diff options
Diffstat (limited to 'ChangeLog')
-rw-r--r-- | ChangeLog | 932 |
1 files changed, 931 insertions, 1 deletions
@@ -1,3 +1,934 @@ | |||
1 | 20131006 | ||
2 | - (djm) Release OpenSSH-6.7 | ||
3 | |||
4 | 20141003 | ||
5 | - (djm) [sshd_config.5] typo; from Iain Morgan | ||
6 | |||
7 | 20141001 | ||
8 | - (djm) [openbsd-compat/Makefile.in openbsd-compat/kludge-fd_set.c] | ||
9 | [openbsd-compat/openbsd-compat.h] Kludge around bad glibc | ||
10 | _FORTIFY_SOURCE check that doesn't grok heap-allocated fd_sets; | ||
11 | ok dtucker@ | ||
12 | |||
13 | 20140910 | ||
14 | - (djm) [sandbox-seccomp-filter.c] Allow mremap and exit for DietLibc; | ||
15 | patch from Felix von Leitner; ok dtucker | ||
16 | |||
17 | 20140908 | ||
18 | - (dtucker) [INSTALL] Update info about egd. ok djm@ | ||
19 | |||
20 | 20140904 | ||
21 | - (djm) [openbsd-compat/arc4random.c] Zero seed after keying PRNG | ||
22 | |||
23 | 20140903 | ||
24 | - (djm) [defines.h sshbuf.c] Move __predict_true|false to defines.h and | ||
25 | conditionalise to avoid duplicate definition. | ||
26 | - (djm) [contrib/cygwin/ssh-host-config] Fix old code leading to | ||
27 | permissions/ACLs; from Corinna Vinschen | ||
28 | |||
29 | 20140830 | ||
30 | - (djm) [openbsd-compat/openssl-compat.h] add | ||
31 | OPENSSL_[RD]SA_MAX_MODULUS_BITS defines for OpenSSL that lacks them | ||
32 | - (djm) [misc.c] Missing newline between functions | ||
33 | - (djm) [openbsd-compat/openssl-compat.h] add include guard | ||
34 | - (djm) [Makefile.in] Make TEST_SHELL a variable; "good idea" tim@ | ||
35 | |||
36 | 20140827 | ||
37 | - (djm) [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c] | ||
38 | [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] | ||
39 | [regress/unittests/sshkey/common.c] | ||
40 | [regress/unittests/sshkey/test_file.c] | ||
41 | [regress/unittests/sshkey/test_fuzz.c] | ||
42 | [regress/unittests/sshkey/test_sshkey.c] Don't include openssl/ec.h | ||
43 | on !ECC OpenSSL systems | ||
44 | - (djm) [monitor.c sshd.c] SIGXFSZ needs to be ignored in postauth | ||
45 | monitor, not preauth; bz#2263 | ||
46 | - (djm) [openbsd-compat/explicit_bzero.c] implement explicit_bzero() | ||
47 | using memset_s() where possible; improve fallback to indirect bzero | ||
48 | via a volatile pointer to give it more of a chance to avoid being | ||
49 | optimised away. | ||
50 | |||
51 | 20140825 | ||
52 | - (djm) [bufec.c] Skip this file on !ECC OpenSSL | ||
53 | - (djm) [INSTALL] Recommend libcrypto be built -fPIC, mention LibreSSL, | ||
54 | update OpenSSL version requirement. | ||
55 | |||
56 | 20140824 | ||
57 | - (djm) [sftp-server.c] Some systems (e.g. Irix) have prctl() but not | ||
58 | PR_SET_DUMPABLE, so adjust ifdef; reported by Tom Christensen | ||
59 | |||
60 | 20140823 | ||
61 | - (djm) [sshd.c] Ignore SIGXFSZ in preauth monitor child; can explode on | ||
62 | lastlog writing on platforms with high UIDs; bz#2263 | ||
63 | - (djm) [configure.ac] We now require a working vsnprintf everywhere (not | ||
64 | just for systems that lack asprintf); check for it always and extend | ||
65 | test to catch more brokenness. Fixes builds on Solaris <= 9 | ||
66 | |||
67 | 20140822 | ||
68 | - (djm) [configure.ac] include leading zero characters in OpenSSL version | ||
69 | number; fixes test for unsupported versions | ||
70 | - (djm) [sshbuf-getput-crypto.c] Fix compilation when OpenSSL lacks ECC | ||
71 | - (djm) [openbsd-compat/bsd-snprintf.c] Fix compilation failure (prototype/ | ||
72 | definition mismatch) and warning for broken/missing snprintf case. | ||
73 | - (djm) [configure.ac] double braces to appease autoconf | ||
74 | |||
75 | 20140821 | ||
76 | - (djm) [Makefile.in] fix reference to libtest_helper.a in sshkey test too. | ||
77 | - (djm) [key.h] Fix ifdefs for no-ECC OpenSSL | ||
78 | - (djm) [regress/unittests/test_helper/test_helper.c] Fix for systems that | ||
79 | don't set __progname. Diagnosed by Tom Christensen. | ||
80 | |||
81 | 20140820 | ||
82 | - (djm) [configure.ac] Check OpenSSL version is supported at configure time; | ||
83 | suggested by Kevin Brott | ||
84 | - (djm) [Makefile.in] refer to libtest_helper.a by explicit path rather than | ||
85 | -L/-l; fixes linking problems on some platforms | ||
86 | - (djm) [sshkey.h] Fix compilation when OpenSSL lacks ECC | ||
87 | - (djm) [contrib/cygwin/README] Correct build instructions; from Corinna | ||
88 | |||
89 | 20140819 | ||
90 | - (djm) [serverloop.c] Fix syntax error on Cygwin; from Corinna Vinschen | ||
91 | - (djm) [sshbuf.h] Fix compilation on systems without OPENSSL_HAS_ECC. | ||
92 | - (djm) [ssh-dss.c] Include openssl/dsa.h for DSA_SIG | ||
93 | - (djm) [INSTALL contrib/caldera/openssh.spec contrib/cygwin/README] | ||
94 | [contrib/redhat/openssh.spec contrib/suse/openssh.spec] Remove mentions | ||
95 | of TCP wrappers. | ||
96 | |||
97 | 20140811 | ||
98 | - (djm) [myproposal.h] Make curve25519 KEX dependent on | ||
99 | HAVE_EVP_SHA256 instead of OPENSSL_HAS_ECC. | ||
100 | |||
101 | 20140810 | ||
102 | - (djm) [README contrib/caldera/openssh.spec] | ||
103 | [contrib/redhat/openssh.spec contrib/suse/openssh.spec] Update versions | ||
104 | |||
105 | 20140801 | ||
106 | - (djm) [regress/multiplex.sh] Skip test for non-OpenBSD netcat. We need | ||
107 | a better solution, but this will have to do for now. | ||
108 | - (djm) [regress/multiplex.sh] Instruct nc not to quit as soon as stdin | ||
109 | is closed; avoid regress failures when stdin is /dev/null | ||
110 | - (djm) [regress/multiplex.sh] Use -d (detach stdin) flag to disassociate | ||
111 | nc from stdin, it's more portable | ||
112 | |||
113 | 20140730 | ||
114 | - OpenBSD CVS Sync | ||
115 | - millert@cvs.openbsd.org 2014/07/24 22:57:10 | ||
116 | [ssh.1] | ||
117 | Mention UNIX-domain socket forwarding too. OK jmc@ deraadt@ | ||
118 | - dtucker@cvs.openbsd.org 2014/07/25 21:22:03 | ||
119 | [ssh-agent.c] | ||
120 | Clear buffer used for handling messages. This prevents keys being | ||
121 | left in memory after they have been expired or deleted in some cases | ||
