forked from pool/openssh
Accepting request 547144 from home:pcerny:factory
temporarily downgrading to 7.2p2 to run tests on additional 7.2p2 patches OBS-URL: https://build.opensuse.org/request/show/547144 OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=124
This commit is contained in:
committed by
Git OBS Bridge
parent
3a77b6ed2a
commit
56e0af8154
597
openssh.changes
597
openssh.changes
@@ -1,581 +1,26 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Nov 23 13:38:52 UTC 2017 - rbrown@suse.com
|
||||
Fri Dec 1 13:18:24 UTC 2017 - pcerny@suse.com
|
||||
|
||||
- Replace references to /var/adm/fillup-templates with new
|
||||
%_fillupdir macro (boo#1069468)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Nov 3 12:27:18 UTC 2017 - pcerny@suse.com
|
||||
|
||||
- Update to vanilla 7.6p1
|
||||
Most important changes (more details below):
|
||||
* complete removal of the ancient SSHv1 protocol
|
||||
* sshd(8) cannot run without privilege separation
|
||||
* removal of suport for arcfourm blowfish and CAST ciphers
|
||||
and RIPE-MD160 HMAC
|
||||
* refuse RSA keys shorter than 1024 bits
|
||||
Distilled upstream log:
|
||||
- OpenSSH 7.3
|
||||
---- Security
|
||||
* sshd(8): Mitigate a potential denial-of-service attack
|
||||
against the system's crypt(3) function via sshd(8). An
|
||||
attacker could send very long passwords that would cause
|
||||
excessive CPU use in crypt(3). sshd(8) now refuses to accept
|
||||
password authentication requests of length greater than 1024
|
||||
characters. Independently reported by Tomas Kuthan (Oracle),
|
||||
Andres Rojas and Javier Nieto.
|
||||
* sshd(8): Mitigate timing differences in password
|
||||
authentication that could be used to discern valid from
|
||||
invalid account names when long passwords were sent and
|
||||
particular password hashing algorithms are in use on the
|
||||
server. CVE-2016-6210, reported by EddieEzra.Harari at
|
||||
verint.com
|
||||
* ssh(1), sshd(8): Fix observable timing weakness in the CBC
|
||||
padding oracle countermeasures. Reported by Jean Paul
|
||||
Degabriele, Kenny Paterson, Torben Hansen and Martin
|
||||
Albrecht. Note that CBC ciphers are disabled by default and
|
||||
only included for legacy compatibility.
|
||||
* ssh(1), sshd(8): Improve operation ordering of MAC
|
||||
verification for Encrypt-then-MAC (EtM) mode transport MAC
|
||||
algorithms to verify the MAC before decrypting any
|
||||
ciphertext. This removes the possibility of timing
|
||||
differences leaking facts about the plaintext, though no such
|
||||
leakage has been observed. Reported by Jean Paul Degabriele,
|
||||
Kenny Paterson, Torben Hansen and Martin Albrecht.
|
||||
* sshd(8): (portable only) Ignore PAM environment vars when
|
||||
UseLogin=yes. If PAM is configured to read user-specified
|
||||
environment variables and UseLogin=yes in sshd_config, then a
|
||||
hostile local user may attack /bin/login via LD_PRELOAD or
|
||||
similar environment variables set via PAM. CVE-2015-8325,
|
||||
found by Shayan Sadigh.
|
||||
---- New Features
|
||||
* ssh(1): Add a ProxyJump option and corresponding -J
|
||||
command-line flag to allow simplified indirection through a
|
||||
one or more SSH bastions or "jump hosts".
|
||||
* ssh(1): Add an IdentityAgent option to allow specifying
|
||||
specific agent sockets instead of accepting one from the
|
||||
environment.
|
||||
* ssh(1): Allow ExitOnForwardFailure and ClearAllForwardings to
|
||||
be optionally overridden when using ssh -W. bz#2577
|
||||
* ssh(1), sshd(8): Implement support for the IUTF8 terminal
|
||||
mode as per draft-sgtatham-secsh-iutf8-00.
|
||||
* ssh(1), sshd(8): Add support for additional fixed
|
||||
Diffie-Hellman 2K, 4K and 8K groups from
|
||||
draft-ietf-curdle-ssh-kex-sha2-03.
|
||||
* ssh-keygen(1), ssh(1), sshd(8): support SHA256 and SHA512 RSA
|
||||
signatures in certificates;
|
||||
* ssh(1): Add an Include directive for ssh_config(5) files.
