pam_ssh_agent_auth-0.9.3-124.el6_10$>xe_h;8, B>8P?@d & Sx|  , 6 @ T Y `t (8{9 {:K{{GHIXY\$]8^؟bdٚeٟf٢l٤tټuvwڸxy<Cpam_ssh_agent_auth0.9.3124.el6_10PAM module for authentication with ssh-agentThis package contains a PAM module which can be used to authenticate users using ssh keys stored in a ssh-agent. Through the use of the forwarding of ssh-agent connection it also allows to authenticate with remote ssh-agent instance. The module is most useful for su and sudo service stacks.\x86-01.bsys.centos.org9 CentOSBSDCentOS BuildSystem System Environment/Basehttp://www.openssh.com/portable.htmllinuxi6864>wA큤\\J~=J~=\cb1852e3cc338a0f70cb308d6aa9860eb5aabf2021c5b70b6020b379badd0b65d950ba64fb621fa42ed528b7c818f209e9e9dd527478adc3d6e883f9e376da651b944fd4e3361184402b0933e9f082cefcf58a14eb6caf6b5538b64416250ccc40718aab10b623f9b93a379c6eb9012ce1949eab0032cd2faaa822ef62a4f3ddrootrootrootrootrootrootrootrootrootrootopenssh-5.3p1-124.el6_10.src.rpmpam_ssh_agent_auth.sopam_ssh_agent_authpam_ssh_agent_auth(x86-32)@@@@@@@@@@@@@@@@@@@@@   @ libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.8)libcrypt.so.1libcrypto.so.10libcrypto.so.10(OPENSSL_1.0.1_EC)libcrypto.so.10(libcrypto.so.10)libnss3.solibnss3.so(NSS_3.2)libnss3.so(NSS_3.6)libpam.so.0libpam.so.0(LIBPAM_1.0)libresolv.so.2libselinux.so.1libutil.so.1rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rtld(GNU_HASH)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.8.0\Y@XWXRX@WSWV@VVVvVetU@UG_@UG_@UTTE@T@T@S@S/S@S@SQ@Sh@S"@SS@R@REs@R<8R1R)R7RZ@R q@R q@Q*@QP@PPx@OE@O8OD@OO|7Or@O`@ON@O@O@Ng\NWNRDNRDN?N.@N*NM6@M@M@Mߒ@Mߒ@MM@Mx@M2@MTM~@Mx@Mv@MoMk@MfH@MfH@MZjMQ0@MA^@M8#M0:M.@M-M@MLOLOLLLLfLL@Lc@L;L+1L@K@Kj@K @KrKa|@KXAKLd@KC)KKKJJJJTJ`@J@JJ_@J@J;JJ J J@JJ#J@Jq@JjJi@J`gJMJI@JHJF J@J2C@J Y@IIcI@IJII@I@IIo%@IAH~@H@H@H4H1kG GGG@G|@GUA@GUA@GB@Fl@FFFyEE{@E@E݅E@Ew@EnEl$ETiEIE @DC@D|Dp@D{D@D?D@C@CCtC@C:@CC@CqC@C}@C|pCqCbCTCNL@CFc@CC@Bw@B@B/@B:B@BQ,@BBB8B#B@B @BBcA3A@Aa;@AN@AF@AEA7 @A7 @A7 @A4h@A+-A @@@@@X@@o@o@V@@E@C%@=@=@9@@,@@@@@@/@?@? ?}?7?@???j?j?j?hL?hL?hL?hL?f@?f@?f@?f@?f@?Xz?Xz?KK?8?8?%@?'@>@>@>0>@>~@>L@>G@>.>@=@=@===n =ZF@=@=[@= =@=@ - 5.3p1-124Jakub Jelen - 5.3p1-123Jakub Jelen - 5.3p1-122Jakub Jelen - 5.3p1-121Jakub Jelen - 5.3p1-120Jakub Jelen - 5.3p1-119Jakub Jelen - 5.3p1-118Jakub Jelen 5.3p1-117Jakub Jelen 5.3p1-116Jakub Jelen 5.3p1-115Jakub Jelen 5.3p1-114Jakub Jelen 5.3p1-113Jakub Jelen 5.3p1-112Jakub Jelen 5.3p1-111Jakub Jelen 5.3p1-110Jakub Jelen 5.3p1-109Jakub Jelen 5.3p1-108Jakub Jelen 5.3p1-107Jakub Jelen 5.3p1-106Jakub Jelen 5.3p1-105Petr Lautrbach 5.3p1-104Petr Lautrbach 5.3p1-103Petr Lautrbach 5.3p1-102Petr Lautrbach 5.3p1-101Petr Lautrbach 5.3p1-100Petr Lautrbach 5.3p1-99.2Petr Lautrbach 5.3p1-98Petr Lautrbach 5.3p1-97Petr Lautrbach 5.3p1-96Petr Lautrbach 5.3p1-95Petr Lautrbach 5.3p1-94Petr Lautrbach 5.3p1-93Petr Lautrbach 5.3p1-92Petr Lautrbach 5.3p1-91Petr Lautrbach 5.3p1-90Petr Lautrbach 5.3p1-89Petr Lautrbach 5.3p1-88Petr Lautrbach 5.3p1-87Petr Lautrbach 5.3p1-86Petr Lautrbach 5.3p1-85Petr Lautrbach 5.3p1-84.1Petr Lautrbach 5.3p1-83Petr Lautrbach 5.3p1-82Petr Lautrbach 5.3p1-81Petr Lautrbach 5.3p1-79Petr Lautrbach 5.3p1-78Petr Lautrbach 5.3p1-77Petr Lautrbach 5.3p1-76Petr Lautrbach 5.3p1-75Petr Lautrbach 5.3p1-74Petr Lautrbach 5.3p1-73Petr Lautrbach 5.3p1-72Petr Lautrbach 5.3p1-71Jan F. Chadima - 5.5p1-70Jan F. Chadima - 5.5p1-69Jan F. Chadima - 5.5p1-67Jan F. Chadima - 5.5p1-66Jan F. Chadima - 5.5p1-65Jan F. Chadima - 5.5p1-63Jan F. Chadima - 5.5p1-62Jan F. Chadima - 5.5p1-60Jan F. Chadima - 5.5p1-59Jan F. Chadima - 5.5p1-57Jan F. Chadima - 5.5p1-56Jan F. Chadima - 5.5p1-54Jan F. Chadima - 5.5p1-53Jan F. Chadima - 5.5p1-52Jan F. Chadima - 5.5p1-51Jan F. Chadima - 5.5p1-50Jan F. Chadima - 5.5p1-49Jan F. Chadima - 5.5p1-48Jan F. Chadima - 5.5p1-47Jan F. Chadima - 5.5p1-46Jan F. Chadima - 5.5p1-45Jan F. Chadima - 5.5p1-42Jan F. Chadima - 5.5p1-41Jan F. Chadima - 5.5p1-40Jan F. Chadima - 5.5p1-39Jan F. Chadima - 5.5p1-38Jan F. Chadima - 5.5p1-37Jan F. Chadima - 5.5p1-36Jan F. Chadima - 5.5p1-35Jan F. Chadima - 5.5p1-34Jan F. Chadima - 5.5p1-32Jan F. Chadima - 5.5p1-31Jan F. Chadima - 5.5p1-30Jan F. Chadima - 5.5p1-29Jan F. Chadima - 5.5p1-28Jan F. Chadima - 5.5p1-27Jan F. Chadima - 5.5p1-26Jan F. Chadima - 5.5p1-25Jan F. Chadima - 5.5p1-24Jan F. Chadima - 5.5p1-23Jan F. Chadima - 5.5p1-22Jan F. Chadima - 5.5p1-21Jan F. Chadima - 5.5p1-20Jan F. Chadima - 5.5p1-19Jan F. Chadima - 5.5p1-18Jan F. Chadima - 5.5p1-17Jan F. Chadima - 5.5p1-16Jan F. Chadima - 5.5p1-15Jan F. Chadima - 5.3p1-14Jan F. Chadima - 5.3p1-13Jan F. Chadima - 5.3p1-12.3Jan F. Chadima - 5.3p1-12.2Jan F. Chadima - 5.3p1-12.1Jan F. Chadima - 5.3p1-12Jan F. Chadima - 5.3p1-11Jan F. Chadima - 5.3p1-9Jan F. Chadima - 5.3p1-8Jan F. Chadima - 5.3p1-7Jan F. Chadima - 5.3p1-6Jan F. Chadima - 5.3p1-5Tomas Mraz - 5.3p1-4Jan F. Chadima - 5.3p1-3Jan F. Chadima - 5.3p1-2Jan F. Chadima - 5.2p1-29Jan F. Chadima - 5.2p1-28Jan F. Chadima - 5.2p1-26Jan F. Chadima - 5.2p1-25Jan F. Chadima - 5.2p1-24Jan F. Chadima - 5.2p1-23Jan F. Chadima - 5.2p1-22Jan F. Chadima - 5.2p1-21Jan F. Chadima - 5.2p1-20Jan F. Chadima - 5.2p1-19Tomas Mraz - 5.2p1-18Jan F. Chadima - 5.2p1-17Fedora Release Engineering - 5.2p1-16Jan F. Chadima - 5.2p1-15Jan F. Chadima - 5.2p1-14Jan F. Chadima - 5.2p1-13Jan F. Chadima - 5.2p1-12Jan F. Chadima - 5.2p1-11Jan F. Chadima - 5.2p1-10Jan F. Chadima - 5.2p1-9Jan F. Chadima - 5.2p1-8Tomas Mraz - 5.2p1-6Tomas Mraz - 5.2p1-5Tomas Mraz - 5.2p1-4Jan F. Chadima - 5.2p1-3Tomas Mraz - 5.2p1-2Jan F. Chadima - 5.2p1-1Fedora Release Engineering - 5.1p1-8Tomas Mraz - 5.1p1-7Tomas Mraz - 5.1p1-6Tomas Mraz - 5.1p1-5Tomas Mraz - 5.1p1-4Tomas Mraz - 5.1p1-3Tomas Mraz - 5.1p1-2Tomas Mraz - 5.1p1-1Tomas Mraz - 5.0p1-3Tomas Mraz - 5.0p1-2Tomas Mraz - 5.0p1-1Tomas Mraz - 4.7p1-10Tomas Mraz - 4.7p1-9Dennis Gilmore - 4.7p1-8Tomas Mraz - 4.7p1-7Tomas Mraz - 4.7p1-6Release Engineering - 4.7p1-5Tomas Mraz - 4.7p1-4Tomas Mraz - 4.7p1-2Tomas Mraz - 4.7p1-1Tomas Mraz - 4.5p1-8Tomas Mraz - 4.5p1-7Tomas Mraz - 4.5p1-6Tomas Mraz - 4.5p1-5Tomas Mraz - 4.5p1-4Tomas Mraz - 4.5p1-3Tomas Mraz - 4.5p1-2Tomas Mraz - 4.5p1-1Tomas Mraz - 4.3p2-14Tomas Mraz - 4.3p2-13Tomas Mraz - 4.3p2-12Tomas Mraz - 4.3p2-11Tomas Mraz - 4.3p2-10Tomas Mraz - 4.3p2-9Tomas Mraz - 4.3p2-8Tomas Mraz - 4.3p2-7Tomas Mraz - 4.3p2-6Jesse Keating - 4.3p2-5.1Tomas Mraz - 4.3p2-5Tomas Mraz - 4.3p2-4Tomas Mraz - 4.3p2-3Tomas Mraz - 4.3p2-2Tomas Mraz - 4.3p2-1Jesse Keating - 4.3p1-2.1Tomas Mraz - 4.3p1-2Tomas Mraz - 4.3p1-1Tomas Mraz - 4.2p1-10Jesse Keating Tomas Mraz - 4.2p1-9Nalin Dahyabhai - 4.2p1-8Warren Togami - 4.2p1-7Jeremy Katz - 4.2p1-6Tomas Mraz 4.2p1-5Dan Walsh 4.2p1-4Tomas Mraz 4.2p1-3Tomas Mraz 4.2p1-2Tomas Mraz 4.2p1-1Tomas Mraz 4.1p1-5Tomas Mraz 4.1p1-4Tomas Mraz 4.1p1-3Tomas Mraz 4.1p1-2Tomas Mraz 4.1p1-1Tomas Mraz 4.0p1-3Tomas Mraz 4.0p1-2Tomas Mraz 4.0p1-1Elliot Lee Nalin Dahyabhai 3.9p1-12Tomas Mraz 3.9p1-11Tomas Mraz Tomas Mraz 3.9p1-10Tomas Mraz Bill Nottingham 3.9p1-9Thomas Woerner 3.9p1-8.1Nalin Dahyabhai 3.9p1-8Bill Nottingham 3.9p1-7Nalin Dahyabhai 3.9p1-6Nalin Dahyabhai Daniel Walsh 3.9p1-5Daniel Walsh 3.9p1-4Daniel Walsh 3.9p1-3Daniel Walsh 3.9p1-2Daniel Walsh 3.9p1-1Alan Cox 3.8.1p1-5Daniel Walsh 3.8.1p1-4Elliot Lee Daniel Walsh 3.8.1p1-2Nalin Dahyabhai 3.8.1p1-1Daniel Walsh 3.6.1p2-36Nalin Dahyabhai 3.8.1p1-0Daniel Walsh 3.6.1p2-35Daniel Walsh 3.6.1p2-34Daniel Walsh 3.6.1p2-33Thomas Woerner 3.6.1p2-32Daniel Walsh 3.6.1p2-31Daniel Walsh 3.6.1p2-30Daniel Walsh 3.6.1p2-29Elliot Lee Daniel Walsh 3.6.1p2-27Daniel Walsh 3.6.1p2-26Daniel Walsh 3.6.1p2-25Daniel Walsh 3.6.1p2-24Nalin Dahyabhai Nalin Dahyabhai David Woodhouse 3.6.1p2-23Nalin Dahyabhai Daniel Walsh 3.6.1p2-22Daniel Walsh 3.6.1p2-21.selDaniel Walsh 3.6.1p2-21Daniel Walsh 3.6.1p2-20.selNalin Dahyabhai Nalin Dahyabhai 3.6.1p2-19Nalin Dahyabhai 3.6.1p2-18Daniel Walsh 3.6.1p2-17Daniel Walsh 3.6.1p2-16.selBill Nottingham 3.6.1p2-15Bill Nottingham 3.6.1p2-14Daniel Walsh 3.6.1p2-13.selNalin Dahyabhai 3.6.1p2-12Nalin Dahyabhai 3.6.1p2-11Daniel Walsh 3.6.1p2-10Daniel Walsh 3.6.1p2-9.selDaniel Walsh 3.6.1p2-8Nalin Dahyabhai 3.6.1p2-7Nalin Dahyabhai 3.6.1p2-6Daniel Walsh 3.6.1p2-5Nalin Dahyabhai 3.6.1p2-4Nalin Dahyabhai 3.6.1p2-3Nalin Dahyabhai 3.6.1p2-2Nalin Dahyabhai 3.6.1p2-1Elliot Lee Florian La Roche Nalin Dahyabhai 3.5p1-6Nalin Dahyabhai 3.5p1-5Tim Powers Nalin Dahyabhai 3.5p1-3Nalin Dahyabhai 3.5p1-2Nalin Dahyabhai 3.5p1-1Nalin Dahyabhai 3.4p1-3Than Ngo 3.4p1-2.1Curtis Zinzilieta 3.4p1-2gssNalin Dahyabhai 3.4p1-2Nalin Dahyabhai 3.4p1-1Nalin Dahyabhai 3.3p1-2Nalin Dahyabhai 3.3p1-1Tim Powers Nalin Dahyabhai 3.2.3p1-3Nalin Dahyabhai 3.2.3p1-2Nalin Dahyabhai 3.2.3p1-1Nalin Dahyabhai 3.2.2p1-1Nalin Dahyabhai 3.1p1-4Nalin Dahyabhai 3.1p1-3Nalin Dahyabhai 3.1p1-2gssNalin Dahyabhai 3.1p1-2Nalin Dahyabhai 3.1p1-1Nalin Dahyabhai 3.1p1-0Nalin Dahyabhai SNAP-20020305Nalin Dahyabhai SNAP-20020220Nalin Dahyabhai 3.0.2p1-3Nalin Dahyabhai 3.0.2p1-2Nalin Dahyabhai Nalin Dahyabhai 3.0.2p1-1Nalin Dahyabhai 3.0.1p1-1Nalin Dahyabhai Nalin Dahyabhai 3.0p1-1Nalin Dahyabhai Nalin Dahyabhai 2.9p2-9Bernhard Rosenkraenzer 2.9p2-8Nalin Dahyabhai 2.9p2-7Nalin Dahyabhai 2.9p2-6Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Preston Brown Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Trond Eivind Glomsrxd Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller Damien Miller - Fix for CVE-2018-15473: User enumeration via malformed packets in authentication requests- Fix for CVE-2016-6210: User enumeration via covert timing channel (#1357442)- Allow to use ibmca crypto hardware (#1397547) - CVE-2015-8325: privilege escalation via user's PAM environment and UseLogin=yes (1405374)- Fix missing hmac-md5-96 from server offer (#1373836)- Prevent infinite loop when Ctrl+Z pressed at password prompt (#1218424) - Remove RC4 cipher and MD5 based MAC from the default client proposal (#1373836)- Resolve sftp force permission colision with umask (#1341747) - Relax bits needed check to allow hmac-sha2-512 with gss-group1-sha1- (#1353359) - close ControlPersist background process stderr when not in debug mode (#1335539) - Do not add a message "The agent has no identities." in ~/.ssh/authorized_keys (#1353410)- ssh-copy-id: SunOS does not understand ~ (#1327547)- CVE-2016-3115: missing sanitisation of input for X11 forwarding (#1317817)- Restore functionallity of pam_ssh_agent_auth in FIPS mode (#1278315) - Initialize devices_done variable for challenge response (#1281468) - Update behaviour of X11 forwarding to match upstream (#1299048)- Ammends previous release, fixing typos and behaviour changes- pam_ssh_agent_auth: Provide authorized_keys_command= feature (#1299555) - CVE-2016-1908: Prevent possible fallback from untrusted X11 forwarding (#1299048)- Fix segfaulting agent during removal of CAC credentials (#1253612) - Make pam_namespace usage consistent across system-wide (#1250069) - Add GSSAPIKexAlgorithms option for both server and client (#1253060) - ECDSA host key not loaded by sshd by default (fix man page) (#1218070) - Resolve segfault in pam_ssh_agent_auth in FIPS mode (#1278315) - Backport Match LocalAddress from OpenSSH 6.1 (#1211673) - Backport security patches from openssh-6.9 and 7.0 (#1281468) - CVE-2015-5352: XSECURITY restrictions bypass under certain conditions - CVE-2015-5600: MaxAuthTries limit bypass via duplicates in KbdInteractiveDevices - CVE-2015-6563: Privilege separation weakness related to PAM support - CVE-2015-6564: Use-after-free bug related to PAM support - weakness of agent locking (ssh-add -x) to password guessing (#1238238) - Clarify a keyword that appears in multiple matching Match blocks (#1219820) - Clarity of TERM variable in AcceptEnv and SendEnv options (#1285003) - Enhance AllowGroups documentation in man page (#1284997)- SSH2_MSG_DISCONNECT for user initiated disconnect follow RFC 4253 (#1222500)- Add missing dot in ssh manual page (#1197763)- Fix minor problems found by covscan/gcc (#1196063) - Add missing options in man ssh (#1197763) - Add KbdInteractiveAuthentication documentation to man sshd_config (#1109251) - Correct freeing newkeys structure when privileged monitor exits (#1208584)- Fix problems with failing persistent connections (#1131585) - Fix memory leaks in auditing patch (#1208584)- Better approach to logging sftp commands in chroot- Make sshd -T write all config options and add missing Cipher, MAC to man (#1109251)- Add missing ControlPersist option to man ssh (#1197763) - Add sftp option to force mode of created files (#1191055) - Do not load RSA1 keys in FIPS mode (#1197072) - Add missing support for ECDSA in ssh-keyscan (#1196331) - Fix coverity/gcc issues (#1196063) - Backport wildcard functionality for PermitOpen in sshd_config file (#1159055) - Ability to specify an arbitrary LDAP filter in ldap.conf (#1119506)- Fix ControlPersist option with ProxyCommand (#1160487) - Backport fix of ssh-keygen with error : gethostname: File name too long (#1161454) - Backport show remote address instead of UNKNOWN after timeout at password prompt (#1161449) - Fix printing of extensions in v01 certificates (#1093869) - Fix confusing audit trail for unsuccessful logins (#1127312) - Don't close fds for internal sftp sessions (#1085710) - Fix config parsing quotes (backport) (#1134938) - Enable logging in chroot into separate file (#1172224) - Fix auditing when using combination of ForcedCommand and PTY (#1131585) - Fix ssh-copy-id on non-sh remote shells (#1135521)- ignore SIGXFSZ in postauth monitor child (#1133906)- don't try to generate DSA keys in the init script in FIPS mode (#1118735)- ignore SIGPIPE in ssh-keyscan (#1108836)- ssh-add: fix fatal exit when removing card (#1042519)- fix race in backported ControlPersist patch (#953088)- skip requesting smartcard PIN when removing keys from agent (#1042519)- add possibility to autocreate only RSA key into initscript (#1111568) - fix several issues reported by coverity- x11 forwarding - be less restrictive when can't bind to one of available addresses (#1027197) - better fork error detection in audit patch (#1028643) - fix openssh-5.3p1-x11.patch for non-linux platforms (#1100913)- prevent a server from skipping SSHFP lookup (#1081338) CVE-2014-2653 - ignore environment variables with embedded '=' or '\0' characters CVE-2014-2532 - backport ControlPersist option (#953088) - log when a client requests an interactive session and only sftp is allowed (#997377) - don't try to load RSA1 host key in FIPS mode (#1009959) - restore Linux oom_adj setting when handling SIGHUP to maintain behaviour over restart (#1010429) - ssh-keygen -V - relative-specified certificate expiry time should be relative to current time (#1022459)- adjust the key echange DH groups and ssh-keygen according to SP800-131A (#993580) - log failed integrity test if /etc/system-fips exists (#1020803) - backport ECDSA and ECDH support (#1028335)- use dracut-fips package to determine if a FIPS module is installed (#1001565)- use dist tag in suffixes for hmac checksum files (#1001565)- use hmac_suffix for ssh{,d} hmac checksums (#1001565)- fix NSS keys support (#1004763)- change default value of MaxStartups - CVE-2010-5107 - #908707 - add -fips subpackages that contains the FIPS module files (#1001565)- don't use SSH_FP_MD5 for fingerprints in FIPS mode (#998835)- do ssh_gssapi_krb5_storecreds() twice - before and after pam sesssion (#974096)- bump the minimum value of SSH_USE_STRONG_RNG to 14 according to SP800-131A (#993577) - fixed an issue with broken 'ssh -I pkcs11' (#908038) - abort non-subsystem sessions to forced internal sftp-server (#993509) - reverted 'store krb5 credentials after a pam session is created (#974096)'- Add support for certificate key types for users and hosts (#906872) - Apply RFC3454 stringprep to banners when possible (#955792)- fix chroot logging issue (#872169) - change the bad key permissions error message (#880575) - fix a race condition in ssh-agent (#896561) - backport support for PKCS11 from openssh-5.4p1 (#908038) - add a KexAlgorithms knob to the client and server configuration (#951704) - fix parsing logic of ldap.conf file (#954094) - Add HMAC-SHA2 algorithm support (#969565) - store krb5 credentials after a pam session is created (#974096)- Add a 'netcat mode' (ssh -W) (#860809)- fix the required authentications patch (#869903)- check return value of PK11_Authenticate in ssh-add -n (#782912) - document available methods to RequiredAuthentications[12] (#821641) - fix ssh-copy-id (#836650) - fix segmentation fault in ssh client (#836655) - update pam_ssh_agent_auth to 0.9.3 upstream version - fix segfault in su when pam_ssh_agent_auth is used and the ssh-agent is not running (#834404)- fixes in openssh-5.3p1-required-authentications.patch (#657378)- fix forward on non-localhost ports with IPv6 (#732955)- clear SELinux exec context before exec passwd (#814691)- prevent post-auth resource exhaustion (#809938)- don't escape backslah in a banner (#809619)- fix various issues in openssh-5.3p1-required-authentications.patch (#805901)- fix out-of-memory killer patch (#744236)- remove openssh-4.3p2-no-v6only.patch (#732955) - adjust Linux out-of-memory killer (#744236) - fix sshd init script - check existence of crypto (#797384) - add RequiredAuthentications[12] (#657378) - run privsep slave process as the users SELinux context (#798241)- drop CAVS test driver (#782091)- enable aes-ctr ciphers use the EVP engines from OpenSSL such as the AES-NI (#756929) - add CAVS test driver for the aes-ctr ciphers (#782091)- mention IPv6 in scp and sftp man pages (#695781)- enable another context when run in chroot (#685060)- enable big uid logs for 32bit archs (#731939)- save ssh-askpass's debuginfo (#729021)- repair man pages (#728459)- restore init script (#698777)- fix hang on exit (#714554)- mention IPv6 in man pages (#695781)- repair access to chroted sftp directory (#685060)- make it possible to build openssh without downstream patches (#708389)- improve reseed documentation (#708056)- improve ldap backend documentation (#705397)- improve reseed (#708056)- do not crash when reporting cannot bind a port (#691320) - improve documentation- do not crash when got double SIGHUP (#690391) - add /etc/sysconfig/sshd- improve reseed (#681296)- merge keycat to servers - add reseed (#681296)- improve sftp option to set umask (#657059)- improve audit (#642792)- improve ldap backend (#455350)- improve keycat (#676665)- resolve chroot problem (#681202)- add keycat support (#676665) - improve audit (#680722)- add rello to ppc64 (#642927)- improve audit (#642792)- improve ldap backend (#455350)- improve audit session key destroy (#642792)- add ldap backend (#455350) - skip sshd init's rsa1 creation in fips mode (#672870) - improve audit session key destroy (#642792)- add documentation for nss keys (#670515)- add audit server key destroy (#642792)- turn off relro and new on ppc64 (#642927)- add audit session key destroy (#642792)- improove clientloop (#656844)- add sftp option to set umask (#657059)- add option to switch out krb5_kuserok (#577998)- properly restore euid in case connect to the ssh-agent socket fails (#656415)- Repaired the problem with puting entries with very big uid into lastlog (#631787)- Added README.nss (#652249)- Added -z relro -z now to LDFLAGS (#642927)- repair gsskex auth (#646286)- add audit kex and keyusage (#642792)- repair bad stderr handling (#631757)- set correct socket name length in abstract socket (#621691)- replace authorized key command by the upstream version (#613627)- use abstract socket for X11 where possible (#598671)- parsing authorised file option (#598814)- compile with -fno-strict-alias (#596192)- synchronize uid and gid for the user sshd (#594084)- source krb5-devel profile script only if exists (#581444)- Allow to use hardware crypto if awailable (#563574)- set FD_CLOEXEC on accepted socket (#541809)- add RAND_cleanup at the exit of each program using RAND (#557166)- Rebuild for new libaudit- Update audit patch - Update pka patch- Update NSS key patch including future SEC_ERROR_LOCKED_PASSWORD (#537411, #356451)- Add gssapi key exchange patch (#455351)- Add public key agent patch (#455350)- Repair canohost patch to allow gssapi to work when host is acessed via pipe proxy (#531849)- Modify the init script to prevent it to hang during generating the keys (#515145)- Add README.nss- Add pam_ssh_agent_auth module to a subpackage.- Reenable audit.- Upgrade to new wersion 5.3p1- Resolve locking in ssh-add (#491312)- Repair initscript to be acord to guidelines (#521860) - Add bugzilla# to application of edns and xmodifiers patch- Changed pam stack to password-auth- Dropped homechroot patch- Add check for nosuid, nodev in homechroot- add correct patch for ip-opts- replace ip-opts patch by an upstream candidate version- rearange selinux patch to be acceptable for upstream - replace seftp patch by an upstream version- merged xmodifiers to redhat patch - merged gssapi-role to selinux patch - merged cve-2007_3102 to audit patch - sesftp patch only with WITH_SELINUX flag - rearange sesftp patch according to upstream request- minor change in sesftp patch- rebuilt with new openssl- Added dnssec support. (#205842)- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- only INTERNAL_SFTP can be home-chrooted - save _u and _r parts of context changing to sftpd_t- changed internal-sftp context to sftpd_t- changed home length path patch to upstream version- create '~/.ssh/known_hosts' within proper context- length of home path in ssh now limited by PATH_MAX - correct timezone with daylight processing- final version chroot %h (sftp only)- repair broken ls in chroot %h- add XMODIFIERS to exported environment (#495690)- allow only protocol 2 in the FIPS mode- do integrity verification only on binaries which are part of the OpenSSH FIPS modules- log if FIPS mode is initialized - make aes-ctr cipher modes work in the FIPS mode- fix logging after chroot - enable non root users to use chroot %h in internal-sftp- add AES-CTR ciphers to the FIPS mode proposal- upgrade to new upstream release- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- drop obsolete triggers - add testing FIPS mode support - LSBize the initscript (#247014)- enable use of ssl engines (#481100)- remove obsolete --with-rsh (#478298) - add pam_sepermit to allow blocking confined users in permissive mode (#471746) - move system-auth after pam_selinux in the session stack- set FD_CLOEXEC on channel sockets (#475866) - adjust summary - adjust nss-keys patch so it is applicable without selinux patches (#470859)- fix compatibility with some servers (#466818)- fixed zero length banner problem (#457326)- upgrade to new upstream release - fixed a problem with public key authentication and explicitely specified SELinux role- pass the connection socket to ssh-keysign (#447680)- add LANGUAGE to accepted/sent environment variables (#443231) - use pam_selinux to obtain the user context instead of doing it itself - unbreak server keep alive settings (patch from upstream) - small addition to scp manpage- upgrade to new upstream (#441066) - prevent initscript from killing itself on halt with upstart (#438449) - initscript status should show that the daemon is running only when the main daemon is still alive (#430882)- fix race on control master and cleanup stale control socket (#436311) patches by David Woodhouse- set FD_CLOEXEC on client socket - apply real fix for window size problem (#286181) from upstream - apply fix for the spurious failed bind from upstream - apply open handle leak in sftp fix from upstream- we build for sparcv9 now and it needs -fPIE- fix gssapi auth with explicit selinux role requested (#427303) - patch by Nalin Dahyabhai- explicitly source krb5-devel profile script- Rebuild for openssl bump- do not copy /etc/localtime into the chroot as it is not necessary anymore (#193184) - call setkeycreatecon when selinux context is established - test for NULL privk when freeing key (#391871) - patch by Pierre Ossman- revert default window size adjustments (#286181)- upgrade to latest upstream - use libedit in sftp (#203009) - fixed audit log injection problem (CVE-2007-3102)- fix sftp client problems on write error (#247802) - allow disabling autocreation of server keys (#235466)- experimental NSS keys support - correctly setup context when empty level requested (#234951)- mls level check must be done with default role same as requested- make profile.d/gnome-ssh-askpass.* regular files (#226218)- reject connection if requested mls range is not obtained (#229278)- improve Buildroot - remove duplicate /etc/ssh from files- support mls on labeled networks (#220487) - support mls level selection on unlabeled networks - allow / in usernames in scp (only beginning /, ./, and ../ is special)- update to 4.5p1 (#212606)- fix gssapi with DNS loadbalanced clusters (#216857)- improved pam_session patch so it doesn't regress, the patch is necessary for the pam_session_close to be called correctly as uid 0- CVE-2006-5794 - properly detect failed key verify in monitor (#214641)- merge sshd initscript patches - kill all ssh sessions when stop is called in halt or reboot runlevel - remove -TERM option from killproc so we don't race on sshd restart- improve gssapi-no-spnego patch (#208102) - CVE-2006-4924 - prevent DoS on deattack detector (#207957) - CVE-2006-5051 - don't call cleanups from signal handler (#208459)- don't report duplicate syslog messages, use correct local time (#189158) - don't allow spnego as gssapi mechanism (from upstream) - fixed memleaks found by Coverity (from upstream) - allow ip options except source routing (#202856) (patch by HP)- drop the pam-session patch from the previous build (#201341) - don't set IPV6_V6ONLY sock opt when listening on wildcard addr (#201594)- dropped old ssh obsoletes - call the pam_session_open/close from the monitor when privsep is enabled so it is always called as root (patch by Darren Tucker)- improve selinux patch (by Jan Kiszka) - upstream patch for buffer append space error (#191940) - fixed typo in configure.ac (#198986) - added pam_keyinit to pam configuration (#198628) - improved error message when askpass dialog cannot grab keyboard input (#198332) - buildrequires xauth instead of xorg-x11-xauth - fixed a few rpmlint warnings- rebuild- don't request pseudoterminal allocation if stdin is not tty (#188983)- allow access if audit is not compiled in kernel (#183243)- enable the subprocess in chroot to send messages to system log - sshd should prevent login if audit call fails- print error from scp if not remote (patch by Bjorn Augustsson #178923)- new version- bump again for double-long bug on ppc(64)- fixed another place where syslog was called in signal handler - pass locale environment variables to server, accept them there (#179851)- new version, dropped obsolete patches- hopefully make the askpass dialog less confusing (#174765)- rebuilt- drop x11-ssh-askpass from the package - drop old build_6x ifs from spec file - improve gnome-ssh-askpass so it doesn't reveal number of passphrase characters to person looking at the display - less hackish fix for the __USE_GNU problem- work around missing gccmakedep by wrapping makedepend in a local script - remove now-obsolete build dependency on "xauth"- xorg-x11-devel -> libXt-devel - rebuild for new xauth location so X forwarding works - buildreq audit-libs-devel - buildreq automake for aclocal - buildreq imake for xmkmf - -D_GNU_SOURCE in flags in order to get it to build Ugly hack to workaround openssh defining __USE_GNU which is not allowed and causes problems according to Ulrich Drepper fix this the correct way after FC5test1- rebuild against new openssl- put back the possibility to skip SELinux patch - add patch for user login auditing by Steve Grubb- Change selinux patch to use get_default_context_with_rolelevel in libselinux.- Update selinux patch to use getseuserbyname- use include instead of pam_stack in pam config - use fork+exec instead of system in scp - CVE-2006-0225 (#168167) - upstream patch for displaying authentication errors- upgrade to a new upstream version- use x11-ssh-askpass if openssh-askpass-gnome is not installed (#165207) - install ssh-copy-id from contrib (#88707)- don't deadlock on exit with multiple X forwarded channels (#152432) - don't use X11 port which can't be bound on all IP families (#163732)- fix small regression caused by the nologin patch (#161956) - fix race in getpeername error checking (mindrot #1054)- use only pam_nologin for nologin testing- upgrade to a new upstream version - call pam_loginuid as a pam session module- link libselinux only to sshd (#157678)- fixed Local/RemoteForward in ssh_config.5 manpage - fix fatal when Local/RemoteForward is used and scp run (#153258) - don't leak user validity when using krb5 authentication- upgrade to 4.0p1 - remove obsolete groups patch- rebuilt- rebuild so that configure can detect that krb5_init_ets is gone now- don't call syslog in signal handler - allow password authentication when copying from remote to remote machine (#103364)- add spaces to messages in initscript (#138508)- enable trusted forwarding by default if X11 forwarding is required by user (#137685 and duplicates) - disable protocol 1 support by default in sshd server config (#88329) - keep the gnome-askpass dialog above others (#69131)- change permissions on pam.d/sshd to 0644 (#64697) - patch initscript so it doesn't kill opened sessions if the sshd daemon isn't running anymore (#67624)- don't use initlog- fixed PIE build for all architectures- add a --enable-vendor-patchlevel option which allows a ShowPatchLevel option to enable display of a vendor patch level during version exchange (#120285) - configure with --disable-strip to build useful debuginfo subpackages- when using gtk2 for askpass, don't buildprereq gnome-libs-devel- build- disable ACSS support- Change selinux patch to use get_default_context_with_role in libselinux.