summaryrefslogtreecommitdiff
path: root/debian/NEWS
diff options
context:
space:
mode:
Diffstat (limited to 'debian/NEWS')
-rw-r--r--debian/NEWS195
1 files changed, 195 insertions, 0 deletions
diff --git a/debian/NEWS b/debian/NEWS
new file mode 100644
index 000000000..08e596552
--- /dev/null
+++ b/debian/NEWS
@@ -0,0 +1,195 @@
1openssh (1:7.6p1-1) unstable; urgency=medium
2
3 OpenSSH 7.6 includes a number of changes that may affect existing
4 configurations:
5
6 * ssh(1): Delete SSH protocol version 1 support, associated configuration
7 options and documentation.
8 * ssh(1)/sshd(8): Remove support for the hmac-ripemd160 MAC.
9 * ssh(1)/sshd(8): Remove support for the arcfour, blowfish and CAST
10 ciphers.
11 * Refuse RSA keys <1024 bits in length and improve reporting for keys
12 that do not meet this requirement.
13 * ssh(1): Do not offer CBC ciphers by default.
14
15 -- Colin Watson <cjwatson@debian.org> Fri, 06 Oct 2017 12:36:48 +0100
16
17openssh (1:7.5p1-1) experimental; urgency=medium
18
19 OpenSSH 7.5 includes a number of changes that may affect existing
20 configurations:
21
22 * This release deprecates the sshd_config UsePrivilegeSeparation option,
23 thereby making privilege separation mandatory.
24
25 * The format of several log messages emitted by the packet code has
26 changed to include additional information about the user and their
27 authentication state. Software that monitors ssh/sshd logs may need to
28 account for these changes. For example:
29
30 Connection closed by user x 1.1.1.1 port 1234 [preauth]
31 Connection closed by authenticating user x 10.1.1.1 port 1234 [preauth]
32 Connection closed by invalid user x 1.1.1.1 port 1234 [preauth]
33
34 Affected messages include connection closure, timeout, remote
35 disconnection, negotiation failure and some other fatal messages
36 generated by the packet code.
37
38 -- Colin Watson <cjwatson@debian.org> Sun, 02 Apr 2017 02:58:01 +0100
39
40openssh (1:7.4p1-7) unstable; urgency=medium
41
42 This version restores the default for AuthorizedKeysFile to search both
43 ~/.ssh/authorized_keys and ~/.ssh/authorized_keys2, as was the case in
44 Debian configurations before 1:7.4p1-1. Upstream intends to phase out
45 searching ~/.ssh/authorized_keys2 by default, so you should ensure that
46 you are only using ~/.ssh/authorized_keys, at least for critical
47 administrative access; do not assume that the current default will remain
48 in place forever.
49
50 -- Colin Watson <cjwatson@debian.org> Sun, 05 Mar 2017 02:12:42 +0000
51
52openssh (1:7.4p1-1) unstable; urgency=medium
53
54 OpenSSH 7.4 includes a number of changes that may affect existing
55 configurations:
56
57 * ssh(1): Remove 3des-cbc from the client's default proposal. 64-bit
58 block ciphers are not safe in 2016 and we don't want to wait until
59 attacks like SWEET32 are extended to SSH. As 3des-cbc was the only
60 mandatory cipher in the SSH RFCs, this may cause problems connecting to
61 older devices using the default configuration, but it's highly likely
62 that such devices already need explicit configuration for key exchange
63 and hostkey algorithms already anyway.
64 * sshd(8): Remove support for pre-authentication compression. Doing
65 compression early in the protocol probably seemed reasonable in the
66 1990s, but today it's clearly a bad idea in terms of both cryptography
67 (cf. multiple compression oracle attacks in TLS) and attack surface.
68 Pre-auth compression support has been disabled by default for >10
69 years. Support remains in the client.
70 * ssh-agent will refuse to load PKCS#11 modules outside a whitelist of
71 trusted paths by default. The path whitelist may be specified at
72 run-time.
73 * sshd(8): When a forced-command appears in both a certificate and an
74 authorized keys/principals command= restriction, sshd will now refuse
75 to accept the certificate unless they are identical. The previous
76 (documented) behaviour of having the certificate forced-command
77 override the other could be a bit confusing and error-prone.
78 * sshd(8): Remove the UseLogin configuration directive and support for
79 having /bin/login manage login sessions.
80
81 The unprivileged sshd process that deals with pre-authentication network
82 traffic is now subject to additional sandboxing restrictions by default:
83 that is, the default sshd_config now sets UsePrivilegeSeparation to
84 "sandbox" rather than "yes". This has been the case upstream for a while,
85 but until now the Debian configuration diverged unnecessarily.
86
87 -- Colin Watson <cjwatson@debian.org> Tue, 27 Dec 2016 18:01:46 +0000
88
89openssh (1:7.2p1-1) unstable; urgency=medium
90
91 OpenSSH 7.2 disables a number of legacy cryptographic algorithms by
92 default in ssh:
93
94 * Several ciphers blowfish-cbc, cast128-cbc, all arcfour variants and the
95 rijndael-cbc aliases for AES.
