Secure Shell Client and Server (Remote Login Program)

Edit Package openssh

SSH (Secure Shell) is a program for logging into and executing commands
on a remote machine. It is intended to replace rsh (rlogin and rsh) and
provides openssl (secure encrypted communication) between two untrusted
hosts over an insecure network.

xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
also be forwarded over the secure channel.

Refresh
Refresh
Source Files
Filename Size Changed
README.SuSE 0000000442 442 Bytes
README.kerberos 0000000642 642 Bytes
openssh-6.5p1-X11-forwarding.patch 0000002178 2.13 KB
openssh-6.5p1-audit1-remove_duplicit_audit.patch 0000001142 1.12 KB
openssh-6.5p1-audit2-better_audit_of_user_actions.patch 0000023780 23.2 KB
openssh-6.5p1-audit3-key_auth_usage.patch 0000016916 16.5 KB
openssh-6.5p1-audit4-kex_results.patch 0000024271 23.7 KB
openssh-6.5p1-audit5-session_key_destruction.patch 0000028809 28.1 KB
openssh-6.5p1-audit6-server_key_destruction.patch 0000023163 22.6 KB
openssh-6.5p1-audit7-libaudit_compat.patch 0000003054 2.98 KB
openssh-6.5p1-audit8-libaudit_dns_timeouts.patch 0000001800 1.76 KB
openssh-6.5p1-blocksigalrm.patch 0000002153 2.1 KB
openssh-6.5p1-default-protocol.patch 0000000762 762 Bytes
openssh-6.5p1-disable-openssl-abi-check.patch 0000001184 1.16 KB
openssh-6.5p1-eal3.patch 0000002365 2.31 KB
openssh-6.5p1-fingerprint_hash.patch 0000024077 23.5 KB
openssh-6.5p1-fips.patch 0000032414 31.7 KB
openssh-6.5p1-gssapi_key_exchange.patch 0000119833 117 KB
openssh-6.5p1-gssapimitm.patch 0000016761 16.4 KB
openssh-6.5p1-host_ident.patch 0000001108 1.08 KB
openssh-6.5p1-key-converter.patch 0000013532 13.2 KB
openssh-6.5p1-lastlog.patch 0000000726 726 Bytes
openssh-6.5p1-ldap.patch 0000092031 89.9 KB
openssh-6.5p1-login_options.patch 0000001189 1.16 KB
openssh-6.5p1-no_fork-no_pid_file.patch 0000000772 772 Bytes
openssh-6.5p1-pam-check-locks.patch 0000007617 7.44 KB
openssh-6.5p1-pam-fix2.patch 0000001575 1.54 KB
openssh-6.5p1-pam-fix3.patch 0000000843 843 Bytes
openssh-6.5p1-pts.patch 0000001402 1.37 KB
openssh-6.5p1-saveargv-fix.patch 0000000821 821 Bytes
openssh-6.5p1-seed-prng.patch 0000017439 17 KB
openssh-6.5p1-send_locale.patch 0000001693 1.65 KB
openssh-6.5p1-sftp_force_permissions.patch 0000004693 4.58 KB
openssh-6.5p1-sftp_homechroot.patch 0000011586 11.3 KB
openssh-6.5p1-xauth.patch 0000001461 1.43 KB
openssh-6.5p1-xauthlocalhostname.patch 0000003718 3.63 KB
openssh-6.5p1.tar.gz 0001293187 1.23 MB
openssh-askpass-gnome.changes 0000008739 8.53 KB
openssh-askpass-gnome.spec 0000002011 1.96 KB
openssh.changes 0000084066 82.1 KB
openssh.spec 0000011158 10.9 KB
ssh-askpass 0000000893 893 Bytes
ssh.reg 0000000500 500 Bytes
sshd-gen-keys-start 0000000161 161 Bytes
sshd.fw 0000000135 135 Bytes
sshd.init 0000004210 4.11 KB
sshd.pamd 0000000350 350 Bytes
sshd.service 0000000289 289 Bytes
sysconfig.ssh 0000000162 162 Bytes
Revision 90 (latest revision is 177)
Stephan Kulow's avatar Stephan Kulow (coolo) accepted request 222366 from Petr Cerny's avatar Petr Cerny (pcerny) (revision 90)
- Update of the underlying OpenSSH to 6.5p1

- Update to 6.5p1
  Features since 6.4p1:
  * ssh(1), sshd(8): support for key exchange using ECDH in
    Daniel Bernstein's Curve25519; default when both the client
    and server support it.
  * ssh(1), sshd(8): support for Ed25519 as a public key type fo
    rboth server and client.  Ed25519 is an EC signature offering
    better security than ECDSA and DSA and good performance.
  * Add a new private key format that uses a bcrypt KDF to better
    protect keys at rest. Used unconditionally for Ed25519 keys,
    on demand for other key types via the -o ssh-keygen(1)
    option.  Intended to become default in the near future.
    Details documented in PROTOCOL.key.
  * ssh(1), sshd(8): new transport cipher
    "chacha20-poly1305@openssh.com" combining Daniel Bernstein's
    ChaCha20 stream cipher and Poly1305 MAC to build an
    authenticated encryption mode. Details documented
    PROTOCOL.chacha20poly1305.
  * ssh(1), sshd(8): refuse RSA keys from old proprietary clients
    and servers that use the obsolete RSA+MD5 signature scheme.
    It will still be possible to connect with these
    clients/servers but only DSA keys will be accepted, and
    OpenSSH will refuse connection entirely in a future release.
  * ssh(1), sshd(8): refuse old proprietary clients and servers
    that use a weaker key exchange hash calculation.
  * ssh(1): increase the size of the Diffie-Hellman groups
    requested for each symmetric key size. New values from NIST
    Special Publication 800-57 with the upper limit specified by (forwarded request 222365 from pcerny)
Comments 4

Meinhard R's avatar

Is it possible to upgrade to a more recent version, please?


Sami Vento's avatar

openSSH-7.8 is available



André Werlang's avatar

Hello, is it possible to adhere to the new guidance regarding systemd ( https://en.opensuse.org/openSUSE:Systemd_packaging_guidelines#Requirements )? That is, dropping %{?systemd_requires} and using %{?systemd_ordering} instead. This is interesting for containers, git-core requires openssh which in turn requires systemd which requires many other things. Thanks in advance.

openSUSE Build Service is sponsored by