Call for testing: OpenSSH-5.6
Bostjan Skufca
bostjan at a2o.si
Tue Aug 10 16:26:35 EST 2010
+1 for parent poster's suggestion about dir, should be the same as tar file,
i.e.:
---> openssh-SNAP-20100810.tar.gz should unpack to
---> openssh-SNAP-20100810
(of course this is from user's perspective, not from developer's)
Anyway, all tests passed on slackware64 13.0.
b.
On 10 August 2010 01:21, Rainer Laatsch <Laatsch at uni-koeln.de> wrote:
> The snapshots until current unvariably unpack to
> openssh
> Why not add e.g. a timestamp/version-id to the name to inhibit overwriting
> the directory of (say) yesterday? Some extra precautions could then be
> avoided.
>
> Regards,
> R.
>
> =====================================================================
>
>
> On Tue, 10 Aug 2010, Damien Miller wrote:
>
> Hi,
>>
>> OpenSSH 5.6 is almost ready for release, so we would appreciate testing
>> on as many platforms and systems as possible. This is a moderately large
>> release, with a number of new features and bug fixes.
>>
>> Snapshot releases for portable OpenSSH are available from
>> http://www.mindrot.org/openssh_snap/
>>
>> The OpenBSD version is available in CVS HEAD:
>> http://www.openbsd.org/anoncvs.html
>>
>> Portable OpenSSH is also available via anonymous CVS using the
>> instructions at http://www.openssh.com/portable.html#cvs
>>
>> Running the regression tests supplied with Portable OpenSSH does not
>> require installation and is a simply:
>>
>> $ ./configure && make tests
>>
>> Live testing on suitable non-production systems is also
>> appreciated. Please send reports of success or failure to
>> openssh-unix-dev at mindrot.org.
>>
>> Below is a summary of changes. More detail may be found in the ChangeLog
>> in the portable OpenSSH tarballs.
>>
>> Thanks to the many people who contributed to this release.
>>
>> -------------------------------
>>
>> Features:
>>
>> * Added a ControlPersist option to ssh_config(5) that automatically
>> starts a background ssh(1) multiplex master when connecting. This
>> connection can stay alive indefinitely, or can be set to
>> automatically close after a user-specified duration of inactivity.
>>
>> * Hostbased authentication may now use certificate host keys. CA keys
>> must be specified in a known_hosts file using the @cert-authority
>> marker.
>>
>> * ssh-keygen(1) now supports signing certificates using a CA key that
>> has been stored in a PKCS#11 token.
>>
>> * ssh(1) will now log the hostname and address that we connected to at
>> LogLevel=verbose after authentication is successful to mitigate
>> "phishing" attacks by servers with trusted keys that accept
>> authentication silently and automatically before presenting fake
>> password/passphrase prompts.
>>
>> Note that, for such an attack to be successful, the user must have
>> disabled StrictHostKeyChecking (enabled by default) or an attacker
>> must have access to a trusted host key for the destination server.
>>
>> * Expand %h to the hostname in ssh_config Hostname options. While this
>> sounds useless, it is actually handy for working with unqualified
>> hostnames:
>>
>> Host *.*
>> Hostname %h
>> Host *
>> Hostname %h.example.org
>>
>> * Allow ssh-keygen(1) to import (-i) and export (-e) of PEM and PKCS#8
>> keys in addition to RFC4716 (SSH.COM) encodings via a new -m option
>> (bz#1749)
>>
>> * sshd(8) will now queue debug messages for bad ownership or
>> permissions on the user's keyfiles encountered during authentication.
>> These messages will be sent after the user has successfully
>> authenticated. These messages may be viewed in ssh(1) at
>> LogLevel=debug or higher.
>>
>> * ssh(1) connection multiplexing now supports remote forwarding with
>> dynamic port allocation and can report the allocated port back to
>> the user:
>>
>> LPORT=`ssh -S muxsocket -R0:localhost:25 -O forward somehost`
>>
>> * sshd(8) now supports indirection in matching of principal names
>> listed in certificates. By default, if a certificate has an
>> embedded principals list then the destination username must match
>> one of the names in the list for it to be accepted for
>> authentication.
>>
>> sshd(8) now supports an optional AuthorizedPrincipalsFile to specify
>> a list of names that may be accepted in place of the username when
>> authorizing a certificate trusted via the sshd_config(5)
>> TrustedCAKeys option. Similarly, authentication using a CA trusted
>> in ~/.ssh/authorized_keys now accepts a principals="name1[,name2,...]"
>> to specify a list of permitted names.
>>
>> If either option is absent, the current behaviour of requiring the
>> username to appear in principals continues to apply. These options
>> are useful for role accounts, disjoint account namespaces and
>> "user at realm"-style naming policies in certificates.
