Secure Shell Client and Server (Remote Login Program)

Edit Package openssh

SSH (Secure Shell) is a program for logging into and executing commands
on a remote machine. It is intended to replace rsh (rlogin and rsh) and
provides openssl (secure encrypted communication) between two untrusted
hosts over an insecure network.

xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
also be forwarded over the secure channel.

Refresh
Refresh
Source Files
Filename Size Changed
README.FIPS 0000003276 3.2 KB
README.SUSE 0000000690 690 Bytes
README.kerberos 0000000528 528 Bytes
cavs_driver-ssh.pl 0000005408 5.28 KB
openssh-7.7p1-IPv6_X_forwarding.patch 0000001228 1.2 KB
openssh-7.7p1-X11_trusted_forwarding.patch 0000001739 1.7 KB
openssh-7.7p1-X_forward_with_disabled_ipv6.patch 0000000829 829 Bytes
openssh-7.7p1-cavstest-ctr.patch 0000007984 7.8 KB
openssh-7.7p1-cavstest-kdf.patch 0000014404 14.1 KB
openssh-7.7p1-disable_openssl_abi_check.patch 0000001544 1.51 KB
openssh-7.7p1-eal3.patch 0000000845 845 Bytes
openssh-7.7p1-enable_PAM_by_default.patch 0000000681 681 Bytes
openssh-7.7p1-fips.patch 0000024472 23.9 KB
openssh-7.7p1-fips_checks.patch 0000011794 11.5 KB
openssh-7.7p1-host_ident.patch 0000000774 774 Bytes
openssh-7.7p1-hostname_changes_when_forwarding_X.patch 0000002583 2.52 KB
openssh-7.7p1-ldap.patch 0000086758 84.7 KB
openssh-7.7p1-no_fork-no_pid_file.patch 0000000644 644 Bytes
openssh-7.7p1-pam_check_locks.patch 0000004810 4.7 KB
openssh-7.7p1-pts_names_formatting.patch 0000001043 1.02 KB
openssh-7.7p1-remove_xauth_cookies_on_exit.patch 0000001294 1.26 KB
openssh-7.7p1-seccomp_ipc_flock.patch 0000001431 1.4 KB
openssh-7.7p1-seccomp_stat.patch 0000000610 610 Bytes
openssh-7.7p1-send_locale.patch 0000001404 1.37 KB
openssh-7.7p1-sftp_force_permissions.patch 0000004188 4.09 KB
openssh-7.7p1-sftp_print_diagnostic_messages.patch 0000001776 1.73 KB
openssh-7.7p1-systemd-notify.patch 0000002569 2.51 KB
openssh-7.9p1-keygen-preserve-perms.patch 0000001304 1.27 KB
openssh-7.9p1-revert-new-qos-defaults.patch 0000002921 2.85 KB
openssh-8.0p1-gssapi-keyex.patch 0000123962 121 KB
openssh-8.1p1-audit.patch 0000070693 69 KB
openssh-8.1p1-ed25519-use-openssl-rng.patch 0000001840 1.8 KB
openssh-8.1p1-seccomp-clock_gettime64.patch 0000000844 844 Bytes
openssh-8.1p1-seccomp-clock_nanosleep.patch 0000000472 472 Bytes
openssh-8.1p1-seccomp-clock_nanosleep_time64.patch 0000000837 837 Bytes
openssh-8.1p1-use-openssl-kdf.patch 0000003878 3.79 KB
openssh-8.4p1-pam_motd.patch 0000000843 843 Bytes
openssh-8.4p1-ssh_config_d.patch 0000001291 1.26 KB
openssh-8.4p1-vendordir.patch 0000007112 6.95 KB
openssh-8.8p1.tar.gz 0001815060 1.73 MB
openssh-8.8p1.tar.gz.asc 0000000833 833 Bytes
openssh-askpass-gnome.changes 0000011444 11.2 KB
openssh-askpass-gnome.spec 0000002134 2.08 KB
openssh-fips-ensure-approved-moduli.patch 0000001788 1.75 KB
openssh-reenable-dh-group14-sha1-default.patch 0000001529 1.49 KB
openssh-whitelist-syscalls.patch 0000000927 927 Bytes
openssh.changes 0000223219 218 KB
openssh.keyring 0000022720 22.2 KB
openssh.spec 0000018516 18.1 KB
ssh-askpass 0000000479 479 Bytes
ssh.reg 0000000500 500 Bytes
sshd-gen-keys-start 0000000225 225 Bytes
sshd.fw 0000000135 135 Bytes
sshd.pamd 0000000425 425 Bytes
sshd.service 0000000394 394 Bytes
sysconfig.ssh 0000000221 221 Bytes
sysusers-sshd.conf 0000000064 64 Bytes
Revision 154 (latest revision is 177)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 923951 from Marcus Meissner's avatar Marcus Meissner (msmeissn) (revision 154)
- Version upgrade to 8.8p1
  * No changes for askpass, see main package changelog for
    details

- Version update to 8.8p1:
  = Security
  * sshd(8) from OpenSSH 6.2 through 8.7 failed to correctly initialise
    supplemental groups when executing an AuthorizedKeysCommand or
    AuthorizedPrincipalsCommand, where a AuthorizedKeysCommandUser or
    AuthorizedPrincipalsCommandUser directive has been set to run the
    command as a different user. Instead these commands would inherit
    the groups that sshd(8) was started with.
    Depending on system configuration, inherited groups may allow
    AuthorizedKeysCommand/AuthorizedPrincipalsCommand helper programs to
    gain unintended privilege.
    Neither AuthorizedKeysCommand nor AuthorizedPrincipalsCommand are
    enabled by default in sshd_config(5).
  = Potentially-incompatible changes
  * This release disables RSA signatures using the SHA-1 hash algorithm
    by default. This change has been made as the SHA-1 hash algorithm is
    cryptographically broken, and it is possible to create chosen-prefix
    hash collisions for <USD$50K.
    For most users, this change should be invisible and there is
    no need to replace ssh-rsa keys. OpenSSH has supported RFC8332
    RSA/SHA-256/512 signatures since release 7.2 and existing ssh-rsa keys
    will automatically use the stronger algorithm where possible.
    Incompatibility is more likely when connecting to older SSH
    implementations that have not been upgraded or have not closely tracked
    improvements in the SSH protocol. For these cases, it may be necessary
    to selectively re-enable RSA/SHA1 to allow connection and/or user
Comments 4

Meinhard R's avatar

Is it possible to upgrade to a more recent version, please?


Sami Vento's avatar

openSSH-7.8 is available



André Werlang's avatar

Hello, is it possible to adhere to the new guidance regarding systemd ( https://en.opensuse.org/openSUSE:Systemd_packaging_guidelines#Requirements )? That is, dropping %{?systemd_requires} and using %{?systemd_ordering} instead. This is interesting for containers, git-core requires openssh which in turn requires systemd which requires many other things. Thanks in advance.

openSUSE Build Service is sponsored by