- May 21, 2017
-
-
Kevin Darbyshire-Bryant authored
- Security: Fix double-free in server TCP listener cleanup A double-free in the server could be triggered by an authenticated user if dropbear is running with -a (Allow connections to forwarded ports from any host) This could potentially allow arbitrary code execution as root by an authenticated user. Affects versions 2013.56 to 2016.74. Thanks to Mark Shepard for reporting the crash. CVE-2017-9078 https://secure.ucc.asn.au/hg/dropbear/rev/c8114a48837c - Security: Fix information disclosure with ~/.ssh/authorized_keys symlink. Dropbear parsed authorized_keys as root, even if it were a symlink. The fix is to switch to user permissions when opening authorized_keys A user could symlink their ~/.ssh/authorized_keys to a root-owned file they couldn't normally read. If they managed to get that file to contain valid authorized_keys with command= options it might be possible to read other contents of that file. This information disclosure is to an already authenticated user. Thanks to Jann Horn of Google Project Zero for reporting this. CVE-2017-9079 https://secure.ucc.asn.au/hg/dropbear/rev/0d889b068123 Refresh patches, rework 100-pubkey_path.patch to work with new authorized_keys validation. Signed-off-by:
Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
-
- Apr 26, 2017
-
-
Hans Dedecker authored
Install procd interface triggers only for interfaces which are enabled so dropbear instances running on (an) enabled interface(s) are not restarted due to an interface trigger of an interface which is disabled. Signed-off-by:
Hans Dedecker <dedeckeh@gmail.com>
-
- Feb 17, 2017
-
-
Stijn Tintel authored
Signed-off-by:
Stijn Tintel <stijn@linux-ipv6.be>
-
- Feb 10, 2017
-
-
Joseph C. Sible authored
The only HMACs currently available use MD5 and SHA1, both of which have known weaknesses. We already compile in the SHA256 code since we use Curve25519 by default, so there's no significant size penalty to enabling this. Signed-off-by:
Joseph C. Sible <josephcsible@users.noreply.github.com>
-
- Jan 05, 2017
-
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
- Dec 16, 2016
-
-
Felix Fietkau authored
Replace *MD5SUM with *HASH, replace MD5 hashes with SHA256 Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
- Dec 14, 2016
-
-
Dario Ernst authored
Harmonise handling of DEFAULT_PATH by removing the patch introducing #ifndef guards around the path, and only using one means to set the path in the makefile. Signed-off-by:
Dario Ernst <Dario.Ernst@riverbed.com>
-
- Sep 26, 2016
-
-
Matthias Schiffer authored
Configurations without shadow passwords have been broken since the removal of telnet: as the default entry in /etc/passwd is not empty (but rather unset), there will be no way to log onto such a system by default. As disabling shadow passwords is not useful anyways, remove this configuration option. The config symbol is kept (for a while), as packages from feeds depend on it. Signed-off-by:
Matthias Schiffer <mschiffer@universe-factory.net>
-
- Sep 10, 2016
-
-
Kevin Darbyshire-Bryant authored
As security precaution and to limit the attack surface based on the version reported by tools like nmap mask out the dropbear version so the version is not visible anymore by snooping on the wire. Version is still visible by 'dropbear -V' Based on a patch by Hans Dedecker <dedeckeh@gmail.com> Signed-off-by:
Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk> Signed-off-by: Felix Fietkau <nbd@nbd.name> [remove trailing _]
-
- Sep 05, 2016
-
-
Karl Palsson authored
Effectively the same for most purposes, but more accurate. Signed-off-by:
Karl Palsson <karlp@etactica.com>
-
- Aug 12, 2016
-
-
Jo-Philipp Wich authored
- Security: Message printout was vulnerable to format string injection. If specific usernames including "%" symbols can be created on a system (validated by getpwnam()) then an attacker could run arbitrary code as root when connecting to Dropbear server. A dbclient user who can control username or host arguments could potentially run arbitrary code as the dbclient user. This could be a problem if scripts or webpages pass untrusted input to the dbclient program. - Security: dropbearconvert import of OpenSSH keys could run arbitrary code as the local dropbearconvert user when parsing malicious key files - Security: dbclient could run arbitrary code as the local dbclient user if particular -m or -c arguments are provided. This could be an issue where dbclient is used in scripts. - Security: dbclient or dropbear server could expose process memory to the running user if compiled with DEBUG_TRACE and running with -v The security issues were reported by an anonymous researcher working with Beyond Security's SecuriTeam Secure Disclosure www.beyondsecurity.com/ssd.html Signed-off-by:
Jo-Philipp Wich <jo@mein.io>
-
- Jul 29, 2016
-
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
- May 24, 2016
-
-
Dario Ernst authored
Fix a „semantic typo“ introduced in b78aae79, where TARGET_INIT_PATH was used instead of CONFIG_TARGET_INIT_PATH. Signed-off-by:
Dario Ernst <Dario.Ernst@riverbed.com>
-
- May 13, 2016
-
-
Jo-Philipp Wich authored
Update the dropbear package to version 2016.73, refresh patches. The measured .ipk sizes on an x86_64 build are: 94588 dropbear_2015.71-3_x86_64.ipk 95316 dropbear_2016.73-1_x86_64.ipk This is an increase of roughly 700 bytes after compression. Tested-by:
Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk> Signed-off-by:
Jo-Philipp Wich <jo@mein.io>
-
- May 12, 2016
-
-
Hans Dedecker authored
The option --disable-utmpx was deleted by accident in commit 7545c1d9; add it again to the CONFIGURE_ARGS list Signed-off-by:
Hans Dedecker <dedeckeh@gmail.com>
-
- Apr 28, 2016
-
-
Hans Dedecker authored
A dropbear instance having an interface config won't start if the interface is down as no IP address is available. Adding interface triggers for each configured interface executing the dropbear reload script will start the dropbear instance when the interface is up. Signed-off-by:
Hans Dedecker <dedeckeh@gmail.com>
-
Hans Dedecker authored
Utmp support tracks who is currenlty logged in by logging info to the file /var/run/utmp (supported by busybox) Putuline support will use the utmp structure to write to the utmp file Signed-off-by:
Hans Dedecker <dedeckeh@gmail.com>
-
- Feb 08, 2016
-
-
Jo-Philipp Wich authored
Signed-off-by:
Jo-Philipp Wich <jow@openwrt.org> SVN-Revision: 48679
-
- Jan 15, 2016
-
-
Felix Fietkau authored
Update dropbear to version 2015.71, released on 3 Dec 2015. Refresh patches. Signed-off-by:
Hannu Nyman <hannu.nyman@iki.fi> SVN-Revision: 48243
-
- Jan 10, 2016
-
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@openwrt.org> SVN-Revision: 48196
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@openwrt.org> SVN-Revision: 48195
-
- Sep 24, 2015
-
-
Felix Fietkau authored
Signed-off-by:
Alexandru Ardelean <ardeleanalex@gmail.com> SVN-Revision: 47033
-
- Sep 08, 2015
-
-
Steven Barth authored
Signed-off-by:
Steven Barth <steven@midlink.org> SVN-Revision: 46815
-
Felix Fietkau authored
While technically required by the RFC, they are usually completely unused (DSA), or have security issues (3DES, CBC) Signed-off-by:
Felix Fietkau <nbd@openwrt.org> SVN-Revision: 46814
-
- Sep 07, 2015
-
-
Steven Barth authored
This enables passworldless login for root via SSH whenever no root password is set (e.g. after reset, flashing without keeping config or in failsafe) and removes telnet support alltogether. Signed-off-by:
