mirror of
https://git.freebsd.org/ports.git
synced 2025-04-28 17:46:38 -04:00
security/openssh-portable: Update to 10.0p1
This commit is contained in:
parent
2e18ed2623
commit
dde9561b3f
6 changed files with 81 additions and 80 deletions
|
@ -1,6 +1,6 @@
|
||||||
PORTNAME= openssh
|
PORTNAME= openssh
|
||||||
DISTVERSION= 9.9p2
|
DISTVERSION= 10.0p1
|
||||||
PORTREVISION= 1
|
PORTREVISION= 0
|
||||||
PORTEPOCH= 1
|
PORTEPOCH= 1
|
||||||
CATEGORIES= security
|
CATEGORIES= security
|
||||||
MASTER_SITES= OPENBSD/OpenSSH/portable
|
MASTER_SITES= OPENBSD/OpenSSH/portable
|
||||||
|
@ -101,7 +101,7 @@ PATCH_SITES+= http://mirror.shatow.net/freebsd/${PORTNAME}/:DEFAULT,hpn,gsskex
|
||||||
|
|
||||||
# Must add this patch before HPN due to conflicts
|
# Must add this patch before HPN due to conflicts
|
||||||
.if ${PORT_OPTIONS:MKERB_GSSAPI} || ${FLAVOR:U} == gssapi
|
.if ${PORT_OPTIONS:MKERB_GSSAPI} || ${FLAVOR:U} == gssapi
|
||||||
#BROKEN= KERB_GSSAPI No patch for ${DISTVERSION} yet.
|
BROKEN= KERB_GSSAPI No patch for ${DISTVERSION} yet.
|
||||||
. if ${PORT_OPTIONS:MHPN} || ${PORT_OPTIONS:MNONECIPHER}
|
. if ${PORT_OPTIONS:MHPN} || ${PORT_OPTIONS:MNONECIPHER}
|
||||||
# Needed glue for applying HPN patch without conflict
|
# Needed glue for applying HPN patch without conflict
|
||||||
EXTRA_PATCHES+= ${FILESDIR}/extra-patch-hpn-gss-glue
|
EXTRA_PATCHES+= ${FILESDIR}/extra-patch-hpn-gss-glue
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
TIMESTAMP = 1739980882
|
TIMESTAMP = 1744346816
|
||||||
SHA256 (openssh-9.9p2.tar.gz) = 91aadb603e08cc285eddf965e1199d02585fa94d994d6cae5b41e1721e215673
|
SHA256 (openssh-10.0p1.tar.gz) = 021a2e709a0edf4250b1256bd5a9e500411a90dddabea830ed59cef90eb9d85c
|
||||||
SIZE (openssh-9.9p2.tar.gz) = 1944499
|
SIZE (openssh-10.0p1.tar.gz) = 1972675
|
||||||
SHA256 (openssh-9.9p1-gsskex-all-debian-rh-9.9p1.patch) = b8b590024137d54394fd46ebfe32f2b081d0744abdcdcacf6dd30d1c91339864
|
SHA256 (openssh-9.9p1-gsskex-all-debian-rh-9.9p1.patch) = b8b590024137d54394fd46ebfe32f2b081d0744abdcdcacf6dd30d1c91339864
|
||||||
SIZE (openssh-9.9p1-gsskex-all-debian-rh-9.9p1.patch) = 125233
|
SIZE (openssh-9.9p1-gsskex-all-debian-rh-9.9p1.patch) = 125233
|
||||||
|
|
|
@ -524,19 +524,19 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
#if !defined(WITH_OPENSSL)
|
#if !defined(WITH_OPENSSL)
|
||||||
# undef BIGNUM
|
# undef BIGNUM
|
||||||
# undef EC_KEY
|
# undef EC_KEY
|
||||||
--- work/openssh/readconf.c.orig 2021-09-08 09:56:20.567664000 -0700
|
--- work/openssh/readconf.c.orig 2025-04-09 00:02:43.000000000 -0700
|
||||||
+++ work/openssh/readconf.c 2021-09-08 09:57:31.560617000 -0700
|
+++ work/openssh/readconf.c 2025-04-10 22:29:45.138038000 -0700
|
||||||
@@ -67,6 +67,9 @@
|
@@ -71,6 +71,9 @@
|
||||||
#include "uidswap.h"
|
|
||||||
#include "myproposal.h"
|
#include "myproposal.h"
|
||||||
#include "digest.h"
|
#include "digest.h"
|
||||||
|
#include "version.h"
|
||||||
+#ifdef HPN_ENABLED
|
+#ifdef HPN_ENABLED
|
||||||
+#include "sshbuf.h"
|
+#include "sshbuf.h"
