{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":15991457,"defaultBranch":"master","name":"openssh-portable","ownerLogin":"openssh","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2014-01-17T05:53:25.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/2387206?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1719891161.0","currentOid":""},"activityList":{"items":[{"before":"10ccf611ab8ecba9ce6b0548c5ccd8c1220baf92","after":"05f2b141cfcc60c7cdedf9450d2b9d390c19eaad","ref":"refs/heads/master","pushedAt":"2024-08-28T12:10:09.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Don't skip audit before exitting cleanup_exit\n\nThis fixes an issue where the SSH_CONNECTION_ABANDON event is not\naudited because cleanup_exit overrides the regular _exit too soon and\nas a result, failed auth attempts are not logged correctly.\n\nThe problem was introduced in 81c1099d22b81ebfd20a334ce986c4f753b0db29\nwhere the code from upstream was merged before the audit_event call when\nit should have been merged right before the _exit call in order to honor\nthe comment that just mentions an override of the exit value.","shortMessageHtmlLink":"Don't skip audit before exitting cleanup_exit"}},{"before":"aee54878255d71bf93aa6e91bbd4eb1825c0d1b9","after":"10ccf611ab8ecba9ce6b0548c5ccd8c1220baf92","ref":"refs/heads/master","pushedAt":"2024-08-26T23:05:58.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: As defined in the RFC, the SSH protocol has negotiable\n\ncompression support (which is requested as the name \"zlib\"). Compression\nstarts very early in the session. Relative early in OpenSSH lifetime, privsep\nwas added to sshd, and this required a shared-memory hack so the two\nprocesses could see what was going on in the dataflow. This shared-memory\nhack was soon recognized as a tremendous complexity risk, because it put libz\n(which very much trusts it's memory) in a dangerous place, and a new option\n(\"zlib@openssh.com\") was added begins compression after authentication (aka\ndelayed-compression). That change also permitted removal of the\nshared-memory hack. Despite removal from the server, the old \"zlib\" support\nremained in the client, to allow negotiation with non-OpenSSH daemons which\nlack the delayed-compression option. This commit deletes support for the\nolder \"zlib\" option in the client. It reduces our featureset in a small way,\nand encourages other servers to move to a better design. The SSH protocol is\ndifferent enough that compressed-key-material attacks like BEAST are\nunlikely, but who wants to take the chance? We encourage other ssh servers\nwho care about optional compression support to add delayed-zlib support.\n(Some already do \"zlib@openssh.com\") ok djm markus\n\nOpenBSD-Commit-ID: 6df986f38e4ab389f795a6e39e7c6857a763ba72","shortMessageHtmlLink":"upstream: As defined in the RFC, the SSH protocol has negotiable"}},{"before":"a76a6b85108e3032c8175611ecc5746e7131f876","after":"aee54878255d71bf93aa6e91bbd4eb1825c0d1b9","ref":"refs/heads/master","pushedAt":"2024-08-22T23:27:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: sntrup761x25519-sha512 now has an IANA codepoint assigned, so\n\nwe can make the algorithm available without the @openssh.com suffix too. ok\nmarkus@ deraadt@\n\nOpenBSD-Commit-ID: eeed8fcde688143a737729d3d56d20ab4353770f","shortMessageHtmlLink":"upstream: sntrup761x25519-sha512 now has an IANA codepoint assigned, so"}},{"before":"7e75e3f57c41b9a6e6401e7674d7c2ff5c33975b","after":"a76a6b85108e3032c8175611ecc5746e7131f876","ref":"refs/heads/master","pushedAt":"2024-08-22T10:38:37.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Move rekey test into valgrind-2.\n\nNow that the rekey test has been optimized it's fast enough to not be in\nits own valgrind test, so move it into valgrind-2, which is currently\nthe quickest of the others, bringing all of them to roughly the same\nruntime of ~1.1 hours.","shortMessageHtmlLink":"Move rekey test into valgrind-2."}},{"before":"ebc890b8b4ba08c84cd1066b7b94b2b11f6c4cb4","after":"7e75e3f57c41b9a6e6401e7674d7c2ff5c33975b","ref":"refs/heads/master","pushedAt":"2024-08-22T10:32:41.