diff options
Diffstat (limited to 'openssh.spec')
-rw-r--r-- | openssh.spec | 745 |
1 files changed, 745 insertions, 0 deletions
diff --git a/openssh.spec b/openssh.spec new file mode 100644 index 0000000..dc3003b --- /dev/null +++ b/openssh.spec @@ -0,0 +1,745 @@ +%global gtk2 1 +%global pie 1 + +# Add option to build without GTK2 for older platforms with only GTK+. +# rpm -ba|--rebuild --define 'no_gtk2 1' +%{?no_gtk2:%global gtk2 0} + +%global sshd_uid 74 +%global openssh_release 2.1 + +Name: openssh +Version: 9.3p1 +Release: %{openssh_release} +URL: http://www.openssh.com/portable.html +License: BSD +Summary: An open source implementation of SSH protocol version 2 + +Source0: https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz +Source1: https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz.asc +Source2: sshd.pam +Source3: http://prdownloads.sourceforge.net/pamsshagentauth/pam_ssh_agent_auth/pam_ssh_agent_auth-0.10.4.tar.gz +Source4: pam_ssh_agent-rmheaders +Source5: ssh-keycat.pam +Source6: sshd.sysconfig +Source7: sshd@.service +Source8: sshd.socket +Source9: sshd.service +Source10: sshd-keygen@.service +Source11: sshd-keygen +Source12: sshd.tmpfiles +Source13: sshd-keygen.target +Source14: ssh-agent.service +Source15: ssh-agent.socket +Source16: ssh-keygen-bash-completion.sh +Patch0: openssh-6.7p1-coverity.patch +Patch1: openssh-7.6p1-audit.patch +Patch2: openssh-7.1p2-audit-race-condition.patch +Patch3: pam_ssh_agent_auth-0.9.3-build.patch +Patch4: pam_ssh_agent_auth-0.10.3-seteuid.patch +Patch5: pam_ssh_agent_auth-0.9.2-visibility.patch +Patch6: pam_ssh_agent_auth-0.9.3-agent_structure.patch +Patch7: pam_ssh_agent_auth-0.10.2-compat.patch +Patch8: pam_ssh_agent_auth-0.10.2-dereference.patch +Patch9: pam_ssh_agent_auth-0.10.4-rsasha2.patch +Patch10: pam_ssh_agent-configure-c99.patch +Patch11: openssh-7.8p1-role-mls.patch +Patch12: openssh-6.6p1-privsep-selinux.patch +Patch14: openssh-6.6p1-keycat.patch +Patch15: openssh-6.6p1-allow-ip-opts.patch +Patch17: openssh-5.9p1-ipv6man.patch +Patch18: openssh-5.8p2-sigpipe.patch +Patch19: openssh-7.2p2-x11.patch +Patch21: openssh-5.1p1-askpass-progress.patch +Patch22: openssh-4.3p2-askpass-grab-info.patch +Patch23: openssh-7.7p1.patch +Patch24: openssh-7.8p1-UsePAM-warning.patch +Patch28: openssh-8.0p1-gssapi-keyex.patch +Patch29: openssh-6.6p1-force_krb.patch +Patch30: openssh-6.6p1-GSSAPIEnablek5users.patch +Patch31: openssh-7.7p1-gssapi-new-unique.patch +Patch32: openssh-7.2p2-k5login_directory.patch +Patch33: openssh-6.6p1-kuserok.patch +Patch34: openssh-6.4p1-fromto-remote.patch +Patch35: openssh-6.6.1p1-selinux-contexts.patch +Patch36: openssh-6.6.1p1-log-in-chroot.patch +Patch37: openssh-6.6.1p1-scp-non-existing-directory.patch +Patch38: openssh-6.8p1-sshdT-output.patch +Patch39: openssh-6.7p1-sftp-force-permission.patch +Patch40: openssh-7.2p2-s390-closefrom.patch +Patch41: openssh-7.3p1-x11-max-displays.patch +Patch42: openssh-7.4p1-systemd.patch +Patch43: openssh-7.6p1-cleanup-selinux.patch +Patch44: openssh-7.5p1-sandbox.patch +Patch45: openssh-8.0p1-pkcs11-uri.patch +Patch46: openssh-7.8p1-scp-ipv6.patch +Patch48: openssh-8.0p1-crypto-policies.patch +Patch49: openssh-9.3p1-merged-openssl-evp.patch +Patch50: openssh-8.0p1-openssl-kdf.patch +Patch51: openssh-8.2p1-visibility.patch +Patch52: openssh-8.2p1-x11-without-ipv6.patch +Patch53: openssh-8.0p1-keygen-strip-doseol.patch +Patch54: openssh-8.0p1-preserve-pam-errors.patch +Patch55: openssh-8.7p1-scp-kill-switch.patch +Patch56: openssh-8.7p1-recursive-scp.patch +Patch57: openssh-8.7p1-minrsabits.patch +Patch58: openssh-8.7p1-ibmca.patch +Patch60: openssh-8.7p1-ssh-manpage.patch +Patch61: openssh-8.7p1-negotiate-supported-algs.patch +Patch65: openssh-9.3p1-upstream-cve-2023-38408.patch +Patch66: bugfix-sftp-when-parse_user_host_path-empty-path-should-be-allowed.patch +Patch67: bugfix-openssh-add-option-check-username-splash.patch +Patch68: feature-openssh-7.4-hima-sftpserver-oom-and-fix.patch +Patch69: bugfix-openssh-fix-sftpserver.patch +Patch70: set-sshd-config.patch +Patch71: feature-add-SMx-support.patch +Patch72: add-loongarch.patch +Patch73: openssh-Add-sw64-architecture.patch +Patch74: add-strict-scp-check-for-CVE-2020-15778.patch +Patch75: skip-scp-test-if-there-is-no-scp-on-remote-path-as-s.patch +Patch77: set-ssh-config.patch + +Requires: /sbin/nologin +Requires: libselinux >= 2.3-5 audit-libs >= 1.0.8 +Requires: openssh-server = %{version}-%{release} + +BuildRequires: gtk2-devel libX11-devel openldap-devel autoconf automake perl-interpreter perl-generators +BuildRequires: zlib-devel audit-libs-devel >= 2.0.5 util-linux groff pam-devel +BuildRequires: openssl3 perl-podlators systemd-devel gcc p11-kit-devel krb5-devel +BuildRequires: libedit-devel ncurses-devel libselinux-devel >= 2.3-5 audit-libs >= 1.0.8 xauth gnupg2 + +Recommends: p11-kit + +%package clients +Summary: An open source SSH client applications +Requires: openssh = %{version}-%{release} +Requires: crypto-policies >= 20180306-1 +Requires: openssl3 + +%package server +Summary: An open source SSH server daemon +Requires: openssh = %{version}-%{release} +Requires(pre): shadow +Requires: pam >= 1.0.1-3 +Requires: crypto-policies >= 20180306-1 +Requires: openssl3 +%{?systemd_requires} + +%package keycat +Summary: A mls keycat backend for openssh +Requires: openssh = %{version}-%{release} + +%package askpass +Summary: A passphrase dialog for OpenSSH and X +Requires: openssh = %{version}-%{release} + +%package -n pam_ssh_agent_auth +Summary: PAM module for authentication with ssh-agent +Version: 0.10.4 +Release: 4.%{openssh_release} +License: BSD + +%description +OpenSSH is the premier connectivity tool for remote login with the SSH protocol. \ +It encrypts all traffic to eliminate eavesdropping, connection hijacking, and \ +other attacks. In addition, OpenSSH provides a large suite of secure tunneling \ +capabilities, several authentication methods, and sophisticated configuration options. + +%description clients +OpenSSH is a free version of SSH (Secure SHell), a program for logging +into and executing commands on a remote machine. This package includes +the clients necessary to make encrypted connections to SSH servers. + +%description server +OpenSSH is a free version of SSH (Secure SHell), a program for logging +into and executing commands on a remote machine. This package contains +the secure shell daemon (sshd). The sshd daemon allows SSH clients to +securely connect to your SSH server. + +%description keycat +OpenSSH mls keycat is backend for using the authorized keys in the +openssh in the mls mode. + +%description askpass +OpenSSH is a free version of SSH (Secure SHell), a program for logging +into and executing commands on a remote machine. This package contains +an X11 passphrase dialog for OpenSSH. + +%description -n pam_ssh_agent_auth +Provides PAM module for the use of authentication with ssh-agent. Through the use of the\ +forwarding of ssh-agent connection it also allows to authenticate with remote ssh-agent \ +instance. The module is most useful for su and sudo service stacks. + +%package_help + +%prep +%setup -q -a 3 + +pushd pam_ssh_agent_auth-pam_ssh_agent_auth-0.10.4 +%patch3 -p2 -b .psaa-build +%patch4 -p2 -b .psaa-seteuid +%patch5 -p2 -b .psaa-visibility +%patch7 -p2 -b .psaa-compat +%patch6 -p2 -b .psaa-agent +%patch8 -p2 -b .psaa-deref +%patch9 -p2 -b .rsasha2 +%patch10 -p1 -b .psaa-configure-c99 +# Remove duplicate headers and library files +rm -f $(cat %{SOURCE4}) +popd + +%patch11 -p1 -b .role-mls +%patch12 -p1 -b .privsep-selinux +%patch14 -p1 -b .keycat +%patch15 -p1 -b .ip-opts +%patch17 -p1 -b .ipv6man +%patch18 -p1 -b .sigpipe +%patch19 -p1 -b .x11 +%patch21 -p1 -b .progress +%patch22 -p1 -b .grab-info +%patch23 -p1 +%patch24 -p1 -b .log-usepam-no +%patch28 -p1 -b .gsskex +%patch29 -p1 -b .force_krb +%patch31 -p1 -b .ccache_name +%patch32 -p1 -b .k5login +%patch33 -p1 -b .kuserok +%patch34 -p1 -b .fromto-remote +%patch35 -p1 -b .contexts +%patch36 -p1 -b .log-in-chroot +%patch37 -p1 -b .scp +%patch30 -p1 -b .GSSAPIEnablek5users +%patch38 -p1 -b .sshdt +%patch39 -p1 -b .sftp-force-mode +%patch40 -p1 -b .s390-dev +%patch41 -p1 -b .x11max +%patch42 -p1 -b .systemd +%patch43 -p1 -b .refactor +%patch44 -p1 -b .sandbox +%patch45 -p1 -b .pkcs11-uri +%patch46 -p1 -b .scp-ipv6 +%patch48 -p1 -b .crypto-policies +%patch49 -p1 -b .openssl-evp +%patch50 -p1 -b .openssl-kdf +%patch51 -p1 -b .visibility +%patch52 -p1 -b .x11-ipv6 +%patch53 -p1 -b .keygen-strip-doseol +%patch54 -p1 -b .preserve-pam-errors +%patch55 -p1 -b .kill-scp +%patch56 -p1 -b .scp-sftpdirs +%patch57 -p1 -b .minrsabits +%patch58 -p1 -b .ibmca +%patch60 -p1 -b .ssh-manpage +%patch61 -p1 -b .negotiate-supported-algs +%patch65 -p1 -b .cve-2023-38408 +%patch1 -p1 -b .audit +%patch2 -p1 -b .audit-race +%patch0 -p1 -b .coverity + +%patch66 -p1 +%patch67 -p1 +%patch68 -p1 +%patch69 -p1 +%patch70 -p1 +%patch71 -p1 +%patch72 -p1 +%patch73 -p1 +%patch74 -p1 +%patch75 -p1 +%patch77 -p1 + +autoreconf +pushd pam_ssh_agent_auth-pam_ssh_agent_auth-0.10.4 +autoreconf +popd + +%build +CFLAGS="$RPM_OPT_FLAGS -fvisibility=hidden"; export CFLAGS + +CFLAGS="$CFLAGS -Os" +%ifarch s390 s390x sparc sparcv9 sparc64 +CFLAGS="$CFLAGS -fPIC" +%else +CFLAGS="$CFLAGS -fpic" +%endif +SAVE_LDFLAGS="$LDFLAGS" +LDFLAGS="$LDFLAGS -pie -z relro -z now" + +export CFLAGS +export LDFLAGS + +if test -r /etc/profile.d/krb5-devel.sh ; then + source /etc/profile.d/krb5-devel.sh +fi +krb5_prefix=`krb5-config --prefix` +if test "$krb5_prefix" != "%{_prefix}" ; then + CPPFLAGS="$CPPFLAGS -I${krb5_prefix}/include -I${krb5_prefix}/include/gssapi"; export CPPFLAGS + CFLAGS="$CFLAGS -I${krb5_prefix}/include -I${krb5_prefix}/include/gssapi" + LDFLAGS="$LDFLAGS -L${krb5_prefix}/%{_lib}"; export LDFLAGS +else + krb5_prefix= + CPPFLAGS="-I%{_includedir}/gssapi"; export CPPFLAGS + CFLAGS="$CFLAGS -I%{_includedir}/gssapi" +fi + +%configure \ + --sysconfdir=%{_sysconfdir}/ssh --libexecdir=%{_libexecdir}/openssh \ + --datadir=%{_datadir}/openssh --with-default-path=/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin \ + --with-superuser-path=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin \ + --with-privsep-path=%{_var}/empty/sshd --disable-strip \ + --without-zlib-version-check --with-ssl-engine --with-ipaddr-display \ + --with-pie=no --without-hardening --with-systemd --with-default-pkcs11-provider=yes \ + --with-pam --with-selinux --with-audit=linux --with-security-key-buildin=yes \ +%ifnarch riscv64 loongarch64 sw_64 + --with-sandbox=seccomp_filter \ +%endif + --with-kerberos5${krb5_prefix:+=${krb5_prefix}} --with-libedit + +make +gtk2=yes + +pushd contrib +if [ $gtk2 = yes ] ; then + CFLAGS="$CFLAGS %{?__global_ldflags}" \ + make gnome-ssh-askpass2 + mv gnome-ssh-askpass2 gnome-ssh-askpass +else + CFLAGS="$CFLAGS %{?__global_ldflags}" + make gnome-ssh-askpass1 + mv gnome-ssh-askpass1 gnome-ssh-askpass +fi +popd + +pushd pam_ssh_agent_auth-pam_ssh_agent_auth-0.10.4 +LDFLAGS="$SAVE_LDFLAGS" +%configure --with-selinux --libexecdir=/%{_libdir}/security --with-mantype=man \ + --without-openssl-header-check +make +popd + +%check +make tests + +%install +mkdir -p -m755 $RPM_BUILD_ROOT%{_sysconfdir}/ssh +mkdir -p -m755 $RPM_BUILD_ROOT%{_sysconfdir}/ssh/ssh_config.d +mkdir -p -m755 $RPM_BUILD_ROOT%{_libexecdir}/openssh +mkdir -p -m755 $RPM_BUILD_ROOT%{_var}/empty/sshd +mkdir -p -m755 $RPM_BUILD_ROOT%{_sysconfdir}/bash_completion.d + +%make_install + +install -d $RPM_BUILD_ROOT/etc/pam.d/ +install -d $RPM_BUILD_ROOT/etc/sysconfig/ +install -d $RPM_BUILD_ROOT%{_libexecdir}/openssh +install -m644 %{SOURCE2} $RPM_BUILD_ROOT/etc/pam.d/sshd +install -m644 %{SOURCE5} $RPM_BUILD_ROOT/etc/pam.d/ssh-keycat +install -m644 %{SOURCE6} $RPM_BUILD_ROOT/etc/sysconfig/sshd +install -d -m755 $RPM_BUILD_ROOT/%{_unitdir} +install -m644 %{SOURCE7} $RPM_BUILD_ROOT/%{_unitdir}/sshd@.service +install -m644 %{SOURCE8} $RPM_BUILD_ROOT/%{_unitdir}/sshd.socket +install -m644 %{SOURCE9} $RPM_BUILD_ROOT/%{_unitdir}/sshd.service +install -m644 %{SOURCE10} $RPM_BUILD_ROOT/%{_unitdir}/sshd-keygen@.service +install -m644 %{SOURCE13} $RPM_BUILD_ROOT/%{_unitdir}/sshd-keygen.target +install -d -m755 $RPM_BUILD_ROOT/%{_userunitdir} +install -m644 %{SOURCE14} $RPM_BUILD_ROOT/%{_userunitdir}/ssh-agent.service +install -m644 %{SOURCE15} $RPM_BUILD_ROOT/%{_userunitdir}/ssh-agent.socket +install -m744 %{SOURCE11} $RPM_BUILD_ROOT/%{_libexecdir}/openssh/sshd-keygen +install -m755 contrib/ssh-copy-id $RPM_BUILD_ROOT%{_bindir}/ +install contrib/ssh-copy-id.1 $RPM_BUILD_ROOT%{_mandir}/man1/ +install -m644 -D %{SOURCE12} $RPM_BUILD_ROOT%{_tmpfilesdir}/%{name}.conf +install contrib/gnome-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/gnome-ssh-askpass +install -m644 %{SOURCE16} $RPM_BUILD_ROOT/etc/bash_completion.d/ssh-keygen-bash-completion.sh + +ln -s gnome-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/ssh-askpass +install -m 755 -d $RPM_BUILD_ROOT%{_sysconfdir}/profile.d/ +install -m 755 contrib/redhat/gnome-ssh-askpass.csh $RPM_BUILD_ROOT%{_sysconfdir}/profile.d/ +install -m 755 contrib/redhat/gnome-ssh-askpass.sh $RPM_BUILD_ROOT%{_sysconfdir}/profile.d/ + +perl -pi -e "s|$RPM_BUILD_ROOT||g" $RPM_BUILD_ROOT%{_mandir}/man*/* + +pushd pam_ssh_agent_auth-pam_ssh_agent_auth-0.10.4 +make install DESTDIR=$RPM_BUILD_ROOT +popd + +%pre +getent group ssh_keys >/dev/null || groupadd -r ssh_keys || : + +%pre server +getent group sshd >/dev/null || groupadd -g %{sshd_uid} -r sshd || : +getent passwd sshd >/dev/null || \ + useradd -c "Privilege-separated SSH" -u %{sshd_uid} -g sshd \ + -s /sbin/nologin -r -d /var/empty/sshd sshd 2> /dev/null || : + +%post server +%systemd_post sshd.service sshd.socket + +%preun server +%systemd_preun sshd.service sshd.socket + +%postun server +%systemd_postun_with_restart sshd.service + +%post clients +%systemd_user_post ssh-agent.service +%systemd_user_post ssh-agent.socket + +%preun clients +%systemd_user_preun ssh-agent.service +%systemd_user_preun ssh-agent.socket + +%files +%license LICENCE +%doc CREDITS README.platform +%attr(0755,root,root) %dir %{_sysconfdir}/ssh +%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh/moduli +%attr(0755,root,root) %{_bindir}/ssh-keygen +%attr(0755,root,root) %dir %{_libexecdir}/openssh +%attr(2555,root,ssh_keys) %{_libexecdir}/openssh/ssh-keysign +%attr(0644,root,root) %{_sysconfdir}/bash_completion.d/ssh-keygen-bash-completion.sh + +%files clients +%attr(0755,root,root) %{_bindir}/ssh +%attr(0755,root,root) %{_bindir}/scp +%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh/ssh_config +%attr(0755,root,root) %{_bindir}/ssh-agent +%attr(0755,root,root) %{_bindir}/ssh-add +%attr(0755,root,root) %{_bindir}/ssh-keyscan +%attr(0755,root,root) %{_bindir}/sftp +%attr(0755,root,root) %{_bindir}/ssh-copy-id +%attr(0755,root,root) %{_libexecdir}/openssh/ssh-pkcs11-helper +%attr(0755,root,root) %{_libexecdir}/openssh/ssh-sk-helper +%attr(0644,root,root) %{_userunitdir}/ssh-agent.service +%attr(0644,root,root) %{_userunitdir}/ssh-agent.socket + +%files server +%dir %attr(0711,root,root) %{_var}/empty/sshd +%attr(0755,root,root) %{_sbindir}/sshd +%attr(0755,root,root) %{_libexecdir}/openssh/sftp-server +%attr(0755,root,root) %{_libexecdir}/openssh/sshd-keygen +%attr(0600,root,root) %config(noreplace) %{_sysconfdir}/ssh/sshd_config +%attr(0644,root,root) %config(noreplace) /etc/pam.d/sshd +%attr(0640,root,root) %config(noreplace) /etc/sysconfig/sshd +%attr(0644,root,root) %{_unitdir}/sshd.service +%attr(0644,root,root) %{_unitdir}/sshd@.service +%attr(0644,root,root) %{_unitdir}/sshd.socket +%attr(0644,root,root) %{_unitdir}/sshd-keygen@.service +%attr(0644,root,root) %{_unitdir}/sshd-keygen.target +%attr(0644,root,root) %{_tmpfilesdir}/openssh.conf + +%files keycat +%attr(0755,root,root) %{_libexecdir}/openssh/ssh-keycat +%attr(0644,root,root) %config(noreplace) /etc/pam.d/ssh-keycat + +%files askpass +%attr(0644,root,root) %{_sysconfdir}/profile.d/gnome-ssh-askpass.* +%attr(0755,root,root) %{_libexecdir}/openssh/gnome-ssh-askpass +%attr(0755,root,root) %{_libexecdir}/openssh/ssh-askpass + +%files -n pam_ssh_agent_auth +%license pam_ssh_agent_auth-pam_ssh_agent_auth-0.10.4/OPENSSH_LICENSE +%attr(0755,root,root) %{_libdir}/security/pam_ssh_agent_auth.so + +%files help +%doc ChangeLog OVERVIEW PROTOCOL* README README.privsep README.tun README.dns TODO +%doc HOWTO.ssh-keycat +%attr(0644,root,root) %{_mandir}/man1/scp.1* +%attr(0644,root,root) %{_mandir}/man1/ssh*.1* +%attr(0644,root,root) %{_mandir}/man1/sftp.1* +%attr(0644,root,root) %{_mandir}/man5/ssh*.5* +%attr(0644,root,root) %{_mandir}/man5/moduli.5* +%attr(0644,root,root) %{_mandir}/man8/ssh*.8* +%attr(0644,root,root) %{_mandir}/man8/pam_ssh_agent_auth.8* +%attr(0644,root,root) %{_mandir}/man8/sftp-server.8* + +%changelog +* Mon Oct 02 2023 Funda Wang <fundawang@yeah.net> - 9.3p1-2.1 +- Try building with openssl3 + +* Fri Aug 25 2023 renmingshuai<renmingshuai@huawei.com> - 9.3p1-2 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:use correct ssh-agent.socket name + +* Thu Jul 27 2023 renmingshuai<renmingshuai@huawei.com> - 9.3p1-1 +- Type:requirement +- CVE:NA +- SUG:NA +- DESC:update to 9.3p1 + +* Tue Jun 13 2023 renmingshuai<renmingshuai@huawei.com> - 9.1p1-6 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:fix misspelling + +* Sat May 27 2023 renmingshuai<renmingshuai@huawei.com> - 9.1p1-5 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:fix environment variable + +* Sat Mar 18 2023 renmingshuai<renmingshuai@huawei.com> - 9.1p1-4 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:backport some upstreams patches and delete unused patches + +* Tue Feb 28 2023 renmingshuai<renmingshuai@huawei.com> - 9.1p1-3 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:set default ssh_config + +* Mon Feb 06 2023 renmingshuai<renmingshuai@huawei.com> - 9.1p1-2 +- Type:CVE +- CVE:CVE-2023-25136 +- SUG:NA +- DESC:fix CVE-2023-25136 + +* Mon Jan 30 2023 renmingshuai<renmingshuai@huawei.com> - 9.1p1-1 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:update to openssh-9.1p1 + +* Mon Jan 9 2023 renmingshuai <renmingshuai@huawei.com> - 8.8p1-17 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:fix possible NULL deref when built without FIDO + +* Tue Jan 3 2023 renmingshuai <renmingshuai@huawei.com> - 8.8p1-16 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:fix test failure and always make tests + +* Thu Dec 29 2022 renmingshuai <renmingshuai@huawei.com> - 8.8p1-15 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:avoid integer overflow of auth attempts + +* Thu Dec 29 2022 renmingshuai <renmingshuai@huawei.com> - 8.8p1-14 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:PubkeyAcceptedKeyTypes has been renamed to PubkeyAcceptedAlgorithms in openssh-8.5p1 + +* Thu Dec 29 2022 renmingshuai <renmingshuai@huawei.com> - 8.8p1-13 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:add strict scp check for CVE-2020-15778 + +* Thu Dec 29 2022 renmingshuai <renmingshuai@huawei.com> - 8.8p1-12 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:backport some upstream patches + +* Thu Dec 29 2022 renmingshuai <renmingshuai@huawei.com> - 8.8p1-11 +- Type:requirement +- CVE:NA +- SUG:NA +- DESC:add sw_64 + +* Fri Dec 16 2022 renmingshuai <renmingshuai@huawei.com> - 8.8p1-10 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:Fix ssh-keygen -Y check novalidate requires name + +* Mon Nov 28 2022 zhaozhen <zhaozhen@loongson.cn> - 8.8p1-9 +- Type:feature +- CVE:NA +- SUG:NA +- DESC:Add loongarch64 support + +* Mon Nov 28 2022 renmingshuai<renmingshuai@huawei.com> - 8.8p1-8 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:add better debugging + +* Wed Nov 2 2022 renmingshuai<renmingshuai@huawei.com> - 8.8p1-7 +- Type:requirement +- CVE:NA +- SUG:NA +- DESC:add ssh-keygen bash completion + +* Thu Sep 01 2022 duyiwei<duyiwei@kylinos.cn> - 8.8P1-6 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:enable "include /etc/ssh/sshd_config.d/*.config" again + +* Fri Jul 29 2022 kircher<majun65@huawei.com> - 8.8p1-5 +- Type:bugfix +- CVE:Na +- SUG:NA +- DESC:add SMx support in openssh + +* Thu May 05 2022 seuzw<930zhaowei@163.com> - 8.8p1-4 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:fix incorrect sftp-server binary path in /etc/ssh/sshd_config + +* Wed Mar 09 2022 duyiwei<duyiwei@kylinos.cn> - 8.8P1-3 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:enable "include /etc/ssh/sshd_config.d/*.config" + +* Mon Mar 07 2022 kircher<majun65@huawei.com> - 8.8P1-2 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:add sshd.tmpfiles + +* Thu Oct 28 2021 kircher<kircherlike@outlook.com> - 8.8P1-1 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:update to openssh-8.8p1 + +* Fri Oct 8 2021 renmingshuai<renmingshuai@hauwei.com> - 8.2P1-15 +- Type:cves +- CVE:CVE-2021-41617 +- SUG:NA +- DESC:fix CVE-2021-41617 + +* Sat Sep 18 2021 kircher<kircherlike@outlook.com> - 8.2P1-14 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:backport patch from github to fix NULL ref + +* Fri Jul 30 2021 kircher<majun65@huawei.com> - 8.2P1-13 