diff options
Diffstat (limited to 'debian/changelog')
-rw-r--r-- | debian/changelog | 57 |
1 files changed, 57 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog index 46a0a6f39..76607d617 100644 --- a/debian/changelog +++ b/debian/changelog | |||
@@ -1,3 +1,60 @@ | |||
1 | openssh (1:7.3p1-1) UNRELEASED; urgency=medium | ||
2 | |||
3 | * New upstream release (http://www.openssh.com/txt/release-7.3): | ||
4 | - SECURITY: sshd(8): Mitigate a potential denial-of-service attack | ||
5 | against the system's crypt(3) function via sshd(8). An attacker could | ||
6 | send very long passwords that would cause excessive CPU use in | ||
7 | crypt(3). sshd(8) now refuses to accept password authentication | ||
8 | requests of length greater than 1024 characters. | ||
9 | - SECURITY: ssh(1), sshd(8): Fix observable timing weakness in the CBC | ||
10 | padding oracle countermeasures. Note that CBC ciphers are disabled by | ||
11 | default and only included for legacy compatibility. | ||
12 | - SECURITY: ssh(1), sshd(8): Improve operation ordering of MAC | ||
13 | verification for Encrypt-then-MAC (EtM) mode transport MAC algorithms | ||
14 | to verify the MAC before decrypting any ciphertext. This removes the | ||
15 | possibility of timing differences leaking facts about the plaintext, | ||
16 | though no such leakage has been observed. | ||
17 | - ssh(1): Add a ProxyJump option and corresponding -J command-line flag | ||
18 | to allow simplified indirection through a one or more SSH bastions or | ||
19 | "jump hosts". | ||
20 | - ssh(1): Add an IdentityAgent option to allow specifying specific agent | ||
21 | sockets instead of accepting one from the environment. | ||
22 | - ssh(1): Allow ExitOnForwardFailure and ClearAllForwardings to be | ||
23 | optionally overridden when using ssh -W. | ||
24 | - ssh(1), sshd(8): Implement support for the IUTF8 terminal mode as per | ||
25 | draft-sgtatham-secsh-iutf8-00 (closes: #337041, LP: #394570). | ||
26 | - ssh(1), sshd(8): Add support for additional fixed Diffie-Hellman 2K, | ||
27 | 4K and 8K groups from draft-ietf-curdle-ssh-kex-sha2-03. | ||
28 | - ssh-keygen(1), ssh(1), sshd(8): Support SHA256 and SHA512 RSA | ||
29 | signatures in certificates. | ||
30 | - ssh(1): Add an Include directive for ssh_config(5) files (closes: | ||
31 | #536031). | ||
32 | - ssh(1): Permit UTF-8 characters in pre-authentication banners sent | ||
33 | from the server. | ||
34 | - ssh(1), sshd(8): Reduce the syslog level of some relatively common | ||
35 | protocol events from LOG_CRIT. | ||
36 | - sshd(8): Refuse AuthenticationMethods="" in configurations and accept | ||
37 | AuthenticationMethods=any for the default behaviour of not requiring | ||
38 | multiple authentication. | ||
39 | - sshd(8): Remove obsolete and misleading "POSSIBLE BREAK-IN ATTEMPT!" | ||
40 | message when forward and reverse DNS don't match. | ||
41 | - ssh(1): Deduplicate LocalForward and RemoteForward entries to fix | ||
42 | failures when both ExitOnForwardFailure and hostname canonicalisation | ||
43 | are enabled. | ||
44 | - sshd(8): Remove fallback from moduli to obsolete "primes" file that | ||
45 | was deprecated in 2001 (LP: #1528251). | ||
46 | - sshd_config(5): Correct description of UseDNS: it affects ssh hostname | ||
47 | processing for authorized_keys, not known_hosts. | ||
48 | - sshd(8): Send ClientAliveInterval pings when a time-based RekeyLimit | ||
49 | is set; previously keepalive packets were not being sent. | ||
50 | - sshd(8): Whitelist more architectures to enable the seccomp-bpf | ||
51 | sandbox. | ||
52 | - scp(1): Respect the local user's LC_CTYPE locale (closes: #396295). | ||
53 | - Take character display widths into account for the progressmeter | ||
54 | (closes: #407088). | ||
55 | |||
56 | -- Colin Watson <cjwatson@debian.org> Sat, 06 Aug 2016 11:00:55 +0100 | ||
57 | |||
1 | openssh (1:7.2p2-8) unstable; urgency=medium | 58 | openssh (1:7.2p2-8) unstable; urgency=medium |
2 | 59 | ||
3 | [ Colin Watson ] | 60 | [ Colin Watson ] |