from small one page howto to huge articles all in one place
Last additions: May, 25th 2007: April, 26th 2007: Apr, 10th. 2007: |
. You are here: Portage
Details of net-misc/openssh:
Description: Port of OpenBSD's free SSH release
Homepage: https://www.openssh.com/
available versions:
releases | alpha | amd64 | arm | hppa | ia64 | mips | ppc | ppc64 | ppc macos | s390 | sh | sparc | x86 | USE-Flags | dependencies | ebuild warnings |
openssh-9.8_p1-r3 |
~ | ~ | ~ | ~ | - | ~ | ~ | ~ | - | ~ | - | ~ | ~ | abi_mips_n32 audit debug kerberos ldns libedit livecd pam +pie security-key selinux +ssl static test xmss
| show | net-misc/openssh does not support USE='${enabled_eol_flags%,}' anymore.
The Base system team *STRONGLY* recommends you not rely on this functionality,
since these USE flags required third-party patches that often trigger bugs
and are of questionable provenance.
If you must continue relying on this functionality, switch to
net-misc/openssh-contrib. You will have to remove net-misc/openssh from your
world file first: 'emerge --deselect net-misc/openssh'
In order to prevent loss of SSH remote login access, we will abort the build.
Whether you proceed with disabling the USE flags or switch to the -contrib
variant, when re-emerging you will have to set
OPENSSH_EOL_USE_FLAGS_I_KNOW_WHAT_I_AM_DOING=yes
Sorry, but openssh no longer supports tcp-wrappers, and it seems like
you're trying to use it. Update your ${EROOT}/etc/hosts.{allow,deny} please.
Running the full OpenSSH testsuite requires a usable shell for the 'portage'
user, so we will run a subset only.
After upgrading to openssh-8.2p1 please restart sshd, otherwise you
will not be able to establish new sessions. Restarting sshd over a ssh
connection is generally safe.
From openssh-9.2_p1-r1 the supplied systemd unit file defaults to
'Restart=on-failure', which causes the service to automatically restart if it
terminates with an unclean exit code or signal. This feature is useful for most users,
but it can increase the vulnerability of the system in the event of a future exploit.
If you have a web-facing setup or are concerned about security, it is recommended to
set 'Restart=no' in your sshd unit file.
The ebuild will now attempt to restart OpenSSH to avoid
bricking the running instance. See bug #709748.
The ebuild will now attempt to restart OpenSSH to avoid
bricking the running instance. See bug #709748.
show | openssh-9.8_p1-r2 |
~ | + | + | ~ | - | ~ | + | + | - | ~ | - | + | + | abi_mips_n32 audit debug kerberos ldns libedit livecd pam +pie security-key selinux +ssl static test xmss
| show | net-misc/openssh does not support USE='${enabled_eol_flags%,}' anymore.
The Base system team *STRONGLY* recommends you not rely on this functionality,
since these USE flags required third-party patches that often trigger bugs
and are of questionable provenance.
If you must continue relying on this functionality, switch to
net-misc/openssh-contrib. You will have to remove net-misc/openssh from your
world file first: 'emerge --deselect net-misc/openssh'
In order to prevent loss of SSH remote login access, we will abort the build.
Whether you proceed with disabling the USE flags or switch to the -contrib
variant, when re-emerging you will have to set
OPENSSH_EOL_USE_FLAGS_I_KNOW_WHAT_I_AM_DOING=yes
Sorry, but openssh no longer supports tcp-wrappers, and it seems like
you're trying to use it. Update your ${EROOT}/etc/hosts.{allow,deny} please.
Running the full OpenSSH testsuite requires a usable shell for the 'portage'
user, so we will run a subset only.
After upgrading to openssh-8.2p1 please restart sshd, otherwise you
will not be able to establish new sessions. Restarting sshd over a ssh
connection is generally safe.
From openssh-9.2_p1-r1 the supplied systemd unit file defaults to
'Restart=on-failure', which causes the service to automatically restart if it
terminates with an unclean exit code or signal. This feature is useful for most users,
but it can increase the vulnerability of the system in the event of a future exploit.
If you have a web-facing setup or are concerned about security, it is recommended to
set 'Restart=no' in your sshd unit file.
The ebuild will now attempt to restart OpenSSH to avoid
bricking the running instance. See bug #709748.
The ebuild will now attempt to restart OpenSSH to avoid
bricking the running instance. See bug #709748.
show | openssh-9.7_p1-r6 |
~ | + | + | + | - | ~ | + | + | - | ~ | - | + | + | abi_mips_n32 audit debug kerberos ldns libedit livecd pam +pie security-key selinux +ssl static test xmss
| show | net-misc/openssh does not support USE='${enabled_eol_flags%,}' anymore.
The Base system team *STRONGLY* recommends you not rely on this functionality,
since these USE flags required third-party patches that often trigger bugs
and are of questionable provenance.
If you must continue relying on this functionality, switch to
net-misc/openssh-contrib. You will have to remove net-misc/openssh from your
world file first: 'emerge --deselect net-misc/openssh'
In order to prevent loss of SSH remote login access, we will abort the build.
Whether you proceed with disabling the USE flags or switch to the -contrib
variant, when re-emerging you will have to set
OPENSSH_EOL_USE_FLAGS_I_KNOW_WHAT_I_AM_DOING=yes
Sorry, but openssh no longer supports tcp-wrappers, and it seems like
you're trying to use it. Update your ${EROOT}/etc/hosts.{allow,deny} please.
