Commit Graph

6 Commits

Author SHA1 Message Date
Steve Langasek 561f8903a4 Support systemd socket activation
Description: support systemd socket activation
 Unlike inetd socket activation, with systemd socket activation the
 supervisor passes the listened-on socket to the child process and lets
 the child process handle the accept().  This lets us do delayed start
 of the sshd daemon without becoming incompatible with config options
 like ClientAliveCountMax.

Author: Steve Langasek <steve.langasek@ubuntu.com>
Author: Nick Rosbrook <nick.rosbrook@canonical.com>
Author: Colin Watson <cjwatson@debian.org>
Author: Marco Trevisan <marco@ubuntu.com>
Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2011458
Last-Update: 2024-04-03


Gbp-Pq: Name systemd-socket-activation.patch
2024-04-10 14:39:11 +08:00
Damien Miller 5df1f7ebbb notify systemd on listen and reload
Standalone implementation that does not depend on libsystemd.
With assistance from Luca Boccassi, and feedback/testing from Colin
Watson. bz2641

Origin: upstream, https://anongit.mindrot.org/openssh.git/commit/?id=08f579231cd38a1c657aaa6ddeb8ab57a1fd4f5c
Bug-Debian: https://bugs.debian.org/778913
Last-Update: 2024-04-03

Patch-Name: systemd-readiness.patch

Gbp-Pq: Name systemd-readiness.patch
2024-04-10 14:39:11 +08:00
Colin Watson d1b5c8ff3e Restore TCP wrappers support
Support for TCP wrappers was dropped in OpenSSH 6.7.  See this message
and thread:

  https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-April/032497.html

It is true that this reduces preauth attack surface in sshd.  On the
other hand, this support seems to be quite widely used, and abruptly
dropping it (from the perspective of users who don't read
openssh-unix-dev) could easily cause more serious problems in practice.

It's not entirely clear what the right long-term answer for Debian is,
but it at least probably doesn't involve dropping this feature shortly
before a freeze.

Forwarded: not-needed
Last-Update: 2022-02-23

Patch-Name: restore-tcp-wrappers.patch

Gbp-Pq: Name restore-tcp-wrappers.patch
2024-04-10 14:39:10 +08:00
Simon Wilkinson e657c8997e GSSAPI key exchange support
This patch has been rejected upstream: "None of the OpenSSH developers are
in favour of adding this, and this situation has not changed for several
years.  This is not a slight on Simon's patch, which is of fine quality, but
just that a) we don't trust GSSAPI implementations that much and b) we don't
like adding new KEX since they are pre-auth attack surface.  This one is
particularly scary, since it requires hooks out to typically root-owned
system resources."

However, quite a lot of people rely on this in Debian, and it's better to
have it merged into the main openssh package rather than having separate
-krb5 packages (as we used to have).  It seems to have a generally good
security history.

2024-03-13 update:
Upstream commit dbb339f015c33d63484261d140c84ad875a9e548 ("prepare for
multiple names for authmethods") changed the Authmethod structure to
incorporate a new element "synonym", and also changed the signature of the
userauth_gssapi function to have an extra method parameter. These changes need
to be replicated to the gsskeyex patch.
This fixes LP: #2053146

Author: Simon Wilkinson <simon@sxw.org.uk>
Author: Colin Watson <cjwatson@debian.org>
Author: Jakub Jelen <jjelen@redhat.com>
Origin: other, https://github.com/openssh-gsskex/openssh-gsskex/pull/23
Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1242
Last-Updated: 2024-03-13

Patch-Name: gssapi.patch

Gbp-Pq: Name gssapi.patch
2024-04-10 14:39:10 +08:00
lixiuwen 71cc35751a Import Upstream version 9.6p1 2024-04-10 14:39:05 +08:00
Lu zhiping 1968fef375 Import Upstream version 8.2p1 2022-06-16 16:57:06 +08:00