- Fix patch * Bad debug statement. * Handle root/sysadm_r:kerberos- Modify Colin Walter's patch to allow specifying rule during connection- Fix TTY handling for SELinux- Update to upstream- Apply buildreq fixup patch (#125296)- Clean up patch for upstream submission.- rebuilt- Remove use of pam_selinux and patch selinux in directly.- request gssapi-with-mic by default but not delegation (flag day for anyone who used previous gssapi patches) - no longer request x11 forwarding by default- Change pam file to use open and close with pam_selinux- update to 3.8.1p1 - add workaround from CVS to reintroduce passwordauth using pam- Remove CLOSEXEC on STDERR* Wed Mar 03 2004 Phil Knirsch 3.6.1p2-33.30.1 - Built RHLE3 U2 update package.- Close file descriptors on exec- fixed pie build- Add restorecon to startup scripts- Add multiple qualified to openssh- Eliminate selinux code and use pam_selinux- rebuilt- turn off pie on ppc- fix is_selinux_enabled- Rebuild to grab shared libselinux- turn on selinux- un#ifdef out code for reporting password expiration in non-privsep mode (#83585)- add machinery to build with/without -fpie/-pie, default to doing so- Don't whinge about getsockopt failing (#109161)- add missing buildprereq on zlib-devel (#104558)- turn selinux off- turn selinux on- turn selinux off- turn selinux on- additional fix for apparently-never-happens double-free in buffer_free() - extend fix for #103998 to cover SSH1- rebuild- additional buffer manipulation cleanups from Solar Designer- turn selinux off- turn selinux on- rebuild- additional buffer manipulation fixes (CAN-2003-0695)- turn selinux on- rebuild- apply patch to store the correct buffer size in allocated buffers (CAN-2003-0693) - skip the initial PAM authentication attempt with an empty password if empty passwords are not permitted in our configuration (#103998)- turn selinux off- turn selinux on- Add BuildPreReq gtk2-devel if gtk2- rebuild- modify patch which clears the supplemental group list at startup to only complain if setgroups() fails if sshd has euid == 0 - handle krb5 installed in %{_prefix} or elsewhere by using krb5-config- Add SELinux patch- rebuild- rebuild- rebuild- update to 3.6.1p2- rebuilt- add patch for getsockopt() call to work on bigendian 64bit archs- move scp to the -clients subpackage, because it directly depends on ssh which is also in -clients (#84329)- rebuild- rebuilt- rebuild- patch PAM configuration to use relative path names for the modules, allowing us to not worry about which arch the modules are built for on multilib systems- update to 3.5p1, merging in filelist/perm changes from the upstream spec- merge- fix to build on multilib systems- added gssapi patches and uncommented patch here- pull patch from CVS to fix too-early free in ssh-keysign (#70009)- 3.4p1 - drop anon mmap patch- rework the close-on-exit docs - include configuration file man pages - make use of nologin as the privsep shell optional- update to 3.3p1 - merge in spec file changes from upstream (remove setuid from ssh, ssh-keysign) - disable gtk2 askpass - require pam-devel by filename rather than by package for erratum - include patch from Solar Designer to work around anonymous mmap failures- automated rebuild- don't require autoconf any more- build gnome-ssh-askpass with gtk2- update to 3.2.3p1 - merge in spec file changes from upstream- update to 3.2.2p1- drop buildreq on db1-devel - require pam-devel by package name - require autoconf instead of autoconf253 again- pull patch from CVS to avoid printing error messages when some of the default keys aren't available when running ssh-add - refresh to current revisions of Simon's patches- reintroduce Simon's gssapi patches - add buildprereq for autoconf253, which is needed to regenerate configure after applying the gssapi patches - refresh to the latest version of Markus's patch to build properly with older versions of OpenSSL- bump and grind (through the build system)- require sharutils for building (mindrot #137) - require db1-devel only when building for 6.x (#55105), which probably won't work anyway (3.1 requires OpenSSL 0.9.6 to build), but what the heck - require pam-devel by file (not by package name) again - add Markus's patch to compile with OpenSSL 0.9.5a (from http://bugzilla.mindrot.org/show_bug.cgi?id=141) and apply it if we're building for 6.x- update to 3.1p1- update to SNAP-20020305 - drop debug patch, fixed upstream- update to SNAP-20020220 for testing purposes (you've been warned, if there's anything to be warned about, gss patches won't apply, I don't mind)- add patches from Simon Wilkinson and Nicolas Williams for GSSAPI key exchange, authentication, and named key support- remove dependency on db1-devel, which has just been swallowed up whole by gnome-libs-devel- adjust build dependencies so that build6x actually works right (fix from Hugo van der Kooij)- update to 3.0.2p1- update to 3.0.1p1- update to current CVS (not for use in distribution)- merge some of Damien Miller changes from the upstream 3.0p1 spec file and init script- update to 3.0p1 - update to x11-ssh-askpass 1.2.4.1 - change build dependency on a file from pam-devel to the