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: Use aes128-ctr for MAC tests since default has implicit MAC.\n\nAlso verify that the Cipher or MAC we intended to use is actually the one\nselected during the test.\n\nOpenBSD-Regress-ID: ff43fed30552afe23d1364526fe8cf88cbfafe1d","shortMessageHtmlLink":"upstream: Use aes128-ctr for MAC tests since default has implicit MAC."}},{"before":"15ace435ea1c2fab2a1cc7d9c3157fe20c776b80","after":"ebc890b8b4ba08c84cd1066b7b94b2b11f6c4cb4","ref":"refs/heads/master","pushedAt":"2024-08-21T23:46:51.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"fix incorrect default for PasswordAuthentication\n\nmerge botch spotted by gsgleason","shortMessageHtmlLink":"fix incorrect default for PasswordAuthentication"}},{"before":"51c96b6ed627779a04493a8fe25747996a37f3c2","after":"15ace435ea1c2fab2a1cc7d9c3157fe20c776b80","ref":"refs/heads/master","pushedAt":"2024-08-21T11:02:09.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: Some awks won't match on the \\r so delete it instead. Fixes\n\nregress in portable on, eg Solaris.\n\nOpenBSD-Regress-ID: 44a96d6d2f8341d89b7d5fff777502b92ac9e9ba","shortMessageHtmlLink":"upstream: Some awks won't match on the \\r so delete it instead. Fixes"}},{"before":"25c52f37a82c4da48ec537de37d7c168982b8d6d","after":"51c96b6ed627779a04493a8fe25747996a37f3c2","ref":"refs/heads/master","pushedAt":"2024-08-21T10:24:51.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: Import regenerated moduli.\n\nOpenBSD-Commit-ID: 5db7049ad5558dee5b2079d3422e8ddab187c1cc","shortMessageHtmlLink":"upstream: Import regenerated moduli."}},{"before":"3eb62b7ba49483c309b483eb9002a679014f3887","after":"25c52f37a82c4da48ec537de37d7c168982b8d6d","ref":"refs/heads/master","pushedAt":"2024-08-21T07:19:09.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: Use curve25519-sha256 kex where possible.\n\nExcept where we're explicitly testing a different kex, use\ncurve25519-sha256 since it's faster than the default and supported even\nwhen configured without OpenSSL. Add a check to ensure that the kex we\nintended to test is the one we actually tested. Speeds test up by ~5%.\n\nOpenBSD-Regress-ID: 3b27fcc2ae953cb08fd82a0d3155c498b226d6e0","shortMessageHtmlLink":"upstream: Use curve25519-sha256 kex where possible."}},{"before":"cbd3f034bbf7853618fac99d7d868a2250154ea7","after":"3eb62b7ba49483c309b483eb9002a679014f3887","ref":"refs/heads/master","pushedAt":"2024-08-20T23:24:56.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: Send only as much data as needed to trigger rekeying. Speeds\n\nup tests by about 10% in the common case, hopefully more when instrumented\nwith something like valgrind.\n\nOpenBSD-Regress-ID: 7bf9292b4803357efcf0baf7cfbdc8521f212da1","shortMessageHtmlLink":"upstream: Send only as much data as needed to trigger rekeying. Speeds"}},{"before":"4442bbc2fc661277a6dabfedb756a7e15ee8b8b8","after":"cbd3f034bbf7853618fac99d7d868a2250154ea7","ref":"refs/heads/master","pushedAt":"2024-08-20T23:22:56.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"simplify sshkey_prekey_alloc(); always use mmap","shortMessageHtmlLink":"simplify sshkey_prekey_alloc(); always use mmap"}},{"before":"2b1762115481ff2b7a60fd4db2ae69b725437462","after":"4442bbc2fc661277a6dabfedb756a7e15ee8b8b8","ref":"refs/heads/master","pushedAt":"2024-08-20T13:02:44.000Z","pushType":"push","commitsCount":5,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: Merge AEAD test into main test loop.\n\nRemoves 3 duplicate tests and speeds overall test up by about 1%.\n\nOpenBSD-Regress-ID: 5e5c9ff3f7588091ed369e34ac28520490ad2619","shortMessageHtmlLink":"upstream: Merge AEAD test into main test loop."}},{"before":"d922762ca16a7381131b242f49d7376c41fabcb5","after":"2b1762115481ff2b7a60fd4db2ae69b725437462","ref":"refs/heads/master","pushedAt":"2024-08-20T11:11:48.