| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
| |
Approved by: so
Security: CVE-2017-3737
Security: CVE-2017-3738
Security: FreeBSD-SA-17:12.openssl
|
|
|
|
|
| |
Security: FreeBSD-SA-17:11
Approved by: so
|
|
|
|
|
|
|
|
| |
Fix VNET kernel panic with asynchronous I/O. [EN-17:07]
Fix pf(4) housekeeping thread causes kernel panic. [EN-17:08]
Approved by: so
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CVE-2017-11103.
In _krb5_extract_ticket() the KDC-REP service name must be obtained
from encrypted version stored in 'enc_part' instead of the unencrypted
version stored in 'ticket'. Use of the unecrypted version provides an
opportunity for successful server impersonation and other attacks.
Submitted by: hrs
Obtained from: Heimdal
Security: FreeBSD-SA-17:05.heimdal
Security: CVE-2017-11103
Approved by: re (kib)
|
|
|
|
|
|
|
|
|
|
|
|
| |
Adjust notification points slightly to catch all auth failures, rather
than just the ones caused by bad usernames. Modify notification point
for bad usernames to send new type of BLACKLIST_BAD_USER. (Support in
libblacklist will be forthcoming soon.) Add guards to allow library
headers to expose the enum of action values.
Reviewed by: des
Relnotes: yes
Sponsored by: The FreeBSD Foundation
|
|
|
|
|
|
|
|
| |
Upstream commit r21331 (7758a5d0) added semiprivate function
_hx509_request_to_pkcs10 twice. This change has been committed upstream
as 8ef0071d.
Sponsored by: The FreeBSD Foundation
|
|
|
|
|
|
|
|
| |
Upstream commit r24759 (efed563) prefixed some symbols with rk_, but
introduced 6 duplicate symbols in the version script (because the
rk_-prefixed versions of the symbols were already present).
Sponsored by: The FreeBSD Foundation
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Only notify blacklistd for successful logins in auth.c
Before this change, every pass through auth.c resulted in a
call to blacklist_notify().
In a normal remote login, there would be a failed login flagged for
the printing of the "xxx login:" prompt, before the remote user
could enter a password.
If the user successfully entered a good password, then a good login
would be flagged, and everything would be OK.
If the user entered an incorrect password, there would be another
failed login flagged in auth1.c (or auth2.c) for the actual bad
password attempt. Finally, when sshd got around to issuing the
second "xxx login:" prompt, there would be yet another failed login
notice sent to blacklistd.
So, if there was a 3 bad logins limit set (the default), the system
would actually block the address after the first bad password attempt.
Reported by: Rick Adams
Reviewed by: des
Sponsored by: The FreeBSD Foundation
|
|
|
|
|
|
|
|
|
|
| |
Conditionalize building libwrap support into sshd
Only build libwrap support into sshd if MK_TCP_WRAPPERS != no
This will unbreak the build if libwrap has been removed from the system
PR: 210141
|
|
|
|
| |
Merge OpenSSL 1.0.2k.
|
|
|
|
|
|
|
| |
Fix multiple OpenSSH vulnerabilities.
Submitted by: des
Approved by: so
|
|
|
|
|
|
| |
Fix OpenSSH remote Denial of Service vulnerability.
Security: CVE-2016-8858
|
|
|
|
| |
Merge OpenSSL 1.0.2j.
|
|
|
|
| |
Merge OpenSSL 1.0.2u.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Change the calls to of blacklist_init() and blacklist_notify to be
macros defined in the blacklist_client.h file. This avoids
the need for #ifdef USE_BLACKLIST / #endif except in the
blacklist.c file.
Remove redundent initialization attempts from within
blacklist_notify - everything always goes through
blacklistd_init().
Added UseBlacklist option to sshd, which defaults to off.
To enable the functionality, use '-o UseBlacklist=yes' on
the command line, or uncomment in the sshd_config file.
Approved by: des
Sponsored by: The FreeBSD Foundation
|
|
|
|
| |
Build OpenSSL assembly sources for arm.
|
|
|
|
|
| |
PR: 208254
Approved by: re (kib)
|
|
|
|
|
|
| |
PR: 208254
Approved by: re (gjb)
Relnotes: yes
|
|
|
|
|
|
|
|
|
|
| |
This change has functional impact, and other concerns raised
by the OpenSSH maintainer.
Requested by: des
PR: 210479 (related)
Approved by: re (marius)
Sponsored by: The FreeBSD Foundation
|
|
|
|
|
|
|
|
| |
Reviewed by: rpaulo
Approved by: rpaulo (earlier version of changes)
Relnotes: YES
Sponsored by: The FreeBSD Foundation
Differential Revision: https://reviews.freebsd.org/D5915
|
|
|
|
|
|
|
|
| |
Some consumers actually use this definition.
We probably need some procedure to ensure that SHLIB_VERSION_NUMBER
is updated whenever we change the library version in
secure/lib/libssl/Makefile.
|
|
|
|
|
|
|
|
|
|
|
| |
If krb5_make_principal fails, tmp_creds.server may remain a pointer to freed
memory and then be double-freed. After freeing it the first time, initialize
it to NULL, which causes subsequent krb5_free_principal calls to do the right
thing.
Reported by: Coverity
CID: 1273430
Sponsored by: EMC / Isilon Storage Division
|
|\
| |
| |
| | |
Relnotes: yes
|
| | |
|
| |
| |
| |
| | |
PR: 207679
|
|\ \ |
|
|\ \ \
| | |/
| |/|
| | | |
Relnotes: yes
|
| | | |
|
| | | |
|
|\ \ \
| |/ /
| | |
| | | |
Relnotes: yes
|
| | | |
|
| | | |
|
| | | |
|
| | |
| | |
| | |
| | | |
(should have done this in r291198, but didn't think of it until now)
|
| | | |
|
| | | |
|
| | | |
|
| | |
| | |
| | |
| | | |
Noticed by: glebius
|
| | |
| | |
| | |
| | | |
environment that has OpenSSL from ports in addition to the base version.
|
| | |
| | |
| | |
| | | |
modifications, and add them to two files in which we do.
|
| | |
| | |
| | |
| | |
| | | |
they are never regenerated to reflect our changes) or in the way of
freebsd-configure.sh.
|
| | | |
|
|\ \ \
| | |/
| |/| |
|
| | |
| | |
| | |
| | |
| | | |
existing configurations that use them. Note that there is no functional
difference between OpenSSH with HPN and OpenSSH without HPN.
|
|\ \ \
| |/ / |
|
| | |
| | |
| | |
| | | |
autoheader and autoconf to avoid having to patch configure manually.
|
|\ \ \
| |/ /
| | |
| | |
| | |
| | | |
upstream) and a number of security fixes which we had already backported.
MFC after: 1 week
|
| | | |
|
| | |
| | |
| | |
| | | |
and {ssh,sshd}_config.
|
| | | |
|