diff options
Diffstat (limited to 'debian/changelog')
-rw-r--r-- | debian/changelog | 5928 |
1 files changed, 5928 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog new file mode 100644 index 000000000..ab75bf2a7 --- /dev/null +++ b/debian/changelog | |||
@@ -0,0 +1,5928 @@ | |||
1 | openssh (1:8.3p1-1) UNRELEASED; urgency=medium | ||
2 | |||
3 | * Fix or suppress various shellcheck errors under debian/. | ||
4 | * New upstream release (https://www.openssh.com/txt/release-8.3): | ||
5 | - [SECURITY] scp(1): when receiving files, scp(1) could become | ||
6 | desynchronised if a utimes(2) system call failed. This could allow | ||
7 | file contents to be interpreted as file metadata and thereby permit an | ||
8 | adversary to craft a file system that, when copied with scp(1) in a | ||
9 | configuration that caused utimes(2) to fail (e.g. under a SELinux | ||
10 | policy or syscall sandbox), transferred different file names and | ||
11 | contents to the actual file system layout. | ||
12 | - sftp(1): reject an argument of "-1" in the same way as ssh(1) and | ||
13 | scp(1) do instead of accepting and silently ignoring it. | ||
14 | - sshd(8): make IgnoreRhosts a tri-state option: "yes" to ignore | ||
15 | rhosts/shosts, "no" to allow rhosts/shosts or (new) "shosts-only" to | ||
16 | allow .shosts files but not .rhosts. | ||
17 | - sshd(8): allow the IgnoreRhosts directive to appear anywhere in a | ||
18 | sshd_config, not just before any Match blocks. | ||
19 | - ssh(1): add %TOKEN percent expansion for the LocalForward and | ||
20 | RemoteForward keywords when used for Unix domain socket forwarding. | ||
21 | - all: allow loading public keys from the unencrypted envelope of a | ||
22 | private key file if no corresponding public key file is present. | ||
23 | - ssh(1), sshd(8): prefer to use chacha20 from libcrypto where possible | ||
24 | instead of the (slower) portable C implementation included in OpenSSH. | ||
25 | - ssh-keygen(1): add ability to dump the contents of a binary key | ||
26 | revocation list via "ssh-keygen -lQf /path". | ||
27 | - ssh(1): fix IdentitiesOnly=yes to also apply to keys loaded from a | ||
28 | PKCS11Provider. | ||
29 | - ssh-keygen(1): avoid NULL dereference when trying to convert an | ||
30 | invalid RFC4716 private key. | ||
31 | - scp(1): when performing remote-to-remote copies using "scp -3", start | ||
32 | the second ssh(1) channel with BatchMode=yes enabled to avoid | ||
33 | confusing and non-deterministic ordering of prompts. | ||
34 | - ssh(1), ssh-keygen(1): when signing a challenge using a FIDO token, | ||
35 | perform hashing of the message to be signed in the middleware layer | ||
36 | rather than in OpenSSH code. This permits the use of security key | ||
37 | middlewares that perform the hashing implicitly, such as Windows | ||
38 | Hello. | ||
39 | - ssh(1): fix incorrect error message for "too many known hosts files." | ||
40 | - ssh(1): make failures when establishing "Tunnel" forwarding terminate | ||
41 | the connection when ExitOnForwardFailure is enabled. | ||
42 | - ssh-keygen(1): fix printing of fingerprints on private keys and add a | ||
43 | regression test for same. | ||
44 | - sshd(8): document order of checking AuthorizedKeysFile (first) and | ||
45 | AuthorizedKeysCommand (subsequently, if the file doesn't match). | ||
46 | - sshd(8): document that /etc/hosts.equiv and /etc/shosts.equiv are not | ||
47 | considered for HostbasedAuthentication when the target user is root. | ||
48 | - ssh(1), ssh-keygen(1): fix NULL dereference in private certificate key | ||
49 | parsing. | ||
50 | - ssh(1), sshd(8): more consistency between sets of %TOKENS are accepted | ||
51 | in various configuration options. | ||
52 | - ssh(1), ssh-keygen(1): improve error messages for some common PKCS#11 | ||
53 | C_Login failure cases. | ||
54 | - ssh(1), sshd(8): make error messages for problems during SSH banner | ||
55 | exchange consistent with other SSH transport-layer error messages and | ||
56 | ensure they include the relevant IP addresses. | ||
57 | - ssh-keygen(1), ssh-add(1): when downloading FIDO2 resident keys from a | ||
58 | token, don't prompt for a PIN until the token has told us that it | ||
59 | needs one. Avoids double-prompting on devices that implement | ||
60 | on-device authentication (closes: #932071). | ||
61 | - sshd(8), ssh-keygen(1): no-touch-required FIDO certificate option | ||
62 | should be an extension, not a critical option. | ||
63 | - ssh(1), ssh-keygen(1), ssh-add(1): offer a better error message when | ||
64 | trying to use a FIDO key function and SecurityKeyProvider is empty. | ||
65 | - ssh-add(1), ssh-agent(8): ensure that a key lifetime fits within the | ||
66 | values allowed by the wire format (u32). Prevents integer wraparound | ||
67 | of the timeout values. | ||
68 | - ssh(1): detect and prevent trivial configuration loops when using | ||
69 | ProxyJump. bz#3057. | ||
70 | - On platforms that do not support setting process-wide routing domains | ||
71 | (all excepting OpenBSD at present), fail to accept a configuration | ||
72 | attempts to set one at process start time rather than fatally erroring | ||
73 | at run time. | ||
74 | - Fix theoretical infinite loop in the glob(3) replacement | ||
75 | implementation. | ||
76 | * Update GSSAPI key exchange patch from | ||
77 | https://github.com/openssh-gsskex/openssh-gsskex: | ||
78 | - Fix connection through ProxyJump in combination with "GSSAPITrustDNS | ||
79 | yes". | ||
80 | - Enable SHA2-based GSSAPI key exchange methods by default as RFC 8732 | ||
81 | was published. | ||
82 | |||
83 | -- Colin Watson <cjwatson@debian.org> Sun, 07 Jun 2020 10:25:54 +0100 | ||
84 | |||
85 | openssh (1:8.2p1-4) unstable; urgency=medium | ||
86 | |||
87 | * Add /etc/ssh/ssh_config.d/ to openssh-client. | ||
88 | * Add /etc/ssh/sshd_config.d/ to openssh-server (closes: #952427). | ||
89 | * Install ssh-sk-helper even on non-Linux architectures, though it will | ||
90 | need an external middleware library in those cases. | ||
91 | |||
92 | -- Colin Watson <cjwatson@debian.org> Wed, 26 Feb 2020 10:55:07 +0000 | ||
93 | |||
94 | openssh (1:8.2p1-3) unstable; urgency=medium | ||
95 | |||
96 | * Reupload with -sa to work around confusion with 1:8.2p1-1 being in NEW. | ||
97 | |||
98 | -- Colin Watson <cjwatson@debian.org> Sun, 23 Feb 2020 13:30:01 +0000 | ||
99 | |||
100 | openssh (1:8.2p1-2) unstable; urgency=medium | ||
101 | |||
102 | * Move ssh-sk-helper into openssh-client rather than shipping it in a | ||
103 | separate package. The extra library dependencies are pretty small, so | ||
104 | it doesn't seem worth bloating the Packages file. Suggested by Bastian | ||
105 | Blank. | ||
106 | |||
107 | -- Colin Watson <cjwatson@debian.org> Sun, 23 Feb 2020 11:31:31 +0000 | ||
108 | |||
109 | openssh (1:8.2p1-1) unstable; urgency=medium | ||
110 | |||
111 | * New upstream release (https://www.openssh.com/txt/release-8.2, closes: | ||
112 | #951582): | ||
113 | - ssh(1), sshd(8), ssh-keygen(1): this release removes the "ssh-rsa" | ||
114 | (RSA/SHA1) algorithm from those accepted for certificate signatures | ||
115 | (i.e. the client and server CASignatureAlgorithms option) and will use | ||
116 | the rsa-sha2-512 signature algorithm by default when the ssh-keygen(1) | ||
117 | CA signs new certificates. | ||
118 | - ssh(1), sshd(8): Remove diffie-hellman-group14-sha1 from the default | ||
119 | key exchange proposal for both the client and server. | ||
120 | - ssh-keygen(1): The command-line options related to the generation and | ||
121 | screening of safe prime numbers used by the | ||
122 | diffie-hellman-group-exchange-* key exchange algorithms have changed. | ||
123 | Most options have been folded under the -O flag. | ||
124 | - sshd(8): The sshd listener process title visible to ps(1) has changed | ||
125 | to include information about the number of connections that are | ||
126 | currently attempting authentication and the limits configured by | ||
127 | MaxStartups. | ||
128 | - Add support for FIDO/U2F hardware authenticators. | ||
129 | - ssh-keygen(1): Add a "no-touch-required" option when generating | ||
130 | FIDO-hosted keys, that disables their default behaviour of requiring a | ||
131 | physical touch/tap on the token during authentication. Note: not all | ||
132 | tokens support disabling the touch requirement. | ||
133 | - sshd(8): Add a sshd_config PubkeyAuthOptions directive that collects | ||
134 | miscellaneous public key authentication-related options for sshd(8). | ||
135 | At present it supports only a single option "no-touch-required". This | ||
136 | causes sshd to skip its default check for FIDO/U2F keys that the | ||
137 | signature was authorised by a touch or press event on the token | ||
138 | hardware. | ||
139 | - ssh(1), sshd(8), ssh-keygen(1): Add a "no-touch-required" option for | ||
140 | authorized_keys and a similar extension for certificates. This option | ||
141 | disables the default requirement that FIDO key signatures attest that | ||
142 | the user touched their key to authorize them, mirroring the similar | ||
143 | PubkeyAuthOptions sshd_config option. | ||
144 | - ssh-keygen(1): Add support for the writing the FIDO attestation | ||
145 | information that is returned when new keys are generated via the "-O | ||
146 | write-attestation=/path" option. FIDO attestation certificates may be | ||
147 | used to verify that a FIDO key is hosted in trusted hardware. OpenSSH | ||
148 | does not currently make use of this information, beyond optionally | ||
149 | writing it to disk. | ||
150 | - Add support for FIDO2 resident keys. | ||
151 | - sshd(8): Add an Include sshd_config keyword that allows including | ||
152 | additional configuration files via glob(3) patterns (closes: #631189). | ||
153 | - ssh(1)/sshd(8): Make the LE (low effort) DSCP code point available via | ||
154 | the IPQoS directive. | ||
155 | - ssh(1): When AddKeysToAgent=yes is set and the key contains no | ||
156 | comment, add the key to the agent with the key's path as the comment. | ||
157 | - ssh-keygen(1), ssh-agent(1): Expose PKCS#11 key labels and X.509 | ||
158 | subjects as key comments, rather than simply listing the PKCS#11 | ||
159 | provider library path. | ||
160 | - ssh-keygen(1): Allow PEM export of DSA and ECDSA keys. | ||
161 | - sshd(8): When clients get denied by MaxStartups, send a notification | ||
162 | prior to the SSH2 protocol banner according to RFC4253 section 4.2 | ||
163 | (closes: #275458). | ||
164 | - ssh(1), ssh-agent(1): When invoking the $SSH_ASKPASS prompt program, | ||
165 | pass a hint to the program to describe the type of desired prompt. | ||
166 | The possible values are "confirm" (indicating that a yes/no | ||
167 | confirmation dialog with no text entry should be shown), "none" (to | ||
168 | indicate an informational message only), or blank for the original | ||
169 | ssh-askpass behaviour of requesting a password/phrase. | ||
170 | - ssh(1): Allow forwarding a different agent socket to the path | ||
171 | specified by $SSH_AUTH_SOCK, by extending the existing ForwardAgent | ||
172 | option to accepting an explicit path or the name of an environment | ||
173 | variable in addition to yes/no. | ||
174 | - ssh-keygen(1): Add a new signature operations "find-principals" to | ||
175 | look up the principal associated with a signature from an | ||
176 | allowed-signers file. | ||
177 | - sshd(8): Expose the number of currently-authenticating connections | ||
178 | along with the MaxStartups limit in the process title visible to "ps". | ||
179 | - sshd(8): Make ClientAliveCountMax=0 have sensible semantics: it will | ||
180 | now disable connection killing entirely rather than the current | ||
181 | behaviour of instantly killing the connection after the first liveness | ||
182 | test regardless of success. | ||
183 | - sshd(8): Clarify order of AllowUsers / DenyUsers vs AllowGroups / | ||
184 | DenyGroups in the sshd(8) manual page. | ||
185 | - sshd(8): Better describe HashKnownHosts in the manual page. | ||
186 | - sshd(8): Clarify that that permitopen=/PermitOpen do no name or | ||
187 | address translation in the manual page. | ||
188 | - sshd(8): Allow the UpdateHostKeys feature to function when multiple | ||
189 | known_hosts files are in use. When updating host keys, ssh will now | ||
190 | search subsequent known_hosts files, but will add updated host keys to | ||
191 | the first specified file only. | ||
192 | - All: Replace all calls to signal(2) with a wrapper around | ||
193 | sigaction(2). This wrapper blocks all other signals during the | ||
194 | handler preventing races between handlers, and sets SA_RESTART which | ||
195 | should reduce the potential for short read/write operations. | ||
196 | - sftp(1): Fix a race condition in the SIGCHILD handler that could turn | ||
197 | in to a kill(-1). | ||
198 | - sshd(8): Fix a case where valid (but extremely large) SSH channel IDs | ||
199 | were being incorrectly rejected. | ||
200 | - ssh(1): When checking host key fingerprints as answers to new hostkey | ||
201 | prompts, ignore whitespace surrounding the fingerprint itself. | ||
202 | - All: Wait for file descriptors to be readable or writeable during | ||
203 | non-blocking connect, not just readable. Prevents a timeout when the | ||
204 | server doesn't immediately send a banner (e.g. multiplexers like | ||
205 | sslh). | ||
206 | - sshd_config(5): Document the sntrup4591761x25519-sha512@tinyssh.org | ||
207 | key exchange algorithm. | ||
208 | * Add more historical md5sums of /etc/ssh/sshd_config between 1:7.4p1-1 | ||
209 | and 1:7.8p1-1 inclusive (closes: #951220). | ||
210 | * ssh(1): Explain that -Y is equivalent to -X in the default configuration | ||
211 | (closes: #951640). | ||
212 | * Include /etc/ssh/ssh_config.d/*.conf from /etc/ssh/ssh_config and | ||
213 | /etc/ssh/sshd_config.d/*.conf from /etc/ssh/sshd_config (closes: | ||
214 | #845315). | ||
215 | |||
216 | -- Colin Watson <cjwatson@debian.org> Fri, 21 Feb 2020 16:36:37 +0000 | ||
217 | |||
218 | openssh (1:8.1p1-5) unstable; urgency=medium | ||
219 | |||
220 | * Apply upstream patches to allow clock_nanosleep() and variants in the | ||
221 | seccomp sandbox, fixing failures with glibc 2.31. | ||
222 | * Apply upstream patch to deny (non-fatally) ipc in the seccomp sandbox, | ||
223 | fixing failures with OpenSSL 1.1.1d and Linux < 3.19 on some | ||
224 | architectures (closes: #946242). | ||
225 | |||
226 | -- Colin Watson <cjwatson@debian.org> Sat, 11 Jan 2020 23:55:03 +0000 | ||
227 | |||
228 | openssh (1:8.1p1-4) unstable; urgency=medium | ||
229 | |||
230 | * Apply upstream patch to stop using 2020 as a future date in regress | ||
231 | tests. | ||
232 | |||
233 | -- Colin Watson <cjwatson@debian.org> Thu, 09 Jan 2020 11:42:10 +0000 | ||
234 | |||
235 | openssh (1:8.1p1-3) unstable; urgency=medium | ||
236 | |||
237 | [ Colin Watson ] | ||
238 | * Drop suggestion of rssh, since it's been removed (see | ||
239 | https://bugs.debian.org/923691). | ||
240 | |||
241 | [ Steve Langasek ] | ||
242 | * Don't build openssh-tests on Ubuntu i386 (closes: #948466). | ||
243 | |||
244 | -- Colin Watson <cjwatson@debian.org> Thu, 09 Jan 2020 00:29:58 +0000 | ||
245 | |||
246 | openssh (1:8.1p1-2) unstable; urgency=medium | ||
247 | |||
248 | * Drop "Allow flock and ipc syscall for s390 architecture" patch for now; | ||
249 | upstream has security concerns with it and it doesn't currently seem to | ||
250 | be needed. | ||
251 | * Mark openssh-sftp-server, openssh-tests, ssh, and ssh-askpass-gnome as | ||
252 | Multi-Arch: foreign; none of them provide any architecture-dependent | ||
253 | interfaces. | ||
254 | |||
255 | -- Colin Watson <cjwatson@debian.org> Wed, 11 Dec 2019 23:53:49 +0000 | ||
256 | |||
257 | openssh (1:8.1p1-1) unstable; urgency=medium | ||
258 | |||
259 | * New upstream release (https://www.openssh.com/txt/release-8.1): | ||
260 | - ssh(1), sshd(8), ssh-agent(1): Add protection for private keys at rest | ||
261 | in RAM against speculation and memory side-channel attacks like | ||
262 | Spectre, Meltdown and Rambleed. This release encrypts private keys | ||
263 | when they are not in use with a symmetric key that is derived from a | ||
264 | relatively large "prekey" consisting of random data (currently 16KB). | ||
265 | - ssh(1): Allow %n to be expanded in ProxyCommand strings. | ||
266 | - ssh(1), sshd(8): Allow prepending a list of algorithms to the default | ||
267 | set by starting the list with the '^' character, e.g. | ||
268 | "HostKeyAlgorithms ^ssh-ed25519". | ||
269 | - ssh-keygen(1): Add an experimental lightweight signature and | ||
270 | verification ability. Signatures may be made using regular ssh keys | ||
271 | held on disk or stored in a ssh-agent and verified against an | ||
272 | authorized_keys-like list of allowed keys. Signatures embed a | ||
273 | namespace that prevents confusion and attacks between different usage | ||
274 | domains (e.g. files vs email). | ||
275 | - ssh-keygen(1): Print key comment when extracting public key from a | ||
276 | private key. | ||
277 | - ssh-keygen(1): Accept the verbose flag when searching for host keys in | ||
278 | known hosts (i.e. "ssh-keygen -vF host") to print the matching host's | ||
279 | random-art signature too. | ||
280 | - All: Support PKCS8 as an optional format for storage of private keys | ||
281 | to disk. The OpenSSH native key format remains the default, but PKCS8 | ||
282 | is a superior format to PEM if interoperability with non-OpenSSH | ||
283 | software is required, as it may use a less insecure key derivation | ||
284 | function than PEM's. | ||
285 | - ssh(1): If a PKCS#11 token returns no keys then try to login and | ||
286 | refetch them. | ||
287 | - ssh(1): Produce a useful error message if the user's shell is set | ||
288 | incorrectly during "match exec" processing. | ||
289 | - sftp(1): Allow the maximum uint32 value for the argument passed to -b | ||
290 | which allows better error messages from later validation. | ||
291 | - ssh-keyscan(1): Include SHA2-variant RSA key algorithms in KEX | ||
292 | proposal; allows ssh-keyscan to harvest keys from servers that disable | ||
293 | old SHA1 ssh-rsa. | ||
294 | - sftp(1): Print explicit "not modified" message if a file was requested | ||
295 | for resumed download but was considered already complete. | ||
296 | - sftp(1): Fix a typo and make <esc><right> move right to the closest | ||
297 | end of a word just like <esc><left> moves left to the closest | ||
298 | beginning of a word. | ||
299 | - sshd(8): Cap the number of permitopen/permitlisten directives allowed | ||
300 | to appear on a single authorized_keys line. | ||
301 | - All: Fix a number of memory leaks (one-off or on exit paths). | ||
302 | - ssh(1), sshd(8): Check for convtime() refusing to accept times that | ||
303 | resolve to LONG_MAX. | ||
304 | - ssh(1): Slightly more instructive error message when the user | ||
305 | specifies multiple -J options on the command-line (closes: #929669). | ||
306 | - ssh-agent(1): Process agent requests for RSA certificate private keys | ||
307 | using correct signature algorithm when requested. | ||
308 | - sftp(1): Check for user@host when parsing sftp target. This allows | ||
309 | user@[1.2.3.4] to work without a path. | ||
310 | - sshd(8): Enlarge format buffer size for certificate serial number so | ||
311 | the log message can record any 64-bit integer without truncation. | ||
312 | - sshd(8): For PermitOpen violations add the remote host and port to be | ||
313 | able to more easily ascertain the source of the request. Add the same | ||
314 | logging for PermitListen violations which were not previously logged | ||
315 | at all. | ||
316 | - scp(1), sftp(1): Use the correct POSIX format style for left | ||
317 | justification for the transfer progress meter. | ||
318 | - sshd(8): When examining a configuration using sshd -T, assume any | ||
319 | attribute not provided by -C does not match, which allows it to work | ||
320 | when sshd_config contains a Match directive with or without -C. | ||
321 | - ssh(1), ssh-keygen(1): Downgrade PKCS#11 "provider returned no slots" | ||
322 | warning from log level error to debug. This is common when attempting | ||
323 | to enumerate keys on smartcard readers with no cards plugged in. | ||
324 | - ssh(1), ssh-keygen(1): Do not unconditionally log in to PKCS#11 | ||
325 | tokens. Avoids spurious PIN prompts for keys not selected for | ||
326 | authentication in ssh(1) and when listing public keys available in a | ||
327 | token using ssh-keygen(1). | ||
328 | - ssh(1), sshd(8): Fix typo that prevented detection of Linux VRF. | ||
329 | - sshd(8): In the Linux seccomp-bpf sandbox, allow mprotect(2) with | ||
330 | PROT_(READ|WRITE|NONE) only. This syscall is used by some hardened | ||
331 | heap allocators. | ||
332 | - sshd(8): In the Linux seccomp-bpf sandbox, allow the s390-specific | ||
333 | ioctl for ECC hardware support. | ||
334 | * Re-enable hardening on hppa, since the corresponding GCC bug is | ||
335 | apparently fixed. | ||
336 | |||
337 | -- Colin Watson <cjwatson@debian.org> Thu, 10 Oct 2019 10:23:19 +0100 | ||
338 | |||
339 | openssh (1:8.0p1-7) unstable; urgency=medium | ||
340 | |||
341 | [ Daniel Kahn Gillmor ] | ||
342 | * runit: Correct typo in comment. | ||
343 | |||
344 | [ Colin Watson ] | ||
345 | * Apply upstream patch to deny (non-fatally) shmget/shmat/shmdt in preauth | ||
346 | privsep child, coping with changes in OpenSSL 1.1.1d that broke OpenSSH | ||
347 | on Linux kernels before 3.19 (closes: #941663). | ||
348 | |||
349 | -- Colin Watson <cjwatson@debian.org> Sat, 05 Oct 2019 22:41:11 +0100 | ||
350 | |||
351 | openssh (1:8.0p1-6) unstable; urgency=medium | ||
352 | |||
353 | * Only run dh_runit on openssh-server (closes: #935936). | ||
354 | |||
355 | -- Colin Watson <cjwatson@debian.org> Wed, 28 Aug 2019 10:53:18 +0100 | ||
356 | |||
357 | openssh (1:8.0p1-5) unstable; urgency=medium | ||
358 | |||
359 | [ Lorenzo Puliti ] | ||
360 | * Add a runscript for runit (closes: #933999). | ||
361 | |||
362 | -- Colin Watson <cjwatson@debian.org> Tue, 27 Aug 2019 15:18:54 +0100 | ||
363 | |||
364 | openssh (1:8.0p1-4) unstable; urgency=medium | ||
365 | |||
366 | * Use debhelper-compat instead of debian/compat. | ||
367 | * debian/*.apport: | ||
368 | - Remove #! lines. | ||
369 | - Avoid star imports. | ||
370 | - Fix flake8 errors. | ||
371 | * Run regression tests against the Python 3 version of Twisted Conch. | ||
372 | |||
373 | -- Colin Watson <cjwatson@debian.org> Sat, 03 Aug 2019 13:33:24 +0100 | ||
374 | |||
375 | openssh (1:8.0p1-3) unstable; urgency=medium | ||
376 | |||
377 | * Upload to unstable. | ||
378 | |||
379 | -- Colin Watson <cjwatson@debian.org> Mon, 08 Jul 2019 17:19:37 +0100 | ||
380 | |||
381 | openssh (1:8.0p1-2) experimental; urgency=medium | ||
382 | |||
383 | * Fix interop tests for recent regress changes. | ||
384 | |||
385 | -- Colin Watson <cjwatson@debian.org> Fri, 14 Jun 2019 14:32:12 +0100 | ||
386 | |||
387 | openssh (1:8.0p1-1) experimental; urgency=medium | ||
388 | |||
389 | * New upstream release (https://www.openssh.com/txt/release-8.0, closes: | ||
390 | #927792): | ||
391 | - ssh(1), ssh-agent(1), ssh-add(1): Add support for ECDSA keys in | ||
392 | PKCS#11 tokens (LP: #1665695). | ||
393 | - ssh(1), sshd(8): Add experimental quantum-computing resistant key | ||
394 | exchange method, based on a combination of Streamlined NTRU Prime | ||
395 | 4591^761 and X25519. | ||
396 | - ssh-keygen(1): Increase the default RSA key size to 3072 bits, | ||
397 | following NIST Special Publication 800-57's guidance for a 128-bit | ||
398 | equivalent symmetric security level (LP: #1445625). | ||
399 | - ssh(1): Allow "PKCS11Provider=none" to override later instances of the | ||
400 | PKCS11Provider directive in ssh_config. | ||
401 | - sshd(8): Add a log message for situations where a connection is | ||
402 | dropped for attempting to run a command but a sshd_config | ||
403 | ForceCommand=internal-sftp restriction is in effect. | ||
404 | - ssh(1): When prompting whether to record a new host key, accept the | ||
405 | key fingerprint as a synonym for "yes". This allows the user to paste | ||
406 | a fingerprint obtained out of band at the prompt and have the client | ||
407 | do the comparison for you. | ||
408 | - ssh-keygen(1): When signing multiple certificates on a single | ||
409 | command-line invocation, allow automatically incrementing the | ||
410 | certificate serial number. | ||
411 | - scp(1), sftp(1): Accept -J option as an alias to ProxyJump on the scp | ||
412 | and sftp command-lines. | ||
413 | - ssh-agent(1), ssh-pkcs11-helper(8), ssh-add(1): Accept "-v" | ||
414 | command-line flags to increase the verbosity of output; pass verbose | ||
415 | flags though to subprocesses, such as ssh-pkcs11-helper started from | ||
416 | ssh-agent. | ||
417 | - ssh-add(1): Add a "-T" option to allowing testing whether keys in an | ||
418 | agent are usable by performing a signature and a verification. | ||
419 | - sftp-server(8): Add a "lsetstat@openssh.com" protocol extension that | ||
420 | replicates the functionality of the existing SSH2_FXP_SETSTAT | ||
421 | operation but does not follow symlinks. | ||
422 | - sftp(1): Add "-h" flag to chown/chgrp/chmod commands to request they | ||
423 | do not follow symlinks. | ||
424 | - sshd(8): Expose $SSH_CONNECTION in the PAM environment. This makes | ||
425 | the connection 4-tuple available to PAM modules that wish to use it in | ||
426 | decision-making. | ||
427 | - sshd(8): Add a ssh_config "Match final" predicate. Matches in same | ||
428 | pass as "Match canonical" but doesn't require hostname | ||
429 | canonicalisation be enabled. | ||
430 | - sftp(1): Support a prefix of '@' to suppress echo of sftp batch | ||
431 | commands. | ||
432 | - ssh-keygen(1): When printing certificate contents using "ssh-keygen | ||
433 | -Lf /path/certificate", include the algorithm that the CA used to sign | ||
434 | the cert. | ||
435 | - sshd(8): Fix authentication failures when sshd_config contains | ||
436 | "AuthenticationMethods any" inside a Match block that overrides a more | ||
437 | restrictive default. | ||
438 | - sshd(8): Avoid sending duplicate keepalives when ClientAliveCount is | ||
439 | enabled. | ||
440 | - sshd(8): Fix two race conditions related to SIGHUP daemon restart. | ||
441 | Remnant file descriptors in recently-forked child processes could | ||
442 | block the parent sshd's attempt to listen(2) to the configured | ||
443 | addresses. Also, the restarting parent sshd could exit before any | ||
444 | child processes that were awaiting their re-execution state had | ||
445 | completed reading it, leaving them in a fallback path. | ||
446 | - ssh(1): Fix stdout potentially being redirected to /dev/null when | ||
447 | ProxyCommand=- was in use. | ||
448 | - sshd(8): Avoid sending SIGPIPE to child processes if they attempt to | ||
449 | write to stderr after their parent processes have exited. | ||
450 | - ssh(1): Fix bad interaction between the ssh_config ConnectTimeout and | ||
451 | ConnectionAttempts directives - connection attempts after the first | ||
452 | were ignoring the requested timeout (LP: #1798049). | ||
453 | - ssh-keyscan(1): Return a non-zero exit status if no keys were found | ||
454 | (closes: #374980, LP: #1661745). | ||
455 | - scp(1): Sanitize scp filenames to allow UTF-8 characters without | ||
456 | terminal control sequences. | ||
457 | - sshd(8): Fix confusion between ClientAliveInterval and time-based | ||
458 | RekeyLimit that could cause connections to be incorrectly closed. | ||
459 | - ssh(1), ssh-add(1): Correct some bugs in PKCS#11 token PIN handling at | ||
460 | initial token login. The attempt to read the PIN could be skipped in | ||
461 | some cases, particularly on devices with integrated PIN readers. This | ||
462 | would lead to an inability to retrieve keys from these tokens. | ||
463 | - ssh(1), ssh-add(1): Support keys on PKCS#11 tokens that set the | ||
464 | CKA_ALWAYS_AUTHENTICATE flag by requring a fresh login after the | ||
465 | C_SignInit operation. | ||
466 | - ssh(1): Improve documentation for ProxyJump/-J, clarifying that local | ||
467 | configuration does not apply to jump hosts. | ||
468 | - ssh-keygen(1): Clarify manual - ssh-keygen -e only writes public keys, | ||
469 | not private. | ||
470 | - ssh(1), sshd(8): be more strict in processing protocol banners, | ||
471 | allowing \r characters only immediately before \n. | ||
472 | - Various: fix a number of memory leaks. | ||
473 | - scp(1), sftp(1): fix calculation of initial bandwidth limits. Account | ||
474 | for bytes written before the timer starts and adjust the schedule on | ||
475 | which recalculations are performed. Avoids an initial burst of | ||
476 | traffic and yields more accurate bandwidth limits. | ||
477 | - sshd(8): Only consider the ext-info-c extension during the initial key | ||
478 | eschange. It shouldn't be sent in subsequent ones, but if it is | ||
479 | present we should ignore it. This prevents sshd from sending a | ||
480 | SSH_MSG_EXT_INFO for REKEX for these buggy clients. | ||
481 | - ssh-keygen(1): Clarify manual that ssh-keygen -F (find host in | ||
482 | authorized_keys) and -R (remove host from authorized_keys) options may | ||
483 | accept either a bare hostname or a [hostname]:port combo. | ||
484 | - ssh(1): Don't attempt to connect to empty SSH_AUTH_SOCK. | ||
485 | - sshd(8): Silence error messages when sshd fails to load some of the | ||
486 | default host keys. Failure to load an explicitly-configured hostkey | ||
487 | is still an error, and failure to load any host key is still fatal. | ||
488 | - ssh(1): Redirect stderr of ProxyCommands to /dev/null when ssh is | ||
489 | started with ControlPersist; prevents random ProxyCommand output from | ||
490 | interfering with session output. | ||
491 | - ssh(1): The ssh client was keeping a redundant ssh-agent socket | ||
492 | (leftover from authentication) around for the life of the connection. | ||
493 | - sshd(8): Fix bug in HostbasedAcceptedKeyTypes and | ||
494 | PubkeyAcceptedKeyTypes options. If only RSA-SHA2 signature types were | ||
495 | specified, then authentication would always fail for RSA keys as the | ||
496 | monitor checks only the base key (not the signature algorithm) type | ||
497 | against *AcceptedKeyTypes. | ||
498 | - ssh(1): Request correct signature types from ssh-agent when | ||
499 | certificate keys and RSA-SHA2 signatures are in use. | ||
500 | - sshd(8): Don't set $MAIL if UsePAM=yes as PAM typically specifies the | ||
501 | user environment if it's enabled (closes: #189920, #532754). | ||
502 | * Mostly resynced GSSAPI key exchange patch with Fedora. Major changes: | ||
503 | - Support selection of GSSAPI key exchange algorithms. | ||
504 | - Support GSSAPI key exchange methods with DH and SHA2. | ||
505 | - Support GSSAPI key exchange using ECDH and SHA2. | ||
506 | - Make sure the Kerberos tickets are cleaned up with the user context. | ||
507 | - Enable gssapi-keyex authentication without gssapi-with-mic. | ||
508 | - Allow querying for GSSAPI key exchange algorithms from ssh (-Q | ||
509 | kex-gss). | ||
510 | * Apply upstream patch to fix the utimensat regression tests when not | ||
511 | using the compatibility implementation. | ||
512 | |||
513 | -- Colin Watson <cjwatson@debian.org> Sun, 09 Jun 2019 22:47:27 +0100 | ||
514 | |||
515 | openssh (1:7.9p1-10) unstable; urgency=medium | ||
516 | |||
517 | * Temporarily revert IPQoS defaults to pre-7.8 values until issues with | ||
518 | "iptables -m tos" and VMware have been fixed (closes: #923879, #926229; | ||
519 | LP: #1822370). | ||
520 | |||
521 | -- Colin Watson <cjwatson@debian.org> Mon, 08 Apr 2019 11:13:04 +0100 | ||
522 | |||
523 | openssh (1:7.9p1-9) unstable; urgency=medium | ||
524 | |||
525 | * Apply upstream patch to make scp handle shell-style brace expansions | ||
526 | when checking that filenames sent by the server match what the client | ||
527 | requested (closes: #923486). | ||
528 | |||
529 | -- Colin Watson <cjwatson@debian.org> Fri, 01 Mar 2019 12:23:36 +0000 | ||
530 | |||
531 | openssh (1:7.9p1-8) unstable; urgency=medium | ||
532 | |||
533 | [ Colin Watson ] | ||
534 | * Apply upstream patch to fix bug in HostbasedAcceptedKeyTypes and | ||
535 | PubkeyAcceptedKeyTypes options in the case where only RSA-SHA2 signature | ||
536 | types were specified. | ||
537 | * Apply upstream patch to request RSA-SHA2 signatures for | ||
538 | rsa-sha2-{256|512}-cert-v01@openssh.com cert algorithms (closes: | ||
539 | #923419). | ||
540 | * Move moduli(5) manual page to openssh-server to go with /etc/ssh/moduli; | ||
541 | forgotten in 1:7.9p1-5. | ||
542 | |||
543 | [ Dominik George ] | ||
544 | * Correctly handle conffile move to openssh-server (closes: #919344). | ||
545 | |||
546 | -- Colin Watson <cjwatson@debian.org> Thu, 28 Feb 2019 19:31:49 +0000 | ||
547 | |||
548 | openssh (1:7.9p1-7) unstable; urgency=medium | ||
549 | |||
550 | * Recommend "default-logind | logind | libpam-systemd" rather than just | ||
551 | libpam-systemd (closes: #923199). (I've retained libpam-systemd as an | ||
552 | alternative for a while to avoid backporting accidents, although it can | ||
553 | be removed later.) | ||
554 | * Pass "--exec /usr/sbin/sshd" to start-stop-daemon on stop as well as | ||
555 | start and pass "--chuid 0:0" on start, to avoid problems with non-root | ||
556 | groups leaking into the ownership of /run/sshd.pid (closes: #922365). | ||
557 | |||
558 | -- Colin Watson <cjwatson@debian.org> Tue, 26 Feb 2019 15:13:23 +0000 | ||
559 | |||
560 | openssh (1:7.9p1-6) unstable; urgency=medium | ||
561 | |||
562 | * CVE-2019-6109: Apply upstream patches to sanitize scp filenames via | ||
563 | snmprintf (closes: #793412). | ||
564 | * CVE-2019-6111: Apply upstream patch to check in scp client that | ||
565 | filenames sent during remote->local directory copies satisfy the | ||
566 | wildcard specified by the user. | ||
567 | |||
568 | -- Colin Watson <cjwatson@debian.org> Fri, 08 Feb 2019 16:26:35 +0000 | ||
569 | |||
570 | openssh (1:7.9p1-5) unstable; urgency=high | ||
571 | |||
572 | * Move /etc/ssh/moduli to openssh-server, since it's reasonably large and | ||
573 | only used by sshd (closes: #858050). | ||
574 | * Drop obsolete alternate build-dependency on libssl1.0-dev (closes: | ||
575 | #917342). | ||
576 | * CVE-2018-20685: Apply upstream scp patch to disallow empty incoming | ||
577 | filename or ones that refer to the current directory (closes: #919101). | ||
578 | |||
579 | -- Colin Watson <cjwatson@debian.org> Sun, 13 Jan 2019 11:22:45 +0000 | ||
580 | |||
581 | openssh (1:7.9p1-4) unstable; urgency=medium | ||
582 | |||
583 | * Fix Ubuntu detection in debian/rules, since the documentation comment | ||
584 | for dpkg_vendor_derives_from is wrong (thanks, Jeremy Bicha; see | ||
585 | #913816). | ||
586 | |||
587 | -- Colin Watson <cjwatson@debian.org> Fri, 16 Nov 2018 11:27:28 +0000 | ||
588 | |||
589 | openssh (1:7.9p1-3) unstable; urgency=medium | ||
590 | |||
591 | * Be more specific about what files to install in openssh-tests, to avoid | ||
592 | installing a symlink into the build tree. | ||
593 | * Re-export debian/upstream/signing-key.asc without extra signatures. | ||
594 | * Restore direct test dependencies on openssl, putty-tools, and | ||
595 | python-twisted-conch; these are really only indirect dependencies via | ||
596 | openssh-tests, but including them means that this package will be | ||
597 | retested when they change. | ||
598 | |||
599 | -- Colin Watson <cjwatson@debian.org> Thu, 15 Nov 2018 01:30:56 +0000 | ||
600 | |||
601 | openssh (1:7.9p1-2) unstable; urgency=medium | ||
602 | |||
603 | * Add GitLab CI configuration. | ||
604 | * Make the autopkgtest create /run/sshd if it doesn't already exist. | ||
605 | * Drop "set -x" verbosity from the autopkgtest; I think we can do without | ||
606 | this in most cases nowadays. | ||
607 | * Add an openssh-tests binary package containing enough files to run the | ||
608 | upstream regression tests. This allows autopkgtest to run more | ||
609 | efficiently, as it doesn't have to build part of the source tree again. | ||
610 | |||
611 | -- Colin Watson <cjwatson@debian.org> Wed, 14 Nov 2018 15:55:48 +0000 | ||
612 | |||
613 | openssh (1:7.9p1-1) unstable; urgency=medium | ||
614 | |||
615 | * New upstream release (https://www.openssh.com/txt/release-7.9): | ||
616 | - ssh(1), sshd(8): allow most port numbers to be specified using service | ||
617 | names from getservbyname(3) (typically /etc/services; closes: | ||
618 | #177406). | ||
619 | - ssh(1): allow the IdentityAgent configuration directive to accept | ||
620 | environment variable names. This supports the use of multiple agent | ||
621 | sockets without needing to use fixed paths. | ||
622 | - sshd(8): support signalling sessions via the SSH protocol. A limited | ||
623 | subset of signals is supported and only for login or command sessions | ||
624 | (i.e. not subsystems) that were not subject to a forced command via | ||
625 | authorized_keys or sshd_config. | ||
626 | - ssh(1): support "ssh -Q sig" to list supported signature options. | ||
627 | Also "ssh -Q help" to show the full set of supported queries. | ||
628 | - ssh(1), sshd(8): add a CASignatureAlgorithms option for the client and | ||
629 | server configs to allow control over which signature formats are | ||
630 | allowed for CAs to sign certificates. For example, this allows | ||
631 | banning CAs that sign certificates using the RSA-SHA1 signature | ||
632 | algorithm. | ||
633 | - sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to revoke | ||
634 | keys specified by SHA256 hash. | ||
635 | - ssh-keygen(1): allow creation of key revocation lists directly from | ||
636 | base64-encoded SHA256 fingerprints. This supports revoking keys using | ||
637 | only the information contained in sshd(8) authentication log messages. | ||
638 | - ssh(1), ssh-keygen(1): avoid spurious "invalid format" errors when | ||
639 | attempting to load PEM private keys while using an incorrect | ||
640 | passphrase. | ||
641 | - sshd(8): when a channel closed message is received from a client, | ||
642 | close the stderr file descriptor at the same time stdout is closed. | ||
643 | This avoids stuck processes if they were waiting for stderr to close | ||
644 | and were insensitive to stdin/out closing (closes: #844494). | ||
645 | - ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11 | ||
646 | forwarding timeout and support X11 forwarding indefinitely. | ||
647 | Previously the behaviour of ForwardX11Timeout=0 was undefined. | ||
648 | - sshd(8): when compiled with GSSAPI support, cache supported method | ||
649 | OIDs regardless of whether GSSAPI authentication is enabled in the | ||
650 | main section of sshd_config. This avoids sandbox violations if GSSAPI | ||
651 | authentication was later enabled in a Match block. | ||
652 | - sshd(8): do not fail closed when configured with a text key revocation | ||
653 | list that contains a too-short key. | ||
654 | - ssh(1): treat connections with ProxyJump specified the same as ones | ||
655 | with a ProxyCommand set with regards to hostname canonicalisation | ||
656 | (i.e. don't try to canonicalise the hostname unless | ||
657 | CanonicalizeHostname is set to 'always'). | ||
658 | - ssh(1): fix regression in OpenSSH 7.8 that could prevent public-key | ||
659 | authentication using certificates hosted in a ssh-agent(1) or against | ||
660 | sshd(8) from OpenSSH <7.8 (LP: #1790963). | ||
661 | - All: support building against the openssl-1.1 API (releases 1.1.0g and | ||
662 | later). The openssl-1.0 API will remain supported at least until | ||
663 | OpenSSL terminates security patch support for that API version | ||
664 | (closes: #828475). | ||
665 | - sshd(8): allow the futex(2) syscall in the Linux seccomp sandbox; | ||
666 | apparently required by some glibc/OpenSSL combinations. | ||
667 | * Remove dh_builddeb override to use xz compression; this has been the | ||
668 | default since dpkg 1.17.0. | ||
669 | * Simplify debian/rules using /usr/share/dpkg/default.mk. | ||
670 | * Remove /etc/network/if-up.d/openssh-server, as it causes more problems | ||
671 | than it solves (thanks, Christian Ehrhardt, Andreas Hasenack, and David | ||
672 | Britton; closes: #789532, LP: #1037738, #1674330, #1718227). Add an | ||
673 | "if-up hook removed" section to README.Debian documenting the corner | ||
674 | case that may need configuration adjustments. | ||
675 | |||
676 | -- Colin Watson <cjwatson@debian.org> Sun, 21 Oct 2018 10:39:24 +0100 | ||
677 | |||
678 | openssh (1:7.8p1-1) unstable; urgency=medium | ||
679 | |||
680 | * New upstream release (https://www.openssh.com/txt/release-7.8, closes: | ||
681 | #907534): | ||
682 | - ssh-keygen(1): Write OpenSSH format private keys by default instead of | ||
683 | using OpenSSL's PEM format (closes: #905407). The OpenSSH format, | ||
684 | supported in OpenSSH releases since 2014 and described in the | ||
685 | PROTOCOL.key file in the source distribution, offers substantially | ||
686 | better protection against offline password guessing and supports key | ||
687 | comments in private keys. If necessary, it is possible to write old | ||
688 | PEM-style keys by adding "-m PEM" to ssh-keygen's arguments when | ||
689 | generating or updating a key. | ||
690 | - sshd(8): Remove internal support for S/Key multiple factor | ||
691 | authentication. S/Key may still be used via PAM or BSD auth. | ||
692 | - ssh(1): Remove vestigial support for running ssh(1) as setuid. This | ||
693 | used to be required for hostbased authentication and the (long gone) | ||
694 | rhosts-style authentication, but has not been necessary for a long | ||
695 | time. Attempting to execute ssh as a setuid binary, or with uid != | ||
696 | effective uid will now yield a fatal error at runtime. | ||
697 | - sshd(8): The semantics of PubkeyAcceptedKeyTypes and the similar | ||
698 | HostbasedAcceptedKeyTypes options have changed. These now specify | ||
699 | signature algorithms that are accepted for their respective | ||
700 | authentication mechanism, where previously they specified accepted key | ||
701 | types. This distinction matters when using the RSA/SHA2 signature | ||
702 | algorithms "rsa-sha2-256", "rsa-sha2-512" and their certificate | ||
703 | counterparts. Configurations that override these options but omit | ||
704 | these algorithm names may cause unexpected authentication failures (no | ||
705 | action is required for configurations that accept the default for | ||
706 | these options). | ||
707 | - sshd(8): The precedence of session environment variables has changed. | ||
708 | ~/.ssh/environment and environment="..." options in authorized_keys | ||
709 | files can no longer override SSH_* variables set implicitly by sshd. | ||
710 | - ssh(1)/sshd(8): The default IPQoS used by ssh/sshd has changed. They | ||
711 | will now use DSCP AF21 for interactive traffic and CS1 for bulk. For | ||
712 | a detailed rationale, please see the commit message: | ||
713 | https://cvsweb.openbsd.org/src/usr.bin/ssh/readconf.c#rev1.284 | ||
714 | - ssh(1)/sshd(8): Add new signature algorithms "rsa-sha2-256-cert- | ||
715 | v01@openssh.com" and "rsa-sha2-512-cert-v01@openssh.com" to explicitly | ||
716 | force use of RSA/SHA2 signatures in authentication. | ||
717 | - sshd(8): Extend the PermitUserEnvironment option to accept a whitelist | ||
718 | of environment variable names in addition to global "yes" or "no" | ||
719 | settings. | ||
720 | - sshd(8): Add a PermitListen directive to sshd_config(5) and a | ||
721 | corresponding permitlisten= authorized_keys option that control which | ||
722 | listen addresses and port numbers may be used by remote forwarding | ||
723 | (ssh -R ...). | ||
724 | - sshd(8): Add some countermeasures against timing attacks used for | ||
725 | account validation/enumeration. sshd will enforce a minimum time or | ||
726 | each failed authentication attempt consisting of a global 5ms minimum | ||
727 | plus an additional per-user 0-4ms delay derived from a host secret. | ||
728 | - sshd(8): Add a SetEnv directive to allow an administrator to | ||
729 | explicitly specify environment variables in sshd_config. Variables | ||
730 | set by SetEnv override the default and client-specified environment. | ||
731 | - ssh(1): Add a SetEnv directive to request that the server sets an | ||
732 | environment variable in the session. Similar to the existing SendEnv | ||
733 | option, these variables are set subject to server configuration. | ||
734 | - ssh(1): Allow "SendEnv -PATTERN" to clear environment variables | ||
735 | previously marked for sending to the server (closes: #573316). | ||
736 | - ssh(1)/sshd(8): Make UID available as a %-expansion everywhere that | ||
737 | the username is available currently. | ||
738 | - ssh(1): Allow setting ProxyJump=none to disable ProxyJump | ||
739 | functionality. | ||
740 | - sshd(8): Avoid observable differences in request parsing that could be | ||
741 | used to determine whether a target user is valid. | ||
742 | - ssh(1)/sshd(8): Fix some memory leaks. | ||
743 | - ssh(1): Fix a pwent clobber (introduced in openssh-7.7) that could | ||
744 | occur during key loading, manifesting as crash on some platforms. | ||
745 | - sshd_config(5): Clarify documentation for AuthenticationMethods | ||
746 | option. | ||
747 | - ssh(1): Ensure that the public key algorithm sent in a public key | ||
748 | SSH_MSG_USERAUTH_REQUEST matches the content of the signature blob. | ||
749 | Previously, these could be inconsistent when a legacy or non-OpenSSH | ||
750 | ssh-agent returned a RSA/SHA1 signature when asked to make a RSA/SHA2 | ||
751 | signature. | ||
752 | - sshd(8): Fix failures to read authorized_keys caused by faulty | ||
753 | supplemental group caching. | ||
754 | - scp(1): Apply umask to directories, fixing potential mkdir/chmod race | ||
755 | when copying directory trees. | ||
756 | - ssh-keygen(1): Return correct exit code when searching for and hashing | ||
757 | known_hosts entries in a single operation. | ||
758 | - ssh(1): Prefer the ssh binary pointed to via argv[0] to $PATH when | ||
759 | re-executing ssh for ProxyJump. | ||
760 | - sshd(8): Do not ban PTY allocation when a sshd session is restricted | ||
761 | because the user password is expired as it breaks password change | ||
762 | dialog. | ||
763 | - ssh(1)/sshd(8): Fix error reporting from select() failures. | ||
764 | - ssh(1): Improve documentation for -w (tunnel) flag, emphasising that | ||
765 | -w implicitly sets Tunnel=point-to-point. | ||
766 | - ssh-agent(1): Implement EMFILE mitigation for ssh-agent. ssh-agent | ||
767 | will no longer spin when its file descriptor limit is exceeded. | ||
768 | - ssh(1)/sshd(8): Disable SSH2_MSG_DEBUG messages for Twisted Conch | ||
769 | clients. Twisted Conch versions that lack a version number in their | ||
770 | identification strings will mishandle these messages when running on | ||
771 | Python 2.x (https://twistedmatrix.com/trac/ticket/9422). | ||
772 | - sftp(1): Notify user immediately when underlying ssh process dies | ||
773 | expectedly. | ||
774 | - ssh(1)/sshd(8): Fix tunnel forwarding; regression in 7.7 release. | ||
775 | - ssh-agent(1): Don't kill ssh-agent's listening socket entirely if it | ||
776 | fails to accept(2) a connection. | ||
777 | - ssh(1): Add some missing options in the configuration dump output (ssh | ||
778 | -G). | ||
779 | - sshd(8): Expose details of completed authentication to PAM auth | ||
780 | modules via SSH_AUTH_INFO_0 in the PAM environment. | ||
781 | * Switch debian/watch to HTTPS. | ||
782 | * Temporarily work around https://twistedmatrix.com/trac/ticket/9515 in | ||
783 | regression tests. | ||
784 | |||
785 | -- Colin Watson <cjwatson@debian.org> Thu, 30 Aug 2018 15:35:27 +0100 | ||
786 | |||
787 | openssh (1:7.7p1-4) unstable; urgency=high | ||
788 | |||
789 | * CVE-2018-15473: Apply upstream patch to delay bailout for invalid | ||
790 | authenticating user until after the packet containing the request has | ||
791 | been fully parsed (closes: #906236). | ||
792 | |||
793 | -- Colin Watson <cjwatson@debian.org> Fri, 17 Aug 2018 14:09:32 +0100 | ||
794 | |||
795 | openssh (1:7.7p1-3) unstable; urgency=medium | ||
796 | |||
797 | [ Colin Watson ] | ||
798 | * Adjust git-dpm tagging configuration. | ||
799 | * Remove no-longer-used Lintian overrides from openssh-server and ssh. | ||
800 | * Add Documentation keys to ssh-agent.service, ssh.service, and | ||
801 | ssh@.service. | ||
802 | |||
803 | [ Juri Grabowski ] | ||
804 | * Add rescue.target with ssh support. | ||
805 | |||
806 | [ Christian Ehrhardt ] | ||
807 | * Fix unintentional restriction of authorized keys environment options | ||
808 | to be alphanumeric (closes: #903474, LP: #1771011). | ||
809 | |||
810 | -- Colin Watson <cjwatson@debian.org> Tue, 10 Jul 2018 16:07:16 +0100 | ||
811 | |||
812 | openssh (1:7.7p1-2) unstable; urgency=medium | ||
813 | |||
814 | * Fix parsing of DebianBanner option (closes: #894730). | ||
815 | |||
816 | -- Colin Watson <cjwatson@debian.org> Wed, 04 Apr 2018 00:47:29 +0100 | ||
817 | |||
818 | openssh (1:7.7p1-1) unstable; urgency=medium | ||
819 | |||
820 | * New upstream release (https://www.openssh.com/txt/release-7.7): | ||
821 | - ssh(1)/sshd(8): Drop compatibility support for some very old SSH | ||
822 | implementations, including ssh.com <=2.* and OpenSSH <= 3.*. These | ||
823 | versions were all released in or before 2001 and predate the final SSH | ||
824 | RFCs. The support in question isn't necessary for RFC-compliant SSH | ||
825 | implementations. | ||
826 | - Add experimental support for PQC XMSS keys (Extended Hash-Based | ||
827 | Signatures). | ||
828 | - sshd(8): Add an "rdomain" criterion for the sshd_config Match keyword | ||
829 | to allow conditional configuration that depends on which routing | ||
830 | domain a connection was received on. | ||
831 | - sshd_config(5): Add an optional rdomain qualifier to the ListenAddress | ||
832 | directive to allow listening on different routing domains. | ||
833 | - sshd(8): Add "expiry-time" option for authorized_keys files to allow | ||
834 | for expiring keys. | ||
835 | - ssh(1): Add a BindInterface option to allow binding the outgoing | ||
836 | connection to an interface's address (basically a more usable | ||
837 | BindAddress; closes: #289592). | ||
838 | - ssh(1): Expose device allocated for tun/tap forwarding via a new %T | ||
839 | expansion for LocalCommand. This allows LocalCommand to be used to | ||
840 | prepare the interface. | ||
841 | - sshd(8): Expose the device allocated for tun/tap forwarding via a new | ||
842 | SSH_TUNNEL environment variable. This allows automatic setup of the | ||
843 | interface and surrounding network configuration automatically on the | ||
844 | server. | ||
845 | - ssh(1)/scp(1)/sftp(1): Add URI support to ssh, sftp and scp, e.g. | ||
846 | ssh://user@host or sftp://user@host/path. Additional connection | ||
847 | parameters described in draft-ietf-secsh-scp-sftp-ssh-uri-04 are not | ||
848 | implemented since the ssh fingerprint format in the draft uses the | ||
849 | deprecated MD5 hash with no way to specify any other algorithm. | ||
850 | - ssh-keygen(1): Allow certificate validity intervals that specify only | ||
851 | a start or stop time (instead of both or neither). | ||
852 | - sftp(1): Allow "cd" and "lcd" commands with no explicit path argument. | ||
853 | lcd will change to the local user's home directory as usual. cd will | ||
854 | change to the starting directory for session (because the protocol | ||
855 | offers no way to obtain the remote user's home directory). | ||
856 | - sshd(8): When doing a config test with sshd -T, only require the | ||
857 | attributes that are actually used in Match criteria rather than (an | ||
858 | incomplete list of) all criteria. | ||
859 | - ssh(1)/sshd(8): More strictly check signature types during key | ||
860 | exchange against what was negotiated. Prevents downgrade of RSA | ||
861 | signatures made with SHA-256/512 to SHA-1. | ||
862 | - sshd(8): Fix support for client that advertise a protocol version of | ||
863 | "1.99" (indicating that they are prepared to accept both SSHv1 and | ||
864 | SSHv2). This was broken in OpenSSH 7.6 during the removal of SSHv1 | ||
865 | support. | ||
866 | - ssh(1): Warn when the agent returns a ssh-rsa (SHA1) signature when a | ||
867 | rsa-sha2-256/512 signature was requested. This condition is possible | ||
868 | when an old or non-OpenSSH agent is in use. | ||
869 | - ssh-agent(1): Fix regression introduced in 7.6 that caused ssh-agent | ||
870 | to fatally exit if presented an invalid signature request message. | ||
871 | - sshd_config(5): Accept yes/no flag options case-insensitively, as has | ||
872 | been the case in ssh_config(5) for a long time (LP: #1656557). | ||
873 | - ssh(1): Improve error reporting for failures during connection. Under | ||
874 | some circumstances misleading errors were being shown. | ||
875 | - ssh-keyscan(1): Add -D option to allow printing of results directly in | ||
876 | SSHFP format. | ||
877 | - ssh(1): Compatibility fix for some servers that erroneously drop the | ||
878 | connection when the IUTF8 (RFC8160) option is sent. | ||
879 | - scp(1): Disable RemoteCommand and RequestTTY in the ssh session | ||
880 | started by scp (sftp was already doing this). | ||
881 | - ssh-keygen(1): Refuse to create a certificate with an unusable number | ||
882 | of principals. | ||
883 | - ssh-keygen(1): Fatally exit if ssh-keygen is unable to write all the | ||
884 | public key during key generation. Previously it would silently ignore | ||
885 | errors writing the comment and terminating newline. | ||
886 | - ssh(1): Do not modify hostname arguments that are addresses by | ||
887 | automatically forcing them to lower-case. Instead canonicalise them | ||
888 | jo resolve ambiguities (e.g. ::0001 => ::1) before they are matched | ||
889 | against known_hosts. | ||
890 | - ssh(1): Don't accept junk after "yes" or "no" responses to hostkey | ||
891 | prompts. | ||
892 | - sftp(1): Have sftp print a warning about shell cleanliness when | ||
893 | decoding the first packet fails, which is usually caused by shells | ||
894 | polluting stdout of non-interactive startups. | ||
895 | - ssh(1)/sshd(8): Switch timers in packet code from using wall-clock | ||
896 | time to monotonic time, allowing the packet layer to better function | ||
897 | over a clock step and avoiding possible integer overflows during | ||
898 | steps. | ||
899 | - sshd(8): Correctly detect MIPS ABI in use at configure time. Fixes | ||
900 | sandbox violations on some environments. | ||
901 | - Build and link with "retpoline" flags when available to mitigate the | ||
902 | "branch target injection" style (variant 2) of the Spectre | ||
903 | branch-prediction vulnerability. | ||
904 | |||
905 | -- Colin Watson <cjwatson@debian.org> Tue, 03 Apr 2018 12:40:24 +0100 | ||
906 | |||
907 | openssh (1:7.6p1-5) unstable; urgency=medium | ||
908 | |||
909 | * Explicitly build-depend on pkg-config, rather than implicitly | ||
910 | build-depending on it via libgtk-3-dev (thanks, Aurelien Jarno; closes: | ||
911 | #894558). | ||
912 | |||
913 | -- Colin Watson <cjwatson@debian.org> Sun, 01 Apr 2018 21:37:19 +0100 | ||
914 | |||
915 | openssh (1:7.6p1-4) unstable; urgency=medium | ||
916 | |||
917 | * Move VCS to salsa.debian.org. | ||
918 | * Add a preseeding-only openssh-server/password-authentication debconf | ||
919 | template that can be used to disable password authentication (closes: | ||
920 | #878945). | ||
921 | |||
922 | -- Colin Watson <cjwatson@debian.org> Sat, 10 Feb 2018 02:31:46 +0000 | ||
923 | |||
924 | openssh (1:7.6p1-3) unstable; urgency=medium | ||
925 | |||
926 | [ Colin Watson ] | ||
927 | * Remove the decade-old ssh-krb5 transitional package; upgrades of | ||
928 | openssh-server will preserve existing configuration, and new | ||
929 | installations should just enable GSSAPIAuthentication and | ||
930 | GSSAPIKeyExchange in sshd_config (closes: #878626). | ||
931 | * Support the "noudeb" build profile. | ||
932 | * Fix putty-transfer regression test. | ||
933 | |||
934 | [ Anders Kaseorg ] | ||
935 | * debian/systemd/ssh-agent.service: Add missing dbus dependency. | ||
936 | |||
937 | [ Jason Duerstock ] | ||
938 | * Add a "pkg.openssh.nognome" build profile, which disables building the | ||
939 | ssh-askpass-gnome binary package and avoids the build-dependency on | ||
940 | libgtk-3-dev (closes: #883819). | ||
941 | |||
942 | -- Colin Watson <cjwatson@debian.org> Tue, 16 Jan 2018 17:41:08 +0000 | ||
943 | |||
944 | openssh (1:7.6p1-2) unstable; urgency=medium | ||
945 | |||
946 | * Apply upstream patch to fix PermitOpen argument handling. | ||
947 | |||
948 | -- Colin Watson <cjwatson@debian.org> Sat, 07 Oct 2017 13:44:13 +0100 | ||
949 | |||
950 | openssh (1:7.6p1-1) unstable; urgency=medium | ||
951 | |||
952 | * New upstream release (https://www.openssh.com/txt/release-7.6): | ||
953 | - CVE-2017-15906: sftp-server(8): In read-only mode, sftp-server was | ||
954 | incorrectly permitting creation of zero-length files. Reported by | ||
955 | Michal Zalewski. | ||
956 | - ssh(1): Delete SSH protocol version 1 support, associated | ||
957 | configuration options and documentation (LP: #1584321). | ||
958 | - ssh(1)/sshd(8): Remove support for the hmac-ripemd160 MAC. | ||
959 | - ssh(1)/sshd(8): Remove support for the arcfour, blowfish and CAST | ||
960 | ciphers. | ||
961 | - Refuse RSA keys <1024 bits in length and improve reporting for keys | ||
962 | that do not meet this requirement. | ||
963 | - ssh(1): Do not offer CBC ciphers by default. | ||
964 | - ssh(1): Add RemoteCommand option to specify a command in the ssh | ||
965 | config file instead of giving it on the client's command line. This | ||
966 | allows the configuration file to specify the command that will be | ||
967 | executed on the remote host. | ||
968 | - sshd(8): Add ExposeAuthInfo option that enables writing details of the | ||
969 | authentication methods used (including public keys where applicable) | ||
970 | to a file that is exposed via a $SSH_USER_AUTH environment variable in | ||
971 | the subsequent session. | ||
972 | - ssh(1): Add support for reverse dynamic forwarding. In this mode, ssh | ||
973 | will act as a SOCKS4/5 proxy and forward connections to destinations | ||
974 | requested by the remote SOCKS client. This mode is requested using | ||
975 | extended syntax for the -R and RemoteForward options and, because it | ||
976 | is implemented solely at the client, does not require the server be | ||
977 | updated to be supported. | ||
978 | - sshd(8): Allow LogLevel directive in sshd_config Match blocks. | ||
979 | - ssh-keygen(1): Allow inclusion of arbitrary string or flag certificate | ||
980 | extensions and critical options. | ||
981 | - ssh-keygen(1): Allow ssh-keygen to use a key held in ssh-agent as a CA | ||
982 | when signing certificates. | ||
983 | - ssh(1)/sshd(8): Allow IPQoS=none in ssh/sshd to not set an explicit | ||
984 | ToS/DSCP value and just use the operating system default. | ||
985 | - ssh-add(1): Add -q option to make ssh-add quiet on success. | ||
986 | - ssh(1): Expand the StrictHostKeyChecking option with two new settings. | ||
987 | The first "accept-new" will automatically accept hitherto-unseen keys | ||
988 | but will refuse connections for changed or invalid hostkeys. This is | ||
989 | a safer subset of the current behaviour of StrictHostKeyChecking=no. | ||
990 | The second setting "off", is a synonym for the current behaviour of | ||
991 | StrictHostKeyChecking=no: accept new host keys, and continue | ||
992 | connection for hosts with incorrect hostkeys. A future release will | ||
993 | change the meaning of StrictHostKeyChecking=no to the behaviour of | ||
994 | "accept-new". | ||
995 | - ssh(1): Add SyslogFacility option to ssh(1) matching the equivalent | ||
996 | option in sshd(8). | ||
997 | - ssh(1): Use HostKeyAlias if specified instead of hostname for matching | ||
998 | host certificate principal names. | ||
999 | - sftp(1): Implement sorting for globbed ls. | ||
1000 | - ssh(1): Add a user@host prefix to client's "Permission denied" | ||
1001 | messages, useful in particular when using "stacked" connections (e.g. | ||
1002 | ssh -J) where it's not clear which host is denying. | ||
1003 | - ssh(1): Accept unknown EXT_INFO extension values that contain \0 | ||
1004 | characters. These are legal, but would previously cause fatal | ||
1005 | connection errors if received. | ||
1006 | - sftp(1): Print '?' instead of incorrect link count (that the protocol | ||
1007 | doesn't provide) for remote listings. | ||
1008 | - ssh(1): Return failure rather than fatal() for more cases during | ||
1009 | session multiplexing negotiations. Causes the session to fall back to | ||
1010 | a non-mux connection if they occur. | ||
1011 | - ssh(1): Mention that the server may send debug messages to explain | ||
1012 | public key authentication problems under some circumstances. | ||
1013 | - Translate OpenSSL error codes to better report incorrect passphrase | ||
1014 | errors when loading private keys. | ||
1015 | - sshd(8): Adjust compatibility patterns for WinSCP to correctly | ||
1016 | identify versions that implement only the legacy DH group exchange | ||
1017 | scheme (closes: #877800). | ||
1018 | - ssh(1): Print the "Killed by signal 1" message only at LogLevel | ||
1019 | verbose so that it is not shown at the default level; prevents it from | ||
1020 | appearing during ssh -J and equivalent ProxyCommand configs. | ||
1021 | - ssh-keygen(1): When generating all hostkeys (ssh-keygen -A), clobber | ||
1022 | existing keys if they exist but are zero length. Zero-length keys | ||
1023 | could previously be made if ssh-keygen failed or was interrupted part | ||
1024 | way through generating them. | ||
1025 | - ssh-keyscan(1): Avoid double-close() on file descriptors. | ||
1026 | - sshd(8): Avoid reliance on shared use of pointers shared between | ||
1027 | monitor and child sshd processes. | ||
1028 | - sshd_config(8): Document available AuthenticationMethods. | ||
1029 | - ssh(1): Avoid truncation in some login prompts. | ||
1030 | - ssh(1): Make "--" before the hostname terminate argument processing | ||
1031 | after the hostname too (closes: #873201). | ||
1032 | - ssh-keygen(1): Switch from aes256-cbc to aes256-ctr for encrypting | ||
1033 | new-style private keys. | ||
1034 | - ssh(1): Warn and do not attempt to use keys when the public and | ||
1035 | private halves do not match. | ||
1036 | - sftp(1): Don't print verbose error message when ssh disconnects from | ||
1037 | under sftp. | ||
1038 | - sshd(8): Fix keepalive scheduling problem: prevent activity on a | ||
1039 | forwarded port from preventing the keepalive from being sent. | ||
1040 | - sshd(8): When started without root privileges, don't require the | ||
1041 | privilege separation user or path to exist. | ||
1042 | - ssh(1)/sshd(8): Correctness fix for channels implementation: accept | ||
1043 | channel IDs greater than 0x7FFFFFFF. | ||
1044 | - sshd(8): Expose list of completed authentication methods to PAM via | ||
1045 | the SSH_AUTH_INFO_0 PAM environment variable. | ||
1046 | - ssh(1)/sshd(8): Fix several problems in the tun/tap forwarding code, | ||
1047 | mostly to do with host/network byte order confusion. | ||
1048 | - sshd(8): Avoid Linux seccomp violations on ppc64le over the socketcall | ||
1049 | syscall. | ||
1050 | * Build-depend on debhelper (>= 9.20160709~) rather than dh-systemd. | ||
1051 | * Change priorities of ssh and ssh-krb5 binary packages to optional, since | ||
1052 | "Priority: extra" is now deprecated. | ||
1053 | * Use HTTPS form of copyright-format URL. | ||
1054 | * Adjust "Running sshd from inittab" instructions in README.Debian to | ||
1055 | recommend using service(8) rather than calling the init script directly. | ||
1056 | * Policy version 4.1.0. | ||
1057 | * Adjust "Per-connection sshd instances with systemd" instructions in | ||
1058 | README.Debian to recommend using a drop-in file rather than copying and | ||
1059 | modifying the ssh.socket unit file. | ||
1060 | |||
1061 | -- Colin Watson <cjwatson@debian.org> Fri, 06 Oct 2017 12:36:48 +0100 | ||
1062 | |||
1063 | openssh (1:7.5p1-10) unstable; urgency=medium | ||
1064 | |||
1065 | * Tell haveged to create the pid file we expect. | ||
1066 | * Give up and use systemctl to start haveged if running under systemd; | ||
1067 | this shouldn't be necessary, but I can't seem to get things working in | ||
1068 | the Ubuntu autopkgtest environment otherwise. | ||
1069 | |||
1070 | -- Colin Watson <cjwatson@debian.org> Fri, 01 Sep 2017 11:17:19 +0100 | ||
1071 | |||
1072 | openssh (1:7.5p1-9) unstable; urgency=medium | ||
1073 | |||
1074 | * Run debian/tests/regress with "set -x". | ||
1075 | * Run haveged without "-w 1024", as setting the low water mark doesn't | ||
1076 | seem possible in all autopkgtest virtualisation environments. | ||
1077 | |||
1078 | -- Colin Watson <cjwatson@debian.org> Thu, 31 Aug 2017 13:23:04 +0100 | ||
1079 | |||
1080 | openssh (1:7.5p1-8) unstable; urgency=medium | ||
1081 | |||
1082 | * Drop openssh-client-ssh1, now built by a separate source package. | ||
1083 | * Run haveged during autopkgtests to ensure that they have enough entropy | ||
1084 | for key generation (LP: #1712921). | ||
1085 | * Apply patches from https://bugzilla.mindrot.org/show_bug.cgi?id=2752 to | ||
1086 | allow some extra syscalls for crypto cards on s390x (LP: #1686618). | ||
1087 | |||
1088 | -- Colin Watson <cjwatson@debian.org> Mon, 28 Aug 2017 12:16:35 +0100 | ||
1089 | |||
1090 | openssh (1:7.5p1-7) unstable; urgency=medium | ||
1091 | |||
1092 | * Fix spelling of RuntimeDirectoryMode (closes: #872976). | ||
1093 | * Add RuntimeDirectory and RuntimeDirectoryMode to ssh@.service as well as | ||
1094 | ssh.service (closes: #872978). | ||
1095 | |||
1096 | -- Colin Watson <cjwatson@debian.org> Wed, 23 Aug 2017 12:12:59 +0100 | ||
1097 | |||
1098 | openssh (1:7.5p1-6) unstable; urgency=medium | ||
1099 | |||
1100 | [ Colin Watson ] | ||
1101 | * Test configuration before starting or reloading sshd under systemd | ||
1102 | (closes: #865770). | ||
1103 | * Create /run/sshd under systemd using RuntimeDirectory rather than | ||
1104 | tmpfiles.d (thanks, Dmitry Smirnov; closes: #864190). | ||
1105 | |||
1106 | [ Dimitri John Ledkov ] | ||
1107 | * Drop upstart system and user jobs (closes: #872851). | ||
1108 | |||
1109 | [ Chris Lamb ] | ||
1110 | * Quote IP address in suggested "ssh-keygen -f" calls (closes: #872643). | ||
1111 | |||
1112 | -- Colin Watson <cjwatson@debian.org> Wed, 23 Aug 2017 01:41:06 +0100 | ||
1113 | |||
1114 | openssh (1:7.5p1-5) unstable; urgency=medium | ||
1115 | |||
1116 | * Upload to unstable. | ||
1117 | * Fix syntax error in debian/copyright. | ||
1118 | |||
1119 | -- Colin Watson <cjwatson@debian.org> Sun, 18 Jun 2017 12:08:42 +0100 | ||
1120 | |||
1121 | openssh (1:7.5p1-4) experimental; urgency=medium | ||
1122 | |||
1123 | * Drop README.Debian section on privilege separation, as it's no longer | ||
1124 | optional. | ||
1125 | * Only call "initctl set-env" from agent-launch if $UPSTART_SESSION is set | ||
1126 | (LP: #1689299). | ||
1127 | * Fix incoming compression statistics (thanks, Russell Coker; closes: | ||
1128 | #797964). | ||
1129 | * Relicense debian/* under a two-clause BSD licence for bidirectional | ||
1130 | compatibility with upstream, with permission from Matthew Vernon and | ||
1131 | others. | ||
1132 | |||
1133 | -- Colin Watson <cjwatson@debian.org> Tue, 06 Jun 2017 15:17:58 +0100 | ||
1134 | |||
1135 | openssh (1:7.5p1-3) experimental; urgency=medium | ||
1136 | |||
1137 | * Fix debian/adjust-openssl-dependencies to account for preferring | ||
1138 | libssl1.0-dev. | ||
1139 | * Adjust OpenSSL dependencies for openssh-client-ssh1 too. | ||
1140 | * Fix purge failure when /etc/ssh has already somehow been removed | ||
1141 | (LP: #1682817). | ||
1142 | * Ensure that /etc/ssh exists before trying to create /etc/ssh/sshd_config | ||
1143 | (LP: #1685022). | ||
1144 | |||
1145 | -- Colin Watson <cjwatson@debian.org> Tue, 02 May 2017 13:51:27 +0100 | ||
1146 | |||
1147 | openssh (1:7.5p1-2) experimental; urgency=medium | ||
1148 | |||
1149 | * Add missing header on Linux/s390. | ||
1150 | * Fix syntax error on Linux/X32. | ||
1151 | |||
1152 | -- Colin Watson <cjwatson@debian.org> Sun, 02 Apr 2017 13:20:11 +0100 | ||
1153 | |||
1154 | openssh (1:7.5p1-1) experimental; urgency=medium | ||
1155 | |||
1156 | * New upstream release (https://www.openssh.com/txt/release-7.5): | ||
1157 | - SECURITY: ssh(1), sshd(8): Fix weakness in CBC padding oracle | ||
1158 | countermeasures that allowed a variant of the attack fixed in OpenSSH | ||
1159 | 7.3 to proceed. Note that the OpenSSH client disables CBC ciphers by | ||
1160 | default, sshd offers them as lowest-preference options and will remove | ||
1161 | them by default entirely in the next release. | ||
1162 | - This release deprecates the sshd_config UsePrivilegeSeparation option, | ||
1163 | thereby making privilege separation mandatory (closes: #407754). | ||
1164 | - The format of several log messages emitted by the packet code has | ||
1165 | changed to include additional information about the user and their | ||
1166 | authentication state. Software that monitors ssh/sshd logs may need | ||
1167 | to account for these changes. | ||
1168 | - ssh(1), sshd(8): Support "=-" syntax to easily remove methods from | ||
1169 | algorithm lists, e.g. Ciphers=-*cbc. | ||
1170 | - sshd(1): Fix NULL dereference crash when key exchange start messages | ||
1171 | are sent out of sequence. | ||
1172 | - ssh(1), sshd(8): Allow form-feed characters to appear in configuration | ||
1173 | files. | ||
1174 | - sshd(8): Fix regression in OpenSSH 7.4 support for the server-sig-algs | ||
1175 | extension, where SHA2 RSA signature methods were not being correctly | ||
1176 | advertised. | ||
1177 | - ssh(1), ssh-keygen(1): Fix a number of case-sensitivity bugs in | ||
1178 | known_hosts processing. | ||
1179 | - ssh(1): Allow ssh to use certificates accompanied by a private key | ||
1180 | file but no corresponding plain *.pub public key. | ||
1181 | - ssh(1): When updating hostkeys using the UpdateHostKeys option, accept | ||
1182 | RSA keys if HostkeyAlgorithms contains any RSA keytype. Previously, | ||
1183 | ssh could ignore RSA keys when only the ssh-rsa-sha2-* methods were | ||
1184 | enabled in HostkeyAlgorithms and not the old ssh-rsa method. | ||
1185 | - ssh(1): Detect and report excessively long configuration file lines. | ||
1186 | - Merge a number of fixes found by Coverity and reported via Redhat and | ||
1187 | FreeBSD. Includes fixes for some memory and file descriptor leaks in | ||
1188 | error paths. | ||
1189 | - ssh(1), sshd(8): When logging long messages to stderr, don't truncate | ||
1190 | "\r\n" if the length of the message exceeds the buffer. | ||
1191 | - ssh(1): Fully quote [host]:port in generated ProxyJump/-J command- | ||
1192 | line; avoid confusion over IPv6 addresses and shells that treat square | ||
1193 | bracket characters specially. | ||
1194 | - Fix various fallout and sharp edges caused by removing SSH protocol 1 | ||
1195 | support from the server, including the server banner string being | ||
1196 | incorrectly terminated with only \n (instead of \r\n), confusing error | ||
1197 | messages from ssh-keyscan, and a segfault in sshd if protocol v.1 was | ||
1198 | enabled for the client and sshd_config contained references to legacy | ||
1199 | keys. | ||
1200 | - ssh(1), sshd(8): Free fd_set on connection timeout. | ||
1201 | - sftp(1): Fix division by zero crash in "df" output when server returns | ||
1202 | zero total filesystem blocks/inodes. | ||
1203 | - ssh(1), ssh-add(1), ssh-keygen(1), sshd(8): Translate OpenSSL errors | ||
1204 | encountered during key loading to more meaningful error codes. | ||
1205 | - ssh-keygen(1): Sanitise escape sequences in key comments sent to | ||
1206 | printf but preserve valid UTF-8 when the locale supports it. | ||
1207 | - ssh(1), sshd(8): Return reason for port forwarding failures where | ||
1208 | feasible rather than always "administratively prohibited". | ||
1209 | - sshd(8): Fix deadlock when AuthorizedKeysCommand or | ||
1210 | AuthorizedPrincipalsCommand produces a lot of output and a key is | ||
1211 | matched early. | ||
1212 | - ssh(1): Fix typo in ~C error message for bad port forward | ||
1213 | cancellation. | ||
1214 | - ssh(1): Show a useful error message when included config files can't | ||
1215 | be opened. | ||
1216 | - sshd_config(5): Repair accidentally-deleted mention of %k token in | ||
1217 | AuthorizedKeysCommand. | ||
1218 | - sshd(8): Remove vestiges of previously removed LOGIN_PROGRAM. | ||
1219 | - ssh-agent(1): Relax PKCS#11 whitelist to include libexec and common | ||
1220 | 32-bit compatibility library directories. | ||
1221 | - sftp-client(1): Fix non-exploitable integer overflow in SSH2_FXP_NAME | ||
1222 | response handling. | ||
1223 | - ssh-agent(1): Fix regression in 7.4 of deleting PKCS#11-hosted keys. | ||
1224 | It was not possible to delete them except by specifying their full | ||
1225 | physical path. | ||
1226 | - sshd(8): Avoid sandbox errors for Linux S390 systems using an ICA | ||
1227 | crypto coprocessor. | ||
1228 | - sshd(8): Fix non-exploitable weakness in seccomp-bpf sandbox arg | ||
1229 | inspection. | ||
1230 | - ssh-keygen(1), ssh(1), sftp(1): Fix output truncation for various that | ||
1231 | contain non-printable characters where the codeset in use is ASCII. | ||
1232 | |||
1233 | -- Colin Watson <cjwatson@debian.org> Sun, 02 Apr 2017 02:58:01 +0100 | ||
1234 | |||
1235 | openssh (1:7.4p1-11) unstable; urgency=medium | ||
1236 | |||
1237 | * Fix incoming compression statistics (thanks, Russell Coker; closes: | ||
1238 | #797964). | ||
1239 | |||
1240 | -- Colin Watson <cjwatson@debian.org> Tue, 06 Jun 2017 15:03:48 +0100 | ||
1241 | |||
1242 | openssh (1:7.4p1-10) unstable; urgency=medium | ||
1243 | |||
1244 | * Move privilege separation directory and PID file from /var/run/ to /run/ | ||
1245 | (closes: #760422, #856825). | ||
1246 | * Unbreak Unix domain socket forwarding for root (closes: #858252). | ||
1247 | |||
1248 | -- Colin Watson <cjwatson@debian.org> Thu, 30 Mar 2017 11:19:04 +0100 | ||
1249 | |||
1250 | openssh (1:7.4p1-9) unstable; urgency=medium | ||
1251 | |||
1252 | * Fix null pointer dereference in ssh-keygen; this fixes an autopkgtest | ||
1253 | regression introduced in 1:7.4p1-8. | ||
1254 | |||
1255 | -- Colin Watson <cjwatson@debian.org> Thu, 16 Mar 2017 13:43:15 +0000 | ||
1256 | |||
1257 | openssh (1:7.4p1-8) unstable; urgency=medium | ||
1258 | |||
1259 | * Fix ssh-keygen -H accidentally corrupting known_hosts that contained | ||
1260 | already-hashed entries (closes: #851734, LP: #1668093). | ||
1261 | * Fix ssh-keyscan to correctly hash hosts with a port number (closes: | ||
1262 | #857736, LP: #1670745). | ||
1263 | |||
1264 | -- Colin Watson <cjwatson@debian.org> Tue, 14 Mar 2017 13:49:14 +0000 | ||
1265 | |||
1266 | openssh (1:7.4p1-7) unstable; urgency=medium | ||
1267 | |||
1268 | * Don't set "PermitRootLogin yes" on fresh installations (regression | ||
1269 | introduced in 1:7.4p1-1; closes: #852781). | ||
1270 | * Restore reading authorized_keys2 by default. Upstream seems to intend | ||
1271 | to gradually phase this out, so don't assume that this will remain the | ||
1272 | default forever. However, we were late in adopting the upstream | ||
1273 | sshd_config changes, so it makes sense to extend the grace period | ||
1274 | (closes: #852320). | ||
1275 | |||
1276 | -- Colin Watson <cjwatson@debian.org> Sun, 05 Mar 2017 02:12:42 +0000 | ||
1277 | |||
1278 | openssh (1:7.4p1-6) unstable; urgency=medium | ||
1279 | |||
1280 | * Remove temporary file on exit from postinst (closes: #850275). | ||
1281 | * Remove LOGIN_PROGRAM and LOGIN_NO_ENDOPT definitions, since UseLogin is | ||
1282 | gone. | ||
1283 | * Document sshd_config changes that may be needed following the removal of | ||
1284 | protocol 1 support from sshd (closes: #851573). | ||
1285 | * Remove ssh_host_dsa_key from HostKey default (closes: #850614). | ||
1286 | * Fix rekeying failure with GSSAPI key exchange (thanks, Harald Barth; | ||
1287 | closes: #819361, LP: #1608965). | ||
1288 | |||
1289 | -- Colin Watson <cjwatson@debian.org> Mon, 16 Jan 2017 15:11:10 +0000 | ||
1290 | |||
1291 | openssh (1:7.4p1-5) unstable; urgency=medium | ||
1292 | |||
1293 | * Create mux socket for regression tests in a temporary directory. | ||
1294 | * Work around clock_gettime kernel bug on Linux x32 (closes: #849923). | ||
1295 | |||
1296 | -- Colin Watson <cjwatson@debian.org> Tue, 03 Jan 2017 14:43:28 +0000 | ||
1297 | |||
1298 | openssh (1:7.4p1-4) unstable; urgency=medium | ||
1299 | |||
1300 | * Run regression tests inside annotate-output to try to diagnose timeout | ||
1301 | issues. | ||
1302 | * Make integrity tests more robust against timeouts in the case where the | ||
1303 | first test in a series for a given MAC happens to modify the low bytes | ||
1304 | of a packet length. | ||
1305 | * Fix race conditions in forwarding tests. | ||
1306 | |||
1307 | -- Colin Watson <cjwatson@debian.org> Mon, 02 Jan 2017 19:37:23 +0000 | ||
1308 | |||
1309 | openssh (1:7.4p1-3) unstable; urgency=medium | ||
1310 | |||
1311 | * Revert attempted hack around regress/forwarding.sh test failure, since | ||
1312 | it doesn't seem to help. | ||
1313 | * Run regression tests using 'sh -x' to try to get more information about | ||
1314 | failures. | ||
1315 | * Dump some useful log files if regression tests fail. | ||
1316 | * Tweak regression test setup to cope with the case where some of the | ||
1317 | source directory is unreadable by the openssh-tests user. | ||
1318 | |||
1319 | -- Colin Watson <cjwatson@debian.org> Sat, 31 Dec 2016 02:48:17 +0000 | ||
1320 | |||
1321 | openssh (1:7.4p1-2) unstable; urgency=medium | ||
1322 | |||
1323 | * Attempt to hack around regress/forwarding.sh test failure in some | ||
1324 | environments. | ||
1325 | * Avoid calling into Kerberos libraries from ssh_gssapi_server_mechanisms | ||
1326 | in the privsep monitor. | ||
1327 | |||
1328 | -- Colin Watson <cjwatson@debian.org> Thu, 29 Dec 2016 12:02:12 +0000 | ||
1329 | |||
1330 | openssh (1:7.4p1-1) unstable; urgency=medium | ||
1331 | |||
