SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for openssh-helpers-8.9p1-9.4.i586.rpm :

* Mon Dec 19 2022 Otto Hollmann - Adapt OpenSSH to build with OpenSSL 3, use new KDF API (bsc#1205042) Add openssh-openssl-3.patch
* Thu Dec 15 2022 Dirk Müller - limit to openssl < 3.0 as this version is not compatible (bsc#1205042) next version update will fix it
* Thu Nov 10 2022 Hans Petter Jansson - Update openssh-8.1p1-audit.patch: Merge fix for race condition (bsc#1115550, bsc#1174162).- Add openssh-do-not-send-empty-message.patch, which prevents superfluous newlines with empty MOTD files (bsc#1192439).
* Mon Aug 08 2022 Thorsten Kukuk - Use %_pam_vendordir
* Wed Jul 06 2022 Adam Majer - openssh-8.4p1-ssh_config_d.patch: admin overrides should take priority (listed first) over package defaults
* Mon Mar 28 2022 Ludwig Nussel - read ssh and sshd config file also from /usr/etc- add openssh-server-config-rootlogin subpackage that enabled PermitRootLogin
* Mon Mar 07 2022 Hans Petter Jansson - Version update to 8.9p1: = Security
* sshd(8): fix an integer overflow in the user authentication path that, in conjunction with other logic errors, could have yielded unauthenticated access under difficult to exploit conditions. This situation is not exploitable because of independent checks in the privilege separation monitor. Privilege separation has been enabled by default in since openssh-3.2.2 (released in 2002) and has been mandatory since openssh-7.5 (released in 2017). Moreover, portable OpenSSH has used toolchain features available in most modern compilers to abort on signed integer overflow since openssh-6.5 (released in 2014). Thanks to Malcolm Stagg for finding and reporting this bug. = Potentially-incompatible changes
* sshd(8), portable OpenSSH only: this release removes in-built support for MD5-hashed passwords. If you require these on your system then we recommend linking against libxcrypt or similar.
* This release modifies the FIDO security key middleware interface and increments SSH_SK_VERSION_MAJOR. = New features
* ssh(1), sshd(8), ssh-add(1), ssh-agent(1): add a system for restricting forwarding and use of keys added to ssh-agent(1) A detailed description of the feature is available at https://www.openssh.com/agent-restrict.html and the protocol extensions are documented in the PROTOCOL and PROTOCOL.agent files in the source release.
* ssh(1), sshd(8): add the sntrup761x25519-sha512AATTopenssh.com hybrid ECDH/x25519 + Streamlined NTRU Prime post-quantum KEX to the default KEXAlgorithms list (after the ECDH methods but before the prime-group DH ones). The next release of OpenSSH is likely to make this key exchange the default method.
* ssh-keygen(1): when downloading resident keys from a FIDO token, pass back the user ID that was used when the key was created and append it to the filename the key is written to (if it is not the default). Avoids keys being clobbered if the user created multiple resident keys with the same application string but different user IDs.
* ssh-keygen(1), ssh(1), ssh-agent(1): better handling for FIDO keys on tokens that provide user verification (UV) on the device itself, including biometric keys, avoiding unnecessary PIN prompts.
* ssh-keygen(1): add \"ssh-keygen -Y match-principals\" operation to perform matching of principals names against an allowed signers file. To be used towards a TOFU model for SSH signatures in git.
* ssh-add(1), ssh-agent(1): allow pin-required FIDO keys to be added to ssh-agent(1). $SSH_ASKPASS will be used to request the PIN at authentication time.
* ssh-keygen(1): allow selection of hash at sshsig signing time (either sha512 (default) or sha256).
* ssh(1), sshd(8): read network data directly to the packet input buffer instead of indirectly via a small stack buffer. Provides a modest performance improvement.
* ssh(1), sshd(8): read data directly to the channel input buffer, providing a similar modest performance improvement.
* ssh(1): extend the PubkeyAuthentication configuration directive to accept yes|no|unbound|host-bound to allow control over one of the protocol extensions used to implement agent-restricted keys. = Bugfixes
* sshd(8): document that CASignatureAlgorithms, ExposeAuthInfo and PubkeyAuthOptions can be used in a Match block. PR277.
* sshd(8): fix possible string truncation when constructing paths to .rhosts/.shosts files with very long user home directory names.
* ssh-keysign(1): unbreak for KEX algorithms that use SHA384/512 exchange hashes
* ssh(1): don\'t put the TTY into raw mode when SessionType=none, avoids ^C being unable to kill such a session. bz3360
* scp(1): fix some corner-case bugs in SFTP-mode handling of ~-prefixed paths.
* ssh(1): unbreak hostbased auth using RSA keys. Allow ssh(1) to select RSA keys when only RSA/SHA2 signature algorithms are configured (this is the default case). Previously RSA keys were not being considered in the default case.
* ssh-keysign(1): make ssh-keysign use the requested signature algorithm and not the default for the key type. Part of unbreaking hostbased auth for RSA/SHA2 keys.
* ssh(1): stricter UpdateHostkey signature verification logic on the client- side. Require RSA/SHA2 signatures for RSA hostkeys except when RSA/SHA1 was explicitly negotiated during initial KEX; bz3375
* ssh(1), sshd(8): fix signature algorithm selection logic for UpdateHostkeys on the server side. The previous code tried to prefer RSA/SHA2 for hostkey proofs of RSA keys, but missed some cases. This will use RSA/SHA2 signatures for RSA keys if the client proposed these algorithms in initial KEX. bz3375
* All: convert all uses of select(2)/pselect(2) to poll(2)/ppoll(2). This includes the mainloops in ssh(1), ssh-agent(1), ssh-agent(1) and sftp-server(8), as well as the sshd(8) listen loop and all other FD read/writability checks. On platforms with missing or broken poll(2)/ppoll(2) syscalls a select(2)-based compat shim is available.
* ssh-keygen(1): the \"-Y find-principals\" command was verifying key validity when using ca certs but not with simple key lifetimes within the allowed signers file.
* ssh-keygen(1): make sshsig verify-time argument parsing optional
* sshd(8): fix truncation in rhosts/shosts path construction.
* ssh(1), ssh-agent(1): avoid xmalloc(0) for PKCS#11 keyid for ECDSA keys (we already did this for RSA keys). Avoids fatal errors for PKCS#11 libraries that return empty keyid, e.g. Microchip ATECC608B \"cryptoauthlib\"; bz#3364
* ssh(1), ssh-agent(1): improve the testing of credentials against inserted FIDO: ask the token whether a particular key belongs to it in cases where the token supports on-token user-verification (e.g. biometrics) rather than just assuming that it will accept it. Will reduce spurious \"Confirm user presence\" notifications for key handles that relate to FIDO keys that are not currently inserted in at least some cases. bz3366
* ssh(1), sshd(8): correct value for IPTOS_DSCP_LE. It needs to allow for the preceding two ECN bits. bz#3373
* ssh-keygen(1): add missing -O option to usage() for the \"-Y sign\" option.
* ssh-keygen(1): fix a NULL deref when using the find-principals function, when matching an allowed_signers line that contains a namespace restriction, but no restriction specified on the command-line
* ssh-agent(1): fix memleak in process_extension(); oss-fuzz issue #42719
* ssh(1): suppress \"Connection to xxx closed\" messages when LogLevel is set to \"error\" or above. bz3378
* ssh(1), sshd(8): use correct zlib flags when inflate(3)-ing compressed packet data. bz3372
* scp(1): when recursively transferring files in SFTP mode, create the destination directory if it doesn\'t already exist to match scp(1) in legacy RCP mode behaviour.
* scp(1): many improvements in error message consistency between scp(1) in SFTP mode vs legacy RCP mode.
* sshd(8): fix potential race in SIGTERM handling PR289
* ssh(1), ssh(8): since DSA keys are deprecated, move them to the end of the default list of public keys so that they will be tried last. PR295
* ssh-keygen(1): allow \'ssh-keygen -Y find-principals\' to match wildcard principals in allowed_signers files = Portability
* ssh(1), sshd(8): don\'t trust closefrom(2) on Linux. glibc\'s implementation does not work in a chroot when the kernel does not have close_range(2). It tries to read from /proc/self/fd and when that fails dies with an assertion of sorts. Instead, call close_range(2) directly from our compat code and fall back if that fails. bz#3349,
* OS X poll(2) is broken; use compat replacement. For character- special devices like /dev/null, Darwin\'s poll(2) returns POLLNVAL when polled with POLLIN. Apparently this is Apple bug 3710161 - not public but a websearch will find other OSS projects rediscovering it periodically since it was first identified in 2005.
* Correct handling of exceptfds/POLLPRI in our select(2)-based poll(2)/ppoll(2) compat implementation.
* Cygwin: correct checking of mbstowcs() return value.
* Add a basic SECURITY.md that refers people to the openssh.com website.
* Enable additional compiler warnings and toolchain hardening flags, including -Wbitwise-instead-of-logical, -Wmisleading-indentation, - fzero-call-used-regs and -ftrivial-auto-var-init.
* HP/UX. Use compat getline(3) on HP-UX 10.x, where the libc version is not reliable.- Rebased patches:
* openssh-7.7p1-ldap.patch
* openssh-8.0p1-gssapi-keyex.patch
* openssh-8.1p1-audit.patch
* openssh-8.4p1-vendordir.patch
* openssh-reenable-dh-group14-sha1-default.patch
* Tue Sep 28 2021 Hans Petter Jansson - Version update to 8.8p1: = Security
* sshd(8) from OpenSSH 6.2 through 8.7 failed to correctly initialise supplemental groups when executing an AuthorizedKeysCommand or AuthorizedPrincipalsCommand, where a AuthorizedKeysCommandUser or AuthorizedPrincipalsCommandUser directive has been set to run the command as a different user. Instead these commands would inherit the groups that sshd(8) was started with. Depending on system configuration, inherited groups may allow AuthorizedKeysCommand/AuthorizedPrincipalsCommand helper programs to gain unintended privilege. Neither AuthorizedKeysCommand nor AuthorizedPrincipalsCommand are enabled by default in sshd_config(5). = Potentially-incompatible changes
* This release disables RSA signatures using the SHA-1 hash algorithm by default. This change has been made as the SHA-1 hash algorithm is cryptographically broken, and it is possible to create chosen-prefix hash collisions for * ssh(1): allow the ssh_config(5) CanonicalizePermittedCNAMEs directive to accept a \"none\" argument to specify the default behaviour. = Bugfixes
* scp(1): when using the SFTP protocol, continue transferring files after a transfer error occurs, better matching original scp/rcp behaviour.
