summaryrefslogtreecommitdiff
path: root/ChangeLog
diff options
context:
space:
mode:
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog12387
1 files changed, 8577 insertions, 3810 deletions
diff --git a/ChangeLog b/ChangeLog
index 63aeae556..092cc48ef 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3817 +1,8584 @@
120131006 1commit 9f82e5a9042f2d872e98f48a876fcab3e25dd9bb
2 - (djm) Release OpenSSH-6.7 2Author: Tim Rice <tim@multitalents.net>
3 3Date: Mon Mar 16 22:49:20 2015 -0700
420141003
5 - (djm) [sshd_config.5] typo; from Iain Morgan
6
720141001
8 - (djm) [openbsd-compat/Makefile.in openbsd-compat/kludge-fd_set.c]
9 [openbsd-compat/openbsd-compat.h] Kludge around bad glibc
10 _FORTIFY_SOURCE check that doesn't grok heap-allocated fd_sets;
11 ok dtucker@
12
1320140910
14 - (djm) [sandbox-seccomp-filter.c] Allow mremap and exit for DietLibc;
15 patch from Felix von Leitner; ok dtucker
16
1720140908
18 - (dtucker) [INSTALL] Update info about egd. ok djm@
19
2020140904
21 - (djm) [openbsd-compat/arc4random.c] Zero seed after keying PRNG
22
2320140903
24 - (djm) [defines.h sshbuf.c] Move __predict_true|false to defines.h and
25 conditionalise to avoid duplicate definition.
26 - (djm) [contrib/cygwin/ssh-host-config] Fix old code leading to
27 permissions/ACLs; from Corinna Vinschen
28
2920140830
30 - (djm) [openbsd-compat/openssl-compat.h] add
31 OPENSSL_[RD]SA_MAX_MODULUS_BITS defines for OpenSSL that lacks them
32 - (djm) [misc.c] Missing newline between functions
33 - (djm) [openbsd-compat/openssl-compat.h] add include guard
34 - (djm) [Makefile.in] Make TEST_SHELL a variable; "good idea" tim@
35
3620140827
37 - (djm) [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c]
38 [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c]
39 [regress/unittests/sshkey/common.c]
40 [regress/unittests/sshkey/test_file.c]
41 [regress/unittests/sshkey/test_fuzz.c]
42 [regress/unittests/sshkey/test_sshkey.c] Don't include openssl/ec.h
43 on !ECC OpenSSL systems
44 - (djm) [monitor.c sshd.c] SIGXFSZ needs to be ignored in postauth
45 monitor, not preauth; bz#2263
46 - (djm) [openbsd-compat/explicit_bzero.c] implement explicit_bzero()
47 using memset_s() where possible; improve fallback to indirect bzero
48 via a volatile pointer to give it more of a chance to avoid being
49 optimised away.
50
5120140825
52 - (djm) [bufec.c] Skip this file on !ECC OpenSSL
53 - (djm) [INSTALL] Recommend libcrypto be built -fPIC, mention LibreSSL,
54 update OpenSSL version requirement.
55
5620140824
57 - (djm) [sftp-server.c] Some systems (e.g. Irix) have prctl() but not
58 PR_SET_DUMPABLE, so adjust ifdef; reported by Tom Christensen
59
6020140823
61 - (djm) [sshd.c] Ignore SIGXFSZ in preauth monitor child; can explode on
62 lastlog writing on platforms with high UIDs; bz#2263
63 - (djm) [configure.ac] We now require a working vsnprintf everywhere (not
64 just for systems that lack asprintf); check for it always and extend
65 test to catch more brokenness. Fixes builds on Solaris <= 9
66
6720140822
68 - (djm) [configure.ac] include leading zero characters in OpenSSL version
69 number; fixes test for unsupported versions
70 - (djm) [sshbuf-getput-crypto.c] Fix compilation when OpenSSL lacks ECC
71 - (djm) [openbsd-compat/bsd-snprintf.c] Fix compilation failure (prototype/
72 definition mismatch) and warning for broken/missing snprintf case.
73 - (djm) [configure.ac] double braces to appease autoconf
74
7520140821
76 - (djm) [Makefile.in] fix reference to libtest_helper.a in sshkey test too.
77 - (djm) [key.h] Fix ifdefs for no-ECC OpenSSL
78 - (djm) [regress/unittests/test_helper/test_helper.c] Fix for systems that
79 don't set __progname. Diagnosed by Tom Christensen.
80
8120140820
82 - (djm) [configure.ac] Check OpenSSL version is supported at configure time;
83 suggested by Kevin Brott
84 - (djm) [Makefile.in] refer to libtest_helper.a by explicit path rather than
85 -L/-l; fixes linking problems on some platforms
86 - (djm) [sshkey.h] Fix compilation when OpenSSL lacks ECC
87 - (djm) [contrib/cygwin/README] Correct build instructions; from Corinna
88
8920140819
90 - (djm) [serverloop.c] Fix syntax error on Cygwin; from Corinna Vinschen
91 - (djm) [sshbuf.h] Fix compilation on systems without OPENSSL_HAS_ECC.
92 - (djm) [ssh-dss.c] Include openssl/dsa.h for DSA_SIG
93 - (djm) [INSTALL contrib/caldera/openssh.spec contrib/cygwin/README]
94 [contrib/redhat/openssh.spec contrib/suse/openssh.spec] Remove mentions
95 of TCP wrappers.
96
9720140811
98 - (djm) [myproposal.h] Make curve25519 KEX dependent on
99 HAVE_EVP_SHA256 instead of OPENSSL_HAS_ECC.
100
10120140810
102 - (djm) [README contrib/caldera/openssh.spec]
103 [contrib/redhat/openssh.spec contrib/suse/openssh.spec] Update versions
104
10520140801
106 - (djm) [regress/multiplex.sh] Skip test for non-OpenBSD netcat. We need
107 a better solution, but this will have to do for now.
108 - (djm) [regress/multiplex.sh] Instruct nc not to quit as soon as stdin
109 is closed; avoid regress failures when stdin is /dev/null
110 - (djm) [regress/multiplex.sh] Use -d (detach stdin) flag to disassociate
111 nc from stdin, it's more portable
112
11320140730
114 - OpenBSD CVS Sync
115 - millert@cvs.openbsd.org 2014/07/24 22:57:10
116 [ssh.1]
117 Mention UNIX-domain socket forwarding too. OK jmc@ deraadt@
118 - dtucker@cvs.openbsd.org 2014/07/25 21:22:03
119 [ssh-agent.c]
120 Clear buffer used for handling messages. This prevents keys being
121 left in memory after they have been expired or deleted in some cases
122 (but note that ssh-agent is setgid so you would still need root to
123 access them). Pointed out by Kevin Burns, ok deraadt
124 - schwarze@cvs.openbsd.org 2014/07/28 15:40:08
125 [sftp-server.8 sshd_config.5]
126 some systems no longer need /dev/log;
127 issue noticed by jirib;
128 ok deraadt
129
13020140725
131 - (djm) [regress/multiplex.sh] restore incorrectly deleted line;
132 pointed out by Christian Hesse
133
13420140722
135 - (djm) [regress/multiplex.sh] ssh mux master lost -N somehow;
136 put it back
137 - (djm) [regress/multiplex.sh] change the test for still-open Unix
138 domain sockets to be robust against nc implementations that produce
139 error messages.
140 - (dtucker) [regress/unittests/sshkey/test_{file,fuzz,sshkey}.c] Wrap ecdsa-
141 specific tests inside OPENSSL_HAS_ECC.
142 - (dtucker) OpenBSD CVS Sync
143 - dtucker@cvs.openbsd.org 2014/07/22 01:18:50
144 [key.c]
145 Prevent spam from key_load_private_pem during hostbased auth. ok djm@
146 - guenther@cvs.openbsd.org 2014/07/22 07:13:42
147 [umac.c]
148 Convert from <sys/endian.h> to the shiney new <endian.h>
149 ok dtucker@, who also confirmed that -portable handles this already
150 (ID sync only, includes.h pulls in endian.h if available.)
151 - djm@cvs.openbsd.org 2014/07/22 01:32:12
152 [regress/multiplex.sh]
153 change the test for still-open Unix domain sockets to be robust against
154 nc implementations that produce error messages. from -portable
155 (Id sync only)
156 - dtucker@cvs.openbsd.org 2014/07/22 23:23:22
157 [regress/unittests/sshkey/mktestdata.sh]
158 Sign test certs with ed25519 instead of ecdsa so that they'll work in
159 -portable on platforms that don't have ECDSA in their OpenSSL. ok djm
160 - dtucker@cvs.openbsd.org 2014/07/22 23:57:40
161 [regress/unittests/sshkey/mktestdata.sh]
162 Add $OpenBSD tag to make syncs easier
163 - dtucker@cvs.openbsd.org 2014/07/22 23:35:38
164 [regress/unittests/sshkey/testdata/*]
165 Regenerate test keys with certs signed with ed25519 instead of ecdsa.
166 These can be used in -portable on platforms that don't support ECDSA.
167
16820140721
169 - OpenBSD CVS Sync
170 - millert@cvs.openbsd.org 2014/07/15 15:54:15
171 [forwarding.sh multiplex.sh]
172 Add support for Unix domain socket forwarding. A remote TCP port
173 may be forwarded to a local Unix domain socket and vice versa or
174 both ends may be a Unix domain socket. This is a reimplementation
175 of the streamlocal patches by William Ahern from:
176 http://www.25thandclement.com/~william/projects/streamlocal.html
177 OK djm@ markus@
178 - (djm) [regress/multiplex.sh] Not all netcat accept the -N option.
179 - (dtucker) [sshkey.c] ifdef out unused variable when compiling without
180 OPENSSL_HAS_ECC.
181
18220140721
183 - (dtucker) [cipher.c openbsd-compat/openssl-compat.h] Restore the bits
184 needed to build AES CTR mode against OpenSSL 0.9.8f and above. ok djm
185 - (dtucker) [regress/unittests/sshkey/
186 {common,test_file,test_fuzz,test_sshkey}.c] Wrap stdint.h includes in
187 ifdefs.
188
18920140719
190 - (tim) [openbsd-compat/port-uw.c] Include misc.h for fwd_opts, used
191 in servconf.h.
192
19320140718
194 - OpenBSD CVS Sync
195 - millert@cvs.openbsd.org 2014/07/15 15:54:14
196 [PROTOCOL auth-options.c auth-passwd.c auth-rh-rsa.c auth-rhosts.c]
197 [auth-rsa.c auth.c auth1.c auth2-hostbased.c auth2-kbdint.c auth2-none.c]
198 [auth2-passwd.c auth2-pubkey.c auth2.c canohost.c channels.c channels.h]
199 [clientloop.c misc.c misc.h monitor.c mux.c packet.c readconf.c]
200 [readconf.h servconf.c servconf.h serverloop.c session.c ssh-agent.c]
201 [ssh.c ssh_config.5 sshconnect.c sshconnect1.c sshconnect2.c sshd.c]
202 [sshd_config.5 sshlogin.c]
203 Add support for Unix domain socket forwarding. A remote TCP port
204 may be forwarded to a local Unix domain socket and vice versa or
205 both ends may be a Unix domain socket. This is a reimplementation
206 of the streamlocal patches by William Ahern from:
207 http://www.25thandclement.com/~william/projects/streamlocal.html
208 OK djm@ markus@
209 - jmc@cvs.openbsd.org 2014/07/16 14:48:57
210 [ssh.1]
211 add the streamlocal* options to ssh's -o list; millert says they're
212 irrelevant for scp/sftp;
213 ok markus millert
214 - djm@cvs.openbsd.org 2014/07/17 00:10:56
215 [sandbox-systrace.c]
216 ifdef SYS_sendsyslog so this will compile without patching on -stable
217 - djm@cvs.openbsd.org 2014/07/17 00:10:18
218 [mux.c]
219 preserve errno across syscall
220 - djm@cvs.openbsd.org 2014/07/17 00:12:03
221 [key.c]
222 silence "incorrect passphrase" error spam; reported and ok dtucker@
223 - djm@cvs.openbsd.org 2014/07/17 07:22:19
224 [mux.c ssh.c]
225 reflect stdio-forward ("ssh -W host:port ...") failures in exit status.
226 previously we were always returning 0. bz#2255 reported by Brendan
227 Germain; ok dtucker
228 - djm@cvs.openbsd.org 2014/07/18 02:46:01
229 [ssh-agent.c]
230 restore umask around listener socket creation (dropped in streamlocal patch
231 merge)
232 - (dtucker) [auth2-gss.c gss-serv-krb5.c] Include misc.h for fwd_opts, used
233 in servconf.h.
234 - (dtucker) [Makefile.in] Add a t-exec target to run just the executable
235 tests.
236 - (dtucker) [key.c sshkey.c] Put new ecdsa bits inside ifdef OPENSSL_HAS_ECC.
237
23820140717
239 - (djm) [digest-openssl.c] Preserve array order when disabling digests.
240 Reported by Petr Lautrbach.
241 - OpenBSD CVS Sync
242 - deraadt@cvs.openbsd.org 2014/07/11 08:09:54
243 [sandbox-systrace.c]
244 Permit use of SYS_sendsyslog from inside the sandbox. Clock is ticking,
245 update your kernels and sshd soon.. libc will start using sendsyslog()
246 in about 4 days.
247 - tedu@cvs.openbsd.org 2014/07/11 13:54:34
248 [myproposal.h]
249 by popular demand, add back hamc-sha1 to server proposal for better compat
250 with many clients still in use. ok deraadt
251
25220140715
253 - (djm) [configure.ac] Delay checks for arc4random* until after libcrypto
254 has been located; fixes builds agains libressl-portable
255
25620140711
257 - OpenBSD CVS Sync
258 - benno@cvs.openbsd.org 2014/07/09 14:15:56
259 [ssh-add.c]
260 fix ssh-add crash while loading more than one key
261 ok markus@
262 4
26320140709 5 portability fix: Solaris systems may not have a grep that understands -q
264 - OpenBSD CVS Sync
265 - djm@cvs.openbsd.org 2014/07/07 08:19:12
266 [ssh_config.5]
267 mention that ProxyCommand is executed using shell "exec" to avoid
268 a lingering process; bz#1977
269 - djm@cvs.openbsd.org 2014/07/09 01:45:10
270 [sftp.c]
271 more useful error message when GLOB_NOSPACE occurs;
272 bz#2254, patch from Orion Poplawski
273 - djm@cvs.openbsd.org 2014/07/09 03:02:15
274 [key.c]
275 downgrade more error() to debug() to better match what old authfile.c
276 did; suppresses spurious errors with hostbased authentication enabled
277 - djm@cvs.openbsd.org 2014/07/06 07:42:03
278 [multiplex.sh test-exec.sh]
279 add a hook to the cleanup() function to kill $SSH_PID if it is set
280
281 use it to kill the mux master started in multiplex.sh (it was being left
282 around on fatal failures)
283 - djm@cvs.openbsd.org 2014/07/07 08:15:26
284 [multiplex.sh]
285 remove forced-fatal that I stuck in there to test the new cleanup
286 logic and forgot to remove...
287
28820140706
289 - OpenBSD CVS Sync
290 - djm@cvs.openbsd.org 2014/07/03 23:18:35
291 [authfile.h]
292 remove leakmalloc droppings
293 - djm@cvs.openbsd.org 2014/07/05 23:11:48
294 [channels.c]
295 fix remote-forward cancel regression; ok markus@
296
29720140704
298 - OpenBSD CVS Sync
299 - jsing@cvs.openbsd.org 2014/07/03 12:42:16
300 [cipher-chachapoly.c]
301 Call chacha_ivsetup() immediately before chacha_encrypt_bytes() - this
302 makes it easier to verify that chacha_encrypt_bytes() is only called once
303 per chacha_ivsetup() call.
304 ok djm@
305 - djm@cvs.openbsd.org 2014/07/03 22:23:46
306 [sshconnect.c]
307 when rekeying, skip file/DNS lookup if it is the same as the key sent
308 during initial key exchange. bz#2154 patch from Iain Morgan; ok markus@
309 - djm@cvs.openbsd.org 2014/07/03 22:33:41
310 [channels.c]
311 allow explicit ::1 and 127.0.0.1 forwarding bind addresses when
312 GatewayPorts=no; allows client to choose address family;
313 bz#2222 ok markus@
314 - djm@cvs.openbsd.org 2014/07/03 22:40:43
315 [servconf.c servconf.h session.c sshd.8 sshd_config.5]
316 Add a sshd_config PermitUserRC option to control whether ~/.ssh/rc is
317 executed, mirroring the no-user-rc authorized_keys option;
318 bz#2160; ok markus@
319
32020140703
321 - (djm) [digest-openssl.c configure.ac] Disable RIPEMD160 if libcrypto
322 doesn't support it.
323 - (djm) [monitor_fdpass.c] Use sys/poll.h if poll.h doesn't exist;
324 bz#2237
325 - OpenBSD CVS Sync
326 - djm@cvs.openbsd.org 2014/07/03 01:45:38
327 [sshkey.c]
328 make Ed25519 keys' title fit properly in the randomart border; bz#2247
329 based on patch from Christian Hesse
330 - djm@cvs.openbsd.org 2014/07/03 03:11:03
331 [ssh-agent.c]
332 Only cleanup agent socket in the main agent process and not in any
333 subprocesses it may have started (e.g. forked askpass). Fixes
334 agent sockets being zapped when askpass processes fatal();
335 bz#2236 patch from Dmitry V. Levin
336 - djm@cvs.openbsd.org 2014/07/03 03:15:01
337 [ssh-add.c]
338 make stdout line-buffered; saves partial output getting lost when
339 ssh-add fatal()s part-way through (e.g. when listing keys from an
340 agent that supports key types that ssh-add doesn't);
341 bz#2234, reported by Phil Pennock
342 - djm@cvs.openbsd.org 2014/07/03 03:26:43
343 [digest-openssl.c]
344 use EVP_Digest() for one-shot hash instead of creating, updating,
345 finalising and destroying a context.
346 bz#2231, based on patch from Timo Teras
347 - djm@cvs.openbsd.org 2014/07/03 03:34:09
348 [gss-serv.c session.c ssh-keygen.c]
349 standardise on NI_MAXHOST for gethostname() string lengths; about
350 1/2 the cases were using it already. Fixes bz#2239 en passant
351 - djm@cvs.openbsd.org 2014/07/03 03:47:27
352 [ssh-keygen.c]
353 When hashing or removing hosts using ssh-keygen, don't choke on
354 @revoked markers and don't remove @cert-authority markers;
355 bz#2241, reported by mlindgren AT runelind.net
356 - djm@cvs.openbsd.org 2014/07/03 04:36:45
357 [digest.h]
358 forward-declare struct sshbuf so consumers don't need to include sshbuf.h
359 - djm@cvs.openbsd.org 2014/07/03 05:32:36
360 [ssh_config.5]
361 mention '%%' escape sequence in HostName directives and how it may
362 be used to specify IPv6 link-local addresses
363 - djm@cvs.openbsd.org 2014/07/03 05:38:17
364 [ssh.1]
365 document that -g will only work in the multiplexed case if applied to
366 the mux master
367 - djm@cvs.openbsd.org 2014/07/03 06:39:19
368 [ssh.c ssh_config.5]
369 Add a %C escape sequence for LocalCommand and ControlPath that expands
370 to a unique identifer based on a has of the tuple of (local host,
371 remote user, hostname, port).
372
373 Helps avoid exceeding sockaddr_un's miserly pathname limits for mux
374 control paths.
375
376 bz#2220, based on patch from mancha1 AT zoho.com; ok markus@
377 - jmc@cvs.openbsd.org 2014/07/03 07:45:27
378 [ssh_config.5]
379 escape %C since groff thinks it part of an Rs/Re block;
380 - djm@cvs.openbsd.org 2014/07/03 11:16:55
381 [auth.c auth.h auth1.c auth2.c]
382 make the "Too many authentication failures" message include the
383 user, source address, port and protocol in a format similar to the
384 authentication success / failure messages; bz#2199, ok dtucker
385
38620140702
387 - OpenBSD CVS Sync
388 - deraadt@cvs.openbsd.org 2014/06/13 08:26:29
389 [sandbox-systrace.c]
390 permit SYS_getentropy
391 from matthew
392 - matthew@cvs.openbsd.org 2014/06/18 02:59:13
393 [sandbox-systrace.c]
394 Now that we have a dedicated getentropy(2) system call for
395 arc4random(3), we can disallow __sysctl(2) in OpenSSH's systrace
396 sandbox.
397
398 ok djm
399 - naddy@cvs.openbsd.org 2014/06/18 15:42:09
400 [sshbuf-getput-crypto.c]
401 The ssh_get_bignum functions must accept the same range of bignums
402 the corresponding ssh_put_bignum functions create. This fixes the
403 use of 16384-bit RSA keys (bug reported by Eivind Evensen).
404 ok djm@
405 - djm@cvs.openbsd.org 2014/06/24 00:52:02
406 [krl.c]
407 fix bug in KRL generation: multiple consecutive revoked certificate
408 serial number ranges could be serialised to an invalid format.
409
410 Readers of a broken KRL caused by this bug will fail closed, so no
411 should-have-been-revoked key will be accepted.
412 - djm@cvs.openbsd.org 2014/06/24 01:13:21
413 [Makefile.in auth-bsdauth.c auth-chall.c auth-options.c auth-rsa.c
414 [auth2-none.c auth2-pubkey.c authfile.c authfile.h cipher-3des1.c
415 [cipher-chachapoly.c cipher-chachapoly.h cipher.c cipher.h
416 [digest-libc.c digest-openssl.c digest.h dns.c entropy.c hmac.h
417 [hostfile.c key.c key.h krl.c monitor.c packet.c rsa.c rsa.h
418 [ssh-add.c ssh-agent.c ssh-dss.c ssh-ecdsa.c ssh-ed25519.c
419 [ssh-keygen.c ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c
420 [ssh-rsa.c sshbuf-misc.c sshbuf.h sshconnect.c sshconnect1.c
421 [sshconnect2.c sshd.c sshkey.c sshkey.h
422 [openbsd-compat/openssl-compat.c openbsd-compat/openssl-compat.h]
423 New key API: refactor key-related functions to be more library-like,
424 existing API is offered as a set of wrappers.
425
426 with and ok markus@
427
428 Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
429 Dempsky and Ron Bowes for a detailed review a few months ago.
430 NB. This commit also removes portable OpenSSH support for OpenSSL
431 <0.9.8e.
432 - djm@cvs.openbsd.org 2014/06/24 02:19:48
433 [ssh.c]
434 don't fatal() when hostname canonicalisation fails with a
435 ProxyCommand in use; continue and allow the ProxyCommand to
436 connect anyway (e.g. to a host with a name outside the DNS
437 behind a bastion)
438 - djm@cvs.openbsd.org 2014/06/24 02:21:01
439 [scp.c]
440 when copying local->remote fails during read, don't send uninitialised
441 heap to the remote end. Reported by Jann Horn
442 - deraadt@cvs.openbsd.org 2014/06/25 14:16:09
443 [sshbuf.c]
444 unblock SIGSEGV before raising it
445 ok djm
446 - markus@cvs.openbsd.org 2014/06/27 16:41:56
447 [channels.c channels.h clientloop.c ssh.c]
448 fix remote fwding with same listen port but different listen address
449 with gerhard@, ok djm@
450 - markus@cvs.openbsd.org 2014/06/27 18:50:39
451 [ssh-add.c]
452 fix loading of private keys
453 - djm@cvs.openbsd.org 2014/06/30 12:54:39
454 [key.c]
455 suppress spurious error message when loading key with a passphrase;
456 reported by kettenis@ ok markus@
457 - djm@cvs.openbsd.org 2014/07/02 04:59:06
458 [cipher-3des1.c]
459 fix ssh protocol 1 on the server that regressed with the sshkey change
460 (sometimes fatal() after auth completed), make file return useful status
461 codes.
462 NB. Id sync only for these two. They were bundled into the sshkey merge
463 above, since it was easier to sync the entire file and then apply
464 portable-specific changed atop it.
465 - djm@cvs.openbsd.org 2014/04/30 05:32:00
466 [regress/Makefile]
467 unit tests for new buffer API; including basic fuzz testing
468 NB. Id sync only.
469 - djm@cvs.openbsd.org 2014/05/21 07:04:21
470 [regress/integrity.sh]
471 when failing because of unexpected output, show the offending output
472 - djm@cvs.openbsd.org 2014/06/24 01:04:43
473 [regress/krl.sh]
474 regress test for broken consecutive revoked serial number ranges
475 - djm@cvs.openbsd.org 2014/06/24 01:14:17
476 [Makefile.in regress/Makefile regress/unittests/Makefile]
477 [regress/unittests/sshkey/Makefile]
478 [regress/unittests/sshkey/common.c]
479 [regress/unittests/sshkey/common.h]
480 [regress/unittests/sshkey/mktestdata.sh]
481 [regress/unittests/sshkey/test_file.c]
482 [regress/unittests/sshkey/test_fuzz.c]
483 [regress/unittests/sshkey/test_sshkey.c]
484 [regress/unittests/sshkey/tests.c]
485 [regress/unittests/sshkey/testdata/dsa_1]
486 [regress/unittests/sshkey/testdata/dsa_1-cert.fp]
487 [regress/unittests/sshkey/testdata/dsa_1-cert.pub]
488 [regress/unittests/sshkey/testdata/dsa_1.fp]
489 [regress/unittests/sshkey/testdata/dsa_1.fp.bb]
490 [regress/unittests/sshkey/testdata/dsa_1.param.g]
491 [regress/unittests/sshkey/testdata/dsa_1.param.priv]
492 [regress/unittests/sshkey/testdata/dsa_1.param.pub]
493 [regress/unittests/sshkey/testdata/dsa_1.pub]
494 [regress/unittests/sshkey/testdata/dsa_1_pw]
495 [regress/unittests/sshkey/testdata/dsa_2]
496 [regress/unittests/sshkey/testdata/dsa_2.fp]
497 [regress/unittests/sshkey/testdata/dsa_2.fp.bb]
498 [regress/unittests/sshkey/testdata/dsa_2.pub]
499 [regress/unittests/sshkey/testdata/dsa_n]
500 [regress/unittests/sshkey/testdata/dsa_n_pw]
501 [regress/unittests/sshkey/testdata/ecdsa_1]
502 [regress/unittests/sshkey/testdata/ecdsa_1-cert.fp]
503 [regress/unittests/sshkey/testdata/ecdsa_1-cert.pub]
504 [regress/unittests/sshkey/testdata/ecdsa_1.fp]
505 [regress/unittests/sshkey/testdata/ecdsa_1.fp.bb]
506 [regress/unittests/sshkey/testdata/ecdsa_1.param.curve]
507 [regress/unittests/sshkey/testdata/ecdsa_1.param.priv]
508 [regress/unittests/sshkey/testdata/ecdsa_1.param.pub]
509 [regress/unittests/sshkey/testdata/ecdsa_1.pub]
510 [regress/unittests/sshkey/testdata/ecdsa_1_pw]
511 [regress/unittests/sshkey/testdata/ecdsa_2]
512 [regress/unittests/sshkey/testdata/ecdsa_2.fp]
513 [regress/unittests/sshkey/testdata/ecdsa_2.fp.bb]
514 [regress/unittests/sshkey/testdata/ecdsa_2.param.curve]
515 [regress/unittests/sshkey/testdata/ecdsa_2.param.priv]
516 [regress/unittests/sshkey/testdata/ecdsa_2.param.pub]
517 [regress/unittests/sshkey/testdata/ecdsa_2.pub]
518 [regress/unittests/sshkey/testdata/ecdsa_n]
519 [regress/unittests/sshkey/testdata/ecdsa_n_pw]
520 [regress/unittests/sshkey/testdata/ed25519_1]
521 [regress/unittests/sshkey/testdata/ed25519_1-cert.fp]
522 [regress/unittests/sshkey/testdata/ed25519_1-cert.pub]
523 [regress/unittests/sshkey/testdata/ed25519_1.fp]
524 [regress/unittests/sshkey/testdata/ed25519_1.fp.bb]
525 [regress/unittests/sshkey/testdata/ed25519_1.pub]
526 [regress/unittests/sshkey/testdata/ed25519_1_pw]
527 [regress/unittests/sshkey/testdata/ed25519_2]
528 [regress/unittests/sshkey/testdata/ed25519_2.fp]
529 [regress/unittests/sshkey/testdata/ed25519_2.fp.bb]
530 [regress/unittests/sshkey/testdata/ed25519_2.pub]
531 [regress/unittests/sshkey/testdata/pw]
532 [regress/unittests/sshkey/testdata/rsa1_1]
533 [regress/unittests/sshkey/testdata/rsa1_1.fp]
534 [regress/unittests/sshkey/testdata/rsa1_1.fp.bb]
535 [regress/unittests/sshkey/testdata/rsa1_1.param.n]
536 [regress/unittests/sshkey/testdata/rsa1_1.pub]
537 [regress/unittests/sshkey/testdata/rsa1_1_pw]
538 [regress/unittests/sshkey/testdata/rsa1_2]
539 [regress/unittests/sshkey/testdata/rsa1_2.fp]
540 [regress/unittests/sshkey/testdata/rsa1_2.fp.bb]
541 [regress/unittests/sshkey/testdata/rsa1_2.param.n]
542 [regress/unittests/sshkey/testdata/rsa1_2.pub]
543 [regress/unittests/sshkey/testdata/rsa_1]
544 [regress/unittests/sshkey/testdata/rsa_1-cert.fp]
545 [regress/unittests/sshkey/testdata/rsa_1-cert.pub]
546 [regress/unittests/sshkey/testdata/rsa_1.fp]
547 [regress/unittests/sshkey/testdata/rsa_1.fp.bb]
548 [regress/unittests/sshkey/testdata/rsa_1.param.n]
549 [regress/unittests/sshkey/testdata/rsa_1.param.p]
550 [regress/unittests/sshkey/testdata/rsa_1.param.q]
551 [regress/unittests/sshkey/testdata/rsa_1.pub]
552 [regress/unittests/sshkey/testdata/rsa_1_pw]
553 [regress/unittests/sshkey/testdata/rsa_2]
554 [regress/unittests/sshkey/testdata/rsa_2.fp]
555 [regress/unittests/sshkey/testdata/rsa_2.fp.bb]
556 [regress/unittests/sshkey/testdata/rsa_2.param.n]
557 [regress/unittests/sshkey/testdata/rsa_2.param.p]
558 [regress/unittests/sshkey/testdata/rsa_2.param.q]
559 [regress/unittests/sshkey/testdata/rsa_2.pub]
560 [regress/unittests/sshkey/testdata/rsa_n]
561 [regress/unittests/sshkey/testdata/rsa_n_pw]
562 unit and fuzz tests for new key API
563 - (djm) [sshkey.c] Conditionalise inclusion of util.h
564 - (djm) [regress/Makefile] fix execution of sshkey unit/fuzz test
565
56620140618
567 - (tim) [openssh/session.c] Work around to get chroot sftp working on UnixWare
568
56920140617
570 - (dtucker) [entropy.c openbsd-compat/openssl-compat.{c,h}
571 openbsd-compat/regress/{.cvsignore,Makefile.in,opensslvertest.c}]
572 Move the OpenSSL header/library version test into its own function and add
573 tests for it. Fix it to allow fix version upgrades (but not downgrades).
574 Prompted by chl@ via OpenSMTPD (issue #462) and Debian (bug #748150).
575 ok djm@ chl@
576
57720140616
578 - (dtucker) [defines.h] Fix undef of _PATH_MAILDIR. From rak at debian via
579 OpenSMTPD and chl@
580
58120140612
582 - (dtucker) [configure.ac] Remove tcpwrappers support, support has already
583 been removed from sshd.c.
584
58520140611
586 - (dtucker) [defines.h] Add va_copy if we don't already have it, taken from
587 openbsd-compat/bsd-asprintf.c.
588 - (dtucker) [regress/unittests/sshbuf/*.c regress/unittests/test_helper/*]
589 Wrap stdlib.h include an ifdef for platforms that don't have it.
590 - (tim) [regress/unittests/test_helper/test_helper.h] Add includes.h for
591 u_intXX_t types.
592
59320140610
594 - (dtucker) [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c
595 regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] Only do NISTP256
596 curve tests if OpenSSL has them.
597 - (dtucker) [myprosal.h] Don't include curve25519-sha256@libssh.org in
598 the proposal if the version of OpenSSL we're using doesn't support ECC.
599 - (dtucker) [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] ifdef
600 ECC variable too.
601 - (dtucker) OpenBSD CVS Sync
602 - djm@cvs.openbsd.org 2014/06/05 22:17:50
603 [sshconnect2.c]
604 fix inverted test that caused PKCS#11 keys that were explicitly listed
605 not to be preferred. Reported by Dirk-Willem van Gulik
606 - dtucker@cvs.openbsd.org 2014/06/10 21:46:11
607 [sshbuf.h]
608 Group ECC functions together to make things a little easier in -portable.
609 "doesn't bother me" deraadt@
610 - (dtucker) [sshbuf.h] Only declare ECC functions if building without
611 OpenSSL or if OpenSSL has ECC.
612 - (dtucker) [openbsd-compat/arc4random.c] Use explicit_bzero instead of an
613 assigment that might get optimized out. ok djm@
614 - (dtucker) [bufaux.c bufbn.c bufec.c buffer.c] Pull in includes.h for
615 compat stuff, specifically whether or not OpenSSL has ECC.
616
61720140527
618 - (djm) [cipher.c] Fix merge botch.
619 - (djm) [contrib/cygwin/ssh-host-config] Updated Cygwin ssh-host-config
620 from Corinna Vinschen, fixing a number of bugs and preparing for
621 Cygwin 1.7.30.
622 - (djm) [configure.ac openbsd-compat/bsd-cygwin_util.c]
623 [openbsd-compat/bsd-cygwin_util.h] On Cygwin, determine privilege
624 separation user at runtime, since it may need to be a domain account.
625 Patch from Corinna Vinschen.
626
62720140522
628 - (djm) [Makefile.in] typo in path
629
63020140521
631 - (djm) [commit configure.ac defines.h sshpty.c] don't attempt to use
632 vhangup on Linux. It doens't work for non-root users, and for them
633 it just messes up the tty settings.
634 - (djm) [misc.c] Use CLOCK_BOOTTIME in preference to CLOCK_MONOTONIC
635 when it is available. It takes into account time spent suspended,
636 thereby ensuring timeouts (e.g. for expiring agent keys) fire
637 correctly. bz#2228 reported by John Haxby
638
63920140519
640 - (djm) [rijndael.c rijndael.h] Sync with newly-ressurected versions ine
641 OpenBSD
642 - OpenBSD CVS Sync
643 - logan@cvs.openbsd.org 2014/04/20 09:24:26
644 [dns.c dns.h ssh-keygen.c]
645 Add support for SSHFP DNS records for ED25519 key types.
646 OK from djm@
647 - logan@cvs.openbsd.org 2014/04/21 14:36:16
648 [sftp-client.c sftp-client.h sftp.c]
649 Implement sftp upload resume support.
650 OK from djm@, with input from guenther@, mlarkin@ and
651 okan@
652 - logan@cvs.openbsd.org 2014/04/22 10:07:12
653 [sftp.c]
654 Sort the sftp command list.
655 OK from djm@
656 - logan@cvs.openbsd.org 2014/04/22 12:42:04
657 [sftp.1]
658 Document sftp upload resume.
659 OK from djm@, with feedback from okan@.
660 - jmc@cvs.openbsd.org 2014/04/22 14:16:30
661 [sftp.1]
662 zap eol whitespace;
663 - djm@cvs.openbsd.org 2014/04/23 12:42:34
664 [readconf.c]
665 don't record duplicate IdentityFiles
666 - djm@cvs.openbsd.org 2014/04/28 03:09:18
667 [authfile.c bufaux.c buffer.h channels.c krl.c mux.c packet.c packet.h]
668 [ssh-keygen.c]
669 buffer_get_string_ptr's return should be const to remind
670 callers that futzing with it will futz with the actual buffer
671 contents
672 - djm@cvs.openbsd.org 2014/04/29 13:10:30
673 [clientloop.c serverloop.c]
674 bz#1818 - don't send channel success/failre replies on channels that
675 have sent a close already; analysis and patch from Simon Tatham;
676 ok markus@
677 - markus@cvs.openbsd.org 2014/04/29 18:01:49
678 [auth.c authfd.c authfile.c bufaux.c cipher.c cipher.h hostfile.c]
679 [kex.c key.c mac.c monitor.c monitor_wrap.c myproposal.h packet.c]
680 [roaming_client.c ssh-agent.c ssh-keygen.c ssh-keyscan.c ssh-keysign.c]
681 [ssh-pkcs11.h ssh.c sshconnect.c sshconnect2.c sshd.c]
682 make compiling against OpenSSL optional (make OPENSSL=no);
683 reduces algorithms to curve25519, aes-ctr, chacha, ed25519;
684 allows us to explore further options; with and ok djm
685 - dtucker@cvs.openbsd.org 2014/04/29 19:58:50
686 [sftp.c]
687 Move nulling of variable next to where it's freed. ok markus@
688 - dtucker@cvs.openbsd.org 2014/04/29 20:36:51
689 [sftp.c]
690 Don't attempt to append a nul quote char to the filename. Should prevent
691 fatal'ing with "el_insertstr failed" when there's a single quote char
692 somewhere in the string. bz#2238, ok markus@
693 - djm@cvs.openbsd.org 2014/04/30 05:29:56
694 [bufaux.c bufbn.c bufec.c buffer.c buffer.h sshbuf-getput-basic.c]
695 [sshbuf-getput-crypto.c sshbuf-misc.c sshbuf.c sshbuf.h ssherr.c]
696 [ssherr.h]
697 New buffer API; the first installment of the conversion/replacement
698 of OpenSSH's internals to make them usable as a standalone library.
699
700 This includes a set of wrappers to make it compatible with the
701 existing buffer API so replacement can occur incrementally.
702
703 With and ok markus@
704
705 Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
706 Dempsky and Ron Bowes for a detailed review.
707 - naddy@cvs.openbsd.org 2014/04/30 19:07:48
708 [mac.c myproposal.h umac.c]
709 UMAC can use our local fallback implementation of AES when OpenSSL isn't
710 available. Glue code straight from Ted Krovetz's original umac.c.
711 ok markus@
712 - djm@cvs.openbsd.org 2014/05/02 03:27:54
713 [chacha.h cipher-chachapoly.h digest.h hmac.h kex.h kexc25519.c]
714 [misc.h poly1305.h ssh-pkcs11.c defines.h]
715 revert __bounded change; it causes way more problems for portable than
716 it solves; pointed out by dtucker@
717 - markus@cvs.openbsd.org 2014/05/03 17:20:34
718 [monitor.c packet.c packet.h]
719 unbreak compression, by re-init-ing the compression code in the
720 post-auth child. the new buffer code is more strict, and requires
721 buffer_init() while the old code was happy after a bzero();
722 originally from djm@
723 - logan@cvs.openbsd.org 2014/05/05 07:02:30
724 [sftp.c]
725 Zap extra whitespace.
726
727 OK from djm@ and dtucker@
728 - (djm) [configure.ac] Unconditionally define WITH_OPENSSL until we write
729 portability glue to support building without libcrypto
730 - (djm) [Makefile.in configure.ac sshbuf-getput-basic.c]
731 [sshbuf-getput-crypto.c sshbuf.c] compilation and portability fixes
732 - OpenBSD CVS Sync
733 - djm@cvs.openbsd.org 2014/03/13 20:44:49
734 [login-timeout.sh]
735 this test is a sorry mess of race conditions; add another sleep
736 to avoid a failure on slow machines (at least until I find a
737 better way)
738 - djm@cvs.openbsd.org 2014/04/21 22:15:37
739 [dhgex.sh integrity.sh kextype.sh rekey.sh try-ciphers.sh]
740 repair regress tests broken by server-side default cipher/kex/mac changes
741 by ensuring that the option under test is included in the server's
742 algorithm list
743 - dtucker@cvs.openbsd.org 2014/05/03 18:46:14
744 [proxy-connect.sh]
745 Add tests for with and without compression, with and without privsep.
746 - logan@cvs.openbsd.org 2014/05/04 10:40:59
747 [connect-privsep.sh]
748 Remove the Z flag from the list of malloc options as it
749 was removed from malloc.c 10 days ago.
750
751 OK from miod@
752 - (djm) [regress/unittests/Makefile]
753 [regress/unittests/Makefile.inc]
754 [regress/unittests/sshbuf/Makefile]
755 [regress/unittests/sshbuf/test_sshbuf.c]
756 [regress/unittests/sshbuf/test_sshbuf_fixed.c]
757 [regress/unittests/sshbuf/test_sshbuf_fuzz.c]
758 [regress/unittests/sshbuf/test_sshbuf_getput_basic.c]
759 [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c]
760 [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c]
761 [regress/unittests/sshbuf/test_sshbuf_misc.c]
762 [regress/unittests/sshbuf/tests.c]
763 [regress/unittests/test_helper/Makefile]
764 [regress/unittests/test_helper/fuzz.c]
765 [regress/unittests/test_helper/test_helper.c]
766 [regress/unittests/test_helper/test_helper.h]
767 Import new unit tests from OpenBSD; not yet hooked up to build.
768 - (djm) [regress/Makefile Makefile.in]
769 [regress/unittests/sshbuf/test_sshbuf.c
770 [regress/unittests/sshbuf/test_sshbuf_fixed.c]
771 [regress/unittests/sshbuf/test_sshbuf_fuzz.c]
772 [regress/unittests/sshbuf/test_sshbuf_getput_basic.c]
773 [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c]
774 [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c]
775 [regress/unittests/sshbuf/test_sshbuf_misc.c]
776 [regress/unittests/sshbuf/tests.c]
777 [regress/unittests/test_helper/fuzz.c]
778 [regress/unittests/test_helper/test_helper.c]
779 Hook new unit tests into the build and "make tests"
780 - (djm) [sshbuf.c] need __predict_false
781
78220140430
783 - (dtucker) [defines.h] Define __GNUC_PREREQ__ macro if we don't already
784 have it. Only attempt to use __attribute__(__bounded__) for gcc.
785
78620140420
787 - OpenBSD CVS Sync
788 - djm@cvs.openbsd.org 2014/03/03 22:22:30
789 [session.c]
790 ignore enviornment variables with embedded '=' or '\0' characters;
791 spotted by Jann Horn; ok deraadt@
792 Id sync only - portable already has this.
793 - djm@cvs.openbsd.org 2014/03/12 04:44:58
794 [ssh-keyscan.c]
795 scan for Ed25519 keys by default too
796 - djm@cvs.openbsd.org 2014/03/12 04:50:32
797 [auth-bsdauth.c ssh-keygen.c]
798 don't count on things that accept arguments by reference to clear
799 things for us on error; most things do, but it's unsafe form.
800 - djm@cvs.openbsd.org 2014/03/12 04:51:12
801 [authfile.c]
802 correct test that kdf name is not "none" or "bcrypt"
803 - naddy@cvs.openbsd.org 2014/03/12 13:06:59
804 [ssh-keyscan.1]
805 scan for Ed25519 keys by default too
806 - deraadt@cvs.openbsd.org 2014/03/15 17:28:26
807 [ssh-agent.c ssh-keygen.1 ssh-keygen.c]
808 Improve usage() and documentation towards the standard form.
809 In particular, this line saves a lot of man page reading time.
810 usage: ssh-keygen [-q] [-b bits] [-t dsa | ecdsa | ed25519 | rsa | rsa1]
811 [-N new_passphrase] [-C comment] [-f output_keyfile]
812 ok schwarze jmc
813 - tedu@cvs.openbsd.org 2014/03/17 19:44:10
814 [ssh.1]
815 old descriptions of des and blowfish are old. maybe ok deraadt
816 - tedu@cvs.openbsd.org 2014/03/19 14:42:44
817 [scp.1]
818 there is no need for rcp anymore
819 ok deraadt millert
820 - markus@cvs.openbsd.org 2014/03/25 09:40:03
821 [myproposal.h]
822 trimm default proposals.
823
824 This commit removes the weaker pre-SHA2 hashes, the broken ciphers
825 (arcfour), and the broken modes (CBC) from the default configuration
826 (the patch only changes the default, all the modes are still available
827 for the config files).
828
829 ok djm@, reminded by tedu@ & naddy@ and discussed with many
830 - deraadt@cvs.openbsd.org 2014/03/26 17:16:26
831 [myproposal.h]
832 The current sharing of myproposal[] between both client and server code
833 makes the previous diff highly unpallatable. We want to go in that
834 direction for the server, but not for the client. Sigh.
835 Brought up by naddy.
836 - markus@cvs.openbsd.org 2014/03/27 23:01:27
837 [myproposal.h ssh-keyscan.c sshconnect2.c sshd.c]
838 disable weak proposals in sshd, but keep them in ssh; ok djm@
839 - djm@cvs.openbsd.org 2014/03/26 04:55:35
840 [chacha.h cipher-chachapoly.h digest.h hmac.h kex.h kexc25519.c
841 [misc.h poly1305.h ssh-pkcs11.c]
842 use __bounded(...) attribute recently added to sys/cdefs.h instead of
843 longform __attribute__(__bounded(...));
844
845 for brevity and a warning free compilation with llvm/clang
846 - tedu@cvs.openbsd.org 2014/03/26 19:58:37
847 [sshd.8 sshd.c]
848 remove libwrap support. ok deraadt djm mfriedl
849 - naddy@cvs.openbsd.org 2014/03/28 05:17:11
850 [ssh_config.5 sshd_config.5]
851 sync available and default algorithms, improve algorithm list formatting
852 help from jmc@ and schwarze@, ok deraadt@
853 - jmc@cvs.openbsd.org 2014/03/31 13:39:34
854 [ssh-keygen.1]
855 the text for the -K option was inserted in the wrong place in -r1.108;
856 fix From: Matthew Clarke
857 - djm@cvs.openbsd.org 2014/04/01 02:05:27
858 [ssh-keysign.c]
859 include fingerprint of key not found
860 use arc4random_buf() instead of loop+arc4random()
861 - djm@cvs.openbsd.org 2014/04/01 03:34:10
862 [sshconnect.c]
863 When using VerifyHostKeyDNS with a DNSSEC resolver, down-convert any
864 certificate keys to plain keys and attempt SSHFP resolution.
865
866 Prevents a server from skipping SSHFP lookup and forcing a new-hostkey
867 dialog by offering only certificate keys.
868
869 Reported by mcv21 AT cam.ac.uk
870 - djm@cvs.openbsd.org 2014/04/01 05:32:57
871 [packet.c]
872 demote a debug3 to PACKET_DEBUG; ok markus@
873 - djm@cvs.openbsd.org 2014/04/12 04:55:53
874 [sshd.c]
875 avoid crash at exit: check that pmonitor!=NULL before dereferencing;
876 bz#2225, patch from kavi AT juniper.net
877 - djm@cvs.openbsd.org 2014/04/16 23:22:45
878 [bufaux.c]
879 skip leading zero bytes in buffer_put_bignum2_from_string();
880 reported by jan AT mojzis.com; ok markus@
881 - djm@cvs.openbsd.org 2014/04/16 23:28:12
882 [ssh-agent.1]
883 remove the identity files from this manpage - ssh-agent doesn't deal
884 with them at all and the same information is duplicated in ssh-add.1
885 (which does deal with them); prodded by deraadt@
886 - djm@cvs.openbsd.org 2014/04/18 23:52:25
887 [compat.c compat.h sshconnect2.c sshd.c version.h]
888 OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections
889 using the curve25519-sha256@libssh.org KEX exchange method to fail
890 when connecting with something that implements the spec properly.
891
892 Disable this KEX method when speaking to one of the affected
893 versions.
894
895 reported by Aris Adamantiadis; ok markus@
896 - djm@cvs.openbsd.org 2014/04/19 05:54:59
897 [compat.c]
898 missing wildcard; pointed out by naddy@
899 - tedu@cvs.openbsd.org 2014/04/19 14:53:48
900 [ssh-keysign.c sshd.c]
901 Delete futile calls to RAND_seed. ok djm
902 NB. Id sync only. This only applies to OpenBSD's libcrypto slashathon
903 - tedu@cvs.openbsd.org 2014/04/19 18:15:16
904 [sshd.8]
905 remove some really old rsh references
906 - tedu@cvs.openbsd.org 2014/04/19 18:42:19
907 [ssh.1]
908 delete .xr to hosts.equiv. there's still an unfortunate amount of
909 documentation referring to rhosts equivalency in here.
910 - djm@cvs.openbsd.org 2014/04/20 02:30:25
911 [misc.c misc.h umac.c]
912 use get/put_u32 to load values rather than *((UINT32 *)p) that breaks on
913 strict-alignment architectures; reported by and ok stsp@
914 - djm@cvs.openbsd.org 2014/04/20 02:49:32
915 [compat.c]
916 add a canonical 6.6 + curve25519 bignum fix fake version that I can
917 recommend people use ahead of the openssh-6.7 release
918
91920140401
920 - (djm) On platforms that support it, use prctl() to prevent sftp-server
921 from accessing /proc/self/{mem,maps}; patch from jann AT thejh.net
922 - (djm) Use full release (e.g. 6.5p1) in debug output rather than just
923 version. From des@des.no
924
92520140317
926 - (djm) [sandbox-seccomp-filter.c] Soft-fail stat() syscalls. Add XXX to
927 remind myself to add sandbox violation logging via the log socket.
928
92920140314
930 - (tim) [opensshd.init.in] Add support for ed25519
931
93220140313
933 - (djm) Release OpenSSH 6.6
934
93520140304
936 - OpenBSD CVS Sync
937 - djm@cvs.openbsd.org 2014/03/03 22:22:30
938 [session.c]
939 ignore enviornment variables with embedded '=' or '\0' characters;
940 spotted by Jann Horn; ok deraadt@
941
94220140301
943 - (djm) [regress/Makefile] Disable dhgex regress test; it breaks when
944 no moduli file exists at the expected location.
945
94620140228
947 - OpenBSD CVS Sync
948 - djm@cvs.openbsd.org 2014/02/27 00:41:49
949 [bufbn.c]
950 fix unsigned overflow that could lead to reading a short ssh protocol
951 1 bignum value; found by Ben Hawkes; ok deraadt@
952 - djm@cvs.openbsd.org 2014/02/27 08:25:09
953 [bufbn.c]
954 off by one in range check
955 - djm@cvs.openbsd.org 2014/02/27 22:47:07
956 [sshd_config.5]
957 bz#2184 clarify behaviour of a keyword that appears in multiple
958 matching Match blocks; ok dtucker@
959 - djm@cvs.openbsd.org 2014/02/27 22:57:40
960 [version.h]
961 openssh-6.6
962 - dtucker@cvs.openbsd.org 2014/01/19 23:43:02
963 [regress/sftp-chroot.sh]
964 Don't use -q on sftp as it suppresses logging, instead redirect the
965 output to the regress logfile.
966 - dtucker@cvs.openbsd.org 2014/01/20 00:00:30
967 [sregress/ftp-chroot.sh]
968 append to rather than truncating the log file
969 - dtucker@cvs.openbsd.org 2014/01/25 04:35:32
970 [regress/Makefile regress/dhgex.sh]
971 Add a test for DH GEX sizes
972 - djm@cvs.openbsd.org 2014/01/26 10:22:10
973 [regress/cert-hostkey.sh]
974 automatically generate revoked keys from listed keys rather than
975 manually specifying each type; from portable
976 (Id sync only)
977 - djm@cvs.openbsd.org 2014/01/26 10:49:17
978 [scp-ssh-wrapper.sh scp.sh]
979 make sure $SCP is tested on the remote end rather than whichever one
980 happens to be in $PATH; from portable
981 (Id sync only)
982 - djm@cvs.openbsd.org 2014/02/27 20:04:16
983 [login-timeout.sh]
984 remove any existing LoginGraceTime from sshd_config before adding
985 a specific one for the test back in
986 - djm@cvs.openbsd.org 2014/02/27 21:21:25
987 [agent-ptrace.sh agent.sh]
988 keep return values that are printed in error messages;
989 from portable
990 (Id sync only)
991 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
992 [contrib/suse/openssh.spec] Crank version numbers
993 - (djm) [regress/host-expand.sh] Add RCS Id
994
99520140227
996 - OpenBSD CVS Sync
997 - djm@cvs.openbsd.org 2014/02/26 20:18:37
998 [ssh.c]
999 bz#2205: avoid early hostname lookups unless canonicalisation is enabled;
1000 ok dtucker@ markus@
1001 - djm@cvs.openbsd.org 2014/02/26 20:28:44
1002 [auth2-gss.c gss-serv.c ssh-gss.h sshd.c]
1003 bz#2107 - cache OIDs of supported GSSAPI mechanisms before privsep
1004 sandboxing, as running this code in the sandbox can cause violations;
1005 ok markus@
1006 - djm@cvs.openbsd.org 2014/02/26 20:29:29
1007 [channels.c]
1008 don't assume that the socks4 username is \0 terminated;
1009 spotted by Ben Hawkes; ok markus@
1010 - markus@cvs.openbsd.org 2014/02/26 21:53:37
1011 [sshd.c]
1012 ssh_gssapi_prepare_supported_oids needs GSSAPI
1013
101420140224
1015 - OpenBSD CVS Sync
1016 - djm@cvs.openbsd.org 2014/02/07 06:55:54
1017 [cipher.c mac.c]
1018 remove some logging that makes ssh debugging output very verbose;
1019 ok markus
1020 - djm@cvs.openbsd.org 2014/02/15 23:05:36
1021 [channels.c]
1022 avoid spurious "getsockname failed: Bad file descriptor" errors in ssh -W;
1023 bz#2200, debian#738692 via Colin Watson; ok dtucker@
1024 - djm@cvs.openbsd.org 2014/02/22 01:32:19
1025 [readconf.c]
1026 when processing Match blocks, skip 'exec' clauses if previous predicates
1027 failed to match; ok markus@
1028 - djm@cvs.openbsd.org 2014/02/23 20:03:42
1029 [ssh-ed25519.c]
1030 check for unsigned overflow; not reachable in OpenSSH but others might
1031 copy our code...
1032 - djm@cvs.openbsd.org 2014/02/23 20:11:36
1033 [readconf.c readconf.h ssh.c ssh_config.5]
1034 reparse ssh_config and ~/.ssh/config if hostname canonicalisation changes
1035 the hostname. This allows users to write configurations that always
1036 refer to canonical hostnames, e.g.
1037
1038 CanonicalizeHostname yes
1039 CanonicalDomains int.example.org example.org
1040 CanonicalizeFallbackLocal no
1041
1042 Host *.int.example.org
1043 Compression off
1044 Host *.example.org
1045 User djm
1046
1047 ok markus@
1048 6
104920140213 7commit 8ef691f7d9ef500257a549d0906d78187490668f
1050 - (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}] Add compat 8Author: Damien Miller <djm@google.com>
1051 code for older OpenSSL versions that don't have EVP_MD_CTX_copy_ex. 9Date: Wed Mar 11 10:35:26 2015 +1100
1052
105320140207
1054 - OpenBSD CVS Sync
1055 - naddy@cvs.openbsd.org 2014/02/05 20:13:25
1056 [ssh-keygen.1 ssh-keygen.c]
1057 tweak synopsis: calling ssh-keygen without any arguments is fine; ok jmc@
1058 while here, fix ordering in usage(); requested by jmc@
1059 - djm@cvs.openbsd.org 2014/02/06 22:21:01
1060 [sshconnect.c]
1061 in ssh_create_socket(), only do the getaddrinfo for BindAddress when
1062 BindAddress is actually specified. Fixes regression in 6.5 for
1063 UsePrivilegedPort=yes; patch from Corinna Vinschen
1064
106520140206
1066 - (dtucker) [openbsd-compat/bsd-poll.c] Don't bother checking for non-NULL
1067 before freeing since free(NULL) is a no-op. ok djm.
1068 - (djm) [sandbox-seccomp-filter.c] Not all Linux architectures define
1069 __NR_shutdown; some go via the socketcall(2) multiplexer.
1070
107120140205
1072 - (djm) [sandbox-capsicum.c] Don't fatal if Capsicum is offered by
1073 headers/libc but not supported by the kernel. Patch from Loganaden
1074 Velvindron @ AfriNIC
1075
107620140204
1077 - OpenBSD CVS Sync
1078 - markus@cvs.openbsd.org 2014/01/27 18:58:14
1079 [Makefile.in digest.c digest.h hostfile.c kex.h mac.c hmac.c hmac.h]
1080 replace openssl HMAC with an implementation based on our ssh_digest_*
1081 ok and feedback djm@
1082 - markus@cvs.openbsd.org 2014/01/27 19:18:54
1083 [auth-rsa.c cipher.c ssh-agent.c sshconnect1.c sshd.c]
1084 replace openssl MD5 with our ssh_digest_*; ok djm@
1085 - markus@cvs.openbsd.org 2014/01/27 20:13:46
1086 [digest.c digest-openssl.c digest-libc.c Makefile.in]
1087 rename digest.c to digest-openssl.c and add libc variant; ok djm@
1088 - jmc@cvs.openbsd.org 2014/01/28 14:13:39
1089 [ssh-keyscan.1]
1090 kill some bad Pa;
1091 From: Jan Stary
1092 - djm@cvs.openbsd.org 2014/01/29 00:19:26
1093 [sshd.c]
1094 use kill(0, ...) instead of killpg(0, ...); on most operating systems
1095 they are equivalent, but SUSv2 describes the latter as having undefined
1096 behaviour; from portable; ok dtucker
1097 (Id sync only; change is already in portable)
1098 - djm@cvs.openbsd.org 2014/01/29 06:18:35
1099 [Makefile.in auth.h auth2-jpake.c auth2.c jpake.c jpake.h monitor.c]
1100 [monitor.h monitor_wrap.c monitor_wrap.h readconf.c readconf.h]
1101 [schnorr.c schnorr.h servconf.c servconf.h ssh2.h sshconnect2.c]
1102 remove experimental, never-enabled JPAKE code; ok markus@
1103 - jmc@cvs.openbsd.org 2014/01/29 14:04:51
1104 [sshd_config.5]
1105 document kbdinteractiveauthentication;
1106 requested From: Ross L Richardson
1107
1108 dtucker/markus helped explain its workings;
1109 - djm@cvs.openbsd.org 2014/01/30 22:26:14
1110 [sandbox-systrace.c]
1111 allow shutdown(2) syscall in sandbox - it may be called by packet_close()
1112 from portable
1113 (Id sync only; change is already in portable)
1114 - tedu@cvs.openbsd.org 2014/01/31 16:39:19
1115 [auth2-chall.c authfd.c authfile.c bufaux.c bufec.c canohost.c]
1116 [channels.c cipher-chachapoly.c clientloop.c configure.ac hostfile.c]
1117 [kexc25519.c krl.c monitor.c sandbox-systrace.c session.c]
1118 [sftp-client.c ssh-keygen.c ssh.c sshconnect2.c sshd.c sshlogin.c]
1119 [openbsd-compat/explicit_bzero.c openbsd-compat/openbsd-compat.h]
1120 replace most bzero with explicit_bzero, except a few that cna be memset
1121 ok djm dtucker
1122 - djm@cvs.openbsd.org 2014/02/02 03:44:32
1123 [auth1.c auth2-chall.c auth2-passwd.c authfile.c bufaux.c bufbn.c]
1124 [buffer.c cipher-3des1.c cipher.c clientloop.c gss-serv.c kex.c]
1125 [kexdhc.c kexdhs.c kexecdhc.c kexgexc.c kexecdhs.c kexgexs.c key.c]
1126 [monitor.c monitor_wrap.c packet.c readpass.c rsa.c serverloop.c]
1127 [ssh-add.c ssh-agent.c ssh-dss.c ssh-ecdsa.c ssh-ed25519.c]
1128 [ssh-keygen.c ssh-rsa.c sshconnect.c sshconnect1.c sshconnect2.c]
1129 [sshd.c]
1130 convert memset of potentially-private data to explicit_bzero()
1131 - djm@cvs.openbsd.org 2014/02/03 23:28:00
1132 [ssh-ecdsa.c]
1133 fix memory leak; ECDSA_SIG_new() allocates 'r' and 's' for us, unlike
1134 DSA_SIG_new. Reported by Batz Spear; ok markus@
1135 - djm@cvs.openbsd.org 2014/02/02 03:44:31
1136 [digest-libc.c digest-openssl.c]
1137 convert memset of potentially-private data to explicit_bzero()
1138 - djm@cvs.openbsd.org 2014/02/04 00:24:29
1139 [ssh.c]
1140 delay lowercasing of hostname until right before hostname
1141 canonicalisation to unbreak case-sensitive matching of ssh_config;
1142 reported by Ike Devolder; ok markus@
1143 - (djm) [openbsd-compat/Makefile.in] Add missing explicit_bzero.o
1144 - (djm) [regress/setuid-allowed.c] Missing string.h for strerror()
1145
114620140131
1147 - (djm) [sandbox-seccomp-filter.c sandbox-systrace.c] Allow shutdown(2)
1148 syscall from sandboxes; it may be called by packet_close.
1149 - (dtucker) [readconf.c] Include <arpa/inet.h> for the hton macros. Fixes
1150 build with HP-UX's compiler. Patch from Kevin Brott.
1151 - (tim) [Makefile.in] build regress/setuid-allow.
1152
115320140130
1154 - (djm) [configure.ac] Only check for width-specified integer types
1155 in headers that actually exist. patch from Tom G. Christensen;
1156 ok dtucker@
1157 - (djm) [configure.ac atomicio.c] Kludge around NetBSD offering
1158 different symbols for 'read' when various compiler flags are
1159 in use, causing atomicio.c comparisons against it to break and
1160 read/write operations to hang; ok dtucker
1161 - (djm) Release openssh-6.5p1
1162
116320140129
1164 - (djm) [configure.ac] Fix broken shell test '==' vs '='; patch from
1165 Tom G. Christensen
1166
116720140128
1168 - (djm) [configure.ac] Search for inet_ntop in libnsl and libresovl;
1169 ok dtucker
1170 - (djm) [sshd.c] Use kill(0, ...) instead of killpg(0, ...); the
1171 latter being specified to have undefined behaviour in SUSv3;
1172 ok dtucker
1173 - (tim) [regress/agent.sh regress/agent-ptrace.sh] Assign $? to a variable
1174 when used as an error message inside an if statement so we display the
1175 correct into. agent.sh patch from Petr Lautrbach.
1176
117720140127
1178 - (dtucker) [Makefile.in] Remove trailing backslash which some make
1179 implementations (eg older Solaris) do not cope with.
1180
118120140126
1182 - OpenBSD CVS Sync
1183 - dtucker@cvs.openbsd.org 2014/01/25 10:12:50
1184 [cipher.c cipher.h kex.c kex.h kexgexc.c]
1185 Add a special case for the DH group size for 3des-cbc, which has an
1186 effective strength much lower than the key size. This causes problems
1187 with some cryptlib implementations, which don't support group sizes larger
1188 than 4k but also don't use the largest group size it does support as
1189 specified in the RFC. Based on a patch from Petr Lautrbach at Redhat,
1190 reduced by me with input from Markus. ok djm@ markus@
1191 - markus@cvs.openbsd.org 2014/01/25 20:35:37
1192 [kex.c]
1193 dh_need needs to be set to max(seclen, blocksize, ivlen, mac_len)
1194 ok dtucker@, noted by mancha
1195 - (djm) [configure.ac sandbox-capsicum.c sandbox-rlimit.c] Disable
1196 RLIMIT_NOFILE pseudo-sandbox on FreeBSD. In some configurations,
1197 libc will attempt to open additional file descriptors for crypto
1198 offload and crash if they cannot be opened.
1199 - (djm) [configure.ac] correct AC_DEFINE for previous.
1200
120120140125
1202 - (djm) [configure.ac] Fix detection of capsicum sandbox on FreeBSD
1203 - (djm) [configure.ac] Do not attempt to use capsicum sandbox unless
1204 sys/capability.h exists and cap_rights_limit is in libc. Fixes
1205 build on FreeBSD9x which provides the header but not the libc
1206 support.
1207 - (djm) [configure.ac] autoconf sets finds to 'yes' not '1', so test
1208 against the correct thing.
1209
121020140124
1211 - (djm) [Makefile.in regress/scp-ssh-wrapper.sh regress/scp.sh] Make
1212 the scp regress test actually test the built scp rather than the one
1213 in $PATH. ok dtucker@
1214
121520140123
1216 - (tim) [session.c] Improve error reporting on set_id().
1217 - (dtucker) [configure.ac] NetBSD's (and FreeBSD's) strnvis is gratuitously
1218 incompatible with OpenBSD's despite post-dating it by more than a decade.
1219 Declare it as broken, and document FreeBSD's as the same. ok djm@
1220
122120140122
1222 - (djm) [openbsd-compat/setproctitle.c] Don't fail to compile if a
1223 platform that is expected to use the reuse-argv style setproctitle
1224 hack surprises us by providing a setproctitle in libc; ok dtucker
1225 - (djm) [configure.ac] Unless specifically requested, only attempt
1226 to build Position Independent Executables on gcc >= 4.x; ok dtucker
1227 - (djm) [configure.ac aclocal.m4] More tests to detect fallout from
1228 platform hardening options: include some long long int arithmatic
1229 to detect missing support functions for -ftrapv in libgcc and
1230 equivalents, actually test linking when -ftrapv is supplied and
1231 set either both -pie/-fPIE or neither. feedback and ok dtucker@
1232
123320140121
1234 - (dtucker) [configure.ac] Make PIE a configure-time option which defaults
1235 to on platforms where it's known to be reliably detected and off elsewhere.
1236 Works around platforms such as FreeBSD 9.1 where it does not interop with
1237 -ftrapv (it seems to work but fails when trying to link ssh). ok djm@
1238 - (dtucker) [aclocal.m4] Differentiate between compile-time and link-time
1239 tests in the configure output. ok djm.
1240 - (tim) [platform.c session.c] Fix bug affecting SVR5 platforms introduced
1241 with sftp chroot support. Move set_id call after chroot.
1242 - (djm) [aclocal.m4] Flesh out the code run in the OSSH_CHECK_CFLAG_COMPILE
1243 and OSSH_CHECK_LDFLAG_LINK tests to give them a better chance of
1244 detecting toolchain-related problems; ok dtucker
1245
124620140120
1247 - (dtucker) [gss-serv-krb5.c] Fall back to krb5_cc_gen_new if the Kerberos
1248 implementation does not have krb5_cc_new_unique, similar to what we do
1249 in auth-krb5.c.
1250 - (djm) [regress/cert-hostkey.sh] Fix regress failure on platforms that
1251 skip one or more key types (e.g. RHEL/CentOS 6.5); ok dtucker@
1252 - (djm) OpenBSD CVS Sync
1253 - djm@cvs.openbsd.org 2014/01/20 00:08:48
1254 [digest.c]
1255 memleak; found by Loganaden Velvindron @ AfriNIC; ok markus@
1256
125720140119
1258 - (dtucker) OpenBSD CVS Sync
1259 - dtucker@cvs.openbsd.org 2014/01/17 06:23:24
1260 [sftp-server.c]
1261 fix log message statvfs. ok djm
1262 - dtucker@cvs.openbsd.org 2014/01/18 09:36:26
1263 [session.c]
1264 explicitly define USE_PIPES to 1 to prevent redefinition warnings in
1265 portable on platforms that use pipes for everything. From vinschen at
1266 redhat.
1267 - dtucker@cvs.openbsd.org 2014/01/19 04:17:29
1268 [canohost.c addrmatch.c]
1269 Cast socklen_t when comparing to size_t and use socklen_t to iterate over
1270 the ip options, both to prevent signed/unsigned comparison warnings.
1271 Patch from vinschen at redhat via portable openssh, begrudging ok deraadt.
1272 - djm@cvs.openbsd.org 2014/01/19 04:48:08
1273 [ssh_config.5]
1274 fix inverted meaning of 'no' and 'yes' for CanonicalizeFallbackLocal
1275 - dtucker@cvs.openbsd.org 2014/01/19 11:21:51
1276 [addrmatch.c]
1277 Cast the sizeof to socklen_t so it'll work even if the supplied len is
1278 negative. Suggested by and ok djm, ok deraadt.
1279
128020140118
1281 - (dtucker) [uidswap.c] Prevent unused variable warnings on Cygwin. Patch
1282 from vinschen at redhat.com
1283 - (dtucker) [openbsd-compat/bsd-cygwin_util.h] Add missing function
1284 declarations that stopped being included when we stopped including
1285 <windows.h> from openbsd-compat/bsd-cygwin_util.h. Patch from vinschen at
1286 redhat.com.
1287 - (dtucker) [configure.ac] On Cygwin the getopt variables (like optargs,
1288 optind) are defined in getopt.h already. Unfortunately they are defined as
1289 "declspec(dllimport)" for historical reasons, because the GNU linker didn't
1290 allow auto-import on PE/COFF targets way back when. The problem is the
1291 dllexport attributes collide with the definitions in the various source
1292 files in OpenSSH, which obviousy define the variables without
1293 declspec(dllimport). The least intrusive way to get rid of these warnings
1294 is to disable warnings for GCC compiler attributes when building on Cygwin.
1295 Patch from vinschen at redhat.com.
1296 - (dtucker) [sandbox-capsicum.c] Correct some error messages and make the
1297 return value check for cap_enter() consistent with the other uses in
1298 FreeBSD. From by Loganaden Velvindron @ AfriNIC via bz#2140.
1299
130020140117
1301 - (dtucker) [aclocal.m4 configure.ac] Add some additional compiler/toolchain
1302 hardening flags including -fstack-protector-strong. These default to on
1303 if the toolchain supports them, but there is a configure-time knob
1304 (--without-hardening) to disable them if necessary. ok djm@
1305 - (djm) [sftp-client.c] signed/unsigned comparison fix
1306 - (dtucker) [loginrec.c] Cast to the types specfied in the format
1307 specification to prevent warnings.
1308 - (dtucker) [crypto_api.h] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.
1309 - (dtucker) [poly1305.c] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.
1310 - (dtucker) [blocks.c fe25519.c ge25519.c hash.c sc25519.c verify.c] Include
1311 includes.h to pull in all of the compatibility stuff.
1312 - (dtucker) [openbsd-compat/bcrypt_pbkdf.c] Wrap stdlib.h include inside
1313 #ifdef HAVE_STDINT_H.
1314 - (dtucker) [defines.h] Add typedefs for uintXX_t types for platforms that
1315 don't have them.
1316 - (dtucker) [configure.ac] Split AC_CHECK_FUNCS for OpenSSL functions into
1317 separate lines and alphabetize for easier diffing of changes.
1318 - (dtucker) OpenBSD CVS Sync
1319 - djm@cvs.openbsd.org 2014/01/17 00:21:06
1320 [sftp-client.c]
1321 signed/unsigned comparison warning fix; from portable (Id sync only)
1322 - dtucker@cvs.openbsd.org 2014/01/17 05:26:41
1323 [digest.c]
1324 remove unused includes. ok djm@
1325 - (djm) [Makefile.in configure.ac sandbox-capsicum.c sandbox-darwin.c]
1326 [sandbox-null.c sandbox-rlimit.c sandbox-seccomp-filter.c]
1327 [sandbox-systrace.c ssh-sandbox.h sshd.c] Support preauth sandboxing
1328 using the Capsicum API introduced in FreeBSD 10. Patch by Dag-Erling
1329 Smorgrav, updated by Loganaden Velvindron @ AfriNIC; ok dtucker@
1330 - (dtucker) [configure.ac digest.c openbsd-compat/openssl-compat.c
1331 openbsd-compat/openssl-compat.h] Add compatibility layer for older
1332 openssl versions. ok djm@
1333 - (dtucker) Fix typo in #ifndef.
1334 - (dtucker) [configure.ac openbsd-compat/bsd-statvfs.c
1335 openbsd-compat/bsd-statvfs.h] Implement enough of statvfs on top of statfs
1336 to be useful (and for the regression tests to pass) on platforms that
1337 have statfs and fstatfs. ok djm@
1338 - (dtucker) [openbsd-compat/bsd-statvfs.h] Only start including headers if we
1339 need them to cut down on the name collisions.
1340 - (dtucker) [configure.ac] Also look in inttypes.h for uintXX_t types.
1341 - (dtucker) [configure.ac] Have --without-hardening not turn off
1342 stack-protector since that has a separate flag that's been around a while.
1343 - (dtucker) [readconf.c] Wrap paths.h inside an ifdef. Allows building on
1344 Solaris.
1345 - (dtucker) [defines.h] Move our definitions of uintXX_t types down to after
1346 they're defined if we have to define them ourselves. Fixes builds on old
1347 AIX.
1348
134920140118
1350 - (djm) OpenBSD CVS Sync
1351 - djm@cvs.openbsd.org 2014/01/16 07:31:09
1352 [sftp-client.c]
1353 needless and incorrect cast to size_t can break resumption of
1354 large download; patch from tobias@
1355 - djm@cvs.openbsd.org 2014/01/16 07:32:00
1356 [version.h]
1357 openssh-6.5
1358 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1359 [contrib/suse/openssh.spec] Crank RPM spec version numbers.
1360 - (djm) [README] update release notes URL.
