SHA256
1
0
forked from pool/openssh
Commit Graph

130 Commits

Author SHA256 Message Date
Stephan Kulow
c8d3d86692 Accepting request 224303 from network
- re-enabling FIPS-enablement patch
- enable X11 forwarding when IPv6 is present but disabled on server
  (bnc#712683, FATE#31503; -X_forward_with_disabled_ipv6.patch) (forwarded request 224302 from pcerny)

OBS-URL: https://build.opensuse.org/request/show/224303
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=92
2014-03-01 20:20:10 +00:00
Petr Cerny
25f021b853 Accepting request 224302 from home:pcerny:factory
- re-enabling FIPS-enablement patch
- enable X11 forwarding when IPv6 is present but disabled on server
  (bnc#712683, FATE#31503; -X_forward_with_disabled_ipv6.patch)

OBS-URL: https://build.opensuse.org/request/show/224302
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=70
2014-03-01 00:05:55 +00:00
Stephan Kulow
36c921d588 Accepting request 223064 from network
- openssh-6.5p1-seccomp_getuid.patch: re-enabling the seccomp sandbox
  (allowing use of the getuid syscall) (bnc#864171)

OBS-URL: https://build.opensuse.org/request/show/223064
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=91
2014-02-21 18:52:29 +00:00
5f397d839b - openssh-6.5p1-seccomp_getuid.patch: re-enabling the seccomp sandbox
(allowing use of the getuid syscall) (bnc#864171)

OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=68
2014-02-19 13:30:54 +00:00
5ada588ef0 OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=67 2014-02-19 13:22:51 +00:00
Petr Cerny
f2774839fb Accepting request 222710 from home:pcerny:factory
- re-enabling the seccomp sandbox
  (allowing use of getuid the syscall)

OBS-URL: https://build.opensuse.org/request/show/222710
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=66
2014-02-18 13:04:57 +00:00
Petr Cerny
eedbb4ea75 Accepting request 222560 from home:pcerny:factory
- reverting to rlimit sandbox even for newer distributions, since
  it seems not to work properly (bnc#864171)

OBS-URL: https://build.opensuse.org/request/show/222560
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=65
2014-02-17 11:31:08 +00:00
Stephan Kulow
f53e0cfba2 Accepting request 222366 from network
- Update of the underlying OpenSSH to 6.5p1

- Update to 6.5p1
  Features since 6.4p1:
  * ssh(1), sshd(8): support for key exchange using ECDH in
    Daniel Bernstein's Curve25519; default when both the client
    and server support it.
  * ssh(1), sshd(8): support for Ed25519 as a public key type fo
    rboth server and client.  Ed25519 is an EC signature offering
    better security than ECDSA and DSA and good performance.
  * Add a new private key format that uses a bcrypt KDF to better
    protect keys at rest. Used unconditionally for Ed25519 keys,
    on demand for other key types via the -o ssh-keygen(1)
    option.  Intended to become default in the near future.
    Details documented in PROTOCOL.key.
  * ssh(1), sshd(8): new transport cipher
    "chacha20-poly1305@openssh.com" combining Daniel Bernstein's
    ChaCha20 stream cipher and Poly1305 MAC to build an
    authenticated encryption mode. Details documented
    PROTOCOL.chacha20poly1305.
  * ssh(1), sshd(8): refuse RSA keys from old proprietary clients
    and servers that use the obsolete RSA+MD5 signature scheme.
    It will still be possible to connect with these
    clients/servers but only DSA keys will be accepted, and
    OpenSSH will refuse connection entirely in a future release.
  * ssh(1), sshd(8): refuse old proprietary clients and servers
    that use a weaker key exchange hash calculation.
  * ssh(1): increase the size of the Diffie-Hellman groups
    requested for each symmetric key size. New values from NIST
    Special Publication 800-57 with the upper limit specified by (forwarded request 222365 from pcerny)

