#
976a9bf1 |
| 06-Dec-2024 |
djm <djm@openbsd.org> |
ignore SIGPIPE here; some downstreams have had this for years...
|
#
28a658e2 |
| 18-Oct-2024 |
djm <djm@openbsd.org> |
ssh-keyscan doesn't need it's own sshfatal() definition, it can use the shared one from fatal.c
based on GHPR401 from lengyijun
|
#
e34b69e8 |
| 18-Oct-2024 |
djm <djm@openbsd.org> |
unreachable POLLERR case; from ya0guang via GHPR485
|
#
479c151d |
| 20-Sep-2024 |
jsg <jsg@openbsd.org> |
remove unneeded semicolons; checked by millert@
|
#
4e5f03cb |
| 09-Sep-2024 |
djm <djm@openbsd.org> |
pull post-quantum ML-KEM/x25519 key exchange out from compile-time flag now than an IANA codepoint has been assigned for the algorithm.
Add mlkem768x25519-sha256 in 2nd KexAlgorithms preference slot
pull post-quantum ML-KEM/x25519 key exchange out from compile-time flag now than an IANA codepoint has been assigned for the algorithm.
Add mlkem768x25519-sha256 in 2nd KexAlgorithms preference slot.
ok markus@
show more ...
|
#
bf801ff5 |
| 04-Sep-2024 |
djm <djm@openbsd.org> |
be more strict in parsing key type names. Only allow shortnames (e.g "rsa") in user-interface code and require full SSH protocol names (e.g. "ssh-rsa") everywhere else.
Prompted by bz3725; ok markus@
|
#
9dc26a4e |
| 02-Sep-2024 |
djm <djm@openbsd.org> |
Add experimental support for hybrid post-quantum key exchange ML-KEM768 with ECDH/X25519 from the Internet-draft: https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-ssh-pq-ke-03
This is b
Add experimental support for hybrid post-quantum key exchange ML-KEM768 with ECDH/X25519 from the Internet-draft: https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-ssh-pq-ke-03
This is based on previous patches from markus@ but adapted to use the final FIPS203 standard ML-KEM using a formally-verified implementation from libcrux.
Note this key exchange method is still a draft and thus subject to change. It is therefore disabled by default; set MLKEM=yes to build it. We're making it available now to make it easy for other SSH implementations to test against it.
ok markus@ deraadt@
show more ...
|
#
e2b608cd |
| 14-Jun-2024 |
djm <djm@openbsd.org> |
make host/banner comments go to stderr instead of stdout, so they are useful as comments without extra shell redirection and so they don't clutter actual errors on stderr.
Add a -q flag to shut them
make host/banner comments go to stderr instead of stdout, so they are useful as comments without extra shell redirection and so they don't clutter actual errors on stderr.
Add a -q flag to shut them up.
ok dtucker@
show more ...
|
#
debf255c |
| 06-May-2024 |
tobias <tobias@openbsd.org> |
remove SSH1 leftovers
Authored with Space Meyer <git at the-space dot agency>
ok djm
|
#
ccc53781 |
| 30-Apr-2024 |
tobias <tobias@openbsd.org> |
never close stdin
The sanitise_stdfd call makes sure that standard file descriptors are open (if they were closed, they are connected with /dev/null).
Do not close stdin in any case to prevent erro
never close stdin
The sanitise_stdfd call makes sure that standard file descriptors are open (if they were closed, they are connected with /dev/null).
Do not close stdin in any case to prevent error messages when stdin is read multiple times and to prevent later usage of fd 0 for connections, e.g.
echo localhost | ssh-keyscan -f - -f -
While at it, make stdin-related error messages nicer.
Authored with Max Kunzelmann <maxdev at posteo dot de>
ok djm
show more ...
|
#
52113de9 |
| 11-Jan-2024 |
djm <djm@openbsd.org> |
make DSA key support compile-time optional, defaulting to on
ok markus@
|
#
0a3ea9a3 |
| 20-Dec-2023 |
jsg <jsg@openbsd.org> |
spelling; ok markus@
|
#
cdc6f5c1 |
| 21-Jun-2023 |
djm <djm@openbsd.org> |
handle rlimits > INT_MAX (rlim_t is u64); ok dtucker bz3581
|
#
e9931ce2 |
| 31-Mar-2023 |
djm <djm@openbsd.org> |
don't print key if printing hostname failed; with/ok dtucker@
|
#
22a9c15e |
| 10-Feb-2023 |
jmc <jmc@openbsd.org> |
space between macro and punctuation; sort usage();
|
#
16d9a131 |
| 10-Feb-2023 |
djm <djm@openbsd.org> |
let ssh-keygen and ssh-keyscan accept -Ohashalg=sha1|sha256 when outputting SSHFP fingerprints to allow algorithm selection. bz3493 ok dtucker@
|
#
d9a51c35 |
| 26-Dec-2022 |
jmc <jmc@openbsd.org> |
spelling fixes; from paul tagliamonte amendments to his diff are noted on tech
|
#
d7259957 |
| 04-Dec-2022 |
cheloha <cheloha@openbsd.org> |
userspace: remove vestigial '?' cases from top-level getopt(3) loops
getopt(3) returns '?' when it encounters a flag not present in the in the optstring or if a flag is missing its option argument.
userspace: remove vestigial '?' cases from top-level getopt(3) loops
getopt(3) returns '?' when it encounters a flag not present in the in the optstring or if a flag is missing its option argument. We can handle this case with the "default" failure case with no loss of legibility. Hence, remove all the redundant "case '?':" lines.
Prompted by dlg@. With help from dlg@ and millert@.
Link: https://marc.info/?l=openbsd-tech&m=167011979726449&w=2
ok naddy@ millert@ dlg@
show more ...
|
#
ba77ede9 |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
allow ssh-keyscan(1) to accept CIDR address ranges, e.g. ssh-keyscan 192.168.0.0/24
If a CIDR range is passed, then it will be expanded to all possible addresses in the range including the all-0s an
allow ssh-keyscan(1) to accept CIDR address ranges, e.g. ssh-keyscan 192.168.0.0/24
If a CIDR range is passed, then it will be expanded to all possible addresses in the range including the all-0s and all-1s addresses.
bz#976 feedback/ok markus@
show more ...
|
#
3cb3daa3 |
| 19-Aug-2022 |
dtucker <dtucker@openbsd.org> |
Strictly enforce the maximum allowed SSH2 banner size in ssh-keyscan and prevent a one-byte buffer overflow. Patch from Qualys, ok djm@
|
#
b697a206 |
| 21-Jan-2022 |
deraadt <deraadt@openbsd.org> |
When poll(2) returns -1, for some error conditions pfd[].revents is not cleared. There are subtle errors in various programs. In this particular case, the program should error out. ok djm millert
|
#
01bee629 |
| 02-Dec-2021 |
djm <djm@openbsd.org> |
hash full host:port when asked to hash output, fixes hashes for non- default ports. bz3367 ok dtucker@
|
#
3abf3b58 |
| 18-Nov-2021 |
djm <djm@openbsd.org> |
check for POLLHUP wherever we check for POLLIN
|
#
84c111f5 |
| 12-Nov-2021 |
deraadt <deraadt@openbsd.org> |
aggressively pre-fill the pollfd array with fd=-1
|
#
71995d6a |
| 11-Nov-2021 |
deraadt <deraadt@openbsd.org> |
Convert from select() to ppoll(). Along the way, I observed that the select() code was using exceptfds incorrectly.. ok millert
|