122 | (but note that ssh-agent is setgid so you would still need root to | ||
123 | access them). Pointed out by Kevin Burns, ok deraadt | ||
124 | - schwarze@cvs.openbsd.org 2014/07/28 15:40:08 | ||
125 | [sftp-server.8 sshd_config.5] | ||
126 | some systems no longer need /dev/log; | ||
127 | issue noticed by jirib; | ||
128 | ok deraadt | ||
129 | |||
130 | 20140725 | ||
131 | - (djm) [regress/multiplex.sh] restore incorrectly deleted line; | ||
132 | pointed out by Christian Hesse | ||
133 | |||
134 | 20140722 | ||
135 | - (djm) [regress/multiplex.sh] ssh mux master lost -N somehow; | ||
136 | put it back | ||
137 | - (djm) [regress/multiplex.sh] change the test for still-open Unix | ||
138 | domain sockets to be robust against nc implementations that produce | ||
139 | error messages. | ||
140 | - (dtucker) [regress/unittests/sshkey/test_{file,fuzz,sshkey}.c] Wrap ecdsa- | ||
141 | specific tests inside OPENSSL_HAS_ECC. | ||
142 | - (dtucker) OpenBSD CVS Sync | ||
143 | - dtucker@cvs.openbsd.org 2014/07/22 01:18:50 | ||
144 | [key.c] | ||
145 | Prevent spam from key_load_private_pem during hostbased auth. ok djm@ | ||
146 | - guenther@cvs.openbsd.org 2014/07/22 07:13:42 | ||
147 | [umac.c] | ||
148 | Convert from <sys/endian.h> to the shiney new <endian.h> | ||
149 | ok dtucker@, who also confirmed that -portable handles this already | ||
150 | (ID sync only, includes.h pulls in endian.h if available.) | ||
151 | - djm@cvs.openbsd.org 2014/07/22 01:32:12 | ||
152 | [regress/multiplex.sh] | ||
153 | change the test for still-open Unix domain sockets to be robust against | ||
154 | nc implementations that produce error messages. from -portable | ||
155 | (Id sync only) | ||
156 | - dtucker@cvs.openbsd.org 2014/07/22 23:23:22 | ||
157 | [regress/unittests/sshkey/mktestdata.sh] | ||
158 | Sign test certs with ed25519 instead of ecdsa so that they'll work in | ||
159 | -portable on platforms that don't have ECDSA in their OpenSSL. ok djm | ||
160 | - dtucker@cvs.openbsd.org 2014/07/22 23:57:40 | ||
161 | [regress/unittests/sshkey/mktestdata.sh] | ||
162 | Add $OpenBSD tag to make syncs easier | ||
163 | - dtucker@cvs.openbsd.org 2014/07/22 23:35:38 | ||
164 | [regress/unittests/sshkey/testdata/*] | ||
165 | Regenerate test keys with certs signed with ed25519 instead of ecdsa. | ||
166 | These can be used in -portable on platforms that don't support ECDSA. | ||
167 | |||
168 | 20140721 | ||
169 | - OpenBSD CVS Sync | ||
170 | - millert@cvs.openbsd.org 2014/07/15 15:54:15 | ||
171 | [forwarding.sh multiplex.sh] | ||
172 | Add support for Unix domain socket forwarding. A remote TCP port | ||
173 | may be forwarded to a local Unix domain socket and vice versa or | ||
174 | both ends may be a Unix domain socket. This is a reimplementation | ||
175 | of the streamlocal patches by William Ahern from: | ||
176 | http://www.25thandclement.com/~william/projects/streamlocal.html | ||
177 | OK djm@ markus@ | ||
178 | - (djm) [regress/multiplex.sh] Not all netcat accept the -N option. | ||
179 | - (dtucker) [sshkey.c] ifdef out unused variable when compiling without | ||
180 | OPENSSL_HAS_ECC. | ||
181 | |||
182 | 20140721 | ||
183 | - (dtucker) [cipher.c openbsd-compat/openssl-compat.h] Restore the bits | ||
184 | needed to build AES CTR mode against OpenSSL 0.9.8f and above. ok djm | ||
185 | - (dtucker) [regress/unittests/sshkey/ | ||
186 | {common,test_file,test_fuzz,test_sshkey}.c] Wrap stdint.h includes in | ||
187 | ifdefs. | ||
188 | |||
189 | 20140719 | ||
190 | - (tim) [openbsd-compat/port-uw.c] Include misc.h for fwd_opts, used | ||
191 | in servconf.h. | ||
192 | |||
193 | 20140718 | ||
194 | - OpenBSD CVS Sync | ||
195 | - millert@cvs.openbsd.org 2014/07/15 15:54:14 | ||
196 | [PROTOCOL auth-options.c auth-passwd.c auth-rh-rsa.c auth-rhosts.c] | ||
197 | [auth-rsa.c auth.c auth1.c auth2-hostbased.c auth2-kbdint.c auth2-none.c] | ||
198 | [auth2-passwd.c auth2-pubkey.c auth2.c canohost.c channels.c channels.h] | ||
199 | [clientloop.c misc.c misc.h monitor.c mux.c packet.c readconf.c] | ||
200 | [readconf.h servconf.c servconf.h serverloop.c session.c ssh-agent.c] | ||
201 | [ssh.c ssh_config.5 sshconnect.c sshconnect1.c sshconnect2.c sshd.c] | ||
202 | [sshd_config.5 sshlogin.c] | ||
203 | Add support for Unix domain socket forwarding. A remote TCP port | ||
204 | may be forwarded to a local Unix domain socket and vice versa or | ||
205 | both ends may be a Unix domain socket. This is a reimplementation | ||
206 | of the streamlocal patches by William Ahern from: | ||
207 | http://www.25thandclement.com/~william/projects/streamlocal.html | ||
208 | OK djm@ markus@ | ||
209 | - jmc@cvs.openbsd.org 2014/07/16 14:48:57 | ||
210 | [ssh.1] | ||
211 | add the streamlocal* options to ssh's -o list; millert says they're | ||
212 | irrelevant for scp/sftp; | ||
213 | ok markus millert | ||
214 | - djm@cvs.openbsd.org 2014/07/17 00:10:56 | ||
215 | [sandbox-systrace.c] | ||
216 | ifdef SYS_sendsyslog so this will compile without patching on -stable | ||
217 | - djm@cvs.openbsd.org 2014/07/17 00:10:18 | ||
218 | [mux.c] | ||
219 | preserve errno across syscall | ||
220 | - djm@cvs.openbsd.org 2014/07/17 00:12:03 | ||
221 | [key.c] | ||
222 | silence "incorrect passphrase" error spam; reported and ok dtucker@ | ||
223 | - djm@cvs.openbsd.org 2014/07/17 07:22:19 | ||
224 | [mux.c ssh.c] | ||
225 | reflect stdio-forward ("ssh -W host:port ...") failures in exit status. | ||
226 | previously we were always returning 0. bz#2255 reported by Brendan | ||
227 | Germain; ok dtucker | ||
228 | - djm@cvs.openbsd.org 2014/07/18 02:46:01 | ||
229 | [ssh-agent.c] | ||
230 | restore umask around listener socket creation (dropped in streamlocal patch | ||
231 | merge) | ||
232 | - (dtucker) [auth2-gss.c gss-serv-krb5.c] Include misc.h for fwd_opts, used | ||
233 | in servconf.h. | ||
234 | - (dtucker) [Makefile.in] Add a t-exec target to run just the executable | ||
235 | tests. | ||
236 | - (dtucker) [key.c sshkey.c] Put new ecdsa bits inside ifdef OPENSSL_HAS_ECC. | ||
