| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The Secure RPC authenticator for telnet prompts the local user for the
username to use for authentication. Previously it was using sprintf()
into a buffer of 256 bytes, but the username received over the wire
can be up to 255 bytes long which would overflow the prompt buffer.
Fix this in two ways: First, use snprintf() and check for overflow.
If the prompt buffer overflows, fail authentication without prompting
the user. Second, add 10 bytes to the buffer size to account for the
overhead of the prompt so that a maximally sized username fits.
While here, replace a bare 255 in the subsequent telnet_gets call with
an expression using sizeof() the relevant buffer.
PR: 270263
Reported by: Robert Morris <rtm@lcs.mit.edu>
Tested on: CHERI
Reviewed by: emaste
Differential Revision: https://reviews.freebsd.org/D49832
|
| |
|
|
|
|
|
| |
This partially reverts 77b7cdf1999ee965ad494fddd184b18f532ac91a.
Reviewed by: imp
Differential Revision: https://reviews.freebsd.org/D42704
|
| |
|
|
|
|
|
|
| |
There was a large misfire from my local diff that I need to investigate, and
this version committed did not build.
Notes:
svn path=/head/; revision=359403
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Most of these were already properly declared and defined elsewhere, this is
effectively just a minor cleanup that fixes the -fno-common build.
-fno-common will become the default in GCC10/LLVM11.
MFC after: 3 days
Notes:
svn path=/head/; revision=359399
|
| |
|
|
|
|
|
|
|
|
|
| |
pair"
I'm pretty skeptical that any crypto in telnet is worth using, but if we're
ostensibly generating keys, arc4random is strictly better than the previous
construct.
Notes:
svn path=/head/; revision=355699
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Per the July 22, 1999 letter (in /COPYRIGHT) from
William Hoskins
Director, Office of Technology Licensing
University of California, Berkeley
MFC after: 1 week
Notes:
svn path=/head/; revision=351070
|
| |
|
|
| |
Notes:
svn path=/projects/openssl111/; revision=338777
|
| |
|
|
| |
Notes:
svn path=/projects/openssl111/; revision=338775
|
| |
|
|
| |
Notes:
svn path=/projects/openssl111/; revision=338774
|
| |
|
|
|
|
|
|
|
|
|
| |
to -32768 when it is used as an argument to mp_itom(), in both libtelnet
and newkey. This code has been wrong since r26238 (!), so after almost
20 years it is rather useless to try to correct it.
MFC after: 1 week
Notes:
svn path=/head/; revision=305077
|
| |
|
|
| |
Notes:
svn path=/head/; revision=233932
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Add an API for alerting internal libc routines to the presence of
"unsafe" paths post-chroot, and use it in ftpd. [11:07]
Fix a buffer overflow in telnetd. [11:08]
Make pam_ssh ignore unpassphrased keys unless the "nullok" option is
specified. [11:09]
Add sanity checking of service names in pam_start. [11:10]
Approved by: so (cperciva)
Approved by: re (bz)
Security: FreeBSD-SA-11:06.bind
Security: FreeBSD-SA-11:07.chroot
Security: FreeBSD-SA-11:08.telnetd
Security: FreeBSD-SA-11:09.pam_ssh
Security: FreeBSD-SA-11:10.pam
Notes:
svn path=/head/; revision=228843
|
| |
|
|
|
|
|
|
|
| |
zero the password buffer.
MFC after: 1 week
Notes:
svn path=/head/; revision=228559
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The function pow() in libmp(3) clashes with pow(3) in libm. We could
rename this single function, but we can just take the same approach as
the Solaris folks did, which is to prefix all function names with mp_.
libmp(3) isn't really popular nowadays. I suspect not a single
application in ports depends on it. There's still a chance, so I've
increased the SHLIB_MAJOR and __FreeBSD_version.
Reviewed by: deischen, rdivacky
Notes:
svn path=/head/; revision=189092
|
| |
|
|
| |
Notes:
svn path=/head/; revision=114630
|
| |
|
|
|
|
|
|
|
| |
(Credential forwarding is still broken.)
PR: bin/45397
Notes:
svn path=/head/; revision=111946
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
When libdes was replaced with OpenSSL's libcrypto, there were a few
interfaces that the former implemented but the latter did not. Because
some software in the base system still depended upon these interfaces,
we simply included them in our libcrypto (rnd_keys.c).
Now, finally get around to removing the dependencies on these
interfaces. There were basically two cases:
des_new_random_key -- This is just a wrapper for des_random_key, and
these calls were replaced.
des_init_random_number_generator et. al. -- A few functions were used
by the application to seed libdes's PRNG. These are not necessary
when using libcrypto, as OpenSSL internally seeds the PRNG from
/dev/random. These calls were simply removed.
Again, some of the Kerberos 4 files have been taken off the vendor
branch. I do not expect there to be future imports of KTH Kerberos 4.
Notes:
svn path=/head/; revision=110049
|
| |
|
|
|
|
|
|
|
|
|
| |
0 might simply be part of the ciphertext.
