Call for testing: OpenSSH 8.0 (Solaris 10 fail)
Wieland, Jeffrey J.
wieland at purdue.edu
Tue Apr 2 15:50:18 AEDT 2019
On SPARC Solaris 10, using Solaris Studio 12.2,
make tests fails with:
ssh-add did not fail for nobody: 1 < 2
failed disallow agent attach from other uid
*** Error code 1
--
Jeff Wieland, UNIX/Network Systems Administrator
Purdue University IT Infrastructure Services UNIX Platforms
Damien Miller wrote:
> Hi,
>
> OpenSSH 8.0p1 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible.
>
> Snapshot releases for portable OpenSSH are available from
> http://www.mindrot.org/openssh_snap/
>
> The OpenBSD version is available in CVS HEAD:
> http://www.openbsd.org/anoncvs.html
>
> Portable OpenSSH is also available via git using the
> instructions at http://www.openssh.com/portable.html#cvs
> At https://anongit.mindrot.org/openssh.git/ or via a mirror at Github:
> https://github.com/openssh/openssh-portable
>
> Running the regression tests supplied with Portable OpenSSH does not
> require installation and is a simply:
>
> $ ./configure && make tests
>
> Live testing on suitable non-production systems is also appreciated.
> Please send reports of success or failure to
> openssh-unix-dev at mindrot.org. Security bugs should be reported
> directly to openssh at openssh.com.
>
> Below is a summary of changes. More detail may be found in the ChangeLog
> in the portable OpenSSH tarballs.
>
> Thanks to the many people who contributed to this release.
>
> Security
> ========
>
> This release contains mitigation for a weakness in the scp(1) tool
> and protocol (CVE-2019-6111): when copying files from a remote system
> to a local directory, scp(1) did not verify that the filenames that
> the server sent matched those requested by the client. This could
> allow a hostile server to create or clobber unexpected local files
> with attacker-controlled content.
>
> This release adds client-side checking that the filenames sent from
> the server match the command-line request,
>
> The scp protocol is outdated, inflexible and not readily fixed. We
> recommend the use of more modern protocols like sftp and rsync for
> file transfer instead.
>
> Potentially-incompatible changes
> ================================
>
> This release includes a number of changes that may affect existing
> configurations:
>
> * scp(1): Relating to the above changes to scp(1); the scp protocol
> relies on the remote shell for wildcard expansion, so there is no
> infallible way for the client's wildcard matching to perfectly
> reflect the server's. If there is a difference between client and
> server wildcard expansion, the client may refuse files from the
> server. For this reason, we have provided a new "-T" flag to scp
> that disables these client-side checks at the risk of
> reintroducing the attack described above.
>
> * sshd(8): Remove support for obsolete "host/port" syntax. Slash-
> separated host/port was added in 2001 as an alternative to
> host:port syntax for the benefit of IPv6 users. These days there
> are establised standards for this like [::1]:22 and the slash
> syntax is easily mistaken for CIDR notation, which OpenSSH
> supports for some things. Remove the slash notation from
> ListenAddress and PermitOpen; bz#2335
>
> Changes since OpenSSH 7.9
> =========================
>
> This release is focused on new features and internal refactoring.
>
> New Features
> ------------
>
> * ssh(1), ssh-agent(1), ssh-add(1): Add support for ECDSA keys in
> PKCS#11 tokens.
>
> * ssh(1), sshd(8): Add experimental quantum-computing resistant
> key exchange method, based on a combination of Streamlined NTRU
> Prime 4591^761 and X25519.
>
> * ssh-keygen(1): Increase the default RSA key size to 3072 bits,
> following NIST Special Publication 800-57's guidance for a
> 128-bit equivalent symmetric security level.
>
> * ssh(1): Allow "PKCS11Provide=none" to override later instances of
> the PKCS11Provide directive in ssh_config; bz#2974
>
> * sshd(8): Add a log message for situations where a connection is
> dropped for attempting to run a command but a sshd_config
> ForceCommand=internal-sftp restriction is in effect; bz#2960
>
> * ssh(1): When prompting whether to record a new host key, accept
> the key fingerprint as a synonym for "yes". This allows the user
> to paste a fingerprint obtained out of band at the prompt and
> have the client do the comparison for you.
>
> * ssh-keygen(1): When signing multiple certificates on a single
> command-line invocation, allow automatically incrementing the
> certificate serial number.
>
> * scp(1), sftp(1): Accept -J option as an alias to ProxyJump on
> the scp and sftp command-lines.
>
> * ssh-agent(1), ssh-pkcs11-helper(8), ssh-add(1): Accept "-v"
> command-line flags to increase the verbosity of output; pass
> verbose flags though to subprocesses, such as ssh-pkcs11-helper
> started from ssh-agent.
>
> * ssh-add(1): Add a "-T" option to allowing testing whether keys in
> an agent are usable by performing a signature and a verification.
>
> * sftp-server(8): Add a "lsetstat at openssh.com" protocol extension
> that replicates the functionality of the existing SSH2_FXP_SETSTAT
> operation but does not follow symlinks. bz#2067
>
> * sftp(1): Add "-h" flag to chown/chgrp/chmod commands to request
> they do not follow symlinks.
>
> * sshd(8): Expose $SSH_CONNECTION in the PAM environment. This makes
> the connection 4-tuple available to PAM modules that wish to use
> it in decision-making. bz#2741
>
> * sshd(8): Add a ssh_config "Match final" predicate Matches in same
> pass as "Match canonical" but doesn't require hostname
> canonicalisation be enabled. bz#2906
>
> * sftp(1): Support a prefix of '@' to suppress echo of sftp batch
> commands; bz#2926
>
> * ssh-keygen(1): When printing certificate contents using
> "ssh-keygen -Lf /path/certificate", include the algorithm that
> the CA used to sign the cert.
