1. XenForo 1.5.14 中文版——支持中文搜索!现已发布!查看详情
  2. Xenforo 爱好者讨论群:215909318 XenForo专区

新闻 OpenSSH 7.0 发布,修复验证漏洞 下载

Discussion in '软件资讯' started by 漂亮的石头, 2015-08-12.

  1. 漂亮的石头

    漂亮的石头 版主 Staff Member

    Joined:
    2012-02-10
    Messages:
    487,355
    Likes Received:
    47
    OpenSSH 7.0 发布,主要修复验证漏洞和其它一些安全方面的 bug,更新内容如下:


    --------

    * sshd(8): OpenSSH 6.8 and 6.9 incorrectly set TTYs to be world-
    writable. Local attackers may be able to write arbitrary messages
    to logged-in users, including terminal escape sequences.
    Reported by Nikolay Edigaryev.

    * sshd(8): Portable OpenSSH only: Fixed a privilege separation
    weakness related to PAM support. Attackers who could successfully
    compromise the pre-authentication process for remote code
    execution and who had valid credentials on the host could
    impersonate other users. Reported by Moritz Jodeit.

    * sshd(8): Portable OpenSSH only: Fixed a use-after-free bug
    related to PAM support that was reachable by attackers who could
    compromise the pre-authentication process for remote code
    execution. Also reported by Moritz Jodeit.

    * sshd(8): fix circumvention of MaxAuthTries using keyboard-
    interactive authentication. By specifying a long, repeating
    keyboard-interactive "devices" string, an attacker could request
    the same authentication method be tried thousands of times in
    a single pass. The LoginGraceTime timeout in sshd(8) and any
    authentication failure delays implemented by the authentication
    mechanism itself were still applied. Found by Kingcope.


    --------------------------------

    * Support for the legacy SSH version 1 protocol is disabled by
    default at compile time.

    * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange
    is disabled by default at run-time. It may be re-enabled using
    the instructions at http://www.openssh.com/legacy.html

    * Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled
    by default at run-time. These may be re-enabled using the
    instructions at http://www.openssh.com/legacy.html

    * Support for the legacy v00 cert format has been removed.

    * The default for the sshd_config(5) PermitRootLogin option has
    changed from "yes" to "prohibit-password".

    * PermitRootLogin=without-password/prohibit-password now bans all
    interactive authentication methods, allowing only public-key,
    hostbased and GSSAPI authentication (previously it permitted
    keyboard-interactive and password-less authentication if those
    were enabled).


    ------------

    * ssh_config(5): add PubkeyAcceptedKeyTypes option to control which
    public key types are available for user authentication.

    * sshd_config(5): add HostKeyAlgorithms option to control which
    public key types are offered for host authentications.

    * ssh(1), sshd(8): extend Ciphers, MACs, KexAlgorithms,
    HostKeyAlgorithms, PubkeyAcceptedKeyTypes and HostbasedKeyTypes
    options to allow appending to the default set of algorithms
    instead of replacing it. Options may now be prefixed with a '+'
    to append to the default, e.g. "HostKeyAlgorithms=+ssh-dss".

    * sshd_config(5): PermitRootLogin now accepts an argument of
    'prohibit-password' as a less-ambiguous synonym of 'without-
    password'.


    --------

    * ssh(1), sshd(8): add compatability workarounds for Cisco and more
    PuTTY versions. bz#2424

    * Fix some omissions and errors in the PROTOCOL and PROTOCOL.mux
    documentation relating to Unix domain socket forwarding;
    bz#2421 bz#2422

    * ssh(1): Improve the ssh(1) manual page to include a better
    description of Unix domain socket forwarding; bz#2423

    * ssh(1), ssh-agent(1): skip uninitialised PKCS#11 slots, fixing
    failures to load keys when they are present. bz#2427

    * ssh(1), ssh-agent(1): do not ignore PKCS#11 hosted keys that wth
    empty CKA_ID; bz#2429

    * sshd(8): clarify documentation for UseDNS option; bz#2045

    更多内容请查看:发行说明

    OpenSSHOpen Secure Shell)是使用SSH透过计算机网络加密通讯的实现。它是取代由SSH Communications Security所提供的商用版本的开放源代码方案。目前OpenSSH是OpenBSD的子计划。

    OpenSSH常常被误认以为与OpenSSL有关联,但实际上这两个计划的有不同的目的,不同的发展团队,名称相近只是因为两者有同样的软件发展目标──提供开放源代码的加密通讯软件。
    OpenSSH 7.0 发布,修复验证漏洞下载地址
     
Loading...