Commit graph

84 commits

Author SHA1 Message Date
Sibren Vasse
a79c49578c openssh: fix build failure on powerpc_8548
1036d77b34

Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2024-01-06 13:48:02 -08:00
Rucke Teg
e8dfc6abbe openssh: bump to 9.6p1
Release notes: https://www.openssh.com/txt/release-9.6

Signed-off-by: Rucke Teg <rucketeg@protonmail.com>
2024-01-06 13:48:02 -08:00
John Audia
6dc86d46da openssh: bump to 9.5p1
Changelog: https://www.openssh.com/txt/release-9.5

Build system: x86/64
Build-tested: x86/64/AMD Cezanne
Run-tested: x86/64/AMD Cezanne

Signed-off-by: John Audia <therealgraysky@proton.me>
2023-10-05 14:37:59 -07:00
Sibren Vasse
7fb8e823b9 openssh: update to 9.4p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-08-13 10:53:39 +08:00
Philip Prindeville
ead95a26b6 openssh: add server config subdirectory
Most distros allow dropping site configuration files into
/etc/sshd_config.d/ so that you don't have to tweak the main
server configuration file.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-08-07 16:39:56 -07:00
Sibren Vasse
731f0d70a8 openssh: update to 9.3p2
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-08-04 16:51:45 +08:00
Darren Tucker
74c4ad2c0c openssh: sftp no longer needs crypto or zlib.
OpenSSH 9.1p1 removed remaining dependencies and stopped linking sftp,
sftp-server and scp against libcrypto or libz.  This change moves those
package dependencies from the default to those that still need them.
In particular, this will allow sftp-server to be installed for use with
Dropbear without needing to install zlib or openssl.

Signed-off-by: Darren Tucker <dtucker@dtucker.net>
2023-05-17 11:02:19 +03:00
Darren Tucker
1daddd582f openssh: Use CDN first for source downloads.
Also point to https for website.

Signed-off-by: Darren Tucker <dtucker@dtucker.net>
2023-05-17 11:02:19 +03:00
Erik Karlsson
7029af834c openssh: add respawn and reloading via signal
Configure the openssh server to respawn. Reload by sending SIGHUP

Signed-off-by: Erik Karlsson <erik.karlsson@genexis.eu>
2023-05-01 13:34:10 +03:00
Glen Huang
e36a55c9ed openssh: preserve authorized_keys
The root user is usually the user that clients ssh into with, so in most
cases its authorized_keys determines what clients are allowed to ssh
into this device. Without preserving this file, they could potentially
be locked out after upgrading.

Signed-off-by: Glen Huang <me@glenhuang.com>
2023-04-25 07:23:01 +03:00
Sibren Vasse
2c755759df openssh: update to 9.3p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-03-18 14:09:24 -07:00
Sibren Vasse
d41e918a36 openssh: actually build openssh-server-pam with pam support
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-02-03 10:10:36 -08:00
Sibren Vasse
5c43c1bade openssh: update to 9.2p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-02-03 10:10:36 -08:00
Sibren Vasse
ba8cb7c16c openssh: update to 9.1p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2022-12-13 10:04:27 +08:00
Sibren Vasse
08b45115d7 openssh: update to 9.0p1
Remove upstreamed patches.

Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2022-04-13 15:46:37 -07:00
Michal Vasilek
ee7aae202a openssh: update to 8.9p1
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2022-03-16 19:53:38 -07:00
Rucke Teg
f2a8fc48c5 openssh-server: manually set path to passwd binary
In the build environment the autotools finds the `passwd` binary in
/usr/bin. But in the target image it is available under /bin instead.
Manually set the path to `passwd` binary to `/bin/passwd`

Signed-off-by: Rucke Teg <rucketeg@protonmail.com>
2022-02-10 21:10:08 -08:00
Rucke Teg
fb113c5a70 openssh-server: change sshd.failsafe
There is no need to remove root password from /etc/shadow as the
password in the file is blank anyway in the failsafe mode.