Steven Barth <steven@midlink.org> SVN-Revision: 46809
-
- Sep 02, 2015
-
-
Steven Barth authored
Signed-off-by:
Steven Barth <steven@midlink.org> SVN-Revision: 46769
-
- Apr 18, 2015
-
-
Steven Barth authored
fixes dbclient login into OpenSSH 6.8p1 error: "Bad hostkey signature" reported on irc, replicated with Arch Linux Signed-off-by:
Dirk Neukirchen <dirkneukirchen@web.de> SVN-Revision: 45493
-
- Nov 06, 2014
-
-
Nicolas Thill authored
Signed-off-by:
Nicolas Thill <nico@openwrt.org> SVN-Revision: 43205
-
- Oct 14, 2014
-
-
John Crispin authored
[base-files] shell-scripting: fix wrong usage of '==' operator normally the '==' is used for invoking a regex parser and is a bashism. all of the fixes just want to compare a string. the used busybox-ash will silently "ignore" this mistake, but make it portable/clean at least. this patch does not change the behavior/logic of the scripts. Signed-off-by:
Bastian Bittorf <bittorf@bluebottle.com> SVN-Revision: 42911
-
- Oct 09, 2014
-
-
Steven Barth authored
Use network_get_ipaddrs_all to get all ip-addresses of an interface. If the function fails, the interface does not exists or has not any suiteable ip addresses assigned. Use the returned ip-address(es) to construct the dropbear listen address. Signed-off-by:
Mathias Kresin <openwrt@kresin.me> SVN-Revision: 42857
-
- Aug 29, 2014
-
-
John Crispin authored
Signed-off-by:
John Crispin <blogic@openwrt.org> SVN-Revision: 42326
-
- Aug 25, 2014
-
-
John Crispin authored
somebody started to set a function returncode in the validation stuff and everybody copies it, e.g. myfunction() { fire_command return $? } a function automatically returns with the last returncode, so we can safely remove the command 'return $?'. reference: http://tldp.org/LDP/abs/html/exit-status.html "The last command executed in the function or script determines the exit status." Signed-off-by:
Bastian Bittorf <bittorf@bluebottle.com> SVN-Revision: 42278
-
- Aug 21, 2014
-
-
Jonas Gorski authored
Disable MIPS16 to prevent it negatively affecting performance. Observed was a increase of connection delay from ~6 to ~11 seconds and a reduction of scp speed from 1.1MB/s to 710kB/s on brcm63xx. Fixes #15209. Signed-off-by:
Jonas Gorski <jogo@openwrt.org> SVN-Revision: 42250
-
Jonas Gorski authored
Add a further upstream commit to more closely match the keepalive to OpenSSH. Should now really fix #17523. Signed-off-by:
Jonas Gorski <jogo@openwrt.org> SVN-Revision: 42249
-
- Aug 13, 2014
-
-
Jonas Gorski authored
Don't send SSH_MSG_UNIMPLEMENTED for keepalive responses, which broke at least putty. Fixes #17522 / #17523. Signed-off-by:
Jonas Gorski <jogo@openwrt.org> SVN-Revision: 42162
-
- Aug 11, 2014
-
-
Steven Barth authored
Signed-off-by:
Steven Barth <steven@midlink.org> SVN-Revision: 42131
-
- Jun 02, 2014
-
-
John Crispin authored
Signed-off-by:
Reiner Herrmann <reiner@reiner-h.de> SVN-Revision: 40914
-
- Mar 29, 2014
-
-
Felix Fietkau authored
fixes incremental build with change to CONFIG_DROPBEAR_ECC drop --with-shared which is unknown to configure Patch by Catalin Patulea <cat@vv.carleton.ca> SVN-Revision: 40300
-
Felix Fietkau authored
Without timeout mechanism, if ssh client disconnected without sending FIN or RST, forked dropbear servers would hang there for KEX_RETRY_TIMEOUT seconds (8 hours). TCP keepalive is not implemented in dropbear yet, thus the name SSHKeepAlive. 300 seconds in this patch is selected from the default value of ServerAliveInterval for Debian ssh client (See man ssh_config). Signed-off-by:
Yousong Zhou <yszhou4tech@gmail.com> SVN-Revision: 40299
-
Felix Fietkau authored
Patch from #15070 SVN-Revision: 40298
-