Commit Graph

2785 Commits

Author SHA1 Message Date
christos afbc9755de PR/51682: Antoine Beaupré: Simplify and comment previous patch.
XXX: pullup-8
2017-07-23 05:40:27 +00:00
christos 3bf0a26b79 fix typo. 2017-07-11 21:52:54 +00:00
christos 5dd54c880f https://orpheus-lyre.info/design/index.html
6dd3eb836b

In _krb5_extract_ticket() the KDC-REP service name must be obtained from
encrypted version stored in 'enc_part' instead of the unencrypted version
stored in 'ticket'.  Use of the unecrypted version provides an
opportunity for successful server impersonation and other attacks.

Identified by Jeffrey Altman, Viktor Duchovni and Nico Williams.

XXX: pullup 6, 7, 8.
2017-07-11 17:45:31 +00:00
ozaki-r a607076325 Add update command for testing
Updating an SA (SADB_UPDATE) requires that a process issuing
SADB_UPDATE is the same as a process issued SADB_ADD (or SADB_GETSPI).
This means that update command must be used with add command in a
configuration of setkey. This usage is normally meaningless but
useful for testing (and debugging) purposes.
2017-07-05 01:22:40 +00:00
christos fc0e1a5a51 If we've authenticated, we are already in the child and we don't need the
socket anymore.
XXX: pullup-7, pullup-8
2017-06-26 17:10:39 +00:00
christos 8277ddc197 PR/52292: Shinichi Doyashiki: Fix reversed comments. 2017-06-11 22:12:56 +00:00
riastradh ef315f7931 Remove MKCRYPTO option.
Originally, MKCRYPTO was introduced because the United States
classified cryptography as a munition and restricted its export.  The
export controls were substantially relaxed fifteen years ago, and are
essentially irrelevant for software with published source code.

In the intervening time, nobody bothered to remove the option after
its motivation -- the US export restriction -- was eliminated.  I'm
not aware of any other operating system that has a similar option; I
expect it is mainly out of apathy for churn that we still have it.
Today, cryptography is an essential part of modern computing -- you
can't use the internet responsibly without cryptography.

The position of the TNF board of directors is that TNF makes no
representation that MKCRYPTO=no satisfies any country's cryptography
regulations.

My personal position is that the availability of cryptography is a
basic human right; that any local laws restricting it to a privileged
few are fundamentally immoral; and that it is wrong for developers to
spend effort crippling cryptography to work around such laws.

As proposed on tech-crypto, tech-security, and tech-userlevel to no
objections:

https://mail-index.netbsd.org/tech-crypto/2017/05/06/msg000719.html
https://mail-index.netbsd.org/tech-security/2017/05/06/msg000928.html
https://mail-index.netbsd.org/tech-userlevel/2017/05/06/msg010547.html

P.S.  Reviewing all the uses of MKCRYPTO in src revealed a lot of
*bad* crypto that was conditional on it, e.g. DES in telnet...  That
should probably be removed too, but on the grounds that it is bad,
not on the grounds that it is (nominally) crypto.
2017-05-21 15:28:36 +00:00
riastradh 1fa400f7fa Remove some vestiges of MKCRYPTO_IDEA/MKCRYPTO_MDC2. 2017-05-21 14:24:05 +00:00
riastradh 09956316a6 Remove MKCRYPTO_RC5. Unconditionally include RC5 in libcrypto.so.
This option existed only because RC5 is covered by patents that, twenty
years ago, we had reason to suspect the patent holder, RSA, Inc., might
litigate.  The two US patents in question are 5,724,428 and 5,835,600.

According to the USPTO Patent Term Calculator web site at
<https://www.uspto.gov/patent/laws-and-regulations/patent-term-calculator#heading-5>
(retrieved 2017-05-21), patents filed after 1995-06-07 expire twenty
years after the filing date.

number          filing date
5,724,428       1995-11-01
5,835,600       1997-04-21

Thus, these patents appear to be expired.

As proposed on tech-crypto and tech-security:

https://mail-index.netbsd.org/tech-crypto/2017/05/05/msg000718.html
https://mail-index.netbsd.org/tech-security/2017/05/05/msg000927.html
2017-05-21 14:20:44 +00:00
ozaki-r 6aaeb7bc8b Print protocol number as well as its name
ex.) before: "reserved" -> after: "255(reserved)"

The original author is hsuenaga@IIJ
2017-04-26 03:19:49 +00:00
ozaki-r 2ea60f03d0 Correct the length of the SADB_EXT header in debug outputs
The length is shifted 3 bits in PF_KEY protocol.

