Friendly reminder about Joyent's CI builds if you want to play with the latest code within a few hours of commits landing:
https://wiki.smartos.org/display/DOC/LX+Branded+Zones#LXBrandedZones-JoyentCIbuilds

-Nahum

On 09/04/2015 09:19 AM, Coy Hile wrote:
Awesome news. Is this going to hour the next biweekly drop? Or should I build my own in the interim?



Sent via the Samsung GALAXY S® 5, an AT&T 4G LTE smartphone


-------- Original message --------
From: Sebastien Perreault <[email protected]>
Date: 09/04/2015 08:58 (GMT-05:00)
To: [email protected]
Cc: [email protected]
Subject: Re: [sdc-discuss] Heads up: OpenSSH in platform

+1

On Friday, September 4, 2015, Blake Irvin <[email protected] <mailto:[email protected]>> wrote:

    Excellent!  I applaud this pragmatic approach to keeping SmartOS
    relevant and low-friction for those new to the OS.

    Blake


    On Sep 03, 2015, at 11:15 PM, Alex Wilson <[email protected]
    <javascript:_e(%7B%7D,'cvml','[email protected]');>> wrote:

    Hi all,

    I just pushed a change to master on illumos-joyent, smartos-live and
    illumos-extra that removes SunSSH from SmartOS (and SDC) and
    replaces it
    with a patched OpenSSH 7.1p1.

    If all goes well, this will be in the next release (ie, not the
    release that
    branched this week).

    While there are some known behavioural differences (explained
    below), please
    note that the vast majority of existing SunSSH configurations,
    keys and
    plugins (such as smartlogin for SDC) will continue to work as
    they are.

    This also includes RBAC, and PAM configurations -- the new
    daemon has been
    patched to exhibit the same behaviour and use the same PAM
    service names as
    the old SunSSH it replaces.

    Important differences:



    Default key fingerprint format
    ==============================

    The default format printed by tools that produce and store key
    fingerprints
    has changed. This includes the output of 'ssh-keygen', as well
    as the format
    of the $HOME/.ssh/known_hosts file and others.

    Old key fingerprints are the MD5 hash of the public key, encoded in
    colon-separated hex. MD5 hashes are considered weak by modern
    standards and
    are generally not recommended for cryptographic use.

    Example of old format:
    $ ssh-keygen -l -f ~/.ssh/id_rsa
    2048 2c:be:e8:b1:32:02:31:aa:aa:aa:aa:aa:aa:aa:aa:aa
    alex.wilson@mbp (RSA)

    New format:
    $ ssh-keygen -l -f ~/.ssh/id_rsa
    2048 SHA256:TY9lRcv8DzAXVo8CyRdvjuxqo6tsbFFAJ1aaaaaaaaa
    alex.wilson@mbp (RSA)

    You can get the old format back by using the -E md5 option to
    most commands,
    if needed. You will likely have to remove the MD5: prefix with
    'sed'.

    "known_hosts" files from the old SunSSH version are useable and
    compatible
    with the new OpenSSH. This compatibility does not extend the
    other way,
    however. The new OpenSSH will produce known_hosts entries in the
    new format,
    which SunSSH will not understand.

    Alternative key formats
    =======================

    SunSSH supports alternative key formats (RFC4716 and PKCS8) as
    well as the
    standard SSH key format. OpenSSH will consider any keys not in
    the SSH key
    format to be invalid.

    If you've only ever used keys produced by ssh-keygen, it is
    unlikely you
    have any keys that will be affected. This does not appear to
    have been a
    widely-used feature.

    Localization (l10n) and internationalization (i18n)
    ===================================================

    SunSSH uses gettext and its own g11n module to localize strings
    such as
    error messages and commandline options. These features are not
    available in
    OpenSSH.

    All error messages and text internally generated by SSH itself
    will be in
    English and ASCII encoding. Conveniently, there are no actual
    translations
    in the gate for any of this text, so unless you've been adding
    your own
    locally this will be exactly the same behaviour you've had all
    along.

    Additionally, the in-protocol language and locale negotiation
    that was
    available when connecting from a SunSSH client to SunSSH daemon
    will no
    longer be available. The language negotiation behaviour will be
    the same as
    for OpenSSH on other systems.

    X11 forwarding
    ==============

    SunSSH's -X option has for a long time behaved as -Y does in
    other builds of
    the SSH client (it operates in "trusted" mode). After this
    change, the SSH
    client will revert to the upstream behaviour where -Y must be
    used to obtain
    trusted forwarding.

    Deprecated configuration options
    ================================

    A few configuration options from SunSSH are now deprecated. The
    daemon will
    accept them as valid options, but will ignore their values and
    they will not
    have any effect.

    * LookupClientHostnames and VerifyReverseMapping -- replaced by
    UseDNS
    * MaxAuthTriesLog -- use MaxAuthTries
    * RhostsAuthentication -- replaced by HostbasedAuthentication,
    but using
    this is in general not recommended

    * UseOpenSSLEngine -- no replacement, engines are used automatically
    * GSSAPIStoreDelegatedCredentials -- no replacement, always true
    * PreUserAuthHook -- no replacement
    * KmfPolicyDatabase -- no replacement
    * KmfPolicyName -- no replacement
    * TrustedAnchorKeyStore -- no replacement
    * UseUnsupportedSSHv1 -- no replacement
    * UseFIPS140 -- no replacement

    Additionally there are a few configuration options which were
    deprecated in
    SunSSH, which will not be accepted by the new OpenSSH builds. If
    these
    options are present in your configuration the new daemon will
    fail to start:

    * GSSKeyEx -- use GSSAPIKeyExchange
    * GSSAuthentication -- use GSSAPIAuthentication
    * GSSDelegateCreds -- use GSSAPIDelegateCredentials

    Privilege separation chroot
    ===========================

    The new daemon will chroot to the directory /var/empty as part
    of the
    privilege separation process. This directory will be created by
    the daemon
    at startup if it does not exist on your system.

    Deleting this directory after the daemon has started could
    result in a
    situation where the SSH daemon is unable to accept new logins.
    Please don't
    do that.

    Old SunSSH workarounds
    ======================

    The SunSSH daemon had code workarounds for bugs in very old
    SunSSH clients
    (from the early Solaris 10 era and earlier). These workarounds
    will not be
    available in the new daemon.



    http://www.listbox.com



--
Sebastien Perrreault
Partner
Les Technologies Alesium Inc
P: 514-298-7193
F: 514-221-3668
E: [email protected] <mailto:[email protected]>

"Life's missed opportunities, at the end, may seem more poignant to us than those we embraced--because in our imagination they have a perfection that reality can never rival." -- Roger Ebert


*smartos-discuss* | Archives <https://www.listbox.com/member/archive/184463/=now> <https://www.listbox.com/member/archive/rss/184463/22280019-340ab187> | Modify <https://www.listbox.com/member/?&;> Your Subscription [Powered by Listbox] <http://www.listbox.com>





-------------------------------------------
smartos-discuss
Archives: https://www.listbox.com/member/archive/184463/=now
RSS Feed: https://www.listbox.com/member/archive/rss/184463/25769125-55cfbc00
Modify Your Subscription: 
https://www.listbox.com/member/?member_id=25769125&id_secret=25769125-7688e9fb
Powered by Listbox: http://www.listbox.com

Reply via email to