patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
282 lines
9.2 KiB
Diff
282 lines
9.2 KiB
Diff
Index: crypto/openssh/auth-chall.c
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/auth-chall.c,v
|
|
retrieving revision 1.2.2.2.2.1
|
|
retrieving revision 1.2.2.2.2.2
|
|
diff -p -c -r1.2.2.2.2.1 -r1.2.2.2.2.2
|
|
*** crypto/openssh/auth-chall.c 16 Jul 2002 12:27:05 -0000 1.2.2.2.2.1
|
|
--- crypto/openssh/auth-chall.c 24 Sep 2003 19:53:37 -0000 1.2.2.2.2.2
|
|
*************** verify_response(Authctxt *authctxt, cons
|
|
*** 80,82 ****
|
|
--- 80,90 ----
|
|
authctxt->kbdintctxt = NULL;
|
|
return res ? 0 : 1;
|
|
}
|
|
+ void
|
|
+ abandon_challenge_response(Authctxt *authctxt)
|
|
+ {
|
|
+ if (authctxt->kbdintctxt != NULL) {
|
|
+ device->free_ctx(authctxt->kbdintctxt);
|
|
+ authctxt->kbdintctxt = NULL;
|
|
+ }
|
|
+ }
|
|
Index: crypto/openssh/auth.h
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/auth.h,v
|
|
retrieving revision 1.1.1.1.2.4.4.1
|
|
retrieving revision 1.1.1.1.2.4.4.2
|
|
diff -p -c -r1.1.1.1.2.4.4.1 -r1.1.1.1.2.4.4.2
|
|
*** crypto/openssh/auth.h 16 Jul 2002 12:33:06 -0000 1.1.1.1.2.4.4.1
|
|
--- crypto/openssh/auth.h 24 Sep 2003 19:53:37 -0000 1.1.1.1.2.4.4.2
|
|
*************** struct passwd * getpwnamallow(const char
|
|
*** 160,165 ****
|
|
--- 160,166 ----
|
|
|
|
char *get_challenge(Authctxt *);
|
|
int verify_response(Authctxt *, const char *);
|
|
+ void abandon_challenge_response(Authctxt *);
|
|
|
|
struct passwd * auth_get_user(void);
|
|
|
|
Index: crypto/openssh/auth1.c
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/auth1.c,v
|
|
retrieving revision 1.3.2.7.4.1
|
|
retrieving revision 1.3.2.7.4.2
|
|
diff -p -c -r1.3.2.7.4.1 -r1.3.2.7.4.2
|
|
*** crypto/openssh/auth1.c 16 Jul 2002 12:33:06 -0000 1.3.2.7.4.1
|
|
--- crypto/openssh/auth1.c 24 Sep 2003 19:53:37 -0000 1.3.2.7.4.2
|
|
*************** do_authloop(Authctxt *authctxt)
|
|
*** 73,79 ****
|
|
char info[1024];
|
|
u_int dlen;
|
|
u_int ulen;
|
|
! int type = 0;
|
|
struct passwd *pw = authctxt->pw;
|
|
|
|
debug("Attempting authentication for %s%.100s.",
|
|
--- 73,79 ----
|
|
char info[1024];
|
|
u_int dlen;
|
|
u_int ulen;
|
|
! int prev, type = 0;
|
|
struct passwd *pw = authctxt->pw;
|
|
|
|
debug("Attempting authentication for %s%.100s.",
|
|
*************** do_authloop(Authctxt *authctxt)
|
|
*** 103,109 ****
|
|
--- 103,121 ----
|
|
info[0] = '\0';
|
|
|
|
/* Get a packet from the client. */
|
|
+ prev = type;
|
|
type = packet_read();
|
|
+
|
|
+ /*
|
|
+ * If we started challenge-response authentication but the
|
|
+ * next packet is not a response to our challenge, release
|
|
+ * the resources allocated by get_challenge() (which would
|
|
+ * normally have been released by verify_response() had we
|
|
+ * received such a response)
|
|
+ */
|
|
+ if (prev == SSH_CMSG_AUTH_TIS &&
|
|
+ type != SSH_CMSG_AUTH_TIS_RESPONSE)
|
|
+ abandon_challenge_response(authctxt);
|
|
|
|
/* Process the packet. */
|
|
switch (type) {
|
|
Index: crypto/openssh/auth2-pam-freebsd.c
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/auth2-pam-freebsd.c,v
|
|
retrieving revision 1.2.2.2
|
|
retrieving revision 1.2.2.4
|
|
diff -p -c -r1.2.2.2 -r1.2.2.4
|
|
*** crypto/openssh/auth2-pam-freebsd.c 17 Jul 2002 17:52:36 -0000 1.2.2.2
|
|
--- crypto/openssh/auth2-pam-freebsd.c 24 Sep 2003 19:16:50 -0000 1.2.2.4
|
|
*************** pam_child_conv(int n,
|
|
*** 76,83 ****
|
|
*resp = xmalloc(n * sizeof **resp);
|
|
buffer_init(&buffer);
|
|
for (i = 0; i < n; ++i) {
|
|
! resp[i]->resp_retcode = 0;
|
|
! resp[i]->resp = NULL;
|
|
switch (msg[i]->msg_style) {
|
|
case PAM_PROMPT_ECHO_OFF:
|
|
buffer_put_cstring(&buffer, msg[i]->msg);
|
|
--- 76,83 ----
|
|
*resp = xmalloc(n * sizeof **resp);
|
|
buffer_init(&buffer);
|
|
for (i = 0; i < n; ++i) {
|
|
! (*resp)[i].resp_retcode = 0;
|
|
! (*resp)[i].resp = NULL;
|
|
switch (msg[i]->msg_style) {
|
|
case PAM_PROMPT_ECHO_OFF:
|
|
buffer_put_cstring(&buffer, msg[i]->msg);
|
|
*************** pam_child_conv(int n,
|
|
*** 85,91 ****
|
|
msg_recv(ctxt->pam_sock, &buffer);
|
|
if (buffer_get_char(&buffer) != PAM_AUTHTOK)
|
|
goto fail;
|
|
! resp[i]->resp = buffer_get_string(&buffer, NULL);
|
|
break;
|
|
case PAM_PROMPT_ECHO_ON:
|
|
buffer_put_cstring(&buffer, msg[i]->msg);
|
|
--- 85,91 ----
|
|
msg_recv(ctxt->pam_sock, &buffer);
|
|
if (buffer_get_char(&buffer) != PAM_AUTHTOK)
|
|
goto fail;
|
|
! (*resp)[i].resp = buffer_get_string(&buffer, NULL);
|
|
break;
|
|
case PAM_PROMPT_ECHO_ON:
|
|
buffer_put_cstring(&buffer, msg[i]->msg);
|
|
*************** pam_child_conv(int n,
|
|
*** 93,99 ****
|
|
msg_recv(ctxt->pam_sock, &buffer);
|
|
if (buffer_get_char(&buffer) != PAM_AUTHTOK)
|
|
goto fail;
|
|
! resp[i]->resp = buffer_get_string(&buffer, NULL);
|
|
break;
|
|
case PAM_ERROR_MSG:
|
|
buffer_put_cstring(&buffer, msg[i]->msg);
|
|
--- 93,99 ----
|
|
msg_recv(ctxt->pam_sock, &buffer);
|
|
if (buffer_get_char(&buffer) != PAM_AUTHTOK)
|
|
goto fail;
|
|
! (*resp)[i].resp = buffer_get_string(&buffer, NULL);
|
|
break;
|
|
case PAM_ERROR_MSG:
|
|
buffer_put_cstring(&buffer, msg[i]->msg);
|
|
*************** pam_child_conv(int n,
|
|
*** 111,118 ****
|
|
buffer_free(&buffer);
|
|
return (PAM_SUCCESS);
|
|
fail:
|
|
- while (i)
|
|
- xfree(resp[--i]);
|
|
xfree(*resp);
|
|
*resp = NULL;
|
|
buffer_free(&buffer);
|
|
--- 111,116 ----
|
|
Index: crypto/openssh/ssh_config
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/ssh_config,v
|
|
retrieving revision 1.2.2.4
|
|
retrieving revision 1.2.2.4.4.2
|
|
diff -p -c -r1.2.2.4 -r1.2.2.4.4.2
|
|
*** crypto/openssh/ssh_config 28 Sep 2001 01:33:35 -0000 1.2.2.4
|
|
--- crypto/openssh/ssh_config 24 Sep 2003 19:54:21 -0000 1.2.2.4.4.2
|
|
***************
|
|
*** 1,13 ****
|
|
! # This is ssh client systemwide configuration file. This file provides
|
|
! # defaults for users, and the values can be changed in per-user configuration
|
|
! # files or on the command line.
|
|
! #
|
|
! # $OpenBSD: ssh_config,v 1.10 2001/04/03 21:19:38 todd Exp $
|
|
! # $FreeBSD$
|
|
|
|
! # This is ssh client systemwide configuration file. See ssh(1) for more
|
|
! # information. This file provides defaults for users, and the values can
|
|
! # be changed in per-user configuration files or on the command line.
