SHA256
1
0
forked from pool/openssh
Go to file
Dominique Leuenberger a68d0c642d Accepting request 738544 from network
- Add openssh-7.9p1-keygen-preserve-perms.patch (bsc#1150574).
  This attempts to preserve the permissions of any existing
  known_hosts file when modified by ssh-keygen (for instance,
  with -R).
- Add patch from upstream openssh-7.9p1-revert-new-qos-defaults.patch

- Run 'ssh-keygen -A' on startup only if SSHD_AUTO_KEYGEN="yes"
  in /etc/sysconfig/ssh. This is set to "yes" by default, but
  can be changed by the system administrator (bsc#1139089).

- Add openssh-7.9p1-keygen-preserve-perms.patch (bsc#1150574).
  This attempts to preserve the permissions of any existing
  known_hosts file when modified by ssh-keygen (for instance,
  with -R).

- Version update to 8.1p1:
  * ssh-keygen(1): when acting as a CA and signing certificates with
    an RSA key, default to using the rsa-sha2-512 signature algorithm.
    Certificates signed by RSA keys will therefore be incompatible
    with OpenSSH versions prior to 7.2 unless the default is
    overridden (using "ssh-keygen -t ssh-rsa -s ...").
  * ssh(1): Allow %n to be expanded in ProxyCommand strings
  * ssh(1), sshd(8): Allow prepending a list of algorithms to the
    default set by starting the list with the '^' character, E.g.
    "HostKeyAlgorithms ^ssh-ed25519"
  * ssh-keygen(1): add an experimental lightweight signature and
    verification ability. Signatures may be made using regular ssh keys
    held on disk or stored in a ssh-agent and verified against an
    authorized_keys-like list of allowed keys. Signatures embed a
    namespace that prevents confusion and attacks between different

OBS-URL: https://build.opensuse.org/request/show/738544
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=135
2019-10-25 16:39:52 +00:00
.gitattributes OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=1 2007-01-07 16:26:05 +00:00
.gitignore OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=1 2007-01-07 16:26:05 +00:00
cavs_driver-ssh.pl Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-allow_root_password_login.patch Accepting request 668656 from home:pmonrealgonzalez:branches:network 2019-01-28 08:02:07 +00:00
openssh-7.7p1-cavstest-ctr.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-cavstest-kdf.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-disable_openssl_abi_check.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-eal3.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-enable_PAM_by_default.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-fips_checks.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-fips.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-host_ident.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-hostname_changes_when_forwarding_X.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-IPv6_X_forwarding.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-ldap.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-no_fork-no_pid_file.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-pam_check_locks.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-pts_names_formatting.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-remove_xauth_cookies_on_exit.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-seccomp_ipc_flock.patch Accepting request 643660 from home:pmonrealgonzalez:branches:network 2018-10-22 09:08:19 +00:00
openssh-7.7p1-seccomp_stat.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-seed-prng.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-send_locale.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-sftp_force_permissions.patch - Update openssh-7.7p1-sftp_force_permissions.patch from the 2018-10-19 13:12:48 +00:00
openssh-7.7p1-sftp_print_diagnostic_messages.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.7p1-systemd-notify.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-X11_trusted_forwarding.patch Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
openssh-7.7p1-X_forward_with_disabled_ipv6.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-7.9p1-keygen-preserve-perms.patch Accepting request 738490 from home:hpjansson:branches:network 2019-10-15 07:47:08 +00:00
openssh-7.9p1-revert-new-qos-defaults.patch Accepting request 738490 from home:hpjansson:branches:network 2019-10-15 07:47:08 +00:00
openssh-8.0p1-gssapi-keyex.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-8.1p1-audit.patch Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-8.1p1.tar.gz Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-8.1p1.tar.gz.asc Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh-askpass-gnome.changes Accepting request 716585 from home:favogt:branches:network 2019-07-22 16:43:06 +00:00
openssh-askpass-gnome.spec Accepting request 737034 from home:hpjansson:branches:network 2019-10-10 13:32:50 +00:00
openssh.changes - Add patch from upstream openssh-7.9p1-revert-new-qos-defaults.patch 2019-10-15 08:09:16 +00:00
openssh.spec Accepting request 738490 from home:hpjansson:branches:network 2019-10-15 07:47:08 +00:00
README.FIPS Accepting request 432093 from home:pcerny:factory 2016-09-30 20:34:19 +00:00
README.kerberos Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
README.SUSE Accepting request 669019 from home:pmonrealgonzalez:branches:network 2019-01-28 10:41:40 +00:00
ssh-askpass Accepting request 718210 from home:Vogtinator:branches:network 2019-07-24 12:05:07 +00:00
ssh.reg OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=1 2007-01-07 16:26:05 +00:00
sshd-gen-keys-start Accepting request 738490 from home:hpjansson:branches:network 2019-10-15 07:47:08 +00:00
sshd.fw OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=7 2007-07-27 00:01:43 +00:00
sshd.pamd Accepting request 642573 from home:scarabeus_iv:branches:network 2018-10-17 08:57:56 +00:00
sshd.service - Mention upstream bugs on multiple local patches 2018-10-19 13:24:01 +00:00
sysconfig.ssh Accepting request 738490 from home:hpjansson:branches:network 2019-10-15 07:47:08 +00:00

There are following changes in default settings of ssh client and server:

* Accepting and sending of locale environment variables in protocol 2 is
  enabled.

* PAM authentication is enabled and mostly even required, do not turn it off.

* root authentiation with password is enabled by default (PermitRootLogin yes).
  NOTE: this has security implications and is only done in order to not change
  behaviour of the server in an update. We strongly suggest setting this option
  either "prohibit-password" or even better to "no" (which disables direct
  remote root login entirely).

* DSA authentication is enabled by default for maximum compatibility.
  NOTE: do not use DSA authentication since it is being phased out for a reason
  - the size of DSA keys is limited by the standard to 1024 bits which cannot
  be considered safe any more.

* Accepting all RFC4419 specified DH group parameters. See KexDHMin in
  ssh_config and sshd_config manual pages.

For more information on differences in SUSE OpenSSH package see README.FIPS