OpenSSH 5.3 released

OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. It encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks.

Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.

This release marks the 10th anniversary of the OpenSSH project.

General bugfixes

  • Do not limit home directory paths to 256 characters.
  • Several minor documentation and correctness fixes.

Portable OpenSSH bugfixes

  • This release removes for support for very old versions of Cygwin and for Windows 95/98/ME
  • Move the deletion of PAM credentials on logout to after the session close.
  • Make PrintLastLog work on AIX.
  • Avoid compile errors on FreeBSD from conflicts in glob.h.
  • Delay dropping of root privileges on AIX so chroot and pam_open_session work correctly.
  • Increase client IO buffer on Cygwin to 64K, realising a significant performance improvement.
  • Roll back bz#1241 (better handling for expired passwords on Tru64). The change broke password logins on some configurations.
  • Accept ENOSYS as a fallback error when attempting atomic rename().
  • Fix passing of variables to recursive make(1) invocations on Solaris.
  • Skip the tcgetattr call on the pty master on Solaris, since it never succeeds and can hang if large amounts of data is sent to the slave (eg a copy-paste).
  • Fix detection of krb5-config.
  • Fix test for server-assigned remote forwarding port for non-root users.
  • Fix detection of libresolv on OSX 10.6.

Don't miss