TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OpenSSH 6.5 Released

161 pointsby moonbootsover 11 years ago

10 comments

jarydover 11 years ago
The following two things are highlights for me:<p><pre><code> * ssh(1): Add a ssh_config(5) &quot;Match&quot; keyword that allows conditional configuration to be applied by matching on hostname, user and result of arbitrary commands. * ssh(1): Add support for client-side hostname canonicalisation using a set of DNS suffixes and rules in ssh_config(5). This allows unqualified names to be canonicalised to fully-qualified domain names to eliminate ambiguity when looking up keys in known_hosts or checking host certificate names.</code></pre>
评论 #7155108 未加载
评论 #7155841 未加载
评论 #7155189 未加载
评论 #7158871 未加载
sneakover 11 years ago
Bold move, defaulting to Curve25519 ECDH.<p>I&#x27;m not saying DH&#x2F;DLP is broken, but the NSA declines to include non-EC DH (or RSA, for that matter) in their Suite B of algorithms approved for internal applications. It&#x27;s nice to have the option of ECDH for day to day use.<p><a href="http://en.wikipedia.org/wiki/NSA_Suite_B_Cryptography" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;NSA_Suite_B_Cryptography</a>
评论 #7155580 未加载
评论 #7156032 未加载
mcpherrinmover 11 years ago
* Add a new private key format that uses a bcrypt KDF to better protect keys at rest.<p>This is pretty important to me: Keys are much less of a hazard if taken off a stolen laptop&#x2F;disk.
评论 #7155342 未加载
评论 #7155209 未加载
XorNotover 11 years ago
OpenSSH-HPN&#x27;s patchset really needs to be merged into the mainline. There&#x27;s no excuse for not at least incorporating dynamic window scaling into the core protocol since it&#x27;s such a ridiculous omission at this point.
评论 #7155217 未加载
评论 #7155335 未加载
评论 #7156323 未加载
评论 #7158880 未加载
sneakover 11 years ago
Wonderful to see them using a modern, time-hard KDF finally.<p>One wonders where the kickstarter to get a proper time- and memory- hard KDF patched into GnuPG is? It&#x27;s not even really that much of a compatibility issue, either (unless you are sharing private key files between many machines)...<p>You&#x27;d really think the tinfoil-hat paranoids that (until Snowden) comprise(d) the bulk of the pgp userbase would care about the keys used to keep their log-term keys on disk private. I was flabbergasted to see the (relatively) tiny number of iterations in use in the GnuPG kdf.
评论 #7155489 未加载
cm3over 11 years ago
More than a few people requested Github and Bitbucket to support more than RSA keys but they&#x27;ve both ignored the request for ECDSA for the last few years. The changes in 6.5 should inspire them to skip ECDSA and add Ed25519 as an option. Please Github and Bitbucket do everyone a favor and support modern keys. Next step is to save cpu cycles by using Curve25519 when available in the client. It&#x27;s illogical not to.
mctover 11 years ago
I&#x27;m very happy to see djb&#x27;s crypto work being supported in openssh!<p>Does anyone know offhand why ChaCha was chosen instead of XSalsa20, which is used in NaCl?
评论 #7155815 未加载
评论 #7155803 未加载
ballardover 11 years ago
Brew formula for mac<p><a href="https://gist.github.com/8266138" rel="nofollow">https:&#x2F;&#x2F;gist.github.com&#x2F;8266138</a>
评论 #7155305 未加载
justincormackover 11 years ago
it also has:<p>* sshd(8): Add support for pre-authentication sandboxing using the   Capsicum API introduced in FreeBSD 10.<p>Capsicum is a nice way to drop privs that shipped in FreeBSD 10 and is also being worked on for Linux.
newman314over 11 years ago
Given that Ubuntu 14.04 is not released yet, it would be great to see this in a LTS release...