Go to file
Tomáš Chvátal 318211936a Accepting request 737034 from home:hpjansson:branches:network
Version update to 8.1p1:
  * ssh-keygen(1): when acting as a CA and signing certificates with
    an RSA key, default to using the rsa-sha2-512 signature algorithm.
    Certificates signed by RSA keys will therefore be incompatible
    with OpenSSH versions prior to 7.2 unless the default is
    overridden (using "ssh-keygen -t ssh-rsa -s ...").
  * ssh(1): Allow %n to be expanded in ProxyCommand strings
  * ssh(1), sshd(8): Allow prepending a list of algorithms to the
    default set by starting the list with the '^' character, E.g.
    "HostKeyAlgorithms ^ssh-ed25519"
  * ssh-keygen(1): add an experimental lightweight signature and
    verification ability. Signatures may be made using regular ssh keys
    held on disk or stored in a ssh-agent and verified against an
    authorized_keys-like list of allowed keys. Signatures embed a
    namespace that prevents confusion and attacks between different
    usage domains (e.g. files vs email).
  * ssh-keygen(1): print key comment when extracting public key from a
    private key.
  * ssh-keygen(1): accept the verbose flag when searching for host keys
    in known hosts (i.e. "ssh-keygen -vF host") to print the matching
    host's random-art signature too.
  * All: support PKCS8 as an optional format for storage of private
    keys to disk.  The OpenSSH native key format remains the default,
    but PKCS8 is a superior format to PEM if interoperability with
    non-OpenSSH software is required, as it may use a less insecure
    key derivation function than PEM's.
- Additional changes from 8.0p1 release:
  * scp(1): Add "-T" flag to disable client-side filtering of
    server file list.
  * sshd(8): Remove support for obsolete "host/port" syntax.

OBS-URL: https://build.opensuse.org/request/show/737034
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=197
2019-10-10 13:32:50 +00:00
.gitattributes OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=1 2007-01-07 16:26:05 +00:00
.gitignore OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=1 2007-01-07 16:26:05 +00:00
cavs_driver-ssh.pl Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-allow_root_password_login.patch Accepting request 668656 from home:pmonrealgonzalez:branches:network 2019-01-28 08:02:07 +00:00
openssh-7.7p1-cavstest-ctr.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-cavstest-kdf.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-disable_openssl_abi_check.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-eal3.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-enable_PAM_by_default.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-fips_checks.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-fips.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-host_ident.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-hostname_changes_when_forwarding_X.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-IPv6_X_forwarding.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-ldap.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-no_fork-no_pid_file.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-pam_check_locks.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-pts_names_formatting.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-remove_xauth_cookies_on_exit.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-seccomp_ipc_flock.patch Accepting request 643660 from home:pmonrealgonzalez:branches:network 2018-10-22 09:08:19 +00:00
openssh-7.7p1-seccomp_stat.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-seed-prng.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-send_locale.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-sftp_force_permissions.patch - Update openssh-7.7p1-sftp_force_permissions.patch from the 2018-10-19 13:12:48 +00:00
openssh-7.7p1-sftp_print_diagnostic_messages.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-systemd-notify.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-X11_trusted_forwarding.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-X_forward_with_disabled_ipv6.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-8.0p1-gssapi-keyex.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-8.1p1-audit.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-8.1p1.tar.gz Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-8.1p1.tar.gz.asc Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-askpass-gnome.changes Accepting request 716585 from home:favogt:branches:network 2019-07-22 16:43:06 +00:00
openssh-askpass-gnome.spec Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh.changes Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh.spec Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
README.FIPS Accepting request 432093 from home:pcerny:factory 2016-09-30 20:34:19 +00:00
README.kerberos Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
README.SUSE Accepting request 669019 from home:pmonrealgonzalez:branches:network 2019-01-28 10:41:40 +00:00
ssh-askpass Accepting request 718210 from home:Vogtinator:branches:network 2019-07-24 12:05:07 +00:00
ssh.reg OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=1 2007-01-07 16:26:05 +00:00
sshd-gen-keys-start Accepting request 199679 from home:pcerny:factory 2013-09-19 04:09:33 +00:00
sshd.fw OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=7 2007-07-27 00:01:43 +00:00
sshd.pamd Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
sshd.service - Mention upstream bugs on multiple local patches 2018-10-19 13:24:01 +00:00
sysconfig.ssh Accepting request 88642 from home:pcerny:factory 2011-10-19 02:18:13 +00:00

There are following changes in default settings of ssh client and server:

* Accepting and sending of locale environment variables in protocol 2 is
  enabled.

* PAM authentication is enabled and mostly even required, do not turn it off.

* root authentiation with password is enabled by default (PermitRootLogin yes).
  NOTE: this has security implications and is only done in order to not change
  behaviour of the server in an update. We strongly suggest setting this option
  either "prohibit-password" or even better to "no" (which disables direct
  remote root login entirely).

* DSA authentication is enabled by default for maximum compatibility.
  NOTE: do not use DSA authentication since it is being phased out for a reason
  - the size of DSA keys is limited by the standard to 1024 bits which cannot
  be considered safe any more.

* Accepting all RFC4419 specified DH group parameters. See KexDHMin in
  ssh_config and sshd_config manual pages.

For more information on differences in SUSE OpenSSH package see README.FIPS