Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Feb 2025 17:51:24 GMT
From:      Ed Maste <emaste@FreeBSD.org>
To:        src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-branches@FreeBSD.org
Subject:   git: 059b786b7db5 - stable/14 - openssh: Update to 9.9p2
Message-ID:  <202502201751.51KHpOIw062138@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch stable/14 has been updated by emaste:

URL: https://cgit.FreeBSD.org/src/commit/?id=059b786b7db55b776d82748842f4d6d89cb79664

commit 059b786b7db55b776d82748842f4d6d89cb79664
Author:     Ed Maste <emaste@FreeBSD.org>
AuthorDate: 2025-02-19 19:33:38 +0000
Commit:     Ed Maste <emaste@FreeBSD.org>
CommitDate: 2025-02-20 17:50:46 +0000

    openssh: Update to 9.9p2
    
    This release exists primarily to fix two security bugs.  The fixes have
    been independently imported into FreeBSD.  This import serves to update
    the ssh and sshd version number.
    
    A few minor bug fixes are also included; see the upstream release notes
    for full details of the 9.9p2 release
    (https://www.openssh.com/releasenotes.html).
    
    Sponsored by:   The FreeBSD Foundation
    
    (cherry picked from commit 0ae642c7dd0c2cfd965a22bf73876cd26cceadd2)
    
    Approved by:    re (accelerated MFC)
---
 crypto/openssh/.github/ci-status.md        |   10 +-
 crypto/openssh/ChangeLog                   | 2186 ++--------------------------
 crypto/openssh/README                      |    2 +-
 crypto/openssh/config.h                    |    3 -
 crypto/openssh/configure.ac                |    1 -
 crypto/openssh/contrib/redhat/openssh.spec |    2 +-
 crypto/openssh/contrib/suse/openssh.spec   |    2 +-
 crypto/openssh/defines.h                   |   26 +
 crypto/openssh/gss-serv.c                  |    1 +
 crypto/openssh/kexmlkem768x25519.c         |    5 +-
 crypto/openssh/libcrux_mlkem768_sha3.h     |    8 +-
 crypto/openssh/loginrec.c                  |    8 +-
 crypto/openssh/misc.c                      |   23 +-
 crypto/openssh/misc.h                      |    3 +-
 crypto/openssh/mlkem768.sh                 |   17 +-
 crypto/openssh/readconf.c                  |   28 +-
 crypto/openssh/servconf.c                  |   61 +-
 crypto/openssh/ssh_namespace.h             |    1 +
 crypto/openssh/version.h                   |    2 +-
 19 files changed, 289 insertions(+), 2100 deletions(-)

diff --git a/crypto/openssh/.github/ci-status.md b/crypto/openssh/.github/ci-status.md
index 4fa73894ce76..17fa97bdc309 100644
--- a/crypto/openssh/.github/ci-status.md
+++ b/crypto/openssh/.github/ci-status.md
@@ -6,10 +6,6 @@ master :
 [![Fuzzing Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/openssh.svg)](https://bugs.chromium.org/p/oss-fuzz/issues/list?sort=-opened&can=1&q=proj:openssh)
 [![Coverity Status](https://scan.coverity.com/projects/21341/badge.svg)](https://scan.coverity.com/projects/openssh-portable)
 
-9.8 :
-[![C/C++ CI](https://github.com/openssh/openssh-portable/actions/workflows/c-cpp.yml/badge.svg?branch=V_9_8)](https://github.com/openssh/openssh-portable/actions/workflows/c-cpp.yml?query=branch:V_9_8)
-[![C/C++ CI self-hosted](https://github.com/openssh/openssh-portable-selfhosted/actions/workflows/selfhosted.yml/badge.svg?branch=V_9_8)](https://github.com/openssh/openssh-portable-selfhosted/actions/workflows/selfhosted.yml?query=branch:V_9_8)
-
-9.7 :
-[![C/C++ CI](https://github.com/openssh/openssh-portable/actions/workflows/c-cpp.yml/badge.svg?branch=V_9_7)](https://github.com/openssh/openssh-portable/actions/workflows/c-cpp.yml?query=branch:V_9_7)
-[![C/C++ CI self-hosted](https://github.com/openssh/openssh-portable-selfhosted/actions/workflows/selfhosted.yml/badge.svg?branch=V_9_7)](https://github.com/openssh/openssh-portable-selfhosted/actions/workflows/selfhosted.yml?query=branch:V_9_7)
+9.9 :
+[![C/C++ CI](https://github.com/openssh/openssh-portable/actions/workflows/c-cpp.yml/badge.svg?branch=V_9_9)](https://github.com/openssh/openssh-portable/actions/workflows/c-cpp.yml?query=branch:V_9_9)
+[![C/C++ CI self-hosted](https://github.com/openssh/openssh-portable-selfhosted/actions/workflows/selfhosted.yml/badge.svg?branch=V_9_9)](https://github.com/openssh/openssh-portable-selfhosted/actions/workflows/selfhosted.yml?query=branch:V_9_9)
