Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Security Software IT

OpenSSH 5.4 Released 127

HipToday writes "As posted on the OpenBSD Journal, OpenSSH 5.4 has been released: 'Some highlights of this release are the disabling of protocol 1 by default, certificate authentication, a new "netcat mode," many changes on the sftp front (both client and server) and a collection of assorted bugfixes. The new release can already be found on a large number of mirrors and of course on www.openssh.com.'"
This discussion has been archived. No new comments can be posted.

OpenSSH 5.4 Released

Comments Filter:
  • SFTP improvements (Score:4, Informative)

    by Ponga ( 934481 ) on Wednesday March 10, 2010 @04:51PM (#31430758)
    FTFA:

    * Many improvements to the sftp(1) client, many of which were implemented by Carlos Silva through the Google Summer of Code program:...

    ... - Add recursive transfer support for get/put and on the commandline
    (Alas!!)

    Whole host of other improvements and bugfixes; give it read if SSH is pertinent to your environment....
  • by Anonymous Coward on Wednesday March 10, 2010 @04:53PM (#31430786)

    I'm interested to see how the certificates and netcat features get used in the real world with SSH. I regenerated all of my SSH keys because they are defaulted to AES-128 bit encrypted and the public exponent is changed to 65537.

    johnny stoops.

  • by OttoM ( 467655 ) on Wednesday March 10, 2010 @05:11PM (#31431022)
    No X.509 certificates are used. Please study the changes before you comment based on false assumptions. Also, the agent protocol exists for quite a while now, it is not new.
  • by overlordofmu ( 1422163 ) <overlordofmu@gmail.com> on Wednesday March 10, 2010 @05:15PM (#31431078)
    I am reading this article and posting to it through a ssh tunnel using OpenSSH on a Gentoo Linux server at home and putty.exe on a work laptop running XP Pro at work.

    Firefox sees it as a SOCKS 5 proxy at localhost. The tricky part was setting the config key in Firefox called "network.proxy.socks_remote_dns" to true. (Navigate to about:config and filter for "proxy" to find this setting quickly). The corporate network admins use bogus DNS resolution as a firewall.

    I love you, OpenSSH devs. I sincerely thank you.
  • by Sancho ( 17056 ) on Wednesday March 10, 2010 @06:03PM (#31431696) Homepage

    Are you sure they're going through the proxy out of the box? My Firefox had that configuration knob set to "false" by default, and DNS queries are definitely hitting my company's DNS server.

    If I tune the knob to true, they go through the proxy.

    Both cases verified with tcpdump.

  • history of FTP (Score:2, Informative)

    by Anonymous Coward on Wednesday March 10, 2010 @07:16PM (#31432462)

    FTP is a fucking mess, I hate it, I wish I could kill it today everywhere. It is a disaster to manage with a firewall. The horrendous idea of using separate random ports for data connection vs control connections, the active/passive methods, it's is pure evil.

    At the time of its invention FTP's design made sense.

    TCP allows bi-directional traffic on a port, but TCP was not invented when FTP was first created (1971). The protocol that was around only allowed one-way transmission of data on any connection. So when you FTPed into a machine, and server had to open a connection back to the client to return any data.

    Also remember that firewalls were also not invented until the late '80s (earlier '90s?), so the blocking of connections back to the client weren't an issue. It was only later on (mid-'90s) where the combination of active/passive modes and security lock downs became a headache.

    By that time there was a large amount of inertial behind FTP--and remember that HTTP was mostly still young in the '90s as well, and the read/write web wasn't that all that popular (and even things like WebDAV isn't used a lot even now).

    So while I fell your pain (I'm a sys admin), there aren't / weren't that many alternatives.

  • by Anonymous Coward on Thursday March 11, 2010 @12:12AM (#31434418)

    SFTP is not FTP over SSH if you did not understand, it is a proper FTP that happens to run over a secured link.

    FTP over a secured link is FTPS (FTP over SSL/TLS), which is distinct from SFTP (SSH file transfer protocol).

    http://en.wikipedia.org/wiki/Ftps [wikipedia.org]
    http://en.wikipedia.org/wiki/SSH_file_transfer_protocol [wikipedia.org]

    Performance note:

    FTPS can stream files at full TCP speeds, while most SFTP implementations suffer from the SSH and SFTP protocol performance problems caused by having small application-level window and packet sizes (often 32 to 64KB) and requiring a fixed set of packets to be acknowledged before the next bunch is sent.

    For details, see section 6.2, "The SSHv2 and SFTP Performance Handbrake" in http://www.cs.auckland.ac.nz/~pgut001/pubs/app_sec.pdf [auckland.ac.nz]
    and pages 27 to 30 in http://fasterdata.es.net/talks/Tierney-tutorial.pdf [es.net].

The one day you'd sell your soul for something, souls are a glut.

Working...