diff options
author | Colin Watson <cjwatson@debian.org> | 2015-08-19 17:00:17 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2015-08-19 17:40:32 +0100 |
commit | 927d0032b865f05679d3cc052bc13cb0e6490283 (patch) | |
tree | 69f782deb79182f26069ff41e9539f17e6e44912 /debian/changelog | |
parent | d35c65e77ab6a6a95fefa2c852827ba08e507f0b (diff) | |
parent | 810eecd6b2e03770f21e46b5cb8ce8c7fcd46da8 (diff) |
New upstream release (6.9p1).
Diffstat (limited to 'debian/changelog')
-rw-r--r-- | debian/changelog | 68 |
1 files changed, 67 insertions, 1 deletions
diff --git a/debian/changelog b/debian/changelog index 60049cd71..06ec4ab09 100644 --- a/debian/changelog +++ b/debian/changelog | |||
@@ -1,4 +1,4 @@ | |||
1 | openssh (1:6.8p1-1) UNRELEASED; urgency=medium | 1 | openssh (1:6.9p1-1) UNRELEASED; urgency=medium |
2 | 2 | ||
3 | * New upstream release (http://www.openssh.com/txt/release-6.8): | 3 | * New upstream release (http://www.openssh.com/txt/release-6.8): |
4 | - sshd(8): UseDNS now defaults to 'no'. Configurations that match | 4 | - sshd(8): UseDNS now defaults to 'no'. Configurations that match |
@@ -63,6 +63,72 @@ openssh (1:6.8p1-1) UNRELEASED; urgency=medium | |||
63 | - ssh-keygen(1): Fix broken private key conversion from non-OpenSSH | 63 | - ssh-keygen(1): Fix broken private key conversion from non-OpenSSH |
64 | formats. | 64 | formats. |
65 | - ssh-keygen(1): Fix KRL generation bug when multiple CAs are in use. | 65 | - ssh-keygen(1): Fix KRL generation bug when multiple CAs are in use. |
66 | * New upstream release (http://www.openssh.com/txt/release-6.9): | ||
67 | - SECURITY: ssh(1): When forwarding X11 connections with | ||
68 | ForwardX11Trusted=no, connections made after ForwardX11Timeout expired | ||
69 | could be permitted and no longer subject to XSECURITY restrictions | ||
70 | because of an ineffective timeout check in ssh(1) coupled with "fail | ||
71 | open" behaviour in the X11 server when clients attempted connections | ||
72 | with expired credentials. This problem was reported by Jann Horn. | ||
73 | - SECURITY: ssh-agent(1): Fix weakness of agent locking (ssh-add -x) to | ||
74 | password guessing by implementing an increasing failure delay, storing | ||
75 | a salted hash of the password rather than the password itself and | ||
76 | using a timing-safe comparison function for verifying unlock attempts. | ||
77 | This problem was reported by Ryan Castellucci. | ||
78 | - sshd(8): Support admin-specified arguments to AuthorizedKeysCommand | ||
79 | (closes: #740494). | ||
80 | - sshd(8): Add AuthorizedPrincipalsCommand that allows retrieving | ||
81 | authorized principals information from a subprocess rather than a | ||
82 | file. | ||
83 | - ssh(1), ssh-add(1): Support PKCS#11 devices with external PIN entry | ||
84 | devices. | ||
85 | - ssh-keygen(1): Support "ssh-keygen -lF hostname" to search known_hosts | ||
86 | and print key hashes rather than full keys. | ||
87 | - ssh-agent(1): Add -D flag to leave ssh-agent in foreground without | ||
88 | enabling debug mode. | ||
89 | - ssh(1), sshd(8): Deprecate legacy SSH2_MSG_KEX_DH_GEX_REQUEST_OLD | ||
90 | message and do not try to use it against some 3rd-party SSH | ||
91 | implementations that use it (older PuTTY, WinSCP). | ||
92 | - ssh(1), sshd(8): Cap DH-GEX group size at 4Kbits for Cisco | ||
93 | implementations as some would fail when attempting to use group sizes | ||
94 | >4K (closes: #740307, LP: #1287222). | ||
95 | - ssh(1): Fix out-of-bound read in EscapeChar configuration option | ||
96 | parsing. | ||
97 | - sshd(8): Fix application of PermitTunnel, LoginGraceTime, | ||
98 | AuthenticationMethods and StreamLocalBindMask options in Match blocks. | ||
99 | - ssh(1), sshd(8): Improve disconnection message on TCP reset. | ||
100 | - ssh(1): Remove failed remote forwards established by multiplexing from | ||
101 | the list of active forwards. | ||
102 | - sshd(8): Make parsing of authorized_keys "environment=" options | ||
103 | independent of PermitUserEnv being enabled. | ||
104 | - sshd(8): Fix post-auth crash with permitopen=none (closes: #778807). | ||
105 | - ssh(1), ssh-add(1), ssh-keygen(1): Allow new-format private keys to be | ||
106 | encrypted with AEAD ciphers. | ||
107 | - ssh(1): Allow ListenAddress, Port and AddressFamily configuration | ||
108 | options to appear in any order. | ||
109 | - sshd(8): Check for and reject missing arguments for VersionAddendum | ||
110 | and ForceCommand. | ||
111 | - ssh(1), sshd(8): Don't treat unknown certificate extensions as fatal. | ||
112 | - ssh-keygen(1): Make stdout and stderr output consistent. | ||
113 | - ssh(1): Mention missing DISPLAY environment in debug log when X11 | ||
114 | forwarding requested. | ||
115 | - sshd(8): Correctly record login when UseLogin is set. | ||
116 | - sshd(8): Add some missing options to sshd -T output and fix output of | ||
117 | VersionAddendum and HostCertificate. | ||
118 | - Document and improve consistency of options that accept a "none" | ||
119 | argument: TrustedUserCAKeys, RevokedKeys, AuthorizedPrincipalsFile. | ||
120 | - ssh(1): Include remote username in debug output. | ||
121 | - sshd(8): Avoid compatibility problem with some versions of Tera Term, | ||
122 | which would crash when they received the hostkeys notification message | ||
123 | (hostkeys-00@openssh.com). | ||
124 | - sshd(8): Mention ssh-keygen -E as useful when comparing legacy MD5 | ||
125 | host key fingerprints. | ||
126 | - ssh(1): Clarify pseudo-terminal request behaviour and make manual | ||
127 | language consistent. | ||
128 | - ssh(1): Document that the TERM environment variable is not subject to | ||
129 | SendEnv and AcceptEnv; bz#2386 | ||
130 | - sshd(8): Format UsePAM setting when using sshd -T (closes: #767648). | ||
131 | - moduli(5): Update DH-GEX moduli (closes: #787037). | ||
66 | * Thanks to Jakub Jelen of Red Hat for Fedora's rebased version of the | 132 | * Thanks to Jakub Jelen of Red Hat for Fedora's rebased version of the |
67 | GSSAPI key exchange patch. | 133 | GSSAPI key exchange patch. |
68 | 134 | ||