- May 21, 2017
-
-
Kevin Darbyshire-Bryant authored
- Security: Fix double-free in server TCP listener cleanup A double-free in the server could be triggered by an authenticated user if dropbear is running with -a (Allow connections to forwarded ports from any host) This could potentially allow arbitrary code execution as root by an authenticated user. Affects versions 2013.56 to 2016.74. Thanks to Mark Shepard for reporting the crash. CVE-2017-9078 https://secure.ucc.asn.au/hg/dropbear/rev/c8114a48837c - Security: Fix information disclosure with ~/.ssh/authorized_keys symlink. Dropbear parsed authorized_keys as root, even if it were a symlink. The fix is to switch to user permissions when opening authorized_keys A user could symlink their ~/.ssh/authorized_keys to a root-owned file they couldn't normally read. If they managed to get that file to contain valid authorized_keys with command= options it might be possible to read other contents of that file. This information disclosure is to an already authenticated user. Thanks to Jann Horn of Google Project Zero for reporting this. CVE-2017-9079 https://secure.ucc.asn.au/hg/dropbear/rev/0d889b068123 Refresh patches, rework 100-pubkey_path.patch to work with new authorized_keys validation. Signed-off-by:
Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
-
- Feb 10, 2017
-
-
Joseph C. Sible authored
The only HMACs currently available use MD5 and SHA1, both of which have known weaknesses. We already compile in the SHA256 code since we use Curve25519 by default, so there's no significant size penalty to enabling this. Signed-off-by:
Joseph C. Sible <josephcsible@users.noreply.github.com>
-
- Dec 14, 2016
-
-
Dario Ernst authored
Harmonise handling of DEFAULT_PATH by removing the patch introducing #ifndef guards around the path, and only using one means to set the path in the makefile. Signed-off-by:
Dario Ernst <Dario.Ernst@riverbed.com>
-
- May 13, 2016
-
-
Jo-Philipp Wich authored
Update the dropbear package to version 2016.73, refresh patches. The measured .ipk sizes on an x86_64 build are: 94588 dropbear_2015.71-3_x86_64.ipk 95316 dropbear_2016.73-1_x86_64.ipk This is an increase of roughly 700 bytes after compression. Tested-by:
Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk> Signed-off-by:
Jo-Philipp Wich <jo@mein.io>
-
- Feb 08, 2016
-
-
Jo-Philipp Wich authored
Signed-off-by:
Jo-Philipp Wich <jow@openwrt.org> SVN-Revision: 48679
-
- Jan 15, 2016
-
-
Felix Fietkau authored
Update dropbear to version 2015.71, released on 3 Dec 2015. Refresh patches. Signed-off-by:
Hannu Nyman <hannu.nyman@iki.fi> SVN-Revision: 48243
-
- Sep 08, 2015
-
-
Felix Fietkau authored
While technically required by the RFC, they are usually completely unused (DSA), or have security issues (3DES, CBC) Signed-off-by:
Felix Fietkau <nbd@openwrt.org> SVN-Revision: 46814
-
- Sep 07, 2015
-
-
Steven Barth authored
This enables passworldless login for root via SSH whenever no root password is set (e.g. after reset, flashing without keeping config or in failsafe) and removes telnet support alltogether. Signed-off-by:
Steven Barth <steven@midlink.org> SVN-Revision: 46809
-
- Sep 02, 2015
-
-
Steven Barth authored
Signed-off-by:
Steven Barth <steven@midlink.org> SVN-Revision: 46769
-
- Apr 18, 2015
-
-
Steven Barth authored
fixes dbclient login into OpenSSH 6.8p1 error: "Bad hostkey signature" reported on irc, replicated with Arch Linux Signed-off-by:
Dirk Neukirchen <dirkneukirchen@web.de> SVN-Revision: 45493
-
- Aug 21, 2014
-
-
Jonas Gorski authored
Add a further upstream commit to more closely match the keepalive to OpenSSH. Should now really fix #17523. Signed-off-by:
Jonas Gorski <jogo@openwrt.org> SVN-Revision: 42249
-
- Aug 13, 2014
-
-
Jonas Gorski authored
Don't send SSH_MSG_UNIMPLEMENTED for keepalive responses, which broke at least putty. Fixes #17522 / #17523. Signed-off-by:
Jonas Gorski <jogo@openwrt.org> SVN-Revision: 42162
-
- Aug 11, 2014
-
-
Steven Barth authored
Signed-off-by:
Steven Barth <steven@midlink.org> SVN-Revision: 42131
-
- Mar 29, 2014
-
-
Felix Fietkau authored
Upstream changelog: https://matt.ucc.asn.au/dropbear/CHANGES This adds elliptic curve cryptography (ECC) support as an option, disabled by default. dropbear mips 34kc uClibc binary size: before: 161,672 bytes after, without ECC (default): 164,968 after, with ECC: 198,008 Signed-off-by:
Catalin Patulea <cat@vv.carleton.ca> SVN-Revision: 40297
-
- Oct 10, 2013
-
-
Jo-Philipp Wich authored
- drop mirror www.mirrors.wiretapped.net (not working anymore) - drop patch 300-ipv6_addr_port_split.patch, included upstream - refresh patches - various upstream changes: http://matt.ucc.asn.au/dropbear/CHANGES Signed-off-by:
Catalin Patulea <cat@vv.carleton.ca> SVN-Revision: 38356
-
- Dec 04, 2012
-
-
Florian Fainelli authored
Upstream has a few code cleanups, more eagerly burns sensitive memory and includes the fix for CVE-2012-0920. Full changelog: https://matt.ucc.asn.au/dropbear/CHANGES Local changes: - Removed PKG_MULTI which is no longer in options.h (even before 2011.54) - Merged DO_HOST_LOOKUP into 120-openwrt_options.patch - Removed LD from make opts (now included in TARGET_CONFIGURE_OPTS) - Removed 400-CVE-2012-0920.patch which is included in 2012.55 Signed-off-by:
Catalin Patulea <cat@vv.carleton.ca> Signed-off-by:
Florian Fainelli <florian@openwrt.org> SVN-Revision: 34496
-
- Oct 10, 2012
-
-
Felix Fietkau authored
SVN-Revision: 33688
-