History log of /openssh-portable/ (Results 226 - 250 of 10531)
Revision (<<< Hide revision tags) (Show revision tags >>>)Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
dce74eab30-Jan-2020 djm@openbsd.org

upstream: have sshpkt_fatal() save/restore errno before we

potentially call strerror() (via ssh_err()); ok dtucker

OpenBSD-Commit-ID: 5590df31d21405498c848245b85c24acb84ad787

14ef4efe29-Jan-2020 djm@openbsd.org

upstream: markus suggests a simplification to previous

OpenBSD-Commit-ID: 10bbfb6607ebbb9a018dcd163f0964941adf58de

101ebc3a29-Jan-2020 djm@openbsd.org

upstream: give more context to UpdateHostKeys messages, mentioning

that the changes are validated by the existing trusted host key. Prompted by
espie@ feedback and ok markus@

Op

upstream: give more context to UpdateHostKeys messages, mentioning

that the changes are validated by the existing trusted host key. Prompted by
espie@ feedback and ok markus@

OpenBSD-Commit-ID: b3d95f4a45f2692f4143b9e77bb241184dbb8dc5

show more ...

24c0f75228-Jan-2020 djm@openbsd.org

upstream: changes to support FIDO attestation

Allow writing to disk the attestation certificate that is generated by
the FIDO token at key enrollment time. These certificates may be used

upstream: changes to support FIDO attestation

Allow writing to disk the attestation certificate that is generated by
the FIDO token at key enrollment time. These certificates may be used
by an out-of-band workflow to prove that a particular key is held in
trustworthy hardware.

Allow passing in a challenge that will be sent to the card during
key enrollment. These are needed to build an attestation workflow
that resists replay attacks.

ok markus@

OpenBSD-Commit-ID: 457dc3c3d689ba39eed328f0817ed9b91a5f78f6

show more ...

156bef3628-Jan-2020 djm@openbsd.org

upstream: disable UpdateHostKeys=ask when in quiet mode; "work for

me" matthieu@

OpenBSD-Commit-ID: 60d7b5eb91accf935ed9852650a826d86db2ddc7

ec8a759b27-Jan-2020 Damien Miller

compat for missing IPTOS_DSCP_LE in system headers

4594c76227-Jan-2020 djm@openbsd.org

upstream: make IPTOS_DSCP_LE available via IPQoS directive; bz2986,

based on patch by veegish AT cyberstorm.mu

OpenBSD-Commit-ID: 9902bf4fbb4ea51de2193ac2b1d965bc5d99c425

da22216b27-Jan-2020 markus@openbsd.org

upstream: disable UpdateHostKeys=ask if command is specified; ok

djm@ sthen@

OpenBSD-Commit-ID: e5bcc45eadb78896637d4143d289f1e42c2ef5d7

1e1db05425-Jan-2020 djm@openbsd.org

upstream: unbreak unittests for recent API / source file changes

OpenBSD-Regress-ID: 075a899a01bbf7781d38bf0b33d8366faaf6d3c0

0d11447625-Jan-2020 Darren Tucker

Move definition of UINT32_MAX.

This allows us to always define it if needed not just if we also
define the type ourself.

f73ab8a825-Jan-2020 djm@openbsd.org

upstream: unbreak unittests for recent API / source file changes

OpenBSD-Regress-ID: 075a899a01bbf7781d38bf0b33d8366faaf6d3c0

0373f9eb25-Jan-2020 Darren Tucker

Include signal.h to prevent redefintion of _NSIG.

638a45b525-Jan-2020 Darren Tucker

Wrap stdint.h in tests inside HAVE_STDINT_H.

74dfc2c825-Jan-2020 djm@openbsd.org

upstream: for UpdateHostKeys, don't report errors for unsupported

key types - just ignore them. spotted by and ok dtucker@

OpenBSD-Commit-ID: 91769e443f6197c983932fc8ae9d39948727d473

b596182425-Jan-2020 djm@openbsd.org

upstream: downgrade error() for missing subsequent known_hosts

files to debug() as it was intended to be; spotted by dtucker@

OpenBSD-Commit-ID: 18cfea382cb52f2da761be524e309cc3d535

upstream: downgrade error() for missing subsequent known_hosts

files to debug() as it was intended to be; spotted by dtucker@

OpenBSD-Commit-ID: 18cfea382cb52f2da761be524e309cc3d5354ef9

show more ...