237 | |||
238 | 20140717 | ||
239 | - (djm) [digest-openssl.c] Preserve array order when disabling digests. | ||
240 | Reported by Petr Lautrbach. | ||
241 | - OpenBSD CVS Sync | ||
242 | - deraadt@cvs.openbsd.org 2014/07/11 08:09:54 | ||
243 | [sandbox-systrace.c] | ||
244 | Permit use of SYS_sendsyslog from inside the sandbox. Clock is ticking, | ||
245 | update your kernels and sshd soon.. libc will start using sendsyslog() | ||
246 | in about 4 days. | ||
247 | - tedu@cvs.openbsd.org 2014/07/11 13:54:34 | ||
248 | [myproposal.h] | ||
249 | by popular demand, add back hamc-sha1 to server proposal for better compat | ||
250 | with many clients still in use. ok deraadt | ||
251 | |||
252 | 20140715 | ||
253 | - (djm) [configure.ac] Delay checks for arc4random* until after libcrypto | ||
254 | has been located; fixes builds agains libressl-portable | ||
255 | |||
256 | 20140711 | ||
257 | - OpenBSD CVS Sync | ||
258 | - benno@cvs.openbsd.org 2014/07/09 14:15:56 | ||
259 | [ssh-add.c] | ||
260 | fix ssh-add crash while loading more than one key | ||
261 | ok markus@ | ||
262 | |||
263 | 20140709 | ||
264 | - OpenBSD CVS Sync | ||
265 | - djm@cvs.openbsd.org 2014/07/07 08:19:12 | ||
266 | [ssh_config.5] | ||
267 | mention that ProxyCommand is executed using shell "exec" to avoid | ||
268 | a lingering process; bz#1977 | ||
269 | - djm@cvs.openbsd.org 2014/07/09 01:45:10 | ||
270 | [sftp.c] | ||
271 | more useful error message when GLOB_NOSPACE occurs; | ||
272 | bz#2254, patch from Orion Poplawski | ||
273 | - djm@cvs.openbsd.org 2014/07/09 03:02:15 | ||
274 | [key.c] | ||
275 | downgrade more error() to debug() to better match what old authfile.c | ||
276 | did; suppresses spurious errors with hostbased authentication enabled | ||
277 | - djm@cvs.openbsd.org 2014/07/06 07:42:03 | ||
278 | [multiplex.sh test-exec.sh] | ||
279 | add a hook to the cleanup() function to kill $SSH_PID if it is set | ||
280 | |||
281 | use it to kill the mux master started in multiplex.sh (it was being left | ||
282 | around on fatal failures) | ||
283 | - djm@cvs.openbsd.org 2014/07/07 08:15:26 | ||
284 | [multiplex.sh] | ||
285 | remove forced-fatal that I stuck in there to test the new cleanup | ||
286 | logic and forgot to remove... | ||
287 | |||
288 | 20140706 | ||
289 | - OpenBSD CVS Sync | ||
290 | - djm@cvs.openbsd.org 2014/07/03 23:18:35 | ||
291 | [authfile.h] | ||
292 | remove leakmalloc droppings | ||
293 | - djm@cvs.openbsd.org 2014/07/05 23:11:48 | ||
294 | [channels.c] | ||
295 | fix remote-forward cancel regression; ok markus@ | ||
296 | |||
297 | 20140704 | ||
298 | - OpenBSD CVS Sync | ||
299 | - jsing@cvs.openbsd.org 2014/07/03 12:42:16 | ||
300 | [cipher-chachapoly.c] | ||
301 | Call chacha_ivsetup() immediately before chacha_encrypt_bytes() - this | ||
302 | makes it easier to verify that chacha_encrypt_bytes() is only called once | ||
303 | per chacha_ivsetup() call. | ||
304 | ok djm@ | ||
305 | - djm@cvs.openbsd.org 2014/07/03 22:23:46 | ||
306 | [sshconnect.c] | ||
307 | when rekeying, skip file/DNS lookup if it is the same as the key sent | ||
308 | during initial key exchange. bz#2154 patch from Iain Morgan; ok markus@ | ||
309 | - djm@cvs.openbsd.org 2014/07/03 22:33:41 | ||
310 | [channels.c] | ||
311 | allow explicit ::1 and 127.0.0.1 forwarding bind addresses when | ||
312 | GatewayPorts=no; allows client to choose address family; | ||
313 | bz#2222 ok markus@ | ||
314 | - djm@cvs.openbsd.org 2014/07/03 22:40:43 | ||
315 | [servconf.c servconf.h session.c sshd.8 sshd_config.5] | ||
316 | Add a sshd_config PermitUserRC option to control whether ~/.ssh/rc is | ||
317 | executed, mirroring the no-user-rc authorized_keys option; | ||
318 | bz#2160; ok markus@ | ||
319 | |||
320 | 20140703 | ||
321 | - (djm) [digest-openssl.c configure.ac] Disable RIPEMD160 if libcrypto | ||
322 | doesn't support it. | ||
323 | - (djm) [monitor_fdpass.c] Use sys/poll.h if poll.h doesn't exist; | ||
324 | bz#2237 | ||
325 | - OpenBSD CVS Sync | ||
326 | - djm@cvs.openbsd.org 2014/07/03 01:45:38 | ||
327 | [sshkey.c] | ||
328 | make Ed25519 keys' title fit properly in the randomart border; bz#2247 | ||
329 | based on patch from Christian Hesse | ||
330 | - djm@cvs.openbsd.org 2014/07/03 03:11:03 | ||
331 | [ssh-agent.c] | ||
332 | Only cleanup agent socket in the main agent process and not in any | ||
333 | subprocesses it may have started (e.g. forked askpass). Fixes | ||
334 | agent sockets being zapped when askpass processes fatal(); | ||
335 | bz#2236 patch from Dmitry V. Levin | ||
336 | - djm@cvs.openbsd.org 2014/07/03 03:15:01 | ||
337 | [ssh-add.c] | ||
338 | make stdout line-buffered; saves partial output getting lost when | ||
339 | ssh-add fatal()s part-way through (e.g. when listing keys from an | ||
340 | agent that supports key types that ssh-add doesn't); | ||
341 | bz#2234, reported by Phil Pennock | ||
342 | - djm@cvs.openbsd.org 2014/07/03 03:26:43 | ||
343 | [digest-openssl.c] | ||
344 | use EVP_Digest() for one-shot hash instead of creating, updating, | ||
345 | finalising and destroying a context. | ||
346 | bz#2231, based on patch from Timo Teras | ||
347 | - djm@cvs.openbsd.org 2014/07/03 03:34:09 | ||
348 | [gss-serv.c session.c ssh-keygen.c] | ||
349 | standardise on NI_MAXHOST for gethostname() string lengths; about | ||
350 | 1/2 the cases were using it already. Fixes bz#2239 en passant | ||
351 | - djm@cvs.openbsd.org 2014/07/03 03:47:27 | ||
352 | [ssh-keygen.c] | ||
353 | When hashing or removing hosts using ssh-keygen, don't choke on | ||
354 | @revoked markers and don't remove @cert-authority markers; | ||
355 | bz#2241, reported by mlindgren AT runelind.net | ||
356 | - djm@cvs.openbsd.org 2014/07/03 04:36:45 | ||
357 | [digest.h] | ||
358 | forward-declare struct sshbuf so consumers don't need to include sshbuf.h | ||
359 | - djm@cvs.openbsd.org 2014/07/03 05:32:36 | ||
360 | [ssh_config.5] | ||
361 | mention '%%' escape sequence in HostName directives and how it may | ||
362 | be used to specify IPv6 link-local addresses | ||
