- Update to 7.8p1:
* no actual changes for the askpass
- Format with spec-cleaner
- Respect cflags
- Use gtk3 rather than gtk2 which is being phased out
- Remove the mention of the SLE12 in the README.SUSE
- Install firewall rules only when really needed (<SLE15)
- Version update to 7.8p1:
* For most details see release notes file
* ssh-keygen(1): write OpenSSH format private keys by default
instead of using OpenSSL's PEM format
- Rebase patches to apply on 7.8p1 release:
* openssh-7.7p1-fips.patch
* openssh-7.7p1-cavstest-kdf.patch
* openssh-7.7p1-fips_checks.patch
* openssh-7.7p1-gssapi_key_exchange.patch
* openssh-7.7p1-audit.patch
* openssh-7.7p1-openssl_1.1.0.patch
* openssh-7.7p1-ldap.patch
* openssh-7.7p1-IPv6_X_forwarding.patch
* openssh-7.7p1-sftp_print_diagnostic_messages.patch
* openssh-7.7p1-disable_short_DH_parameters.patch
* openssh-7.7p1-hostname_changes_when_forwarding_X.patch
* openssh-7.7p1-pam_check_locks.patch
* openssh-7.7p1-seed-prng.patch
* openssh-7.7p1-systemd-notify.patch
* openssh-7.7p1-X11_trusted_forwarding.patch
- Dropped patches: (forwarded request 642573 from scarabeus_iv)
OBS-URL: https://build.opensuse.org/request/show/642574
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=122
- Version update to 7.9p1
* No actual changes for the askpass
* See main package changelog for details
- Version update to 7.9p1
* ssh(1), sshd(8): the setting of the new CASignatureAlgorithms
option (see below) bans the use of DSA keys as certificate
authorities.
* sshd(8): the authentication success/failure log message has
changed format slightly. It now includes the certificate
fingerprint (previously it included only key ID and CA key
fingerprint).
* ssh(1), sshd(8): allow most port numbers to be specified using
service names from getservbyname(3) (typically /etc/services).
* sshd(8): support signalling sessions via the SSH protocol.
A limited subset of signals is supported and only for login or
command sessions (i.e. not subsystems) that were not subject to
a forced command via authorized_keys or sshd_config. bz#1424
* ssh(1): support "ssh -Q sig" to list supported signature options.
Also "ssh -Q help" to show the full set of supported queries.
* ssh(1), sshd(8): add a CASignatureAlgorithms option for the
client and server configs to allow control over which signature
formats are allowed for CAs to sign certificates. For example,
this allows banning CAs that sign certificates using the RSA-SHA1
signature algorithm.
* sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to
revoke keys specified by SHA256 hash.
* ssh-keygen(1): allow creation of key revocation lists directly
from base64-encoded SHA256 fingerprints. This supports revoking
keys using only the information contained in sshd(8)
OBS-URL: https://build.opensuse.org/request/show/643660
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=159
* There is no reason to set less secure default value, if
users need the behaviour they can still set it up themselves
- Drop patch openssh-7.7p1-blocksigalrm.patch
* We had a bug way in past about this but it was never reproduced
or even confirmed in the ticket, thus rather drop the patch
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=155
- Update to 7.8p1:
* no actual changes for the askpass
- Format with spec-cleaner
- Respect cflags
- Use gtk3 rather than gtk2 which is being phased out
- Remove the mention of the SLE12 in the README.SUSE
- Install firewall rules only when really needed (<SLE15)
- Version update to 7.8p1:
* For most details see release notes file
* ssh-keygen(1): write OpenSSH format private keys by default
instead of using OpenSSL's PEM format
- Rebase patches to apply on 7.8p1 release:
* openssh-7.7p1-fips.patch
* openssh-7.7p1-cavstest-kdf.patch
* openssh-7.7p1-fips_checks.patch
* openssh-7.7p1-gssapi_key_exchange.patch
* openssh-7.7p1-audit.patch
* openssh-7.7p1-openssl_1.1.0.patch
* openssh-7.7p1-ldap.patch
* openssh-7.7p1-IPv6_X_forwarding.patch
* openssh-7.7p1-sftp_print_diagnostic_messages.patch
* openssh-7.7p1-disable_short_DH_parameters.patch
* openssh-7.7p1-hostname_changes_when_forwarding_X.patch
* openssh-7.7p1-pam_check_locks.patch
* openssh-7.7p1-seed-prng.patch
* openssh-7.7p1-systemd-notify.patch
* openssh-7.7p1-X11_trusted_forwarding.patch
- Dropped patches:
OBS-URL: https://build.opensuse.org/request/show/642573
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=153
- Upgrade to 7.7p1 (bsc#1094068)
- Upgrade to 7.7p1 (bsc#1094068)
Most important changes (more details below):
* Drop compatibility support for pre-2001 SSH implementations
* sshd(1) does not load DSA keys by default
Distilled upstream log:
---- Potentially-incompatible changes
* ssh(1)/sshd(8): Drop compatibility support for some very old
SSH implementations, including ssh.com <=2.* and OpenSSH <=
3.*. These versions were all released in or before 2001 and
predate the final SSH RFCs. The support in question isn't
necessary for RFC-compliant SSH implementations.
