Commit Graph

2779 Commits

Author SHA1 Message Date
christos
61b2320621 krb5 needs sqlite3 now 2017-01-28 23:38:48 +00:00
christos
45f67fc24b Use ${TOOL_SED} and resolve paths properly. 2017-01-28 22:25:44 +00:00
christos
d3273b5b76 merge conflicts, adjust the build. 2017-01-28 21:31:43 +00:00
christos
b9d004c6cc Release Notes - Heimdal - Version Heimdal 7.1
Security

 - kx509 realm-chopping security bug
 - non-authorization of alias additions/removals in kadmind
   (CVE-2016-2400)

 Feature

 - iprop has been revamped to fix a number of race conditions that could
   lead to inconsistent replication
 - Hierarchical capath support
 - AES Encryption with HMAC-SHA2 for Kerberos 5
   draft-ietf-kitten-aes-cts-hmac-sha2-11
 - hcrypto is now thread safe on all platforms
 - libhcrypto has new backends: CNG (Windows), PKCS#11 (mainly for
   Solaris), and OpenSSL.  OpenSSL is now a first-class libhcrypto backend.
   OpenSSL 1.0.x and 1.1 are both supported. AES-NI used when supported by
   backend
 - HDB now supports LMDB
 - Thread support on Windows
 - RFC 6113  Generalized Framework for Kerberos Pre-Authentication (FAST)
 - New GSS APIs:
   . gss_localname
 - Allow setting what encryption types a principal should have with
   [kadmin] default_key_rules, see krb5.conf manpage for more info
 - Unify libhcrypto with LTC (libtomcrypto)
 - asn1_compile 64-bit INTEGER functionality
 - HDB key history support including --keepold kadmin password option
 - Improved cross-realm key rollover safety
 - New krb5_kuserok() and krb5_aname_to_localname() plug-in interfaces
 - Improved MIT compatibility
   . kadm5 API
   . Migration from MIT KDB via "mitdb" HDB backend
   . Capable of writing the HDB in MIT dump format
 - Improved Active Directory interoperability
   . Enctype selection issues for PAC and other authz-data signatures
   . Cross realm key rollover (kvno 0)
 - New [kdc] enctype negotiation configuration:
   . tgt-use-strongest-session-key
   . svc-use-strongest-session-key
   . preauth-use-strongest-session-key
   . use-strongest-server-key
 - The KDC process now uses a multi-process model improving
   resiliency and performance
 - Allow batch-mode kinit with password file
 - SIGINFO support added to kinit cmd
 - New kx509 configuration options:
   . kx509_ca
   . kca_service
   . kx509_include_pkinit_san
   . kx509_template
 - Improved Heimdal library/plugin version safety
 - Name canonicalization
   . DNS resolver searchlist
   . Improved referral support
   . Support host:port host-based services
 - Pluggable libheimbase interface for DBs
 - Improve IPv6 Support
 - LDAP
   . Bind DN and password
   . Start TLS
 - klist --json
 - DIR credential cache type
 - Updated upstream SQLite and libedit
 - Removed legacy applications: ftp, kx, login, popper, push, rcp, rsh,
   telnet, xnlock
 - Completely remove RAND_egd support
 - Moved kadmin and ktutil to /usr/bin
 - Stricter fcache checks (see fcache_strict_checking krb5.conf setting)
    . use O_NOFOLLOW
    . don't follow symlinks
    . require cache files to be owned by the user
    . require sensible permissions (not group/other readable)
 - Implemented gss_store_cred()
 - Many more

 Bug fixes
 - iprop has been revamped to fix a number of race conditions that could
   lead to data loss
 - Include non-loopback addresses assigned to loopback interfaces
   when requesting tickets with addresses
 - KDC 1DES session key selection (for AFS rxkad-k5 compatibility)
 - Keytab file descriptor and lock leak
 - Credential cache corruption bugs
   (NOTE: The FILE ccache is still not entirely safe due to the
   fundamentally unsafe design of POSIX file locking)
 - gss_pseudo_random() interop bug
 - Plugins are now preferentially loaded from the run-time install tree
 - Reauthentication after password change in init_creds_password
 - Memory leak in the client kadmin library
 - TGS client requests renewable/forwardable/proxiable when possible
 - Locking issues in DB1 and DB3 HDB backends
 - Master HDB can remain locked while waiting for network I/O
 - Renewal/refresh logic when kinit is provided with a command
 - KDC handling of enterprise principals
 - Use correct bit for anon-pkinit
 - Many more

 Acknowledgements

 This release of Heimdal includes contributions from:

    Abhinav Upadhyay        Heath Kehoe             Nico Williams
    Andreas Schneider       Henry Jacques           Patrik Lundin
    Andrew Bartlett         Howard Chu              Philip Boulain
    Andrew Tridgell         Igor Sobrado            Ragnar Sundblad
    Antoine Jacoutot        Ingo Schwarze           Remi Ferrand
    Arran Cudbard-Bell      Jakub Čajka             Rod Widdowson
    Arvid Requate           James Le Cuirot         Rok Papež
    Asanka Herath           James Lee               Roland C. Dowdeswell
    Ben Kaduk               Jeffrey Altman          Ross L Richardson
    Benjamin Kaduk          Jeffrey Clark           Russ Allbery
    Bernard Spil            Jeffrey Hutzelman       Samuel Cabrero
    Brian May               Jelmer Vernooij         Samuel Thibault
    Chas Williams           Ken Dreyer              Santosh Kumar Pradhan
    Chaskiel Grundman       Kiran S J               Sean Davis
    Dana Koch               Kumar Thangavelu        Sergio Gelato
    Daniel Schepler         Landon Fuller           Simon Wilkinson
    David Mulder            Linus Nordberg          Stef Walter
    Douglas Bagnall         Love Hörnquist Åstrand  Stefan Metzmacher
    Ed Maste                Luke Howard             Steffen Jaeckel
    Eray Aslan              Magnus Ahltorp          Timothy Pearson
    Florian Best            Marc Balmer             Tollef Fog Heen
    Fredrik Pettai          Marcin Cieślak          Tony Acero
    Greg Hudson             Marco Molteni           Uri Simchoni
    Gustavo Zacarias        Matthieu Hautreux       Viktor Dukhovni
    Günther Deschner        Michael Meffie          Volker Lendecke
    Harald Barth            Moritz Lenz
2017-01-28 20:46:41 +00:00
spz
b367ed3864 merge for OpenSSL 1.0.2k 2017-01-27 23:16:20 +00:00
spz
fc2ef7411d updated man pages & the x86_64 mont* asm fix for the new openssl.
Expect at least one more commit until the tree builds again.
2017-01-27 23:00:46 +00:00
spz
34505c60e1 import of OpenSSL 1.0.2k
Upstream changelog:
Changes between 1.0.2j and 1.0.2k [26 Jan 2017]

 *) Truncated packet could crash via OOB read

    If one side of an SSL/TLS path is running on a 32-bit host and a specific
    cipher is being used, then a truncated packet can cause that host to
    perform an out-of-bounds read, usually resulting in a crash.

    This issue was reported to OpenSSL by Robert Święcki of Google.
    (CVE-2017-3731)
    [Andy Polyakov]

 *) BN_mod_exp may produce incorrect results on x86_64

    There is a carry propagating bug in the x86_64 Montgomery squaring
    procedure. No EC algorithms are affected. Analysis suggests that attacks
    against RSA and DSA as a result of this defect would be very difficult to
    perform and are not believed likely. Attacks against DH are considered just
    feasible (although very difficult) because most of the work necessary to
    deduce information about a private key may be performed offline. The amount
    of resources required for such an attack would be very significant and
    likely only accessible to a limited number of attackers. An attacker would
    additionally need online access to an unpatched system using the target
    private key in a scenario with persistent DH parameters and a private
    key that is shared between multiple clients. For example this can occur by
    default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very
    similar to CVE-2015-3193 but must be treated as a separate problem.

    This issue was reported to OpenSSL by the OSS-Fuzz project.
    (CVE-2017-3732)
    [Andy Polyakov]

 *) Montgomery multiplication may produce incorrect results

    There is a carry propagating bug in the Broadwell-specific Montgomery
    multiplication procedure that handles input lengths divisible by, but
    longer than 256 bits. Analysis suggests that attacks against RSA, DSA
    and DH private keys are impossible. This is because the subroutine in
    question is not used in operations with the private key itself and an input
    of the attacker's direct choice. Otherwise the bug can manifest itself as
    transient authentication and key negotiation failures or reproducible
    erroneous outcome of public-key operations with specially crafted input.
    Among EC algorithms only Brainpool P-512 curves are affected and one
    presumably can attack ECDH key negotiation. Impact was not analyzed in
    detail, because pre-requisites for attack are considered unlikely. Namely
    multiple clients have to choose the curve in question and the server has to
    share the private key among them, neither of which is default behaviour.
    Even then only clients that chose the curve will be affected.

    This issue was publicly reported as transient failures and was not
    initially recognized as a security issue. Thanks to Richard Morgan for
    providing reproducible case.
    (CVE-2016-7055)
    [Andy Polyakov]

 *) OpenSSL now fails if it receives an unrecognised record type in TLS1.0
    or TLS1.1. Previously this only happened in SSLv3 and TLS1.2. This is to
    prevent issues where no progress is being made and the peer continually
    sends unrecognised record types, using up resources processing them.
    [Matt Caswell]
2017-01-27 22:53:49 +00:00
christos
adbaca4132 Strip first otherwise we end up with __RCSID("NetBSD") 2017-01-27 18:02:09 +00:00
christos
7e9937c7a6 PR/51682: Avoid DoS with fragment out of order insertion; keep fragments
sorted in the list.
2017-01-24 19:23:31 +00:00
hauke
5dbf5ec614 Add missing <sys/stat.h> for open(2) flags. 2017-01-13 08:41:46 +00:00
christos
1ce2d3c329 remove re-definition 2017-01-13 01:39:04 +00:00
christos
29c143f657 include <unistd.h> for close, pipe, dup2 etc. 2017-01-10 13:53:26 +00:00
gson
098a2efc00 regen (actually, hand-edited, but the changes should be identical) 2017-01-09 17:41:03 +00:00
gson
902c0a0d74 Revert last two revisions; local changes should no longer be needed
now that the root cause of PR lib/51569 is fixed by revision 1.11 of
src/crypto/external/bsd/openssl/lib/libcrypto/arch/x86_64/Makefile.
2017-01-09 17:36:24 +00:00
christos
c1fd63d8fb regen 2017-01-08 21:36:24 +00:00
christos
5d2f54cc55 Switch to eax 2017-01-08 21:36:04 +00:00
christos
a9c6ebd868 Remove pasto, thanks wiz@ 2017-01-08 17:12:21 +00:00
christos
631c5ab455 regen 2017-01-08 01:59:43 +00:00
christos
5a016eb166 remove some local hacks. 2017-01-08 01:56:31 +00:00
christos
438e49ab2a PR/51569: Andreas Gustafsson: Check the right bit for pclmulqdq:
Perform a Carry-Less Multiplication of Quadword instruction
(accelerator for GCM)
2017-01-08 01:55:49 +00:00
christos
ee85abc417 merge conflicts 2016-12-25 00:07:46 +00:00
christos
210ad7912c Import OpenSSH-7.4
OpenSSH 7.4 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.

OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.

Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots or donated to the
project. More information on donations may be found at:
http://www.openssh.com/donations.html

Future deprecation notice
=========================

We plan on retiring more legacy cryptography in future releases,
specifically:

 * In approximately August 2017, removing remaining support for the
   SSH v.1 protocol (client-only and currently compile-time disabled).

 * In the same release, removing support for Blowfish and RC4 ciphers
   and the RIPE-MD160 HMAC. (These are currently run-time disabled).

 * Refusing all RSA keys smaller than 1024 bits (the current minimum
   is 768 bits)

 * The next release of OpenSSH will remove support for running sshd(8)
   with privilege separation disabled.

 * The next release of portable OpenSSH will remove support for
   OpenSSL version prior to 1.0.1.

This list reflects our current intentions, but please check the final
release notes for future releases.

Potentially-incompatible changes
================================

This release includes a number of changes that may affect existing
configurations:

 * This release removes server support for the SSH v.1 protocol.

 * ssh(1): Remove 3des-cbc from the client's default proposal. 64-bit
   block ciphers are not safe in 2016 and we don't want to wait until
   attacks like SWEET32 are extended to SSH. As 3des-cbc was the
   only mandatory cipher in the SSH RFCs, this may cause problems
   connecting to older devices using the default configuration,
   but it's highly likely that such devices already need explicit
   configuration for key exchange and hostkey algorithms already
   anyway.

 * sshd(8): Remove support for pre-authentication compression.
   Doing compression early in the protocol probably seemed reasonable
   in the 1990s, but today it's clearly a bad idea in terms of both
   cryptography (cf. multiple compression oracle attacks in TLS) and
   attack surface. Pre-auth compression support has been disabled by
   default for >10 years. Support remains in the client.

 * ssh-agent will refuse to load PKCS#11 modules outside a whitelist
   of trusted paths by default. The path whitelist may be specified
   at run-time.

 * sshd(8): When a forced-command appears in both a certificate and
   an authorized keys/principals command= restriction, sshd will now
   refuse to accept the certificate unless they are identical.
   The previous (documented) behaviour of having the certificate
   forced-command override the other could be a bit confusing and
   error-prone.

 * sshd(8): Remove the UseLogin configuration directive and support
   for having /bin/login manage login sessions.
2016-12-25 00:00:13 +00:00
joerg
e887dd50b2 Mark the new SPARCv9-in-32bit-mode modules as needing V9. 2016-11-03 22:18:29 +00:00
christos
c03ab36ba4 conditionalize bits 2016-10-19 00:11:03 +00:00
joerg
e9e26132dd Add basic glue for AArch64, including not-yet-used assembler files. 2016-10-17 00:24:13 +00:00
joerg
11ff370a53 Make assembler modules optional for ARM architectures. 2016-10-17 00:23:47 +00:00
christos
a419901429 Adapt from powerpc(32) 2016-10-15 12:19:02 +00:00
spz
31b855a025 merge for openssl 1.0.2j 2016-10-14 16:23:17 +00:00
spz
cff8db61e4 periphereal updates and generated files for the new openssl.
Expect at least one more commit until the tree builds again.
2016-10-14 16:09:43 +00:00
spz
a6054fbf77 Import of OpenSSL 1.0.2j.
The 1.0.2 branch of OpenSSL is the current long term support branch.

Differences between 1.0.1 and 1.0.2:
      o Suite B support for TLS 1.2 and DTLS 1.2
      o Support for DTLS 1.2
      o TLS automatic EC curve selection.
      o API to set TLS supported signature algorithms and curves
      o SSL_CONF configuration API.
      o TLS Brainpool support.
      o ALPN support.
      o CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.

Security fixes from the previous version (1.0.1t) in NetBSD:
      o OCSP Status Request extension unbounded memory growth (CVE-2016-6304)
      o SWEET32 Mitigation (CVE-2016-2183)
      o OOB write in MDC2_Update() (CVE-2016-6303)
      o Malformed SHA512 ticket DoS (CVE-2016-6302)
      o OOB write in BN_bn2dec() (CVE-2016-2182)
      o OOB read in TS_OBJ_print_bio() (CVE-2016-2180)
      o Pointer arithmetic undefined behaviour (CVE-2016-2177)
      o Constant time flag not preserved in DSA signing (CVE-2016-2178)
      o DTLS buffered message DoS (CVE-2016-2179)
      o DTLS replay protection DoS (CVE-2016-2181)
      o Certificate message OOB reads (CVE-2016-6306)
2016-10-14 16:02:36 +00:00
spz
218f7bfcf1 Import of OpenSSL 1.0.2j.
The 1.0.2 branch of OpenSSL is the current long term support branch.

Differences between 1.0.1 and 1.0.2:
      o Suite B support for TLS 1.2 and DTLS 1.2
      o Support for DTLS 1.2
      o TLS automatic EC curve selection.
      o API to set TLS supported signature algorithms and curves
      o SSL_CONF configuration API.
      o TLS Brainpool support.
      o ALPN support.
      o CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.

