Commit Graph

  • b2417553a2 openssh-8.2p1-2 + 0.10.3-9 Jakub Jelen 2020-02-20 10:34:01 +0100
  • 82f9421fb4 Build properly with integrated u2f support (#1803948) Jakub Jelen 2020-02-18 13:06:10 +0100
  • 51f5c1c99f openssh-8.2p1-1 + 0.10.3-9 Jakub Jelen 2020-02-17 11:57:13 +0100
  • ee9cb005b3 Do not write information about FIPS mode to stderr (#1778224) Jakub Jelen 2020-02-17 14:30:49 +0100
  • 2b86acd332 Correctly report invalid key permissions (#1801459) Jakub Jelen 2020-02-17 11:57:35 +0100
  • a2cffc6e9b openssh-8.1p1-4 + 0.10.3-8 Jakub Jelen 2020-02-03 00:51:53 +0100
  • 7f46693182 Unbreak seccomp filter on ARM (#1796267) Jakub Jelen 2020-02-03 00:50:34 +0100
  • 657d132847 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild Fedora Release Engineering 2020-01-29 20:24:49 +0000
  • 62361a761c openssh-8.1p1-3 + 0.10.3-8 Jakub Jelen 2019-11-27 11:16:26 +0100
  • c28decf412 Unbreak the seccomp filter also on ARM (#1777054) Jakub Jelen 2019-11-27 11:15:00 +0100
  • 7254607b91 Do not extensively modify sshd_config -- DSA keys are not loaded for some time already Jakub Jelen 2019-11-19 13:16:28 +0100
  • d26b44fe7f openssh-8.1p1-2 + 0.10.3-8 Jakub Jelen 2019-11-14 09:24:36 +0100
  • 6a2fce44b5 Unbreak seccomp filter with latest glibc (#1771946) Jakub Jelen 2019-11-14 09:18:41 +0100
  • 36fef5669a openssh-8.1p1-1 + 0.10.3-8 Jakub Jelen 2019-10-09 10:24:21 +0200
  • 5eb2d51328 Add missing hostkey certificate algorithms to the FIPS list Jakub Jelen 2019-07-23 15:35:09 +0200
  • d19ba936f2 Do not attempt to generate DSA and ED25519 keys in FIPS mode Jakub Jelen 2019-07-23 15:00:45 +0200
  • 0ca1614ae2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild Fedora Release Engineering 2019-07-25 23:35:32 +0000
  • 73b069e926 openssh-8.0p1-8 + 0.10.3-7 Jakub Jelen 2019-07-23 09:50:20 +0200
  • 5d6a14bd4a Use the upstream version of the PKCS#8 PEM support (#1722285) Jakub Jelen 2019-07-23 09:49:22 +0200
  • 30922f629c openssh-8.0p1-7 + 0.10.3-7 Jakub Jelen 2019-07-12 23:22:51 +0200
  • 358f62be8a As agreed with anaconda team, they will provide a environment file under /etc/sysconfig (#1722928) Jakub Jelen 2019-07-12 23:20:56 +0200
  • e9bd9a2128 openssh-8.0p1-6 + 0.10.3-7 Jakub Jelen 2019-07-03 16:52:53 +0200
  • 0b10752bbc Accept environment variable PERMITROOTLOGIN from anaconda drop-in service file (#1722928) Jakub Jelen 2019-07-03 14:54:38 +0200
  • 36a44721c5 openssh-8.0p1-5 + 0.10.3-7 Jakub Jelen 2019-06-26 14:01:20 +0200
  • e9a555ffbf Whitelist some annonying errors from rpmlint Jakub Jelen 2019-06-26 13:58:55 +0200
  • 58ee5c17a8 Drop INSTALL file from docs as recommended by rpmlint checks Jakub Jelen 2019-06-26 13:34:22 +0200
  • eda4c070da Drop unused unversioned Obsoletes and Provides, which are 5 or 10 years old now Jakub Jelen 2019-06-26 13:30:54 +0200
  • 4bd6cfb874 Disable root password logins (#1722928) Jakub Jelen 2019-06-26 11:12:54 +0200
  • fdbd5bc6f9 Fix typos in manual pages related to crypto-policies Jakub Jelen 2019-06-19 15:56:25 +0200
  • 3153574729 tests: Make sure the user gets removed and the test pass Jakub Jelen 2019-06-17 13:31:57 +0200
  • dad744a32b openssh-8.0p1-4 + 0.10.3-7 Jakub Jelen 2019-06-17 12:49:59 +0200
  • 56494b92a4 pkcs11: Allow to specify pin-value also for ssh-add Jakub Jelen 2019-06-17 12:42:15 +0200
