معرفی شرکت ها


openssh-keycat-8.0p1-5.el8.x86_64.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

A mls keycat backend for openssh
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 8-stream
مخزن Centos BaseOS x86_64
نام بسته openssh-keycat
نام فایل بسته openssh-keycat-8.0p1-5.el8.x86_64.rpm
نسخه بسته 8.0p1
انتشار بسته 5.el8
معماری بسته x86_64
نگهدارنده -
تاریخ ساخت Mon 27 Apr 2020 06
هاست سازنده x86-01.mbox.centos.org
نوع بسته .rpm
آدرس صفحه اصلی http://www.openssh.com/portable.html
مجوز BSD
حجم دانلود 116K
حجم نصب 71.162K
OpenSSH mls keycat is backend for using the authorized keys in the openssh in the mls mode.


جایگزین ها

بسته نسخه معماری مخزن
openssh-keycat-8.0p1-12.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-12.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-12.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-16.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-16.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-16.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-17.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-17.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-17.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-19.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-19.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-19.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-21.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-21.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-21.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-23.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-23.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-23.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-24.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-24.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-24.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-5.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-5.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-7.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-7.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-7.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-8.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-8.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-8.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.0p1-9.el8.aarch64.rpm 8.0p1 aarch64 CentOS BaseOS
openssh-keycat-8.0p1-9.el8.ppc64le.rpm 8.0p1 ppc64le CentOS BaseOS
openssh-keycat-8.0p1-9.el8.x86_64.rpm 8.0p1 x86_64 CentOS BaseOS
openssh-keycat-8.7p1-19.3.hs+fb.el8.aarch64.rpm 8.7p1 aarch64 CentOS hyperscale
openssh-keycat-8.7p1-19.3.hs+fb.el8.x86_64.rpm 8.7p1 x86_64 CentOS hyperscale
openssh-keycat-8.7p1-22.4.hs+fb.el8.aarch64.rpm 8.7p1 aarch64 CentOS hyperscale
openssh-keycat-8.7p1-22.4.hs+fb.el8.x86_64.rpm 8.7p1 x86_64 CentOS hyperscale


نیازمندی

مقدار نام
= 8.0p1-5.el8 config(openssh-keycat)
- libc.so.6()(64bit)
- libc.so.6(GLIBC_2.14)(64bit)
- libc.so.6(GLIBC_2.17)(64bit)
- libc.so.6(GLIBC_2.2.5)(64bit)
- libc.so.6(GLIBC_2.25)(64bit)
- libc.so.6(GLIBC_2.26)(64bit)
- libc.so.6(GLIBC_2.3)(64bit)
- libc.so.6(GLIBC_2.3.4)(64bit)
- libc.so.6(GLIBC_2.4)(64bit)
- libc.so.6(GLIBC_2.8)(64bit)
- libcrypt.so.1()(64bit)
- libcrypto.so.1.1()(64bit)
- libdl.so.2()(64bit)
- libpam.so.0()(64bit)
- libpam.so.0(LIBPAM_1.0)(64bit)
- libresolv.so.2()(64bit)
- libselinux.so.1()(64bit)
- libutil.so.1()(64bit)
- libz.so.1()(64bit)
= 8.0p1-5.el8 openssh
- rtld(GNU_HASH)


ارائه دهنده

مقدار نام
= 8.0p1-5.el8 config(openssh-keycat)
= 8.0p1-5.el8 openssh-keycat
= 8.0p1-5.el8 openssh-keycat(x86-64)


نحوه نصب


نصب پکیج rpm openssh-keycat:

    sudo dnf install openssh-keycat-8.0p1-5.el8.x86_64.rpm


فایل ها

مسیرها
/etc/pam.d/ssh-keycat
/usr/lib/.build-id
/usr/lib/.build-id/90
/usr/lib/.build-id/90/30d2f276d7b13e6fcfe0782a951b134a22cc1b
/usr/libexec/openssh/ssh-keycat
/usr/share/doc/openssh-keycat


