Name: | openssh |
---|---|
Version: | 8.0p1 |
Release: | 13.el8 |
Architecture: | aarch64 |
Group: | Applications/Internet |
Size: | 1967049 |
License: | BSD |
RPM: | openssh-8.0p1-13.el8.aarch64.rpm |
Source RPM: | openssh-8.0p1-13.el8.src.rpm |
Build Date: | Thu Mar 31 2022 |
Build Host: | build-ol8-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.openssh.com/portable.html |
Summary: | An open source implementation of SSH protocol version 2 |
Description: | SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features. This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both. |
- Upstream: ClientAliveCountMax=0 disable the connection killing behaviour (#2015828)
- Add support for "Include" directive in sshd_config file (#1926103)
- CVE-2021-41617 upstream fix (#2008885)
- sshd -T requires -C when "Match" is used in sshd_config (#1836277)
- CVE-2020-14145 openssh: Observable Discrepancy leading to an information leak in the algorithm negotiation (#1882252) - Hostbased ssh authentication fails if session ID contains a '/' (#1944125)
- ssh doesn't restore the blocking mode on standard output (#1942901)
- SFTP sort upon the modification time (#1909988) - ssh-keygen printing fingerprint issue with Windows keys (#1901518) - PIN is lost when iterating over tokens when adding pkcs11 keys to ssh-agent (#1843372) - ssh-agent segfaults during ssh-add -s pkcs11 (#1868996) - ssh-copy-id could not resolve ipv6 address ends with colon (#1933517) - sshd provides PAM an incorrect error code (#1879503)
- Openssh client window fix (#1913041)
- Do not print "no slots" warning by default (#1744220) - Unbreak connecting using gssapi through proxy commands (#1749862) - Document in manual pages that CASignatureAlgorithms are handled by crypto policies (#1790604) - Use SHA2-based signature algorithms by default for signing certificates (#1790610) - Prevent simple ProxyJump loops in configuration files (#1804099) - Teach ssh-keyscan to use SHA2 RSA variants (#1744108) - Do not fail hard if getrandom() is not available and no SSH_USE_STRONG_RNG is specified (#1812120) - Improve wording of crypto policies references in manual pages (#1812854) - Do not break X11 forwarding if IPv6 is disabled (#1662189) - Enable SHA2-based GSSAPI key exchange algorithms by default (#1816226) - Mark RDomain server configuration option unsupported in RHEL (#1807686) - Clarify crypto policies defaults in manual pages (#1724195) - Mention RSA SHA2 variants in ssh-keygen manual page (#1665900)
- Restore entropy patch for CC certification (#1785655)