SHA256
1
0
forked from pool/openssh
Go to file
Tomáš Chvátal 5fcc01190a Accepting request 679869 from home:vitezslav_cizek:branches:network
- Remove the "KexDHMin" config keyword (bsc#1127180)
  It used to allow lowering of the minimal allowed DH group size,
  which was increased to 2048 by upstream in the light of the Logjam
  attack.
  The code was broken since the upgrade to 7.6p1, but nobody noticed.
  As apparently no one needs the functionality any more, let's drop
  the patch.
  It's still possible to use the fixed 1024-bit diffie-hellman-group1-sha1
  key exchange method when working with legacy systems.
- drop openssh-7.7p1-disable_short_DH_parameters.patch
- updated patches:
  openssh-7.7p1-fips.patch
  openssh-7.7p1-fips_checks.patch
  openssh-7.7p1-gssapi_key_exchange.patch

OBS-URL: https://build.opensuse.org/request/show/679869
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=181
2019-02-27 15:39:11 +00:00
.gitattributes OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=1 2007-01-07 16:26:05 +00:00
.gitignore OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=1 2007-01-07 16:26:05 +00:00
cavs_driver-ssh.pl Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-allow_root_password_login.patch Accepting request 668656 from home:pmonrealgonzalez:branches:network 2019-01-28 08:02:07 +00:00
openssh-7.7p1-audit.patch Accepting request 645609 from home:elvigia:branches:network 2018-10-31 05:45:24 +00:00
openssh-7.7p1-cavstest-ctr.patch Accepting request 644397 from home:pmonrealgonzalez:branches:network 2018-10-24 17:58:38 +00:00
openssh-7.7p1-cavstest-kdf.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-disable_openssl_abi_check.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-eal3.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-enable_PAM_by_default.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-fips_checks.patch Accepting request 679869 from home:vitezslav_cizek:branches:network 2019-02-27 15:39:11 +00:00
openssh-7.7p1-fips.patch Accepting request 679869 from home:vitezslav_cizek:branches:network 2019-02-27 15:39:11 +00:00
openssh-7.7p1-gssapi_key_exchange.patch Accepting request 679869 from home:vitezslav_cizek:branches:network 2019-02-27 15:39:11 +00:00
openssh-7.7p1-host_ident.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-hostname_changes_when_forwarding_X.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-IPv6_X_forwarding.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-ldap.patch Accepting request 644397 from home:pmonrealgonzalez:branches:network 2018-10-24 17:58:38 +00:00
openssh-7.7p1-no_fork-no_pid_file.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-pam_check_locks.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-pts_names_formatting.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-remove_xauth_cookies_on_exit.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-seccomp_ioctl_s390_EP11.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-seccomp_ipc_flock.patch Accepting request 643660 from home:pmonrealgonzalez:branches:network 2018-10-22 09:08:19 +00:00
openssh-7.7p1-seccomp_stat.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-seed-prng.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-send_locale.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-sftp_force_permissions.patch - Update openssh-7.7p1-sftp_force_permissions.patch from the 2018-10-19 13:12:48 +00:00
openssh-7.7p1-sftp_print_diagnostic_messages.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-systemd-notify.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-X11_trusted_forwarding.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-X_forward_with_disabled_ipv6.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.9p1-brace-expansion.patch Accepting request 677200 from home:pmonrealgonzalez:branches:network 2019-02-19 08:15:17 +00:00
openssh-7.9p1-CVE-2018-20685.patch Accepting request 664725 from home:pmonrealgonzalez:branches:network 2019-01-11 17:55:43 +00:00
openssh-7.9p1.tar.gz Accepting request 643660 from home:pmonrealgonzalez:branches:network 2018-10-22 09:08:19 +00:00
openssh-7.9p1.tar.gz.asc Accepting request 643660 from home:pmonrealgonzalez:branches:network 2018-10-22 09:08:19 +00:00
openssh-askpass-gnome.changes - Supplement the openssh and libx11 together to ensure this package 2019-02-14 10:37:25 +00:00
openssh-askpass-gnome.spec - Supplement the openssh and libx11 together to ensure this package 2019-02-14 10:37:25 +00:00
openssh-CVE-2019-6109-force-progressmeter-update.patch Accepting request 676348 from home:pmonrealgonzalez:branches:network 2019-02-15 09:16:16 +00:00
openssh-CVE-2019-6109-sanitize-scp-filenames.patch Accepting request 676348 from home:pmonrealgonzalez:branches:network 2019-02-15 09:16:16 +00:00
openssh-CVE-2019-6111-scp-client-wildcard.patch Accepting request 676348 from home:pmonrealgonzalez:branches:network 2019-02-15 09:16:16 +00:00
openssh-openssl-1_0_0-compatibility.patch Accepting request 651986 from home:vitezslav_cizek:branches:network 2018-11-26 14:06:38 +00:00
openssh.changes Accepting request 679869 from home:vitezslav_cizek:branches:network 2019-02-27 15:39:11 +00:00
openssh.spec Accepting request 679869 from home:vitezslav_cizek:branches:network 2019-02-27 15:39:11 +00:00
README.FIPS Accepting request 432093 from home:pcerny:factory 2016-09-30 20:34:19 +00:00
README.kerberos Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
README.SUSE Accepting request 669019 from home:pmonrealgonzalez:branches:network 2019-01-28 10:41:40 +00:00
ssh-askpass - Change the askpass wrapper to not use x11 interface: 2019-02-14 10:30:34 +00:00
ssh.reg OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=1 2007-01-07 16:26:05 +00:00
sshd-gen-keys-start Accepting request 199679 from home:pcerny:factory 2013-09-19 04:09:33 +00:00
sshd.fw OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=7 2007-07-27 00:01:43 +00:00
sshd.pamd Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
sshd.service - Mention upstream bugs on multiple local patches 2018-10-19 13:24:01 +00:00
sysconfig.ssh Accepting request 88642 from home:pcerny:factory 2011-10-19 02:18:13 +00:00

There are following changes in default settings of ssh client and server:

* Accepting and sending of locale environment variables in protocol 2 is
  enabled.

* PAM authentication is enabled and mostly even required, do not turn it off.

* root authentiation with password is enabled by default (PermitRootLogin yes).
  NOTE: this has security implications and is only done in order to not change
  behaviour of the server in an update. We strongly suggest setting this option
  either "prohibit-password" or even better to "no" (which disables direct
  remote root login entirely).

* DSA authentication is enabled by default for maximum compatibility.
  NOTE: do not use DSA authentication since it is being phased out for a reason
  - the size of DSA keys is limited by the standard to 1024 bits which cannot
  be considered safe any more.

* Accepting all RFC4419 specified DH group parameters. See KexDHMin in
  ssh_config and sshd_config manual pages.

For more information on differences in SUSE OpenSSH package see README.FIPS