc889afb154d
10862
10863commit ecac7e1f7add6b28874959a11f2238d149dc2c07
10864Author: djm@openbsd.org <djm@openbsd.org>
10865Date: Thu Sep 20 03:30:44 2018 +0000
10866
10867 upstream: add CASignatureAlgorithms option for the client, allowing
10868
10869 it to specify which signature algorithms may be used by CAs when signing
10870 certificates. Useful if you want to ban RSA/SHA1; ok markus@
10871
10872 OpenBSD-Commit-ID: 9159e5e9f67504829bf53ff222057307a6e3230f
10873
10874commit 86e5737c39153af134158f24d0cab5827cbd5852
10875Author: djm@openbsd.org <djm@openbsd.org>
10876Date: Thu Sep 20 03:28:06 2018 +0000
10877
10878 upstream: Add sshd_config CASignatureAlgorithms option to allow
10879
10880 control over which signature algorithms a CA may use when signing
10881 certificates. In particular, this allows a sshd to ban certificates signed
10882 with RSA/SHA1.
10883
10884 ok markus@
10885
10886 OpenBSD-Commit-ID: b05c86ef8b52b913ed48d54a9b9c1a7714d96bac
10887
10888commit f80e68ea7d62e2dfafc12f1a60ab544ae4033a0f
10889Author: djm@openbsd.org <djm@openbsd.org>
10890Date: Wed Sep 19 02:03:02 2018 +0000
10891
10892 upstream: Make "ssh-add -q" do what it says on the tin: silence
10893
10894 output from successful operations.
10895
10896 Based on patch from Thijs van Dijk; ok dtucker@ deraadt@
10897
10898 OpenBSD-Commit-ID: c4f754ecc055c10af166116ce7515104aa8522e1
10899
10900commit 5e532320e9e51de720d5f3cc2596e95d29f6e98f
10901Author: millert@openbsd.org <millert@openbsd.org>
10902Date: Mon Sep 17 15:40:14 2018 +0000
10903
10904 upstream: When choosing a prime from the moduli file, avoid
10905
10906 re-using the linenum variable for something that is not a line number to
10907 avoid the confusion that resulted in the bug in rev. 1.64. This also lets us
10908 pass the actual linenum to parse_prime() so the error messages include the
10909 correct line number. OK markus@ some time ago.
10910
10911 OpenBSD-Commit-ID: 4d8e5d3e924d6e8eb70053e3defa23c151a00084
10912
10913commit cce8cbe0ed7d1ba3a575310e0b63c193326ae616
10914Author: Darren Tucker <dtucker@dtucker.net>
10915Date: Sat Sep 15 19:44:06 2018 +1000
10916
10917 Fix openssl-1.1 fallout for --without-openssl.
10918
10919 ok djm@
10920
10921commit 149519b9f201dac755f3cba4789f4d76fecf0ee1
10922Author: Damien Miller <djm@mindrot.org>
10923Date: Sat Sep 15 19:37:48 2018 +1000
10924
10925 add futex(2) syscall to seccomp sandbox
10926
10927 Apparently needed for some glibc/openssl combinations.
10928
10929 Patch from Arkadiusz Miśkiewicz
10930
10931commit 4488ae1a6940af704c4dbf70f55bf2f756a16536
10932Author: Damien Miller <djm@mindrot.org>
10933Date: Sat Sep 15 19:36:55 2018 +1000
10934
10935 really add source for authopt_fuzz this time
10936
10937commit 9201784b4a257c8345fbd740bcbdd70054885707
10938Author: Damien Miller <djm@mindrot.org>
10939Date: Sat Sep 15 19:35:40 2018 +1000
10940
10941 remove accidentally checked-in authopt_fuzz binary
10942
10943commit beb9e522dc7717df08179f9e59f36b361bfa14ab
10944Author: djm@openbsd.org <djm@openbsd.org>
10945Date: Fri Sep 14 05:26:27 2018 +0000
10946
10947 upstream: second try, deals properly with missing and private-only
10948
10949 Use consistent format in debug log for keys readied, offered and
10950 received during public key authentication.
10951
10952 This makes it a little easier to see what is going on, as each message
10953 now contains (where available) the key filename, its type and fingerprint,
10954 and whether the key is hosted in an agent or a token.
10955
10956 OpenBSD-Commit-ID: f1c6a8e9cfc4e108c359db77f24f9a40e1e25ea7
10957
10958commit 6bc5a24ac867bfdc3ed615589d69ac640f51674b
10959Author: Damien Miller <djm@mindrot.org>
10960Date: Fri Sep 14 15:16:34 2018 +1000
10961
10962 fuzzer harness for authorized_keys option parsing
10963
10964commit 6c8b82fc6929b6a9a3f645151b6ec26c5507d9ef
10965Author: djm@openbsd.org <djm@openbsd.org>
10966Date: Fri Sep 14 04:44:04 2018 +0000
10967
10968 upstream: revert following; deals badly with agent keys
10969
10970 revision 1.285
10971 date: 2018/09/14 04:17:12; author: djm; state: Exp; lines: +47 -26; commitid: lflGFcNb2X2HebaK;
10972 Use consistent format in debug log for keys readied, offered and
10973 received during public key authentication.
10974
10975 This makes it a little easier to see what is going on, as each message
10976 now contains the key filename, its type and fingerprint, and whether
10977 the key is hosted in an agent or a token.
10978
10979 OpenBSD-Commit-ID: e496bd004e452d4b051f33ed9ae6a54ab918f56d
10980
10981commit 6da046f9c3374ce7e269ded15d8ff8bc45017301
10982Author: djm@openbsd.org <djm@openbsd.org>
10983Date: Fri Sep 14 04:17:44 2018 +0000
10984
10985 upstream: garbage-collect moribund ssh_new_private() API.
10986
10987 OpenBSD-Commit-ID: 7c05bf13b094093dfa01848a9306c82eb6e95f6c
10988
10989commit 1f24ac5fc05252ceb1c1d0e8cab6a283b883c780
10990Author: djm@openbsd.org <djm@openbsd.org>
10991Date: Fri Sep 14 04:17:12 2018 +0000
10992
10993 upstream: Use consistent format in debug log for keys readied,
10994
10995 offered and received during public key authentication.
10996
10997 This makes it a little easier to see what is going on, as each message
10998 now contains the key filename, its type and fingerprint, and whether
10999 the key is hosted in an agent or a token.
11000
11001 OpenBSD-Commit-ID: 2a01d59285a8a7e01185bb0a43316084b4f06a1f
11002
11003commit 488c9325bb7233e975dbfbf89fa055edc3d3eddc
11004Author: millert@openbsd.org <millert@openbsd.org>
11005Date: Thu Sep 13 15:23:32 2018 +0000
11006
11007 upstream: Fix warnings caused by user_from_uid() and group_from_gid()
11008
11009 now returning const char *.
11010
11011 OpenBSD-Commit-ID: b5fe571ea77cfa7b9035062829ab05eb87d7cc6f
11012
11013commit 0aa1f230846ebce698e52051a107f3127024a05a
11014Author: Damien Miller <djm@mindrot.org>
11015Date: Fri Sep 14 10:31:47 2018 +1000
11016
11017 allow SIGUSR1 as synonym for SIGINFO
11018
11019 Lets users on those unfortunate operating systems that lack SIGINFO
11020 still be able to obtain progress information from unit tests :)
11021
11022commit d64e78526596f098096113fcf148216798c327ff
11023Author: Damien Miller <djm@mindrot.org>
11024Date: Thu Sep 13 19:05:48 2018 +1000
11025
11026 add compat header
11027
11028commit a3fd8074e2e2f06602e25618721f9556c731312c
11029Author: djm@openbsd.org <djm@openbsd.org>
11030Date: Thu Sep 13 09:03:20 2018 +0000
11031
11032 upstream: missed a bit of openssl-1.0.x API in this unittest
11033
11034 OpenBSD-Regress-ID: a73a54d7f7381856a3f3a2d25947bee7a9a5dbc9
11035
11036commit 86e0a9f3d249d5580390daf58e015e68b01cef10
11037Author: djm@openbsd.org <djm@openbsd.org>
11038Date: Thu Sep 13 05:06:51 2018 +0000
11039
11040 upstream: use only openssl-1.1.x API here too
11041
11042 OpenBSD-Regress-ID: ae877064597c349954b1b443769723563cecbc8f
11043
11044commit 48f54b9d12c1c79fba333bc86d455d8f4cda8cfc
11045Author: Damien Miller <djm@mindrot.org>
11046Date: Thu Sep 13 12:13:50 2018 +1000
11047
11048 adapt -portable to OpenSSL 1.1x API
11049
11050 Polyfill missing API with replacement functions extracted from LibreSSL
11051
11052commit 86112951d63d48839f035b5795be62635a463f99
11053Author: Damien Miller <djm@mindrot.org>
11054Date: Thu Sep 13 12:12:42 2018 +1000
11055
11056 forgot to stage these test files in commit d70d061
11057
11058commit 482d23bcacdd3664f21cc82a5135f66fc598275f
11059Author: djm@openbsd.org <djm@openbsd.org>
11060Date: Thu Sep 13 02:08:33 2018 +0000
11061
11062 upstream: hold our collective noses and use the openssl-1.1.x API in
11063
11064 OpenSSH; feedback and ok tb@ jsing@ markus@
11065
11066 OpenBSD-Commit-ID: cacbcac87ce5da0d3ca7ef1b38a6f7fb349e4417
11067
11068commit d70d061828730a56636ab6f1f24fe4a8ccefcfc1
11069Author: djm@openbsd.org <djm@openbsd.org>
11070Date: Wed Sep 12 01:36:45 2018 +0000
11071
11072 upstream: Include certs with multiple RSA signature variants in
11073
11074 test data Ensure that cert->signature_key is populated correctly
11075
11076 OpenBSD-Regress-ID: 56e68f70fe46cb3a193ca207385bdb301fd6603a
11077
11078commit f803b2682992cfededd40c91818b653b5d923ef5
11079Author: djm@openbsd.org <djm@openbsd.org>
11080Date: Wed Sep 12 01:23:48 2018 +0000
11081
11082 upstream: test revocation by explicit hash and by fingerprint
11083
11084 OpenBSD-Regress-ID: 079c18a9ab9663f4af419327c759fc1e2bc78fd8
11085
11086commit 2de78bc7da70e1338b32feeefcc6045cf49efcd4
11087Author: djm@openbsd.org <djm@openbsd.org>
11088Date: Wed Sep 12 01:22:43 2018 +0000
11089
11090 upstream: s/sshkey_demote/sshkey_from_private/g
11091
11092 OpenBSD-Regress-ID: 782bde7407d94a87aa8d1db7c23750e09d4443c4
11093
11094commit 41c115a5ea1cb79a6a3182773c58a23f760e8076
11095Author: Damien Miller <djm@mindrot.org>
11096Date: Wed Sep 12 16:50:01 2018 +1000
11097
11098 delete the correct thing; kexfuzz binary
11099
11100commit f0fcd7e65087db8c2496f13ed39d772f8e38b088
11101Author: djm@openbsd.org <djm@openbsd.org>
11102Date: Wed Sep 12 06:18:59 2018 +0000
11103
11104 upstream: fix edit mistake; spotted by jmc@
11105
11106 OpenBSD-Commit-ID: dd724e1c52c9d6084f4cd260ec7e1b2b138261c6
11107
11108commit 4cc259bac699f4d2a5c52b92230f9e488c88a223
11109Author: djm@openbsd.org <djm@openbsd.org>
11110Date: Wed Sep 12 01:34:02 2018 +0000
11111
11112 upstream: add SSH_ALLOWED_CA_SIGALGS - the default list of
11113
11114 signature algorithms that are allowed for CA signatures. Notably excludes
11115 ssh-dsa.