pam-devel package - replace primes with moduli- incorporate fix from Markus Friedl's advisory for IP-based authorization bugs- Merge changes to rescue build from current sysadmin survival cd- fix scp's server's reporting of file sizes, and build with the proper preprocessor define to get large-file capable open(), stat(), etc. (sftp has been doing this correctly all along) (#51827) - configure without --with-ipv4-default on RHL 7.x and newer (#45987,#52247) - pull cvs patch to fix support for /etc/nologin for non-PAM logins (#47298) - mark profile.d scriptlets as config files (#42337) - refer to Jason Stone's mail for zsh workaround for exit-hanging quasi-bug - change a couple of log() statements to debug() statements (#50751) - pull cvs patch to add -t flag to sshd (#28611) - clear fd_sets correctly (one bit per FD, not one byte per FD) (#43221)- add db1-devel as a BuildPrerequisite (noted by Hans Ecke)- pull cvs patch to fix remote port forwarding with protocol 2- pull cvs patch to add session initialization to no-pty sessions - pull cvs patch to not cut off challengeresponse auth needlessly - refuse to do X11 forwarding if xauth isn't there, handy if you enable it by default on a system that doesn't have X installed (#49263)- don't apply patches to code we don't intend to build (spotted by Matt Galgoci)- pass OPTIONS correctly to initlog (#50151)- switch to x11-ssh-askpass 1.2.2- rebuild in new environment- disable the gssapi patch- update to 2.9p2 - refresh to a new version of the gssapi patch- change Copyright: BSD to License: BSD - add Markus Friedl's unverified patch for the cookie file deletion problem so that we can verify it - drop patch to check if xauth is present (was folded into cookie patch) - don't apply gssapi patches for the errata candidate - clear supplemental groups list at startup- fix an error parsing the new default sshd_config - add a fix from Markus Friedl (via openssh-unix-dev) for ssh-keygen not dealing with comments right- add in Simon Wilkinson's GSSAPI patch to give it some testing in-house, to be removed before the next beta cycle because it's a big departure from the upstream version- finish marking strings in the init script for translation - modify init script to source /etc/sysconfig/sshd and pass $OPTIONS to sshd at startup (change merged from openssh.com init script, originally by Pekka Savola) - refuse to do X11 forwarding if xauth isn't there, handy if you enable it by default on a system that doesn't have X installed- update to 2.9 - drop various patches that came from or went upstream or to or from CVS- only require initscripts 5.00 on 6.2 (reported by Peter Bieringer)- remove explicit openssl requirement, fixes builddistro issue - make initscript stop() function wait until sshd really dead to avoid races in condrestart- mention that challengereponse supports PAM, so disabling password doesn't limit users to pubkey and rsa auth (#34378) - bypass the daemon() function in the init script and call initlog directly, because daemon() won't start a daemon it detects is already running (like open connections) - require the version of openssl we had when we were built- make do_pam_setcred() smart enough to know when to establish creds and when to reinitialize them - add in a couple of other fixes from Damien for inclusion in the errata- update to 2.5.2p2 - call setcred() again after initgroups, because the "creds" could actually be group memberships- update to 2.5.2p1 (includes endianness fixes in the rijndael implementation) - don't enable challenge-response by default until we find a way to not have too many userauth requests (we may make up to six pubkey and up to three password attempts as it is) - remove build dependency on rsh to match openssh.com's packages more closely- remove dependency on openssl -- would need to be too precise- rebuild in new environment- Revert the patch to move pam_open_session. - Init script and spec file changes from Pekka Savola. (#28750) - Patch sftp to recognize '-o protocol' arguments. (#29540)- Chuck the closing patch. - Add a trigger to add host keys for protocol 2 to the config file, now that configuration file syntax requires us to specify it with HostKey if we specify any other HostKey values, which we do.- Redo patch to move pam_open_session after the server setuid()s to the user. - Rework the nopam patch to use be picked up by autoconf.- Update for 2.5.1p1. - Add init script mods from Pekka Savola. - Tweak the init script to match the CVS contrib script more closely. - Redo patch to ssh-add to try to adding both identity and id_dsa to also try adding id_rsa.- Update for 2.5.0p1. - Use $RPM_OPT_FLAGS instead of -O when building gnome-ssh-askpass - Resync with parts of Damien Miller's openssh.spec from CVS, including update of x11 askpass to 1.2.0. - Only require openssl (don't prereq) because we generate keys in the init script now.- Don't open a PAM session until we've forked and become the user (#25690). - Apply Andrew Bartlett's patch for letting pam_authenticate() know which host the user is attempting a login from. - Resync with parts of Damien Miller's openssh.spec from CVS. - Don't expose KbdInt responses in debug messages (from CVS). - Detect and handle errors in rsa_{public,private}_decrypt (from CVS).- i18n-tweak to initscript.- More gettextizing. - Close all files after going into daemon mode (needs more testing). - Extract patch from CVS to handle auth banners (in the client). - Extract patch from CVS to handle compat weirdness.- Finish with the gettextizing.- Fix a bug in auth2-pam.c (#23877) - Gettextize the init script.- Incorporate a switch for using PAM configs for 6.x, just in case.- Incorporate Bero's changes for a build specifically for rescue CDs.- Don't treat pam_setcred() failure as fatal unless pam_authenticate() has succeeded, to allow public-key authentication after a failure with "none" authentication. (#21268)- Update to x11-askpass 1.1.1. (#21301) - Don't second-guess fixpaths, which causes paths to get fixed twice. (#21290)- Merge multiple PAM text messages into subsequent prompts when possible when doing keyboard-interactive authentication.- Disable the built-in MD5 password support. We're using PAM. - Take a crack at doing keyboard-interactive authentication with PAM, and enable use of it in the default client configuration so that the client will try it when the server disallows password authentication. - Build with debugging flags. Build root policies strip all binaries anyway.- Use DESTDIR instead of %makeinstall. - Remove /usr/X11R6/bin from the path-fixing patch.- Add the primes file from the latest snapshot to the main package (#20884). - Add the dev package to the prereq list (#19984). - Remove the default path and mimic login's behavior in the server itself.- Resync with conditional options in Damien Miller's .spec file for an errata. - Change libexecdir from %{_libexecdir}/ssh to %{_libexecdir}/openssh.- Update to OpenSSH 2.3.0p1. - Update to x11-askpass 1.1.0. - Enable keyboard-interactive authentication.- Update to ssh-askpass-x11 1.0.3. - Change authentication related messages to be private (#19966).- Patch ssh-keygen to be able to list signatures for DSA public key files it generates.- Add BuildPreReq on /usr/include/security/pam_appl.h to be sure we always build PAM authentication in. - Try setting SSH_ASKPASS if gnome-ssh-askpass is installed. - Clean out no-longer-used patches. - Patch ssh-add to try to add both identity and id_dsa, and to error only when neither exists.- Update x11-askpass to 1.0.2. (#17835) - Add BuildPreReqs for /bin/login and /usr/bin/rsh so that configure will always find them in the right place. (#17909) - Set the default path to be the same as the one supplied by /bin/login, but add /usr/X11R6/bin. (#17909) - Try to handle obsoletion of ssh-server more cleanly. Package names are different, but init script name isn't. (#17865)- Update to 2.2.0p1. (#17835) - Tweak the init script to allow proper restarting. (#18023)- Update to 20000823 snapshot. - Change subpackage requirements from %{version} to %{version}-%{release} - Back out the pipe patch.- Update to 2.1.1p4, which includes fixes for config file parsing problems. - Move the init script back. - Add Damien's quick fix for wackiness.- Update to 2.1.1p3, which includes fixes for X11 forwarding and strtok().- Move condrestart to server postun. - Move key generation to init script. - Actually use the right patch for moving the key generation to the init script. - Clean up the init script a bit.- Fix X11 forwarding, from mail post by Chan Shih-Ping Richard.- Update to 2.1.1p2. - Use of strtok() considered harmful.- Get the build root out of the man pages.- Add and use condrestart support in the init script. - Add newer initscripts as a prereq.- Build in new environment (release 2) - Move -clients subpackage to Applications/Internet group- Update to 2.2.1p1- Patch to build with neither RSA nor RSAref. - Miscellaneous FHS-compliance tweaks. - Fix for possibly-compressed man pages.- Updated for new location - Updated for new gnome-ssh-askpass build- Added Jim Knoble's askpass- Split subpackages further based on patch from jim knoble - Added 'Obsoletes' directives- Use make install - Subpackages- Added links for slogin - Fixed perms on manpages- Renamed init script- Back to old binary names- Use autoconf - New binary names- Initial RPMification, based on Jan "Yenya" Kasprzak's spec.0.9.3-124.el6_100.9.3-124.el6_10pam_ssh_agent_auth.sopam_ssh_agent_auth-0.9.3LICENSE.OpenSSLOPENSSH_LICENSEpam_ssh_agent_auth.8.gz/lib/security//usr/share/doc//usr/share/doc/pam_ssh_agent_auth-0.9.3//usr/share/man/man8/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m32 -march=i686 -mtune=atom -fasynchronous-unwind-tablesdrpmxz2i686-redhat-linux-gnuASCII textELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, strippedISO-8859 textdirectorytroff or preprocessor input text (gzip compressed data, from Unix, max compression)PRRRRRRRRRR R R R R RRRRRRRR?7zXZ !#,>]"k%] sM戸h9 @Q]@[8Y9kJ%AE}I-ʒo! 8۠޺>.0 aNzLalpskC6~u N|s+6:[C isXvٷjʰ#=E O+!VVlnpY6G+^v+!L>j[/Y2E颩㋱ gǫӠ=+Zyq^K=ӧg'Ƙeaݱ@5Y^Q;^W_ӑg [!?Lf΄3lz7GiĀgakQ"u ?,4'{qx[Zk(Q!=cjDHUբ ^􅾍ItR0[\HSlb. ^T-<.t؋2#(|Zbkc܅@7/i(d<:&;ge0)cFYC=*(Qt(stLݘ Oo[)/:) um:(6!19ݭr#$JuyE;W3/S#^m w#ZXU ^$yWOYǒ'MZt@BZå;S{U\țVD5Rn9q=g>+90f[umM)3&"1P5 DȾ;3fRMO .&Q(x)w& 28[^jgbi͞XFu-N"^) Dkꓦ \T\Rn8X> q*[2֖rf@r>!5Sp/I!.g_k!,~o/9A%Av,gF XT[^ktovJ|jʎ' Ó-ց[^^ P%-~䃼ո > #9U<#Ǣ6(yP*֚^ X{Zm/c7AN 5mp[jXt֞;T!Ʒ7"n?{1aʛ9)K%=9/ٝDRwzʹk|Z:yvgX;-.ኃ?4\+I?z3gR"[=M.k q>:̌,va|&<>ؙtLղ-OqL-+=Z82-*ugm8B\XUppY7ίs\_ S适 VUڈRbgv-cǍx>0J <č\LqO!b46O|N'$J拣~՜6ٵ kڊX$g0qĚ^ިJʅZ.ZbLQ"]|'@4x8/k]AGʄj{K_SD62pKUFS(y+hյ(ٚ\>`a#&Z" Nʎ @z[)˫˯,#ӶJ'ʜzRʛ4n\T& bAbPڝ־{n9$nR6DrpbjϔjMF'x:UV?J+g/#O>vo=^&SoS4۲loz'Vt~LDM+3VYD>\9jj/@>۳wl/`#SPO[\õ&SH.*.-v#^QŖ..MoX JrD^7B7fXeqb&p{HCy<)if;yW9ƴpcSef:9Z!6ğ'.mtґȽ?BcK3G F-76۾_h2N?Ӽ$=R{_Y!MpuRi̐zl/h#e i`x^w/ sJ&J̛gȠ:6{vеNð餺zM>FLoX~p.R.mr̓0m1,"WdƜe"tIu*N 47x`'~c\'(SHA2IUK" 3 {+94Or=81k@Ip=jn9C_/qݬYRVqPdaLNǾr_US=I*!NJ|۔+W雱vR!gCWF }%;g&IWR %Դ$jTۮhwxkr9!C=  t5oЧ¹cƈ@6ьP"nk_ *S? f jZl꣗=^t kHόz/:+淢s^kڒbUJ`?e9gcj͡LBg3"Iz|َ3Mjt?n2Ga)\ѾY"Eqv.Z}`򁗚g E^K9ImWSZiB 1-̤X>CV_J~]%KFL ,R#Z^C_7ᆱpFEk qZymeF̟8|}д N8lRR\[r`[Ԏo;N"ic}s~)l4;4Rn:#ۡHܛ3^QO>>?:C 3C3$MˇIc-_~?i|P6Vlsr󓿤Z_5_qfՓ/Q ͞Y`wәe"SV$p,ؖn)z/ѥMTx>FNLXbd] $͋4g_ZgډH0{A„P$v(vF|K\Q@˫?)b ZV"kz N!ޤ 4z*brڧdt@Xq(d*kl9XQ FoomkZ1j'TIRt$%󴓤 msO0CEI1eVs!'ss>;RR5IϹ uA8xA|`xW؆%g oV0e4.45x+\~ ,E^D!*B$>F:8]wBb7|M/>w;U 2 ZsVX@:ԃ3 ZsD4:7r<*{^Ε$ǕP@3ejB· DGq%M3܊n=k`; 9,8X}%Ą͟؆F\J|M sopdIY#n)wNO9eN6yna+<$F6X_0*Q;[Yiw <34R͠ &il`C^[/9x$ު)!1..k'W8zF-=[{Ʒ(dLY@Z$8IyLeVFNBbϬhS:{HH>Wʮ?ZyiaSZ)Suh% cyКya+=Ja' &c dd[Aᗭ0#5Y`@d%b݅B p?PӪZ."Y%hx?}4@י10`1$GtO ZDk.Iy} c7J._Q ~,vَ#6\ۢMu?$+XbY H{>-`-@n[vL ]i(u.0$ YZ