Commit Graph

241270 Commits

Author SHA1 Message Date
christos
238888033a Add more __dead; pointed out by clang (from tnn@) 2016-03-11 13:15:02 +00:00
skrll
0c4e042b3e Update RPI firmware to version after the following commit
commit a192a05bc8ca597249e5a36875ce382c572ddc97
Author: popcornmix <popcornmix@gmail.com>
Date:   Mon Mar 7 17:21:57 2016 +0000

Raspberry Pi 3 should now boot the armv7.img produced in the
evbarm-earmv7hf builds
2016-03-11 12:34:57 +00:00
sjg
6067bdd115 Handle missing file for Read the same as for Write, since if it
is Deleted we don't care.

Patch from Bryan Drewery.
2016-03-11 07:01:21 +00:00
joerg
fbba0696d4 Drop FreeBSD RCS ID, add NetBSD's. 2016-03-11 05:02:32 +00:00
christos
1b8bb90dd8 fix pam build. 2016-03-11 03:54:27 +00:00
christos
d600878e36 new openssh 2016-03-11 01:57:14 +00:00
christos
7997655135 merge conflicts 2016-03-11 01:55:00 +00:00
christos
48b0210551 Future deprecation notice
=========================

We plan on retiring more legacy cryptography in a near-future
release, specifically:

 * Refusing all RSA keys smaller than 1024 bits (the current minimum
   is 768 bits)

This list reflects our current intentions, but please check the final
release notes for future releases.

Potentially-incompatible changes
================================

This release disables a number of legacy cryptographic algorithms
by default in ssh:

 * Several ciphers blowfish-cbc, cast128-cbc, all arcfour variants
   and the rijndael-cbc aliases for AES.

 * MD5-based and truncated HMAC algorithms.

These algorithms are already disabled by default in sshd.

Changes since OpenSSH 7.1p2
===========================

This is primarily a bugfix release.

Security
--------

 * ssh(1), sshd(8): remove unfinished and unused roaming code (was
   already forcibly disabled in OpenSSH 7.1p2).

 * ssh(1): eliminate fallback from untrusted X11 forwarding to
   trusted forwarding when the X server disables the SECURITY
   extension.

 * ssh(1), sshd(8): increase the minimum modulus size supported for
   diffie-hellman-group-exchange to 2048 bits.

 * sshd(8): pre-auth sandboxing is now enabled by default (previous
   releases enabled it for new installations via sshd_config).

New Features
------------

 * all: add support for RSA signatures using SHA-256/512 hash
   algorithms based on draft-rsa-dsa-sha2-256-03.txt and
   draft-ssh-ext-info-04.txt.

 * ssh(1): Add an AddKeysToAgent client option which can be set to
   'yes', 'no', 'ask', or 'confirm', and defaults to 'no'.  When
   enabled, a private key that is used during authentication will be
   added to ssh-agent if it is running (with confirmation enabled if
   set to 'confirm').

 * sshd(8): add a new authorized_keys option "restrict" that includes
   all current and future key restrictions (no-*-forwarding, etc.).
   Also add permissive versions of the existing restrictions, e.g.
   "no-pty" -> "pty". This simplifies the task of setting up
   restricted keys and ensures they are maximally-restricted,
   regardless of any permissions we might implement in the future.

 * ssh(1): add ssh_config CertificateFile option to explicitly list
   certificates. bz#2436

 * ssh-keygen(1): allow ssh-keygen to change the key comment for all
   supported formats.

 * ssh-keygen(1): allow fingerprinting from standard input, e.g.
   "ssh-keygen -lf -"

 * ssh-keygen(1): allow fingerprinting multiple public keys in a
   file, e.g. "ssh-keygen -lf ~/.ssh/authorized_keys" bz#1319

 * sshd(8): support "none" as an argument for sshd_config
   Foreground and ChrootDirectory. Useful inside Match blocks to
   override a global default. bz#2486

 * ssh-keygen(1): support multiple certificates (one per line) and
   reading from standard input (using "-f -") for "ssh-keygen -L"

 * ssh-keyscan(1): add "ssh-keyscan -c ..." flag to allow fetching
   certificates instead of plain keys.