363 | - djm@cvs.openbsd.org 2014/07/03 05:38:17 | ||
364 | [ssh.1] | ||
365 | document that -g will only work in the multiplexed case if applied to | ||
366 | the mux master | ||
367 | - djm@cvs.openbsd.org 2014/07/03 06:39:19 | ||
368 | [ssh.c ssh_config.5] | ||
369 | Add a %C escape sequence for LocalCommand and ControlPath that expands | ||
370 | to a unique identifer based on a has of the tuple of (local host, | ||
371 | remote user, hostname, port). | ||
372 | |||
373 | Helps avoid exceeding sockaddr_un's miserly pathname limits for mux | ||
374 | control paths. | ||
375 | |||
376 | bz#2220, based on patch from mancha1 AT zoho.com; ok markus@ | ||
377 | - jmc@cvs.openbsd.org 2014/07/03 07:45:27 | ||
378 | [ssh_config.5] | ||
379 | escape %C since groff thinks it part of an Rs/Re block; | ||
380 | - djm@cvs.openbsd.org 2014/07/03 11:16:55 | ||
381 | [auth.c auth.h auth1.c auth2.c] | ||
382 | make the "Too many authentication failures" message include the | ||
383 | user, source address, port and protocol in a format similar to the | ||
384 | authentication success / failure messages; bz#2199, ok dtucker | ||
385 | |||
386 | 20140702 | ||
387 | - OpenBSD CVS Sync | ||
388 | - deraadt@cvs.openbsd.org 2014/06/13 08:26:29 | ||
389 | [sandbox-systrace.c] | ||
390 | permit SYS_getentropy | ||
391 | from matthew | ||
392 | - matthew@cvs.openbsd.org 2014/06/18 02:59:13 | ||
393 | [sandbox-systrace.c] | ||
394 | Now that we have a dedicated getentropy(2) system call for | ||
395 | arc4random(3), we can disallow __sysctl(2) in OpenSSH's systrace | ||
396 | sandbox. | ||
397 | |||
398 | ok djm | ||
399 | - naddy@cvs.openbsd.org 2014/06/18 15:42:09 | ||
400 | [sshbuf-getput-crypto.c] | ||
401 | The ssh_get_bignum functions must accept the same range of bignums | ||
402 | the corresponding ssh_put_bignum functions create. This fixes the | ||
403 | use of 16384-bit RSA keys (bug reported by Eivind Evensen). | ||
404 | ok djm@ | ||
405 | - djm@cvs.openbsd.org 2014/06/24 00:52:02 | ||
406 | [krl.c] | ||
407 | fix bug in KRL generation: multiple consecutive revoked certificate | ||
408 | serial number ranges could be serialised to an invalid format. | ||
409 | |||
410 | Readers of a broken KRL caused by this bug will fail closed, so no | ||
411 | should-have-been-revoked key will be accepted. | ||
412 | - djm@cvs.openbsd.org 2014/06/24 01:13:21 | ||
413 | [Makefile.in auth-bsdauth.c auth-chall.c auth-options.c auth-rsa.c | ||
414 | [auth2-none.c auth2-pubkey.c authfile.c authfile.h cipher-3des1.c | ||
415 | [cipher-chachapoly.c cipher-chachapoly.h cipher.c cipher.h | ||
416 | [digest-libc.c digest-openssl.c digest.h dns.c entropy.c hmac.h | ||
417 | [hostfile.c key.c key.h krl.c monitor.c packet.c rsa.c rsa.h | ||
418 | [ssh-add.c ssh-agent.c ssh-dss.c ssh-ecdsa.c ssh-ed25519.c | ||
419 | [ssh-keygen.c ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c | ||
420 | [ssh-rsa.c sshbuf-misc.c sshbuf.h sshconnect.c sshconnect1.c | ||
421 | [sshconnect2.c sshd.c sshkey.c sshkey.h | ||
422 | [openbsd-compat/openssl-compat.c openbsd-compat/openssl-compat.h] | ||
423 | New key API: refactor key-related functions to be more library-like, | ||
424 | existing API is offered as a set of wrappers. | ||
425 | |||
426 | with and ok markus@ | ||
427 | |||
428 | Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew | ||
429 | Dempsky and Ron Bowes for a detailed review a few months ago. | ||
430 | NB. This commit also removes portable OpenSSH support for OpenSSL | ||
431 | <0.9.8e. | ||
432 | - djm@cvs.openbsd.org 2014/06/24 02:19:48 | ||
433 | [ssh.c] | ||
434 | don't fatal() when hostname canonicalisation fails with a | ||
435 | ProxyCommand in use; continue and allow the ProxyCommand to | ||
436 | connect anyway (e.g. to a host with a name outside the DNS | ||
437 | behind a bastion) | ||
438 | - djm@cvs.openbsd.org 2014/06/24 02:21:01 | ||
439 | [scp.c] | ||
440 | when copying local->remote fails during read, don't send uninitialised | ||
441 | heap to the remote end. Reported by Jann Horn | ||
442 | - deraadt@cvs.openbsd.org 2014/06/25 14:16:09 | ||
443 | [sshbuf.c] | ||
444 | unblock SIGSEGV before raising it | ||
445 | ok djm | ||
446 | - markus@cvs.openbsd.org 2014/06/27 16:41:56 | ||
447 | [channels.c channels.h clientloop.c ssh.c] | ||
448 | fix remote fwding with same listen port but different listen address | ||
449 | with gerhard@, ok djm@ | ||
450 | - markus@cvs.openbsd.org 2014/06/27 18:50:39 | ||
451 | [ssh-add.c] | ||
452 | fix loading of private keys | ||
453 | - djm@cvs.openbsd.org 2014/06/30 12:54:39 | ||
454 | [key.c] | ||
455 | suppress spurious error message when loading key with a passphrase; | ||
456 | reported by kettenis@ ok markus@ | ||
457 | - djm@cvs.openbsd.org 2014/07/02 04:59:06 | ||
458 | [cipher-3des1.c] | ||
459 | fix ssh protocol 1 on the server that regressed with the sshkey change | ||
460 | (sometimes fatal() after auth completed), make file return useful status | ||
461 | codes. | ||
462 | NB. Id sync only for these two. They were bundled into the sshkey merge | ||
463 | above, since it was easier to sync the entire file and then apply | ||
464 | portable-specific changed atop it. | ||
465 | - djm@cvs.openbsd.org 2014/04/30 05:32:00 | ||
466 | [regress/Makefile] | ||
467 | unit tests for new buffer API; including basic fuzz testing | ||
468 | NB. Id sync only. | ||
469 | - djm@cvs.openbsd.org 2014/05/21 07:04:21 | ||
470 | [regress/integrity.sh] | ||
471 | when failing because of unexpected output, show the offending output | ||
472 | - djm@cvs.openbsd.org 2014/06/24 01:04:43 | ||
473 | [regress/krl.sh] | ||
474 | regress test for broken consecutive revoked serial number ranges | ||
475 | - djm@cvs.openbsd.org 2014/06/24 01:14:17 | ||
476 | [Makefile.in regress/Makefile regress/unittests/Makefile] | ||
477 | [regress/unittests/sshkey/Makefile] | ||
478 | [regress/unittests/sshkey/common.c] | ||
479 | [regress/unittests/sshkey/common.h] | ||
480 | [regress/unittests/sshkey/mktestdata.sh] | ||
