Accepting request 48012 from Base:System
Copy from Base:System/openssh based on submit request 48012 from user anicka OBS-URL: https://build.opensuse.org/request/show/48012 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=49
This commit is contained in:
parent
90410f9370
commit
ca1293e43d
140
README.SuSE
140
README.SuSE
@ -1,137 +1,15 @@
|
|||||||
|
This is OpenSSH version 5.6p1.
|
||||||
|
|
||||||
Dear users,
|
There are following changes in default settings of ssh client:
|
||||||
|
|
||||||
|
* Accepting and sending of locale environment variables in protocol 2 is
|
||||||
|
enabled.
|
||||||
|
|
||||||
This is OpenSSH version 5.1p1.
|
* New host keys will be hashed to and them unusable for malicious people or
|
||||||
|
software trying to use known_hosts to find further hops.
|
||||||
|
|
||||||
There is a change in default settings of ssh client: accepting and sending of
|
* Tunneled clear text passwords are disabled.
|
||||||
locale environment variables in protocol 2 is enabled.
|
|
||||||
|
|
||||||
There is a very important change in sshd with SuSE Linux 9.1:
|
* PAM authentication is enabled.
|
||||||
|
|
||||||
The "gssapi" support has been replaced with the "gssapi-with-mic" to fix
|
* Only support for protocol 2 is enabled.
|
||||||
possible MITM attacks (to enable support for the deprecated 'gssapi'
|
|
||||||
authentication set GSSAPIEnableMITMAttack to 'yes'). These two versions
|
|
||||||
are not compatible. The option GSSAPICleanupCreds is obsoleted, use
|
|
||||||
GSSAPICleanupCredentials instead.
|
|
||||||
|
|
||||||
We disabled the new feature 'untrusted cookies' by default because it brings a
|
|
||||||
lot of problems. If you like to enable it, set ForwardX11Trusted to 'no' in
|
|
||||||
ssh_config.
|
|
||||||
|
|
||||||
The option UsePrivilegeSeparation was reverted to 'yes' because the problematic
|
|
||||||
calling of PAM modules in this mode was fixed.
|
|
||||||
|
|
||||||
The option KeepAlive has been obsoleted, use TCPKeepAlive instead.
|
|
||||||
|
|
||||||
There is an important change in sshd with SuSE Linux 9.0:
|
|
||||||
|
|
||||||
The value of option ChallengeResponseAuthentication is reverted to default
|
|
||||||
value yes, which is necessary for PAM authentication.
|
|
||||||
|
|
||||||
I this OpenSSH version is removed kerberos support from protocol SSH1,
|
|
||||||
since it has been replaced with GSSAPI, but keeps kerberos password
|
|
||||||
authentication for protocols SSH1 and SSH2. To enable Kerberos authentication
|
|
||||||
read README.kerberos file.
|
|
||||||
|
|
||||||
Important change in sshd with SuSE Linux 8.1 is that sshd X11 forwarding listens
|
|
||||||
on localhost by default. See sshd X11UseLocalhost option to revert to prior
|
|
||||||
behaviour if your older X11 clients do not function with this configuration.
|
|
||||||
|
|
||||||
The package openssh was splitted to openssh and the new package askpass.
|
|
||||||
|
|
||||||
OpenSSH supports two protocol versions (SSH1 and SSH2) which need to be
|
|
||||||
configured differently.
|
|
||||||
Protocol version 1 is the old protocol and protocol version 2 is the new
|
|
||||||
protocol that has several advantages from the security point of view.
|
|
||||||
|
|
||||||
Please note that the default ssh protocol version has been changed to
|
|
||||||
version 2 with SuSE Linux 8.0.
|
|
||||||
|
|
||||||
The change of the default protocol version brings one important change for
|
|
||||||
users who use identity keys for remote login with passphrases.
|
|
||||||
|
|
||||||
(Please note the difference: 'password' means a system password on a
|
|
||||||
given machine. The term 'passphrase', however, is usually used for the
|
|
||||||
string that an ssh private key is protected (encrypted) with.)
|
|
||||||
|
|
||||||
Protocol version 1 uses the key from file ~/.ssh/identity and compares
|
|
||||||
it with keys from file ~/.ssh/authorized_keys on the remote machine.
|
|
||||||
|
|
||||||
Protocol version 2 uses keys from files ~/.ssh/id_rsa or ~/.ssh/id_dsa
|
|
||||||
and they are compared with keys from file ~/.ssh/authorized_keys.
|
|
||||||
Note: Servers with OpenSSH < 2.9.9p1 use ~/.ssh/authorized_keys2 instead.
|
|
||||||
|
|
||||||
If you don't want to switch to protocol version 2 now, add a line saying
|
|
||||||
"Protocol 1,2" to /etc/ssh/ssh_config of the SuSE Linux 8.0 system to
|
|
||||||
retain the old ssh behaviour.
|
|
||||||
|
|
||||||
How to convert your environment to protocol version 2:
|
|
||||||
|
|
||||||
1) Creating the necessary identity keys for protocol version 2:
|
|
||||||
|
|
||||||
There are two ways:
|
|
||||||
|
|
||||||
A) You can use your old keys for protocol 1, but you have to convert them
|
|
||||||
to the format of protocol 2.
