summaryrefslogtreecommitdiff
path: root/usr.bin
AgeCommit message (Collapse)Author
2024-09-22remove some unused defines; ok djm@Jonathan Gray
2024-09-20remove unneeded semicolons; checked by millert@Jonathan Gray
2024-09-19openssh-9.9Damien Miller
2024-09-18Fix a memory leakJob Snijders
Found by Martin Cracauer "look right" tb@
2024-09-16Add copy mode commands which were missed when descriptions were added,Nicholas Marriott
from Julian Prein, GitHub issue 4121.
2024-09-16Change the behaviour of extended-keys always slightly so thatNicholas Marriott
applications can still enter mode 2 if they want, they just cannot turn extended keys off entirely. From Stanislav Kljuhhin.
2024-09-16Add a prefix timeout option, from Conor Taylor in GitHub issue 4108.Nicholas Marriott
2024-09-16use 64 bit math to avoid signed underflow. upstream code relies onDamien Miller
using -fwrapv to provide defined over/underflow behaviour, but we use -ftrapv to catch integer errors and abort the program. ok dtucker@
2024-09-15minor grammar/sort fixes for refuseconnection; ok djmJason McIntyre
2024-09-15remove unused variablesJonathan Gray
2024-09-15bad whitespace in config dump outputDamien Miller
2024-09-15update the Streamlined NTRU Prime code from the "ref" implementationDamien Miller
in SUPERCOP 20201130 to the "compact" implementation in SUPERCOP 20240808. The new version is substantially faster. Thanks to Daniel J Bernstein for pointing out the new implementation (and of course for writing it). tested in snaps/ok deraadt@
2024-09-15document Match invalid-userDamien Miller
2024-09-15add a "Match invalid-user" predicate to sshd_config Match options.Damien Miller
This allows writing Match conditions that trigger for invalid username. E.g. PerSourcePenalties refuseconnection:90s Match invalid-user RefuseConnection yes Will effectively penalise bots try to guess passwords for bogus accounts, at the cost of implicitly revealing which accounts are invalid. feedback markus@
2024-09-15Add a "refuseconnection" penalty class to sshd_configDamien Miller
PerSourcePenalties This allows penalising connection sources that have had connections dropped by the RefuseConnection option. ok markus@
2024-09-15Add a sshd_config "RefuseConnection" optionDamien Miller
If set, this will terminate the connection at the first authentication request (this is the earliest we can evaluate sshd_config Match blocks) ok markus@
2024-09-15switch sshd_config Match processing to the argv tokeniser too;Damien Miller
ok markus@
2024-09-15switch "Match" directive processing over to the argv stringDamien Miller
tokeniser, making it possible to use shell-like quoting in Match directives, particularly "Match exec". ok markus@
2024-09-15include pathname in some of the ssh-keygen passphrase prompts. HelpsDamien Miller
the user know what's going on when ssh-keygen is invoked via other tools. Requested in GHPR503
2024-09-15Do not apply authorized_keys options when signature verificationDamien Miller
fails. Prevents restrictive key options being incorrectly applied to subsequent keys in authorized_keys. bz3733, ok markus@
2024-09-14Drop the "Giant panda discovered" entry because it looks likeIngo Schwarze
half-way between misleadingly eurocentric and urban legend. It was so obviously suspect that it had already been marked "(?!)" since at least 4.3BSD-Tahoe (June 1988). Brought up by <Rob dot Schmersel at bahnhof dot se>, additional research by <me at FletcherPorter dot com>, see https://marc.info/?l=openbsd-bugs&m=172634202204747 for details.
2024-09-13rectify comment about syncing trace points letters, kdump usage has noneKlemens Nanni
kdump.c r1.138 in 2019 dropped the letters list in favour of [-t trstr].
2024-09-12Relax absolute path requirement back to what it was prior to OpenSSH 9.8,Damien Miller
which incorrectly required that sshd was started with an absolute path in inetd mode. bz3717, patch from Colin Wilson
2024-09-11Mouse move keys are not useful as key bindings because we do not turnNicholas Marriott
them on unless the application requests them. Ignore them so they do not cause the prefix to be canceled, GitHub issue 4111.
