summaryrefslogtreecommitdiff
path: root/ChangeLog
diff options
context:
space:
mode:
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog3743
1 files changed, 1779 insertions, 1964 deletions
diff --git a/ChangeLog b/ChangeLog
index f283a8b3f455..bcaa38f94386 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,10 +1,1675 @@
-commit 9ca7e9c861775dd6c6312bc8aaab687403d24676
+commit 279261e1ea8150c7c64ab5fe7cb4a4ea17acbb29
Author: Damien Miller <djm@mindrot.org>
-Date: Wed May 27 10:38:00 2020 +1000
+Date: Sun Sep 27 17:25:01 2020 +1000
+
+ update version numbers
+
+commit 58ca6ab6ff035ed12b5078e3e9c7199fe72c8587
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Sun Sep 27 07:22:05 2020 +0000
+
+ upstream: openssh 8.4
+
+ OpenBSD-Commit-ID: a29e5b372d2c00e297da8a35a3b87c9beb3b4a58
+
+commit 9bb8a303ce05ff13fb421de991b495930be103c3
+Author: Damien Miller <djm@mindrot.org>
+Date: Tue Sep 22 10:07:43 2020 +1000
+
+ sync with upstream ssh-copy-id rev f0da1a1b7
+
+commit 0a4a5571ada76b1b012bec9cf6ad1203fc19ec8d
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon Sep 21 07:29:09 2020 +0000
+
+ upstream: close stdin when forking after authentication too; ok markus
+
+ OpenBSD-Commit-ID: 43db17e4abc3e6b4a7b033aa8cdab326a7cb6c24
+
+commit d14fe25e6c3b89f8af17e2894046164ac3b45688
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Sun Sep 20 23:31:46 2020 +0000
+
+ upstream: close stdout/stderr after "ssh -f ..." forking
+
+ bz#3137, ok markus
+
+ OpenBSD-Commit-ID: e2d83cc4dea1665651a7aa924ad1ed6bcaaab3e2
+
+commit 53a33a0d745179c02108589e1722457ca8ae4372
+Author: Damien Miller <djm@mindrot.org>
+Date: Sun Sep 20 15:57:09 2020 +1000
+
+ .depend
+
+commit 107eb3eeafcd390e1fa7cc7672a05e994d14013e
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Sun Sep 20 05:47:25 2020 +0000
+
+ upstream: cap channel input buffer size at 16MB; avoids high memory use
+
+ when peer advertises a large window but is slow to consume the data we send
+ (e.g. because of a slow network)
+
+ reported by Pierre-Yves David
+
+ fix with & ok markus@
+
+ OpenBSD-Commit-ID: 1452771f5e5e768876d3bfe2544e3866d6ade216
+
+commit acfe2ac5fe033e227ad3a56624fbbe4af8b5da04
+Author: Damien Miller <djm@mindrot.org>
+Date: Fri Sep 18 22:02:53 2020 +1000
+
+ libfido2 1.5.0 is recommended
+
+commit 52a03e9fca2d74eef953ddd4709250f365ca3975
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Sep 18 08:16:38 2020 +0000
+
+ upstream: handle multiple messages in a single read()
+
+ PR#183 by Dennis Kaarsemaker; feedback and ok markus@
+
+ OpenBSD-Commit-ID: 8570bb4d02d00cf70b98590716ea6a7d1cce68d1
+
+commit dc098405b2939146e17567a25b08fc6122893cdf
+Author: pedro martelletto <pedro@ambientworks.net>
+Date: Fri Sep 18 08:57:29 2020 +0200
+
+ configure.ac: add missing includes
+
+ when testing, make sure to include the relevant header files that
+ declare the types of the functions used by the test:
+
+ - stdio.h for printf();
+ - stdlib.h for exit();
+ - string.h for strcmp();
+ - unistd.h for unlink(), _exit(), fork(), getppid(), sleep().
+
+commit b3855ff053f5078ec3d3c653cdaedefaa5fc362d
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Sep 18 05:23:03 2020 +0000
+
+ upstream: tweak the client hostkey preference ordering algorithm to
+
+ prefer the default ordering if the user has a key that matches the
+ best-preference default algorithm.
+
+ feedback and ok markus@
+
+ OpenBSD-Commit-ID: a92dd7d7520ddd95c0a16786a7519e6d0167d35f
+
+commit f93b187ab900c7d12875952cc63350fe4de8a0a8
+Author: Damien Miller <djm@mindrot.org>
+Date: Fri Sep 18 14:55:48 2020 +1000
+
+ control over the colours in gnome-ssh-askpass[23]
+
+ Optionally set the textarea colours via $GNOME_SSH_ASKPASS_FG_COLOR and
+ $GNOME_SSH_ASKPASS_BG_COLOR. These accept the usual three or six digit
+ hex colours.
+
+commit 9d3d36bdb10b66abd1af42e8655502487b6ba1fa
+Author: Damien Miller <djm@mindrot.org>
+Date: Fri Sep 18 14:50:38 2020 +1000
+
+ focus improvement for gnome-ssh-askpass[23]
+
+ When serving a SSH_ASKPASS_PROMPT=none information dialog, ensure
+ then <enter> doesn't immediately close the dialog. Instead, require an
+ explicit <tab> to reach the close button, or <esc>.
+
+commit d6f507f37e6c75a899db0ef8224e72797c5563b6
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Wed Sep 16 03:07:31 2020 +0000
+
+ upstream: Remove unused buf, last user was removed when switching
+
+ to the sshbuf API. Patch from Sebastian Andrzej Siewior.
+
+ OpenBSD-Commit-ID: 250fa17f0cec01039cc4abd95917d9746e24c889
+
+commit c3c786c3a0973331ee0922b2c51832a3b8d7f20f
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Wed Sep 9 21:57:27 2020 +0000
+
+ upstream: For the hostkey confirmation message:
+
+ > Are you sure you want to continue connecting (yes/no/[fingerprint])?
+
+ compare the fingerprint case sensitively; spotted Patrik Lundin
+ ok dtucker
+
+ OpenBSD-Commit-ID: 73097afee1b3a5929324e345ba4a4a42347409f2
+
+commit f2950baf0bafe6aa20dfe2e8d1ca4b23528df617
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Sep 11 14:45:23 2020 +1000
+
+ New config-build-time dependency on automake.
+
+commit 600c1c27abd496372bd0cf83d21a1c119dfdf9a5
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Sun Sep 6 21:56:36 2020 +1000
+
+ Add aclocal.m4 and config.h.in~ to .gitignore.
+
+ aclocal.m4 is now generated by autoreconf.
+
+commit 4bf7e1d00b1dcd3a6b3239f77465c019e61c6715
+Author: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
+Date: Sat Sep 5 17:50:03 2020 +0200
+
+ Quote the definition of OSSH_CHECK_HEADER_FOR_FIELD
+
+ autoreconf complains about underquoted definition of
+ OSSH_CHECK_HEADER_FOR_FIELD after aclocal.m4 has been and now is beeing
+ recreated.
+
+ Quote OSSH_CHECK_HEADER_FOR_FIELD as suggested.
+
+ Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
+
+commit a2f3ae386b5f7938ed3c565ad71f30c4f7f010f1
+Author: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
+Date: Sat Sep 5 17:50:02 2020 +0200
+
+ Move the local m4 macros
+
+ The `aclocal' step is skipped during `autoreconf' because aclocal.m4 is
+ present.
+ Move the current aclocal.m4 which contains local macros into the m4/
+ folder. With this change the aclocal.m4 will be re-created during
+ changes to the m4/ macro.
+ This is needed so the `aclocal' can fetch m4 macros from the system if
+ they are references in the configure script. This is a prerequisite to
+ use PKG_CHECK_MODULES.
+
+ Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
+
+commit 8372bff3a895b84fd78a81dc39da10928b662f5a
+Author: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
+Date: Sat Sep 5 17:50:01 2020 +0200
+
+ Remove HAVE_MMAP and BROKEN_MMAP
+
+ BROKEN_MMAP is no longer defined since commit
+ 1cfd5c06efb12 ("Remove portability support for mmap")
+
+ this commit also removed other HAVE_MMAP user. I didn't find anything
+ that defines HAVE_MMAP. The check does not trigger because compression
+ on server side is by default COMP_DELAYED (2) so it never triggers.
+
+ Remove remaining HAVE_MMAP and BROKEN_MMAP bits.
+
+ Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
+
+commit bbf20ac8065905f9cb9aeb8f1df57fcab52ee2fb
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Wed Sep 9 03:10:21 2020 +0000
+
+ upstream: adapt to SSH_SK_VERSION_MAJOR crank
+
+ OpenBSD-Regress-ID: 0f3e76bdc8f9dbd9d22707c7bdd86051d5112ab8
+
+commit 9afe2a150893b20bdf9eab764978d817b9a7b783
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Aug 28 03:17:13 2020 +0000
+
+ upstream: Ensure that address/mask mismatches are flagged at
+
+ config-check time. ok djm@
+
+ OpenBSD-Regress-ID: 8f5f4c2c0bf00e6ceae7a1755a444666de0ea5c2
+
+commit c76773524179cb654ff838dd43ba1ddb155bafaa
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Wed Sep 9 03:08:01 2020 +0000
+
+ upstream: when writing an attestation blob for a FIDO key, record all
+
+ the data needed to verify the attestation. Previously we were missing the
+ "authenticator data" that is included in the signature.
+
+ spotted by Ian Haken
+ feedback Pedro Martelletto and Ian Haken; ok markus@
+
+ OpenBSD-Commit-ID: 8439896e63792b2db99c6065dd9a45eabbdb7e0a
+
+commit c1c44eeecddf093a7983bd91e70b446de789b363
+Author: pedro martelletto <pedro@ambientworks.net>
+Date: Tue Sep 1 17:01:55 2020 +0200
+
+ configure.ac: fix libfido2 back-compat
+
+ - HAVE_FIDO_CRED_PROD -> HAVE_FIDO_CRED_PROT;
+ - check for fido_dev_get_touch_begin(), so that
+ HAVE_FIDO_DEV_GET_TOUCH_BEGIN gets defined.
+
+commit 785f0f315bf7ac5909e988bb1ac3e019fb5e1594
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon Aug 31 04:33:17 2020 +0000
+
+ upstream: refuse to add verify-required (PINful) FIDO keys to
+
+ ssh-agent until the agent supports them properly
+
+ OpenBSD-Commit-ID: 125bd55a8df32c87c3ec33c6ebe437673a3d037e
+
+commit 39e88aeff9c7cb6862b37ad1a87a03ebbb38c233
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon Aug 31 00:17:41 2020 +0000
+
+ upstream: Add RCS IDs to the few files that are missing them; from
+
+ Pedro Martelletto
+
+ OpenBSD-Commit-ID: 39aa37a43d0c75ec87f1659f573d3b5867e4a3b3
+
+commit 72730249b38a676da94a1366b54a6e96e6928bcb
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Aug 28 03:15:52 2020 +0000
+
+ upstream: Check that the addresses supplied to Match Address and
+
+ Match LocalAddress are valid when parsing in config-test mode. This will
+ catch address/mask mismatches before they cause problems at runtime. Found by
+ Daniel Stocker, ok djm@
+
+ OpenBSD-Commit-ID: 2d0b10c69fad5d8fda4c703e7c6804935289378b
+
+commit 2a3a9822311a565a9df48ed3b6a3c972f462bd7d
+Author: jmc@openbsd.org <jmc@openbsd.org>
+Date: Thu Aug 27 12:34:00 2020 +0000
+
+ upstream: sentence fix; from pedro martelletto
+
+ OpenBSD-Commit-ID: f95b84a1e94e9913173229f3787448eea2f8a575
+
+commit ce178be0d954b210c958bc2b9e998cd6a7aa73a9
+Author: Damien Miller <djm@mindrot.org>
+Date: Thu Aug 27 20:01:52 2020 +1000
+
+ tweak back-compat for older libfido2
+
+commit d6f45cdde031acdf434bbb27235a1055621915f4
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Thu Aug 27 09:46:04 2020 +0000
+
+ upstream: debug()-print a little info about FIDO-specific key
+
+ fields via "ssh-keygen -vyf /path/key"
+
+ OpenBSD-Commit-ID: cf315c4fe77db43947d111b00155165cb6b577cf
+
+commit b969072cc3d62d05cb41bc6d6f3c22c764ed932f
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Thu Aug 27 09:43:28 2020 +0000
+
+ upstream: skip a bit more FIDO token selection logic when only a
+
+ single token is attached.
+
+ with Pedro Martelletto
+
+ OpenBSD-Commit-ID: e4a324bd9814227ec1faa8cb619580e661cca9ac
+
+commit 744df42a129d7d7db26947b7561be32edac89f88
+Author: jmc@openbsd.org <jmc@openbsd.org>
+Date: Thu Aug 27 06:15:22 2020 +0000
+
+ upstream: tweak previous;
+
+ OpenBSD-Commit-ID: 92714b6531e244e4da401b2defaa376374e24be7
+
+commit e32479645ce649b444ba5c6e7151304306a09654
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Thu Aug 27 03:55:22 2020 +0000
+
+ upstream: adapt to API changes
+
+ OpenBSD-Regress-ID: 5f147990cb67094fe554333782ab268a572bb2dd
+
+commit bbcc858ded3fbc46abfa7760e40389e3ca93884c
+Author: Damien Miller <djm@mindrot.org>
+Date: Thu Aug 27 12:37:12 2020 +1000
+
+ degrade semi-gracefully when libfido2 is too old
+
+commit 9cbbdc12cb6a2ab1e9ffe9974cca91d213c185c2
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Thu Aug 27 01:15:36 2020 +0000
+
+ upstream: dummy firmware needs to match API version numner crank (for
+
+ verify-required resident keys) even though it doesn't implement this feature
+
+ OpenBSD-Regress-ID: 86579ea2891e18e822e204413d011b2ae0e59657
+
+commit c1e76c64956b424ba260fd4eec9970e5b5859039
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Thu Aug 27 02:11:09 2020 +0000
+
+ upstream: remove unreachable code I forgot to delete in r1.334
+
+ OpenBSD-Commit-ID: 9ed6078251a0959ee8deda443b9ae42484fd8b18
+
+commit 0caff05350bd5fc635674c9e051a0322faba5ae3
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Thu Aug 27 01:08:45 2020 +0000
+
+ upstream: Request PIN ahead of time for certain FIDO actions
+
+ When we know that a particular action will require a PIN, such as
+ downloading resident keys or generating a verify-required key, request
+ the PIN before attempting it.
+
+ joint work with Pedro Martelletto; ok markus@
+
+ OpenBSD-Commit-ID: 863182d38ef075bad1f7d20ca485752a05edb727
+
+commit b649b3daa6d4b8ebe1bd6de69b3db5d2c03c9af0
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Thu Aug 27 01:08:19 2020 +0000
+
+ upstream: preserve verify-required for resident FIDO keys
+
+ When downloading a resident, verify-required key from a FIDO token,
+ preserve the verify-required in the private key that is written to
+ disk. Previously we weren't doing that because of lack of support
+ in the middleware API.
+
+ from Pedro Martelletto; ok markus@ and myself
+
+ OpenBSD-Commit-ID: 201c46ccdd227cddba3d64e1bdbd082afa956517
+
+commit 642e06d0df983fa2af85126cf4b23440bb2985bf
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Thu Aug 27 01:07:51 2020 +0000
+
+ upstream: major rework of FIDO token selection logic
+
+ When PINs are in use and multiple FIDO tokens are attached to a host, we
+ cannot just blast requests at all attached tokens with the PIN specified
+ as this will cause the per-token PIN failure counter to increment. If
+ this retry counter hits the token's limit (usually 3 attempts), then the
+ token will lock itself and render all (web and SSH) of its keys invalid.
+ We don't want this.
+
+ So this reworks the key selection logic for the specific case of
+ multiple keys being attached. When multiple keys are attached and the
+ operation requires a PIN, then the user must touch the key that they
+ wish to use first in order to identify it.
+
+ This may require multiple touches, but only if there are multiple keys
+ attached AND (usually) the operation requires a PIN. The usual case of a
+ single key attached should be unaffected.
+
+ Work by Pedro Martelletto; ok myself and markus@
+
+ OpenBSD-Commit-ID: 637d3049ced61b7a9ee796914bbc4843d999a864
+
+commit 801c9f095e6d8b7b91aefd98f5001c652ea13488
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Thu Aug 27 01:07:09 2020 +0000
+
+ upstream: support for requiring user verified FIDO keys in sshd
+
+ This adds a "verify-required" authorized_keys flag and a corresponding
+ sshd_config option that tells sshd to require that FIDO keys verify the
+ user identity before completing the signing/authentication attempt.
+ Whether or not user verification was performed is already baked into the
+ signature made on the FIDO token, so this is just plumbing that flag
+ through and adding ways to require it.
+
+ feedback and ok markus@
+
+ OpenBSD-Commit-ID: 3a2313aae153e043d57763d766bb6d55c4e276e6
+
+commit 9b8ad93824c682ce841f53f3b5762cef4e7cc4dc
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Thu Aug 27 01:06:18 2020 +0000
+
+ upstream: support for user-verified FIDO keys
+
+ FIDO2 supports a notion of "user verification" where the user is
+ required to demonstrate their identity to the token before particular
+ operations (e.g. signing). Typically this is done by authenticating
+ themselves using a PIN that has been set on the token.
+
+ This adds support for generating and using user verified keys where
+ the verification happens via PIN (other options might be added in the
+ future, but none are in common use now). Practically, this adds
+ another key generation option "verify-required" that yields a key that
+ requires a PIN before each authentication.
+
+ feedback markus@ and Pedro Martelletto; ok markus@
+
+ OpenBSD-Commit-ID: 57fd461e4366f87c47502c5614ec08573e6d6a15
+
+commit 1196d7f49d4fbc90f37e550de3056561613b0960
+Author: cheloha@openbsd.org <cheloha@openbsd.org>
+Date: Wed Aug 12 01:23:45 2020 +0000
+
+ upstream: ssh-keyscan(1): simplify conloop() with timercmp(3),
+
+ timersub(3); ok djm@
+
+ OpenBSD-Commit-ID: a102acb544f840d33ad73d40088adab4a687fa27
+
+commit d0a195c89e26766d3eb8f3e4e2a00ebc98b57795
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Tue Aug 11 09:49:57 2020 +0000
+
+ upstream: let ssh_config(5)'s AddKeysToAgent keyword accept a time
+
+ limit for keys in addition to its current flag options. Time-limited keys
+ will automatically be removed from ssh-agent after their expiry time has
+ passed; ok markus@
+
+ OpenBSD-Commit-ID: 792e71cacbbc25faab5424cf80bee4a006119f94
+
+commit e9c2002891a7b8e66f4140557a982978f372e5a3
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Tue Aug 11 09:45:54 2020 +0000
+
+ upstream: let the "Confirm user presence for key ..." ssh-askpass
+
+ notification respect $SSH_ASKPASS_REQUIRE; ok markus@
+
+ OpenBSD-Commit-ID: 7c1a616b348779bda3b9ad46bf592741f8e206c1
+
+commit eaf8672b1b52db2815a229745f4e4b08681bed6d
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Aug 21 00:04:13 2020 +1000
+
+ Remove check for 'ent' command.
+
+ It was added in 8d1fd57a9 for measuring entropy of ssh_prng_cmds which
+ has long since been removed and there are no other references to it.
+
+commit 05c215de8d224e094a872d97d45f37f60c06206b
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Mon Aug 17 21:34:32 2020 +1000
+
+ Wrap stdint.h include in ifdef HAVE_STDINT_H.
+
+commit eaf2765efe8bc74feba85c34295d067637fc6635
+Author: Damien Miller <djm@mindrot.org>
+Date: Mon Aug 10 13:24:09 2020 +1000
+
+ sync memmem.c with OpenBSD
+
+commit ed6bef77f5bb5b8f9ca2914478949e29f2f0a780
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Aug 7 17:12:16 2020 +1000
+
+ Always send any PAM account messages.
+
+ If the PAM account stack reaturns any messages, send them to the user
+ not just if the check succeeds. bz#2049, ok djm@
+
+commit a09e98dcae1e26f026029b7142b0e0d10130056f
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Aug 7 15:37:37 2020 +1000
+
+ Output test debug logs on failure.
+
+commit eb122b1eebe58b29a83a507ee814cbcf8aeded1b
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Aug 7 15:11:42 2020 +1000
+
+ Add ability to specify exact test target.
+
+commit c2ec7a07f8caabb4d8e00c66e7cd46bf2cd1e922
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Aug 7 14:21:15 2020 +1000
+
+ Document --without-openssl and --without-zlib.
+
+commit 651bb3a31949bbdc3a78b2ede95a77bce0c72984
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Aug 7 14:15:11 2020 +1000
+
+ Add without-openssl without-zlib test target.
+
+commit 9499f2bb01dc1032ae155999b2d7764b9491341f
+Author: Stefan Schindler <dns2utf8@estada.ch>
+Date: Wed Aug 5 19:00:52 2020 +0200
+
+ Add CI with prepare script
+
+ * Only use heimdal kerberos implementation
+ * Fetch yubico/libfido2 (see: https://github.com/Yubico/libfido2)
+ * Add one target for
+ * all features
+ * each feature alone
+ * no features
+
+commit ea1f649046546a860f68b97ddc3015b7e44346ca
+Author: Damien Miller <djm@mindrot.org>
+Date: Wed Aug 5 08:58:57 2020 +1000
+
+ support NetBSD's utmpx.ut_ss address field
+
+ bz#960, ok dtucker
+
+commit 32c63e75a70a0ed9d6887a55fcb0e4531a6ad617
+Author: Damien Miller <djm@mindrot.org>
+Date: Tue Aug 4 14:59:21 2020 +1000
+
+ wrap a declaration in the same ifdefs as its use
+
+ avoids warnings on NetBSD
+
+commit c9e3be9f4b41fda32a2a0138d54c7a6b563bc94d
+Author: Damien Miller <djm@mindrot.org>
+Date: Tue Aug 4 14:58:46 2020 +1000
+
+ undef TAILQ_CONCAT and friends
+
+ Needed for NetBSD. etc that supply these macros
+
+commit 2d8a3b7e8b0408dfeb933ac5cfd3a58f5bac49af
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon Aug 3 02:53:51 2020 +0000
+
+ upstream: ensure that certificate extensions are lexically sorted.
+
+ Previously if the user specified a custom extension then the everything would
+ be in order except the custom ones. bz3198 ok dtucker markus
+
+ OpenBSD-Commit-ID: d97deb90587b06cb227c66ffebb2d9667bf886f0
+
+commit a8732d74cb8e72f0c6366015687f1e649f60be87
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon Aug 3 02:43:41 2020 +0000
+
+ upstream: allow -A to explicitly enable agent forwarding in scp and
+
+ sftp. The default remains to not forward an agent, even when ssh_config
+ enables it. ok jmc dtucker markus
+
+ OpenBSD-Commit-ID: 36cc526aa3b0f94e4704b8d7b969dd63e8576822
+
+commit ab9105470a83ed5d8197959a1b1f367399958ba1
+Author: deraadt@openbsd.org <deraadt@openbsd.org>
+Date: Mon Aug 3 02:42:49 2020 +0000
+
+ upstream: clang -Wimplicit-fallthrough does not recognise /*
+
+ FALLTHROUGH */ comments, which is the style we currently use, and gives too
+ many boring warnings. ok djm
+
+ OpenBSD-Commit-ID: 07b5031e9f49f2b69ac5e85b8da4fc9e393992a0
+
+commit ced327b9fb78c94d143879ef4b2a02cbc5d38690
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Jul 31 04:19:37 2020 +0000
+
+ upstream: Also compare username when checking for JumpHost loops.
+
+ bz#3057, ok djm@
+
+ OpenBSD-Commit-ID: 9bbc1d138adb34c54f3c03a15a91f75dbf418782
+
+commit ae7527010c44b3376b85d036a498f136597b2099
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Jul 31 15:19:04 2020 +1000
+
+ Remove AC_REVISION.
+
+ It hasn't been useful since we switched to git in 2014. ok djm@
+
+commit 89fc3f414be0ce4e8008332a9739a7d721269e50
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Tue Jul 28 19:40:30 2020 +1000
+
+ Use argv in OSSH_CHECK_CFLAG_COMPILE test.
+
+ configure.ac is not detecting -Wextra in compilers that implement the
+ option. The problem is that -Wextra implies -Wunused-parameter, and the
+ C excerpt used by aclocal.m4 does not use argv. Patch from pedro at
+ ambientworks.net, ok djm@
+
+commit 62c81ef531b0cc7ff655455dd34f5f0c94f48e82
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Mon Jul 20 22:12:07 2020 +1000
+
+ Skip ECDSA-SK webauthn test when built w/out ECC
+
+commit 3ec9a6d7317236a9994887d8bd5d246af403a00d
+Author: Damien Miller <djm@mindrot.org>
+Date: Mon Jul 20 13:09:25 2020 +1000
+
+ Add ssh-sk-helper and manpage to RPM spec file
+
+ Based on patch from Fabio Pedretti
+
+commit a2855c048b3f4b17d8787bd3f24232ec0cd79abe
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Jul 17 07:09:24 2020 +0000
+
+ upstream: Add %k to the TOKENs for Match Exec for consistency with
+
+ the other keywords that recently got %k.
+
+ OpenBSD-Commit-ID: 1857d1c40f270cbc254fca91e66110641dddcfdb
+
+commit 69860769fa9f4529d8612ec055ae11912f7344cf
+Author: jmc@openbsd.org <jmc@openbsd.org>
+Date: Fri Jul 17 05:59:05 2020 +0000
+
+ upstream: fix macro slip in previous;
+
+ OpenBSD-Commit-ID: 624e47ab209450ad9ad5c69f54fa69244de5ed9a
+
+commit 40649bd0822883b684183854b16d0b8461d5697b
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Jul 17 07:10:24 2020 +0000
+
+ upstream: Add test for '%k' (HostKeyAlias) TOKEN.
+
+ OpenBSD-Regress-ID: 8ed1ba1a811790031aad3fcea860a34ad7910456
+
+commit 6736fe680704a3518cb4f3f8f6723b00433bd3dd
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Jul 17 03:26:58 2020 +0000
+
+ upstream: Add tests for expansions on UserKnownHostsFile.
+
+ OpenBSD-Regress-ID: bccf8060306c841bbcceb1392644f906a4d6ca51
+
+commit 287dc6396e0f9cb2393f901816dbd7f2a7dfbb5f
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jul 17 03:51:32 2020 +0000
+
+ upstream: log error message for process_write() write failures
+
+ OpenBSD-Commit-ID: f733d7b3b05e3c68967dc18dfe39b9e8fad29851
+
+commit 8df5774a42d2eaffe057bd7f293fc6a4b1aa411c
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Jul 17 03:43:42 2020 +0000
+
+ upstream: Add a '%k' TOKEN that expands to the effective HostKey of
+
+ the destination. This allows, eg, keeping host keys in individual files
+ using "UserKnownHostsFile ~/.ssh/known_hosts.d/%k". bz#1654, ok djm@, jmc@
+ (man page bits)
+
+ OpenBSD-Commit-ID: 7084d723c9cc987a5c47194219efd099af5beadc
+
+commit c4f239944a4351810fd317edf408bdcd5c0102d9
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Jul 17 03:23:10 2020 +0000
+
+ upstream: Add %-TOKEN, environment variable and tilde expansion to
+
+ UserKnownHostsFile, allowing the file to be automagically split up in the
+ configuration (eg bz#1654). ok djm@, man page parts jmc@
+
+ OpenBSD-Commit-ID: 7e1b406caf147638bb51558836a72d6cc0bd1b18
+
+commit dbaaa01daedb423c38124a72c471982fb08a16fb
+Author: solene@openbsd.org <solene@openbsd.org>
+Date: Wed Jul 15 07:50:46 2020 +0000
+
+ upstream: - Add [-a rounds] in ssh-keygen man page and usage() -
+
+ Reorder parameters list in the first usage() case - Sentence rewording
+
+ ok dtucker@
+ jmc@ noticed usage() missed -a flag too
+
+ OpenBSD-Commit-ID: f06b9afe91cc96f260b929a56e9930caecbde246
+
+commit 69924a92c3af7b99a7541aa544a2334ec0fb092c
+Author: jmc@openbsd.org <jmc@openbsd.org>
+Date: Wed Jul 15 05:40:05 2020 +0000
+
+ upstream: start sentence with capital letter;
+
+ OpenBSD-Commit-ID: ab06581d51b2b4cc1b4aab781f7f3cfa56cad973
+
+commit 5b56bd0affea7b02b540bdbc4d1d271b0e4fc885
+Author: Damien Miller <djm@mindrot.org>
+Date: Fri Jul 17 13:15:50 2020 +1000
+
+ detect Linux/X32 systems
+
+ This is a frankenstein monster of AMD64 instructions/calling conventions
+ but with a 4GB address space. Allegedly deprecated but people still run
+ into it causing weird sandbox failures, e.g. bz#3085
+
+commit 9c9ddc1391d6af8d09580a2424ab467d0a5df3c7
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Wed Jul 15 06:43:16 2020 +0000
+
+ upstream: Fix previous by calling the correct function.
+
+ OpenBSD-Regress-ID: 821cdd1dff9c502cceff4518b6afcb81767cad5a
+
+commit f1a4798941b4372bfe5e46f1c0f8672fe692d9e4
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Wed Jul 15 05:36:50 2020 +0000
+
+ upstream: Update test to match recent change in match.c
+
+ OpenBSD-Regress-ID: 965bda1f95f09a765050707340c73ad755f41167
+
+commit d7e71be4fd57b7c7e620d733cdf2333b27bfa924
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Wed Jul 15 15:30:43 2020 +1000
+
+ Adjust portable code to match changes in 939d787d,
+
+commit fec89f32a84fd0aa1afc81deec80a460cbaf451a
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Wed Jul 15 04:27:34 2020 +0000
+
+ upstream: Add default for number of rounds (-a). ok djm@
+
+ OpenBSD-Commit-ID: cb7e9aa04ace01a98e63e4bd77f34a42ab169b15
+
+commit aaa8b609a7b332be836cd9a3b782422254972777
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Tue Jul 14 23:57:01 2020 +0000
+
+ upstream: allow some additional control over the use of ssh-askpass
+
+ via $SSH_ASKPASS_REQUIRE, including force-enable/disable. bz#69 ok markus@
+
+ OpenBSD-Commit-ID: 3a1e6cbbf6241ddc4405c4246caa2c249f149eb2
+
+commit 6368022cd4dd508671c4999a59ec5826df098530
+Author: deraadt@openbsd.org <deraadt@openbsd.org>
+Date: Tue Jul 7 02:47:21 2020 +0000
+
+ upstream: correct recently broken comments
+
+ OpenBSD-Commit-ID: 964d9a88f7de1d0eedd3f8070b43fb6e426351f1
+
+commit 6d755706a0059eb9e2d63517f288b75cbc3b4701
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Sun Jul 5 23:59:45 2020 +0000
+
+ upstream: some language improvements; ok markus
+
+ OpenBSD-Commit-ID: 939d787d571b4d5da50b3b721fd0b2ac236acaa8
+
+commit b0c1e8384d5e136ebdf895d1434aea7dd8661a1c
+Author: markus@openbsd.org <markus@openbsd.org>
+Date: Fri Jul 3 10:12:26 2020 +0000
+
+ upstream: update setproctitle after re-exec; ok djm
+
+ OpenBSD-Commit-ID: bc92d122f9184ec2a9471ade754b80edd034ce8b
+
+commit cd119a5ec2bf0ed5df4daff3bd14f8f7566dafd3
+Author: markus@openbsd.org <markus@openbsd.org>
+Date: Fri Jul 3 10:11:33 2020 +0000
+
+ upstream: keep ignoring HUP after fork+exec; ok djm
+
+ OpenBSD-Commit-ID: 7679985a84ee5ceb09839905bb6f3ddd568749a2
+
+commit 8af4a743693ccbea3e15fc9e93edbeb610fa94f4
+Author: markus@openbsd.org <markus@openbsd.org>
+Date: Fri Jul 3 10:10:17 2020 +0000
+
+ upstream: don't exit the listener on send_rexec_state errors; ok
+
+ djm
+
+ OpenBSD-Commit-ID: 57cbd757d130d3f45b7d41310b3a15eeec137d5c
+
+commit 03da4c2b70468f04ed1c08518ea0a70e67232739
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Wed Jul 15 04:55:47 2020 +0000
+
+ upstream: Use $OBJ to find key files. Fixes test when run on an obj
+
+ directory (on OpenBSD) or out of tree (in Portable).
+
+ OpenBSD-Regress-ID: 938fa8ac86adaa527d64a305bd2135cfbb1c0a17
+
+commit 73f20f195ad18f1cf633eb7d8be95dc1b6111eea
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Sat Jul 4 23:11:23 2020 +1000
+
+ Wrap stdint.h in ifdef HAVE_STDINT_H.
+
+commit aa6fa4bf3023fa0e5761cd8f4b2cd015d2de74dd
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jul 3 07:25:18 2020 +0000
+
+ upstream: put back the mux_ctx memleak fix, but only for channels of
+
+ type SSH_CHANNEL_MUX_LISTENER; Specifically SSH_CHANNEL_MUX_PROXY channels
+ should not have this structure freed.
