| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
ok dtucker
|
|
|
|
| |
Markus Schmidt via openssh-unix-dev, ok markus@
|
|
|
|
| |
function name and the error message
|
|
|
|
| |
with & ok markus@
|
|
|
|
| |
with & ok markus@
|
|
|
|
|
|
|
|
|
|
|
| |
almost exactly six years ago.
This change stops including the old packet_* API by default and makes
each file that requires the old API include it explicitly. We will
commit file-by-file refactoring to remove the old API in consistent
steps.
with & ok markus@
|
|
|
|
| |
X11 connections in untrusted mode indefinitely. ok dtucker@
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
variables for the remote session (subject to the server accepting them)
refactor SendEnv to remove the arbitrary limit of variable names.
ok markus@
|
|
|
|
| |
with codespell tool (https://github.com/lucasdemarchi/codespell)
|
|
|
|
|
|
|
|
|
| |
The signal handlers from the original ssh1 code on which OpenSSH
is based assume unreliable signals and reinstall their handlers.
Since OpenBSD (and pretty much every current system) has reliable
signals this is not needed. In the unlikely even that -portable
is still being used on such systems we will deal with it in the
compat layer. ok deraadt@
|
|
|
|
|
|
|
|
|
|
| |
ssh.com <=2.* and OpenSSH <= 3.*.
These versions were all released in or before 2001 and predate the
final SSH RFCs. The hacks in question aren't necessary for RFC-
compliant SSH implementations.
ok markus@
|
|
|
|
|
| |
algorithm of kex->hostkey_alg is incorrect when the key type isn't
capable of making those signatures. ok markus@
|
|
|
|
|
| |
check that the negotiated algorithm matches the type in the
signature (only matters for RSA SHA1/SHA2 sigs). ok markus@
|
|
|
|
| |
which uses CLOCK_MONOTONIC and works over clock steps. "I like" markus@
|
|
|
|
|
|
|
|
|
|
|
| |
At the client, the device may be obtained from a new %T expansion
for LocalCommand.
At the server, the allocated devices will be listed in a
SSH_TUNNEL variable exposed to the environment of any user sessions
started after the tunnel forwarding was established.
ok markus
|
|
|
|
| |
refactor; spotted by millert@ "makes sense" deraadt@
|
|
|
|
|
|
|
|
|
|
|
| |
Previously we tracked the remote channel IDs in an int, but this is
strictly incorrect: the wire protocol uses uint32 and there is nothing
in-principle stopping a SSH implementation from sending, say, 0xffff0000.
In practice everyone numbers their channels sequentially, so this has
never been a problem.
ok markus@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Move static state to a "struct ssh_channels" that is allocated at
runtime and tracked as a member of struct ssh.
Explicitly pass "struct ssh" to all channels functions.
Replace use of the legacy packet APIs in channels.c.
Rework sshd_config PermitOpen handling: previously the configuration
parser would call directly into the channels layer. After the refactor
this is not possible, as the channels structures are allocated at
connection time and aren't available when the configuration is parsed.
The server config parser now tracks PermitOpen itself and explicitly
configures the channels code later.
ok markus@
|
|
|
|
| |
to come...); ok markus@
|
|
|
|
|
| |
level. Prevents it from appearing during ssh -J and equivalent ProxyCommand
configs. bz#1906, bz#2744, feedback&ok markus@
|
|
|
|
|
|
|
|
|
| |
client_simple_escape_filter() -> process_escapes() -> fork() and the pledge for
this path lacks the proc promise and therefore aborts the process.
The solution is to just add proc the promise to this specific pledge.
Reported by Gregoire Jadi gjadi ! omecha.info
Insight with tb@, OK jca@
|
|
|
|
|
|
| |
are handled safely, and there also is no need for preallocation dances.
Future changes in this area will be less error prone.
Review and one bug found by markus
|
| |
|
| |
|
| |
|
|
|
|
| |
ok markus@
|
| |
|
|
|
|
| |
ok markus@
|
|
|
|
| |
ok markus@
|
|
|
|
|
|
|
| |
any RSA keytype. Previously, ssh could ignore RSA keys when any of the
ssh-rsa-sha2-* methods was enabled in HostkeyAlgorithms nit ssh-rsa
(SHA1 signatures) was not. bz#2650 reported by Luis Ressel;
ok dtucker@
|
|
|
|
| |
bz#2672, from Brad Marshall via Colin Watson and Ubuntu's bugtracker.
|
|
|
|
|
|
|
|
|
| |
- mux client speaks the ssh-packet protocol directly over unix-domain socket.
- mux server acts as a proxy, translates channel IDs and relays to the server.
- no filedescriptor passing necessary.
- combined with unix-domain forwarding it's even possible to run mux client
and server on different machines.
feedback & ok djm@
|
|
|
|
| |
ok deraadt natano
|
|
|
|
|
| |
rather than pulling <sys/param.h> and unknown namespace pollution.
ok djm markus dtucker
|
|
|
|
| |
ok dtucker@
|
|
|
|
|
|
|
| |
when Control* keywords were set in ssh_config. This patch also fixes
similar problems with scp and sftp.
ok deraadt, looks good to millert
|
|
|
|
|
|
|
|
|
|
|
| |
This makes automatic rekeying internal to the packet code (previously
the server and client loops needed to assist). In doing to it makes
application of rekey limits more accurate by accounting for packets
about to be sent as well as packets queued during rekeying events
themselves.
Based on a patch from dtucker@ which was in turn based on a patch
Aleksander Adamowski in bz#2521; ok markus@
|
|
|
|
|
| |
message when DISPLAY is not set. This could also result in a crash
on systems with a printf that doesn't handle NULL. OK djm@
|
| |
|
|
|
|
|
|
|
| |
returning from client_loop() for consistency with
buffer_free()/sshbuf_free().
ok dtucker@ deraadt@ djm@
|
| |
|
|
|
|
|
| |
forwarding when the X server disables the SECURITY extension;
Reported by Thomas Hoger; ok deraadt@
|
|
|
|
|
|
| |
problem found by halex@
ok halex@
|
|
|
|
|
|
|
|
|
| |
- mux client: which is used when ControlMaster is in use.
will end with "stdio proc tty" (proc is to permit sending SIGWINCH to mux master on window resize)
- client loop: several levels of pledging depending of your used options
ok deraadt@
|
|
|
|
| |
ok djm@
|
|
|
|
|
| |
PubkeyAcceptedKeyTypes to the client side, so it still can be
tested or turned back on; feedback and ok djm@
|