Signed-off-by: Rucke Teg <rucketeg@protonmail.com>
2022-02-10 21:10:08 -08:00
Huangbin Zhan
2689a0d11d openssh-server-pam: add key files as conffiles
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2021-11-12 11:04:02 -08:00
Huangbin Zhan
159e12381f openssh: keep same permission for /etc/ssh
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2021-11-12 11:04:02 -08:00
Sibren Vasse
1a773dd20e openssh: update to 8.8p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2021-09-27 11:06:52 -07:00
Sibren Vasse
89ab4ebcdb
openssh: update to 8.7p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2021-08-25 15:24:38 +02:00
Sibren Vasse
cb1d8bd8ed openssh: update to 8.6p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2021-04-20 12:28:30 +02:00
Sibren Vasse
16e41bcd33
openssh: update to 8.5p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2021-03-03 11:38:32 +01:00
Linos Giannopoulos
855db864b0 openssh: Add FIDO2 hardware token support
Version 8.2[0] added support for two new key types: "ecdsa-sk" and
"ed25519-sk". These two type enable the usage of hardware tokens that
implement the FIDO (or FIDO2) standard, as an authentication method for
SSH.

Since we're already on version 8.4 all we need to do is to explicitly enable
the support for hardware keys when compiling OpenSSH and add all the
missing dependencies OpenSSH requires.

OpenSSH depends on libfido2[1], to communicate with the FIDO devices
over USB. In turn, libfido2 depends on libcbor, a C implementation of
the CBOR protocol[2] and OpenSSL.

[0]: https://lwn.net/Articles/812537/
[1]: https://github.com/Yubico/libfido2
[2]: tools.ietf.org/html/rfc7049

Signed-off-by: Linos Giannopoulos <linosgian00@gmail.com>
2021-01-07 00:53:05 +02:00
Huangbin Zhan
75c4617bcf treewide: move binary of alternatives to libexec, rename as suggested
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2020-10-08 20:22:51 +08:00
Kyle Copperfield
45863b94ca openssh: add openwrt failsafe support
Adds failsafe support to the openssh package.
Roughly based on an earlier patch.

Ref: https://github.com/openwrt/openwrt/pull/865
Signed-off-by: Jeff Kletsky <git-commits@allycomm.com>
Signed-off-by: Kyle Copperfield <kmcopper@danwin1210.me>
2020-12-15 10:19:32 +00:00
Yuan Tao
27e8c832d6 openssh: update to 8.4p1
Signed-off-by: Yuan Tao <ty@wevs.org>
2020-10-05 15:20:26 +08:00
Huangbin Zhan
704e733e51 treewide: fix broken conffiles
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2020-07-07 18:29:13 +08:00
Rosen Penev
8e77b50954
openssh: update to 8.3p1
Removed outdated options.

Small bashism fix in the init script.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-06-25 17:38:55 -07:00
Rosen Penev
69c297971c
openssh: always enable stackprotect option
b933f9cf0cb254e368027cad6d5799e45b237df5 in base made several changes
to OpenWrt's libssp support. It seems this workaround is no longer
needed.

Simplified the configure script slightly.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-06-20 00:17:37 -07:00
Philip Prindeville
73fa0c963d openssh-server: deprecate the ecdsa HostKey
The init.d script for sshd never generates an ecdsa HostKey as seen
here:

	for type in rsa ed25519
	do
		# check for keys
		key=/etc/ssh/ssh_host_${type}_key
		[ ! -f $key ] && {
			# generate missing keys
			[ -x /usr/bin/ssh-keygen ] && {
				/usr/bin/ssh-keygen -N '' -t $type -f $key 2>&- >&-
			}
		}
	done

so we'll never succeed at loading one.  Get rid of the resultant
error message in logging:

May  5 17:13:59 OpenWrt sshd[20070]: error: Unable to load host key: /etc/ssh/ssh_host_ecdsa_key

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2020-05-05 18:03:56 -06:00
Peter Wagner
45c0fde75d openssh: don't create ECDSA keys
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2020-04-06 10:18:50 +02:00
Sibren Vasse
19a5edd35f openssh: update to 8.2p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2020-04-05 14:05:11 +02:00
Sibren Vasse
0c2554222f openssh: update to 8.1p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2019-11-09 15:17:35 +01:00
Jeffery To
53e1692ae9 treewide: Use default PKG_BUILD_DIR when possible
This removes lines that set PKG_BUILD_DIR when the set value is no
different from the default value.