|
||||||
+#endif
|
+#endif
|
||||||
|
|
||||||
/* Format of the configuration file:
|
/* Format of the configuration file:
|
||||||
|
|
||||||
@@ -168,6 +171,12 @@ typedef enum {
|
@@ -172,6 +175,12 @@ typedef enum {
|
||||||
oLocalCommand, oPermitLocalCommand, oRemoteCommand,
|
oLocalCommand, oPermitLocalCommand, oRemoteCommand,
|
||||||
oVisualHostKey,
|
oVisualHostKey,
|
||||||
oKexAlgorithms, oIPQoS, oRequestTTY, oSessionType, oStdinNull,
|
oKexAlgorithms, oIPQoS, oRequestTTY, oSessionType, oStdinNull,
|
||||||
|
@ -549,7 +549,7 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
oForkAfterAuthentication, oIgnoreUnknown, oProxyUseFdpass,
|
oForkAfterAuthentication, oIgnoreUnknown, oProxyUseFdpass,
|
||||||
oCanonicalDomains, oCanonicalizeHostname, oCanonicalizeMaxDots,
|
oCanonicalDomains, oCanonicalizeHostname, oCanonicalizeMaxDots,
|
||||||
oCanonicalizeFallbackLocal, oCanonicalizePermittedCNAMEs,
|
oCanonicalizeFallbackLocal, oCanonicalizePermittedCNAMEs,
|
||||||
@@ -316,6 +325,16 @@ static struct {
|
@@ -323,6 +332,16 @@ static struct {
|
||||||
{ "hostbasedkeytypes", oHostbasedAcceptedAlgorithms }, /* obsolete */
|
{ "hostbasedkeytypes", oHostbasedAcceptedAlgorithms }, /* obsolete */
|
||||||
{ "pubkeyacceptedalgorithms", oPubkeyAcceptedAlgorithms },
|
{ "pubkeyacceptedalgorithms", oPubkeyAcceptedAlgorithms },
|
||||||
{ "pubkeyacceptedkeytypes", oPubkeyAcceptedAlgorithms }, /* obsolete */
|
{ "pubkeyacceptedkeytypes", oPubkeyAcceptedAlgorithms }, /* obsolete */
|
||||||
|
@ -566,7 +566,7 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
{ "ignoreunknown", oIgnoreUnknown },
|
{ "ignoreunknown", oIgnoreUnknown },
|
||||||
{ "proxyjump", oProxyJump },
|
{ "proxyjump", oProxyJump },
|
||||||
{ "securitykeyprovider", oSecurityKeyProvider },
|
{ "securitykeyprovider", oSecurityKeyProvider },
|
||||||
@@ -1125,6 +1144,44 @@ parse_time:
|
@@ -1332,6 +1351,44 @@ parse_time:
|
||||||
intptr = &options->check_host_ip;
|
intptr = &options->check_host_ip;
|
||||||
goto parse_flag;
|
goto parse_flag;
|
||||||
|
|
||||||
|
@ -611,7 +611,7 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
case oVerifyHostKeyDNS:
|
case oVerifyHostKeyDNS:
|
||||||
intptr = &options->verify_host_key_dns;
|
intptr = &options->verify_host_key_dns;
|
||||||
multistate_ptr = multistate_yesnoask;
|
multistate_ptr = multistate_yesnoask;
|
||||||
@@ -2386,6 +2443,16 @@ initialize_options(Options * options)
|
@@ -2742,6 +2799,16 @@ initialize_options(Options * options)
|
||||||
options->ip_qos_interactive = -1;
|
options->ip_qos_interactive = -1;
|
||||||
options->ip_qos_bulk = -1;
|
options->ip_qos_bulk = -1;
|
||||||
options->request_tty = -1;
|
options->request_tty = -1;
|
||||||
|
@ -628,7 +628,7 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
options->session_type = -1;
|
options->session_type = -1;
|
||||||
options->stdin_null = -1;
|
options->stdin_null = -1;
|
||||||
options->fork_after_authentication = -1;
|
options->fork_after_authentication = -1;
|
||||||
