Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

openssh-8.9p1-7.1 RPM for ppc64

From OpenSuSE Ports Tumbleweed for ppc64

Name: openssh Distribution: openSUSE Tumbleweed
Version: 8.9p1 Vendor: openSUSE
Release: 7.1 Build date: Fri Dec 23 10:21:45 2022
Group: Productivity/Networking/SSH Build host: obs-power8-05
Size: 0 Source RPM: openssh-8.9p1-7.1.src.rpm
Packager: http://bugs.opensuse.org
Url: https://www.openssh.com/
Summary: Secure Shell Client and Server (Remote Login Program)
SSH (Secure Shell) is a program for logging into and executing commands
on a remote machine. It replaces rsh (rlogin and rsh) and
provides secure encrypted communication between two untrusted
hosts over an insecure network.

xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
also be forwarded over the secure channel.

This is a dummy package that pulls in both the client and server
components.

Provides

Requires

License

BSD-2-Clause AND MIT

Changelog

* Mon Dec 19 2022 Otto Hollmann <otto.hollmann@suse.com>
  - Adapt OpenSSH to build with OpenSSL 3, use new KDF API (bsc#1205042)
    Add openssh-openssl-3.patch
* Thu Dec 15 2022 Dirk Müller <dmueller@suse.com>
  - limit to openssl < 3.0 as this version is not compatible (bsc#1205042)
    next version update will fix it
* Thu Nov 10 2022 Hans Petter Jansson <hpj@suse.com>
  - Update openssh-8.1p1-audit.patch: Merge fix for race condition
    (bsc#1115550, bsc#1174162).
  - Add openssh-do-not-send-empty-message.patch, which prevents
    superfluous newlines with empty MOTD files (bsc#1192439).
* Mon Aug 08 2022 Thorsten Kukuk <kukuk@suse.com>
  - Use %_pam_vendordir
* Wed Jul 06 2022 Adam Majer <adam.majer@suse.de>
  - openssh-8.4p1-ssh_config_d.patch: admin overrides should take
    priority (listed first) over package defaults
* Mon Mar 28 2022 Ludwig Nussel <lnussel@suse.de>
  - read ssh and sshd config file also from /usr/etc
  - add openssh-server-config-rootlogin subpackage that enabled PermitRootLogin
* Mon Mar 07 2022 Hans Petter Jansson <hpj@suse.com>
  - Version update to 8.9p1:
    = Security
    * sshd(8): fix an integer overflow in the user authentication path
      that, in conjunction with other logic errors, could have yielded
      unauthenticated access under difficult to exploit conditions.
      This situation is not exploitable because of independent checks in
      the privilege separation monitor. Privilege separation has been
      enabled by default in since openssh-3.2.2 (released in 2002) and
      has been mandatory since openssh-7.5 (released in 2017). Moreover,
      portable OpenSSH has used toolchain features available in most
      modern compilers to abort on signed integer overflow since
      openssh-6.5 (released in 2014).
      Thanks to Malcolm Stagg for finding and reporting this bug.
    = Potentially-incompatible changes
    * sshd(8), portable OpenSSH only: this release removes in-built
      support for MD5-hashed passwords. If you require these on your
      system then we recommend linking against libxcrypt or similar.
    * This release modifies the FIDO security key middleware interface
      and increments SSH_SK_VERSION_MAJOR.
    = New features
    * ssh(1), sshd(8), ssh-add(1), ssh-agent(1): add a system for
      restricting forwarding and use of keys added to ssh-agent(1)
      A detailed description of the feature is available at
      https://www.openssh.com/agent-restrict.html and the protocol
      extensions are documented in the PROTOCOL and PROTOCOL.agent
      files in the source release.
    * ssh(1), sshd(8): add the sntrup761x25519-sha512@openssh.com hybrid
      ECDH/x25519 + Streamlined NTRU Prime post-quantum KEX to the
      default KEXAlgorithms list (after the ECDH methods but before the
      prime-group DH ones). The next release of OpenSSH is likely to
      make this key exchange the default method.
    * ssh-keygen(1): when downloading resident keys from a FIDO token,
      pass back the user ID that was used when the key was created and
      append it to the filename the key is written to (if it is not the
      default). Avoids keys being clobbered if the user created multiple
      resident keys with the same application string but different user
      IDs.
    * ssh-keygen(1), ssh(1), ssh-agent(1): better handling for FIDO keys
      on tokens that provide user verification (UV) on the device itself,
      including biometric keys, avoiding unnecessary PIN prompts.
    * ssh-keygen(1): add "ssh-keygen -Y match-principals" operation to
      perform matching of principals names against an allowed signers
      file. To be used towards a TOFU model for SSH signatures in git.
    * ssh-add(1), ssh-agent(1): allow pin-required FIDO keys to be added
      to ssh-agent(1). $SSH_ASKPASS will be used to request the PIN at
      authentication time.
    * ssh-keygen(1): allow selection of hash at sshsig signing time
      (either sha512 (default) or sha256).
    * ssh(1), sshd(8): read network data directly to the packet input
      buffer instead of indirectly via a small stack buffer. Provides a
      modest performance improvement.
    * ssh(1), sshd(8): read data directly to the channel input buffer,
      providing a similar modest performance improvement.
    * ssh(1): extend the PubkeyAuthentication configuration directive to
      accept yes|no|unbound|host-bound to allow control over one of the
      protocol extensions used to implement agent-restricted keys.
    = Bugfixes
    * sshd(8): document that CASignatureAlgorithms, ExposeAuthInfo and
      PubkeyAuthOptions can be used in a Match block. PR277.
    * sshd(8): fix possible string truncation when constructing paths to
      .rhosts/.shosts files with very long user home directory names.
    * ssh-keysign(1): unbreak for KEX algorithms that use SHA384/512
      exchange hashes
    * ssh(1): don't put the TTY into raw mode when SessionType=none,
      avoids ^C being unable to kill such a session. bz3360
    * scp(1): fix some corner-case bugs in SFTP-mode handling of
      ~-prefixed paths.
    * ssh(1): unbreak hostbased auth using RSA keys. Allow ssh(1) to
      select RSA keys when only RSA/SHA2 signature algorithms are
      configured (this is the default case). Previously RSA keys were
      not being considered in the default case.
    * ssh-keysign(1): make ssh-keysign use the requested signature
      algorithm and not the default for the key type. Part of unbreaking
      hostbased auth for RSA/SHA2 keys.
    * ssh(1): stricter UpdateHostkey signature verification logic on
      the client- side. Require RSA/SHA2 signatures for RSA hostkeys
      except when RSA/SHA1 was explicitly negotiated during initial
      KEX; bz3375
    * ssh(1), sshd(8): fix signature algorithm selection logic for
      UpdateHostkeys on the server side. The previous code tried to
      prefer RSA/SHA2 for hostkey proofs of RSA keys, but missed some
      cases. This will use RSA/SHA2 signatures for RSA keys if the
      client proposed these algorithms in initial KEX. bz3375
    * All: convert all uses of select(2)/pselect(2) to poll(2)/ppoll(2).
      This includes the mainloops in ssh(1), ssh-agent(1), ssh-agent(1)
      and sftp-server(8), as well as the sshd(8) listen loop and all
      other FD read/writability checks. On platforms with missing or
      broken poll(2)/ppoll(2) syscalls a select(2)-based compat shim is
      available.
    * ssh-keygen(1): the "-Y find-principals" command was verifying key
      validity when using ca certs but not with simple key lifetimes
      within the allowed signers file.