diff --git a/crypto/openssh/ChangeLog b/crypto/openssh/ChangeLog
index c085866f19f6..2ef1164e6cfb 100644
--- a/crypto/openssh/ChangeLog
+++ b/crypto/openssh/ChangeLog
@@ -1,3 +1,140 @@
+commit 6ebc4dd77a479892d5ca0cd2a567a651f70aad82
+Author: Damien Miller <djm@mindrot.org>
+Date:   Tue Feb 18 19:03:42 2025 +1100
+
+    openssh-9.9p2
+
+commit 38df39ecf278a7ab5794fb03c01286f2cfe82c0d
+Author: djm@openbsd.org <djm@openbsd.org>
+Date:   Tue Feb 18 08:02:48 2025 +0000
+
+    upstream: Fix cases where error codes were not correctly set
+    
+    Reported by the Qualys Security Advisory team. ok markus@
+    
+    OpenBSD-Commit-ID: 7bcd4ffe0fa1e27ff98d451fb9c22f5fae6e610d
+
+commit 5e07dee272c34e193362fba8eda0e3c453f3c773
+Author: djm@openbsd.org <djm@openbsd.org>
+Date:   Tue Feb 18 08:02:12 2025 +0000
+
+    upstream: Don't reply to PING in preauth phase or during KEX
+    
+    Reported by the Qualys Security Advisory team. ok markus@
+    
+    OpenBSD-Commit-ID: c656ac4abd1504389d1733d85152044b15830217
+
+commit fb071011fb843142282b8b8a69cbb15e9b0b9485
+Author: djm@openbsd.org <djm@openbsd.org>
+Date:   Mon Feb 10 23:00:29 2025 +0000
+
+    upstream: fix "Match invalid-user" from incorrectly being activated
+    
+    in initial configuration pass when no other predicates were present on the
+    match line
+    
+    OpenBSD-Commit-ID: 02703b4bd207fafd03788bc4e7774bf80be6c9a8
+
+commit 729a26a978dd39db60d4625bdfb5405baa629e59
+Author: Damien Miller <djm@mindrot.org>
+Date:   Wed Oct 30 14:25:14 2024 +1100
+
+    fix uint64_t types; reported by Tom G. Christensen
+
+commit 33c5f384ae03a5d1a0bd46ca0fac3c62e4eaf784
+Author: Damien Miller <djm@mindrot.org>
+Date:   Sun Oct 27 13:28:11 2024 +1100
+
+    htole64() etc for systems without endian.h
+
+commit fe8d28a7ebbaa35cfc04a21263627f05c237e460
+Author: djm@openbsd.org <djm@openbsd.org>
+Date:   Sun Oct 27 02:06:59 2024 +0000
+
+    upstream: explicitly include endian.h
+    
+    OpenBSD-Commit-ID: 13511fdef7535bdbc35b644c90090013da43a318
+
+commit 11f348196b3fb51c3d8d1f4f36db9d73f03149ed
+Author: djm@openbsd.org <djm@openbsd.org>
+Date:   Sun Oct 27 02:06:01 2024 +0000
+
+    upstream: fix ML-KEM768x25519 KEX on big-endian systems; spotted by
+    
+    jsg@ feedback/ok deraadt@
+    
+    OpenBSD-Commit-ID: 26d81a430811672bc762687166986cad40d28cc0
+
+commit 19bcb2d90c6caf14abf386b644fb24eb7afab889
+Author: djm@openbsd.org <djm@openbsd.org>
+Date:   Thu Sep 26 23:55:08 2024 +0000
+
+    upstream: fix previous change to ssh_config Match, which broken on
+    
+    negated Matches; spotted by phessler@ ok deraadt@
+    
+    OpenBSD-Commit-ID: b1c6acec66cd5bd1252feff1d02ad7129ced37c7
+
+commit 66878e12a207fa9746dee3e2bdcca29b704cf035
+Author: djm@openbsd.org <djm@openbsd.org>
+Date:   Wed Sep 25 01:24:04 2024 +0000
+
+    upstream: fix regression introduced when I switched the "Match"
+    
+    criteria tokeniser to a more shell-like one. Apparently the old tokeniser
+    (accidentally?) allowed "Match criteria=argument" as well as the "Match
+    criteria argument" syntax that we tested for.
+    
+    People were using this syntax so this adds back support for
+    "Match criteria=argument"
+    
+    bz3739 ok dtucker
+    
+    OpenBSD-Commit-ID: d1eebedb8c902002b75b75debfe1eeea1801f58a
+
+commit ff2cd1dd5711ff88efdf26662d6189d980439a1f
+Author: Damien Miller <djm@mindrot.org>
+Date:   Wed Sep 25 11:15:45 2024 +1000
+
+    gss-serv.c needs sys/param.h
+    
+    From Void Linux
+
+commit 2c12ae8cf9b0b7549ae097c4123abeda0ee63e5b
+Author: Damien Miller <djm@mindrot.org>
+Date:   Wed Sep 25 11:13:05 2024 +1000
+
+    build construct_utmp() when USE_BTMP is set
+    
+    Fixes compile error on Void Linux/Musl
+
+commit c7fda601186ff28128cfe3eab9c9c0622de096e1
+Author: Christoph Ostarek <christoph@zededa.com>
+Date:   Wed Jul 3 12:46:59 2024 +0200
+
+    fix utmpx ifdef
+    
+    02e16ad95fb1f56ab004b01a10aab89f7103c55d did a copy-paste for
+    utmpx, but forgot to change the ifdef appropriately
+
+commit 7cf4dc414de689c467e58e49fb83f6609c3ed36b
+Author: Darren Tucker <dtucker@dtucker.net>
+Date:   Mon Sep 23 20:54:26 2024 +1000
+
+    Remove non-9.9 branch statuses.
