Secure Shell Client and Server (Remote Login Program)
SSH (Secure Shell) is a program for logging into and executing commands
on a remote machine. It is intended to replace rsh (rlogin and rsh) and
provides openssl (secure encrypted communication) between two untrusted
hosts over an insecure network.
xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
also be forwarded over the secure channel.
- Developed at network
- Sources inherited from project openSUSE:Factory
-
16
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP4:FactoryCandidates/openssh && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
README.SuSE | 0000000442 442 Bytes | |
README.kerberos | 0000000642 642 Bytes | |
converter-linking.patch | 0000000660 660 Bytes | |
converter.tar.bz2 | 0000004792 4.68 KB | |
openssh-5.9p1-audit.patch | 0000007358 7.19 KB | |
openssh-5.9p1-blocksigalrm.diff | 0000001291 1.26 KB | |
openssh-5.9p1-default-protocol.diff | 0000000441 441 Bytes | |
openssh-5.9p1-eal3.diff | 0000001182 1.15 KB | |
openssh-5.9p1-engines.diff | 0000003918 3.83 KB | |
openssh-5.9p1-gssapimitm.patch | 0000009669 9.44 KB | |
openssh-5.9p1-homechroot.patch | 0000008565 8.36 KB | |
openssh-5.9p1-host_ident.diff | 0000000654 654 Bytes | |
openssh-5.9p1-pam-fix2.diff | 0000000639 639 Bytes | |
openssh-5.9p1-pam-fix3.diff | 0000000463 463 Bytes | |
openssh-5.9p1-pts.diff | 0000000797 797 Bytes | |
openssh-5.9p1-saveargv-fix.diff | 0000000672 672 Bytes | |
openssh-5.9p1-send_locale.diff | 0000001231 1.2 KB | |
openssh-5.9p1-sshconfig-knownhostschanges.diff | 0000000727 727 Bytes | |
openssh-5.9p1-sshd_config.diff | 0000001595 1.56 KB | |
openssh-5.9p1-xauth.diff | 0000001169 1.14 KB | |
openssh-5.9p1-xauthlocalhostname.diff | 0000002245 2.19 KB | |
openssh-6.1p1.tar.gz | 0001134820 1.08 MB | |
openssh-askpass-gnome.changes | 0000008094 7.9 KB | |
openssh-askpass-gnome.spec | 0000002764 2.7 KB | |
openssh-nocrazyabicheck.patch | 0000000604 604 Bytes | |
openssh-nodaemon-nopid.patch | 0000000313 313 Bytes | |
openssh.changes | 0000071442 69.8 KB | |
openssh.spec | 0000008258 8.06 KB | |
ssh-askpass | 0000000884 884 Bytes | |
ssh.reg | 0000000500 500 Bytes | |
sshd-gen-keys-start | 0000000994 994 Bytes | |
sshd.fw | 0000000135 135 Bytes | |
sshd.init | 0000004128 4.03 KB | |
sshd.pamd | 0000000336 336 Bytes | |
sshd.service | 0000000302 302 Bytes | |
sysconfig.ssh | 0000000162 162 Bytes |
Revision 82 (latest revision is 177)
Stephan Kulow (coolo)
accepted
request 141129
from
Marcus Meissner (msmeissn)
(revision 82)
- Updated to 6.1p1, a bugfix release Features: * sshd(8): This release turns on pre-auth sandboxing sshd by default for new installs, by setting UsePrivilegeSeparation=sandbox in sshd_config. * ssh-keygen(1): Add options to specify starting line number and number of lines to process when screening moduli candidates, allowing processing of different parts of a candidate moduli file in parallel * sshd(8): The Match directive now supports matching on the local (listen) address and port upon which the incoming connection was received via LocalAddress and LocalPort clauses. * sshd(8): Extend sshd_config Match directive to allow setting AcceptEnv and {Allow,Deny}{Users,Groups} * Add support for RFC6594 SSHFP DNS records for ECDSA key types. bz#1978 * ssh-keygen(1): Allow conversion of RSA1 keys to public PEM and PKCS8 * sshd(8): Allow the sshd_config PermitOpen directive to accept "none" as an argument to refuse all port-forwarding requests. * sshd(8): Support "none" as an argument for AuthorizedPrincipalsFile * ssh-keyscan(1): Look for ECDSA keys by default. bz#1971 * sshd(8): Add "VersionAddendum" to sshd_config to allow server operators to append some arbitrary text to the server SSH protocol banner. Bugfixes: * ssh(1)/sshd(8): Don't spin in accept() in situations of file descriptor exhaustion. Instead back off for a while. * ssh(1)/sshd(8): Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs as they were removed from the specification. bz#2023, * sshd(8): Handle long comments in config files better. bz#2025 * ssh(1): Delay setting tty_flag so RequestTTY options are correctly picked up. bz#1995 * sshd(8): Fix handling of /etc/nologin incorrectly being applied to root on platforms that use login_cap.
Comments 4
Is it possible to upgrade to a more recent version, please?
openSSH-7.8 is available
OpenSSH 7.8p1 is available: https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-7.8p1.tar.gz
Hello, is it possible to adhere to the new guidance regarding systemd ( https://en.opensuse.org/openSUSE:Systemd_packaging_guidelines#Requirements )? That is, dropping %{?systemd_requires} and using %{?systemd_ordering} instead. This is interesting for containers, git-core requires openssh which in turn requires systemd which requires many other things. Thanks in advance.