summaryrefslogtreecommitdiffstats
path: root/crypto
Commit message (Collapse)AuthorAgeFilesLines
* Merge remote-tracking branch 'origin/releng/11.1' into RELENG_2_4Renato Botelho2017-12-112-9/+8
|\
| * Fix multiple OpenSSL vulnerabilities.gordon2017-12-092-9/+8
| | | | | | | | | | | | | | Approved by: so Security: CVE-2017-3737 Security: CVE-2017-3738 Security: FreeBSD-SA-17:12.openssl
| * Fix multiple vulnerabilities of OpenSSL.delphij2017-11-292-6/+16
| | | | | | | | | | Security: FreeBSD-SA-17:11 Approved by: so
* | MFC: r325328jkim2017-11-13133-348/+1576
| | | | | | | | | | | | Merge OpenSSL 1.0.2m. (cherry picked from commit a88f0513c4cf81f98bab740e4f112f1a6d7f4d42)
* | MFC: r318899jkim2017-11-13126-742/+1415
|/ | | | | | Merge OpenSSL 1.0.2l. (cherry picked from commit ffd1bb8c599181e0733f8e00d8d8198b4ea6a73b)
* Fix OpenSSH Denial of Service vulnerability. [SA-17:06]releng/11.1delphij2017-08-101-0/+5
| | | | | | | | Fix VNET kernel panic with asynchronous I/O. [EN-17:07] Fix pf(4) housekeeping thread causes kernel panic. [EN-17:08] Approved by: so
* MFS r320907: MFC r320906: MFV r320905: Import upstream fix fordelphij2017-07-121-2/+2
| | | | | | | | | | | | | | | CVE-2017-11103. In _krb5_extract_ticket() the KDC-REP service name must be obtained from encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unecrypted version provides an opportunity for successful server impersonation and other attacks. Submitted by: hrs Obtained from: Heimdal Security: FreeBSD-SA-17:05.heimdal Security: CVE-2017-11103 Approved by: re (kib)
* MFC r318242: Refine and update blacklist support in sshdlidl2017-05-178-16/+23
| | | | | | | | | | | | Adjust notification points slightly to catch all auth failures, rather than just the ones caused by bad usernames. Modify notification point for bad usernames to send new type of BLACKLIST_BAD_USER. (Support in libblacklist will be forthcoming soon.) Add guards to allow library headers to expose the enum of action values. Reviewed by: des Relnotes: yes Sponsored by: The FreeBSD Foundation
* MFC r304624: Remove duplicate symbol from libhx509 version-script.mapemaste2017-04-031-1/+0
| | | | | | | | Upstream commit r21331 (7758a5d0) added semiprivate function _hx509_request_to_pkcs10 twice. This change has been committed upstream as 8ef0071d. Sponsored by: The FreeBSD Foundation
* MFC r303156: Remove duplicate symbols from libroken version-script.mapemaste2017-04-031-6/+0
| | | | | | | | Upstream commit r24759 (efed563) prefixed some symbols with rk_, but introduced 6 duplicate symbols in the version script (because the rk_-prefixed versions of the symbols were already present). Sponsored by: The FreeBSD Foundation
* MFC r313965:lidl2017-02-221-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | Only notify blacklistd for successful logins in auth.c Before this change, every pass through auth.c resulted in a call to blacklist_notify(). In a normal remote login, there would be a failed login flagged for the printing of the "xxx login:" prompt, before the remote user could enter a password. If the user successfully entered a good password, then a good login would be flagged, and everything would be OK. If the user entered an incorrect password, there would be another failed login flagged in auth1.c (or auth2.c) for the actual bad password attempt. Finally, when sshd got around to issuing the second "xxx login:" prompt, there would be yet another failed login notice sent to blacklistd. So, if there was a 3 bad logins limit set (the default), the system would actually block the address after the first bad password attempt. Reported by: Rick Adams Reviewed by: des Sponsored by: The FreeBSD Foundation
* MFC r311585:ngie2017-02-041-1/+1
| | | | | | | | | | Conditionalize building libwrap support into sshd Only build libwrap support into sshd if MK_TCP_WRAPPERS != no This will unbreak the build if libwrap has been removed from the system PR: 210141
* MFC: r312825jkim2017-01-26100-634/+836
| | | | Merge OpenSSL 1.0.2k.
* MFC r311914: MFV r311913:delphij2017-01-118-15/+55
| | | | | | | Fix multiple OpenSSH vulnerabilities. Submitted by: des Approved by: so
* MFC r308197: MFV r308196:delphij2016-11-021-0/+1
| | | | | | Fix OpenSSH remote Denial of Service vulnerability. Security: CVE-2016-8858
* MFC: r306342jkim2016-09-268-8/+26
| | | | Merge OpenSSL 1.0.2j.
* MFC: r306193jkim2016-09-22222-1347/+3936
| | | | Merge OpenSSL 1.0.2u.
* MFC r305065: Add refactored blacklist support to sshdlidl2016-09-0612-1/+195
| | | | | | | | | | | | | | | | | | Change the calls to of blacklist_init() and blacklist_notify to be macros defined in the blacklist_client.h file. This avoids the need for #ifdef USE_BLACKLIST / #endif except in the blacklist.c file. Remove redundent initialization attempts from within blacklist_notify - everything always goes through blacklistd_init(). Added UseBlacklist option to sshd, which defaults to off. To enable the functionality, use '-o UseBlacklist=yes' on the command line, or uncomment in the sshd_config file. Approved by: des Sponsored by: The FreeBSD Foundation
* MFC: r304636jkim2016-08-312-3/+3
| | | | Build OpenSSL assembly sources for arm.