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:remove debug message from sigchld handler + +* Tue Jul 20 2021 seuzw<930zhaowei@163.com> - 8.2P1-12 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:move closefrom to before first malloc + +* Fri Jul 09 2021 panchenbo<panchenbo@uniontech.com> - 8.2P1-11 +- fix pam_ssh_agent_auth.8.gz conflicts + +* Thu May 20 2021 seuzw<930zhaowei@163.com> - 8.2P1-10 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:add strict-scp-check for check command injection + +* Mon Jan 4 2021 chxssg<chxssg@qq.com> - 8.2P1-9 +- Type:cves +- CVE:CVE-2020-14145 +- SUG:NA +- DESC:fix CVE-2020-14145 + +* Wed Nov 18 2020 gaihuiying<gaihuiying1@huawei.com> - 8.2P1-8 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:adjust pam_ssh_agent_auth release number + +* Tue Nov 17 2020 gaihuiying<gaihuiying1@huawei.com> - 8.2P1-7 +- Type:bugfix +- CVE:NA +- SUG:NA +- DESC:keep pam_ssh_agent_auth change release number with openssh + +* Tue Sep 15 2020 liulong<liulong20@huawei.com> - 8.2P1-6 +- Type:cves +- ID:CVE-2018-15919 +- SUG:NA +- DESC:Fix CVE-2018-15919 + +* Thu Jul 2 2020 zhouyihang<zhouyihang3@huawei.com> - 8.2P1-5 +- Type:cves +- ID:CVE-2020-12062 +- SUG:NA +- DESC:Fix CVE-2020-12062 + +* Tue Jun 9 2020 openEuler Buildteam <buildteam@openeuler.org> - 8.2P1-4 +- Type:bugfix +- ID:NA +- SUG:NA +- DESC:add requires for openssh-server in openssh + +* Wed May 6 2020 openEuler Buildteam <buildteam@openeuler.org> - 8.2P1-3 +- Type:bugfix +- ID:NA +- SUG:NA +- DESC:fix update problem + +* Sat Apr 18 2020 openEuler Buildteam <buildteam@openeuler.org> - 8.2P1-2 +- Type:bugfix +- ID:NA +- SUG:NA +- DESC:fix pre problem + +* Thu Apr 16 2020 openEuler Buildteam <buildteam@openeuler.org> - 8.2P1-1 +- Type:bugfix +- ID:NA +- SUG:NA +- DESC:update to 8.2P1 + +* Mon Mar 30 2020 openEuler Buildteam <buildteam@openeuler.org> - 7.8P1-12 +- Type:bugfix +- ID:NA +- SUG:NA +- DESC:move sshd.service in %post server + +* Wed Mar 18 2020 openEuler Buildteam <buildteam@openeuler.org> - 7.8P1-11 +- Type:bugfix +- ID:NA +- SUG:NA +- DESC:reduction of authority + +* Fri Mar 13 2020 openEuler Buildteam <buildteam@openeuler.org> - 7.8P1-10 +- Type:bugfix +- ID:NA +- SUG:NA +- DESC:separate package + +* Thu Mar 5 2020 openEuler Buildteam <buildteam@openeuler.org> - 7.8P1-9 +- Type:cves +- ID:CVE-2018-15919 +- SUG:NA +- DESC:Fix CVE-2018-15919 + +* Thu Mar 5 2020 openEuler Buildteam <buildteam@openeuler.org> - 7.8P1-8 +- Type:bugfix +- ID:NA +- SUG:NA +- DESC:debug3 to verbose in command line + +* Tue Jan 21 2020 openEuler Buildteam <buildteam@openeuler.org> - 7.8P1-7 +- Type:bugfix +- ID:NA +- SUG:NA +- DESC:add the patch for bugfix + +* Mon Dec 23 2019 openEuler Buildteam <buildteam@openeuler.org> - 7.8P1-6 +- Type:bugfix +- ID:NA +- SUG:NA +- DESC:delete the patch + +* Sat Dec 21 2019 openEuler Buildteam <buildteam@openeuler.org> - 7.8P1-5 +- Type:cves +- ID:NA +- SUG:restart +- DESC:fix cves + +* Fri Sep 20 2019 openEuler Buildteam <buildteam@openeuler.org> - 7.8p1-4 +- Package init |