Re: Call for testing: OpenSSH 6.6

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



Test on my OpenBSD desktop machine:

OpenBSD logan.my.domain 5.4 GENERIC.MP#41 amd64

run test dhgex.sh ...
dhgex bits 3072 diffie-hellman-group-exchange-sha1 cast128-cbc
FATAL: dhgex expected 3072 bit group, got 2048
*** Error 1 in regress (Makefile:172 't-exec': @if [ "xconnect.sh
proxy-connect.sh connect-privsep.sh proto-version.sh proto-mismatch.sh
exi...)
*** Error 1 in /home/logan/openssh_snap/openssh (Makefile:454 'tests')


On Sat, Mar 1, 2014 at 2:19 AM, Damien Miller <djm@xxxxxxxxxxx> wrote:
> Hi,
>
> OpenSSH 6.6 is almost ready for release, so we would appreciate testing
> on as many platforms and systems as possible. This is a small release
> mostly to fix some minor but annoying bugs in openssh-6.5.
>
> Snapshot releases for portable OpenSSH are available from
> http://www.mindrot.org/openssh_snap/
>
> The OpenBSD version is available in CVS HEAD:
> http://www.openbsd.org/anoncvs.html
>
> Portable OpenSSH is also available via anonymous CVS using the
> instructions at http://www.openssh.com/portable.html#cvs or
> via Git at https://anongit.mindrot.org/openssh.git/
>
> Running the regression tests supplied with Portable OpenSSH does not
> require installation and is a simply:
>
> $ ./configure && make tests
>
> Live testing on suitable non-production systems is also
> appreciated. Please send reports of success or failure to
> openssh-unix-dev@xxxxxxxxxxx.
>
> Below is a summary of changes. More detail may be found in the ChangeLog
> in the portable OpenSSH tarballs.
>
> Thanks to the many people who contributed to this release.
>
> Changes since OpenSSH 6.5
> =========================
>
> This is primarily a bugfix release.
>
> New / changed features:
>
>  * ssh(1), sshd(8): this release removes the J-PAKE authentication code.
>    This code was experimental, never enabled and had been unmaintained
>    for some time.
>
>  * ssh(1): when processing Match blocks, skip 'exec' clauses other clauses
>    predicates failed to match.
>
>  * ssh(1): if hostname canonicalisation is enabled and results in the
>    destination hostname being changed, then re-parse ssh_config(5) files
>    using the new destination hostname. This gives 'Host' and 'Match'
>    directives that use the expanded hostname a chance to be applied.
>
> Bugfixes:
>
>  * ssh(1): avoid spurious "getsockname failed: Bad file descriptor" in
>    ssh -W. bz#2200, debian#738692
>
>  * sshd(8): allow the shutdown(2) syscall in seccomp-bpf and systrace
>    sandbox modes, as it is reachable if the connection is terminated
>    during the pre-auth phase.
>
>  * ssh(1), sshd(8): fix unsigned overflow that in SSH protocol 1 bignum
>    parsing. Minimum key length checks render this bug unexploitable to
>    compromise SSH 1 sessions.
>
>  * sshd_config(5): clarify behaviour of a keyword that appears in
>    multiple matching Match blocks. bz#2184
>
>  * ssh(1): avoid unnecessary hostname lookups when canonicalisation is
>    disabled. bz#2205
>
>  * sshd(8): avoid sandbox violation crashes in GSSAPI code by caching
>    the supported list of GSSAPI mechanism OIDs before entering the
>    sandbox. bz#2107
>
>  * ssh(1): fix possible crashes in SOCKS4 parsing caused by assumption
>    that the SOCKS username is nul-terminated.
>
>  * ssh(1): fix regression for UsePrivilegedPort=yes when BindAddress is
>    not specified.
>
>  * ssh(1), sshd(8): fix memory leak in ECDSA signature verification.
>
>  * ssh(1): fix matching of 'Host' directives in ssh_config(5) files
>    to be case-sensitive again (regression in 6.5).
>
> Portable OpenSSH:
>
>  * sshd(8): don't fatal if the FreeBSD Capsicum is offered by the
>    system headers and libc but is not supported by the kernel.
>  * Fix build using the HP-UX compiler.
>
> Reporting Bugs:
> ===============
>
> - Please read http://www.openssh.com/report.html
>   Security bugs should be reported directly to openssh@xxxxxxxxxxx
>
> OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt,
> Kevin Steves, Damien Miller, Darren Tucker, Jason McIntyre, Tim Rice and
> Ben Lindstrom.
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev@xxxxxxxxxxx
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



-- 
This message is strictly personal and the opinions expressed do not
represent those of my employers, either past or present.
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev




[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux