| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
ok djm
|
|
|
|
| |
heap to the remote end. Reported by Jann Horn
|
|
|
|
|
|
| |
ProxyCommand in use; continue and allow the ProxyCommand to
connect anyway (e.g. to a host with a name outside the DNS
behind a bastion)
|
|
|
|
|
|
|
|
|
| |
existing API is offered as a set of wrappers.
with and ok markus@
Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
Dempsky and Ron Bowes for a detailed review a few months ago.
|
|
|
|
|
|
|
|
|
| |
existing API is offered as a set of wrappers.
with and ok markus@
Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
Dempsky and Ron Bowes for a detailed review a few months ago.
|
|
|
|
|
|
|
| |
serial number ranges could be serialised to an invalid format.
Readers of a broken KRL caused by this bug will fail closed, so no
should-have-been-revoked key will be accepted.
|
|
|
|
|
|
| |
the corresponding ssh_put_bignum functions create. This fixes the
use of 16384-bit RSA keys (bug reported by Eivind Evensen).
ok djm@
|
|
|
|
|
|
|
| |
arc4random(3), we can disallow __sysctl(2) in OpenSSH's systrace
sandbox.
ok djm
|
|
|
|
| |
from matthew
|
|
|
|
| |
"doesn't bother me" deraadt@
|
|
|
|
| |
not to be preferred. Reported by Dirk-Willem van Gulik
|
|
|
|
| |
OK from djm@ and dtucker@
|
|
|
|
|
|
| |
post-auth child. the new buffer code is more strict, and requires
buffer_init() while the old code was happy after a bzero();
originally from djm@
|
|
|
|
| |
it solves; pointed out by dtucker@
|
|
|
|
|
| |
available. Glue code straight from Ted Krovetz's original umac.c.
ok markus@
|
|
|
|
|
|
|
|
|
|
|
|
| |
of OpenSSH's internals to make them usable as a standalone library.
This includes a set of wrappers to make it compatible with the
existing buffer API so replacement can occur incrementally.
With and ok markus@
Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
Dempsky and Ron Bowes for a detailed review.
|
|
|
|
|
| |
fatal'ing with "el_insertstr failed" when there's a single quote char
somewhere in the string. bz#2238, ok markus@
|
| |
|
|
|
|
|
| |
reduces algorithms to curve25519, aes-ctr, chacha, ed25519;
allows us to explore further options; with and ok djm
|
| |
|
|
|
|
|
| |
have sent a close already; analysis and patch from Simon Tatham;
ok markus@
|
|
|
|
|
| |
callers that futzing with it will futz with the actual buffer
contents
|
| |
|
| |
|
|
|
|
| |
OK from djm@, with feedback from okan@.
|
|
|
|
|
| |
once the bsd.own.mk KERBEROS5 is removed otherwise. this way suggested
by theo.
|
|
|
|
| |
OK from djm@
|
|
|
|
|
| |
OK from djm@, with input from guenther@, mlarkin@ and
okan@
|
|
|
|
| |
OK from djm@
|
|
|
|
| |
recommend people use ahead of the openssh-6.7 release
|
|
|
|
| |
strict-alignment architectures; reported by and ok stsp@
|
|
|
|
| |
documentation referring to rhosts equivalency in here.
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
using the curve25519-sha256@libssh.org KEX exchange method to fail
when connecting with something that implements the spec properly.
Disable this KEX method when speaking to one of the affected
versions.
reported by Aris Adamantiadis; ok markus@
|
|
|
|
|
| |
with them at all and the same information is duplicated in ssh-add.1
(which does deal with them); prodded by deraadt@
|
|
|
|
| |
reported by jan AT mojzis.com; ok markus@
|
|
|
|
| |
bz#2225, patch from kavi AT juniper.net
|
| |
|
|
|
|
|
|
|
|
|
| |
certificate keys to plain keys and attempt SSHFP resolution.
Prevents a server from skipping SSHFP lookup and forcing a new-hostkey
dialog by offering only certificate keys.
Reported by mcv21 AT cam.ac.uk
|
|
|
|
| |
use arc4random_buf() instead of loop+arc4random()
|
|
|
|
| |
dtucker mentioned that -portable does this
|
|
|
|
| |
fix From: Matthew Clarke
|
|
|
|
| |
help from jmc@ and schwarze@, ok deraadt@
|
| |
|
| |
|
|
|
|
|
|
| |
makes the previous diff highly unpallatable. We want to go in that
direction for the server, but not for the client. Sigh.
Brought up by naddy.
|
|
|
|
|
|
| |
longform __attribute__(__bounded(...));
for brevity and a warning free compilation with llvm/clan
|
|
|
|
|
|
|
|
|
| |
This commit removes the weaker pre-SHA2 hashes, the broken ciphers
(arcfour), and the broken modes (CBC) from the default configuration
(the patch only changes the default, all the modes are still available
for the config files).
ok djm@, reminded by tedu@ & naddy@ and discussed with many
|