summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* can't call "make lint" without configureDROPBEAR_2020.79Matt Johnston2020-06-151-1/+0
|
* changelog for 2020.79Matt Johnston2020-06-153-1/+61
|
* Fix "make install" for manpages in out-of-tree buildsGabor Z. Papp2020-06-151-2/+2
|
* Add DEVELOPING.mdMatt Johnston2020-06-152-0/+53
|
* Delay seedrandom until connectionsMatt Johnston2020-06-151-3/+3
|
* Disallow leading lines before the ident for server (#102)Vladislav Grishenko2020-06-151-2/+5
| | | | | | | | | | | Per RFC4253 4.2 clients must be able to process other lines of data before the version string, server behavior is not defined neither with MUST/SHOULD nor with MAY. If server process up to 50 lines too - it may cause too long hanging session with invalid/evil client that consume host resources and potentially may lead to DDoS on poor embedded boxes. Let's require first line from client to be version string and fail early if it's not - matches both RFC and real OpenSSH behavior.
* Disable by default 3des, cbc, hmac-sha1-96, x11 forwardingMatt Johnston2020-06-111-15/+13
|
* Remove blowfishMatt Johnston2020-06-103-12/+0
|
* avoid zero length array in base64_decodeMatt Johnston2020-06-101-3/+9
|
* Merge libtomcrypt v1.18.2Matt Johnston2020-06-1045-138/+388
|
* Fix whitespace changes vs upstream libtomcryptMatt Johnston2020-06-1011-1213/+1213
|
* Sync curve25519 licenseVladislav Grishenko2020-05-311-2/+1
|
* Set IOV_MAX for IRIXKazuo Kuroi2020-06-101-4/+6
|
* void return types for curve25519Matt Johnston2020-05-303-16/+9
|
* Remove unused DEBUG_FORKGPROFMatt Johnston2020-05-292-11/+0
|
* Fix ChaCha20 on 32-bit platforms (#99)Vladislav Grishenko2020-05-292-6/+6
| | | | | | | | | | | | | * Fix ChaCha20 on 32-bit platforms On 32-bit platforms with old compiler STORE64H() parameter is not auto-expanded to 64-bit value, causing wrong IV data. Spotted on BCM4706 MIPS32r2 with GCC 4.2.4: Exit before auth: Integrity error (bad packet size 2065808956) * Fix Chacha20-Poly1305 and AES-GCM debug messages Functions were renamed earlier and trace messages - not.
* Don't warn when SO_PRIORITY failsMatt Johnston2020-05-281-3/+3
|
* Fix typo DROPBEAR_NORMAL_DHMatt Johnston2020-05-282-4/+4
|
* Allow DH to be completely disabled (#97)Vladislav Grishenko2020-05-285-4/+14
| | | | | | Reduces binary size by ~2kB by default and by 21kB with no other libtommath functions users, ex. with curve25519 kex and ed25519 key only.
* Fix warning for unused prngd branchMatt Johnston2020-05-281-1/+1
|
* Fix indentation and add bracesMatt Johnston2020-05-281-4/+6
|
* mergeMatt Johnston2020-05-281-1/+2
|\
| * Avoid oss-fuzz $SANITIZER causing wrong buildMatt Johnston2020-05-271-1/+2
| | | | | | | | https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=22608
* | Use Linux getrandom() to ensure random device is initialisedMatt Johnston2020-05-283-56/+97
| | | | | | | | | | Remove old code warning about random device being not ready, /dev/random isn't used by default anyway.
* | set up early logging nameMatt Johnston2020-05-281-1/+7
| |
* | initialise variable to stop warningMatt Johnston2020-05-281-1/+1
|/
* Mention libtom version requirements, check for poly1305 in libtomcryptMatt Johnston2020-05-271-5/+6
|
* Bring back -Werror and improve travis testsMatt Johnston2020-05-261-12/+16
|
* Update LibTomMath to 1.2.0 (#84)Steffen Jaeckel2020-05-26229-31297/+6033
| | | | | | | | | | | | | | | | | | | | * update C files * update other files * update headers * update makefiles * remove mp_set/get_double() * use ltm 1.2.0 API * update ltm_desc * use bundled tommath if system-tommath is too old * XMALLOC etc. were changed to MP_MALLOC etc.
