pkgsrc/security/openssh/distinfo

30 lines
1.6 KiB
Text
Raw Normal View History

$NetBSD: distinfo,v 1.40 2005/05/25 23:17:11 reed Exp $
Update to 3.9p1: * Added new "IdentitiesOnly" option to ssh(1), which specifies that it should use keys specified in ssh_config, rather than any keys in ssh-agent(1) * Make sshd(8) re-execute itself on accepting a new connection. This security measure ensures that all execute-time randomisations are reapplied for each connection rather than once, for the master process' lifetime. This includes mmap and malloc mappings, shared library addressing, shared library mapping order, ProPolice and StackGhost cookies on systems that support such things * Add strict permission and ownership checks to programs reading ~/.ssh/config NB ssh(1) will now exit instead of trying to process a config with poor ownership or permissions * Implemented the ability to pass selected environment variables between the client and the server. See "AcceptEnv" in sshd_config(5) and "SendEnv" in ssh_config(5) for details * Added a "MaxAuthTries" option to sshd(8), allowing control over the maximum number of authentication attempts permitted per connection * Added support for cancellation of active remote port forwarding sessions. This may be performed using the ~C escape character, see "Escape Characters" in ssh(1) for details * Many sftp(1) interface improvements, including greatly enhanced "ls" support and the ability to cancel active transfers using SIGINT (^C) * Implement session multiplexing: a single ssh(1) connection can now carry multiple login/command/file transfer sessions. Refer to the "ControlMaster" and "ControlPath" options in ssh_config(5) for more information * The sftp-server has improved support for non-POSIX filesystems (e.g. FAT) * Portable OpenSSH: Re-introduce support for PAM password authentication, in addition to the keyboard-interactive driver. PAM password authentication is less flexible, and doesn't support pre-authentication password expiry but runs in-process so Kerberos tokens, etc are retained * Improved and more extensive regression tests * Many bugfixes and small improvements
2004-08-31 13:27:11 +02:00
SHA1 (openssh-3.9p1.tar.gz) = 80b19d83a9d4717f5c38b2d950501e1471f60afc
2005-02-24 13:51:41 +01:00
RMD160 (openssh-3.9p1.tar.gz) = e4abf280a18e3ae046d0dee19dab919bba8e5568
Update to 3.9p1: * Added new "IdentitiesOnly" option to ssh(1), which specifies that it should use keys specified in ssh_config, rather than any keys in ssh-agent(1) * Make sshd(8) re-execute itself on accepting a new connection. This security measure ensures that all execute-time randomisations are reapplied for each connection rather than once, for the master process' lifetime. This includes mmap and malloc mappings, shared library addressing, shared library mapping order, ProPolice and StackGhost cookies on systems that support such things * Add strict permission and ownership checks to programs reading ~/.ssh/config NB ssh(1) will now exit instead of trying to process a config with poor ownership or permissions * Implemented the ability to pass selected environment variables between the client and the server. See "AcceptEnv" in sshd_config(5) and "SendEnv" in ssh_config(5) for details * Added a "MaxAuthTries" option to sshd(8), allowing control over the maximum number of authentication attempts permitted per connection * Added support for cancellation of active remote port forwarding sessions. This may be performed using the ~C escape character, see "Escape Characters" in ssh(1) for details * Many sftp(1) interface improvements, including greatly enhanced "ls" support and the ability to cancel active transfers using SIGINT (^C) * Implement session multiplexing: a single ssh(1) connection can now carry multiple login/command/file transfer sessions. Refer to the "ControlMaster" and "ControlPath" options in ssh_config(5) for more information * The sftp-server has improved support for non-POSIX filesystems (e.g. FAT) * Portable OpenSSH: Re-introduce support for PAM password authentication, in addition to the keyboard-interactive driver. PAM password authentication is less flexible, and doesn't support pre-authentication password expiry but runs in-process so Kerberos tokens, etc are retained * Improved and more extensive regression tests * Many bugfixes and small improvements
2004-08-31 13:27:11 +02:00
Size (openssh-3.9p1.tar.gz) = 854027 bytes
SHA1 (openssh-3.9p1-hpn.diff) = 1821c590b9b5effa3750ebf0166fe3f22d00faad
Size (openssh-3.9p1-hpn.diff) = 8387 bytes
SHA1 (patch-aa) = 6bceb5b0480727c6c4e0cf662fa85cffebf91bdb
SHA1 (patch-ab) = f43a6b627a4f2b8ecd74b016ce29b5f8091d877e
SHA1 (patch-ac) = d851513c2a115358671bf9efafab1e3ee9166088
SHA1 (patch-ad) = 2fe2ea9a661a456351012f88d26e4812d096cf23
SHA1 (patch-ae) = d7bcee7a84457c96951c3da82aa689fa818a07b6
SHA1 (patch-af) = ec6b439a3a4a0d2e5b13685c4d94deb26bbece45
SHA1 (patch-ag) = dbdbefa00b2ec7e6ee3cf4441d1fc817ecefc742
Update to 3.9p1: * Added new "IdentitiesOnly" option to ssh(1), which specifies that it should use keys specified in ssh_config, rather than any keys in ssh-agent(1) * Make sshd(8) re-execute itself on accepting a new connection. This security measure ensures that all execute-time randomisations are reapplied for each connection rather than once, for the master process' lifetime. This includes mmap and malloc mappings, shared library addressing, shared library mapping order, ProPolice and StackGhost cookies on systems that support such things * Add strict permission and ownership checks to programs reading ~/.ssh/config NB ssh(1) will now exit instead of trying to process a config with poor ownership or permissions * Implemented the ability to pass selected environment variables between the client and the server. See "AcceptEnv" in sshd_config(5) and "SendEnv" in ssh_config(5) for details * Added a "MaxAuthTries" option to sshd(8), allowing control over the maximum number of authentication attempts permitted per connection * Added support for cancellation of active remote port forwarding sessions. This may be performed using the ~C escape character, see "Escape Characters" in ssh(1) for details * Many sftp(1) interface improvements, including greatly enhanced "ls" support and the ability to cancel active transfers using SIGINT (^C) * Implement session multiplexing: a single ssh(1) connection can now carry multiple login/command/file transfer sessions. Refer to the "ControlMaster" and "ControlPath" options in ssh_config(5) for more information * The sftp-server has improved support for non-POSIX filesystems (e.g. FAT) * Portable OpenSSH: Re-introduce support for PAM password authentication, in addition to the keyboard-interactive driver. PAM password authentication is less flexible, and doesn't support pre-authentication password expiry but runs in-process so Kerberos tokens, etc are retained * Improved and more extensive regression tests * Many bugfixes and small improvements
2004-08-31 13:27:11 +02:00
SHA1 (patch-ah) = 85a8f0fa5ddf13f8342faaff6bf81fcd3ad6648a
SHA1 (patch-ai) = ccc43f0523bf2b0e28d7e169eda59b1ff1a2215b
SHA1 (patch-aj) = 44f2b11949a4dea6a8760b8397db5360b64bf01f
SHA1 (patch-ak) = 6140fe665aa84ab8127e0d9ede44945f196392e4
SHA1 (patch-al) = 3168440d9e584a504b21802edb4dbeb58e87e8d2
SHA1 (patch-am) = 50e46970b8eff07b931a34313d863e13af838440
SHA1 (patch-an) = 1ffc3704bf925f87fb787c93f6f10d1b0c06bdd0
SHA1 (patch-ao) = 0677e5f8a1a9a2f6b600789ff3fea627af472bc0
SHA1 (patch-ap) = b006a1b49f19ab322fc179a1f2e4238807a64b87
SHA1 (patch-aq) = 3786a41a974d6583f379350068a762a725b8334d
SHA1 (patch-ar) = 90f2534c0fb01f7909ee88c7849092a9e7882a7d
SHA1 (patch-as) = ecb23bc4c07d8ac7599b6f6576ad39bb4dcedbab
SHA1 (patch-at) = c6b85eb24279f18a430b86aeda3f8d2fa1c8d018
SHA1 (patch-au) = 2a8926edfb65a8ecf7786411cee3d1723247764b
SHA1 (patch-av) = ef8fca98fad60cad4ba4197e8579544f37a4fcee