Quick Roundup
- Latest Headlines
- Highlights
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- Latest Members
- Categories
Opteron Memory Timings Tested
Submitted by srlinuxx on Tuesday 29th of March 2005 03:58:22 PM Filed under

When building any modern computer, the choice of which memory to use is a major consideration. After all, why spend a mint on the latest CPU and motherboard, only to slow it down a bit with anything but the best memory available?
- Login or register to post comments
Printer-friendly version
- Read more
- 4874 reads
PDF version
Nvidia working on 90 series of drivers
Submitted by srlinuxx on Tuesday 29th of March 2005 03:52:47 PM Filed under
WE LEARNED that Nvidia is working on a fresh set of drivers codenamed series 90. The company just released its 70 series of drivers that brought features such as Pure Video and better SLI compatibility.
- Login or register to post comments
Printer-friendly version
- Read more
- 4937 reads
PDF version
Safety Cheat Sheet
Submitted by srlinuxx on Tuesday 29th of March 2005 03:41:14 PM Filed under

If people didn't fall for online scams, online scammers would take up another line of work. And really, it isn't terribly hard to protect yourself. If you do one thing today, print out the following list and tape it to your computer.
- Login or register to post comments
Printer-friendly version
- Read more
- 4324 reads
PDF version
This Week's Movies: Hostage and Cursed
Submitted by srlinuxx on Tuesday 29th of March 2005 08:21:48 AM Filed under


When siblings discover they are now werewolves, they must look deep inside and to each other to save themselves from the returning monster and being "Cursed".
"Hostage" negotiator Jeff Talley must once again try and talk young criminals into releasing a family before anyone get hurts. Only this time there's more at stake than just strangers.
- Login or register to post comments
Printer-friendly version
- Read more
- 4820 reads
PDF version
First Details on Next-Gen UT
Submitted by srlinuxx on Tuesday 29th of March 2005 02:49:53 AM Filed under
The May 2005 issue of Computer Gaming World magazine contains the first screenshots and information on the next, Unreal Engine 3 powered Unreal Tournament game, including incredible revelations about the massive new Conquest gametype.
- Login or register to post comments
Printer-friendly version
- Read more
- 3651 reads
PDF version
Game Rush hosts Doom 3 midnight sale
Submitted by srlinuxx on Tuesday 29th of March 2005 02:41:04 AM Filed under
Members of Texas-based id software, Doom3's developer, will be on hand at the Game Rush store, Blockbuster's gaming branch, on 6437 Hillcrest Avenue in Dallas to meet fans, sign autographs, and give away Doom 3-related merchandise.
- Login or register to post comments
Printer-friendly version
- Read more
- 4917 reads
PDF version
Stolen laptop exposes data of 100,000
Submitted by srlinuxx on Tuesday 29th of March 2005 02:37:18 AM Filed under
A thief recently walked into a University of California, Berkeley office and swiped a computer laptop containing personal information about nearly 100,000 alumni, graduate students and past applicants, highlighting a continued lack of security that has increased society's vulnerability to identity theft.
- Login or register to post comments
Printer-friendly version
- Read more
- 4004 reads
PDF version
Firm beats Intel to 10Gbit CMOS photonics chip
Submitted by srlinuxx on Monday 28th of March 2005 06:18:43 PM Filed under
A CALIFORNIA FIRM claimed that it has put a fibre optic interface directly onto a silicon chip. That means, according to Luxtera, that one day we'll have CPUs with optical buses shuffling huge amounts of data in and out of the heap.
- Login or register to post comments
Printer-friendly version
- Read more
- 4960 reads
PDF version
Legal row over iTunes domain name
Submitted by srlinuxx on Monday 28th of March 2005 06:15:35 PM Filed under

An internet entrepreneur is taking legal action against computer giant Apple over the iTunes domain name.
- Login or register to post comments
Printer-friendly version
- Read more
- 5122 reads
PDF version
ISPs join to 'fingerprint' Internet attacks
Submitted by srlinuxx on Monday 28th of March 2005 06:10:21 PM Filed under

Leading global telecommunications companies, Internet service providers and network operators will begin sharing information on Internet attacks as members of a new group called the Fingerprint Sharing Alliance, according to a published statement from the new group.