Originally fixed by hsuenaga@IIJ
2017-04-26 03:16:06 +00:00
joerg fd4865e977 GC multistate_privsep. 2017-04-20 13:22:59 +00:00
christos b397962d38 fix conflict. 2017-04-19 15:34:25 +00:00
christos 62b22b0671 bump 2017-04-18 18:41:59 +00:00
christos 41768fc151 merge conflicts 2017-04-18 18:41:46 +00:00
agc 932ce0ffe2 libnetpgpverify major bump to 5 2017-04-17 23:38:51 +00:00
agc 32d959bfe0 Update netpgpverify sources in base from 20160617 to 20170201 (i.e. bring
over changes from master sources in pkgsrc/security/netpgpverify, version 20170201):

Changes:

Update netpgpverify (and libnetpgpverify) to 20160614
	+ handle signatures created by gpg with "--no-emit-version", don't assume
	there will always be a version string.
	+ add a test for above
	Fixes security PR  51240.
	Thanks to xnox@ubuntu.com for reporting the error

Update netpgpverify and libnetpgpverify to 20160615:
	Simplify the method of finding the end of the versioning information
	in the signature - back up to the "\n" character at the end of the
	signature start:

		"-----BEGIN PGP SIGNATURE-----\n"

	and then find the "\n\n" character sequence to denote the start of the
	signature itself. The previous version worked, but this is more efficient.

Update netpgpverify and libnetpgpverify to 20160616
	+ bring over joerg's printflike change from the netpgpverify
	version in src/crypto
	+ add a test for cleartext signatures with version information
	to complement the one with no version information

Update netpgpverify and libnetpgpverify to 20160622 during freeze to fix PR  51262
	+ take a bit of a step backwards, and don't use stdbool.h, just to appease
	Solaris 10 compiler

Update netpgpverify and libnetpgpverify to 20160623
	+ remove use of asprintf and vasprintf from libverify. Inspired
	by work from Dimitri John Ledkov. Should allow building on Linux
	without superfluous definitions.
	+ also free the BIGNUM struct in PGPV_BN_clear() - from Dimitri
	John Ledkov

Update netpgpverify and libnetpgpverify to 20160626
	+ make the pgpv_t and pgpv_cursor_t structures opaque
	+ add new accessor functions for fields in the pgpv_cursor_t struct
	+ add new creation functions for the pgpv_t and pgpv_cursor_t structs

Update netpgpverify and libnetpgpverify to 20160704
	+ get rid of redundant PGPV_ARRAY definition in libverify.c, brought in when
	the definitions moved from verify.h
	+ fix obuf_add_mem() to use a const void *, as any struct can be
	dumped using it
	+ remove redundant NO_SUBKEYS definition - unused
	+ add an (unused as yet) ARRAY_FREE() macro

Update netpgpverify and libnetpgpverify to 20160705
	External API changes
	====================
	+ add a pgpv_cursor_close() function to free resources associated with
	a cursor
	Better memory management
	========================
	+ restructure the way dynamic arrays are used, to avoid memory
	corruption issues and memory leaks - keep all dynamic arrays in the global
	data structure, and use indices in the other data structures to index them.
	Means lack of data localisation, but avoids stale pointers, and leaks.
	+ make signer field of signature a uint8_t array, rather than a pointer
	+ use our own version of strdup(3) - don't depend on it being
	available in standard library
	+ keep track of whether litdata filenames and userid were allocated or not,
	and free memory in pgpv_close() if it was allocated
	+ free up allocated resources which were allocated in pgpv_close()

Update netpgpverify and libnetpgpverify to 20160706
	+ 20160705 introduced a bug whereby a key subid would match and verify
	fine, but, if formatted, would not display the correct subkey
	information.  Fix to show the correct information in this case.

Update netpgpverify and libnetpgpverify to 20160707 to fix some
	unusual build errors shown by old gcc versions (works fine for
	gcc-5.2.1 on ubuntu and gcc-5.3.0 on NetBSD 7.99.32)
	+ use ULL suffix on unsigned 64bit constants, not UL
	+ don't typedef the public structs twice - second time just define it
	without the typedef
	Fixes PR   51327

Update netpgpverify and libnetpgpverify to 20160708
	+ clear and free bignums properly - helps immensely with plugging
	memory leaks

Update netpgpverify and libnetpgpverify to 20160828
	+ bring over change from christos in src/crypto to check for
	the end of an ASCII-armored signature
	+ no need for namespace protection in array.h any more, now
	that netpgp/verify.h now contains opaque structures
	+ minor typo clean-up in a definition (benign, ignored by compiler)

update netpgpverify and libnetpgpverify to 20170201
	+ make sure howmany() macro is defined
	pointed out by cube - thanks!
2017-04-17 19:50:27 +00:00
ozaki-r e27c60ccce Fix parsing ah without a key 2017-04-13 01:19:17 +00:00
roy fcede00eff Use RO_MSGFILTER. 2017-04-12 16:47:39 +00:00
khorben 020e2e0f6f No longer hard-code the suffix length
This will avoid a buffer overflow if the suffix changes; it is currently
hard-coded as either "asc" or "sig".

Submitted on tech-pkg@ as:
[PATCH 10/11] No longer hard-code the suffix length
2017-04-09 23:03:50 +00:00
khorben a4f591eb0f Output signatures to the standard output for "-"
This is to reflect the behaviour documented in netpgp(1).

