| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
consulting AuthorizedKeysCommand; ok dtucker markus
|
| |
|
|
|
|
| |
ok dtucker
|
|
|
|
|
|
|
| |
"X11UseLocalhost" keywords; this makes things consistent (effectively reversing
my commit of yesterday);
ok deraadt markus djm
|
| |
|
|
|
|
| |
knweiss at gmail.com via -portable.
|
|
|
|
| |
to work without a path in addition to with one. bz#2999, ok djm@
|
|
|
|
| |
Prepares for changes in the way malloc is initialized. ok guenther@ dtucker@
|
|
|
|
| |
(STDIN_FILENO vs STDERR_FILENO)
|
|
|
|
|
| |
pair's comments (using -c and -C) more applicable to both methods.
ok and suggestions djm@ dtucker@
|
| |
|
|
|
|
|
| |
that it will fit a full 64 bit integer. bz#3012 from Manoel Domingues
Junior
|
|
|
|
|
|
|
|
|
|
|
| |
rsa-sha2-512 signature algorithm. Certificates signed by RSA keys
will therefore be incompatible with OpenSSH < 7.2 unless the default
is overridden.
Document the ability of the ssh-keygen -t flag to override the
signature algorithm when signing certificates, and the new default.
ok deraadt@
|
|
|
|
| |
a little tidier for -portable.
|
|
|
|
|
| |
into fd3, so as to not mistakenly leak other fd forward accidentally.
ok djm
|
|
|
|
| |
Part of a patch from Stephen Gregoratto <dev at sgregoratto dot me>.
|
|
|
|
|
|
|
|
|
|
|
|
| |
be able to find out from where the request was comming.
Add the same logging for PermitListen violations which where not
logged at all.
Pointed out by Robert Kisteleki (robert AT ripe.net)
input markus
OK deraadt
|
|
|
|
| |
in snmprintf. bz#3002, patch from velemas at gmail.com, ok markus@.
|
|
|
|
| |
ok deraadt
|
| |
|
| |
|
| |
|
|
|
|
| |
Markus Schmidt via openssh-unix-dev, ok markus@
|
|
|
|
| |
via bz#2997.
|
|
|
|
|
| |
which allows it to work when sshd_config contains a Match directive with or
without -C. bz#2858, ok djm@
|
|
|
|
| |
Patch from yumkam at gmail.com, ok deraadt.
|
| |
|
|
|
|
| |
function name and the error message
|
|
|
|
|
| |
cause connection to close incorrectly; Report and patch from Jakub
Jelen in bz#2757; ok dtucker@ markus@
|
|
|
|
|
|
| |
Match block overrides a more restrictive global default.
Spotted by jmc@, ok markus@
|
| |
|
|
|
|
| |
"seems worthwhile" deraadt.
|
|
|
|
|
|
| |
from NIST Special Publication 800-57, 3k bits provides security equivalent
to 128 bits which is the smallest symmetric cipher we enable by default.
ok markus@ deraadt@
|
| |
|
| |
|
| |
|
|
|
|
|
| |
This is a no-op on OpenBSD but will make things easier in -portable,
eg on systems where these checks should be case-insensitive. ok djm@
|
|
|
|
|
|
| |
keepalives successively and prematurely terminating connection when
ClientAliveCount=1. While there, collapse two similar tests into one.
ok markus@
|
| |
|
|
|
|
|
| |
messages. Previously it would be difficult to tell which direction
it was talking about
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
1. Recently-forked child processes will briefly remain listening to
listen_socks. If the main server sshd process completes its restart
via execv() before these sockets are closed by the child processes
then it can fail to listen at the desired addresses/ports and/or
fail to restart.
2. When a SIGHUP is received, there may be forked child processes that
are awaiting their reexecution state. If the main server sshd
process restarts before passing this state, these child processes
will yield errors and use a fallback path of reading the current
sshd_config from the filesystem rather than use the one that sshd
was started with.
To fix both of these cases, we reuse the startup_pipes that are shared
between the main server sshd and forked children. Previously this was
used solely to implement tracking of pre-auth child processes for
MaxStartups, but this extends the messaging over these pipes to include
a child->parent message that the parent process is safe to restart. This
message is sent from the child after it has completed its preliminaries:
closing listen_socks and receiving its reexec state.
bz#2953, reported by Michal Koutný; ok markus@ dtucker@
|
|
|
|
|
| |
RSA keys only (since we support ECDSA now and might support others in
the future). Inspired by Jakub Jelen via bz#2974
|
|
|
|
|
|
| |
print PKCS11Provider instead of obsolete SmartcardDevice in config dump.
bz#2974 ok dtucker@
|
|
|
|
| |
redirected to /dev/null; ok djm@
|
|
|
|
|
|
|
|
|
|
|
|
| |
client for KEX, ciphers and MACs. The ciphers and MACs were
identical between the client and server, but the error accidentially
disabled the diffie-hellman-group-exchange-sha1 KEX method.
This fixes the client code to use the correct method list, but
because nobody complained, it also disables the
diffie-hellman-group-exchange-sha1 KEX method.
Reported by nuxi AT vault24.org via bz#2697; ok dtucker
|
|
|
|
|
|
|
|
|
| |
path with user's privileged. This is a no-op as this code always runs
with user privilege now that we no longer support running sshd with
privilege separation disabled, but as long as the privsep skeleton is
there we should follow the rules.
bz#2969 with patch from Erik Sjölund
|
|
|
|
|
|
| |
issue pointed out by andreas kahari
ok dtucker djm
|
|
|
|
| |
key from the agent was being attempted for use.
|
|
|
|
|
|
|
|
| |
authmethod. Move function-static GSSAPI state to the client Authctxt
structure. Make static a bunch of functions that aren't used outside
this file.
Based on patch from Markus Schmidt <markus@blueflash.cc>; ok markus@
|
|
|
|
|
| |
so it can ask for the smartcards PIN.
ok markus@
|