| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
| |
corresponding plain *.pub public key. bz#2617 based on patch from
Adam Eijdenberg; ok dtucker@ markus@
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
until rekeying (negative values are rejected at config parse time).
This allows the removal of some casts and a signed vs unsigned
comparison warning.
rekey_time is cast to int64 for the comparison which is a no-op
on OpenBSD, but should also do the right thing in -portable on
anything still using 32bit time_t (until the system time actually
wraps, anyway).
some early guidance deraadt@, ok djm@
|
| |
|
|
|
|
| |
to make assumptions; from Karsten Weiss
|
|
|
|
|
|
|
|
| |
Instead of deleting and re-preparing the entire keys list, just reset
the 'used' flags; the keys list is already in a good order (with already-
tried keys at the back)
Analysis and patch from Vincent Brillault on bz#2642; ok dtucker@
|
|
|
|
|
|
|
|
|
|
| |
commit was intended to remove it from the server only.
remove a few server-side pre-auth compression bits that escaped
adjust wording of Compression directive in sshd_config(5)
pointed out by naddy@ ok markus@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
early in the protocol probably seemed reasonable in the 1990s, but
today it's clearly a bad idea in terms of both cryptography (cf.
multiple compression oracle attacks in TLS) and attack surface.
Moreover, to support it across privilege-separation zlib needed
the assistance of a complex shared-memory manager that made the
required attack surface considerably larger.
Prompted by Guido Vranken pointing out a compiler-elided security
check in the shared memory manager found by Stack
(http://css.csail.mit.edu/stack/); ok deraadt@ markus@
NB. pre-auth authentication has been disabled by default in sshd
for >10 years.
|
|
|
|
|
| |
ssh_dispatch_run(DISPATCH_BLOCK, ...) to return without the session
being authenticated. Check for this and exit if necessary. ok djm@
|
|
|
|
| |
other similar level. bz#2599, patch from cgallek at gmail.com, ok markus@
|
|
|
|
|
|
| |
safe fmprintf printer; bz#2058
feedback schwarze@ ok dtucker@
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
draft-ietf-curdle-ssh-kex-sha2-03
diffie-hellman-group14-sha256 (2K group)
diffie-hellman-group16-sha512 (4K group)
diffie-hellman-group18-sha512 (8K group)
based on patch from Mark D. Baushke and Darren Tucker
ok markus@
|
|
|
|
|
|
| |
sshbuf_dup_string() to replace a common idiom of
strdup(sshbuf_ptr()) with better safety checking;
feedback and ok markus@
|
| |
|
|
|
|
|
|
|
|
| |
when attempting pubkey auth with a certificate, if no separate
private key is found among the keys then try with the certificate
key itself.
bz#2550 reported by Peter Moody
|
|
|
|
| |
keys; reported by espie@ ok deraadt@
|
|
|
|
| |
ok markus@ djm@
|
| |
|
| |
|
|
|
|
| |
ok djm@
|
| |
|
|
|
|
| |
ok dtucker@
|
|
|
|
| |
ok dtucker@
|
|
|
|
|
| |
based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt;
with & ok djm@
|
|
|
|
|
|
| |
make tests consistent
ok markus@
|
|
|
|
|
|
|
|
|
|
| |
'ask', or 'confirm', and defaults to 'no'. When enabled, a private
key that is used during authentication will be added to ssh-agent if
it is running (with confirmation enabled if set to 'confirm').
Initial version from Joachim Schipper many years ago.
ok markus@
|
|
|
|
| |
keys are noted before pubkey authentication starts. ok dtucker@
|
|
|
|
| |
a certificate; patch from Meghana Bhat on bz#2436; ok markus@
|
|
|
|
|
|
|
| |
by a '+' to indicate that the specified items be appended to the
default rather than replacing it.
approach suggested by dtucker@, feedback dlg@, ok markus@
|
|
|
|
|
| |
PubkeyAcceptedKeyTypes to the client side, so it still can be
tested or turned back on; feedback and ok djm@
|
|
|
|
|
|
|
|
|
|
| |
we only ever use it for strlen(pattern).
Prompted by hanno AT hboeck.de pointing an out-of-bound read
error caused by an incorrect pattern length found using AFL
and his own tools.
ok markus@
|
|
|
|
|
|
|
|
|
| |
host public key types are tried during hostbased authentication.
This may be used to prevent too many keys being sent to the server,
and blowing past its MaxAuthTries limit.
bz#2211 based on patch by Iain Morgan; ok markus@
|
|
|
|
|
| |
check sshkey_fingerprint return values;
ok markus
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
a) switch packet.c to buffer api and isolate per-connection info into struct ssh
b) (de)serialization of the state is moved from monitor to packet.c
c) the old packet.c API is implemented in opacket.[ch]
d) compress.c/h is removed and integrated into packet.c
with and ok djm@
|
| |
|
|
|
|
| |
agent present
|
|
|
|
| |
ok markus@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
interfaces. Refactor the generic key loading API to not require
pathnames to be specified (they weren't really used).
Fixes a few other things en passant:
Makes ed25519 keys work for hostbased authentication (ssh-keysign
previously used the PEM-only routines).
Fixes key comment regression bz#2306: key pathnames were being lost as
comment fields.
ok markus@
|
|
|
|
|
|
|
| |
fingerprints. Default changes from MD5 to SHA256 and format
from hex to base64.
Feedback and ok naddy@ markus@
|
|
|
|
| |
hostbased auth; patch from Iain Morgan
|
|
|
|
|
|
|
|
| |
may be forwarded to a local Unix domain socket and vice versa or
both ends may be a Unix domain socket. This is a reimplementation
of the streamlocal patches by William Ahern from:
http://www.25thandclement.com/~william/projects/streamlocal.html
OK djm@ markus@
|
|
|
|
|
|
|
|
|
| |
existing API is offered as a set of wrappers.
with and ok markus@
Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
Dempsky and Ron Bowes for a detailed review a few months ago.
|
|
|
|
| |
not to be preferred. Reported by Dirk-Willem van Gulik
|
|
|
|
|
| |
reduces algorithms to curve25519, aes-ctr, chacha, ed25519;
allows us to explore further options; with and ok djm
|
|
|
|
|
|
|
|
|
|
| |
using the curve25519-sha256@libssh.org KEX exchange method to fail
when connecting with something that implements the spec properly.
Disable this KEX method when speaking to one of the affected
versions.
reported by Aris Adamantiadis; ok markus@
|