Tux Machines
Posted by Roy Schestowitz on Oct 04, 2022,
updated Oct 05, 2022
=> How to Make Your First Linux App With Flutter | WordPress 6.1 Beta 3 Now Available
OpenSSH 9.1 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots or donated to the
project. More information on donations may be found at:
https://www.openssh.com/donations.html
Changes since OpenSSH 9.0
This release is focused on bug fixing.
Security
=> ======
This release contains fixes for three minor memory safety problems.
None are believed to be exploitable, but we report most memory safety
problems as potential security vulnerabilities out of caution.
Reported by Qualys
signing/verify code; GHPR333
Potentially-incompatible changes
using git's recent SSH signature support. The list of developer
signing keys is included in the repository as .git_allowed_signers
and is cross-signed using the PGP key that is still used to sign
release artifacts:
https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/RELEASE_KEY.asc
are now first-match-wins to match other directives. Previously
if an environment variable was multiply specified the last set
value would have been used. bz3438
will no longer generate DSA keys, as these are insecure and have
not been used by default for some years.
New features
RSA key length. Keys below this length will be ignored for user
authentication and for host authentication in sshd(8).
ssh(1) will terminate a connection if the server offers an RSA key
that falls below this limit, as the SSH protocol does not include
the ability to retry a failed key exchange.
request that allows the client to obtain user/group names that
correspond to a set of uids/gids.
extension (when available) to fill in user/group names for
directory listings.
defined in draft-ietf-secsh-filexfer-extensions-00. This overlaps
a bit with the existing "expand-path@openssh.com", but some other
clients support it.
sshsig verification times and authorized_keys expiry-time options
to accept dates in the UTC time zone in addition to the default
of interpreting them in the system time zone. YYYYMMDD and
YYMMDDHHMM[SS] dates/times will be interpreted as UTC if suffixed
with a 'Z' character.
Also allow certificate validity intervals to be specified in raw
seconds-since-epoch as hex value, e.g. -V 0x1234:0x4567890. This
is intended for use by regress tests and other tools that call
ssh-keygen as part of a CA workflow. bz3468
"/usr/libexec/sftp-server -el debug3"
with "-Y sign" operations, where it will be interpreted to require
that the private keys is hosted in an agent; bz3429
Bugfixes
This was already documented when support for user-verified FIDO
keys was added, but the ssh-keygen(1) code was missing.
previously the flag was accepted but never actually used.
names to non-existent commands, and better match the completion
type (local or remote filename) against the argument position
being completed.
handling, especially relating to keys that request
user-verification. These should reduce the number of unnecessary
PIN prompts for keys that support intrinsic user verification.
GHPR302, GHPR329
credential with matching application and user ID strings already
exists and, if so, prompt the user for confirmation before
overwriting the credential. GHPR329
files. bz2042
causing the client to exit early. bz3454
directive applies to both transmitted and received data. GHPR328
connection. bz3447
FIDO support. bz3443
GHPR294.
memory in error paths. GHPR286
kill(-1). GHPR286
same tokens as ProxyCommand. GHPR305.
previous behaviour of unconditionally truncating the destination
file would cause "scp ~/foo localhost:foo" and the reverse
"scp localhost:foo ~/foo" to delete all the contents of their
destination. bz3431
unable to load a private key; bz3429
path, ensure that the implicit working directory used to construct
that path escapes glob(3) characters. This prevents glob characters
from being processed in places they shouldn't, e.g. "cd /tmp/a*/",
"get .txt" should have the get operation treat the path "/tmp/a"
literally and not attempt to expand it.
in specifying a mask length; allow only 0-9. GHPR278
KRL
during SSH transport rekeying. This should make ~-escapes work in
the client (e.g. to exit) if the connection happened to have
stalled during a rekey event.
hierarchical sshbuf and zero the entire buffer if reallocation
fails. GHPR287
Portability
FIDO security key support if libfido2 is found and usable, unless
--without-security-key-builtin was requested.
FIDO device usable on Cygwin. The windows://hello FIDO device will
be automatically used by default on this platform unless requested
otherwise, or when probing resident FIDO credentials (an operation
not currently supported by WinHello).
versions of OpenSSL libcrypto. In particular, this release removes
fallback support for OpenSSL that lacks AES-CTR or AES-GCM.
Those AES cipher modes were added to OpenSSL prior to the minimum
version currently supported by OpenSSH, so this is not expected to
impact any currently supported configurations.
unnecessary libraries. They are no longer linked against libz and
libcrypto. This may be of benefit to space constrained systems
using any of those components in isolation.
architectures.
longer search for crypt() in libcrypto, as it was removed from
there years ago. configure will now only search libc and libcrypt.
RSA implementation (CVE-2022-2274) on x86_64.
required by the XMSS code on some platforms.
Checksums:
=> ========
Please note that the SHA256 signatures are base64 encoded and not
hexadecimal (which is the default for most checksum tools). The PGP
key used to sign the releases is available from the mirror sites:
https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/RELEASE_KEY.asc
Reporting Bugs:
Security bugs should be reported directly to openssh@openssh.com
UPDATE
A couple of reference pages:
=> ↺ Announce: OpenSSH 9.1 released
OpenSSH 9.1 has just been released. It will be available from the mirrors listed at https://www.openssh.com/ shortly.
=> ↺ OpenSSH 9.1/9.1p1 (2022-10-04)
This release contains fixes for three minor memory safety problems. None are believed to be exploitable, but we report most memory safety problems as potential security vulnerabilities out of caution.
=> gemini.tuxmachines.org This content has been proxied by September (ba2dc).Proxy Information
text/gemini;lang=en-GB