Commit graph

286 commits

Author SHA1 Message Date
Bryan Drewery
32641bdf90 - Update to 7.2p1
- Mark X509 and KERB_GSSAPI as BROKEN.

Changelog: http://www.openssh.com/txt/release-7.2

With help from:	brnrd
2016-02-29 18:36:57 +00:00
John Marino
6f41150b29 x11/xterm: document ncurses requirement (USES+=ncurses)
also link to libncurses rather than libcurses

approved by:	infrastructure blanket
2016-02-03 22:15:11 +00:00
Bryan Drewery
686faf2ce0 Fix the KERB_GSSAPI option using the latest patch from Debian.
This slightly refactors some of the HPN patch to avoid a conflict.

PR:		206346
Submitted by:	Garret Wollman
2016-01-20 02:18:42 +00:00
Bryan Drewery
4db8713801 Update to 7.1p2
Changes: http://www.openssh.com/txt/release-7.1p2

MFH:		2016Q1
Security:	CVE-2016-0777
Security:	CVE-2016-0778
2016-01-14 16:41:45 +00:00
Bryan Drewery
3f7ae3c03a Make portlint stop spamming me. It's gotten quite silly.
There's no reason to regenerate these for the sake of having 'UTC' in the patch
and it also considers patches with comments to be invalid.

WARN: /root/svn/ports/security/openssh-portable/files/patch-auth.c: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-auth2.c: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-readconf.c: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-regress__test-exec.sh: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-servconf.c: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-session.c: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-ssh-agent.1: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-ssh-agent.c: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-ssh.c: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-ssh_config: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-ssh_config.5: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-sshconnect.c: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-sshd.8: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-sshd.c: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-sshd_config: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
WARN: /root/svn/ports/security/openssh-portable/files/patch-sshd_config.5: patch was not generated using ``make makepatch''.  It is recommended to use ``make makepatch'' when you need to [re-]generate a patch to ensure proper patch format.
2015-11-11 21:21:44 +00:00
Bryan Drewery
7c7778bb96 Fix the NONECIPHER not actually being offered by the server.
Upstream issue: https://github.com/rapier1/openssh-portable/issues/3
2015-11-11 21:04:48 +00:00
Bryan Drewery
70381a9f0d Update advice to disable ChallengeResponseAuthentication for key usage.
PR:		204475
Reported by:	Mark.Martinec@ijs.si
2015-11-11 18:04:40 +00:00
Mathieu Arnold
7f0f664d7e Drop 8 support.
With hat:	portmgr
Sponsored by:	Absolight
Differential Revision:	https://reviews.freebsd.org/D3694
2015-10-15 14:55:14 +00:00
Bryan Drewery
d842425106 Stop trying to create the RSA protocol 1 key from the rc.d file. It is no
longer supported by default since 7.0. [1]

I do plan to make this configurable based on PR 202169 [2] soon.

PR:		202792 [1]
PR:		202169 [2]
Submitted by:	chrysalis@chrysalisnet.org [1]
2015-09-24 21:54:40 +00:00
Mathieu Arnold
320514f1dd It seems some people keep adding $FreeBSD$ to patch files.
Patches must not be changed by the vcs, this includes the
svn:keyword expansion.  Set fbsd:nokeywords to a couple of patches.

With hat:	portmgr
Sponsored by:	Absolight
2015-09-16 13:03:45 +00:00
Bryan Drewery
5dc15ea21d Fix patch from r395182 on head. The patch(1) command works fine on 8.4
and 9.3 but not head with this patch.
2015-08-25 03:59:54 +00:00
Bryan Drewery
c0ac4a505a Apply upstream fix for 'HostkeyAlgorithms +' support. 2015-08-24 18:51:07 +00:00
Bryan Drewery
82c509e276 Update to 7.1p1
Changes: http://www.openssh.com/txt/release-7.1
2015-08-21 21:51:01 +00:00
Bryan Drewery
b2806a22e4 - Update to OpenSSH 7.0p1
- Update X509 patch to 8.5

Changes: http://www.openssh.com/txt/release-7.0
2015-08-18 15:42:52 +00:00
Bryan Drewery
dfe1f78791 Add upstream fix to address CVE-2015-5600 for MaxAuthTries bypass.
Security:	5b74a5bc-348f-11e5-ba05-c80aa9043978
2015-07-27 18:47:55 +00:00
Bryan Drewery
9232111ac8 Fix accidental revert of PermitRootLogin default to NO.
This was due to the patch not being needed in the snapshot version
which I based the 6.9 update off of. The default is changed in
the upcoming 7.0 release
2015-07-27 18:41:02 +00:00
Bryan Drewery
2520291173 - Update to 6.9p1
- Update X509 patch to 8.4

Changes:	http://www.openssh.com/txt/release-6.9
2015-07-27 18:30:24 +00:00
Bryan Drewery
c3a9da2b6d Use new USES=libedit 2015-07-24 17:01:58 +00:00
Bryan Drewery
07d4a6adef Support changed ETCDIR in pkg-plist 2015-06-24 19:35:58 +00:00
Bryan Drewery
366d32fba5 Allow user overriding ETCDIR 2015-06-24 18:37:59 +00:00
Bryan Drewery
661be7b08d Add openssh-portable-devel which is based on the upstream snapshots for staging and testing.
Its initial version is 20150602 which is nearly the upcoming 6.9 version.
2015-06-02 15:00:43 +00:00
Mathieu Arnold
6172d4b590 Remove $FreeBSD$ from patches files everywhere.
With hat:	portmgr
Sponsored by:	Absolight
2015-05-22 20:34:27 +00:00
Bryan Drewery
eae73f59b6 Avoid a potential read overflow. This was not deemed a security issue by
upstream; it was fixed upstream comprehensively a few weeks ago in
77199d6ec8986d470487e66f8ea8f4cf43d2e20c.

PR:		200241
Patch by:	Hanno Böck <hanno@hboeck.de>
Obtained from:	http://www.openwall.com/lists/oss-security/2015/05/16/3
2015-05-16 16:28:39 +00:00
Mathieu Arnold
60d1a83c2a MASTER_SITES cleanup.
- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
2015-05-14 10:15:04 +00:00
Bryan Drewery
0e8dd5854c Fix clients getting 'Bad packet length' and 'Disconnecting: Packet corrupt'
when the NONECIPHER option is selected but not the HPN option.  The server
banner was improperly sending a NULL byte after the newline causing confusion
on the client.  This was an error in my own modifications to the HPN patch
in r383231.

This may have occurred with stale builds as well, such as running
'make configure' then 'portsnap update' and then 'make build'.

Pointyhat to:	bdrewery
Reported by:	many
PR:		199352
2015-05-06 18:39:41 +00:00
Bryan Drewery
01f1b90dd0 Replace the TTSH patch from r383618 with the one that upstream took.
Obtained from upstream d8f391caef623
2015-04-14 16:42:24 +00:00
Bryan Drewery
08dd690c4a Cleanup some unneeded patches.
1. There's no need to patch the xauth(1) location as the OpenSSH build already
   does so based on the --with-xauth path provided. It also updates manpages.
2. Don't modify manpage for shosts location as it was wrong. The proper
   LOCALBASE path is now used due to OpenSSH's build already handling it
   properly.
3. Remove confusing UsePrivilegeSeparation change in sshd_config. The default
   upstream is to have it disabled by default. The sshd_config line is in
   upstream to enable it by default in new installations. We always enable
   it though. So remove the sshd_config change which makes it look like
   we don't use it; it was not a needed difference with upstream.

From discussion with:	TJ <tj@mrsk.me>
2015-04-09 20:57:23 +00:00
Bryan Drewery
e574b487b5 Limit the TTSSH bug fix in r383618 to only versions that have it.
Submitted by:	IWAMOTO Kouichi <sue@iwmt.org>
2015-04-09 20:19:17 +00:00
Bryan Drewery
c1edee9622 Fix TTSSH (Tera Type/Term) client crash:
Unexpected SSH2 message(80) on current stage(6)

This patch was submitted upstream. The client has fixed it in their SVN [1][2]
but not yet released a fixed build.

[1] http://en.sourceforge.jp/ticket/browse.php?group_id=1412&tid=35010
[2] http://en.sourceforge.jp/projects/ttssh2/scm/svn/commits/5829
2015-04-09 02:33:47 +00:00
Bryan Drewery
fff0fb586b Remove debugging leftover in release.
error: mm_request_receive: socket closed

Obtained from:	Upstream c7fe79ed7db427f1474e72b9f8b465901d61d3f6
2015-04-09 01:49:10 +00:00
Bryan Drewery
60e9c53853 - Update to 6.8p1
- Fix 'make test'
- HPN:
  - NONECIPHER is no longer default. This is not default in base and should not
    be default here as it introduces security holes.
  - HPN: I've audited the patch and included it in the port directory for
    transparency. I identified several bugs and submitted them to the new
    upstream: https://github.com/rapier1/openssh-portable/pull/2
  - HPN: The entire patch is now ifdef'd to ensure various bits are properly
    removed depending on the OPTIONS selected.
  - AES_THREADED is removed. It has questionable benefit on modern HW and is not
    stable.
  - The "enhanced logging" was removed from the patch as it is too
    intrusive and difficult to maintain in the port.
  - The progress meter "peak throughput" patch was removed.
  - Fixed HPN version showing in client/server version string when HPN
    was disabled in the config.
- KERB_GSSAPI is currently BROKEN as it does not apply.
- Update X509 to 8.3

Changelog: http://www.openssh.com/txt/release-6.8
2015-04-04 17:16:58 +00:00
Bryan Drewery
4fad9f2d4f Remove unused variable PRECIOUS 2015-04-02 02:21:59 +00:00
Bryan Drewery
816304d141 Make the check added in 2013 in r330200 for a bad ECDSA key actually work. 2015-04-01 01:04:23 +00:00
Bryan Drewery
ff0a43e2f0 Remove useless IGNORE for TCP_WRAPPERS and PAM.
TCP_WRAPPERS: /usr/include/tcpd.h is always installed by the base system.
              It is only libwrap.so that is conditional on WITH_TCP_WRAPPERS.

