Tux Machines

OpenSSH 9.1 released (UPDATED)

Posted by Roy Schestowitz on Oct 04, 2022,

updated Oct 05, 2022

=> How to Make Your First Linux App With Flutter | WordPress 6.1 Beta 3 Now Available

OpenSSH 9.1 has just been released. It will be available from the

mirrors listed at https://www.openssh.com/ shortly.

OpenSSH is a 100% complete SSH protocol 2.0 implementation and

includes sftp client and server support.

Once again, we would like to thank the OpenSSH community for their

continued support of the project, especially those who contributed

code or patches, reported bugs, tested snapshots or donated to the

project. More information on donations may be found at:

https://www.openssh.com/donations.html

Changes since OpenSSH 9.0

=> =======================

This release is focused on bug fixing.

Security

=> ======

This release contains fixes for three minor memory safety problems.

None are believed to be exploitable, but we report most memory safety

problems as potential security vulnerabilities out of caution.

Reported by Qualys

signing/verify code; GHPR333

Potentially-incompatible changes


using git's recent SSH signature support. The list of developer

signing keys is included in the repository as .git_allowed_signers

and is cross-signed using the PGP key that is still used to sign

release artifacts:

https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/RELEASE_KEY.asc

are now first-match-wins to match other directives. Previously

if an environment variable was multiply specified the last set

value would have been used. bz3438

will no longer generate DSA keys, as these are insecure and have

not been used by default for some years.

New features


RSA key length. Keys below this length will be ignored for user

authentication and for host authentication in sshd(8).

ssh(1) will terminate a connection if the server offers an RSA key

that falls below this limit, as the SSH protocol does not include

the ability to retry a failed key exchange.

request that allows the client to obtain user/group names that

correspond to a set of uids/gids.

extension (when available) to fill in user/group names for

directory listings.

defined in draft-ietf-secsh-filexfer-extensions-00. This overlaps

a bit with the existing "expand-path@openssh.com", but some other

clients support it.

sshsig verification times and authorized_keys expiry-time options

to accept dates in the UTC time zone in addition to the default

of interpreting them in the system time zone. YYYYMMDD and

YYMMDDHHMM[SS] dates/times will be interpreted as UTC if suffixed

with a 'Z' character.

Also allow certificate validity intervals to be specified in raw

seconds-since-epoch as hex value, e.g. -V 0x1234:0x4567890. This

is intended for use by regress tests and other tools that call

ssh-keygen as part of a CA workflow. bz3468

"/usr/libexec/sftp-server -el debug3"

with "-Y sign" operations, where it will be interpreted to require

that the private keys is hosted in an agent; bz3429

Bugfixes


This was already documented when support for user-verified FIDO

keys was added, but the ssh-keygen(1) code was missing.

previously the flag was accepted but never actually used.

names to non-existent commands, and better match the completion

type (local or remote filename) against the argument position

being completed.

handling, especially relating to keys that request

user-verification. These should reduce the number of unnecessary

PIN prompts for keys that support intrinsic user verification.

GHPR302, GHPR329

credential with matching application and user ID strings already

exists and, if so, prompt the user for confirmation before

overwriting the credential. GHPR329

files. bz2042

causing the client to exit early. bz3454

directive applies to both transmitted and received data. GHPR328

connection. bz3447

FIDO support. bz3443

GHPR294.

memory in error paths. GHPR286

kill(-1). GHPR286

same tokens as ProxyCommand. GHPR305.

previous behaviour of unconditionally truncating the destination

file would cause "scp ~/foo localhost:foo" and the reverse

"scp localhost:foo ~/foo" to delete all the contents of their

destination. bz3431

unable to load a private key; bz3429

path, ensure that the implicit working directory used to construct

that path escapes glob(3) characters. This prevents glob characters

from being processed in places they shouldn't, e.g. "cd /tmp/a*/",

"get .txt" should have the get operation treat the path "/tmp/a"

literally and not attempt to expand it.

in specifying a mask length; allow only 0-9. GHPR278

KRL

during SSH transport rekeying. This should make ~-escapes work in

the client (e.g. to exit) if the connection happened to have

stalled during a rekey event.

hierarchical sshbuf and zero the entire buffer if reallocation

fails. GHPR287

Portability


FIDO security key support if libfido2 is found and usable, unless

--without-security-key-builtin was requested.

FIDO device usable on Cygwin. The windows://hello FIDO device will

be automatically used by default on this platform unless requested

otherwise, or when probing resident FIDO credentials (an operation

not currently supported by WinHello).

versions of OpenSSL libcrypto. In particular, this release removes

fallback support for OpenSSL that lacks AES-CTR or AES-GCM.

Those AES cipher modes were added to OpenSSL prior to the minimum

version currently supported by OpenSSH, so this is not expected to

impact any currently supported configurations.

unnecessary libraries. They are no longer linked against libz and

libcrypto. This may be of benefit to space constrained systems

using any of those components in isolation.

architectures.

longer search for crypt() in libcrypto, as it was removed from

there years ago. configure will now only search libc and libcrypt.

RSA implementation (CVE-2022-2274) on x86_64.

required by the XMSS code on some platforms.

Checksums:

=> ========

Please note that the SHA256 signatures are base64 encoded and not

hexadecimal (which is the default for most checksum tools). The PGP

key used to sign the releases is available from the mirror sites:

https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/RELEASE_KEY.asc

Reporting Bugs:

=> =============

Security bugs should be reported directly to openssh@openssh.com

UPDATE

A couple of reference pages:

Announce: OpenSSH 9.1 released

=> ↺ Announce: OpenSSH 9.1 released

OpenSSH 9.1 has just been released. It will be available from the mirrors listed at https://www.openssh.com/ shortly.

OpenSSH 9.1/9.1p1 (2022-10-04)

=> ↺ OpenSSH 9.1/9.1p1 (2022-10-04)

This release contains fixes for three minor memory safety problems. None are believed to be exploitable, but we report most memory safety problems as potential security vulnerabilities out of caution.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2022/10/04/OpenSSH_9_1_released.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
141.423394 milliseconds
Gemini-to-HTML Time
2.536251 milliseconds

This content has been proxied by September (ba2dc).