+
+commit 8513f4d30ae85d17b3b08da6bc3be76f8c73123c
+Author: Darren Tucker <dtucker@dtucker.net>
+Date:   Mon Sep 23 20:52:31 2024 +1000
+
+    Add 9.9 branch to CI status console.
+
+commit 53a80baaebda180f46e6e8571f3ff800e1f5c496
+Author: Damien Miller <djm@mindrot.org>
+Date:   Fri Sep 20 08:20:48 2024 +1000
+
+    autogenerated files for release
+
 commit 46d1fb16b20e971b9ac15e86a3d3e350b49c9ad6
 Author: Damien Miller <djm@mindrot.org>
 Date:   Fri Sep 20 08:20:13 2024 +1000
@@ -6625,2052 +6762,3 @@ Date:   Mon Feb 20 18:24:39 2023 +1100
     
     This fixes tests on platforms that do not have the openssl tool
     installed at all.
-
-commit 2a7e3449908571af601a4c2d12ab140096442e47
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Fri Feb 17 04:22:50 2023 +0000
-
-    upstream: Remove now-unused compat bit SSH_BUG_RSASIGMD5. The code
-    
-    to set this was removed in OpenSSH 7.7 when support for SSH implementations
-    dating back to before RFC standardization were removed.  "burn it all" djm@
-    
-    OpenBSD-Commit-ID: 6330935fbe23dd00be79891505e06d1ffdac7cda
-
-commit 0833ccf2c8b7ae08b296c06f17bd53e3ab94b0b0
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Fri Feb 17 03:06:18 2023 +0000
-
-    upstream: Remove now-unused compat bit SSH_BUG_BIGENDIANAES. This
-    
-    was previously set for OpenSSH 2.3 (released in 2000) but this check was
-    removed in OpenSSH 7.7 (2018).  ok djm@ deraadt@
-    
-    OpenBSD-Commit-ID: 326426ea328707fc9e83305291ab135c87f678af
-
-commit c81c2bea6e828d52b62b448b4ffdd3c163177975
-Author: Damien Miller <djm@mindrot.org>
-Date:   Fri Feb 17 10:12:40 2023 +1100
-
-    whitespace fixes
-
-commit 500f90b39db5f0014e6b0c49ff1f45c994b69293
-Author: Damien Miller <djm@mindrot.org>
-Date:   Fri Feb 17 10:02:08 2023 +1100
-
-    whitespace at EOL
-
-commit 68350152406339170721c15e97afdf827a5e4001
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Thu Feb 16 10:10:00 2023 +0000
-
-    upstream: Remove SSH_BUG_PASSWORDPAD compat bit
-    
-    since it's no longer used. ok markus@
-    
-    OpenBSD-Commit-ID: b92c21f56fe4b7f9a54790d6a9650725c226820b
-
-commit 537cccd804eaf65f32bdce037cc31db4e0ab0f44
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Thu Feb 16 07:55:15 2023 +0000
-
-    upstream: Remove SSH_BUG_IGNOREMSG compat flag
-    
-    since it's only applicable to SSH1 and thus no longer used.  ok markus@
-    "kill it with fire" djm@
-    
-    OpenBSD-Commit-ID: ea13318b1937795d9db4790d3ce0a6ed01584dab
-
-commit 285cf6cd4b91a0a0ce33193c358c99085af33e43
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date:   Fri Feb 10 06:41:53 2023 +0000
-
-    upstream: space between macro and punctuation; sort usage();
-    
-    OpenBSD-Commit-ID: 6141610cfca037700730e41f868d1d9124958f8c
-
-commit d39a96f70f81878c77336ed35f5c648c1804b71a
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date:   Fri Feb 10 06:40:48 2023 +0000
-
-    upstream: space between macro and punctuation;
-    
-    OpenBSD-Commit-ID: abc95e550be9e6d9a7ff64b65c104c7be21ab19e
-
-commit 16e82bf53fc34e43e3b948d43b68d5b27a7335e6
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date:   Fri Feb 10 06:39:27 2023 +0000
-
-    upstream: sort SYNOPSIS;
-    
-    OpenBSD-Commit-ID: dacd9da33277d5669a51213d880632599c890c1e
-
-commit d9685121ff6d57b8797411f3cb123884a4b96e30
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Sat Feb 11 12:32:19 2023 +1100
-
-    Improve seccomp compat on older systems.
-    
-    Check if flags to mmap and madvise are defined before using them.
-    Should fix problems building on older Linux systems that don't have
-    these.  bz#3537, with & ok djm@.
-
-commit 6180b0fa4f7996687678702806257e661fd5931e
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Fri Feb 10 05:06:03 2023 +0000
-
-    upstream: test -Ohashalg=... and that the default output contains both
-    
-    specified hash algorithms; prompted by dtucker@
-    
-    OpenBSD-Regress-ID: 26f309208c8d8b8fa9c5f419767b85f1e9b22f51
-
-commit d651f5c9fe37e61491eee46c49ba9fa03dbc0e6a
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Fri Feb 10 04:56:30 2023 +0000
-
-    upstream: let ssh-keygen and ssh-keyscan accept
-    
-    -Ohashalg=sha1|sha256 when outputting SSHFP fingerprints to allow algorithm
-    selection. bz3493 ok dtucker@
-    
-    OpenBSD-Commit-ID: e6e07fe21318a873bd877f333e189eb963a11b3d
-
-commit 18938d11a90b74d63c20b2d3c965d5bd64786ab1
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Fri Feb 10 04:47:19 2023 +0000
-
-    upstream: add a `sshd -G` option that parses and prints the
-    
-    effective configuration without attempting to load private keys and perform
-    other checks. This allows usage of the option before keys have been
-    generated.
