diff options
author | snj <snj@pkgsrc.org> | 2009-08-26 21:10:11 +0000 |
---|---|---|
committer | snj <snj@pkgsrc.org> | 2009-08-26 21:10:11 +0000 |
commit | e60135222218c03d1c5b69889206221f6693254a (patch) | |
tree | 1c50db7cea08875ffb65effb3d8a64423a81150f /security/dropbear/distinfo | |
parent | 9fea215039e6e5e1ef56593f4113cab4fe3a6ea0 (diff) | |
download | pkgsrc-e60135222218c03d1c5b69889206221f6693254a.tar.gz |
Update dropbear to 0.52. Build an scp binary and call it dbscp so it
doesn't conflict with openssh.
Changes since 0.50:
0.52 - Wed 12 November 2008
- Add "netcat-alike" option (-B) to dbclient, allowing Dropbear to
tunnel standard input/output to a TCP port-forwarded remote host.
- Add "proxy command" support to dbclient, to allow using a spawned
process for IO rather than a direct TCP connection. eg
dbclient remotehost
is equivalent to
dbclient -J 'nc remotehost 22' remotehost
(the hostname is still provided purely for looking up saved host keys)
- Combine netcat-alike and proxy support to allow "multihop"
connections, with comma-separated host syntax. Allows running
dbclient user1@host1,user2@host2,user3@host3
to end up at host3 via the other two, using SSH TCP forwarding. It's
a bit like onion-routing. All connections are established from the
local machine. The comma-separated syntax can also be used for
scp/rsync, eg
rsync -a -e dbclient m@gateway,m2@host,martello:/home/matt/ ~/backup/
to bounce through a few hosts.
- Add -I "idle timeout" option (contributed by Farrell Aultman)
- Allow restrictions on authorized_keys logins such as restricting
commands to be run etc. This is a subset of those allowed by OpenSSH,
doesn't yet allow restricting source host.
- Use vfork() for scp on uClinux
- Default to PATH=/usr/bin:/bin for shells.
- Report errors if -R forwarding fails
- Add counter mode cipher support, which avoids some security problems
with the standard CBC mode.
- Support zlib@openssh.com delayed compression for client/server. It
can be required for the Dropbear server with the '-Z' option. This
is useful for security as it avoids exposing the server to attacks
on zlib by unauthenticated remote users, though requires client side
support.
- options.h has been split into options.h (user-changable) and
sysoptions.h (less commonly changed)
- Support "dbclient -s sftp" to specify a subsystem
- Fix a bug in replies to channel requests that could be triggered by
recent versions of PuTTY
0.51 - Thu 27 March 2008
- Make a copy of password fields rather erroneously relying on getwpnam()
to be safe to call multiple times
- If $SSH_ASKPASS_ALWAYS environment variable is set (and $SSH_ASKPASS is
as well) always use that program, ignoring isatty() and $DISPLAY
- Wait until a process exits before the server closes a connection, so
that an exit code can be sent. This fixes problems with exit codes not
being returned, which could cause scp to fail.
Diffstat (limited to 'security/dropbear/distinfo')
-rw-r--r-- | security/dropbear/distinfo | 11 |
1 files changed, 5 insertions, 6 deletions
diff --git a/security/dropbear/distinfo b/security/dropbear/distinfo index f6bcda46743..5fbd2e0021f 100644 --- a/security/dropbear/distinfo +++ b/security/dropbear/distinfo @@ -1,9 +1,8 @@ -$NetBSD: distinfo,v 1.16 2007/09/06 19:15:10 jlam Exp $ +$NetBSD: distinfo,v 1.17 2009/08/26 21:10:11 snj Exp $ -SHA1 (dropbear-0.50.tar.gz) = 6f56bc88bc29a99c58fe85c98a60249b9782ef36 -RMD160 (dropbear-0.50.tar.gz) = c5e643cf068d6cdc19f5da8318ec90e0a0dfb0c3 -Size (dropbear-0.50.tar.gz) = 1790358 bytes +SHA1 (dropbear-0.52.tar.gz) = ae927e8b90059a7ba2b2b514d9824c12885b1949 +RMD160 (dropbear-0.52.tar.gz) = 3cc8398ffc265e28d8c8d3c80845236b143a6268 +Size (dropbear-0.52.tar.gz) = 1789901 bytes SHA1 (patch-aa) = 01bf4d80c4e76f9a60341b448cd7e77b2a03c286 -SHA1 (patch-ab) = 2eb7675e013edbe80b0e456dbaac310f1bb6cbbc +SHA1 (patch-ab) = 911a0525f309386901d32c23404d13ae67c2e2d1 SHA1 (patch-ac) = 69b1349bb47ad6a6ae02096f1ebde87a1461dd9b -SHA1 (patch-af) = 356a8ac535d2d08ff9fd9fe7e84ae58181ce32a0 |