<feed xmlns='http://www.w3.org/2005/Atom'>
<title>go-x-crypto, branch ssh-run-with-context.mailed</title>
<subtitle>Fork of golang.org/x/crypto with my patches.</subtitle>
<id>http://git.kilabit.info/go-x-crypto/atom?h=ssh-run-with-context.mailed</id>
<link rel='self' href='http://git.kilabit.info/go-x-crypto/atom?h=ssh-run-with-context.mailed'/>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/'/>
<updated>2023-12-22T09:23:26Z</updated>
<entry>
<title>ssh: implement Session Run with context</title>
<updated>2023-12-22T09:23:26Z</updated>
<author>
<name>Shulhan</name>
<email>m.shulhan@gmail.com</email>
</author>
<published>2023-12-22T06:42:41Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=10c3c1ae8a5e3c843f377034bae617b2ded59e0e'/>
<id>urn:sha1:10c3c1ae8a5e3c843f377034bae617b2ded59e0e</id>
<content type='text'>
The RunWithContext similar to Run but terminate the remote command
with SIGKILL when its receive context cancellation.

Change-Id: Ib82e23b77450bef222bba8576eca11b9d356688b
</content>
</entry>
<entry>
<title>ssh: implement strict KEX protocol changes</title>
<updated>2023-12-18T16:33:08Z</updated>
<author>
<name>Roland Shoemaker</name>
<email>bracewell@google.com</email>
</author>
<published>2023-11-20T20:06:18Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d'/>
<id>urn:sha1:9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d</id>
<content type='text'>
Implement the "strict KEX" protocol changes, as described in section
1.9 of the OpenSSH PROTOCOL file (as of OpenSSH version 9.6/9.6p1).

Namely this makes the following changes:
  * Both the server and the client add an additional algorithm to the
    initial KEXINIT message, indicating support for the strict KEX mode.
  * When one side of the connection sees the strict KEX extension
    algorithm, the strict KEX mode is enabled for messages originating
    from the other side of the connection. If the sequence number for
    the side which requested the extension is not 1 (indicating that it
    has already received non-KEXINIT packets), the connection is
    terminated.
  * When strict kex mode is enabled, unexpected messages during the
    handshake are considered fatal. Additionally when a key change
    occurs (on the receipt of the NEWKEYS message) the message sequence
    numbers are reset.

Thanks to Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk from Ruhr
University Bochum for reporting this issue.

Fixes CVE-2023-48795
Fixes golang/go#64784

Change-Id: I96b53afd2bd2fb94d2b6f2a46a5dacf325357604
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/550715
Reviewed-by: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Reviewed-by: Tatiana Bradley &lt;tatianabradley@google.com&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Run-TryBot: Roland Shoemaker &lt;roland@golang.org&gt;
Reviewed-by: Damien Neil &lt;dneil@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
</content>
</entry>
<entry>
<title>ssh: close net.Conn on all NewServerConn errors</title>
<updated>2023-12-14T18:23:28Z</updated>
<author>
<name>Edoardo Spadolini</name>
<email>edoardo.spadolini@gmail.com</email>
</author>
<published>2023-12-12T13:04:53Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=4e5a26183ecb4f9a0f85c8f8dbe7982885435436'/>
<id>urn:sha1:4e5a26183ecb4f9a0f85c8f8dbe7982885435436</id>
<content type='text'>
This PR ensures that the net.Conn passed to ssh.NewServerConn is closed
on all error return paths, not just after a failed handshake. This matches
the behavior of ssh.NewClientConn.

Change-Id: Id8a51d10ae8d575cbbe26f2ef6b37de7cca840ec
GitHub-Last-Rev: 81bb2e58a881a9a85935740bda06b034b32a8ce3
GitHub-Pull-Request: golang/crypto#279
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/549095
Run-TryBot: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Auto-Submit: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Reviewed-by: Roland Shoemaker &lt;roland@golang.org&gt;
Reviewed-by: Nicola Murino &lt;nicola.murino@gmail.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Michael Pratt &lt;mpratt@google.com&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
</content>
</entry>
<entry>
<title>x509roots/fallback: update bundle</title>
<updated>2023-11-29T16:35:42Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2023-11-20T16:01:22Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=152cdb1503ebc13bc0fbb68f92ee189ebf9e3d00'/>
<id>urn:sha1:152cdb1503ebc13bc0fbb68f92ee189ebf9e3d00</id>
<content type='text'>
This is an automated CL which updates the NSS root bundle.

