Path to this page:
./
security/openssh,
Open Source Secure shell client and server (remote login program)
Branch: pkgsrc-2013Q3,
Version: 6.4.1,
Package name: openssh-6.4.1,
Maintainer: pkgsrc-usersOpenSSH is based on the last free version of Tatu Ylonen's SSH with
all patent-encumbered algorithms removed (to external libraries), all
known security bugs fixed, new features reintroduced and many other
clean-ups. More information about SSH itself can be found in the file
README.Ylonen. OpenSSH has been created by Aaron Campbell, Bob Beck,
Markus Friedl, Niels Provos, Theo de Raadt, and Dug Song.
This port consists of the re-introduction of autoconf support, PAM
support (for Linux and Solaris), EGD[1] support, SOCKS support (using
the Dante [6] libraries and replacements for OpenBSD library functions
that are (regrettably) absent from other unices. This port has been
best tested on Linux, Solaris, HPUX, NetBSD and Irix. Support for AIX,
SCO, NeXT and other Unices is underway. This version actively tracks
changes in the OpenBSD CVS repository.
MESSAGE.Interix [+/-]===========================================================================
$NetBSD: MESSAGE.Interix,v 1.1 2005/03/07 23:29:49 tv Exp $
OpenSSH on Interix has some important caveats:
* Hostname resolution uses the BIND resolver library rather than Windows
native lookup services. This requires that /etc/resolv.conf be set up
properly with a "nameserver" line; see resolv.conf(5). In most
installations, this was generated automatically when Services for UNIX
was installed (based on the name server in use at that time).
* Currently, UsePrivilegeSeparation does not work properly, so it defaults
to "no" on Interix.
* Network drives and encrypted local files may not be accessible after
logging in through sshd thanks to the way the Windows security API works.
A workaround is to "exec su USERNAME" after logging in, which will use
the password to create a proper Windows access credential key.
===========================================================================
MESSAGE.pam [+/-]===========================================================================
$NetBSD: MESSAGE.pam,v 1.3 2003/10/08 18:54:42 reed Exp $
To authenticate for SSH using PAM, add the contents of the file:
${EGDIR}/sshd.pam
to your PAM configuration file (or PAM configuration directory).
===========================================================================
MESSAGE.urandom [+/-]===========================================================================
$NetBSD: MESSAGE.urandom,v 1.1 2002/02/05 04:17:31 jlam Exp $
You will need a working /dev/urandom. Please make sure you have a kernel
compiled from a config file containing the line:
pseudo-device rnd
===========================================================================
Master sites: (Expand)
SHA1: cf5fe0eb118d7e4f9296fbc5d6884965885fc55d
RMD160: d0e757c90350351bb92ebd4fa9f045586fb54f97
Filesize: 1173.244 KB
Version history: (Expand)
- (2013-12-31) Updated to version: openssh-6.4.1
- (2013-10-04) Package added to pkgsrc.se, version openssh-6.2.1nb2 (created)
CVS history: (Expand)
2013-12-05 10:52:53 by Matthias Scheler | Files touched by this commit (17) | |
Log message:
Pullup ticket #4262 - requested by taca
security/openssh: security update
Revisions pulled up:
- security/openssh/Makefile 1.214
- security/openssh/distinfo 1.85
- security/openssh/options.mk 1.26
- security/openssh/patches/patch-Makefile.in 1.2
- security/openssh/patches/patch-auth.c 1.2
- security/openssh/patches/patch-auth1.c 1.2
- security/openssh/patches/patch-auth2.c 1.2
- security/openssh/patches/patch-config.h.in 1.2
- security/openssh/patches/patch-configure 1.2
- security/openssh/patches/patch-configure.ac 1.2
- security/openssh/patches/patch-includes.h 1.2
- security/openssh/patches/patch-scp.c 1.2
- security/openssh/patches/patch-session.c 1.2
- security/openssh/patches/patch-sftp-common.c 1.1
- security/openssh/patches/patch-ssh.c 1.2
- security/openssh/patches/patch-sshd.c 1.2
- security/openssh/patches/patch-uidswap.c 1.2
---
Module Name: pkgsrc
Committed By: taca
Date: Sun Dec 1 06:11:41 UTC 2013
Modified Files:
pkgsrc/security/openssh: Makefile distinfo options.mk
pkgsrc/security/openssh/patches: patch-Makefile.in patch-auth.c
patch-auth1.c patch-auth2.c patch-config.h.in patch-configure
patch-configure.ac patch-includes.h patch-scp.c patch-session.c
patch-ssh.c patch-sshd.c patch-uidswap.c
Added Files:
pkgsrc/security/openssh/patches: patch-sftp-common.c
Log message:
Update openssh to 6.4.1 (OpenSSH 6.4p1).
Changes since OpenSSH 6.3
=========================
This release fixes a security bug:
* sshd(8): fix a memory corruption problem triggered during rekeying
when an AES-GCM cipher is selected. Full details of the vulnerability
are available at: http://www.openssh.com/txt/gcmrekey.adv
Changes since OpenSSH 6.2 is too many to write here, please refer
the release note: http://www.openssh.com/txt/release-6.3.
|