summaryrefslogtreecommitdiff
path: root/usr.bin
AgeCommit message (Collapse)Author
2018-09-26s/process_mux_master/mux_master_process/ in mux master function names,Damien Miller
Gives better symmetry with the existing mux_client_*() names and makes it more obvious when a message comes from the master vs client (they are interleved in ControlMaster=auto mode). no functional change beyond prefixing a could of log messages with __func__ where they were previously lacking.
2018-09-25-T applies to ip6 too, apparently;Jason McIntyre
from nan xiao
2018-09-25Use getnameinfo(2)kn
This simplifies the code, makes it less address family specific and plays nicely with previously used getaddrinfo(2). While here, make function parameter `const', sort stack variables by size and nitpick PF_UNSPEC. OK millert
2018-09-25usage() is voidkn
OK tb
2018-09-25Allow panes to be 1 line or column by redrawing instead of using theNicholas Marriott
scroll region, from Soeren Tempel in GitHub issue 1487.
2018-09-25Since each database that has the rpath promise only needs to access oneRicardo Mestre
specific file (in read mode) we can add a 4th attribute to the struct getentdb to define each of those files, except for group/hosts/passwd dbs which will be assigned NULL to that attribute because all the necessary files they need to open are already whitelisted through pledge(2) via either dns or getpw promises. With that set we can then check if the 4th attribute (called unveil) is not NULL and in that case unveil(2) that specific file per each database. After a discussion with millert@ regarding YP then deraadt@ chimed in referring that when he wrote this code even though we can have YP mappings with several of these dbs "it doesn't mean that things use it, or should, or will" so adding unveil(2) here should not impact any YP environments. OK millert@ deraadt@
2018-09-25Remove initial pledge(2) that doesn't give us much protection since it's soRicardo Mestre
short lived, we either go directly exiting the program or just a few lines below we call pledge(2) again, where it actually should be, and with really reduced promises. Next commit will restrict further access to the filesystem through unveil(2). OK deraadt@ kn@
2018-09-24Only include pane status in minimum size if it is turned on, GitHubNicholas Marriott
issue 1480.
2018-09-22Remove unused Table_size define and digits() function.Todd C. Miller
2018-09-22Use user_from_uid() and uid_from_user() directly. The wrappersTodd C. Miller
in username.c are now so simple there is no longer a good reason to use them. OK deraadt@
2018-09-22fix uid -> username lookupRichard Procter
ok deraadt@
2018-09-21Use password/group cache functions and avoid stashing a pointer toTodd C. Miller
the return value of getgrgid(3) or getgrnam(3) which relies on undefined behavior. The rdist server will now use getgroups(2) to determine group membership of the invoking user. In addition, there is now one implementation of tilde expansion instead of two. OK tb@ tim@
2018-09-21Use password/group cache functions and avoid stashing a pointer toTodd C. Miller
the return value of getgrgid(3) or getgrnam(3) which relies on undefined behavior. The rdist server will now use getgroups(2) to determine group membership of the invoking user. In addition, there is now one implementation of tilde expansion instead of two. OK tb@ tim@
2018-09-21Allow ssh_config ForwardX11Timeout=0 to disable the timeout and allowDamien Miller
X11 connections in untrusted mode indefinitely. ok dtucker@
2018-09-21when compiled with GSSAPI support, cache supported method OIDs byDamien Miller
calling ssh_gssapi_prepare_supported_oids() regardless of whether GSSAPI authentication is enabled in the main config. This avoids sandbox violations for configurations that enable GSSAPI auth later, e.g. Match user djm GSSAPIAuthentication yes bz#2107; ok dtucker@
2018-09-21In sshkey_in_file(), ignore keys that are considered for being tooDamien Miller
short (i.e. SSH_ERR_KEY_LENGTH). These keys will not be considered to be "in the file". This allows key revocation lists to contain short keys without the entire revocation list being considered invalid. bz#2897; ok dtucker
2018-09-21Treat connections with ProxyJump specified the same as ones with aDamien Miller
ProxyCommand set with regards to hostname canonicalisation (i.e. don't try to canonicalise the hostname unless CanonicalizeHostname is set to 'always'). Patch from Sven Wegener via bz#2896
2018-09-20actually make CASignatureAlgorithms available as a config optionDamien Miller
2018-09-20fix indentationJonathan Gray
ok krw@ millert@
2018-09-20fix indentationJonathan Gray
ok krw@ millert@
2018-09-20Import updated moduli.Darren Tucker
2018-09-20reorder CASignatureAlgorithms, and add them to the various -o lists;Jason McIntyre