* ssh(1): fixed a number of memory leaks in multiplexing,
* ssh-keygen(1): avoid crash when using the -Y find-principals command.
* A number of documentation and manual improvements, including bz#3340, PR139, PR215, PR241, PR257- Additional changes from 8.7p1 release: = Potentially-incompatible changes
* scp(1): this release changes the behaviour of remote to remote copies (e.g. \"scp host-a:/path host-b:\") to transfer through the local host by default. This was previously available via the -3 flag. This mode avoids the need to expose credentials on the origin hop, avoids triplicate interpretation of filenames by the shell (by the local system, the copy origin and the destination) and, in conjunction with the SFTP support for scp(1) mentioned below, allows use of all authentication methods to the remote hosts (previously, only non-interactive methods could be used). A -R flag has been added to select the old behaviour.
* ssh(1)/sshd(8): both the client and server are now using a stricter configuration file parser. The new parser uses more shell-like rules for quotes, space and escape characters. It is also more strict in rejecting configurations that include options lacking arguments. Previously some options (e.g. DenyUsers) could appear on a line with no subsequent arguments. This release will reject such configurations. The new parser will also reject configurations with unterminated quotes and multiple \'=\' characters after the option name.
* ssh(1): when using SSHFP DNS records for host key verification, ssh(1) will verify all matching records instead of just those with the specific signature type requested. This may cause host key verification problems if stale SSHFP records of a different or legacy signature type exist alongside other records for a particular host. bz#3322
* ssh-keygen(1): when generating a FIDO key and specifying an explicit attestation challenge (using -Ochallenge), the challenge will now be hashed by the builtin security key middleware. This removes the (undocumented) requirement that challenges be exactly 32 bytes in length and matches the expectations of libfido2.
* sshd(8): environment=\"...\" directives in authorized_keys files are now first-match-wins and limited to 1024 discrete environment variable names. = New features
* scp(1): experimental support for transfers using the SFTP protocol as a replacement for the venerable SCP/RCP protocol that it has traditionally used. SFTP offers more predictable filename handling and does not require expansion of glob(3) patterns via the shell on the remote side.
* sftp-server(8): add a protocol extension to support expansion of ~/ and ~user/ prefixed paths. This was added to support these paths when used by scp(1) while in SFTP mode.
* ssh(1): add a ForkAfterAuthentication ssh_config(5) counterpart to the ssh(1) -f flag. GHPR231
* ssh(1): add a StdinNull directive to ssh_config(5) that allows the config file to do the same thing as -n does on the ssh(1) command- line. GHPR231
* ssh(1): add a SessionType directive to ssh_config, allowing the configuration file to offer equivalent control to the -N (no session) and -s (subsystem) command-line flags. GHPR231
* ssh-keygen(1): allowed signers files used by ssh-keygen(1) signatures now support listing key validity intervals alongside they key, and ssh-keygen(1) can optionally check during signature verification whether a specified time falls inside this interval. This feature is intended for use by git to support signing and verifying objects using ssh keys.
* ssh-keygen(8): support printing of the full public key in a sshsig signature via a -Oprint-pubkey flag. = Bugfixes
* ssh(1)/sshd(8): start time-based re-keying exactly on schedule in the client and server mainloops. Previously the re-key timeout could expire but re-keying would not start until a packet was sent or received, causing a spin in select() if the connection was quiescent.
* ssh-keygen(1): avoid Y2038 problem in printing certificate validity lifetimes. Dates past 2^31-1 seconds since epoch were displayed incorrectly on some platforms. bz#3329
* scp(1): allow spaces to appear in usernames for local to remote and scp -3 remote to remote copies. bz#1164
* ssh(1)/sshd(8): remove references to ChallengeResponseAuthentication in favour of KbdInteractiveAuthentication. The former is what was in SSHv1, the latter is what is in SSHv2 (RFC4256) and they were treated as somewhat but not entirely equivalent. We retain the old name as a deprecated alias so configuration files continue to work as well as a reference in the man page for people looking for it. bz#3303
* ssh(1)/ssh-add(1)/ssh-keygen(1): fix decoding of X.509 subject name when extracting a key from a PKCS#11 certificate. bz#3327
* ssh(1): restore blocking status on stdio fds before close. ssh(1) needs file descriptors in non-blocking mode to operate but it was not restoring the original state on exit. This could cause problems with fds shared with other programs via the shell, bz#3280 and GHPR246
* ssh(1)/sshd(8): switch both client and server mainloops from select(3) to pselect(3). Avoids race conditions where a signal may arrive immediately before select(3) and not be processed until an event fires. bz#2158
* ssh(1): sessions started with ControlPersist were incorrectly executing a shell when the -N (no shell) option was specified. bz#3290
* ssh(1): check if IPQoS or TunnelDevice are already set before overriding. Prevents values in config files from overriding values supplied on the command line. bz#3319
* ssh(1): fix debug message when finding a private key to match a certificate being attempted for user authentication. Previously it would print the certificate\'s path, whereas it was supposed to be showing the private key\'s path. GHPR247
* sshd(8): match host certificates against host public keys, not private keys. Allows use of certificates with private keys held in a ssh-agent. bz#3524
* ssh(1): add a workaround for a bug in OpenSSH 7.4 sshd(8), which allows RSA/SHA2 signatures for public key authentication but fails to advertise this correctly via SSH2_MSG_EXT_INFO. This causes clients of these server to incorrectly match PubkeyAcceptedAlgorithmse and potentially refuse to offer valid keys. bz#3213
* sftp(1)/scp(1): degrade gracefully if a sftp-server offers the limitsAATTopenssh.com extension but fails when the client tries to invoke it. bz#3318
* ssh(1): allow ssh_config SetEnv to override $TERM, which is otherwise handled specially by the protocol. Useful in ~/.ssh/config to set TERM to something generic (e.g. \"xterm\" instead of \"xterm-256color\") for destinations that lack terminfo entries.
* sftp-server(8): the limitsAATTopenssh.com extension was incorrectly marked as an operation that writes to the filesystem, which made it unavailable in sftp-server read-only mode. bz#3318
* ssh(1): fix SEGV in UpdateHostkeys debug() message, triggered when the update removed more host keys than remain present.
* Many manual page fixes.- Additional changes from 8.6p1 release: = Security
* sshd(8): OpenSSH 8.5 introduced the LogVerbose keyword. When this option was enabled with a set of patterns that activated logging in code that runs in the low-privilege sandboxed sshd process, the log messages were constructed in such a way that printf(3) format strings could effectively be specified the low-privilege code. = New features
* sftp-server(8): add a new limitsAATTopenssh.com protocol extension that allows a client to discover various server limits, including maximum packet size and maximum read/write length.
* sftp(1): use the new limitsAATTopenssh.com extension (when available) to select better transfer lengths in the client.
* sshd(8): Add ModuliFile keyword to sshd_config to specify the location of the \"moduli\" file containing the groups for DH-GEX.
* unit tests: Add a TEST_SSH_ELAPSED_TIMES environment variable to enable printing of the elapsed time in seconds of each test. = Bugfixes
* ssh_config(5), sshd_config(5): sync CASignatureAlgorithms lists in manual pages with the current default. GHPR174
* ssh(1): ensure that pkcs11_del_provider() is called before exit. GHPR234
* ssh(1), sshd(8): fix problems in string->argv conversion. Multiple backslashes were not being dequoted correctly and quoted space in the middle of a string was being incorrectly split. GHPR223
* ssh(1): return non-zero exit status when killed by signal; bz#3281
* sftp-server(8): increase maximum SSH2_FXP_READ to match the maximum packet size. Also handle zero-length reads that are not explicitly banned by the spec.- Additional changes from 8.5p1 release: = Security
* ssh-agent(1): fixed a double-free memory corruption that was introduced in OpenSSH 8.2 . We treat all such memory faults as potentially exploitable. This bug could be reached by an attacker with access to the agent socket. = Potentially-incompatible changes
* ssh(1), sshd(8): this release changes the first-preference signature algorithm from ECDSA to ED25519.
* ssh(1), sshd(8): set the TOS/DSCP specified in the configuration for interactive use prior to TCP connect. The connection phase of the SSH session is time-sensitive and often explicitly interactive. The ultimate interactive/bulk TOS/DSCP will be set after authentication completes.
* ssh(1), sshd(8): remove the pre-standardization cipher rijndael-cbcAATTlysator.liu.se. It is an alias for aes256-cbc before it was standardized in RFC4253 (2006), has been deprecated and disabled by default since OpenSSH 7.2 (2016) and was only briefly documented in ssh.1 in 2001.
* ssh(1), sshd(8): update/replace the experimental post-quantum hybrid key exchange method based on Streamlined NTRU Prime coupled with X25519. The previous sntrup4591761x25519-sha512AATTtinyssh.org method is replaced with sntrup761x25519-sha512AATTopenssh.com.
* ssh(1): disable CheckHostIP by default. It provides insignificant benefits while making key rotation significantly more difficult, especially for hosts behind IP-based load-balancers. = New features
* ssh(1): this release enables UpdateHostkeys by default subject to some conservative preconditions: - The key was matched in the UserKnownHostsFile (and not in the GlobalKnownHostsFile). - The same key does not exist under another name. - A certificate host key is not in use. - known_hosts contains no matching wildcard hostname pattern. - VerifyHostKeyDNS is not enabled. - The default UserKnownHostsFile is in use.
* ssh(1), sshd(8): add a new LogVerbose configuration directive for that allows forcing maximum debug logging by file/function/line pattern-lists.
* ssh(1): when prompting the user to accept a new hostkey, display any other host names/addresses already associated with the key.
* ssh(1): allow UserKnownHostsFile=none to indicate that no known_hosts file should be used to identify host keys.
* ssh(1): add a ssh_config KnownHostsCommand option that allows the client to obtain known_hosts data from a command in addition to the usual files.
* ssh(1): add a ssh_config PermitRemoteOpen option that allows the client to restrict the destination when RemoteForward is used with SOCKS.
* ssh(1): for FIDO keys, if a signature operation fails with a \"incorrect PIN\" reason and no PIN was initially requested from the user, then request a PIN and retry the operation. This supports some biometric devices that fall back to requiring PIN when reading of the biometric failed, and devices that require PINs for all hosted credentials.
* sshd(8): implement client address-based rate-limiting via new sshd_config(5) PerSourceMaxStartups and PerSourceNetBlockSize directives that provide more fine-grained control on a per-origin address basis than the global MaxStartups limit. = Bugfixes
* ssh(1): Prefix keyboard interactive prompts with \"(userAATThost)\" to make it easier to determine which connection they are associated with in cases like scp -3, ProxyJump, etc. bz#3224
* sshd(8): fix sshd_config SetEnv directives located inside Match blocks. GHPR201
* ssh(1): when requesting a FIDO token touch on stderr, inform the user once the touch has been recorded.
