summaryrefslogtreecommitdiff
path: root/debian/changelog
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2018-10-19 21:29:01 +0100
committerColin Watson <cjwatson@debian.org>2018-10-20 22:54:15 +0100
commitd80ebbf028196b2478beebf5a290b97f35e1eed9 (patch)
tree6666a5484923a26738675ff27a6186cfe15d4cad /debian/changelog
parent4f5bbf3f11efeec65bbd56464b20a19bd250e5cc (diff)
parent1d2a55436d4b556269f42ad5f7e16608b5a8ed74 (diff)
New upstream release (7.9p1)
Diffstat (limited to 'debian/changelog')
-rw-r--r--debian/changelog57
1 files changed, 57 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog
index 64e1145c4..68fb28bb3 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,60 @@
1openssh (1:7.9p1-1) UNRELEASED; urgency=medium
2
3 * New upstream release (https://www.openssh.com/txt/release-7.9):
4 - ssh(1), sshd(8): allow most port numbers to be specified using service
5 names from getservbyname(3) (typically /etc/services; closes:
6 #177406).
7 - ssh(1): allow the IdentityAgent configuration directive to accept
8 environment variable names. This supports the use of multiple agent
9 sockets without needing to use fixed paths.
10 - sshd(8): support signalling sessions via the SSH protocol. A limited
11 subset of signals is supported and only for login or command sessions
12 (i.e. not subsystems) that were not subject to a forced command via
13 authorized_keys or sshd_config.
14 - ssh(1): support "ssh -Q sig" to list supported signature options.
15 Also "ssh -Q help" to show the full set of supported queries.
16 - ssh(1), sshd(8): add a CASignatureAlgorithms option for the client and
17 server configs to allow control over which signature formats are
18 allowed for CAs to sign certificates. For example, this allows
19 banning CAs that sign certificates using the RSA-SHA1 signature
20 algorithm.
21 - sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to revoke
22 keys specified by SHA256 hash.
23 - ssh-keygen(1): allow creation of key revocation lists directly from
24 base64-encoded SHA256 fingerprints. This supports revoking keys using
25 only the information contained in sshd(8) authentication log messages.
26 - ssh(1), ssh-keygen(1): avoid spurious "invalid format" errors when
27 attempting to load PEM private keys while using an incorrect
28 passphrase.
29 - sshd(8): when a channel closed message is received from a client,
30 close the stderr file descriptor at the same time stdout is closed.
31 This avoids stuck processes if they were waiting for stderr to close
32 and were insensitive to stdin/out closing (closes: #844494).
33 - ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11
34 forwarding timeout and support X11 forwarding indefinitely.
35 Previously the behaviour of ForwardX11Timeout=0 was undefined.
36 - sshd(8): when compiled with GSSAPI support, cache supported method
37 OIDs regardless of whether GSSAPI authentication is enabled in the
38 main section of sshd_config. This avoids sandbox violations if GSSAPI
39 authentication was later enabled in a Match block.
40 - sshd(8): do not fail closed when configured with a text key revocation
41 list that contains a too-short key.
42 - ssh(1): treat connections with ProxyJump specified the same as ones
43 with a ProxyCommand set with regards to hostname canonicalisation
44 (i.e. don't try to canonicalise the hostname unless
45 CanonicalizeHostname is set to 'always').
46 - ssh(1): fix regression in OpenSSH 7.8 that could prevent public-key
47 authentication using certificates hosted in a ssh-agent(1) or against
48 sshd(8) from OpenSSH <7.8 (LP: #1790963).
49 - All: support building against the openssl-1.1 API (releases 1.1.0g and
50 later). The openssl-1.0 API will remain supported at least until
51 OpenSSL terminates security patch support for that API version
52 (closes: #828475).
53 - sshd(8): allow the futex(2) syscall in the Linux seccomp sandbox;
54 apparently required by some glibc/OpenSSL combinations.
55
56 -- Colin Watson <cjwatson@debian.org> Fri, 19 Oct 2018 21:34:47 +0100
57
1openssh (1:7.8p1-1) unstable; urgency=medium 58openssh (1:7.8p1-1) unstable; urgency=medium
2 59
3 * New upstream release (https://www.openssh.com/txt/release-7.8, closes: 60 * New upstream release (https://www.openssh.com/txt/release-7.8, closes: