Thorsten Horstmann
abeb9d64a3
Some minor typo fixes, found by codespell.
2015-02-24 20:45:07 +08:00
Thorsten Horstmann
fdb7ffa864
DROPBEAR_ prefix for include guards to avoid collisions
2015-02-24 20:43:01 +08:00
Matt Johnston
46845fd3e8
get rid of some unnecessary code
...
--HG--
branch : fastopen
2015-02-21 00:43:32 +08:00
Matt Johnston
c53ca6ebc0
avoid some warnings
...
--HG--
branch : fastopen
2015-02-20 23:43:59 +08:00
Matt Johnston
f04a3a2cfa
Fixes for backwards compatibility
...
--HG--
branch : fastopen
2015-02-20 23:38:05 +08:00
Matt Johnston
364a53577e
Move generic network routines to netio.c
...
--HG--
branch : fastopen
2015-02-20 23:16:38 +08:00
Matt Johnston
1b1997bf2d
Update priority once the socket is open
...
--HG--
branch : fastopen
2015-02-20 22:13:53 +08:00
Matt Johnston
34f9adb1c9
merge
...
--HG--
branch : fastopen
2015-02-19 22:42:30 +08:00
Matt Johnston
2e7d468b90
Add the missing second half of iov code
...
--HG--
branch : fastopen
2015-02-19 22:41:51 +08:00
Matt Johnston
86a717c80c
fallback for old glibc and fastopen
...
memset rather than = {0} initialiser
--HG--
branch : fastopen
2015-02-19 22:33:51 +08:00
Matt Johnston
76a3eb393c
In theory TFO should work. Needs platform cleanup and testing
...
--HG--
branch : fastopen
2015-02-19 00:32:00 +08:00
Matt Johnston
5f0cc969a0
generalise write iovec handling
...
--HG--
branch : fastopen
2015-02-18 23:02:49 +08:00
Matt Johnston
755c1458f0
async connections working
...
--HG--
branch : fastopen
2015-02-18 22:46:15 +08:00
Matt Johnston
8795d733ec
work in progress for async connect
...
--HG--
branch : fastopen
2015-02-18 00:05:27 +08:00
Matt Johnston
28f61c8b3a
tcp fastopen for the server
...
--HG--
branch : fastopen
2015-02-15 22:34:05 +08:00
Matt Johnston
9abcc7b909
connect_remote() is now always non-blocking
2015-02-14 09:56:11 +08:00
Matt Johnston
2c35f1c8fd
Add envirnonment variable for debug timestamps to roughly match
...
network timestamps (in tshark)
2015-02-13 23:47:53 +08:00
Matt Johnston
136188259e
Fix print that no longer works since we're not using fourCCs
2015-02-13 23:17:23 +08:00
Matt Johnston
02179b1218
merge
2015-02-13 23:15:12 +08:00
Matt Johnston
1e350de136
Make it compile
2015-02-13 23:13:58 +08:00
Matt Johnston
9aeda4c5bd
piggyback data on acks when making connections on linux
2015-02-13 22:49:15 +08:00
Matt Johnston
8eb30c353a
debug should be off by default
2015-02-13 21:45:15 +08:00
Matt Johnston
c44a78a2e6
Tighten validation of DH values. Odds of x==0 being generated are
...
improbable, roughly 2**-1023
Regression in 0.49
2015-02-10 21:46:19 +08:00
Matt Johnston
b6685bf806
twofish ctr modes
2015-02-04 22:12:06 +08:00
Matt Johnston
269d690e71
Added signature for changeset 1d2d81b1b7c1
2015-01-29 21:42:01 +08:00
Matt Johnston
4df268f10e
sha256
2015-01-28 22:58:52 +08:00
Matt Johnston
19b3f01477
bump version
2015-01-28 22:57:33 +08:00
Matt Johnston
86811f4765
Added tag DROPBEAR_2015.67 for changeset cbd674d63cd4
2015-01-28 22:55:27 +08:00
Matt Johnston
dd0352d93b
changelog for 2015.67
2015-01-28 22:54:23 +08:00
Matt Johnston
30ec18d938
merge
2015-01-28 22:49:40 +08:00
Matt Johnston
9d495ab2b5
changes for 2015.67
2015-01-28 22:49:28 +08:00
Matt Johnston
9174de47a9
Fix bad multi-statement define for m_free(), detected by Coverity
2015-01-28 22:43:01 +08:00
Christian Engelmayer
d857faf18e
When clearing the memory of 'key' in function openssh_read(), only the size
...
of the pointer to the data instead of the whole size of struct openssh_key
is cleared. Correct the size calculation as detected by Coverity CID 1191543.
2015-01-28 22:42:29 +08:00
Matt Johnston
d5c8ba1690
Initialise sa_mask
2015-01-28 22:33:34 +08:00
Matt Johnston
9bb9b4829d
Fix memory leak of ecdsa structure, found by Coverity
2015-01-28 22:29:18 +08:00
Matt Johnston
e25c297c3c
Document ~/.ssh/id_dropbear
2015-01-28 22:22:32 +08:00
Matt Johnston
4de876f259
Keep sha1 default
2015-01-28 22:14:07 +08:00
Elan Ruusamäe
b9073961f7
Allow configure with libtomcrypt/libtommath directories missing
...
if using bundled libraries
2015-01-28 22:05:24 +08:00
Matt Johnston
a7a79d569a
Disable non-delayed zlib for server
2015-01-28 21:38:27 +08:00
Matt Johnston
6165f53fcd
Default client key path ~/.ssh/id_dropbear
2015-01-24 00:05:26 +08:00
Fedor Brunner
4122cac66b
Prefer stronger algorithms in algorithm negotiation.
...
Prefer diffie-hellman-group14-sha1 (2048 bit) over
diffie-hellman-group1-sha1 (1024 bit).
Due to meet-in-the-middle attacks the effective key length of
three key 3DES is 112 bits. AES is stronger and faster then 3DES.
Prefer to delay the start of compression until after authentication
has completed. This avoids exposing compression code to attacks
from unauthenticated users.
(github pull request #9 )
2015-01-23 23:00:25 +08:00
Like Ma
a1dcebe4f4
Fix installing dropbear.8 error when building in a separate directory.
...
(fix pull request #6 )
2015-01-23 22:59:30 +08:00
Matt Johnston
6cbb23a819
Add config option to disable cbc. Disable twofish by default
2015-01-23 22:37:14 +08:00
Like Ma
5c57a31184
Fix variables may be uninitialized.
...
(fixup of pull request #7 )
2015-01-23 22:23:23 +08:00
Fedor Brunner
7b2c42aa75
Integrity error (bad packet size %u) negative length
...
When corrupted packet is received negative length of packet is
displayed.
(re-apply of pull request #8 )
2015-01-23 22:21:06 +08:00
Matt Johnston
1ed8d3938e
Enable sha2 HMACs by default, they're required for ecdsa already
2015-01-13 20:55:04 +08:00
Matt Johnston
b24984deb3
clear hash state memory after use
2015-01-04 23:10:59 +08:00
Matt Johnston
eabd9f5e60
clarify bad/unknown
2015-01-04 22:32:38 +08:00
Catalin Patulea
d4609682af
Handle invalid agent keys by skipping rather than exiting.
...
My agent exposes both conventional keys and certs (ecdsa-sha2-nistp256-cert-v01@openssh.com ) and I want dropbear to be able to use the former.
2015-01-01 17:47:46 -05:00
Matt Johnston
634415f79e
Open directories O_RDONLY for fsync, add debugging if it fails
2015-01-04 22:22:43 +08:00