Security fixes from the previous version (1.0.1t) in NetBSD:
      o OCSP Status Request extension unbounded memory growth (CVE-2016-6304)
      o SWEET32 Mitigation (CVE-2016-2183)
      o OOB write in MDC2_Update() (CVE-2016-6303)
      o Malformed SHA512 ticket DoS (CVE-2016-6302)
      o OOB write in BN_bn2dec() (CVE-2016-2182)
      o OOB read in TS_OBJ_print_bio() (CVE-2016-2180)
      o Pointer arithmetic undefined behaviour (CVE-2016-2177)
      o Constant time flag not preserved in DSA signing (CVE-2016-2178)
      o DTLS buffered message DoS (CVE-2016-2179)
      o DTLS replay protection DoS (CVE-2016-2181)
      o Certificate message OOB reads (CVE-2016-6306)
2016-10-14 16:01:16 +00:00
christos
de2aa956c1 PR/51543: Henning Petersen: replace , with ; 2016-10-09 15:01:49 +00:00
bouyer
ba1fe8e391 Remove, should have been added on netbsd-6-0 2016-10-05 10:30:19 +00:00
bouyer
2b8667ab73 src/doc/3RDPARTY patch
src/distrib/sets/lists/comp/mi						patch
src/crypto/external/bsd/openssl/dist/CHANGES				patch
src/crypto/external/bsd/openssl/dist/CONTRIBUTING			patch
src/crypto/external/bsd/openssl/dist/Configure				patch
src/crypto/external/bsd/openssl/dist/Makefile				patch
src/crypto/external/bsd/openssl/dist/NEWS				patch
src/crypto/external/bsd/openssl/dist/README				patch
src/crypto/external/bsd/openssl/dist/openssl.spec			patch
src/crypto/external/bsd/openssl/dist/apps/apps.c			patch
src/crypto/external/bsd/openssl/dist/apps/enc.c				patch
src/crypto/external/bsd/openssl/dist/apps/passwd.c			patch
src/crypto/external/bsd/openssl/dist/apps/s_server.c			patch
src/crypto/external/bsd/openssl/dist/apps/x509.c			patch
src/crypto/external/bsd/openssl/dist/crypto/md32_common.h		patch
src/crypto/external/bsd/openssl/dist/crypto/opensslv.h			patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/a_bytes.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/a_object.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/a_set.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/asn1_lib.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/asn_mime.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/d2i_pr.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/f_enum.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/f_int.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/f_string.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/p5_pbe.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/p5_pbev2.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/tasn_enc.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/tasn_prn.c		patch
src/crypto/external/bsd/openssl/dist/crypto/asn1/x_name.c		patch
src/crypto/external/bsd/openssl/dist/crypto/bio/bf_nbio.c		patch
src/crypto/external/bsd/openssl/dist/crypto/bn/bn_lib.c			patch
src/crypto/external/bsd/openssl/dist/crypto/bn/bn_print.c		patch
src/crypto/external/bsd/openssl/dist/crypto/bn/bn_rand.c		patch
src/crypto/external/bsd/openssl/dist/crypto/cms/cms_enc.c		patch
src/crypto/external/bsd/openssl/dist/crypto/cms/cms_ess.c		patch
src/crypto/external/bsd/openssl/dist/crypto/cms/cms_pwri.c		patch
src/crypto/external/bsd/openssl/dist/crypto/des/des.c			patch
src/crypto/external/bsd/openssl/dist/crypto/des/enc_writ.c		patch
src/crypto/external/bsd/openssl/dist/crypto/dsa/dsa_gen.c		patch
src/crypto/external/bsd/openssl/dist/crypto/dsa/dsa_ossl.c		patch
src/crypto/external/bsd/openssl/dist/crypto/evp/bio_ok.c		patch
src/crypto/external/bsd/openssl/dist/crypto/evp/digest.c		patch
src/crypto/external/bsd/openssl/dist/crypto/evp/e_seed.c		patch
src/crypto/external/bsd/openssl/dist/crypto/md2/md2_dgst.c		patch
src/crypto/external/bsd/openssl/dist/crypto/mdc2/mdc2dgst.c		patch
src/crypto/external/bsd/openssl/dist/crypto/ocsp/ocsp_ext.c		patch
src/crypto/external/bsd/openssl/dist/crypto/pem/pem.h			patch
src/crypto/external/bsd/openssl/dist/crypto/pem/pem_err.c		patch
src/crypto/external/bsd/openssl/dist/crypto/pem/pem_lib.c		patch
src/crypto/external/bsd/openssl/dist/crypto/pem/pvkfmt.c		patch
src/crypto/external/bsd/openssl/dist/crypto/pkcs12/p12_mutl.c		patch
src/crypto/external/bsd/openssl/dist/crypto/pkcs12/p12_npas.c		patch
src/crypto/external/bsd/openssl/dist/crypto/pkcs12/p12_utl.c		patch
src/crypto/external/bsd/openssl/dist/crypto/pkcs12/pkcs12.h		patch
src/crypto/external/bsd/openssl/dist/crypto/pkcs7/pk7_doit.c		patch
src/crypto/external/bsd/openssl/dist/crypto/rand/rand_unix.c		patch
src/crypto/external/bsd/openssl/dist/crypto/srp/srp_lib.c		patch
src/crypto/external/bsd/openssl/dist/crypto/srp/srp_vfy.c		patch
src/crypto/external/bsd/openssl/dist/crypto/ts/ts_lib.c			patch
src/crypto/external/bsd/openssl/dist/crypto/whrlpool/wp_dgst.c		patch
src/crypto/external/bsd/openssl/dist/crypto/x509/x509.h			patch
src/crypto/external/bsd/openssl/dist/crypto/x509/x509_err.c		patch
src/crypto/external/bsd/openssl/dist/crypto/x509/x509_txt.c		patch
src/crypto/external/bsd/openssl/dist/crypto/x509/x509_vfy.c		patch
src/crypto/external/bsd/openssl/dist/crypto/x509/x509_vfy.h		patch
src/crypto/external/bsd/openssl/dist/crypto/x509v3/v3_addr.c		patch
src/crypto/external/bsd/openssl/dist/doc/apps/cms.pod			patch
src/crypto/external/bsd/openssl/dist/doc/apps/smime.pod			patch
src/crypto/external/bsd/openssl/dist/doc/apps/verify.pod		patch
src/crypto/external/bsd/openssl/dist/doc/crypto/X509_verify_cert.pod	patch
src/crypto/external/bsd/openssl/dist/doc/crypto/d2i_PrivateKey.pod	patch
src/crypto/external/bsd/openssl/dist/ssl/d1_both.c			patch
src/crypto/external/bsd/openssl/dist/ssl/d1_clnt.c			patch
src/crypto/external/bsd/openssl/dist/ssl/d1_lib.c			patch
src/crypto/external/bsd/openssl/dist/ssl/d1_pkt.c			patch
src/crypto/external/bsd/openssl/dist/ssl/d1_srvr.c			patch
src/crypto/external/bsd/openssl/dist/ssl/s23_clnt.c			patch
src/crypto/external/bsd/openssl/dist/ssl/s2_clnt.c			patch
src/crypto/external/bsd/openssl/dist/ssl/s2_srvr.c			patch
src/crypto/external/bsd/openssl/dist/ssl/s3_both.c			patch
src/crypto/external/bsd/openssl/dist/ssl/s3_clnt.c			patch
src/crypto/external/bsd/openssl/dist/ssl/s3_lib.c			patch
src/crypto/external/bsd/openssl/dist/ssl/s3_srvr.c			patch
src/crypto/external/bsd/openssl/dist/ssl/ssl.h				patch
src/crypto/external/bsd/openssl/dist/ssl/ssl_err.c			patch
src/crypto/external/bsd/openssl/dist/ssl/ssl_lib.c			patch
src/crypto/external/bsd/openssl/dist/ssl/ssl_locl.h			patch
src/crypto/external/bsd/openssl/dist/ssl/ssl_sess.c			patch
src/crypto/external/bsd/openssl/dist/ssl/t1_lib.c			patch
src/crypto/external/bsd/openssl/dist/test/smime-certs/smdsa1.pem	patch
src/crypto/external/bsd/openssl/dist/test/smime-certs/smdsa2.pem	patch
src/crypto/external/bsd/openssl/dist/test/smime-certs/smdsa3.pem	patch
src/crypto/external/bsd/openssl/dist/test/smime-certs/smroot.pem	patch
src/crypto/external/bsd/openssl/dist/test/smime-certs/smrsa1.pem	patch
src/crypto/external/bsd/openssl/dist/test/smime-certs/smrsa2.pem	patch
src/crypto/external/bsd/openssl/dist/test/smime-certs/smrsa3.pem	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man.inc			patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ASN1_OBJECT_new.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ASN1_STRING_length.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ASN1_STRING_new.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ASN1_STRING_print_ex.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ASN1_generate_nconf.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_ctrl.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_f_base64.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_f_buffer.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_f_cipher.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_f_md.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_f_null.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_f_ssl.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_find_type.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_new.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_new_CMS.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_push.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_read.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_s_accept.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_s_bio.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_s_connect.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_s_fd.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_s_file.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_s_mem.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_s_null.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_s_socket.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_set_callback.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BIO_should_retry.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_BLINDING_new.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_CTX_new.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_CTX_start.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_add.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_add_word.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_bn2bin.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_cmp.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_copy.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_generate_prime.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_mod_inverse.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_mod_mul_montgomery.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_mod_mul_reciprocal.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_new.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_num_bytes.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_rand.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_set_bit.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_swap.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/BN_zero.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_add0_cert.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_add1_recipient_cert.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_add1_signer.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_compress.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_decrypt.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_encrypt.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_final.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_get0_RecipientInfos.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_get0_SignerInfos.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_get0_type.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_get1_ReceiptRequest.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_sign.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_sign_receipt.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_uncompress.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_verify.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CMS_verify_receipt.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CONF_modules_free.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CONF_modules_load_file.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/CRYPTO_set_ex_data.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DH_generate_key.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DH_generate_parameters.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DH_get_ex_new_index.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DH_new.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DH_set_method.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DH_size.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DSA_SIG_new.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DSA_do_sign.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DSA_dup_DH.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DSA_generate_key.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DSA_generate_parameters.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DSA_get_ex_new_index.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DSA_new.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DSA_set_method.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DSA_sign.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/DSA_size.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ERR_GET_LIB.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ERR_clear_error.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ERR_error_string.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ERR_get_error.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ERR_load_crypto_strings.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ERR_load_strings.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ERR_print_errors.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ERR_put_error.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ERR_remove_state.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ERR_set_mark.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_BytesToKey.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_DigestInit.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_DigestSignInit.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_DigestVerifyInit.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_EncodeInit.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_EncryptInit.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_OpenInit.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_CTX_ctrl.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_CTX_new.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_cmp.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_decrypt.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_derive.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_encrypt.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_get_default_digest.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_keygen.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_new.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_print_private.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_set1_RSA.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_sign.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_verify.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_PKEY_verify_recover.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_SealInit.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_SignInit.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/EVP_VerifyInit.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/OBJ_nid2obj.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/OPENSSL_Applink.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/OPENSSL_VERSION_NUMBER.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/OPENSSL_config.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/OPENSSL_ia32cap.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/OPENSSL_load_builtin_modules.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/OpenSSL_add_all_algorithms.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/PEM_write_bio_CMS_stream.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/PEM_write_bio_PKCS7_stream.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/PKCS12_create.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/PKCS12_parse.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/PKCS7_decrypt.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/PKCS7_encrypt.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/PKCS7_sign.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/PKCS7_sign_add_signer.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/PKCS7_verify.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RAND_add.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RAND_bytes.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RAND_cleanup.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RAND_egd.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RAND_load_file.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RAND_set_rand_method.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_blinding_on.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_check_key.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_generate_key.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_get_ex_new_index.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_new.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_padding_add_PKCS1_type_1.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_print.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_private_encrypt.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_public_encrypt.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_set_method.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_sign.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_sign_ASN1_OCTET_STRING.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/RSA_size.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SMIME_read_CMS.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SMIME_read_PKCS7.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SMIME_write_CMS.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SMIME_write_PKCS7.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CIPHER_get_name.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_COMP_add_compression_method.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_add_extra_chain_cert.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_add_session.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_ctrl.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_flush_sessions.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_free.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_get_ex_new_index.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_get_verify_mode.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_load_verify_locations.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_new.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_sess_number.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_sess_set_cache_size.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_sess_set_get_cb.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_sessions.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_cert_store.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_cert_verify_callback.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_cipher_list.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_client_CA_list.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_client_cert_cb.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_default_passwd_cb.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_generate_session_id.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_info_callback.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_max_cert_list.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_mode.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_msg_callback.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_options.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_psk_client_callback.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_quiet_shutdown.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_read_ahead.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_session_cache_mode.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_session_id_context.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_ssl_version.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_timeout.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_tlsext_status_cb.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_tlsext_ticket_key_cb.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_tmp_dh_callback.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_tmp_rsa_callback.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_set_verify.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_use_certificate.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_CTX_use_psk_identity_hint.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_SESSION_free.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_SESSION_get_ex_new_index.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_SESSION_get_time.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_accept.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_alert_type_string.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_clear.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_connect.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_do_handshake.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_free.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_SSL_CTX.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_ciphers.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_client_CA_list.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_current_cipher.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_default_timeout.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_error.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_ex_data_X509_STORE_CTX_idx.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_ex_new_index.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_fd.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_peer_cert_chain.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_peer_certificate.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_psk_identity.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_rbio.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_session.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_verify_result.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_get_version.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_library_init.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_load_client_CA_file.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_new.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_pending.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_read.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_rstate_string.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_session_reused.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_set_bio.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_set_connect_state.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_set_fd.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_set_session.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_set_shutdown.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_set_verify_result.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_shutdown.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_state_string.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_want.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/SSL_write.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/X509_NAME_ENTRY_get_object.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/X509_NAME_add_entry_by_txt.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/X509_NAME_get_index_by_NID.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/X509_NAME_print_ex.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/X509_STORE_CTX_get_error.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/X509_STORE_CTX_get_ex_new_index.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/X509_STORE_CTX_new.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/X509_STORE_CTX_set_verify_cb.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/X509_STORE_set_verify_cb_func.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/X509_VERIFY_PARAM_set_flags.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/X509_new.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/X509_verify_cert.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/crypto.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_ASN1_OBJECT.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_CMS_ContentInfo.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_DHparams.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_DSAPublicKey.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_ECPrivateKey.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_PKCS8PrivateKey.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_PrivateKey.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_RSAPublicKey.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_SSL_SESSION.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_X509.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_X509_ALGOR.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_X509_CRL.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_X509_NAME.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_X509_REQ.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/d2i_X509_SIG.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/des_modes.7		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/i2d_CMS_bio_stream.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/i2d_PKCS7_bio_stream.3 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/lh_stats.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl.1		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl.cnf.5		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_CA.pl.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_asn1parse.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_bio.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_blowfish.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_bn.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_bn_internal.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_buffer.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_c_rehash.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_ca.1		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_ciphers.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_cms.1		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_crl.1		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_crl2pkcs7.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_des.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_dgst.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_dh.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_dhparam.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_dsa.1		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_dsa.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_dsaparam.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_ec.1		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_ecdsa.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_ecparam.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_enc.1		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_engine.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_err.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_errstr.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_evp.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_gendsa.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_genpkey.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_genrsa.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_hmac.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_lhash.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_md5.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_mdc2.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_nseq.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_ocsp.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_passwd.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_pem.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_pkcs12.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_pkcs7.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_pkcs8.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_pkey.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_pkeyparam.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_pkeyutl.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_rand.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_rand.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_rc4.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_req.1		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_ripemd.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_rsa.1		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_rsa.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_rsautl.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_s_client.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_s_server.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_s_time.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_sess_id.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_sha.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_smime.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_speed.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_spkac.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_threads.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_ts.1		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_tsget.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_ui.3		patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_ui_compat.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_verify.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_version.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_x509.1	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_x509.3	patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/openssl_x509v3_config.1 patch
src/crypto/external/bsd/openssl/lib/libcrypto/man/ssl.3			patch