+
+ OpenBSD-Commit-ID: f3b213ae60405f77439e2b06262f054760c9d325
+
+commit d8195914eb43b20b13381f4e5a74f9f8a14f0ded
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jul 3 07:17:35 2020 +0000
+
+ upstream: revert r1.399 - the lifetime of c->mux_ctx is more complex;
+
+ simply freeing it here causes other problems
+
+ OpenBSD-Commit-ID: c6fee8ca94e2485faa783839541962be2834c5ed
+
+commit 20b5fab9f773b3d3c7f06cb15b8f69a2c081ee80
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jul 3 07:02:37 2020 +0000
+
+ upstream: avoid tilde_expand_filename() in expanding ~/.ssh/rc - if
+
+ sshd is in chroot mode, the likely absence of a password database will cause
+ tilde_expand_filename() to fatal; ok dtucker@
+
+ OpenBSD-Commit-ID: e20aee6159e8b79190d18dba1513fc1b7c8b7ee1
+
+commit c8935081db35d73ee6355999142fa0776a2af912
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jul 3 06:46:41 2020 +0000
+
+ upstream: when redirecting sshd's log output to a file, undo this
+
+ redirection after the session child process is forked(); ok dtucker@
+
+ OpenBSD-Commit-ID: 6df86dd653c91f5bc8ac1916e7680d9d24690865
+
+commit 183c4aaef944af3a1a909ffa01058c65bac55748
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jul 3 06:29:57 2020 +0000
+
+ upstream: start ClientAliveInterval bookkeeping before first pass
+
+ through select() loop; fixed theoretical case where busy sshd may ignore
+ timeouts from client; inspired by and ok dtucker
+
+ OpenBSD-Commit-ID: 96bfc4b1f86c7da313882a84755b2b47eb31957f
+
+commit 6fcfd303d67f16695198cf23d109a988e40eefb6
+Author: Damien Miller <djm@mindrot.org>
+Date: Fri Jul 3 15:28:27 2020 +1000
+
+ add check for fido_cred_set_prot() to configure
+
+commit f11b23346309e4d5138e733a49321aedd6eeaa2f
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Jul 3 05:09:06 2020 +0000
+
+ upstream: Only reset the serveralive check when we receive traffic from
+
+ the server and ignore traffic from a port forwarding client, preventing a
+ client from keeping a connection alive when it should be terminated. Based
+ on a patch from jxraynor at gmail.com via openssh-unix-dev and bz#2265, ok
+ djm@
+
+ OpenBSD-Commit-ID: a941a575a5cbc244c0ef5d7abd0422bbf02c2dcd
+
+commit adfdbf1211914b631c038f0867a447db7b519937
+Author: Damien Miller <djm@mindrot.org>
+Date: Fri Jul 3 15:15:15 2020 +1000
+
+ sync sys-queue.h with OpenBSD upstream
+
+ needed for TAILQ_CONCAT
+
+commit 1b90ddde49e2ff377204082b6eb130a096411dc1
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jul 3 05:08:41 2020 +0000
+
+ upstream: fix memory leak of mux_ctx; patch from Sergiy Lozovsky
+
+ via bz3189 ok dtucker
+
+ OpenBSD-Commit-ID: db249bd4526fd42d0f4f43f72f7b8b7705253bde
+
+commit 55ef3e9cbd5b336bd0f89205716924886fcf86de
+Author: markus@openbsd.org <markus@openbsd.org>
+Date: Wed Jul 1 16:28:31 2020 +0000
+
+ upstream: free kex in ssh_packet_close; ok djm semarie
+
+ OpenBSD-Commit-ID: dbc181e90d3d32fd97b10d75e68e374270e070a2
+
+commit e1c401109b61f7dbc199b5099933d579e7fc5dc9
+Author: bket@openbsd.org <bket@openbsd.org>
+Date: Sat Jun 27 13:39:09 2020 +0000
+
+ upstream: Replace TAILQ concatenation loops with TAILQ_CONCAT
+
+ OK djm@
+
+ OpenBSD-Commit-ID: 454b40e09a117ddb833794358970a65b14c431ef
+
+commit 14beca57ac92d62830c42444c26ba861812dc837
+Author: semarie@openbsd.org <semarie@openbsd.org>
+Date: Fri Jun 26 11:26:01 2020 +0000
+
+ upstream: backout 1.293 fix kex mem-leak in ssh_packet_close at markus
+
+ request
+
+ the change introduced a NULL deref in sshpkt_vfatal() (uses of ssh->kex after
+ calling ssh_packet_clear_keys())
+
+ OpenBSD-Commit-ID: 9c9a6721411461b0b1c28dc00930d7251a798484
+
+commit 598c3a5e3885080ced0d7c40fde00f1d5cdbb32b
+Author: Damien Miller <djm@mindrot.org>
+Date: Fri Jun 26 16:07:12 2020 +1000
+
+ document a PAM spec problem in a frustrated comment
+
+commit 976c4f86286d52a0cb2aadf4a095d379c0da752e
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 26 05:42:16 2020 +0000
+
+ upstream: avoid spurious error message when ssh-keygen creates files
+
+ outside ~/.ssh; with dtucker@
+
+ OpenBSD-Commit-ID: ac0c662d44607e00ec78c266ee60752beb1c7e08
+
+commit 32b2502a9dfdfded1ccdc1fd6dc2b3fe41bfc205
+Author: Damien Miller <djm@mindrot.org>
+Date: Fri Jun 26 15:30:06 2020 +1000
+
+ missing ifdef SELINUX; spotted by dtucker
+
+commit e073106f370cdd2679e41f6f55a37b491f0e82fe
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 26 05:12:21 2020 +0000
+
+ upstream: regress test for ssh-add -d; ok dtucker@
+
+ OpenBSD-Regress-ID: 3a2e044be616afc7dd4f56c100179e83b33d8abf
+
+commit c809daaa1bad6b1c305b0e0b5440360f32546c84
+Author: markus@openbsd.org <markus@openbsd.org>
+Date: Wed Jun 24 15:16:23 2020 +0000
+
+ upstream: add test for mux w/-Oproxy; ok djm
+
+ OpenBSD-Regress-ID: 764d5c696e2a259f1316a056e225e50023abb027
+
+commit 3d06ff4bbd3dca8054c238d2a94c0da563ef7eee
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 26 05:16:38 2020 +0000
+
+ upstream: handle EINTR in waitfd() and timeout_connect() helpers;
+
+ bz#3071; ok dtucker@
+
+ OpenBSD-Commit-ID: 08fa87be50070bd8b754d9b1ebb1138d7bc9d8ee
+
+commit fe2ec0b9c19adeab0cd9f04b8152dc17f31c31e5
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 26 05:04:07 2020 +0000
+
+ upstream: allow "ssh-add -d -" to read keys to be deleted from
+
+ stdin bz#3180; ok dtucker@
+
+ OpenBSD-Commit-ID: 15c7f10289511eb19fce7905c9cae8954e3857ff
+
+commit a3e0c376ffc11862fa3568b28188bd12965973e1
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 26 05:03:36 2020 +0000
+
+ upstream: constify a few things; ok dtucker (as part of another
+
+ diff)
+
+ OpenBSD-Commit-ID: 7c17fc987085994d752304bd20b1ae267a9bcdf6
+
+commit 74344c3ca42c3f53b00b025daf09ae7f6aa38076
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Jun 26 05:02:03 2020 +0000
+
+ upstream: Defer creation of ~/.ssh by ssh(1) until we attempt to
+
+ write to it so we don't leave an empty .ssh directory when it's not needed.
+ Use the same function to replace the code in ssh-keygen that does the same
+ thing. bz#3156, ok djm@
+
+ OpenBSD-Commit-ID: 59c073b569be1a60f4de36f491a4339bc4ae870f
+
+commit c9e24daac6324fcbdba171392c325bf9ccc3c768
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Jun 26 04:45:11 2020 +0000
+
+ upstream: Expand path to ~/.ssh/rc rather than relying on it
+
+ being relative to the current directory, so that it'll still be found if the
+ shell startup changes its directory. Since the path is potentially longer,
+ make the cmd buffer that uses it dynamically sized. bz#3185, with & ok djm@
+
+ OpenBSD-Commit-ID: 36e33ff01497af3dc8226d0c4c1526fc3a1e46bf
+
+commit 07f5f369a25e228a7357ef6c57205f191f073d99
+Author: markus@openbsd.org <markus@openbsd.org>
+Date: Wed Jun 24 15:12:09 2020 +0000
+
+ upstream: fix kex mem-leak in ssh_packet_close; ok djm
+
+ OpenBSD-Commit-ID: e2e9533f393620383afd0b68ef435de8d5e8abe4
+
+commit e35995088cd6691a712bfd586bae8084a3a922ba
+Author: markus@openbsd.org <markus@openbsd.org>
+Date: Wed Jun 24 15:10:38 2020 +0000
+
+ upstream: fix ssh -O proxy w/mux which got broken by no longer
+
+ making ssh->kex optional in packet.c revision 1.278 ok djm@
+
+ OpenBSD-Commit-ID: 2b65df04a064c2c6277359921d2320c90ab7d917
+
+commit 250246fef22b87a54a63211c60a2def9be431fbd
+Author: markus@openbsd.org <markus@openbsd.org>
+Date: Wed Jun 24 15:09:53 2020 +0000
+
+ upstream: support loading big sshd_config files w/o realloc; ok
+
+ djm
+
+ OpenBSD-Commit-ID: ba9238e810074ac907f0cf8cee1737ac04983171
+
+commit 89b54900ac61986760452f132bbe3fb7249cfdac
+Author: markus@openbsd.org <markus@openbsd.org>
+Date: Wed Jun 24 15:08:53 2020 +0000
+
+ upstream: allow sshd_config longer than 256k; ok djm
+
+ OpenBSD-Commit-ID: 83f40dd5457a64c1d3928eb4364461b22766beb3
+
+commit e3fa6249e6d9ceb57c14b04dd4c0cfab12fa7cd5
+Author: markus@openbsd.org <markus@openbsd.org>
+Date: Wed Jun 24 15:07:33 2020 +0000
+
+ upstream: only call sshkey_xmss_init() once for KEY_XMSS_CERT; ok
+
+ djm
+
+ OpenBSD-Commit-ID: d0002ffb7f20f538b014d1d0735facd5a81ff096
+
+commit 37f2da069c0619f2947fb92785051d82882876d7
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon Jun 22 23:44:27 2020 +0000
+
+ upstream: some clarifying comments
+
+ OpenBSD-Commit-ID: 5268479000fd97bfa30ab819f3517139daa054a2
+
+commit b659319a5bc9e8adf3c4facc51f37b670d2a7426
+Author: jmc@openbsd.org <jmc@openbsd.org>
+Date: Mon Jun 22 06:37:38 2020 +0000
+
+ upstream: updated argument name for -P in first synopsis was
+
+ missed in previous;
+
+ OpenBSD-Commit-ID: 8d84dc3050469884ea91e29ee06a371713f2d0b7
+
+commit 02a9222cbce7131d639984c2f6c71d1551fc3333
+Author: jmc@openbsd.org <jmc@openbsd.org>
+Date: Mon Jun 22 06:36:40 2020 +0000
+
+ upstream: supply word missing in previous;
+
+ OpenBSD-Commit-ID: 16a38b049f216108f66c8b699aa046063381bd23
+
+commit 5098b3b6230852a80ac6cef5d53a785c789a5a56
+Author: Damien Miller <djm@mindrot.org>
+Date: Mon Jun 22 16:54:02 2020 +1000
+
+ missing files for webauthn/sshsig unit test
+
+commit 354535ff79380237924ac8fdc98f8cdf83e67da6
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon Jun 22 06:00:06 2020 +0000
+
+ upstream: add support for verification of webauthn sshsig signature,
+
+ and example HTML/JS to generate webauthn signatures in SSH formats (also used
+ to generate the testdata/* for the test).
+
+ OpenBSD-Regress-ID: dc575be5bb1796fdf4b8aaee0ef52a6671a0f6fb
+
+commit bb52e70fa5330070ec9a23069c311d9e277bbd6f
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon Jun 22 05:58:35 2020 +0000
+
+ upstream: Add support for FIDO webauthn (verification only).
+
+ webauthn is a standard for using FIDO keys in web browsers. webauthn
+ signatures are a slightly different format to plain FIDO signatures - this
+ support allows verification of these. Feedback and ok markus@
+
+ OpenBSD-Commit-ID: ab7e3a9fb5782d99d574f408614d833379e564ad
+
+commit 64bc121097f377142f1387ffb2df7592c49935af
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon Jun 22 05:56:23 2020 +0000
+
+ upstream: refactor ECDSA-SK verification a little ahead of adding
+
+ support for FIDO webauthn signature verification support; ok markus@
+
+ OpenBSD-Commit-ID: c9f478fd8e0c1bd17e511ce8694f010d8e32043e
+
+commit 12848191f8fe725af4485d3600e0842d92f8637f
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon Jun 22 05:54:10 2020 +0000
+
+ upstream: support for RFC4648 base64url encoding; ok markus
+
+ OpenBSD-Commit-ID: 0ef22c55e772dda05c112c88412c0797fec66eb4
+
+commit 473b4af43db12127137c7fc1a10928313f5a16d2
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon Jun 22 05:53:26 2020 +0000
+
+ upstream: better terminology for permissions; feedback & ok markus@
+
+ OpenBSD-Commit-ID: ff2a71803b5ea57b83cc3fa9b3be42b70e462fb9
+
+commit fc270baf264248c3ee3050b13a6c8c0919e6559f
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon Jun 22 05:52:05 2020 +0000
+
+ upstream: better terminology for permissions; feedback & ok markus@
+
+ OpenBSD-Commit-ID: ffb220b435610741dcb4de0e7fc68cbbdc876d2c
+
+commit 00531bb42f1af17ddabea59c3d9c4b0629000d27
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Jun 19 07:21:42 2020 +0000
+
+ upstream: Correct synopsis and usage for the options accepted when
+
+ passing a command to ssh-agent. ok jmc@
+
+ OpenBSD-Commit-ID: b36f0679cb0cac0e33b361051b3406ade82ea846
+
+commit b4556c8ad7177e379f0b60305a0cd70f12180e7c
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Jun 19 19:22:00 2020 +1000
+
+ Add OPENBSD ORIGINAL marker to bcrypt_pbkdf.
+
+commit 1babb8bb14c423011ca34c2f563bb1c51c8fbf1d
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Jun 19 19:10:47 2020 +1000
+
+ Extra brackets around sizeof() in bcrypt.
+
+ Prevents following warning from clang 10:
+ bcrypt_pbkdf.c:94:40: error: expression does not compute the number of
+ elements in this array; element type is ´uint32_tÂ[...]
+ place parentheses around the ´sizeof(uint64_t)´ expression to
+ silence this warning
+
+commit 9e065729592633290e5ddb6852792913b2286545
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Jun 19 18:47:56 2020 +1000
+
+ Add includes.h to new test.
+
+ Fixes warnings eg "´bounded´ attribute directive ignor" from gcc.
+
+commit e684b1ea365e070433f282a3c1dabc3e2311ce49
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Jun 19 18:38:39 2020 +1000
+
+ Skip OpenSSL specific tests w/out OpenSSL.
+
+ Allows unit tests to pass when configure'ed --without-openssl.
+
+commit 80610e97a76407ca982e62fd051c9be03622fe7b
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Jun 19 17:15:27 2020 +1000
+
+ Hook sshsig tests up to Portable Makefiles.
+
+commit 5dba1fcabacaab46693338ec829b42a1293d1f52
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Jun 19 05:07:09 2020 +0000
+
+ upstream: Test that ssh-agent exits when running as as subprocess
+
+ of a specified command (ie "ssh-agent command"). Would have caught bz#3181.
+
+ OpenBSD-Regress-ID: 895b4765ba5153eefaea3160a7fe08ac0b6db8b3
+
+commit 68e8294f6b04f9590ea227e63d3e129398a49e27
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 19 04:34:21 2020 +0000
+
+ upstream: run sshsig unit tests
+
+ OpenBSD-Regress-ID: 706ef17e2b545b64873626e0e35553da7c06052a
+
+commit 5edfa1690e9a75048971fd8775f7c16d153779db
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 19 04:32:09 2020 +0000
+
+ upstream: basic unit test for sshsig.[ch], including FIDO keys
+
+ verification only so far
+
+ OpenBSD-Regress-ID: fb1f946c8fc59206bc6a6666e577b5d5d7e45896
+
+commit e95c0a0e964827722d29b4bc00d5c0ff4afe0ed2
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 19 03:48:49 2020 +0000
+
+ upstream: basic unit test for FIDO kep parsing
+
+ OpenBSD-Regress-ID: 8089b88393dd916d7c95422b442a6fd4cfe00c82
+
+commit 7775819c6de3e9547ac57b87c7dd2bfd28cefcc5
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Thu Jun 18 23:34:19 2020 +0000
+
+ upstream: check public host key matches private; ok markus@ (as
+
+ part of previous diff)
+
+ OpenBSD-Commit-ID: 65a4f66436028748b59fb88b264cb8c94ce2ba63
+
+commit c514f3c0522855b4d548286eaa113e209051a6d2
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Thu Jun 18 23:33:38 2020 +0000
+
+ upstream: avoid spurious "Unable to load host key" message when
+
+ sshd can load a private key but no public counterpart; with & ok markus@
+
+ OpenBSD-Commit-ID: 0713cbdf9aa1ff8ac7b1f78b09ac911af510f81b
+
+commit 7fafaeb5da365f4a408fec355dac04a774f27193
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 12 05:26:37 2020 +0000
+
+ upstream: correct RFC number; from HARUYAMA Seigo via GH PR191
+
+ OpenBSD-Commit-ID: 8d03b6c96ca98bfbc23d3754c3c33e1fe0852e10
+
+commit 3a7f654d5bcb20df24a134b6581b0d235da4564a
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 5 06:18:07 2020 +0000
+
+ upstream: unbreak "sshd -ddd" - close of config passing fd happened too
+
+ early. ok markus@
+
+ OpenBSD-Commit-ID: 49346e945c6447aca3e904e65fc400128d2f8ed0
+
+commit 3de02be39e5c0c2208d9682a3844991651620fcc
+Author: Andreas Schwab <schwab@suse.de>
+Date: Mon May 25 11:10:44 2020 +0200
+
+ Add support for AUDIT_ARCH_RISCV64
+
+commit ea547eb0329c2f8da77a4ac05f6c330bd49bdaab
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 5 03:25:35 2020 +0000
+
+ upstream: make sshbuf_putb(b, NULL) a no-op
+
+ OpenBSD-Commit-ID: 976fdc99b500e347023d430df372f31c1dd128f7
+
+commit 69796297c812640415c6cea074ea61afc899cbaa
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 5 03:24:36 2020 +0000
+
+ upstream: make sshbuf_dump() args const
+
+ OpenBSD-Commit-ID: b4a5accae750875d665b862504169769bcf663bd
+
+commit 670428895739d1f79894bdb2457891c3afa60a59
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri Jun 5 03:24:16 2020 +0000
+
+ upstream: wrap long line
+
+ OpenBSD-Commit-ID: ed405a12bd27bdc9c52e169bc5ff3529b4ebbbb2
+
+commit 2f648cf222882719040906722b3593b01df4ad1a
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri Jun 5 03:15:26 2020 +0000
+
+ upstream: Correct historical comment: provos@ modified OpenSSH to
+
+ work with SSLeay (very quickly replaced by OpenSSL) not SSL in general. ok
+ deraadt, historical context markus@
+
+ OpenBSD-Commit-ID: 7209e07a2984b50411ed8ca5a4932da5030d2b90
+
+commit 56548e4efcc3e3e8093c2eba30c75b23e561b172
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Wed Jun 3 08:23:18 2020 +0000
+
+ upstream: Import regenerated moduli file.
+
+ OpenBSD-Commit-ID: 52ff0e3205036147b2499889353ac082e505ea54
+
+commit 8da801f585dd9c534c0cbe487a3b1648036bf2fb
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri Jun 5 13:20:10 2020 +1000
+
+ Test fallthrough in OSSH_CHECK_CFLAG_COMPILE.
+
+ clang 10's -Wimplicit-fallthrough does not understand /* FALLTHROUGH */
+ comments and we don't use the __attribute__((fallthrough)) that it's
+ looking for. This has the effect of turning off -Wimplicit-fallthrough
+ where it does not currently help (particularly with -Werror). ok djm@
+
+commit 049297de975b92adcc2db77e3fb7046c0e3c695d
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Wed Jun 3 08:23:18 2020 +0000
+
+ upstream: Import regenerated moduli file.
