Name: | openssh |
---|---|
Version: | 6.4p1 |
Release: | 8.el7 |
Architecture: | x86_64 |
Group: | Applications/Internet |
Size: | 1096441 |
License: | BSD |
RPM: | openssh-6.4p1-8.el7.x86_64.rpm |
Source RPM: | openssh-6.4p1-8.el7.src.rpm |
Build Date: | Thu May 08 2014 |
Build Host: | ca-buildj3.us.oracle.com |
Vendor: | Oracle America |
URL: | http://www.openssh.com/portable.html |
Summary: | An open source implementation of SSH protocol versions 1 and 2 |
Description: | SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features. This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both. |
- ignore environment variables with embedded '=' or '\0' characters (#1077843)
- log fipscheck verification message into syslog authpriv - ssh-keygen - relative-specified certificate expiry time should be relative to current time and not the validity start time (#1058234) - use the size of security of 3des for DH (#1053107) - ssh-copy-id.1 man page fix (#1058792)
- Mass rebuild 2014-01-24
- use tty allocation for a remote scp (#985650) - run ssh-copy-id in the legacy mode when SSH_COPY_ID_LEGACY variable is set (#969375) - FIPS mode - adjust the key echange DH groups and ssh-keygen according toSP800-131A (#1001748)
- Mass rebuild 2013-12-27
- sshd-keygen - use correct permissions on ecdsa host key (#1023945) - use only rsa and ecdsa host keys by default
- fix fatal() cleanup in the audit patch (#1029074) - fix parsing logic of ldap.conf file (#1033662)
- new upstream release
- adjust gss kex mechanism to the upstream changes (#1024004) - don't use xfree in pam_ssh_agent_auth sources <geertj@gmail.com> (#1024965)
- don't use SSH_FP_MD5 for fingerprints in FIPS mode (#1020948)