* ssh(1): prevent integer overflow when ridiculously large ConnectTimeout values are specified, capping the effective value (for most platforms) at 24 days. bz#3229
* ssh(1): consider the ECDSA key subtype when ordering host key algorithms in the client.
* ssh(1), sshd(8): rename the PubkeyAcceptedKeyTypes keyword to PubkeyAcceptedAlgorithms. The previous name incorrectly suggested that it control allowed key algorithms, when this option actually specifies the signature algorithms that are accepted. The previous name remains available as an alias. bz#3253
* ssh(1), sshd(8): similarly, rename HostbasedKeyTypes (ssh) and HostbasedAcceptedKeyTypes (sshd) to HostbasedAcceptedAlgorithms.
* sftp-server(8): add missing lsetstatAATTopenssh.com documentation and advertisement in the server\'s SSH2_FXP_VERSION hello packet.
* ssh(1), sshd(8): more strictly enforce KEX state-machine by banning packet types once they are received. Fixes memleak caused by duplicate SSH2_MSG_KEX_DH_GEX_REQUEST (oss-fuzz #30078).
* sftp(1): allow the full range of UIDs/GIDs for chown/chgrp on 32bit platforms instead of being limited by LONG_MAX. bz#3206
* Minor man page fixes (capitalization, commas, etc.) bz#3223
* sftp(1): when doing an sftp recursive upload or download of a read-only directory, ensure that the directory is created with write and execute permissions in the interim so that the transfer can actually complete, then set the directory permission as the final step. bz#3222
* ssh-keygen(1): document the -Z, check the validity of its argument earlier and provide a better error message if it\'s not correct. bz#2879
* ssh(1): ignore comments at the end of config lines in ssh_config, similar to what we already do for sshd_config. bz#2320
* sshd_config(5): mention that DisableForwarding is valid in a sshd_config Match block. bz3239
* sftp(1): fix incorrect sorting of \"ls -ltr\" under some circumstances. bz3248.
* ssh(1), sshd(8): fix potential integer truncation of (unlikely) timeout values. bz#3250
* ssh(1): make hostbased authentication send the signature algorithm in its SSH2_MSG_USERAUTH_REQUEST packets instead of the key type. This make HostbasedAcceptedAlgorithms do what it is supposed to - filter on signature algorithm and not key type.- Rebased patches:
* openssh-7.7p1-IPv6_X_forwarding.patch
* openssh-7.7p1-X11_trusted_forwarding.patch
* openssh-7.7p1-X_forward_with_disabled_ipv6.patch
* openssh-7.7p1-cavstest-ctr.patch
* openssh-7.7p1-cavstest-kdf.patch
* openssh-7.7p1-disable_openssl_abi_check.patch
* openssh-7.7p1-eal3.patch
* openssh-7.7p1-enable_PAM_by_default.patch
* openssh-7.7p1-fips.patch
* openssh-7.7p1-fips_checks.patch
* openssh-7.7p1-host_ident.patch
* openssh-7.7p1-hostname_changes_when_forwarding_X.patch
* openssh-7.7p1-ldap.patch
* openssh-7.7p1-no_fork-no_pid_file.patch
* openssh-7.7p1-pam_check_locks.patch
* openssh-7.7p1-pts_names_formatting.patch
* openssh-7.7p1-remove_xauth_cookies_on_exit.patch
* openssh-7.7p1-seccomp_ipc_flock.patch
* openssh-7.7p1-seccomp_stat.patch
* openssh-7.7p1-send_locale.patch
* openssh-7.7p1-sftp_force_permissions.patch
* openssh-7.7p1-sftp_print_diagnostic_messages.patch
* openssh-7.7p1-systemd-notify.patch
* openssh-7.9p1-keygen-preserve-perms.patch
* openssh-7.9p1-revert-new-qos-defaults.patch
* openssh-8.0p1-gssapi-keyex.patch
* openssh-8.1p1-audit.patch
* openssh-8.1p1-seccomp-clock_gettime64.patch
* openssh-8.1p1-seccomp-clock_nanosleep.patch
* openssh-8.1p1-seccomp-clock_nanosleep_time64.patch
* openssh-8.1p1-use-openssl-kdf.patch
* openssh-8.4p1-vendordir.patch
* openssh-fips-ensure-approved-moduli.patch
* openssh-link-with-sk.patch
* openssh-reenable-dh-group14-sha1-default.patch
* openssh-whitelist-syscalls.patch- Removed openssh-fix-ssh-copy-id.patch (fixed upstream).- openssh.keyring: rotated to new key from https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/RELEASE_KEY.asc
* Thu Aug 19 2021 Thorsten Kukuk - sshd-gen-keys-start: - only source sysconfig file if it exists. - create /etc/ssh if it does not exists. Required for image based installation/updates.
* Mon Jul 19 2021 Cristian Rodríguez - The linux kernel has close_range(2) syscall which current glibc uses to implement closefrom(3) which will be then used by openssh. whitelist the new system call so closefrom does not fail or fallback to iterating proc/self/fd (openssh-whitelist-syscalls.patch)
* Wed Jun 23 2021 Hans Petter Jansson - Don\'t move user-modified ssh_config and sshd_config files to .rpmsave on upgrade.
