diff options
Diffstat (limited to 'ChangeLog')
| -rw-r--r-- | ChangeLog | 1683 |
1 files changed, 824 insertions, 859 deletions
diff --git a/ChangeLog b/ChangeLog index 6d7a7d265eb8..0307f62e0557 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,827 @@ +commit aede1c34243a6f7feae2fb2cb686ade5f9be6f3d +Author: Damien Miller <djm@mindrot.org> +Date: Wed Oct 17 11:01:20 2018 +1100 + + Require OpenSSL 1.1.x series 1.1.0g or greater + + Previous versions have a bug with EVP_CipherInit() when passed a + NULL EVP_CIPHER, per https://github.com/openssl/openssl/pull/4613 + + ok dtucker@ + +commit 08300c211409c212e010fe2e2f2883e573a04ce2 +Author: Damien Miller <djm@mindrot.org> +Date: Wed Oct 17 08:12:02 2018 +1100 + + unbreak compilation with --with-ssl-engine + + Missing last argument to OPENSSL_init_crypto() + +commit 1673274aee67ce0eb6f00578b6f3d2bcbd58f937 +Author: Darren Tucker <dtucker@dtucker.net> +Date: Tue Oct 16 14:45:57 2018 +1100 + + Remove gcc spectre mitigation flags. + + Current impementions of the gcc spectre mitigation flags cause + miscompilations when combined with other flags and do not provide much + protection. Found by fweimer at redhat.com, ok djm@ + +commit 4e23deefd7959ef83c73ed9cce574423438f6133 +Author: Damien Miller <djm@mindrot.org> +Date: Tue Oct 16 10:51:52 2018 +1100 + + Avoid deprecated OPENSSL_config when using 1.1.x + + OpenSSL 1.1.x soft-deprecated OPENSSL_config in favour of + OPENSSL_init_crypto; pointed out by Jakub Jelen + +commit 797cdd9c8468ed1125ce60d590ae3f1397866af4 +Author: Darren Tucker <dtucker@dtucker.net> +Date: Fri Oct 12 16:58:47 2018 +1100 + + Don't avoid our *sprintf replacements. + + Don't let systems with broken printf(3) avoid our replacements + via asprintf(3)/vasprintf(3) calling libc internally. From djm@ + +commit e526127cbd2f8ad88fb41229df0c9b850c722830 +Author: Darren Tucker <dtucker@dtucker.net> +Date: Fri Oct 12 16:43:35 2018 +1100 + + Check if snprintf understands %zu. + + If the platforms snprintf and friends don't understand %zu, use the + compat replacement. Prevents segfaults on those platforms. + +commit cf39f875191708c5f2f1a3c1c9019f106e74aea3 +Author: Damien Miller <djm@mindrot.org> +Date: Fri Oct 12 09:48:05 2018 +1100 + + remove stale link, tweak + +commit a7205e68decf7de2005810853b4ce6b222b65e2a +Author: Damien Miller <djm@mindrot.org> +Date: Fri Oct 12 09:47:20 2018 +1100 + + update version numbers ahead of release + +commit 1a4a9cf80f5b92b9d1dadd0bfa8867c04d195391 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Oct 11 03:48:04 2018 +0000 + + upstream: don't send new-style rsa-sha2-*-cert-v01@openssh.com names to + + older OpenSSH that can't handle them. spotted by Adam Eijdenberg; ok dtucker + + OpenBSD-Commit-ID: 662bbc402e3d7c9b6c322806269698106a6ae631 + +commit dc8ddcdf1a95e011c263486c25869bb5bf4e30ec +Author: Damien Miller <djm@mindrot.org> +Date: Thu Oct 11 13:08:59 2018 +1100 + + update depends + +commit 26841ac265603fd2253e6832e03602823dbb4022 +Author: Damien Miller <djm@mindrot.org> +Date: Thu Oct 11 13:02:11 2018 +1100 + + some more duplicated key algorithm lines + + From Adam Eijdenberg + +commit 5d9d17603bfbb620195a4581025052832b4c4adc +Author: Damien Miller <djm@mindrot.org> +Date: Thu Oct 11 11:56:36 2018 +1100 + + fix duplicated algorithm specification lines + + Spotted by Adam Eijdenberg + +commit ebfafd9c7a5b2a7fb515ee95dbe0e44e11d0a663 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Oct 11 00:52:46 2018 +0000 + + upstream: typo in plain RSA algorithm counterpart names for + + certificates; spotted by Adam Eijdenberg; ok dtucker@ + + OpenBSD-Commit-ID: bfcdeb6f4fc9e7607f5096574c8f118f2e709e00 + +commit c29b111e7d87c2324ff71c80653dd8da168c13b9 +Author: Damien Miller <djm@mindrot.org> +Date: Thu Oct 11 11:29:35 2018 +1100 + + check pw_passwd != NULL here too + + Again, for systems with broken NIS implementations. + + Prompted by coolbugcheckers AT gmail.com + +commit fe8e8f349a553ef4c567acd418aac769a82b7729 +Author: Damien Miller <djm@mindrot.org> +Date: Thu Oct 11 11:03:15 2018 +1100 + + check for NULL return from shadow_pw() + + probably unreachable on this platform; pointed out by + coolbugcheckers AT gmail.com + +commit acc59cbe7a1fb169e1c3caba65a39bd74d6e030d +Author: deraadt@openbsd.org <deraadt@openbsd.org> +Date: Wed Oct 10 16:43:49 2018 +0000 + + upstream: introducing openssh 7.9 + + OpenBSD-Commit-ID: 42d526a9fe01a40dd299ac58014d3349adf40e25 + +commit 12731158c75c8760a8bea06350eeb3e763fe1a07 +Author: Damien Miller <djm@mindrot.org> +Date: Thu Oct 11 10:29:29 2018 +1100 + + supply callback to PEM_read_bio_PrivateKey + + OpenSSL 1.1.0i has changed the behaviour of their PEM APIs, + so that empty passphrases are interpreted differently. This + probabalistically breaks loading some keys, because the PEM format + is terrible and doesn't include a proper MAC. + + Avoid this by providing a basic callback to avoid passing empty + passphrases to OpenSSL in cases where one is required. + + Based on patch from Jakub Jelen in bz#2913; ok dtucker@ + +commit d1d301a1dd5d6cc3a9ed93ab7ab09dda4cb456e0 +Author: Damien Miller <djm@mindrot.org> +Date: Wed Oct 10 14:57:00 2018 +1100 + + in pick_salt() avoid dereference of NULL passwords + + Apparently some NIS implementations can leave pw->pw_passwd (or the + shadow equivalent) NULL. + + bz#2909; based on patch from Todd Eigenschink + +commit edbb6febccee084d212fdc0cb05b40cb1c646ab1 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Tue Oct 9 05:42:23 2018 +0000 + + upstream: Treat all PEM_read_bio_PrivateKey() errors when a passphrase + + is specified as "incorrect passphrase" instead of trying to choose between + that and "invalid format". + + libcrypto can return ASN1 parsing errors rather than the expected + decrypt error in certain infrequent cases when trying to decrypt/parse + PEM private keys when supplied with an invalid passphrase. + + Report and repro recipe from Thomas Deutschmann in bz#2901 + + ok markus@ + + OpenBSD-Commit-ID: b1d4cd92395f9743f81c0d23aab2524109580870 + +commit 2581333d564d8697837729b3d07d45738eaf5a54 +Author: naddy@openbsd.org <naddy@openbsd.org> +Date: Fri Oct 5 14:26:09 2018 +0000 + + upstream: Support using service names for port numbers. + + * Try to resolve a port specification with getservbyname(3) if a + numeric conversion fails. + * Make the "Port" option in ssh_config handle its argument as a + port rather than a plain integer. + + ok dtucker@ deraadt@ + + OpenBSD-Commit-ID: e7f03633133205ab3dfbc67f9df7475fabae660d + +commit e0d6501e86734c48c8c503f81e1c0926e98c5c4c +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Oct 4 07:47:35 2018 +0000 + + upstream: when the peer sends a channel-close message, make sure we + + close the local extended read fd (stderr) along with the regular read fd + (stdout). Avoids weird stuck processed in multiplexing mode. + + Report and analysis by Nelson Elhage and Geoffrey Thomas in bz#2863 + + ok dtucker@ markus@ + + OpenBSD-Commit-ID: a48a2467fe938de4de69d2e7193d5fa701f12ae9 + +commit 6f1aabb128246f445e33b8844fad3de9cb1d18cb +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Oct 4 01:04:52 2018 +0000 + + upstream: factor out channel status formatting from + + channel_open_message() so we can use it in other debug messages + + OpenBSD-Commit-ID: 9c3903ca28fcabad57f566c9d0045b41ab7d52ba + +commit f1dd179e122bdfdb7ca3072d9603607740efda05 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Oct 4 00:10:11 2018 +0000 + + upstream: include a little more information about the status and + + disposition of channel's extended (stderr) fd; makes debugging some things a + bit easier. No behaviour change. + + OpenBSD-Commit-ID: 483eb6467dc7d5dbca8eb109c453e7a43075f7ce + +commit 2d1428b11c8b6f616f070f2ecedce12328526944 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Oct 4 00:04:41 2018 +0000 + + upstream: explicit_bzero here to be consistent with other kex*.c; + + report from coolbugcheckers AT gmail.com + + OpenBSD-Commit-ID: a90f146c5b5f5b1408700395e394f70b440856cb + +commit 5eff5b858e717e901e6af6596306a114de9f79f2 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Oct 3 06:38:35 2018 +0000 + + upstream: Allow ssh_config IdentityAgent directive to accept + + environment variable names as well as explicit paths. ok dtucker@ + + OpenBSD-Commit-ID: 2f0996e103876c53d8c9dd51dcce9889d700767b + +commit a46ac4d86b25414d78b632e8173578b37e5f8a83 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Tue Oct 2 12:51:58 2018 +0000 + + upstream: mention INFO@openssh.com for sending SIGINFO + + OpenBSD-Commit-ID: 132471eeb0df658210afd27852fe65131b26e900 + +commit ff3a411cae0b484274b7900ef52ff4dad3e12876 +Author: Damien Miller <djm@mindrot.org> +Date: Tue Oct 2 22:49:40 2018 +1000 + + only support SIGINFO on systems with SIGINFO + +commit cd98925c6405e972dc9f211afc7e75e838abe81c +Author: djm@openbsd.org <djm@openbsd.org> +Date: Tue Oct 2 12:40:07 2018 +0000 + + upstream: Add server support for signalling sessions via the SSH + + channel/ session protocol. Signalling is only supported to sesssions that are + not subsystems and were not started with a forced command. + + Long requested in bz#1424 + + Based on a patch from markus@ and reworked by dtucker@; + ok markus@ dtucker@ + + OpenBSD-Commit-ID: 4bea826f575862eaac569c4bedd1056a268be1c3 + +commit dba50258333f2604a87848762af07ba2cc40407a +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 26 07:32:44 2018 +0000 + + upstream: remove big ugly TODO comment from start of file. Some of + + the mentioned tasks are obsolete and, of the remainder, most are already + captured in PROTOCOL.mux where they better belong + + OpenBSD-Commit-ID: 16d9d76dee42a5bb651c9d6740f7f0ef68aeb407 + +commit 92b61a38ee9b765f5049f03cd1143e13f3878905 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 26 07:30:05 2018 +0000 + + upstream: Document mux proxy mode; added by Markus in openssh-7.4 + + Also add a little bit of information about the overall packet format + + OpenBSD-Commit-ID: bdb6f6ea8580ef96792e270cae7857786ad84a95 + +commit 9d883a1ce4f89b175fd77405ff32674620703fb2 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 26 01:48:57 2018 +0000 + + upstream: s/process_mux_master/mux_master_process/ in mux master + + function names, + + Gives better symmetry with the existing mux_client_*() names and makes + it more obvious when a message comes from the master vs client (they + are interleved in ControlMaster=auto mode). + + no functional change beyond prefixing a could of log messages with + __func__ where they were previously lacking. + + OpenBSD-Commit-ID: b01f7c3fdf92692e1713a822a89dc499333daf75 + +commit c2fa53cd6462da82d3a851dc3a4a3f6b920337c8 +Author: Darren Tucker <dtucker@dtucker.net> +Date: Sat Sep 22 14:41:24 2018 +1000 + + Remove unused variable in _ssh_compat_fflush. + +commit d1b3540c21212624af907488960d703c7d987b42 +Author: Darren Tucker <dtucker@dtucker.net> +Date: Thu Sep 20 18:08:43 2018 +1000 + + Import updated moduli. + +commit b5e412a8993ad17b9e1141c78408df15d3d987e1 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Fri Sep 21 12:46:22 2018 +0000 + + upstream: Allow ssh_config ForwardX11Timeout=0 to disable the + + timeout and allow X11 connections in untrusted mode indefinitely. ok dtucker@ + + OpenBSD-Commit-ID: ea1ceed3f540b48e5803f933e59a03b20db10c69 + +commit cb24d9fcc901429d77211f274031653476864ec6 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Fri Sep 21 12:23:17 2018 +0000 + + upstream: when compiled with GSSAPI support, cache supported method + + OIDs by calling ssh_gssapi_prepare_supported_oids() regardless of whether + GSSAPI authentication is enabled in the main config. + + This avoids sandbox violations for configurations that enable GSSAPI + auth later, e.g. + + Match user djm + GSSAPIAuthentication yes + + bz#2107; ok dtucker@ + + OpenBSD-Commit-ID: a5dd42d87c74e27cfb712b15b0f97ab20e0afd1d + +commit bbc8af72ba68da014d4de6e21a85eb5123384226 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Fri Sep 21 12:20:12 2018 +0000 + + upstream: In sshkey_in_file(), ignore keys that are considered for + + being too short (i.e. SSH_ERR_KEY_LENGTH). These keys will not be considered + to be "in the file". This allows key revocation lists to contain short keys + without the entire revocation list being considered invalid. + + bz#2897; ok dtucker + + OpenBSD-Commit-ID: d9f3d857d07194a42ad7e62889a74dc3f9d9924b + +commit 383a33d160cefbfd1b40fef81f72eadbf9303a66 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Fri Sep 21 03:11:36 2018 +0000 + + upstream: Treat connections with ProxyJump specified the same as ones + + with a ProxyCommand set with regards to hostname canonicalisation (i.e. don't + try to canonicalise the hostname unless CanonicalizeHostname is set to + 'always'). + + Patch from Sven Wegener via bz#2896 + + OpenBSD-Commit-ID: 527ff501cf98bf65fb4b29ed0cb847dda10f4d37 + +commit 0cbed248ed81584129b67c348dbb801660f25a6a +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Sep 20 23:40:16 2018 +0000 + + upstream: actually make CASignatureAlgorithms available as a config + + option + + OpenBSD-Commit-ID: 93fa7ff58314ed7b1ab7744090a6a91232e6ae52 + +commit 62528870c0ec48cd86a37dd7320fb85886c3e6ee +Author: dtucker@openbsd.org <dtucker@openbsd.org> +Date: Thu Sep 20 08:07:03 2018 +0000 + + upstream: Import updated moduli. + + OpenBSD-Commit-ID: 04431e8e7872f49a2129bf080a6b73c19d576d40 + +commit e6933a2ffa0659d57f3c7b7c457b2c62b2a84613 +Author: jmc@openbsd.org <jmc@openbsd.org> +Date: Thu Sep 20 06:58:48 2018 +0000 + + upstream: reorder CASignatureAlgorithms, and add them to the + + various -o lists; ok djm + + OpenBSD-Commit-ID: ecb88baecc3c54988b4d1654446ea033da359288 + +commit aa083aa9624ea7b764d5a81c4c676719a1a3e42b +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Sep 20 03:31:49 2018 +0000 + + upstream: fix "ssh -Q sig" to show correct signature algorithm list + + (it was erroneously showing certificate algorithms); prompted by markus@ + + OpenBSD-Commit-ID: 1cdee002f2f0c21456979deeb887fc889afb154d + +commit ecac7e1f7add6b28874959a11f2238d149dc2c07 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Sep 20 03:30:44 2018 +0000 + + upstream: add CASignatureAlgorithms option for the client, allowing + + it to specify which signature algorithms may be used by CAs when signing + certificates. Useful if you want to ban RSA/SHA1; ok markus@ + + OpenBSD-Commit-ID: 9159e5e9f67504829bf53ff222057307a6e3230f + +commit 86e5737c39153af134158f24d0cab5827cbd5852 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Sep 20 03:28:06 2018 +0000 + + upstream: Add sshd_config CASignatureAlgorithms option to allow + + control over which signature algorithms a CA may use when signing + certificates. In particular, this allows a sshd to ban certificates signed + with RSA/SHA1. + + ok markus@ + + OpenBSD-Commit-ID: b05c86ef8b52b913ed48d54a9b9c1a7714d96bac + +commit f80e68ea7d62e2dfafc12f1a60ab544ae4033a0f +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 19 02:03:02 2018 +0000 + + upstream: Make "ssh-add -q" do what it says on the tin: silence + + output from successful operations. + + Based on patch from Thijs van Dijk; ok dtucker@ deraadt@ + + OpenBSD-Commit-ID: c4f754ecc055c10af166116ce7515104aa8522e1 + +commit 5e532320e9e51de720d5f3cc2596e95d29f6e98f +Author: millert@openbsd.org <millert@openbsd.org> +Date: Mon Sep 17 15:40:14 2018 +0000 + + upstream: When choosing a prime from the moduli file, avoid + + re-using the linenum variable for something that is not a line number to + avoid the confusion that resulted in the bug in rev. 1.64. This also lets us + pass the actual linenum to parse_prime() so the error messages include the + correct line number. OK markus@ some time ago. + + OpenBSD-Commit-ID: 4d8e5d3e924d6e8eb70053e3defa23c151a00084 + +commit cce8cbe0ed7d1ba3a575310e0b63c193326ae616 +Author: Darren Tucker <dtucker@dtucker.net> +Date: Sat Sep 15 19:44:06 2018 +1000 + + Fix openssl-1.1 fallout for --without-openssl. + + ok djm@ + +commit 149519b9f201dac755f3cba4789f4d76fecf0ee1 +Author: Damien Miller <djm@mindrot.org> +Date: Sat Sep 15 19:37:48 2018 +1000 + + add futex(2) syscall to seccomp sandbox + + Apparently needed for some glibc/openssl combinations. + + Patch from Arkadiusz MiĆkiewicz + +commit 4488ae1a6940af704c4dbf70f55bf2f756a16536 +Author: Damien Miller <djm@mindrot.org> +Date: Sat Sep 15 19:36:55 2018 +1000 + + really add source for authopt_fuzz this time + +commit 9201784b4a257c8345fbd740bcbdd70054885707 +Author: Damien Miller <djm@mindrot.org> +Date: Sat Sep 15 19:35:40 2018 +1000 + + remove accidentally checked-in authopt_fuzz binary + +commit beb9e522dc7717df08179f9e59f36b361bfa14ab +Author: djm@openbsd.org <djm@openbsd.org> +Date: Fri Sep 14 05:26:27 2018 +0000 + + upstream: second try, deals properly with missing and private-only + + Use consistent format in debug log for keys readied, offered and + received during public key authentication. + + This makes it a little easier to see what is going on, as each message + now contains (where available) the key filename, its type and fingerprint, + and whether the key is hosted in an agent or a token. + + OpenBSD-Commit-ID: f1c6a8e9cfc4e108c359db77f24f9a40e1e25ea7 + +commit 6bc5a24ac867bfdc3ed615589d69ac640f51674b +Author: Damien Miller <djm@mindrot.org> +Date: Fri Sep 14 15:16:34 2018 +1000 + + fuzzer harness for authorized_keys option parsing + +commit 6c8b82fc6929b6a9a3f645151b6ec26c5507d9ef +Author: djm@openbsd.org <djm@openbsd.org> +Date: Fri Sep 14 04:44:04 2018 +0000 + + upstream: revert following; deals badly with agent keys + + revision 1.285 + date: 2018/09/14 04:17:12; author: djm; state: Exp; lines: +47 -26; commitid: lflGFcNb2X2HebaK; + Use consistent format in debug log for keys readied, offered and + received during public key authentication. + + This makes it a little easier to see what is going on, as each message + now contains the key filename, its type and fingerprint, and whether + the key is hosted in an agent or a token. + + OpenBSD-Commit-ID: e496bd004e452d4b051f33ed9ae6a54ab918f56d + +commit 6da046f9c3374ce7e269ded15d8ff8bc45017301 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Fri Sep 14 04:17:44 2018 +0000 + + upstream: garbage-collect moribund ssh_new_private() API. + + OpenBSD-Commit-ID: 7c05bf13b094093dfa01848a9306c82eb6e95f6c + +commit 1f24ac5fc05252ceb1c1d0e8cab6a283b883c780 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Fri Sep 14 04:17:12 2018 +0000 + + upstream: Use consistent format in debug log for keys readied, + + offered and received during public key authentication. + + This makes it a little easier to see what is going on, as each message + now contains the key filename, its type and fingerprint, and whether + the key is hosted in an agent or a token. + + OpenBSD-Commit-ID: 2a01d59285a8a7e01185bb0a43316084b4f06a1f + +commit 488c9325bb7233e975dbfbf89fa055edc3d3eddc +Author: millert@openbsd.org <millert@openbsd.org> +Date: Thu Sep 13 15:23:32 2018 +0000 + + upstream: Fix warnings caused by user_from_uid() and group_from_gid() + + now returning const char *. + + OpenBSD-Commit-ID: b5fe571ea77cfa7b9035062829ab05eb87d7cc6f + +commit 0aa1f230846ebce698e52051a107f3127024a05a +Author: Damien Miller <djm@mindrot.org> +Date: Fri Sep 14 10:31:47 2018 +1000 + + allow SIGUSR1 as synonym for SIGINFO + + Lets users on those unfortunate operating systems that lack SIGINFO + still be able to obtain progress information from unit tests :) + +commit d64e78526596f098096113fcf148216798c327ff +Author: Damien Miller <djm@mindrot.org> +Date: Thu Sep 13 19:05:48 2018 +1000 + + add compat header + +commit a3fd8074e2e2f06602e25618721f9556c731312c +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Sep 13 09:03:20 2018 +0000 + + upstream: missed a bit of openssl-1.0.x API in this unittest + + OpenBSD-Regress-ID: a73a54d7f7381856a3f3a2d25947bee7a9a5dbc9 + +commit 86e0a9f3d249d5580390daf58e015e68b01cef10 