From owner-freebsd-ports-bugs@FreeBSD.ORG Thu May 23 22:40:05 2013 Return-Path: Delivered-To: freebsd-ports-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id D2B1319B for ; Thu, 23 May 2013 22:40:05 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 9D5C268E for ; Thu, 23 May 2013 22:40:05 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r4NMe5Nd073920 for ; Thu, 23 May 2013 22:40:05 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r4NMe5sL073919; Thu, 23 May 2013 22:40:05 GMT (envelope-from gnats) Resent-Date: Thu, 23 May 2013 22:40:05 GMT Resent-Message-Id: <201305232240.r4NMe5sL073919@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Garrett Wollman Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id AE8C1178 for ; Thu, 23 May 2013 22:38:04 +0000 (UTC) (envelope-from wollman@khavrinen.csail.mit.edu) Received: from khavrinen.csail.mit.edu (khavrinen.csail.mit.edu [IPv6:2001:470:8b2d:1e1c:21b:21ff:feb8:d7b0]) by mx1.freebsd.org (Postfix) with ESMTP id 8B299681 for ; Thu, 23 May 2013 22:38:04 +0000 (UTC) Received: from khavrinen.csail.mit.edu (localhost [127.0.0.1]) by khavrinen.csail.mit.edu (8.14.5/8.14.5) with ESMTP id r4NMc2wI002067 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL CN=khavrinen.csail.mit.edu issuer=Client+20CA) for ; Thu, 23 May 2013 18:38:02 -0400 (EDT) (envelope-from wollman@khavrinen.csail.mit.edu) Received: (from wollman@localhost) by khavrinen.csail.mit.edu (8.14.5/8.14.5/Submit) id r4NMc2dM002066; Thu, 23 May 2013 18:38:02 -0400 (EDT) (envelope-from wollman) Message-Id: <201305232238.r4NMc2dM002066@khavrinen.csail.mit.edu> Date: Thu, 23 May 2013 18:38:02 -0400 (EDT) From: Garrett Wollman To: FreeBSD-gnats-submit@freebsd.org X-Send-Pr-Version: 3.113 Subject: ports/178885: openssh-portable upgrade broke GSSAPI keyex with no warning X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 23 May 2013 22:40:05 -0000 >Number: 178885 >Category: ports >Synopsis: openssh-portable upgrade broke GSSAPI keyex with no warning >Confidential: no >Severity: serious >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Thu May 23 22:40:00 UTC 2013 >Closed-Date: >Last-Modified: >Originator: Garrett Wollman >Release: FreeBSD 9.1-RELEASE amd64 >Organization: MIT Computer Science & Artificial Intelligence Laboratory >Environment: System: FreeBSD khavrinen.csail.mit.edu 9.1-RELEASE FreeBSD 9.1-RELEASE #15 r245182: Tue Jan 8 18:09:56 EST 2013 wollman@khavrinen.csail.mit.edu:/usr/obj/usr/src/sys/KHAVRINEN amd64 >Description: I upgraded openssh-portable from 5.7 to 6.2 and started getting errors on ssh_config and sshd_config. Investigating, I found that the GSSAPIKeyExchange support had gone missing, and this is not reported in /usr/ports/UPDATING or elsewhere that I could find. Large sites like ours absolutely depend on this functionality (which also includes rekey-on-ticket-renewal and store-tickets-on-rekey functions to keep long-running sessions authenticated). >How-To-Repeat: Upgrade openssh-portable. Notice that the GSSAPIKeyExchange parameter causes config file parsing to error out. >Fix: RedHat forward-ported the patch from 5.7 to 6.2 and with a few modifications I made theirs work, but I'm not sure what the legal status of this patch is. You can find it by searching for "openssh-6.2p1-gsskex.patch". >Release-Note: >Audit-Trail: >Unformatted: