转载

OpenSSH 7.0 发布,修复验证漏洞

OpenSSH 7.0 发布,主要修复验证漏洞和其它一些安全方面的 bug,更新内容如下:

--------   * sshd(8): OpenSSH 6.8 and 6.9 incorrectly set TTYs to be world-    writable. Local attackers may be able to write arbitrary messages    to logged-in users, including terminal escape sequences.    Reported by Nikolay Edigaryev.   * sshd(8): Portable OpenSSH only: Fixed a privilege separation    weakness related to PAM support. Attackers who could successfully    compromise the pre-authentication process for remote code    execution and who had valid credentials on the host could    impersonate other users.  Reported by Moritz Jodeit.   * sshd(8): Portable OpenSSH only: Fixed a use-after-free bug    related to PAM support that was reachable by attackers who could    compromise the pre-authentication process for remote code    execution. Also reported by Moritz Jodeit.   * sshd(8): fix circumvention of MaxAuthTries using keyboard-    interactive authentication. By specifying a long, repeating    keyboard-interactive "devices" string, an attacker could request    the same authentication method be tried thousands of times in    a single pass. The LoginGraceTime timeout in sshd(8) and any    authentication failure delays implemented by the authentication    mechanism itself were still applied. Found by Kingcope.      --------------------------------   * Support for the legacy SSH version 1 protocol is disabled by    default at compile time.   * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange    is disabled by default at run-time. It may be re-enabled using    the instructions at http://www.openssh.com/legacy.html   * Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled    by default at run-time. These may be re-enabled using the    instructions at http://www.openssh.com/legacy.html   * Support for the legacy v00 cert format has been removed.   * The default for the sshd_config(5) PermitRootLogin option has    changed from "yes" to "prohibit-password".   * PermitRootLogin=without-password/prohibit-password now bans all    interactive authentication methods, allowing only public-key,    hostbased and GSSAPI authentication (previously it permitted    keyboard-interactive and password-less authentication if those    were enabled).   ------------   * ssh_config(5): add PubkeyAcceptedKeyTypes option to control which    public key types are available for user authentication.   * sshd_config(5): add HostKeyAlgorithms option to control which    public key types are offered for host authentications.   * ssh(1), sshd(8): extend Ciphers, MACs, KexAlgorithms,    HostKeyAlgorithms, PubkeyAcceptedKeyTypes and HostbasedKeyTypes    options to allow appending to the default set of algorithms    instead of replacing it. Options may now be prefixed with a '+'    to append to the default, e.g. "HostKeyAlgorithms=+ssh-dss".   * sshd_config(5): PermitRootLogin now accepts an argument of    'prohibit-password' as a less-ambiguous synonym of 'without-    password'.   --------   * ssh(1), sshd(8): add compatability workarounds for Cisco and more    PuTTY versions. bz#2424   * Fix some omissions and errors in the PROTOCOL and PROTOCOL.mux    documentation relating to Unix domain socket forwarding;    bz#2421 bz#2422   * ssh(1): Improve the ssh(1) manual page to include a better    description of Unix domain socket forwarding; bz#2423   * ssh(1), ssh-agent(1): skip uninitialised PKCS#11 slots, fixing    failures to load keys when they are present. bz#2427   * ssh(1), ssh-agent(1): do not ignore PKCS#11 hosted keys that wth    empty CKA_ID; bz#2429   * sshd(8): clarify documentation for UseDNS option; bz#2045

更多内容请查看: 发行说明

OpenSSH(Open Secure Shell)是使用SSH透过计算机网络加密通讯的实现。它是取代由SSH Communications Security所提供的商用版本的开放源代码方案。目前OpenSSH是OpenBSD的子计划。

OpenSSH常常被误认以为与OpenSSL有关联,但实际上这两个计划的有不同的目的,不同的发展团队,名称相近只是因为两者有同样的软件发展目标──提供开放源代码的加密通讯软件。

文章转载自: 开源中国社区 [ http://www.oschina.net

]

本文标题:OpenSSH 7.0 发布,修复验证漏洞

本文地址:

http://www.oschina.net/news/65129/openssh-7-0
正文到此结束
Loading...