Secure Shell Client and Server (Remote Login Program)

Edit Package openssh

SSH (Secure Shell) is a program for logging into and executing commands
on a remote machine. It is intended to replace rsh (rlogin and rsh) and
provides openssl (secure encrypted communication) between two untrusted
hosts over an insecure network.

xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
also be forwarded over the secure channel.

Refresh
Refresh
Source Files
Filename Size Changed
README.FIPS 0000003276 3.2 KB
README.SUSE 0000001200 1.17 KB
README.kerberos 0000000641 641 Bytes
cavs_driver-ssh.pl 0000005412 5.29 KB
openssh-7.7p1-SUSE_patches.tar.gz 0000147974 145 KB
openssh-7.7p1.tar.gz 0001536900 1.47 MB
openssh-7.7p1.tar.gz.asc 0000000683 683 Bytes
openssh-askpass-gnome.changes 0000009800 9.57 KB
openssh-askpass-gnome.spec 0000001883 1.84 KB
openssh.changes 0000162633 159 KB
openssh.spec 0000012053 11.8 KB
ssh-askpass 0000000893 893 Bytes
ssh.reg 0000000500 500 Bytes
sshd-gen-keys-start 0000000161 161 Bytes
sshd.fw 0000000135 135 Bytes
sshd.init 0000004185 4.09 KB
sshd.pamd 0000000350 350 Bytes
sshd.service 0000000361 361 Bytes
sysconfig.ssh 0000000162 162 Bytes
Revision 118 (latest revision is 177)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 611071 from Petr Cerny's avatar Petr Cerny (pcerny) (revision 118)
- Upgrade to 7.7p1 (bsc#1094068)

- Upgrade to 7.7p1 (bsc#1094068)
  Most important changes (more details below):
  * Drop compatibility support for pre-2001 SSH implementations
  * sshd(1) does not load DSA keys by default
  Distilled upstream log:
  ---- Potentially-incompatible changes
  * ssh(1)/sshd(8): Drop compatibility support for some very old
    SSH implementations, including ssh.com <=2.* and OpenSSH <=
    3.*.  These versions were all released in or before 2001 and
    predate the final SSH RFCs. The support in question isn't
    necessary for RFC-compliant SSH implementations.
  ---- New Features
  * experimental support for PQC XMSS keys (Extended Hash-Based
    Signatures), not compiled in by default.
  * sshd(8): Add a "rdomain" criteria for the sshd_config Match
    keyword to allow conditional configuration that depends on
    which routing domain a connection was received on (currently
    supported on OpenBSD and Linux).
  * sshd_config(5): Add an optional rdomain qualifier to the
    ListenAddress directive to allow listening on different
    routing domains. This is supported only on OpenBSD and Linux
    at present.
  * sshd_config(5): Add RDomain directive to allow the
    authenticated session to be placed in an explicit routing
    domain. This is only supported on OpenBSD at present.
  * sshd(8): Add "expiry-time" option for authorized_keys files
    to allow for expiring keys.
  * ssh(1): Add a BindInterface option to allow binding the (forwarded request 611002 from pcerny)
Comments 4

Meinhard R's avatar

Is it possible to upgrade to a more recent version, please?


Sami Vento's avatar

openSSH-7.8 is available



André Werlang's avatar

Hello, is it possible to adhere to the new guidance regarding systemd ( https://en.opensuse.org/openSUSE:Systemd_packaging_guidelines#Requirements )? That is, dropping %{?systemd_requires} and using %{?systemd_ordering} instead. This is interesting for containers, git-core requires openssh which in turn requires systemd which requires many other things. Thanks in advance.

openSUSE Build Service is sponsored by