Age | Commit message (Collapse) | Author | |
---|---|---|---|
2022-12-15 | The idiomatic way of coping with signed char vs unsigned char (which | Theo de Raadt | |
did not come from stdio read functions) in the presence of ctype macros, is to always cast to (unsigned char). casting to (int) for a "macro" which is documented to take int, is weird. And sadly wrong, because of the sing extension risk.. same diff from florian | |||
2022-12-09 | Warn if no host keys for hostbased auth can be loaded. From bz#3507, ok djm@ | Darren Tucker | |
2022-12-09 | Add some server debugging for hostbased auth. | Darren Tucker | |
auth_debug_add queues messages about the auth process which is sent to the client after successful authentication. This also sends those to the server debug log to aid in debugging. From bz#3507, ok djm@ | |||
2022-12-04 | userspace: remove vestigial '?' cases from top-level getopt(3) loops | Scott Soule Cheloha | |
getopt(3) returns '?' when it encounters a flag not present in the in the optstring or if a flag is missing its option argument. We can handle this case with the "default" failure case with no loss of legibility. Hence, remove all the redundant "case '?':" lines. Prompted by dlg@. With help from dlg@ and millert@. Link: https://marc.info/?l=openbsd-tech&m=167011979726449&w=2 ok naddy@ millert@ dlg@ | |||
2022-12-04 | Remove duplicate includes. Patch from AtariDreams via github PR#364. | Darren Tucker | |
2022-12-02 | make struct sshbuf private and remove an unused field; ok dtucker | Damien Miller | |
2022-11-29 | Add void to client_repledge args to fix compiler warning. ok djm@ | Darren Tucker | |
2022-11-28 | tighten pledge(2) after session establishment | Damien Miller | |
feedback, ok & testing in snaps deraadt@ | |||
2022-11-28 | New EnableEscapeCommandline ssh_config(5) option | Damien Miller | |
This option (default "no") controls whether the ~C escape is available. Turning it off by default means we will soon be able to use a stricter default pledge(2) in the client. feedback deraadt@ dtucker@; tested in snaps for a while | |||
2022-11-18 | In channel_request_remote_forwarding the parameters for permission_set_add | Moritz Buhl | |
are leaked as they are also duplicated in the call. Found by CodeChecker. ok djm | |||
2022-11-10 | Handle dynamic remote port forwarding in escape commandline's -R processing. | Darren Tucker | |
bz#3499, ok djm@ | |||
2022-11-09 | Fix typo in fatal error message. Patch from vapier at chromium.org. | Darren Tucker | |
2022-11-09 | Remove errant colon and simplify format string in error messages. | Darren Tucker | |
Patch from vapier at chromium.org. | |||
2022-11-09 | rename client_global_hostkeys_private_confirm() to | Damien Miller | |
client_global_hostkeys_prove_confirm(), as it handles the "hostkeys-prove00@openssh.com" message; no functional change | |||
2022-11-09 | typo in comment | Damien Miller | |
2022-11-07 | The IdentityFile option in ssh_config can also be used to specify a | Darren Tucker | |
public key file, as documented in ssh.1 for the -i option. Document this also for IdentityFile in ssh_config.5, for documentation completeness. From laalsaas at systemli.org via portable github PR#352, ok jmc@ djm@ | |||
2022-11-07 | Remove some set but otherwise unused variables, spotted in -portable by | Darren Tucker | |
clang 16's -Wunused-but-set-variable. ok djm@ | |||
2022-11-07 | Check for and disallow MaxStartups values less than or equal to zero | Darren Tucker | |
during config parsing, rather than faling later at runtime. bz#3489, ok djm@ | |||
2022-11-07 | fix parsing of hex cert expiry time; was checking whether the | Damien Miller | |
start time began with "0x", not the expiry time. from Ed Maste | |||
2022-11-07 | Import regenerated moduli. | Darren Tucker | |
2022-11-07 | Fix typo. From pablomh via -portable github PR#344. | Darren Tucker | |
2022-11-03 | replace recently-added valid_domain() check for hostnames going to | Damien Miller | |
known_hosts with a more relaxed check for bad characters; previous commit broke address literals. Reported by/feedback from florian@ | |||
2022-10-28 | put sshkey_check_rsa_length() back in sshkey.c to unbreak | Damien Miller | |
OPENSSL=no builds | |||
2022-10-28 | allow ssh-keyscan(1) to accept CIDR address ranges, e.g. | Damien Miller | |
ssh-keyscan 192.168.0.0/24 If a CIDR range is passed, then it will be expanded to all possible addresses in the range including the all-0s and all-1s addresses. bz#976 feedback/ok markus@ | |||
2022-10-28 | refactor sshkey_private_deserialize | Damien Miller | |
feedback/ok markus@ | |||
2022-10-28 | refactor sshkey_private_serialize_opt() | Damien Miller | |
feedback/ok markus@ | |||
2022-10-28 | refactor certify | Damien Miller | |
feedback/ok markus@ | |||
2022-10-28 | refactor sshkey_sign() and sshkey_verify() | Damien Miller | |
feedback/ok markus@ | |||
2022-10-28 | refactor sshkey_from_blob_internal() | Damien Miller | |
feedback/ok markus@ | |||
2022-10-28 | refactor sshkey_from_private() | Damien Miller | |
feedback/ok markus@ | |||
2022-10-28 | factor out key generation | Damien Miller | |
feedback/ok markus@ | |||
2022-10-28 | refactor and simplify sshkey_read() | Damien Miller | |
feedback/ok markus@ | |||
2022-10-28 | factor out public key serialization | Damien Miller | |
feedback/ok markus@ | |||
2022-10-28 | factor out sshkey_equal_public() | Damien Miller | |
feedback/ok markus@ | |||
2022-10-28 | begin big refactor of sshkey | Damien Miller | |
Move keytype data and some of the type-specific code (allocation, cleanup, etc) out into each key type's implementation. Subsequent commits will move more, with the goal of having each key-*.c file owning as much of its keytype's implementation as possible. lots of feedback + ok markus@ | |||
2022-10-24 | Be more paranoid with host/domain names coming from the resolver: | Damien Miller | |
don't follow CNAMEs with invalid characters when canonicalising and never write a name with bad characters to a known_hosts file. reported by David Leadbeater, ok deraadt@ | |||
2022-10-24 | when scp(1) is using the SFTP protocol for transport (the default), | Damien Miller | |
better match scp/rcp's handling of globs that don't match the globbed characters but do match literally (e.g. trying to transfer "foo.[1]"). Previously scp(1) in SFTP mode would not match these pathnames but legacy scp/rcp mode would. Reported by Michael Yagliyan in bz3488; ok dtucker@ | |||
2022-10-13 | use correct type with sizeof | Jonathan Gray | |
ok djm@ | |||
2022-10-07 | ssh-agent.1: | Jason McIntyre | |
- use Nm not Xr for self-ref - while here, wrap a long line ssh-agent.c: - add -O to usage() | |||
2022-10-07 | document "-O no-restrict-websafe"; spotted by Ross L Richardson | Damien Miller | |
2022-10-06 | honour user's umask if it is more restrictive then the ssh default | Damien Miller | |
(022); based on patch from Alex Henrie, ok dtucker@ deraadt@ | |||
2022-09-26 | openssh-9.1 | Damien Miller | |
2022-09-21 | Fix typo. From AlexanderStohr via github PR#343. | Darren Tucker | |
2022-09-19 | add RequiredRSASize to the list of keywords accepted by -o; | Damien Miller | |
spotted by jmc@ | |||
2022-09-19 | use users-groups-by-id@openssh.com sftp-server extension (when | Damien Miller | |
available) to fill in user/group names for directory listings. Implement a client-side cache of see uid/gid=>user/group names. ok markus@ | |||
2022-09-19 | sftp client library support for users-groups-by-id@openssh.com; | Damien Miller | |
ok markus@ | |||
2022-09-19 | extend sftp-common.c:extend ls_file() to support supplied user/group | Damien Miller | |
names; ok markus@ | |||
2022-09-19 | sftp-server(8): add a "users-groups-by-id@openssh.com" extension | Damien Miller | |
request that allows the client to obtain user/group names that correspond to a set of uids/gids. Will be used to make directory listings more useful and consistent in sftp(1). ok markus@ | |||
2022-09-19 | better debugging for connect_next() | Damien Miller | |
2022-09-17 | Add RequiredRSASize for sshd(8); RSA keys that fall beneath this limit | Damien Miller | |
will be ignored for user and host-based authentication. Feedback deraadt@ ok markus@ |