An open source implementation of SSH protocol versions 1 and 2
Go to file
Jakub Jelen 14c675f3a5 Use global hardening specification instead of hardening made by openssh.
Openssh uses by default -fPIE flag, which didn't allow to build
pam_ssh_agent_auth.so with from libssh.a.
Validated using /CoreOS/openssh/Regression/bz642927-add-relro-flag
2015-02-18 10:34:40 +01:00
.gitignore 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
openssh-4.3p2-askpass-grab-info.patch - improve selinux patch (by Jan Kiszka) 2006-07-17 14:09:15 +00:00
openssh-5.1p1-askpass-progress.patch - rediff for no fuzz 2008-07-23 17:33:16 +00:00
openssh-5.1p1-scp-manpage.patch - rediff for no fuzz 2008-07-23 17:33:16 +00:00
openssh-5.5p1-x11.patch bring back openssh-5.5p1-x11.patch 2014-07-03 16:42:56 +02:00
openssh-5.8p1-getaddrinfo.patch Look for x11 forward sockets with AI_ADDRCONFIG flag getaddrinfo (#735889) 2012-02-14 18:11:26 +01:00
openssh-5.8p1-glob.patch CVE-2010-4755 2011-03-07 20:31:52 +01:00
openssh-5.8p1-packet.patch the intermediate context is set to sshd_sftpd_t 2011-04-05 20:54:12 +02:00
openssh-5.8p2-remove-stale-control-socket.patch remove stale control sockets (#706396) 2011-06-09 16:10:59 +02:00
openssh-5.8p2-sigpipe.patch ignore SIGPIPE in ssh keyscan 2011-08-23 19:01:59 +02:00
openssh-5.9p1-ipv6man.patch ignore SIGPIPE in ssh keyscan 2011-09-07 15:12:54 +02:00
openssh-5.9p1-randclean.patch ignore SIGPIPE in ssh keyscan 2011-09-07 15:12:54 +02:00
openssh-5.9p1-wIm.patch coverity upgrade 2011-09-14 17:03:03 +02:00
openssh-6.1p1-askpass-ld.patch rebase to openssh-6.1p1 (#852651) 2012-09-15 13:29:49 +02:00
openssh-6.1p1-gssapi-canohost.patch fix gssapi canohost patch (#863350) 2012-10-30 11:06:45 +01:00
openssh-6.2p1-vendor.patch 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
openssh-6.3p1-ctr-evp-fast.patch rebase for openssh-6.3p1, remove unused patches (#1007769) 2013-10-14 15:54:41 +02:00
openssh-6.3p1-krb5-use-default_ccache_name.patch correct the calculation of bytes for authctxt->krb5_ccname <ams@corefiling.com> (#1161073) 2014-11-07 12:52:06 +01:00
openssh-6.4p1-CLOCK_BOOTTIME.patch try CLOCK_BOOTTIME with fallback (#1091992) 2014-05-14 17:30:43 +02:00
openssh-6.4p1-FIPS-mode-SP800-131A.patch FIPS mode - adjust the key echange DH groups and ssh-keygen according to SP800-131A 2014-01-23 18:29:02 +01:00
openssh-6.4p1-fromto-remote.patch use tty allocation for a remote scp 2014-01-23 18:30:39 +01:00
openssh-6.4p1-legacy-ssh-copy-id.patch fix ssh-copy-id (#1058792) 2014-02-26 14:53:23 +01:00
openssh-6.6.1p1-cisco-dh-keys.patch use different values for DH for Cisco servers (#1026430) 2014-12-03 17:10:47 +01:00
openssh-6.6.1p1-ignore-SIGXFSZ-in-postauth.patch Ignore SIGXFSZ in postauth monitor 2014-09-29 08:37:05 +02:00
openssh-6.6.1p1-ip-port-config-parser.patch Fix config parser for ip:port values (#1130733) 2015-01-14 16:48:32 +01:00
openssh-6.6.1p1-localdomain.patch the .local domain example should be in ssh_config, not in sshd_config 2014-12-03 18:15:25 +01:00
openssh-6.6.1p1-log-in-chroot.patch 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
openssh-6.6.1p1-NI_MAXHOST.patch standardise on NI_MAXHOST for gethostname() string lengths (#1051490) 2014-07-17 14:28:16 +02:00
openssh-6.6.1p1-partial-success.patch don't consider a partial success as a failure 2014-09-04 16:33:25 +02:00
openssh-6.6.1p1-scp-non-existing-directory.patch Fix confusing error message in scp (#1142223) 2015-01-14 16:46:23 +01:00
openssh-6.6.1p1-selinux-contexts.patch 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
openssh-6.6.1p1-servconf-parser.patch fix parsing of empty arguments in sshd_conf 2014-09-25 11:45:47 +02:00
openssh-6.6.1p1-utf8-banner.patch apply RFC3454 stringprep to banners when possible 2014-09-04 16:12:11 +02:00
openssh-6.6p1-allow-ip-opts.patch rebase to openssh-6.6p1 2014-06-03 16:51:07 +02:00
openssh-6.6p1-ctr-cavstest.patch 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