- Login or register to post comments
Printer-friendly version
- Read more
- 3655 reads
PDF version
howto: put linux on a zipit handheld
Submitted by srlinuxx on Monday 28th of March 2005 05:46:50 PM Filed under
aibohack of all places has come up with quite an interesting hack. turns out someone actually can make good use of the $100 zipit instant messaging device. Installing Linux.
- Login or register to post comments
Printer-friendly version
- Read more
- 5109 reads
PDF version
IRS may consider eBay sales taxable income
Submitted by srlinuxx on Monday 28th of March 2005 05:41:04 PM Filed under
In tax law, there is no clear, bright line that separates fun from profit, or a hobby from a business. But IRS instructions make it clear that all income - a category that includes bribes, gambling winnings, kickbacks and money made in illegal activities - can be taxed.
- Login or register to post comments
Printer-friendly version
- Read more
- 4184 reads
PDF version
You Get What You Pay For
Submitted by srlinuxx on Monday 28th of March 2005 05:23:43 PM Filed under


Purely objective information about security issues is becoming one of the scarcest commodities in the tech industry.
- Login or register to post comments
Printer-friendly version
- Read more
- 4612 reads
PDF version
Teen Builds Linux Workaround For iTunes
Submitted by srlinuxx on Monday 28th of March 2005 05:20:13 PM Filed under
Cody Brocious is a 17-year old 11th grader from Chamberburg, Pa. likes using the Linux operating system more than he does Microsoft's Windows or Apple Computer's Mac OS. But Apple doesn't make software that would let Linux users like Brocious buy songs from the iTunes store, so he did what any 21st-century teen raised in the digital age would do--he and his friends wrote a program to do so themselves.
- Login or register to post comments
Printer-friendly version
- Read more
- 3653 reads
PDF version
Linux consortium gets valley boost
Submitted by srlinuxx on Monday 28th of March 2005 09:16:48 AM Filed under
Silicon Graphics Inc. of Mountain View, which makes computers for the likes of scientists and graphic artists, is becoming an industry sponsor for the federation, an international research consortium with the mission of advancing open source software in the form of the Linux OS Intel Itanium 2 platform.
- Login or register to post comments
Printer-friendly version
- Read more
- 4139 reads
PDF version
Linux, others are used behind the scenes
Submitted by srlinuxx on Monday 28th of March 2005 09:11:46 AM Filed under

Corporations, government agencies and even consumers are tinkering with open-source software, which can be downloaded free from the Internet.
- Login or register to post comments
Printer-friendly version
- Read more
- 4499 reads
PDF version
Michael Dell ahead of Bill Gates on most admired list
Submitted by srlinuxx on Monday 28th of March 2005 09:09:05 AM Filed under
Michael Dell and Bill Gates. Which do you admire more? Inc. magazine asked that question of 100 people at a retreat held for entrepreneurs this month in Tucson, Ariz.
- Login or register to post comments
Printer-friendly version
- Read more
- 4523 reads
PDF version
A Month With Fluxbox - Part 1
Submitted by srlinuxx on Monday 28th of March 2005 08:17:56 AM Filed under
In anticipation of the April Gentoo Monthly Screenshots thread on my favorite forum, I've been working on beautifying my desktop for the last several days.
I've used KDE forever it seems, but this month I wanted to post something a little different. And in keeping with the spirit of the thread, I'm going to run fluxbox all April long and post my thoughts on using it here at tuxmachines at the end. Today I'd like to share of the things I've done so far to "purty it up".
Gentoo 2005.0 released
Submitted by srlinuxx on Monday 28th of March 2005 05:24:39 AM Filed under
Gentoo 2005.0 released
Gentoo Linux is proud to bring you the long awaited Gentoo Linux 2005.0 release!
This release has had a few setbacks including a complete security rebuild, but with the help of the many teams within the Gentoo developer community, we believe that this release will be one of the best that we have ever had.
