From owner-svn-ports-all@freebsd.org Mon Mar 23 16:53:48 2020 Return-Path: Delivered-To: svn-ports-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 56B48268470; Mon, 23 Mar 2020 16:53:48 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48mL7J1dVCz4HYg; Mon, 23 Mar 2020 16:53:48 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 2295119A08; Mon, 23 Mar 2020 16:53:48 +0000 (UTC) (envelope-from bdrewery@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 02NGrmIQ086389; Mon, 23 Mar 2020 16:53:48 GMT (envelope-from bdrewery@FreeBSD.org) Received: (from bdrewery@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 02NGrkm2086383; Mon, 23 Mar 2020 16:53:46 GMT (envelope-from bdrewery@FreeBSD.org) Message-Id: <202003231653.02NGrkm2086383@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bdrewery set sender to bdrewery@FreeBSD.org using -f From: Bryan Drewery Date: Mon, 23 Mar 2020 16:53:46 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r528979 - in head/security/openssh-portable: . files X-SVN-Group: ports-head X-SVN-Commit-Author: bdrewery X-SVN-Commit-Paths: in head/security/openssh-portable: . files X-SVN-Commit-Revision: 528979 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 23 Mar 2020 16:53:48 -0000 Author: bdrewery Date: Mon Mar 23 16:53:46 2020 New Revision: 528979 URL: https://svnweb.freebsd.org/changeset/ports/528979 Log: - Update to 8.2p1 Release notes: https://www.openssh.com/txt/release-8.2 Modified: head/security/openssh-portable/Makefile head/security/openssh-portable/distinfo head/security/openssh-portable/files/extra-patch-hpn head/security/openssh-portable/files/extra-patch-hpn-compat head/security/openssh-portable/files/patch-ssh-agent.1 head/security/openssh-portable/files/patch-ssh-agent.c Modified: head/security/openssh-portable/Makefile ============================================================================== --- head/security/openssh-portable/Makefile Mon Mar 23 16:05:35 2020 (r528978) +++ head/security/openssh-portable/Makefile Mon Mar 23 16:53:46 2020 (r528979) @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= openssh -DISTVERSION= 8.1p1 +DISTVERSION= 8.2p1 PORTREVISION= 0 PORTEPOCH= 1 CATEGORIES= security @@ -116,7 +116,7 @@ EXTRA_PATCHES+= ${FILESDIR}/extra-patch-hpn-gss-glue . endif # - See https://sources.debian.org/data/main/o/openssh/ for which subdir to # pull from. -GSSAPI_DEBIAN_SUBDIR= ${DISTVERSION}-1 +GSSAPI_DEBIAN_SUBDIR= ${DISTVERSION}-4 # - Debian does not use a versioned filename so we trick fetch to make one for # us with the ?=/ trick. PATCH_SITES+= https://sources.debian.org/data/main/o/openssh/1:${GSSAPI_DEBIAN_SUBDIR}/debian/patches/gssapi.patch?dummy=/:gsskex Modified: head/security/openssh-portable/distinfo ============================================================================== --- head/security/openssh-portable/distinfo Mon Mar 23 16:05:35 2020 (r528978) +++ head/security/openssh-portable/distinfo Mon Mar 23 16:53:46 2020 (r528979) @@ -1,5 +1,5 @@ -TIMESTAMP = 1576982938 -SHA256 (openssh-8.1p1.tar.gz) = 02f5dbef3835d0753556f973cd57b4c19b6b1f6cd24c03445e23ac77ca1b93ff -SIZE (openssh-8.1p1.tar.gz) = 1625894 -SHA256 (openssh-8.1p1-gsskex-all-20141021-debian-rh-20190719.patch) = 7875fe41ce090ba2bb3d76c396f9e6de863fbad34235bf97a4012d2f949909fb -SIZE (openssh-8.1p1-gsskex-all-20141021-debian-rh-20190719.patch) = 128409 +TIMESTAMP = 1584982081 +SHA256 (openssh-8.2p1.tar.gz) = 43925151e6cf6cee1450190c0e9af4dc36b41c12737619edff8bcebdff64e671 +SIZE (openssh-8.2p1.tar.gz) = 1701197 +SHA256 (openssh-8.2p1-gsskex-all-20141021-debian-rh-20190719.patch) = b035f62000190a2c77257db76b3751acf0e018dc20d55e07a8c3c9702de04989 +SIZE (openssh-8.2p1-gsskex-all-20141021-debian-rh-20190719.patch) = 125954 Modified: head/security/openssh-portable/files/extra-patch-hpn ============================================================================== --- head/security/openssh-portable/files/extra-patch-hpn Mon Mar 23 16:05:35 2020 (r528978) +++ head/security/openssh-portable/files/extra-patch-hpn Mon Mar 23 16:53:46 2020 (r528979) @@ -387,9 +387,9 @@ diff -urN -x configure -x config.guess -x config.h.in void enable_compat13(void); void enable_compat20(void); ---- work.clean/openssh-6.8p1/configure.ac 2015-03-17 00:49:20.000000000 -0500 -+++ work/openssh-6.8p1/configure.ac 2015-04-03 16:36:28.916502000 -0500 -@@ -4238,6 +4238,25 @@ +--- configure.ac.orig 2020-03-22 11:06:53.034550000 -0700 ++++ configure.ac 2020-03-22 11:07:10.017487000 -0700 +@@ -4778,6 +4778,25 @@ AC_ARG_WITH([maildir], ] ) # maildir @@ -415,10 +415,10 @@ diff -urN -x configure -x config.guess -x config.h.in if test ! -z "$cross_compiling" && test "x$cross_compiling" = "xyes"; then AC_MSG_WARN([cross compiling: Disabling /dev/ptmx test]) disable_ptmx_check=yes -@@ -4905,6 +4924,8 @@ - echo " BSD Auth support: $BSD_AUTH_MSG" - echo " Random number source: $RAND_MSG" +@@ -5459,6 +5478,8 @@ echo " Random number source: $RAND_MSG" echo " Privsep sandbox style: $SANDBOX_STYLE" + echo " PKCS#11 support: $enable_pkcs11" + echo " U2F/FIDO support: $enable_sk" +echo " HPN support: $HPN_MSG" +echo " NONECIPHER support: $NONECIPHER_MSG" @@ -1136,9 +1136,9 @@ diff -urN -x configure -x config.guess -x config.h.in cleanup_exit(255); /* error already logged */ /* Put the connection into non-blocking mode. */ ---- work/openssh/sshconnect2.c.orig 2018-10-16 17:01:20.000000000 -0700 -+++ work/openssh/sshconnect2.c 2018-11-12 09:06:06.338515000 -0800 -@@ -81,7 +81,13 @@ +--- sshconnect2.c.orig 2020-02-13 16:40:54.000000000 -0800 ++++ sshconnect2.c 2020-03-22 11:10:01.017282000 -0700 +@@ -83,7 +83,13 @@ extern char *client_version_string; extern char *server_version_string; extern Options options; @@ -1152,7 +1152,7 @@ diff -urN -x configure -x config.guess -x config.h.in /* * SSH2 key exchange */ -@@ -154,16 +160,18 @@ order_hostkeyalgs(char *host, struct sockaddr *hostadd +@@ -156,10 +162,11 @@ order_hostkeyalgs(char *host, struct sockaddr *hostadd return ret; } @@ -1163,16 +1163,17 @@ diff -urN -x configure -x config.guess -x config.h.in { - char *myproposal[PROPOSAL_MAX] = { KEX_CLIENT }; char *s, *all_key; - int r; + int r, use_known_hosts_order = 0; - xxx_host = host; - xxx_hostaddr = hostaddr; +@@ -183,6 +190,7 @@ ssh_kex2(struct ssh *ssh, char *host, struct sockaddr + fatal("%s: kex_assemble_namelist", __func__); + free(all_key); + memcpy(&myproposal, &myproposal_default, sizeof(myproposal)); if ((s = kex_names_cat(options.kex_algorithms, "ext-info-c")) == NULL) fatal("%s: kex_names_cat", __func__); myproposal[PROPOSAL_KEX_ALGS] = compat_kex_proposal(s); -@@ -422,6 +430,30 @@ ssh_userauth2(struct ssh *ssh, const char *local_user, +@@ -435,6 +443,30 @@ ssh_userauth2(struct ssh *ssh, const char *local_user, if (!authctxt.success) fatal("Authentication failed."); Modified: head/security/openssh-portable/files/extra-patch-hpn-compat ============================================================================== --- head/security/openssh-portable/files/extra-patch-hpn-compat Mon Mar 23 16:05:35 2020 (r528978) +++ head/security/openssh-portable/files/extra-patch-hpn-compat Mon Mar 23 16:53:46 2020 (r528979) @@ -16,12 +16,12 @@ r294563 was incomplete; re-add the client-side options ------------------------------------------------------------------------ ---- readconf.c.orig 2017-10-12 12:18:59.927293000 -0700 -+++ readconf.c 2017-10-12 12:19:45.048532000 -0700 -@@ -305,6 +305,12 @@ static struct { - { "pubkeyacceptedkeytypes", oPubkeyAcceptedKeyTypes }, +--- readconf.c.orig 2020-03-21 16:51:23.450425000 -0700 ++++ readconf.c 2020-03-21 17:00:01.827757000 -0700 +@@ -310,6 +310,12 @@ static struct { { "ignoreunknown", oIgnoreUnknown }, { "proxyjump", oProxyJump }, + { "securitykeyprovider", oSecurityKeyProvider }, + { "hpndisabled", oDeprecated }, + { "hpnbuffersize", oDeprecated }, + { "tcprcvbufpoll", oDeprecated }, @@ -31,12 +31,12 @@ r294563 was incomplete; re-add the client-side options { NULL, oBadOption } }; ---- servconf.c.orig 2018-10-16 17:01:20.000000000 -0700 -+++ servconf.c 2018-11-10 11:32:09.835817000 -0800 -@@ -645,6 +645,10 @@ static struct { - { "exposeauthinfo", sExposeAuthInfo, SSHCFG_ALL }, +--- servconf.c.orig 2020-02-13 16:40:54.000000000 -0800 ++++ servconf.c 2020-03-21 17:01:18.011062000 -0700 +@@ -695,6 +695,10 @@ static struct { { "rdomain", sRDomain, SSHCFG_ALL }, { "casignaturealgorithms", sCASignatureAlgorithms, SSHCFG_ALL }, + { "securitykeyprovider", sSecurityKeyProvider, SSHCFG_GLOBAL }, + { "noneenabled", sUnsupported, SSHCFG_ALL }, + { "hpndisabled", sDeprecated, SSHCFG_ALL }, + { "hpnbuffersize", sDeprecated, SSHCFG_ALL }, Modified: head/security/openssh-portable/files/patch-ssh-agent.1 ============================================================================== --- head/security/openssh-portable/files/patch-ssh-agent.1 Mon Mar 23 16:05:35 2020 (r528978) +++ head/security/openssh-portable/files/patch-ssh-agent.1 Mon Mar 23 16:53:46 2020 (r528979) @@ -4,8 +4,8 @@ r226103 | des | 2011-10-07 08:10:16 -0500 (Fri, 07 Oct Add a -x option that causes ssh-agent(1) to exit when all clients have