Commit Graph

241276 Commits

Author SHA1 Message Date
christos 01b73fc8e1 Sort filters alphabetically; make it easier to add ipf. 2016-03-11 17:01:59 +00:00
christos 01136fa5bc Add support for pf, thanks Kurt Lidl... 2016-03-11 15:35:28 +00:00
wiz 09f9f9fa6e Fix description of /home
From Vadim Ushakov in PR 50938.
2016-03-11 15:18:01 +00:00
matthias d405a55bc6 $% is $(.MEMBER) and not $(.ARCHIVE), $! is $(.ARCHIVE) and not $(.MEMBER) 2016-03-11 15:12:39 +00:00
matthias 449c0b7d1f make parsing of library member targets work. So
lib.a(member.o): something
	cp something member.o
	ar r lib.a member.o
	rm member.o

will work now.
2016-03-11 13:54:47 +00:00
tsutsui 56c764b63d Properly zero out struct fb_devconfig, including rasops_info.
Fix panic after wsconscfg(8) from serial console, caused by
a junk function pointer.
2016-03-11 13:16:55 +00:00
christos 238888033a Add more __dead; pointed out by clang (from tnn@) 2016-03-11 13:15:02 +00:00
skrll 0c4e042b3e Update RPI firmware to version after the following commit
commit a192a05bc8ca597249e5a36875ce382c572ddc97
Author: popcornmix <popcornmix@gmail.com>
Date:   Mon Mar 7 17:21:57 2016 +0000

Raspberry Pi 3 should now boot the armv7.img produced in the
evbarm-earmv7hf builds
2016-03-11 12:34:57 +00:00
sjg 6067bdd115 Handle missing file for Read the same as for Write, since if it
is Deleted we don't care.

Patch from Bryan Drewery.
2016-03-11 07:01:21 +00:00
joerg fbba0696d4 Drop FreeBSD RCS ID, add NetBSD's. 2016-03-11 05:02:32 +00:00
christos 1b8bb90dd8 fix pam build. 2016-03-11 03:54:27 +00:00
christos d600878e36 new openssh 2016-03-11 01:57:14 +00:00
christos 7997655135 merge conflicts 2016-03-11 01:55:00 +00:00
christos 48b0210551 Future deprecation notice
=========================

We plan on retiring more legacy cryptography in a near-future
release, specifically:

 * Refusing all RSA keys smaller than 1024 bits (the current minimum
   is 768 bits)

This list reflects our current intentions, but please check the final
release notes for future releases.

Potentially-incompatible changes
================================

This release disables a number of legacy cryptographic algorithms
by default in ssh:

 * Several ciphers blowfish-cbc, cast128-cbc, all arcfour variants
   and the rijndael-cbc aliases for AES.

 * MD5-based and truncated HMAC algorithms.

These algorithms are already disabled by default in sshd.

Changes since OpenSSH 7.1p2
===========================

This is primarily a bugfix release.

Security
--------

 * ssh(1), sshd(8): remove unfinished and unused roaming code (was
   already forcibly disabled in OpenSSH 7.1p2).

 * ssh(1): eliminate fallback from untrusted X11 forwarding to
   trusted forwarding when the X server disables the SECURITY
   extension.

 * ssh(1), sshd(8): increase the minimum modulus size supported for
   diffie-hellman-group-exchange to 2048 bits.

 * sshd(8): pre-auth sandboxing is now enabled by default (previous
   releases enabled it for new installations via sshd_config).

New Features
------------

 * all: add support for RSA signatures using SHA-256/512 hash
   algorithms based on draft-rsa-dsa-sha2-256-03.txt and
   draft-ssh-ext-info-04.txt.

 * ssh(1): Add an AddKeysToAgent client option which can be set to
   'yes', 'no', 'ask', or 'confirm', and defaults to 'no'.  When
   enabled, a private key that is used during authentication will be
   added to ssh-agent if it is running (with confirmation enabled if
   set to 'confirm').

 * sshd(8): add a new authorized_keys option "restrict" that includes
   all current and future key restrictions (no-*-forwarding, etc.).
   Also add permissive versions of the existing restrictions, e.g.
   "no-pty" -> "pty". This simplifies the task of setting up
   restricted keys and ensures they are maximally-restricted,
   regardless of any permissions we might implement in the future.

