Secure Shell Client and Server (Remote Login Program)

Edit Package openssh

SSH (Secure Shell) is a program for logging into and executing commands
on a remote machine. It is intended to replace rsh (rlogin and rsh) and
provides openssl (secure encrypted communication) between two untrusted
hosts over an insecure network.

xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
also be forwarded over the secure channel.

Refresh
Refresh
Source Files
Filename Size Changed
README.SuSE 0000000442 442 Bytes
README.kerberos 0000000642 642 Bytes
openssh-6.6p1-X11-forwarding.patch 0000002178 2.13 KB
openssh-6.6p1-X_forward_with_disabled_ipv6.patch 0000000957 957 Bytes
openssh-6.6p1-audit1-remove_duplicit_audit.patch 0000001142 1.12 KB
openssh-6.6p1-audit2-better_audit_of_user_actions.patch 0000023784 23.2 KB
openssh-6.6p1-audit3-key_auth_usage.patch 0000015290 14.9 KB
openssh-6.6p1-audit3_fips-key_auth_usage.patch 0000001855 1.81 KB
openssh-6.6p1-audit4-kex_results.patch 0000021639 21.1 KB
openssh-6.6p1-audit4_fips-kex_results.patch 0000002646 2.58 KB
openssh-6.6p1-audit5-session_key_destruction.patch 0000028835 28.2 KB
openssh-6.6p1-audit6-server_key_destruction.patch 0000023151 22.6 KB
openssh-6.6p1-audit7-libaudit_compat.patch 0000003054 2.98 KB
openssh-6.6p1-audit8-libaudit_dns_timeouts.patch 0000001800 1.76 KB
openssh-6.6p1-blocksigalrm.patch 0000002153 2.1 KB
openssh-6.6p1-default-protocol.patch 0000000762 762 Bytes
openssh-6.6p1-disable-openssl-abi-check.patch 0000001184 1.16 KB
openssh-6.6p1-eal3.patch 0000002365 2.31 KB
openssh-6.6p1-fingerprint_hash.patch 0000024080 23.5 KB
openssh-6.6p1-fips-checks.patch 0000012411 12.1 KB
openssh-6.6p1-fips.patch 0000032281 31.5 KB
openssh-6.6p1-gssapi_key_exchange.patch 0000117504 115 KB
openssh-6.6p1-gssapimitm.patch 0000016667 16.3 KB
openssh-6.6p1-host_ident.patch 0000001108 1.08 KB
openssh-6.6p1-key-converter.patch 0000013532 13.2 KB
openssh-6.6p1-lastlog.patch 0000000726 726 Bytes
openssh-6.6p1-ldap.patch 0000092032 89.9 KB
openssh-6.6p1-login_options.patch 0000001189 1.16 KB
openssh-6.6p1-no_fork-no_pid_file.patch 0000000772 772 Bytes
openssh-6.6p1-pam-check-locks.patch 0000007617 7.44 KB
openssh-6.6p1-pam-fix2.patch 0000001575 1.54 KB
openssh-6.6p1-pam-fix3.patch 0000000843 843 Bytes
openssh-6.6p1-pts.patch 0000001402 1.37 KB
openssh-6.6p1-saveargv-fix.patch 0000000821 821 Bytes
openssh-6.6p1-seccomp_getuid.patch 0000001000 1000 Bytes
openssh-6.6p1-seed-prng.patch 0000017456 17 KB
openssh-6.6p1-send_locale.patch 0000001693 1.65 KB
openssh-6.6p1-sftp_force_permissions.patch 0000004693 4.58 KB
openssh-6.6p1-sftp_homechroot.patch 0000011588 11.3 KB
openssh-6.6p1-xauth.patch 0000001461 1.43 KB
openssh-6.6p1-xauthlocalhostname.patch 0000003718 3.63 KB
openssh-6.6p1.tar.gz 0001282502 1.22 MB
openssh-askpass-gnome.changes 0000008900 8.69 KB
openssh-askpass-gnome.spec 0000002011 1.96 KB
openssh.changes 0000087802 85.7 KB
openssh.spec 0000012550 12.3 KB
ssh-askpass 0000000893 893 Bytes
ssh.reg 0000000500 500 Bytes
sshd-gen-keys-start 0000000161 161 Bytes
sshd.fw 0000000135 135 Bytes
sshd.init 0000004210 4.11 KB
sshd.pamd 0000000350 350 Bytes
sshd.service 0000000289 289 Bytes
sysconfig.ssh 0000000162 162 Bytes
Revision 95 (latest revision is 177)
Tomáš Chvátal's avatar Tomáš Chvátal (scarabeus_factory) accepted request 230190 from Petr Cerny's avatar Petr Cerny (pcerny) (revision 95)
- Update of the underlying OpenSSH to 6.6p1

- Remove uneeded dependency on the OpenLDAP server (openldap2)
  from openssh-helpers. openssh-helpers just depends on the 
  openldap client libraries, which will be auto-generated by rpm.

- update to 6.6p1
  Security:
  * sshd(8): when using environment passing with a sshd_config(5)
    AcceptEnv pattern with a wildcard. OpenSSH prior to 6.6 could
    be tricked into accepting any enviornment variable that
    contains the characters before the wildcard character.
  Features since 6.5p1:
  * ssh(1), sshd(8): removal of the J-PAKE authentication code,
    which was experimental, never enabled and has been
    unmaintained for some time.
  * ssh(1): skip 'exec' clauses other clauses predicates failed
    to match while processing Match blocks.
  * ssh(1): if hostname canonicalisation is enabled and results
    in the destination hostname being changed, then re-parse
    ssh_config(5) files using the new destination hostname. This
    gives 'Host' and 'Match' directives that use the expanded
    hostname a chance to be applied.
  Bugfixes:
  * ssh(1): avoid spurious "getsockname failed: Bad file
    descriptor" in ssh -W. bz#2200, debian#738692
  * sshd(8): allow the shutdown(2) syscall in seccomp-bpf and
    systrace sandbox modes, as it is reachable if the connection
    is terminated during the pre-auth phase.
  * ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1
Comments 4

Meinhard R's avatar

Is it possible to upgrade to a more recent version, please?


Sami Vento's avatar

openSSH-7.8 is available



André Werlang's avatar

Hello, is it possible to adhere to the new guidance regarding systemd ( https://en.opensuse.org/openSUSE:Systemd_packaging_guidelines#Requirements )? That is, dropping %{?systemd_requires} and using %{?systemd_ordering} instead. This is interesting for containers, git-core requires openssh which in turn requires systemd which requires many other things. Thanks in advance.

openSUSE Build Service is sponsored by