disconnected. ---- ssh-agent.1.orig 2015-05-29 03:27:21.000000000 -0500 -+++ ssh-agent.1 2015-06-02 09:45:37.025390000 -0500 +--- ssh-agent.1.orig 2020-02-13 16:40:54.000000000 -0800 ++++ ssh-agent.1 2020-03-21 17:03:22.952068000 -0700 @@ -43,7 +43,7 @@ .Sh SYNOPSIS .Nm ssh-agent @@ -14,13 +14,13 @@ disconnected. +.Op Fl \&Ddx .Op Fl a Ar bind_address .Op Fl E Ar fingerprint_hash - .Op Fl t Ar life -@@ -128,6 +128,8 @@ + .Op Fl P Ar provider_whitelist +@@ -125,6 +125,8 @@ A lifetime specified for an identity with .Xr ssh-add 1 overrides this value. Without this option the default maximum lifetime is forever. +.It Fl x +Exit after the last client has disconnected. - .El - .Pp - If a commandline is given, this is executed as a subprocess of the agent. + .It Ar command Op Ar arg ... + If a command (and optional arguments) is given, + this is executed as a subprocess of the agent. Modified: head/security/openssh-portable/files/patch-ssh-agent.c ============================================================================== --- head/security/openssh-portable/files/patch-ssh-agent.c Mon Mar 23 16:05:35 2020 (r528978) +++ head/security/openssh-portable/files/patch-ssh-agent.c Mon Mar 23 16:53:46 2020 (r528979) @@ -8,9 +8,9 @@ r226103 | des | 2011-10-07 08:10:16 -0500 (Fri, 07 Oct Add a -x option that causes ssh-agent(1) to exit when all clients have disconnected. ---- ssh-agent.c.orig 2017-10-02 12:34:26.000000000 -0700 -+++ ssh-agent.c 2017-10-12 11:31:40.908737000 -0700 -@@ -162,15 +162,34 @@ static long lifetime = 0; +--- ssh-agent.c.orig 2020-02-13 16:40:54.000000000 -0800 ++++ ssh-agent.c 2020-03-21 17:04:44.305866000 -0700 +@@ -167,15 +167,34 @@ static long lifetime = 0; static int fingerprint_hash = SSH_FP_HASH_DEFAULT; @@ -45,7 +45,7 @@ disconnected. } static void -@@ -745,6 +764,10 @@ new_socket(sock_type type, int fd) +@@ -875,6 +894,10 @@ new_socket(sock_type type, int fd) { u_int i, old_alloc, new_alloc; @@ -56,16 +56,16 @@ disconnected. set_nonblock(fd); if (fd > max_fd) -@@ -1007,7 +1030,7 @@ static void +@@ -1170,7 +1193,7 @@ static void usage(void) { fprintf(stderr, - "usage: ssh-agent [-c | -s] [-Dd] [-a bind_address] [-E fingerprint_hash]\n" + "usage: ssh-agent [-c | -s] [-Ddx] [-a bind_address] [-E fingerprint_hash]\n" - " [-P pkcs11_whitelist] [-t life] [command [arg ...]]\n" + " [-P provider_whitelist] [-t life] [command [arg ...]]\n" " ssh-agent [-c | -s] -k\n"); exit(1); -@@ -1039,6 +1062,7 @@ main(int ac, char **av) +@@ -1202,6 +1225,7 @@ main(int ac, char **av) /* drop */ setegid(getgid()); setgid(getgid()); @@ -73,7 +73,7 @@ disconnected. platform_disable_tracing(0); /* strict=no */ -@@ -1049,7 +1073,7 @@ main(int ac, char **av) +@@ -1213,7 +1237,7 @@ main(int ac, char **av) __progname = ssh_get_progname(av[0]); seed_rng(); @@ -82,7 +82,7 @@ disconnected. switch (ch) { case 'E': fingerprint_hash = ssh_digest_alg_by_name(optarg); -@@ -1092,6 +1116,9 @@ main(int ac, char **av) +@@ -1256,6 +1280,9 @@ main(int ac, char **av) fprintf(stderr, "Invalid lifetime\n"); usage(); }