 * ssh(1): add ssh_config CertificateFile option to explicitly list
   certificates. bz#2436

 * ssh-keygen(1): allow ssh-keygen to change the key comment for all
   supported formats.

 * ssh-keygen(1): allow fingerprinting from standard input, e.g.
   "ssh-keygen -lf -"

 * ssh-keygen(1): allow fingerprinting multiple public keys in a
   file, e.g. "ssh-keygen -lf ~/.ssh/authorized_keys" bz#1319

 * sshd(8): support "none" as an argument for sshd_config
   Foreground and ChrootDirectory. Useful inside Match blocks to
   override a global default. bz#2486

 * ssh-keygen(1): support multiple certificates (one per line) and
   reading from standard input (using "-f -") for "ssh-keygen -L"

 * ssh-keyscan(1): add "ssh-keyscan -c ..." flag to allow fetching
   certificates instead of plain keys.

 * ssh(1): better handle anchored FQDNs (e.g. 'cvs.openbsd.org.') in
   hostname canonicalisation - treat them as already canonical and
   remove the trailing '.' before matching ssh_config.

Bugfixes
--------

 * sftp(1): existing destination directories should not terminate
   recursive uploads (regression in openssh 6.8) bz#2528

 * ssh(1), sshd(8): correctly send back SSH2_MSG_UNIMPLEMENTED
   replies to unexpected messages during key exchange. bz#2949

 * ssh(1): refuse attempts to set ConnectionAttempts=0, which does
   not make sense and would cause ssh to print an uninitialised stack
   variable. bz#2500

 * ssh(1): fix errors when attempting to connect to scoped IPv6
   addresses with hostname canonicalisation enabled.

 * sshd_config(5): list a couple more options usable in Match blocks.
   bz#2489

 * sshd(8): fix "PubkeyAcceptedKeyTypes +..." inside a Match block.

 * ssh(1): expand tilde characters in filenames passed to -i options
   before checking whether or not the identity file exists. Avoids
   confusion for cases where shell doesn't expand (e.g. "-i ~/file"
   vs. "-i~/file"). bz#2481

 * ssh(1): do not prepend "exec" to the shell command run by "Match
   exec" in a config file, which could cause some commands to fail
   in certain environments. bz#2471

 * ssh-keyscan(1): fix output for multiple hosts/addrs on one line
   when host hashing or a non standard port is in use bz#2479

 * sshd(8): skip "Could not chdir to home directory" message when
   ChrootDirectory is active. bz#2485

 * ssh(1): include PubkeyAcceptedKeyTypes in ssh -G config dump.

 * sshd(8): avoid changing TunnelForwarding device flags if they are
   already what is needed; makes it possible to use tun/tap
   networking as non-root user if device permissions and interface
   flags are pre-established

 * ssh(1), sshd(8): RekeyLimits could be exceeded by one packet.
   bz#2521

 * ssh(1): fix multiplexing master failure to notice client exit.

 * ssh(1), ssh-agent(1): avoid fatal() for PKCS11 tokens that present
   empty key IDs. bz#1773

 * sshd(8): avoid printf of NULL argument. bz#2535

 * ssh(1), sshd(8): allow RekeyLimits larger than 4GB. bz#2521

 * ssh-keygen(1): sshd(8): fix several bugs in (unused) KRL signature
   support.

 * ssh(1), sshd(8): fix connections with peers that use the key
   exchange guess feature of the protocol. bz#2515

 * sshd(8): include remote port number in log messages. bz#2503

 * ssh(1): don't try to load SSHv1 private key when compiled without
   SSHv1 support. bz#2505

 * ssh-agent(1), ssh(1): fix incorrect error messages during key
   loading and signing errors. bz#2507

 * ssh-keygen(1): don't leave empty temporary files when performing
   known_hosts file edits when known_hosts doesn't exist.

