summaryrefslogtreecommitdiff
path: root/debian/changelog
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2015-08-19 17:00:17 +0100
committerColin Watson <cjwatson@debian.org>2015-08-19 17:40:32 +0100
commit927d0032b865f05679d3cc052bc13cb0e6490283 (patch)
tree69f782deb79182f26069ff41e9539f17e6e44912 /debian/changelog
parentd35c65e77ab6a6a95fefa2c852827ba08e507f0b (diff)
parent810eecd6b2e03770f21e46b5cb8ce8c7fcd46da8 (diff)
New upstream release (6.9p1).
Diffstat (limited to 'debian/changelog')
-rw-r--r--debian/changelog68
1 files changed, 67 insertions, 1 deletions
diff --git a/debian/changelog b/debian/changelog
index 60049cd71..06ec4ab09 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,4 +1,4 @@
1openssh (1:6.8p1-1) UNRELEASED; urgency=medium 1openssh (1:6.9p1-1) UNRELEASED; urgency=medium
2 2
3 * New upstream release (http://www.openssh.com/txt/release-6.8): 3 * New upstream release (http://www.openssh.com/txt/release-6.8):
4 - sshd(8): UseDNS now defaults to 'no'. Configurations that match 4 - sshd(8): UseDNS now defaults to 'no'. Configurations that match
@@ -63,6 +63,72 @@ openssh (1:6.8p1-1) UNRELEASED; urgency=medium
63 - ssh-keygen(1): Fix broken private key conversion from non-OpenSSH 63 - ssh-keygen(1): Fix broken private key conversion from non-OpenSSH
64 formats. 64 formats.
65 - ssh-keygen(1): Fix KRL generation bug when multiple CAs are in use. 65 - ssh-keygen(1): Fix KRL generation bug when multiple CAs are in use.
66 * New upstream release (http://www.openssh.com/txt/release-6.9):
67 - SECURITY: ssh(1): When forwarding X11 connections with
68 ForwardX11Trusted=no, connections made after ForwardX11Timeout expired
69 could be permitted and no longer subject to XSECURITY restrictions
70 because of an ineffective timeout check in ssh(1) coupled with "fail
71 open" behaviour in the X11 server when clients attempted connections
72 with expired credentials. This problem was reported by Jann Horn.
73 - SECURITY: ssh-agent(1): Fix weakness of agent locking (ssh-add -x) to
74 password guessing by implementing an increasing failure delay, storing
75 a salted hash of the password rather than the password itself and
76 using a timing-safe comparison function for verifying unlock attempts.
77 This problem was reported by Ryan Castellucci.
78 - sshd(8): Support admin-specified arguments to AuthorizedKeysCommand
79 (closes: #740494).
80 - sshd(8): Add AuthorizedPrincipalsCommand that allows retrieving
81 authorized principals information from a subprocess rather than a
82 file.
83 - ssh(1), ssh-add(1): Support PKCS#11 devices with external PIN entry
84 devices.
85 - ssh-keygen(1): Support "ssh-keygen -lF hostname" to search known_hosts
86 and print key hashes rather than full keys.
87 - ssh-agent(1): Add -D flag to leave ssh-agent in foreground without
88 enabling debug mode.
89 - ssh(1), sshd(8): Deprecate legacy SSH2_MSG_KEX_DH_GEX_REQUEST_OLD
90 message and do not try to use it against some 3rd-party SSH
91 implementations that use it (older PuTTY, WinSCP).
92 - ssh(1), sshd(8): Cap DH-GEX group size at 4Kbits for Cisco
93 implementations as some would fail when attempting to use group sizes
94 >4K (closes: #740307, LP: #1287222).
95 - ssh(1): Fix out-of-bound read in EscapeChar configuration option
96 parsing.
97 - sshd(8): Fix application of PermitTunnel, LoginGraceTime,
98 AuthenticationMethods and StreamLocalBindMask options in Match blocks.
99 - ssh(1), sshd(8): Improve disconnection message on TCP reset.
100 - ssh(1): Remove failed remote forwards established by multiplexing from
101 the list of active forwards.
102 - sshd(8): Make parsing of authorized_keys "environment=" options
103 independent of PermitUserEnv being enabled.
104 - sshd(8): Fix post-auth crash with permitopen=none (closes: #778807).
105 - ssh(1), ssh-add(1), ssh-keygen(1): Allow new-format private keys to be
106 encrypted with AEAD ciphers.
107 - ssh(1): Allow ListenAddress, Port and AddressFamily configuration
108 options to appear in any order.
109 - sshd(8): Check for and reject missing arguments for VersionAddendum
110 and ForceCommand.
111 - ssh(1), sshd(8): Don't treat unknown certificate extensions as fatal.
112 - ssh-keygen(1): Make stdout and stderr output consistent.
113 - ssh(1): Mention missing DISPLAY environment in debug log when X11
114 forwarding requested.
115 - sshd(8): Correctly record login when UseLogin is set.
116 - sshd(8): Add some missing options to sshd -T output and fix output of
117 VersionAddendum and HostCertificate.
118 - Document and improve consistency of options that accept a "none"
119 argument: TrustedUserCAKeys, RevokedKeys, AuthorizedPrincipalsFile.
120 - ssh(1): Include remote username in debug output.
121 - sshd(8): Avoid compatibility problem with some versions of Tera Term,
122 which would crash when they received the hostkeys notification message
123 (hostkeys-00@openssh.com).
124 - sshd(8): Mention ssh-keygen -E as useful when comparing legacy MD5
125 host key fingerprints.
126 - ssh(1): Clarify pseudo-terminal request behaviour and make manual
127 language consistent.
128 - ssh(1): Document that the TERM environment variable is not subject to
129 SendEnv and AcceptEnv; bz#2386
130 - sshd(8): Format UsePAM setting when using sshd -T (closes: #767648).
131 - moduli(5): Update DH-GEX moduli (closes: #787037).
66 * Thanks to Jakub Jelen of Red Hat for Fedora's rebased version of the 132 * Thanks to Jakub Jelen of Red Hat for Fedora's rebased version of the
67 GSSAPI key exchange patch. 133 GSSAPI key exchange patch.
68 134