Commit Graph

2768 Commits

Author SHA1 Message Date
ozaki-r
e27c60ccce Fix parsing ah without a key 2017-04-13 01:19:17 +00:00
roy
fcede00eff Use RO_MSGFILTER. 2017-04-12 16:47:39 +00:00
khorben
020e2e0f6f No longer hard-code the suffix length
This will avoid a buffer overflow if the suffix changes; it is currently
hard-coded as either "asc" or "sig".

Submitted on tech-pkg@ as:
[PATCH 10/11] No longer hard-code the suffix length
2017-04-09 23:03:50 +00:00
khorben
a4f591eb0f Output signatures to the standard output for "-"
This is to reflect the behaviour documented in netpgp(1).

Submitted on tech-pkg@ as:
[PATCH 09/11] Output signatures to the standard output for "-"

Only modified for consistency with the coding style.
2017-04-09 22:48:39 +00:00
khorben
f263734bc2 Avoid a type cast
No functional change intended.
2017-04-09 22:44:34 +00:00
khorben
fde99a469a Also document alternate option "--detach"
Submitted on tech-pkg@ as:
[PATCH 08/11] Also document alternate option "--detach"
2017-03-27 21:34:32 +00:00
khorben
b73233e927 Correct option "--armor"
Submitted on tech-pkg@ as:
[PATCH 07/11] Correct option "--armor"
2017-03-27 21:30:23 +00:00
khorben
93af107a65 Do not ask for a passphrase when empty
Submitted on tech-pkg@ as:
[PATCH 06/11] Do not ask for a passphrase when empty

Only modified for consistency with the coding style.
2017-03-27 21:19:12 +00:00
khorben
0a8cffecb2 Expect a FILE * for pgp_decrypt_seckey()
Submitted on tech-pkg@ as:
[PATCH 05/11] Expect a FILE * for pgp_decrypt_seckey()

No functional change intended.
2017-03-27 21:06:50 +00:00
khorben
dc6efa23ca Do not use random data for pass-phrases on EOF
Submitted on tech-pkg@ as:
[PATCH 04/11] Do not use random data for pass-phrases on EOF

Only modified for consistency with the coding style.
2017-03-27 21:00:43 +00:00
khorben
e1d90c495a Avoid some type casts
Submitted on tech-pkg@ as:
[PATCH 03/11] Avoid some type casts

No functional change intended.
2017-03-27 20:55:13 +00:00
khorben
5a96e50edf Do not truncate pass-phrases without a newline character
This also fixes a crash when the pass-phrase entered is empty.

Submitted on tech-pkg@ as:
[PATCH 02/11] Do not truncate pass-phrases without a newline character

Only modified for consistency with the coding style.
2017-03-27 20:50:19 +00:00
khorben
a3d226ca02 Revert "Remove a useless loop around getpass()"
getpass(3) may return NULL upon failures on Linux, and netpgp should remain
portable to other systems.
2017-02-24 01:26:17 +00:00
christos
6f030214f7 reproduced also on the regular (not -m32) build. 2017-02-21 16:07:17 +00:00
khorben
b4c0f63794 Remove a useless loop around getpass()
According to getpass(3), this library function cannot return NULL.
Verified with a source code inspection.
2017-02-20 01:38:28 +00:00
khorben
b07e8011d2 Remove a useless loop around getpass()
According to getpass(3), this library function cannot return NULL.
Verified with a source code inspection.
2017-02-20 01:33:28 +00:00
khorben
86dea4ede5 Do not crash when listing keys without a keyring
To test: (with an empty ~/.gnupg)
$ netpgpkeys --import-key /dev/null

Submitted on tech-pkg@ as:
[PATCH 01/11] Do not crash when listing keys without a keyring

Different patch for the same issue.
2017-02-20 00:51:08 +00:00
christos
0ac6b0daad PR/51973: Use proper fd for AuthorizedKeysCommand 2017-02-16 17:56:07 +00:00
rin
72128ffa3a also compile poly1305.c with -O0 on vax to address ssh login failure from/to
some hosts
2017-02-14 09:59:16 +00:00
rin
79ef876622 add hack for libssh on vax 2017-02-14 09:00:03 +00:00
christos
22e79776ca Add hack for profiling bimodal label generation with -m32 on sparc64 2017-02-11 04:56:37 +00:00
rin
484854fa22 Do not use the assembler version of AES routines for m68000; they contain
instructions available for 68020 and later.