11116
11117 ok markus@
11118
11119 OpenBSD-Commit-ID: 1628e4181dc8ab71909378eafe5d06159a22deb4
11120
11121commit ba9e788315b1f6a350f910cb2a9e95b2ce584e89
11122Author: djm@openbsd.org <djm@openbsd.org>
11123Date: Wed Sep 12 01:32:54 2018 +0000
11124
11125 upstream: add sshkey_check_cert_sigtype() that checks a
11126
11127 cert->signature_type against a supplied whitelist; ok markus
11128
11129 OpenBSD-Commit-ID: caadb8073292ed7a9535e5adc067d11d356d9302
11130
11131commit a70fd4ad7bd9f2ed223ff635a3d41e483057f23b
11132Author: djm@openbsd.org <djm@openbsd.org>
11133Date: Wed Sep 12 01:31:30 2018 +0000
11134
11135 upstream: add cert->signature_type field and keep it in sync with
11136
11137 certificate signature wrt loading and certification operations; ok markus@
11138
11139 OpenBSD-Commit-ID: e8b8b9f76b66707a0cd926109c4383db8f664df3
11140
11141commit 357128ac48630a9970e3af0e6ff820300a28da47
11142Author: djm@openbsd.org <djm@openbsd.org>
11143Date: Wed Sep 12 01:30:10 2018 +0000
11144
11145 upstream: Add "ssh -Q sig" to allow listing supported signature
11146
11147 algorithms ok markus@
11148
11149 OpenBSD-Commit-ID: 7a8c6eb6c249dc37823ba5081fce64876d10fe2b
11150
11151commit 9405c6214f667be604a820c6823b27d0ea77937d
11152Author: djm@openbsd.org <djm@openbsd.org>
11153Date: Wed Sep 12 01:21:34 2018 +0000
11154
11155 upstream: allow key revocation by SHA256 hash and allow ssh-keygen
11156
11157 to create KRLs using SHA256/base64 key fingerprints; ok markus@
11158
11159 OpenBSD-Commit-ID: a0590fd34e7f1141f2873ab3acc57442560e6a94
11160
11161commit 50e2687ee0941c0ea216d6ffea370ffd2c1f14b9
11162Author: djm@openbsd.org <djm@openbsd.org>
11163Date: Wed Sep 12 01:19:12 2018 +0000
11164
11165 upstream: log certificate fingerprint in authentication
11166
11167 success/failure message (previously we logged only key ID and CA key
11168 fingerprint).
11169
11170 ok markus@
11171
11172 OpenBSD-Commit-ID: a8ef2d172b7f1ddbcce26d6434b2de6d94f6c05d
11173
11174commit de37ca909487d23e5844aca289b3f5e75d3f1e1f
11175Author: dtucker@openbsd.org <dtucker@openbsd.org>
11176Date: Fri Sep 7 04:26:56 2018 +0000
11177
11178 upstream: Add FALLTHROUGH comments where appropriate. Patch from
11179
11180 jjelen at redhat via bz#2687.
11181
11182 OpenBSD-Commit-ID: c48eb457be697a19d6d2950c6d0879f3ccc851d3
11183
11184commit 247766cd3111d5d8c6ea39833a3257ca8fb820f2
11185Author: djm@openbsd.org <djm@openbsd.org>
11186Date: Fri Sep 7 01:42:54 2018 +0000
11187
11188 upstream: ssh -MM requires confirmation for all operations that
11189
11190 change the multiplexing state, not just new sessions.
11191
11192 mention that confirmation is checked via ssh-askpass
11193
11194 OpenBSD-Commit-ID: 0f1b45551ebb9cc5c9a4fe54ad3b23ce90f1f5c2
11195
11196commit db8bb80e3ac1bcb3e1305d846cd98c6b869bf03f
11197Author: mestre@openbsd.org <mestre@openbsd.org>
11198Date: Tue Aug 28 12:25:53 2018 +0000
11199
11200 upstream: fix misplaced parenthesis inside if-clause. it's harmless
11201
11202 and the only issue is showing an unknown error (since it's not defined)
11203 during fatal(), if it ever an error occurs inside that condition.
11204
11205 OK deraadt@ markus@ djm@
11206
11207 OpenBSD-Commit-ID: acb0a8e6936bfbe590504752d01d1d251a7101d8
11208
11209commit 086cc614f550b7d4f100c95e472a6b6b823938ab
11210Author: mestre@openbsd.org <mestre@openbsd.org>
11211Date: Tue Aug 28 12:17:45 2018 +0000
11212
11213 upstream: fix build with DEBUG_PK enabled
11214
11215 OK dtucker@
11216
11217 OpenBSD-Commit-ID: ec1568cf27726e9638a0415481c20c406e7b441c
11218
11219commit 2678833013e97f8b18f09779b7f70bcbf5eb2ab2
11220Author: Darren Tucker <dtucker@dtucker.net>
11221Date: Fri Sep 7 14:41:53 2018 +1000
11222
11223 Handle ngroups>_SC_NGROUPS_MAX.
11224
11225 Based on github pull request #99 from Darren Maffat at Oracle: Solaris'
11226 getgrouplist considers _SC_NGROUPS_MAX more of a guideline and can return
11227 a larger number of groups. In this case, retry getgrouplist with a
11228 larger array and defer allocating groups_byname. ok djm@
11229
11230commit 039bf2a81797b8f3af6058d34005a4896a363221
11231Author: Darren Tucker <dtucker@dtucker.net>
11232Date: Fri Sep 7 14:06:57 2018 +1000
11233
11234 Initial len for the fmt=NULL case.
11235
11236 Patch from jjelen at redhat via bz#2687. (OpenSSH never calls
11237 setproctitle with a null format so len is always initialized).
11238
11239commit ea9c06e11d2e8fb2f4d5e02f8a41e23d2bd31ca9
11240Author: Darren Tucker <dtucker@dtucker.net>
11241Date: Fri Sep 7 14:01:39 2018 +1000
11242
11243 Include stdlib.h.
11244
11245 Patch from jjelen at redhat via bz#2687.
11246
11247commit 9617816dbe73ec4d65075f4d897443f63a97c87f
11248Author: Damien Miller <djm@mindrot.org>
11249Date: Mon Aug 27 13:08:01 2018 +1000
11250
11251 document some more regress control env variables
11252
11253 Specifically SKIP_UNIT, USE_VALGRING and LTESTS. Sort the list of
11254 environment variables.
11255
11256 Based on patch from Jakub Jelen
11257
11258commit 71508e06fab14bc415a79a08f5535ad7bffa93d9
11259Author: Damien Miller <djm@mindrot.org>
11260Date: Thu Aug 23 15:41:42 2018 +1000
11261
11262 shorten temporary SSH_REGRESS_TMP path
11263
11264 Previous path was exceeding max socket length on at least one platform (OSX)
11265
11266commit 26739cf5bdc9030a583b41ae5261dedd862060f0
11267Author: Damien Miller <djm@mindrot.org>
11268Date: Thu Aug 23 13:06:02 2018 +1000
11269
11270 rebuild dependencies
11271
11272commit ff729025c7463cf5d0a8d1ca1823306e48c6d4cf
11273Author: Damien Miller <djm@mindrot.org>
11274Date: Thu Aug 23 13:03:32 2018 +1000
11275
11276 fix path in distclean target
11277
11278 Patch from Jakub Jelen
11279
11280commit 7fef173c28f7462dcd8ee017fdf12b5073f54c02
11281Author: djm@openbsd.org <djm@openbsd.org>
11282Date: Thu Aug 23 03:01:08 2018 +0000
11283
11284 upstream: memleak introduced in r1.83; from Colin Watson
11285
11286 OpenBSD-Commit-ID: 5c019104c280cbd549a264a7217b67665e5732dc
11287
11288commit b8ae02a2896778b8984c7f51566c7f0f56fa8b56
11289Author: schwarze@openbsd.org <schwarze@openbsd.org>
11290Date: Tue Aug 21 13:56:27 2018 +0000
11291
11292 upstream: AIX reports the CODESET as "ISO8859-1" in the POSIX locale.
11293
11294 Treating that as a safe encoding is OK because even when other systems return
11295 that string for real ISO8859-1, it is still safe in the sense that it is
11296 ASCII-compatible and stateless.
11297
11298 Issue reported by Val dot Baranov at duke dot edu. Additional
11299 information provided by Michael dot Felt at felt dot demon dot nl.
11300 Tested by Michael Felt on AIX 6.1 and by Val Baranov on AIX 7.1.
11301 Tweak and OK djm@.
11302
11303 OpenBSD-Commit-ID: 36f1210e0b229817d10eb490d6038f507b8256a7
11304
11305commit bc44ee088ad269d232e514f037c87ada4c2fd3f0
11306Author: Tim Rice <tim@multitalents.net>
11307Date: Tue Aug 21 08:57:24 2018 -0700
11308
11309 modified: openbsd-compat/port-uw.c
11310 remove obsolete and un-needed include
11311
11312commit 829fc28a9c54e3f812ee7248c7a3e31eeb4f0b3a
11313Author: Damien Miller <djm@mindrot.org>
11314Date: Mon Aug 20 15:57:29 2018 +1000
11315
11316 Missing unistd.h for regress/mkdtemp.c
11317
11318commit c8313e492355a368a91799131520d92743d8d16c
11319Author: Damien Miller <djm@mindrot.org>
11320Date: Fri Aug 17 05:45:20 2018 +1000
11321
11322 update version numbers in anticipation of release
11323
11324commit 477b49a34b89f506f4794b35e3c70b3e2e83cd38
11325Author: Corinna Vinschen <vinschen@redhat.com>
11326Date: Mon Aug 13 17:08:51 2018 +0200
11327
11328 configure: work around GCC shortcoming on Cygwin
11329
11330 Cygwin's latest 7.x GCC allows to specify -mfunction-return=thunk
11331 as well as -mindirect-branch=thunk on the command line, albeit
11332 producing invalid code, leading to an error at link stage.