|
|
||||||
This can be done with the tool ssh-keyconverter:
|
|
||||||
|
|
||||||
Every user that will use protocol version 2 needs to do this:
|
|
||||||
|
|
||||||
cd ~/.ssh
|
|
||||||
ssh-keyconverter -k identity
|
|
||||||
- at this point you will be asked for the passphrase of ~/.ssh/identity
|
|
||||||
ssh-keyconverter -a authorized_keys
|
|
||||||
|
|
||||||
If OpenSSH < 2.9.9p1 is used on the server:
|
|
||||||
|
|
||||||
grep ssh- authorized_keys >>authorized_keys2
|
|
||||||
|
|
||||||
To enable login to other users with the converted protocol version 2 keys,
|
|
||||||
the other user has to add the new ~/.ssh/id_rsa.pub to his authorized keys.
|
|
||||||
|
|
||||||
You can do this by script by forcing version 1 with the -1 switch:
|
|
||||||
|
|
||||||
for host in .... ; do
|
|
||||||
ssh -1 user@$host 'cat >> .ssh/authorized_keys' < ~/.ssh/id_rsa.pub
|
|
||||||
ssh -1 user@$host 'cat >> .ssh/authorized_keys2' < ~/.ssh/id_rsa.pub
|
|
||||||
done
|
|
||||||
|
|
||||||
|
|
||||||
B) You can generate new keys for protocol 2 by "ssh-keygen -t rsa" or
|
|
||||||
"ssh-keygen -t dsa", then add id_rsa.pub (or id_dsa.pub) to
|
|
||||||
authorized_keys2 and copy authorized_keys2 to the remote machine. See
|
|
||||||
"man ssh" and "man ssh-keygen" for more info.
|
|
||||||
|
|
||||||
|
|
||||||
2) Handling of protocol version 2 with ssh-agent and ssh-add:
|
|
||||||
|
|
||||||
If you continue to use protocol version 1, there is nothing to do because
|
|
||||||
the default identity is still ~/.ssh/identity.
|
|
||||||
|
|
||||||
For protocol version 2, you have to pass the correct file (~/.ssh/id_rsa or
|
|
||||||
~/.ssh/id_dsa) to ssh-add. To support the version 1 key and the version 2
|
|
||||||
key you have to add both keys. Example:
|
|
||||||
|
|
||||||
eval `ssh-agent -s`
|
|
||||||
ssh-add ~/.ssh/identity ~/.ssh/id_rsa
|
|
||||||
|
|
||||||
This will add your version 1 and version 2 keys and if they have the same
|
|
||||||
passphrase, you only have to type it once.
|
|
||||||
|
|
||||||
Other changes:
|
|
||||||
|
|
||||||
The OpenSSH handling of ssh-add/ssh-askpass is solved different as
|
|
||||||
with OpenSSH 2.x You don't need to call ssh-askpass any longer. If
|
|
||||||
ssh-add is called and doesn't have a real TTY, it will launch
|
|
||||||
/usr/lib/ssh/ssh-askpass itself. Make sure that the DISPLAY variable
|
|
||||||
is always set correctly.
|
|
||||||
|
|
||||||
If you want to use ssh-agent under X windows, just edit the file .xsession
|
|
||||||
in your home directory and change usessh="no" to usessh="yes". After
|
|
||||||
logining in you only need to start ssh-add by hand, click or startup script.
|
|
||||||
|
|
||||||
If you want to use ssh-agent with startx, add the example above to your
|
|
||||||
~/.xinitrc before the window manager is started.
|
|
||||||
|
|
||||||
Your SuSE Team
|
|
||||||
|
@ -23,7 +23,7 @@ BuildRequires: gtk2-devel krb5-devel opensc-devel openssh openssl-devel pam-dev
|
|||||||
License: BSD3c(or similar)
|
License: BSD3c(or similar)
|
||||||
Group: Productivity/Networking/SSH
|
Group: Productivity/Networking/SSH
|
||||||
Version: 5.6p1
|
Version: 5.6p1
|
||||||
Release: 1
|
Release: 2
|
||||||
Requires: openssh = %{version} openssh-askpass = %{version}
|
Requires: openssh = %{version} openssh-askpass = %{version}
|
||||||
AutoReqProv: on
|
AutoReqProv: on
|
||||||
Summary: A GNOME-Based Passphrase Dialog for OpenSSH
|
Summary: A GNOME-Based Passphrase Dialog for OpenSSH
|
||||||
|
@ -1,3 +1,8 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Sep 13 14:47:10 CEST 2010 - anicka@suse.cz
|
||||||
|
|
||||||
|
- actualize README.SuSE (bnc#638893)
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Tue Aug 24 15:43:08 CEST 2010 - anicka@suse.cz
|
Tue Aug 24 15:43:08 CEST 2010 - anicka@suse.cz
|
||||||
|
|
||||||
|
@ -36,7 +36,7 @@ PreReq: pwdutils %insserv_prereq %fillup_prereq coreutils permissions
|
|||||||
Conflicts: nonfreessh
|
Conflicts: nonfreessh
|
||||||
AutoReqProv: on
|
AutoReqProv: on
|
||||||
Version: 5.6p1
|
Version: 5.6p1
|
||||||
Release: 1
|
Release: 2
|
||||||
%define xversion 1.2.4.1
|
%define xversion 1.2.4.1
|
||||||
Summary: Secure Shell Client and Server (Remote Login Program)
|
Summary: Secure Shell Client and Server (Remote Login Program)
|
||||||
Url: http://www.openssh.com/
|
Url: http://www.openssh.com/
|
||||||
|
Loading…
Reference in New Issue
Block a user