 * sshd(8): correct packet format for tcpip-forward replies for
   requests that don't allocate a port bz#2509

 * ssh(1), sshd(8): fix possible hang on closed output. bz#2469

 * ssh(1): expand %i in ControlPath to UID. bz#2449

 * ssh(1), sshd(8): fix return type of openssh_RSA_verify. bz#2460

 * ssh(1), sshd(8): fix some option parsing memory leaks. bz#2182

 * ssh(1): add a some debug output before DNS resolution; it's a
   place where ssh could previously silently stall in cases of
   unresponsive DNS servers. bz#2433

 * ssh(1): remove spurious newline in visual hostkey. bz#2686

 * ssh(1): fix printing (ssh -G ...) of HostKeyAlgorithms=+...

 * ssh(1): fix expansion of HostkeyAlgorithms=+...

Documentation
-------------

 * ssh_config(5), sshd_config(5): update default algorithm lists to
   match current reality. bz#2527

 * ssh(1): mention -Q key-plain and -Q key-cert query options.
   bz#2455

 * sshd_config(8): more clearly describe what AuthorizedKeysFile=none
   does.

 * ssh_config(5): better document ExitOnForwardFailure. bz#2444

 * sshd(5): mention internal DH-GEX fallback groups in manual.
   bz#2302

 * sshd_config(5): better description for MaxSessions option.
   bz#2531

Portability
-----------

 * ssh(1), sftp-server(8), ssh-agent(1), sshd(8): Support Illumos/
   Solaris fine-grained privileges. Including a pre-auth privsep
   sandbox and several pledge() emulations. bz#2511

 * Renovate redhat/openssh.spec, removing deprecated options and
   syntax.

 * configure: allow --without-ssl-engine with --without-openssl

 * sshd(8): fix multiple authentication using S/Key. bz#2502

 * sshd(8): read back from libcrypto RAND_* before dropping
   privileges.  Avoids sandboxing violations with BoringSSL.

 * Fix name collision with system-provided glob(3) functions.
   bz#2463

 * Adapt Makefile to use ssh-keygen -A when generating host keys.
   bz#2459

 * configure: correct default value for --with-ssh1 bz#2457

 * configure: better detection of _res symbol bz#2259

 * support getrandom() syscall on Linux
2016-03-11 01:49:59 +00:00
christos 694e60c6ed Undo weak here to fix the tests; will revisit soon. 2016-03-11 00:44:56 +00:00
christos acfb0ca6d6 Set TEST_SH 2016-03-10 22:30:57 +00:00
martin b7bf6f19af Strip debug symbols from boot code 2016-03-10 20:23:35 +00:00
martin 8d92fc86f0 Deal with _edata not being 4-byte aligned 2016-03-10 20:22:52 +00:00
leot 2a4b16ea45 strndup() is part of XSI from The Open Group Base Specification Issue 7 and had
a similar history of stpcpy(), stpncpy() and strnlen().
Make it visible under XOPEN_SOURCE>=700 too (not just _NETBSD_SOURCE).

ok dholland@
2016-03-10 18:53:48 +00:00
christos 09efa38c34 sync with the code with have in the current copy of gcc. 2016-03-10 14:40:00 +00:00
joerg 7682402b4b Unbreak tools build. 2016-03-10 11:32:10 +00:00
martin 032d514f64 Add a few includes of bsd.own.mk to avoid broken test conditions
on ACTIVE_CC - this might not be the correct fix for PR 50930,
but it avoids the issue.
2016-03-10 09:00:24 +00:00
christos fd7d1a5df9 new bind 2016-03-10 04:02:29 +00:00
christos 69f16a276d merge conflicts 2016-03-10 04:01:33 +00:00
christos 8a4b3b5da5 Do the same song and dance for functions. 2016-03-10 03:50:47 +00:00
christos f89b1f3091 Import 9.10.3-P4:
4322.	[security]	Duplicate EDNS COOKIE options in a response could
			trigger an assertion failure. (CVE-2016-2088)
			[RT #41809]

4319.	[security]	Fix resolver assertion failure due to improper
			DNAME handling when parsing fetch reply messages.
			(CVE-2016-1286) [RT #41753]