Fix sun2 build.
2017-02-08 21:43:53 +00:00
isaki
52c6bd173d Implement m68k assembly version of AES.
It's approx 1.4 times faster than the original one.
2017-02-07 11:18:43 +00:00
christos
f64047ef62 match the man page, and explain why. 2017-02-01 14:27:37 +00:00
christos
55d6e6bdc5 regen 2017-02-01 14:24:13 +00:00
sevan
cc576e1d8e Update supporting files for components which rely on autoconf to allow systems
introducing since release of software to be recognised. This should hopefully
allow the builds to progress a littles further on systems such as the POWER8
which features a little endian 64-bit PowerPC CPU identified as ppc64le.
2017-02-01 09:26:39 +00:00
christos
54028cfbaf minimize changes with branch 2017-01-30 20:27:58 +00:00
christos
9223e31834 fix deleted line. 2017-01-30 18:59:04 +00:00
jakllsch
55e4d28c1e Fix host tools build for asn1_compile, compile_et, and slc. 2017-01-30 02:38:50 +00:00
christos
f2a053e7b1 fix printf args 2017-01-30 00:25:15 +00:00
christos
80da7e788f need libutil for pidfile 2017-01-29 22:09:06 +00:00
christos
0fa98a8a57 this is not needed anymore 2017-01-29 19:38:38 +00:00
christos
c60105bcf7 include roken-common.h directly. 2017-01-29 19:38:00 +00:00
christos
85f3803ad8 prefer some local include files for tools build 2017-01-29 19:23:28 +00:00
christos
dc85ac27ab missing quote 2017-01-29 18:58:08 +00:00
christos
06363001a6 fix printf format 2017-01-29 18:57:06 +00:00
christos
edf4b9ea7e Include sqlite3 to the dependent libraries 2017-01-29 15:42:58 +00:00
christos
553b9f4b06 handle our basename. 2017-01-29 01:46:37 +00:00
christos
624dfe6a19 override arc4* for tools build. 2017-01-29 01:46:16 +00:00
christos
61b2320621 krb5 needs sqlite3 now 2017-01-28 23:38:48 +00:00
christos
45f67fc24b Use ${TOOL_SED} and resolve paths properly. 2017-01-28 22:25:44 +00:00
christos
d3273b5b76 merge conflicts, adjust the build. 2017-01-28 21:31:43 +00:00
christos
b9d004c6cc Release Notes - Heimdal - Version Heimdal 7.1
Security

 - kx509 realm-chopping security bug
 - non-authorization of alias additions/removals in kadmind
   (CVE-2016-2400)

 Feature

 - iprop has been revamped to fix a number of race conditions that could
   lead to inconsistent replication
 - Hierarchical capath support
 - AES Encryption with HMAC-SHA2 for Kerberos 5
   draft-ietf-kitten-aes-cts-hmac-sha2-11
 - hcrypto is now thread safe on all platforms
 - libhcrypto has new backends: CNG (Windows), PKCS#11 (mainly for
   Solaris), and OpenSSL.  OpenSSL is now a first-class libhcrypto backend.
   OpenSSL 1.0.x and 1.1 are both supported. AES-NI used when supported by
   backend
 - HDB now supports LMDB
 - Thread support on Windows
 - RFC 6113  Generalized Framework for Kerberos Pre-Authentication (FAST)
 - New GSS APIs:
   . gss_localname
 - Allow setting what encryption types a principal should have with
   [kadmin] default_key_rules, see krb5.conf manpage for more info
 - Unify libhcrypto with LTC (libtomcrypto)
 - asn1_compile 64-bit INTEGER functionality
 - HDB key history support including --keepold kadmin password option
 - Improved cross-realm key rollover safety
 - New krb5_kuserok() and krb5_aname_to_localname() plug-in interfaces
 - Improved MIT compatibility
   . kadm5 API
   . Migration from MIT KDB via "mitdb" HDB backend
   . Capable of writing the HDB in MIT dump format
 - Improved Active Directory interoperability
   . Enctype selection issues for PAC and other authz-data signatures
   . Cross realm key rollover (kvno 0)
 - New [kdc] enctype negotiation configuration:
   . tgt-use-strongest-session-key
   . svc-use-strongest-session-key
   . preauth-use-strongest-session-key
   . use-strongest-server-key
 - The KDC process now uses a multi-process model improving
   resiliency and performance
 - Allow batch-mode kinit with password file
 - SIGINFO support added to kinit cmd
 - New kx509 configuration options:
   . kx509_ca
   . kca_service
   . kx509_include_pkinit_san
   . kx509_template
 - Improved Heimdal library/plugin version safety
 - Name canonicalization
   . DNS resolver searchlist
   . Improved referral support
   . Support host:port host-based services
 - Pluggable libheimbase interface for DBs
 - Improve IPv6 Support
 - LDAP
   . Bind DN and password
   . Start TLS
 - klist --json
 - DIR credential cache type
 - Updated upstream SQLite and libedit
 - Removed legacy applications: ftp, kx, login, popper, push, rcp, rsh,
   telnet, xnlock
 - Completely remove RAND_egd support
 - Moved kadmin and ktutil to /usr/bin
 - Stricter fcache checks (see fcache_strict_checking krb5.conf setting)
    . use O_NOFOLLOW
    . don't follow symlinks
    . require cache files to be owned by the user
    . require sensible permissions (not group/other readable)
 - Implemented gss_store_cred()
 - Many more

 Bug fixes
 - iprop has been revamped to fix a number of race conditions that could
   lead to data loss
 - Include non-loopback addresses assigned to loopback interfaces
   when requesting tickets with addresses
 - KDC 1DES session key selection (for AFS rxkad-k5 compatibility)
 - Keytab file descriptor and lock leak
 - Credential cache corruption bugs
   (NOTE: The FILE ccache is still not entirely safe due to the
   fundamentally unsafe design of POSIX file locking)
 - gss_pseudo_random() interop bug
 - Plugins are now preferentially loaded from the run-time install tree
 - Reauthentication after password change in init_creds_password
 - Memory leak in the client kadmin library
 - TGS client requests renewable/forwardable/proxiable when possible
 - Locking issues in DB1 and DB3 HDB backends
 - Master HDB can remain locked while waiting for network I/O
 - Renewal/refresh logic when kinit is provided with a command
 - KDC handling of enterprise principals
 - Use correct bit for anon-pkinit
 - Many more

 Acknowledgements

 This release of Heimdal includes contributions from:

    Abhinav Upadhyay        Heath Kehoe             Nico Williams
    Andreas Schneider       Henry Jacques           Patrik Lundin
    Andrew Bartlett         Howard Chu              Philip Boulain
    Andrew Tridgell         Igor Sobrado            Ragnar Sundblad
    Antoine Jacoutot        Ingo Schwarze           Remi Ferrand
    Arran Cudbard-Bell      Jakub Čajka             Rod Widdowson
    Arvid Requate           James Le Cuirot         Rok Papež
    Asanka Herath           James Lee               Roland C. Dowdeswell
    Ben Kaduk               Jeffrey Altman          Ross L Richardson
    Benjamin Kaduk          Jeffrey Clark           Russ Allbery
    Bernard Spil            Jeffrey Hutzelman       Samuel Cabrero
    Brian May               Jelmer Vernooij         Samuel Thibault
    Chas Williams           Ken Dreyer              Santosh Kumar Pradhan
    Chaskiel Grundman       Kiran S J               Sean Davis
    Dana Koch               Kumar Thangavelu        Sergio Gelato
    Daniel Schepler         Landon Fuller           Simon Wilkinson
    David Mulder            Linus Nordberg          Stef Walter
    Douglas Bagnall         Love Hörnquist Åstrand  Stefan Metzmacher
    Ed Maste                Luke Howard             Steffen Jaeckel
    Eray Aslan              Magnus Ahltorp          Timothy Pearson
    Florian Best            Marc Balmer             Tollef Fog Heen
    Fredrik Pettai          Marcin Cieślak          Tony Acero
    Greg Hudson             Marco Molteni           Uri Simchoni
    Gustavo Zacarias        Matthieu Hautreux       Viktor Dukhovni
    Günther Deschner        Michael Meffie          Volker Lendecke
    Harald Barth            Moritz Lenz
2017-01-28 20:46:41 +00:00
spz
b367ed3864 merge for OpenSSL 1.0.2k 2017-01-27 23:16:20 +00:00
spz
fc2ef7411d updated man pages & the x86_64 mont* asm fix for the new openssl.
Expect at least one more commit until the tree builds again.
2017-01-27 23:00:46 +00:00
spz
34505c60e1 import of OpenSSL 1.0.2k
Upstream changelog:
Changes between 1.0.2j and 1.0.2k [26 Jan 2017]