+
+ OpenBSD-Commit-ID: 52ff0e3205036147b2499889353ac082e505ea54
+
+commit b458423a38a3140ac022ffcffcb332609faccfe3
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Mon Jun 1 07:11:38 2020 +0000
+
+ upstream: Remove now-unused proto_spec and associated definitions.
+
+ ok djm@
+
+ OpenBSD-Commit-ID: 2e2b18e3aa6ee22a7b69c39f2d3bd679ec35c362
+
+commit 5ad3c3a33ef038b55a14ebd31faeeec46073db2c
+Author: millert@openbsd.org <millert@openbsd.org>
+Date: Fri May 29 21:22:02 2020 +0000
+
+ upstream: Fix error message on close(2) and add printf format
+
+ attributes. From Christos Zoulas, OK markus@
+
+ OpenBSD-Commit-ID: 41523c999a9e3561fcc7082fd38ea2e0629ee07e
+
+commit 712ac1efb687a945a89db6aa3e998c1a17b38653
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri May 29 11:17:56 2020 +0000
+
+ upstream: Make dollar_expand variadic and pass a real va_list to
+
+ vdollar_percent_expand. Fixes build error on arm64 spotted by otto@.
+
+ OpenBSD-Commit-ID: 181910d7ae489f40ad609b4cf4a20f3d068a7279
+
+commit 837ffa9699a9cba47ae7921d2876afaccc027133
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Fri May 29 20:39:00 2020 +1000
+
+ Omit ToS setting if we don't have IPV6_TCLASS too.
+
+ Fixes tests on old BSDs.
+
+commit f85b118d2150847cc333895296bc230e367be6b5
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri May 29 09:02:44 2020 +0000
+
+ upstream: Pass a NULL instead of zeroed out va_list from
+
+ dollar_expand. The original intent was in case there's some platform where
+ va_list is not a pointer equivalent, but on i386 this chokes on the memset.
+ This unbreaks that build, but will require further consideration.
+
+ OpenBSD-Commit-ID: 7b90afcd8e1137a1d863204060052aef415baaf7
+
+commit ec1d50b01c84ff667240ed525f669454c4ebc8e9
+Author: jmc@openbsd.org <jmc@openbsd.org>
+Date: Fri May 29 05:48:39 2020 +0000
+
+ upstream: remove a stray .El;
+
+ OpenBSD-Commit-ID: 58ddfe6f8a15fe10209db6664ecbe7896f1d167c
+
+commit 058674a62ffe33f01d871d46e624bc2a2c22d91f
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri May 29 04:32:26 2020 +0000
+
+ upstream: Add regression and unit tests for ${ENV} style
+
+ environment variable expansion in various keywords (bz#3140). ok djm@
+
+ OpenBSD-Regress-ID: 4d9ceb95d89365b7b674bc26cf064c15a5bbb197
+
+commit 0b15892fc47d6840eba1291a6be9be1a70bc8972
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri May 29 01:21:35 2020 +0000
+
+ upstream: Unit test for convtime. ok djm@
+
+ OpenBSD-Regress-ID: cec4239efa2fc4c7062064f07a847e1cbdbcd5dd
+
+commit 188e332d1c8f9f24e5b6659e9680bf083f837df9
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri May 29 05:37:03 2020 +0000
+
+ upstream: mention that wildcards are processed in lexical order;
+
+ bz#3165
+
+ OpenBSD-Commit-ID: 8856f3d1612bd42e9ee606d89386cae456dd165c
+
+commit 4a1b46e6d032608b7ec00ae51c4e25b82f460b05
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri May 29 04:25:40 2020 +0000
+
+ upstream: Allow some keywords to expand shell-style ${ENV}
+
+ environment variables on the client side. The supported keywords are
+ CertificateFile, ControlPath, IdentityAgent and IdentityFile, plus
+ LocalForward and RemoteForward when used for Unix domain socket paths. This
+ would for example allow forwarding of Unix domain socket paths that change at
+ runtime. bz#3140, ok djm@
+
+ OpenBSD-Commit-ID: a4a2e801fc2d4df2fe0e58f50d9c81b03822dffa
+
+commit c9bab1d3a9e183cef3a3412f57880a0374cc8cb2
+Author: Damien Miller <djm@mindrot.org>
+Date: Fri May 29 14:49:16 2020 +1000
depend
-commit b6d251ed9af90e16c08a72c4aac2cb8ace8f94b1
+commit 0b0d219313bf9239ca043f20b1a095db0245588f
+Author: sobrado <sobrado@openbsd.org>
+Date: Thu Sep 3 23:06:28 2015 +0000
+
+ partial sync of regress/netcat.c with upstream
+
+ synchronize synopsis and usage.
+
+commit 0f04c8467f589f85a523e19fd684c4f6c4ed9482
+Author: chl <chl@openbsd.org>
+Date: Sun Jul 26 19:12:28 2015 +0000
+
+ partial sync of regress/netcat.c with upstream
+
+ remove unused variable
+
+ ok tedu@
+
+commit d6a81050ace2630b06c3c6dd39bb4eef5d1043f8
+Author: tobias <tobias@openbsd.org>
+Date: Thu Mar 26 21:22:50 2015 +0000
+
+ partial sync of regress/netcat.c with upstream
+
+ The code in socks.c writes multiple times in a row to a socket. If the socket becomes invalid between these calls (e.g. connection closed), write will throw SIGPIPE. With this patch, SIGPIPE is ignored so we can handle write's -1 return value (errno will be EPIPE). Ultimately, it leads to program exit, too -- but with nicer error message. :)
+
+ with input by and ok djm
+
+commit bf3893dddd35e16def04bf48ed2ee1ad695b8f82
+Author: tobias <tobias@openbsd.org>
+Date: Thu Mar 26 10:36:03 2015 +0000
+
+ partial sync of regress/netcat.c with upstream
+
+ Check for short writes in fdpass(). Clean up while at it.
+
+ ok djm
+
+commit e18435fec124b4c08eb6bbbbee9693dc04f4befb
+Author: jca <jca@openbsd.org>
+Date: Sat Feb 14 22:40:22 2015 +0000
+
+ partial sync of regress/netcat.c with upstream
+
+ Support for nc -T on IPv6 addresses.
+
+ ok sthen@
+
+commit 4c607244054a036ad3b2449a6cb4c15feb846a76
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri May 29 03:14:02 2020 +0000
+
+ upstream: fix compilation on !HAVE_DLOPEN platforms; stub function
+
+ was not updated to match API change. From Dale Rahn via beck@ ok markus@
+
+ OpenBSD-Commit-ID: 2b8d054afe34c9ac85e417dae702ef981917b836
+
+commit 224418cf55611869a4ace1b8b07bba0dff77a9c3
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri May 29 03:11:54 2020 +0000
+
+ upstream: fix exit status for downloading of FIDO resident keys;
+
+ from Pedro Martelletto, ok markus@
+
+ OpenBSD-Commit-ID: 0da77dc24a1084798eedd83c39a002a9d231faef
+
+commit 1001dd148ed7c57bccf56afb40cb77482ea343a6
+Author: dtucker@openbsd.org <dtucker@openbsd.org>
+Date: Fri May 29 01:20:46 2020 +0000
+
+ upstream: Fix multiplier in convtime when handling seconds after
+
+ other units. bz#3171, spotted by ronf at timeheart.net, ok djm@.
+
+ OpenBSD-Commit-ID: 95b7a848e1083974a65fbb6ccb381d438e1dd5be
+
+commit 7af1e92cd289b7eaa9a683e9a6f2fddd98f37a01
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Wed May 27 22:37:53 2020 +0000
+
+ upstream: fix Include before Match in sshd_config; bz#3122 patch
+
+ from Jakub Jelen
+
+ OpenBSD-Commit-ID: 1b0aaf135fe6732b5d326946042665dd3beba5f4
+
+commit 0a9a611619b0a1fecd0195ec86a9885f5d681c84
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Wed May 27 21:59:11 2020 +0000
+
+ upstream: Do not call process_queued_listen_addrs() for every
+
+ included file from sshd_config; patch from Jakub Jelen
+
+ OpenBSD-Commit-ID: 0ff603d6f06a7fab4881f12503b53024799d0a49
+
+commit 16ea1fdbe736648f79a827219134331f8d9844fb
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Wed May 27 21:25:18 2020 +0000
+
+ upstream: fix crash in recallocarray when deleting SendEnv
+
+ variables; spotted by & ok sthen@
+
+ OpenBSD-Commit-ID: b881e8e849edeec5082b5c0a87d8d7cff091a8fd
+
+commit 47adfdc07f4f8ea0064a1495500244de08d311ed
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Wed May 27 22:35:19 2020 +0000
+
+ upstream: two new tests for Include in sshd_config, checking whether
+
+ Port directives are processed correctly and handling of Include directives
+ that appear before Match. Both tests currently fail. bz#3122 and bz#3169 -
+ patch from Jakub Jelen
+
+ OpenBSD-Regress-ID: 8ad5a4a385a63f0a1c59c59c763ff029b45715df
+
+commit 47faad8f794516c33864d866aa1b55d88416f94c
+Author: Darren Tucker <dtucker@dtucker.net>
+Date: Wed May 27 23:26:23 2020 +1000
+
+ Document that libfido2 >= 1.4.0 is needed.
+
+commit 4be563994c0cbe9856e7dd3078909f41beae4a9c
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Tue May 26 01:59:46 2020 +0000
+
+ upstream: fix memleak of signature; from Pedro Martelletto
+
+ OpenBSD-Commit-ID: d0a6eb07e77c001427d738b220dd024ddc64b2bb
+
+commit 0c111eb84efba7c2a38b2cc3278901a0123161b9
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Tue May 26 01:26:58 2020 +0000
+
+ upstream: Restrict ssh-agent from signing web challenges for FIDO
+
+ keys.
+
+ When signing messages in ssh-agent using a FIDO key that has an
+ application string that does not start with "ssh:", ensure that the
+ message being signed is one of the forms expected for the SSH protocol
+ (currently pubkey authentication and sshsig signatures).
+
+ This prevents ssh-agent forwarding on a host that has FIDO keys
+ attached granting the ability for the remote side to sign challenges
+ for web authentication using those keys too.
+
+ Note that the converse case of web browsers signing SSH challenges is
+ already precluded because no web RP can have the "ssh:" prefix in the
+ application string that we require.
+
+ ok markus@
+
+ OpenBSD-Commit-ID: 9ab6012574ed0352d2f097d307f4a988222d1b19
+
+commit 9c5f64b6cb3a68b99915202d318b842c6c76cf14
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Tue May 26 01:09:05 2020 +0000
+
+ upstream: improve logging for MaxStartups connection throttling:
+
+ have sshd log when it starts and stops throttling and periodically while in
+ this state. bz#3055 ok markus@
+
+ OpenBSD-Commit-ID: 2e07a09a62ab45d790d3d2d714f8cc09a9ac7ab9
+
+commit 756c6f66aee83a5862a6f936a316f761532f3320
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Tue May 26 01:06:52 2020 +0000
+
+ upstream: add fmt_timeframe() (from bgpd) to format a time
+
+ interval in a human- friendly format. Switch copyright for this file from BSD
+ to MIT to make it easier to add Henning's copyright for this function. ok
+ markus@
+
+ OpenBSD-Commit-ID: 414a831c662df7e68893e5233e86f2cac081ccf9
+
+commit 2a63ce5cd6d0e782783bf721462239b03757dd49
Author: djm@openbsd.org <djm@openbsd.org>
Date: Mon May 18 04:29:35 2020 +0000
@@ -12,6 +1677,117 @@ Date: Mon May 18 04:29:35 2020 +0000
OpenBSD-Commit-ID: e6099c3fbb70aa67eb106e84d8b43f1fa919b721
+commit 4b307faf2fb0e63e51a550b37652f7f972df9676
+Author: markus@openbsd.org <markus@openbsd.org>
+Date: Fri May 15 08:34:03 2020 +0000
+
+ upstream: sshd listener must not block if reexecd sshd exits
+
+ in write(2) on config_s[0] if the forked child exits early before finishing
+ recv_rexec_state (e.g. with fatal()) because config_s[1] stays open in the
+ parent. this prevents the parent from accepting new connections. ok djm,
+ deraadt
+
+ OpenBSD-Commit-ID: 92ccfeb939ccd55bda914dc3fe84582158c4a9ef
+
+commit af8b16fb2cce880341c0ee570ceb0d84104bdcc0
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri May 15 03:57:33 2020 +0000
+
+ upstream: fix off-by-one error that caused sftp downloads to make
+
+ one more concurrent request that desired. This prevented using sftp(1) in
+ unpipelined request/response mode, which is useful when debugging. Patch from
+ Stephen Goetze in bz#3054
+
+ OpenBSD-Commit-ID: 41b394ebe57037dbc43bdd0eef21ff0511191f28
+
+commit d7d753e2979f2d3c904b03a08d30856cd2a6e892
+Author: deraadt@openbsd.org <deraadt@openbsd.org>
+Date: Wed May 13 22:38:41 2020 +0000
+
+ upstream: we are still aiming for pre-C99 ...
+
+ OpenBSD-Commit-ID: a240fc9cbe60bc4e6c3d24d022eb4ab01fe1cb38
+
+commit 2ad7b7e46408dbebf2a4efc4efd75a9544197d57
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Wed May 13 10:08:02 2020 +0000
+
+ upstream: Enable credProtect extension when generating a resident
+
+ key.
+
+ The FIDO 2.1 Client to Authenticator Protocol introduced a "credProtect"
+ feature to better protect resident keys. This option allows (amone other
+ possibilities) requiring a PIN prior to all operations that may retrieve
+ the key handle.
+
+ Patch by Pedro Martelletto; ok djm and markus
+
+ OpenBSD-Commit-ID: 013bc06a577dcaa66be3913b7f183eb8cad87e73
+
+commit 1e70dc3285fc9b4f6454975acb81e8702c23dd89
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Wed May 13 09:57:17 2020 +0000
+
+ upstream: always call fido_init(); previous behaviour only called
+
+ fido_init() when SK_DEBUG was defined. Harmless with current libfido2, but
+ this isn't guaranteed in the future.
+
+ OpenBSD-Commit-ID: c7ea20ff2bcd98dd12015d748d3672d4f01f0864
+
+commit f2d84f1b3fa68d77c99238d4c645d0266fae2a74
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Wed May 13 09:55:57 2020 +0000
+
+ upstream: preserve group/world read permission on known_hosts
+
+ file across runs of "ssh-keygen -Rf /path". The old behaviour was to remove
+ all rights for group/other. bz#3146 ok dtucker@
+
+ OpenBSD-Commit-ID: dc369d0e0b5dd826430c63fd5f4b269953448a8a
+
+commit 05a651400da6fbe12296c34e3d3bcf09f034fbbf
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Wed May 13 09:52:41 2020 +0000
+
+ upstream: when ordering the hostkey algorithms to request from a
+
+ server, prefer certificate types if the known_hosts files contain a key
+ marked as a @cert-authority; bz#3157 ok markus@
+
+ OpenBSD-Commit-ID: 8f194573e5bb7c01b69bbfaabc68f27c9fa5e0db
+
+commit 829451815ec207e14bd54ff5cf7e22046816f042
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Tue May 12 01:41:32 2020 +0000
+
+ upstream: fix non-ASCII quote that snuck in; spotted by Gabriel
+
+ Kihlman
+
+ OpenBSD-Commit-ID: 04bcde311de2325d9e45730c744c8de079b49800
+
+commit 5a442cec92c0efd6fffb4af84bf99c70af248ef3
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Mon May 11 02:11:29 2020 +0000
+
+ upstream: clarify role of FIDO tokens in multi-factor
+
+ authentictation; mostly from Pedro Martelletto
+
+ OpenBSD-Commit-ID: fbe05685a1f99c74b1baca7130c5a03c2df7c0ac
+
+commit ecb2c02d994b3e21994f31a70ff911667c262f1f
+Author: djm@openbsd.org <djm@openbsd.org>
+Date: Fri May 8 05:13:14 2020 +0000
+
+ upstream: fix compilation with DEBUG_KEXDH; bz#3160 ok dtucker@
+
+ OpenBSD-Commit-ID: 832e771948fb45f2270e8b8895aac36d176ba17a
+
commit 3ab6fccc3935e9b778ff52f9c8d40f215d58e01d
Author: Damien Miller <djm@mindrot.org>
Date: Thu May 14 12:22:09 2020 +1000
@@ -10714,1964 +12490,3 @@ Date: Tue Oct 2 12:40:07 2018 +0000
ok markus@ dtucker@
OpenBSD-Commit-ID: 4bea826f575862eaac569c4bedd1056a268be1c3
-
-commit dba50258333f2604a87848762af07ba2cc40407a
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 26 07:32:44 2018 +0000
-
- upstream: remove big ugly TODO comment from start of file. Some of
-
- the mentioned tasks are obsolete and, of the remainder, most are already
- captured in PROTOCOL.mux where they better belong
-
- OpenBSD-Commit-ID: 16d9d76dee42a5bb651c9d6740f7f0ef68aeb407
-
-commit 92b61a38ee9b765f5049f03cd1143e13f3878905
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 26 07:30:05 2018 +0000
-
- upstream: Document mux proxy mode; added by Markus in openssh-7.4
-
- Also add a little bit of information about the overall packet format
-
- OpenBSD-Commit-ID: bdb6f6ea8580ef96792e270cae7857786ad84a95
-
-commit 9d883a1ce4f89b175fd77405ff32674620703fb2
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 26 01:48:57 2018 +0000
-
- upstream: s/process_mux_master/mux_master_process/ in mux master
-
- function names,
-
- Gives better symmetry with the existing mux_client_*() names and makes
- it more obvious when a message comes from the master vs client (they
- are interleved in ControlMaster=auto mode).
