summaryrefslogtreecommitdiff
path: root/debian/NEWS
diff options
context:
space:
mode:
Diffstat (limited to 'debian/NEWS')
-rw-r--r--debian/NEWS138
1 files changed, 138 insertions, 0 deletions
diff --git a/debian/NEWS b/debian/NEWS
new file mode 100644
index 000000000..3a331e1fd
--- /dev/null
+++ b/debian/NEWS
@@ -0,0 +1,138 @@
1openssh (1:7.4p1-1) UNRELEASED; urgency=medium
2
3 OpenSSH 7.4 includes a number of changes that may affect existing
4 configurations:
5
6 * ssh(1): Remove 3des-cbc from the client's default proposal. 64-bit
7 block ciphers are not safe in 2016 and we don't want to wait until
8 attacks like SWEET32 are extended to SSH. As 3des-cbc was the only
9 mandatory cipher in the SSH RFCs, this may cause problems connecting to
10 older devices using the default configuration, but it's highly likely
11 that such devices already need explicit configuration for key exchange
12 and hostkey algorithms already anyway.
13 * sshd(8): Remove support for pre-authentication compression. Doing
14 compression early in the protocol probably seemed reasonable in the
15 1990s, but today it's clearly a bad idea in terms of both cryptography
16 (cf. multiple compression oracle attacks in TLS) and attack surface.
17 Pre-auth compression support has been disabled by default for >10
18 years. Support remains in the client.
19 * ssh-agent will refuse to load PKCS#11 modules outside a whitelist of
20 trusted paths by default. The path whitelist may be specified at
21 run-time.
22 * sshd(8): When a forced-command appears in both a certificate and an
23 authorized keys/principals command= restriction, sshd will now refuse
24 to accept the certificate unless they are identical. The previous
25 (documented) behaviour of having the certificate forced-command
26 override the other could be a bit confusing and error-prone.
27 * sshd(8): Remove the UseLogin configuration directive and support for
28 having /bin/login manage login sessions.
29
30 -- Colin Watson <cjwatson@debian.org> Tue, 20 Dec 2016 22:21:15 +0000
31
32openssh (1:7.2p1-1) unstable; urgency=medium
33
34 OpenSSH 7.2 disables a number of legacy cryptographic algorithms by
35 default in ssh:
36
37 * Several ciphers blowfish-cbc, cast128-cbc, all arcfour variants and the
38 rijndael-cbc aliases for AES.
39 * MD5-based and truncated HMAC algorithms.
40
41 These algorithms are already disabled by default in sshd.
42
43 -- Colin Watson <cjwatson@debian.org> Tue, 08 Mar 2016 11:47:20 +0000
44
45openssh (1:7.1p1-2) unstable; urgency=medium
46
47 OpenSSH 7.0 disables several pieces of weak, legacy, and/or unsafe
48 cryptography.
49
50 * Support for the legacy SSH version 1 protocol is disabled by default at
51 compile time. Note that this also means that the Cipher keyword in
52 ssh_config(5) is effectively no longer usable; use Ciphers instead for
53 protocol 2. The openssh-client-ssh1 package includes "ssh1", "scp1",
54 and "ssh-keygen1" binaries which you can use if you have no alternative
55 way to connect to an outdated SSH1-only server; please contact the
56 server administrator or system vendor in such cases and ask them to
57 upgrade.
58 * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange is
59 disabled by default at run-time. It may be re-enabled using the
60 instructions at http://www.openssh.com/legacy.html
61 * Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled by
62 default at run-time. These may be re-enabled using the instructions at
63 http://www.openssh.com/legacy.html
64 * Support for the legacy v00 cert format has been removed.
65
66 Future releases will retire more legacy cryptography, including:
67
68 * Refusing all RSA keys smaller than 1024 bits (the current minimum is
69 768 bits).
70 * Several ciphers will be disabled by default: blowfish-cbc, cast128-cbc,
71 all arcfour variants, and the rijndael-cbc aliases for AES.
72 * MD5-based HMAC algorithms will be disabled by default.
73
74 -- Colin Watson <cjwatson@debian.org> Tue, 08 Dec 2015 15:33:08 +0000
75
76openssh (1:6.9p1-1) unstable; urgency=medium
77
78 UseDNS now defaults to 'no'. Configurations that match against the client
79 host name (via sshd_config or authorized_keys) may need to re-enable it or
80 convert to matching against addresses.
81
82 -- Colin Watson <cjwatson@debian.org> Thu, 20 Aug 2015 10:38:58 +0100
83
84openssh (1:6.7p1-5) unstable; urgency=medium
85
86 openssh-server 1:6.7p1-4 changed the default setting of AcceptEnv to list
87 a number of specific LC_FOO variables rather than the wildcard LC_*. I
88 have since been persuaded that this was a bad idea and have reverted it,
89 but it is difficult to automatically undo the change to
90 /etc/ssh/sshd_config without compounding the problem (that of modifying
91 configuration that some users did not want to be modified) further. Most
92 users who upgraded via version 1:6.7p1-4 should restore the previous value
93 of "AcceptEnv LANG LC_*" in /etc/ssh/sshd_config.
94
95 -- Colin Watson <cjwatson@debian.org> Sun, 22 Mar 2015 23:09:32 +0000
96
97openssh (1:5.4p1-2) unstable; urgency=low
98
99 Smartcard support is now available using PKCS#11 tokens. If you were
100 previously using an unofficial build of Debian's OpenSSH package with
101 OpenSC-based smartcard support added, then note that commands like
102 'ssh-add -s 0' will no longer work; you need to use 'ssh-add -s
103 /usr/lib/opensc-pkcs11.so' instead.
104
105 -- Colin Watson <cjwatson@debian.org> Sat, 10 Apr 2010 01:08:59 +0100
106
107openssh (1:3.8.1p1-9) experimental; urgency=low
108
109 The ssh package has been split into openssh-client and openssh-server. If
110 you had previously requested that the sshd server should not be run, then
111 that request will still be honoured. However, the recommended approach is
112 now to remove the openssh-server package if you do not want to run sshd.
113 You can remove the old /etc/ssh/sshd_not_to_be_run marker file after doing
114 that.
115
116 -- Colin Watson <cjwatson@debian.org> Mon, 2 Aug 2004 20:48:54 +0100
117
118openssh (1:3.5p1-1) unstable; urgency=low
119
120 This version of OpenSSH disables the environment option for public keys by
121 default, in order to avoid certain attacks (for example, LD_PRELOAD). If
122 you are using this option in an authorized_keys file, beware that the keys
123 in question will no longer work until the option is removed.
124
125 To re-enable this option, set "PermitUserEnvironment yes" in
126 /etc/ssh/sshd_config after the upgrade is complete, taking note of the
127 warning in the sshd_config(5) manual page.
128
129 -- Colin Watson <cjwatson@debian.org> Sat, 26 Oct 2002 19:41:51 +0100
130
131openssh (1:3.0.1p1-1) unstable; urgency=high
132
133 As of version 3, OpenSSH no longer uses separate files for ssh1 and ssh2
134 keys. This means the authorized_keys2 and known_hosts2 files are no longer
135 needed. They will still be read in order to maintain backward
136 compatibility.
137
138 -- Matthew Vernon <matthew@debian.org> Thu, 28 Nov 2001 17:43:01 +0000