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Sep 13 05:06:51 2018 +0000 + + upstream: use only openssl-1.1.x API here too + + OpenBSD-Regress-ID: ae877064597c349954b1b443769723563cecbc8f + +commit 48f54b9d12c1c79fba333bc86d455d8f4cda8cfc +Author: Damien Miller <djm@mindrot.org> +Date: Thu Sep 13 12:13:50 2018 +1000 + + adapt -portable to OpenSSL 1.1x API + + Polyfill missing API with replacement functions extracted from LibreSSL + +commit 86112951d63d48839f035b5795be62635a463f99 +Author: Damien Miller <djm@mindrot.org> +Date: Thu Sep 13 12:12:42 2018 +1000 + + forgot to stage these test files in commit d70d061 + +commit 482d23bcacdd3664f21cc82a5135f66fc598275f +Author: djm@openbsd.org <djm@openbsd.org> +Date: Thu Sep 13 02:08:33 2018 +0000 + + upstream: hold our collective noses and use the openssl-1.1.x API in + + OpenSSH; feedback and ok tb@ jsing@ markus@ + + OpenBSD-Commit-ID: cacbcac87ce5da0d3ca7ef1b38a6f7fb349e4417 + +commit d70d061828730a56636ab6f1f24fe4a8ccefcfc1 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 12 01:36:45 2018 +0000 + + upstream: Include certs with multiple RSA signature variants in + + test data Ensure that cert->signature_key is populated correctly + + OpenBSD-Regress-ID: 56e68f70fe46cb3a193ca207385bdb301fd6603a + +commit f803b2682992cfededd40c91818b653b5d923ef5 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 12 01:23:48 2018 +0000 + + upstream: test revocation by explicit hash and by fingerprint + + OpenBSD-Regress-ID: 079c18a9ab9663f4af419327c759fc1e2bc78fd8 + +commit 2de78bc7da70e1338b32feeefcc6045cf49efcd4 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 12 01:22:43 2018 +0000 + + upstream: s/sshkey_demote/sshkey_from_private/g + + OpenBSD-Regress-ID: 782bde7407d94a87aa8d1db7c23750e09d4443c4 + +commit 41c115a5ea1cb79a6a3182773c58a23f760e8076 +Author: Damien Miller <djm@mindrot.org> +Date: Wed Sep 12 16:50:01 2018 +1000 + + delete the correct thing; kexfuzz binary + +commit f0fcd7e65087db8c2496f13ed39d772f8e38b088 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 12 06:18:59 2018 +0000 + + upstream: fix edit mistake; spotted by jmc@ + + OpenBSD-Commit-ID: dd724e1c52c9d6084f4cd260ec7e1b2b138261c6 + +commit 4cc259bac699f4d2a5c52b92230f9e488c88a223 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 12 01:34:02 2018 +0000 + + upstream: add SSH_ALLOWED_CA_SIGALGS - the default list of + + signature algorithms that are allowed for CA signatures. Notably excludes + ssh-dsa. + + ok markus@ + + OpenBSD-Commit-ID: 1628e4181dc8ab71909378eafe5d06159a22deb4 + +commit ba9e788315b1f6a350f910cb2a9e95b2ce584e89 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 12 01:32:54 2018 +0000 + + upstream: add sshkey_check_cert_sigtype() that checks a + + cert->signature_type against a supplied whitelist; ok markus + + OpenBSD-Commit-ID: caadb8073292ed7a9535e5adc067d11d356d9302 + +commit a70fd4ad7bd9f2ed223ff635a3d41e483057f23b +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 12 01:31:30 2018 +0000 + + upstream: add cert->signature_type field and keep it in sync with + + certificate signature wrt loading and certification operations; ok markus@ + + OpenBSD-Commit-ID: e8b8b9f76b66707a0cd926109c4383db8f664df3 + +commit 357128ac48630a9970e3af0e6ff820300a28da47 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 12 01:30:10 2018 +0000 + + upstream: Add "ssh -Q sig" to allow listing supported signature + + algorithms ok markus@ + + OpenBSD-Commit-ID: 7a8c6eb6c249dc37823ba5081fce64876d10fe2b + +commit 9405c6214f667be604a820c6823b27d0ea77937d +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 12 01:21:34 2018 +0000 + + upstream: allow key revocation by SHA256 hash and allow ssh-keygen + + to create KRLs using SHA256/base64 key fingerprints; ok markus@ + + OpenBSD-Commit-ID: a0590fd34e7f1141f2873ab3acc57442560e6a94 + +commit 50e2687ee0941c0ea216d6ffea370ffd2c1f14b9 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Wed Sep 12 01:19:12 2018 +0000 + + upstream: log certificate fingerprint in authentication + + success/failure message (previously we logged only key ID and CA key + fingerprint). + + ok markus@ + + OpenBSD-Commit-ID: a8ef2d172b7f1ddbcce26d6434b2de6d94f6c05d + +commit de37ca909487d23e5844aca289b3f5e75d3f1e1f +Author: dtucker@openbsd.org <dtucker@openbsd.org> +Date: Fri Sep 7 04:26:56 2018 +0000 + + upstream: Add FALLTHROUGH comments where appropriate. Patch from + + jjelen at redhat via bz#2687. + + OpenBSD-Commit-ID: c48eb457be697a19d6d2950c6d0879f3ccc851d3 + +commit 247766cd3111d5d8c6ea39833a3257ca8fb820f2 +Author: djm@openbsd.org <djm@openbsd.org> +Date: Fri Sep 7 01:42:54 2018 +0000 + + upstream: ssh -MM requires confirmation for all operations that + + change the multiplexing state, not just new sessions. + + mention that confirmation is checked via ssh-askpass + + OpenBSD-Commit-ID: 0f1b45551ebb9cc5c9a4fe54ad3b23ce90f1f5c2 + +commit db8bb80e3ac1bcb3e1305d846cd98c6b869bf03f +Author: mestre@openbsd.org <mestre@openbsd.org> +Date: Tue Aug 28 12:25:53 2018 +0000 + + upstream: fix misplaced parenthesis inside if-clause. it's harmless + + and the only issue is showing an unknown error (since it's not defined) + during fatal(), if it ever an error occurs inside that condition. + + OK deraadt@ markus@ djm@ + + OpenBSD-Commit-ID: acb0a8e6936bfbe590504752d01d1d251a7101d8 + +commit 086cc614f550b7d4f100c95e472a6b6b823938ab +Author: mestre@openbsd.org <mestre@openbsd.org> +Date: Tue Aug 28 12:17:45 2018 +0000 + + upstream: fix build with DEBUG_PK enabled + + OK dtucker@ + + OpenBSD-Commit-ID: ec1568cf27726e9638a0415481c20c406e7b441c + +commit 2678833013e97f8b18f09779b7f70bcbf5eb2ab2 +Author: Darren Tucker <dtucker@dtucker.net> +Date: Fri Sep 7 14:41:53 2018 +1000 + + Handle ngroups>_SC_NGROUPS_MAX. + + Based on github pull request #99 from Darren Maffat at Oracle: Solaris' + getgrouplist considers _SC_NGROUPS_MAX more of a guideline and can return + a larger number of groups. In this case, retry getgrouplist with a + larger array and defer allocating groups_byname. ok djm@ + +commit 039bf2a81797b8f3af6058d34005a4896a363221 +Author: Darren Tucker <dtucker@dtucker.net> +Date: Fri Sep 7 14:06:57 2018 +1000 + + Initial len for the fmt=NULL case. + + Patch from jjelen at redhat via bz#2687. (OpenSSH never calls + setproctitle with a null format so len is always initialized). + +commit ea9c06e11d2e8fb2f4d5e02f8a41e23d2bd31ca9 +Author: Darren Tucker <dtucker@dtucker.net> +Date: Fri Sep 7 14:01:39 2018 +1000 + + Include stdlib.h. + + Patch from jjelen at redhat via bz#2687. + +commit 9617816dbe73ec4d65075f4d897443f63a97c87f +Author: Damien Miller <djm@mindrot.org> +Date: Mon Aug 27 13:08:01 2018 +1000 + + document some more regress control env variables + + Specifically SKIP_UNIT, USE_VALGRING and LTESTS. Sort the list of + environment variables. + + Based on patch from Jakub Jelen + commit 71508e06fab14bc415a79a08f5535ad7bffa93d9 Author: Damien Miller <djm@mindrot.org> Date: Thu Aug 23 15:41:42 2018 +1000 @@ -8880,862 +9704,3 @@ Date: Thu Oct 20 03:42:09 2016 +1100 Remote channels .orig and .rej files. These files were incorrectly added during an OpenBSD sync. - -commit 246aa842a4ad368d8ce030495e657ef3a0e1f95c -Author: dtucker@openbsd.org <dtucker@openbsd.org> -Date: Tue Oct 18 17:32:54 2016 +0000 - - upstream commit - - Remove channel_input_port_forward_request(); the only caller - was the recently-removed SSH1 server code so it's now dead code. ok markus@ - - Upstream-ID: 05453983230a1f439562535fec2818f63f297af9 - -commit 2c6697c443d2c9c908260eed73eb9143223e3ec9 -Author: millert@openbsd.org <millert@openbsd.org> -Date: Tue Oct 18 12:41:22 2016 +0000 - - upstream commit - - Install a signal handler for tty-generated signals and - wait for the ssh child to suspend before suspending sftp. This lets ssh - restore the terminal mode as needed when it is suspended at the password - prompt. OK dtucker@ - - Upstream-ID: a31c1f42aa3e2985dcc91e46e6a17bd22e372d69 - -commit fd2a8f1033fa2316fff719fd5176968277560158 -Author: jmc@openbsd.org <jmc@openbsd.org> -Date: Sat Oct 15 19:56:25 2016 +0000 - - upstream commit - - various formatting fixes, specifically removing Dq; - - Upstream-ID: 81e85df2b8e474f5f93d66e61d9a4419ce87347c - -commit 8f866d8a57b9a2dc5dd04504e27f593b551618e3 -Author: Darren Tucker <dtucker@zip.com.au> -Date: Wed Oct 19 03:26:09 2016 +1100 - - Import readpassphrase.c rev 1.26. - - Author: miller@openbsd.org: - Avoid generate SIGTTOU when restoring the terminal mode. If we get - SIGTTOU it means the process is not in the foreground process group - which, in most cases, means that the shell has taken control of the tty. - Requiring the user the fg the process in this case doesn't make sense - and can result in both SIGTSTP and SIGTTOU being sent which can lead to - the process being suspended again immediately after being brought into - the foreground. - -commit f901440cc844062c9bab0183d133f7ccc58ac3a5 -Author: Darren Tucker <dtucker@zip.com.au> -Date: Wed Oct 19 03:23:16 2016 +1100 - - Import readpassphrase.c rev 1.25. - - Wrap <readpassphrase.h> so internal calls go direct and - readpassphrase is weak. - - (DEF_WEAK is a no-op in portable.) - -commit 032147b69527e5448a511049b2d43dbcae582624 -Author: Darren Tucker <dtucker@zip.com.au> -Date: Sat Oct 15 05:51:12 2016 +1100 - - Move DEF_WEAK into defines.h. - - As well pull in more recent changes from OpenBSD these will start to - arrive so put it where the definition is shared. - -commit e0259a82ddd950cfb109ddee86fcebbc09c6bd04 -Author: Darren Tucker <dtucker@zip.com.au> -Date: Sat Oct 15 04:34:46 2016 +1100 - - Remove do_pam_set_tty which is dead code. - - The callers of do_pam_set_tty were removed in 2008, so this is now dead - code. bz#2604, pointed out by jjelen at redhat.com. - -commit ca04de83f210959ad2ed870a30ba1732c3ae00e3 -Author: Damien Miller <djm@mindrot.org> -Date: Thu Oct 13 18:53:43 2016 +1100 - - unbreak principals-command test - - Undo inconsistetly updated variable name. - -commit 1723ec92eb485ce06b4cbf49712d21975d873909 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Tue Oct 11 21:49:54 2016 +0000 - - upstream commit - - fix the KEX fuzzer - the previous method of obtaining the - packet contents was broken. This now uses the new per-packet input hook, so - it sees exact post-decrypt packets and doesn't have to pass packet integrity - checks. ok markus@ - - Upstream-Regress-ID: 402fb6ffabd97de590e8e57b25788949dce8d2fd - -commit 09f997893f109799cddbfce6d7e67f787045cbb2 -Author: natano@openbsd.org <natano@openbsd.org> -Date: Thu Oct 6 09:31:38 2016 +0000 - - upstream commit - - Move USER out of the way to unbreak the BUILDUSER - mechanism. ok tb - - Upstream-Regress-ID: 74ab9687417dd071d62316eaadd20ddad1d5af3c - -commit 3049a012c482a7016f674db168f23fd524edce27 -Author: bluhm@openbsd.org <bluhm@openbsd.org> -Date: Fri Sep 30 11:55:20 2016 +0000 - - upstream commit - - In ssh tests set REGRESS_FAIL_EARLY with ?= so that the - environment can change it. OK djm@ - - Upstream-Regress-ID: 77bcb50e47b68c7209c7f0a5a020d73761e5143b - -commit 39af7b444db28c1cb01b7ea468a4f574a44f375b -Author: djm@openbsd.org <djm@openbsd.org> -Date: Tue Oct 11 21:47:45 2016 +0000 - - upstream commit - - Add a per-packet input hook that is called with the - decrypted packet contents. This will be used for fuzzing; ok markus@ - - Upstream-ID: a3221cee6b1725dd4ae1dd2c13841b4784cb75dc - -commit ec165c392ca54317dbe3064a8c200de6531e89ad -Author: markus@openbsd.org <markus@openbsd.org> -Date: Mon Oct 10 19:28:48 2016 +0000 - - upstream commit - - Unregister the KEXINIT handler after message has been - received. Otherwise an unauthenticated peer can repeat the KEXINIT and cause - allocation of up to 128MB -- until the connection is closed. Reported by - shilei-c at 360.cn - - Upstream-ID: 43649ae12a27ef94290db16d1a98294588b75c05 - -commit 29d40319392e6e19deeca9d45468aa1119846e50 -Author: Darren Tucker <dtucker@zip.com.au> -Date: Thu Oct 13 04:07:20 2016 +1100 - - Import rev 1.24 from OpenBSD. - - revision 1.24 - date: 2013/11/24 23:51:29; author: deraadt; state: Exp; lines: +4 -4; - most obvious unsigned char casts for ctype - ok jca krw ingo - -commit 12069e56221de207ed666c2449dedb431a2a7ca2 -Author: Darren Tucker <dtucker@zip.com.au> -Date: Thu Oct 13 04:04:44 2016 +1100 - - Import rev 1.23 from OpenBSD. Fixes bz#2619. - - revision 1.23 - date: 2010/05/14 13:30:34; author: millert; state: Exp; lines: +41 -39; - Defer installing signal handlers until echo is disabled so that we - get suspended normally when not the foreground process. Fix potential - infinite loop when restoring terminal settings if process is in the - background when restore occurs. OK miod@ - -commit 7508d83eff89af069760b4cc587305588a64e415 -Author: Darren Tucker <dtucker@zip.com.au> -Date: Thu Oct 13 03:53:51 2016 +1100 - - If we don't have TCSASOFT, define it to zero. - - This makes it a no-op when we use it below, which allows us to re-sync - those lines with the upstream and make future updates easier. - -commit aae4dbd4c058d3b1fe1eb5c4e6ddf35827271377 -Author: jmc@openbsd.org <jmc@openbsd.org> -Date: Fri Oct 7 14:41:52 2016 +0000 - - upstream commit - - tidy up the formatting in this file. more specifically, - replace .Dq, which looks appalling, with .Cm, where appropriate; - - Upstream-ID: ff8e90aa0343d9bb56f40a535e148607973cc738 - -commit a571dbcc7b7b25371174569b13df5159bc4c6c7a -Author: djm@openbsd.org <djm@openbsd.org> -Date: Tue Oct 4 21:34:40 2016 +0000 - - upstream commit - - add a comment about implicitly-expected checks to - sshkey_ec_validate_public() - - Upstream-ID: 74a7f71c28f7c13a50f89fc78e7863b9cd61713f - -commit 2f78a2a698f4222f8e05cad57ac6e0c3d1faff00 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Fri Sep 30 20:24:46 2016 +0000 - - upstream commit - - fix some -Wpointer-sign warnings in the new mux proxy; ok - markus@ - - Upstream-ID: b1ba7b3769fbc6b7f526792a215b0197f5e55dfd - -commit ca71c36645fc26fcd739a8cfdc702cec85607761 -Author: bluhm@openbsd.org <bluhm@openbsd.org> -Date: Wed Sep 28 20:09:52 2016 +0000 - - upstream commit - - Add a makefile rule to create the ssh library when - regress needs it. This allows to run the ssh regression tests without doing - a "make build" before. Discussed with dtucker@ and djm@; OK djm@ - - Upstream-Regress-ID: ce489bd53afcd471225a125b4b94565d4717c025 - -commit ce44c970f913d2a047903dba8670554ac42fc479 -Author: bluhm@openbsd.org <bluhm@openbsd.org> -Date: Mon Sep 26 21:34:38 2016 +0000 - - upstream commit - - Allow to run ssh regression tests as root. If the user - is already root, the test should not expect that SUDO is set. If ssh needs - another user, use sudo or doas to switch from root if necessary. OK dtucker@ - - Upstream-Regress-ID: b464e55185ac4303529e3e6927db41683aaeace2 - -commit 8d0578478586e283e751ca51e7b0690631da139a -Author: markus@openbsd.org <markus@openbsd.org> -Date: Fri Sep 30 09:19:13 2016 +0000 - - upstream commit - - ssh proxy mux mode (-O proxy; idea from Simon Tatham): - mux - client speaks the ssh-packet protocol directly over unix-domain socket. - mux - server acts as a proxy, translates channel IDs and relays to the server. - no - filedescriptor passing necessary. - combined with unix-domain forwarding it's - even possible to run mux client and server on different machines. feedback - & ok djm@ - - Upstream-ID: 666a2fb79f58e5c50e246265fb2b9251e505c25b - -commit b7689155f3f5c4999846c07a852b1c7a43b09cec -Author: djm@openbsd.org <djm@openbsd.org> -Date: Wed Sep 28 21:44:52 2016 +0000 - - upstream commit - - put back some pre-auth zlib bits that I shouldn't have - removed - they are still used by the client. Spotted by naddy@ - - Upstream-ID: 80919468056031037d56a1f5b261c164a6f90dc2 - -commit 4577adead6a7d600c8e764619d99477a08192c8f -Author: djm@openbsd.org <djm@openbsd.org> -Date: Wed Sep 28 20:32:42 2016 +0000 - - upstream commit - - restore pre-auth compression support in the client -- the - previous commit was intended to remove it from the server only. - - remove a few server-side pre-auth compression bits that escaped - - adjust wording of Compression directive in sshd_config(5) - - pointed out by naddy@ ok markus@ - - Upstream-ID: d23696ed72a228dacd4839dd9f2dec424ba2016b - -commit 80d1c963b4dc84ffd11d09617b39c4bffda08956 -Author: jmc@openbsd.org <jmc@openbsd.org> -Date: Wed Sep 28 17:59:22 2016 +0000 - - upstream commit - - use a separate TOKENS section, as we've done for - sshd_config(5); help/ok djm - - Upstream-ID: 640e32b5e4838e4363738cdec955084b3579481d - -commit 1cfd5c06efb121e58e8b6671548fda77ef4b4455 -Author: Damien Miller <djm@mindrot.org> -Date: Thu Sep 29 03:19:23 2016 +1000 - - Remove portability support for mmap - - We no longer need to wrap/replace mmap for portability now that - pre-auth compression has been removed from OpenSSH. - -commit 0082fba4efdd492f765ed4c53f0d0fbd3bdbdf7f -Author: djm@openbsd.org <djm@openbsd.org> -Date: Wed Sep 28 16:33:06 2016 +0000 - - upstream commit - - Remove support for pre-authentication compression. Doing - compression early in the protocol probably seemed reasonable in the 1990s, - but today it's clearly a bad idea in terms of both cryptography (cf. multiple - compression oracle attacks in TLS) and attack surface. - - Moreover, to support it across privilege-separation zlib needed - the assistance of a complex shared-memory manager that made the - required attack surface considerably larger. - - Prompted by Guido Vranken pointing out a compiler-elided security - check in the shared memory manager found by Stack - (http://css.csail.mit.edu/stack/); ok deraadt@ markus@ - - NB. pre-auth authentication has been disabled by default in sshd - for >10 years. - - Upstream-ID: 32af9771788d45a0779693b41d06ec199d849caf - -commit 27c3a9c2aede2184856b5de1e6eca414bb751c38 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Mon Sep 26 21:16:11 2016 +0000 - - upstream commit - - Avoid a theoretical signed integer overflow should - BN_num_bytes() ever violate its manpage and return a negative value. Improve - order of tests to avoid confusing increasingly pedantic compilers. - - Reported by Guido Vranken from stack (css.csail.mit.edu/stack) - unstable optimisation analyser output. ok deraadt@ - - Upstream-ID: f8508c830c86d8f36c113985e52bf8eedae23505 - -commit 8663e51c80c6aa3d750c6d3bcff6ee05091922be -Author: Damien Miller <djm@mindrot.org> -Date: Wed Sep 28 07:40:33 2016 +1000 - - fix mdoc2man.awk formatting for top-level lists - - Reported by Glenn Golden - Diagnosis and fix from Ingo Schwarze - -commit b97739dc21570209ed9d4e7beee0c669ed23b097 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Thu Sep 22 21:15:41 2016 +0000 - - upstream commit - - missing bit from previous commit - - Upstream-ID: 438d5ed6338b28b46e822eb13eee448aca31df37 - -commit de6a175a99d22444e10d19ad3fffef39bc3ee3bb -Author: jmc@openbsd.org <jmc@openbsd.org> -Date: Thu Sep 22 19:19:01 2016 +0000 - - upstream commit - - organise the token stuff into a separate section; ok - markus for an earlier version of the diff ok/tweaks djm - - Upstream-ID: 81a6daa506a4a5af985fce7cf9e59699156527c8 - -commit 16277fc45ffc95e4ffc3d45971ff8320b974de2b -Author: djm@openbsd.org <djm@openbsd.org> -Date: Thu Sep 22 17:55:13 2016 +0000 - - upstream commit - - mention curve25519-sha256 KEX - - Upstream-ID: 33ae1f433ce4795ffa6203761fbdf86e0d7ffbaf - -commit 0493766d5676c7ca358824ea8d3c90f6047953df -Author: djm@openbsd.org <djm@openbsd.org> -Date: Thu Sep 22 17:52:53 2016 +0000 - - upstream commit - - support plain curve25519-sha256 KEX algorithm now that it - is approaching standardisation (same algorithm is currently supported as - curve25519-sha256@libssh.org) - - Upstream-ID: 5e2b6db2e72667048cf426da43c0ee3fc777baa2 - -commit f31c654b30a6f02ce0b8ea8ab81791b675489628 -Author: dtucker@openbsd.org <dtucker@openbsd.org> -Date: Thu Sep 22 02:29:57 2016 +0000 - - upstream commit - - If ssh