  • 50e2b60d3f Provide correct signature type for SHA2 certificates in agent Jakub Jelen 2019-06-17 12:40:12 +0200
  • 56fdfa2a52 Use the new OpenSSL API to export PEM files to avoid dependency on MD5 Jakub Jelen 2019-05-30 11:29:43 +0200
  • f15fbdc5fe Whitelist another syscall variant for s390x cryptographic module (ibmca engine) Jakub Jelen 2019-05-30 11:28:11 +0200
  • 66e9887b15 Coverity warnings Jakub Jelen 2019-05-30 11:27:04 +0200
  • 7f1ad371a4 openssh-8.0p1-3 + 0.10.3-7 Jakub Jelen 2019-05-27 10:23:08 +0200
  • 7a14283cba Drop the problematic patch for updating pw structure after authentication Jakub Jelen 2019-05-23 15:34:17 +0200
  • ae802a53d8 pkcs11: Do not require the labels on the public objects (#1710832) Jakub Jelen 2019-05-16 15:14:52 +0200
  • 53c9085316 openssh-8.0p1-2 + 0.10.3-7 Jakub Jelen 2019-05-14 13:45:08 +0200
  • f726e51d86 Use OpenSSL KDF Jakub Jelen 2019-05-14 13:35:14 +0200
  • 751cd9acc7 Use OpenSSL high-level API to produce and verify signatures Jakub Jelen 2019-05-14 13:32:04 +0200
  • 6caa973459 Mention crypto-policies in the manual pages instead of the hardcoded defaults Jakub Jelen 2019-05-13 14:22:21 +0200
  • 4feb6a973f Verify SCP vulnerabilities are fixed in the package testsuite Jakub Jelen 2019-05-10 14:34:35 +0200
  • b33caef080 Drop unused patch Jakub Jelen 2019-05-07 13:45:34 +0200
  • f660e11adc FIPS: Do not fail if FIPS-unsupported algorithm is provided in configuration or on command line Jakub Jelen 2019-05-07 11:42:15 +0200
  • ec02bb9685 tests: Make sure the user gets removed after the test Jakub Jelen 2019-04-29 15:16:44 +0200
  • def1debf2e openssh-8.0p1-1 + 0.10.3-7 Jakub Jelen 2019-04-26 17:42:30 +0200
  • f51d092120 Remove unused parts of spec file Jakub Jelen 2019-03-27 13:20:32 +0100
  • cb35953bec The FIPS_mode() is in different header file Jakub Jelen 2019-03-21 17:02:28 +0100
  • 91aa3d4921 openssh-7.9p1-5 + 0.10.3.6 Jakub Jelen 2019-03-11 13:41:09 +0100
  • 81a703d751 Do not allow negotiation of unknown primes with DG GEX in FIPS mode Jakub Jelen 2019-03-11 17:17:13 +0100
  • c53a1d4e90 Ignore PKCS#11 label if no key is found with it (#1671262) Jakub Jelen 2019-03-11 16:08:21 +0100
  • c694548168 Do not segfault when multiple pkcs11 providers is specified Jakub Jelen 2019-03-11 16:05:49 +0100
  • 3339efd12d Do not fallback to sshd_net_t SELinux context Jakub Jelen 2019-03-11 13:35:55 +0100
  • 586cf149b5 Reformat SELinux patch Jakub Jelen 2019-03-11 13:35:20 +0100
  • 1341391c78 Update cached passwd structure after PAM authentication Jakub Jelen 2019-03-04 16:33:28 +0100
  • 3722267e80 Make sure the kerberos cleanup procedures are properly invoked Jakub Jelen 2019-03-04 16:23:36 +0100
  • ae07017120 Use correct function name in the debug log Jakub Jelen 2019-03-01 11:33:25 +0100
  • 7295e97cd1 openssh-7.9p1-4 + 0.10.3.6 Jakub Jelen 2019-01-31 14:07:33 +0100
  • d711f557f7 Log when a client requests an interactive session and only sftp is allowed Jakub Jelen 2019-01-31 14:04:29 +0100
  • e8524ac3f4 ssh-copy-id: Minor issues found by shellcheck Jakub Jelen 2019-01-23 20:51:26 +0100
  • 8622e384ef ssh-copy-id: Do not fail in case remote system is out of space Jakub Jelen 2019-01-23 20:47:44 +0100
  • ffb1787c07 Enclose redhat specific configuration with Match final block Jakub Jelen 2019-01-23 15:35:07 +0100
  • 4e5f61c2a0 - Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild Fedora Release Engineering 2019-02-01 17:32:05 +0000