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: actually use the length parameter that was passed in rather\n\nthan a constant (this makes no difference in practice because the length is\nalways the same); reported by martin AT nmkd.net\n\nOpenBSD-Commit-ID: 4aecce232c2fe9b16e9217ff6bcb3c848d853e7e","shortMessageHtmlLink":"upstream: actually use the length parameter that was passed in rather"}},{"before":"a0b35c791cad1f85481b23ba46373060292e1c80","after":"d922762ca16a7381131b242f49d7376c41fabcb5","ref":"refs/heads/master","pushedAt":"2024-08-20T03:57:20.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"private key coredump protection for Linux/FreeBSD\n\nplatforms not supporting coredump exclusion using mmap/madvise flags\nfall back to plain old malloc(3).","shortMessageHtmlLink":"private key coredump protection for Linux/FreeBSD"}},{"before":"127a50f2c80572ed1a021feb11ecf941e92cbbef","after":"a0b35c791cad1f85481b23ba46373060292e1c80","ref":"refs/heads/master","pushedAt":"2024-08-17T08:35:50.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: mention that ed25519 is the default key type generated and\n\nclarify that rsa-sha2-512 is the default signature scheme when RSA is in use.\nBased on GHPR505 from SebastianRzk\n\nOpenBSD-Commit-ID: 1d90df71636a04601685d2a10a8233bcc8d4f4c5","shortMessageHtmlLink":"upstream: mention that ed25519 is the default key type generated and"}},{"before":"171427261d2079941eb1041079dbae875da37cbc","after":"127a50f2c80572ed1a021feb11ecf941e92cbbef","ref":"refs/heads/master","pushedAt":"2024-08-17T08:24:19.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: fix minor memory leak in Subsystem option parsing; from\n\nAntonio Larrosa via GHPR515\n\nOpenBSD-Commit-ID: fff3bbefd1b2c45c98cbe45c6b857b15d8a2d364","shortMessageHtmlLink":"upstream: fix minor memory leak in Subsystem option parsing; from"}},{"before":"2a50a8f1fa57857a5e124a2280bcf61cc63c77f7","after":"171427261d2079941eb1041079dbae875da37cbc","ref":"refs/heads/master","pushedAt":"2024-08-17T08:19:37.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: fix swapping of source and destination addresses in some sshd\n\nlog messages\n\nOpenBSD-Commit-ID: 24d4cbb86325275df1f037545aa3b91456e52d25","shortMessageHtmlLink":"upstream: fix swapping of source and destination addresses in some sshd"}},{"before":"1c3a7145260e03037cc18715b883880836fd122d","after":"2a50a8f1fa57857a5e124a2280bcf61cc63c77f7","ref":"refs/heads/master","pushedAt":"2024-08-17T01:25:52.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Add compat functions for EVP_Digest{Sign,Verify}.\n\nThis should make LibreSSL 3.1.x through 3.3.x work again. Code from\ntb@, ok djm@. Restore the test configs covering those.","shortMessageHtmlLink":"Add compat functions for EVP_Digest{Sign,Verify}."}},{"before":"a13856374b894397a7682b32257ed0bf67cfede9","after":"1c3a7145260e03037cc18715b883880836fd122d","ref":"refs/heads/master","pushedAt":"2024-08-17T01:22:30.000Z","pushType":"push","commitsCount":13,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"make sure that usage & man page match\n\nSSH-Copy-ID-Upstream: da5b1abe55b72a16e0430e7598e1573da01779c0","shortMessageHtmlLink":"make sure that usage & man page match"}},{"before":"4da2a1a7f648979bea6eaf3b17f5f250faed4afc","after":"a13856374b894397a7682b32257ed0bf67cfede9","ref":"refs/heads/master","pushedAt":"2024-08-15T22:30:34.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"more OPENSSL_HAS_ECC","shortMessageHtmlLink":"more OPENSSL_HAS_ECC"}},{"before":"2c53d2f32b8e3992b61682c909ae5bc5122b6e5d","after":"4da2a1a7f648979bea6eaf3b17f5f250faed4afc","ref":"refs/heads/master","pushedAt":"2024-08-15T13:36:20.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"fix merge botch that broke !OPENSSL_HAS_ECC","shortMessageHtmlLink":"fix merge botch that broke !OPENSSL_HAS_ECC"}},{"before":"342dd7a219f39119b8b686b5aaa99c8e15ede368","after":"2c53d2f32b8e3992b61682c909ae5bc5122b6e5d","ref":"refs/heads/master","pushedAt":"2024-08-15T05:10:03.