1332 | * New upstream release (http://www.openssh.com/txt/release-7.4): | ||
1333 | - ssh(1): Remove 3des-cbc from the client's default proposal. 64-bit | ||
1334 | block ciphers are not safe in 2016 and we don't want to wait until | ||
1335 | attacks like SWEET32 are extended to SSH. As 3des-cbc was the only | ||
1336 | mandatory cipher in the SSH RFCs, this may cause problems connecting | ||
1337 | to older devices using the default configuration, but it's highly | ||
1338 | likely that such devices already need explicit configuration for key | ||
1339 | exchange and hostkey algorithms already anyway. | ||
1340 | - sshd(8): When a forced-command appears in both a certificate and an | ||
1341 | authorized keys/principals command= restriction, sshd will now refuse | ||
1342 | to accept the certificate unless they are identical. The previous | ||
1343 | (documented) behaviour of having the certificate forced-command | ||
1344 | override the other could be a bit confusing and error-prone. | ||
1345 | - sshd(8): Remove the UseLogin configuration directive and support for | ||
1346 | having /bin/login manage login sessions. | ||
1347 | - CVE-2016-10009: ssh-agent(1): Will now refuse to load PKCS#11 modules | ||
1348 | from paths outside a trusted whitelist (run-time configurable). | ||
1349 | Requests to load modules could be passed via agent forwarding and an | ||
1350 | attacker could attempt to load a hostile PKCS#11 module across the | ||
1351 | forwarded agent channel: PKCS#11 modules are shared libraries, so this | ||
1352 | would result in code execution on the system running the ssh-agent if | ||
1353 | the attacker has control of the forwarded agent-socket (on the host | ||
1354 | running the sshd server) and the ability to write to the filesystem of | ||
1355 | the host running ssh-agent (usually the host running the ssh client) | ||
1356 | (closes: #848714). | ||
1357 | - CVE-2016-10010: sshd(8): When privilege separation is disabled, | ||
1358 | forwarded Unix-domain sockets would be created by sshd(8) with the | ||
1359 | privileges of 'root' instead of the authenticated user. This release | ||
1360 | refuses Unix-domain socket forwarding when privilege separation is | ||
1361 | disabled (Privilege separation has been enabled by default for 14 | ||
1362 | years) (closes: #848715). | ||
1363 | - CVE-2016-10011: sshd(8): Avoid theoretical leak of host private key | ||
1364 | material to privilege-separated child processes via realloc() when | ||
1365 | reading keys. No such leak was observed in practice for normal-sized | ||
1366 | keys, nor does a leak to the child processes directly expose key | ||
1367 | material to unprivileged users (closes: #848716). | ||
1368 | - CVE-2016-10012: sshd(8): The shared memory manager used by | ||
1369 | pre-authentication compression support had a bounds checks that could | ||
1370 | be elided by some optimising compilers. Additionally, this memory | ||
1371 | manager was incorrectly accessible when pre-authentication compression | ||
1372 | was disabled. This could potentially allow attacks against the | ||
1373 | privileged monitor process from the sandboxed privilege-separation | ||
1374 | process (a compromise of the latter would be required first). This | ||
1375 | release removes support for pre-authentication compression from | ||
1376 | sshd(8) (closes: #848717). | ||
1377 | - SECURITY: sshd(8): Validate address ranges for AllowUser and DenyUsers | ||
1378 | directives at configuration load time and refuse to accept invalid | ||
1379 | ones. It was previously possible to specify invalid CIDR address | ||
1380 | ranges (e.g. user@127.1.2.3/55) and these would always match, possibly | ||
1381 | resulting in granting access where it was not intended. | ||
1382 | - ssh(1): Add a proxy multiplexing mode to ssh(1) inspired by the | ||
1383 | version in PuTTY by Simon Tatham. This allows a multiplexing client | ||
1384 | to communicate with the master process using a subset of the SSH | ||
1385 | packet and channels protocol over a Unix-domain socket, with the main | ||
1386 | process acting as a proxy that translates channel IDs, etc. This | ||
1387 | allows multiplexing mode to run on systems that lack file-descriptor | ||
1388 | passing (used by current multiplexing code) and potentially, in | ||
1389 | conjunction with Unix-domain socket forwarding, with the client and | ||
1390 | multiplexing master process on different machines. Multiplexing proxy | ||
1391 | mode may be invoked using "ssh -O proxy ...". | ||
1392 | - sshd(8): Add a sshd_config DisableForwarding option that disables X11, | ||
1393 | agent, TCP, tunnel and Unix domain socket forwarding, as well as | ||
1394 | anything else we might implement in the future. Like the 'restrict' | ||
1395 | authorized_keys flag, this is intended to be a simple and future-proof | ||
1396 | way of restricting an account. | ||
1397 | - sshd(8), ssh(1): Support the "curve25519-sha256" key exchange method. | ||
1398 | This is identical to the currently-supported method named | ||
1399 | "curve25519-sha256@libssh.org". | ||
1400 | - sshd(8): Improve handling of SIGHUP by checking to see if sshd is | ||
1401 | already daemonised at startup and skipping the call to daemon(3) if it | ||
1402 | is. This ensures that a SIGHUP restart of sshd(8) will retain the | ||
1403 | same process-ID as the initial execution. sshd(8) will also now | ||
1404 | unlink the PidFile prior to SIGHUP restart and re-create it after a | ||
1405 | successful restart, rather than leaving a stale file in the case of a | ||
1406 | configuration error. | ||
1407 | - sshd(8): Allow ClientAliveInterval and ClientAliveCountMax directives | ||
1408 | to appear in sshd_config Match blocks. | ||
1409 | - sshd(8): Add %-escapes to AuthorizedPrincipalsCommand to match those | ||
1410 | supported by AuthorizedKeysCommand (key, key type, fingerprint, etc.) | ||
1411 | and a few more to provide access to the contents of the certificate | ||
1412 | being offered. | ||
1413 | - ssh(1): Allow IdentityFile to successfully load and use certificates | ||
1414 | that have no corresponding bare public key. | ||
1415 | - ssh(1): Fix public key authentication when multiple authentication is | ||
1416 | in use and publickey is not just the first method attempted. | ||
1417 | - ssh(1): Improve reporting when attempting to load keys from PKCS#11 | ||
1418 | tokens with fewer useless log messages and more detail in debug | ||
1419 | messages. | ||
1420 | - ssh(1): When tearing down ControlMaster connections, don't pollute | ||
1421 | stderr when LogLevel=quiet. | ||
1422 | - sftp(1): On ^Z wait for underlying ssh(1) to suspend before suspending | ||
1423 | sftp(1) to ensure that ssh(1) restores the terminal mode correctly if | ||
1424 | suspended during a password prompt. | ||
1425 | - ssh(1): Avoid busy-wait when ssh(1) is suspended during a password | ||
1426 | prompt (LP: #1646813). | ||
1427 | - ssh(1), sshd(8): Correctly report errors during sending of ext-info | ||
1428 | messages. | ||
1429 | - sshd(8): Fix NULL-deref crash if sshd(8) received an out-of-sequence | ||
1430 | NEWKEYS message. | ||
1431 | - sshd(8): Correct list of supported signature algorithms sent in the | ||
1432 | server-sig-algs extension. | ||
1433 | - sshd(8): Fix sending ext_info message if privsep is disabled. | ||
1434 | - sshd(8): More strictly enforce the expected ordering of privilege | ||
1435 | separation monitor calls used for authentication and allow them only | ||
1436 | when their respective authentication methods are enabled in the | ||
1437 | configuration. | ||
1438 | - sshd_config(5): Use 2001:db8::/32, the official IPv6 subnet for | ||
1439 | configuration examples. | ||
1440 | - On environments configured with Turkish locales, fall back to the | ||
1441 | C/POSIX locale to avoid errors in configuration parsing caused by that | ||
1442 | locale's unique handling of the letters 'i' and 'I' (LP: #1638338). | ||
1443 | - contrib: Add a gnome-ssh-askpass3 with GTK+3 support. | ||
1444 | - sshd(8): Improve PRNG reseeding across privilege separation and force | ||
1445 | libcrypto to obtain a high-quality seed before chroot or sandboxing. | ||
1446 | * Apply "wrap-and-sort -at -f debian/control -f debian/tests/control". | ||
1447 | * Remove entries related to protocol 1 from the default sshd_config | ||
1448 | generated on new installations. | ||
1449 | * Remove some advice related to protocol 1 from README.Debian. | ||
1450 | * Start handling /etc/ssh/sshd_config using ucf. The immediate motivation | ||
1451 | for this is to deal with deprecations of options related to protocol 1, | ||
1452 | but something like this has been needed for a long time (closes: | ||
1453 | #419574, #848089): | ||
1454 | - sshd_config is now a slightly-patched version of upstream's, and only | ||
1455 | contains non-default settings (closes: #147201). | ||
1456 | - I've included as many historical md5sums of default versions of | ||
1457 | sshd_config as I could reconstruct from version control, but I'm sure | ||
1458 | I've missed some. | ||
1459 | - Explicitly synchronise the debconf database with the current | ||
1460 | configuration file state in openssh-server.config, to ensure that the | ||
1461 | PermitRootLogin setting is properly preserved. | ||
1462 | - UsePrivilegeSeparation now defaults to the stronger "sandbox" rather | ||
1463 | than "yes", per upstream. | ||
1464 | * Remove redundant "GSSAPIDelegateCredentials no" from ssh_config (already | ||
1465 | the upstream default), and document that setting ServerAliveInterval to | ||
1466 | 300 by default if BatchMode is set is Debian-specific (closes: #765630). | ||
1467 | * Build gnome-ssh-askpass with GTK+ 3 (LP: #801187). | ||
1468 | * When running regression tests under autopkgtest, use a non-root user | ||
1469 | with passwordless sudo. | ||
1470 | |||
1471 | -- Colin Watson <cjwatson@debian.org> Tue, 27 Dec 2016 18:01:46 +0000 | ||
1472 | |||
1473 | openssh (1:7.3p1-5) unstable; urgency=medium | ||
1474 | |||
1475 | * debian/tests/control: Add dependency on openssl, required by the PuTTY | ||
1476 | interoperability tests. | ||
1477 | |||
1478 | -- Colin Watson <cjwatson@debian.org> Sat, 03 Dec 2016 03:43:21 +0000 | ||
1479 | |||
1480 | openssh (1:7.3p1-4) unstable; urgency=medium | ||
1481 | |||
1482 | * Adjust Build-Depends further to avoid considering libssl-dev >= 1.1.0~ | ||
1483 | as sufficient. | ||
1484 | * Move build directories under debian/. | ||
1485 | * Remove the non-upstream .gitignore file and add the relevant entries to | ||
1486 | debian/.gitignore, in order to make the source tree more | ||
1487 | dgit-compatible. | ||
1488 | * Build all upstream regression test binaries using the new | ||
1489 | "regress-binaries" target. | ||
1490 | * Fix and enable PuTTY interoperability tests under autopkgtest. | ||
1491 | |||
1492 | -- Colin Watson <cjwatson@debian.org> Fri, 02 Dec 2016 20:49:30 +0000 | ||
1493 | |||
1494 | openssh (1:7.3p1-3) unstable; urgency=medium | ||
1495 | |||
1496 | * Avoid building with OpenSSL 1.1 for now (see #828475). | ||
1497 | * Add a missing License line to debian/copyright. | ||
1498 | * Policy version 3.9.8: no changes required. | ||
1499 | |||
1500 | -- Colin Watson <cjwatson@debian.org> Sat, 05 Nov 2016 15:37:15 +0000 | ||
1501 | |||
1502 | openssh (1:7.3p1-2) unstable; urgency=high | ||
1503 | |||
1504 | * Rewrite debian/copyright using copyright-format 1.0. | ||
1505 | * CVE-2016-8858: Unregister the KEXINIT handler after message has been | ||
1506 | received (closes: #841884). | ||
1507 | |||
1508 | -- Colin Watson <cjwatson@debian.org> Mon, 24 Oct 2016 11:18:00 +0100 | ||
1509 | |||
1510 | openssh (1:7.3p1-1) unstable; urgency=medium | ||
1511 | |||
1512 | * New upstream release (http://www.openssh.com/txt/release-7.3): | ||
1513 | - SECURITY: sshd(8): Mitigate a potential denial-of-service attack | ||
1514 | against the system's crypt(3) function via sshd(8). An attacker could | ||
1515 | send very long passwords that would cause excessive CPU use in | ||
1516 | crypt(3). sshd(8) now refuses to accept password authentication | ||
1517 | requests of length greater than 1024 characters. | ||
1518 | - SECURITY: ssh(1), sshd(8): Fix observable timing weakness in the CBC | ||
1519 | padding oracle countermeasures. Note that CBC ciphers are disabled by | ||
1520 | default and only included for legacy compatibility. | ||
1521 | - SECURITY: ssh(1), sshd(8): Improve operation ordering of MAC | ||
1522 | verification for Encrypt-then-MAC (EtM) mode transport MAC algorithms | ||
1523 | to verify the MAC before decrypting any ciphertext. This removes the | ||
1524 | possibility of timing differences leaking facts about the plaintext, | ||
1525 | though no such leakage has been observed. | ||
1526 | - ssh(1): Add a ProxyJump option and corresponding -J command-line flag | ||
1527 | to allow simplified indirection through a one or more SSH bastions or | ||
1528 | "jump hosts". | ||
1529 | - ssh(1): Add an IdentityAgent option to allow specifying specific agent | ||
1530 | sockets instead of accepting one from the environment. | ||
1531 | - ssh(1): Allow ExitOnForwardFailure and ClearAllForwardings to be | ||
1532 | optionally overridden when using ssh -W. | ||
1533 | - ssh(1), sshd(8): Implement support for the IUTF8 terminal mode as per | ||
1534 | draft-sgtatham-secsh-iutf8-00 (closes: #337041, LP: #394570). | ||
1535 | - ssh(1), sshd(8): Add support for additional fixed Diffie-Hellman 2K, | ||
1536 | 4K and 8K groups from draft-ietf-curdle-ssh-kex-sha2-03. | ||
1537 | - ssh-keygen(1), ssh(1), sshd(8): Support SHA256 and SHA512 RSA | ||
1538 | signatures in certificates. | ||
1539 | - ssh(1): Add an Include directive for ssh_config(5) files (closes: | ||
1540 | #536031). | ||
1541 | - ssh(1): Permit UTF-8 characters in pre-authentication banners sent | ||
1542 | from the server. | ||
1543 | - ssh(1), sshd(8): Reduce the syslog level of some relatively common | ||
1544 | protocol events from LOG_CRIT. | ||
1545 | - sshd(8): Refuse AuthenticationMethods="" in configurations and accept | ||
1546 | AuthenticationMethods=any for the default behaviour of not requiring | ||
1547 | multiple authentication. | ||
1548 | - sshd(8): Remove obsolete and misleading "POSSIBLE BREAK-IN ATTEMPT!" | ||
1549 | message when forward and reverse DNS don't match. | ||
1550 | - ssh(1): Deduplicate LocalForward and RemoteForward entries to fix | ||
1551 | failures when both ExitOnForwardFailure and hostname canonicalisation | ||
1552 | are enabled. | ||
1553 | - sshd(8): Remove fallback from moduli to obsolete "primes" file that | ||
1554 | was deprecated in 2001 (LP: #1528251). | ||
1555 | - sshd_config(5): Correct description of UseDNS: it affects ssh hostname | ||
1556 | processing for authorized_keys, not known_hosts. | ||
1557 | - sshd(8): Send ClientAliveInterval pings when a time-based RekeyLimit | ||
1558 | is set; previously keepalive packets were not being sent. | ||
1559 | - sshd(8): Whitelist more architectures to enable the seccomp-bpf | ||
1560 | sandbox. | ||
1561 | - scp(1): Respect the local user's LC_CTYPE locale (closes: #396295). | ||
1562 | - Take character display widths into account for the progressmeter | ||
1563 | (closes: #407088). | ||
1564 | |||
1565 | -- Colin Watson <cjwatson@debian.org> Sun, 07 Aug 2016 22:45:26 +0100 | ||
1566 | |||
1567 | openssh (1:7.2p2-8) unstable; urgency=medium | ||
1568 | |||
1569 | [ Colin Watson ] | ||
1570 | * Stop enabling ssh-session-cleanup.service by default; instead, ship it | ||
1571 | as an example and add a section to README.Debian. libpam-systemd >= 230 | ||
1572 | and "UsePAM yes" should take care of the original problem for most | ||
1573 | systemd users (thanks, Michael Biebl; closes: #832155). | ||
1574 | |||
1575 | [ Martin Pitt ] | ||
1576 | * Add debian/agent-launch: Helper script for conditionally starting the SSH | ||
1577 | agent in the user session. Use it in ssh-agent.user-session.upstart. | ||
1578 | * Add systemd user unit for graphical sessions that use systemd. Override | ||
1579 | the corresponding upstart job in that case (closes: #832445). | ||
1580 | * debian/openssh-server.if-up: Don't block on a finished reload of | ||
1581 | openssh.service, to avoid deadlocking with restarting networking. | ||
1582 | (closes: #832557, LP: #1584393) | ||
1583 | |||
1584 | -- Colin Watson <cjwatson@debian.org> Fri, 29 Jul 2016 02:51:32 +0100 | ||
1585 | |||
1586 | openssh (1:7.2p2-7) unstable; urgency=medium | ||
1587 | |||
1588 | * Don't stop the ssh-session-cleanup service on upgrade (closes: #832155). | ||
1589 | This may cause SSH sessions to be killed on upgrade to *this* version if | ||
1590 | you had previously installed 1:7.2p2-6. Sorry! If your session is | ||
1591 | killed, you can recover using "dpkg --unpack" on this openssh-server | ||
1592 | .deb, followed by "dpkg --configure -a". | ||
1593 | * Recommend libpam-systemd from openssh-server. It's a much better | ||
1594 | solution than the above for systemd users, but I'm wary of depending on | ||
1595 | it in case I cause an assortment of exciting dependency problems on | ||
1596 | upgrade for non-systemd users. | ||
1597 | |||
1598 | -- Colin Watson <cjwatson@debian.org> Sat, 23 Jul 2016 11:46:33 +0100 | ||
1599 | |||
1600 | openssh (1:7.2p2-6) unstable; urgency=medium | ||
1601 | |||
1602 | * debian/watch: Switch to HTTP (thanks, Nicholas Luedtke; closes: | ||
1603 | #822997). | ||
1604 | * Copy summary of supported SFTP protocol versions from upstream's | ||
1605 | PROTOCOL file into the openssh-sftp-server package description (closes: | ||
1606 | #766887). | ||
1607 | * Set SSH_PROGRAM=/usr/bin/ssh1 when building openssh-client-ssh1 so that | ||
1608 | scp1 works (reported by Olivier MATZ). | ||
1609 | * Retroactively add a NEWS.Debian entry for the UseDNS change in 6.9 (see | ||
1610 | LP #1588457). | ||
1611 | * CVE-2016-6210: Mitigate user enumeration via covert timing channel | ||
1612 | (closes: #831902). | ||
1613 | * Backport upstream patch to close ControlPersist background process | ||
1614 | stderr when not in debug mode or when logging to a file or syslog | ||
1615 | (closes: #714526). | ||
1616 | * Add a session cleanup script and a systemd unit file to trigger it, | ||
1617 | which serves to terminate SSH sessions cleanly if systemd doesn't do | ||
1618 | that itself, often because libpam-systemd is not installed (thanks, | ||
1619 | Vivek Das Mohapatra, Tom Hutter, and others; closes: #751636). | ||
1620 | * Stop generating DSA host keys by default (thanks, Santiago Vila; closes: | ||
1621 | #823827). | ||
1622 | |||
1623 | -- Colin Watson <cjwatson@debian.org> Fri, 22 Jul 2016 17:06:19 +0100 | ||
1624 | |||
1625 | openssh (1:7.2p2-5) unstable; urgency=medium | ||
1626 | |||
1627 | * Backport upstream patch to unbreak authentication using lone certificate | ||
1628 | keys in ssh-agent: when attempting pubkey auth with a certificate, if no | ||
1629 | separate private key is found among the keys then try with the | ||
1630 | certificate key itself (thanks, Paul Querna; LP: #1575961). | ||
1631 | |||
1632 | -- Colin Watson <cjwatson@debian.org> Thu, 28 Apr 2016 01:52:01 +0100 | ||
1633 | |||
1634 | openssh (1:7.2p2-4) unstable; urgency=medium | ||
1635 | |||
1636 | * Drop dependency on libnss-files-udeb (closes: #819686). | ||
1637 | * Policy version 3.9.7: no changes required. | ||
1638 | |||
1639 | -- Colin Watson <cjwatson@debian.org> Fri, 15 Apr 2016 16:40:07 +0100 | ||
1640 | |||
1641 | openssh (1:7.2p2-3) unstable; urgency=high | ||
1642 | |||
1643 | * Change all openssh.org references to openssh.com (closes: #819213). | ||
1644 | * CVE-2015-8325: Ignore PAM environment vars when UseLogin=yes. | ||
1645 | |||
1646 | -- Colin Watson <cjwatson@debian.org> Wed, 13 Apr 2016 16:42:28 +0100 | ||
1647 | |||
1648 | openssh (1:7.2p2-2) unstable; urgency=medium | ||
1649 | |||
1650 | * Fix kexgss_server to cope with DH_GRP_MIN/DH_GRP_MAX being stricter on | ||
1651 | the server end than the client (thanks, Damien Miller; closes: #817870, | ||
1652 | LP: #1558576). | ||
1653 | |||
1654 | -- Colin Watson <cjwatson@debian.org> Mon, 21 Mar 2016 12:08:55 +0000 | ||
1655 | |||
1656 | openssh (1:7.2p2-1) unstable; urgency=high | ||
1657 | |||
1658 | * New upstream release (http://www.openssh.com/txt/release-7.2p2): | ||
1659 | - CVE-2016-3115: sshd(8): Sanitise X11 authentication credentials to | ||
1660 | avoid xauth command injection when X11Forwarding is enabled | ||
1661 | (http://www.openssh.com/txt/x11fwd.adv). | ||
1662 | |||
1663 | -- Colin Watson <cjwatson@debian.org> Thu, 10 Mar 2016 13:04:29 +0000 | ||
1664 | |||
1665 | openssh (1:7.2p1-1) unstable; urgency=medium | ||
1666 | |||
1667 | * New upstream release (http://www.openssh.com/txt/release-7.2): | ||
1668 | - This release disables a number of legacy cryptographic algorithms by | ||
1669 | default in ssh: | ||
1670 | + Several ciphers blowfish-cbc, cast128-cbc, all arcfour variants and | ||
1671 | the rijndael-cbc aliases for AES. | ||
1672 | + MD5-based and truncated HMAC algorithms. | ||
1673 | These algorithms are already disabled by default in sshd. | ||
1674 | - ssh(1), sshd(8): Remove unfinished and unused roaming code (was | ||
1675 | already forcibly disabled in OpenSSH 7.1p2). | ||
1676 | - ssh(1): Eliminate fallback from untrusted X11 forwarding to trusted | ||
1677 | forwarding when the X server disables the SECURITY extension. | ||
1678 | - ssh(1), sshd(8): Increase the minimum modulus size supported for | ||
1679 | diffie-hellman-group-exchange to 2048 bits. | ||
1680 | - sshd(8): Pre-auth sandboxing is now enabled by default (previous | ||
1681 | releases enabled it for new installations via sshd_config). | ||
1682 | - all: Add support for RSA signatures using SHA-256/512 hash algorithms | ||
1683 | based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt. | ||
1684 | - ssh(1): Add an AddKeysToAgent client option which can be set to 'yes', | ||
1685 | 'no', 'ask', or 'confirm', and defaults to 'no'. When enabled, a | ||
1686 | private key that is used during authentication will be added to | ||
1687 | ssh-agent if it is running (with confirmation enabled if set to | ||
1688 | 'confirm'). | ||
1689 | - sshd(8): Add a new authorized_keys option "restrict" that includes all | ||
1690 | current and future key restrictions (no-*-forwarding, etc.). Also add | ||
1691 | permissive versions of the existing restrictions, e.g. "no-pty" -> | ||
1692 | "pty". This simplifies the task of setting up restricted keys and | ||
1693 | ensures they are maximally-restricted, regardless of any permissions | ||
1694 | we might implement in the future. | ||
1695 | - ssh(1): Add ssh_config CertificateFile option to explicitly list | ||
1696 | certificates. | ||
1697 | - ssh-keygen(1): Allow ssh-keygen to change the key comment for all | ||
1698 | supported formats (closes: #811125). | ||
1699 | - ssh-keygen(1): Allow fingerprinting from standard input, e.g. | ||
1700 | "ssh-keygen -lf -" (closes: #509058). | ||
1701 | - ssh-keygen(1): Allow fingerprinting multiple public keys in a file, | ||
1702 | e.g. "ssh-keygen -lf ~/.ssh/authorized_keys". | ||
1703 | - sshd(8): Support "none" as an argument for sshd_config Foreground and | ||
1704 | ChrootDirectory. Useful inside Match blocks to override a global | ||
1705 | default. | ||
1706 | - ssh-keygen(1): Support multiple certificates (one per line) and | ||
1707 | reading from standard input (using "-f -") for "ssh-keygen -L" | ||
1708 | - ssh-keyscan(1): Add "ssh-keyscan -c ..." flag to allow fetching | ||
1709 | certificates instead of plain keys. | ||
1710 | - ssh(1): Better handle anchored FQDNs (e.g. 'cvs.openbsd.org.') in | ||
1711 | hostname canonicalisation - treat them as already canonical and remove | ||
1712 | the trailing '.' before matching ssh_config. | ||
1713 | - sftp(1): Existing destination directories should not terminate | ||
1714 | recursive uploads (regression in OpenSSH 6.8; LP: #1553378). | ||
1715 | * Use HTTPS for Vcs-* URLs, and link to cgit rather than gitweb. | ||
1716 | * Restore slogin symlinks for compatibility, although they were removed | ||
1717 | upstream. | ||
1718 | |||
1719 | -- Colin Watson <cjwatson@debian.org> Tue, 08 Mar 2016 11:47:20 +0000 | ||
1720 | |||
1721 | openssh (1:7.1p2-2) unstable; urgency=medium | ||
1722 | |||
1723 | * Remove protocol 1 host key generation from openssh-server.postinst | ||
1724 | (closes: #811265). | ||
1725 | |||
1726 | -- Colin Watson <cjwatson@debian.org> Sun, 17 Jan 2016 14:10:19 +0000 | ||
1727 | |||
1728 | openssh (1:7.1p2-1) unstable; urgency=high | ||
1729 | |||
1730 | * New upstream release (http://www.openssh.com/txt/release-7.1p2): | ||
1731 | - CVE-2016-0777, CVE-2016-0778: Disable experimental client-side support | ||
1732 | for roaming, which could be tricked by a malicious server into leaking | ||
1733 | client memory to the server, including private client user keys; this | ||
1734 | information leak is restricted to connections to malicious or | ||
1735 | compromised servers (closes: #810984). | ||
1736 | - SECURITY: Fix an out of-bound read access in the packet handling code. | ||
1737 | Reported by Ben Hawkes. | ||
1738 | - Further use of explicit_bzero has been added in various buffer | ||
1739 | handling code paths to guard against compilers aggressively doing | ||
1740 | dead-store removal. | ||
1741 | |||
1742 | -- Colin Watson <cjwatson@debian.org> Thu, 14 Jan 2016 15:28:03 +0000 | ||
1743 | |||
1744 | openssh (1:7.1p1-6) unstable; urgency=medium | ||
1745 | |||
1746 | [ Colin Watson ] | ||
1747 | * Remove explicit "XS-Testsuite: autopkgtest" from debian/control; | ||
1748 | dpkg-source now figures that out automatically based on the existence of | ||
1749 | debian/tests/control. | ||
1750 | * Allow authenticating as root using gssapi-keyex even with | ||
1751 | "PermitRootLogin prohibit-password" (closes: #809695). | ||
1752 | * Shuffle PROPOSAL_KEX_ALGS mangling for GSSAPI key exchange a little | ||
1753 | later in ssh_kex2 so that it's actually effective (closes: #809696). | ||
1754 | |||
1755 | [ Michael Biebl ] | ||
1756 | * Don't call sd_notify when sshd is re-execed (closes: #809035). | ||
1757 | |||
1758 | -- Colin Watson <cjwatson@debian.org> Mon, 04 Jan 2016 15:09:10 +0000 | ||
1759 | |||
1760 | openssh (1:7.1p1-5) unstable; urgency=medium | ||
1761 | |||
1762 | [ Michael Biebl ] | ||
1763 | * Add systemd readiness notification support (closes: #778913). | ||
1764 | |||
1765 | -- Colin Watson <cjwatson@debian.org> Mon, 21 Dec 2015 22:10:07 +0000 | ||
1766 | |||
1767 | openssh (1:7.1p1-4) unstable; urgency=medium | ||
1768 | |||
1769 | * Backport upstream patch to unbreak connections with peers that set | ||
1770 | first_kex_follows (LP: #1526357). | ||
1771 | |||
1772 | -- Colin Watson <cjwatson@debian.org> Tue, 15 Dec 2015 15:40:18 +0000 | ||
1773 | |||
1774 | openssh (1:7.1p1-3) unstable; urgency=medium | ||
1775 | |||
1776 | * Drop priority of openssh-client-ssh1 to extra (closes: #807518). | ||
1777 | * Redirect regression test input from /dev/zero, since otherwise conch | ||
1778 | will immediately send EOF. | ||
1779 | |||
1780 | -- Colin Watson <cjwatson@debian.org> Thu, 10 Dec 2015 15:12:10 +0000 | ||
1781 | |||
1782 | openssh (1:7.1p1-2) unstable; urgency=medium | ||
1783 | |||
1784 | * Really enable conch interoperability tests under autopkgtest. | ||
1785 | * Drop SSH1 keepalive patch. Now that SSH1 is disabled at compile-time, | ||
1786 | it's been rejected upstream and there isn't much point carrying it any | ||
1787 | more. | ||
1788 | * Add NEWS.Debian documenting cryptographic changes in OpenSSH 7.0 | ||
1789 | (closes: #806962). | ||
1790 | * Add an openssh-client-ssh1 binary package for people who need to connect | ||
1791 | to outdated SSH1-only servers (closes: #807107). | ||
1792 | * Update "Subsystem sftp" path in example sshd_config (closes: #691004, | ||
1793 | LP: #1437005). | ||
1794 | |||
1795 | -- Colin Watson <cjwatson@debian.org> Tue, 08 Dec 2015 15:33:08 +0000 | ||
1796 | |||
1797 | openssh (1:7.1p1-1) unstable; urgency=medium | ||
1798 | |||
1799 | * New upstream release (http://www.openssh.com/txt/release-7.0, closes: | ||
1800 | #785190): | ||
1801 | - Support for the legacy SSH version 1 protocol is disabled by default | ||
1802 | at compile time. | ||
1803 | - Support for the 1024-bit diffie-hellman-group1-sha1 key exchange is | ||
1804 | disabled by default at run-time. It may be re-enabled using the | ||
1805 | instructions at http://www.openssh.com/legacy.html | ||
1806 | - Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled by | ||
1807 | default at run-time. These may be re-enabled using the instructions | ||
1808 | at http://www.openssh.com/legacy.html | ||
1809 | - Support for the legacy v00 cert format has been removed. | ||
1810 | - The default for the sshd_config(5) PermitRootLogin option has changed | ||
1811 | from "yes" to "prohibit-password". | ||
1812 | - PermitRootLogin=without-password/prohibit-password now bans all | ||
1813 | interactive authentication methods, allowing only public-key, | ||
1814 | hostbased and GSSAPI authentication (previously it permitted | ||
1815 | keyboard-interactive and password-less authentication if those were | ||
1816 | enabled). | ||
1817 | - ssh_config(5): Add PubkeyAcceptedKeyTypes option to control which | ||
1818 | public key types are available for user authentication. | ||
1819 | - sshd_config(5): Add HostKeyAlgorithms option to control which public | ||
1820 | key types are offered for host authentications. | ||
1821 | - ssh(1), sshd(8): Extend Ciphers, MACs, KexAlgorithms, | ||
1822 | HostKeyAlgorithms, PubkeyAcceptedKeyTypes and HostbasedKeyTypes | ||
1823 | options to allow appending to the default set of algorithms instead of | ||
1824 | replacing it. Options may now be prefixed with a '+' to append to the | ||
1825 | default, e.g. "HostKeyAlgorithms=+ssh-dss". | ||
1826 | - sshd_config(5): PermitRootLogin now accepts an argument of | ||
1827 | 'prohibit-password' as a less-ambiguous synonym of 'without- | ||
1828 | password'. | ||
1829 | - ssh(1), sshd(8): Add compatability workarounds for Cisco and more | ||
1830 | PuTTY versions. | ||
1831 | - Fix some omissions and errors in the PROTOCOL and PROTOCOL.mux | ||
1832 | documentation relating to Unix domain socket forwarding. | ||
1833 | - ssh(1): Improve the ssh(1) manual page to include a better description | ||
1834 | of Unix domain socket forwarding (closes: #779068). | ||
1835 | - ssh(1), ssh-agent(1): Skip uninitialised PKCS#11 slots, fixing | ||
1836 | failures to load keys when they are present. | ||
1837 | - ssh(1), ssh-agent(1): Do not ignore PKCS#11 hosted keys that wth empty | ||
1838 | CKA_ID. | ||
1839 | - sshd(8): Clarify documentation for UseDNS option. | ||
1840 | - Check realpath(3) behaviour matches what sftp-server requires and use | ||
1841 | a replacement if necessary. | ||
1842 | * New upstream release (http://www.openssh.com/txt/release-7.1): | ||
1843 | - sshd(8): OpenSSH 7.0 contained a logic error in PermitRootLogin= | ||
1844 | prohibit-password/without-password that could, depending on | ||
1845 | compile-time configuration, permit password authentication to root | ||
1846 | while preventing other forms of authentication. This problem was | ||
1847 | reported by Mantas Mikulenas. | ||
1848 | - ssh(1), sshd(8): Add compatibility workarounds for FuTTY. | ||
1849 | - ssh(1), sshd(8): Refine compatibility workarounds for WinSCP. | ||
1850 | - Fix a number of memory faults (double-free, free of uninitialised | ||
1851 | memory, etc) in ssh(1) and ssh-keygen(1). Reported by Mateusz | ||
1852 | Kocielski. | ||
1853 | * Change "PermitRootLogin without-password" to the new preferred spelling | ||
1854 | of "PermitRootLogin prohibit-password" in sshd_config, and update | ||
1855 | documentation to reflect the new upstream default. | ||
1856 | * Enable conch interoperability tests under autopkgtest. | ||
1857 | |||
1858 | -- Colin Watson <cjwatson@debian.org> Wed, 02 Dec 2015 20:18:35 +0000 | ||
1859 | |||
1860 | openssh (1:6.9p1-3) unstable; urgency=medium | ||
1861 | |||
1862 | * ssh_config(5): Fix markup errors in description of GSSAPITrustDns | ||
1863 | (closes: #799271). | ||
1864 | * Fix dh_install and dh_fixperms overrides to work properly with an | ||
1865 | architecture-independent-only build (closes: #806090). | ||
1866 | * Do much less work in architecture-independent-only builds. | ||
1867 | * Drop ConsoleKit session registration patch; it was only ever enabled for | ||
1868 | Ubuntu, which no longer needs it (LP: #1334916, #1502045). | ||
1869 | |||
1870 | -- Colin Watson <cjwatson@debian.org> Tue, 24 Nov 2015 22:48:53 +0000 | ||
1871 | |||
1872 | openssh (1:6.9p1-2) unstable; urgency=medium | ||
1873 | |||
1874 | [ Colin Watson ] | ||
1875 | * mention-ssh-keygen-on-keychange.patch: Move example ssh-keygen | ||
1876 | invocation onto a separate line to make it easier to copy and paste | ||
1877 | (LP: #1491532). | ||
1878 | |||
1879 | [ Tyler Hicks ] | ||
1880 | * Build with audit support on Linux (closes: #797727, LP: #1478087). | ||
1881 | |||
1882 | -- Colin Watson <cjwatson@debian.org> Thu, 10 Sep 2015 12:26:11 +0100 | ||
1883 | |||
1884 | openssh (1:6.9p1-1) unstable; urgency=medium | ||
1885 | |||
1886 | * New upstream release (http://www.openssh.com/txt/release-6.8): | ||
1887 | - sshd(8): UseDNS now defaults to 'no'. Configurations that match | ||
1888 | against the client host name (via sshd_config or authorized_keys) may | ||
1889 | need to re-enable it or convert to matching against addresses. | ||
1890 | - Add FingerprintHash option to ssh(1) and sshd(8), and equivalent | ||
1891 | command-line flags to the other tools to control algorithm used for | ||
1892 | key fingerprints. The default changes from MD5 to SHA256 and format | ||
1893 | from hex to base64. | ||
1894 | Fingerprints now have the hash algorithm prepended. An example of the | ||
1895 | new format: SHA256:mVPwvezndPv/ARoIadVY98vAC0g+P/5633yTC4d/wXE | ||
1896 | Please note that visual host keys will also be different. | ||
1897 | - ssh(1), sshd(8): Experimental host key rotation support. Add a | ||
1898 | protocol extension for a server to inform a client of all its | ||
1899 | available host keys after authentication has completed. The client | ||
1900 | may record the keys in known_hosts, allowing it to upgrade to better | ||
1901 | host key algorithms and a server to gracefully rotate its keys. | ||
1902 | The client side of this is controlled by a UpdateHostkeys config | ||
1903 | option (default off). | ||
1904 | - ssh(1): Add a ssh_config HostbasedKeyType option to control which host | ||
1905 | public key types are tried during host-based authentication. | ||
1906 | - ssh(1), sshd(8): Fix connection-killing host key mismatch errors when | ||
1907 | sshd offers multiple ECDSA keys of different lengths. | ||
1908 | - ssh(1): When host name canonicalisation is enabled, try to parse host | ||
1909 | names as addresses before looking them up for canonicalisation. Fixes | ||
1910 | bz#2074 and avoids needless DNS lookups in some cases. | ||
1911 | - ssh(1), ssh-keysign(8): Make ed25519 keys work for host based | ||
1912 | authentication. | ||
1913 | - sshd(8): SSH protocol v.1 workaround for the Meyer, et al, | ||
1914 | Bleichenbacher Side Channel Attack. Fake up a bignum key before RSA | ||
1915 | decryption. | ||
1916 | - sshd(8): Remember which public keys have been used for authentication | ||
1917 | and refuse to accept previously-used keys. This allows | ||
1918 | AuthenticationMethods=publickey,publickey to require that users | ||
1919 | authenticate using two _different_ public keys. | ||
1920 | - sshd(8): add sshd_config HostbasedAcceptedKeyTypes and | ||
1921 | PubkeyAcceptedKeyTypes options to allow sshd to control what public | ||
1922 | key types will be accepted (closes: #481133). Currently defaults to | ||
1923 | all. | ||
1924 | - sshd(8): Don't count partial authentication success as a failure | ||
1925 | against MaxAuthTries. | ||
1926 | - ssh(1): Add RevokedHostKeys option for the client to allow text-file | ||
1927 | or KRL-based revocation of host keys. | ||
1928 | - ssh-keygen(1), sshd(8): Permit KRLs that revoke certificates by serial | ||
1929 | number or key ID without scoping to a particular CA. | ||
1930 | - ssh(1): Add a "Match canonical" criteria that allows ssh_config Match | ||
1931 | blocks to trigger only in the second config pass. | ||
1932 | - ssh(1): Add a -G option to ssh that causes it to parse its | ||
1933 | configuration and dump the result to stdout, similar to "sshd -T". | ||
1934 | - ssh(1): Allow Match criteria to be negated. E.g. "Match !host". | ||
1935 | - ssh-keyscan(1): ssh-keyscan has been made much more robust against | ||
1936 | servers that hang or violate the SSH protocol (closes: #241119). | ||
1937 | - ssh(1), ssh-keygen(1): Fix regression bz#2306: Key path names were | ||
1938 | being lost as comment fields (closes: #787776). | ||
1939 | - ssh(1): Allow ssh_config Port options set in the second config parse | ||
1940 | phase to be applied (they were being ignored; closes: #774369). | ||
1941 | - ssh(1): Tweak config re-parsing with host canonicalisation - make the | ||
1942 | second pass through the config files always run when host name | ||
1943 | canonicalisation is enabled (and not whenever the host name changes) | ||
1944 | - ssh(1): Fix passing of wildcard forward bind addresses when connection | ||
1945 | multiplexing is in use. | ||
1946 | - ssh-keygen(1): Fix broken private key conversion from non-OpenSSH | ||
1947 | formats. | ||
1948 | - ssh-keygen(1): Fix KRL generation bug when multiple CAs are in use. | ||
1949 | * New upstream release (http://www.openssh.com/txt/release-6.9): | ||
1950 | - CVE-2015-5352: ssh(1): When forwarding X11 connections with | ||
1951 | ForwardX11Trusted=no, connections made after ForwardX11Timeout expired | ||
1952 | could be permitted and no longer subject to XSECURITY restrictions | ||
1953 | because of an ineffective timeout check in ssh(1) coupled with "fail | ||
1954 | open" behaviour in the X11 server when clients attempted connections | ||
1955 | with expired credentials (closes: #790798). This problem was reported | ||
1956 | by Jann Horn. | ||
1957 | - SECURITY: ssh-agent(1): Fix weakness of agent locking (ssh-add -x) to | ||
1958 | password guessing by implementing an increasing failure delay, storing | ||
1959 | a salted hash of the password rather than the password itself and | ||
1960 | using a timing-safe comparison function for verifying unlock attempts. | ||
1961 | This problem was reported by Ryan Castellucci. | ||
1962 | - sshd(8): Support admin-specified arguments to AuthorizedKeysCommand | ||
1963 | (closes: #740494). | ||
1964 | - sshd(8): Add AuthorizedPrincipalsCommand that allows retrieving | ||
1965 | authorized principals information from a subprocess rather than a | ||
1966 | file. | ||
1967 | - ssh(1), ssh-add(1): Support PKCS#11 devices with external PIN entry | ||
1968 | devices. | ||
1969 | - ssh-keygen(1): Support "ssh-keygen -lF hostname" to search known_hosts | ||
1970 | and print key hashes rather than full keys. | ||
1971 | - ssh-agent(1): Add -D flag to leave ssh-agent in foreground without | ||
1972 | enabling debug mode. | ||
1973 | - ssh(1), sshd(8): Deprecate legacy SSH2_MSG_KEX_DH_GEX_REQUEST_OLD | ||
