Subject: CVS commit: pkgsrc/security/openssh
To: None <pkgsrc-changes@NetBSD.org>
From: Takahiro Kambe <taca@netbsd.org>
List: pkgsrc-changes
Date: 10/31/2006 03:31:20
Module Name:	pkgsrc
Committed By:	taca
Date:		Tue Oct 31 03:31:20 UTC 2006

Modified Files:
	pkgsrc/security/openssh: Makefile distinfo hacks.mk options.mk
	pkgsrc/security/openssh/patches: patch-aa patch-ab patch-ac patch-ad
	    patch-ae patch-af patch-ag patch-ah patch-ai patch-aj patch-ak
	    patch-al patch-am patch-an patch-ao patch-ap patch-aq patch-ar
	    patch-as patch-au patch-av patch-aw
Removed Files:
	pkgsrc/security/openssh/patches: patch-at patch-ax patch-ay patch-az

Log Message:
Update openssh package to 4.4.1 (openssh-4.4p1).

- A few pkglint warning clean up.
- Major changes are here.  For complete changes,
  see http://www.openssh.com/txt/release-4.4.

Changes since OpenSSH 4.3:
============================

Security bugs resolved in this release:

 * Fix a pre-authentication denial of service found by Tavis Ormandy,
   that would cause sshd(8) to spin until the login grace time
   expired.

 * Fix an unsafe signal hander reported by Mark Dowd. The signal
   handler was vulnerable to a race condition that could be exploited
   to perform a pre-authentication denial of service. On portable
   OpenSSH, this vulnerability could theoretically lead to
   pre-authentication remote code execution if GSSAPI authentication
   is enabled, but the likelihood of successful exploitation appears
   remote.

 * On portable OpenSSH, fix a GSSAPI authentication abort that could
   be used to determine the validity of usernames on some platforms.

This release includes the following new functionality and fixes:

 * Implemented conditional configuration in sshd_config(5) using the
   "Match" directive. This allows some configuration options to be
   selectively overridden if specific criteria (based on user, group,
   hostname and/or address) are met. So far a useful subset of post-
   authentication options are supported and more are expected to be
   added in future releases.

 * Add support for Diffie-Hellman group exchange key agreement with a
   final hash of SHA256.

 * Added a "ForceCommand" directive to sshd_config(5). Similar to the
   command="..." option accepted in ~/.ssh/authorized_keys, this forces
   the execution of the specified command regardless of what the user
   requested. This is very useful in conjunction with the new "Match"
   option.

 * Add a "PermitOpen" directive to sshd_config(5). This mirrors the
   permitopen="..." authorized_keys option, allowing fine-grained
   control over the port-forwardings that a user is allowed to
   establish.

 * Add optional logging of transactions to sftp-server(8).

 * ssh(1) will now record port numbers for hosts stored in
   ~/.ssh/authorized_keys when a non-standard port has been requested.

 * Add an "ExitOnForwardFailure" option to cause ssh(1) to exit (with
   a non-zero exit code) when requested port forwardings could not be
   established.

 * Extend sshd_config(5) "SubSystem" declarations to allow the
   specification of command-line arguments.

 * Replacement of all integer overflow susceptible invocations of
   malloc(3) and realloc(3) with overflow-checking equivalents.

 * Many manpage fixes and improvements

 * New portable OpenSSH-specific features:

   - Add optional support for SELinux, controlled using the
     --with-selinux configure option (experimental)

   - Add optional support for Solaris process contracts, enabled
     using the --with-solaris-contracts configure option (experimental)
     This option will also include SMF metadata in Solaris packages
     built using the "make package" target

   - Add optional support for OpenSSL hardware accelerators (engines),
     enabled using the --with-ssl-engine configure option.


To generate a diff of this commit:
cvs rdiff -r1.171 -r1.172 pkgsrc/security/openssh/Makefile
cvs rdiff -r1.54 -r1.55 pkgsrc/security/openssh/distinfo
cvs rdiff -r1.1 -r1.2 pkgsrc/security/openssh/hacks.mk
cvs rdiff -r1.8 -r1.9 pkgsrc/security/openssh/options.mk
cvs rdiff -r1.41 -r1.42 pkgsrc/security/openssh/patches/patch-aa
cvs rdiff -r1.23 -r1.24 pkgsrc/security/openssh/patches/patch-ab \
    pkgsrc/security/openssh/patches/patch-ah
cvs rdiff -r1.15 -r1.16 pkgsrc/security/openssh/patches/patch-ac
cvs rdiff -r1.11 -r1.12 pkgsrc/security/openssh/patches/patch-ad \
    pkgsrc/security/openssh/patches/patch-ae
cvs rdiff -r1.9 -r1.10 pkgsrc/security/openssh/patches/patch-af \
    pkgsrc/security/openssh/patches/patch-ai
cvs rdiff -r1.8 -r1.9 pkgsrc/security/openssh/patches/patch-ag \
    pkgsrc/security/openssh/patches/patch-ao
cvs rdiff -r1.6 -r1.7 pkgsrc/security/openssh/patches/patch-aj \
    pkgsrc/security/openssh/patches/patch-al \
    pkgsrc/security/openssh/patches/patch-am \
    pkgsrc/security/openssh/patches/patch-ar
cvs rdiff -r1.7 -r1.8 pkgsrc/security/openssh/patches/patch-ak \
    pkgsrc/security/openssh/patches/patch-an \
    pkgsrc/security/openssh/patches/patch-ap
cvs rdiff -r1.5 -r1.6 pkgsrc/security/openssh/patches/patch-aq
cvs rdiff -r1.4 -r1.5 pkgsrc/security/openssh/patches/patch-as \
    pkgsrc/security/openssh/patches/patch-av
cvs rdiff -r1.3 -r0 pkgsrc/security/openssh/patches/patch-at
cvs rdiff -r1.2 -r1.3 pkgsrc/security/openssh/patches/patch-au
cvs rdiff -r1.1 -r1.2 pkgsrc/security/openssh/patches/patch-aw
cvs rdiff -r1.1 -r0 pkgsrc/security/openssh/patches/patch-ax \
    pkgsrc/security/openssh/patches/patch-ay \
    pkgsrc/security/openssh/patches/patch-az

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.