1361
136220140112
1363 - (djm) OpenBSD CVS Sync
1364 - djm@cvs.openbsd.org 2014/01/10 05:59:19
1365 [sshd_config]
1366 the /etc/ssh/ssh_host_ed25519_key is loaded by default too
1367 - djm@cvs.openbsd.org 2014/01/12 08:13:13
1368 [bufaux.c buffer.h kex.c kex.h kexc25519.c kexc25519c.c kexc25519s.c]
1369 [kexdhc.c kexdhs.c kexecdhc.c kexecdhs.c kexgexc.c kexgexs.c]
1370 avoid use of OpenSSL BIGNUM type and functions for KEX with
1371 Curve25519 by adding a buffer_put_bignum2_from_string() that stores
1372 a string using the bignum encoding rules. Will make it easier to
1373 build a reduced-feature OpenSSH without OpenSSL in the future;
1374 ok markus@
1375 10
137620140110 11 fix compile with clang
1377 - (djm) OpenBSD CVS Sync 12
1378 - tedu@cvs.openbsd.org 2014/01/04 17:50:55 13commit 4df590cf8dc799e8986268d62019b487a8ed63ad
1379 [mac.c monitor_mm.c monitor_mm.h xmalloc.c] 14Author: Damien Miller <djm@google.com>
1380 use standard types and formats for size_t like variables. ok dtucker 15Date: Wed Mar 11 10:02:39 2015 +1100
1381 - guenther@cvs.openbsd.org 2014/01/09 03:26:00 16
1382 [sftp-common.c] 17 make unit tests work for !OPENSSH_HAS_ECC
1383 When formating the time for "ls -l"-style output, show dates in the future 18
1384 with the year, and rearrange a comparison to avoid a potentional signed 19commit 307bb40277ca2c32e97e61d70d1ed74b571fd6ba
1385 arithmetic overflow that would give the wrong result. 20Author: djm@openbsd.org <djm@openbsd.org>
1386 ok djm@ 21Date: Sat Mar 7 04:41:48 2015 +0000
1387 - djm@cvs.openbsd.org 2014/01/09 23:20:00 22
1388 [digest.c digest.h hostfile.c kex.c kex.h kexc25519.c kexc25519c.c] 23 upstream commit
1389 [kexc25519s.c kexdh.c kexecdh.c kexecdhc.c kexecdhs.c kexgex.c kexgexc.c] 24
1390 [kexgexs.c key.c key.h roaming_client.c roaming_common.c schnorr.c] 25 unbreak for w/SSH1 (default) case; ok markus@ deraadt@
1391 [schnorr.h ssh-dss.c ssh-ecdsa.c ssh-rsa.c sshconnect2.c] 26
1392 Introduce digest API and use it to perform all hashing operations 27commit b44ee0c998fb4c5f3c3281f2398af5ce42840b6f
1393 rather than calling OpenSSL EVP_Digest* directly. Will make it easier 28Author: Damien Miller <djm@mindrot.org>
1394 to build a reduced-feature OpenSSH without OpenSSL in future; 29Date: Thu Mar 5 18:39:20 2015 -0800
1395 feedback, ok markus@ 30
1396 - djm@cvs.openbsd.org 2014/01/09 23:26:48 31 unbreak hostkeys test for w/ SSH1 case
1397 [sshconnect.c sshd.c] 32
1398 ban clients/servers that suffer from SSH_BUG_DERIVEKEY, they are ancient, 33commit 55e5bdeb519cb60cc18b7ba0545be581fb8598b4
1399 deranged and might make some attacks on KEX easier; ok markus@ 34Author: djm@openbsd.org <djm@openbsd.org>
1400 35Date: Fri Mar 6 01:40:56 2015 +0000
140120140108 36
1402 - (djm) [regress/.cvsignore] Ignore regress test droppings; ok dtucker@ 37 upstream commit
1403 38
140420131231 39 fix sshkey_certify() return value for unsupported key types;
1405 - (djm) OpenBSD CVS Sync 40 ok markus@ deraadt@
1406 - djm@cvs.openbsd.org 2013/12/30 23:52:28 41
1407 [auth2-hostbased.c auth2-pubkey.c compat.c compat.h ssh-rsa.c] 42commit be8f658e550a434eac04256bfbc4289457a24e99
1408 [sshconnect.c sshconnect2.c sshd.c] 43Author: Damien Miller <djm@mindrot.org>
1409 refuse RSA keys from old proprietary clients/servers that use the 44Date: Wed Mar 4 15:38:03 2015 -0800
1410 obsolete RSA+MD5 signature scheme. it will still be possible to connect 45
1411 with these clients/servers but only DSA keys will be accepted, and we'll 46 update version numbers to match version.h
1412 deprecate them entirely in a future release. ok markus@ 47
1413 48commit ac5e8acefa253eb5e5ba186e34236c0e8007afdc
141420131229 49Author: djm@openbsd.org <djm@openbsd.org>
1415 - (djm) [loginrec.c] Check for username truncation when looking up lastlog 50Date: Wed Mar 4 23:22:35 2015 +0000
1416 entries 51
1417 - (djm) [regress/Makefile] Add some generated files for cleaning 52 upstream commit
1418 - (djm) OpenBSD CVS Sync 53
1419 - djm@cvs.openbsd.org 2013/12/19 00:10:30 54 make these work with !SSH1; ok markus@ deraadt@
1420 [ssh-add.c] 55
1421 skip requesting smartcard PIN when removing keys from agent; bz#2187 56commit 2f04af92f036b0c87a23efb259c37da98cd81fe6
1422 patch from jay AT slushpupie.com; ok dtucker 57Author: djm@openbsd.org <djm@openbsd.org>
1423 - dtucker@cvs.openbsd.org 2013/12/19 00:19:12 58Date: Wed Mar 4 21:12:59 2015 +0000
1424 [serverloop.c] 59
1425 Cast client_alive_interval to u_int64_t before assinging to 60 upstream commit
1426 max_time_milliseconds to avoid potential integer overflow in the timeout. 61
1427 bz#2170, patch from Loganaden Velvindron, ok djm@ 62 make ssh-add -D work with !SSH1 agent
1428 - djm@cvs.openbsd.org 2013/12/19 00:27:57 63
1429 [auth-options.c] 64commit a05adf95d2af6abb2b7826ddaa7a0ec0cdc1726b
1430 simplify freeing of source-address certificate restriction 65Author: Damien Miller <djm@mindrot.org>
1431 - djm@cvs.openbsd.org 2013/12/19 01:04:36 66Date: Wed Mar 4 00:55:48 2015 -0800
1432 [channels.c] 67
1433 bz#2147: fix multiple remote forwardings with dynamically assigned 68 netcat needs poll.h portability goop
1434 listen ports. In the s->c message to open the channel we were sending 69
1435 zero (the magic number to request a dynamic port) instead of the actual 70commit dad2b1892b4c1b7e58df483a8c5b983c4454e099
1436 listen port. The client therefore had no way of discriminating between 71Author: markus@openbsd.org <markus@openbsd.org>
1437 them. 72Date: Tue Mar 3 22:35:19 2015 +0000
1438 73
1439 Diagnosis and fix by ronf AT timeheart.net 74 upstream commit
1440 - djm@cvs.openbsd.org 2013/12/19 01:19:41 75
1441 [ssh-agent.c] 76 make it possible to run tests w/o ssh1 support; ok djm@
1442 bz#2186: don't crash (NULL deref) when deleting PKCS#11 keys from an agent 77
1443 that has a mix of normal and PKCS#11 keys; fix from jay AT slushpupie.com; 78commit d48a22601bdd3eec054794c535f4ae8d8ae4c6e2
1444 ok dtucker 79Author: djm@openbsd.org <djm@openbsd.org>
1445 - djm@cvs.openbsd.org 2013/12/19 22:57:13 80Date: Wed Mar 4 18:53:53 2015 +0000
1446 [poly1305.c poly1305.h] 81
1447 use full name for author, with his permission 82 upstream commit
1448 - tedu@cvs.openbsd.org 2013/12/21 07:10:47 83
1449 [ssh-keygen.1] 84 crank; ok markus, deraadt
1450 small typo 85
1451 - djm@cvs.openbsd.org 2013/12/27 22:30:17 86commit bbffb23daa0b002dd9f296e396a9ab8a5866b339
1452 [ssh-dss.c ssh-ecdsa.c ssh-rsa.c] 87Author: Damien Miller <djm@mindrot.org>
1453 make the original RSA and DSA signing/verification code look more like 88Date: Tue Mar 3 13:50:27 2015 -0800
1454 the ECDSA/Ed25519 ones: use key_type_plain() when checking the key type 89
1455 rather than tediously listing all variants, use __func__ for debug/ 90 more --without-ssh1 fixes
1456 error messages 91
1457 - djm@cvs.openbsd.org 2013/12/27 22:37:18 92commit 6c2039286f503e2012a58a1d109e389016e7a99b
1458 [ssh-rsa.c] 93Author: Damien Miller <djm@mindrot.org>
1459 correct comment 94Date: Tue Mar 3 13:48:48 2015 -0800
1460 - djm@cvs.openbsd.org 2013/12/29 02:28:10 95
1461 [key.c] 96 fix merge both that broke --without-ssh1 compile
1462 allow ed25519 keys to appear as certificate authorities 97
1463 - djm@cvs.openbsd.org 2013/12/29 02:37:04 98commit 111dfb225478a76f89ecbcd31e96eaf1311b59d3
1464 [key.c] 99Author: djm@openbsd.org <djm@openbsd.org>
1465 correct comment for key_to_certified() 100Date: Tue Mar 3 21:21:13 2015 +0000
1466 - djm@cvs.openbsd.org 2013/12/29 02:49:52 101
1467 [key.c] 102 upstream commit
1468 correct comment for key_drop_cert() 103
1469 - djm@cvs.openbsd.org 2013/12/29 04:20:04 104 add SSH1 Makefile knob to make it easier to build without
1470 [key.c] 105 SSH1 support; ok markus@
1471 to make sure we don't omit any key types as valid CA keys again, 106
1472 factor the valid key type check into a key_type_is_valid_ca() 107commit 3f7f5e6c5d2aa3f6710289c1a30119e534e56c5c
1473 function 108Author: djm@openbsd.org <djm@openbsd.org>
1474 - djm@cvs.openbsd.org 2013/12/29 04:29:25 109Date: Tue Mar 3 20:42:49 2015 +0000
1475 [authfd.c] 110
1476 allow deletion of ed25519 keys from the agent 111 upstream commit
1477 - djm@cvs.openbsd.org 2013/12/29 04:35:50 112
1478 [authfile.c] 113 expand __unused to full __attribute__ for better portability
1479 don't refuse to load Ed25519 certificates 114
1480 - djm@cvs.openbsd.org 2013/12/29 05:42:16 115commit 2fab9b0f8720baf990c931e3f68babb0bf9949c6
1481 [ssh.c] 116Author: Damien Miller <djm@mindrot.org>
1482 don't forget to load Ed25519 certs too 117Date: Wed Mar 4 07:41:27 2015 +1100
1483 - djm@cvs.openbsd.org 2013/12/29 05:57:02 118
1484 [sshconnect.c] 119 avoid warning
1485 when showing other hostkeys, don't forget Ed25519 keys 120
1486 121commit d1bc844322461f882b4fd2277ba9a8d4966573d2
148720131221 122Author: Damien Miller <djm@mindrot.org>
1488 - (dtucker) [regress/keytype.sh] Actually test ecdsa key types. 123Date: Wed Mar 4 06:31:45 2015 +1100
1489 124
149020131219 125 Revert "define __unused to nothing if not already defined"
1491 - (dtucker) [configure.ac] bz#2178: Don't try to use BSM on Solaris versions 126
1492 greater than 11 either rather than just 11. Patch from Tomas Kuthan. 127 This reverts commit 1598419e38afbaa8aa5df8dd6b0af98301e2c908.
1493 - (dtucker) [auth-pam.c] bz#2163: check return value from pam_get_item(). 128
1494 Patch from Loganaden Velvindron. 129 Some system headers have objects named __unused
1495 130
149620131218 131commit 00797e86b2d98334d1bb808f65fa1fd47f328ff1
1497 - (djm) OpenBSD CVS Sync 132Author: Damien Miller <djm@mindrot.org>
1498 - djm@cvs.openbsd.org 2013/12/07 08:08:26 133Date: Wed Mar 4 05:02:45 2015 +1100
1499 [ssh-keygen.1] 134
1500 document -a and -o wrt new key format 135 check for crypt and DES_crypt in openssl block
1501 - naddy@cvs.openbsd.org 2013/12/07 11:58:46 136
1502 [ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8 ssh.1] 137 fixes builds on systems that use DES_crypt; based on patch
1503 [ssh_config.5 sshd.8 sshd_config.5] 138 from Roumen Petrov
1504 add missing mentions of ed25519; ok djm@ 139
1505 - dtucker@cvs.openbsd.org 2013/12/08 09:53:27 140commit 1598419e38afbaa8aa5df8dd6b0af98301e2c908
1506 [sshd_config.5] 141Author: Damien Miller <djm@mindrot.org>
1507 Use a literal for the default value of KEXAlgorithms. ok deraadt jmc 142Date: Wed Mar 4 04:59:13 2015 +1100
1508 - markus@cvs.openbsd.org 2013/12/09 11:03:45 143
1509 [blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h] 144 define __unused to nothing if not already defined
1510 [ge25519_base.data hash.c sc25519.c sc25519.h verify.c] 145
1511 Add Authors for the public domain ed25519/nacl code. 146 fixes builds on BSD/OS
1512 see also http://nacl.cr.yp.to/features.html 147
1513 All of the NaCl software is in the public domain. 148commit d608a51daad4f14ad6ab43d7cf74ef4801cc3fe9
1514 and http://ed25519.cr.yp.to/software.html 149Author: djm@openbsd.org <djm@openbsd.org>
1515 The Ed25519 software is in the public domain. 150Date: Tue Mar 3 17:53:40 2015 +0000
1516 - markus@cvs.openbsd.org 2013/12/09 11:08:17 151
1517 [crypto_api.h] 152 upstream commit
1518 remove unused defines 153
1519 - pascal@cvs.openbsd.org 2013/12/15 18:17:26 154 reorder logic for better portability; patch from Roumen
1520 [ssh-add.c] 155 Petrov
1521 Make ssh-add also add .ssh/id_ed25519; fixes lie in manual page. 156
1522 ok markus@ 157commit 68d2dfc464fbcdf8d6387884260f9801f4352393
1523 - djm@cvs.openbsd.org 2013/12/15 21:42:35 158Author: djm@openbsd.org <djm@openbsd.org>
1524 [cipher-chachapoly.c] 159Date: Tue Mar 3 06:48:58 2015 +0000
1525 add some comments and constify a constant 160
1526 - markus@cvs.openbsd.org 2013/12/17 10:36:38 161 upstream commit
1527 [crypto_api.h] 162
1528 I've assempled the header file by cut&pasting from generated headers 163 Allow "ssh -Q protocol-version" to list supported SSH
1529 and the source files. 164 protocol versions. Useful for detecting builds without SSH v.1 support; idea
1530
153120131208
1532 - (djm) [openbsd-compat/bsd-setres_id.c] Missing header; from Corinna
1533 Vinschen
1534 - (djm) [Makefile.in regress/Makefile regress/agent-ptrace.sh]
1535 [regress/setuid-allowed.c] Check that ssh-agent is not on a no-setuid
1536 filesystem before running agent-ptrace.sh; ok dtucker
1537
153820131207
1539 - (djm) OpenBSD CVS Sync
1540 - djm@cvs.openbsd.org 2013/12/05 22:59:45
1541 [sftp-client.c]
1542 fix memory leak in error path in do_readdir(); pointed out by
1543 Loganaden Velvindron @ AfriNIC in bz#2163
1544 - djm@cvs.openbsd.org 2013/12/06 03:40:51
1545 [ssh-keygen.c]
1546 remove duplicated character ('g') in getopt() string;
1547 document the (few) remaining option characters so we don't have to
1548 rummage next time.
1549 - markus@cvs.openbsd.org 2013/12/06 13:30:08
1550 [authfd.c key.c key.h ssh-agent.c]
1551 move private key (de)serialization to key.c; ok djm
1552 - markus@cvs.openbsd.org 2013/12/06 13:34:54
1553 [authfile.c authfile.h cipher.c cipher.h key.c packet.c ssh-agent.c]
1554 [ssh-keygen.c PROTOCOL.key] new private key format, bcrypt as KDF by
1555 default; details in PROTOCOL.key; feedback and lots help from djm;
1556 ok djm@
1557 - markus@cvs.openbsd.org 2013/12/06 13:39:49
1558 [authfd.c authfile.c key.c key.h myproposal.h pathnames.h readconf.c]
1559 [servconf.c ssh-agent.c ssh-keygen.c ssh-keyscan.1 ssh-keyscan.c]
1560 [ssh-keysign.c ssh.c ssh_config.5 sshd.8 sshd.c verify.c ssh-ed25519.c]
1561 [sc25519.h sc25519.c hash.c ge25519_base.data ge25519.h ge25519.c]
1562 [fe25519.h fe25519.c ed25519.c crypto_api.h blocks.c]
1563 support ed25519 keys (hostkeys and user identities) using the public
1564 domain ed25519 reference code from SUPERCOP, see
1565 http://ed25519.cr.yp.to/software.html
1566 feedback, help & ok djm@
1567 - jmc@cvs.openbsd.org 2013/12/06 15:29:07
1568 [sshd.8]
1569 missing comma;
1570 - djm@cvs.openbsd.org 2013/12/07 00:19:15
1571 [key.c]
1572 set k->cert = NULL after freeing it
1573 - markus@cvs.openbsd.org 2013/12/06 13:52:46
1574 [regress/Makefile regress/agent.sh regress/cert-hostkey.sh]
1575 [regress/cert-userkey.sh regress/keytype.sh]
1576 test ed25519 support; from djm@
1577 - (djm) [blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]
1578 [ge25519_base.data hash.c sc25519.c sc25519.h verify.c] Fix RCS idents
1579 - (djm) [Makefile.in] Add ed25519 sources
1580 - (djm) [authfile.c] Conditionalise inclusion of util.h
1581 - (djm) [configure.ac openbsd-compat/Makefile.in openbsd-compat/bcrypt_pbkdf.c]
1582 [openbsd-compat/blf.h openbsd-compat/blowfish.c]
1583 [openbsd-compat/openbsd-compat.h] Start at supporting bcrypt_pbkdf in
1584 portable.
1585 - (djm) [ed25519.c ssh-ed25519.c openbsd-compat/Makefile.in]
1586 [openbsd-compat/bcrypt_pbkdf.c] Make ed25519/new key format compile on
1587 Linux
1588 - (djm) [regress/cert-hostkey.sh] Fix merge botch
1589 - (djm) [Makefile.in] PATHSUBS and keygen bits for Ed25519; from
1590 Loganaden Velvindron @ AfriNIC in bz#2179
1591
159220131205
1593 - (djm) OpenBSD CVS Sync
1594 - jmc@cvs.openbsd.org 2013/11/21 08:05:09
1595 [ssh_config.5 sshd_config.5]
1596 no need for .Pp before displays;
1597 - deraadt@cvs.openbsd.org 2013/11/25 18:04:21
1598 [ssh.1 ssh.c]
1599 improve -Q usage and such. One usage change is that the option is now
1600 case-sensitive
1601 ok dtucker markus djm
1602 - jmc@cvs.openbsd.org 2013/11/26 12:14:54
1603 [ssh.1 ssh.c]
1604 - put -Q in the right place
1605 - Ar was a poor choice for the arguments to -Q. i've chosen an
1606 admittedly equally poor Cm, at least consistent with the rest
1607 of the docs. also no need for multiple instances
1608 - zap a now redundant Nm
1609 - usage() sync
1610 - deraadt@cvs.openbsd.org 2013/11/26 19:15:09
1611 [pkcs11.h]
1612 cleanup 1 << 31 idioms. Resurrection of this issue pointed out by
1613 Eitan Adler ok markus for ssh, implies same change in kerberosV
1614 - djm@cvs.openbsd.org 2013/12/01 23:19:05
1615 [PROTOCOL]
1616 mention curve25519-sha256@libssh.org key exchange algorithm
1617 - djm@cvs.openbsd.org 2013/12/02 02:50:27
1618 [PROTOCOL.chacha20poly1305]
1619 typo; from Jon Cave
1620 - djm@cvs.openbsd.org 2013/12/02 02:56:17
1621 [ssh-pkcs11-helper.c]
1622 use-after-free; bz#2175 patch from Loganaden Velvindron @ AfriNIC
1623 - djm@cvs.openbsd.org 2013/12/02 03:09:22
1624 [key.c]
1625 make key_to_blob() return a NULL blob on failure; part of
1626 bz#2175 from Loganaden Velvindron @ AfriNIC
1627 - djm@cvs.openbsd.org 2013/12/02 03:13:14
1628 [cipher.c]
1629 correct bzero of chacha20+poly1305 key context. bz#2177 from
1630 Loganaden Velvindron @ AfriNIC
1631
1632 Also make it a memset for consistency with the rest of cipher.c
1633 - djm@cvs.openbsd.org 2013/12/04 04:20:01
1634 [sftp-client.c]
1635 bz#2171: don't leak local_fd on error; from Loganaden Velvindron @
1636 AfriNIC
1637 - djm@cvs.openbsd.org 2013/12/05 01:16:41
1638 [servconf.c servconf.h]
1639 bz#2161 - fix AuthorizedKeysCommand inside a Match block and
1640 rearrange things so the same error is harder to make next time;
1641 with and ok dtucker@
1642 - (dtucker) [configure.ac] bz#2173: use pkg-config --libs to include correct
1643 -L location for libedit. Patch from Serge van den Boom.
1644
164520131121
1646 - (djm) OpenBSD CVS Sync
1647 - dtucker@cvs.openbsd.org 2013/11/08 11:15:19
1648 [bufaux.c bufbn.c buffer.c sftp-client.c sftp-common.c sftp-glob.c]
1649 [uidswap.c] Include stdlib.h for free() as per the man page.
1650 - markus@cvs.openbsd.org 2013/11/13 13:48:20
1651 [ssh-pkcs11.c]
1652 add missing braces found by pedro
1653 - djm@cvs.openbsd.org 2013/11/20 02:19:01
1654 [sshd.c]
1655 delay closure of in/out fds until after "Bad protocol version
1656 identification..." message, as get_remote_ipaddr/get_remote_port
1657 require them open.
1658 - deraadt@cvs.openbsd.org 2013/11/20 20:53:10
1659 [scp.c]
1660 unsigned casts for ctype macros where neccessary
1661 ok guenther millert markus
1662 - deraadt@cvs.openbsd.org 2013/11/20 20:54:10
1663 [canohost.c clientloop.c match.c readconf.c sftp.c]
1664 unsigned casts for ctype macros where neccessary
1665 ok guenther millert markus
1666 - djm@cvs.openbsd.org 2013/11/21 00:45:44
1667 [Makefile.in PROTOCOL PROTOCOL.chacha20poly1305 authfile.c chacha.c]
1668 [chacha.h cipher-chachapoly.c cipher-chachapoly.h cipher.c cipher.h]
1669 [dh.c myproposal.h packet.c poly1305.c poly1305.h servconf.c ssh.1]
1670 [ssh.c ssh_config.5 sshd_config.5] Add a new protocol 2 transport
1671 cipher "chacha20-poly1305@openssh.com" that combines Daniel
1672 Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an
1673 authenticated encryption mode.
1674
1675 Inspired by and similar to Adam Langley's proposal for TLS:
1676 http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03
1677 but differs in layout used for the MAC calculation and the use of a
1678 second ChaCha20 instance to separately encrypt packet lengths.
1679 Details are in the PROTOCOL.chacha20poly1305 file.
1680
1681 Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC
1682 ok markus@ naddy@
1683 - naddy@cvs.openbsd.org 2013/11/18 05:09:32
1684 [regress/forward-control.sh]
1685 bump timeout to 10 seconds to allow slow machines (e.g. Alpha PC164)
1686 to successfully run this; ok djm@
1687 - djm@cvs.openbsd.org 2013/11/21 03:15:46
1688 [regress/krl.sh]
1689 add some reminders for additional tests that I'd like to implement
1690 - djm@cvs.openbsd.org 2013/11/21 03:16:47
1691 [regress/modpipe.c]
1692 use unsigned long long instead of u_int64_t here to avoid warnings
1693 on some systems portable OpenSSH is built on.
1694 - djm@cvs.openbsd.org 2013/11/21 03:18:51
1695 [regress/cipher-speed.sh regress/integrity.sh regress/rekey.sh]
1696 [regress/try-ciphers.sh]
1697 use new "ssh -Q cipher-auth" query to obtain lists of authenticated
1698 encryption ciphers instead of specifying them manually; ensures that
1699 the new chacha20poly1305@openssh.com mode is tested;
1700
1701 ok markus@ and naddy@ as part of the diff to add
1702 chacha20poly1305@openssh.com
1703
170420131110
1705 - (dtucker) [regress/keytype.sh] Populate ECDSA key types to be tested by
1706 querying the ones that are compiled in.
1707
170820131109
1709 - (dtucker) OpenBSD CVS Sync
1710 - dtucker@cvs.openbsd.org 2013/11/09 05:41:34
1711 [regress/test-exec.sh regress/rekey.sh]
1712 Use smaller test data files to speed up tests. Grow test datafiles
1713 where necessary for a specific test.
1714 - (dtucker) [configure.ac kex.c key.c myproposal.h] Test for the presence of
1715 NID_X9_62_prime256v1, NID_secp384r1 and NID_secp521r1 and test that the
1716 latter actually works before using it. Fedora (at least) has NID_secp521r1
1717 that doesn't work (see https://bugzilla.redhat.com/show_bug.cgi?id=1021897).
1718 - (dtucker) [configure.ac] Fix brackets in NID_secp521r1 test.
1719 - (dtucker) [configure.ac] Add missing "test".
1720 - (dtucker) [key.c] Check for the correct defines for NID_secp521r1.
1721
172220131108
1723 - (dtucker) OpenBSD CVS Sync
1724 - dtucker@cvs.openbsd.org 2013/11/08 01:06:14
1725 [regress/rekey.sh]
1726 Rekey less frequently during tests to speed them up
1727 - (djm) OpenBSD CVS Sync
1728 - dtucker@cvs.openbsd.org 2013/11/07 11:58:27
1729 [cipher.c cipher.h kex.c kex.h mac.c mac.h servconf.c ssh.c]
1730 Output the effective values of Ciphers, MACs and KexAlgorithms when
1731 the default has not been overridden. ok markus@
1732 - djm@cvs.openbsd.org 2013/11/08 00:39:15
1733 [auth-options.c auth2-chall.c authfd.c channels.c cipher-3des1.c]
1734 [clientloop.c gss-genr.c monitor_mm.c packet.c schnorr.c umac.c]
1735 [sftp-client.c sftp-glob.c]
1736 use calloc for all structure allocations; from markus@
1737 - djm@cvs.openbsd.org 2013/11/08 01:38:11
1738 [version.h]
1739 openssh-6.4
1740 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1741 [contrib/suse/openssh.spec] Update version numbers following release.
1742 - (dtucker) [openbsd-compat/openbsd-compat.h] Add null implementation of
1743 arc4random_stir for platforms that have arc4random but don't have
1744 arc4random_stir (right now this is only OpenBSD -current).
1745 - (dtucker) [kex.c] Only enable CURVE25519_SHA256 if we actually have
1746 EVP_sha256.
1747 - (dtucker) [myproposal.h] Conditionally enable CURVE25519_SHA256.
1748 - (dtucker) [openbsd-compat/bsd-poll.c] Add headers to prevent compile
1749 warnings.
1750 - (dtucker) [Makefile.in configure.ac] Set MALLOC_OPTIONS per platform
1751 and pass in TEST_ENV. use stderr to get polluted
1752 and the stderr-data test to fail.
1753 - (dtucker) [contrib/cygwin/ssh-host-config] Simplify host key generation:
1754 rather than testing and generating each key, call ssh-keygen -A.
1755 Patch from vinschen at redhat.com.
1756 - (dtucker) OpenBSD CVS Sync
1757 - dtucker@cvs.openbsd.org 2013/11/09 05:41:34
1758 [regress/test-exec.sh regress/rekey.sh]
1759 Use smaller test data files to speed up tests. Grow test datafiles
1760 where necessary for a specific test.
1761
176220131107
1763 - (djm) [ssh-pkcs11.c] Bring back "non-constant initialiser" fix (rev 1.5)
1764 that got lost in recent merge.
1765 - (djm) [Makefile.in monitor.c] Missed chunks of curve25519 KEX diff
1766 - (djm) [regress/modpipe.c regress/rekey.sh] Never intended to commit these
1767 - (djm) [configure.ac defines.h] Skip arc4random_stir() calls on platforms
1768 that lack it but have arc4random_uniform()
1769 - (djm) OpenBSD CVS Sync
1770 - markus@cvs.openbsd.org 2013/11/04 11:51:16
1771 [monitor.c]
1772 fix rekeying for KEX_C25519_SHA256; noted by dtucker@
1773 RCSID sync only; I thought this was a merge botch and fixed it already
1774 - markus@cvs.openbsd.org 2013/11/06 16:52:11
1775 [monitor_wrap.c]
1776 fix rekeying for AES-GCM modes; ok deraadt
1777 - djm@cvs.openbsd.org 2013/11/06 23:05:59
1778 [ssh-pkcs11.c]
1779 from portable: s/true/true_val/ to avoid name collisions on dump platforms
1780 RCSID sync only
1781 - (dtucker) OpenBSD CVS Sync
1782 - djm@cvs.openbsd.org 2013/10/09 23:44:14
1783 [regress/Makefile] (ID sync only)
1784 regression test for sftp request white/blacklisting and readonly mode.
1785 - markus@cvs.openbsd.org 2013/11/02 22:39:53
1786 [regress/kextype.sh]
1787 add curve25519-sha256@libssh.org
1788 - dtucker@cvs.openbsd.org 2013/11/04 12:27:42
1789 [regress/rekey.sh]
1790 Test rekeying with all KexAlgorithms.
1791 - dtucker@cvs.openbsd.org 2013/11/07 00:12:05
1792 [regress/rekey.sh]
1793 Test rekeying for every Cipher, MAC and KEX, plus test every KEX with
1794 the GCM ciphers.
1795 - dtucker@cvs.openbsd.org 2013/11/07 01:12:51
1796 [regress/rekey.sh]
1797 Factor out the data transfer rekey tests
1798 - dtucker@cvs.openbsd.org 2013/11/07 02:48:38
1799 [regress/integrity.sh regress/cipher-speed.sh regress/try-ciphers.sh]
1800 Use ssh -Q instead of hardcoding lists of ciphers or MACs.
1801 - dtucker@cvs.openbsd.org 2013/11/07 03:55:41
1802 [regress/kextype.sh]
1803 Use ssh -Q to get kex types instead of a static list.
1804 - dtucker@cvs.openbsd.org 2013/11/07 04:26:56
1805 [regress/kextype.sh]
1806 trailing space
1807 - (dtucker) [Makefile.in configure.ac] Remove TEST_SSH_SHA256 environment
1808 variable. It's no longer used now that we get the supported MACs from
1809 ssh -Q.
1810
181120131104
1812 - (djm) OpenBSD CVS Sync
1813 - markus@cvs.openbsd.org 2013/11/02 20:03:54
1814 [ssh-pkcs11.c]
1815 support pkcs#11 tokes that only provide x509 zerts instead of raw pubkeys;
1816 fixes bz#1908; based on patch from Laurent Barbe; ok djm
1817 - markus@cvs.openbsd.org 2013/11/02 21:59:15
1818 [kex.c kex.h myproposal.h ssh-keyscan.c sshconnect2.c sshd.c]
1819 use curve25519 for default key exchange (curve25519-sha256@libssh.org);
1820 initial patch from Aris Adamantiadis; ok djm@
1821 - markus@cvs.openbsd.org 2013/11/02 22:10:15
1822 [kexdhs.c kexecdhs.c]
1823 no need to include monitor_wrap.h
1824 - markus@cvs.openbsd.org 2013/11/02 22:24:24
1825 [kexdhs.c kexecdhs.c]
1826 no need to include ssh-gss.h
1827 - markus@cvs.openbsd.org 2013/11/02 22:34:01
1828 [auth-options.c]
1829 no need to include monitor_wrap.h and ssh-gss.h
1830 - markus@cvs.openbsd.org 2013/11/02 22:39:19
1831 [ssh_config.5 sshd_config.5]
1832 the default kex is now curve25519-sha256@libssh.org
1833 - djm@cvs.openbsd.org 2013/11/03 10:37:19
1834 [roaming_common.c]
1835 fix a couple of function definitions foo() -> foo(void)
1836 (-Wold-style-definition)
1837 - (djm) [kexc25519.c kexc25519c.c kexc25519s.c] Import missed files from
1838 KEX/curve25519 change
1839
184020131103
1841 - (dtucker) [openbsd-compat/bsd-misc.c] Include time.h for nanosleep.
1842 From OpenSMTPD where it prevents "implicit declaration" warnings (it's
1843 a no-op in OpenSSH). From chl at openbsd.
1844 - (dtucker) [openbsd-compat/setproctitle.c] Handle error case form the 2nd
1845 vsnprintf. From eric at openbsd via chl@.
1846 - (dtucker) [configure.ac defines.h] Add typedefs for intmax_t and uintmax_t
1847 for platforms that don't have them.
1848
184920131030
1850 - (djm) OpenBSD CVS Sync
1851 - djm@cvs.openbsd.org 2013/10/29 09:42:11
1852 [key.c key.h]
1853 fix potential stack exhaustion caused by nested certificates;
1854 report by Mateusz Kocielski; ok dtucker@ markus@
1855 - djm@cvs.openbsd.org 2013/10/29 09:48:02
1856 [servconf.c servconf.h session.c sshd_config sshd_config.5]
1857 shd_config PermitTTY to disallow TTY allocation, mirroring the
1858 longstanding no-pty authorized_keys option;
1859 bz#2070, patch from Teran McKinney; ok markus@
1860 - jmc@cvs.openbsd.org 2013/10/29 18:49:32
1861 [sshd_config.5]
1862 pty(4), not pty(7);
1863
186420131026
1865 - (djm) OpenBSD CVS Sync
1866 - djm@cvs.openbsd.org 2013/10/25 23:04:51
1867 [ssh.c]
1868 fix crash when using ProxyCommand caused by previous commit - was calling
1869 freeaddrinfo(NULL); spotted by sthen@ and Tim Ruehsen, patch by sthen@
1870
187120131025
1872 - (djm) [ssh-keygen.c ssh-keysign.c sshconnect1.c sshd.c] Remove
1873 unnecessary arc4random_stir() calls. The only ones left are to ensure
1874 that the PRNG gets a different state after fork() for platforms that
1875 have broken the API.
1876
187720131024
1878 - (djm) [auth-krb5.c] bz#2032 - use local username in krb5_kuserok check
1879 rather than full client name which may be of form user@REALM;
1880 patch from Miguel Sanders; ok dtucker@
1881 - (djm) OpenBSD CVS Sync
1882 - dtucker@cvs.openbsd.org 2013/10/23 05:40:58
1883 [servconf.c]
1884 fix comment
1885 - djm@cvs.openbsd.org 2013/10/23 23:35:32
1886 [sshd.c]
1887 include local address and port in "Connection from ..." message (only
1888 shown at loglevel>=verbose)
1889 - dtucker@cvs.openbsd.org 2013/10/24 00:49:49
1890 [moduli.c]
1891 Periodically print progress and, if possible, expected time to completion
1892 when screening moduli for DH groups. ok deraadt djm
1893 - dtucker@cvs.openbsd.org 2013/10/24 00:51:48
1894 [readconf.c servconf.c ssh_config.5 sshd_config.5]
1895 Disallow empty Match statements and add "Match all" which matches
1896 everything. ok djm, man page help jmc@
1897 - djm@cvs.openbsd.org 2013/10/24 08:19:36
1898 [ssh.c]
1899 fix bug introduced in hostname canonicalisation commit: don't try to
1900 resolve hostnames when a ProxyCommand is set unless the user has forced
1901 canonicalisation; spotted by Iain Morgan
1902 - (tim) [regress/sftp-perm.sh] We need a shell that understands "! somecmd"
1903
190420131023
1905 - (djm) OpenBSD CVS Sync
1906 - djm@cvs.openbsd.org 2013/10/20 04:39:28
1907 [ssh_config.5]
1908 document % expansions performed by "Match command ..."
1909 - djm@cvs.openbsd.org 2013/10/20 06:19:28
1910 [readconf.c ssh_config.5]
1911 rename "command" subclause of the recently-added "Match" keyword to
1912 "exec"; it's shorter, clearer in intent and we might want to add the
1913 ability to match against the command being executed at the remote end in
1914 the future.
1915 - djm@cvs.openbsd.org 2013/10/20 09:51:26
1916 [scp.1 sftp.1]
1917 add canonicalisation options to -o lists
1918 - jmc@cvs.openbsd.org 2013/10/20 18:00:13
1919 [ssh_config.5]
1920 tweak the "exec" description, as worded by djm;
1921 - djm@cvs.openbsd.org 2013/10/23 03:03:07
1922 [readconf.c]
1923 Hostname may have %h sequences that should be expanded prior to Match
1924 evaluation; spotted by Iain Morgan
1925 - djm@cvs.openbsd.org 2013/10/23 03:05:19
1926 [readconf.c ssh.c]
1927 comment
1928 - djm@cvs.openbsd.org 2013/10/23 04:16:22
1929 [ssh-keygen.c]
1930 Make code match documentation: relative-specified certificate expiry time
1931 should be relative to current time and not the validity start time.
1932 Reported by Petr Lautrbach; ok deraadt@
1933
193420131018
1935 - (djm) OpenBSD CVS Sync
1936 - djm@cvs.openbsd.org 2013/10/09 23:44:14
1937 [regress/Makefile regress/sftp-perm.sh]
1938 regression test for sftp request white/blacklisting and readonly mode.
1939 - jmc@cvs.openbsd.org 2013/10/17 07:35:48
1940 [sftp.1 sftp.c]
1941 tweak previous;
1942 - djm@cvs.openbsd.org 2013/10/17 22:08:04
1943 [sshd.c]
1944 include remote port in bad banner message; bz#2162
1945
194620131017
1947 - (djm) OpenBSD CVS Sync
1948 - jmc@cvs.openbsd.org 2013/10/15 14:10:25
1949 [ssh.1 ssh_config.5]
1950 tweak previous;
1951 - djm@cvs.openbsd.org 2013/10/16 02:31:47
1952 [readconf.c readconf.h roaming_client.c ssh.1 ssh.c ssh_config.5]
1953 [sshconnect.c sshconnect.h]
1954 Implement client-side hostname canonicalisation to allow an explicit
1955 search path of domain suffixes to use to convert unqualified host names
1956 to fully-qualified ones for host key matching.
1957 This is particularly useful for host certificates, which would otherwise
1958 need to list unqualified names alongside fully-qualified ones (and this
1959 causes a number of problems).
1960 "looks fine" markus@
1961 - jmc@cvs.openbsd.org 2013/10/16 06:42:25
1962 [ssh_config.5]
1963 tweak previous;
1964 - djm@cvs.openbsd.org 2013/10/16 22:49:39
1965 [readconf.c readconf.h ssh.1 ssh.c ssh_config.5]
1966 s/canonicalise/canonicalize/ for consistency with existing spelling,
1967 e.g. authorized_keys; pointed out by naddy@
1968 - djm@cvs.openbsd.org 2013/10/16 22:58:01
1969 [ssh.c ssh_config.5]
1970 one I missed in previous: s/isation/ization/
1971 - djm@cvs.openbsd.org 2013/10/17 00:30:13
1972 [PROTOCOL sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c]
1973 fsync@openssh.com protocol extension for sftp-server
1974 client support to allow calling fsync() faster successful transfer
1975 patch mostly by imorgan AT nas.nasa.gov; bz#1798
1976 "fine" markus@ "grumble OK" deraadt@ "doesn't sound bad to me" millert@
1977 - djm@cvs.openbsd.org 2013/10/17 00:46:49
1978 [ssh.c]
1979 rearrange check to reduce diff against -portable
1980 (Id sync only)
1981
198220131015
1983 - (djm) OpenBSD CVS Sync
1984 - djm@cvs.openbsd.org 2013/10/09 23:42:17
1985 [sftp-server.8 sftp-server.c]
1986 Add ability to whitelist and/or blacklist sftp protocol requests by name.
1987 Refactor dispatch loop and consolidate read-only mode checks.
1988 Make global variables static, since sftp-server is linked into sshd(8).
1989 ok dtucker@
1990 - djm@cvs.openbsd.org 2013/10/10 00:53:25
1991 [sftp-server.c]
1992 add -Q, -P and -p to usage() before jmc@ catches me
1993 - djm@cvs.openbsd.org 2013/10/10 01:43:03
1994 [sshd.c]
1995 bz#2139: fix re-exec fallback by ensuring that startup_pipe is correctly
1996 updated; ok dtucker@
1997 - djm@cvs.openbsd.org 2013/10/11 02:45:36
1998 [sftp-client.c]
1999 rename flag arguments to be more clear and consistent.
2000 reorder some internal function arguments to make adding additional flags
2001 easier.
2002 no functional change
2003 - djm@cvs.openbsd.org 2013/10/11 02:52:23
2004 [sftp-client.c]
2005 missed one arg reorder
2006 - djm@cvs.openbsd.org 2013/10/11 02:53:45
2007 [sftp-client.h]
2008 obsolete comment
2009 - jmc@cvs.openbsd.org 2013/10/14 14:18:56
2010 [sftp-server.8 sftp-server.c]
2011 tweak previous;
2012 ok djm
2013 - djm@cvs.openbsd.org 2013/10/14 21:20:52
2014 [session.c session.h]
2015 Add logging of session starts in a useful format; ok markus@ feedback and
2016 ok dtucker@
2017 - djm@cvs.openbsd.org 2013/10/14 22:22:05
2018 [readconf.c readconf.h ssh-keysign.c ssh.c ssh_config.5]
2019 add a "Match" keyword to ssh_config that allows matching on hostname,
2020 user and result of arbitrary commands. "nice work" markus@
2021 - djm@cvs.openbsd.org 2013/10/14 23:28:23
2022 [canohost.c misc.c misc.h readconf.c sftp-server.c ssh.c]
2023 refactor client config code a little:
2024 add multistate option partsing to readconf.c, similar to servconf.c's
2025 existing code.
2026 move checking of options that accept "none" as an argument to readconf.c
2027 add a lowercase() function and use it instead of explicit tolower() in
2028 loops
2029 part of a larger diff that was ok markus@
2030 - djm@cvs.openbsd.org 2013/10/14 23:31:01
2031 [ssh.c]
2032 whitespace at EOL; pointed out by markus@
2033 - [ssh.c] g/c unused variable.
2034
203520131010
2036 - (dtucker) OpenBSD CVS Sync
2037 - sthen@cvs.openbsd.org 2013/09/16 11:35:43
2038 [ssh_config]
2039 Remove gssapi config parts from ssh_config, as was already done for
2040 sshd_config. Req by/ok ajacoutot@
2041 ID SYNC ONLY for portable; kerberos/gssapi is still pretty popular
2042 - djm@cvs.openbsd.org 2013/09/19 00:24:52
2043 [progressmeter.c]
2044 store the initial file offset so the progress meter doesn't freak out
2045 when resuming sftp transfers. bz#2137; patch from Iain Morgan; ok dtucker@`
2046 - djm@cvs.openbsd.org 2013/09/19 00:49:12
2047 [sftp-client.c]
2048 fix swapped pflag and printflag in sftp upload_dir; from Iain Morgan
2049 - djm@cvs.openbsd.org 2013/09/19 01:24:46
2050 [channels.c]
2051 bz#1297 - tell the client (via packet_send_debug) when their preferred
2052 listen address has been overridden by the server's GatewayPorts;
2053 ok dtucker@
2054 - djm@cvs.openbsd.org 2013/09/19 01:26:29
2055 [sshconnect.c]
2056 bz#1211: make BindAddress work with UsePrivilegedPort=yes; patch from
2057 swp AT swp.pp.ru; ok dtucker@
2058 - dtucker@cvs.openbsd.org 2013/10/08 11:42:13
2059 [dh.c dh.h]
2060 Increase the size of the Diffie-Hellman groups requested for a each
2061 symmetric key size. New values from NIST Special Publication 800-57 with
2062 the upper limit specified by RFC4419. Pointed out by Peter Backes, ok
2063 djm@.
2064
206520131009
2066 - (djm) [openbsd-compat/arc4random.c openbsd-compat/chacha_private.h] Pull
2067 in OpenBSD implementation of arc4random, shortly to replace the existing
2068 bsd-arc4random.c
2069 - (djm) [openbsd-compat/Makefile.in openbsd-compat/arc4random.c]
2070 [openbsd-compat/bsd-arc4random.c] Replace old RC4-based arc4random
2071 implementation with recent OpenBSD's ChaCha-based PRNG. ok dtucker@,
2072 tested tim@
2073
207420130922
2075 - (dtucker) [platform.c platform.h sshd.c] bz#2156: restore Linux oom_adj
2076 setting when handling SIGHUP to maintain behaviour over retart. Patch
2077 from Matthew Ife.
2078
207920130918
2080 - (dtucker) [sshd_config] Trailing whitespace; from jstjohn at purdue edu.
2081
208220130914
2083 - (djm) OpenBSD CVS Sync
2084 - djm@cvs.openbsd.org 2013/08/22 19:02:21
2085 [sshd.c]
2086 Stir PRNG after post-accept fork. The child gets a different PRNG state
2087 anyway via rexec and explicit privsep reseeds, but it's good to be sure.
2088 ok markus@
2089 - mikeb@cvs.openbsd.org 2013/08/28 12:34:27
2090 [ssh-keygen.c]
2091 improve batch processing a bit by making use of the quite flag a bit
2092 more often and exit with a non zero code if asked to find a hostname
2093 in a known_hosts file and it wasn't there;
2094 originally from reyk@, ok djm
2095 - djm@cvs.openbsd.org 2013/08/31 00:13:54
2096 [sftp.c]
2097 make ^w match ksh behaviour (delete previous word instead of entire line)
2098 - deraadt@cvs.openbsd.org 2013/09/02 22:00:34
2099 [ssh-keygen.c sshconnect1.c sshd.c]
2100 All the instances of arc4random_stir() are bogus, since arc4random()
2101 does this itself, inside itself, and has for a very long time.. Actually,
2102 this was probably reducing the entropy available.
2103 ok djm
2104 ID SYNC ONLY for portable; we don't trust other arc4random implementations
2105 to do this right.
2106 - sthen@cvs.openbsd.org 2013/09/07 13:53:11
2107 [sshd_config]
2108 Remove commented-out kerberos/gssapi config options from sample config,
2109 kerberos support is currently not enabled in ssh in OpenBSD. Discussed with
2110 various people; ok deraadt@
2111 ID SYNC ONLY for portable; kerberos/gssapi is still pretty popular
2112 - djm@cvs.openbsd.org 2013/09/12 01:41:12
2113 [clientloop.c]
2114 fix connection crash when sending break (~B) on ControlPersist'd session;
2115 ok dtucker@
2116 - djm@cvs.openbsd.org 2013/09/13 06:54:34
2117 [channels.c]
2118 avoid unaligned access in code that reused a buffer to send a
2119 struct in_addr in a reply; simpler just use use buffer_put_int();
2120 from portable; spotted by and ok dtucker@
2121
212220130828
2123 - (djm) [openbsd-compat/bsd-snprintf.c] teach our local snprintf code the
2124 'j' (intmax_t/uintmax_t) and 'z' (size_t/ssize_t) conversions in case we
2125 start to use them in the future.
2126 - (djm) [openbsd-compat/bsd-snprintf.c] #ifdef noytet for intmax_t bits
2127 until we have configure support.
2128
212920130821
2130 - (djm) OpenBSD CVS Sync
2131 - djm@cvs.openbsd.org 2013/08/06 23:03:49
2132 [sftp.c]
2133 fix some whitespace at EOL
2134 make list of commands an enum rather than a long list of defines
2135 add -a to usage()
2136 - djm@cvs.openbsd.org 2013/08/06 23:05:01
2137 [sftp.1]
2138 document top-level -a option (the -a option to 'get' was already
2139 documented)
2140 - djm@cvs.openbsd.org 2013/08/06 23:06:01
2141 [servconf.c]
2142 add cast to avoid format warning; from portable
2143 - jmc@cvs.openbsd.org 2013/08/07 06:24:51
2144 [sftp.1 sftp.c]
2145 sort -a;
2146 - djm@cvs.openbsd.org 2013/08/08 04:52:04
2147 [sftp.c]
2148 fix two year old regression: symlinking a file would incorrectly
2149 canonicalise the target path. bz#2129 report from delphij AT freebsd.org
2150 - djm@cvs.openbsd.org 2013/08/08 05:04:03
2151 [sftp-client.c sftp-client.h sftp.c]
2152 add a "-l" flag for the rename command to force it to use the silly
2153 standard SSH_FXP_RENAME command instead of the POSIX-rename- like
2154 posix-rename@openssh.com extension.
2155
2156 intended for use in regress tests, so no documentation.
2157 - djm@cvs.openbsd.org 2013/08/09 03:37:25
2158 [sftp.c]
2159 do getopt parsing for all sftp commands (with an empty optstring for
2160 commands without arguments) to ensure consistent behaviour
2161 - djm@cvs.openbsd.org 2013/08/09 03:39:13
2162 [sftp-client.c]
2163 two problems found by a to-be-committed regress test: 1) msg_id was not
2164 being initialised so was starting at a random value from the heap
2165 (harmless, but confusing). 2) some error conditions were not being
2166 propagated back to the caller
2167 - djm@cvs.openbsd.org 2013/08/09 03:56:42
2168 [sftp.c]
2169 enable ctrl-left-arrow and ctrl-right-arrow to move forward/back a word;
2170 matching ksh's relatively recent change.
2171 - djm@cvs.openbsd.org 2013/08/13 18:32:08
2172 [ssh-keygen.c]
2173 typo in error message; from Stephan Rickauer
2174 - djm@cvs.openbsd.org 2013/08/13 18:33:08
2175 [ssh-keygen.c]
2176 another of the same typo
2177 - jmc@cvs.openbsd.org 2013/08/14 08:39:27
2178 [scp.1 ssh.1]
2179 some Bx/Ox conversion;
2180 From: Jan Stary
2181 - djm@cvs.openbsd.org 2013/08/20 00:11:38
2182 [readconf.c readconf.h ssh_config.5 sshconnect.c]
2183 Add a ssh_config ProxyUseFDPass option that supports the use of
2184 ProxyCommands that establish a connection and then pass a connected
2185 file descriptor back to ssh(1). This allows the ProxyCommand to exit
2186 rather than have to shuffle data back and forth and enables ssh to use
2187 getpeername, etc. to obtain address information just like it does with
2188 regular directly-connected sockets. ok markus@
2189 - jmc@cvs.openbsd.org 2013/08/20 06:56:07
2190 [ssh.1 ssh_config.5]
2191 some proxyusefdpass tweaks;
2192
219320130808
2194 - (dtucker) [regress/Makefile regress/test-exec.sh] Don't try to use test -nt
2195 since some platforms (eg really old FreeBSD) don't have it. Instead,
2196 run "make clean" before a complete regress run. ok djm.
2197 - (dtucker) [misc.c] Fall back to time(2) at runtime if clock_gettime(
2198 CLOCK_MONOTONIC...) fails. Some older versions of RHEL have the
2199 CLOCK_MONOTONIC define but don't actually support it. Found and tested
2200 by Kevin Brott, ok djm.
2201 - (dtucker) [misc.c] Remove define added for fallback testing that was
2202 mistakenly included in the previous commit.
2203 - (dtucker) [regress/Makefile regress/test-exec.sh] Roll back the -nt
2204 removal. The "make clean" removes modpipe which is built by the top-level
2205 directory before running the tests. Spotted by tim@
2206 - (djm) Release 6.3p1
2207
220820130804
2209 - (dtucker) [auth-krb5.c configure.ac openbsd-compat/bsd-misc.h] Add support
2210 for building with older Heimdal versions. ok djm.
2211
221220130801
2213 - (djm) [channels.c channels.h] bz#2135: On Solaris, isatty() on a non-
2214 blocking connecting socket will clear any stored errno that might
2215 otherwise have been retrievable via getsockopt(). A hack to limit writes
2216 to TTYs on AIX was triggering this. Since only AIX needs the hack, wrap
2217 it in an #ifdef. Diagnosis and patch from Ivo Raisr.
2218 - (djm) [sshlogin.h] Fix prototype merge botch from 2006; bz#2134
2219
222020130725
2221 - (djm) OpenBSD CVS Sync
2222 - djm@cvs.openbsd.org 2013/07/20 22:20:42
2223 [krl.c]
2224 fix verification error in (as-yet usused) KRL signature checking path
2225 - djm@cvs.openbsd.org 2013/07/22 05:00:17
2226 [umac.c]
2227 make MAC key, data to be hashed and nonce for final hash const;
2228 checked with -Wcast-qual
2229 - djm@cvs.openbsd.org 2013/07/22 12:20:02
2230 [umac.h]
2231 oops, forgot to commit corresponding header change;
2232 spotted by jsg and jasper
2233 - djm@cvs.openbsd.org 2013/07/25 00:29:10
2234 [ssh.c]
2235 daemonise backgrounded (ControlPersist'ed) multiplexing master to ensure
2236 it is fully detached from its controlling terminal. based on debugging
2237 - djm@cvs.openbsd.org 2013/07/25 00:56:52
2238 [sftp-client.c sftp-client.h sftp.1 sftp.c]
2239 sftp support for resuming partial downloads; patch mostly by Loganaden
2240 Velvindron/AfriNIC with some tweaks by me; feedback and ok dtucker@
2241 "Just be careful" deraadt@
2242 - djm@cvs.openbsd.org 2013/07/25 00:57:37
2243 [version.h]
2244 openssh-6.3 for release
2245 - dtucker@cvs.openbsd.org 2013/05/30 20:12:32
2246 [regress/test-exec.sh]
2247 use ssh and sshd as testdata since it needs to be >256k for the rekey test
2248 - dtucker@cvs.openbsd.org 2013/06/10 21:56:43
2249 [regress/forwarding.sh]
2250 Add test for forward config parsing
2251 - djm@cvs.openbsd.org 2013/06/21 02:26:26
2252 [regress/sftp-cmds.sh regress/test-exec.sh]
2253 unbreak sftp-cmds for renamed test data (s/ls/data/)
2254 - (tim) [sftp-client.c] Use of a gcc extension trips up native compilers on
2255 Solaris and UnixWare. Feedback and OK djm@
2256 - (tim) [regress/forwarding.sh] Fix for building outside source tree.
2257
225820130720
2259 - (djm) OpenBSD CVS Sync
2260 - markus@cvs.openbsd.org 2013/07/19 07:37:48
2261 [auth.h kex.h kexdhs.c kexecdhs.c kexgexs.c monitor.c servconf.c]
2262 [servconf.h session.c sshd.c sshd_config.5]
2263 add ssh-agent(1) support to sshd(8); allows encrypted hostkeys,
2264 or hostkeys on smartcards; most of the work by Zev Weiss; bz #1974
2265 ok djm@
2266 - djm@cvs.openbsd.org 2013/07/20 01:43:46
2267 [umac.c]
2268 use a union to ensure correct alignment; ok deraadt
2269 - djm@cvs.openbsd.org 2013/07/20 01:44:37
2270 [ssh-keygen.c ssh.c]
2271 More useful error message on missing current user in /etc/passwd
2272 - djm@cvs.openbsd.org 2013/07/20 01:50:20
2273 [ssh-agent.c]
2274 call cleanup_handler on SIGINT when in debug mode to ensure sockets
2275 are cleaned up on manual exit; bz#2120
2276 - djm@cvs.openbsd.org 2013/07/20 01:55:13
2277 [auth-krb5.c gss-serv-krb5.c gss-serv.c]
2278 fix kerberos/GSSAPI deprecation warnings and linking; "looks okay" millert@
2279
228020130718
2281 - (djm) OpenBSD CVS Sync
2282 - dtucker@cvs.openbsd.org 2013/06/10 19:19:44
2283 [readconf.c]
2284 revert 1.203 while we investigate crashes reported by okan@
2285 - guenther@cvs.openbsd.org 2013/06/17 04:48:42
2286 [scp.c]
2287 Handle time_t values as long long's when formatting them and when
2288 parsing them from remote servers.
2289 Improve error checking in parsing of 'T' lines.
2290 ok dtucker@ deraadt@
2291 - markus@cvs.openbsd.org 2013/06/20 19:15:06
2292 [krl.c]
2293 don't leak the rdata blob on errors; ok djm@
2294 - djm@cvs.openbsd.org 2013/06/21 00:34:49
2295 [auth-rsa.c auth.h auth2-hostbased.c auth2-pubkey.c monitor.c]
2296 for hostbased authentication, print the client host and user on
2297 the auth success/failure line; bz#2064, ok dtucker@
2298 - djm@cvs.openbsd.org 2013/06/21 00:37:49
2299 [ssh_config.5]
2300 explicitly mention that IdentitiesOnly can be used with IdentityFile
2301 to control which keys are offered from an agent.
2302 - djm@cvs.openbsd.org 2013/06/21 05:42:32
2303 [dh.c]
2304 sprinkle in some error() to explain moduli(5) parse failures
2305 - djm@cvs.openbsd.org 2013/06/21 05:43:10
2306 [scp.c]
2307 make this -Wsign-compare clean after time_t conversion
2308 - djm@cvs.openbsd.org 2013/06/22 06:31:57
2309 [scp.c]
2310 improved time_t overflow check suggested by guenther@
2311 - jmc@cvs.openbsd.org 2013/06/27 14:05:37
2312 [ssh-keygen.1 ssh.1 ssh_config.5 sshd.8 sshd_config.5]
2313 do not use Sx for sections outwith the man page - ingo informs me that
2314 stuff like html will render with broken links;
2315 issue reported by Eric S. Raymond, via djm
2316 - markus@cvs.openbsd.org 2013/07/02 12:31:43
2317 [dh.c]
2318 remove extra whitespace
2319 - djm@cvs.openbsd.org 2013/07/12 00:19:59
2320 [auth-options.c auth-rsa.c bufaux.c buffer.h channels.c hostfile.c]
2321 [hostfile.h mux.c packet.c packet.h roaming_common.c serverloop.c]
2322 fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@
2323 - djm@cvs.openbsd.org 2013/07/12 00:20:00
2324 [sftp.c ssh-keygen.c ssh-pkcs11.c]
2325 fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@
2326 - djm@cvs.openbsd.org 2013/07/12 00:43:50
2327 [misc.c]
2328 in ssh_gai_strerror() don't fallback to strerror for EAI_SYSTEM when
2329 errno == 0. Avoids confusing error message in some broken resolver
2330 cases. bz#2122 patch from plautrba AT redhat.com; ok dtucker
2331 - djm@cvs.openbsd.org 2013/07/12 05:42:03
2332 [ssh-keygen.c]
2333 do_print_resource_record() can never be called with a NULL filename, so
2334 don't attempt (and bungle) asking for one if it has not been specified
2335 bz#2127 ok dtucker@
2336 - djm@cvs.openbsd.org 2013/07/12 05:48:55
2337 [ssh.c]
2338 set TCP nodelay for connections started with -N; bz#2124 ok dtucker@
2339 - schwarze@cvs.openbsd.org 2013/07/16 00:07:52
2340 [scp.1 sftp-server.8 ssh-keyscan.1 ssh-keysign.8 ssh-pkcs11-helper.8]
2341 use .Mt for email addresses; from Jan Stary <hans at stare dot cz>; ok jmc@
2342 - djm@cvs.openbsd.org 2013/07/18 01:12:26
2343 [ssh.1]
2344 be more exact wrt perms for ~/.ssh/config; bz#2078
2345
234620130702
2347 - (dtucker) [contrib/cygwin/README contrib/cygwin/ssh-host-config
2348 contrib/cygwin/ssh-user-config] Modernizes and improve readability of
2349 the Cygwin README file (which hasn't been updated for ages), drop
2350 unsupported OSes from the ssh-host-config help text, and drop an
2351 unneeded option from ssh-user-config. Patch from vinschen at redhat com.
2352
235320130610
2354 - (djm) OpenBSD CVS Sync
2355 - dtucker@cvs.openbsd.org 2013/06/07 15:37:52
2356 [channels.c channels.h clientloop.c]
2357 Add an "ABANDONED" channel state and use for mux sessions that are
2358 disconnected via the ~. escape sequence. Channels in this state will
2359 be able to close if the server responds, but do not count as active channels.
2360 This means that if you ~. all of the mux clients when using ControlPersist
2361 on a broken network, the backgrounded mux master will exit when the
2362 Control Persist time expires rather than hanging around indefinitely.
2363 bz#1917, also reported and tested by tedu@. ok djm@ markus@.
2364 - (dtucker) [Makefile.in configure.ac fixalgorithms] Remove unsupported
2365 algorithms (Ciphers, MACs and HostKeyAlgorithms) from man pages.
2366 - (dtucker) [myproposal.h] Do not advertise AES GSM ciphers if we don't have
2367 the required OpenSSL support. Patch from naddy at freebsd.
2368 - (dtucker) [myproposal.h] Make the conditional algorithm support consistent
2369 and add some comments so it's clear what goes where.
2370
237120130605
2372 - (dtucker) [myproposal.h] Enable sha256 kex methods based on the presence of
2373 the necessary functions, not from the openssl version.
2374 - (dtucker) [contrib/ssh-copy-id] bz#2117: Use portable operator in test.
2375 Patch from cjwatson at debian.
2376 - (dtucker) [regress/forwarding.sh] For (as yet unknown) reason, the
2377 forwarding test is extremely slow copying data on some machines so switch
2378 back to copying the much smaller ls binary until we can figure out why
2379 this is.
2380 - (dtucker) [Makefile.in] append $CFLAGS to compiler options when building
2381 modpipe in case there's anything in there we need.
2382 - (dtucker) OpenBSD CVS Sync
2383 - dtucker@cvs.openbsd.org 2013/06/02 21:01:51
2384 [channels.h]
2385 typo in comment
2386 - dtucker@cvs.openbsd.org 2013/06/02 23:36:29
2387 [clientloop.h clientloop.c mux.c]
2388 No need for the mux cleanup callback to be visible so restore it to static
2389 and call it through the detach_user function pointer. ok djm@
2390 - dtucker@cvs.openbsd.org 2013/06/03 00:03:18
2391 [mac.c]
2392 force the MAC output to be 64-bit aligned so umac won't see unaligned
2393 accesses on strict-alignment architectures. bz#2101, patch from
2394 tomas.kuthan at oracle.com, ok djm@
2395 - dtucker@cvs.openbsd.org 2013/06/04 19:12:23
2396 [scp.c]
2397 use MAXPATHLEN for buffer size instead of fixed value. ok markus
2398 - dtucker@cvs.openbsd.org 2013/06/04 20:42:36
2399 [sftp.c]
2400 Make sftp's libedit interface marginally multibyte aware by building up
2401 the quoted string by character instead of by byte. Prevents failures
2402 when linked against a libedit built with wide character support (bz#1990).
2403 "looks ok" djm
2404 - dtucker@cvs.openbsd.org 2013/06/05 02:07:29
2405 [mux.c]
2406 fix leaks in mux error paths, from Zhenbo Xu, found by Melton. bz#1967,
2407 ok djm
2408 - dtucker@cvs.openbsd.org 2013/06/05 02:27:50
2409 [sshd.c]
2410 When running sshd -D, close stderr unless we have explicitly requesting
2411 logging to stderr. From james.hunt at ubuntu.com via bz#1976, djm's patch
2412 so, err, ok dtucker.
2413 - dtucker@cvs.openbsd.org 2013/06/05 12:52:38
2414 [sshconnect2.c]
2415 Fix memory leaks found by Zhenbo Xu and the Melton tool. bz#1967, ok djm
2416 - dtucker@cvs.openbsd.org 2013/06/05 22:00:28
2417 [readconf.c]
2418 plug another memleak. bz#1967, from Zhenbo Xu, detected by Melton, ok djm
2419 - (dtucker) [configure.ac sftp.c openbsd-compat/openbsd-compat.h] Cater for
2420 platforms that don't have multibyte character support (specifically,
2421 mblen).
2422
242320130602
2424 - (tim) [Makefile.in] Make Solaris, UnixWare, & OpenServer linkers happy
2425 linking regress/modpipe.
2426 - (dtucker) OpenBSD CVS Sync
2427 - dtucker@cvs.openbsd.org 2013/06/02 13:33:05
2428 [progressmeter.c]
2429 Add misc.h for monotime prototype. (ID sync only).
2430 - dtucker@cvs.openbsd.org 2013/06/02 13:35:58
2431 [ssh-agent.c]
2432 Make parent_alive_interval time_t to avoid signed/unsigned comparison
2433 - (dtucker) [configure.ac] sys/un.h needs sys/socket.h on some platforms
2434 to prevent noise from configure. Patch from Nathan Osman. (bz#2114).
2435 - (dtucker) [configure.ac] bz#2111: don't try to use lastlog on Android.
2436 Patch from Nathan Osman.
2437 - (tim) [configure.ac regress/Makefile] With rev 1.47 of test-exec.sh we
2438 need a shell that can handle "[ file1 -nt file2 ]". Rather than keep
2439 dealing with shell portability issues in regression tests, we let
2440 configure find us a capable shell on those platforms with an old /bin/sh.
2441 - (tim) [aclocal.m4] Enhance OSSH_CHECK_CFLAG_COMPILE to check stderr.
2442 feedback and ok dtucker
2443 - (tim) [regress/sftp-chroot.sh] skip if no sudo. ok dtucker
2444 - (dtucker) [configure.ac] Some platforms need sys/types.h before sys/un.h.
2445 - (dtucker) [configure.ac] Some other platforms need sys/types.h before
2446 sys/socket.h.
2447
244820130601
2449 - (dtucker) [configure.ac openbsd-compat/xcrypt.c] bz#2112: fall back to
2450 using openssl's DES_crypt function on platorms that don't have a native
2451 one, eg Android. Based on a patch from Nathan Osman.
2452 - (dtucker) [configure.ac defines.h] Test for fd_mask, howmany and NFDBITS
2453 rather than trying to enumerate the plaforms that don't have them.
2454 Based on a patch from Nathan Osman, with help from tim@.
2455 - (dtucker) OpenBSD CVS Sync
2456 - djm@cvs.openbsd.org 2013/05/17 00:13:13
2457 [xmalloc.h cipher.c sftp-glob.c ssh-keyscan.c ssh.c sftp-common.c
2458 ssh-ecdsa.c auth2-chall.c compat.c readconf.c kexgexs.c monitor.c
2459 gss-genr.c cipher-3des1.c kex.c monitor_wrap.c ssh-pkcs11-client.c
2460 auth-options.c rsa.c auth2-pubkey.c sftp.c hostfile.c auth2.c
2461 servconf.c auth.c authfile.c xmalloc.c uuencode.c sftp-client.c
2462 auth2-gss.c sftp-server.c bufaux.c mac.c session.c jpake.c kexgexc.c
2463 sshconnect.c auth-chall.c auth2-passwd.c sshconnect1.c buffer.c
2464 kexecdhs.c kexdhs.c ssh-rsa.c auth1.c ssh-pkcs11.c auth2-kbdint.c
2465 kexdhc.c sshd.c umac.c ssh-dss.c auth2-jpake.c bufbn.c clientloop.c
2466 monitor_mm.c scp.c roaming_client.c serverloop.c key.c auth-rsa.c
2467 ssh-pkcs11-helper.c ssh-keysign.c ssh-keygen.c match.c channels.c
2468 sshconnect2.c addrmatch.c mux.c canohost.c kexecdhc.c schnorr.c
2469 ssh-add.c misc.c auth2-hostbased.c ssh-agent.c bufec.c groupaccess.c
2470 dns.c packet.c readpass.c authfd.c moduli.c]
2471 bye, bye xfree(); ok markus@
2472 - djm@cvs.openbsd.org 2013/05/19 02:38:28
2473 [auth2-pubkey.c]
2474 fix failure to recognise cert-authority keys if a key of a different type
2475 appeared in authorized_keys before it; ok markus@
2476 - djm@cvs.openbsd.org 2013/05/19 02:42:42
2477 [auth.h auth.c key.c monitor.c auth-rsa.c auth2.c auth1.c key.h]
2478 Standardise logging of supplemental information during userauth. Keys
2479 and ruser is now logged in the auth success/failure message alongside
2480 the local username, remote host/port and protocol in use. Certificates
2481 contents and CA are logged too.
2482 Pushing all logging onto a single line simplifies log analysis as it is
2483 no longer necessary to relate information scattered across multiple log
2484 entries. "I like it" markus@
2485 - dtucker@cvs.openbsd.org 2013/05/31 12:28:10
2486 [ssh-agent.c]
2487 Use time_t where appropriate. ok djm
2488 - dtucker@cvs.openbsd.org 2013/06/01 13:15:52
2489 [ssh-agent.c clientloop.c misc.h packet.c progressmeter.c misc.c
2490 channels.c sandbox-systrace.c]
2491 Use clock_gettime(CLOCK_MONOTONIC ...) for ssh timers so that things like
2492 keepalives and rekeying will work properly over clock steps. Suggested by
2493 markus@, "looks good" djm@.
2494 - dtucker@cvs.openbsd.org 2013/06/01 20:59:25
2495 [scp.c sftp-client.c]
2496 Replace S_IWRITE, which isn't standardized, with S_IWUSR, which is. Patch
2497 from Nathan Osman via bz#2085. ok deraadt.
2498 - dtucker@cvs.openbsd.org 2013/06/01 22:34:50
2499 [sftp-client.c]
2500 Update progressmeter when data is acked, not when it's sent. bz#2108, from
2501 Debian via Colin Watson, ok djm@
2502 - (dtucker) [M auth-chall.c auth-krb5.c auth-pam.c cipher-aes.c cipher-ctr.c
2503 groupaccess.c loginrec.c monitor.c monitor_wrap.c session.c sshd.c
2504 sshlogin.c uidswap.c openbsd-compat/bsd-cygwin_util.c
2505 openbsd-compat/getrrsetbyname-ldns.c openbsd-compat/port-aix.c
2506 openbsd-compat/port-linux.c] Replace portable-specific instances of xfree
2507 with the equivalent calls to free.
2508 - (dtucker) [configure.ac misc.c] Look for clock_gettime in librt and fall
2509 back to time(NULL) if we can't find it anywhere.
2510 - (dtucker) [sandbox-seccomp-filter.c] Allow clock_gettimeofday.
2511
251220130529
2513 - (dtucker) [configure.ac openbsd-compat/bsd-misc.h] bz#2087: Add a null
2514 implementation of endgrent for platforms that don't have it (eg Android).
2515 Loosely based on a patch from Nathan Osman, ok djm
2516
2517 20130517
2518 - (dtucker) OpenBSD CVS Sync
2519 - djm@cvs.openbsd.org 2013/03/07 00:20:34
2520 [regress/proxy-connect.sh]
2521 repeat test with a style appended to the username
2522 - dtucker@cvs.openbsd.org 2013/03/23 11:09:43
2523 [regress/test-exec.sh]
2524 Only regenerate host keys if they don't exist or if ssh-keygen has changed
2525 since they were. Reduces test runtime by 5-30% depending on machine
2526 speed.
2527 - dtucker@cvs.openbsd.org 2013/04/06 06:00:22
2528 [regress/rekey.sh regress/test-exec.sh regress/integrity.sh
2529 regress/multiplex.sh Makefile regress/cfgmatch.sh]
2530 Split the regress log into 3 parts: the debug output from ssh, the debug
2531 log from sshd and the output from the client command (ssh, scp or sftp).
2532 Somewhat functional now, will become more useful when ssh/sshd -E is added.
2533 - dtucker@cvs.openbsd.org 2013/04/07 02:16:03
2534 [regress/Makefile regress/rekey.sh regress/integrity.sh
2535 regress/sshd-log-wrapper.sh regress/forwarding.sh regress/test-exec.sh]
2536 use -E option for ssh and sshd to write debuging logs to ssh{,d}.log and
2537 save the output from any failing tests. If a test fails the debug output
2538 from ssh and sshd for the failing tests (and only the failing tests) should
2539 be available in failed-ssh{,d}.log.
2540 - djm@cvs.openbsd.org 2013/04/18 02:46:12
2541 [regress/Makefile regress/sftp-chroot.sh]
2542 test sshd ChrootDirectory+internal-sftp; feedback & ok dtucker@
2543 - dtucker@cvs.openbsd.org 2013/04/22 07:23:08
2544 [regress/multiplex.sh]
2545 Write mux master logs to regress.log instead of ssh.log to keep separate
2546 - djm@cvs.openbsd.org 2013/05/10 03:46:14
2547 [regress/modpipe.c]
2548 sync some portability changes from portable OpenSSH (id sync only)
2549 - dtucker@cvs.openbsd.org 2013/05/16 02:10:35
2550 [regress/rekey.sh]
2551 Add test for time-based rekeying
2552 - dtucker@cvs.openbsd.org 2013/05/16 03:33:30
2553 [regress/rekey.sh]
2554 test rekeying when there's no data being transferred
2555 - dtucker@cvs.openbsd.org 2013/05/16 04:26:10
2556 [regress/rekey.sh]
2557 add server-side rekey test
2558 - dtucker@cvs.openbsd.org 2013/05/16 05:48:31
2559 [regress/rekey.sh]
2560 add tests for RekeyLimit parsing
2561 - dtucker@cvs.openbsd.org 2013/05/17 00:37:40
2562 [regress/agent.sh regress/keytype.sh regress/cfgmatch.sh
2563 regress/forcecommand.sh regress/proto-version.sh regress/test-exec.sh
2564 regress/cipher-speed.sh regress/cert-hostkey.sh regress/cert-userkey.sh
2565 regress/ssh-com.sh]
2566 replace 'echo -n' with 'printf' since it's more portable
2567 also remove "echon" hack.
2568 - dtucker@cvs.openbsd.org 2013/05/17 01:16:09
2569 [regress/agent-timeout.sh]
2570 Pull back some portability changes from -portable:
2571 - TIMEOUT is a read-only variable in some shells
2572 - not all greps have -q so redirect to /dev/null instead.
2573 (ID sync only)
2574 - dtucker@cvs.openbsd.org 2013/05/17 01:32:11
2575 [regress/integrity.sh]
2576 don't print output from ssh before getting it (it's available in ssh.log)
2577 - dtucker@cvs.openbsd.org 2013/05/17 04:29:14
2578 [regress/sftp.sh regress/putty-ciphers.sh regress/cipher-speed.sh
2579 regress/test-exec.sh regress/sftp-batch.sh regress/dynamic-forward.sh
2580 regress/putty-transfer.sh regress/conch-ciphers.sh regress/sftp-cmds.sh
2581 regress/scp.sh regress/ssh-com-sftp.sh regress/rekey.sh
2582 regress/putty-kex.sh regress/stderr-data.sh regress/stderr-after-eof.sh
2583 regress/sftp-badcmds.sh regress/reexec.sh regress/ssh-com-client.sh
2584 regress/sftp-chroot.sh regress/forwarding.sh regress/transfer.sh
2585 regress/multiplex.sh]
2586 Move the setting of DATA and COPY into test-exec.sh
2587 - dtucker@cvs.openbsd.org 2013/05/17 10:16:26
2588 [regress/try-ciphers.sh]
2589 use expr for math to keep diffs vs portable down
2590 (id sync only)
2591 - dtucker@cvs.openbsd.org 2013/05/17 10:23:52
2592 [regress/login-timeout.sh regress/reexec.sh regress/test-exec.sh]
2593 Use SUDO when cat'ing pid files and running the sshd log wrapper so that
2594 it works with a restrictive umask and the pid files are not world readable.
2595 Changes from -portable. (id sync only)
2596 - dtucker@cvs.openbsd.org 2013/05/17 10:24:48
2597 [regress/localcommand.sh]
2598 use backticks for portability. (id sync only)
2599 - dtucker@cvs.openbsd.org 2013/05/17 10:26:26
2600 [regress/sftp-badcmds.sh]
2601 remove unused BATCH variable. (id sync only)
2602 - dtucker@cvs.openbsd.org 2013/05/17 10:28:11
2603 [regress/sftp.sh]
2604 only compare copied data if sftp succeeds. from portable (id sync only)
2605 - dtucker@cvs.openbsd.org 2013/05/17 10:30:07
2606 [regress/test-exec.sh]
2607 wait a bit longer for startup and use case for absolute path.
2608 from portable (id sync only)
2609 - dtucker@cvs.openbsd.org 2013/05/17 10:33:09
2610 [regress/agent-getpeereid.sh]
2611 don't redirect stdout from sudo. from portable (id sync only)
2612 - dtucker@cvs.openbsd.org 2013/05/17 10:34:30
2613 [regress/portnum.sh]
2614 use a more portable negated if structure. from portable (id sync only)
2615 - dtucker@cvs.openbsd.org 2013/05/17 10:35:43
2616 [regress/scp.sh]
2617 use a file extention that's not special on some platforms. from portable
2618 (id sync only)
2619 - (dtucker) [regress/bsd.regress.mk] Remove unused file. We've never used it
2620 in portable and it's long gone in openbsd.
2621 - (dtucker) [regress/integrity.sh]. Force fixed Diffie-Hellman key exchange
2622 methods. When the openssl version doesn't support ECDH then next one on
2623 the list is DH group exchange, but that causes a bit more traffic which can
2624 mean that the tests flip bits in the initial exchange rather than the MACed
2625 traffic and we get different errors to what the tests look for.
2626 - (dtucker) [openbsd-compat/getopt.h] Remove unneeded bits.
2627 - (dtucker) [regress/cfgmatch.sh] Resync config file setup with openbsd.
2628 - (dtucker) [regress/agent-getpeereid.sh] Resync spaces with openbsd.
2629 - (dtucker) [regress/integrity.sh regress/krl.sh regress/test-exec.sh]
2630 Move the jot helper function to portable-specific part of test-exec.sh.
2631 - (dtucker) [regress/test-exec.sh] Move the portable-specific functions
2632 together and add a couple of missing lines from openbsd.
2633 - (dtucker) [regress/stderr-after-eof.sh regress/test-exec.sh] Move the md5
2634 helper function to the portable part of test-exec.sh.
2635 - (dtucker) [regress/runtests.sh] Remove obsolete test driver script.
2636 - (dtucker) [regress/cfgmatch.sh] Remove unneeded sleep renderd obsolete by
2637 rev 1.6 which calls wait.
2638
263920130516
2640 - (djm) [contrib/ssh-copy-id] Fix bug that could cause "rm *" to be
2641 executed if mktemp failed; bz#2105 ok dtucker@
2642 - (dtucker) OpenBSD CVS Sync
2643 - tedu@cvs.openbsd.org 2013/04/23 17:49:45
2644 [misc.c]
2645 use xasprintf instead of a series of strlcats and strdup. ok djm
2646 - tedu@cvs.openbsd.org 2013/04/24 16:01:46
2647 [misc.c]
2648 remove extra parens noticed by nicm
2649 - dtucker@cvs.openbsd.org 2013/05/06 07:35:12
2650 [sftp-server.8]
2651 Reference the version of the sftp draft we actually implement. ok djm@
2652 - djm@cvs.openbsd.org 2013/05/10 03:40:07
2653 [sshconnect2.c]
2654 fix bzero(ptr_to_struct, sizeof(ptr_to_struct)); bz#2100 from
2655 Colin Watson
2656 - djm@cvs.openbsd.org 2013/05/10 04:08:01
2657 [key.c]
2658 memleak in cert_free(), wasn't actually freeing the struct;
2659 bz#2096 from shm AT digitalsun.pl
2660 - dtucker@cvs.openbsd.org 2013/05/10 10:13:50
2661 [ssh-pkcs11-helper.c]
2662 remove unused extern optarg. ok markus@
2663 - dtucker@cvs.openbsd.org 2013/05/16 02:00:34
2664 [ssh_config sshconnect2.c packet.c readconf.h readconf.c clientloop.c
2665 ssh_config.5 packet.h]
2666 Add an optional second argument to RekeyLimit in the client to allow
2667 rekeying based on elapsed time in addition to amount of traffic.
2668 with djm@ jmc@, ok djm
2669 - dtucker@cvs.openbsd.org 2013/05/16 04:09:14
2670 [sshd_config.5 servconf.c servconf.h packet.c serverloop.c monitor.c sshd_config
2671 sshd.c] Add RekeyLimit to sshd with the same syntax as the client allowing
2672 rekeying based on traffic volume or time. ok djm@, help & ok jmc@ for the man
2673 page.
2674 - djm@cvs.openbsd.org 2013/05/16 04:27:50
2675 [ssh_config.5 readconf.h readconf.c]
2676 add the ability to ignore specific unrecognised ssh_config options;
2677 bz#866; ok markus@
2678 - jmc@cvs.openbsd.org 2013/05/16 06:28:45
2679 [ssh_config.5]
2680 put IgnoreUnknown in the right place;
2681 - jmc@cvs.openbsd.org 2013/05/16 06:30:06
2682 [sshd_config.5]
2683 oops! avoid Xr to self;
2684 - dtucker@cvs.openbsd.org 2013/05/16 09:08:41
2685 [log.c scp.c sshd.c serverloop.c schnorr.c sftp.c]
2686 Fix some "unused result" warnings found via clang and -portable.
2687 ok markus@
2688 - dtucker@cvs.openbsd.org 2013/05/16 09:12:31
2689 [readconf.c servconf.c]
2690 switch RekeyLimit traffic volume parsing to scan_scaled. ok djm@
2691 - dtucker@cvs.openbsd.org 2013/05/16 10:43:34
2692 [servconf.c readconf.c]
2693 remove now-unused variables
2694 - dtucker@cvs.openbsd.org 2013/05/16 10:44:06
2695 [servconf.c]
2696 remove another now-unused variable
2697 - (dtucker) [configure.ac readconf.c servconf.c
2698 openbsd-compat/openbsd-compat.h] Add compat bits for scan_scaled.
2699
270020130510
2701 - (dtucker) [configure.ac] Enable -Wsizeof-pointer-memaccess if the compiler
2702 supports it. Mentioned by Colin Watson in bz#2100, ok djm.
2703 - (dtucker) [openbsd-compat/getopt.c] Factor out portibility changes to
2704 getopt.c. Preprocessed source is identical other than line numbers.
2705 - (dtucker) [openbsd-compat/getopt_long.c] Import from OpenBSD. No
2706 portability changes yet.
2707 - (dtucker) [openbsd-compat/Makefile.in openbsd-compat/getopt.c
2708 openbsd-compat/getopt_long.c regress/modpipe.c] Remove getopt.c, add
2709 portability code to getopt_long.c and switch over Makefile and the ugly
2710 hack in modpipe.c. Fixes bz#1448.
2711 - (dtucker) [openbsd-compat/getopt.h openbsd-compat/getopt_long.c
2712 openbsd-compat/openbsd-compat.h] pull in getopt.h from openbsd and plumb
2713 in to use it when we're using our own getopt.
2714 - (dtucker) [kex.c] Only include sha256 and ECC key exchange methods when the
2715 underlying libraries support them.
2716 - (dtucker) [configure.ac] Add -Werror to the -Qunused-arguments test so
2717 we don't get a warning on compilers that *don't* support it. Add
2718 -Wno-unknown-warning-option. Move both to the start of the list for
2719 maximum noise suppression. Tested with gcc 4.6.3, gcc 2.95.4 and clang 2.9.
2720
272120130423
2722 - (djm) [auth.c configure.ac misc.c monitor.c monitor_wrap.c] Support
2723 platforms, such as Android, that lack struct passwd.pw_gecos. Report
2724 and initial patch from Nathan Osman bz#2086; feedback tim@ ok dtucker@
2725 - (djm) OpenBSD CVS Sync
2726 - markus@cvs.openbsd.org 2013/03/05 20:16:09
2727 [sshconnect2.c]
2728 reset pubkey order on partial success; ok djm@
2729 - djm@cvs.openbsd.org 2013/03/06 23:35:23
2730 [session.c]
2731 fatal() when ChrootDirectory specified by running without root privileges;
2732 ok markus@
2733 - djm@cvs.openbsd.org 2013/03/06 23:36:53
2734 [readconf.c]
2735 g/c unused variable (-Wunused)
2736 - djm@cvs.openbsd.org 2013/03/07 00:19:59
2737 [auth2-pubkey.c monitor.c]
2738 reconstruct the original username that was sent by the client, which may
2739 have included a style (e.g. "root:skey") when checking public key
2740 signatures. Fixes public key and hostbased auth when the client specified
2741 a style; ok markus@
2742 - markus@cvs.openbsd.org 2013/03/07 19:27:25
2743 [auth.h auth2-chall.c auth2.c monitor.c sshd_config.5]
2744 add submethod support to AuthenticationMethods; ok and freedback djm@
2745 - djm@cvs.openbsd.org 2013/03/08 06:32:58
2746 [ssh.c]
2747 allow "ssh -f none ..." ok markus@
2748 - djm@cvs.openbsd.org 2013/04/05 00:14:00
2749 [auth2-gss.c krl.c sshconnect2.c]
2750 hush some {unused, printf type} warnings
2751 - djm@cvs.openbsd.org 2013/04/05 00:31:49
2752 [pathnames.h]
2753 use the existing _PATH_SSH_USER_RC define to construct the other
2754 pathnames; bz#2077, ok dtucker@ (no binary change)
2755 - djm@cvs.openbsd.org 2013/04/05 00:58:51
2756 [mux.c]
2757 cleanup mux-created channels that are in SSH_CHANNEL_OPENING state too
2758 (in addition to ones already in OPEN); bz#2079, ok dtucker@
2759 - markus@cvs.openbsd.org 2013/04/06 16:07:00
2760 [channels.c sshd.c]
2761 handle ECONNABORTED for accept(); ok deraadt some time ago...
2762 - dtucker@cvs.openbsd.org 2013/04/07 02:10:33
2763 [log.c log.h ssh.1 ssh.c sshd.8 sshd.c]
2764 Add -E option to ssh and sshd to append debugging logs to a specified file
2765 instead of stderr or syslog. ok markus@, man page help jmc@
2766 - dtucker@cvs.openbsd.org 2013/04/07 09:40:27
2767 [sshd.8]
2768 clarify -e text. suggested by & ok jmc@
2769 - djm@cvs.openbsd.org 2013/04/11 02:27:50
2770 [packet.c]
2771 quiet disconnect notifications on the server from error() back to logit()
2772 if it is a normal client closure; bz#2057 ok+feedback dtucker@
2773 - dtucker@cvs.openbsd.org 2013/04/17 09:04:09
2774 [session.c]
2775 revert rev 1.262; it fails because uid is already set here. ok djm@
2776 - djm@cvs.openbsd.org 2013/04/18 02:16:07
2777 [sftp.c]
2778 make "sftp -q" do what it says on the sticker: hush everything but errors;
2779 ok dtucker@
2780 - djm@cvs.openbsd.org 2013/04/19 01:00:10
2781 [sshd_config.5]
2782 document the requirment that the AuthorizedKeysCommand be owned by root;
2783 ok dtucker@ markus@
2784 - djm@cvs.openbsd.org 2013/04/19 01:01:00
2785 [ssh-keygen.c]
2786 fix some memory leaks; bz#2088 ok dtucker@
2787 - djm@cvs.openbsd.org 2013/04/19 01:03:01
2788 [session.c]
2789 reintroduce 1.262 without the connection-killing bug:
2790 fatal() when ChrootDirectory specified by running without root privileges;
2791 ok markus@
2792 - djm@cvs.openbsd.org 2013/04/19 01:06:50
2793 [authfile.c cipher.c cipher.h kex.c kex.h kexecdh.c kexecdhc.c kexecdhs.c]
2794 [key.c key.h mac.c mac.h packet.c ssh.1 ssh.c]
2795 add the ability to query supported ciphers, MACs, key type and KEX
2796 algorithms to ssh. Includes some refactoring of KEX and key type handling
2797 to be table-driven; ok markus@
2798 - djm@cvs.openbsd.org 2013/04/19 11:10:18
2799 [ssh.c]
2800 add -Q to usage; reminded by jmc@
2801 - djm@cvs.openbsd.org 2013/04/19 12:07:08
2802 [kex.c]
2803 remove duplicated list entry pointed out by naddy@
2804 - dtucker@cvs.openbsd.org 2013/04/22 01:17:18
2805 [mux.c]
2806 typo in debug output: evitval->exitval
2807
280820130418
2809 - (djm) [config.guess config.sub] Update to last versions before they switch
2810 to GPL3. ok dtucker@
2811 - (dtucker) [configure.ac] Use -Qunused-arguments to suppress warnings from
2812 unused argument warnings (in particular, -fno-builtin-memset) from clang.
2813
281420130404
2815 - (dtucker) OpenBSD CVS Sync
2816 - dtucker@cvs.openbsd.org 2013/02/17 23:16:57
2817 [readconf.c ssh.c readconf.h sshconnect2.c]
2818 Keep track of which IndentityFile options were manually supplied and which
2819 were default options, and don't warn if the latter are missing.
2820 ok markus@
2821 - dtucker@cvs.openbsd.org 2013/02/19 02:12:47
2822 [krl.c]
2823 Remove bogus include. ok djm
2824 - dtucker@cvs.openbsd.org 2013/02/22 04:45:09
2825 [ssh.c readconf.c readconf.h]
2826 Don't complain if IdentityFiles specified in system-wide configs are
2827 missing. ok djm, deraadt.
2828 - markus@cvs.openbsd.org 2013/02/22 19:13:56
2829 [sshconnect.c]
2830 support ProxyCommand=- (stdin/out already point to the proxy); ok djm@
2831 - djm@cvs.openbsd.org 2013/02/22 22:09:01
2832 [ssh.c]
2833 Allow IdenityFile=none; ok markus deraadt (and dtucker for an earlier
2834 version)
2835
283620130401
2837 - (dtucker) [openbsd-compat/bsd-cygwin_util.{c,h}] Don't include windows.h
2838 to avoid conflicting definitions of __int64, adding the required bits.
2839 Patch from Corinna Vinschen.
2840
284120130323
2842 - (tim) [Makefile.in] remove some duplication introduced in 20130220 commit.
2843
284420130322
2845 - (djm) [contrib/ssh-copy-id contrib/ssh-copy-id.1] Updated to Phil
2846 Hands' greatly revised version.
2847 - (djm) Release 6.2p1
2848 - (dtucker) [configure.ac] Add stdlib.h to zlib check for exit() prototype.
2849 - (dtucker) [includes.h] Check if _GNU_SOURCE is already defined before
2850 defining it again. Prevents warnings if someone, eg, sets it in CFLAGS.
2851
285220130318
2853 - (djm) [configure.ac log.c scp.c sshconnect2.c openbsd-compat/vis.c]
2854 [openbsd-compat/vis.h] FreeBSD's strnvis isn't compatible with OpenBSD's
2855 so mark it as broken. Patch from des AT des.no
2856
285720130317
2858 - (tim) [configure.ac] OpenServer 5 wants lastlog even though it has none
2859 of the bits the configure test looks for.
2860
286120130316
2862 - (djm) [configure.ac] Disable utmp, wtmp and/or lastlog if the platform
2863 is unable to successfully compile them. Based on patch from des AT
2864 des.no
2865 - (djm) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
2866 Add a usleep replacement for platforms that lack it; ok dtucker
2867 - (djm) [session.c] FreeBSD needs setusercontext(..., LOGIN_SETUMASK) to
2868 occur after UID switch; patch from John Marshall via des AT des.no;
2869 ok dtucker@
2870
287120130312
2872 - (dtucker) [regress/Makefile regress/cipher-speed.sh regress/test-exec.sh]
2873 Improve portability of cipher-speed test, based mostly on a patch from
2874 Iain Morgan.
2875 - (dtucker) [auth.c configure.ac platform.c platform.h] Accept uid 2 ("bin")
2876 in addition to root as an owner of system directories on AIX and HP-UX.
2877 ok djm@
2878
287920130307
2880 - (dtucker) [INSTALL] Bump documented autoconf version to what we're
2881 currently using.
2882 - (dtucker) [defines.h] Remove SIZEOF_CHAR bits since the test for it
2883 was removed in configure.ac rev 1.481 as it was redundant.
2884 - (tim) [Makefile.in] Add another missing $(EXEEXT) I should have seen 3 days
2885 ago.
2886 - (djm) [configure.ac] Add a timeout to the select/rlimit test to give it a
2887 chance to complete on broken systems; ok dtucker@
2888
288920130306
2890 - (dtucker) [regress/forward-control.sh] Wait longer for the forwarding
2891 connection to start so that the test works on slower machines.
2892 - (dtucker) [configure.ac] test that we can set number of file descriptors
2893 to zero with setrlimit before enabling the rlimit sandbox. This affects
2894 (at least) HPUX 11.11.
2895
289620130305
2897 - (djm) [regress/modpipe.c] Compilation fix for AIX and parsing fix for
2898 HP/UX. Spotted by Kevin Brott
2899 - (dtucker) [configure.ac] use "=" for shell test and not "==". Spotted by
2900 Amit Kulkarni and Kevin Brott.
2901 - (dtucker) [Makefile.in] Remove trailing "\" on PATHS, which caused obscure
2902 build breakage on (at least) HP-UX 11.11. Found by Amit Kulkarni and Kevin
2903 Brott.
2904 - (tim) [Makefile.in] Add missing $(EXEEXT). Found by Roumen Petrov.
2905
290620130227
2907 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
2908 [contrib/suse/openssh.spec] Crank version numbers
2909 - (tim) [regress/forward-control.sh] use sh in case login shell is csh.
2910 - (tim) [regress/integrity.sh] shell portability fix.
2911 - (tim) [regress/integrity.sh] keep old solaris awk from hanging.
2912 - (tim) [regress/krl.sh] keep old solaris awk from hanging.
2913
291420130226
2915 - OpenBSD CVS Sync
2916 - djm@cvs.openbsd.org 2013/02/20 08:27:50
2917 [integrity.sh]
2918 Add an option to modpipe that warns if the modification offset it not
2919 reached in it's stream and turn it on for t-integrity. This should catch
2920 cases where the session is not fuzzed for being too short (cf. my last
2921 "oops" commit)
2922 - (djm) [regress/integrity.sh] Run sshd via $SUDO; fixes tinderbox breakage
2923 for UsePAM=yes configuration
2924
292520130225
2926 - (dtucker) [configure.ac ssh-gss.h] bz#2073: additional #includes needed
2927 to use Solaris native GSS libs. Patch from Pierre Ossman.
2928
292920130223
2930 - (djm) [configure.ac includes.h loginrec.c mux.c sftp.c] Prefer
2931 bsd/libutil.h to libutil.h to avoid deprecation warnings on Ubuntu.
2932 ok tim
2933
293420130222
2935 - (dtucker) [Makefile.in configure.ac] bz#2072: don't link krb5 libs to
2936 ssh(1) since they're not needed. Patch from Pierre Ossman, ok djm.
2937 - (dtucker) [configure.ac] bz#2073: look for Solaris' differently-named
2938 libgss too. Patch from Pierre Ossman, ok djm.
2939 - (djm) [configure.ac sandbox-seccomp-filter.c] Support for Linux
2940 seccomp-bpf sandbox on ARM. Patch from shawnlandden AT gmail.com;
2941 ok dtucker
2942
294320130221
2944 - (tim) [regress/forward-control.sh] shell portability fix.
2945
294620130220
2947 - (tim) [regress/cipher-speed.sh regress/try-ciphers.sh] shell portability fix.
2948 - (tim) [krl.c Makefile.in regress/Makefile regress/modpipe.c] remove unneeded
2949 err.h include from krl.c. Additional portability fixes for modpipe. OK djm
2950 - OpenBSD CVS Sync
2951 - djm@cvs.openbsd.org 2013/02/20 08:27:50
2952 [regress/integrity.sh regress/modpipe.c]
2953 Add an option to modpipe that warns if the modification offset it not
2954 reached in it's stream and turn it on for t-integrity. This should catch
2955 cases where the session is not fuzzed for being too short (cf. my last
2956 "oops" commit)
2957 - djm@cvs.openbsd.org 2013/02/20 08:29:27
2958 [regress/modpipe.c]
2959 s/Id/OpenBSD/ in RCS tag
2960
296120130219
2962 - OpenBSD CVS Sync
2963 - djm@cvs.openbsd.org 2013/02/18 22:26:47
2964 [integrity.sh]
2965 crank the offset yet again; it was still fuzzing KEX one of Darren's
2966 portable test hosts at 2800
2967 - djm@cvs.openbsd.org 2013/02/19 02:14:09
2968 [integrity.sh]
2969 oops, forgot to increase the output of the ssh command to ensure that
2970 we actually reach $offset
2971 - (djm) [regress/integrity.sh] Skip SHA2-based MACs on configurations that
2972 lack support for SHA2.
2973 - (djm) [regress/modpipe.c] Add local err, and errx functions for platforms
2974 that do not have them.
2975
297620130217
2977 - OpenBSD CVS Sync
2978 - djm@cvs.openbsd.org 2013/02/17 23:16:55
2979 [integrity.sh]
2980 make the ssh command generates some output to ensure that there are at
2981 least offset+tries bytes in the stream.
2982
298320130216
2984 - OpenBSD CVS Sync
2985 - djm@cvs.openbsd.org 2013/02/16 06:08:45
2986 [integrity.sh]
2987 make sure the fuzz offset is actually past the end of KEX for all KEX
2988 types. diffie-hellman-group-exchange-sha256 requires an offset around
2989 2700. Noticed via test failures in portable OpenSSH on platforms that
2990 lack ECC and this the more byte-frugal ECDH KEX algorithms.
2991
299220130215
2993 - (djm) [contrib/suse/rc.sshd] Use SSHD_BIN consistently; bz#2056 from
2994 Iain Morgan
2995 - (dtucker) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
2996 Use getpgrp() if we don't have getpgid() (old BSDs, maybe others).
2997 - (dtucker) [configure.ac openbsd-compat/Makefile.in openbsd-compat/strtoull.c
2998 openbsd-compat/openbsd-compat.h] Add strtoull to compat library for
2999 platforms that don't have it.
3000 - (dtucker) [openbsd-compat/openbsd-compat.h] Add prototype for strtoul,
3001 group strto* function prototypes together.
3002 - (dtucker) [openbsd-compat/bsd-misc.c] Handle the case where setpgrp() takes
3003 an argument. Pointed out by djm.
3004 - (djm) OpenBSD CVS Sync
3005 - djm@cvs.openbsd.org 2013/02/14 21:35:59
3006 [auth2-pubkey.c]
3007 Correct error message that had a typo and was logging the wrong thing;
3008 patch from Petr Lautrbach
3009 - dtucker@cvs.openbsd.org 2013/02/15 00:21:01
3010 [sshconnect2.c]
3011 Warn more loudly if an IdentityFile provided by the user cannot be read.
3012 bz #1981, ok djm@
3013
301420130214
3015 - (djm) [regress/krl.sh] Don't use ecdsa keys in environment that lack ECC.
3016 - (djm) [regress/krl.sh] typo; found by Iain Morgan
3017 - (djm) [regress/integrity.sh] Start fuzzing from offset 2500 (instead
3018 of 2300) to avoid clobbering the end of (non-MAC'd) KEX. Verified by
3019 Iain Morgan
3020
302120130212
3022 - (djm) OpenBSD CVS Sync
3023 - djm@cvs.openbsd.org 2013/01/24 21:45:37
3024 [krl.c]
3025 fix handling of (unused) KRL signatures; skip string in correct buffer
3026 - djm@cvs.openbsd.org 2013/01/24 22:08:56
3027 [krl.c]
3028 skip serial lookup when cert's serial number is zero
3029 - krw@cvs.openbsd.org 2013/01/25 05:00:27
3030 [krl.c]
3031 Revert last. Breaks due to likely typo. Let djm@ fix later.
3032 ok djm@ via dlg@
3033 - djm@cvs.openbsd.org 2013/01/25 10:22:19
3034 [krl.c]
3035 redo last commit without the vi-vomit that snuck in:
3036 skip serial lookup when cert's serial number is zero
3037 (now with 100% better comment)
3038 - djm@cvs.openbsd.org 2013/01/26 06:11:05
3039 [Makefile.in acss.c acss.h cipher-acss.c cipher.c]
3040 [openbsd-compat/openssl-compat.h]
3041 remove ACSS, now that it is gone from libcrypto too
3042 - djm@cvs.openbsd.org 2013/01/27 10:06:12
3043 [krl.c]
3044 actually use the xrealloc() return value; spotted by xi.wang AT gmail.com
3045 - dtucker@cvs.openbsd.org 2013/02/06 00:20:42
3046 [servconf.c sshd_config sshd_config.5]
3047 Change default of MaxStartups to 10:30:100 to start doing random early
3048 drop at 10 connections up to 100 connections. This will make it harder
3049 to DoS as CPUs have come a long way since the original value was set
3050 back in 2000. Prompted by nion at debian org, ok markus@
3051 - dtucker@cvs.openbsd.org 2013/02/06 00:22:21
3052 [auth.c]
3053 Fix comment, from jfree.e1 at gmail
3054 - djm@cvs.openbsd.org 2013/02/08 00:41:12
3055 [sftp.c]
3056 fix NULL deref when built without libedit and control characters
3057 entered as command; debugging and patch from Iain Morgan an
3058 Loganaden Velvindron in bz#1956
3059 - markus@cvs.openbsd.org 2013/02/10 21:19:34
3060 [version.h]
3061 openssh 6.2
3062 - djm@cvs.openbsd.org 2013/02/10 23:32:10
3063 [ssh-keygen.c]
3064 append to moduli file when screening candidates rather than overwriting.
3065 allows resumption of interrupted screen; patch from Christophe Garault
3066 in bz#1957; ok dtucker@
3067 - djm@cvs.openbsd.org 2013/02/10 23:35:24
3068 [packet.c]
3069 record "Received disconnect" messages at ERROR rather than INFO priority,
3070 since they are abnormal and result in a non-zero ssh exit status; patch
3071 from Iain Morgan in bz#2057; ok dtucker@
3072 - dtucker@cvs.openbsd.org 2013/02/11 21:21:58
3073 [sshd.c]
3074 Add openssl version to debug output similar to the client. ok markus@
3075 - djm@cvs.openbsd.org 2013/02/11 23:58:51
3076 [regress/try-ciphers.sh]
3077 remove acss here too
3078 - (djm) [regress/try-ciphers.sh] clean up CVS merge botch
3079
308020130211
3081 - (djm) [configure.ac openbsd-compat/openssl-compat.h] Repair build on old
3082 libcrypto that lacks EVP_CIPHER_CTX_ctrl
3083
308420130208
3085 - (djm) [contrib/redhat/sshd.init] treat RETVAL as an integer;
3086 patch from Iain Morgan in bz#2059
3087 - (dtucker) [configure.ac openbsd-compat/sys-tree.h] Test if compiler allows
3088 __attribute__ on return values and work around if necessary. ok djm@
3089
309020130207
3091 - (djm) [configure.ac] Don't probe seccomp capability of running kernel
3092 at configure time; the seccomp sandbox will fall back to rlimit at
3093 runtime anyway. Patch from plautrba AT redhat.com in bz#2011
3094
309520130120
3096 - (djm) [cipher-aes.c cipher-ctr.c openbsd-compat/openssl-compat.h]
3097 Move prototypes for replacement ciphers to openssl-compat.h; fix EVP
3098 prototypes for openssl-1.0.0-fips.
3099 - (djm) OpenBSD CVS Sync
3100 - jmc@cvs.openbsd.org 2013/01/18 07:57:47
3101 [ssh-keygen.1]
3102 tweak previous;
3103 - jmc@cvs.openbsd.org 2013/01/18 07:59:46
3104 [ssh-keygen.c]
3105 -u before -V in usage();
3106 - jmc@cvs.openbsd.org 2013/01/18 08:00:49
3107 [sshd_config.5]
3108 tweak previous;
3109 - jmc@cvs.openbsd.org 2013/01/18 08:39:04
3110 [ssh-keygen.1]
3111 add -Q to the options list; ok djm
3112 - jmc@cvs.openbsd.org 2013/01/18 21:48:43
3113 [ssh-keygen.1]
3114 command-line (adj.) -> command line (n.);
3115 - jmc@cvs.openbsd.org 2013/01/19 07:13:25
3116 [ssh-keygen.1]
3117 fix some formatting; ok djm
3118 - markus@cvs.openbsd.org 2013/01/19 12:34:55
3119 [krl.c]
3120 RB_INSERT does not remove existing elments; ok djm@
3121 - (djm) [openbsd-compat/sys-tree.h] Sync with OpenBSD. krl.c needs newer
3122 version.
3123 - (djm) [regress/krl.sh] replacement for jot; most platforms lack it
3124
312520130118
3126 - (djm) OpenBSD CVS Sync
3127 - djm@cvs.openbsd.org 2013/01/17 23:00:01
3128 [auth.c key.c key.h ssh-keygen.1 ssh-keygen.c sshd_config.5]
3129 [krl.c krl.h PROTOCOL.krl]
3130 add support for Key Revocation Lists (KRLs). These are a compact way to
3131 represent lists of revoked keys and certificates, taking as little as
3132 a single bit of incremental cost to revoke a certificate by serial number.
3133 KRLs are loaded via the existing RevokedKeys sshd_config option.
3134 feedback and ok markus@
3135 - djm@cvs.openbsd.org 2013/01/18 00:45:29
3136 [regress/Makefile regress/cert-userkey.sh regress/krl.sh]
3137 Tests for Key Revocation Lists (KRLs)
3138 - djm@cvs.openbsd.org 2013/01/18 03:00:32
3139 [krl.c]
3140 fix KRL generation bug for list sections
3141
314220130117
3143 - (djm) [regress/cipher-speed.sh regress/integrity.sh regress/try-ciphers.sh]
3144 check for GCM support before testing GCM ciphers.
3145
314620130112
3147 - (djm) OpenBSD CVS Sync
3148 - djm@cvs.openbsd.org 2013/01/12 11:22:04
3149 [cipher.c]
3150 improve error message for integrity failure in AES-GCM modes; ok markus@
3151 - djm@cvs.openbsd.org 2013/01/12 11:23:53
3152 [regress/cipher-speed.sh regress/integrity.sh regress/try-ciphers.sh]
3153 test AES-GCM modes; feedback markus@
3154 - (djm) [regress/integrity.sh] repair botched merge
3155
315620130109
3157 - (djm) OpenBSD CVS Sync
3158 - dtucker@cvs.openbsd.org 2012/12/14 05:26:43
3159 [auth.c]
3160 use correct string in error message; from rustybsd at gmx.fr
3161 - djm@cvs.openbsd.org 2013/01/02 00:32:07
3162 [clientloop.c mux.c]
3163 channel_setup_local_fwd_listener() returns 0 on failure, not -ve
3164 bz#2055 reported by mathieu.lacage AT gmail.com
3165 - djm@cvs.openbsd.org 2013/01/02 00:33:49
3166 [PROTOCOL.agent]
3167 correct format description for SSH_AGENTC_ADD_RSA_ID_CONSTRAINED
3168 bz#2051 from david AT lechnology.com
3169 - djm@cvs.openbsd.org 2013/01/03 05:49:36
3170 [servconf.h]
3171 add a couple of ServerOptions members that should be copied to the privsep
3172 child (for consistency, in this case they happen only to be accessed in
3173 the monitor); ok dtucker@
3174 - djm@cvs.openbsd.org 2013/01/03 12:49:01
3175 [PROTOCOL]
3176 fix description of MAC calculation for EtM modes; ok markus@
3177 - djm@cvs.openbsd.org 2013/01/03 12:54:49
3178 [sftp-server.8 sftp-server.c]
3179 allow specification of an alternate start directory for sftp-server(8)
3180 "I like this" markus@
3181 - djm@cvs.openbsd.org 2013/01/03 23:22:58
3182 [ssh-keygen.c]
3183 allow fingerprinting of keys hosted in PKCS#11 tokens: ssh-keygen -lD ...
3184 ok markus@
3185 - jmc@cvs.openbsd.org 2013/01/04 19:26:38
3186 [sftp-server.8 sftp-server.c]
3187 sftp-server.8: add argument name to -d
3188 sftp-server.c: add -d to usage()
3189 ok djm
3190 - markus@cvs.openbsd.org 2013/01/08 18:49:04
3191 [PROTOCOL authfile.c cipher.c cipher.h kex.c kex.h monitor_wrap.c]
3192 [myproposal.h packet.c ssh_config.5 sshd_config.5]
3193 support AES-GCM as defined in RFC 5647 (but with simpler KEX handling)
3194 ok and feedback djm@
3195 - djm@cvs.openbsd.org 2013/01/09 05:40:17
3196 [ssh-keygen.c]
3197 correctly initialise fingerprint type for fingerprinting PKCS#11 keys
3198 - (djm) [cipher.c configure.ac openbsd-compat/openssl-compat.h]
3199 Fix merge botch, automatically detect AES-GCM in OpenSSL, move a little
3200 cipher compat code to openssl-compat.h
3201
320220121217
3203 - (dtucker) [Makefile.in] Add some scaffolding so that the new regress
3204 tests will work with VPATH directories.
3205
320620121213
3207 - (djm) OpenBSD CVS Sync
3208 - markus@cvs.openbsd.org 2012/12/12 16:45:52
3209 [packet.c]
3210 reset incoming_packet buffer for each new packet in EtM-case, too;
3211 this happens if packets are parsed only parially (e.g. ignore
3212 messages sent when su/sudo turn off echo); noted by sthen/millert
3213 - naddy@cvs.openbsd.org 2012/12/12 16:46:10
3214 [cipher.c]
3215 use OpenSSL's EVP_aes_{128,192,256}_ctr() API and remove our hand-rolled
3216 counter mode code; ok djm@
3217 - (djm) [configure.ac cipher-ctr.c] Adapt EVP AES CTR change to retain our
3218 compat code for older OpenSSL
3219 - (djm) [cipher.c] Fix missing prototype for compat code
3220
322120121212
3222 - (djm) OpenBSD CVS Sync
3223 - markus@cvs.openbsd.org 2012/12/11 22:16:21
3224 [monitor.c]
3225 drain the log messages after receiving the keystate from the unpriv
3226 child. otherwise it might block while sending. ok djm@
3227 - markus@cvs.openbsd.org 2012/12/11 22:31:18
3228 [PROTOCOL authfile.c cipher.c cipher.h kex.h mac.c myproposal.h]
3229 [packet.c ssh_config.5 sshd_config.5]
3230 add encrypt-then-mac (EtM) modes to openssh by defining new mac algorithms
3231 that change the packet format and compute the MAC over the encrypted
3232 message (including the packet size) instead of the plaintext data;
3233 these EtM modes are considered more secure and used by default.
3234 feedback and ok djm@
3235 - sthen@cvs.openbsd.org 2012/12/11 22:51:45
3236 [mac.c]
3237 fix typo, s/tem/etm in hmac-ripemd160-tem. ok markus@
3238 - markus@cvs.openbsd.org 2012/12/11 22:32:56
3239 [regress/try-ciphers.sh]
3240 add etm modes
3241 - markus@cvs.openbsd.org 2012/12/11 22:42:11
3242 [regress/Makefile regress/modpipe.c regress/integrity.sh]
3243 test the integrity of the packets; with djm@
3244 - markus@cvs.openbsd.org 2012/12/11 23:12:13
3245 [try-ciphers.sh]
3246 add hmac-ripemd160-etm@openssh.com
3247 - (djm) [mac.c] fix merge botch
3248 - (djm) [regress/Makefile regress/integrity.sh] Make the integrity.sh test
3249 work on platforms without 'jot'
3250 - (djm) [regress/integrity.sh] Fix awk quoting, packet length skip
3251 - (djm) [regress/Makefile] fix t-exec rule
3252
325320121207
3254 - (dtucker) OpenBSD CVS Sync
3255 - dtucker@cvs.openbsd.org 2012/12/06 06:06:54
3256 [regress/keys-command.sh]
3257 Fix some problems with the keys-command test:
3258 - use string comparison rather than numeric comparison
3259 - check for existing KEY_COMMAND file and don't clobber if it exists
3260 - clean up KEY_COMMAND file if we do create it.
3261 - check that KEY_COMMAND is executable (which it won't be if eg /var/run
3262 is mounted noexec).
3263 ok djm.
3264 - jmc@cvs.openbsd.org 2012/12/03 08:33:03
3265 [ssh-add.1 sshd_config.5]
3266 tweak previous;
3267 - markus@cvs.openbsd.org 2012/12/05 15:42:52
3268 [ssh-add.c]
3269 prevent double-free of comment; ok djm@
3270 - dtucker@cvs.openbsd.org 2012/12/07 01:51:35
3271 [serverloop.c]
3272 Cast signal to int for logging. A no-op on openbsd (they're always ints)
3273 but will prevent warnings in portable. ok djm@
3274
327520121205
3276 - (tim) [defines.h] Some platforms are missing ULLONG_MAX. Feedback djm@.
3277
327820121203
3279 - (djm) [openbsd-compat/sys-queue.h] Sync with OpenBSD to get
3280 TAILQ_FOREACH_SAFE needed for upcoming changes.
3281 - (djm) OpenBSD CVS Sync
3282 - djm@cvs.openbsd.org 2012/12/02 20:26:11
3283 [ssh_config.5 sshconnect2.c]
3284 Make IdentitiesOnly apply to keys obtained from a PKCS11Provider.
3285 This allows control of which keys are offered from tokens using
3286 IdentityFile. ok markus@
3287 - djm@cvs.openbsd.org 2012/12/02 20:42:15
3288 [ssh-add.1 ssh-add.c]
3289 make deleting explicit keys "ssh-add -d" symmetric with adding keys -
3290 try to delete the corresponding certificate too and respect the -k option
3291 to allow deleting of the key only; feedback and ok markus@
3292 - djm@cvs.openbsd.org 2012/12/02 20:46:11
3293 [auth-options.c channels.c servconf.c servconf.h serverloop.c session.c]
3294 [sshd_config.5]
3295 make AllowTcpForwarding accept "local" and "remote" in addition to its
3296 current "yes"/"no" to allow the server to specify whether just local or
3297 remote TCP forwarding is enabled. ok markus@
3298 - dtucker@cvs.openbsd.org 2012/10/05 02:20:48
3299 [regress/cipher-speed.sh regress/try-ciphers.sh]
3300 Add umac-128@openssh.com to the list of MACs to be tested
3301 - djm@cvs.openbsd.org 2012/10/19 05:10:42
3302 [regress/cert-userkey.sh]
3303 include a serial number when generating certs
3304 - djm@cvs.openbsd.org 2012/11/22 22:49:30
3305 [regress/Makefile regress/keys-command.sh]
3306 regress for AuthorizedKeysCommand; hints from markus@
3307 - djm@cvs.openbsd.org 2012/12/02 20:47:48
3308 [Makefile regress/forward-control.sh]
3309 regress for AllowTcpForwarding local/remote; ok markus@
3310 - djm@cvs.openbsd.org 2012/12/03 00:14:06
3311 [auth2-chall.c ssh-keygen.c]
3312 Fix compilation with -Wall -Werror (trivial type fixes)
3313 - (djm) [configure.ac] Turn on -g for gcc compilers. Helps pre-installation
3314 debugging. ok dtucker@
3315 - (djm) [configure.ac] Revert previous. configure.ac already does this
3316 for us.
3317
331820121114
3319 - (djm) OpenBSD CVS Sync
3320 - djm@cvs.openbsd.org 2012/11/14 02:24:27
3321 [auth2-pubkey.c]
3322 fix username passed to helper program
3323 prepare stdio fds before closefrom()
3324 spotted by landry@
3325 - djm@cvs.openbsd.org 2012/11/14 02:32:15
3326 [ssh-keygen.c]
3327 allow the full range of unsigned serial numbers; 'fine' deraadt@
3328 - djm@cvs.openbsd.org 2012/12/02 20:34:10
3329 [auth.c auth.h auth1.c auth2-chall.c auth2-gss.c auth2-jpake.c auth2.c]
3330 [monitor.c monitor.h]
3331 Fixes logging of partial authentication when privsep is enabled
3332 Previously, we recorded "Failed xxx" since we reset authenticated before
3333 calling auth_log() in auth2.c. This adds an explcit "Partial" state.
3334
3335 Add a "submethod" to auth_log() to report which submethod is used
3336 for keyboard-interactive.
3337
3338 Fix multiple authentication when one of the methods is
3339 keyboard-interactive.
3340
3341 ok markus@
3342 - dtucker@cvs.openbsd.org 2012/10/05 02:05:30
3343 [regress/multiplex.sh]
3344 Use 'kill -0' to test for the presence of a pid since it's more portable
3345
334620121107
3347 - (djm) OpenBSD CVS Sync
3348 - eric@cvs.openbsd.org 2011/11/28 08:46:27
3349 [moduli.5]
3350 fix formula
3351 ok djm@
3352 - jmc@cvs.openbsd.org 2012/09/26 17:34:38
3353 [moduli.5]
3354 last stage of rfc changes, using consistent Rs/Re blocks, and moving the
3355 references into a STANDARDS section;
3356
335720121105
3358 - (dtucker) [uidswap.c openbsd-compat/Makefile.in
3359 openbsd-compat/bsd-setres_id.c openbsd-compat/bsd-setres_id.h
3360 openbsd-compat/openbsd-compat.h] Move the fallback code for setting uids
3361 and gids from uidswap.c to the compat library, which allows it to work with
3362 the new setresuid calls in auth2-pubkey. with tim@, ok djm@
3363 - (dtucker) [auth2-pubkey.c] wrap paths.h in an ifdef for platforms that
3364 don't have it. Spotted by tim@.
3365
336620121104
3367 - (djm) OpenBSD CVS Sync
3368 - jmc@cvs.openbsd.org 2012/10/31 08:04:50
3369 [sshd_config.5]
3370 tweak previous;
3371 - djm@cvs.openbsd.org 2012/11/04 10:38:43
3372 [auth2-pubkey.c sshd.c sshd_config.5]
3373 Remove default of AuthorizedCommandUser. Administrators are now expected
3374 to explicitly specify a user. feedback and ok markus@
3375 - djm@cvs.openbsd.org 2012/11/04 11:09:15
3376 [auth.h auth1.c auth2.c monitor.c servconf.c servconf.h sshd.c]
3377 [sshd_config.5]
3378 Support multiple required authentication via an AuthenticationMethods
3379 option. This option lists one or more comma-separated lists of
3380 authentication method names. Successful completion of all the methods in
3381 any list is required for authentication to complete;
3382 feedback and ok markus@
3383
338420121030
3385 - (djm) OpenBSD CVS Sync
3386 - markus@cvs.openbsd.org 2012/10/05 12:34:39
3387 [sftp.c]
3388 fix signed vs unsigned warning; feedback & ok: djm@
3389 - djm@cvs.openbsd.org 2012/10/30 21:29:55
3390 [auth-rsa.c auth.c auth.h auth2-pubkey.c servconf.c servconf.h]
3391 [sshd.c sshd_config sshd_config.5]
3392 new sshd_config option AuthorizedKeysCommand to support fetching
3393 authorized_keys from a command in addition to (or instead of) from
3394 the filesystem. The command is run as the target server user unless
3395 another specified via a new AuthorizedKeysCommandUser option.
3396
3397 patch originally by jchadima AT redhat.com, reworked by me; feedback
3398 and ok markus@ 165 and ok markus@
3399 166
340020121019 167commit 39e2f1229562e1195169905607bc12290d21f021
3401 - (tim) [buildpkg.sh.in] Double up on some backslashes so they end up in 168Author: millert@openbsd.org <millert@openbsd.org>
3402 the generated file as intended. 169Date: Sun Mar 1 15:44:40 2015 +0000
3403
340420121005
3405 - (dtucker) OpenBSD CVS Sync
3406 - djm@cvs.openbsd.org 2012/09/17 09:54:44
3407 [sftp.c]
3408 an XXX for later
3409 - markus@cvs.openbsd.org 2012/09/17 13:04:11
3410 [packet.c]
3411 clear old keys on rekeing; ok djm
3412 - dtucker@cvs.openbsd.org 2012/09/18 10:36:12
3413 [sftp.c]
3414 Add bounds check on sftp tab-completion. Part of a patch from from
3415 Jean-Marc Robert via tech@, ok djm
3416 - dtucker@cvs.openbsd.org 2012/09/21 10:53:07
3417 [sftp.c]
3418 Fix improper handling of absolute paths when PWD is part of the completed
3419 path. Patch from Jean-Marc Robert via tech@, ok djm.
3420 - dtucker@cvs.openbsd.org 2012/09/21 10:55:04
3421 [sftp.c]
3422 Fix handling of filenames containing escaped globbing characters and
3423 escape "#" and "*". Patch from Jean-Marc Robert via tech@, ok djm.
3424 - jmc@cvs.openbsd.org 2012/09/26 16:12:13
3425 [ssh.1]
3426 last stage of rfc changes, using consistent Rs/Re blocks, and moving the
3427 references into a STANDARDS section;
3428 - naddy@cvs.openbsd.org 2012/10/01 13:59:51
3429 [monitor_wrap.c]
3430 pasto; ok djm@
3431 - djm@cvs.openbsd.org 2012/10/02 07:07:45
3432 [ssh-keygen.c]
3433 fix -z option, broken in revision 1.215
3434 - markus@cvs.openbsd.org 2012/10/04 13:21:50
3435 [myproposal.h ssh_config.5 umac.h sshd_config.5 ssh.1 sshd.8 mac.c]
3436 add umac128 variant; ok djm@ at n2k12
3437 - dtucker@cvs.openbsd.org 2012/09/06 04:11:07
3438 [regress/try-ciphers.sh]
3439 Restore missing space. (Id sync only).
3440 - dtucker@cvs.openbsd.org 2012/09/09 11:51:25
3441 [regress/multiplex.sh]
3442 Add test for ssh -Ostop
3443 - dtucker@cvs.openbsd.org 2012/09/10 00:49:21
3444 [regress/multiplex.sh]
3445 Log -O cmd output to the log file and make logging consistent with the
3446 other tests. Test clean shutdown of an existing channel when testing
3447 "stop".
3448 - dtucker@cvs.openbsd.org 2012/09/10 01:51:19
3449 [regress/multiplex.sh]
3450 use -Ocheck and waiting for completions by PID to make multiplexing test
3451 less racy and (hopefully) more reliable on slow hardware.
3452 - [Makefile umac.c] Add special-case target to build umac128.o.
3453 - [umac.c] Enforce allowed umac output sizes. From djm@.
3454 - [Makefile.in] "Using $< in a non-suffix rule context is a GNUmake idiom".
3455
345620120917
3457 - (dtucker) OpenBSD CVS Sync
3458 - dtucker@cvs.openbsd.org 2012/09/13 23:37:36
3459 [servconf.c]
3460 Fix comment line length
3461 - markus@cvs.openbsd.org 2012/09/14 16:51:34
3462 [sshconnect.c]
3463 remove unused variable
3464
346520120907
3466 - (dtucker) OpenBSD CVS Sync
3467 - dtucker@cvs.openbsd.org 2012/09/06 09:50:13
3468 [clientloop.c]
3469 Make the escape command help (~?) context sensitive so that only commands
3470 that will work in the current session are shown. ok markus@
3471 - jmc@cvs.openbsd.org 2012/09/06 13:57:42
3472 [ssh.1]
3473 missing letter in previous;
3474 - dtucker@cvs.openbsd.org 2012/09/07 00:30:19
3475 [clientloop.c]
3476 Print '^Z' instead of a raw ^Z when the sequence is not supported. ok djm@
3477 - dtucker@cvs.openbsd.org 2012/09/07 01:10:21
3478 [clientloop.c]
3479 Merge escape help text for ~v and ~V; ok djm@
3480 - dtucker@cvs.openbsd.org 2012/09/07 06:34:21
3481 [clientloop.c]
3482 when muxmaster is run with -N, make it shut down gracefully when a client
3483 sends it "-O stop" rather than hanging around (bz#1985). ok djm@
3484
348520120906
3486 - (dtucker) OpenBSD CVS Sync
3487 - jmc@cvs.openbsd.org 2012/08/15 18:25:50
3488 [ssh-keygen.1]
3489 a little more info on certificate validity;
3490 requested by Ross L Richardson, and provided by djm
3491 - dtucker@cvs.openbsd.org 2012/08/17 00:45:45
3492 [clientloop.c clientloop.h mux.c]
3493 Force a clean shutdown of ControlMaster client sessions when the ~. escape
3494 sequence is used. This means that ~. should now work in mux clients even
3495 if the server is no longer responding. Found by tedu, ok djm.
3496 - djm@cvs.openbsd.org 2012/08/17 01:22:56
3497 [kex.c]
3498 add some comments about better handling first-KEX-follows notifications
3499 from the server. Nothing uses these right now. No binary change
3500 - djm@cvs.openbsd.org 2012/08/17 01:25:58
3501 [ssh-keygen.c]
3502 print details of which host lines were deleted when using
3503 "ssh-keygen -R host"; ok markus@
3504 - djm@cvs.openbsd.org 2012/08/17 01:30:00
3505 [compat.c sshconnect.c]
3506 Send client banner immediately, rather than waiting for the server to
3507 move first for SSH protocol 2 connections (the default). Patch based on
3508 one in bz#1999 by tls AT panix.com, feedback dtucker@ ok markus@
3509 - dtucker@cvs.openbsd.org 2012/09/06 04:37:39
3510 [clientloop.c log.c ssh.1 log.h]
3511 Add ~v and ~V escape sequences to raise and lower the logging level
3512 respectively. Man page help from jmc, ok deraadt jmc
3513
351420120830
3515 - (dtucker) [moduli] Import new moduli file.
3516
351720120828
3518 - (djm) Release openssh-6.1
3519
352020120828
3521 - (dtucker) [openbsd-compat/bsd-cygwin_util.h] define WIN32_LEAN_AND_MEAN
3522 for compatibility with future mingw-w64 headers. Patch from vinschen at
3523 redhat com.
3524
352520120822
3526 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
3527 [contrib/suse/openssh.spec] Update version numbers
3528
352920120731
3530 - (djm) OpenBSD CVS Sync
3531 - jmc@cvs.openbsd.org 2012/07/06 06:38:03
3532 [ssh-keygen.c]
3533 missing full stop in usage();
3534 - djm@cvs.openbsd.org 2012/07/10 02:19:15
3535 [servconf.c servconf.h sshd.c sshd_config]
3536 Turn on systrace sandboxing of pre-auth sshd by default for new installs
3537 by shipping a config that overrides the current UsePrivilegeSeparation=yes
3538 default. Make it easier to flip the default in the future by adding too.
3539 prodded markus@ feedback dtucker@ "get it in" deraadt@
3540 - dtucker@cvs.openbsd.org 2012/07/13 01:35:21
3541 [servconf.c]
3542 handle long comments in config files better. bz#2025, ok markus
3543 - markus@cvs.openbsd.org 2012/07/22 18:19:21
3544 [version.h]
3545 openssh 6.1
3546
354720120720
3548 - (dtucker) Import regened moduli file.
3549
355020120706
3551 - (djm) [sandbox-seccomp-filter.c] fallback to rlimit if seccomp filter is
3552 not available. Allows use of sshd compiled on host with a filter-capable
3553 kernel on hosts that lack the support. bz#2011 ok dtucker@
3554 - (djm) [configure.ac] Recursively expand $(bindir) to ensure it has no
3555 unexpanded $(prefix) embedded. bz#2007 patch from nix-corp AT
3556 esperi.org.uk; ok dtucker@
3557- (djm) OpenBSD CVS Sync
3558 - dtucker@cvs.openbsd.org 2012/07/06 00:41:59
3559 [moduli.c ssh-keygen.1 ssh-keygen.c]
3560 Add options to specify starting line number and number of lines to process
3561 when screening moduli candidates. This allows processing of different
3562 parts of a candidate moduli file in parallel. man page help jmc@, ok djm@
3563 - djm@cvs.openbsd.org 2012/07/06 01:37:21
3564 [mux.c]
3565 fix memory leak of passed-in environment variables and connection
3566 context when new session message is malformed; bz#2003 from Bert.Wesarg
3567 AT googlemail.com
3568 - djm@cvs.openbsd.org 2012/07/06 01:47:38
3569 [ssh.c]
3570 move setting of tty_flag to after config parsing so RequestTTY options
3571 are correctly picked up. bz#1995 patch from przemoc AT gmail.com;
3572 ok dtucker@
3573 170
357420120704 171 upstream commit
3575 - (dtucker) [configure.ac openbsd-compat/bsd-misc.h] Add setlinebuf for 172
3576 platforms that don't have it. "looks good" tim@ 173 Make sure we only call getnameinfo() for AF_INET or AF_INET6
3577 174 sockets. getpeername() of a Unix domain socket may return without error on
357820120703 175 some systems without actually setting ss_family so getnameinfo() was getting
3579 - (dtucker) [configure.ac] Detect platforms that can't use select(2) with 176 called with ss_family set to AF_UNSPEC. OK djm@
3580 setrlimit(RLIMIT_NOFILE, rl_zero) and disable the rlimit sandbox on those. 177
3581 - (dtucker) [configure.ac sandbox-rlimit.c] Test whether or not 178commit e47536ba9692d271b8ad89078abdecf0a1c11707
3582 setrlimit(RLIMIT_FSIZE, rl_zero) and skip it if it's not supported. Its 179Author: Damien Miller <djm@mindrot.org>
3583 benefit is minor, so it's not worth disabling the sandbox if it doesn't 180Date: Sat Feb 28 08:20:11 2015 -0800
3584 work. 181
3585 182 portability fixes for regress/netcat.c
358620120702 183
3587- (dtucker) OpenBSD CVS Sync 184 Mostly avoiding "err(1, NULL)"
3588 - naddy@cvs.openbsd.org 2012/06/29 13:57:25 185
3589 [ssh_config.5 sshd_config.5] 186commit 02973ad5f6f49d8420e50a392331432b0396c100
3590 match the documented MAC order of preference to the actual one; 187Author: Damien Miller <djm@mindrot.org>
3591 ok dtucker@ 188Date: Sat Feb 28 08:05:27 2015 -0800
3592 - markus@cvs.openbsd.org 2012/06/30 14:35:09 189
3593 [sandbox-systrace.c sshd.c] 190 twiddle another test for portability
3594 fix a during the load of the sandbox policies (child can still make 191
3595 the read-syscall and wait forever for systrace-answers) by replacing 192 from Tom G. Christensen
3596 the read/write synchronisation with SIGSTOP/SIGCONT; 193
3597 report and help hshoexer@; ok djm@, dtucker@ 194commit f7f3116abf2a6e2f309ab096b08c58d19613e5d0
3598 - dtucker@cvs.openbsd.org 2012/07/02 08:50:03 195Author: Damien Miller <djm@mindrot.org>
3599 [ssh.c] 196Date: Fri Feb 27 15:52:49 2015 -0800
3600 set interactive ToS for forwarded X11 sessions. ok djm@ 197
3601 - dtucker@cvs.openbsd.org 2012/07/02 12:13:26 198 twiddle test for portability
3602 [ssh-pkcs11-helper.c sftp-client.c] 199
3603 fix a couple of "assigned but not used" warnings. ok markus@ 200commit 1ad3a77cc9d5568f5437ff99d377aa7a41859b83
3604 - dtucker@cvs.openbsd.org 2012/07/02 14:37:06 201Author: Damien Miller <djm@mindrot.org>
3605 [regress/connect-privsep.sh] 202Date: Thu Feb 26 20:33:22 2015 -0800
3606 remove exit from end of test since it prevents reporting failure 203
3607 - (dtucker) [regress/reexec.sh regress/sftp-cmds.sh regress/test-exec.sh] 204 make regress/netcat.c fd passing (more) portable
3608 Move cygwin detection to test-exec and use to skip reexec test on cygwin. 205
3609 - (dtucker) [regress/test-exec.sh] Correct uname for cygwin/w2k. 206commit 9e1cfca7e1fe9cf8edb634fc894e43993e4da1ea
3610 207Author: Damien Miller <djm@mindrot.org>
361120120629 208Date: Thu Feb 26 20:32:58 2015 -0800
3612 - OpenBSD CVS Sync 209
3613 - dtucker@cvs.openbsd.org 2012/06/21 00:16:07 210 create OBJ/valgrind-out before running unittests
3614 [addrmatch.c] 211
3615 fix strlcpy truncation check. from carsten at debian org, ok markus 212commit bd58853102cee739f0e115e6d4b5334332ab1442
3616 - dtucker@cvs.openbsd.org 2012/06/22 12:30:26 213Author: Damien Miller <djm@mindrot.org>
3617 [monitor.c sshconnect2.c] 214Date: Wed Feb 25 16:58:22 2015 -0800
3618 remove dead code following 'for (;;)' loops. 215
3619 From Steve.McClellan at radisys com, ok markus@ 216 valgrind support
3620 - dtucker@cvs.openbsd.org 2012/06/22 14:36:33 217
3621 [sftp.c] 218commit f43d17269194761eded9e89f17456332f4c83824
3622 Remove unused variable leftover from tab-completion changes. 219Author: djm@openbsd.org <djm@openbsd.org>
3623 From Steve.McClellan at radisys com, ok markus@ 220Date: Thu Feb 26 20:45:47 2015 +0000
3624 - dtucker@cvs.openbsd.org 2012/06/26 11:02:30 221
3625 [sandbox-systrace.c] 222 upstream commit
3626 Add mquery to the list of allowed syscalls for "UsePrivilegeSeparation 223
3627 sandbox" since malloc now uses it. From johnw.mail at gmail com. 224 don't printf NULL key comments; reported by Tom Christensen
3628 - dtucker@cvs.openbsd.org 2012/06/28 05:07:45 225
3629 [mac.c myproposal.h ssh_config.5 sshd_config.5] 226commit 6e6458b476ec854db33e3e68ebf4f489d0ab3df8
3630 Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs since they were removed 227Author: djm@openbsd.org <djm@openbsd.org>
3631 from draft6 of the spec and will not be in the RFC when published. Patch 228Date: Wed Feb 25 23:05:47 2015 +0000
3632 from mdb at juniper net via bz#2023, ok markus. 229
3633 - naddy@cvs.openbsd.org 2012/06/29 13:57:25 230 upstream commit
3634 [ssh_config.5 sshd_config.5] 231
3635 match the documented MAC order of preference to the actual one; ok dtucker@ 232 zero cmsgbuf before use; we initialise the bits we use
3636 - dtucker@cvs.openbsd.org 2012/05/13 01:42:32 233 but valgrind still spams warning on it
3637 [regress/addrmatch.sh] 234
3638 Add "Match LocalAddress" and "Match LocalPort" to sshd and adjust tests 235commit a63cfa26864b93ab6afefad0b630e5358ed8edfa
3639 to match. Feedback and ok djm@ markus@. 236Author: djm@openbsd.org <djm@openbsd.org>
3640 - djm@cvs.openbsd.org 2012/06/01 00:47:35 237Date: Wed Feb 25 19:54:02 2015 +0000
3641 [regress/multiplex.sh regress/forwarding.sh] 238
3642 append to rather than truncate test log; bz#2013 from openssh AT 239 upstream commit
3643 roumenpetrov.info 240
3644 - djm@cvs.openbsd.org 2012/06/01 00:52:52 241 fix small memory leak when UpdateHostkeys=no
3645 [regress/sftp-cmds.sh] 242
3646 don't delete .* on cleanup due to unintended env expansion; pointed out in 243commit e6b950341dd75baa8526f1862bca39e52f5b879b
3647 bz#2014 by openssh AT roumenpetrov.info 244Author: Tim Rice <tim@multitalents.net>
3648 - dtucker@cvs.openbsd.org 2012/06/26 12:06:59 245Date: Wed Feb 25 09:56:48 2015 -0800
3649 [regress/connect-privsep.sh] 246
3650 test sandbox with every malloc option 247 Revert "Work around finicky USL linker so netcat will build."
3651 - dtucker@cvs.openbsd.org 2012/06/28 05:07:45 248
3652 [regress/try-ciphers.sh regress/cipher-speed.sh] 249 This reverts commit d1db656021d0cd8c001a6692f772f1de29b67c8b.
3653 Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs since they were removed 250
3654 from draft6 of the spec and will not be in the RFC when published. Patch 251 No longer needed with commit 678e473e2af2e4802f24dd913985864d9ead7fb3
3655 from mdb at juniper net via bz#2023, ok markus. 252
3656 - (dtucker) [myproposal.h] Remove trailing backslash to fix compile error. 253commit 6f621603f9cff2a5d6016a404c96cb2f8ac2dec0
3657 - (dtucker) [key.c] ifdef out sha256 key types on platforms that don't have 254Author: djm@openbsd.org <djm@openbsd.org>
3658 the required functions in libcrypto. 255Date: Wed Feb 25 17:29:38 2015 +0000
3659 256
366020120628 257 upstream commit
3661 - (dtucker) [openbsd-compat/getrrsetbyname-ldns.c] bz #2022: prevent null 258
3662 pointer deref in the client when built with LDNS and using DNSSEC with a 259 don't leak validity of user in "too many authentication
3663 CNAME. Patch from gregdlg+mr at hochet info. 260 failures" disconnect message; reported by Sebastian Reitenbach
3664 261
366520120622 262commit 6288e3a935494df12519164f52ca5c8c65fc3ca5
3666 - (dtucker) [contrib/cygwin/ssh-host-config] Ensure that user sshd runs as 263Author: naddy@openbsd.org <naddy@openbsd.org>
3667 can logon as a service. Patch from vinschen at redhat com. 264Date: Tue Feb 24 15:24:05 2015 +0000
3668 265
366920120620 266 upstream commit
3670 - (djm) OpenBSD CVS Sync 267
3671 - djm@cvs.openbsd.org 2011/12/02 00:41:56 268 add -v (show ASCII art) to -l's synopsis; ok djm@
3672 [mux.c] 269
3673 fix bz#1948: ssh -f doesn't fork for multiplexed connection. 270commit 678e473e2af2e4802f24dd913985864d9ead7fb3
271Author: Darren Tucker <dtucker@zip.com.au>
272Date: Thu Feb 26 04:12:58 2015 +1100
273
274 Remove dependency on xmalloc.
275
276 Remove ssh_get_progname's dependency on xmalloc, which should reduce
277 link order problems. ok djm@
278
279commit 5d5ec165c5b614b03678afdad881f10e25832e46
280Author: Darren Tucker <dtucker@zip.com.au>
281Date: Wed Feb 25 15:32:49 2015 +1100
282
283 Restrict ECDSA and ECDH tests.
284
285 ifdef out some more ECDSA and ECDH tests when built against an OpenSSL
286 that does not have eliptic curve functionality.
287
288commit 1734e276d99b17e92d4233fac7aef3a3180aaca7
289Author: Darren Tucker <dtucker@zip.com.au>
290Date: Wed Feb 25 13:40:45 2015 +1100
291
292 Move definition of _NSIG.
293
294 _NSIG is only unsed in one file, so move it there prevent redefinition
295 warnings reported by Kevin Brott.
296
297commit a47ead7c95cfbeb72721066c4da2312e5b1b9f3d
298Author: Darren Tucker <dtucker@zip.com.au>
299Date: Wed Feb 25 13:17:40 2015 +1100
300
301 Add includes.h for compatibility stuff.
302
303commit 38806bda6d2e48ad32812b461eebe17672ada771
304Author: Damien Miller <djm@mindrot.org>
305Date: Tue Feb 24 16:50:06 2015 -0800
306
307 include netdb.h to look for MAXHOSTNAMELEN; ok tim
308
309commit d1db656021d0cd8c001a6692f772f1de29b67c8b
310Author: Tim Rice <tim@multitalents.net>
311Date: Tue Feb 24 10:42:08 2015 -0800
312
313 Work around finicky USL linker so netcat will build.
314
315commit cb030ce25f555737e8ba97bdd7883ac43f3ff2a3
316Author: Damien Miller <djm@mindrot.org>
317Date: Tue Feb 24 09:23:04 2015 -0800
318
319 include includes.h to avoid build failure on AIX
320
321commit 13af342458f5064144abbb07e5ac9bbd4eb42567
322Author: Tim Rice <tim@multitalents.net>
323Date: Tue Feb 24 07:56:47 2015 -0800
324
325 Original portability patch from djm@ for platforms missing err.h.
326 Fix name space clash on Solaris 10. Still more to do for Solaris 10
327 to deal with msghdr structure differences. ok djm@
328
329commit 910209203d0cd60c5083901cbcc0b7b44d9f48d2
330Author: Tim Rice <tim@multitalents.net>
331Date: Mon Feb 23 22:06:56 2015 -0800
332
333 cleaner way fix dispatch.h portion of commit
334 a88dd1da119052870bb2654c1a32c51971eade16
335 (some systems have sig_atomic_t in signal.h, some in sys/signal.h)
336 Sounds good to me djm@
337
338commit 676c38d7cbe65b76bbfff796861bb6615cc6a596
339Author: Tim Rice <tim@multitalents.net>
340Date: Mon Feb 23 21:51:33 2015 -0800
341
342 portability fix: if we can't dind a better define for HOST_NAME_MAX, use 255
343
344commit 1221b22023dce38cbc90ba77eae4c5d78c77a5e6
345Author: Tim Rice <tim@multitalents.net>
346Date: Mon Feb 23 21:50:34 2015 -0800
347
348 portablity fix: s/__inline__/inline/
349
350commit 4c356308a88d309c796325bb75dce90ca16591d5
351Author: Darren Tucker <dtucker@zip.com.au>
352Date: Tue Feb 24 13:49:31 2015 +1100
353
354 Wrap stdint.h includes in HAVE_STDINT_H.
355
356commit c9c88355c6a27a908e7d1e5003a2b35ea99c1614
357Author: Darren Tucker <dtucker@zip.com.au>
358Date: Tue Feb 24 13:43:57 2015 +1100
359
360 Add AI_NUMERICSERV to fake-rfc2553.
361
362 Our getaddrinfo implementation always returns numeric values already.
363
364commit ef342ab1ce6fb9a4b30186c89c309d0ae9d0eeb4
365Author: Darren Tucker <dtucker@zip.com.au>
366Date: Tue Feb 24 13:39:57 2015 +1100
367
368 Include OpenSSL's objects.h before bn.h.
369
370 Prevents compile errors on some platforms (at least old GCCs and AIX's
371 XLC compilers).
372
373commit dcc8997d116f615195aa7c9ec019fb36c28c6228
374Author: Darren Tucker <dtucker@zip.com.au>
375Date: Tue Feb 24 12:30:59 2015 +1100
376
377 Convert two macros into functions.
378
379 Convert packet_send_debug and packet_disconnect from macros to
380 functions. Some older GCCs (2.7.x, 2.95.x) see to have problems with
381 variadic macros with only one argument so we convert these two into
382 functions. ok djm@
383
384commit 2285c30d51b7e2052c6526445abe7e7cc7e170a1
385Author: djm@openbsd.org <djm@openbsd.org>
386Date: Mon Feb 23 22:21:21 2015 +0000
387
388 upstream commit
389
390 further silence spurious error message even when -v is
391 specified (e.g. to get visual host keys); reported by naddy@
392
393commit 9af21979c00652029e160295e988dea40758ece2
394Author: Damien Miller <djm@mindrot.org>
395Date: Tue Feb 24 09:04:32 2015 +1100
396
397 don't include stdint.h unless HAVE_STDINT_H set
398
399commit 62f678dd51660d6f8aee1da33d3222c5de10a89e
400Author: Damien Miller <djm@mindrot.org>
401Date: Tue Feb 24 09:02:54 2015 +1100
402
403 nother sys/queue.h -> sys-queue.h fix
404
405 spotted by Tom Christensen
406
407commit b3c19151cba2c0ed01b27f55de0d723ad07ca98f
408Author: djm@openbsd.org <djm@openbsd.org>
409Date: Mon Feb 23 20:32:15 2015 +0000
410
411 upstream commit
412
413 fix a race condition by using a mux socket rather than an
414 ineffectual wait statement
415
416commit a88dd1da119052870bb2654c1a32c51971eade16
417Author: Damien Miller <djm@mindrot.org>
418Date: Tue Feb 24 06:30:29 2015 +1100
419
420 various include fixes for portable
421
422commit 5248429b5ec524d0a65507cff0cdd6e0cb99effd
423Author: djm@openbsd.org <djm@openbsd.org>
424Date: Mon Feb 23 16:55:51 2015 +0000
425
426 upstream commit
427
428 add an XXX to remind me to improve sshkey_load_public
429
430commit e94e4b07ef2eaead38b085a60535df9981cdbcdb
431Author: djm@openbsd.org <djm@openbsd.org>
432Date: Mon Feb 23 16:55:31 2015 +0000
433
434 upstream commit
435
436 silence a spurious error message when listing
437 fingerprints for known_hosts; bz#2342
438
439commit f2293a65392b54ac721f66bc0b44462e8d1d81f8
440Author: djm@openbsd.org <djm@openbsd.org>
441Date: Mon Feb 23 16:33:25 2015 +0000
442
443 upstream commit
444
445 fix setting/clearing of TTY raw mode around
446 UpdateHostKeys=ask confirmation question; reported by Herb Goldman
447
448commit f2004cd1adf34492eae0a44b1ef84e0e31b06088
449Author: Darren Tucker <dtucker@zip.com.au>
450Date: Mon Feb 23 05:04:21 2015 +1100
451
452 Repair for non-ECC OpenSSL.
453
454 Ifdef out the ECC parts when building with an OpenSSL that doesn't have
455 it.
456
457commit 37f9220db8d1a52c75894c3de1e5f2ae5bd71b6f
458Author: Darren Tucker <dtucker@zip.com.au>
459Date: Mon Feb 23 03:07:24 2015 +1100
460
461 Wrap stdint.h includes in ifdefs.
462
463commit f81f1bbc5b892c8614ea740b1f92735652eb43f0
464Author: Tim Rice <tim@multitalents.net>
465Date: Sat Feb 21 18:12:10 2015 -0800
466
467 out of tree build fix
468
469commit 2e13a1e4d22f3b503c3bfc878562cc7386a1d1ae
470Author: Tim Rice <tim@multitalents.net>
471Date: Sat Feb 21 18:08:51 2015 -0800
472
473 mkdir kex unit test directory so testing out of tree builds works
474
475commit 1797f49b1ba31e8700231cd6b1d512d80bb50d2c
476Author: halex@openbsd.org <halex@openbsd.org>
477Date: Sat Feb 21 21:46:57 2015 +0000
478
479 upstream commit
480
481 make "ssh-add -d" properly remove a corresponding
482 certificate, and also not whine and fail if there is none
483
484 ok djm@
485
486commit 7faaa32da83a609059d95dbfcb0649fdb04caaf6
487Author: Damien Miller <djm@mindrot.org>
488Date: Sun Feb 22 07:57:27 2015 +1100
489
490 mkdir hostkey and bitmap unit test directories
491
492commit bd49da2ef197efac5e38f5399263a8b47990c538
493Author: djm@openbsd.org <djm@openbsd.org>
494Date: Fri Feb 20 23:46:01 2015 +0000
495
496 upstream commit
497
498 sort options useable under Match case-insensitively; prodded
499 jmc@
500
501commit 1a779a0dd6cd8b4a1a40ea33b5415ab8408128ac
502Author: djm@openbsd.org <djm@openbsd.org>
503Date: Sat Feb 21 20:51:02 2015 +0000
504
505 upstream commit
506
507 correct paths to configuration files being written/updated;
508 they live in $OBJ not cwd; some by Roumen Petrov
509
510commit 28ba006c1acddff992ae946d0bc0b500b531ba6b
511Author: Darren Tucker <dtucker@zip.com.au>
512Date: Sat Feb 21 15:41:07 2015 +1100
513
514 More correct checking of HAVE_DECL_AI_NUMERICSERV.
515
516commit e50e8c97a9cecae1f28febccaa6ca5ab3bc10f54
517Author: Darren Tucker <dtucker@zip.com.au>
518Date: Sat Feb 21 15:10:33 2015 +1100
519
520 Add null declaration of AI_NUMERICINFO.
521
522 Some platforms (older FreeBSD and DragonFly versions) do have
523 getaddrinfo() but do not have AI_NUMERICINFO. so define it to zero
524 in those cases.
525
526commit 18a208d6a460d707a45916db63a571e805f5db46
527Author: djm@openbsd.org <djm@openbsd.org>
528Date: Fri Feb 20 22:40:32 2015 +0000
529
530 upstream commit
531
532 more options that are available under Match; bz#2353 reported
533 by calestyo AT scientia.net
534
535commit 44732de06884238049f285f1455b2181baa7dc82
536Author: djm@openbsd.org <djm@openbsd.org>
537Date: Fri Feb 20 22:17:21 2015 +0000
538
539 upstream commit
540
541 UpdateHostKeys fixes:
542
543 I accidentally changed the format of the hostkeys@openssh.com messages
544 last week without changing the extension name, and this has been causing
545 connection failures for people who are running -current. First reported
546 by sthen@
547
548 s/hostkeys@openssh.com/hostkeys-00@openssh.com/
549 Change the name of the proof message too, and reorder it a little.
550
551 Also, UpdateHostKeys=ask is incompatible with ControlPersist (no TTY
552 available to read the response) so disable UpdateHostKeys if it is in
553 ask mode and ControlPersist is active (and document this)
554
555commit 13a39414d25646f93e6d355521d832a03aaaffe2
556Author: djm@openbsd.org <djm@openbsd.org>
557Date: Tue Feb 17 00:14:05 2015 +0000
558
559 upstream commit
560
561 Regression: I broke logging of public key fingerprints in
562 1.46. Pointed out by Pontus Lundkvist
563
564commit 773dda25e828c4c9a52f7bdce6e1e5924157beab
565Author: Damien Miller <djm@mindrot.org>
566Date: Fri Jan 30 23:10:17 2015 +1100
567
568 repair --without-openssl; broken in refactor
569
570commit e89c780886b23600de1e1c8d74aabd1ff61f43f0
571Author: Damien Miller <djm@google.com>
572Date: Tue Feb 17 10:04:55 2015 +1100
573
574 hook up hostkeys unittest to portable Makefiles
575
576commit 0abf41f99aa16ff09b263bead242d6cb2dbbcf99
577Author: djm@openbsd.org <djm@openbsd.org>
578Date: Mon Feb 16 22:21:03 2015 +0000
579
580 upstream commit
581
582 enable hostkeys unit tests
583
584commit 68a5d647ccf0fb6782b2f749433a1eee5bc9044b
585Author: djm@openbsd.org <djm@openbsd.org>
586Date: Mon Feb 16 22:20:50 2015 +0000
587
588 upstream commit
589
590 check string/memory compare arguments aren't NULL
591
592commit ef575ef20d09f20722e26b45dab80b3620469687
593Author: djm@openbsd.org <djm@openbsd.org>
594Date: Mon Feb 16 22:18:34 2015 +0000
595
596 upstream commit
597
598 unit tests for hostfile.c code, just hostkeys_foreach so
599 far
600
601commit 8ea3365e6aa2759ccf5c76eaea62cbc8a280b0e7
602Author: markus@openbsd.org <markus@openbsd.org>
603Date: Sat Feb 14 12:43:16 2015 +0000
604
605 upstream commit
606
607 test server rekey limit
608
609commit ce63c4b063c39b2b22d4ada449c9e3fbde788cb3
610Author: djm@openbsd.org <djm@openbsd.org>
611Date: Mon Feb 16 22:30:03 2015 +0000
612
613 upstream commit
614
615 partial backout of:
616
617 revision 1.441
618 date: 2015/01/31 20:30:05; author: djm; state: Exp; lines: +17 -10; commitid
619 : x8klYPZMJSrVlt3O;
620 Let sshd load public host keys even when private keys are missing.
621 Allows sshd to advertise additional keys for future key rotation.
622 Also log fingerprint of hostkeys loaded; ok markus@
623
624 hostkey updates now require access to the private key, so we can't
625 load public keys only. The improved log messages (fingerprints of keys
626 loaded) are kept.
627
628commit 523463a3a2a9bfc6cfc5afa01bae9147f76a37cc
629Author: djm@openbsd.org <djm@openbsd.org>
630Date: Mon Feb 16 22:13:32 2015 +0000
631
632 upstream commit
633
634 Revise hostkeys@openssh.com hostkey learning extension.
635
636 The client will not ask the server to prove ownership of the private
637 halves of any hitherto-unseen hostkeys it offers to the client.
638
639 Allow UpdateHostKeys option to take an 'ask' argument to let the
640 user manually review keys offered.
641
642 ok markus@
643
644commit 6c5c949782d86a6e7d58006599c7685bfcd01685
645Author: djm@openbsd.org <djm@openbsd.org>
646Date: Mon Feb 16 22:08:57 2015 +0000
647
648 upstream commit
649
650 Refactor hostkeys_foreach() and dependent code Deal with
651 IP addresses (i.e. CheckHostIP) Don't clobber known_hosts when nothing
652 changed ok markus@ as part of larger commit
653
654commit 51b082ccbe633dc970df1d1f4c9c0497115fe721
655Author: miod@openbsd.org <miod@openbsd.org>
656Date: Mon Feb 16 18:26:26 2015 +0000
657
658 upstream commit
659
660 Declare ge25519_base as extern, to prevent it from
661 becoming a common. Gets us rid of ``lignment 4 of symbol
662 `crypto_sign_ed25519_ref_ge25519_base' in mod_ge25519.o is smaller than 16 in
663 mod_ed25519.o'' warnings at link time.
664
665commit 02db468bf7e3281a8e3c058ced571b38b6407c34
666Author: markus@openbsd.org <markus@openbsd.org>
667Date: Fri Feb 13 18:57:00 2015 +0000
668
669 upstream commit
670
671 make rekey_limit for sshd w/privsep work; ok djm@
672 dtucker@
673
674commit 8ec67d505bd23c8bf9e17b7a364b563a07a58ec8
675Author: dtucker@openbsd.org <dtucker@openbsd.org>
676Date: Thu Feb 12 20:34:19 2015 +0000
677
678 upstream commit
679
680 Prevent sshd spamming syslog with
681 "ssh_dispatch_run_fatal: disconnected". ok markus@
682
683commit d4c0295d1afc342057ba358237acad6be8af480b
684Author: djm@openbsd.org <djm@openbsd.org>
685Date: Wed Feb 11 01:20:38 2015 +0000
686
687 upstream commit
688
689 Some packet error messages show the address of the peer,
690 but might be generated after the socket to the peer has suffered a TCP reset.
691 In these cases, getpeername() won't work so cache the address earlier.
692
693 spotted in the wild via deraadt@ and tedu@
694
695commit 4af1709cf774475ce5d1bc3ddcc165f6c222897d
696Author: jsg@openbsd.org <jsg@openbsd.org>
697Date: Mon Feb 9 23:22:37 2015 +0000
698
699 upstream commit
700
701 fix some leaks in error paths ok markus@
702
703commit fd36834871d06a03e1ff8d69e41992efa1bbf85f
704Author: millert@openbsd.org <millert@openbsd.org>
705Date: Fri Feb 6 23:21:59 2015 +0000
706
707 upstream commit
708
709 SIZE_MAX is standard, we should be using it in preference to
710 the obsolete SIZE_T_MAX. OK miod@ beck@
711
712commit 1910a286d7771eab84c0b047f31c0a17505236fa
713Author: millert@openbsd.org <millert@openbsd.org>
714Date: Thu Feb 5 12:59:57 2015 +0000
715
716 upstream commit
717
718 Include stdint.h, not limits.h to get SIZE_MAX. OK guenther@
719
720commit ce4f59b2405845584f45e0b3214760eb0008c06c
721Author: deraadt@openbsd.org <deraadt@openbsd.org>
722Date: Tue Feb 3 08:07:20 2015 +0000
723
724 upstream commit
725
726 missing ; djm and mlarkin really having great
727 interactions recently
728
729commit 5d34aa94938abb12b877a25be51862757f25d54b
730Author: halex@openbsd.org <halex@openbsd.org>
731Date: Tue Feb 3 00:34:14 2015 +0000
732
733 upstream commit
734
735 slightly extend the passphrase prompt if running with -c
736 in order to give the user a chance to notice if unintentionally running
737 without it
738
739 wording tweak and ok djm@
740
741commit cb3bde373e80902c7d5d0db429f85068d19b2918
742Author: djm@openbsd.org <djm@openbsd.org>
743Date: Mon Feb 2 22:48:53 2015 +0000
744
745 upstream commit
746
747 handle PKCS#11 C_Login returning
748 CKR_USER_ALREADY_LOGGED_IN; based on patch from Yuri Samoilenko; ok markus@
749
750commit 15ad750e5ec3cc69765b7eba1ce90060e7083399
751Author: djm@openbsd.org <djm@openbsd.org>
752Date: Mon Feb 2 07:41:40 2015 +0000
753
754 upstream commit
755
756 turn UpdateHostkeys off by default until I figure out
757 mlarkin@'s warning message; requested by deraadt@
758
759commit 3cd5103c1e1aaa59bd66f7f52f6ebbcd5deb12f9
760Author: deraadt@openbsd.org <deraadt@openbsd.org>
761Date: Mon Feb 2 01:57:44 2015 +0000
762
763 upstream commit
764
765 increasing encounters with difficult DNS setups in
766 darknets has convinced me UseDNS off by default is better ok djm
767
768commit 6049a548a8a68ff0bbe581ab1748ea6a59ecdc38
769Author: djm@openbsd.org <djm@openbsd.org>
770Date: Sat Jan 31 20:30:05 2015 +0000
771
772 upstream commit
773
774 Let sshd load public host keys even when private keys are
775 missing. Allows sshd to advertise additional keys for future key rotation.
776 Also log fingerprint of hostkeys loaded; ok markus@
777
778commit 46347ed5968f582661e8a70a45f448e0179ca0ab
779Author: djm@openbsd.org <djm@openbsd.org>
780Date: Fri Jan 30 11:43:14 2015 +0000
781
782 upstream commit
783
784 Add a ssh_config HostbasedKeyType option to control which
785 host public key types are tried during hostbased authentication.
786
787 This may be used to prevent too many keys being sent to the server,
788 and blowing past its MaxAuthTries limit.
789
790 bz#2211 based on patch by Iain Morgan; ok markus@
791
792commit 802660cb70453fa4d230cb0233bc1bbdf8328de1
793Author: djm@openbsd.org <djm@openbsd.org>
794Date: Fri Jan 30 10:44:49 2015 +0000
795
796 upstream commit
797
798 set a timeout to prevent hangs when talking to busted
799 servers; ok markus@
800
801commit 86936ec245a15c7abe71a0722610998b0a28b194
802Author: djm@openbsd.org <djm@openbsd.org>
803Date: Fri Jan 30 01:11:39 2015 +0000
804
805 upstream commit
806
807 regression test for 'wildcard CA' serial/key ID revocations
808
809commit 4509b5d4a4fa645a022635bfa7e86d09b285001f
810Author: djm@openbsd.org <djm@openbsd.org>
811Date: Fri Jan 30 01:13:33 2015 +0000
812
813 upstream commit
814
815 avoid more fatal/exit in the packet.c paths that
816 ssh-keyscan uses; feedback and "looks good" markus@
817
818commit 669aee994348468af8b4b2ebd29b602cf2860b22
819Author: djm@openbsd.org <djm@openbsd.org>
820Date: Fri Jan 30 01:10:33 2015 +0000
821
822 upstream commit
823
824 permit KRLs that revoke certificates by serial number or
825 key ID without scoping to a particular CA; ok markus@
826
827commit 7a2c368477e26575d0866247d3313da4256cb2b5
828Author: djm@openbsd.org <djm@openbsd.org>
829Date: Fri Jan 30 00:59:19 2015 +0000
830
831 upstream commit
832
833 missing parentheses after if in do_convert_from() broke
834 private key conversion from other formats some time in 2010; bz#2345 reported
835 by jjelen AT redhat.com
836
837commit 25f5f78d8bf5c22d9cea8b49de24ebeee648a355
838Author: djm@openbsd.org <djm@openbsd.org>
839Date: Fri Jan 30 00:22:25 2015 +0000
840
841 upstream commit
842
843 fix ssh protocol 1, spotted by miod@
844
845commit 9ce86c926dfa6e0635161b035e3944e611cbccf0
846Author: djm@openbsd.org <djm@openbsd.org>
847Date: Wed Jan 28 22:36:00 2015 +0000
848
849 upstream commit
850
851 update to new API (key_fingerprint => sshkey_fingerprint)
852 check sshkey_fingerprint return values; ok markus
853
854commit 9125525c37bf73ad3ee4025520889d2ce9d10f29
855Author: djm@openbsd.org <djm@openbsd.org>
856Date: Wed Jan 28 22:05:31 2015 +0000
857
858 upstream commit
859
860 avoid fatal() calls in packet code makes ssh-keyscan more
861 reliable against server failures ok dtucker@ markus@
862
863commit fae7bbe544cba7a9e5e4ab47ff6faa3d978646eb
864Author: djm@openbsd.org <djm@openbsd.org>
865Date: Wed Jan 28 21:15:47 2015 +0000
866
867 upstream commit
868
869 avoid fatal() calls in packet code makes ssh-keyscan more
870 reliable against server failures ok dtucker@ markus@
871
872commit 1a3d14f6b44a494037c7deab485abe6496bf2c60
873Author: djm@openbsd.org <djm@openbsd.org>
874Date: Wed Jan 28 11:07:25 2015 +0000
875
876 upstream commit
877
878 remove obsolete comment
879
880commit 80c25b7bc0a71d75c43a4575d9a1336f589eb639
881Author: okan@openbsd.org <okan@openbsd.org>
882Date: Tue Jan 27 12:54:06 2015 +0000
883
884 upstream commit
885
886 Since r1.2 removed the use of PRI* macros, inttypes.h is
887 no longer required.
888
889 ok djm@
890
891commit 69ff64f69615c2a21c97cb5878a0996c21423257
892Author: Damien Miller <djm@mindrot.org>
893Date: Tue Jan 27 23:07:43 2015 +1100
894
895 compile on systems without TCP_MD5SIG (e.g. OSX)
896
897commit 358964f3082fb90b2ae15bcab07b6105cfad5a43
898Author: Damien Miller <djm@mindrot.org>
899Date: Tue Jan 27 23:07:25 2015 +1100
900
901 use ssh-keygen under test rather than system's
902
903commit a2c95c1bf33ea53038324d1fdd774bc953f98236
904Author: Damien Miller <djm@mindrot.org>
905Date: Tue Jan 27 23:06:59 2015 +1100
906
907 OSX lacks HOST_NAME_MAX, has _POSIX_HOST_NAME_MAX
908
909commit ade31d7b6f608a19b85bee29a7a00b1e636a2919
910Author: Damien Miller <djm@mindrot.org>
911Date: Tue Jan 27 23:06:23 2015 +1100
912
913 these need active_state defined to link on OSX
914
915 temporary measure until active_state goes away entirely
916
917commit e56aa87502f22c5844918c10190e8b4f785f067b
918Author: djm@openbsd.org <djm@openbsd.org>
919Date: Tue Jan 27 12:01:36 2015 +0000
920
921 upstream commit
922
923 use printf instead of echo -n to reduce diff against
924 -portable
925
926commit 9f7637f56eddfaf62ce3c0af89c25480f2cf1068
927Author: jmc@openbsd.org <jmc@openbsd.org>
928Date: Mon Jan 26 13:55:29 2015 +0000
929
930 upstream commit
931
932 sort previous;
933
934commit 3076ee7d530d5b16842fac7a6229706c7e5acd26
935Author: djm@openbsd.org <djm@openbsd.org>
936Date: Mon Jan 26 13:36:53 2015 +0000
937
938 upstream commit
939
940 properly restore umask
941
942commit d411d395556b73ba1b9e451516a0bd6697c4b03d
943Author: djm@openbsd.org <djm@openbsd.org>
944Date: Mon Jan 26 06:12:18 2015 +0000
945
946 upstream commit
947
948 regression test for host key rotation
949
950commit fe8a3a51699afbc6407a8fae59b73349d01e49f8
951Author: djm@openbsd.org <djm@openbsd.org>
952Date: Mon Jan 26 06:11:28 2015 +0000
953
954 upstream commit
955
956 adapt to sshkey API tweaks
957
958commit 7dd355fb1f0038a3d5cdca57ebab4356c7a5b434
959Author: miod@openbsd.org <miod@openbsd.org>
960Date: Sat Jan 24 10:39:21 2015 +0000
961
962 upstream commit
963
964 Move -lz late in the linker commandline for things to
965 build on static arches.
966
967commit 0dad3b806fddb93c475b30853b9be1a25d673a33
968Author: miod@openbsd.org <miod@openbsd.org>
969Date: Fri Jan 23 21:21:23 2015 +0000
970
971 upstream commit
972
973 -Wpointer-sign is supported by gcc 4 only.
974
975commit 2b3b1c1e4bd9577b6e780c255c278542ea66c098
976Author: djm@openbsd.org <djm@openbsd.org>
977Date: Tue Jan 20 22:58:57 2015 +0000
978
979 upstream commit
980
981 use SUBDIR to recuse into unit tests; makes "make obj"
982 actually work
983
984commit 1d1092bff8db27080155541212b420703f8b9c92
985Author: djm@openbsd.org <djm@openbsd.org>
986Date: Mon Jan 26 12:16:36 2015 +0000
987
988 upstream commit
989
990 correct description of UpdateHostKeys in ssh_config.5 and
991 add it to -o lists for ssh, scp and sftp; pointed out by jmc@
992
993commit 5104db7cbd6cdd9c5971f4358e74414862fc1022
994Author: djm@openbsd.org <djm@openbsd.org>
995Date: Mon Jan 26 06:10:03 2015 +0000
996
997 upstream commit
998
999 correctly match ECDSA subtype (== curve) for
1000 offered/recevied host keys. Fixes connection-killing host key mismatches when
1001 a server offers multiple ECDSA keys with different curve type (an extremely
1002 unlikely configuration).
1003
1004 ok markus, "looks mechanical" deraadt@
1005
1006commit 8d4f87258f31cb6def9b3b55b6a7321d84728ff2
1007Author: djm@openbsd.org <djm@openbsd.org>
1008Date: Mon Jan 26 03:04:45 2015 +0000
1009
1010 upstream commit
1011
1012 Host key rotation support.
1013
1014 Add a hostkeys@openssh.com protocol extension (global request) for
1015 a server to inform a client of all its available host key after
1016 authentication has completed. The client may record the keys in
1017 known_hosts, allowing it to upgrade to better host key algorithms
1018 and a server to gracefully rotate its keys.
1019
1020 The client side of this is controlled by a UpdateHostkeys config
1021 option (default on).
1022
1023 ok markus@
1024
1025commit 60b1825262b1f1e24fc72050b907189c92daf18e
1026Author: djm@openbsd.org <djm@openbsd.org>
1027Date: Mon Jan 26 02:59:11 2015 +0000
1028
1029 upstream commit
1030
1031 small refactor and add some convenience functions; ok
1032 markus
1033
1034commit a5a3e3328ddce91e76f71ff479022d53e35c60c9
1035Author: jmc@openbsd.org <jmc@openbsd.org>
1036Date: Thu Jan 22 21:00:42 2015 +0000
1037
1038 upstream commit
1039
1040 heirarchy -> hierarchy;
1041
1042commit dcff5810a11195c57e1b3343c0d6b6f2b9974c11
1043Author: deraadt@openbsd.org <deraadt@openbsd.org>
1044Date: Thu Jan 22 20:24:41 2015 +0000
1045
1046 upstream commit
1047
1048 Provide a warning about chroot misuses (which sadly, seem
1049 to have become quite popular because shiny). sshd cannot detect/manage/do
1050 anything about these cases, best we can do is warn in the right spot in the
1051 man page. ok markus
1052
1053commit 087266ec33c76fc8d54ac5a19efacf2f4a4ca076
1054Author: deraadt@openbsd.org <deraadt@openbsd.org>
1055Date: Tue Jan 20 23:14:00 2015 +0000
1056
1057 upstream commit
1058
1059 Reduce use of <sys/param.h> and transition to <limits.h>
1060 throughout. ok djm markus
1061
1062commit 57e783c8ba2c0797f93977e83b2a8644a03065d8
1063Author: markus@openbsd.org <markus@openbsd.org>
1064Date: Tue Jan 20 20:16:21 2015 +0000
1065
1066 upstream commit
1067
1068 kex_setup errors are fatal()
1069
1070commit 1d6424a6ff94633c221297ae8f42d54e12a20912
1071Author: djm@openbsd.org <djm@openbsd.org>
1072Date: Tue Jan 20 08:02:33 2015 +0000
1073
1074 upstream commit
1075
1076 this test would accidentally delete agent.sh if run without
1077 obj/
1078
1079commit 12b5f50777203e12575f1b08568281e447249ed3
1080Author: djm@openbsd.org <djm@openbsd.org>
1081Date: Tue Jan 20 07:56:44 2015 +0000
1082
1083 upstream commit
1084
1085 make this compile with KERBEROS5 enabled
1086
1087commit e2cc6bef08941256817d44d146115b3478586ad4
1088Author: djm@openbsd.org <djm@openbsd.org>
1089Date: Tue Jan 20 07:55:33 2015 +0000
1090
1091 upstream commit
1092
1093 fix hostkeys in agent; ok markus@
1094
1095commit 1ca3e2155aa5d3801a7ae050f85c71f41fcb95b1
1096Author: Damien Miller <djm@mindrot.org>
1097Date: Tue Jan 20 10:11:31 2015 +1100
1098
1099 fix kex test
1100
1101commit c78a578107c7e6dcf5d30a2f34cb6581bef14029
1102Author: markus@openbsd.org <markus@openbsd.org>
1103Date: Mon Jan 19 20:45:25 2015 +0000
1104
1105 upstream commit
1106
1107 finally enable the KEX tests I wrote some years ago...
1108
1109commit 31821d7217e686667d04935aeec99e1fc4a46e7e
1110Author: markus@openbsd.org <markus@openbsd.org>
1111Date: Mon Jan 19 20:42:31 2015 +0000
1112
1113 upstream commit
1114
1115 adapt to new error message (SSH_ERR_MAC_INVALID)
1116
1117commit d3716ca19e510e95d956ae14d5b367e364bff7f1
1118Author: djm@openbsd.org <djm@openbsd.org>
1119Date: Mon Jan 19 17:31:13 2015 +0000
1120
1121 upstream commit
1122
1123 this test was broken in at least two ways, such that it
1124 wasn't checking that a KRL was not excluding valid keys
1125
1126commit 3f797653748e7c2b037dacb57574c01d9ef3b4d3
1127Author: markus@openbsd.org <markus@openbsd.org>
1128Date: Mon Jan 19 20:32:39 2015 +0000
1129
1130 upstream commit
1131
1132 switch ssh-keyscan from setjmp to multiple ssh transport
1133 layer instances ok djm@
1134
1135commit f582f0e917bb0017b00944783cd5f408bf4b0b5e
1136Author: markus@openbsd.org <markus@openbsd.org>
1137Date: Mon Jan 19 20:30:23 2015 +0000
1138
1139 upstream commit
1140
1141 add experimental api for packet layer; ok djm@
1142
1143commit 48b3b2ba75181f11fca7f327058a591f4426cade
1144Author: markus@openbsd.org <markus@openbsd.org>
1145Date: Mon Jan 19 20:20:20 2015 +0000
1146
1147 upstream commit
1148
1149 store compat flags in struct ssh; ok djm@
1150
1151commit 57d10cbe861a235dd269c74fb2fe248469ecee9d
1152Author: markus@openbsd.org <markus@openbsd.org>
1153Date: Mon Jan 19 20:16:15 2015 +0000
1154
1155 upstream commit
1156
1157 adapt kex to sshbuf and struct ssh; ok djm@
1158
1159commit 3fdc88a0def4f86aa88a5846ac079dc964c0546a
1160Author: markus@openbsd.org <markus@openbsd.org>
1161Date: Mon Jan 19 20:07:45 2015 +0000
1162
1163 upstream commit
1164
1165 move dispatch to struct ssh; ok djm@
1166
1167commit 091c302829210c41e7f57c3f094c7b9c054306f0
1168Author: markus@openbsd.org <markus@openbsd.org>
1169Date: Mon Jan 19 19:52:16 2015 +0000
1170
1171 upstream commit
1172
1173 update packet.c & isolate, introduce struct ssh a) switch
1174 packet.c to buffer api and isolate per-connection info into struct ssh b)
1175 (de)serialization of the state is moved from monitor to packet.c c) the old
1176 packet.c API is implemented in opacket.[ch] d) compress.c/h is removed and
1177 integrated into packet.c with and ok djm@
1178
1179commit 4e62cc68ce4ba20245d208b252e74e91d3785b74
1180Author: djm@openbsd.org <djm@openbsd.org>
1181Date: Mon Jan 19 17:35:48 2015 +0000
1182
1183 upstream commit
1184
1185 fix format strings in (disabled) debugging
1186
1187commit d85e06245907d49a2cd0cfa0abf59150ad616f42
1188Author: djm@openbsd.org <djm@openbsd.org>
1189Date: Mon Jan 19 06:01:32 2015 +0000
1190
1191 upstream commit
1192
1193 be a bit more careful in these tests to ensure that
1194 known_hosts is clean
1195
1196commit 7947810eab5fe0ad311f32a48f4d4eb1f71be6cf
1197Author: djm@openbsd.org <djm@openbsd.org>
1198Date: Sun Jan 18 22:00:18 2015 +0000
1199
1200 upstream commit
1201
1202 regression test for known_host file editing using
1203 ssh-keygen (-H / -R / -F) after hostkeys_foreach() change; feedback and ok
1204 markus@
1205
1206commit 3a2b09d147a565d8a47edf37491e149a02c0d3a3
1207Author: djm@openbsd.org <djm@openbsd.org>
1208Date: Sun Jan 18 19:54:46 2015 +0000
1209
1210 upstream commit
1211
1212 more and better key tests
1213
1214 test signatures and verification
1215 test certificate generation
1216 flesh out nested cert test
1217
1218 removes most of the XXX todo markers
1219
1220commit 589e69fd82724cfc9738f128e4771da2e6405d0d
1221Author: djm@openbsd.org <djm@openbsd.org>
1222Date: Sun Jan 18 19:53:58 2015 +0000
1223
1224 upstream commit
1225
1226 make the signature fuzzing test much more rigorous:
1227 ensure that the fuzzed input cases do not match the original (using new
1228 fuzz_matches_original() function) and check that the verification fails in
1229 each case
1230
1231commit 80603c0daa2538c349c1c152405580b164d5475f
1232Author: djm@openbsd.org <djm@openbsd.org>
1233Date: Sun Jan 18 19:52:44 2015 +0000
1234
1235 upstream commit
1236
1237 add a fuzz_matches_original() function to the fuzzer to
1238 detect fuzz cases that are identical to the original data. Hacky
1239 implementation, but very useful when you need the fuzz to be different, e.g.
1240 when verifying signature
1241
1242commit 87d5495bd337e358ad69c524fcb9495208c0750b
1243Author: djm@openbsd.org <djm@openbsd.org>
1244Date: Sun Jan 18 19:50:55 2015 +0000
1245
1246 upstream commit
1247
1248 better dumps from the fuzzer (shown on errors) -
1249 include the original data as well as the fuzzed copy.
1250
1251commit d59ec478c453a3fff05badbbfd96aa856364f2c2
1252Author: djm@openbsd.org <djm@openbsd.org>
1253Date: Sun Jan 18 19:47:55 2015 +0000
1254
1255 upstream commit
1256
1257 enable hostkey-agent.sh test
1258
1259commit 26b3425170bf840e4b095e1c10bf25a0a3e3a105
1260Author: djm@openbsd.org <djm@openbsd.org>
1261Date: Sat Jan 17 18:54:30 2015 +0000
1262
1263 upstream commit
1264
1265 unit test for hostkeys in ssh-agent
1266
1267commit 9e06a0fb23ec55d9223b26a45bb63c7649e2f2f2
1268Author: markus@openbsd.org <markus@openbsd.org>
1269Date: Thu Jan 15 23:41:29 2015 +0000
1270
1271 upstream commit
1272
1273 add kex unit tests
1274
1275commit d2099dec6da21ae627f6289aedae6bc1d41a22ce
1276Author: deraadt@openbsd.org <deraadt@openbsd.org>
1277Date: Mon Jan 19 00:32:54 2015 +0000
1278
1279 upstream commit
1280
1281 djm, your /usr/include tree is old
1282
1283commit 2b3c3c76c30dc5076fe09d590f5b26880f148a54
1284Author: djm@openbsd.org <djm@openbsd.org>
1285Date: Sun Jan 18 21:51:19 2015 +0000
1286
1287 upstream commit
1288
1289 some feedback from markus@: comment hostkeys_foreach()
1290 context and avoid a member in it.
1291
1292commit cecb30bc2ba6d594366e657d664d5c494b6c8a7f
1293Author: djm@openbsd.org <djm@openbsd.org>
1294Date: Sun Jan 18 21:49:42 2015 +0000
1295
1296 upstream commit
1297
1298 make ssh-keygen use hostkeys_foreach(). Removes some
1299 horrendous code; ok markus@
1300
1301commit ec3d065df3a9557ea96b02d061fd821a18c1a0b9
1302Author: djm@openbsd.org <djm@openbsd.org>
1303Date: Sun Jan 18 21:48:09 2015 +0000
1304
1305 upstream commit
1306
1307 convert load_hostkeys() (hostkey ordering and
1308 known_host matching) to use the new hostkey_foreach() iterator; ok markus
1309
1310commit c29811cc480a260e42fd88849fc86a80c1e91038
1311Author: djm@openbsd.org <djm@openbsd.org>
1312Date: Sun Jan 18 21:40:23 2015 +0000
1313
1314 upstream commit
1315
1316 introduce hostkeys_foreach() to allow iteration over a
1317 known_hosts file or controlled subset thereof. This will allow us to pull out
1318 some ugly and duplicated code, and will be used to implement hostkey rotation
1319 later.
1320
1321 feedback and ok markus
1322
1323commit f101d8291da01bbbfd6fb8c569cfd0cc61c0d346
1324Author: deraadt@openbsd.org <deraadt@openbsd.org>
1325Date: Sun Jan 18 14:01:00 2015 +0000
1326
1327 upstream commit
1328
1329 string truncation due to sizeof(size) ok djm markus
1330
1331commit 35d6022b55b7969fc10c261cb6aa78cc4a5fcc41
1332Author: djm@openbsd.org <djm@openbsd.org>
1333Date: Sun Jan 18 13:33:34 2015 +0000
1334
1335 upstream commit
1336
1337 avoid trailing ',' in host key algorithms
1338
1339commit 7efb455789a0cb76bdcdee91c6060a3dc8f5c007
1340Author: djm@openbsd.org <djm@openbsd.org>
1341Date: Sun Jan 18 13:22:28 2015 +0000
1342
1343 upstream commit
1344
1345 infer key length correctly when user specified a fully-
1346 qualified key name instead of using the -b bits option; ok markus@
1347
1348commit 83f8ffa6a55ccd0ce9d8a205e3e7439ec18fedf5
1349Author: djm@openbsd.org <djm@openbsd.org>
1350Date: Sat Jan 17 18:53:34 2015 +0000
1351
1352 upstream commit
1353
1354 fix hostkeys on ssh agent; found by unit test I'm about
1355 to commit
1356
1357commit 369d61f17657b814124268f99c033e4dc6e436c1
1358Author: schwarze@openbsd.org <schwarze@openbsd.org>
1359Date: Fri Jan 16 16:20:23 2015 +0000
1360
1361 upstream commit
1362
1363 garbage collect empty .No macros mandoc warns about
1364
1365commit bb8b442d32dbdb8521d610e10d8b248d938bd747
1366Author: djm@openbsd.org <djm@openbsd.org>
1367Date: Fri Jan 16 15:55:07 2015 +0000
1368
1369 upstream commit
1370
1371 regression: incorrect error message on
1372 otherwise-successful ssh-keygen -A. Reported by Dmitry Orlov, via deraadt@
1373
1374commit 9010902954a40b59d0bf3df3ccbc3140a653e2bc
1375Author: djm@openbsd.org <djm@openbsd.org>
1376Date: Fri Jan 16 07:19:48 2015 +0000
1377
1378 upstream commit
1379
1380 when hostname canonicalisation is enabled, try to parse
1381 hostnames as addresses before looking them up for canonicalisation. fixes
1382 bz#2074 and avoids needless DNS lookups in some cases; ok markus
1383
1384commit 2ae4f337b2a5fb2841b6b0053b49496fef844d1c
1385Author: deraadt@openbsd.org <deraadt@openbsd.org>
1386Date: Fri Jan 16 06:40:12 2015 +0000
1387
1388 upstream commit
1389
1390 Replace <sys/param.h> with <limits.h> and other less
1391 dirty headers where possible. Annotate <sys/param.h> lines with their
1392 current reasons. Switch to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1,
1393 LOGIN_NAME_MAX, etc. Change MIN() and MAX() to local definitions of
1394 MINIMUM() and MAXIMUM() where sensible to avoid pulling in the pollution.
1395 These are the files confirmed through binary verification. ok guenther,
1396 millert, doug (helped with the verification protocol)
1397
1398commit 3c4726f4c24118e8f1bb80bf75f1456c76df072c
1399Author: markus@openbsd.org <markus@openbsd.org>
1400Date: Thu Jan 15 21:38:50 2015 +0000
1401
1402 upstream commit
1403
1404 remove xmalloc, switch to sshbuf
1405
1406commit e17ac01f8b763e4b83976b9e521e90a280acc097
1407Author: markus@openbsd.org <markus@openbsd.org>
1408Date: Thu Jan 15 21:37:14 2015 +0000
1409
1410 upstream commit
1411
1412 switch to sshbuf
1413
1414commit ddef9995a1fa6c7a8ff3b38bfe6cf724bebf13d0
1415Author: naddy@openbsd.org <naddy@openbsd.org>
1416Date: Thu Jan 15 18:32:54 2015 +0000
1417
1418 upstream commit
1419
1420 handle UMAC128 initialization like UMAC; ok djm@ markus@
1421
1422commit f14564c1f7792446bca143580aef0e7ac25dcdae
1423Author: djm@openbsd.org <djm@openbsd.org>
1424Date: Thu Jan 15 11:04:36 2015 +0000
1425
1426 upstream commit
1427
1428 fix regression reported by brad@ for passworded keys without
1429 agent present
1430
1431commit 45c0fd70bb2a88061319dfff20cb12ef7b1bc47e
1432Author: Damien Miller <djm@mindrot.org>
1433Date: Thu Jan 15 22:08:23 2015 +1100
1434
1435 make bitmap test compile
1436
1437commit d333f89abf7179021e5c3f28673f469abe032062
1438Author: djm@openbsd.org <djm@openbsd.org>
1439Date: Thu Jan 15 07:36:28 2015 +0000
1440
1441 upstream commit
1442
1443 unit tests for KRL bitmap
1444
1445commit 7613f828f49c55ff356007ae9645038ab6682556
1446Author: markus@openbsd.org <markus@openbsd.org>
1447Date: Wed Jan 14 09:58:21 2015 +0000
1448
1449 upstream commit
1450
1451 re-add comment about full path
1452
1453commit 6c43b48b307c41cd656b415621a644074579a578
1454Author: markus@openbsd.org <markus@openbsd.org>
1455Date: Wed Jan 14 09:54:38 2015 +0000
1456
1457 upstream commit
1458
1459 don't reset to the installed sshd; connect before
1460 reconfigure, too
1461
1462commit 771bb47a1df8b69061f09462e78aa0b66cd594bf
1463Author: djm@openbsd.org <djm@openbsd.org>
1464Date: Tue Jan 13 14:51:51 2015 +0000
1465
1466 upstream commit
1467
1468 implement a SIGINFO handler so we can discern a stuck
1469 fuzz test from a merely glacial one; prompted by and ok markus
1470
1471commit cfaa57962f8536f3cf0fd7daf4d6a55d6f6de45f
1472Author: djm@openbsd.org <djm@openbsd.org>
1473Date: Tue Jan 13 08:23:26 2015 +0000
1474
1475 upstream commit
1476
1477 use $SSH instead of installed ssh to allow override;
1478 spotted by markus@
1479
1480commit 0920553d0aee117a596b03ed5b49b280d34a32c5
1481Author: djm@openbsd.org <djm@openbsd.org>
1482Date: Tue Jan 13 07:49:49 2015 +0000
1483
1484 upstream commit
1485
1486 regress test for PubkeyAcceptedKeyTypes; ok markus@
1487
1488commit 27ca1a5c0095eda151934bca39a77e391f875d17
1489Author: markus@openbsd.org <markus@openbsd.org>
1490Date: Mon Jan 12 20:13:27 2015 +0000
1491
1492 upstream commit
1493
1494 unbreak parsing of pubkey comments; with gerhard; ok
1495 djm/deraadt
1496
1497commit 55358f0b4e0b83bc0df81c5f854c91b11e0bb4dc
1498Author: djm@openbsd.org <djm@openbsd.org>
1499Date: Mon Jan 12 11:46:32 2015 +0000
1500
1501 upstream commit
1502
1503 fatal if soft-PKCS11 library is missing rather (rather
1504 than continue and fail with a more cryptic error)
1505
1506commit c3554cdd2a1a62434b8161017aa76fa09718a003
1507Author: djm@openbsd.org <djm@openbsd.org>
1508Date: Mon Jan 12 11:12:38 2015 +0000
1509
1510 upstream commit
1511
1512 let this test all supporte key types; pointed out/ok
1513 markus@
1514
1515commit 1129dcfc5a3e508635004bcc05a3574cb7687167
1516Author: djm@openbsd.org <djm@openbsd.org>
1517Date: Thu Jan 15 09:40:00 2015 +0000
1518
1519 upstream commit
1520
1521 sync ssh-keysign, ssh-keygen and some dependencies to the
1522 new buffer/key API; mostly mechanical, ok markus@
1523
1524commit e4ebf5586452bf512da662ac277aaf6ecf0efe7c
1525Author: djm@openbsd.org <djm@openbsd.org>
1526Date: Thu Jan 15 07:57:08 2015 +0000
1527
1528 upstream commit
1529
1530 remove commented-out test code now that it has moved to a
1531 proper unit test
1532
1533commit e81cba066c1e9eb70aba0f6e7c0ff220611b370f
1534Author: djm@openbsd.org <djm@openbsd.org>
1535Date: Wed Jan 14 20:54:29 2015 +0000
1536
1537 upstream commit
1538
1539 whitespace
1540
1541commit 141efe49542f7156cdbc2e4cd0a041d8b1aab622
1542Author: djm@openbsd.org <djm@openbsd.org>
1543Date: Wed Jan 14 20:05:27 2015 +0000
1544
1545 upstream commit
1546
1547 move authfd.c and its tentacles to the new buffer/key
1548 API; ok markus@
1549
1550commit 0088c57af302cda278bd26d8c3ae81d5b6f7c289
1551Author: djm@openbsd.org <djm@openbsd.org>
1552Date: Wed Jan 14 19:33:41 2015 +0000
1553
1554 upstream commit
1555
1556 fix small regression: ssh-agent would return a success
1557 message but an empty signature if asked to sign using an unknown key; ok
1558 markus@
1559
1560commit b03ebe2c22b8166e4f64c37737f4278676e3488d
1561Author: Damien Miller <djm@mindrot.org>
1562Date: Thu Jan 15 03:08:58 2015 +1100
1563
1564 more --without-openssl
1565
1566 fix some regressions caused by upstream merges
1567
1568 enable KRLs now that they no longer require BIGNUMs
1569
1570commit bc42cc6fe784f36df225c44c93b74830027cb5a2
1571Author: Damien Miller <djm@mindrot.org>
1572Date: Thu Jan 15 03:08:29 2015 +1100
1573
1574 kludge around tun API mismatch betterer
1575
1576commit c332110291089b624fa0951fbf2d1ee6de525b9f
1577Author: Damien Miller <djm@mindrot.org>
1578Date: Thu Jan 15 02:59:51 2015 +1100
1579
1580 some systems lack SO_REUSEPORT
1581
1582commit 83b9678a62cbdc74eb2031cf1e1e4ffd58e233ae
1583Author: Damien Miller <djm@mindrot.org>
1584Date: Thu Jan 15 02:35:50 2015 +1100
1585
1586 fix merge botch
1587
1588commit 0cdc5a3eb6fb383569a4da2a30705d9b90428d6b
1589Author: Damien Miller <djm@mindrot.org>
1590Date: Thu Jan 15 02:35:33 2015 +1100
1591
1592 unbreak across API change
1593
1594commit 6e2549ac2b5e7f96cbc2d83a6e0784b120444b47
1595Author: Damien Miller <djm@mindrot.org>
1596Date: Thu Jan 15 02:30:18 2015 +1100
1597
1598 need includes.h for portable OpenSSH
1599
1600commit 72ef7c148c42db7d5632a29f137f8b87b579f2d9
1601Author: Damien Miller <djm@mindrot.org>
1602Date: Thu Jan 15 02:21:31 2015 +1100
1603
1604 support --without-openssl at configure time
1605
1606 Disables and removes dependency on OpenSSL. Many features don't
1607 work and the set of crypto options is greatly restricted. This
1608 will only work on system with native arc4random or /dev/urandom.
1609
1610 Considered highly experimental for now.
1611
1612commit 4f38c61c68ae7e3f9ee4b3c38bc86cd39f65ece9
1613Author: Damien Miller <djm@mindrot.org>
1614Date: Thu Jan 15 02:28:00 2015 +1100
1615
1616 add files missed in last commit
1617
1618commit a165bab605f7be55940bb8fae977398e8c96a46d
1619Author: djm@openbsd.org <djm@openbsd.org>
1620Date: Wed Jan 14 15:02:39 2015 +0000
1621
1622 upstream commit
1623
1624 avoid BIGNUM in KRL code by using a simple bitmap;
1625 feedback and ok markus
1626
1627commit 7d845f4a0b7ec97887be204c3760e44de8bf1f32
1628Author: djm@openbsd.org <djm@openbsd.org>
1629Date: Wed Jan 14 13:54:13 2015 +0000
1630
1631 upstream commit
1632
1633 update sftp client and server to new buffer API. pretty
1634 much just mechanical changes; with & ok markus
1635
1636commit 139ca81866ec1b219c717d17061e5e7ad1059e2a
1637Author: markus@openbsd.org <markus@openbsd.org>
1638Date: Wed Jan 14 13:09:09 2015 +0000
1639
1640 upstream commit
1641
1642 switch to sshbuf/sshkey; with & ok djm@
1643
1644commit 81bfbd0bd35683de5d7f2238b985e5f8150a9180
1645Author: Damien Miller <djm@mindrot.org>
1646Date: Wed Jan 14 21:48:18 2015 +1100
1647
1648 support --without-openssl at configure time
1649
1650 Disables and removes dependency on OpenSSL. Many features don't
1651 work and the set of crypto options is greatly restricted. This
1652 will only work on system with native arc4random or /dev/urandom.
1653
1654 Considered highly experimental for now.
1655
1656commit 54924b53af15ccdcbb9f89984512b5efef641a31
1657Author: djm@openbsd.org <djm@openbsd.org>
1658Date: Wed Jan 14 10:46:28 2015 +0000
1659
1660 upstream commit
1661
1662 avoid an warning for the !OPENSSL case
1663
1664commit ae8b463217f7c9b66655bfc3945c050ffdaeb861
1665Author: markus@openbsd.org <markus@openbsd.org>
1666Date: Wed Jan 14 10:30:34 2015 +0000
1667
1668 upstream commit
1669
1670 swith auth-options to new sshbuf/sshkey; ok djm@
1671
1672commit 540e891191b98b89ee90aacf5b14a4a68635e763
1673Author: djm@openbsd.org <djm@openbsd.org>
1674Date: Wed Jan 14 10:29:45 2015 +0000
1675
1676 upstream commit
1677
1678 make non-OpenSSL aes-ctr work on sshd w/ privsep; ok
1679 markus@
1680
1681commit 60c2c4ea5e1ad0ddfe8b2877b78ed5143be79c53
1682Author: markus@openbsd.org <markus@openbsd.org>
1683Date: Wed Jan 14 10:24:42 2015 +0000
1684
1685 upstream commit
1686
1687 remove unneeded includes, sync my copyright across files
1688 & whitespace; ok djm@
1689
1690commit 128343bcdb0b60fc826f2733df8cf979ec1627b4
1691Author: markus@openbsd.org <markus@openbsd.org>
1692Date: Tue Jan 13 19:31:40 2015 +0000
1693
1694 upstream commit
1695
1696 adapt mac.c to ssherr.h return codes (de-fatal) and
1697 simplify dependencies ok djm@
1698
1699commit e7fd952f4ea01f09ceb068721a5431ac2fd416ed
1700Author: djm@openbsd.org <djm@openbsd.org>
1701Date: Tue Jan 13 19:04:35 2015 +0000
1702
1703 upstream commit
1704
1705 sync changes from libopenssh; prepared by markus@ mostly
1706 debug output tweaks, a couple of error return value changes and some other
1707 minor stuff
1708
1709commit 76c0480a85675f03a1376167cb686abed01a3583
1710Author: Damien Miller <djm@mindrot.org>
1711Date: Tue Jan 13 19:38:18 2015 +1100
1712
1713 add --without-ssh1 option to configure
1714
1715 Allows disabling support for SSH protocol 1.
1716
1717commit 1f729f0614d1376c3332fa1edb6a5e5cec7e9e03
1718Author: djm@openbsd.org <djm@openbsd.org>
1719Date: Tue Jan 13 07:39:19 2015 +0000
1720
1721 upstream commit
1722
1723 add sshd_config HostbasedAcceptedKeyTypes and
1724 PubkeyAcceptedKeyTypes options to allow sshd to control what public key types
1725 will be accepted. Currently defaults to all. Feedback & ok markus@
1726
1727commit 816d1538c24209a93ba0560b27c4fda57c3fff65
1728Author: markus@openbsd.org <markus@openbsd.org>
1729Date: Mon Jan 12 20:13:27 2015 +0000
1730
1731 upstream commit
1732
1733 unbreak parsing of pubkey comments; with gerhard; ok
1734 djm/deraadt
1735
1736commit 0097565f849851812df610b7b6b3c4bd414f6c62
1737Author: markus@openbsd.org <markus@openbsd.org>
1738Date: Mon Jan 12 19:22:46 2015 +0000
1739
1740 upstream commit
1741
1742 missing error assigment on sshbuf_put_string()
1743
1744commit a7f49dcb527dd17877fcb8d5c3a9a6f550e0bba5
1745Author: djm@openbsd.org <djm@openbsd.org>
1746Date: Mon Jan 12 15:18:07 2015 +0000
1747
1748 upstream commit
1749
1750 apparently memcpy(x, NULL, 0) is undefined behaviour
1751 according to C99 (cf. sections 7.21.1 and 7.1.4), so check skip memcpy calls
1752 when length==0; ok markus@
1753
1754commit 905fe30fca82f38213763616d0d26eb6790bde33
1755Author: markus@openbsd.org <markus@openbsd.org>
1756Date: Mon Jan 12 14:05:19 2015 +0000
1757
1758 upstream commit
1759
1760 free->sshkey_free; ok djm@
1761
1762commit f067cca2bc20c86b110174c3fef04086a7f57b13
1763Author: markus@openbsd.org <markus@openbsd.org>
1764Date: Mon Jan 12 13:29:27 2015 +0000
1765
1766 upstream commit
1767
1768 allow WITH_OPENSSL w/o WITH_SSH1; ok djm@
1769
1770commit c4bfafcc2a9300d9cfb3c15e75572d3a7d74670d
1771Author: djm@openbsd.org <djm@openbsd.org>
1772Date: Thu Jan 8 13:10:58 2015 +0000
1773
1774 upstream commit
1775
1776 adjust for sshkey_load_file() API change
1777
1778commit e752c6d547036c602b89e9e704851463bd160e32
1779Author: djm@openbsd.org <djm@openbsd.org>
1780Date: Thu Jan 8 13:44:36 2015 +0000
1781
1782 upstream commit
1783
1784 fix ssh_config FingerprintHash evaluation order; from Petr
1785 Lautrbach
1786
1787commit ab24ab847b0fc94c8d5e419feecff0bcb6d6d1bf
1788Author: djm@openbsd.org <djm@openbsd.org>
1789Date: Thu Jan 8 10:15:45 2015 +0000
1790
1791 upstream commit
1792
1793 reorder hostbased key attempts to better match the
1794 default hostkey algorithms order in myproposal.h; ok markus@
1795
1796commit 1195f4cb07ef4b0405c839293c38600b3e9bdb46
1797Author: djm@openbsd.org <djm@openbsd.org>
1798Date: Thu Jan 8 10:14:08 2015 +0000
1799
1800 upstream commit
1801
1802 deprecate key_load_private_pem() and
1803 sshkey_load_private_pem() interfaces. Refactor the generic key loading API to
1804 not require pathnames to be specified (they weren't really used).
1805
1806 Fixes a few other things en passant:
1807
1808 Makes ed25519 keys work for hostbased authentication (ssh-keysign
1809 previously used the PEM-only routines).
1810
1811 Fixes key comment regression bz#2306: key pathnames were being lost as
1812 comment fields.
1813
1814 ok markus@
1815
1816commit febbe09e4e9aff579b0c5cc1623f756862e4757d
1817Author: tedu@openbsd.org <tedu@openbsd.org>
1818Date: Wed Jan 7 18:15:07 2015 +0000
1819
1820 upstream commit
1821
1822 workaround for the Meyer, et al, Bleichenbacher Side
1823 Channel Attack. fake up a bignum key before RSA decryption. discussed/ok djm
1824 markus
1825
1826commit 5191df927db282d3123ca2f34a04d8d96153911a
1827Author: djm@openbsd.org <djm@openbsd.org>
1828Date: Tue Dec 23 22:42:48 2014 +0000
1829
1830 upstream commit
1831
1832 KNF and add a little more debug()
1833
1834commit 8abd80315d3419b20e6938f74d37e2e2b547f0b7
1835Author: jmc@openbsd.org <jmc@openbsd.org>
1836Date: Mon Dec 22 09:26:31 2014 +0000
1837
1838 upstream commit
1839
1840 add fingerprinthash to the options list;
1841
1842commit 296ef0560f60980da01d83b9f0e1a5257826536f
1843Author: jmc@openbsd.org <jmc@openbsd.org>
1844Date: Mon Dec 22 09:24:59 2014 +0000
1845
1846 upstream commit
1847
1848 tweak previous;
1849
1850commit 462082eacbd37778a173afb6b84c6f4d898a18b5
1851Author: Damien Miller <djm@google.com>
1852Date: Tue Dec 30 08:16:11 2014 +1100
1853
1854 avoid uninitialised free of ldns_res
1855
1856 If an invalid rdclass was passed to getrrsetbyname() then
1857 this would execute a free on an uninitialised pointer.
1858 OpenSSH only ever calls this with a fixed and valid rdclass.
1859
1860 Reported by Joshua Rogers
1861
1862commit 01b63498801053f131a0740eb9d13faf35d636c8
1863Author: Damien Miller <djm@google.com>
1864Date: Mon Dec 29 18:10:18 2014 +1100
1865
1866 pull updated OpenBSD BCrypt PBKDF implementation
1867
1868 Includes fix for 1 byte output overflow for large key length
1869 requests (not reachable in OpenSSH).
1870
1871 Pointed out by Joshua Rogers
1872
1873commit c528c1b4af2f06712177b3de9b30705752f7cbcb
1874Author: Damien Miller <djm@google.com>
1875Date: Tue Dec 23 15:26:13 2014 +1100
1876
1877 fix variable name for IPv6 case in construct_utmpx
1878
1879 patch from writeonce AT midipix.org via bz#2296
1880
1881commit 293cac52dcda123244b2e594d15592e5e481c55e
1882Author: Damien Miller <djm@google.com>
1883Date: Mon Dec 22 16:30:42 2014 +1100
1884
1885 include and use OpenBSD netcat in regress/
1886
1887commit 8f6784f0cb56dc4fd00af3e81a10050a5785228d
1888Author: djm@openbsd.org <djm@openbsd.org>
1889Date: Mon Dec 22 09:05:17 2014 +0000
1890
1891 upstream commit
1892
1893 mention ssh -Q feature to list supported { MAC, cipher,
1894 KEX, key } algorithms in more places and include the query string used to
1895 list the relevant information; bz#2288
1896
1897commit 449e11b4d7847079bd0a2daa6e3e7ea03d8ef700
1898Author: jmc@openbsd.org <jmc@openbsd.org>
1899Date: Mon Dec 22 08:24:17 2014 +0000
1900
1901 upstream commit
1902
1903 tweak previous;
1904
1905commit 4bea0ab3290c0b9dd2aa199e932de8e7e18062d6
1906Author: djm@openbsd.org <djm@openbsd.org>
1907Date: Mon Dec 22 08:06:03 2014 +0000
1908
1909 upstream commit
1910
1911 regression test for multiple required pubkey authentication;
1912 ok markus@
1913
1914commit f1c4d8ec52158b6f57834b8cd839605b0a33e7f2
1915Author: djm@openbsd.org <djm@openbsd.org>
1916Date: Mon Dec 22 08:04:23 2014 +0000
1917
1918 upstream commit
1919
1920 correct description of what will happen when a
1921 AuthorizedKeysCommand is specified but AuthorizedKeysCommandUser is not (sshd
1922 will refuse to start)
1923
1924commit 161cf419f412446635013ac49e8c660cadc36080
1925Author: djm@openbsd.org <djm@openbsd.org>
1926Date: Mon Dec 22 07:55:51 2014 +0000
1927
1928 upstream commit
1929
1930 make internal handling of filename arguments of "none"
1931 more consistent with ssh. "none" arguments are now replaced with NULL when
1932 the configuration is finalised.
1933
1934 Simplifies checking later on (just need to test not-NULL rather than
1935 that + strcmp) and cleans up some inconsistencies. ok markus@
1936
1937commit f69b69b8625be447b8826b21d87713874dac25a6
1938Author: djm@openbsd.org <djm@openbsd.org>
1939Date: Mon Dec 22 07:51:30 2014 +0000
1940
1941 upstream commit
1942
1943 remember which public keys have been used for
1944 authentication and refuse to accept previously-used keys.
1945
1946 This allows AuthenticationMethods=publickey,publickey to require
1947 that users authenticate using two _different_ pubkeys.
1948
1949 ok markus@
1950
1951commit 46ac2ed4677968224c4ca825bc98fc68dae183f0
1952Author: djm@openbsd.org <djm@openbsd.org>
1953Date: Mon Dec 22 07:24:11 2014 +0000
1954
1955 upstream commit
1956
1957 fix passing of wildcard forward bind addresses when
1958 connection multiplexing is in use; patch from Sami Hartikainen via bz#2324;
3674 ok dtucker@ 1959 ok dtucker@
3675 - djm@cvs.openbsd.org 2011/12/04 23:16:12 1960
3676 [mux.c] 1961commit 0d1b241a262e4d0a6bbfdd595489ab1b853c43a1
3677 revert: 1962Author: djm@openbsd.org <djm@openbsd.org>
3678 > revision 1.32 1963Date: Mon Dec 22 06:14:29 2014 +0000
3679 > date: 2011/12/02 00:41:56; author: djm; state: Exp; lines: +4 -1 1964
3680 > fix bz#1948: ssh -f doesn't fork for multiplexed connection. 1965 upstream commit
3681 > ok dtucker@ 1966
3682 it interacts badly with ControlPersist 1967 make this slightly easier to diff against portable
3683 - djm@cvs.openbsd.org 2012/01/07 21:11:36 1968
3684 [mux.c] 1969commit 0715bcdddbf68953964058f17255bf54734b8737
3685 fix double-free in new session handler 1970Author: Damien Miller <djm@mindrot.org>
3686 NB. Id sync only 1971Date: Mon Dec 22 13:47:07 2014 +1100
3687 - djm@cvs.openbsd.org 2012/05/23 03:28:28 1972
3688 [dns.c dns.h key.c key.h ssh-keygen.c] 1973 add missing regress output file
3689 add support for RFC6594 SSHFP DNS records for ECDSA key types. 1974
3690 patch from bugzilla-m67 AT nulld.me in bz#1978; ok + tweak markus@ 1975commit 1e30483c8ad2c2f39445d4a4b6ab20c241e40593
3691 (Original authors Ondřej Surý, Ondřej Caletka and Daniel Black) 1976Author: djm@openbsd.org <djm@openbsd.org>
3692 - djm@cvs.openbsd.org 2012/06/01 00:49:35 1977Date: Mon Dec 22 02:15:52 2014 +0000
3693 [PROTOCOL.mux] 1978
3694 correct types of port numbers (integers, not strings); bz#2004 from 1979 upstream commit
3695 bert.wesarg AT googlemail.com 1980
3696 - djm@cvs.openbsd.org 2012/06/01 01:01:22 1981 adjust for new SHA256 key fingerprints and
3697 [mux.c] 1982 slightly-different MD5 hex fingerprint format
3698 fix memory leak when mux socket creation fails; bz#2002 from bert.wesarg 1983
3699 AT googlemail.com 1984commit 6b40567ed722df98593ad8e6a2d2448fc2b4b151
3700 - dtucker@cvs.openbsd.org 2012/06/18 11:43:53 1985Author: djm@openbsd.org <djm@openbsd.org>
3701 [jpake.c] 1986Date: Mon Dec 22 01:14:49 2014 +0000
3702 correct sizeof usage. patch from saw at online.de, ok deraadt 1987
3703 - dtucker@cvs.openbsd.org 2012/06/18 11:49:58 1988 upstream commit
3704 [ssh_config.5] 1989
3705 RSA instead of DSA twice. From Steve.McClellan at radisys com 1990 poll changes to netcat (usr.bin/netcat.c r1.125) broke
3706 - dtucker@cvs.openbsd.org 2012/06/18 12:07:07 1991 this test; fix it by ensuring more stdio fds are sent to devnull
3707 [ssh.1 sshd.8] 1992
3708 Remove mention of 'three' key files since there are now four. From 1993commit a5375ccb970f49dddf7d0ef63c9b713ede9e7260
3709 Steve.McClellan at radisys com. 1994Author: jmc@openbsd.org <jmc@openbsd.org>
3710 - dtucker@cvs.openbsd.org 2012/06/18 12:17:18 1995Date: Sun Dec 21 23:35:14 2014 +0000
3711 [ssh.1] 1996
3712 Clarify description of -W. Noted by Steve.McClellan at radisys com, 1997 upstream commit
3713 ok jmc 1998
3714 - markus@cvs.openbsd.org 2012/06/19 18:25:28 1999 tweak previous;
3715 [servconf.c servconf.h sshd_config.5] 2000
3716 sshd_config: extend Match to allow AcceptEnv and {Allow,Deny}{Users,Groups} 2001commit b79efde5c3badf5ce4312fe608d8307eade533c5
3717 this allows 'Match LocalPort 1022' combined with 'AllowUser bauer' 2002Author: djm@openbsd.org <djm@openbsd.org>
3718 ok djm@ (back in March) 2003Date: Sun Dec 21 23:12:42 2014 +0000
3719 - jmc@cvs.openbsd.org 2012/06/19 21:35:54 2004
3720 [sshd_config.5] 2005 upstream commit
3721 tweak previous; ok markus 2006
3722 - djm@cvs.openbsd.org 2012/06/20 04:42:58 2007 document FingerprintHash here too
3723 [clientloop.c serverloop.c] 2008
3724 initialise accept() backoff timer to avoid EINVAL from select(2) in 2009commit d16bdd8027dd116afa01324bb071a4016cdc1a75
3725 rekeying 2010Author: Damien Miller <djm@mindrot.org>
3726 2011Date: Mon Dec 22 10:18:09 2014 +1100
372720120519 2012
3728 - (dtucker) [configure.ac] bz#2010: fix non-portable shell construct. Patch 2013 missing include for base64 encoding
3729 from cjwatson at debian org. 2014
3730 - (dtucker) [configure.ac contrib/Makefile] bz#1996: use AC_PATH_TOOL to find 2015commit 56d1c83cdd1ac76f1c6bd41e01e80dad834f3994
3731 pkg-config so it does the right thing when cross-compiling. Patch from 2016Author: djm@openbsd.org <djm@openbsd.org>
3732 cjwatson at debian org. 2017Date: Sun Dec 21 22:27:55 2014 +0000
3733- (dtucker) OpenBSD CVS Sync 2018
3734 - dtucker@cvs.openbsd.org 2012/05/13 01:42:32 2019 upstream commit
3735 [servconf.h servconf.c sshd.8 sshd.c auth.c sshd_config.5] 2020
3736 Add "Match LocalAddress" and "Match LocalPort" to sshd and adjust tests 2021 Add FingerprintHash option to control algorithm used for
3737 to match. Feedback and ok djm@ markus@. 2022 key fingerprints. Default changes from MD5 to SHA256 and format from hex to
3738 - dtucker@cvs.openbsd.org 2012/05/19 06:30:30 2023 base64.
3739 [sshd_config.5] 2024
3740 Document PermitOpen none. bz#2001, patch from Loganaden Velvindron 2025 Feedback and ok naddy@ markus@
3741 2026
374220120504 2027commit 058f839fe15c51be8b3a844a76ab9a8db550be4f
3743 - (dtucker) [configure.ac] Include <sys/param.h> rather than <sys/types.h> 2028Author: djm@openbsd.org <djm@openbsd.org>
3744 to fix building on some plaforms. Fom bowman at math utah edu and 2029Date: Thu Dec 18 23:58:04 2014 +0000
3745 des at des no. 2030
3746 2031 upstream commit
374720120427 2032
3748 - (dtucker) [regress/addrmatch.sh] skip tests when running on a non-ipv6 2033 don't count partial authentication success as a failure
3749 platform rather than exiting early, so that we still clean up and return 2034 against MaxAuthTries; ok deraadt@
3750 success or failure to test-exec.sh 2035
3751 2036commit c7219f4f54d64d6dde66dbcf7a2699daa782d2a1
375220120426 2037Author: djm@openbsd.org <djm@openbsd.org>
3753 - (djm) [auth-passwd.c] Handle crypt() returning NULL; from Paul Wouters 2038Date: Fri Dec 12 00:02:17 2014 +0000
3754 via Niels 2039
3755 - (djm) [auth-krb5.c] Save errno across calls that might modify it; 2040 upstream commit
3756 ok dtucker@ 2041
3757 2042 revert chunk I didn't mean to commit yet; via jmc@
375820120423 2043
3759 - OpenBSD CVS Sync 2044commit 7de5991aa3997e2981440f39c1ea01273a0a2c7b
3760 - djm@cvs.openbsd.org 2012/04/23 08:18:17 2045Author: Damien Miller <djm@mindrot.org>
3761 [channels.c] 2046Date: Thu Dec 18 11:44:06 2014 +1100
3762 fix function proto/source mismatch 2047
3763 2048 upstream libc change
376420120422 2049
3765 - OpenBSD CVS Sync 2050 revision 1.2
3766 - djm@cvs.openbsd.org 2012/02/29 11:21:26 2051 date: 2014/12/08 03:45:00; author: bcook; state: Exp; lines: +2 -2; commitid: 7zWEBgJJOCZ2hvTV;
3767 [ssh-keygen.c] 2052 avoid left shift overflow in reallocarray.
3768 allow conversion of RSA1 keys to public PEM and PKCS8; "nice" markus@ 2053
3769 - guenther@cvs.openbsd.org 2012/03/15 03:10:27 2054 Some 64-bit platforms (e.g. Windows 64) have a 32-bit long. So, shifting
3770 [session.c] 2055 1UL 32-bits to the left causes an overflow. This replaces the constant 1UL with
3771 root should always be excluded from the test for /etc/nologin instead 2056 (size_t)1 so that we get the correct constant size for the platform.
3772 of having it always enforced even when marked as ignorenologin. This 2057
3773 regressed when the logic was incompletely flipped around in rev 1.251 2058 discussed with tedu@ & deraadt@
3774 ok halex@ millert@ 2059
3775 - djm@cvs.openbsd.org 2012/03/28 07:23:22 2060commit 2048f85a5e6da8bc6e0532efe02ecfd4e63c978c
3776 [PROTOCOL.certkeys] 2061Author: Damien Miller <djm@mindrot.org>
3777 explain certificate extensions/crit split rationale. Mention requirement 2062Date: Thu Dec 18 10:15:49 2014 +1100
3778 that each appear at most once per cert. 2063
3779 - dtucker@cvs.openbsd.org 2012/03/29 23:54:36 2064 include CFLAGS in gnome askpass targets
3780 [channels.c channels.h servconf.c] 2065
3781 Add PermitOpen none option based on patch from Loganaden Velvindron 2066 from Fedora
3782 (bz #1949). ok djm@ 2067
3783 - djm@cvs.openbsd.org 2012/04/11 13:16:19 2068commit 48b68ce19ca42fa488960028048dec023f7899bb
3784 [channels.c channels.h clientloop.c serverloop.c] 2069Author: djm@openbsd.org <djm@openbsd.org>
3785 don't spin in accept() when out of fds (ENFILE/ENFILE) - back off for a 2070Date: Thu Dec 11 08:20:09 2014 +0000
3786 while; ok deraadt@ markus@ 2071
3787 - djm@cvs.openbsd.org 2012/04/11 13:17:54 2072 upstream commit
3788 [auth.c] 2073
3789 Support "none" as an argument for AuthorizedPrincipalsFile to indicate 2074 explicitly include sys/param.h in files that use the
3790 no file should be read. 2075 howmany() macro; from portable
3791 - djm@cvs.openbsd.org 2012/04/11 13:26:40 2076
3792 [sshd.c] 2077commit d663bea30a294d440fef4398e5cd816317bd4518
3793 don't spin in accept() when out of fds (ENFILE/ENFILE) - back off for a 2078Author: djm@openbsd.org <djm@openbsd.org>
3794 while; ok deraadt@ markus@ 2079Date: Thu Dec 11 05:25:06 2014 +0000
3795 - djm@cvs.openbsd.org 2012/04/11 13:34:17 2080
3796 [ssh-keyscan.1 ssh-keyscan.c] 2081 upstream commit
3797 now that sshd defaults to offering ECDSA keys, ssh-keyscan should also 2082
3798 look for them by default; bz#1971 2083 mention AuthorizedKeysCommandUser must be set for
3799 - djm@cvs.openbsd.org 2012/04/12 02:42:32 2084 AuthorizedKeysCommand to be run; bz#2287
3800 [servconf.c servconf.h sshd.c sshd_config sshd_config.5] 2085
3801 VersionAddendum option to allow server operators to append some arbitrary 2086commit 17bf3d81e00f2abb414a4fd271118cf4913f049f
3802 text to the SSH-... banner; ok deraadt@ "don't care" markus@ 2087Author: djm@openbsd.org <djm@openbsd.org>
3803 - djm@cvs.openbsd.org 2012/04/12 02:43:55 2088Date: Thu Dec 11 05:13:28 2014 +0000
3804 [sshd_config sshd_config.5] 2089
3805 mention AuthorizedPrincipalsFile=none default 2090 upstream commit
3806 - djm@cvs.openbsd.org 2012/04/20 03:24:23 2091
3807 [sftp.c] 2092 show in debug output which hostkeys are being tried when
3808 setlinebuf(3) is more readable than setvbuf(.., _IOLBF, ...) 2093 attempting hostbased auth; patch from Iain Morgan
3809 - jmc@cvs.openbsd.org 2012/04/20 16:26:22 2094
3810 [ssh.1] 2095commit da0277e3717eadf5b15e03379fc29db133487e94
3811 use "brackets" instead of "braces", for consistency; 2096Author: djm@openbsd.org <djm@openbsd.org>
3812 2097Date: Thu Dec 11 04:16:14 2014 +0000
381320120420 2098
3814 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec] 2099 upstream commit
3815 [contrib/suse/openssh.spec] Update for release 6.0 2100
3816 - (djm) [README] Update URL to release notes. 2101 Make manual reflect reality: sftp-server's -d option
3817 - (djm) Release openssh-6.0 2102 accepts a "%d" option, not a "%h" one.
2103
2104 bz#2316; reported by Kirk Wolf
2105
2106commit 4cf87f4b81fa9380bce5fcff7b0f8382ae3ad996
2107Author: djm@openbsd.org <djm@openbsd.org>
2108Date: Wed Dec 10 01:24:09 2014 +0000
2109
2110 upstream commit
2111
2112 better error value for invalid signature length
2113
2114commit 4bfad14ca56f8ae04f418997816b4ba84e2cfc3c
2115Author: Darren Tucker <dtucker@zip.com.au>
2116Date: Wed Dec 10 02:12:51 2014 +1100
2117
2118 Resync more with OpenBSD's rijndael.c, in particular "#if 0"-ing out some
2119 unused code. Should fix compile error reported by plautrba at redhat.
2120
2121commit 642652d280499691c8212ec6b79724b50008ce09
2122Author: Darren Tucker <dtucker@zip.com.au>
2123Date: Wed Dec 10 01:32:23 2014 +1100
2124
2125 Add reallocarray to compat library
2126
2127commit 3dfd8d93dfcc69261f5af99df56f3ff598581979
2128Author: djm@openbsd.org <djm@openbsd.org>
2129Date: Thu Dec 4 22:31:50 2014 +0000
2130
2131 upstream commit
2132
2133 add tests for new client RevokedHostKeys option; refactor
2134 to make it a bit more readable
2135
2136commit a31046cad1aed16a0b55171192faa6d02665ccec
2137Author: krw@openbsd.org <krw@openbsd.org>
2138Date: Wed Nov 19 13:35:37 2014 +0000
2139
2140 upstream commit
2141
2142 Nuke yet more obvious #include duplications.
2143
2144 ok deraadt@
2145
2146commit a7c762e5b2c1093542c0bc1df25ccec0b4cf479f
2147Author: djm@openbsd.org <djm@openbsd.org>
2148Date: Thu Dec 4 20:47:36 2014 +0000
2149
2150 upstream commit
2151
2152 key_in_file() wrapper is no longer used
2153
2154commit 5e39a49930d885aac9c76af3129332b6e772cd75
2155Author: djm@openbsd.org <djm@openbsd.org>
2156Date: Thu Dec 4 02:24:32 2014 +0000
2157
2158 upstream commit
2159
2160 add RevokedHostKeys option for the client
2161
2162 Allow textfile or KRL-based revocation of hostkeys.
2163
2164commit 74de254bb92c684cf53461da97f52d5ba34ded80
2165Author: djm@openbsd.org <djm@openbsd.org>
2166Date: Thu Dec 4 01:49:59 2014 +0000
2167
2168 upstream commit
2169
2170 convert KRL code to new buffer API
2171
2172 ok markus@
2173
2174commit db995f2eed5fc432598626fa3e30654503bf7151
2175Author: millert@openbsd.org <millert@openbsd.org>
2176Date: Wed Nov 26 18:34:51 2014 +0000
2177
2178 upstream commit
2179
2180 Prefer setvbuf() to setlinebuf() for portability; ok
2181 deraadt@
2182
2183commit 72bba3d179ced8b425272efe6956a309202a91f3
2184Author: jsg@openbsd.org <jsg@openbsd.org>
2185Date: Mon Nov 24 03:39:22 2014 +0000
2186
2187 upstream commit
2188
2189 Fix crashes in the handling of the sshd config file found
2190 with the afl fuzzer.
2191
2192 ok deraadt@ djm@
2193
2194commit 867f49c666adcfe92bf539d9c37c1accdea08bf6
2195Author: Damien Miller <djm@mindrot.org>
2196Date: Wed Nov 26 13:22:41 2014 +1100
2197
2198 Avoid Cygwin ssh-host-config reading /etc/group
2199
2200 Patch from Corinna Vinschen
2201
2202commit 8b66f36291a721b1ba7c44f24a07fdf39235593e
2203Author: Damien Miller <djm@mindrot.org>
2204Date: Wed Nov 26 13:20:35 2014 +1100
2205
2206 allow custom service name for sshd on Cygwin
2207
2208 Permits the use of multiple sshd running with different service names.
2209
2210 Patch by Florian Friesdorf via Corinna Vinschen
2211
2212commit 08c0eebf55d70a9ae1964399e609288ae3186a0c
2213Author: jmc@openbsd.org <jmc@openbsd.org>
2214Date: Sat Nov 22 19:21:03 2014 +0000
2215
2216 upstream commit
2217
2218 restore word zapped in previous, and remove some useless
2219 "No" macros;
2220
2221commit a1418a0033fba43f061513e992e1cbcc3343e563
2222Author: deraadt@openbsd.org <deraadt@openbsd.org>
2223Date: Sat Nov 22 18:15:41 2014 +0000
2224
2225 upstream commit
2226
2227 /dev/random has created the same effect as /dev/arandom
2228 (and /dev/urandom) for quite some time. Mop up the last few, by using
2229 /dev/random where we actually want it, or not even mentioning arandom where
2230 it is irrelevant.
2231
2232commit b6de5ac9ed421362f479d1ad4fa433d2e25dad5b
2233Author: djm@openbsd.org <djm@openbsd.org>
2234Date: Fri Nov 21 01:00:38 2014 +0000
2235
2236 upstream commit
2237
2238 fix NULL pointer dereference crash on invalid timestamp
2239
2240 found using Michal Zalewski's afl fuzzer
2241
2242commit a1f8110cd5ed818d59b3a2964fab7de76e92c18e
2243Author: mikeb@openbsd.org <mikeb@openbsd.org>
2244Date: Tue Nov 18 22:38:48 2014 +0000
2245
2246 upstream commit
2247
2248 Sync AES code to the one shipped in OpenSSL/LibreSSL.
2249
2250 This includes a commit made by Andy Polyakov <appro at openssl ! org>
2251 to the OpenSSL source tree on Wed, 28 Jun 2006 with the following
2252 message: "Mitigate cache-collision timing attack on last round."
2253
2254 OK naddy, miod, djm
2255
2256commit 335c83d5f35d8620e16b8aa26592d4f836e09ad2
2257Author: krw@openbsd.org <krw@openbsd.org>
2258Date: Tue Nov 18 20:54:28 2014 +0000
2259
2260 upstream commit
2261
2262 Nuke more obvious #include duplications.
2263
2264 ok deraadt@ millert@ tedu@
2265
2266commit 51b64e44121194ae4bf153dee391228dada2abcb
2267Author: djm@openbsd.org <djm@openbsd.org>
2268Date: Mon Nov 17 00:21:40 2014 +0000
2269
2270 upstream commit
2271
2272 fix KRL generation when multiple CAs are in use
2273
2274 We would generate an invalid KRL when revoking certs by serial
2275 number for multiple CA keys due to a section being written out
2276 twice.
2277
2278 Also extend the regress test to catch this case by having it
2279 produce a multi-CA KRL.
2280
2281 Reported by peter AT pean.org
2282
2283commit d2d51003a623e21fb2b25567c4878d915e90aa2a
2284Author: djm@openbsd.org <djm@openbsd.org>
2285Date: Tue Nov 18 01:02:25 2014 +0000
2286
2287 upstream commit
2288
2289 fix NULL pointer dereference crash in key loading
2290
2291 found by Michal Zalewski's AFL fuzzer
2292
2293commit 9f9fad0191028edc43d100d0ded39419b6895fdf
2294Author: djm@openbsd.org <djm@openbsd.org>
2295Date: Mon Nov 17 00:21:40 2014 +0000
2296
2297 upstream commit
2298
2299 fix KRL generation when multiple CAs are in use
2300
2301 We would generate an invalid KRL when revoking certs by serial
2302 number for multiple CA keys due to a section being written out
2303 twice.
2304
2305 Also extend the regress test to catch this case by having it
2306 produce a multi-CA KRL.
2307
2308 Reported by peter AT pean.org
2309
2310commit da8af83d3f7ec00099963e455010e0ed1d7d0140
2311Author: bentley@openbsd.org <bentley@openbsd.org>
2312Date: Sat Nov 15 14:41:03 2014 +0000
2313
2314 upstream commit
2315
2316 Reduce instances of `` '' in manuals.
2317
2318 troff displays these as typographic quotes, but nroff implementations
2319 almost always print them literally, which rarely has the intended effect
2320 with modern fonts, even in stock xterm.
2321
2322 These uses of `` '' can be replaced either with more semantic alternatives
2323 or with Dq, which prints typographic quotes in a UTF-8 locale (but will
2324 automatically fall back to `` '' in an ASCII locale).
2325
2326 improvements and ok schwarze@
2327
2328commit fc302561369483bb755b17f671f70fb894aec01d
2329Author: djm@openbsd.org <djm@openbsd.org>
2330Date: Mon Nov 10 22:25:49 2014 +0000
2331
2332 upstream commit
2333
2334 mux-related manual tweaks
2335
2336 mention ControlPersist=0 is the same as ControlPersist=yes
2337
2338 recommend that ControlPath sockets be placed in a og-w directory
2339
2340commit 0e4cff5f35ed11102fe3783779960ef07e0cd381
2341Author: Damien Miller <djm@google.com>
2342Date: Wed Nov 5 11:01:31 2014 +1100
2343
2344 Prepare scripts for next Cygwin release
2345
2346 Makes the Cygwin-specific ssh-user-config script independent of the
2347 existence of /etc/passwd. The next Cygwin release will allow to
2348 generate passwd and group entries from the Windows account DBs, so the
2349 scripts have to adapt.
2350
2351 from Corinna Vinschen
2352
2353commit 7d0ba5336651731949762eb8877ce9e3b52df436
2354Author: Damien Miller <djm@mindrot.org>
2355Date: Thu Oct 30 10:45:41 2014 +1100
2356
2357 include version number in OpenSSL-too-old error
2358
2359commit 3bcb92e04d9207e9f78d82f7918c6d3422054ce9
2360Author: lteo@openbsd.org <lteo@openbsd.org>
2361Date: Fri Oct 24 02:01:20 2014 +0000
2362
2363 upstream commit
2364
2365 Remove unnecessary include: netinet/in_systm.h is not needed
2366 by these programs.
2367
2368 NB. skipped for portable
2369
2370 ok deraadt@ millert@
2371
2372commit 6fdcaeb99532e28a69f1a1599fbd540bb15b70a0
2373Author: djm@openbsd.org <djm@openbsd.org>
2374Date: Mon Oct 20 03:43:01 2014 +0000
2375
2376 upstream commit
2377
2378 whitespace
2379
2380commit 165bc8786299e261706ed60342985f9de93a7461
2381Author: daniel@openbsd.org <daniel@openbsd.org>
2382Date: Tue Oct 14 03:09:59 2014 +0000
2383
2384 upstream commit
2385
2386 plug a memory leak; from Maxime Villard.
2387
2388 ok djm@
2389
2390commit b1ba15f3885947c245c2dbfaad0a04ba050abea0
2391Author: jmc@openbsd.org <jmc@openbsd.org>
2392Date: Thu Oct 9 06:21:31 2014 +0000
2393
2394 upstream commit
2395
2396 tweak previous;
2397
2398commit 259a02ebdf74ad90b41d116ecf70aa823fa4c6e7
2399Author: djm@openbsd.org <djm@openbsd.org>
2400Date: Mon Oct 13 00:38:35 2014 +0000
2401
2402 upstream commit
2403
2404 whitespace
2405
2406commit 957fbceb0f3166e41b76fdb54075ab3b9cc84cba
2407Author: djm@openbsd.org <djm@openbsd.org>
2408Date: Wed Oct 8 22:20:25 2014 +0000
2409
2410 upstream commit
2411
2412 Tweak config reparsing with host canonicalisation
2413
2414 Make the second pass through the config files always run when
2415 hostname canonicalisation is enabled.
2416
2417 Add a "Match canonical" criteria that allows ssh_config Match
2418 blocks to trigger only in the second config pass.
2419
2420 Add a -G option to ssh that causes it to parse its configuration
2421 and dump the result to stdout, similar to "sshd -T"
2422
2423 Allow ssh_config Port options set in the second config parse
2424 phase to be applied (they were being ignored).
2425
2426 bz#2267 bz#2286; ok markus
2427
2428commit 5c0dafd38bf66feeeb45fa0741a5baf5ad8039ba
2429Author: djm@openbsd.org <djm@openbsd.org>
2430Date: Wed Oct 8 22:15:27 2014 +0000
2431
2432 upstream commit
2433
2434 another -Wpointer-sign from clang
2435
2436commit bb005dc815ebda9af3ae4b39ca101c4da918f835
2437Author: djm@openbsd.org <djm@openbsd.org>
2438Date: Wed Oct 8 22:15:06 2014 +0000
2439
2440 upstream commit
2441
2442 fix a few -Wpointer-sign warnings from clang
2443
2444commit 3cc1fbb4fb0e804bfb873fd363cea91b27fc8188
2445Author: djm@openbsd.org <djm@openbsd.org>
2446Date: Wed Oct 8 21:45:48 2014 +0000
2447
2448 upstream commit
2449
2450 parse cert sections using nested buffers to reduce
2451 copies; ok markus
2452
2453commit 4a45922aebf99164e2fc83d34fe55b11ae1866ef
2454Author: djm@openbsd.org <djm@openbsd.org>
2455Date: Mon Oct 6 00:47:15 2014 +0000
2456
2457 upstream commit
2458
2459 correct options in usage(); from mancha1 AT zoho.com
2460
2461commit 48dffd5bebae6fed0556dc5c36cece0370690618
2462Author: djm@openbsd.org <djm@openbsd.org>
2463Date: Tue Sep 9 09:45:36 2014 +0000
2464
2465 upstream commit
2466
2467 mention permissions on tun(4) devices in PermitTunnel
2468 documentation; bz#2273
2469
2470commit a5883d4eccb94b16c355987f58f86a7dee17a0c2
2471Author: djm@openbsd.org <djm@openbsd.org>
2472Date: Wed Sep 3 18:55:07 2014 +0000
2473
2474 upstream commit
2475
2476 tighten permissions on pty when the "tty" group does
2477 not exist; pointed out by Corinna Vinschen; ok markus
2478
2479commit 180bcb406b58bf30723c01a6b010e48ee626dda8
2480Author: sobrado@openbsd.org <sobrado@openbsd.org>
2481Date: Sat Aug 30 16:32:25 2014 +0000
2482
2483 upstream commit
2484
2485 typo.
2486
2487commit f70b22bcdd52f6bf127047b3584371e6e5d45627
2488Author: sobrado@openbsd.org <sobrado@openbsd.org>
2489Date: Sat Aug 30 15:33:50 2014 +0000
2490
2491 upstream commit
2492
2493 improve capitalization for the Ed25519 public-key
2494 signature system.
2495
2496 ok djm@
2497
2498commit 7df8818409c752cf3f0c3f8044fe9aebed8647bd
2499Author: doug@openbsd.org <doug@openbsd.org>
2500Date: Thu Aug 21 01:08:52 2014 +0000
2501
2502 upstream commit
2503
2504 Free resources on error in mkstemp and fdopen
2505
2506 ok djm@
2507
2508commit 40ba4c9733aaed08304714faeb61529f18da144b
2509Author: deraadt@openbsd.org <deraadt@openbsd.org>
2510Date: Wed Aug 20 01:28:55 2014 +0000
2511
2512 upstream commit
2513
2514 djm how did you make a typo like that...