* try rearrange travis build matrixMatt Johnston2020-05-261-6/+4
|
* .travis.yml needs spaces not tabsMatt Johnston2020-05-261-4/+4
|
* update travis to Ubuntu focal to provide chacha20Matt Johnston2020-05-261-3/+5
|
* Fix untested rsa-sha256 change to fuzzer-verifyMatt Johnston2020-05-261-1/+2
|
* Make "dbclient -m help -c help" workMatt Johnston2020-05-262-28/+26
|
* fix typoMatt Johnston2020-05-261-1/+1
|
* Get rid of unused "none" cipher optionMatt Johnston2020-05-261-6/+0
|
* cast to fix warningMatt Johnston2020-05-261-1/+1
|
* merge rsa-sha256Matt Johnston2020-05-2636-267/+697
|\
| * rsa-sha256 for ssh-agentMatt Johnston2020-05-253-4/+13
| |
| * send and handle SSH_MSG_EXT_INFO only at the correct pointMatt Johnston2020-05-2413-22/+46
| | | | | | | | | | - other fixes for rsa pubkey auth - only include ext-info handling when rsa pubkey auth is compiled
| * run linterMatt Johnston2020-05-241-0/+1
| |
| * Add linter for #ifdefMatt Johnston2020-05-243-1/+13
| |
| * Make server send SSH_MSG_EXT_INFOMatt Johnston2020-05-216-29/+75
| | | | | | | | Ensure that only valid hostkey algorithms are sent in the first kex guess
| * Make DEBUG_NOFORK a #if not #ifdefMatt Johnston2020-05-212-2/+4
| |
| * ext-info handling for server-sig-algsMatt Johnston2020-05-1916-90/+255
| | | | | | | | only client side is handled
| * split signkey_type and signature_type for RSA sha1 vs sha256Matt Johnston2020-05-1710-68/+148
| |
| * use sigtype where appropriateMatt Johnston2020-04-0618-142/+233
| |
* | CBC mode cleanup (#95)Vladislav Grishenko2020-05-253-2/+10
| | | | | | | | | | | | * Fix CBC mode can't be fully disabled * Fix CBC mode can't be the only mode
* | Add Chacha20-Poly1305, AES128-GCM and AES256-GCM support (#93)Vladislav Grishenko2020-05-2513-56/+560
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Add Chacha20-Poly1305 authenticated encryption * Add general AEAD approach. * Add chacha20-poly1305@openssh.com algo using LibTomCrypt chacha and poly1305 routines. Chacha20-Poly1305 is generally faster than AES256 on CPU w/o dedicated AES instructions, having the same key size. Compiling in will add ~5,5kB to binary size on x86-64. function old new delta chacha_crypt - 1397 +1397 _poly1305_block - 608 +608 poly1305_done - 595 +595 dropbear_chachapoly_crypt - 457 +457 .rodata 26976 27392 +416 poly1305_process - 290 +290 poly1305_init - 221 +221 chacha_setup - 218 +218 encrypt_packet 1068 1270 +202 dropbear_chachapoly_getlength - 147 +147 decrypt_packet 756 897 +141 chacha_ivctr64 - 137 +137 read_packet 543 637 +94 dropbear_chachapoly_start - 94 +94 read_kex_algos 792 880 +88 chacha_keystream - 69 +69 dropbear_mode_chachapoly - 48 +48 sshciphers 280 320 +40 dropbear_mode_none 24 48 +24 dropbear_mode_ctr 24 48 +24 dropbear_mode_cbc 24 48 +24 dropbear_chachapoly_mac - 24 +24 dropbear_chachapoly - 24 +24 gen_new_keys 848 854 +6 ------------------------------------------------------------------------------ (add/remove: 14/0 grow/shrink: 10/0 up/down: 5388/0) Total: 5388 bytes * Add AES128-GCM and AES256-GCM authenticated encryption * Add general AES-GCM mode. * Add aes128-gcm@openssh.com and aes256-gcm@openssh.com algo using LibTomCrypt gcm routines. AES-GCM is combination of AES CTR mode and GHASH, slower than AES-CTR on CPU w/o dedicated AES/GHASH instructions therefore disabled by default. Compiling in will add ~6kB to binary size on x86-64. function old new delta gcm_process - 1060 +1060 .rodata 26976 27808 +832 gcm_gf_mult - 820 +820 gcm_add_aad - 660 +660 gcm_shift_table - 512 +512 gcm_done - 471 +471 gcm_add_iv - 384 +384 gcm_init - 347 +347 dropbear_gcm_crypt - 309 +309 encrypt_packet 1068 1270 +202 decrypt_packet 756 897 +141 gcm_reset - 118 +118 read_packet 543 637 +94 read_kex_algos 792 880 +88 sshciphers 280 360 +80 gcm_mult_h - 80 +80 dropbear_gcm_start - 62 +62 dropbear_mode_gcm - 48 +48 dropbear_mode_none 24 48 +24 dropbear_mode_ctr 24 48 +24 dropbear_mode_cbc 24 48 +24 dropbear_ghash - 24 +24 dropbear_gcm_getlength - 24 +24 gen_new_keys 848 854 +6 ------------------------------------------------------------------------------ (add/remove: 14/0 grow/shrink: 10/0 up/down: 6434/0) Total: 6434 bytes
* | Mention Ed25519 in dropbearkey man (#94)Vladislav Grishenko2020-05-251-1/+2
| |