Displaying 20 results from an estimated 3000 matches similar to: "Announce: OpenSSH 5.2 released"
2009 Feb 23
0
Announce: OpenSSH 5.2 released
OpenSSH 5.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We have also recently completed another Internet SSH usage scan, the
results of which may be found at http://www.openssh.com/usage.html
Once again, we
2009 Feb 18
0
FW: Call for testing: openssh-5.2
Whoops -- sent to wrong address...
Mandriva 2008.1 openssh-SNAP-20090218 passes all tests.
> -----Original Message-----
> From: Scott Neugroschl
> Sent: Tuesday, February 17, 2009 10:06 AM
> To: Damien Miller
> Subject: RE: Call for testing: openssh-5.2
>
> Mandriva 2008.1 -- openssh-SNAP-20090218 passes
>
>
> -----Original Message-----
> From:
2009 Feb 16
9
Call for testing: openssh-5.2
Hi,
OpenSSH 5.2 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is primarily a bug-fix
release, to follow the feature-focused 5.1 release.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable
2015 Jun 15
5
OpenSSH and CBC
Hello,
I saw that OpenSSH release 6.7 removed all CBC ciphers by default. Is
CBC therefore considered as broken and unsecure (in general or SSH
implementation)?
I also read a lot of references (see below) but still not clear to me
what's the actual "security status" of CBC and why it has been removed
in general.
http://www.openssh.com/txt/release-6.7
sshd(8): The default set
2008 Nov 21
0
OpenSSH security advisory: cbc.adv
OpenSSH Security Advisory: cbc.adv
Regarding the "Plaintext Recovery Attack Against SSH" reported as
CPNI-957037[1]:
The OpenSSH team has been made aware of an attack against the SSH
protocol version 2 by researchers at the University of London.
Unfortunately, due to the report lacking any detailed technical
description of the attack and CPNI's unwillingness to share necessary
2008 Nov 21
3
OpenSSH security advisory: cbc.adv
OpenSSH Security Advisory: cbc.adv
Regarding the "Plaintext Recovery Attack Against SSH" reported as
CPNI-957037[1]:
The OpenSSH team has been made aware of an attack against the SSH
protocol version 2 by researchers at the University of London.
Unfortunately, due to the report lacking any detailed technical
description of the attack and CPNI's unwillingness to share necessary
2017 Oct 12
2
X11forwarding yes: how to debug/setup after xauth fix
On 08/10/2017 23:32, Michael Felt wrote:
> On 04/10/2017 11:07, Michael Felt wrote:
>> I do not often use X11 - but when I do I prefer to enable
>> X11forwarding, and when finished - turn it off. This is preferable,
>> imho, to having "clear" X11 processing when local - and otherwise
>> impossible when working remote.
>>
>> Working with
2008 Jul 22
0
Announce: OpenSSH 5.1 released
OpenSSH 5.1 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We have also recently completed another Internet SSH usage scan, the
results of which may be found at http://www.openssh.com/usage.html
Once again, we
2008 Jul 22
0
Announce: OpenSSH 5.1 released
OpenSSH 5.1 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We have also recently completed another Internet SSH usage scan, the
results of which may be found at http://www.openssh.com/usage.html
Once again, we
2009 Jul 07
2
Does anyone know anything about this "0-day" ssh vulnerability?
Hi all. I've looked at the archives and it seems to be quiet regarding
this supposed "0-day" openssh vulnerability and I'm wondering if anyone
here may have some insight or further information regarding it.
We've been monitoring things and the amount of speculative info flying
around is incredible. Some claim it's the CPNI-957037 issue, thus
affecting <5.2, others
2016 Dec 19
2
Announce: OpenSSH 7.4 released
OpenSSH 7.4 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.
Once again, we would like to thank the OpenSSH community
2016 Dec 19
2
Announce: OpenSSH 7.4 released
OpenSSH 7.4 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.
Once again, we would like to thank the OpenSSH community
2002 May 10
1
Patch for SOCKS4A in OpenSsh
I love SSH's ability to dynamically forward ports using SOCKS (either -D or
DynamicForward) (ie "ssh -D 1081 private.mine.net"). But the thing that has
caused me some pain, is that only SOCKS4 is supported. The SOCKS4 proxy
specification does not permit hostnames, but only IP addresses. This isn't
much of a problem if the target host is a public Internet host or otherwise
DNS
2008 Jul 01
1
[PATCH] SOCKS4A support
This provides SOCKS4A support, which allows a SOCKS4 client to provide a
host name instead of an IP address. It indicates that it's doing so by
using a known-invalid IP address 0.0.0.x (where x != 0), and then
appending the NUL-terminated hostname to the connection request.
Although we check for the terminating NUL manually and the
'fatal(len %d > have %d)' should never happen, the
2008 Jul 04
3
[Bug 1482] New: SOCKS4A support
https://bugzilla.mindrot.org/show_bug.cgi?id=1482
Summary: SOCKS4A support
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
2015 Apr 04
1
systemctl (again)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
<snip>
>
> This would be better served as the following to accomplish the
> immediate goal:
>
> cat > /etc/systemd/system/timidity.service <<EOF [Unit]
> Description=timidity daemon
>
> [Service] User=jmr Group=users WorkingDirectory=/home/jmr
> Type=forking ExecStart=/usr/bin/timidity -iAD EOF
>
>
2016 Dec 14
17
Call for testing: OpenSSH 7.4
Hi,
OpenSSH 7.4 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This release contains some
substantial new features and a number of bugfixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is
2010 Sep 13
15
[Bug 1818] New: SSH2_MSG_CHANNEL_FAILURE on closed channel
https://bugzilla.mindrot.org/show_bug.cgi?id=1818
Summary: SSH2_MSG_CHANNEL_FAILURE on closed channel
Product: Portable OpenSSH
Version: 5.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2009 Oct 01
0
Announce: OpenSSH 5.3 released
OpenSSH 5.3 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
This release marks the 10th anniversary of the OpenSSH project.
We would like to thank the OpenSSH community for their support,
especially those who will
2015 Jul 01
0
Announce: OpenSSH 6.9 released
OpenSSH 6.9 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches,