Call for testing: OpenSSH-6.3

Andy Tsouladze andyb1 at andy-t.org
Fri Jul 26 10:52:09 EST 2013


openssh-SNAP-20130726.tar.gz compiles and passes all tests on 
slackware64-14.0.

I found it strange that configure script does not try to determine whether 
md5 passwords are supported by the system, and it defaults to no support. 
It only checks if --with-md5-passwords was supplied.  Is this intended? 
What are the consequences of running sshd with no md5 password support on 
a system that does support them?  Is there a way to programmatically 
determine this?  Or maybe default should be to support md5 passwords?

Regards,

Andy

On Thu, 25 Jul 2013, Damien Miller wrote:

> Hi,
>
> OpenSSH 6.3 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This release contains
> some substantial new features and a number of bugfixes.
>
> Snapshot releases for portable OpenSSH are available from
> http://www.mindrot.org/openssh_snap/
>
> The OpenBSD version is available in CVS HEAD:
> http://www.openbsd.org/anoncvs.html
>
> Portable OpenSSH is also available via anonymous CVS using the
> instructions at http://www.openssh.com/portable.html#cvs or
> via Mercurial at http://hg.mindrot.org/openssh
>
> Running the regression tests supplied with Portable OpenSSH does not
> require installation and is a simply:
>
> $ ./configure && make tests
>
> Live testing on suitable non-production systems is also
> appreciated. Please send reports of success or failure to
> openssh-unix-dev at mindrot.org.
>
> Below is a summary of changes. More detail may be found in the ChangeLog
> in the portable OpenSSH tarballs.
>
> Thanks to the many people who contributed to this release.
>
> Changes since OpenSSH 6.2
> =========================
>
> This release is predominantly a bugfix release:
>
> Features:
>
> * sshd(8): add ssh-agent(1) support to sshd(8); allows encrypted hostkeys,
>   or hostkeys on smartcards.
>
> * ssh(1)/sshd(8): allow optional time-based rekeying via a second argument
>   to the existing RekeyLimit option. RekeyLimit is now supported in
>   sshd_config as well as on the client.
>
> * sshd(8): standardise logging of information during user authentication.
>
>   The presented key/cert and the remote username (if available) is now
>   logged in the authentication success/failure message on the same log
>   line as the local username, remote host/port and protocol in use.
>   Certificates contents and the key fingerprint of the signing CA are
>   logged too.
>
>   Including all relevant information on a single line simplifies log
>   analysis as it is no longer necessary to relate information scattered
>   across multiple log entries.
>
> * ssh(1): add the ability to query supported ciphers, MAC algorithms, key
>   types and key exchange methods.
>
> * ssh(1): support ProxyCommand=- to allow support cases where stdin and
>   stdout already point to the proxy.
>
> * ssh(1): allow IdenityFile=none
>
> * ssh(1)/sshd(8): add -E option to ssh and sshd to append debugging logs
>   to a specified file instead of stderr or syslog.
>
> * sftp(1): add support for resuming partial downloads using the "reget"
>   command and on the sftp commandline or on the "get" commandline using
>   the "-a" (append) option.
>
> * ssh(1): add an "IgnoreUnknown" configuration option to selectively
>   suppress errors arising from unknown configuration directives.
>
> * sshd(8): add support for submethods to be appended to required
>   authentication methods listed via AuthenticationMethods.
>
> Bugfixes:
>
> * sshd(8): fix refusal to accept certificate if a key of a different type
>   to the CA key appeared in authorized_keys before the CA key.
>
> * ssh(1)/ssh-agent(1)/sshd(8): Use a monotonic time source for timers so
>   that things like keepalives and rekeying will work properly over clock
>   steps.
>
> * sftp(1): update progressmeter when data is acknowledged, not when it's
>   sent. bz#2108
>
> * ssh(1)/ssh-keygen(1): improve error messages when the current user does
>   not exist in /etc/passwd; bz#2125
>
> * ssh(1): reset the order in which public keys are tried after partial
>   authentication success.
>
> * ssh-agent(1): clean up socket files after SIGINT when in debug mode;
>   bz#2120
>
> * ssh(1) and others: avoid confusing error messages in the case of broken
>   system resolver configurations; bz#2122
>
> * ssh(1): set TCP nodelay for connections started with -N; bz#2124
>
> * ssh(1): correct manual for permission requirements on ~/.ssh/config;
>   bz#2078
>
> * ssh(1): fix ControlPersist timeout not triggering in cases where TCP
>   connections have hung. bz#1917
>
> * ssh(1): properly deatch a ControlPersist master from its controlling
>   terminal.
>
> * sftp(1): avoid crashes in libedit when it has been compiled with multi-
>   byte character support. bz#1990
>
> * sshd(8): when running sshd -D, close stderr unless we have explicitly
>   requested logging to stderr. bz#1976,
>
> * ssh(1): fix incomplete bzero; bz#2100
>
> * sshd(8): log and error and exit if ChrootDirectory is specified and
>   running without root privileges.
>
> * Many improvements to the regression test suite. In particular log files
>   are now saved from ssh and sshd after failures.
>
> * Fix a number of memory leaks. bz#1967 bz#2096 and others
>
> * sshd(8): fix public key authentication when a :style is appended to
>   the requested username.
>
> * ssh(1): do not fatally exit when attempting to cleanup multiplexing-
>   created channels that are incompletely opened. bz#2079
>
> Portable OpenSSH:
>
> * Major overhaul of contrib/cygwin/README
>
> * Fix unaligned accesses in umac.c for strict-alignment architectures.
>   bz#2101
>
> * Enable -Wsizeof-pointer-memaccess if the compiler supports it. bz#2100
>
> * Fix broken incorrect commandline reporting errors. bz#1448
>
> * Only include SHA256 and ECC-based key exchange methods if libcrypto has
>   the required support.
>
> * A number of portability fixes for Android:
>   * Don't try to use lastlog on Android; bz#2111
>   * Fall back to using openssl's DES_crypt function on platorms that don't
>     have a native crypt() function; bz#2112
>   * Test for fd_mask, howmany and NFDBITS rather than trying to enumerate
>     the plaforms that don't have them. bz#2085
>   * Replace S_IWRITE, which isn't standardized, with S_IWUSR, which is.
>     bz#2085
>   * Add a null implementation of endgrent for platforms that don't have
>     it (eg Android) bz#2087
>   * Support platforms, such as Android, that lack struct passwd.pw_gecos.
>     bz#2086
>
> Reporting Bugs:
> ===============
>
> - Please read http://www.openssh.com/report.html
>  Security bugs should be reported directly to openssh at openssh.com
>
> OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt,
> Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre, Tim Rice and
> Ben Lindstrom.
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>

Dr Andy Tsouladze
Sr Unix/Storage SysAdmin


More information about the openssh-unix-dev mailing list