4318.	[security]	Malformed control messages can trigger assertions
			in named and rndc. (CVE-2016-1285) [RT #41666]
2016-03-10 03:22:13 +00:00
taca 9d3fab3e74 BIND 9.10.3-P4 has released. 2016-03-10 02:23:26 +00:00
christos 71f53a526c From Frank Wille:
Request "IKE mode config" in "rsasig" (certificates on both sides only)
authentication mode, if "mode_cfg" is configured to "on".
Tested with a Lancom router, using the following configuration:

path include "/etc/racoon";
path certificate "/etc/racoon/certs";
path script "/etc/racoon/scripts";

remote "wpsd"
{
    remote_address 1.2.3.4;
    exchange_mode main,base;

    my_identifier asn1dn;
    certificate_type x509 "vpnclient15.crt" "vpnclient15.key";
    ca_type x509 "ca.crt";

    mode_cfg on;
    dpd_delay 20;
    nat_traversal on;
    lifetime time 8 hour;
    script "phase1-up.sh" phase1_up;
    script "phase1-down.sh" phase1_down;

    proposal {
        encryption_algorithm aes;
        hash_algorithm md5;
        authentication_method rsasig;
        dh_group 2;
    }
    proposal_check obey;
}

sainfo anonymous
{
    pfs_group 2;
    lifetime time 8 hour;
    encryption_algorithm aes;
    authentication_algorithm hmac_md5;
    compression_algorithm deflate;
}
2016-03-09 22:27:17 +00:00
uwe 07495c9005 gdb now checks the size of the core register section, so pacify the
warning in corelow.c by providing the expected size.
2016-03-09 20:55:22 +00:00
christos 2a67b893e9 remove installboot.h; it is not needed 2016-03-09 20:18:17 +00:00
christos 0a584b1b23 PR/50928: David Binderman: Clarify precedence with parentheses. 2016-03-09 20:11:41 +00:00
christos bdb256cbc1 PR/50927: David Binderman: Fix wrong paren 2016-03-09 20:07:04 +00:00
christos 4b1394af25 PR/50926: David Binderman: Fix wrong paren 2016-03-09 20:06:31 +00:00
christos e37f4314dd PR/50932: David Binderman: use emalloc/erealloc/ecalloc 2016-03-09 20:02:33 +00:00
christos c5f07454d1 PR/50921: David Binderman: Fix memory leak 2016-03-09 19:53:32 +00:00
christos 7bb0f9314c PR/50920: David Binderman: fix leak 2016-03-09 19:48:24 +00:00
christos 23a151b438 PR/50919: David Binderman: Re-do all the debug stuff in a more sustainable way. 2016-03-09 19:47:13 +00:00
chs 8da07e54f6 in find_idle_and_ttywrite(), initialize idletime and writable to 0
when stat() fails.  this prevents a coredump later in stimeprint()
due to gmtime() returning NULL for an uninitialized idletime.
2016-03-09 16:12:14 +00:00
christos d2bf8aa2c7 PR/50918: David Binderman: Fix memory leak 2016-03-09 15:58:25 +00:00
christos 635b4dc047 Make it usable from userland. 2016-03-09 15:45:37 +00:00
christos 00a072ac83 dedup 2016-03-09 15:44:49 +00:00
nakayama 7cee3f133b 32-bit kernels use 32-bit stack. 2016-03-09 12:20:20 +00:00
christos 1dd2c2fdec Move the PPID installation to the init() section. 2016-03-08 23:24:51 +00:00
christos 40cc189704 avoid duplicate includes (from kre) 2016-03-08 23:23:31 +00:00
christos c301fde184 PR/50915: David Binderman: Fix infinite loop and printf format. 2016-03-08 20:16:56 +00:00
christos f6295e9141 PR/50914: David Binderman: Fix memory leaks.
While here, fix error handling too.
2016-03-08 20:13:44 +00:00
christos 2c7c3a0713 - don't export $PPID (from kre)
- include <stdio.h>
2016-03-08 18:16:11 +00:00
christos ae3fe60ef5 Provide $PPID, kill vvers (unused) 2016-03-08 14:32:34 +00:00
joerg 9adca58c0e Align the message buffer. The kernel routines normally are used only
with page aligned buffers and they assume at least pointer alignment. Be
defensive here and align to 256 Bytes.
2016-03-08 14:30:48 +00:00
christos 9bdf341a7d remove obsolete test 2016-03-08 14:27:44 +00:00