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"missed OPENSSL_HAS_ECC case","shortMessageHtmlLink":"missed OPENSSL_HAS_ECC case"}},{"before":"a7c6ea8eebe0f179141ec5dbf0c9e5354417930f","after":"342dd7a219f39119b8b686b5aaa99c8e15ede368","ref":"refs/heads/master","pushedAt":"2024-08-15T05:08:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"retire testing aginst older LibreSSL versions\n\nlibressl prior to 3.4.x lack support for the EVP_DigestSign and\nEVP_DigestVerify APIs that we need now that sshkey is converted\nto EVP_PKEY.\n\nIf someone makes a good case for why we should support these versions\nthen we could bring back support with wrappers.","shortMessageHtmlLink":"retire testing aginst older LibreSSL versions"}},{"before":"339c4fc60a6250429d41fa8713f783d82aad4551","after":"a7c6ea8eebe0f179141ec5dbf0c9e5354417930f","ref":"refs/heads/master","pushedAt":"2024-08-15T02:44:38.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"sync TEST_MALLOC_OPTIONS for OpenBSD","shortMessageHtmlLink":"sync TEST_MALLOC_OPTIONS for OpenBSD"}},{"before":"1ec0a64c5dc57b8a2053a93b5ef0d02ff8598e5c","after":"339c4fc60a6250429d41fa8713f783d82aad4551","ref":"refs/heads/master","pushedAt":"2024-08-15T02:21:13.000Z","pushType":"push","commitsCount":9,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: adapt to EVP_PKEY conversion\n\nOpenBSD-Regress-ID: 0e2d4efb0ed0e392e23cd8fda183fe56531ac446","shortMessageHtmlLink":"upstream: adapt to EVP_PKEY conversion"}},{"before":"0bf6e5bb750b66b25c20a1c5a471f91850de3748","after":"1ec0a64c5dc57b8a2053a93b5ef0d02ff8598e5c","ref":"refs/heads/master","pushedAt":"2024-07-28T11:56:46.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Explicitly install libssl-devel cygwin.\n\nShould fix CI tests for cygwin default config.","shortMessageHtmlLink":"Explicitly install libssl-devel cygwin."}},{"before":"29fb6f6d46b67770084b4f12bcf8a01bd535041b","after":"0bf6e5bb750b66b25c20a1c5a471f91850de3748","ref":"refs/heads/master","pushedAt":"2024-07-25T23:49:20.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: reduce logingrace penalty.\n\nA single forgotton login that times out should be below the penalty\nthreshold.\n\nok deraadt/claudio\n\nOpenBSD-Commit-ID: cee1f7d17597c97bff8e5092af5d136fdb08f81d","shortMessageHtmlLink":"upstream: reduce logingrace penalty."}},{"before":"b05fda224bbcd2f641254534ed2175c42487f3c8","after":"29fb6f6d46b67770084b4f12bcf8a01bd535041b","ref":"refs/heads/master","pushedAt":"2024-07-25T22:51:53.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"upstream: Fix proxy multiplexing (-O proxy) bug\n\nIf a mux started with ControlPersist then later has a forwarding added using\nmux proxy connection and the forwarding was used, then when the mux proxy\nsession terminates, the mux master process will send a channel close to the\nserver with a bad channel ID and crash the connection.\n\nThis was caused by my stupidly reusing c->remote_id for mux channel\nassociations when I should have just added another member to struct channel.\n\nok markus@\n\nOpenBSD-Commit-ID: c9f474e0124e3fe456c5e43749b97d75e65b82b2","shortMessageHtmlLink":"upstream: Fix proxy multiplexing (-O proxy) bug"}},{"before":"c276672fc0e99f0c4389988d54a84c203ce325b6","after":"b05fda224bbcd2f641254534ed2175c42487f3c8","ref":"refs/heads/master","pushedAt":"2024-07-25T08:00:45.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Check for SA_RESTART before using it.\n\nok djm@","shortMessageHtmlLink":"Check for SA_RESTART before using it."}},{"before":"7717b9e9155209916cc6b4b4b54f4e8fa578e889","after":"c276672fc0e99f0c4389988d54a84c203ce325b6","ref":"refs/heads/master","pushedAt":"2024-07-20T01:08:48.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"djmdjm","name":"Damien Miller","path":"/djmdjm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/170281?s=80&v=4"},"commit":{"message":"Class-imposed login restrictions\n\nIf the following functions are available,\nadd an additional check if users are allowed to login imposed by login class.\n\n* auth_hostok(3)\n* auth_timeok(3)\n\nThese functions are implemented on FreeBSD.","shortMessageHtmlLink":"Class-imposed login restrictions"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEpnP65gA","startCursor":null,"endCursor":null}},"title":"Activity ยท openssh/openssh-portable"}