@@ -2557,6 +2624,34 @@ fill_default_options(Options * options)
|
@@ -2916,6 +2983,34 @@ fill_default_options(Options * options)
|
||||||
options->server_alive_interval = 0;
|
options->server_alive_interval = 0;
|
||||||
if (options->server_alive_count_max == -1)
|
if (options->server_alive_count_max == -1)
|
||||||
options->server_alive_count_max = 3;
|
options->server_alive_count_max = 3;
|
||||||
|
@ -693,19 +693,19 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
char **patterns = NULL;
|
char **patterns = NULL;
|
||||||
size_t n, npatterns = 0;
|
size_t n, npatterns = 0;
|
||||||
struct timeval tv[2];
|
struct timeval tv[2];
|
||||||
--- work/openssh-7.7p1/servconf.c.orig 2018-04-01 22:38:28.000000000 -0700
|
--- work/openssh/servconf.c.orig 2025-04-09 00:02:43.000000000 -0700
|
||||||
+++ work/openssh-7.7p1/servconf.c 2018-06-27 17:01:05.276677000 -0700
|
+++ work/openssh/servconf.c 2025-04-10 22:30:44.919047000 -0700
|
||||||
@@ -63,6 +63,9 @@
|
@@ -69,6 +69,9 @@
|
||||||
#include "auth.h"
|
|
||||||
#include "myproposal.h"
|
#include "myproposal.h"
|
||||||
#include "digest.h"
|
#include "digest.h"
|
||||||
|
#include "version.h"
|
||||||
+#ifdef HPN_ENABLED
|
+#ifdef HPN_ENABLED
|
||||||
+#include "sshbuf.h"
|
+#include "sshbuf.h"
|
||||||
+#endif
|
+#endif
|
||||||
|
|
||||||
static void add_listen_addr(ServerOptions *, const char *,
|
#if !defined(SSHD_PAM_SERVICE)
|
||||||
const char *, int);
|
# define SSHD_PAM_SERVICE "sshd"
|
||||||
@@ -169,6 +172,14 @@ initialize_server_options(ServerOptions *options)
|
@@ -204,6 +207,14 @@ initialize_server_options(ServerOptions *options)
|
||||||
options->authorized_principals_file = NULL;
|
options->authorized_principals_file = NULL;
|
||||||
options->authorized_principals_command = NULL;
|
options->authorized_principals_command = NULL;
|
||||||
options->authorized_principals_command_user = NULL;
|
options->authorized_principals_command_user = NULL;
|
||||||
|
@ -720,7 +720,7 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
options->ip_qos_interactive = -1;
|
options->ip_qos_interactive = -1;
|
||||||
options->ip_qos_bulk = -1;
|
options->ip_qos_bulk = -1;
|
||||||
options->version_addendum = NULL;
|
options->version_addendum = NULL;
|
||||||
@@ -371,6 +382,57 @@ fill_default_server_options(ServerOptions *options)
|
@@ -471,6 +482,57 @@ fill_default_server_options(ServerOptions *options)
|
||||||
}
|
}
|
||||||
if (options->permit_tun == -1)
|
if (options->permit_tun == -1)
|
||||||
options->permit_tun = SSH_TUNMODE_NO;
|
options->permit_tun = SSH_TUNMODE_NO;
|
||||||
|
@ -776,11 +776,11 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
+#endif
|
+#endif
|
||||||
+
|
+
|
||||||
if (options->ip_qos_interactive == -1)
|
if (options->ip_qos_interactive == -1)
|
||||||
options->ip_qos_interactive = IPTOS_LOWDELAY;
|
options->ip_qos_interactive = IPTOS_DSCP_AF21;
|
||||||
if (options->ip_qos_bulk == -1)
|
if (options->ip_qos_bulk == -1)
|
||||||
@@ -466,6 +528,12 @@ typedef enum {
|
@@ -573,6 +635,12 @@ typedef enum {
|
||||||
