SHA256
1
0
forked from pool/openssh
Go to file
Dominique Leuenberger 37692216e0 Accepting request 603107 from network
- Use TIRPC on suse_version >= 1500: sunrpc is deprecated and
  should be replaced by TIRPC.

This has several effects:
* We get RPC support back... from build log in oS:F/standard:

[   48s] checking rpc/types.h usability... no
[   48s] checking rpc/types.h presence... no
[   48s] checking for rpc/types.h... no

vs this branch:
[   50s] checking rpc/types.h usability... yes
[   50s] checking rpc/types.h presence... yes
[   50s] checking for rpc/types.h... yes

AND as a side-effect, FALSE for ldapbody.c is now defined (not the
  nicest of side-effects, but seems that ldap patch relies on RPC
  headers to be included.

So all in all: this fixes the build failures for openSUSE Tumblewee (forwarded request 602971 from dimstar)

OBS-URL: https://build.opensuse.org/request/show/603107
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=117
2018-05-07 12:51:28 +00:00
.gitattributes OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=1 2007-01-07 16:26:05 +00:00
.gitignore OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=1 2007-01-07 16:26:05 +00:00
cavs_driver-ssh.pl Accepting request 563724 from home:pcerny:factory 2018-01-12 00:42:53 +00:00
openssh-7.6p1-SUSE_patches.tar.gz Accepting request 602709 from home:pcerny:factory 2018-04-30 23:44:41 +00:00
openssh-7.6p1.tar.gz Accepting request 551548 from home:pcerny:factory 2017-12-05 12:47:07 +00:00
openssh-7.6p1.tar.gz.asc Accepting request 551548 from home:pcerny:factory 2017-12-05 12:47:07 +00:00
openssh-askpass-gnome.changes Accepting request 571576 from home:pcerny:factory 2018-02-01 00:18:29 +00:00
openssh-askpass-gnome.spec (update tracker: bsc#1080779) 2018-03-05 16:40:33 +00:00
openssh.changes Accepting request 602971 from home:dimstar:Factory 2018-05-02 12:05:42 +00:00
openssh.spec Accepting request 602971 from home:dimstar:Factory 2018-05-02 12:05:42 +00:00
README.FIPS Accepting request 432093 from home:pcerny:factory 2016-09-30 20:34:19 +00:00
README.kerberos Accepting request 500279 from home:pcerny:factory 2017-05-31 23:09:14 +00:00
README.SUSE Accepting request 500279 from home:pcerny:factory 2017-05-31 23:09:14 +00:00
ssh-askpass Accepting request 398802 from home:pcerny:factory 2016-05-30 01:36:18 +00:00
ssh.reg OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=1 2007-01-07 16:26:05 +00:00
sshd-gen-keys-start Accepting request 199679 from home:pcerny:factory 2013-09-19 04:09:33 +00:00
sshd.fw OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=7 2007-07-27 00:01:43 +00:00
sshd.init Accepting request 398802 from home:pcerny:factory 2016-05-30 01:36:18 +00:00
sshd.pamd Accepting request 199679 from home:pcerny:factory 2013-09-19 04:09:33 +00:00
sshd.service Accepting request 571576 from home:pcerny:factory 2018-02-01 00:18:29 +00:00
sysconfig.ssh Accepting request 88642 from home:pcerny:factory 2011-10-19 02:18:13 +00:00

This is OpenSSH version 7.2p2 for SLE12

There are following changes in default settings of ssh client and server:

* Accepting and sending of locale environment variables in protocol 2 is
  enabled.

* PAM authentication is enabled.

* root authentiation with password is enabled by default (PermitRootLogin yes).
  NOTE: this has security implications and is only done in order to not change
  behaviour of the server in an update. We strongly suggest setting this option
  either "prohibit-password" or even better to "no" (which disables direct
  remote root login entirely).

* SSH protocol version 1 is enabled for maximum compatibility.
  NOTE: do not use protocol version 1. It is less secure then v2 and should
  generally be phased out.

* DSA authentication is enabled by default for maximum compatibility.
  NOTE: do not use DSA authentication since it is being phased out for a reason
  - the size of DSA keys is limited by the standard to 1024 bits which cannot
  be considered safe any more.

* Accepting all RFC4419 specified DH group parameters. See KexDHMin in
  ssh_config and sshd_config manual pages.

For more information on differences in SUSE OpenSSH package see README.FIPS