    * ssh-keygen(1): make sshsig verify-time argument parsing optional
    * sshd(8): fix truncation in rhosts/shosts path construction.
    * ssh(1), ssh-agent(1): avoid xmalloc(0) for PKCS#11 keyid for ECDSA
      keys (we already did this for RSA keys). Avoids fatal errors for
      PKCS#11 libraries that return empty keyid, e.g. Microchip ATECC608B
      "cryptoauthlib"; bz#3364
    * ssh(1), ssh-agent(1): improve the testing of credentials against
      inserted FIDO: ask the token whether a particular key belongs to
      it in cases where the token supports on-token user-verification
      (e.g. biometrics) rather than just assuming that it will accept it.
      Will reduce spurious "Confirm user presence" notifications for key
      handles that relate to FIDO keys that are not currently inserted in at
      least some cases. bz3366
    * ssh(1), sshd(8): correct value for IPTOS_DSCP_LE. It needs to
      allow for the preceding two ECN bits. bz#3373
    * ssh-keygen(1): add missing -O option to usage() for the "-Y sign"
      option.
    * ssh-keygen(1): fix a NULL deref when using the find-principals
      function, when matching an allowed_signers line that contains a
      namespace restriction, but no restriction specified on the
      command-line
    * ssh-agent(1): fix memleak in process_extension(); oss-fuzz
      issue #42719
    * ssh(1): suppress "Connection to xxx closed" messages when LogLevel
      is set to "error" or above. bz3378
    * ssh(1), sshd(8): use correct zlib flags when inflate(3)-ing
      compressed packet data. bz3372
    * scp(1): when recursively transferring files in SFTP mode, create the
      destination directory if it doesn't already exist to match scp(1) in
      legacy RCP mode behaviour.
    * scp(1): many improvements in error message consistency between scp(1)
      in SFTP mode vs legacy RCP mode.
    * sshd(8): fix potential race in SIGTERM handling PR289
    * ssh(1), ssh(8): since DSA keys are deprecated, move them to the
      end of the default list of public keys so that they will be tried
      last. PR295
    * ssh-keygen(1): allow 'ssh-keygen -Y find-principals' to match
      wildcard principals in allowed_signers files
    = Portability
    * ssh(1), sshd(8): don't trust closefrom(2) on Linux. glibc's
      implementation does not work in a chroot when the kernel does not
      have close_range(2). It tries to read from /proc/self/fd and when
      that fails dies with an assertion of sorts. Instead, call
      close_range(2) directly from our compat code and fall back if
      that fails.  bz#3349,
    * OS X poll(2) is broken; use compat replacement. For character-
      special devices like /dev/null, Darwin's poll(2) returns POLLNVAL
      when polled with POLLIN. Apparently this is Apple bug 3710161 -
      not public but a websearch will find other OSS projects
      rediscovering it periodically since it was first identified in
      2005.
    * Correct handling of exceptfds/POLLPRI in our select(2)-based
      poll(2)/ppoll(2) compat implementation.
    * Cygwin: correct checking of mbstowcs() return value.
    * Add a basic SECURITY.md that refers people to the openssh.com
      website.
    * Enable additional compiler warnings and toolchain hardening flags,
      including -Wbitwise-instead-of-logical, -Wmisleading-indentation,
    - fzero-call-used-regs and -ftrivial-auto-var-init.
    * HP/UX. Use compat getline(3) on HP-UX 10.x, where the libc version
      is not reliable.
  - Rebased patches:
    * openssh-7.7p1-ldap.patch
    * openssh-8.0p1-gssapi-keyex.patch
    * openssh-8.1p1-audit.patch
    * openssh-8.4p1-vendordir.patch
    * openssh-reenable-dh-group14-sha1-default.patch
* Tue Sep 28 2021 Hans Petter Jansson <hpj@suse.com>
  - Version update to 8.8p1:
    = Security
    * sshd(8) from OpenSSH 6.2 through 8.7 failed to correctly initialise
      supplemental groups when executing an AuthorizedKeysCommand or
      AuthorizedPrincipalsCommand, where a AuthorizedKeysCommandUser or
      AuthorizedPrincipalsCommandUser directive has been set to run the
      command as a different user. Instead these commands would inherit
      the groups that sshd(8) was started with.
      Depending on system configuration, inherited groups may allow
      AuthorizedKeysCommand/AuthorizedPrincipalsCommand helper programs to
      gain unintended privilege.
      Neither AuthorizedKeysCommand nor AuthorizedPrincipalsCommand are
      enabled by default in sshd_config(5).
    = Potentially-incompatible changes
    * This release disables RSA signatures using the SHA-1 hash algorithm
      by default. This change has been made as the SHA-1 hash algorithm is
      cryptographically broken, and it is possible to create chosen-prefix
      hash collisions for <USD$50K.
      For most users, this change should be invisible and there is
      no need to replace ssh-rsa keys. OpenSSH has supported RFC8332
      RSA/SHA-256/512 signatures since release 7.2 and existing ssh-rsa keys
      will automatically use the stronger algorithm where possible.
      Incompatibility is more likely when connecting to older SSH
      implementations that have not been upgraded or have not closely tracked
      improvements in the SSH protocol. For these cases, it may be necessary
      to selectively re-enable RSA/SHA1 to allow connection and/or user
      authentication via the HostkeyAlgorithms and PubkeyAcceptedAlgorithms
      options.
    = New features
    * ssh(1): allow the ssh_config(5) CanonicalizePermittedCNAMEs
      directive to accept a "none" argument to specify the default
      behaviour.
    = Bugfixes
    * scp(1): when using the SFTP protocol, continue transferring files
      after a transfer error occurs, better matching original scp/rcp
      behaviour.
    * ssh(1): fixed a number of memory leaks in multiplexing,
    * ssh-keygen(1): avoid crash when using the -Y find-principals
      command.
    * A number of documentation and manual improvements, including
      bz#3340, PR139, PR215, PR241, PR257
  - Additional changes from 8.7p1 release:
    = Potentially-incompatible changes
    * scp(1): this release changes the behaviour of remote to remote
      copies (e.g. "scp host-a:/path host-b:") to transfer through the
      local host by default. This was previously available via the -3
      flag. This mode avoids the need to expose credentials on the
      origin hop, avoids triplicate interpretation of filenames by the
      shell (by the local system, the copy origin and the destination)
      and, in conjunction with the SFTP support for scp(1) mentioned
      below, allows use of all authentication methods to the remote
      hosts (previously, only non-interactive methods could be used).
      A -R flag has been added to select the old behaviour.
    * ssh(1)/sshd(8): both the client and server are now using a
      stricter configuration file parser. The new parser uses more
      shell-like rules for quotes, space and escape characters. It is
      also more strict in rejecting configurations that include options
      lacking arguments. Previously some options (e.g. DenyUsers) could
      appear on a line with no subsequent arguments. This release will
      reject such configurations. The new parser will also reject
      configurations with unterminated quotes and multiple '='
      characters after the option name.
    * ssh(1): when using SSHFP DNS records for host key verification,
      ssh(1) will verify all matching records instead of just those
      with the specific signature type requested. This may cause host