	Update OpenSSL to 1.0.1u.
	Major changes between OpenSSL 1.0.1t and OpenSSL 1.0.1u [22 Sep 2016]

	    o OCSP Status Request extension unbounded memory growth (CVE-2016-6304)
	    o SWEET32 Mitigation (CVE-2016-2183)
	    o OOB write in MDC2_Update() (CVE-2016-6303)
	    o Malformed SHA512 ticket DoS (CVE-2016-6302)
	    o OOB write in BN_bn2dec() (CVE-2016-2182)
	    o OOB read in TS_OBJ_print_bio() (CVE-2016-2180)
	    o Pointer arithmetic undefined behaviour (CVE-2016-2177)
	    o Constant time flag not preserved in DSA signing (CVE-2016-2178)
	    o DTLS buffered message DoS (CVE-2016-2179)
	    o DTLS replay protection DoS (CVE-2016-2181)
	    o Certificate message OOB reads (CVE-2016-6306)
	[spz, ticket 1409]
2016-10-05 10:23:17 +00:00
abhinav
269b3adc7a Add section number to the Xrefs
Remove a blank space at the end of the line 130 (makes mandoc -Tlint happy)
2016-09-12 16:54:31 +00:00
christos
968a6448d4 Fix the error handling so that we print the earliest error message. 2016-09-03 09:31:22 +00:00
christos
328016aa2a Avoid segv when the end signature is not found! 2016-08-28 15:52:22 +00:00
jakllsch
a392713e10 Add some missing __attribute__((format(printf annotations. 2016-08-03 15:24:28 +00:00
christos
efdc9ac20d remove unused code 2016-08-02 13:53:44 +00:00
christos
5101d40313 merge conflicts. 2016-08-02 13:45:12 +00:00
christos
92af1b7ef2 OpenSSH 7.3 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.

OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.

Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots or donated to the
project. More information on donations may be found at:
http://www.openssh.com/donations.html

Future deprecation notice
=========================

We plan on retiring more legacy cryptography in a near-future
release, specifically:

 * Refusing all RSA keys smaller than 1024 bits (the current minimum
   is 768 bits)
 * Removing server-side support for the SSH v.1 protocol (currently
   compile-time disabled).
 * In approximately 1 year, removing all support for the SSH v.1
   protocol (currently compile-time disabled).

This list reflects our current intentions, but please check the final
release notes for future releases.

Changes since OpenSSH 7.2
=========================

This is primarily a bugfix release.

Security
--------

 * sshd(8): Mitigate a potential denial-of-service attack against
   the system's crypt(3) function via sshd(8). An attacker could
   send very long passwords that would cause excessive CPU use in
   crypt(3). sshd(8) now refuses to accept password authentication
   requests of length greater than 1024 characters. Independently
   reported by Tomas Kuthan (Oracle), Andres Rojas and Javier Nieto.

 * sshd(8): Mitigate timing differences in password authentication
   that could be used to discern valid from invalid account names
   when long passwords were sent and particular password hashing
   algorithms are in use on the server. CVE-2016-6210, reported by
   EddieEzra.Harari at verint.com

 * ssh(1), sshd(8): Fix observable timing weakness in the CBC padding
   oracle countermeasures. Reported by Jean Paul Degabriele, Kenny
   Paterson, Torben Hansen and Martin Albrecht. Note that CBC ciphers
   are disabled by default and only included for legacy compatibility.

 * ssh(1), sshd(8): Improve operation ordering of MAC verification for
   Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the
   MAC before decrypting any ciphertext. This removes the possibility
   of timing differences leaking facts about the plaintext, though no
   such leakage has been observed.  Reported by Jean Paul Degabriele,
   Kenny Paterson, Torben Hansen and Martin Albrecht.

 * sshd(8): (portable only) Ignore PAM environment vars when
   UseLogin=yes. If PAM is configured to read user-specified
   environment variables and UseLogin=yes in sshd_config, then a
   hostile local user may attack /bin/login via LD_PRELOAD or
   similar environment variables set via PAM. CVE-2015-8325,
   found by Shayan Sadigh.

New Features
------------

 * ssh(1): Add a ProxyJump option and corresponding -J command-line
   flag to allow simplified indirection through a one or more SSH
   bastions or "jump hosts".

 * ssh(1): Add an IdentityAgent option to allow specifying specific
   agent sockets instead of accepting one from the environment.

 * ssh(1): Allow ExitOnForwardFailure and ClearAllForwardings to be
   optionally overridden when using ssh -W. bz#2577

 * ssh(1), sshd(8): Implement support for the IUTF8 terminal mode as
   per draft-sgtatham-secsh-iutf8-00.

 * ssh(1), sshd(8): Add support for additional fixed Diffie-Hellman
   2K, 4K and 8K groups from draft-ietf-curdle-ssh-kex-sha2-03.

 * ssh-keygen(1), ssh(1), sshd(8): support SHA256 and SHA512 RSA
   signatures in certificates;

 * ssh(1): Add an Include directive for ssh_config(5) files.

 * ssh(1): Permit UTF-8 characters in pre-authentication banners sent
   from the server. bz#2058

Bugfixes
--------

 * ssh(1), sshd(8): Reduce the syslog level of some relatively common
   protocol events from LOG_CRIT. bz#2585

 * sshd(8): Refuse AuthenticationMethods="" in configurations and
   accept AuthenticationMethods=any for the default behaviour of not
   requiring multiple authentication. bz#2398

 * sshd(8): Remove obsolete and misleading "POSSIBLE BREAK-IN
   ATTEMPT!" message when forward and reverse DNS don't match. bz#2585

 * ssh(1): Close ControlPersist background process stderr except
   in debug mode or when logging to syslog. bz#1988

 * misc: Make PROTOCOL description for direct-streamlocal@openssh.com
   channel open messages match deployed code. bz#2529

 * ssh(1): Deduplicate LocalForward and RemoteForward entries to fix
   failures when both ExitOnForwardFailure and hostname
   canonicalisation are enabled. bz#2562

 * sshd(8): Remove fallback from moduli to obsolete "primes" file
   that was deprecated in 2001. bz#2559.

 * sshd_config(5): Correct description of UseDNS: it affects ssh
   hostname processing for authorized_keys, not known_hosts; bz#2554

 * ssh(1): Fix authentication using lone certificate keys in an agent
   without corresponding private keys on the filesystem. bz#2550

 * sshd(8): Send ClientAliveInterval pings when a time-based
   RekeyLimit is set; previously keepalive packets were not being
   sent. bz#2252

Portability
-----------

 * ssh(1), sshd(8): Fix compilation by automatically disabling ciphers
   not supported by OpenSSL. bz#2466

 * misc: Fix compilation failures on some versions of AIX's compiler
   related to the definition of the VA_COPY macro. bz#2589

 * sshd(8): Whitelist more architectures to enable the seccomp-bpf
   sandbox. bz#2590

 * ssh-agent(1), sftp-server(8): Disable process tracing on Solaris
   using setpflags(__PROC_PROTECT, ...). bz#2584

 * sshd(8): On Solaris, don't call Solaris setproject() with
   UsePAM=yes it's PAM's responsibility. bz#2425

Checksums:
==========

 - SHA1 (openssh-7.3.tar.gz) = b1641e5265d9ec68a9a19decc3a7edd1203cbd33
 - SHA256 (openssh-7.3.tar.gz) = vS0X35qrX9OOPBkyDMYhOje/DBwHBVEV7nv5rkzw4vM=

 - SHA1 (openssh-7.3p1.tar.gz) = bfade84283fcba885e2084343ab19a08c7d123a5
 - SHA256 (openssh-7.3p1.tar.gz) = P/uYmm3KppWUw7VQ1IVaWi4XGMzd5/XjY4e0JCIPvsw=

Please note that the SHA256 signatures are base64 encoded and not
hexadecimal (which is the default for most checksum tools). The PGP
key used to sign the releases is available as RELEASE_KEY.asc from
the mirror sites.

Reporting Bugs:
===============

- Please read http://www.openssh.com/report.html
  Security bugs should be reported directly to openssh@openssh.com

OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de
Raadt, Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre,
Tim Rice and Ben Lindstrom.
2016-08-02 13:30:06 +00:00
christos
417e1b99d5 OpenSSH 7.3 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.

OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.

Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots or donated to the
project. More information on donations may be found at:
http://www.openssh.com/donations.html

Future deprecation notice
=========================

We plan on retiring more legacy cryptography in a near-future
release, specifically:

 * Refusing all RSA keys smaller than 1024 bits (the current minimum
   is 768 bits)
 * Removing server-side support for the SSH v.1 protocol (currently
   compile-time disabled).
 * In approximately 1 year, removing all support for the SSH v.1
   protocol (currently compile-time disabled).

This list reflects our current intentions, but please check the final
release notes for future releases.

Changes since OpenSSH 7.2
=========================

This is primarily a bugfix release.

Security
--------

 * sshd(8): Mitigate a potential denial-of-service attack against
   the system's crypt(3) function via sshd(8). An attacker could
   send very long passwords that would cause excessive CPU use in
   crypt(3). sshd(8) now refuses to accept password authentication
   requests of length greater than 1024 characters. Independently
   reported by Tomas Kuthan (Oracle), Andres Rojas and Javier Nieto.

 * sshd(8): Mitigate timing differences in password authentication
   that could be used to discern valid from invalid account names
   when long passwords were sent and particular password hashing
   algorithms are in use on the server. CVE-2016-6210, reported by
   EddieEzra.Harari at verint.com

 * ssh(1), sshd(8): Fix observable timing weakness in the CBC padding
   oracle countermeasures. Reported by Jean Paul Degabriele, Kenny
   Paterson, Torben Hansen and Martin Albrecht. Note that CBC ciphers
   are disabled by default and only included for legacy compatibility.

 * ssh(1), sshd(8): Improve operation ordering of MAC verification for
   Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the
   MAC before decrypting any ciphertext. This removes the possibility
   of timing differences leaking facts about the plaintext, though no
   such leakage has been observed.  Reported by Jean Paul Degabriele,
   Kenny Paterson, Torben Hansen and Martin Albrecht.

 * sshd(8): (portable only) Ignore PAM environment vars when
   UseLogin=yes. If PAM is configured to read user-specified
   environment variables and UseLogin=yes in sshd_config, then a
   hostile local user may attack /bin/login via LD_PRELOAD or
   similar environment variables set via PAM. CVE-2015-8325,
   found by Shayan Sadigh.

New Features
------------

 * ssh(1): Add a ProxyJump option and corresponding -J command-line
   flag to allow simplified indirection through a one or more SSH
   bastions or "jump hosts".

 * ssh(1): Add an IdentityAgent option to allow specifying specific
   agent sockets instead of accepting one from the environment.

 * ssh(1): Allow ExitOnForwardFailure and ClearAllForwardings to be
   optionally overridden when using ssh -W. bz#2577

 * ssh(1), sshd(8): Implement support for the IUTF8 terminal mode as
   per draft-sgtatham-secsh-iutf8-00.

 * ssh(1), sshd(8): Add support for additional fixed Diffie-Hellman
   2K, 4K and 8K groups from draft-ietf-curdle-ssh-kex-sha2-03.

 * ssh-keygen(1), ssh(1), sshd(8): support SHA256 and SHA512 RSA
   signatures in certificates;

 * ssh(1): Add an Include directive for ssh_config(5) files.

 * ssh(1): Permit UTF-8 characters in pre-authentication banners sent
   from the server. bz#2058

Bugfixes
--------

 * ssh(1), sshd(8): Reduce the syslog level of some relatively common
   protocol events from LOG_CRIT. bz#2585

 * sshd(8): Refuse AuthenticationMethods="" in configurations and
   accept AuthenticationMethods=any for the default behaviour of not
   requiring multiple authentication. bz#2398

 * sshd(8): Remove obsolete and misleading "POSSIBLE BREAK-IN
   ATTEMPT!" message when forward and reverse DNS don't match. bz#2585

 * ssh(1): Close ControlPersist background process stderr except
   in debug mode or when logging to syslog. bz#1988

 * misc: Make PROTOCOL description for direct-streamlocal@openssh.com
   channel open messages match deployed code. bz#2529

 * ssh(1): Deduplicate LocalForward and RemoteForward entries to fix
   failures when both ExitOnForwardFailure and hostname
   canonicalisation are enabled. bz#2562

 * sshd(8): Remove fallback from moduli to obsolete "primes" file
   that was deprecated in 2001. bz#2559.

 * sshd_config(5): Correct description of UseDNS: it affects ssh
   hostname processing for authorized_keys, not known_hosts; bz#2554

 * ssh(1): Fix authentication using lone certificate keys in an agent
   without corresponding private keys on the filesystem. bz#2550

 * sshd(8): Send ClientAliveInterval pings when a time-based
   RekeyLimit is set; previously keepalive packets were not being
   sent. bz#2252

Portability
-----------

 * ssh(1), sshd(8): Fix compilation by automatically disabling ciphers
   not supported by OpenSSL. bz#2466

 * misc: Fix compilation failures on some versions of AIX's compiler
   related to the definition of the VA_COPY macro. bz#2589

 * sshd(8): Whitelist more architectures to enable the seccomp-bpf
   sandbox. bz#2590

 * ssh-agent(1), sftp-server(8): Disable process tracing on Solaris
   using setpflags(__PROC_PROTECT, ...). bz#2584

 * sshd(8): On Solaris, don't call Solaris setproject() with
   UsePAM=yes it's PAM's responsibility. bz#2425

Checksums:
==========

 - SHA1 (openssh-7.3.tar.gz) = b1641e5265d9ec68a9a19decc3a7edd1203cbd33
 - SHA256 (openssh-7.3.tar.gz) = vS0X35qrX9OOPBkyDMYhOje/DBwHBVEV7nv5rkzw4vM=

 - SHA1 (openssh-7.3p1.tar.gz) = bfade84283fcba885e2084343ab19a08c7d123a5
 - SHA256 (openssh-7.3p1.tar.gz) = P/uYmm3KppWUw7VQ1IVaWi4XGMzd5/XjY4e0JCIPvsw=

Please note that the SHA256 signatures are base64 encoded and not
hexadecimal (which is the default for most checksum tools). The PGP
key used to sign the releases is available as RELEASE_KEY.asc from
the mirror sites.

Reporting Bugs:
===============

- Please read http://www.openssh.com/report.html
  Security bugs should be reported directly to openssh@openssh.com

OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de
Raadt, Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre,
Tim Rice and Ben Lindstrom.
2016-08-02 13:29:06 +00:00
christos
fe3d7b70d6 -Wno-stack-protector 2016-07-25 06:20:26 +00:00
christos
2fcbe1519f CID 977755: Resource leaks. 2016-06-28 16:34:40 +00:00
agc
0ad97abd01 Update netpgpverify to 20160617
Sync with changes in pkgsrc

+ don't assume a string is NUL-terminated - use fwrite(3) with a specific size
2016-06-15 20:34:28 +00:00
agc
f0cd146e8f Update netpgpverify to 20160616:
+ Bring over change from pkgsrc to add version.asc signature verification
to complement the noversion.asc cleartext signatures

+ Update version to 20160616
2016-06-15 16:51:46 +00:00
joerg
d9ced641b5 Mark obuf_printf as printf-like. 2016-06-15 15:47:50 +00:00
mrg
e6e96483bf replace the previous hack with something that i believe is actually
correct and, more importantly ;), works properly.

thanks for riastradh for hints about which bit was actually broken.
2016-06-15 05:01:58 +00:00
agc
02fd82b2cb netpgpverify: bring over changes in 20160615 from pkgsrc
+ perform check for start of ascii-armoured signature in a more efficient
way
2016-06-15 03:37:50 +00:00
mrg
6bfcf96505 build convert_endian() with "no-strict-aliases" optimiser attribute
to avoid some unknown miscompilation in endian_convert() that causes
ssh to exit on some output (for me, "cc -v".)

note in HACKS.  we should investigate this further if possible as
this seems to indicate a strict aliasing violation.  there certainly
are 32 and 64 bit object arrays being accessed with 8 bit accessors,
but i don't have time currently.
2016-06-15 02:12:14 +00:00
agc
ffd13a8c6d add file used for testing gpg --emit-no-version case 2016-06-14 20:55:00 +00:00
agc
4dc60d040f add test for signatures produced by gpg --no-emit-version 2016-06-14 20:47:43 +00:00
agc
dd98b26d9b Sync with pkgsrc sources as of version 20160614
+ pick up renaming changes to internal routines
+ fix for issue verifying signatures created by gpg --no-emit-version
+ add test for same
2016-06-14 20:47:08 +00:00
abhinav
65652ab083 Fix spelling of the month in the date (sent pull request upstream). 2016-06-10 18:55:52 +00:00
christos
22cce15d1f revert, everything coredumps with this change. 2016-06-04 18:22:45 +00:00
joerg
78fd5ce7d6 Regenerate to use .ctor. 2016-06-03 15:42:15 +00:00
joerg
80379e533e Replace init sections with the simpler .ctor sections. 2016-06-03 15:41:57 +00:00
snj
7ce81240c1 hook new man pages into build 2016-05-06 09:30:05 +00:00
snj
9cda733fe1 regen for openssl 1.0.1t 2016-05-06 09:28:31 +00:00
christos
411ef98e1a merge conflicts 2016-05-03 17:21:32 +00:00
christos
43fd2ac1eb Security fixes:
*) Prevent padding oracle in AES-NI CBC MAC check

     A MITM attacker can use a padding oracle attack to decrypt traffic
     when the connection uses an AES CBC cipher and the server support
     AES-NI.

     This issue was introduced as part of the fix for Lucky 13 padding
     attack (CVE-2013-0169). The padding check was rewritten to be in
     constant time by making sure that always the same bytes are read and
     compared against either the MAC or padding bytes. But it no longer
     checked that there was enough data to have both the MAC and padding
     bytes.

     This issue was reported by Juraj Somorovsky using TLS-Attacker.
     (CVE-2016-2107)
     [Kurt Roeckx]

  *) Fix EVP_EncodeUpdate overflow

     An overflow can occur in the EVP_EncodeUpdate() function which is used for
     Base64 encoding of binary data. If an attacker is able to supply very large
     amounts of input data then a length check can overflow resulting in a heap
     corruption.

     Internally to OpenSSL the EVP_EncodeUpdate() function is primarly used by
     the PEM_write_bio* family of functions. These are mainly used within the
     OpenSSL command line applications, so any application which processes data
     from an untrusted source and outputs it as a PEM file should be considered
     vulnerable to this issue. User applications that call these APIs directly
     with large amounts of untrusted data may also be vulnerable.

     This issue was reported by Guido Vranken.
     (CVE-2016-2105)
     [Matt Caswell]

  *) Fix EVP_EncryptUpdate overflow

     An overflow can occur in the EVP_EncryptUpdate() function. If an attacker
     is able to supply very large amounts of input data after a previous call to
     EVP_EncryptUpdate() with a partial block then a length check can overflow
     resulting in a heap corruption. Following an analysis of all OpenSSL
     internal usage of the EVP_EncryptUpdate() function all usage is one of two
     forms. The first form is where the EVP_EncryptUpdate() call is known to be
     the first called function after an EVP_EncryptInit(), and therefore that
     specific call must be safe. The second form is where the length passed to
     EVP_EncryptUpdate() can be seen from the code to be some small value and
     therefore there is no possibility of an overflow. Since all instances are
     one of these two forms, it is believed that there can be no overflows in
     internal code due to this problem. It should be noted that
     EVP_DecryptUpdate() can call EVP_EncryptUpdate() in certain code paths.
     Also EVP_CipherUpdate() is a synonym for EVP_EncryptUpdate(). All instances
     of these calls have also been analysed too and it is believed there are no
     instances in internal usage where an overflow could occur.

     This issue was reported by Guido Vranken.
     (CVE-2016-2106)
     [Matt Caswell]

  *) Prevent ASN.1 BIO excessive memory allocation

     When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
     a short invalid encoding can casuse allocation of large amounts of memory
     potentially consuming excessive resources or exhausting memory.

     Any application parsing untrusted data through d2i BIO functions is
     affected. The memory based functions such as d2i_X509() are *not* affected.
     Since the memory based functions are used by the TLS library, TLS
     applications are not affected.

     This issue was reported by Brian Carpenter.
     (CVE-2016-2109)
     [Stephen Henson]

  *) EBCDIC overread

     ASN1 Strings that are over 1024 bytes can cause an overread in applications
     using the X509_NAME_oneline() function on EBCDIC systems. This could result
     in arbitrary stack data being returned in the buffer.