1974 | message and do not try to use it against some 3rd-party SSH | ||
1975 | implementations that use it (older PuTTY, WinSCP). | ||
1976 | - ssh(1), sshd(8): Cap DH-GEX group size at 4Kbits for Cisco | ||
1977 | implementations as some would fail when attempting to use group sizes | ||
1978 | >4K (closes: #740307, LP: #1287222). | ||
1979 | - ssh(1): Fix out-of-bound read in EscapeChar configuration option | ||
1980 | parsing. | ||
1981 | - sshd(8): Fix application of PermitTunnel, LoginGraceTime, | ||
1982 | AuthenticationMethods and StreamLocalBindMask options in Match blocks. | ||
1983 | - ssh(1), sshd(8): Improve disconnection message on TCP reset. | ||
1984 | - ssh(1): Remove failed remote forwards established by multiplexing from | ||
1985 | the list of active forwards. | ||
1986 | - sshd(8): Make parsing of authorized_keys "environment=" options | ||
1987 | independent of PermitUserEnv being enabled. | ||
1988 | - sshd(8): Fix post-auth crash with permitopen=none (closes: #778807). | ||
1989 | - ssh(1), ssh-add(1), ssh-keygen(1): Allow new-format private keys to be | ||
1990 | encrypted with AEAD ciphers. | ||
1991 | - ssh(1): Allow ListenAddress, Port and AddressFamily configuration | ||
1992 | options to appear in any order. | ||
1993 | - sshd(8): Check for and reject missing arguments for VersionAddendum | ||
1994 | and ForceCommand. | ||
1995 | - ssh(1), sshd(8): Don't treat unknown certificate extensions as fatal. | ||
1996 | - ssh-keygen(1): Make stdout and stderr output consistent. | ||
1997 | - ssh(1): Mention missing DISPLAY environment in debug log when X11 | ||
1998 | forwarding requested. | ||
1999 | - sshd(8): Correctly record login when UseLogin is set. | ||
2000 | - sshd(8): Add some missing options to sshd -T output and fix output of | ||
2001 | VersionAddendum and HostCertificate. | ||
2002 | - Document and improve consistency of options that accept a "none" | ||
2003 | argument: TrustedUserCAKeys, RevokedKeys, AuthorizedPrincipalsFile. | ||
2004 | - ssh(1): Include remote username in debug output. | ||
2005 | - sshd(8): Avoid compatibility problem with some versions of Tera Term, | ||
2006 | which would crash when they received the hostkeys notification message | ||
2007 | (hostkeys-00@openssh.com). | ||
2008 | - sshd(8): Mention ssh-keygen -E as useful when comparing legacy MD5 | ||
2009 | host key fingerprints. | ||
2010 | - ssh(1): Clarify pseudo-terminal request behaviour and make manual | ||
2011 | language consistent. | ||
2012 | - ssh(1): Document that the TERM environment variable is not subject to | ||
2013 | SendEnv and AcceptEnv; bz#2386 | ||
2014 | - sshd(8): Format UsePAM setting when using sshd -T (closes: #767648). | ||
2015 | - moduli(5): Update DH-GEX moduli (closes: #787037). | ||
2016 | * There are some things I want to fix before upgrading to 7.0p1, though I | ||
2017 | intend to do that soon. In the meantime, backport some patches, mainly | ||
2018 | to fix security issues: | ||
2019 | - SECURITY: sshd(8): OpenSSH 6.8 and 6.9 incorrectly set TTYs to be | ||
2020 | world-writable. Local attackers may be able to write arbitrary | ||
2021 | messages to logged-in users, including terminal escape sequences. | ||
2022 | Reported by Nikolay Edigaryev. | ||
2023 | - SECURITY: sshd(8): Fixed a privilege separation weakness related to | ||
2024 | PAM support. Attackers who could successfully compromise the | ||
2025 | pre-authentication process for remote code execution and who had valid | ||
2026 | credentials on the host could impersonate other users. Reported by | ||
2027 | Moritz Jodeit. | ||
2028 | - SECURITY: sshd(8): Fixed a use-after-free bug related to PAM support | ||
2029 | that was reachable by attackers who could compromise the | ||
2030 | pre-authentication process for remote code execution (closes: | ||
2031 | #795711). Also reported by Moritz Jodeit. | ||
2032 | - CVE-2015-5600: sshd(8): Fix circumvention of MaxAuthTries using | ||
2033 | keyboard-interactive authentication (closes: #793616). By specifying | ||
2034 | a long, repeating keyboard-interactive "devices" string, an attacker | ||
2035 | could request the same authentication method be tried thousands of | ||
2036 | times in a single pass. The LoginGraceTime timeout in sshd(8) and any | ||
2037 | authentication failure delays implemented by the authentication | ||
2038 | mechanism itself were still applied. Found by Kingcope. | ||
2039 | - Let principals-command.sh work for noexec /var/run. | ||
2040 | * Thanks to Jakub Jelen of Red Hat for Fedora's rebased version of the | ||
2041 | GSSAPI key exchange patch. | ||
2042 | * Document the Debian-specific change to the default value of | ||
2043 | ForwardX11Trusted in ssh(1) (closes: #781469). | ||
2044 | |||
2045 | -- Colin Watson <cjwatson@debian.org> Thu, 20 Aug 2015 10:38:58 +0100 | ||
2046 | |||
2047 | openssh (1:6.7p1-6) unstable; urgency=medium | ||
2048 | |||
2049 | [ Martin Pitt ] | ||
2050 | * openssh-server.postinst: Quiesce "Unable to connect to Upstart" error | ||
2051 | message from initctl if upstart is installed, but not the current init | ||
2052 | system. (LP: #1440070) | ||
2053 | * openssh-server.postinst: Fix version comparisons of upgrade adjustments | ||
2054 | to not apply to fresh installs. | ||
2055 | |||
2056 | -- Colin Watson <cjwatson@debian.org> Sun, 19 Apr 2015 14:32:43 +0100 | ||
2057 | |||
2058 | openssh (1:6.7p1-5) unstable; urgency=medium | ||
2059 | |||
2060 | * Revert change from previous upload, which causes far more trouble than | ||
2061 | it is worth (closes: #780797): | ||
2062 | - Send/accept only specific known LC_* variables, rather than using a | ||
2063 | wildcard. | ||
2064 | * Add a NEWS.Debian entry documenting this reversion, as it is too | ||
2065 | difficult to undo the sshd_config change automatically without | ||
2066 | compounding the problem of (arguably) overwriting user configuration. | ||
2067 | |||
2068 | -- Colin Watson <cjwatson@debian.org> Sun, 22 Mar 2015 23:20:56 +0000 | ||
2069 | |||
2070 | openssh (1:6.7p1-4) unstable; urgency=medium | ||
2071 | |||
2072 | * Send/accept only specific known LC_* variables, rather than using a | ||
2073 | wildcard (closes: #765633). | ||
2074 | * Document interactions between ListenAddress/Port and ssh.socket in | ||
2075 | README.Debian (closes: #764842). | ||
2076 | * Debconf translations: | ||
2077 | - Brazilian Portuguese (thanks, José de Figueiredo; closes: #771859). | ||
2078 | |||
2079 | -- Colin Watson <cjwatson@debian.org> Wed, 18 Mar 2015 15:34:13 +0000 | ||
2080 | |||
2081 | openssh (1:6.7p1-3) unstable; urgency=medium | ||
2082 | |||
2083 | * Debconf translations: | ||
2084 | - Dutch (thanks, Frans Spiesschaert; closes: #765851). | ||
2085 | * Assume that dpkg-statoverride exists and drop the test for an obsolete | ||
2086 | compatibility path. | ||
2087 | |||
2088 | -- Colin Watson <cjwatson@debian.org> Mon, 03 Nov 2014 20:29:52 +0000 | ||
2089 | |||
2090 | openssh (1:6.7p1-2) unstable; urgency=medium | ||
2091 | |||
2092 | * debian/tests/control: Drop isolation-container, since the tests run on a | ||
2093 | high port. They're still not guaranteed to run correctly in an schroot, | ||
2094 | but may manage to work, so this lets the tests at least try to run on | ||
2095 | ci.debian.net. | ||
2096 | |||
2097 | -- Colin Watson <cjwatson@debian.org> Fri, 10 Oct 2014 10:47:19 +0100 | ||
2098 | |||
2099 | openssh (1:6.7p1-1) unstable; urgency=medium | ||
2100 | |||
2101 | * New upstream release (http://www.openssh.com/txt/release-6.7): | ||
2102 | - sshd(8): The default set of ciphers and MACs has been altered to | ||
2103 | remove unsafe algorithms. In particular, CBC ciphers and arcfour* are | ||
2104 | disabled by default. The full set of algorithms remains available if | ||
2105 | configured explicitly via the Ciphers and MACs sshd_config options. | ||
2106 | - ssh(1), sshd(8): Add support for Unix domain socket forwarding. A | ||
2107 | remote TCP port may be forwarded to a local Unix domain socket and | ||
2108 | vice versa or both ends may be a Unix domain socket (closes: #236718). | ||
2109 | - ssh(1), ssh-keygen(1): Add support for SSHFP DNS records for ED25519 | ||
2110 | key types. | ||
2111 | - sftp(1): Allow resumption of interrupted uploads. | ||
2112 | - ssh(1): When rekeying, skip file/DNS lookups of the hostkey if it is | ||
2113 | the same as the one sent during initial key exchange. | ||
2114 | - sshd(8): Allow explicit ::1 and 127.0.0.1 forwarding bind addresses | ||
2115 | when GatewayPorts=no; allows client to choose address family. | ||
2116 | - sshd(8): Add a sshd_config PermitUserRC option to control whether | ||
2117 | ~/.ssh/rc is executed, mirroring the no-user-rc authorized_keys | ||
2118 | option. | ||
2119 | - ssh(1): Add a %C escape sequence for LocalCommand and ControlPath that | ||
2120 | expands to a unique identifier based on a hash of the tuple of (local | ||
2121 | host, remote user, hostname, port). Helps avoid exceeding miserly | ||
2122 | pathname limits for Unix domain sockets in multiplexing control paths. | ||
2123 | - sshd(8): Make the "Too many authentication failures" message include | ||
2124 | the user, source address, port and protocol in a format similar to the | ||
2125 | authentication success / failure messages. | ||
2126 | - Use CLOCK_BOOTTIME in preference to CLOCK_MONOTONIC when it is | ||
2127 | available. It considers time spent suspended, thereby ensuring | ||
2128 | timeouts (e.g. for expiring agent keys) fire correctly (closes: | ||
2129 | #734553). | ||
2130 | - Use prctl() to prevent sftp-server from accessing | ||
2131 | /proc/self/{mem,maps}. | ||
2132 | * Restore TCP wrappers support, removed upstream in 6.7. It is true that | ||
2133 | dropping this reduces preauth attack surface in sshd. On the other | ||
2134 | hand, this support seems to be quite widely used, and abruptly dropping | ||
2135 | it (from the perspective of users who don't read openssh-unix-dev) could | ||
2136 | easily cause more serious problems in practice. It's not entirely clear | ||
2137 | what the right long-term answer for Debian is, but it at least probably | ||
2138 | doesn't involve dropping this feature shortly before a freeze. | ||
2139 | * Replace patch to disable OpenSSL version check with an updated version | ||
2140 | of Kurt Roeckx's patch from #732940 to just avoid checking the status | ||
2141 | field. | ||
2142 | * Build-depend on a new enough dpkg-dev for dpkg-buildflags, rather than | ||
2143 | simply a new enough dpkg. | ||
2144 | * Simplify debian/rules using /usr/share/dpkg/buildflags.mk. | ||
2145 | * Use Package-Type rather than XC-Package-Type, now that it is an official | ||
2146 | field. | ||
2147 | * Run a subset of the upstream regression test suite at package build | ||
2148 | time, and the rest of it under autopkgtest. | ||
2149 | |||
2150 | -- Colin Watson <cjwatson@debian.org> Thu, 09 Oct 2014 14:05:56 +0100 | ||
2151 | |||
2152 | openssh (1:6.6p1-8) unstable; urgency=medium | ||
2153 | |||
2154 | * Make the if-up hook use "reload" rather than "restart" if the system was | ||
2155 | booted using systemd (closes: #756547). | ||
2156 | * Show fingerprints of new keys after creating them in the postinst | ||
2157 | (closes: #762128). | ||
2158 | * Policy version 3.9.6: no changes required. | ||
2159 | * Don't link /usr/share/doc/ssh to openssh-client, as this is not safe | ||
2160 | between Architecture: all and Architecture: any binary packages (closes: | ||
2161 | #763375). | ||
2162 | |||
2163 | -- Colin Watson <cjwatson@debian.org> Fri, 03 Oct 2014 12:23:57 +0100 | ||
2164 | |||
2165 | openssh (1:6.6p1-7) unstable; urgency=medium | ||
2166 | |||
2167 | * Make sure that DEB_HOST_ARCH is set, even when invoking debian/rules | ||
2168 | directly. | ||
2169 | * Use dh-exec to simplify override_dh_install target. | ||
2170 | * Remove several unnecessary entries in debian/*.dirs. | ||
2171 | * Pass noupdate to the second call to pam_motd, not the first (thanks, Ken | ||
2172 | T Takusagawa; closes: #757059). | ||
2173 | * Debconf translations: | ||
2174 | - Turkish (thanks, Mert Dirik; closes: #756757). | ||
2175 | |||
2176 | -- Colin Watson <cjwatson@debian.org> Tue, 05 Aug 2014 09:10:04 +0100 | ||
2177 | |||
2178 | openssh (1:6.6p1-6) unstable; urgency=medium | ||
2179 | |||
2180 | * Upgrade to debhelper v9. | ||
2181 | * Only use pam_keyinit on Linux architectures (closes: #747245). | ||
2182 | * Make get_config_option more robust against trailing whitespace (thanks, | ||
2183 | LaMont Jones). | ||
2184 | * Debconf translations: | ||
2185 | - Czech (thanks, Michal Šimůnek; closes: #751419). | ||
2186 | |||
2187 | -- Colin Watson <cjwatson@debian.org> Sat, 28 Jun 2014 14:50:04 +0100 | ||
2188 | |||
2189 | openssh (1:6.6p1-5) unstable; urgency=medium | ||
2190 | |||
2191 | * Force ssh-agent Upstart job to use sh syntax regardless of the user's | ||
2192 | shell (thanks, Steffen Stempel; LP: #1312928). | ||
2193 | |||
2194 | -- Colin Watson <cjwatson@debian.org> Thu, 01 May 2014 16:27:53 +0100 | ||
2195 | |||
2196 | openssh (1:6.6p1-4) unstable; urgency=medium | ||
2197 | |||
2198 | * Debconf translations: | ||
2199 | - Spanish (thanks, MatÃas Bellone; closes: #744867). | ||
2200 | * Apply upstream-recommended patch to fix bignum encoding for | ||
2201 | curve25519-sha256@libssh.org, fixing occasional key exchange failures. | ||
2202 | |||
2203 | -- Colin Watson <cjwatson@debian.org> Mon, 21 Apr 2014 21:29:53 +0100 | ||
2204 | |||
2205 | openssh (1:6.6p1-3) unstable; urgency=medium | ||
2206 | |||
2207 | * Debconf translations: | ||
2208 | - French (thanks, Étienne Gilli; closes: #743242). | ||
2209 | * Never signal the service supervisor with SIGSTOP more than once, to | ||
2210 | prevent a hang on re-exec (thanks, Robie Basak; LP: #1306877). | ||
2211 | |||
2212 | -- Colin Watson <cjwatson@debian.org> Mon, 14 Apr 2014 12:11:50 +0100 | ||
2213 | |||
2214 | openssh (1:6.6p1-2) unstable; urgency=medium | ||
2215 | |||
2216 | * If no root password is set, then switch to "PermitRootLogin | ||
2217 | without-password" without asking (LP: #1300127). | ||
2218 | |||
2219 | -- Colin Watson <cjwatson@debian.org> Mon, 31 Mar 2014 12:20:46 +0100 | ||
2220 | |||
2221 | openssh (1:6.6p1-1) unstable; urgency=medium | ||
2222 | |||
2223 | [ Colin Watson ] | ||
2224 | * Apply various warning-suppression and regression-test fixes to | ||
2225 | gssapi.patch from Damien Miller. | ||
2226 | * New upstream release (http://www.openssh.com/txt/release-6.6, | ||
2227 | LP: #1298280): | ||
2228 | - CVE-2014-2532: sshd(8): when using environment passing with an | ||
2229 | sshd_config(5) AcceptEnv pattern with a wildcard, OpenSSH prior to 6.6 | ||
2230 | could be tricked into accepting any environment variable that contains | ||
2231 | the characters before the wildcard character. | ||
2232 | * Re-enable btmp logging, as its permissions were fixed a long time ago in | ||
2233 | response to #370050 (closes: #341883). | ||
2234 | * Change to "PermitRootLogin without-password" for new installations, and | ||
2235 | ask a debconf question when upgrading systems with "PermitRootLogin yes" | ||
2236 | from previous versions (closes: #298138). | ||
2237 | * Debconf translations: | ||
2238 | - Danish (thanks, Joe Hansen). | ||
2239 | - Portuguese (thanks, Américo Monteiro). | ||
2240 | - Russian (thanks, Yuri Kozlov; closes: #742308). | ||
2241 | - Swedish (thanks, Andreas Rönnquist). | ||
2242 | - Japanese (thanks, victory). | ||
2243 | - German (thanks, Stephan Beck; closes: #742541). | ||
2244 | - Italian (thanks, Beatrice Torracca). | ||
2245 | * Don't start ssh-agent from the Upstart user session job if something | ||
2246 | like Xsession has already done so (based on work by Bruno Vasselle; | ||
2247 | LP: #1244736). | ||
2248 | |||
2249 | [ Matthew Vernon ] | ||
2250 | * CVE-2014-2653: Fix failure to check SSHFP records if server presents a | ||
2251 | certificate (bug reported by me, patch by upstream's Damien Miller; | ||
2252 | thanks also to Mark Wooding for his help in fixing this) (Closes: | ||
2253 | #742513) | ||
2254 | |||
2255 | -- Colin Watson <cjwatson@debian.org> Fri, 28 Mar 2014 18:04:41 +0000 | ||
2256 | |||
2257 | openssh (1:6.5p1-6) unstable; urgency=medium | ||
2258 | |||
2259 | * Fix Breaks/Replaces versions of openssh-sftp-server on openssh-server | ||
2260 | (thanks, Axel Beckert). | ||
2261 | |||
2262 | -- Colin Watson <cjwatson@debian.org> Thu, 06 Mar 2014 16:18:44 +0000 | ||
2263 | |||
2264 | openssh (1:6.5p1-5) unstable; urgency=medium | ||
2265 | |||
2266 | [ Colin Watson ] | ||
2267 | * Add Alias=sshd.service to systemd ssh.service file, to match "Provides: | ||
2268 | sshd" in the sysvinit script (thanks, Michael Biebl). | ||
2269 | * Add Before=ssh.service to systemd ssh.socket file, since otherwise | ||
2270 | nothing guarantees that ssh.service has stopped before ssh.socket starts | ||
2271 | (thanks, Uoti Urpala). | ||
2272 | |||
2273 | [ Axel Beckert ] | ||
2274 | * Split sftp-server into its own package to allow it to also be used by | ||
2275 | other SSH server implementations like dropbear (closes: #504290). | ||
2276 | |||
2277 | -- Colin Watson <cjwatson@debian.org> Wed, 05 Mar 2014 13:53:08 +0000 | ||
2278 | |||
2279 | openssh (1:6.5p1-4) unstable; urgency=medium | ||
2280 | |||
2281 | * Configure --without-hardening on hppa, to work around | ||
2282 | http://gcc.gnu.org/bugzilla/show_bug.cgi?id=60155 (closes: #738798). | ||
2283 | * Amend "Running sshd from inittab" instructions in README.Debian to | ||
2284 | recommend 'update-rc.d ssh disable', rather than manual removal of rc*.d | ||
2285 | symlinks that won't work with dependency-based sysv-rc. | ||
2286 | * Remove code related to non-dependency-based sysv-rc ordering, since that | ||
2287 | is no longer supported. | ||
2288 | * Apply patch from https://bugzilla.mindrot.org/show_bug.cgi?id=2200 to | ||
2289 | fix getsockname errors when using "ssh -W" (closes: #738693). | ||
2290 | |||
2291 | -- Colin Watson <cjwatson@debian.org> Sat, 15 Feb 2014 02:19:36 +0000 | ||
2292 | |||
2293 | openssh (1:6.5p1-3) unstable; urgency=medium | ||
2294 | |||
2295 | * Clarify socket activation mode in README.Debian, as suggested by Uoti | ||
2296 | Urpala. | ||
2297 | * Stop claiming that "Protocol 2" is a Debian-specific default; this has | ||
2298 | been upstream's default since 5.4p1. | ||
2299 | * Avoid stdout noise from which(1) on purge of openssh-client. | ||
2300 | * Fix sysvinit->systemd transition code to cope with still-running | ||
2301 | sysvinit jobs being considered active by systemd (thanks, Uoti Urpala | ||
2302 | and Michael Biebl). | ||
2303 | * Bump guard version for sysvinit->systemd transition to 1:6.5p1-3; we may | ||
2304 | have got it wrong before, and it's fairly harmless to repeat it. | ||
2305 | * Remove tests for whether /dev/null is a character device from the | ||
2306 | Upstart job and the systemd service files; it's there to avoid a | ||
2307 | confusing failure mode in daemon(), but with modern init systems we use | ||
2308 | the -D option to suppress daemonisation anyway. | ||
2309 | * Refer to /usr/share/common-licenses/GPL-2 in debian/copyright (for the | ||
2310 | Debian patch) rather than plain GPL. | ||
2311 | * Drop some very old Conflicts and Replaces (ssh (<< 1:3.8.1p1-9), | ||
2312 | rsh-client (<< 0.16.1-1), ssh-krb5 (<< 1:4.3p2-7), ssh-nonfree (<< 2), | ||
2313 | and openssh-client (<< 1:3.8.1p1-11)). These all relate to pre-etch | ||
2314 | versions, for which we no longer have maintainer script code, and per | ||
2315 | policy they would have to become Breaks nowadays anyway. | ||
2316 | * Policy version 3.9.5. | ||
2317 | * Drop unnecessary -1 in zlib1g Build-Depends version. | ||
2318 | * Tweak dh_systemd_enable invocations to avoid lots of error noise. | ||
2319 | |||
2320 | -- Colin Watson <cjwatson@debian.org> Wed, 12 Feb 2014 13:10:08 +0000 | ||
2321 | |||
2322 | openssh (1:6.5p1-2) unstable; urgency=medium | ||
2323 | |||
2324 | * Only enable ssh.service for systemd, not both ssh.service and | ||
2325 | ssh.socket. Thanks to Michael Biebl for spotting this. | ||
2326 | * Backport upstream patch to unbreak case-sensitive matching of ssh_config | ||
2327 | (closes: #738619). | ||
2328 | |||
2329 | -- Colin Watson <cjwatson@debian.org> Tue, 11 Feb 2014 11:28:35 +0000 | ||
2330 | |||
2331 | openssh (1:6.5p1-1) unstable; urgency=medium | ||
2332 | |||
2333 | * New upstream release (http://www.openssh.com/txt/release-6.5, | ||
2334 | LP: #1275068): | ||
2335 | - ssh(1): Add support for client-side hostname canonicalisation using a | ||
2336 | set of DNS suffixes and rules in ssh_config(5). This allows | ||
2337 | unqualified names to be canonicalised to fully-qualified domain names | ||
2338 | to eliminate ambiguity when looking up keys in known_hosts or checking | ||
2339 | host certificate names (closes: #115286). | ||
2340 | * Switch to git; adjust Vcs-* fields. | ||
2341 | * Convert to git-dpm, and drop source package documentation associated | ||
2342 | with the old bzr/quilt patch handling workflow. | ||
2343 | * Drop ssh-vulnkey and the associated ssh/ssh-add/sshd integration code, | ||
2344 | leaving only basic configuration file compatibility, since it has been | ||
2345 | nearly six years since the original vulnerability and this code is not | ||
2346 | likely to be of much value any more (closes: #481853, #570651). See | ||
2347 | https://lists.debian.org/debian-devel/2013/09/msg00240.html for my full | ||
2348 | reasoning. | ||
2349 | * Add OpenPGP signature checking configuration to watch file (thanks, | ||
2350 | Daniel Kahn Gillmor; closes: #732441). | ||
2351 | * Add the pam_keyinit session module, to create a new session keyring on | ||
2352 | login (closes: #734816). | ||
2353 | * Incorporate default path changes from shadow 1:4.0.18.1-8, removing | ||
2354 | /usr/bin/X11 (closes: #644521). | ||
2355 | * Generate ED25519 host keys on fresh installations. Upgraders who wish | ||
2356 | to add such host keys should manually add 'HostKey | ||
2357 | /etc/ssh/ssh_host_ed25519_key' to /etc/ssh/sshd_config and run | ||
2358 | 'ssh-keygen -q -f /etc/ssh/ssh_host_ed25519_key -N "" -t ed25519'. | ||
2359 | * Drop long-obsolete "SSH now uses protocol 2 by default" section from | ||
2360 | README.Debian. | ||
2361 | * Add systemd support (thanks, Sven Joachim; closes: #676830). | ||
2362 | |||
2363 | -- Colin Watson <cjwatson@debian.org> Mon, 10 Feb 2014 14:58:26 +0000 | ||
2364 | |||
2365 | openssh (1:6.4p1-2) unstable; urgency=high | ||
2366 | |||
2367 | * Increase ServerKeyBits value in package-generated sshd_config to 1024 | ||
2368 | (closes: #727622, LP: #1244272). | ||
2369 | * Restore patch to disable OpenSSL version check (closes: #732940). | ||
2370 | |||
2371 | -- Colin Watson <cjwatson@debian.org> Mon, 23 Dec 2013 10:44:04 +0000 | ||
2372 | |||
2373 | openssh (1:6.4p1-1) unstable; urgency=high | ||
2374 | |||
2375 | * New upstream release. Important changes: | ||
2376 | - 6.3/6.3p1 (http://www.openssh.com/txt/release-6.3): | ||
2377 | + sftp(1): add support for resuming partial downloads using the | ||
2378 | "reget" command and on the sftp commandline or on the "get" | ||
2379 | commandline using the "-a" (append) option (closes: #158590). | ||
2380 | + ssh(1): add an "IgnoreUnknown" configuration option to selectively | ||
2381 | suppress errors arising from unknown configuration directives | ||
2382 | (closes: #436052). | ||
2383 | + sftp(1): update progressmeter when data is acknowledged, not when | ||
2384 | it's sent (partially addresses #708372). | ||
2385 | + ssh(1): do not fatally exit when attempting to cleanup multiplexing- | ||
2386 | created channels that are incompletely opened (closes: #651357). | ||
2387 | - 6.4/6.4p1 (http://www.openssh.com/txt/release-6.4): | ||
2388 | + CVE-2013-4548: sshd(8): fix a memory corruption problem triggered | ||
2389 | during rekeying when an AES-GCM cipher is selected (closes: | ||
2390 | #729029). Full details of the vulnerability are available at: | ||
2391 | http://www.openssh.com/txt/gcmrekey.adv | ||
2392 | * When running under Upstart, only consider the daemon started once it is | ||
2393 | ready to accept connections (by raising SIGSTOP at that point and using | ||
2394 | "expect stop"). | ||
2395 | |||
2396 | -- Colin Watson <cjwatson@debian.org> Sat, 09 Nov 2013 18:24:16 +0000 | ||
2397 | |||
2398 | openssh (1:6.2p2-6) unstable; urgency=low | ||
2399 | |||
2400 | * Update config.guess and config.sub automatically at build time. | ||
2401 | dh_autoreconf does not take care of that by default because openssh does | ||
2402 | not use automake. | ||
2403 | |||
2404 | -- Colin Watson <cjwatson@debian.org> Tue, 02 Jul 2013 22:54:49 +0100 | ||
2405 | |||
2406 | openssh (1:6.2p2-5) unstable; urgency=low | ||
2407 | |||
2408 | [ Colin Watson ] | ||
2409 | * Document consequences of ssh-agent being setgid in ssh-agent(1); see | ||
2410 | #711623. | ||
2411 | * Use 'set -e' rather than '#! /bin/sh -e' in maintainer scripts and | ||
2412 | ssh-argv0. | ||
2413 | |||
2414 | [ Yolanda Robla ] | ||
2415 | * debian/rules: Include real distribution in SSH_EXTRAVERSION instead of | ||
2416 | hardcoding Debian (LP: #1195342). | ||
2417 | |||
2418 | -- Colin Watson <cjwatson@debian.org> Thu, 27 Jun 2013 15:24:14 +0100 | ||
2419 | |||
2420 | openssh (1:6.2p2-4) unstable; urgency=low | ||
2421 | |||
2422 | * Fix non-portable shell in ssh-copy-id (closes: #711162). | ||
2423 | * Rebuild against debhelper 9.20130604 with fixed dependencies for | ||
2424 | invoke-rc.d and Upstart jobs (closes: #711159, #711364). | ||
2425 | * Set SELinux context on private host keys as well as public host keys | ||
2426 | (closes: #687436). | ||
2427 | |||
2428 | -- Colin Watson <cjwatson@debian.org> Thu, 06 Jun 2013 17:06:31 +0100 | ||
2429 | |||
2430 | openssh (1:6.2p2-3) unstable; urgency=low | ||
2431 | |||
2432 | * If the running init daemon is Upstart, then, on the first upgrade to | ||
2433 | this version, check whether sysvinit is still managing sshd; if so, | ||
2434 | manually stop it so that it can be restarted under upstart. We do this | ||
2435 | near the end of the postinst, so it shouldn't result in any appreciable | ||
2436 | extra window where sshd is not running during upgrade. | ||
2437 | |||
2438 | -- Colin Watson <cjwatson@debian.org> Wed, 22 May 2013 17:42:10 +0100 | ||
2439 | |||
2440 | openssh (1:6.2p2-2) unstable; urgency=low | ||
2441 | |||
2442 | * Change start condition of Upstart job to be just the standard "runlevel | ||
2443 | [2345]", rather than "filesystem or runlevel [2345]"; the latter makes | ||
2444 | it unreasonably difficult to ensure that urandom starts before ssh, and | ||
2445 | is not really necessary since one of static-network-up and failsafe-boot | ||
2446 | is guaranteed to happen and will trigger entry to the default runlevel, | ||
2447 | and we don't care about ssh starting before the network (LP: #1098299). | ||
2448 | * Drop conffile handling for direct upgrades from pre-split ssh package; | ||
2449 | this was originally added in 1:4.3p2-7 / 1:4.3p2-8, and contained a | ||
2450 | truly ghastly hack around a misbehaviour in sarge's dpkg. Since this is | ||
2451 | now four Debian releases ago, we can afford to drop this and simplify | ||
2452 | the packaging. | ||
2453 | * Remove ssh/use_old_init_script, which was a workaround for a very old | ||
2454 | bug in /etc/init.d/ssh. If anyone has ignored this for >10 years then | ||
2455 | they aren't going to be convinced now (closes: #214182). | ||
2456 | * Remove support for upgrading directly from ssh-nonfree. | ||
2457 | * Remove lots of maintainer script support for direct upgrades from | ||
2458 | pre-etch (three releases before current stable). | ||
2459 | * Add #DEBHELPER# tokens to openssh-client.postinst and | ||
2460 | openssh-server.postinst. | ||
2461 | * Replace old manual conffile handling code with dpkg-maintscript-helper, | ||
2462 | via dh_installdeb. | ||
2463 | * Switch to new unified layout for Upstart jobs as documented in | ||
2464 | https://wiki.ubuntu.com/UpstartCompatibleInitScripts: the init script | ||
2465 | checks for a running Upstart, and we now let dh_installinit handle most | ||
2466 | of the heavy lifting in maintainer scripts. Ubuntu users should be | ||
2467 | essentially unaffected except that sshd may no longer start | ||
2468 | automatically in chroots if the running Upstart predates 0.9.0; but the | ||
2469 | main goal is simply not to break when openssh-server is installed in a | ||
2470 | chroot. | ||
2471 | * Remove the check for vulnerable host keys; this was first added five | ||
2472 | years ago, and everyone should have upgraded through a version that | ||
2473 | applied these checks by now. The ssh-vulnkey tool and the blacklisting | ||
2474 | support in sshd are still here, at least for the moment. | ||
2475 | * This removes the last of our uses of debconf (closes: #221531). | ||
2476 | * Use the pam_loginuid session module (thanks, Laurent Bigonville; closes: | ||
2477 | #677440, LP: #1067779). | ||
2478 | * Bracket our session stack with calls to pam_selinux close/open (thanks, | ||
2479 | Laurent Bigonville; closes: #679458). | ||
2480 | * Fix dh_builddeb invocation so that we really use xz compression for | ||
2481 | binary packages, as intended since 1:6.1p1-2. | ||
2482 | |||
2483 | -- Colin Watson <cjwatson@debian.org> Wed, 22 May 2013 09:07:42 +0100 | ||
2484 | |||
2485 | openssh (1:6.2p2-1) unstable; urgency=low | ||
2486 | |||
2487 | * New upstream release (http://www.openssh.com/txt/release-6.2p2): | ||
2488 | - Only warn for missing identity files that were explicitly specified | ||
2489 | (closes: #708275). | ||
2490 | - Fix bug in contributed contrib/ssh-copy-id script that could result in | ||
2491 | "rm *" being called on mktemp failure (closes: #708419). | ||
2492 | |||
2493 | -- Colin Watson <cjwatson@debian.org> Thu, 16 May 2013 14:05:06 +0100 | ||
2494 | |||
2495 | openssh (1:6.2p1-3) unstable; urgency=low | ||
2496 | |||
2497 | * Renumber Debian-specific additions to enum monitor_reqtype so that they | ||
2498 | fit within a single byte (thanks, Jason Conti; LP: #1179202). | ||
2499 | |||
2500 | -- Colin Watson <cjwatson@debian.org> Mon, 13 May 2013 10:56:04 +0100 | ||
2501 | |||
2502 | openssh (1:6.2p1-2) unstable; urgency=low | ||
2503 | |||
2504 | * Fix build failure on Ubuntu: | ||
2505 | - Include openbsd-compat/sys-queue.h from consolekit.c. | ||
2506 | - Fix consolekit mismerges in monitor.c and monitor_wrap.c. | ||
2507 | |||
2508 | -- Colin Watson <cjwatson@debian.org> Thu, 09 May 2013 09:45:57 +0100 | ||
2509 | |||
2510 | openssh (1:6.2p1-1) unstable; urgency=low | ||
2511 | |||
2512 | * New upstream release (http://www.openssh.com/txt/release-6.2). | ||
2513 | - Add support for multiple required authentication in SSH protocol 2 via | ||
2514 | an AuthenticationMethods option (closes: #195716). | ||
2515 | - Fix Sophie Germain formula in moduli(5) (closes: #698612). | ||
2516 | - Update ssh-copy-id to Phil Hands' greatly revised version (closes: | ||
2517 | #99785, #322228, #620428; LP: #518883, #835901, #1074798). | ||
2518 | * Use dh-autoreconf. | ||
2519 | |||
2520 | -- Colin Watson <cjwatson@debian.org> Tue, 07 May 2013 11:48:16 +0100 | ||
2521 | |||
2522 | openssh (1:6.1p1-4) experimental; urgency=low | ||
2523 | |||
2524 | [ Gunnar Hjalmarsson ] | ||
2525 | * debian/openssh-server.sshd.pam: Explicitly state that ~/.pam_environment | ||
2526 | should be read, and move the pam_env calls from "auth" to "session" so | ||
2527 | that it's also read when $HOME is encrypted (LP: #952185). | ||
2528 | |||
2529 | [ Stéphane Graber ] | ||
2530 | * Add ssh-agent upstart user job. This implements something similar to | ||
2531 | the 90x11-common_ssh-agent Xsession script. That is, start ssh-agent | ||
2532 | and set the appropriate environment variables (closes: #703906). | ||
2533 | |||
2534 | -- Colin Watson <cjwatson@debian.org> Mon, 25 Mar 2013 16:58:04 +0000 | ||
2535 | |||
2536 | openssh (1:6.1p1-3) experimental; urgency=low | ||
2537 | |||
2538 | * Give ssh and ssh-krb5 versioned dependencies on openssh-client and | ||
2539 | openssh-server, to try to reduce confusion when people run 'apt-get | ||
2540 | install ssh' or similar and expect that to upgrade everything relevant. | ||
2541 | * CVE-2010-5107: Improve DoS resistance by changing default of MaxStartups | ||
2542 | to 10:30:100 (closes: #700102). | ||
2543 | |||
2544 | -- Colin Watson <cjwatson@debian.org> Fri, 08 Feb 2013 21:07:31 +0000 | ||
2545 | |||
2546 | openssh (1:6.1p1-2) experimental; urgency=low | ||
2547 | |||
2548 | * Use xz compression for binary packages. | ||
2549 | * Merge from Ubuntu: | ||
2550 | - Add support for registering ConsoleKit sessions on login. (This is | ||
2551 | currently enabled only when building for Ubuntu.) | ||
2552 | - Drop openssh-blacklist and openssh-blacklist-extra to Suggests. It's | ||
2553 | been long enough since the relevant vulnerability that we shouldn't | ||
2554 | need these installed by default nowadays. | ||
2555 | - Add an Upstart job (not currently used by default in Debian). | ||
2556 | - Add mention of ssh-keygen in ssh connect warning (Scott Moser). | ||
2557 | - Install apport hooks. | ||
2558 | * Only build with -j if DEB_BUILD_OPTIONS=parallel=* is used (closes: | ||
2559 | #694282). | ||
2560 | |||
2561 | -- Colin Watson <cjwatson@debian.org> Mon, 26 Nov 2012 16:39:07 +0000 | ||
2562 | |||
2563 | openssh (1:6.1p1-1) experimental; urgency=low | ||
2564 | |||
2565 | * New upstream release (http://www.openssh.com/txt/release-6.1). | ||
2566 | - Enable pre-auth sandboxing by default for new installs. | ||
2567 | - Allow "PermitOpen none" to refuse all port-forwarding requests | ||
2568 | (closes: #543683). | ||
2569 | |||
2570 | -- Colin Watson <cjwatson@debian.org> Fri, 07 Sep 2012 00:22:44 +0100 | ||
2571 | |||
2572 | openssh (1:6.0p1-3) unstable; urgency=low | ||
2573 | |||
2574 | * debconf template translations: | ||
2575 | - Add Indonesian (thanks, Andika Triwidada; closes: #681670). | ||
2576 | * Call restorecon on copied ~/.ssh/authorized_keys if possible, since some | ||
2577 | SELinux policies require this (closes: #658675). | ||
2578 | * Add ncurses-term to openssh-server's Recommends, since it's often needed | ||
2579 | to support unusual terminal emulators on clients (closes: #675362). | ||
2580 | |||
2581 | -- Colin Watson <cjwatson@debian.org> Fri, 24 Aug 2012 06:55:36 +0100 | ||
2582 | |||
2583 | openssh (1:6.0p1-2) unstable; urgency=low | ||
2584 | |||
2585 | * Tighten libssl1.0.0 and libcrypto1.0.0-udeb dependencies to the current | ||
2586 | "fix" version at build time (closes: #678661). | ||
2587 | |||
2588 | -- Colin Watson <cjwatson@debian.org> Sun, 24 Jun 2012 12:16:06 +0100 | ||
2589 | |||
2590 | openssh (1:6.0p1-1) unstable; urgency=low | ||
2591 | |||
2592 | [ Roger Leigh ] | ||
2593 | * Display dynamic part of MOTD from /run/motd.dynamic, if it exists | ||
2594 | (closes: #669699). | ||
2595 | |||
2596 | [ Colin Watson ] | ||
2597 | * Update OpenSSH FAQ to revision 1.113, fixing missing line break (closes: | ||
2598 | #669667). | ||
2599 | * New upstream release (closes: #671010, | ||
2600 | http://www.openssh.com/txt/release-6.0). | ||
2601 | - Fix IPQoS not being set on non-mapped v4-in-v6 addressed connections | ||
2602 | (closes: #643312, #650512, #671075). | ||
2603 | - Add a new privilege separation sandbox implementation for Linux's new | ||
2604 | seccomp sandbox, automatically enabled on platforms that support it. | ||
2605 | (Note: privilege separation sandboxing is still experimental.) | ||
2606 | * Fix a bashism in configure's seccomp_filter check. | ||
2607 | * Add a sandbox fallback mechanism, so that behaviour on Linux depends on | ||
2608 | whether the running system's kernel has seccomp_filter support, not the | ||
2609 | build system's kernel (forwarded upstream as | ||
2610 | https://bugzilla.mindrot.org/show_bug.cgi?id=2011). | ||
2611 | |||
2612 | -- Colin Watson <cjwatson@debian.org> Sat, 26 May 2012 13:48:14 +0100 | ||
2613 | |||
2614 | openssh (1:5.9p1-5) unstable; urgency=low | ||
2615 | |||
2616 | * Use dpkg-buildflags, including for hardening support; drop use of | ||
2617 | hardening-includes. | ||
2618 | * Fix cross-building: | ||
2619 | - Allow using a cross-architecture pkg-config. | ||
2620 | - Pass default LDFLAGS to contrib/Makefile. | ||
2621 | - Allow dh_strip to strip gnome-ssh-askpass, rather than calling | ||
2622 | 'install -s'. | ||
2623 | |||
2624 | -- Colin Watson <cjwatson@debian.org> Mon, 02 Apr 2012 11:20:33 +0100 | ||
2625 | |||
2626 | openssh (1:5.9p1-4) unstable; urgency=low | ||
2627 | |||
2628 | * Disable OpenSSL version check again, as its SONAME is sufficient | ||
2629 | nowadays (closes: #664383). | ||
2630 | |||
2631 | -- Colin Watson <cjwatson@debian.org> Mon, 19 Mar 2012 11:06:30 +0000 | ||
2632 | |||
2633 | openssh (1:5.9p1-3) unstable; urgency=low | ||
2634 | |||
2635 | * debconf template translations: | ||
2636 | - Update Polish (thanks, Michał Kułach; closes: #659829). | ||
2637 | * Ignore errors writing to console in init script (closes: #546743). | ||
2638 | * Move ssh-krb5 to Section: oldlibs. | ||
2639 | |||
2640 | -- Colin Watson <cjwatson@debian.org> Fri, 24 Feb 2012 08:56:18 +0000 | ||
2641 | |||
2642 | openssh (1:5.9p1-2) unstable; urgency=low | ||
2643 | |||
2644 | * Mark openssh-client and openssh-server as Multi-Arch: foreign. | ||
2645 | |||
2646 | -- Colin Watson <cjwatson@debian.org> Wed, 09 Nov 2011 02:06:48 +0000 | ||
2647 | |||
2648 | openssh (1:5.9p1-1) unstable; urgency=low | ||
2649 | |||
2650 | * New upstream release (http://www.openssh.com/txt/release-5.9). | ||
2651 | - Introduce sandboxing of the pre-auth privsep child using an optional | ||
2652 | sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables | ||
2653 | mandatory restrictions on the syscalls the privsep child can perform. | ||
2654 | - Add new SHA256-based HMAC transport integrity modes from | ||
2655 | http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt. | ||
2656 | - The pre-authentication sshd(8) privilege separation slave process now | ||
2657 | logs via a socket shared with the master process, avoiding the need to | ||
2658 | maintain /dev/log inside the chroot (closes: #75043, #429243, | ||
2659 | #599240). | ||
2660 | - ssh(1) now warns when a server refuses X11 forwarding (closes: | ||
2661 | #504757). | ||
2662 | - sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths, | ||
2663 | separated by whitespace (closes: #76312). The authorized_keys2 | ||
2664 | fallback is deprecated but documented (closes: #560156). | ||
2665 | - ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4 | ||
2666 | ToS/DSCP (closes: #498297). | ||
2667 | - ssh-add(1) now accepts keys piped from standard input. E.g. "ssh-add | ||
2668 | - < /path/to/key" (closes: #229124). | ||
2669 | - Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691). | ||
2670 | - Say "required" rather than "recommended" in unprotected-private-key | ||
2671 | warning (LP: #663455). | ||
2672 | * Update OpenSSH FAQ to revision 1.112. | ||
2673 | |||
2674 | -- Colin Watson <cjwatson@debian.org> Wed, 07 Sep 2011 23:46:00 +0100 | ||
2675 | |||
2676 | openssh (1:5.8p1-7) unstable; urgency=low | ||
2677 | |||
2678 | * Only recommend ssh-import-id when built on Ubuntu (closes: #635887). | ||
