./security/p5-Net-SSH, Perl implementations of SSH1 and SSH2 protocols

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]

Branch: CURRENT, Version: 2.14, Package name: p5-Net-SSH-2.14, Maintainer: pkgsrc-users

The Net::SSH::Perl Perl5 module contains implementations of both the
SSH1 and SSH2 protocols.

Required to run:
[textproc/p5-Convert-PEM] [textproc/p5-String-CRC32] [lang/perl5] [math/p5-Math-GMP] [security/p5-Crypt-IDEA] [security/p5-Digest-BubbleBabble] [devel/p5-File-HomeDir] [security/p5-CryptX] [security/p5-Crypt-Curve25519]

Required to build:

Master sites:

SHA1: 47077b150e1175949f8c086418084932ab4a563e
RMD160: 09a218c63f902b692b82f7dd14993eefc0a3a5ef
Filesize: 250.94 KB

Version history: (Expand)

CVS history: (Expand)

   2017-09-18 00:13:30 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
p5-Net-SSH: update to 2.14.

2.14 2017.07.03
    - DSA key bugfix: verify would fail if r had unnecessary leading zeros

2.13 2017.06.30
    - Bug Fix: AES-CBC IV length needs to be blocksize, not keysize
    - Bug Fix: DES3 init needs to pass key as variable to avoid scalar error
    - Bug Fix: Packet padlen decode was using signed 8-bit unpack (should be \ 
    - Fix CBC inefficiency
    - Fix Key not being loaded prior to Agent use [ \ 
https://github.com/lkinley/Net-SSH-Perl/issues/10 ]
   2017-08-23 17:03:50 by Havard Eidnes | Files touched by this commit (2) | Package updated
Log message:
Update to Net::SSH::Perl (here p5-Net-SSH) version 2.12.

Pkgsrc changes:
 * version number, checksum
 * Comment out WRKSRC manipulation, not needed for 2.12.

Upstream changes:

2.12 2017.04.22
    - Fix inefficiency in CTR, revealed by profiling with Devel::NYTProf
    - Avoid warnings in Host from strange/invalid known_host entries
    - Improve documentation of newer features

2.11 2017.04.16
    - Packet bugfix: Introduced in 2.07, when ETM Mac is used, sometimes
      not enough incoming bytes were available to fully read stored MAC
    - DSA key bugfix: verify would fail if r/s had highest bit set

2.10 2017.03.23
    - Add curve25519-sha256 alias for curve25519-sha256@libssh.org key exchange
    - Bugfix for when unsupported key types are encountered
    - Add support for '-' syntax in options, including wildcards
    - Add wildcard support for '+' syntax in options
   2017-08-23 16:52:53 by Havard Eidnes | Files touched by this commit (3) | Package updated
Log message:
Update dependency list according to Makefile.pl, in particular
add dependency on the recently added p5-Crypt-Curve25519 package.
   2017-06-05 16:25:36 by Ryo ONODERA | Files touched by this commit (2298)
Log message:
Recursive revbump from lang/perl5 5.26.0
   2017-04-07 02:41:59 by Makoto Fujiwara | Files touched by this commit (2) | Package updated
Log message:
Updated security/p5-Net-SSH to 2.09.01
2.09 2016.10.26
    - Fix creation of keys in ecdsa, ed25519 key classes
    - Update eg/pssh-keygen to create ecdsa, ed25519 keys
    - Handle hostkeys-00@openssh.com global requests
    - Add support for 'CheckHostIP' and 'UpdateHostKeys' config options
    - Refactor handling of '+' syntax in options
    - Key fingerprints now output sha256-base64 by default.
      (md5 can be specified with FingerprintHash config option)
    - Add id_ed25519, id_ecdsa to default identity files
    - Documentation updates in Perl.pm to reflect new functionality in 2.XX

2.08 2016.10.14
    - Use sha512 instead of md5 in Net::SSH::Perl::Cipher->new_from_key_str()
      to provide ChachaPoly with enough key material
      Tests in t/05-cipher.t should now pass on all platforms [ CPAN bug #114077 ]
    - Add AES128_CBC to cipher tests
    - Info on using features not enabled by default added to README

2.07 2016.10.13

    - Fix blowfish compilation on SunOS [CPAN bug #116323]
    - Fix bug in Packet [CPAN bug #118335]
    - Add support for '+' syntax in MACs option
    - Remove hmac-sha1 from default MACs. It can re-enabled
      by passing the option: 'MACs +hmac-sha1'

2.06 2016.10.04

    - Add support for additional fixed Diffie-Hellman 2K, 4K and 8K groups
      from OpenSSH 7.3 (draft-ietf-curdle-ssh-kex-sha2-03)
    - Kex defaults now updated to draft-ietf-curdle-ssh-kex-sha2-03
      recommendations (diffie-hellman-group-exchange-sha1 removed)
      It can re-enabled by passing the option:
      'KexAlgorithms +diffie-hellman-group-exchange-sha1'