ok djm
2018-09-20fix "ssh -Q sig" to show correct signature algorithm list (it wasDamien Miller
erroneously showing certificate algorithms); prompted by markus@
2018-09-20add CASignatureAlgorithms option for the client, allowing it to specifyDamien Miller
which signature algorithms may be used by CAs when signing certificates. Useful if you want to ban RSA/SHA1; ok markus@
2018-09-20Add sshd_config CASignatureAlgorithms option to allow control overDamien Miller
which signature algorithms a CA may use when signing certificates. In particular, this allows a sshd to ban certificates signed with RSA/SHA1. ok markus@
2018-09-19Make "ssh-add -q" do what it says on the tin: silence output fromDamien Miller
successful operations. Based on patch from Thijs van Dijk; ok dtucker@ deraadt@
2018-09-18Fix typo in previous: group_from_gid(st->st_gid, 1), not st_uid.Theo Buehler
This broke the chmod regression test, as noted and tracked down by bluhm. ok millert
2018-09-18i forgot to sync sndiod with aucat/dsp.c rev 1.12miko
2018-09-18clear p->ctx array with memset(); ok ratchov@miko
2018-09-18Use user_from_uid(3) if getlogin(2) fails, storing the uid as aTodd C. Miller
string if there is no passwd entry. OK tb@
2018-09-17Use the strict pragma for better warnings.Todd C. Miller
2018-09-17When choosing a prime from the moduli file, avoid re-using theTodd C. Miller
linenum variable for something that is not a line number to avoid the confusion that resulted in the bug in rev. 1.64. This also lets us pass the actual linenum to parse_prime() so the error messages include the correct line number. OK markus@ some time ago.
2018-09-17Move tally mark printing out of the main benchmark loop; ok tb@cheloha
2018-09-17unveil(2) "path" (/dev/audioctl0 by default, or changed via args) with rwRicardo Mestre
access and disable further calls to unveil(2) with unveil(NULL, NULL). OK ratchov@
2018-09-16Unbreak tree with 'char *' -> 'const char *' forKenneth R Westerback
userid().
2018-09-16Use uid_from_user(3) and gid_from_group(3) in utilities thatTodd C. Miller
do repeated lookups. OK tb@
2018-09-16Use user_from_uid(3) and group_from_gid(3) in a few more placesTodd C. Miller
that do repeated lookups. OK tb@
2018-09-16Use user_from_uid(3) and group_from_gid(3) to avoid extra passwdTodd C. Miller
and group file lookups. This required a bit of reordering of the file mode handling bits to deal with the const char *. OK tb@
2018-09-16Replace the local getname() and getuserid() functions with callsTodd C. Miller
to user_from_uid(3) and uid_from_user(3). This requires sprinkling const in a few places to match the return value of user_from_uid(3). OK tb@
2018-09-14Do not leak a file descriptor when opening nohup.out. Make sureAlexander Bluhm
that stdout and stderr are not closed. from Nan Xiao
2018-09-14No longer needed since the ping/ping6 unification.Florian Obser
Pointed out by Clemens Goessnitzer (clemens AT goessnitzer.info), thanks!
2018-09-14second try, deals properly with missing and private-only keys:Damien Miller
Use consistent format in debug log for keys readied, offered and received during public key authentication. This makes it a little easier to see what is going on, as each message now contains (where available) the key filename, its type and fingerprint, and whether the key is hosted in an agent or a token.
2018-09-14revert following; deals badly with agent keysDamien Miller
revision 1.285 date: 2018/09/14 04:17:12; author: djm; state: Exp; lines: +47 -26; commitid: lflGFcNb2X2HebaK; Use consistent format in debug log for keys readied, offered and received during public key authentication. This makes it a little easier to see what is going on, as each message now contains the key filename, its type and fingerprint, and whether the key is hosted in an agent or a token.
2018-09-14garbage-collect moribund ssh_new_private() API.Damien Miller
2018-09-14Use consistent format in debug log for keys readied, offered andDamien Miller
received during public key authentication. This makes it a little easier to see what is going on, as each message now contains the key filename, its type and fingerprint, and whether the key is hosted in an agent or a token.
2018-09-13Fix warnings caused by user_from_uid() and group_from_gid() nowTodd C. Miller
returning const char *.
2018-09-13hold our collective noses and use the openssl-1.1.x API in OpenSSH;Damien Miller
feedback and ok tb@ jsing@ markus@
2018-09-12fix edit mistake; spotted by jmc@Damien Miller
2018-09-12add SSH_ALLOWED_CA_SIGALGS - the default list of signature algorithmsDamien Miller
that are allowed for CA signatures. Notably excludes ssh-dsa. ok markus@
2018-09-12add sshkey_check_cert_sigtype() that checks a cert->signature_typeDamien Miller
against a supplied whitelist; ok markus