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2020-03-24

Do not print "no slots" warning by default (#1744220)
Unbreak connecting using gssapi through proxy commands (#1749862)
Document in manual pages that CASignatureAlgorithms are handled by crypto policies (#1790604)
Use SHA2-based signature algorithms by default for signing certificates (#1790610)
Prevent simple ProxyJump loops in configuration files (#1804099)
Teach ssh-keyscan to use SHA2 RSA variants (#1744108)
Do not fail hard if getrandom() is not available and no SSH_USE_STRONG_RNG is specified (#1812120)
Improve wording of crypto policies references in manual pages (#1812854)
Do not break X11 forwarding if IPv6 is disabled (#1662189)
Enable SHA2-based GSSAPI key exchange algorithms by default (#1816226)
Mark RDomain server configuration option unsupported in RHEL (#1807686)
Clarify crypto policies defaults in manual pages (#1724195)
Mention RSA SHA2 variants in ssh-keygen manual page (#1665900)

2020-01-08

Restore entropy patch for CC certification (#1785655)

2019-07-23

Fix typos in manual pages (#1668325)
Use the upstream support for PKCS#8 PEM files alongside with the legacy PEM files (#1712436)
Unbreak ssh-keygen -A in FIPS mode (#1732424)
Add missing RSA certificate types to offered hostkey types in FIPS mode (#1732449)

2019-06-12

Allow specifying a pin-value in PKCS #11 URI in ssh-add (#1639698)
Whitelist another syscall variant for s390x cryptographic module (ibmca engine) (#1714915)

2019-05-14

New upstream release (#1691045)
Remove support for unused VendorPatchLevel configuration option
Fix kerberos cleanup procedures (#1683295)
Do not negotiate arbitrary primes with DH GEX in FIPS (#1685096)
Several GSSAPI key exchange improvements and sync with Debian
Allow to use labels in PKCS#11 URIs even if they do not match on private key (#1671262)
Do not fall back to sshd_net_t SELinux context (#1678695)
Use FIPS compliant high-level signature OpenSSL API and KDF
Mention crypto-policies in manual pages
Do not fail if non-FIPS approved algorithm is enabled in FIPS
Generate the PEM files in new PKCS#8 format without the need of MD5 (#1712436)

2018-11-26

Unbreak PKCS#11 URI tests (#1648262)
Allow to disable RSA signatures with SHA1 (#1648898)
Dump missing GSS options from client configuration (#1649505)
Minor fixes from Fedora related to GSSAPI and keberos
Follow the system-wide PATH settings

2018-09-24

Disable OpenSSH hardening flags and use the ones provided by system (#1630615)
Ignore unknown parts of PKCS#11 URI (#1631478)
Do not fail with GSSAPI enabled in match blocks (#1580017)
Fix the segfaulting cavs test (#1629692)

2018-08-31

New upstream release fixing CVE 2018-15473
Remove unused patches
Remove reference to unused enviornment variable SSH_USE_STRONG_RNG
Address coverity issues
Unbreak scp between two IPv6 hosts (#1620333)
Unbreak GSSAPI key exchange (#1624323)
Unbreak rekeying with GSSAPI key exchange (#1624344)

2018-08-09

Fix listing of kex algoritms in FIPS mode
Allow aes-gcm cipher modes in FIPS mode
Coverity fixes

2018-07-03

Disable manual printing of motd by default (#1591381)

2018-06-27

Better handling of kerberos tickets storage (#1566494)
Add pam_motd to pam stack (#1591381)

2018-04-16

Fix tun devices and other issues fixed after release upstream (#1567775)

2018-04-12

Do not break quotes parsing in configuration file (#1566295)

2018-04-04

New upstream release (#1563223)
Add support for ECDSA keys in PKCS#11 (#1354510)
Add support for PKCS#11 URIs

2018-03-06

Require crypto-policies version and new path
Remove bogus NSS linking

2018-02-08

Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild