Subject: CVS commit: pkgsrc/security/openssh
From: Takahiro Kambe
Date: 2006-10-31 04:31:20
Message id: 20061031033120.85FAE211CA@cvs.netbsd.org

Log Message:
Update openssh package to 4.4.1 (openssh-4.4p1).

- A few pkglint warning clean up.
- Major changes are here.  For complete changes,
  see http://www.openssh.com/txt/release-4.4.

Changes since OpenSSH 4.3:
============================

Security bugs resolved in this release:

 * Fix a pre-authentication denial of service found by Tavis Ormandy,
   that would cause sshd(8) to spin until the login grace time
   expired.

 * Fix an unsafe signal hander reported by Mark Dowd. The signal
   handler was vulnerable to a race condition that could be exploited
   to perform a pre-authentication denial of service. On portable
   OpenSSH, this vulnerability could theoretically lead to
   pre-authentication remote code execution if GSSAPI authentication
   is enabled, but the likelihood of successful exploitation appears
   remote.

 * On portable OpenSSH, fix a GSSAPI authentication abort that could
   be used to determine the validity of usernames on some platforms.

This release includes the following new functionality and fixes:

 * Implemented conditional configuration in sshd_config(5) using the
   "Match" directive. This allows some configuration options to be
   selectively overridden if specific criteria (based on user, group,
   hostname and/or address) are met. So far a useful subset of post-
   authentication options are supported and more are expected to be
   added in future releases.

 * Add support for Diffie-Hellman group exchange key agreement with a
   final hash of SHA256.

 * Added a "ForceCommand" directive to sshd_config(5). Similar to the
   command="..." option accepted in ~/.ssh/authorized_keys, this forces
   the execution of the specified command regardless of what the user
   requested. This is very useful in conjunction with the new "Match"
   option.

 * Add a "PermitOpen" directive to sshd_config(5). This mirrors the
   permitopen="..." authorized_keys option, allowing fine-grained
   control over the port-forwardings that a user is allowed to
   establish.

 * Add optional logging of transactions to sftp-server(8).

 * ssh(1) will now record port numbers for hosts stored in
   ~/.ssh/authorized_keys when a non-standard port has been requested.

 * Add an "ExitOnForwardFailure" option to cause ssh(1) to exit (with
   a non-zero exit code) when requested port forwardings could not be
   established.

 * Extend sshd_config(5) "SubSystem" declarations to allow the
   specification of command-line arguments.

 * Replacement of all integer overflow susceptible invocations of
   malloc(3) and realloc(3) with overflow-checking equivalents.

 * Many manpage fixes and improvements

 * New portable OpenSSH-specific features:

   - Add optional support for SELinux, controlled using the
     --with-selinux configure option (experimental)

   - Add optional support for Solaris process contracts, enabled
     using the --with-solaris-contracts configure option (experimental)
     This option will also include SMF metadata in Solaris packages
     built using the "make package" target

   - Add optional support for OpenSSL hardware accelerators (engines),
     enabled using the --with-ssl-engine configure option.

Files:
RevisionActionfile
1.172modifypkgsrc/security/openssh/Makefile
1.55modifypkgsrc/security/openssh/distinfo
1.2modifypkgsrc/security/openssh/hacks.mk
1.9modifypkgsrc/security/openssh/options.mk
1.42modifypkgsrc/security/openssh/patches/patch-aa
1.24modifypkgsrc/security/openssh/patches/patch-ab
1.16modifypkgsrc/security/openssh/patches/patch-ac
1.12modifypkgsrc/security/openssh/patches/patch-ad
1.12modifypkgsrc/security/openssh/patches/patch-ae
1.10modifypkgsrc/security/openssh/patches/patch-af
1.9modifypkgsrc/security/openssh/patches/patch-ag
1.24modifypkgsrc/security/openssh/patches/patch-ah
1.10modifypkgsrc/security/openssh/patches/patch-ai
1.7modifypkgsrc/security/openssh/patches/patch-aj
1.8modifypkgsrc/security/openssh/patches/patch-ak
1.7modifypkgsrc/security/openssh/patches/patch-al
1.7modifypkgsrc/security/openssh/patches/patch-am
1.8modifypkgsrc/security/openssh/patches/patch-an
1.9modifypkgsrc/security/openssh/patches/patch-ao
1.8modifypkgsrc/security/openssh/patches/patch-ap
1.6modifypkgsrc/security/openssh/patches/patch-aq
1.7modifypkgsrc/security/openssh/patches/patch-ar
1.5modifypkgsrc/security/openssh/patches/patch-as
1.3modifypkgsrc/security/openssh/patches/patch-au
1.5modifypkgsrc/security/openssh/patches/patch-av
1.2modifypkgsrc/security/openssh/patches/patch-aw
1.3removepkgsrc/security/openssh/patches/patch-at
1.1removepkgsrc/security/openssh/patches/patch-ax
1.1removepkgsrc/security/openssh/patches/patch-ay
1.1removepkgsrc/security/openssh/patches/patch-az