      key verification problems if stale SSHFP records of a different
      or legacy signature type exist alongside other records for a
      particular host. bz#3322
    * ssh-keygen(1): when generating a FIDO key and specifying an
      explicit attestation challenge (using -Ochallenge), the challenge
      will now be hashed by the builtin security key middleware. This
      removes the (undocumented) requirement that challenges be exactly
      32 bytes in length and matches the expectations of libfido2.
    * sshd(8): environment="..." directives in authorized_keys files are
      now first-match-wins and limited to 1024 discrete environment
      variable names.
    = New features
    * scp(1): experimental support for transfers using the SFTP protocol
      as a replacement for the venerable SCP/RCP protocol that it has
      traditionally used. SFTP offers more predictable filename handling
      and does not require expansion of glob(3) patterns via the shell
      on the remote side.
    * sftp-server(8): add a protocol extension to support expansion of
      ~/ and ~user/ prefixed paths. This was added to support these
      paths when used by scp(1) while in SFTP mode.
    * ssh(1): add a ForkAfterAuthentication ssh_config(5) counterpart to
      the ssh(1) -f flag. GHPR231
    * ssh(1): add a StdinNull directive to ssh_config(5) that allows the
      config file to do the same thing as -n does on the ssh(1) command-
      line. GHPR231
    * ssh(1): add a SessionType directive to ssh_config, allowing the
      configuration file to offer equivalent control to the -N (no
      session) and -s (subsystem) command-line flags. GHPR231
    * ssh-keygen(1): allowed signers files used by ssh-keygen(1)
      signatures now support listing key validity intervals alongside
      they key, and ssh-keygen(1) can optionally check during signature
      verification whether a specified time falls inside this interval.
      This feature is intended for use by git to support signing and
      verifying objects using ssh keys.
    * ssh-keygen(8): support printing of the full public key in a sshsig
      signature via a -Oprint-pubkey flag.
    = Bugfixes
    * ssh(1)/sshd(8): start time-based re-keying exactly on schedule in
      the client and server mainloops. Previously the re-key timeout
      could expire but re-keying would not start until a packet was sent
      or received, causing a spin in select() if the connection was
      quiescent.
    * ssh-keygen(1): avoid Y2038 problem in printing certificate
      validity lifetimes. Dates past 2^31-1 seconds since epoch were
      displayed incorrectly on some platforms. bz#3329
    * scp(1): allow spaces to appear in usernames for local to remote
      and scp -3 remote to remote copies. bz#1164
    * ssh(1)/sshd(8): remove references to ChallengeResponseAuthentication
      in favour of KbdInteractiveAuthentication. The former is what was in
      SSHv1, the latter is what is in SSHv2 (RFC4256) and they were
      treated as somewhat but not entirely equivalent. We retain the old
      name as a deprecated alias so configuration files continue to work
      as well as a reference in the man page for people looking for it.
      bz#3303
    * ssh(1)/ssh-add(1)/ssh-keygen(1): fix decoding of X.509 subject name
      when extracting a key from a PKCS#11 certificate. bz#3327
    * ssh(1): restore blocking status on stdio fds before close. ssh(1)
      needs file descriptors in non-blocking mode to operate but it was
      not restoring the original state on exit. This could cause
      problems with fds shared with other programs via the shell,
      bz#3280 and GHPR246
    * ssh(1)/sshd(8): switch both client and server mainloops from
      select(3) to pselect(3). Avoids race conditions where a signal
      may arrive immediately before select(3) and not be processed until
      an event fires. bz#2158
    * ssh(1): sessions started with ControlPersist were incorrectly
      executing a shell when the -N (no shell) option was specified.
      bz#3290
    * ssh(1): check if IPQoS or TunnelDevice are already set before
      overriding. Prevents values in config files from overriding values
      supplied on the command line. bz#3319
    * ssh(1): fix debug message when finding a private key to match a
      certificate being attempted for user authentication. Previously it
      would print the certificate's path, whereas it was supposed to be
      showing the private key's path. GHPR247
    * sshd(8): match host certificates against host public keys, not
      private keys. Allows use of certificates with private keys held in
      a ssh-agent.  bz#3524
    * ssh(1): add a workaround for a bug in OpenSSH 7.4 sshd(8), which
      allows RSA/SHA2 signatures for public key authentication but fails
      to advertise this correctly via SSH2_MSG_EXT_INFO. This causes
      clients of these server to incorrectly match
      PubkeyAcceptedAlgorithmse and potentially refuse to offer valid
      keys. bz#3213
    * sftp(1)/scp(1): degrade gracefully if a sftp-server offers the
      limits@openssh.com extension but fails when the client tries to
      invoke it. bz#3318
    * ssh(1): allow ssh_config SetEnv to override $TERM, which is
      otherwise handled specially by the protocol. Useful in ~/.ssh/config
      to set TERM to something generic (e.g. "xterm" instead of
      "xterm-256color") for destinations that lack terminfo entries.
    * sftp-server(8): the limits@openssh.com extension was incorrectly
      marked as an operation that writes to the filesystem, which made it
      unavailable in sftp-server read-only mode. bz#3318
    * ssh(1): fix SEGV in UpdateHostkeys debug() message, triggered when
      the update removed more host keys than remain present.
    * Many manual page fixes.
  - Additional changes from 8.6p1 release:
    = Security
    * sshd(8): OpenSSH 8.5 introduced the LogVerbose keyword. When this
      option was enabled with a set of patterns that activated logging
      in code that runs in the low-privilege sandboxed sshd process, the
      log messages were constructed in such a way that printf(3) format
      strings could effectively be specified the low-privilege code.
    = New features
    * sftp-server(8): add a new limits@openssh.com protocol extension
      that allows a client to discover various server limits, including
      maximum packet size and maximum read/write length.
    * sftp(1): use the new limits@openssh.com extension (when available)
      to select better transfer lengths in the client.
    * sshd(8): Add ModuliFile keyword to sshd_config to specify the
      location of the "moduli" file containing the groups for DH-GEX.
    * unit tests: Add a TEST_SSH_ELAPSED_TIMES environment variable to
      enable printing of the elapsed time in seconds of each test.
    = Bugfixes
    * ssh_config(5), sshd_config(5): sync CASignatureAlgorithms lists in
      manual pages with the current default. GHPR174
    * ssh(1): ensure that pkcs11_del_provider() is called before exit.
      GHPR234
    * ssh(1), sshd(8): fix problems in string->argv conversion. Multiple
      backslashes were not being dequoted correctly and quoted space in
      the middle of a string was being incorrectly split. GHPR223
    * ssh(1): return non-zero exit status when killed by signal; bz#3281
    * sftp-server(8): increase maximum SSH2_FXP_READ to match the maximum
      packet size. Also handle zero-length reads that are not explicitly
      banned by the spec.
  - Additional changes from 8.5p1 release:
    = Security
    * ssh-agent(1): fixed a double-free memory corruption that was
      introduced in OpenSSH 8.2 . We treat all such memory faults as
      potentially exploitable. This bug could be reached by an attacker
      with access to the agent socket.
    = Potentially-incompatible changes
    * ssh(1), sshd(8): this release changes the first-preference signature
      algorithm from ECDSA to ED25519.
    * ssh(1), sshd(8): set the TOS/DSCP specified in the configuration
      for interactive use prior to TCP connect. The connection phase of
      the SSH session is time-sensitive and often explicitly interactive.
      The ultimate interactive/bulk TOS/DSCP will be set after
      authentication completes.
    * ssh(1), sshd(8): remove the pre-standardization cipher
      rijndael-cbc@lysator.liu.se. It is an alias for aes256-cbc before
      it was standardized in RFC4253 (2006), has been deprecated and
      disabled by default since OpenSSH 7.2 (2016) and was only briefly
      documented in ssh.1 in 2001.
    * ssh(1), sshd(8): update/replace the experimental post-quantum
      hybrid key exchange method based on Streamlined NTRU Prime coupled
      with X25519. The previous sntrup4591761x25519-sha512@tinyssh.org
      method is replaced with sntrup761x25519-sha512@openssh.com.
    * ssh(1): disable CheckHostIP by default. It provides insignificant
      benefits while making key rotation significantly more difficult,
      especially for hosts behind IP-based load-balancers.
    = New features
    * ssh(1): this release enables UpdateHostkeys by default subject to
      some conservative preconditions:
    - The key was matched in the UserKnownHostsFile (and not in the
      GlobalKnownHostsFile).
    - The same key does not exist under another name.
    - A certificate host key is not in use.
    - known_hosts contains no matching wildcard hostname pattern.
    - VerifyHostKeyDNS is not enabled.
    - The default UserKnownHostsFile is in use.
    * ssh(1), sshd(8): add a new LogVerbose configuration directive for
      that allows forcing maximum debug logging by file/function/line
      pattern-lists.
    * ssh(1): when prompting the user to accept a new hostkey, display
      any other host names/addresses already associated with the key.
    * ssh(1): allow UserKnownHostsFile=none to indicate that no
      known_hosts file should be used to identify host keys.
    * ssh(1): add a ssh_config KnownHostsCommand option that allows the
      client to obtain known_hosts data from a command in addition to
      the usual files.
    * ssh(1): add a ssh_config PermitRemoteOpen option that allows the
      client to restrict the destination when RemoteForward is used
      with SOCKS.
    * ssh(1): for FIDO keys, if a signature operation fails with a
      "incorrect PIN" reason and no PIN was initially requested from the
      user, then request a PIN and retry the operation. This supports
      some biometric devices that fall back to requiring PIN when reading
      of the biometric failed, and devices that require PINs for all
      hosted credentials.
    * sshd(8): implement client address-based rate-limiting via new
      sshd_config(5) PerSourceMaxStartups and PerSourceNetBlockSize
      directives that provide more fine-grained control on a per-origin
      address basis than the global MaxStartups limit.
    = Bugfixes
    * ssh(1): Prefix keyboard interactive prompts with "(user@host)" to
    make it easier to determine which connection they are associated
    with in cases like scp -3, ProxyJump, etc. bz#3224
    * sshd(8): fix sshd_config SetEnv directives located inside Match
      blocks. GHPR201
    * ssh(1): when requesting a FIDO token touch on stderr, inform the
      user once the touch has been recorded.
    * ssh(1): prevent integer overflow when ridiculously large
      ConnectTimeout values are specified, capping the effective value
      (for most platforms) at 24 days. bz#3229
    * ssh(1): consider the ECDSA key subtype when ordering host key
      algorithms in the client.
    * ssh(1), sshd(8): rename the PubkeyAcceptedKeyTypes keyword to
      PubkeyAcceptedAlgorithms. The previous name incorrectly suggested
      that it control allowed key algorithms, when this option actually
      specifies the signature algorithms that are accepted. The previous
      name remains available as an alias. bz#3253
    * ssh(1), sshd(8): similarly, rename HostbasedKeyTypes (ssh) and
      HostbasedAcceptedKeyTypes (sshd) to HostbasedAcceptedAlgorithms.
    * sftp-server(8): add missing lsetstat@openssh.com documentation
      and advertisement in the server's SSH2_FXP_VERSION hello packet.
    * ssh(1), sshd(8): more strictly enforce KEX state-machine by
      banning packet types once they are received. Fixes memleak caused
      by duplicate SSH2_MSG_KEX_DH_GEX_REQUEST (oss-fuzz #30078).
    * sftp(1): allow the full range of UIDs/GIDs for chown/chgrp on 32bit
      platforms instead of being limited by LONG_MAX. bz#3206
    * Minor man page fixes (capitalization, commas, etc.) bz#3223
    * sftp(1): when doing an sftp recursive upload or download of a
      read-only directory, ensure that the directory is created with
      write and execute permissions in the interim so that the transfer
      can actually complete, then set the directory permission as the
      final step. bz#3222
    * ssh-keygen(1): document the -Z, check the validity of its argument
      earlier and provide a better error message if it's not correct.
      bz#2879
    * ssh(1): ignore comments at the end of config lines in ssh_config,
      similar to what we already do for sshd_config. bz#2320
    * sshd_config(5): mention that DisableForwarding is valid in a
      sshd_config Match block. bz3239
    * sftp(1): fix incorrect sorting of "ls -ltr" under some
      circumstances. bz3248.
    * ssh(1), sshd(8): fix potential integer truncation of (unlikely)
      timeout values. bz#3250
    * ssh(1): make hostbased authentication send the signature algorithm
      in its SSH2_MSG_USERAUTH_REQUEST packets instead of the key type.
      This make HostbasedAcceptedAlgorithms do what it is supposed to -
      filter on signature algorithm and not key type.
  - Rebased patches:
    * openssh-7.7p1-IPv6_X_forwarding.patch
    * openssh-7.7p1-X11_trusted_forwarding.patch
    * openssh-7.7p1-X_forward_with_disabled_ipv6.patch
    * openssh-7.7p1-cavstest-ctr.patch
    * openssh-7.7p1-cavstest-kdf.patch
    * openssh-7.7p1-disable_openssl_abi_check.patch
    * openssh-7.7p1-eal3.patch
    * openssh-7.7p1-enable_PAM_by_default.patch
    * openssh-7.7p1-fips.patch
    * openssh-7.7p1-fips_checks.patch
    * openssh-7.7p1-host_ident.patch
    * openssh-7.7p1-hostname_changes_when_forwarding_X.patch
    * openssh-7.7p1-ldap.patch
    * openssh-7.7p1-no_fork-no_pid_file.patch
    * openssh-7.7p1-pam_check_locks.patch
    * openssh-7.7p1-pts_names_formatting.patch
    * openssh-7.7p1-remove_xauth_cookies_on_exit.patch
    * openssh-7.7p1-seccomp_ipc_flock.patch
    * openssh-7.7p1-seccomp_stat.patch
    * openssh-7.7p1-send_locale.patch
    * openssh-7.7p1-sftp_force_permissions.patch
    * openssh-7.7p1-sftp_print_diagnostic_messages.patch
    * openssh-7.7p1-systemd-notify.patch
    * openssh-7.9p1-keygen-preserve-perms.patch
    * openssh-7.9p1-revert-new-qos-defaults.patch
    * openssh-8.0p1-gssapi-keyex.patch
    * openssh-8.1p1-audit.patch
    * openssh-8.1p1-seccomp-clock_gettime64.patch
    * openssh-8.1p1-seccomp-clock_nanosleep.patch
    * openssh-8.1p1-seccomp-clock_nanosleep_time64.patch