     This issue was reported by Guido Vranken.
     (CVE-2016-2176)
     [Matt Caswell]

  *) Modify behavior of ALPN to invoke callback after SNI/servername
     callback, such that updates to the SSL_CTX affect ALPN.
     [Todd Short]

  *) Remove LOW from the DEFAULT cipher list.  This removes singles DES from the
     default.
     [Kurt Roeckx]

  *) Only remove the SSLv2 methods with the no-ssl2-method option. When the
     methods are enabled and ssl2 is disabled the methods return NULL.
     [Kurt Roeckx]
2016-05-03 17:10:26 +00:00
wiz
2ac4fbecd9 Fix xref. 2016-04-28 08:18:05 +00:00
christos
db1e653281 If PAM is configured to read user-specified environment variables
and UseLogin=yes in sshd_config, then a hostile local user may
attack /bin/login via LD_PRELOAD or similar environment variables
set via PAM.

CVE-2015-8325, found by Shayan Sadigh, via Colin Watson
https://anongit.mindrot.org/openssh.git/commit/?\
id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755

XXX: pullup-7
2016-04-14 16:42:09 +00:00
christos
30150afc85 Don't die on RC5 warning 2016-04-13 21:33:52 +00:00
christos
743c16df37 regen with old assembly stubs. 2016-03-21 19:13:15 +00:00
christos
ddfe1626d6 revert change from openssl-1.1.0-pre4, breaks gcc-4.8 2016-03-21 19:12:26 +00:00
christos
66aed21df4 regen 2016-03-20 22:27:44 +00:00
christos
b09de184c8 elide bug with new cpuid code. 2016-03-20 22:27:31 +00:00
christos
e3b47d16a6 bring newer versions from 1.1.0-pre4 2016-03-20 22:26:56 +00:00
christos
5a840fc796 re-gen to fix sha1. there were also improvements for montgomery multiplications
that we did not have from a previous change.
2016-03-20 22:18:43 +00:00
christos
2392dd986f move scratch stack offset from 64 to 72 bytes so that it is aligned properly.
We core-dump using xmm instructions with gcc-5.3 otherwise. This is all
fixed a lot better in openssl-1.1.0-pre4 and I am tempted....
2016-03-20 22:17:13 +00:00
christos
c7894c4458 remove unused variable 2016-03-16 21:41:25 +00:00
christos
8cf4c21bed CID 1356385: Add fallthrough comment 2016-03-16 21:09:39 +00:00
christos
936fc04948 CID 1356389: Remove TOCTOU. 2016-03-16 21:07:59 +00:00
christos
47690f3506 CID 1356388: Prevent DoS from Tainted scalar 2016-03-16 21:06:06 +00:00
christos
6520304603 CID 1356386: Don't leak sock 2016-03-16 21:00:37 +00:00
christos
76b039a9c6 CID 1356384: Check returns 2016-03-16 20:57:46 +00:00
christos
a2730ae23c CID 1018734: Unitialized variable 2016-03-16 20:55:54 +00:00
christos
a8a1a8c522 PR/50943: David Binderman: Fix misplaced parenthesis. 2016-03-11 18:28:43 +00:00
christos
238888033a Add more __dead; pointed out by clang (from tnn@) 2016-03-11 13:15:02 +00:00
christos
1b8bb90dd8 fix pam build. 2016-03-11 03:54:27 +00:00
christos
7997655135 merge conflicts 2016-03-11 01:55:00 +00:00
christos
48b0210551 Future deprecation notice
=========================

We plan on retiring more legacy cryptography in a near-future
release, specifically:

 * Refusing all RSA keys smaller than 1024 bits (the current minimum
   is 768 bits)

This list reflects our current intentions, but please check the final
release notes for future releases.

Potentially-incompatible changes
================================

This release disables a number of legacy cryptographic algorithms
by default in ssh:

 * Several ciphers blowfish-cbc, cast128-cbc, all arcfour variants
   and the rijndael-cbc aliases for AES.

 * MD5-based and truncated HMAC algorithms.

These algorithms are already disabled by default in sshd.

Changes since OpenSSH 7.1p2
===========================

This is primarily a bugfix release.

Security
--------

 * ssh(1), sshd(8): remove unfinished and unused roaming code (was
   already forcibly disabled in OpenSSH 7.1p2).

 * ssh(1): eliminate fallback from untrusted X11 forwarding to
   trusted forwarding when the X server disables the SECURITY
   extension.

 * ssh(1), sshd(8): increase the minimum modulus size supported for
   diffie-hellman-group-exchange to 2048 bits.

 * sshd(8): pre-auth sandboxing is now enabled by default (previous
   releases enabled it for new installations via sshd_config).

New Features
------------

 * all: add support for RSA signatures using SHA-256/512 hash
   algorithms based on draft-rsa-dsa-sha2-256-03.txt and
   draft-ssh-ext-info-04.txt.

 * ssh(1): Add an AddKeysToAgent client option which can be set to
   'yes', 'no', 'ask', or 'confirm', and defaults to 'no'.  When
   enabled, a private key that is used during authentication will be
   added to ssh-agent if it is running (with confirmation enabled if
   set to 'confirm').

 * sshd(8): add a new authorized_keys option "restrict" that includes
   all current and future key restrictions (no-*-forwarding, etc.).
   Also add permissive versions of the existing restrictions, e.g.
   "no-pty" -> "pty". This simplifies the task of setting up
   restricted keys and ensures they are maximally-restricted,
   regardless of any permissions we might implement in the future.

 * ssh(1): add ssh_config CertificateFile option to explicitly list
   certificates. bz#2436

 * ssh-keygen(1): allow ssh-keygen to change the key comment for all
   supported formats.

 * ssh-keygen(1): allow fingerprinting from standard input, e.g.
   "ssh-keygen -lf -"

 * ssh-keygen(1): allow fingerprinting multiple public keys in a
   file, e.g. "ssh-keygen -lf ~/.ssh/authorized_keys" bz#1319

 * sshd(8): support "none" as an argument for sshd_config
   Foreground and ChrootDirectory. Useful inside Match blocks to
   override a global default. bz#2486

 * ssh-keygen(1): support multiple certificates (one per line) and
   reading from standard input (using "-f -") for "ssh-keygen -L"

 * ssh-keyscan(1): add "ssh-keyscan -c ..." flag to allow fetching
   certificates instead of plain keys.

 * ssh(1): better handle anchored FQDNs (e.g. 'cvs.openbsd.org.') in
   hostname canonicalisation - treat them as already canonical and
   remove the trailing '.' before matching ssh_config.

Bugfixes
--------

 * sftp(1): existing destination directories should not terminate
   recursive uploads (regression in openssh 6.8) bz#2528

 * ssh(1), sshd(8): correctly send back SSH2_MSG_UNIMPLEMENTED
   replies to unexpected messages during key exchange. bz#2949

 * ssh(1): refuse attempts to set ConnectionAttempts=0, which does
   not make sense and would cause ssh to print an uninitialised stack
   variable. bz#2500

 * ssh(1): fix errors when attempting to connect to scoped IPv6
   addresses with hostname canonicalisation enabled.

 * sshd_config(5): list a couple more options usable in Match blocks.
   bz#2489

 * sshd(8): fix "PubkeyAcceptedKeyTypes +..." inside a Match block.

 * ssh(1): expand tilde characters in filenames passed to -i options
   before checking whether or not the identity file exists. Avoids
   confusion for cases where shell doesn't expand (e.g. "-i ~/file"
   vs. "-i~/file"). bz#2481

 * ssh(1): do not prepend "exec" to the shell command run by "Match
   exec" in a config file, which could cause some commands to fail
   in certain environments. bz#2471

 * ssh-keyscan(1): fix output for multiple hosts/addrs on one line
   when host hashing or a non standard port is in use bz#2479

 * sshd(8): skip "Could not chdir to home directory" message when
   ChrootDirectory is active. bz#2485

 * ssh(1): include PubkeyAcceptedKeyTypes in ssh -G config dump.

 * sshd(8): avoid changing TunnelForwarding device flags if they are
   already what is needed; makes it possible to use tun/tap
   networking as non-root user if device permissions and interface
   flags are pre-established

 * ssh(1), sshd(8): RekeyLimits could be exceeded by one packet.
   bz#2521

 * ssh(1): fix multiplexing master failure to notice client exit.

 * ssh(1), ssh-agent(1): avoid fatal() for PKCS11 tokens that present
   empty key IDs. bz#1773

 * sshd(8): avoid printf of NULL argument. bz#2535

 * ssh(1), sshd(8): allow RekeyLimits larger than 4GB. bz#2521

 * ssh-keygen(1): sshd(8): fix several bugs in (unused) KRL signature
   support.

 * ssh(1), sshd(8): fix connections with peers that use the key
   exchange guess feature of the protocol. bz#2515

 * sshd(8): include remote port number in log messages. bz#2503

 * ssh(1): don't try to load SSHv1 private key when compiled without
   SSHv1 support. bz#2505

 * ssh-agent(1), ssh(1): fix incorrect error messages during key
   loading and signing errors. bz#2507

 * ssh-keygen(1): don't leave empty temporary files when performing
   known_hosts file edits when known_hosts doesn't exist.

 * sshd(8): correct packet format for tcpip-forward replies for
   requests that don't allocate a port bz#2509

 * ssh(1), sshd(8): fix possible hang on closed output. bz#2469

 * ssh(1): expand %i in ControlPath to UID. bz#2449

 * ssh(1), sshd(8): fix return type of openssh_RSA_verify. bz#2460

 * ssh(1), sshd(8): fix some option parsing memory leaks. bz#2182

 * ssh(1): add a some debug output before DNS resolution; it's a
   place where ssh could previously silently stall in cases of
   unresponsive DNS servers. bz#2433

 * ssh(1): remove spurious newline in visual hostkey. bz#2686

 * ssh(1): fix printing (ssh -G ...) of HostKeyAlgorithms=+...

 * ssh(1): fix expansion of HostkeyAlgorithms=+...

Documentation
-------------

 * ssh_config(5), sshd_config(5): update default algorithm lists to
   match current reality. bz#2527

 * ssh(1): mention -Q key-plain and -Q key-cert query options.
   bz#2455

 * sshd_config(8): more clearly describe what AuthorizedKeysFile=none
   does.

 * ssh_config(5): better document ExitOnForwardFailure. bz#2444

 * sshd(5): mention internal DH-GEX fallback groups in manual.
   bz#2302

 * sshd_config(5): better description for MaxSessions option.
   bz#2531

Portability
-----------

 * ssh(1), sftp-server(8), ssh-agent(1), sshd(8): Support Illumos/
   Solaris fine-grained privileges. Including a pre-auth privsep
   sandbox and several pledge() emulations. bz#2511

 * Renovate redhat/openssh.spec, removing deprecated options and
   syntax.

 * configure: allow --without-ssl-engine with --without-openssl

 * sshd(8): fix multiple authentication using S/Key. bz#2502

 * sshd(8): read back from libcrypto RAND_* before dropping
   privileges.  Avoids sandboxing violations with BoringSSL.