OBS-URL: https://build.opensuse.org/request/show/222366
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=90
2014-02-15 16:17:36 +00:00
Petr Cerny
08f9072513 Accepting request 222365 from home:pcerny:factory
- Update of the underlying OpenSSH to 6.5p1

- Update to 6.5p1
  Features since 6.4p1:
  * ssh(1), sshd(8): support for key exchange using ECDH in
    Daniel Bernstein's Curve25519; default when both the client
    and server support it.
  * ssh(1), sshd(8): support for Ed25519 as a public key type fo
    rboth server and client.  Ed25519 is an EC signature offering
    better security than ECDSA and DSA and good performance.
  * Add a new private key format that uses a bcrypt KDF to better
    protect keys at rest. Used unconditionally for Ed25519 keys,
    on demand for other key types via the -o ssh-keygen(1)
    option.  Intended to become default in the near future.
    Details documented in PROTOCOL.key.
  * ssh(1), sshd(8): new transport cipher
    "chacha20-poly1305@openssh.com" combining Daniel Bernstein's
    ChaCha20 stream cipher and Poly1305 MAC to build an
    authenticated encryption mode. Details documented
    PROTOCOL.chacha20poly1305.
  * ssh(1), sshd(8): refuse RSA keys from old proprietary clients
    and servers that use the obsolete RSA+MD5 signature scheme.
    It will still be possible to connect with these
    clients/servers but only DSA keys will be accepted, and
    OpenSSH will refuse connection entirely in a future release.
  * ssh(1), sshd(8): refuse old proprietary clients and servers
    that use a weaker key exchange hash calculation.
  * ssh(1): increase the size of the Diffie-Hellman groups
    requested for each symmetric key size. New values from NIST
    Special Publication 800-57 with the upper limit specified by

OBS-URL: https://build.opensuse.org/request/show/222365
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=63
2014-02-14 14:54:10 +00:00
b189026b63 OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=62 2014-02-11 08:14:49 +00:00
e282a93fa2 OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=61 2014-02-11 08:14:43 +00:00
db5db0c1c2 - add a rcsshd symlink to /usr/sbin/service
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=60
2014-02-11 07:43:47 +00:00
7d3e25f02e Accepting request 221224 from home:namtrac:bugfix
- Add openssh-6.2p1-forcepermissions.patch to implement a force
  permissions mode (fate#312774). The patch is based on
  http://marc.info/?l=openssh-unix-dev&m=128896838930893

OBS-URL: https://build.opensuse.org/request/show/221224
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=59
2014-02-08 10:47:01 +00:00
Petr Cerny
712ccf3395 Accepting request 220466 from home:pcerny:factory
- Update of the underlying OpenSSH to 6.4p1

- Update to 6.4p1
  Features since 6.2p2:
  * ssh-agent(1) support in sshd(8); allows encrypted hostkeys, or
    hostkeys on smartcards.
  * ssh(1)/sshd(8): allow optional time-based rekeying via a
    second argument to the existing RekeyLimit option. RekeyLimit
    is now supported in sshd_config as well as on the client.
  * sshd(8): standardise logging of information during user
    authentication.
  * The presented key/cert and the remote username (if available)
    is now logged in the authentication success/failure message on
    the same log line as the local username, remote host/port and
    protocol in use.  Certificates contents and the key
    fingerprint of the signing CA are logged too.
  * ssh(1) ability to query what cryptographic algorithms are
    supported in the binary.
  * ssh(1): ProxyCommand=- for cases where stdin and stdout
    already point to the proxy.
  * ssh(1): allow IdentityFile=none
  * ssh(1)/sshd(8): -E option to append debugging logs to a
    specified file instead of stderr or syslog.
  * sftp(1): support resuming partial downloads with the "reget"
    command and on the sftp commandline or on the "get"
    commandline with the "-a" (append) option.
  * ssh(1): "IgnoreUnknown" configuration option to selectively
    suppress errors arising from unknown configuration directives.
  * sshd(8): support for submethods to be appended to required
    authentication methods listed via AuthenticationMethods.

OBS-URL: https://build.opensuse.org/request/show/220466
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=58
2014-01-31 12:18:41 +00:00
Petr Cerny
6fccab223a Accepting request 202452 from home:pcerny:factory
- fix server crashes when using AES-GCM
- removed superfluous build dependency on X

OBS-URL: https://build.opensuse.org/request/show/202452
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=57
2013-10-07 08:32:48 +00:00
Petr Cerny
673551b2c9 Accepting request 199729 from home:pcerny:factory
- spec file and patch cleanup
- patches from SLE11
- init script is moved into documentation for openSUSE 12.3+

OBS-URL: https://build.opensuse.org/request/show/199729
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=56
2013-09-19 13:51:33 +00:00
Petr Cerny
6cd875acfc Accepting request 199679 from home:pcerny:factory
- spec file cleanup (don't pointelssly build whole OpenSSH)

- spec file and patch cleanup
  * removing obsoleted auditing patch
    (openssh-%{version}-audit.patch)
- added patches from SLE
  * GSSAPI key exchange
  * FIPS enablement (currently disabled)
  * small bugfixes 
- split the LDAP helper into a separate package: openssh-akc-ldap

OBS-URL: https://build.opensuse.org/request/show/199679
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=55
2013-09-19 04:09:33 +00:00
Stephan Kulow
946960ceb5 Accepting request 198435 from network
- fix the logic in openssh-nodaemon-nopid.patch which is broken
  and pid_file therefore still being created. (forwarded request 198380 from elvigia)

OBS-URL: https://build.opensuse.org/request/show/198435
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=88
2013-09-11 10:58:04 +00:00
Sascha Peilicke
76e102ad97 Accepting request 198380 from home:elvigia:branches:network
- fix the logic in openssh-nodaemon-nopid.patch which is broken
  and pid_file therefore still being created.

OBS-URL: https://build.opensuse.org/request/show/198380
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=53
2013-09-11 08:27:54 +00:00
Stephan Kulow
3d6d17e39a Accepting request 185890 from network
- Update for 6.2p2 

- Update to version 6.2p2 
* ssh(1)/sshd(8): Added support for AES-GCM authenticated encryption
* ssh(1)/sshd(8): Added support for encrypt-then-mac (EtM) MAC modes
* ssh(1)/sshd(8): Added support for the UMAC-128 MAC
* sshd(8): Added support for multiple required authentication
* sshd(8)/ssh-keygen(1): Added support for Key Revocation Lists
* ssh(1): When SSH protocol 2 only is selected (the default), ssh(1)
  now immediately sends its SSH protocol banner to the server without
  waiting to receive the server's banner, saving time when connecting.
* dozens of other changes, see http://www.openssh.org/txt/release-6.2 (forwarded request 185789 from elvigia)

OBS-URL: https://build.opensuse.org/request/show/185890
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=87
2013-08-05 18:49:11 +00:00
616ae5907d Accepting request 185789 from home:elvigia:branches:network
- Update for 6.2p2 

- Update to version 6.2p2 
* ssh(1)/sshd(8): Added support for AES-GCM authenticated encryption
* ssh(1)/sshd(8): Added support for encrypt-then-mac (EtM) MAC modes
* ssh(1)/sshd(8): Added support for the UMAC-128 MAC
* sshd(8): Added support for multiple required authentication
* sshd(8)/ssh-keygen(1): Added support for Key Revocation Lists
* ssh(1): When SSH protocol 2 only is selected (the default), ssh(1)
  now immediately sends its SSH protocol banner to the server without
  waiting to receive the server's banner, saving time when connecting.
* dozens of other changes, see http://www.openssh.org/txt/release-6.2

OBS-URL: https://build.opensuse.org/request/show/185789
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=51
2013-08-05 07:15:19 +00:00
Stephan Kulow
74a1aa087a Accepting request 181731 from network
- avoid the build cycle between curl, krb5, libssh2_org and openssh
  by using krb5-mini-devel (forwarded request 181706 from coolo)

OBS-URL: https://build.opensuse.org/request/show/181731
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=86
2013-07-03 08:25:21 +00:00
d3a2cdd766 Accepting request 181706 from openSUSE:Factory:Core
- avoid the build cycle between curl, krb5, libssh2_org and openssh
  by using krb5-mini-devel

OBS-URL: https://build.opensuse.org/request/show/181706
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=49
2013-07-02 08:17:10 +00:00
Stephan Kulow
01594daa8a Accepting request 180225 from network
- Recommend xauth, X11-forwarding won't work if it is not installed

- sshd.service: Do not order after syslog.target, it is 
 not required or recommended and that target does not even exist
 anymore.

OBS-URL: https://build.opensuse.org/request/show/180225
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=85
2013-06-20 19:24:09 +00:00
16b13adda2 Accepting request 179643 from home:saschpe:branches:network
- Recommend xauth, X11-forwarding won't work if it is not installed

OBS-URL: https://build.opensuse.org/request/show/179643
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=47
2013-06-19 14:31:43 +00:00
Petr Cerny
91c220ec23 Accepting request 163992 from home:elvigia:branches:network
- sshd.service: Do not order after syslog.target, it is 
 not required or recommended and that target does not even exist
 anymore.

OBS-URL: https://build.opensuse.org/request/show/163992
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=46
2013-04-15 09:19:17 +00:00
Stephan Kulow
b6dab790f1 Accepting request 147498 from network
- use ssh-keygen(1) default keylengths in generating the host key
  instead of hardcoding it (forwarded request 147497 from dirkmueller)

OBS-URL: https://build.opensuse.org/request/show/147498
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=83
2013-01-08 13:35:11 +00:00
Petr Cerny
892194f58f Accepting request 147497 from home:dirkmueller:branches:network
- use ssh-keygen(1) default keylengths in generating the host key
  instead of hardcoding it

OBS-URL: https://build.opensuse.org/request/show/147497
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=44
2013-01-08 10:22:21 +00:00
Stephan Kulow
6d007f0e34 Accepting request 141129 from network
- Updated to 6.1p1, a bugfix release
  Features:
 * sshd(8): This release turns on pre-auth sandboxing sshd by default for
   new installs, by setting UsePrivilegeSeparation=sandbox in sshd_config.
 * ssh-keygen(1): Add options to specify starting line number and number of
   lines to process when screening moduli candidates, allowing processing
   of different parts of a candidate moduli file in parallel
 * sshd(8): The Match directive now supports matching on the local (listen)
   address and port upon which the incoming connection was received via
   LocalAddress and LocalPort clauses.
 * sshd(8): Extend sshd_config Match directive to allow setting AcceptEnv
   and {Allow,Deny}{Users,Groups}
 * Add support for RFC6594 SSHFP DNS records for ECDSA key types. bz#1978
 * ssh-keygen(1): Allow conversion of RSA1 keys to public PEM and PKCS8
 * sshd(8): Allow the sshd_config PermitOpen directive to accept "none" as
   an argument to refuse all port-forwarding requests.
 * sshd(8): Support "none" as an argument for AuthorizedPrincipalsFile
 * ssh-keyscan(1): Look for ECDSA keys by default. bz#1971
 * sshd(8): Add "VersionAddendum" to sshd_config to allow server operators
   to append some arbitrary text to the server SSH protocol banner.
 Bugfixes:
 * ssh(1)/sshd(8): Don't spin in accept() in situations of file
   descriptor exhaustion. Instead back off for a while.
 * ssh(1)/sshd(8): Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs as
   they were removed from the specification. bz#2023,
 * sshd(8): Handle long comments in config files better. bz#2025
 * ssh(1): Delay setting tty_flag so RequestTTY options are correctly
   picked up. bz#1995
 * sshd(8): Fix handling of /etc/nologin incorrectly being applied to root
   on platforms that use login_cap.

