diff options
Diffstat (limited to 'debian/NEWS')
-rw-r--r-- | debian/NEWS | 138 |
1 files changed, 138 insertions, 0 deletions
diff --git a/debian/NEWS b/debian/NEWS new file mode 100644 index 000000000..3a331e1fd --- /dev/null +++ b/debian/NEWS | |||
@@ -0,0 +1,138 @@ | |||
1 | openssh (1:7.4p1-1) UNRELEASED; urgency=medium | ||
2 | |||
3 | OpenSSH 7.4 includes a number of changes that may affect existing | ||
4 | configurations: | ||
5 | |||
6 | * ssh(1): Remove 3des-cbc from the client's default proposal. 64-bit | ||
7 | block ciphers are not safe in 2016 and we don't want to wait until | ||
8 | attacks like SWEET32 are extended to SSH. As 3des-cbc was the only | ||
9 | mandatory cipher in the SSH RFCs, this may cause problems connecting to | ||
10 | older devices using the default configuration, but it's highly likely | ||
11 | that such devices already need explicit configuration for key exchange | ||
12 | and hostkey algorithms already anyway. | ||
13 | * sshd(8): Remove support for pre-authentication compression. Doing | ||
14 | compression early in the protocol probably seemed reasonable in the | ||
15 | 1990s, but today it's clearly a bad idea in terms of both cryptography | ||
16 | (cf. multiple compression oracle attacks in TLS) and attack surface. | ||
17 | Pre-auth compression support has been disabled by default for >10 | ||
18 | years. Support remains in the client. | ||
19 | * ssh-agent will refuse to load PKCS#11 modules outside a whitelist of | ||
20 | trusted paths by default. The path whitelist may be specified at | ||
21 | run-time. | ||
22 | * sshd(8): When a forced-command appears in both a certificate and an | ||
23 | authorized keys/principals command= restriction, sshd will now refuse | ||
24 | to accept the certificate unless they are identical. The previous | ||
25 | (documented) behaviour of having the certificate forced-command | ||
26 | override the other could be a bit confusing and error-prone. | ||
27 | * sshd(8): Remove the UseLogin configuration directive and support for | ||
28 | having /bin/login manage login sessions. | ||
29 | |||
30 | -- Colin Watson <cjwatson@debian.org> Tue, 20 Dec 2016 22:21:15 +0000 | ||
31 | |||
32 | openssh (1:7.2p1-1) unstable; urgency=medium | ||
33 | |||
34 | OpenSSH 7.2 disables a number of legacy cryptographic algorithms by | ||
35 | default in ssh: | ||
36 | |||
37 | * Several ciphers blowfish-cbc, cast128-cbc, all arcfour variants and the | ||
38 | rijndael-cbc aliases for AES. | ||
39 | * MD5-based and truncated HMAC algorithms. | ||
40 | |||
41 | These algorithms are already disabled by default in sshd. | ||
42 | |||
43 | -- Colin Watson <cjwatson@debian.org> Tue, 08 Mar 2016 11:47:20 +0000 | ||
44 | |||
45 | openssh (1:7.1p1-2) unstable; urgency=medium | ||
46 | |||
47 | OpenSSH 7.0 disables several pieces of weak, legacy, and/or unsafe | ||
48 | cryptography. | ||
49 | |||
50 | * Support for the legacy SSH version 1 protocol is disabled by default at | ||
51 | compile time. Note that this also means that the Cipher keyword in | ||
52 | ssh_config(5) is effectively no longer usable; use Ciphers instead for | ||
53 | protocol 2. The openssh-client-ssh1 package includes "ssh1", "scp1", | ||
54 | and "ssh-keygen1" binaries which you can use if you have no alternative | ||
55 | way to connect to an outdated SSH1-only server; please contact the | ||
56 | server administrator or system vendor in such cases and ask them to | ||
57 | upgrade. | ||
58 | * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange is | ||
59 | disabled by default at run-time. It may be re-enabled using the | ||
60 | instructions at http://www.openssh.com/legacy.html | ||
61 | * Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled by | ||
62 | default at run-time. These may be re-enabled using the instructions at | ||
63 | http://www.openssh.com/legacy.html | ||
64 | * Support for the legacy v00 cert format has been removed. | ||
