forked from pool/openssh
Dirk Mueller
a004ad47ca
- Remove BuildRequires for libtirpc, we don't use it - Remove pam_lastlog from sshd PAM config. sshd is doing the same, too, which leads to e.g. duplicate entries in wtmp [bsc#1208243] OBS-URL: https://build.opensuse.org/request/show/1065922 OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=245
5233 lines
229 KiB
Plaintext
5233 lines
229 KiB
Plaintext
-------------------------------------------------------------------
|
|
Wed Feb 15 10:35:43 UTC 2023 - Thorsten Kukuk <kukuk@suse.com>
|
|
|
|
- Remove BuildRequires for libtirpc, we don't use it
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 14 13:46:14 UTC 2023 - Thorsten Kukuk <kukuk@suse.com>
|
|
|
|
- Remove pam_lastlog from sshd PAM config. sshd is doing the same,
|
|
too, which leads to e.g. duplicate entries in wtmp [bsc#1208243]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Dec 19 15:41:26 UTC 2022 - Otto Hollmann <otto.hollmann@suse.com>
|
|
|
|
- Adapt OpenSSH to build with OpenSSL 3, use new KDF API (bsc#1205042)
|
|
Add openssh-openssl-3.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Dec 15 16:35:33 UTC 2022 - Dirk Müller <dmueller@suse.com>
|
|
|
|
- limit to openssl < 3.0 as this version is not compatible (bsc#1205042)
|
|
next version update will fix it
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Nov 10 02:18:08 UTC 2022 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Update openssh-8.1p1-audit.patch: Merge fix for race condition
|
|
(bsc#1115550, bsc#1174162).
|
|
- Add openssh-do-not-send-empty-message.patch, which prevents
|
|
superfluous newlines with empty MOTD files (bsc#1192439).
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Aug 8 07:36:55 UTC 2022 - Thorsten Kukuk <kukuk@suse.com>
|
|
|
|
- Use %_pam_vendordir
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jul 6 12:15:29 UTC 2022 - Adam Majer <adam.majer@suse.de>
|
|
|
|
- openssh-8.4p1-ssh_config_d.patch: admin overrides should take
|
|
priority (listed first) over package defaults
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 28 15:00:52 UTC 2022 - Ludwig Nussel <lnussel@suse.de>
|
|
|
|
- read ssh and sshd config file also from /usr/etc
|
|
- add openssh-server-config-rootlogin subpackage that enabled PermitRootLogin
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 7 18:00:09 UTC 2022 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Version update to 8.9p1:
|
|
= Security
|
|
* sshd(8): fix an integer overflow in the user authentication path
|
|
that, in conjunction with other logic errors, could have yielded
|
|
unauthenticated access under difficult to exploit conditions.
|
|
|
|
This situation is not exploitable because of independent checks in
|
|
the privilege separation monitor. Privilege separation has been
|
|
enabled by default in since openssh-3.2.2 (released in 2002) and
|
|
has been mandatory since openssh-7.5 (released in 2017). Moreover,
|
|
portable OpenSSH has used toolchain features available in most
|
|
modern compilers to abort on signed integer overflow since
|
|
openssh-6.5 (released in 2014).
|
|
|
|
Thanks to Malcolm Stagg for finding and reporting this bug.
|
|
|
|
= Potentially-incompatible changes
|
|
* sshd(8), portable OpenSSH only: this release removes in-built
|
|
support for MD5-hashed passwords. If you require these on your
|
|
system then we recommend linking against libxcrypt or similar.
|
|
* This release modifies the FIDO security key middleware interface
|
|
and increments SSH_SK_VERSION_MAJOR.
|
|
|
|
= New features
|
|
* ssh(1), sshd(8), ssh-add(1), ssh-agent(1): add a system for
|
|
restricting forwarding and use of keys added to ssh-agent(1)
|
|
A detailed description of the feature is available at
|
|
https://www.openssh.com/agent-restrict.html and the protocol
|
|
extensions are documented in the PROTOCOL and PROTOCOL.agent
|
|
files in the source release.
|
|
* ssh(1), sshd(8): add the sntrup761x25519-sha512@openssh.com hybrid
|
|
ECDH/x25519 + Streamlined NTRU Prime post-quantum KEX to the
|
|
default KEXAlgorithms list (after the ECDH methods but before the
|
|
prime-group DH ones). The next release of OpenSSH is likely to
|
|
make this key exchange the default method.
|
|
* ssh-keygen(1): when downloading resident keys from a FIDO token,
|
|
pass back the user ID that was used when the key was created and
|
|
append it to the filename the key is written to (if it is not the
|
|
default). Avoids keys being clobbered if the user created multiple
|
|
resident keys with the same application string but different user
|
|
IDs.
|
|
* ssh-keygen(1), ssh(1), ssh-agent(1): better handling for FIDO keys
|
|
on tokens that provide user verification (UV) on the device itself,
|
|
including biometric keys, avoiding unnecessary PIN prompts.
|
|
* ssh-keygen(1): add "ssh-keygen -Y match-principals" operation to
|
|
perform matching of principals names against an allowed signers
|
|
file. To be used towards a TOFU model for SSH signatures in git.
|
|
* ssh-add(1), ssh-agent(1): allow pin-required FIDO keys to be added
|
|
to ssh-agent(1). $SSH_ASKPASS will be used to request the PIN at
|
|
authentication time.
|
|
* ssh-keygen(1): allow selection of hash at sshsig signing time
|
|
(either sha512 (default) or sha256).
|
|
* ssh(1), sshd(8): read network data directly to the packet input
|
|
buffer instead of indirectly via a small stack buffer. Provides a
|
|
modest performance improvement.
|
|
* ssh(1), sshd(8): read data directly to the channel input buffer,
|
|
providing a similar modest performance improvement.
|
|
* ssh(1): extend the PubkeyAuthentication configuration directive to
|
|
accept yes|no|unbound|host-bound to allow control over one of the
|
|
protocol extensions used to implement agent-restricted keys.
|
|
|
|
= Bugfixes
|
|
* sshd(8): document that CASignatureAlgorithms, ExposeAuthInfo and
|
|
PubkeyAuthOptions can be used in a Match block. PR277.
|
|
* sshd(8): fix possible string truncation when constructing paths to
|
|
.rhosts/.shosts files with very long user home directory names.
|
|
* ssh-keysign(1): unbreak for KEX algorithms that use SHA384/512
|
|
exchange hashes
|
|
* ssh(1): don't put the TTY into raw mode when SessionType=none,
|
|
avoids ^C being unable to kill such a session. bz3360
|
|
* scp(1): fix some corner-case bugs in SFTP-mode handling of
|
|
~-prefixed paths.
|
|
* ssh(1): unbreak hostbased auth using RSA keys. Allow ssh(1) to
|
|
select RSA keys when only RSA/SHA2 signature algorithms are
|
|
configured (this is the default case). Previously RSA keys were
|
|
not being considered in the default case.
|
|
* ssh-keysign(1): make ssh-keysign use the requested signature
|
|
algorithm and not the default for the key type. Part of unbreaking
|
|
hostbased auth for RSA/SHA2 keys.
|
|
* ssh(1): stricter UpdateHostkey signature verification logic on
|
|
the client- side. Require RSA/SHA2 signatures for RSA hostkeys
|
|
except when RSA/SHA1 was explicitly negotiated during initial
|
|
KEX; bz3375
|
|
* ssh(1), sshd(8): fix signature algorithm selection logic for
|
|
UpdateHostkeys on the server side. The previous code tried to
|
|
prefer RSA/SHA2 for hostkey proofs of RSA keys, but missed some
|
|
cases. This will use RSA/SHA2 signatures for RSA keys if the
|
|
client proposed these algorithms in initial KEX. bz3375
|
|
* All: convert all uses of select(2)/pselect(2) to poll(2)/ppoll(2).
|
|
This includes the mainloops in ssh(1), ssh-agent(1), ssh-agent(1)
|
|
and sftp-server(8), as well as the sshd(8) listen loop and all
|
|
other FD read/writability checks. On platforms with missing or
|
|
broken poll(2)/ppoll(2) syscalls a select(2)-based compat shim is
|
|
available.
|
|
* ssh-keygen(1): the "-Y find-principals" command was verifying key
|
|
validity when using ca certs but not with simple key lifetimes
|
|
within the allowed signers file.
|
|
* ssh-keygen(1): make sshsig verify-time argument parsing optional
|
|
* sshd(8): fix truncation in rhosts/shosts path construction.
|
|
* ssh(1), ssh-agent(1): avoid xmalloc(0) for PKCS#11 keyid for ECDSA
|
|
keys (we already did this for RSA keys). Avoids fatal errors for
|
|
PKCS#11 libraries that return empty keyid, e.g. Microchip ATECC608B
|
|
"cryptoauthlib"; bz#3364
|
|
* ssh(1), ssh-agent(1): improve the testing of credentials against
|
|
inserted FIDO: ask the token whether a particular key belongs to
|
|
it in cases where the token supports on-token user-verification
|
|
(e.g. biometrics) rather than just assuming that it will accept it.
|
|
Will reduce spurious "Confirm user presence" notifications for key
|
|
handles that relate to FIDO keys that are not currently inserted in at
|
|
least some cases. bz3366
|
|
* ssh(1), sshd(8): correct value for IPTOS_DSCP_LE. It needs to
|
|
allow for the preceding two ECN bits. bz#3373
|
|
* ssh-keygen(1): add missing -O option to usage() for the "-Y sign"
|
|
option.
|
|
* ssh-keygen(1): fix a NULL deref when using the find-principals
|
|
function, when matching an allowed_signers line that contains a
|
|
namespace restriction, but no restriction specified on the
|
|
command-line
|
|
* ssh-agent(1): fix memleak in process_extension(); oss-fuzz
|
|
issue #42719
|
|
* ssh(1): suppress "Connection to xxx closed" messages when LogLevel
|
|
is set to "error" or above. bz3378
|
|
* ssh(1), sshd(8): use correct zlib flags when inflate(3)-ing
|
|
compressed packet data. bz3372
|
|
* scp(1): when recursively transferring files in SFTP mode, create the
|
|
destination directory if it doesn't already exist to match scp(1) in
|
|
legacy RCP mode behaviour.
|
|
* scp(1): many improvements in error message consistency between scp(1)
|
|
in SFTP mode vs legacy RCP mode.
|
|
* sshd(8): fix potential race in SIGTERM handling PR289
|
|
* ssh(1), ssh(8): since DSA keys are deprecated, move them to the
|
|
end of the default list of public keys so that they will be tried
|
|
last. PR295
|
|
* ssh-keygen(1): allow 'ssh-keygen -Y find-principals' to match
|
|
wildcard principals in allowed_signers files
|
|
|
|
= Portability
|
|
* ssh(1), sshd(8): don't trust closefrom(2) on Linux. glibc's
|
|
implementation does not work in a chroot when the kernel does not
|
|
have close_range(2). It tries to read from /proc/self/fd and when
|
|
that fails dies with an assertion of sorts. Instead, call
|
|
close_range(2) directly from our compat code and fall back if
|
|
that fails. bz#3349,
|
|
* OS X poll(2) is broken; use compat replacement. For character-
|
|
special devices like /dev/null, Darwin's poll(2) returns POLLNVAL
|
|
when polled with POLLIN. Apparently this is Apple bug 3710161 -
|
|
not public but a websearch will find other OSS projects
|
|
rediscovering it periodically since it was first identified in
|
|
2005.
|
|
* Correct handling of exceptfds/POLLPRI in our select(2)-based
|
|
poll(2)/ppoll(2) compat implementation.
|
|
* Cygwin: correct checking of mbstowcs() return value.
|
|
* Add a basic SECURITY.md that refers people to the openssh.com
|
|
website.
|
|
* Enable additional compiler warnings and toolchain hardening flags,
|
|
including -Wbitwise-instead-of-logical, -Wmisleading-indentation,
|
|
-fzero-call-used-regs and -ftrivial-auto-var-init.
|
|
* HP/UX. Use compat getline(3) on HP-UX 10.x, where the libc version
|
|
is not reliable.
|
|
|
|
- Rebased patches:
|
|
* openssh-7.7p1-ldap.patch
|
|
* openssh-8.0p1-gssapi-keyex.patch
|
|
* openssh-8.1p1-audit.patch
|
|
* openssh-8.4p1-vendordir.patch
|
|
* openssh-reenable-dh-group14-sha1-default.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Sep 28 17:50:57 UTC 2021 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Version update to 8.8p1:
|
|
= Security
|
|
* sshd(8) from OpenSSH 6.2 through 8.7 failed to correctly initialise
|
|
supplemental groups when executing an AuthorizedKeysCommand or
|
|
AuthorizedPrincipalsCommand, where a AuthorizedKeysCommandUser or
|
|
AuthorizedPrincipalsCommandUser directive has been set to run the
|
|
command as a different user. Instead these commands would inherit
|
|
the groups that sshd(8) was started with.
|
|
|
|
Depending on system configuration, inherited groups may allow
|
|
AuthorizedKeysCommand/AuthorizedPrincipalsCommand helper programs to
|
|
gain unintended privilege.
|
|
|
|
Neither AuthorizedKeysCommand nor AuthorizedPrincipalsCommand are
|
|
enabled by default in sshd_config(5).
|
|
|
|
= Potentially-incompatible changes
|
|
* This release disables RSA signatures using the SHA-1 hash algorithm
|
|
by default. This change has been made as the SHA-1 hash algorithm is
|
|
cryptographically broken, and it is possible to create chosen-prefix
|
|
hash collisions for <USD$50K.
|
|
|
|
For most users, this change should be invisible and there is
|
|
no need to replace ssh-rsa keys. OpenSSH has supported RFC8332
|
|
RSA/SHA-256/512 signatures since release 7.2 and existing ssh-rsa keys
|
|
will automatically use the stronger algorithm where possible.
|
|
|
|
Incompatibility is more likely when connecting to older SSH
|
|
implementations that have not been upgraded or have not closely tracked
|
|
improvements in the SSH protocol. For these cases, it may be necessary
|
|
to selectively re-enable RSA/SHA1 to allow connection and/or user
|
|
authentication via the HostkeyAlgorithms and PubkeyAcceptedAlgorithms
|
|
options.
|
|
|
|
= New features
|
|
* ssh(1): allow the ssh_config(5) CanonicalizePermittedCNAMEs
|
|
directive to accept a "none" argument to specify the default
|
|
behaviour.
|
|
|
|
= Bugfixes
|
|
* scp(1): when using the SFTP protocol, continue transferring files
|
|
after a transfer error occurs, better matching original scp/rcp
|
|
behaviour.
|
|
* ssh(1): fixed a number of memory leaks in multiplexing,
|
|
* ssh-keygen(1): avoid crash when using the -Y find-principals
|
|
command.
|
|
* A number of documentation and manual improvements, including
|
|
bz#3340, PR139, PR215, PR241, PR257
|
|
|
|
- Additional changes from 8.7p1 release:
|
|
= Potentially-incompatible changes
|
|
* scp(1): this release changes the behaviour of remote to remote
|
|
copies (e.g. "scp host-a:/path host-b:") to transfer through the
|
|
local host by default. This was previously available via the -3
|
|
flag. This mode avoids the need to expose credentials on the
|
|
origin hop, avoids triplicate interpretation of filenames by the
|
|
shell (by the local system, the copy origin and the destination)
|
|
and, in conjunction with the SFTP support for scp(1) mentioned
|
|
below, allows use of all authentication methods to the remote
|
|
hosts (previously, only non-interactive methods could be used).
|
|
A -R flag has been added to select the old behaviour.
|
|
* ssh(1)/sshd(8): both the client and server are now using a
|
|
stricter configuration file parser. The new parser uses more
|
|
shell-like rules for quotes, space and escape characters. It is
|
|
also more strict in rejecting configurations that include options
|
|
lacking arguments. Previously some options (e.g. DenyUsers) could
|
|
appear on a line with no subsequent arguments. This release will
|
|
reject such configurations. The new parser will also reject
|
|
configurations with unterminated quotes and multiple '='
|
|
characters after the option name.
|
|
* ssh(1): when using SSHFP DNS records for host key verification,
|
|
ssh(1) will verify all matching records instead of just those
|
|
with the specific signature type requested. This may cause host
|
|
key verification problems if stale SSHFP records of a different
|
|
or legacy signature type exist alongside other records for a
|
|
particular host. bz#3322
|
|
* ssh-keygen(1): when generating a FIDO key and specifying an
|
|
explicit attestation challenge (using -Ochallenge), the challenge
|
|
will now be hashed by the builtin security key middleware. This
|
|
removes the (undocumented) requirement that challenges be exactly
|
|
32 bytes in length and matches the expectations of libfido2.
|
|
* sshd(8): environment="..." directives in authorized_keys files are
|
|
now first-match-wins and limited to 1024 discrete environment
|
|
variable names.
|
|
|
|
= New features
|
|
* scp(1): experimental support for transfers using the SFTP protocol
|
|
as a replacement for the venerable SCP/RCP protocol that it has
|
|
traditionally used. SFTP offers more predictable filename handling
|
|
and does not require expansion of glob(3) patterns via the shell
|
|
on the remote side.
|
|
* sftp-server(8): add a protocol extension to support expansion of
|
|
~/ and ~user/ prefixed paths. This was added to support these
|
|
paths when used by scp(1) while in SFTP mode.
|
|
* ssh(1): add a ForkAfterAuthentication ssh_config(5) counterpart to
|
|
the ssh(1) -f flag. GHPR231
|
|
* ssh(1): add a StdinNull directive to ssh_config(5) that allows the
|
|
config file to do the same thing as -n does on the ssh(1) command-
|
|
line. GHPR231
|
|
* ssh(1): add a SessionType directive to ssh_config, allowing the
|
|
configuration file to offer equivalent control to the -N (no
|
|
session) and -s (subsystem) command-line flags. GHPR231
|
|
* ssh-keygen(1): allowed signers files used by ssh-keygen(1)
|
|
signatures now support listing key validity intervals alongside
|
|
they key, and ssh-keygen(1) can optionally check during signature
|
|
verification whether a specified time falls inside this interval.
|
|
This feature is intended for use by git to support signing and
|
|
verifying objects using ssh keys.
|
|
* ssh-keygen(8): support printing of the full public key in a sshsig
|
|
signature via a -Oprint-pubkey flag.
|
|
|
|
= Bugfixes
|
|
* ssh(1)/sshd(8): start time-based re-keying exactly on schedule in
|
|
the client and server mainloops. Previously the re-key timeout
|
|
could expire but re-keying would not start until a packet was sent
|
|
or received, causing a spin in select() if the connection was
|
|
quiescent.
|
|
* ssh-keygen(1): avoid Y2038 problem in printing certificate
|
|
validity lifetimes. Dates past 2^31-1 seconds since epoch were
|
|
displayed incorrectly on some platforms. bz#3329
|
|
* scp(1): allow spaces to appear in usernames for local to remote
|
|
and scp -3 remote to remote copies. bz#1164
|
|
* ssh(1)/sshd(8): remove references to ChallengeResponseAuthentication
|
|
in favour of KbdInteractiveAuthentication. The former is what was in
|
|
SSHv1, the latter is what is in SSHv2 (RFC4256) and they were
|
|
treated as somewhat but not entirely equivalent. We retain the old
|
|
name as a deprecated alias so configuration files continue to work
|
|
as well as a reference in the man page for people looking for it.
|
|
bz#3303
|
|
* ssh(1)/ssh-add(1)/ssh-keygen(1): fix decoding of X.509 subject name
|
|
when extracting a key from a PKCS#11 certificate. bz#3327
|
|
* ssh(1): restore blocking status on stdio fds before close. ssh(1)
|
|
needs file descriptors in non-blocking mode to operate but it was
|
|
not restoring the original state on exit. This could cause
|
|
problems with fds shared with other programs via the shell,
|
|
bz#3280 and GHPR246
|
|
* ssh(1)/sshd(8): switch both client and server mainloops from
|
|
select(3) to pselect(3). Avoids race conditions where a signal
|
|
may arrive immediately before select(3) and not be processed until
|
|
an event fires. bz#2158
|
|
* ssh(1): sessions started with ControlPersist were incorrectly
|
|
executing a shell when the -N (no shell) option was specified.
|
|
bz#3290
|
|
* ssh(1): check if IPQoS or TunnelDevice are already set before
|
|
overriding. Prevents values in config files from overriding values
|
|
supplied on the command line. bz#3319
|
|
* ssh(1): fix debug message when finding a private key to match a
|
|
certificate being attempted for user authentication. Previously it
|
|
would print the certificate's path, whereas it was supposed to be
|
|
showing the private key's path. GHPR247
|
|
* sshd(8): match host certificates against host public keys, not
|
|
private keys. Allows use of certificates with private keys held in
|
|
a ssh-agent. bz#3524
|
|
* ssh(1): add a workaround for a bug in OpenSSH 7.4 sshd(8), which
|
|
allows RSA/SHA2 signatures for public key authentication but fails
|
|
to advertise this correctly via SSH2_MSG_EXT_INFO. This causes
|
|
clients of these server to incorrectly match
|
|
PubkeyAcceptedAlgorithmse and potentially refuse to offer valid
|
|
keys. bz#3213
|
|
* sftp(1)/scp(1): degrade gracefully if a sftp-server offers the
|
|
limits@openssh.com extension but fails when the client tries to
|
|
invoke it. bz#3318
|
|
* ssh(1): allow ssh_config SetEnv to override $TERM, which is
|
|
otherwise handled specially by the protocol. Useful in ~/.ssh/config
|
|
to set TERM to something generic (e.g. "xterm" instead of
|
|
"xterm-256color") for destinations that lack terminfo entries.
|
|
* sftp-server(8): the limits@openssh.com extension was incorrectly
|
|
marked as an operation that writes to the filesystem, which made it
|
|
unavailable in sftp-server read-only mode. bz#3318
|
|
* ssh(1): fix SEGV in UpdateHostkeys debug() message, triggered when
|
|
the update removed more host keys than remain present.
|
|
* Many manual page fixes.
|
|
|
|
- Additional changes from 8.6p1 release:
|
|
= Security
|
|
* sshd(8): OpenSSH 8.5 introduced the LogVerbose keyword. When this
|
|
option was enabled with a set of patterns that activated logging
|
|
in code that runs in the low-privilege sandboxed sshd process, the
|
|
log messages were constructed in such a way that printf(3) format
|
|
strings could effectively be specified the low-privilege code.
|
|
|
|
= New features
|
|
* sftp-server(8): add a new limits@openssh.com protocol extension
|
|
that allows a client to discover various server limits, including
|
|
maximum packet size and maximum read/write length.
|
|
* sftp(1): use the new limits@openssh.com extension (when available)
|
|
to select better transfer lengths in the client.
|
|
* sshd(8): Add ModuliFile keyword to sshd_config to specify the
|
|
location of the "moduli" file containing the groups for DH-GEX.
|
|
* unit tests: Add a TEST_SSH_ELAPSED_TIMES environment variable to
|
|
enable printing of the elapsed time in seconds of each test.
|
|
|
|
= Bugfixes
|
|
* ssh_config(5), sshd_config(5): sync CASignatureAlgorithms lists in
|
|
manual pages with the current default. GHPR174
|
|
* ssh(1): ensure that pkcs11_del_provider() is called before exit.
|
|
GHPR234
|
|
* ssh(1), sshd(8): fix problems in string->argv conversion. Multiple
|
|
backslashes were not being dequoted correctly and quoted space in
|
|
the middle of a string was being incorrectly split. GHPR223
|
|
* ssh(1): return non-zero exit status when killed by signal; bz#3281
|
|
* sftp-server(8): increase maximum SSH2_FXP_READ to match the maximum
|
|
packet size. Also handle zero-length reads that are not explicitly
|
|
banned by the spec.
|
|
|
|
- Additional changes from 8.5p1 release:
|
|
= Security
|
|
* ssh-agent(1): fixed a double-free memory corruption that was
|
|
introduced in OpenSSH 8.2 . We treat all such memory faults as
|
|
potentially exploitable. This bug could be reached by an attacker
|
|
with access to the agent socket.
|
|
|
|
= Potentially-incompatible changes
|
|
* ssh(1), sshd(8): this release changes the first-preference signature
|
|
algorithm from ECDSA to ED25519.
|
|
* ssh(1), sshd(8): set the TOS/DSCP specified in the configuration
|
|
for interactive use prior to TCP connect. The connection phase of
|
|
the SSH session is time-sensitive and often explicitly interactive.
|
|
The ultimate interactive/bulk TOS/DSCP will be set after
|
|
authentication completes.
|
|
* ssh(1), sshd(8): remove the pre-standardization cipher
|
|
rijndael-cbc@lysator.liu.se. It is an alias for aes256-cbc before
|
|
it was standardized in RFC4253 (2006), has been deprecated and
|
|
disabled by default since OpenSSH 7.2 (2016) and was only briefly
|
|
documented in ssh.1 in 2001.
|
|
* ssh(1), sshd(8): update/replace the experimental post-quantum
|
|
hybrid key exchange method based on Streamlined NTRU Prime coupled
|
|
with X25519. The previous sntrup4591761x25519-sha512@tinyssh.org
|
|
method is replaced with sntrup761x25519-sha512@openssh.com.
|
|
* ssh(1): disable CheckHostIP by default. It provides insignificant
|
|
benefits while making key rotation significantly more difficult,
|
|
especially for hosts behind IP-based load-balancers.
|
|
|
|
= New features
|
|
* ssh(1): this release enables UpdateHostkeys by default subject to
|
|
some conservative preconditions:
|
|
- The key was matched in the UserKnownHostsFile (and not in the
|
|
GlobalKnownHostsFile).
|
|
- The same key does not exist under another name.
|
|
- A certificate host key is not in use.
|
|
- known_hosts contains no matching wildcard hostname pattern.
|
|
- VerifyHostKeyDNS is not enabled.
|
|
- The default UserKnownHostsFile is in use.
|
|
* ssh(1), sshd(8): add a new LogVerbose configuration directive for
|
|
that allows forcing maximum debug logging by file/function/line
|
|
pattern-lists.
|
|
* ssh(1): when prompting the user to accept a new hostkey, display
|
|
any other host names/addresses already associated with the key.
|
|
* ssh(1): allow UserKnownHostsFile=none to indicate that no
|
|
known_hosts file should be used to identify host keys.
|
|
* ssh(1): add a ssh_config KnownHostsCommand option that allows the
|
|
client to obtain known_hosts data from a command in addition to
|
|
the usual files.
|
|
* ssh(1): add a ssh_config PermitRemoteOpen option that allows the
|
|
client to restrict the destination when RemoteForward is used
|
|
with SOCKS.
|
|
* ssh(1): for FIDO keys, if a signature operation fails with a
|
|
"incorrect PIN" reason and no PIN was initially requested from the
|
|
user, then request a PIN and retry the operation. This supports
|
|
some biometric devices that fall back to requiring PIN when reading
|
|
of the biometric failed, and devices that require PINs for all
|
|
hosted credentials.
|
|
* sshd(8): implement client address-based rate-limiting via new
|
|
sshd_config(5) PerSourceMaxStartups and PerSourceNetBlockSize
|
|
directives that provide more fine-grained control on a per-origin
|
|
address basis than the global MaxStartups limit.
|
|
|
|
= Bugfixes
|
|
* ssh(1): Prefix keyboard interactive prompts with "(user@host)" to
|
|
make it easier to determine which connection they are associated
|
|
with in cases like scp -3, ProxyJump, etc. bz#3224
|
|
* sshd(8): fix sshd_config SetEnv directives located inside Match
|
|
blocks. GHPR201
|
|
* ssh(1): when requesting a FIDO token touch on stderr, inform the
|
|
user once the touch has been recorded.
|
|
* ssh(1): prevent integer overflow when ridiculously large
|
|
ConnectTimeout values are specified, capping the effective value
|
|
(for most platforms) at 24 days. bz#3229
|
|
* ssh(1): consider the ECDSA key subtype when ordering host key
|
|
algorithms in the client.
|
|
* ssh(1), sshd(8): rename the PubkeyAcceptedKeyTypes keyword to
|
|
PubkeyAcceptedAlgorithms. The previous name incorrectly suggested
|
|
that it control allowed key algorithms, when this option actually
|
|
specifies the signature algorithms that are accepted. The previous
|
|
name remains available as an alias. bz#3253
|
|
* ssh(1), sshd(8): similarly, rename HostbasedKeyTypes (ssh) and
|
|
HostbasedAcceptedKeyTypes (sshd) to HostbasedAcceptedAlgorithms.
|
|
* sftp-server(8): add missing lsetstat@openssh.com documentation
|
|
and advertisement in the server's SSH2_FXP_VERSION hello packet.
|
|
* ssh(1), sshd(8): more strictly enforce KEX state-machine by
|
|
banning packet types once they are received. Fixes memleak caused
|
|
by duplicate SSH2_MSG_KEX_DH_GEX_REQUEST (oss-fuzz #30078).
|
|
* sftp(1): allow the full range of UIDs/GIDs for chown/chgrp on 32bit
|
|
platforms instead of being limited by LONG_MAX. bz#3206
|
|
* Minor man page fixes (capitalization, commas, etc.) bz#3223
|
|
* sftp(1): when doing an sftp recursive upload or download of a
|
|
read-only directory, ensure that the directory is created with
|
|
write and execute permissions in the interim so that the transfer
|
|
can actually complete, then set the directory permission as the
|
|
final step. bz#3222
|
|
* ssh-keygen(1): document the -Z, check the validity of its argument
|
|
earlier and provide a better error message if it's not correct.
|
|
bz#2879
|
|
* ssh(1): ignore comments at the end of config lines in ssh_config,
|
|
similar to what we already do for sshd_config. bz#2320
|
|
* sshd_config(5): mention that DisableForwarding is valid in a
|
|
sshd_config Match block. bz3239
|
|
* sftp(1): fix incorrect sorting of "ls -ltr" under some
|
|
circumstances. bz3248.
|
|
* ssh(1), sshd(8): fix potential integer truncation of (unlikely)
|
|
timeout values. bz#3250
|
|
* ssh(1): make hostbased authentication send the signature algorithm
|
|
in its SSH2_MSG_USERAUTH_REQUEST packets instead of the key type.
|
|
This make HostbasedAcceptedAlgorithms do what it is supposed to -
|
|
filter on signature algorithm and not key type.
|
|
|
|
- Rebased patches:
|
|
* openssh-7.7p1-IPv6_X_forwarding.patch
|
|
* openssh-7.7p1-X11_trusted_forwarding.patch
|
|
* openssh-7.7p1-X_forward_with_disabled_ipv6.patch
|
|
* openssh-7.7p1-cavstest-ctr.patch
|
|
* openssh-7.7p1-cavstest-kdf.patch
|
|
* openssh-7.7p1-disable_openssl_abi_check.patch
|
|
* openssh-7.7p1-eal3.patch
|
|
* openssh-7.7p1-enable_PAM_by_default.patch
|
|
* openssh-7.7p1-fips.patch
|
|
* openssh-7.7p1-fips_checks.patch
|
|
* openssh-7.7p1-host_ident.patch
|
|
* openssh-7.7p1-hostname_changes_when_forwarding_X.patch
|
|
* openssh-7.7p1-ldap.patch
|
|
* openssh-7.7p1-no_fork-no_pid_file.patch
|
|
* openssh-7.7p1-pam_check_locks.patch
|
|
* openssh-7.7p1-pts_names_formatting.patch
|
|
* openssh-7.7p1-remove_xauth_cookies_on_exit.patch
|
|
* openssh-7.7p1-seccomp_ipc_flock.patch
|
|
* openssh-7.7p1-seccomp_stat.patch
|
|
* openssh-7.7p1-send_locale.patch
|
|
* openssh-7.7p1-sftp_force_permissions.patch
|
|
* openssh-7.7p1-sftp_print_diagnostic_messages.patch
|
|
* openssh-7.7p1-systemd-notify.patch
|
|
* openssh-7.9p1-keygen-preserve-perms.patch
|
|
* openssh-7.9p1-revert-new-qos-defaults.patch
|
|
* openssh-8.0p1-gssapi-keyex.patch
|
|
* openssh-8.1p1-audit.patch
|
|
* openssh-8.1p1-seccomp-clock_gettime64.patch
|
|
* openssh-8.1p1-seccomp-clock_nanosleep.patch
|
|
* openssh-8.1p1-seccomp-clock_nanosleep_time64.patch
|
|
* openssh-8.1p1-use-openssl-kdf.patch
|
|
* openssh-8.4p1-vendordir.patch
|
|
* openssh-fips-ensure-approved-moduli.patch
|
|
* openssh-link-with-sk.patch
|
|
* openssh-reenable-dh-group14-sha1-default.patch
|
|
* openssh-whitelist-syscalls.patch
|
|
|
|
- Removed openssh-fix-ssh-copy-id.patch (fixed upstream).
|
|
- openssh.keyring: rotated to new key from https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/RELEASE_KEY.asc
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Aug 19 10:07:10 UTC 2021 - Thorsten Kukuk <kukuk@suse.com>
|
|
|
|
- sshd-gen-keys-start:
|
|
- only source sysconfig file if it exists.
|
|
- create /etc/ssh if it does not exists.
|
|
Required for image based installation/updates.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jul 19 14:51:08 UTC 2021 - Cristian Rodríguez <crrodriguez@opensuse.org>
|
|
|
|
- The linux kernel has close_range(2) syscall which current glibc
|
|
uses to implement closefrom(3) which will be then used by openssh.
|
|
whitelist the new system call so closefrom does not fail or
|
|
fallback to iterating proc/self/fd (openssh-whitelist-syscalls.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jun 23 18:32:20 UTC 2021 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Don't move user-modified ssh_config and sshd_config files to
|
|
.rpmsave on upgrade.
|
|
|
|
-------------------------------------------------------------------
|
|
Tue May 18 17:16:33 UTC 2021 - Thorsten Kukuk <kukuk@suse.com>
|
|
|
|
- Use pam_motd to unify motd message output [bsc#1185897]
|
|
(openssh-8.4p1-pam_motd.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Apr 22 12:02:55 UTC 2021 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Change vendor configuration dir from /usr/share/ssh/ to
|
|
/usr/etc/ssh/.
|
|
- Remove upgrade enablement hack. This has been fixed in
|
|
systemd-rpm-macros (bsc#1180083).