Change-Id: Ib8c85dc815297de7b59c3e23b0ad029baaf948ec
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/543735
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Roland Shoemaker &lt;roland@golang.org&gt;
</content>
</entry>
<entry>
<title>ssh: defer channel window adjustment</title>
<updated>2023-11-27T17:27:49Z</updated>
<author>
<name>Will Mortensen</name>
<email>will@extrahop.com</email>
</author>
<published>2022-12-16T23:56:24Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=fdfe1f8531a1adcc300c8eba98cb372044826d62'/>
<id>urn:sha1:fdfe1f8531a1adcc300c8eba98cb372044826d62</id>
<content type='text'>
Sending a window adjustment after every read is unnecessarily chatty,
especially with a series of small reads like with TTY interactions.

Copy OpenSSH's logic for deferring these, which seemingly hasn't changed
since 2007. Note that since channelWindowSize and c.maxIncomingPayload
are currently constants here, the two checks could be combined into a
single check for c.myWindow &lt; 2 MiB - 96 KiB (with the current values
of the constants).

Fixes golang/go#57424.

Change-Id: Ifcef5be76fcc3f0b1a6dc396096bed9c50d64f21
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/459915
Reviewed-by: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Reviewed-by: Michael Knyszek &lt;mknyszek@google.com&gt;
Run-TryBot: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Auto-Submit: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Commit-Queue: Nicola Murino &lt;nicola.murino@gmail.com&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
</content>
</entry>
<entry>
<title>blake2b: drop Go 1.6, Go 1.8 compatibility</title>
<updated>2023-11-27T17:26:05Z</updated>
<author>
<name>Sebastiaan van Stijn</name>
<email>github@gone.nl</email>
</author>
<published>2023-11-09T22:33:39Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=b8ffc16e10063067bac0e15c6d7f7995937503ce'/>
<id>urn:sha1:b8ffc16e10063067bac0e15c6d7f7995937503ce</id>
<content type='text'>
Other packages already dropped compatibility with go &lt; 1.12, so it
should be safe to remove it for this package as well.

Change-Id: I7e894fd11d2e7d1fe28c647bd921399a9a6e30d0
GitHub-Last-Rev: 2b4f576a19338f185e79f39cbfd476573b986369
GitHub-Pull-Request: golang/crypto#240
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/448240
Run-TryBot: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Reviewed-by: Joedian Reid &lt;joedian@golang.org&gt;
Reviewed-by: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Commit-Queue: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Auto-Submit: Nicola Murino &lt;nicola.murino@gmail.com&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Michael Knyszek &lt;mknyszek@google.com&gt;
Reviewed-by: Roland Shoemaker &lt;roland@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
<entry>
<title>ssh: wrap errors from client handshake</title>
<updated>2023-11-27T17:24:46Z</updated>
<author>
<name>Pavel Repin</name>
<email>prepin@gmail.com</email>
</author>
<published>2023-11-27T16:26:11Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=7e6fbd82c804e1760feb603fe21caecb0af0a124'/>
<id>urn:sha1:7e6fbd82c804e1760feb603fe21caecb0af0a124</id>
<content type='text'>
When an error is returned by a user defined host key callback,
it is now possible to handle it using standard Go mechanisms
such as errors.Is or errors.As.

Fixes golang/go#61309

Change-Id: I4269c5f8eacd8e7e8d85070ad249f0e27777b15f
GitHub-Last-Rev: d2a34d5c8225d6aaaee287ce3ea8b218fbe210d4
GitHub-Pull-Request: golang/crypto#266
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/508876
Run-TryBot: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Auto-Submit: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Reviewed-by: Muhammad Shulhan &lt;m.shulhan@gmail.com&gt;
Reviewed-by: Michael Knyszek &lt;mknyszek@google.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Nicola Murino &lt;nicola.murino@gmail.com&gt;
TryBot-Result: Gopher Robot &lt;gobot@golang.org&gt;
</content>
</entry>
<entry>
<title>argon2: avoid clobbering BP</title>
<updated>2023-11-27T17:24:02Z</updated>
<author>
<name>Egon Elbre</name>
<email>egonelbre@gmail.com</email>
</author>
<published>2021-07-01T15:56:44Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=bda2f3f5cfce3f27039acccd823693f6d67c2a74'/>
<id>urn:sha1:bda2f3f5cfce3f27039acccd823693f6d67c2a74</id>
<content type='text'>
go vet was reporting

  blamka_amd64.s:203:1: [amd64] mixBlocksSSE2: invalid offset a+24(FP); expected a+8(FP)
  blamka_amd64.s:226:1: [amd64] xorBlocksSSE2: invalid offset a+24(FP); expected a+8(FP)
  blamka_amd64.s:204:1: frame pointer is clobbered before saving
  blamka_amd64.s:227:1: frame pointer is clobbered before saving

Also fix a similar naming issue in sha3:

  sha3\keccakf_amd64.s:325:1: [amd64] keccakF1600: unknown variable state; offset 0 is a+0(FP)

Updates golang/go#47027

Change-Id: Ia74852cdb0721ae0216787054197b0cac9e1c0f8
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/332289
Reviewed-by: Michael Knyszek &lt;mknyszek@google.com&gt;
Reviewed-by: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Auto-Submit: Dmitri Shuralyov &lt;dmitshur@golang.org&gt;
Reviewed-by: Filippo Valsorda &lt;filippo@golang.org&gt;
</content>
</entry>
<entry>
<title>ssh/test: skip TestSSHCLIAuth on Windows</title>
<updated>2023-11-27T16:29:38Z</updated>
<author>
<name>Heschi Kreinick</name>
<email>heschi@google.com</email>
</author>
<published>2023-11-27T16:17:04Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=325b735346247f48971d2b37d24dd180a35f391f'/>
<id>urn:sha1:325b735346247f48971d2b37d24dd180a35f391f</id>
<content type='text'>
It's failing with a file permissions error:

sign_and_send_pubkey: signing using rsa-sha2-512 SHA256:Anr3LjZK8YVpjrxu79myrW9Hrb/wpcMNpVvTq/RcBm8\r\nBad permissions. Try removing permissions for user: UNKNOWN\\\\UNKNOWN (S-1-15-2-2) on file C:/b/s/w/ir/x/t/TestSSHCLIAuth1586735692/001/rsa.

For golang/go#64403

Change-Id: Iece8eac4a1ac349f9f7a273ac7389315cb96568e
Cq-Include-Trybots: luci.golang.try:x_crypto-gotip-windows-amd64-longtest,x_crypto-go1.21-windows-amd64-longtest,x_crypto-go1.20-windows-amd64-longtest
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/545135
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
Reviewed-by: Nicola Murino &lt;nicola.murino@gmail.com&gt;
Auto-Submit: Heschi Kreinick &lt;heschi@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
</content>
</entry>
<entry>
<title>go.mod: update golang.org/x dependencies</title>
<updated>2023-11-27T16:00:28Z</updated>
<author>
<name>Gopher Robot</name>
<email>gobot@golang.org</email>
</author>
<published>2023-11-27T15:56:14Z</published>
<link rel='alternate' type='text/html' href='http://git.kilabit.info/go-x-crypto/commit/?id=1eadac50a566dfaa1b603ca15e8ad3cbd1c77b20'/>
<id>urn:sha1:1eadac50a566dfaa1b603ca15e8ad3cbd1c77b20</id>
<content type='text'>
Update golang.org/x dependencies to their latest tagged versions.

Change-Id: I7fdfe509173c79a63d006b27d674f869a5baa2af
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/545098
Reviewed-by: Heschi Kreinick &lt;heschi@google.com&gt;
LUCI-TryBot-Result: Go LUCI &lt;golang-scoped@luci-project-accounts.iam.gserviceaccount.com&gt;
Auto-Submit: Gopher Robot &lt;gobot@golang.org&gt;
Reviewed-by: Dmitri Shuralyov &lt;dmitshur@google.com&gt;
</content>
</entry>
</feed>