-
- no functional change beyond prefixing a could of log messages with
- __func__ where they were previously lacking.
-
- OpenBSD-Commit-ID: b01f7c3fdf92692e1713a822a89dc499333daf75
-
-commit c2fa53cd6462da82d3a851dc3a4a3f6b920337c8
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Sat Sep 22 14:41:24 2018 +1000
-
- Remove unused variable in _ssh_compat_fflush.
-
-commit d1b3540c21212624af907488960d703c7d987b42
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Thu Sep 20 18:08:43 2018 +1000
-
- Import updated moduli.
-
-commit b5e412a8993ad17b9e1141c78408df15d3d987e1
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Sep 21 12:46:22 2018 +0000
-
- upstream: Allow ssh_config ForwardX11Timeout=0 to disable the
-
- timeout and allow X11 connections in untrusted mode indefinitely. ok dtucker@
-
- OpenBSD-Commit-ID: ea1ceed3f540b48e5803f933e59a03b20db10c69
-
-commit cb24d9fcc901429d77211f274031653476864ec6
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Sep 21 12:23:17 2018 +0000
-
- upstream: when compiled with GSSAPI support, cache supported method
-
- OIDs by calling ssh_gssapi_prepare_supported_oids() regardless of whether
- GSSAPI authentication is enabled in the main config.
-
- This avoids sandbox violations for configurations that enable GSSAPI
- auth later, e.g.
-
- Match user djm
- GSSAPIAuthentication yes
-
- bz#2107; ok dtucker@
-
- OpenBSD-Commit-ID: a5dd42d87c74e27cfb712b15b0f97ab20e0afd1d
-
-commit bbc8af72ba68da014d4de6e21a85eb5123384226
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Sep 21 12:20:12 2018 +0000
-
- upstream: In sshkey_in_file(), ignore keys that are considered for
-
- being too short (i.e. SSH_ERR_KEY_LENGTH). These keys will not be considered
- to be "in the file". This allows key revocation lists to contain short keys
- without the entire revocation list being considered invalid.
-
- bz#2897; ok dtucker
-
- OpenBSD-Commit-ID: d9f3d857d07194a42ad7e62889a74dc3f9d9924b
-
-commit 383a33d160cefbfd1b40fef81f72eadbf9303a66
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Sep 21 03:11:36 2018 +0000
-
- upstream: Treat connections with ProxyJump specified the same as ones
-
- with a ProxyCommand set with regards to hostname canonicalisation (i.e. don't
- try to canonicalise the hostname unless CanonicalizeHostname is set to
- 'always').
-
- Patch from Sven Wegener via bz#2896
-
- OpenBSD-Commit-ID: 527ff501cf98bf65fb4b29ed0cb847dda10f4d37
-
-commit 0cbed248ed81584129b67c348dbb801660f25a6a
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Sep 20 23:40:16 2018 +0000
-
- upstream: actually make CASignatureAlgorithms available as a config
-
- option
-
- OpenBSD-Commit-ID: 93fa7ff58314ed7b1ab7744090a6a91232e6ae52
-
-commit 62528870c0ec48cd86a37dd7320fb85886c3e6ee
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Thu Sep 20 08:07:03 2018 +0000
-
- upstream: Import updated moduli.
-
- OpenBSD-Commit-ID: 04431e8e7872f49a2129bf080a6b73c19d576d40
-
-commit e6933a2ffa0659d57f3c7b7c457b2c62b2a84613
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date: Thu Sep 20 06:58:48 2018 +0000
-
- upstream: reorder CASignatureAlgorithms, and add them to the
-
- various -o lists; ok djm
-
- OpenBSD-Commit-ID: ecb88baecc3c54988b4d1654446ea033da359288
-
-commit aa083aa9624ea7b764d5a81c4c676719a1a3e42b
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Sep 20 03:31:49 2018 +0000
-
- upstream: fix "ssh -Q sig" to show correct signature algorithm list
-
- (it was erroneously showing certificate algorithms); prompted by markus@
-
- OpenBSD-Commit-ID: 1cdee002f2f0c21456979deeb887fc889afb154d
-
-commit ecac7e1f7add6b28874959a11f2238d149dc2c07
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Sep 20 03:30:44 2018 +0000
-
- upstream: add CASignatureAlgorithms option for the client, allowing
-
- it to specify which signature algorithms may be used by CAs when signing
- certificates. Useful if you want to ban RSA/SHA1; ok markus@
-
- OpenBSD-Commit-ID: 9159e5e9f67504829bf53ff222057307a6e3230f
-
-commit 86e5737c39153af134158f24d0cab5827cbd5852
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Sep 20 03:28:06 2018 +0000
-
- upstream: Add sshd_config CASignatureAlgorithms option to allow
-
- control over which signature algorithms a CA may use when signing
- certificates. In particular, this allows a sshd to ban certificates signed
- with RSA/SHA1.
-
- ok markus@
-
- OpenBSD-Commit-ID: b05c86ef8b52b913ed48d54a9b9c1a7714d96bac
-
-commit f80e68ea7d62e2dfafc12f1a60ab544ae4033a0f
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 19 02:03:02 2018 +0000
-
- upstream: Make "ssh-add -q" do what it says on the tin: silence
-
- output from successful operations.
-
- Based on patch from Thijs van Dijk; ok dtucker@ deraadt@
-
- OpenBSD-Commit-ID: c4f754ecc055c10af166116ce7515104aa8522e1
-
-commit 5e532320e9e51de720d5f3cc2596e95d29f6e98f
-Author: millert@openbsd.org <millert@openbsd.org>
-Date: Mon Sep 17 15:40:14 2018 +0000
-
- upstream: When choosing a prime from the moduli file, avoid
-
- re-using the linenum variable for something that is not a line number to
- avoid the confusion that resulted in the bug in rev. 1.64. This also lets us
- pass the actual linenum to parse_prime() so the error messages include the
- correct line number. OK markus@ some time ago.
-
- OpenBSD-Commit-ID: 4d8e5d3e924d6e8eb70053e3defa23c151a00084
-
-commit cce8cbe0ed7d1ba3a575310e0b63c193326ae616
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Sat Sep 15 19:44:06 2018 +1000
-
- Fix openssl-1.1 fallout for --without-openssl.
-
- ok djm@
-
-commit 149519b9f201dac755f3cba4789f4d76fecf0ee1
-Author: Damien Miller <djm@mindrot.org>
-Date: Sat Sep 15 19:37:48 2018 +1000
-
- add futex(2) syscall to seccomp sandbox
-
- Apparently needed for some glibc/openssl combinations.
-
- Patch from Arkadiusz Miśkiewicz
-
-commit 4488ae1a6940af704c4dbf70f55bf2f756a16536
-Author: Damien Miller <djm@mindrot.org>
-Date: Sat Sep 15 19:36:55 2018 +1000
-
- really add source for authopt_fuzz this time
-
-commit 9201784b4a257c8345fbd740bcbdd70054885707
-Author: Damien Miller <djm@mindrot.org>
-Date: Sat Sep 15 19:35:40 2018 +1000
-
- remove accidentally checked-in authopt_fuzz binary
-
-commit beb9e522dc7717df08179f9e59f36b361bfa14ab
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Sep 14 05:26:27 2018 +0000
-
- upstream: second try, deals properly with missing and private-only
-
- Use consistent format in debug log for keys readied, offered and
- received during public key authentication.
-
- This makes it a little easier to see what is going on, as each message
- now contains (where available) the key filename, its type and fingerprint,
- and whether the key is hosted in an agent or a token.
-
- OpenBSD-Commit-ID: f1c6a8e9cfc4e108c359db77f24f9a40e1e25ea7
-
-commit 6bc5a24ac867bfdc3ed615589d69ac640f51674b
-Author: Damien Miller <djm@mindrot.org>
-Date: Fri Sep 14 15:16:34 2018 +1000
-
- fuzzer harness for authorized_keys option parsing
-
-commit 6c8b82fc6929b6a9a3f645151b6ec26c5507d9ef
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Sep 14 04:44:04 2018 +0000
-
- upstream: revert following; deals badly with agent keys
-
- revision 1.285
- date: 2018/09/14 04:17:12; author: djm; state: Exp; lines: +47 -26; commitid: lflGFcNb2X2HebaK;
- Use consistent format in debug log for keys readied, offered and
- received during public key authentication.
-
- This makes it a little easier to see what is going on, as each message
- now contains the key filename, its type and fingerprint, and whether
- the key is hosted in an agent or a token.
-
- OpenBSD-Commit-ID: e496bd004e452d4b051f33ed9ae6a54ab918f56d
-
-commit 6da046f9c3374ce7e269ded15d8ff8bc45017301
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Sep 14 04:17:44 2018 +0000
-
- upstream: garbage-collect moribund ssh_new_private() API.
-
- OpenBSD-Commit-ID: 7c05bf13b094093dfa01848a9306c82eb6e95f6c
-
-commit 1f24ac5fc05252ceb1c1d0e8cab6a283b883c780
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Sep 14 04:17:12 2018 +0000
-
- upstream: Use consistent format in debug log for keys readied,
-
- offered and received during public key authentication.
-
- This makes it a little easier to see what is going on, as each message
- now contains the key filename, its type and fingerprint, and whether
- the key is hosted in an agent or a token.
-
- OpenBSD-Commit-ID: 2a01d59285a8a7e01185bb0a43316084b4f06a1f
-
-commit 488c9325bb7233e975dbfbf89fa055edc3d3eddc
-Author: millert@openbsd.org <millert@openbsd.org>
-Date: Thu Sep 13 15:23:32 2018 +0000
-
- upstream: Fix warnings caused by user_from_uid() and group_from_gid()
-
- now returning const char *.
-
- OpenBSD-Commit-ID: b5fe571ea77cfa7b9035062829ab05eb87d7cc6f
-
-commit 0aa1f230846ebce698e52051a107f3127024a05a
-Author: Damien Miller <djm@mindrot.org>
-Date: Fri Sep 14 10:31:47 2018 +1000
-
- allow SIGUSR1 as synonym for SIGINFO
-
- Lets users on those unfortunate operating systems that lack SIGINFO
- still be able to obtain progress information from unit tests :)
-
-commit d64e78526596f098096113fcf148216798c327ff
-Author: Damien Miller <djm@mindrot.org>
-Date: Thu Sep 13 19:05:48 2018 +1000
-
- add compat header
-
-commit a3fd8074e2e2f06602e25618721f9556c731312c
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Sep 13 09:03:20 2018 +0000
-
- upstream: missed a bit of openssl-1.0.x API in this unittest
-
- OpenBSD-Regress-ID: a73a54d7f7381856a3f3a2d25947bee7a9a5dbc9
-
-commit 86e0a9f3d249d5580390daf58e015e68b01cef10
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Sep 13 05:06:51 2018 +0000
-
- upstream: use only openssl-1.1.x API here too
-
- OpenBSD-Regress-ID: ae877064597c349954b1b443769723563cecbc8f
-
-commit 48f54b9d12c1c79fba333bc86d455d8f4cda8cfc
-Author: Damien Miller <djm@mindrot.org>
-Date: Thu Sep 13 12:13:50 2018 +1000
-
- adapt -portable to OpenSSL 1.1x API
-
- Polyfill missing API with replacement functions extracted from LibreSSL
-
-commit 86112951d63d48839f035b5795be62635a463f99
-Author: Damien Miller <djm@mindrot.org>
-Date: Thu Sep 13 12:12:42 2018 +1000
-
- forgot to stage these test files in commit d70d061
-
-commit 482d23bcacdd3664f21cc82a5135f66fc598275f
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Sep 13 02:08:33 2018 +0000
-
- upstream: hold our collective noses and use the openssl-1.1.x API in
-
- OpenSSH; feedback and ok tb@ jsing@ markus@
-
- OpenBSD-Commit-ID: cacbcac87ce5da0d3ca7ef1b38a6f7fb349e4417
-
-commit d70d061828730a56636ab6f1f24fe4a8ccefcfc1
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 12 01:36:45 2018 +0000
-
- upstream: Include certs with multiple RSA signature variants in
-
- test data Ensure that cert->signature_key is populated correctly
-
- OpenBSD-Regress-ID: 56e68f70fe46cb3a193ca207385bdb301fd6603a
-
-commit f803b2682992cfededd40c91818b653b5d923ef5
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 12 01:23:48 2018 +0000
-
- upstream: test revocation by explicit hash and by fingerprint
-
- OpenBSD-Regress-ID: 079c18a9ab9663f4af419327c759fc1e2bc78fd8
-
-commit 2de78bc7da70e1338b32feeefcc6045cf49efcd4
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 12 01:22:43 2018 +0000
-
- upstream: s/sshkey_demote/sshkey_from_private/g
-
- OpenBSD-Regress-ID: 782bde7407d94a87aa8d1db7c23750e09d4443c4
-
-commit 41c115a5ea1cb79a6a3182773c58a23f760e8076
-Author: Damien Miller <djm@mindrot.org>
-Date: Wed Sep 12 16:50:01 2018 +1000
-
- delete the correct thing; kexfuzz binary
-
-commit f0fcd7e65087db8c2496f13ed39d772f8e38b088
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 12 06:18:59 2018 +0000
-
- upstream: fix edit mistake; spotted by jmc@
-
- OpenBSD-Commit-ID: dd724e1c52c9d6084f4cd260ec7e1b2b138261c6
-
-commit 4cc259bac699f4d2a5c52b92230f9e488c88a223
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 12 01:34:02 2018 +0000
-
- upstream: add SSH_ALLOWED_CA_SIGALGS - the default list of
-
- signature algorithms that are allowed for CA signatures. Notably excludes
- ssh-dsa.
-
- ok markus@
-
- OpenBSD-Commit-ID: 1628e4181dc8ab71909378eafe5d06159a22deb4
-
-commit ba9e788315b1f6a350f910cb2a9e95b2ce584e89
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 12 01:32:54 2018 +0000
-
- upstream: add sshkey_check_cert_sigtype() that checks a
-
- cert->signature_type against a supplied whitelist; ok markus
-
- OpenBSD-Commit-ID: caadb8073292ed7a9535e5adc067d11d356d9302
-
-commit a70fd4ad7bd9f2ed223ff635a3d41e483057f23b
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 12 01:31:30 2018 +0000
-
- upstream: add cert->signature_type field and keep it in sync with
-
- certificate signature wrt loading and certification operations; ok markus@
-
- OpenBSD-Commit-ID: e8b8b9f76b66707a0cd926109c4383db8f664df3
-
-commit 357128ac48630a9970e3af0e6ff820300a28da47
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 12 01:30:10 2018 +0000
-
- upstream: Add "ssh -Q sig" to allow listing supported signature
-
- algorithms ok markus@
-
- OpenBSD-Commit-ID: 7a8c6eb6c249dc37823ba5081fce64876d10fe2b
-
-commit 9405c6214f667be604a820c6823b27d0ea77937d
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 12 01:21:34 2018 +0000
-
- upstream: allow key revocation by SHA256 hash and allow ssh-keygen
-
- to create KRLs using SHA256/base64 key fingerprints; ok markus@
-
- OpenBSD-Commit-ID: a0590fd34e7f1141f2873ab3acc57442560e6a94
-
-commit 50e2687ee0941c0ea216d6ffea370ffd2c1f14b9
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Sep 12 01:19:12 2018 +0000
-
- upstream: log certificate fingerprint in authentication
-
- success/failure message (previously we logged only key ID and CA key
- fingerprint).
-
- ok markus@
-
- OpenBSD-Commit-ID: a8ef2d172b7f1ddbcce26d6434b2de6d94f6c05d
-
-commit de37ca909487d23e5844aca289b3f5e75d3f1e1f
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Fri Sep 7 04:26:56 2018 +0000
-
- upstream: Add FALLTHROUGH comments where appropriate. Patch from
-
- jjelen at redhat via bz#2687.
-
- OpenBSD-Commit-ID: c48eb457be697a19d6d2950c6d0879f3ccc851d3
-
-commit 247766cd3111d5d8c6ea39833a3257ca8fb820f2
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Sep 7 01:42:54 2018 +0000
-
- upstream: ssh -MM requires confirmation for all operations that
-
- change the multiplexing state, not just new sessions.
-
- mention that confirmation is checked via ssh-askpass
-
- OpenBSD-Commit-ID: 0f1b45551ebb9cc5c9a4fe54ad3b23ce90f1f5c2
-
-commit db8bb80e3ac1bcb3e1305d846cd98c6b869bf03f
-Author: mestre@openbsd.org <mestre@openbsd.org>
-Date: Tue Aug 28 12:25:53 2018 +0000
-
- upstream: fix misplaced parenthesis inside if-clause. it's harmless
-
- and the only issue is showing an unknown error (since it's not defined)
- during fatal(), if it ever an error occurs inside that condition.
-
- OK deraadt@ markus@ djm@
-
- OpenBSD-Commit-ID: acb0a8e6936bfbe590504752d01d1d251a7101d8
-
-commit 086cc614f550b7d4f100c95e472a6b6b823938ab
-Author: mestre@openbsd.org <mestre@openbsd.org>
-Date: Tue Aug 28 12:17:45 2018 +0000
-
- upstream: fix build with DEBUG_PK enabled
-
- OK dtucker@
-
- OpenBSD-Commit-ID: ec1568cf27726e9638a0415481c20c406e7b441c
-
-commit 2678833013e97f8b18f09779b7f70bcbf5eb2ab2
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Fri Sep 7 14:41:53 2018 +1000
-
- Handle ngroups>_SC_NGROUPS_MAX.
-
- Based on github pull request #99 from Darren Maffat at Oracle: Solaris'
- getgrouplist considers _SC_NGROUPS_MAX more of a guideline and can return
- a larger number of groups. In this case, retry getgrouplist with a
- larger array and defer allocating groups_byname. ok djm@
-
-commit 039bf2a81797b8f3af6058d34005a4896a363221
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Fri Sep 7 14:06:57 2018 +1000
-
- Initial len for the fmt=NULL case.
