Commit Graph

58 Commits

Author SHA1 Message Date
Adolf Belka
2aebd3a8c5 openssh: Update to 8.5p1
- Update Openssh from 8.4p1 to 8.5p1
- rootfiles not changed
- ssh access by keys tested with 8.5p1 and successfully worked
- Full Release notes can be read at https://www.openssh.com/releasenotes.html
- Future deprecation notice
   It is now possible[1] to perform chosen-prefix attacks against the
   SHA-1 algorithm for less than USD$50K.
   In the SSH protocol, the "ssh-rsa" signature scheme uses the SHA-1
   hash algorithm in conjunction with the RSA public key algorithm.
   OpenSSH will disable this signature scheme by default in the near
   future.
   Note that the deactivation of "ssh-rsa" signatures does not necessarily
   require cessation of use for RSA keys. In the SSH protocol, keys may be
   capable of signing using multiple algorithms. In particular, "ssh-rsa"
   keys are capable of signing using "rsa-sha2-256" (RSA/SHA256),
   "rsa-sha2-512" (RSA/SHA512) and "ssh-rsa" (RSA/SHA1). Only the last of
   these is being turned off by default.
- Checked if the weak ssh-rsa public key algorithm was being used with
   openssh8.4p1 by running
    ssh -oHostKeyAlgorithms=-ssh-rsa user@host
   host verification was successful with no issue so IPFire will not be
   affected by this deprecation when it happens
- Potentially-incompatible changes
    * ssh(1), sshd(8): this release changes the first-preference signature
      algorithm from ECDSA to ED25519.
   This did not affect my use of ssh login but I use ED25519 as the only
    key algorithm that I use. It might be good to get it tested by
    someone who has ECDSA and ED25519 keys and prefers ECDSA
   Remaining changes don't look likely to affect IPFire users
- Bugfixes
 * ssh(1): Prefix keyboard interactive prompts with "(user@host)" to
   make it easier to determine which connection they are associated
   with in cases like scp -3, ProxyJump, etc. bz#3224
 * sshd(8): fix sshd_config SetEnv directives located inside Match
   blocks. GHPR201
 * ssh(1): when requesting a FIDO token touch on stderr, inform the
   user once the touch has been recorded.
 * ssh(1): prevent integer overflow when ridiculously large
   ConnectTimeout values are specified, capping the effective value
   (for most platforms) at 24 days. bz#3229
 * ssh(1): consider the ECDSA key subtype when ordering host key
   algorithms in the client.
 * ssh(1), sshd(8): rename the PubkeyAcceptedKeyTypes keyword to
   PubkeyAcceptedAlgorithms. The previous name incorrectly suggested
   that it control allowed key algorithms, when this option actually
   specifies the signature algorithms that are accepted. The previous
   name remains available as an alias. bz#3253
 * ssh(1), sshd(8): similarly, rename HostbasedKeyTypes (ssh) and
   HostbasedAcceptedKeyTypes (sshd) to HostbasedAcceptedAlgorithms.
 * sftp-server(8): add missing lsetstat@openssh.com documentation
   and advertisement in the server's SSH2_FXP_VERSION hello packet.
 * ssh(1), sshd(8): more strictly enforce KEX state-machine by
   banning packet types once they are received. Fixes memleak caused
   by duplicate SSH2_MSG_KEX_DH_GEX_REQUEST (oss-fuzz #30078).
 * sftp(1): allow the full range of UIDs/GIDs for chown/chgrp on 32bit
   platforms instead of being limited by LONG_MAX. bz#3206
 * Minor man page fixes (capitalization, commas, etc.) bz#3223
 * sftp(1): when doing an sftp recursive upload or download of a
   read-only directory, ensure that the directory is created with
   write and execute permissions in the interim so that the transfer
   can actually complete, then set the directory permission as the
   final step. bz#3222
 * ssh-keygen(1): document the -Z, check the validity of its argument
   earlier and provide a better error message if it's not correct.
   bz#2879
 * ssh(1): ignore comments at the end of config lines in ssh_config,
   similar to what we already do for sshd_config. bz#2320
 * sshd_config(5): mention that DisableForwarding is valid in a
   sshd_config Match block. bz3239
 * sftp(1): fix incorrect sorting of "ls -ltr" under some
   circumstances. bz3248.
 * ssh(1), sshd(8): fix potential integer truncation of (unlikely)
   timeout values. bz#3250
 * ssh(1): make hostbased authentication send the signature algorithm
   in its SSH2_MSG_USERAUTH_REQUEST packets instead of the key type.
   This make HostbasedAcceptedAlgorithms do what it is supposed to -
   filter on signature algorithm and not key type.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-03-06 11:16:07 +00:00
Adolf Belka
13e20ecfc5 openssh: Update to 8.4p1
- Update openssh from version 8.3p1 to 8.4p1
	See https://www.openssh.com/releasenotes.html
	See https://www.openssh.com/portable.html#http for mirrors for source file
- No change to rootfiles
- Installed on virtual ipfire testbed and ssh connection successfully operated
Signed-off-by: Adolf Belka <ahb.ipfire@gmail.com>