Submitted on tech-pkg@ as:
[PATCH 09/11] Output signatures to the standard output for "-"

Only modified for consistency with the coding style.
2017-04-09 22:48:39 +00:00
khorben f263734bc2 Avoid a type cast
No functional change intended.
2017-04-09 22:44:34 +00:00
khorben fde99a469a Also document alternate option "--detach"
Submitted on tech-pkg@ as:
[PATCH 08/11] Also document alternate option "--detach"
2017-03-27 21:34:32 +00:00
khorben b73233e927 Correct option "--armor"
Submitted on tech-pkg@ as:
[PATCH 07/11] Correct option "--armor"
2017-03-27 21:30:23 +00:00
khorben 93af107a65 Do not ask for a passphrase when empty
Submitted on tech-pkg@ as:
[PATCH 06/11] Do not ask for a passphrase when empty

Only modified for consistency with the coding style.
2017-03-27 21:19:12 +00:00
khorben 0a8cffecb2 Expect a FILE * for pgp_decrypt_seckey()
Submitted on tech-pkg@ as:
[PATCH 05/11] Expect a FILE * for pgp_decrypt_seckey()

No functional change intended.
2017-03-27 21:06:50 +00:00
khorben dc6efa23ca Do not use random data for pass-phrases on EOF
Submitted on tech-pkg@ as:
[PATCH 04/11] Do not use random data for pass-phrases on EOF

Only modified for consistency with the coding style.
2017-03-27 21:00:43 +00:00
khorben e1d90c495a Avoid some type casts
Submitted on tech-pkg@ as:
[PATCH 03/11] Avoid some type casts

No functional change intended.
2017-03-27 20:55:13 +00:00
khorben 5a96e50edf Do not truncate pass-phrases without a newline character
This also fixes a crash when the pass-phrase entered is empty.

Submitted on tech-pkg@ as:
[PATCH 02/11] Do not truncate pass-phrases without a newline character

Only modified for consistency with the coding style.
2017-03-27 20:50:19 +00:00
khorben a3d226ca02 Revert "Remove a useless loop around getpass()"
getpass(3) may return NULL upon failures on Linux, and netpgp should remain
portable to other systems.
2017-02-24 01:26:17 +00:00
christos 6f030214f7 reproduced also on the regular (not -m32) build. 2017-02-21 16:07:17 +00:00
khorben b4c0f63794 Remove a useless loop around getpass()
According to getpass(3), this library function cannot return NULL.
Verified with a source code inspection.
2017-02-20 01:38:28 +00:00
khorben b07e8011d2 Remove a useless loop around getpass()
According to getpass(3), this library function cannot return NULL.
Verified with a source code inspection.
2017-02-20 01:33:28 +00:00
khorben 86dea4ede5 Do not crash when listing keys without a keyring
To test: (with an empty ~/.gnupg)
$ netpgpkeys --import-key /dev/null

Submitted on tech-pkg@ as:
[PATCH 01/11] Do not crash when listing keys without a keyring

Different patch for the same issue.
2017-02-20 00:51:08 +00:00
christos 0ac6b0daad PR/51973: Use proper fd for AuthorizedKeysCommand 2017-02-16 17:56:07 +00:00
rin 72128ffa3a also compile poly1305.c with -O0 on vax to address ssh login failure from/to
some hosts
2017-02-14 09:59:16 +00:00
rin 79ef876622 add hack for libssh on vax 2017-02-14 09:00:03 +00:00
christos 22e79776ca Add hack for profiling bimodal label generation with -m32 on sparc64 2017-02-11 04:56:37 +00:00
rin 484854fa22 Do not use the assembler version of AES routines for m68000; they contain
instructions available for 68020 and later.

Fix sun2 build.
2017-02-08 21:43:53 +00:00
isaki 52c6bd173d Implement m68k assembly version of AES.
It's approx 1.4 times faster than the original one.
2017-02-07 11:18:43 +00:00
christos f64047ef62 match the man page, and explain why. 2017-02-01 14:27:37 +00:00
christos 55d6e6bdc5 regen 2017-02-01 14:24:13 +00:00
sevan cc576e1d8e Update supporting files for components which rely on autoconf to allow systems
introducing since release of software to be recognised. This should hopefully
allow the builds to progress a littles further on systems such as the POWER8
which features a little endian 64-bit PowerPC CPU identified as ppc64le.
2017-02-01 09:26:39 +00:00
christos 54028cfbaf minimize changes with branch 2017-01-30 20:27:58 +00:00
christos 9223e31834 fix deleted line. 2017-01-30 18:59:04 +00:00
jakllsch 55e4d28c1e Fix host tools build for asn1_compile, compile_et, and slc. 2017-01-30 02:38:50 +00:00
christos f2a053e7b1 fix printf args 2017-01-30 00:25:15 +00:00
christos 80da7e788f need libutil for pidfile 2017-01-29 22:09:06 +00:00
christos 0fa98a8a57 this is not needed anymore 2017-01-29 19:38:38 +00:00
christos c60105bcf7 include roken-common.h directly. 2017-01-29 19:38:00 +00:00