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Feb 24 13:20:37 UTC 2021 - Thorsten Kukuk <kukuk@suse.com>
|
|
|
|
- Add support for vendor provided configuration files in
|
|
/usr/share/ssh/ (openssh-8.4p1-vendordir.patch)
|
|
- Move configuration files from /etc/ssh/ to /usr/share/ssh/
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Feb 18 13:54:44 UTC 2021 - Johannes Segitz <jsegitz@suse.com>
|
|
|
|
- Drop openssh-7.7p1-allow_root_password_login.patch to prevent login
|
|
as root via password by default (is also upstream default). Comment
|
|
indicates that this was a temporary meassure that we now had for
|
|
five years, time to get rid of it (bsc#1173067)
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Feb 15 10:01:33 UTC 2021 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Add openssh-whitelist-syscalls.patch (bsc#1182232), fixing
|
|
failure to accept connections on 32-bit platforms with
|
|
glibc 2.33+.
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jan 27 14:09:08 UTC 2021 - Thorsten Kukuk <kukuk@suse.com>
|
|
|
|
- Add support for /etc/ssh/ssh_config.d and /etc/ssh/sshd_config.d
|
|
(openssh-8.4p1-ssh_config_d.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Jan 23 18:28:19 UTC 2021 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Add openssh-fix-ssh-copy-id.patch, which fixes breakage
|
|
introduced in 8.4p1 (bsc#1181311).
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 22 21:06:42 UTC 2021 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Improve robustness of sshd init detection when upgrading from
|
|
a pre-systemd distribution.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 22 03:30:59 UTC 2021 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Add openssh-reenable-dh-group14-sha1-default.patch, which adds
|
|
diffie-hellman-group14-sha1 key exchange back to the default
|
|
list (bsc#1180958). This is needed for backwards compatibility
|
|
with older platforms.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 22 02:54:02 UTC 2021 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Make sure sshd is enabled correctly when upgrading from a
|
|
pre-systemd distribution (bsc#1180083).
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jan 18 11:04:41 UTC 2021 - Thorsten Kukuk <kukuk@suse.com>
|
|
|
|
- sysusers-sshd.conf: use sysusers.d configuration file to create
|
|
sshd user (avoid hard dependency on shadow).
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jan 18 00:30:37 UTC 2021 - Dirk Müller <dmueller@suse.com>
|
|
|
|
- update to 8.4p1:
|
|
Security
|
|
========
|
|
* ssh-agent(1): restrict ssh-agent from signing web challenges for
|
|
FIDO/U2F keys.
|
|
* ssh-keygen(1): Enable FIDO 2.1 credProtect extension when generating
|
|
a FIDO resident key.
|
|
* ssh(1), ssh-keygen(1): support for FIDO keys that require a PIN for
|
|
each use. These keys may be generated using ssh-keygen using a new
|
|
"verify-required" option. When a PIN-required key is used, the user
|
|
will be prompted for a PIN to complete the signature operation.
|
|
New Features
|
|
------------
|
|
* sshd(8): authorized_keys now supports a new "verify-required"
|
|
option to require FIDO signatures assert that the token verified
|
|
that the user was present before making the signature. The FIDO
|
|
protocol supports multiple methods for user-verification, but
|
|
currently OpenSSH only supports PIN verification.
|
|
|
|
* sshd(8), ssh-keygen(1): add support for verifying FIDO webauthn
|
|
signatures. Webauthn is a standard for using FIDO keys in web
|
|
browsers. These signatures are a slightly different format to plain
|
|
FIDO signatures and thus require explicit support.
|
|
|
|
* ssh(1): allow some keywords to expand shell-style ${ENV}
|
|
environment variables. The supported keywords are CertificateFile,
|
|
ControlPath, IdentityAgent and IdentityFile, plus LocalForward and
|
|
RemoteForward when used for Unix domain socket paths. bz#3140
|
|
|
|
* ssh(1), ssh-agent(1): allow some additional control over the use of
|
|
ssh-askpass via a new $SSH_ASKPASS_REQUIRE environment variable,
|
|
including forcibly enabling and disabling its use. bz#69
|
|
|
|
* ssh(1): allow ssh_config(5)'s AddKeysToAgent keyword accept a time
|
|
limit for keys in addition to its current flag options. Time-
|
|
limited keys will automatically be removed from ssh-agent after
|
|
their expiry time has passed.
|
|
|
|
* scp(1), sftp(1): allow the -A flag to explicitly enable agent
|
|
forwarding in scp and sftp. The default remains to not forward an
|
|
agent, even when ssh_config enables it.
|
|
|
|
* ssh(1): add a '%k' TOKEN that expands to the effective HostKey of
|
|
the destination. This allows, e.g., keeping host keys in individual
|
|
files using "UserKnownHostsFile ~/.ssh/known_hosts.d/%k". bz#1654
|
|
|
|
* ssh(1): add %-TOKEN, environment variable and tilde expansion to
|
|
the UserKnownHostsFile directive, allowing the path to be
|
|
completed by the configuration (e.g. bz#1654)
|
|
|
|
* ssh-keygen(1): allow "ssh-add -d -" to read keys to be deleted
|
|
from stdin. bz#3180
|
|
|
|
* sshd(8): improve logging for MaxStartups connection throttling.
|
|
sshd will now log when it starts and stops throttling and periodically
|
|
while in this state. bz#3055
|
|
|
|
Bugfixes
|
|
--------
|
|
* ssh(1), ssh-keygen(1): better support for multiple attached FIDO
|
|
tokens. In cases where OpenSSH cannot unambiguously determine which
|
|
token to direct a request to, the user is now required to select a
|
|
token by touching it. In cases of operations that require a PIN to
|
|
be verified, this avoids sending the wrong PIN to the wrong token
|
|
and incrementing the token's PIN failure counter (tokens
|
|
effectively erase their keys after too many PIN failures).
|
|
* sshd(8): fix Include before Match in sshd_config; bz#3122
|
|
* ssh(1): close stdin/out/error when forking after authentication
|
|
completes ("ssh -f ...") bz#3137
|
|
* ssh(1), sshd(8): limit the amount of channel input data buffered,
|
|
avoiding peers that advertise large windows but are slow to read
|
|
from causing high memory consumption.
|
|
* ssh-agent(1): handle multiple requests sent in a single write() to
|
|
the agent.
|
|
* sshd(8): allow sshd_config longer than 256k
|
|
* sshd(8): avoid spurious "Unable to load host key" message when sshd
|
|
load a private key but no public counterpart
|
|
* ssh(1): prefer the default hostkey algorithm list whenever we have
|
|
a hostkey that matches its best-preference algorithm.
|
|
* sshd(1): when ordering the hostkey algorithms to request from a
|
|
server, prefer certificate types if the known_hosts files contain a key
|
|
marked as a @cert-authority; bz#3157
|
|
* ssh(1): perform host key fingerprint comparisons for the "Are you
|
|
sure you want to continue connecting (yes/no/[fingerprint])?"
|
|
prompt with case sensitivity.
|
|
* sshd(8): ensure that address/masklen mismatches in sshd_config
|
|
yield fatal errors at daemon start time rather than later when
|
|
they are evaluated.
|
|
* ssh-keygen(1): ensure that certificate extensions are lexically
|
|
sorted. Previously if the user specified a custom extension then
|
|
the everything would be in order except the custom ones. bz#3198
|
|
* ssh(1): also compare username when checking for JumpHost loops.
|
|
bz#3057
|
|
* ssh-keygen(1): preserve group/world read permission on known_hosts
|
|
files across runs of "ssh-keygen -Rf /path". The old behaviour was
|
|
to remove all rights for group/other. bz#3146
|
|
* ssh-keygen(1): Mention the [-a rounds] flag in the ssh-keygen
|
|
manual page and usage().
|
|
* sshd(8): explicitly construct path to ~/.ssh/rc rather than
|
|
relying on it being relative to the current directory, so that it
|
|
can still be found if the shell startup changes its directory.
|
|
bz#3185
|
|
* sshd(8): when redirecting sshd's log output to a file, undo this
|
|
redirection after the session child process is forked(). Fixes
|
|
missing log messages when using this feature under some
|
|
circumstances.
|
|
* sshd(8): start ClientAliveInterval bookkeeping before first pass
|
|
through select() loop; fixed theoretical case where busy sshd may
|
|
ignore timeouts from client.
|
|
* ssh(1): only reset the ServerAliveInterval check when we receive
|
|
traffic from the server and ignore traffic from a port forwarding
|
|
client, preventing a client from keeping a connection alive when
|
|
it should be terminated. bz#2265
|
|
* ssh-keygen(1): avoid spurious error message when ssh-keygen
|
|
creates files outside ~/.ssh
|
|
* sftp-client(1): fix off-by-one error that caused sftp downloads to
|
|
make one more concurrent request that desired. This prevented using
|
|
sftp(1) in unpipelined request/response mode, which is useful when
|
|
debugging. bz#3054
|
|
* ssh(1), sshd(8): handle EINTR in waitfd() and timeout_connect()
|
|
helpers. bz#3071
|
|
* ssh(1), ssh-keygen(1): defer creation of ~/.ssh until we attempt to
|
|
write to it so we don't leave an empty .ssh directory when it's not
|
|
needed. bz#3156
|
|
* ssh(1), sshd(8): fix multiplier when parsing time specifications
|
|
when handling seconds after other units. bz#3171
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 8 01:37:02 UTC 2021 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Update openssh-8.1p1-audit.patch (bsc#1180501). This fixes
|
|
occasional crashes on connection termination caused by accessing
|
|
freed memory.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Nov 27 11:36:56 UTC 2020 - Thorsten Kukuk <kukuk@suse.com>
|
|
|
|
- Support /usr/etc/pam.d
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Nov 11 20:05:27 UTC 2020 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Fix build breakage caused by missing security key objects:
|
|
+ Modify openssh-7.7p1-cavstest-ctr.patch.
|
|
+ Modify openssh-7.7p1-cavstest-kdf.patch.
|
|
+ Add openssh-link-with-sk.patch.
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Nov 11 18:27:55 UTC 2020 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Add openssh-fips-ensure-approved-moduli.patch (bsc#1177939).
|
|
This ensures only approved DH parameters are used in FIPS mode.
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Nov 11 18:27:54 UTC 2020 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Add openssh-8.1p1-ed25519-use-openssl-rng.patch (bsc#1173799).
|
|
This uses OpenSSL's RAND_bytes() directly instead of the internal
|
|
ChaCha20-based implementation to obtain random bytes for Ed25519
|
|
curve computations. This is required for FIPS compliance.
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Oct 8 21:38:27 UTC 2020 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Work around %service_add_post disabling sshd on upgrade with
|
|
package name change (bsc#1177039).
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Sep 25 13:40:51 UTC 2020 - Dominique Leuenberger <dimstar@opensuse.org>
|
|
|
|
- Fix fillup-template usage:
|
|
+ %post server needs to reference ssh (not sshd), which matches
|
|
the sysconfig.ssh file name the package ships.
|
|
+ %post client does not need any fillup_ calls, as there is no
|
|
client-relevant sysconfig file present. The naming of the
|
|
sysconfig file (ssh instead of sshd) is unfortunate.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Sep 25 10:59:50 UTC 2020 - Franck Bui <fbui@suse.com>
|
|
|
|
- Use of DISABLE_RESTART_ON_UPDATE is deprecated.
|
|
|
|
Replace it with %service_del_postun_without_restart
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Sep 17 20:41:39 UTC 2020 - Jan Engelhardt <jengelh@inai.de>
|
|
|
|
- Move some Requires to the right subpackage.
|
|
- Avoid ">&" bashism in %post.
|
|
- Upgrade some old specfile constructs/macros and drop unnecessary
|
|
%{?systemd_*}.
|
|
- Trim descriptions and straighten out the grammar.
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Sep 10 21:38:30 UTC 2020 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Split openssh package into openssh, openssh-common,
|
|
openssh-server and openssh-clients. This allows for the ssh
|
|
clients to be installed without the server component
|
|
(bsc#1176434).
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jun 5 00:36:08 UTC 2020 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Version update to 8.3p1:
|
|
= Potentially-incompatible changes
|
|
* sftp(1): reject an argument of "-1" in the same way as ssh(1) and
|
|
scp(1) do instead of accepting and silently ignoring it.
|
|
|
|
= New features
|
|
* sshd(8): make IgnoreRhosts a tri-state option: "yes" to ignore
|
|
rhosts/shosts, "no" allow rhosts/shosts or (new) "shosts-only"
|
|
to allow .shosts files but not .rhosts.
|
|
* sshd(8): allow the IgnoreRhosts directive to appear anywhere in a
|
|
sshd_config, not just before any Match blocks.
|
|
* ssh(1): add %TOKEN percent expansion for the LocalFoward and
|
|
RemoteForward keywords when used for Unix domain socket forwarding.
|
|
* all: allow loading public keys from the unencrypted envelope of a
|
|
private key file if no corresponding public key file is present.
|
|
* ssh(1), sshd(8): prefer to use chacha20 from libcrypto where
|
|
possible instead of the (slower) portable C implementation included
|
|
in OpenSSH.
|
|
* ssh-keygen(1): add ability to dump the contents of a binary key
|
|
revocation list via "ssh-keygen -lQf /path".
|
|
|
|
- Additional changes from 8.2p1 release:
|
|
= Potentially-incompatible changes
|
|
* ssh(1), sshd(8), ssh-keygen(1): this release removes the "ssh-rsa"
|
|
(RSA/SHA1) algorithm from those accepted for certificate signatures
|
|
(i.e. the client and server CASignatureAlgorithms option) and will
|
|
use the rsa-sha2-512 signature algorithm by default when the
|
|
ssh-keygen(1) CA signs new certificates.
|
|
* ssh(1), sshd(8): this release removes diffie-hellman-group14-sha1
|
|
from the default key exchange proposal for both the client and
|
|
server.
|
|
* ssh-keygen(1): the command-line options related to the generation
|
|
and screening of safe prime numbers used by the
|
|
diffie-hellman-group-exchange-* key exchange algorithms have
|
|
changed. Most options have been folded under the -O flag.
|
|
* sshd(8): the sshd listener process title visible to ps(1) has
|
|
changed to include information about the number of connections that
|
|
are currently attempting authentication and the limits configured
|
|
by MaxStartups.
|
|
* ssh-sk-helper(8): this is a new binary. It is used by the FIDO/U2F
|
|
support to provide address-space isolation for token middleware
|
|
libraries (including the internal one). It needs to be installed
|
|
in the expected path, typically under /usr/libexec or similar.
|
|
|
|
= New features
|
|
* This release adds support for FIDO/U2F hardware authenticators to
|
|
OpenSSH. U2F/FIDO are open standards for inexpensive two-factor
|
|
authentication hardware that are widely used for website
|
|
authentication. In OpenSSH FIDO devices are supported by new public
|
|
key types "ecdsa-sk" and "ed25519-sk", along with corresponding
|
|
certificate types.
|
|
* sshd(8): add an Include sshd_config keyword that allows including
|
|
additional configuration files via glob(3) patterns.
|
|
* ssh(1)/sshd(8): make the LE (low effort) DSCP code point available
|
|
via the IPQoS directive.
|
|
* ssh(1): when AddKeysToAgent=yes is set and the key contains no
|
|
comment, add the key to the agent with the key's path as the
|
|
comment.
|
|
* ssh-keygen(1), ssh-agent(1): expose PKCS#11 key labels and X.509
|
|
subjects as key comments, rather than simply listing the PKCS#11
|
|
provider library path.
|
|
* ssh-keygen(1): allow PEM export of DSA and ECDSA keys.
|
|
* ssh(1), sshd(8): make zlib compile-time optional, available via the
|
|
Makefile.inc ZLIB flag on OpenBSD or via the --with-zlib configure
|
|
option for OpenSSH portable.
|
|
* sshd(8): when clients get denied by MaxStartups, send a
|
|
notification prior to the SSH2 protocol banner according to
|
|
RFC4253 section 4.2.
|
|
* ssh(1), ssh-agent(1): when invoking the $SSH_ASKPASS prompt
|
|
program, pass a hint to the program to describe the type of
|
|
desired prompt. The possible values are "confirm" (indicating
|
|
that a yes/no confirmation dialog with no text entry should be
|
|
shown), "none" (to indicate an informational message only), or
|
|
blank for the original ssh-askpass behaviour of requesting a
|
|
password/phrase.
|
|
* ssh(1): allow forwarding a different agent socket to the path
|
|
specified by $SSH_AUTH_SOCK, by extending the existing ForwardAgent
|
|
option to accepting an explicit path or the name of an environment
|
|
variable in addition to yes/no.
|
|
* ssh-keygen(1): add a new signature operations "find-principals" to
|
|
look up the principal associated with a signature from an allowed-
|
|
signers file.
|
|
* sshd(8): expose the number of currently-authenticating connections
|
|
along with the MaxStartups limit in the process title visible to
|
|
"ps".
|
|
|
|
- Rebased patches:
|
|
* openssh-7.7p1-cavstest-ctr.patch
|
|
* openssh-7.7p1-cavstest-kdf.patch
|
|
* openssh-7.7p1-fips.patch
|
|
* openssh-7.7p1-fips_checks.patch
|
|
* openssh-7.7p1-ldap.patch
|
|
* openssh-7.7p1-no_fork-no_pid_file.patch
|
|
* openssh-7.7p1-sftp_print_diagnostic_messages.patch
|
|
* openssh-8.0p1-gssapi-keyex.patch
|
|
* openssh-8.1p1-audit.patch
|
|
* openssh-8.1p1-seccomp-clock_nanosleep.patch
|
|
|
|
- Removed openssh-7.7p1-seed-prng.patch (bsc#1165158).
|
|
|
|
-------------------------------------------------------------------
|
|
Sun May 31 11:25:07 UTC 2020 - Andreas Stieger <andreas.stieger@gmx.de>
|
|
|
|
- add upstream signing key to actually verify source signature
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Feb 28 16:15:06 UTC 2020 - Ludwig Nussel <lnussel@suse.de>
|
|
|
|
- Don't recommend xauth to avoid pulling in X.
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 18 14:47:36 UTC 2020 - Fabian Vogt <fvogt@suse.com>
|
|
|
|
- Add patches to fix the sandbox blocking glibc on 32bit platforms
|
|
(boo#1164061):
|
|
* openssh-8.1p1-seccomp-clock_nanosleep_time64.patch
|
|
* openssh-8.1p1-seccomp-clock_gettime64.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 11 02:20:32 UTC 2020 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Add openssh-8.1p1-use-openssl-kdf.patch (jsc#SLE-9443). This
|
|
performs key derivation using OpenSSL's SSHKDF facility, which
|
|
allows OpenSSH to benefit from the former's FIPS certification
|
|
status.
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Nov 21 04:49:22 UTC 2019 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Make sure ssh-keygen runs if SSHD_AUTO_KEYGEN variable is unset
|
|
or contains an unrecognized value (bsc#1157176).
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Nov 8 18:05:37 UTC 2019 - Cristian Rodríguez <crrodriguez@opensuse.org>
|
|
|
|
- Add openssh-8.1p1-seccomp-clock_nanosleep.patch, allow clock_nanosleep
|
|
glibc master implements multiple functions using that syscall making
|
|
the privsep sandbox kill the preauth process.
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Oct 17 06:23:58 UTC 2019 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Update openssh-7.7p1-audit.patch to fix crash (bsc#1152730). Fix
|
|
by Enzo Matsumiya (ematsumiya@suse.com). This was integrated in
|
|
a separate code stream merged with the Oct. 10 update; the patch
|
|
was also rebased and renamed to openssh-8.1p1-audit.patch.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Oct 14 23:58:39 UTC 2019 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Add openssh-7.9p1-keygen-preserve-perms.patch (bsc#1150574).
|
|
This attempts to preserve the permissions of any existing
|
|
known_hosts file when modified by ssh-keygen (for instance,
|
|
with -R).
|
|
- Added openssh-7.9p1-revert-new-qos-defaults.patch, which reverts
|
|
an upstream commit that caused compatibility issues with other
|
|
software (bsc#1136402).
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Oct 14 23:56:42 UTC 2019 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Run 'ssh-keygen -A' on startup only if SSHD_AUTO_KEYGEN="yes"
|
|
in /etc/sysconfig/ssh. This is set to "yes" by default, but
|
|
can be changed by the system administrator (bsc#1139089).
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Oct 14 23:50:04 UTC 2019 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Add openssh-7.9p1-keygen-preserve-perms.patch (bsc#1150574).
|
|
This attempts to preserve the permissions of any existing
|
|
known_hosts file when modified by ssh-keygen (for instance,
|
|
with -R).
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Oct 10 00:41:18 UTC 2019 - Hans Petter Jansson <hpj@suse.com>
|
|
|
|
- Version update to 8.1p1:
|
|
* ssh-keygen(1): when acting as a CA and signing certificates with
|
|
an RSA key, default to using the rsa-sha2-512 signature algorithm.
|
|
Certificates signed by RSA keys will therefore be incompatible
|
|
with OpenSSH versions prior to 7.2 unless the default is
|
|
overridden (using "ssh-keygen -t ssh-rsa -s ...").
|
|
* ssh(1): Allow %n to be expanded in ProxyCommand strings
|
|
* ssh(1), sshd(8): Allow prepending a list of algorithms to the
|
|
default set by starting the list with the '^' character, E.g.
|
|
"HostKeyAlgorithms ^ssh-ed25519"
|
|
* ssh-keygen(1): add an experimental lightweight signature and
|
|
verification ability. Signatures may be made using regular ssh keys
|
|
held on disk or stored in a ssh-agent and verified against an
|
|
authorized_keys-like list of allowed keys. Signatures embed a
|
|
namespace that prevents confusion and attacks between different
|
|
usage domains (e.g. files vs email).
|
|
* ssh-keygen(1): print key comment when extracting public key from a
|
|
private key.
|
|
* ssh-keygen(1): accept the verbose flag when searching for host keys
|
|
in known hosts (i.e. "ssh-keygen -vF host") to print the matching
|
|
host's random-art signature too.
|
|
* All: support PKCS8 as an optional format for storage of private
|
|
keys to disk. The OpenSSH native key format remains the default,
|
|
but PKCS8 is a superior format to PEM if interoperability with
|
|
non-OpenSSH software is required, as it may use a less insecure
|
|
key derivation function than PEM's.
|
|
|
|
- Additional changes from 8.0p1 release:
|
|
* scp(1): Add "-T" flag to disable client-side filtering of
|
|
server file list.
|
|
* sshd(8): Remove support for obsolete "host/port" syntax.
|
|
* ssh(1), ssh-agent(1), ssh-add(1): Add support for ECDSA keys in
|
|
PKCS#11 tokens.
|
|
* ssh(1), sshd(8): Add experimental quantum-computing resistant
|
|
key exchange method, based on a combination of Streamlined NTRU
|
|
Prime 4591^761 and X25519.
|
|
* ssh-keygen(1): Increase the default RSA key size to 3072 bits,
|
|
following NIST Special Publication 800-57's guidance for a
|
|
128-bit equivalent symmetric security level.
|
|
* ssh(1): Allow "PKCS11Provider=none" to override later instances of
|
|
the PKCS11Provider directive in ssh_config,
|
|
* sshd(8): Add a log message for situations where a connection is
|
|
dropped for attempting to run a command but a sshd_config
|
|
ForceCommand=internal-sftp restriction is in effect.
|
|
* ssh(1): When prompting whether to record a new host key, accept
|
|
the key fingerprint as a synonym for "yes". This allows the user
|
|
to paste a fingerprint obtained out of band at the prompt and
|
|
have the client do the comparison for you.
|
|
* ssh-keygen(1): When signing multiple certificates on a single
|
|
command-line invocation, allow automatically incrementing the
|
|
certificate serial number.
|
|
* scp(1), sftp(1): Accept -J option as an alias to ProxyJump on
|
|
the scp and sftp command-lines.
|
|
* ssh-agent(1), ssh-pkcs11-helper(8), ssh-add(1): Accept "-v"
|
|
command-line flags to increase the verbosity of output; pass
|
|
verbose flags though to subprocesses, such as ssh-pkcs11-helper
|
|
started from ssh-agent.
|
|
* ssh-add(1): Add a "-T" option to allowing testing whether keys in
|
|
an agent are usable by performing a signature and a verification.
|
|
* sftp-server(8): Add a "lsetstat@openssh.com" protocol extension
|
|
that replicates the functionality of the existing SSH2_FXP_SETSTAT
|
|
operation but does not follow symlinks.
|
|
* sftp(1): Add "-h" flag to chown/chgrp/chmod commands to request
|
|
they do not follow symlinks.
|
|
* sshd(8): Expose $SSH_CONNECTION in the PAM environment. This makes
|
|
the connection 4-tuple available to PAM modules that wish to use
|
|
it in decision-making.
|
|
* sshd(8): Add a ssh_config "Match final" predicate Matches in same
|
|
pass as "Match canonical" but doesn't require hostname
|
|
canonicalisation be enabled.
|
|
* sftp(1): Support a prefix of '@' to suppress echo of sftp batch
|
|
commands.
|
|
* ssh-keygen(1): When printing certificate contents using
|
|
"ssh-keygen -Lf /path/certificate", include the algorithm that
|
|
the CA used to sign the cert.
|
|
|
|
- Rebased patches:
|
|
* openssh-7.7p1-IPv6_X_forwarding.patch
|
|
* openssh-7.7p1-X_forward_with_disabled_ipv6.patch
|
|
* openssh-7.7p1-cavstest-ctr.patch
|
|
* openssh-7.7p1-cavstest-kdf.patch
|
|
* openssh-7.7p1-disable_openssl_abi_check.patch
|
|
* openssh-7.7p1-fips.patch
|
|
* openssh-7.7p1-fips_checks.patch
|
|
* openssh-7.7p1-hostname_changes_when_forwarding_X.patch
|
|
* openssh-7.7p1-ldap.patch
|
|
* openssh-7.7p1-seed-prng.patch
|
|
* openssh-7.7p1-sftp_force_permissions.patch
|
|
* openssh-7.7p1-sftp_print_diagnostic_messages.patch
|
|
* openssh-8.0p1-gssapi-keyex.patch (formerly
|
|
openssh-7.7p1-gssapi_key_exchange.patch)
|
|
* openssh-8.1p1-audit.patch (formerly openssh-7.7p1-audit.patch)
|
|
|
|
- Removed patches (integrated upstream):
|
|
* 0001-upstream-Fix-two-race-conditions-in-sshd-relating-to.patch
|
|
* openssh-7.7p1-seccomp_ioctl_s390_EP11.patch
|
|
* openssh-7.9p1-CVE-2018-20685.patch
|
|
* openssh-7.9p1-brace-expansion.patch
|
|
* openssh-CVE-2019-6109-force-progressmeter-update.patch
|
|
* openssh-CVE-2019-6109-sanitize-scp-filenames.patch
|
|
* openssh-CVE-2019-6111-scp-client-wildcard.patch
|
|
|
|
- Removed patches (obsolete):
|
|
* openssh-openssl-1_0_0-compatibility.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Aug 19 11:24:36 CEST 2019 - kukuk@suse.de
|
|
|
|
- don't install SuSEfirewall2 service on Factory, since SuSEfirewall2
|
|
has been replaced by firewalld, see [1].
|
|
|
|
[1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jul 22 16:55:25 UTC 2019 - Fabian Vogt <fabian@ritter-vogt.de>
|
|
|
|
- ssh-askpass: Try a fallback if the other option is not available
|
|
|
|
-------------------------------------------------------------------
|
|
Fri May 31 11:14:42 UTC 2019 - Vítězslav Čížek <vcizek@suse.com>
|
|
|
|
- Fix a crash with GSSAPI key exchange (bsc#1136104)
|
|
* modify openssh-7.7p1-gssapi_key_exchange.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 28 12:55:13 UTC 2019 - Vítězslav Čížek <vcizek@suse.com>
|
|
|
|
- Fix a double free() in the KDF CAVS testing tool (bsc#1065237)
|
|
* modify openssh-7.7p1-cavstest-kdf.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Mar 12 15:16:20 UTC 2019 - Vítězslav Čížek <vcizek@suse.com>
|
|
|
|
- Minor clean-up of the fips patches, modified
|
|
openssh-7.7p1-fips.patch
|
|
openssh-7.7p1-fips_checks.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 11 15:06:17 UTC 2019 - Vítězslav Čížek <vcizek@suse.com>
|
|
|
|
- Fix two race conditions in sshd relating to SIGHUP (bsc#1119183)
|
|
* 0001-upstream-Fix-two-race-conditions-in-sshd-relating-to.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Feb 28 19:20:58 UTC 2019 - Vítězslav Čížek <vcizek@suse.com>
|
|
|
|
- Correctly filter out non-compliant algorithms when in FIPS mode
|
|
(bsc#1126397)
|
|
* A hunk was applied to a wrong place due to a patch fuzz when
|
|
the fips patch was being ported to openssh 7.9p1
|
|
- update openssh-7.7p1-fips.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Feb 27 12:29:05 UTC 2019 - Vítězslav Čížek <vcizek@suse.com>
|
|
|
|
- Remove the "KexDHMin" config keyword (bsc#1127180)
|
|
It used to allow lowering of the minimal allowed DH group size,
|
|
which was increased to 2048 by upstream in the light of the Logjam
|
|
attack.
|
|
The code was broken since the upgrade to 7.6p1, but nobody noticed.
|
|
As apparently no one needs the functionality any more, let's drop
|
|
the patch.
|
|
It's still possible to use the fixed 1024-bit diffie-hellman-group1-sha1
|
|
key exchange method when working with legacy systems.
|
|
- drop openssh-7.7p1-disable_short_DH_parameters.patch
|
|
- updated patches:
|
|
openssh-7.7p1-fips.patch
|
|
openssh-7.7p1-fips_checks.patch
|
|
openssh-7.7p1-gssapi_key_exchange.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Feb 18 10:01:45 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
|
|
|
|
- Handle brace expansion in scp when checking that filenames sent
|
|
by the server side match what the client requested [bsc#1125687]
|
|
* openssh-7.9p1-brace-expansion.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Feb 14 15:27:53 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
|
|
|
|
- Updated security fixes:
|
|
* [bsc#1121816, CVE-2019-6109] Sanitize scp filenames via snmprintf
|
|
and have progressmeter force an update at the beginning and end
|
|
of each transfer. Added patches:
|
|
- openssh-CVE-2019-6109-sanitize-scp-filenames.patch
|
|
- openssh-CVE-2019-6109-force-progressmeter-update.patch
|
|
* [bsc#1121821, CVE-2019-6111] Check in scp client that filenames
|
|
sent during remote->local directory copies satisfy the wildcard
|
|
specified by the user. Added patch:
|
|
- openssh-CVE-2019-6111-scp-client-wildcard.patch
|
|
* Removed openssh-7.9p1-scp-name-validator.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Feb 14 10:29:20 UTC 2019 - Tomáš Chvátal <tchvatal@suse.com>
|
|
|
|
- Change the askpass wrapper to not use x11 interface:
|
|
* by default we use the -gnome UI (which is gtk3 only, no gnome dep)
|
|
* if desktop is KDE/LxQt we use ksshaskpass
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jan 28 10:34:53 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
|
|
|
|
- Remove old conditionals
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 25 12:42:54 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
|
|
|
|
- Move ssh-ldap* man pages into openssh-helpers [bsc#1051531]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 24 15:51:19 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
|
|
|
|
- Allow root login by default [bsc#1118114, bsc#1121196]
|
|
* Added/updated previous patch openssh-7.7p1-allow_root_password_login.patch
|
|
* Mention the change in README.SUSE
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 24 12:21:40 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
|
|
|
|
- Added SLE conditionals in the spec files:
|
|
* Keep gtk2-devel in openssh-askpass-gnome in SLE
|
|
* Keep krb5-mini-devel in SLE
|
|
- Removed obsolete configure options:
|
|
* SSH protocol 1 --with-ssh1
|
|
* Smart card --with-opensc
|
|
- Cleaned spec file with spec-cleaner
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jan 16 14:11:29 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
|
|
|
|
- Security fix:
|
|
* [bsc#1121816, CVE-2019-6109] scp client spoofing via object name
|
|
* [bsc#1121818, CVE-2019-6110] scp client spoofing via stderr
|
|
* [bsc#1121821, CVE-2019-6111] scp client missing received object
|
|
name validation
|
|
* Added patch openssh-7.9p1-scp-name-validator.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 11 15:09:04 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
|
|
|
|
- Security fix: [bsc#1121571, CVE-2018-20685]
|
|
* The scp client allows remote SSH servers to bypass intended
|
|
access restrictions
|
|
* Added patch openssh-7.9p1-CVE-2018-20685.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 3 11:44:45 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
|
|
|
|
- Added compatibility with SuSEfirewall2 [bsc#1118044]
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Dec 11 11:56:43 UTC 2018 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
|
|
|
|
- Update the firewall rules in Tumbleweed
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Nov 26 11:07:42 UTC 2018 - Vítězslav Čížek <vcizek@suse.com>
|
|
|
|
- Fix build with openssl < 1.1.0
|
|
* add openssh-openssl-1_0_0-compatibility.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Oct 31 00:27:41 UTC 2018 - Cristian Rodríguez <crrodriguez@opensuse.org>
|
|
|
|
- openssh-7.7p1-audit.patch: fix sshd fatal error in
|
|
mm_answer_keyverify: buffer error: incomplete message [bnc#1114008]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Oct 22 08:51:30 UTC 2018 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
|
|
|
|
- Version update to 7.9p1
|
|
* ssh(1), sshd(8): the setting of the new CASignatureAlgorithms
|
|
option (see below) bans the use of DSA keys as certificate
|
|
authorities.
|
|
* sshd(8): the authentication success/failure log message has
|
|
changed format slightly. It now includes the certificate
|
|
fingerprint (previously it included only key ID and CA key
|
|
fingerprint).
|
|
* ssh(1), sshd(8): allow most port numbers to be specified using
|
|
service names from getservbyname(3) (typically /etc/services).
|
|
* sshd(8): support signalling sessions via the SSH protocol.
|
|
A limited subset of signals is supported and only for login or
|
|
command sessions (i.e. not subsystems) that were not subject to
|
|
a forced command via authorized_keys or sshd_config. bz#1424
|
|
* ssh(1): support "ssh -Q sig" to list supported signature options.
|
|
Also "ssh -Q help" to show the full set of supported queries.
|
|
* ssh(1), sshd(8): add a CASignatureAlgorithms option for the
|
|
client and server configs to allow control over which signature
|
|
formats are allowed for CAs to sign certificates. For example,
|
|
this allows banning CAs that sign certificates using the RSA-SHA1
|
|
signature algorithm.
|
|
* sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to
|
|
revoke keys specified by SHA256 hash.
|
|
* ssh-keygen(1): allow creation of key revocation lists directly
|
|
from base64-encoded SHA256 fingerprints. This supports revoking
|
|
keys using only the information contained in sshd(8)
|
|
authentication log messages.
|
|
|
|
- Removed obsolete configuration option --with-tcp-wrappers, and
|
|
--with-opensc for s390 and s390x.
|
|
|
|
- Removed patch merged upstream
|
|
* openssh-7.7p1-openssl_1.1.0.patch
|
|
|
|
- Refreshed patches
|
|
* openssh-7.7p1-audit.patch
|
|
* openssh-7.7p1-disable_short_DH_parameters.patch
|
|
* openssh-7.7p1-fips.patch
|
|
* openssh-7.7p1-gssapi_key_exchange.patch
|
|
* openssh-7.7p1-seccomp_ipc_flock.patch
|
|
* openssh-7.7p1-cavstest-ctr.patch
|
|
* openssh-7.7p1-ldap.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Oct 19 13:22:10 UTC 2018 - Tomáš Chvátal <tchvatal@suse.com>
|
|
|
|
- Mention upstream bugs on multiple local patches
|
|
- Adjust service to not spam restart and reload only on fails
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Oct 19 13:11:34 UTC 2018 - Tomáš Chvátal <tchvatal@suse.com>
|
|
|
|
- Update openssh-7.7p1-sftp_force_permissions.patch from the
|
|
upstream bug, and mention the bug in the spec
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Oct 19 08:36:52 UTC 2018 - Tomáš Chvátal <tchvatal@suse.com>
|
|
|
|
- Drop patch openssh-7.7p1-allow_root_password_login.patch
|
|
* There is no reason to set less secure default value, if
|
|
users need the behaviour they can still set it up themselves
|
|
- Drop patch openssh-7.7p1-blocksigalrm.patch
|
|
* We had a bug way in past about this but it was never reproduced
|
|
or even confirmed in the ticket, thus rather drop the patch
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Oct 17 09:22:36 UTC 2018 - Tomáš Chvátal <tchvatal@suse.com>
|
|
|
|
- Disable ssh1 protocol support as neither RH or Debian enable
|
|
this protocol by default anymore either.
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Oct 17 08:42:12 UTC 2018 - Tomáš Chvátal <tchvatal@suse.com>
|
|
|
|
- Remove the mention of the SLE12 in the README.SUSE
|
|
- Install firewall rules only when really needed (<SLE15)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Oct 9 12:32:12 UTC 2018 - Tomáš Chvátal <tchvatal@suse.com>
|
|
|
|
- Version update to 7.8p1:
|
|
* For most details see release notes file
|
|
* ssh-keygen(1): write OpenSSH format private keys by default
|
|
instead of using OpenSSL's PEM format
|
|
- Rebase patches to apply on 7.8p1 release:
|
|
* openssh-7.7p1-fips.patch
|
|
* openssh-7.7p1-cavstest-kdf.patch
|
|
* openssh-7.7p1-fips_checks.patch
|
|
* openssh-7.7p1-gssapi_key_exchange.patch
|
|
* openssh-7.7p1-audit.patch
|
|
* openssh-7.7p1-openssl_1.1.0.patch
|
|
* openssh-7.7p1-ldap.patch
|
|
* openssh-7.7p1-IPv6_X_forwarding.patch
|
|
* openssh-7.7p1-sftp_print_diagnostic_messages.patch
|
|
* openssh-7.7p1-disable_short_DH_parameters.patch
|
|
* openssh-7.7p1-hostname_changes_when_forwarding_X.patch
|
|
* openssh-7.7p1-pam_check_locks.patch
|
|
* openssh-7.7p1-seed-prng.patch
|
|
* openssh-7.7p1-systemd-notify.patch
|
|
* openssh-7.7p1-X11_trusted_forwarding.patch
|
|
- Dropped patches:
|
|
* openssh-7.7p1-lastlog.patch
|
|
* openssh-7.7p1-blocksigalrm.patch
|
|
- Do not use env in script cavs_driver-ssh.pl
|
|
- Added pam_keyinit to pam configuration file [bsc#1081947]
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Oct 9 11:01:40 UTC 2018 - Tomáš Chvátal <tchvatal@suse.com>
|
|
|
|
- Format with spec-cleaner
|
|
- Reduce conditionals to support SLE12+ only
|
|
- Split out bundled patches to be normal patches applied over
|
|
the package (use -p1 for patches):
|
|
* openssh-7.7p1-allow_root_password_login.patch
|
|
* openssh-7.7p1-X11_trusted_forwarding.patch
|
|
* openssh-7.7p1-lastlog.patch
|
|
* openssh-7.7p1-enable_PAM_by_default.patch
|
|
* openssh-7.7p1-eal3.patch
|
|
* openssh-7.7p1-blocksigalrm.patch
|
|
* openssh-7.7p1-send_locale.patch
|
|
* openssh-7.7p1-hostname_changes_when_forwarding_X.patch
|
|
* openssh-7.7p1-remove_xauth_cookies_on_exit.patch
|
|
* openssh-7.7p1-pts_names_formatting.patch
|
|
* openssh-7.7p1-pam_check_locks.patch
|
|
* openssh-7.7p1-disable_short_DH_parameters.patch
|
|
* openssh-7.7p1-seccomp_getuid.patch
|
|
* openssh-7.7p1-seccomp_geteuid.patch
|
|
* openssh-7.7p1-seccomp_stat.patch
|
|
* openssh-7.7p1-seccomp_ipc_flock.patch
|
|
* openssh-7.7p1-seccomp_ioctl_s390_EP11.patch
|
|
* openssh-7.7p1-fips.patch
|
|
* openssh-7.7p1-cavstest-ctr.patch
|
|
* openssh-7.7p1-cavstest-kdf.patch
|
|
* openssh-7.7p1-fips_checks.patch
|
|
* openssh-7.7p1-seed-prng.patch
|
|
* openssh-7.7p1-systemd-notify.patch
|
|
* openssh-7.7p1-gssapi_key_exchange.patch
|
|
* openssh-7.7p1-audit.patch
|
|
* openssh-7.7p1-openssl_1.1.0.patch
|
|
* openssh-7.7p1-disable_openssl_abi_check.patch
|
|
* openssh-7.7p1-no_fork-no_pid_file.patch
|
|
* openssh-7.7p1-host_ident.patch
|
|
* openssh-7.7p1-sftp_force_permissions.patch
|
|
* openssh-7.7p1-X_forward_with_disabled_ipv6.patch
|
|
* openssh-7.7p1-ldap.patch
|
|
* openssh-7.7p1-IPv6_X_forwarding.patch
|
|
* openssh-7.7p1-sftp_print_diagnostic_messages.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Sep 18 09:22:23 UTC 2018 - schwab@suse.de
|
|
|
|
- seccomp_filter sandbox is not supported on ppc
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Aug 27 09:26:15 UTC 2018 - tchvatal@suse.com
|
|
|
|
- Depend explicitly on zlib-devel, previously pulled in by openssl
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jun 25 20:30:16 UTC 2018 - astieger@suse.com
|
|
|
|
- BuildRequire pkgconfig(krb5) instead of krb5-mini-devel to ensure
|
|
zypper si can pick a resolvable provider. Build cycle remains
|
|
solved via project config pulling in -mini. (bsc#1099044)
|
|
|
|
-------------------------------------------------------------------
|
|
Mon May 21 15:19:03 UTC 2018 - pcerny@suse.com
|
|
|
|
- Upgrade to 7.7p1 (bsc#1094068)
|
|
Most important changes (more details below):
|
|
* Drop compatibility support for pre-2001 SSH implementations
|
|
* sshd(1) does not load DSA keys by default
|
|
Distilled upstream log:
|
|
---- Potentially-incompatible changes
|
|
* ssh(1)/sshd(8): Drop compatibility support for some very old
|
|
SSH implementations, including ssh.com <=2.* and OpenSSH <=
|
|
3.*. These versions were all released in or before 2001 and
|
|
predate the final SSH RFCs. The support in question isn't
|
|
necessary for RFC-compliant SSH implementations.
|
|
---- New Features
|
|
* experimental support for PQC XMSS keys (Extended Hash-Based
|
|
Signatures), not compiled in by default.
|
|
* sshd(8): Add a "rdomain" criteria for the sshd_config Match
|
|
keyword to allow conditional configuration that depends on
|
|
which routing domain a connection was received on (currently
|
|
supported on OpenBSD and Linux).
|
|
* sshd_config(5): Add an optional rdomain qualifier to the
|
|
ListenAddress directive to allow listening on different
|
|
routing domains. This is supported only on OpenBSD and Linux
|
|
at present.
|
|
* sshd_config(5): Add RDomain directive to allow the
|
|
authenticated session to be placed in an explicit routing
|
|
domain. This is only supported on OpenBSD at present.
|
|
* sshd(8): Add "expiry-time" option for authorized_keys files
|
|
to allow for expiring keys.
|
|
* ssh(1): Add a BindInterface option to allow binding the
|
|
outgoing connection to an interface's address (basically a
|
|
more usable BindAddress)
|
|
* ssh(1): Expose device allocated for tun/tap forwarding via a
|
|
new %T expansion for LocalCommand. This allows LocalCommand
|
|
to be %used to prepare the interface.
|
|
* sshd(8): Expose the device allocated for tun/tap forwarding
|
|
via a new SSH_TUNNEL environment variable. This allows
|
|
automatic setup of the interface and surrounding network
|
|
configuration automatically on the server.
|
|
* ssh(1)/scp(1)/sftp(1): Add URI support to ssh, sftp and scp,
|
|
e.g. ssh://user@host or sftp://user@host/path. Additional
|
|
connection parameters that use deporecated MD5 are not
|
|
implemented.
|
|
* ssh-keygen(1): Allow certificate validity intervals that
|
|
specify only a start or stop time (instead of both or
|
|
neither).
|
|
* sftp(1): Allow "cd" and "lcd" commands with no explicit path
|
|
argument. lcd will change to the local user's home directory
|
|
as usual. cd will change to the starting directory for
|
|
session (because the protocol offers no way to obtain the
|
|
remote user's home directory). bz#2760
|
|
* sshd(8): When doing a config test with sshd -T, only require
|
|
the attributes that are actually used in Match criteria
|
|
rather than (an incomplete list of) all criteria.
|
|
---- Bugfixes
|
|
* ssh(1)/sshd(8): More strictly check signature types during
|
|
key exchange against what was negotiated. Prevents downgrade
|
|
of RSA signatures made with SHA-256/512 to SHA-1.
|
|
* sshd(8): Fix support for client that advertise a protocol
|
|
version of "1.99" (indicating that they are prepared to
|
|
accept both SSHv1 and SSHv2). This was broken in OpenSSH 7.6
|
|
during the removal of SSHv1 support. bz#2810
|
|
* ssh(1): Warn when the agent returns a ssh-rsa (SHA1)
|
|
signature when a rsa-sha2-256/512 signature was requested.
|
|
This condition is possible when an old or non-OpenSSH agent
|
|
is in use. bz#2799
|
|
* ssh-agent(1): Fix regression introduced in 7.6 that caused
|
|
ssh-agent to fatally exit if presented an invalid signature
|
|
request message.
|
|
* sshd_config(5): Accept yes/no flag options
|
|
case-insensitively, as has been the case in ssh_config(5) for
|
|
a long time. bz#2664
|
|
* ssh(1): Improve error reporting for failures during
|
|
connection. Under some circumstances misleading errors were
|
|
being shown. bz#2814
|
|
* ssh-keyscan(1): Add -D option to allow printing of results
|
|
directly in SSHFP format. bz#2821
|
|
* regress tests: fix PuTTY interop test broken in last
|
|
release's SSHv1 removal. bz#2823
|
|
* ssh(1): Compatibility fix for some servers that erroneously
|
|
drop the connection when the IUTF8 (RFC8160) option is sent.
|
|
* scp(1): Disable RemoteCommand and RequestTTY in the ssh
|
|
session started by scp (sftp was already doing this.)
|
|
* ssh-keygen(1): Refuse to create a certificate with an
|
|
unusable number of principals.
|
|
* ssh-keygen(1): Fatally exit if ssh-keygen is unable to write
|
|
all the public key during key generation. Previously it would
|
|
silently ignore errors writing the comment and terminating
|
|
newline.
|
|
* ssh(1): Do not modify hostname arguments that are addresses
|
|
by automatically forcing them to lower-case. Instead
|
|
canonicalise them to resolve ambiguities (e.g. ::0001 => ::1)
|
|
before they are matched against known_hosts. bz#2763
|
|
* ssh(1): Don't accept junk after "yes" or "no" responses to
|
|
hostkey prompts. bz#2803
|
|
* sftp(1): Have sftp print a warning about shell cleanliness
|
|
when decoding the first packet fails, which is usually caused
|
|
by shells polluting stdout of non-interactive startups.
|
|
bz#2800
|
|
* ssh(1)/sshd(8): Switch timers in packet code from using
|
|
wall-clock time to monotonic time, allowing the packet layer
|
|
to better function over a clock step and avoiding possible
|
|
integer overflows during steps.
|
|
* Numerous manual page fixes and improvements.
|
|
|
|
-------------------------------------------------------------------
|
|
Wed May 2 08:14:41 UTC 2018 - dimstar@opensuse.org
|
|
|
|
- Use TIRPC on suse_version >= 1500: sunrpc is deprecated and
|
|
should be replaced by TIRPC.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Apr 30 15:11:31 UTC 2018 - pcerny@suse.com
|
|
|
|
- additional rebased patches (bsc#1080779)
|
|
* auditing support
|
|
* LDAP integration
|
|
* various distribution tweaks from SLE12
|
|
(X forwarding over IPv6, sftp forced permissions
|
|
and verbose batch mode)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Apr 4 13:19:30 CEST 2018 - kukuk@suse.de
|
|
|
|
- Use %license instead of %doc [bsc#1082318]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Feb 12 22:55:01 UTC 2018 - pcerny@suse.com
|
|
|
|
- add OpenSSL 1.0 to 1.1 shim to remove dependency on old OpenSSL
|
|
(update tracker: bsc#1080779)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jan 31 13:31:41 UTC 2018 - pcerny@suse.com
|
|
|
|
- Add missing crypto hardware enablement patches for IBM mainframes
|
|
(FATE#323902)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jan 24 21:42:35 UTC 2018 - pcerny@suse.com
|
|
|
|
- add missing part of systemd integration (unit type)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jan 16 13:04:01 UTC 2018 - dimstar@opensuse.org
|
|
|
|
- BuildRequire pkgconfig(libsystemd) instead of systemd-devel:
|
|
allow the scheduler to pick systemd-mini flavors to get build
|
|
going.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 12 12:38:09 UTC 2018 - pcerny@suse.com
|
|
|
|
- Replace forgotten references to /var/adm/fillup-templates
|
|
with new %_fillupdir macro (boo#1069468)
|
|
- tighten configuration access rights
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 12 00:38:37 CET 2018 - pcerny@suse.com
|
|
|
|
- Update to vanilla 7.6p1
|
|
Most important changes (more details below):
|
|
* complete removal of the ancient SSHv1 protocol
|
|
* sshd(8) cannot run without privilege separation
|
|
* removal of suport for arcfourm blowfish and CAST ciphers
|
|
and RIPE-MD160 HMAC
|
|
* refuse RSA keys shorter than 1024 bits
|
|
Distilled upstream log:
|
|
- OpenSSH 7.3
|
|
---- Security
|
|
* sshd(8): Mitigate a potential denial-of-service attack
|
|
against the system's crypt(3) function via sshd(8). An
|
|
attacker could send very long passwords that would cause
|
|
excessive CPU use in crypt(3). sshd(8) now refuses to accept
|
|
password authentication requests of length greater than 1024
|
|
characters. Independently reported by Tomas Kuthan (Oracle),
|
|
Andres Rojas and Javier Nieto.
|
|
* sshd(8): Mitigate timing differences in password
|
|
authentication that could be used to discern valid from
|
|
invalid account names when long passwords were sent and
|
|
particular password hashing algorithms are in use on the
|
|
server. CVE-2016-6210, reported by EddieEzra.Harari at
|
|
verint.com
|
|
* ssh(1), sshd(8): Fix observable timing weakness in the CBC
|
|
padding oracle countermeasures. Reported by Jean Paul
|
|
Degabriele, Kenny Paterson, Torben Hansen and Martin
|
|
Albrecht. Note that CBC ciphers are disabled by default and
|
|
only included for legacy compatibility.
|
|
* ssh(1), sshd(8): Improve operation ordering of MAC
|
|
verification for Encrypt-then-MAC (EtM) mode transport MAC
|
|
algorithms to verify the MAC before decrypting any
|
|
ciphertext. This removes the possibility of timing
|
|
differences leaking facts about the plaintext, though no such
|
|
leakage has been observed. Reported by Jean Paul Degabriele,
|
|
Kenny Paterson, Torben Hansen and Martin Albrecht.
|
|
* sshd(8): (portable only) Ignore PAM environment vars when
|
|
UseLogin=yes. If PAM is configured to read user-specified
|
|
environment variables and UseLogin=yes in sshd_config, then a
|
|
hostile local user may attack /bin/login via LD_PRELOAD or
|
|
similar environment variables set via PAM. CVE-2015-8325,
|
|
found by Shayan Sadigh.
|
|
---- New Features
|
|
* ssh(1): Add a ProxyJump option and corresponding -J
|
|
command-line flag to allow simplified indirection through a
|
|
one or more SSH bastions or "jump hosts".
|
|
* ssh(1): Add an IdentityAgent option to allow specifying
|
|
specific agent sockets instead of accepting one from the
|
|
environment.
|
|
* ssh(1): Allow ExitOnForwardFailure and ClearAllForwardings to
|
|
be optionally overridden when using ssh -W. bz#2577
|
|
* ssh(1), sshd(8): Implement support for the IUTF8 terminal
|
|
mode as per draft-sgtatham-secsh-iutf8-00.
|
|
* ssh(1), sshd(8): Add support for additional fixed
|
|
Diffie-Hellman 2K, 4K and 8K groups from
|
|
draft-ietf-curdle-ssh-kex-sha2-03.
|
|
* ssh-keygen(1), ssh(1), sshd(8): support SHA256 and SHA512 RSA
|
|
signatures in certificates;
|
|
* ssh(1): Add an Include directive for ssh_config(5) files.
|
|
* ssh(1): Permit UTF-8 characters in pre-authentication banners
|
|
sent from the server. bz#2058
|
|
---- Bugfixes
|
|
* ssh(1), sshd(8): Reduce the syslog level of some relatively
|
|
common protocol events from LOG_CRIT. bz#2585
|
|
* sshd(8): Refuse AuthenticationMethods="" in configurations
|
|
and accept AuthenticationMethods=any for the default
|
|
behaviour of not requiring multiple authentication. bz#2398
|
|
* sshd(8): Remove obsolete and misleading "POSSIBLE BREAK-IN
|
|
ATTEMPT!" message when forward and reverse DNS don't match.
|
|
bz#2585
|
|
* ssh(1): Close ControlPersist background process stderr except
|
|
in debug mode or when logging to syslog. bz#1988
|
|
* misc: Make PROTOCOL description for
|
|
direct-streamlocal@openssh.com channel open messages match
|
|
deployed code. bz#2529
|
|
* ssh(1): Deduplicate LocalForward and RemoteForward entries to
|
|
fix failures when both ExitOnForwardFailure and hostname
|
|
canonicalisation are enabled. bz#2562
|
|
* sshd(8): Remove fallback from moduli to obsolete "primes"
|
|
file that was deprecated in 2001. bz#2559.
|
|
* sshd_config(5): Correct description of UseDNS: it affects ssh
|
|
hostname processing for authorized_keys, not known_hosts;
|
|
bz#2554
|
|
* ssh(1): Fix authentication using lone certificate keys in an
|
|
agent without corresponding private keys on the filesystem.
|
|
bz#2550
|
|
* sshd(8): Send ClientAliveInterval pings when a time-based
|
|
RekeyLimit is set; previously keepalive packets were not
|
|
being sent. bz#2252
|
|
---- Portability
|
|
* ssh(1), sshd(8): Fix compilation by automatically disabling
|
|
ciphers not supported by OpenSSL. bz#2466
|
|
* misc: Fix compilation failures on some versions of AIX's
|
|
compiler related to the definition of the VA_COPY macro.
|
|
bz#2589
|
|
* sshd(8): Whitelist more architectures to enable the
|
|
seccomp-bpf sandbox. bz#2590
|
|
* ssh-agent(1), sftp-server(8): Disable process tracing on
|
|
Solaris using setpflags(__PROC_PROTECT, ...). bz#2584
|
|
* sshd(8): On Solaris, don't call Solaris setproject() with
|
|
UsePAM=yes it's PAM's responsibility. bz#2425
|
|
- OpenSSH 7.4
|
|
---- Potentially-incompatible changes
|
|
* ssh(1): Remove 3des-cbc from the client's default proposal.
|
|
64-bit block ciphers are not safe in 2016 and we don't want
|
|
to wait until attacks like SWEET32 are extended to SSH. As
|
|
3des-cbc was the only mandatory cipher in the SSH RFCs, this
|
|
may cause problems connecting to older devices using the
|
|
default configuration, but it's highly likely that such
|
|
devices already need explicit configuration for key exchange
|
|
and hostkey algorithms already anyway.
|
|
* sshd(8): Remove support for pre-authentication compression.
|
|
Doing compression early in the protocol probably seemed
|
|
reasonable in the 1990s, but today it's clearly a bad idea in
|
|
terms of both cryptography (cf. multiple compression oracle
|
|
attacks in TLS) and attack surface. Pre-auth compression
|
|
support has been disabled by default for >10 years. Support
|
|
remains in the client.
|
|
* ssh-agent will refuse to load PKCS#11 modules outside a
|
|
whitelist of trusted paths by default. The path whitelist may
|
|
be specified at run-time.
|
|
* sshd(8): When a forced-command appears in both a certificate
|
|
and an authorized keys/principals command= restriction, sshd
|
|
will now refuse to accept the certificate unless they are
|
|
identical. The previous (documented) behaviour of having the
|
|
certificate forced-command override the other could be a bit
|
|
confusing and error-prone.
|
|
* sshd(8): Remove the UseLogin configuration directive and
|
|
support for having /bin/login manage login sessions.
|
|
---- Security
|
|
* ssh-agent(1): Will now refuse to load PKCS#11 modules from
|
|
paths outside a trusted whitelist (run-time configurable).
|
|
Requests to load modules could be passed via agent forwarding
|
|
and an attacker could attempt to load a hostile PKCS#11
|
|
module across the forwarded agent channel: PKCS#11 modules
|
|
are shared libraries, so this would result in code execution
|
|
on the system running the ssh-agent if the attacker has
|
|
control of the forwarded agent-socket (on the host running
|
|
the sshd server) and the ability to write to the filesystem
|
|
of the host running ssh-agent (usually the host running the
|
|
ssh client). Reported by Jann Horn of Project Zero.
|
|
* sshd(8): When privilege separation is disabled, forwarded
|
|
Unix- domain sockets would be created by sshd(8) with the
|
|
privileges of 'root' instead of the authenticated user. This
|
|
release refuses Unix-domain socket forwarding when privilege
|
|
separation is disabled (Privilege separation has been enabled
|
|
by default for 14 years). Reported by Jann Horn of Project
|
|
Zero.
|
|
* sshd(8): Avoid theoretical leak of host private key material
|
|
to privilege-separated child processes via realloc() when
|
|
reading keys. No such leak was observed in practice for
|
|
normal-sized keys, nor does a leak to the child processes
|
|
directly expose key material to unprivileged users. Reported
|
|
by Jann Horn of Project Zero.
|
|
* sshd(8): The shared memory manager used by pre-authentication
|
|
compression support had a bounds checks that could be elided
|
|
by some optimising compilers. Additionally, this memory
|
|
manager was incorrectly accessible when pre-authentication
|
|
compression was disabled. This could potentially allow
|
|
attacks against the privileged monitor process from the
|
|
sandboxed privilege-separation process (a compromise of the
|
|
latter would be required first). This release removes
|
|
support for pre-authentication compression from sshd(8).
|
|
Reported by Guido Vranken using the Stack unstable
|
|
optimisation identification tool
|
|
(http://css.csail.mit.edu/stack/)
|
|
* sshd(8): Fix denial-of-service condition where an attacker
|
|
who sends multiple KEXINIT messages may consume up to 128MB
|
|
per connection. Reported by Shi Lei of Gear Team, Qihoo 360.
|
|
* sshd(8): Validate address ranges for AllowUser and DenyUsers
|
|
directives at configuration load time and refuse to accept
|
|
invalid ones. It was previously possible to specify invalid
|
|
CIDR address ranges (e.g. user@127.1.2.3/55) and these would
|
|
always match, possibly resulting in granting access where it
|
|
was not intended. Reported by Laurence Parry.
|
|
---- New Features
|
|
* ssh(1): Add a proxy multiplexing mode to ssh(1) inspired by
|
|
the version in PuTTY by Simon Tatham. This allows a
|
|
multiplexing client to communicate with the master process
|
|
using a subset of the SSH packet and channels protocol over a
|
|
Unix-domain socket, with the main process acting as a proxy
|
|
that translates channel IDs, etc. This allows multiplexing
|
|
mode to run on systems that lack file- descriptor passing
|
|
(used by current multiplexing code) and potentially, in
|
|
conjunction with Unix-domain socket forwarding, with the
|
|
client and multiplexing master process on different machines.
|
|
Multiplexing proxy mode may be invoked using "ssh -O proxy
|
|
..."
|
|
* sshd(8): Add a sshd_config DisableForwarding option that
|
|
disables X11, agent, TCP, tunnel and Unix domain socket
|
|
forwarding, as well as anything else we might implement in
|
|
the future. Like the 'restrict' authorized_keys flag, this is
|
|
intended to be a simple and future-proof way of restricting
|
|
an account.
|
|
* sshd(8), ssh(1): Support the "curve25519-sha256" key exchange
|
|
method. This is identical to the currently-supported method
|
|
named "curve25519-sha256@libssh.org".
|
|
* sshd(8): Improve handling of SIGHUP by checking to see if
|
|
sshd is already daemonised at startup and skipping the call
|
|
to daemon(3) if it is. This ensures that a SIGHUP restart of
|
|
sshd(8) will retain the same process-ID as the initial
|
|
execution. sshd(8) will also now unlink the PidFile prior to
|
|
SIGHUP restart and re-create it after a successful restart,
|
|
rather than leaving a stale file in the case of a
|
|
configuration error. bz#2641
|
|
* sshd(8): Allow ClientAliveInterval and ClientAliveCountMax
|
|
directives to appear in sshd_config Match blocks.
|
|
* sshd(8): Add %-escapes to AuthorizedPrincipalsCommand to
|
|
match those supported by AuthorizedKeysCommand (key, key
|
|
type, fingerprint, etc.) and a few more to provide access to
|
|
the contents of the certificate being offered.
|
|
* Added regression tests for string matching, address matching
|
|
and string sanitisation functions.
|
|
* Improved the key exchange fuzzer harness.
|
|
---- Bugfixes
|
|
* ssh(1): Allow IdentityFile to successfully load and use
|
|
certificates that have no corresponding bare public key.
|
|
bz#2617 certificate id_rsa-cert.pub (and no id_rsa.pub).
|
|
* ssh(1): Fix public key authentication when multiple
|
|
authentication is in use and publickey is not just the first
|
|
method attempted. bz#2642
|
|
* regress: Allow the PuTTY interop tests to run unattended.
|
|
bz#2639
|
|
* ssh-agent(1), ssh(1): improve reporting when attempting to
|
|
load keys from PKCS#11 tokens with fewer useless log messages
|
|
and more detail in debug messages. bz#2610
|
|
* ssh(1): When tearing down ControlMaster connections, don't
|
|
pollute stderr when LogLevel=quiet.
|
|
* sftp(1): On ^Z wait for underlying ssh(1) to suspend before
|
|
suspending sftp(1) to ensure that ssh(1) restores the
|
|
terminal mode correctly if suspended during a password
|
|
prompt.
|
|
* ssh(1): Avoid busy-wait when ssh(1) is suspended during a
|
|
password prompt.
|
|
* ssh(1), sshd(8): Correctly report errors during sending of
|
|
ext- info messages.
|
|
* sshd(8): fix NULL-deref crash if sshd(8) received an out-of-
|
|
sequence NEWKEYS message.
|
|
* sshd(8): Correct list of supported signature algorithms sent
|
|
in the server-sig-algs extension. bz#2547
|
|
* sshd(8): Fix sending ext_info message if privsep is disabled.
|
|
* sshd(8): more strictly enforce the expected ordering of
|
|
privilege separation monitor calls used for authentication
|
|
and allow them only when their respective authentication
|
|
methods are enabled in the configuration
|
|
* sshd(8): Fix uninitialised optlen in getsockopt() call;
|
|
harmless on Unix/BSD but potentially crashy on Cygwin.
|
|
* Fix false positive reports caused by explicit_bzero(3) not
|
|
being recognised as a memory initialiser when compiled with
|
|
-fsanitize-memory.
|
|
* sshd_config(5): Use 2001:db8::/32, the official IPv6 subnet
|
|
for configuration examples.
|
|
---- Portability
|
|
* On environments configured with Turkish locales, fall back to
|
|
the C/POSIX locale to avoid errors in configuration parsing
|
|
caused by that locale's unique handling of the letters 'i'
|
|
and 'I'. bz#2643
|
|
* sftp-server(8), ssh-agent(1): Deny ptrace on OS X using
|
|
ptrace(PT_DENY_ATTACH, ..)
|
|
* ssh(1), sshd(8): Unbreak AES-CTR ciphers on old (~0.9.8)
|
|
OpenSSL.
|
|
* Fix compilation for libcrypto compiled without RIPEMD160
|
|
support.
|
|
* contrib: Add a gnome-ssh-askpass3 with GTK+3 support. bz#2640
|
|
* sshd(8): Improve PRNG reseeding across privilege separation
|
|
and force libcrypto to obtain a high-quality seed before
|
|
chroot or sandboxing.
|
|
* All: Explicitly test for broken strnvis. NetBSD added an
|
|
strnvis and unfortunately made it incompatible with the
|
|
existing one in OpenBSD and Linux's libbsd (the former having
|
|
existed for over ten years). Try to detect this mess, and
|
|
assume the only safe option if we're cross compiling.
|
|
- OpenSSH 7.5
|
|
---- Potentially-incompatible changes
|
|
* This release deprecates the sshd_config
|
|
UsePrivilegeSeparation option, thereby making privilege
|
|
separation mandatory. Privilege separation has been on by
|
|
default for almost 15 years and sandboxing has been on by
|
|
default for almost the last five.
|
|
* The format of several log messages emitted by the packet code
|
|
has changed to include additional information about the user
|
|
and their authentication state. Software that monitors
|
|
ssh/sshd logs may need to account for these changes. For
|
|
example:
|
|
Connection closed by user x 1.1.1.1 port 1234 [preauth]
|
|
Connection closed by authenticating user x 10.1.1.1 port 1234
|
|
[preauth] Connection closed by invalid user x 1.1.1.1 port
|
|
1234 [preauth]
|
|
Affected messages include connection closure, timeout, remote
|
|
disconnection, negotiation failure and some other fatal
|
|
messages generated by the packet code.
|
|
* [Portable OpenSSH only] This version removes support for
|
|
building against OpenSSL versions prior to 1.0.1. OpenSSL
|
|
stopped supporting versions prior to 1.0.1 over 12 months ago
|
|
(i.e. they no longer receive fixes for security bugs).
|
|
---- Security
|
|
* ssh(1), sshd(8): Fix weakness in CBC padding oracle
|
|
countermeasures that allowed a variant of the attack fixed in
|
|
OpenSSH 7.3 to proceed. Note that the OpenSSH client
|
|
disables CBC ciphers by default, sshd offers them as
|
|
lowest-preference options and will remove them by default
|
|
entriely in the next release. Reported by Jean Paul
|
|
Degabriele, Kenny Paterson, Martin Albrecht and Torben Hansen
|
|
of Royal Holloway, University of London.
|
|
* sftp-client(1): [portable OpenSSH only] On Cygwin, a client
|
|
making a recursive file transfer could be maniuplated by a
|
|
hostile server to perform a path-traversal attack. creating
|
|
or modifying files outside of the intended target directory.
|
|
Reported by Jann Horn of Google Project Zero.
|
|
---- New Features
|
|
* ssh(1), sshd(8): Support "=-" syntax to easily remove methods
|
|
from algorithm lists, e.g. Ciphers=-*cbc. bz#2671
|
|
---- Bugfixes
|
|
* sshd(1): Fix NULL dereference crash when key exchange start
|
|
messages are sent out of sequence.
|
|
* ssh(1), sshd(8): Allow form-feed characters to appear in
|
|
configuration files.
|
|
* sshd(8): Fix regression in OpenSSH 7.4 support for the
|
|
server-sig-algs extension, where SHA2 RSA signature methods
|
|
were not being correctly advertised. bz#2680
|
|
* ssh(1), ssh-keygen(1): Fix a number of case-sensitivity bugs
|
|
in known_hosts processing. bz#2591 bz#2685
|
|
* ssh(1): Allow ssh to use certificates accompanied by a
|
|
private key file but no corresponding plain *.pub public key.
|
|
bz#2617
|
|
* ssh(1): When updating hostkeys using the UpdateHostKeys
|
|
option, accept RSA keys if HostkeyAlgorithms contains any RSA
|
|
keytype. Previously, ssh could ignore RSA keys when only the
|
|
ssh-rsa-sha2-* methods were enabled in HostkeyAlgorithms and
|
|
not the old ssh-rsa method. bz#2650
|
|
* ssh(1): Detect and report excessively long configuration file
|
|
lines. bz#2651
|
|
* Merge a number of fixes found by Coverity and reported via
|
|
Redhat and FreeBSD. Includes fixes for some memory and file
|
|
descriptor leaks in error paths. bz#2687
|
|
* ssh-keyscan(1): Correctly hash hosts with a port number.
|
|
bz#2692
|
|
* ssh(1), sshd(8): When logging long messages to stderr, don't
|
|
truncate "\r\n" if the length of the message exceeds the
|
|
buffer. bz#2688
|
|
* ssh(1): Fully quote [host]:port in generated ProxyJump/-J
|
|
command- line; avoid confusion over IPv6 addresses and shells
|
|
that treat square bracket characters specially.
|
|
* ssh-keygen(1): Fix corruption of known_hosts when running
|
|
"ssh-keygen -H" on a known_hosts containing already-hashed
|
|
entries.
|
|
* Fix various fallout and sharp edges caused by removing SSH
|
|
protocol 1 support from the server, including the server
|
|
banner string being incorrectly terminated with only \n
|
|
(instead of \r\n), confusing error messages from ssh-keyscan
|
|
bz#2583 and a segfault in sshd if protocol v.1 was enabled
|
|
for the client and sshd_config contained references to legacy
|
|
keys bz#2686.
|
|
* ssh(1), sshd(8): Free fd_set on connection timeout. bz#2683
|
|
* sshd(8): Fix Unix domain socket forwarding for root
|
|
(regression in OpenSSH 7.4).
|
|
* sftp(1): Fix division by zero crash in "df" output when
|
|
server returns zero total filesystem blocks/inodes.
|
|
* ssh(1), ssh-add(1), ssh-keygen(1), sshd(8): Translate OpenSSL
|
|
errors encountered during key loading to more meaningful
|
|
error codes. bz#2522 bz#2523
|
|
* ssh-keygen(1): Sanitise escape sequences in key comments sent
|
|
to printf but preserve valid UTF-8 when the locale supports
|
|
it; bz#2520
|
|
* ssh(1), sshd(8): Return reason for port forwarding failures
|
|
where feasible rather than always "administratively
|
|
prohibited". bz#2674
|
|
* sshd(8): Fix deadlock when AuthorizedKeysCommand or
|
|
AuthorizedPrincipalsCommand produces a lot of output and a
|
|
key is matched early. bz#2655
|
|
* Regression tests: several reliability fixes. bz#2654 bz#2658
|
|
bz#2659
|
|
* ssh(1): Fix typo in ~C error message for bad port forward
|
|
cancellation. bz#2672
|
|
* ssh(1): Show a useful error message when included config
|
|
files can't be opened; bz#2653
|
|
* sshd(8): Make sshd set GSSAPIStrictAcceptorCheck=yes as the
|
|
manual page (previously incorrectly) advertised. bz#2637
|
|
* sshd_config(5): Repair accidentally-deleted mention of %k
|
|
token in AuthorizedKeysCommand; bz#2656
|
|
* sshd(8): Remove vestiges of previously removed LOGIN_PROGRAM;
|
|
bz#2665
|
|
* ssh-agent(1): Relax PKCS#11 whitelist to include libexec and
|
|
common 32-bit compatibility library directories.
|
|
* sftp-client(1): Fix non-exploitable integer overflow in
|
|
SSH2_FXP_NAME response handling.
|
|
* ssh-agent(1): Fix regression in 7.4 of deleting
|
|
PKCS#11-hosted keys. It was not possible to delete them
|
|
except by specifying their full physical path. bz#2682
|
|
---- Portability
|
|
* sshd(8): Avoid sandbox errors for Linux S390 systems using an
|
|
ICA crypto coprocessor.
|
|
* sshd(8): Fix non-exploitable weakness in seccomp-bpf sandbox
|
|
arg inspection.
|
|
* ssh(1): Fix X11 forwarding on OSX where X11 was being started
|
|
by launchd. bz#2341
|
|
* ssh-keygen(1), ssh(1), sftp(1): Fix output truncation for
|
|
various that contain non-printable characters where the
|
|
codeset in use is ASCII.
|
|
* build: Fix builds that attempt to link a kerberised libldns.
|
|
bz#2603
|
|
* build: Fix compilation problems caused by unconditionally
|
|
defining _XOPEN_SOURCE in wide character detection.
|
|
* sshd(8): Fix sandbox violations for clock_gettime VSDO
|
|
syscall fallback on some Linux/X32 kernels. bz#2142
|
|
- OpenSSH 7.6
|
|
---- Potentially-incompatible changes
|
|
This release includes a number of changes that may affect
|
|
existing configurations:
|
|
* ssh(1): delete SSH protocol version 1 support, associated
|
|
configuration options and documentation.
|
|
* ssh(1)/sshd(8): remove support for the hmac-ripemd160 MAC.
|
|
* ssh(1)/sshd(8): remove support for the arcfour, blowfish and
|
|
CAST ciphers.
|
|
* Refuse RSA keys <1024 bits in length and improve reporting
|
|
for keys that do not meet this requirement.
|
|
* ssh(1): do not offer CBC ciphers by default.
|
|
---- Security
|
|
* sftp-server(8): in read-only mode, sftp-server was
|
|
incorrectly permitting creation of zero-length files.
|
|
Reported by Michal Zalewski.
|
|
---- New Features
|
|
* ssh(1): add RemoteCommand option to specify a command in the
|
|
ssh config file instead of giving it on the client's command
|
|
line. This allows the configuration file to specify the
|
|
command that will be executed on the remote host.
|
|
* sshd(8): add ExposeAuthInfo option that enables writing
|
|
details of the authentication methods used (including public
|
|
keys where applicable) to a file that is exposed via a
|
|
$SSH_USER_AUTH environment variable in the subsequent
|
|
session.
|
|
* ssh(1): add support for reverse dynamic forwarding. In this
|
|
mode, ssh will act as a SOCKS4/5 proxy and forward
|
|
connections to destinations requested by the remote SOCKS
|
|
client. This mode is requested using extended syntax for the
|
|
-R and RemoteForward options and, because it is implemented
|
|
solely at the client, does not require the server be updated
|
|
to be supported.
|
|
* sshd(8): allow LogLevel directive in sshd_config Match
|
|
blocks; bz#2717
|
|
* ssh-keygen(1): allow inclusion of arbitrary string or flag
|
|
certificate extensions and critical options.
|
|
* ssh-keygen(1): allow ssh-keygen to use a key held in
|
|
ssh-agent as a CA when signing certificates. bz#2377
|
|
* ssh(1)/sshd(8): allow IPQoS=none in ssh/sshd to not set an
|
|
explicit ToS/DSCP value and just use the operating system
|
|
default.
|
|
* ssh-add(1): added -q option to make ssh-add quiet on success.
|
|
* ssh(1): expand the StrictHostKeyChecking option with two new
|
|
settings. The first "accept-new" will automatically accept
|
|
hitherto-unseen keys but will refuse connections for changed
|
|
or invalid hostkeys. This is a safer subset of the current
|
|
behaviour of StrictHostKeyChecking=no. The second setting
|
|
"off", is a synonym for the current behaviour of
|
|
StrictHostKeyChecking=no: accept new host keys, and continue
|
|
connection for hosts with incorrect hostkeys. A future
|
|
release will change the meaning of StrictHostKeyChecking=no
|
|
to the behaviour of "accept-new". bz#2400
|
|
* ssh(1): add SyslogFacility option to ssh(1) matching the
|
|
equivalent option in sshd(8). bz#2705
|
|
---- Bugfixes
|
|
* ssh(1): use HostKeyAlias if specified instead of hostname for
|
|
matching host certificate principal names; bz#2728
|
|
* sftp(1): implement sorting for globbed ls; bz#2649
|
|
* ssh(1): add a user@host prefix to client's "Permission
|
|
denied" messages, useful in particular when using "stacked"
|
|
connections (e.g. ssh -J) where it's not clear which host is
|
|
denying. bz#2720
|
|
* ssh(1): accept unknown EXT_INFO extension values that contain
|
|
\0 characters. These are legal, but would previously cause
|
|
fatal connection errors if received.
|
|
* ssh(1)/sshd(8): repair compression statistics printed at
|
|
connection exit
|
|
* sftp(1): print '?' instead of incorrect link count (that the
|
|
protocol doesn't provide) for remote listings. bz#2710
|
|
* ssh(1): return failure rather than fatal() for more cases
|
|
during session multiplexing negotiations. Causes the session
|
|
to fall back to a non-mux connection if they occur. bz#2707
|
|
* ssh(1): mention that the server may send debug messages to
|
|
explain public key authentication problems under some
|
|
circumstances; bz#2709
|
|
* Translate OpenSSL error codes to better report incorrect
|
|
passphrase errors when loading private keys; bz#2699
|
|
* sshd(8): adjust compatibility patterns for WinSCP to
|
|
correctly identify versions that implement only the legacy DH
|
|
group exchange scheme. bz#2748
|
|
* ssh(1): print the "Killed by signal 1" message only at
|
|
LogLevel verbose so that it is not shown at the default
|
|
level; prevents it from appearing during ssh -J and
|
|
equivalent ProxyCommand configs. bz#1906, bz#2744
|
|
* ssh-keygen(1): when generating all hostkeys (ssh-keygen -A),
|
|
clobber existing keys if they exist but are zero length.
|
|
zero-length keys could previously be made if ssh-keygen
|
|
failed or was interrupted part way through generating them.
|
|
bz#2561
|
|
* ssh(1): fix pledge(2) violation in the escape sequence "~&"
|
|
used to place the current session in the background.
|
|
* ssh-keyscan(1): avoid double-close() on file descriptors;
|
|
bz#2734
|
|
* sshd(8): avoid reliance on shared use of pointers shared
|
|
between monitor and child sshd processes. bz#2704
|
|
* sshd_config(8): document available AuthenticationMethods;
|
|
bz#2453
|
|
* ssh(1): avoid truncation in some login prompts; bz#2768
|
|
* sshd(8): Fix various compilations failures, inc bz#2767
|
|
* ssh(1): make "--" before the hostname terminate argument
|
|
processing after the hostname too.
|
|
* ssh-keygen(1): switch from aes256-cbc to aes256-ctr for
|
|
encrypting new-style private keys. Fixes problems related to
|
|
private key handling for no-OpenSSL builds. bz#2754
|
|
* ssh(1): warn and do not attempt to use keys when the public
|
|
and private halves do not match. bz#2737
|
|
* sftp(1): don't print verbose error message when ssh
|
|
disconnects from under sftp. bz#2750
|
|
* sshd(8): fix keepalive scheduling problem: activity on a
|
|
forwarded port from preventing the keepalive from being sent;
|
|
bz#2756
|
|
* sshd(8): when started without root privileges, don't require
|
|
the privilege separation user or path to exist. Makes running
|
|
the regression tests easier without touching the filesystem.
|
|
* Make integrity.sh regression tests more robust against
|
|
timeouts. bz#2658
|
|
* ssh(1)/sshd(8): correctness fix for channels implementation:
|
|
accept channel IDs greater than 0x7FFFFFFF.
|
|
---- Portability
|
|
* sshd(9): drop two more privileges in the Solaris sandbox:
|
|
PRIV_DAX_ACCESS and PRIV_SYS_IB_INFO; bz#2723
|
|
* sshd(8): expose list of completed authentication methods to
|
|
PAM via the SSH_AUTH_INFO_0 PAM environment variable. bz#2408
|
|
* ssh(1)/sshd(8): fix several problems in the tun/tap
|
|
forwarding code, mostly to do with host/network byte order
|
|
confusion. bz#2735
|
|
* Add --with-cflags-after and --with-ldflags-after configure
|
|
flags to allow setting CFLAGS/LDFLAGS after configure has
|
|
completed. These are useful for setting sanitiser/fuzzing
|
|
options that may interfere with configure's operation.
|
|
* sshd(8): avoid Linux seccomp violations on ppc64le over the
|
|
socketcall syscall.
|
|
* Fix use of ldns when using ldns-config; bz#2697
|
|
* configure: set cache variables when cross-compiling. The
|
|
cross- compiling fallback message was saying it assumed the
|
|
test passed, but it wasn't actually set the cache variables
|
|
and this would cause later tests to fail.
|
|
* Add clang libFuzzer harnesses for public key parsing and
|
|
signature verification.
|
|
- packaging:
|
|
* moving patches into a separate archive
|
|
* first round of rebased patches:
|
|
[-X11_trusted_forwarding]
|
|
[-allow_root_password_login]
|
|
[-blocksigalrm]
|
|
[-cavstest-ctr]
|
|
[-cavstest-kdf]
|
|
[-disable_short_DH_parameters]
|
|
[-eal3]
|
|
[-enable_PAM_by_default]
|
|
[-fips]
|
|
[-fips_checks]
|
|
[-gssapi_key_exchange]
|
|
[-hostname_changes_when_forwarding_X]
|
|
[-lastlog]
|
|
[-missing_headers]
|
|
[-pam_check_locks]
|
|
[-pts_names_formatting]
|
|
[-remove_xauth_cookies_on_exit]
|
|
[-seccomp_geteuid]
|
|
[-seccomp_getuid]
|
|
[-seccomp_stat]
|
|
[-seed-prng]
|
|
[-send_locale]
|
|
[-systemd-notify]
|
|
* not rebased (obsoleted) patches (so far):
|
|
[-additional_seccomp_archs]
|
|
[-allow_DSS_by_default]
|
|
[-default_protocol]
|
|
[-dont_use_pthreads_in_PAM]
|
|
[-eal3_obsolete]
|
|
[-gssapimitm]
|
|
[-saveargv-fix]
|
|
* obviously removing all standalone patch files:
|
|
[openssh-7.2p2-allow_root_password_login.patch]
|
|
[openssh-7.2p2-allow_DSS_by_default.patch]
|
|
[openssh-7.2p2-X11_trusted_forwarding.patch]
|
|
[openssh-7.2p2-lastlog.patch]
|
|
[openssh-7.2p2-enable_PAM_by_default.patch]
|
|
[openssh-7.2p2-dont_use_pthreads_in_PAM.patch]
|
|
[openssh-7.2p2-eal3.patch]
|
|
[openssh-7.2p2-blocksigalrm.patch]
|
|
[openssh-7.2p2-send_locale.patch]
|
|
[openssh-7.2p2-hostname_changes_when_forwarding_X.patch]
|
|
[openssh-7.2p2-remove_xauth_cookies_on_exit.patch]
|
|
[openssh-7.2p2-pts_names_formatting.patch]
|
|
[openssh-7.2p2-pam_check_locks.patch]
|
|
[openssh-7.2p2-disable_short_DH_parameters.patch]
|
|
[openssh-7.2p2-seccomp_getuid.patch]
|
|
[openssh-7.2p2-seccomp_geteuid.patch]
|
|
[openssh-7.2p2-seccomp_stat.patch]
|
|
[openssh-7.2p2-additional_seccomp_archs.patch]
|
|
[openssh-7.2p2-fips.patch]
|
|
[openssh-7.2p2-cavstest-ctr.patch]
|
|
[openssh-7.2p2-cavstest-kdf.patch]
|
|
[openssh-7.2p2-seed-prng.patch]
|
|
[openssh-7.2p2-gssapi_key_exchange.patch]
|
|
[openssh-7.2p2-audit.patch]
|
|
[openssh-7.2p2-audit_fixes.patch]
|
|
[openssh-7.2p2-audit_seed_prng.patch]
|
|
[openssh-7.2p2-login_options.patch]
|
|
[openssh-7.2p2-disable_openssl_abi_check.patch]
|
|
[openssh-7.2p2-no_fork-no_pid_file.patch]
|
|
[openssh-7.2p2-host_ident.patch]
|
|
[openssh-7.2p2-sftp_homechroot.patch]
|
|
[openssh-7.2p2-sftp_force_permissions.patch]
|
|
[openssh-7.2p2-X_forward_with_disabled_ipv6.patch]
|
|
[openssh-7.2p2-ldap.patch]
|
|
[openssh-7.2p2-IPv6_X_forwarding.patch]
|
|
[openssh-7.2p2-ignore_PAM_with_UseLogin.patch]
|
|
[openssh-7.2p2-prevent_timing_user_enumeration.patch]
|
|
[openssh-7.2p2-limit_password_length.patch]
|
|
[openssh-7.2p2-keep_slogin.patch]
|
|
[openssh-7.2p2-kex_resource_depletion.patch]
|
|
[openssh-7.2p2-verify_CIDR_address_ranges.patch]
|
|
[openssh-7.2p2-restrict_pkcs11-modules.patch]
|
|
[openssh-7.2p2-prevent_private_key_leakage.patch]
|
|
[openssh-7.2p2-secure_unix_sockets_forwarding.patch]
|
|
[openssh-7.2p2-ssh_case_insensitive_host_matching.patch]
|
|
[openssh-7.2p2-disable_preauth_compression.patch]
|
|
[openssh-7.2p2-s390_hw_crypto_syscalls.patch]
|
|
[openssh-7.2p2-s390_OpenSSL-ibmpkcs11_syscalls.patch]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Nov 23 13:38:52 UTC 2017 - rbrown@suse.com
|
|
|
|
- Replace references to /var/adm/fillup-templates with new
|
|
%_fillupdir macro (boo#1069468)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Oct 25 15:09:06 UTC 2017 - jsegitz@suse.com
|
|
|
|
- sshd_config is has now permissions 0600 in secure mode
|
|
|
|
-------------------------------------------------------------------
|
|
Mon May 15 20:47:29 UTC 2017 - pcerny@suse.com
|
|
|
|
- Fix preauth seccomp separation on mainframes (bsc#1016709)
|
|
[openssh-7.2p2-s390_hw_crypto_syscalls.patch]
|
|
[openssh-7.2p2-s390_OpenSSL-ibmpkcs11_syscalls.patch]
|
|
- enable case-insensitive hostname matching (bsc#1017099)
|
|
[openssh-7.2p2-ssh_case_insensitive_host_matching.patch]
|
|
- add CAVS tests
|
|
[openssh-7.2p2-cavstest-ctr.patch]
|
|
[openssh-7.2p2-cavstest-kdf.patch]
|
|
- Adding missing pieces for user matching (bsc#1021626)
|
|
- Properly verify CIDR masks in configuration
|
|
(bsc#1005893)
|
|
[openssh-7.2p2-verify_CIDR_address_ranges.patch]
|
|
- Remove pre-auth compression support from the server to prevent
|
|
possible cryptographic attacks.
|
|
(CVE-2016-10012, bsc#1016370)
|
|
[openssh-7.2p2-disable_preauth_compression.patch]
|
|
- limit directories for loading PKCS11 modules
|
|
(CVE-2016-10009, bsc#1016366)
|
|
[openssh-7.2p2-restrict_pkcs11-modules.patch]
|
|
- Prevent possible leaks of host private keys to low-privilege
|
|
process handling authentication
|
|
(CVE-2016-10011, bsc#1016369)
|
|
[openssh-7.2p2-prevent_private_key_leakage.patch]
|
|
- Do not allow unix socket forwarding when running without
|
|
privilege separation
|
|
(CVE-2016-10010, bsc#1016368)
|
|
[openssh-7.2p2-secure_unix_sockets_forwarding.patch]
|
|
- prevent resource depletion during key exchange
|
|
(bsc#1005480, CVE-2016-8858)
|
|
[openssh-7.2p2-kex_resource_depletion.patch]
|
|
- fix suggested command for removing conflicting server keys from
|
|
the known_hosts file (bsc#1006221)
|
|
- enable geteuid{,32} syscalls on mainframes, since it may be
|
|
called from libica/ibmica on machines with hardware crypto
|
|
accelerator (bsc#1004258)
|
|
[openssh-7.2p2-seccomp_geteuid.patch]
|
|
- fix regression of (bsc#823710)
|
|
[openssh-7.2p2-audit_fixes.patch]
|
|
- add slogin (removed upstreams)
|
|
[openssh-7.2p2-keep_slogin.patch]
|
|
- require OpenSSL < 1.1 where that one is a default
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Feb 22 19:31:08 UTC 2017 - crrodriguez@opensuse.org
|
|
|
|
- sshd.service: Set TasksMax=infinity, as there should be
|
|
no limit on the amount of tasks sshd can run.