---- New Features
* experimental support for PQC XMSS keys (Extended Hash-Based
Signatures), not compiled in by default.
* sshd(8): Add a "rdomain" criteria for the sshd_config Match
keyword to allow conditional configuration that depends on
which routing domain a connection was received on (currently
supported on OpenBSD and Linux).
* sshd_config(5): Add an optional rdomain qualifier to the
ListenAddress directive to allow listening on different
routing domains. This is supported only on OpenBSD and Linux
at present.
* sshd_config(5): Add RDomain directive to allow the
authenticated session to be placed in an explicit routing
domain. This is only supported on OpenBSD at present.
* sshd(8): Add "expiry-time" option for authorized_keys files
to allow for expiring keys.
* ssh(1): Add a BindInterface option to allow binding the (forwarded request 611002 from pcerny)
OBS-URL: https://build.opensuse.org/request/show/611071
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=118
- Upgrade to 7.7p1 (bsc#1094068)
- Upgrade to 7.7p1 (bsc#1094068)
Most important changes (more details below):
* Drop compatibility support for pre-2001 SSH implementations
* sshd(1) does not load DSA keys by default
Distilled upstream log:
---- Potentially-incompatible changes
* ssh(1)/sshd(8): Drop compatibility support for some very old
SSH implementations, including ssh.com <=2.* and OpenSSH <=
3.*. These versions were all released in or before 2001 and
predate the final SSH RFCs. The support in question isn't
necessary for RFC-compliant SSH implementations.
---- New Features
* experimental support for PQC XMSS keys (Extended Hash-Based
Signatures), not compiled in by default.
* sshd(8): Add a "rdomain" criteria for the sshd_config Match
keyword to allow conditional configuration that depends on
which routing domain a connection was received on (currently
supported on OpenBSD and Linux).
* sshd_config(5): Add an optional rdomain qualifier to the
ListenAddress directive to allow listening on different
routing domains. This is supported only on OpenBSD and Linux
at present.
* sshd_config(5): Add RDomain directive to allow the
authenticated session to be placed in an explicit routing
domain. This is only supported on OpenBSD at present.
* sshd(8): Add "expiry-time" option for authorized_keys files
to allow for expiring keys.
* ssh(1): Add a BindInterface option to allow binding the
OBS-URL: https://build.opensuse.org/request/show/611002
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=145
- Use TIRPC on suse_version >= 1500: sunrpc is deprecated and
should be replaced by TIRPC.
This has several effects:
* We get RPC support back... from build log in oS:F/standard:
[ 48s] checking rpc/types.h usability... no
[ 48s] checking rpc/types.h presence... no
[ 48s] checking for rpc/types.h... no
vs this branch:
[ 50s] checking rpc/types.h usability... yes
[ 50s] checking rpc/types.h presence... yes
[ 50s] checking for rpc/types.h... yes
AND as a side-effect, FALSE for ldapbody.c is now defined (not the
nicest of side-effects, but seems that ldap patch relies on RPC
headers to be included.
So all in all: this fixes the build failures for openSUSE Tumblewee (forwarded request 602971 from dimstar)
OBS-URL: https://build.opensuse.org/request/show/603107
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=117
- Use TIRPC on suse_version >= 1500: sunrpc is deprecated and
should be replaced by TIRPC.
This has several effects:
* We get RPC support back... from build log in oS:F/standard:
[ 48s] checking rpc/types.h usability... no
[ 48s] checking rpc/types.h presence... no
[ 48s] checking for rpc/types.h... no
vs this branch:
[ 50s] checking rpc/types.h usability... yes
[ 50s] checking rpc/types.h presence... yes
[ 50s] checking for rpc/types.h... yes
AND as a side-effect, FALSE for ldapbody.c is now defined (not the
nicest of side-effects, but seems that ldap patch relies on RPC
headers to be included.
So all in all: this fixes the build failures for openSUSE Tumblewee
OBS-URL: https://build.opensuse.org/request/show/602971
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=143
- upgrade to 7.6p1
see main package changelog for details
- Replace references to /var/adm/fillup-templates with new
%_fillupdir macro (boo#1069468)
- Update to vanilla 7.6p1
Most important changes (more details below):
* complete removal of the ancient SSHv1 protocol
* sshd(8) cannot run without privilege separation
* removal of suport for arcfourm blowfish and CAST ciphers
and RIPE-MD160 HMAC
* refuse RSA keys shorter than 1024 bits
Distilled upstream log:
- OpenSSH 7.3
---- Security
* sshd(8): Mitigate a potential denial-of-service attack
against the system's crypt(3) function via sshd(8). An
attacker could send very long passwords that would cause
excessive CPU use in crypt(3). sshd(8) now refuses to accept
password authentication requests of length greater than 1024
characters. Independently reported by Tomas Kuthan (Oracle),
Andres Rojas and Javier Nieto.
* sshd(8): Mitigate timing differences in password
authentication that could be used to discern valid from
invalid account names when long passwords were sent and
particular password hashing algorithms are in use on the
server. CVE-2016-6210, reported by EddieEzra.Harari at
verint.com
* ssh(1), sshd(8): Fix observable timing weakness in the CBC
OBS-URL: https://build.opensuse.org/request/show/551548
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=127