OBS-URL: https://build.opensuse.org/request/show/141129
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=82
2012-11-14 08:15:15 +00:00
41221d925c - Updated to 6.1p1, a bugfix release
Features:
 * sshd(8): This release turns on pre-auth sandboxing sshd by default for
   new installs, by setting UsePrivilegeSeparation=sandbox in sshd_config.
 * ssh-keygen(1): Add options to specify starting line number and number of
   lines to process when screening moduli candidates, allowing processing
   of different parts of a candidate moduli file in parallel
 * sshd(8): The Match directive now supports matching on the local (listen)
   address and port upon which the incoming connection was received via
   LocalAddress and LocalPort clauses.
 * sshd(8): Extend sshd_config Match directive to allow setting AcceptEnv
   and {Allow,Deny}{Users,Groups}
 * Add support for RFC6594 SSHFP DNS records for ECDSA key types. bz#1978
 * ssh-keygen(1): Allow conversion of RSA1 keys to public PEM and PKCS8
 * sshd(8): Allow the sshd_config PermitOpen directive to accept "none" as
   an argument to refuse all port-forwarding requests.
 * sshd(8): Support "none" as an argument for AuthorizedPrincipalsFile
 * ssh-keyscan(1): Look for ECDSA keys by default. bz#1971
 * sshd(8): Add "VersionAddendum" to sshd_config to allow server operators
   to append some arbitrary text to the server SSH protocol banner.
 Bugfixes:
 * ssh(1)/sshd(8): Don't spin in accept() in situations of file
   descriptor exhaustion. Instead back off for a while.
 * ssh(1)/sshd(8): Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs as
   they were removed from the specification. bz#2023,
 * sshd(8): Handle long comments in config files better. bz#2025
 * ssh(1): Delay setting tty_flag so RequestTTY options are correctly
   picked up. bz#1995
 * sshd(8): Fix handling of /etc/nologin incorrectly being applied to root
   on platforms that use login_cap.

OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=42
2012-11-13 10:50:53 +00:00
22f435a6cb Accepting request 141090 from home:kukuk:branches:network
- Fix groupadd arguments
- Add LSB tag to sshd init script

OBS-URL: https://build.opensuse.org/request/show/141090
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=41
2012-11-13 10:18:36 +00:00
Stephan Kulow
d40cf89f18 Accepting request 139516 from network
- explicit buildrequire groff, needed for man pages (forwarded request 139460 from coolo)

OBS-URL: https://build.opensuse.org/request/show/139516
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=81
2012-10-27 11:24:25 +00:00
b4cc1b8406 Accepting request 139460 from home:coolo:branches:openSUSE:Factory
- explicit buildrequire groff, needed for man pages

OBS-URL: https://build.opensuse.org/request/show/139460
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=39
2012-10-26 23:00:00 +00:00
Stephan Kulow
0b2d7bd1bd Accepting request 139103 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/139103
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=80
2012-10-26 05:58:33 +00:00
Petr Cerny
8c5df33063 Accepting request 138920 from openSUSE:Factory:Staging:Systemd
buildrequire systemd through pkgconfig to break cycle

OBS-URL: https://build.opensuse.org/request/show/138920
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=37
2012-10-21 21:45:27 +00:00
Stephan Kulow
d009d29747 Accepting request 134088 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/134088
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=79
2012-09-17 12:01:19 +00:00
Petr Cerny
f948d6768b Accepting request 130946 from home:elvigia:branches:network
- When not daemonizing, such is used with systemd, no not
 create a PID file

