summaryrefslogtreecommitdiff
path: root/debian/changelog
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2017-10-04 11:23:58 +0100
committerColin Watson <cjwatson@debian.org>2017-10-05 23:58:12 +0100
commit0556ea972b15607b7e13ff31bc05840881c91dd3 (patch)
treed6b8d48062d0278b5ae0eeff42d0e9afa9f26860 /debian/changelog
parentdb2122d97eb1ecdd8d99b7bf79b0dd2b5addfd92 (diff)
parent801a62eedaaf47b20dbf4b426dc3e084bf0c8d49 (diff)
New upstream release (7.6p1)
Diffstat (limited to 'debian/changelog')
-rw-r--r--debian/changelog103
1 files changed, 103 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog
index baa28dff7..14eeaedd8 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,106 @@
1openssh (1:7.6p1-1) UNRELEASED; urgency=medium
2
3 * New upstream release (https://www.openssh.com/txt/release-7.6):
4 - SECURITY: sftp-server(8): In read-only mode, sftp-server was
5 incorrectly permitting creation of zero-length files. Reported by
6 Michal Zalewski.
7 - ssh(1): Delete SSH protocol version 1 support, associated
8 configuration options and documentation (LP: #1584321).
9 - ssh(1)/sshd(8): Remove support for the hmac-ripemd160 MAC.
10 - ssh(1)/sshd(8): Remove support for the arcfour, blowfish and CAST
11 ciphers.
12 - Refuse RSA keys <1024 bits in length and improve reporting for keys
13 that do not meet this requirement.
14 - ssh(1): Do not offer CBC ciphers by default.
15 - ssh(1): Add RemoteCommand option to specify a command in the ssh
16 config file instead of giving it on the client's command line. This
17 allows the configuration file to specify the command that will be
18 executed on the remote host.
19 - sshd(8): Add ExposeAuthInfo option that enables writing details of the
20 authentication methods used (including public keys where applicable)
21 to a file that is exposed via a $SSH_USER_AUTH environment variable in
22 the subsequent session.
23 - ssh(1): Add support for reverse dynamic forwarding. In this mode, ssh
24 will act as a SOCKS4/5 proxy and forward connections to destinations
25 requested by the remote SOCKS client. This mode is requested using
26 extended syntax for the -R and RemoteForward options and, because it
27 is implemented solely at the client, does not require the server be
28 updated to be supported.
29 - sshd(8): Allow LogLevel directive in sshd_config Match blocks.
30 - ssh-keygen(1): Allow inclusion of arbitrary string or flag certificate
31 extensions and critical options.
32 - ssh-keygen(1): Allow ssh-keygen to use a key held in ssh-agent as a CA
33 when signing certificates.
34 - ssh(1)/sshd(8): Allow IPQoS=none in ssh/sshd to not set an explicit
35 ToS/DSCP value and just use the operating system default.
36 - ssh-add(1): Add -q option to make ssh-add quiet on success.
37 - ssh(1): Expand the StrictHostKeyChecking option with two new settings.
38 The first "accept-new" will automatically accept hitherto-unseen keys
39 but will refuse connections for changed or invalid hostkeys. This is
40 a safer subset of the current behaviour of StrictHostKeyChecking=no.
41 The second setting "off", is a synonym for the current behaviour of
42 StrictHostKeyChecking=no: accept new host keys, and continue
43 connection for hosts with incorrect hostkeys. A future release will
44 change the meaning of StrictHostKeyChecking=no to the behaviour of
45 "accept-new".
46 - ssh(1): Add SyslogFacility option to ssh(1) matching the equivalent
47 option in sshd(8).
48 - ssh(1): Use HostKeyAlias if specified instead of hostname for matching
49 host certificate principal names.
50 - sftp(1): Implement sorting for globbed ls.
51 - ssh(1): Add a user@host prefix to client's "Permission denied"
52 messages, useful in particular when using "stacked" connections (e.g.
53 ssh -J) where it's not clear which host is denying.
54 - ssh(1): Accept unknown EXT_INFO extension values that contain \0
55 characters. These are legal, but would previously cause fatal
56 connection errors if received.
57 - sftp(1): Print '?' instead of incorrect link count (that the protocol
58 doesn't provide) for remote listings.
59 - ssh(1): Return failure rather than fatal() for more cases during
60 session multiplexing negotiations. Causes the session to fall back to
61 a non-mux connection if they occur.
62 - ssh(1): Mention that the server may send debug messages to explain
63 public key authentication problems under some circumstances.
64 - Translate OpenSSL error codes to better report incorrect passphrase
65 errors when loading private keys.
66 - sshd(8): Adjust compatibility patterns for WinSCP to correctly
67 identify versions that implement only the legacy DH group exchange
68 scheme (closes: #877800).
69 - ssh(1): Print the "Killed by signal 1" message only at LogLevel
70 verbose so that it is not shown at the default level; prevents it from
71 appearing during ssh -J and equivalent ProxyCommand configs.
72 - ssh-keygen(1): When generating all hostkeys (ssh-keygen -A), clobber
73 existing keys if they exist but are zero length. Zero-length keys
74 could previously be made if ssh-keygen failed or was interrupted part
75 way through generating them.
76 - ssh-keyscan(1): Avoid double-close() on file descriptors.
77 - sshd(8): Avoid reliance on shared use of pointers shared between
78 monitor and child sshd processes.
79 - sshd_config(8): Document available AuthenticationMethods.
80 - ssh(1): Avoid truncation in some login prompts.
81 - ssh(1): Make "--" before the hostname terminate argument processing
82 after the hostname too (closes: #873201).
83 - ssh-keygen(1): Switch from aes256-cbc to aes256-ctr for encrypting
84 new-style private keys.
85 - ssh(1): Warn and do not attempt to use keys when the public and
86 private halves do not match.
87 - sftp(1): Don't print verbose error message when ssh disconnects from
88 under sftp.
89 - sshd(8): Fix keepalive scheduling problem: prevent activity on a
90 forwarded port from preventing the keepalive from being sent.
91 - sshd(8): When started without root privileges, don't require the
92 privilege separation user or path to exist.
93 - ssh(1)/sshd(8): Correctness fix for channels implementation: accept
94 channel IDs greater than 0x7FFFFFFF.
95 - sshd(8): Expose list of completed authentication methods to PAM via
96 the SSH_AUTH_INFO_0 PAM environment variable.
97 - ssh(1)/sshd(8): Fix several problems in the tun/tap forwarding code,
98 mostly to do with host/network byte order confusion.
99 - sshd(8): Avoid Linux seccomp violations on ppc64le over the socketcall
100 syscall.
101
102 -- Colin Watson <cjwatson@debian.org> Wed, 04 Oct 2017 12:34:34 +0100
103
1openssh (1:7.5p1-10) unstable; urgency=medium 104openssh (1:7.5p1-10) unstable; urgency=medium
2 105
3 * Tell haveged to create the pid file we expect. 106 * Tell haveged to create the pid file we expect.