-
- Patch from jjelen at redhat via bz#2687. (OpenSSH never calls
- setproctitle with a null format so len is always initialized).
-
-commit ea9c06e11d2e8fb2f4d5e02f8a41e23d2bd31ca9
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Fri Sep 7 14:01:39 2018 +1000
-
- Include stdlib.h.
-
- Patch from jjelen at redhat via bz#2687.
-
-commit 9617816dbe73ec4d65075f4d897443f63a97c87f
-Author: Damien Miller <djm@mindrot.org>
-Date: Mon Aug 27 13:08:01 2018 +1000
-
- document some more regress control env variables
-
- Specifically SKIP_UNIT, USE_VALGRING and LTESTS. Sort the list of
- environment variables.
-
- Based on patch from Jakub Jelen
-
-commit 71508e06fab14bc415a79a08f5535ad7bffa93d9
-Author: Damien Miller <djm@mindrot.org>
-Date: Thu Aug 23 15:41:42 2018 +1000
-
- shorten temporary SSH_REGRESS_TMP path
-
- Previous path was exceeding max socket length on at least one platform (OSX)
-
-commit 26739cf5bdc9030a583b41ae5261dedd862060f0
-Author: Damien Miller <djm@mindrot.org>
-Date: Thu Aug 23 13:06:02 2018 +1000
-
- rebuild dependencies
-
-commit ff729025c7463cf5d0a8d1ca1823306e48c6d4cf
-Author: Damien Miller <djm@mindrot.org>
-Date: Thu Aug 23 13:03:32 2018 +1000
-
- fix path in distclean target
-
- Patch from Jakub Jelen
-
-commit 7fef173c28f7462dcd8ee017fdf12b5073f54c02
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Aug 23 03:01:08 2018 +0000
-
- upstream: memleak introduced in r1.83; from Colin Watson
-
- OpenBSD-Commit-ID: 5c019104c280cbd549a264a7217b67665e5732dc
-
-commit b8ae02a2896778b8984c7f51566c7f0f56fa8b56
-Author: schwarze@openbsd.org <schwarze@openbsd.org>
-Date: Tue Aug 21 13:56:27 2018 +0000
-
- upstream: AIX reports the CODESET as "ISO8859-1" in the POSIX locale.
-
- Treating that as a safe encoding is OK because even when other systems return
- that string for real ISO8859-1, it is still safe in the sense that it is
- ASCII-compatible and stateless.
-
- Issue reported by Val dot Baranov at duke dot edu. Additional
- information provided by Michael dot Felt at felt dot demon dot nl.
- Tested by Michael Felt on AIX 6.1 and by Val Baranov on AIX 7.1.
- Tweak and OK djm@.
-
- OpenBSD-Commit-ID: 36f1210e0b229817d10eb490d6038f507b8256a7
-
-commit bc44ee088ad269d232e514f037c87ada4c2fd3f0
-Author: Tim Rice <tim@multitalents.net>
-Date: Tue Aug 21 08:57:24 2018 -0700
-
- modified: openbsd-compat/port-uw.c
- remove obsolete and un-needed include
-
-commit 829fc28a9c54e3f812ee7248c7a3e31eeb4f0b3a
-Author: Damien Miller <djm@mindrot.org>
-Date: Mon Aug 20 15:57:29 2018 +1000
-
- Missing unistd.h for regress/mkdtemp.c
-
-commit c8313e492355a368a91799131520d92743d8d16c
-Author: Damien Miller <djm@mindrot.org>
-Date: Fri Aug 17 05:45:20 2018 +1000
-
- update version numbers in anticipation of release
-
-commit 477b49a34b89f506f4794b35e3c70b3e2e83cd38
-Author: Corinna Vinschen <vinschen@redhat.com>
-Date: Mon Aug 13 17:08:51 2018 +0200
-
- configure: work around GCC shortcoming on Cygwin
-
- Cygwin's latest 7.x GCC allows to specify -mfunction-return=thunk
- as well as -mindirect-branch=thunk on the command line, albeit
- producing invalid code, leading to an error at link stage.
-
- The check in configure.ac only checks if the option is present,
- but not if it produces valid code.
-
- This patch fixes it by special-casing Cygwin. Another solution
- may be to change these to linker checks.
-
- Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
-
-commit b0917945efa374be7648d67dbbaaff323ab39edc
-Author: Corinna Vinschen <vinschen@redhat.com>
-Date: Mon Aug 13 17:05:05 2018 +0200
-
- cygwin: add missing stdarg.h include
-
- Further header file standarization in Cygwin uncovered a lazy
- indirect include in bsd-cygwin_util.c
-
- Signed-off-by: Corinna Vinschen <vinschen@redhat.com>
-
-commit c3903c38b0fd168ab3d925c2b129d1a599593426
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Mon Aug 13 02:41:05 2018 +0000
-
- upstream: revert compat.[ch] section of the following change. It
-
- causes double-free under some circumstances.
-
- --
-
- date: 2018/07/31 03:07:24; author: djm; state: Exp; lines: +33 -18; commitid: f7g4UI8eeOXReTPh;
- fix some memory leaks spotted by Coverity via Jakub Jelen in bz#2366
- feedback and ok dtucker@
-
- OpenBSD-Commit-ID: 1e77547f60fdb5e2ffe23e2e4733c54d8d2d1137
-
-commit 1b9dd4aa15208100fbc3650f33ea052255578282
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Sun Aug 12 20:19:13 2018 +0000
-
- upstream: better diagnosics on alg list assembly errors; ok
-
- deraadt@ markus@
-
- OpenBSD-Commit-ID: 5a557e74b839daf13cc105924d2af06a1560faee
-
-commit e36a5f61b0f5bebf6d49c215d228cd99dfe86e28
-Author: Damien Miller <djm@mindrot.org>
-Date: Sat Aug 11 18:08:45 2018 -0700
-
- Some AIX fixes; report from Michael Felt
-
-commit 2f4766ceefe6657c5ad5fe92d13c411872acae0e
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Fri Aug 10 01:35:49 2018 +0000
-
- upstream: The script that cooks up PuTTY format host keys does not
-
- understand the new key format so convert back to old format to create the
- PuTTY key and remove it once done.
-
- OpenBSD-Regress-ID: 2a449a18846c3a144bc645135b551ba6177e38d3
-
-commit e1b26ce504662a5d5b991091228984ccfd25f280
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Aug 10 00:44:01 2018 +0000
-
- upstream: improve
-
- OpenBSD-Commit-ID: 40d839db0977b4e7ac8b647b16d5411d4faf2f60
-
-commit 7c712966a3139622f7fb55045368d05de4e6782c
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Aug 10 00:42:29 2018 +0000
-
- upstream: Describe pubkey format, prompted by bz#2853
-
- While I'm here, describe and link to the remaining local PROTOCOL.*
- docs that weren't already mentioned (PROTOCOL.key, PROTOCOL.krl and
- PROTOCOL.mux)
-
- OpenBSD-Commit-ID: 2a900f9b994ba4d53e7aeb467d44d75829fd1231
-
-commit ef100a2c5a8ed83afac0b8f36520815803da227a
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Aug 10 00:27:15 2018 +0000
-
- upstream: fix numbering
-
- OpenBSD-Commit-ID: bc7a1764dff23fa4c5ff0e3379c9c4d5b63c9596
-
-commit ed7bd5d93fe14c7bd90febd29b858ea985d14d45
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Aug 8 01:16:01 2018 +0000
-
- upstream: Use new private key format by default. This format is
-
- suported by OpenSSH >= 6.5 (released January 2014), so it should be supported
- by most OpenSSH versions in active use.
-
- It is possible to convert new-format private keys to the older
- format using "ssh-keygen -f /path/key -pm PEM".
-
- ok deraadt dtucker
-
- OpenBSD-Commit-ID: e3bd4f2509a2103bfa2f710733426af3ad6d8ab8
-
-commit 967226a1bdde59ea137e8f0df871854ff7b91366
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Sat Aug 4 00:55:06 2018 +0000
-
- upstream: invalidate dh->priv_key after freeing it in error path;
-
- avoids unlikely double-free later. Reported by Viktor Dukhovni via
- https://github.com/openssh/openssh-portable/pull/96 feedback jsing@ tb@
-
- OpenBSD-Commit-ID: e317eb17c3e05500ae851f279ef6486f0457c805
-
-commit 74287f5df9966a0648b4a68417451dd18f079ab8
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jul 31 03:10:27 2018 +0000
-
- upstream: delay bailout for invalid authentic
-
- =?UTF-8?q?ating=20user=20until=20after=20the=20packet=20containing=20the?=
- =?UTF-8?q?=20request=20has=20been=20fully=20parsed.=20Reported=20by=20Dar?=
- =?UTF-8?q?iusz=20Tytko=20and=20Micha=C5=82=20Sajdak;=20ok=20deraadt?=
- MIME-Version: 1.0
- Content-Type: text/plain; charset=UTF-8
- Content-Transfer-Encoding: 8bit
-
- OpenBSD-Commit-ID: b4891882fbe413f230fe8ac8a37349b03bd0b70d
-
-commit 1a66079c0669813306cc69e5776a4acd9fb49015
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jul 31 03:07:24 2018 +0000
-
- upstream: fix some memory leaks spotted by Coverity via Jakub Jelen
-
- in bz#2366 feedback and ok dtucker@
-
- OpenBSD-Commit-ID: 8402bbae67d578bedbadb0ce68ff7c5a136ef563
-
-commit 87f08be054b7eeadbb9cdeb3fb4872be79ccf218
-Author: Damien Miller <djm@mindrot.org>
-Date: Fri Jul 20 13:18:28 2018 +1000
-
- Remove support for S/Key
-
- Most people will 1) be using modern multi-factor authentication methods
- like TOTP/OATH etc and 2) be getting support for multi-factor
- authentication via PAM or BSD Auth.
-
-commit 5d14019ba2ff54acbfd20a6b9b96bb860a8c7c31
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Fri Jul 27 12:03:17 2018 +0000
-
- upstream: avoid expensive channel_open_message() calls; ok djm@
-
- OpenBSD-Commit-ID: aea3b5512ad681cd8710367d743e8a753d4425d9
-
-commit e655ee04a3cb7999dbf9641b25192353e2b69418
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Fri Jul 27 05:34:42 2018 +0000
-
- upstream: Now that ssh can't be setuid, remove the
-
- original_real_uid and original_effective_uid globals and replace with calls
- to plain getuid(). ok djm@
-
- OpenBSD-Commit-ID: 92561c0cd418d34e6841e20ba09160583e27b68c
-
-commit 73ddb25bae4c33a0db361ac13f2e3a60d7c6c4a5
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Fri Jul 27 05:13:02 2018 +0000
-
- upstream: Remove uid checks from low port binds. Now that ssh
-
- cannot be setuid and sshd always has privsep on, we can remove the uid checks
- for low port binds and just let the system do the check. We leave a sanity
- check for the !privsep case so long as the code is stil there. with & ok
- djm@
-
- OpenBSD-Commit-ID: 9535cfdbd1cd54486fdbedfaee44ce4367ec7ca0
-
-commit c12033e102760d043bc5c98e6c8180e4d331b0df
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Fri Jul 27 03:55:22 2018 +0000
-
- upstream: ssh(1) no longer supports being setuid root. Remove reference
-
- to crc32 which went with protocol 1. Pointed out by deraadt@.
-
- OpenBSD-Commit-ID: f8763c25fd96ed91dd1abdab5667fd2e27e377b6
-
-commit 4492e2ec4e1956a277ef507f51d66e5c2aafaaf8
-Author: Damien Miller <djm@mindrot.org>
-Date: Fri Jul 27 14:15:28 2018 +1000
-
- correct snprintf truncation check in closefrom()
-
- Truncation cannot happen unless the system has set PATH_MAX to some
- nonsensically low value.
-
- bz#2862, patch from Daniel Le
-
-commit 149cab325a8599a003364ed833f878449c15f259
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Fri Jul 27 13:46:06 2018 +1000
-
- Include stdarg.h in mkdtemp for va_list.
-
-commit 6728f31bdfdc864d192773c32465b1860e23f556
-Author: deraadt@openbsd.org <deraadt@openbsd.org>
-Date: Wed Jul 25 17:12:35 2018 +0000
-
- upstream: Don't redefine Makefile choices which come correct from
-
- bsd.*.mk ok markus
-
- OpenBSD-Commit-ID: 814b2f670df75759e1581ecef530980b2b3d7e0f
-
-commit 21fd477a855753c1a8e450963669e28e39c3b5d2
-Author: deraadt@openbsd.org <deraadt@openbsd.org>
-Date: Wed Jul 25 13:56:23 2018 +0000
-
- upstream: fix indent; Clemens Goessnitzer
-
- OpenBSD-Commit-ID: b5149a6d92b264d35f879d24608087b254857a83
-
-commit 8e433c2083db8664c41499ee146448ea7ebe7dbf
-Author: beck@openbsd.org <beck@openbsd.org>
-Date: Wed Jul 25 13:10:56 2018 +0000
-
- upstream: Use the caller provided (copied) pwent struct in
-
- load_public_identity_files instead of calling getpwuid() again and discarding
- the argument. This prevents a client crash where tilde_expand_filename calls
- getpwuid() again before the pwent pointer is used. Issue noticed and reported
- by Pierre-Olivier Martel <pom@apple.com> ok djm@ deraadt@
-
- OpenBSD-Commit-ID: a067d74b5b098763736c94cc1368de8ea3f0b157
-
-commit e2127abb105ae72b6fda64fff150e6b24b3f1317
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date: Mon Jul 23 19:53:55 2018 +0000
-
- upstream: oops, failed to notice that SEE ALSO got messed up;
-
- OpenBSD-Commit-ID: 61c1306542cefdc6e59ac331751afe961557427d
-
-commit ddf1b797c2d26bbbc9d410aa4f484cbe94673587
-Author: kn@openbsd.org <kn@openbsd.org>
-Date: Mon Jul 23 19:02:49 2018 +0000
-
- upstream: Point to glob in section 7 for the actual list of special
-
- characters instead the C API in section 3.
-
- OK millert jmc nicm, "the right idea" deraadt
-
- OpenBSD-Commit-ID: a74fd215488c382809e4d041613aeba4a4b1ffc6
-
-commit 01c98d9661d0ed6156e8602b650f72eed9fc4d12
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Sun Jul 22 12:16:59 2018 +0000
-
- upstream: Switch authorized_keys example from ssh-dss to ssh-rsa
-
- since the former is no longer enabled by default. Pointed out by Daniel A.
- Maierhofer, ok jmc
-
- OpenBSD-Commit-ID: 6a196cef53d7524e0c9b58cdbc1b5609debaf8c7
-
-commit 472269f8fe19343971c2d08f504ab5cbb8234b33
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jul 20 05:01:10 2018 +0000
-
- upstream: slightly-clearer description for AuthenticationMethods - the
-
- lists have comma-separated elements; bz#2663 from Hans Meier
-
- OpenBSD-Commit-ID: 931c983d0fde4764d0942fb2c2b5017635993b5a
-
-commit c59aca8adbdf7f5597084ad360a19bedb3f80970
-Author: Damien Miller <djm@mindrot.org>
-Date: Fri Jul 20 14:53:42 2018 +1000
-
- Create control sockets in clean temp directories
-
- Adds a regress/mkdtemp tool and uses it to create empty temp
- directories for tests needing control sockets.
-
- Patch from Colin Watson via bz#2660; ok dtucker
-
-commit 6ad8648e83e4f4ace37b742a05c2a6b6b872514e
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jul 20 03:46:34 2018 +0000
-
- upstream: remove unused zlib.h
-
- OpenBSD-Commit-ID: 8d274a9b467c7958df12668b49144056819f79f1
-
-commit 3ba6e6883527fe517b6e4a824876e2fe62af22fc
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Thu Jul 19 23:03:16 2018 +0000
-
- upstream: Fix typo in comment. From Alexandru Iacob via github.
-
- OpenBSD-Commit-ID: eff4ec07c6c8c5483533da43a4dda37d72ef7f1d
-
-commit c77bc73c91bc656e343a1961756e09dd1b170820
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Fri Jul 20 13:48:51 2018 +1000
-
- Explicitly include openssl before zlib.
-
- Some versions of OpenSSL have "free_func" in their headers, which zlib
- typedefs. Including openssl after zlib (eg via sshkey.h) results in
- "syntax error before `free_func'", which this fixes.
-
-commit 95d41e90eafcd1286a901e8e361e4a37b98aeb52
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Thu Jul 19 10:28:47 2018 +0000
-
- upstream: Deprecate UsePrivilegedPort now that support for running
-
- ssh(1) setuid has been removed, remove supporting code and clean up
- references to it in the man pages
-
- We have not shipped ssh(1) the setuid bit since 2002. If ayone
- really needs to make connections from a low port number this can
- be implemented via a small setuid ProxyCommand.
-
- ok markus@ jmc@ djm@
-
- OpenBSD-Commit-ID: d03364610b7123ae4c6792f5274bd147b6de717e
-
-commit 258dc8bb07dfb35a46e52b0822a2c5b7027df60a
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Wed Jul 18 11:34:04 2018 +0000
-
- upstream: Remove support for running ssh(1) setuid and fatal if
-
- attempted. Do not link uidwap.c into ssh any more. Neuters
- UsePrivilegedPort, which will be marked as deprecated shortly. ok markus@
- djm@
-
- OpenBSD-Commit-ID: c4ba5bf9c096f57a6ed15b713a1d7e9e2e373c42
-
-commit ac590760b251506b0a152551abbf8e8d6dc2f527
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Mon Jul 16 22:25:01 2018 +0000
-
- upstream: Slot 0 in the hostbased key array was previously RSA1,
-
- but that is now gone and the slot is unused so remove it. Remove two
- now-unused macros, and add an array bounds check to the two remaining ones
- (array is statically sized, so mostly a safety check on future changes). ok
- markus@
-
- OpenBSD-Commit-ID: 2e4c0ca6cc1d8daeccead2aa56192a3f9d5e1e7a
-
-commit 26efc2f5df0e3bcf6a6bbdd0506fd682d60c2145
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Mon Jul 16 11:05:41 2018 +0000
-
- upstream: Remove support for loading HostBasedAuthentication keys
-
- directly in ssh(1) and always use ssh-keysign. This removes one of the few
- remaining reasons why ssh(1) might be setuid. ok markus@
-
- OpenBSD-Commit-ID: 97f01e1448707129a20d75f86bad5d27c3cf0b7d
-
-commit 3eb7f1038d17af7aea3c2c62d1e30cd545607640
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Mon Jul 16 07:06:50 2018 +0000
-
- upstream: keep options.identity_file_userprovided array in sync when we
-
- load keys, fixing some spurious error messages; ok markus
-
- OpenBSD-Commit-ID: c63e3d5200ee2cf9e35bda98de847302566c6a00
-
-commit 2f131e1b34502aa19f345e89cabf6fa3fc097f09
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Mon Jul 16 03:09:59 2018 +0000
-
- upstream: memleak in unittest; found by valgrind
-
- OpenBSD-Regress-ID: 168c23b0fb09fc3d0b438628990d3fd9260a8a5e
-
-commit de2997a4cf22ca0a524f0e5b451693c583e2fd89
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Mon Jul 16 03:09:13 2018 +0000
-
- upstream: memleaks; found by valgrind
-
- OpenBSD-Commit-ID: 6c3ba22be53e753c899545f771e8399fc93cd844
-
-commit 61cc0003eb37fa07603c969c12b7c795caa498f3
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Sat Jul 14 16:49:01 2018 +1000
-
- Undef a few new macros in sys-queue.h.
-
- Prevents macro redefinition warnings on OSX.
-
-commit 30a2c213877a54a44dfdffb6ca8db70be5b457e0
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Fri Jul 13 13:40:20 2018 +1000
-
- Include unistd.h for geteuid declaration.
-
-commit 1dd32c23f2a85714dfafe2a9cc516971d187caa4
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Fri Jul 13 13:38:10 2018 +1000
-
- Fallout from buffer conversion in AUDIT_EVENTS.
-
- Supply missing "int r" and fix error path for sshbuf_new().
-
-commit 7449c178e943e5c4f6c8416a4e41d93b70c11c9e
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jul 13 02:13:50 2018 +0000
-
- upstream: make this use ssh_proxy rather than starting/stopping a
-
- daemon for each testcase
-
- OpenBSD-Regress-ID: 608b7655ea65b1ba8fff5a13ce9caa60ef0c8166
-
-commit dbab02f9208d9baa134cec1d007054ec82b96ca9
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jul 13 02:13:19 2018 +0000
-
- upstream: fix leaks in unit test; with this, all unit tests are
-
- leak free (as far as valgrind can spot anyway)
-
- OpenBSD-Regress-ID: b824d8b27998365379963440e5d18b95ca03aa17
-
-commit 2f6accff5085eb79b0dbe262d8b85ed017d1a51c
-Author: Damien Miller <djm@mindrot.org>
-Date: Fri Jul 13 11:39:25 2018 +1000
-
- Enable leak checks for unit tests with valgrind
-
- Leave the leak checking on unconditionally when running with valgrind.
- The unit tests are leak-free and I want them to stay that way.
-
-commit e46cfbd9db5e907b821bf4fd0184d4dab99815ee
-Author: Damien Miller <djm@mindrot.org>
-Date: Fri Jul 13 11:38:59 2018 +1000
-
- increase timeout to match cfgmatch.sh
-
- lets test pass under valgrind (on my workstation at least)
-
-commit 6aa1bf475cf3e7a2149acc5a1e80e904749f064c
-Author: Damien Miller <djm@mindrot.org>
-Date: Thu Jul 12 14:54:18 2018 +1000
-
- rm regress/misc/kexfuzz/*.o in distclean target
-
-commit eef1447ddb559c03725a23d4aa6d03f40e8b0049
-Author: Damien Miller <djm@mindrot.org>
-Date: Thu Jul 12 14:49:26 2018 +1000
-
- repair !WITH_OPENSSL build
-
-commit 4d3b2f36fd831941d1627ac587faae37b6d3570f
-Author: Damien Miller <djm@mindrot.org>
-Date: Thu Jul 12 14:49:14 2018 +1000
-
- missing headers
-
-commit 3f420a692b293921216549c1099c2e46ff284eae
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Thu Jul 12 14:57:46 2018 +1000
-
- Remove key.h from portable files too.
-
- Commit 5467fbcb removed key.h so stop including it in portable files
- too. Fixes builds on lots of platforms.
-
-commit e2c4af311543093f16005c10044f7e06af0426f0
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Jul 12 04:35:25 2018 +0000
-
- upstream: remove prototype to long-gone function
-
- OpenBSD-Commit-ID: 0414642ac7ce01d176b9f359091a66a8bbb640bd
-
-commit 394a842e60674bf8ee5130b9f15b01452a0b0285
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Wed Jul 11 18:55:11 2018 +0000
-
- upstream: treat ssh_packet_write_wait() errors as fatal; ok djm@
-
- OpenBSD-Commit-ID: f88ba43c9d54ed2d911218aa8d3f6285430629c3
-
-commit 5467fbcb09528ecdcb914f4f2452216c24796790
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Wed Jul 11 18:53:29 2018 +0000
-
- upstream: remove legacy key emulation layer; ok djm@
-
- OpenBSD-Commit-ID: 2b1f9619259e222bbd4fe9a8d3a0973eafb9dd8d
-
-commit 5dc4c59d5441a19c99e7945779f7ec9051126c25
-Author: martijn@openbsd.org <martijn@openbsd.org>
-Date: Wed Jul 11 08:19:35 2018 +0000
-
- upstream: s/wuth/with/ in comment
-
- OpenBSD-Commit-ID: 9de41468afd75f54a7f47809d2ad664aa577902c
-
-commit 1c688801e9dd7f9889fb2a29bc2b6fbfbc35a11f
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Wed Jul 11 12:12:38 2018 +1000
-
- Include stdlib.h for declaration of free.
-
- Fixes build with -Werror on at least Fedora and probably others.
-
-commit fccfa239def497615f92ed28acc57cfe63da3666
-Author: Damien Miller <djm@mindrot.org>
-Date: Wed Jul 11 10:19:56 2018 +1000
-
- VALGRIND_CHECK_LEAKS logic was backwards :(
-
-commit 416287d45fcde0a8e66eee8b99aa73bd58607588
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Wed Jul 11 10:10:26 2018 +1000
-
- Fix sshbuf_new error path in skey.
-
-commit 7aab109b8b90a353c1af780524f1ac0d3af47bab
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Wed Jul 11 10:06:18 2018 +1000
-
- Supply missing third arg in skey.
-
- During the change to the new buffer api the third arg to
- sshbuf_get_cstring was ommitted. Fixes build when configured with skey.
-
-commit 380320bb72cc353a901790ab04b6287fd335dc4a
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Wed Jul 11 10:03:34 2018 +1000
-
- Supply some more missing "int r" in skey
-
-commit d20720d373d8563ee737d1a45dc5e0804d622dbc
-Author: Damien Miller <djm@mindrot.org>
-Date: Wed Jul 11 09:56:36 2018 +1000
-
- disable valgrind memleak checking by default
-
- Add VALGRIND_CHECK_LEAKS knob to turn it back on.
-
-commit 79c9d35018f3a5e30ae437880b669aa8636cd3cd
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Wed Jul 11 09:54:00 2018 +1000
-
- Supply missing "int r" in skey code.
-
-commit 984bacfaacbbe31c35191b828fb5b5b2f0362c36
-Author: sf@openbsd.org <sf@openbsd.org>
-Date: Tue Jul 10 09:36:58 2018 +0000
-
- upstream: re-remove some pre-auth compression bits
-
- This time, make sure to not remove things that are necessary for
- pre-auth compression on the client. Add a comment that pre-auth
- compression is still supported in the client.
-
- ok markus@
-
- OpenBSD-Commit-ID: 282c6fec7201f18a5c333bbb68d9339734d2f784
-
-commit 120a1ec74e8d9d29f4eb9a27972ddd22351ddef9
-Author: Damien Miller <djm@mindrot.org>
-Date: Tue Jul 10 19:39:52 2018 +1000
-
- Adapt portable to legacy buffer API removal
-
-commit 0f3958c1e6ffb8ea4ba27e2a97a00326fce23246
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jul 10 09:13:30 2018 +0000
-
- upstream: kerberos/gssapi fixes for buffer removal
-
- OpenBSD-Commit-ID: 1cdf56fec95801e4563c47f21696f04cd8b60c4c
-
-commit c74ae8e7c45f325f3387abd48fa7dfef07a08069
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jul 10 06:45:29 2018 +0000
-
- upstream: buffer.[ch] and bufaux.c are no more
-
- OpenBSD-Commit-ID: d1a1852284e554f39525eb4d4891b207cfb3d3a0
-
-commit a881e5a133d661eca923fb0633a03152ab2b70b2
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jul 10 06:43:52 2018 +0000
-
- upstream: one mention of Buffer that almost got away :)
-
- OpenBSD-Commit-ID: 30d7c27a90b4544ad5dfacf654595710cd499f02
-
-commit 49f47e656b60bcd1d1db98d88105295f4b4e600d
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Mon Jul 9 21:59:10 2018 +0000
-
- upstream: replace cast with call to sshbuf_mutable_ptr(); ok djm@
-
- OpenBSD-Commit-ID: 4dfe9d29fa93d9231645c89084f7217304f7ba29
-
-commit cb30cd47041edb03476be1c8ef7bc1f4b69d1555
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Mon Jul 9 21:56:06 2018 +0000
-
- upstream: remove legacy buffer API emulation layer; ok djm@
-
- OpenBSD-Commit-ID: 2dd5dc17cbc23195be4299fa93be2707a0e08ad9
-
-commit 235c7c4e3bf046982c2d8242f30aacffa01073d1
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Mon Jul 9 21:53:45 2018 +0000
-
- upstream: sshd: switch monitor to sshbuf API; lots of help & ok
-
- djm@
-
- OpenBSD-Commit-ID: d89bd02d33974fd35ca0b8940d88572227b34a48
-
-commit b8d9214d969775e409e1408ecdf0d58fad99b344
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Mon Jul 9 21:37:55 2018 +0000
-
- upstream: sshd: switch GSSAPI to sshbuf API; ok djm@
-
- OpenBSD-Commit-ID: e48449ab4be3f006f7ba33c66241b7d652973e30
-
-commit c7d39ac8dc3587c5f05bdd5bcd098eb5c201c0c8
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Mon Jul 9 21:35:50 2018 +0000
-
- upstream: sshd: switch authentication to sshbuf API; ok djm@
-
- OpenBSD-Commit-ID: 880aa06bce4b140781e836bb56bec34873290641
-
-commit c3cb7790e9efb14ba74b2d9f543ad593b3d55b31
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Mon Jul 9 21:29:36 2018 +0000
-
- upstream: sshd: switch config to sshbuf API; ok djm@
-
- OpenBSD-Commit-ID: 72b02017bac7feac48c9dceff8355056bea300bd
-
-commit 2808d18ca47ad3d251836c555f0e22aaca03d15c
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Mon Jul 9 21:26:02 2018 +0000
-
- upstream: sshd: switch loginmsg to sshbuf API; ok djm@
-
- OpenBSD-Commit-ID: f3cb4e54bff15c593602d95cc43e32ee1a4bac42
-
-commit 89dd615b8b531979be63f05f9d5624367c9b28e6
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Mon Jul 9 21:20:26 2018 +0000
-
- upstream: ttymodes: switch to sshbuf API; ok djm@
-
- OpenBSD-Commit-ID: 5df340c5965e822c9da21e19579d08dea3cbe429
-
-commit f4608a7065480516ab46214f554e5f853fb7870f
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Mon Jul 9 21:18:10 2018 +0000
-
- upstream: client: switch mux to sshbuf API; with & ok djm@
-
- OpenBSD-Commit-ID: 5948fb98d704f9c4e075b92edda64e0290b5feb2
-
-commit cecee2d607099a7bba0a84803e2325d15be4277b
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Mon Jul 9 21:03:30 2018 +0000
-
- upstream: client: switch to sshbuf API; ok djm@
-
- OpenBSD-Commit-ID: 60cb0356114acc7625ab85105f6f6a7cd44a8d05
-
-commit ff55f4ad898137d4703e7a2bcc81167dfe8e9324
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Mon Jul 9 20:39:28 2018 +0000
-
- upstream: pkcs11: switch to sshbuf API; ok djm@
-
- OpenBSD-Commit-ID: 98cc4e800f1617c51caf59a6cb3006f14492db79
-
-commit 168b46f405d6736960ba7930389eecb9b6710b7e
-Author: sf@openbsd.org <sf@openbsd.org>
-Date: Mon Jul 9 13:37:10 2018 +0000
-
- upstream: Revert previous two commits
-
- It turns out we still support pre-auth compression on the client.
- Therefore revert the previous two commits:
-
- date: 2018/07/06 09:06:14; author: sf; commitid: yZVYKIRtUZWD9CmE;
- Rename COMP_DELAYED to COMP_ZLIB
-
- Only delayed compression is supported nowadays.
-
- ok markus@
-
- date: 2018/07/06 09:05:01; author: sf; commitid: rEGuT5UgI9f6kddP;
- Remove leftovers from pre-authentication compression
-
- Support for this has been removed in 2016.
- COMP_DELAYED will be renamed in a later commit.
-
- ok markus@
-
- OpenBSD-Commit-ID: cdfef526357e4e1483c86cf599491b2dafb77772
-
-commit ab39267fa1243d02b6c330615539fc4b21e17dc4
-Author: sf@openbsd.org <sf@openbsd.org>
-Date: Fri Jul 6 09:06:14 2018 +0000
-
- upstream: Rename COMP_DELAYED to COMP_ZLIB
-
- Only delayed compression is supported nowadays.
-
- ok markus@
-
- OpenBSD-Commit-ID: 5b1dbaf3d9a4085aaa10fec0b7a4364396561821
-
-commit 95db395d2e56a6f868193aead6cadb2493f036c6
-Author: sf@openbsd.org <sf@openbsd.org>
-Date: Fri Jul 6 09:05:01 2018 +0000
-
- upstream: Remove leftovers from pre-authentication compression
-
- Support for this has been removed in 2016.
- COMP_DELAYED will be renamed in a later commit.
-
- ok markus@
-
- OpenBSD-Commit-ID: 6a99616c832627157113fcb0cf5a752daf2e6b58
-
-commit f28a4d5cd24c4aa177e96b4f96957991e552cb70
-Author: sf@openbsd.org <sf@openbsd.org>
-Date: Fri Jul 6 09:03:02 2018 +0000
-
- upstream: Remove unused ssh_packet_start_compression()
-
- ok markus@
-
- OpenBSD-Commit-ID: 9d34cf2f59aca5422021ae2857190578187dc2b4
-
-commit 872517ddbb72deaff31d4760f28f2b0a1c16358f
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Fri Jul 6 13:32:02 2018 +1000
-
- Defer setting bufsiz in getdelim.
-
- Do not write to bufsiz until we are sure the malloc has succeeded,
- in case any callers rely on it (which they shouldn't). ok djm@
-
-commit 3deb56f7190a414dc264e21e087a934fa1847283
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Thu Jul 5 13:32:01 2018 +1000
-
- Fix other callers of read_environment_file.
-
- read_environment_file recently gained an extra argument Some platform
- specific code also calls it so add the argument to those too. Fixes
- build on Solaris and AIX.
-
-commit 314908f451e6b2d4ccf6212ad246fa4619c721d3
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Jul 4 13:51:45 2018 +0000
-
- upstream: deal with API rename: match_filter_list() =>
-
- match_filter_blacklist()
-
- OpenBSD-Regress-ID: 2da342be913efeb51806351af906fab01ba4367f
-
-commit 89f54cdf6b9cf1cf5528fd33897f1443913ddfb4
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Jul 4 13:51:12 2018 +0000
-
- upstream: exercise new expansion behaviour of
-
- PubkeyAcceptedKeyTypes and, by proxy, test kex_assemble_names()
-
- ok markus@
-
- OpenBSD-Regress-ID: 292978902e14d5729aa87e492dd166c842f72736
-
-commit 187633f24c71564e970681c8906df5a6017dcccf
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jul 3 13:53:26 2018 +0000
-
- upstream: add a comment that could have saved me 45 minutes of wild
-
- goose chasing
-
- OpenBSD-Regress-ID: d469b29ffadd3402c090e21b792d627d46fa5297
-
-commit 312d2f2861a2598ed08587cb6c45c0e98a85408f
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Jul 4 13:49:31 2018 +0000
-
- upstream: repair PubkeyAcceptedKeyTypes (and friends) after RSA
-
- signature work - returns ability to add/remove/specify algorithms by
- wildcard.
-
- Algorithm lists are now fully expanded when the server/client configs
- are finalised, so errors are reported early and the config dumps
- (e.g. "ssh -G ...") now list the actual algorithms selected.
-
- Clarify that, while wildcards are accepted in algorithm lists, they
- aren't full pattern-lists that support negation.