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Sep 29 23:27:49 UTC 2016 - pcerny@suse.com
|
|
|
|
- remaining patches that were still missing
|
|
since the update to 7.2p2 (FATE#319675):
|
|
- allow X forwarding over IPv4 when IPv6 sockets is not available
|
|
[openssh-7.2p2-X_forward_with_disabled_ipv6.patch]
|
|
- do not write PID file when not daemonizing
|
|
[openssh-7.2p2-no_fork-no_pid_file.patch]
|
|
- use correct options when invoking login
|
|
[openssh-7.2p2-login_options.patch]
|
|
- helper application for retrieving users' public keys from
|
|
an LDAP server
|
|
[openssh-7.2p2-ldap.patch]
|
|
- allow forcing permissions over sftp
|
|
[openssh-7.2p2-sftp_force_permissions.patch]
|
|
- do not perform run-time checks for OpenSSL API/ABI change
|
|
[openssh-7.2p2-disable_openssl_abi_check.patch]
|
|
- suggest commands for cleaning known hosts file
|
|
[openssh-7.2p2-host_ident.patch]
|
|
- sftp home chroot patch
|
|
[openssh-7.2p2-sftp_homechroot.patch]
|
|
- ssh sessions auditing
|
|
[openssh-7.2p2-audit.patch]
|
|
- enable seccomp sandbox on additional architectures
|
|
[openssh-7.2p2-additional_seccomp_archs.patch]
|
|
- fix forwarding with IPv6 addresses in DISPLAY (bnc#847710)
|
|
[openssh-7.2p2-IPv6_X_forwarding.patch]
|
|
- ignore PAM environment when using login
|
|
(bsc#975865, CVE-2015-8325)
|
|
[openssh-7.2p2-ignore_PAM_with_UseLogin.patch]
|
|
- limit accepted password length (prevents possible DoS)
|
|
(bsc#992533, CVE-2016-6515)
|
|
[openssh-7.2p2-limit_password_length.patch]
|
|
- Prevent user enumeration through the timing of password
|
|
processing (bsc#989363, CVE-2016-6210)
|
|
[openssh-7.2p2-prevent_timing_user_enumeration.patch]
|
|
- Add auditing for PRNG re-seeding
|
|
[openssh-7.2p2-audit_seed_prng.patch]
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Sep 16 12:45:11 UTC 2016 - pcerny@suse.com
|
|
|
|
- FIPS compatibility (no selfchecks, only crypto restrictions)
|
|
[openssh-7.2p2-fips.patch]
|
|
- PRNG re-seeding
|
|
[openssh-7.2p2-seed-prng.patch]
|
|
- preliminary version of GSSAPI KEX
|
|
[openssh-7.2p2-gssapi_key_exchange.patch]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jul 25 13:46:06 UTC 2016 - meissner@suse.com
|
|
|
|
- added gpg signature
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jun 7 16:52:45 UTC 2016 - pcerny@suse.com
|
|
|
|
- enable support for SSHv1 protocol and discourage its usage
|
|
(bsc#983307)
|
|
- enable DSA by default for backward compatibility and discourage
|
|
its usage (bsc#983784)
|
|
[openssh-7.2p2-allow_DSS_by_default.patch]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon May 30 00:30:16 UTC 2016 - pcerny@suse.com
|
|
|
|
- enable trusted X11 forwarding by default
|
|
[openssh-7.2p2-X11_trusted_forwarding.patch]
|
|
- set UID for lastlog properly
|
|
[openssh-7.2p2-lastlog.patch]
|
|
- enable use of PAM by default
|
|
[openssh-7.2p2-enable_PAM_by_default.patch]
|
|
- copy command line arguments properly
|
|
[openssh-7.2p2-saveargv-fix.patch]
|
|
- do not use pthreads in PAM code
|
|
[openssh-7.2p2-dont_use_pthreads_in_PAM.patch]
|
|
- fix paths in documentation
|
|
[openssh-7.2p2-eal3.patch]
|
|
- prevent race consitions triggered by SIGALRM
|
|
[openssh-7.2p2-blocksigalrm.patch]
|
|
- do send and accept locale environment variables by default
|
|
[openssh-7.2p2-send_locale.patch]
|
|
- handle hostnames changes during X forwarding
|
|
[openssh-7.2p2-hostname_changes_when_forwarding_X.patch]
|
|
- try to remove xauth cookies on exit
|
|
[openssh-7.2p2-remove_xauth_cookies_on_exit.patch]
|
|
- properly format pts names for ?tmp? log files
|
|
[openssh-7.2p2-pts_names_formatting.patch]
|
|
- check locked accounts when using PAM
|
|
[openssh-7.2p2-pam_check_locks.patch]
|
|
- chenge default PermitRootLogin to 'yes' to prevent unwanted
|
|
surprises on updates from older versions.
|
|
See README.SUSE for details
|
|
[openssh-7.2p2-allow_root_password_login.patch]
|
|
- Disable DH parameters under 2048 bits by default and allow
|
|
lowering the limit back to the RFC 4419 specified minimum
|
|
through an option (bsc#932483, bsc#948902)
|
|
[openssh-7.2p2-disable_short_DH_parameters.patch]
|
|
- Add getuid() and stat() syscalls to the seccomp filter
|
|
(bsc#912436)
|
|
[openssh-7.2p2-seccomp_getuid.patch,
|
|
openssh-7.2p2-seccomp_stat.patch]
|
|
|
|
-------------------------------------------------------------------
|
|
Fri May 27 23:27:51 UTC 2016 - pcerny@suse.com
|
|
|
|
- upgrade to 7.2p2
|
|
upstream package without any SUSE patches
|
|
Distilled upstream log:
|
|
- OpenSSH 6.7
|
|
Potentially-incompatible changes:
|
|
* sshd(8): The default set of ciphers and MACs has been
|
|
altered to remove unsafe algorithms. In particular, CBC
|
|
ciphers and arcfour* are disabled by default.
|
|
The full set of algorithms remains available if configured
|
|
explicitly via the Ciphers and MACs sshd_config options.
|
|
* sshd(8): Support for tcpwrappers/libwrap has been removed.
|
|
* OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of
|
|
connections using the curve25519-sha256@libssh.org KEX
|
|
exchange method to fail when connecting with something that
|
|
implements the specification correctly. OpenSSH 6.7 disables
|
|
this KEX method when speaking to one of the affected
|
|
versions.
|
|
New Features:
|
|
* ssh(1), sshd(8): Add support for Unix domain socket
|
|
forwarding. A remote TCP port may be forwarded to a local
|
|
Unix domain socket and vice versa or both ends may be a Unix
|
|
domain socket.
|
|
* ssh(1), ssh-keygen(1): Add support for SSHFP DNS records for
|
|
ED25519 key types.
|
|
* sftp(1): Allow resumption of interrupted uploads.
|
|
* ssh(1): When rekeying, skip file/DNS lookups of the hostkey
|
|
if it is the same as the one sent during initial key exchange
|
|
* sshd(8): Allow explicit ::1 and 127.0.0.1 forwarding bind
|
|
addresses when GatewayPorts=no; allows client to choose
|
|
address family
|
|
* sshd(8): Add a sshd_config PermitUserRC option to control
|
|
whether ~/.ssh/rc is executed, mirroring the no-user-rc
|
|
authorized_keys option
|
|
* ssh(1): Add a %C escape sequence for LocalCommand and
|
|
ControlPath that expands to a unique identifer based on a
|
|
hash of the tuple of (local host, remote user, hostname,
|
|
port). Helps avoid exceeding miserly pathname limits for Unix
|
|
domain sockets in multiplexing control paths
|
|
* sshd(8): Make the "Too many authentication failures" message
|
|
include the user, source address, port and protocol in a
|
|
format similar to the authentication success / failure
|
|
messages
|
|
Bugfixes:
|
|
* sshd(8): Fix remote forwarding with the same listen port but
|
|
different listen address.
|
|
* ssh(1): Fix inverted test that caused PKCS#11 keys that were
|
|
explicitly listed in ssh_config or on the commandline not to
|
|
be preferred.
|
|
* ssh-keygen(1): Fix bug in KRL generation: multiple
|
|
consecutive revoked certificate serial number ranges could be
|
|
serialised to an invalid format. Readers of a broken KRL
|
|
caused by this bug will fail closed, so no
|
|
should-have-been-revoked key will be accepted.
|
|
* ssh(1): Reflect stdio-forward ("ssh -W host:port ...")
|
|
failures in exit status. Previously we were always returning 0
|
|
* ssh(1), ssh-keygen(1): Make Ed25519 keys' title fit properly
|
|
in the randomart border
|
|
* ssh-agent(1): Only cleanup agent socket in the main agent
|
|
process and not in any subprocesses it may have started (e.g.
|
|
forked askpass). Fixes agent sockets being zapped when
|
|
askpass processes fatal()
|
|
* ssh-add(1): Make stdout line-buffered; saves partial output
|
|
getting lost when ssh-add fatal()s part-way through (e.g.
|
|
when listing keys from an agent that supports key types that
|
|
ssh-add doesn't)
|
|
* ssh-keygen(1): When hashing or removing hosts, don't choke on
|
|
@revoked markers and don't remove @cert-authority markers
|
|
* ssh(1): Don't fatal when hostname canonicalisation fails and
|
|
a ProxyCommand is in use; continue and allow the ProxyCommand
|
|
to connect anyway (e.g. to a host with a name outside the DNS
|
|
behind a bastion)
|
|
* scp(1): When copying local->remote fails during read, don't
|
|
send uninitialised heap to the remote end.
|
|
* sftp(1): Fix fatal "el_insertstr failed" errors when
|
|
tab-completing filenames with a single quote char somewhere
|
|
in the string
|
|
* ssh-keyscan(1): Scan for Ed25519 keys by default.
|
|
* ssh(1): When using VerifyHostKeyDNS with a DNSSEC resolver,
|
|
down-convert any certificate keys to plain keys and attempt
|
|
SSHFP resolution. Prevents a server from skipping SSHFP
|
|
lookup and forcing a new-hostkey dialog by offering only
|
|
certificate keys.
|
|
- OpenSSH 6.8
|
|
Potentially-incompatible changes:
|
|
* sshd(8): UseDNS now defaults to 'no'. Configurations that
|
|
match against the client host name (via sshd_config or
|
|
authorized_keys) may need to re-enable it or convert to
|
|
matching against addresses.
|
|
New Features:
|
|
* Add FingerprintHash option to ssh(1) and sshd(8), and
|
|
equivalent command-line flags to the other tools to control
|
|
algorithm used for key fingerprints. The default changes from
|
|
MD5 to SHA256 and format from hex to base64.
|
|
Fingerprints now have the hash algorithm prepended. An
|
|
example of the new format:
|
|
SHA256:mVPwvezndPv/ARoIadVY98vAC0g+P/5633yTC4d/wXE Please
|
|
note that visual host keys will also be different.
|
|
* ssh(1), sshd(8): Experimental host key rotation support. Add
|
|
a protocol extension for a server to inform a client of all
|
|
its available host keys after authentication has completed.
|
|
The client may record the keys in known_hosts, allowing it to
|
|
upgrade to better host key algorithms and a server to
|
|
gracefully rotate its keys.
|
|
The client side of this is controlled by a UpdateHostkeys
|
|
config option (default off).
|
|
* ssh(1): Add a ssh_config HostbasedKeyType option to control
|
|
which host public key types are tried during host-based
|
|
authentication.
|
|
* ssh(1), sshd(8): fix connection-killing host key mismatch
|
|
errors when sshd offers multiple ECDSA keys of different
|
|
lengths.
|
|
* ssh(1): when host name canonicalisation is enabled, try to
|
|
parse host names as addresses before looking them up for
|
|
canonicalisation. fixes bz#2074 and avoiding needless DNS
|
|
lookups in some cases.
|
|
* ssh-keygen(1), sshd(8): Key Revocation Lists (KRLs) no longer
|
|
require OpenSSH to be compiled with OpenSSL support.
|
|
* ssh(1), ssh-keysign(8): Make ed25519 keys work for host based
|
|
authentication.
|
|
* sshd(8): SSH protocol v.1 workaround for the Meyer, et al,
|
|
Bleichenbacher Side Channel Attack. Fake up a bignum key
|
|
before RSA decryption.
|
|
* sshd(8): Remember which public keys have been used for
|
|
authentication and refuse to accept previously-used keys.
|
|
This allows AuthenticationMethods=publickey,publickey to
|
|
require that users authenticate using two _different_ public
|
|
keys.
|
|
* sshd(8): add sshd_config HostbasedAcceptedKeyTypes and
|
|
PubkeyAcceptedKeyTypes options to allow sshd to control what
|
|
public key types will be accepted. Currently defaults to all.
|
|
* sshd(8): Don't count partial authentication success as a
|
|
failure against MaxAuthTries.
|
|
* ssh(1): Add RevokedHostKeys option for the client to allow
|
|
text-file or KRL-based revocation of host keys.
|
|
* ssh-keygen(1), sshd(8): Permit KRLs that revoke certificates
|
|
by serial number or key ID without scoping to a particular
|
|
CA.
|
|
* ssh(1): Add a "Match canonical" criteria that allows
|
|
ssh_config Match blocks to trigger only in the second config
|
|
pass.
|
|
* ssh(1): Add a -G option to ssh that causes it to parse its
|
|
configuration and dump the result to stdout, similar to
|
|
"sshd -T".
|
|
* ssh(1): Allow Match criteria to be negated.
|
|
E.g. "Match !host".
|
|
* The regression test suite has been extended to cover more
|
|
OpenSSH features. The unit tests have been expanded and now
|
|
cover key exchange.
|
|
Bugfixes:
|
|
* ssh-keyscan(1): ssh-keyscan has been made much more robust
|
|
again servers that hang or violate the SSH protocol.
|
|
* ssh(1), ssh-keygen(1): Fix regression: Key path names were
|
|
being lost as comment fields.
|
|
* ssh(1): Allow ssh_config Port options set in the second
|
|
config parse phase to be applied (they were being ignored).
|
|
* ssh(1): Tweak config re-parsing with host canonicalisation - make
|
|
the second pass through the config files always run when host name
|
|
canonicalisation is enabled (and not whenever the host name
|
|
changes)
|
|
* ssh(1): Fix passing of wildcard forward bind addresses when
|
|
connection multiplexing is in use
|
|
* ssh-keygen(1): Fix broken private key conversion from
|
|
non-OpenSSH formats.
|
|
* ssh-keygen(1): Fix KRL generation bug when multiple CAs are
|
|
in use.
|
|
* Various fixes to manual pages
|
|
- OpenSSH 6.9
|
|
Security:
|
|
* ssh(1): when forwarding X11 connections with
|
|
ForwardX11Trusted=no, connections made after
|
|
ForwardX11Timeout expired could be permitted and no longer
|
|
subject to XSECURITY restrictions because of an ineffective
|
|
timeout check in ssh(1) coupled with "fail open" behaviour in
|
|
the X11 server when clients attempted connections with
|
|
expired credentials. This problem was reported by Jann Horn.
|
|
* ssh-agent(1): fix weakness of agent locking (ssh-add -x) to
|
|
password guessing by implementing an increasing failure
|
|
delay, storing a salted hash of the password rather than the
|
|
password itself and using a timing-safe comparison function
|
|
for verifying unlock attempts. This problem was reported by
|
|
Ryan Castellucci.
|
|
New Features:
|
|
* ssh(1), sshd(8): promote chacha20-poly1305@openssh.com to be
|
|
the default cipher
|
|
* sshd(8): support admin-specified arguments to
|
|
AuthorizedKeysCommand
|
|
* sshd(8): add AuthorizedPrincipalsCommand that allows
|
|
retrieving authorized principals information from a
|
|
subprocess rather than a file.
|
|
* ssh(1), ssh-add(1): support PKCS#11 devices with external PIN
|
|
entry devices
|
|
* sshd(8): allow GSSAPI host credential check to be relaxed for
|
|
multihomed hosts via GSSAPIStrictAcceptorCheck option
|
|
* ssh-keygen(1): support "ssh-keygen -lF hostname" to search
|
|
known_hosts and print key hashes rather than full keys.
|
|
* ssh-agent(1): add -D flag to leave ssh-agent in foreground
|
|
without enabling debug mode
|
|
Bugfixes:
|
|
* ssh(1), sshd(8): deprecate legacy
|
|
SSH2_MSG_KEX_DH_GEX_REQUEST_OLD message and do not try to use
|
|
it against some 3rd-party SSH implementations that use it
|
|
(older PuTTY, WinSCP).
|
|
* Many fixes for problems caused by compile-time deactivation
|
|
of SSH1 support (including bz#2369)
|
|
* ssh(1), sshd(8): cap DH-GEX group size at 4Kbits for Cisco
|
|
implementations as some would fail when attempting to use
|
|
group sizes >4K
|
|
* ssh(1): fix out-of-bound read in EscapeChar configuration
|
|
option parsing
|
|
* sshd(8): fix application of PermitTunnel, LoginGraceTime,
|
|
AuthenticationMethods and StreamLocalBindMask options in
|
|
Match blocks
|
|
* ssh(1), sshd(8): improve disconnection message on TCP reset;
|
|
bz#2257
|
|
* ssh(1): remove failed remote forwards established by
|
|
muliplexing from the list of active forwards
|
|
* sshd(8): make parsing of authorized_keys "environment="
|
|
options independent of PermitUserEnv being enabled
|
|
* sshd(8): fix post-auth crash with permitopen=none
|
|
* ssh(1), ssh-add(1), ssh-keygen(1): allow new-format private
|
|
keys to be encrypted with AEAD ciphers
|
|
* ssh(1): allow ListenAddress, Port and AddressFamily
|
|
configuration options to appear in any order
|
|
* sshd(8): check for and reject missing arguments for
|
|
VersionAddendum and ForceCommand
|
|
* ssh(1), sshd(8): don't treat unknown certificate extensions
|
|
as fatal
|
|
* ssh-keygen(1): make stdout and stderr output consistent
|
|
* ssh(1): mention missing DISPLAY environment in debug log when
|
|
X11 forwarding requested
|
|
* sshd(8): correctly record login when UseLogin is set
|
|
* sshd(8): Add some missing options to sshd -T output and fix
|
|
output of VersionAddendum and HostCertificate. bz#2346
|
|
* Document and improve consistency of options that accept a
|
|
"none" argument" TrustedUserCAKeys, RevokedKeys (bz#2382),
|
|
AuthorizedPrincipalsFile (bz#2288)
|
|
* ssh(1): include remote username in debug output
|
|
* sshd(8): avoid compatibility problem with some versions of
|
|
Tera Term, which would crash when they received the hostkeys
|
|
notification message (hostkeys-00@openssh.com)
|
|
* sshd(8): mention ssh-keygen -E as useful when comparing
|
|
legacy MD5 host key fingerprints
|
|
* ssh(1): clarify pseudo-terminal request behaviour and use
|
|
make manual language consistent
|
|
* ssh(1): document that the TERM environment variable is not
|
|
subject to SendEnv and AcceptEnv
|
|
- OpenSSH 7.0:
|
|
This focuses primarily on deprecating weak, legacy and/or
|
|
unsafe cryptography.
|
|
Security:
|
|
* sshd(8): OpenSSH 6.8 and 6.9 incorrectly set TTYs to be
|
|
world- writable. Local attackers may be able to write
|
|
arbitrary messages to logged-in users, including terminal
|
|
escape sequences. Reported by Nikolay Edigaryev.
|
|
* sshd(8): Portable OpenSSH only: Fixed a privilege separation
|
|
weakness related to PAM support. Attackers who could
|
|
successfully compromise the pre-authentication process for
|
|
remote code execution and who had valid credentials on the
|
|
host could impersonate other users. Reported by Moritz
|
|
Jodeit.
|
|
* sshd(8): Portable OpenSSH only: Fixed a use-after-free bug
|
|
related to PAM support that was reachable by attackers who
|
|
could compromise the pre-authentication process for remote
|
|
code execution. Also reported by Moritz Jodeit.
|
|
* sshd(8): fix circumvention of MaxAuthTries using keyboard-
|
|
interactive authentication. By specifying a long, repeating
|
|
keyboard-interactive "devices" string, an attacker could
|
|
request the same authentication method be tried thousands of
|
|
times in a single pass. The LoginGraceTime timeout in sshd(8)
|
|
and any authentication failure delays implemented by the
|
|
authentication mechanism itself were still applied. Found by
|
|
Kingcope.
|
|
Potentially-incompatible Changes:
|
|
* Support for the legacy SSH version 1 protocol is disabled by
|
|
default at compile time.
|
|
* Support for the 1024-bit diffie-hellman-group1-sha1 key
|
|
exchange is disabled by default at run-time. It may be
|
|
re-enabled using the instructions in README.legacy or
|
|
http://www.openssh.com/legacy.html
|
|
* Support for ssh-dss, ssh-dss-cert-* host and user keys is
|
|
disabled by default at run-time. These may be re-enabled
|
|
using the instructions at http://www.openssh.com/legacy.html
|
|
* Support for the legacy v00 cert format has been removed.
|
|
* The default for the sshd_config(5) PermitRootLogin option has
|
|
changed from "yes" to "prohibit-password".
|
|
* PermitRootLogin=without-password/prohibit-password now bans
|
|
all interactive authentication methods, allowing only
|
|
public-key, hostbased and GSSAPI authentication (previously
|
|
it permitted keyboard-interactive and password-less
|
|
authentication if those were enabled).
|
|
New Features:
|
|
* ssh_config(5): add PubkeyAcceptedKeyTypes option to control
|
|
which public key types are available for user authentication.
|
|
* sshd_config(5): add HostKeyAlgorithms option to control which
|
|
public key types are offered for host authentications.
|
|
* ssh(1), sshd(8): extend Ciphers, MACs, KexAlgorithms,
|
|
HostKeyAlgorithms, PubkeyAcceptedKeyTypes and
|
|
HostbasedKeyTypes options to allow appending to the default
|
|
set of algorithms instead of replacing it. Options may now be
|
|
prefixed with a '+' to append to the default, e.g.
|
|
"HostKeyAlgorithms=+ssh-dss".
|
|
* sshd_config(5): PermitRootLogin now accepts an argument of
|
|
'prohibit-password' as a less-ambiguous synonym of 'without-
|
|
password'.
|
|
Bugfixes:
|
|
* ssh(1), sshd(8): add compatability workarounds for Cisco and
|
|
more PuTTY versions.
|
|
* Fix some omissions and errors in the PROTOCOL and
|
|
PROTOCOL.mux documentation relating to Unix domain socket
|
|
forwarding
|
|
* ssh(1): Improve the ssh(1) manual page to include a better
|
|
description of Unix domain socket forwarding
|
|
* ssh(1), ssh-agent(1): skip uninitialised PKCS#11 slots,
|
|
fixing failures to load keys when they are present.
|
|
* ssh(1), ssh-agent(1): do not ignore PKCS#11 hosted keys that
|
|
wth empty CKA_ID
|
|
* sshd(8): clarify documentation for UseDNS option
|
|
- OpenSSH 7.1:
|
|
Security:
|
|
* sshd(8): OpenSSH 7.0 contained a logic error in
|
|
PermitRootLogin= prohibit-password/without-password that
|
|
could, depending on compile-time configuration, permit
|
|
password authentication to root while preventing other forms
|
|
of authentication. This problem was reported by Mantas
|
|
Mikulenas.
|
|
Bugfixes:
|
|
* ssh(1), sshd(8): add compatability workarounds for FuTTY
|
|
* ssh(1), sshd(8): refine compatability workarounds for WinSCP
|
|
* Fix a number of memory faults (double-free, free of
|
|
uninitialised memory, etc) in ssh(1) and ssh-keygen(1).
|
|
Reported by Mateusz Kocielski.
|
|
- OpenSSH 7.1p2:
|
|
* SECURITY: ssh(1): The OpenSSH client code between 5.4 and 7.1
|
|
contains experimential support for resuming SSH-connections
|
|
(roaming).
|
|
The matching server code has never been shipped, but the
|
|
client code was enabled by default and could be tricked by a
|
|
malicious server into leaking client memory to the server,
|
|
including private client user keys.
|
|
The authentication of the server host key prevents
|
|
exploitation by a man-in-the-middle, so this information leak
|
|
is restricted to connections to malicious or compromised
|
|
servers.
|
|
MITIGATION: For OpenSSH >= 5.4 the vulnerable code in the
|
|
client can be completely disabled by adding 'UseRoaming no'
|
|
to the gobal ssh_config(5) file, or to user configuration in
|
|
~/.ssh/config, or by passing -oUseRoaming=no on the command
|
|
line.
|
|
PATCH: See below for a patch to disable this feature
|
|
(Disabling Roaming in the Source Code).
|
|
This problem was reported by the Qualys Security Advisory
|
|
team.
|
|
* SECURITY: Eliminate the fallback from untrusted
|
|
X11-forwarding to trusted forwarding for cases when the X
|
|
server disables the SECURITY extension. Reported by Thomas
|
|
Hoger.
|
|
* SECURITY: Fix an out of-bound read access in the packet
|
|
handling code. Reported by Ben Hawkes.
|
|
* PROTOCOL: Correctly interpret the 'first_kex_follows' option
|
|
during the intial key exchange. Reported by Matt Johnston.
|
|
* Further use of explicit_bzero has been added in various
|
|
buffer handling code paths to guard against compilers
|
|
aggressively doing dead-store removal.
|
|
Potentially-incompatible changes:
|
|
* This release disables a number of legacy cryptographic
|
|
algorithms by default in ssh:
|
|
+ Several ciphers blowfish-cbc, cast128-cbc, all arcfour
|
|
variants and the rijndael-cbc aliases for AES.
|
|
+ MD5-based and truncated HMAC algorithms.
|
|
- OpenSSH 7.2:
|
|
Security:
|
|
* ssh(1), sshd(8): remove unfinished and unused roaming code
|
|
(was already forcibly disabled in OpenSSH 7.1p2).
|
|
* ssh(1): eliminate fallback from untrusted X11 forwarding to
|
|
trusted forwarding when the X server disables the SECURITY
|
|
extension.
|
|
* ssh(1), sshd(8): increase the minimum modulus size supported
|
|
for diffie-hellman-group-exchange to 2048 bits.
|
|
* sshd(8): pre-auth sandboxing is now enabled by default
|
|
(previous releases enabled it for new installations via
|
|
sshd_config).
|
|
New Features:
|
|
* all: add support for RSA signatures using SHA-256/512 hash
|
|
algorithms based on draft-rsa-dsa-sha2-256-03.txt and
|
|
draft-ssh-ext-info-04.txt.
|
|
* ssh(1): Add an AddKeysToAgent client option which can be set
|
|
to 'yes', 'no', 'ask', or 'confirm', and defaults to 'no'.
|
|
When enabled, a private key that is used during
|
|
authentication will be added to ssh-agent if it is running
|
|
(with confirmation enabled if set to 'confirm').
|
|
* sshd(8): add a new authorized_keys option "restrict" that
|
|
includes all current and future key restrictions
|
|
(no-*-forwarding, etc.). Also add permissive versions of the
|
|
existing restrictions, e.g. "no-pty" -> "pty". This
|
|
simplifies the task of setting up restricted keys and ensures
|
|
they are maximally-restricted, regardless of any permissions
|
|
we might implement in the future.
|
|
* ssh(1): add ssh_config CertificateFile option to explicitly
|
|
list certificates. bz#2436
|
|
* ssh-keygen(1): allow ssh-keygen to change the key comment for
|
|
all supported formats.
|
|
* ssh-keygen(1): allow fingerprinting from standard input, e.g.
|
|
"ssh-keygen -lf -"
|
|
* ssh-keygen(1): allow fingerprinting multiple public keys in a
|
|
file, e.g. "ssh-keygen -lf ~/.ssh/authorized_keys" bz#1319
|
|
* sshd(8): support "none" as an argument for sshd_config
|
|
Foreground and ChrootDirectory. Useful inside Match blocks to
|
|
override a global default. bz#2486
|
|
* ssh-keygen(1): support multiple certificates (one per line)
|
|
and reading from standard input (using "-f -") for
|
|
"ssh-keygen -L"
|
|
* ssh-keyscan(1): add "ssh-keyscan -c ..." flag to allow
|
|
fetching certificates instead of plain keys.
|
|
* ssh(1): better handle anchored FQDNs (e.g. 'cvs.openbsd.org')
|
|
in hostname canonicalisation - treat them as already
|
|
canonical and remove the trailing '.' before matching
|
|
ssh_config.
|
|
Bugfixes:
|
|
* sftp(1): existing destination directories should not
|
|
terminate recursive uploads (regression in openssh 6.8)
|
|
* ssh(1), sshd(8): correctly send back SSH2_MSG_UNIMPLEMENTED
|
|
replies to unexpected messages during key exchange.
|
|
* ssh(1): refuse attempts to set ConnectionAttempts=0, which
|
|
does not make sense and would cause ssh to print an
|
|
uninitialised stack variable.
|
|
* ssh(1): fix errors when attempting to connect to scoped IPv6
|
|
addresses with hostname canonicalisation enabled.
|
|
* sshd_config(5): list a couple more options usable in Match
|
|
blocks.
|
|
* sshd(8): fix "PubkeyAcceptedKeyTypes +..." inside a Match
|
|
block.
|
|
* ssh(1): expand tilde characters in filenames passed to -i
|
|
options before checking whether or not the identity file
|
|
exists. Avoids confusion for cases where shell doesn't expand
|
|
(e.g. "-i ~/file" vs. "-i~/file").
|
|
* ssh(1): do not prepend "exec" to the shell command run by
|
|
"Match exec" in a config file, which could cause some
|
|
commands to fail in certain environments.
|
|
* ssh-keyscan(1): fix output for multiple hosts/addrs on one
|
|
line when host hashing or a non standard port is in use
|
|
* sshd(8): skip "Could not chdir to home directory" message
|
|
when ChrootDirectory is active.
|
|
* ssh(1): include PubkeyAcceptedKeyTypes in ssh -G config dump.
|
|
* sshd(8): avoid changing TunnelForwarding device flags if they
|
|
are already what is needed; makes it possible to use tun/tap
|
|
networking as non-root user if device permissions and
|
|
interface flags are pre-established
|
|
* ssh(1), sshd(8): RekeyLimits could be exceeded by one packet.
|
|
* ssh(1): fix multiplexing master failure to notice client
|
|
exit.
|
|
* ssh(1), ssh-agent(1): avoid fatal() for PKCS11 tokens that
|
|
present empty key IDs.
|
|
* sshd(8): avoid printf of NULL argument.
|
|
* ssh(1), sshd(8): allow RekeyLimits larger than 4GB.
|
|
* ssh-keygen(1): sshd(8): fix several bugs in (unused) KRL
|
|
signature support.
|
|
* ssh(1), sshd(8): fix connections with peers that use the key
|
|
exchange guess feature of the protocol.
|
|
* sshd(8): include remote port number in log messages.
|
|
* ssh(1): don't try to load SSHv1 private key when compiled
|
|
without SSHv1 support.
|
|
* ssh-agent(1), ssh(1): fix incorrect error messages during key
|
|
loading and signing errors.
|
|
* ssh-keygen(1): don't leave empty temporary files when
|
|
performing known_hosts file edits when known_hosts doesn't
|
|
exist.
|
|
* sshd(8): correct packet format for tcpip-forward replies for
|
|
requests that don't allocate a port
|
|
* ssh(1), sshd(8): fix possible hang on closed output.
|
|
* ssh(1): expand %i in ControlPath to UID.
|
|
* ssh(1), sshd(8): fix return type of openssh_RSA_verify.
|
|
* ssh(1), sshd(8): fix some option parsing memory leaks.
|
|
* ssh(1): add a some debug output before DNS resolution; it's a
|
|
place where ssh could previously silently stall in cases of
|
|
unresponsive DNS servers.
|
|
* ssh(1): remove spurious newline in visual hostkey.
|
|
* ssh(1): fix printing (ssh -G ...) of HostKeyAlgorithms=+...
|
|
* ssh(1): fix expansion of HostkeyAlgorithms=+...
|
|
Documentation:
|
|
* ssh_config(5), sshd_config(5): update default algorithm lists
|
|
to match current reality.
|
|
* ssh(1): mention -Q key-plain and -Q key-cert query options.
|
|
* sshd_config(8): more clearly describe what
|
|
AuthorizedKeysFile=none does.
|
|
* ssh_config(5): better document ExitOnForwardFailure.
|
|
* sshd(5): mention internal DH-GEX fallback groups in manual.
|
|
* sshd_config(5): better description for MaxSessions option.
|
|
Portability:
|
|
* sshd(8): fix multiple authentication using S/Key.
|
|
- OpenSSH 7.2p2:
|
|
Security:
|
|
* sshd(8): sanitise X11 authentication credentials to avoid
|
|
xauth command injection when X11Forwarding is enabled.
|
|
(removing patches from previous version:
|
|
* CVE-2016-0777_CVE-2016-0778.patch
|
|
* openssh-6.6p1-X11-forwarding.patch
|
|
* openssh-6.6p1-X_forward_with_disabled_ipv6.patch
|
|
* openssh-6.6p1-audit1-remove_duplicit_audit.patch
|
|
* openssh-6.6p1-audit2-better_audit_of_user_actions.patch
|
|
* openssh-6.6p1-audit3-key_auth_usage-fips.patch
|
|
* openssh-6.6p1-audit3-key_auth_usage.patch
|
|
* openssh-6.6p1-audit4-kex_results-fips.patch
|
|
* openssh-6.6p1-audit4-kex_results.patch
|
|
* openssh-6.6p1-audit5-session_key_destruction.patch
|
|
* openssh-6.6p1-audit6-server_key_destruction.patch
|
|
* openssh-6.6p1-audit7-libaudit_compat.patch
|
|
* openssh-6.6p1-audit8-libaudit_dns_timeouts.patch
|
|
* openssh-6.6p1-blocksigalrm.patch
|
|
* openssh-6.6p1-curve25519-6.6.1p1.patch
|
|
* openssh-6.6p1-default-protocol.patch
|
|
* openssh-6.6p1-disable-openssl-abi-check.patch
|
|
* openssh-6.6p1-eal3.patch
|
|
* openssh-6.6p1-fingerprint_hash.patch
|
|
* openssh-6.6p1-fips-checks.patch
|
|
* openssh-6.6p1-fips.patch
|
|
* openssh-6.6p1-gssapi_key_exchange.patch
|
|
* openssh-6.6p1-gssapimitm.patch
|
|
* openssh-6.6p1-host_ident.patch
|
|
* openssh-6.6p1-key-converter.patch
|
|
* openssh-6.6p1-lastlog.patch
|
|
* openssh-6.6p1-ldap.patch
|
|
* openssh-6.6p1-login_options.patch
|
|
* openssh-6.6p1-no_fork-no_pid_file.patch
|
|
* openssh-6.6p1-pam-check-locks.patch
|
|
* openssh-6.6p1-pam-fix2.patch
|
|
* openssh-6.6p1-pam-fix3.patch
|
|
* openssh-6.6p1-pts.patch
|
|
* openssh-6.6p1-saveargv-fix.patch
|
|
* openssh-6.6p1-seccomp_getuid.patch
|
|
* openssh-6.6p1-seccomp_stat.patch
|
|
* openssh-6.6p1-seed-prng.patch
|
|
* openssh-6.6p1-send_locale.patch
|
|
* openssh-6.6p1-sftp_force_permissions.patch
|
|
* openssh-6.6p1-sftp_homechroot.patch
|
|
* openssh-6.6p1-xauth.patch
|
|
* openssh-6.6p1-xauthlocalhostname.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Apr 29 15:56:38 UTC 2016 - pcerny@suse.com
|
|
|
|
- update seccomp sandbox that broke after OpenSSL update
|
|
(bsc#912436, bsc#977812)
|
|
[openssh-6.6p1-seccomp_stat.patch]
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Apr 6 11:42:35 UTC 2016 - kukuk@suse.com
|
|
|
|
- openssh-6.6p1-ldap.patch: replace TRUE/FALSE with 1/0, since
|
|
this defines did come via an indirect header inclusion and are
|
|
not everywhere defined.
