Secure Shell Client and Server (Remote Login Program)

Edit Package openssh

SSH (Secure Shell) is a program for logging into and executing commands
on a remote machine. It is intended to replace rsh (rlogin and rsh) and
provides openssl (secure encrypted communication) between two untrusted
hosts over an insecure network.

xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
also be forwarded over the secure channel.

Refresh
Refresh
Source Files
Filename Size Changed
README.SuSE 0000000442 442 Bytes
README.kerberos 0000000642 642 Bytes
converter-linking.patch 0000000660 660 Bytes
converter.tar.bz2 0000004792 4.68 KB
openssh-5.9p1-audit.patch 0000007358 7.19 KB
openssh-5.9p1-blocksigalrm.diff 0000001291 1.26 KB
openssh-5.9p1-default-protocol.diff 0000000441 441 Bytes
openssh-5.9p1-eal3.diff 0000001182 1.15 KB
openssh-5.9p1-engines.diff 0000003918 3.83 KB
openssh-5.9p1-gssapimitm.patch 0000009669 9.44 KB
openssh-5.9p1-homechroot.patch 0000008565 8.36 KB
openssh-5.9p1-host_ident.diff 0000000654 654 Bytes
openssh-5.9p1-pam-fix2.diff 0000000639 639 Bytes
openssh-5.9p1-pam-fix3.diff 0000000463 463 Bytes
openssh-5.9p1-pts.diff 0000000797 797 Bytes
openssh-5.9p1-saveargv-fix.diff 0000000672 672 Bytes
openssh-5.9p1-send_locale.diff 0000001231 1.2 KB
openssh-5.9p1-sshconfig-knownhostschanges.diff 0000000727 727 Bytes
openssh-5.9p1-sshd_config.diff 0000001595 1.56 KB
openssh-5.9p1-xauth.diff 0000001169 1.14 KB
openssh-5.9p1-xauthlocalhostname.diff 0000002245 2.19 KB
openssh-6.1p1.tar.gz 0001134820 1.08 MB
openssh-askpass-gnome.changes 0000008094 7.9 KB
openssh-askpass-gnome.spec 0000002764 2.7 KB
openssh-nocrazyabicheck.patch 0000000604 604 Bytes
openssh-nodaemon-nopid.patch 0000000313 313 Bytes
openssh.changes 0000071442 69.8 KB
openssh.spec 0000008258 8.06 KB
ssh-askpass 0000000884 884 Bytes
ssh.reg 0000000500 500 Bytes
sshd-gen-keys-start 0000000994 994 Bytes
sshd.fw 0000000135 135 Bytes
sshd.init 0000004128 4.03 KB
sshd.pamd 0000000336 336 Bytes
sshd.service 0000000302 302 Bytes
sysconfig.ssh 0000000162 162 Bytes
Revision 82 (latest revision is 177)
Stephan Kulow's avatar Stephan Kulow (coolo) accepted request 141129 from Marcus Meissner's avatar Marcus Meissner (msmeissn) (revision 82)
- Updated to 6.1p1, a bugfix release
  Features:
 * sshd(8): This release turns on pre-auth sandboxing sshd by default for
   new installs, by setting UsePrivilegeSeparation=sandbox in sshd_config.
 * ssh-keygen(1): Add options to specify starting line number and number of
   lines to process when screening moduli candidates, allowing processing
   of different parts of a candidate moduli file in parallel
 * sshd(8): The Match directive now supports matching on the local (listen)
   address and port upon which the incoming connection was received via
   LocalAddress and LocalPort clauses.
 * sshd(8): Extend sshd_config Match directive to allow setting AcceptEnv
   and {Allow,Deny}{Users,Groups}
 * Add support for RFC6594 SSHFP DNS records for ECDSA key types. bz#1978
 * ssh-keygen(1): Allow conversion of RSA1 keys to public PEM and PKCS8
 * sshd(8): Allow the sshd_config PermitOpen directive to accept "none" as
   an argument to refuse all port-forwarding requests.
 * sshd(8): Support "none" as an argument for AuthorizedPrincipalsFile
 * ssh-keyscan(1): Look for ECDSA keys by default. bz#1971
 * sshd(8): Add "VersionAddendum" to sshd_config to allow server operators
   to append some arbitrary text to the server SSH protocol banner.
 Bugfixes:
 * ssh(1)/sshd(8): Don't spin in accept() in situations of file
   descriptor exhaustion. Instead back off for a while.
 * ssh(1)/sshd(8): Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs as
   they were removed from the specification. bz#2023,
 * sshd(8): Handle long comments in config files better. bz#2025
 * ssh(1): Delay setting tty_flag so RequestTTY options are correctly
   picked up. bz#1995
 * sshd(8): Fix handling of /etc/nologin incorrectly being applied to root
   on platforms that use login_cap.
Comments 4

Meinhard R's avatar

Is it possible to upgrade to a more recent version, please?


Sami Vento's avatar

openSSH-7.8 is available



André Werlang's avatar

Hello, is it possible to adhere to the new guidance regarding systemd ( https://en.opensuse.org/openSUSE:Systemd_packaging_guidelines#Requirements )? That is, dropping %{?systemd_requires} and using %{?systemd_ordering} instead. This is interesting for containers, git-core requires openssh which in turn requires systemd which requires many other things. Thanks in advance.

openSUSE Build Service is sponsored by