469df61125-Jan-2020 djm@openbsd.org

upstream: clarify that BatchMode applies to all interactive prompts

(e.g. host key confirmation) and not just password prompts.

OpenBSD-Commit-ID: 97b001883d89d3fb1620d2e6b747c14a26

upstream: clarify that BatchMode applies to all interactive prompts

(e.g. host key confirmation) and not just password prompts.

OpenBSD-Commit-ID: 97b001883d89d3fb1620d2e6b747c14a26aa9818

show more ...

de40876c25-Jan-2020 djm@openbsd.org

upstream: tidy headers; some junk snuck into sshbuf-misc.c and

sshbuf-io.c doesn't need SSHBUF_INTERNAL set

OpenBSD-Commit-ID: 27a724d2e0b2619c1a1490f44093bbd73580d9e6

6a10760625-Jan-2020 Damien Miller

depend

59d01f1d25-Jan-2020 djm@openbsd.org

upstream: improve the error message for u2f enrollment errors by

making ssh-keygen be solely responsible for printing the error message and
convertint some more common error responses fr

upstream: improve the error message for u2f enrollment errors by

making ssh-keygen be solely responsible for printing the error message and
convertint some more common error responses from the middleware to a useful
ssherr.h status code. more detail remains visible via -v of course.

also remove indepedent copy of sk-api.h declarations in sk-usbhid.c
and just include it.

feedback & ok markus@

OpenBSD-Commit-ID: a4a8ffa870d9a3e0cfd76544bcdeef5c9fb1f1bb

show more ...

99aa803525-Jan-2020 djm@openbsd.org

upstream: factor out reading/writing sshbufs to dedicated

functions; feedback and ok markus@

OpenBSD-Commit-ID: dc09e5f1950b7acc91b8fdf8015347782d2ecd3d

065064fc25-Jan-2020 djm@openbsd.org

upstream: add a comment describing the ranges of channel IDs that

we use; requested by markus@

OpenBSD-Commit-ID: 83a1f09810ffa3a96a55fbe32675b34ba739e56b

6933499625-Jan-2020 djm@openbsd.org

upstream: make sshd_config:ClientAliveCountMax=0 disable the

connection killing behaviour, rather than killing the connection after
sending the first liveness test probe (regardless of w

upstream: make sshd_config:ClientAliveCountMax=0 disable the

connection killing behaviour, rather than killing the connection after
sending the first liveness test probe (regardless of whether the client was
responsive) bz2627; ok markus

OpenBSD-Commit-ID: 5af79c35f4c9fa280643b6852f524bfcd9bccdaf

show more ...

bf986a9e25-Jan-2020 djm@openbsd.org

upstream: clarify order of AllowUsers/DenyUsers vs

AllowGroups/DenyGroups; bz1690, ok markus@

OpenBSD-Commit-ID: 5637584ec30db9cf64822460f41b3e42c8f9facd

022ce92f25-Jan-2020 djm@openbsd.org

upstream: when AddKeysToAgent=yes is set and the key contains no

comment, add the key to the agent with the key's path as the comment. bz2564

OpenBSD-Commit-ID: 8dd8ca9340d7017631a2

upstream: when AddKeysToAgent=yes is set and the key contains no

comment, add the key to the agent with the key's path as the comment. bz2564

OpenBSD-Commit-ID: 8dd8ca9340d7017631a27f4ed5358a4cfddec16f

show more ...

0b81343625-Jan-2020 tedu@openbsd.org

upstream: group14-sha1 is no longer a default algorithm

OpenBSD-Commit-ID: a96f04d5e9c2ff760c6799579dc44f69b4ff431d

12345678910>>...422