  • 7c726e0a13 Remove obsolete Group tag Igor Gnatenko 2019-01-28 20:17:59 +0100
  • 018ac8d1d9
    Rebuilt for libcrypt.so.2 (#1666033) Björn Esser 2019-01-14 19:11:16 +0100
  • 311908c042 openssh-7.9p1-3 + 0.10.3-6 Jakub Jelen 2019-01-14 11:09:48 +0100
  • 1b0cc8ff3b Correctly initialize ECDSA key structures from PKCS#11 Jakub Jelen 2019-01-14 13:27:08 +0100
  • ba99e00fe8 tests: Do not expect /var/log/secure to be there Jakub Jelen 2019-01-14 11:44:01 +0100
  • 40d2a04909 CVE-2018-20685 (#1665786) Jakub Jelen 2019-01-14 10:48:59 +0100
  • 322896958a Backport several fixes from 7_9 branch (#1665611) Jakub Jelen 2019-01-14 10:48:04 +0100
  • 661c7c0582 gsskex: Dump correct option Jakub Jelen 2018-11-26 12:50:16 +0100
  • d6cc5f4740 Backport Match final so the crypto-policies do not break canonicalization (#1630166) Jakub Jelen 2018-11-26 10:16:04 +0100
  • a4c0a26cd4 openssh-7.9p1-2 + 0.10.3-6 Jakub Jelen 2018-11-14 09:57:17 +0100
  • 57e280d1f4 Allow to disable RSA signatures with SHA-1 Jakub Jelen 2018-11-14 09:54:54 +0100
  • 3ae9c1b0c1 Dump missing GSS options from client configuration Jakub Jelen 2018-11-14 09:44:48 +0100
  • 03264b16f7 Reference the correct file in configuration file (#1643274) Jakub Jelen 2018-10-26 14:02:32 +0200
  • 0b6cc18df0 Avoid segfault on kerberos authentication failure Jakub Jelen 2018-10-25 19:02:14 +0200
  • be6a344dcd Fix LDAP configure test (#1642414) Mattias Ellert 2018-10-24 13:30:27 +0200
  • 9f2c8b948c openssh-7.9p1-1 + 0.10.3-6 Jakub Jelen 2018-10-19 11:46:02 +0200
  • e8876f1b1f Honor GSSAPIServerIdentity for GSSAPI Key Exchange (#1637167) Jakub Jelen 2018-10-17 13:04:00 +0200
  • 6666c19414 Do not break gssapi-kex authentication method Jakub Jelen 2018-10-16 20:07:43 +0200
  • eaa7af2e41 rebase patches to openssh-7.9p1 Jakub Jelen 2018-10-12 15:54:56 +0200
  • 8089081fa9 Improve the naming of the new kerberos configuration option Jakub Jelen 2018-10-12 13:34:58 +0200
  • 6c9d993869 Follow the system-wide PATH settings Jakub Jelen 2018-10-03 11:00:09 +0200
  • f3715e62da auth-krb5: Avoid memory leaks and unread assignments Jakub Jelen 2018-09-25 16:34:19 +0200
  • 97ee52c0a3 openssh-7.8p1-3 + 0.10.3-5 Jakub Jelen 2018-09-24 15:25:53 +0200
  • 8ebb9915a3 Cleanup specfile comments Jakub Jelen 2018-09-24 15:25:40 +0200
  • 84d3ff9306 Do not let OpenSSH control our hardening flags Jakub Jelen 2018-09-21 17:22:35 +0200
  • e815fba204 Ignore unknown parts of PKCS#11 URI Jakub Jelen 2018-09-21 15:50:04 +0200
  • 55520c5691 Fix sandbox for conditional gssapi authentication (#1580017) Jakub Jelen 2018-09-21 09:50:42 +0200
  • 178f3a4f56 Fix the cavs test and avoid it crashing (#1628962) Jakub Jelen 2018-09-14 16:53:22 +0200
  • 8b9448c5ba openssh-7.8p1-2 + 0.10.3-5 Jakub Jelen 2018-08-29 18:37:23 +0200
  • dba154f20c Unbreak gssapi rekeying (#1624344) Jakub Jelen 2018-08-31 13:26:27 +0200
  • 90edc0cc1d Properly allocate buffer for gsskex (#1624323) Jakub Jelen 2018-08-31 11:01:22 +0200
  • 9409715f65 Unbreak scp between two IPv6 hosts (#1620333) Jakub Jelen 2018-08-29 16:47:38 +0200
  • c60b555ac2 Address issues reported by coverity Jakub Jelen 2018-08-29 12:56:24 +0200
  • 4c36c2a9ee Drop unused environment variable Jakub Jelen 2018-08-29 12:55:36 +0200
  • afaf23f6c3 Drop unused patch Jakub Jelen 2018-08-28 10:51:37 +0200