Specifically, the line is removed if the assigned value is:

* $(BUILD_DIR)/$(PKG_NAME)-$(BUILD_VARIANT)/$(PKG_NAME)-$(PKG_VERSION)

  The default PKG_BUILD_DIR was updated[1] to incorporate BUILD_VARIANT
  if it is set, so now this is identical to the default value.

* $(BUILD_DIR)/$(PKG_NAME)-$(BUILD_VARIANT)/$(PKG_SOURCE_SUBDIR)

  if PKG_SOURCE_SUBDIR is set to $(PKG_NAME)-$(PKG_VERSION), making it
  the same as the previous case

* $(BUILD_DIR)/$(PKG_NAME)-$(PKG_VERSION)

  This is the same as the default PKG_BUILD_DIR when there is no
  BUILD_VARIANT.

* $(BUILD_DIR)/[name]-$(PKG_VERSION)

  where [name] is a string that is identical to PKG_NAME

[1]: https://git.openwrt.org/?p=openwrt/openwrt.git;a=commit;h=e545fac8d968864a965edb9e50c6f90940b0a6c9

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2019-10-13 02:01:34 +08:00
Jan Pavlinec
299e5b0a9b
treewide: add PKG_CPE_ID for better cvescanner coverage
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-09-17 12:40:26 +02:00
Rosen Penev
5a3e520f45 openssh: Fix compilation with -Wimplicit-function
Upstream backport.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-07-21 12:31:31 +02:00
Peter Wagner
626a4315a9 openssh: update to 8.0p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-04-20 18:09:21 +02:00
Eneas U de Queiroz
06e1764afa
openssh: adjust engine support to openssl 1.1.1
Openssl 1.1.1 package in openwrt enabled more than just the devcrypto
engine, so the engine support in openssh should be enabled when general
engine support is enabled in openssl.

Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
2019-04-02 16:48:08 -03:00
Peter Wagner
594a884c2d openssh: use quotes
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-03-22 20:29:52 +01:00
Peter Wagner
ba72d8d139 openssh: handle multiple ports and simplify init script
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-03-21 19:31:29 +01:00
Peter Wagner
d92d34db5a openssh: add upstream patches, including CVE-2019-6111
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-03-03 12:20:18 +01:00
Jan Pavlinec
4729c3fddf openssh: patch scp security issues
Fixes
CVE-2019-6109
CVE-2019-6111

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-02-10 16:22:41 +01:00
Peter Wagner
d82cc22019 openssh: backport patch for CVE-2018-20685
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-01-15 20:34:03 +01:00
Peter Wagner
08c5f7cfab openssh: fixes issues with some openssl options
This adds a couple of patches when setting some openssl options:
* ECDSA code in openssh-compat.h and libressl-api-compat.c needs to be
  be guarded by OPENSSL_HAS_ECC; otherwise, it will not build with
  openssl compiled without ECC support.

* Fix openssl version number in openbsd-compat/openssl-compat.c which
  failed to compile --with-ssl-engine; this option is used when
  CONFIG_OPENSSL_ENGINE_CRYPTO=y

Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2018-10-20 14:06:20 +02:00
Peter Wagner
2759048914 openssh: update to 7.9p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2018-10-19 18:11:54 +02:00
Eneas U de Queiroz
9f76fe1445 openssh: add openssl 1.1.0 compatibility
Five commits from upstream were applied to v. 7.8-p1:

482d23bc upstream: hold our collective noses and use the openssl-1.1.x
         API in
48f54b9d adapt -portable to OpenSSL 1.1x API
86e0a9f3 upstream: use only openssl-1.1.x API here too
a3fd8074 upstream: missed a bit of openssl-1.0.x API in this unittest
d64e7852 add compat header

Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
2018-09-30 18:59:04 +02:00
Peter Wagner
eacb9464e9 openssh: update to 7.8p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2018-08-27 21:30:14 +02:00
Yousong Zhou
1e07e684a8 openssh: let opkg manage openssh symlinks of ssh, scp
Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2018-06-25 14:09:25 +08:00