>>
>> * Expose some more sshd_config(5) options inside Match blocks:
>>
>> AuthorizedKeysFile
>> AuthorizedPrincipalsFile
>> HostbasedUsesNameFromPacketOnly
>> PermitTunnel
>>
>> * Revised the format of certificate keys. The new format, identified as
>> ssh-{dss,rsa}-cert-v01 at openssh.com <rsa%7D-cert-v01 at openssh.com>includes the following changes:
>>
>> - Addition of a serial number field. This may be specified by the CA
>> at the time of certificate signing.
>>
>> - Moving the nonce field to the beginning of the certificate where
>> it can better protect against chosen-prefix attacks on the
>> signature hash (currently infeasible against the SHA1 hash used)
>>
>> - Renaming of the "constraints" field to "critical options"
>>
>> - Addng of a new non-critical "extensions" field. The "permit-*"
>> options are now extensions, rather than critical options to
>> permit non-OpenSSH implementation of this key format to degrade
>> gracefully when encountering keys with options they do not
>> recognize.
>>
>> The older format is still support for authentication and cert generation
>> (use "ssh-keygen -t v00 -s ca_key ..." to generate a v00 certificate).
>> The older format, introduced in OpenSSH 5.4, will be supported for at
>> least one year from this release, after which it will be deprecated and
>> removed.
>>
>> BugFixes:
>>
>> * The PKCS#11 code now retries a lookup for a private key if there's
>> no matching key with CKA_SIGN attribute enabled; this fixes fixes
>> MuscleCard support (bz#1736)
>>
>> * Unbreak strdelim() skipping past quoted strings, e.g.
>>
>> AllowUsers "blah blah" blah
>>
>> was broken (bz#1757)
>>
>> * sftp(1): fix swapped args in upload_dir_internal(), breaking
>> recursive upload depth checks and causing verbose printing of
>> transfers to always be turned on (bz#1797)
>>
>> * Fix a longstanding problem where if you suspend scp(1) at the
>> password/passphrase prompt the terminal mode is not restored.
>>
>> * Fix PKCS#11 crash on some smartcards by checking the length
>> returned for C_GetAttributValue for != 0 (bz#1773)
>>
>> * sftp(1): unbreak ls in working directories that contain globbing
>> characters in their pathnames (bz#1655)
>>
>> * Print warning for missing home directory when ChrootDirectory=none
>> (bz#1564)
>>
>> * sftp(1): fix memory leak in do_realpath() error path (bz#1771)
>>
>> * ssk-keygen(1): Standardise error messages when attempting to open
>> private key files to include "progname: filename: error reason"
>> (bz#1783)
>>
>> * Replace verbose and overflow-prone Linebuf code with
>> read_keyfile_line() (bz#1565)
>>
>> * Include the user name on "subsystem request for ..." log messages
>>
>> * ssh(1) and sshd(8): remove hardcoded limit of 100 permitopen clauses
>> and port forwards per direction (bz#1327)
>>
>> * sshd(8): ignore stderr output from subsystems to avoid hangs if a
>> subsystem or shell initialisation writes to stderr (bz#1750)
>>
>> * Skip the initial check for access with an empty password when
>> PermitEmptyPasswords=no (bz#1638)
>>
>> * sshd(8): fix logspam when key options (from="..." especially) deny
>> non-matching keys (bz#1765)
>>
>> * ssh-keygen(1): display a more helpful error message when $HOME is
>> inaccessible while trying to create .ssh directory (bz#1740)
>>
>> * ssh(1): fix hang when terminating a mux slave using ~. (bz#1758)
>>
>> * ssh-keygen(1): refuse to generate keys longer than
>> OPENSSL_[RD]SA_MAX_MODULUS_BITS, since we would refuse to use
>> them anyway (bz#1516)
>>
>> * Suppress spurious tty warning when using -O and stdin is not a tty
>> (bz#1746)
>>
>> * Kill channel when pty allocation requests fail. Fixed stuck client
>> if the server refuses pty allocation (bz#1698)
>>
>> Portable OpenSSH Bugfixes:
>>
>> - sshd(8): increase the maximum username length for login recording
>> to 512 characters (bz#1579)
>>
>> * Initialize the values to be returned from PAM to sane values in case
>> the PAM method doesn't write to them. (bz#1795)
>>
>> - Let configure find OpenSSL libraries in a lib64 subdirectory. (bz#1756)
>>
>> Checksums:
>> ==========
>>
>> - SHA1 (openssh-5.5.tar.gz) = XXX
>> - SHA1 (openssh-5.5p1.tar.gz) = XXX
>>
>> Reporting Bugs:
>> ===============
>>
>> - Please read http://www.openssh.com/report.html
>> Security bugs should be reported directly to openssh at openssh.com
>>
>> OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt,
>> Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre, Tim Rice and
>> Ben Lindstrom.
>>
>> _______________________________________________
>> openssh-unix-dev mailing list
>> openssh-unix-dev at mindrot.org
>> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>>
>> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>
More information about the openssh-unix-dev
mailing list