|
||||
* ssh(1): Permit UTF-8 characters in pre-authentication banners
|
||||
sent from the server. bz#2058
|
||||
---- Bugfixes
|
||||
* ssh(1), sshd(8): Reduce the syslog level of some relatively
|
||||
common protocol events from LOG_CRIT. bz#2585
|
||||
* sshd(8): Refuse AuthenticationMethods="" in configurations
|
||||
and accept AuthenticationMethods=any for the default
|
||||
behaviour of not requiring multiple authentication. bz#2398
|
||||
* sshd(8): Remove obsolete and misleading "POSSIBLE BREAK-IN
|
||||
ATTEMPT!" message when forward and reverse DNS don't match.
|
||||
bz#2585
|
||||
* ssh(1): Close ControlPersist background process stderr except
|
||||
in debug mode or when logging to syslog. bz#1988
|
||||
* misc: Make PROTOCOL description for
|
||||
direct-streamlocal@openssh.com channel open messages match
|
||||
deployed code. bz#2529
|
||||
* ssh(1): Deduplicate LocalForward and RemoteForward entries to
|
||||
fix failures when both ExitOnForwardFailure and hostname
|
||||
canonicalisation are enabled. bz#2562
|
||||
* sshd(8): Remove fallback from moduli to obsolete "primes"
|
||||
file that was deprecated in 2001. bz#2559.
|
||||
* sshd_config(5): Correct description of UseDNS: it affects ssh
|
||||
hostname processing for authorized_keys, not known_hosts;
|
||||
bz#2554
|
||||
* ssh(1): Fix authentication using lone certificate keys in an
|
||||
agent without corresponding private keys on the filesystem.
|
||||
bz#2550
|
||||
* sshd(8): Send ClientAliveInterval pings when a time-based
|
||||
RekeyLimit is set; previously keepalive packets were not
|
||||
being sent. bz#2252
|
||||
---- Portability
|
||||
* ssh(1), sshd(8): Fix compilation by automatically disabling
|
||||
ciphers not supported by OpenSSL. bz#2466
|
||||
* misc: Fix compilation failures on some versions of AIX's
|
||||
compiler related to the definition of the VA_COPY macro.
|
||||
bz#2589
|
||||
* sshd(8): Whitelist more architectures to enable the
|
||||
seccomp-bpf sandbox. bz#2590
|
||||
* ssh-agent(1), sftp-server(8): Disable process tracing on
|
||||
Solaris using setpflags(__PROC_PROTECT, ...). bz#2584
|
||||
* sshd(8): On Solaris, don't call Solaris setproject() with
|
||||
UsePAM=yes it's PAM's responsibility. bz#2425
|
||||
- OpenSSH 7.4
|
||||
---- Potentially-incompatible changes
|
||||
* ssh(1): Remove 3des-cbc from the client's default proposal.
|
||||
64-bit block ciphers are not safe in 2016 and we don't want
|
||||
to wait until attacks like SWEET32 are extended to SSH. As
|
||||
3des-cbc was the only mandatory cipher in the SSH RFCs, this
|
||||
may cause problems connecting to older devices using the
|
||||
default configuration, but it's highly likely that such
|
||||
devices already need explicit configuration for key exchange
|
||||
and hostkey algorithms already anyway.
|
||||
* sshd(8): Remove support for pre-authentication compression.
|
||||
Doing compression early in the protocol probably seemed
|
||||
reasonable in the 1990s, but today it's clearly a bad idea in
|
||||
terms of both cryptography (cf. multiple compression oracle
|
||||
attacks in TLS) and attack surface. Pre-auth compression
|
||||
support has been disabled by default for >10 years. Support
|
||||
remains in the client.
|
||||
* ssh-agent will refuse to load PKCS#11 modules outside a
|
||||
whitelist of trusted paths by default. The path whitelist may
|
||||
be specified at run-time.
|
||||
* sshd(8): When a forced-command appears in both a certificate
|
||||
and an authorized keys/principals command= restriction, sshd
|
||||
will now refuse to accept the certificate unless they are
|
||||
identical. The previous (documented) behaviour of having the
|
||||
certificate forced-command override the other could be a bit
|
||||
confusing and error-prone.
|
||||
* sshd(8): Remove the UseLogin configuration directive and
|
||||
support for having /bin/login manage login sessions.
|
||||
---- Security
|
||||
* ssh-agent(1): Will now refuse to load PKCS#11 modules from
|
||||
paths outside a trusted whitelist (run-time configurable).
|
||||
Requests to load modules could be passed via agent forwarding
|
||||
and an attacker could attempt to load a hostile PKCS#11
|
||||
module across the forwarded agent channel: PKCS#11 modules
|
||||
are shared libraries, so this would result in code execution
|
||||
on the system running the ssh-agent if the attacker has
|
||||
control of the forwarded agent-socket (on the host running
|
||||
the sshd server) and the ability to write to the filesystem
|
||||
of the host running ssh-agent (usually the host running the
|
||||
ssh client). Reported by Jann Horn of Project Zero.
|
||||
* sshd(8): When privilege separation is disabled, forwarded
|
||||
Unix- domain sockets would be created by sshd(8) with the
|
||||
privileges of 'root' instead of the authenticated user. This
|
||||
release refuses Unix-domain socket forwarding when privilege
|
||||
separation is disabled (Privilege separation has been enabled
|
||||
by default for 14 years). Reported by Jann Horn of Project
|
||||
Zero.
|
||||
* sshd(8): Avoid theoretical leak of host private key material
|
||||
to privilege-separated child processes via realloc() when
|
||||
reading keys. No such leak was observed in practice for
|
||||
normal-sized keys, nor does a leak to the child processes
|
||||
directly expose key material to unprivileged users. Reported
|
||||
by Jann Horn of Project Zero.
|
||||
* sshd(8): The shared memory manager used by pre-authentication
|
||||
compression support had a bounds checks that could be elided
|
||||
by some optimising compilers. Additionally, this memory
|
||||
manager was incorrectly accessible when pre-authentication
|
||||
compression was disabled. This could potentially allow
|
||||
attacks against the privileged monitor process from the
|
||||
sandboxed privilege-separation process (a compromise of the
|
||||
latter would be required first). This release removes
|
||||
support for pre-authentication compression from sshd(8).
|
||||
Reported by Guido Vranken using the Stack unstable
|
||||
optimisation identification tool
|
||||
(http://css.csail.mit.edu/stack/)
|
||||
* sshd(8): Fix denial-of-service condition where an attacker
|
||||
who sends multiple KEXINIT messages may consume up to 128MB
|
||||
per connection. Reported by Shi Lei of Gear Team, Qihoo 360.
|
||||
* sshd(8): Validate address ranges for AllowUser and DenyUsers
|
||||
directives at configuration load time and refuse to accept
|
||||
invalid ones. It was previously possible to specify invalid
|
||||
CIDR address ranges (e.g. user@127.1.2.3/55) and these would
|
||||
always match, possibly resulting in granting access where it
|
||||
was not intended. Reported by Laurence Parry.
|
||||
---- New Features
|
||||
* ssh(1): Add a proxy multiplexing mode to ssh(1) inspired by
|
||||
the version in PuTTY by Simon Tatham. This allows a
|
||||
multiplexing client to communicate with the master process
|
||||
using a subset of the SSH packet and channels protocol over a
|
||||
Unix-domain socket, with the main process acting as a proxy
|
||||
that translates channel IDs, etc. This allows multiplexing
|
||||
mode to run on systems that lack file- descriptor passing
|
||||
(used by current multiplexing code) and potentially, in
|
||||
conjunction with Unix-domain socket forwarding, with the
|
||||
client and multiplexing master process on different machines.
|
||||
Multiplexing proxy mode may be invoked using "ssh -O proxy
|
||||
..."
|
||||
* sshd(8): Add a sshd_config DisableForwarding option that
|
||||
disables X11, agent, TCP, tunnel and Unix domain socket
|
||||
forwarding, as well as anything else we might implement in
|
||||
the future. Like the 'restrict' authorized_keys flag, this is
|
||||
intended to be a simple and future-proof way of restricting
|
||||
an account.
|
||||
* sshd(8), ssh(1): Support the "curve25519-sha256" key exchange
|
||||
method. This is identical to the currently-supported method
|
||||
named "curve25519-sha256@libssh.org".
|
||||
* sshd(8): Improve handling of SIGHUP by checking to see if
|
||||
sshd is already daemonised at startup and skipping the call
|
||||
to daemon(3) if it is. This ensures that a SIGHUP restart of
|
||||
sshd(8) will retain the same process-ID as the initial
|
||||
execution. sshd(8) will also now unlink the PidFile prior to
|
||||
SIGHUP restart and re-create it after a successful restart,
|
||||
rather than leaving a stale file in the case of a
|
||||
configuration error. bz#2641
|
||||
* sshd(8): Allow ClientAliveInterval and ClientAliveCountMax
|
||||
directives to appear in sshd_config Match blocks.
|
||||
* sshd(8): Add %-escapes to AuthorizedPrincipalsCommand to
|
||||
match those supported by AuthorizedKeysCommand (key, key
|
||||
type, fingerprint, etc.) and a few more to provide access to
|
||||
the contents of the certificate being offered.
|
||||
* Added regression tests for string matching, address matching
|
||||
and string sanitisation functions.
|
||||
* Improved the key exchange fuzzer harness.
|
||||
---- Bugfixes
|
||||
* ssh(1): Allow IdentityFile to successfully load and use
|
||||
certificates that have no corresponding bare public key.
|
||||
bz#2617 certificate id_rsa-cert.pub (and no id_rsa.pub).
|
||||
* ssh(1): Fix public key authentication when multiple
|
||||
authentication is in use and publickey is not just the first
|
||||
method attempted. bz#2642
|
||||
* regress: Allow the PuTTY interop tests to run unattended.
|
||||
bz#2639
|
||||
* ssh-agent(1), ssh(1): improve reporting when attempting to
|
||||
load keys from PKCS#11 tokens with fewer useless log messages
|
||||
and more detail in debug messages. bz#2610
|
||||
* ssh(1): When tearing down ControlMaster connections, don't
|
||||
pollute stderr when LogLevel=quiet.
|
||||
* sftp(1): On ^Z wait for underlying ssh(1) to suspend before
|
||||
suspending sftp(1) to ensure that ssh(1) restores the
|
||||
terminal mode correctly if suspended during a password
|
||||
prompt.
|
||||
* ssh(1): Avoid busy-wait when ssh(1) is suspended during a
|
||||
password prompt.
|
||||
* ssh(1), sshd(8): Correctly report errors during sending of
|
||||
ext- info messages.
|
||||
* sshd(8): fix NULL-deref crash if sshd(8) received an out-of-
|
||||
sequence NEWKEYS message.
|
||||
* sshd(8): Correct list of supported signature algorithms sent
|
||||
in the server-sig-algs extension. bz#2547
|
||||
* sshd(8): Fix sending ext_info message if privsep is disabled.
|
||||
* sshd(8): more strictly enforce the expected ordering of
|
||||
privilege separation monitor calls used for authentication
|
||||
and allow them only when their respective authentication
|
||||
methods are enabled in the configuration
|
||||
* sshd(8): Fix uninitialised optlen in getsockopt() call;
|
||||
harmless on Unix/BSD but potentially crashy on Cygwin.
|
||||
* Fix false positive reports caused by explicit_bzero(3) not
|
||||
being recognised as a memory initialiser when compiled with
|
||||
-fsanitize-memory.
|
||||
* sshd_config(5): Use 2001:db8::/32, the official IPv6 subnet
|
||||
for configuration examples.
|
||||
---- Portability
|
||||
* On environments configured with Turkish locales, fall back to
|
||||
the C/POSIX locale to avoid errors in configuration parsing
|
||||
caused by that locale's unique handling of the letters 'i'
|
||||
and 'I'. bz#2643
|
||||
* sftp-server(8), ssh-agent(1): Deny ptrace on OS X using
|
||||
ptrace(PT_DENY_ATTACH, ..)
|
||||
* ssh(1), sshd(8): Unbreak AES-CTR ciphers on old (~0.9.8)
|
||||
OpenSSL.
|
||||
* Fix compilation for libcrypto compiled without RIPEMD160
|
||||
support.
|
||||
* contrib: Add a gnome-ssh-askpass3 with GTK+3 support. bz#2640
|
||||
* sshd(8): Improve PRNG reseeding across privilege separation
|
||||
and force libcrypto to obtain a high-quality seed before
|
||||
chroot or sandboxing.
|
||||
* All: Explicitly test for broken strnvis. NetBSD added an
|
||||
strnvis and unfortunately made it incompatible with the
|
||||
existing one in OpenBSD and Linux's libbsd (the former having
|
||||
existed for over ten years). Try to detect this mess, and
|
||||
assume the only safe option if we're cross compiling.
|
||||
- OpenSSH 7.5
|
||||
---- Potentially-incompatible changes
|
||||
* This release deprecates the sshd_config
|
||||
UsePrivilegeSeparation option, thereby making privilege
|
||||
separation mandatory. Privilege separation has been on by
|
||||
default for almost 15 years and sandboxing has been on by
|
||||
default for almost the last five.
|
||||
* The format of several log messages emitted by the packet code
|
||||
has changed to include additional information about the user
|
||||
and their authentication state. Software that monitors
|
||||
ssh/sshd logs may need to account for these changes. For
|
||||
example:
|
||||
Connection closed by user x 1.1.1.1 port 1234 [preauth]
|
||||
Connection closed by authenticating user x 10.1.1.1 port 1234
|
||||
[preauth] Connection closed by invalid user x 1.1.1.1 port
|
||||
1234 [preauth]
|
||||
Affected messages include connection closure, timeout, remote
|
||||
disconnection, negotiation failure and some other fatal
|
||||
messages generated by the packet code.
|
||||
* [Portable OpenSSH only] This version removes support for
|
||||
building against OpenSSL versions prior to 1.0.1. OpenSSL
|
||||
stopped supporting versions prior to 1.0.1 over 12 months ago
|
||||
(i.e. they no longer receive fixes for security bugs).