11333
11334 The check in configure.ac only checks if the option is present,
11335 but not if it produces valid code.
11336
11337 This patch fixes it by special-casing Cygwin. Another solution
11338 may be to change these to linker checks.
11339
11340 Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
11341
11342commit b0917945efa374be7648d67dbbaaff323ab39edc
11343Author: Corinna Vinschen <vinschen@redhat.com>
11344Date: Mon Aug 13 17:05:05 2018 +0200
11345
11346 cygwin: add missing stdarg.h include
11347
11348 Further header file standarization in Cygwin uncovered a lazy
11349 indirect include in bsd-cygwin_util.c
11350
11351 Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
11352
11353commit c3903c38b0fd168ab3d925c2b129d1a599593426
11354Author: djm@openbsd.org <djm@openbsd.org>
11355Date: Mon Aug 13 02:41:05 2018 +0000
11356
11357 upstream: revert compat.[ch] section of the following change. It
11358
11359 causes double-free under some circumstances.
11360
11361 --
11362
11363 date: 2018/07/31 03:07:24; author: djm; state: Exp; lines: +33 -18; commitid: f7g4UI8eeOXReTPh;
11364 fix some memory leaks spotted by Coverity via Jakub Jelen in bz#2366
11365 feedback and ok dtucker@
11366
11367 OpenBSD-Commit-ID: 1e77547f60fdb5e2ffe23e2e4733c54d8d2d1137
11368
11369commit 1b9dd4aa15208100fbc3650f33ea052255578282
11370Author: djm@openbsd.org <djm@openbsd.org>
11371Date: Sun Aug 12 20:19:13 2018 +0000
11372
11373 upstream: better diagnosics on alg list assembly errors; ok
11374
11375 deraadt@ markus@
11376
11377 OpenBSD-Commit-ID: 5a557e74b839daf13cc105924d2af06a1560faee
11378
11379commit e36a5f61b0f5bebf6d49c215d228cd99dfe86e28
11380Author: Damien Miller <djm@mindrot.org>
11381Date: Sat Aug 11 18:08:45 2018 -0700
11382
11383 Some AIX fixes; report from Michael Felt
11384
11385commit 2f4766ceefe6657c5ad5fe92d13c411872acae0e
11386Author: dtucker@openbsd.org <dtucker@openbsd.org>
11387Date: Fri Aug 10 01:35:49 2018 +0000
11388
11389 upstream: The script that cooks up PuTTY format host keys does not
11390
11391 understand the new key format so convert back to old format to create the
11392 PuTTY key and remove it once done.
11393
11394 OpenBSD-Regress-ID: 2a449a18846c3a144bc645135b551ba6177e38d3
11395
11396commit e1b26ce504662a5d5b991091228984ccfd25f280
11397Author: djm@openbsd.org <djm@openbsd.org>
11398Date: Fri Aug 10 00:44:01 2018 +0000
11399
11400 upstream: improve
11401
11402 OpenBSD-Commit-ID: 40d839db0977b4e7ac8b647b16d5411d4faf2f60
11403
11404commit 7c712966a3139622f7fb55045368d05de4e6782c
11405Author: djm@openbsd.org <djm@openbsd.org>
11406Date: Fri Aug 10 00:42:29 2018 +0000
11407
11408 upstream: Describe pubkey format, prompted by bz#2853
11409
11410 While I'm here, describe and link to the remaining local PROTOCOL.*
11411 docs that weren't already mentioned (PROTOCOL.key, PROTOCOL.krl and
11412 PROTOCOL.mux)
11413
11414 OpenBSD-Commit-ID: 2a900f9b994ba4d53e7aeb467d44d75829fd1231
11415
11416commit ef100a2c5a8ed83afac0b8f36520815803da227a
11417Author: djm@openbsd.org <djm@openbsd.org>
11418Date: Fri Aug 10 00:27:15 2018 +0000
11419
11420 upstream: fix numbering
11421
11422 OpenBSD-Commit-ID: bc7a1764dff23fa4c5ff0e3379c9c4d5b63c9596
11423
11424commit ed7bd5d93fe14c7bd90febd29b858ea985d14d45
11425Author: djm@openbsd.org <djm@openbsd.org>
11426Date: Wed Aug 8 01:16:01 2018 +0000
11427
11428 upstream: Use new private key format by default. This format is
11429
11430 suported by OpenSSH >= 6.5 (released January 2014), so it should be supported
11431 by most OpenSSH versions in active use.
11432
11433 It is possible to convert new-format private keys to the older
11434 format using "ssh-keygen -f /path/key -pm PEM".
11435
11436 ok deraadt dtucker
11437
11438 OpenBSD-Commit-ID: e3bd4f2509a2103bfa2f710733426af3ad6d8ab8
11439
11440commit 967226a1bdde59ea137e8f0df871854ff7b91366
11441Author: djm@openbsd.org <djm@openbsd.org>
11442Date: Sat Aug 4 00:55:06 2018 +0000
11443
11444 upstream: invalidate dh->priv_key after freeing it in error path;
11445
11446 avoids unlikely double-free later. Reported by Viktor Dukhovni via
11447 https://github.com/openssh/openssh-portable/pull/96 feedback jsing@ tb@
11448
11449 OpenBSD-Commit-ID: e317eb17c3e05500ae851f279ef6486f0457c805
11450
11451commit 74287f5df9966a0648b4a68417451dd18f079ab8
11452Author: djm@openbsd.org <djm@openbsd.org>
11453Date: Tue Jul 31 03:10:27 2018 +0000
11454
11455 upstream: delay bailout for invalid authentic
11456
11457 =?UTF-8?q?ating=20user=20until=20after=20the=20packet=20containing=20the?=
11458 =?UTF-8?q?=20request=20has=20been=20fully=20parsed.=20Reported=20by=20Dar?=
11459 =?UTF-8?q?iusz=20Tytko=20and=20Micha=C5=82=20Sajdak;=20ok=20deraadt?=
11460 MIME-Version: 1.0
11461 Content-Type: text/plain; charset=UTF-8
11462 Content-Transfer-Encoding: 8bit
11463
11464 OpenBSD-Commit-ID: b4891882fbe413f230fe8ac8a37349b03bd0b70d
11465
11466commit 1a66079c0669813306cc69e5776a4acd9fb49015
11467Author: djm@openbsd.org <djm@openbsd.org>
11468Date: Tue Jul 31 03:07:24 2018 +0000
11469
11470 upstream: fix some memory leaks spotted by Coverity via Jakub Jelen
11471
11472 in bz#2366 feedback and ok dtucker@
11473
11474 OpenBSD-Commit-ID: 8402bbae67d578bedbadb0ce68ff7c5a136ef563
11475
11476commit 87f08be054b7eeadbb9cdeb3fb4872be79ccf218
11477Author: Damien Miller <djm@mindrot.org>
11478Date: Fri Jul 20 13:18:28 2018 +1000
11479
11480 Remove support for S/Key
11481
11482 Most people will 1) be using modern multi-factor authentication methods
11483 like TOTP/OATH etc and 2) be getting support for multi-factor
11484 authentication via PAM or BSD Auth.
11485
11486commit 5d14019ba2ff54acbfd20a6b9b96bb860a8c7c31
11487Author: markus@openbsd.org <markus@openbsd.org>
11488Date: Fri Jul 27 12:03:17 2018 +0000
11489
11490 upstream: avoid expensive channel_open_message() calls; ok djm@
11491
11492 OpenBSD-Commit-ID: aea3b5512ad681cd8710367d743e8a753d4425d9
11493
11494commit e655ee04a3cb7999dbf9641b25192353e2b69418
11495Author: dtucker@openbsd.org <dtucker@openbsd.org>
11496Date: Fri Jul 27 05:34:42 2018 +0000
11497
11498 upstream: Now that ssh can't be setuid, remove the
11499
11500 original_real_uid and original_effective_uid globals and replace with calls
11501 to plain getuid(). ok djm@
11502
11503 OpenBSD-Commit-ID: 92561c0cd418d34e6841e20ba09160583e27b68c
11504
11505commit 73ddb25bae4c33a0db361ac13f2e3a60d7c6c4a5
11506Author: dtucker@openbsd.org <dtucker@openbsd.org>
11507Date: Fri Jul 27 05:13:02 2018 +0000
11508
11509 upstream: Remove uid checks from low port binds. Now that ssh
11510
11511 cannot be setuid and sshd always has privsep on, we can remove the uid checks
11512 for low port binds and just let the system do the check. We leave a sanity
11513 check for the !privsep case so long as the code is stil there. with & ok
11514 djm@
11515
11516 OpenBSD-Commit-ID: 9535cfdbd1cd54486fdbedfaee44ce4367ec7ca0
11517
11518commit c12033e102760d043bc5c98e6c8180e4d331b0df
11519Author: dtucker@openbsd.org <dtucker@openbsd.org>
11520Date: Fri Jul 27 03:55:22 2018 +0000
11521
11522 upstream: ssh(1) no longer supports being setuid root. Remove reference
11523
11524 to crc32 which went with protocol 1. Pointed out by deraadt@.
11525
11526 OpenBSD-Commit-ID: f8763c25fd96ed91dd1abdab5667fd2e27e377b6
11527
11528commit 4492e2ec4e1956a277ef507f51d66e5c2aafaaf8
11529Author: Damien Miller <djm@mindrot.org>
11530Date: Fri Jul 27 14:15:28 2018 +1000
11531
11532 correct snprintf truncation check in closefrom()
11533
11534 Truncation cannot happen unless the system has set PATH_MAX to some
11535 nonsensically low value.