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 14 15:35:55 UTC 2016 - astieger@suse.com
|
|
|
|
- CVE-2016-0777, bsc#961642, CVE-2016-0778, bsc#961645
|
|
Add CVE-2016-0777_CVE-2016-0778.patch to disable the roaming code
|
|
to prevent information leak and buffer overflow
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jan 12 10:35:12 UTC 2015 - meissner@suse.com
|
|
|
|
- gpg signature and keyring added.
|
|
pub 3200R/6D920D30 2013-12-10 [expires: 2021-01-01]
|
|
uid Damien Miller <djm@mindrot.org>
|
|
sub 3200R/672A1105 2013-12-10 [expires: 2021-01-01]
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Dec 27 23:45:00 UTC 2014 - Led <ledest@gmail.com>
|
|
|
|
- fix bashisms in sshd.init script
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Oct 8 10:12:40 UTC 2014 - werner@suse.de
|
|
|
|
- Ensure that ssh can use the ssh support of the gpg-agent (boo#899647)
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jul 21 15:58:09 UTC 2014 - p.drouand@gmail.com
|
|
|
|
- Do not depend on insserv if the package build with systemd support;
|
|
it's useless
|
|
|
|
-------------------------------------------------------------------
|
|
Sat May 17 22:31:29 UTC 2014 - crrodriguez@opensuse.org
|
|
|
|
- Remove tcpwrappers support now, This feature was removed
|
|
in upstream code at the end of April and the underlying
|
|
libraries are abandonware.
|
|
See: http://comments.gmane.org/gmane.linux.suse.general/348119
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Apr 24 01:33:45 UTC 2014 - pcerny@suse.com
|
|
|
|
- curve25519 key exchange fix (-curve25519-6.6.1p1.patch)
|
|
- patch re-ordering (-audit3-key_auth_usage-fips.patch,
|
|
-audit4-kex_results-fips.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Apr 15 09:26:16 UTC 2014 - rhafer@suse.com
|
|
|
|
- Remove uneeded dependency on the OpenLDAP server (openldap2)
|
|
from openssh-helpers. openssh-helpers just depends on the
|
|
openldap client libraries, which will be auto-generated by rpm.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Apr 11 21:50:51 UTC 2014 - pcerny@suse.com
|
|
|
|
- update to 6.6p1
|
|
Security:
|
|
* sshd(8): when using environment passing with a sshd_config(5)
|
|
AcceptEnv pattern with a wildcard. OpenSSH prior to 6.6 could
|
|
be tricked into accepting any enviornment variable that
|
|
contains the characters before the wildcard character.
|
|
Features since 6.5p1:
|
|
* ssh(1), sshd(8): removal of the J-PAKE authentication code,
|
|
which was experimental, never enabled and has been
|
|
unmaintained for some time.
|
|
* ssh(1): skip 'exec' clauses other clauses predicates failed
|
|
to match while processing Match blocks.
|
|
* ssh(1): if hostname canonicalisation is enabled and results
|
|
in the destination hostname being changed, then re-parse
|
|
ssh_config(5) files using the new destination hostname. This
|
|
gives 'Host' and 'Match' directives that use the expanded
|
|
hostname a chance to be applied.
|
|
Bugfixes:
|
|
* ssh(1): avoid spurious "getsockname failed: Bad file
|
|
descriptor" in ssh -W. bz#2200, debian#738692
|
|
* sshd(8): allow the shutdown(2) syscall in seccomp-bpf and
|
|
systrace sandbox modes, as it is reachable if the connection
|
|
is terminated during the pre-auth phase.
|
|
* ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1
|
|
bignum parsing. Minimum key length checks render this bug
|
|
unexploitable to compromise SSH 1 sessions.
|
|
* sshd_config(5): clarify behaviour of a keyword that appears
|
|
in multiple matching Match blocks. bz#2184
|
|
* ssh(1): avoid unnecessary hostname lookups when
|
|
canonicalisation is disabled. bz#2205
|
|
* sshd(8): avoid sandbox violation crashes in GSSAPI code by
|
|
caching the supported list of GSSAPI mechanism OIDs before
|
|
entering the sandbox. bz#2107
|
|
* ssh(1): fix possible crashes in SOCKS4 parsing caused by
|
|
assumption that the SOCKS username is nul-terminated.
|
|
* ssh(1): fix regression for UsePrivilegedPort=yes when
|
|
BindAddress is not specified.
|
|
* ssh(1), sshd(8): fix memory leak in ECDSA signature
|
|
verification.
|
|
* ssh(1): fix matching of 'Host' directives in ssh_config(5)
|
|
files to be case-insensitive again (regression in 6.5).
|
|
- FIPS checks in sftp-server
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 31 01:22:21 UTC 2014 - pcerny@suse.com
|
|
|
|
- FIPS checks during ssh client and daemon startup
|
|
(-fips-checks.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Mar 25 10:07:18 UTC 2014 - idonmez@suse.com
|
|
|
|
- Update openssh-6.5p1-audit4-kex_results.patch to ensure that
|
|
we don't pass a NULL string to buffer_put_cstring. This happens
|
|
when you have "Ciphers chacha20-poly1305@openssh.com" directive.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 17 02:21:13 UTC 2014 - pcerny@suse.com
|
|
|
|
- re-enabling the GSSAPI Key Exchange patch
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Feb 28 12:59:27 UTC 2014 - pcerny@suse.com
|
|
|
|
- re-enabling FIPS-enablement patch
|
|
- enable X11 forwarding when IPv6 is present but disabled on server
|
|
(bnc#712683, FATE#31503; -X_forward_with_disabled_ipv6.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 18 12:56:31 UTC 2014 - pcerny@suse.com
|
|
|
|
- openssh-6.5p1-seccomp_getuid.patch: re-enabling the seccomp sandbox
|
|
(allowing use of the getuid syscall) (bnc#864171)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Feb 12 01:24:16 UTC 2014 - pcerny@suse.com
|
|
|
|
- Update to 6.5p1
|
|
Features since 6.4p1:
|
|
* ssh(1), sshd(8): support for key exchange using ECDH in
|
|
Daniel Bernstein's Curve25519; default when both the client
|
|
and server support it.
|
|
* ssh(1), sshd(8): support for Ed25519 as a public key type fo
|
|
rboth server and client. Ed25519 is an EC signature offering
|
|
better security than ECDSA and DSA and good performance.
|
|
* Add a new private key format that uses a bcrypt KDF to better
|
|
protect keys at rest. Used unconditionally for Ed25519 keys,
|
|
on demand for other key types via the -o ssh-keygen(1)
|
|
option. Intended to become default in the near future.
|
|
Details documented in PROTOCOL.key.
|
|
* ssh(1), sshd(8): new transport cipher
|
|
"chacha20-poly1305@openssh.com" combining Daniel Bernstein's
|
|
ChaCha20 stream cipher and Poly1305 MAC to build an
|
|
authenticated encryption mode. Details documented
|
|
PROTOCOL.chacha20poly1305.
|
|
* ssh(1), sshd(8): refuse RSA keys from old proprietary clients
|
|
and servers that use the obsolete RSA+MD5 signature scheme.
|
|
It will still be possible to connect with these
|
|
clients/servers but only DSA keys will be accepted, and
|
|
OpenSSH will refuse connection entirely in a future release.
|
|
* ssh(1), sshd(8): refuse old proprietary clients and servers
|
|
that use a weaker key exchange hash calculation.
|
|
* ssh(1): increase the size of the Diffie-Hellman groups
|
|
requested for each symmetric key size. New values from NIST
|
|
Special Publication 800-57 with the upper limit specified by
|
|
RFC4419.
|
|
* ssh(1), ssh-agent(1): support pkcs#11 tokens that only
|
|
provide X.509 certs instead of raw public keys (requested as
|
|
bz#1908).
|
|
* ssh(1): new ssh_config(5) "Match" keyword that allows
|
|
conditional configuration to be applied by matching on
|
|
hostname, user and result of arbitrary commands.
|
|
* ssh(1): support for client-side hostname canonicalisation
|
|
using a set of DNS suffixes and rules in ssh_config(5). This
|
|
allows unqualified names to be canonicalised to
|
|
fully-qualified domain names to eliminate ambiguity when
|
|
looking up keys in known_hosts or checking host certificate
|
|
names.
|
|
* sftp-server(8): ability to whitelist and/or blacklist sftp
|
|
protocol requests by name.
|
|
* sftp-server(8): sftp "fsync@openssh.com" to support calling
|
|
fsync(2) on an open file handle.
|
|
* sshd(8): ssh_config(5) PermitTTY to disallow TTY allocation,
|
|
mirroring the longstanding no-pty authorized_keys option.
|
|
* ssh(1): ssh_config ProxyUseFDPass option that supports the
|
|
use of ProxyCommands that establish a connection and then
|
|
pass a connected file descriptor back to ssh(1). This allows
|
|
the ProxyCommand to exit rather than staying around to
|
|
transfer data.
|
|
Bugfixes since 6.4p1:
|
|
* ssh(1), sshd(8): fix potential stack exhaustion caused by
|
|
nested certificates.
|
|
* ssh(1): bz#1211: make BindAddress work with
|
|
UsePrivilegedPort.
|
|
* sftp(1): bz#2137: fix the progress meter for resumed
|
|
transfer.
|
|
* ssh-add(1): bz#2187: do not request smartcard PIN when
|
|
removing keys from ssh-agent.
|
|
* sshd(8): bz#2139: fix re-exec fallback when original sshd
|
|
binary cannot be executed.
|
|
* ssh-keygen(1): make relative-specified certificate expiry
|
|
times relative to current time and not the validity start
|
|
time.
|
|
* sshd(8): bz#2161: fix AuthorizedKeysCommand inside a Match
|
|
block.
|
|
* sftp(1): bz#2129: symlinking a file would incorrectly
|
|
canonicalise the target path.
|
|
* ssh-agent(1): bz#2175: fix a use-after-free in the PKCS#11
|
|
agent helper executable.
|
|
* sshd(8): improve logging of sessions to include the user
|
|
name, remote host and port, the session type (shell, command,
|
|
etc.) and allocated TTY (if any).
|
|
* sshd(8): bz#1297: tell the client (via a debug message) when
|
|
their preferred listen address has been overridden by the
|
|
server's GatewayPorts setting.
|
|
* sshd(8): bz#2162: include report port in bad protocol banner
|
|
message.
|
|
* sftp(1): bz#2163: fix memory leak in error path in
|
|
do_readdir().
|
|
* sftp(1): bz#2171: don't leak file descriptor on error.
|
|
* sshd(8): include the local address and port in "Connection
|
|
from ..." message (only shown at loglevel>=verbose).
|
|
- systemd systems
|
|
* create sysconfig file on systemd systems as well, yet do not
|
|
require it at run-time (bnc#862600)
|
|
* symlink rcsshd to /usr/bin/service
|
|
- rename "-forcepermissions" patch to "-sftp_force_permissions"
|
|
- disable key converter - ssh-keygen is able to do the same
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 11 07:42:09 UTC 2014 - meissner@suse.com
|
|
|
|
- add a rcsshd symlink to /usr/sbin/service
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Feb 5 08:38:11 UTC 2014 - idonmez@suse.com
|
|
|
|
- Add openssh-6.2p1-forcepermissions.patch to implement a force
|
|
permissions mode (fate#312774). The patch is based on
|
|
http://marc.info/?l=openssh-unix-dev&m=128896838930893
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 24 15:13:09 UTC 2014 - pcerny@suse.com
|
|
|
|
- Update to 6.4p1
|
|
Features since 6.2p2:
|
|
* ssh-agent(1) support in sshd(8); allows encrypted hostkeys, or
|
|
hostkeys on smartcards.
|
|
* ssh(1)/sshd(8): allow optional time-based rekeying via a
|
|
second argument to the existing RekeyLimit option. RekeyLimit
|
|
is now supported in sshd_config as well as on the client.
|
|
* sshd(8): standardise logging of information during user
|
|
authentication.
|
|
* The presented key/cert and the remote username (if available)
|
|
is now logged in the authentication success/failure message on
|
|
the same log line as the local username, remote host/port and
|
|
protocol in use. Certificates contents and the key
|
|
fingerprint of the signing CA are logged too.
|
|
* ssh(1) ability to query what cryptographic algorithms are
|
|
supported in the binary.
|
|
* ssh(1): ProxyCommand=- for cases where stdin and stdout
|
|
already point to the proxy.
|
|
* ssh(1): allow IdentityFile=none
|
|
* ssh(1)/sshd(8): -E option to append debugging logs to a
|
|
specified file instead of stderr or syslog.
|
|
* sftp(1): support resuming partial downloads with the "reget"
|
|
command and on the sftp commandline or on the "get"
|
|
commandline with the "-a" (append) option.
|
|
* ssh(1): "IgnoreUnknown" configuration option to selectively
|
|
suppress errors arising from unknown configuration directives.
|
|
* sshd(8): support for submethods to be appended to required
|
|
authentication methods listed via AuthenticationMethods.
|
|
Bugfixes since 6.2p2:
|
|
* sshd(8): fix refusal to accept certificate if a key of a
|
|
different type to the CA key appeared in authorized_keys
|
|
before the CA key.
|
|
* ssh(1)/ssh-agent(1)/sshd(8): Use a monotonic time source for
|
|
timers so that things like keepalives and rekeying will work
|
|
properly over clock steps.
|
|
* sftp(1): update progressmeter when data is acknowledged, not
|
|
when it's sent. bz#2108
|
|
* ssh(1)/ssh-keygen(1): improve error messages when the current
|
|
user does not exist in /etc/passwd; bz#2125
|
|
* ssh(1): reset the order in which public keys are tried after
|
|
partial authentication success.
|
|
* ssh-agent(1): clean up socket files after SIGINT when in debug
|
|
mode; bz#2120
|
|
* ssh(1) and others: avoid confusing error messages in the case
|
|
of broken system resolver configurations; bz#2122
|
|
* ssh(1): set TCP nodelay for connections started with -N;
|
|
bz#2124
|
|
* ssh(1): correct manual for permission requirements on
|
|
~/.ssh/config; bz#2078
|
|
* ssh(1): fix ControlPersist timeout not triggering in cases
|
|
where TCP connections have hung. bz#1917
|
|
* ssh(1): properly deatch a ControlPersist master from its
|
|
controlling terminal.
|
|
* sftp(1): avoid crashes in libedit when it has been compiled
|
|
with multi- byte character support. bz#1990
|
|
* sshd(8): when running sshd -D, close stderr unless we have
|
|
explicitly requested logging to stderr. bz#1976,
|
|
* ssh(1): fix incomplete bzero; bz#2100
|
|
* sshd(8): log and error and exit if ChrootDirectory is
|
|
specified and running without root privileges.
|
|
* Many improvements to the regression test suite. In particular
|
|
log files are now saved from ssh and sshd after failures.
|
|
* Fix a number of memory leaks. bz#1967 bz#2096 and others
|
|
* sshd(8): fix public key authentication when a :style is
|
|
appended to the requested username.
|
|
* ssh(1): do not fatally exit when attempting to cleanup
|
|
multiplexing- created channels that are incompletely opened.
|
|
bz#2079
|
|
* sshd(8): fix a memory corruption problem triggered during
|
|
rekeying when an AES-GCM cipher is selected
|
|
* Fix unaligned accesses in umac.c for strict-alignment
|
|
architectures. bz#2101
|
|
* Fix broken incorrect commandline reporting errors. bz#1448
|
|
* Only include SHA256 and ECC-based key exchange methods if
|
|
libcrypto has the required support.
|
|
* Fix crash in SOCKS5 dynamic forwarding code on
|
|
strict-alignment architectures.
|
|
- FIPS and GSSKEX patched disabled for now
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Oct 4 17:50:32 UTC 2013 - pcerny@suse.com
|
|
|
|
- fix server crashes when using AES-GCM
|
|
- removed superfluous build dependency on X
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Sep 19 02:02:56 UTC 2013 - pcerny@suse.com
|
|
|
|
- spec file and patch cleanup
|
|
* key converter is now in the -key-converter.patch
|
|
* openssh-nodaemon-nopid.patch is -no_fork-no_pid_file.patch
|
|
* openssh-nocrazyabicheck.patch is
|
|
-disable-openssl-abi-check.patch
|
|
* removing obsolete -engines.diff patch
|
|
- patches from SLE11
|
|
* use auditing infrastructure extending upstream hooks
|
|
(-auditX-*.patch) instead of the single old patch
|
|
(-audit.patch)
|
|
* FIPS enablement (currently disabled)
|
|
(-fingerprint_hash.patch, -fips.patch)
|
|
* GSSAPI key exchange
|
|
(bnc#784689, fate#313068, -gssapi_key_exchange.patch)
|
|
* SysV init script update - 'stop' now terminates all sshd
|
|
processes and closes all connections, 'soft-stop' only
|
|
terminates the listener process (keeps active sessions intact)
|
|
(fate#314243)
|
|
* helper application for retrieving users' public keys from
|
|
an LDAP server (bnc#683733, fate#302144, -ldap.patch)
|
|
- subpackage openssh-akc-ldap
|
|
* several bugfixes:
|
|
- login invocation
|
|
(bnc#833605, -login_options.patch)
|
|
- disable locked accounts when using PAM
|
|
(bnc#708678, fate#312033, -pam-check-locks.patch)
|
|
- fix wtmp handling
|
|
(bnc#18024, -lastlog.patch)
|
|
- init script is moved into documentation for openSUSE 12.3+
|
|
(as it confused systemd)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Sep 10 21:15:59 UTC 2013 - crrodriguez@opensuse.org
|
|
|
|
- fix the logic in openssh-nodaemon-nopid.patch which is broken
|
|
and pid_file therefore still being created.
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Aug 3 17:57:06 UTC 2013 - crrodriguez@opensuse.org
|
|
|
|
- Update to version 6.2p2
|
|
* ssh(1)/sshd(8): Added support for AES-GCM authenticated encryption
|
|
* ssh(1)/sshd(8): Added support for encrypt-then-mac (EtM) MAC modes
|
|
* ssh(1)/sshd(8): Added support for the UMAC-128 MAC
|
|
* sshd(8): Added support for multiple required authentication
|
|
* sshd(8)/ssh-keygen(1): Added support for Key Revocation Lists
|
|
* ssh(1): When SSH protocol 2 only is selected (the default), ssh(1)
|
|
now immediately sends its SSH protocol banner to the server without
|
|
waiting to receive the server's banner, saving time when connecting.
|
|
* dozens of other changes, see http://www.openssh.org/txt/release-6.2
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jul 1 18:54:31 UTC 2013 - coolo@suse.com
|
|
|
|
- avoid the build cycle between curl, krb5, libssh2_org and openssh
|
|
by using krb5-mini-devel
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jun 19 09:50:25 UTC 2013 - speilicke@suse.com
|
|
|
|
- Recommend xauth, X11-forwarding won't work if it is not installed
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Apr 14 19:02:32 UTC 2013 - crrodriguez@opensuse.org
|
|
|
|
- sshd.service: Do not order after syslog.target, it is
|
|
not required or recommended and that target does not even exist
|
|
anymore.
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jan 8 10:16:45 UTC 2013 - dmueller@suse.com
|
|
|
|
- use ssh-keygen(1) default keylengths in generating the host key
|
|
instead of hardcoding it
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Nov 13 10:26:37 UTC 2012 - meissner@suse.com
|
|
|
|
- Updated to 6.1p1, a bugfix release
|
|
Features:
|
|
* sshd(8): This release turns on pre-auth sandboxing sshd by default for
|
|
new installs, by setting UsePrivilegeSeparation=sandbox in sshd_config.
|
|
* ssh-keygen(1): Add options to specify starting line number and number of
|
|
lines to process when screening moduli candidates, allowing processing
|
|
of different parts of a candidate moduli file in parallel
|
|
* sshd(8): The Match directive now supports matching on the local (listen)
|
|
address and port upon which the incoming connection was received via
|
|
LocalAddress and LocalPort clauses.
|
|
* sshd(8): Extend sshd_config Match directive to allow setting AcceptEnv
|
|
and {Allow,Deny}{Users,Groups}
|
|
* Add support for RFC6594 SSHFP DNS records for ECDSA key types. bz#1978
|
|
* ssh-keygen(1): Allow conversion of RSA1 keys to public PEM and PKCS8
|
|
* sshd(8): Allow the sshd_config PermitOpen directive to accept "none" as
|
|
an argument to refuse all port-forwarding requests.
|
|
* sshd(8): Support "none" as an argument for AuthorizedPrincipalsFile
|
|
* ssh-keyscan(1): Look for ECDSA keys by default. bz#1971
|
|
* sshd(8): Add "VersionAddendum" to sshd_config to allow server operators
|
|
to append some arbitrary text to the server SSH protocol banner.
|
|
Bugfixes:
|
|
* ssh(1)/sshd(8): Don't spin in accept() in situations of file
|
|
descriptor exhaustion. Instead back off for a while.
|
|
* ssh(1)/sshd(8): Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs as
|
|
they were removed from the specification. bz#2023,
|
|
* sshd(8): Handle long comments in config files better. bz#2025
|
|
* ssh(1): Delay setting tty_flag so RequestTTY options are correctly
|
|
picked up. bz#1995
|
|
* sshd(8): Fix handling of /etc/nologin incorrectly being applied to root
|
|
on platforms that use login_cap.
|
|
Portable OpenSSH:
|
|
* sshd(8): Allow sshd pre-auth sandboxing to fall-back to the rlimit
|
|
sandbox from the Linux SECCOMP filter sandbox when the latter is
|
|
not available in the kernel.
|
|
* ssh(1): Fix NULL dereference when built with LDNS and using DNSSEC to
|
|
retrieve a CNAME SSHFP record.
|
|
* Fix cross-compilation problems related to pkg-config. bz#1996
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Nov 13 10:26:16 CET 2012 - kukuk@suse.de
|
|
|
|
- Fix groupadd arguments
|
|
- Add LSB tag to sshd init script
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Oct 26 15:01:21 UTC 2012 - coolo@suse.com
|
|
|
|
- explicit buildrequire groff, needed for man pages
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Oct 16 12:29:36 UTC 2012 - coolo@suse.com
|
|
|
|
- buildrequire systemd through pkgconfig to break cycle
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Aug 15 19:25:08 UTC 2012 - crrodriguez@opensuse.org
|
|
|
|
- When not daemonizing, such is used with systemd, no not
|
|
create a PID file
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jun 18 11:34:51 UTC 2012 - coolo@suse.com
|
|
|
|
- do not buildrequire xorg-x11, the askpass is an extra package
|
|
and should build from a different package
|
|
|
|
-------------------------------------------------------------------
|
|
Tue May 29 07:14:36 UTC 2012 - meissner@suse.com
|
|
|
|
- use correct download url and tarball format.
|
|
|
|
-------------------------------------------------------------------
|
|
Tue May 29 06:52:13 UTC 2012 - crrodriguez@opensuse.org
|
|
|
|
- Update to version 6.0, large list of changes, seen
|
|
http://www.openssh.org/txt/release-6.0 for detail.
|
|
|
|
-------------------------------------------------------------------
|
|
Thu May 10 20:50:33 UTC 2012 - crrodriguez@opensuse.org
|
|
|
|
- By default openSSH checks at *runtime* if the openssl
|
|
API version matches with the running library, that might
|
|
be good if you are compiling SSH yourself but it is a totally
|
|
insane way to check for binary/source compatibility in a distribution.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Feb 20 08:29:17 UTC 2012 - meissner@suse.com
|
|
|
|
- include X11 app default dir
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Dec 23 08:27:08 UTC 2011 - brian@aljex.com
|
|
|
|
- Fix building for OS 11.0, 10.3, 10.2
|
|
* Don't require selinux on OS 11.0 or lower
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Dec 23 06:34:28 UTC 2011 - brian@aljex.com
|
|
|
|
- Fix building for OS 11.2 and 11.1
|
|
- Cleanup remove remaining litteral /etc/init.d 's
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Dec 21 10:38:59 UTC 2011 - coolo@suse.com
|
|
|
|
- add autoconf as buildrequire to avoid implicit dependency
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Nov 29 19:48:29 UTC 2011 - crrodriguez@opensuse.org
|
|
|
|
- Add systemd startup units
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Oct 29 22:41:55 UTC 2011 - pcerny@suse.com
|
|
|
|
- finalising libexecdir change (bnc#726712)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Oct 19 00:32:20 UTC 2011 - pcerny@suse.com
|
|
|
|
- Update to 5.9p1
|
|
* sandboxing privsep child through rlimit
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Sep 16 09:43:47 UTC 2011 - jengelh@medozas.de
|
|
|
|
- Avoid overriding libexecdir with %_lib (bnc#712025)
|
|
- Clean up the specfile by request of Minh Ngo, details entail:
|
|
* remove norootforbuild comments, redundant %clean section
|
|
* run spec-beautifier over it
|
|
- Add PIEFLAGS to compilation of askpass; fails otherwise
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Aug 29 23:47:58 UTC 2011 - crrodriguez@opensuse.org
|
|
|
|
- Update to verison 5.8p2
|
|
* Fixed vuln in systems without dev/random, we arenot affected
|
|
* Fixes problems building with selinux enabled
|
|
- Fix build with as-needed and no-add-needed
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Aug 13 20:46:17 UTC 2011 - crrodriguez@opensuse.org
|
|
|
|
- Enable libedit/autocompletion support in sftp
|
|
|
|
-------------------------------------------------------------------
|
|
Tue May 10 15:08:17 UTC 2011 - meissner@novell.com
|
|
|
|
- Change default keysizes of rsa and dsa from 1024 to 2048
|
|
to match ssh-keygen manpage recommendations.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Feb 4 11:19:25 UTC 2011 - lchiquitto@novell.com
|
|
|
|
- Update to 5.8p1
|
|
* Fix vulnerability in legacy certificate signing introduced in
|
|
OpenSSH-5.6 and found by Mateusz Kocielski.
|
|
* Fix compilation failure when enableing SELinux support.
|
|
* Do not attempt to call SELinux functions when SELinux is
|
|
disabled.
|
|
- Remove patch that is now upstream:
|
|
* openssh-5.7p1-selinux.diff
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Feb 3 16:42:01 UTC 2011 - pcerny@novell.com
|
|
|
|
- specfile/patches cleanup
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jan 24 11:24:59 UTC 2011 - lchiquitto@novell.com
|
|
|
|
- Update to 5.7p1
|
|
* Implement Elliptic Curve Cryptography modes for key exchange (ECDH)
|
|
and host/user keys (ECDSA) as specified by RFC5656.
|
|
* sftp(1)/sftp-server(8): add a protocol extension to support a hard
|
|
link operation.
|
|
* scp(1): Add a new -3 option to scp: Copies between two remote hosts
|
|
are transferred through the local host.
|
|
* ssh(1): automatically order the hostkeys requested by the client
|
|
based on which hostkeys are already recorded in known_hosts.
|
|
* ssh(1)/sshd(8): add a new IPQoS option to specify arbitrary
|
|
TOS/DSCP/QoS values instead of hardcoding lowdelay/throughput.
|
|
* sftp(1): the sftp client is now significantly faster at performing
|
|
directory listings, using OpenBSD glob(3) extensions to preserve
|
|
the results of stat(3) operations performed in the course of its
|
|
execution rather than performing expensive round trips to fetch
|
|
them again afterwards.
|
|
* ssh(1): "atomically" create the listening mux socket by binding it on
|
|
a temporary name and then linking it into position after listen() has
|
|
succeeded.
|
|
* ssh(1)/sshd(8): add a KexAlgorithms knob to the client and server
|
|
configuration to allow selection of which key exchange methods are
|
|
used by ssh(1) and sshd(8) and their order of preference.
|
|
* sftp(1)/scp(1): factor out bandwidth limiting code from scp(1) into
|
|
a generic bandwidth limiter that can be attached using the atomicio
|
|
callback mechanism and use it to add a bandwidth limit option to
|
|
sftp(1).
|
|
* Support building against openssl-1.0.0a.
|
|
* Bug fixes.
|
|
- Remove patches that are now upstream:
|
|
* openssh-5.6p1-tmpdir.diff
|
|
* openssh-linux-new-oomkill.patch
|
|
- Add upstream patch to fix build with SELinux enabled.