sUsePrivilegeSeparation, sAllowAgentForwarding,
|
sUsePrivilegeSeparation, sAllowAgentForwarding,
|
||||||
sHostCertificate,
|
sHostCertificate, sInclude,
|
||||||
sRevokedKeys, sTrustedUserCAKeys, sAuthorizedPrincipalsFile,
|
sRevokedKeys, sTrustedUserCAKeys, sAuthorizedPrincipalsFile,
|
||||||
+#ifdef NONE_CIPHER_ENABLED
|
+#ifdef NONE_CIPHER_ENABLED
|
||||||
+ sNoneEnabled,
|
+ sNoneEnabled,
|
||||||
|
@ -789,9 +789,9 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
+ sTcpRcvBufPoll, sHPNDisabled, sHPNBufferSize,
|
+ sTcpRcvBufPoll, sHPNDisabled, sHPNBufferSize,
|
||||||
+#endif
|
+#endif
|
||||||
sAuthorizedPrincipalsCommand, sAuthorizedPrincipalsCommandUser,
|
sAuthorizedPrincipalsCommand, sAuthorizedPrincipalsCommandUser,
|
||||||
sKexAlgorithms, sIPQoS, sVersionAddendum,
|
sKexAlgorithms, sCASignatureAlgorithms, sIPQoS, sVersionAddendum,
|
||||||
sAuthorizedKeysCommand, sAuthorizedKeysCommandUser,
|
sAuthorizedKeysCommand, sAuthorizedKeysCommandUser,
|
||||||
@@ -603,6 +671,14 @@ static struct {
|
@@ -727,6 +795,14 @@ static struct {
|
||||||
{ "revokedkeys", sRevokedKeys, SSHCFG_ALL },
|
{ "revokedkeys", sRevokedKeys, SSHCFG_ALL },
|
||||||
{ "trustedusercakeys", sTrustedUserCAKeys, SSHCFG_ALL },
|
{ "trustedusercakeys", sTrustedUserCAKeys, SSHCFG_ALL },
|
||||||
{ "authorizedprincipalsfile", sAuthorizedPrincipalsFile, SSHCFG_ALL },
|
{ "authorizedprincipalsfile", sAuthorizedPrincipalsFile, SSHCFG_ALL },
|
||||||
|
@ -804,13 +804,12 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
+ { "tcprcvbufpoll", sTcpRcvBufPoll, SSHCFG_ALL },
|
+ { "tcprcvbufpoll", sTcpRcvBufPoll, SSHCFG_ALL },
|
||||||
+#endif
|
+#endif
|
||||||
{ "kexalgorithms", sKexAlgorithms, SSHCFG_GLOBAL },
|
{ "kexalgorithms", sKexAlgorithms, SSHCFG_GLOBAL },
|
||||||
|
{ "include", sInclude, SSHCFG_ALL },
|
||||||
{ "ipqos", sIPQoS, SSHCFG_ALL },
|
{ "ipqos", sIPQoS, SSHCFG_ALL },
|
||||||
{ "authorizedkeyscommand", sAuthorizedKeysCommand, SSHCFG_ALL },
|
@@ -1568,6 +1644,25 @@ process_server_config_line_depth(ServerOptions *option
|
||||||
@@ -1351,6 +1427,25 @@ process_server_config_line(ServerOptions *options, cha
|
intptr = &options->hostbased_authentication;
|
||||||
case sIgnoreUserKnownHosts:
|
|
||||||
intptr = &options->ignore_user_known_hosts;
|
|
||||||
goto parse_flag;
|
goto parse_flag;
|
||||||
+
|
|
||||||
+#ifdef NONE_CIPHER_ENABLED
|
+#ifdef NONE_CIPHER_ENABLED
|
||||||
+ case sNoneEnabled:
|
+ case sNoneEnabled:
|
||||||
+ intptr = &options->none_enabled;
|
+ intptr = &options->none_enabled;
|
||||||
|
@ -829,9 +828,10 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
+ intptr = &options->hpn_buffer_size;
|
+ intptr = &options->hpn_buffer_size;
|
||||||
+ goto parse_int;
|
+ goto parse_int;
|
||||||
+#endif
|
+#endif
|
||||||
|
+
|
||||||
case sHostbasedAuthentication:
|
case sHostbasedUsesNameFromPacketOnly:
|
||||||
intptr = &options->hostbased_authentication;
|
intptr = &options->hostbased_uses_name_from_packet_only;
|
||||||
|
goto parse_flag;
|
||||||
--- work.clean/openssh-6.8p1/servconf.h 2015-03-17 00:49:20.000000000 -0500