 * ssh(1): better handle anchored FQDNs (e.g. 'cvs.openbsd.org.') in
   hostname canonicalisation - treat them as already canonical and
   remove the trailing '.' before matching ssh_config.

Bugfixes
--------

 * sftp(1): existing destination directories should not terminate
   recursive uploads (regression in openssh 6.8) bz#2528

 * ssh(1), sshd(8): correctly send back SSH2_MSG_UNIMPLEMENTED
   replies to unexpected messages during key exchange. bz#2949

 * ssh(1): refuse attempts to set ConnectionAttempts=0, which does
   not make sense and would cause ssh to print an uninitialised stack
   variable. bz#2500

 * ssh(1): fix errors when attempting to connect to scoped IPv6
   addresses with hostname canonicalisation enabled.

 * sshd_config(5): list a couple more options usable in Match blocks.
   bz#2489

 * sshd(8): fix "PubkeyAcceptedKeyTypes +..." inside a Match block.

 * ssh(1): expand tilde characters in filenames passed to -i options
   before checking whether or not the identity file exists. Avoids
   confusion for cases where shell doesn't expand (e.g. "-i ~/file"
   vs. "-i~/file"). bz#2481

 * ssh(1): do not prepend "exec" to the shell command run by "Match
   exec" in a config file, which could cause some commands to fail
   in certain environments. bz#2471

 * ssh-keyscan(1): fix output for multiple hosts/addrs on one line
   when host hashing or a non standard port is in use bz#2479

 * sshd(8): skip "Could not chdir to home directory" message when
   ChrootDirectory is active. bz#2485

 * ssh(1): include PubkeyAcceptedKeyTypes in ssh -G config dump.

 * sshd(8): avoid changing TunnelForwarding device flags if they are
   already what is needed; makes it possible to use tun/tap
   networking as non-root user if device permissions and interface
   flags are pre-established

 * ssh(1), sshd(8): RekeyLimits could be exceeded by one packet.
   bz#2521

 * ssh(1): fix multiplexing master failure to notice client exit.

 * ssh(1), ssh-agent(1): avoid fatal() for PKCS11 tokens that present
   empty key IDs. bz#1773

 * sshd(8): avoid printf of NULL argument. bz#2535

 * ssh(1), sshd(8): allow RekeyLimits larger than 4GB. bz#2521

 * ssh-keygen(1): sshd(8): fix several bugs in (unused) KRL signature
   support.

 * ssh(1), sshd(8): fix connections with peers that use the key
   exchange guess feature of the protocol. bz#2515

 * sshd(8): include remote port number in log messages. bz#2503

 * ssh(1): don't try to load SSHv1 private key when compiled without
   SSHv1 support. bz#2505

 * ssh-agent(1), ssh(1): fix incorrect error messages during key
   loading and signing errors. bz#2507

 * ssh-keygen(1): don't leave empty temporary files when performing
   known_hosts file edits when known_hosts doesn't exist.

 * sshd(8): correct packet format for tcpip-forward replies for
   requests that don't allocate a port bz#2509

 * ssh(1), sshd(8): fix possible hang on closed output. bz#2469

 * ssh(1): expand %i in ControlPath to UID. bz#2449

 * ssh(1), sshd(8): fix return type of openssh_RSA_verify. bz#2460

 * ssh(1), sshd(8): fix some option parsing memory leaks. bz#2182

 * ssh(1): add a some debug output before DNS resolution; it's a
   place where ssh could previously silently stall in cases of
   unresponsive DNS servers. bz#2433

 * ssh(1): remove spurious newline in visual hostkey. bz#2686

 * ssh(1): fix printing (ssh -G ...) of HostKeyAlgorithms=+...

 * ssh(1): fix expansion of HostkeyAlgorithms=+...

Documentation
-------------

 * ssh_config(5), sshd_config(5): update default algorithm lists to
   match current reality. bz#2527

 * ssh(1): mention -Q key-plain and -Q key-cert query options.
   bz#2455

 * sshd_config(8): more clearly describe what AuthorizedKeysFile=none
   does.