    * openssh-8.1p1-use-openssl-kdf.patch
    * openssh-8.4p1-vendordir.patch
    * openssh-fips-ensure-approved-moduli.patch
    * openssh-link-with-sk.patch
    * openssh-reenable-dh-group14-sha1-default.patch
    * openssh-whitelist-syscalls.patch
  - Removed openssh-fix-ssh-copy-id.patch (fixed upstream).
  - openssh.keyring: rotated to new key from https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/RELEASE_KEY.asc
* Thu Aug 19 2021 Thorsten Kukuk <kukuk@suse.com>
  - sshd-gen-keys-start:
    - only source sysconfig file if it exists.
    - create /etc/ssh if it does not exists.
    Required for image based installation/updates.
* Mon Jul 19 2021 Cristian Rodríguez <crrodriguez@opensuse.org>
  - The linux kernel has close_range(2) syscall which current glibc
    uses to implement closefrom(3) which will be then used by openssh.
    whitelist the new system call so closefrom does not fail or
    fallback to iterating proc/self/fd (openssh-whitelist-syscalls.patch)
* Wed Jun 23 2021 Hans Petter Jansson <hpj@suse.com>
  - Don't move user-modified ssh_config and sshd_config files to
    .rpmsave on upgrade.
* Tue May 18 2021 Thorsten Kukuk <kukuk@suse.com>
  - Use pam_motd to unify motd message output [bsc#1185897]
    (openssh-8.4p1-pam_motd.patch)
* Thu Apr 22 2021 Hans Petter Jansson <hpj@suse.com>
  - Change vendor configuration dir from /usr/share/ssh/ to
    /usr/etc/ssh/.
  - Remove upgrade enablement hack. This has been fixed in
    systemd-rpm-macros (bsc#1180083).
* Wed Feb 24 2021 Thorsten Kukuk <kukuk@suse.com>
  - Add support for vendor provided configuration files in
    /usr/share/ssh/ (openssh-8.4p1-vendordir.patch)
  - Move configuration files from /etc/ssh/ to /usr/share/ssh/
* Thu Feb 18 2021 Johannes Segitz <jsegitz@suse.com>
  - Drop openssh-7.7p1-allow_root_password_login.patch to prevent login
    as root via password by default (is also upstream default). Comment
    indicates that this was a temporary meassure that we now had for
    five years, time to get rid of it (bsc#1173067)
* Mon Feb 15 2021 Hans Petter Jansson <hpj@suse.com>
  - Add openssh-whitelist-syscalls.patch (bsc#1182232), fixing
    failure to accept connections on 32-bit platforms with
    glibc 2.33+.
* Wed Jan 27 2021 Thorsten Kukuk <kukuk@suse.com>
  - Add support for /etc/ssh/ssh_config.d and /etc/ssh/sshd_config.d
    (openssh-8.4p1-ssh_config_d.patch)
* Sat Jan 23 2021 Hans Petter Jansson <hpj@suse.com>
  - Add openssh-fix-ssh-copy-id.patch, which fixes breakage
    introduced in 8.4p1 (bsc#1181311).
* Fri Jan 22 2021 Hans Petter Jansson <hpj@suse.com>
  - Improve robustness of sshd init detection when upgrading from
    a pre-systemd distribution.
* Fri Jan 22 2021 Hans Petter Jansson <hpj@suse.com>
  - Add openssh-reenable-dh-group14-sha1-default.patch, which adds
    diffie-hellman-group14-sha1 key exchange back to the default
    list (bsc#1180958). This is needed for backwards compatibility
    with older platforms.
* Fri Jan 22 2021 Hans Petter Jansson <hpj@suse.com>
  - Make sure sshd is enabled correctly when upgrading from a
    pre-systemd distribution (bsc#1180083).
* Mon Jan 18 2021 Thorsten Kukuk <kukuk@suse.com>
  - sysusers-sshd.conf: use sysusers.d configuration file to create
    sshd user (avoid hard dependency on shadow).
* Mon Jan 18 2021 Dirk Müller <dmueller@suse.com>
  - update to 8.4p1:
    Security
    ========
    * ssh-agent(1): restrict ssh-agent from signing web challenges for
    FIDO/U2F keys.
    * ssh-keygen(1): Enable FIDO 2.1 credProtect extension when generating
    a FIDO resident key.
    * ssh(1), ssh-keygen(1): support for FIDO keys that require a PIN for
    each use. These keys may be generated using ssh-keygen using a new
    "verify-required" option. When a PIN-required key is used, the user
    will be prompted for a PIN to complete the signature operation.
    New Features
    - -----------
    * sshd(8): authorized_keys now supports a new "verify-required"
    option to require FIDO signatures assert that the token verified
    that the user was present before making the signature. The FIDO
    protocol supports multiple methods for user-verification, but
    currently OpenSSH only supports PIN verification.
    * sshd(8), ssh-keygen(1): add support for verifying FIDO webauthn
    signatures. Webauthn is a standard for using FIDO keys in web
    browsers. These signatures are a slightly different format to plain
    FIDO signatures and thus require explicit support.
    * ssh(1): allow some keywords to expand shell-style ${ENV}
    environment variables. The supported keywords are CertificateFile,
    ControlPath, IdentityAgent and IdentityFile, plus LocalForward and
    RemoteForward when used for Unix domain socket paths. bz#3140
    * ssh(1), ssh-agent(1): allow some additional control over the use of
    ssh-askpass via a new $SSH_ASKPASS_REQUIRE environment variable,
    including forcibly enabling and disabling its use. bz#69
    * ssh(1): allow ssh_config(5)'s AddKeysToAgent keyword accept a time
    limit for keys in addition to its current flag options. Time-
    limited keys will automatically be removed from ssh-agent after
    their expiry time has passed.
    * scp(1), sftp(1): allow the -A flag to explicitly enable agent
    forwarding in scp and sftp. The default remains to not forward an
    agent, even when ssh_config enables it.
    * ssh(1): add a '%k' TOKEN that expands to the effective HostKey of
    the destination. This allows, e.g., keeping host keys in individual
    files using "UserKnownHostsFile ~/.ssh/known_hosts.d/%k". bz#1654
    * ssh(1): add %-TOKEN, environment variable and tilde expansion to
    the UserKnownHostsFile directive, allowing the path to be
    completed by the configuration (e.g. bz#1654)
    * ssh-keygen(1): allow "ssh-add -d -" to read keys to be deleted
    from stdin. bz#3180
    * sshd(8): improve logging for MaxStartups connection throttling.
    sshd will now log when it starts and stops throttling and periodically
    while in this state. bz#3055
    Bugfixes
    - -------
    * ssh(1), ssh-keygen(1): better support for multiple attached FIDO
    tokens. In cases where OpenSSH cannot unambiguously determine which
    token to direct a request to, the user is now required to select a
    token by touching it. In cases of operations that require a PIN to
    be verified, this avoids sending the wrong PIN to the wrong token
    and incrementing the token's PIN failure counter (tokens
    effectively erase their keys after too many PIN failures).
    * sshd(8): fix Include before Match in sshd_config; bz#3122
    * ssh(1): close stdin/out/error when forking after authentication
    completes ("ssh -f ...") bz#3137
    * ssh(1), sshd(8): limit the amount of channel input data buffered,
    avoiding peers that advertise large windows but are slow to read
    from causing high memory consumption.
    * ssh-agent(1): handle multiple requests sent in a single write() to
    the agent.
    * sshd(8): allow sshd_config longer than 256k
    * sshd(8): avoid spurious "Unable to load host key" message when sshd
    load a private key but no public counterpart
    * ssh(1): prefer the default hostkey algorithm list whenever we have
    a hostkey that matches its best-preference algorithm.
    * sshd(1): when ordering the hostkey algorithms to request from a
    server, prefer certificate types if the known_hosts files contain a key
    marked as a @cert-authority; bz#3157
    * ssh(1): perform host key fingerprint comparisons for the "Are you
    sure you want to continue connecting (yes/no/[fingerprint])?"