11536
11537 bz#2862, patch from Daniel Le
11538
11539commit 149cab325a8599a003364ed833f878449c15f259
11540Author: Darren Tucker <dtucker@dtucker.net>
11541Date: Fri Jul 27 13:46:06 2018 +1000
11542
11543 Include stdarg.h in mkdtemp for va_list.
11544
11545commit 6728f31bdfdc864d192773c32465b1860e23f556
11546Author: deraadt@openbsd.org <deraadt@openbsd.org>
11547Date: Wed Jul 25 17:12:35 2018 +0000
11548
11549 upstream: Don't redefine Makefile choices which come correct from
11550
11551 bsd.*.mk ok markus
11552
11553 OpenBSD-Commit-ID: 814b2f670df75759e1581ecef530980b2b3d7e0f
11554
11555commit 21fd477a855753c1a8e450963669e28e39c3b5d2
11556Author: deraadt@openbsd.org <deraadt@openbsd.org>
11557Date: Wed Jul 25 13:56:23 2018 +0000
11558
11559 upstream: fix indent; Clemens Goessnitzer
11560
11561 OpenBSD-Commit-ID: b5149a6d92b264d35f879d24608087b254857a83
11562
11563commit 8e433c2083db8664c41499ee146448ea7ebe7dbf
11564Author: beck@openbsd.org <beck@openbsd.org>
11565Date: Wed Jul 25 13:10:56 2018 +0000
11566
11567 upstream: Use the caller provided (copied) pwent struct in
11568
11569 load_public_identity_files instead of calling getpwuid() again and discarding
11570 the argument. This prevents a client crash where tilde_expand_filename calls
11571 getpwuid() again before the pwent pointer is used. Issue noticed and reported
11572 by Pierre-Olivier Martel <pom@apple.com> ok djm@ deraadt@
11573
11574 OpenBSD-Commit-ID: a067d74b5b098763736c94cc1368de8ea3f0b157
11575
11576commit e2127abb105ae72b6fda64fff150e6b24b3f1317
11577Author: jmc@openbsd.org <jmc@openbsd.org>
11578Date: Mon Jul 23 19:53:55 2018 +0000
11579
11580 upstream: oops, failed to notice that SEE ALSO got messed up;
11581
11582 OpenBSD-Commit-ID: 61c1306542cefdc6e59ac331751afe961557427d
11583
11584commit ddf1b797c2d26bbbc9d410aa4f484cbe94673587
11585Author: kn@openbsd.org <kn@openbsd.org>
11586Date: Mon Jul 23 19:02:49 2018 +0000
11587
11588 upstream: Point to glob in section 7 for the actual list of special
11589
11590 characters instead the C API in section 3.
11591
11592 OK millert jmc nicm, "the right idea" deraadt
11593
11594 OpenBSD-Commit-ID: a74fd215488c382809e4d041613aeba4a4b1ffc6
11595
11596commit 01c98d9661d0ed6156e8602b650f72eed9fc4d12
11597Author: dtucker@openbsd.org <dtucker@openbsd.org>
11598Date: Sun Jul 22 12:16:59 2018 +0000
11599
11600 upstream: Switch authorized_keys example from ssh-dss to ssh-rsa
11601
11602 since the former is no longer enabled by default. Pointed out by Daniel A.
11603 Maierhofer, ok jmc
11604
11605 OpenBSD-Commit-ID: 6a196cef53d7524e0c9b58cdbc1b5609debaf8c7
11606
11607commit 472269f8fe19343971c2d08f504ab5cbb8234b33
11608Author: djm@openbsd.org <djm@openbsd.org>
11609Date: Fri Jul 20 05:01:10 2018 +0000
11610
11611 upstream: slightly-clearer description for AuthenticationMethods - the
11612
11613 lists have comma-separated elements; bz#2663 from Hans Meier
11614
11615 OpenBSD-Commit-ID: 931c983d0fde4764d0942fb2c2b5017635993b5a
11616
11617commit c59aca8adbdf7f5597084ad360a19bedb3f80970
11618Author: Damien Miller <djm@mindrot.org>
11619Date: Fri Jul 20 14:53:42 2018 +1000
11620
11621 Create control sockets in clean temp directories
11622
11623 Adds a regress/mkdtemp tool and uses it to create empty temp
11624 directories for tests needing control sockets.
11625
11626 Patch from Colin Watson via bz#2660; ok dtucker
11627
11628commit 6ad8648e83e4f4ace37b742a05c2a6b6b872514e
11629Author: djm@openbsd.org <djm@openbsd.org>
11630Date: Fri Jul 20 03:46:34 2018 +0000
11631
11632 upstream: remove unused zlib.h
11633
11634 OpenBSD-Commit-ID: 8d274a9b467c7958df12668b49144056819f79f1
11635
11636commit 3ba6e6883527fe517b6e4a824876e2fe62af22fc
11637Author: dtucker@openbsd.org <dtucker@openbsd.org>
11638Date: Thu Jul 19 23:03:16 2018 +0000
11639
11640 upstream: Fix typo in comment. From Alexandru Iacob via github.
11641
11642 OpenBSD-Commit-ID: eff4ec07c6c8c5483533da43a4dda37d72ef7f1d
11643
11644commit c77bc73c91bc656e343a1961756e09dd1b170820
11645Author: Darren Tucker <dtucker@dtucker.net>
11646Date: Fri Jul 20 13:48:51 2018 +1000
11647
11648 Explicitly include openssl before zlib.
11649
11650 Some versions of OpenSSL have "free_func" in their headers, which zlib
11651 typedefs. Including openssl after zlib (eg via sshkey.h) results in
11652 "syntax error before `free_func'", which this fixes.
11653
11654commit 95d41e90eafcd1286a901e8e361e4a37b98aeb52
11655Author: dtucker@openbsd.org <dtucker@openbsd.org>
11656Date: Thu Jul 19 10:28:47 2018 +0000
11657
11658 upstream: Deprecate UsePrivilegedPort now that support for running
11659
11660 ssh(1) setuid has been removed, remove supporting code and clean up
11661 references to it in the man pages
11662
11663 We have not shipped ssh(1) the setuid bit since 2002. If ayone
11664 really needs to make connections from a low port number this can
11665 be implemented via a small setuid ProxyCommand.
11666
11667 ok markus@ jmc@ djm@
11668
11669 OpenBSD-Commit-ID: d03364610b7123ae4c6792f5274bd147b6de717e
11670
11671commit 258dc8bb07dfb35a46e52b0822a2c5b7027df60a
11672Author: dtucker@openbsd.org <dtucker@openbsd.org>
11673Date: Wed Jul 18 11:34:04 2018 +0000
11674
11675 upstream: Remove support for running ssh(1) setuid and fatal if
11676
11677 attempted. Do not link uidwap.c into ssh any more. Neuters
11678 UsePrivilegedPort, which will be marked as deprecated shortly. ok markus@
11679 djm@
11680
11681 OpenBSD-Commit-ID: c4ba5bf9c096f57a6ed15b713a1d7e9e2e373c42
11682
11683commit ac590760b251506b0a152551abbf8e8d6dc2f527
11684Author: dtucker@openbsd.org <dtucker@openbsd.org>
11685Date: Mon Jul 16 22:25:01 2018 +0000
11686
11687 upstream: Slot 0 in the hostbased key array was previously RSA1,
11688
11689 but that is now gone and the slot is unused so remove it. Remove two
11690 now-unused macros, and add an array bounds check to the two remaining ones
11691 (array is statically sized, so mostly a safety check on future changes). ok
11692 markus@
11693
11694 OpenBSD-Commit-ID: 2e4c0ca6cc1d8daeccead2aa56192a3f9d5e1e7a
11695
11696commit 26efc2f5df0e3bcf6a6bbdd0506fd682d60c2145
11697Author: dtucker@openbsd.org <dtucker@openbsd.org>
11698Date: Mon Jul 16 11:05:41 2018 +0000
11699
11700 upstream: Remove support for loading HostBasedAuthentication keys
11701
11702 directly in ssh(1) and always use ssh-keysign. This removes one of the few
11703 remaining reasons why ssh(1) might be setuid. ok markus@
11704
11705 OpenBSD-Commit-ID: 97f01e1448707129a20d75f86bad5d27c3cf0b7d
11706
11707commit 3eb7f1038d17af7aea3c2c62d1e30cd545607640
11708Author: djm@openbsd.org <djm@openbsd.org>
11709Date: Mon Jul 16 07:06:50 2018 +0000
11710
11711 upstream: keep options.identity_file_userprovided array in sync when we
11712
11713 load keys, fixing some spurious error messages; ok markus
11714
11715 OpenBSD-Commit-ID: c63e3d5200ee2cf9e35bda98de847302566c6a00
11716
11717commit 2f131e1b34502aa19f345e89cabf6fa3fc097f09
11718Author: djm@openbsd.org <djm@openbsd.org>
11719Date: Mon Jul 16 03:09:59 2018 +0000
11720
11721 upstream: memleak in unittest; found by valgrind
11722
11723 OpenBSD-Regress-ID: 168c23b0fb09fc3d0b438628990d3fd9260a8a5e
11724
11725commit de2997a4cf22ca0a524f0e5b451693c583e2fd89
11726Author: djm@openbsd.org <djm@openbsd.org>
11727Date: Mon Jul 16 03:09:13 2018 +0000
11728
11729 upstream: memleaks; found by valgrind
11730
11731 OpenBSD-Commit-ID: 6c3ba22be53e753c899545f771e8399fc93cd844
11732
11733commit 61cc0003eb37fa07603c969c12b7c795caa498f3
11734Author: Darren Tucker <dtucker@dtucker.net>
11735Date: Sat Jul 14 16:49:01 2018 +1000
11736
11737 Undef a few new macros in sys-queue.h.
11738
11739 Prevents macro redefinition warnings on OSX.
11740
11741commit 30a2c213877a54a44dfdffb6ca8db70be5b457e0
11742Author: Darren Tucker <dtucker@dtucker.net>
11743Date: Fri Jul 13 13:40:20 2018 +1000
11744
11745 Include unistd.h for geteuid declaration.
11746
11747commit 1dd32c23f2a85714dfafe2a9cc516971d187caa4
11748Author: Darren Tucker <dtucker@dtucker.net>
11749Date: Fri Jul 13 13:38:10 2018 +1000
11750
11751 Fallout from buffer conversion in AUDIT_EVENTS.
11752
11753 Supply missing "int r" and fix error path for sshbuf_new().
11754
11755commit 7449c178e943e5c4f6c8416a4e41d93b70c11c9e
11756Author: djm@openbsd.org <djm@openbsd.org>
11757Date: Fri Jul 13 02:13:50 2018 +0000
11758
11759 upstream: make this use ssh_proxy rather than starting/stopping a
11760
11761 daemon for each testcase
11762
11763 OpenBSD-Regress-ID: 608b7655ea65b1ba8fff5a13ce9caa60ef0c8166
11764
11765commit dbab02f9208d9baa134cec1d007054ec82b96ca9
11766Author: djm@openbsd.org <djm@openbsd.org>
11767Date: Fri Jul 13 02:13:19 2018 +0000
11768
11769 upstream: fix leaks in unit test; with this, all unit tests are
11770
11771 leak free (as far as valgrind can spot anyway)
11772
11773 OpenBSD-Regress-ID: b824d8b27998365379963440e5d18b95ca03aa17
11774
11775commit 2f6accff5085eb79b0dbe262d8b85ed017d1a51c
11776Author: Damien Miller <djm@mindrot.org>
11777Date: Fri Jul 13 11:39:25 2018 +1000
11778
11779 Enable leak checks for unit tests with valgrind
11780
11781 Leave the leak checking on unconditionally when running with valgrind.
11782 The unit tests are leak-free and I want them to stay that way.
11783
11784commit e46cfbd9db5e907b821bf4fd0184d4dab99815ee
11785Author: Damien Miller <djm@mindrot.org>
11786Date: Fri Jul 13 11:38:59 2018 +1000
11787
11788 increase timeout to match cfgmatch.sh
11789
11790 lets test pass under valgrind (on my workstation at least)
11791
11792commit 6aa1bf475cf3e7a2149acc5a1e80e904749f064c
11793Author: Damien Miller <djm@mindrot.org>
11794Date: Thu Jul 12 14:54:18 2018 +1000
11795
11796 rm regress/misc/kexfuzz/*.o in distclean target
11797
11798commit eef1447ddb559c03725a23d4aa6d03f40e8b0049
11799Author: Damien Miller <djm@mindrot.org>
11800Date: Thu Jul 12 14:49:26 2018 +1000
11801
11802 repair !WITH_OPENSSL build
11803
11804commit 4d3b2f36fd831941d1627ac587faae37b6d3570f
11805Author: Damien Miller <djm@mindrot.org>
11806Date: Thu Jul 12 14:49:14 2018 +1000
11807
11808 missing headers
11809
11810commit 3f420a692b293921216549c1099c2e46ff284eae
11811Author: Darren Tucker <dtucker@dtucker.net>
11812Date: Thu Jul 12 14:57:46 2018 +1000
11813
11814 Remove key.h from portable files too.
11815
11816 Commit 5467fbcb removed key.h so stop including it in portable files
11817 too. Fixes builds on lots of platforms.
11818
11819commit e2c4af311543093f16005c10044f7e06af0426f0
11820Author: djm@openbsd.org <djm@openbsd.org>
11821Date: Thu Jul 12 04:35:25 2018 +0000
11822
11823 upstream: remove prototype to long-gone function
11824
11825 OpenBSD-Commit-ID: 0414642ac7ce01d176b9f359091a66a8bbb640bd
11826
11827commit 394a842e60674bf8ee5130b9f15b01452a0b0285
11828Author: markus@openbsd.org <markus@openbsd.org>
11829Date: Wed Jul 11 18:55:11 2018 +0000
11830
11831 upstream: treat ssh_packet_write_wait() errors as fatal; ok djm@
11832
11833 OpenBSD-Commit-ID: f88ba43c9d54ed2d911218aa8d3f6285430629c3
11834
11835commit 5467fbcb09528ecdcb914f4f2452216c24796790
11836Author: markus@openbsd.org <markus@openbsd.org>
11837Date: Wed Jul 11 18:53:29 2018 +0000
11838
11839 upstream: remove legacy key emulation layer; ok djm@
11840
11841 OpenBSD-Commit-ID: 2b1f9619259e222bbd4fe9a8d3a0973eafb9dd8d
11842
11843commit 5dc4c59d5441a19c99e7945779f7ec9051126c25
11844Author: martijn@openbsd.org <martijn@openbsd.org>
11845Date: Wed Jul 11 08:19:35 2018 +0000
11846
11847 upstream: s/wuth/with/ in comment
11848
11849 OpenBSD-Commit-ID: 9de41468afd75f54a7f47809d2ad664aa577902c
11850
11851commit 1c688801e9dd7f9889fb2a29bc2b6fbfbc35a11f
11852Author: Darren Tucker <dtucker@dtucker.net>
11853Date: Wed Jul 11 12:12:38 2018 +1000
11854
11855 Include stdlib.h for declaration of free.
11856
11857 Fixes build with -Werror on at least Fedora and probably others.
11858
11859commit fccfa239def497615f92ed28acc57cfe63da3666
11860Author: Damien Miller <djm@mindrot.org>
11861Date: Wed Jul 11 10:19:56 2018 +1000
11862
11863 VALGRIND_CHECK_LEAKS logic was backwards :(
11864
11865commit 416287d45fcde0a8e66eee8b99aa73bd58607588
11866Author: Darren Tucker <dtucker@dtucker.net>
11867Date: Wed Jul 11 10:10:26 2018 +1000
11868
11869 Fix sshbuf_new error path in skey.
11870
11871commit 7aab109b8b90a353c1af780524f1ac0d3af47bab
11872Author: Darren Tucker <dtucker@dtucker.net>
11873Date: Wed Jul 11 10:06:18 2018 +1000
11874
11875 Supply missing third arg in skey.
11876
11877 During the change to the new buffer api the third arg to
11878 sshbuf_get_cstring was ommitted. Fixes build when configured with skey.
11879
11880commit 380320bb72cc353a901790ab04b6287fd335dc4a
11881Author: Darren Tucker <dtucker@dtucker.net>
11882Date: Wed Jul 11 10:03:34 2018 +1000
11883
11884 Supply some more missing "int r" in skey
11885
11886commit d20720d373d8563ee737d1a45dc5e0804d622dbc
11887Author: Damien Miller <djm@mindrot.org>
11888Date: Wed Jul 11 09:56:36 2018 +1000
11889
11890 disable valgrind memleak checking by default
11891
11892 Add VALGRIND_CHECK_LEAKS knob to turn it back on.
11893
11894commit 79c9d35018f3a5e30ae437880b669aa8636cd3cd
11895Author: Darren Tucker <dtucker@dtucker.net>
11896Date: Wed Jul 11 09:54:00 2018 +1000
11897
11898 Supply missing "int r" in skey code.
11899
11900commit 984bacfaacbbe31c35191b828fb5b5b2f0362c36
11901Author: sf@openbsd.org <sf@openbsd.org>
11902Date: Tue Jul 10 09:36:58 2018 +0000
11903
11904 upstream: re-remove some pre-auth compression bits
11905
11906 This time, make sure to not remove things that are necessary for
11907 pre-auth compression on the client. Add a comment that pre-auth
11908 compression is still supported in the client.
11909
11910 ok markus@
11911
11912 OpenBSD-Commit-ID: 282c6fec7201f18a5c333bbb68d9339734d2f784
11913
11914commit 120a1ec74e8d9d29f4eb9a27972ddd22351ddef9
11915Author: Damien Miller <djm@mindrot.org>
11916Date: Tue Jul 10 19:39:52 2018 +1000
11917
11918 Adapt portable to legacy buffer API removal
11919
11920commit 0f3958c1e6ffb8ea4ba27e2a97a00326fce23246
11921Author: djm@openbsd.org <djm@openbsd.org>
11922Date: Tue Jul 10 09:13:30 2018 +0000
11923
11924 upstream: kerberos/gssapi fixes for buffer removal
11925
11926 OpenBSD-Commit-ID: 1cdf56fec95801e4563c47f21696f04cd8b60c4c
11927
11928commit c74ae8e7c45f325f3387abd48fa7dfef07a08069
11929Author: djm@openbsd.org <djm@openbsd.org>
11930Date: Tue Jul 10 06:45:29 2018 +0000
11931
11932 upstream: buffer.[ch] and bufaux.c are no more
11933
11934 OpenBSD-Commit-ID: d1a1852284e554f39525eb4d4891b207cfb3d3a0
11935
11936commit a881e5a133d661eca923fb0633a03152ab2b70b2
11937Author: djm@openbsd.org <djm@openbsd.org>
11938Date: Tue Jul 10 06:43:52 2018 +0000
11939
11940 upstream: one mention of Buffer that almost got away :)
