Call for testing: OpenSSH 8.1
Predrag Zecevic
predrag.zecevic at unitybox.de
Thu Oct 3 20:01:36 AEST 2019
Hi all,
thanks for heads up, compiles fine on Illumos based OpenIndiana /hipster
distribution:
:; ssh -V
OpenSSH_8.0p1-snap20191002, OpenSSL 1.1.1d 10 Sep 2019
Regards.
On 01.10.2019 13:33, Damien Miller wrote:
> Hi,
>
> OpenSSH 8.1p1 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This is a bugfix release.
>
> Snapshot releases for portable OpenSSH are available from
> http://www.mindrot.org/openssh_snap/
>
> The OpenBSD version is available in CVS HEAD:
> http://www.openbsd.org/anoncvs.html
>
> Portable OpenSSH is also available via git using the
> instructions at http://www.openssh.com/portable.html#cvs
> At https://anongit.mindrot.org/openssh.git/ or via a mirror at Github:
> https://github.com/openssh/openssh-portable
>
> Running the regression tests supplied with Portable OpenSSH does not
> require installation and is a simply:
>
> $ ./configure && make tests
>
> Live testing on suitable non-production systems is also appreciated.
> Please send reports of success or failure to
> openssh-unix-dev at mindrot.org. Security bugs should be reported
> directly to openssh at openssh.com.
>
> Below is a summary of changes. More detail may be found in the ChangeLog
> in the portable OpenSSH tarballs.
>
> Thanks to the many people who contributed to this release.
>
> Security
> ========
>
> * ssh(1), sshd(8), ssh-agent(1): add protection for private keys at
> rest in RAM against speculation and memory sidechannel attacks like
> Spectre, Meltdown and Rambleed. This release encrypts private keys
> when they are not in use with a symmetic key that is derived from a
> relatively large "prekey" consisting of random data (currently 16KB).
> Attackers must recover the entire prekey before they are able to
> decrypt the protected private keys, but the current generation of
> attacks have bit error rates that render this unlikely to be
> practical.
>
> Potentially-incompatible changes
> ================================
>
> This release includes one change that may affect existing
> configurations:
>
> * ssh-keygen(1): when acting as a CA and signing certificates with
> an RSA key, default to using the rsa-sha2-512 signature algorithm.
> Certificates signed by RSA keys will therefore be incompatible
> with OpenSSH versions prior to 7.2 unless the default is
> overridden (using "ssh-keygen -t ssh-rsa -s ...").
>
> Changes since OpenSSH 8.0
> =========================
>
> This release is focused on bugfixing.
>
> New Features
> ------------
>
> * ssh(1): Allow %n to be expanded in ProxyCommand strings
>
> * ssh(1), sshd(8): Allow prepending a list of algorithms to the
> default set by starting the list with the '^' character, E.g.
> "HostKeyAlgorithms ^ssh-ed25519"
>
> * ssh-keygen(1): add an experimental lightweight signature and
> verification ability. Signatures may be made using regular ssh keys
> held on disk or stored in a ssh-agent and verified against an
> authorized_keys-like list of allowed keys. Signatures embed a
> namespace that prevents confusion and attacks between different
> usage domains (e.g. files vs email).
>
> * ssh-keygen(1): print key comment when extracting publc key from a
> private key. bz#3052
>
> * ssh-keygen(1): accept the verbose flag when searching for host keys
> in known hosts (i.e. "ssh-keygen -vF host") to print the matching
> host's random-art signature too. bz#3003
>
> * All: support PKCS8 as an optional format for storage of private
> keys to disk. The OpenSSH native key format remains the default,
> but PKCS8 is a superior format to PEM if interoperability with
> non-OpenSSH software is required, as it may use a less insecure
> key derivation function than PEM's.
>
> Bugfixes
> --------
>
> * ssh(1): if a PKCS#11 token returns no keys then try to login and
> refetch them. Based on patch from Jakub Jelen; bz#2430
>
> * ssh(1): produce a useful error message if the user's shell is set
> incorrectly during "match exec" processing. bz#2791
>
> * sftp(1): allow the maximimum uint32 value for the argument passed
> to -b which allows better error messages from later validation.
> bz#3050
>
> * ssh(1): avoid pledge sandbox violations in some combinations of
> remote forwarding, connection multiplexing and ControlMaster.