|
--- work.clean/openssh-6.8p1/servconf.h 2015-03-17 00:49:20.000000000 -0500
|
||||||
+++ work/openssh-6.8p1/servconf.h 2015-04-03 13:48:37.316827000 -0500
|
+++ work/openssh-6.8p1/servconf.h 2015-04-03 13:48:37.316827000 -0500
|
||||||
@@ -169,6 +169,15 @@
|
@@ -169,6 +169,15 @@
|
||||||
|
@ -1062,14 +1062,17 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
#define SSHBUF_REFS_MAX 0x100000 /* Max child buffers */
|
#define SSHBUF_REFS_MAX 0x100000 /* Max child buffers */
|
||||||
#define SSHBUF_MAX_BIGNUM (16384 / 8) /* Max bignum *bytes* */
|
#define SSHBUF_MAX_BIGNUM (16384 / 8) /* Max bignum *bytes* */
|
||||||
#define SSHBUF_MAX_ECPOINT ((528 * 2 / 8) + 1) /* Max EC point *bytes* */
|
#define SSHBUF_MAX_ECPOINT ((528 * 2 / 8) + 1) /* Max EC point *bytes* */
|
||||||
--- work/openssh/sshconnect.c.orig 2020-09-27 00:25:01.000000000 -0700
|
--- work/openssh/sshconnect.c.orig 2025-04-09 00:02:43.000000000 -0700
|
||||||
+++ work/openssh/sshconnect.c 2020-11-10 21:35:40.945330000 -0800
|
+++ work/openssh/sshconnect.c 2025-04-10 22:32:59.573577000 -0700
|
||||||
@@ -361,7 +361,32 @@ check_ifaddrs(const char *ifname, int af, const struct
|
@@ -341,6 +341,31 @@ check_ifaddrs(const char *ifname, int af, const struct
|
||||||
}
|
}
|
||||||
#endif
|
}
|
||||||
|
return -1;
|
||||||
|
+}
|
||||||
|
+#endif
|
||||||
|
+
|
||||||
+#ifdef HPN_ENABLED
|
+#ifdef HPN_ENABLED
|
||||||
/*
|
+/*
|
||||||
+ * Set TCP receive buffer if requested.
|
+ * Set TCP receive buffer if requested.
|
||||||
+ * Note: tuning needs to happen after the socket is
|
+ * Note: tuning needs to happen after the socket is
|
||||||
+ * created but before the connection happens
|
+ * created but before the connection happens
|
||||||
|
@ -1090,16 +1093,12 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
+ } else
|
+ } else
|
||||||
+ error("Couldn't set socket receive buffer to %d: %.100s",
|
+ error("Couldn't set socket receive buffer to %d: %.100s",
|
||||||
+ options.tcp_rcv_buf, strerror(errno));
|
+ options.tcp_rcv_buf, strerror(errno));
|
||||||
+}
|
}
|
||||||
+#endif
|
#endif
|
||||||
+
|
|
||||||
+/*
|
@@ -370,6 +395,11 @@ ssh_create_socket(struct addrinfo *ai)
|
||||||
* Creates a socket for use as the ssh connection.
|
if (options.ip_qos_interactive != INT_MAX)
|
||||||
*/
|
set_sock_tos(sock, options.ip_qos_interactive);
|
||||||
static int
|
|
||||||
@@ -383,6 +408,11 @@ ssh_create_socket(struct addrinfo *ai)
|
|
||||||
}
|
|
||||||
fcntl(sock, F_SETFD, FD_CLOEXEC);
|
|
||||||
|
|
||||||
+#ifdef HPN_ENABLED
|
+#ifdef HPN_ENABLED
|
||||||
+ if (options.tcp_rcv_buf > 0)
|
+ if (options.tcp_rcv_buf > 0)
|
||||||
|
@ -1109,13 +1108,12 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
/* Bind the socket to an alternative local IP address */
|
/* Bind the socket to an alternative local IP address */
|
||||||
if (options.bind_address == NULL && options.bind_interface == NULL)
|
if (options.bind_address == NULL && options.bind_interface == NULL)
|
||||||
return sock;
