Re: DJGPP cross compiler crashes.

2019-04-18 Thread Carlo B.
Hello,
well, I tried both versions of CYGWIN, 32 bit and 64 bit, even on different PCs.
I also tried to install different versions, 5.4.0 and 5.3.0 of djgpp-gcc.
I used Windows 7 64bit Home Premium and Windows 7 64 bit Professional.
Always the same result.
I have no idea how you can run it without errors, please note that
i586-pc-msdosdjgpp-gcc works fine until it does not link.

Sincerely.

Il giorno gio 18 apr 2019 alle ore 23:19 Hans-Bernhard Bröker
 ha scritto:
>
> Am 18.04.2019 um 16:11 schrieb Carlo B.:
>
> > I would like to signal that the DJGPP cross compiler, included into
> > the available packages, crashes as soon as you try to compile
> > something with it.
>
> Doesn't, here.  It just works.
>
>
> --
> Problem reports:   http://cygwin.com/problems.html
> FAQ:   http://cygwin.com/faq/
> Documentation: http://cygwin.com/docs.html
> Unsubscribe info:  http://cygwin.com/ml/#unsubscribe-simple
>

--
Problem reports:   http://cygwin.com/problems.html
FAQ:   http://cygwin.com/faq/
Documentation: http://cygwin.com/docs.html
Unsubscribe info:  http://cygwin.com/ml/#unsubscribe-simple



Re: DJGPP cross compiler crashes.

2019-04-18 Thread Hans-Bernhard Bröker
Am 18.04.2019 um 16:11 schrieb Carlo B.:

> I would like to signal that the DJGPP cross compiler, included into
> the available packages, crashes as soon as you try to compile
> something with it.

Doesn't, here.  It just works.


--
Problem reports:   http://cygwin.com/problems.html
FAQ:   http://cygwin.com/faq/
Documentation: http://cygwin.com/docs.html
Unsubscribe info:  http://cygwin.com/ml/#unsubscribe-simple



[ANNOUNCEMENT] openssh 8.0p1-2

2019-04-18 Thread Corinna Vinschen
The following packages have been uploaded to the Cygwin distribution:

* openssh-8.0p1-2

There's no -1 version.  I accidentally built a -2 and there's no
gain insisting on -1 as subversion, so it just is as it is.

The official release message:

OpenSSH 8.0 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.

OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.

Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots or donated to the
project. More information on donations may be found at:
http://www.openssh.com/donations.html

Security


This release contains mitigation for a weakness in the scp(1) tool
and protocol (CVE-2019-6111): when copying files from a remote system
to a local directory, scp(1) did not verify that the filenames that
the server sent matched those requested by the client. This could
allow a hostile server to create or clobber unexpected local files
with attacker-controlled content.

This release adds client-side checking that the filenames sent from
the server match the command-line request,

The scp protocol is outdated, inflexible and not readily fixed. We
recommend the use of more modern protocols like sftp and rsync for
file transfer instead.

Potentially-incompatible changes


This release includes a number of changes that may affect existing
configurations:

 * scp(1): Relating to the above changes to scp(1); the scp protocol
   relies on the remote shell for wildcard expansion, so there is no
   infallible way for the client's wildcard matching to perfectly
   reflect the server's. If there is a difference between client and
   server wildcard expansion, the client may refuse files from the
   server. For this reason, we have provided a new "-T" flag to scp
   that disables these client-side checks at the risk of
   reintroducing the attack described above.

 * sshd(8): Remove support for obsolete "host/port" syntax. Slash-
   separated host/port was added in 2001 as an alternative to
   host:port syntax for the benefit of IPv6 users. These days there
   are establised standards for this like [::1]:22 and the slash
   syntax is easily mistaken for CIDR notation, which OpenSSH
   supports for some things. Remove the slash notation from
   ListenAddress and PermitOpen; bz#2335

Changes since OpenSSH 7.9
=

This release is focused on new features and internal refactoring.

New Features


 * ssh(1), ssh-agent(1), ssh-add(1): Add support for ECDSA keys in
   PKCS#11 tokens.

 * ssh(1), sshd(8): Add experimental quantum-computing resistant
   key exchange method, based on a combination of Streamlined NTRU
   Prime 4591^761 and X25519.

 * ssh-keygen(1): Increase the default RSA key size to 3072 bits,
   following NIST Special Publication 800-57's guidance for a
   128-bit equivalent symmetric security level.

 * ssh(1): Allow "PKCS11Provider=none" to override later instances of
   the PKCS11Provider directive in ssh_config; bz#2974

 * sshd(8): Add a log message for situations where a connection is
   dropped for attempting to run a command but a sshd_config
   ForceCommand=internal-sftp restriction is in effect; bz#2960

 * ssh(1): When prompting whether to record a new host key, accept
   the key fingerprint as a synonym for "yes". This allows the user
   to paste a fingerprint obtained out of band at the prompt and
   have the client do the comparison for you.

 * ssh-keygen(1): When signing multiple certificates on a single
   command-line invocation, allow automatically incrementing the
   certificate serial number.

 * scp(1), sftp(1): Accept -J option as an alias to ProxyJump on
   the scp and sftp command-lines.

 * ssh-agent(1), ssh-pkcs11-helper(8), ssh-add(1): Accept "-v"
   command-line flags to increase the verbosity of output; pass
   verbose flags though to subprocesses, such as ssh-pkcs11-helper
   started from ssh-agent.

 * ssh-add(1): Add a "-T" option to allowing testing whether keys in
   an agent are usable by performing a signature and a verification.

 * sftp-server(8): Add a "lsets...@openssh.com" protocol extension
   that replicates the functionality of the existing SSH2_FXP_SETSTAT
   operation but does not follow symlinks. bz#2067

 * sftp(1): Add "-h" flag to chown/chgrp/chmod commands to request
   they do not follow symlinks.

 * sshd(8): Expose $SSH_CONNECTION in the PAM environment. This makes
   the connection 4-tuple available to PAM modules that wish to use
   it in decision-making. bz#2741

 * sshd(8): Add a ssh_config "Match final" predicate Matches in same
   pass as "Match canonical" but doesn't require hostname
   canonicalisation be enabled. bz#2906

 * sftp(1): Support a prefix of '@' to suppress echo of sftp batch
   commands; bz#2926

 

Re: OpenSSH 8.0 released

2019-04-18 Thread Bill Stewart
On Thu, Apr 18, 2019 at 8:46 AM Corinna Vinschen wrote:

> I know, I'm subscribed to the openssh-dev mailing list.

Understood - the intent was to inform those subscribed to the Cygwin list
who might not know already that there's something good to look forward to.

My apologies for any annoyance. Thank you for what you do!

Regards,

Bill

--
Problem reports:   http://cygwin.com/problems.html
FAQ:   http://cygwin.com/faq/
Documentation: http://cygwin.com/docs.html
Unsubscribe info:  http://cygwin.com/ml/#unsubscribe-simple



Re: OpenSSH 8.0 released

2019-04-18 Thread Corinna Vinschen
On Apr 18 08:32, Bill Stewart wrote:
> It's here:

I know, I'm subscribed to the openssh-dev mailing list.


Corinna

-- 
Corinna Vinschen
Cygwin Maintainer


signature.asc
Description: PGP signature


OpenSSH 8.0 released

2019-04-18 Thread Bill Stewart
It's here:

https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-April/037747.html

Looking forward to using the latest version in Cygwin now that it has
case-insensitive account name matching.

Thank you, Cygwin maintainers (Corinna, et al.), for all you do for the
community!

Bill

--
Problem reports:   http://cygwin.com/problems.html
FAQ:   http://cygwin.com/faq/
Documentation: http://cygwin.com/docs.html
Unsubscribe info:  http://cygwin.com/ml/#unsubscribe-simple



DJGPP cross compiler crashes.

2019-04-18 Thread Carlo B.
Hello everyone,
I would like to signal that the DJGPP cross compiler, included into
the available packages, crashes as soon as you try to compile
something with it.
To reproduce the problem, just create a simple source file with just
this line for simplicity:

int main() { return 0; }

and after calling:

i586-pc-msdosdjgpp-gcc c.c -o c.exe

you will get:

collect2: fatal error: ld terminated with signal 11 [Segmentation
fault], core dumped
compilation terminated.

I bypassed the problem by recompiling DJGPP cross compiler myself with
this utility:

https://github.com/andrewwutw/build-djgpp

however, I'm signaling the problem in case somebody would like to fix
the trouble with a working package.

Sincerely.

--
Problem reports:   http://cygwin.com/problems.html
FAQ:   http://cygwin.com/faq/
Documentation: http://cygwin.com/docs.html
Unsubscribe info:  http://cygwin.com/ml/#unsubscribe-simple