-    
-    bz3460 feedback/ok dtucker@
-    
-    OpenBSD-Commit-ID: 774504f629023fc25a559ab1d95401adb3a7fb29
-
-commit df7d3dbf7194db8e97730ee0425d4d9d7bdb8b10
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Fri Feb 10 04:40:28 2023 +0000
-
-    upstream: make `ssh -Q CASignatureAlgorithms` work as the manpage says
-    
-    it should bz3532
-    
-    OpenBSD-Commit-ID: 0ddb17b3fcbd99bfb5baea4ac5e449620cbd3adc
-
-commit d3b8d4198b6595f23b5859d43dc8fc701f97429b
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Fri Feb 10 14:26:44 2023 +1100
-
-    Add CentOS 7 test targets.
-
-commit 22efb01e355bba4755b730ed417f91c081445bfc
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Thu Feb 9 09:55:33 2023 +0000
-
-    upstream: Test adding terminating newline to known_hosts.
-    
-    OpenBSD-Regress-ID: 5fc3010ac450195b3fbdeb68e875564968800365
-
-commit caec6da1a583ed8c32c6ad3b81bbcaab46ac8b61
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Wed Feb 8 08:06:03 2023 +0000
-
-    upstream: ssh-agent doesn't actually take -v,
-    
-    so the recently-added ones will result in the test not cleaning up
-    after itself.  Patch from cjwatson at debian.org vi bz#3536.
-    
-    OpenBSD-Regress-ID: 1fc8283568f5bf2f918517c2c1e778072cf61b1a
-
-commit 3c379c9a849a635cc7f05cbe49fe473ccf469ef9
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Thu Feb 9 09:54:11 2023 +0000
-
-    upstream: Ensure that there is a terminating newline when adding a new
-    
-    entry to known_hosts.  bz#3529, with git+openssh at limpsquid.nl, ok deraadt@
-    markus@
-    
-    OpenBSD-Commit-ID: fa8d90698da1886570512b96f051e266eac105e0
-
-commit 95b6bbd2553547260b324b39d602061c88b774bc
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Tue Feb 7 08:43:47 2023 +1100
-
-    Replace 9.1 with 9.2 on CI status page.
-
-commit 195313dfe10a23c82e9d56d5fdd2f59beee1bdcf
-Author: Damien Miller <djm@mindrot.org>
-Date:   Fri Feb 3 16:33:09 2023 +1100
-
-    harden Linux seccomp sandbox
-    
-    Linux mmap(2) and madvise(2) syscalls support quite a number of funky
-    flags that we don't expect that sshd/libc will ever need. We can
-    exclude this kernel attack surface by filtering the mmap(2) flags
-    and the madvise(2) advice arguments.
-    
-    Similarly, the sandboxed process in sshd is a single-threaded program
-    that does not use shared memory for synchronisation or communication.
-    Therefore, there should be no reason for the advanced priority
-    inheritance futex(2) operations to be necessary. These can also be
-    excluded.
-    
-    Motivated by Jann Horn pointing out that there have been kernel bugs
-    in nearby Linux kernel code, e.g. CVE-2020-29368, CVE-2020-29374 and
-    CVE-2022-42703.
-    
-    Feedback Jann Horn, ok dtucker@
-
-commit 6dfb65de949cdd0a5d198edee9a118f265924f33
-Author: Damien Miller <djm@mindrot.org>
-Date:   Thu Feb 2 23:21:54 2023 +1100
-
-    crank versions in RPM specs
-
-commit d07cfb11a0ca574eb68a3931d8c46fbe862a2021
-Author: Damien Miller <djm@mindrot.org>
-Date:   Thu Feb 2 23:21:45 2023 +1100
-
-    update version in README
-
-commit 9fe207565b4ab0fe5d1ac5bb85e39188d96fb214
-Author: Damien Miller <djm@mindrot.org>
-Date:   Thu Feb 2 23:17:49 2023 +1100
-
-    adapt compat_kex_proposal() test to portable
-
-commit 903c556b938fff2d7bff8da2cc460254430963c5
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Thu Feb 2 12:12:52 2023 +0000
-
-    upstream: test compat_kex_proposal(); by dtucker@
-    
-    OpenBSD-Regress-ID: 0e404ee264db546f9fdbf53390689ab5f8d38bf2
-
-commit 405fba71962dec8409c0c962408e09049e5624b5
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Thu Jan 19 07:53:45 2023 +0000
-
-    upstream: Check if we can copy sshd or need to use sudo to do so
-    
-    during reexec test. Skip test if neither can work.  Patch from anton@, tweaks
-    from me.