2679 | * Use 'dpkg-vendor --derives-from Ubuntu' to detect Ubuntu systems rather | ||
2680 | than 'lsb_release -is' so that Ubuntu derivatives behave the same way as | ||
2681 | Ubuntu itself. | ||
2682 | |||
2683 | -- Colin Watson <cjwatson@debian.org> Fri, 29 Jul 2011 14:27:52 +0100 | ||
2684 | |||
2685 | openssh (1:5.8p1-6) unstable; urgency=low | ||
2686 | |||
2687 | * openssh-client and openssh-server Suggests: monkeysphere. | ||
2688 | * Quieten logs when multiple from= restrictions are used in different | ||
2689 | authorized_keys lines for the same key; it's still not ideal, but at | ||
2690 | least you'll only get one log entry per key (closes: #630606). | ||
2691 | * Merge from Ubuntu (Dustin Kirkland): | ||
2692 | - openssh-server Recommends: ssh-import-id (no-op in Debian since that | ||
2693 | package doesn't exist there, but this reduces the Ubuntu delta). | ||
2694 | |||
2695 | -- Colin Watson <cjwatson@debian.org> Thu, 28 Jul 2011 17:10:18 +0100 | ||
2696 | |||
2697 | openssh (1:5.8p1-5) unstable; urgency=low | ||
2698 | |||
2699 | * Drop openssh-server's dependency on openssh-blacklist to a | ||
2700 | recommendation (closes: #622604). | ||
2701 | * Update Vcs-* fields and README.source for Alioth changes. | ||
2702 | * Backport from upstream: | ||
2703 | - Make hostbased auth with ECDSA keys work correctly (closes: #633368). | ||
2704 | |||
2705 | -- Colin Watson <cjwatson@debian.org> Sun, 24 Jul 2011 11:06:47 +0100 | ||
2706 | |||
2707 | openssh (1:5.8p1-4) unstable; urgency=low | ||
2708 | |||
2709 | * Drop hardcoded dependencies on libssl0.9.8 and libcrypto0.9.8-udeb, | ||
2710 | since the required minimum versions are rather old now anyway and | ||
2711 | openssl has bumped its SONAME (thanks, Julien Cristau; closes: #620828). | ||
2712 | * Remove unreachable code from openssh-server.postinst. | ||
2713 | |||
2714 | -- Colin Watson <cjwatson@debian.org> Mon, 04 Apr 2011 15:56:18 +0100 | ||
2715 | |||
2716 | openssh (1:5.8p1-3) unstable; urgency=low | ||
2717 | |||
2718 | * Correct ssh-keygen instruction in the changelog for 1:5.7p1-1 (thanks, | ||
2719 | Joel Stanley). | ||
2720 | * Allow ssh-add to read from FIFOs (thanks, Daniel Kahn Gillmor; closes: | ||
2721 | #614897). | ||
2722 | |||
2723 | -- Colin Watson <cjwatson@debian.org> Fri, 18 Mar 2011 16:42:42 +0000 | ||
2724 | |||
2725 | openssh (1:5.8p1-2) unstable; urgency=low | ||
2726 | |||
2727 | * Upload to unstable. | ||
2728 | |||
2729 | -- Colin Watson <cjwatson@debian.org> Tue, 08 Feb 2011 10:59:17 +0000 | ||
2730 | |||
2731 | openssh (1:5.8p1-1) experimental; urgency=low | ||
2732 | |||
2733 | * New upstream release (http://www.openssh.com/txt/release-5.8): | ||
2734 | - Fix stack information leak in legacy certificate signing | ||
2735 | (http://www.openssh.com/txt/legacy-cert.adv). | ||
2736 | |||
2737 | -- Colin Watson <cjwatson@debian.org> Sat, 05 Feb 2011 11:13:11 +0000 | ||
2738 | |||
2739 | openssh (1:5.7p1-2) experimental; urgency=low | ||
2740 | |||
2741 | * Fix crash in ssh_selinux_setfscreatecon when SELinux is disabled | ||
2742 | (LP: #708571). | ||
2743 | |||
2744 | -- Colin Watson <cjwatson@debian.org> Thu, 27 Jan 2011 12:14:17 +0000 | ||
2745 | |||
2746 | openssh (1:5.7p1-1) experimental; urgency=low | ||
2747 | |||
2748 | * New upstream release (http://www.openssh.com/txt/release-5.7): | ||
2749 | - Implement Elliptic Curve Cryptography modes for key exchange (ECDH) | ||
2750 | and host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA | ||
2751 | offer better performance than plain DH and DSA at the same equivalent | ||
2752 | symmetric key length, as well as much shorter keys. | ||
2753 | - sftp(1)/sftp-server(8): add a protocol extension to support a hard | ||
2754 | link operation. It is available through the "ln" command in the | ||
2755 | client. The old "ln" behaviour of creating a symlink is available | ||
2756 | using its "-s" option or through the preexisting "symlink" command. | ||
2757 | - scp(1): Add a new -3 option to scp: Copies between two remote hosts | ||
2758 | are transferred through the local host (closes: #508613). | ||
2759 | - ssh(1): "atomically" create the listening mux socket by binding it on | ||
2760 | a temporary name and then linking it into position after listen() has | ||
2761 | succeeded. This allows the mux clients to determine that the server | ||
2762 | socket is either ready or stale without races (closes: #454784). | ||
2763 | Stale server sockets are now automatically removed (closes: #523250). | ||
2764 | - ssh(1): install a SIGCHLD handler to reap expired child process | ||
2765 | (closes: #594687). | ||
2766 | - ssh(1)/ssh-agent(1): honour $TMPDIR for client xauth and ssh-agent | ||
2767 | temporary directories (closes: #357469, although only if you arrange | ||
2768 | for ssh-agent to actually see $TMPDIR since the setgid bit will cause | ||
2769 | it to be stripped off). | ||
2770 | * Update to current GSSAPI patch from | ||
2771 | http://www.sxw.org.uk/computing/patches/openssh-5.7p1-gsskex-all-20110125.patch: | ||
2772 | - Add GSSAPIServerIdentity option. | ||
2773 | * Generate ECDSA host keys on fresh installations. Upgraders who wish to | ||
2774 | add such host keys should manually add 'HostKey | ||
2775 | /etc/ssh/ssh_host_ecdsa_key' to /etc/ssh/sshd_config and run 'ssh-keygen | ||
2776 | -q -f /etc/ssh/ssh_host_ecdsa_key -N "" -t ecdsa'. | ||
2777 | * Build-depend on libssl-dev (>= 0.9.8g) to ensure sufficient ECC support. | ||
2778 | * Backport SELinux build fix from CVS. | ||
2779 | * Rearrange selinux-role.patch so that it links properly given this | ||
2780 | SELinux build fix. | ||
2781 | |||
2782 | -- Colin Watson <cjwatson@debian.org> Wed, 26 Jan 2011 23:48:02 +0000 | ||
2783 | |||
2784 | openssh (1:5.6p1-3) experimental; urgency=low | ||
2785 | |||
2786 | * Drop override for desktop-file-but-no-dh_desktop-call, which Lintian no | ||
2787 | longer issues. | ||
2788 | * Merge 1:5.5p1-6. | ||
2789 | |||
2790 | -- Colin Watson <cjwatson@debian.org> Thu, 30 Dec 2010 11:48:00 +0000 | ||
2791 | |||
2792 | openssh (1:5.6p1-2) experimental; urgency=low | ||
2793 | |||
2794 | * Backport upstream patch to install a SIGCHLD handler to reap expired ssh | ||
2795 | child processes, preventing lots of zombies when using ControlPersist | ||
2796 | (closes: #594687). | ||
2797 | |||
2798 | -- Colin Watson <cjwatson@debian.org> Tue, 26 Oct 2010 14:46:40 +0100 | ||
2799 | |||
2800 | openssh (1:5.6p1-1) experimental; urgency=low | ||
2801 | |||
2802 | * New upstream release (http://www.openssh.com/txt/release-5.6): | ||
2803 | - Added a ControlPersist option to ssh_config(5) that automatically | ||
2804 | starts a background ssh(1) multiplex master when connecting. This | ||
2805 | connection can stay alive indefinitely, or can be set to automatically | ||
2806 | close after a user-specified duration of inactivity (closes: #335697, | ||
2807 | #350898, #454787, #500573, #550262). | ||
2808 | - Support AuthorizedKeysFile, AuthorizedPrincipalsFile, | ||
2809 | HostbasedUsesNameFromPacketOnly, and PermitTunnel in sshd_config(5) | ||
2810 | Match blocks (closes: #549858). | ||
2811 | - sftp(1): fix ls in working directories that contain globbing | ||
2812 | characters in their pathnames (LP: #530714). | ||
2813 | |||
2814 | -- Colin Watson <cjwatson@debian.org> Tue, 24 Aug 2010 00:37:54 +0100 | ||
2815 | |||
2816 | openssh (1:5.5p1-6) unstable; urgency=low | ||
2817 | |||
2818 | * Touch /var/run/sshd/.placeholder in the preinst so that /var/run/sshd, | ||
2819 | which is intentionally no longer shipped in the openssh-server package | ||
2820 | due to /var/run often being a temporary directory, is not removed on | ||
2821 | upgrade (closes: #575582). | ||
2822 | |||
2823 | -- Colin Watson <cjwatson@debian.org> Sun, 26 Dec 2010 18:09:29 +0000 | ||
2824 | |||
2825 | openssh (1:5.5p1-5) unstable; urgency=low | ||
2826 | |||
2827 | * Use an architecture wildcard for libselinux1-dev (closes: #591740). | ||
2828 | * debconf template translations: | ||
2829 | - Update Danish (thanks, Joe Hansen; closes: #592800). | ||
2830 | |||
2831 | -- Colin Watson <cjwatson@debian.org> Mon, 23 Aug 2010 22:59:03 +0100 | ||
2832 | |||
2833 | openssh (1:5.5p1-4) unstable; urgency=low | ||
2834 | |||
2835 | [ Sebastian Andrzej Siewior ] | ||
2836 | * Add powerpcspe to architecture list for libselinux1-dev build-dependency | ||
2837 | (closes: #579843). | ||
2838 | |||
2839 | [ Colin Watson ] | ||
2840 | * Allow ~/.ssh/authorized_keys and other secure files to be | ||
2841 | group-writable, provided that the group in question contains only the | ||
2842 | file's owner; this extends a patch previously applied to ~/.ssh/config | ||
2843 | (closes: #581919). | ||
2844 | * Check primary group memberships as well as supplementary group | ||
2845 | memberships, and only allow group-writability by groups with exactly one | ||
2846 | member, as zero-member groups are typically used by setgid binaries | ||
2847 | rather than being user-private groups (closes: #581697). | ||
2848 | |||
2849 | -- Colin Watson <cjwatson@debian.org> Sat, 22 May 2010 23:37:20 +0100 | ||
2850 | |||
2851 | openssh (1:5.5p1-3) unstable; urgency=low | ||
2852 | |||
2853 | * Discard error messages while checking whether rsh, rlogin, and rcp | ||
2854 | alternatives exist (closes: #579285). | ||
2855 | * Drop IDEA key check; I don't think it works properly any more due to | ||
2856 | textual changes in error output, it's only relevant for direct upgrades | ||
2857 | from truly ancient versions, and it breaks upgrades if | ||
2858 | /etc/ssh/ssh_host_key can't be loaded (closes: #579570). | ||
2859 | |||
2860 | -- Colin Watson <cjwatson@debian.org> Wed, 28 Apr 2010 22:12:47 +0100 | ||
2861 | |||
2862 | openssh (1:5.5p1-2) unstable; urgency=low | ||
2863 | |||
2864 | * Use dh_installinit -n, since our maintainer scripts already handle this | ||
2865 | more carefully (thanks, Julien Cristau). | ||
2866 | |||
2867 | -- Colin Watson <cjwatson@debian.org> Sat, 17 Apr 2010 12:55:56 +0100 | ||
2868 | |||
2869 | openssh (1:5.5p1-1) unstable; urgency=low | ||
2870 | |||
2871 | * New upstream release: | ||
2872 | - Unbreak sshd_config's AuthorizedKeysFile option for $HOME-relative | ||
2873 | paths. | ||
2874 | - Include a language tag when sending a protocol 2 disconnection | ||
2875 | message. | ||
2876 | - Make logging of certificates used for user authentication more clear | ||
2877 | and consistent between CAs specified using TrustedUserCAKeys and | ||
2878 | authorized_keys. | ||
2879 | |||
2880 | -- Colin Watson <cjwatson@debian.org> Fri, 16 Apr 2010 10:27:30 +0100 | ||
2881 | |||
2882 | openssh (1:5.4p1-2) unstable; urgency=low | ||
2883 | |||
2884 | * Borrow patch from Fedora to add DNSSEC support: if glibc 2.11 is | ||
2885 | installed, the host key is published in an SSHFP RR secured with DNSSEC, | ||
2886 | and VerifyHostKeyDNS=yes, then ssh will no longer prompt for host key | ||
2887 | verification (closes: #572049). | ||
2888 | * Convert to dh(1), and use dh_installdocs --link-doc. | ||
2889 | * Drop lpia support, since Ubuntu no longer supports this architecture. | ||
2890 | * Use dh_install more effectively. | ||
2891 | * Add a NEWS.Debian entry about changes in smartcard support relative to | ||
2892 | previous unofficial builds (closes: #231472). | ||
2893 | |||
2894 | -- Colin Watson <cjwatson@debian.org> Sat, 10 Apr 2010 01:08:59 +0100 | ||
2895 | |||
2896 | openssh (1:5.4p1-1) unstable; urgency=low | ||
2897 | |||
2898 | * New upstream release (LP: #535029). | ||
2899 | - After a transition period of about 10 years, this release disables SSH | ||
2900 | protocol 1 by default. Clients and servers that need to use the | ||
2901 | legacy protocol must explicitly enable it in ssh_config / sshd_config | ||
2902 | or on the command-line. | ||
2903 | - Remove the libsectok/OpenSC-based smartcard code and add support for | ||
2904 | PKCS#11 tokens. This support is enabled by default in the Debian | ||
2905 | packaging, since it now doesn't involve additional library | ||
2906 | dependencies (closes: #231472, LP: #16918). | ||
2907 | - Add support for certificate authentication of users and hosts using a | ||
2908 | new, minimal OpenSSH certificate format (closes: #482806). | ||
2909 | - Added a 'netcat mode' to ssh(1): "ssh -W host:port ...". | ||
2910 | - Add the ability to revoke keys in sshd(8) and ssh(1). (For the Debian | ||
2911 | package, this overlaps with the key blacklisting facility added in | ||
2912 | openssh 1:4.7p1-9, but with different file formats and slightly | ||
2913 | different scopes; for the moment, I've roughly merged the two.) | ||
2914 | - Various multiplexing improvements, including support for requesting | ||
2915 | port-forwardings via the multiplex protocol (closes: #360151). | ||
2916 | - Allow setting an explicit umask on the sftp-server(8) commandline to | ||
2917 | override whatever default the user has (closes: #496843). | ||
2918 | - Many sftp client improvements, including tab-completion, more options, | ||
2919 | and recursive transfer support for get/put (LP: #33378). The old | ||
2920 | mget/mput commands never worked properly and have been removed | ||
2921 | (closes: #270399, #428082). | ||
2922 | - Do not prompt for a passphrase if we fail to open a keyfile, and log | ||
2923 | the reason why the open failed to debug (closes: #431538). | ||
2924 | - Prevent sftp from crashing when given a "-" without a command. Also, | ||
2925 | allow whitespace to follow a "-" (closes: #531561). | ||
2926 | |||
2927 | * Fix 'debian/rules quilt-setup' to avoid writing .orig files if some | ||
2928 | patches apply with offsets. | ||
2929 | * Include debian/ssh-askpass-gnome.png in the Debian tarball now that | ||
2930 | we're using a source format that permits this, rather than messing | ||
2931 | around with uudecode. | ||
2932 | * Drop compatibility with the old gssapi mechanism used in ssh-krb5 << | ||
2933 | 3.8.1p1-1. Simon Wilkinson refused this patch since the old gssapi | ||
2934 | mechanism was removed due to a serious security hole, and since these | ||
2935 | versions of ssh-krb5 are no longer security-supported by Debian I don't | ||
2936 | think there's any point keeping client compatibility for them. | ||
2937 | * Fix substitution of ETC_PAM_D_SSH, following the rename in 1:4.7p1-4. | ||
2938 | * Hardcode the location of xauth to /usr/bin/xauth rather than | ||
2939 | /usr/bin/X11/xauth (thanks, Aron Griffis; closes: #575725, LP: #8440). | ||
2940 | xauth no longer depends on x11-common, so we're no longer guaranteed to | ||
2941 | have the /usr/bin/X11 symlink available. I was taking advantage of the | ||
2942 | /usr/bin/X11 symlink to smooth X's move to /usr/bin, but this is far | ||
2943 | enough in the past now that it's probably safe to just use /usr/bin. | ||
2944 | * Remove SSHD_OOM_ADJUST configuration. sshd now unconditionally makes | ||
2945 | itself non-OOM-killable, and doesn't require configuration to avoid log | ||
2946 | spam in virtualisation containers (closes: #555625). | ||
2947 | * Drop Debian-specific removal of OpenSSL version check. Upstream ignores | ||
2948 | the two patchlevel nybbles now, which is sufficient to address the | ||
2949 | original reason this change was introduced, and it appears that any | ||
2950 | change in the major/minor/fix nybbles would involve a new libssl package | ||
2951 | name. (We'd still lose if the status nybble were ever changed, but that | ||
2952 | would mean somebody had packaged a development/beta version rather than | ||
2953 | a proper release, which doesn't appear to be normal practice.) | ||
2954 | * Drop most of our "LogLevel SILENT" (-qq) patch. This was originally | ||
2955 | introduced to match the behaviour of non-free SSH, in which -q does not | ||
2956 | suppress fatal errors, but matching the behaviour of OpenSSH upstream is | ||
2957 | much more important nowadays. We no longer document that -q does not | ||
2958 | suppress fatal errors (closes: #280609). Migrate "LogLevel SILENT" to | ||
2959 | "LogLevel QUIET" in sshd_config on upgrade. | ||
2960 | * Policy version 3.8.4: | ||
2961 | - Add a Homepage field. | ||
2962 | |||
2963 | -- Colin Watson <cjwatson@debian.org> Tue, 06 Apr 2010 22:38:31 +0100 | ||
2964 | |||
2965 | openssh (1:5.3p1-3) unstable; urgency=low | ||
2966 | |||
2967 | * Convert to source format 3.0 (quilt). | ||
2968 | * Update README.source to match, and add a 'quilt-setup' target to | ||
2969 | debian/rules for the benefit of those checking out the package from | ||
2970 | revision control. | ||
2971 | * All patches are now maintained separately and tagged according to DEP-3. | ||
2972 | * Add GSSAPIStoreCredentialsOnRekey to 'sshd -T' configuration dump. | ||
2973 | * Remove documentation of building for Debian 3.0 in README.Debian. | ||
2974 | Support for this was removed in 1:4.7p1-2. | ||
2975 | * Remove obsolete header from README.Debian dating from when people | ||
2976 | expected non-free SSH. | ||
2977 | * Update copyright years for GSSAPI patch. | ||
2978 | |||
2979 | -- Colin Watson <cjwatson@debian.org> Sun, 28 Feb 2010 01:35:53 +0000 | ||
2980 | |||
2981 | openssh (1:5.3p1-2) unstable; urgency=low | ||
2982 | |||
2983 | * Link with -Wl,--as-needed (closes: #560155). | ||
2984 | * Install upstream sshd_config as an example (closes: #415008). | ||
2985 | * Use dh_lintian. | ||
2986 | * Honour DEB_BUILD_OPTIONS=nocheck. | ||
2987 | |||
2988 | -- Colin Watson <cjwatson@debian.org> Mon, 22 Feb 2010 12:43:24 +0000 | ||
2989 | |||
2990 | openssh (1:5.3p1-1) unstable; urgency=low | ||
2991 | |||
2992 | * New upstream release. | ||
2993 | * Update to GSSAPI patch from | ||
2994 | http://www.sxw.org.uk/computing/patches/openssh-5.3p1-gsskex-all-20100124.patch. | ||
2995 | * Backport from upstream: | ||
2996 | - Do not fall back to adding keys without constraints (ssh-add -c / -t | ||
2997 | ...) when the agent refuses the constrained add request. This was a | ||
2998 | useful migration measure back in 2002 when constraints were new, but | ||
2999 | just adds risk now (LP: #209447). | ||
3000 | * Drop change from 1:3.8p1-3 to avoid setresuid() and setresgid() system | ||
3001 | calls. This only applied to Linux 2.2, which it's no longer feasible to | ||
3002 | run anyway (see 1:5.2p1-2 changelog). | ||
3003 | |||
3004 | -- Colin Watson <cjwatson@debian.org> Tue, 26 Jan 2010 11:55:29 +0000 | ||
3005 | |||
3006 | openssh (1:5.2p1-2) unstable; urgency=low | ||
3007 | |||
3008 | [ Colin Watson ] | ||
3009 | * Backport from upstream: | ||
3010 | - After sshd receives a SIGHUP, ignore subsequent HUPs while sshd | ||
3011 | re-execs itself. Prevents two HUPs in quick succession from resulting | ||
3012 | in sshd dying (LP: #497781). | ||
3013 | - Output a debug if we can't open an existing keyfile (LP: #505301). | ||
3014 | * Use host compiler for ssh-askpass-gnome when cross-compiling. | ||
3015 | * Don't run tests when cross-compiling. | ||
3016 | * Drop change from 1:3.6.1p2-5 to disable cmsg_type check for file | ||
3017 | descriptor passing when running on Linux 2.0. The previous stable | ||
3018 | release of Debian dropped support for Linux 2.4, let alone 2.0, so this | ||
3019 | very likely has no remaining users depending on it. | ||
3020 | |||
3021 | [ Kees Cook ] | ||
3022 | * Implement DebianBanner server configuration flag that can be set to "no" | ||
3023 | to allow sshd to run without the Debian-specific extra version in the | ||
3024 | initial protocol handshake (closes: #562048). | ||
3025 | |||
3026 | -- Colin Watson <cjwatson@debian.org> Sat, 16 Jan 2010 01:28:58 +0000 | ||
3027 | |||
3028 | openssh (1:5.2p1-1) unstable; urgency=low | ||
3029 | |||
3030 | * New upstream release (closes: #536182). Yes, I know 5.3p1 has been out | ||
3031 | for a while, but there's no GSSAPI patch available for it yet. | ||
3032 | - Change the default cipher order to prefer the AES CTR modes and the | ||
3033 | revised "arcfour256" mode to CBC mode ciphers that are susceptible to | ||
3034 | CPNI-957037 "Plaintext Recovery Attack Against SSH". | ||
3035 | - Add countermeasures to mitigate CPNI-957037-style attacks against the | ||
3036 | SSH protocol's use of CBC-mode ciphers. Upon detection of an invalid | ||
3037 | packet length or Message Authentication Code, ssh/sshd will continue | ||
3038 | reading up to the maximum supported packet length rather than | ||
3039 | immediately terminating the connection. This eliminates most of the | ||
3040 | known differences in behaviour that leaked information about the | ||
3041 | plaintext of injected data which formed the basis of this attack | ||
3042 | (closes: #506115, LP: #379329). | ||
3043 | - ForceCommand directive now accepts commandline arguments for the | ||
3044 | internal-sftp server (closes: #524423, LP: #362511). | ||
3045 | - Add AllowAgentForwarding to available Match keywords list (closes: | ||
3046 | #540623). | ||
3047 | - Make ssh(1) send the correct channel number for | ||
3048 | SSH2_MSG_CHANNEL_SUCCESS and SSH2_MSG_CHANNEL_FAILURE messages to | ||
3049 | avoid triggering 'Non-public channel' error messages on sshd(8) in | ||
3050 | openssh-5.1. | ||
3051 | - Avoid printing 'Non-public channel' warnings in sshd(8), since the | ||
3052 | ssh(1) has sent incorrect channel numbers since ~2004 (this reverts a | ||
3053 | behaviour introduced in openssh-5.1; closes: #496017). | ||
3054 | - Disable nonfunctional ssh(1) ~C escape handler in multiplex slave | ||
3055 | connections (closes: #507541). | ||
3056 | - Fix "whitepsace" typo in ssh_config(5) (closes: #514313, LP: #303835). | ||
3057 | * Update to GSSAPI patch from | ||
3058 | http://www.sxw.org.uk/computing/patches/openssh-5.2p1-gsskex-all-20090726.patch, | ||
3059 | including cascading credentials support (LP: #416958). | ||
3060 | * Use x11.pc when compiling/linking gnome-ssh-askpass2 (closes: #555951). | ||
3061 | * Moved to bzr.debian.org; add Vcs-Bzr and Vcs-Browser control fields. | ||
3062 | * Add debian/README.source with instructions on bzr handling. | ||
3063 | * Make ChrootDirectory work with SELinux (thanks, Russell Coker; closes: | ||
3064 | #556644). | ||
3065 | * Initialise sc to NULL in ssh_selinux_getctxbyname (thanks, Václav OvsÃk; | ||
3066 | closes: #498684). | ||
3067 | * Don't duplicate backslashes when displaying server banner (thanks, | ||
3068 | Michał Górny; closes: #505378, LP: #425346). | ||
3069 | * Use hardening-includes for hardening logic (thanks, Kees Cook; closes: | ||
3070 | #561887). | ||
3071 | * Update OpenSSH FAQ to revision 1.110. | ||
3072 | * Remove ssh/new_config, only needed for direct upgrades from potato which | ||
3073 | are no longer particularly feasible anyway (closes: #420682). | ||
3074 | * Cope with insserv reordering of init script links. | ||
3075 | * Remove init script stop link in rc1, as killprocs handles it already. | ||
3076 | * Adjust short descriptions to avoid relying on previous experience with | ||
3077 | rsh, based on suggestions from Reuben Thomas (closes: #512198). | ||
3078 | * Remove manual page references to login.conf, which aren't applicable on | ||
3079 | non-BSD systems (closes: #154434). | ||
3080 | * Remove/adjust manual page references to BSD-specific /etc/rc (closes: | ||
3081 | #513417). | ||
3082 | * Refer to sshd_config(5) rather than sshd(8) in postinst-written | ||
3083 | /etc/ssh/sshd_config, and add UsePAM commentary from upstream-shipped | ||
3084 | configuration file (closes: #415008, although unfortunately this will | ||
3085 | only be conveniently visible on new installations). | ||
3086 | * Include URL to OpenBSD's ssl(8) in ssh(1), since I don't see a better | ||
3087 | source for the same information among Debian's manual pages (closes: | ||
3088 | #530692, LP: #456660). | ||
3089 | |||
3090 | -- Colin Watson <cjwatson@debian.org> Mon, 04 Jan 2010 13:23:35 +0000 | ||
3091 | |||
3092 | openssh (1:5.1p1-8) unstable; urgency=low | ||
3093 | |||
3094 | * Build with just -fPIC on mips/mipsel, not -fPIE as well (thanks, LIU Qi; | ||
3095 | closes: #538313). | ||
3096 | * Build-depend on libselinux1-dev on sh4 too (thanks, Nobuhiro Iwamatsu; | ||
3097 | closes: #547103). | ||
3098 | * Fix grammar in if-up script (closes: #549128). | ||
3099 | * Pass $SSHD_OPTS when checking configuration too (thanks, "sobtwmxt"; | ||
3100 | closes: #548662). | ||
3101 | |||
3102 | -- Colin Watson <cjwatson@debian.org> Mon, 05 Oct 2009 13:30:49 +0100 | ||
3103 | |||
3104 | openssh (1:5.1p1-7) unstable; urgency=low | ||
3105 | |||
3106 | * Update config.guess and config.sub from autotools-dev 20090611.1 | ||
3107 | (closes: #538301). | ||
3108 | * Set umask to 022 in the init script as well as postinsts (closes: | ||
3109 | #539030). | ||
3110 | * Add ${misc:Depends} to keep Lintian happy. | ||
3111 | * Use 'which' rather than 'type' in maintainer scripts. | ||
3112 | * Upgrade to debhelper v7. | ||
3113 | |||
3114 | -- Colin Watson <cjwatson@debian.org> Fri, 31 Jul 2009 16:28:10 +0100 | ||
3115 | |||
3116 | openssh (1:5.1p1-6) unstable; urgency=low | ||
3117 | |||
3118 | * Open /proc/self/oom_adj with O_RDONLY or O_WRONLY as necessary, rather | ||
3119 | than O_RDWR. | ||
3120 | * Disable OOM adjustment for vserver/OpenVZ (thanks, Karl Chen; closes: | ||
3121 | #511771). | ||
3122 | * Add ufw integration (thanks, Didier Roche; see | ||
3123 | https://wiki.ubuntu.com/UbuntuFirewall#Integrating%20UFW%20with%20Packages; | ||
3124 | LP: #261884). | ||
3125 | * Add a comment above PermitRootLogin in sshd_config pointing to | ||
3126 | README.Debian. | ||
3127 | * Check if delgroup is present in openssh-client.postrm (closes: #530501). | ||
3128 | * Build with -fPIC on mips/mipsel (thanks, Luk Claes; closes: #531942). | ||
3129 | * Remove /var/run/sshd from openssh-server package; it will be created at | ||
3130 | run-time before starting the server. | ||
3131 | * Use invoke-rc.d in openssh-server's if-up script. | ||
3132 | |||
3133 | -- Colin Watson <cjwatson@debian.org> Fri, 05 Jun 2009 11:56:03 +0100 | ||
3134 | |||
3135 | openssh (1:5.1p1-5) unstable; urgency=low | ||
3136 | |||
3137 | * Backport from upstream CVS (Markus Friedl): | ||
3138 | - packet_disconnect() on padding error, too. Should reduce the success | ||
3139 | probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18. | ||
3140 | * Check that /var/run/sshd.pid exists and that the process ID listed there | ||
3141 | corresponds to sshd before running '/etc/init.d/ssh reload' from if-up | ||
3142 | script; SIGHUP is racy if called at boot before sshd has a chance to | ||
3143 | install its signal handler, but fortunately the pid file is written | ||
3144 | after that which lets us avoid the race (closes: #502444). | ||
3145 | * While the above is a valuable sanity-check, it turns out that it doesn't | ||
3146 | really fix the bug (thanks to Kevin Price for testing), so for the | ||
3147 | meantime we'll just use '/etc/init.d/ssh restart', even though it is | ||
3148 | unfortunately heavyweight. | ||
3149 | |||
3150 | -- Colin Watson <cjwatson@debian.org> Wed, 14 Jan 2009 00:34:08 +0000 | ||
3151 | |||
3152 | openssh (1:5.1p1-4) unstable; urgency=low | ||
3153 | |||
3154 | * ssh-copy-id: Strip trailing colons from hostname (closes: #226172, | ||
3155 | LP: #249706; thanks to Karl Goetz for nudging this along; forwarded | ||
3156 | upstream as https://bugzilla.mindrot.org/show_bug.cgi?id=1530). | ||
3157 | * Backport from upstream CVS (Markus Friedl): | ||
3158 | - Only send eow and no-more-sessions requests to openssh 5 and newer; | ||
3159 | fixes interop problems with broken ssh v2 implementations (closes: | ||
3160 | #495917). | ||
3161 | * Fix double-free when failing to parse a forwarding specification given | ||
3162 | using ~C (closes: #505330; forwarded upstream as | ||
3163 | https://bugzilla.mindrot.org/show_bug.cgi?id=1539). | ||
3164 | |||
3165 | -- Colin Watson <cjwatson@debian.org> Sun, 23 Nov 2008 14:46:10 +0000 | ||
3166 | |||
3167 | openssh (1:5.1p1-3) unstable; urgency=low | ||
3168 | |||
3169 | * Remove unnecessary ssh-vulnkey output in non-verbose mode when no | ||
3170 | compromised or unknown keys were found (closes: #496495). | ||
3171 | * Configure with --disable-strip; dh_strip will deal with stripping | ||
3172 | binaries and will honour DEB_BUILD_OPTIONS (thanks, Bernhard R. Link; | ||
3173 | closes: #498681). | ||
3174 | * Fix handling of zero-length server banners (thanks, Tomas Mraz; closes: | ||
3175 | #497026). | ||
3176 | |||
3177 | -- Colin Watson <cjwatson@debian.org> Tue, 30 Sep 2008 23:09:58 +0100 | ||
3178 | |||
3179 | openssh (1:5.1p1-2) unstable; urgency=low | ||
3180 | |||
3181 | * Look for $SHELL on the path when executing ProxyCommands or | ||
3182 | LocalCommands (closes: #492728). | ||
3183 | |||
3184 | -- Colin Watson <cjwatson@debian.org> Tue, 29 Jul 2008 15:31:25 +0100 | ||
3185 | |||
3186 | openssh (1:5.1p1-1) unstable; urgency=low | ||
3187 | |||
3188 | * New upstream release (closes: #474301). Important changes not previously | ||
3189 | backported to 4.7p1: | ||
3190 | - 4.9/4.9p1 (http://www.openssh.com/txt/release-4.9): | ||
3191 | + Added chroot(2) support for sshd(8), controlled by a new option | ||
3192 | "ChrootDirectory" (closes: #139047, LP: #24777). | ||
3193 | + Linked sftp-server(8) into sshd(8). The internal sftp server is used | ||
3194 | when the command "internal-sftp" is specified in a Subsystem or | ||
3195 | ForceCommand declaration. When used with ChrootDirectory, the | ||
3196 | internal sftp server requires no special configuration of files | ||
3197 | inside the chroot environment. | ||
3198 | + Added a protocol extension method "posix-rename@openssh.com" for | ||
3199 | sftp-server(8) to perform POSIX atomic rename() operations; sftp(1) | ||
3200 | prefers this if available (closes: #308561). | ||
3201 | + Removed the fixed limit of 100 file handles in sftp-server(8). | ||
3202 | + ssh(8) will now skip generation of SSH protocol 1 ephemeral server | ||
3203 | keys when in inetd mode and protocol 2 connections are negotiated. | ||
3204 | This speeds up protocol 2 connections to inetd-mode servers that | ||
3205 | also allow Protocol 1. | ||
3206 | + Accept the PermitRootLogin directive in a sshd_config(5) Match | ||
3207 | block. Allows for, e.g. permitting root only from the local network. | ||
3208 | + Reworked sftp(1) argument splitting and escaping to be more | ||
3209 | internally consistent (i.e. between sftp commands) and more | ||
3210 | consistent with sh(1). Please note that this will change the | ||
3211 | interpretation of some quoted strings, especially those with | ||
3212 | embedded backslash escape sequences. | ||
3213 | + Support "Banner=none" in sshd_config(5) to disable sending of a | ||
3214 | pre-login banner (e.g. in a Match block). | ||
3215 | + ssh(1) ProxyCommands are now executed with $SHELL rather than | ||
3216 | /bin/sh. | ||
3217 | + ssh(1)'s ConnectTimeout option is now applied to both the TCP | ||
3218 | connection and the SSH banner exchange (previously it just covered | ||
3219 | the TCP connection). This allows callers of ssh(1) to better detect | ||
3220 | and deal with stuck servers that accept a TCP connection but don't | ||
3221 | progress the protocol, and also makes ConnectTimeout useful for | ||
3222 | connections via a ProxyCommand. | ||
3223 | + scp(1) incorrectly reported "stalled" on slow copies (closes: | ||
3224 | #140828). | ||
3225 | + scp(1) date underflow for timestamps before epoch. | ||
3226 | + ssh(1) used the obsolete SIG DNS RRtype for host keys in DNS, | ||
3227 | instead of the current standard RRSIG. | ||
3228 | + Correctly drain ACKs when a sftp(1) upload write fails midway, | ||
3229 | avoids a fatal() exit from what should be a recoverable condition. | ||
3230 | + Fixed ssh-keygen(1) selective host key hashing (i.e. "ssh-keygen -HF | ||
3231 | hostname") to not include any IP address in the data to be hashed. | ||
3232 | + Make ssh(1) skip listening on the IPv6 wildcard address when a | ||
3233 | binding address of 0.0.0.0 is used against an old SSH server that | ||
3234 | does not support the RFC4254 syntax for wildcard bind addresses. | ||
3235 | + Enable IPV6_V6ONLY socket option on sshd(8) listen socket, as is | ||
3236 | already done for X11/TCP forwarding sockets (closes: #439661). | ||
3237 | + Fix FD leak that could hang a ssh(1) connection multiplexing master. | ||
3238 | + Make ssh(1) -q option documentation consistent with reality. | ||
3239 | + Fixed sshd(8) PAM support not calling pam_session_close(), or | ||
3240 | failing to call it with root privileges (closes: #372680). | ||
3241 | + Fix activation of OpenSSL engine support when requested in configure | ||
3242 | (LP: #119295). | ||
3243 | + Cache SELinux status earlier so we know if it's enabled after a | ||
3244 | chroot (LP: #237557). | ||
3245 | - 5.1/5.1p1 (http://www.openssh.com/txt/release-5.1): | ||
3246 | + Introduce experimental SSH Fingerprint ASCII Visualisation to ssh(1) | ||
3247 | and ssh-keygen(1). Visual fingerprint display is controlled by a new | ||
3248 | ssh_config(5) option "VisualHostKey". The intent is to render SSH | ||
3249 | host keys in a visual form that is amenable to easy recall and | ||
3250 | rejection of changed host keys. | ||
3251 | + sshd_config(5) now supports CIDR address/masklen matching in "Match | ||
3252 | address" blocks, with a fallback to classic wildcard matching. | ||
3253 | + sshd(8) now supports CIDR matching in ~/.ssh/authorized_keys | ||
3254 | from="..." restrictions, also with a fallback to classic wildcard | ||
3255 | matching. | ||
3256 | + Added an extended test mode (-T) to sshd(8) to request that it write | ||
3257 | its effective configuration to stdout and exit. Extended test mode | ||
3258 | also supports the specification of connection parameters (username, | ||
3259 | source address and hostname) to test the application of | ||
3260 | sshd_config(5) Match rules. | ||
3261 | + ssh(1) now prints the number of bytes transferred and the overall | ||
3262 | connection throughput for SSH protocol 2 sessions when in verbose | ||
3263 | mode (previously these statistics were displayed for protocol 1 | ||
3264 | connections only). | ||
3265 | + sftp-server(8) now supports extension methods statvfs@openssh.com | ||
3266 | and fstatvfs@openssh.com that implement statvfs(2)-like operations. | ||
3267 | + sftp(1) now has a "df" command to the sftp client that uses the | ||
3268 | statvfs@openssh.com to produce a df(1)-like display of filesystem | ||
3269 | space and inode utilisation (requires statvfs@openssh.com support on | ||
3270 | the server). | ||
3271 | + Added a MaxSessions option to sshd_config(5) to allow control of the | ||
3272 | number of multiplexed sessions supported over a single TCP | ||
3273 | connection. This allows increasing the number of allowed sessions | ||
3274 | above the previous default of 10, disabling connection multiplexing | ||
3275 | (MaxSessions=1) or disallowing login/shell/subsystem sessions | ||
3276 | entirely (MaxSessions=0). | ||
3277 | + Added a no-more-sessions@openssh.com global request extension that | ||
3278 | is sent from ssh(1) to sshd(8) when the client knows that it will | ||
3279 | never request another session (i.e. when session multiplexing is | ||
3280 | disabled). This allows a server to disallow further session requests | ||
3281 | and terminate the session in cases where the client has been | ||
3282 | hijacked. | ||
3283 | + ssh-keygen(1) now supports the use of the -l option in combination | ||
3284 | with -F to search for a host in ~/.ssh/known_hosts and display its | ||
3285 | fingerprint. | ||
3286 | + ssh-keyscan(1) now defaults to "rsa" (protocol 2) keys, instead of | ||
3287 | "rsa1" (LP: #129794). | ||
3288 | + Added an AllowAgentForwarding option to sshd_config(8) to control | ||
3289 | whether authentication agent forwarding is permitted. Note that this | ||
3290 | is a loose control, as a client may install their own unofficial | ||
3291 | forwarder. | ||
3292 | + ssh(1) and sshd(8): avoid unnecessary malloc/copy/free when | ||
3293 | receiving network data, resulting in a ~10% speedup. | ||
3294 | + ssh(1) and sshd(8) will now try additional addresses when connecting | ||
3295 | to a port forward destination whose DNS name resolves to more than | ||
3296 | one address. The previous behaviour was to try the only first | ||
3297 | address and give up if that failed. | ||
3298 | + ssh(1) and sshd(8) now support signalling that channels are | ||
3299 | half-closed for writing, through a channel protocol extension | ||
3300 | notification "eow@openssh.com". This allows propagation of closed | ||
3301 | file descriptors, so that commands such as "ssh -2 localhost od | ||
3302 | /bin/ls | true" do not send unnecessary data over the wire. | ||
3303 | + sshd(8): increased the default size of ssh protocol 1 ephemeral keys | ||
3304 | from 768 to 1024 bits. | ||
3305 | + When ssh(1) has been requested to fork after authentication ("ssh | ||
3306 | -f") with ExitOnForwardFailure enabled, delay the fork until after | ||
3307 | replies for any -R forwards have been seen. Allows for robust | ||
3308 | detection of -R forward failure when using -f. | ||
3309 | + "Match group" blocks in sshd_config(5) now support negation of | ||
3310 | groups. E.g. "Match group staff,!guests". | ||
3311 | + sftp(1) and sftp-server(8) now allow chmod-like operations to set | ||
3312 | set[ug]id/sticky bits. | ||
3313 | + The MaxAuthTries option is now permitted in sshd_config(5) match | ||
3314 | blocks. | ||
3315 | + Multiplexed ssh(1) sessions now support a subset of the ~ escapes | ||
3316 | that are available to a primary connection. | ||
3317 | + ssh(1) connection multiplexing will now fall back to creating a new | ||
3318 | connection in most error cases (closes: #352830). | ||
3319 | + Make ssh(1) deal more gracefully with channel requests that fail. | ||
3320 | Previously it would optimistically assume that requests would always | ||
3321 | succeed, which could cause hangs if they did not (e.g. when the | ||
3322 | server runs out of file descriptors). | ||
3323 | + ssh(1) now reports multiplexing errors via the multiplex slave's | ||
3324 | stderr where possible (subject to LogLevel in the mux master). | ||
3325 | + Fixed an UMAC alignment problem that manifested on Itanium | ||
3326 | platforms. | ||
3327 | * Remove our local version of moduli(5) now that there's one upstream. | ||
3328 | * Say "GTK+" rather than "GTK" in ssh-askpass-gnome's description. | ||
3329 | * Add lintian overrides for empty /usr/share/doc/openssh-client | ||
3330 | directories in openssh-server and ssh (necessary due to being symlink | ||
3331 | targets). | ||
3332 | * Merge from Ubuntu: | ||
3333 | - Add 'status' action to openssh-server init script, requiring lsb-base | ||
3334 | (>= 3.2-13) (thanks, Dustin Kirkland). | ||
3335 | * debconf template translations: | ||
3336 | - Update Korean (thanks, Sunjae Park; closes: #484821). | ||
3337 | |||
3338 | -- Colin Watson <cjwatson@debian.org> Fri, 25 Jul 2008 10:45:08 +0100 | ||
3339 | |||
3340 | openssh (1:4.7p1-13) unstable; urgency=low | ||
3341 | |||
3342 | * Add some helpful advice to the end of ssh-vulnkey's output if there are | ||
3343 | unknown or compromised keys (thanks, Dan Jacobson; closes: #483756). | ||
3344 | * Check compromised key blacklist in ssh or ssh-add, as well as in the | ||
