summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBryan Drewery <bdrewery@FreeBSD.org>2015-11-11 21:04:48 +0000
committerBryan Drewery <bdrewery@FreeBSD.org>2015-11-11 21:04:48 +0000
commit7c7778bb96fbce9b6a9671e40f50b5f0bc354b29 (patch)
tree390ddb8f0120607a02f693bd5250f40db29b1f67
parentFix dependencies again since r401229 partially reverted r398897, which was (diff)
Fix the NONECIPHER not actually being offered by the server.
Upstream issue: https://github.com/rapier1/openssh-portable/issues/3
Notes
Notes: svn path=/head/; revision=401298
-rw-r--r--security/openssh-portable/Makefile2
-rw-r--r--security/openssh-portable/files/extra-patch-hpn48
2 files changed, 25 insertions, 25 deletions
diff --git a/security/openssh-portable/Makefile b/security/openssh-portable/Makefile
index 44a6d314c0bf..4200247862a4 100644
--- a/security/openssh-portable/Makefile
+++ b/security/openssh-portable/Makefile
@@ -3,7 +3,7 @@
PORTNAME= openssh
DISTVERSION= 7.1p1
-PORTREVISION= 3
+PORTREVISION= 4
PORTEPOCH= 1
CATEGORIES= security ipv6
MASTER_SITES= OPENBSD/OpenSSH/portable
diff --git a/security/openssh-portable/files/extra-patch-hpn b/security/openssh-portable/files/extra-patch-hpn
index 2155fd45ab29..179a96653bde 100644
--- a/security/openssh-portable/files/extra-patch-hpn
+++ b/security/openssh-portable/files/extra-patch-hpn
@@ -481,19 +481,6 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
debug("kex: %s %s %s %s",
ctos ? "client->server" : "server->client",
newkeys->enc.name,
---- work.clean/openssh-6.8p1/myproposal.h 2015-03-17 00:49:20.000000000 -0500
-+++ work/openssh-6.8p1/myproposal.h 2015-04-03 16:43:33.747402000 -0500
-@@ -171,6 +171,10 @@
- #define KEX_DEFAULT_COMP "none,zlib@openssh.com,zlib"
- #define KEX_DEFAULT_LANG ""
-
-+#ifdef NONE_CIPHER_ENABLED
-+#define KEX_ENCRYPT_INCLUDE_NONE KEX_SERVER_ENCRYPT ",none"
-+#endif
-+
- #define KEX_CLIENT \
- KEX_CLIENT_KEX, \
- KEX_DEFAULT_PK_ALG, \
--- work.clean/openssh-6.8p1/packet.c 2015-03-17 00:49:20.000000000 -0500
+++ work/openssh-6.8p1/packet.c 2015-04-03 16:10:57.002066000 -0500
@@ -2199,6 +2199,24 @@
@@ -1199,9 +1186,9 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
debug("Authentication succeeded (%s).", authctxt.method->name);
}
---- work.clean/openssh-6.8p1/sshd.c.orig 2015-08-17 17:01:06.925269000 -0700
-+++ work.clean/openssh-6.8p1/sshd.c 2015-08-17 17:05:40.008253000 -0700
-@@ -438,8 +438,13 @@ sshd_exchange_identification(int sock_in
+--- work.clean/openssh-7.1p1/sshd.c.orig 2015-08-20 21:49:03.000000000 -0700
++++ work.clean/openssh-7.1p1/sshd.c 2015-11-11 12:45:48.202186000 -0800
+@@ -431,8 +431,13 @@ sshd_exchange_identification(int sock_in
minor = PROTOCOL_MINOR_1;
}
@@ -1216,7 +1203,7 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
*options.version_addendum == '\0' ? "" : " ",
options.version_addendum, newline);
-@@ -1162,6 +1167,10 @@ server_listen(void)
+@@ -1155,6 +1160,10 @@ server_listen(void)
int ret, listen_sock, on = 1;
struct addrinfo *ai;
char ntop[NI_MAXHOST], strport[NI_MAXSERV];
@@ -1227,7 +1214,7 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
for (ai = options.listen_addrs; ai; ai = ai->ai_next) {
if (ai->ai_family != AF_INET && ai->ai_family != AF_INET6)
-@@ -1202,6 +1211,13 @@ server_listen(void)
+@@ -1195,6 +1204,13 @@ server_listen(void)
debug("Bind to port %s on %s.", strport, ntop);
@@ -1241,7 +1228,23 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
/* Bind the socket to the desired port. */
if (bind(listen_sock, ai->ai_addr, ai->ai_addrlen) < 0) {
error("Bind to port %s on %s failed: %.200s.",
-@@ -2130,6 +2146,11 @@ main(int ac, char **av)
+@@ -1693,6 +1709,15 @@ main(int ac, char **av)
+ /* Fill in default values for those options not explicitly set. */
+ fill_default_server_options(&options);
+
++#ifdef NONE_CIPHER_ENABLED
++ if (options.none_enabled == 1) {
++ char *old_ciphers = options.ciphers;
++
++ xasprintf(&options.ciphers, "%s,none", old_ciphers);
++ free(old_ciphers);
++ }
++#endif
++
+ /* challenge-response is implemented via keyboard interactive */
+ if (options.challenge_response_authentication)
+ options.kbd_interactive_authentication = 1;
+@@ -2123,6 +2148,11 @@ main(int ac, char **av)
cleanup_exit(255);
}
@@ -1253,16 +1256,13 @@ diff -urN -x configure -x config.guess -x config.h.in -x config.sub work.clean/o
/*
* We use get_canonical_hostname with usedns = 0 instead of
* get_remote_ipaddr here so IP options will be checked.
-@@ -2564,6 +2585,14 @@ do_ssh2_kex(void)
+@@ -2539,6 +2569,11 @@ do_ssh2_kex(void)
struct kex *kex;
int r;
+#ifdef NONE_CIPHER_ENABLED
-+ if (options.none_enabled == 1) {
++ if (options.none_enabled == 1)
+ debug ("WARNING: None cipher enabled");
-+ myproposal[PROPOSAL_ENC_ALGS_CTOS] =
-+ myproposal[PROPOSAL_ENC_ALGS_STOC] = KEX_ENCRYPT_INCLUDE_NONE;
-+ }
+#endif
+
myproposal[PROPOSAL_KEX_ALGS] = compat_kex_proposal(