2.05 2016.10.03

    - Add support for '+' syntax in Ciphers, KexAlgorithms, HostKeyAlgorithms
      options as in OpenSSH

2.04 2016.05.11

    - Add ECDSA key support
    - Improve extract_public() in Key.pm inspired by
      but implement comment with backwards compat with RSA/DSA datafellows
    - Fix XS from being loaded more than once (warnings from Net::SFTP)

2.03 2016.05.06

    - Fixes so that "make test" passes

2.02 2016.05.04

    - Use CryptX to further reduce module depedencies
      This eliminates the need for:
    - Add support for rsa-sha2-512,rsa-sha2-256 signing with RSA keys
    - Implement HashKnownHosts, KexAlgorithms, MACs config directives
    - Add XS code for Chacha20, BSD Blowfish, Ed25519 routines
    - Properly handle and create known_hosts entries when port is specified
    - Remove obsolete ciphers, MACs, Kex from default list to duplicate
      upcoming OpenSSH behavior
    - Bug fixes

2.01 2016.02.19

    - Use CryptX to reduce module depedencies
      This eliminates the need for:

2.00 2015.12.07

    - Add Chacha20-Poly1305 cipher support for best security
      (Requires Crypt::OpenSSH::ChachaPoly, see README)
    - Add AES Cipher support in CTR mode (CBC mode supported in Ed25519
      keys only)
    - Add Group Exchange (RFC4523) Diffie-Hellman Key Exchange
    - Add Curve25519 (curve25519-sha256@libssh.org) Key Exchange support
      (Requires Crypt::Curve25519)
    - Add hmac-sha2-256,hmac-sha2-512 MAC support
    - Add hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com
      Encrypt-then-MAC (ETM) MAC support
    - Use BSD::arc4random for encrypted packet padding
    - Add support for Ed25519 ssh/host keys (Requires Crypt::Ed25519)
      Encrypted Ed25519 key support requires Crypt::OpenBSD::Blowfish
      (See README for info)
    - Default ciphers order is now chacha,aes,3des,blowfish,arcfour
    - Default KEX order is now Curve25519, DHGEXSHA256, DHGEXSHA1, DH14, DH1
    - Default MAC order is now hmac-sha2-512-etm@openssh.com,
      hmac-sha2-256-etm@openssh.com, sha2-512, sha2-256, sha1, md5
    - SSH Keys can now be in DOS format (no need to remove CR/LF)
    - SOCKS proxy support via sub class Net::SSH:Perl::Proxy
    - Now does not abort due to OpenSSH 6.8+ server
      SSH2_MSG_GLOBAL_REQUEST messages for host key rotation

(pkgsrc changes)
    - Adjust DEPENDS base upon above note (p5-CryptX related)
   2016-06-08 21:25:20 by Thomas Klausner | Files touched by this commit (2236) | Package updated
Log message:
Bump PKGREVISION for perl-5.24.
   2016-01-31 06:52:06 by Makoto Fujiwara | Files touched by this commit (1)
Log message:
   2016-01-31 06:49:47 by Makoto Fujiwara | Files touched by this commit (3) | Package updated
Log message:
Update 1.34 to 1.42
1.42 2015.09.28
    - Fix issue with long selects getting interrupted by signals and dying \ 
(Andrew Hoying)
    - fix version cpan meta info

1.41 2015.09.18
    - use Errno constants in more portable way, see perldoc Errno

1.40 2015.09.17
    - declare new dependency to File::HomeDir in Makefile.PL

1.39 2015.09.15

    - RT #83978 - fix shell terminal width and height (lharey)
    - RT #94574 - fix Algorithm negotiation issue in ::Kex.pm
      (Brian Curnow, Michael Gray)
    - RT #105728 - fix VERSION methods (reported by Karen Etheridge)
    - code modernization (strict+warnings) (gh0stwizard)
    - pass tests on Win32 (gh0stwizard)
    - use Win32::LoginName on Windows (Michael Gray)
    - use File::HomeDir to simplify handling (Michael Gray)

1.38 2014.10.06

    - RT #99284 - install valid SIGNATURE file (Greg Sabino Mullane)

1.37 2014.03.17

    - RT #91840 - enabled config option "StrictHostKeyChecking"
                  (the corresponding code already existed)

1.36 2013.08.09

  Apply many bugfixes from RT discussions.

    - RT #48338 - FIX race condition with SSHv2
    - RT #55195 - FIX race condition in KEXINIT
    - RT #67586 - FIX test '03-packet.t' hangs forever
    - RT #64517 - enable PTY support in SSH2
    - RT #23947 - Replacement for KeyboardInt.pm

1.35 2012.12.03

    - rt#76482 - apply patch to t/03-packet.t for 5.15+ (chisel++)