forked from pool/openssh
Dirk Mueller
3a77b6ed2a
Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468) OBS-URL: https://build.opensuse.org/request/show/544667 OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=123 |
||
---|---|---|
.gitattributes | ||
.gitignore | ||
cavs_driver-ssh.pl | ||
openssh-7.6p1-allow_root_password_login.patch | ||
openssh-7.6p1-blocksigalrm.patch | ||
openssh-7.6p1-disable_short_DH_parameters.patch | ||
openssh-7.6p1-eal3.patch | ||
openssh-7.6p1-enable_PAM_by_default.patch | ||
openssh-7.6p1-hostname_changes_when_forwarding_X.patch | ||
openssh-7.6p1-lastlog.patch | ||
openssh-7.6p1-pam_check_locks.patch | ||
openssh-7.6p1-pts_names_formatting.patch | ||
openssh-7.6p1-remove_xauth_cookies_on_exit.patch | ||
openssh-7.6p1-seccomp_geteuid.patch | ||
openssh-7.6p1-seccomp_getuid.patch | ||
openssh-7.6p1-seccomp_stat.patch | ||
openssh-7.6p1-send_locale.patch | ||
openssh-7.6p1-X11_trusted_forwarding.patch | ||
openssh-7.6p1.tar.gz | ||
openssh-7.6p1.tar.gz.asc | ||
openssh-askpass-gnome.changes | ||
openssh-askpass-gnome.spec | ||
openssh.changes | ||
openssh.spec | ||
README.FIPS | ||
README.kerberos | ||
README.SUSE | ||
ssh-askpass | ||
ssh.reg | ||
sshd-gen-keys-start | ||
sshd.fw | ||
sshd.init | ||
sshd.pamd | ||
sshd.service | ||
sysconfig.ssh |
This is OpenSSH version 7.2p2 for SLE12 There are following changes in default settings of ssh client and server: * Accepting and sending of locale environment variables in protocol 2 is enabled. * PAM authentication is enabled. * root authentiation with password is enabled by default (PermitRootLogin yes). NOTE: this has security implications and is only done in order to not change behaviour of the server in an update. We strongly suggest setting this option either "prohibit-password" or even better to "no" (which disables direct remote root login entirely). * SSH protocol version 1 is enabled for maximum compatibility. NOTE: do not use protocol version 1. It is less secure then v2 and should generally be phased out. * DSA authentication is enabled by default for maximum compatibility. NOTE: do not use DSA authentication since it is being phased out for a reason - the size of DSA keys is limited by the standard to 1024 bits which cannot be considered safe any more. * Accepting all RFC4419 specified DH group parameters. See KexDHMin in ssh_config and sshd_config manual pages. For more information on differences in SUSE OpenSSH package see README.FIPS