Awesome news. Is this going to hour the next biweekly drop? Or should
I build my own in the interim?
Sent via the Samsung GALAXY S® 5, an AT&T 4G LTE smartphone
-------- Original message --------
From: Sebastien Perreault <[email protected]>
Date: 09/04/2015 08:58 (GMT-05:00)
To: [email protected]
Cc: [email protected]
Subject: Re: [sdc-discuss] Heads up: OpenSSH in platform
+1
On Friday, September 4, 2015, Blake Irvin <[email protected]> wrote:
Excellent! I applaud this pragmatic approach to keeping SmartOS
relevant and low-friction for those new to the OS.
Blake
On Sep 03, 2015, at 11:15 PM, Alex Wilson <[email protected][1]>
wrote:
Hi all,
I just pushed a change to master on illumos-joyent, smartos-live and
illumos-extra that removes SunSSH from SmartOS (and SDC) and replaces
it
with a patched OpenSSH 7.1p1.
If all goes well, this will be in the next release (ie, not the
release that
branched this week).
While there are some known behavioural differences (explained below),
please
note that the vast majority of existing SunSSH configurations, keys and
plugins (such as smartlogin for SDC) will continue to work as they are.
This also includes RBAC, and PAM configurations -- the new daemon has
been
patched to exhibit the same behaviour and use the same PAM service
names as
the old SunSSH it replaces.
Important differences:
Default key fingerprint format
==============================
The default format printed by tools that produce and store key
fingerprints
has changed. This includes the output of 'ssh-keygen', as well as the
format
of the $HOME/.ssh/known_hosts file and others.
Old key fingerprints are the MD5 hash of the public key, encoded in
colon-separated hex. MD5 hashes are considered weak by modern
standards and
are generally not recommended for cryptographic use.
Example of old format:
$ ssh-keygen -l -f ~/.ssh/id_rsa
2048 2c:be:e8:b1:32:02:31:aa:aa:aa:aa:aa:aa:aa:aa:aa alex.wilson@mbp
(RSA)
New format:
$ ssh-keygen -l -f ~/.ssh/id_rsa
2048 SHA256:TY9lRcv8DzAXVo8CyRdvjuxqo6tsbFFAJ1aaaaaaaaa
alex.wilson@mbp (RSA)
You can get the old format back by using the -E md5 option to most
commands,
if needed. You will likely have to remove the MD5: prefix with 'sed'.
"known_hosts" files from the old SunSSH version are useable and
compatible
with the new OpenSSH. This compatibility does not extend the other way,
however. The new OpenSSH will produce known_hosts entries in the new
format,
which SunSSH will not understand.
Alternative key formats
=======================
SunSSH supports alternative key formats (RFC4716 and PKCS8) as well as
the
standard SSH key format. OpenSSH will consider any keys not in the SSH
key
format to be invalid.
If you've only ever used keys produced by ssh-keygen, it is unlikely
you
have any keys that will be affected. This does not appear to have been
a
widely-used feature.
Localization (l10n) and internationalization (i18n)
===================================================
SunSSH uses gettext and its own g11n module to localize strings such as
error messages and commandline options. These features are not
available in
OpenSSH.
All error messages and text internally generated by SSH itself will be
in
English and ASCII encoding. Conveniently, there are no actual
translations
in the gate for any of this text, so unless you've been adding your own
locally this will be exactly the same behaviour you've had all along.
Additionally, the in-protocol language and locale negotiation that was
available when connecting from a SunSSH client to SunSSH daemon will no
longer be available. The language negotiation behaviour will be the
same as
for OpenSSH on other systems.
X11 forwarding
==============
SunSSH's -X option has for a long time behaved as -Y does in other
builds of
the SSH client (it operates in "trusted" mode). After this change, the
SSH
client will revert to the upstream behaviour where -Y must be used to
obtain
trusted forwarding.
Deprecated configuration options
================================
A few configuration options from SunSSH are now deprecated. The daemon
will
accept them as valid options, but will ignore their values and they
will not
have any effect.
* LookupClientHostnames and VerifyReverseMapping -- replaced by UseDNS
* MaxAuthTriesLog -- use MaxAuthTries
* RhostsAuthentication -- replaced by HostbasedAuthentication, but
using
this is in general not recommended
* UseOpenSSLEngine -- no replacement, engines are used automatically
* GSSAPIStoreDelegatedCredentials -- no replacement, always true
* PreUserAuthHook -- no replacement
* KmfPolicyDatabase -- no replacement
* KmfPolicyName -- no replacement
* TrustedAnchorKeyStore -- no replacement
* UseUnsupportedSSHv1 -- no replacement
* UseFIPS140 -- no replacement
Additionally there are a few configuration options which were
deprecated in
SunSSH, which will not be accepted by the new OpenSSH builds. If these
options are present in your configuration the new daemon will fail to
start:
* GSSKeyEx -- use GSSAPIKeyExchange
* GSSAuthentication -- use GSSAPIAuthentication
* GSSDelegateCreds -- use GSSAPIDelegateCredentials
Privilege separation chroot
===========================
The new daemon will chroot to the directory /var/empty as part of the
privilege separation process. This directory will be created by the
daemon
at startup if it does not exist on your system.
Deleting this directory after the daemon has started could result in a
situation where the SSH daemon is unable to accept new logins. Please
don't
do that.
Old SunSSH workarounds
======================
The SunSSH daemon had code workarounds for bugs in very old SunSSH
clients
(from the early Solaris 10 era and earlier). These workarounds will
not be
available in the new daemon.
http://www.listbox.com
--
Sebastien Perrreault
Partner
Les Technologies Alesium Inc
P: 514-298-7193
F: 514-221-3668
E: [email protected]
"Life's missed opportunities, at the end, may seem more poignant to us
than those we embraced--because in our imagination they have a
perfection that reality can never rival." -- Roger Ebert
SDC-DISCUSS | Archives[2][3] | Modify[4] Your Subscription [5]
Links:
------
[1] javascript:_e(%7B%7D,'cvml','[email protected]');
[2] https://www.listbox.com/member/archive/247449/=now
[3] https://www.listbox.com/member/archive/rss/247449/26770335-d93989ee
[4]
https://www.listbox.com/member/?&
[5] http://www.listbox.com
-------------------------------------------
smartos-discuss
Archives: https://www.listbox.com/member/archive/184463/=now
RSS Feed: https://www.listbox.com/member/archive/rss/184463/25769125-55cfbc00
Modify Your Subscription:
https://www.listbox.com/member/?member_id=25769125&id_secret=25769125-7688e9fb
Powered by Listbox: http://www.listbox.com