Thanks, applied as 80326bc43e71d1b012b33287d64aa4768a28e00d.

Michael

[sent from post-receive hook]

On Fri, 20 Nov 2020 08:56:21 +0100, Alexander Dahl <a...@thorsis.com> wrote:
> Noteworthy changes (not all options accessible through ptxdist menu):
> 
> - added support for ed25519 hostkeys and authorized_keys
> - added support for chacha20-poly1305 authenticated cipher
> - added support for and rsa-sha2 signatures
> - disabled some options by default (kconfig defaults adapted accordingly)
> - blowfish has been removed
> - fix idle detection clashing with keepalives
> - scp fix for CVE-2018-20685 where a server could modify name of output
>   files
> - Call fsync() is called on parent directory when writing key files to
>   ensure they are flushed
> 
> One especially important change:
> 
> > Use getrandom() call on Linux to ensure sufficient entropy has been
> > gathered at startup.  Dropbear now avoids reading from the random
> > source at startup, instead waiting until the first connection. It is
> > possible that some platforms were running without enough entropy
> > previously, those could potentially block at first boot generating
> > host keys.  The dropbear "-R" option is one way to avoid that.
> 
> On older toolchains/kernel headers/kernels without getrandom() support,
> dropbear should behave like before.
> 
> The curve25519 implementation was replaced with the one by TweetNaCl,
> which induced a change in 'LICENSE' summary.  The old implementation was
> licensed BSD-3-Clause and the new is public domain.
> 
> The bundled libtommath changed its license from dual license (public
> domain || WTFPL) to 'Unlicense' which is also a public domain license,
> but with a differently worded license text and an actual SPDX
> identifier.
> 
> The patch stack was dropped, the one patch was integrated upstream.
> 
> Signed-off-by: Alexander Dahl <a...@thorsis.com>
> Message-Id: <20201116080552.25031-5-...@thorsis.com>
> Signed-off-by: Michael Olbrich <m.olbr...@pengutronix.de>
> 
> diff --git a/patches/dropbear-2019.78/0001-configure-Fix-disable-fuzz.patch 
> b/patches/dropbear-2019.78/0001-configure-Fix-disable-fuzz.patch
> deleted file mode 100644
> index 03aec183a8c6..000000000000
> --- a/patches/dropbear-2019.78/0001-configure-Fix-disable-fuzz.patch
> +++ /dev/null
> @@ -1,47 +0,0 @@
> -From: Alexander Dahl <a...@thorsis.com>
> -Date: Wed, 11 Mar 2020 10:50:45 +0100
> -Subject: [PATCH] configure: Fix --disable-fuzz
> -
> -When explicitly passing --disable-fuzz to ./configure fuzz was actually
> -enabled.
> -
> -Signed-off-by: Alexander Dahl <a...@thorsis.com>
> ----
> -
> -Notes:
> -    Sent upstream: 
> https://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2020q1/002202.html
> -
> - configure.ac | 17 ++++++++++++-----
> - 1 file changed, 12 insertions(+), 5 deletions(-)
> -
> -diff --git a/configure.ac b/configure.ac
> -index 7199d7cb2300..104d60cfaf53 100644
> ---- a/configure.ac
> -+++ b/configure.ac
> -@@ -326,14 +326,21 @@ AC_ARG_ENABLE(shadow,
> - AC_ARG_ENABLE(fuzz,
> -     [  --enable-fuzz           Build fuzzing. Not recommended for 
> deployment.],
> -     [
> --            AC_DEFINE(DROPBEAR_FUZZ, 1, Fuzzing)
> --            AC_MSG_NOTICE(Enabling fuzzing)
> --            DROPBEAR_FUZZ=1
> --            # libfuzzer needs linking with c++ libraries
> --            AC_PROG_CXX
> -+            if test "x$enableval" = "xyes"; then
> -+            AC_DEFINE(DROPBEAR_FUZZ, 1, Fuzzing)
> -+            AC_MSG_NOTICE(Enabling fuzzing)
> -+            DROPBEAR_FUZZ=1
> -+            # libfuzzer needs linking with c++ libraries
> -+            AC_PROG_CXX
> -+        else
> -+            AC_DEFINE(DROPBEAR_FUZZ, 0, Fuzzing)
> -+            AC_MSG_NOTICE(Disabling fuzzing)
> -+            DROPBEAR_FUZZ=0
> -+        fi
> -     ],
> -     [
> -             AC_DEFINE(DROPBEAR_FUZZ, 0, Fuzzing)
> -+            AC_MSG_NOTICE(Disabling fuzzing)
> -             DROPBEAR_FUZZ=0
> -     ]
> - 
> diff --git a/patches/dropbear-2019.78/autogen.sh 
> b/patches/dropbear-2019.78/autogen.sh
> deleted file mode 120000
> index 9f8a4cb7ddcb..000000000000
> --- a/patches/dropbear-2019.78/autogen.sh
> +++ /dev/null
> @@ -1 +0,0 @@
> -../autogen.sh
> \ No newline at end of file
> diff --git a/patches/dropbear-2019.78/series b/patches/dropbear-2019.78/series
> deleted file mode 100644
> index 3e5a5247e50c..000000000000
> --- a/patches/dropbear-2019.78/series
> +++ /dev/null
> @@ -1,4 +0,0 @@
> -# generated by git-ptx-patches
> -#tag:base --start-number 1
> -0001-configure-Fix-disable-fuzz.patch
> -# c03ca050bdd0c61ac96e5bd22c9d0947  - git-ptx-patches magic
> diff --git a/rules/dropbear.in b/rules/dropbear.in
> index 7f777ae648fd..c0da7e222f2d 100644
> --- a/rules/dropbear.in
> +++ b/rules/dropbear.in
> @@ -116,6 +116,7 @@ comment "features"
>  config DROPBEAR_DIS_X11
>       bool
>       prompt "disable X11 Forwarding"
> +     default y
>       help
>         X11 forwarding means passing X11 (graphical interface)
>         information over the SSH connection.
> @@ -149,7 +150,6 @@ config DROPBEAR_AES128
>  config DROPBEAR_3DES
>       bool
>       prompt "3DES"
> -     default y
>       help
>         DES is an IBM algorithm designed during the 1970s.
>         In 1976, NIST has officially adopted it as an encryption
> diff --git a/rules/dropbear.make b/rules/dropbear.make
> index e422eb4d5e1e..a9404592e3af 100644
> --- a/rules/dropbear.make
> +++ b/rules/dropbear.make
> @@ -16,19 +16,19 @@ PACKAGES-$(PTXCONF_DROPBEAR) += dropbear
>  #
>  # Paths and names
>  #
> -DROPBEAR_VERSION     := 2019.78
> -DROPBEAR_MD5         := a972c85ed678ad0fdcb7844e1294fb54
> +DROPBEAR_VERSION     := 2020.79
> +DROPBEAR_MD5         := 830a7bf6349ac52a39c487d061efb352
>  DROPBEAR             := dropbear-$(DROPBEAR_VERSION)
>  DROPBEAR_SUFFIX              := tar.bz2
>  DROPBEAR_URL         := 
> http://matt.ucc.asn.au/dropbear/releases/$(DROPBEAR).$(DROPBEAR_SUFFIX)
>  DROPBEAR_SOURCE              := $(SRCDIR)/$(DROPBEAR).$(DROPBEAR_SUFFIX)
>  DROPBEAR_DIR         := $(BUILDDIR)/$(DROPBEAR)
>  DROPBEAR_LICENSE     := \
> -     MIT AND BSD-2-Clause AND BSD-3-Clause AND SSH-short AND (public_domain 
> OR WTFPL)
> +     MIT AND BSD-2-Clause AND public_domain AND SSH-short AND (public_domain 
> OR WTFPL) AND Unlicense
>  DROPBEAR_LICENSE_FILES       := \
> -     file://LICENSE;md5=a5ec40cafba26fc4396d0b550f824e01 \
> +     file://LICENSE;md5=da58928b5d844c6667963cb5a109272d \
>       file://libtomcrypt/LICENSE;md5=71baacc459522324ef3e2b9e052e8180 \
> -     file://libtommath/LICENSE;md5=f72771f4af5e8c382974750f9f8701ad \
> +     file://libtommath/LICENSE;md5=23e7e0a32e53a2b1d35f5fd9ef053402 \
>       
> file://loginrec.c;startline=1;endline=26;md5=0d785ee11fab1cead2c7fee9c35574f1
>  
>  # 
> ----------------------------------------------------------------------------
> @@ -48,6 +48,7 @@ DROPBEAR_CONF_OPT   := \
>       --$(call ptx/disen, PTXCONF_DROPBEAR_DIS_OPENPTY)-openpty \
>       --$(call ptx/disen, PTXCONF_DROPBEAR_DIS_SYSLOG)-syslog \
>       --enable-shadow \
> +     --disable-plugin \
>       --disable-fuzz \
>       --enable-bundled-libtom \
>       --$(call ptx/disen, PTXCONF_DROPBEAR_DIS_LASTLOG)-lastlog \

_______________________________________________
ptxdist mailing list
ptxdist@pengutronix.de
To unsubscribe, send a mail with subject "unsubscribe" to 
ptxdist-requ...@pengutronix.de

Reply via email to