    prompt with case sensitivity.
    * sshd(8): ensure that address/masklen mismatches in sshd_config
    yield fatal errors at daemon start time rather than later when
    they are evaluated.
    * ssh-keygen(1): ensure that certificate extensions are lexically
    sorted. Previously if the user specified a custom extension then
    the everything would be in order except the custom ones. bz#3198
    * ssh(1): also compare username when checking for JumpHost loops.
    bz#3057
    * ssh-keygen(1): preserve group/world read permission on known_hosts
    files across runs of "ssh-keygen -Rf /path". The old behaviour was
    to remove all rights for group/other. bz#3146
    * ssh-keygen(1): Mention the [-a rounds] flag in the ssh-keygen
    manual page and usage().
    * sshd(8): explicitly construct path to ~/.ssh/rc rather than
    relying on it being relative to the current directory, so that it
    can still be found if the shell startup changes its directory.
    bz#3185
    * sshd(8): when redirecting sshd's log output to a file, undo this
    redirection after the session child process is forked(). Fixes
    missing log messages when using this feature under some
    circumstances.
    * sshd(8): start ClientAliveInterval bookkeeping before first pass
    through select() loop; fixed theoretical case where busy sshd may
    ignore timeouts from client.
    * ssh(1): only reset the ServerAliveInterval check when we receive
    traffic from the server and ignore traffic from a port forwarding
    client, preventing a client from keeping a connection alive when
    it should be terminated. bz#2265
    * ssh-keygen(1): avoid spurious error message when ssh-keygen
    creates files outside ~/.ssh
    * sftp-client(1): fix off-by-one error that caused sftp downloads to
    make one more concurrent request that desired. This prevented using
    sftp(1) in unpipelined request/response mode, which is useful when
    debugging. bz#3054
    * ssh(1), sshd(8): handle EINTR in waitfd() and timeout_connect()
    helpers. bz#3071
    * ssh(1), ssh-keygen(1): defer creation of ~/.ssh until we attempt to
    write to it so we don't leave an empty .ssh directory when it's not
    needed. bz#3156
    * ssh(1), sshd(8): fix multiplier when parsing time specifications
    when handling seconds after other units. bz#3171
* Fri Jan 08 2021 Hans Petter Jansson <hpj@suse.com>
  - Update openssh-8.1p1-audit.patch (bsc#1180501). This fixes
    occasional crashes on connection termination caused by accessing
    freed memory.
* Fri Nov 27 2020 Thorsten Kukuk <kukuk@suse.com>
  - Support /usr/etc/pam.d
* Wed Nov 11 2020 Hans Petter Jansson <hpj@suse.com>
  - Fix build breakage caused by missing security key objects:
    + Modify openssh-7.7p1-cavstest-ctr.patch.
    + Modify openssh-7.7p1-cavstest-kdf.patch.
    + Add openssh-link-with-sk.patch.
* Wed Nov 11 2020 Hans Petter Jansson <hpj@suse.com>
  - Add openssh-fips-ensure-approved-moduli.patch (bsc#1177939).
    This ensures only approved DH parameters are used in FIPS mode.
* Wed Nov 11 2020 Hans Petter Jansson <hpj@suse.com>
  - Add openssh-8.1p1-ed25519-use-openssl-rng.patch (bsc#1173799).
    This uses OpenSSL's RAND_bytes() directly instead of the internal
    ChaCha20-based implementation to obtain random bytes for Ed25519
    curve computations. This is required for FIPS compliance.
* Thu Oct 08 2020 Hans Petter Jansson <hpj@suse.com>
  - Work around %service_add_post disabling sshd on upgrade with
    package name change (bsc#1177039).
* Fri Sep 25 2020 Dominique Leuenberger <dimstar@opensuse.org>
  - Fix fillup-template usage:
    + %post server needs to reference ssh (not sshd), which matches
      the sysconfig.ssh file name the package ships.
    + %post client does not need any fillup_ calls, as there is no
      client-relevant sysconfig file present. The naming of the
      sysconfig file (ssh instead of sshd) is unfortunate.
* Fri Sep 25 2020 Franck Bui <fbui@suse.com>
  - Use of DISABLE_RESTART_ON_UPDATE is deprecated.
    Replace it with %service_del_postun_without_restart
* Thu Sep 17 2020 Jan Engelhardt <jengelh@inai.de>
  - Move some Requires to the right subpackage.
  - Avoid ">&" bashism in %post.
  - Upgrade some old specfile constructs/macros and drop unnecessary
    %{?systemd_*}.
  - Trim descriptions and straighten out the grammar.
* Thu Sep 10 2020 Hans Petter Jansson <hpj@suse.com>
  - Split openssh package into openssh, openssh-common,
    openssh-server and openssh-clients. This allows for the ssh
    clients to be installed without the server component
    (bsc#1176434).
* Fri Jun 05 2020 Hans Petter Jansson <hpj@suse.com>
  - Version update to 8.3p1:
    = Potentially-incompatible changes
    * sftp(1): reject an argument of "-1" in the same way as ssh(1) and
      scp(1) do instead of accepting and silently ignoring it.
    = New features
    * sshd(8): make IgnoreRhosts a tri-state option: "yes" to ignore
      rhosts/shosts, "no" allow rhosts/shosts or (new) "shosts-only"
      to allow .shosts files but not .rhosts.
    * sshd(8): allow the IgnoreRhosts directive to appear anywhere in a
      sshd_config, not just before any Match blocks.
    * ssh(1): add %TOKEN percent expansion for the LocalFoward and
      RemoteForward keywords when used for Unix domain socket forwarding.
    * all: allow loading public keys from the unencrypted envelope of a
      private key file if no corresponding public key file is present.
    * ssh(1), sshd(8): prefer to use chacha20 from libcrypto where
      possible instead of the (slower) portable C implementation included
      in OpenSSH.
    * ssh-keygen(1): add ability to dump the contents of a binary key
      revocation list via "ssh-keygen -lQf /path".
  - Additional changes from 8.2p1 release:
    = Potentially-incompatible changes
    * ssh(1), sshd(8), ssh-keygen(1): this release removes the "ssh-rsa"
      (RSA/SHA1) algorithm from those accepted for certificate signatures
      (i.e. the client and server CASignatureAlgorithms option) and will
      use the rsa-sha2-512 signature algorithm by default when the
      ssh-keygen(1) CA signs new certificates.
    * ssh(1), sshd(8): this release removes diffie-hellman-group14-sha1
      from the default key exchange proposal for both the client and
      server.
    * ssh-keygen(1): the command-line options related to the generation
      and screening of safe prime numbers used by the
      diffie-hellman-group-exchange-* key exchange algorithms have
      changed. Most options have been folded under the -O flag.
    * sshd(8): the sshd listener process title visible to ps(1) has
      changed to include information about the number of connections that
      are currently attempting authentication and the limits configured
      by MaxStartups.
    * ssh-sk-helper(8): this is a new binary. It is used by the FIDO/U2F
      support to provide address-space isolation for token middleware
      libraries (including the internal one). It needs to be installed
      in the expected path, typically under /usr/libexec or similar.
    = New features
    * This release adds support for FIDO/U2F hardware authenticators to
      OpenSSH. U2F/FIDO are open standards for inexpensive two-factor
      authentication hardware that are widely used for website
      authentication.  In OpenSSH FIDO devices are supported by new public
      key types "ecdsa-sk" and "ed25519-sk", along with corresponding
      certificate types.
    * sshd(8): add an Include sshd_config keyword that allows including
      additional configuration files via glob(3) patterns.