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-09-30 10:00:17 +00:00
Peter Müller
421d057fd4 OpenSSH: update to 8.3p1
Fixes: #12418

Cc: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-06-27 14:29:34 +00:00
Arne Fitzenreiter
b14b37ba67 OpenSSH: fix login on i?86
glibc calls clock_nanosleep_time64 syscall even if it not defined in
the headers for this arch and the seccomp filter kills the process
with because an unknown syscall.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-04-10 21:41:14 +02:00
Arne Fitzenreiter
975bd8bc17 Revert "Revert "OpenSSH: update to 8.2p1""
This reverts commit e7fcf874e7.
2020-04-10 16:23:09 +02:00
Arne Fitzenreiter
e7fcf874e7 Revert "OpenSSH: update to 8.2p1"
ssh skips login before asking for credentials at i586.

This reverts commit 3fd3f4de44.
2020-04-09 20:26:33 +00:00
Peter Müller
3fd3f4de44 OpenSSH: update to 8.2p1
Please refer to https://www.openssh.com/txt/release-8.2 for release
announcements. Since glibc < 2.31 is used, no additional patching was
required in order to restore correct login functionality.

Cc: Marcel Lorenz <marcel.lorenz@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-03-26 17:40:06 +00:00
Peter Müller
81502fe6f3 OpenSSH: update to 8.1p1
Please refer to https://www.openssh.com/txt/release-8.1 for release notes.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-12-05 18:00:11 +00:00
Peter Müller
fc1b0311d6 openssh: update to 8.0p1
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-09-11 16:44:27 +00:00
Peter Müller
fee8b1c504 OpenSSH: update to 7.9p1
Update OpenSSH to 7.9p1 (release note is available at
https://www.openssh.com/txt/release-7.9). Patching support
for OpenSSL 1.1.0 is no longer required, thus the orphaned
patchfile has been deleted.

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-01-23 05:13:47 +00:00
Matthias Fischer
74189c1d55 openssh: Update to 7.8p1
For details see:
http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/ChangeLog

I didn't find an official lfs-patch for openssl-1.1-compatibility,
so I used the patch from here:
https://git.archlinux.org/svntogit/packages.git/plain/trunk/openssl-1.1.0.patch?h=packages/openssh

Building ran without any errors.

I tested with both machines (test on Core 120 - and productive - on Core 122) and found no errors so far:

...
[root@ipfiretest ~]# ssh -V
OpenSSH_7.8p1, OpenSSL 1.1.0h  27 Mar 2018
...

...
root@ipfire: / # ssh -V
OpenSSH_7.8p1, OpenSSL 1.1.0h  27 Mar 2018
...

All ssh-connections ran fine but I'm not REALLY sure if this is sufficient for anyone else.

Could someone please check and confirm!?

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Tested-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-09-20 14:51:44 +01:00
Peter Müller
07da1af688 use custom SSH server configuration in LFS file
Include OpenSSH server configuration file during build.

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-09-20 14:28:15 +01:00
Peter Müller
cc3e41cb8b use custom SSH client configuration in LFS file
Include OpenSSH client configuration file during build.

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-09-10 16:36:41 +01:00
Michael Tremer
ebbca90d70 openssh: Disable password authentication by default
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-08-09 16:28:14 +01:00
Michael Tremer
16c31d1004 openssh: Write port 22 into the default configuration file
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-06-30 19:25:15 +01:00
Matthias Fischer
1698eb73c7 openssh: Update to 7.7p1
For details see:
http://www.openssh.com/txt/release-7.7

This release fixes:
https://bugzilla.ipfire.org/show_bug.cgi?id=11693
https://bugzilla.ipfire.org/show_bug.cgi?id=11694

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-05-07 11:33:41 +01:00
Michael Tremer
07b8dcd0b2 openssh: Update to 7.6p1 and patch against OpenSSL 1.1
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-02-11 22:19:45 +00:00
Peter Müller
ba7cd7b624 openssh: update to 7.6p1
Signed-off-by: Marcel Lorenz <marcel.lorenz@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-12-14 16:43:04 +00:00
Matthias Fischer
8f6e4eaff7 Update for numerous lfs-files: removed deprecated configure options
Also includes some reformatting, but no changes to configuration.

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-12-05 17:02:24 +00:00
Michael Tremer
be3d3959d2 openssh: Remove deprecated configuration options
This was used for SSH version 1 which is not supported
any more

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-04-04 19:08:34 +01:00
Michael Tremer
e8607830b0 openssh: Update to 7.4p1
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-02-27 12:09:15 +00:00
Michael Tremer
4b8f1ffb31 openssh: Update to 7.3p1
Includes various security fixes:

 * sshd(8): Mitigate a potential denial-of-service attack against
   the system's crypt(3) function via sshd(8). An attacker could
   send very long passwords that would cause excessive CPU use in
   crypt(3). sshd(8) now refuses to accept password authentication
   requests of length greater than 1024 characters. Independently
   reported by Tomas Kuthan (Oracle), Andres Rojas and Javier Nieto.

