History log of /openbsd/usr.bin/ssh/auth.c (Results 1 – 25 of 160)
Revision Date Author Comments
# 15d7c2bc 05-Mar-2023 dtucker <dtucker@openbsd.org>

Remove unused compat.h includes. We've previously removed a lot
of the really old compatibility code, and with it went the need to
include compat.h in most of the files that have it.


# 2191bf91 09-Dec-2022 dtucker <dtucker@openbsd.org>

Add some server debugging for hostbased auth.

auth_debug_add queues messages about the auth process which is sent to
the client after successful authentication. This also sends those to
the server

Add some server debugging for hostbased auth.

auth_debug_add queues messages about the auth process which is sent to
the client after successful authentication. This also sends those to
the server debug log to aid in debugging. From bz#3507, ok djm@

show more ...


# 38374349 03-Jun-2022 djm <djm@openbsd.org>

move auth_openprincipals() and auth_openkeyfile() over to
auth2-pubkeyfile.c too; they make more sense there.


# da1d0839 27-May-2022 djm <djm@openbsd.org>

split the low-level file handling functions out from auth2-pubkey.c

Put them in a new auth2-pubkeyfile.c to make it easier to refer to them
(e.g. in unit/fuzz tests) without having to refer to every

split the low-level file handling functions out from auth2-pubkey.c

Put them in a new auth2-pubkeyfile.c to make it easier to refer to them
(e.g. in unit/fuzz tests) without having to refer to everything else
pubkey auth brings in.

ok dtucker@

show more ...


# b8669307 27-May-2022 djm <djm@openbsd.org>

refactor authorized_keys/principals handling

remove "struct ssh *" from arguments - this was only used to pass the
remote host/address. These can be passed in instead and the resulting
code is less

refactor authorized_keys/principals handling

remove "struct ssh *" from arguments - this was only used to pass the
remote host/address. These can be passed in instead and the resulting
code is less tightly coupled to ssh_api.[ch]

ok dtucker@

show more ...


# 8aa2bac9 26-Apr-2022 dtucker <dtucker@openbsd.org>

Check sshauthopt_new() for NULL. bz#3425, from tessgauthier at
microsoft.com. ok djm@


# 6c051609 23-Feb-2022 djm <djm@openbsd.org>

randomise the password used in fakepw


# a7d9d4b2 05-Jul-2021 dtucker <dtucker@openbsd.org>

Remove comment referencing now-removed RhostsRSAAuthentication. ok djm@


# 74cb32ae 03-Apr-2021 djm <djm@openbsd.org>

highly polished whitespace, mostly fixing spaces-for-tab and bad
indentation on continuation lines. Prompted by GHPR#185


# 88d57d0e 22-Dec-2020 djm <djm@openbsd.org>

move subprocess() from auth.c to misc.c

make privilege dropping optional but allow it via callbacks (to avoid
need to link uidswap.c everywhere)

add some other flags (keep environment, disable stri

move subprocess() from auth.c to misc.c

make privilege dropping optional but allow it via callbacks (to avoid
need to link uidswap.c everywhere)

add some other flags (keep environment, disable strict path safety check)
that make this more useful for client-side use.

feedback & ok markus@

show more ...


# 4ac03e1d 20-Dec-2020 djm <djm@openbsd.org>

load_hostkeys()/hostkeys_foreach() variants for FILE*

Add load_hostkeys_file() and hostkeys_foreach_file() that accept a
FILE* argument instead of opening the file directly.

Original load_hostkeys(

load_hostkeys()/hostkeys_foreach() variants for FILE*

Add load_hostkeys_file() and hostkeys_foreach_file() that accept a
FILE* argument instead of opening the file directly.

Original load_hostkeys() and hostkeys_foreach() are implemented using
these new interfaces.

Add a u_int note field to the hostkey_entry and hostkey_foreach_line
structs that is passed directly from the load_hostkeys() and
hostkeys_foreach() call. This is a lightweight way to annotate results
between different invocations of load_hostkeys().

ok markus@

show more ...


# 48e6b99d 18-Oct-2020 djm <djm@openbsd.org>

use the new variant log macros instead of prepending __func__ and
appending ssh_err(r) manually; ok markus@


# 7e9258b6 16-Oct-2020 djm <djm@openbsd.org>

LogVerbose keyword for ssh and sshd

Allows forcing maximum debug logging by file/function/line pattern-
lists.

ok markus@


# 869858c2 27-Aug-2020 djm <djm@openbsd.org>

support for requiring user verified FIDO keys in sshd

This adds a "verify-required" authorized_keys flag and a corresponding
sshd_config option that tells sshd to require that FIDO keys verify the
u

support for requiring user verified FIDO keys in sshd

This adds a "verify-required" authorized_keys flag and a corresponding
sshd_config option that tells sshd to require that FIDO keys verify the
user identity before completing the signing/authentication attempt.
Whether or not user verification was performed is already baked into the
signature made on the FIDO token, so this is just plumbing that flag
through and adding ways to require it.

feedback and ok markus@

show more ...


# 20e16316 31-Jan-2020 djm <djm@openbsd.org>

Add a sshd_config "Include" directive to allow inclusion of files.
This has sensible semantics wrt Match blocks and accepts glob(3)
patterns to specify the included files. Based on patch by Jakub
Jel

Add a sshd_config "Include" directive to allow inclusion of files.
This has sensible semantics wrt Match blocks and accepts glob(3)
patterns to specify the included files. Based on patch by Jakub
Jelen in bz2468; feedback and ok markus@

show more ...


# e9716d4d 23-Jan-2020 dtucker <dtucker@openbsd.org>

Replace all calls to signal(2) with a wrapper around sigaction(2).
This wrapper blocks all other signals during the handler preventing
races between handlers, and sets SA_RESTART which should reduce

Replace all calls to signal(2) with a wrapper around sigaction(2).
This wrapper blocks all other signals during the handler preventing
races between handlers, and sets SA_RESTART which should reduce the
potential for short read/write operations.

show more ...


# 43e343f8 16-Dec-2019 tobhe <tobhe@openbsd.org>

strdup may return NULL if memory allocation fails. Use the safer xstrdup
which fatals on allocation failures.

ok markus@


# 6e27da75 25-Nov-2019 djm <djm@openbsd.org>

add a "no-touch-required" option for authorized_keys and a similar
extension for certificates. This option disables the default
requirement that security key signatures attest that the user touched
t

add a "no-touch-required" option for authorized_keys and a similar
extension for certificates. This option disables the default
requirement that security key signatures attest that the user touched
their key to authorize them.

feedback deraadt, ok markus

show more ...


# 1ef0822a 16-Oct-2019 djm <djm@openbsd.org>

potential NULL dereference for revoked hostkeys; reported by
krishnaiah bommu


# 33afd2d7 02-Oct-2019 djm <djm@openbsd.org>

remove some duplicate #includes


# d04a6061 06-Sep-2019 djm <djm@openbsd.org>

lots of things were relying on libcrypto headers to transitively
include various system headers (mostly stdlib.h); include them
explicitly


# 3aaa63eb 28-Jun-2019 deraadt <deraadt@openbsd.org>

When system calls indicate an error they return -1, not some arbitrary
value < 0. errno is only updated in this case. Change all (most?)
callers of syscalls to follow this better, and let's see if

When system calls indicate an error they return -1, not some arbitrary
value < 0. errno is only updated in this case. Change all (most?)
callers of syscalls to follow this better, and let's see if this strictness
helps us in the future.

show more ...


# deba42a9 19-Jan-2019 djm <djm@openbsd.org>

convert auth.c to new packet API

with & ok markus@


# 2e5b4218 19-Jan-2019 djm <djm@openbsd.org>

convert servconf.c to new packet API

with & ok markus@


# 8904d296 19-Jan-2019 djm <djm@openbsd.org>

begin landing remaining refactoring of packet parsing API, started
almost exactly six years ago.

This change stops including the old packet_* API by default and makes
each file that requires the old

begin landing remaining refactoring of packet parsing API, started
almost exactly six years ago.

This change stops including the old packet_* API by default and makes
each file that requires the old API include it explicitly. We will
commit file-by-file refactoring to remove the old API in consistent
steps.

with & ok markus@

show more ...


1234567