65 | |||
66 | Future releases will retire more legacy cryptography, including: | ||
67 | |||
68 | * Refusing all RSA keys smaller than 1024 bits (the current minimum is | ||
69 | 768 bits). | ||
70 | * Several ciphers will be disabled by default: blowfish-cbc, cast128-cbc, | ||
71 | all arcfour variants, and the rijndael-cbc aliases for AES. | ||
72 | * MD5-based HMAC algorithms will be disabled by default. | ||
73 | |||
74 | -- Colin Watson <cjwatson@debian.org> Tue, 08 Dec 2015 15:33:08 +0000 | ||
75 | |||
76 | openssh (1:6.9p1-1) unstable; urgency=medium | ||
77 | |||
78 | UseDNS now defaults to 'no'. Configurations that match against the client | ||
79 | host name (via sshd_config or authorized_keys) may need to re-enable it or | ||
80 | convert to matching against addresses. | ||
81 | |||
82 | -- Colin Watson <cjwatson@debian.org> Thu, 20 Aug 2015 10:38:58 +0100 | ||
83 | |||
84 | openssh (1:6.7p1-5) unstable; urgency=medium | ||
85 | |||
86 | openssh-server 1:6.7p1-4 changed the default setting of AcceptEnv to list | ||
87 | a number of specific LC_FOO variables rather than the wildcard LC_*. I | ||
88 | have since been persuaded that this was a bad idea and have reverted it, | ||
89 | but it is difficult to automatically undo the change to | ||
90 | /etc/ssh/sshd_config without compounding the problem (that of modifying | ||
91 | configuration that some users did not want to be modified) further. Most | ||
92 | users who upgraded via version 1:6.7p1-4 should restore the previous value | ||
93 | of "AcceptEnv LANG LC_*" in /etc/ssh/sshd_config. | ||
94 | |||
95 | -- Colin Watson <cjwatson@debian.org> Sun, 22 Mar 2015 23:09:32 +0000 | ||
96 | |||
97 | openssh (1:5.4p1-2) unstable; urgency=low | ||
98 | |||
99 | Smartcard support is now available using PKCS#11 tokens. If you were | ||
100 | previously using an unofficial build of Debian's OpenSSH package with | ||
101 | OpenSC-based smartcard support added, then note that commands like | ||
102 | 'ssh-add -s 0' will no longer work; you need to use 'ssh-add -s | ||
103 | /usr/lib/opensc-pkcs11.so' instead. | ||
104 | |||
105 | -- Colin Watson <cjwatson@debian.org> Sat, 10 Apr 2010 01:08:59 +0100 | ||
106 | |||
107 | openssh (1:3.8.1p1-9) experimental; urgency=low | ||
108 | |||
109 | The ssh package has been split into openssh-client and openssh-server. If | ||
110 | you had previously requested that the sshd server should not be run, then | ||
111 | that request will still be honoured. However, the recommended approach is | ||
112 | now to remove the openssh-server package if you do not want to run sshd. | ||
113 | You can remove the old /etc/ssh/sshd_not_to_be_run marker file after doing | ||
114 | that. | ||
115 | |||
116 | -- Colin Watson <cjwatson@debian.org> Mon, 2 Aug 2004 20:48:54 +0100 | ||
117 | |||
118 | openssh (1:3.5p1-1) unstable; urgency=low | ||
119 | |||
120 | This version of OpenSSH disables the environment option for public keys by | ||
121 | default, in order to avoid certain attacks (for example, LD_PRELOAD). If | ||
122 | you are using this option in an authorized_keys file, beware that the keys | ||
123 | in question will no longer work until the option is removed. | ||
124 | |||
125 | To re-enable this option, set "PermitUserEnvironment yes" in | ||
126 | /etc/ssh/sshd_config after the upgrade is complete, taking note of the | ||
127 | warning in the sshd_config(5) manual page. | ||
128 | |||
129 | -- Colin Watson <cjwatson@debian.org> Sat, 26 Oct 2002 19:41:51 +0100 | ||
130 | |||
131 | openssh (1:3.0.1p1-1) unstable; urgency=high | ||
132 | |||
133 | As of version 3, OpenSSH no longer uses separate files for ssh1 and ssh2 | ||
134 | keys. This means the authorized_keys2 and known_hosts2 files are no longer | ||
135 | needed. They will still be read in order to maintain backward | ||
136 | compatibility. | ||
137 | |||
138 | -- Matthew Vernon <matthew@debian.org> Thu, 28 Nov 2001 17:43:01 +0000 | ||