* MFH (r303832): check whether each key file exists before adding itdes2016-08-111-10/+15
| | | | | PR: 208254 Approved by: re (kib)
* MFH (r303716, r303719): drop SSH1 support, disable DSA by defaultdes2016-08-057-40/+19
| | | | | | PR: 208254 Approved by: re (gjb) Relnotes: yes
* Revert r301551, which added blacklistd(8) to sshd(8).gjb2016-06-248-145/+0
| | | | | | | | | | This change has functional impact, and other concerns raised by the OpenSSH maintainer. Requested by: des PR: 210479 (related) Approved by: re (marius) Sponsored by: The FreeBSD Foundation
* Add blacklist support to sshdlidl2016-06-078-0/+145
| | | | | | | | Reviewed by: rpaulo Approved by: rpaulo (earlier version of changes) Relnotes: YES Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D5915
* openssl: change SHLIB_VERSION_NUMBER to reflect the realityavg2016-06-031-1/+1
| | | | | | | | Some consumers actually use this definition. We probably need some procedure to ensure that SHLIB_VERSION_NUMBER is updated whenever we change the library version in secure/lib/libssl/Makefile.
* libkrb5: Fix potential double-freecem2016-05-111-0/+1
| | | | | | | | | | | If krb5_make_principal fails, tmp_creds.server may remain a pointer to freed memory and then be double-freed. After freeing it the first time, initialize it to NULL, which causes subsequent krb5_free_principal calls to do the right thing. Reported by: Coverity CID: 1273430 Sponsored by: EMC / Isilon Storage Division
* Merge OpenSSL 1.0.2h.jkim2016-05-0367-263/+1117
|\ | | | | | | Relnotes: yes
| * Import OpenSSL 1.0.2h.jkim2016-05-0338-122/+334
| |
* | Re-add AES-CBC ciphers to the default cipher list on the server.des2016-03-113-4/+12
| | | | | | | | PR: 207679
* | Upgrade to OpenSSH 7.2p2.des2016-03-11140-3291/+5765
|\ \
* \ \ Merge OpenSSL 1.0.2g.jkim2016-03-0183-1318/+2668
|\ \ \ | | |/ | |/| | | | Relnotes: yes
| * | Import OpenSSL 1.0.2g.jkim2016-03-0140-1046/+1741
| | |
* | | Document our modified default value for PermitRootLogin.des2016-02-022-2/+2
| | |
* | | Merge OpenSSL 1.0.2f.jkim2016-01-28136-443/+844
|\ \ \ | |/ / | | | | | | Relnotes: yes
| * | Import OpenSSL 1.0.2f.jkim2016-01-2896-153/+370
| | |
* | | Switch UseDNS back ondes2016-01-274-4/+7
| | |
* | | r294563 was incomplete; re-add the client-side options as well.des2016-01-221-0/+2
| | |
* | | Instead of removing the NoneEnabled option, mark it as unsupported.des2016-01-221-0/+1
| | | | | | | | | | | | (should have done this in r291198, but didn't think of it until now)
* | | Update the instructions and the list of major local modifications.des2016-01-211-17/+47
| | |
* | | Explain why we don't include VersionAddendum in the debug mode banner.des2016-01-211-0/+1
| | |
* | | Upgrade to OpenSSH 7.1p2.des2016-01-2128-1806/+301
| | |
* | | Enable DSA keys by default. They were disabled in OpenSSH 6.9p1.des2016-01-213-13/+28
| | | | | | | | | | | | Noticed by: glebius
* | | Take care not to pick up the wrong version of OpenSSL when running in andes2016-01-211-0/+6
| | | | | | | | | | | | environment that has OpenSSL from ports in addition to the base version.
* | | Remove RCS tags from files in which we no longer have any localdes2016-01-2014-12/+2
| | | | | | | | | | | | modifications, and add them to two files in which we do.
* | | Remove a number of generated files which are either out-of-date (becausedes2016-01-2016-27242/+0
| | | | | | | | | | | | | | | they are never regenerated to reflect our changes) or in the way of freebsd-configure.sh.
* | | Upgrade to OpenSSH 7.0p1.des2016-01-20158-1655/+2319
| | |
* | | Upgrade to OpenSSH 6.9p1.des2016-01-19115-2304/+3871
|\ \ \ | | |/ | |/|
* | | Re-add HPN configuration options as deprecated options to avoid breakingdes2016-01-192-0/+7
| | | | | | | | | | | | | | | existing configurations that use them. Note that there is no functional difference between OpenSSH with HPN and OpenSSH without HPN.
* | | Upgrade to OpenSSH 6.8p1.des2016-01-19330-14249/+30265
|\ \ \ | |/ /
* | | Now that we have local modifications in configure.ac and configure, rundes2016-01-194-129/+155
| | | | | | | | | | | | autoheader and autoconf to avoid having to patch configure manually.
* | | Upgrade to OpenSSH 6.7p1, retaining libwrap support (which has been removeddes2016-01-19286-6983/+17450
|\ \ \ | |/ / | | | | | | | | | | | | upstream) and a number of security fixes which we had already backported. MFC after: 1 week
OpenPOWER on IntegriCloud