 *) Truncated packet could crash via OOB read

    If one side of an SSL/TLS path is running on a 32-bit host and a specific
    cipher is being used, then a truncated packet can cause that host to
    perform an out-of-bounds read, usually resulting in a crash.

    This issue was reported to OpenSSL by Robert Święcki of Google.
    (CVE-2017-3731)
    [Andy Polyakov]

 *) BN_mod_exp may produce incorrect results on x86_64

    There is a carry propagating bug in the x86_64 Montgomery squaring
    procedure. No EC algorithms are affected. Analysis suggests that attacks
    against RSA and DSA as a result of this defect would be very difficult to
    perform and are not believed likely. Attacks against DH are considered just
    feasible (although very difficult) because most of the work necessary to
    deduce information about a private key may be performed offline. The amount
    of resources required for such an attack would be very significant and
    likely only accessible to a limited number of attackers. An attacker would
    additionally need online access to an unpatched system using the target
    private key in a scenario with persistent DH parameters and a private
    key that is shared between multiple clients. For example this can occur by
    default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very
    similar to CVE-2015-3193 but must be treated as a separate problem.

    This issue was reported to OpenSSL by the OSS-Fuzz project.
    (CVE-2017-3732)
    [Andy Polyakov]

 *) Montgomery multiplication may produce incorrect results

    There is a carry propagating bug in the Broadwell-specific Montgomery
    multiplication procedure that handles input lengths divisible by, but
    longer than 256 bits. Analysis suggests that attacks against RSA, DSA
    and DH private keys are impossible. This is because the subroutine in
    question is not used in operations with the private key itself and an input
    of the attacker's direct choice. Otherwise the bug can manifest itself as
    transient authentication and key negotiation failures or reproducible
    erroneous outcome of public-key operations with specially crafted input.
    Among EC algorithms only Brainpool P-512 curves are affected and one
    presumably can attack ECDH key negotiation. Impact was not analyzed in
    detail, because pre-requisites for attack are considered unlikely. Namely
    multiple clients have to choose the curve in question and the server has to
    share the private key among them, neither of which is default behaviour.
    Even then only clients that chose the curve will be affected.

    This issue was publicly reported as transient failures and was not
    initially recognized as a security issue. Thanks to Richard Morgan for
    providing reproducible case.
    (CVE-2016-7055)
    [Andy Polyakov]

 *) OpenSSL now fails if it receives an unrecognised record type in TLS1.0
    or TLS1.1. Previously this only happened in SSLv3 and TLS1.2. This is to
    prevent issues where no progress is being made and the peer continually
    sends unrecognised record types, using up resources processing them.
    [Matt Caswell]
2017-01-27 22:53:49 +00:00
christos
adbaca4132 Strip first otherwise we end up with __RCSID("NetBSD") 2017-01-27 18:02:09 +00:00
christos
7e9937c7a6 PR/51682: Avoid DoS with fragment out of order insertion; keep fragments
sorted in the list.
2017-01-24 19:23:31 +00:00
hauke
5dbf5ec614 Add missing <sys/stat.h> for open(2) flags. 2017-01-13 08:41:46 +00:00
christos
1ce2d3c329 remove re-definition 2017-01-13 01:39:04 +00:00