3345 | server (LP: #232391). To override the blacklist check in ssh | ||
3346 | temporarily, use 'ssh -o UseBlacklistedKeys=yes'; there is no override | ||
3347 | for the blacklist check in ssh-add. | ||
3348 | * Add cross-references to ssh-vulnkey(1) to ssh(1), ssh-add(1), | ||
3349 | ssh-keygen(1), and sshd(8) (closes: #484451). | ||
3350 | * Change openssh-client-udeb's Installer-Menu-Item from 99900 to 99999 | ||
3351 | (thanks, Frans Pop). | ||
3352 | * Drop openssh-client-udeb isinstallable hack, as main-menu (>= 1.26) now | ||
3353 | takes care of that (thanks, Frans Pop; closes: #484404). | ||
3354 | * Update DEB_BUILD_OPTIONS parsing code from policy 3.8.0. | ||
3355 | * Add documentation on removing openssh-blacklist locally (see #484269). | ||
3356 | * Clarify documentation of SSHD_OOM_ADJUST, and make setting it to the | ||
3357 | empty string actually skip adjustment as intended (closes: #487325). | ||
3358 | * Remove empty /usr/share/applications directory in ssh-askpass-gnome. | ||
3359 | * debconf template translations: | ||
3360 | - Update Romanian (thanks, Cătălin Feștilă; closes: #485415). | ||
3361 | |||
3362 | -- Colin Watson <cjwatson@debian.org> Mon, 21 Jul 2008 12:18:28 +0100 | ||
3363 | |||
3364 | openssh (1:4.7p1-12) unstable; urgency=low | ||
3365 | |||
3366 | * Fill in CVE identifier for ssh-vulnkey bug fixed in 1:4.7p1-10. | ||
3367 | * Refactor rejection of blacklisted user keys into a single | ||
3368 | reject_blacklisted_key function in auth.c (thanks, Dmitry V. Levin). | ||
3369 | * Fix memory leak of blacklisted host keys (thanks, Dmitry V. Levin). | ||
3370 | * debconf template translations: | ||
3371 | - Update Dutch (thanks, Bart Cornelis; closes: #483004). | ||
3372 | - Update Brazilian Portuguese (thanks, Eder L. Marques; closes: | ||
3373 | #483142). | ||
3374 | - Update Slovak (thanks, Ivan Masár; closes: #483517). | ||
3375 | |||
3376 | -- Colin Watson <cjwatson@debian.org> Thu, 29 May 2008 21:41:29 +0100 | ||
3377 | |||
3378 | openssh (1:4.7p1-11) unstable; urgency=low | ||
3379 | |||
3380 | * Make init script depend on $syslog, and fix some other dependency | ||
3381 | glitches (thanks, Petter Reinholdtsen; closes: #481018). | ||
3382 | * Remove 0 and 6 from Default-Stop in init script (thanks, Kel Modderman; | ||
3383 | closes: #481151). | ||
3384 | * Restore OOM killer adjustment for child processes (thanks, Vaclav Ovsik; | ||
3385 | closes: #480020). | ||
3386 | * Allow building with heimdal-dev (LP: #125805). | ||
3387 | |||
3388 | * Check RSA1 keys without the need for a separate blacklist. Thanks to | ||
3389 | Simon Tatham for the idea. | ||
3390 | * Generate two keys with the PID forced to the same value and test that | ||
3391 | they differ, to defend against recurrences of the recent Debian OpenSSL | ||
3392 | vulnerability. | ||
3393 | * Recommend openssh-blacklist from openssh-client (closes: #481187). | ||
3394 | * Recommend openssh-blacklist-extra from openssh-client and | ||
3395 | openssh-server. | ||
3396 | * Make ssh-vulnkey report the file name and line number for each key | ||
3397 | (thanks, Heiko Schlittermann and Christopher Perry; closes: #481398). | ||
3398 | * Check for blacklists in /usr/share/ssh/ as well as /etc/ssh/ (see | ||
3399 | #481283). | ||
3400 | * Log IP addresses of hosts attempting to use blacklisted keys (closes: | ||
3401 | #481721). | ||
3402 | * Incorporate various ssh-vulnkey suggestions from Hugh Daniel: | ||
3403 | - Add -v (verbose) option, and don't print output for keys that have a | ||
3404 | blacklist file but that are not listed unless in verbose mode. | ||
3405 | - Move exit status documentation to a separate section. | ||
3406 | - Document key status descriptions. | ||
3407 | - Add key type to output. | ||
3408 | - Fix error output if ssh-vulnkey fails to read key files, with the | ||
3409 | exception of host keys unless -a was given. | ||
3410 | - In verbose mode, output the name of each file examined. | ||
3411 | * Handle leading IP addresses in ssh-vulnkey input (LP: #230497). | ||
3412 | * Fix various ssh-vulnkey problems pointed out by Solar Designer: | ||
3413 | - Fix some buffer handling inconsistencies. | ||
3414 | - Use xasprintf to build user key file names, avoiding truncation | ||
3415 | problems. | ||
3416 | - Drop to the user's UID when reading user keys with -a. | ||
3417 | - Use EUID rather than UID when run with no file names and without -a. | ||
3418 | - Reword "Unknown (no blacklist information)" to "Unknown (blacklist | ||
3419 | file not installed)". | ||
3420 | |||
3421 | * Fix typo in ssh/vulnerable_host_keys message (thanks, Esko Arajärvi). | ||
3422 | * debconf template translations: | ||
3423 | - Update Finnish (thanks, Esko Arajärvi; closes: #481530). | ||
3424 | - Update French (thanks, Christian Perrier; closes: #481576). | ||
3425 | - Update Norwegian Bokmål (thanks, Bjørn Steensrud; closes: #481591). | ||
3426 | - Update Galician (thanks, Jacobo Tarrio; closes: #481596). | ||
3427 | - Update Japanese (thanks, Kenshi Muto; closes: #481621). | ||
3428 | - Update Czech (thanks, Miroslav Kure; closes: #481624). | ||
3429 | - Update German (thanks, Helge Kreutzmann; closes: #481676). | ||
3430 | - Update Portuguese (thanks, Ricardo Silva; closes: #481781). | ||
3431 | - Update Basque (thanks, Piarres Beobide; closes: #481836). | ||
3432 | - Update Bulgarian (thanks, Damyan Ivanov; closes: #481870). | ||
3433 | - Update Vietnamese (thanks, Clytie Siddall; closes: #481876). | ||
3434 | - Update Spanish (thanks, Javier Fernandez-Sanguino Peña; closes: | ||
3435 | #482341). | ||
3436 | - Update Turkish (thanks, Mert Dirik; closes: #482548). | ||
3437 | - Update Russian (thanks, Yuri Kozlov; closes: #482887). | ||
3438 | - Update Swedish (thanks, Martin Bagge; closes: #482464). | ||
3439 | - Update Italian (thanks, Luca Monducci; closes: #482808). | ||
3440 | |||
3441 | -- Colin Watson <cjwatson@debian.org> Mon, 26 May 2008 12:21:39 +0100 | ||
3442 | |||
3443 | openssh (1:4.7p1-10) unstable; urgency=low | ||
3444 | |||
3445 | * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). | ||
3446 | * CVE-2008-2285: ssh-vulnkey handles options in authorized_keys | ||
3447 | (LP: #230029), and treats # as introducing a comment even if it is | ||
3448 | preceded by whitespace. | ||
3449 | |||
3450 | -- Colin Watson <cjwatson@debian.org> Wed, 14 May 2008 12:35:05 +0100 | ||
3451 | |||
3452 | openssh (1:4.7p1-9) unstable; urgency=critical | ||
3453 | |||
3454 | * Fill in CVE identifier for security vulnerability fixed in 1:4.7p1-8. | ||
3455 | * Mitigate OpenSSL security vulnerability (CVE-2008-0166): | ||
3456 | - Add key blacklisting support. Keys listed in | ||
3457 | /etc/ssh/blacklist.TYPE-LENGTH will be rejected for authentication by | ||
3458 | sshd, unless "PermitBlacklistedKeys yes" is set in | ||
3459 | /etc/ssh/sshd_config. | ||
3460 | - Add a new program, ssh-vulnkey, which can be used to check keys | ||
3461 | against these blacklists. | ||
3462 | - Depend on openssh-blacklist. | ||
3463 | - Force dependencies on libssl0.9.8 / libcrypto0.9.8-udeb to at least | ||
3464 | 0.9.8g-9. | ||
3465 | - Automatically regenerate known-compromised host keys, with a | ||
3466 | critical-priority debconf note. (I regret that there was no time to | ||
3467 | gather translations.) | ||
3468 | |||
3469 | -- Colin Watson <cjwatson@debian.org> Tue, 13 May 2008 12:33:38 +0100 | ||
3470 | |||
3471 | openssh (1:4.7p1-8) unstable; urgency=high | ||
3472 | |||
3473 | * Fill in CVE identifier for security vulnerability fixed in 1:4.7p1-5. | ||
3474 | * Rename KeepAlive to TCPKeepAlive in sshd_config, cleaning up from old | ||
3475 | configurations (LP: #211400). | ||
3476 | * Tweak scp's reporting of filenames in verbose mode to be a bit less | ||
3477 | confusing with spaces (thanks, Nicolas Valcárcel; LP: #89945). | ||
3478 | * Backport from 4.9p1: | ||
3479 | - CVE-2008-1657: Ignore ~/.ssh/rc if a sshd_config ForceCommand is | ||
3480 | specified. | ||
3481 | - Add no-user-rc authorized_keys option to disable execution of | ||
3482 | ~/.ssh/rc. | ||
3483 | * Backport from Simon Wilkinson's GSSAPI key exchange patch for 5.0p1: | ||
3484 | - Add code to actually implement GSSAPIStrictAcceptorCheck, which had | ||
3485 | somehow been omitted from a previous version of this patch (closes: | ||
3486 | #474246). | ||
3487 | |||
3488 | -- Colin Watson <cjwatson@debian.org> Sun, 06 Apr 2008 12:34:19 +0100 | ||
3489 | |||
3490 | openssh (1:4.7p1-7) unstable; urgency=low | ||
3491 | |||
3492 | * Ignore errors writing to oom_adj (closes: #473573). | ||
3493 | |||
3494 | -- Colin Watson <cjwatson@debian.org> Mon, 31 Mar 2008 16:24:44 +0100 | ||
3495 | |||
3496 | openssh (1:4.7p1-6) unstable; urgency=low | ||
3497 | |||
3498 | * Disable the Linux kernel's OOM-killer for the sshd parent; tweak | ||
3499 | SSHD_OOM_ADJUST in /etc/default/ssh to change this (closes: #341767). | ||
3500 | |||
3501 | -- Colin Watson <cjwatson@debian.org> Sun, 30 Mar 2008 21:14:12 +0100 | ||
3502 | |||
3503 | openssh (1:4.7p1-5) unstable; urgency=low | ||
3504 | |||
3505 | * Recommends: xauth rather than Suggests: xbase-clients. | ||
3506 | * Document in ssh(1) that '-S none' disables connection sharing | ||
3507 | (closes: #471437). | ||
3508 | * Patch from Red Hat / Fedora: | ||
3509 | - CVE-2008-1483: Don't use X11 forwarding port which can't be bound on | ||
3510 | all address families, preventing hijacking of X11 forwarding by | ||
3511 | unprivileged users when both IPv4 and IPv6 are configured (closes: | ||
3512 | #463011). | ||
3513 | * Use printf rather than echo -en (a bashism) in openssh-server.config and | ||
3514 | openssh-server.preinst. | ||
3515 | * debconf template translations: | ||
3516 | - Update Finnish (thanks, Esko Arajärvi; closes: #468563). | ||
3517 | |||
3518 | -- Colin Watson <cjwatson@debian.org> Sat, 22 Mar 2008 12:37:00 +0000 | ||
3519 | |||
3520 | openssh (1:4.7p1-4) unstable; urgency=low | ||
3521 | |||
3522 | [ Caleb Case ] | ||
3523 | * Fix configure detection of getseuserbyname and | ||
3524 | get_default_context_with_level (closes: #465614, LP: #188136). | ||
3525 | |||
3526 | [ Colin Watson ] | ||
3527 | * Include the autogenerated debian/copyright in the source package. | ||
3528 | * Move /etc/pam.d/ssh to /etc/pam.d/sshd, allowing us to stop defining | ||
3529 | SSHD_PAM_SERVICE (closes: #255870). | ||
3530 | |||
3531 | -- Colin Watson <cjwatson@debian.org> Wed, 13 Feb 2008 18:18:52 +0000 | ||
3532 | |||
3533 | openssh (1:4.7p1-3) unstable; urgency=low | ||
3534 | |||
3535 | * Improve grammar of ssh-askpass-gnome description. | ||
3536 | * Backport from upstream: | ||
3537 | - Use the correct packet maximum sizes for remote port and agent | ||
3538 | forwarding. Prevents the server from killing the connection if too | ||
3539 | much data is queued and an excessively large packet gets sent | ||
3540 | (https://bugzilla.mindrot.org/show_bug.cgi?id=1360). | ||
3541 | * Allow passing temporary daemon parameters on the init script's command | ||
3542 | line, e.g. '/etc/init.d/ssh start "-o PermitRootLogin=yes"' (thanks, | ||
3543 | Marc Haber; closes: #458547). | ||
3544 | |||
3545 | -- Colin Watson <cjwatson@debian.org> Fri, 01 Feb 2008 21:59:59 +0000 | ||
3546 | |||
3547 | openssh (1:4.7p1-2) unstable; urgency=low | ||
3548 | |||
3549 | * Adjust many relative links in faq.html to point to | ||
3550 | http://www.openssh.com/ (thanks, Dan Jacobson; mentioned in #459807). | ||
3551 | * Pass --with-mantype=doc to configure rather than build-depending on | ||
3552 | groff (closes: #460121). | ||
3553 | * Add armel to architecture list for libselinux1-dev build-dependency | ||
3554 | (closes: #460136). | ||
3555 | * Drop source-compatibility with Debian 3.0: | ||
3556 | - Remove support for building with GNOME 1. This allows simplification | ||
3557 | of our GNOME build-dependencies (see #460136). | ||
3558 | - Remove hacks to support the old PAM configuration scheme. | ||
3559 | - Remove compatibility for building without po-debconf. | ||
3560 | * Build-depend on libgtk2.0-dev rather than libgnomeui-dev. As far as I | ||
3561 | can see, the GTK2 version of ssh-askpass-gnome has never required | ||
3562 | libgnomeui-dev. | ||
3563 | |||
3564 | -- Colin Watson <cjwatson@debian.org> Fri, 11 Jan 2008 00:14:10 +0000 | ||
3565 | |||
3566 | openssh (1:4.7p1-1) unstable; urgency=low | ||
3567 | |||
3568 | * New upstream release (closes: #453367). | ||
3569 | - CVE-2007-4752: Prevent ssh(1) from using a trusted X11 cookie if | ||
3570 | creation of an untrusted cookie fails; found and fixed by Jan Pechanec | ||
3571 | (closes: #444738). | ||
3572 | - sshd(8) in new installations defaults to SSH Protocol 2 only. Existing | ||
3573 | installations are unchanged. | ||
3574 | - The SSH channel window size has been increased, and both ssh(1) | ||
3575 | sshd(8) now send window updates more aggressively. These improves | ||
3576 | performance on high-BDP (Bandwidth Delay Product) networks. | ||
3577 | - ssh(1) and sshd(8) now preserve MAC contexts between packets, which | ||
3578 | saves 2 hash calls per packet and results in 12-16% speedup for | ||
3579 | arcfour256/hmac-md5. | ||
3580 | - A new MAC algorithm has been added, UMAC-64 (RFC4418) as | ||
3581 | "umac-64@openssh.com". UMAC-64 has been measured to be approximately | ||
3582 | 20% faster than HMAC-MD5. | ||
3583 | - Failure to establish a ssh(1) TunnelForward is now treated as a fatal | ||
3584 | error when the ExitOnForwardFailure option is set. | ||
3585 | - ssh(1) returns a sensible exit status if the control master goes away | ||
3586 | without passing the full exit status. | ||
3587 | - When using a ProxyCommand in ssh(1), set the outgoing hostname with | ||
3588 | gethostname(2), allowing hostbased authentication to work. | ||
3589 | - Make scp(1) skip FIFOs rather than hanging (closes: #246774). | ||
3590 | - Encode non-printing characters in scp(1) filenames. These could cause | ||
3591 | copies to be aborted with a "protocol error". | ||
3592 | - Handle SIGINT in sshd(8) privilege separation child process to ensure | ||
3593 | that wtmp and lastlog records are correctly updated. | ||
3594 | - Report GSSAPI mechanism in errors, for libraries that support multiple | ||
3595 | mechanisms. | ||
3596 | - Improve documentation for ssh-add(1)'s -d option. | ||
3597 | - Rearrange and tidy GSSAPI code, removing server-only code being linked | ||
3598 | into the client. | ||
3599 | - Delay execution of ssh(1)'s LocalCommand until after all forwardings | ||
3600 | have been established. | ||
3601 | - In scp(1), do not truncate non-regular files. | ||
3602 | - Improve exit message from ControlMaster clients. | ||
3603 | - Prevent sftp-server(8) from reading until it runs out of buffer space, | ||
3604 | whereupon it would exit with a fatal error (closes: #365541). | ||
3605 | - pam_end() was not being called if authentication failed | ||
3606 | (closes: #405041). | ||
3607 | - Manual page datestamps updated (closes: #433181). | ||
3608 | * Install the OpenSSH FAQ in /usr/share/doc/openssh-client. | ||
3609 | - Includes documentation on copying files with colons using scp | ||
3610 | (closes: #303453). | ||
3611 | * Create /var/run/sshd on start even if /etc/ssh/sshd_not_to_be_run exists | ||
3612 | (closes: #453285). | ||
3613 | * Fix "overriden" typo in ssh(1) (thanks, A. Costa; closes: #390699). | ||
3614 | * Refactor debian/rules configure and make invocations to make development | ||
3615 | easier. | ||
3616 | * Remove the hideously old /etc/ssh/primes on upgrade (closes: #123013). | ||
3617 | * Update moduli(5) to revision 1.11 from OpenBSD CVS. | ||
3618 | * Document the non-default options we set as standard in ssh_config(5) and | ||
3619 | sshd_config(5) (closes: #327886, #345628). | ||
3620 | * Recode LICENCE to UTF-8 when concatenating it to debian/copyright. | ||
3621 | * Override desktop-file-but-no-dh_desktop-call lintian warning; the | ||
3622 | .desktop file is intentionally not installed (see 1:3.8.1p1-10). | ||
3623 | * Update copyright dates for Kerberos patch in debian/copyright.head. | ||
3624 | * Policy version 3.7.3: no changes required. | ||
3625 | |||
3626 | -- Colin Watson <cjwatson@debian.org> Mon, 24 Dec 2007 16:43:02 +0000 | ||
3627 | |||
3628 | openssh (1:4.6p1-7) unstable; urgency=low | ||
3629 | |||
3630 | * Don't build PIE executables on m68k (closes: #451192). | ||
3631 | * Use autotools-dev's recommended configure --build and --host options. | ||
3632 | * Adjust README.Debian to suggest mailing debian-ssh@lists.debian.org | ||
3633 | rather than Matthew. | ||
3634 | * Check whether deluser exists in postrm (closes: #454085). | ||
3635 | |||
3636 | -- Colin Watson <cjwatson@debian.org> Mon, 03 Dec 2007 11:11:02 +0000 | ||
3637 | |||
3638 | openssh (1:4.6p1-6) unstable; urgency=low | ||
3639 | |||
3640 | * Remove blank line between head comment and first template in | ||
3641 | debian/openssh-server.templates.master; apparently it confuses some | ||
3642 | versions of debconf. | ||
3643 | * Install authorized_keys(5) as a symlink to sshd(8) (thanks, Tomas | ||
3644 | Pospisek; closes: #441817). | ||
3645 | * Discard error output from dpkg-query in preinsts, in case the ssh | ||
3646 | metapackage is not installed. | ||
3647 | * Fix sshd/inittab advice in README.Debian to account for rc.d movement | ||
3648 | (closes: #450632). | ||
3649 | * Suppress error from debian/rules if lsb-release is not installed. | ||
3650 | * Don't ignore errors from 'make -C contrib clean'. | ||
3651 | * Adjust categories in ssh-askpass-gnome.desktop to comply with the | ||
3652 | Desktop Menu Specification. | ||
3653 | * debconf template translations: | ||
3654 | - Add Slovak (thanks, Ivan Masár; closes: #441690). | ||
3655 | - Update Brazilian Portuguese (thanks, Eder L. Marques; | ||
3656 | closes: #447145). | ||
3657 | |||
3658 | -- Colin Watson <cjwatson@debian.org> Mon, 12 Nov 2007 11:47:28 +0000 | ||
3659 | |||
3660 | openssh (1:4.6p1-5) unstable; urgency=low | ||
3661 | |||
3662 | * Identify ssh as a metapackage rather than a transitional package. It's | ||
3663 | still useful as a quick way to install both the client and the server. | ||
3664 | * ssh-copy-id now checks the exit status of ssh-add -L (thanks, Adeodato | ||
3665 | Simó; closes: #221675). | ||
3666 | * ssh-copy-id no longer prints the output of expr (thanks, Peter | ||
3667 | Eisentraut; closes: #291534). | ||
3668 | * ssh-copy-id defaults to ~/.ssh/id_rsa.pub rather than | ||
3669 | ~/.ssh/identity.pub, in line with ssh-keygen (thanks, Greg Norris; | ||
3670 | closes: #234627). | ||
3671 | * Build-depend on libselinux1-dev on lpia. | ||
3672 | * openssh-client Suggests: keychain. | ||
3673 | * debconf template translations: | ||
3674 | - Update Catalan (thanks, Jordà Polo; closes: #431970). | ||
3675 | |||
3676 | -- Colin Watson <cjwatson@debian.org> Mon, 30 Jul 2007 09:34:38 +0100 | ||
3677 | |||
3678 | openssh (1:4.6p1-4) unstable; urgency=low | ||
3679 | |||
3680 | * Don't build PIE executables on hppa, as they crash. | ||
3681 | |||
3682 | -- Colin Watson <cjwatson@debian.org> Thu, 05 Jul 2007 11:06:54 +0100 | ||
3683 | |||
3684 | openssh (1:4.6p1-3) unstable; urgency=low | ||
3685 | |||
3686 | * Only build PIE executables on Linux and NetBSD (closes: #430455). | ||
3687 | * Fix broken switch fallthrough when SELinux is running in permissive mode | ||
3688 | (closes: #430838). | ||
3689 | * Document that HashKnownHosts may break tab-completion (closes: #430154). | ||
3690 | |||
3691 | -- Colin Watson <cjwatson@debian.org> Fri, 29 Jun 2007 07:15:38 +0100 | ||
3692 | |||
3693 | openssh (1:4.6p1-2) unstable; urgency=low | ||
3694 | |||
3695 | * Fix ordering of SYSLOG_LEVEL_QUIET and SYSLOG_LEVEL_FATAL. | ||
3696 | * Clarify that 'ssh -q -q' still prints errors caused by bad arguments | ||
3697 | (i.e. before the logging system is initialised). | ||
3698 | * Suppress "Connection to <host> closed" and "Connection to master closed" | ||
3699 | messages at loglevel SILENT (thanks, Jaap Eldering; closes: #409788). | ||
3700 | * Suppress "Pseudo-terminal will not be allocated because stdin is not a | ||
3701 | terminal" message at loglevels QUIET and SILENT (closes: #366814). | ||
3702 | * Document the SILENT loglevel in sftp-server(8), ssh_config(5), and | ||
3703 | sshd_config(5). | ||
3704 | * Add try-restart action to init script. | ||
3705 | * Add /etc/network/if-up.d/openssh-server to restart sshd when new | ||
3706 | interfaces appear (LP: #103436). | ||
3707 | * Backport from upstream: | ||
3708 | - Move C/R -> kbdint special case to after the defaults have been | ||
3709 | loaded, which makes ChallengeResponse default to yes again. This was | ||
3710 | broken by the Match changes and not fixed properly subsequently | ||
3711 | (closes: #428968). | ||
3712 | - Silence spurious error messages from hang-on-exit fix | ||
3713 | (http://bugzilla.mindrot.org/show_bug.cgi?id=1306, closes: #429531). | ||
3714 | |||
3715 | -- Colin Watson <cjwatson@debian.org> Wed, 20 Jun 2007 11:52:44 +0100 | ||
3716 | |||
3717 | openssh (1:4.6p1-1) unstable; urgency=low | ||
3718 | |||
3719 | * New upstream release (closes: #395507, #397961, #420035). Important | ||
3720 | changes not previously backported to 4.3p2: | ||
3721 | - 4.4/4.4p1 (http://www.openssh.com/txt/release-4.4): | ||
3722 | + On portable OpenSSH, fix a GSSAPI authentication abort that could be | ||
3723 | used to determine the validity of usernames on some platforms. | ||
3724 | + Implemented conditional configuration in sshd_config(5) using the | ||
3725 | "Match" directive. This allows some configuration options to be | ||
3726 | selectively overridden if specific criteria (based on user, group, | ||
3727 | hostname and/or address) are met. So far a useful subset of | ||
3728 | post-authentication options are supported and more are expected to | ||
3729 | be added in future releases. | ||
3730 | + Add support for Diffie-Hellman group exchange key agreement with a | ||
3731 | final hash of SHA256. | ||
3732 | + Added a "ForceCommand" directive to sshd_config(5). Similar to the | ||
3733 | command="..." option accepted in ~/.ssh/authorized_keys, this forces | ||
3734 | the execution of the specified command regardless of what the user | ||
3735 | requested. This is very useful in conjunction with the new "Match" | ||
3736 | option. | ||
3737 | + Add a "PermitOpen" directive to sshd_config(5). This mirrors the | ||
3738 | permitopen="..." authorized_keys option, allowing fine-grained | ||
3739 | control over the port-forwardings that a user is allowed to | ||
3740 | establish. | ||
3741 | + Add optional logging of transactions to sftp-server(8). | ||
3742 | + ssh(1) will now record port numbers for hosts stored in | ||
3743 | ~/.ssh/known_hosts when a non-standard port has been requested | ||
3744 | (closes: #50612). | ||
3745 | + Add an "ExitOnForwardFailure" option to cause ssh(1) to exit (with a | ||
3746 | non-zero exit code) when requested port forwardings could not be | ||
3747 | established. | ||
3748 | + Extend sshd_config(5) "SubSystem" declarations to allow the | ||
3749 | specification of command-line arguments. | ||
3750 | + Replacement of all integer overflow susceptible invocations of | ||
3751 | malloc(3) and realloc(3) with overflow-checking equivalents. | ||
3752 | + Many manpage fixes and improvements. | ||
3753 | + Add optional support for OpenSSL hardware accelerators (engines), | ||
3754 | enabled using the --with-ssl-engine configure option. | ||
3755 | + Tokens in configuration files may be double-quoted in order to | ||
3756 | contain spaces (closes: #319639). | ||
3757 | + Move a debug() call out of a SIGCHLD handler, fixing a hang when the | ||
3758 | session exits very quickly (closes: #307890). | ||
3759 | + Fix some incorrect buffer allocation calculations (closes: #410599). | ||
3760 | + ssh-add doesn't ask for a passphrase if key file permissions are too | ||
3761 | liberal (closes: #103677). | ||
3762 | + Likewise, ssh doesn't ask either (closes: #99675). | ||
3763 | - 4.6/4.6p1 (http://www.openssh.com/txt/release-4.6): | ||
3764 | + sshd now allows the enabling and disabling of authentication methods | ||
3765 | on a per user, group, host and network basis via the Match directive | ||
3766 | in sshd_config. | ||
3767 | + Fixed an inconsistent check for a terminal when displaying scp | ||
3768 | progress meter (closes: #257524). | ||
3769 | + Fix "hang on exit" when background processes are running at the time | ||
3770 | of exit on a ttyful/login session (closes: #88337). | ||
3771 | * Update to current GSSAPI patch from | ||
3772 | http://www.sxw.org.uk/computing/patches/openssh-4.6p1-gsskex-20070312.patch; | ||
3773 | install ChangeLog.gssapi. | ||
3774 | * Build the .deb --with-ssl-engine (closes: #408027, LP: #119295). | ||
3775 | * Use LSB functions in init scripts, and add an LSB-style header (partly | ||
3776 | from Ubuntu and partly thanks to Christian Perrier; closes: #389038). | ||
3777 | * Move init script start links to S16, move rc1 stop link to K84, and | ||
3778 | remove rc0 and rc6 stop links altogether (the last part from Ubuntu; | ||
3779 | closes: #122188). | ||
3780 | * Emit a slightly more informative message from the init script if | ||
3781 | /dev/null has somehow become not a character device (closes: #369964). | ||
3782 | * Belatedly build-depend on zlib1g-dev (>= 1:1.2.3-1) (closes: #333447). | ||
3783 | * Merge from Ubuntu: | ||
3784 | - Build position-independent executables (only for debs, not for udebs) | ||
3785 | to take advantage of address space layout randomisation. | ||
3786 | - If building on Ubuntu, add /sbin, /usr/sbin, and /usr/local/sbin to | ||
3787 | the default path. | ||
3788 | * Use ${binary:Version} rather than ${Source-Version} in openssh-server -> | ||
3789 | openssh-client dependency. | ||
3790 | |||
3791 | -- Colin Watson <cjwatson@debian.org> Wed, 13 Jun 2007 00:28:26 +0100 | ||
3792 | |||
3793 | openssh (1:4.3p2-11) unstable; urgency=low | ||
3794 | |||
3795 | * It's been four and a half years now since I took over as "temporary" | ||
3796 | maintainer, so the Maintainer field is getting a bit inaccurate. Set | ||
3797 | Maintainer to debian-ssh@lists.debian.org and leave Matthew and myself | ||
3798 | as Uploaders. | ||
3799 | * Use dpkg-query to fetch conffile md5sums rather than parsing | ||
3800 | /var/lib/dpkg/status directly. | ||
3801 | * openssh-client Suggests: libpam-ssh (closes: #427840). | ||
3802 | * Use 'start-stop-daemon --oknodo' so that openssh-server's init script | ||
3803 | exits successfully if sshd is already running (closes: #426858). | ||
3804 | |||
3805 | * Apply results of debconf templates and package descriptions review by | ||
3806 | debian-l10n-english (closes: #420107, #420742). | ||
3807 | * debconf template translations: | ||
3808 | - Update Dutch (thanks, Machteld de Kok; closes: #419260). | ||
3809 | - Update Norwegian Bokmål (thanks, Bjørn Steensrud; closes: #420630). | ||
3810 | - Update Galician (thanks, Jacobo Tarrio; closes: #420635). | ||
3811 | - Update Spanish (thanks, Javier Fernández-Sanguino Peña; | ||
3812 | closes: #420651). | ||
3813 | - Update Swedish (thanks, Daniel Nylander; closes: #420663). | ||
3814 | - Add Bulgarian (thanks, Damyan Ivanov; closes: #420703). | ||
3815 | - Add Tamil (thanks, Tirumurti Vasudevan; closes: #420739). | ||
3816 | - Update German (thanks, Helge Kreutzmann; closes: #420743). | ||
3817 | - Update Japanese (thanks, Kenshi Muto; closes: #420946). | ||
3818 | - Add Basque (thanks, Piarres Beobide; closes: #421238). | ||
3819 | - Update Italian (thanks, Luca Monducci; closes: #421348). | ||
3820 | - Update Czech (thanks, Miroslav Kure; closes: #421484). | ||
3821 | - Update Romanian (thanks, Igor Stirbu; closes: #421760). | ||
3822 | - Update Russian (thanks, Yuriy Talakan' and Sergey Alyoshin; | ||
3823 | closes: #420862). | ||
3824 | - Update Dutch (thanks, Bart Cornelis; closes: #422767). | ||
3825 | - Update Portuguese (thanks, Ricardo Silva; closes: #423112). | ||
3826 | - Update French (thanks, Christian Perrier). | ||
3827 | - Add Korean (thanks, Sunjae Park; closes: #424008). | ||
3828 | - Update Vietnamese (thanks, Clytie Siddall; closes: #426991). | ||
3829 | |||
3830 | -- Colin Watson <cjwatson@debian.org> Sun, 10 Jun 2007 08:59:42 +0100 | ||
3831 | |||
3832 | openssh (1:4.3p2-10) unstable; urgency=low | ||
3833 | |||
3834 | * Multiply openssh-client-udeb's Installer-Menu-Item by 100. | ||
3835 | * Increase MAX_SESSIONS to 64. | ||
3836 | |||
3837 | -- Colin Watson <cjwatson@debian.org> Tue, 10 Apr 2007 19:17:20 +0100 | ||
3838 | |||
3839 | openssh (1:4.3p2-9) unstable; urgency=high | ||
3840 | |||
3841 | [ Russ Allbery ] | ||
3842 | * Fix GSSAPIKeyExchange configuration file handling logic in ssh-krb5 | ||
3843 | (closes: #404863). | ||
3844 | * Fix uncommenting of GSSAPI options by ssh-krb5 (closes: #407766). | ||
3845 | |||
3846 | [ Colin Watson ] | ||
3847 | * debconf template translations: | ||
3848 | - Add Norwegian Bokmål (thanks, Bjørn Steensrud; closes: #412330). | ||
3849 | |||
3850 | -- Colin Watson <cjwatson@debian.org> Mon, 5 Mar 2007 16:13:50 +0000 | ||
3851 | |||
3852 | openssh (1:4.3p2-8) unstable; urgency=medium | ||
3853 | |||
3854 | [ Vincent Untz ] | ||
3855 | * Give the ssh-askpass-gnome window a default icon; remove unnecessary | ||
3856 | icon extension from .desktop file (closes: | ||
3857 | https://launchpad.net/bugs/27152). | ||
3858 | |||
3859 | [ Colin Watson ] | ||
3860 | * Drop versioning on ssh/ssh-krb5 Replaces, as otherwise it isn't | ||
3861 | sufficient to replace conffiles (closes: #402804). | ||
3862 | * Make GSSAPICleanupCreds a compatibility alias for | ||
3863 | GSSAPICleanupCredentials. Mark GSSUseSessionCCache and | ||
3864 | GSSAPIUseSessionCredCache as known-but-unsupported options, and migrate | ||
3865 | away from them on upgrade. | ||
3866 | * It turns out that the people who told me that removing a conffile in the | ||
3867 | preinst was sufficient to have dpkg replace it without prompting when | ||
3868 | moving a conffile between packages were very much mistaken. As far as I | ||
3869 | can tell, the only way to do this reliably is to write out the desired | ||
3870 | new text of the conffile in the preinst. This is gross, and requires | ||
3871 | shipping the text of all conffiles in the preinst too, but there's | ||
3872 | nothing for it. Fortunately this nonsense is only required for smooth | ||
3873 | upgrades from sarge. | ||
3874 | * debconf template translations: | ||
3875 | - Add Romanian (thanks, Stan Ioan-Eugen; closes: #403528). | ||
3876 | |||
3877 | -- Colin Watson <cjwatson@debian.org> Sat, 23 Dec 2006 18:38:33 +0000 | ||
3878 | |||
3879 | openssh (1:4.3p2-7) unstable; urgency=medium | ||
3880 | |||
3881 | [ Colin Watson ] | ||
3882 | * Ignore errors from usermod when changing sshd's shell, since it will | ||
3883 | fail if the sshd user is not local (closes: #398436). | ||
3884 | * Remove version control tags from /etc/ssh/moduli and /etc/ssh/ssh_config | ||
3885 | to avoid unnecessary conffile resolution steps for administrators | ||
3886 | (thanks, Jari Aalto; closes: #335259). | ||
3887 | * Fix quoting error in configure.ac and regenerate configure (thanks, Ben | ||
3888 | Pfaff; closes: #391248). | ||
3889 | * When installing openssh-client or openssh-server from scratch, remove | ||
3890 | any unchanged conffiles from the pre-split ssh package to work around a | ||
3891 | bug in sarge's dpkg (thanks, Justin Pryzby and others; closes: #335276). | ||
3892 | |||
3893 | [ Russ Allbery ] | ||
3894 | * Create transitional ssh-krb5 package which enables GSSAPI configuration | ||
3895 | in sshd_config (closes: #390986). | ||
3896 | * Default client to attempting GSSAPI authentication. | ||
3897 | * Remove obsolete GSSAPINoMICAuthentication from sshd_config if it's | ||
3898 | found. | ||
3899 | * Add ssh -K option, the converse of -k, to enable GSSAPI credential | ||
3900 | delegation (closes: #401483). | ||
3901 | |||
3902 | -- Colin Watson <cjwatson@debian.org> Wed, 6 Dec 2006 23:00:49 +0000 | ||
3903 | |||
3904 | openssh (1:4.3p2-6) unstable; urgency=low | ||
3905 | |||
3906 | * Acknowledge NMU (thanks, Manoj; closes: #394795). | ||
3907 | * Backport from 4.5p1: | ||
3908 | - Fix a bug in the sshd privilege separation monitor that weakened its | ||
3909 | verification of successful authentication. This bug is not known to be | ||
3910 | exploitable in the absence of additional vulnerabilities. | ||
3911 | * openssh-server Suggests: molly-guard (closes: #395473). | ||
3912 | * debconf template translations: | ||
3913 | - Update German (thanks, Helge Kreutzmann; closes: #395947). | ||
3914 | |||
3915 | -- Colin Watson <cjwatson@debian.org> Wed, 15 Nov 2006 00:07:32 +0000 | ||
3916 | |||
3917 | openssh (1:4.3p2-5.1) unstable; urgency=low | ||
3918 | |||
3919 | * NMU to update SELinux patch, bringing it in line with current selinux | ||
3920 | releases. The patch for this NMU is simply the Bug#394795 patch, | ||
3921 | and no other changes. (closes: #394795) | ||
3922 | |||
3923 | -- Manoj Srivastava <srivasta@debian.org> Mon, 23 Oct 2006 14:11:24 -0500 | ||
3924 | |||
3925 | openssh (1:4.3p2-5) unstable; urgency=low | ||
3926 | |||
3927 | * Remove ssh/insecure_telnetd check altogether (closes: #391081). | ||
3928 | * debconf template translations: | ||
3929 | - Update Danish (thanks, Claus Hindsgaul; closes: #390612). | ||
3930 | |||
3931 | -- Colin Watson <cjwatson@debian.org> Thu, 5 Oct 2006 09:04:19 +0100 | ||
3932 | |||
3933 | openssh (1:4.3p2-4) unstable; urgency=high | ||
3934 | |||
3935 | * Backport from 4.4p1 (since I don't have an updated version of the GSSAPI | ||
3936 | patch yet): | ||
3937 | - CVE-2006-4924: Fix a pre-authentication denial of service found by | ||
3938 | Tavis Ormandy, that would cause sshd(8) to spin until the login grace | ||
3939 | time expired (closes: #389995). | ||
3940 | - CVE-2006-5051: Fix an unsafe signal hander reported by Mark Dowd. The | ||
3941 | signal handler was vulnerable to a race condition that could be | ||
3942 | exploited to perform a pre-authentication denial of service. On | ||
3943 | portable OpenSSH, this vulnerability could theoretically lead to | ||
3944 | pre-authentication remote code execution if GSSAPI authentication is | ||
3945 | enabled, but the likelihood of successful exploitation appears remote. | ||
3946 | |||
3947 | * Read /etc/default/locale as well as /etc/environment (thanks, Raphaël | ||
3948 | Hertzog; closes: #369395). | ||
3949 | * Remove no-longer-used ssh/insecure_rshd debconf template. | ||
3950 | * Make ssh/insecure_telnetd Type: error (closes: #388946). | ||
3951 | |||
3952 | * debconf template translations: | ||
3953 | - Update Portuguese (thanks, Rui Branco; closes: #381942). | ||
3954 | - Update Spanish (thanks, Javier Fernández-Sanguino Peña; | ||
3955 | closes: #382966). | ||
3956 | |||
3957 | -- Colin Watson <cjwatson@debian.org> Fri, 29 Sep 2006 16:28:24 +0100 | ||
3958 | |||
3959 | openssh (1:4.3p2-3) unstable; urgency=low | ||
3960 | |||
3961 | * Document KeepAlive->TCPKeepAlive renaming in sshd_config(5) (closes: | ||
3962 | https://launchpad.net/bugs/50702). | ||
3963 | * Change sshd user's shell to /usr/sbin/nologin (closes: #366541). | ||
3964 | Introduces dependency on passwd for usermod. | ||
3965 | * debconf template translations: | ||
3966 | - Update French (thanks, Denis Barbier; closes: #368503). | ||
3967 | - Update Dutch (thanks, Bart Cornelis; closes: #375100). | ||
3968 | - Update Japanese (thanks, Kenshi Muto; closes: #379950). | ||
3969 | |||
3970 | -- Colin Watson <cjwatson@debian.org> Thu, 27 Jul 2006 00:12:36 +0100 | ||
3971 | |||
3972 | openssh (1:4.3p2-2) unstable; urgency=low | ||
3973 | |||
3974 | * Include commented-out pam_access example in /etc/pam.d/ssh. | ||
3975 | * On '/etc/init.d/ssh restart', create /var/run/sshd before checking the | ||
3976 | server configuration, as otherwise 'sshd -t' will complain about the | ||
3977 | lack of /var/run/sshd (closes: https://launchpad.net/bugs/45234). | ||
3978 | * debconf template translations: | ||
3979 | - Update Russian (thanks, Yuriy Talakan'; closes: #367143). | ||
3980 | - Update Czech (thanks, Miroslav Kure; closes: #367161). | ||
3981 | - Update Italian (thanks, Luca Monducci; closes: #367186). | ||
3982 | - Update Galician (thanks, Jacobo Tarrio; closes: #367318). | ||
3983 | - Update Swedish (thanks, Daniel Nylander; closes: #367971). | ||
3984 | |||
3985 | -- Colin Watson <cjwatson@debian.org> Fri, 19 May 2006 09:14:27 +0100 | ||
3986 | |||
3987 | openssh (1:4.3p2-1) unstable; urgency=low | ||
3988 | |||
3989 | * New upstream release (closes: #361032). | ||
3990 | - CVE-2006-0225: scp (as does rcp, on which it is based) invoked a | ||
3991 | subshell to perform local to local, and remote to remote copy | ||
3992 | operations. This subshell exposed filenames to shell expansion twice; | ||
3993 | allowing a local attacker to create filenames containing shell | ||
3994 | metacharacters that, if matched by a wildcard, could lead to execution | ||
3995 | of attacker-specified commands with the privilege of the user running | ||
3996 | scp (closes: #349645). | ||
3997 | - Add support for tunneling arbitrary network packets over a connection | ||
3998 | between an OpenSSH client and server via tun(4) virtual network | ||
3999 | interfaces. This allows the use of OpenSSH (4.3+) to create a true VPN | ||
4000 | between the client and server providing real network connectivity at | ||
4001 | layer 2 or 3. This feature is experimental. | ||
4002 | - Reduce default key length for new DSA keys generated by ssh-keygen | ||
4003 | back to 1024 bits. DSA is not specified for longer lengths and does | ||
4004 | not fully benefit from simply making keys longer. As per FIPS 186-2 | ||
4005 | Change Notice 1, ssh-keygen will refuse to generate a new DSA key | ||
4006 | smaller or larger than 1024 bits. | ||
4007 | - Fixed X forwarding failing to start when the X11 client is executed in | ||
4008 | background at the time of session exit. | ||
4009 | - Change ssh-keygen to generate a protocol 2 RSA key when invoked | ||
4010 | without arguments (closes: #114894). | ||
4011 | - Fix timing variance for valid vs. invalid accounts when attempting | ||
4012 | Kerberos authentication. | ||
4013 | - Ensure that ssh always returns code 255 on internal error | ||
4014 | (closes: #259865). | ||
4015 | - Cleanup wtmp files on SIGTERM when not using privsep. | ||
4016 | - Set SO_REUSEADDR on X11 listeners to avoid problems caused by | ||
4017 | lingering sockets from previous session (X11 applications can | ||
4018 | sometimes not connect to 127.0.0.1:60xx) (closes: | ||
4019 | https://launchpad.net/bugs/25528). | ||
4020 | - Ensure that fds 0, 1 and 2 are always attached in all programs, by | ||
4021 | duping /dev/null to them if necessary. | ||
4022 | - Xauth list invocation had bogus "." argument. | ||
4023 | - Remove internal assumptions on key exchange hash algorithm and output | ||
4024 | length, preparing OpenSSH for KEX methods with alternate hashes. | ||
4025 | - Ignore junk sent by a server before it sends the "SSH-" banner. | ||
4026 | - Many manual page improvements. | ||
4027 | - Lots of cleanups, including fixes to memory leaks on error paths and | ||
4028 | possible crashes. | ||
4029 | * Update to current GSSAPI patch from | ||
4030 | http://www.sxw.org.uk/computing/patches/openssh-4.3p2-gsskex-20060223.patch | ||