2024-09-11fstat(2) can't return an S_IFLNK, so delete that test.Philip Guenther
Also, switch to S_IS*() tests and update the manpage to reflect that POSIX-2024 has no substantive changes for wc(1) ok op@ millert@
2024-09-09document the mlkem768x25519-sha256 key exchange algorithmChristian Weisgerber
2024-09-09pull post-quantum ML-KEM/x25519 key exchange out from compile-timeDamien Miller
flag now than an IANA codepoint has been assigned for the algorithm. Add mlkem768x25519-sha256 in 2nd KexAlgorithms preference slot. ok markus@
2024-09-06make parsing user@host consistently look for the last '@' in theDamien Miller
string rather than the first. This makes it possible to use usernames that contain '@' characters. Prompted by Max Zettlmeißl; feedback/ok millert@
2024-09-04be more strict in parsing key type names. Only allow shortnames (e.gDamien Miller
"rsa") in user-interface code and require full SSH protocol names (e.g. "ssh-rsa") everywhere else. Prompted by bz3725; ok markus@
2024-09-04fix RCSID in outputDamien Miller
2024-09-03envrionment -> environment;Jason McIntyre
2024-09-03allow the "Include" directive to expand the same set of %-tokensDamien Miller
that "Match Exec" and environment variables. ok dtucker@
2024-09-02missing ifdefDamien Miller
2024-09-02Add experimental support for hybrid post-quantum key exchangeDamien Miller
ML-KEM768 with ECDH/X25519 from the Internet-draft: https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-ssh-pq-ke-03 This is based on previous patches from markus@ but adapted to use the final FIPS203 standard ML-KEM using a formally-verified implementation from libcrux. Note this key exchange method is still a draft and thus subject to change. It is therefore disabled by default; set MLKEM=yes to build it. We're making it available now to make it easy for other SSH implementations to test against it. ok markus@ deraadt@
2024-08-31sync x509v3_add_value with x509_utl.cTheo Buehler
2024-08-30Add and use local copy of X509V3_add_value()Theo Buehler
The public API will be removed. This fixes its only consumer.
2024-08-30use strtonum() to parse numeric option values instead of atoi()Omar Polo
looks reasonable to deraadt ok/improvements bluhm@
2024-08-30zap line missed in previous removal; ok tbJason McIntyre
2024-08-29fix handling of Return-PathOmar Polo
It doesn't handle angular brackets in Return-Path, which are fine per RFC 5332 (section 3.6.7). Diff from Sven M. Hallberg with a tiny change by me.
2024-08-29Adjust documentation for check/pubcheck removalTheo Buehler
ok beck
2024-08-29Remove check and pubcheck from openssl pkey and pkeyparamTheo Buehler
The underlying API will be removed, so these commands have to go. ok beck
2024-08-29ocsp.c: zap trailing whitespaceTheo Buehler
2024-08-29Show expensive mbuf operations in netstat(1) statistics.Alexander Bluhm
If the memory layout is not optimal, m_defrag(), m_prepend(), m_pullup(), and m_pulldown() will allocate mbufs or copy memory. Count these operations to find possible optimizations. input dhill@; OK mvs@
2024-08-29Update root hints.Florian Obser
b.root-servers.net renumbered on 2023-11-27. OK phessler, jsg, sthen, deraadt
2024-08-28Fix the case where the pattern space is empty but does not startTodd C. Miller
with a NUL character, which might occur after using the D command. From Mohamed Akram
2024-08-27Display hyperlinks in copy mode and add copy_cursor_hyperlink format toNicholas Marriott
get the hyperlink under the cursor.
2024-08-27Add search_count and search_count_partial formats in copy mode, GitHubNicholas Marriott
issue 4091.
2024-08-27Do not reset mouse pane if clicked on status line, it may have been setNicholas Marriott
by a range.
2024-08-26replace hand-rolled number parser with strtonumOmar Polo
original report by Collin Funk ok bluhm, millert
2024-08-26ts.c: typo flaf -> flagTheo Buehler