PAM:          /usr/include/security/pam_modules.h is always installed.

This fixes FreshPorts claiming this port is ignored.
2015-03-31 19:07:25 +00:00
Bryan Drewery
6014ebaef2 Make the VersionAddendum fix use the proper default.
Once I ran into the X509 issue previously I failed to retest that the patch
worked.

PR:		193127
2015-03-29 04:17:53 +00:00
John Marino
c55ac89dcd security category: Remove $PTHREAD_LIBS
approved by:	PTHREAD blanket
2015-03-25 08:30:27 +00:00
Bryan Drewery
258fa75735 Stop forcing the port version string into the server banner.
The port now uses VersionAddendum in the sshd_config to allow overriding
this value. Using "none" allows disabling the default of the port
version string. The default is kept to show the port version string to
remain close to the base version.

Support for the client VersionAddendum may be added soon as well to better
match base and not give surprises when switching from base to the port.

PR:		193127
Requested by:	many, including myself when this was broken years ago.
2015-03-23 04:23:08 +00:00
Bryan Drewery
036c38aa5b Fix incorrect reference to ETCSSH from r381709 2015-03-21 19:28:40 +00:00
Bryan Drewery
0caa9545e3 Set proper ETCDIR. Mistake in r381709 2015-03-20 07:07:26 +00:00
Bryan Drewery
8d84806621 Remove remnants of OVERWRITE_BASE which was removed in r376306 2015-03-20 02:43:43 +00:00
Bryan Drewery
94f086ad17 Fix application of GSSAPI patch when using HPN. It applies fine if done after
HPN.

Reported by:	gwollman
2015-01-05 23:21:27 +00:00
Bryan Drewery
2cac0ba27e Mark OVERWRITE_BASE as IGNORE.
Keep it as an option as otherwise the user won't be notified that
their configuration is wrong and it will just install to PREFIX
instead, which would be surprising.
2015-01-05 16:13:19 +00:00
Bryan Drewery
e5b42c8536 - Fix HPN patches for 6.7p1
- Add back HPN and NONECIPHER for the default options and bump PORTREVISION
  due to this.
2014-12-17 02:34:43 +00:00
Bryan Drewery
bacf87759f - Unbreak KERB_GSSAPI option by using Debian's patch.
I am serving the patch exactly as-is from their site. Obtained from:
  http://sources.debian.net/data/main/o/openssh/1:6.7p1-3/debian/patches/gssapi.patch
2014-12-16 21:44:11 +00:00
Bryan Drewery
c931fe84b9 Unmark X509 option as BROKEN after fixed in r374821 2014-12-16 21:29:03 +00:00
Bryan Drewery
c182d59b5f - Update X509 patch to 8.2 which now supports OpenSSH 6.7p1
No PORTREVISION bump since it was BROKEN before with X509.
2014-12-16 20:14:04 +00:00
Bryan Drewery
b384f37302 - Update to 6.7p1.
Several patches do not currently apply. Use security/openssh-portable66 for:
  HPN, NONECIPHER, KERB_GSSAPI, X509.

- Add a TCP_WRAPPER patch to re-enable support after it was removed upstream.
2014-11-17 18:08:14 +00:00
John Marino
15dccb3a0d Add USES=alias to several ports
Alias is a new USES tool that allows DragonFly to masquerade as FreeBSD
by setting CFLAGS+= -D__FreeBSD__.  For some ports, this fixes the build
without the need for additional patches.

Approved by:	portmgr (bapt, blanket)
2014-10-20 10:09:19 +00:00
Bryan Drewery
325e005274 Note my intentions with OVERWRITE_BASE 2014-10-07 00:48:25 +00:00
Bryan Drewery
9b637227c4 - Mark OVERWRITE_BASE and security/openssh-portable-base as DEPRECATED.
These will be removed on January 1 2015.

  Really ports should not be touching the base system at all.

  This option is a big foot-shoot problem:

  1. Recent versions of FreeBSD such as 9.3, 10.0, 10.1+, now remove all ssh
     files from /usr if you 'make delete-old' with WITHOUT_SSH. This results in
     removing the overwrite base files.
  2. Uninstalling the package leaves the system with no ssh.
  3. Running installworld without WITHOUT_SSH results in overwriting the
     package, or giving false-positive 'pkg check -s' errors.
  4. The port fails to pass QA checks because it removes system files.
2014-10-03 19:31:07 +00:00