>
> * ssh-keyscan(1): include SHA2-variant RSA key algorithms in KEX
> proposal; allows ssh-keyscan to harvest keys from servers that
> disable olde SHA1 ssh-rsa. bz#3029
>
> * sftp(1): print explicit "not modified" message if a file was
> requested for resumed download but was considered already complete.
> bz#2978
>
> * sftp(1): fix a typo and make <esc><right> move right to the
> closest end of a word just like <esc><left> moves left to the
> closest beginning of a word.
>
> * sshd(8): cap the number of permiopen/permitlisten directives
> allowed to appear on a single authorized_keys line.
>
> * All: fix a number of memory leaks (one-off or on exit paths).
>
> * Regression tests: a number of fixes and improvments, including
> fixes to the interop tests, adding the ability to run most tests
> on builds that disable OpenSSL support, better support for running
> tests under Valgrind and a number of bugfixes.
>
> * ssh(1), sshd(8): check for convtime() refusing to accept times that
> resolve to LONG_MAX Reported by Kirk Wolf bz2977
>
> * ssh(1): slightly more instructive error message when the user
> specifies multiple -J options on the commandline. bz3015
>
> * ssh-agent(1): process agent requests for RSA certificate private
> keys using correct signature algorithm when requested. bz3016
>
> * sftp(1): check for user at host when parsing sftp target. This
> allows user@[1.2.3.4] to work without a path. bz#2999
>
> * sshd(8): enlarge format buffer size for certificate serial
> number so the log message can record any 64-bit integer without
> truncation. bz#3012
>
> * sshd(8): for PermitOpen violations add the remote host and port to
> be able to more easily ascertain the source of the request. Add the
> same logging for PermitListen violations which where not previously
> logged at all.
>
> * scp(1), sftp(1): use the correct POSIX format style for left
> justification for the transfer progress meter. bz#3002
>
> * sshd(8) when examining a configureation using sshd -T, assume any
> attibute not provided by -C does not match, which allows it to work
> when sshd_config contains a Match directive with or without -C.
> bz#2858
>
> * ssh(1), ssh-keygen(1): downgrade PKCS#11 "provider returned no
> slots" warning from log level error to debug. This is common when
> attempting to enumerate keys on smartcard readers with no cards
> plugged in. bz#3058
>
> * ssh(1), ssh-keygen(1): do not unconditionally log in to PKCS#11
> tokens. Avoids spurious PIN prompts for keys not selected for
> authentication in ssh(1) and when listing public keys available in
> a token using ssh-keygen(1). bz#3006
>
> Portability
> -----------
>
> * ssh(1): fix SIGWINCH delivery of Solaris for multiplexed sessions
> bz#3030
>
> * ssh(1), sshd(8): fix typo that prevented detection of Linux VRF
>
> * sshd(8): add no-op implementation of pam_putenv to avoid build
> breakage on platforms where the PAM implementation lacks this
> function (e.g. HP-UX). bz#3008
>
> * sftp-server(8): fix Solaris privilege sandbox from preventing
> the legacy sftp rename operation from working (was refusing to
> allow hard links to files owned by other users). bz#3036
>
> * All: add a proc_pidinfo()-based closefrom() for OS X to avoid
> the need to brute-force close all high-numbered file descriptors.
> bz#3049
>
> * sshd(8): in the Linux seccomp-bpf sandbox, allow mprotect(2) with
> PROT_(READ|WRITE|NONE) only. This syscall is used by some hardened
> heap allocators. Github PR#142
>
> * sshd(8): in the Linux seccomp-bpf sandbox, allow the s390-specific
> ioctl for ecc hardware support.
>
> * All: use "doc" man page format if the mandoc(1) tool is present on
> the system. Previously configure would not select the "doc" man
> page format if mandoc was present but nroff was not.
>
> * sshd(8): don't install duplicate STREAMS modules on Solaris; check
> if STREAMS modules are already installed on a pty before installing
> since when compiling with XPG>=4 they will likely be installed
> already. Prevents hangs and duplicate lines on the terminal.
> bz#2945 and bz#2998,
>
> Reporting Bugs:
> ===============
>
> - Please read http://www.openssh.com/report.html
> Security bugs should be reported directly to openssh at openssh.com
>
> OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de
> Raadt, Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre,
> Tim Rice and Ben Lindstrom.
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>
More information about the openssh-unix-dev
mailing list