Running the full OpenSSH testsuite requires a usable shell for the 'portage'
user, so we will run a subset only.
After upgrading to openssh-8.2p1 please restart sshd, otherwise you
will not be able to establish new sessions. Restarting sshd over a ssh
connection is generally safe.
From openssh-9.2_p1-r1 the supplied systemd unit file defaults to
'Restart=on-failure', which causes the service to automatically restart if it
terminates with an unclean exit code or signal. This feature is useful for most users,
but it can increase the vulnerability of the system in the event of a future exploit.
If you have a web-facing setup or are concerned about security, it is recommended to
set 'Restart=no' in your sshd unit file.
show | openssh-9.6_p1-r5 |
~ | + | + | ~ | - | ~ | + | + | - | ~ | - | + | + | abi_mips_n32 audit debug kerberos ldns libedit livecd pam +pie security-key selinux +ssl static test xmss
| show | net-misc/openssh does not support USE='${enabled_eol_flags%,}' anymore.
The Base system team *STRONGLY* recommends you not rely on this functionality,
since these USE flags required third-party patches that often trigger bugs
and are of questionable provenance.
If you must continue relying on this functionality, switch to
net-misc/openssh-contrib. You will have to remove net-misc/openssh from your
world file first: 'emerge --deselect net-misc/openssh'
In order to prevent loss of SSH remote login access, we will abort the build.
Whether you proceed with disabling the USE flags or switch to the -contrib
variant, when re-emerging you will have to set
OPENSSH_EOL_USE_FLAGS_I_KNOW_WHAT_I_AM_DOING=yes
Sorry, but openssh no longer supports tcp-wrappers, and it seems like
you're trying to use it. Update your ${EROOT}/etc/hosts.{allow,deny} please.
Running the full OpenSSH testsuite requires a usable shell for the 'portage'
user, so we will run a subset only.
After upgrading to openssh-8.2p1 please restart sshd, otherwise you
will not be able to establish new sessions. Restarting sshd over a ssh
connection is generally safe.
From openssh-9.2_p1-r1 the supplied systemd unit file defaults to
'Restart=on-failure', which causes the service to automatically restart if it
terminates with an unclean exit code or signal. This feature is useful for most users,
but it can increase the vulnerability of the system in the event of a future exploit.
If you have a web-facing setup or are concerned about security, it is recommended to
set 'Restart=no' in your sshd unit file.
show | openssh-9.6_p1-r3 |
~ | + | + | + | - | ~ | + | + | - | ~ | - | + | + | abi_mips_n32 audit debug kerberos ldns libedit livecd pam +pie security-key selinux +ssl static test xmss
| show | net-misc/openssh does not support USE='${enabled_eol_flags%,}' anymore.
The Base system team *STRONGLY* recommends you not rely on this functionality,
since these USE flags required third-party patches that often trigger bugs
and are of questionable provenance.
If you must continue relying on this functionality, switch to
net-misc/openssh-contrib. You will have to remove net-misc/openssh from your
world file first: 'emerge --deselect net-misc/openssh'
In order to prevent loss of SSH remote login access, we will abort the build.
Whether you proceed with disabling the USE flags or switch to the -contrib
variant, when re-emerging you will have to set
OPENSSH_EOL_USE_FLAGS_I_KNOW_WHAT_I_AM_DOING=yes
Sorry, but openssh no longer supports tcp-wrappers, and it seems like
you're trying to use it. Update your ${EROOT}/etc/hosts.{allow,deny} please.
Running the full OpenSSH testsuite requires a usable shell for the 'portage'
user, so we will run a subset only.
After upgrading to openssh-8.2p1 please restart sshd, otherwise you
will not be able to establish new sessions. Restarting sshd over a ssh
connection is generally safe.
From openssh-9.2_p1-r1 the supplied systemd unit file defaults to
'Restart=on-failure', which causes the service to automatically restart if it
terminates with an unclean exit code or signal. This feature is useful for most users,
but it can increase the vulnerability of the system in the event of a future exploit.
If you have a web-facing setup or are concerned about security, it is recommended to
set 'Restart=no' in your sshd unit file.
show |
Legend: + stable~ testing- not availablesome ebuild warning depend on specific use-flags or architectures, all ebuild-warnings are shown. Known bugs:
bug ID | component | assigned to | status | description | last change |
---|
367553 | Core system | base-system | UNCONFIRMED | net-misc/openssh - sshd sessions don't get killed when system goes down or reboots | 2013-02-11 16:00:41 |
414699 | Ebuilds | maintainer-wanted | UNCONFIRMED | net-misc/mysecureshell-1.25 - an openssh based SFTP server | 2012-05-05 16:42:27 |
423593 | Core system | base-system | UNCONFIRMED | net-misc/openssh-6.0_p1-r1: ssh hangs with 100% cpu connecting to HPUX sshd | 2012-11-12 12:36:02 |
454248 | Core system | base-system | UNCONFIRMED | net-misc/openssh-6.1_p1-r1: ssh login with key hangs | 2013-01-28 12:38:04 |
455524 | Core system | base-system | UNCONFIRMED | net-misc/openssh-6.1: update HPN patchset | 2013-02-05 23:49:53 |
457026 | Core system | base-system | UNCONFIRMED | net-misc/openssh: no host keys generated on systemd based system | 2013-02-20 18:21:40 |
back
|
New Packages - as - as - as 2024-10-16
2024-10-15
|