[openssh-commits] [openssh] branch master updated (eaf8672b -> 0caff053)
git+noreply at mindrot.org
git+noreply at mindrot.org
Thu Aug 27 11:28:42 AEST 2020
This is an automated email from the git hooks/post-receive script.
djm pushed a change to branch master
in repository openssh.
from eaf8672b Remove check for 'ent' command.
new e9c20028 upstream: let the "Confirm user presence for key ..." ssh-askpass
new d0a195c8 upstream: let ssh_config(5)'s AddKeysToAgent keyword accept a time
new 1196d7f4 upstream: ssh-keyscan(1): simplify conloop() with timercmp(3),
new 9b8ad938 upstream: support for user-verified FIDO keys
new 801c9f09 upstream: support for requiring user verified FIDO keys in sshd
new 642e06d0 upstream: major rework of FIDO token selection logic
new b649b3da upstream: preserve verify-required for resident FIDO keys
new 0caff053 upstream: Request PIN ahead of time for certain FIDO actions
The 8 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Detailed log of new commits:
commit 0caff05350bd5fc635674c9e051a0322faba5ae3
Author: djm at openbsd.org <djm at openbsd.org>
Date: Thu Aug 27 01:08:45 2020 +0000
upstream: Request PIN ahead of time for certain FIDO actions
When we know that a particular action will require a PIN, such as
downloading resident keys or generating a verify-required key, request
the PIN before attempting it.
joint work with Pedro Martelletto; ok markus@
OpenBSD-Commit-ID: 863182d38ef075bad1f7d20ca485752a05edb727
commit b649b3daa6d4b8ebe1bd6de69b3db5d2c03c9af0
Author: djm at openbsd.org <djm at openbsd.org>
Date: Thu Aug 27 01:08:19 2020 +0000
upstream: preserve verify-required for resident FIDO keys
When downloading a resident, verify-required key from a FIDO token,
preserve the verify-required in the private key that is written to
disk. Previously we weren't doing that because of lack of support
in the middleware API.
from Pedro Martelletto; ok markus@ and myself
OpenBSD-Commit-ID: 201c46ccdd227cddba3d64e1bdbd082afa956517
commit 642e06d0df983fa2af85126cf4b23440bb2985bf
Author: djm at openbsd.org <djm at openbsd.org>
Date: Thu Aug 27 01:07:51 2020 +0000
upstream: major rework of FIDO token selection logic
When PINs are in use and multiple FIDO tokens are attached to a host, we
cannot just blast requests at all attached tokens with the PIN specified
as this will cause the per-token PIN failure counter to increment. If
this retry counter hits the token's limit (usually 3 attempts), then the
token will lock itself and render all (web and SSH) of its keys invalid.
We don't want this.
So this reworks the key selection logic for the specific case of
multiple keys being attached. When multiple keys are attached and the
operation requires a PIN, then the user must touch the key that they
wish to use first in order to identify it.
This may require multiple touches, but only if there are multiple keys
attached AND (usually) the operation requires a PIN. The usual case of a
single key attached should be unaffected.
Work by Pedro Martelletto; ok myself and markus@
OpenBSD-Commit-ID: 637d3049ced61b7a9ee796914bbc4843d999a864
commit 801c9f095e6d8b7b91aefd98f5001c652ea13488
Author: djm at openbsd.org <djm at openbsd.org>
Date: Thu Aug 27 01:07:09 2020 +0000
upstream: support for requiring user verified FIDO keys in sshd
This adds a "verify-required" authorized_keys flag and a corresponding
sshd_config option that tells sshd to require that FIDO keys verify the
user identity before completing the signing/authentication attempt.
Whether or not user verification was performed is already baked into the
signature made on the FIDO token, so this is just plumbing that flag
through and adding ways to require it.
feedback and ok markus@
OpenBSD-Commit-ID: 3a2313aae153e043d57763d766bb6d55c4e276e6
commit 9b8ad93824c682ce841f53f3b5762cef4e7cc4dc
Author: djm at openbsd.org <djm at openbsd.org>
Date: Thu Aug 27 01:06:18 2020 +0000
upstream: support for user-verified FIDO keys
FIDO2 supports a notion of "user verification" where the user is
required to demonstrate their identity to the token before particular
operations (e.g. signing). Typically this is done by authenticating
themselves using a PIN that has been set on the token.
This adds support for generating and using user verified keys where
the verification happens via PIN (other options might be added in the
future, but none are in common use now). Practically, this adds
another key generation option "verify-required" that yields a key that
requires a PIN before each authentication.
feedback markus@ and Pedro Martelletto; ok markus@
OpenBSD-Commit-ID: 57fd461e4366f87c47502c5614ec08573e6d6a15
commit 1196d7f49d4fbc90f37e550de3056561613b0960
Author: cheloha at openbsd.org <cheloha at openbsd.org>
Date: Wed Aug 12 01:23:45 2020 +0000
upstream: ssh-keyscan(1): simplify conloop() with timercmp(3),
timersub(3); ok djm@
OpenBSD-Commit-ID: a102acb544f840d33ad73d40088adab4a687fa27
commit d0a195c89e26766d3eb8f3e4e2a00ebc98b57795
Author: djm at openbsd.org <djm at openbsd.org>
Date: Tue Aug 11 09:49:57 2020 +0000
upstream: let ssh_config(5)'s AddKeysToAgent keyword accept a time
limit for keys in addition to its current flag options. Time-limited keys
will automatically be removed from ssh-agent after their expiry time has
passed; ok markus@
OpenBSD-Commit-ID: 792e71cacbbc25faab5424cf80bee4a006119f94
commit e9c2002891a7b8e66f4140557a982978f372e5a3
Author: djm at openbsd.org <djm at openbsd.org>
Date: Tue Aug 11 09:45:54 2020 +0000
upstream: let the "Confirm user presence for key ..." ssh-askpass
notification respect $SSH_ASKPASS_REQUIRE; ok markus@
OpenBSD-Commit-ID: 7c1a616b348779bda3b9ad46bf592741f8e206c1
Summary of changes:
auth-options.c | 20 +-
auth-options.h | 4 +-
auth.c | 9 +-
auth2-pubkey.c | 18 +-
krl.c | 7 +-
monitor.c | 19 +-
monitor_wrap.c | 4 +-
monitor_wrap.h | 5 +-
readconf.c | 85 ++++++--
readconf.h | 3 +-
readpass.c | 23 ++-
servconf.c | 6 +-
servconf.h | 5 +-
sk-api.h | 5 +-
sk-usbhid.c | 600 +++++++++++++++++++++++++++++++++------------------------
ssh-agent.c | 5 +-
ssh-keygen.1 | 24 ++-
ssh-keygen.c | 96 +++++----
ssh-keyscan.c | 18 +-
ssh-keysign.c | 4 +-
ssh-sk.c | 5 +-
ssh_api.c | 10 +-
ssh_config.5 | 23 ++-
sshconnect.c | 5 +-
sshconnect2.c | 37 ++--
sshd.8 | 11 +-
sshd.c | 8 +-
sshd_config.5 | 23 ++-
sshkey.c | 20 +-
sshkey.h | 11 +-
sshsig.c | 16 +-
sshsig.h | 8 +-
32 files changed, 710 insertions(+), 427 deletions(-)
--
To stop receiving notification emails like this one, please contact
djm at mindrot.org.
More information about the openssh-commits
mailing list