2515
2516commit 57d378ec9278ba417a726f615daad67d157de666
2517Author: djm@openbsd.org <djm@openbsd.org>
2518Date: Tue Aug 19 23:58:28 2014 +0000
2519
2520 upstream commit
2521
2522 When dumping the server configuration (sshd -T), print
2523 correct KEX, MAC and cipher defaults. Spotted by Iain Morgan
2524
2525commit 7ff880ede5195d0b17e7f1e3b6cfbc4cb6f85240
2526Author: djm@openbsd.org <djm@openbsd.org>
2527Date: Tue Aug 19 23:57:18 2014 +0000
2528
2529 upstream commit
2530
2531 ~-expand lcd paths
2532
2533commit 4460a7ad0c78d4cd67c467f6e9f4254d0404ed59
2534Author: Damien Miller <djm@mindrot.org>
2535Date: Sun Oct 12 12:35:48 2014 +1100
2536
2537 remove duplicated KEX_DH1 entry
2538
2539commit c9b8426a616138d0d762176c94f51aff3faad5ff
2540Author: Damien Miller <djm@mindrot.org>
2541Date: Thu Oct 9 10:34:06 2014 +1100
2542
2543 remove ChangeLog file
2544
2545 Commit logs will be generated from git at release time.
2546
2547commit 81d18ff7c93a04affbf3903e0963859763219aed
2548Author: Damien Miller <djm@google.com>
2549Date: Tue Oct 7 21:24:25 2014 +1100
2550
2551 delete contrib/caldera directory
2552
2553commit 0ec9e87d3638206456968202f05bb5123670607a
2554Author: Damien Miller <djm@google.com>
2555Date: Tue Oct 7 19:57:27 2014 +1100
2556
2557 test commit
2558
2559commit 8fb65a44568701b779f3d77326bceae63412d28d
2560Author: Damien Miller <djm@mindrot.org>
2561Date: Tue Oct 7 09:21:49 2014 +1100
2562
2563 - (djm) Release OpenSSH-6.7
2564
2565commit e8c9f2602c46f6781df5e52e6cd8413dab4602a3
2566Author: Damien Miller <djm@mindrot.org>
2567Date: Fri Oct 3 09:24:56 2014 +1000
2568
2569 - (djm) [sshd_config.5] typo; from Iain Morgan
2570
2571commit 703b98a26706f5083801d11059486d77491342ae
2572Author: Damien Miller <djm@mindrot.org>
2573Date: Wed Oct 1 09:43:07 2014 +1000
2574
2575 - (djm) [openbsd-compat/Makefile.in openbsd-compat/kludge-fd_set.c]
2576 [openbsd-compat/openbsd-compat.h] Kludge around bad glibc
2577 _FORTIFY_SOURCE check that doesn't grok heap-allocated fd_sets;
2578 ok dtucker@
2579
2580commit 0fa0ed061bbfedb0daa705e220748154a84c3413
2581Author: Damien Miller <djm@mindrot.org>
2582Date: Wed Sep 10 08:15:34 2014 +1000
2583
2584 - (djm) [sandbox-seccomp-filter.c] Allow mremap and exit for DietLibc;
2585 patch from Felix von Leitner; ok dtucker
2586
2587commit ad7d23d461c3b7e1dcb15db13aee5f4b94dc1a95
2588Author: Darren Tucker <dtucker@zip.com.au>
2589Date: Tue Sep 9 12:23:10 2014 +1000
2590
2591 20140908
2592 - (dtucker) [INSTALL] Update info about egd. ok djm@
2593
2594commit 2a8699f37cc2515e3bc60e0c677ba060f4d48191
2595Author: Damien Miller <djm@mindrot.org>
2596Date: Thu Sep 4 03:46:05 2014 +1000
2597
2598 - (djm) [openbsd-compat/arc4random.c] Zero seed after keying PRNG
2599
2600commit 44988defb1f5e3afe576d86000365e1f07a1b494
2601Author: Damien Miller <djm@mindrot.org>
2602Date: Wed Sep 3 05:35:32 2014 +1000
2603
2604 - (djm) [contrib/cygwin/ssh-host-config] Fix old code leading to
2605 permissions/ACLs; from Corinna Vinschen
2606
2607commit 23f269562b7537b2f6f5014e50a25e5dcc55a837
2608Author: Damien Miller <djm@mindrot.org>
2609Date: Wed Sep 3 05:33:25 2014 +1000
2610
2611 - (djm) [defines.h sshbuf.c] Move __predict_true|false to defines.h and
2612 conditionalise to avoid duplicate definition.
2613
2614commit 41c8de2c0031cf59e7cf0c06b5bcfbf4852c1fda
2615Author: Damien Miller <djm@mindrot.org>
2616Date: Sat Aug 30 16:23:06 2014 +1000
2617
2618 - (djm) [Makefile.in] Make TEST_SHELL a variable; "good idea" tim@
2619
2620commit d7c81e216a7bd9eed6e239c970d9261bb1651947
2621Author: Damien Miller <djm@mindrot.org>
2622Date: Sat Aug 30 04:18:28 2014 +1000
2623
2624 - (djm) [openbsd-compat/openssl-compat.h] add include guard
2625
2626commit 4687802dda57365b984b897fc3c8e2867ea09b22
2627Author: Damien Miller <djm@mindrot.org>
2628Date: Sat Aug 30 03:29:19 2014 +1000
2629
2630 - (djm) [misc.c] Missing newline between functions
2631
2632commit 51c77e29220dee87c53be2dc47092934acab26fe
2633Author: Damien Miller <djm@mindrot.org>
2634Date: Sat Aug 30 02:30:30 2014 +1000
2635
2636 - (djm) [openbsd-compat/openssl-compat.h] add
2637 OPENSSL_[RD]SA_MAX_MODULUS_BITS defines for OpenSSL that lacks them
2638
2639commit 3d673d103bad35afaec6e7ef73e5277216ce33a3
2640Author: Damien Miller <djm@mindrot.org>
2641Date: Wed Aug 27 06:32:01 2014 +1000
2642
2643 - (djm) [openbsd-compat/explicit_bzero.c] implement explicit_bzero()
2644 using memset_s() where possible; improve fallback to indirect bzero
2645 via a volatile pointer to give it more of a chance to avoid being
2646 optimised away.
2647
2648commit 146218ac11a1eb0dcade6f793d7acdef163b5ddc
2649Author: Damien Miller <djm@mindrot.org>
2650Date: Wed Aug 27 04:11:55 2014 +1000
2651
2652 - (djm) [monitor.c sshd.c] SIGXFSZ needs to be ignored in postauth
2653 monitor, not preauth; bz#2263
2654
2655commit 1b215c098b3b37e38aa4e4c91bb908eee41183b1
2656Author: Damien Miller <djm@mindrot.org>
2657Date: Wed Aug 27 04:04:40 2014 +1000
2658
2659 - (djm) [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c]
2660 [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c]
2661 [regress/unittests/sshkey/common.c]
2662 [regress/unittests/sshkey/test_file.c]
2663 [regress/unittests/sshkey/test_fuzz.c]
2664 [regress/unittests/sshkey/test_sshkey.c] Don't include openssl/ec.h
2665 on !ECC OpenSSL systems
2666
2667commit ad013944af0a19e3f612089d0099bb397cf6502d
2668Author: Damien Miller <djm@mindrot.org>
2669Date: Tue Aug 26 09:27:28 2014 +1000
2670
2671 - (djm) [INSTALL] Recommend libcrypto be built -fPIC, mention LibreSSL,
2672 update OpenSSL version requirement.
2673
2674commit ed126de8ee04c66640a0ea2697c4aaf36801f100
2675Author: Damien Miller <djm@mindrot.org>
2676Date: Tue Aug 26 08:37:47 2014 +1000
2677
2678 - (djm) [bufec.c] Skip this file on !ECC OpenSSL
2679
2680commit 9c1dede005746864a4fdb36a7cdf6c51296ca909
2681Author: Damien Miller <djm@mindrot.org>
2682Date: Sun Aug 24 03:01:06 2014 +1000
2683
2684 - (djm) [sftp-server.c] Some systems (e.g. Irix) have prctl() but not
2685 PR_SET_DUMPABLE, so adjust ifdef; reported by Tom Christensen
2686
2687commit d244a5816fd1312a33404b436e4dd83594f1119e
2688Author: Damien Miller <djm@mindrot.org>
2689Date: Sat Aug 23 17:06:49 2014 +1000
2690
2691 - (djm) [configure.ac] We now require a working vsnprintf everywhere (not
2692 just for systems that lack asprintf); check for it always and extend
2693 test to catch more brokenness. Fixes builds on Solaris <= 9
2694
2695commit 4cec036362a358e398e6a2e6d19d8e5780558634
2696Author: Damien Miller <djm@mindrot.org>
2697Date: Sat Aug 23 03:11:09 2014 +1000
2698
2699 - (djm) [sshd.c] Ignore SIGXFSZ in preauth monitor child; can explode on
2700 lastlog writing on platforms with high UIDs; bz#2263
2701
2702commit 394a60f2598d28b670d934b93942a3370b779b39
2703Author: Damien Miller <djm@mindrot.org>
2704Date: Fri Aug 22 18:06:20 2014 +1000
2705
2706 - (djm) [configure.ac] double braces to appease autoconf
2707
2708commit 4d69aeabd6e60afcdc7cca177ca751708ab79a9d
2709Author: Damien Miller <djm@mindrot.org>
2710Date: Fri Aug 22 17:48:27 2014 +1000
2711
2712 - (djm) [openbsd-compat/bsd-snprintf.c] Fix compilation failure (prototype/
2713 definition mismatch) and warning for broken/missing snprintf case.
2714
2715commit 0c11f1ac369d2c0aeb0ab0458a7cd04c72fe5e9e
2716Author: Damien Miller <djm@mindrot.org>
2717Date: Fri Aug 22 17:36:56 2014 +1000
2718
2719 - (djm) [sshbuf-getput-crypto.c] Fix compilation when OpenSSL lacks ECC
2720
2721commit 6d62784b8973340b251fea6b04890f471adf28db
2722Author: Damien Miller <djm@mindrot.org>
2723Date: Fri Aug 22 17:36:19 2014 +1000
2724
2725 - (djm) [configure.ac] include leading zero characters in OpenSSL version
2726 number; fixes test for unsupported versions
2727
2728commit 4f1ff1ed782117f5d5204d4e91156ed5da07cbb7
2729Author: Damien Miller <djm@mindrot.org>
2730Date: Thu Aug 21 15:54:50 2014 +1000
2731
2732 - (djm) [regress/unittests/test_helper/test_helper.c] Fix for systems that
2733 don't set __progname. Diagnosed by Tom Christensen.
2734
2735commit 005a64da0f457410045ef0bfa93c863c2450447d
2736Author: Damien Miller <djm@mindrot.org>
2737Date: Thu Aug 21 10:48:41 2014 +1000
2738
2739 - (djm) [key.h] Fix ifdefs for no-ECC OpenSSL
2740
2741commit aa6598ebb3343c7380e918388e10e8ca5852b613
2742Author: Damien Miller <djm@mindrot.org>
2743Date: Thu Aug 21 10:47:54 2014 +1000
2744
2745 - (djm) [Makefile.in] fix reference to libtest_helper.a in sshkey test too.
2746
2747commit 54703e3cf63f0c80d4157e5ad7dbc2b363ee2c56
2748Author: Damien Miller <djm@mindrot.org>
2749Date: Wed Aug 20 11:10:51 2014 +1000
2750
2751 - (djm) [contrib/cygwin/README] Correct build instructions; from Corinna
2752
2753commit f0935698f0461f24d8d1f1107b476ee5fd4db1cb
2754Author: Damien Miller <djm@mindrot.org>
2755Date: Wed Aug 20 11:06:50 2014 +1000
2756
2757 - (djm) [sshkey.h] Fix compilation when OpenSSL lacks ECC
2758
2759commit c5089ecaec3b2c02f014f4e67518390702a4ba14
2760Author: Damien Miller <djm@mindrot.org>
2761Date: Wed Aug 20 11:06:20 2014 +1000
2762
2763 - (djm) [Makefile.in] refer to libtest_helper.a by explicit path rather than
2764 -L/-l; fixes linking problems on some platforms
2765
2766commit 2195847e503a382f83ee969b0a8bd3dfe0e55c18
2767Author: Damien Miller <djm@mindrot.org>
2768Date: Wed Aug 20 11:05:03 2014 +1000
2769
2770 - (djm) [configure.ac] Check OpenSSL version is supported at configure time;
2771 suggested by Kevin Brott
2772
2773commit a75aca1bbc989aa9f8b1b08489d37855f3d24d1a
2774Author: Damien Miller <djm@mindrot.org>
2775Date: Tue Aug 19 11:36:07 2014 +1000
2776
2777 - (djm) [INSTALL contrib/caldera/openssh.spec contrib/cygwin/README]
2778 [contrib/redhat/openssh.spec contrib/suse/openssh.spec] Remove mentions
2779 of TCP wrappers.
2780
2781commit 3f022b5a9477abceeb1bbeab04b055f3cc7ca8f6
2782Author: Damien Miller <djm@mindrot.org>
2783Date: Tue Aug 19 11:32:34 2014 +1000
2784
2785 - (djm) [ssh-dss.c] Include openssl/dsa.h for DSA_SIG
2786
2787commit 88137902632aceb923990e98cf5dc923bb3ef2f5
2788Author: Damien Miller <djm@mindrot.org>
2789Date: Tue Aug 19 11:28:11 2014 +1000
2790
2791 - (djm) [sshbuf.h] Fix compilation on systems without OPENSSL_HAS_ECC.
2792
2793commit 2f3d1e7fb2eabd3cfbfd8d0f7bdd2f9a1888690b
2794Author: Damien Miller <djm@mindrot.org>
2795Date: Tue Aug 19 11:14:36 2014 +1000
2796
2797 - (djm) [myproposal.h] Make curve25519 KEX dependent on
2798 HAVE_EVP_SHA256 instead of OPENSSL_HAS_ECC.
2799
2800commit d4e7d59d01a6c7f59e8c1f94a83c086e9a33d8aa
2801Author: Damien Miller <djm@mindrot.org>
2802Date: Tue Aug 19 11:14:17 2014 +1000
2803
2804 - (djm) [serverloop.c] Fix syntax error on Cygwin; from Corinna Vinschen
2805
2806commit 9eaeea2cf2b6af5f166cfa9ad3c7a90711a147a9
2807Author: Damien Miller <djm@mindrot.org>
2808Date: Sun Aug 10 11:35:05 2014 +1000
2809
2810 - (djm) [README contrib/caldera/openssh.spec]
2811 [contrib/redhat/openssh.spec contrib/suse/openssh.spec] Update versions
2812
2813commit f8988fbef0c9801d19fa2f8f4f041690412bec37
2814Author: Damien Miller <djm@mindrot.org>
2815Date: Fri Aug 1 13:31:52 2014 +1000
2816
2817 - (djm) [regress/multiplex.sh] Use -d (detach stdin) flag to disassociate
2818 nc from stdin, it's more portable
2819
2820commit 5b3879fd4b7a4e3d43bab8f40addda39bc1169d0
2821Author: Damien Miller <djm@mindrot.org>
2822Date: Fri Aug 1 12:28:31 2014 +1000
2823
2824 - (djm) [regress/multiplex.sh] Instruct nc not to quit as soon as stdin
2825 is closed; avoid regress failures when stdin is /dev/null
2826
2827commit a9c46746d266f8a1b092a72b2150682d1af8ebfc
2828Author: Damien Miller <djm@mindrot.org>
2829Date: Fri Aug 1 12:26:49 2014 +1000
2830
2831 - (djm) [regress/multiplex.sh] Skip test for non-OpenBSD netcat. We need
2832 a better solution, but this will have to do for now.
2833
2834commit 426117b2e965e43f47015942b5be8dd88fe74b88
2835Author: Damien Miller <djm@mindrot.org>
2836Date: Wed Jul 30 12:33:20 2014 +1000
2837
2838 - schwarze@cvs.openbsd.org 2014/07/28 15:40:08
2839 [sftp-server.8 sshd_config.5]
2840 some systems no longer need /dev/log;
2841 issue noticed by jirib;
2842 ok deraadt
2843
2844commit f497794b6962eaf802ab4ac2a7b22ae591cca1d5
2845Author: Damien Miller <djm@mindrot.org>
2846Date: Wed Jul 30 12:32:46 2014 +1000
2847
2848 - dtucker@cvs.openbsd.org 2014/07/25 21:22:03
2849 [ssh-agent.c]
2850 Clear buffer used for handling messages. This prevents keys being
2851 left in memory after they have been expired or deleted in some cases
2852 (but note that ssh-agent is setgid so you would still need root to
2853 access them). Pointed out by Kevin Burns, ok deraadt
2854
2855commit a8a0f65c57c8ecba94d65948e9090da54014dfef
2856Author: Damien Miller <djm@mindrot.org>
2857Date: Wed Jul 30 12:32:28 2014 +1000
2858
2859 - OpenBSD CVS Sync
2860 - millert@cvs.openbsd.org 2014/07/24 22:57:10
2861 [ssh.1]
2862 Mention UNIX-domain socket forwarding too. OK jmc@ deraadt@
2863
2864commit 56b840f2b81e14a2f95c203403633a72566736f8
2865Author: Damien Miller <djm@mindrot.org>
2866Date: Fri Jul 25 08:11:30 2014 +1000
2867
2868 - (djm) [regress/multiplex.sh] restore incorrectly deleted line;
2869 pointed out by Christian Hesse
2870
2871commit dd417b60d5ca220565d1014e92b7f8f43dc081eb
2872Author: Darren Tucker <dtucker@zip.com.au>
2873Date: Wed Jul 23 10:41:21 2014 +1000
2874
2875 - dtucker@cvs.openbsd.org 2014/07/22 23:35:38
2876 [regress/unittests/sshkey/testdata/*]
2877 Regenerate test keys with certs signed with ed25519 instead of ecdsa.
2878 These can be used in -portable on platforms that don't support ECDSA.
2879
2880commit 40e50211896369dba8f64f3b5e5fd58b76f5ac3f
2881Author: Darren Tucker <dtucker@zip.com.au>
2882Date: Wed Jul 23 10:35:45 2014 +1000
2883
2884 - dtucker@cvs.openbsd.org 2014/07/22 23:57:40
2885 [regress/unittests/sshkey/mktestdata.sh]
2886 Add $OpenBSD tag to make syncs easier
2887
2888commit 07e644251e809b1d4c062cf85bd1146a7e3f5a8a
2889Author: Darren Tucker <dtucker@zip.com.au>
2890Date: Wed Jul 23 10:34:26 2014 +1000
2891
2892 - dtucker@cvs.openbsd.org 2014/07/22 23:23:22
2893 [regress/unittests/sshkey/mktestdata.sh]
2894 Sign test certs with ed25519 instead of ecdsa so that they'll work in
2895 -portable on platforms that don't have ECDSA in their OpenSSL. ok djm
2896
2897commit cea099a7c4eaecb01b001e5453bb4e5c25006c22
2898Author: Darren Tucker <dtucker@zip.com.au>
2899Date: Wed Jul 23 10:04:02 2014 +1000
2900
2901 - djm@cvs.openbsd.org 2014/07/22 01:32:12
2902 [regress/multiplex.sh]
2903 change the test for still-open Unix domain sockets to be robust against
2904 nc implementations that produce error messages. from -portable
2905 (Id sync only)
2906
2907commit 31eb78078d349b32ea41952ecc944b3ad6cb0d45
2908Author: Darren Tucker <dtucker@zip.com.au>
2909Date: Wed Jul 23 09:43:42 2014 +1000
2910
2911 - guenther@cvs.openbsd.org 2014/07/22 07:13:42
2912 [umac.c]
2913 Convert from <sys/endian.h> to the shiney new <endian.h>
2914 ok dtucker@, who also confirmed that -portable handles this already
2915 (ID sync only, includes.h pulls in endian.h if available.)
2916
2917commit 820763efef2d19d965602533036c2b4badc9d465
2918Author: Darren Tucker <dtucker@zip.com.au>
2919Date: Wed Jul 23 09:40:46 2014 +1000
2920
2921 - dtucker@cvs.openbsd.org 2014/07/22 01:18:50
2922 [key.c]
2923 Prevent spam from key_load_private_pem during hostbased auth. ok djm@
2924
2925commit c4ee219a66f3190fa96cbd45b4d11015685c6306
2926Author: Darren Tucker <dtucker@zip.com.au>
2927Date: Wed Jul 23 04:27:50 2014 +1000
2928
2929 - (dtucker) [regress/unittests/sshkey/test_{file,fuzz,sshkey}.c] Wrap ecdsa-
2930 specific tests inside OPENSSL_HAS_ECC.
2931
2932commit 04f4824940ea3edd60835416ececbae16438968a
2933Author: Damien Miller <djm@mindrot.org>
2934Date: Tue Jul 22 11:31:47 2014 +1000
2935
2936 - (djm) [regress/multiplex.sh] change the test for still-open Unix
2937 domain sockets to be robust against nc implementations that produce
2938 error messages.
2939
2940commit 5ea4fe00d55453aaa44007330bb4c3181bd9b796
2941Author: Damien Miller <djm@mindrot.org>
2942Date: Tue Jul 22 09:39:19 2014 +1000
2943
2944 - (djm) [regress/multiplex.sh] ssh mux master lost -N somehow;
2945 put it back
2946
2947commit 948a1774a79a85f9deba6d74db95f402dee32c69
2948Author: Darren Tucker <dtucker@zip.com.au>
2949Date: Tue Jul 22 01:07:11 2014 +1000
2950
2951 - (dtucker) [sshkey.c] ifdef out unused variable when compiling without
2952 OPENSSL_HAS_ECC.
2953
2954commit c8f610f6cc57ae129758052439d9baf13699097b
2955Author: Damien Miller <djm@mindrot.org>
2956Date: Mon Jul 21 10:23:27 2014 +1000
2957
2958 - (djm) [regress/multiplex.sh] Not all netcat accept the -N option.
2959
2960commit 0e4e95566cd95c887f69272499b8f3880b3ec0f5
2961Author: Damien Miller <djm@mindrot.org>
2962Date: Mon Jul 21 09:52:54 2014 +1000
2963
2964 - millert@cvs.openbsd.org 2014/07/15 15:54:15
2965 [forwarding.sh multiplex.sh]
2966 Add support for Unix domain socket forwarding. A remote TCP port
2967 may be forwarded to a local Unix domain socket and vice versa or
2968 both ends may be a Unix domain socket. This is a reimplementation
2969 of the streamlocal patches by William Ahern from:
2970 http://www.25thandclement.com/~william/projects/streamlocal.html
2971 OK djm@ markus@
2972
2973commit 93a87ab27ecdc709169fb24411133998f81e2761
2974Author: Darren Tucker <dtucker@zip.com.au>
2975Date: Mon Jul 21 06:30:25 2014 +1000
2976
2977 - (dtucker) [regress/unittests/sshkey/
2978 {common,test_file,test_fuzz,test_sshkey}.c] Wrap stdint.h includes in
2979 ifdefs.
2980
2981commit 5573171352ea23df2dc6d2fe0324d023b7ba697c
2982Author: Darren Tucker <dtucker@zip.com.au>
2983Date: Mon Jul 21 02:24:59 2014 +1000
2984
2985 - (dtucker) [cipher.c openbsd-compat/openssl-compat.h] Restore the bits
2986 needed to build AES CTR mode against OpenSSL 0.9.8f and above. ok djm
2987
2988commit 74e28682711d005026c7c8f15f96aea9d3c8b5a3
2989Author: Tim Rice <tim@multitalents.net>
2990Date: Fri Jul 18 20:00:11 2014 -0700
2991
2992 - (tim) [openbsd-compat/port-uw.c] Include misc.h for fwd_opts, used
2993 in servconf.h.
2994
2995commit d1a0421f8e5e933fee6fb58ee6b9a22c63c8a613
2996Author: Darren Tucker <dtucker@zip.com.au>
2997Date: Sat Jul 19 07:23:55 2014 +1000
2998
2999 - (dtucker) [key.c sshkey.c] Put new ecdsa bits inside ifdef OPENSSL_HAS_ECC.
3000
3001commit f0fe9ea1be62227c130b317769de3d1e736b6dc1
3002Author: Darren Tucker <dtucker@zip.com.au>
3003Date: Sat Jul 19 06:33:12 2014 +1000
3004
3005 - (dtucker) [Makefile.in] Add a t-exec target to run just the executable
3006 tests.
3007
3008commit 450bc1180d4b061434a4b733c5c8814fa30b022b
3009Author: Darren Tucker <dtucker@zip.com.au>
3010Date: Sat Jul 19 06:23:18 2014 +1000
3011
3012 - (dtucker) [auth2-gss.c gss-serv-krb5.c] Include misc.h for fwd_opts, used
3013 in servconf.h.
3014
3015commit ab2ec586baad122ed169285c31927ccf58bc7b28
3016Author: Damien Miller <djm@mindrot.org>
3017Date: Fri Jul 18 15:04:47 2014 +1000
3018
3019 - djm@cvs.openbsd.org 2014/07/18 02:46:01
3020 [ssh-agent.c]
3021 restore umask around listener socket creation (dropped in streamlocal patch
3022 merge)
3023
3024commit 357610d15946381ae90c271837dcdd0cdce7145f
3025Author: Damien Miller <djm@mindrot.org>
3026Date: Fri Jul 18 15:04:10 2014 +1000
3027
3028 - djm@cvs.openbsd.org 2014/07/17 07:22:19
3029 [mux.c ssh.c]
3030 reflect stdio-forward ("ssh -W host:port ...") failures in exit status.
3031 previously we were always returning 0. bz#2255 reported by Brendan
3032 Germain; ok dtucker
3033
3034commit dad9a4a0b7c2b5d78605f8df28718f116524134e
3035Author: Damien Miller <djm@mindrot.org>
3036Date: Fri Jul 18 15:03:49 2014 +1000
3037
3038 - djm@cvs.openbsd.org 2014/07/17 00:12:03
3039 [key.c]
3040 silence "incorrect passphrase" error spam; reported and ok dtucker@
3041
3042commit f42f7684ecbeec6ce50e0310f80b3d6da2aaf533
3043Author: Damien Miller <djm@mindrot.org>
3044Date: Fri Jul 18 15:03:27 2014 +1000
3045
3046 - djm@cvs.openbsd.org 2014/07/17 00:10:18
3047 [mux.c]
3048 preserve errno across syscall
3049
3050commit 1b83320628cb0733e3688b85bfe4d388a7c51909
3051Author: Damien Miller <djm@mindrot.org>
3052Date: Fri Jul 18 15:03:02 2014 +1000
3053
3054 - djm@cvs.openbsd.org 2014/07/17 00:10:56
3055 [sandbox-systrace.c]
3056 ifdef SYS_sendsyslog so this will compile without patching on -stable
3057
3058commit 6d57656331bcd754d912950e4a18ad259d596e61
3059Author: Damien Miller <djm@mindrot.org>
3060Date: Fri Jul 18 15:02:06 2014 +1000
3061
3062 - jmc@cvs.openbsd.org 2014/07/16 14:48:57
3063 [ssh.1]
3064 add the streamlocal* options to ssh's -o list; millert says they're
3065 irrelevant for scp/sftp;
3066
3067 ok markus millert
3068
3069commit 7acefbbcbeab725420ea07397ae35992f505f702
3070Author: Damien Miller <djm@mindrot.org>
3071Date: Fri Jul 18 14:11:24 2014 +1000
3072
3073 - millert@cvs.openbsd.org 2014/07/15 15:54:14
3074 [PROTOCOL auth-options.c auth-passwd.c auth-rh-rsa.c auth-rhosts.c]
3075 [auth-rsa.c auth.c auth1.c auth2-hostbased.c auth2-kbdint.c auth2-none.c]
3076 [auth2-passwd.c auth2-pubkey.c auth2.c canohost.c channels.c channels.h]
3077 [clientloop.c misc.c misc.h monitor.c mux.c packet.c readconf.c]
3078 [readconf.h servconf.c servconf.h serverloop.c session.c ssh-agent.c]
3079 [ssh.c ssh_config.5 sshconnect.c sshconnect1.c sshconnect2.c sshd.c]
3080 [sshd_config.5 sshlogin.c]
3081 Add support for Unix domain socket forwarding. A remote TCP port
3082 may be forwarded to a local Unix domain socket and vice versa or
3083 both ends may be a Unix domain socket. This is a reimplementation
3084 of the streamlocal patches by William Ahern from:
3085 http://www.25thandclement.com/~william/projects/streamlocal.html
3086 OK djm@ markus@
3087
3088commit 6262d760e00714523633bd989d62e273a3dca99a
3089Author: Damien Miller <djm@mindrot.org>
3090Date: Thu Jul 17 09:52:07 2014 +1000
3091
3092 - tedu@cvs.openbsd.org 2014/07/11 13:54:34
3093 [myproposal.h]
3094 by popular demand, add back hamc-sha1 to server proposal for better compat
3095 with many clients still in use. ok deraadt
3096
3097commit 9d69d937b46ecba17f16d923e538ceda7b705c7a
3098Author: Damien Miller <djm@mindrot.org>
3099Date: Thu Jul 17 09:49:37 2014 +1000
3100
3101 - deraadt@cvs.openbsd.org 2014/07/11 08:09:54
3102 [sandbox-systrace.c]
3103 Permit use of SYS_sendsyslog from inside the sandbox. Clock is ticking,
3104 update your kernels and sshd soon.. libc will start using sendsyslog()
3105 in about 4 days.
3106
3107commit f6293a0b4129826fc2e37e4062f96825df43c326
3108Author: Damien Miller <djm@mindrot.org>
3109Date: Thu Jul 17 09:01:25 2014 +1000
3110
3111 - (djm) [digest-openssl.c] Preserve array order when disabling digests.
3112 Reported by Petr Lautrbach.
3113
3114commit 00f9cd230709c04399ef5ff80492d70a55230694
3115Author: Damien Miller <djm@mindrot.org>
3116Date: Tue Jul 15 10:41:38 2014 +1000
3117
3118 - (djm) [configure.ac] Delay checks for arc4random* until after libcrypto
3119 has been located; fixes builds agains libressl-portable
3120
3121commit 1d0df3249c87019556b83306c28d4769375c2edc
3122Author: Damien Miller <djm@mindrot.org>
3123Date: Fri Jul 11 09:19:04 2014 +1000
3124
3125 - OpenBSD CVS Sync
3126 - benno@cvs.openbsd.org 2014/07/09 14:15:56
3127 [ssh-add.c]
3128 fix ssh-add crash while loading more than one key
3129 ok markus@
3130
3131commit 7a57eb3d105aa4ced15fb47001092c58811e6d9d
3132Author: Damien Miller <djm@mindrot.org>
3133Date: Wed Jul 9 13:22:31 2014 +1000
3134
3135 - djm@cvs.openbsd.org 2014/07/07 08:15:26
3136 [multiplex.sh]
3137 remove forced-fatal that I stuck in there to test the new cleanup
3138 logic and forgot to remove...
3139
3140commit 612f965239a30fe536b11ece1834d9f470aeb029
3141Author: Damien Miller <djm@mindrot.org>
3142Date: Wed Jul 9 13:22:03 2014 +1000
3143
3144 - djm@cvs.openbsd.org 2014/07/06 07:42:03
3145 [multiplex.sh test-exec.sh]
3146 add a hook to the cleanup() function to kill $SSH_PID if it is set
3147
3148 use it to kill the mux master started in multiplex.sh (it was being left
3149 around on fatal failures)
3150
3151commit d0bb950485ba121e43a77caf434115ed6417b46f
3152Author: Damien Miller <djm@mindrot.org>
3153Date: Wed Jul 9 13:07:28 2014 +1000
3154
3155 - djm@cvs.openbsd.org 2014/07/09 03:02:15
3156 [key.c]
3157 downgrade more error() to debug() to better match what old authfile.c
3158 did; suppresses spurious errors with hostbased authentication enabled
3159
3160commit 0070776a038655c57f57e70cd05e4c38a5de9d84
3161Author: Damien Miller <djm@mindrot.org>
3162Date: Wed Jul 9 13:07:06 2014 +1000
3163
3164 - djm@cvs.openbsd.org 2014/07/09 01:45:10
3165 [sftp.c]
3166 more useful error message when GLOB_NOSPACE occurs;
3167 bz#2254, patch from Orion Poplawski
3168
3169commit 079bac2a43c74ef7cf56850afbab3b1932534c50
3170Author: Damien Miller <djm@mindrot.org>
3171Date: Wed Jul 9 13:06:25 2014 +1000
3172
3173 - djm@cvs.openbsd.org 2014/07/07 08:19:12
3174 [ssh_config.5]
3175 mention that ProxyCommand is executed using shell "exec" to avoid
3176 a lingering process; bz#1977
3177
3178commit 3a48cc090096cf99b9de592deb5f90e444edebfb
3179Author: Damien Miller <djm@mindrot.org>
3180Date: Sun Jul 6 09:32:49 2014 +1000
3181
3182 - djm@cvs.openbsd.org 2014/07/05 23:11:48
3183 [channels.c]
3184 fix remote-forward cancel regression; ok markus@
3185
3186commit 48bae3a38cb578713e676708164f6e7151cc64fa
3187Author: Damien Miller <djm@mindrot.org>
3188Date: Sun Jul 6 09:27:06 2014 +1000
3189
3190 - djm@cvs.openbsd.org 2014/07/03 23:18:35
3191 [authfile.h]
3192 remove leakmalloc droppings
3193
3194commit 72e6b5c9ed5e72ca3a6ccc3177941b7c487a0826
3195Author: Damien Miller <djm@mindrot.org>
3196Date: Fri Jul 4 09:00:04 2014 +1000
3197
3198 - djm@cvs.openbsd.org 2014/07/03 22:40:43
3199 [servconf.c servconf.h session.c sshd.8 sshd_config.5]
3200 Add a sshd_config PermitUserRC option to control whether ~/.ssh/rc is
3201 executed, mirroring the no-user-rc authorized_keys option;
3202 bz#2160; ok markus@
3203
3204commit 602943d1179a08dfa70af94f62296ea5e3d6ebb8
3205Author: Damien Miller <djm@mindrot.org>
3206Date: Fri Jul 4 08:59:41 2014 +1000
3207
3208 - djm@cvs.openbsd.org 2014/07/03 22:33:41
3209 [channels.c]
3210 allow explicit ::1 and 127.0.0.1 forwarding bind addresses when
3211 GatewayPorts=no; allows client to choose address family;
3212 bz#2222 ok markus@
3213
3214commit 6b37fbb7921d156b31e2c8f39d9e1b6746c34983
3215Author: Damien Miller <djm@mindrot.org>
3216Date: Fri Jul 4 08:59:24 2014 +1000
3217
3218 - djm@cvs.openbsd.org 2014/07/03 22:23:46
3219 [sshconnect.c]
3220 when rekeying, skip file/DNS lookup if it is the same as the key sent
3221 during initial key exchange. bz#2154 patch from Iain Morgan; ok markus@
3222
3223commit d2c3cd5f2e47ee24cf7093ce8e948c2e79dfc3fd
3224Author: Damien Miller <djm@mindrot.org>
3225Date: Fri Jul 4 08:59:01 2014 +1000
3226
3227 - jsing@cvs.openbsd.org 2014/07/03 12:42:16
3228 [cipher-chachapoly.c]
3229 Call chacha_ivsetup() immediately before chacha_encrypt_bytes() - this
3230 makes it easier to verify that chacha_encrypt_bytes() is only called once
3231 per chacha_ivsetup() call.
3232 ok djm@
3233
3234commit 686feb560ec43a06ba04da82b50f3c183c947309
3235Author: Damien Miller <djm@mindrot.org>
3236Date: Thu Jul 3 21:29:38 2014 +1000
3237
3238 - djm@cvs.openbsd.org 2014/07/03 11:16:55
3239 [auth.c auth.h auth1.c auth2.c]
3240 make the "Too many authentication failures" message include the
3241 user, source address, port and protocol in a format similar to the
3242 authentication success / failure messages; bz#2199, ok dtucker
3243
3244commit 0f12341402e18fd9996ec23189b9418d2722453f
3245Author: Damien Miller <djm@mindrot.org>
3246Date: Thu Jul 3 21:28:09 2014 +1000
3247
3248 - jmc@cvs.openbsd.org 2014/07/03 07:45:27
3249 [ssh_config.5]
3250 escape %C since groff thinks it part of an Rs/Re block;
3251
3252commit 9c38643c5cd47a19db2cc28279dcc28abadc22b3
3253Author: Damien Miller <djm@mindrot.org>
3254Date: Thu Jul 3 21:27:46 2014 +1000
3255
3256 - djm@cvs.openbsd.org 2014/07/03 06:39:19
3257 [ssh.c ssh_config.5]
3258 Add a %C escape sequence for LocalCommand and ControlPath that expands
3259 to a unique identifer based on a has of the tuple of (local host,
3260 remote user, hostname, port).
3261
3262 Helps avoid exceeding sockaddr_un's miserly pathname limits for mux
3263 control paths.
3264
3265 bz#2220, based on patch from mancha1 AT zoho.com; ok markus@
3266
3267commit 49d9bfe2b2f3e90cc158a215dffa7675e57e7830
3268Author: Damien Miller <djm@mindrot.org>
3269Date: Thu Jul 3 21:26:42 2014 +1000
3270
3271 - djm@cvs.openbsd.org 2014/07/03 05:38:17
3272 [ssh.1]
3273 document that -g will only work in the multiplexed case if applied to
3274 the mux master
3275
3276commit ef9f13ba4c58057b2166d1f2e790535da402fbe5
3277Author: Damien Miller <djm@mindrot.org>
3278Date: Thu Jul 3 21:26:21 2014 +1000
3279
3280 - djm@cvs.openbsd.org 2014/07/03 05:32:36
3281 [ssh_config.5]
3282 mention '%%' escape sequence in HostName directives and how it may
3283 be used to specify IPv6 link-local addresses
3284
3285commit e6a407789e5432dd2e53336fb73476cc69048c54
3286Author: Damien Miller <djm@mindrot.org>
3287Date: Thu Jul 3 21:25:03 2014 +1000
3288
3289 - djm@cvs.openbsd.org 2014/07/03 04:36:45
3290 [digest.h]
3291 forward-declare struct sshbuf so consumers don't need to include sshbuf.h
3292
3293commit 4a1d3d50f02d0a8a4ef95ea4749293cbfb89f919
3294Author: Damien Miller <djm@mindrot.org>
3295Date: Thu Jul 3 21:24:40 2014 +1000
3296
3297 - djm@cvs.openbsd.org 2014/07/03 03:47:27
3298 [ssh-keygen.c]
3299 When hashing or removing hosts using ssh-keygen, don't choke on
3300 @revoked markers and don't remove @cert-authority markers;
3301 bz#2241, reported by mlindgren AT runelind.net
3302
3303commit e5c0d52ceb575c3db8c313e0b1aa3845943d7ba8
3304Author: Damien Miller <djm@mindrot.org>
3305Date: Thu Jul 3 21:24:19 2014 +1000
3306
3307 - djm@cvs.openbsd.org 2014/07/03 03:34:09
3308 [gss-serv.c session.c ssh-keygen.c]
3309 standardise on NI_MAXHOST for gethostname() string lengths; about
3310 1/2 the cases were using it already. Fixes bz#2239 en passant
3311
3312commit c174a3b7c14e0d178c61219de2aa1110e209950c
3313Author: Damien Miller <djm@mindrot.org>
3314Date: Thu Jul 3 21:23:24 2014 +1000
3315
3316 - djm@cvs.openbsd.org 2014/07/03 03:26:43
3317 [digest-openssl.c]
3318 use EVP_Digest() for one-shot hash instead of creating, updating,
3319 finalising and destroying a context.
3320 bz#2231, based on patch from Timo Teras
3321
3322commit d7ca2cd31ecc4d63a055e2dcc4bf35c13f2db4c5
3323Author: Damien Miller <djm@mindrot.org>
3324Date: Thu Jul 3 21:23:01 2014 +1000
3325
3326 - djm@cvs.openbsd.org 2014/07/03 03:15:01
3327 [ssh-add.c]
3328 make stdout line-buffered; saves partial output getting lost when
3329 ssh-add fatal()s part-way through (e.g. when listing keys from an
3330 agent that supports key types that ssh-add doesn't);
3331 bz#2234, reported by Phil Pennock
3332
3333commit b1e967c8d7c7578dd0c172d85b3046cf54ea42ba
3334Author: Damien Miller <djm@mindrot.org>
3335Date: Thu Jul 3 21:22:40 2014 +1000
3336
3337 - djm@cvs.openbsd.org 2014/07/03 03:11:03
3338 [ssh-agent.c]
3339 Only cleanup agent socket in the main agent process and not in any
3340 subprocesses it may have started (e.g. forked askpass). Fixes
3341 agent sockets being zapped when askpass processes fatal();
3342 bz#2236 patch from Dmitry V. Levin
3343
3344commit 61e28e55c3438d796b02ef878bcd28620d452670
3345Author: Damien Miller <djm@mindrot.org>
3346Date: Thu Jul 3 21:22:22 2014 +1000
3347
3348 - djm@cvs.openbsd.org 2014/07/03 01:45:38
3349 [sshkey.c]
3350 make Ed25519 keys' title fit properly in the randomart border; bz#2247
3351 based on patch from Christian Hesse
3352
3353commit 9eb4cd9a32c32d40d36450b68ed93badc6a94c68
3354Author: Damien Miller <djm@mindrot.org>
3355Date: Thu Jul 3 13:29:50 2014 +1000
3356
3357 - (djm) [monitor_fdpass.c] Use sys/poll.h if poll.h doesn't exist;
3358 bz#2237
3359
3360commit 8da0fa24934501909408327298097b1629b89eaa
3361Author: Damien Miller <djm@mindrot.org>
3362Date: Thu Jul 3 11:54:19 2014 +1000
3363
3364 - (djm) [digest-openssl.c configure.ac] Disable RIPEMD160 if libcrypto
3365 doesn't support it.
3366
3367commit 81309c857dd0dbc0a1245a16d621c490ad48cfbb
3368Author: Damien Miller <djm@mindrot.org>
3369Date: Wed Jul 2 17:45:55 2014 +1000
3370
3371 - (djm) [regress/Makefile] fix execution of sshkey unit/fuzz test
3372
3373commit 82b2482ce68654815ee049b9bf021bb362a35ff2
3374Author: Damien Miller <djm@mindrot.org>
3375Date: Wed Jul 2 17:43:41 2014 +1000
3376
3377 - (djm) [sshkey.c] Conditionalise inclusion of util.h
3378
3379commit dd8b1dd7933eb6f5652641b0cdced34a387f2e80
3380Author: Damien Miller <djm@mindrot.org>
3381Date: Wed Jul 2 17:38:31 2014 +1000
3382
3383 - djm@cvs.openbsd.org 2014/06/24 01:14:17
3384 [Makefile.in regress/Makefile regress/unittests/Makefile]
3385 [regress/unittests/sshkey/Makefile]
3386 [regress/unittests/sshkey/common.c]
3387 [regress/unittests/sshkey/common.h]
3388 [regress/unittests/sshkey/mktestdata.sh]
3389 [regress/unittests/sshkey/test_file.c]
3390 [regress/unittests/sshkey/test_fuzz.c]
3391 [regress/unittests/sshkey/test_sshkey.c]
3392 [regress/unittests/sshkey/tests.c]
3393 [regress/unittests/sshkey/testdata/dsa_1]
3394 [regress/unittests/sshkey/testdata/dsa_1-cert.fp]
3395 [regress/unittests/sshkey/testdata/dsa_1-cert.pub]
3396 [regress/unittests/sshkey/testdata/dsa_1.fp]
3397 [regress/unittests/sshkey/testdata/dsa_1.fp.bb]
3398 [regress/unittests/sshkey/testdata/dsa_1.param.g]
3399 [regress/unittests/sshkey/testdata/dsa_1.param.priv]
3400 [regress/unittests/sshkey/testdata/dsa_1.param.pub]
3401 [regress/unittests/sshkey/testdata/dsa_1.pub]
3402 [regress/unittests/sshkey/testdata/dsa_1_pw]
3403 [regress/unittests/sshkey/testdata/dsa_2]
3404 [regress/unittests/sshkey/testdata/dsa_2.fp]
3405 [regress/unittests/sshkey/testdata/dsa_2.fp.bb]
3406 [regress/unittests/sshkey/testdata/dsa_2.pub]
3407 [regress/unittests/sshkey/testdata/dsa_n]
3408 [regress/unittests/sshkey/testdata/dsa_n_pw]
3409 [regress/unittests/sshkey/testdata/ecdsa_1]
3410 [regress/unittests/sshkey/testdata/ecdsa_1-cert.fp]
3411 [regress/unittests/sshkey/testdata/ecdsa_1-cert.pub]
3412 [regress/unittests/sshkey/testdata/ecdsa_1.fp]
3413 [regress/unittests/sshkey/testdata/ecdsa_1.fp.bb]
3414 [regress/unittests/sshkey/testdata/ecdsa_1.param.curve]
3415 [regress/unittests/sshkey/testdata/ecdsa_1.param.priv]
3416 [regress/unittests/sshkey/testdata/ecdsa_1.param.pub]
3417 [regress/unittests/sshkey/testdata/ecdsa_1.pub]
3418 [regress/unittests/sshkey/testdata/ecdsa_1_pw]
3419 [regress/unittests/sshkey/testdata/ecdsa_2]
3420 [regress/unittests/sshkey/testdata/ecdsa_2.fp]
3421 [regress/unittests/sshkey/testdata/ecdsa_2.fp.bb]
3422 [regress/unittests/sshkey/testdata/ecdsa_2.param.curve]
3423 [regress/unittests/sshkey/testdata/ecdsa_2.param.priv]
3424 [regress/unittests/sshkey/testdata/ecdsa_2.param.pub]
3425 [regress/unittests/sshkey/testdata/ecdsa_2.pub]
3426 [regress/unittests/sshkey/testdata/ecdsa_n]
3427 [regress/unittests/sshkey/testdata/ecdsa_n_pw]
3428 [regress/unittests/sshkey/testdata/ed25519_1]
3429 [regress/unittests/sshkey/testdata/ed25519_1-cert.fp]
3430 [regress/unittests/sshkey/testdata/ed25519_1-cert.pub]
3431 [regress/unittests/sshkey/testdata/ed25519_1.fp]
3432 [regress/unittests/sshkey/testdata/ed25519_1.fp.bb]
3433 [regress/unittests/sshkey/testdata/ed25519_1.pub]
3434 [regress/unittests/sshkey/testdata/ed25519_1_pw]
3435 [regress/unittests/sshkey/testdata/ed25519_2]
3436 [regress/unittests/sshkey/testdata/ed25519_2.fp]
3437 [regress/unittests/sshkey/testdata/ed25519_2.fp.bb]
3438 [regress/unittests/sshkey/testdata/ed25519_2.pub]
3439 [regress/unittests/sshkey/testdata/pw]
3440 [regress/unittests/sshkey/testdata/rsa1_1]
3441 [regress/unittests/sshkey/testdata/rsa1_1.fp]
3442 [regress/unittests/sshkey/testdata/rsa1_1.fp.bb]
3443 [regress/unittests/sshkey/testdata/rsa1_1.param.n]
3444 [regress/unittests/sshkey/testdata/rsa1_1.pub]
3445 [regress/unittests/sshkey/testdata/rsa1_1_pw]
3446 [regress/unittests/sshkey/testdata/rsa1_2]
3447 [regress/unittests/sshkey/testdata/rsa1_2.fp]
3448 [regress/unittests/sshkey/testdata/rsa1_2.fp.bb]
3449 [regress/unittests/sshkey/testdata/rsa1_2.param.n]
3450 [regress/unittests/sshkey/testdata/rsa1_2.pub]
3451 [regress/unittests/sshkey/testdata/rsa_1]
3452 [regress/unittests/sshkey/testdata/rsa_1-cert.fp]
3453 [regress/unittests/sshkey/testdata/rsa_1-cert.pub]
3454 [regress/unittests/sshkey/testdata/rsa_1.fp]
3455 [regress/unittests/sshkey/testdata/rsa_1.fp.bb]
3456 [regress/unittests/sshkey/testdata/rsa_1.param.n]
3457 [regress/unittests/sshkey/testdata/rsa_1.param.p]
3458 [regress/unittests/sshkey/testdata/rsa_1.param.q]
3459 [regress/unittests/sshkey/testdata/rsa_1.pub]
3460 [regress/unittests/sshkey/testdata/rsa_1_pw]
3461 [regress/unittests/sshkey/testdata/rsa_2]
3462 [regress/unittests/sshkey/testdata/rsa_2.fp]
3463 [regress/unittests/sshkey/testdata/rsa_2.fp.bb]
3464 [regress/unittests/sshkey/testdata/rsa_2.param.n]
3465 [regress/unittests/sshkey/testdata/rsa_2.param.p]
3466 [regress/unittests/sshkey/testdata/rsa_2.param.q]
3467 [regress/unittests/sshkey/testdata/rsa_2.pub]
3468 [regress/unittests/sshkey/testdata/rsa_n]
3469 [regress/unittests/sshkey/testdata/rsa_n_pw]
3470 unit and fuzz tests for new key API
3471
3472commit c1dc24b71f087f385b92652b9673f52af64e0428
3473Author: Damien Miller <djm@mindrot.org>
3474Date: Wed Jul 2 17:02:03 2014 +1000
3475
3476 - djm@cvs.openbsd.org 2014/06/24 01:04:43
3477 [regress/krl.sh]
3478 regress test for broken consecutive revoked serial number ranges
3479
3480commit 43d3ed2dd3feca6d0326c7dc82588d2faa115e92
3481Author: Damien Miller <djm@mindrot.org>
3482Date: Wed Jul 2 17:01:08 2014 +1000
3483
3484 - djm@cvs.openbsd.org 2014/05/21 07:04:21
3485 [regress/integrity.sh]
3486 when failing because of unexpected output, show the offending output
3487
3488commit 5a96707ffc8d227c2e7d94fa6b0317f8a152cf4e
3489Author: Damien Miller <djm@mindrot.org>
3490Date: Wed Jul 2 15:38:05 2014 +1000
3491
3492 - djm@cvs.openbsd.org 2014/04/30 05:32:00
3493 [regress/Makefile]
3494 unit tests for new buffer API; including basic fuzz testing
3495 NB. Id sync only.
3496
3497commit 3ff92ba756aee48e4ae3e0aeff7293517b3dd185
3498Author: Damien Miller <djm@mindrot.org>
3499Date: Wed Jul 2 15:33:09 2014 +1000
3500
3501 - djm@cvs.openbsd.org 2014/06/30 12:54:39
3502 [key.c]
3503 suppress spurious error message when loading key with a passphrase;
3504 reported by kettenis@ ok markus@
3505 - djm@cvs.openbsd.org 2014/07/02 04:59:06
3506 [cipher-3des1.c]
3507 fix ssh protocol 1 on the server that regressed with the sshkey change
3508 (sometimes fatal() after auth completed), make file return useful status
3509 codes.
3510 NB. Id sync only for these two. They were bundled into the sshkey merge
3511 above, since it was easier to sync the entire file and then apply
3512 portable-specific changed atop it.
3513
3514commit ec3d0e24a1e46873d80507f5cd8ee6d0d03ac5dc
3515Author: Damien Miller <djm@mindrot.org>
3516Date: Wed Jul 2 15:30:00 2014 +1000
3517
3518 - markus@cvs.openbsd.org 2014/06/27 18:50:39
3519 [ssh-add.c]
3520 fix loading of private keys
3521
3522commit 4b3ed647d5b328cf68e6a8ffbee490d8e0683e82
3523Author: Damien Miller <djm@mindrot.org>
3524Date: Wed Jul 2 15:29:40 2014 +1000
3525
3526 - markus@cvs.openbsd.org 2014/06/27 16:41:56
3527 [channels.c channels.h clientloop.c ssh.c]
3528 fix remote fwding with same listen port but different listen address
3529 with gerhard@, ok djm@
3530
3531commit 9e01ff28664921ce9b6500681333e42fb133b4d0
3532Author: Damien Miller <djm@mindrot.org>
3533Date: Wed Jul 2 15:29:21 2014 +1000
3534
3535 - deraadt@cvs.openbsd.org 2014/06/25 14:16:09
3536 [sshbuf.c]
3537 unblock SIGSEGV before raising it
3538 ok djm
3539
3540commit 1845fe6bda0729e52f4c645137f4fc3070b5438a
3541Author: Damien Miller <djm@mindrot.org>
3542Date: Wed Jul 2 15:29:01 2014 +1000
3543
3544 - djm@cvs.openbsd.org 2014/06/24 02:21:01
3545 [scp.c]
3546 when copying local->remote fails during read, don't send uninitialised
3547 heap to the remote end. Reported by Jann Horn
3548
3549commit 19439e9a2a0ac0b4b3b1210e89695418beb1c883
3550Author: Damien Miller <djm@mindrot.org>
3551Date: Wed Jul 2 15:28:40 2014 +1000
3552
3553 - djm@cvs.openbsd.org 2014/06/24 02:19:48
3554 [ssh.c]
3555 don't fatal() when hostname canonicalisation fails with a
3556 ProxyCommand in use; continue and allow the ProxyCommand to
3557 connect anyway (e.g. to a host with a name outside the DNS
3558 behind a bastion)
3559
3560commit 8668706d0f52654fe64c0ca41a96113aeab8d2b8
3561Author: Damien Miller <djm@mindrot.org>
3562Date: Wed Jul 2 15:28:02 2014 +1000
3563
3564 - djm@cvs.openbsd.org 2014/06/24 01:13:21
3565 [Makefile.in auth-bsdauth.c auth-chall.c auth-options.c auth-rsa.c
3566 [auth2-none.c auth2-pubkey.c authfile.c authfile.h cipher-3des1.c
3567 [cipher-chachapoly.c cipher-chachapoly.h cipher.c cipher.h
3568 [digest-libc.c digest-openssl.c digest.h dns.c entropy.c hmac.h
3569 [hostfile.c key.c key.h krl.c monitor.c packet.c rsa.c rsa.h
3570 [ssh-add.c ssh-agent.c ssh-dss.c ssh-ecdsa.c ssh-ed25519.c
3571 [ssh-keygen.c ssh-pkcs11-client.c ssh-pkcs11-helper.c ssh-pkcs11.c
3572 [ssh-rsa.c sshbuf-misc.c sshbuf.h sshconnect.c sshconnect1.c
3573 [sshconnect2.c sshd.c sshkey.c sshkey.h
3574 [openbsd-compat/openssl-compat.c openbsd-compat/openssl-compat.h]
3575 New key API: refactor key-related functions to be more library-like,
3576 existing API is offered as a set of wrappers.
3577
3578 with and ok markus@
3579
3580 Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
3581 Dempsky and Ron Bowes for a detailed review a few months ago.
3582
3583 NB. This commit also removes portable OpenSSH support for OpenSSL
3584 <0.9.8e.
3585
3586commit 2cd7929250cf9e9f658d70dcd452f529ba08c942
3587Author: Damien Miller <djm@mindrot.org>
3588Date: Wed Jul 2 12:48:30 2014 +1000
3589
3590 - djm@cvs.openbsd.org 2014/06/24 00:52:02
3591 [krl.c]
3592 fix bug in KRL generation: multiple consecutive revoked certificate
3593 serial number ranges could be serialised to an invalid format.
3594
3595 Readers of a broken KRL caused by this bug will fail closed, so no
3596 should-have-been-revoked key will be accepted.
3597
3598commit 99db840ee8dbbd2b3fbc6c45d0ee2f6a65e96898
3599Author: Damien Miller <djm@mindrot.org>
3600Date: Wed Jul 2 12:48:04 2014 +1000
3601
3602 - naddy@cvs.openbsd.org 2014/06/18 15:42:09
3603 [sshbuf-getput-crypto.c]
3604 The ssh_get_bignum functions must accept the same range of bignums
3605 the corresponding ssh_put_bignum functions create. This fixes the
3606 use of 16384-bit RSA keys (bug reported by Eivind Evensen).
3607 ok djm@
3608
3609commit 84a89161a9629239b64171ef3e22ef6a3e462d51
3610Author: Damien Miller <djm@mindrot.org>
3611Date: Wed Jul 2 12:47:48 2014 +1000
3612
3613 - matthew@cvs.openbsd.org 2014/06/18 02:59:13
3614 [sandbox-systrace.c]
3615 Now that we have a dedicated getentropy(2) system call for
3616 arc4random(3), we can disallow __sysctl(2) in OpenSSH's systrace
3617 sandbox.
3618
3619 ok djm
3620
3621commit 51504ceec627c0ad57b9f75585c7b3d277f326be
3622Author: Damien Miller <djm@mindrot.org>
3623Date: Wed Jul 2 12:47:25 2014 +1000
3624
3625 - deraadt@cvs.openbsd.org 2014/06/13 08:26:29
3626 [sandbox-systrace.c]
3627 permit SYS_getentropy
3628 from matthew
3629
3630commit a261b8df59117f7dc52abb3a34b35a40c2c9fa88
3631Author: Tim Rice <tim@multitalents.net>
3632Date: Wed Jun 18 16:17:28 2014 -0700
3633
3634 - (tim) [openssh/session.c] Work around to get chroot sftp working on UnixWare
3635
3636commit 316fac6f18f87262a315c79bcf68b9f92c9337e4
3637Author: Darren Tucker <dtucker@zip.com.au>
3638Date: Tue Jun 17 23:06:07 2014 +1000
3639
3640 - (dtucker) [entropy.c openbsd-compat/openssl-compat.{c,h}
3641 openbsd-compat/regress/{.cvsignore,Makefile.in,opensslvertest.c}]
3642 Move the OpenSSL header/library version test into its own function and add
3643 tests for it. Fix it to allow fix version upgrades (but not downgrades).
3644 Prompted by chl@ via OpenSMTPD (issue #462) and Debian (bug #748150).
3645 ok djm@ chl@
3646
3647commit af665bb7b092a59104db1e65577851cf35b86e32
3648Author: Darren Tucker <dtucker@zip.com.au>
3649Date: Mon Jun 16 22:50:55 2014 +1000
3650
3651 - (dtucker) [defines.h] Fix undef of _PATH_MAILDIR. From rak at debian via
3652 OpenSMTPD and chl@
3653
3654commit f9696566fb41320820f3b257ab564fa321bb3751
3655Author: Darren Tucker <dtucker@zip.com.au>
3656Date: Fri Jun 13 11:06:04 2014 +1000
3657
3658 - (dtucker) [configure.ac] Remove tcpwrappers support, support has already
3659 been removed from sshd.c.
3660
3661commit 5e2b8894b0b24af4ad0a2f7aa33ebf255df7a8bc
3662Author: Tim Rice <tim@multitalents.net>
3663Date: Wed Jun 11 18:31:10 2014 -0700
3664
3665 - (tim) [regress/unittests/test_helper/test_helper.h] Add includes.h for
3666 u_intXX_t types.
3667
3668commit 985ee2cbc3e43bc65827c3c0d4df3faa99160c37
3669Author: Darren Tucker <dtucker@zip.com.au>
3670Date: Thu Jun 12 05:32:29 2014 +1000
3671
3672 - (dtucker) [regress/unittests/sshbuf/*.c regress/unittests/test_helper/*]
3673 Wrap stdlib.h include an ifdef for platforms that don't have it.
3674
3675commit cf5392c2db2bb1dbef9818511d34056404436109
3676Author: Darren Tucker <dtucker@zip.com.au>
3677Date: Thu Jun 12 05:22:49 2014 +1000
3678
3679 - (dtucker) [defines.h] Add va_copy if we don't already have it, taken from
3680 openbsd-compat/bsd-asprintf.c.
3681
3682commit 58538d795e0b662f2f4e5a7193f1204bbe992ddd
3683Author: Darren Tucker <dtucker@zip.com.au>
3684Date: Wed Jun 11 13:39:24 2014 +1000
3685
3686 - (dtucker) [bufaux.c bufbn.c bufec.c buffer.c] Pull in includes.h for
3687 compat stuff, specifically whether or not OpenSSL has ECC.
3688
3689commit eb012ac581fd0abc16ee86ee3a68cf07c8ce4d08
3690Author: Darren Tucker <dtucker@zip.com.au>
3691Date: Wed Jun 11 13:10:00 2014 +1000
3692
3693 - (dtucker) [openbsd-compat/arc4random.c] Use explicit_bzero instead of an
3694 assigment that might get optimized out. ok djm@
3695
3696commit b9609fd86c623d6d440e630f5f9a63295f7aea20
3697Author: Darren Tucker <dtucker@zip.com.au>
3698Date: Wed Jun 11 08:04:02 2014 +1000
3699
3700 - (dtucker) [sshbuf.h] Only declare ECC functions if building without
3701 OpenSSL or if OpenSSL has ECC.
3702
3703commit a54a040f66944c6e8913df8635a01a2327219be9
3704Author: Darren Tucker <dtucker@zip.com.au>
3705Date: Wed Jun 11 07:58:35 2014 +1000
3706
3707 - dtucker@cvs.openbsd.org 2014/06/10 21:46:11
3708 [sshbuf.h]
3709 Group ECC functions together to make things a little easier in -portable.
3710 "doesn't bother me" deraadt@
3711
3712commit 9f92c53bad04a89067756be8198d4ec2d8a08875
3713Author: Darren Tucker <dtucker@zip.com.au>
3714Date: Wed Jun 11 07:57:58 2014 +1000
3715
3716 - djm@cvs.openbsd.org 2014/06/05 22:17:50
3717 [sshconnect2.c]
3718 fix inverted test that caused PKCS#11 keys that were explicitly listed
3719 not to be preferred. Reported by Dirk-Willem van Gulik
3720
3721commit 15c254a25394f96643da2ad0f674acdc51e89856
3722Author: Darren Tucker <dtucker@zip.com.au>
3723Date: Wed Jun 11 07:38:49 2014 +1000
3724
3725 - (dtucker) [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] ifdef
3726 ECC variable too.
3727
3728commit d7af0cc5bf273eeed0897a99420bc26841d07d8f
3729Author: Darren Tucker <dtucker@zip.com.au>
3730Date: Wed Jun 11 07:37:25 2014 +1000
3731
3732 - (dtucker) [myprosal.h] Don't include curve25519-sha256@libssh.org in
3733 the proposal if the version of OpenSSL we're using doesn't support ECC.
3734
3735commit 67508ac2563c33d582be181a3e777c65f549d22f
3736Author: Darren Tucker <dtucker@zip.com.au>
3737Date: Wed Jun 11 06:27:16 2014 +1000
3738
3739 - (dtucker) [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c
3740 regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c] Only do NISTP256
3741 curve tests if OpenSSL has them.
3742
3743commit 6482d90a65459a88c18c925368525855832272b3
3744Author: Damien Miller <djm@mindrot.org>
3745Date: Tue May 27 14:34:42 2014 +1000
3746
3747 - (djm) [configure.ac openbsd-compat/bsd-cygwin_util.c]
3748 [openbsd-compat/bsd-cygwin_util.h] On Cygwin, determine privilege
3749 separation user at runtime, since it may need to be a domain account.
3750 Patch from Corinna Vinschen.
3751
3752commit f9eb5e0734f7a7f6e975809eb54684d2a06a7ffc
3753Author: Damien Miller <djm@mindrot.org>
3754Date: Tue May 27 14:31:58 2014 +1000
3755
3756 - (djm) [contrib/cygwin/ssh-host-config] Updated Cygwin ssh-host-config
3757 from Corinna Vinschen, fixing a number of bugs and preparing for
3758 Cygwin 1.7.30.
3759
3760commit eae88744662e6b149f43ef071657727f1a157d95
3761Author: Damien Miller <djm@mindrot.org>
3762Date: Tue May 27 14:27:02 2014 +1000
3763
3764 - (djm) [cipher.c] Fix merge botch.
3765
3766commit 564b5e253c1d95c26a00e8288f0089a2571661c3
3767Author: Damien Miller <djm@mindrot.org>
3768Date: Thu May 22 08:23:59 2014 +1000
3769
3770 - (djm) [Makefile.in] typo in path
3771
3772commit e84d10302aeaf7a1acb05c451f8718143656856a
3773Author: Damien Miller <djm@mindrot.org>
3774Date: Wed May 21 17:13:36 2014 +1000
3775
3776 revert a diff I didn't mean to commit
3777
3778commit 795b86313f1f1aab9691666c4f2d5dae6e4acd50
3779Author: Damien Miller <djm@mindrot.org>
3780Date: Wed May 21 17:12:53 2014 +1000
3781
3782 - (djm) [misc.c] Use CLOCK_BOOTTIME in preference to CLOCK_MONOTONIC
3783 when it is available. It takes into account time spent suspended,
3784 thereby ensuring timeouts (e.g. for expiring agent keys) fire
3785 correctly. bz#2228 reported by John Haxby
3786
3787commit 18912775cb97c0b1e75e838d3c7d4b56648137b5
3788Author: Damien Miller <djm@mindrot.org>
3789Date: Wed May 21 17:06:46 2014 +1000
3790
3791 - (djm) [commit configure.ac defines.h sshpty.c] don't attempt to use
3792 vhangup on Linux. It doens't work for non-root users, and for them
3793 it just messes up the tty settings.
3794
3795commit 7f1c264d3049cd95234e91970ccb5406e1d15b27
3796Author: Damien Miller <djm@mindrot.org>
3797Date: Thu May 15 18:01:52 2014 +1000
3798
3799 - (djm) [sshbuf.c] need __predict_false
3800
3801commit e7429f2be8643e1100380a8a7389d85cc286c8fe
3802Author: Damien Miller <djm@mindrot.org>
3803Date: Thu May 15 18:01:01 2014 +1000
3804
3805 - (djm) [regress/Makefile Makefile.in]
3806 [regress/unittests/sshbuf/test_sshbuf.c
3807 [regress/unittests/sshbuf/test_sshbuf_fixed.c]
3808 [regress/unittests/sshbuf/test_sshbuf_fuzz.c]
3809 [regress/unittests/sshbuf/test_sshbuf_getput_basic.c]
3810 [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c]
3811 [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c]
3812 [regress/unittests/sshbuf/test_sshbuf_misc.c]
3813 [regress/unittests/sshbuf/tests.c]
3814 [regress/unittests/test_helper/fuzz.c]
3815 [regress/unittests/test_helper/test_helper.c]
3816 Hook new unit tests into the build and "make tests"
3817
3818commit def1de086707b0e6b046fe7e115c60aca0227a99
3819Author: Damien Miller <djm@mindrot.org>
3820Date: Thu May 15 15:17:15 2014 +1000
3821
3822 - (djm) [regress/unittests/Makefile]
3823 [regress/unittests/Makefile.inc]
3824 [regress/unittests/sshbuf/Makefile]
3825 [regress/unittests/sshbuf/test_sshbuf.c]
3826 [regress/unittests/sshbuf/test_sshbuf_fixed.c]
3827 [regress/unittests/sshbuf/test_sshbuf_fuzz.c]
3828 [regress/unittests/sshbuf/test_sshbuf_getput_basic.c]
3829 [regress/unittests/sshbuf/test_sshbuf_getput_crypto.c]
3830 [regress/unittests/sshbuf/test_sshbuf_getput_fuzz.c]
3831 [regress/unittests/sshbuf/test_sshbuf_misc.c]
3832 [regress/unittests/sshbuf/tests.c]
3833 [regress/unittests/test_helper/Makefile]
3834 [regress/unittests/test_helper/fuzz.c]
3835 [regress/unittests/test_helper/test_helper.c]
3836 [regress/unittests/test_helper/test_helper.h]
3837 Import new unit tests from OpenBSD; not yet hooked up to build.
3838
3839commit 167685756fde8bc213a8df2c8e1848e312db0f46
3840Author: Damien Miller <djm@mindrot.org>
3841Date: Thu May 15 15:08:40 2014 +1000
3842
3843 - logan@cvs.openbsd.org 2014/05/04 10:40:59
3844 [connect-privsep.sh]
3845 Remove the Z flag from the list of malloc options as it
3846 was removed from malloc.c 10 days ago.
3847
3848 OK from miod@
3849
3850commit d0b69fe90466920d69c96069312e24b581771bd7
3851Author: Damien Miller <djm@mindrot.org>
3852Date: Thu May 15 15:08:19 2014 +1000
3853
3854 - dtucker@cvs.openbsd.org 2014/05/03 18:46:14
3855 [proxy-connect.sh]
3856 Add tests for with and without compression, with and without privsep.
3857
3858commit edb1af50441d19fb2dd9ccb4d75bf14473fca584
3859Author: Damien Miller <djm@mindrot.org>
3860Date: Thu May 15 15:07:53 2014 +1000
3861
3862 - djm@cvs.openbsd.org 2014/04/21 22:15:37
3863 [dhgex.sh integrity.sh kextype.sh rekey.sh try-ciphers.sh]
3864 repair regress tests broken by server-side default cipher/kex/mac changes
3865 by ensuring that the option under test is included in the server's
3866 algorithm list
3867
3868commit 54343e95c70994695f8842fb22836321350198d3
3869Author: Damien Miller <djm@mindrot.org>
3870Date: Thu May 15 15:07:33 2014 +1000
3871
3872 - djm@cvs.openbsd.org 2014/03/13 20:44:49
3873 [login-timeout.sh]
3874 this test is a sorry mess of race conditions; add another sleep
3875 to avoid a failure on slow machines (at least until I find a
3876 better way)
3877
3878commit e5b9f0f2ee6e133894307e44e862b66426990733
3879Author: Damien Miller <djm@mindrot.org>
3880Date: Thu May 15 14:58:07 2014 +1000
3881
3882 - (djm) [Makefile.in configure.ac sshbuf-getput-basic.c]
3883 [sshbuf-getput-crypto.c sshbuf.c] compilation and portability fixes
3884
3885commit b9c566788a9ebd6a9d466f47a532124f111f0542
3886Author: Damien Miller <djm@mindrot.org>
3887Date: Thu May 15 14:43:37 2014 +1000
3888
3889 - (djm) [configure.ac] Unconditionally define WITH_OPENSSL until we write
3890 portability glue to support building without libcrypto
3891
3892commit 3dc27178b42234b653a32f7a87292d7994045ee3
3893Author: Damien Miller <djm@mindrot.org>
3894Date: Thu May 15 14:37:59 2014 +1000
3895
3896 - logan@cvs.openbsd.org 2014/05/05 07:02:30
3897 [sftp.c]
3898 Zap extra whitespace.
3899
3900 OK from djm@ and dtucker@
3901
3902commit c31a0cd5b31961f01c5b731f62a6cb9d4f767472
3903Author: Damien Miller <djm@mindrot.org>
3904Date: Thu May 15 14:37:39 2014 +1000
3905
3906 - markus@cvs.openbsd.org 2014/05/03 17:20:34
3907 [monitor.c packet.c packet.h]
3908 unbreak compression, by re-init-ing the compression code in the
3909 post-auth child. the new buffer code is more strict, and requires
3910 buffer_init() while the old code was happy after a bzero();
3911 originally from djm@
3912
3913commit 686c7d9ee6f44b2be4128d7860b6b37adaeba733
3914Author: Damien Miller <djm@mindrot.org>
3915Date: Thu May 15 14:37:03 2014 +1000
3916
3917 - djm@cvs.openbsd.org 2014/05/02 03:27:54
3918 [chacha.h cipher-chachapoly.h digest.h hmac.h kex.h kexc25519.c]
3919 [misc.h poly1305.h ssh-pkcs11.c defines.h]
3920 revert __bounded change; it causes way more problems for portable than
3921 it solves; pointed out by dtucker@
3922
3923commit 294c58a007cfb2f3bddc4fc3217e255857ffb9bf
3924Author: Damien Miller <djm@mindrot.org>
3925Date: Thu May 15 14:35:03 2014 +1000
3926
3927 - naddy@cvs.openbsd.org 2014/04/30 19:07:48
3928 [mac.c myproposal.h umac.c]
3929 UMAC can use our local fallback implementation of AES when OpenSSL isn't
3930 available. Glue code straight from Ted Krovetz's original umac.c.
3931 ok markus@
3932
3933commit 05e82c3b963c33048128baf72a6f6b3a1c10b4c1
3934Author: Damien Miller <djm@mindrot.org>
3935Date: Thu May 15 14:33:43 2014 +1000
3936
3937 - djm@cvs.openbsd.org 2014/04/30 05:29:56
3938 [bufaux.c bufbn.c bufec.c buffer.c buffer.h sshbuf-getput-basic.c]
3939 [sshbuf-getput-crypto.c sshbuf-misc.c sshbuf.c sshbuf.h ssherr.c]
3940 [ssherr.h]
3941 New buffer API; the first installment of the conversion/replacement
3942 of OpenSSH's internals to make them usable as a standalone library.
3943
3944 This includes a set of wrappers to make it compatible with the
3945 existing buffer API so replacement can occur incrementally.
3946
3947 With and ok markus@
3948
3949 Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
3950 Dempsky and Ron Bowes for a detailed review.
3951
3952commit 380948180f847a26f2d0c85b4dad3dca2ed2fd8b
3953Author: Damien Miller <djm@mindrot.org>
3954Date: Thu May 15 14:25:18 2014 +1000
3955
3956 - dtucker@cvs.openbsd.org 2014/04/29 20:36:51
3957 [sftp.c]
3958 Don't attempt to append a nul quote char to the filename. Should prevent
3959 fatal'ing with "el_insertstr failed" when there's a single quote char
3960 somewhere in the string. bz#2238, ok markus@
3961
3962commit d7fd8bedd4619a2ec7fd02aae4c4e1db4431ad9f
3963Author: Damien Miller <djm@mindrot.org>
3964Date: Thu May 15 14:24:59 2014 +1000
3965
3966 - dtucker@cvs.openbsd.org 2014/04/29 19:58:50
3967 [sftp.c]
3968 Move nulling of variable next to where it's freed. ok markus@
3969
3970commit 1f0311c7c7d10c94ff7f823de9c5b2ed79368b14
3971Author: Damien Miller <djm@mindrot.org>
3972Date: Thu May 15 14:24:09 2014 +1000
3973
3974 - markus@cvs.openbsd.org 2014/04/29 18:01:49
3975 [auth.c authfd.c authfile.c bufaux.c cipher.c cipher.h hostfile.c]
3976 [kex.c key.c mac.c monitor.c monitor_wrap.c myproposal.h packet.c]
3977 [roaming_client.c ssh-agent.c ssh-keygen.c ssh-keyscan.c ssh-keysign.c]
3978 [ssh-pkcs11.h ssh.c sshconnect.c sshconnect2.c sshd.c]
3979 make compiling against OpenSSL optional (make OPENSSL=no);
3980 reduces algorithms to curve25519, aes-ctr, chacha, ed25519;
3981 allows us to explore further options; with and ok djm
3982
3983commit c5893785564498cea73cb60d2cf199490483e080
3984Author: Damien Miller <djm@mindrot.org>
3985Date: Thu May 15 13:48:49 2014 +1000
3986
3987 - djm@cvs.openbsd.org 2014/04/29 13:10:30
3988 [clientloop.c serverloop.c]
3989 bz#1818 - don't send channel success/failre replies on channels that
3990 have sent a close already; analysis and patch from Simon Tatham;
3991 ok markus@
3992
3993commit 633de33b192d808d87537834c316dc8b75fe1880
3994Author: Damien Miller <djm@mindrot.org>
3995Date: Thu May 15 13:48:26 2014 +1000
3996
3997 - djm@cvs.openbsd.org 2014/04/28 03:09:18
3998 [authfile.c bufaux.c buffer.h channels.c krl.c mux.c packet.c packet.h]
3999 [ssh-keygen.c]
4000 buffer_get_string_ptr's return should be const to remind
4001 callers that futzing with it will futz with the actual buffer
4002 contents
4003
4004commit 15271907843e4ae50dcfc83b3594014cf5e9607b
4005Author: Damien Miller <djm@mindrot.org>
4006Date: Thu May 15 13:47:56 2014 +1000
4007
4008 - djm@cvs.openbsd.org 2014/04/23 12:42:34
4009 [readconf.c]
4010 don't record duplicate IdentityFiles
4011
4012commit 798a02568b13a2e46efebd81f08c8f4bb33a6dc7
4013Author: Damien Miller <djm@mindrot.org>
4014Date: Thu May 15 13:47:37 2014 +1000
4015
4016 - jmc@cvs.openbsd.org 2014/04/22 14:16:30
4017 [sftp.1]
4018 zap eol whitespace;
4019
4020commit d875ff78d2b8436807381051de112f0ebf9b9ae1
4021Author: Damien Miller <djm@mindrot.org>
4022Date: Thu May 15 13:47:15 2014 +1000
4023
4024 - logan@cvs.openbsd.org 2014/04/22 12:42:04
4025 [sftp.1]
4026 Document sftp upload resume.
4027 OK from djm@, with feedback from okan@.
4028
4029commit b15cd7bb097fd80dc99520f45290ef775da1ef19
4030Author: Damien Miller <djm@mindrot.org>
4031Date: Thu May 15 13:46:52 2014 +1000
4032
4033 - logan@cvs.openbsd.org 2014/04/22 10:07:12
4034 [sftp.c]
4035 Sort the sftp command list.
4036 OK from djm@
4037
4038commit d8accc0aa72656ba63d50937165c5ae49db1dcd6
4039Author: Damien Miller <djm@mindrot.org>
4040Date: Thu May 15 13:46:25 2014 +1000
4041
4042 - logan@cvs.openbsd.org 2014/04/21 14:36:16
4043 [sftp-client.c sftp-client.h sftp.c]
4044 Implement sftp upload resume support.
4045 OK from djm@, with input from guenther@, mlarkin@ and
4046 okan@
4047
4048commit 16cd3928a87d20c77b13592a74b60b08621d3ce6
4049Author: Damien Miller <djm@mindrot.org>
4050Date: Thu May 15 13:45:58 2014 +1000
4051
4052 - logan@cvs.openbsd.org 2014/04/20 09:24:26
4053 [dns.c dns.h ssh-keygen.c]
4054 Add support for SSHFP DNS records for ED25519 key types.
4055 OK from djm@
4056
4057commit ec0b67eb3b4e12f296ced1fafa01860c374f7eea
4058Author: Damien Miller <djm@mindrot.org>
4059Date: Thu May 15 13:45:26 2014 +1000
4060
4061 - (djm) [rijndael.c rijndael.h] Sync with newly-ressurected versions ine
4062 OpenBSD
4063
4064commit f028460d0b2e5a584355321015cde69bf6fd933e
4065Author: Darren Tucker <dtucker@zip.com.au>
4066Date: Thu May 1 02:24:35 2014 +1000
4067
4068 - (dtucker) [defines.h] Define __GNUC_PREREQ__ macro if we don't already
4069 have it. Only attempt to use __attribute__(__bounded__) for gcc.
4070
4071commit b628cc4c3e4a842bab5e4584d18c2bc5fa4d0edf
4072Author: Damien Miller <djm@mindrot.org>
4073Date: Sun Apr 20 13:33:58 2014 +1000
4074
4075 - djm@cvs.openbsd.org 2014/04/20 02:49:32
4076 [compat.c]
4077 add a canonical 6.6 + curve25519 bignum fix fake version that I can
4078 recommend people use ahead of the openssh-6.7 release
4079
4080commit 888566913933a802f3a329ace123ebcb7154cf78
4081Author: Damien Miller <djm@mindrot.org>
4082Date: Sun Apr 20 13:33:19 2014 +1000
4083
4084 - djm@cvs.openbsd.org 2014/04/20 02:30:25
4085 [misc.c misc.h umac.c]
4086 use get/put_u32 to load values rather than *((UINT32 *)p) that breaks on
4087 strict-alignment architectures; reported by and ok stsp@
4088
4089commit 16f85cbc7e5139950e6a38317e7c8b368beafa5d
4090Author: Damien Miller <djm@mindrot.org>
4091Date: Sun Apr 20 13:29:28 2014 +1000
4092
4093 - tedu@cvs.openbsd.org 2014/04/19 18:42:19
4094 [ssh.1]
4095 delete .xr to hosts.equiv. there's still an unfortunate amount of
4096 documentation referring to rhosts equivalency in here.
4097
4098commit 69cb24b7356ec3f0fc5ff04a68f98f2c55c766f4
4099Author: Damien Miller <djm@mindrot.org>
4100Date: Sun Apr 20 13:29:06 2014 +1000
4101
4102 - tedu@cvs.openbsd.org 2014/04/19 18:15:16
4103 [sshd.8]
4104 remove some really old rsh references
4105
4106commit 84c1e7bca8c4ceaccf4d5557e39a833585a3c77e
4107Author: Damien Miller <djm@mindrot.org>
4108Date: Sun Apr 20 13:27:53 2014 +1000
4109
4110 - tedu@cvs.openbsd.org 2014/04/19 14:53:48
4111 [ssh-keysign.c sshd.c]
4112 Delete futile calls to RAND_seed. ok djm
4113 NB. Id sync only. This only applies to OpenBSD's libcrypto slashathon
4114
4115commit 0e6b67423b8662f9ca4c92750309e144fd637ef1
4116Author: Damien Miller <djm@mindrot.org>
4117Date: Sun Apr 20 13:27:01 2014 +1000
4118
4119 - djm@cvs.openbsd.org 2014/04/19 05:54:59
4120 [compat.c]
4121 missing wildcard; pointed out by naddy@
4122
4123commit 9395b28223334826837c15e8c1bb4dfb3b0d2ca5
4124Author: Damien Miller <djm@mindrot.org>
4125Date: Sun Apr 20 13:25:30 2014 +1000
4126
4127 - djm@cvs.openbsd.org 2014/04/18 23:52:25
4128 [compat.c compat.h sshconnect2.c sshd.c version.h]
4129 OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connections
4130 using the curve25519-sha256@libssh.org KEX exchange method to fail
4131 when connecting with something that implements the spec properly.
4132
4133 Disable this KEX method when speaking to one of the affected
4134 versions.
4135
4136 reported by Aris Adamantiadis; ok markus@
4137
4138commit 8c492da58f8ceb85cf5f7066f23e26fb813a963d
4139Author: Damien Miller <djm@mindrot.org>
4140Date: Sun Apr 20 13:25:09 2014 +1000
4141
4142 - djm@cvs.openbsd.org 2014/04/16 23:28:12
4143 [ssh-agent.1]
4144 remove the identity files from this manpage - ssh-agent doesn't deal
4145 with them at all and the same information is duplicated in ssh-add.1
4146 (which does deal with them); prodded by deraadt@
4147
4148commit adbfdbbdccc70c9bd70d81ae096db115445c6e26
4149Author: Damien Miller <djm@mindrot.org>
4150Date: Sun Apr 20 13:24:49 2014 +1000
4151
4152 - djm@cvs.openbsd.org 2014/04/16 23:22:45
4153 [bufaux.c]
4154 skip leading zero bytes in buffer_put_bignum2_from_string();
4155 reported by jan AT mojzis.com; ok markus@
4156
4157commit 75c62728dc87af6805696eeb520b9748faa136c8
4158Author: Damien Miller <djm@mindrot.org>
4159Date: Sun Apr 20 13:24:31 2014 +1000
4160
4161 - djm@cvs.openbsd.org 2014/04/12 04:55:53
4162 [sshd.c]
4163 avoid crash at exit: check that pmonitor!=NULL before dereferencing;
4164 bz#2225, patch from kavi AT juniper.net
4165
4166commit 2a328437fb1b0976f2f4522d8645803d5a5d0967
4167Author: Damien Miller <djm@mindrot.org>
4168Date: Sun Apr 20 13:24:01 2014 +1000
4169
4170 - djm@cvs.openbsd.org 2014/04/01 05:32:57
4171 [packet.c]
4172 demote a debug3 to PACKET_DEBUG; ok markus@
4173
4174commit 7d6a9fb660c808882d064e152d6070ffc3844c3f
4175Author: Damien Miller <djm@mindrot.org>
4176Date: Sun Apr 20 13:23:43 2014 +1000
4177
4178 - djm@cvs.openbsd.org 2014/04/01 03:34:10
4179 [sshconnect.c]
4180 When using VerifyHostKeyDNS with a DNSSEC resolver, down-convert any
4181 certificate keys to plain keys and attempt SSHFP resolution.
4182
4183 Prevents a server from skipping SSHFP lookup and forcing a new-hostkey
4184 dialog by offering only certificate keys.
4185
4186 Reported by mcv21 AT cam.ac.uk
4187
4188commit fcd62c0b66b8415405ed0af29c236329eb88cc0f
4189Author: Damien Miller <djm@mindrot.org>
4190Date: Sun Apr 20 13:23:21 2014 +1000
4191
4192 - djm@cvs.openbsd.org 2014/04/01 02:05:27
4193 [ssh-keysign.c]
4194 include fingerprint of key not found
4195 use arc4random_buf() instead of loop+arc4random()
4196
4197commit 43b156cf72f900f88065b0a1c1ebd09ab733ca46
4198Author: Damien Miller <djm@mindrot.org>
4199Date: Sun Apr 20 13:23:03 2014 +1000
4200
4201 - jmc@cvs.openbsd.org 2014/03/31 13:39:34
4202 [ssh-keygen.1]
4203 the text for the -K option was inserted in the wrong place in -r1.108;
4204 fix From: Matthew Clarke
4205
4206commit c1621c84f2dc1279065ab9fde2aa9327af418900
4207Author: Damien Miller <djm@mindrot.org>
4208Date: Sun Apr 20 13:22:46 2014 +1000
4209
4210 - naddy@cvs.openbsd.org 2014/03/28 05:17:11
4211 [ssh_config.5 sshd_config.5]
4212 sync available and default algorithms, improve algorithm list formatting
4213 help from jmc@ and schwarze@, ok deraadt@
4214
4215commit f2719b7c2b8a3b14d778d8a6d8dc729b5174b054
4216Author: Damien Miller <djm@mindrot.org>
4217Date: Sun Apr 20 13:22:18 2014 +1000
4218
4219 - tedu@cvs.openbsd.org 2014/03/26 19:58:37
4220 [sshd.8 sshd.c]
4221 remove libwrap support. ok deraadt djm mfriedl
4222
4223commit 4f40209aa4060b9c066a2f0d9332ace7b8dfb391
4224Author: Damien Miller <djm@mindrot.org>
4225Date: Sun Apr 20 13:21:22 2014 +1000
4226
4227 - djm@cvs.openbsd.org 2014/03/26 04:55:35
4228 [chacha.h cipher-chachapoly.h digest.h hmac.h kex.h kexc25519.c
4229 [misc.h poly1305.h ssh-pkcs11.c]
4230 use __bounded(...) attribute recently added to sys/cdefs.h instead of
4231 longform __attribute__(__bounded(...));
4232
4233 for brevity and a warning free compilation with llvm/clang
4234
4235commit 9235a030ad1b16903fb495d81544e0f7c7449523
4236Author: Damien Miller <djm@mindrot.org>
4237Date: Sun Apr 20 13:17:20 2014 +1000
4238
4239 Three commits in one (since they touch the same heavily-diverged file
4240 repeatedly):
4241
4242 - markus@cvs.openbsd.org 2014/03/25 09:40:03
4243 [myproposal.h]
4244 trimm default proposals.
4245
4246 This commit removes the weaker pre-SHA2 hashes, the broken ciphers
4247 (arcfour), and the broken modes (CBC) from the default configuration
4248 (the patch only changes the default, all the modes are still available
4249 for the config files).
4250
4251 ok djm@, reminded by tedu@ & naddy@ and discussed with many
4252 - deraadt@cvs.openbsd.org 2014/03/26 17:16:26
4253 [myproposal.h]
4254 The current sharing of myproposal[] between both client and server code
4255 makes the previous diff highly unpallatable. We want to go in that
4256 direction for the server, but not for the client. Sigh.
4257 Brought up by naddy.
4258 - markus@cvs.openbsd.org 2014/03/27 23:01:27
4259 [myproposal.h ssh-keyscan.c sshconnect2.c sshd.c]
4260 disable weak proposals in sshd, but keep them in ssh; ok djm@
4261
4262commit 6e1777f592f15f4559728c78204617537b1ac076
4263Author: Damien Miller <djm@mindrot.org>
4264Date: Sun Apr 20 13:02:58 2014 +1000
4265
4266 - tedu@cvs.openbsd.org 2014/03/19 14:42:44
4267 [scp.1]
4268 there is no need for rcp anymore
4269 ok deraadt millert
4270
4271commit eb1b7c514d2a7b1802ccee8cd50e565a4d419887
4272Author: Damien Miller <djm@mindrot.org>
4273Date: Sun Apr 20 13:02:26 2014 +1000
4274
4275 - tedu@cvs.openbsd.org 2014/03/17 19:44:10
4276 [ssh.1]
4277 old descriptions of des and blowfish are old. maybe ok deraadt
4278
4279commit f0858de6e1324ec730752387074b111b8551081e
4280Author: Damien Miller <djm@mindrot.org>
4281Date: Sun Apr 20 13:01:30 2014 +1000
4282
4283 - deraadt@cvs.openbsd.org 2014/03/15 17:28:26
4284 [ssh-agent.c ssh-keygen.1 ssh-keygen.c]
4285 Improve usage() and documentation towards the standard form.
4286 In particular, this line saves a lot of man page reading time.
4287 usage: ssh-keygen [-q] [-b bits] [-t dsa | ecdsa | ed25519 | rsa | rsa1]
4288 [-N new_passphrase] [-C comment] [-f output_keyfile]
4289 ok schwarze jmc
4290
4291commit 94bfe0fbd6e91a56b5b0ab94ac955d2a67d101aa
4292Author: Damien Miller <djm@mindrot.org>
4293Date: Sun Apr 20 13:00:51 2014 +1000
4294
4295 - naddy@cvs.openbsd.org 2014/03/12 13:06:59
4296 [ssh-keyscan.1]
4297 scan for Ed25519 keys by default too
4298
4299commit 3819519288b2b3928c6882f5883b0f55148f4fc0
4300Author: Damien Miller <djm@mindrot.org>
4301Date: Sun Apr 20 13:00:28 2014 +1000
4302
4303 - djm@cvs.openbsd.org 2014/03/12 04:51:12
4304 [authfile.c]
4305 correct test that kdf name is not "none" or "bcrypt"
4306
4307commit 8f9cd709c7cf0655d414306a0ed28306b33802be
4308Author: Damien Miller <djm@mindrot.org>
4309Date: Sun Apr 20 13:00:11 2014 +1000
4310
4311 - djm@cvs.openbsd.org 2014/03/12 04:50:32
4312 [auth-bsdauth.c ssh-keygen.c]
4313 don't count on things that accept arguments by reference to clear
4314 things for us on error; most things do, but it's unsafe form.
4315
4316commit 1c7ef4be83f6dec84509a312518b9df00ab491d9
4317Author: Damien Miller <djm@mindrot.org>
4318Date: Sun Apr 20 12:59:46 2014 +1000
4319
4320 - djm@cvs.openbsd.org 2014/03/12 04:44:58
4321 [ssh-keyscan.c]
4322 scan for Ed25519 keys by default too
4323
4324commit c10bf4d051c97939b30a1616c0499310057d07da
4325Author: Damien Miller <djm@mindrot.org>
4326Date: Sun Apr 20 12:58:04 2014 +1000
4327
4328 - djm@cvs.openbsd.org 2014/03/03 22:22:30
4329 [session.c]
4330 ignore enviornment variables with embedded '=' or '\0' characters;
4331 spotted by Jann Horn; ok deraadt@
4332 Id sync only - portable already has this.
4333
4334commit c2e49062faccbcd7135c40d1c78c5c329c58fc2e
4335Author: Damien Miller <djm@mindrot.org>
4336Date: Tue Apr 1 14:42:46 2014 +1100
4337
4338 - (djm) Use full release (e.g. 6.5p1) in debug output rather than just
4339 version. From des@des.no
4340
4341commit 14928b7492abec82afa4c2b778fc03f78cd419b6
4342Author: Damien Miller <djm@mindrot.org>
4343Date: Tue Apr 1 14:38:07 2014 +1100
4344
4345 - (djm) On platforms that support it, use prctl() to prevent sftp-server
4346 from accessing /proc/self/{mem,maps}; patch from jann AT thejh.net
4347
4348commit 48abc47e60048461fe9117e108a7e99ea1ac2bb8
4349Author: Damien Miller <djm@mindrot.org>
4350Date: Mon Mar 17 14:45:56 2014 +1100
4351
4352 - (djm) [sandbox-seccomp-filter.c] Soft-fail stat() syscalls. Add XXX to
4353 remind myself to add sandbox violation logging via the log socket.
4354
4355commit 9c36698ca2f554ec221dc7ef29c7a89e97c88705
4356Author: Tim Rice <tim@multitalents.net>
4357Date: Fri Mar 14 12:45:01 2014 -0700
4358
4359 20140314
4360 - (tim) [opensshd.init.in] Add support for ed25519
4361
4362commit 19158b2447e35838d69b2b735fb640d1e86061ea
4363Author: Damien Miller <djm@mindrot.org>
4364Date: Thu Mar 13 13:14:21 2014 +1100
4365
4366 - (djm) Release OpenSSH 6.6
4367
4368commit 8569eba5d7f7348ce3955eeeb399f66f25c52ece
4369Author: Damien Miller <djm@mindrot.org>
4370Date: Tue Mar 4 09:35:17 2014 +1100
4371
4372 - djm@cvs.openbsd.org 2014/03/03 22:22:30
4373 [session.c]
4374 ignore enviornment variables with embedded '=' or '\0' characters;
4375 spotted by Jann Horn; ok deraadt@
4376
4377commit 2476c31b96e89aec7d4e73cb6fbfb9a4290de3a7
4378Author: Damien Miller <djm@mindrot.org>
4379Date: Sun Mar 2 04:01:00 2014 +1100
4380
4381 - (djm) [regress/Makefile] Disable dhgex regress test; it breaks when
4382 no moduli file exists at the expected location.
4383
4384commit c83fdf30e9db865575b2521b1fe46315cf4c70ae
4385Author: Damien Miller <djm@mindrot.org>
4386Date: Fri Feb 28 10:34:03 2014 +1100
4387
4388 - (djm) [regress/host-expand.sh] Add RCS Id
4389
4390commit 834aeac3555e53f7d29a6fcf3db010dfb99681c7
4391Author: Damien Miller <djm@mindrot.org>
4392Date: Fri Feb 28 10:25:16 2014 +1100
4393
4394 - djm@cvs.openbsd.org 2014/02/27 21:21:25
4395 [agent-ptrace.sh agent.sh]
4396 keep return values that are printed in error messages;
4397 from portable
4398 (Id sync only)
4399
4400commit 4f7f1a9a0de24410c30952c7e16d433240422182
4401Author: Damien Miller <djm@mindrot.org>
4402Date: Fri Feb 28 10:24:11 2014 +1100
4403
4404 - djm@cvs.openbsd.org 2014/02/27 20:04:16
4405 [login-timeout.sh]
4406 remove any existing LoginGraceTime from sshd_config before adding
4407 a specific one for the test back in
4408
4409commit d705d987c27f68080c8798eeb5262adbdd6b4ffd
4410Author: Damien Miller <djm@mindrot.org>
4411Date: Fri Feb 28 10:23:26 2014 +1100
4412
4413 - djm@cvs.openbsd.org 2014/01/26 10:49:17
4414 [scp-ssh-wrapper.sh scp.sh]
4415 make sure $SCP is tested on the remote end rather than whichever one
4416 happens to be in $PATH; from portable
4417 (Id sync only)
4418
4419commit 624a3ca376e3955a4b9d936c9e899e241b65d357
4420Author: Damien Miller <djm@mindrot.org>
4421Date: Fri Feb 28 10:22:37 2014 +1100
4422
4423 - djm@cvs.openbsd.org 2014/01/26 10:22:10
4424 [regress/cert-hostkey.sh]
4425 automatically generate revoked keys from listed keys rather than
4426 manually specifying each type; from portable
4427 (Id sync only)
4428
4429commit b84392328425e4b9a71f8bde5fe6a4a4c48d3ec4
4430Author: Damien Miller <djm@mindrot.org>
4431Date: Fri Feb 28 10:21:26 2014 +1100
4432
4433 - dtucker@cvs.openbsd.org 2014/01/25 04:35:32
4434 [regress/Makefile regress/dhgex.sh]
4435 Add a test for DH GEX sizes
4436
4437commit 1e2aa3d90472293ea19008f02336d6d68aa05793
4438Author: Damien Miller <djm@mindrot.org>
4439Date: Fri Feb 28 10:19:51 2014 +1100
4440
4441 - dtucker@cvs.openbsd.org 2014/01/20 00:00:30
4442 [sftp-chroot.sh]
4443 append to rather than truncating the log file
4444
4445commit f483cc16fe7314e24a37aa3a4422b03c013c3213
4446Author: Damien Miller <djm@mindrot.org>
4447Date: Fri Feb 28 10:19:11 2014 +1100
4448
4449 - dtucker@cvs.openbsd.org 2014/01/19 23:43:02
4450 [regress/sftp-chroot.sh]
4451 Don't use -q on sftp as it suppresses logging, instead redirect the
4452 output to the regress logfile.
4453
4454commit 6486f16f1c0ebd6f39286f6ab5e08286d90a994a
4455Author: Damien Miller <djm@mindrot.org>
4456Date: Fri Feb 28 10:03:52 2014 +1100
4457
4458 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
4459 [contrib/suse/openssh.spec] Crank version numbers
4460
4461commit 92cf5adea194140380e6af6ec32751f9ad540794
4462Author: Damien Miller <djm@mindrot.org>
4463Date: Fri Feb 28 10:01:53 2014 +1100
4464
4465 - djm@cvs.openbsd.org 2014/02/27 22:57:40
4466 [version.h]
4467 openssh-6.6
4468
4469commit fc5d6759aba71eb205b296b5f148010ffc828583
4470Author: Damien Miller <djm@mindrot.org>
4471Date: Fri Feb 28 10:01:28 2014 +1100
4472
4473 - djm@cvs.openbsd.org 2014/02/27 22:47:07
4474 [sshd_config.5]
4475 bz#2184 clarify behaviour of a keyword that appears in multiple
4476 matching Match blocks; ok dtucker@
4477
4478commit 172ec7e0af1a5f1d682f6a2dca335c6c186153d5
4479Author: Damien Miller <djm@mindrot.org>
4480Date: Fri Feb 28 10:00:57 2014 +1100
4481
4482 - djm@cvs.openbsd.org 2014/02/27 08:25:09
4483 [bufbn.c]
4484 off by one in range check
4485
4486commit f9a9aaba437c2787e40cf7cc928281950e161678
4487Author: Damien Miller <djm@mindrot.org>
4488Date: Fri Feb 28 10:00:27 2014 +1100
4489
4490 - djm@cvs.openbsd.org 2014/02/27 00:41:49
4491 [bufbn.c]
4492 fix unsigned overflow that could lead to reading a short ssh protocol
4493 1 bignum value; found by Ben Hawkes; ok deraadt@
4494
4495commit fb3423b612713d9cde67c8a75f6f51188d6a3de3
4496Author: Damien Miller <djm@mindrot.org>
4497Date: Thu Feb 27 10:20:07 2014 +1100
4498
4499 - markus@cvs.openbsd.org 2014/02/26 21:53:37
4500 [sshd.c]
4501 ssh_gssapi_prepare_supported_oids needs GSSAPI
4502
4503commit 1348129a34f0f7728c34d86c100a32dcc8d1f922
4504Author: Damien Miller <djm@mindrot.org>
4505Date: Thu Feb 27 10:18:32 2014 +1100
4506
4507 - djm@cvs.openbsd.org 2014/02/26 20:29:29
4508 [channels.c]
4509 don't assume that the socks4 username is \0 terminated;
4510 spotted by Ben Hawkes; ok markus@
4511
4512commit e6a74aeeacd01d885262ff8e50eb28faee8c8039
4513Author: Damien Miller <djm@mindrot.org>
4514Date: Thu Feb 27 10:17:49 2014 +1100
4515
4516 - djm@cvs.openbsd.org 2014/02/26 20:28:44
4517 [auth2-gss.c gss-serv.c ssh-gss.h sshd.c]
4518 bz#2107 - cache OIDs of supported GSSAPI mechanisms before privsep
4519 sandboxing, as running this code in the sandbox can cause violations;
4520 ok markus@
4521
4522commit 08b57c67f3609340ff703fe2782d7058acf2529e
4523Author: Damien Miller <djm@mindrot.org>
4524Date: Thu Feb 27 10:17:13 2014 +1100
4525
4526 - djm@cvs.openbsd.org 2014/02/26 20:18:37
4527 [ssh.c]
4528 bz#2205: avoid early hostname lookups unless canonicalisation is enabled;
4529 ok dtucker@ markus@
4530
4531commit 13f97b2286142fd0b8eab94e4ce84fe124eeb752
4532Author: Damien Miller <djm@mindrot.org>
4533Date: Mon Feb 24 15:57:55 2014 +1100
4534
4535 - djm@cvs.openbsd.org 2014/02/23 20:11:36
4536 [readconf.c readconf.h ssh.c ssh_config.5]
4537 reparse ssh_config and ~/.ssh/config if hostname canonicalisation changes
4538 the hostname. This allows users to write configurations that always
4539 refer to canonical hostnames, e.g.
4540
4541 CanonicalizeHostname yes
4542 CanonicalDomains int.example.org example.org
4543 CanonicalizeFallbackLocal no
4544
4545 Host *.int.example.org
4546 Compression off
4547 Host *.example.org
4548 User djm
4549
4550 ok markus@
4551
4552commit bee3a234f3d1ad4244952bcff1b4b7c525330dc2
4553Author: Damien Miller <djm@mindrot.org>
4554Date: Mon Feb 24 15:57:22 2014 +1100
4555
4556 - djm@cvs.openbsd.org 2014/02/23 20:03:42
4557 [ssh-ed25519.c]
4558 check for unsigned overflow; not reachable in OpenSSH but others might
4559 copy our code...
4560
4561commit 0628780abe61e7e50cba48cdafb1837f49ff23b2
4562Author: Damien Miller <djm@mindrot.org>
4563Date: Mon Feb 24 15:56:45 2014 +1100
4564
4565 - djm@cvs.openbsd.org 2014/02/22 01:32:19
4566 [readconf.c]
4567 when processing Match blocks, skip 'exec' clauses if previous predicates
4568 failed to match; ok markus@
4569
4570commit 0890dc8191bb201eb01c3429feec0300a9d3a930
4571Author: Damien Miller <djm@mindrot.org>
4572Date: Mon Feb 24 15:56:07 2014 +1100
4573
4574 - djm@cvs.openbsd.org 2014/02/15 23:05:36
4575 [channels.c]
4576 avoid spurious "getsockname failed: Bad file descriptor" errors in ssh -W;
4577 bz#2200, debian#738692 via Colin Watson; ok dtucker@
4578
4579commit d3cf67e1117c25d151d0f86396e77ee3a827045a
4580Author: Damien Miller <djm@mindrot.org>
4581Date: Mon Feb 24 15:55:36 2014 +1100
4582
4583 - djm@cvs.openbsd.org 2014/02/07 06:55:54
4584 [cipher.c mac.c]
4585 remove some logging that makes ssh debugging output very verbose;
4586 ok markus
4587
4588commit 03ae081aeaa118361c81ece76eb7cc1aaa2b40c5
4589Author: Tim Rice <tim@multitalents.net>
4590Date: Fri Feb 21 09:09:34 2014 -0800
4591
4592 20140221
4593 - (tim) [configure.ac] Fix cut-and-paste error. Patch from Bryan Drewery.
4594
4595commit 4a20959d2e3c90e9d66897c0b4032c785672d815
4596Author: Darren Tucker <dtucker@zip.com.au>
4597Date: Thu Feb 13 16:38:32 2014 +1100
4598
4599 - (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}] Add compat
4600 code for older OpenSSL versions that don't have EVP_MD_CTX_copy_ex.
4601
4602commit d1a7a9c0fd1ac2e3314cceb2891959fd2cd9eabb
4603Author: Damien Miller <djm@mindrot.org>
4604Date: Fri Feb 7 09:24:33 2014 +1100
4605
4606 - djm@cvs.openbsd.org 2014/02/06 22:21:01
4607 [sshconnect.c]
4608 in ssh_create_socket(), only do the getaddrinfo for BindAddress when
4609 BindAddress is actually specified. Fixes regression in 6.5 for
4610 UsePrivilegedPort=yes; patch from Corinna Vinschen
4611
4612commit 6ce35b6cc4ead1bf98abec34cb2e2d6ca0abb15e
4613Author: Damien Miller <djm@mindrot.org>
4614Date: Fri Feb 7 09:24:14 2014 +1100
4615
4616 - naddy@cvs.openbsd.org 2014/02/05 20:13:25
4617 [ssh-keygen.1 ssh-keygen.c]
4618 tweak synopsis: calling ssh-keygen without any arguments is fine; ok jmc@
4619 while here, fix ordering in usage(); requested by jmc@
4620
4621commit 6434cb2cfbbf0a46375d2d22f2ff9927feb5e478
4622Author: Damien Miller <djm@mindrot.org>
4623Date: Thu Feb 6 11:17:50 2014 +1100
4624
4625 - (djm) [sandbox-seccomp-filter.c] Not all Linux architectures define
4626 __NR_shutdown; some go via the socketcall(2) multiplexer.
4627
4628commit 8d36f9ac71eff2e9f5770c0518b73d875f270647
4629Author: Darren Tucker <dtucker@zip.com.au>
4630Date: Thu Feb 6 10:44:13 2014 +1100
4631
4632 - (dtucker) [openbsd-compat/bsd-poll.c] Don't bother checking for non-NULL
4633 before freeing since free(NULL) is a no-op. ok djm.
4634
4635commit a0959da3680b4ce8cf911caf3293a6d90f88eeb7
4636Author: Damien Miller <djm@mindrot.org>
4637Date: Wed Feb 5 10:33:45 2014 +1100
4638
4639 - (djm) [sandbox-capsicum.c] Don't fatal if Capsicum is offered by
4640 headers/libc but not supported by the kernel. Patch from Loganaden
4641 Velvindron @ AfriNIC
4642
4643commit 9c449bc183b256c84d8f740727b0bc54d247b15e
4644Author: Damien Miller <djm@mindrot.org>
4645Date: Tue Feb 4 11:38:28 2014 +1100
4646
4647 - (djm) [regress/setuid-allowed.c] Missing string.h for strerror()
4648
4649commit bf7e0f03be661b6f5b3bfe325135ce19391f9c4d
4650Author: Damien Miller <djm@mindrot.org>
4651Date: Tue Feb 4 11:37:50 2014 +1100
4652
4653 - (djm) [openbsd-compat/Makefile.in] Add missing explicit_bzero.o
4654
4655commit eb6d870a0ea8661299bb2ea8f013d3ace04e2024
4656Author: Damien Miller <djm@mindrot.org>
4657Date: Tue Feb 4 11:26:34 2014 +1100
4658
4659 - djm@cvs.openbsd.org 2014/02/04 00:24:29
4660 [ssh.c]
4661 delay lowercasing of hostname until right before hostname
4662 canonicalisation to unbreak case-sensitive matching of ssh_config;
4663 reported by Ike Devolder; ok markus@
4664
4665commit d56b44d2dfa093883a5c4e91be3f72d99946b170
4666Author: Damien Miller <djm@mindrot.org>
4667Date: Tue Feb 4 11:26:04 2014 +1100
4668
4669 - djm@cvs.openbsd.org 2014/02/04 00:24:29
4670 [ssh.c]
4671 delay lowercasing of hostname until right before hostname
4672 canonicalisation to unbreak case-sensitive matching of ssh_config;
4673 reported by Ike Devolder; ok markus@
4674
4675commit db3c595ea74ea9ccd5aa644d7e1f8dc675710731
4676Author: Damien Miller <djm@mindrot.org>
4677Date: Tue Feb 4 11:25:45 2014 +1100
4678
4679 - djm@cvs.openbsd.org 2014/02/02 03:44:31
4680 [digest-libc.c digest-openssl.c]
4681 convert memset of potentially-private data to explicit_bzero()
4682
4683commit aae07e2e2000dd318418fd7fd4597760904cae32
4684Author: Damien Miller <djm@mindrot.org>
4685Date: Tue Feb 4 11:20:40 2014 +1100
4686
4687 - djm@cvs.openbsd.org 2014/02/03 23:28:00
4688 [ssh-ecdsa.c]
4689 fix memory leak; ECDSA_SIG_new() allocates 'r' and 's' for us, unlike
4690 DSA_SIG_new. Reported by Batz Spear; ok markus@
4691
4692commit a5103f413bde6f31bff85d6e1fd29799c647d765
4693Author: Damien Miller <djm@mindrot.org>
4694Date: Tue Feb 4 11:20:14 2014 +1100
4695
4696 - djm@cvs.openbsd.org 2014/02/02 03:44:32
4697 [auth1.c auth2-chall.c auth2-passwd.c authfile.c bufaux.c bufbn.c]
4698 [buffer.c cipher-3des1.c cipher.c clientloop.c gss-serv.c kex.c]
4699 [kexdhc.c kexdhs.c kexecdhc.c kexgexc.c kexecdhs.c kexgexs.c key.c]
4700 [monitor.c monitor_wrap.c packet.c readpass.c rsa.c serverloop.c]
4701 [ssh-add.c ssh-agent.c ssh-dss.c ssh-ecdsa.c ssh-ed25519.c]
4702 [ssh-keygen.c ssh-rsa.c sshconnect.c sshconnect1.c sshconnect2.c]
4703 [sshd.c]
4704 convert memset of potentially-private data to explicit_bzero()
4705
4706commit 1d2c4564265ee827147af246a16f3777741411ed
4707Author: Damien Miller <djm@mindrot.org>
4708Date: Tue Feb 4 11:18:20 2014 +1100
4709
4710 - tedu@cvs.openbsd.org 2014/01/31 16:39:19
4711 [auth2-chall.c authfd.c authfile.c bufaux.c bufec.c canohost.c]
4712 [channels.c cipher-chachapoly.c clientloop.c configure.ac hostfile.c]
4713 [kexc25519.c krl.c monitor.c sandbox-systrace.c session.c]
4714 [sftp-client.c ssh-keygen.c ssh.c sshconnect2.c sshd.c sshlogin.c]
4715 [openbsd-compat/explicit_bzero.c openbsd-compat/openbsd-compat.h]
4716 replace most bzero with explicit_bzero, except a few that cna be memset
4717 ok djm dtucker
4718
4719commit 3928de067c286683a95fbdbdb5fdb3c78a0e5efd
4720Author: Damien Miller <djm@mindrot.org>
4721Date: Tue Feb 4 11:13:54 2014 +1100
4722
4723 - djm@cvs.openbsd.org 2014/01/30 22:26:14
4724 [sandbox-systrace.c]
4725 allow shutdown(2) syscall in sandbox - it may be called by packet_close()
4726 from portable
4727 (Id sync only; change is already in portable)
4728
4729commit e1e480aee8a9af6cfbe7188667b7b940d6b57f9f
4730Author: Damien Miller <djm@mindrot.org>
4731Date: Tue Feb 4 11:13:17 2014 +1100
4732
4733 - jmc@cvs.openbsd.org 2014/01/29 14:04:51
4734 [sshd_config.5]
4735 document kbdinteractiveauthentication;
4736 requested From: Ross L Richardson
4737
4738 dtucker/markus helped explain its workings;
4739
4740commit 7cc194f70d4a5ec9a82d19422eaf18db4a6624c6
4741Author: Damien Miller <djm@mindrot.org>
4742Date: Tue Feb 4 11:12:56 2014 +1100
4743
4744 - djm@cvs.openbsd.org 2014/01/29 06:18:35
4745 [Makefile.in auth.h auth2-jpake.c auth2.c jpake.c jpake.h monitor.c]
4746 [monitor.h monitor_wrap.c monitor_wrap.h readconf.c readconf.h]
4747 [schnorr.c schnorr.h servconf.c servconf.h ssh2.h sshconnect2.c]
4748 remove experimental, never-enabled JPAKE code; ok markus@
4749
4750commit b0f26544cf6f4feeb1a4f6db09fca834f5c9867d
4751Author: Damien Miller <djm@mindrot.org>
4752Date: Tue Feb 4 11:10:01 2014 +1100
4753
4754 - djm@cvs.openbsd.org 2014/01/29 00:19:26
4755 [sshd.c]
4756 use kill(0, ...) instead of killpg(0, ...); on most operating systems
4757 they are equivalent, but SUSv2 describes the latter as having undefined
4758 behaviour; from portable; ok dtucker
4759 (Id sync only; change is already in portable)
4760
4761commit f8f35bc471500348bb262039fb1fc43175d251b0
4762Author: Damien Miller <djm@mindrot.org>
4763Date: Tue Feb 4 11:09:12 2014 +1100
4764
4765 - jmc@cvs.openbsd.org 2014/01/28 14:13:39
4766 [ssh-keyscan.1]
4767 kill some bad Pa;
4768 From: Jan Stary
4769
4770commit 0ba85d696ae9daf66002c2e4ab0d6bb111e1a787
4771Author: Damien Miller <djm@mindrot.org>
4772Date: Tue Feb 4 11:08:38 2014 +1100
4773
4774 ignore a few more regress droppings
4775
4776commit ec93d15170b7a6ddf63fd654bd0f6a752acc19dd
4777Author: Damien Miller <djm@mindrot.org>
4778Date: Tue Feb 4 11:07:13 2014 +1100
4779
4780 - markus@cvs.openbsd.org 2014/01/27 20:13:46
4781 [digest.c digest-openssl.c digest-libc.c Makefile.in]
4782 rename digest.c to digest-openssl.c and add libc variant; ok djm@
4783
4784commit 4a1c7aa640fb97d3472d51b215b6a0ec0fd025c7
4785Author: Damien Miller <djm@mindrot.org>
4786Date: Tue Feb 4 11:03:36 2014 +1100
4787
4788 - markus@cvs.openbsd.org 2014/01/27 19:18:54
4789 [auth-rsa.c cipher.c ssh-agent.c sshconnect1.c sshd.c]
4790 replace openssl MD5 with our ssh_digest_*; ok djm@
4791
4792commit 4e8d937af79ce4e253f77ec93489d098b25becc3
4793Author: Damien Miller <djm@mindrot.org>
4794Date: Tue Feb 4 11:02:42 2014 +1100
4795
4796 - markus@cvs.openbsd.org 2014/01/27 18:58:14
4797 [Makefile.in digest.c digest.h hostfile.c kex.h mac.c hmac.c hmac.h]
4798 replace openssl HMAC with an implementation based on our ssh_digest_*
4799 ok and feedback djm@
4800
4801commit 69d0d09f76bab5aec86fbf78489169f63bd16475
4802Author: Tim Rice <tim@multitalents.net>
4803Date: Fri Jan 31 14:25:18 2014 -0800
4804
4805 - (tim) [Makefile.in] build regress/setuid-allow.
4806
4807commit 0eeafcd76b972a3d159f3118227c149a4d7817fe
4808Author: Darren Tucker <dtucker@zip.com.au>
4809Date: Fri Jan 31 14:18:51 2014 +1100
4810
4811 - (dtucker) [readconf.c] Include <arpa/inet.h> for the hton macros. Fixes
4812 build with HP-UX's compiler. Patch from Kevin Brott.
4813
4814commit 7e5cec6070673e9f9785ffc749837ada22fbe99f
4815Author: Damien Miller <djm@mindrot.org>
4816Date: Fri Jan 31 09:25:34 2014 +1100
4817
4818 - (djm) [sandbox-seccomp-filter.c sandbox-systrace.c] Allow shutdown(2)
4819 syscall from sandboxes; it may be called by packet_close.
4820
4821commit cdb6c90811caa5df2df856be9b0b16db020fe31d
4822Author: Damien Miller <djm@mindrot.org>
4823Date: Thu Jan 30 12:50:17 2014 +1100
4824
4825 - (djm) Release openssh-6.5p1
4826
4827commit 996ea80b1884b676a901439f1f2681eb6ff68501
4828Author: Damien Miller <djm@mindrot.org>
4829Date: Thu Jan 30 12:49:55 2014 +1100
4830
4831 trim entries prior to openssh-6.0p1
4832
4833commit f5bbd3b657b6340551c8a95f74a70857ff8fac79
4834Author: Damien Miller <djm@mindrot.org>
4835Date: Thu Jan 30 11:26:46 2014 +1100
4836
4837 - (djm) [configure.ac atomicio.c] Kludge around NetBSD offering
4838 different symbols for 'read' when various compiler flags are
4839 in use, causing atomicio.c comparisons against it to break and
4840 read/write operations to hang; ok dtucker
4841
4842commit c2868192ddc4e1420a50389e18c05db20b0b1f32
4843Author: Damien Miller <djm@mindrot.org>
4844Date: Thu Jan 30 10:21:19 2014 +1100
4845
4846 - (djm) [configure.ac] Only check for width-specified integer types
4847 in headers that actually exist. patch from Tom G. Christensen;
4848 ok dtucker@
4849
4850commit c161fc90fc86e2035710570238a9e1ca7a68d2a5
4851Author: Damien Miller <djm@mindrot.org>
4852Date: Wed Jan 29 21:01:33 2014 +1100
4853
4854 - (djm) [configure.ac] Fix broken shell test '==' vs '='; patch from
4855 Tom G. Christensen
4856
4857commit 6f917ad376481995ab7d29fb53b08ec8d507eb9e
4858Author: Tim Rice <tim@multitalents.net>
4859Date: Tue Jan 28 10:26:25 2014 -0800
4860
4861 - (tim) [regress/agent.sh regress/agent-ptrace.sh] Assign $? to a variable
4862 when used as an error message inside an if statement so we display the
4863 correct into. agent.sh patch from Petr Lautrbach.
4864
4865commit ab16ef4152914d44ce6f76e48167d26d22f66a06
4866Author: Damien Miller <djm@mindrot.org>
4867Date: Tue Jan 28 15:08:12 2014 +1100
4868
4869 - (djm) [sshd.c] Use kill(0, ...) instead of killpg(0, ...); the
4870 latter being specified to have undefined behaviour in SUSv3;
4871 ok dtucker
4872
4873commit ab0394905884dc6e58c3721211c6b38fb8fc2ca8
4874Author: Damien Miller <djm@mindrot.org>
4875Date: Tue Jan 28 15:07:10 2014 +1100
4876
4877 - (djm) [configure.ac] Search for inet_ntop in libnsl and libresovl;
4878 ok dtucker
4879
4880commit 4ab20a82d4d4168d62318923f62382f6ef242fcd
4881Author: Darren Tucker <dtucker@zip.com.au>
4882Date: Mon Jan 27 17:35:04 2014 +1100
4883
4884 - (dtucker) [Makefile.in] Remove trailing backslash which some make
4885 implementations (eg older Solaris) do not cope with.
4886
4887commit e7e8b3cfe9f8665faaf0e68b33df5bbb431bd129
4888Author: Darren Tucker <dtucker@zip.com.au>
4889Date: Mon Jan 27 17:32:50 2014 +1100
4890
4891 Welcome to 2014
4892
4893commit 5b447c0aac0dd444251e276f6bb3bbbe1c05331c
4894Author: Damien Miller <djm@mindrot.org>
4895Date: Sun Jan 26 09:46:53 2014 +1100
4896
4897 - (djm) [configure.ac] correct AC_DEFINE for previous.
4898
4899commit 2035b2236d3b1f76c749c642a43e03c85eae76e6
4900Author: Damien Miller <djm@mindrot.org>
4901Date: Sun Jan 26 09:39:53 2014 +1100
4902
4903 - (djm) [configure.ac sandbox-capsicum.c sandbox-rlimit.c] Disable
4904 RLIMIT_NOFILE pseudo-sandbox on FreeBSD. In some configurations,
4905 libc will attempt to open additional file descriptors for crypto
4906 offload and crash if they cannot be opened.
4907
4908commit a92ac7410475fbb00383c7402aa954dc0a75ae19
4909Author: Damien Miller <djm@mindrot.org>
4910Date: Sun Jan 26 09:38:03 2014 +1100
4911
4912 - markus@cvs.openbsd.org 2014/01/25 20:35:37
4913 [kex.c]
4914 dh_need needs to be set to max(seclen, blocksize, ivlen, mac_len)
4915 ok dtucker@, noted by mancha
4916
4917commit 76eea4ab4e658670ca6e76dd1e6d17f262208b57
4918Author: Damien Miller <djm@mindrot.org>
4919Date: Sun Jan 26 09:37:25 2014 +1100
4920
4921 - dtucker@cvs.openbsd.org 2014/01/25 10:12:50
4922 [cipher.c cipher.h kex.c kex.h kexgexc.c]
4923 Add a special case for the DH group size for 3des-cbc, which has an
4924 effective strength much lower than the key size. This causes problems
4925 with some cryptlib implementations, which don't support group sizes larger
4926 than 4k but also don't use the largest group size it does support as
4927 specified in the RFC. Based on a patch from Petr Lautrbach at Redhat,
4928 reduced by me with input from Markus. ok djm@ markus@
4929
4930commit 603b8f47f1cd9ed95a2017447db8e60ca6704594
4931Author: Damien Miller <djm@mindrot.org>
4932Date: Sat Jan 25 13:16:59 2014 +1100
4933
4934 - (djm) [configure.ac] autoconf sets finds to 'yes' not '1', so test
4935 against the correct thing.
4936
4937commit c96d85376d779b6ac61525b5440010d344d2f23f
4938Author: Damien Miller <djm@mindrot.org>
4939Date: Sat Jan 25 13:12:28 2014 +1100
4940
4941 - (djm) [configure.ac] Do not attempt to use capsicum sandbox unless
4942 sys/capability.h exists and cap_rights_limit is in libc. Fixes
4943 build on FreeBSD9x which provides the header but not the libc
4944 support.
4945
4946commit f62ecef9939cb3dbeb10602fd705d4db3976d822
4947Author: Damien Miller <djm@mindrot.org>
4948Date: Sat Jan 25 12:34:38 2014 +1100
4949
4950 - (djm) [configure.ac] Fix detection of capsicum sandbox on FreeBSD
4951
4952commit b0e0f760b861676a3fe5c40133b270713d5321a9
4953Author: Damien Miller <djm@mindrot.org>
4954Date: Fri Jan 24 14:27:04 2014 +1100
4955
4956 - (djm) [Makefile.in regress/scp-ssh-wrapper.sh regress/scp.sh] Make
4957 the scp regress test actually test the built scp rather than the one
4958 in $PATH. ok dtucker@
4959
4960commit 42a092530159637da9cb7f9e1b5f4679e34a85e6
4961Author: Darren Tucker <dtucker@zip.com.au>
4962Date: Thu Jan 23 23:14:39 2014 +1100
4963
4964 - (dtucker) [configure.ac] NetBSD's (and FreeBSD's) strnvis is gratuitously
4965 incompatible with OpenBSD's despite post-dating it by more than a decade.
4966 Declare it as broken, and document FreeBSD's as the same. ok djm@
4967
4968commit 617da33c20cb59f9ea6c99c881d92493371ef7b8
4969Author: Tim Rice <tim@multitalents.net>
4970Date: Wed Jan 22 19:16:10 2014 -0800
4971
4972 - (tim) [session.c] Improve error reporting on set_id().
4973
4974commit 5c2ff5e31f57d303ebb414d84a934c02728fa568
4975Author: Damien Miller <djm@mindrot.org>
4976Date: Wed Jan 22 21:30:12 2014 +1100
4977
4978 - (djm) [configure.ac aclocal.m4] More tests to detect fallout from
4979 platform hardening options: include some long long int arithmatic
4980 to detect missing support functions for -ftrapv in libgcc and
4981 equivalents, actually test linking when -ftrapv is supplied and
4982 set either both -pie/-fPIE or neither. feedback and ok dtucker@
4983
4984commit 852472a54b8a0dc3e53786b313baaa86850a4273
4985Author: Damien Miller <djm@mindrot.org>
4986Date: Wed Jan 22 16:31:18 2014 +1100
4987
4988 - (djm) [configure.ac] Unless specifically requested, only attempt
4989 to build Position Independent Executables on gcc >= 4.x; ok dtucker
4990
4991commit ee87838786cef0194db36ae0675b3e7c4e8ec661
4992Author: Damien Miller <djm@mindrot.org>
4993Date: Wed Jan 22 16:30:15 2014 +1100
4994
4995 - (djm) [openbsd-compat/setproctitle.c] Don't fail to compile if a
4996 platform that is expected to use the reuse-argv style setproctitle
4997 hack surprises us by providing a setproctitle in libc; ok dtucker
4998
4999commit 5c96a154c7940fa67b1f11c421e390dbbc159f27
5000Author: Damien Miller <djm@mindrot.org>
5001Date: Tue Jan 21 13:10:26 2014 +1100
5002
5003 - (djm) [aclocal.m4] Flesh out the code run in the OSSH_CHECK_CFLAG_COMPILE
5004 and OSSH_CHECK_LDFLAG_LINK tests to give them a better chance of
5005 detecting toolchain-related problems; ok dtucker
5006
5007commit 9464ba6fb34bb42eb3501ec3c5143662e75674bf
5008Author: Tim Rice <tim@multitalents.net>
5009Date: Mon Jan 20 17:59:28 2014 -0800
5010
5011 - (tim) [platform.c session.c] Fix bug affecting SVR5 platforms introduced
5012 with sftp chroot support. Move set_id call after chroot.
5013
5014commit a6d573caa14d490e6c42fb991bcb5c6860ec704b
5015Author: Darren Tucker <dtucker@zip.com.au>
5016Date: Tue Jan 21 12:50:46 2014 +1100
5017
5018 - (dtucker) [aclocal.m4] Differentiate between compile-time and link-time
5019 tests in the configure output. ok djm.
5020
5021commit 096118dc73ab14810b3c12785c0b5acb01ad6123
5022Author: Darren Tucker <dtucker@zip.com.au>
5023Date: Tue Jan 21 12:48:51 2014 +1100
5024
5025 - (dtucker) [configure.ac] Make PIE a configure-time option which defaults
5026 to on platforms where it's known to be reliably detected and off elsewhere.
5027 Works around platforms such as FreeBSD 9.1 where it does not interop with
5028 -ftrapv (it seems to work but fails when trying to link ssh). ok djm@
5029
5030commit f9df7f6f477792254eab33cdef71a6d66488cb88
5031Author: Damien Miller <djm@mindrot.org>
5032Date: Mon Jan 20 20:07:15 2014 +1100
5033
5034 - (djm) [regress/cert-hostkey.sh] Fix regress failure on platforms that
5035 skip one or more key types (e.g. RHEL/CentOS 6.5); ok dtucker@
5036
5037commit c74e70eb52ccc0082bd5a70b5798bb01c114d138
5038Author: Darren Tucker <dtucker@zip.com.au>
5039Date: Mon Jan 20 13:18:09 2014 +1100
5040
5041 - (dtucker) [gss-serv-krb5.c] Fall back to krb5_cc_gen_new if the Kerberos
5042 implementation does not have krb5_cc_new_unique, similar to what we do
5043 in auth-krb5.c.
5044
5045commit 3510979e83b6a18ec8773c64c3fa04aa08b2e783
5046Author: Damien Miller <djm@mindrot.org>
5047Date: Mon Jan 20 12:41:53 2014 +1100
5048
5049 - djm@cvs.openbsd.org 2014/01/20 00:08:48
5050 [digest.c]
5051 memleak; found by Loganaden Velvindron @ AfriNIC; ok markus@
5052
5053commit 7eee358d7a6580479bee5cd7e52810ebfd03e5b2
5054Author: Darren Tucker <dtucker@zip.com.au>
5055Date: Sun Jan 19 22:37:02 2014 +1100
5056
5057 - dtucker@cvs.openbsd.org 2014/01/19 11:21:51
5058 [addrmatch.c]
5059 Cast the sizeof to socklen_t so it'll work even if the supplied len is
5060 negative. Suggested by and ok djm, ok deraadt.
5061
5062commit b7e01c09b56ab26e8fac56bbce0fd25e36d12bb0
5063Author: Darren Tucker <dtucker@zip.com.au>
5064Date: Sun Jan 19 22:36:13 2014 +1100
5065
5066 - djm@cvs.openbsd.org 2014/01/19 04:48:08
5067 [ssh_config.5]
5068 fix inverted meaning of 'no' and 'yes' for CanonicalizeFallbackLocal
5069
5070commit 7b1ded04adce42efa25ada7c3a39818d3109b724
5071Author: Darren Tucker <dtucker@zip.com.au>
5072Date: Sun Jan 19 15:30:02 2014 +1100
5073
5074 - dtucker@cvs.openbsd.org 2014/01/19 04:17:29
5075 [canohost.c addrmatch.c]
5076 Cast socklen_t when comparing to size_t and use socklen_t to iterate over
5077 the ip options, both to prevent signed/unsigned comparison warnings.
5078 Patch from vinschen at redhat via portable openssh, begrudging ok deraadt.
5079
5080commit 293ee3c9f0796d99ebb033735f0e315f2e0180bf
5081Author: Darren Tucker <dtucker@zip.com.au>
5082Date: Sun Jan 19 15:28:01 2014 +1100
5083
5084 - dtucker@cvs.openbsd.org 2014/01/18 09:36:26
5085 [session.c]
5086 explicitly define USE_PIPES to 1 to prevent redefinition warnings in
5087 portable on platforms that use pipes for everything. From redhat @
5088 redhat.
5089
5090commit 2aca159d05f9e7880d1d8f1ce49a218840057f53
5091Author: Darren Tucker <dtucker@zip.com.au>
5092Date: Sun Jan 19 15:25:34 2014 +1100
5093
5094 - dtucker@cvs.openbsd.org 2014/01/17 06:23:24
5095 [sftp-server.c]
5096 fix log message statvfs. ok djm
5097
5098commit 841f7da89ae8b367bb502d61c5c41916c6e7ae4c
5099Author: Darren Tucker <dtucker@zip.com.au>
5100Date: Sat Jan 18 22:12:15 2014 +1100
5101
5102 - (dtucker) [sandbox-capsicum.c] Correct some error messages and make the
5103 return value check for cap_enter() consistent with the other uses in
5104 FreeBSD. From by Loganaden Velvindron @ AfriNIC via bz#2140.
5105
5106commit fdce3731660699b2429e93e822f2ccbaccd163ae
5107Author: Darren Tucker <dtucker@zip.com.au>
5108Date: Sat Jan 18 21:12:42 2014 +1100
5109
5110 - (dtucker) [configure.ac] On Cygwin the getopt variables (like optargs,
5111 optind) are defined in getopt.h already. Unfortunately they are defined as
5112 "declspec(dllimport)" for historical reasons, because the GNU linker didn't
5113 allow auto-import on PE/COFF targets way back when. The problem is the
5114 dllexport attributes collide with the definitions in the various source
5115 files in OpenSSH, which obviousy define the variables without
5116 declspec(dllimport). The least intrusive way to get rid of these warnings
5117 is to disable warnings for GCC compiler attributes when building on Cygwin.
5118 Patch from vinschen at redhat.com.
5119
5120commit 1411c9263f46e1ee49d0d302bf7258ebe69ce827
5121Author: Darren Tucker <dtucker@zip.com.au>
5122Date: Sat Jan 18 21:03:59 2014 +1100
5123
5124 - (dtucker) [openbsd-compat/bsd-cygwin_util.h] Add missing function
5125 declarations that stopped being included when we stopped including
5126 <windows.h> from openbsd-compat/bsd-cygwin_util.h. Patch from vinschen at
5127 redhat.com.
5128
5129commit 89c532d843c95a085777c66365067d64d1937eb9
5130Author: Darren Tucker <dtucker@zip.com.au>
5131Date: Sat Jan 18 20:43:49 2014 +1100
5132
5133 - (dtucker) [uidswap.c] Prevent unused variable warnings on Cygwin. Patch
5134 from vinschen at redhat.com
5135
5136commit 355f861022be7b23d3009fae8f3c9f6f7fc685f7
5137Author: Darren Tucker <dtucker@zip.com.au>
5138Date: Sat Jan 18 00:12:38 2014 +1100
5139
5140 - (dtucker) [defines.h] Move our definitions of uintXX_t types down to after
5141 they're defined if we have to define them ourselves. Fixes builds on old
5142 AIX.
5143
5144commit a3357661ee1d5d553294f36e4940e8285c7f1332
5145Author: Darren Tucker <dtucker@zip.com.au>
5146Date: Sat Jan 18 00:03:57 2014 +1100
5147
5148 - (dtucker) [readconf.c] Wrap paths.h inside an ifdef. Allows building on
5149 Solaris.
5150
5151commit 9edcbff46ff01c8d5dee9c1aa843f09e9ad8a80e
5152Author: Darren Tucker <dtucker@zip.com.au>
5153Date: Fri Jan 17 21:54:32 2014 +1100
5154
5155 - (dtucker) [configure.ac] Have --without-toolchain-hardening not turn off
5156 stack-protector since that has a separate flag that's been around a while.
5157
5158commit 6d725687c490d4ba957a1bbc0ba0a2956c09fa69
5159Author: Darren Tucker <dtucker@zip.com.au>
5160Date: Fri Jan 17 19:17:34 2014 +1100
5161
5162 - (dtucker) [configure.ac] Also look in inttypes.h for uintXX_t types.
5163
5164commit 5055699c7f7c7ef21703a443ec73117da392f6ae
5165Author: Darren Tucker <dtucker@zip.com.au>
5166Date: Fri Jan 17 18:48:22 2014 +1100
5167
5168 - (dtucker) [openbsd-compat/bsd-statvfs.h] Only start including headers if we
5169 need them to cut down on the name collisions.
5170
5171commit a5cf1e220def07290260e4125e74f41ac75cf88d
5172Author: Darren Tucker <dtucker@zip.com.au>
5173Date: Fri Jan 17 18:10:58 2014 +1100
5174
5175 - (dtucker) [configure.ac openbsd-compat/bsd-statvfs.c
5176 openbsd-compat/bsd-statvfs.h] Implement enough of statvfs on top of statfs
5177 to be useful (and for the regression tests to pass) on platforms that
5178 have statfs and fstatfs. ok djm@
5179
5180commit 1357d71d7b6d269969520aaa3e84d312ec971d5b
5181Author: Darren Tucker <dtucker@zip.com.au>
5182Date: Fri Jan 17 18:00:40 2014 +1100
5183
5184 - (dtucker) Fix typo in #ifndef.
5185
5186commit d23a91ffb289d3553a58b7a60cec39fba9f0f506
5187Author: Darren Tucker <dtucker@zip.com.au>
5188Date: Fri Jan 17 17:32:30 2014 +1100
5189
5190 - (dtucker) [configure.ac digest.c openbsd-compat/openssl-compat.c
5191 openbsd-compat/openssl-compat.h] Add compatibility layer for older
5192 openssl versions. ok djm@
5193
5194commit 868ea1ea1c1bfdbee5dbad78f81999c5983ecf31
5195Author: Damien Miller <djm@mindrot.org>
5196Date: Fri Jan 17 16:47:04 2014 +1100
5197
5198 - (djm) [Makefile.in configure.ac sandbox-capsicum.c sandbox-darwin.c]
5199 [sandbox-null.c sandbox-rlimit.c sandbox-seccomp-filter.c]
5200 [sandbox-systrace.c ssh-sandbox.h sshd.c] Support preauth sandboxing
5201 using the Capsicum API introduced in FreeBSD 10. Patch by Dag-Erling
5202 Smorgrav, updated by Loganaden Velvindron @ AfriNIC; ok dtucker@
5203
5204commit a9d186a8b50d18869a10e9203abf71c83ddb1f79
5205Author: Darren Tucker <dtucker@zip.com.au>
5206Date: Fri Jan 17 16:30:49 2014 +1100
5207
5208 - dtucker@cvs.openbsd.org 2014/01/17 05:26:41
5209 [digest.c]
5210 remove unused includes. ok djm@
5211
5212commit 5f1c57a7a7eb39c0e4fee3367712337dbcaef024
5213Author: Darren Tucker <dtucker@zip.com.au>
5214Date: Fri Jan 17 16:29:45 2014 +1100
5215
5216 - djm@cvs.openbsd.org 2014/01/17 00:21:06
5217 [sftp-client.c]
5218 signed/unsigned comparison warning fix; from portable (Id sync only)
5219
5220commit c548722361d89fb12c108528f96b306a26477b18
5221Author: Darren Tucker <dtucker@zip.com.au>
5222Date: Fri Jan 17 15:12:16 2014 +1100
5223
5224 - (dtucker) [configure.ac] Split AC_CHECK_FUNCS for OpenSSL functions into
5225 separate lines and alphabetize for easier diffing of changes.
5226
5227commit acad351a5b1c37de9130c9c1710445cc45a7f6b9
5228Author: Darren Tucker <dtucker@zip.com.au>
5229Date: Fri Jan 17 14:20:05 2014 +1100
5230
5231 - (dtucker) [defines.h] Add typedefs for uintXX_t types for platforms that
5232 don't have them.
5233
5234commit c3ed065ce8417aaa46490836648c173a5010f226
5235Author: Darren Tucker <dtucker@zip.com.au>
5236Date: Fri Jan 17 14:18:45 2014 +1100
5237
5238 - (dtucker) [openbsd-compat/bcrypt_pbkdf.c] Wrap stdlib.h include inside
5239 #ifdef HAVE_STDINT_H.
5240
5241commit f45f78ae437062c7d9506c5f475b7215f486be44
5242Author: Darren Tucker <dtucker@zip.com.au>
5243Date: Fri Jan 17 12:43:43 2014 +1100
5244
5245 - (dtucker) [blocks.c fe25519.c ge25519.c hash.c sc25519.c verify.c] Include
5246 includes.h to pull in all of the compatibility stuff.
5247
5248commit 99df369d0340caac145d57f700d830147ff18b87
5249Author: Darren Tucker <dtucker@zip.com.au>
5250Date: Fri Jan 17 12:42:17 2014 +1100
5251
5252 - (dtucker) [poly1305.c] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.
5253
5254commit ac413b62ea1957e80c711acbe0c11b908273fc01
5255Author: Darren Tucker <dtucker@zip.com.au>
5256Date: Fri Jan 17 12:31:33 2014 +1100
5257
5258 - (dtucker) [crypto_api.h] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.
5259
5260commit 1c4a011e9c939e74815346a560843e1862c300b8
5261Author: Darren Tucker <dtucker@zip.com.au>
5262Date: Fri Jan 17 12:23:23 2014 +1100
5263
5264 - (dtucker) [loginrec.c] Cast to the types specfied in the format
5265 specification to prevent warnings.
5266
5267commit c3d483f9a8275be1113535a1e0d0e384f605f3c4
5268Author: Damien Miller <djm@mindrot.org>
5269Date: Fri Jan 17 11:20:26 2014 +1100
5270
5271 - (djm) [sftp-client.c] signed/unsigned comparison fix
5272
5273commit fd994379dd972417d0491767f7cd9b5bf23f4975
5274Author: Darren Tucker <dtucker@zip.com.au>
5275Date: Fri Jan 17 09:53:24 2014 +1100
5276
5277 - (dtucker) [aclocal.m4 configure.ac] Add some additional compiler/toolchain
5278 hardening flags including -fstack-protector-strong. These default to on
5279 if the toolchain supports them, but there is a configure-time knob
5280 (--without-hardening) to disable them if necessary. ok djm@
5281
5282commit 366224d21768ee8ec28cfbcc5fbade1b32582d58
5283Author: Damien Miller <djm@mindrot.org>
5284Date: Thu Jan 16 18:51:44 2014 +1100
5285
5286 - (djm) [README] update release notes URL.
5287
5288commit 2ae77e64f8fa82cbf25c9755e8e847709b978b40
5289Author: Damien Miller <djm@mindrot.org>
5290Date: Thu Jan 16 18:51:07 2014 +1100
5291
5292 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
5293 [contrib/suse/openssh.spec] Crank RPM spec version numbers.
5294
5295commit 0fa29e6d777c73a1b4ddd3b996b06ee20022ae8a
5296Author: Damien Miller <djm@mindrot.org>
5297Date: Thu Jan 16 18:42:31 2014 +1100
5298
5299 - djm@cvs.openbsd.org 2014/01/16 07:32:00
5300 [version.h]
5301 openssh-6.5
5302
5303commit 52c371cd6d2598cc73d4e633811b3012119c47e2
5304Author: Damien Miller <djm@mindrot.org>
5305Date: Thu Jan 16 18:42:10 2014 +1100
5306
5307 - djm@cvs.openbsd.org 2014/01/16 07:31:09
5308 [sftp-client.c]
5309 needless and incorrect cast to size_t can break resumption of
5310 large download; patch from tobias@
5311
5312commit 91b580e4bec55118bf96ab3cdbe5a50839e75d0a
5313Author: Damien Miller <djm@mindrot.org>
5314Date: Sun Jan 12 19:21:22 2014 +1100
5315
5316 - djm@cvs.openbsd.org 2014/01/12 08:13:13
5317 [bufaux.c buffer.h kex.c kex.h kexc25519.c kexc25519c.c kexc25519s.c]
5318 [kexdhc.c kexdhs.c kexecdhc.c kexecdhs.c kexgexc.c kexgexs.c]
5319 avoid use of OpenSSL BIGNUM type and functions for KEX with
5320 Curve25519 by adding a buffer_put_bignum2_from_string() that stores
5321 a string using the bignum encoding rules. Will make it easier to
5322 build a reduced-feature OpenSSH without OpenSSL in the future;
5323 ok markus@
5324
5325commit af5d4481f4c7c8c3c746e68b961bb85ef907800e
5326Author: Damien Miller <djm@mindrot.org>
5327Date: Sun Jan 12 19:20:47 2014 +1100
5328
5329 - djm@cvs.openbsd.org 2014/01/10 05:59:19
5330 [sshd_config]
5331 the /etc/ssh/ssh_host_ed25519_key is loaded by default too
5332
5333commit 58cd63bc63038acddfb4051ed14e11179d8f4941
5334Author: Damien Miller <djm@mindrot.org>
5335Date: Fri Jan 10 10:59:24 2014 +1100
5336
5337 - djm@cvs.openbsd.org 2014/01/09 23:26:48
5338 [sshconnect.c sshd.c]
5339 ban clients/servers that suffer from SSH_BUG_DERIVEKEY, they are ancient,
5340 deranged and might make some attacks on KEX easier; ok markus@
5341
5342commit b3051d01e505c9c2dc00faab472a0d06fa6b0e65
5343Author: Damien Miller <djm@mindrot.org>
5344Date: Fri Jan 10 10:58:53 2014 +1100
5345
5346 - djm@cvs.openbsd.org 2014/01/09 23:20:00
5347 [digest.c digest.h hostfile.c kex.c kex.h kexc25519.c kexc25519c.c]
5348 [kexc25519s.c kexdh.c kexecdh.c kexecdhc.c kexecdhs.c kexgex.c kexgexc.c]
5349 [kexgexs.c key.c key.h roaming_client.c roaming_common.c schnorr.c]
5350 [schnorr.h ssh-dss.c ssh-ecdsa.c ssh-rsa.c sshconnect2.c]
5351 Introduce digest API and use it to perform all hashing operations
5352 rather than calling OpenSSL EVP_Digest* directly. Will make it easier
5353 to build a reduced-feature OpenSSH without OpenSSL in future;
5354 feedback, ok markus@
5355
5356commit e00e413dd16eb747fb2c15a099971d91c13cf70f
5357Author: Damien Miller <djm@mindrot.org>
5358Date: Fri Jan 10 10:40:45 2014 +1100
5359
5360 - guenther@cvs.openbsd.org 2014/01/09 03:26:00
5361 [sftp-common.c]
5362 When formating the time for "ls -l"-style output, show dates in the future
5363 with the year, and rearrange a comparison to avoid a potentional signed
5364 arithmetic overflow that would give the wrong result.
5365
5366 ok djm@
5367
5368commit 3e49853650448883685cfa32fa382d0ba6d51d48
5369Author: Damien Miller <djm@mindrot.org>
5370Date: Fri Jan 10 10:37:05 2014 +1100
5371
5372 - tedu@cvs.openbsd.org 2014/01/04 17:50:55
5373 [mac.c monitor_mm.c monitor_mm.h xmalloc.c]
5374 use standard types and formats for size_t like variables. ok dtucker
5375
5376commit a9c1e500ef609795cbc662848edb1a1dca279c81
5377Author: Damien Miller <djm@mindrot.org>
5378Date: Wed Jan 8 16:13:12 2014 +1100
5379
5380 - (djm) [regress/.cvsignore] Ignore regress test droppings; ok dtucker@
5381
5382commit 324541e5264e1489ca0babfaf2b39612eb80dfb3
5383Author: Damien Miller <djm@mindrot.org>
5384Date: Tue Dec 31 12:25:40 2013 +1100
5385
5386 - djm@cvs.openbsd.org 2013/12/30 23:52:28
5387 [auth2-hostbased.c auth2-pubkey.c compat.c compat.h ssh-rsa.c]
5388 [sshconnect.c sshconnect2.c sshd.c]
5389 refuse RSA keys from old proprietary clients/servers that use the
5390 obsolete RSA+MD5 signature scheme. it will still be possible to connect
5391 with these clients/servers but only DSA keys will be accepted, and we'll
5392 deprecate them entirely in a future release. ok markus@
5393
5394commit 9f4c8e797ea002a883307ca906f1f1f815010e78
5395Author: Damien Miller <djm@mindrot.org>
5396Date: Sun Dec 29 17:57:46 2013 +1100
5397
5398 - (djm) [regress/Makefile] Add some generated files for cleaning
5399
5400commit 106bf1ca3c7a5fdc34f9fd7a1fe651ca53085bc5
5401Author: Damien Miller <djm@mindrot.org>
5402Date: Sun Dec 29 17:54:03 2013 +1100
5403
5404 - djm@cvs.openbsd.org 2013/12/29 05:57:02
5405 [sshconnect.c]
5406 when showing other hostkeys, don't forget Ed25519 keys
5407
5408commit 0fa47cfb32c239117632cab41e4db7d3e6de5e91
5409Author: Damien Miller <djm@mindrot.org>
5410Date: Sun Dec 29 17:53:39 2013 +1100
5411
5412 - djm@cvs.openbsd.org 2013/12/29 05:42:16
5413 [ssh.c]
5414 don't forget to load Ed25519 certs too
5415
5416commit b9a95490daa04cc307589897f95bfaff324ad2c9
5417Author: Damien Miller <djm@mindrot.org>
5418Date: Sun Dec 29 17:50:15 2013 +1100
5419
5420 - djm@cvs.openbsd.org 2013/12/29 04:35:50
5421 [authfile.c]
5422 don't refuse to load Ed25519 certificates
5423
5424commit f72cdde6e6fabc51d2a62f4e75b8b926d9d7ee89
5425Author: Damien Miller <djm@mindrot.org>
5426Date: Sun Dec 29 17:49:55 2013 +1100
5427
5428 - djm@cvs.openbsd.org 2013/12/29 04:29:25
5429 [authfd.c]
5430 allow deletion of ed25519 keys from the agent
5431
5432commit 29ace1cb68cc378a464c72c0fd67aa5f9acd6b5b
5433Author: Damien Miller <djm@mindrot.org>
5434Date: Sun Dec 29 17:49:31 2013 +1100
5435
5436 - djm@cvs.openbsd.org 2013/12/29 04:20:04
5437 [key.c]
5438 to make sure we don't omit any key types as valid CA keys again,
5439 factor the valid key type check into a key_type_is_valid_ca()
5440 function
5441
5442commit 9de4fcdc5a9cff48d49a3e2f6194d3fb2d7ae34d
5443Author: Damien Miller <djm@mindrot.org>
5444Date: Sun Dec 29 17:49:13 2013 +1100
5445
5446 - djm@cvs.openbsd.org 2013/12/29 02:49:52
5447 [key.c]
5448 correct comment for key_drop_cert()
5449
5450commit 5baeacf8a80f054af40731c6f92435f9164b8e02
5451Author: Damien Miller <djm@mindrot.org>
5452Date: Sun Dec 29 17:48:55 2013 +1100
5453
5454 - djm@cvs.openbsd.org 2013/12/29 02:37:04
5455 [key.c]
5456 correct comment for key_to_certified()
5457
5458commit 83f2fe26cb19330712c952eddbd3c0b621674adc
5459Author: Damien Miller <djm@mindrot.org>
5460Date: Sun Dec 29 17:48:38 2013 +1100
5461
5462 - djm@cvs.openbsd.org 2013/12/29 02:28:10
5463 [key.c]
5464 allow ed25519 keys to appear as certificate authorities
5465
5466commit 06122e9a74bb488b0fe0a8f64e1135de870f9cc0
5467Author: Damien Miller <djm@mindrot.org>
5468Date: Sun Dec 29 17:48:15 2013 +1100
5469
5470 - djm@cvs.openbsd.org 2013/12/27 22:37:18
5471 [ssh-rsa.c]
5472 correct comment
5473
5474commit 3e19295c3a253c8dc8660cf45baad7f45fccb969
5475Author: Damien Miller <djm@mindrot.org>
5476Date: Sun Dec 29 17:47:50 2013 +1100
5477
5478 - djm@cvs.openbsd.org 2013/12/27 22:30:17
5479 [ssh-dss.c ssh-ecdsa.c ssh-rsa.c]
5480 make the original RSA and DSA signing/verification code look more like
5481 the ECDSA/Ed25519 ones: use key_type_plain() when checking the key type
5482 rather than tediously listing all variants, use __func__ for debug/
5483 error messages
5484
5485commit 137977180be6254639e2c90245763e6965f8d815
5486Author: Damien Miller <djm@mindrot.org>
5487Date: Sun Dec 29 17:47:14 2013 +1100
5488
5489 - tedu@cvs.openbsd.org 2013/12/21 07:10:47
5490 [ssh-keygen.1]
5491 small typo
5492
5493commit 339a48fe7ffb3186d22bbaa9efbbc3a053e602fd
5494Author: Damien Miller <djm@mindrot.org>
5495Date: Sun Dec 29 17:46:49 2013 +1100
5496
5497 - djm@cvs.openbsd.org 2013/12/19 22:57:13
5498 [poly1305.c poly1305.h]
5499 use full name for author, with his permission
5500
5501commit 0b36c83148976c7c8268f4f41497359e2fb26251
5502Author: Damien Miller <djm@mindrot.org>
5503Date: Sun Dec 29 17:45:51 2013 +1100
5504
5505 - djm@cvs.openbsd.org 2013/12/19 01:19:41
5506 [ssh-agent.c]
5507 bz#2186: don't crash (NULL deref) when deleting PKCS#11 keys from an agent
5508 that has a mix of normal and PKCS#11 keys; fix from jay AT slushpupie.com;
5509 ok dtucker
5510
5511commit 4def184e9b6c36be6d965a9705632fc4c0c2a8af
5512Author: Damien Miller <djm@mindrot.org>
5513Date: Sun Dec 29 17:45:26 2013 +1100
5514
5515 - djm@cvs.openbsd.org 2013/12/19 01:04:36
5516 [channels.c]
5517 bz#2147: fix multiple remote forwardings with dynamically assigned
5518 listen ports. In the s->c message to open the channel we were sending
5519 zero (the magic number to request a dynamic port) instead of the actual
5520 listen port. The client therefore had no way of discriminating between
5521 them.
5522
5523 Diagnosis and fix by ronf AT timeheart.net
5524
5525commit bf25d114e23a803f8feca8926281b1aaedb6191b
5526Author: Damien Miller <djm@mindrot.org>
5527Date: Sun Dec 29 17:44:56 2013 +1100
5528
5529 - djm@cvs.openbsd.org 2013/12/19 00:27:57
5530 [auth-options.c]
5531 simplify freeing of source-address certificate restriction
5532
5533commit bb3dafe7024a5b4e851252e65ee35d45b965e4a8
5534Author: Damien Miller <djm@mindrot.org>
5535Date: Sun Dec 29 17:44:29 2013 +1100
5536
5537 - dtucker@cvs.openbsd.org 2013/12/19 00:19:12
5538 [serverloop.c]
5539 Cast client_alive_interval to u_int64_t before assinging to
5540 max_time_milliseconds to avoid potential integer overflow in the timeout.