|
||||
---- Security
|
||||
* ssh(1), sshd(8): Fix weakness in CBC padding oracle
|
||||
countermeasures that allowed a variant of the attack fixed in
|
||||
OpenSSH 7.3 to proceed. Note that the OpenSSH client
|
||||
disables CBC ciphers by default, sshd offers them as
|
||||
lowest-preference options and will remove them by default
|
||||
entriely in the next release. Reported by Jean Paul
|
||||
Degabriele, Kenny Paterson, Martin Albrecht and Torben Hansen
|
||||
of Royal Holloway, University of London.
|
||||
* sftp-client(1): [portable OpenSSH only] On Cygwin, a client
|
||||
making a recursive file transfer could be maniuplated by a
|
||||
hostile server to perform a path-traversal attack. creating
|
||||
or modifying files outside of the intended target directory.
|
||||
Reported by Jann Horn of Google Project Zero.
|
||||
---- New Features
|
||||
* ssh(1), sshd(8): Support "=-" syntax to easily remove methods
|
||||
from algorithm lists, e.g. Ciphers=-*cbc. bz#2671
|
||||
---- Bugfixes
|
||||
* sshd(1): Fix NULL dereference crash when key exchange start
|
||||
messages are sent out of sequence.
|
||||
* ssh(1), sshd(8): Allow form-feed characters to appear in
|
||||
configuration files.
|
||||
* sshd(8): Fix regression in OpenSSH 7.4 support for the
|
||||
server-sig-algs extension, where SHA2 RSA signature methods
|
||||
were not being correctly advertised. bz#2680
|
||||
* ssh(1), ssh-keygen(1): Fix a number of case-sensitivity bugs
|
||||
in known_hosts processing. bz#2591 bz#2685
|
||||
* ssh(1): Allow ssh to use certificates accompanied by a
|
||||
private key file but no corresponding plain *.pub public key.
|
||||
bz#2617
|
||||
* ssh(1): When updating hostkeys using the UpdateHostKeys
|
||||
option, accept RSA keys if HostkeyAlgorithms contains any RSA
|
||||
keytype. Previously, ssh could ignore RSA keys when only the
|
||||
ssh-rsa-sha2-* methods were enabled in HostkeyAlgorithms and
|
||||
not the old ssh-rsa method. bz#2650
|
||||
* ssh(1): Detect and report excessively long configuration file
|
||||
lines. bz#2651
|
||||
* Merge a number of fixes found by Coverity and reported via
|
||||
Redhat and FreeBSD. Includes fixes for some memory and file
|
||||
descriptor leaks in error paths. bz#2687
|
||||
* ssh-keyscan(1): Correctly hash hosts with a port number.
|
||||
bz#2692
|
||||
* ssh(1), sshd(8): When logging long messages to stderr, don't
|
||||
truncate "\r\n" if the length of the message exceeds the
|
||||
buffer. bz#2688
|
||||
* ssh(1): Fully quote [host]:port in generated ProxyJump/-J
|
||||
command- line; avoid confusion over IPv6 addresses and shells
|
||||
that treat square bracket characters specially.
|
||||
* ssh-keygen(1): Fix corruption of known_hosts when running
|
||||
"ssh-keygen -H" on a known_hosts containing already-hashed
|
||||
entries.
|
||||
* Fix various fallout and sharp edges caused by removing SSH
|
||||
protocol 1 support from the server, including the server
|
||||
banner string being incorrectly terminated with only \n
|
||||
(instead of \r\n), confusing error messages from ssh-keyscan
|
||||
bz#2583 and a segfault in sshd if protocol v.1 was enabled
|
||||
for the client and sshd_config contained references to legacy
|
||||
keys bz#2686.
|
||||
* ssh(1), sshd(8): Free fd_set on connection timeout. bz#2683
|
||||
* sshd(8): Fix Unix domain socket forwarding for root
|
||||
(regression in OpenSSH 7.4).
|
||||
* sftp(1): Fix division by zero crash in "df" output when
|
||||
server returns zero total filesystem blocks/inodes.