* Tue May 18 2021 Thorsten Kukuk - Use pam_motd to unify motd message output [bsc#1185897] (openssh-8.4p1-pam_motd.patch)
* Thu Apr 22 2021 Hans Petter Jansson - Change vendor configuration dir from /usr/share/ssh/ to /usr/etc/ssh/.- Remove upgrade enablement hack. This has been fixed in systemd-rpm-macros (bsc#1180083).
* Wed Feb 24 2021 Thorsten Kukuk - Add support for vendor provided configuration files in /usr/share/ssh/ (openssh-8.4p1-vendordir.patch)- Move configuration files from /etc/ssh/ to /usr/share/ssh/
* Thu Feb 18 2021 Johannes Segitz - Drop openssh-7.7p1-allow_root_password_login.patch to prevent login as root via password by default (is also upstream default). Comment indicates that this was a temporary meassure that we now had for five years, time to get rid of it (bsc#1173067)
* Mon Feb 15 2021 Hans Petter Jansson - Add openssh-whitelist-syscalls.patch (bsc#1182232), fixing failure to accept connections on 32-bit platforms with glibc 2.33+.
* Wed Jan 27 2021 Thorsten Kukuk - Add support for /etc/ssh/ssh_config.d and /etc/ssh/sshd_config.d (openssh-8.4p1-ssh_config_d.patch)
* Sat Jan 23 2021 Hans Petter Jansson - Add openssh-fix-ssh-copy-id.patch, which fixes breakage introduced in 8.4p1 (bsc#1181311).
* Fri Jan 22 2021 Hans Petter Jansson - Improve robustness of sshd init detection when upgrading from a pre-systemd distribution.
* Fri Jan 22 2021 Hans Petter Jansson - Add openssh-reenable-dh-group14-sha1-default.patch, which adds diffie-hellman-group14-sha1 key exchange back to the default list (bsc#1180958). This is needed for backwards compatibility with older platforms.
* Fri Jan 22 2021 Hans Petter Jansson - Make sure sshd is enabled correctly when upgrading from a pre-systemd distribution (bsc#1180083).
* Mon Jan 18 2021 Thorsten Kukuk - sysusers-sshd.conf: use sysusers.d configuration file to create sshd user (avoid hard dependency on shadow).
* Mon Jan 18 2021 Dirk Müller - update to 8.4p1: Security ========
* ssh-agent(1): restrict ssh-agent from signing web challenges for FIDO/U2F keys.
* ssh-keygen(1): Enable FIDO 2.1 credProtect extension when generating a FIDO resident key.
* ssh(1), ssh-keygen(1): support for FIDO keys that require a PIN for each use. These keys may be generated using ssh-keygen using a new \"verify-required\" option. When a PIN-required key is used, the user will be prompted for a PIN to complete the signature operation. New Features - -----------
* sshd(8): authorized_keys now supports a new \"verify-required\" option to require FIDO signatures assert that the token verified that the user was present before making the signature. The FIDO protocol supports multiple methods for user-verification, but currently OpenSSH only supports PIN verification.
* sshd(8), ssh-keygen(1): add support for verifying FIDO webauthn signatures. Webauthn is a standard for using FIDO keys in web browsers. These signatures are a slightly different format to plain FIDO signatures and thus require explicit support.
* ssh(1): allow some keywords to expand shell-style ${ENV} environment variables. The supported keywords are CertificateFile, ControlPath, IdentityAgent and IdentityFile, plus LocalForward and RemoteForward when used for Unix domain socket paths. bz#3140
* ssh(1), ssh-agent(1): allow some additional control over the use of ssh-askpass via a new $SSH_ASKPASS_REQUIRE environment variable, including forcibly enabling and disabling its use. bz#69
* ssh(1): allow ssh_config(5)\'s AddKeysToAgent keyword accept a time limit for keys in addition to its current flag options. Time- limited keys will automatically be removed from ssh-agent after their expiry time has passed.
* scp(1), sftp(1): allow the -A flag to explicitly enable agent forwarding in scp and sftp. The default remains to not forward an agent, even when ssh_config enables it.
* ssh(1): add a \'%k\' TOKEN that expands to the effective HostKey of the destination. This allows, e.g., keeping host keys in individual files using \"UserKnownHostsFile ~/.ssh/known_hosts.d/%k\". bz#1654
* ssh(1): add %-TOKEN, environment variable and tilde expansion to the UserKnownHostsFile directive, allowing the path to be completed by the configuration (e.g. bz#1654)
* ssh-keygen(1): allow \"ssh-add -d -\" to read keys to be deleted from stdin. bz#3180
* sshd(8): improve logging for MaxStartups connection throttling. sshd will now log when it starts and stops throttling and periodically while in this state. bz#3055 Bugfixes - -------
* ssh(1), ssh-keygen(1): better support for multiple attached FIDO tokens. In cases where OpenSSH cannot unambiguously determine which token to direct a request to, the user is now required to select a token by touching it. In cases of operations that require a PIN to be verified, this avoids sending the wrong PIN to the wrong token and incrementing the token\'s PIN failure counter (tokens effectively erase their keys after too many PIN failures).
