38a52bd3b5
Release notes are available at https://www.openssh.com/txt/release-9.1 9.1 contains fixes for three minor memory safety problems; these have lready been merged to the copy of OpenSSH 9.0 that is in the FreeBSD base system. Some highlights copied from the release notes: Potentially-incompatible changes -------------------------------- * ssh(1), sshd(8): SetEnv directives in ssh_config and sshd_config are now first-match-wins to match other directives. Previously if an environment variable was multiply specified the last set value would have been used. bz3438 * ssh-keygen(8): ssh-keygen -A (generate all default host key types) will no longer generate DSA keys, as these are insecure and have not been used by default for some years. New features ------------ * ssh(1), sshd(8): add a RequiredRSASize directive to set a minimum RSA key length. Keys below this length will be ignored for user authentication and for host authentication in sshd(8). * sftp-server(8): add a "users-groups-by-id@openssh.com" extension request that allows the client to obtain user/group names that correspond to a set of uids/gids. * sftp(1): use "users-groups-by-id@openssh.com" sftp-server extension (when available) to fill in user/group names for directory listings. * sftp-server(8): support the "home-directory" extension request defined in draft-ietf-secsh-filexfer-extensions-00. This overlaps a bit with the existing "expand-path@openssh.com", but some other clients support it. * ssh-keygen(1), sshd(8): allow certificate validity intervals, sshsig verification times and authorized_keys expiry-time options to accept dates in the UTC time zone in addition to the default of interpreting them in the system time zone. YYYYMMDD and YYMMDDHHMM[SS] dates/times will be interpreted as UTC if suffixed with a 'Z' character. Also allow certificate validity intervals to be specified in raw seconds-since-epoch as hex value, e.g. -V 0x1234:0x4567890. This is intended for use by regress tests and other tools that call ssh-keygen as part of a CA workflow. bz3468 * sftp(1): allow arguments to the sftp -D option, e.g. sftp -D "/usr/libexec/sftp-server -el debug3" * ssh-keygen(1): allow the existing -U (use agent) flag to work with "-Y sign" operations, where it will be interpreted to require that the private keys is hosted in an agent; bz3429 MFC after: 2 weeks Relnotes: Yes Sponsored by: The FreeBSD Foundation
74 lines
1.7 KiB
Makefile
74 lines
1.7 KiB
Makefile
# $FreeBSD$
|
|
|
|
.include <src.opts.mk>
|
|
.include "${SRCTOP}/secure/ssh.mk"
|
|
|
|
CONFS= moduli sshd_config
|
|
CONFSDIR= /etc/ssh
|
|
PROG= sshd
|
|
SRCS= sshd.c auth-rhosts.c auth-passwd.c \
|
|
audit.c audit-bsm.c audit-linux.c platform.c \
|
|
sshpty.c sshlogin.c servconf.c serverloop.c \
|
|
auth.c auth2.c auth-options.c session.c \
|
|
auth2-chall.c groupaccess.c \
|
|
auth-bsdauth.c auth2-hostbased.c auth2-kbdint.c \
|
|
auth2-none.c auth2-passwd.c auth2-pubkey.c auth2-pubkeyfile.c \
|
|
monitor.c monitor_wrap.c auth-krb5.c \
|
|
auth2-gss.c gss-serv.c gss-serv-krb5.c \
|
|
loginrec.c auth-pam.c auth-shadow.c auth-sia.c \
|
|
srclimit.c sftp-server.c sftp-common.c \
|
|
sandbox-null.c sandbox-rlimit.c sandbox-systrace.c sandbox-darwin.c \
|
|
sandbox-seccomp-filter.c sandbox-capsicum.c sandbox-pledge.c \
|
|
sandbox-solaris.c uidswap.c
|
|
PACKAGE= ssh
|
|
|
|
# gss-genr.c really belongs in libssh; see src/secure/lib/libssh/Makefile
|
|
SRCS+= gss-genr.c
|
|
|
|
MAN= sshd.8 sshd_config.5
|
|
|
|
# Don't rebuild based on moduli.c
|
|
moduli: .MADE
|
|
|
|
# pam should always happen before ssh here for static linking
|
|
LIBADD= pam ssh util
|
|
|
|
.if ${MK_LDNS} != "no"
|
|
CFLAGS+= -DHAVE_LDNS=1
|
|
#DPADD+= ${LIBLDNS}
|
|
#LDADD+= -lldns
|
|
.endif
|
|
|
|
.if ${MK_AUDIT} != "no"
|
|
CFLAGS+= -DUSE_BSM_AUDIT=1 -DHAVE_GETAUDIT_ADDR=1
|
|
LIBADD+= bsm
|
|
.endif
|
|
|
|
.if ${MK_BLACKLIST_SUPPORT} != "no"
|
|
CFLAGS+= -DUSE_BLACKLIST=1 -I${SRCTOP}/contrib/blacklist/include
|
|
SRCS+= blacklist.c
|
|
LIBADD+= blacklist
|
|
LDFLAGS+=-L${LIBBLACKLISTDIR}
|
|
.endif
|
|
|
|
.if ${MK_GSSAPI} != "no" && ${MK_KERBEROS_SUPPORT} != "no"
|
|
CFLAGS+= -include krb5_config.h
|
|
SRCS+= krb5_config.h
|
|
LIBADD+= gssapi_krb5 gssapi krb5
|
|
.endif
|
|
|
|
.if ${MK_TCP_WRAPPERS} != "no"
|
|
CFLAGS+= -DLIBWRAP=1
|
|
LIBADD+= wrap
|
|
.endif
|
|
|
|
LIBADD+= crypto
|
|
|
|
.if defined(LOCALBASE)
|
|
CFLAGS+= -DXAUTH_PATH=\"${LOCALBASE}/bin/xauth\"
|
|
.endif
|
|
|
|
.include <bsd.prog.mk>
|
|
|
|
.PATH: ${SSHDIR}
|