Commit Graph

86 Commits

Author SHA1 Message Date
Sergey Ponomarev 8aadb12835
openssh-keygen: Make ssh-keygen as an alternative to dropbearkey
The DropBear's dropbearkey tool is compatible with OpenSSH
ssh-keygen.
It was set by default as the /usr/bin/ssh-keygen program since
the PR https://github.com/openwrt/openwrt/pull/14174
Now if a user need for a full ssh-keygen the openssh-keygen package
should substitute it gracefully as an alternative.

Signed-off-by: Sergey Ponomarev <stokito@gmail.com>
Link: https://github.com/openwrt/packages/pull/22861
[ wrap to 80 columns ]
Link: https://github.com/openwrt/packages/pull/22861
Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2024-05-06 13:44:08 +02:00
John Audia 6be0617c00 openssh: bump to 9.7p1
Release notes: https://www.openssh.com/txt/release-9.7

Removed upstreamed patch: 010-better_fzero-call-detection.patch

Build system: x86/64
Build-tested: x86/64/AMD Cezanne
Run-tested: x86/64/AMD Cezanne

Signed-off-by: John Audia <therealgraysky@proton.me>
2024-03-19 23:07:15 +01:00
Sibren Vasse a79c49578c openssh: fix build failure on powerpc_8548
1036d77b34

Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2024-01-06 13:48:02 -08:00
Rucke Teg e8dfc6abbe openssh: bump to 9.6p1
Release notes: https://www.openssh.com/txt/release-9.6

Signed-off-by: Rucke Teg <rucketeg@protonmail.com>
2024-01-06 13:48:02 -08:00
John Audia 6dc86d46da openssh: bump to 9.5p1
Changelog: https://www.openssh.com/txt/release-9.5

Build system: x86/64
Build-tested: x86/64/AMD Cezanne
Run-tested: x86/64/AMD Cezanne

Signed-off-by: John Audia <therealgraysky@proton.me>
2023-10-05 14:37:59 -07:00
Sibren Vasse 7fb8e823b9 openssh: update to 9.4p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-08-13 10:53:39 +08:00
Philip Prindeville ead95a26b6 openssh: add server config subdirectory
Most distros allow dropping site configuration files into
/etc/sshd_config.d/ so that you don't have to tweak the main
server configuration file.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-08-07 16:39:56 -07:00
Sibren Vasse 731f0d70a8 openssh: update to 9.3p2
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-08-04 16:51:45 +08:00
Darren Tucker 74c4ad2c0c openssh: sftp no longer needs crypto or zlib.
OpenSSH 9.1p1 removed remaining dependencies and stopped linking sftp,
sftp-server and scp against libcrypto or libz.  This change moves those
package dependencies from the default to those that still need them.
In particular, this will allow sftp-server to be installed for use with
Dropbear without needing to install zlib or openssl.

Signed-off-by: Darren Tucker <dtucker@dtucker.net>
2023-05-17 11:02:19 +03:00
Darren Tucker 1daddd582f openssh: Use CDN first for source downloads.
Also point to https for website.

Signed-off-by: Darren Tucker <dtucker@dtucker.net>
2023-05-17 11:02:19 +03:00
Erik Karlsson 7029af834c openssh: add respawn and reloading via signal
Configure the openssh server to respawn. Reload by sending SIGHUP

Signed-off-by: Erik Karlsson <erik.karlsson@genexis.eu>
2023-05-01 13:34:10 +03:00
Glen Huang e36a55c9ed openssh: preserve authorized_keys
The root user is usually the user that clients ssh into with, so in most
cases its authorized_keys determines what clients are allowed to ssh
into this device. Without preserving this file, they could potentially
be locked out after upgrading.

Signed-off-by: Glen Huang <me@glenhuang.com>
2023-04-25 07:23:01 +03:00
Sibren Vasse 2c755759df openssh: update to 9.3p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-03-18 14:09:24 -07:00
Sibren Vasse d41e918a36 openssh: actually build openssh-server-pam with pam support
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-02-03 10:10:36 -08:00
Sibren Vasse 5c43c1bade openssh: update to 9.2p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-02-03 10:10:36 -08:00
Sibren Vasse ba8cb7c16c openssh: update to 9.1p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2022-12-13 10:04:27 +08:00
Sibren Vasse 08b45115d7 openssh: update to 9.0p1
Remove upstreamed patches.

Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2022-04-13 15:46:37 -07:00
Michal Vasilek ee7aae202a openssh: update to 8.9p1
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2022-03-16 19:53:38 -07:00
Rucke Teg f2a8fc48c5 openssh-server: manually set path to passwd binary
In the build environment the autotools finds the `passwd` binary in
/usr/bin. But in the target image it is available under /bin instead.
Manually set the path to `passwd` binary to `/bin/passwd`

Signed-off-by: Rucke Teg <rucketeg@protonmail.com>
2022-02-10 21:10:08 -08:00
Rucke Teg fb113c5a70 openssh-server: change sshd.failsafe
There is no need to remove root password from /etc/shadow as the
password in the file is blank anyway in the failsafe mode.

Signed-off-by: Rucke Teg <rucketeg@protonmail.com>
2022-02-10 21:10:08 -08:00
Huangbin Zhan 2689a0d11d openssh-server-pam: add key files as conffiles
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2021-11-12 11:04:02 -08:00
Huangbin Zhan 159e12381f openssh: keep same permission for /etc/ssh
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2021-11-12 11:04:02 -08:00
Sibren Vasse 1a773dd20e openssh: update to 8.8p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2021-09-27 11:06:52 -07:00
Sibren Vasse 89ab4ebcdb
openssh: update to 8.7p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2021-08-25 15:24:38 +02:00
Sibren Vasse cb1d8bd8ed openssh: update to 8.6p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2021-04-20 12:28:30 +02:00
Sibren Vasse 16e41bcd33
openssh: update to 8.5p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2021-03-03 11:38:32 +01:00
Linos Giannopoulos 855db864b0 openssh: Add FIDO2 hardware token support
Version 8.2[0] added support for two new key types: "ecdsa-sk" and
"ed25519-sk". These two type enable the usage of hardware tokens that
implement the FIDO (or FIDO2) standard, as an authentication method for
SSH.

Since we're already on version 8.4 all we need to do is to explicitly enable
the support for hardware keys when compiling OpenSSH and add all the
missing dependencies OpenSSH requires.

OpenSSH depends on libfido2[1], to communicate with the FIDO devices
over USB. In turn, libfido2 depends on libcbor, a C implementation of
the CBOR protocol[2] and OpenSSL.

[0]: https://lwn.net/Articles/812537/
[1]: https://github.com/Yubico/libfido2
[2]: tools.ietf.org/html/rfc7049

Signed-off-by: Linos Giannopoulos <linosgian00@gmail.com>
2021-01-07 00:53:05 +02:00
Huangbin Zhan 75c4617bcf treewide: move binary of alternatives to libexec, rename as suggested
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2020-10-08 20:22:51 +08:00
Kyle Copperfield 45863b94ca openssh: add openwrt failsafe support
Adds failsafe support to the openssh package.
Roughly based on an earlier patch.

Ref: https://github.com/openwrt/openwrt/pull/865
Signed-off-by: Jeff Kletsky <git-commits@allycomm.com>
Signed-off-by: Kyle Copperfield <kmcopper@danwin1210.me>
2020-12-15 10:19:32 +00:00
Yuan Tao 27e8c832d6 openssh: update to 8.4p1
Signed-off-by: Yuan Tao <ty@wevs.org>
2020-10-05 15:20:26 +08:00
Huangbin Zhan 704e733e51 treewide: fix broken conffiles
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2020-07-07 18:29:13 +08:00
Rosen Penev 8e77b50954
openssh: update to 8.3p1
Removed outdated options.

Small bashism fix in the init script.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-06-25 17:38:55 -07:00
Rosen Penev 69c297971c
openssh: always enable stackprotect option
b933f9cf0cb254e368027cad6d5799e45b237df5 in base made several changes
to OpenWrt's libssp support. It seems this workaround is no longer
needed.

Simplified the configure script slightly.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-06-20 00:17:37 -07:00
Philip Prindeville 73fa0c963d openssh-server: deprecate the ecdsa HostKey
The init.d script for sshd never generates an ecdsa HostKey as seen
here:

	for type in rsa ed25519
	do
		# check for keys
		key=/etc/ssh/ssh_host_${type}_key
		[ ! -f $key ] && {
			# generate missing keys
			[ -x /usr/bin/ssh-keygen ] && {
				/usr/bin/ssh-keygen -N '' -t $type -f $key 2>&- >&-
			}
		}
	done

so we'll never succeed at loading one.  Get rid of the resultant
error message in logging:

May  5 17:13:59 OpenWrt sshd[20070]: error: Unable to load host key: /etc/ssh/ssh_host_ecdsa_key

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2020-05-05 18:03:56 -06:00
Peter Wagner 45c0fde75d openssh: don't create ECDSA keys
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2020-04-06 10:18:50 +02:00
Sibren Vasse 19a5edd35f openssh: update to 8.2p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2020-04-05 14:05:11 +02:00
Sibren Vasse 0c2554222f openssh: update to 8.1p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2019-11-09 15:17:35 +01:00
Jeffery To 53e1692ae9 treewide: Use default PKG_BUILD_DIR when possible
This removes lines that set PKG_BUILD_DIR when the set value is no
different from the default value.

Specifically, the line is removed if the assigned value is:

* $(BUILD_DIR)/$(PKG_NAME)-$(BUILD_VARIANT)/$(PKG_NAME)-$(PKG_VERSION)

  The default PKG_BUILD_DIR was updated[1] to incorporate BUILD_VARIANT
  if it is set, so now this is identical to the default value.

* $(BUILD_DIR)/$(PKG_NAME)-$(BUILD_VARIANT)/$(PKG_SOURCE_SUBDIR)

  if PKG_SOURCE_SUBDIR is set to $(PKG_NAME)-$(PKG_VERSION), making it
  the same as the previous case

* $(BUILD_DIR)/$(PKG_NAME)-$(PKG_VERSION)

  This is the same as the default PKG_BUILD_DIR when there is no
  BUILD_VARIANT.

* $(BUILD_DIR)/[name]-$(PKG_VERSION)

  where [name] is a string that is identical to PKG_NAME

[1]: https://git.openwrt.org/?p=openwrt/openwrt.git;a=commit;h=e545fac8d968864a965edb9e50c6f90940b0a6c9

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2019-10-13 02:01:34 +08:00
Jan Pavlinec 299e5b0a9b
treewide: add PKG_CPE_ID for better cvescanner coverage
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-09-17 12:40:26 +02:00
Rosen Penev 5a3e520f45 openssh: Fix compilation with -Wimplicit-function
Upstream backport.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-07-21 12:31:31 +02:00
Peter Wagner 626a4315a9 openssh: update to 8.0p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-04-20 18:09:21 +02:00
Eneas U de Queiroz 06e1764afa
openssh: adjust engine support to openssl 1.1.1
Openssl 1.1.1 package in openwrt enabled more than just the devcrypto
engine, so the engine support in openssh should be enabled when general
engine support is enabled in openssl.

Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
2019-04-02 16:48:08 -03:00
Peter Wagner 594a884c2d openssh: use quotes
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-03-22 20:29:52 +01:00
Peter Wagner ba72d8d139 openssh: handle multiple ports and simplify init script
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-03-21 19:31:29 +01:00
Peter Wagner d92d34db5a openssh: add upstream patches, including CVE-2019-6111
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-03-03 12:20:18 +01:00
Jan Pavlinec 4729c3fddf openssh: patch scp security issues
Fixes
CVE-2019-6109
CVE-2019-6111

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-02-10 16:22:41 +01:00
Peter Wagner d82cc22019 openssh: backport patch for CVE-2018-20685
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-01-15 20:34:03 +01:00
Peter Wagner 08c5f7cfab openssh: fixes issues with some openssl options
This adds a couple of patches when setting some openssl options:
* ECDSA code in openssh-compat.h and libressl-api-compat.c needs to be
  be guarded by OPENSSL_HAS_ECC; otherwise, it will not build with
  openssl compiled without ECC support.

* Fix openssl version number in openbsd-compat/openssl-compat.c which
  failed to compile --with-ssl-engine; this option is used when
  CONFIG_OPENSSL_ENGINE_CRYPTO=y

Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2018-10-20 14:06:20 +02:00
Peter Wagner 2759048914 openssh: update to 7.9p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2018-10-19 18:11:54 +02:00
Eneas U de Queiroz 9f76fe1445 openssh: add openssl 1.1.0 compatibility
Five commits from upstream were applied to v. 7.8-p1:

482d23bc upstream: hold our collective noses and use the openssl-1.1.x
         API in
48f54b9d adapt -portable to OpenSSL 1.1x API
86e0a9f3 upstream: use only openssl-1.1.x API here too
a3fd8074 upstream: missed a bit of openssl-1.0.x API in this unittest
d64e7852 add compat header

Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
2018-09-30 18:59:04 +02:00