summaryrefslogtreecommitdiff
path: root/usr.bin/ssh
AgeCommit message (Collapse)Author
2020-09-09For the hostkey confirmation message:Damien Miller
> Are you sure you want to continue connecting (yes/no/[fingerprint])? compare the fingerprint case sensitively; spotted Patrik Lundin ok dtucker
2020-09-09when writing an attestation blob for a FIDO key, record all the dataDamien Miller
needed to verify the attestation. Previously we were missing the "authenticator data" that is included in the signature. spotted by Ian Haken feedback Pedro Martelletto and Ian Haken; ok markus@
2020-08-31refuse to add verify-required (PINful) FIDO keys to ssh-agent untilDamien Miller
the agent supports them properly
2020-08-31Add RCS IDs to the few files that are missing them;Damien Miller
from Pedro Martelletto
2020-08-28Check that the addresses supplied to Match Address and MatchDarren Tucker
LocalAddress are valid when parsing in config-test mode. This will catch address/mask mismatches before they cause problems at runtime. Found by Daniel Stocker, ok djm@
2020-08-27sentence fix; from pedro martellettoJason McIntyre
2020-08-27debug()-print a little info about FIDO-specific key fields viaDamien Miller
"ssh-keygen -vyf /path/key"
2020-08-27skip a bit more FIDO token selection logic when only a single tokenDamien Miller
is attached. with Pedro Martelletto
2020-08-27tweak previous;Jason McIntyre
2020-08-27remove unreachable code I forgot to delete in r1.334Damien Miller
2020-08-27Request PIN ahead of time for certain FIDO actionsDamien Miller
When we know that a particular action will require a PIN, such as downloading resident keys or generating a verify-required key, request the PIN before attempting it. joint work with Pedro Martelletto; ok markus@
2020-08-27preserve verify-required for resident FIDO keysDamien Miller
When downloading a resident, verify-required key from a FIDO token, preserve the verify-required in the private key that is written to disk. Previously we weren't doing that because of lack of support in the middleware API. from Pedro Martelletto; ok markus@ and myself
2020-08-27major rework of FIDO token selection logicDamien Miller
When PINs are in use and multiple FIDO tokens are attached to a host, we cannot just blast requests at all attached tokens with the PIN specified as this will cause the per-token PIN failure counter to increment. If this retry counter hits the token's limit (usually 3 attempts), then the token will lock itself and render all (web and SSH) of its keys invalid. We don't want this. So this reworks the key selection logic for the specific case of multiple keys being attached. When multiple keys are attached and the operation requires a PIN, then the user must touch the key that they wish to use first in order to identify it. This may require multiple touches, but only if there are multiple keys attached AND (usually) the operation requires a PIN. The usual case of a single key attached should be unaffected. Work by Pedro Martelletto; ok myself and markus@
2020-08-27support for requiring user verified FIDO keys in sshdDamien Miller
This adds a "verify-required" authorized_keys flag and a corresponding sshd_config option that tells sshd to require that FIDO keys verify the user identity before completing the signing/authentication attempt. Whether or not user verification was performed is already baked into the signature made on the FIDO token, so this is just plumbing that flag through and adding ways to require it. feedback and ok markus@
2020-08-27support for user-verified FIDO keysDamien Miller
FIDO2 supports a notion of "user verification" where the user is required to demonstrate their identity to the token before particular operations (e.g. signing). Typically this is done by authenticating themselves using a PIN that has been set on the token. This adds support for generating and using user verified keys where the verification happens via PIN (other options might be added in the future, but none are in common use now). Practically, this adds another key generation option "verify-required" that yields a key that requires a PIN before each authentication. feedback markus@ and Pedro Martelletto; ok markus@
2020-08-12ssh-keyscan(1): simplify conloop() with timercmp(3), timersub(3); ok djm@cheloha
2020-08-11let ssh_config(5)'s AddKeysToAgent keyword accept a time limit forDamien Miller
keys in addition to its current flag options. Time-limited keys will automatically be removed from ssh-agent after their expiry time has passed; ok markus@
2020-08-11let the "Confirm user presence for key ..." ssh-askpass notificationDamien Miller
respect $SSH_ASKPASS_REQUIRE; ok markus@
2020-08-03ensure that certificate extensions are lexically sorted. PreviouslyDamien Miller
if the user specified a custom extension then the everything would be in order except the custom ones. bz3198 ok dtucker markus
2020-08-03allow -A to explicitly enable agent forwarding in scp and sftp. TheDamien Miller
default remains to not forward an agent, even when ssh_config enables it. ok jmc dtucker markus
2020-08-03clang -Wimplicit-fallthrough does not recognise /* FALLTHROUGH */Theo de Raadt
comments, which is the style we currently use, and gives too many boring warnings. ok djm
2020-07-31Also compare username when checking for JumpHost loops. bz#3057, ok djm@Darren Tucker
2020-07-17Add %k to the TOKENs for Match Exec for consistency with the other keywordsDarren Tucker
that recently got %k.
2020-07-17fix macro slip in previous;Jason McIntyre
2020-07-17log error message for process_write() write failuresDamien Miller
2020-07-17Add a '%k' TOKEN that expands to the effective HostKey of theDarren Tucker
destination. This allows, eg, keeping host keys in individual files using "UserKnownHostsFile ~/.ssh/known_hosts.d/%k". bz#1654, ok djm@, jmc@ (man page bits)
2020-07-17Add %-TOKEN, environment variable and tilde expansion to UserKnownHostsFile,Darren Tucker
allowing the file to be automagically split up in the configuration (eg bz#1654). ok djm@, man page parts jmc@
2020-07-15- Add [-a rounds] in ssh-keygen man page and usage()solene
- Reorder parameters list in the first usage() case - Sentence rewording ok dtucker@ jmc@ noticed usage() missed -a flag too
2020-07-15start sentence with capital letter;Jason McIntyre
2020-07-15Add default for number of rounds (-a). ok djm@Darren Tucker
2020-07-14allow some additional control over the use of ssh-askpassDamien Miller
via $SSH_ASKPASS_REQUIRE, including force-enable/disable. bz#69 ok markus@
2020-07-07correct recently broken commentsTheo de Raadt
2020-07-05some language improvements; ok markusDamien Miller
2020-07-03update setproctitle after re-exec; ok djmMarkus Friedl
2020-07-03keep ignoring HUP after fork+exec; ok djmMarkus Friedl
2020-07-03don't exit the listener on send_rexec_state errors; ok djmMarkus Friedl
2020-07-03put back the mux_ctx memleak fix, but only for channels of typeDamien Miller
SSH_CHANNEL_MUX_LISTENER; Specifically SSH_CHANNEL_MUX_PROXY channels should not have this structure freed.
2020-07-03revert r1.399 - the lifetime of c->mux_ctx is more complex; simply freeingDamien Miller
it here causes other problems
2020-07-03avoid tilde_expand_filename() in expanding ~/.ssh/rc - if sshd isDamien Miller
in chroot mode, the likely absence of a password database will cause tilde_expand_filename() to fatal; ok dtucker@
2020-07-03when redirecting sshd's log output to a file, undo this redirectionDamien Miller
after the session child process is forked(); ok dtucker@
2020-07-03start ClientAliveInterval bookkeeping before first pass throughDamien Miller
select() loop; fixed theoretical case where busy sshd may ignore timeouts from client; inspired by and ok dtucker
2020-07-03Only reset the serveralive check when we receive traffic from the serverDarren Tucker
and ignore traffic from a port forwarding client, preventing a client from keeping a connection alive when it should be terminated. Based on a patch from jxraynor at gmail.com via openssh-unix-dev and bz#2265, ok djm@
2020-07-03fix memory leak of mux_ctx; patch from Sergiy Lozovsky via bz3189Damien Miller
ok dtucker
2020-07-01free kex in ssh_packet_close; ok djm semarieMarkus Friedl
2020-06-27Replace TAILQ concatenation loops with TAILQ_CONCATbket
OK djm@
2020-06-26backout 1.293 fix kex mem-leak in ssh_packet_close at markus requestSebastien Marie
the change introduced a NULL deref in sshpkt_vfatal() (uses of ssh->kex after calling ssh_packet_clear_keys())
2020-06-26avoid spurious error message when ssh-keygen creates filesDamien Miller
outside ~/.ssh; with dtucker@
2020-06-26handle EINTR in waitfd() and timeout_connect() helpers;Damien Miller
bz#3071; ok dtucker@
2020-06-26allow "ssh-add -d -" to read keys to be deleted from stdinDamien Miller
bz#3180; ok dtucker@
2020-06-26constify a few things; ok dtucker (as part of another diff)Damien Miller