-    
-    OpenBSD-Regress-ID: 731b96ae74d02d5744e1f1a8e51d09877ffd9b6d
-
-commit b2a2a8f69fd7737ea17dc044353c514f2f962f35
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Thu Feb 2 12:10:22 2023 +0000
-
-    upstream: openssh-9.2
-    
-    OpenBSD-Commit-ID: f7389f32413c74d6e2055f05cf65e7082de03923
-
-commit 12da7823336434a403f25c7cc0c2c6aed0737a35
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Thu Feb 2 12:10:05 2023 +0000
-
-    upstream: fix double-free caused by compat_kex_proposal(); bz3522
-    
-    by dtucker@, ok me
-    
-    OpenBSD-Commit-ID: 2bfc37cd2d41f67dad64c17a64cf2cd3806a5c80
-
-commit 79efd95ab5ff99f4cb3a955e2d713b3f54fb807e
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Wed Feb 1 17:17:26 2023 +1100
-
-    Skip connection-timeout test on minix3.
-    
-    Minix 3's Unix domain sockets don't seem to work the way we expect, so
-    skip connection-timeout test on that platform.  While there, group
-    together all similarly skipped tests and explicitly comment.
-
-commit 6b508c4e039619842bcf5a16f8a6b08dd6bec44a
-Author: Damien Miller <djm@mindrot.org>
-Date:   Wed Feb 1 12:12:05 2023 +1100
-
-    fix libfido2 detection without pkg-config
-    
-    Place libfido2 before additional libraries (that it may depend upon)
-    and not after. bz3530 from James Zhang; ok dtucker@
-
-commit 358e300fed5e6def233a2c06326e51e20ebed621
-Author: deraadt@openbsd.org <deraadt@openbsd.org>
-Date:   Wed Jan 18 20:56:36 2023 +0000
-
-    upstream: delete useless dependency
-    
-    OpenBSD-Commit-ID: e1dc11143f83082e3154d6094f9136d0dc2637ad
-
-commit a4cb9be1b021b511e281ee55c356f964487d9e82
-Author: deraadt@openbsd.org <deraadt@openbsd.org>
-Date:   Wed Jan 18 20:43:15 2023 +0000
-
-    upstream: Create and install sshd random relink kit.
-    
-    ../Makefile.inc and Makfile are concatenated for reuse, which hopefully won't
-    be too fragile, we'll see if we need a different approach. The resulting sshd
-    binary is tested with the new sshd -V option before installation.  As the
-    binary layout is now semi-unknown (meaning relative, fixed, and gadget
-    offsets are not precisely known), change the filesystem permissions to 511 to
-    prevent what I call "logged in BROP". I have ideas for improving this further
-    but this is a first step ok djm
-    
-    OpenBSD-Commit-ID: 1e0a2692b7e20b126dda60bf04999d1d30d959d8
-
-commit bc7de6f91a9a0ae2f148a9d31a4027d441a51999
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date:   Wed Jan 18 06:55:32 2023 +0000
-
-    upstream: tweak previous; ok djm
-    
-    OpenBSD-Commit-ID: df71ce4180c58202dfdc1d92626cfe900b91b7c3
-
-commit a20b7e999773e6333c8aa9b0a7fa41966e63b037
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Tue Jan 31 19:35:44 2023 +1100
-
-    Skip connection-timeout test under Valgrind.
-    
-    Valgrind slows things down so much that the timeout test fails.  Skip
-    this test until we figure out if we can make it work.
-
-commit c3ffb54b4fc5e608206037921db6ccbc2f5ab25f
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Wed Jan 25 21:58:40 2023 +1100
-
-    Skip connection-timeout when missing FD passing.
-    
-    This tests uses multiplexing which uses file descriptor passing, so
-    skip it if we don't have that.  Fixes test failures on Cygwin.
-
-commit 35253af01d8c0ab444c8377402121816e71c71f5
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Wed Jan 18 02:00:10 2023 +0000
-
-    upstream: when restoring non-blocking mode to stdio fds, restore
-    
-    exactly the flags that ssh started with and don't just clobber them with
-    zero, as this could also remove the append flag from the set;
-    
-    bz3523; ok dtucker@
-    
-    OpenBSD-Commit-ID: 1336b03e881db7564a4b66014eb24c5230e9a0c0
-
-commit 7d17ea151c0b2519f023bd9cc7f141128833ac47
-Author: millert@openbsd.org <millert@openbsd.org>
-Date:   Wed Jan 18 01:50:21 2023 +0000
-
-    upstream: Add a -V (version) option to sshd like the ssh client
-    
-    has. OK markus@ deraadt@
-    
-    OpenBSD-Commit-ID: abe990ec3e636fb040132aab8cbbede98f0c413e
-
-commit 62360feb7f08f2a4c6fc36f3b3449309203c42c9
-Author: millert@openbsd.org <millert@openbsd.org>
-Date:   Tue Jan 17 18:52:44 2023 +0000
-
-    upstream: For "ssh -V" always exit 0, there is no need to check opt
-    
-    again. This was missed when the fallthrough in the switch case above it was
-    removed.  OK deraadt@
-    
-    OpenBSD-Commit-ID: 5583e5d8f6d62a8a4215cfa95a69932f344c8120
-
-commit 12492c0abf1eb415d08a897cc1d8b9e789888230
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Tue Jan 17 10:15:10 2023 +0000
-
-    upstream: also check that an active session inhibits
-    
-    UnusedConnectionTimeout idea markus@
-    
-    OpenBSD-Regress-ID: 55c0fb61f3bf9e092b0a53f9041d3d2012f14003
-
-commit cef2593c33ac46a58238ff998818754eabdf64ff
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Tue Jan 17 10:02:34 2023 +0000
-
-    upstream: regression test for UnusedConnectionTimeout
-    
-    OpenBSD-Regress-ID: 7f29001374a68e71e5e078f69e4520cf4bcca084
-
-commit aff9493a89c71d6a080419b49ac64eead9730491
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Mon Jan 16 04:11:29 2023 +0000
-
-    upstream: unbreak test: cannot access shell positional parameters
-    
-    past $9 without wrapping the position in braces (i.e. need ${10}, etc.)