5541 bz#2170, patch from Loganaden Velvindron, ok djm@
5542
5543commit ef275ead3dcadde4db1efe7a0aa02b5e618ed40c
5544Author: Damien Miller <djm@mindrot.org>
5545Date: Sun Dec 29 17:44:07 2013 +1100
5546
5547 - djm@cvs.openbsd.org 2013/12/19 00:10:30
5548 [ssh-add.c]
5549 skip requesting smartcard PIN when removing keys from agent; bz#2187
5550 patch from jay AT slushpupie.com; ok dtucker
5551
5552commit 7d97fd9a1cae778c3eacf16e09f5da3689d616c6
5553Author: Damien Miller <djm@mindrot.org>
5554Date: Sun Dec 29 17:40:18 2013 +1100
5555
5556 - (djm) [loginrec.c] Check for username truncation when looking up lastlog
5557 entries
5558
5559commit 77244afe3b6d013b485e0952eaab89b9db83380f
5560Author: Darren Tucker <dtucker@zip.com.au>
5561Date: Sat Dec 21 17:02:39 2013 +1100
5562
5563 20131221
5564 - (dtucker) [regress/keytype.sh] Actually test ecdsa key types.
5565
5566commit 53f8e784dc431a82d31c9b0e95b144507f9330e9
5567Author: Darren Tucker <dtucker@zip.com.au>
5568Date: Thu Dec 19 11:31:44 2013 +1100
5569
5570 - (dtucker) [auth-pam.c] bz#2163: check return value from pam_get_item().
5571 Patch from Loganaden Velvindron.
5572
5573commit 1fcec9d4f265e38af248c4c845986ca8c174bd68
5574Author: Darren Tucker <dtucker@zip.com.au>
5575Date: Thu Dec 19 11:00:12 2013 +1100
5576
5577 - (dtucker) [configure.ac] bz#2178: Don't try to use BSM on Solaris versions
5578 greater than 11 either rather than just 11. Patch from Tomas Kuthan.
5579
5580commit 6674eb9683afd1ea4eb35670b5e66815543a759e
5581Author: Damien Miller <djm@mindrot.org>
5582Date: Wed Dec 18 17:50:39 2013 +1100
5583
5584 - markus@cvs.openbsd.org 2013/12/17 10:36:38
5585 [crypto_api.h]
5586 I've assempled the header file by cut&pasting from generated headers
5587 and the source files.
5588
5589commit d58a5964426ee014384d67d775d16712e93057f3
5590Author: Damien Miller <djm@mindrot.org>
5591Date: Wed Dec 18 17:50:13 2013 +1100
5592
5593 - djm@cvs.openbsd.org 2013/12/15 21:42:35
5594 [cipher-chachapoly.c]
5595 add some comments and constify a constant
5596
5597commit 059321d19af24d87420de3193f79dfab23556078
5598Author: Damien Miller <djm@mindrot.org>
5599Date: Wed Dec 18 17:49:48 2013 +1100
5600
5601 - pascal@cvs.openbsd.org 2013/12/15 18:17:26
5602 [ssh-add.c]
5603 Make ssh-add also add .ssh/id_ed25519; fixes lie in manual page.
5604 ok markus@
5605
5606commit 155b5a5bf158767f989215479ded2a57f331e1c6
5607Author: Damien Miller <djm@mindrot.org>
5608Date: Wed Dec 18 17:48:32 2013 +1100
5609
5610 - markus@cvs.openbsd.org 2013/12/09 11:08:17
5611 [crypto_api.h]
5612 remove unused defines
5613
5614commit 8a56dc2b6b48b05590810e7f4c3567508410000c
5615Author: Damien Miller <djm@mindrot.org>
5616Date: Wed Dec 18 17:48:11 2013 +1100
5617
5618 - markus@cvs.openbsd.org 2013/12/09 11:03:45
5619 [blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]
5620 [ge25519_base.data hash.c sc25519.c sc25519.h verify.c]
5621 Add Authors for the public domain ed25519/nacl code.
5622 see also http://nacl.cr.yp.to/features.html
5623 All of the NaCl software is in the public domain.
5624 and http://ed25519.cr.yp.to/software.html
5625 The Ed25519 software is in the public domain.
5626
5627commit 6575c3acf31fca117352f31f37b16ae46e664837
5628Author: Damien Miller <djm@mindrot.org>
5629Date: Wed Dec 18 17:47:02 2013 +1100
5630
5631 - dtucker@cvs.openbsd.org 2013/12/08 09:53:27
5632 [sshd_config.5]
5633 Use a literal for the default value of KEXAlgorithms. ok deraadt jmc
5634
5635commit 8ba0ead6985ea14999265136b14ffd5aeec516f9
5636Author: Damien Miller <djm@mindrot.org>
5637Date: Wed Dec 18 17:46:27 2013 +1100
5638
5639 - naddy@cvs.openbsd.org 2013/12/07 11:58:46
5640 [ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8 ssh.1]
5641 [ssh_config.5 sshd.8 sshd_config.5]
5642 add missing mentions of ed25519; ok djm@
5643
5644commit 4f752cf71cf44bf4bc777541156c2bf56daf9ce9
5645Author: Damien Miller <djm@mindrot.org>
5646Date: Wed Dec 18 17:45:35 2013 +1100
5647
5648 - djm@cvs.openbsd.org 2013/12/07 08:08:26
5649 [ssh-keygen.1]
5650 document -a and -o wrt new key format
5651
5652commit 6d6fcd14e23a9053198342bb379815b15e504084
5653Author: Damien Miller <djm@mindrot.org>
5654Date: Sun Dec 8 15:53:28 2013 +1100
5655
5656 - (djm) [Makefile.in regress/Makefile regress/agent-ptrace.sh]
5657 [regress/setuid-allowed.c] Check that ssh-agent is not on a no-setuid
5658 filesystem before running agent-ptrace.sh; ok dtucker
5659
5660commit 7e6e42fb532c7dafd7078ef5e9e2d3e47fcf6752
5661Author: Damien Miller <djm@mindrot.org>
5662Date: Sun Dec 8 08:23:08 2013 +1100
5663
5664 - (djm) [openbsd-compat/bsd-setres_id.c] Missing header; from Corinna
5665 Vinschen
5666
5667commit da3ca351b49d52ae85db2e3998265dc3c6617068
5668Author: Damien Miller <djm@mindrot.org>
5669Date: Sat Dec 7 21:43:46 2013 +1100
5670
5671 - (djm) [Makefile.in] PATHSUBS and keygen bits for Ed25519; from
5672 Loganaden Velvindron @ AfriNIC in bz#2179
5673
5674commit eb401585bb8336cbf81fe4fc58eb9f7cac3ab874
5675Author: Damien Miller <djm@mindrot.org>
5676Date: Sat Dec 7 17:07:15 2013 +1100
5677
5678 - (djm) [regress/cert-hostkey.sh] Fix merge botch
5679
5680commit f54542af3ad07532188b10136ae302314ec69ed6
5681Author: Damien Miller <djm@mindrot.org>
5682Date: Sat Dec 7 16:32:44 2013 +1100
5683
5684 - markus@cvs.openbsd.org 2013/12/06 13:52:46
5685 [regress/Makefile regress/agent.sh regress/cert-hostkey.sh]
5686 [regress/cert-userkey.sh regress/keytype.sh]
5687 test ed25519 support; from djm@
5688
5689commit f104da263de995f66b6861b4f3368264ee483d7f
5690Author: Damien Miller <djm@mindrot.org>
5691Date: Sat Dec 7 12:37:53 2013 +1100
5692
5693 - (djm) [ed25519.c ssh-ed25519.c openbsd-compat/Makefile.in]
5694 [openbsd-compat/bcrypt_pbkdf.c] Make ed25519/new key format compile on
5695 Linux
5696
5697commit 1ff130dac9b7aea0628f4ad30683431fe35e0020
5698Author: Damien Miller <djm@mindrot.org>
5699Date: Sat Dec 7 11:51:51 2013 +1100
5700
5701 - [configure.ac openbsd-compat/Makefile.in openbsd-compat/bcrypt_pbkdf.c]
5702 [openbsd-compat/blf.h openbsd-compat/blowfish.c]
5703 [openbsd-compat/openbsd-compat.h] Start at supporting bcrypt_pbkdf in
5704 portable.
5705
5706commit 4260828a2958ebe8c96f66d8301dac53f4cde556
5707Author: Damien Miller <djm@mindrot.org>
5708Date: Sat Dec 7 11:38:03 2013 +1100
5709
5710 - [authfile.c] Conditionalise inclusion of util.h
5711
5712commit a913442bac8a26fd296a3add51293f8f6f9b3b4c
5713Author: Damien Miller <djm@mindrot.org>
5714Date: Sat Dec 7 11:35:36 2013 +1100
5715
5716 - [Makefile.in] Add ed25519 sources
5717
5718commit ca570a519cb846da61d002c7f46fa92e39c83e45
5719Author: Damien Miller <djm@mindrot.org>
5720Date: Sat Dec 7 11:29:09 2013 +1100
5721
5722 - djm@cvs.openbsd.org 2013/12/07 00:19:15
5723 [key.c]
5724 set k->cert = NULL after freeing it
5725
5726commit 3cccc0e155229a2f2d86b6df40bd4559b4f960ff
5727Author: Damien Miller <djm@mindrot.org>
5728Date: Sat Dec 7 11:27:47 2013 +1100
5729
5730 - [blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]
5731 [ge25519_base.data hash.c sc25519.c sc25519.h verify.c] Fix RCS idents
5732
5733commit a7827c11b3f0380b7e593664bd62013ff9c131db
5734Author: Damien Miller <djm@mindrot.org>
5735Date: Sat Dec 7 11:24:30 2013 +1100
5736
5737 - jmc@cvs.openbsd.org 2013/12/06 15:29:07
5738 [sshd.8]
5739 missing comma;
5740
5741commit 5be9d9e3cbd9c66f24745d25bf2e809c1d158ee0
5742Author: Damien Miller <djm@mindrot.org>
5743Date: Sat Dec 7 11:24:01 2013 +1100
5744
5745 - markus@cvs.openbsd.org 2013/12/06 13:39:49
5746 [authfd.c authfile.c key.c key.h myproposal.h pathnames.h readconf.c]
5747 [servconf.c ssh-agent.c ssh-keygen.c ssh-keyscan.1 ssh-keyscan.c]
5748 [ssh-keysign.c ssh.c ssh_config.5 sshd.8 sshd.c verify.c ssh-ed25519.c]
5749 [sc25519.h sc25519.c hash.c ge25519_base.data ge25519.h ge25519.c]
5750 [fe25519.h fe25519.c ed25519.c crypto_api.h blocks.c]
5751 support ed25519 keys (hostkeys and user identities) using the public
5752 domain ed25519 reference code from SUPERCOP, see
5753 http://ed25519.cr.yp.to/software.html
5754 feedback, help & ok djm@
5755
5756commit bcd00abd8451f36142ae2ee10cc657202149201e
5757Author: Damien Miller <djm@mindrot.org>
5758Date: Sat Dec 7 10:41:55 2013 +1100
5759
5760 - markus@cvs.openbsd.org 2013/12/06 13:34:54
5761 [authfile.c authfile.h cipher.c cipher.h key.c packet.c ssh-agent.c]
5762 [ssh-keygen.c PROTOCOL.key] new private key format, bcrypt as KDF by
5763 default; details in PROTOCOL.key; feedback and lots help from djm;
5764 ok djm@
5765
5766commit f0e9060d236c0e38bec2fa1c6579fb0a2ea6458d
5767Author: Damien Miller <djm@mindrot.org>
5768Date: Sat Dec 7 10:40:26 2013 +1100
5769
5770 - markus@cvs.openbsd.org 2013/12/06 13:30:08
5771 [authfd.c key.c key.h ssh-agent.c]
5772 move private key (de)serialization to key.c; ok djm
5773
5774commit 0f8536da23a6ef26e6495177c0d8a4242b710289
5775Author: Damien Miller <djm@mindrot.org>
5776Date: Sat Dec 7 10:31:37 2013 +1100
5777
5778 - djm@cvs.openbsd.org 2013/12/06 03:40:51
5779 [ssh-keygen.c]
5780 remove duplicated character ('g') in getopt() string;
5781 document the (few) remaining option characters so we don't have to
5782 rummage next time.
5783
5784commit 393920745fd328d3fe07f739a3cf7e1e6db45b60
5785Author: Damien Miller <djm@mindrot.org>
5786Date: Sat Dec 7 10:31:08 2013 +1100
5787
5788 - djm@cvs.openbsd.org 2013/12/05 22:59:45
5789 [sftp-client.c]
5790 fix memory leak in error path in do_readdir(); pointed out by
5791 Loganaden Velvindron @ AfriNIC in bz#2163
5792
5793commit 534b2ccadea5e5e9a8b27226e6faac3ed5552e97
5794Author: Damien Miller <djm@mindrot.org>
5795Date: Thu Dec 5 14:07:27 2013 +1100
5796
5797 - djm@cvs.openbsd.org 2013/12/05 01:16:41
5798 [servconf.c servconf.h]
5799 bz#2161 - fix AuthorizedKeysCommand inside a Match block and
5800 rearrange things so the same error is harder to make next time;
5801 with and ok dtucker@
5802
5803commit 8369c8e61a3408ec6bb75755fad4ffce29b5fdbe
5804Author: Darren Tucker <dtucker@zip.com.au>
5805Date: Thu Dec 5 11:00:16 2013 +1100
5806
5807 - (dtucker) [configure.ac] bz#2173: use pkg-config --libs to include correct
5808 -L location for libedit. Patch from Serge van den Boom.
5809
5810commit 9275df3e0a2a3bc3897f7d664ea86a425c8a092d
5811Author: Damien Miller <djm@mindrot.org>
5812Date: Thu Dec 5 10:26:32 2013 +1100
5813
5814 - djm@cvs.openbsd.org 2013/12/04 04:20:01
5815 [sftp-client.c]
5816 bz#2171: don't leak local_fd on error; from Loganaden Velvindron @
5817 AfriNIC
5818
5819commit 960f6a2b5254e4da082d8aa3700302ed12dc769a
5820Author: Damien Miller <djm@mindrot.org>
5821Date: Thu Dec 5 10:26:14 2013 +1100
5822
5823 - djm@cvs.openbsd.org 2013/12/02 03:13:14
5824 [cipher.c]
5825 correct bzero of chacha20+poly1305 key context. bz#2177 from
5826 Loganaden Velvindron @ AfriNIC
5827
5828 Also make it a memset for consistency with the rest of cipher.c
5829
5830commit f7e8a8796d661c9d6692ab837e1effd4f5ada1c2
5831Author: Damien Miller <djm@mindrot.org>
5832Date: Thu Dec 5 10:25:51 2013 +1100
5833
5834 - djm@cvs.openbsd.org 2013/12/02 03:09:22
5835 [key.c]
5836 make key_to_blob() return a NULL blob on failure; part of
5837 bz#2175 from Loganaden Velvindron @ AfriNIC
5838
5839commit f1e44ea9d9a6d4c1a95a0024132e603bd1778c9c
5840Author: Damien Miller <djm@mindrot.org>
5841Date: Thu Dec 5 10:23:21 2013 +1100
5842
5843 - djm@cvs.openbsd.org 2013/12/02 02:56:17
5844 [ssh-pkcs11-helper.c]
5845 use-after-free; bz#2175 patch from Loganaden Velvindron @ AfriNIC
5846
5847commit 114e540b15d57618f9ebf624264298f80bbd8c77
5848Author: Damien Miller <djm@mindrot.org>
5849Date: Thu Dec 5 10:22:57 2013 +1100
5850
5851 - djm@cvs.openbsd.org 2013/12/02 02:50:27
5852 [PROTOCOL.chacha20poly1305]
5853 typo; from Jon Cave
5854
5855commit e4870c090629e32f2cb649dc16d575eeb693f4a8
5856Author: Damien Miller <djm@mindrot.org>
5857Date: Thu Dec 5 10:22:39 2013 +1100
5858
5859 - djm@cvs.openbsd.org 2013/12/01 23:19:05
5860 [PROTOCOL]
5861 mention curve25519-sha256@libssh.org key exchange algorithm
5862
5863commit 1d2f8804a6d33a4e908b876b2e1266b8260ec76b
5864Author: Damien Miller <djm@mindrot.org>
5865Date: Thu Dec 5 10:22:03 2013 +1100
5866
5867 - deraadt@cvs.openbsd.org 2013/11/26 19:15:09
5868 [pkcs11.h]
5869 cleanup 1 << 31 idioms. Resurrection of this issue pointed out by
5870 Eitan Adler ok markus for ssh, implies same change in kerberosV
5871
5872commit bdb352a54f82df94a548e3874b22f2d6ae90328d
5873Author: Damien Miller <djm@mindrot.org>
5874Date: Thu Dec 5 10:20:52 2013 +1100
5875
5876 - jmc@cvs.openbsd.org 2013/11/26 12:14:54
5877 [ssh.1 ssh.c]
5878 - put -Q in the right place
5879 - Ar was a poor choice for the arguments to -Q. i've chosen an
5880 admittedly equally poor Cm, at least consistent with the rest
5881 of the docs. also no need for multiple instances
5882 - zap a now redundant Nm
5883 - usage() sync
5884
5885commit d937dc084a087090f1cf5395822c3ac958d33759
5886Author: Damien Miller <djm@mindrot.org>
5887Date: Thu Dec 5 10:19:54 2013 +1100
5888
5889 - deraadt@cvs.openbsd.org 2013/11/25 18:04:21
5890 [ssh.1 ssh.c]
5891 improve -Q usage and such. One usage change is that the option is now
5892 case-sensitive
5893 ok dtucker markus djm
5894
5895commit dec0393f7ee8aabc7d9d0fc2c5fddb4bc649112e
5896Author: Damien Miller <djm@mindrot.org>
5897Date: Thu Dec 5 10:18:43 2013 +1100
5898
5899 - jmc@cvs.openbsd.org 2013/11/21 08:05:09
5900 [ssh_config.5 sshd_config.5]
5901 no need for .Pp before displays;
5902
5903commit 8a073cf57940aabf85e49799f89f5d5e9b072c1b
5904Author: Damien Miller <djm@mindrot.org>
5905Date: Thu Nov 21 14:26:18 2013 +1100
5906
5907 - djm@cvs.openbsd.org 2013/11/21 03:18:51
5908 [regress/cipher-speed.sh regress/integrity.sh regress/rekey.sh]
5909 [regress/try-ciphers.sh]
5910 use new "ssh -Q cipher-auth" query to obtain lists of authenticated
5911 encryption ciphers instead of specifying them manually; ensures that
5912 the new chacha20poly1305@openssh.com mode is tested;
5913
5914 ok markus@ and naddy@ as part of the diff to add
5915 chacha20poly1305@openssh.com
5916
5917commit ea61b2179f63d48968dd2c9617621002bb658bfe
5918Author: Damien Miller <djm@mindrot.org>
5919Date: Thu Nov 21 14:25:15 2013 +1100
5920
5921 - djm@cvs.openbsd.org 2013/11/21 03:16:47
5922 [regress/modpipe.c]
5923 use unsigned long long instead of u_int64_t here to avoid warnings
5924 on some systems portable OpenSSH is built on.
5925
5926commit 36aba25b0409d2db6afc84d54bc47a2532d38424
5927Author: Damien Miller <djm@mindrot.org>
5928Date: Thu Nov 21 14:24:42 2013 +1100
5929
5930 - djm@cvs.openbsd.org 2013/11/21 03:15:46
5931 [regress/krl.sh]
5932 add some reminders for additional tests that I'd like to implement
5933
5934commit fa7a20bc289f09b334808d988746bc260a2f60c9
5935Author: Damien Miller <djm@mindrot.org>
5936Date: Thu Nov 21 14:24:08 2013 +1100
5937
5938 - naddy@cvs.openbsd.org 2013/11/18 05:09:32
5939 [regress/forward-control.sh]
5940 bump timeout to 10 seconds to allow slow machines (e.g. Alpha PC164)
5941 to successfully run this; ok djm@
5942 (ID sync only; our timeouts are already longer)
5943
5944commit 0fde8acdad78a4d20cadae974376cc0165f645ee
5945Author: Damien Miller <djm@mindrot.org>
5946Date: Thu Nov 21 14:12:23 2013 +1100
5947
5948 - djm@cvs.openbsd.org 2013/11/21 00:45:44
5949 [Makefile.in PROTOCOL PROTOCOL.chacha20poly1305 authfile.c chacha.c]
5950 [chacha.h cipher-chachapoly.c cipher-chachapoly.h cipher.c cipher.h]
5951 [dh.c myproposal.h packet.c poly1305.c poly1305.h servconf.c ssh.1]
5952 [ssh.c ssh_config.5 sshd_config.5] Add a new protocol 2 transport
5953 cipher "chacha20-poly1305@openssh.com" that combines Daniel
5954 Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an
5955 authenticated encryption mode.
5956
5957 Inspired by and similar to Adam Langley's proposal for TLS:
5958 http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03
5959 but differs in layout used for the MAC calculation and the use of a
5960 second ChaCha20 instance to separately encrypt packet lengths.
5961 Details are in the PROTOCOL.chacha20poly1305 file.
5962
5963 Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC
5964 ok markus@ naddy@
5965
5966commit fdb2306acdc3eb2bc46b6dfdaaf6005c650af22a
5967Author: Damien Miller <djm@mindrot.org>
5968Date: Thu Nov 21 13:57:15 2013 +1100
5969
5970 - deraadt@cvs.openbsd.org 2013/11/20 20:54:10
5971 [canohost.c clientloop.c match.c readconf.c sftp.c]
5972 unsigned casts for ctype macros where neccessary
5973 ok guenther millert markus
5974
5975commit e00167307e4d3692695441e9bd712f25950cb894
5976Author: Damien Miller <djm@mindrot.org>
5977Date: Thu Nov 21 13:56:49 2013 +1100
5978
5979 - deraadt@cvs.openbsd.org 2013/11/20 20:53:10
5980 [scp.c]
5981 unsigned casts for ctype macros where neccessary
5982 ok guenther millert markus
5983
5984commit 23e00aa6ba9eee0e0c218f2026bf405ad4625832
5985Author: Damien Miller <djm@mindrot.org>
5986Date: Thu Nov 21 13:56:28 2013 +1100
5987
5988 - djm@cvs.openbsd.org 2013/11/20 02:19:01
5989 [sshd.c]
5990 delay closure of in/out fds until after "Bad protocol version
5991 identification..." message, as get_remote_ipaddr/get_remote_port
5992 require them open.
5993
5994commit 867e6934be6521f87f04a5ab86702e2d1b314245
5995Author: Damien Miller <djm@mindrot.org>
5996Date: Thu Nov 21 13:56:06 2013 +1100
5997
5998 - markus@cvs.openbsd.org 2013/11/13 13:48:20
5999 [ssh-pkcs11.c]
6000 add missing braces found by pedro
6001
6002commit 0600c7020f4fe68a780bd7cf21ff541a8d4b568a
6003Author: Damien Miller <djm@mindrot.org>
6004Date: Thu Nov 21 13:55:43 2013 +1100
6005
6006 - dtucker@cvs.openbsd.org 2013/11/08 11:15:19
6007 [bufaux.c bufbn.c buffer.c sftp-client.c sftp-common.c sftp-glob.c]
6008 [uidswap.c] Include stdlib.h for free() as per the man page.
6009
6010commit b6a75b0b93b8faa6f79c3a395ab6c71f3f880b80
6011Author: Darren Tucker <dtucker@zip.com.au>
6012Date: Sun Nov 10 20:25:22 2013 +1100
6013
6014 - (dtucker) [regress/keytype.sh] Populate ECDSA key types to be tested by
6015 querying the ones that are compiled in.
6016
6017commit 2c89430119367eb1bc96ea5ee55de83357e4c926
6018Author: Darren Tucker <dtucker@zip.com.au>
6019Date: Sun Nov 10 12:38:42 2013 +1100
6020
6021 - (dtucker) [key.c] Check for the correct defines for NID_secp521r1.
6022
6023commit dd5264db5f641dbd03186f9e5e83e4b14b3d0003
6024Author: Darren Tucker <dtucker@zip.com.au>
6025Date: Sat Nov 9 22:32:51 2013 +1100
6026
6027 - (dtucker) [configure.ac] Add missing "test".
6028
6029commit 95cb2d4eb08117be061f3ff076adef3e9a5372c3
6030Author: Darren Tucker <dtucker@zip.com.au>
6031Date: Sat Nov 9 22:02:31 2013 +1100
6032
6033 - (dtucker) [configure.ac] Fix brackets in NID_secp521r1 test.
6034
6035commit 37bcef51b3d9d496caecea6394814d2f49a1357f
6036Author: Darren Tucker <dtucker@zip.com.au>
6037Date: Sat Nov 9 18:39:25 2013 +1100
6038
6039 - (dtucker) [configure.ac kex.c key.c myproposal.h] Test for the presence of
6040 NID_X9_62_prime256v1, NID_secp384r1 and NID_secp521r1 and test that the
6041 latter actually works before using it. Fedora (at least) has NID_secp521r1
6042 that doesn't work (see https://bugzilla.redhat.com/show_bug.cgi?id=1021897).
6043
6044commit 6e2fe81f926d995bae4be4a6b5b3c88c1c525187
6045Author: Darren Tucker <dtucker@zip.com.au>
6046Date: Sat Nov 9 16:55:03 2013 +1100
6047
6048 - dtucker@cvs.openbsd.org 2013/11/09 05:41:34
6049 [regress/test-exec.sh regress/rekey.sh]
6050 Use smaller test data files to speed up tests. Grow test datafiles
6051 where necessary for a specific test.
6052
6053commit aff7ef1bb8b7c1eeb1f4812129091c5adbf51848
6054Author: Darren Tucker <dtucker@zip.com.au>
6055Date: Sat Nov 9 00:19:22 2013 +1100
6056
6057 - (dtucker) [contrib/cygwin/ssh-host-config] Simplify host key generation:
6058 rather than testing and generating each key, call ssh-keygen -A.
6059 Patch from vinschen at redhat.com.
6060
6061commit 882abfd3fb3c98cfe70b4fc79224770468b570a5
6062Author: Darren Tucker <dtucker@zip.com.au>
6063Date: Sat Nov 9 00:17:41 2013 +1100
6064
6065 - (dtucker) [Makefile.in configure.ac] Set MALLOC_OPTIONS per platform
6066 and pass in TEST_ENV. Unknown options cause stderr to get polluted
6067 and the stderr-data test to fail.
6068
6069commit 8c333ec23bdf7da917aa20ac6803a2cdd79182c5
6070Author: Darren Tucker <dtucker@zip.com.au>
6071Date: Fri Nov 8 21:12:58 2013 +1100
6072
6073 - (dtucker) [openbsd-compat/bsd-poll.c] Add headers to prevent compile
6074 warnings.
6075
6076commit d94240b2f6b376b6e9de187e4a0cd4b89dfc48cb
6077Author: Darren Tucker <dtucker@zip.com.au>
6078Date: Fri Nov 8 21:10:04 2013 +1100
6079
6080 - (dtucker) [myproposal.h] Conditionally enable CURVE25519_SHA256.
6081
6082commit 1c8ce34909886288a3932dce770deec5449f7bb5
6083Author: Darren Tucker <dtucker@zip.com.au>
6084Date: Fri Nov 8 19:50:32 2013 +1100
6085
6086 - (dtucker) [kex.c] Only enable CURVE25519_SHA256 if we actually have
6087 EVP_sha256.
6088
6089commit ccdb9bec46bcc88549b26a94aa0bae2b9f51031c
6090Author: Darren Tucker <dtucker@zip.com.au>
6091Date: Fri Nov 8 18:54:38 2013 +1100
6092
6093 - (dtucker) [openbsd-compat/openbsd-compat.h] Add null implementation of
6094 arc4random_stir for platforms that have arc4random but don't have
6095 arc4random_stir (right now this is only OpenBSD -current).
6096
6097commit 3420a50169b52cc8d2775d51316f9f866c73398f
6098Author: Damien Miller <djm@mindrot.org>
6099Date: Fri Nov 8 16:48:13 2013 +1100
6100
6101 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
6102 [contrib/suse/openssh.spec] Update version numbers following release.
6103
6104commit 3ac4a234df842fd8c94d9cb0ad198e1fe84b895b
6105Author: Damien Miller <djm@mindrot.org>
6106Date: Fri Nov 8 12:39:49 2013 +1100
6107
6108 - djm@cvs.openbsd.org 2013/11/08 01:38:11
6109 [version.h]
6110 openssh-6.4
6111
6112commit 6c81fee693038de7d4a5559043350391db2a2761
6113Author: Damien Miller <djm@mindrot.org>
6114Date: Fri Nov 8 12:19:55 2013 +1100
6115
6116 - djm@cvs.openbsd.org 2013/11/08 00:39:15
6117 [auth-options.c auth2-chall.c authfd.c channels.c cipher-3des1.c]
6118 [clientloop.c gss-genr.c monitor_mm.c packet.c schnorr.c umac.c]
6119 [sftp-client.c sftp-glob.c]
6120 use calloc for all structure allocations; from markus@
6121
6122commit 690d989008e18af3603a5e03f1276c9bad090370
6123Author: Damien Miller <djm@mindrot.org>
6124Date: Fri Nov 8 12:16:49 2013 +1100
6125
6126 - dtucker@cvs.openbsd.org 2013/11/07 11:58:27
6127 [cipher.c cipher.h kex.c kex.h mac.c mac.h servconf.c ssh.c]
6128 Output the effective values of Ciphers, MACs and KexAlgorithms when
6129 the default has not been overridden. ok markus@
6130
6131commit 08998c5fb9c7c1d248caa73b76e02ca0482e6d85
6132Author: Darren Tucker <dtucker@zip.com.au>
6133Date: Fri Nov 8 12:11:46 2013 +1100
6134
6135 - dtucker@cvs.openbsd.org 2013/11/08 01:06:14
6136 [regress/rekey.sh]
6137 Rekey less frequently during tests to speed them up
6138
6139commit 4bf7e50e533aa956366df7402c132f202e841a48
6140Author: Darren Tucker <dtucker@zip.com.au>
6141Date: Thu Nov 7 22:33:48 2013 +1100
6142
6143 - (dtucker) [Makefile.in configure.ac] Remove TEST_SSH_SHA256 environment
6144 variable. It's no longer used now that we get the supported MACs from
6145 ssh -Q.
6146
6147commit 6e9d6f411288374d1dee4b7debbfa90bc7e73035
6148Author: Darren Tucker <dtucker@zip.com.au>
6149Date: Thu Nov 7 15:32:37 2013 +1100
6150
6151 - dtucker@cvs.openbsd.org 2013/11/07 04:26:56
6152 [regress/kextype.sh]
6153 trailing space
6154
6155commit 74cbc22529f3e5de756e1b7677b7624efb28f62c
6156Author: Darren Tucker <dtucker@zip.com.au>
6157Date: Thu Nov 7 15:26:12 2013 +1100
6158
6159 - dtucker@cvs.openbsd.org 2013/11/07 03:55:41
6160 [regress/kextype.sh]
6161 Use ssh -Q to get kex types instead of a static list.
6162
6163commit a955041c930e63405159ff7d25ef14272f36eab3
6164Author: Darren Tucker <dtucker@zip.com.au>
6165Date: Thu Nov 7 15:21:19 2013 +1100
6166
6167 - dtucker@cvs.openbsd.org 2013/11/07 02:48:38
6168 [regress/integrity.sh regress/cipher-speed.sh regress/try-ciphers.sh]
6169 Use ssh -Q instead of hardcoding lists of ciphers or MACs.
6170
6171commit 06595d639577577bc15d359e037a31eb83563269
6172Author: Darren Tucker <dtucker@zip.com.au>
6173Date: Thu Nov 7 15:08:02 2013 +1100
6174
6175 - dtucker@cvs.openbsd.org 2013/11/07 01:12:51
6176 [regress/rekey.sh]
6177 Factor out the data transfer rekey tests
6178
6179commit 651dc8b2592202dac6b16ee3b82ce5b331be7da3
6180Author: Darren Tucker <dtucker@zip.com.au>
6181Date: Thu Nov 7 15:04:44 2013 +1100
6182
6183 - dtucker@cvs.openbsd.org 2013/11/07 00:12:05
6184 [regress/rekey.sh]
6185 Test rekeying for every Cipher, MAC and KEX, plus test every KEX with
6186 the GCM ciphers.
6187
6188commit 234557762ba1096a867ca6ebdec07efebddb5153
6189Author: Darren Tucker <dtucker@zip.com.au>
6190Date: Thu Nov 7 15:00:51 2013 +1100
6191
6192 - dtucker@cvs.openbsd.org 2013/11/04 12:27:42
6193 [regress/rekey.sh]
6194 Test rekeying with all KexAlgorithms.
6195
6196commit bbfb9b0f386aab0c3e19d11f136199ef1b9ad0ef
6197Author: Darren Tucker <dtucker@zip.com.au>
6198Date: Thu Nov 7 14:56:43 2013 +1100
6199
6200 - markus@cvs.openbsd.org 2013/11/02 22:39:53
6201 [regress/kextype.sh]
6202 add curve25519-sha256@libssh.org
6203
6204commit aa19548a98c0f89283ebd7354abd746ca6bc4fdf
6205Author: Darren Tucker <dtucker@zip.com.au>
6206Date: Thu Nov 7 14:50:09 2013 +1100
6207
6208 - djm@cvs.openbsd.org 2013/10/09 23:44:14
6209 [regress/Makefile] (ID sync only)
6210 regression test for sftp request white/blacklisting and readonly mode.
6211
6212commit c8908aabff252f5da772d4e679479c2b7d18cac1
6213Author: Damien Miller <djm@mindrot.org>
6214Date: Thu Nov 7 13:38:35 2013 +1100
6215
6216 - djm@cvs.openbsd.org 2013/11/06 23:05:59
6217 [ssh-pkcs11.c]
6218 from portable: s/true/true_val/ to avoid name collisions on dump platforms
6219 RCSID sync only
6220
6221commit 49c145c5e89b9d7d48e84328d6347d5ad640b567
6222Author: Damien Miller <djm@mindrot.org>
6223Date: Thu Nov 7 13:35:39 2013 +1100
6224
6225 - markus@cvs.openbsd.org 2013/11/06 16:52:11
6226 [monitor_wrap.c]
6227 fix rekeying for AES-GCM modes; ok deraadt
6228
6229commit 67a8800f290b39fd60e379988c700656ae3f2539
6230Author: Damien Miller <djm@mindrot.org>
6231Date: Thu Nov 7 13:32:51 2013 +1100
6232
6233 - markus@cvs.openbsd.org 2013/11/04 11:51:16
6234 [monitor.c]
6235 fix rekeying for KEX_C25519_SHA256; noted by dtucker@
6236 RCSID sync only; I thought this was a merge botch and fixed it already
6237
6238commit df8b030b15fcec7baf38ec7944f309f9ca8cc9a7
6239Author: Damien Miller <djm@mindrot.org>
6240Date: Thu Nov 7 13:28:16 2013 +1100
6241
6242 - (djm) [configure.ac defines.h] Skip arc4random_stir() calls on platforms
6243 that lack it but have arc4random_uniform()
6244
6245commit a6fd1d3c38a562709374a70fa76423859160aa90
6246Author: Damien Miller <djm@mindrot.org>
6247Date: Thu Nov 7 12:03:26 2013 +1100
6248
6249 - (djm) [regress/modpipe.c regress/rekey.sh] Never intended to commit these
6250
6251commit c98319750b0bbdd0d1794420ec97d65dd9244613
6252Author: Damien Miller <djm@mindrot.org>
6253Date: Thu Nov 7 12:00:23 2013 +1100
6254
6255 - (djm) [Makefile.in monitor.c] Missed chunks of curve25519 KEX diff
6256
6257commit 61c5c2319e84a58210810d39b062c8b8e3321160
6258Author: Damien Miller <djm@mindrot.org>
6259Date: Thu Nov 7 11:34:14 2013 +1100
6260
6261 - (djm) [ssh-pkcs11.c] Bring back "non-constant initialiser" fix (rev 1.5)
6262 that got lost in recent merge.
6263
6264commit 094003f5454a9f5a607674b2739824a7e91835f4
6265Author: Damien Miller <djm@mindrot.org>
6266Date: Mon Nov 4 22:59:27 2013 +1100
6267
6268 - (djm) [kexc25519.c kexc25519c.c kexc25519s.c] Import missed files from
6269 KEX/curve25519 change
6270
6271commit ca67a7eaf8766499ba67801d0be8cdaa550b9a50
6272Author: Damien Miller <djm@mindrot.org>
6273Date: Mon Nov 4 09:05:17 2013 +1100
6274
6275 - djm@cvs.openbsd.org 2013/11/03 10:37:19
6276 [roaming_common.c]
6277 fix a couple of function definitions foo() -> foo(void)
6278 (-Wold-style-definition)
6279
6280commit 0bd8f1519d51af8d4229be81e8f2f4903a1d440b
6281Author: Damien Miller <djm@mindrot.org>
6282Date: Mon Nov 4 08:55:43 2013 +1100
6283
6284 - markus@cvs.openbsd.org 2013/11/02 22:39:19
6285 [ssh_config.5 sshd_config.5]
6286 the default kex is now curve25519-sha256@libssh.org
6287
6288commit 4c3ba0767fbe4a8a2a748df4035aaf86651f6b30
6289Author: Damien Miller <djm@mindrot.org>
6290Date: Mon Nov 4 08:40:13 2013 +1100
6291
6292 - markus@cvs.openbsd.org 2013/11/02 22:34:01
6293 [auth-options.c]
6294 no need to include monitor_wrap.h and ssh-gss.h
6295
6296commit 660621b2106b987b874c2f120218bec249d0f6ba
6297Author: Damien Miller <djm@mindrot.org>
6298Date: Mon Nov 4 08:37:51 2013 +1100
6299
6300 - markus@cvs.openbsd.org 2013/11/02 22:24:24
6301 [kexdhs.c kexecdhs.c]
6302 no need to include ssh-gss.h
6303
6304commit abdca986decfbbc008c895195b85e879ed460ada
6305Author: Damien Miller <djm@mindrot.org>
6306Date: Mon Nov 4 08:30:05 2013 +1100
6307
6308 - markus@cvs.openbsd.org 2013/11/02 22:10:15
6309 [kexdhs.c kexecdhs.c]
6310 no need to include monitor_wrap.h
6311
6312commit 1e1242604eb0fd510fe93f81245c529237ffc513
6313Author: Damien Miller <djm@mindrot.org>
6314Date: Mon Nov 4 08:26:52 2013 +1100
6315
6316 - markus@cvs.openbsd.org 2013/11/02 21:59:15
6317 [kex.c kex.h myproposal.h ssh-keyscan.c sshconnect2.c sshd.c]
6318 use curve25519 for default key exchange (curve25519-sha256@libssh.org);
6319 initial patch from Aris Adamantiadis; ok djm@
6320
6321commit d2252c79191d069372ed6effce7c7a2de93448cd
6322Author: Damien Miller <djm@mindrot.org>
6323Date: Mon Nov 4 07:41:48 2013 +1100
6324
6325 - markus@cvs.openbsd.org 2013/11/02 20:03:54
6326 [ssh-pkcs11.c]
6327 support pkcs#11 tokes that only provide x509 zerts instead of raw pubkeys;
6328 fixes bz#1908; based on patch from Laurent Barbe; ok djm
6329
6330commit 007e3b357e880caa974d5adf9669298ba0751c78
6331Author: Darren Tucker <dtucker@zip.com.au>
6332Date: Sun Nov 3 18:43:55 2013 +1100
6333
6334 - (dtucker) [configure.ac defines.h] Add typedefs for intmax_t and uintmax_t
6335 for platforms that don't have them.
6336
6337commit 710f3747352fb93a63e5b69b12379da37f5b3fa9
6338Author: Darren Tucker <dtucker@zip.com.au>
6339Date: Sun Nov 3 17:20:34 2013 +1100
6340
6341 - (dtucker) [openbsd-compat/setproctitle.c] Handle error case form the 2nd
6342 vsnprintf. From eric at openbsd via chl@.
6343
6344commit d52770452308e5c2e99f4da6edaaa77ef078b610
6345Author: Darren Tucker <dtucker@zip.com.au>
6346Date: Sun Nov 3 16:30:46 2013 +1100
6347
6348 - (dtucker) [openbsd-compat/bsd-misc.c] Include time.h for nanosleep.
6349 From OpenSMTPD where it prevents "implicit declaration" warnings (it's
6350 a no-op in OpenSSH). From chl at openbsd.
6351
6352commit 63857c9340d3482746a5622ffdacc756751f6448
6353Author: Damien Miller <djm@mindrot.org>
6354Date: Wed Oct 30 22:31:06 2013 +1100
6355
6356 - jmc@cvs.openbsd.org 2013/10/29 18:49:32
6357 [sshd_config.5]
6358 pty(4), not pty(7);
6359
6360commit 5ff30c6b68adeee767dd29bf2369763c6a13c0b3
6361Author: Damien Miller <djm@mindrot.org>
6362Date: Wed Oct 30 22:21:50 2013 +1100
6363
6364 - djm@cvs.openbsd.org 2013/10/29 09:48:02
6365 [servconf.c servconf.h session.c sshd_config sshd_config.5]
6366 shd_config PermitTTY to disallow TTY allocation, mirroring the
6367 longstanding no-pty authorized_keys option;
6368 bz#2070, patch from Teran McKinney; ok markus@
6369
6370commit 4a3a9d4bbf8048473f5cc202cd8db7164d5e6b8d
6371Author: Damien Miller <djm@mindrot.org>
6372Date: Wed Oct 30 22:19:47 2013 +1100
6373
6374 - djm@cvs.openbsd.org 2013/10/29 09:42:11
6375 [key.c key.h]
6376 fix potential stack exhaustion caused by nested certificates;
6377 report by Mateusz Kocielski; ok dtucker@ markus@
6378
6379commit 28631ceaa7acd9bc500f924614431542893c6a21
6380Author: Damien Miller <djm@mindrot.org>
6381Date: Sat Oct 26 10:07:56 2013 +1100
6382
6383 - djm@cvs.openbsd.org 2013/10/25 23:04:51
6384 [ssh.c]
6385 fix crash when using ProxyCommand caused by previous commit - was calling
6386 freeaddrinfo(NULL); spotted by sthen@ and Tim Ruehsen, patch by sthen@
6387
6388commit 26506ad29350c5681815745cc90b3952a84cf118
6389Author: Damien Miller <djm@mindrot.org>
6390Date: Sat Oct 26 10:05:46 2013 +1100
6391
6392 - (djm) [ssh-keygen.c ssh-keysign.c sshconnect1.c sshd.c] Remove
6393 unnecessary arc4random_stir() calls. The only ones left are to ensure
6394 that the PRNG gets a different state after fork() for platforms that
6395 have broken the API.
6396
6397commit bd43e8872325e9bbb3319c89da593614709f317c
6398Author: Tim Rice <tim@multitalents.net>
6399Date: Thu Oct 24 12:22:49 2013 -0700
6400
6401 - (tim) [regress/sftp-perm.sh] We need a shell that understands "! somecmd"
6402
6403commit a90c0338083ee0e4064c4bdf61f497293a699be0
6404Author: Damien Miller <djm@mindrot.org>
6405Date: Thu Oct 24 21:03:17 2013 +1100
6406
6407 - djm@cvs.openbsd.org 2013/10/24 08:19:36
6408 [ssh.c]
6409 fix bug introduced in hostname canonicalisation commit: don't try to
6410 resolve hostnames when a ProxyCommand is set unless the user has forced
6411 canonicalisation; spotted by Iain Morgan
6412
6413commit cf31f3863425453ffcda540fbefa9df80088c8d1
6414Author: Damien Miller <djm@mindrot.org>
6415Date: Thu Oct 24 21:02:56 2013 +1100
6416
6417 - dtucker@cvs.openbsd.org 2013/10/24 00:51:48
6418 [readconf.c servconf.c ssh_config.5 sshd_config.5]
6419 Disallow empty Match statements and add "Match all" which matches
6420 everything. ok djm, man page help jmc@
6421
6422commit 4bedd4032a09ce87322ae5ea80f193f109e5c607
6423Author: Damien Miller <djm@mindrot.org>
6424Date: Thu Oct 24 21:02:26 2013 +1100
6425
6426 - dtucker@cvs.openbsd.org 2013/10/24 00:49:49
6427 [moduli.c]
6428 Periodically print progress and, if possible, expected time to completion
6429 when screening moduli for DH groups. ok deraadt djm
6430
6431commit 5ecb41629860687b145be63b8877fabb6bae5eda
6432Author: Damien Miller <djm@mindrot.org>
6433Date: Thu Oct 24 21:02:02 2013 +1100
6434
6435 - djm@cvs.openbsd.org 2013/10/23 23:35:32
6436 [sshd.c]
6437 include local address and port in "Connection from ..." message (only
6438 shown at loglevel>=verbose)
6439
6440commit 03bf2e61ad6ac59a362a1f11b105586cb755c147
6441Author: Damien Miller <djm@mindrot.org>
6442Date: Thu Oct 24 21:01:26 2013 +1100
6443
6444 - dtucker@cvs.openbsd.org 2013/10/23 05:40:58
6445 [servconf.c]
6446 fix comment
6447
6448commit 8f1873191478847773906af961c8984d02a49dd6
6449Author: Damien Miller <djm@mindrot.org>
6450Date: Thu Oct 24 10:53:02 2013 +1100
6451
6452 - (djm) [auth-krb5.c] bz#2032 - use local username in krb5_kuserok check
6453 rather than full client name which may be of form user@REALM;
6454 patch from Miguel Sanders; ok dtucker@
6455
6456commit 5b01b0dcb417eb615df77e7ce1b59319bf04342c
6457Author: Damien Miller <djm@mindrot.org>
6458Date: Wed Oct 23 16:31:31 2013 +1100
6459
6460 - djm@cvs.openbsd.org 2013/10/23 04:16:22
6461 [ssh-keygen.c]
6462 Make code match documentation: relative-specified certificate expiry time
6463 should be relative to current time and not the validity start time.
6464 Reported by Petr Lautrbach; ok deraadt@
6465
6466commit eff5cada589f25793dbe63a76aba9da39837a148
6467Author: Damien Miller <djm@mindrot.org>
6468Date: Wed Oct 23 16:31:10 2013 +1100
6469
6470 - djm@cvs.openbsd.org 2013/10/23 03:05:19
6471 [readconf.c ssh.c]
6472 comment
6473
6474commit 084bcd24e9fe874020e4df4e073e7408e1b17fb7
6475Author: Damien Miller <djm@mindrot.org>
6476Date: Wed Oct 23 16:30:51 2013 +1100
6477
6478 - djm@cvs.openbsd.org 2013/10/23 03:03:07
6479 [readconf.c]
6480 Hostname may have %h sequences that should be expanded prior to Match
6481 evaluation; spotted by Iain Morgan
6482
6483commit 8e5a67f46916def40b2758bb7755350dd2eee843
6484Author: Damien Miller <djm@mindrot.org>
6485Date: Wed Oct 23 16:30:25 2013 +1100
6486
6487 - jmc@cvs.openbsd.org 2013/10/20 18:00:13
6488 [ssh_config.5]
6489 tweak the "exec" description, as worded by djm;
6490
6491commit c0049bd0bca02890cd792babc594771c563f91f2
6492Author: Damien Miller <djm@mindrot.org>
6493Date: Wed Oct 23 16:29:59 2013 +1100
6494
6495 - djm@cvs.openbsd.org 2013/10/20 09:51:26
6496 [scp.1 sftp.1]
6497 add canonicalisation options to -o lists
6498
6499commit 8a04be795fc28514a09e55a54b2e67968f2e1b3a
6500Author: Damien Miller <djm@mindrot.org>
6501Date: Wed Oct 23 16:29:40 2013 +1100
6502
6503 - djm@cvs.openbsd.org 2013/10/20 06:19:28
6504 [readconf.c ssh_config.5]
6505 rename "command" subclause of the recently-added "Match" keyword to
6506 "exec"; it's shorter, clearer in intent and we might want to add the
6507 ability to match against the command being executed at the remote end in
6508 the future.
6509
6510commit 5c86ebdf83b636b6741db4b03569ef4a53b89a58
6511Author: Damien Miller <djm@mindrot.org>
6512Date: Wed Oct 23 16:29:12 2013 +1100
6513
6514 - djm@cvs.openbsd.org 2013/10/20 04:39:28
6515 [ssh_config.5]
6516 document % expansions performed by "Match command ..."
6517
6518commit 4502f88774edc56194707167443f94026d3c7cfa
6519Author: Damien Miller <djm@mindrot.org>
6520Date: Fri Oct 18 10:17:36 2013 +1100
6521
6522 - djm@cvs.openbsd.org 2013/10/17 22:08:04
6523 [sshd.c]
6524 include remote port in bad banner message; bz#2162
6525
6526commit 1edcbf65ebd2febeaf10a836468f35e519eed7ca
6527Author: Damien Miller <djm@mindrot.org>
6528Date: Fri Oct 18 10:17:17 2013 +1100
6529
6530 - jmc@cvs.openbsd.org 2013/10/17 07:35:48
6531 [sftp.1 sftp.c]
6532 tweak previous;
6533
6534commit a176e1823013dd8533a20235b3a5131f0626f46b
6535Author: Damien Miller <djm@mindrot.org>
6536Date: Fri Oct 18 09:05:41 2013 +1100
6537
6538 - djm@cvs.openbsd.org 2013/10/09 23:44:14
6539 [regress/Makefile regress/sftp-perm.sh]
6540 regression test for sftp request white/blacklisting and readonly mode.
6541
6542commit e3ea09494dcfe7ba76536e95765c8328ecfc18fb
6543Author: Damien Miller <djm@mindrot.org>
6544Date: Thu Oct 17 11:57:23 2013 +1100
6545
6546 - djm@cvs.openbsd.org 2013/10/17 00:46:49
6547 [ssh.c]
6548 rearrange check to reduce diff against -portable
6549 (Id sync only)
6550
6551commit f29238e67471a7f1088a99c3c3dbafce76b790cf
6552Author: Damien Miller <djm@mindrot.org>
6553Date: Thu Oct 17 11:48:52 2013 +1100
6554
6555 - djm@cvs.openbsd.org 2013/10/17 00:30:13
6556 [PROTOCOL sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c]
6557 fsync@openssh.com protocol extension for sftp-server
6558 client support to allow calling fsync() faster successful transfer
6559 patch mostly by imorgan AT nas.nasa.gov; bz#1798
6560 "fine" markus@ "grumble OK" deraadt@ "doesn't sound bad to me" millert@
6561
6562commit 51682faa599550a69d8120e5e2bdbdc0625ef4be
6563Author: Damien Miller <djm@mindrot.org>
6564Date: Thu Oct 17 11:48:31 2013 +1100
6565
6566 - djm@cvs.openbsd.org 2013/10/16 22:58:01
6567 [ssh.c ssh_config.5]
6568 one I missed in previous: s/isation/ization/
6569
6570commit 3850559be93f1a442ae9ed370e8c389889dd5f72
6571Author: Damien Miller <djm@mindrot.org>
6572Date: Thu Oct 17 11:48:13 2013 +1100
6573
6574 - djm@cvs.openbsd.org 2013/10/16 22:49:39
6575 [readconf.c readconf.h ssh.1 ssh.c ssh_config.5]
6576 s/canonicalise/canonicalize/ for consistency with existing spelling,
6577 e.g. authorized_keys; pointed out by naddy@
6578
6579commit 607af3434b75acc7199a5d99d5a9c11068c01f27
6580Author: Damien Miller <djm@mindrot.org>
6581Date: Thu Oct 17 11:47:51 2013 +1100
6582
6583 - jmc@cvs.openbsd.org 2013/10/16 06:42:25
6584 [ssh_config.5]
6585 tweak previous;
6586
6587commit 0faf747e2f77f0f7083bcd59cbed30c4b5448444
6588Author: Damien Miller <djm@mindrot.org>
6589Date: Thu Oct 17 11:47:23 2013 +1100
6590
6591 - djm@cvs.openbsd.org 2013/10/16 02:31:47
6592 [readconf.c readconf.h roaming_client.c ssh.1 ssh.c ssh_config.5]
6593 [sshconnect.c sshconnect.h]
6594 Implement client-side hostname canonicalisation to allow an explicit
6595 search path of domain suffixes to use to convert unqualified host names
6596 to fully-qualified ones for host key matching.
6597 This is particularly useful for host certificates, which would otherwise
6598 need to list unqualified names alongside fully-qualified ones (and this
6599 causes a number of problems).
6600 "looks fine" markus@
6601
6602commit d77b81f856e078714ec6b0f86f61c20249b7ead4
6603Author: Damien Miller <djm@mindrot.org>
6604Date: Thu Oct 17 11:39:00 2013 +1100
6605
6606 - jmc@cvs.openbsd.org 2013/10/15 14:10:25
6607 [ssh.1 ssh_config.5]
6608 tweak previous;
6609
6610commit dcd39f29ce3308dc74a0ff27a9056205a932ce05
6611Author: Damien Miller <djm@mindrot.org>
6612Date: Thu Oct 17 11:31:40 2013 +1100
6613
6614 - [ssh.c] g/c unused variable.
6615
6616commit 5359a628ce3763408da25d83271a8eddec597a0c
6617Author: Damien Miller <djm@mindrot.org>
6618Date: Tue Oct 15 12:20:37 2013 +1100
6619
6620 - [ssh.c] g/c unused variable.
6621
6622commit 386feab0c4736b054585ee8ee372865d5cde8d69
6623Author: Damien Miller <djm@mindrot.org>
6624Date: Tue Oct 15 12:14:49 2013 +1100
6625
6626 - djm@cvs.openbsd.org 2013/10/14 23:31:01
6627 [ssh.c]
6628 whitespace at EOL; pointed out by markus@
6629
6630commit e9fc72edd6c313b670558cd5219601c38a949b67
6631Author: Damien Miller <djm@mindrot.org>
6632Date: Tue Oct 15 12:14:12 2013 +1100
6633
6634 - djm@cvs.openbsd.org 2013/10/14 23:28:23
6635 [canohost.c misc.c misc.h readconf.c sftp-server.c ssh.c]
6636 refactor client config code a little:
6637 add multistate option partsing to readconf.c, similar to servconf.c's
6638 existing code.
6639 move checking of options that accept "none" as an argument to readconf.c
6640 add a lowercase() function and use it instead of explicit tolower() in
6641 loops
6642 part of a larger diff that was ok markus@
6643
6644commit 194fd904d8597a274b93e075b2047afdf5a175d4
6645Author: Damien Miller <djm@mindrot.org>
6646Date: Tue Oct 15 12:13:05 2013 +1100
6647
6648 - djm@cvs.openbsd.org 2013/10/14 22:22:05
6649 [readconf.c readconf.h ssh-keysign.c ssh.c ssh_config.5]
6650 add a "Match" keyword to ssh_config that allows matching on hostname,
6651 user and result of arbitrary commands. "nice work" markus@
6652
6653commit 71df752de2a04f423b1cd18d961a79f4fbccbcee
6654Author: Damien Miller <djm@mindrot.org>
6655Date: Tue Oct 15 12:12:02 2013 +1100
6656
6657 - djm@cvs.openbsd.org 2013/10/14 21:20:52
6658 [session.c session.h]
6659 Add logging of session starts in a useful format; ok markus@ feedback and
6660 ok dtucker@
6661
6662commit 6efab27109b82820e8d32a5d811adb7bfc354f65
6663Author: Damien Miller <djm@mindrot.org>
6664Date: Tue Oct 15 12:07:05 2013 +1100
6665
6666 - jmc@cvs.openbsd.org 2013/10/14 14:18:56
6667 [sftp-server.8 sftp-server.c]
6668 tweak previous;
6669 ok djm
6670
6671commit 61c7de8a94156f6d7e9718ded9be8c65bb902b66
6672Author: Damien Miller <djm@mindrot.org>
6673Date: Tue Oct 15 12:06:45 2013 +1100
6674
6675 - djm@cvs.openbsd.org 2013/10/11 02:53:45
6676 [sftp-client.h]
6677 obsolete comment
6678
6679commit 2f93d0556e4892208c9b072624caa8cc5ddd839d
6680Author: Damien Miller <djm@mindrot.org>
6681Date: Tue Oct 15 12:06:27 2013 +1100
6682
6683 - djm@cvs.openbsd.org 2013/10/11 02:52:23
6684 [sftp-client.c]
6685 missed one arg reorder
6686
6687commit bda5c8445713ae592d969a5105ed1a65da22bc96
6688Author: Damien Miller <djm@mindrot.org>
6689Date: Tue Oct 15 12:05:58 2013 +1100
6690
6691 - djm@cvs.openbsd.org 2013/10/11 02:45:36
6692 [sftp-client.c]
6693 rename flag arguments to be more clear and consistent.
6694 reorder some internal function arguments to make adding additional flags
6695 easier.
6696 no functional change
6697
6698commit 61ee4d68ca0fcc793a826fc7ec70f3b8ffd12ab6
6699Author: Damien Miller <djm@mindrot.org>
6700Date: Tue Oct 15 11:56:47 2013 +1100
6701
6702 - djm@cvs.openbsd.org 2013/10/10 01:43:03
6703 [sshd.c]
6704 bz#2139: fix re-exec fallback by ensuring that startup_pipe is correctly
6705 updated; ok dtucker@
6706
6707commit 73600e51af9ee734a19767e0c084bbbc5eb5b8da
6708Author: Damien Miller <djm@mindrot.org>
6709Date: Tue Oct 15 11:56:25 2013 +1100
6710
6711 - djm@cvs.openbsd.org 2013/10/10 00:53:25
6712 [sftp-server.c]
6713 add -Q, -P and -p to usage() before jmc@ catches me
6714
6715commit 6eaeebf27d92f39a38c772aa3f20c2250af2dd29
6716Author: Damien Miller <djm@mindrot.org>
6717Date: Tue Oct 15 11:55:57 2013 +1100
6718
6719 - djm@cvs.openbsd.org 2013/10/09 23:42:17
6720 [sftp-server.8 sftp-server.c]
6721 Add ability to whitelist and/or blacklist sftp protocol requests by name.
6722 Refactor dispatch loop and consolidate read-only mode checks.
6723 Make global variables static, since sftp-server is linked into sshd(8).
6724 ok dtucker@
6725
6726commit df62d71e64d29d1054e7a53d1a801075ef70335f
6727Author: Darren Tucker <dtucker@zip.com.au>
6728Date: Thu Oct 10 10:32:39 2013 +1100
6729
6730 - dtucker@cvs.openbsd.org 2013/10/08 11:42:13
6731 [dh.c dh.h]
6732 Increase the size of the Diffie-Hellman groups requested for a each
6733 symmetric key size. New values from NIST Special Publication 800-57 with
6734 the upper limit specified by RFC4419. Pointed out by Peter Backes, ok
6735 djm@.
6736
6737commit e6e52f8c5dc89a6767702e65bb595aaf7bc8991c
6738Author: Darren Tucker <dtucker@zip.com.au>
6739Date: Thu Oct 10 10:28:07 2013 +1100
6740
6741 - djm@cvs.openbsd.org 2013/09/19 01:26:29
6742 [sshconnect.c]
6743 bz#1211: make BindAddress work with UsePrivilegedPort=yes; patch from
6744 swp AT swp.pp.ru; ok dtucker@
6745
6746commit 71152bc9911bc34a98810b2398dac20df3fe8de3
6747Author: Darren Tucker <dtucker@zip.com.au>
6748Date: Thu Oct 10 10:27:21 2013 +1100
6749
6750 - djm@cvs.openbsd.org 2013/09/19 01:24:46
6751 [channels.c]
6752 bz#1297 - tell the client (via packet_send_debug) when their preferred
6753 listen address has been overridden by the server's GatewayPorts;
6754 ok dtucker@
6755
6756commit b59aaf3c4f3f449a4b86d8528668bd979be9aa5f
6757Author: Darren Tucker <dtucker@zip.com.au>
6758Date: Thu Oct 10 10:26:21 2013 +1100
6759
6760 - djm@cvs.openbsd.org 2013/09/19 00:49:12
6761 [sftp-client.c]
6762 fix swapped pflag and printflag in sftp upload_dir; from Iain Morgan
6763
6764commit 5d80e4522d6238bdefe9d0c634f0e6d35a241e41
6765Author: Darren Tucker <dtucker@zip.com.au>
6766Date: Thu Oct 10 10:25:09 2013 +1100
6767
6768 - djm@cvs.openbsd.org 2013/09/19 00:24:52
6769 [progressmeter.c]
6770 store the initial file offset so the progress meter doesn't freak out
6771 when resuming sftp transfers. bz#2137; patch from Iain Morgan; ok dtucker@
6772
6773commit ad92df7e5ed26fea85adfb3f95352d6cd8e86344
6774Author: Darren Tucker <dtucker@zip.com.au>
6775Date: Thu Oct 10 10:24:11 2013 +1100
6776
6777 - sthen@cvs.openbsd.org 2013/09/16 11:35:43
6778 [ssh_config]
6779 Remove gssapi config parts from ssh_config, as was already done for
6780 sshd_config. Req by/ok ajacoutot@
6781 ID SYNC ONLY for portable; kerberos/gssapi is still pretty popular
6782
6783commit 720711960b130d36dfdd3d50eb25ef482bdd000e
6784Author: Damien Miller <djm@mindrot.org>
6785Date: Wed Oct 9 10:44:47 2013 +1100
6786
6787 - (djm) [openbsd-compat/Makefile.in openbsd-compat/arc4random.c]
6788 [openbsd-compat/bsd-arc4random.c] Replace old RC4-based arc4random
6789 implementation with recent OpenBSD's ChaCha-based PRNG. ok dtucker@,
6790 tested tim@
6791
6792commit 9159310087a218e28940a592896808b8eb76a039
6793Author: Damien Miller <djm@mindrot.org>
6794Date: Wed Oct 9 10:42:32 2013 +1100
6795
6796 - (djm) [openbsd-compat/arc4random.c openbsd-compat/chacha_private.h] Pull
6797 in OpenBSD implementation of arc4random, shortly to replace the existing
6798 bsd-arc4random.c
6799
6800commit 67f1d557a68d6fa8966a327d7b6dee3408cf0e72
6801Author: Damien Miller <djm@mindrot.org>
6802Date: Wed Oct 9 09:33:08 2013 +1100
6803
6804 correct incorrect years in datestamps; from des
6805
6806commit f2bf36c3eb4d969f85ec8aa342e9aecb61cc8bb1
6807Author: Darren Tucker <dtucker@zip.com.au>
6808Date: Sun Sep 22 19:02:40 2013 +1000
6809
6810 - (dtucker) [platform.c platform.h sshd.c] bz#2156: restore Linux oom_adj
6811 setting when handling SIGHUP to maintain behaviour over retart. Patch
6812 from Matthew Ife.
6813
6814commit e90a06ae570fd259a2f5ced873c7f17390f535a5
6815Author: Darren Tucker <dtucker@zip.com.au>
6816Date: Wed Sep 18 15:09:38 2013 +1000
6817
6818 - (dtucker) [sshd_config] Trailing whitespace; from jstjohn at purdue edu.
6819
6820commit 13840e0103946982cee2a05c40697be7e57dca41
6821Author: Damien Miller <djm@mindrot.org>
6822Date: Sat Sep 14 09:49:43 2013 +1000
6823
6824 - djm@cvs.openbsd.org 2013/09/13 06:54:34
6825 [channels.c]
6826 avoid unaligned access in code that reused a buffer to send a
6827 struct in_addr in a reply; simpler just use use buffer_put_int();
6828 from portable; spotted by and ok dtucker@
6829
6830commit 70182522a47d283513a010338cd028cb80dac2ab
6831Author: Damien Miller <djm@mindrot.org>
6832Date: Sat Sep 14 09:49:19 2013 +1000
6833
6834 - djm@cvs.openbsd.org 2013/09/12 01:41:12
6835 [clientloop.c]
6836 fix connection crash when sending break (~B) on ControlPersist'd session;
6837 ok dtucker@
6838
6839commit ff9d6c2a4171ee32e8fe28fc3b86eb33bd5c845b
6840Author: Damien Miller <djm@mindrot.org>
6841Date: Sat Sep 14 09:48:55 2013 +1000
6842
6843 - sthen@cvs.openbsd.org 2013/09/07 13:53:11
6844 [sshd_config]
6845 Remove commented-out kerberos/gssapi config options from sample config,
6846 kerberos support is currently not enabled in ssh in OpenBSD. Discussed with
6847 various people; ok deraadt@
6848 ID SYNC ONLY for portable; kerberos/gssapi is still pretty popular
6849
6850commit 8bab5e7b5ff6721d926b5ebf05a3a24489889c58
6851Author: Damien Miller <djm@mindrot.org>
6852Date: Sat Sep 14 09:47:00 2013 +1000
6853
6854 - deraadt@cvs.openbsd.org 2013/09/02 22:00:34
6855 [ssh-keygen.c sshconnect1.c sshd.c]
6856 All the instances of arc4random_stir() are bogus, since arc4random()
6857 does this itself, inside itself, and has for a very long time.. Actually,
6858 this was probably reducing the entropy available.
6859 ok djm
6860 ID SYNC ONLY for portable; we don't trust other arc4random implementations
6861 to do this right.
6862
6863commit 61353b3208d548fab863e0e0ac5d2400ee5bb340
6864Author: Damien Miller <djm@mindrot.org>
6865Date: Sat Sep 14 09:45:32 2013 +1000
6866
6867 - djm@cvs.openbsd.org 2013/08/31 00:13:54
6868 [sftp.c]
6869 make ^w match ksh behaviour (delete previous word instead of entire line)
6870
6871commit 660854859cad31d234edb9353fb7ca2780df8128
6872Author: Damien Miller <djm@mindrot.org>
6873Date: Sat Sep 14 09:45:03 2013 +1000
6874
6875 - mikeb@cvs.openbsd.org 2013/08/28 12:34:27
6876 [ssh-keygen.c]
6877 improve batch processing a bit by making use of the quite flag a bit
6878 more often and exit with a non zero code if asked to find a hostname
6879 in a known_hosts file and it wasn't there;
6880 originally from reyk@, ok djm
6881
6882commit 045bda5cb8acf0eb9d71c275ee1247e3154fc9e5
6883Author: Damien Miller <djm@mindrot.org>
6884Date: Sat Sep 14 09:44:37 2013 +1000
6885
6886 - djm@cvs.openbsd.org 2013/08/22 19:02:21
6887 [sshd.c]
6888 Stir PRNG after post-accept fork. The child gets a different PRNG state
6889 anyway via rexec and explicit privsep reseeds, but it's good to be sure.
6890 ok markus@
6891
6892commit ed4af412da60a084891b20412433a27966613fb8
6893Author: Damien Miller <djm@mindrot.org>
6894Date: Sat Sep 14 09:40:51 2013 +1000
6895
6896 add marker for 6.3p1 release at the point of the last included change
6897
6898commit 43968a8e66a0aa1afefb11665bf96f86b113f5d9
6899Author: Damien Miller <djm@mindrot.org>
6900Date: Wed Aug 28 14:00:54 2013 +1000
6901
6902 - (djm) [openbsd-compat/bsd-snprintf.c] #ifdef noytet for intmax_t bits
6903 until we have configure support.
6904
6905commit 04be8b9e53f8388c94b531ebc5d1bd6e10e930d1
6906Author: Damien Miller <djm@mindrot.org>
6907Date: Wed Aug 28 12:49:43 2013 +1000
6908
6909 - (djm) [openbsd-compat/bsd-snprintf.c] teach our local snprintf code the
6910 'j' (intmax_t/uintmax_t) and 'z' (size_t/ssize_t) conversions in case we
6911 start to use them in the future.
6912
6913commit f2f6c315a920a256937e1b6a3702757f3195a592
6914Author: Damien Miller <djm@mindrot.org>
6915Date: Wed Aug 21 02:44:58 2013 +1000
6916
6917 - jmc@cvs.openbsd.org 2013/08/20 06:56:07
6918 [ssh.1 ssh_config.5]
6919 some proxyusefdpass tweaks;
6920
6921commit 1262b6638f7d01ab110fd373dd90d915c882fe1a
6922Author: Damien Miller <djm@mindrot.org>
6923Date: Wed Aug 21 02:44:24 2013 +1000
6924
6925 - djm@cvs.openbsd.org 2013/08/20 00:11:38
6926 [readconf.c readconf.h ssh_config.5 sshconnect.c]
6927 Add a ssh_config ProxyUseFDPass option that supports the use of
6928 ProxyCommands that establish a connection and then pass a connected
6929 file descriptor back to ssh(1). This allows the ProxyCommand to exit
6930 rather than have to shuffle data back and forth and enables ssh to use
6931 getpeername, etc. to obtain address information just like it does with
6932 regular directly-connected sockets. ok markus@
6933
6934commit b7727df37efde4dbe4f5a33b19cbf42022aabf66
6935Author: Damien Miller <djm@mindrot.org>
6936Date: Wed Aug 21 02:43:49 2013 +1000
6937
6938 - jmc@cvs.openbsd.org 2013/08/14 08:39:27
6939 [scp.1 ssh.1]
6940 some Bx/Ox conversion;
6941 From: Jan Stary
6942
6943commit d5d9d7b1fdacf0551de4c747728bd159be40590a
6944Author: Damien Miller <djm@mindrot.org>
6945Date: Wed Aug 21 02:43:27 2013 +1000
6946
6947 - djm@cvs.openbsd.org 2013/08/13 18:33:08
6948 [ssh-keygen.c]
6949 another of the same typo
6950
6951commit d234afb0b3a8de1be78cbeafed5fc86912594c3c
6952Author: Damien Miller <djm@mindrot.org>
6953Date: Wed Aug 21 02:42:58 2013 +1000
6954
6955 - djm@cvs.openbsd.org 2013/08/13 18:32:08
6956 [ssh-keygen.c]
6957 typo in error message; from Stephan Rickauer
6958
6959commit e0ee727b8281a7c2ae20630ce83f6b200b404059
6960Author: Damien Miller <djm@mindrot.org>
6961Date: Wed Aug 21 02:42:35 2013 +1000
6962
6963 - djm@cvs.openbsd.org 2013/08/09 03:56:42
6964 [sftp.c]
6965 enable ctrl-left-arrow and ctrl-right-arrow to move forward/back a word;
6966 matching ksh's relatively recent change.
6967
6968commit fec029f1dc2c338f3fae3fa82aabc988dc07868c
6969Author: Damien Miller <djm@mindrot.org>
6970Date: Wed Aug 21 02:42:12 2013 +1000
6971
6972 - djm@cvs.openbsd.org 2013/08/09 03:39:13
6973 [sftp-client.c]
6974 two problems found by a to-be-committed regress test: 1) msg_id was not
6975 being initialised so was starting at a random value from the heap
6976 (harmless, but confusing). 2) some error conditions were not being
6977 propagated back to the caller
6978
6979commit 036d30743fc914089f9849ca52d615891d47e616
6980Author: Damien Miller <djm@mindrot.org>
6981Date: Wed Aug 21 02:41:46 2013 +1000
6982
6983 - djm@cvs.openbsd.org 2013/08/09 03:37:25
6984 [sftp.c]
6985 do getopt parsing for all sftp commands (with an empty optstring for
6986 commands without arguments) to ensure consistent behaviour
6987
6988commit c7dba12bf95eb1d69711881a153cc286c1987663
6989Author: Damien Miller <djm@mindrot.org>
6990Date: Wed Aug 21 02:41:15 2013 +1000
6991
6992 - djm@cvs.openbsd.org 2013/08/08 05:04:03
6993 [sftp-client.c sftp-client.h sftp.c]
6994 add a "-l" flag for the rename command to force it to use the silly
6995 standard SSH_FXP_RENAME command instead of the POSIX-rename- like
6996 posix-rename@openssh.com extension.
6997
6998 intended for use in regress tests, so no documentation.
6999
7000commit 034f27a0c09e69fe3589045b41f03f6e345b63f5
7001Author: Damien Miller <djm@mindrot.org>
7002Date: Wed Aug 21 02:40:44 2013 +1000
7003
7004 - djm@cvs.openbsd.org 2013/08/08 04:52:04
7005 [sftp.c]
7006 fix two year old regression: symlinking a file would incorrectly
7007 canonicalise the target path. bz#2129 report from delphij AT freebsd.org
7008
7009commit c6895c5c67492144dd28589e5788f783be9152ed
7010Author: Damien Miller <djm@mindrot.org>
7011Date: Wed Aug 21 02:40:21 2013 +1000
7012
7013 - jmc@cvs.openbsd.org 2013/08/07 06:24:51
7014 [sftp.1 sftp.c]
7015 sort -a;
7016
7017commit a6d6c1f38ac9b4a5e1bd4df889e1020a8370ed55
7018Author: Damien Miller <djm@mindrot.org>
7019Date: Wed Aug 21 02:40:01 2013 +1000
7020
7021 - djm@cvs.openbsd.org 2013/08/06 23:06:01
7022 [servconf.c]
7023 add cast to avoid format warning; from portable
7024
7025commit eec840673bce3f69ad269672fba7ed8ff05f154f
7026Author: Damien Miller <djm@mindrot.org>
7027Date: Wed Aug 21 02:39:39 2013 +1000
7028
7029 - djm@cvs.openbsd.org 2013/08/06 23:05:01
7030 [sftp.1]
7031 document top-level -a option (the -a option to 'get' was already
7032 documented)
7033
7034commit 02e878070d0eddad4e11f2c82644b275418eb112
7035Author: Damien Miller <djm@mindrot.org>
7036Date: Wed Aug 21 02:38:51 2013 +1000
7037
7038 - djm@cvs.openbsd.org 2013/08/06 23:03:49
7039 [sftp.c]
7040 fix some whitespace at EOL
7041 make list of commands an enum rather than a long list of defines
7042 add -a to usage()
7043
7044commit acd2060f750c16d48b87b92a10b5a833227baf9d
7045Author: Darren Tucker <dtucker@zip.com.au>
7046Date: Thu Aug 8 17:02:12 2013 +1000
7047
7048 - (dtucker) [regress/Makefile regress/test-exec.sh] Roll back the -nt
7049 removal. The "make clean" removes modpipe which is built by the top-level
7050 directory before running the tests. Spotted by tim@
7051
7052commit 9542de4547beebf707f3640082d471f1a85534c9
7053Author: Darren Tucker <dtucker@zip.com.au>
7054Date: Thu Aug 8 12:50:06 2013 +1000
7055
7056 - (dtucker) [misc.c] Remove define added for fallback testing that was
7057 mistakenly included in the previous commit.
7058
7059commit 94396b7f06f512a0acb230640d7f703fb802a9ee
7060Author: Darren Tucker <dtucker@zip.com.au>
7061Date: Thu Aug 8 11:52:37 2013 +1000
7062
7063 - (dtucker) [misc.c] Fall back to time(2) at runtime if clock_gettime(
7064 CLOCK_MONOTONIC...) fails. Some older versions of RHEL have the
7065 CLOCK_MONOTONIC define but don't actually support it. Found and tested
7066 by Kevin Brott, ok djm.
7067
7068commit a5a3cbfa0fb8ef011d3e7b38910a13f6ebbb8818
7069Author: Darren Tucker <dtucker@zip.com.au>
7070Date: Thu Aug 8 10:58:49 2013 +1000
7071
7072 - (dtucker) [regress/Makefile regress/test-exec.sh] Don't try to use test -nt
7073 since some platforms (eg really old FreeBSD) don't have it. Instead,
7074 run "make clean" before a complete regress run. ok djm.
7075
7076commit f3ab2c5f9cf4aed44971eded3ac9eeb1344b2be5
7077Author: Darren Tucker <dtucker@zip.com.au>
7078Date: Sun Aug 4 21:48:41 2013 +1000
7079
7080 - (dtucker) [auth-krb5.c configure.ac openbsd-compat/bsd-misc.h] Add support
7081 for building with older Heimdal versions. ok djm.
7082
7083commit ab3575c055adfbce70fa7405345cf0f80b07c827
7084Author: Damien Miller <djm@mindrot.org>
7085Date: Thu Aug 1 14:34:16 2013 +1000
7086
7087 - (djm) [sshlogin.h] Fix prototype merge botch from 2006; bz#2134
7088
7089commit c192a4c4f6da907dc0e67a3ca61d806f9a92c931
7090Author: Damien Miller <djm@mindrot.org>
7091Date: Thu Aug 1 14:29:20 2013 +1000
7092
7093 - (djm) [channels.c channels.h] bz#2135: On Solaris, isatty() on a non-
7094 blocking connecting socket will clear any stored errno that might
7095 otherwise have been retrievable via getsockopt(). A hack to limit writes
7096 to TTYs on AIX was triggering this. Since only AIX needs the hack, wrap
7097 it in an #ifdef. Diagnosis and patch from Ivo Raisr.