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jan 12 13:37:38 CET 2011 - sbrabec@suse.cz
|
|
|
|
- Removed relics of no more implemented opensc support.
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Nov 18 12:20:59 UTC 2010 - lnussel@suse.de
|
|
|
|
- add pam_lastlog to show failed login attempts
|
|
- remove permissions handling, no special handling needed
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Nov 16 14:45:14 UTC 2010 - cristian.rodriguez@opensuse.org
|
|
|
|
- Use upstream oom_adj is deprecated patch
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Nov 2 13:25:19 UTC 2010 - coolo@novell.com
|
|
|
|
- remove the code trying to patch X11 paths - which was broken
|
|
for a very long time and was useless anyway as the Makefiles
|
|
do this correctly themselves
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Oct 31 12:37:02 UTC 2010 - jengelh@medozas.de
|
|
|
|
- Use %_smp_mflags
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Oct 14 16:00:19 UTC 2010 - crrodriguez@opensuse.org
|
|
|
|
- Fix warning "oom_adj is deprecated use oom_score_adj instead"
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Sep 13 14:47:10 CEST 2010 - anicka@suse.cz
|
|
|
|
- actualize README.SuSE (bnc#638893)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Aug 24 15:43:08 CEST 2010 - anicka@suse.cz
|
|
|
|
- update to 5.6p1
|
|
* Added a ControlPersist option to ssh_config(5) that automatically
|
|
starts a background ssh(1) multiplex master when connecting.
|
|
* Hostbased authentication may now use certificate host keys.
|
|
* ssh-keygen(1) now supports signing certificate using a CA key that
|
|
has been stored in a PKCS#11 token.
|
|
* ssh(1) will now log the hostname and address that we connected to at
|
|
LogLevel=verbose after authentication is successful to mitigate
|
|
"phishing" attacks by servers with trusted keys that accept
|
|
authentication silently and automatically before presenting fake
|
|
password/passphrase prompts.
|
|
* Expand %h to the hostname in ssh_config Hostname options.
|
|
* Allow ssh-keygen(1) to import (-i) and export (-e) of PEM and PKCS#8
|
|
keys in addition to RFC4716 (SSH.COM) encodings via a new -m option
|
|
* sshd(8) will now queue debug messages for bad ownership or
|
|
permissions on the user's keyfiles encountered during authentication
|
|
and will send them after authentication has successfully completed.
|
|
* ssh(1) connection multiplexing now supports remote forwarding with
|
|
dynamic port allocation and can report the allocated port back to
|
|
the user
|
|
* sshd(8) now supports indirection in matching of principal names
|
|
listed in certificates.
|
|
* sshd(8) now has a new AuthorizedPrincipalsFile option to specify a
|
|
file containing a list of names that may be accepted in place of the
|
|
username when authorizing a certificate trusted via the
|
|
sshd_config(5) TrustedCAKeys option.
|
|
* Additional sshd_config(5) options are now valid inside Match blocks
|
|
* Revised the format of certificate keys.
|
|
* bugfixes
|
|
- removed -forward patch (SSH_MAX_FORWARDS_PER_DIRECTION not hard-coded
|
|
any more), removed memory leak fix (fixed in upstream)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Aug 20 13:00:43 CEST 2010 - anicka@suse.cz
|
|
|
|
- hint user how to remove offending keys (bnc#625552)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jul 22 17:58:09 CEST 2010 - anicka@suse.cz
|
|
|
|
- update to 5.5p1
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jul 20 17:19:24 CEST 2010 - anicka@suse.cz
|
|
|
|
- update to 5.5p1
|
|
* Allow ChrootDirectory to work in SELinux platforms.
|
|
* bugfixes
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jun 30 16:01:30 CEST 2010 - meissner@suse.de
|
|
|
|
- Disable visual hostkey support again, after discussion on
|
|
its usefulness.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon May 17 18:11:33 UTC 2010 - cristian.rodriguez@opensuse.org
|
|
|
|
- Hardware crypto is supported and patched but never
|
|
enabled, need to use --with-ssl-engine explicitely
|
|
|
|
-------------------------------------------------------------------
|
|
Fri May 14 16:03:17 CEST 2010 - anicka@suse.cz
|
|
|
|
- fixed memory leak in sftp (bnc#604274)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Apr 23 12:01:50 CEST 2010 - anicka@suse.cz
|
|
|
|
- honour /etc/nologin (bnc#530885)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 25 11:00:00 CET 2010 - meissner@suse.de
|
|
|
|
- Enable VisualHostKey (ascii art of the hostkey fingerprint) and
|
|
HashHostKeys (hardening measure to make them unusable for worms/malicious
|
|
users for further host hopping).
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Mar 23 18:57:07 CET 2010 - anicka@suse.cz
|
|
|
|
- update to 5.4p1
|
|
* After a transition period of about 10 years, this release disables
|
|
SSH protocol 1 by default. Clients and servers that need to use the
|
|
legacy protocol must explicitly enable it in ssh_config / sshd_config
|
|
or on the command-line.
|
|
* Remove the libsectok/OpenSC-based smartcard code and add support for
|
|
PKCS#11 tokens. This support is automatically enabled on all
|
|
platforms that support dlopen(3) and was inspired by patches written
|
|
by Alon Bar-Lev. Details in the ssh(1) and ssh-add(1) manpages.
|
|
* Add support for certificate authentication of users and hosts using a
|
|
new, minimal OpenSSH certificate format (not X.509). Certificates
|
|
contain a public key, identity information and some validity
|
|
constraints and are signed with a standard SSH public key using
|
|
ssh-keygen(1). CA keys may be marked as trusted in authorized_keys
|
|
or via a TrustedUserCAKeys option in sshd_config(5) (for user
|
|
authentication), or in known_hosts (for host authentication).
|
|
Documentation for certificate support may be found in ssh-keygen(1),
|
|
sshd(8) and ssh(1) and a description of the protocol extensions in
|
|
PROTOCOL.certkeys.
|
|
* Added a 'netcat mode' to ssh(1): "ssh -W host:port ..." This connects
|
|
stdio on the client to a single port forward on the server. This
|
|
allows, for example, using ssh as a ProxyCommand to route connections
|
|
via intermediate servers. bz#1618
|
|
* Add the ability to revoke keys in sshd(8) and ssh(1). User keys may
|
|
be revoked using a new sshd_config(5) option "RevokedKeys". Host keys
|
|
are revoked through known_hosts (details in the sshd(8) man page).
|
|
Revoked keys cannot be used for user or host authentication and will
|
|
trigger a warning if used.
|
|
* Rewrite the ssh(1) multiplexing support to support non-blocking
|
|
operation of the mux master, improve the resilience of the master to
|
|
malformed messages sent to it by the slave and add support for
|
|
requesting port- forwardings via the multiplex protocol. The new
|
|
stdio-to-local forward mode ("ssh -W host:port ...") is also
|
|
supported. The revised multiplexing protocol is documented in the
|
|
file PROTOCOL.mux in the source distribution.
|
|
* Add a 'read-only' mode to sftp-server(8) that disables open in write
|
|
mode and all other fs-modifying protocol methods. bz#430
|
|
* Allow setting an explicit umask on the sftp-server(8) commandline to
|
|
override whatever default the user has. bz#1229
|
|
* Many improvements to the sftp(1) client, many of which were
|
|
implemented by Carlos Silva through the Google Summer of Code
|
|
program:
|
|
- Support the "-h" (human-readable units) flag for ls
|
|
- Implement tab-completion of commands, local and remote filenames
|
|
- Support most of scp(1)'s commandline arguments in sftp(1), as a
|
|
first step towards making sftp(1) a drop-in replacement for scp(1).
|
|
Note that the rarely-used "-P sftp_server_path" option has been
|
|
moved to "-D sftp_server_path" to make way for "-P port" to match
|
|
scp(1).
|
|
- Add recursive transfer support for get/put and on the commandline
|
|
* New RSA keys will be generated with a public exponent of RSA_F4 ==
|
|
(2**16)+1 == 65537 instead of the previous value 35.
|
|
* Passphrase-protected SSH protocol 2 private keys are now protected
|
|
with AES-128 instead of 3DES. This applied to newly-generated keys
|
|
as well as keys that are reencrypted (e.g. by changing their
|
|
passphrase).
|
|
- cleanup in patches
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Mar 2 09:09:18 UTC 2010 - coolo@novell.com
|
|
|
|
- do not use paths at all, but prereq packages
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Feb 27 20:35:01 UTC 2010 - aj@suse.de
|
|
|
|
- Use complete path for groupadd and useradd in pre section.
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 23 15:45:06 CET 2010 - anicka@suse.cz
|
|
|
|
- audit patch: add fix for bnc#545271
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Feb 22 17:15:22 CET 2010 - anicka@suse.cz
|
|
|
|
- do not fix uid/gid anymore (bnc#536564)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Dec 15 11:04:00 CET 2009 - jengelh@medozas.de
|
|
|
|
- select large PIE for SPARC, it is required to avoid
|
|
"relocation truncated to fit: R_SPARC_GOT13 against symbol xyz
|
|
defined in COMMON section in sshd.o"
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Sep 21 14:40:51 CEST 2009 - anicka@suse.cz
|
|
|
|
- add new version of homechroot patch (added documentation, added
|
|
check for nodev and nosuid)
|
|
- remove Provides and Obsoletes ssh
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Aug 20 16:54:08 CEST 2009 - anicka@suse.cz
|
|
|
|
- make sftp in chroot users life easier (ie. bnc#518238),
|
|
many thanks jchadima@redhat.com for a patch
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jul 12 21:43:21 CEST 2009 - coolo@novell.com
|
|
|
|
- readd $SSHD_BIN so that sshd starts at all
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jul 7 15:06:58 CEST 2009 - llunak@novell.com
|
|
|
|
- Added a hook for ksshaskpass
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jul 5 12:17:40 CEST 2009 - dmueller@novell.com
|
|
|
|
- readd -f to startproc and remove -p instead to
|
|
ensure that sshd is started even though old instances
|
|
are still running (e.e. being logged in from remote)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jun 19 10:35:46 CEST 2009 - coolo@novell.com
|
|
|
|
- disable as-needed for this package as it fails to build with it
|
|
|
|
-------------------------------------------------------------------
|
|
Tue May 26 11:56:20 CEST 2009 - anicka@suse.cz
|
|
|
|
- disable -f in startproc to calm the warning (bnc#506831)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Apr 23 09:44:07 CEST 2009 - lnussel@suse.de
|
|
|
|
- do not enable sshd by default
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Feb 23 17:27:45 CET 2009 - anicka@suse.cz
|
|
|
|
- update to 5.2p1
|
|
* This release changes the default cipher order to prefer the AES CTR
|
|
modes and the revised "arcfour256" mode to CBC mode ciphers that are
|
|
susceptible to CPNI-957037 "Plaintext Recovery Attack Against SSH".
|
|
* This release also adds countermeasures to mitigate CPNI-957037-style
|
|
attacks against the SSH protocol's use of CBC-mode ciphers. Upon
|
|
detection of an invalid packet length or Message Authentication
|
|
Code, ssh/sshd will continue reading up to the maximum supported
|
|
packet length rather than immediately terminating the connection.
|
|
This eliminates most of the known differences in behaviour that
|
|
leaked information about the plaintext of injected data which formed
|
|
the basis of this attack. We believe that these attacks are rendered
|
|
infeasible by these changes.
|
|
* Added a -y option to ssh(1) to force logging to syslog rather than
|
|
stderr, which is useful when running daemonised (ssh -f)
|
|
* The sshd_config(5) ForceCommand directive now accepts commandline
|
|
arguments for the internal-sftp server.
|
|
* The ssh(1) ~C escape commandline now support runtime creation of
|
|
dynamic (-D) port forwards.
|
|
* Support the SOCKS4A protocol in ssh(1) dynamic (-D) forwards.
|
|
(bz#1482)
|
|
* Support remote port forwarding with a listen port of '0'. This
|
|
informs the server that it should dynamically allocate a listen
|
|
port and report it back to the client. (bz#1003)
|
|
* sshd(8) now supports setting PermitEmptyPasswords and
|
|
AllowAgentForwarding in Match blocks
|
|
* Repair a ssh(1) crash introduced in openssh-5.1 when the client is
|
|
sent a zero-length banner (bz#1496)
|
|
* Due to interoperability problems with certain
|
|
broken SSH implementations, the eow@openssh.com and
|
|
no-more-sessions@openssh.com protocol extensions are now only sent
|
|
to peers that identify themselves as OpenSSH.
|
|
* Make ssh(1) send the correct channel number for
|
|
SSH2_MSG_CHANNEL_SUCCESS and SSH2_MSG_CHANNEL_FAILURE messages to
|
|
avoid triggering 'Non-public channel' error messages on sshd(8) in
|
|
openssh-5.1.
|
|
* Avoid printing 'Non-public channel' warnings in sshd(8), since the
|
|
ssh(1) has sent incorrect channel numbers since ~2004 (this reverts
|
|
a behaviour introduced in openssh-5.1).
|
|
* Avoid double-free in ssh(1) ~C escape -L handler (bz#1539)
|
|
* Correct fail-on-error behaviour in sftp(1) batchmode for remote
|
|
stat operations. (bz#1541)
|
|
* Disable nonfunctional ssh(1) ~C escape handler in multiplex slave
|
|
connections. (bz#1543)
|
|
* Avoid hang in ssh(1) when attempting to connect to a server that
|
|
has MaxSessions=0 set.
|
|
* Multiple fixes to sshd(8) configuration test (-T) mode
|
|
* Several core and portable OpenSSH bugs fixed: 1380, 1412, 1418,
|
|
1419, 1421, 1490, 1491, 1492, 1514, 1515, 1518, 1520, 1538, 1540
|
|
* Many manual page improvements.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Dec 1 15:43:14 CET 2008 - anicka@suse.cz
|
|
|
|
- respect SSH_MAX_FORWARDS_PER_DIRECTION (bnc#448775)
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Nov 10 16:01:27 CET 2008 - anicka@suse.cz
|
|
|
|
- fix printing banner (bnc#443380)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Oct 24 16:24:34 CEST 2008 - anicka@suse.cz
|
|
|
|
- call pam functions in the right order (bnc#438292)
|
|
- mention default forwarding of locale settings in
|
|
README.SuSE (bnc#434799)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Sep 9 17:55:29 CEST 2008 - anicka@suse.cz
|
|
|
|
- remove pam_resmgr from sshd.pamd (bnc#422619)
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Aug 24 08:26:05 CEST 2008 - coolo@suse.de
|
|
|
|
- fix fillup macro usage
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Aug 22 11:51:12 CEST 2008 - prusnak@suse.cz
|
|
|
|
- enabled SELinux support [Fate#303662]
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jul 22 20:39:29 CEST 2008 - anicka@suse.cz
|
|
|
|
- update to 5.1p1
|
|
* sshd(8): Avoid X11 man-in-the-middle attack on HP/UX (and possibly
|
|
other platforms) when X11UseLocalhost=no
|
|
* Introduce experimental SSH Fingerprint ASCII Visualisation to ssh(1)
|
|
and ssh-keygen(1). Visual fingerprinnt display is controlled by a new
|
|
ssh_config(5) option "VisualHostKey".
|
|
* sshd_config(5) now supports CIDR address/masklen matching in "Match
|
|
address" blocks, with a fallback to classic wildcard matching.
|
|
* sshd(8) now supports CIDR matching in ~/.ssh/authorized_keys
|
|
from="..." restrictions, also with a fallback to classic wildcard
|
|
matching.
|
|
* Added an extended test mode (-T) to sshd(8) to request that it write
|
|
its effective configuration to stdout and exit. Extended test mode
|
|
also supports the specification of connection parameters (username,
|
|
source address and hostname) to test the application of
|
|
sshd_config(5) Match rules.
|
|
* ssh(1) now prints the number of bytes transferred and the overall
|
|
connection throughput for SSH protocol 2 sessions when in verbose
|
|
mode (previously these statistics were displayed for protocol 1
|
|
connections only).
|
|
* sftp-server(8) now supports extension methods statvfs@openssh.com and
|
|
fstatvfs@openssh.com that implement statvfs(2)-like operations.
|
|
* sftp(1) now has a "df" command to the sftp client that uses the
|
|
statvfs@openssh.com to produce a df(1)-like display of filesystem
|
|
space and inode utilisation (requires statvfs@openssh.com support on
|
|
the server)
|
|
* Added a MaxSessions option to sshd_config(5) to allow control of the
|
|
number of multiplexed sessions supported over a single TCP connection.
|
|
This allows increasing the number of allowed sessions above the
|
|
previous default of 10, disabling connection multiplexing
|
|
(MaxSessions=1) or disallowing login/shell/subsystem sessions
|
|
entirely (MaxSessions=0).
|
|
* Added a no-more-sessions@openssh.com global request extension that is
|
|
sent from ssh(1) to sshd(8) when the client knows that it will never
|
|
request another session (i.e. when session multiplexing is disabled).
|
|
This allows a server to disallow further session requests and
|
|
terminate the session in cases where the client has been hijacked.
|
|
* ssh-keygen(1) now supports the use of the -l option in combination
|
|
with -F to search for a host in ~/.ssh/known_hosts and display its
|
|
fingerprint.
|
|
* ssh-keyscan(1) now defaults to "rsa" (protocol 2) keys, instead of
|
|
"rsa1".
|
|
* Added an AllowAgentForwarding option to sshd_config(8) to control
|
|
whether authentication agent forwarding is permitted. Note that this
|
|
is a loose control, as a client may install their own unofficial
|
|
forwarder.
|
|
* ssh(1) and sshd(8): avoid unnecessary malloc/copy/free when receiving
|
|
network data, resulting in a ~10% speedup
|
|
* ssh(1) and sshd(8) will now try additional addresses when connecting
|
|
to a port forward destination whose DNS name resolves to more than
|
|
one address. The previous behaviour was to try the only first address
|
|
and give up if that failed. (bz#383)
|
|
* ssh(1) and sshd(8) now support signalling that channels are
|
|
half-closed for writing, through a channel protocol extension
|
|
notification "eow@openssh.com". This allows propagation of closed
|
|
file descriptors, so that commands such as:
|
|
"ssh -2 localhost od /bin/ls | true"
|
|
do not send unnecessary data over the wire. (bz#85)
|
|
* sshd(8): increased the default size of ssh protocol 1 ephemeral keys
|
|
from 768 to 1024 bits.
|
|
* When ssh(1) has been requested to fork after authentication
|
|
("ssh -f") with ExitOnForwardFailure enabled, delay the fork until
|
|
after replies for any -R forwards have been seen. Allows for robust
|
|
detection of -R forward failure when using -f. (bz#92)
|
|
* "Match group" blocks in sshd_config(5) now support negation of
|
|
groups. E.g. "Match group staff,!guests" (bz#1315)
|
|
* sftp(1) and sftp-server(8) now allow chmod-like operations to set
|
|
set[ug]id/sticky bits. (bz#1310)
|
|
* The MaxAuthTries option is now permitted in sshd_config(5) match
|
|
blocks.
|
|
* Multiplexed ssh(1) sessions now support a subset of the ~ escapes
|
|
that are available to a primary connection. (bz#1331)
|
|
* ssh(1) connection multiplexing will now fall back to creating a new
|
|
connection in most error cases. (bz#1439 bz#1329)
|
|
* Added some basic interoperability tests against Twisted Conch.
|
|
* Documented OpenSSH's extensions to and deviations from the published
|
|
SSH protocols (the PROTOCOL file in the distribution)
|
|
* Documented OpenSSH's ssh-agent protocol (PROTOCOL.agent).
|
|
* bugfixes
|
|
- remove gssapi_krb5-fix patch
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Apr 18 17:53:30 CEST 2008 - werner@suse.de
|
|
|
|
- Handle pts slave lines like utemper
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Apr 9 14:37:57 CEST 2008 - anicka@suse.cz
|
|
|
|
- update to 5.0p1
|
|
* CVE-2008-1483: Avoid possible hijacking of X11-forwarded
|
|
connections by refusing to listen on a port unless all address
|
|
families bind successfully.
|
|
- remove CVE-2008-1483 patch
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Apr 2 14:57:26 CEST 2008 - anicka@suse.cz
|
|
|
|
- update to 4.9p1
|
|
* Disable execution of ~/.ssh/rc for sessions where a command has been
|
|
forced by the sshd_config ForceCommand directive. Users who had
|
|
write access to this file could use it to execute abritrary commands.
|
|
This behaviour was documented, but was an unsafe default and an extra
|
|
hassle for administrators.
|
|
* Added chroot(2) support for sshd(8), controlled by a new option
|
|
"ChrootDirectory". Please refer to sshd_config(5) for details, and
|
|
please use this feature carefully. (bz#177 bz#1352)
|
|
* Linked sftp-server(8) into sshd(8). The internal sftp server is
|
|
used when the command "internal-sftp" is specified in a Subsystem
|
|
or ForceCommand declaration. When used with ChrootDirectory, the
|
|
internal sftp server requires no special configuration of files
|
|
inside the chroot environment. Please refer to sshd_config(5) for
|
|
more information.
|
|
* Added a "no-user-rc" option for authorized_keys to disable execution
|
|
of ~/.ssh/rc
|
|
* Added a protocol extension method "posix-rename@openssh.com" for
|
|
sftp-server(8) to perform POSIX atomic rename() operations.
|
|
(bz#1400)
|
|
* Removed the fixed limit of 100 file handles in sftp-server(8). The
|
|
server will now dynamically allocate handles up to the number of
|
|
available file descriptors. (bz#1397)
|
|
* ssh(8) will now skip generation of SSH protocol 1 ephemeral server
|
|
keys when in inetd mode and protocol 2 connections are negotiated.
|
|
This speeds up protocol 2 connections to inetd-mode servers that
|
|
also allow Protocol 1 (bz#440)
|
|
* Accept the PermitRootLogin directive in a sshd_config(5) Match
|
|
block. Allows for, e.g. permitting root only from the local
|
|
network.
|
|
* Reworked sftp(1) argument splitting and escaping to be more
|
|
internally consistent (i.e. between sftp commands) and more
|
|
consistent with sh(1). Please note that this will change the
|
|
interpretation of some quoted strings, especially those with
|
|
embedded backslash escape sequences. (bz#778)
|
|
* Support "Banner=none" in sshd_config(5) to disable sending of a
|
|
pre-login banner (e.g. in a Match block).
|
|
* ssh(1) ProxyCommands are now executed with $SHELL rather than
|
|
/bin/sh.
|
|
* ssh(1)'s ConnectTimeout option is now applied to both the TCP
|
|
connection and the SSH banner exchange (previously it just covered
|
|
the TCP connection). This allows callers of ssh(1) to better detect
|
|
and deal with stuck servers that accept a TCP connection but don't
|
|
progress the protocol, and also makes ConnectTimeout useful for
|
|
connections via a ProxyCommand.
|
|
* Many new regression tests, including interop tests against PuTTY's
|
|
plink.
|
|
* Support BSM auditing on Mac OS X
|
|
* bugfixes
|
|
- remove addrlist, pam_session_close, strict-aliasing-fix patches
|
|
(not needed anymore)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Mar 25 11:10:14 CET 2008 - anicka@suse.cz
|
|
|
|
- fix CVE-2008-1483 (bnc#373527)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 4 11:11:52 CET 2008 - anicka@suse.cz
|
|
|
|
- fix privileges of a firewall definition file [#351193]
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Dec 15 00:10:13 CET 2007 - anicka@suse.cz
|
|
|
|
- add patch calling pam with root privileges [#334559]
|
|
- drop pwname-home patch [#104773]
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Dec 7 22:28:40 CET 2007 - anicka@suse.cz
|
|
|
|
- fix race condition in xauth patch
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Dec 5 10:45:36 CET 2007 - anicka@suse.cz
|
|
|
|
- update to 4.7p1
|
|
* Add "-K" flag for ssh to set GSSAPIAuthentication=yes and
|
|
GSSAPIDelegateCredentials=yes. This is symmetric with -k
|
|
* make scp try to skip FIFOs rather than blocking when nothing is
|
|
listening.
|
|
* increase default channel windows
|
|
* put the MAC list into a display
|
|
* many bugfixes
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Oct 8 16:34:06 CEST 2007 - anicka@suse.cz
|
|
|
|
- block SIGALRM only during calling syslog() [#331032]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Sep 13 15:50:39 CEST 2007 - nadvornik@suse.cz
|
|
|
|
- fixed checking of an untrusted cookie, CVE-2007-4752 [#308521]
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Aug 28 18:25:57 CEST 2007 - anicka@suse.cz
|
|
|
|
- fix blocksigalrm patch to set old signal mask after
|
|
writing the log in every case [#304819]
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Aug 21 04:51:45 CEST 2007 - anicka@suse.cz
|
|
|
|
- avoid generating ssh keys when a non-standard location
|
|
is configured [#281228]
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jul 25 16:18:50 CEST 2007 - anicka@suse.cz
|
|
|
|
- fixed typo in sshd.fw [#293764]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 19 19:14:26 CET 2007 - nadvornik@suse.cz
|
|
|
|
- fixed default for ChallengeResponseAuthentication [#255374]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 12 10:56:31 CET 2007 - anicka@suse.cz
|
|
|
|
- update to 4.6p1
|
|
* sshd now allows the enabling and disabling of authentication
|
|
methods on a per user, group, host and network basis via the
|
|
Match directive in sshd_config.
|
|
* Allow multiple forwarding options to work when specified in a
|
|
PermitOpen directive
|
|
* Clear SIGALRM when restarting due to SIGHUP. Prevents stray
|
|
signal from taking down sshd if a connection was pending at
|
|
the time SIGHUP was received
|
|
* hang on exit" when background processes are running at the
|
|
time of exit on a ttyful/login session
|
|
* some more bugfixes
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 5 11:03:41 CET 2007 - anicka@suse.cz
|
|
|
|
- fix path for firewall definition
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 1 15:14:23 CET 2007 - anicka@suse.cz
|
|
|
|
- add support for Linux audit (FATE #120269)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Feb 21 11:21:48 CET 2007 - anicka@suse.cz
|
|
|
|
- add firewall definition [#246921], FATE #300687,
|
|
source: sshd.fw
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Jan 6 12:30:16 CET 2007 - anicka@suse.cz
|
|
|
|
- disable SSHv1 protocol in default configuration [#231808]
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Dec 12 14:41:45 CET 2006 - anicka@suse.cz
|
|
|
|
- update to 4.5p1
|
|
* Use privsep_pw if we have it, but only require it if we
|
|
absolutely need it.
|
|
* Correctly check for bad signatures in the monitor, otherwise
|
|
the monitor and the unpriv process can get out of sync.
|
|
* Clear errno before calling the strtol functions.
|
|
* exit instead of doing a blocking tcp send if we detect
|
|
a client/server timeout, since the tcp sendqueue might
|
|
be already full (of alive requests)
|
|
* include signal.h, errno.h, sys/in.h
|
|
* some more bugfixes
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Nov 22 13:42:32 CET 2006 - anicka@suse.cz
|
|
|
|
- fixed README.SuSE [#223025]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Nov 9 13:59:35 CET 2006 - anicka@suse.cz
|
|
|
|
- backport security fixes from openssh 4.5 (#219115)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Nov 7 13:43:44 CET 2006 - ro@suse.de
|
|
|
|
- fix manpage permissions
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Oct 31 14:04:52 CET 2006 - anicka@suse.cz
|
|
|
|
- fix gssapi_krb5-fix patch [#215615]
|
|
- fix xauth patch
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Oct 10 16:07:11 CEST 2006 - postadal@suse.cz
|
|
|
|
- fixed building openssh from src.rpm [#176528] (gssapi_krb5-fix.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Oct 3 14:44:08 CEST 2006 - postadal@suse.cz
|
|
|
|
- updated to version 4.4p1 [#208662]
|
|
* fixed pre-authentication DoS, that would cause sshd(8) to spin
|
|
until the login grace time expired
|
|
* fixed unsafe signal hander, which was vulnerable to a race condition
|
|
that could be exploited to perform a pre-authentication DoS
|
|
* fixed a GSSAPI authentication abort that could be used to determine
|
|
the validity of usernames on some platforms
|
|
* implemented conditional configuration in sshd_config(5) using the
|
|
"Match" directive
|
|
* added support for Diffie-Hellman group exchange key agreement with a
|
|
final hash of SHA256
|
|
* added a "ForceCommand", "PermitOpen" directive to sshd_config(5)
|
|
* added optional logging of transactions to sftp-server(8)
|
|
* ssh(1) will now record port numbers for hosts stored in
|
|
~/.ssh/authorized_keys when a non-standard port has been requested
|
|
* added an "ExitOnForwardFailure" option to cause ssh(1) to exit (with
|
|
a non-zero exit code) when requested port forwardings could not be
|
|
established
|
|
* extended sshd_config(5) "SubSystem" declarations to allow the
|
|
specification of command-line arguments
|
|
- removed obsoleted patches: autoconf-fix.patch, dos-fix.patch
|
|
- fixed gcc issues (gcc-fix.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Sep 20 17:34:54 CEST 2006 - postadal@suse.cz
|
|
|
|
- fixed DoS by CRC compensation attack detector [#206917] (dos-fix.patch)
|
|
- fixed client NULL deref on protocol error
|
|
- cosmetic fix in init script [#203826]
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Sep 1 14:14:52 CEST 2006 - kukuk@suse.de
|
|
|
|
- sshd.pamd: Add pam_loginuid, move pam_nologin to a better position
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Aug 25 15:37:46 CEST 2006 - postadal@suse.cz
|
|
|
|
- fixed path for xauth [#198676]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Aug 3 15:07:41 CEST 2006 - postadal@suse.cz
|
|
|
|
- fixed build with X11R7
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jul 20 17:25:27 CEST 2006 - postadal@suse.cz
|
|
|
|
- updated to version 4.3p2
|
|
* experimental support for tunneling network packets via tun(4)
|
|
- removed obsoleted patches: pam-error.patch, CVE-2006-0225.patch,
|
|
scp.patch, sigalarm.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Feb 13 12:54:28 CET 2006 - postadal@suse.cz
|
|
|
|
- upstream fixes
|
|
- fixed "scp a b c", when c is not directory (scp.patch)
|
|
- eliminate some code duplicated in privsep and non-privsep paths, and
|
|
explicitly clear SIGALRM handler (sigalarm.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Feb 3 19:02:49 CET 2006 - postadal@suse.cz
|
|
|
|
- fixed local arbitrary command execution vulnerability [#143435]
|
|
(CVE-2006-0225.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Feb 2 13:19:41 CET 2006 - postadal@suse.cz
|
|
|
|
- fixed xauth.diff for disabled UsePrivilegeSeparation mode [#145809]
|
|
- build on s390 without Smart card support (opensc) [#147383]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jan 30 16:25:01 CET 2006 - postadal@suse.cz
|
|
|
|
- fixed patch xauth.diff [#145809]
|
|
- fixed comments [#142989]
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jan 25 21:39:06 CET 2006 - mls@suse.de
|
|
|
|
- converted neededforbuild to BuildRequires
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jan 16 18:05:44 CET 2006 - meissner@suse.de
|
|
|
|
- added -fstack-protector.
