Call for testing: OpenSSH 7.7
Hisashi T Fujinaka
htodd at twofifty.com
Sat Mar 24 04:17:58 AEDT 2018
Not working on NetBSD-current for obvious reasons:
checking OpenSSL header version... 1010007f (OpenSSL 1.1.0g 2 Nov 2017)
checking OpenSSL library version... configure: error: OpenSSL >= 1.1.0 is not yet supported (have "1010007f (OpenSSL 1.1.0g 2 Nov 2017)")
On Thu, 22 Mar 2018, Damien Miller wrote:
> Hi,
>
> OpenSSH 7.7p1 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This is a bugfix release.
>
> Snapshot releases for portable OpenSSH are available from
> http://www.mindrot.org/openssh_snap/
>
> The OpenBSD version is available in CVS HEAD:
> http://www.openbsd.org/anoncvs.html
>
> Portable OpenSSH is also available via git using the
> instructions at http://www.openssh.com/portable.html#cvs
> At https://anongit.mindrot.org/openssh.git/ or via a mirror at Github:
> https://github.com/openssh/openssh-portable
>
> Running the regression tests supplied with Portable OpenSSH does not
> require installation and is a simply:
>
> $ ./configure && make tests
>
> Live testing on suitable non-production systems is also appreciated.
> Please send reports of success or failure to
> openssh-unix-dev at mindrot.org. Security bugs should be reported
> directly to openssh at openssh.com.
>
> Below is a summary of changes. More detail may be found in the ChangeLog
> in the portable OpenSSH tarballs.
>
> Thanks to the many people who contributed to this release.
>
> Potentially-incompatible changes
> ================================
>
> This release includes a number of changes that may affect existing
> configurations:
>
> * ssh(1)/sshd(8): Drop compatibility support for some very old SSH
> implementations, including ssh.com <=2.* and OpenSSH <= 3.*.
> These versions were all released in or before 2001 and predate the
> final SSH RFCs. The support in question isn't necessary for RFC-
> compliant SSH implementations.
>
> Changes since OpenSSH 7.6
> =========================
>
> This is primarily a bugfix release.
>
> New Features
> ------------
>
> * All: Add experimental support for PQC XMSS keys (Extended Hash-
> Based Signatures) based on the algorithm described in
> https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-signatures-12
> The XMSS signature code is experimental and not compiled in by
> default.
>
> * sshd(8): Add a "rdomain" criteria for the sshd_config Match keyword
> to allow conditional configuration that depends on which routing
> domain a connection was received on (currently supported on OpenBSD
> and Linux).
>
> * sshd_config(5): Add an optional rdomain qualifier to the
> ListenAddress directive to allow listening on different routing
> domains. This is supported only on OpenBSD and Linux at present.
>
> * sshd_config(5): Add RDomain directive to allow the authenticated
> session to be placed in an explicit routing domain. This is only
> supported on OpenBSD at present.
>
> * sshd(8): Add "expiry-time" option for authorized_keys files to
> allow for expiring keys.
>
> * ssh(1): Add a BindInterface option to allow binding the outgoing
> connection to an interface's address (basically a more usable
> BindAddress)
>
> * ssh(1): Expose device allocated for tun/tap forwarding via a new
> %T expansion for LocalCommand. This allows LocalCommand to be used
> to prepare the interface.
>
> * sshd(8): Expose the device allocated for tun/tap forwarding via a
> new SSH_TUNNEL environment variable. This allows automatic setup of
> the interface and surrounding network configuration automatically on
> the server.
>
> * ssh(1)/scp(1)/sftp(1): Add URI support to ssh, sftp and scp, e.g.
> ssh://user@host or sftp://user@host/path. Additional connection
> parameters described in draft-ietf-secsh-scp-sftp-ssh-uri-04 are not
> implemented since the ssh fingerprint format in the draft uses the
> deprecated MD5 hash with no way to specify the any other algorithm.
>
> * ssh-keygen(1): Allow certificate validity intervals that specify
> only a start or stop time (instead of both or neither).
>
> * sftp(1): Allow "cd" and "lcd" commands with no explicit path
> argument. lcd will change to the local user's home directory as
> usual. cd will change to the starting directory for session (because
> the protocol offers no way to obtain the remote user's home
> directory). bz#2760
>
> * sshd(8): When doing a config test with sshd -T, only require the
> attributes that are actually used in Match criteria rather than (an
> incomplete list of) all criteria.
>
> * sshd(8): Fix support for client that advertise a protocol version
> of "1.99" (indicating that they are prepared to accept both SSHv1 and
> SSHv2). This was broken in OpenSSH 7.6 during the removal of SSHv1
> support. bz#2810
>
> Bugfixes
> --------
>
> * ssh(1): Warn when the agent returns a ssh-rsa (SHA1) signature when
> a rsa-sha2-256/512 signature was requested. This condition is possible
> when an old or non-OpenSSH agent is in use. bz#2799
>
> * ssh(1)/sshd(8): More strictly check signature types during key
> exchange against what was negotiated. Prevents downgrade of RSA
> signatures made with SHA-256/512 to SHA-1.
>
> * ssh-agent(1): Fix regression introduce in 7.6 that caused ssh-agent
> to fatally exit if presented an invalid signature request message.
>
> * sshd_config(5): Accept yes/no flag options case-insensitively, as
> has been the case in ssh_config(5) for a long time. bz#2664
>
> * ssh(1): Improve error reporting for failures during connection.
> Under some circumstances misleading errors were being shows. bz#2814
>
> * ssh-keyscan(1): Add -D option to allow printing of results directly
> in SSHFP format. bz#2821
>
> * regress tests: fix PuTTY interop test broken in last release's SSHv1
> removal. bz#2823
>
> * ssh(1): Compatibility fix for some servers that erroneously drop the
> connection when the IUTF8 (RFC8160) option is sent.
>
> * scp(1): Disable RemoteCommand and RequestTTY in the ssh session
> started by scp (sftp was already doing this.)
>
> * ssh-keygen(1): Refuse to create a certificate with an unusable
> number of principals.
>
> * ssh-keygen(1): Fatally exit if ssh-keygen is unable to write all the
> public key during key generation. Previously it would silently
> ignore errors writing the comment and terminating newline.
>
> * ssh(1): Do not modify hostname arguments that are addresses by
> automatically forcing them to lower-case. Instead canonicalise them
> to resolve ambiguities (e.g. ::0001 => ::1) before they are matched
> against known_hosts. bz#2763
>
> * ssh(1): Don't accept junk after "yes" or "no" responses to hostkey
> prompts. bz#2803
>
> * sftp(1): Have sftp print a warning about shell cleanliness when
> decoding the first packet fails, which is usually caused by shells
> polluting stdout of non-interactive startups. bz#2800
>
> * ssh(1)/sshd(8): Switch timers in packet code from using wall-clock
> time to monotonic time, allowing the packet layer to better function
> over a clock step and avoiding possible integer overflows during
> steps.
>
> * Numerous manual page fixes and improvements.
>
> Portability
> -----------
>
> * sshd(8): Correctly detect MIPS ABI in use at configure time. Fixes
> sandbox violations on some environments.
>
> * sshd(8): Remove UNICOS support. The hardware and software are literal
> museum pieces and support in sshd is too intrusive to justify
> maintaining.
>
> * All: Build and link with "retpoline" flags when available to mitigate
> the "branch target injection" style (variant 2) of the Spectre
> branch-prediction vulnerability.
>
> * All: Add auto-generated dependency information to Makefile.
>
> * Numerous fixed to the RPM spec files.
>
> OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de
> Raadt, Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre,
> Tim Rice and Ben Lindstrom.
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>
--
Hisashi T Fujinaka - htodd at twofifty.com
BSEE + BSChem + BAEnglish + MSCS + $2.50 = coffee
More information about the openssh-unix-dev
mailing list