 * Fix name collision with system-provided glob(3) functions.
   bz#2463

 * Adapt Makefile to use ssh-keygen -A when generating host keys.
   bz#2459

 * configure: correct default value for --with-ssh1 bz#2457

 * configure: better detection of _res symbol bz#2259

 * support getrandom() syscall on Linux
2016-03-11 01:49:59 +00:00
christos
71f53a526c From Frank Wille:
Request "IKE mode config" in "rsasig" (certificates on both sides only)
authentication mode, if "mode_cfg" is configured to "on".
Tested with a Lancom router, using the following configuration:

path include "/etc/racoon";
path certificate "/etc/racoon/certs";
path script "/etc/racoon/scripts";

remote "wpsd"
{
    remote_address 1.2.3.4;
    exchange_mode main,base;

    my_identifier asn1dn;
    certificate_type x509 "vpnclient15.crt" "vpnclient15.key";
    ca_type x509 "ca.crt";

    mode_cfg on;
    dpd_delay 20;
    nat_traversal on;
    lifetime time 8 hour;
    script "phase1-up.sh" phase1_up;
    script "phase1-down.sh" phase1_down;

    proposal {
        encryption_algorithm aes;
        hash_algorithm md5;
        authentication_method rsasig;
        dh_group 2;
    }
    proposal_check obey;
}

sainfo anonymous
{
    pfs_group 2;
    lifetime time 8 hour;
    encryption_algorithm aes;
    authentication_algorithm hmac_md5;
    compression_algorithm deflate;
}
2016-03-09 22:27:17 +00:00
christos
d2bf8aa2c7 PR/50918: David Binderman: Fix memory leak 2016-03-09 15:58:25 +00:00
christos
338c254400 merge conflicts, bump libraries to 11 for consistency. 2016-03-02 01:52:35 +00:00
christos
4fa8c26b73 OpenSSL Security Advisory [1st March 2016]
=========================================

NOTE: With this update, OpenSSL is disabling the SSLv2 protocol by default, as
well as removing SSLv2 EXPORT ciphers.  We strongly advise against the use of
SSLv2 due not only to the issues described below, but to the other known
deficiencies in the protocol as described at
https://tools.ietf.org/html/rfc6176


Cross-protocol attack on TLS using SSLv2 (DROWN) (CVE-2016-0800)
================================================================

Severity: High

A cross-protocol attack was discovered that could lead to decryption of TLS
sessions by using a server supporting SSLv2 and EXPORT cipher suites as a
Bleichenbacher RSA padding oracle.  Note that traffic between clients and
non-vulnerable servers can be decrypted provided another server supporting
SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP or
POP) shares the RSA keys of the non-vulnerable server. This vulnerability is
known as DROWN (CVE-2016-0800).

Recovering one session key requires the attacker to perform approximately 2^50
computation, as well as thousands of connections to the affected server. A more
efficient variant of the DROWN attack exists against unpatched OpenSSL servers
using versions that predate 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf released on
19/Mar/2015 (see CVE-2016-0703 below).

Users can avoid this issue by disabling the SSLv2 protocol in all their SSL/TLS
servers, if they've not done so already. Disabling all SSLv2 ciphers is also
sufficient, provided the patches for CVE-2015-3197 (fixed in OpenSSL 1.0.1r and
1.0.2f) have been deployed.  Servers that have not disabled the SSLv2 protocol,
and are not patched for CVE-2015-3197 are vulnerable to DROWN even if all SSLv2
ciphers are nominally disabled, because malicious clients can force the use of
SSLv2 with EXPORT ciphers.

OpenSSL 1.0.2g and 1.0.1s deploy the following mitigation against DROWN:

SSLv2 is now by default disabled at build-time.  Builds that are not configured
with "enable-ssl2" will not support SSLv2.  Even if "enable-ssl2" is used,
users who want to negotiate SSLv2 via the version-flexible SSLv23_method() will
need to explicitly call either of:

   SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv2);
   or
   SSL_clear_options(ssl, SSL_OP_NO_SSLv2);

as appropriate.  Even if either of those is used, or the application explicitly
uses the version-specific SSLv2_method() or its client or server variants,
SSLv2 ciphers vulnerable to exhaustive search key recovery have been removed.
Specifically, the SSLv2 40-bit EXPORT ciphers, and SSLv2 56-bit DES are no
longer available.

In addition, weak ciphers in SSLv3 and up are now disabled in default builds of
OpenSSL.  Builds that are not configured with "enable-weak-ssl-ciphers" will
not provide any "EXPORT" or "LOW" strength ciphers.

OpenSSL 1.0.2 users should upgrade to 1.0.2g
OpenSSL 1.0.1 users should upgrade to 1.0.1s

This issue was reported to OpenSSL on December 29th 2015 by Nimrod Aviram and
Sebastian Schinzel. The fix was developed by Viktor Dukhovni and Matt Caswell
of OpenSSL.


Double-free in DSA code (CVE-2016-0705)
=======================================

Severity: Low

A double free bug was discovered when OpenSSL parses malformed DSA private keys
and could lead to a DoS attack or memory corruption for applications that
receive DSA private keys from untrusted sources.  This scenario is considered
rare.

This issue affects OpenSSL versions 1.0.2 and 1.0.1.

OpenSSL 1.0.2 users should upgrade to 1.0.2g
OpenSSL 1.0.1 users should upgrade to 1.0.1s

This issue was reported to OpenSSL on February 7th 2016 by Adam Langley
(Google/BoringSSL) using libFuzzer. The fix was developed by Dr Stephen Henson
of OpenSSL.


Memory leak in SRP database lookups (CVE-2016-0798)
===================================================

Severity: Low

The SRP user database lookup method SRP_VBASE_get_by_user had
confusing memory management semantics; the returned pointer was sometimes newly
allocated, and sometimes owned by the callee. The calling code has no way of
distinguishing these two cases.

Specifically, SRP servers that configure a secret seed to hide valid
login information are vulnerable to a memory leak: an attacker
connecting with an invalid username can cause a memory leak of around
300 bytes per connection.  Servers that do not configure SRP, or
configure SRP but do not configure a seed are not vulnerable.

In Apache, the seed directive is known as SSLSRPUnknownUserSeed.

To mitigate the memory leak, the seed handling in
SRP_VBASE_get_by_user is now disabled even if the user has configured
a seed.  Applications are advised to migrate to
SRP_VBASE_get1_by_user. However, note that OpenSSL makes no strong
guarantees about the indistinguishability of valid and invalid
logins. In particular, computations are currently not carried out in
constant time.

This issue affects OpenSSL versions 1.0.2 and 1.0.1.

OpenSSL 1.0.2 users should upgrade to 1.0.2g
OpenSSL 1.0.1 users should upgrade to 1.0.1s

This issue was discovered on February 23rd 2016 by Emilia Käsper of
the OpenSSL development team. Emilia Käsper also developed the fix.


BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption (CVE-2016-0797)
======================================================================

Severity: Low

In the BN_hex2bn function the number of hex digits is calculated using an int
value |i|. Later |bn_expand| is called with a value of |i * 4|. For large values
of |i| this can result in |bn_expand| not allocating any memory because |i * 4|
is negative. This can leave the internal BIGNUM data field as NULL leading to a
subsequent NULL ptr deref. For very large values of |i|, the calculation |i * 4|
could be a positive value smaller than |i|. In this case memory is allocated to
the internal BIGNUM data field, but it is insufficiently sized leading to heap
corruption. A similar issue exists in BN_dec2bn. This could have security
consequences if BN_hex2bn/BN_dec2bn is ever called by user applications with
very large untrusted hex/dec data. This is anticipated to be a rare occurrence.

All OpenSSL internal usage of these functions use data that is not expected to
be untrusted, e.g. config file data or application command line arguments. If
user developed applications generate config file data based on untrusted data
then it is possible that this could also lead to security consequences. This is
also anticipated to be rare.

This issue affects OpenSSL versions 1.0.2 and 1.0.1.

OpenSSL 1.0.2 users should upgrade to 1.0.2g
OpenSSL 1.0.1 users should upgrade to 1.0.1s

This issue was reported to OpenSSL on February 19th 2016 by Guido Vranken.  The
fix was developed by Matt Caswell of the OpenSSL development team.

Fix memory issues in BIO_*printf functions (CVE-2016-0799)
==========================================================

Severity: Low

The internal |fmtstr| function used in processing a "%s" format string in the
BIO_*printf functions could overflow while calculating the length of a string
and cause an OOB read when printing very long strings.

Additionally the internal |doapr_outch| function can attempt to write to an OOB
memory location (at an offset from the NULL pointer) in the event of a memory
allocation failure. In 1.0.2 and below this could be caused where the size of a
buffer to be allocated is greater than INT_MAX. E.g. this could be in processing
a very long "%s" format string. Memory leaks can also occur.

The first issue may mask the second issue dependent on compiler behaviour.
These problems could enable attacks where large amounts of untrusted data is
passed to the BIO_*printf functions. If applications use these functions in this
way then they could be vulnerable. OpenSSL itself uses these functions when
printing out human-readable dumps of ASN.1 data. Therefore applications that
print this data could be vulnerable if the data is from untrusted sources.
OpenSSL command line applications could also be vulnerable where they print out
ASN.1 data, or if untrusted data is passed as command line arguments.

Libssl is not considered directly vulnerable. Additionally certificates etc
received via remote connections via libssl are also unlikely to be able to
trigger these issues because of message size limits enforced within libssl.

This issue affects OpenSSL versions 1.0.2 and 1.0.1.

OpenSSL 1.0.2 users should upgrade to 1.0.2g
OpenSSL 1.0.1 users should upgrade to 1.0.1s

This issue was reported to OpenSSL on February 23rd by Guido Vranken.  The
fix was developed by Matt Caswell of the OpenSSL development team.

Side channel attack on modular exponentiation (CVE-2016-0702)
=============================================================

Severity: Low

A side-channel attack was found which makes use of cache-bank conflicts on the
Intel Sandy-Bridge microarchitecture which could lead to the recovery of RSA
keys.  The ability to exploit this issue is limited as it relies on an attacker
who has control of code in a thread running on the same hyper-threaded core as
the victim thread which is performing decryptions.

This issue affects OpenSSL versions 1.0.2 and 1.0.1.

OpenSSL 1.0.2 users should upgrade to 1.0.2g
OpenSSL 1.0.1 users should upgrade to 1.0.1s

This issue was reported to OpenSSL on Jan 8th 2016 by Yuval Yarom, The
University of Adelaide and NICTA, Daniel Genkin, Technion and Tel Aviv
University, and Nadia Heninger, University of Pennsylvania with more
information at http://cachebleed.info.  The fix was developed by Andy Polyakov
of OpenSSL.