11941
11942 OpenBSD-Commit-ID: 30d7c27a90b4544ad5dfacf654595710cd499f02
11943
11944commit 49f47e656b60bcd1d1db98d88105295f4b4e600d
11945Author: markus@openbsd.org <markus@openbsd.org>
11946Date: Mon Jul 9 21:59:10 2018 +0000
11947
11948 upstream: replace cast with call to sshbuf_mutable_ptr(); ok djm@
11949
11950 OpenBSD-Commit-ID: 4dfe9d29fa93d9231645c89084f7217304f7ba29
11951
11952commit cb30cd47041edb03476be1c8ef7bc1f4b69d1555
11953Author: markus@openbsd.org <markus@openbsd.org>
11954Date: Mon Jul 9 21:56:06 2018 +0000
11955
11956 upstream: remove legacy buffer API emulation layer; ok djm@
11957
11958 OpenBSD-Commit-ID: 2dd5dc17cbc23195be4299fa93be2707a0e08ad9
11959
11960commit 235c7c4e3bf046982c2d8242f30aacffa01073d1
11961Author: markus@openbsd.org <markus@openbsd.org>
11962Date: Mon Jul 9 21:53:45 2018 +0000
11963
11964 upstream: sshd: switch monitor to sshbuf API; lots of help & ok
11965
11966 djm@
11967
11968 OpenBSD-Commit-ID: d89bd02d33974fd35ca0b8940d88572227b34a48
11969
11970commit b8d9214d969775e409e1408ecdf0d58fad99b344
11971Author: markus@openbsd.org <markus@openbsd.org>
11972Date: Mon Jul 9 21:37:55 2018 +0000
11973
11974 upstream: sshd: switch GSSAPI to sshbuf API; ok djm@
11975
11976 OpenBSD-Commit-ID: e48449ab4be3f006f7ba33c66241b7d652973e30
11977
11978commit c7d39ac8dc3587c5f05bdd5bcd098eb5c201c0c8
11979Author: markus@openbsd.org <markus@openbsd.org>
11980Date: Mon Jul 9 21:35:50 2018 +0000
11981
11982 upstream: sshd: switch authentication to sshbuf API; ok djm@
11983
11984 OpenBSD-Commit-ID: 880aa06bce4b140781e836bb56bec34873290641
11985
11986commit c3cb7790e9efb14ba74b2d9f543ad593b3d55b31
11987Author: markus@openbsd.org <markus@openbsd.org>
11988Date: Mon Jul 9 21:29:36 2018 +0000
11989
11990 upstream: sshd: switch config to sshbuf API; ok djm@
11991
11992 OpenBSD-Commit-ID: 72b02017bac7feac48c9dceff8355056bea300bd
11993
11994commit 2808d18ca47ad3d251836c555f0e22aaca03d15c
11995Author: markus@openbsd.org <markus@openbsd.org>
11996Date: Mon Jul 9 21:26:02 2018 +0000
11997
11998 upstream: sshd: switch loginmsg to sshbuf API; ok djm@
11999
12000 OpenBSD-Commit-ID: f3cb4e54bff15c593602d95cc43e32ee1a4bac42
12001
12002commit 89dd615b8b531979be63f05f9d5624367c9b28e6
12003Author: markus@openbsd.org <markus@openbsd.org>
12004Date: Mon Jul 9 21:20:26 2018 +0000
12005
12006 upstream: ttymodes: switch to sshbuf API; ok djm@
12007
12008 OpenBSD-Commit-ID: 5df340c5965e822c9da21e19579d08dea3cbe429
12009
12010commit f4608a7065480516ab46214f554e5f853fb7870f
12011Author: markus@openbsd.org <markus@openbsd.org>
12012Date: Mon Jul 9 21:18:10 2018 +0000
12013
12014 upstream: client: switch mux to sshbuf API; with & ok djm@
12015
12016 OpenBSD-Commit-ID: 5948fb98d704f9c4e075b92edda64e0290b5feb2
12017
12018commit cecee2d607099a7bba0a84803e2325d15be4277b
12019Author: markus@openbsd.org <markus@openbsd.org>
12020Date: Mon Jul 9 21:03:30 2018 +0000
12021
12022 upstream: client: switch to sshbuf API; ok djm@
12023
12024 OpenBSD-Commit-ID: 60cb0356114acc7625ab85105f6f6a7cd44a8d05
12025
12026commit ff55f4ad898137d4703e7a2bcc81167dfe8e9324
12027Author: markus@openbsd.org <markus@openbsd.org>
12028Date: Mon Jul 9 20:39:28 2018 +0000
12029
12030 upstream: pkcs11: switch to sshbuf API; ok djm@
12031
12032 OpenBSD-Commit-ID: 98cc4e800f1617c51caf59a6cb3006f14492db79
12033
12034commit 168b46f405d6736960ba7930389eecb9b6710b7e
12035Author: sf@openbsd.org <sf@openbsd.org>
12036Date: Mon Jul 9 13:37:10 2018 +0000
12037
12038 upstream: Revert previous two commits
12039
12040 It turns out we still support pre-auth compression on the client.
12041 Therefore revert the previous two commits:
12042
12043 date: 2018/07/06 09:06:14; author: sf; commitid: yZVYKIRtUZWD9CmE;
12044 Rename COMP_DELAYED to COMP_ZLIB
12045
12046 Only delayed compression is supported nowadays.
12047
12048 ok markus@
12049
12050 date: 2018/07/06 09:05:01; author: sf; commitid: rEGuT5UgI9f6kddP;
12051 Remove leftovers from pre-authentication compression
12052
12053 Support for this has been removed in 2016.
12054 COMP_DELAYED will be renamed in a later commit.
12055
12056 ok markus@
12057
12058 OpenBSD-Commit-ID: cdfef526357e4e1483c86cf599491b2dafb77772
12059
12060commit ab39267fa1243d02b6c330615539fc4b21e17dc4
12061Author: sf@openbsd.org <sf@openbsd.org>
12062Date: Fri Jul 6 09:06:14 2018 +0000
12063
12064 upstream: Rename COMP_DELAYED to COMP_ZLIB
12065
12066 Only delayed compression is supported nowadays.
12067
12068 ok markus@
12069
12070 OpenBSD-Commit-ID: 5b1dbaf3d9a4085aaa10fec0b7a4364396561821
12071
12072commit 95db395d2e56a6f868193aead6cadb2493f036c6
12073Author: sf@openbsd.org <sf@openbsd.org>
12074Date: Fri Jul 6 09:05:01 2018 +0000
12075
12076 upstream: Remove leftovers from pre-authentication compression
12077
12078 Support for this has been removed in 2016.
12079 COMP_DELAYED will be renamed in a later commit.
12080
12081 ok markus@
12082
12083 OpenBSD-Commit-ID: 6a99616c832627157113fcb0cf5a752daf2e6b58
12084
12085commit f28a4d5cd24c4aa177e96b4f96957991e552cb70
12086Author: sf@openbsd.org <sf@openbsd.org>
12087Date: Fri Jul 6 09:03:02 2018 +0000
12088
12089 upstream: Remove unused ssh_packet_start_compression()
12090
12091 ok markus@
12092
12093 OpenBSD-Commit-ID: 9d34cf2f59aca5422021ae2857190578187dc2b4
12094
12095commit 872517ddbb72deaff31d4760f28f2b0a1c16358f
12096Author: Darren Tucker <dtucker@dtucker.net>
12097Date: Fri Jul 6 13:32:02 2018 +1000
12098
12099 Defer setting bufsiz in getdelim.
12100
12101 Do not write to bufsiz until we are sure the malloc has succeeded,
12102 in case any callers rely on it (which they shouldn't). ok djm@
12103
12104commit 3deb56f7190a414dc264e21e087a934fa1847283
12105Author: Darren Tucker <dtucker@dtucker.net>
12106Date: Thu Jul 5 13:32:01 2018 +1000
12107
12108 Fix other callers of read_environment_file.
12109
12110 read_environment_file recently gained an extra argument Some platform
12111 specific code also calls it so add the argument to those too. Fixes
12112 build on Solaris and AIX.
12113
12114commit 314908f451e6b2d4ccf6212ad246fa4619c721d3
12115Author: djm@openbsd.org <djm@openbsd.org>
12116Date: Wed Jul 4 13:51:45 2018 +0000
12117
12118 upstream: deal with API rename: match_filter_list() =>
12119
12120 match_filter_blacklist()
12121
12122 OpenBSD-Regress-ID: 2da342be913efeb51806351af906fab01ba4367f
12123
12124commit 89f54cdf6b9cf1cf5528fd33897f1443913ddfb4
12125Author: djm@openbsd.org <djm@openbsd.org>
12126Date: Wed Jul 4 13:51:12 2018 +0000
12127
12128 upstream: exercise new expansion behaviour of
12129
12130 PubkeyAcceptedKeyTypes and, by proxy, test kex_assemble_names()
12131
12132 ok markus@
12133
12134 OpenBSD-Regress-ID: 292978902e14d5729aa87e492dd166c842f72736
12135
12136commit 187633f24c71564e970681c8906df5a6017dcccf
12137Author: djm@openbsd.org <djm@openbsd.org>
12138Date: Tue Jul 3 13:53:26 2018 +0000
12139
12140 upstream: add a comment that could have saved me 45 minutes of wild
12141
12142 goose chasing
12143
12144 OpenBSD-Regress-ID: d469b29ffadd3402c090e21b792d627d46fa5297
12145
12146commit 312d2f2861a2598ed08587cb6c45c0e98a85408f
12147Author: djm@openbsd.org <djm@openbsd.org>
12148Date: Wed Jul 4 13:49:31 2018 +0000
12149
12150 upstream: repair PubkeyAcceptedKeyTypes (and friends) after RSA
12151
12152 signature work - returns ability to add/remove/specify algorithms by
12153 wildcard.
12154
12155 Algorithm lists are now fully expanded when the server/client configs
12156 are finalised, so errors are reported early and the config dumps
12157 (e.g. "ssh -G ...") now list the actual algorithms selected.
12158
12159 Clarify that, while wildcards are accepted in algorithm lists, they
12160 aren't full pattern-lists that support negation.
12161
12162 (lots of) feedback, ok markus@
12163
12164 OpenBSD-Commit-ID: a8894c5c81f399a002f02ff4fe6b4fa46b1f3207
12165
12166commit 303af5803bd74bf05d375c04e1a83b40c30b2be5
12167Author: djm@openbsd.org <djm@openbsd.org>
12168Date: Tue Jul 3 11:43:49 2018 +0000
12169
12170 upstream: some magic for RSA-SHA2 checks
12171
12172 OpenBSD-Regress-ID: e5a9b11368ff6d86e7b25ad10ebe43359b471cd4
12173
12174commit 7d68e262944c1fff1574600fe0e5e92ec8b398f5
12175Author: Damien Miller <djm@mindrot.org>
12176Date: Tue Jul 3 23:27:11 2018 +1000
12177
12178 depend
12179
12180commit b4d4eda633af433d20232cbf7e855ceac8b83fe5
12181Author: djm@openbsd.org <djm@openbsd.org>
12182Date: Tue Jul 3 13:20:25 2018 +0000
12183
12184 upstream: some finesse to fix RSA-SHA2 certificate authentication
12185
12186 for certs hosted in ssh-agent
12187
12188 OpenBSD-Commit-ID: e5fd5edd726137dda2d020e1cdebc464110a010f
12189
12190commit d78b75df4a57e0f92295f24298e5f2930e71c172
12191Author: djm@openbsd.org <djm@openbsd.org>
12192Date: Tue Jul 3 13:07:58 2018 +0000
12193
12194 upstream: check correct variable; unbreak agent keys
12195
12196 OpenBSD-Commit-ID: c36981fdf1f3ce04966d3310826a3e1e6233d93e
12197
12198commit 2f30300c5e15929d0e34013f38d73e857f445e12
12199Author: djm@openbsd.org <djm@openbsd.org>
12200Date: Tue Jul 3 11:42:12 2018 +0000
12201
12202 upstream: crank version number to 7.8; needed for new compat flag
12203
12204 for prior version; part of RSA-SHA2 strictification, ok markus@
12205
12206 OpenBSD-Commit-ID: 84a11fc0efd2674c050712336b5093f5d408e32b
12207
12208commit 4ba0d54794814ec0de1ec87987d0c3b89379b436
12209Author: djm@openbsd.org <djm@openbsd.org>
12210Date: Tue Jul 3 11:39:54 2018 +0000
12211
12212 upstream: Improve strictness and control over RSA-SHA2 signature
12213
12214 In ssh, when an agent fails to return a RSA-SHA2 signature when
12215 requested and falls back to RSA-SHA1 instead, retry the signature to
12216 ensure that the public key algorithm sent in the SSH_MSG_USERAUTH
12217 matches the one in the signature itself.
12218
12219 In sshd, strictly enforce that the public key algorithm sent in the
12220 SSH_MSG_USERAUTH message matches what appears in the signature.
12221
12222 Make the sshd_config PubkeyAcceptedKeyTypes and
12223 HostbasedAcceptedKeyTypes options control accepted signature algorithms
12224 (previously they selected supported key types). This allows these
12225 options to ban RSA-SHA1 in favour of RSA-SHA2.