|
return sock;
|
||||||
@@ -1289,7 +1319,8 @@ ssh_login(struct ssh *ssh, Sensitive *sensitive, const
|
@@ -1605,7 +1635,7 @@ ssh_login(struct ssh *ssh, Sensitive *sensitive, const
|
||||||
lowercase(host);
|
|
||||||
|
|
||||||
/* Exchange protocol version identification strings with the server. */
|
/* Exchange protocol version identification strings with the server. */
|
||||||
- if ((r = kex_exchange_identification(ssh, timeout_ms, NULL)) != 0)
|
if ((r = kex_exchange_identification(ssh, timeout_ms,
|
||||||
+ if ((r = kex_exchange_identification(ssh, timeout_ms, NULL,
|
- options.version_addendum)) != 0)
|
||||||
+ options.hpn_disabled)) != 0)
|
+ options.version_addendum, options.hpn_disabled)) != 0)
|
||||||
sshpkt_fatal(ssh, r, "banner exchange");
|
sshpkt_fatal(ssh, r, "banner exchange");
|
||||||
|
|
||||||
/* Put the connection into non-blocking mode. */
|
/* Put the connection into non-blocking mode. */
|
||||||
|
@ -1246,17 +1244,6 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
sshpkt_fatal(ssh, r, "banner exchange");
|
sshpkt_fatal(ssh, r, "banner exchange");
|
||||||
|
|
||||||
ssh_packet_set_nonblocking(ssh);
|
ssh_packet_set_nonblocking(ssh);
|
||||||
@@ -1444,6 +1444,10 @@ do_ssh2_kex(struct ssh *ssh)
|
|
||||||
struct kex *kex;
|
|
||||||
int r;
|
|
||||||
|
|
||||||
+#ifdef NONE_CIPHER_ENABLED
|
|
||||||
+ if (options.none_enabled == 1)
|
|
||||||
+ debug ("WARNING: None cipher enabled");
|
|
||||||
+#endif
|
|
||||||
if (options.rekey_limit || options.rekey_interval)
|
|
||||||
ssh_packet_set_rekey_limits(ssh, options.rekey_limit,
|
|
||||||
options.rekey_interval);
|
|
||||||
--- work.clean/openssh-6.8p1/sshd_config 2015-04-01 22:07:18.248858000 -0500
|
--- work.clean/openssh-6.8p1/sshd_config 2015-04-01 22:07:18.248858000 -0500
|
||||||
+++ work/openssh-6.8p1/sshd_config 2015-04-01 22:16:49.932279000 -0500
|
+++ work/openssh-6.8p1/sshd_config 2015-04-01 22:16:49.932279000 -0500
|
||||||
@@ -111,6 +111,20 @@ AuthorizedKeysFile .ssh/authorized_keys
|
@@ -111,6 +111,20 @@ AuthorizedKeysFile .ssh/authorized_keys
|
||||||
|
@ -1298,3 +1285,16 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
|
||||||
|
|
||||||
struct kex *kex_new(void);
|
struct kex *kex_new(void);
|
||||||
int kex_ready(struct ssh *, char *[PROPOSAL_MAX]);
|
int kex_ready(struct ssh *, char *[PROPOSAL_MAX]);
|
||||||
|
--- work/openssh/sshd-auth.c.orig 2025-04-10 22:36:29.699636000 -0700
|
||||||
|
+++ work/openssh/sshd-auth.c 2025-04-10 22:36:33.770235000 -0700
|
||||||
|
@@ -827,6 +827,10 @@ do_ssh2_kex(struct ssh *ssh)
|
||||||
|
struct kex *kex;
|
||||||
|
int r;
|
||||||
|
|
||||||
|
+#ifdef NONE_CIPHER_ENABLED
|
||||||
|
+ if (options.none_enabled == 1)
|
||||||
|
+ debug ("WARNING: None cipher enabled");
|
||||||
|
+#endif
|
||||||
|
if (options.rekey_limit || options.rekey_interval)
|
||||||
|
ssh_packet_set_rekey_limits(ssh, options.rekey_limit,
|
||||||
|
options.rekey_interval);
|
||||||
|
|
|
@ -16,12 +16,12 @@ r294563 was incomplete; re-add the client-side options as well.
