[openssh-commits] [openssh] branch master updated (396d32f3 -> 4aa2717d)
git+noreply at mindrot.org
git+noreply at mindrot.org
Wed Oct 7 13:34:16 AEDT 2020
This is an automated email from the git hooks/post-receive script.
djm pushed a change to branch master
in repository openssh.
from 396d32f3 upstream: There are lots of place where we want to redirect stdin,
new 2d39fc9f upstream: Allow full range of UIDs and GIDs for sftp chown and
new af889a40 upstream: when ordering host key algorithms in the client, consider
new 3d4c2016 upstream: Agent protocol draft is now at rev 4. ok djm@
new e79957e8 upstream: disable UpdateHostkeys by default if VerifyHostKeyDNS is
new f4f14e02 upstream: simply disable UpdateHostkeys when a certificate
new aa623142 upstream: revert kex->flags cert hostkey downgrade back to a plain
new b70e3371 upstream: don't UpdateHostkeys when the hostkey is verified by the
new 04c06d04 upstream: Fix UpdateHostkeys/HashKnownHosts/CheckHostIP bug
new 4aa2717d upstream: Disable UpdateHostkeys when hostkey checking fails
The 9 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Detailed log of new commits:
commit 4aa2717d7517cff4bc423a6cfba3a2defb055aea
Author: djm at openbsd.org <djm at openbsd.org>
Date: Wed Oct 7 02:26:28 2020 +0000
upstream: Disable UpdateHostkeys when hostkey checking fails
If host key checking fails (i.e. a wrong host key is recorded for the
server) and the user elects to continue (via StrictHostKeyChecking=no),
then disable UpdateHostkeys for the session.
reminded by Mark D. Baushke; ok markus@
OpenBSD-Commit-ID: 98b524f121f4252309dd21becd8c4cacb0c6042a
commit 04c06d04475f1f673e9d9743710d194453fe3888
Author: djm at openbsd.org <djm at openbsd.org>
Date: Wed Oct 7 02:25:43 2020 +0000
upstream: Fix UpdateHostkeys/HashKnownHosts/CheckHostIP bug
When all of UpdateHostkeys, HashKnownHosts and ChechHostIP
were enabled and new host keys were learned, known_hosts IP
entries were not being recorded for new host keys.
reported by matthieu@ ok markus@
OpenBSD-Commit-ID: a654a8290bd1c930aac509e8158cf85e42e49cb7
commit b70e33711291f3081702133175a41cccafc0212a
Author: djm at openbsd.org <djm at openbsd.org>
Date: Wed Oct 7 02:24:51 2020 +0000
upstream: don't UpdateHostkeys when the hostkey is verified by the
GlobalKnownHostsFile file, support only UserKnownHostsFile matches
suggested by Mark D. Baushke; feedback and ok markus@
OpenBSD-Commit-ID: eabb771a6add676c398d38a143a1aff5f04abbb9
commit aa623142e426ca1ab9db77b06dcc9b1b70bd102b
Author: djm at openbsd.org <djm at openbsd.org>
Date: Wed Oct 7 02:22:23 2020 +0000
upstream: revert kex->flags cert hostkey downgrade back to a plain
key (commitid VtF8vozGOF8DMKVg). We now do this a simpler way that needs less
plumbing.
ok markus@
OpenBSD-Commit-ID: fb92d25b216bff8c136da818ac2221efaadf18ed
commit f4f14e023cafee1cd9ebe4bb0db4029e6e1fafac
Author: djm at openbsd.org <djm at openbsd.org>
Date: Wed Oct 7 02:20:35 2020 +0000
upstream: simply disable UpdateHostkeys when a certificate
successfully authenticated the host; simpler than the complicated plumbing
via kex->flags we have now.
ok markus@
OpenBSD-Commit-ID: 80e39644eed75717d563a7f177e8117a0e14f42c
commit e79957e877db42c4c68fabcf6ecff2268e53acb5
Author: djm at openbsd.org <djm at openbsd.org>
Date: Wed Oct 7 02:18:45 2020 +0000
upstream: disable UpdateHostkeys by default if VerifyHostKeyDNS is
enabled; suggested by Mark D. Baushke
OpenBSD-Commit-ID: 85a1b88592c81bc85df7ee7787dbbe721a0542bf
commit 3d4c2016bae1a6f14b48c1150a4c79ca4c9968bd
Author: dtucker at openbsd.org <dtucker at openbsd.org>
Date: Tue Oct 6 07:12:04 2020 +0000
upstream: Agent protocol draft is now at rev 4. ok djm@
OpenBSD-Commit-ID: 8c01ea3aae48aab45e01b7421b0fca2dad5e7837
commit af889a40ffc113af9105c03d7b32131eb4372d50
Author: djm at openbsd.org <djm at openbsd.org>
Date: Sun Oct 4 09:45:01 2020 +0000
upstream: when ordering host key algorithms in the client, consider
the ECDSA key subtype; ok markus@
OpenBSD-Commit-ID: 3097686f853c61ff61772ea35f8b699931392ece
commit 2d39fc9f7e039351daa3d6aead1538ac29258add
Author: dtucker at openbsd.org <dtucker at openbsd.org>
Date: Sun Oct 4 03:04:02 2020 +0000
upstream: Allow full range of UIDs and GIDs for sftp chown and
chgrp on 32bit platforms instead of being limited by LONG_MAX. bz#3206,
found by booking00 at sina.cn, ok markus@
OpenBSD-Commit-ID: 373b7bbf1f15ae482d39567ce30d18b51c9229b5
Summary of changes:
PROTOCOL.agent | 8 ++---
clientloop.c | 8 +----
hostfile.c | 17 +++++++---
hostfile.h | 4 +--
kex.h | 8 ++---
readconf.c | 7 ++--
sftp.c | 12 +++----
ssh_config.5 | 8 +++--
sshconnect.c | 100 ++++++++++++++++++++++++++++++---------------------------
sshconnect.h | 4 +--
sshconnect2.c | 15 ++++-----
11 files changed, 96 insertions(+), 95 deletions(-)
--
To stop receiving notification emails like this one, please contact
djm at mindrot.org.
More information about the openssh-commits
mailing list