[openssh-commits] [openssh] branch master updated (6eafc52a4 -> b9c318777)
git+noreply at mindrot.org
git+noreply at mindrot.org
Tue Dec 30 11:37:50 AEDT 2025
This is an automated email from the git hooks/post-receive script.
djm pushed a change to branch master
in repository openssh.
from 6eafc52a4 Update ssh-agent.1
new 55b6b1697 upstream: Add sshbuf_consume_upto_child(), to similify particular
new ca313fef2 upstream: Enforce maximum packet/block limit during
new dd49a87bf upstream: Remove bug compatibility for implementations that don't
new b9c318777 upstream: unit tests for sshbuf_consume_upto_child()
The 4 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "add" were already present in the repository and have only
been added to this reference.
Detailed log of new commits:
commit b9c318777eb40db66fb92df87666c3642467d0e7
Author: djm at openbsd.org <djm at openbsd.org>
Date: Tue Dec 30 00:12:58 2025 +0000
upstream: unit tests for sshbuf_consume_upto_child()
OpenBSD-Regress-ID: 13cbd0370ebca7c61c35346b3e0356517719a447
commit dd49a87bf4e4a219978bf20f03e2a72041f57b2f
Author: djm at openbsd.org <djm at openbsd.org>
Date: Tue Dec 30 00:35:37 2025 +0000
upstream: Remove bug compatibility for implementations that don't
support rekeying. AFAIK this is only an ancient Sun SSH version.
If such an implementation tries to interoperate with OpenSSH, it
will eventually fail when the transport needs rekeying.
This is probably long enough to use it to download a modern SSH
implementation that lacks this problem :)
ok markus@ deraadt@
OpenBSD-Commit-ID: 228a502fee808cf8b7caee23169eb6a1ab1c331a
commit ca313fef2deed90668fe0706da8529310092d1dd
Author: djm at openbsd.org <djm at openbsd.org>
Date: Tue Dec 30 00:22:58 2025 +0000
upstream: Enforce maximum packet/block limit during
pre-authentication phase
OpenSSH doesn't support rekeying before authentication completes to
minimise pre-auth attack surface.
Given LoginGraceTime, MaxAuthTries and strict KEX, it would be
difficult to send enough data or packets before authentication
completes to reach a point where rekeying is required, but we'd
prefer it to be completely impossible.
So this applies the default volume/packet rekeying limits to the
pre-auth phase. If these limits are exceeded the connection will
simply be closed.
ok dtucker markus
OpenBSD-Commit-ID: 70415098db739058006e4ebd1630b6bae8cc8bf6
commit 55b6b1697433eca98052f5c45281133ca793a9c8
Author: djm at openbsd.org <djm at openbsd.org>
Date: Mon Dec 29 23:52:09 2025 +0000
upstream: Add sshbuf_consume_upto_child(), to similify particular
parsing patterns using parent/child buffer; ok markus@
OpenBSD-Commit-ID: c11ed27907751f2a16c1283313e77f88617e4852
Summary of changes:
packet.c | 98 ++++++++++++++++++++++++----------
regress/unittests/sshbuf/test_sshbuf.c | 39 +++++++++++++-
sshbuf.c | 22 +++++++-
sshbuf.h | 20 ++++++-
sshconnect.c | 8 ++-
sshd-session.c | 5 +-
6 files changed, 157 insertions(+), 35 deletions(-)
--
To stop receiving notification emails like this one, please contact
djm at mindrot.org.
More information about the openssh-commits
mailing list