diff options
author | Colin Watson <cjwatson@debian.org> | 2010-01-01 23:53:30 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2010-01-01 23:53:30 +0000 |
commit | df03186a4f9e0c2ece398b5c0571cb6263d7a752 (patch) | |
tree | 1aab079441dff9615274769b19f2d734ddf508dd /ssh.0 | |
parent | 6ad6994c288662fca6949f42bf91fec2aff00bca (diff) | |
parent | 99b402ea4c8457b0a3cafff37f5b3410a8dc6476 (diff) |
* New upstream release (closes: #536182). Yes, I know 5.3p1 has been out
for a while, but there's no GSSAPI patch available for it yet.
- Change the default cipher order to prefer the AES CTR modes and the
revised "arcfour256" mode to CBC mode ciphers that are susceptible to
CPNI-957037 "Plaintext Recovery Attack Against SSH".
- Add countermeasures to mitigate CPNI-957037-style attacks against the
SSH protocol's use of CBC-mode ciphers. Upon detection of an invalid
packet length or Message Authentication Code, ssh/sshd will continue
reading up to the maximum supported packet length rather than
immediately terminating the connection. This eliminates most of the
known differences in behaviour that leaked information about the
plaintext of injected data which formed the basis of this attack
(closes: #506115, LP: #379329).
- ForceCommand directive now accepts commandline arguments for the
internal-sftp server (closes: #524423, LP: #362511).
- Add AllowAgentForwarding to available Match keywords list (closes:
#540623).
- Make ssh(1) send the correct channel number for
SSH2_MSG_CHANNEL_SUCCESS and SSH2_MSG_CHANNEL_FAILURE messages to
avoid triggering 'Non-public channel' error messages on sshd(8) in
openssh-5.1.
- Avoid printing 'Non-public channel' warnings in sshd(8), since the
ssh(1) has sent incorrect channel numbers since ~2004 (this reverts a
behaviour introduced in openssh-5.1; closes: #496017).
* Update to GSSAPI patch from
http://www.sxw.org.uk/computing/patches/openssh-5.2p1-gsskex-all-20090726.patch,
including cascading credentials support (LP: #416958).
Diffstat (limited to 'ssh.0')
-rw-r--r-- | ssh.0 | 20 |
1 files changed, 13 insertions, 7 deletions
@@ -4,7 +4,7 @@ NAME | |||
4 | ssh - OpenSSH SSH client (remote login program) | 4 | ssh - OpenSSH SSH client (remote login program) |
5 | 5 | ||
6 | SYNOPSIS | 6 | SYNOPSIS |
7 | ssh [-1246AaCfgKkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec] | 7 | ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] |
8 | [-D [bind_address:]port] [-e escape_char] [-F configfile] | 8 | [-D [bind_address:]port] [-e escape_char] [-F configfile] |
9 | [-i identity_file] [-L [bind_address:]port:host:hostport] | 9 | [-i identity_file] [-L [bind_address:]port:host:hostport] |
10 | [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] | 10 | [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] |
@@ -304,12 +304,15 @@ DESCRIPTION | |||
304 | [bind_address/]host/port/hostport. | 304 | [bind_address/]host/port/hostport. |
305 | 305 | ||
306 | By default, the listening socket on the server will be bound to | 306 | By default, the listening socket on the server will be bound to |
307 | the loopback interface only. This may be overriden by specifying | 307 | the loopback interface only. This may be overridden by specify- |
308 | a bind_address. An empty bind_address, or the address `*', indi- | 308 | ing a bind_address. An empty bind_address, or the address `*', |
309 | cates that the remote socket should listen on all interfaces. | 309 | indicates that the remote socket should listen on all interfaces. |
310 | Specifying a remote bind_address will only succeed if the serv- | 310 | Specifying a remote bind_address will only succeed if the serv- |
311 | er's GatewayPorts option is enabled (see sshd_config(5)). | 311 | er's GatewayPorts option is enabled (see sshd_config(5)). |
312 | 312 | ||
313 | If the port argument is `0', the listen port will be dynamically | ||
314 | allocated on the server and reported to the client at run time. | ||
315 | |||
313 | -S ctl_path | 316 | -S ctl_path |
314 | Specifies the location of a control socket for connection shar- | 317 | Specifies the location of a control socket for connection shar- |
315 | ing. Refer to the description of ControlPath and ControlMaster | 318 | ing. Refer to the description of ControlPath and ControlMaster |
@@ -365,6 +368,9 @@ DESCRIPTION | |||
365 | -Y Enables trusted X11 forwarding. Trusted X11 forwardings are not | 368 | -Y Enables trusted X11 forwarding. Trusted X11 forwardings are not |
366 | subjected to the X11 SECURITY extension controls. | 369 | subjected to the X11 SECURITY extension controls. |
367 | 370 | ||
371 | -y Send log information using the syslog(3) system module. By de- | ||
372 | fault this information is sent to stderr. | ||
373 | |||
368 | ssh may additionally obtain configuration data from a per-user configura- | 374 | ssh may additionally obtain configuration data from a per-user configura- |
369 | tion file and a system-wide configuration file. The file format and con- | 375 | tion file and a system-wide configuration file. The file format and con- |
370 | figuration options are described in ssh_config(5). | 376 | figuration options are described in ssh_config(5). |
@@ -500,8 +506,8 @@ ESCAPE CHARACTERS | |||
500 | version 2 and if the peer supports it). | 506 | version 2 and if the peer supports it). |
501 | 507 | ||
502 | ~C Open command line. Currently this allows the addition of port | 508 | ~C Open command line. Currently this allows the addition of port |
503 | forwardings using the -L and -R options (see above). It also al- | 509 | forwardings using the -L, -R and -D options (see above). It also |
504 | lows the cancellation of existing remote port-forwardings using | 510 | allows the cancellation of existing remote port-forwardings using |
505 | -KR[bind_address:]port. !command allows the user to execute a | 511 | -KR[bind_address:]port. !command allows the user to execute a |
506 | local command if the PermitLocalCommand option is enabled in | 512 | local command if the PermitLocalCommand option is enabled in |
507 | ssh_config(5). Basic help is available, using the -h option. | 513 | ssh_config(5). Basic help is available, using the -h option. |
@@ -864,4 +870,4 @@ AUTHORS | |||
864 | created OpenSSH. Markus Friedl contributed the support for SSH protocol | 870 | created OpenSSH. Markus Friedl contributed the support for SSH protocol |
865 | versions 1.5 and 2.0. | 871 | versions 1.5 and 2.0. |
866 | 872 | ||
867 | OpenBSD 4.4 July 2, 2008 14 | 873 | OpenBSD 4.5 February 12, 2009 14 |