3d6d17e39a
- Update for 6.2p2 - Update to version 6.2p2 * ssh(1)/sshd(8): Added support for AES-GCM authenticated encryption * ssh(1)/sshd(8): Added support for encrypt-then-mac (EtM) MAC modes * ssh(1)/sshd(8): Added support for the UMAC-128 MAC * sshd(8): Added support for multiple required authentication * sshd(8)/ssh-keygen(1): Added support for Key Revocation Lists * ssh(1): When SSH protocol 2 only is selected (the default), ssh(1) now immediately sends its SSH protocol banner to the server without waiting to receive the server's banner, saving time when connecting. * dozens of other changes, see http://www.openssh.org/txt/release-6.2 (forwarded request 185789 from elvigia) OBS-URL: https://build.opensuse.org/request/show/185890 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=87 |
||
---|---|---|
.gitattributes | ||
.gitignore | ||
converter-linking.patch | ||
converter.tar.bz2 | ||
openssh-5.9p1-audit.patch | ||
openssh-5.9p1-blocksigalrm.diff | ||
openssh-5.9p1-default-protocol.diff | ||
openssh-5.9p1-eal3.diff | ||
openssh-5.9p1-engines.diff | ||
openssh-5.9p1-gssapimitm.patch | ||
openssh-5.9p1-homechroot.patch | ||
openssh-5.9p1-host_ident.diff | ||
openssh-5.9p1-pam-fix2.diff | ||
openssh-5.9p1-pam-fix3.diff | ||
openssh-5.9p1-pts.diff | ||
openssh-5.9p1-saveargv-fix.diff | ||
openssh-5.9p1-send_locale.diff | ||
openssh-5.9p1-sshconfig-knownhostschanges.diff | ||
openssh-5.9p1-sshd_config.diff | ||
openssh-5.9p1-xauth.diff | ||
openssh-5.9p1-xauthlocalhostname.diff | ||
openssh-6.2p2.tar.gz | ||
openssh-askpass-gnome.changes | ||
openssh-askpass-gnome.spec | ||
openssh-nocrazyabicheck.patch | ||
openssh-nodaemon-nopid.patch | ||
openssh.changes | ||
openssh.spec | ||
README.kerberos | ||
README.SuSE | ||
ssh-askpass | ||
ssh.reg | ||
sshd-gen-keys-start | ||
sshd.fw | ||
sshd.init | ||
sshd.pamd | ||
sshd.service | ||
sysconfig.ssh |
This is OpenSSH version 5.6p1. There are following changes in default settings of ssh client: * Accepting and sending of locale environment variables in protocol 2 is enabled. * New host keys will be hashed to and them unusable for malicious people or software trying to use known_hosts to find further hops. * Tunneled clear text passwords are disabled. * PAM authentication is enabled. * Only support for protocol 2 is enabled.