Name: | openssh |
---|---|
Version: | 6.6.1p1 |
Release: | 11.el7 |
Architecture: | x86_64 |
Group: | Applications/Internet |
Size: | 1445946 |
License: | BSD |
RPM: | openssh-6.6.1p1-11.el7.x86_64.rpm |
Source RPM: | openssh-6.6.1p1-11.el7.src.rpm |
Build Date: | Fri Mar 06 2015 |
Build Host: | ca-buildj3.us.oracle.com |
Vendor: | Oracle America |
URL: | http://www.openssh.com/portable.html |
Summary: | An open source implementation of SSH protocol versions 1 and 2 |
Description: | SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features. This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both. |
- fix direction in CRYPTO_SESSION audit message (#1171248)
- add new option GSSAPIEnablek5users and disable using ~/.k5users by default CVE-2014-9278 (#1169843)
- log via monitor in chroots without /dev/log (#1083482)
- increase size of AUDIT_LOG_SIZE to 256 (#1171163) - record pfs= field in CRYPTO_SESSION audit event (#1171248)
- fix gsskex patch to correctly handle MONITOR_REQ_GSSSIGN request (#1118005)
- correct the calculation of bytes for authctxt->krb5_ccname <ams@corefiling.com> (#1161073)
- change audit trail for unknown users (#1158521)
- revert the default of KerberosUseKuserok back to yes - fix kuserok patch which checked for the existence of .k5login unconditionally and hence prevented other mechanisms to be used properly
- fix parsing empty options in sshd_conf - ignore SIGXFSZ in postauth monitor
- slightly change systemd units logic - use sshd-keygen.service (#1066615) - log when a client requests an interactive session and only sftp is allowed (#1130198) - sshd-keygen - don't generate DSA and ED25519 host keys in FIPS mode (#1143867)