Registration is now invite-only. Any user can make an invite, you need to create it here and give resulting link to someone to register.

About project

Ssh (Secure Shell) is a program for logging into a remote machine and for
executing commands in a remote machine. It is intended to replace
rlogin and rsh, and provide secure encrypted communications between
two untrusted hosts over an insecure network. X11 connections and
arbitrary TCP/IP ports can also be forwarded over the secure channel.

OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it
up to date in terms of security and features, as well as removing all
patented algorithms to separate libraries (OpenSSL).

This package includes the core files necessary for both the OpenSSH
client and server. To make this package useful, you should also
install openssh-clients, openssh-server, or both.

You can build openssh with some conditional build swithes;

(ie. use with rpm --rebuild):

--with[out] skey smartcard support (disabled)
--with[out] krb5 kerberos support (enabled)
--with[out] watchdog watchdog support (disabled)
--with[out] x11askpass X11 ask pass support (enabled)
--with[out] gnomeaskpass Gnome ask pass support (enabled)
--with[out] ldap OpenLDAP support (disabled)
--with[out] sftpcontrol sftp file control support (disabled)
--with[out] hpn HPN ssh/scp support (disabled)
--with[out] audit audit support (disabled)
--with[out] libedit libedit support in sftp (enabled)

Last commit

avatar
root has added 3f060e82bb
applied openssh-5.8p2.CVE-2010-5107.patch patch

Files in

100644 | 54 lines (52 sloc) | 2.01 KB
diff -Nur openssh-5.8p2.old/servconf.c openssh-5.8p2/servconf.c
--- openssh-5.8p2.old/servconf.c	2010-11-20 07:19:38.000000000 +0300
+++ openssh-5.8p2/servconf.c	2013-02-18 13:02:21.499464423 +0400
@@ -249,11 +249,11 @@
 	if (options->gateway_ports == -1)
 		options->gateway_ports = 0;
 	if (options->max_startups == -1)
-		options->max_startups = 10;
+		options->max_startups = 100;
 	if (options->max_startups_rate == -1)
-		options->max_startups_rate = 100;		/* 100% */
+		options->max_startups_rate = 30;		/* 30% */
 	if (options->max_startups_begin == -1)
-		options->max_startups_begin = options->max_startups;
+		options->max_startups_begin = 10;
 	if (options->max_authtries == -1)
 		options->max_authtries = DEFAULT_AUTH_FAIL_MAX;
 	if (options->max_sessions == -1)
diff -Nur openssh-5.8p2.old/sshd_config openssh-5.8p2/sshd_config
--- openssh-5.8p2.old/sshd_config	2013-02-18 12:57:33.000000000 +0400
+++ openssh-5.8p2/sshd_config	2013-02-18 12:58:25.587447237 +0400
@@ -107,7 +107,7 @@
 #ClientAliveCountMax 3
 #UseDNS yes
 #PidFile /var/run/sshd.pid
-#MaxStartups 10
+#MaxStartups 10:30:100
 #PermitTunnel no
 #ChrootDirectory none
 
diff -Nur openssh-5.8p2.old/sshd_config.5 openssh-5.8p2/sshd_config.5
--- openssh-5.8p2.old/sshd_config.5	2010-12-26 06:26:48.000000000 +0300
+++ openssh-5.8p2/sshd_config.5	2013-02-18 13:00:56.228613202 +0400
@@ -742,7 +742,7 @@
 Additional connections will be dropped until authentication succeeds or the
 .Cm LoginGraceTime
 expires for a connection.
-The default is 10.
+The default is 10:30:100.
 .Pp
 Alternatively, random early drop can be enabled by specifying
 the three colon separated values
diff -Nur openssh-5.8p2.old/sshd_config.mdkconf openssh-5.8p2/sshd_config.mdkconf
--- openssh-5.8p2.old/sshd_config.mdkconf	2010-09-10 05:20:12.000000000 +0400
+++ openssh-5.8p2/sshd_config.mdkconf	2013-02-18 12:58:30.149027624 +0400
@@ -101,7 +101,7 @@
 #ClientAliveCountMax 3
 #UseDNS yes
 #PidFile /var/run/sshd.pid
-#MaxStartups 10
+#MaxStartups 10:30:100
 #PermitTunnel no
 #ChrootDirectory none