12226
12227 Add new signature algorithms "rsa-sha2-256-cert-v01@openssh.com" and
12228 "rsa-sha2-512-cert-v01@openssh.com" to force use of RSA-SHA2 signatures
12229 with certificate keys.
12230
12231 feedback and ok markus@
12232
12233 OpenBSD-Commit-ID: c6e9f6d45eed8962ad502d315d7eaef32c419dde
12234
12235commit 95344c257412b51199ead18d54eaed5bafb75617
12236Author: djm@openbsd.org <djm@openbsd.org>
12237Date: Tue Jul 3 10:59:35 2018 +0000
12238
12239 upstream: allow sshd_config PermitUserEnvironment to accept a
12240
12241 pattern-list of whitelisted environment variable names in addition to yes|no.
12242
12243 bz#1800, feedback and ok markus@
12244
12245 OpenBSD-Commit-ID: 77dc2b468e0bf04b53f333434ba257008a1fdf24
12246
12247commit 6f56fe4b9578b0627667f8bce69d4d938a88324c
12248Author: millert@openbsd.org <millert@openbsd.org>
12249Date: Tue Jun 26 11:23:59 2018 +0000
12250
12251 upstream: Fix "WARNING: line 6 disappeared in /etc/moduli, giving up"
12252
12253 when choosing a prime. An extra increment of linenum snuck in as part of the
12254 conversion to getline(). OK djm@ markus@
12255
12256 OpenBSD-Commit-ID: 0019225cb52ed621b71cd9f19ee2e78e57e3dd38
12257
12258commit 1eee79a11c1b3594f055b01e387c49c9a6e80005
12259Author: dtucker@openbsd.org <dtucker@openbsd.org>
12260Date: Mon Jul 2 14:13:30 2018 +0000
12261
12262 upstream: One ampersand is enough to backgroud an process. OpenBSD
12263
12264 doesn't seem to mind, but some platforms in -portable object to the second.
12265
12266 OpenBSD-Regress-ID: d6c3e404871764343761dc25c3bbe29c2621ff74
12267
12268commit 6301e6c787d4e26bfae1119ab4f747bbcaa94e44
12269Author: Darren Tucker <dtucker@dtucker.net>
12270Date: Mon Jul 2 21:16:58 2018 +1000
12271
12272 Add implementation of getline.
12273
12274 Add getline for the benefit of platforms that don't have it. Sourced
12275 from NetBSD (OpenBSD's implementation is a little too chummy with the
12276 internals of FILE).
12277
12278commit 84623e0037628f9992839063151f7a9f5f13099a
12279Author: djm@openbsd.org <djm@openbsd.org>
12280Date: Tue Jun 26 02:02:36 2018 +0000
12281
12282 upstream: whitespace
12283
12284 OpenBSD-Commit-ID: 9276951caf4daf555f6d262e95720e7f79244572
12285
12286commit 90e51d672711c19a36573be1785caf35019ae7a8
12287Author: djm@openbsd.org <djm@openbsd.org>
12288Date: Mon Jun 25 22:28:33 2018 +0000
12289
12290 upstream: fix NULL dereference in open_listen_match_tcpip()
12291
12292 OpenBSD-Commit-ID: c968c1d29e392352383c0f9681fcc1e93620c4a9
12293
12294commit f535ff922a67d9fcc5ee69d060d1b21c8bb01d14
12295Author: jmc@openbsd.org <jmc@openbsd.org>
12296Date: Tue Jun 19 05:36:57 2018 +0000
12297
12298 upstream: spelling;
12299
12300 OpenBSD-Commit-ID: db542918185243bea17202383a581851736553cc
12301
12302commit 80e199d6175904152aafc5c297096c3e18297691
12303Author: djm@openbsd.org <djm@openbsd.org>
12304Date: Tue Jun 19 03:02:17 2018 +0000
12305
12306 upstream: test PermitListen with bare port numbers
12307
12308 OpenBSD-Regress-ID: 4b50a02dfb0ccaca08247f3877c444126ba901b3
12309
12310commit 87ddd676da0f3abd08b778b12b53b91b670dc93c
12311Author: djm@openbsd.org <djm@openbsd.org>
12312Date: Tue Jun 19 02:59:41 2018 +0000
12313
12314 upstream: allow bare port numbers to appear in PermitListen directives,
12315
12316 e.g.
12317
12318 PermitListen 2222 8080
12319
12320 is equivalent to:
12321
12322 PermitListen *:2222 *:8080
12323
12324 Some bonus manpage improvements, mostly from markus@
12325
12326 "looks fine" markus@
12327
12328 OpenBSD-Commit-ID: 6546b0cc5aab7f53d65ad0a348ca0ae591d6dd24
12329
12330commit 26f96ca10ad0ec5da9b05b99de1e1ccea15a11be
12331Author: djm@openbsd.org <djm@openbsd.org>
12332Date: Fri Jun 15 07:01:11 2018 +0000
12333
12334 upstream: invalidate supplemental group cache used by
12335
12336 temporarily_use_uid() when the target uid differs; could cause failure to
12337 read authorized_keys under some configurations. patch by Jakub Jelen via
12338 bz2873; ok dtucker, markus
12339
12340 OpenBSD-Commit-ID: 48a345f0ee90f6c465a078eb5e89566b23abd8a1
12341
12342commit 89a85d724765b6b82e0135ee5a1181fdcccea9c6
12343Author: djm@openbsd.org <djm@openbsd.org>
12344Date: Sun Jun 10 23:45:41 2018 +0000
12345
12346 upstream: unbreak SendEnv; patch from tb@
12347
12348 OpenBSD-Commit-ID: fc808daced813242563b80976e1478de95940056
12349
12350commit acf4260f0951f89c64e1ebbc4c92f451768871ad
12351Author: jmc@openbsd.org <jmc@openbsd.org>
12352Date: Sat Jun 9 06:36:31 2018 +0000
12353
12354 upstream: sort previous;
12355
12356 OpenBSD-Commit-ID: 27d80d8b8ca99bc33971dee905e8ffd0053ec411
12357
12358commit 1678d4236451060b735cb242d2e26e1ac99f0947
12359Author: djm@openbsd.org <djm@openbsd.org>
12360Date: Sat Jun 9 03:18:11 2018 +0000
12361
12362 upstream: slightly better wording re handing of $TERM, from Jakub
12363
12364 Jelen via bz2386
12365
12366 OpenBSD-Commit-ID: 14bea3f069a93c8be66a7b97794255a91fece964
12367
12368commit 28013759f09ed3ebf7e8335e83a62936bd7a7f47
12369Author: djm@openbsd.org <djm@openbsd.org>
12370Date: Sat Jun 9 03:03:10 2018 +0000
12371
12372 upstream: add a SetEnv directive for sshd_config to allow an
12373
12374 administrator to explicitly specify environment variables set in sessions
12375 started by sshd. These override the default environment and any variables set
12376 by user configuration (PermitUserEnvironment, etc), but not the SSH_*
12377 variables set by sshd itself.
12378
12379 ok markus@
12380
12381 OpenBSD-Commit-ID: b6a96c0001ccd7dd211df6cae9e961c20fd718c0
12382
12383commit 7082bb58a2eb878d23ec674587c742e5e9673c36
12384Author: djm@openbsd.org <djm@openbsd.org>
12385Date: Sat Jun 9 03:01:12 2018 +0000
12386
12387 upstream: add a SetEnv directive to ssh_config that allows setting
12388
12389 environment variables for the remote session (subject to the server accepting
12390 them)
12391
12392 refactor SendEnv to remove the arbitrary limit of variable names.
12393
12394 ok markus@
12395
12396 OpenBSD-Commit-ID: cfbb00d9b0e10c1ffff1d83424351fd961d1f2be
12397
12398commit 3b9798bda15bd3f598f5ef07595d64e23504da91
12399Author: djm@openbsd.org <djm@openbsd.org>
12400Date: Sat Jun 9 02:58:02 2018 +0000
12401
12402 upstream: reorder child environment preparation so that variables
12403
12404 read from ~/.ssh/environment (if enabled) do not override SSH_* variables set
12405 by the server.
12406
12407 OpenBSD-Commit-ID: 59f9d4c213cdcef2ef21f4b4ae006594dcf2aa7a
12408
12409commit 0368889f82f63c82ff8db9f8c944d89e7c657db4
12410Author: djm@openbsd.org <djm@openbsd.org>
12411Date: Fri Jun 8 03:35:36 2018 +0000
12412
12413 upstream: fix incorrect expansion of %i in
12414
12415 load_public_identity_files(); reported by Roumen Petrov
12416
12417 OpenBSD-Commit-ID: a827289e77149b5e0850d72a350c8b0300e7ef25
12418
12419commit 027607fc2db6a0475a3380f8d95c635482714cb0
12420Author: djm@openbsd.org <djm@openbsd.org>
12421Date: Fri Jun 8 01:55:40 2018 +0000
12422
12423 upstream: fix some over-long lines and __func__ up some debug
12424
12425 messages
12426
12427 OpenBSD-Commit-ID: c70a60b4c8207d9f242fc2351941ba50916bb267
12428
12429commit 6ff6fda705bc204456a5fa12518dde6e8790bb02
12430Author: jmc@openbsd.org <jmc@openbsd.org>
12431Date: Thu Jun 7 11:26:14 2018 +0000
12432
12433 upstream: tweak previous;
12434
12435 OpenBSD-Commit-ID: f98f16af10b28e24bcecb806cb71ea994b648fd6
12436
12437commit f2c06ab8dd90582030991f631a2715216bf45e5a
12438Author: Darren Tucker <dtucker@dtucker.net>
12439Date: Fri Jun 8 17:43:36 2018 +1000
12440
12441 Remove ability to override $LD.
12442
12443 Since autoconf always uses $CC to link C programs, allowing users to
12444 override LD caused mismatches between what LD_LINK_IFELSE thought worked
12445 and what ld thought worked. If you do need to do this kind of thing you
12446 need to set a compiler flag such as gcc's -fuse-ld in LDFLAGS.
12447
12448commit e1542a80797b4ea40a91d2896efdcc76a57056d2
12449Author: Darren Tucker <dtucker@dtucker.net>
12450Date: Fri Jun 8 13:55:59 2018 +1000
12451
12452 Better detection of unsupported compiler options.
12453
12454 Should prevent "unsupported -Wl,-z,retpoline" warnings during linking.
12455 ok djm@
12456
12457commit 57379dbd013ad32ee3f9989bf5f5741065428360
12458Author: djm@openbsd.org <djm@openbsd.org>
12459Date: Thu Jun 7 14:29:43 2018 +0000
12460
12461 upstream: test the correct configuration option name
12462
12463 OpenBSD-Regress-ID: 492279ea9f65657f97a970e0e7c7fd0b339fee23
12464
12465commit 6d41815e202fbd6182c79780b6cc90e1ec1c9981
12466Author: djm@openbsd.org <djm@openbsd.org>
12467Date: Thu Jun 7 09:26:42 2018 +0000
12468
12469 upstream: some permitlisten fixes from markus@ that I missed in my
12470
12471 insomnia-fueled commits last night
12472
12473 OpenBSD-Commit-ID: 26f23622e928996086e85b1419cc1c0f136e359c
12474
12475commit 4319f7a868d86d435fa07112fcb6153895d03a7f
12476Author: djm@openbsd.org <djm@openbsd.org>
12477Date: Thu Jun 7 04:46:34 2018 +0000
12478
12479 upstream: permitlisten/PermitListen unit test from Markus
12480
12481 OpenBSD-Regress-ID: ab12eb42f0e14926980441cf7c058a6d1d832ea5
12482
12483commit fa09076410ffc2d34d454145af23c790d728921e
12484Author: djm@openbsd.org <djm@openbsd.org>
12485Date: Thu Jun 7 04:31:51 2018 +0000
12486
12487 upstream: fix regression caused by recent permitlisten option commit:
12488
12489 authorized_keys lines that contained permitopen/permitlisten were being
12490 treated as invalid.
12491
12492 OpenBSD-Commit-ID: 7ef41d63a5a477b405d142dc925b67d9e7aaa31b
12493
12494commit 7f90635216851f6cb4bf3999e98b825f85d604f8
12495Author: markus@openbsd.org <markus@openbsd.org>
12496Date: Wed Jun 6 18:29:18 2018 +0000
12497
12498 upstream: switch config file parsing to getline(3) as this avoids
12499
12500 static limits noted by gerhard@; ok dtucker@, djm@
12501
12502 OpenBSD-Commit-ID: 6d702eabef0fa12e5a1d75c334a8c8b325298b5c
12503
12504commit 392db2bc83215986a91c0b65feb0e40e7619ce7e
12505Author: djm@openbsd.org <djm@openbsd.org>
12506Date: Wed Jun 6 18:25:33 2018 +0000
12507
12508 upstream: regress test for PermitOpen
12509
12510 OpenBSD-Regress-ID: ce8b5f28fc039f09bb297fc4a92319e65982ddaf
12511
12512commit 803d896ef30758135e2f438bdd1a0be27989e018
12513Author: djm@openbsd.org <djm@openbsd.org>
12514Date: Wed Jun 6 18:24:15 2018 +0000
12515
12516 upstream: man bits for permitlisten authorized_keys option
12517
12518 OpenBSD-Commit-ID: 86910af8f781a4ac5980fea125442eb25466dd78
12519
12520commit 04df43208b5b460d7360e1598f876b92a32f5922
12521Author: djm@openbsd.org <djm@openbsd.org>
12522Date: Wed Jun 6 18:24:00 2018 +0000
12523
12524 upstream: man bits for PermitListen
12525
12526 OpenBSD-Commit-ID: 35b200cba4e46a16a4db6a80ef11838ab0fad67c
12527
12528commit 93c06ab6b77514e0447fe4f1d822afcbb2a9be08
12529Author: djm@openbsd.org <djm@openbsd.org>
12530Date: Wed Jun 6 18:23:32 2018 +0000
12531
12532 upstream: permitlisten option for authorized_keys; ok markus@
12533
12534 OpenBSD-Commit-ID: 8650883018d7aa893173d703379e4456a222c672
12535
12536commit 115063a6647007286cc8ca70abfd2a7585f26ccc
12537Author: djm@openbsd.org <djm@openbsd.org>
12538Date: Wed Jun 6 18:22:41 2018 +0000
12539
12540 upstream: Add a PermitListen directive to control which server-side
12541
12542 addresses may be listened on when the client requests remote forwarding (ssh
12543 -R).
12544
12545 This is the converse of the existing PermitOpen directive and this
12546 includes some refactoring to share much of its implementation.
12547
12548 feedback and ok markus@
12549
12550 OpenBSD-Commit-ID: 15a931238c61a3f2ac74ea18a98c933e358e277f
12551
12552commit 7703ae5f5d42eb302ded51705166ff6e19c92892
12553Author: Darren Tucker <dtucker@dtucker.net>
12554Date: Wed Jun 6 16:04:29 2018 +1000
12555
12556 Use ssh-keygen -A to generate missing host keys.
12557
12558 Instead of testing for each specific key type, use ssh-keygen -A to
12559 generate any missing host key types.
12560
12561commit e8d59fef1098e24f408248dc64e5c8efa5d01f3c
12562Author: jmc@openbsd.org <jmc@openbsd.org>
12563Date: Fri Jun 1 06:23:10 2018 +0000
12564
12565 upstream: add missing punctuation after %i in ssh_config.5, and
12566
12567 make the grammatical format in sshd_config.5 match that in ssh_config.5;
12568
12569 OpenBSD-Commit-ID: e325663b9342f3d556e223e5306e0d5fa1a74fa0
12570
12571commit a1f737d6a99314e291a87856122cb4dbaf64c641
12572Author: jmc@openbsd.org <jmc@openbsd.org>
12573Date: Fri Jun 1 05:52:26 2018 +0000
12574
12575 upstream: oops - further adjustment to text neccessary;
12576
12577 OpenBSD-Commit-ID: 23585576c807743112ab956be0fb3c786bdef025
12578
12579commit 294028493471e0bd0c7ffe55dc0c0a67cba6ec41
12580Author: jmc@openbsd.org <jmc@openbsd.org>
12581Date: Fri Jun 1 05:50:18 2018 +0000
12582
12583 upstream: %U needs to be escaped; tweak text;
12584
12585 OpenBSD-Commit-ID: 30887b73ece257273fb619ab6f4e86dc92ddc15e
12586
12587commit e5019da3c5a31e6e729a565f2b886a80c4be96cc
12588Author: dtucker@openbsd.org <dtucker@openbsd.org>
12589Date: Fri Jun 1 04:31:48 2018 +0000
12590
12591 upstream: Apply umask to all incoming files and directories not
12592
12593 just files. This makes sure it gets applied to directories too, and prevents
12594 a race where files get chmodded after creation. bz#2839, ok djm@
12595
12596 OpenBSD-Commit-ID: 3168ee6c7c39093adac4fd71039600cfa296203b
12597
12598commit a1dcafc41c376332493b9385ee39f9754dc145ec
12599Author: djm@openbsd.org <djm@openbsd.org>
12600Date: Fri Jun 1 03:52:37 2018 +0000
12601
12602 upstream: Adapt to extra default verboisity from ssh-keygen when
12603
12604 searching for and hashing known_hosts entries in a single operation
12605 (ssh-keygen -HF ...) Patch from Anton Kremenetsky
12606
12607 OpenBSD-Regress-ID: 519585a4de35c4611285bd6a7272766c229b19dd
12608
12609commit 76f314c75dffd4a55839d50ee23622edad52c168
12610Author: djm@openbsd.org <djm@openbsd.org>
12611Date: Tue May 22 00:22:49 2018 +0000
12612
12613 upstream: Add TEST_SSH_FAIL_FATAL variable, to force all failures
12614
12615 to instantly abort the test. Useful in capturing clean logs for individual
12616 failure cases.
12617
12618 OpenBSD-Regress-ID: feba18cf338c2328b9601bd4093cabdd9baa3af1
12619
12620commit 065c8c055df8d83ae7c92e5e524a579d87668aab
12621Author: dtucker@openbsd.org <dtucker@openbsd.org>
12622Date: Fri May 11 03:51:06 2018 +0000
12623
12624 upstream: Clean up comment.
12625
12626 OpenBSD-Regress-ID: 6adb35f384d447e7dcb9f170d4f0d546d3973e10
12627
12628commit 01b048c8eba3b021701bd0ab26257fc82903cba8
12629Author: djm@openbsd.org <djm@openbsd.org>
12630Date: Fri Jun 1 04:21:29 2018 +0000
12631
12632 upstream: whitespace
12633
12634 OpenBSD-Commit-ID: e5edb5e843ddc9b73a8e46518899be41d5709add
12635
12636commit 854ae209f992465a276de0b5f10ef770510c2418
12637Author: djm@openbsd.org <djm@openbsd.org>
12638Date: Fri Jun 1 04:05:29 2018 +0000
12639
12640 upstream: make ssh_remote_ipaddr() capable of being called after
12641
12642 the ssh->state has been torn down; bz#2773
12643
12644 OpenBSD-Commit-ID: 167f12523613ca3d16d7716a690e7afa307dc7eb
12645
12646commit 3e088aaf236ef35beeef3c9be93fd53700df5861
12647Author: djm@openbsd.org <djm@openbsd.org>
12648Date: Fri Jun 1 03:51:34 2018 +0000
12649
12650 upstream: return correct exit code when searching for and hashing
12651
12652 known_hosts entries in a single operation (ssh-keygen -HF hostname); bz2772
12653 Report and fix from Anton Kremenetsky
12654
12655 OpenBSD-Commit-ID: ac10ca13eb9bb0bc50fcd42ad11c56c317437b58
12656
12657commit 9c935dd9bf05628826ad2495d3e8bdf3d3271c21
12658Author: djm@openbsd.org <djm@openbsd.org>
12659Date: Fri Jun 1 03:33:53 2018 +0000
12660
12661 upstream: make UID available as a %-expansion everywhere that the
12662
12663 username is available currently. In the client this is via %i, in the server
12664 %U (since %i was already used in the client in some places for this, but used
12665 for something different in the server); bz#2870, ok dtucker@
12666
12667 OpenBSD-Commit-ID: c7e912b0213713316cb55db194b3a6415b3d4b95
12668
12669commit d8748b91d1d6c108c0c260ed41fa55f37b9ef34b
12670Author: djm@openbsd.org <djm@openbsd.org>
12671Date: Fri Jun 1 03:11:49 2018 +0000
12672
12673 upstream: prefer argv0 to "ssh" when re-executing ssh for ProxyJump
12674
12675 directive; bz2831, feedback and ok dtucker@
12676
12677 OpenBSD-Commit-ID: 3cec709a131499fbb0c1ea8a0a9e0b0915ce769e