Commit Graph

241402 Commits

Author SHA1 Message Date
dholland
5a1d7e46f3 Don't cast malloc. 2016-03-12 02:26:40 +00:00
dholland
32cef18b87 Remove unused variable, found by gcc. 2016-03-12 02:17:05 +00:00
dholland
a9e4e98629 Fix syntax error in previous. Hi christos :-)
(PR 50944)
2016-03-12 02:15:50 +00:00
dholland
88c859a1fb Refine previous so the output is all hex again. followup to PR 50942 2016-03-12 02:13:35 +00:00
dholland
666bec36a3 Fix another conditional with wrong (missing) parens. 2016-03-12 02:07:44 +00:00
dholland
5488f4aae3 Clean up gcc warnings. 2016-03-12 02:06:32 +00:00
dholland
48fa59d156 Remove trailing whitespace 2016-03-12 02:02:00 +00:00
dholland
49f907c597 Fix operator precedence in complex conditional by separating out the
assignment part. PR 50954 from David Binderman. While here, separate
out the assignment in all the other similar conditionals too.
2016-03-12 02:01:23 +00:00
jklos
7f15b0acd9 Add kernel configuration file for PogoPlug Pink, PogoPlug Mobile and
PogoPlug v4. Add conditional because PogoPlug v4 can't run SD interface at
50 MHz.
2016-03-12 00:41:30 +00:00
christos
5a1e5090da Add missing ;; (Kurt Lidl) 2016-03-11 22:40:04 +00:00
macallan
327c8d271f malo_rx_desc::status is uint8_t, so don't try to endian-twiddle it 2016-03-11 22:39:01 +00:00
macallan
ace06e28b0 fix tpyo 2016-03-11 22:09:54 +00:00
christos
9c2b425841 PR/50953: David Binderman: Fix misplaced paren 2016-03-11 18:39:03 +00:00
christos
95614a30c2 PR/50952: David Binderman: Clarify expression 2016-03-11 18:38:25 +00:00
christos
850b4cce27 PR/50951: David Binderman: Fix misplaced parens 2016-03-11 18:35:50 +00:00
christos
3dce53befa PR/50950: David Binderman: Fix misplaced parens 2016-03-11 18:34:59 +00:00
christos
aa3efa577d PR/50949: David Binderman: Fix misplaced parens. 2016-03-11 18:34:15 +00:00
christos
9da51837fd PR/50948: David Binderman: Fix misplaced parens 2016-03-11 18:33:18 +00:00
christos
8cc2b02f1c PR/50947: David Binderman: sprinkle parens 2016-03-11 18:32:29 +00:00
christos
c01666f5da PR/50945: David Binderman: sprinkle parens 2016-03-11 18:31:03 +00:00
christos
c5bd235187 PR/50944: David Binderman: sprinkle parens 2016-03-11 18:29:48 +00:00
christos
a8a1a8c522 PR/50943: David Binderman: Fix misplaced parenthesis. 2016-03-11 18:28:43 +00:00
christos
a1148110d4 PR/50942: David Binderman: fix printf format 2016-03-11 18:27:37 +00:00
christos
b8fa0d5200 PR/50941: David Binderman: fix printf format 2016-03-11 18:26:40 +00:00
christos
5207816e51 missed one blsock 2016-03-11 17:17:35 +00:00
christos
dc55fdd2c0 Give the blacklistd socket a more meaningful name. 2016-03-11 17:16:40 +00:00
christos
01b73fc8e1 Sort filters alphabetically; make it easier to add ipf. 2016-03-11 17:01:59 +00:00
christos
01136fa5bc Add support for pf, thanks Kurt Lidl... 2016-03-11 15:35:28 +00:00
wiz
09f9f9fa6e Fix description of /home
From Vadim Ushakov in PR 50938.
2016-03-11 15:18:01 +00:00
matthias
d405a55bc6 $% is $(.MEMBER) and not $(.ARCHIVE), $! is $(.ARCHIVE) and not $(.MEMBER) 2016-03-11 15:12:39 +00:00
matthias
449c0b7d1f make parsing of library member targets work. So
lib.a(member.o): something
	cp something member.o
	ar r lib.a member.o
	rm member.o

will work now.
2016-03-11 13:54:47 +00:00
tsutsui
56c764b63d Properly zero out struct fb_devconfig, including rasops_info.
Fix panic after wsconscfg(8) from serial console, caused by
a junk function pointer.
2016-03-11 13:16:55 +00:00
christos
238888033a Add more __dead; pointed out by clang (from tnn@) 2016-03-11 13:15:02 +00:00
skrll
0c4e042b3e Update RPI firmware to version after the following commit
commit a192a05bc8ca597249e5a36875ce382c572ddc97
Author: popcornmix <popcornmix@gmail.com>
Date:   Mon Mar 7 17:21:57 2016 +0000

Raspberry Pi 3 should now boot the armv7.img produced in the
evbarm-earmv7hf builds
2016-03-11 12:34:57 +00:00
sjg
6067bdd115 Handle missing file for Read the same as for Write, since if it
is Deleted we don't care.