|
||||
* ssh(1), ssh-add(1), ssh-keygen(1), sshd(8): Translate OpenSSL
|
||||
errors encountered during key loading to more meaningful
|
||||
error codes. bz#2522 bz#2523
|
||||
* ssh-keygen(1): Sanitise escape sequences in key comments sent
|
||||
to printf but preserve valid UTF-8 when the locale supports
|
||||
it; bz#2520
|
||||
* ssh(1), sshd(8): Return reason for port forwarding failures
|
||||
where feasible rather than always "administratively
|
||||
prohibited". bz#2674
|
||||
* sshd(8): Fix deadlock when AuthorizedKeysCommand or
|
||||
AuthorizedPrincipalsCommand produces a lot of output and a
|
||||
key is matched early. bz#2655
|
||||
* Regression tests: several reliability fixes. bz#2654 bz#2658
|
||||
bz#2659
|
||||
* ssh(1): Fix typo in ~C error message for bad port forward
|
||||
cancellation. bz#2672
|
||||
* ssh(1): Show a useful error message when included config
|
||||
files can't be opened; bz#2653
|
||||
* sshd(8): Make sshd set GSSAPIStrictAcceptorCheck=yes as the
|
||||
manual page (previously incorrectly) advertised. bz#2637
|
||||
* sshd_config(5): Repair accidentally-deleted mention of %k
|
||||
token in AuthorizedKeysCommand; bz#2656
|
||||
* sshd(8): Remove vestiges of previously removed LOGIN_PROGRAM;
|
||||
bz#2665
|
||||
* ssh-agent(1): Relax PKCS#11 whitelist to include libexec and
|
||||
common 32-bit compatibility library directories.
|
||||
* sftp-client(1): Fix non-exploitable integer overflow in
|
||||
SSH2_FXP_NAME response handling.
|
||||
* ssh-agent(1): Fix regression in 7.4 of deleting
|
||||
PKCS#11-hosted keys. It was not possible to delete them
|
||||
except by specifying their full physical path. bz#2682
|
||||
---- Portability
|
||||
* sshd(8): Avoid sandbox errors for Linux S390 systems using an
|
||||
ICA crypto coprocessor.
|
||||
* sshd(8): Fix non-exploitable weakness in seccomp-bpf sandbox
|
||||
arg inspection.
|
||||
* ssh(1): Fix X11 forwarding on OSX where X11 was being started
|
||||
by launchd. bz#2341
|
||||
* ssh-keygen(1), ssh(1), sftp(1): Fix output truncation for
|
||||
various that contain non-printable characters where the
|
||||
codeset in use is ASCII.
|
||||
* build: Fix builds that attempt to link a kerberised libldns.
|
||||
bz#2603
|
||||
* build: Fix compilation problems caused by unconditionally
|
||||
defining _XOPEN_SOURCE in wide character detection.
|
||||
* sshd(8): Fix sandbox violations for clock_gettime VSDO
|
||||
syscall fallback on some Linux/X32 kernels. bz#2142
|
||||
- OpenSSH 7.6
|
||||
---- Potentially-incompatible changes
|
||||
This release includes a number of changes that may affect
|
||||
existing configurations:
|
||||
* ssh(1): delete SSH protocol version 1 support, associated
|
||||
configuration options and documentation.
|
||||
* ssh(1)/sshd(8): remove support for the hmac-ripemd160 MAC.
|
||||
* ssh(1)/sshd(8): remove support for the arcfour, blowfish and
|
||||
CAST ciphers.
|
||||
* Refuse RSA keys <1024 bits in length and improve reporting
|
||||
for keys that do not meet this requirement.
|
||||
* ssh(1): do not offer CBC ciphers by default.
|
||||
---- Security
|
||||
* sftp-server(8): in read-only mode, sftp-server was
|
||||
incorrectly permitting creation of zero-length files.
|
||||
Reported by Michal Zalewski.
|
||||
---- New Features
|
||||
* ssh(1): add RemoteCommand option to specify a command in the
|
||||
ssh config file instead of giving it on the client's command
|
||||
line. This allows the configuration file to specify the
|
||||
command that will be executed on the remote host.
|
||||
* sshd(8): add ExposeAuthInfo option that enables writing
|
||||
details of the authentication methods used (including public
|
||||
keys where applicable) to a file that is exposed via a
|
||||
$SSH_USER_AUTH environment variable in the subsequent
|
||||
session.
|
||||
* ssh(1): add support for reverse dynamic forwarding. In this
|
||||
mode, ssh will act as a SOCKS4/5 proxy and forward
|
||||
connections to destinations requested by the remote SOCKS
|
||||
client. This mode is requested using extended syntax for the
|
||||
-R and RemoteForward options and, because it is implemented
|
||||
solely at the client, does not require the server be updated
|
||||
to be supported.
|
||||
* sshd(8): allow LogLevel directive in sshd_config Match
|
||||
blocks; bz#2717
|
||||
* ssh-keygen(1): allow inclusion of arbitrary string or flag
|
||||
certificate extensions and critical options.