receives a PACKET_DISCONNECT during userauth it - will cause ssh_dispatch_run(DISPATCH_BLOCK, ...) to return without the - session being authenticated. Check for this and exit if necessary. ok djm@ - - Upstream-ID: b3afe126c0839d2eae6cddd41ff2ba317eda0903 - -commit 1622649b7a829fc8dc313042a43a974f0f3e8a99 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Wed Sep 21 19:53:12 2016 +0000 - - upstream commit - - correctly return errors from kex_send_ext_info(). Fix from - Sami Farin via https://github.com/openssh/openssh-portable/pull/50 - - Upstream-ID: c85999af28aaecbf92cfa2283381df81e839b42c - -commit f83a0cfe16c7a73627b46a9a94e40087d60f32fb -Author: djm@openbsd.org <djm@openbsd.org> -Date: Wed Sep 21 17:44:20 2016 +0000 - - upstream commit - - cast uint64_t for printf - - Upstream-ID: 76d23e89419ccbd2320f92792a6d878211666ac1 - -commit 5f63ab474f58834feca4f35c498be03b7dd38a16 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Wed Sep 21 17:03:54 2016 +0000 - - upstream commit - - disable tests for affirmative negated match after backout of - match change - - Upstream-Regress-ID: acebb8e5042f03d66d86a50405c46c4de0badcfd - -commit a5ad3a9db5a48f350f257a67b62fafd719ecb7e0 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Wed Sep 21 16:55:42 2016 +0000 - - upstream commit - - Revert two recent changes to negated address matching. The - new behaviour offers unintuitive surprises. We'll find a better way to deal - with single negated matches. - - match.c 1.31: - > fix matching for pattern lists that contain a single negated match, - > e.g. "Host !example" - > - > report and patch from Robin Becker. bz#1918 ok dtucker@ - - addrmatch.c 1.11: - > fix negated address matching where the address list consists of a - > single negated match, e.g. "Match addr !192.20.0.1" - > - > Report and patch from Jakub Jelen. bz#2397 ok dtucker@ - - Upstream-ID: ec96c770f0f5b9a54e5e72fda25387545e9c80c6 - -commit 119b7a2ca0ef2bf3f81897ae10301b8ca8cba844 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Wed Sep 21 01:35:12 2016 +0000 - - upstream commit - - test all the AuthorizedPrincipalsCommand % expansions - - Upstream-Regress-ID: 0a79a84dfaa59f958e46b474c3db780b454d30e3 - -commit bfa9d969ab6235d4938ce069d4db7e5825c56a19 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Wed Sep 21 01:34:45 2016 +0000 - - upstream commit - - add a way for principals command to get see key ID and serial - too - - Upstream-ID: 0d30978bdcf7e8eaeee4eea1b030eb2eb1823fcb - -commit 920585b826af1c639e4ed78b2eba01fd2337b127 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Fri Sep 16 06:09:31 2016 +0000 - - upstream commit - - add a note on kexfuzz' limitations - - Upstream-Regress-ID: 03804d4a0dbc5163e1a285a4c8cc0a76a4e864ec - -commit 0445ff184080b196e12321998b4ce80b0f33f8d1 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Fri Sep 16 01:01:41 2016 +0000 - - upstream commit - - fix for newer modp DH groups - (diffie-hellman-group14-sha256 etc) - - Upstream-Regress-ID: fe942c669959462b507516ae1634fde0725f1c68 - -commit 28652bca29046f62c7045e933e6b931de1d16737 -Author: markus@openbsd.org <markus@openbsd.org> -Date: Mon Sep 19 19:02:19 2016 +0000 - - upstream commit - - move inbound NEWKEYS handling to kex layer; otherwise - early NEWKEYS causes NULL deref; found by Robert Swiecki/honggfuzz; fixed - with & ok djm@ - - Upstream-ID: 9a68b882892e9f51dc7bfa9f5a423858af358b2f - -commit 492710894acfcc2f173d14d1d45bd2e688df605d -Author: natano@openbsd.org <natano@openbsd.org> -Date: Mon Sep 19 07:52:42 2016 +0000 - - upstream commit - - Replace two more arc4random() loops with - arc4random_buf(). - - tweaks and ok dtucker - ok deraadt - - Upstream-ID: 738d3229130ccc7eac975c190276ca6fcf0208e4 - -commit 1036356324fecc13099ac6e986b549f6219327d7 -Author: tedu@openbsd.org <tedu@openbsd.org> -Date: Sat Sep 17 18:00:27 2016 +0000 - - upstream commit - - replace two arc4random loops with arc4random_buf ok - deraadt natano - - Upstream-ID: e18ede972d1737df54b49f011fa4f3917a403f48 - -commit 00df97ff68a49a756d4b977cd02283690f5dfa34 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Wed Sep 14 20:11:26 2016 +0000 - - upstream commit - - take fingerprint of correct key for - AuthorizedPrincipalsCommand - - Upstream-ID: 553581a549cd6a3e73ce9f57559a325cc2cb1f38 - -commit e7907c1cb938b96dd33d27c2fea72c4e08c6b2f6 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Wed Sep 14 05:42:25 2016 +0000 - - upstream commit - - add %-escapes to AuthorizedPrincipalsCommand to match those - supported for AuthorizedKeysCommand (key, key type, fingerprint, etc) and a - few more to provide access to the certificate's CA key; 'looks ok' dtucker@ - - Upstream-ID: 6b00fd446dbebe67f4e4e146d2e492d650ae04eb - -commit 2b939c272a81c4d0c47badeedbcb2ba7c128ccda -Author: dtucker@openbsd.org <dtucker@openbsd.org> -Date: Wed Sep 14 00:45:31 2016 +0000 - - upstream commit - - Improve test coverage of ssh-keygen -T a bit. - - Upstream-Regress-ID: 8851668c721bcc2b400600cfc5a87644cc024e72 - -commit 44d82fc83be6c5ccd70881c2dac1a73e5050398b -Author: dtucker@openbsd.org <dtucker@openbsd.org> -Date: Mon Sep 12 02:25:46 2016 +0000 - - upstream commit - - Add testcase for ssh-keygen -j, -J and -K options for - moduli screening. Does not currently test generation as that is extremely - slow. - - Upstream-Regress-ID: 9de6ce801377ed3ce0a63a1413f1cd5fd3c2d062 - -commit 44e5f756d286bc3a1a5272ea484ee276ba3ac5c2 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Tue Aug 23 08:17:04 2016 +0000 - - upstream commit - - add tests for addr_match_list() - - Upstream-Regress-ID: fae2d1fef84687ece584738a924c7bf969616c8e - -commit 445e218878035b59c704c18406e8aeaff4c8aa25 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Mon Sep 12 23:39:34 2016 +0000 - - upstream commit - - handle certs in rsa_hash_alg_from_ident(), saving an - unnecessary special case elsewhere. - - Upstream-ID: 901cb081c59d6d2698b57901c427f3f6dc7397d4 - -commit 130f5df4fa37cace8c079dccb690e5cafbf00751 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Mon Sep 12 23:31:27 2016 +0000 - - upstream commit - - list all supported signature algorithms in the - server-sig-algs Reported by mb AT smartftp.com in bz#2547 and (independantly) - Ron Frederick; ok markus@ - - Upstream-ID: ddf702d721f54646b11ef2cee6d916666cb685cd - -commit 8f750ccfc07acb8aa98be5a5dd935033a6468cfd -Author: Darren Tucker <dtucker@zip.com.au> -Date: Mon Sep 12 14:43:58 2016 +1000 - - Remove no-op brackets to resync with upstream. - -commit 7050896e7395866278c19c2ff080c26152619d1d -Author: Darren Tucker <dtucker@zip.com.au> -Date: Mon Sep 12 13:57:28 2016 +1000 - - Resync ssh-keygen -W error message with upstream. - -commit 43cceff82cc20413cce58ba3375e19684e62cec4 -Author: Darren Tucker <dtucker@zip.com.au> -Date: Mon Sep 12 13:55:37 2016 +1000 - - Move ssh-keygen -W handling code to match upstream - -commit af48d541360b1d7737b35740a4b1ca34e1652cd9 -Author: Darren Tucker <dtucker@zip.com.au> -Date: Mon Sep 12 13:52:17 2016 +1000 - - Move ssh-keygen -T handling code to match upstream. - -commit d8c3cfbb018825c6c86547165ddaf11924901c49 -Author: Darren Tucker <dtucker@zip.com.au> -Date: Mon Sep 12 13:30:50 2016 +1000 - - Move -M handling code to match upstream. - -commit 7b63cf6dbbfa841c003de57d1061acbf2ff22364 -Author: dtucker@openbsd.org <dtucker@openbsd.org> -Date: Mon Sep 12 03:29:16 2016 +0000 - - upstream commit - - Spaces->tabs. - - Upstream-ID: f4829dfc3f36318273f6082b379ac562eead70b7 - -commit 11e5e644536821ceb3bb4dd8487fbf0588522887 -Author: dtucker@openbsd.org <dtucker@openbsd.org> -Date: Mon Sep 12 03:25:20 2016 +0000 - - upstream commit - - Style whitespace fix. Also happens to remove a no-op - diff with portable. - - Upstream-ID: 45d90f9a62ad56340913a433a9453eb30ceb8bf3 - -commit 9136ec134c97a8aff2917760c03134f52945ff3c -Author: deraadt@openbsd.org <deraadt@openbsd.org> -Date: Mon Sep 12 01:22:38 2016 +0000 - - upstream commit - - Add MAXIMUM(), MINIMUM(), and ROUNDUP() to misc.h, then - use those definitions rather than pulling <sys/param.h> and unknown namespace - pollution. ok djm markus dtucker - - Upstream-ID: 712cafa816c9f012a61628b66b9fbd5687223fb8 - -commit f219fc8f03caca7ac82a38ed74bbd6432a1195e7 -Author: jmc@openbsd.org <jmc@openbsd.org> -Date: Wed Sep 7 18:39:24 2016 +0000 - - upstream commit - - sort; from matthew martin - - Upstream-ID: 73cec7f7ecc82d37a4adffad7745e4684de67ce7 - -commit 06ce56b05def9460aecc7cdb40e861a346214793 -Author: markus@openbsd.org <markus@openbsd.org> -Date: Tue Sep 6 09:22:56 2016 +0000 - - upstream commit - - ssh_set_newkeys: print correct block counters on - rekeying; ok djm@ - - Upstream-ID: 32bb7a9cb9919ff5bab28d50ecef3a2b2045dd1e - -commit e5e8d9114ac6837a038f4952994ca95a97fafe8d -Author: markus@openbsd.org <markus@openbsd.org> -Date: Tue Sep 6 09:14:05 2016 +0000 - - upstream commit - - update ext_info_c every time we receive a kexinit msg; - fixes sending of ext_info if privsep is disabled; report Aris Adamantiadis & - Mancha; ok djm@ - - Upstream-ID: 2ceaa1076e19dbd3542254b4fb8e42d608f28856 - -commit da95318dbedbaa1335323dba370975c2f251afd8 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Mon Sep 5 14:02:42 2016 +0000 - - upstream commit - - remove 3des-cbc from the client's default proposal; - 64-bit block ciphers are not safe in 2016 and we don't want to wait until - attacks like sweet32 are extended to SSH. - - As 3des-cbc was the only mandatory cipher in the SSH RFCs, this may - cause problems connecting to older devices using the defaults, but - it's highly likely that such devices already need explicit - configuration for KEX and hostkeys anyway. - - ok deraadt, markus, dtucker - - Upstream-ID: a505dfe65c6733af0f751b64cbc4bb7e0761bc2f - -commit b33ad6d997d36edfea65e243cd12ccd01f413549 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Mon Sep 5 13:57:31 2016 +0000 - - upstream commit - - enforce expected request flow for GSSAPI calls; thanks to - Jakub Jelen for testing; ok markus@ - - Upstream-ID: d4bc0e70e1be403735d3d9d7e176309b1fd626b9 - -commit 0bb2980260fb24e5e0b51adac471395781b66261 -Author: Darren Tucker <dtucker@zip.com.au> -Date: Mon Sep 12 11:07:00 2016 +1000 - - Restore ssh-keygen's -J and -j option handling. - - These were incorrectly removed in the 1d9a2e28 sync commit. - -commit 775f8a23f2353f5869003c57a213d14b28e0736e -Author: Damien Miller <djm@mindrot.org> -Date: Wed Aug 31 10:48:07 2016 +1000 - - tighten PAM monitor calls - - only allow kbd-interactive ones when that authentication method is - enabled. Prompted by Solar Designer - -commit 7fd0ea8a1db4bcfb3d8cd9df149e5d571ebea1f4 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Tue Aug 30 07:50:21 2016 +0000 - - upstream commit - - restrict monitor auth calls to be allowed only when their - respective authentication methods are enabled in the configuration. - - prompted by Solar Designer; ok markus dtucker - - Upstream-ID: 6eb3f89332b3546d41d6dbf5a8e6ff920142b553 - -commit b38b95f5bcc52278feb839afda2987933f68ff96 -Author: Damien Miller <djm@mindrot.org> -Date: Mon Aug 29 11:47:07 2016 +1000 - - Tighten monitor state-machine flow for PAM calls - - (attack surface reduction) - -commit dc664d1bd0fc91b24406a3e9575b81c285b8342b -Author: djm@openbsd.org <djm@openbsd.org> -Date: Sun Aug 28 22:28:12 2016 +0000 - - upstream commit - - fix uninitialised optlen in getsockopt() call; harmless - on Unix/BSD but potentially crashy on Cygwin. Reported by James Slepicka ok - deraadt@ - - Upstream-ID: 1987ccee508ba5b18f016c85100d7ac3f70ff965 - -commit 5bcc1e2769f7d6927d41daf0719a9446ceab8dd7 -Author: guenther@openbsd.org <guenther@openbsd.org> -Date: Sat Aug 27 04:05:12 2016 +0000 - - upstream commit - - Pull in <sys/time.h> for struct timeval - - ok deraadt@ - - Upstream-ID: ae34525485a173bccd61ac8eefeb91c57e3b7df6 - -commit fa4a4c96b19127dc2fd4e92f20d99c0c7f34b538 -Author: guenther@openbsd.org <guenther@openbsd.org> -Date: Sat Aug 27 04:04:56 2016 +0000 - - upstream commit - - Pull in <stdlib.h> for NULL - - ok deraadt@ - - Upstream-ID: 7baa6a0f1e049bb3682522b4b95a26c866bfc043 - -commit ae363d74ccc1451185c0c8bd4631e28c67c7fd36 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Thu Aug 25 23:57:54 2016 +0000 - - upstream commit - - add a sIgnore opcode that silently ignores options and - use it to suppress noisy deprecation warnings for the Protocol directive. - - req henning, ok markus - - Upstream-ID: 9fe040aca3d6ff393f6f7e60045cdd821dc4cbe0 - -commit a94c60306643ae904add6e8ed219e4be3494255c -Author: djm@openbsd.org <djm@openbsd.org> -Date: Thu Aug 25 23:56:51 2016 +0000 - - upstream commit - - remove superfluous NOTREACHED comment - - Upstream-ID: a7485c1f1be618e8c9e38fd9be46c13b2d03b90c - -commit fc041c47144ce28cf71353124a8a5d183cd6a251 -Author: otto@openbsd.org <otto@openbsd.org> -Date: Tue Aug 23 16:21:45 2016 +0000 - - upstream commit - - fix previous, a condition was modified incorrectly; ok - markus@ deraadt@ - - Upstream-ID: c443e339768e7ed396dff3bb55f693e7d3641453 - -commit 23555eb13a9b0550371a16dcf8beaab7a5806a64 -Author: djm@openbsd.org <djm@openbsd.org> -Date: Tue Aug 23 08:17:42 2016 +0000 - - upstream commit - - downgrade an error() to a debug2() to match similar cases - in addr_match_list() - - Upstream-ID: 07c3d53e357214153d9d08f234411e0d1a3d6f5c |