|
|
|
|
# Configuration data is parsed as follows:
|
|
# 1. command line options
|
|
--- 1,10 ----
|
|
! # $OpenBSD: ssh_config,v 1.15 2002/06/20 20:03:34 stevesk Exp $
|
|
! # $FreeBSD$
|
|
|
|
! # This is the ssh client system-wide configuration file. See
|
|
! # ssh_config(5) for more information. This file provides defaults for
|
|
! # users, and the values can be changed in per-user configuration files
|
|
! # or on the command line.
|
|
|
|
# Configuration data is parsed as follows:
|
|
# 1. command line options
|
|
*************** Host *
|
|
*** 23,40 ****
|
|
# ForwardAgent no
|
|
# ForwardX11 no
|
|
# RhostsAuthentication no
|
|
! # RhostsRSAAuthentication yes
|
|
# RSAAuthentication yes
|
|
# PasswordAuthentication yes
|
|
- # FallBackToRsh no
|
|
- # UseRsh no
|
|
# BatchMode no
|
|
# CheckHostIP yes
|
|
! # StrictHostKeyChecking yes
|
|
# IdentityFile ~/.ssh/identity
|
|
- # IdentityFile ~/.ssh/id_dsa
|
|
# IdentityFile ~/.ssh/id_rsa
|
|
# Port 22
|
|
Protocol 1,2
|
|
! # Cipher blowfish
|
|
# EscapeChar ~
|
|
--- 20,37 ----
|
|
# ForwardAgent no
|
|
# ForwardX11 no
|
|
# RhostsAuthentication no
|
|
! # RhostsRSAAuthentication no
|
|
# RSAAuthentication yes
|
|
# PasswordAuthentication yes
|
|
# BatchMode no
|
|
# CheckHostIP yes
|
|
! # StrictHostKeyChecking ask
|
|
# IdentityFile ~/.ssh/identity
|
|
# IdentityFile ~/.ssh/id_rsa
|
|
+ # IdentityFile ~/.ssh/id_dsa
|
|
# Port 22
|
|
Protocol 1,2
|
|
! # Cipher 3des
|
|
! # Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
|
|
# EscapeChar ~
|
|
+ # VersionAddendum FreeBSD-20030924
|
|
Index: crypto/openssh/sshd_config
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/sshd_config,v
|
|
retrieving revision 1.4.2.8.2.1
|
|
retrieving revision 1.4.2.8.2.2
|
|
diff -p -c -r1.4.2.8.2.1 -r1.4.2.8.2.2
|
|
*** crypto/openssh/sshd_config 16 Jul 2002 12:33:10 -0000 1.4.2.8.2.1
|
|
--- crypto/openssh/sshd_config 24 Sep 2003 19:54:21 -0000 1.4.2.8.2.2
|
|
***************
|
|
*** 14,20 ****
|
|
# Note that some of FreeBSD's defaults differ from OpenBSD's, and
|
|
# FreeBSD has a few additional options.
|
|
|
|
! #VersionAddendum FreeBSD-20020629
|
|
|
|
#Port 22
|
|
#Protocol 2,1
|
|
--- 14,20 ----
|
|
# Note that some of FreeBSD's defaults differ from OpenBSD's, and
|
|
# FreeBSD has a few additional options.
|
|
|
|
! #VersionAddendum FreeBSD-20030924
|
|
|
|
#Port 22
|
|
#Protocol 2,1
|
|
Index: crypto/openssh/version.h
|
|
===================================================================
|
|
RCS file: /home/ncvs/src/crypto/openssh/version.h,v
|
|
retrieving revision 1.1.1.1.2.8.2.3
|
|
retrieving revision 1.1.1.1.2.8.2.4
|
|
diff -p -c -r1.1.1.1.2.8.2.3 -r1.1.1.1.2.8.2.4
|
|
*** crypto/openssh/version.h 17 Sep 2003 14:52:09 -0000 1.1.1.1.2.8.2.3
|
|
--- crypto/openssh/version.h 24 Sep 2003 19:54:21 -0000 1.1.1.1.2.8.2.4
|
|
***************
|
|
*** 5,11 ****
|
|
|
|
#define SSH_VERSION (ssh_version_get())
|
|
#define SSH_VERSION_BASE "OpenSSH_3.4p1"
|
|
! #define SSH_VERSION_ADDENDUM "FreeBSD-20030917"
|
|
|
|
const char *ssh_version_get(void);
|
|
void ssh_version_set_addendum(const char *add);
|
|
--- 5,11 ----
|
|
|
|
#define SSH_VERSION (ssh_version_get())
|
|
#define SSH_VERSION_BASE "OpenSSH_3.4p1"
|
|
! #define SSH_VERSION_ADDENDUM "FreeBSD-20030924"
|
|
|
|
const char *ssh_version_get(void);
|
|
void ssh_version_set_addendum(const char *add);
|