Call for testing: OpenSSH-6.2
Andy Tsouladze
andyb1 at andy-t.org
Thu Feb 28 04:04:39 EST 2013
openssh-SNAP-20130228.tar.gz builds cleanly, with all tests passed on:
Slackware-14.0 64-bit (gcc-4.7.1, openssl-1.0.1c)
Slackware-13.0 32-bit (gcc-4.3.3, openssl-0.9.8k)
Regards,
Andy
On Wed, 27 Feb 2013, Damien Miller wrote:
> Hi,
>
> It's that time again...
>
> OpenSSH 6.2 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This release contains
> some substantial new features and a number of bugfixes.
>
> Snapshot releases for portable OpenSSH are available from
> http://www.mindrot.org/openssh_snap/
>
> The OpenBSD version is available in CVS HEAD:
> http://www.openbsd.org/anoncvs.html
>
> Portable OpenSSH is also available via anonymous CVS using the
> instructions at http://www.openssh.com/portable.html#cvs or
> via Mercurial at http://hg.mindrot.org/openssh
>
> Running the regression tests supplied with Portable OpenSSH does not
> require installation and is a simply:
>
> $ ./configure && make tests
>
> Live testing on suitable non-production systems is also
> appreciated. Please send reports of success or failure to
> openssh-unix-dev at mindrot.org.
>
> Below is a summary of changes. More detail may be found in the ChangeLog
> in the portable OpenSSH tarballs.
>
> Thanks to the many people who contributed to this release.
>
> Changes since OpenSSH 6.1
> =========================
>
> Features:
>
> * ssh(1)/sshd(8): Added support for AES-GCM authenticated encryption in
> SSH protocol 2. The new cipher is available as aes128-gcm at openssh.com
> and aes256-gcm at openssh.com. It uses an identical packet format to the
> AES-GCM mode specified in RFC 5647, but uses simpler and different
> selection rules during key exchange.
>
> * ssh(1)/sshd(8): Added support for encrypt-then-mac (EtM) MAC modes
> for SSH protocol 2. These modes alter the packet format and compute
> the MAC over the packet length and encrypted packet rather than over
> the plaintext data. These modes are considered more secure and are
> used by default when available.
>
> * ssh(1)/sshd(8): Added support for the UMAC-128 MAC as
> "umac-128 at openssh.com" and "umac-128-etm at openssh.com". The latter
> being an encrypt-then-mac mode.
>
> * sshd(8): Added support for multiple required authentication in SSH
> protocol 2 via an AuthenticationMethods option. This option lists
> one or more comma-separated lists of authentication method names.
> Successful completion of all the methods in any list is required for
> authentication to complete. This allows, for example, requiring a
> user having to authenticate via public key or GSSAPI before they
> are offered password authentication.
>
> * sshd(8)/ssh-keygen(1): Added support for Key Revocation Lists
> (KRLs), a compact binary format to represent lists of revoked keys
> and certificates that take as little as one bit per certificate when
> revoking by serial number. KRLs may be generated using ssh-keygen(1)
> and are loaded into sshd(8) via the existing RevokedKeys sshd_config
> option.
>
> * ssh(1): IdentitiesOnly now applies to keys obtained from a
> PKCS11Provider. This allows control of which keys are offered from
> tokens using IdentityFile.
>
> * sshd(8): sshd_config(5)'s AllowTcpForwarding now accepts "local"
> and "remote" in addition to its previous "yes"/"no" keywords to allow
> the server to specify whether just local or remote TCP forwarding is
> enabled.
>
> * sshd(8): Added a sshd_config(5) option AuthorizedKeysCommand to
> support fetching authorized_keys from a command in addition to (or
> instead of) from the filesystem. The command is run under an account
> specified by an AuthorizedKeysCommandUser sshd_config(5) option.
>
> * sftp-server(8): Now supports a -d option to allow the starting
> directory to be something other than the user's home directory.
>
> * ssh-keygen(1): Now allows fingerprinting of keys hosted in PKCS#11
> tokens using "ssh-keygen -lD pkcs11_provider".
>
> * ssh(1): When SSH protocol 2 only is selected (the default), ssh(1)
> now immediately sends its SSH protocol banner to the server without
> waiting to receive the server's banner, saving time when connecting.
>
> * ssh(1): Added ~v and ~V escape sequences to raise and lower the
> logging level respectively.
>
> * ssh(1): Made the escape command help (~?) context sensitive so that
> only commands that will work in the current session are shown.
>
> * ssh-keygen(1): When deleting host lines from known_hosts using
> "ssh-keygen -R host", ssh-keygen(1) now prints details of which lines
> were removed.
>
> Bugfixes:
>
> * ssh(1): Force a clean shutdown of ControlMaster client sessions when
> the ~. escape sequence is used. This means that ~. should now work in
> mux clients even if the server is no longer responding.
>
> * ssh(1): Correctly detect errors during local TCP forward setup in
> multiplexed clients. bz#2055
>
> * ssh-add(1): Made deleting explicit keys "ssh-add -d" symmetric with
> adding keys with respect to certificates. It now tries to delete the
> corresponding certificate and respects the -k option to allow deleting
> of the key only.
>
> * sftp(1): Fix a number of parsing and command-editing bugs, including
> bz#1956
>
> * ssh(1): When muxmaster is run with -N, ensured that it shuts down
> gracefully when a client sends it "-O stop" rather than hanging around.
> bz#1985
>
> * ssh-keygen(1): When screening moduli candidates, append to the file
> rather than overwriting to allow resumption. bz#1957
>
> * ssh(1): Record "Received disconnect" messages at ERROR rather than
> INFO priority. bz#2057.
>
> * ssh(1): Loudly warn if explicitly-provided private key is unreadable.
> bz#1981
>
> Portable OpenSSH:
>
> * sshd(8): The Linux seccomp-filter sandbox is now supported on ARM
> platforms where the kernel supports it.
>
> * sshd(8): The seccomp-filter sandbox will not be enabled if the system
> headers support it at compile time, regardless of whether it can be
> enabled then. If the run-time system does not support seccomp-filter,
> sshd will fall back to the rlimit pseudo-sandbox.
>
> * ssh(1): Don't link in the Kerberos libraries. They aren't necessary
> on the client, just on sshd(8). bz#2072
>
> * Fix GSSAPI linking on Solaris, which uses a differently-named GSSAPI
> library. bz#2073
>
> * Fix compilation on systems with openssl-1.0.0-fips.
>
> * Fix a number of errors in the RPM spec files.
>
> Reporting Bugs:
> ===============
>
> - Please read http://www.openssh.com/report.html
> Security bugs should be reported directly to openssh at openssh.com
>
> OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt,
> Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre, Tim Rice and
> Ben Lindstrom.
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>
Dr Andy Tsouladze
Sr Unix/Storage SysAdmin
More information about the openssh-unix-dev
mailing list