- Login or register to post comments
Printer-friendly version
- Read more
- 4446 reads
PDF version

More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
Programming Leftovers
| OpenSSH 8.5OpenSSH 8.5 was released on 2021-03-03. It is available from the mirrors listed at https://www.openssh.com/. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested snapshots or donated to the project. More information on donations may be found at: https://www.openssh.com/donations.html Future deprecation notice ========================= It is now possible[1] to perform chosen-prefix attacks against the SHA-1 algorithm for less than USD$50K. In the SSH protocol, the "ssh-rsa" signature scheme uses the SHA-1 hash algorithm in conjunction with the RSA public key algorithm. OpenSSH will disable this signature scheme by default in the near future. Note that the deactivation of "ssh-rsa" signatures does not necessarily require cessation of use for RSA keys. In the SSH protocol, keys may be capable of signing using multiple algorithms. In particular, "ssh-rsa" keys are capable of signing using "rsa-sha2-256" (RSA/SHA256), "rsa-sha2-512" (RSA/SHA512) and "ssh-rsa" (RSA/SHA1). Only the last of these is being turned off by default. This algorithm is unfortunately still used widely despite the existence of better alternatives, being the only remaining public key signature algorithm specified by the original SSH RFCs that is still enabled by default. The better alternatives include: * The RFC8332 RSA SHA-2 signature algorithms rsa-sha2-256/512. These algorithms have the advantage of using the same key type as "ssh-rsa" but use the safe SHA-2 hash algorithms. These have been supported since OpenSSH 7.2 and are already used by default if the client and server support them. * The RFC8709 ssh-ed25519 signature algorithm. It has been supported in OpenSSH since release 6.5. * The RFC5656 ECDSA algorithms: ecdsa-sha2-nistp256/384/521. These have been supported by OpenSSH since release 5.7. To check whether a server is using the weak ssh-rsa public key algorithm, for host authentication, try to connect to it after removing the ssh-rsa algorithm from ssh(1)'s allowed list: ssh -oHostKeyAlgorithms=-ssh-rsa user@host If the host key verification fails and no other supported host key types are available, the server software on that host should be upgraded. This release enables the UpdateHostKeys option by default to assist the client by automatically migrating to better algorithms. [1] "SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust" Leurent, G and Peyrin, T (2020) https://eprint.iacr.org/2020/014.pdf Security ======== * ssh-agent(1): fixed a double-free memory corruption that was introduced in OpenSSH 8.2 . We treat all such memory faults as potentially exploitable. This bug could be reached by an attacker with access to the agent socket. On modern operating systems where the OS can provide information about the user identity connected to a socket, OpenSSH ssh-agent and sshd limit agent socket access only to the originating user and root. Additional mitigation may be afforded by the system's malloc(3)/free(3) implementation, if it detects double-free conditions. The most likely scenario for exploitation is a user forwarding an agent either to an account shared with a malicious user or to a host with an attacker holding root access. * Portable sshd(8): Prevent excessively long username going to PAM. This is a mitigation for a buffer overflow in Solaris' PAM username handling (CVE-2020-14871), and is only enabled for Sun-derived PAM implementations. This is not a problem in sshd itself, it only prevents sshd from being used as a vector to attack Solaris' PAM. It does not prevent the bug in PAM from being exploited via some other PAM application. GHPR#212 Potentially-incompatible changes ================================ This release includes a number of changes that may affect existing configurations: * ssh(1), sshd(8): this release changes the first-preference signature algorithm from ECDSA to ED25519. * ssh(1), sshd(8): set the TOS/DSCP specified in the configuration for interactive use prior to TCP connect. The connection phase of the SSH session is time-sensitive and often explicitly interactive. The ultimate interactive/bulk TOS/DSCP will be set after authentication completes. * ssh(1), sshd(8): remove the