-
- (lots of) feedback, ok markus@
-
- OpenBSD-Commit-ID: a8894c5c81f399a002f02ff4fe6b4fa46b1f3207
-
-commit 303af5803bd74bf05d375c04e1a83b40c30b2be5
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jul 3 11:43:49 2018 +0000
-
- upstream: some magic for RSA-SHA2 checks
-
- OpenBSD-Regress-ID: e5a9b11368ff6d86e7b25ad10ebe43359b471cd4
-
-commit 7d68e262944c1fff1574600fe0e5e92ec8b398f5
-Author: Damien Miller <djm@mindrot.org>
-Date: Tue Jul 3 23:27:11 2018 +1000
-
- depend
-
-commit b4d4eda633af433d20232cbf7e855ceac8b83fe5
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jul 3 13:20:25 2018 +0000
-
- upstream: some finesse to fix RSA-SHA2 certificate authentication
-
- for certs hosted in ssh-agent
-
- OpenBSD-Commit-ID: e5fd5edd726137dda2d020e1cdebc464110a010f
-
-commit d78b75df4a57e0f92295f24298e5f2930e71c172
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jul 3 13:07:58 2018 +0000
-
- upstream: check correct variable; unbreak agent keys
-
- OpenBSD-Commit-ID: c36981fdf1f3ce04966d3310826a3e1e6233d93e
-
-commit 2f30300c5e15929d0e34013f38d73e857f445e12
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jul 3 11:42:12 2018 +0000
-
- upstream: crank version number to 7.8; needed for new compat flag
-
- for prior version; part of RSA-SHA2 strictification, ok markus@
-
- OpenBSD-Commit-ID: 84a11fc0efd2674c050712336b5093f5d408e32b
-
-commit 4ba0d54794814ec0de1ec87987d0c3b89379b436
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jul 3 11:39:54 2018 +0000
-
- upstream: Improve strictness and control over RSA-SHA2 signature
-
- In ssh, when an agent fails to return a RSA-SHA2 signature when
- requested and falls back to RSA-SHA1 instead, retry the signature to
- ensure that the public key algorithm sent in the SSH_MSG_USERAUTH
- matches the one in the signature itself.
-
- In sshd, strictly enforce that the public key algorithm sent in the
- SSH_MSG_USERAUTH message matches what appears in the signature.
-
- Make the sshd_config PubkeyAcceptedKeyTypes and
- HostbasedAcceptedKeyTypes options control accepted signature algorithms
- (previously they selected supported key types). This allows these
- options to ban RSA-SHA1 in favour of RSA-SHA2.
-
- Add new signature algorithms "rsa-sha2-256-cert-v01@openssh.com" and
- "rsa-sha2-512-cert-v01@openssh.com" to force use of RSA-SHA2 signatures
- with certificate keys.
-
- feedback and ok markus@
-
- OpenBSD-Commit-ID: c6e9f6d45eed8962ad502d315d7eaef32c419dde
-
-commit 95344c257412b51199ead18d54eaed5bafb75617
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jul 3 10:59:35 2018 +0000
-
- upstream: allow sshd_config PermitUserEnvironment to accept a
-
- pattern-list of whitelisted environment variable names in addition to yes|no.
-
- bz#1800, feedback and ok markus@
-
- OpenBSD-Commit-ID: 77dc2b468e0bf04b53f333434ba257008a1fdf24
-
-commit 6f56fe4b9578b0627667f8bce69d4d938a88324c
-Author: millert@openbsd.org <millert@openbsd.org>
-Date: Tue Jun 26 11:23:59 2018 +0000
-
- upstream: Fix "WARNING: line 6 disappeared in /etc/moduli, giving up"
-
- when choosing a prime. An extra increment of linenum snuck in as part of the
- conversion to getline(). OK djm@ markus@
-
- OpenBSD-Commit-ID: 0019225cb52ed621b71cd9f19ee2e78e57e3dd38
-
-commit 1eee79a11c1b3594f055b01e387c49c9a6e80005
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Mon Jul 2 14:13:30 2018 +0000
-
- upstream: One ampersand is enough to backgroud an process. OpenBSD
-
- doesn't seem to mind, but some platforms in -portable object to the second.
-
- OpenBSD-Regress-ID: d6c3e404871764343761dc25c3bbe29c2621ff74
-
-commit 6301e6c787d4e26bfae1119ab4f747bbcaa94e44
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Mon Jul 2 21:16:58 2018 +1000
-
- Add implementation of getline.
-
- Add getline for the benefit of platforms that don't have it. Sourced
- from NetBSD (OpenBSD's implementation is a little too chummy with the
- internals of FILE).
-
-commit 84623e0037628f9992839063151f7a9f5f13099a
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jun 26 02:02:36 2018 +0000
-
- upstream: whitespace
-
- OpenBSD-Commit-ID: 9276951caf4daf555f6d262e95720e7f79244572
-
-commit 90e51d672711c19a36573be1785caf35019ae7a8
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Mon Jun 25 22:28:33 2018 +0000
-
- upstream: fix NULL dereference in open_listen_match_tcpip()
-
- OpenBSD-Commit-ID: c968c1d29e392352383c0f9681fcc1e93620c4a9
-
-commit f535ff922a67d9fcc5ee69d060d1b21c8bb01d14
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date: Tue Jun 19 05:36:57 2018 +0000
-
- upstream: spelling;
-
- OpenBSD-Commit-ID: db542918185243bea17202383a581851736553cc
-
-commit 80e199d6175904152aafc5c297096c3e18297691
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jun 19 03:02:17 2018 +0000
-
- upstream: test PermitListen with bare port numbers
-
- OpenBSD-Regress-ID: 4b50a02dfb0ccaca08247f3877c444126ba901b3
-
-commit 87ddd676da0f3abd08b778b12b53b91b670dc93c
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue Jun 19 02:59:41 2018 +0000
-
- upstream: allow bare port numbers to appear in PermitListen directives,
-
- e.g.
-
- PermitListen 2222 8080
-
- is equivalent to:
-
- PermitListen *:2222 *:8080
-
- Some bonus manpage improvements, mostly from markus@
-
- "looks fine" markus@
-
- OpenBSD-Commit-ID: 6546b0cc5aab7f53d65ad0a348ca0ae591d6dd24
-
-commit 26f96ca10ad0ec5da9b05b99de1e1ccea15a11be
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jun 15 07:01:11 2018 +0000
-
- upstream: invalidate supplemental group cache used by
-
- temporarily_use_uid() when the target uid differs; could cause failure to
- read authorized_keys under some configurations. patch by Jakub Jelen via
- bz2873; ok dtucker, markus
-
- OpenBSD-Commit-ID: 48a345f0ee90f6c465a078eb5e89566b23abd8a1
-
-commit 89a85d724765b6b82e0135ee5a1181fdcccea9c6
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Sun Jun 10 23:45:41 2018 +0000
-
- upstream: unbreak SendEnv; patch from tb@
-
- OpenBSD-Commit-ID: fc808daced813242563b80976e1478de95940056
-
-commit acf4260f0951f89c64e1ebbc4c92f451768871ad
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date: Sat Jun 9 06:36:31 2018 +0000
-
- upstream: sort previous;
-
- OpenBSD-Commit-ID: 27d80d8b8ca99bc33971dee905e8ffd0053ec411
-
-commit 1678d4236451060b735cb242d2e26e1ac99f0947
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Sat Jun 9 03:18:11 2018 +0000
-
- upstream: slightly better wording re handing of $TERM, from Jakub
-
- Jelen via bz2386
-
- OpenBSD-Commit-ID: 14bea3f069a93c8be66a7b97794255a91fece964
-
-commit 28013759f09ed3ebf7e8335e83a62936bd7a7f47
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Sat Jun 9 03:03:10 2018 +0000
-
- upstream: add a SetEnv directive for sshd_config to allow an
-
- administrator to explicitly specify environment variables set in sessions
- started by sshd. These override the default environment and any variables set
- by user configuration (PermitUserEnvironment, etc), but not the SSH_*
- variables set by sshd itself.
-
- ok markus@
-
- OpenBSD-Commit-ID: b6a96c0001ccd7dd211df6cae9e961c20fd718c0
-
-commit 7082bb58a2eb878d23ec674587c742e5e9673c36
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Sat Jun 9 03:01:12 2018 +0000
-
- upstream: add a SetEnv directive to ssh_config that allows setting
-
- environment variables for the remote session (subject to the server accepting
- them)
-
- refactor SendEnv to remove the arbitrary limit of variable names.
-
- ok markus@
-
- OpenBSD-Commit-ID: cfbb00d9b0e10c1ffff1d83424351fd961d1f2be
-
-commit 3b9798bda15bd3f598f5ef07595d64e23504da91
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Sat Jun 9 02:58:02 2018 +0000
-
- upstream: reorder child environment preparation so that variables
-
- read from ~/.ssh/environment (if enabled) do not override SSH_* variables set
- by the server.
-
- OpenBSD-Commit-ID: 59f9d4c213cdcef2ef21f4b4ae006594dcf2aa7a
-
-commit 0368889f82f63c82ff8db9f8c944d89e7c657db4
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jun 8 03:35:36 2018 +0000
-
- upstream: fix incorrect expansion of %i in
-
- load_public_identity_files(); reported by Roumen Petrov
-
- OpenBSD-Commit-ID: a827289e77149b5e0850d72a350c8b0300e7ef25
-
-commit 027607fc2db6a0475a3380f8d95c635482714cb0
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jun 8 01:55:40 2018 +0000
-
- upstream: fix some over-long lines and __func__ up some debug
-
- messages
-
- OpenBSD-Commit-ID: c70a60b4c8207d9f242fc2351941ba50916bb267
-
-commit 6ff6fda705bc204456a5fa12518dde6e8790bb02
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date: Thu Jun 7 11:26:14 2018 +0000
-
- upstream: tweak previous;
-
- OpenBSD-Commit-ID: f98f16af10b28e24bcecb806cb71ea994b648fd6
-
-commit f2c06ab8dd90582030991f631a2715216bf45e5a
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Fri Jun 8 17:43:36 2018 +1000
-
- Remove ability to override $LD.
-
- Since autoconf always uses $CC to link C programs, allowing users to
- override LD caused mismatches between what LD_LINK_IFELSE thought worked
- and what ld thought worked. If you do need to do this kind of thing you
- need to set a compiler flag such as gcc's -fuse-ld in LDFLAGS.
-
-commit e1542a80797b4ea40a91d2896efdcc76a57056d2
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Fri Jun 8 13:55:59 2018 +1000
-
- Better detection of unsupported compiler options.
-
- Should prevent "unsupported -Wl,-z,retpoline" warnings during linking.
- ok djm@
-
-commit 57379dbd013ad32ee3f9989bf5f5741065428360
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Jun 7 14:29:43 2018 +0000
-
- upstream: test the correct configuration option name
-
- OpenBSD-Regress-ID: 492279ea9f65657f97a970e0e7c7fd0b339fee23
-
-commit 6d41815e202fbd6182c79780b6cc90e1ec1c9981
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Jun 7 09:26:42 2018 +0000
-
- upstream: some permitlisten fixes from markus@ that I missed in my
-
- insomnia-fueled commits last night
-
- OpenBSD-Commit-ID: 26f23622e928996086e85b1419cc1c0f136e359c
-
-commit 4319f7a868d86d435fa07112fcb6153895d03a7f
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Jun 7 04:46:34 2018 +0000
-
- upstream: permitlisten/PermitListen unit test from Markus
-
- OpenBSD-Regress-ID: ab12eb42f0e14926980441cf7c058a6d1d832ea5
-
-commit fa09076410ffc2d34d454145af23c790d728921e
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Thu Jun 7 04:31:51 2018 +0000
-
- upstream: fix regression caused by recent permitlisten option commit:
-
- authorized_keys lines that contained permitopen/permitlisten were being
- treated as invalid.
-
- OpenBSD-Commit-ID: 7ef41d63a5a477b405d142dc925b67d9e7aaa31b
-
-commit 7f90635216851f6cb4bf3999e98b825f85d604f8
-Author: markus@openbsd.org <markus@openbsd.org>
-Date: Wed Jun 6 18:29:18 2018 +0000
-
- upstream: switch config file parsing to getline(3) as this avoids
-
- static limits noted by gerhard@; ok dtucker@, djm@
-
- OpenBSD-Commit-ID: 6d702eabef0fa12e5a1d75c334a8c8b325298b5c
-
-commit 392db2bc83215986a91c0b65feb0e40e7619ce7e
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Jun 6 18:25:33 2018 +0000
-
- upstream: regress test for PermitOpen
-
- OpenBSD-Regress-ID: ce8b5f28fc039f09bb297fc4a92319e65982ddaf
-
-commit 803d896ef30758135e2f438bdd1a0be27989e018
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Jun 6 18:24:15 2018 +0000
-
- upstream: man bits for permitlisten authorized_keys option
-
- OpenBSD-Commit-ID: 86910af8f781a4ac5980fea125442eb25466dd78
-
-commit 04df43208b5b460d7360e1598f876b92a32f5922
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Jun 6 18:24:00 2018 +0000
-
- upstream: man bits for PermitListen
-
- OpenBSD-Commit-ID: 35b200cba4e46a16a4db6a80ef11838ab0fad67c
-
-commit 93c06ab6b77514e0447fe4f1d822afcbb2a9be08
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Jun 6 18:23:32 2018 +0000
-
- upstream: permitlisten option for authorized_keys; ok markus@
-
- OpenBSD-Commit-ID: 8650883018d7aa893173d703379e4456a222c672
-
-commit 115063a6647007286cc8ca70abfd2a7585f26ccc
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Wed Jun 6 18:22:41 2018 +0000
-
- upstream: Add a PermitListen directive to control which server-side
-
- addresses may be listened on when the client requests remote forwarding (ssh
- -R).
-
- This is the converse of the existing PermitOpen directive and this
- includes some refactoring to share much of its implementation.
-
- feedback and ok markus@
-
- OpenBSD-Commit-ID: 15a931238c61a3f2ac74ea18a98c933e358e277f
-
-commit 7703ae5f5d42eb302ded51705166ff6e19c92892
-Author: Darren Tucker <dtucker@dtucker.net>
-Date: Wed Jun 6 16:04:29 2018 +1000
-
- Use ssh-keygen -A to generate missing host keys.
-
- Instead of testing for each specific key type, use ssh-keygen -A to
- generate any missing host key types.
-
-commit e8d59fef1098e24f408248dc64e5c8efa5d01f3c
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date: Fri Jun 1 06:23:10 2018 +0000
-
- upstream: add missing punctuation after %i in ssh_config.5, and
-
- make the grammatical format in sshd_config.5 match that in ssh_config.5;
-
- OpenBSD-Commit-ID: e325663b9342f3d556e223e5306e0d5fa1a74fa0
-
-commit a1f737d6a99314e291a87856122cb4dbaf64c641
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date: Fri Jun 1 05:52:26 2018 +0000
-
- upstream: oops - further adjustment to text neccessary;
-
- OpenBSD-Commit-ID: 23585576c807743112ab956be0fb3c786bdef025
-
-commit 294028493471e0bd0c7ffe55dc0c0a67cba6ec41
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date: Fri Jun 1 05:50:18 2018 +0000
-
- upstream: %U needs to be escaped; tweak text;
-
- OpenBSD-Commit-ID: 30887b73ece257273fb619ab6f4e86dc92ddc15e
-
-commit e5019da3c5a31e6e729a565f2b886a80c4be96cc
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Fri Jun 1 04:31:48 2018 +0000
-
- upstream: Apply umask to all incoming files and directories not
-
- just files. This makes sure it gets applied to directories too, and prevents
- a race where files get chmodded after creation. bz#2839, ok djm@
-
- OpenBSD-Commit-ID: 3168ee6c7c39093adac4fd71039600cfa296203b
-
-commit a1dcafc41c376332493b9385ee39f9754dc145ec
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jun 1 03:52:37 2018 +0000
-
- upstream: Adapt to extra default verboisity from ssh-keygen when
-
- searching for and hashing known_hosts entries in a single operation
- (ssh-keygen -HF ...) Patch from Anton Kremenetsky
-
- OpenBSD-Regress-ID: 519585a4de35c4611285bd6a7272766c229b19dd
-
-commit 76f314c75dffd4a55839d50ee23622edad52c168
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Tue May 22 00:22:49 2018 +0000
-
- upstream: Add TEST_SSH_FAIL_FATAL variable, to force all failures
-
- to instantly abort the test. Useful in capturing clean logs for individual
- failure cases.
-
- OpenBSD-Regress-ID: feba18cf338c2328b9601bd4093cabdd9baa3af1
-
-commit 065c8c055df8d83ae7c92e5e524a579d87668aab
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date: Fri May 11 03:51:06 2018 +0000
-
- upstream: Clean up comment.
-
- OpenBSD-Regress-ID: 6adb35f384d447e7dcb9f170d4f0d546d3973e10
-
-commit 01b048c8eba3b021701bd0ab26257fc82903cba8
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jun 1 04:21:29 2018 +0000
-
- upstream: whitespace
-
- OpenBSD-Commit-ID: e5edb5e843ddc9b73a8e46518899be41d5709add
-
-commit 854ae209f992465a276de0b5f10ef770510c2418
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jun 1 04:05:29 2018 +0000
-
- upstream: make ssh_remote_ipaddr() capable of being called after
-
- the ssh->state has been torn down; bz#2773
-
- OpenBSD-Commit-ID: 167f12523613ca3d16d7716a690e7afa307dc7eb
-
-commit 3e088aaf236ef35beeef3c9be93fd53700df5861
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jun 1 03:51:34 2018 +0000
-
- upstream: return correct exit code when searching for and hashing
-
- known_hosts entries in a single operation (ssh-keygen -HF hostname); bz2772
- Report and fix from Anton Kremenetsky
-
- OpenBSD-Commit-ID: ac10ca13eb9bb0bc50fcd42ad11c56c317437b58
-
-commit 9c935dd9bf05628826ad2495d3e8bdf3d3271c21
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jun 1 03:33:53 2018 +0000
-
- upstream: make UID available as a %-expansion everywhere that the
-
- username is available currently. In the client this is via %i, in the server
- %U (since %i was already used in the client in some places for this, but used
- for something different in the server); bz#2870, ok dtucker@
-
- OpenBSD-Commit-ID: c7e912b0213713316cb55db194b3a6415b3d4b95
-
-commit d8748b91d1d6c108c0c260ed41fa55f37b9ef34b
-Author: djm@openbsd.org <djm@openbsd.org>
-Date: Fri Jun 1 03:11:49 2018 +0000
-
- upstream: prefer argv0 to "ssh" when re-executing ssh for ProxyJump
-
- directive; bz2831, feedback and ok dtucker@
-
- OpenBSD-Commit-ID: 3cec709a131499fbb0c1ea8a0a9e0b0915ce769e