#
15d7c2bc |
| 05-Mar-2023 |
dtucker <dtucker@openbsd.org> |
Remove unused compat.h includes. We've previously removed a lot of the really old compatibility code, and with it went the need to include compat.h in most of the files that have it.
|
#
2191bf91 |
| 09-Dec-2022 |
dtucker <dtucker@openbsd.org> |
Add some server debugging for hostbased auth.
auth_debug_add queues messages about the auth process which is sent to the client after successful authentication. This also sends those to the server
Add some server debugging for hostbased auth.
auth_debug_add queues messages about the auth process which is sent to the client after successful authentication. This also sends those to the server debug log to aid in debugging. From bz#3507, ok djm@
show more ...
|
#
38374349 |
| 03-Jun-2022 |
djm <djm@openbsd.org> |
move auth_openprincipals() and auth_openkeyfile() over to auth2-pubkeyfile.c too; they make more sense there.
|
#
da1d0839 |
| 27-May-2022 |
djm <djm@openbsd.org> |
split the low-level file handling functions out from auth2-pubkey.c
Put them in a new auth2-pubkeyfile.c to make it easier to refer to them (e.g. in unit/fuzz tests) without having to refer to every
split the low-level file handling functions out from auth2-pubkey.c
Put them in a new auth2-pubkeyfile.c to make it easier to refer to them (e.g. in unit/fuzz tests) without having to refer to everything else pubkey auth brings in.
ok dtucker@
show more ...
|
#
b8669307 |
| 27-May-2022 |
djm <djm@openbsd.org> |
refactor authorized_keys/principals handling
remove "struct ssh *" from arguments - this was only used to pass the remote host/address. These can be passed in instead and the resulting code is less
refactor authorized_keys/principals handling
remove "struct ssh *" from arguments - this was only used to pass the remote host/address. These can be passed in instead and the resulting code is less tightly coupled to ssh_api.[ch]
ok dtucker@
show more ...
|
#
8aa2bac9 |
| 26-Apr-2022 |
dtucker <dtucker@openbsd.org> |
Check sshauthopt_new() for NULL. bz#3425, from tessgauthier at microsoft.com. ok djm@
|
#
6c051609 |
| 23-Feb-2022 |
djm <djm@openbsd.org> |
randomise the password used in fakepw
|
#
a7d9d4b2 |
| 05-Jul-2021 |
dtucker <dtucker@openbsd.org> |
Remove comment referencing now-removed RhostsRSAAuthentication. ok djm@
|
#
74cb32ae |
| 03-Apr-2021 |
djm <djm@openbsd.org> |
highly polished whitespace, mostly fixing spaces-for-tab and bad indentation on continuation lines. Prompted by GHPR#185
|
#
88d57d0e |
| 22-Dec-2020 |
djm <djm@openbsd.org> |
move subprocess() from auth.c to misc.c
make privilege dropping optional but allow it via callbacks (to avoid need to link uidswap.c everywhere)
add some other flags (keep environment, disable stri
move subprocess() from auth.c to misc.c
make privilege dropping optional but allow it via callbacks (to avoid need to link uidswap.c everywhere)
add some other flags (keep environment, disable strict path safety check) that make this more useful for client-side use.
feedback & ok markus@
show more ...
|
#
4ac03e1d |
| 20-Dec-2020 |
djm <djm@openbsd.org> |
load_hostkeys()/hostkeys_foreach() variants for FILE*
Add load_hostkeys_file() and hostkeys_foreach_file() that accept a FILE* argument instead of opening the file directly.
Original load_hostkeys(
load_hostkeys()/hostkeys_foreach() variants for FILE*
Add load_hostkeys_file() and hostkeys_foreach_file() that accept a FILE* argument instead of opening the file directly.
Original load_hostkeys() and hostkeys_foreach() are implemented using these new interfaces.
Add a u_int note field to the hostkey_entry and hostkey_foreach_line structs that is passed directly from the load_hostkeys() and hostkeys_foreach() call. This is a lightweight way to annotate results between different invocations of load_hostkeys().
ok markus@
show more ...
|
#
48e6b99d |
| 18-Oct-2020 |
djm <djm@openbsd.org> |
use the new variant log macros instead of prepending __func__ and appending ssh_err(r) manually; ok markus@
|
#
7e9258b6 |
| 16-Oct-2020 |
djm <djm@openbsd.org> |
LogVerbose keyword for ssh and sshd
Allows forcing maximum debug logging by file/function/line pattern- lists.
ok markus@
|
#
869858c2 |
| 27-Aug-2020 |
djm <djm@openbsd.org> |
support for requiring user verified FIDO keys in sshd
This adds a "verify-required" authorized_keys flag and a corresponding sshd_config option that tells sshd to require that FIDO keys verify the u
support for requiring user verified FIDO keys in sshd
This adds a "verify-required" authorized_keys flag and a corresponding sshd_config option that tells sshd to require that FIDO keys verify the user identity before completing the signing/authentication attempt. Whether or not user verification was performed is already baked into the signature made on the FIDO token, so this is just plumbing that flag through and adding ways to require it.
feedback and ok markus@
show more ...
|
#
20e16316 |
| 31-Jan-2020 |
djm <djm@openbsd.org> |
Add a sshd_config "Include" directive to allow inclusion of files. This has sensible semantics wrt Match blocks and accepts glob(3) patterns to specify the included files. Based on patch by Jakub Jel
Add a sshd_config "Include" directive to allow inclusion of files. This has sensible semantics wrt Match blocks and accepts glob(3) patterns to specify the included files. Based on patch by Jakub Jelen in bz2468; feedback and ok markus@
show more ...
|
#
e9716d4d |
| 23-Jan-2020 |
dtucker <dtucker@openbsd.org> |
Replace all calls to signal(2) with a wrapper around sigaction(2). This wrapper blocks all other signals during the handler preventing races between handlers, and sets SA_RESTART which should reduce
Replace all calls to signal(2) with a wrapper around sigaction(2). This wrapper blocks all other signals during the handler preventing races between handlers, and sets SA_RESTART which should reduce the potential for short read/write operations.
show more ...
|
#
43e343f8 |
| 16-Dec-2019 |
tobhe <tobhe@openbsd.org> |
strdup may return NULL if memory allocation fails. Use the safer xstrdup which fatals on allocation failures.
ok markus@
|
#
6e27da75 |
| 25-Nov-2019 |
djm <djm@openbsd.org> |
add a "no-touch-required" option for authorized_keys and a similar extension for certificates. This option disables the default requirement that security key signatures attest that the user touched t
add a "no-touch-required" option for authorized_keys and a similar extension for certificates. This option disables the default requirement that security key signatures attest that the user touched their key to authorize them.
feedback deraadt, ok markus
show more ...
|
#
1ef0822a |
| 16-Oct-2019 |
djm <djm@openbsd.org> |
potential NULL dereference for revoked hostkeys; reported by krishnaiah bommu
|
#
33afd2d7 |
| 02-Oct-2019 |
djm <djm@openbsd.org> |
remove some duplicate #includes
|
#
d04a6061 |
| 06-Sep-2019 |
djm <djm@openbsd.org> |
lots of things were relying on libcrypto headers to transitively include various system headers (mostly stdlib.h); include them explicitly
|
#
3aaa63eb |
| 28-Jun-2019 |
deraadt <deraadt@openbsd.org> |
When system calls indicate an error they return -1, not some arbitrary value < 0. errno is only updated in this case. Change all (most?) callers of syscalls to follow this better, and let's see if
When system calls indicate an error they return -1, not some arbitrary value < 0. errno is only updated in this case. Change all (most?) callers of syscalls to follow this better, and let's see if this strictness helps us in the future.
show more ...
|
#
deba42a9 |
| 19-Jan-2019 |
djm <djm@openbsd.org> |
convert auth.c to new packet API
with & ok markus@
|
#
2e5b4218 |
| 19-Jan-2019 |
djm <djm@openbsd.org> |
convert servconf.c to new packet API
with & ok markus@
|
#
8904d296 |
| 19-Jan-2019 |
djm <djm@openbsd.org> |
begin landing remaining refactoring of packet parsing API, started almost exactly six years ago.
This change stops including the old packet_* API by default and makes each file that requires the old
begin landing remaining refactoring of packet parsing API, started almost exactly six years ago.
This change stops including the old packet_* API by default and makes each file that requires the old API include it explicitly. We will commit file-by-file refactoring to remove the old API in consistent steps.
with & ok markus@
show more ...
|