* sshd(8): fix Include before Match in sshd_config; bz#3122
* ssh(1): close stdin/out/error when forking after authentication completes (\"ssh -f ...\") bz#3137
* ssh(1), sshd(8): limit the amount of channel input data buffered, avoiding peers that advertise large windows but are slow to read from causing high memory consumption.
* ssh-agent(1): handle multiple requests sent in a single write() to the agent.
* sshd(8): allow sshd_config longer than 256k
* sshd(8): avoid spurious \"Unable to load host key\" message when sshd load a private key but no public counterpart
* ssh(1): prefer the default hostkey algorithm list whenever we have a hostkey that matches its best-preference algorithm.
* sshd(1): when ordering the hostkey algorithms to request from a server, prefer certificate types if the known_hosts files contain a key marked as a AATTcert-authority; bz#3157
* ssh(1): perform host key fingerprint comparisons for the \"Are you sure you want to continue connecting (yes/no/[fingerprint])?\" prompt with case sensitivity.
* sshd(8): ensure that address/masklen mismatches in sshd_config yield fatal errors at daemon start time rather than later when they are evaluated.
* ssh-keygen(1): ensure that certificate extensions are lexically sorted. Previously if the user specified a custom extension then the everything would be in order except the custom ones. bz#3198
* ssh(1): also compare username when checking for JumpHost loops. bz#3057
* ssh-keygen(1): preserve group/world read permission on known_hosts files across runs of \"ssh-keygen -Rf /path\". The old behaviour was to remove all rights for group/other. bz#3146
* ssh-keygen(1): Mention the [-a rounds] flag in the ssh-keygen manual page and usage().
* sshd(8): explicitly construct path to ~/.ssh/rc rather than relying on it being relative to the current directory, so that it can still be found if the shell startup changes its directory. bz#3185
* sshd(8): when redirecting sshd\'s log output to a file, undo this redirection after the session child process is forked(). Fixes missing log messages when using this feature under some circumstances.
* sshd(8): start ClientAliveInterval bookkeeping before first pass through select() loop; fixed theoretical case where busy sshd may ignore timeouts from client.
* ssh(1): only reset the ServerAliveInterval check when we receive traffic from the server and ignore traffic from a port forwarding client, preventing a client from keeping a connection alive when it should be terminated. bz#2265
* ssh-keygen(1): avoid spurious error message when ssh-keygen creates files outside ~/.ssh
* sftp-client(1): fix off-by-one error that caused sftp downloads to make one more concurrent request that desired. This prevented using sftp(1) in unpipelined request/response mode, which is useful when debugging. bz#3054
* ssh(1), sshd(8): handle EINTR in waitfd() and timeout_connect() helpers. bz#3071
* ssh(1), ssh-keygen(1): defer creation of ~/.ssh until we attempt to write to it so we don\'t leave an empty .ssh directory when it\'s not needed. bz#3156
* ssh(1), sshd(8): fix multiplier when parsing time specifications when handling seconds after other units. bz#3171
* Fri Jan 08 2021 Hans Petter Jansson - Update openssh-8.1p1-audit.patch (bsc#1180501). This fixes occasional crashes on connection termination caused by accessing freed memory.
* Fri Nov 27 2020 Thorsten Kukuk - Support /usr/etc/pam.d
* Wed Nov 11 2020 Hans Petter Jansson - Fix build breakage caused by missing security key objects: + Modify openssh-7.7p1-cavstest-ctr.patch. + Modify openssh-7.7p1-cavstest-kdf.patch. + Add openssh-link-with-sk.patch.
* Wed Nov 11 2020 Hans Petter Jansson - Add openssh-fips-ensure-approved-moduli.patch (bsc#1177939). This ensures only approved DH parameters are used in FIPS mode.
* Wed Nov 11 2020 Hans Petter Jansson - Add openssh-8.1p1-ed25519-use-openssl-rng.patch (bsc#1173799). This uses OpenSSL\'s RAND_bytes() directly instead of the internal ChaCha20-based implementation to obtain random bytes for Ed25519 curve computations. This is required for FIPS compliance.
* Thu Oct 08 2020 Hans Petter Jansson - Work around %service_add_post disabling sshd on upgrade with package name change (bsc#1177039).
* Fri Sep 25 2020 Dominique Leuenberger - Fix fillup-template usage: + %post server needs to reference ssh (not sshd), which matches the sysconfig.ssh file name the package ships. + %post client does not need any fillup_ calls, as there is no client-relevant sysconfig file present. The naming of the sysconfig file (ssh instead of sshd) is unfortunate.
* Fri Sep 25 2020 Franck Bui - Use of DISABLE_RESTART_ON_UPDATE is deprecated. Replace it with %service_del_postun_without_restart
* Thu Sep 17 2020 Jan Engelhardt - Move some Requires to the right subpackage.- Avoid \">&\" bashism in %post.- Upgrade some old specfile constructs/macros and drop unnecessary %{?systemd_
*}.- Trim descriptions and straighten out the grammar.
* Thu Sep 10 2020 Hans Petter Jansson - Split openssh package into openssh, openssh-common, openssh-server and openssh-clients. This allows for the ssh clients to be installed without the server component (bsc#1176434).
* Fri Jun 05 2020 Hans Petter Jansson - Version update to 8.3p1: = Potentially-incompatible changes
* sftp(1): reject an argument of \"-1\" in the same way as ssh(1) and scp(1) do instead of accepting and silently ignoring it. = New features
* sshd(8): make IgnoreRhosts a tri-state option: \"yes\" to ignore rhosts/shosts, \"no\" allow rhosts/shosts or (new) \"shosts-only\" to allow .shosts files but not .rhosts.