openssh-6.6p1-CVE-2014-2653.patch rebase to openssh-6.6p1 2014-06-03 16:51:07 +02:00
openssh-6.6p1-entropy.patch 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
openssh-6.6p1-force_krb.patch Update coverity patch after rebase to 6.7 2015-02-03 14:09:51 +01:00
openssh-6.6p1-GSSAPIEnablek5users.patch Update coverity patch after rebase to 6.7 2015-02-03 14:09:51 +01:00
openssh-6.6p1-gsskex.patch Update coverity patch after rebase to 6.7 2015-02-03 14:09:51 +01:00
openssh-6.6p1-keycat.patch 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
openssh-6.6p1-keyperm.patch 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
openssh-6.6p1-kuserok.patch 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
openssh-6.6p1-log-usepam-no.patch rebase to openssh-6.6p1 2014-06-03 16:51:07 +02:00
openssh-6.6p1-privsep-selinux.patch rebase to openssh-6.6p1 2014-06-03 16:51:07 +02:00
openssh-6.6p1-redhat.patch the .local domain example should be in ssh_config, not in sshd_config 2014-12-03 18:15:25 +01:00
openssh-6.6p1-role-mls.patch 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
openssh-6.6p1-set_remote_ipaddr.patch set a client's address right after a connection is set 2014-09-02 10:49:31 +02:00
openssh-6.7p1-audit.patch Enable seccomp sandboxing after resolving problems with audit patch (#1062953) 2015-02-11 14:08:42 +01:00
openssh-6.7p1-coverity.patch Update coverity patch after rebase to 6.7 2015-02-03 14:09:51 +01:00
openssh-6.7p1-debian-restore-tcp-wrappers.patch restore tcp wrappers support, based on Debian patch 2015-01-20 17:06:46 +01:00
openssh-6.7p1-fingerprint.patch 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
openssh-6.7p1-fips.patch Make output of sshd -T more consistent, using upstream patch (#1187521) 2015-02-03 14:17:05 +01:00
openssh-6.7p1-ldap.patch Update coverity patch after rebase to 6.7 2015-02-03 14:09:51 +01:00
openssh-6.7p1-sshdT-output.patch Make output of sshd -T more consistent, using upstream patch (#1187521) 2015-02-03 14:17:05 +01:00
openssh-5618210618256bbf5f4f71b2887ff186fd451736.patch OpenSSH 6.5 and 6.6 sometimes encode a value used in the 2014-06-03 17:18:36 +02:00
openssh.spec Use global hardening specification instead of hardening made by openssh. 2015-02-18 10:34:40 +01:00
pam_ssh_agent_auth-0.9.2-seteuid.patch - properly restore euid in case connect to the ssh-agent socket fails 2010-11-24 07:49:04 +01:00
pam_ssh_agent_auth-0.9.2-visibility.patch fix segfault in su when pam_ssh_agent_auth is used and the ssh-agent 2012-06-22 14:52:35 +02:00
pam_ssh_agent_auth-0.9.3-build.patch fix segfault in su when pam_ssh_agent_auth is used and the ssh-agent 2012-06-22 14:52:35 +02:00
pam_ssh_agent_auth-0.9.3-fingerprint-hash.patch 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
pam_ssh_agent_auth-0.9.3-no-xfree.patch don't use xfree in pam_ssh_agent_auth sources <geertj@gmail.com> (#1024965) 2013-11-01 17:06:02 +01:00
pam_ssh_agent-rmheaders - Add pam_ssh_agent_auth module to a subpackage. 2009-10-19 07:32:33 +00:00
sources 6.7p1-1 + 0.9.3-4 2015-01-20 13:21:45 +01:00
ssh-keycat.pam improove ssk-keycat (documentation) 2011-03-04 15:22:12 +01:00
sshd-keygen sshd-keygen - don't generate DSA and ED25519 host keys in FIPS mode 2014-09-23 12:29:25 +02:00
sshd-keygen.service slightly change systemd units logic - use sshd-keygen.service (#1066615) 2014-06-03 17:47:56 +02:00
sshd.init Systemd compatibility according to Mathieu Bridon <bochecha@fedoraproject.org> 2011-06-28 10:35:28 +02:00
sshd.pam Add pam_reauthorize.so to sshd.pam (#1115977) 2014-07-08 12:46:52 +02:00
sshd.service Add missing documentation link to systemd service files (RHBZ#1181593) 2015-01-14 16:51:44 +01:00
sshd.socket Add missing documentation link to systemd service files (RHBZ#1181593) 2015-01-14 16:51:44 +01:00
sshd.sysconfig add support for ED25519 keys to sshd-keygen and sshd.sysconfig 2014-06-03 17:41:32 +02:00
sshd@.service Add missing documentation link to systemd service files (RHBZ#1181593) 2015-01-14 16:51:44 +01:00