| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
|
| |
use that instead of global variables containing copies of it.
feedback/ok markus@
|
|
|
|
| |
purpose-built ssh->compat variable instead; feedback/ok markus@
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
HostbasedAcceptedAlgorithms, which more accurately reflects its effect.
This matches a previous change to PubkeyAcceptedAlgorithms. The previous
names are retained as aliases. ok djm@
|
|
|
|
|
|
|
|
|
|
| |
Key constraints parsing code previously existed in both the "add regular
key" and "add smartcard key" path. This unifies them but also introduces
more consistency checking: duplicated constraints and constraints that
are nonsensical for a particular situation (e.g. FIDO provider for a
smartcard key) are now banned.
ok markus@
|
|
|
|
|
|
|
|
|
|
| |
Allow confirm_key() to accept an additional reason suffix
Factor publickey userauth parsing out into its own function and allow
it to optionally return things it parsed out of the message to its
caller.
feedback/ok markus@
|
|
|
|
|
|
| |
originally.
ok markus@
|
|
|
|
|
|
| |
it to make it more generally usable and testable.
ok markus@
|
|
|
|
|
|
|
|
|
| |
socket entries that are being marked as unused.
spinkle in some debug2() spam to make it easier to watch an agent
do its thing.
ok markus
|
|
|
|
|
|
|
|
| |
Add a ssh_request_reply_decode() function that sends a message to
the agent, reads and parses a success/failure reply.
Use it for all requests that only expect success/failure
ok markus@
|
|
|
|
|
|
|
|
| |
its SSH2_MSG_USERAUTH_REQUEST packets instead of the key type.
This make HostbasedAcceptedAlgorithms do what it is supposed to -
filter on signature algorithm and not key type.
spotted with dtucker@ ok markus@
|
| |
|
|
|
|
|
|
|
|
| |
While the two were originally equivalent, this actually specifies the
signature algorithms that are accepted. Some key types (eg RSA) can be
used by multiple algorithms (eg ssh-rsa, rsa-sha2-512) so the old name is
becoming increasingly misleading. The old name is retained as an alias.
Prompted by bz#3253, help & ok djm@, man page help jmc@
|
|
|
|
|
| |
compilers not smart enough to know the strftime calls won't ever fully
fill "to" and "from". ok djm@
|
|
|
|
|
| |
Add tests for boundary conditions and fix convtime to work up to INT_MAX.
ok djm@
|
|
|
|
|
|
| |
from the timeout each loop, so we only want to measure the elapsed time
the poll() in that loop, not since the start of the function. Spotted by
chris.xj.zhu at gmail.com, ok djm@
|
|
|
|
| |
OK jmc@
|
| |
|
|
|
|
|
|
| |
where sizeof(int) != sizeof(long), convtime could accept values
>MAX_INT which subsequently truncate when stored in an int during
config parsing. bz#3250, ok djm@
|
| |
|
|
|
|
|
| |
more fine grained MaxStartups limits. Man page help jmc@, feedback &
ok djm@
|
|
|
|
|
|
| |
them for per-source maxstartups limiting. Supplement with some additional
functions from djm's flowtools that we'll also need. ok djm@ (as part of
a larger diff).
|
|
|
|
|
|
|
| |
value and makes it much harder for hosts to change host keys,
particularly ones that use IP-based load-balancing.
ok dtucker@
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
reason and no PIN was initially requested from the user, then request
a PIN and retry the operation.
This smoothes over a few corner cases including FIDO devices that
require PINs for all hosted credentials, biometric FIDO devices that
fall back to requiring PIN when reading the biometric failed, devices
that don't implement reading credProtect status for downloaded keys
and probably a few more cases that I haven't though of yet.
ok dtucker@
|
|
|
|
|
|
|
|
| |
function - it returns 0/1 and not the -1/0/1 that qsort expectes.
fixes sftp "ls -ltr" under some circumstances.
Based on patch by Masahiro Matsuya via bz3248.
|
|
|
|
|
|
|
|
|
|
| |
- remove unneeded header files and typedefs and rely on crypto_api.h
- add defines to map types used to the crypto_api ones instead of typedefs. This
prevents typedef name collisions in -portable.
- remove CRYPTO_NAMESPACE entirely instead of making it a no-op
- delete unused functions and make the remaining ones that aren't exported static.
ok djm@
|
|
|
|
| |
reported by Fredrik Eriksson in bz3239
|
|
|
|
| |
make it easier to reorder. Re-inline int32_MINMAX. ok tobhe@
|
|
|
|
|
|
|
| |
Fixes compilation on luna88k.
Feedback millert@
Found by and ok aoyama@
|
|
|
|
|
|
|
| |
32-bit integer overflow.
Found by and ok djm@
ok markus@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
method based on Streamlined NTRU Prime (coupled with X25519).
The previous sntrup4591761x25519-sha512@tinyssh.org method is
replaced with sntrup761x25519-sha512@openssh.com. Per the authors,
sntrup4591761 was replaced almost two years ago by sntrup761.
The sntrup761 implementaion, like sntrup4591761 before it, is public
domain code extracted from the SUPERCOP cryptography benchmark
suite (https://bench.cr.yp.to/supercop.html).
Thanks for Daniel J Bernstein for guidance on algorithm selection.
Patch from Tobias Heider; feedback & ok markus@ and myself
(note this both the updated method and the one that it replaced are
disabled by default)
|
|
|
|
|
|
| |
entries for it to the -O list in scp.1 and sftp.1;
ok djm
|
|
|
|
| |
ok djm
|
|
|
|
|
|
|
|
|
|
|
| |
known_hosts data from a command in addition to the usual files.
The command accepts bunch of %-expansions, including details of the
connection and the offered server host key. Note that the command may
be invoked up to three times per connection (see the manpage for
details).
ok markus@
|
|
|
|
|
|
|
|
|
|
| |
make privilege dropping optional but allow it via callbacks (to avoid
need to link uidswap.c everywhere)
add some other flags (keep environment, disable strict path safety check)
that make this more useful for client-side use.
feedback & ok markus@
|
|
|
|
|
|
|
|
|
| |
It is an alias for aes256-cbc which was standardized in RFC4253 (2006),
has been deprecated and disabled by default since OpenSSH 7.2 (2016)
and was only briefly documented in ssh.1 in 2001.
This will reduce the amount of work the cipher/kex regression tests need
to do by a little bit. ok markus@ djm@
|
|
|
|
|
|
|
| |
(parse_ssh_uri() can return -1/0/1, that I missed). Reported by Raf
Czlonka via bugs@
ok tb@
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Add load_hostkeys_file() and hostkeys_foreach_file() that accept a
FILE* argument instead of opening the file directly.
Original load_hostkeys() and hostkeys_foreach() are implemented using
these new interfaces.
Add a u_int note field to the hostkey_entry and hostkey_foreach_line
structs that is passed directly from the load_hostkeys() and
hostkeys_foreach() call. This is a lightweight way to annotate results
between different invocations of load_hostkeys().
ok markus@
|
|
|
|
| |
ok markus@
|
| |
|
|
|
|
|
| |
common arguments into a single struct and pass that around instead
of using a bunch of globals. ok markus@
|
|
|
|
| |
(one-off) memory leaks; ok markus@
|
| |
|
| |
|
| |
|
| |
|