481 | [regress/unittests/sshkey/test_file.c] | ||
482 | [regress/unittests/sshkey/test_fuzz.c] | ||
483 | [regress/unittests/sshkey/test_sshkey.c] | ||
484 | [regress/unittests/sshkey/tests.c] | ||
485 | [regress/unittests/sshkey/testdata/dsa_1] | ||
486 | [regress/unittests/sshkey/testdata/dsa_1-cert.fp] | ||
487 | [regress/unittests/sshkey/testdata/dsa_1-cert.pub] | ||
488 | [regress/unittests/sshkey/testdata/dsa_1.fp] | ||
489 | [regress/unittests/sshkey/testdata/dsa_1.fp.bb] | ||
490 | [regress/unittests/sshkey/testdata/dsa_1.param.g] | ||
491 | [regress/unittests/sshkey/testdata/dsa_1.param.priv] | ||
492 | [regress/unittests/sshkey/testdata/dsa_1.param.pub] | ||
493 | [regress/unittests/sshkey/testdata/dsa_1.pub] | ||
494 | [regress/unittests/sshkey/testdata/dsa_1_pw] | ||
495 | [regress/unittests/sshkey/testdata/dsa_2] | ||
496 | [regress/unittests/sshkey/testdata/dsa_2.fp] | ||
497 | [regress/unittests/sshkey/testdata/dsa_2.fp.bb] | ||
498 | [regress/unittests/sshkey/testdata/dsa_2.pub] | ||
499 | [regress/unittests/sshkey/testdata/dsa_n] | ||
500 | [regress/unittests/sshkey/testdata/dsa_n_pw] | ||
501 | [regress/unittests/sshkey/testdata/ecdsa_1] | ||
502 | [regress/unittests/sshkey/testdata/ecdsa_1-cert.fp] | ||
503 | [regress/unittests/sshkey/testdata/ecdsa_1-cert.pub] | ||
504 | [regress/unittests/sshkey/testdata/ecdsa_1.fp] | ||
505 | [regress/unittests/sshkey/testdata/ecdsa_1.fp.bb] | ||
506 | [regress/unittests/sshkey/testdata/ecdsa_1.param.curve] | ||
507 | [regress/unittests/sshkey/testdata/ecdsa_1.param.priv] | ||
508 | [regress/unittests/sshkey/testdata/ecdsa_1.param.pub] | ||
509 | [regress/unittests/sshkey/testdata/ecdsa_1.pub] | ||
510 | [regress/unittests/sshkey/testdata/ecdsa_1_pw] | ||
511 | [regress/unittests/sshkey/testdata/ecdsa_2] | ||
512 | [regress/unittests/sshkey/testdata/ecdsa_2.fp] | ||
513 | [regress/unittests/sshkey/testdata/ecdsa_2.fp.bb] | ||
514 | [regress/unittests/sshkey/testdata/ecdsa_2.param.curve] | ||
515 | [regress/unittests/sshkey/testdata/ecdsa_2.param.priv] | ||
516 | [regress/unittests/sshkey/testdata/ecdsa_2.param.pub] | ||
517 | [regress/unittests/sshkey/testdata/ecdsa_2.pub] | ||
518 | [regress/unittests/sshkey/testdata/ecdsa_n] | ||
519 | [regress/unittests/sshkey/testdata/ecdsa_n_pw] | ||
520 | [regress/unittests/sshkey/testdata/ed25519_1] | ||
521 | [regress/unittests/sshkey/testdata/ed25519_1-cert.fp] | ||
522 | [regress/unittests/sshkey/testdata/ed25519_1-cert.pub] | ||
523 | [regress/unittests/sshkey/testdata/ed25519_1.fp] | ||
524 | [regress/unittests/sshkey/testdata/ed25519_1.fp.bb] | ||
525 | [regress/unittests/sshkey/testdata/ed25519_1.pub] | ||
526 | [regress/unittests/sshkey/testdata/ed25519_1_pw] | ||
527 | [regress/unittests/sshkey/testdata/ed25519_2] | ||
528 | [regress/unittests/sshkey/testdata/ed25519_2.fp] | ||
529 | [regress/unittests/sshkey/testdata/ed25519_2.fp.bb] | ||
530 | [regress/unittests/sshkey/testdata/ed25519_2.pub] | ||
531 | [regress/unittests/sshkey/testdata/pw] | ||
532 | [regress/unittests/sshkey/testdata/rsa1_1] | ||
533 | [regress/unittests/sshkey/testdata/rsa1_1.fp] | ||
534 | [regress/unittests/sshkey/testdata/rsa1_1.fp.bb] | ||
535 | [regress/unittests/sshkey/testdata/rsa1_1.param.n] | ||
536 | [regress/unittests/sshkey/testdata/rsa1_1.pub] | ||
537 | [regress/unittests/sshkey/testdata/rsa1_1_pw] | ||
538 | [regress/unittests/sshkey/testdata/rsa1_2] | ||
539 | [regress/unittests/sshkey/testdata/rsa1_2.fp] | ||
540 | [regress/unittests/sshkey/testdata/rsa1_2.fp.bb] | ||
541 | [regress/unittests/sshkey/testdata/rsa1_2.param.n] | ||
542 | [regress/unittests/sshkey/testdata/rsa1_2.pub] | ||
543 | [regress/unittests/sshkey/testdata/rsa_1] | ||
544 | [regress/unittests/sshkey/testdata/rsa_1-cert.fp] | ||
545 | [regress/unittests/sshkey/testdata/rsa_1-cert.pub] | ||
546 | [regress/unittests/sshkey/testdata/rsa_1.fp] | ||
547 | [regress/unittests/sshkey/testdata/rsa_1.fp.bb] | ||
548 | [regress/unittests/sshkey/testdata/rsa_1.param.n] | ||
549 | [regress/unittests/sshkey/testdata/rsa_1.param.p] | ||
550 | [regress/unittests/sshkey/testdata/rsa_1.param.q] | ||
551 | [regress/unittests/sshkey/testdata/rsa_1.pub] | ||
552 | [regress/unittests/sshkey/testdata/rsa_1_pw] | ||
553 | [regress/unittests/sshkey/testdata/rsa_2] | ||
554 | [regress/unittests/sshkey/testdata/rsa_2.fp] | ||
555 | [regress/unittests/sshkey/testdata/rsa_2.fp.bb] | ||
556 | [regress/unittests/sshkey/testdata/rsa_2.param.n] | ||
557 | [regress/unittests/sshkey/testdata/rsa_2.param.p] | ||
558 | [regress/unittests/sshkey/testdata/rsa_2.param.q] | ||
559 | [regress/unittests/sshkey/testdata/rsa_2.pub] | ||
560 | [regress/unittests/sshkey/testdata/rsa_n] | ||
561 | [regress/unittests/sshkey/testdata/rsa_n_pw] | ||
562 | unit and fuzz tests for new key API | ||
563 | - (djm) [sshkey.c] Conditionalise inclusion of util.h | ||
564 | - (djm) [regress/Makefile] fix execution of sshkey unit/fuzz test | ||
565 | |||
566 | 20140618 | ||
567 | - (tim) [openssh/session.c] Work around to get chroot sftp working on UnixWare | ||
568 | |||
569 | 20140617 | ||
570 | - (dtucker) [entropy.c openbsd-compat/openssl-compat.{c,h} | ||
571 | openbsd-compat/regress/{.cvsignore,Makefile.in,opensslvertest.c}] | ||
572 | Move the OpenSSL header/library version test into its own function and add | ||
573 | tests for it. Fix it to allow fix version upgrades (but not downgrades). | ||
574 | Prompted by chl@ via OpenSMTPD (issue #462) and Debian (bug #748150). | ||
575 | ok djm@ chl@ | ||
576 | |||
577 | 20140616 | ||
578 | - (dtucker) [defines.h] Fix undef of _PATH_MAILDIR. From rak at debian via | ||
579 | OpenSMTPD and chl@ | ||
580 | |||
581 | 20140612 | ||
582 | - (dtucker) [configure.ac] Remove tcpwrappers support, support has already | ||
583 | been removed from sshd.c. | ||
584 | |||
585 | 20140611 | ||
586 | - (dtucker) [defines.h] Add va_copy if we don't already have it, taken from | ||
587 | openbsd-compat/bsd-asprintf.c. | ||
588 | - (dtucker) [regress/unittests/sshbuf/*.c regress/unittests/test_helper/*] | ||
