Testing for the 4.4p1 release, round 2

Darren Tucker dtucker at zip.com.au
Fri Sep 22 00:20:58 EST 2006


Hi all.

As most of you know, we are preparing OpenSSH 4.4p1 for release.  We have
had one round of testing and I would like to thank all who responded.

We believe that most of the problems reported have been resolved.
If you are so inclined, we would appreciate a quick retest to ensure
that the fixed ones remain fixed and the working ones remain working.

Of the problems identitified, I am only aware of two reported that I do
not believe have been resolved:

regress hangs on Redhat 7.3, reason unknown (maybe IPv6 related?):
http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=115700350117023

regress failure on IRIX w/mipspro compiler (SSH protocol 1 only):
http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=115716627223333

I believe the first is new, but the latter is not.  Unfortunately we are
not able to reproduce either.

And now, a rerun of the earlier message with the details:

Snapshots are available from http://www.mindrot.org/openssh_snap or
from any of the mirrors listed on http://www.openssh.org/portable.html
The latter page also includes instructions for checking out portable
OpenSSH via anonymous CVS.

This release contains many bugfixes and feature improvements. Here
are some highlights:

- Implemented conditional configuration in sshd_config(5) using the
  "Match" directive. This allows some configuration options to be
  selectively overridden if specific criteria (based on user, group,
  hostname and/or address) are met. So far a useful subset of post-
  authentication options are supported and more are expected to be
  added in future releases.
- Added a "ForceCommand" directive to sshd_config(5). Similar to the
  command="..." option accepted in ~/.ssh/authorized_keys, this forces
  the execution of the specified command regardless of what the user
  requested. This is very useful in conjunction with the new "Match"
  option.
- Add a "PermitOpen" directive to sshd_config(5). This mirrors the
  permitopen="..." authorized_keys option, allowing fine-grained
  control over the port-forwardings that a user is allowed to
  establish.
- Add optional logging of transactions to sftp-server(8).
- ssh(1) will now record port numbers for hosts stored in
  ~/.ssh/authorized_keys when a non-standard port has been requested.
- Add an "ExitOnForwardFailure" options to cause ssh(1) to exit (with
  a non-zero exit code) when requested port forwardings could not be
  established.
- Extend the sshd_config(5) "SubSystem" directive to allow the
  specification of commandline arguments.
- Add optional support for SELinux, controlled using the --with-selinux
  configure option (experimental)
- Add optional support for Solaris process contracts, enabled using the
  --with-solaris-contracts configure option (experimental)
- Add support for Diffie-Hellman group exchange key agreement with a
  final hash of SHA256. 
- Fixed a lot of bugs. See
  http://bugzilla.mindrot.org/show_bug.cgi?id=1155 for an incomplete
  list (more in the ChangeLog)
- Lots of manpage fixes and improvements
- Many code cleanups, including:
    - Switching to safer memory allocation functions that avoid integer
      overflows when allocating arrays
    - Cleanups of header file usage (ongoing)
    - Fixes to leaks reported by the Coverity static analysis tool

Running the regression tests supplied with Portable does not require
installation, just run:

$ ./configure && make tests

Testing on suitable non-production systems is also appreciated. Please send
reports of success or failure to openssh-unix-dev at mindrot.org, including 
details of your platform, compiler and configure options.

Thanks.

-- 
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.



More information about the openssh-unix-dev mailing list