pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/security/ssh-audit
Module Name: pkgsrc
Committed By: he
Date: Tue Jan 7 16:36:43 UTC 2025
Modified Files:
pkgsrc/security/ssh-audit: Makefile PLIST distinfo
Removed Files:
pkgsrc/security/ssh-audit/patches:
patch-01-upstream-44393c-more-cbc.patch
Log Message:
security/ssh-audit: Update to version 3.3.0.
Pkgsrc changes:
* Remove upstream patch which is now integrated
* Checksum updates
Upstream changes:
### v3.3.0 (2024-10-15)
- Added Python 3.13 support.
- Added built-in policies for Ubuntu 24.04 LTS server & client,
OpenSSH 9.8, and OpenSSH 9.9.
- Added IPv6 support for DHEat and connection rate tests.
- Added TCP port information to JSON policy scan results; credit
[Fabian Malte Kopp](https://github.com/dreizehnutters).
- Added LANcom LCOS server recognition and Ed448 key extraction;
credit [Daniel Lenski](https://github.com/dlenskiSB).
- Now reports ECDSA and DSS fingerprints when in verbose mode;
partial credit [Daniel Lenski](https://github.com/dlenskiSB).
- Removed CVE information based on server/client version numbers,
as this was wildly inaccurate (see [this thread]
(https://github.com/jtesta/ssh-audit/issues/240) for the full
discussion, as well as the results of the community vote on this
matter).
- Fixed crash when running with `-P` and `-T` options simultaneously.
- Fixed host key tests from only reporting a key type at most once
despite multiple hosts supporting it; credit [Daniel
Lenski](https://github.com/dlenskiSB).
- Fixed DHEat connection rate testing on MacOS X and BSD platforms;
credit [Drew Noel](https://github.com/drewmnoel) and [Michael
Osipov](https://github.com/michael-o).
- Fixed invalid JSON output when a socket error occurs while
performing a client audit.
- Fixed `--conn-rate-test` feature on Windows.
- When scanning multiple targets (using `-T`/`--targets`), the
`-p`/`--port` option will now be used as the default port (set to
22 if `-p`/`--port` is not given). Hosts specified in the file
can override this default with an explicit port number (i.e.:
"host1:1234"). For example, when using `-T targets.txt -p 222`,
all hosts in `targets.txt` that do not explicitly include a port
number will default to 222; when using `-T targets.txt` (without
`-p`), all hosts will use a default of 22.
- Updated built-in server & client policies for Amazon Linux 2023,
Debian 12, Rocky Linux 9, and Ubuntu 22.04 to improve host key
efficiency and cipher resistance to quantum attacks.
- Added 1 new cipher: `grasshopper-ctr128`.
- Added 2 new key exchanges: `mlkem768x25519-sha256`, `sntrup761x25519-sha512`.
### v3.2.0 (2024-04-22)
- Added implementation of the DHEat denial-of-service attack (see
`--dheat` option; [CVE-2002-20001]
(https://nvd.nist.gov/vuln/detail/CVE-2002-20001)).
- Expanded filter of CBC ciphers to flag for the Terrapin
vulnerability. It now includes more rarely found ciphers.
- Fixed parsing of `ecdsa-sha2-nistp*` CA signatures on host keys.
Additionally, they are now flagged as potentially back-doored,
just as standard host keys are.
- Gracefully handle rare exceptions (i.e.: crashes) while performing
GEX tests.
- The built-in man page (`-m`, `--manual`) is now available on
Docker, PyPI, and Snap builds, in addition to the Windows build.
- Snap builds are now architecture-independent.
- Changed Docker base image from `python:3-slim` to `python:3-alpine`,
resulting in a 59% reduction in image size; credit [Daniel
Thamdrup](https://github.com/dallemon).
- Added built-in policies for Amazon Linux 2023, Debian 12, OpenSSH
9.7, and Rocky Linux 9.
- Built-in policies now include a change log (use `-L -v` to view them).
- Custom policies now support the `allow_algorithm_subset_and_reordering`
directive to allow targets to pass with a subset and/or re-ordered
list of host keys, kex, ciphers, and MACs. This allows for the
creation of a baseline policy where targets can optionally implement
stricter controls; partial credit [yannik1015]
(https://github.com/yannik1015).
- Custom policies now support the `allow_larger_keys` directive
to allow targets to pass with larger host keys, CA keys, and
Diffie-Hellman keys. This allows for the creation of a baseline
policy where targets can optionally implement stricter controls;
partial credit [Damian Szuberski](https://github.com/szubersk).
- Color output is disabled if the `NO_COLOR` environment variable
is set (see https://no-color.org/).
- Added 1 new key exchange algorithm: `gss-nistp384-sha384-*`.
- Added 1 new cipher: `aes128-ocb%libassh.org@localhost`.