OBS-URL: https://build.opensuse.org/request/show/130946
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=35
2012-08-16 12:55:50 +00:00
Stephan Kulow
a3c3964cbb Accepting request 126287 from network
- the gnome askpass does not require the x11 askpass - especially not
  in the version of openssh (it's at 1.X) (forwarded request 126286 from coolo)

OBS-URL: https://build.opensuse.org/request/show/126287
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=78
2012-06-28 13:37:36 +00:00
cfb80ff52c Accepting request 126286 from home:coolo:branches:openSUSE:Factory
- the gnome askpass does not require the x11 askpass - especially not
  in the version of openssh (it's at 1.X)

OBS-URL: https://build.opensuse.org/request/show/126286
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=33
2012-06-27 10:11:02 +00:00
Stephan Kulow
ee51c46d49 Accepting request 125385 from network
fixup the previous SR (forwarded request 125376 from coolo)

OBS-URL: https://build.opensuse.org/request/show/125385
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=77
2012-06-25 12:19:42 +00:00
c0682a3f4e Accepting request 125376 from home:coolo:branches:openSUSE:Factory
fixup the previous SR

OBS-URL: https://build.opensuse.org/request/show/125376
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=31
2012-06-19 07:08:12 +00:00
7e403aa536 Accepting request 125300 from home:coolo:branches:openSUSE:Factory
- do not buildrequire xorg-x11, the askpass is an extra package
  and should build from a different package

OBS-URL: https://build.opensuse.org/request/show/125300
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=30
2012-06-18 15:59:54 +00:00
Stephan Kulow
3aa31e6fef Accepting request 122848 from network
- use correct tarball url
- update to 6.0p1.

- use correct download url and tarball format.

- Update to version 6.0, large list of changes, seen
  http://www.openssh.org/txt/release-6.0 for detail.

OBS-URL: https://build.opensuse.org/request/show/122848
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=75
2012-05-31 15:07:32 +00:00
517f6527d0 - use correct tarball url
- update to 6.0p1.

- use correct download url and tarball format.

OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=28
2012-05-29 07:15:29 +00:00
9d7406f5e6 Accepting request 122649 from home:elvigia:branches:network
- Update to version 6.0, large list of changes, seen
  http://www.openssh.org/txt/release-6.0 for detail.

OBS-URL: https://build.opensuse.org/request/show/122649
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=27
2012-05-29 07:11:57 +00:00
Stephan Kulow
f33ec16ccc Accepting request 121257 from network
- By default openSSH checks at *runtime* if the openssl 
  API version matches with the running library, that might
  be good if you are compiling SSH yourself but it is a totally
  insane way to check for binary/source compatibility in a distribution. (forwarded request 120648 from elvigia)

OBS-URL: https://build.opensuse.org/request/show/121257
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=74
2012-05-21 08:01:18 +00:00
0c4ab9d007 Accepting request 120648 from home:elvigia:branches:network
- By default openSSH checks at *runtime* if the openssl 
  API version matches with the running library, that might
  be good if you are compiling SSH yourself but it is a totally
  insane way to check for binary/source compatibility in a distribution.

OBS-URL: https://build.opensuse.org/request/show/120648
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=25
2012-05-16 22:21:36 +00:00
Stephan Kulow
5e7dc6bfc6 Accepting request 112571 from network
Fix factory build: add autoconf and automake BuildRequires for openssh-askpass-gnome

OBS-URL: https://build.opensuse.org/request/show/112571
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=73
2012-04-12 07:44:03 +00:00
Petr Cerny
b29ae30591 Accepting request 111545 from home:a_jaeger:FactoryFix
Fix build.

OBS-URL: https://build.opensuse.org/request/show/111545
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=23
2012-03-30 14:20:49 +00:00
Stephan Kulow
278c012ec5 Accepting request 106090 from network
own the x11 app default dir

OBS-URL: https://build.opensuse.org/request/show/106090
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=72
2012-02-21 11:39:30 +00:00