PR: bin/40266
Submitted by: andr@dgap.mipt.ru
MFC after: 3 days
Notes:
svn path=/head/; revision=102250
|
| |
|
|
| |
Notes:
svn path=/head/; revision=98884
|
| |
|
|
| |
Notes:
svn path=/head/; revision=98882
|
| |
|
|
|
|
|
|
| |
MFC after: 1 week
PR: 37766
Notes:
svn path=/head/; revision=96108
|
| |
|
|
| |
Notes:
svn path=/head/; revision=90931
|
| |
|
|
| |
Notes:
svn path=/head/; revision=87266
|
| |
|
|
|
|
|
| |
fixes that.
Notes:
svn path=/head/; revision=87155
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
1) ANSIfy.
2) Clean up ifdefs so that
a) ones that never/always apply are appropriately either
fully removed, or just the #if junk is removed.
b) change #if defined(FOO) for appropiate values of FOO.
(currently AUTHENTICATION and ENCRYPTION)
3) WARNS=2 fixing
4) GC other unused stuff
This code can now be unifdef(1)ed to make non-crypto telnet.
Notes:
svn path=/head/; revision=87139
|
| |
|
|
| |
Notes:
svn path=/head/; revision=85703
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This is by the kind permission of Dave Safford, formerly of TAMU who wrote the
original code. Here is an excerpt of the e-mail exchange concerning this
issue:
Dave Safford wrote:
>Nick Sayer wrote:
>> Some time ago we spoke about SRA and importing it into FreeBSD. I forgot to
>> ask if you had a prefered license boilerplate for the top of the files. It
>> has come up recently, and the SRA code in FreeBSD doesn't have one.
>I really have no preference - use whatever is most convenient in the
>FreeBSD environment.
>dave safford
This is the standard BSD license with clause 3 removed and clause 4
suitably renumbered.
MFC after: 1 day
Notes:
svn path=/head/; revision=85690
|
| |
|
|
| |
Notes:
svn path=/head/; revision=84305
|
| |
|
|
|
|
|
|
| |
telnet, so it was treated as the reference code, except where later
commits were made to "base" telnet.
Notes:
svn path=/head/; revision=81965
|
| |
|
|
| |
Notes:
svn path=/head/; revision=76751
|
| |
|
|
| |
Notes:
svn path=/head/; revision=76711
|
| |
|
|
|
|
|
| |
(potentially) not responding to an invalid SRA 'auth is' message.
Notes:
svn path=/head/; revision=76696
|
| |
|
|
|
|
|
| |
same time simplify, the random number selection code.
Notes:
svn path=/head/; revision=76691
|
| |
|
|
|
|
|
|
|
|
| |
(512) are a little distressing, but the method really needs to be
extended to allow server-supplied DH parameters anyway.
Submitted by: kris
Notes:
svn path=/head/; revision=76690
|
| |
|
|
|
|
|
|
|
| |
low-memory situations.
Submitted by: kris
Notes:
svn path=/head/; revision=76689
|
| |
|
|
|
|
|
|
| |
insecure, do not succeed. Copied from login.c. This functionality really
should be a PAM module.
Notes:
svn path=/head/; revision=76610
|
| |
|
|
| |
Notes:
svn path=/head/; revision=76339
|
| |
|
|
|
|
|
|
| |
I just mistakenly commited this to RELENG_4. I have contacted Jordan to see
about how to fix this. Pass the pointy hat.
Notes:
svn path=/head/; revision=74411
|
| |
|
|
| |
Notes:
svn path=/head/; revision=63248
|
| |
|
|
|
|
|
| |
PR# 19835
Notes:
svn path=/head/; revision=62958
|
| |
|
|
| |
Notes:
svn path=/head/; revision=62868
|
| |
|
|
| |
Notes:
svn path=/head/; revision=57442
|
| |
|
|
|
|
|
| |
going to have to figure something else out.
Notes:
svn path=/head/; revision=49901
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
SRA does a Diffie-Hellmen exchange and then DES-encrypts the
authentication data. If the authentication is successful, it also
sets up a session key for DES encryption.
SRA was originally developed at Texas A&M University.
This code is probably export restricted (despite the fact that I
originally found it at a University in Germany).
SRA is not perfect. It is vulnerable to monkey-in-the-middle attacks
and does not use tremendously large DH constants (and thus an individual
exchange probably could be factored in a few days on modern CPU
horsepower). It does not, however, require any changes in user or
administrative behavior and foils session hijacking and sniffing.
The goal of this commit is that telnet and telnetd end up in the DES
distribution and that therefore an encrypted session telnet becomes
standard issue for FreeBSD.
Notes:
svn path=/head/; revision=49887
|
| |
|
|
|
|
|
| |
curses/termcap/terminfo implementations and causes recursion.
Notes:
svn path=/head/; revision=41858
|
| |
|
|
| |
Notes:
svn path=/head/; revision=29181
|
|
|
telnet, and after userland diffs have been merged in, will be used to
build the non-kerberised sources as well. (See unifdef(1) for details)
Notes:
svn path=/vendor-crypto/telnet/dist/; revision=29088
|