4031 | (closes: #352042). | ||
4032 | * debian/rules: Resynchronise CFLAGS with that generated by configure. | ||
4033 | * Restore pam_nologin to /etc/pam.d/ssh; sshd no longer checks this itself | ||
4034 | when PAM is enabled, but relies on PAM to do it. | ||
4035 | * Rename KeepAlive to TCPKeepAlive in default sshd_config | ||
4036 | (closes: #349896). | ||
4037 | * Rephrase ssh/new_config and ssh/encrypted_host_key_but_no_keygen debconf | ||
4038 | templates to make boolean short descriptions end with a question mark | ||
4039 | and to avoid use of the first person. | ||
4040 | * Ship README.tun. | ||
4041 | * Policy version 3.7.2: no changes required. | ||
4042 | * debconf template translations: | ||
4043 | - Update Italian (thanks, Luca Monducci; closes: #360348). | ||
4044 | - Add Galician (thanks, Jacobo Tarrio; closes: #361220). | ||
4045 | |||
4046 | -- Colin Watson <cjwatson@debian.org> Fri, 12 May 2006 12:48:24 +0100 | ||
4047 | |||
4048 | openssh (1:4.2p1-8) unstable; urgency=low | ||
4049 | |||
4050 | [ Frans Pop ] | ||
4051 | * Use udeb support introduced in debhelper 4.2.0 (available in sarge) | ||
4052 | rather than constructing udebs by steam. | ||
4053 | * Require debhelper 5.0.22, which generates correct shared library | ||
4054 | dependencies for udebs (closes: #360068). This build-dependency can be | ||
4055 | ignored if building on sarge. | ||
4056 | |||
4057 | [ Colin Watson ] | ||
4058 | * Switch to debhelper compatibility level 4, since we now require | ||
4059 | debhelper 4 even on sarge anyway for udeb support. | ||
4060 | |||
4061 | -- Colin Watson <cjwatson@debian.org> Fri, 31 Mar 2006 09:44:55 +0100 | ||
4062 | |||
4063 | openssh (1:4.2p1-7) unstable; urgency=low | ||
4064 | |||
4065 | * I accidentally applied the default $PATH change in 1:4.2p1-6 to the udeb | ||
4066 | rather than the deb. Fixed. | ||
4067 | |||
4068 | -- Colin Watson <cjwatson@debian.org> Wed, 1 Mar 2006 16:19:00 +0000 | ||
4069 | |||
4070 | openssh (1:4.2p1-6) unstable; urgency=low | ||
4071 | |||
4072 | * Sync default values of $PATH from shadow 1:4.0.12-6, adding /usr/bin/X11 | ||
4073 | to the normal and superuser paths and /usr/games to the normal path. | ||
4074 | * When the client receives a signal, don't fatal() with "Killed by signal | ||
4075 | %d." (which produces unhelpful noise on stderr and causes confusion for | ||
4076 | users of some applications that wrap ssh); instead, generate a debug | ||
4077 | message and exit with the traditional status (closes: #313371). | ||
4078 | * debconf template translations: | ||
4079 | - Add Swedish (thanks, Daniel Nylander; closes: #333133). | ||
4080 | - Update Spanish (thanks, Javier Fernández-Sanguino Peña; | ||
4081 | closes: #341371). | ||
4082 | - Correct erroneously-changed Last-Translator headers in Greek and | ||
4083 | Spanish translations. | ||
4084 | |||
4085 | -- Colin Watson <cjwatson@debian.org> Mon, 20 Feb 2006 16:50:55 +0000 | ||
4086 | |||
4087 | openssh (1:4.2p1-5) unstable; urgency=low | ||
4088 | |||
4089 | * Add a CVE name to the 1:4.0p1-1 changelog entry. | ||
4090 | * Build-depend on libselinux1-dev on armeb. | ||
4091 | * Only send GSSAPI proposal if GSSAPIAuthentication is enabled. | ||
4092 | * Build-depend on libssl-dev (>= 0.9.8-1) to cope with surprise OpenSSL | ||
4093 | transition, since otherwise who knows what the buildds will do. If | ||
4094 | you're building openssh yourself, you can safely ignore this and use an | ||
4095 | older libssl-dev. | ||
4096 | |||
4097 | -- Colin Watson <cjwatson@debian.org> Fri, 7 Oct 2005 12:23:42 +0100 | ||
4098 | |||
4099 | openssh (1:4.2p1-4) unstable; urgency=low | ||
4100 | |||
4101 | * Initialise token to GSS_C_EMPTY_BUFFER in ssh_gssapi_check_mechanism | ||
4102 | (closes: #328606). | ||
4103 | |||
4104 | -- Colin Watson <cjwatson@debian.org> Fri, 16 Sep 2005 12:50:16 +0100 | ||
4105 | |||
4106 | openssh (1:4.2p1-3) unstable; urgency=low | ||
4107 | |||
4108 | * Add prototype for ssh_gssapi_server_mechanisms (closes: #328372). | ||
4109 | * Interoperate with ssh-krb5 << 3.8.1p1-1 servers, which used a slightly | ||
4110 | different version of the gssapi authentication method (thanks, Aaron M. | ||
4111 | Ucko; closes: #328388). | ||
4112 | * Explicitly tell po2debconf to use the 'popular' output encoding, so that | ||
4113 | the woody-compatibility hack works even with po-debconf 0.9.0. | ||
4114 | |||
4115 | -- Colin Watson <cjwatson@debian.org> Thu, 15 Sep 2005 09:28:21 +0100 | ||
4116 | |||
4117 | openssh (1:4.2p1-2) unstable; urgency=low | ||
4118 | |||
4119 | * Annotate 1:4.2p1-1 changelog with CVE references. | ||
4120 | * Add remaining pieces of Kerberos support (closes: #152657, #275472): | ||
4121 | - Add GSSAPI key exchange support from | ||
4122 | http://www.sxw.org.uk/computing/patches/openssh.html (thanks, Stephen | ||
4123 | Frost). | ||
4124 | - Build-depend on libkrb5-dev and configure --with-kerberos5=/usr. | ||
4125 | - openssh-client and openssh-server replace ssh-krb5. | ||
4126 | - Update commented-out Kerberos/GSSAPI options in default sshd_config. | ||
4127 | - Fix HAVE_GSSAPI_KRB5_H/HAVE_GSSAPI_GSSAPI_KRB5_H typos in | ||
4128 | gss-serv-krb5.c. | ||
4129 | |||
4130 | -- Colin Watson <cjwatson@debian.org> Wed, 14 Sep 2005 18:28:49 +0100 | ||
4131 | |||
4132 | openssh (1:4.2p1-1) unstable; urgency=low | ||
4133 | |||
4134 | * New upstream release. | ||
4135 | - SECURITY (CAN-2005-2797): Fix a bug introduced in OpenSSH 4.0 that | ||
4136 | caused GatewayPorts to be incorrectly activated for dynamic ("-D") | ||
4137 | port forwardings when no listen address was explicitly specified | ||
4138 | (closes: #326065). | ||
4139 | - SECURITY (CAN-2005-2798): Fix improper delegation of GSSAPI | ||
4140 | credentials. This code is only built in openssh-krb5, not openssh, but | ||
4141 | I mention the CVE reference here anyway for completeness. | ||
4142 | - Add a new compression method ("Compression delayed") that delays zlib | ||
4143 | compression until after authentication, eliminating the risk of zlib | ||
4144 | vulnerabilities being exploited by unauthenticated users. Note that | ||
4145 | users of OpenSSH versions earlier than 3.5 will need to disable | ||
4146 | compression on the client or set "Compression yes" (losing this | ||
4147 | security benefit) on the server. | ||
4148 | - Increase the default size of new RSA/DSA keys generated by ssh-keygen | ||
4149 | from 1024 to 2048 bits (closes: #181162). | ||
4150 | - Many bugfixes and improvements to connection multiplexing. | ||
4151 | - Don't pretend to accept $HOME (closes: #208648). | ||
4152 | * debian/rules: Resynchronise CFLAGS with that generated by configure. | ||
4153 | * openssh-client and openssh-server conflict with pre-split ssh to avoid | ||
4154 | problems when ssh is left un-upgraded (closes: #324695). | ||
4155 | * Set X11Forwarding to yes in the default sshd_config (new installs only). | ||
4156 | At least when X11UseLocalhost is turned on, which is the default, the | ||
4157 | security risks of using X11 forwarding are risks to the client, not to | ||
4158 | the server (closes: #320104). | ||
4159 | |||
4160 | -- Colin Watson <cjwatson@debian.org> Wed, 14 Sep 2005 15:16:14 +0100 | ||
4161 | |||
4162 | openssh (1:4.1p1-7) unstable; urgency=low | ||
4163 | |||
4164 | * Do the IDEA host key check on a temporary file to avoid altering | ||
4165 | /etc/ssh/ssh_host_key itself (closes: #312312). | ||
4166 | * Work around the ssh-askpass alternative somehow ending up in manual mode | ||
4167 | pointing to the obsolete /usr/lib/ssh/gnome-ssh-askpass. | ||
4168 | * Add GNU/kFreeBSD support (thanks, Aurelien Jarno; closes: #318113). | ||
4169 | * Fix XSIish uses of 'test' in openssh-server.preinst. | ||
4170 | * Policy version 3.6.2: no changes required. | ||
4171 | |||
4172 | -- Colin Watson <cjwatson@debian.org> Fri, 2 Sep 2005 16:18:11 +0100 | ||
4173 | |||
4174 | openssh (1:4.1p1-6) unstable; urgency=low | ||
4175 | |||
4176 | * Fix one-character typo that meant the binaries in openssh-client and | ||
4177 | openssh-server got recompiled with the wrong options during | ||
4178 | 'debian/rules install' (closes: #317088, #317238, #317241). | ||
4179 | |||
4180 | -- Colin Watson <cjwatson@debian.org> Thu, 7 Jul 2005 10:56:16 +0100 | ||
4181 | |||
4182 | openssh (1:4.1p1-5) unstable; urgency=low | ||
4183 | |||
4184 | * Build-depend on libselinux1-dev on ppc64 too (closes: #314625). | ||
4185 | * Drop priority of ssh to extra to match the override file. | ||
4186 | * Make /usr/share/doc/openssh-server and /usr/share/doc/ssh symlinks to | ||
4187 | /usr/share/doc/openssh-client (closes: #314745). | ||
4188 | * Ship README.dns (closes: #284874). | ||
4189 | * Disable btmp logging, since Debian's /var/log/btmp has inappropriate | ||
4190 | permissions (closes: #314956). | ||
4191 | * Allow ~/.ssh/config to be group-writable, provided that the group in | ||
4192 | question contains only the file's owner (closes: #314347). | ||
4193 | * debconf template translations: | ||
4194 | - Update Brazilian Portuguese (thanks, André LuÃs Lopes; | ||
4195 | closes: #315477). | ||
4196 | - Add Vietnamese (thanks, Clytie Siddall; closes: #316636). | ||
4197 | |||
4198 | -- Colin Watson <cjwatson@debian.org> Sun, 3 Jul 2005 17:08:08 +0100 | ||
4199 | |||
4200 | openssh (1:4.1p1-4) unstable; urgency=low | ||
4201 | |||
4202 | * openssh-client and openssh-server conflict with ssh-krb5, as ssh-krb5 | ||
4203 | only conflicts with ssh (closes: #312475). | ||
4204 | * SELinux support (thanks, Manoj Srivastava; closes: #308555): | ||
4205 | - Added SELinux capability, and turned it on be default. Added | ||
4206 | restorecon calls in preinst and postinst (should not matter if the | ||
4207 | machine is not SELinux aware). By and large, the changes made should | ||
4208 | have no effect unless the rules file calls --with-selinux; and even | ||
4209 | then there should be no performance hit for machines not actively | ||
4210 | running SELinux. | ||
4211 | - Modified the preinst and postinst to call restorecon to set the | ||
4212 | security context for the generated public key files. | ||
4213 | - Added a comment to /etc/pam.d/ssh to indicate that an SELinux system | ||
4214 | may want to also include pam_selinux.so. | ||
4215 | * Re-enable ssh-askpass-gnome on the Hurd, now that its build-dependencies | ||
4216 | are available. | ||
4217 | * Restore /usr/lib/sftp-server temporarily, as a symlink to | ||
4218 | /usr/lib/openssh/sftp-server (closes: #312891). | ||
4219 | * Switch to debhelper compatibility level 3, since 2 is deprecated. | ||
4220 | * debconf template translations: | ||
4221 | - Update German (thanks, Jens Seidel; closes: #313949). | ||
4222 | |||
4223 | -- Colin Watson <cjwatson@debian.org> Fri, 17 Jun 2005 14:20:20 +0100 | ||
4224 | |||
4225 | openssh (1:4.1p1-3) unstable; urgency=low | ||
4226 | |||
4227 | * Upload to unstable. | ||
4228 | |||
4229 | -- Colin Watson <cjwatson@debian.org> Mon, 6 Jun 2005 22:28:33 +0100 | ||
4230 | |||
4231 | openssh (1:4.1p1-2) experimental; urgency=low | ||
4232 | |||
4233 | * Drop debconf support for allowing SSH protocol 1, which is discouraged | ||
4234 | and has not been the default since openssh 1:3.0.1p1-1. Users who need | ||
4235 | this should edit sshd_config instead (closes: #147212). | ||
4236 | * Since ssh-keysign isn't used by default (you need to set | ||
4237 | EnableSSHKeysign to "yes" in /etc/ssh/ssh_config), having a debconf | ||
4238 | question to ask whether it should be setuid is overkill, and the | ||
4239 | question text had got out of date anyway. Remove this question, ship | ||
4240 | ssh-keysign setuid in openssh-client.deb, and set a statoverride if the | ||
4241 | debconf question was previously set to false. | ||
4242 | * Add lintian overrides for the above (setuid-binary, | ||
4243 | no-debconf-templates). | ||
4244 | * Fix picky lintian errors about slogin symlinks. | ||
4245 | * Fix DEB_HOST_ARCH_OS/DEB_HOST_GNU_SYSTEM compatibility handling. | ||
4246 | * Apply Linux 2.2 workaround (see #239999) only on Linux. | ||
4247 | |||
4248 | -- Colin Watson <cjwatson@debian.org> Thu, 2 Jun 2005 00:55:58 +0100 | ||
4249 | |||
4250 | openssh (1:4.1p1-1) experimental; urgency=low | ||
4251 | |||
4252 | * New upstream release. | ||
4253 | - Normalise socket addresses returned by get_remote_hostname(), fixing | ||
4254 | 4-in-6 mapping issues with AllowUsers et al (closes: #192234). | ||
4255 | * Take upstream's hint and disable the unsupported USE_POSIX_THREADS | ||
4256 | (closes: #295757, #308868, and possibly others; may open other bugs). | ||
4257 | Use PAM password authentication to avoid #278394. In future I may | ||
4258 | provide two sets of binaries built with and without this option, since | ||
4259 | it seems I can't win. | ||
4260 | * Disable ChallengeResponseAuthentication in new installations, returning | ||
4261 | to PasswordAuthentication by default, since it now supports PAM and | ||
4262 | apparently works better with a non-threaded sshd (closes: #247521). | ||
4263 | * openssh-server Suggests: rssh (closes: #233012). | ||
4264 | * Change libexecdir to /usr/lib/openssh, and fix up various alternatives | ||
4265 | and configuration files to match (closes: #87900, #151321). | ||
4266 | * Fix up very old sshd_config files that refer to /usr/libexec/sftp-server | ||
4267 | (closes: #141979). | ||
4268 | |||
4269 | -- Colin Watson <cjwatson@debian.org> Tue, 31 May 2005 01:33:33 +0100 | ||
4270 | |||
4271 | openssh (1:4.0p1-1) experimental; urgency=low | ||
4272 | |||
4273 | * New upstream release. | ||
4274 | - Port-forwarding specifications now take optional bind addresses, and | ||
4275 | the server allows client-specified bind addresses for remote port | ||
4276 | forwardings when configured with "GatewayPorts clientspecified" | ||
4277 | (closes: #87253, #192206). | ||
4278 | - ssh and ssh-keyscan now support hashing of known_hosts files for | ||
4279 | improved privacy (CAN-2005-2666). ssh-keygen has new options for | ||
4280 | managing known_hosts files, which understand hashing. | ||
4281 | - sftp supports command history and editing support using libedit | ||
4282 | (closes: #287013). | ||
4283 | - Have scp and sftp wait for the spawned ssh to exit before they exit | ||
4284 | themselves, allowing ssh to restore terminal modes (closes: #257130). | ||
4285 | - Improved the handling of bad data in authorized_keys files, | ||
4286 | eliminating fatal errors on corrupt or very large keys; e.g. linefeeds | ||
4287 | in keys only produce errors in auth.log now (closes: #220726). | ||
4288 | - Add "command mode" to ssh connection multiplexing (closes: #303452). | ||
4289 | - Mention $HOME/.hushlogin in sshd(8) FILES section (closes: #163933). | ||
4290 | * Make gnome-ssh-askpass stay above other windows (thanks, Liyang HU; | ||
4291 | closes: #296487). | ||
4292 | * Remove obsolete and unnecessary ssh/forward_warning debconf note. | ||
4293 | * Hurd build fixes (although sshd still doesn't work): | ||
4294 | - Restore X forwarding fix from #102991, lost somewhere along the way. | ||
4295 | - Link with -lcrypt. | ||
4296 | - Link with -lpthread rather than -pthread. | ||
4297 | - Don't build ssh-askpass-gnome on the Hurd, until GNOME is available to | ||
4298 | satisfy build-dependencies. | ||
4299 | * Drop workaround for #242462 on amd64; it's been fixed properly upstream. | ||
4300 | * Enable HashKnownHosts by default. This only affects new entries; use | ||
4301 | 'ssh-keygen -H' to convert an entire known_hosts file to hashed format. | ||
4302 | * Note in ssh_config(5) that the SetupTimeOut option is Debian-specific | ||
4303 | (closes: #307069). | ||
4304 | * debconf template translations: | ||
4305 | - Update Czech (thanks, Miroslav Kure; closes: #298744). | ||
4306 | - Update Finnish (thanks, Matti Pöllä; closes: #303787). | ||
4307 | - Synchronise Spanish with sarge branch (thanks, Javier | ||
4308 | Fernández-Sanguino Peña; closes: #298536). | ||
4309 | - Add Ukrainian (thanks, Eugeniy Meshcheryakov; closes: #301852). | ||
4310 | |||
4311 | -- Colin Watson <cjwatson@debian.org> Thu, 26 May 2005 11:23:18 +0100 | ||
4312 | |||
4313 | openssh (1:3.9p1-3) experimental; urgency=low | ||
4314 | |||
4315 | * Explain how to run sshd from inittab in README.Debian (closes: #147360). | ||
4316 | * Add debian/watch file. | ||
4317 | |||
4318 | -- Colin Watson <cjwatson@debian.org> Fri, 18 Feb 2005 00:20:16 +0000 | ||
4319 | |||
4320 | openssh (1:3.9p1-2) experimental; urgency=low | ||
4321 | |||
4322 | * Remove pam_nologin from /etc/pam.d/ssh, as sshd's built-in support | ||
4323 | appears to be sufficient and more useful (closes: #162996). | ||
4324 | * Depend on debconf | debconf-2.0. | ||
4325 | * Drop LoginGraceTime back to the upstream default of two minutes on new | ||
4326 | installs (closes: #289573). | ||
4327 | * debconf template translations from Ubuntu bug #1232: | ||
4328 | - Update Greek (thanks, Logiotatidis George). | ||
4329 | - Update Spanish (thanks, Santiago Erquicia). | ||
4330 | |||
4331 | -- Colin Watson <cjwatson@debian.org> Sat, 15 Jan 2005 12:37:54 +0000 | ||
4332 | |||
4333 | openssh (1:3.9p1-1) experimental; urgency=low | ||
4334 | |||
4335 | * New upstream release. | ||
4336 | - PAM password authentication implemented again (closes: #238699, | ||
4337 | #242119). | ||
4338 | - Implemented the ability to pass selected environment variables between | ||
4339 | the client and the server. | ||
4340 | - Fix ssh-keyscan breakage when remote server doesn't speak SSH protocol | ||
4341 | (closes: #228828). | ||
4342 | - Fix res_query detection (closes: #242462). | ||
4343 | - 'ssh -c' documentation improved (closes: #265627). | ||
4344 | * Pass LANG and LC_* environment variables from the client by default, and | ||
4345 | accept them to the server by default in new installs, although not on | ||
4346 | upgrade (closes: #264024). | ||
4347 | * Build ssh in binary-indep, not binary-arch (thanks, LaMont Jones). | ||
4348 | * Expand on openssh-client package description (closes: #273831). | ||
4349 | |||
4350 | -- Colin Watson <cjwatson@debian.org> Tue, 4 Jan 2005 14:18:31 +0000 | ||
4351 | |||
4352 | openssh (1:3.8.1p1-14) experimental; urgency=low | ||
4353 | |||
4354 | * We use DH_COMPAT=2, so build-depend on debhelper (>= 2). | ||
4355 | * Fix timing information leak allowing discovery of invalid usernames in | ||
4356 | PAM keyboard-interactive authentication (backported from a patch by | ||
4357 | Darren Tucker; closes: #281595). | ||
4358 | * Make sure that there's a delay in PAM keyboard-interactive | ||
4359 | authentication when PermitRootLogin is not set to yes and the correct | ||
4360 | root password is entered (closes: #248747). | ||
4361 | |||
4362 | -- Colin Watson <cjwatson@debian.org> Sun, 28 Nov 2004 18:09:37 +0000 | ||
4363 | |||
4364 | openssh (1:3.8.1p1-13) experimental; urgency=low | ||
4365 | |||
4366 | * Enable threading for PAM, on Sam Hartman's advice (closes: #278394). | ||
4367 | * debconf template translations: | ||
4368 | - Update Dutch (thanks, cobaco; closes: #278715). | ||
4369 | * Correct README.Debian's ForwardX11Trusted description (closes: #280190). | ||
4370 | |||
4371 | -- Colin Watson <cjwatson@debian.org> Fri, 12 Nov 2004 12:03:13 +0000 | ||
4372 | |||
4373 | openssh (1:3.8.1p1-12) experimental; urgency=low | ||
4374 | |||
4375 | * Preserve /etc/ssh/sshd_config ownership/permissions (closes: #276754). | ||
4376 | * Shorten the version string from the form "OpenSSH_3.8.1p1 Debian | ||
4377 | 1:3.8.1p1-8.sarge.1" to "OpenSSH_3.8.1p1 Debian-8.sarge.1", as some SSH | ||
4378 | implementations apparently have problems with the long version string. | ||
4379 | This is of course a bug in those implementations, but since the extent | ||
4380 | of the problem is unknown it's best to play safe (closes: #275731). | ||
4381 | * debconf template translations: | ||
4382 | - Add Finnish (thanks, Matti Pöllä; closes: #265339). | ||
4383 | - Update Danish (thanks, Morten Brix Pedersen; closes: #275895). | ||
4384 | - Update French (thanks, Denis Barbier; closes: #276703). | ||
4385 | - Update Japanese (thanks, Kenshi Muto; closes: #277438). | ||
4386 | |||
4387 | -- Colin Watson <cjwatson@debian.org> Sun, 24 Oct 2004 19:21:17 +0100 | ||
4388 | |||
4389 | openssh (1:3.8.1p1-11) experimental; urgency=high | ||
4390 | |||
4391 | * Move sshd_config(5) to openssh-server, where it belongs. | ||
4392 | * If PasswordAuthentication is disabled, then offer to disable | ||
4393 | ChallengeResponseAuthentication too. The current PAM code will attempt | ||
4394 | password-style authentication if ChallengeResponseAuthentication is | ||
4395 | enabled (closes: #250369). | ||
4396 | * This will ask a question of anyone who installed fresh with 1:3.8p1-2 or | ||
4397 | later and then upgraded. Sorry about that ... for this reason, the | ||
4398 | default answer is to leave ChallengeResponseAuthentication enabled. | ||
4399 | |||
4400 | -- Colin Watson <cjwatson@debian.org> Wed, 6 Oct 2004 14:28:20 +0100 | ||
4401 | |||
4402 | openssh (1:3.8.1p1-10) experimental; urgency=low | ||
4403 | |||
4404 | * Don't install the ssh-askpass-gnome .desktop file by default; I've had | ||
4405 | too many GNOME people tell me it's the wrong thing to be doing. I've | ||
4406 | left it in /usr/share/doc/ssh-askpass-gnome/examples/ for now. | ||
4407 | |||
4408 | -- Colin Watson <cjwatson@debian.org> Wed, 25 Aug 2004 18:18:14 +0100 | ||
4409 | |||
4410 | openssh (1:3.8.1p1-9) experimental; urgency=low | ||
4411 | |||
4412 | * Split the ssh binary package into openssh-client and openssh-server | ||
4413 | (closes: #39741). openssh-server depends on openssh-client for some | ||
4414 | common functionality; it didn't seem worth creating yet another package | ||
4415 | for this. openssh-client is priority standard, openssh-server optional. | ||
4416 | * New transitional ssh package, priority optional, depending on | ||
4417 | openssh-client and openssh-server. May be removed once nothing depends | ||
4418 | on it. | ||
4419 | * When upgrading from ssh to openssh-{client,server}, it's very difficult | ||
4420 | for the maintainer scripts to find out what version we're upgrading from | ||
4421 | without dodgy dpkg hackery. I've therefore taken the opportunity to move | ||
4422 | a couple of debconf notes into NEWS files, namely ssh/ssh2_keys_merged | ||
4423 | and ssh/user_environment_tell. | ||
4424 | * Add a heuristic to try to make sure the sshd_config upgrade to >= 3.7 | ||
4425 | happens even though we don't know what version we're upgrading from. | ||
4426 | * Remove /etc/ssh/sshd_not_to_be_run on purge of openssh-server. For now | ||
4427 | (until sarge+2) it's still honoured to avoid breaking existing | ||
4428 | configurations, but the right approach is now to remove the | ||
4429 | openssh-server package if you don't want to run the server. Add a NEWS | ||
4430 | item to that effect. | ||
4431 | |||
4432 | -- Colin Watson <cjwatson@debian.org> Mon, 2 Aug 2004 20:48:54 +0100 | ||
4433 | |||
4434 | openssh (1:3.8.1p1-8.sarge.4) unstable; urgency=high | ||
4435 | |||
4436 | * Fix timing information leak allowing discovery of invalid usernames in | ||
4437 | PAM keyboard-interactive authentication (backported from a patch by | ||
4438 | Darren Tucker; closes: #281595). | ||
4439 | * Make sure that there's a delay in PAM keyboard-interactive | ||
4440 | authentication when PermitRootLogin is not set to yes and the correct | ||
4441 | root password is entered (closes: #248747). | ||
4442 | |||
4443 | -- Colin Watson <cjwatson@debian.org> Sun, 28 Nov 2004 12:37:16 +0000 | ||
4444 | |||
4445 | openssh (1:3.8.1p1-8.sarge.3) unstable; urgency=low | ||
4446 | |||
4447 | * Enable threading for PAM, on Sam Hartman's advice (closes: #278394). | ||
4448 | * debconf template translations: | ||
4449 | - Update Dutch (thanks, cobaco; closes: #278715). | ||
4450 | * Correct README.Debian's ForwardX11Trusted description (closes: #280190). | ||
4451 | |||
4452 | -- Colin Watson <cjwatson@debian.org> Fri, 12 Nov 2004 10:31:12 +0000 | ||
4453 | |||
4454 | openssh (1:3.8.1p1-8.sarge.2) unstable; urgency=low | ||
4455 | |||
4456 | * Preserve /etc/ssh/sshd_config ownership/permissions (closes: #276754). | ||
4457 | * Shorten the version string from the form "OpenSSH_3.8.1p1 Debian | ||
4458 | 1:3.8.1p1-8.sarge.1" to "OpenSSH_3.8.1p1 Debian-8.sarge.1", as some SSH | ||
4459 | implementations apparently have problems with the long version string. | ||
4460 | This is of course a bug in those implementations, but since the extent | ||
4461 | of the problem is unknown it's best to play safe (closes: #275731). | ||
4462 | * debconf template translations: | ||
4463 | - Add Finnish (thanks, Matti Pöllä; closes: #265339). | ||
4464 | - Update Danish (thanks, Morten Brix Pedersen; closes: #275895). | ||
4465 | - Update French (thanks, Denis Barbier; closes: #276703). | ||
4466 | - Update Japanese (thanks, Kenshi Muto; closes: #277438). | ||
4467 | |||
4468 | -- Colin Watson <cjwatson@debian.org> Sun, 24 Oct 2004 17:57:14 +0100 | ||
4469 | |||
4470 | openssh (1:3.8.1p1-8.sarge.1) unstable; urgency=high | ||
4471 | |||
4472 | * If PasswordAuthentication is disabled, then offer to disable | ||
4473 | ChallengeResponseAuthentication too. The current PAM code will attempt | ||
4474 | password-style authentication if ChallengeResponseAuthentication is | ||
4475 | enabled (closes: #250369). | ||
4476 | * This will ask a question of anyone who installed fresh with 1:3.8p1-2 or | ||
4477 | later and then upgraded. Sorry about that ... for this reason, the | ||
4478 | default answer is to leave ChallengeResponseAuthentication enabled. | ||
4479 | |||
4480 | -- Colin Watson <cjwatson@debian.org> Wed, 6 Oct 2004 14:21:55 +0100 | ||
4481 | |||
4482 | openssh (1:3.8.1p1-8) unstable; urgency=high | ||
4483 | |||
4484 | * Matthew Vernon: | ||
4485 | - Add a GPL exception to the licensing terms of the Debian patch | ||
4486 | (closes: #211644). | ||
4487 | |||
4488 | -- Colin Watson <cjwatson@debian.org> Thu, 29 Jul 2004 13:28:47 +0100 | ||
4489 | |||
4490 | openssh (1:3.8.1p1-7) unstable; urgency=low | ||
4491 | |||
4492 | * Re-enable shadow password support in openssh-server-udeb, at Bastian | ||
4493 | Blank's request (closes: #260800). | ||
4494 | |||
4495 | -- Colin Watson <cjwatson@debian.org> Thu, 22 Jul 2004 10:56:06 +0100 | ||
4496 | |||
4497 | openssh (1:3.8.1p1-6) unstable; urgency=low | ||
4498 | |||
4499 | * Implement hack in | ||
4500 | http://lists.debian.org/debian-boot/2004/07/msg01207.html to get | ||
4501 | openssh-client-udeb to show up as a retrievable debian-installer | ||
4502 | component. | ||
4503 | * Generate host keys in postinst only if the relevant HostKey directives | ||
4504 | are found in sshd_config (closes: #87946). | ||
4505 | |||
4506 | -- Colin Watson <cjwatson@debian.org> Wed, 21 Jul 2004 15:14:46 +0100 | ||
4507 | |||
4508 | openssh (1:3.8.1p1-5) unstable; urgency=medium | ||
4509 | |||
4510 | * Update German debconf template translation (thanks, Helge Kreutzmann; | ||
4511 | closes: #252226). | ||
4512 | * Remove Suggests: dnsutils, as it was only needed for | ||
4513 | make-ssh-known-hosts (#93265), which has been replaced by ssh-keyscan. | ||
4514 | * Disable shadow password support in openssh-server-udeb. | ||
4515 | * Fix non-portable shell constructs in maintainer scripts, Makefile, and | ||
4516 | ssh-copy-id (thanks, David Weinehall; closes: #258517). | ||
4517 | * Apply patch from Darren Tucker to make the PAM authentication SIGCHLD | ||
4518 | handler kill the PAM thread if its waitpid() call returns 0, as well as | ||
4519 | the previous check for -1 (closes: #252676). | ||
4520 | * Add scp and sftp to openssh-client-udeb. It might not be very 'u' any | ||
4521 | more; oh well. | ||
4522 | |||
4523 | -- Colin Watson <cjwatson@debian.org> Sat, 10 Jul 2004 13:57:27 +0100 | ||
4524 | |||
4525 | openssh (1:3.8.1p1-4) unstable; urgency=medium | ||
4526 | |||
4527 | * Kill off PAM thread if privsep slave dies (closes: #248125). | ||
4528 | |||
4529 | -- Colin Watson <cjwatson@debian.org> Fri, 28 May 2004 17:58:45 -0300 | ||
4530 | |||
4531 | openssh (1:3.8.1p1-3) unstable; urgency=low | ||
4532 | |||
4533 | * Add ssh-keygen to openssh-server-udeb. | ||
4534 | |||
4535 | -- Colin Watson <cjwatson@debian.org> Thu, 20 May 2004 16:31:52 +0100 | ||
4536 | |||
4537 | openssh (1:3.8.1p1-2) unstable; urgency=low | ||
4538 | |||
4539 | * Add Catalan debconf template translation (thanks, Aleix Badia i Bosch; | ||
4540 | closes: #248748). | ||
4541 | * openssh-client-udeb and openssh-server-udeb depend on libnss-files-udeb | ||
4542 | (not yet uploaded). | ||
4543 | * Restore ssh-askpass-gnome binary, lost by mistake. | ||
4544 | * Don't link against libnsl in udeb builds. | ||
4545 | |||
4546 | -- Colin Watson <cjwatson@debian.org> Thu, 20 May 2004 11:15:58 +0100 | ||
4547 | |||
4548 | openssh (1:3.8.1p1-1) unstable; urgency=low | ||
4549 | |||
4550 | * New upstream release. | ||
4551 | - Use a longer buffer for tty names in utmp (closes: #247538). | ||
4552 | * Make sure there's a newline at the end of sshd_config before adding | ||
4553 | 'UsePAM yes' (closes: #244829). | ||
4554 | * Generate a new .orig.tar.gz without RFC.nroff, and remove | ||
4555 | /usr/share/doc/ssh/RFC.gz (closes: #211640). It isn't DFSG-free and only | ||
4556 | documents the obsolete SSH1 protocol, not to mention that it was never a | ||
4557 | real RFC but only an Internet-Draft. It's available from | ||
4558 | http://www.free.lp.se/bamse/draft-ylonen-ssh-protocol-00.txt if you want | ||
4559 | it for some reason. | ||
4560 | * Add openssh-client-udeb and openssh-server-udeb binary packages for use | ||
4561 | in debian-installer. They still need libnss_files to be supplied in udeb | ||
4562 | form by glibc. | ||
4563 | * Work around lack of res_query weak alias in libresolv on amd64 (see | ||
4564 | #242462, awaiting real fix upstream). | ||
4565 | * Fix grammar in sshd(8) (closes: #238753). | ||
4566 | * Add .desktop file and icon for ssh-askpass-gnome (closes: #232333). | ||
4567 | * Update Polish debconf template translation (thanks, Emil Nowak; | ||
4568 | closes: #242808). | ||
4569 | * Add Turkish debconf template translation (thanks, Recai OktaÅŸ; | ||
4570 | closes: #246068). | ||
4571 | |||
4572 | -- Colin Watson <cjwatson@debian.org> Tue, 11 May 2004 23:38:10 +0100 | ||
4573 | |||
4574 | openssh (1:3.8p1-3) unstable; urgency=low | ||
4575 | |||
4576 | * Remove deprecated ReverseMappingCheck option from newly generated | ||
4577 | sshd_config files (closes: #239987). | ||
4578 | * Build everything apart from contrib in a subdirectory, to allow for | ||
4579 | multiple builds. | ||
4580 | * Some older kernels are missing setresuid() and setresgid(), so don't try | ||
4581 | to use them. setreuid() and setregid() will do well enough for our | ||
4582 | purposes (closes: #239999). | ||
4583 | |||
4584 | -- Colin Watson <cjwatson@debian.org> Mon, 5 Apr 2004 21:23:43 +0100 | ||
4585 | |||
4586 | openssh (1:3.8p1-2) unstable; urgency=medium | ||
4587 | |||
4588 | * Disable PasswordAuthentication for new installations (closes: #236810). | ||
4589 | * Turn off the new ForwardX11Trusted by default, returning to the | ||
4590 | semantics of 3.7 and earlier, since it seems immature and causes far too | ||
4591 | many problems with existing setups. See README.Debian for details | ||
4592 | (closes: #237021). | ||
4593 | |||
4594 | -- Colin Watson <cjwatson@debian.org> Wed, 10 Mar 2004 10:33:07 +0000 | ||
4595 | |||
4596 | openssh (1:3.8p1-1) unstable; urgency=low | ||
4597 | |||
4598 | * New upstream release (closes: #232281): | ||
4599 | - New PAM implementation based on that in FreeBSD. This runs PAM session | ||
4600 | modules before dropping privileges (closes: #132681, #150968). | ||
4601 | - Since PAM session modules are run as root, we can turn pam_limits back | ||
4602 | on by default, and it no longer spits out "Operation not permitted" to | ||
4603 | syslog (closes: #171673). | ||
4604 | - Password expiry works again (closes: #153235). | ||
4605 | - 'ssh -q' suppresses login banner (closes: #134589). | ||
4606 | - sshd doesn't lie to PAM about invalid usernames (closes: #157078). | ||
4607 | - ssh-add prints key comment on each prompt (closes: #181869). | ||
4608 | - Punctuation formatting fixed in man pages (closes: #191131). | ||
4609 | - EnableSSHKeysign documented in ssh_config(5) (closes: #224457). | ||
4610 | * Add 'UsePAM yes' to /etc/ssh/sshd_config on upgrade from versions older | ||
4611 | than this, to maintain the standard Debian sshd configuration. | ||
4612 | * Comment out PAMAuthenticationViaKbdInt and RhostsAuthentication in | ||
4613 | sshd_config on upgrade. Neither option is supported any more. | ||
4614 | * Privilege separation and PAM are now properly supported together, so | ||
4615 | remove both debconf questions related to them and simply set it | ||
4616 | unconditionally in newly generated sshd_config files (closes: #228838). | ||
4617 | * ServerAliveInterval implemented upstream, so ProtocolKeepAlives is now a | ||
4618 | compatibility alias. The semantics differ slightly, though; see | ||
4619 | ssh_config(5) for details. | ||
4620 | * Implement SSH1 support for ServerAliveInterval using SSH_MSG_IGNORE. As | ||
4621 | documented in ssh_config(5), it's not as good as the SSH2 version. | ||
4622 | * Remove -fno-builtin-log, -DHAVE_MMAP_ANON_SHARED, and | ||
4623 | -D__FILE_OFFSET_BITS=64 compiler options, which are no longer necessary. | ||
4624 | * Update config.guess and config.sub from autotools-dev 20040105.1. | ||
4625 | * Darren Tucker: | ||
4626 | - Reset signal status when starting pam auth thread, prevent hanging | ||
4627 | during PAM keyboard-interactive authentications. | ||
4628 | - Fix a non-security-critical segfault in PAM authentication. | ||
4629 | * Add debconf template translations: | ||
4630 | - Greek (thanks, Konstantinos Margaritis; closes: #232843). | ||
4631 | - Italian (thanks, Renato Gini; closes: #234777). | ||
4632 | |||
4633 | -- Colin Watson <cjwatson@debian.org> Sat, 6 Mar 2004 18:43:44 +0000 | ||
4634 | |||
4635 | openssh (1:3.6.1p2-12) unstable; urgency=low | ||
4636 | |||
4637 | * Update Spanish debconf template translation (thanks, Javier | ||
4638 | Fernández-Sanguino Peña; closes: #228242). | ||
4639 | * Add debconf template translations: | ||
4640 | - Czech (thanks, Miroslav Kure; closes: #230110). | ||
4641 | - Simplified Chinese (thanks, Hiei Xu; closes: #230726). | ||
4642 | |||
4643 | -- Colin Watson <cjwatson@debian.org> Wed, 11 Feb 2004 09:37:57 +0000 | ||
4644 | |||
4645 | openssh (1:3.6.1p2-11) unstable; urgency=low | ||
4646 | |||
4647 | * Comment out pam_limits in default configuration, for now at least | ||
4648 | (closes: #198254). | ||
4649 | * Use invoke-rc.d (if it exists) to run the init script. | ||
4650 | * Backport format string bug fix in sshconnect.c (closes: #225238). | ||
4651 | * ssh-copy-id exits if ssh fails (closes: #215252). | ||
4652 | |||
4653 | -- Colin Watson <cjwatson@debian.org> Sun, 4 Jan 2004 18:59:21 +0000 | ||
4654 | |||
4655 | openssh (1:3.6.1p2-10) unstable; urgency=low | ||
4656 | |||
4657 | * Use --retry in init script when restarting rather than sleeping, to make | ||
4658 | sure the old process is dead (thanks, Herbert Xu; closes: #212117). | ||
4659 | Depend on dpkg (>= 1.9.0) for start-stop-daemon's --retry option. | ||
4660 | * Update debconf template translations: | ||
4661 | - Brazilian Portuguese (thanks, Andre Luis Lopes; closes: #219844). | ||
4662 | - Danish (thanks, Morten Brix Pedersen; closes: #217964). | ||
4663 | - Japanese (thanks, Kenshi Muto; closes: #212497). | ||
4664 | - Russian (thanks, Ilgiz Kalmetev). | ||
4665 | - Spanish (thanks, Carlos Valdivia Yagüe; closes: #211832). | ||
4666 | * Add Dutch debconf template translation (thanks, cobaco; | ||
4667 | closes: #215372). | ||
4668 | * Update config.guess and config.sub from autotools-dev 20031007.1 | ||
4669 | (closes: #217696). | ||
4670 | * Implement New World Order for PAM configuration, including | ||
4671 | /etc/pam.d/common-* from /etc/pam.d/ssh (closes: #212959). | ||
4672 | - To backport this release to woody, you need to set DEB_BUILD_SSH_WOODY | ||
4673 | in your environment. See README.Debian. | ||
4674 | * Add more commentary to /etc/pam.d/ssh. | ||
4675 | |||
4676 | -- Colin Watson <cjwatson@debian.org> Sun, 16 Nov 2003 01:14:16 +0000 | ||
4677 | |||
4678 | openssh (1:3.6.1p2-9) unstable; urgency=high | ||
4679 | |||
4680 | * Merge even more buffer allocation fixes from upstream (CAN-2003-0682; | ||
4681 | closes: #211434). | ||
4682 | |||
4683 | -- Colin Watson <cjwatson@debian.org> Fri, 19 Sep 2003 10:25:25 +0100 | ||
4684 | |||
4685 | openssh (1:3.6.1p2-8) unstable; urgency=high | ||
4686 | |||
4687 | * Merge more buffer allocation fixes from new upstream version 3.7.1p1 | ||
4688 | (closes: #211324). | ||
4689 | |||
4690 | -- Colin Watson <cjwatson@debian.org> Wed, 17 Sep 2003 03:07:19 +0100 | ||
4691 | |||
4692 | openssh (1:3.6.1p2-7) unstable; urgency=high | ||
4693 | |||
4694 | * Update debconf template translations: | ||
4695 | - French (thanks, Christian Perrier; closes: #208801). | ||
4696 | - Japanese (thanks, Kenshi Muto; closes: #210380). | ||
4697 | * Some small improvements to the English templates courtesy of Christian | ||
4698 | Perrier. I've manually unfuzzied a few translations where it was | ||
4699 | obvious, on Christian's advice, but the others will have to be updated. | ||
4700 | * Document how to generate an RSA1 host key (closes: #141703). | ||
4701 | * Incorporate NMU fix for early buffer expansion vulnerability, | ||
4702 | CAN-2003-0693 (closes: #211205). Thanks to Michael Stone. | ||
4703 | |||
4704 | -- Colin Watson <cjwatson@debian.org> Tue, 16 Sep 2003 14:32:28 +0100 | ||
4705 | |||
4706 | openssh (1:3.6.1p2-6.0) unstable; urgency=high | ||
4707 | |||
4708 | * SECURITY: fix for CAN-2003-0693, buffer allocation error | ||
4709 | |||
4710 | -- Michael Stone <mstone@debian.org> Tue, 16 Sep 2003 08:27:07 -0400 | ||
4711 | |||
4712 | openssh (1:3.6.1p2-6) unstable; urgency=medium | ||
4713 | |||
4714 | * Use a more CVS-friendly means of setting SSH_VERSION. | ||
4715 | * Update Brazilian Portuguese debconf template translation (thanks, Andre | ||
4716 | Luis Lopes; closes: #208036). | ||
4717 | * Don't run 'sshd -t' in init script if the server isn't to be run | ||
4718 | (closes: #197576). | ||
4719 | * Fix login delay, spurious auth.log entry, and PermitRootLogin | ||
4720 | information leakage due to PAM issues with upstream's recent security | ||
4721 | update (thanks, Darren Tucker; closes: #99168, #192207, #193546). | ||
4722 | * Policy version 3.6.1: recode this changelog to UTF-8. | ||
4723 | |||
4724 | -- Colin Watson <cjwatson@debian.org> Wed, 3 Sep 2003 19:14:02 +0100 | ||
4725 | |||
4726 | openssh (1:3.6.1p2-5) unstable; urgency=low | ||
4727 | |||
4728 | * Disable cmsg_type check for file descriptor passing when running on | ||
4729 | Linux 2.0 (closes: #150976). Remove comments about non-functional | ||
4730 | privilege separation on 2.0 from ssh/privsep_ask and ssh/privsep_tell | ||
4731 | debconf questions and from README.Debian, since it should all now work. | ||
4732 | * Fix "defails" typo in generated sshd_config (closes: #206484). | ||
4733 | * Backport upstream patch to strip trailing whitespace (including | ||
