Call for testing: OpenSSH 7.3
Jeff Wieland
wieland at purdue.edu
Sat Jul 30 02:10:24 AEST 2016
Compiles and passes tests on SPARC Solaris 10, using our local
build of OpenSSL 1.0.2h.
Damien Miller wrote:
> Hi,
>
> OpenSSH 5.3 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This release contains some
> substantial new features and a number of bugfixes.
>
> Snapshot releases for portable OpenSSH are available from
> http://www.mindrot.org/openssh_snap/
>
> The OpenBSD version is available in CVS HEAD:
> http://www.openbsd.org/anoncvs.html
>
> Portable OpenSSH is also available via anonymous CVS using the
> instructions at http://www.openssh.com/portable.html#cvs or
> via Git at https://anongit.mindrot.org/openssh.git/
>
> Running the regression tests supplied with Portable OpenSSH does not
> require installation and is a simply:
>
> $ ./configure && make tests
>
> Live testing on suitable non-production systems is also
> appreciated. Please send reports of success or failure to
> openssh-unix-dev at mindrot.org.
>
> Below is a summary of changes. More detail may be found in the ChangeLog
> in the portable OpenSSH tarballs.
>
> Thanks to the many people who contributed to this release.
>
> Changes since OpenSSH 7.2
> =========================
>
> This is primarily a bugfix release.
>
> Security
> --------
>
> * sshd(8): Mitigate a potential denial-of-service attack against
> the system's crypt(3) function via sshd(8). An attacker could
> send very long passwords that would cause excessive CPU use in
> crypt(3). sshd(8) now refuses to accept password authentication
> requests of length greater than 1024 characters. Independently
> reported by Tomas Kuthan (Oracle) and curesec via coredump at
> autistici.org.
>
> * sshd(8): Mitigate timing differences in password authentication
> that could be used to discern valid from invalid account names
> when long passwords were sent and particular password hashing
> algorithms are in use on the server. CVE-2016-6210, reported by
> EddieEzra.Harari at verint.com
>
> * ssh(1), sshd(8): Fix observable timing weakness in the CBC padding
> oracle countermeasures. Reported by Jean Paul Degabriele, Kenny
> Paterson, Torben Hansen and Martin Albrecht. Note that CBC ciphers
> are disabled by default and only included for legacy compatibility.
>
> * ssh(1), sshd(8): Improve ordering ordering of MAC verification for
> Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the
> MAC before decrypting any ciphertext. This removes the possibility
> of timing differences leaking facts about the plaintext, though no
> such leakage has been observed. Reported by Jean Paul Degabriele,
> Kenny Paterson, Torben Hansen and Martin Albrecht.
>
> * sshd(8): (portable only) Ignore PAM environment vars when
> UseLogin=yes. If PAM is configured to read user-specified
> environment variables and UseLogin=yes in sshd_config, then a
> hostile local user may attack /bin/login via LD_PRELOAD or
> similar environment variables set via PAM. CVE-2015-8325,
> found by Shayan Sadigh.
>
> New Features
> ------------
>
> * ssh(1): Add a ProxyJump option and corresponding -J command-line
> flag to allow simplified indirection through a one or more SSH
> bastions or "jump hosts".
>
> * ssh(1): Add an IdentityAgent option to allow specifying specific
> agent sockets instead of accepting one from the environment.
>
> * ssh(1): Allow ExitOnForwardFailure and ClearAllForwardings to be
> optionally overridden when using ssh -W. bz#2577
>
> * ssh(1), sshd(8): Implement support for the IUTF8 terminal mode as
> per draft-sgtatham-secsh-iutf8-00.
>
> * ssh(1), sshd(8): Add support for additional fixed Diffie-Hellman
> 2K, 4K and 8K groups from draft-ietf-curdle-ssh-kex-sha2-03.
>
> * ssh-keygen(1), ssh(1), sshd(8): support SHA256 and SHA512 RSA
> signatures in certificates;
>
> * ssh(1): Add an Include directive for ssh_config(5) files.
>
> * ssh(1): Permit UTF-8 characters in pre-authentication banners sent
> from the server. bz#2058
>
> Bugfixes
> --------
>
> * ssh(1), sshd(8): Reduce the syslog level of some relatively common
> protocol events from LOG_CRIT. bz#2585
>
> * sshd(8): Refuse AuthenticationMethods="" in configurations and
> accept AuthenticationMethods=any for the default behaviour of not
> requiring multiple authentication. bz#2398
>
> * sshd(8): Remove obsolete and misleading "POSSIBLE BREAK-IN
> ATTEMPT!" message when forward and reverse DNS don't match. bz#2585
>
> * ssh(1): Close ControlPersist background process stderr except
> in debug mode or when logging to syslog. bz#1988
>
> * misc: Make PROTOCOL description for direct-streamlocal at openssh.com
> channel open messages match deployed code. bz#2529
>
> * ssh(1): Deduplicate LocalForward and RemoteForward entries to fix
> failures when both ExitOnForwardFailure and hostname
> canonicalisation are enabled. bz#2562
>
> * sshd(8): Remove fallback from moduli to obsolete "primes" file
> that was deprecated in 2001. bz#2559.
>
> * sshd_config(5): Correct description of UseDNS: it affects ssh
> hostname processing for authorized_keys, not known_hosts; bz#2554
>
> * ssh(1): Fix authentication using lone certificate keys in an agent
> without corresponding private keys on the filesystem. bz#2550
>
> * sshd(8): Send ClientAliveInterval pings when a time-based
> RekeyLimit is set; previously keepalive packets were not being
> sent. bz#2252
>
> Portability
> -----------
>
> * ssh(1), sshd(8): Fix compilation by automatically disabling ciphers
> not supported by OpenSSL. bz#2466
>
> * misc: Fix compilation failures on some versions of AIX's compiler
> related to the definition of the VA_COPY macro. bz#2589
>
> * sshd(8): Whitelist more architectures to enable the seccomp-bpf
> sandbox. bz#2590
>
> * ssh-agent(1), sftp-server(8): Disable process tracing on Solaris
> using setpflags(__PROC_PROTECT, ...). bz#2584
>
> * sshd(8): On Solaris, don't call Solaris setproject() with
> UsePAM=yes it's PAM's responsibility. bz#2425
>
> OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de
> Raadt, Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre,
> Tim Rice and Ben Lindstrom.
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>
>
--
Jeff Wieland | Purdue University
Network Systems Administrator | ITIS UNIX Platforms
Voice: (765)496-8234 | 155 S. Grant Street
FAX: (765)496-1380 | West Lafayette, IN 47907
More information about the openssh-unix-dev
mailing list