|
||||
* ssh-keygen(1): allow ssh-keygen to use a key held in
|
||||
ssh-agent as a CA when signing certificates. bz#2377
|
||||
* ssh(1)/sshd(8): allow IPQoS=none in ssh/sshd to not set an
|
||||
explicit ToS/DSCP value and just use the operating system
|
||||
default.
|
||||
* ssh-add(1): added -q option to make ssh-add quiet on success.
|
||||
* ssh(1): expand the StrictHostKeyChecking option with two new
|
||||
settings. The first "accept-new" will automatically accept
|
||||
hitherto-unseen keys but will refuse connections for changed
|
||||
or invalid hostkeys. This is a safer subset of the current
|
||||
behaviour of StrictHostKeyChecking=no. The second setting
|
||||
"off", is a synonym for the current behaviour of
|
||||
StrictHostKeyChecking=no: accept new host keys, and continue
|
||||
connection for hosts with incorrect hostkeys. A future
|
||||
release will change the meaning of StrictHostKeyChecking=no
|
||||
to the behaviour of "accept-new". bz#2400
|
||||
* ssh(1): add SyslogFacility option to ssh(1) matching the
|
||||
equivalent option in sshd(8). bz#2705
|
||||
---- Bugfixes
|
||||
* ssh(1): use HostKeyAlias if specified instead of hostname for
|
||||
matching host certificate principal names; bz#2728
|
||||
* sftp(1): implement sorting for globbed ls; bz#2649
|
||||
* ssh(1): add a user@host prefix to client's "Permission
|
||||
denied" messages, useful in particular when using "stacked"
|
||||
connections (e.g. ssh -J) where it's not clear which host is
|
||||
denying. bz#2720
|
||||
* ssh(1): accept unknown EXT_INFO extension values that contain
|
||||
\0 characters. These are legal, but would previously cause
|
||||
fatal connection errors if received.
|
||||
* ssh(1)/sshd(8): repair compression statistics printed at
|
||||
connection exit
|
||||
* sftp(1): print '?' instead of incorrect link count (that the
|
||||
protocol doesn't provide) for remote listings. bz#2710
|
||||
* ssh(1): return failure rather than fatal() for more cases
|
||||
during session multiplexing negotiations. Causes the session
|
||||
to fall back to a non-mux connection if they occur. bz#2707
|
||||
* ssh(1): mention that the server may send debug messages to
|
||||
explain public key authentication problems under some
|
||||
circumstances; bz#2709
|
||||
* Translate OpenSSL error codes to better report incorrect
|
||||
passphrase errors when loading private keys; bz#2699
|
||||
* sshd(8): adjust compatibility patterns for WinSCP to
|
||||
correctly identify versions that implement only the legacy DH
|
||||
group exchange scheme. bz#2748
|
||||
* ssh(1): print the "Killed by signal 1" message only at
|
||||
LogLevel verbose so that it is not shown at the default
|
||||
level; prevents it from appearing during ssh -J and
|
||||
equivalent ProxyCommand configs. bz#1906, bz#2744
|
||||
* ssh-keygen(1): when generating all hostkeys (ssh-keygen -A),
|
||||
clobber existing keys if they exist but are zero length.
|
||||
zero-length keys could previously be made if ssh-keygen
|
||||
failed or was interrupted part way through generating them.
|
||||
bz#2561
|
||||
* ssh(1): fix pledge(2) violation in the escape sequence "~&"
|
||||
used to place the current session in the background.
|
||||
* ssh-keyscan(1): avoid double-close() on file descriptors;
|
||||
bz#2734
|
||||
* sshd(8): avoid reliance on shared use of pointers shared
|
||||
between monitor and child sshd processes. bz#2704
|
||||
* sshd_config(8): document available AuthenticationMethods;
|
||||
bz#2453
|
||||
* ssh(1): avoid truncation in some login prompts; bz#2768
|
||||
* sshd(8): Fix various compilations failures, inc bz#2767
|
||||
* ssh(1): make "--" before the hostname terminate argument
|
||||
processing after the hostname too.
|
||||
* ssh-keygen(1): switch from aes256-cbc to aes256-ctr for
|
||||
encrypting new-style private keys. Fixes problems related to
|
||||
private key handling for no-OpenSSL builds. bz#2754
|
||||
* ssh(1): warn and do not attempt to use keys when the public
|
||||
and private halves do not match. bz#2737
|
||||
* sftp(1): don't print verbose error message when ssh
|
||||
disconnects from under sftp. bz#2750
|
||||
* sshd(8): fix keepalive scheduling problem: activity on a
|
||||
forwarded port from preventing the keepalive from being sent;
|
||||
bz#2756
|
||||
* sshd(8): when started without root privileges, don't require
|
||||
the privilege separation user or path to exist. Makes running
|
||||
the regression tests easier without touching the filesystem.
|
||||
* Make integrity.sh regression tests more robust against
|
||||
timeouts. bz#2658
|
||||
* ssh(1)/sshd(8): correctness fix for channels implementation:
|
||||
accept channel IDs greater than 0x7FFFFFFF.
|
||||
---- Portability
|
||||
* sshd(9): drop two more privileges in the Solaris sandbox:
|
||||
PRIV_DAX_ACCESS and PRIV_SYS_IB_INFO; bz#2723
|
||||
* sshd(8): expose list of completed authentication methods to
|
||||
PAM via the SSH_AUTH_INFO_0 PAM environment variable. bz#2408
|
||||
* ssh(1)/sshd(8): fix several problems in the tun/tap
|
||||
forwarding code, mostly to do with host/network byte order
|
||||
confusion. bz#2735
|
||||
* Add --with-cflags-after and --with-ldflags-after configure
|
||||
flags to allow setting CFLAGS/LDFLAGS after configure has
|
||||
completed. These are useful for setting sanitiser/fuzzing
|
||||
options that may interfere with configure's operation.
|
||||
* sshd(8): avoid Linux seccomp violations on ppc64le over the
|
||||
socketcall syscall.
|
||||
* Fix use of ldns when using ldns-config; bz#2697
|
||||
* configure: set cache variables when cross-compiling. The
|
||||
cross- compiling fallback message was saying it assumed the
|
||||
test passed, but it wasn't actually set the cache variables
|
||||
and this would cause later tests to fail.
|
||||
* Add clang libFuzzer harnesses for public key parsing and
|
||||
signature verification.
|
||||
- packaging:
|
||||
* removal of all 7.2 patches
|
||||
* first round of rebased patches:
|
||||
[openssh-7.6p1-X11_trusted_forwarding.patch]
|
||||
[openssh-7.6p1-allow_root_password_login.patch]
|
||||
[openssh-7.6p1-blocksigalrm.patch]
|
||||
[openssh-7.6p1-disable_short_DH_parameters.patch]
|
||||
[openssh-7.6p1-eal3.patch]
|
||||
[openssh-7.6p1-enable_PAM_by_default.patch]
|
||||
[openssh-7.6p1-hostname_changes_when_forwarding_X.patch]
|
||||
[openssh-7.6p1-lastlog.patch]
|
||||
[openssh-7.6p1-pam_check_locks.patch]
|
||||
[openssh-7.6p1-pts_names_formatting.patch]
|
||||
[openssh-7.6p1-remove_xauth_cookies_on_exit.patch]
|
||||
[openssh-7.6p1-seccomp_geteuid.patch]
|
||||
[openssh-7.6p1-seccomp_getuid.patch]
|
||||
[openssh-7.6p1-seccomp_stat.patch]
|
||||
[openssh-7.6p1-send_locale.patch]
|
||||
* not rebased (obsoleted) patches (so far):
|
||||
[openssh-7.2p2-saveargv-fix.diff]
|
||||
[openssh-7.2p2-dont_use_pthreads_in_PAM.diff]
|
||||
[openssh-7.2p2-gssapimitm.diff]
|
||||
[openssh-7.2p2-eal3_obsolete.diff]
|
||||
[openssh-7.2p2-default_protocol.diff]
|
||||
[openssh-7.2p2-additional_seccomp_archs.patch]
|
||||
- Silent complaints about unsupported key exchange methods
|
||||
(bsc#1006166)
|
||||
[openssh-7.2p2-fips_fixes.patch]
|
||||
- Stricter checking of operations in read-only mode in sftp server
|
||||
(CVE-2017-15906, bsc#1065000)
|
||||
[openssh-7.2p2-stricter_readonly_sftp.patch]
|
||||
- Refine handling of sockets for X11 forwarding to remove
|
||||
reintroduced CVE-2008-1483 (bsc#1069509)
|
||||
- systemd integration to work around various race conditions
|
||||
(bsc#1048367)
|
||||
[openssh-7.2p2-systemd-notify.patch]
|
||||
- Add back support for TCP wrappers removed by the upgrade
|
||||
to 7.2p2. TCP wrappers support will be dripped with the next
|
||||
version upgrade.
|
||||
[openssh-7.2p2-tcpwrappers.patch]
|
||||
- fix regression of (bsc#823710)
|
||||
[openssh-7.2p2-audit_fixes.patch]
|
||||
- new switch for printing diagnostic messages in sftp client's
|
||||
batch mode (bsc#1023275)
|
||||
[openssh-7.2p2-sftp_print_diagnostic_messages.patch]
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Wed Oct 25 15:09:06 UTC 2017 - jsegitz@suse.com
|
||||
|
Reference in New Issue
Block a user