589 | Wrap stdlib.h include an ifdef for platforms that don't have it. | ||
590 | - (tim) [regress/unittests/test_helper/test_helper.h] Add includes.h for | ||
591 | u_intXX_t types. | ||
592 | |||
593 | 20140610 | ||
594 | - (dtucker) [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c | ||
595 | regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] Only do NISTP256 | ||
596 | curve tests if OpenSSL has them. | ||
597 | - (dtucker) [myprosal.h] Don't include curve25519-sha256@libssh.org in | ||
598 | the proposal if the version of OpenSSL we're using doesn't support ECC. | ||
599 | - (dtucker) [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] ifdef | ||
600 | ECC variable too. | ||
601 | - (dtucker) OpenBSD CVS Sync | ||
602 | - djm@cvs.openbsd.org 2014/06/05 22:17:50 | ||
603 | [sshconnect2.c] | ||
604 | fix inverted test that caused PKCS#11 keys that were explicitly listed | ||
605 | not to be preferred. Reported by Dirk-Willem van Gulik | ||
606 | - dtucker@cvs.openbsd.org 2014/06/10 21:46:11 | ||
607 | [sshbuf.h] | ||
608 | Group ECC functions together to make things a little easier in -portable. | ||
609 | "doesn't bother me" deraadt@ | ||
610 | - (dtucker) [sshbuf.h] Only declare ECC functions if building without | ||
611 | OpenSSL or if OpenSSL has ECC. | ||
612 | - (dtucker) [openbsd-compat/arc4random.c] Use explicit_bzero instead of an | ||
613 | assigment that might get optimized out. ok djm@ | ||
614 | - (dtucker) [bufaux.c bufbn.c bufec.c buffer.c] Pull in includes.h for | ||
615 | compat stuff, specifically whether or not OpenSSL has ECC. | ||
616 | |||
617 | 20140527 | ||
618 | - (djm) [cipher.c] Fix merge botch. | ||
619 | - (djm) [contrib/cygwin/ssh-host-config] Updated Cygwin ssh-host-config | ||
620 | from Corinna Vinschen, fixing a number of bugs and preparing for | ||
621 | Cygwin 1.7.30. | ||
622 | - (djm) [configure.ac openbsd-compat/bsd-cygwin_util.c] | ||
623 | [openbsd-compat/bsd-cygwin_util.h] On Cygwin, determine privilege | ||
624 | separation user at runtime, since it may need to be a domain account. | ||
625 | Patch from Corinna Vinschen. | ||
626 | |||
627 | 20140522 | ||
628 | - (djm) [Makefile.in] typo in path | ||
629 | |||
630 | 20140521 | ||
631 | - (djm) [commit configure.ac defines.h sshpty.c] don't attempt to use | ||
632 | vhangup on Linux. It doens't work for non-root users, and for them | ||
633 | it just messes up the tty settings. | ||
634 | - (djm) [misc.c] Use CLOCK_BOOTTIME in preference to CLOCK_MONOTONIC | ||
635 | when it is available. It takes into account time spent suspended, | ||
636 | thereby ensuring timeouts (e.g. for expiring agent keys) fire | ||
637 | correctly. bz#2228 reported by John Haxby | ||
638 | |||
639 | 20140519 | ||
640 | - (djm) [rijndael.c rijndael.h] Sync with newly-ressurected versions ine | ||
641 | OpenBSD | ||
642 | - OpenBSD CVS Sync | ||
643 | - logan@cvs.openbsd.org 2014/04/20 09:24:26 | ||
644 | [dns.c dns.h ssh-keygen.c] | ||
645 | Add support for SSHFP DNS records for ED25519 key types. | ||
646 | OK from djm@ | ||
647 | - logan@cvs.openbsd.org 2014/04/21 14:36:16 | ||
648 | [sftp-client.c sftp-client.h sftp.c] | ||
649 | Implement sftp upload resume support. | ||
650 | OK from djm@, with input from guenther@, mlarkin@ and | ||
651 | okan@ | ||
652 | - logan@cvs.openbsd.org 2014/04/22 10:07:12 | ||
653 | [sftp.c] | ||
654 | Sort the sftp command list. | ||
655 | OK from djm@ | ||
656 | - logan@cvs.openbsd.org 2014/04/22 12:42:04 | ||
657 | [sftp.1] | ||
658 | Document sftp upload resume. | ||
659 | OK from djm@, with feedback from okan@. | ||
660 | - jmc@cvs.openbsd.org 2014/04/22 14:16:30 | ||
661 | [sftp.1] | ||
662 | zap eol whitespace; | ||
663 | - djm@cvs.openbsd.org 2014/04/23 12:42:34 | ||
664 | [readconf.c] | ||
665 | don't record duplicate IdentityFiles | ||
666 | - djm@cvs.openbsd.org 2014/04/28 03:09:18 | ||
667 | [authfile.c bufaux.c buffer.h channels.c krl.c mux.c packet.c packet.h] | ||
668 | [ssh-keygen.c] | ||
669 | buffer_get_string_ptr's return should be const to remind | ||
670 | callers that futzing with it will futz with the actual buffer | ||
671 | contents | ||
672 | - djm@cvs.openbsd.org 2014/04/29 13:10:30 | ||
673 | [clientloop.c serverloop.c] | ||
674 | bz#1818 - don't send channel success/failre replies on channels that | ||
675 | have sent a close already; analysis and patch from Simon Tatham; | ||
676 | ok markus@ | ||
677 | - markus@cvs.openbsd.org 2014/04/29 18:01:49 | ||
678 | [auth.c authfd.c authfile.c bufaux.c cipher.c cipher.h hostfile.c] | ||
679 | [kex.c key.c mac.c monitor.c monitor_wrap.c myproposal.h packet.c] | ||
680 | [roaming_client.c ssh-agent.c ssh-keygen.c ssh-keyscan.c ssh-keysign.c] | ||
681 | [ssh-pkcs11.h ssh.c sshconnect.c sshconnect2.c sshd.c] | ||
682 | make compiling against OpenSSL optional (make OPENSSL=no); | ||
683 | reduces algorithms to curve25519, aes-ctr, chacha, ed25519; | ||
684 | allows us to explore further options; with and ok djm | ||
685 | - dtucker@cvs.openbsd.org 2014/04/29 19:58:50 | ||
686 | [sftp.c] | ||
687 | Move nulling of variable next to where it's freed. ok markus@ | ||
688 | - dtucker@cvs.openbsd.org 2014/04/29 20:36:51 | ||
689 | [sftp.c] | ||
690 | Don't attempt to append a nul quote char to the filename. Should prevent | ||
691 | fatal'ing with "el_insertstr failed" when there's a single quote char | ||
692 | somewhere in the string. bz#2238, ok markus@ | ||
693 | - djm@cvs.openbsd.org 2014/04/30 05:29:56 | ||
694 | [bufaux.c bufbn.c bufec.c buffer.c buffer.h sshbuf-getput-basic.c] | ||
695 | [sshbuf-getput-crypto.c sshbuf-misc.c sshbuf.c sshbuf.h ssherr.c] | ||
696 | [ssherr.h] | ||
697 | New buffer API; the first installment of the conversion/replacement | ||
698 | of OpenSSH's internals to make them usable as a standalone library. | ||
699 | |||
700 | This includes a set of wrappers to make it compatible with the | ||
701 | existing buffer API so replacement can occur incrementally. | ||
702 | |||
703 | With and ok markus@ | ||
704 | |||
705 | Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew | ||
706 | Dempsky and Ron Bowes for a detailed review. | ||
707 | - naddy@cvs.openbsd.org 2014/04/30 19:07:48 | ||
708 | [mac.c myproposal.h umac.c] | ||
709 | UMAC can use our local fallback implementation of AES when OpenSSL isn't | ||
710 | available. Glue code straight from Ted Krovetz's original umac.c. | ||
711 | ok markus@ | ||
712 | - djm@cvs.openbsd.org 2014/05/02 03:27:54 | ||
713 | [chacha.h cipher-chachapoly.h digest.h hmac.h kex.h kexc25519.c] | ||
714 | [misc.h poly1305.h ssh-pkcs11.c defines.h] | ||
715 | revert __bounded change; it causes way more problems for portable than | ||
716 | it solves; pointed out by dtucker@ | ||
717 | - markus@cvs.openbsd.org 2014/05/03 17:20:34 | ||
718 | [monitor.c packet.c packet.h] | ||
719 | unbreak compression, by re-init-ing the compression code in the | ||
720 | post-auth child. the new buffer code is more strict, and requires | ||
721 | buffer_init() while the old code was happy after a bzero(); | ||
722 | originally from djm@ | ||
723 | - logan@cvs.openbsd.org 2014/05/05 07:02:30 | ||
724 | [sftp.c] | ||
725 | Zap extra whitespace. | ||
726 | |||
727 | OK from djm@ and dtucker@ | ||
728 | - (djm) [configure.ac] Unconditionally define WITH_OPENSSL until we write | ||
729 | portability glue to support building without libcrypto | ||
730 | - (djm) [Makefile.in configure.ac sshbuf-getput-basic.c] | ||
731 | [sshbuf-getput-crypto.c sshbuf.c] compilation and portability fixes | ||
732 | - OpenBSD CVS Sync | ||
733 | - djm@cvs.openbsd.org 2014/03/13 20:44:49 | ||
734 | [login-timeout.sh] | ||
735 | this test is a sorry mess of race conditions; add another sleep | ||
736 | to avoid a failure on slow machines (at least until I find a | ||
737 | better way) | ||
738 | - djm@cvs.openbsd.org 2014/04/21 22:15:37 | ||
739 | [dhgex.sh integrity.sh kextype.sh rekey.sh try-ciphers.sh] | ||
740 | repair regress tests broken by server-side default cipher/kex/mac changes | ||
741 | by ensuring that the option under test is included in the server's | ||
742 | algorithm list | ||
743 | - dtucker@cvs.openbsd.org 2014/05/03 18:46:14 | ||
744 | [proxy-connect.sh] | ||
745 | Add tests for with and without compression, with and without privsep. | ||
746 | - logan@cvs.openbsd.org 2014/05/04 10:40:59 | ||
747 | [connect-privsep.sh] | ||
748 | Remove the Z flag from the list of malloc options as it | ||
749 | was removed from malloc.c 10 days ago. | ||
750 | |||
751 | OK from miod@ | ||
752 | - (djm) [regress/unittests/Makefile] | ||
753 | [regress/unittests/Makefile.inc] | ||
754 | [regress/unittests/sshbuf/Makefile] | ||
755 | [regress/unittests/sshbuf/test_sshbuf.c] | ||
756 | [regress/unittests/sshbuf/test_sshbuf_fixed.c] | ||
757 | [regress/unittests/sshbuf/test_sshbuf_fuzz.c] | ||
758 | [regress/unittests/sshbuf/test_sshbuf_getput_basic.c] | ||
759 | [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c] | ||
760 | [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] | ||
761 | [regress/unittests/sshbuf/test_sshbuf_misc.c] | ||
762 | [regress/unittests/sshbuf/tests.c] | ||
763 | [regress/unittests/test_helper/Makefile] | ||
764 | [regress/unittests/test_helper/fuzz.c] | ||
765 | [regress/unittests/test_helper/test_helper.c] | ||
766 | [regress/unittests/test_helper/test_helper.h] | ||
767 | Import new unit tests from OpenBSD; not yet hooked up to build. | ||
768 | - (djm) [regress/Makefile Makefile.in] | ||
769 | [regress/unittests/sshbuf/test_sshbuf.c | ||
770 | [regress/unittests/sshbuf/test_sshbuf_fixed.c] | ||
771 | [regress/unittests/sshbuf/test_sshbuf_fuzz.c] | ||
772 | [regress/unittests/sshbuf/test_sshbuf_getput_basic.c] | ||
773 | [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c] | ||
774 | [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] | ||
775 | [regress/unittests/sshbuf/test_sshbuf_misc.c] | ||
776 | [regress/unittests/sshbuf/tests.c] | ||
777 | [regress/unittests/test_helper/fuzz.c] | ||
778 | [regress/unittests/test_helper/test_helper.c] | ||
779 | Hook new unit tests into the build and "make tests" | ||
780 | - (djm) [sshbuf.c] need __predict_false | ||
781 | |||
782 | 20140430 | ||
783 | - (dtucker) [defines.h] Define __GNUC_PREREQ__ macro if we don't already | ||
784 | have it. Only attempt to use __attribute__(__bounded__) for gcc. | ||
785 | |||
786 | 20140420 | ||
787 | - OpenBSD CVS Sync | ||
788 | - djm@cvs.openbsd.org 2014/03/03 22:22:30 | ||
789 | [session.c] | ||
790 | ignore enviornment variables with embedded '=' or '\0' characters; | ||
791 | spotted by Jann Horn; ok deraadt@ | ||
792 | Id sync only - portable already has this. | ||
793 | - djm@cvs.openbsd.org 2014/03/12 04:44:58 | ||
794 | [ssh-keyscan.c] | ||
795 | scan for Ed25519 keys by default too | ||
796 | - djm@cvs.openbsd.org 2014/03/12 04:50:32 | ||
797 | [auth-bsdauth.c ssh-keygen.c] | ||
798 | don't count on things that accept arguments by reference to clear | ||
799 | things for us on error; most things do, but it's unsafe form. | ||
800 | - djm@cvs.openbsd.org 2014/03/12 04:51:12 | ||
801 | [authfile.c] | ||
802 | correct test that kdf name is not "none" or "bcrypt" | ||
803 | - naddy@cvs.openbsd.org 2014/03/12 13:06:59 | ||
804 | [ssh-keyscan.1] | ||
805 | scan for Ed25519 keys by default too | ||
806 | - deraadt@cvs.openbsd.org 2014/03/15 17:28:26 | ||
807 | [ssh-agent.c ssh-keygen.1 ssh-keygen.c] | ||
808 | Improve usage() and documentation towards the standard form. | ||
809 | In particular, this line saves a lot of man page reading time. | ||
810 | usage: ssh-keygen [-q] [-b bits] [-t dsa | ecdsa | ed25519 | rsa | rsa1] | ||
811 | [-N new_passphrase] [-C comment] [-f output_keyfile] | ||
812 | ok schwarze jmc | ||
813 | - tedu@cvs.openbsd.org 2014/03/17 19:44:10 | ||
814 | [ssh.1] | ||
815 | old descriptions of des and blowfish are old. maybe ok deraadt | ||
816 | - tedu@cvs.openbsd.org 2014/03/19 14:42:44 | ||
817 | [scp.1] | ||
818 | there is no need for rcp anymore | ||
819 | ok deraadt millert | ||
820 | - markus@cvs.openbsd.org 2014/03/25 09:40:03 | ||
821 | [myproposal.h] | ||