|
||||||
|
|
||||||
------------------------------------------------------------------------
|
------------------------------------------------------------------------
|
||||||
|
|
||||||
--- readconf.c.orig 2023-12-19 17:09:41.366788000 -0800
|
--- readconf.c.orig 2025-04-09 00:02:43.000000000 -0700
|
||||||
+++ readconf.c 2023-12-19 17:10:24.155247000 -0800
|
+++ readconf.c 2025-04-10 21:55:30.974643000 -0700
|
||||||
@@ -329,6 +329,12 @@
|
@@ -332,6 +332,12 @@ static struct {
|
||||||
{ "enableescapecommandline", oEnableEscapeCommandline },
|
|
||||||
{ "obscurekeystroketiming", oObscureKeystrokeTiming },
|
{ "obscurekeystroketiming", oObscureKeystrokeTiming },
|
||||||
{ "channeltimeout", oChannelTimeout },
|
{ "channeltimeout", oChannelTimeout },
|
||||||
|
{ "versionaddendum", oVersionAddendum },
|
||||||
+ { "hpndisabled", oDeprecated },
|
+ { "hpndisabled", oDeprecated },
|
||||||
+ { "hpnbuffersize", oDeprecated },
|
+ { "hpnbuffersize", oDeprecated },
|
||||||
+ { "tcprcvbufpoll", oDeprecated },
|
+ { "tcprcvbufpoll", oDeprecated },
|
||||||
|
|
|
@ -1,17 +1,17 @@
|
||||||
--- sshd_config.nopam 2022-02-11 19:19:59.515475000 +0000
|
--- sshd_config.orig 2025-04-09 00:02:43.000000000 -0700
|
||||||
+++ sshd_config 2022-02-11 19:20:45.334738000 +0000
|
+++ sshd_config 2025-04-10 21:52:39.463528000 -0700
|
||||||
@@ -55,8 +55,8 @@
|
@@ -53,8 +53,8 @@ AuthorizedKeysFile .ssh/authorized_keys
|
||||||
# Don't read the user's ~/.rhosts and ~/.shosts files
|
# Don't read the user's ~/.rhosts and ~/.shosts files
|
||||||
#IgnoreRhosts yes
|
#IgnoreRhosts yes
|
||||||
|
|
||||||
-# To disable tunneled clear text passwords, change to no here!
|
-# To disable tunneled clear text passwords, change to "no" here!
|
||||||
-#PasswordAuthentication yes
|
-#PasswordAuthentication yes
|
||||||
+# To enable tunneled clear text passwords, change to yes here!
|
+# To enable tunneled clear text passwords, change to yes here!
|
||||||
+#PasswordAuthentication no
|
+#PasswordAuthentication no
|
||||||
#PermitEmptyPasswords no
|
#PermitEmptyPasswords no
|
||||||
|
|
||||||
# Change to no to disable s/key passwords
|
# Change to "no" to disable keyboard-interactive authentication. Depending on
|
||||||
@@ -72,7 +72,7 @@
|
@@ -72,7 +72,7 @@ AuthorizedKeysFile .ssh/authorized_keys
|
||||||
#GSSAPIAuthentication no
|
#GSSAPIAuthentication no
|
||||||
#GSSAPICleanupCredentials yes
|
#GSSAPICleanupCredentials yes
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@
|
||||||
# and session processing. If this is enabled, PAM authentication will
|
# and session processing. If this is enabled, PAM authentication will
|
||||||
# be allowed through the KbdInteractiveAuthentication and
|
# be allowed through the KbdInteractiveAuthentication and
|
||||||
# PasswordAuthentication. Depending on your PAM configuration,
|
# PasswordAuthentication. Depending on your PAM configuration,
|
||||||
@@ -81,7 +81,7 @@
|
@@ -81,7 +81,7 @@ AuthorizedKeysFile .ssh/authorized_keys
|
||||||
# If you just want the PAM account and session checks to run without
|
# If you just want the PAM account and session checks to run without
|
||||||
# PAM authentication, then enable this but set PasswordAuthentication
|
# PAM authentication, then enable this but set PasswordAuthentication
|
||||||
# and KbdInteractiveAuthentication to 'no'.
|
# and KbdInteractiveAuthentication to 'no'.
|
||||||
|
|
|
@ -16,6 +16,7 @@ libexec/sftp-server
|
||||||
libexec/ssh-keysign
|
libexec/ssh-keysign
|
||||||
libexec/ssh-pkcs11-helper
|
libexec/ssh-pkcs11-helper
|
||||||
libexec/ssh-sk-helper
|
libexec/ssh-sk-helper
|
||||||
|
libexec/sshd-auth
|
||||||
libexec/sshd-session
|
libexec/sshd-session
|
||||||
share/man/man1/sftp.1.gz
|
share/man/man1/sftp.1.gz
|
||||||
share/man/man1/ssh-add.1.gz
|
share/man/man1/ssh-add.1.gz
|
||||||
|
|
Loading…
Add table
Reference in a new issue