Call for testing: OpenSSH 6.1

Jeff Wieland wieland at purdue.edu
Sat Aug 25 04:55:33 EST 2012


Ran find on SPARC Solaris 10 using Sun Studio 12.

ok expand %h and %n
all tests passed

Damien Miller wrote:
> Hi,
>
> OpenSSH 6.1 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This release contains a
> couple of new features and bug fixes.
>
> Snapshot releases for portable OpenSSH are available from
> http://www.mindrot.org/openssh_snap/
>
> The OpenBSD version is available in CVS HEAD:
> http://www.openbsd.org/anoncvs.html
>
> Portable OpenSSH is also available via anonymous CVS using the
> instructions at http://www.openssh.com/portable.html#cvs or
> via Mercurial at http://hg.mindrot.org/openssh
>
> Running the regression tests supplied with Portable OpenSSH does not
> require installation and is a simply:
>
> $ ./configure && make tests
>
> Live testing on suitable non-production systems is also
> appreciated. Please send reports of success or failure to
> openssh-unix-dev at mindrot.org.
>
> Below is a summary of changes. More detail may be found in the ChangeLog
> in the portable OpenSSH tarballs.
>
> Thanks to the many people who contributed to this release.
>
> -------------------------------
>
> Features:
>
>  * sshd(8): This release turns on pre-auth sandboxing sshd by default for
>    new installs, by setting UsePrivilegeSeparation=sandbox in sshd_config.
>  * ssh-keygen(1): Add options to specify starting line number and number of
>    lines to process when screening moduli candidates, allowing processing
>    of different parts of a candidate moduli file in parallel
>  * sshd(8): The Match directive now supports matching on the local (listen)
>    address and port upon which the incoming connection was received via
>    LocalAddress and LocalPort clauses.
>  * sshd(8): Extend sshd_config Match directive to allow setting AcceptEnv
>    and {Allow,Deny}{Users,Groups}
>  * Add support for RFC6594 SSHFP DNS records for ECDSA key types. bz#1978
>  * ssh-keygen(1): Allow conversion of RSA1 keys to public PEM and PKCS8
>  * sshd(8): Allow the sshd_config PermitOpen directive to accept "none" as
>    an argument to refuse all port-forwarding requests.
>  * sshd(8): Support "none" as an argument for AuthorizedPrincipalsFile
>  * ssh-keyscan(1): Look for ECDSA keys by default. bz#1971
>  * sshd(8): Add "VersionAddendum" to sshd_config to allow server operators
>    to append some arbitrary text to the server SSH protocol banner.
>
> Bugfixes:
>
>  * ssh(1)/sshd(8): Don't spin in accept() in situations of file
>    descriptor exhaustion. Instead back off for a while.
>  * ssh(1)/sshd(8): Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs as
>    they were removed from the specification. bz#2023,
>  * sshd(8): Handle long comments in config files better. bz#2025
>  * ssh(1): Delay setting tty_flag so RequestTTY options are correctly
>    picked up. bz#1995
>  * sshd(8): Fix handling of /etc/nologin incorrectly being applied to root
>    on platforms that use login_cap.
>
> Portable OpenSSH:
>
>  * sshd(8): Allow sshd pre-auth sandboxing to fall-back to the rlimit
>    sandbox from the Linux SECCOMP filter sandbox when the latter is
>    not available in the kernel.
>  * ssh(1): Fix NULL dereference when built with LDNS and using DNSSEC to
>    retrieve a CNAME SSHFP record.
>  * Fix cross-compilation problems related to pkg-config. bz#1996
>
> Reporting Bugs:
> ===============
>
> - Please read http://www.openssh.com/report.html
>   Security bugs should be reported directly to openssh at openssh.com
>
> OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt,
> Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre, Tim Rice and
> Ben Lindstrom.
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>
>   


-- 
          Jeff Wieland            |         Purdue University
   Network Systems Administrator  |        ITSO UNIX Platforms
       Voice: (765)496-8234       |        401 S. Grant Street
        FAX: (765)496-1380        |      West Lafayette, IN 47907



More information about the openssh-unix-dev mailing list