7098
7099commit 81f7cf1ec5bc2fd202eda05abc2e5361c54633c5
7100Author: Tim Rice <tim@multitalents.net>
7101Date: Thu Jul 25 18:41:40 2013 -0700
7102
7103 more correct comment for last commit
7104
7105commit 0553ad76ffdff35fb31b9e6df935a71a1cc6daa2
7106Author: Tim Rice <tim@multitalents.net>
7107Date: Thu Jul 25 16:03:16 2013 -0700
7108
7109 - (tim) [regress/forwarding.sh] Fix for building outside read only source tree.
7110
7111commit ed899eb597a8901ff7322cba809660515ec0d601
7112Author: Tim Rice <tim@multitalents.net>
7113Date: Thu Jul 25 15:40:00 2013 -0700
7114
7115 - (tim) [sftp-client.c] Use of a gcc extension trips up native compilers on
7116 Solaris and UnixWare. Feedback and OK djm@
7117
7118commit e9e936d33b4b1d77ffbaace9438cb2f1469c1dc7
7119Author: Damien Miller <djm@mindrot.org>
7120Date: Thu Jul 25 12:34:00 2013 +1000
7121
7122 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
7123 [contrib/suse/openssh.spec] Update version numbers
7124
7125commit d1e26cf391de31128b4edde118bff5fed98a90ea
7126Author: Damien Miller <djm@mindrot.org>
7127Date: Thu Jul 25 12:11:18 2013 +1000
7128
7129 - djm@cvs.openbsd.org 2013/06/21 02:26:26
7130 [regress/sftp-cmds.sh regress/test-exec.sh]
7131 unbreak sftp-cmds for renamed test data (s/ls/data/)
7132
7133commit 78d47b7c5b182e44552913de2b4b7e0363c8e3cc
7134Author: Damien Miller <djm@mindrot.org>
7135Date: Thu Jul 25 12:08:46 2013 +1000
7136
7137 - dtucker@cvs.openbsd.org 2013/06/10 21:56:43
7138 [regress/forwarding.sh]
7139 Add test for forward config parsing
7140
7141commit fea440639e04cea9f2605375a41d654390369402
7142Author: Damien Miller <djm@mindrot.org>
7143Date: Thu Jul 25 12:08:07 2013 +1000
7144
7145 - dtucker@cvs.openbsd.org 2013/05/30 20:12:32
7146 [regress/test-exec.sh]
7147 use ssh and sshd as testdata since it needs to be >256k for the rekey test
7148
7149commit 53435b2d8773a5d7c78359e9f7bf9df2d93b9ef5
7150Author: Damien Miller <djm@mindrot.org>
7151Date: Thu Jul 25 11:57:15 2013 +1000
7152
7153 - djm@cvs.openbsd.org 2013/07/25 00:57:37
7154 [version.h]
7155 openssh-6.3 for release
7156
7157commit 0d032419ee6e1968fc1cb187af63bf3b77b506ea
7158Author: Damien Miller <djm@mindrot.org>
7159Date: Thu Jul 25 11:56:52 2013 +1000
7160
7161 - djm@cvs.openbsd.org 2013/07/25 00:56:52
7162 [sftp-client.c sftp-client.h sftp.1 sftp.c]
7163 sftp support for resuming partial downloads; patch mostly by Loganaden
7164 Velvindron/AfriNIC with some tweaks by me; feedback and ok dtucker@
7165
7166commit 98e27dcf581647b5bbe9780e8f59685d942d8ea3
7167Author: Damien Miller <djm@mindrot.org>
7168Date: Thu Jul 25 11:55:52 2013 +1000
7169
7170 - djm@cvs.openbsd.org 2013/07/25 00:29:10
7171 [ssh.c]
7172 daemonise backgrounded (ControlPersist'ed) multiplexing master to ensure
7173 it is fully detached from its controlling terminal. based on debugging
7174
7175commit 94c9cd34d1590ea1d4bf76919a15b5688fa90ed1
7176Author: Damien Miller <djm@mindrot.org>
7177Date: Thu Jul 25 11:55:39 2013 +1000
7178
7179 - djm@cvs.openbsd.org 2013/07/22 12:20:02
7180 [umac.h]
7181 oops, forgot to commit corresponding header change;
7182 spotted by jsg and jasper
7183
7184commit c331dbd22297ab9bf351abee659893d139c9f28a
7185Author: Damien Miller <djm@mindrot.org>
7186Date: Thu Jul 25 11:55:20 2013 +1000
7187
7188 - djm@cvs.openbsd.org 2013/07/22 05:00:17
7189 [umac.c]
7190 make MAC key, data to be hashed and nonce for final hash const;
7191 checked with -Wcast-qual
7192
7193commit c8669a8cd24952b3f16a44eac63d2b6ce8a6343a
7194Author: Damien Miller <djm@mindrot.org>
7195Date: Thu Jul 25 11:52:48 2013 +1000
7196
7197 - djm@cvs.openbsd.org 2013/07/20 22:20:42
7198 [krl.c]
7199 fix verification error in (as-yet usused) KRL signature checking path
7200
7201commit 63ddc899d28cf60045b560891894b9fbf6f822e9
7202Author: Damien Miller <djm@mindrot.org>
7203Date: Sat Jul 20 13:35:45 2013 +1000
7204
7205 - djm@cvs.openbsd.org 2013/07/20 01:55:13
7206 [auth-krb5.c gss-serv-krb5.c gss-serv.c]
7207 fix kerberos/GSSAPI deprecation warnings and linking; "looks okay" millert@
7208
7209commit 1f0e86f23fcebb026371c0888402a981df2a61c4
7210Author: Damien Miller <djm@mindrot.org>
7211Date: Sat Jul 20 13:22:49 2013 +1000
7212
7213 - djm@cvs.openbsd.org 2013/07/20 01:50:20
7214 [ssh-agent.c]
7215 call cleanup_handler on SIGINT when in debug mode to ensure sockets
7216 are cleaned up on manual exit; bz#2120
7217
7218commit 3009d3cbb89316b1294fb5cedb54770b5d114d04
7219Author: Damien Miller <djm@mindrot.org>
7220Date: Sat Jul 20 13:22:31 2013 +1000
7221
7222 - djm@cvs.openbsd.org 2013/07/20 01:44:37
7223 [ssh-keygen.c ssh.c]
7224 More useful error message on missing current user in /etc/passwd
7225
7226commit 32ecfa0f7920db31471ca8c1f4adc20ae38ed9d6
7227Author: Damien Miller <djm@mindrot.org>
7228Date: Sat Jul 20 13:22:13 2013 +1000
7229
7230 - djm@cvs.openbsd.org 2013/07/20 01:43:46
7231 [umac.c]
7232 use a union to ensure correct alignment; ok deraadt
7233
7234commit 85b45e09188e7a7fc8f0a900a4c6a0f04a5720a7
7235Author: Damien Miller <djm@mindrot.org>
7236Date: Sat Jul 20 13:21:52 2013 +1000
7237
7238 - markus@cvs.openbsd.org 2013/07/19 07:37:48
7239 [auth.h kex.h kexdhs.c kexecdhs.c kexgexs.c monitor.c servconf.c]
7240 [servconf.h session.c sshd.c sshd_config.5]
7241 add ssh-agent(1) support to sshd(8); allows encrypted hostkeys,
7242 or hostkeys on smartcards; most of the work by Zev Weiss; bz #1974
7243 ok djm@
7244
7245commit d93340cbb6bc0fc0dbd4427e0cec6d994a494dd9
7246Author: Damien Miller <djm@mindrot.org>
7247Date: Thu Jul 18 16:14:34 2013 +1000
7248
7249 - djm@cvs.openbsd.org 2013/07/18 01:12:26
7250 [ssh.1]
7251 be more exact wrt perms for ~/.ssh/config; bz#2078
7252
7253commit bf836e535dc3a8050c1756423539bac127ee5098
7254Author: Damien Miller <djm@mindrot.org>
7255Date: Thu Jul 18 16:14:13 2013 +1000
7256
7257 - schwarze@cvs.openbsd.org 2013/07/16 00:07:52
7258 [scp.1 sftp-server.8 ssh-keyscan.1 ssh-keysign.8 ssh-pkcs11-helper.8]
7259 use .Mt for email addresses; from Jan Stary <hans at stare dot cz>; ok jmc@
7260
7261commit 649fe025a409d0ce88c60a068f3f211193c35873
7262Author: Damien Miller <djm@mindrot.org>
7263Date: Thu Jul 18 16:13:55 2013 +1000
7264
7265 - djm@cvs.openbsd.org 2013/07/12 05:48:55
7266 [ssh.c]
7267 set TCP nodelay for connections started with -N; bz#2124 ok dtucker@
7268
7269commit 5bb8833e809d827496dffca0dc2c223052c93931
7270Author: Damien Miller <djm@mindrot.org>
7271Date: Thu Jul 18 16:13:37 2013 +1000
7272
7273 - djm@cvs.openbsd.org 2013/07/12 05:42:03
7274 [ssh-keygen.c]
7275 do_print_resource_record() can never be called with a NULL filename, so
7276 don't attempt (and bungle) asking for one if it has not been specified
7277 bz#2127 ok dtucker@
7278
7279commit 7313fc9222785d0c54a7ffcaf2067f4db02c8d72
7280Author: Damien Miller <djm@mindrot.org>
7281Date: Thu Jul 18 16:13:19 2013 +1000
7282
7283 - djm@cvs.openbsd.org 2013/07/12 00:43:50
7284 [misc.c]
7285 in ssh_gai_strerror() don't fallback to strerror for EAI_SYSTEM when
7286 errno == 0. Avoids confusing error message in some broken resolver
7287 cases. bz#2122 patch from plautrba AT redhat.com; ok dtucker
7288
7289commit 746d1a6c524d2e90ebe98cc29e42573a3e1c3c1b
7290Author: Damien Miller <djm@mindrot.org>
7291Date: Thu Jul 18 16:13:02 2013 +1000
7292
7293 - djm@cvs.openbsd.org 2013/07/12 00:20:00
7294 [sftp.c ssh-keygen.c ssh-pkcs11.c]
7295 fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@
7296
7297commit ce98654674648fb7d58f73edf6aa398656a2dba4
7298Author: Damien Miller <djm@mindrot.org>
7299Date: Thu Jul 18 16:12:44 2013 +1000
7300
7301 - djm@cvs.openbsd.org 2013/07/12 00:19:59
7302 [auth-options.c auth-rsa.c bufaux.c buffer.h channels.c hostfile.c]
7303 [hostfile.h mux.c packet.c packet.h roaming_common.c serverloop.c]
7304 fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@
7305
7306commit 0d02c3e10e1ed16d6396748375a133d348127a2a
7307Author: Damien Miller <djm@mindrot.org>
7308Date: Thu Jul 18 16:12:06 2013 +1000
7309
7310 - markus@cvs.openbsd.org 2013/07/02 12:31:43
7311 [dh.c]
7312 remove extra whitespace
7313
7314commit fecfd118d6c90df4fcd3cec7b14e4d3ce69a41d5
7315Author: Damien Miller <djm@mindrot.org>
7316Date: Thu Jul 18 16:11:50 2013 +1000
7317
7318 - jmc@cvs.openbsd.org 2013/06/27 14:05:37
7319 [ssh-keygen.1 ssh.1 ssh_config.5 sshd.8 sshd_config.5]
7320 do not use Sx for sections outwith the man page - ingo informs me that
7321 stuff like html will render with broken links;
7322
7323 issue reported by Eric S. Raymond, via djm
7324
7325commit bc35d92e78fd53c3f32cbdbdf89d8b1919788c50
7326Author: Damien Miller <djm@mindrot.org>
7327Date: Thu Jul 18 16:11:25 2013 +1000
7328
7329 - djm@cvs.openbsd.org 2013/06/22 06:31:57
7330 [scp.c]
7331 improved time_t overflow check suggested by guenther@
7332
7333commit 8158441d01ab84f33a7e70e27f87c02cbf67e709
7334Author: Damien Miller <djm@mindrot.org>
7335Date: Thu Jul 18 16:11:07 2013 +1000
7336
7337 - djm@cvs.openbsd.org 2013/06/21 05:43:10
7338 [scp.c]
7339 make this -Wsign-compare clean after time_t conversion
7340
7341commit bbeb1dac550bad8e6aff9bd27113c6bd5ebb7413
7342Author: Damien Miller <djm@mindrot.org>
7343Date: Thu Jul 18 16:10:49 2013 +1000
7344
7345 - djm@cvs.openbsd.org 2013/06/21 05:42:32
7346 [dh.c]
7347 sprinkle in some error() to explain moduli(5) parse failures
7348
7349commit 7f2b438ca0b7c3b9684a03d7bf3eaf379da16de9
7350Author: Damien Miller <djm@mindrot.org>
7351Date: Thu Jul 18 16:10:29 2013 +1000
7352
7353 - djm@cvs.openbsd.org 2013/06/21 00:37:49
7354 [ssh_config.5]
7355 explicitly mention that IdentitiesOnly can be used with IdentityFile
7356 to control which keys are offered from an agent.
7357
7358commit 20bdcd72365e8b3d51261993928cc47c5f0d7c8a
7359Author: Damien Miller <djm@mindrot.org>
7360Date: Thu Jul 18 16:10:09 2013 +1000
7361
7362 - djm@cvs.openbsd.org 2013/06/21 00:34:49
7363 [auth-rsa.c auth.h auth2-hostbased.c auth2-pubkey.c monitor.c]
7364 for hostbased authentication, print the client host and user on
7365 the auth success/failure line; bz#2064, ok dtucker@
7366
7367commit 3071070b39e6d1722151c754cdc2b26640eaf45e
7368Author: Damien Miller <djm@mindrot.org>
7369Date: Thu Jul 18 16:09:44 2013 +1000
7370
7371 - markus@cvs.openbsd.org 2013/06/20 19:15:06
7372 [krl.c]
7373 don't leak the rdata blob on errors; ok djm@
7374
7375commit 044bd2a7ddb0b6f6b716c87e57261572e2b89028
7376Author: Damien Miller <djm@mindrot.org>
7377Date: Thu Jul 18 16:09:25 2013 +1000
7378
7379 - guenther@cvs.openbsd.org 2013/06/17 04:48:42
7380 [scp.c]
7381 Handle time_t values as long long's when formatting them and when
7382 parsing them from remote servers.
7383 Improve error checking in parsing of 'T' lines.
7384
7385 ok dtucker@ deraadt@
7386
7387commit 9a6615542108118582f64b7161ca0e12176e3712
7388Author: Damien Miller <djm@mindrot.org>
7389Date: Thu Jul 18 16:09:04 2013 +1000
7390
7391 - dtucker@cvs.openbsd.org 2013/06/10 19:19:44
7392 [readconf.c]
7393 revert 1.203 while we investigate crashes reported by okan@
7394
7395commit b7482cff46e7e76bfb3cda86c365a08f58d4fca0
7396Author: Darren Tucker <dtucker@zip.com.au>
7397Date: Tue Jul 2 20:06:46 2013 +1000
7398
7399 - (dtucker) [contrib/cygwin/README contrib/cygwin/ssh-host-config
7400 contrib/cygwin/ssh-user-config] Modernizes and improve readability of
7401 the Cygwin README file (which hasn't been updated for ages), drop
7402 unsupported OSes from the ssh-host-config help text, and drop an
7403 unneeded option from ssh-user-config. Patch from vinschen at redhat com.
7404
7405commit b8ae92d08b91beaef34232c6ef34b9941473fdd6
7406Author: Darren Tucker <dtucker@zip.com.au>
7407Date: Tue Jun 11 12:10:02 2013 +1000
7408
7409 - (dtucker) [myproposal.h] Make the conditional algorithm support consistent
7410 and add some comments so it's clear what goes where.
7411
7412commit 97b62f41adcb0dcbeff142d0540793a7ea17c910
7413Author: Darren Tucker <dtucker@zip.com.au>
7414Date: Tue Jun 11 11:47:24 2013 +1000
7415
7416 - (dtucker) [myproposal.h] Do not advertise AES GSM ciphers if we don't have
7417 the required OpenSSL support. Patch from naddy at freebsd.
7418
7419commit 6d8bd57448b45b42809da32857d7804444349ee7
7420Author: Darren Tucker <dtucker@zip.com.au>
7421Date: Tue Jun 11 11:26:10 2013 +1000
7422
7423 - (dtucker) [Makefile.in configure.ac fixalgorithms] Remove unsupported
7424 algorithms (Ciphers, MACs and HostKeyAlgorithms) from man pages.
7425
7426commit 36187093ea0b2d2240c043417b8949611687e105
7427Author: Damien Miller <djm@mindrot.org>
7428Date: Mon Jun 10 13:07:11 2013 +1000
7429
7430 - dtucker@cvs.openbsd.org 2013/06/07 15:37:52
7431 [channels.c channels.h clientloop.c]
7432 Add an "ABANDONED" channel state and use for mux sessions that are
7433 disconnected via the ~. escape sequence. Channels in this state will
7434 be able to close if the server responds, but do not count as active channels.
7435 This means that if you ~. all of the mux clients when using ControlPersist
7436 on a broken network, the backgrounded mux master will exit when the
7437 Control Persist time expires rather than hanging around indefinitely.
7438 bz#1917, also reported and tested by tedu@. ok djm@ markus@.
7439
7440commit ae133d4b31af05bb232d797419f498f3ae7e9f2d
7441Author: Darren Tucker <dtucker@zip.com.au>
7442Date: Thu Jun 6 08:30:20 2013 +1000
7443
7444 - (dtucker) [configure.ac sftp.c openbsd-compat/openbsd-compat.h] Cater for
7445 platforms that don't have multibyte character support (specifically,
7446 mblen).
7447
7448commit 408eaf3ab716096f8faf30f091bd54a2c7a17a09
7449Author: Darren Tucker <dtucker@zip.com.au>
7450Date: Thu Jun 6 08:22:46 2013 +1000
7451
7452 - dtucker@cvs.openbsd.org 2013/06/05 22:00:28
7453 [readconf.c]
7454 plug another memleak. bz#1967, from Zhenbo Xu, detected by Melton, ok djm
7455
7456commit e52a260f16888ca75390f97de4606943e61785e8
7457Author: Darren Tucker <dtucker@zip.com.au>
7458Date: Thu Jun 6 08:22:05 2013 +1000
7459
7460 - dtucker@cvs.openbsd.org 2013/06/05 12:52:38
7461 [sshconnect2.c]
7462 Fix memory leaks found by Zhenbo Xu and the Melton tool. bz#1967, ok djm
7463
7464commit 0cca17fa1819d3a0ba06a6db41ab3eaa8d769587
7465Author: Darren Tucker <dtucker@zip.com.au>
7466Date: Thu Jun 6 08:21:14 2013 +1000
7467
7468 - dtucker@cvs.openbsd.org 2013/06/05 02:27:50
7469 [sshd.c]
7470 When running sshd -D, close stderr unless we have explicitly requesting
7471 logging to stderr. From james.hunt at ubuntu.com via bz#1976, djm's patch
7472 so, err, ok dtucker.
7473
7474commit 746e9067bd9b3501876e1c86f38f3c510a12f895
7475Author: Darren Tucker <dtucker@zip.com.au>
7476Date: Thu Jun 6 08:20:13 2013 +1000
7477
7478 - dtucker@cvs.openbsd.org 2013/06/05 02:07:29
7479 [mux.c]
7480 fix leaks in mux error paths, from Zhenbo Xu, found by Melton. bz#1967,
7481 ok djm
7482
7483commit ea64721275a81c4788af36294d94bf4f74012e06
7484Author: Darren Tucker <dtucker@zip.com.au>
7485Date: Thu Jun 6 08:19:09 2013 +1000
7486
7487 - dtucker@cvs.openbsd.org 2013/06/04 20:42:36
7488 [sftp.c]
7489 Make sftp's libedit interface marginally multibyte aware by building up
7490 the quoted string by character instead of by byte. Prevents failures
7491 when linked against a libedit built with wide character support (bz#1990).
7492 "looks ok" djm
7493
7494commit 194454d7a8f8cb8ac55f2b9d0199ef9445788bee
7495Author: Darren Tucker <dtucker@zip.com.au>
7496Date: Thu Jun 6 08:16:04 2013 +1000
7497
7498 - dtucker@cvs.openbsd.org 2013/06/04 19:12:23
7499 [scp.c]
7500 use MAXPATHLEN for buffer size instead of fixed value. ok markus
7501
7502commit 4ac66af091cf6db5a42c18e43738ca9c41e338e5
7503Author: Darren Tucker <dtucker@zip.com.au>
7504Date: Thu Jun 6 08:12:37 2013 +1000
7505
7506 - dtucker@cvs.openbsd.org 2013/06/03 00:03:18
7507 [mac.c]
7508 force the MAC output to be 64-bit aligned so umac won't see unaligned
7509 accesses on strict-alignment architectures. bz#2101, patch from
7510 tomas.kuthan at oracle.com, ok djm@
7511
7512commit ea8342c248ad6c0a4fe1a70de133f954973bd2b2
7513Author: Darren Tucker <dtucker@zip.com.au>
7514Date: Thu Jun 6 08:11:40 2013 +1000
7515
7516 - dtucker@cvs.openbsd.org 2013/06/02 23:36:29
7517 [clientloop.h clientloop.c mux.c]
7518 No need for the mux cleanup callback to be visible so restore it to static
7519 and call it through the detach_user function pointer. ok djm@
7520
7521commit 5d12b8f05d79ba89d0807910a664fa80f6f3bf8c
7522Author: Darren Tucker <dtucker@zip.com.au>
7523Date: Thu Jun 6 08:09:10 2013 +1000
7524
7525 - dtucker@cvs.openbsd.org 2013/06/02 21:01:51
7526 [channels.h]
7527 typo in comment
7528
7529commit dc62edbf121c41e8b5270904091039450206d98a
7530Author: Darren Tucker <dtucker@zip.com.au>
7531Date: Thu Jun 6 05:12:35 2013 +1000
7532
7533 - (dtucker) [Makefile.in] append $CFLAGS to compiler options when building
7534 modpipe in case there's anything in there we need.
7535
7536commit 2a22873cd869679415104bc9f6bb154811ee604c
7537Author: Darren Tucker <dtucker@zip.com.au>
7538Date: Thu Jun 6 01:59:13 2013 +1000
7539
7540 - (dtucker) [regress/forwarding.sh] For (as yet unknown) reason, the
7541 forwarding test is extremely slow copying data on some machines so switch
7542 back to copying the much smaller ls binary until we can figure out why
7543 this is.
7544
7545commit b4e00949f01176cd4fae3e0cef5ffa8dea379042
7546Author: Darren Tucker <dtucker@zip.com.au>
7547Date: Wed Jun 5 22:48:44 2013 +1000
7548
7549 - (dtucker) [contrib/ssh-copy-id] bz#2117: Use portable operator in test.
7550 Patch from cjwatson at debian.
7551
7552commit 2ea9eb77a7fcab3190564ef5a6a5377a600aa391
7553Author: Darren Tucker <dtucker@zip.com.au>
7554Date: Wed Jun 5 15:04:00 2013 +1000
7555
7556 - (dtucker) Enable sha256 kex methods based on the presence of the necessary
7557 functions, not from the openssl version.
7558
7559commit 16cac190ebb9b5612cccea63a7c22ac33bc9a07a
7560Author: Darren Tucker <dtucker@zip.com.au>
7561Date: Tue Jun 4 12:55:24 2013 +1000
7562
7563 - (dtucker) [configure.ac] Some other platforms need sys/types.h before
7564 sys/socket.h.
7565
7566commit 0b43ffe143a5843703c3755fa040b8684fb04134
7567Author: Darren Tucker <dtucker@zip.com.au>
7568Date: Mon Jun 3 09:30:44 2013 +1000
7569
7570 - (dtucker) [configure.ac] Some platforms need sys/types.h before sys/un.h.
7571
7572commit 3f3064c82238c486706471d300217d73dd0f125e
7573Author: Tim Rice <tim@multitalents.net>
7574Date: Sun Jun 2 15:13:09 2013 -0700
7575
7576 - (tim) [regress/sftp-chroot.sh] skip if no sudo. ok dtucker
7577
7578commit 01ec0af301f60fefdd0079647f13ef9abadd2db5
7579Author: Tim Rice <tim@multitalents.net>
7580Date: Sun Jun 2 14:31:27 2013 -0700
7581
7582 - (tim) [aclocal.m4] Enhance OSSH_CHECK_CFLAG_COMPILE to check stderr.
7583 feedback and ok dtucker
7584
7585commit 5ab9b63468100757479534edeb53f788a61fe08b
7586Author: Tim Rice <tim@multitalents.net>
7587Date: Sun Jun 2 14:05:48 2013 -0700
7588
7589 - (tim) [configure.ac regress/Makefile] With rev 1.47 of test-exec.sh we
7590 need a shell that can handle "[ file1 -nt file2 ]". Rather than keep
7591 dealing with shell portability issues in regression tests, we let
7592 configure find us a capable shell on those platforms with an old /bin/sh.
7593
7594commit 898ac935e56a7ac5d8b686c590fdb8b7aca27e59
7595Author: Darren Tucker <dtucker@zip.com.au>
7596Date: Mon Jun 3 02:03:25 2013 +1000
7597
7598 - (dtucker) [configure.ac] bz#2111: don't try to use lastlog on Android.
7599 Patch from Nathan Osman.
7600
7601commit ef4901c3eb98c7ab1342c3cd8f2638da1f4b0678
7602Author: Darren Tucker <dtucker@zip.com.au>
7603Date: Mon Jun 3 01:59:13 2013 +1000
7604
7605 - (dtucker) [configure.ac] sys/un.h needs sys/socket.h on some platforms
7606 to prevent noise from configure. Patch from Nathan Osman.
7607
7608commit 073f795bc1c7728c320e5982c0d417376b0907f5
7609Author: Darren Tucker <dtucker@zip.com.au>
7610Date: Sun Jun 2 23:47:11 2013 +1000
7611
7612 - dtucker@cvs.openbsd.org 2013/06/02 13:35:58
7613 [ssh-agent.c]
7614 Make parent_alive_interval time_t to avoid signed/unsigned comparison
7615
7616commit 00e1abb1ebe13ab24e812f68715f46e65e7c5271
7617Author: Darren Tucker <dtucker@zip.com.au>
7618Date: Sun Jun 2 23:46:24 2013 +1000
7619
7620 - dtucker@cvs.openbsd.org 2013/06/02 13:33:05
7621 [progressmeter.c]
7622 Add misc.h for monotime prototype. (id sync only)
7623
7624commit 86211d1738695e63b2a68f0c3a4f60e1a9d9bda3
7625Author: Tim Rice <tim@multitalents.net>
7626Date: Sat Jun 1 18:38:23 2013 -0700
7627
7628 20130602
7629 - (tim) [Makefile.in] Make Solaris, UnixWare, & OpenServer linkers happy
7630 linking regress/modpipe.
7631
7632commit e9887d1c37940b9d6c72d55cfad7a40de4c6e28d
7633Author: Darren Tucker <dtucker@zip.com.au>
7634Date: Sun Jun 2 09:17:09 2013 +1000
7635
7636 - (dtucker) [sandbox-seccomp-filter.c] Allow clock_gettimeofday.
7637
7638commit 65cf74079a2d563c4ede649116a13ca78c8cc2a4
7639Author: Darren Tucker <dtucker@zip.com.au>
7640Date: Sun Jun 2 09:11:19 2013 +1000
7641
7642 fix typo
7643
7644commit c9a1991b95a4c9f04f9dcef299a8110d2ec80d3e
7645Author: Darren Tucker <dtucker@zip.com.au>
7646Date: Sun Jun 2 08:37:05 2013 +1000
7647
7648 - dtucker@cvs.openbsd.org 2013/06/01 22:34:50
7649 [sftp-client.c]
7650 Update progressmeter when data is acked, not when it's sent. bz#2108, from
7651 Debian via Colin Watson, ok djm@
7652
7653commit a710891659202c82545e84725d4e5cd77aef567c
7654Author: Darren Tucker <dtucker@zip.com.au>
7655Date: Sun Jun 2 08:18:31 2013 +1000
7656
7657 - (dtucker) [configure.ac misc.c] Look for clock_gettime in librt and fall
7658 back to time(NULL) if we can't find it anywhere.
7659
7660commit f60845fde29cead9d75e812db1c04916b4c58ffd
7661Author: Darren Tucker <dtucker@zip.com.au>
7662Date: Sun Jun 2 08:07:31 2013 +1000
7663
7664 - (dtucker) [M auth-chall.c auth-krb5.c auth-pam.c cipher-aes.c cipher-ctr.c
7665 groupaccess.c loginrec.c monitor.c monitor_wrap.c session.c sshd.c
7666 sshlogin.c uidswap.c openbsd-compat/bsd-cygwin_util.c
7667 openbsd-compat/getrrsetbyname-ldns.c openbsd-compat/port-aix.c
7668 openbsd-compat/port-linux.c] Replace portable-specific instances of xfree
7669 with the equivalent calls to free.
7670
7671commit 12f6533215c0a36ab29d11ff52a853fce45573b4
7672Author: Darren Tucker <dtucker@zip.com.au>
7673Date: Sun Jun 2 08:01:24 2013 +1000
7674
7675 Remove stray '+' accidentally introduced in sync
7676
7677commit 3750fce6ac6b287f62584ac55a4406df95c71b92
7678Author: Darren Tucker <dtucker@zip.com.au>
7679Date: Sun Jun 2 07:52:21 2013 +1000
7680
7681 - dtucker@cvs.openbsd.org 2013/06/01 20:59:25
7682 [scp.c sftp-client.c]
7683 Replace S_IWRITE, which isn't standardized, with S_IWUSR, which is. Patch
7684 from Nathan Osman via bz#2113. ok deraadt.
7685
7686 (note: corrected bug number from 2085)
7687
7688commit b759c9c2efebe7b416ab81093ca8eb17836b6933
7689Author: Darren Tucker <dtucker@zip.com.au>
7690Date: Sun Jun 2 07:46:16 2013 +1000
7691
7692 - dtucker@cvs.openbsd.org 2013/06/01 13:15:52
7693 [ssh-agent.c clientloop.c misc.h packet.c progressmeter.c misc.c
7694 channels.c sandbox-systrace.c]
7695 Use clock_gettime(CLOCK_MONOTONIC ...) for ssh timers so that things like
7696 keepalives and rekeying will work properly over clock steps. Suggested by
7697 markus@, "looks good" djm@.
7698
7699commit 55119253c64808b0d3b2ab5d2bc67ee9dac3430b
7700Author: Darren Tucker <dtucker@zip.com.au>
7701Date: Sun Jun 2 07:43:59 2013 +1000
7702
7703 - dtucker@cvs.openbsd.org 2013/05/31 12:28:10
7704 [ssh-agent.c]
7705 Use time_t where appropriate. ok djm
7706
7707commit 0acca3797d53d958d240c69a5f222f2aa8444858
7708Author: Darren Tucker <dtucker@zip.com.au>
7709Date: Sun Jun 2 07:41:51 2013 +1000
7710
7711 - djm@cvs.openbsd.org 2013/05/19 02:42:42
7712 [auth.h auth.c key.c monitor.c auth-rsa.c auth2.c auth1.c key.h]
7713 Standardise logging of supplemental information during userauth. Keys
7714 and ruser is now logged in the auth success/failure message alongside
7715 the local username, remote host/port and protocol in use. Certificates
7716 contents and CA are logged too.
7717 Pushing all logging onto a single line simplifies log analysis as it is
7718 no longer necessary to relate information scattered across multiple log
7719 entries. "I like it" markus@
7720
7721commit 74836ae0fabcc1a76b9d9eacd1629c88a054b2d0
7722Author: Darren Tucker <dtucker@zip.com.au>
7723Date: Sun Jun 2 07:32:00 2013 +1000
7724
7725 - djm@cvs.openbsd.org 2013/05/19 02:38:28
7726 [auth2-pubkey.c]
7727 fix failure to recognise cert-authority keys if a key of a different type
7728 appeared in authorized_keys before it; ok markus@
7729
7730commit a627d42e51ffa71e014d7b2d2c07118122fd3ec3
7731Author: Darren Tucker <dtucker@zip.com.au>
7732Date: Sun Jun 2 07:31:17 2013 +1000
7733
7734 - djm@cvs.openbsd.org 2013/05/17 00:13:13
7735 [xmalloc.h cipher.c sftp-glob.c ssh-keyscan.c ssh.c sftp-common.c
7736 ssh-ecdsa.c auth2-chall.c compat.c readconf.c kexgexs.c monitor.c
7737 gss-genr.c cipher-3des1.c kex.c monitor_wrap.c ssh-pkcs11-client.c
7738 auth-options.c rsa.c auth2-pubkey.c sftp.c hostfile.c auth2.c
7739 servconf.c auth.c authfile.c xmalloc.c uuencode.c sftp-client.c
7740 auth2-gss.c sftp-server.c bufaux.c mac.c session.c jpake.c kexgexc.c
7741 sshconnect.c auth-chall.c auth2-passwd.c sshconnect1.c buffer.c
7742 kexecdhs.c kexdhs.c ssh-rsa.c auth1.c ssh-pkcs11.c auth2-kbdint.c
7743 kexdhc.c sshd.c umac.c ssh-dss.c auth2-jpake.c bufbn.c clientloop.c
7744 monitor_mm.c scp.c roaming_client.c serverloop.c key.c auth-rsa.c
7745 ssh-pkcs11-helper.c ssh-keysign.c ssh-keygen.c match.c channels.c
7746 sshconnect2.c addrmatch.c mux.c canohost.c kexecdhc.c schnorr.c
7747 ssh-add.c misc.c auth2-hostbased.c ssh-agent.c bufec.c groupaccess.c
7748 dns.c packet.c readpass.c authfd.c moduli.c]
7749 bye, bye xfree(); ok markus@
7750
7751commit c7aad0058c957afeb26a3f703e8cb0eddeb62365
7752Author: Darren Tucker <dtucker@zip.com.au>
7753Date: Sun Jun 2 07:18:47 2013 +1000
7754
7755 - (dtucker) [configure.ac defines.h] Test for fd_mask, howmany and NFDBITS
7756 rather than trying to enumerate the plaforms that don't have them.
7757 Based on a patch from Nathan Osman, with help from tim@.
7758
7759commit c0c3373216801797053e123b5f62d35bf41b3611
7760Author: Darren Tucker <dtucker@zip.com.au>
7761Date: Sun Jun 2 06:28:03 2013 +1000
7762
7763 - (dtucker) [configure.ac openbsd-compat/xcrypt.c] bz#2112: fall back to
7764 using openssl's DES_crpyt function on platorms that don't have a native
7765 one, eg Android. Based on a patch from Nathan Osman.
7766
7767commit efdf5342143a887013a1daae583167dadf6752a7
7768Author: Darren Tucker <dtucker@zip.com.au>
7769Date: Thu May 30 08:29:08 2013 +1000
7770
7771 - (dtucker) [configure.ac openbsd-compat/bsd-misc.h] bz#2087: Add a null
7772 implementation of endgrent for platforms that don't have it (eg Android).
7773 Loosely based on a patch from Nathan Osman, ok djm
7774
7775commit 9b42d327380e5cd04efde6fb70e1535fecedf0d7
7776Author: Darren Tucker <dtucker@zip.com.au>
7777Date: Fri May 17 20:48:59 2013 +1000
7778
7779 - dtucker@cvs.openbsd.org 2013/05/17 10:35:43
7780 [regress/scp.sh]
7781 use a file extention that's not special on some platforms. from portable
7782 (id sync only)
7783
7784commit 0a404b0ed79ba45ccaf7ed5528a8f5004c3698cb
7785Author: Darren Tucker <dtucker@zip.com.au>
7786Date: Fri May 17 20:47:29 2013 +1000
7787
7788 - dtucker@cvs.openbsd.org 2013/05/17 10:34:30
7789 [regress/portnum.sh]
7790 use a more portable negated if structure. from portable (id sync only)
7791
7792commit 62ee222e6f3f5ee288434f58b5136ae3d56f5164
7793Author: Darren Tucker <dtucker@zip.com.au>
7794Date: Fri May 17 20:46:00 2013 +1000
7795
7796 - dtucker@cvs.openbsd.org 2013/05/17 10:33:09
7797 [regress/agent-getpeereid.sh]
7798 don't redirect stdout from sudo. from portable (id sync only)
7799
7800commit 00478d30cb4bcc18dc1ced8144d16b03cdf790f6
7801Author: Darren Tucker <dtucker@zip.com.au>
7802Date: Fri May 17 20:45:06 2013 +1000
7803
7804 - dtucker@cvs.openbsd.org 2013/05/17 10:30:07
7805 [regress/test-exec.sh]
7806 wait a bit longer for startup and use case for absolute path.
7807 from portable (id sync only)
7808
7809commit 98989eb95eef0aefed7e9fb4e65c2f625be946f6
7810Author: Darren Tucker <dtucker@zip.com.au>
7811Date: Fri May 17 20:44:09 2013 +1000
7812
7813 - dtucker@cvs.openbsd.org 2013/05/17 10:28:11
7814 [regress/sftp.sh]
7815 only compare copied data if sftp succeeds. from portable (id sync only)
7816
7817commit 438f60eb9a5f7cd40bb242cfec865e4fde71b07c
7818Author: Darren Tucker <dtucker@zip.com.au>
7819Date: Fri May 17 20:43:13 2013 +1000
7820
7821 - dtucker@cvs.openbsd.org 2013/05/17 10:26:26
7822 [regress/sftp-badcmds.sh]
7823 remove unused BATCH variable. (id sync only)
7824
7825commit 1466bd25a8d1ff7ae455a795d2d7d52dc17d2938
7826Author: Darren Tucker <dtucker@zip.com.au>
7827Date: Fri May 17 20:42:05 2013 +1000
7828
7829 - dtucker@cvs.openbsd.org 2013/05/17 10:24:48
7830 [localcommand.sh]
7831 use backticks for portability. (id sync only)
7832
7833commit 05b5e518c9969d63471f2ccfd85b1de6e724d30b
7834Author: Darren Tucker <dtucker@zip.com.au>
7835Date: Fri May 17 20:41:07 2013 +1000
7836
7837 - dtucker@cvs.openbsd.org 2013/05/17 10:23:52
7838 [regress/login-timeout.sh regress/reexec.sh regress/test-exec.sh]
7839 Use SUDO when cat'ing pid files and running the sshd log wrapper so that
7840 it works with a restrictive umask and the pid files are not world readable.
7841 Changes from -portable. (id sync only)
7842
7843commit dd669173f93ea8c8397e0af758eaf13ab4f1c591
7844Author: Darren Tucker <dtucker@zip.com.au>
7845Date: Fri May 17 20:39:57 2013 +1000
7846
7847 - dtucker@cvs.openbsd.org 2013/05/17 10:16:26
7848 [regress/try-ciphers.sh]
7849 use expr for math to keep diffs vs portable down
7850 (id sync only)
7851
7852commit 044f32f4c6fd342f9f5949bb0ca77624c0db4494
7853Author: Darren Tucker <dtucker@zip.com.au>
7854Date: Fri May 17 20:12:57 2013 +1000
7855
7856 - (dtucker) [regress/cfgmatch.sh] Remove unneeded sleep renderd obsolete by
7857 rev 1.6 which calls wait.
7858
7859commit 9cc8ff7b63f175661c8807006f6d2649d56ac402
7860Author: Darren Tucker <dtucker@zip.com.au>
7861Date: Fri May 17 20:01:52 2013 +1000
7862
7863 - (dtucker) [regress/runtests.sh] Remove obsolete test driver script.
7864
7865commit f8d5b3451726530a864b172c556c311370c244e1
7866Author: Darren Tucker <dtucker@zip.com.au>
7867Date: Fri May 17 19:53:25 2013 +1000
7868
7869 - (dtucker) [regress/stderr-after-eof.sh regress/test-exec.sh] Move the md5
7870 helper function to the portable part of test-exec.sh.
7871
7872commit 6f66981ed3c6bb83b937959f329323975e356c33
7873Author: Darren Tucker <dtucker@zip.com.au>
7874Date: Fri May 17 19:28:51 2013 +1000
7875
7876 - (dtucker) [regress/test-exec.sh] Move the portable-specific functions
7877 together and add a couple of missing lines from openbsd.
7878
7879commit 5f1a89a3b67264f4aa83e057cd4f74fd60b9ffa4
7880Author: Darren Tucker <dtucker@zip.com.au>
7881Date: Fri May 17 19:17:58 2013 +1000
7882
7883 - (dtucker) [regress/integrity.sh regress/krl.sh regress/test-exec.sh]
7884 Move the jot helper function to portable-specific part of test-exec.sh.
7885
7886commit 96457a54d05dea81f34ecb4e059d2f8b98382b85
7887Author: Darren Tucker <dtucker@zip.com.au>
7888Date: Fri May 17 19:03:38 2013 +1000
7889
7890 - (dtucker) [regress/agent-getpeereid.sh] Resync spaces with openbsd.
7891
7892commit 7f193236594e8328ad133ea05eded31f837b45b5
7893Author: Darren Tucker <dtucker@zip.com.au>
7894Date: Fri May 17 19:02:28 2013 +1000
7895
7896 - (dtucker) [regress/cfgmatch.sh] Resync config file setup with openbsd.
7897
7898commit 8654dd2d737800d09e7730b3dfc2a54411f4cf90
7899Author: Darren Tucker <dtucker@zip.com.au>
7900Date: Fri May 17 16:03:48 2013 +1000
7901
7902 - (dtucker) [openbsd-compat/getopt.h] Remove unneeded bits.
7903
7904commit 59d928d3b47e8298f4a8b4b3fb37fb8c8ce1b098
7905Author: Darren Tucker <dtucker@zip.com.au>
7906Date: Fri May 17 15:32:29 2013 +1000
7907
7908 - dtucker@cvs.openbsd.org 2013/05/17 04:29:14
7909 [regress/sftp.sh regress/putty-ciphers.sh regress/cipher-speed.sh
7910 regress/test-exec.sh regress/sftp-batch.sh regress/dynamic-forward.sh
7911 regress/putty-transfer.sh regress/conch-ciphers.sh regress/sftp-cmds.sh
7912 regress/scp.sh regress/ssh-com-sftp.sh regress/rekey.sh
7913 regress/putty-kex.sh regress/stderr-data.sh regress/stderr-after-eof.sh
7914 regress/sftp-badcmds.sh regress/reexec.sh regress/ssh-com-client.sh
7915 regress/sftp-chroot.sh regress/forwarding.sh regress/transfer.sh
7916 regress/multiplex.sh]
7917 Move the setting of DATA and COPY into test-exec.sh
7918
7919commit 34035be27b7ddd84706fe95c39d37cba7d5c9572
7920Author: Darren Tucker <dtucker@zip.com.au>
7921Date: Fri May 17 14:47:51 2013 +1000
7922
7923 - dtucker@cvs.openbsd.org 2013/05/17 01:32:11
7924 [regress/integrity.sh]
7925 don't print output from ssh before getting it (it's available in ssh.log)
7926
7927commit b8b96b0aa634d440feba4331c80ae4de9dda2081
7928Author: Darren Tucker <dtucker@zip.com.au>
7929Date: Fri May 17 14:46:20 2013 +1000
7930
7931 - dtucker@cvs.openbsd.org 2013/05/17 01:16:09
7932 [regress/agent-timeout.sh]
7933 Pull back some portability changes from -portable:
7934 - TIMEOUT is a read-only variable in some shells
7935 - not all greps have -q so redirect to /dev/null instead.
7936 (ID sync only)
7937
7938commit a40d97ff46831c9081a6a4472036689360847fb1
7939Author: Darren Tucker <dtucker@zip.com.au>
7940Date: Fri May 17 14:44:53 2013 +1000
7941
7942 sync missing ID
7943
7944commit 56347efe796a0506e846621ae65562b978e45f1d
7945Author: Darren Tucker <dtucker@zip.com.au>
7946Date: Fri May 17 13:28:36 2013 +1000
7947
7948 - dtucker@cvs.openbsd.org 2013/05/17 00:37:40
7949 [regress/agent.sh regress/keytype.sh regress/cfgmatch.sh
7950 regress/forcecommand.sh regress/proto-version.sh regress/test-exec.sh
7951 regress/cipher-speed.sh regress/cert-hostkey.sh regress/cert-userkey.sh
7952 regress/ssh-com.sh]
7953 replace 'echo -n' with 'printf' since it's more portable
7954 also remove "echon" hack.
7955
7956commit 91af05c5167fe0aa5bd41d2e4a83757d9f627c18
7957Author: Darren Tucker <dtucker@zip.com.au>
7958Date: Fri May 17 13:16:59 2013 +1000
7959
7960 - (dtucker) [regress/integrity.sh]. Force fixed Diffie-Hellman key exchange
7961 methods. When the openssl version doesn't support ECDH then next one on
7962 the list is DH group exchange, but that causes a bit more traffic which can
7963 mean that the tests flip bits in the initial exchange rather than the MACed
7964 traffic and we get different errors to what the tests look for.
7965
7966commit 6e1e60c3c2e16c32bb7ca0876caaa6182a4e4b2c
7967Author: Darren Tucker <dtucker@zip.com.au>
7968Date: Fri May 17 11:23:41 2013 +1000
7969
7970 - (dtucker) [regress/bsd.regress.mk] Remove unused file. We've never used it
7971 in portable and it's long gone in openbsd.
7972
7973commit 982b0cbc4c2b5ea14725f4b339393cdf343dd0fe
7974Author: Darren Tucker <dtucker@zip.com.au>
7975Date: Fri May 17 09:45:12 2013 +1000
7976
7977 - dtucker@cvs.openbsd.org 2013/05/16 05:48:31
7978 [regress/rekey.sh]
7979 add tests for RekeyLimit parsing
7980
7981commit 14490fe7b0f45b1b19f8a3dc10eb3d214f27f5bd
7982Author: Darren Tucker <dtucker@zip.com.au>
7983Date: Fri May 17 09:44:20 2013 +1000
7984
7985 - dtucker@cvs.openbsd.org 2013/05/16 04:26:10
7986 [regress/rekey.sh]
7987 add server-side rekey test
7988
7989commit c31c8729c15f83fba14ef9da0d66bda6215ff69a
7990Author: Darren Tucker <dtucker@zip.com.au>
7991Date: Fri May 17 09:43:33 2013 +1000
7992
7993 - dtucker@cvs.openbsd.org 2013/05/16 03:33:30
7994 [regress/rekey.sh]
7995 test rekeying when there's no data being transferred
7996
7997commit a8a62fcc46c19997797846197a6256ed9a777a47
7998Author: Darren Tucker <dtucker@zip.com.au>
7999Date: Fri May 17 09:42:34 2013 +1000
8000
8001 - dtucker@cvs.openbsd.org 2013/05/16 02:10:35
8002 [rekey.sh]
8003 Add test for time-based rekeying
8004
8005commit 5e95173715d516e6014485e2b6def1fb3db84036
8006Author: Darren Tucker <dtucker@zip.com.au>
8007Date: Fri May 17 09:41:33 2013 +1000
8008
8009 - djm@cvs.openbsd.org 2013/05/10 03:46:14
8010 [modpipe.c]
8011 sync some portability changes from portable OpenSSH (id sync only)
8012
8013commit a4df65b9fc68a555a7d8781700475fb03ed6e694
8014Author: Darren Tucker <dtucker@zip.com.au>
8015Date: Fri May 17 09:37:31 2013 +1000
8016
8017 - dtucker@cvs.openbsd.org 2013/04/22 07:28:53
8018 [multiplex.sh]
8019 Add tests for -Oforward and -Ocancel for local and remote forwards
8020
8021commit 40aaff7e4bcb05b05e3d24938b6d34885be817da
8022Author: Darren Tucker <dtucker@zip.com.au>
8023Date: Fri May 17 09:36:20 2013 +1000
8024
8025 - dtucker@cvs.openbsd.org 2013/04/22 07:23:08
8026 [multiplex.sh]
8027 Write mux master logs to regress.log instead of ssh.log to keep separate
8028
8029commit f3568fc62b73b50a0a3c8447e4a00f4892cab25e
8030Author: Darren Tucker <dtucker@zip.com.au>
8031Date: Fri May 17 09:35:26 2013 +1000
8032
8033 - djm@cvs.openbsd.org 2013/04/18 02:46:12
8034 [Makefile regress/sftp-chroot.sh]
8035 test sshd ChrootDirectory+internal-sftp; feedback & ok dtucker@
8036
8037commit dfea3bcdd7c980c2335402464b7dd8d8721e426d
8038Author: Darren Tucker <dtucker@zip.com.au>
8039Date: Fri May 17 09:31:39 2013 +1000
8040
8041 - dtucker@cvs.openbsd.org 2013/04/07 02:16:03
8042 [regress/Makefile regress/rekey.sh regress/integrity.sh
8043 regress/sshd-log-wrapper.sh regress/forwarding.sh regress/test-exec.sh]
8044 use -E option for ssh and sshd to write debuging logs to ssh{,d}.log and
8045 save the output from any failing tests. If a test fails the debug output
8046 from ssh and sshd for the failing tests (and only the failing tests) should
8047 be available in failed-ssh{,d}.log.
8048
8049commit 75129025a2d504b630d1718fef0da002f5662f63
8050Author: Darren Tucker <dtucker@zip.com.au>
8051Date: Fri May 17 09:19:10 2013 +1000
8052
8053 - dtucker@cvs.openbsd.org 2013/04/06 06:00:22
8054 [regress/rekey.sh regress/test-exec.sh regress/integrity.sh
8055 regress/multiplex.sh Makefile regress/cfgmatch.sh]
8056 Split the regress log into 3 parts: the debug output from ssh, the debug
8057 log from sshd and the output from the client command (ssh, scp or sftp).
8058 Somewhat functional now, will become more useful when ssh/sshd -E is added.
8059
8060commit 7c8b1e72331293b4707dc6f7f68a69e975a3fa70
8061Author: Darren Tucker <dtucker@zip.com.au>
8062Date: Fri May 17 09:10:20 2013 +1000
8063
8064 - dtucker@cvs.openbsd.org 2013/03/23 11:09:43
8065 [test-exec.sh]
8066 Only regenerate host keys if they don't exist or if ssh-keygen has changed
8067 since they were. Reduces test runtime by 5-30% depending on machine
8068 speed.
8069
8070commit 712de4d1100963b11bc618472f95ce36bf7e2ae3
8071Author: Darren Tucker <dtucker@zip.com.au>
8072Date: Fri May 17 09:07:12 2013 +1000
8073
8074 - djm@cvs.openbsd.org 2013/03/07 00:20:34
8075 [regress/proxy-connect.sh]
8076 repeat test with a style appended to the username
8077
8078commit 09c0f0325b2f538de9a1073e03b8ef26dece4c16
8079Author: Darren Tucker <dtucker@zip.com.au>
8080Date: Thu May 16 20:48:57 2013 +1000
8081
8082 - dtucker@cvs.openbsd.org 2013/05/16 10:44:06
8083 [servconf.c]
8084 remove another now-unused variable
8085
8086commit 9113d0c2381202412c912a20c8083ab7d6824ec9
8087Author: Darren Tucker <dtucker@zip.com.au>
8088Date: Thu May 16 20:48:14 2013 +1000
8089
8090 - dtucker@cvs.openbsd.org 2013/05/16 10:43:34
8091 [servconf.c readconf.c]
8092 remove now-unused variables
8093
8094commit e194ba4111ffd47cd1f4c8be1ddc8a4cb673d005
8095Author: Darren Tucker <dtucker@zip.com.au>
8096Date: Thu May 16 20:47:31 2013 +1000
8097
8098 - (dtucker) [configure.ac readconf.c servconf.c
8099 openbsd-compat/openbsd-compat.h] Add compat bits for scan_scaled.
8100
8101commit b7ee8521448100e5b268111ff90feb017e657e44
8102Author: Darren Tucker <dtucker@zip.com.au>
8103Date: Thu May 16 20:33:10 2013 +1000
8104
8105 - dtucker@cvs.openbsd.org 2013/05/16 09:12:31
8106 [readconf.c servconf.c]
8107 switch RekeyLimit traffic volume parsing to scan_scaled. ok djm@
8108
8109commit dbee308253931f8c1aeebf781d7e7730ff6a0dc1
8110Author: Darren Tucker <dtucker@zip.com.au>
8111Date: Thu May 16 20:32:29 2013 +1000
8112
8113 - dtucker@cvs.openbsd.org 2013/05/16 09:08:41
8114 [log.c scp.c sshd.c serverloop.c schnorr.c sftp.c]
8115 Fix some "unused result" warnings found via clang and -portable.
8116 ok markus@
8117
8118commit 64d22946d664dad8165f1fae9e78b53831ed728d
8119Author: Darren Tucker <dtucker@zip.com.au>
8120Date: Thu May 16 20:31:29 2013 +1000
8121
8122 - jmc@cvs.openbsd.org 2013/05/16 06:30:06
8123 [sshd_config.5]
8124 oops! avoid Xr to self;
8125
8126commit 63e0df2b936770baadc8844617b99e5174b476d0
8127Author: Darren Tucker <dtucker@zip.com.au>
8128Date: Thu May 16 20:30:31 2013 +1000
8129
8130 - jmc@cvs.openbsd.org 2013/05/16 06:28:45
8131 [ssh_config.5]
8132 put IgnoreUnknown in the right place;
8133
8134commit 0763698f71efef8b3f8460c5700758359219eb7c
8135Author: Darren Tucker <dtucker@zip.com.au>
8136Date: Thu May 16 20:30:03 2013 +1000
8137
8138 - djm@cvs.openbsd.org 2013/05/16 04:27:50
8139 [ssh_config.5 readconf.h readconf.c]
8140 add the ability to ignore specific unrecognised ssh_config options;
8141 bz#866; ok markus@
8142
8143commit 5f96f3b4bee11ae2b9b32ff9b881c3693e210f96
8144Author: Darren Tucker <dtucker@zip.com.au>
8145Date: Thu May 16 20:29:28 2013 +1000
8146
8147 - dtucker@cvs.openbsd.org 2013/05/16 04:09:14
8148 [sshd_config.5 servconf.c servconf.h packet.c serverloop.c monitor.c sshd_config
8149 sshd.c] Add RekeyLimit to sshd with the same syntax as the client allowing
8150 rekeying based on traffic volume or time. ok djm@, help & ok jmc@ for the man
8151 page.
8152
8153commit c53c2af173cf67fd1c26f98e7900299b1b65b6ec
8154Author: Darren Tucker <dtucker@zip.com.au>
8155Date: Thu May 16 20:28:16 2013 +1000
8156
8157 - dtucker@cvs.openbsd.org 2013/05/16 02:00:34
8158 [ssh_config sshconnect2.c packet.c readconf.h readconf.c clientloop.c
8159 ssh_config.5 packet.h]
8160 Add an optional second argument to RekeyLimit in the client to allow
8161 rekeying based on elapsed time in addition to amount of traffic.
8162 with djm@ jmc@, ok djm
8163
8164commit 64c6fceecd27e1739040b42de8f3759454260b39
8165Author: Darren Tucker <dtucker@zip.com.au>
8166Date: Thu May 16 20:27:14 2013 +1000
8167
8168 - dtucker@cvs.openbsd.org 2013/05/10 10:13:50
8169 [ssh-pkcs11-helper.c]
8170 remove unused extern optarg. ok markus@
8171
8172commit caf00109346e4ab6bb495b0e22bc5b1e7ee22f26
8173Author: Darren Tucker <dtucker@zip.com.au>
8174Date: Thu May 16 20:26:18 2013 +1000
8175
8176 - djm@cvs.openbsd.org 2013/05/10 04:08:01
8177 [key.c]
8178 memleak in cert_free(), wasn't actually freeing the struct;
8179 bz#2096 from shm AT digitalsun.pl
8180
8181commit 7e831edbf7a1b0b9aeeb08328b9fceafaad1bf22
8182Author: Darren Tucker <dtucker@zip.com.au>
8183Date: Thu May 16 20:25:40 2013 +1000
8184
8185 add missing attribution
8186
8187commit 54da6be320495604ddf65d10ac4cc8cf7849c533
8188Author: Darren Tucker <dtucker@zip.com.au>
8189Date: Thu May 16 20:25:04 2013 +1000
8190
8191 - djm@cvs.openbsd.org 2013/05/10 03:40:07
8192 [sshconnect2.c]
8193 fix bzero(ptr_to_struct, sizeof(ptr_to_struct)); bz#2100 from
8194
8195commit 5d8b702d95c0dfc338726fecfbb709695afd1377
8196Author: Darren Tucker <dtucker@zip.com.au>
8197Date: Thu May 16 20:24:23 2013 +1000
8198
8199 - dtucker@cvs.openbsd.org 2013/05/06 07:35:12
8200 [sftp-server.8]
8201 Reference the version of the sftp draft we actually implement. ok djm@
8202
8203commit 026d9db3fbe311b5a7e98d62472cb666aa559648
8204Author: Darren Tucker <dtucker@zip.com.au>
8205Date: Thu May 16 20:23:52 2013 +1000
8206
8207 - tedu@cvs.openbsd.org 2013/04/24 16:01:46
8208 [misc.c]
8209 remove extra parens noticed by nicm
8210
8211commit 2ca51bf140ef2c2409fd220778529dc17c11d8fa
8212Author: Darren Tucker <dtucker@zip.com.au>
8213Date: Thu May 16 20:22:46 2013 +1000
8214
8215 - tedu@cvs.openbsd.org 2013/04/23 17:49:45
8216 [misc.c]
8217 use xasprintf instead of a series of strlcats and strdup. ok djm
8218
8219commit 6aa3eacc5e5f39702b6dd5b27970d9fd97bc2383
8220Author: Damien Miller <djm@mindrot.org>
8221Date: Thu May 16 11:10:17 2013 +1000
8222
8223 - (djm) [contrib/ssh-copy-id] Fix bug that could cause "rm *" to be
8224 executed if mktemp failed; bz#2105 ok dtucker@
8225
8226commit c54e3e0741a27119b3badd8ff92b1988b7e9bd50
8227Author: Darren Tucker <dtucker@zip.com.au>
8228Date: Fri May 10 18:53:14 2013 +1000
8229
8230 - (dtucker) [configure.ac] Add -Werror to the -Qunused-arguments test so
8231 we don't get a warning on compilers that *don't* support it. Add
8232 -Wno-unknown-warning-option. Move both to the start of the list for
8233 maximum noise suppression. Tested with gcc 4.6.3, gcc 2.95.4 and clang 2.9.
8234
8235commit a75d247a18a5099c60226395354eb252c097ac86
8236Author: Darren Tucker <dtucker@zip.com.au>
8237Date: Fri May 10 18:11:55 2013 +1000
8238
8239 - (dtucker) [kex.c] Only include sha256 and ECC key exchange methods when the
8240 underlying libraries support them.
8241
8242commit 0abfb559e3f79d1f217773510d7626c3722aa3c1
8243Author: Darren Tucker <dtucker@zip.com.au>
8244Date: Fri May 10 18:08:49 2013 +1000
8245
8246 - (dtucker) [openbsd-compat/getopt.h openbsd-compat/getopt_long.c
8247 openbsd-compat/openbsd-compat.h] pull in getopt.h from openbsd and plumb
8248 in to use it when we're using our own getopt.
8249
8250commit ccfdfceacb7e23d1479ed4cc91976c5ac6e23c56
8251Author: Darren Tucker <dtucker@zip.com.au>
8252Date: Fri May 10 16:28:55 2013 +1000
8253
8254 - (dtucker) [openbsd-compat/Makefile.in openbsd-compat/getopt.c
8255 openbsd-compat/getopt_long.c regress/modpipe.c] Remove getopt.c, add
8256 portability code to getopt_long.c and switch over Makefile and the ugly
8257 hack in modpipe.c. Fixes bz#1448.
8258
8259commit 39332020078aa8fd4fc28e00b336438dc64b0f5a
8260Author: Darren Tucker <dtucker@zip.com.au>
8261Date: Fri May 10 15:38:11 2013 +1000
8262
8263 - (dtucker) [openbsd-compat/getopt_long.c] Import from OpenBSD. No
8264 portability changes yet.
8265
8266commit 35b2fe99bee4f332d1c1efa49107cdb3c67da07a
8267Author: Darren Tucker <dtucker@zip.com.au>
8268Date: Fri May 10 15:35:26 2013 +1000
8269
8270 - (dtucker) [openbsd-compat/getopt.c] Factor out portibility changes to
8271 getopt.c. Preprocessed source is identical other than line numbers.
8272
8273commit abbc7a7c02e45787d023f50a30f62d7a3e14fe9e
8274Author: Darren Tucker <dtucker@zip.com.au>
8275Date: Fri May 10 13:54:23 2013 +1000
8276
8277 - (dtucker) [configure.ac] Enable -Wsizeof-pointer-memaccess if the compiler
8278 supports it. Mentioned by Colin Watson in bz#2100, ok djm.
8279
8280commit bc02f163f6e882d390abfb925b47b41e13ae523b
8281Author: Damien Miller <djm@mindrot.org>
8282Date: Tue Apr 23 19:25:49 2013 +1000
8283
8284 - dtucker@cvs.openbsd.org 2013/04/22 01:17:18
8285 [mux.c]
8286 typo in debug output: evitval->exitval
8287
8288commit f8b894e31dc3530c7eb6d0a378848260d54f74c4
8289Author: Damien Miller <djm@mindrot.org>
8290Date: Tue Apr 23 19:25:29 2013 +1000
8291
8292 - djm@cvs.openbsd.org 2013/04/19 12:07:08
8293 [kex.c]
8294 remove duplicated list entry pointed out by naddy@
8295
8296commit 34bd20a1e53b63ceb01f06c1654d9112e6784b0a
8297Author: Damien Miller <djm@mindrot.org>
8298Date: Tue Apr 23 19:25:00 2013 +1000
8299
8300 - djm@cvs.openbsd.org 2013/04/19 11:10:18
8301 [ssh.c]
8302 add -Q to usage; reminded by jmc@
8303
8304commit ea11119eee3c5e2429b1f5f8688b25b028fa991a
8305Author: Damien Miller <djm@mindrot.org>
8306Date: Tue Apr 23 19:24:32 2013 +1000
8307
8308 - djm@cvs.openbsd.org 2013/04/19 01:06:50
8309 [authfile.c cipher.c cipher.h kex.c kex.h kexecdh.c kexecdhc.c kexecdhs.c]
8310 [key.c key.h mac.c mac.h packet.c ssh.1 ssh.c]
8311 add the ability to query supported ciphers, MACs, key type and KEX
8312 algorithms to ssh. Includes some refactoring of KEX and key type handling
8313 to be table-driven; ok markus@
8314
8315commit a56086b9903b62c1c4fdedf01b68338fe4dc90e4
8316Author: Damien Miller <djm@mindrot.org>
8317Date: Tue Apr 23 15:24:18 2013 +1000
8318
8319 - djm@cvs.openbsd.org 2013/04/19 01:03:01
8320 [session.c]
8321 reintroduce 1.262 without the connection-killing bug:
8322 fatal() when ChrootDirectory specified by running without root privileges;
8323 ok markus@
8324
8325commit 0d6771b4648889ae5bc4235f9e3fc6cd82b710bd
8326Author: Damien Miller <djm@mindrot.org>
8327Date: Tue Apr 23 15:23:24 2013 +1000
8328
8329 - djm@cvs.openbsd.org 2013/04/19 01:01:00
8330 [ssh-keygen.c]
8331 fix some memory leaks; bz#2088 ok dtucker@
8332
8333commit 467b00c38ba244f9966466e57a89d003f3afb159
8334Author: Damien Miller <djm@mindrot.org>
8335Date: Tue Apr 23 15:23:07 2013 +1000
8336
8337 - djm@cvs.openbsd.org 2013/04/19 01:00:10
8338 [sshd_config.5]
8339 document the requirment that the AuthorizedKeysCommand be owned by root;
8340 ok dtucker@ markus@
8341
8342commit 9303e6527bb5ca7630c765f28624702c212bfd6c
8343Author: Damien Miller <djm@mindrot.org>
8344Date: Tue Apr 23 15:22:40 2013 +1000
8345
8346 - djm@cvs.openbsd.org 2013/04/18 02:16:07
8347 [sftp.c]
8348 make "sftp -q" do what it says on the sticker: hush everything but errors;
8349
8350commit f1a02aea35504e8bef2ed9eef6f9ddeab12bacb3
8351Author: Damien Miller <djm@mindrot.org>
8352Date: Tue Apr 23 15:22:13 2013 +1000
8353
8354 - dtucker@cvs.openbsd.org 2013/04/17 09:04:09
8355 [session.c]
8356 revert rev 1.262; it fails because uid is already set here. ok djm@
8357
8358commit d5edefd27a30768cc7a4817302e964b6cb2f9be7
8359Author: Damien Miller <djm@mindrot.org>
8360Date: Tue Apr 23 15:21:39 2013 +1000
8361
8362 - djm@cvs.openbsd.org 2013/04/11 02:27:50
8363 [packet.c]
8364 quiet disconnect notifications on the server from error() back to logit()
8365 if it is a normal client closure; bz#2057 ok+feedback dtucker@
8366
8367commit 6901032b05291fc5d2bd4067fc47904de3506fda
8368Author: Damien Miller <djm@mindrot.org>
8369Date: Tue Apr 23 15:21:24 2013 +1000
8370
8371 - dtucker@cvs.openbsd.org 2013/04/07 09:40:27
8372 [sshd.8]
8373 clarify -e text. suggested by & ok jmc@
8374
8375commit 03d4d7e60b16f913c75382e32e136ddfa8d6485f
8376Author: Damien Miller <djm@mindrot.org>
8377Date: Tue Apr 23 15:21:06 2013 +1000
8378
8379 - dtucker@cvs.openbsd.org 2013/04/07 02:10:33
8380 [log.c log.h ssh.1 ssh.c sshd.8 sshd.c]
8381 Add -E option to ssh and sshd to append debugging logs to a specified file
8382 instead of stderr or syslog. ok markus@, man page help jmc@
8383
8384commit 37f1c08473b1ef2a188ee178ce2e11e841f88563
8385Author: Damien Miller <djm@mindrot.org>
8386Date: Tue Apr 23 15:20:43 2013 +1000
8387
8388 - markus@cvs.openbsd.org 2013/04/06 16:07:00
8389 [channels.c sshd.c]
8390 handle ECONNABORTED for accept(); ok deraadt some time ago...
8391
8392commit 172859cff7df9fd8a29a1f0a4de568f644bbda50
8393Author: Damien Miller <djm@mindrot.org>
8394Date: Tue Apr 23 15:19:27 2013 +1000
8395
8396 - djm@cvs.openbsd.org 2013/04/05 00:58:51
8397 [mux.c]
8398 cleanup mux-created channels that are in SSH_CHANNEL_OPENING state too
8399 (in addition to ones already in OPEN); bz#2079, ok dtucker@
8400
8401commit 9f12b5dcd5f7772e633fb2786c63bfcbea1f1aea
8402Author: Damien Miller <djm@mindrot.org>
8403Date: Tue Apr 23 15:19:11 2013 +1000
8404
8405 - djm@cvs.openbsd.org 2013/04/05 00:31:49
8406 [pathnames.h]
8407 use the existing _PATH_SSH_USER_RC define to construct the other
8408 pathnames; bz#2077, ok dtucker@ (no binary change)
8409
8410commit d677ad14ff7efedf21745ee1694058350e758e18
8411Author: Damien Miller <djm@mindrot.org>
8412Date: Tue Apr 23 15:18:51 2013 +1000
8413
8414 - djm@cvs.openbsd.org 2013/04/05 00:14:00
8415 [auth2-gss.c krl.c sshconnect2.c]
8416 hush some {unused, printf type} warnings
8417
8418commit 508b6c3d3b95c8ec078fd4801368597ab29b2db9
8419Author: Damien Miller <djm@mindrot.org>
8420Date: Tue Apr 23 15:18:28 2013 +1000
8421
8422 - djm@cvs.openbsd.org 2013/03/08 06:32:58
8423 [ssh.c]
8424 allow "ssh -f none ..." ok markus@
8425
8426commit 91a55f28f35431f9000b95815c343b5a18fda712
8427Author: Damien Miller <djm@mindrot.org>
8428Date: Tue Apr 23 15:18:10 2013 +1000
8429
8430 - markus@cvs.openbsd.org 2013/03/07 19:27:25
8431 [auth.h auth2-chall.c auth2.c monitor.c sshd_config.5]
8432 add submethod support to AuthenticationMethods; ok and freedback djm@
8433
8434commit 4ce189d9108c62090a0dd5dea973d175328440db
8435Author: Damien Miller <djm@mindrot.org>
8436Date: Tue Apr 23 15:17:52 2013 +1000
8437
8438 - djm@cvs.openbsd.org 2013/03/07 00:19:59
8439 [auth2-pubkey.c monitor.c]
8440 reconstruct the original username that was sent by the client, which may
8441 have included a style (e.g. "root:skey") when checking public key
8442 signatures. Fixes public key and hostbased auth when the client specified
8443 a style; ok markus@
8444
8445commit 5cbec4c25954b184e43bf3d3ac09e65eb474f5f9
8446Author: Damien Miller <djm@mindrot.org>
8447Date: Tue Apr 23 15:17:12 2013 +1000
8448
8449 - djm@cvs.openbsd.org 2013/03/06 23:36:53
8450 [readconf.c]
8451 g/c unused variable (-Wunused)
8452
8453commit 998cc56b65682d490c9bbf5977dceb1aa84a0233
8454Author: Damien Miller <djm@mindrot.org>
8455Date: Tue Apr 23 15:16:43 2013 +1000
8456
8457 - djm@cvs.openbsd.org 2013/03/06 23:35:23
8458 [session.c]
8459 fatal() when ChrootDirectory specified by running without root privileges;
8460 ok markus@
8461
8462commit 62e9c4f9b6027620f9091a2f43328e057bdb33f1
8463Author: Damien Miller <djm@mindrot.org>
8464Date: Tue Apr 23 15:15:49 2013 +1000
8465
8466 - (djm) OpenBSD CVS Sync
8467 - markus@cvs.openbsd.org 2013/03/05 20:16:09
8468 [sshconnect2.c]
8469 reset pubkey order on partial success; ok djm@
8470
8471commit 6332da2ae88db623d7da8070dd807efa26d9dfe8
8472Author: Damien Miller <djm@mindrot.org>
8473Date: Tue Apr 23 14:25:52 2013 +1000
8474
8475 - (djm) [auth.c configure.ac misc.c monitor.c monitor_wrap.c] Support
8476 platforms, such as Android, that lack struct passwd.pw_gecos. Report
8477 and initial patch from Nathan Osman bz#2086; feedback tim@ ok dtucker@
8478
8479commit ce1c9574fcfaf753a062276867335c1e237f725c
8480Author: Darren Tucker <dtucker@zip.com.au>
8481Date: Thu Apr 18 21:36:19 2013 +1000
8482
8483 - (dtucker) [configure.ac] Use -Qunused-arguments to suppress warnings from
8484 unused argument warnings (in particular, -fno-builtin-memset) from clang.
8485
8486commit bc68f2451b836e6a3fa65df8774a8b1f10049ded
8487Author: Damien Miller <djm@mindrot.org>
8488Date: Thu Apr 18 11:26:25 2013 +1000
8489
8490 - (djm) [config.guess config.sub] Update to last versions before they switch
8491 to GPL3. ok dtucker@
8492
8493commit 15fd19c4c9943cf02bc6f462d52c86ee6a8f422e
8494Author: Darren Tucker <dtucker@zip.com.au>
8495Date: Fri Apr 5 11:22:26 2013 +1100
8496
8497 - djm@cvs.openbsd.org 2013/02/22 22:09:01
8498 [ssh.c]
8499 Allow IdenityFile=none; ok markus deraadt (and dtucker for an earlier
8500 version)
8501
8502commit 5d1d9541a7c83963cd887b6b36e25b46463a05d4
8503Author: Darren Tucker <dtucker@zip.com.au>
8504Date: Fri Apr 5 11:20:00 2013 +1100
8505
8506 - markus@cvs.openbsd.org 2013/02/22 19:13:56
8507 [sshconnect.c]
8508 support ProxyCommand=- (stdin/out already point to the proxy); ok djm@
8509
8510commit aefa3682431f59cf1ad9a0f624114b135135aa44
8511Author: Darren Tucker <dtucker@zip.com.au>
8512Date: Fri Apr 5 11:18:35 2013 +1100
8513
8514 - dtucker@cvs.openbsd.org 2013/02/22 04:45:09
8515 [ssh.c readconf.c readconf.h]
8516 Don't complain if IdentityFiles specified in system-wide configs are
8517 missing. ok djm, deraadt
8518
8519commit f3c38142435622d056582e851579d8647a233c7f
8520Author: Darren Tucker <dtucker@zip.com.au>
8521Date: Fri Apr 5 11:16:52 2013 +1100
8522
8523 - dtucker@cvs.openbsd.org 2013/02/19 02:12:47
8524 [krl.c]
8525 Remove bogus include. ok djm
8526 (id sync only)
8527
8528commit 1910478c2d2c3d0e1edacaeff21ed388d70759e9
8529Author: Darren Tucker <dtucker@zip.com.au>
8530Date: Fri Apr 5 11:13:08 2013 +1100
8531
8532 - dtucker@cvs.openbsd.org 2013/02/17 23:16:57
8533 [readconf.c ssh.c readconf.h sshconnect2.c]
8534 Keep track of which IndentityFile options were manually supplied and which
8535 were default options, and don't warn if the latter are missing.
8536 ok markus@
8537
8538commit c9627cdbc65b25da943f24e6a953da899f08eefc
8539Author: Darren Tucker <dtucker@zip.com.au>
8540Date: Mon Apr 1 12:40:48 2013 +1100
8541
8542 - (dtucker) [openbsd-compat/bsd-cygwin_util.{c,h}] Don't include windows.h
8543 to avoid conflicting definitions of __int64, adding the required bits.
8544 Patch from Corinna Vinschen.
8545
8546commit 75db01d2ce29a85f8e5a2aff2011446896cf3f8a
8547Author: Tim Rice <tim@multitalents.net>
8548Date: Fri Mar 22 10:14:32 2013 -0700
8549
8550 - (tim) [Makefile.in] remove some duplication introduced in 20130220 commit.
8551
8552commit 221b4b2436ac78a65c3b775c25ccd396a1fed208
8553Author: Darren Tucker <dtucker@zip.com.au>
8554Date: Fri Mar 22 12:51:09 2013 +1100
8555
8556 - (dtucker) [includes.h] Check if _GNU_SOURCE is already defined before
8557 defining it again. Prevents warnings if someone, eg, sets it in CFLAGS.
8558
8559commit c8a0f27c6d761d1335d13ed84d773e9ddf1d95c8
8560Author: Darren Tucker <dtucker@zip.com.au>
8561Date: Fri Mar 22 12:49:14 2013 +1100
8562
8563 - (dtucker) [configure.ac] Add stdlib.h to zlib check for exit() prototype.
8564
8565commit eed8dc261018aea4d6b8606ca3addc9f8cf9ed1e
8566Author: Damien Miller <djm@mindrot.org>
8567Date: Fri Mar 22 10:25:22 2013 +1100
8568
8569 - (djm) Release 6.2p1
8570
8571commit 83efe7c86168cc07b8e6cc6df6b54f7ace3b64a3
8572Author: Damien Miller <djm@mindrot.org>
8573Date: Fri Mar 22 10:17:36 2013 +1100
8574
8575 - (djm) [contrib/ssh-copy-id contrib/ssh-copy-id.1] Updated to Phil
8576 Hands' greatly revised version.
8577
8578commit 63b4bcd04e1c57b77eabb4e4d359508a4b2af685
8579Author: Damien Miller <djm@mindrot.org>
8580Date: Wed Mar 20 12:55:14 2013 +1100
8581
8582 - (djm) [configure.ac log.c scp.c sshconnect2.c openbsd-compat/vis.c]
8583 [openbsd-compat/vis.h] FreeBSD's strnvis isn't compatible with OpenBSD's
8584 so mark it as broken. Patch from des AT des.no