معرفی شرکت ها


openssh-keycat-8.0p1-16.el8.x86_64.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

A mls keycat backend for openssh
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 8-stream
مخزن Centos BaseOS x86_64
نام بسته openssh-keycat
نام فایل بسته openssh-keycat-8.0p1-16.el8.x86_64.rpm
نسخه بسته 8.0p1
انتشار بسته 16.el8
معماری بسته x86_64
نگهدارنده -
تاریخ ساخت Sat 02 Jul 2022 05
هاست سازنده x86-02.mbox.centos.org
نوع بسته .rpm
آدرس صفحه اصلی http://www.openssh.com/portable.html
مجوز BSD
حجم دانلود 118K
حجم نصب 71.044K
OpenSSH mls keycat is backend for using the authorized keys in the openssh in the mls mode.


جایگزین ها

بسته نسخه معماری مخزن
openssh-keycat-8.0p1-12.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-12.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-12.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-16.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-16.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-17.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-17.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-17.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-19.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-19.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-19.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-21.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-21.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-21.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-23.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-23.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-23.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-24.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-24.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-24.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-5.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-5.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-5.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-7.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-7.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-7.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-8.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-8.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-8.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-9.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-9.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-9.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.7p1-19.3.hs+fb.el8.aarch64.rpm 8.7p1 aarch64 CentOS hyperscale
openssh-keycat-8.7p1-19.3.hs+fb.el8.x86_64.rpm 8.7p1 x86_64 CentOS hyperscale
openssh-keycat-8.7p1-22.4.hs+fb.el8.aarch64.rpm 8.7p1 aarch64 CentOS hyperscale
openssh-keycat-8.7p1-22.4.hs+fb.el8.x86_64.rpm 8.7p1 x86_64 CentOS hyperscale


نیازمندی

مقدار نام
= 8.0p1-16.el8 config(openssh-keycat)
- libc.so.6()(64bit)
- libc.so.6(GLIBC_2.14)(64bit)
- libc.so.6(GLIBC_2.17)(64bit)
- libc.so.6(GLIBC_2.2.5)(64bit)
- libc.so.6(GLIBC_2.25)(64bit)
- libc.so.6(GLIBC_2.26)(64bit)
- libc.so.6(GLIBC_2.3)(64bit)
- libc.so.6(GLIBC_2.3.4)(64bit)
- libc.so.6(GLIBC_2.4)(64bit)
- libc.so.6(GLIBC_2.8)(64bit)
- libcrypt.so.1()(64bit)
- libcrypto.so.1.1()(64bit)
- libdl.so.2()(64bit)
- libpam.so.0()(64bit)
- libpam.so.0(LIBPAM_1.0)(64bit)
- libresolv.so.2()(64bit)
- libselinux.so.1()(64bit)
- libutil.so.1()(64bit)
- libz.so.1()(64bit)
= 8.0p1-16.el8 openssh
- rtld(GNU_HASH)


ارائه دهنده

مقدار نام
= 8.0p1-16.el8 config(openssh-keycat)
= 8.0p1-16.el8 openssh-keycat
= 8.0p1-16.el8 openssh-keycat(x86-64)


نحوه نصب


نصب پکیج rpm openssh-keycat:

    sudo dnf install openssh-keycat-8.0p1-16.el8.x86_64.rpm


فایل ها

مسیرها
/etc/pam.d/ssh-keycat
/usr/lib/.build-id
/usr/lib/.build-id/a1
/usr/lib/.build-id/a1/d79335eda7842ee9ae31712dd175e83498d680
/usr/libexec/openssh/ssh-keycat
/usr/share/doc/openssh-keycat


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2022-06-29

Omit client side from minimize-sha1-use.patch to prevent regression (#2093897)

2022-06-23

Fix new issues found by static analyzers

2022-06-01

Upstream: add a local implementation of BSD realpath() for sftp-server (#2064249)
Change product name from Fedora to RHEL in openssh-7.8p1-UsePAM-warning.patch (#1953807)
Include caveat for crypto-policy in sshd manpage (#2044354)
Change log level of FIPS specific log message to verbose (#2050511)
Clarify force_file_perms (-m) documentation in sftp-server manpage (#1862504)
Minimize the use of SHA1 as a proof of possession for RSA key (#2093897)

2021-10-26

Upstream: ClientAliveCountMax=0 disable the connection killing behaviour (#2015828)

2021-10-20

Add support for "Include" directive in sshd_config file (#1926103)

2021-10-01

CVE-2021-41617 upstream fix (#2008885)

2021-06-21

sshd -T requires -C when "Match" is used in sshd_config (#1836277)

2021-06-02

CVE-2020-14145 openssh: Observable Discrepancy leading to an information
Hostbased ssh authentication fails if session ID contains a '/' (#1944125)

2021-04-26

ssh doesn't restore the blocking mode on standard output (#1942901)

2021-04-09

SFTP sort upon the modification time (#1909988)
ssh-keygen printing fingerprint issue with Windows keys (#1901518)
PIN is lost when iterating over tokens when adding pkcs11 keys to ssh-agent (#1843372)
ssh-agent segfaults during ssh-add -s pkcs11 (#1868996)
ssh-copy-id could not resolve ipv6 address ends with colon (#1933517)
sshd provides PAM an incorrect error code (#1879503)

2021-03-16

Openssh client window fix (#1913041)

2020-03-24

Do not print "no slots" warning by default (#1744220)
Unbreak connecting using gssapi through proxy commands (#1749862)
Document in manual pages that CASignatureAlgorithms are handled by crypto policies (#1790604)
Use SHA2-based signature algorithms by default for signing certificates (#1790610)
Prevent simple ProxyJump loops in configuration files (#1804099)
Teach ssh-keyscan to use SHA2 RSA variants (#1744108)
Do not fail hard if getrandom() is not available and no SSH_USE_STRONG_RNG is specified (#1812120)
Improve wording of crypto policies references in manual pages (#1812854)
Do not break X11 forwarding if IPv6 is disabled (#1662189)
Enable SHA2-based GSSAPI key exchange algorithms by default (#1816226)
Mark RDomain server configuration option unsupported in RHEL (#1807686)
Clarify crypto policies defaults in manual pages (#1724195)
Mention RSA SHA2 variants in ssh-keygen manual page (#1665900)

2020-01-08

Restore entropy patch for CC certification (#1785655)

2019-07-23

Fix typos in manual pages (#1668325)
Use the upstream support for PKCS#8 PEM files alongside with the legacy PEM files (#1712436)
Unbreak ssh-keygen -A in FIPS mode (#1732424)
Add missing RSA certificate types to offered hostkey types in FIPS mode (#1732449)

2019-06-12

Allow specifying a pin-value in PKCS #11 URI in ssh-add (#1639698)
Whitelist another syscall variant for s390x cryptographic module (ibmca engine) (#1714915)

2019-05-14

New upstream release (#1691045)
Remove support for unused VendorPatchLevel configuration option
Fix kerberos cleanup procedures (#1683295)
Do not negotiate arbitrary primes with DH GEX in FIPS (#1685096)
Several GSSAPI key exchange improvements and sync with Debian
Allow to use labels in PKCS#11 URIs even if they do not match on private key (#1671262)
Do not fall back to sshd_net_t SELinux context (#1678695)
Use FIPS compliant high-level signature OpenSSL API and KDF
Mention crypto-policies in manual pages
Do not fail if non-FIPS approved algorithm is enabled in FIPS
Generate the PEM files in new PKCS#8 format without the need of MD5 (#1712436)