822 | trimm default proposals. | ||
823 | |||
824 | This commit removes the weaker pre-SHA2 hashes, the broken ciphers | ||
825 | (arcfour), and the broken modes (CBC) from the default configuration | ||
826 | (the patch only changes the default, all the modes are still available | ||
827 | for the config files). | ||
828 | |||
829 | ok djm@, reminded by tedu@ & naddy@ and discussed with many | ||
830 | - deraadt@cvs.openbsd.org 2014/03/26 17:16:26 | ||
831 | [myproposal.h] | ||
832 | The current sharing of myproposal[] between both client and server code | ||
833 | makes the previous diff highly unpallatable. We want to go in that | ||
834 | direction for the server, but not for the client. Sigh. | ||
835 | Brought up by naddy. | ||
836 | - markus@cvs.openbsd.org 2014/03/27 23:01:27 | ||
837 | [myproposal.h ssh-keyscan.c sshconnect2.c sshd.c] | ||
838 | disable weak proposals in sshd, but keep them in ssh; ok djm@ | ||
839 | - djm@cvs.openbsd.org 2014/03/26 04:55:35 | ||
840 | [chacha.h cipher-chachapoly.h digest.h hmac.h kex.h kexc25519.c | ||
841 | [misc.h poly1305.h ssh-pkcs11.c] | ||
842 | use __bounded(...) attribute recently added to sys/cdefs.h instead of | ||
843 | longform __attribute__(__bounded(...)); | ||
844 | |||
845 | for brevity and a warning free compilation with llvm/clang | ||
846 | - tedu@cvs.openbsd.org 2014/03/26 19:58:37 | ||
847 | [sshd.8 sshd.c] | ||
848 | remove libwrap support. ok deraadt djm mfriedl | ||
849 | - naddy@cvs.openbsd.org 2014/03/28 05:17:11 | ||
850 | [ssh_config.5 sshd_config.5] | ||
851 | sync available and default algorithms, improve algorithm list formatting | ||
852 | help from jmc@ and schwarze@, ok deraadt@ | ||
853 | - jmc@cvs.openbsd.org 2014/03/31 13:39:34 | ||
854 | [ssh-keygen.1] | ||
855 | the text for the -K option was inserted in the wrong place in -r1.108; | ||
856 | fix From: Matthew Clarke | ||
857 | - djm@cvs.openbsd.org 2014/04/01 02:05:27 | ||
858 | [ssh-keysign.c] | ||
859 | include fingerprint of key not found | ||
860 | use arc4random_buf() instead of loop+arc4random() | ||
861 | - djm@cvs.openbsd.org 2014/04/01 03:34:10 | ||
862 | [sshconnect.c] | ||
863 | When using VerifyHostKeyDNS with a DNSSEC resolver, down-convert any | ||
864 | certificate keys to plain keys and attempt SSHFP resolution. | ||
865 | |||
866 | Prevents a server from skipping SSHFP lookup and forcing a new-hostkey | ||
867 | dialog by offering only certificate keys. | ||
868 | |||
869 | Reported by mcv21 AT cam.ac.uk | ||
870 | - djm@cvs.openbsd.org 2014/04/01 05:32:57 | ||
871 | [packet.c] | ||
872 | demote a debug3 to PACKET_DEBUG; ok markus@ | ||
873 | - djm@cvs.openbsd.org 2014/04/12 04:55:53 | ||
874 | [sshd.c] | ||
875 | avoid crash at exit: check that pmonitor!=NULL before dereferencing; | ||
876 | bz#2225, patch from kavi AT juniper.net | ||
877 | - djm@cvs.openbsd.org 2014/04/16 23:22:45 | ||
878 | [bufaux.c] | ||
879 | skip leading zero bytes in buffer_put_bignum2_from_string(); | ||
880 | reported by jan AT mojzis.com; ok markus@ | ||
881 | - djm@cvs.openbsd.org 2014/04/16 23:28:12 | ||
882 | [ssh-agent.1] | ||
883 | remove the identity files from this manpage - ssh-agent doesn't deal | ||
884 | with them at all and the same information is duplicated in ssh-add.1 | ||
885 | (which does deal with them); prodded by deraadt@ | ||
886 | - djm@cvs.openbsd.org 2014/04/18 23:52:25 | ||
887 | [compat.c compat.h sshconnect2.c sshd.c version.h] | ||
888 | OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections | ||
889 | using the curve25519-sha256@libssh.org KEX exchange method to fail | ||
890 | when connecting with something that implements the spec properly. | ||
891 | |||
892 | Disable this KEX method when speaking to one of the affected | ||
893 | versions. | ||
894 | |||
895 | reported by Aris Adamantiadis; ok markus@ | ||
896 | - djm@cvs.openbsd.org 2014/04/19 05:54:59 | ||
897 | [compat.c] | ||
898 | missing wildcard; pointed out by naddy@ | ||
899 | - tedu@cvs.openbsd.org 2014/04/19 14:53:48 | ||
900 | [ssh-keysign.c sshd.c] | ||
901 | Delete futile calls to RAND_seed. ok djm | ||
902 | NB. Id sync only. This only applies to OpenBSD's libcrypto slashathon | ||
903 | - tedu@cvs.openbsd.org 2014/04/19 18:15:16 | ||
904 | [sshd.8] | ||
905 | remove some really old rsh references | ||
906 | - tedu@cvs.openbsd.org 2014/04/19 18:42:19 | ||
907 | [ssh.1] | ||
908 | delete .xr to hosts.equiv. there's still an unfortunate amount of | ||
909 | documentation referring to rhosts equivalency in here. | ||
910 | - djm@cvs.openbsd.org 2014/04/20 02:30:25 | ||
911 | [misc.c misc.h umac.c] | ||
912 | use get/put_u32 to load values rather than *((UINT32 *)p) that breaks on | ||
913 | strict-alignment architectures; reported by and ok stsp@ | ||
914 | - djm@cvs.openbsd.org 2014/04/20 02:49:32 | ||
915 | [compat.c] | ||
916 | add a canonical 6.6 + curve25519 bignum fix fake version that I can | ||
917 | recommend people use ahead of the openssh-6.7 release | ||
918 | |||
919 | 20140401 | ||
920 | - (djm) On platforms that support it, use prctl() to prevent sftp-server | ||
921 | from accessing /proc/self/{mem,maps}; patch from jann AT thejh.net | ||
922 | - (djm) Use full release (e.g. 6.5p1) in debug output rather than just | ||
923 | version. From des@des.no | ||
924 | |||
925 | 20140317 | ||
926 | - (djm) [sandbox-seccomp-filter.c] Soft-fail stat() syscalls. Add XXX to | ||
927 | remind myself to add sandbox violation logging via the log socket. | ||
928 | |||
929 | 20140314 | ||
930 | - (tim) [opensshd.init.in] Add support for ed25519 | ||
931 | |||
1 | 20140313 | 932 | 20140313 |
2 | - (djm) Release OpenSSH 6.6 | 933 | - (djm) Release OpenSSH 6.6 |
3 | 934 | ||
@@ -2884,4 +3815,3 @@ | |||
2884 | [contrib/suse/openssh.spec] Update for release 6.0 | 3815 | [contrib/suse/openssh.spec] Update for release 6.0 |
2885 | - (djm) [README] Update URL to release notes. | 3816 | - (djm) [README] Update URL to release notes. |
2886 | - (djm) Release openssh-6.0 | 3817 | - (djm) Release openssh-6.0 |
2887 | |||