* sshd(8): allow the IgnoreRhosts directive to appear anywhere in a sshd_config, not just before any Match blocks.
* ssh(1): add %TOKEN percent expansion for the LocalFoward and RemoteForward keywords when used for Unix domain socket forwarding.
* all: allow loading public keys from the unencrypted envelope of a private key file if no corresponding public key file is present.
* ssh(1), sshd(8): prefer to use chacha20 from libcrypto where possible instead of the (slower) portable C implementation included in OpenSSH.
* ssh-keygen(1): add ability to dump the contents of a binary key revocation list via \"ssh-keygen -lQf /path\".- Additional changes from 8.2p1 release: = Potentially-incompatible changes
* ssh(1), sshd(8), ssh-keygen(1): this release removes the \"ssh-rsa\" (RSA/SHA1) algorithm from those accepted for certificate signatures (i.e. the client and server CASignatureAlgorithms option) and will use the rsa-sha2-512 signature algorithm by default when the ssh-keygen(1) CA signs new certificates.
* ssh(1), sshd(8): this release removes diffie-hellman-group14-sha1 from the default key exchange proposal for both the client and server.
* ssh-keygen(1): the command-line options related to the generation and screening of safe prime numbers used by the diffie-hellman-group-exchange-
* key exchange algorithms have changed. Most options have been folded under the -O flag.
* sshd(8): the sshd listener process title visible to ps(1) has changed to include information about the number of connections that are currently attempting authentication and the limits configured by MaxStartups.
* ssh-sk-helper(8): this is a new binary. It is used by the FIDO/U2F support to provide address-space isolation for token middleware libraries (including the internal one). It needs to be installed in the expected path, typically under /usr/libexec or similar. = New features
* This release adds support for FIDO/U2F hardware authenticators to OpenSSH. U2F/FIDO are open standards for inexpensive two-factor authentication hardware that are widely used for website authentication. In OpenSSH FIDO devices are supported by new public key types \"ecdsa-sk\" and \"ed25519-sk\", along with corresponding certificate types.
* sshd(8): add an Include sshd_config keyword that allows including additional configuration files via glob(3) patterns.
* ssh(1)/sshd(8): make the LE (low effort) DSCP code point available via the IPQoS directive.
* ssh(1): when AddKeysToAgent=yes is set and the key contains no comment, add the key to the agent with the key\'s path as the comment.
* ssh-keygen(1), ssh-agent(1): expose PKCS#11 key labels and X.509 subjects as key comments, rather than simply listing the PKCS#11 provider library path.
* ssh-keygen(1): allow PEM export of DSA and ECDSA keys.
* ssh(1), sshd(8): make zlib compile-time optional, available via the Makefile.inc ZLIB flag on OpenBSD or via the --with-zlib configure option for OpenSSH portable.
* sshd(8): when clients get denied by MaxStartups, send a notification prior to the SSH2 protocol banner according to RFC4253 section 4.2.
* ssh(1), ssh-agent(1): when invoking the $SSH_ASKPASS prompt program, pass a hint to the program to describe the type of desired prompt. The possible values are \"confirm\" (indicating that a yes/no confirmation dialog with no text entry should be shown), \"none\" (to indicate an informational message only), or blank for the original ssh-askpass behaviour of requesting a password/phrase.
* ssh(1): allow forwarding a different agent socket to the path specified by $SSH_AUTH_SOCK, by extending the existing ForwardAgent option to accepting an explicit path or the name of an environment variable in addition to yes/no.
* ssh-keygen(1): add a new signature operations \"find-principals\" to look up the principal associated with a signature from an allowed- signers file.
* sshd(8): expose the number of currently-authenticating connections along with the MaxStartups limit in the process title visible to \"ps\".- Rebased patches:
* openssh-7.7p1-cavstest-ctr.patch
* openssh-7.7p1-cavstest-kdf.patch
* openssh-7.7p1-fips.patch
* openssh-7.7p1-fips_checks.patch
* openssh-7.7p1-ldap.patch
* openssh-7.7p1-no_fork-no_pid_file.patch
* openssh-7.7p1-sftp_print_diagnostic_messages.patch
* openssh-8.0p1-gssapi-keyex.patch
* openssh-8.1p1-audit.patch
* openssh-8.1p1-seccomp-clock_nanosleep.patch- Removed openssh-7.7p1-seed-prng.patch (bsc#1165158).
* Sun May 31 2020 Andreas Stieger - add upstream signing key to actually verify source signature
* Fri Feb 28 2020 Ludwig Nussel - Don\'t recommend xauth to avoid pulling in X.
* Tue Feb 18 2020 Fabian Vogt - Add patches to fix the sandbox blocking glibc on 32bit platforms (boo#1164061):
* openssh-8.1p1-seccomp-clock_nanosleep_time64.patch
* openssh-8.1p1-seccomp-clock_gettime64.patch
* Tue Feb 11 2020 Hans Petter Jansson - Add openssh-8.1p1-use-openssl-kdf.patch (jsc#SLE-9443). This performs key derivation using OpenSSL\'s SSHKDF facility, which allows OpenSSH to benefit from the former\'s FIPS certification status.
 
ICM