96 * MD5-based and truncated HMAC algorithms.
97
98 These algorithms are already disabled by default in sshd.
99
100 -- Colin Watson <cjwatson@debian.org> Tue, 08 Mar 2016 11:47:20 +0000
101
102openssh (1:7.1p1-2) unstable; urgency=medium
103
104 OpenSSH 7.0 disables several pieces of weak, legacy, and/or unsafe
105 cryptography.
106
107 * Support for the legacy SSH version 1 protocol is disabled by default at
108 compile time. Note that this also means that the Cipher keyword in
109 ssh_config(5) is effectively no longer usable; use Ciphers instead for
110 protocol 2. The openssh-client-ssh1 package includes "ssh1", "scp1",
111 and "ssh-keygen1" binaries which you can use if you have no alternative
112 way to connect to an outdated SSH1-only server; please contact the
113 server administrator or system vendor in such cases and ask them to
114 upgrade.
115 * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange is
116 disabled by default at run-time. It may be re-enabled using the
117 instructions at http://www.openssh.com/legacy.html
118 * Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled by
119 default at run-time. These may be re-enabled using the instructions at
120 http://www.openssh.com/legacy.html
121 * Support for the legacy v00 cert format has been removed.
122
123 Future releases will retire more legacy cryptography, including:
124
125 * Refusing all RSA keys smaller than 1024 bits (the current minimum is
126 768 bits).
127 * Several ciphers will be disabled by default: blowfish-cbc, cast128-cbc,
128 all arcfour variants, and the rijndael-cbc aliases for AES.
129 * MD5-based HMAC algorithms will be disabled by default.
130
131 -- Colin Watson <cjwatson@debian.org> Tue, 08 Dec 2015 15:33:08 +0000
132
133openssh (1:6.9p1-1) unstable; urgency=medium
134
135 UseDNS now defaults to 'no'. Configurations that match against the client
136 host name (via sshd_config or authorized_keys) may need to re-enable it or
137 convert to matching against addresses.
138
139 -- Colin Watson <cjwatson@debian.org> Thu, 20 Aug 2015 10:38:58 +0100
140
141openssh (1:6.7p1-5) unstable; urgency=medium
142
143 openssh-server 1:6.7p1-4 changed the default setting of AcceptEnv to list
144 a number of specific LC_FOO variables rather than the wildcard LC_*. I
145 have since been persuaded that this was a bad idea and have reverted it,
146 but it is difficult to automatically undo the change to
147 /etc/ssh/sshd_config without compounding the problem (that of modifying
148 configuration that some users did not want to be modified) further. Most
149 users who upgraded via version 1:6.7p1-4 should restore the previous value
150 of "AcceptEnv LANG LC_*" in /etc/ssh/sshd_config.
151
152 -- Colin Watson <cjwatson@debian.org> Sun, 22 Mar 2015 23:09:32 +0000
153
154openssh (1:5.4p1-2) unstable; urgency=low
155
156 Smartcard support is now available using PKCS#11 tokens. If you were
157 previously using an unofficial build of Debian's OpenSSH package with
158 OpenSC-based smartcard support added, then note that commands like
159 'ssh-add -s 0' will no longer work; you need to use 'ssh-add -s
160 /usr/lib/opensc-pkcs11.so' instead.
161
162 -- Colin Watson <cjwatson@debian.org> Sat, 10 Apr 2010 01:08:59 +0100
163
164openssh (1:3.8.1p1-9) experimental; urgency=low
165
166 The ssh package has been split into openssh-client and openssh-server. If
167 you had previously requested that the sshd server should not be run, then
168 that request will still be honoured. However, the recommended approach is
169 now to remove the openssh-server package if you do not want to run sshd.
170 You can remove the old /etc/ssh/sshd_not_to_be_run marker file after doing
171 that.
172
173 -- Colin Watson <cjwatson@debian.org> Mon, 2 Aug 2004 20:48:54 +0100
174
175openssh (1:3.5p1-1) unstable; urgency=low
176
177 This version of OpenSSH disables the environment option for public keys by
178 default, in order to avoid certain attacks (for example, LD_PRELOAD). If
179 you are using this option in an authorized_keys file, beware that the keys
180 in question will no longer work until the option is removed.
181
182 To re-enable this option, set "PermitUserEnvironment yes" in
183 /etc/ssh/sshd_config after the upgrade is complete, taking note of the
184 warning in the sshd_config(5) manual page.
185
186 -- Colin Watson <cjwatson@debian.org> Sat, 26 Oct 2002 19:41:51 +0100
187
188openssh (1:3.0.1p1-1) unstable; urgency=high
189
190 As of version 3, OpenSSH no longer uses separate files for ssh1 and ssh2
191 keys. This means the authorized_keys2 and known_hosts2 files are no longer
192 needed. They will still be read in order to maintain backward
193 compatibility.
194
195 -- Matthew Vernon <matthew@debian.org> Thu, 28 Nov 2001 17:43:01 +0000