-    
-    OpenBSD-Regress-ID: 3750ec98d5d409ce6a93406fedde6f220d2ea2ac
-
-commit 0293c19807f83141cdf33b443154459f9ee471f6
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Tue Jan 17 09:44:48 2023 +0000
-
-    upstream: Add a sshd_config UnusedConnectionTimeout option to terminate
-    
-    client connections that have no open channels for some length of time. This
-    complements the recently-added ChannelTimeout option that terminates inactive
-    channels after a timeout.
-    
-    ok markus@
-    
-    OpenBSD-Commit-ID: ca983be74c0350364c11f8ba3bd692f6f24f5da9
-
-commit 8ec2e3123802d2beeca06c1644b0b647f6d36dab
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Sun Jan 15 23:35:10 2023 +0000
-
-    upstream: adapt to ed25519 changes in src/usr.bin/ssh
-    
-    OpenBSD-Regress-ID: 4b3e7ba7ee486ae8a0b4790f8112eded2bb7dcd5
-
-commit 9fbbfeca1ce4c7ec0001c827bbf4189a3ba0964b
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Sun Jan 15 23:05:32 2023 +0000
-
-    upstream: update OpenSSH's Ed25519 code to the last version of SUPERCOP
-    
-    (20221122) and change the import approach to the same one we use for
-    Streamlined NTRUPrime: use a shell script to extract the bits we need from
-    SUPERCOP, make some minor adjustments and squish them all into a single file.
-    
-    ok tb@ tobhe@
-    
-    OpenBSD-Commit-ID: 1bc0fd624cb6af440905b8ba74ac7c03311b8e3b
-
-commit 6283f4bd83eee714d0f5fc55802eff836b06fea8
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Sat Jan 14 22:02:44 2023 +1100
-
-    Allow writev is seccomp sandbox.
-    
-    This seems to be used by recent glibcs at least in some configurations.
-    From bz#3512, ok djm@
-
-commit 923c3f437f439cfca238fba37e97a7041782f615
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Sat Jan 14 10:05:54 2023 +0000
-
-    upstream: Shell syntax fix. From ren mingshuai vi github PR#369.
-    
-    OpenBSD-Regress-ID: 6696b2eeefe128099fc3d7ea9f23252cc35156f9
-
-commit 4d87a00f704e0365e11c3c38b170c1275ec461fc
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Sat Jan 14 09:57:08 2023 +0000
-
-    upstream: Instead of skipping the all-tokens test if we don't have
-    
-    OpenSSL (since we use it to compute the hash), put the hash at the end and
-    just omit it if we don't have it.  Prompted by bz#3521.
-    
-    OpenBSD-Regress-ID: c79ecba64250ed3b6417294b6c965e6b12ca5eea
-
-commit b05406d6f93b8c8ec11ec8b27e7c76cc7a5a55fb
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date:   Fri Jan 13 07:13:40 2023 +0000
-
-    upstream: fix double phrase in previous;
-    
-    OpenBSD-Commit-ID: 671e6c8dc5e9230518b2bbfa143daaa88adc66c2
-
-commit 40564812b659c530eb1f4b62d09e85612aef3107
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Fri Jan 13 03:16:29 2023 +0000
-
-    upstream: Document "UserKnownHostsFile none". ok djm@
-    
-    OpenBSD-Commit-ID: f695742d39e34ecdcc3c861c3739a84648a4bce5
-
-commit d03e245e034019a37388f6f5f893ce848ab6d2e2
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Fri Jan 13 23:02:34 2023 +1100
-
-    Retry package installation 3 times.
-    
-    When setting up the CI environment, retry package installation 3 times
-    before going up.  Should help prevent spurious failures during
-    infrastructure issues.
-
-commit 625f6bc39840167dafb3bf5b6a3e18503ac986e8
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Fri Jan 13 04:47:34 2023 +0000
-
-    upstream: Move scp path setting to a helper function. The previous
-    
-    commit to add scp to the test sshd's path causes the t-envpass test to fail
-    when the test scp is given using a fully qualified path.  Put this in a
-    helper function and only call it from the scp tests.
-    
-    OpenBSD-Regress-ID: 7533dc1c4265c1de716abb062957994195b36df4
-
-commit 6e6f88647042b3cde54a628545c2f5fb656a9327
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Fri Jan 13 04:23:00 2023 +0000
-
-    upstream: Add scp's path to test sshd's PATH.
-    
-    If the scp we're testing is fully qualified (eg it's not in the system
-    PATH) then add its path to the under-test sshd's PATH so we can find
-    it. Prompted by bz#3518.
-    
-    OpenBSD-Regress-ID: 7df4f5a0be3aa135495b7e5a6719d3cbc26cc4c0
-
-commit 8a5e99a70fcf9b022a8aa175ebf6a71f58511da3
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Fri Jan 13 15:49:48 2023 +1100
-
-    Remove skipping test when scp not in path.
-    
-    An upcoming change renders this obsolete by adding scp's path to the
-    test sshd's PATH, and removing this first will make the subsequent sync
-    easier.