To generate a diff of this commit:
cvs rdiff -u -r1.6 -r1.7 pkgsrc/security/ssh-audit/Makefile
cvs rdiff -u -r1.2 -r1.3 pkgsrc/security/ssh-audit/PLIST
cvs rdiff -u -r1.5 -r1.6 pkgsrc/security/ssh-audit/distinfo
cvs rdiff -u -r1.2 -r0 \
pkgsrc/security/ssh-audit/patches/patch-01-upstream-44393c-more-cbc.patch
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/security/ssh-audit/Makefile
diff -u pkgsrc/security/ssh-audit/Makefile:1.6 pkgsrc/security/ssh-audit/Makefile:1.7
--- pkgsrc/security/ssh-audit/Makefile:1.6 Tue Dec 26 17:30:56 2023
+++ pkgsrc/security/ssh-audit/Makefile Tue Jan 7 16:36:43 2025
@@ -1,8 +1,6 @@
-# $NetBSD: Makefile,v 1.6 2023/12/26 17:30:56 thor Exp $
+# $NetBSD: Makefile,v 1.7 2025/01/07 16:36:43 he Exp $
-DISTNAME= ssh-audit-3.1.0
-# revision 1 because of added patch from upstream
-PKGREVISION= 1
+DISTNAME= ssh-audit-3.3.0
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_GITHUB:=jtesta/}
GITHUB_RELEASE= v${PKGVERSION_NOREV}
Index: pkgsrc/security/ssh-audit/PLIST
diff -u pkgsrc/security/ssh-audit/PLIST:1.2 pkgsrc/security/ssh-audit/PLIST:1.3
--- pkgsrc/security/ssh-audit/PLIST:1.2 Tue Nov 15 15:08:22 2022
+++ pkgsrc/security/ssh-audit/PLIST Tue Jan 7 16:36:43 2025
@@ -1,4 +1,4 @@
-@comment $NetBSD: PLIST,v 1.2 2022/11/15 15:08:22 fcambus Exp $
+@comment $NetBSD: PLIST,v 1.3 2025/01/07 16:36:43 he Exp $
bin/ssh-audit
${PYSITELIB}/${EGG_INFODIR}/PKG-INFO
${PYSITELIB}/${EGG_INFODIR}/SOURCES.txt
@@ -23,6 +23,12 @@ ${PYSITELIB}/ssh_audit/auditconf.pyo
${PYSITELIB}/ssh_audit/banner.py
${PYSITELIB}/ssh_audit/banner.pyc
${PYSITELIB}/ssh_audit/banner.pyo
+${PYSITELIB}/ssh_audit/builtin_policies.py
+${PYSITELIB}/ssh_audit/builtin_policies.pyc
+${PYSITELIB}/ssh_audit/builtin_policies.pyo
+${PYSITELIB}/ssh_audit/dheat.py
+${PYSITELIB}/ssh_audit/dheat.pyc
+${PYSITELIB}/ssh_audit/dheat.pyo
${PYSITELIB}/ssh_audit/exitcodes.py
${PYSITELIB}/ssh_audit/exitcodes.pyc
${PYSITELIB}/ssh_audit/exitcodes.pyo
@@ -92,9 +98,6 @@ ${PYSITELIB}/ssh_audit/timeframe.pyo
${PYSITELIB}/ssh_audit/utils.py
${PYSITELIB}/ssh_audit/utils.pyc
${PYSITELIB}/ssh_audit/utils.pyo
-${PYSITELIB}/ssh_audit/versionvulnerabilitydb.py
-${PYSITELIB}/ssh_audit/versionvulnerabilitydb.pyc
-${PYSITELIB}/ssh_audit/versionvulnerabilitydb.pyo
${PYSITELIB}/ssh_audit/writebuf.py
${PYSITELIB}/ssh_audit/writebuf.pyc
${PYSITELIB}/ssh_audit/writebuf.pyo
Index: pkgsrc/security/ssh-audit/distinfo
diff -u pkgsrc/security/ssh-audit/distinfo:1.5 pkgsrc/security/ssh-audit/distinfo:1.6
--- pkgsrc/security/ssh-audit/distinfo:1.5 Tue Dec 26 17:54:02 2023
+++ pkgsrc/security/ssh-audit/distinfo Tue Jan 7 16:36:43 2025
@@ -1,6 +1,5 @@
-$NetBSD: distinfo,v 1.5 2023/12/26 17:54:02 wiz Exp $
+$NetBSD: distinfo,v 1.6 2025/01/07 16:36:43 he Exp $
-BLAKE2s (ssh-audit-3.1.0.tar.gz) = 65a44a1573eb309986bf7c59425b587b060141b4fdd28594cd62fc8ee3ecdc2e
-SHA512 (ssh-audit-3.1.0.tar.gz) = ea42aa93272cb1881d8c5882b2f68655606fe73f64a708bc0f9f743f14137aab1026eabf10a813f3919de179117c1a9b4c8325d511e25afd60caee273cb32deb
-Size (ssh-audit-3.1.0.tar.gz) = 154296 bytes
-SHA1 (patch-01-upstream-44393c-more-cbc.patch) = e30f79188445ef3c96b781962b3a96117503689a
+BLAKE2s (ssh-audit-3.3.0.tar.gz) = 3b929cbb1d569c72fed9c347d1c5e8a802cf8768f77261b88dfd0867f9c04c52
+SHA512 (ssh-audit-3.3.0.tar.gz) = 5be8c2e65ca76f34b425392ee54dc62be7a7bfe00fd567123000278a3c4fcd5fe7f4cab8f1edab5ffb08cb9827303ec1e6605b4d0b0a8b35c210f69a57fc595d
+Size (ssh-audit-3.3.0.tar.gz) = 172808 bytes
Home |
Main Index |
Thread Index |
Old Index