 * ssh_config(5): better document ExitOnForwardFailure. bz#2444

 * sshd(5): mention internal DH-GEX fallback groups in manual.
   bz#2302

 * sshd_config(5): better description for MaxSessions option.
   bz#2531

Portability
-----------

 * ssh(1), sftp-server(8), ssh-agent(1), sshd(8): Support Illumos/
   Solaris fine-grained privileges. Including a pre-auth privsep
   sandbox and several pledge() emulations. bz#2511

 * Renovate redhat/openssh.spec, removing deprecated options and
   syntax.

 * configure: allow --without-ssl-engine with --without-openssl

 * sshd(8): fix multiple authentication using S/Key. bz#2502

 * sshd(8): read back from libcrypto RAND_* before dropping
   privileges.  Avoids sandboxing violations with BoringSSL.

 * Fix name collision with system-provided glob(3) functions.
   bz#2463

 * Adapt Makefile to use ssh-keygen -A when generating host keys.
   bz#2459

 * configure: correct default value for --with-ssh1 bz#2457

 * configure: better detection of _res symbol bz#2259

 * support getrandom() syscall on Linux
2016-03-11 01:49:59 +00:00
christos
694e60c6ed Undo weak here to fix the tests; will revisit soon. 2016-03-11 00:44:56 +00:00
christos
acfb0ca6d6 Set TEST_SH 2016-03-10 22:30:57 +00:00
martin
b7bf6f19af Strip debug symbols from boot code 2016-03-10 20:23:35 +00:00
martin
8d92fc86f0 Deal with _edata not being 4-byte aligned 2016-03-10 20:22:52 +00:00
leot
2a4b16ea45 strndup() is part of XSI from The Open Group Base Specification Issue 7 and had
a similar history of stpcpy(), stpncpy() and strnlen().
Make it visible under XOPEN_SOURCE>=700 too (not just _NETBSD_SOURCE).

ok dholland@
2016-03-10 18:53:48 +00:00
christos
09efa38c34 sync with the code with have in the current copy of gcc. 2016-03-10 14:40:00 +00:00
joerg
7682402b4b Unbreak tools build. 2016-03-10 11:32:10 +00:00
martin
032d514f64 Add a few includes of bsd.own.mk to avoid broken test conditions
on ACTIVE_CC - this might not be the correct fix for PR 50930,
but it avoids the issue.
2016-03-10 09:00:24 +00:00
christos
fd7d1a5df9 new bind 2016-03-10 04:02:29 +00:00
christos
69f16a276d merge conflicts 2016-03-10 04:01:33 +00:00
christos
8a4b3b5da5 Do the same song and dance for functions. 2016-03-10 03:50:47 +00:00
christos
f89b1f3091 Import 9.10.3-P4:
4322.	[security]	Duplicate EDNS COOKIE options in a response could
			trigger an assertion failure. (CVE-2016-2088)
			[RT #41809]

4319.	[security]	Fix resolver assertion failure due to improper
			DNAME handling when parsing fetch reply messages.
			(CVE-2016-1286) [RT #41753]

4318.	[security]	Malformed control messages can trigger assertions
			in named and rndc. (CVE-2016-1285) [RT #41666]
2016-03-10 03:22:13 +00:00
taca
9d3fab3e74 BIND 9.10.3-P4 has released. 2016-03-10 02:23:26 +00:00
christos
71f53a526c From Frank Wille:
Request "IKE mode config" in "rsasig" (certificates on both sides only)
authentication mode, if "mode_cfg" is configured to "on".
Tested with a Lancom router, using the following configuration:

path include "/etc/racoon";
path certificate "/etc/racoon/certs";
path script "/etc/racoon/scripts";

remote "wpsd"
{
    remote_address 1.2.3.4;
    exchange_mode main,base;

    my_identifier asn1dn;
    certificate_type x509 "vpnclient15.crt" "vpnclient15.key";
    ca_type x509 "ca.crt";

    mode_cfg on;
    dpd_delay 20;
    nat_traversal on;
    lifetime time 8 hour;
    script "phase1-up.sh" phase1_up;
    script "phase1-down.sh" phase1_down;

    proposal {
        encryption_algorithm aes;
        hash_algorithm md5;
        authentication_method rsasig;
        dh_group 2;
    }
    proposal_check obey;
}

sainfo anonymous
{
    pfs_group 2;
    lifetime time 8 hour;
    encryption_algorithm aes;
    authentication_algorithm hmac_md5;
    compression_algorithm deflate;
}
2016-03-09 22:27:17 +00:00
uwe
07495c9005 gdb now checks the size of the core register section, so pacify the
warning in corelow.c by providing the expected size.
2016-03-09 20:55:22 +00:00
christos
2a67b893e9 remove installboot.h; it is not needed 2016-03-09 20:18:17 +00:00
christos
0a584b1b23 PR/50928: David Binderman: Clarify precedence with parentheses. 2016-03-09 20:11:41 +00:00
christos
bdb256cbc1 PR/50927: David Binderman: Fix wrong paren 2016-03-09 20:07:04 +00:00
christos
4b1394af25 PR/50926: David Binderman: Fix wrong paren 2016-03-09 20:06:31 +00:00
christos
e37f4314dd PR/50932: David Binderman: use emalloc/erealloc/ecalloc 2016-03-09 20:02:33 +00:00
christos
c5f07454d1 PR/50921: David Binderman: Fix memory leak 2016-03-09 19:53:32 +00:00
christos
7bb0f9314c PR/50920: David Binderman: fix leak 2016-03-09 19:48:24 +00:00
christos
23a151b438 PR/50919: David Binderman: Re-do all the debug stuff in a more sustainable way. 2016-03-09 19:47:13 +00:00
chs
8da07e54f6 in find_idle_and_ttywrite(), initialize idletime and writable to 0
when stat() fails.  this prevents a coredump later in stimeprint()
due to gmtime() returning NULL for an uninitialized idletime.
2016-03-09 16:12:14 +00:00
christos
d2bf8aa2c7 PR/50918: David Binderman: Fix memory leak 2016-03-09 15:58:25 +00:00
christos
635b4dc047 Make it usable from userland. 2016-03-09 15:45:37 +00:00
christos
00a072ac83 dedup 2016-03-09 15:44:49 +00:00
nakayama
7cee3f133b 32-bit kernels use 32-bit stack. 2016-03-09 12:20:20 +00:00
christos
1dd2c2fdec Move the PPID installation to the init() section. 2016-03-08 23:24:51 +00:00
christos
40cc189704 avoid duplicate includes (from kre) 2016-03-08 23:23:31 +00:00
christos
c301fde184 PR/50915: David Binderman: Fix infinite loop and printf format. 2016-03-08 20:16:56 +00:00
christos
f6295e9141 PR/50914: David Binderman: Fix memory leaks.
While here, fix error handling too.
2016-03-08 20:13:44 +00:00
christos
2c7c3a0713 - don't export $PPID (from kre)
- include <stdio.h>
2016-03-08 18:16:11 +00:00
christos
ae3fe60ef5 Provide $PPID, kill vvers (unused) 2016-03-08 14:32:34 +00:00
joerg
9adca58c0e Align the message buffer. The kernel routines normally are used only
with page aligned buffers and they assume at least pointer alignment. Be
defensive here and align to 256 Bytes.
2016-03-08 14:30:48 +00:00
christos
9bdf341a7d remove obsolete test 2016-03-08 14:27:44 +00:00
christos
2c3c3b3c5b Added more test cases, more exhaustive testing. (from kre) 2016-03-08 14:26:54 +00:00
christos
c5b16bb470 remove old test 2016-03-08 14:26:34 +00:00
christos
e4619cdffb Tests for the shift builtin (from kre) 2016-03-08 14:26:26 +00:00
christos
491442e6cd This test tests nothing not tested elsewhere, and doesn't
do a very good job of that. Bang! (from kre)
2016-03-08 14:24:50 +00:00
christos
c74a97456e Complete implementation of TEST_SH, use builting kill (which does
work, now anyway) rather than working around a defect by using
/bin/kill (if the shell is broken, the test should fail, not succeed)
and test more aspects of the wait builtin in the kill test. (from kre)
2016-03-08 14:24:06 +00:00
christos
764b20ba6a Cleanup left over (dead) debugging code (from kre) 2016-03-08 14:21:02 +00:00