Please disable your adblock and script blockers to view this page

Call for Testing: OpenSSH 8.0


http://www.mindrot.org/openssh_snap/
ListenAddress
ECDSA
NTRU
RSA
NIST Special Publication
4-tuple
PAM
bz#2741
bz#2926
AuthenticationMethods
/dev
SIGPIPE
ConnectionAttempts
bz#2918
bz#2903
ssh(1
PIN
bz#2942
REKEX
bz#2936
ProxyCommands
ControlPersist
RSA-SHA2
OS
Microsoft



https://github.com/openssh/openssh-portable
bz#2960 * ssh(1
PAM
Bugfixes --------
ClientAliveCount
bz#2912
Markus Friedl
Niels Provos
Theo de Raadt
Kevin Steves
Damien Miller
Darren Tucker
Jason McIntyre
Tim Rice
Ben Lindstrom
Kerberos


bz#2335
PIN


bz#2922

No matching tags



PermitOpen
PKCS11Provide
ssh_config

No matching tags

Positivity     41.00%   
   Negativity   59.00%
The New York Times
SOURCE: https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-March/037672.html
Write a review: Hacker News
Summary

* sshd(8): Remove support for obsolete "host/port" syntax. * ssh(1), ssh-agent(1), ssh-add(1): Add support for ECDSA keys in * ssh(1), sshd(8): Add experimental quantum-computing resistant * ssh-keygen(1): Increase the default RSA key size to 3072 bits, the PKCS11Provide directive in ssh_config; bz#2974 * sshd(8): Add a log message for situations where a connection is * ssh(1): When prompting whether to record a new host key, accept * ssh-agent(1), ssh-pkcs11-helper(8), ssh-add(1): Accept "-v" started from ssh-agent. * ssh-add(1): Add a "-T" option to allowing testing whether keys in * sftp-server(8): Add a "lsetstat at openssh.com" protocol extension * sshd(8): Expose $SSH_CONNECTION in the PAM environment. * sshd(8): Add a ssh_config "Match final" predicate Matches in same "ssh-keygen -Lf /path/certificate", include the algorithm that * sshd(8): Fix authentication failures when sshd_config contains * ssh(1): Fix stdout potentially being redirected to /dev/null when * sshd(8): Avoid sending SIGPIPE to child processes if they attempt * ssh-keyscan(1): Return a non-zero exit status if no keys were * ssh(1), ssh-add(1): Correct some bugs in PKCS#11 token PIN * ssh(1), ssh-add(1): Support keys on PKCS#11 tokens that set the * ssh(1), sshd(8): be more strict in processing protocol banners, * ssh(1): Don't attempt to connect to empty SSH_AUTH_SOCK; bz#2936 * ssh(1): Request correct signature types from ssh-agent when * sshd(8): On Cygwin, use custom user/group matching code that

As said here by