pre-standardization cipher rijndael-cbc@lysator.liu.se. It is an alias for aes256-cbc before it was standardized in RFC4253 (2006), has been deprecated and disabled by default since OpenSSH 7.2 (2016) and was only briefly documented in ssh.1 in 2001. * ssh(1), sshd(8): update/replace the experimental post-quantum hybrid key exchange method based on Streamlined NTRU Prime coupled with X25519. The previous sntrup4591761x25519-sha512@tinyssh.org method is replaced with sntrup761x25519-sha512@openssh.com. Per its designers, the sntrup4591761 algorithm was superseded almost two years ago by sntrup761. (note this both the updated method and the one that it replaced are disabled by default) * ssh(1): disable CheckHostIP by default. It provides insignificant benefits while making key rotation significantly more difficult, especially for hosts behind IP-based load-balancers. Changes since OpenSSH 8.4 ========================= New features ------------ * ssh(1): this release enables UpdateHostkeys by default subject to some conservative preconditions: - The key was matched in the UserKnownHostsFile (and not in the GlobalKnownHostsFile). - The same key does not exist under another name. - A certificate host key is not in use. - known_hosts contains no matching wildcard hostname pattern. - VerifyHostKeyDNS is not enabled. - The default UserKnownHostsFile is in use. We expect some of these conditions will be modified or relaxed in future. * ssh(1), sshd(8): add a new LogVerbose configuration directive for that allows forcing maximum debug logging by file/function/line pattern-lists. * ssh(1): when prompting the user to accept a new hostkey, display any other host names/addresses already associated with the key. * ssh(1): allow UserKnownHostsFile=none to indicate that no known_hosts file should be used to identify host keys. * ssh(1): add a ssh_config KnownHostsCommand option that allows the client to obtain known_hosts data from a command in addition to the usual files. * ssh(1): add a ssh_config PermitRemoteOpen option that allows the client to restrict the destination when RemoteForward is used with SOCKS. * ssh(1): for FIDO keys, if a signature operation fails with a "incorrect PIN" reason and no PIN was initially requested from the user, then request a PIN and retry the operation. This supports some biometric devices that fall back to requiring PIN when reading of the biometric failed, and devices that require PINs for all hosted credentials. * sshd(8): implement client address-based rate-limiting via new sshd_config(5) PerSourceMaxStartups and PerSourceNetBlockSize directives that provide more fine-grained control on a per-origin address basis than the global MaxStartups limit. Bugfixes -------- * ssh(1): Prefix keyboard interactive prompts with "(user@host)" to make it easier to determine which connection they are associated with in cases like scp -3, ProxyJump, etc. bz#3224 * sshd(8): fix sshd_config SetEnv directives located inside Match blocks. GHPR#201 * ssh(1): when requesting a FIDO token touch on stderr, inform the user once the touch has been recorded. * ssh(1): prevent integer overflow when ridiculously large ConnectTimeout values are specified, capping the effective value (for most platforms) at 24 days. bz#3229 * ssh(1): consider the ECDSA key subtype when ordering host key algorithms in the client. * ssh(1), sshd(8): rename the PubkeyAcceptedKeyTypes keyword to PubkeyAcceptedAlgorithms. The previous name incorrectly suggested that it control allowed key algorithms, when this option actually specifies the signature algorithms that are accepted. The previous name remains available as an alias. bz#3253 * ssh(1), sshd(8): similarly, rename HostbasedKeyTypes (ssh) and HostbasedAcceptedKeyTypes (sshd) to HostbasedAcceptedAlgorithms. * sftp-server(8): add missing lsetstat@openssh.com documentation and advertisement in the server's SSH2_FXP_VERSION hello packet. * ssh(1), sshd(8): more strictly enforce KEX state-machine by banning packet types once they are received. Fixes memleak caused by duplicate SSH2_MSG_KEX_DH_GEX_REQUEST (oss-fuzz #30078). * sftp(1): allow the full range of UIDs/GIDs for chown/chgrp on 32bit platforms instead of being limited by LONG_MAX. bz#3206 * Minor man page fixes (capitalization, commas, etc.) bz#3223 * sftp(1): when doing an sftp recursive upload or download of a read-only directory, ensure that the directory is created with write and execute permissions in the interim so that the transfer can actually complete, then set the directory permission as the final step. bz#3222 * ssh-keygen(1): document the -Z, check the validity of its argument earlier and provide a better error message if it's not correct. bz#2879 * ssh(1): ignore comments at the end of config lines in ssh_config, similar to what we already do for sshd_config. bz#2320 * sshd_config(5): mention that DisableForwarding is valid in a sshd_config Match block. bz3239 * sftp(1): fix incorrect sorting of "ls -ltr" under some circumstances. bz3248. * ssh(1), sshd(8): fix potential integer truncation of (unlikely) timeout values. bz#3250 * ssh(1): make hostbased authentication send the signature algorithm in its SSH2_MSG_USERAUTH_REQUEST packets instead of the key type. This make HostbasedAcceptedAlgorithms do what it is supposed to - filter on signature algorithm and not key type. Portability ----------- * sshd(8): add a number of platform-specific syscalls to the Linux seccomp-bpf sandbox. bz#3232 bz#3260 * sshd(8): remove debug message from sigchld handler that could cause deadlock on some platforms. bz#3259 * Sync contrib/ssh-copy-id with upstream. * unittests: add a hostname function for systems that don't have it. Some systems don't have a hostname command (it's not required by POSIX). The do have uname -n (which is), but not all of those have it report the FQDN. Checksums: ========== - SHA1 (openssh-8.5.tar.gz) = 04cae43c389fb411227c01219e4eb46e3113f34e - SHA256 (openssh-8.5.tar.gz) = 5qB2CgzNG4io4DmChTjHgCWqRWvEOvCKJskLdJCz+SU= - SHA1 (openssh-8.5p1.tar.gz) = 72eadcbe313b07b1dd3b693e41d3cd56d354e24e - SHA256 (openssh-8.5p1.tar.gz) = 9S8/QdQpqpkY44zyAK8iXM3Y5m8FLaVyhwyJc3ZG7CU= Please note that the SHA256 signatures are base64 encoded and not hexadecimal (which is the default for most checksum tools). The PGP key used to sign the releases is available from the mirror sites: https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/RELEASE_KEY.asc Please note that the OpenPGP key used to sign releases has been rotated for this release. The new key has been signed by the previous key to provide continuity. Reporting Bugs: =============== - Please read https://www.openssh.com/report.html Security bugs should be reported directly to openssh@openssh.com ![]() |
Android Leftovers
| Best Free and Open Source Alternatives to Google Maps
Google has a firm grip on the desktop. Their products and services are ubiquitous. Don’t get us wrong, we’re long-standing admirers of many of Google’s products and services. They are often high quality, easy to use, and ‘free’, but there can be downsides of over-reliance on a specific company. For example, there are concerns about their privacy policies, business practices, and an almost insatiable desire to control all of our data, all of the time.
What if you are looking to move away from Google and embark on a new world of online freedom, where you are not constantly tracked, monetised and attached to Google’s ecosystem.
In this series, we explore how you can migrate from Google without missing out on anything. We’ll recommend open source solutions.
|
Older Stories (Next Page)
- today's howtos
- IBM/Red Hat Leftovers
- Videos//Shows: KeyNav, Ubuntu Deepin 20.10 Review, David Revoy and More
- Security: GRUB, Thycotic, and 'Spectre'
- Linux Foundation: RISC-V ISA and New Mobile Native Foundation
- openSUSE Review: A Linux Distro for the Practical User
- IPFire 2.25 - Core Update 154 released
- Steam Link Is Now Available on Linux to Stream Your Steam Games on Any Device
- today's leftovers
- Programming Leftovers
- Events: GNOME, LF, and Linux App Summit (LAS)
- CoreELEC 19.0 “Matrix” Linux Distro Released for Amlogic Hardware Based on Kodi 19
- Mozilla Leftovers
- Security Leftovers
- IBM/Red Hat Leftovers
- today's howtos
- Games: Hack Grid, Godot Engine, StereoKit, Mirrored Pawns
- Star Labs Adds Coreboot Open-Source Firmware Support to Their LabTop Mk IV Linux Laptop
- Android Leftovers
- Updated Portal 2 Vulkan Rendering Code Yielding Great Radeon Results
Recent comments
1 hour 55 min ago
2 hours 16 min ago
2 hours 28 min ago
5 hours 4 min ago
9 hours 2 min ago
10 hours 44 min ago
10 hours 49 min ago
11 hours 15 min ago
11 hours 26 min ago
11 hours 28 min ago