>
> Bugfixes
> --------
>
> * sshd(8): Fix authentication failures when sshd_config contains
> "AuthenticationMethods any" inside a Match block that overrides
> a more restrictive default.
>
> * sshd(8): Avoid sending duplicate keepalives when ClientAliveCount
> is enabled.
>
> * sshd(8): Fix two race conditions related to SIGHUP daemon restart.
> Remnant file descriptors in recently-forked child processes could
> block the parent sshd's attempt to listen(2) to the configured
> addresses. Also, the restarting parent sshd could exit before any
> child processes that were awaiting their re-execution state had
> completed reading it, leaving them in a fallback path.
>
> * ssh(1): Fix stdout potentially being redirected to /dev/null when
> ProxyCommand=- was in use.
>
> * sshd(8): Avoid sending SIGPIPE to child processes if they attempt
> to write to stderr after their parent processes have exited;
> bz#2071
>
> * ssh(1): Fix bad interaction between the ssh_config ConnectTimeout
> and ConnectionAttempts directives - connection attempts after the
> first were ignoring the requested timeout; bz#2918
>
> * ssh-keyscan(1): Return a non-zero exit status if no keys were
> found; bz#2903
>
> * scp(1): Sanitize scp filenames to allow UTF-8 characters without
> terminal control sequences; bz#2434
>
> * sshd(8): Fix confusion between ClientAliveInterval and time-based
> RekeyLimit that could cause connections to be incorrectly closed.
> bz#2757
>
> * ssh(1), ssh-add(1): Correct some bugs in PKCS#11 token PIN
> handling at initial token login. The attempt to read the PIN
> could be skipped in some cases, particularly on devices with
> integrated PIN readers. This would lead to an inability to
> retrieve keys from these tokens. bz#2652
>
> * ssh(1), ssh-add(1): Support keys on PKCS#11 tokens that set the
> CKA_ALWAYS_AUTHENTICATE flag by requring a fresh login after the
> C_SignInit operation. bz#2638
>
> * ssh(1): Improve documentation for ProxyJump/-J, clarifying that
> local configuration does not apply to jump hosts.
>
> * ssh-keygen(1): Clarify manual - ssh-keygen -e only writes
> public keys, not private.
>
> * ssh(1), sshd(8): be more strict in processing protocol banners,
> allowing \r characters only immediately before \n.
>
> * Various: fix a number of memory leaks, including bz#2942 and
> bz#2938
>
> * scp(1), sftp(1): fix calculation of initial bandwidth limits.
> Account for bytes written before the timer starts and adjust the
> schedule on which recalculations are performed. Avoids an initial
> burst of traffic and yields more accurate bandwidth limits;
> bz#2927
>
> * sshd(8): Only consider the ext-info-c extension during the initial
> key eschange. It shouldn't be sent in subsequent ones, but if it
> is present we should ignore it. This prevents sshd from sending a
> SSH_MSG_EXT_INFO for REKEX for buggy these clients. bz#2929
>
> * ssh-keygen(1): Clarify manual that ssh-keygen -F (find host in
> authorized_keys) and -R (remove host from authorized_keys) options
> may accept either a bare hostname or a [hostname]:port combo.
> bz#2935
>
> * ssh(1): Don't attempt to connect to empty SSH_AUTH_SOCK; bz#2936
>
> * sshd(8): Silence error messages when sshd fails to load some of
> the default host keys. Failure to load an explicitly-configured
> hostkey is still an error, and failure to load any host key is
> still fatal. pr/103
>
> * ssh(1): Redirect stderr of ProxyCommands to /dev/null when ssh is
> started with ControlPersist; prevents random ProxyCommand output
> from interfering with session output.
>
> * ssh(1): The ssh client was keeping a redundant ssh-agent socket
> (leftover from authentication) around for the life of the
> connection; bz#2912
>
> * sshd(8): Fix bug in HostbasedAcceptedKeyTypes and
> PubkeyAcceptedKeyTypes options. If only RSA-SHA2 siganture types
> were specified, then authentication would always fail for RSA keys
> as the monitor checks only the base key (not the signature
> algorithm) type against *AcceptedKeyTypes. bz#2746
>
> * ssh(1): Request correct signature types from ssh-agent when
> certificate keys and RSA-SHA2 signatures are in use.
>
> Portability
> -----------
>
> * sshd(8): On Cygwin, run as SYSTEM where possible, using S4U for
> token creation if it supports MsV1_0 S4U Logon.
>
> * sshd(8): On Cygwin, use custom user/group matching code that
> respects the OS' behaviour of case-insensitive matching.
>
> * sshd(8): Don't set $MAIL if UsePAM=yes as PAM typically specifies
> the user environment if it's enabled; bz#2937
>
> * sshd(8) Cygwin: Change service name to cygsshd to avoid collision
> with Microsoft's OpenSSH port.
>
> * Allow building against OpenSSL -dev (3.x)
>
> * Fix a number of build problems against version configurations and
> versions of OpenSSL. Including bz#2931 and bz#2921
>
> * Improve warnings in cygwin service setup. bz#2922
>
> * Remove hardcoded service name in cygwin setup. bz#2922
>
> OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de
> Raadt, Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre,
> Tim Rice and Ben Lindstrom.
>
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
More information about the openssh-unix-dev
mailing list