Patch from Bryan Drewery.
2016-03-11 07:01:21 +00:00
joerg
fbba0696d4 Drop FreeBSD RCS ID, add NetBSD's. 2016-03-11 05:02:32 +00:00
christos
1b8bb90dd8 fix pam build. 2016-03-11 03:54:27 +00:00
christos
d600878e36 new openssh 2016-03-11 01:57:14 +00:00
christos
7997655135 merge conflicts 2016-03-11 01:55:00 +00:00
christos
48b0210551 Future deprecation notice
=========================

We plan on retiring more legacy cryptography in a near-future
release, specifically:

 * Refusing all RSA keys smaller than 1024 bits (the current minimum
   is 768 bits)

This list reflects our current intentions, but please check the final
release notes for future releases.

Potentially-incompatible changes
================================

This release disables a number of legacy cryptographic algorithms
by default in ssh:

 * Several ciphers blowfish-cbc, cast128-cbc, all arcfour variants
   and the rijndael-cbc aliases for AES.

 * MD5-based and truncated HMAC algorithms.

These algorithms are already disabled by default in sshd.

Changes since OpenSSH 7.1p2
===========================

This is primarily a bugfix release.

Security
--------

 * ssh(1), sshd(8): remove unfinished and unused roaming code (was
   already forcibly disabled in OpenSSH 7.1p2).

 * ssh(1): eliminate fallback from untrusted X11 forwarding to
   trusted forwarding when the X server disables the SECURITY
   extension.

 * ssh(1), sshd(8): increase the minimum modulus size supported for
   diffie-hellman-group-exchange to 2048 bits.

 * sshd(8): pre-auth sandboxing is now enabled by default (previous
   releases enabled it for new installations via sshd_config).

New Features
------------

 * all: add support for RSA signatures using SHA-256/512 hash
   algorithms based on draft-rsa-dsa-sha2-256-03.txt and
   draft-ssh-ext-info-04.txt.

 * ssh(1): Add an AddKeysToAgent client option which can be set to
   'yes', 'no', 'ask', or 'confirm', and defaults to 'no'.  When
   enabled, a private key that is used during authentication will be
   added to ssh-agent if it is running (with confirmation enabled if
   set to 'confirm').

 * sshd(8): add a new authorized_keys option "restrict" that includes
   all current and future key restrictions (no-*-forwarding, etc.).
   Also add permissive versions of the existing restrictions, e.g.
   "no-pty" -> "pty". This simplifies the task of setting up
   restricted keys and ensures they are maximally-restricted,
   regardless of any permissions we might implement in the future.

 * ssh(1): add ssh_config CertificateFile option to explicitly list
   certificates. bz#2436

 * ssh-keygen(1): allow ssh-keygen to change the key comment for all
   supported formats.

 * ssh-keygen(1): allow fingerprinting from standard input, e.g.
   "ssh-keygen -lf -"

 * ssh-keygen(1): allow fingerprinting multiple public keys in a
   file, e.g. "ssh-keygen -lf ~/.ssh/authorized_keys" bz#1319

 * sshd(8): support "none" as an argument for sshd_config
   Foreground and ChrootDirectory. Useful inside Match blocks to
   override a global default. bz#2486

 * ssh-keygen(1): support multiple certificates (one per line) and
   reading from standard input (using "-f -") for "ssh-keygen -L"

 * ssh-keyscan(1): add "ssh-keyscan -c ..." flag to allow fetching
   certificates instead of plain keys.

 * ssh(1): better handle anchored FQDNs (e.g. 'cvs.openbsd.org.') in
   hostname canonicalisation - treat them as already canonical and
   remove the trailing '.' before matching ssh_config.

Bugfixes
--------

 * sftp(1): existing destination directories should not terminate
   recursive uploads (regression in openssh 6.8) bz#2528

 * ssh(1), sshd(8): correctly send back SSH2_MSG_UNIMPLEMENTED
   replies to unexpected messages during key exchange. bz#2949

 * ssh(1): refuse attempts to set ConnectionAttempts=0, which does
   not make sense and would cause ssh to print an uninitialised stack
   variable. bz#2500

 * ssh(1): fix errors when attempting to connect to scoped IPv6
   addresses with hostname canonicalisation enabled.

 * sshd_config(5): list a couple more options usable in Match blocks.
   bz#2489

 * sshd(8): fix "PubkeyAcceptedKeyTypes +..." inside a Match block.

 * ssh(1): expand tilde characters in filenames passed to -i options
   before checking whether or not the identity file exists. Avoids
   confusion for cases where shell doesn't expand (e.g. "-i ~/file"
   vs. "-i~/file"). bz#2481

 * ssh(1): do not prepend "exec" to the shell command run by "Match
   exec" in a config file, which could cause some commands to fail
   in certain environments. bz#2471

 * ssh-keyscan(1): fix output for multiple hosts/addrs on one line
   when host hashing or a non standard port is in use bz#2479

 * sshd(8): skip "Could not chdir to home directory" message when
   ChrootDirectory is active. bz#2485

 * ssh(1): include PubkeyAcceptedKeyTypes in ssh -G config dump.

 * sshd(8): avoid changing TunnelForwarding device flags if they are
   already what is needed; makes it possible to use tun/tap
   networking as non-root user if device permissions and interface
   flags are pre-established

 * ssh(1), sshd(8): RekeyLimits could be exceeded by one packet.
   bz#2521

 * ssh(1): fix multiplexing master failure to notice client exit.

 * ssh(1), ssh-agent(1): avoid fatal() for PKCS11 tokens that present
   empty key IDs. bz#1773

 * sshd(8): avoid printf of NULL argument. bz#2535

 * ssh(1), sshd(8): allow RekeyLimits larger than 4GB. bz#2521

 * ssh-keygen(1): sshd(8): fix several bugs in (unused) KRL signature
   support.

 * ssh(1), sshd(8): fix connections with peers that use the key
   exchange guess feature of the protocol. bz#2515

 * sshd(8): include remote port number in log messages. bz#2503

 * ssh(1): don't try to load SSHv1 private key when compiled without
   SSHv1 support. bz#2505

 * ssh-agent(1), ssh(1): fix incorrect error messages during key
   loading and signing errors. bz#2507

 * ssh-keygen(1): don't leave empty temporary files when performing
   known_hosts file edits when known_hosts doesn't exist.

 * sshd(8): correct packet format for tcpip-forward replies for
   requests that don't allocate a port bz#2509

 * ssh(1), sshd(8): fix possible hang on closed output. bz#2469

 * ssh(1): expand %i in ControlPath to UID. bz#2449

 * ssh(1), sshd(8): fix return type of openssh_RSA_verify. bz#2460

 * ssh(1), sshd(8): fix some option parsing memory leaks. bz#2182

 * ssh(1): add a some debug output before DNS resolution; it's a
   place where ssh could previously silently stall in cases of
   unresponsive DNS servers. bz#2433

 * ssh(1): remove spurious newline in visual hostkey. bz#2686

 * ssh(1): fix printing (ssh -G ...) of HostKeyAlgorithms=+...

 * ssh(1): fix expansion of HostkeyAlgorithms=+...

Documentation
-------------

 * ssh_config(5), sshd_config(5): update default algorithm lists to
   match current reality. bz#2527

 * ssh(1): mention -Q key-plain and -Q key-cert query options.
   bz#2455

 * sshd_config(8): more clearly describe what AuthorizedKeysFile=none
   does.

 * ssh_config(5): better document ExitOnForwardFailure. bz#2444

 * sshd(5): mention internal DH-GEX fallback groups in manual.
   bz#2302

 * sshd_config(5): better description for MaxSessions option.
   bz#2531

Portability
-----------

 * ssh(1), sftp-server(8), ssh-agent(1), sshd(8): Support Illumos/
   Solaris fine-grained privileges. Including a pre-auth privsep
   sandbox and several pledge() emulations. bz#2511

 * Renovate redhat/openssh.spec, removing deprecated options and
   syntax.

 * configure: allow --without-ssl-engine with --without-openssl

 * sshd(8): fix multiple authentication using S/Key. bz#2502

 * sshd(8): read back from libcrypto RAND_* before dropping
   privileges.  Avoids sandboxing violations with BoringSSL.

 * Fix name collision with system-provided glob(3) functions.
   bz#2463

 * Adapt Makefile to use ssh-keygen -A when generating host keys.
   bz#2459

 * configure: correct default value for --with-ssh1 bz#2457

 * configure: better detection of _res symbol bz#2259

 * support getrandom() syscall on Linux
2016-03-11 01:49:59 +00:00
christos
694e60c6ed Undo weak here to fix the tests; will revisit soon. 2016-03-11 00:44:56 +00:00
christos
acfb0ca6d6 Set TEST_SH 2016-03-10 22:30:57 +00:00
martin
b7bf6f19af Strip debug symbols from boot code 2016-03-10 20:23:35 +00:00
martin
8d92fc86f0 Deal with _edata not being 4-byte aligned 2016-03-10 20:22:52 +00:00
leot
2a4b16ea45 strndup() is part of XSI from The Open Group Base Specification Issue 7 and had
a similar history of stpcpy(), stpncpy() and strnlen().
Make it visible under XOPEN_SOURCE>=700 too (not just _NETBSD_SOURCE).

ok dholland@
2016-03-10 18:53:48 +00:00
christos
09efa38c34 sync with the code with have in the current copy of gcc. 2016-03-10 14:40:00 +00:00
joerg
7682402b4b Unbreak tools build. 2016-03-10 11:32:10 +00:00
martin
032d514f64 Add a few includes of bsd.own.mk to avoid broken test conditions
on ACTIVE_CC - this might not be the correct fix for PR 50930,
but it avoids the issue.
2016-03-10 09:00:24 +00:00
christos
fd7d1a5df9 new bind 2016-03-10 04:02:29 +00:00
christos
69f16a276d merge conflicts 2016-03-10 04:01:33 +00:00