Skip to content

Update OpenSSH from 7.5 to 7.9 #1063

Merged
merged 1 commit into from
Apr 2, 2019
Merged

Commits on Apr 1, 2019

  1. openssh: Update version from 7.5 to 7.9

    From the [announcement][1]:
    
    > Potentially-incompatible changes
    > ================================
    >
    > This release includes a number of changes that may affect existing
    > configurations:
    >
    >  * ssh(1), sshd(8): the setting of the new CASignatureAlgorithms
    >    option (see below) bans the use of DSA keys as certificate
    >    authorities.
    >
    >  * sshd(8): the authentication success/failure log message has
    >    changed format slightly. It now includes the certificate
    >    fingerprint (previously it included only key ID and CA key
    >    fingerprint).
    >
    > Changes since OpenSSH 7.8
    > =========================
    >
    > This is primarily a bugfix release.
    >
    > New Features
    > ------------
    >
    >  * ssh(1), sshd(8): allow most port numbers to be specified using
    >    service names from getservbyname(3) (typically /etc/services).
    >
    >  * ssh(1): allow the IdentityAgent configuration directive to accept
    >    environment variable names. This supports the use of multiple
    >    agent sockets without needing to use fixed paths.
    >
    >  * sshd(8): support signalling sessions via the SSH protocol.
    >    A limited subset of signals is supported and only for login or
    >    command sessions (i.e. not subsystems) that were not subject to
    >    a forced command via authorized_keys or sshd_config. bz#1424
    >
    >  * ssh(1): support "ssh -Q sig" to list supported signature options.
    >    Also "ssh -Q help" to show the full set of supported queries.
    >
    >  * ssh(1), sshd(8): add a CASignatureAlgorithms option for the
    >    client and server configs to allow control over which signature
    >    formats are allowed for CAs to sign certificates. For example,
    >    this allows banning CAs that sign certificates using the RSA-SHA1
    >    signature algorithm.
    >
    >  * sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to
    >    revoke keys specified by SHA256 hash.
    >
    >  * ssh-keygen(1): allow creation of key revocation lists directly
    >    from base64-encoded SHA256 fingerprints. This supports revoking
    >    keys using only the information contained in sshd(8)
    >    authentication log messages.
    >
    > Bugfixes
    > --------
    >
    >  * ssh(1), ssh-keygen(1): avoid spurious "invalid format" errors when
    >    attempting to load PEM private keys while using an incorrect
    >    passphrase. bz#2901
    >
    >  * sshd(8): when a channel closed message is received from a client,
    >    close the stderr file descriptor at the same time stdout is
    >    closed. This avoids stuck processes if they were waiting for
    >    stderr to close and were insensitive to stdin/out closing. bz#2863
    >
    >  * ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11
    >    forwarding timeout and support X11 forwarding indefinitely.
    >    Previously the behaviour of ForwardX11Timeout=0 was undefined.
    >
    >  * sshd(8): when compiled with GSSAPI support, cache supported method
    >    OIDs regardless of whether GSSAPI authentication is enabled in the
    >    main section of sshd_config. This avoids sandbox violations if
    >    GSSAPI authentication was later enabled in a Match block. bz#2107
    >
    >  * sshd(8): do not fail closed when configured with a text key
    >    revocation list that contains a too-short key. bz#2897
    >
    >  * ssh(1): treat connections with ProxyJump specified the same as
    >    ones with a ProxyCommand set with regards to hostname
    >    canonicalisation (i.e. don't try to canonicalise the hostname
    >    unless CanonicalizeHostname is set to 'always'). bz#2896
    >
    >  * ssh(1): fix regression in OpenSSH 7.8 that could prevent public-
    >    key authentication using certificates hosted in a ssh-agent(1)
    >    or against sshd(8) from OpenSSH <7.8.
    >
    > Portability
    > -----------
    >
    >  * All: support building against the openssl-1.1 API (releases 1.1.0g
    >    and later). The openssl-1.0 API will remain supported at least
    >    until OpenSSL terminates security patch support for that API version.
    >
    >  * sshd(8): allow the futex(2) syscall in the Linux seccomp sandbox;
    >    apparently required by some glibc/OpenSSL combinations.
    >
    >  * sshd(8): handle getgrouplist(3) returning more than
    >    _SC_NGROUPS_MAX groups. Some platforms consider this limit more
    >    as a guideline.
    
    [1]: https://lists.mindrot.org/pipermail/openssh-unix-announce/2018-October/000135.html
    pmenzel committed Apr 1, 2019
    Configuration menu
    Copy the full SHA
    02f0cf4 View commit details
    Browse the repository at this point in the history