Divide-and-conquer session key recovery in SSLv2 (CVE-2016-0703)
================================================================

Severity: High

This issue only affected versions of OpenSSL prior to March 19th 2015 at which
time the code was refactored to address vulnerability CVE-2015-0293.

s2_srvr.c did not enforce that clear-key-length is 0 for non-export ciphers. If
clear-key bytes are present for these ciphers, they *displace* encrypted-key
bytes. This leads to an efficient divide-and-conquer key recovery attack: if an
eavesdropper has intercepted an SSLv2 handshake, they can use the server as an
oracle to determine the SSLv2 master-key, using only 16 connections to the
server and negligible computation.

More importantly, this leads to a more efficient version of DROWN that is
effective against non-export ciphersuites, and requires no significant
computation.

This issue affected OpenSSL versions 1.0.2, 1.0.1l, 1.0.0q, 0.9.8ze and all
earlier versions.  It was fixed in OpenSSL 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf
(released March 19th 2015).

This issue was reported to OpenSSL on February 10th 2016 by David Adrian and J.
Alex Halderman of the University of Michigan.  The underlying defect had by
then already been fixed by Emilia Käsper of OpenSSL on March 4th 2015.  The fix
for this issue can be identified by commits ae50d827 (1.0.2a), cd56a08d
(1.0.1m), 1a08063 (1.0.0r) and 65c588c (0.9.8zf).


Bleichenbacher oracle in SSLv2 (CVE-2016-0704)
==============================================

Severity: Moderate

This issue only affected versions of OpenSSL prior to March 19th 2015 at which
time the code was refactored to address the vulnerability CVE-2015-0293.

s2_srvr.c overwrite the wrong bytes in the master-key when applying
Bleichenbacher protection for export cipher suites.  This provides a
Bleichenbacher oracle, and could potentially allow more efficient variants of
the DROWN attack.

This issue affected OpenSSL versions 1.0.2, 1.0.1l, 1.0.0q, 0.9.8ze and all
earlier versions.  It was fixed in OpenSSL 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf
(released March 19th 2015).

This issue was reported to OpenSSL on February 10th 2016 by David Adrian and J.
Alex Halderman of the University of Michigan.  The underlying defect had by
then already been fixed by Emilia Käsper of OpenSSL on March 4th 2015.  The fix
for this issue can be identified by commits ae50d827 (1.0.2a), cd56a08d
(1.0.1m), 1a08063 (1.0.0r) and 65c588c (0.9.8zf).

Note
====

As per our previous announcements and our Release Strategy
(https://www.openssl.org/policies/releasestrat.html), support for OpenSSL
version 1.0.1 will cease on 31st December 2016. No security updates for that
version will be provided after that date. Users of 1.0.1 are advised to
upgrade.

Support for versions 0.9.8 and 1.0.0 ended on 31st December 2015. Those
versions are no longer receiving security updates.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20160301.txt

Note: the online version of the advisory may be updated with additional details
over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/policies/secpolicy.html
2016-03-01 21:00:52 +00:00
joerg
bf5f1d0a1d Explicitly request SPARCv9 assembler support for v9 using assembler
files.
2016-02-27 19:20:47 +00:00
christos
f91581fb8e PR/50815: David Binderman: Remove dup test 2016-02-17 20:11:17 +00:00
agc
9723718822 Fix signing of in-memory data with SSH keys 2016-02-07 05:03:36 +00:00
seanb
8436ef0286 - Avoid uninitialized variable usage in do_nologin() when HAVE_LOGIN_CAP
isn't defined (which doesn't apply to NetBSD but...) and a root
  login is being evaluated.
- From upstream.
2016-02-04 15:04:11 +00:00
christos
4060c40ee5 merge conflicts 2016-01-30 17:00:19 +00:00
christos
dcdb0b745a OpenSSL CHANGES
_______________

 Changes between 1.0.1q and 1.0.1r [28 Jan 2016]

  *) Protection for DH small subgroup attacks

     As a precautionary measure the SSL_OP_SINGLE_DH_USE option has been
     switched on by default and cannot be disabled. This could have some
     performance impact.
     [Matt Caswell]

  *) SSLv2 doesn't block disabled ciphers

     A malicious client can negotiate SSLv2 ciphers that have been disabled on
     the server and complete SSLv2 handshakes even if all SSLv2 ciphers have
     been disabled, provided that the SSLv2 protocol was not also disabled via
     SSL_OP_NO_SSLv2.

     This issue was reported to OpenSSL on 26th December 2015 by Nimrod Aviram
     and Sebastian Schinzel.
     (CVE-2015-3197)
     [Viktor Dukhovni]

  *) Reject DH handshakes with parameters shorter than 1024 bits.
     [Kurt Roeckx]
2016-01-30 16:56:02 +00:00
christos
1d2e8f9944 add more blacklist rejection points. 2016-01-23 00:03:30 +00:00
christos
76a27842d2 More fixes from upstream:
- X connection forwarding fixes
- more explicit_bzero
- more closing file descriptors
XXX: pullup-7
2016-01-19 17:10:55 +00:00
christos
7785118406 get rid of roaming (CVE-2016-0777) 2016-01-14 22:30:04 +00:00
christos
3d4fd82fa3 PR/50564: Rin Okuyama: sftp: filename completion is broken 2015-12-16 13:23:38 +00:00
christos
261bb38818 merge conflicts 2015-12-06 21:52:35 +00:00
christos
3e7df5c261 Import openssl-1.0.1q
OpenSSL Security Advisory [3 Dec 2015] - Updated [4 Dec 2015]
=============================================================

[Updated 4 Dec 2015]: This advisory has been updated to include the details of
CVE-2015-1794, a Low severity issue affecting OpenSSL 1.0.2 which had a fix
included in the released packages but was missed from the advisory text.

NOTE: WE ANTICIPATE THAT 1.0.0t AND 0.9.8zh WILL BE THE LAST RELEASES FOR THE
0.9.8 AND 1.0.0 VERSIONS AND THAT NO MORE SECURITY FIXES WILL BE PROVIDED (AS
PER PREVIOUS ANNOUNCEMENTS). USERS ARE ADVISED TO UPGRADE TO LATER VERSIONS.

BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193)
==================================================================

Severity: Moderate

There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No
EC algorithms are affected. Analysis suggests that attacks against RSA and DSA
as a result of this defect would be very difficult to perform and are not
believed likely. Attacks against DH are considered just feasible (although very
difficult) because most of the work necessary to deduce information
about a private key may be performed offline. The amount of resources
required for such an attack would be very significant and likely only
accessible to a limited number of attackers. An attacker would
additionally need online access to an unpatched system using the target
private key in a scenario with persistent DH parameters and a private
key that is shared between multiple clients. For example this can occur by
default in OpenSSL DHE based SSL/TLS ciphersuites.

This issue affects OpenSSL version 1.0.2.

OpenSSL 1.0.2 users should upgrade to 1.0.2e

This issue was reported to OpenSSL on August 13 2015 by Hanno
Böck. The fix was developed by Andy Polyakov of the OpenSSL
development team.

Certificate verify crash with missing PSS parameter (CVE-2015-3194)
===================================================================

Severity: Moderate

The signature verification routines will crash with a NULL pointer dereference
if presented with an ASN.1 signature using the RSA PSS algorithm and absent
mask generation function parameter. Since these routines are used to verify
certificate signature algorithms this can be used to crash any certificate
verification operation and exploited in a DoS attack. Any application which
performs certificate verification is vulnerable including OpenSSL clients and
servers which enable client authentication.

This issue affects OpenSSL versions 1.0.2 and 1.0.1.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q

This issue was reported to OpenSSL on August 27 2015 by Loïc Jonas Etienne
(Qnective AG). The fix was developed by Dr. Stephen Henson of the OpenSSL
development team.

X509_ATTRIBUTE memory leak (CVE-2015-3195)
==========================================

Severity: Moderate

When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak
memory. This structure is used by the PKCS#7 and CMS routines so any
application which reads PKCS#7 or CMS data from untrusted sources is affected.
SSL/TLS is not affected.

This issue affects OpenSSL versions 1.0.2 and 1.0.1, 1.0.0 and 0.9.8.

OpenSSL 1.0.2 users should upgrade to 1.0.2e
OpenSSL 1.0.1 users should upgrade to 1.0.1q
OpenSSL 1.0.0 users should upgrade to 1.0.0t
OpenSSL 0.9.8 users should upgrade to 0.9.8zh

This issue was reported to OpenSSL on November 9 2015 by Adam Langley
(Google/BoringSSL) using libFuzzer. The fix was developed by Dr. Stephen
Henson of the OpenSSL development team.

Race condition handling PSK identify hint (CVE-2015-3196)
=========================================================

Severity: Low

If PSK identity hints are received by a multi-threaded client then
the values are wrongly updated in the parent SSL_CTX structure. This can
result in a race condition potentially leading to a double free of the
identify hint data.

This issue was fixed in OpenSSL 1.0.2d and 1.0.1p but has not been previously
listed in an OpenSSL security advisory. This issue also affects OpenSSL 1.0.0
and has not been previously fixed in an OpenSSL 1.0.0 release.

OpenSSL 1.0.2 users should upgrade to 1.0.2d
OpenSSL 1.0.1 users should upgrade to 1.0.1p
OpenSSL 1.0.0 users should upgrade to 1.0.0t

The fix for this issue can be identified in the OpenSSL git repository by commit
ids 3c66a669dfc7 (1.0.2), d6be3124f228 (1.0.1) and 1392c238657e (1.0.0).

The fix was developed by Dr. Stephen Henson of the OpenSSL development team.

Anon DH ServerKeyExchange with 0 p parameter (CVE-2015-1794)
============================================================

Severity: Low

If a client receives a ServerKeyExchange for an anonymous DH ciphersuite with
the value of p set to 0 then a seg fault can occur leading to a possible denial
of service attack.

This issue affects OpenSSL version 1.0.2.

OpenSSL 1.0.2 users should upgrade to 1.0.2e

This issue was reported to OpenSSL on August 3 2015 by Guy Leaver (Cisco). The
fix was developed by Matt Caswell of the OpenSSL development team.

Note
====

As per our previous announcements and our Release Strategy
(https://www.openssl.org/about/releasestrat.html), support for OpenSSL versions
1.0.0 and 0.9.8 will cease on 31st December 2015. No security updates for these
versions will be provided after that date. In the absence of significant
security issues being identified prior to that date, the 1.0.0t and 0.9.8zh
releases will be the last for those versions. Users of these versions are
advised to upgrade.


References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20151203.txt

Note: the online version of the advisory may be updated with additional
details over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html
2015-12-06 21:45:41 +00:00
christos
d78e1b84d7 regen 2015-11-12 23:11:21 +00:00