[openssh-commits] [openssh] branch master updated (3ab6fccc -> 4be56399)
git+noreply at mindrot.org
git+noreply at mindrot.org
Wed May 27 21:54:59 AEST 2020
This is an automated email from the git hooks/post-receive script.
djm pushed a change to branch master
in repository openssh.
from 3ab6fccc prefer ln to cp for temporary copy of sshd
new ecb2c02d upstream: fix compilation with DEBUG_KEXDH; bz#3160 ok dtucker@
new 5a442cec upstream: clarify role of FIDO tokens in multi-factor
new 82945181 upstream: fix non-ASCII quote that snuck in; spotted by Gabriel
new 05a65140 upstream: when ordering the hostkey algorithms to request from a
new f2d84f1b upstream: preserve group/world read permission on known_hosts
new 1e70dc32 upstream: always call fido_init(); previous behaviour only called
new 2ad7b7e4 upstream: Enable credProtect extension when generating a resident
new d7d753e2 upstream: we are still aiming for pre-C99 ...
new af8b16fb upstream: fix off-by-one error that caused sftp downloads to make
new 4b307faf upstream: sshd listener must not block if reexecd sshd exits
new 2a63ce5c upstream: avoid possible NULL deref; from Pedro Martelletto
new 756c6f66 upstream: add fmt_timeframe() (from bgpd) to format a time
new 9c5f64b6 upstream: improve logging for MaxStartups connection throttling:
new 0c111eb8 upstream: Restrict ssh-agent from signing web challenges for FIDO
new 4be56399 upstream: fix memleak of signature; from Pedro Martelletto
The 15 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Detailed log of new commits:
commit 4be563994c0cbe9856e7dd3078909f41beae4a9c
Author: djm at openbsd.org <djm at openbsd.org>
Date: Tue May 26 01:59:46 2020 +0000
upstream: fix memleak of signature; from Pedro Martelletto
OpenBSD-Commit-ID: d0a6eb07e77c001427d738b220dd024ddc64b2bb
commit 0c111eb84efba7c2a38b2cc3278901a0123161b9
Author: djm at openbsd.org <djm at openbsd.org>
Date: Tue May 26 01:26:58 2020 +0000
upstream: Restrict ssh-agent from signing web challenges for FIDO
keys.
When signing messages in ssh-agent using a FIDO key that has an
application string that does not start with "ssh:", ensure that the
message being signed is one of the forms expected for the SSH protocol
(currently pubkey authentication and sshsig signatures).
This prevents ssh-agent forwarding on a host that has FIDO keys
attached granting the ability for the remote side to sign challenges
for web authentication using those keys too.
Note that the converse case of web browsers signing SSH challenges is
already precluded because no web RP can have the "ssh:" prefix in the
application string that we require.
ok markus@
OpenBSD-Commit-ID: 9ab6012574ed0352d2f097d307f4a988222d1b19
commit 9c5f64b6cb3a68b99915202d318b842c6c76cf14
Author: djm at openbsd.org <djm at openbsd.org>
Date: Tue May 26 01:09:05 2020 +0000
upstream: improve logging for MaxStartups connection throttling:
have sshd log when it starts and stops throttling and periodically while in
this state. bz#3055 ok markus@
OpenBSD-Commit-ID: 2e07a09a62ab45d790d3d2d714f8cc09a9ac7ab9
commit 756c6f66aee83a5862a6f936a316f761532f3320
Author: djm at openbsd.org <djm at openbsd.org>
Date: Tue May 26 01:06:52 2020 +0000
upstream: add fmt_timeframe() (from bgpd) to format a time
interval in a human- friendly format. Switch copyright for this file from BSD
to MIT to make it easier to add Henning's copyright for this function. ok
markus@
OpenBSD-Commit-ID: 414a831c662df7e68893e5233e86f2cac081ccf9
commit 2a63ce5cd6d0e782783bf721462239b03757dd49
Author: djm at openbsd.org <djm at openbsd.org>
Date: Mon May 18 04:29:35 2020 +0000
upstream: avoid possible NULL deref; from Pedro Martelletto
OpenBSD-Commit-ID: e6099c3fbb70aa67eb106e84d8b43f1fa919b721
commit 4b307faf2fb0e63e51a550b37652f7f972df9676
Author: markus at openbsd.org <markus at openbsd.org>
Date: Fri May 15 08:34:03 2020 +0000
upstream: sshd listener must not block if reexecd sshd exits
in write(2) on config_s[0] if the forked child exits early before finishing
recv_rexec_state (e.g. with fatal()) because config_s[1] stays open in the
parent. this prevents the parent from accepting new connections. ok djm,
deraadt
OpenBSD-Commit-ID: 92ccfeb939ccd55bda914dc3fe84582158c4a9ef
commit af8b16fb2cce880341c0ee570ceb0d84104bdcc0
Author: djm at openbsd.org <djm at openbsd.org>
Date: Fri May 15 03:57:33 2020 +0000
upstream: fix off-by-one error that caused sftp downloads to make
one more concurrent request that desired. This prevented using sftp(1) in
unpipelined request/response mode, which is useful when debugging. Patch from
Stephen Goetze in bz#3054
OpenBSD-Commit-ID: 41b394ebe57037dbc43bdd0eef21ff0511191f28
commit d7d753e2979f2d3c904b03a08d30856cd2a6e892
Author: deraadt at openbsd.org <deraadt at openbsd.org>
Date: Wed May 13 22:38:41 2020 +0000
upstream: we are still aiming for pre-C99 ...
OpenBSD-Commit-ID: a240fc9cbe60bc4e6c3d24d022eb4ab01fe1cb38
commit 2ad7b7e46408dbebf2a4efc4efd75a9544197d57
Author: djm at openbsd.org <djm at openbsd.org>
Date: Wed May 13 10:08:02 2020 +0000
upstream: Enable credProtect extension when generating a resident
key.
The FIDO 2.1 Client to Authenticator Protocol introduced a "credProtect"
feature to better protect resident keys. This option allows (amone other
possibilities) requiring a PIN prior to all operations that may retrieve
the key handle.
Patch by Pedro Martelletto; ok djm and markus
OpenBSD-Commit-ID: 013bc06a577dcaa66be3913b7f183eb8cad87e73
commit 1e70dc3285fc9b4f6454975acb81e8702c23dd89
Author: djm at openbsd.org <djm at openbsd.org>
Date: Wed May 13 09:57:17 2020 +0000
upstream: always call fido_init(); previous behaviour only called
fido_init() when SK_DEBUG was defined. Harmless with current libfido2, but
this isn't guaranteed in the future.
OpenBSD-Commit-ID: c7ea20ff2bcd98dd12015d748d3672d4f01f0864
commit f2d84f1b3fa68d77c99238d4c645d0266fae2a74
Author: djm at openbsd.org <djm at openbsd.org>
Date: Wed May 13 09:55:57 2020 +0000
upstream: preserve group/world read permission on known_hosts
file across runs of "ssh-keygen -Rf /path". The old behaviour was to remove
all rights for group/other. bz#3146 ok dtucker@
OpenBSD-Commit-ID: dc369d0e0b5dd826430c63fd5f4b269953448a8a
commit 05a651400da6fbe12296c34e3d3bcf09f034fbbf
Author: djm at openbsd.org <djm at openbsd.org>
Date: Wed May 13 09:52:41 2020 +0000
upstream: when ordering the hostkey algorithms to request from a
server, prefer certificate types if the known_hosts files contain a key
marked as a @cert-authority; bz#3157 ok markus@
OpenBSD-Commit-ID: 8f194573e5bb7c01b69bbfaabc68f27c9fa5e0db
commit 829451815ec207e14bd54ff5cf7e22046816f042
Author: djm at openbsd.org <djm at openbsd.org>
Date: Tue May 12 01:41:32 2020 +0000
upstream: fix non-ASCII quote that snuck in; spotted by Gabriel
Kihlman
OpenBSD-Commit-ID: 04bcde311de2325d9e45730c744c8de079b49800
commit 5a442cec92c0efd6fffb4af84bf99c70af248ef3
Author: djm at openbsd.org <djm at openbsd.org>
Date: Mon May 11 02:11:29 2020 +0000
upstream: clarify role of FIDO tokens in multi-factor
authentictation; mostly from Pedro Martelletto
OpenBSD-Commit-ID: fbe05685a1f99c74b1baca7130c5a03c2df7c0ac
commit ecb2c02d994b3e21994f31a70ff911667c262f1f
Author: djm at openbsd.org <djm at openbsd.org>
Date: Fri May 8 05:13:14 2020 +0000
upstream: fix compilation with DEBUG_KEXDH; bz#3160 ok dtucker@
OpenBSD-Commit-ID: 832e771948fb45f2270e8b8895aac36d176ba17a
Summary of changes:
PROTOCOL.u2f | 7 ++++
hostfile.c | 14 +++++++-
hostfile.h | 3 +-
kexdh.c | 3 +-
misc.c | 71 +++++++++++++++++++++++++-----------
misc.h | 3 +-
sftp-client.c | 4 +--
sk-usbhid.c | 74 ++++++++++++++++++++++++++++++++++----
ssh-agent.c | 110 ++++++++++++++++++++++++++++++++++++++++++++++++++------
ssh-keygen.c | 12 +++++--
ssh-sk-helper.c | 13 ++++---
sshconnect2.c | 20 ++++++++---
sshd.c | 100 ++++++++++++++++++++++++++++++++++++---------------
13 files changed, 351 insertions(+), 83 deletions(-)
--
To stop receiving notification emails like this one, please contact
djm at mindrot.org.
More information about the openssh-commits
mailing list