summaryrefslogtreecommitdiffhomepage
AgeCommit message (Collapse)Author
2019-03-24Fix regression where TTY modes weren't reset for clientMatt Johnston
2019-03-23Added signature for changeset 07b0d56d186dMatt Johnston
2019-03-23Added tag DROPBEAR_2019.77 for changeset 6d1bbe7d5fa5Matt Johnston
2019-03-232019.77Matt Johnston
2019-03-23use "openssl sha256"Matt Johnston
2019-03-23Update config.sub to 2019-01-05 and config.guess to 2019-03-04Matt Johnston
2019-03-21fix constness build errorMatt Johnston
2019-03-21limit password length to 100Matt Johnston
2019-03-20Increase MAX_USERNAME_LEN to 100Matt Johnston
2019-03-20dropbearconvert: keyimport.c: fix BER encoding of secp521r1 keys (#69)Christian Hohnstädt
keysizes >= 128 octets will be encoded with a 3 byte header which must be accounted by the optional-header Reproduce: master:~/build/dropbear$ ./dropbearkey -t ecdsa -s 521 -f K Generating 521 bit ecdsa key, this may take a while... master:~/build/dropbear$ ./dropbearconvert d o K L Key is a ecdsa-sha2-nistp521 key Wrote key to 'L' master:~/build/dropbear$ openssl ec < L read EC key unable to load Key 139769806448384:error:0D07209B:asn1 encoding routines:ASN1_get_object:too long:crypto/asn1/asn1_lib.c:91:
2019-03-20support openssh long option -o Port=XXXX (#68)xcko
2019-03-20cygwin competibility fix (#64)karel-m
2019-03-20drop obsolete definition for MAX_KEXHASHBUF (#65)Andre McCurdy
The last code to make use of MAX_KEXHASHBUF was removed in 2005: https://github.com/mkj/dropbear/commit/736f370dce614b717193f45d084e9e009de723ce Signed-off-by: Andre McCurdy <armccurdy@gmail.com>
2019-03-20Add a sanity check for DROPBEAR_SVR_MULTIUSER==0 modeMatt Johnston
2019-03-20Support servers without multiple user support (#76)Patrick Stewart
2019-03-20packet: remove stale comment about "packet_type" (#63)Konstantin Demin
clean up after 7f15910541 Signed-off-by: Konstantin Demin <rockdrilla@gmail.com>
2019-03-20fix some gcc warnings (#73)François Perrad
* tweak string size fix gcc8 warnings ``` svr-agentfwd.c: In function 'bindagent': svr-agentfwd.c:254:53: warning: '%s' directive output may be truncated writing up to 107 bytes into a region of size between 0 and 107 [-Wformat-truncation=] snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s", path, sockfile); ^~ ~~~~~~~~ svr-agentfwd.c:254:2: note: 'snprintf' output between 2 and 216 bytes into a destination of size 108 snprintf(addr.sun_path, sizeof(addr.sun_path), "%s/%s", path, sockfile); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ``` * cleanup signed/unsigned comparison fix gcc8 warnings ``` scp.c: In function 'do_local_cmd': scp.c:132:17: warning: comparison of integer expressions of different signedness: 'u_int' {aka 'unsigned int'} and 'int' [-Wsign-compare] for (i = 0; i < a->num; i++) ^ scpmisc.c: In function 'addargs': scpmisc.c:161:25: warning: comparison of integer expressions of different signedness: 'int' and 'u_int' {aka 'unsigned int'} [-Wsign-compare] } else if (args->num+2 >= nalloc) ^~ scpmisc.c: In function 'replacearg': scpmisc.c:183:12: warning: comparison of integer expressions of different signedness: 'u_int' {aka 'unsigned int'} and 'int' [-Wsign-compare] if (which >= args->num) ^~ scpmisc.c: In function 'freeargs': scpmisc.c:196:17: warning: comparison of integer expressions of different signedness: 'u_int' {aka 'unsigned int'} and 'int' [-Wsign-compare] for (i = 0; i < args->num; i++) ^ ``` see https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/misc.h.diff?r1=1.16&r2=1.17
2019-03-20use strlcpy & strlcat (#74)François Perrad
* refactor checkpubkeyperms() with safe BSD functions fix gcc8 warnings ``` svr-authpubkey.c: In function 'checkpubkeyperms': svr-authpubkey.c:427:2: warning: 'strncat' specified bound 5 equals source length [-Wstringop-overflow=] strncat(filename, "/.ssh", 5); /* strlen("/.ssh") == 5 */ ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ svr-authpubkey.c:433:2: warning: 'strncat' specified bound 16 equals source length [-Wstringop-overflow=] strncat(filename, "/authorized_keys", 16); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ``` see https://www.sudo.ws/todd/papers/strlcpy.html * restore strlcpy in xstrdup see original https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/xmalloc.c?rev=1.16
2019-03-20Fix for issue successfull login of disabled user (#78)vincentto13
This commit introduces fix for scenario: 1. Root login disabled on dropbear 2. PAM authentication model enabled While login as root user, after prompt for password user is being notified about login failrue, but after second attempt of prompt for password within same session, login becames succesfull. Signed-off-by: Pawel Rapkiewicz <pawel.rapkiewicz@gmail.com>
2019-03-20Add missing word to readme (#77)Michael Jones
2019-01-07add missing initializer (#71)François Perrad
2018-11-14mergeMatt Johnston
2018-11-14Split ChanType closehandler() and cleanup() so that dbclient doesn'tMatt Johnston
lose exit status messages
2018-11-14Remove some cluttering TRACE printoutsMatt Johnston
2018-11-06Remove incorrect _POSIX_C_SOURCEMatt Johnston
2018-11-05- Add adaptive authentication failure delayMatt Johnston
- Rework monotonic_now/gettime_wrapper and use clock_gettime on more platforms
2018-09-07merge remote forward fixMatt Johnston
2018-09-07FIx remote forward listenersMatt Johnston
2018-08-26Merge writev #include fixMatt Johnston
2018-08-23make writev #include consistent for variable declarations tooMatt Johnston
2018-08-23Merge bugfix delay invalid usersMatt Johnston
2018-08-23Wait to fail invalid usernamesMatt Johnston
2018-08-23fix error message to say localoptions.hMatt Johnston
2018-07-24avoid extended regex features to avoid caring about sed -r vs -EMatt Johnston
2018-03-09Fix leaks in kex fuzzersMatt Johnston
2018-03-09move dictionaries to corpus repoMatt Johnston
2018-03-08avoid leak of ecdh public keyMatt Johnston
2018-03-08kexhashbuf was much to small in kex fuzzersMatt Johnston
2018-03-08Disable wrapfds outside of fuzzed codeMatt Johnston
2018-03-08It turns out you can't have a single-quote in an #errorMatt Johnston
2018-03-08Only advertise a single server ecdsa key when -R (generate as required) isMatt Johnston
specified. Fixes -R now that default ecdsa key size has changed.
2018-03-08#error if no ecc size is chosenMatt Johnston
2018-03-07reduce fuzzer-kexdh params count again, still hitting timeoutMatt Johnston
2018-03-07don't allow null characters in authorized_keysMatt Johnston
2018-03-07fix leak in option handlingMatt Johnston
2018-03-06avoid leak of pubkey_optionsMatt Johnston
2018-03-06fix uninitialised memory in fuzzer codepathMatt Johnston
2018-03-06workaround memory sanitizer FD_ZERO false positivesMatt Johnston
2018-03-06reduce number of dh parameters so fuzzer doesn't timeoutMatt Johnston
2018-03-05ciphers/hashes/kex algorithms won't have string lengths, also useMatt Johnston
dictionary for fuzzer-preauth_nomaths