<feed xmlns='http://www.w3.org/2005/Atom'>
<title>wireguard-openbsd/usr.bin/ssh/ssh-agent.c, branch jd/queueboosts</title>
<subtitle>WireGuard implementation for the OpenBSD kernel</subtitle>
<id>https://git.zx2c4.com/wireguard-openbsd/atom/usr.bin/ssh/ssh-agent.c?h=jd%2Fqueueboosts</id>
<link rel='self' href='https://git.zx2c4.com/wireguard-openbsd/atom/usr.bin/ssh/ssh-agent.c?h=jd%2Fqueueboosts'/>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/'/>
<updated>2020-06-22T06:37:38Z</updated>
<entry>
<title>updated argument name for -P in first synopsis was missed in previous;</title>
<updated>2020-06-22T06:37:38Z</updated>
<author>
<name>jmc</name>
<email>jmc@openbsd.org</email>
</author>
<published>2020-06-22T06:37:38Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=c8e8385e7105356eba67c8fbfa24dd89c72ea306'/>
<id>urn:sha1:c8e8385e7105356eba67c8fbfa24dd89c72ea306</id>
<content type='text'>
</content>
</entry>
<entry>
<title>better terminology for permissions; feedback &amp; ok markus@</title>
<updated>2020-06-22T05:52:05Z</updated>
<author>
<name>djm</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-06-22T05:52:05Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=4c17521eeabd9ee5ac30e8074e0a714f01150b59'/>
<id>urn:sha1:4c17521eeabd9ee5ac30e8074e0a714f01150b59</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Correct synopsis and usage for the options accepted when passing a command</title>
<updated>2020-06-19T07:21:42Z</updated>
<author>
<name>dtucker</name>
<email>dtucker@openbsd.org</email>
</author>
<published>2020-06-19T07:21:42Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=4b70128590f5c349bbbe799dc3878c6225c01359'/>
<id>urn:sha1:4b70128590f5c349bbbe799dc3878c6225c01359</id>
<content type='text'>
to ssh-agent.  ok jmc@
</content>
</entry>
<entry>
<title>Restrict ssh-agent from signing web challenges for FIDO keys.</title>
<updated>2020-05-26T01:26:58Z</updated>
<author>
<name>djm</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-05-26T01:26:58Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=1e8bbe726a0fe70350e16a348ad5a5e88bb6a036'/>
<id>urn:sha1:1e8bbe726a0fe70350e16a348ad5a5e88bb6a036</id>
<content type='text'>
When signing messages in ssh-agent using a FIDO key that has an
application string that does not start with "ssh:", ensure that the
message being signed is one of the forms expected for the SSH protocol
(currently pubkey authentication and sshsig signatures).

This prevents ssh-agent forwarding on a host that has FIDO keys
attached granting the ability for the remote side to sign challenges
for web authentication using those keys too.

Note that the converse case of web browsers signing SSH challenges is
already precluded because no web RP can have the "ssh:" prefix in the
application string that we require.

ok markus@
</content>
</entry>
<entry>
<title>initialize seconds for debug message; ok djm</title>
<updated>2020-03-06T18:28:27Z</updated>
<author>
<name>markus</name>
<email>markus@openbsd.org</email>
</author>
<published>2020-03-06T18:28:27Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=78e193183adb0b34b0b0c2b3645d3931f3163867'/>
<id>urn:sha1:78e193183adb0b34b0b0c2b3645d3931f3163867</id>
<content type='text'>
</content>
</entry>
<entry>
<title>change explicit_bzero();free() to freezero()</title>
<updated>2020-02-26T13:40:09Z</updated>
<author>
<name>jsg</name>
<email>jsg@openbsd.org</email>
</author>
<published>2020-02-26T13:40:09Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=c9831b39c7f05cf54db0775dea423b6be448db6e'/>
<id>urn:sha1:c9831b39c7f05cf54db0775dea423b6be448db6e</id>
<content type='text'>
While freezero() returns early if the pointer is NULL the tests for
NULL in callers are left to avoid warnings about passing an
uninitialised size argument across a function boundry.

ok deraadt@ djm@
</content>
</entry>
<entry>
<title>Replace "security key" with "authenticator" in program messages.</title>
<updated>2020-02-06T22:30:54Z</updated>
<author>
<name>naddy</name>
<email>naddy@openbsd.org</email>
</author>
<published>2020-02-06T22:30:54Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=5f47a66000ea6cb181f93ec6eec42d947fb45006'/>
<id>urn:sha1:5f47a66000ea6cb181f93ec6eec42d947fb45006</id>
<content type='text'>
This replaces "security key" in error/usage/verbose messages and
distinguishes between "authenticator" and "authenticator-hosted key".

ok djm@
</content>
</entry>
<entry>
<title>process security key provider via realpath() in agent, avoids</title>
<updated>2020-01-25T00:06:48Z</updated>
<author>
<name>djm</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-01-25T00:06:48Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=cc45af21f5761519d4e67250fdebdc112cd80044'/>
<id>urn:sha1:cc45af21f5761519d4e67250fdebdc112cd80044</id>
<content type='text'>
malicious client from being able to cause agent to load arbitrary
libraries into ssh-sk-helper.

reported by puck AT puckipedia.com; ok markus
</content>
</entry>
<entry>
<title>expose PKCS#11 key labels/X.509 subjects as comments</title>
<updated>2020-01-25T00:03:36Z</updated>
<author>
<name>djm</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-01-25T00:03:36Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=44e54ccb31e3bda5c68b2bc2df1c3b4d67797ec2'/>
<id>urn:sha1:44e54ccb31e3bda5c68b2bc2df1c3b4d67797ec2</id>
<content type='text'>
Extract the key label or X.509 subject string when PKCS#11 keys
are retrieved from the token and plumb this through to places where
it may be used as a comment.

based on https://github.com/openssh/openssh-portable/pull/138
by Danielle Church

feedback and ok markus@
</content>
</entry>
<entry>
<title>Replace all calls to signal(2) with a wrapper around sigaction(2).</title>
<updated>2020-01-23T07:10:22Z</updated>
<author>
<name>dtucker</name>
<email>dtucker@openbsd.org</email>
</author>
<published>2020-01-23T07:10:22Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=e9716d4d0197fd363c1f073b60440e4d04eab018'/>
<id>urn:sha1:e9716d4d0197fd363c1f073b60440e4d04eab018</id>
<content type='text'>
This wrapper blocks all other signals during the handler preventing
races between handlers, and sets SA_RESTART which should reduce the
potential for short read/write operations.
</content>
</entry>
</feed>