 * sshd(8): Mitigate timing differences in password authentication
   that could be used to discern valid from invalid account names
   when long passwords were sent and particular password hashing
   algorithms are in use on the server. CVE-2016-6210, reported by
   EddieEzra.Harari at verint.com

 * ssh(1), sshd(8): Fix observable timing weakness in the CBC padding
   oracle countermeasures. Reported by Jean Paul Degabriele, Kenny
   Paterson, Torben Hansen and Martin Albrecht. Note that CBC ciphers
   are disabled by default and only included for legacy compatibility.

 * ssh(1), sshd(8): Improve operation ordering of MAC verification for
   Encrypt-then-MAC (EtM) mode transport MAC algorithms to verify the
   MAC before decrypting any ciphertext. This removes the possibility
   of timing differences leaking facts about the plaintext, though no
   such leakage has been observed.  Reported by Jean Paul Degabriele,
   Kenny Paterson, Torben Hansen and Martin Albrecht.

 * sshd(8): (portable only) Ignore PAM environment vars when
   UseLogin=yes. If PAM is configured to read user-specified
   environment variables and UseLogin=yes in sshd_config, then a
   hostile local user may attack /bin/login via LD_PRELOAD or
   similar environment variables set via PAM. CVE-2015-8325,
   found by Shayan Sadigh.

Fixes: #11160

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-08-02 16:06:35 +01:00
Sascha Kilian
68aa7aa602 openssh: Update to 7.2p2
Signed-off-by: Sascha Kilian <sascha@sakisoft.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-05-03 11:56:19 +01:00
Arne Fitzenreiter
aced5a9578 openssh: update to 7.2p1
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2016-03-01 15:59:34 +01:00
Matthias Fischer
1b8c3e2362 openssh: Update to 7.1p2
Fixes CVE-2016-0777

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-01-28 13:38:18 +01:00
Arne Fitzenreiter
3a6784c065 ssh: preferre ecdsa cipher again.
Previous we had not configured it so the ssh default order was used.
Now we define it to disable dsa so we had to give the correct order but
in the example cfg rsa is prefered.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-24 12:07:29 +02:00
Arne Fitzenreiter
d7b82e7cce openssh: disable dsa key usage.
fixes #10934

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2015-10-22 13:08:27 +02:00
Michael Tremer
0ce8df2890 openssh: Update to 7.1p1
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-08-21 21:21:27 +01:00
Michael Tremer
45b6ea63af openssh: Update to 7.0p1
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2015-08-12 14:01:55 +01:00
Matthias Fischer
016e63e818 openssh: lfs-update 2015-05-26 14:29:38 +02:00
Michael Tremer
102825b673 openssh: Update to version 6.8p1 2015-03-18 15:52:28 +01:00
Michael Tremer
bb0618287b openssh: Update to 6.6p1. 2014-03-18 18:03:14 +01:00
Michael Tremer
167e6ec7a8 openssh: Update to 6.5p1.
Adds support for ed25519.
2014-02-01 16:15:10 +01:00
Michael Tremer
33590570fb openssh: Update to 6.4p1.
Security fix because of
 http://www.openssh.com/txt/gcmrekey.adv
2013-11-09 14:16:52 +01:00
Arne Fitzenreiter
e2903617ca openssh: update to 6.2p2. 2013-06-07 12:54:34 +02:00
Michael Tremer
f1a58c3322 openssh: Update to 6.1p1. 2013-02-05 19:26:58 +01:00
Arne Fitzenreiter
d7d2dca964 openssh: update to 6.0p1. 2012-05-12 15:32:47 +02:00
Arne Fitzenreiter
8384f58553 openssh: update to 5.9p1. 2012-01-05 14:38:01 +01:00
Arne Fitzenreiter
bac3bb44e6 Updated openssh (5.8p1). 2011-02-08 22:15:53 +01:00
Arne Fitzenreiter
99fcb81b45 Updated openssh (5.6p1). 2010-11-16 22:42:59 +01:00
Arne Fitzenreiter
c5ae9f26a9 Updated openssh (5.4p1). 2010-03-12 17:24:15 +01:00
Arne Fitzenreiter
98eda9b110 Updated openssh (5.3p1). 2010-01-24 16:04:17 +01:00
maniacikarus
258fd16c24 Openssh now logs to auth facility, this makes filtering easier 2009-03-14 10:07:22 +01:00
maniacikarus
be01b81247 Upgraded openssh to current stable and added to core28 2009-03-04 07:07:45 +01:00
Maniacikarus
fcc535236f Done a whole review of the lfs to make building more paralell
you may need to clean your ccache
2008-10-28 18:14:09 +01:00
Arne Fitzennreiter
1c49a60462 Fix openssh patch part II 2008-10-20 19:47:01 +02:00
Arne Fitzennreiter
6f5bb9b8bd Fix openssh patch download 2008-10-20 10:05:18 +02:00
Maniacikarus
25414d25eb It should be enough to apply this patch 2008-10-19 18:56:40 +02:00
Maniacikarus
f22e302253 Applied SSH Patch to unleashe full power 2008-10-19 18:42:48 +02:00
Maniacikarus
027306bfe5 Some Final Upgrade before RC just to have latests bugfixes 2008-10-19 16:52:47 +02:00