| Commit message (Collapse) | Author | Age | Files | Lines |
| | |
|
| |
|
|
|
| |
prefer certificate types if the known_hosts files contain a key
marked as a @cert-authority; bz#3157 ok markus@
|
| |
|
|
| |
loaded from a PKCS11Provider; bz3141, ok dtucker@
|
| |
|
|
|
|
| |
from the default set (i.e. HostkeyAlgorithms=+/-...), retain the
default behaviour of preferring those algorithms that have existing
keys in known_hosts; ok markus
|
| |
|
|
|
|
|
| |
This replaces "security key" in error/usage/verbose messages and
distinguishes between "authenticator" and "authenticator-hosted key".
ok djm@
|
| |
|
|
|
| |
building without zlib compression and associated options. With feedback
from markus@, ok djm@
|
| |
|
|
|
|
| |
This wrapper blocks all other signals during the handler preventing
races between handlers, and sets SA_RESTART which should reduce the
potential for short read/write operations.
|
| |
|
|
|
|
|
|
| |
remove ifdef and distinct settings for OPENSSL=no case.
This will make things much simpler for -portable where the exact set
of algos depends on the configuration of both OpenSSH and the libcrypto
it's linked against (if any). ok djm@
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
| |
a signature operation. Notify the user when this is expected via
the TTY (if available) or $SSH_ASKPASS if we can.
ok markus@
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
| |
U2F signatures.
Don't use sshsk_ecdsa_sign() directly, instead make it reachable via
sshkey_sign() like all other signature operations. This means that
we need to add a provider argument to sshkey_sign(), so most of this
change is mechanically adding that.
Suggested by / ok markus@
|
| | |
|
| |
|
|
|
| |
now return SSH_ERR_KEY_BAD_PERMISSIONS in that case. Patch from
jitendra.sharma at intel.com, ok djm@
|
| | |
|
| |
|
|
|
|
| |
value < 0. errno is only updated in this case. Change all (most?)
callers of syscalls to follow this better, and let's see if this strictness
helps us in the future.
|
| |
|
|
| |
(STDIN_FILENO vs STDERR_FILENO)
|
| |
|
|
|
| |
into fd3, so as to not mistakenly leak other fd forward accidentally.
ok djm
|
| |
|
|
| |
key from the agent was being attempted for use.
|
| |
|
|
|
|
|
|
| |
authmethod. Move function-static GSSAPI state to the client Authctxt
structure. Make static a bunch of functions that aren't used outside
this file.
Based on patch from Markus Schmidt <markus@blueflash.cc>; ok markus@
|
| |
|
|
| |
from markus@ ok djm@
|
| |
|
|
| |
from markus@ ok djm@
|
| |
|
|
| |
from markus@ ok djm@
|
| | |
|
| |
|
|
|
|
|
|
|
| |
using the Streamlined NTRU Prime 4591^761 implementation from SUPERCOP
coupled with X25519 as a stop-loss. Not enabled by default.
introduce KEM API; a simplified framework for DH-ish KEX methods.
from markus@ feedback & ok djm@
|
| | |
|
| |
|
|
| |
with & ok markus@
|
| |
|
|
| |
with & ok markus@
|
| |
|
|
|
|
|
|
|
|
|
| |
almost exactly six years ago.
This change stops including the old packet_* API by default and makes
each file that requires the old API include it explicitly. We will
commit file-by-file refactoring to remove the old API in consistent
steps.
with & ok markus@
|
| |
|
|
|
| |
authmethods by moving them to the client authctxt;
Patch from Markus Schmidt, ok markus@
|
| |
|
|
|
|
|
|
|
|
|
| |
out the banner exchange. This eliminates some common code from the
client and server.
Also be more strict about handling \r characters - these should only
be accepted immediately before \n (pointed out by Jann Horn).
Inspired by a patch from Markus Schmidt.
(lots of) feedback and ok markus@
|
| |
|
|
| |
requested by Marcel Logen; ok dtucker@
|
| |
|
|
|
| |
for the life of the connection; bz#2912; reported by Simon Tatham;
ok dtucker@
|
| |
|
|
| |
OpenSSH that can't handle them. spotted by Adam Eijdenberg; ok dtucker
|
| |
|
|
|
|
|
|
|
| |
Use consistent format in debug log for keys readied, offered and
received during public key authentication.
This makes it a little easier to see what is going on, as each message
now contains (where available) the key filename, its type and fingerprint,
and whether the key is hosted in an agent or a token.
|
| |
|
|
|
|
|
|
|
|
|
| |
revision 1.285
date: 2018/09/14 04:17:12; author: djm; state: Exp; lines: +47 -26; commitid: lflGFcNb2X2HebaK;
Use consistent format in debug log for keys readied, offered and
received during public key authentication.
This makes it a little easier to see what is going on, as each message
now contains the key filename, its type and fingerprint, and whether
the key is hosted in an agent or a token.
|
| |
|
|
|
|
|
|
| |
received during public key authentication.
This makes it a little easier to see what is going on, as each message
now contains the key filename, its type and fingerprint, and whether
the key is hosted in an agent or a token.
|
| |
|
|
|
|
|
|
|
|
| |
double-free under some circumstances.
--
date: 2018/07/31 03:07:24; author: djm; state: Exp; lines: +33 -18; commitid: f7g4UI8eeOXReTPh;
fix some memory leaks spotted by Coverity via Jakub Jelen in bz#2366
feedback and ok dtucker@
|
| |
|
|
| |
feedback and ok dtucker@
|
| |
|
|
|
| |
Do not link uidwap.c into ssh any more. Neuters UsePrivilegedPort,
which will be marked as deprecated shortly. ok markus@ djm@
|
| |
|
|
|
| |
ssh(1) and always use ssh-keysign. This removes one of the few remaining
reasons why ssh(1) might be setuid. ok markus@
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
It turns out we still support pre-auth compression on the client.
Therefore revert the previous two commits:
date: 2018/07/06 09:06:14; author: sf; commitid: yZVYKIRtUZWD9CmE;
Rename COMP_DELAYED to COMP_ZLIB
Only delayed compression is supported nowadays.
ok markus@
date: 2018/07/06 09:05:01; author: sf; commitid: rEGuT5UgI9f6kddP;
Remove leftovers from pre-authentication compression
Support for this has been removed in 2016.
COMP_DELAYED will be renamed in a later commit.
ok markus@
|
| |
|
|
|
|
|
| |
Support for this has been removed in 2016.
COMP_DELAYED will be renamed in a later commit.
ok markus@
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
returns ability to add/remove/specify algorithms by wildcard.
Algorithm lists are now fully expanded when the server/client configs
are finalised, so errors are reported early and the config dumps
(e.g. "ssh -G ...") now list the actual algorithms selected.
Clarify that, while wildcards are accepted in algorithm lists, they
aren't full pattern-lists that support negation.
(lots of) feedback, ok markus@
|
| |
|
|
| |
hosted in ssh-agent
|