summaryrefslogtreecommitdiff
path: root/debian/NEWS
diff options
context:
space:
mode:
Diffstat (limited to 'debian/NEWS')
-rw-r--r--debian/NEWS274
1 files changed, 274 insertions, 0 deletions
diff --git a/debian/NEWS b/debian/NEWS
new file mode 100644
index 000000000..17ec2c1be
--- /dev/null
+++ b/debian/NEWS
@@ -0,0 +1,274 @@
1openssh (1:8.1p1-1) UNRELEASED; urgency=medium
2
3 OpenSSH 8.1 includes a number of changes that may affect existing
4 configurations:
5
6 * ssh-keygen(1): when acting as a CA and signing certificates with an RSA
7 key, default to using the rsa-sha2-512 signature algorithm.
8 Certificates signed by RSA keys will therefore be incompatible with
9 OpenSSH versions prior to 7.2 unless the default is overridden (using
10 "ssh-keygen -t ssh-rsa -s ...").
11
12 -- Colin Watson <cjwatson@debian.org> Wed, 09 Oct 2019 23:18:42 +0100
13
14openssh (1:8.0p1-1) experimental; urgency=medium
15
16 OpenSSH 8.0 includes a number of changes that may affect existing
17 configurations:
18
19 * sshd(8): Remove support for obsolete "host/port" syntax.
20 Slash-separated host/port was added in 2001 as an alternative to
21 host:port syntax for the benefit of IPv6 users. These days there are
22 established standards for this like [::1]:22 and the slash syntax is
23 easily mistaken for CIDR notation, which OpenSSH supports for some
24 things. Remove the slash notation from ListenAddress and PermitOpen.
25
26 -- Colin Watson <cjwatson@debian.org> Sun, 09 Jun 2019 22:47:27 +0100
27
28openssh (1:7.9p1-1) unstable; urgency=medium
29
30 OpenSSH 7.9 includes a number of changes that may affect existing
31 configurations:
32
33 * ssh(1), sshd(8): the setting of the new CASignatureAlgorithms option
34 bans the use of DSA keys as certificate authorities.
35 * sshd(8): the authentication success/failure log message has changed
36 format slightly. It now includes the certificate fingerprint
37 (previously it included only key ID and CA key fingerprint).
38
39 -- Colin Watson <cjwatson@debian.org> Sun, 21 Oct 2018 10:39:24 +0100
40
41openssh (1:7.8p1-1) unstable; urgency=medium
42
43 OpenSSH 7.8 includes a number of changes that may affect existing
44 configurations:
45
46 * ssh-keygen(1): Write OpenSSH format private keys by default instead of
47 using OpenSSL's PEM format. The OpenSSH format, supported in OpenSSH
48 releases since 2014 and described in the PROTOCOL.key file in the
49 source distribution, offers substantially better protection against
50 offline password guessing and supports key comments in private keys.
51 If necessary, it is possible to write old PEM-style keys by adding "-m
52 PEM" to ssh-keygen's arguments when generating or updating a key.
53 * sshd(8): Remove internal support for S/Key multiple factor
54 authentication. S/Key may still be used via PAM or BSD auth.
55 * ssh(1): Remove vestigial support for running ssh(1) as setuid. This
56 used to be required for hostbased authentication and the (long gone)
57 rhosts-style authentication, but has not been necessary for a long
58 time. Attempting to execute ssh as a setuid binary, or with uid !=
59 effective uid will now yield a fatal error at runtime.
60 * sshd(8): The semantics of PubkeyAcceptedKeyTypes and the similar
61 HostbasedAcceptedKeyTypes options have changed. These now specify
62 signature algorithms that are accepted for their respective
63 authentication mechanism, where previously they specified accepted key
64 types. This distinction matters when using the RSA/SHA2 signature
65 algorithms "rsa-sha2-256", "rsa-sha2-512" and their certificate
66 counterparts. Configurations that override these options but omit
67 these algorithm names may cause unexpected authentication failures (no
68 action is required for configurations that accept the default for these
69 options).
70 * sshd(8): The precedence of session environment variables has changed.
71 ~/.ssh/environment and environment="..." options in authorized_keys
72 files can no longer override SSH_* variables set implicitly by sshd.
73 * ssh(1)/sshd(8): The default IPQoS used by ssh/sshd has changed. They
74 will now use DSCP AF21 for interactive traffic and CS1 for bulk. For a
75 detailed rationale, please see the commit message:
76 https://cvsweb.openbsd.org/src/usr.bin/ssh/readconf.c#rev1.284
77
78 -- Colin Watson <cjwatson@debian.org> Thu, 30 Aug 2018 15:35:27 +0100
79
80openssh (1:7.6p1-1) unstable; urgency=medium
81
82 OpenSSH 7.6 includes a number of changes that may affect existing
83 configurations:
84
85 * ssh(1): Delete SSH protocol version 1 support, associated configuration
86 options and documentation.
87 * ssh(1)/sshd(8): Remove support for the hmac-ripemd160 MAC.
88 * ssh(1)/sshd(8): Remove support for the arcfour, blowfish and CAST
89 ciphers.
90 * Refuse RSA keys <1024 bits in length and improve reporting for keys
91 that do not meet this requirement.
92 * ssh(1): Do not offer CBC ciphers by default.
93
94 -- Colin Watson <cjwatson@debian.org> Fri, 06 Oct 2017 12:36:48 +0100
95
96openssh (1:7.5p1-1) experimental; urgency=medium
97
98 OpenSSH 7.5 includes a number of changes that may affect existing
99 configurations:
100
101 * This release deprecates the sshd_config UsePrivilegeSeparation option,
102 thereby making privilege separation mandatory.
103
104 * The format of several log messages emitted by the packet code has
105 changed to include additional information about the user and their
106 authentication state. Software that monitors ssh/sshd logs may need to
107 account for these changes. For example:
108
109 Connection closed by user x 1.1.1.1 port 1234 [preauth]
110 Connection closed by authenticating user x 10.1.1.1 port 1234 [preauth]
111 Connection closed by invalid user x 1.1.1.1 port 1234 [preauth]
112
113 Affected messages include connection closure, timeout, remote
114 disconnection, negotiation failure and some other fatal messages
115 generated by the packet code.
116
117 -- Colin Watson <cjwatson@debian.org> Sun, 02 Apr 2017 02:58:01 +0100
118
119openssh (1:7.4p1-7) unstable; urgency=medium
120
121 This version restores the default for AuthorizedKeysFile to search both
122 ~/.ssh/authorized_keys and ~/.ssh/authorized_keys2, as was the case in
123 Debian configurations before 1:7.4p1-1. Upstream intends to phase out
124 searching ~/.ssh/authorized_keys2 by default, so you should ensure that
125 you are only using ~/.ssh/authorized_keys, at least for critical
126 administrative access; do not assume that the current default will remain
127 in place forever.
128
129 -- Colin Watson <cjwatson@debian.org> Sun, 05 Mar 2017 02:12:42 +0000
130
131openssh (1:7.4p1-1) unstable; urgency=medium
132
133 OpenSSH 7.4 includes a number of changes that may affect existing
134 configurations:
135
136 * ssh(1): Remove 3des-cbc from the client's default proposal. 64-bit
137 block ciphers are not safe in 2016 and we don't want to wait until
138 attacks like SWEET32 are extended to SSH. As 3des-cbc was the only
139 mandatory cipher in the SSH RFCs, this may cause problems connecting to
140 older devices using the default configuration, but it's highly likely
141 that such devices already need explicit configuration for key exchange
142 and hostkey algorithms already anyway.
143 * sshd(8): Remove support for pre-authentication compression. Doing
144 compression early in the protocol probably seemed reasonable in the
145 1990s, but today it's clearly a bad idea in terms of both cryptography
146 (cf. multiple compression oracle attacks in TLS) and attack surface.
147 Pre-auth compression support has been disabled by default for >10
148 years. Support remains in the client.
149 * ssh-agent will refuse to load PKCS#11 modules outside a whitelist of
150 trusted paths by default. The path whitelist may be specified at
151 run-time.
152 * sshd(8): When a forced-command appears in both a certificate and an
153 authorized keys/principals command= restriction, sshd will now refuse
154 to accept the certificate unless they are identical. The previous
155 (documented) behaviour of having the certificate forced-command
156 override the other could be a bit confusing and error-prone.
157 * sshd(8): Remove the UseLogin configuration directive and support for
158 having /bin/login manage login sessions.
159
160 The unprivileged sshd process that deals with pre-authentication network
161 traffic is now subject to additional sandboxing restrictions by default:
162 that is, the default sshd_config now sets UsePrivilegeSeparation to
163 "sandbox" rather than "yes". This has been the case upstream for a while,
164 but until now the Debian configuration diverged unnecessarily.
165
166 -- Colin Watson <cjwatson@debian.org> Tue, 27 Dec 2016 18:01:46 +0000
167
168openssh (1:7.2p1-1) unstable; urgency=medium
169
170 OpenSSH 7.2 disables a number of legacy cryptographic algorithms by
171 default in ssh:
172
173 * Several ciphers blowfish-cbc, cast128-cbc, all arcfour variants and the
174 rijndael-cbc aliases for AES.
175 * MD5-based and truncated HMAC algorithms.
