| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
ok markus@
|
|
|
|
| |
ok markus@
|
|
|
|
| |
ok markus@
|
|
|
|
|
| |
to discard for the work around for the attacks against CBC-mode.
ok djm@; report from Jean Paul, Kenny, Martin and Torben @ RHUL
|
|
|
|
| |
exit anyway). From Tom Rix in bz#2683
|
|
|
|
| |
string in disconnect messages; ok markus@
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
until rekeying (negative values are rejected at config parse time).
This allows the removal of some casts and a signed vs unsigned
comparison warning.
rekey_time is cast to int64 for the comparison which is a no-op
on OpenBSD, but should also do the right thing in -portable on
anything still using 32bit time_t (until the system time actually
wraps, anyway).
some early guidance deraadt@, ok djm@
|
|
|
|
| |
contents. This will be used for fuzzing; ok markus@
|
|
|
|
|
|
|
|
|
| |
- mux client speaks the ssh-packet protocol directly over unix-domain socket.
- mux server acts as a proxy, translates channel IDs and relays to the server.
- no filedescriptor passing necessary.
- combined with unix-domain forwarding it's even possible to run mux client
and server on different machines.
feedback & ok djm@
|
|
|
|
| |
they are still used by the client. Spotted by naddy@
|
|
|
|
|
|
|
|
|
|
| |
commit was intended to remove it from the server only.
remove a few server-side pre-auth compression bits that escaped
adjust wording of Compression directive in sshd_config(5)
pointed out by naddy@ ok markus@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
early in the protocol probably seemed reasonable in the 1990s, but
today it's clearly a bad idea in terms of both cryptography (cf.
multiple compression oracle attacks in TLS) and attack surface.
Moreover, to support it across privilege-separation zlib needed
the assistance of a complex shared-memory manager that made the
required attack surface considerably larger.
Prompted by Guido Vranken pointing out a compiler-elided security
check in the shared memory manager found by Stack
(http://css.csail.mit.edu/stack/); ok deraadt@ markus@
NB. pre-auth authentication has been disabled by default in sshd
for >10 years.
|
|
|
|
| |
NULL deref; found by Robert Swiecki/honggfuzz; fixed with & ok djm@
|
|
|
|
|
| |
rather than pulling <sys/param.h> and unknown namespace pollution.
ok djm markus dtucker
|
| |
|
|
|
|
| |
feedback and ok markus@
|
|
|
|
|
|
| |
the MAC over a fixed size of data.
Reported by Jean Paul Degabriele, Kenny Paterson, Torben Hansen and
Martin Albrecht. ok djm@
|
|
|
|
|
| |
are reachable with the amount of padding that we use internally.
bz#2566, pointed out by Torben Hansen. ok markus@
|
|
|
|
|
| |
from LOG_CRIT by replacing fatal() calls with logdie(). Part of
bz#2585, ok djm@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Previously we were computing the MAC, decrypting the packet and then
checking the MAC. This gave rise to the possibility of creating a
side-channel oracle in the decryption step, though no such oracle has
been identified.
This adds a mac_check() function that computes and checks the MAC in
one pass, and uses it to advance MAC checking for EtM algorithms to
before payload decryption.
Reported by Jean Paul Degabriele, Kenny Paterson, Torben Hansen and
Martin Albrecht. feedback and ok markus@
|
|
|
|
|
|
|
| |
places that use them (authn and session code). After this, no state is
cached in canohost.c
feedback and ok markus@
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
This makes automatic rekeying internal to the packet code (previously
the server and client loops needed to assist). In doing to it makes
application of rekey limits more accurate by accounting for packets
about to be sent as well as packets queued during rekeying events
themselves.
Based on a patch from dtucker@ which was in turn based on a patch
Aleksander Adamowski in bz#2521; ok markus@
|
| |
|
|
|
|
| |
ok markus dtucker
|
|
|
|
| |
breaks for very small RekeyLimit values due to continuous rekeying. ok djm@
|
|
|
|
| |
type of scan_scaled). Part of bz#2521, ok djm.
|
|
|
|
|
| |
not it is time to perform rekeying. bz#2521, based loosely on a patch from
olo at fb.com, ok djm@
|
| |
|
|
|
|
| |
ok djm@
|
|
|
|
| |
messages together into a session a bit easier; bz#2503 ok dtucker@
|
|
|
|
| |
ok dtucker@
|
|
|
|
|
| |
based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt;
with & ok djm@
|
|
|
|
| |
found by Ben Hawkes; ok markus@ deraadt@
|
|
|
|
| |
ok djm@
|
|
|
|
| |
ok markus@
|
|
|
|
| |
ok krw millert
|
|
|
|
|
| |
mutual set of algorithms (kex, pubkey, ciphers, etc.)
ok markus@
|
|
|
|
|
|
|
|
| |
report error conditions. Teach sshpkt_fatal() about ECONNRESET.
Improves error messages on TCP connection resets. bz#2257
ok dtucker@
|
| |
|
| |
|
|
|
|
| |
rev 1.207
|
| |
|
|
|
|
|
|
|
| |
generated after the socket to the peer has suffered a TCP reset. In
these cases, getpeername() won't work so cache the address earlier.
spotted in the wild via deraadt@ and tedu@
|
|
|
|
| |
ok markus@
|
|
|
|
| |
uses; feedback and "looks good" markus@
|
|
|
|
|
| |
makes ssh-keyscan more reliable against server failures
ok dtucker@ markus@
|
|
|
|
| |
ok djm markus
|
| |
|
|
|
|
|
|
|
|
| |
a) switch packet.c to buffer api and isolate per-connection info into struct ssh
b) (de)serialization of the state is moved from monitor to packet.c
c) the old packet.c API is implemented in opacket.[ch]
d) compress.c/h is removed and integrated into packet.c
with and ok djm@
|