svn commit: r397772 - in head/security/openssh-portable-devel: . files
Bryan Drewery
bdrewery at FreeBSD.org
Thu Sep 24 22:05:25 UTC 2015
Author: bdrewery
Date: Thu Sep 24 22:05:23 2015
New Revision: 397772
URL: https://svnweb.freebsd.org/changeset/ports/397772
Log:
- Update to latest snapshot.
- Remove obsoleted RSA Protocol 1 ssh_host_key support from the rc script [1]
PR: 202792 [1]
Modified:
head/security/openssh-portable-devel/Makefile
head/security/openssh-portable-devel/distinfo
head/security/openssh-portable-devel/files/extra-patch-hpn
head/security/openssh-portable-devel/files/openssh.in
Modified: head/security/openssh-portable-devel/Makefile
==============================================================================
--- head/security/openssh-portable-devel/Makefile Thu Sep 24 21:54:40 2015 (r397771)
+++ head/security/openssh-portable-devel/Makefile Thu Sep 24 22:05:23 2015 (r397772)
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= openssh
-DISTVERSION= 20150821
+DISTVERSION= 20150924
PORTREVISION= 0
CATEGORIES= security ipv6
MASTER_SITES= http://www.mindrot.org/openssh_snap/ \
Modified: head/security/openssh-portable-devel/distinfo
==============================================================================
--- head/security/openssh-portable-devel/distinfo Thu Sep 24 21:54:40 2015 (r397771)
+++ head/security/openssh-portable-devel/distinfo Thu Sep 24 22:05:23 2015 (r397772)
@@ -1,5 +1,5 @@
-SHA256 (openssh-SNAP-20150821.tar.gz) = 6ef0a5996e2c623f42138773ce0860fb52bcf7b8d18a62a9ad596ae4b0463031
-SIZE (openssh-SNAP-20150821.tar.gz) = 1473625
+SHA256 (openssh-SNAP-20150924.tar.gz) = 056ca3e8ad8f13010f82b5f55fe84f7cdd96620728ca63985f2cd11e9686e46c
+SIZE (openssh-SNAP-20150924.tar.gz) = 1474959
SHA256 (openssh-6.8p1-sctp-2573.patch.gz) = 0348713ad4cb4463e90cf5202ed41c8f726d7d604f3f93922a9aa55b86abf04a
SIZE (openssh-6.8p1-sctp-2573.patch.gz) = 8531
SHA256 (openssh-7.0p1+x509-8.5.diff.gz) = 6000557f1ddae06aff8837d440d93342a923fada571fec59fc5dedf388fb5f9e
Modified: head/security/openssh-portable-devel/files/extra-patch-hpn
==============================================================================
--- head/security/openssh-portable-devel/files/extra-patch-hpn Thu Sep 24 21:54:40 2015 (r397771)
+++ head/security/openssh-portable-devel/files/extra-patch-hpn Thu Sep 24 22:05:23 2015 (r397772)
@@ -447,9 +447,9 @@ diff -urN -x configure -x config.guess -
echo ""
---- work.clean/openssh-6.8p1/kex.c.orig 2015-08-11 01:57:29.000000000 -0700
-+++ work.clean/openssh-6.8p1/kex.c 2015-08-17 17:02:06.770901000 -0700
-@@ -652,6 +652,13 @@ kex_choose_conf(struct ssh *ssh)
+--- work.clean/openssh/kex.c.orig 2015-09-20 21:33:42.000000000 -0700
++++ work.clean/openssh/kex.c 2015-09-24 14:59:44.155826000 -0700
+@@ -668,6 +668,13 @@ kex_choose_conf(struct ssh *ssh)
int nenc, nmac, ncomp;
u_int mode, ctos, need, dh_need, authlen;
int r, first_kex_follows;
@@ -461,9 +461,9 @@ diff -urN -x configure -x config.guess -
+ debug ("AUTH STATE IS %d", auth_flag);
+#endif
- if ((r = kex_buf2prop(kex->my, NULL, &my)) != 0 ||
- (r = kex_buf2prop(kex->peer, &first_kex_follows, &peer)) != 0)
-@@ -709,6 +716,17 @@ kex_choose_conf(struct ssh *ssh)
+ debug2("local %s KEXINIT proposal", kex->server ? "server" : "client");
+ if ((r = kex_buf2prop(kex->my, NULL, &my)) != 0)
+@@ -740,6 +747,17 @@ kex_choose_conf(struct ssh *ssh)
peer[ncomp] = NULL;
goto out;
}
@@ -478,7 +478,7 @@ diff -urN -x configure -x config.guess -
+ }
+ }
+#endif
- debug("kex: %s %s %s %s",
+ debug("kex: %s cipher: %s MAC: %s compression: %s",
ctos ? "client->server" : "server->client",
newkeys->enc.name,
--- work.clean/openssh-6.8p1/myproposal.h 2015-03-17 00:49:20.000000000 -0500
Modified: head/security/openssh-portable-devel/files/openssh.in
==============================================================================
--- head/security/openssh-portable-devel/files/openssh.in Thu Sep 24 21:54:40 2015 (r397771)
+++ head/security/openssh-portable-devel/files/openssh.in Thu Sep 24 22:05:23 2015 (r397772)
@@ -35,8 +35,7 @@ pidfile=${openssh_pidfile:="/var/run/ssh
openssh_keygen()
{
- if [ -f %%ETCDIR%%/ssh_host_key -a \
- -f %%ETCDIR%%/ssh_host_dsa_key -a \
+ if [ -f %%ETCDIR%%/ssh_host_dsa_key -a \
-f %%ETCDIR%%/ssh_host_rsa_key -a \
-f %%ETCDIR%%/ssh_host_ecdsa_key -a \
-f %%ETCDIR%%/ssh_host_ed25519_key ]; then
@@ -49,15 +48,6 @@ openssh_keygen()
[ -x %%PREFIX%%/bin/ssh-keygen ] ||
err 1 "%%PREFIX%%/bin/ssh-keygen does not exist."
- if [ -f %%ETCDIR%%/ssh_host_key ]; then
- echo "You already have an RSA host key" \
- "in %%ETCDIR%%/ssh_host_key"
- echo "Skipping protocol version 1 RSA Key Generation"
- else
- %%PREFIX%%/bin/ssh-keygen -t rsa1 -b 1024 \
- -f %%ETCDIR%%/ssh_host_key -N ''
- fi
-
if [ -f %%ETCDIR%%/ssh_host_dsa_key ]; then
echo "You already have a DSA host key" \
"in %%ETCDIR%%/ssh_host_dsa_key"
More information about the svn-ports-all
mailing list