176
177 These algorithms are already disabled by default in sshd.
178
179 -- Colin Watson <cjwatson@debian.org> Tue, 08 Mar 2016 11:47:20 +0000
180
181openssh (1:7.1p1-2) unstable; urgency=medium
182
183 OpenSSH 7.0 disables several pieces of weak, legacy, and/or unsafe
184 cryptography.
185
186 * Support for the legacy SSH version 1 protocol is disabled by default at
187 compile time. Note that this also means that the Cipher keyword in
188 ssh_config(5) is effectively no longer usable; use Ciphers instead for
189 protocol 2. The openssh-client-ssh1 package includes "ssh1", "scp1",
190 and "ssh-keygen1" binaries which you can use if you have no alternative
191 way to connect to an outdated SSH1-only server; please contact the
192 server administrator or system vendor in such cases and ask them to
193 upgrade.
194 * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange is
195 disabled by default at run-time. It may be re-enabled using the
196 instructions at http://www.openssh.com/legacy.html
197 * Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled by
198 default at run-time. These may be re-enabled using the instructions at
199 http://www.openssh.com/legacy.html
200 * Support for the legacy v00 cert format has been removed.
201
202 Future releases will retire more legacy cryptography, including:
203
204 * Refusing all RSA keys smaller than 1024 bits (the current minimum is
205 768 bits).
206 * Several ciphers will be disabled by default: blowfish-cbc, cast128-cbc,
207 all arcfour variants, and the rijndael-cbc aliases for AES.
208 * MD5-based HMAC algorithms will be disabled by default.
209
210 -- Colin Watson <cjwatson@debian.org> Tue, 08 Dec 2015 15:33:08 +0000
211
212openssh (1:6.9p1-1) unstable; urgency=medium
213
214 UseDNS now defaults to 'no'. Configurations that match against the client
215 host name (via sshd_config or authorized_keys) may need to re-enable it or
216 convert to matching against addresses.
217
218 -- Colin Watson <cjwatson@debian.org> Thu, 20 Aug 2015 10:38:58 +0100
219
220openssh (1:6.7p1-5) unstable; urgency=medium
221
222 openssh-server 1:6.7p1-4 changed the default setting of AcceptEnv to list
223 a number of specific LC_FOO variables rather than the wildcard LC_*. I
224 have since been persuaded that this was a bad idea and have reverted it,
225 but it is difficult to automatically undo the change to
226 /etc/ssh/sshd_config without compounding the problem (that of modifying
227 configuration that some users did not want to be modified) further. Most
228 users who upgraded via version 1:6.7p1-4 should restore the previous value
229 of "AcceptEnv LANG LC_*" in /etc/ssh/sshd_config.
230
231 -- Colin Watson <cjwatson@debian.org> Sun, 22 Mar 2015 23:09:32 +0000
232
233openssh (1:5.4p1-2) unstable; urgency=low
234
235 Smartcard support is now available using PKCS#11 tokens. If you were
236 previously using an unofficial build of Debian's OpenSSH package with
237 OpenSC-based smartcard support added, then note that commands like
238 'ssh-add -s 0' will no longer work; you need to use 'ssh-add -s
239 /usr/lib/opensc-pkcs11.so' instead.
240
241 -- Colin Watson <cjwatson@debian.org> Sat, 10 Apr 2010 01:08:59 +0100
242
243openssh (1:3.8.1p1-9) experimental; urgency=low
244
245 The ssh package has been split into openssh-client and openssh-server. If
246 you had previously requested that the sshd server should not be run, then
247 that request will still be honoured. However, the recommended approach is
248 now to remove the openssh-server package if you do not want to run sshd.
249 You can remove the old /etc/ssh/sshd_not_to_be_run marker file after doing
250 that.
251
252 -- Colin Watson <cjwatson@debian.org> Mon, 2 Aug 2004 20:48:54 +0100
253
254openssh (1:3.5p1-1) unstable; urgency=low
255
256 This version of OpenSSH disables the environment option for public keys by
257 default, in order to avoid certain attacks (for example, LD_PRELOAD). If
258 you are using this option in an authorized_keys file, beware that the keys
259 in question will no longer work until the option is removed.
260
261 To re-enable this option, set "PermitUserEnvironment yes" in
262 /etc/ssh/sshd_config after the upgrade is complete, taking note of the
263 warning in the sshd_config(5) manual page.
264
265 -- Colin Watson <cjwatson@debian.org> Sat, 26 Oct 2002 19:41:51 +0100
266
267openssh (1:3.0.1p1-1) unstable; urgency=high
268
269 As of version 3, OpenSSH no longer uses separate files for ssh1 and ssh2
270 keys. This means the authorized_keys2 and known_hosts2 files are no longer
271 needed. They will still be read in order to maintain backward
272 compatibility.
273
274 -- Matthew Vernon <matthew@debian.org> Thu, 28 Nov 2001 17:43:01 +0000