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jan 3 15:46:33 CET 2006 - postadal@suse.cz
|
|
|
|
- updated to version 4.2p1
|
|
- removed obsoleted patches: upstream_fixes.diff, gssapi-secfix.patch
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Nov 15 17:51:07 CET 2005 - postadal@suse.cz
|
|
|
|
- do not delegate GSSAPI credentials to log in with a different method
|
|
than GSSAPI [#128928] (CAN-2005-2798, gssapi-secfix.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Oct 23 10:40:24 CEST 2005 - postadal@suse.cz
|
|
|
|
- fixed PAM to send authentication failing mesaage to client [#130043]
|
|
(pam-error.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Sep 14 16:58:14 CEST 2005 - postadal@suse.cz
|
|
|
|
- fixed uninitialized variable in patch xauth.diff [#98815]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Sep 8 15:56:37 CEST 2005 - postadal@suse.cz
|
|
|
|
- don't strip
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Sep 5 20:04:04 CEST 2005 - postadal@suse.cz
|
|
|
|
- added patch xauth.diff prevent from polluting xauthority file [#98815]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Aug 22 18:12:20 CEST 2005 - postadal@suse.cz
|
|
|
|
- fixed problem when multiple accounts have same UID [#104773]
|
|
(pwname-home.diff)
|
|
- added fixes from upstream (upstream_fixes.diff)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Aug 18 17:50:46 CEST 2005 - postadal@suse.cz
|
|
|
|
- added patch tmpdir.diff for using $TMPDIR by ssh-agent [#95731]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Aug 4 11:29:38 CEST 2005 - uli@suse.de
|
|
|
|
- parallelize build
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Aug 1 17:48:02 CEST 2005 - postadal@suse.cz
|
|
|
|
- added patch resolving problems with hostname changes [#98627]
|
|
(xauthlocalhostname.diff)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jun 22 18:42:57 CEST 2005 - kukuk@suse.de
|
|
|
|
- Compile/link with -fpie/-pie
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jun 15 17:41:24 CEST 2005 - meissner@suse.de
|
|
|
|
- build x11-ask-pass with RPM_OPT_FLAGS.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jun 10 16:18:25 CEST 2005 - postadal@suse.cz
|
|
|
|
- updated to version 4.1p1
|
|
- removed obsoleted patches: restore_terminal, pam-returnfromsession,
|
|
timing-attacks-fix, krb5ccname, gssapi-pam, logdenysource,
|
|
sendenv-fix, documentation-fix
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 10 10:36:42 CET 2005 - postadal@suse.cz
|
|
|
|
- fixed SendEnv config parsing bug
|
|
- documented timeout on untrusted x11 forwarding sessions (openssh#849)
|
|
- mentioned ForwardX11Trusted in ssh.1 (openssh#987)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 3 13:29:13 CET 2005 - postadal@suse.cz
|
|
|
|
- enabled accepting and sending locale environment variables in protocol 2
|
|
[#65747, #50091]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Feb 24 16:33:54 CET 2005 - postadal@suse.cz
|
|
|
|
- added patches from cvs: gssapi-pam (openssh#918),
|
|
krb5ccname (openssh#445), logdenysource (openssh#909)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Feb 3 13:29:23 CET 2005 - postadal@suse.cz
|
|
|
|
- fixed keyboard-interactive/pam/Kerberos leaks info about user existence
|
|
[#48329] (openssh#971, CAN-2003-0190)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jan 19 15:58:07 CET 2005 - postadal@suse.cz
|
|
|
|
- splited spec file to decreas number of build dependencies
|
|
- fixed restoring terminal setting after Ctrl+C during password prompt in scp/sftp [#43309]
|
|
- allowed users to see output from failing PAM session modules (openssh #890,
|
|
pam-returnfromsession.patch)
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Nov 8 17:17:45 CET 2004 - kukuk@suse.de
|
|
|
|
- Use common-* PAM config files for sshd PAM configuration
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Oct 25 15:14:49 CEST 2004 - postadal@suse.cz
|
|
|
|
- switched heimdal-* to kerberos-devel-packages in #needforbuild
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Sep 3 15:03:01 CEST 2004 - ro@suse.de
|
|
|
|
- fix lib64 issue
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Aug 31 16:03:54 CEST 2004 - postadal@suse.cz
|
|
|
|
- updated to version 3.9p1
|
|
|
|
- removed obsoleted patches: scp-fix.diff and window_change-fix.diff
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Aug 26 15:40:53 CEST 2004 - postadal@suse.cz
|
|
|
|
- added openssh-askpass-gnome subpackage
|
|
- added ssh-askpass script for choosing askpass depending on windowmanager
|
|
(by Robert Love <rml@novell.com>)
|
|
- build with Smart card support (opensc) [#44289]
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Aug 17 15:52:20 CEST 2004 - postadal@suse.cz
|
|
|
|
- removed old implementation of "Update Messages" [#36059]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Aug 12 16:36:53 CEST 2004 - postadal@suse.cz
|
|
|
|
- updated to version 3.8p1
|
|
|
|
- removed obsoleted patches: sftp-progress-fix and pam-fix4
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jun 28 16:56:23 CEST 2004 - meissner@suse.de
|
|
|
|
- block sigalarm during syslog output or we might deadlock
|
|
on recursively entering syslog(). (LTC#9523, SUSE#42354)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed May 26 15:27:32 CEST 2004 - postadal@suse.cz
|
|
|
|
- fixed commented default value for GSSAPI
|
|
|
|
-------------------------------------------------------------------
|
|
Thu May 20 21:23:27 CEST 2004 - mludvig@suse.cz
|
|
|
|
- Load drivers for available hardware crypto accelerators.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Apr 30 15:03:39 CEST 2004 - postadal@suse.cz
|
|
|
|
- updated README.kerberos (GSSAPICleanupCreds renamed to GSSAPICleanupCredentials)
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Apr 19 14:41:01 CEST 2004 - postadal@suse.cz
|
|
|
|
- updated README.SuSE (GSSAPICleanupCreds renamed to GSSAPICleanupCredentials)
|
|
[#39010]
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Mar 26 17:24:45 CET 2004 - postadal@suse.cz
|
|
|
|
- fixed sshd(8) and sshd_config(5) man pages (EAL3)
|
|
- fixed spelling errors in README.SuSE [#37086]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 25 14:50:50 CET 2004 - postadal@suse.cz
|
|
|
|
- fixed change window request [#33177]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 22 15:19:15 CET 2004 - postadal@suse.cz
|
|
|
|
- updated README.SuSE
|
|
- removed %verify from /usr/bin/ssh in specfile
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 18 15:48:52 CET 2004 - postadal@suse.cz
|
|
|
|
- fixed previous fix of security bug in scp [#35443] (CAN-2004-0175)
|
|
(was too restrictive)
|
|
- fixed permission of /usr/bin/ssh
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 15 17:56:06 CET 2004 - postadal@suse.cz
|
|
|
|
- fixed comments in sshd_config and ssh_config
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 15 17:25:08 CET 2004 - postadal@suse.cz
|
|
|
|
- enabled privilege separation mode (new version fixes a lot of problematic PAM
|
|
calling [#30328])
|
|
- fixed security bug in scp [#35443] (CAN-2004-0175)
|
|
- reverted to old behaviour of ForwardingX11 [#35836]
|
|
(set ForwardX11Trusted to 'yes' by default)
|
|
- updated README.SuSE
|
|
- fixed pam code (pam-fix4.diff, backported from openssh-SNAP-20040311)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Mar 05 13:10:55 CET 2004 - postadal@suse.cz
|
|
|
|
- updated README.SuSE (Remote x11 clients are now untrusted by default) [#35368]
|
|
- added gssapimitm patch (support for old GSSAPI)
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 01 18:13:37 CET 2004 - postadal@suse.cz
|
|
|
|
- updated to version 3.8p1
|
|
* The "gssapi" support has been replaced with the "gssapi-with-mic"
|
|
to fix possible MITM attacks. These two versions are not compatible.
|
|
|
|
- removed obsoleted patches: krb5.patch, dns-lookups.patch, pam-fix.diff,
|
|
pam-end-fix.diff
|
|
- used process forking instead pthreads
|
|
(developers fixed bugs in pam calling and they recommended to don't use threads)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 24 11:37:17 CET 2004 - postadal@suse.cz
|
|
|
|
- fixed the problem with save_argv in sshd.c re-apeared again in version 3.7.1p2
|
|
(it caused bad behaviour after receiving SIGHUP - used by reload of init script)
|
|
[#34845]
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Feb 18 18:06:20 CET 2004 - kukuk@suse.de
|
|
|
|
- Real strict-aliasing patch
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Feb 18 16:04:17 CET 2004 - postadal@suse.cz
|
|
|
|
- fixed strict-aliasing patch [#34551]
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Feb 14 00:20:09 CET 2004 - adrian@suse.de
|
|
|
|
- provide SLP registration file /etc/slp.reg.d/ssh.reg
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 03 15:18:36 CET 2004 - postadal@suse.cz
|
|
|
|
- used patch from pam-end-fix.diff [#33132]
|
|
- fixed instalation openssh without documentation [#33937]
|
|
- fixed auth-pam.c which breaks strict aliasing
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jan 19 13:19:32 CET 2004 - meissner@suse.de
|
|
|
|
- Added a ; to ssh-key-converter.c to fix gcc 3.4 build.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 16 12:57:41 CET 2004 - kukuk@suse.de
|
|
|
|
- Add pam-devel to neededforbuild
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Nov 06 10:14:31 CET 2003 - postadal@suse.cz
|
|
|
|
- added /usr/bin/slogin explicitly to %file list [#32921]
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Nov 2 21:10:35 CET 2003 - adrian@suse.de
|
|
|
|
- add %run_permissions to fix build
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Oct 14 12:23:36 CEST 2003 - postadal@suse.cz
|
|
|
|
- reverted value UsePAM to "yes" and set PasswordAuthentication to "no"
|
|
in file /etc/ssh/sshd_config (the version 3.7.1p2 disabled PAM support
|
|
by default) [#31749]
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Sep 23 15:02:00 CEST 2003 - draht@suse.de
|
|
|
|
- New version 3.7.1p2; signature from 86FF9C48 Damien Miller
|
|
verified for source tarball. Bugs fixed with this version:
|
|
#31637 (CAN-2003-0786, CAN-2003-0786). Briefly:
|
|
1) SSH1 PAM challenge response auth ignored the result of the
|
|
authentication (with privsep off)
|
|
2) The PAM conversation function trashed the stack, by referring
|
|
to the **resp parameter as an array of pointers rather than
|
|
as a pointer to an array of struct pam_responses.
|
|
At least security bug 1) is exploitable.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Sep 19 19:56:01 CEST 2003 - postadal@suse.cz
|
|
|
|
- use pthreads instead process forking (it needs by pam modules)
|
|
- fixed bug in calling pam_setcred [#31025]
|
|
(pam-fix.diff - string "FILE:" added to begin of KRB5CCNAME)
|
|
- updated README.SuSE
|
|
- reverted ChallengeResponseAuthentication option to default value yes
|
|
(necessary for pam authentication) [#31432]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Sep 18 18:34:33 CEST 2003 - postadal@suse.cz
|
|
|
|
- updated to version 3.7.1p1 (with security patches)
|
|
- removed obsoleted patches: chauthtok.patch, krb-include-fix.diff,
|
|
gssapi-fix.diff, saveargv-fix.diff, gssapi-20030430.diff, racecondition-fix
|
|
- updated README.kerberos
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Sep 16 16:57:02 CEST 2003 - postadal@suse.cz
|
|
|
|
- fixed race condition in allocating memory [#31025] (CAN-2003-0693)
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Sep 15 11:52:20 CEST 2003 - postadal@suse.cz
|
|
|
|
- disabled privilege separation, which caused some problems [#30328]
|
|
(updated README.SuSE)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Sep 04 11:59:39 CEST 2003 - postadal@suse.cz
|
|
|
|
- fixed bug in x11-ssh-askpass dialog [#25846] (askpass-fix.diff is workaround for gcc bug)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Aug 29 11:39:40 CEST 2003 - kukuk@suse.de
|
|
|
|
- Call useradd -r for system account [Bug #29611]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Aug 25 10:40:37 CEST 2003 - postadal@suse.cz
|
|
|
|
- use new stop_on_removal/restart_on_upate macros
|
|
- fixed lib64 problem in /etc/ssh/sshd_config [#28766]
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Aug 19 11:21:33 CEST 2003 - mmj@suse.de
|
|
|
|
- Add sysconfig metadata [#28943]
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Aug 1 01:57:08 CEST 2003 - ro@suse.de
|
|
|
|
- add e2fsprogs-devel to neededforbuild
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jul 24 19:47:14 CEST 2003 - postadal@suse.cz
|
|
|
|
- updated to version 3.6.1p2
|
|
- added the new version of patch for GSSAPI (gssapi-20030430.diff),
|
|
the older one was removed (gssapi.patch)
|
|
- added README.kerberos to filelist
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jun 3 00:41:08 CEST 2003 - mmj@suse.de
|
|
|
|
- Remove files we don't package
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Apr 02 15:03:44 CEST 2003 - postadal@suse.cz
|
|
|
|
- fixed bad behaviour after receiving SIGHUP (this bug caused not working reload of init script)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Mar 18 14:25:08 CET 2003 - postadal@suse.cz
|
|
|
|
- added $remote_fs to init.d script (needed if /usr is on remote fs [#25577])
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 13 17:02:52 CET 2003 - postadal@suse.cz
|
|
|
|
- fixed segfault while using GSSAPI for authentication when connecting to localhost (took care about error value of ssh_gssapi_import_name() in function ssh_gssapi_client_ctx())
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 10 09:28:31 CET 2003 - kukuk@suse.de
|
|
|
|
- Remove extra "/" from pid file path.
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 03 16:49:24 CET 2003 - postadal@suse.cz
|
|
|
|
- modified init.d script (now checking sshd.init.pid instead of port 22) [#24263]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 3 16:05:24 CET 2003 - okir@suse.de
|
|
|
|
- added comment to /etc/pam.d/ssh on how to enable
|
|
support for resmgr (#24363).
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Feb 21 18:52:05 CET 2003 - postadal@suse.cz
|
|
|
|
- added ssh-copy-id shell script [#23745]
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Feb 14 13:42:14 CET 2003 - postadal@suse.cz
|
|
|
|
- given back gssapi and dns-lookups patches
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jan 22 23:05:35 CET 2003 - postadal@suse.cz
|
|
|
|
- updated to version 3.5p1
|
|
- removed obsolete patches: owl-mm, forced-commands-only, krb
|
|
- added patch krb5 (for heimdal)
|
|
- temporarily removed gssapi patch and dns-lookups (needs rewriting)
|
|
- fix sysconfig metadata
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Dec 5 10:52:41 CET 2002 - okir@suse.de
|
|
|
|
- avoid Kerberos DNS lookups in the default config (#20395)
|
|
- added README.kerberos
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Sep 19 11:00:46 CEST 2002 - postadal@suse.cz
|
|
|
|
- added info about changes in the new version of openssh
|
|
to README.SuSE [#19757]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Sep 2 10:39:24 CEST 2002 - okir@suse.de
|
|
|
|
- privsep directory now /var/lib/empty, which is provided by
|
|
filesystem package (#17556)
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Aug 28 05:48:16 CEST 2002 - nashif@suse.de
|
|
|
|
- Added insserv & co to PreReq
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Aug 26 11:57:20 CEST 2002 - okir@suse.de
|
|
|
|
- applied patch that adds GSSAPI support in protocol version 2 (#18239)
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Aug 22 14:09:43 CEST 2002 - postadal@suse.cz
|
|
|
|
- added the patch to fix malfunction of PermitRootLogin seted to
|
|
forced-commands-only [#17149]
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Aug 9 14:41:30 CEST 2002 - okir@suse.de
|
|
|
|
- syslog now reports kerberos auth method when logging in via
|
|
kerberos (#17469)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jul 23 04:34:10 PDT 2002 - okir@suse.de
|
|
|
|
- enabled kerberos support
|
|
- added patch to support kerberos 5 authentication in privsep mode.
|
|
- added missing section 5 manpages
|
|
- added missing ssh-keysign to files list (new for privsep)
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jul 22 14:16:54 CEST 2002 - okir@suse.de
|
|
|
|
- fixed handling of expired passwords in privsep mode
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jul 9 13:48:52 CEST 2002 - mmj@suse.de
|
|
|
|
- Don't source rc.config
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jul 3 01:01:24 CEST 2002 - draht@suse.de
|
|
|
|
- ssh-keygen must be told to explicitly create type rsa1 keys
|
|
in the start script.
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jul 2 12:03:58 CEST 2002 - ro@suse.de
|
|
|
|
- useradd/groupadd in preinstall to standardize
|
|
|
|
-------------------------------------------------------------------
|
|
Sat Jun 29 10:33:18 CEST 2002 - ro@suse.de
|
|
|
|
- updated patch from solar: zero out bytes for no longer used pages
|
|
in mmap-fallback solution
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jun 27 18:07:37 CEST 2002 - ro@suse.de
|
|
|
|
- updated owl-fallback.diff from solar
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jun 27 17:04:16 CEST 2002 - ro@suse.de
|
|
|
|
- update to 3.4p1
|
|
o privilege separation support
|
|
o overflow fix from ISS
|
|
- unsplit openssh-server and openssh-client
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jun 18 12:12:41 CEST 2002 - mmj@suse.de
|
|
|
|
- Update to 3.2.3p1 which fixed following compared to 3.2.2p1
|
|
o a defect in the BSD_AUTH access control handling for
|
|
o login/tty problems on Solaris (bug #245)
|
|
o build problems on Cygwin systems
|
|
|
|
- Split the package to openssh, openssh-server, openssh-client and
|
|
openssh-askpass
|
|
|
|
-------------------------------------------------------------------
|
|
Sun May 19 16:15:03 CEST 2002 - mmj@suse.de
|
|
|
|
- Updated to 3.2.2p which includes security and several bugfixes.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Mar 15 12:05:21 CET 2002 - ro@suse.de
|
|
|
|
- added "Obsoletes: ssh"
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Mar 5 17:15:30 MET 2002 - draht@suse.de
|
|
|
|
- security fix for bug in channels.c (channelbug.dif)
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Mar 1 15:40:59 CET 2002 - bk@suse.de
|
|
|
|
- fix ssh-agent example to use eval `ssh-agent -s` and a typo.
|
|
- add sentence on use of ssh-agent with startx
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 26 12:31:21 CET 2002 - bk@suse.de
|
|
|
|
- update README.SuSE to improve documentation on protocol version
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Feb 13 13:15:41 CET 2002 - cihlar@suse.cz
|
|
|
|
- rewritten addrlist patch - "0.0.0.0" is removed from list
|
|
after "::" is successful [#8951]
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Feb 11 15:17:32 CET 2002 - cihlar@suse.cz
|
|
|
|
- added info about the change of the default protocol version
|
|
to README.SuSE
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Feb 7 12:42:53 CET 2002 - cihlar@suse.cz
|
|
|
|
- removed addrlist patch which fixed bug [#8951] as it breaks
|
|
functionality on machines with kernel without IPv6 support,
|
|
bug reopened, new solution will be find
|
|
- switched to default protocol version 2
|
|
- added ssh-keyconvert (thanks Olaf Kirch <okir@suse.de>)
|
|
- removed static linking against libcrypto, as crypt() was removed
|
|
from it [#5333]
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jan 22 15:43:33 CET 2002 - kukuk@suse.de
|
|
|
|
- Add pam_nologin to account management (else it will not be
|
|
called if user does not do password authentification)
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jan 15 15:49:07 CET 2002 - egmont@suselinux.hu
|
|
|
|
- removed colon from shutdown message
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 10 09:27:50 CET 2002 - cihlar@suse.cz
|
|
|
|
- use %{_lib}
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Dec 13 01:01:36 CET 2001 - ro@suse.de
|
|
|
|
- moved rc.config.d -> sysconfig
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Dec 10 14:07:21 CET 2001 - cihlar@suse.cz
|
|
|
|
- removed START_SSHD
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Dec 7 11:26:22 CET 2001 - cihlar@suse.cz
|
|
|
|
- update to version 3.0.2p1:
|
|
* CheckMail option in sshd_config is deprecated
|
|
* X11 cookies are now stored in $HOME
|
|
* fixed a vulnerability in the UseLogin option
|
|
* /etc/ssh_known_hosts2 and ~/.ssh/known_hosts2 are obsolete,
|
|
/etc/ssh_known_hosts and ~/.ssh/known_hosts can be used
|
|
* several minor fixes
|
|
- update x11-ssh-askpass to version 1.2.4.1:
|
|
* fixed Imakefile.in
|
|
- fixed bug in adresses "::" and "0.0.0.0" [#8951]
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Oct 5 07:34:11 CEST 2001 - cihlar@suse.cz
|
|
|
|
- update to version 2.9.9p2
|
|
- removed obsolete clientloop and command patches
|
|
- uncommented "HostKey /etc/ssh/ssh_host_rsa_key" in sshd_config
|
|
- added German translation of e-mail to sysadmin
|
|
- init script fixed to work when more listening sshd runs
|
|
- added /bin/netstat to requires
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Sep 24 14:25:58 CEST 2001 - cihlar@suse.cz
|
|
|
|
- fixed security problem with sftp & bypassing
|
|
keypair auth restrictions - patch based on CVS
|
|
- fixed status part of init script - it returned
|
|
running even if there were only sshd of connections
|
|
and no listening sshd [#11220]
|
|
- fixed stop part of init script - when there was no
|
|
/var/run/sshd.pid, all sshd were killed
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Sep 6 14:31:15 CEST 2001 - nadvornik@suse.cz
|
|
|
|
- added patch for correct buffer flushing from CVS [bug #6450]
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jul 27 09:05:24 CEST 2001 - cihlar@suse.cz
|
|
|
|
- update x11-ssh-askpass to version 1.2.2
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jul 26 10:55:16 CEST 2001 - cihlar@suse.cz
|
|
|
|
- update to version 2.9p2
|
|
- removed obsolete "cookies" patch
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Jun 11 11:21:22 CEST 2001 - cihlar@suse.cz
|
|
|
|
- fixed to compile with new xmkmf
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jun 7 09:42:23 CEST 2001 - cihlar@suse.cz
|
|
|
|
- fixed security bug when any file "cookies" could
|
|
be removed by anybody
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jun 5 12:49:50 CEST 2001 - bjacke@suse.de
|
|
|
|
- generate rsa host key in init script
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jun 5 07:59:41 CEST 2001 - cihlar@suse.cz
|
|
|
|
- removed complete path from PAM modules
|
|
|
|
-------------------------------------------------------------------
|
|
Thu May 3 09:36:17 CEST 2001 - cihlar@suse.cz
|
|
|
|
- update to version 2.9p1
|
|
- removed obsolete --with-openssl
|
|
- removed obsolete man patch
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Apr 30 07:50:23 CEST 2001 - cihlar@suse.cz
|
|
|
|
- enable PAM support
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Apr 13 11:50:26 CEST 2001 - ro@suse.de
|
|
|
|
- fixed specfile for extra README.SuSE
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Apr 13 08:03:45 CEST 2001 - cihlar@suse.cz
|
|
|
|
- fixed init script by new skeleton
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Mar 22 14:56:50 CET 2001 - cihlar@suse.cz
|
|
|
|
- update to version 2.5.2p2
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Mar 14 14:12:38 CET 2001 - cihlar@suse.cz
|
|
|
|
- fixed ssh man page
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 12 07:56:37 CET 2001 - cihlar@suse.cz
|
|
|
|
- update to version 2.5.1p2
|
|
- added xf86 to neededforbuild
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Mar 9 15:16:59 CET 2001 - schwab@suse.de
|
|
|
|
- Fix missing crypt declaration.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Feb 23 08:57:55 CET 2001 - cihlar@suse.cz
|
|
|
|
- update to version 2.5.1p1
|
|
- update x11-ssh-askpass to version 1.2.0
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 20 11:27:20 CET 2001 - cihlar@suse.cz
|
|
|
|
- modified README.SuSE [#4365]
|
|
- fixed start script to agree with skeleton
|
|
- fixed start script so "stop" kills only sshd
|
|
listening for connections
|
|
- compiled with --with-openssl
|
|
- "ListenAddress 0.0.0.0" in sshd_config commented out -
|
|
listen on both ipv4 and ipv6
|
|
- fixed var/adm/notify/messages/openssh_update [#6406]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 25 15:02:01 CET 2001 - smid@suse.cz
|
|
|
|
- startup script fixed [#5559]
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jan 16 09:40:50 CET 2001 - nadvornik@suse.cz
|
|
|
|
- libcrypto linked static [#5333]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 11 13:41:48 CET 2001 - cihlar@suse.cz
|
|
|
|
- uncomment sftp-server part in sshd_config
|
|
- added /usr/X11R6/lib/X11/app-defaults/SshAskpass to %files
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 11 12:37:10 CET 2001 - cihlar@suse.cz
|
|
|
|
- fixed %files [#5230]
|
|
- fixed installation of x11-ssh-askpass to BuildRoot
|
|
- added man pages of x11-ssh-askpass
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jan 10 11:54:42 CET 2001 - smid@suse.cz
|
|
|
|
- notice about how to enable ipv6 added to mail
|
|
- for administrator [#5297]
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Dec 13 10:43:25 CET 2000 - smid@suse.cz
|
|
|
|
- default ipv6 listennig disabled (problems with libc2.2) [#4588]
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Dec 5 14:03:35 CET 2000 - smid@suse.cz
|
|
|
|
- notify message changed
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Dec 4 21:45:35 CET 2000 - lmuelle@suse.de
|
|
|
|
- fixed provides/ conflicts to ssh
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Nov 30 16:03:34 CET 2000 - smid@suse.cz
|
|
|
|
- path to ssh-askpass fixed
|
|
- stop in %preun removed
|
|
- new init style
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Nov 26 23:53:53 CET 2000 - schwab@suse.de
|
|
|
|
- Restore rcsshd link.
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Nov 26 15:34:12 CET 2000 - kukuk@suse.de
|
|
|
|
- Add openssl-devel to neededforbuild
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Nov 20 16:11:34 CET 2000 - smid@suse.cz
|
|
|
|
- New version 2.3.0
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Sep 6 12:52:06 CEST 2000 - smid@suse.cz
|
|
|
|
- remove --with-ipv4-default option
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jul 5 19:04:28 CEST 2000 - garloff@suse.de
|
|
|
|
- ... and tell the sysadmin and user more about what they can do
|
|
about it (schwab).
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jul 5 00:55:37 CEST 2000 - garloff@suse.de
|
|
|
|
- Inform the user (admin) about the fact that the default behaviour
|
|
with respect to X11-forwarding has been changed to be disabled.
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Jun 28 13:11:08 CEST 2000 - smid@suse.cz
|
|
|
|
- warning that generating DSA key can an take a long time.
|
|
(bugzilla 3015)
|
|
- writing to wtmp and lastlog fixed (bugzilla 3024)
|
|
- reading config file (parameter Protocol) fixed
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jun 16 10:42:52 CEST 2000 - garloff@suse.de
|
|
|
|
- Added generation of ssh_host_dsa_key
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jun 13 08:32:19 MEST 2000 - nadvornik@suse.cz
|
|
|
|
- update to 2.1.1p1
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jun 8 10:10:55 MEST 2000 - cihlar@suse.cz
|
|
|
|
- uncommented %clean
|
|
|
|
-------------------------------------------------------------------
|
|
Fri May 5 13:08:15 CEST 2000 - smid@suse.cz
|
|
|
|
- buildroot added
|
|
- upgrade to 1.2.3
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Mar 21 09:50:57 CET 2000 - kukuk@suse.de
|
|
|
|
- Update to 1.2.2p1
|
|
|
|
-------------------------------------------------------------------
|
|
Mon Mar 6 12:03:49 CET 2000 - kukuk@suse.de
|
|
|
|
- Fix the diff.
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Mar 5 18:22:07 CET 2000 - kukuk@suse.de
|
|
|
|
- Add a README.SuSE with a short description how to use ssh-add
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Feb 29 21:03:50 CET 2000 - schwab@suse.de
|
|
|
|
- Update config.{guess,sub}.
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Feb 25 11:01:24 CET 2000 - kukuk@suse.de
|
|
|
|
- Fix need for build, add group tag.
|
|
|
|
-------------------------------------------------------------------
|
|
Wed Feb 2 09:23:13 CET 2000 - kukuk@suse.de
|
|
|
|
- Change new defaults back to old one
|
|
|
|
-------------------------------------------------------------------
|
|
Sun Jan 30 12:51:49 CET 2000 - kukuk@suse.de
|
|
|
|
- Add x11-ssh-askpass to filelist
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Jan 28 18:03:50 CET 2000 - kukuk@suse.de
|
|
|
|
- Update to OpenSSH 1.2.2
|
|
- Add x11-ssh-askpass-1.0
|
|
|
|
-------------------------------------------------------------------
|
|
Tue Jan 25 15:57:09 CET 2000 - kukuk@suse.de
|
|
|
|
- Add reload and status to /sbin/init.d/sshd [Bug 1747]
|
|
|
|
-------------------------------------------------------------------
|
|
Thu Jan 20 17:26:02 CET 2000 - kukuk@suse.de
|
|
|
|
- Update to 1.2.1pre27 with IPv6 support
|
|
|
|
-------------------------------------------------------------------
|
|
Fri Dec 31 21:18:10 CET 1999 - kukuk@suse.de
|
|
|
|
- Initial version
|