Call for testing: OpenSSH 7.4
The Doctor
doctor at doctor.nl2k.ab.ca
Wed Dec 14 12:09:25 AEDT 2016
On Wed, Dec 14, 2016 at 11:53:32AM +1100, Damien Miller wrote:
> Hi,
>
> OpenSSH 7.4 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This release contains some
> substantial new features and a number of bugfixes.
>
> Snapshot releases for portable OpenSSH are available from
> http://www.mindrot.org/openssh_snap/
>
> The OpenBSD version is available in CVS HEAD:
> http://www.openbsd.org/anoncvs.html
>
> Portable OpenSSH is also available via anonymous CVS using the
> instructions at http://www.openssh.com/portable.html#cvs or
> via Git at https://anongit.mindrot.org/openssh.git/ or via a
> mirror at Github: https://github.com/openssh/openssh-portable
>
> Running the regression tests supplied with Portable OpenSSH does not
> require installation and is a simply:
>
> $ ./configure && make tests
>
> Live testing on suitable non-production systems is also
> appreciated. Please send reports of success or failure to
> openssh-unix-dev at mindrot.org.
>
> Below is a summary of changes. More detail may be found in the ChangeLog
> in the portable OpenSSH tarballs.
>
> Thanks to the many people who contributed to this release.
Got you. Will run make tests. So far running on
FreeBSD 11.0 using openssl 1.0.2 current
.
Trying Openssl 1.1
>
> Potentially-incompatible changes
> ================================
>
> This release includes a number of changes that may affect existing
> configurations:
>
> * This release removes server support for the SSH v.1 protocol.
>
> * ssh(1): Remove 3des-cbc from the client's default proposal. 64-bit
> block ciphers are not safe in 2016 and we don't want to wait until
> attacks like SWEET32 are extended to SSH. As 3des-cbc was the
> only mandatory cipher in the SSH RFCs, this may cause problems
> connecting to older devices using the default configuration,
> but it's highly likely that such devices already need explicit
> configuration for key exchange and hostkey algorithms already
> anyway.
>
> * sshd(8): Remove support for pre-authentication compression.
> Doing compression early in the protocol probably seemed reasonable
> in the 1990s, but today it's clearly a bad idea in terms of both
> cryptography (cf. multiple compression oracle attacks in TLS) and
> attack surface. Pre-auth compression support has been disabled by
> default for >10 years. Support remains in the client.
>
> * ssh-agent will refuse to load PKCS#11 modules outside a whitelist
> of trusted paths by default. The path whitelist may be specified
> at run-time.
>
> * sshd(8): When a forced-command appears in both a certificate and
> an authorized keys/principals command= restriction, sshd will now
> refuse to accept the certificate unless they are identical.
> The previous (documented) behaviour of having the certificate
> forced-command override the other could be a bit confusing and
> error-prone.
>
> * sshd(8): Remove the UseLogin configuration directive and support
> for having /bin/login manage login sessions.
>
> Changes since OpenSSH 7.3
> =========================
>
> This is primarily a bugfix release.
>
> New Features
> ------------
>
> * ssh(1): Add a proxy multiplexing mode to ssh(1) inspired by the
> version in PuTTY by Simon Tatham. This allows a multiplexing
> client to communicate with the master process using a subset of
> the SSH packet and channels protocol over a Unix-domain socket,
> with the main process acting as a proxy that translates channel
> IDs, etc. This allows multiplexing mode to run on systems that
> lack file- descriptor passing (used by current multiplexing
> code) and potentially, in conjunction with Unix-domain socket
> forwarding, with the client and multiplexing master process on
> different machines. Multiplexing proxy mode may be invoked using
> "ssh -O proxy ..."
>
> * sshd(8): Add a sshd_config DisableForwaring option that disables
> X11, agent, TCP, tunnel and Unix domain socket forwarding, as well
> as anything else we might implement in the future. Like the
> 'restrict' authorized_keys flag, this is intended to be a simple
> and future-proof way of restricting an account.
>
> * sshd(8), ssh(1): Support the "curve25519-sha256" key exchange
> method. This is identical to the currently-support method named
> "curve25519-sha256 at libssh.org".
>
> * sshd(8): Improve handling of SIGHUP by checking to see if sshd is
> already daemonised at startup and skipping the call to daemon(3)
> if it is. This ensures that a SIGHUP restart of sshd(8) will
> retain the same process-ID as the initial execution. sshd(8) will
> also now unlink the PidFile prior to SIGHUP restart and re-create
> it after a successful restart, rather than leaving a stale file in
> the case of a configuration error. bz#2641
>
> * sshd(8): Allow ClientAliveInterval and ClientAliveCountMax
> directives to appear in sshd_config Match blocks.
>
> * sshd(8): Add %-escapes to AuthorizedPrincipalsCommand to match
> those supported by AuthorizedKeysCommand (key, key type,
> fingerprint, etc.) and a few more to provide access to the
> contents of the certificate being offered.
>
> * Added regression tests for string matching, address matching and
> string sanitisation functions.
>
> * Improved the key exchange fuzzer harness.
>
> Bugfixes
> --------
>
> * ssh(1): Allow IdentityFile to successfully load and use
> certificates that have no corresponding bare public key. bz#2617
> certificate id_rsa-cert.pub (and no id_rsa.pub).
>
> * ssh(1): Fix public key authentication when multiple
> authentication is in use and publickey is not just the first
> method attempted. bz#2642
>
> * regress: Allow the PuTTY interop tests to run unattended. bz#2639
>
> * ssh-agent(1), ssh(1): improve reporting when attempting to load
> keys from PKCS#11 tokens with fewer useless log messages and more
> detail in debug messages. bz#2610
>
> * ssh(1): When tearing down ControlMaster connections, don't
> pollute stderr when LogLevel=quiet.
>
> * sftp(1): On ^Z wait for underlying ssh(1) to suspend before
> suspending sftp(1) to ensure that ssh(1) restores the terminal mode
> correctly if suspended during a password prompt.
>
> * ssh(1): Avoid busy-wait when ssh(1) is suspended during a password
> prompt.
>
> * ssh(1), sshd(8): Correctly report errors during sending of ext-
> info messages.
>
> * sshd(8): fix NULL-deref crash if sshd(8) received an out-of-
> sequence NEWKEYS message.
>
> * sshd(8): Correct list of supported signature algorithms sent in
> the server-sig-algs extension. bz#2547
>
> * sshd(8): Fix sending ext_info message if privsep is disabled.
>
> * sshd(8): more strictly enforce the expected ordering of privilege
> separation monitor calls used for authentication and allow them
> only when their respective authentication methods are enabled
> in the configuration
>
> * sshd(8): Fix uninitialised optlen in getsockopt() call; harmless
> on Unix/BSD but potentially crashy on Cygwin.
>
> * Fix false positive reports caused by explicit_bzero(3) not being
> recognised as a memory initialiser when compiled with
> -fsanitize-memory.
>
> * sshd_config(5): Use 2001:db8::/32, the official IPv6 subnet for
> configuration examples.
>
> Portability
> -----------
>
> * On environments configured with Turkish locales, fall back to the
> C/POSIX locale to avoid errors in configuration parsing caused by
> that locale's unique handling of the letters 'i' and 'I'. bz#2643
>
> * sftp-server(8), ssh-agent(1): Deny ptrace on OS X using
> ptrace(PT_DENY_ATTACH, ..)
>
> * ssh(1), sshd(8): Unbreak AES-CTR ciphers on old (~0.9.8) OpenSSL.
>
> * Fix compilation for libcrypto compiled without RIPEMD160 support.
>
> * contrib: Add a gnome-ssh-askpass3 with GTK+3 support. bz#2640
>
> * sshd(8): Improve PRNG reseeding across privilege separation and
> force libcrypto to obtain a high-quality seed before chroot or
> sandboxing.
>
> * All: Explicitly test for broken strnvis. NetBSD added an strnvis
> and unfortunately made it incompatible with the existing one in
> OpenBSD and Linux's libbsd (the former having existed for over ten
> years). Try to detect this mess, and assume the only safe option
> if we're cross compiling.
>
>
> OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de
> Raadt, Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre,
> Tim Rice and Ben Lindstrom.
>
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
God,Queen and country!Never Satan President Republic!Beware AntiChrist rising!
http://www.fullyfollow.me/rootnl2k Look at Psalms 14 and 53 on Atheism
Merry Christmas 2016 and Happy New Year 2017
More information about the openssh-unix-dev
mailing list