diff options
author | Colin Watson <cjwatson@debian.org> | 2020-02-21 11:57:14 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2020-02-21 14:27:02 +0000 |
commit | 886e47e745586c34e81cfd5c5fb9b5dbc8e84d04 (patch) | |
tree | dd6c3b4dc64a17c520af7aaf213163f8a0a63e56 /debian/changelog | |
parent | ac2b4c0697fcac554041ab95f81736887eadf6ec (diff) | |
parent | a2dabf35ce0228c86a288d11cc847a9d9801604f (diff) |
New upstream release (8.2p1)
Diffstat (limited to 'debian/changelog')
-rw-r--r-- | debian/changelog | 103 |
1 files changed, 100 insertions, 3 deletions
diff --git a/debian/changelog b/debian/changelog index fd967a966..b86ad184e 100644 --- a/debian/changelog +++ b/debian/changelog | |||
@@ -1,11 +1,108 @@ | |||
1 | openssh (1:8.1p1-6) UNRELEASED; urgency=medium | 1 | openssh (1:8.2p1-1) UNRELEASED; urgency=medium |
2 | 2 | ||
3 | * New upstream release (https://www.openssh.com/txt/release-8.2, closes: | ||
4 | #951582): | ||
5 | - ssh(1), sshd(8), ssh-keygen(1): this release removes the "ssh-rsa" | ||
6 | (RSA/SHA1) algorithm from those accepted for certificate signatures | ||
7 | (i.e. the client and server CASignatureAlgorithms option) and will use | ||
8 | the rsa-sha2-512 signature algorithm by default when the ssh-keygen(1) | ||
9 | CA signs new certificates. | ||
10 | - ssh(1), sshd(8): Remove diffie-hellman-group14-sha1 from the default | ||
11 | key exchange proposal for both the client and server. | ||
12 | - ssh-keygen(1): The command-line options related to the generation and | ||
13 | screening of safe prime numbers used by the | ||
14 | diffie-hellman-group-exchange-* key exchange algorithms have changed. | ||
15 | Most options have been folded under the -O flag. | ||
16 | - sshd(8): The sshd listener process title visible to ps(1) has changed | ||
17 | to include information about the number of connections that are | ||
18 | currently attempting authentication and the limits configured by | ||
19 | MaxStartups. | ||
20 | - Add support for FIDO/U2F hardware authenticators. | ||
21 | - ssh-keygen(1): Add a "no-touch-required" option when generating | ||
22 | FIDO-hosted keys, that disables their default behaviour of requiring a | ||
23 | physical touch/tap on the token during authentication. Note: not all | ||
24 | tokens support disabling the touch requirement. | ||
25 | - sshd(8): Add a sshd_config PubkeyAuthOptions directive that collects | ||
26 | miscellaneous public key authentication-related options for sshd(8). | ||
27 | At present it supports only a single option "no-touch-required". This | ||
28 | causes sshd to skip its default check for FIDO/U2F keys that the | ||
29 | signature was authorised by a touch or press event on the token | ||
30 | hardware. | ||
31 | - ssh(1), sshd(8), ssh-keygen(1): Add a "no-touch-required" option for | ||
32 | authorized_keys and a similar extension for certificates. This option | ||
33 | disables the default requirement that FIDO key signatures attest that | ||
34 | the user touched their key to authorize them, mirroring the similar | ||
35 | PubkeyAuthOptions sshd_config option. | ||
36 | - ssh-keygen(1): Add support for the writing the FIDO attestation | ||
37 | information that is returned when new keys are generated via the "-O | ||
38 | write-attestation=/path" option. FIDO attestation certificates may be | ||
39 | used to verify that a FIDO key is hosted in trusted hardware. OpenSSH | ||
40 | does not currently make use of this information, beyond optionally | ||
41 | writing it to disk. | ||
42 | - Add support for FIDO2 resident keys. | ||
43 | - sshd(8): Add an Include sshd_config keyword that allows including | ||
44 | additional configuration files via glob(3) patterns (closes: #631189). | ||
45 | - ssh(1)/sshd(8): Make the LE (low effort) DSCP code point available via | ||
46 | the IPQoS directive. | ||
47 | - ssh(1): When AddKeysToAgent=yes is set and the key contains no | ||
48 | comment, add the key to the agent with the key's path as the comment. | ||
49 | - ssh-keygen(1), ssh-agent(1): Expose PKCS#11 key labels and X.509 | ||
50 | subjects as key comments, rather than simply listing the PKCS#11 | ||
51 | provider library path. | ||
52 | - ssh-keygen(1): Allow PEM export of DSA and ECDSA keys. | ||
53 | - sshd(8): When clients get denied by MaxStartups, send a notification | ||
54 | prior to the SSH2 protocol banner according to RFC4253 section 4.2 | ||
55 | (closes: #275458). | ||
56 | - ssh(1), ssh-agent(1): When invoking the $SSH_ASKPASS prompt program, | ||
57 | pass a hint to the program to describe the type of desired prompt. | ||
58 | The possible values are "confirm" (indicating that a yes/no | ||
59 | confirmation dialog with no text entry should be shown), "none" (to | ||
60 | indicate an informational message only), or blank for the original | ||
61 | ssh-askpass behaviour of requesting a password/phrase. | ||
62 | - ssh(1): Allow forwarding a different agent socket to the path | ||
63 | specified by $SSH_AUTH_SOCK, by extending the existing ForwardAgent | ||
64 | option to accepting an explicit path or the name of an environment | ||
65 | variable in addition to yes/no. | ||
66 | - ssh-keygen(1): Add a new signature operations "find-principals" to | ||
67 | look up the principal associated with a signature from an | ||
68 | allowed-signers file. | ||
69 | - sshd(8): Expose the number of currently-authenticating connections | ||
70 | along with the MaxStartups limit in the process title visible to "ps". | ||
71 | - sshd(8): Make ClientAliveCountMax=0 have sensible semantics: it will | ||
72 | now disable connection killing entirely rather than the current | ||
73 | behaviour of instantly killing the connection after the first liveness | ||
74 | test regardless of success. | ||
75 | - sshd(8): Clarify order of AllowUsers / DenyUsers vs AllowGroups / | ||
76 | DenyGroups in the sshd(8) manual page. | ||
77 | - sshd(8): Better describe HashKnownHosts in the manual page. | ||
78 | - sshd(8): Clarify that that permitopen=/PermitOpen do no name or | ||
79 | address translation in the manual page. | ||
80 | - sshd(8): Allow the UpdateHostKeys feature to function when multiple | ||
81 | known_hosts files are in use. When updating host keys, ssh will now | ||
82 | search subsequent known_hosts files, but will add updated host keys to | ||
83 | the first specified file only. | ||
84 | - All: Replace all calls to signal(2) with a wrapper around | ||
85 | sigaction(2). This wrapper blocks all other signals during the | ||
86 | handler preventing races between handlers, and sets SA_RESTART which | ||
87 | should reduce the potential for short read/write operations. | ||
88 | - sftp(1): Fix a race condition in the SIGCHILD handler that could turn | ||
89 | in to a kill(-1). | ||
90 | - sshd(8): Fix a case where valid (but extremely large) SSH channel IDs | ||
91 | were being incorrectly rejected. | ||
92 | - ssh(1): When checking host key fingerprints as answers to new hostkey | ||
93 | prompts, ignore whitespace surrounding the fingerprint itself. | ||
94 | - All: Wait for file descriptors to be readable or writeable during | ||
95 | non-blocking connect, not just readable. Prevents a timeout when the | ||
96 | server doesn't immediately send a banner (e.g. multiplexers like | ||
97 | sslh). | ||
98 | - sshd_config(5): Document the sntrup4591761x25519-sha512@tinyssh.org | ||
99 | key exchange algorithm. | ||
3 | * Add more historical md5sums of /etc/ssh/sshd_config between 1:7.4p1-1 | 100 | * Add more historical md5sums of /etc/ssh/sshd_config between 1:7.4p1-1 |
4 | and 1:7.7p1-4 inclusive (closes: #951220). | 101 | and 1:7.7p1-4 inclusive (closes: #951220). |
5 | * ssh(1): Explain that -Y is equivalent to -X in the default configuration | 102 | * ssh(1): Explain that -Y is equivalent to -X in the default configuration |
6 | (closes: #951640). | 103 | (closes: #951640). |
7 | 104 | ||
8 | -- Colin Watson <cjwatson@debian.org> Fri, 14 Feb 2020 18:43:44 +0000 | 105 | -- Colin Watson <cjwatson@debian.org> Fri, 21 Feb 2020 12:11:52 +0000 |
9 | 106 | ||
10 | openssh (1:8.1p1-5) unstable; urgency=medium | 107 | openssh (1:8.1p1-5) unstable; urgency=medium |
11 | 108 | ||