-
-commit 41f36dd896c8fb8337d403fcf476762986976e9d
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Fri Jan 13 02:58:20 2023 +0000
-
-    upstream: Add a "Host" line to the output of ssh -G showing the
-    
-    original host arg. Inspired by patch from vincent at bernat.ch via bz#3343,
-    ok djm@
-    
-    OpenBSD-Commit-ID: 59c0f60a222113a44d0650cd394376e3beecc883
-
-commit f673b49f3be3eb51074fbb8a405beb6cd0f7d93e
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Fri Jan 13 02:44:02 2023 +0000
-
-    upstream: avoid printf("%s", NULL) if using ssh
-    
-    -oUserKnownHostsFile=none and a hostkey in one of the system known hosts file
-    changes; ok dtucker@
-    
-    OpenBSD-Commit-ID: 7ca87614bfc6da491315536a7f2301434a9fe614
-
-commit 93fc7c576563e3d88a1dc019dd213f65607784cc
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Wed Jan 11 05:39:38 2023 +0000
-
-    upstream: clamp the minimum buffer lengths and number of inflight
-    
-    requests too
-    
-    OpenBSD-Commit-ID: c4965f62fa0ba850940fd66ae3f60cf516bbcd56
-
-commit 48bf234322e639d279c5a28435eae50155e9b514
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Wed Jan 11 05:36:50 2023 +0000
-
-    upstream: ignore bogus upload/download buffer lengths in the limits
-    
-    extension
-    
-    OpenBSD-Commit-ID: c5b023e0954693ba9a5376e4280c739b5db575f8
-
-commit 36b00d31833ca74cb0f7c7d8eda1bde55700f929
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Wed Jan 11 02:13:52 2023 +0000
-
-    upstream: remove whitespace at EOL from code extracted from SUPERCOP
-    
-    OpenBSD-Commit-ID: 1ec524ff2fbb9387d731601437c82008f35a60f4
-
-commit d888de06c5e4d7dbf2f2b85f2b5bf028c570cf78
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Wed Jan 11 00:51:27 2023 +0000
-
-    upstream: rewrite this test to use a multiplexed ssh session so we can
-    
-    control its lifecycle without risk of race conditions; fixes some of the
-    Github integration tests for openssh-portable
-    
-    OpenBSD-Regress-ID: 5451cad59ba0d43ae9eeda48ec80f54405fee969
-
-commit 4bcc737a35fdd9cc4af7423d6c23dfd0c7ef4786
-Author: Damien Miller <djm@mindrot.org>
-Date:   Wed Jan 11 11:45:17 2023 +1100
-
-    remove buffer len workaround for NetBSD 4.x
-    
-    Switching to from pipes to a socketpair for communicating with the
-    ssh process avoids the (kernel bug?) problem.
-
-commit f5154d2aac3e6a32a1b13dec23a701a087850cdc
-Author: Damien Miller <djm@mindrot.org>
-Date:   Wed Jan 11 11:44:19 2023 +1100
-
-    add back use of pipes in scp.c under USE_PIPES
-    
-    This matches sftp.c which prefers socketpair but uses pipes on
-    some older platforms.
-
-commit eec737b59cf13841de46134967a206607000acd4
-Author: millert@openbsd.org <millert@openbsd.org>
-Date:   Tue Jan 10 23:22:15 2023 +0000
-
-    upstream: Switch scp from using pipes to a socketpair for
-    
-    communication with it's ssh sub-processes.  We no longer need to reserve two
-    descriptors to ensure that we don't end up using fd 0-2 unexpectedly, that is
-    handled by sanitise_stdfd() in main(). Based on an original diff from djm@.
-    OK deraadt@ djm@
-    
-    OpenBSD-Commit-ID: b80c372faac462471e955ddeab9480d668a2e48d
-
-commit d213d126a4a343abd3a1eb13687d39c1891fe5c8
-Author: jmc@openbsd.org <jmc@openbsd.org>
-Date:   Fri Jan 6 08:44:11 2023 +0000
-
-    upstream: tweak previous; ok djm
-    
-    OpenBSD-Commit-ID: 229c493452766d70a78b0f02f6ff9894f9028858
-
-commit 4a5590a5ee47b7dfd49773e9fdba48ad3089fe64
-Author: Damien Miller <djm@mindrot.org>
-Date:   Mon Jan 9 16:33:56 2023 +1100
-
-    try to improve logging for dynamic-forward test
-    
-    previously the logs from the ssh used to exercise the forwarding
-    channel would clobber the logs from the ssh actually doing the
-    forwarding
-
-commit 715bc25dcfccf9fb2bee820155fe071d01a618db
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Sat Jan 7 23:24:50 2023 +1100
-
-    Skip dynamic-forward test on minix3.
-    
-    This test relies on loopback addresses which minix does not have.
-    Previously the test would not run at all since it also doesn't have
-    netcat, but now we use our own netcat it tries and fails.
-
-commit dd1249bd5c45128a908395c61b26996a70f82205
-Author: Damien Miller <djm@mindrot.org>
-Date:   Sun Jan 8 12:08:59 2023 +1100
-
-    don't test IPv6 addresses if platform lacks support
-
-commit d77fc611a62f2dfee0b654c31a50a814b13310dd
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Fri Jan 6 12:33:33 2023 +0000
-
-    upstream: When OpenSSL is not available, skip parts of percent test
-    
-    that require it. Based on github pr#368 from ren mingshuai.
-    
-    OpenBSD-Regress-ID: 49a375b2cf61ccb95b52e75e2e025cd10988ebb2
-
-commit 1cd2aac312af9172f1b5cb06c2e1cd090abb83cf
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Sat Jan 7 23:01:11 2023 +1100
-
-    Use our own netcat for dynamic-forward test.
-    
-    That way we can be surer about its behaviour rather than trying to
-    second-guess the behaviour of various netcat implementations.
-
-commit 26cab41c05d7b0859d2a1ea5b6ed253d91848a80
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Sat Jan 7 14:30:43 2023 +1100
-
-    Use autoconf to find openssl binary.
-    
-    It's possible to install an OpenSSL in a path not in the system's
-    default library search path.  OpenSSH can still use this (eg if you
-    specify an rpath) but the openssl binary there may not work.  If one is
-    available on the system path just use that.
-
-commit 5532e010a0eeb6aa264396514f9aed7948471538
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Sat Jan 7 10:34:18 2023 +1100
-
-    Check openssl_bin path is executable before using.
-
-commit 5d7b16cff48598d5908db970bfdc9ff9326142c8
-Author: Darren Tucker <dtucker@dtucker.net>
-Date:   Fri Jan 6 23:19:07 2023 +1100
-
-    Set OPENSSL_BIN from OpenSSL directory.
-
-commit 344a0e8240eaf08da5d46a5e3a9ecad6e4f64c35
-Author: dtucker@openbsd.org <dtucker@openbsd.org>
-Date:   Fri Jan 6 08:50:33 2023 +0000
-
-    upstream: Save debug logs from ssh for debugging purposes.
-    
-    OpenBSD-Regress-ID: 109e40b06de1c006a3b8e0d8745b790b2c5870a0
-
-commit e1ef172646f7f49c80807eea90225ef5e0be55a8
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Fri Jan 6 08:07:39 2023 +0000
-
-    upstream: regression test for ChannelTimeout
-    
-    OpenBSD-Regress-ID: 280bfbefcfa415428ad744e43f69a8dede8ad685
-
-commit 2393ea8daf25853459eb07a528d7577688847777
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Fri Jan 6 07:18:18 2023 +0000
-
-    upstream: fix typo in verbose logging
-    
-    OpenBSD-Regress-ID: 0497cdb66e003b2f50ed77291a9104fba2e017e9
-
-commit 161a5378a3cc2e7aa3f9674cb7f4686ae6ce9586
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Fri Jan 6 02:59:50 2023 +0000
-
-    upstream: unit tests for misc.c:ptimeout_* API
-    
-    OpenBSD-Regress-ID: 01f8fb12d08e5aaadd4bd4e71f456b6588be9a94
-
-commit 018d671d78145f03d6f07ae9d64d51321da70325
-Author: tb@openbsd.org <tb@openbsd.org>
-Date:   Wed Jan 4 22:48:57 2023 +0000
-
-    upstream: Copy bytes from the_banana[] rather than banana()
-    
-    Fixes test failure due to segfault seen on arm64 with xonly snap.
-    
-    ok djm
-    
-    OpenBSD-Regress-ID: 86e2aa4bbd1dff1bc4ebb2969c0d6474485be046
-
-commit ab6bb69e251faa8b24f81b25c72ec0120f20cad4
-Author: Damien Miller <djm@mindrot.org>
-Date:   Fri Jan 6 19:13:36 2023 +1100
-
-    unbreak scp on NetBSD 4.x
-    
-    e555d5cad5 effectively increased the default copy buffer size for SFTP
-    transfers. This caused NetBSD 4.x to hang during the "copy local file to
-    remote file in place" scp.sh regression test.
-    
-    This puts back the original 32KB copy buffer size until we can properly
-    figure out why.
-    
-    lots of debugging assistance from dtucker@
-
-commit 2d1ff2b9431393ad99ef496d5e3b9dd0d4f5ac8c
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Fri Jan 6 02:47:18 2023 +0000
-
-    upstream: Implement channel inactivity timeouts
-    
-    This adds a sshd_config ChannelTimeouts directive that allows channels that
-    have not seen traffic in a configurable interval to be automatically closed.
-    Different timeouts may be applied to session, X11, agent and TCP forwarding
-    channels.
-    
-    Note: this only affects channels over an opened SSH connection and not
-    the connection itself. Most clients close the connection when their channels
-    go away, with a notable exception being ssh(1) in multiplexing mode.
-    
-    ok markus dtucker
-    
-    OpenBSD-Commit-ID: ae8bba3ed9d9f95ff2e2dc8dcadfa36b48e6c0b8
-
-commit 0e34348d0bc0b1522f75d6212a53d6d1d1367980
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Fri Jan 6 02:42:34 2023 +0000
-
-    upstream: Add channel_set_xtype()
-    
-    This sets an "extended" channel type after channel creation (e.g.
-    "session:subsystem:sftp") that will be used for setting channel inactivity
-    timeouts.
-    
-    ok markus dtucker
-    
-    OpenBSD-Commit-ID: 42564aa92345045b4a74300528f960416a15d4ca
-
-commit ceedf09b2977f3a756c759a6e7eb8f8e9db86a18
-Author: djm@openbsd.org <djm@openbsd.org>
-Date:   Fri Jan 6 02:41:49 2023 +0000
*** 1820 LINES SKIPPED ***



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202502201751.51KHpOIw062138>