    * ssh(1)/sshd(8): make the LE (low effort) DSCP code point available
      via the IPQoS directive.
    * ssh(1): when AddKeysToAgent=yes is set and the key contains no
      comment, add the key to the agent with the key's path as the
      comment.
    * ssh-keygen(1), ssh-agent(1): expose PKCS#11 key labels and X.509
      subjects as key comments, rather than simply listing the PKCS#11
      provider library path.
    * ssh-keygen(1): allow PEM export of DSA and ECDSA keys.
    * ssh(1), sshd(8): make zlib compile-time optional, available via the
      Makefile.inc ZLIB flag on OpenBSD or via the --with-zlib configure
      option for OpenSSH portable.
    * sshd(8): when clients get denied by MaxStartups, send a
      notification prior to the SSH2 protocol banner according to
      RFC4253 section 4.2.
    * ssh(1), ssh-agent(1): when invoking the $SSH_ASKPASS prompt
      program, pass a hint to the program to describe the type of
      desired prompt.  The possible values are "confirm" (indicating
      that a yes/no confirmation dialog with no text entry should be
      shown), "none" (to indicate an informational message only), or
      blank for the original ssh-askpass behaviour of requesting a
      password/phrase.
    * ssh(1): allow forwarding a different agent socket to the path
      specified by $SSH_AUTH_SOCK, by extending the existing ForwardAgent
      option to accepting an explicit path or the name of an environment
      variable in addition to yes/no.
    * ssh-keygen(1): add a new signature operations "find-principals" to
      look up the principal associated with a signature from an allowed-
      signers file.
    * sshd(8): expose the number of currently-authenticating connections
      along with the MaxStartups limit in the process title visible to
      "ps".
  - Rebased patches:
    * openssh-7.7p1-cavstest-ctr.patch
    * openssh-7.7p1-cavstest-kdf.patch
    * openssh-7.7p1-fips.patch
    * openssh-7.7p1-fips_checks.patch
    * openssh-7.7p1-ldap.patch
    * openssh-7.7p1-no_fork-no_pid_file.patch
    * openssh-7.7p1-sftp_print_diagnostic_messages.patch
    * openssh-8.0p1-gssapi-keyex.patch
    * openssh-8.1p1-audit.patch
    * openssh-8.1p1-seccomp-clock_nanosleep.patch
  - Removed openssh-7.7p1-seed-prng.patch (bsc#1165158).
* Sun May 31 2020 Andreas Stieger <andreas.stieger@gmx.de>
  - add upstream signing key to actually verify source signature
* Fri Feb 28 2020 Ludwig Nussel <lnussel@suse.de>
  - Don't recommend xauth to avoid pulling in X.
* Tue Feb 18 2020 Fabian Vogt <fvogt@suse.com>
  - Add patches to fix the sandbox blocking glibc on 32bit platforms
    (boo#1164061):
    * openssh-8.1p1-seccomp-clock_nanosleep_time64.patch
    * openssh-8.1p1-seccomp-clock_gettime64.patch
* Tue Feb 11 2020 Hans Petter Jansson <hpj@suse.com>
  - Add openssh-8.1p1-use-openssl-kdf.patch (jsc#SLE-9443). This
    performs key derivation using OpenSSL's SSHKDF facility, which
    allows OpenSSH to benefit from the former's FIPS certification
    status.
* Thu Nov 21 2019 Hans Petter Jansson <hpj@suse.com>
  - Make sure ssh-keygen runs if SSHD_AUTO_KEYGEN variable is unset
    or contains an unrecognized value (bsc#1157176).
* Fri Nov 08 2019 Cristian Rodríguez <crrodriguez@opensuse.org>
  - Add openssh-8.1p1-seccomp-clock_nanosleep.patch, allow clock_nanosleep
    glibc master implements multiple functions using that syscall making
    the privsep sandbox kill the preauth process.
* Thu Oct 17 2019 Hans Petter Jansson <hpj@suse.com>
  - Update openssh-7.7p1-audit.patch to fix crash (bsc#1152730). Fix
    by Enzo Matsumiya (ematsumiya@suse.com). This was integrated in
    a separate code stream merged with the Oct. 10 update; the patch
    was also rebased and renamed to openssh-8.1p1-audit.patch.
* Mon Oct 14 2019 Hans Petter Jansson <hpj@suse.com>
  - Add openssh-7.9p1-keygen-preserve-perms.patch (bsc#1150574).
    This attempts to preserve the permissions of any existing
    known_hosts file when modified by ssh-keygen (for instance,
    with -R).
  - Added openssh-7.9p1-revert-new-qos-defaults.patch, which reverts
    an upstream commit that caused compatibility issues with other
    software (bsc#1136402).
* Mon Oct 14 2019 Hans Petter Jansson <hpj@suse.com>
  - Run 'ssh-keygen -A' on startup only if SSHD_AUTO_KEYGEN="yes"
    in /etc/sysconfig/ssh. This is set to "yes" by default, but
    can be changed by the system administrator (bsc#1139089).
* Mon Oct 14 2019 Hans Petter Jansson <hpj@suse.com>
  - Add openssh-7.9p1-keygen-preserve-perms.patch (bsc#1150574).
    This attempts to preserve the permissions of any existing
    known_hosts file when modified by ssh-keygen (for instance,
    with -R).
* Thu Oct 10 2019 Hans Petter Jansson <hpj@suse.com>
  - Version update to 8.1p1:
    * ssh-keygen(1): when acting as a CA and signing certificates with
      an RSA key, default to using the rsa-sha2-512 signature algorithm.
      Certificates signed by RSA keys will therefore be incompatible
      with OpenSSH versions prior to 7.2 unless the default is
      overridden (using "ssh-keygen -t ssh-rsa -s ...").
    * ssh(1): Allow %n to be expanded in ProxyCommand strings
    * ssh(1), sshd(8): Allow prepending a list of algorithms to the
      default set by starting the list with the '^' character, E.g.
      "HostKeyAlgorithms ^ssh-ed25519"
    * ssh-keygen(1): add an experimental lightweight signature and
      verification ability. Signatures may be made using regular ssh keys
      held on disk or stored in a ssh-agent and verified against an
      authorized_keys-like list of allowed keys. Signatures embed a
      namespace that prevents confusion and attacks between different
      usage domains (e.g. files vs email).
    * ssh-keygen(1): print key comment when extracting public key from a
      private key.
    * ssh-keygen(1): accept the verbose flag when searching for host keys
      in known hosts (i.e. "ssh-keygen -vF host") to print the matching
      host's random-art signature too.
    * All: support PKCS8 as an optional format for storage of private
      keys to disk.  The OpenSSH native key format remains the default,
      but PKCS8 is a superior format to PEM if interoperability with
      non-OpenSSH software is required, as it may use a less insecure
      key derivation function than PEM's.
  - Additional changes from 8.0p1 release:
    * scp(1): Add "-T" flag to disable client-side filtering of
      server file list.
    * sshd(8): Remove support for obsolete "host/port" syntax.
    * ssh(1), ssh-agent(1), ssh-add(1): Add support for ECDSA keys in
      PKCS#11 tokens.
    * ssh(1), sshd(8): Add experimental quantum-computing resistant
      key exchange method, based on a combination of Streamlined NTRU
      Prime 4591^761 and X25519.
    * ssh-keygen(1): Increase the default RSA key size to 3072 bits,
      following NIST Special Publication 800-57's guidance for a
      128-bit equivalent symmetric security level.
    * ssh(1): Allow "PKCS11Provider=none" to override later instances of
      the PKCS11Provider directive in ssh_config,
    * sshd(8): Add a log message for situations where a connection is
      dropped for attempting to run a command but a sshd_config
      ForceCommand=internal-sftp restriction is in effect.
    * ssh(1): When prompting whether to record a new host key, accept
      the key fingerprint as a synonym for "yes". This allows the user
      to paste a fingerprint obtained out of band at the prompt and
      have the client do the comparison for you.
    * ssh-keygen(1): When signing multiple certificates on a single
      command-line invocation, allow automatically incrementing the
      certificate serial number.
    * scp(1), sftp(1): Accept -J option as an alias to ProxyJump on
      the scp and sftp command-lines.
    * ssh-agent(1), ssh-pkcs11-helper(8), ssh-add(1): Accept "-v"
      command-line flags to increase the verbosity of output; pass
      verbose flags though to subprocesses, such as ssh-pkcs11-helper
      started from ssh-agent.
    * ssh-add(1): Add a "-T" option to allowing testing whether keys in
      an agent are usable by performing a signature and a verification.
    * sftp-server(8): Add a "lsetstat@openssh.com" protocol extension
      that replicates the functionality of the existing SSH2_FXP_SETSTAT
      operation but does not follow symlinks.
    * sftp(1): Add "-h" flag to chown/chgrp/chmod commands to request
      they do not follow symlinks.
    * sshd(8): Expose $SSH_CONNECTION in the PAM environment. This makes
      the connection 4-tuple available to PAM modules that wish to use
      it in decision-making.
    * sshd(8): Add a ssh_config "Match final" predicate Matches in same
      pass as "Match canonical" but doesn't require hostname
      canonicalisation be enabled.
    * sftp(1): Support a prefix of '@' to suppress echo of sftp batch
      commands.
    * ssh-keygen(1): When printing certificate contents using
      "ssh-keygen -Lf /path/certificate", include the algorithm that
      the CA used to sign the cert.
  - Rebased patches:
    * openssh-7.7p1-IPv6_X_forwarding.patch
    * openssh-7.7p1-X_forward_with_disabled_ipv6.patch
    * openssh-7.7p1-cavstest-ctr.patch
    * openssh-7.7p1-cavstest-kdf.patch
    * openssh-7.7p1-disable_openssl_abi_check.patch
    * openssh-7.7p1-fips.patch
    * openssh-7.7p1-fips_checks.patch
    * openssh-7.7p1-hostname_changes_when_forwarding_X.patch
    * openssh-7.7p1-ldap.patch
    * openssh-7.7p1-seed-prng.patch
    * openssh-7.7p1-sftp_force_permissions.patch
    * openssh-7.7p1-sftp_print_diagnostic_messages.patch
    * openssh-8.0p1-gssapi-keyex.patch (formerly
      openssh-7.7p1-gssapi_key_exchange.patch)
    * openssh-8.1p1-audit.patch (formerly openssh-7.7p1-audit.patch)
  - Removed patches (integrated upstream):
    * 0001-upstream-Fix-two-race-conditions-in-sshd-relating-to.patch
    * openssh-7.7p1-seccomp_ioctl_s390_EP11.patch
    * openssh-7.9p1-CVE-2018-20685.patch
    * openssh-7.9p1-brace-expansion.patch
    * openssh-CVE-2019-6109-force-progressmeter-update.patch
    * openssh-CVE-2019-6109-sanitize-scp-filenames.patch
    * openssh-CVE-2019-6111-scp-client-wildcard.patch
  - Removed patches (obsolete):
    * openssh-openssl-1_0_0-compatibility.patch
* Mon Aug 19 2019 kukuk@suse.de
  - don't install SuSEfirewall2 service on Factory, since SuSEfirewall2
    has been replaced by firewalld, see [1].
    [1]: https://lists.opensuse.org/opensuse-factory/2019-01/msg00490.html
* Mon Jul 22 2019 Fabian Vogt <fabian@ritter-vogt.de>
  - ssh-askpass: Try a fallback if the other option is not available
* Fri May 31 2019 Vítězslav Čížek <vcizek@suse.com>
  - Fix a crash with GSSAPI key exchange (bsc#1136104)
    * modify openssh-7.7p1-gssapi_key_exchange.patch
* Thu Mar 28 2019 Vítězslav Čížek <vcizek@suse.com>
  - Fix a double free() in the KDF CAVS testing tool (bsc#1065237)
    * modify openssh-7.7p1-cavstest-kdf.patch
* Tue Mar 12 2019 Vítězslav Čížek <vcizek@suse.com>
  - Minor clean-up of the fips patches, modified
    openssh-7.7p1-fips.patch
    openssh-7.7p1-fips_checks.patch
* Mon Mar 11 2019 Vítězslav Čížek <vcizek@suse.com>
  - Fix two race conditions in sshd relating to SIGHUP (bsc#1119183)
    * 0001-upstream-Fix-two-race-conditions-in-sshd-relating-to.patch
* Thu Feb 28 2019 Vítězslav Čížek <vcizek@suse.com>
  - Correctly filter out non-compliant algorithms when in FIPS mode
    (bsc#1126397)
    * A hunk was applied to a wrong place due to a patch fuzz when
      the fips patch was being ported to openssh 7.9p1
  - update openssh-7.7p1-fips.patch
* Wed Feb 27 2019 Vítězslav Čížek <vcizek@suse.com>
  - Remove the "KexDHMin" config keyword (bsc#1127180)
    It used to allow lowering of the minimal allowed DH group size,
    which was increased to 2048 by upstream in the light of the Logjam
    attack.
    The code was broken since the upgrade to 7.6p1, but nobody noticed.
    As apparently no one needs the functionality any more, let's drop
    the patch.
    It's still possible to use the fixed 1024-bit diffie-hellman-group1-sha1
    key exchange method when working with legacy systems.
  - drop openssh-7.7p1-disable_short_DH_parameters.patch
  - updated patches:
    openssh-7.7p1-fips.patch
    openssh-7.7p1-fips_checks.patch
    openssh-7.7p1-gssapi_key_exchange.patch
* Mon Feb 18 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
  - Handle brace expansion in scp when checking that filenames sent
    by the server side match what the client requested [bsc#1125687]
    * openssh-7.9p1-brace-expansion.patch
* Thu Feb 14 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
  - Updated security fixes:
    * [bsc#1121816, CVE-2019-6109] Sanitize scp filenames via snmprintf
      and have progressmeter force an update at the beginning and end
      of each transfer. Added patches:
    - openssh-CVE-2019-6109-sanitize-scp-filenames.patch
    - openssh-CVE-2019-6109-force-progressmeter-update.patch
    * [bsc#1121821, CVE-2019-6111] Check in scp client that filenames
      sent during remote->local directory copies satisfy the wildcard
      specified by the user. Added patch:
    - openssh-CVE-2019-6111-scp-client-wildcard.patch
    * Removed openssh-7.9p1-scp-name-validator.patch
* Thu Feb 14 2019 Tomáš Chvátal <tchvatal@suse.com>
  - Change the askpass wrapper to not use x11 interface:
    * by default we use the -gnome UI (which is gtk3 only, no gnome dep)
    * if desktop is KDE/LxQt we use ksshaskpass
* Mon Jan 28 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
  - Remove old conditionals
* Fri Jan 25 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
  - Move ssh-ldap* man pages into openssh-helpers [bsc#1051531]
* Thu Jan 24 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
  - Allow root login by default [bsc#1118114, bsc#1121196]
    * Added/updated previous patch openssh-7.7p1-allow_root_password_login.patch
    * Mention the change in README.SUSE
* Thu Jan 24 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
  - Added SLE conditionals in the spec files:
    * Keep gtk2-devel in openssh-askpass-gnome in SLE
    * Keep krb5-mini-devel in SLE
  - Removed obsolete configure options:
    * SSH protocol 1 --with-ssh1
    * Smart card --with-opensc
  - Cleaned spec file with spec-cleaner
* Wed Jan 16 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
  - Security fix:
    * [bsc#1121816, CVE-2019-6109] scp client spoofing via object name
    * [bsc#1121818, CVE-2019-6110] scp client spoofing via stderr
    * [bsc#1121821, CVE-2019-6111] scp client missing received object
      name validation
    * Added patch openssh-7.9p1-scp-name-validator.patch
* Fri Jan 11 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
  - Security fix: [bsc#1121571, CVE-2018-20685]
    * The scp client allows remote SSH servers to bypass intended
      access restrictions
    * Added patch openssh-7.9p1-CVE-2018-20685.patch
* Thu Jan 03 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
  - Added compatibility with SuSEfirewall2 [bsc#1118044]

Files

No Filelist in the Package !

Generated by rpm2html 1.8.1

Fabrice Bellet, Thu Mar 9 11:17:46 2023