4734 | newlines) from configuration directives (closes: #192079). | ||
4735 | |||
4736 | -- Colin Watson <cjwatson@debian.org> Wed, 27 Aug 2003 02:19:57 +0100 | ||
4737 | |||
4738 | openssh (1:3.6.1p2-4) unstable; urgency=low | ||
4739 | |||
4740 | * getent can get just one key; no need to use grep (thanks, James Troup). | ||
4741 | * Move /usr/local/bin to the front of the default path, following | ||
4742 | /etc/login.defs (closes: #201150). | ||
4743 | * Remove specifics of problematic countries from package description | ||
4744 | (closes: #197040). | ||
4745 | * Update Spanish debconf template translation (thanks, Carlos Valdivia | ||
4746 | Yagüe; closes: #198456). | ||
4747 | * Backport upstream patch to pass monitor signals through to child | ||
4748 | (closes: #164797). | ||
4749 | |||
4750 | -- Colin Watson <cjwatson@debian.org> Sun, 27 Jul 2003 17:31:15 +0100 | ||
4751 | |||
4752 | openssh (1:3.6.1p2-3) unstable; urgency=low | ||
4753 | |||
4754 | * Update French debconf template translation (thanks, Christian Perrier; | ||
4755 | closes: #194323). | ||
4756 | * Version the adduser dependency for --no-create-home (closes: #195756). | ||
4757 | * Add a version of moduli(5), namely revision 1.7 of | ||
4758 | http://www.openbsd.org/cgi-bin/cvsweb/src/share/man/man5/moduli.5 with | ||
4759 | '/etc/moduli' changed to '/etc/ssh/moduli' throughout (closes: #196061). | ||
4760 | |||
4761 | -- Colin Watson <cjwatson@debian.org> Mon, 9 Jun 2003 02:51:35 +0100 | ||
4762 | |||
4763 | openssh (1:3.6.1p2-2) unstable; urgency=low | ||
4764 | |||
4765 | * Force /etc/default/ssh to be non-executable, since dpkg apparently | ||
4766 | doesn't deal with permissions changes on conffiles (closes: #192966). | ||
4767 | * Use debconf 0.5's seen flag rather than the deprecated isdefault. | ||
4768 | * Add GPL location to copyright file. | ||
4769 | * Remove debian/postinst.old. | ||
4770 | * Switch to po-debconf, with some careful manual use of po2debconf to | ||
4771 | ensure that the source package continues to build smoothly on woody | ||
4772 | (closes: #183986). | ||
4773 | * Update debconf template translations: | ||
4774 | - Brazilian Portugese (thanks, Andre Luis Lopes; see #183986). | ||
4775 | - Japanese (thanks, Tomohiro KUBOTA; closes: #192429). | ||
4776 | * Compile with -fno-builtin-log for now, otherwise gcc-3.3 complains | ||
4777 | "log.h:59: warning: conflicting types for built-in function `log'". The | ||
4778 | OpenSSH log() function has been renamed in upstream CVS. | ||
4779 | |||
4780 | -- Colin Watson <cjwatson@debian.org> Mon, 19 May 2003 01:52:38 +0100 | ||
4781 | |||
4782 | openssh (1:3.6.1p2-1) unstable; urgency=medium | ||
4783 | |||
4784 | * New upstream release, including fix for PAM user-discovery security hole | ||
4785 | (closes: #191681). | ||
4786 | * Fix ChallengeResponseAuthentication default in generated sshd_config | ||
4787 | (closes: #106037). | ||
4788 | * Put newlines after full stops in man page documentation for | ||
4789 | ProtocolKeepAlives and SetupTimeOut. | ||
4790 | * Policy version 3.5.9: support DEB_BUILD_OPTIONS=noopt, build | ||
4791 | gnome-ssh-askpass with -g and -Wall flags. | ||
4792 | * Really ask ssh/new_config debconf question before trying to fetch its | ||
4793 | value (closes: #188721). | ||
4794 | * On purge, remove only the files we know about in /etc/ssh rather than | ||
4795 | the whole thing, and remove the directory if that leaves it empty | ||
4796 | (closes: #176679). | ||
4797 | * ssh has depended on debconf for some time now with no complaints, so: | ||
4798 | - Simplify the postinst by relying on debconf being present. (The absent | ||
4799 | case was buggy anyway.) | ||
4800 | - Get rid of "if you have not installed debconf" text in README.Debian, | ||
4801 | and generally update the "/usr/bin/ssh not SUID" entry. | ||
4802 | * More README.Debian work: | ||
4803 | - Reorganize into "UPGRADE ISSUES" and "OTHER ISSUES", in an effort to | ||
4804 | make it easier for people to find the former. The upgrade issues | ||
4805 | should probably be sorted by version somehow. | ||
4806 | - Document X11UseLocalhost under "X11 Forwarding" (closes: #150913). | ||
4807 | * Fix setting of IP flags for interactive sessions (upstream bug #541). | ||
4808 | |||
4809 | -- Colin Watson <cjwatson@debian.org> Mon, 5 May 2003 17:47:40 +0100 | ||
4810 | |||
4811 | openssh (1:3.6.1p1-1) unstable; urgency=low | ||
4812 | |||
4813 | * New upstream release (thanks, Laurence J. Lane). | ||
4814 | * debian/control: ssh-askpass-gnome is now Section: gnome, following the | ||
4815 | override file. | ||
4816 | |||
4817 | -- Colin Watson <cjwatson@debian.org> Wed, 2 Apr 2003 00:51:02 +0100 | ||
4818 | |||
4819 | openssh (1:3.6p1-1) unstable; urgency=low | ||
4820 | |||
4821 | * New upstream release. | ||
4822 | - Workaround applied upstream for a bug in the interaction of glibc's | ||
4823 | getaddrinfo() with the Linux 2.2 kernel (closes: #155814). | ||
4824 | - As such, it should now be safe to remove --with-ipv4-default, so | ||
4825 | starting sshd with -6 is no longer necessary (closes: #79861 and lots | ||
4826 | of other merged bugs). | ||
4827 | - ssh-copy-id prints usage when run without arguments (closes: #71376). | ||
4828 | - scp exits 1 if ssh fails (closes: #138400). | ||
4829 | - sshd writes to utmp's ut_addr_v6 field in IPv6 mode (closes: #167867). | ||
4830 | - 'ssh-add -c' causes ssh-agent to ask the user each time a key is used | ||
4831 | (closes: #109795). | ||
4832 | * Install /etc/default/ssh non-executable (closes: #185537). | ||
4833 | |||
4834 | -- Colin Watson <cjwatson@debian.org> Mon, 31 Mar 2003 23:00:59 +0100 | ||
4835 | |||
4836 | openssh (1:3.5p1-5) unstable; urgency=low | ||
4837 | |||
4838 | * Add /etc/default/ssh (closes: #161049). | ||
4839 | * Run the init script under 'set -e' (closes: #175010). | ||
4840 | * Change the default superuser path to include /sbin, /usr/sbin, and | ||
4841 | /usr/local/sbin (closes: #128235, #151267). Using login.defs would be | ||
4842 | nice, but that belongs to another package. Without a defined API to | ||
4843 | retrieve its settings, parsing it is off-limits. | ||
4844 | * Build ssh-askpass-gnome with GNOME 2. The source package should still | ||
4845 | support building on stable with GNOME 1, using the alternate | ||
4846 | libgnome-dev build-dependency (thanks, Colin Walters; closes: #167582). | ||
4847 | |||
4848 | -- Colin Watson <cjwatson@debian.org> Sun, 9 Mar 2003 20:12:10 +0000 | ||
4849 | |||
4850 | openssh (1:3.5p1-4) unstable; urgency=low | ||
4851 | |||
4852 | * Point rlogin and rcp alternatives at slogin and scp respectively rather | ||
4853 | than ssh (closes: #121103, #151666). Fix alternative removal to match; | ||
4854 | previously it was completely wrong anyway. | ||
4855 | * Find out whether /etc/ssh/sshd_not_to_be_run exists and set the debconf | ||
4856 | question's default using that information, rather than using debconf as | ||
4857 | a registry. Other solutions may be better in the long run, but this is | ||
4858 | at least correct (thanks, Matthew Woodcraft; closes: #84725). | ||
4859 | * Stop using pam_lastlog, as it doesn't currently work well as a session | ||
4860 | module when privilege separation is enabled; it can usually read | ||
4861 | /var/log/lastlog but can't write to it. Instead, just use sshd's | ||
4862 | built-in support, already enabled by default (closes: #151297, #169938). | ||
4863 | * Use 'ssh-keygen -q' rather than redirecting output to /dev/null. | ||
4864 | * Add a "this may take some time" warning when creating host keys on | ||
4865 | installation (part of #110094). | ||
4866 | * When restarting via the init script, check for sshd_not_to_be_run after | ||
4867 | stopping sshd (idea from Tomas Pospisek; closes: #149850). | ||
4868 | * Append /usr/sbin:/sbin to the init script's $PATH, just in case of | ||
4869 | strangeness (closes: #115138). | ||
4870 | * Fix a dpkg-statoverride call to redirect stdout to /dev/null, not | ||
4871 | stderr. | ||
4872 | * Correct copyright file typo: "orignal" -> "original" (closes: #176490). | ||
4873 | * Rebuild with libssl0.9.7 (closes: #176983). | ||
4874 | * We're up to policy version 3.5.6. DEB_BUILD_OPTIONS stuff still needs to | ||
4875 | be looked at. | ||
4876 | |||
4877 | -- Colin Watson <cjwatson@debian.org> Sat, 18 Jan 2003 01:37:23 +0000 | ||
4878 | |||
4879 | openssh (1:3.5p1-3) unstable; urgency=low | ||
4880 | |||
4881 | * Happy new year! | ||
4882 | * Use getent rather than id to find out whether the sshd user exists | ||
4883 | (closes: #150974). | ||
4884 | * Remove some duplication from the postinst's ssh-keysign setuid code. | ||
4885 | * Replace db_text with db_input throughout debian/config. (db_text has | ||
4886 | been a compatibility wrapper since debconf 0.1.5.) | ||
4887 | * Warn about PermitUserEnvironment on upgrade (closes: #167895). | ||
4888 | * Use 'make install-nokeys', and disable unused debhelper commands, | ||
4889 | thereby forward-porting the last pieces of Zack Weinberg's patch | ||
4890 | (closes: #68341). | ||
4891 | * Move the man page for gnome-ssh-askpass from the ssh package to | ||
4892 | ssh-askpass-gnome (closes: #174449). | ||
4893 | * Build with -DLOGIN_NO_ENDOPT, since Debian's /bin/login doesn't accept | ||
4894 | '--' to terminate the list of options (closes: #171554). | ||
4895 | * Add Jonathan Amery's ssh-argv0 script (closes: #111341). | ||
4896 | * Update Danish debconf template (thanks, Morten Brix Pedersen; | ||
4897 | closes: #174757). | ||
4898 | * Document setgid ssh-agent's effect on certain environment variables in | ||
4899 | README.Debian (closes: #167974). | ||
4900 | * Document interoperability problems between scp and ssh.com's server in | ||
4901 | README.Debian, and suggest some workarounds (closes: #174662). | ||
4902 | |||
4903 | -- Colin Watson <cjwatson@debian.org> Wed, 1 Jan 2003 14:18:30 +0000 | ||
4904 | |||
4905 | openssh (1:3.5p1-2) unstable; urgency=low | ||
4906 | |||
4907 | * Mention in the ssh package description that it provides both ssh and | ||
4908 | sshd (closes: #99680). | ||
4909 | * Create a system group for ssh-agent, not a user group (closes: #167669). | ||
4910 | |||
4911 | -- Colin Watson <cjwatson@debian.org> Mon, 4 Nov 2002 13:43:53 +0000 | ||
4912 | |||
4913 | openssh (1:3.5p1-1) unstable; urgency=low | ||
4914 | |||
4915 | * New upstream release. | ||
4916 | - Fixes typo in ssh-add usage (closes: #152239). | ||
4917 | - Fixes 'PermitRootLogin forced-commands-only' (closes: #166184). | ||
4918 | - ~/.ssh/environment and environment= options in ~/.ssh/authorized_keys | ||
4919 | are deprecated for security reasons and will eventually go away. For | ||
4920 | now they can be re-enabled by setting 'PermitUserEnvironment yes' in | ||
4921 | sshd_config. | ||
4922 | - ssh-agent is installed setgid to prevent ptrace() attacks. The group | ||
4923 | actually doesn't matter, as it drops privileges immediately, but to | ||
4924 | avoid confusion the postinst creates a new 'ssh' group for it. | ||
4925 | * Obsolete patches: | ||
4926 | - Solar Designer's privsep+compression patch for Linux 2.2 (see | ||
4927 | 1:3.3p1-0.0woody1). | ||
4928 | - Hostbased auth ssh-keysign backport (see 1:3.4p1-4). | ||
4929 | |||
4930 | * Remove duplicated phrase in ssh_config(5) (closes: #152404). | ||
4931 | * Source the debconf confmodule at the top of the postrm rather than at | ||
4932 | the bottom, to avoid making future non-idempotency problems worse (see | ||
4933 | #151035). | ||
4934 | * Debconf templates: | ||
4935 | - Add Polish (thanks, Grzegorz Kusnierz). | ||
4936 | - Update French (thanks, Denis Barbier; closes: #132509). | ||
4937 | - Update Spanish (thanks, Carlos Valdivia Yagüe; closes: #164716). | ||
4938 | * Write a man page for gnome-ssh-askpass, and link it to ssh-askpass.1 if | ||
4939 | this is the selected ssh-askpass alternative (closes: #67775). | ||
4940 | |||
4941 | -- Colin Watson <cjwatson@debian.org> Sat, 26 Oct 2002 19:41:51 +0100 | ||
4942 | |||
4943 | openssh (1:3.4p1-4) unstable; urgency=low | ||
4944 | |||
4945 | * Allow ssh-krb5 in ssh-askpass-gnome's dependencies (closes: #129532). | ||
4946 | * Restore Russia to list of countries where encryption is problematic (see | ||
4947 | #148951 and http://www.average.org/freecrypto/). | ||
4948 | * Drop ssh-askpass-gnome's priority to optional, per the override file. | ||
4949 | * Drop the PAM special case for hurd-i386 (closes: #99157). | ||
4950 | * s/dile/idle/ in ssh_config(5) (closes: #118331). | ||
4951 | * Note in README.Debian that you need xauth from xbase-clients on the | ||
4952 | server for X11 forwarding (closes: #140269). | ||
4953 | * Use correct path to upstream README in copyright file (closes: #146037). | ||
4954 | * Document the units for ProtocolKeepAlives (closes: #159479). | ||
4955 | * Backport upstream patch to fix hostbased auth (closes: #117114). | ||
4956 | * Add -g to CFLAGS. | ||
4957 | |||
4958 | -- Colin Watson <cjwatson@debian.org> Sun, 13 Oct 2002 18:58:53 +0100 | ||
4959 | |||
4960 | openssh (1:3.4p1-3) unstable; urgency=low | ||
4961 | |||
4962 | * Add myself to Uploaders: and begin acting as temporary maintainer, at | ||
4963 | Matthew's request. (Normal service will resume in some months' time.) | ||
4964 | * Add sharutils to Build-Depends (closes: #138465). | ||
4965 | * Stop creating the /usr/doc/ssh symlink. | ||
4966 | |||
4967 | * Fix some debconf template typos (closes: #160358). | ||
4968 | * Split debconf templates into one file per language. | ||
4969 | * Add debconf template translations: | ||
4970 | - Brazilian Portuguese (thanks, Andre Luis Lopes; closes: #106173). | ||
4971 | - Danish (thanks, Claus Hindsgaul; closes: #126607). | ||
4972 | - Japanese (thanks, Tomohiro KUBOTA; closes: #137427). | ||
4973 | - Russian (thanks, Ilgiz Kalmetev; closes: #136610). | ||
4974 | - Spanish (thanks, Carlos Valdivia Yagüe; closes: #129041). | ||
4975 | * Update debconf template translations: | ||
4976 | - French (thanks, Igor Genibel; closes: #151361). | ||
4977 | - German (thanks, Axel Noetzold; closes: #147069). | ||
4978 | * Some of these translations are fuzzy. Please send updates. | ||
4979 | |||
4980 | -- Colin Watson <cjwatson@debian.org> Sun, 13 Oct 2002 14:09:57 +0100 | ||
4981 | |||
4982 | openssh (1:3.4p1-2) unstable; urgency=high | ||
4983 | |||
4984 | * Get a security-fixed version into unstable | ||
4985 | * Also tidy README.Debian up a little | ||
4986 | |||
4987 | -- Matthew Vernon <matthew@debian.org> Fri, 28 Jun 2002 17:20:59 +0100 | ||
4988 | |||
4989 | openssh (1:3.4p1-1) testing; urgency=high | ||
4990 | |||
4991 | * Extend my tendrils back into this package (Closes: #150915, #151098) | ||
4992 | * thanks to the security team for their work | ||
4993 | * no thanks to ISS/Theo de Raadt for their handling of these bugs | ||
4994 | * save old sshd_configs to sshd_config.dpkg-old when auto-generating a | ||
4995 | new one | ||
4996 | * tell/ask the user about PriviledgeSeparation | ||
4997 | * /etc/init.d/ssh run will now create the chroot empty dir if necessary | ||
4998 | * Remove our previous statoverride on /usr/bin/ssh (only for people | ||
4999 | upgrading from a version where we'd put one in ourselves!) | ||
5000 | * Stop slandering Russia, since someone asked so nicely (Closes: #148951) | ||
5001 | * Reduce the sleep time in /etc/init.d/ssh during a restart | ||
5002 | |||
5003 | -- Matthew Vernon <matthew@debian.org> Fri, 28 Jun 2002 15:52:10 +0100 | ||
5004 | |||
5005 | openssh (1:3.4p1-0.0woody1) testing-security; urgency=high | ||
5006 | |||
5007 | * NMU by the security team. | ||
5008 | * New upstream version | ||
5009 | |||
5010 | -- Michael Stone <mstone@debian.org> Wed, 26 Jun 2002 15:40:38 -0400 | ||
5011 | |||
5012 | openssh (1:3.3p1-0.0woody4) testing-security; urgency=high | ||
5013 | |||
5014 | * NMU by the security team. | ||
5015 | * fix error when /etc/ssh/sshd_config exists on new install | ||
5016 | * check that user doesn't exist before running adduser | ||
5017 | * use openssl internal random unconditionally | ||
5018 | |||
5019 | -- Michael Stone <mstone@debian.org> Tue, 25 Jun 2002 19:44:39 -0400 | ||
5020 | |||
5021 | openssh (1:3.3p1-0.0woody3) testing-security; urgency=high | ||
5022 | |||
5023 | * NMU by the security team. | ||
5024 | * use correct home directory when sshd user is created | ||
5025 | |||
5026 | -- Michael Stone <mstone@debian.org> Tue, 25 Jun 2002 08:59:50 -0400 | ||
5027 | |||
5028 | openssh (1:3.3p1-0.0woody2) testing-security; urgency=high | ||
5029 | |||
5030 | * NMU by the security team. | ||
5031 | * Fix rsa1 key creation (Closes: #150949) | ||
5032 | * don't fail if sshd user removal fails | ||
5033 | * depends: on adduser (Closes: #150907) | ||
5034 | |||
5035 | -- Michael Stone <mstone@debian.org> Tue, 25 Jun 2002 08:59:50 -0400 | ||
5036 | |||
5037 | openssh (1:3.3p1-0.0woody1) testing-security; urgency=high | ||
5038 | |||
5039 | * NMU by the security team. | ||
5040 | * New upstream version. | ||
5041 | - Enable privilege separation by default. | ||
5042 | * Include patch from Solar Designer for privilege separation and | ||
5043 | compression on 2.2.x kernels. | ||
5044 | * Remove --disable-suid-ssh from configure. | ||
5045 | * Support setuid ssh-keysign binary instead of setuid ssh client. | ||
5046 | * Check sshd configuration before restarting. | ||
5047 | |||
5048 | -- Daniel Jacobowitz <dan@debian.org> Mon, 24 Jun 2002 13:43:44 -0400 | ||
5049 | |||
5050 | openssh (1:3.0.2p1-9) unstable; urgency=high | ||
5051 | |||
5052 | * Thanks to those who NMUd | ||
5053 | * The only change in this version is to debian/control - I've removed | ||
5054 | the bit that says you can't export it from the US - it would look | ||
5055 | pretty daft to say this about a package in main! Also, it's now OK | ||
5056 | to use crypto in France, so I've edited that comment slightly | ||
5057 | * Correct a path in README.Debian too (Closes: #138634) | ||
5058 | |||
5059 | -- Matthew Vernon <matthew@debian.org> Sun, 4 Apr 2002 09:52:59 +0100 | ||
5060 | |||
5061 | openssh (1:3.0.2p1-8.3) unstable; urgency=medium | ||
5062 | |||
5063 | * NMU | ||
5064 | * Really set urgency to medium this time (oops) | ||
5065 | * Fix priority to standard per override while I'm at it | ||
5066 | |||
5067 | -- Aaron M. Ucko <ucko@debian.org> Sun, 24 Mar 2002 09:00:08 -0500 | ||
5068 | |||
5069 | openssh (1:3.0.2p1-8.2) unstable; urgency=low | ||
5070 | |||
5071 | * NMU with maintainer's permission | ||
5072 | * Prepare for upcoming ssh-nonfree transitional packages per | ||
5073 | <http://lists.debian.org/debian-ssh/2002/debian-ssh-200203/msg00008.html> | ||
5074 | * Urgency medium because it would really be good to get this into woody | ||
5075 | before it releases | ||
5076 | * Fix sections to match override file | ||
5077 | * Reissued due to clash with non-US -> main move | ||
5078 | |||
5079 | -- Aaron M. Ucko <ucko@debian.org> Sat, 23 Mar 2002 21:21:52 -0500 | ||
5080 | |||
5081 | openssh (1:3.0.2p1-8.1) unstable; urgency=low | ||
5082 | |||
5083 | * NMU | ||
5084 | * Move from non-US to mani | ||
5085 | |||
5086 | -- LaMont Jones <lamont@debian.org> Thu, 21 Mar 2002 09:33:50 -0700 | ||
5087 | |||
5088 | openssh (1:3.0.2p1-8) unstable; urgency=critical | ||
5089 | |||
5090 | * Security fix - patch from upstream (Closes: #137209, #137210) | ||
5091 | * Undo the changes in the unreleased -7, since they appear to break | ||
5092 | things here. Accordingly, the code change is minimal, and I'm | ||
5093 | happy to get it into testing ASAP | ||
5094 | |||
5095 | -- Matthew Vernon <matthew@debian.org> Thu, 7 Mar 2002 14:25:23 +0000 | ||
5096 | |||
5097 | openssh (1:3.0.2p1-7) unstable; urgency=high | ||
5098 | |||
5099 | * Build to support IPv6 and IPv4 by default again | ||
5100 | |||
5101 | -- Matthew Vernon <matthew@debian.org> Sat, 2 Mar 2002 00:25:05 +0000 | ||
5102 | |||
5103 | openssh (1:3.0.2p1-6) unstable; urgency=high | ||
5104 | |||
5105 | * Correct error in the clean target (Closes: #130868) | ||
5106 | |||
5107 | -- Matthew Vernon <matthew@debian.org> Sat, 26 Jan 2002 00:32:00 +0000 | ||
5108 | |||
5109 | openssh (1:3.0.2p1-5) unstable; urgency=medium | ||
5110 | |||
5111 | * Include the Debian version in our identification, to make it easier to | ||
5112 | audit networks for patched versions in future | ||
5113 | |||
5114 | -- Matthew Vernon <matthew@debian.org> Mon, 21 Jan 2002 17:16:10 +0000 | ||
5115 | |||
5116 | openssh (1:3.0.2p1-4) unstable; urgency=medium | ||
5117 | |||
5118 | * If we're asked to not run sshd, stop any running sshd's first | ||
5119 | (Closes: #129327) | ||
5120 | |||
5121 | -- Matthew Vernon <matthew@debian.org> Wed, 16 Jan 2002 21:24:16 +0000 | ||
5122 | |||
5123 | openssh (1:3.0.2p1-3) unstable; urgency=high | ||
5124 | |||
5125 | * Fix /etc/pam.d/ssh to not set $MAIL (Closes: #128913) | ||
5126 | * Remove extra debconf suggestion (Closes: #128094) | ||
5127 | * Mmm. speedy bug-fixing :-) | ||
5128 | |||
5129 | -- Matthew Vernon <matthew@debian.org> Sat, 12 Jan 2002 17:23:58 +0000 | ||
5130 | |||
5131 | openssh (1:3.0.2p1-2) unstable; urgency=high | ||
5132 | |||
5133 | * Fix postinst to not automatically overwrite sshd_config (!) | ||
5134 | (Closes: #127842, #127867) | ||
5135 | * Add section in README.Debian about the PermitRootLogin setting | ||
5136 | |||
5137 | -- Matthew Vernon <matthew@debian.org> Sat, 5 Jan 2003 05:26:30 +0000 | ||
5138 | |||
5139 | openssh (1:3.0.2p1-1) unstable; urgency=high | ||
5140 | |||
5141 | * Incorporate fix from Colin's NMU | ||
5142 | * New upstream version (fixes the bug Wichert fixed) (Closes: #124035) | ||
5143 | * Capitalise IETF (Closes: #125379) | ||
5144 | * Refer to the correct sftp-server location (Closes: #126854, #126224) | ||
5145 | * Do what we're asked re SetUID ssh (Closes: #124065, #124154, #123247) | ||
5146 | * Ask people upgrading from potato if they want a new conffile | ||
5147 | (Closes: #125642) | ||
5148 | * Fix a typo in postinst (Closes: #122192, #122410, #123440) | ||
5149 | * Frob the default config a little (Closes: #122284, #125827, #125696, | ||
5150 | #123854) | ||
5151 | * Make /etc/init.d/ssh be more clear about ssh not running (Closes: | ||
5152 | #123552) | ||
5153 | * Fix typo in templates file (Closes: #123411) | ||
5154 | |||
5155 | -- Matthew Vernon <matthew@debian.org> Fri, 4 Jan 2002 16:01:52 +0000 | ||
5156 | |||
5157 | openssh (1:3.0.1p1-1.2) unstable; urgency=high | ||
5158 | |||
5159 | * Non-maintainer upload | ||
5160 | * Prevent local users from passing environment variables to the login | ||
5161 | process when UseLogin is enabled | ||
5162 | |||
5163 | -- Wichert Akkerman <wakkerma@debian.org> Mon, 3 Dec 2001 19:34:45 +0100 | ||
5164 | |||
5165 | openssh (1:3.0.1p1-1.1) unstable; urgency=low | ||
5166 | |||
5167 | * Non-maintainer upload, at Matthew's request. | ||
5168 | * Remove sa_restorer assignment to fix compilation on alpha, hppa, and | ||
5169 | ia64 (closes: #122086). | ||
5170 | |||
5171 | -- Colin Watson <cjwatson@debian.org> Sun, 2 Dec 2001 18:54:16 +0000 | ||
5172 | |||
5173 | openssh (1:3.0.1p1-1) unstable; urgency=high | ||
5174 | |||
5175 | * New upstream version (Closes: #113646, #113513, #114707, #118564) | ||
5176 | * Building with a libc that works (!) (Closes: #115228) | ||
5177 | * Patches forward-ported are -1/-2 options for scp, the improvement to | ||
5178 | 'waiting for forwarded connections to terminate...' | ||
5179 | * Fix /etc/init.d/ssh to stop sshd properly (Closes: #115228) | ||
5180 | * /etc/ssh/sshd_config is no longer a conffile but generated in the postinst | ||
5181 | * Remove suidregister leftover from postrm | ||
5182 | * Mention key we are making in the postinst | ||
5183 | * Default to not enable SSH protocol 1 support, since protocol 2 is | ||
5184 | much safer anyway. | ||
5185 | * New version of the vpn-fixes patch, from Ian Jackson | ||
5186 | * New handling of -q, and added new -qq option; thanks to Jon Amery | ||
5187 | * Experimental smartcard support not enabled, since I have no way of | ||
5188 | testing it. | ||
5189 | |||
5190 | -- Matthew Vernon <matthew@debian.org> Thu, 28 Nov 2001 17:43:01 +0000 | ||
5191 | |||
5192 | openssh (1:2.9p2-6) unstable; urgency=low | ||
5193 | |||
5194 | * check for correct file in /etc/init.d/ssh (Closes: #110876) | ||
5195 | * correct location of version 2 keys in ssh.1 (Closes: #110439) | ||
5196 | * call update-alternatives --quiet (Closes: #103314) | ||
5197 | * hack ssh-copy-id to chmod go-w (Closes: #95551) | ||
5198 | * TEMPORARY fix to provide largefile support using a -D in the cflags | ||
5199 | line. long-term, upstream will patch the autoconf stuff | ||
5200 | (Closes: #106809, #111849) | ||
5201 | * remove /etc/rc references in ssh-keygen.1 (Closes: #68350) | ||
5202 | * scp.1 patch from Adam McKenna to document -r properly (Closes: #76054) | ||
5203 | * Check for files containing a newline character (Closes: #111692) | ||
5204 | |||
5205 | -- Matthew Vernon <matthew@debian.org> Thu, 13 Sep 2001 16:47:36 +0100 | ||
5206 | |||
5207 | openssh (1:2.9p2-5) unstable; urgency=high | ||
5208 | |||
5209 | * Thanks to all the bug-fixers who helped! | ||
5210 | * remove sa_restorer assignment (Closes: #102837) | ||
5211 | * patch from Peter Benie to DTRT wrt X forwarding if the server refuses | ||
5212 | us access (Closes: #48297) | ||
5213 | * patch from upstream CVS to fix port forwarding (Closes: #107132) | ||
5214 | * patch from Jonathan Amery to document ssh-keygen behaviour | ||
5215 | (Closes:#106643, #107512) | ||
5216 | * patch to postinst from Jonathan Amery (Closes: #106411) | ||
5217 | * patch to manpage from Jonathan Amery (Closes: #107364) | ||
5218 | * patch from Matthew Vernon to make -q emit fatal errors as that is the | ||
5219 | documented behaviour (Closes: #64347) | ||
5220 | * patch from Ian Jackson to cause us to destroy a file when we scp it | ||
5221 | onto itself, rather than dumping bits of our memory into it, which was | ||
5222 | a security hole (see #51955) | ||
5223 | * patch from Jonathan Amery to document lack of Kerberos support | ||
5224 | (Closes: #103726) | ||
5225 | * patch from Matthew Vernon to make the 'waiting for connections to | ||
5226 | terminate' message more helpful (Closes: #50308) | ||
5227 | |||
5228 | -- Matthew Vernon <matthew@debian.org> Thu, 23 Aug 2001 02:14:09 +0100 | ||
5229 | |||
5230 | openssh (1:2.9p2-4) unstable; urgency=high | ||
5231 | |||
5232 | * Today's build of ssh is strawberry flavoured | ||
5233 | * Patch from mhp to reduce length of time sshd is stopped for (Closes: #106176) | ||
5234 | * Tidy up debconf template (Closes: #106152) | ||
5235 | * If called non-setuid, then setgid()'s failure should not be fatal (see | ||
5236 | #105854) | ||
5237 | |||
5238 | -- Matthew Vernon <matthew@debian.org> Sun, 22 Jul 2001 14:19:43 +0100 | ||
5239 | |||
5240 | openssh (1:2.9p2-3) unstable; urgency=low | ||
5241 | |||
5242 | * Patch from yours truly to add -1 and -2 options to scp (Closes: #106061) | ||
5243 | * Improve the IdentityFile section in the man page (Closes: #106038) | ||
5244 | |||
5245 | -- Matthew Vernon <matthew@debian.org> Sat, 21 Jul 2001 14:47:27 +0100 | ||
5246 | |||
5247 | openssh (1:2.9p2-2) unstable; urgency=low | ||
5248 | |||
5249 | * Document the protocol version 2 and IPV6 changes (Closes: #105845, #105868) | ||
5250 | * Make PrintLastLog 'no' by default (Closes: #105893) | ||
5251 | |||
5252 | -- Matthew Vernon <matthew@debian.org> Thu, 19 Jul 2001 18:36:41 +0100 | ||
5253 | |||
5254 | openssh (1:2.9p2-1) unstable; urgency=low | ||
5255 | |||
5256 | * new (several..) upstream version (Closes: #96726, #81856, #96335) | ||
5257 | * Hopefully, this will close some other bugs too | ||
5258 | |||
5259 | -- Matthew Vernon <matthew@debian.org> Tue, 17 Jul 2001 19:41:58 +0100 | ||
5260 | |||
5261 | openssh (1:2.5.2p2-3) unstable; urgency=low | ||
5262 | |||
5263 | * Taking Over this package | ||
5264 | * Patches from Robert Bihlmeyer for the Hurd (Closes: #102991) | ||
5265 | * Put PermitRootLogin back to yes (Closes: #67334, #67371, #78274) | ||
5266 | * Don't fiddle with conf-files any more (Closes: #69501) | ||
5267 | |||
5268 | -- Matthew Vernon <matthew@debian.org> Tue, 03 Jul 2001 02:58:13 +0100 | ||
5269 | |||
5270 | openssh (1:2.5.2p2-2.2) unstable; urgency=low | ||
5271 | |||
5272 | * NMU | ||
5273 | * Include Hurd compatibility patches from Robert Bihlmeyer (Closes: #76033) | ||
5274 | * Patch from Richard Kettlewell for protocolkeepalives (Closes: #99273) | ||
5275 | * Patch from Matthew Vernon for BannerTimeOut, batchmode, and | ||
5276 | documentation for protocolkeepalives. Makes ssh more generally useful | ||
5277 | for scripting uses (Closes: #82877, #99275) | ||
5278 | * Set a umask, so ourpidfile isn't world-writable (closes: #100012, | ||
5279 | #98286, #97391) | ||
5280 | |||
5281 | -- Matthew Vernon <matthew@debian.org> Thu, 28 Jun 2001 23:15:42 +0100 | ||
5282 | |||
5283 | openssh (1:2.5.2p2-2.1) unstable; urgency=low | ||
5284 | |||
5285 | * NMU | ||
5286 | * Remove duplicate Build-Depends for libssl096-dev and change it to | ||
5287 | depend on libssl-dev instaed. Also adding in virtual | real package | ||
5288 | style build-deps. (Closes: #93793, #75228) | ||
5289 | * Removing add-log entry (Closes: #79266) | ||
5290 | * This was a pam bug from a while back (Closes: #86908, #88457, #86843) | ||
5291 | * pam build-dep already exists (Closes: #93683) | ||
5292 | * libgnome-dev build-dep already exists (Closes: #93694) | ||
5293 | * No longer in non-free (Closes: #85401) | ||
5294 | * Adding in fr debconf translations (Closes: #83783) | ||
5295 | * Already suggests xbase-clients (Closes: #79741) | ||
5296 | * No need to suggest libpam-pwdb anymore (Closes: #81658) | ||
5297 | * Providing rsh-client (Closes: #79437) | ||
5298 | * hurd patch was already applied (Closes: #76033) | ||
5299 | * default set to no (Closes: #73682) | ||
5300 | * Adding in a suggests for dnsutils (Closes: #93265) | ||
5301 | * postinst bugs fixed (Closes: #88057, #88066, #88196, #88405, #88612) | ||
5302 | (Closes: #88774, #88196, #89556, #90123, #90228, #90833, #87814, #85465) | ||
5303 | * Adding in debconf dependency | ||
5304 | |||
5305 | -- Ivan E. Moore II <rkrusty@debian.org> Mon, 16 Apr 2001 14:11:04 +0100 | ||
5306 | |||
5307 | openssh (1:2.5.2p2-2) unstable; urgency=high | ||
5308 | |||
5309 | * disable the OpenSSL version check in entropy.c | ||
5310 | (closes: #93581, #93588, #93590, #93614, #93619, #93635, #93648) | ||
5311 | |||
5312 | -- Philip Hands <phil@uk.alcove.com> Wed, 11 Apr 2001 20:30:04 +0100 | ||
5313 | |||
5314 | openssh (1:2.5.2p2-1) unstable; urgency=low | ||
5315 | |||
5316 | * New upstream release | ||
5317 | * removed make-ssh-known-hosts, since ssh-keyscan does that job (closes: #86069, #87748) | ||
5318 | * fix double space indent in german templates (closes: #89493) | ||
5319 | * make postinst check for ssh_host_rsa_key | ||
5320 | * get rid of the last of the misguided debian/rules NMU debris :-/ | ||
5321 | |||
5322 | -- Philip Hands <phil@hands.com> Sat, 24 Mar 2001 20:59:33 +0000 | ||
5323 | |||
5324 | openssh (1:2.5.1p2-2) unstable; urgency=low | ||
5325 | |||
5326 | * rebuild with new debhelper (closes: #89558, #89536, #90225) | ||
5327 | * fix broken dpkg-statoverride test in postinst | ||
5328 | (closes: #89612, #90474, #90460, #89605) | ||
5329 | * NMU bug fixed but not closed in last upload (closes: #88206) | ||
5330 | |||
5331 | -- Philip Hands <phil@hands.com> Fri, 23 Mar 2001 16:11:33 +0000 | ||
5332 | |||
5333 | openssh (1:2.5.1p2-1) unstable; urgency=high | ||
5334 | |||
5335 | * New upstream release | ||
5336 | * fix typo in postinst (closes: #88110) | ||
5337 | * revert to setting PAM service name in debian/rules, backing out last | ||
5338 | NMU, which also (closes: #88101) | ||
5339 | * restore the pam lastlog/motd lines, lost during the NMUs, and sshd_config | ||
5340 | * restore printlastlog option patch | ||
5341 | * revert to using debhelper, which had been partially disabled in NMUs | ||
5342 | |||
5343 | -- Philip Hands <phil@hands.com> Tue, 13 Mar 2001 01:41:34 +0000 | ||
5344 | |||
5345 | openssh (1:2.5.1p1-1.8) unstable; urgency=high | ||
5346 | |||
5347 | * And now the old pam-bug s/sshd/ssh in ssh.c is also fixed | ||
5348 | |||
5349 | -- Christian Kurz <shorty@debian.org> Thu, 1 Mar 2001 19:48:01 +0100 | ||
5350 | |||
5351 | openssh (1:2.5.1p1-1.7) unstable; urgency=high | ||
5352 | |||
5353 | * And now we mark the correct binary as setuid, when a user requested | ||
5354 | to install it setuid. | ||
5355 | |||
5356 | -- Christian Kurz <shorty@debian.org> Thu, 1 Mar 2001 07:19:56 +0100 | ||
5357 | |||
5358 | openssh (1:2.5.1p1-1.6) unstable; urgency=high | ||
5359 | |||
5360 | * Fixes postinst to handle overrides that are already there. Damn, I | ||
5361 | should have noticed the bug earlier. | ||
5362 | |||
5363 | -- Christian Kurz <shorty@debian.org> Wed, 28 Feb 2001 22:35:00 +0100 | ||
5364 | |||
5365 | openssh (1:2.5.1p1-1.5) unstable; urgency=high | ||
5366 | |||
5367 | * Rebuild ssh with pam-support. | ||
5368 | |||
5369 | -- Christian Kurz <shorty@debian.org> Mon, 26 Feb 2001 21:55:51 +0100 | ||
5370 | |||
5371 | openssh (1:2.5.1p1-1.4) unstable; urgency=low | ||
5372 | |||
5373 | * Added Build-Depends on libssl096-dev. | ||
5374 | * Fixed sshd_config file to disallow root logins again. | ||
5375 | |||
5376 | -- Christian Kurz <shorty@debian.org> Sun, 25 Feb 2001 20:03:55 +0100 | ||
5377 | |||
5378 | openssh (1:2.5.1p1-1.3) unstable; urgency=low | ||
5379 | |||
5380 | * Fixed missing manpages for sftp.1 and ssh-keyscan.1 | ||
5381 | * Made package policy 3.5.2 compliant. | ||
5382 | |||
5383 | -- Christian Kurz <shorty@debian.org> Sun, 25 Feb 2001 15:46:26 +0100 | ||
5384 | |||
5385 | openssh (1:2.5.1p1-1.2) unstable; urgency=low | ||
5386 | |||
5387 | * Added Conflict with sftp, since we now provide our own sftp-client. | ||
5388 | * Added a fix for our broken dpkg-statoverride call in the | ||
5389 | 2.3.0p1-13. | ||
5390 | * Fixed some config pathes in the comments of sshd_config. | ||
5391 | * Removed ssh-key-exchange-vulnerability-patch since it's not needed | ||
5392 | anymore because upstream included the fix. | ||
5393 | |||
5394 | -- Christian Kurz <shorty@debian.org> Sun, 25 Feb 2001 13:46:58 +0100 | ||
5395 | |||
5396 | openssh (1:2.5.1p1-1.1) unstable; urgency=high | ||
5397 | |||
5398 | * Another NMU to get the new upstream version 2.5.1p1 into | ||
5399 | unstable. (Closes: #87123) | ||
5400 | * Corrected postinst to mark ssh as setuid. (Closes: #86391, #85766) | ||
5401 | * Key Exchange patch is already included by upstream. (Closes: #86015) | ||
5402 | * Upgrading should be possible now. (Closes: #85525, #85523) | ||
5403 | * Added --disable-suid-ssh as compile option, so ssh won't get installed | ||
5404 | suid per default. | ||
5405 | * Fixed postinst to run dpkg-statoverride only, when dpkg-statoverride | ||
5406 | is available and the mode of the binary should be 4755. And also added | ||
5407 | suggestion for a newer dpkg. | ||
5408 | (Closes: #85734, #85741, #86876) | ||
5409 | * sftp and ssh-keyscan will also be included from now on. (Closes: #79994) | ||
5410 | * scp now understands spaces in filenames (Closes: #53783, #58958, | ||
5411 | #66723) | ||
5412 | * ssh-keygen now supports showing DSA fingerprints. (Closes: #68623) | ||
5413 | * ssh doesn' t show motd anymore when switch -t is used. (Closes #69035) | ||
5414 | * ssh supports the usage of other dsa keys via the ssh command line | ||
5415 | options. (Closes: #81250) | ||
5416 | * Documentation in sshd_config fixed. (Closes: #81088) | ||
5417 | * primes file included by upstream and included now. (Closes: #82101) | ||
5418 | * scp now allows dots in the username. (Closes: #82477) | ||
5419 | * Spelling error in ssh-copy-id.1 corrected by upstream. (Closes: #78124) | ||
5420 | |||
5421 | -- Christian Kurz <shorty@debian.org> Sun, 25 Feb 2001 10:06:08 +0100 | ||
5422 | |||
5423 | openssh (1:2.3.0p1-1.13) unstable; urgency=low | ||
5424 | |||
5425 | * Config should now also be fixed with this hopefully last NMU. | ||
5426 | |||
5427 | -- Christian Kurz <shorty@debian.org> Sat, 10 Feb 2001 22:56:36 +0100 | ||
5428 | |||
5429 | openssh (1:2.3.0p1-1.12) unstable; urgency=high | ||
5430 | |||
5431 | * Added suggest for xbase-clients to control-file. (Closes #85227) | ||
5432 | * Applied patch from Markus Friedl to fix a vulnerability in | ||
5433 | the rsa keyexchange. | ||
5434 | * Fixed position of horizontal line. (Closes: #83613) | ||
5435 | * Fixed hopefully the grep problem in the config-file. (Closes: #78802) | ||
5436 | * Converted package from suidregister to dpkg-statoverride. | ||
5437 | |||
5438 | -- Christian Kurz <shorty@debian.org> Fri, 9 Feb 2001 19:43:55 +0100 | ||
5439 | |||
5440 | openssh (1:2.3.0p1-1.11) unstable; urgency=medium | ||
5441 | |||
5442 | * Fixed some typos in the german translation of the debconf | ||
5443 | template. | ||
5444 | |||
5445 | -- Christian Kurz <shorty@debian.org> Wed, 24 Jan 2001 18:22:38 +0100 | ||
5446 | |||
5447 | openssh (1:2.3.0p1-1.10) unstable; urgency=medium | ||
5448 | |||
5449 | * Fixed double printing of motd. (Closes: #82618) | ||
5450 | |||
5451 | -- Christian Kurz <shorty@debian.org> Tue, 23 Jan 2001 21:03:43 +0100 | ||
5452 | |||
5453 | openssh (1:2.3.0p1-1.9) unstable; urgency=high | ||
5454 | |||
5455 | * And the next NMU which includes the patch from Andrew Bartlett | ||
5456 | and Markus Friedl to fix the root privileges handling of openssh. | ||
5457 | (Closes: #82657) | ||
5458 | |||
5459 | -- Christian Kurz <shorty@debian.org> Wed, 17 Jan 2001 22:20:54 +0100 | ||
5460 | |||
5461 | openssh (1:2.3.0p1-1.8) unstable; urgency=high | ||
5462 | |||
5463 | * Applied fix from Ryan Murray to allow building on other architectures | ||
5464 | since the hurd patch was wrong. (Closes: #82471) | ||
5465 | |||
5466 | -- Christian Kurz <shorty@debian.org> Tue, 16 Jan 2001 22:45:51 +0100 | ||
5467 | |||
5468 | openssh (1:2.3.0p1-1.7) unstable; urgency=medium | ||
5469 | |||
5470 | * Fixed another typo on sshd_config | ||
5471 | |||
5472 | -- Christian Kurz <shorty@debian.org> Sun, 14 Jan 2001 19:01:31 +0100 | ||
5473 | |||
5474 | openssh (1:2.3.0p1-1.6) unstable; urgency=high | ||
5475 | |||
5476 | * Added Build-Dependency on groff (Closes: #81886) | ||
5477 | * Added Build-Depencency on debhelper (Closes: #82072) | ||
5478 | * Fixed entry for known_hosts in sshd_config (Closes: #82096) | ||
5479 | |||
5480 | -- Christian Kurz <shorty@debian.org> Thu, 11 Jan 2001 23:08:16 +0100 | ||
5481 | |||
5482 | openssh (1:2.3.0p1-1.5) unstable; urgency=high | ||
5483 | |||
5484 | * Fixed now also the problem with sshd used as default ipv4 and | ||
5485 | didn't use IPv6. This should be now fixed. | ||
5486 | |||
5487 | -- Christian Kurz <shorty@debian.org> Thu, 11 Jan 2001 21:25:55 +0100 | ||
5488 | |||
5489 | openssh (1:2.3.0p1-1.4) unstable; urgency=high | ||
5490 | |||
5491 | * Fixed buggy entry in postinst. | ||
5492 | |||
5493 | -- Christian Kurz <shorty@debian.org> Wed, 10 Jan 2001 23:12:16 +0100 | ||
5494 | |||
5495 | openssh (1:2.3.0p1-1.3) unstable; urgency=high | ||
5496 | |||
5497 | * After finishing the rewrite of the rules-file I had to notice that | ||
5498 | the manpage installation was broken. This should now work again. | ||
5499 | |||
5500 | -- Christian Kurz <shorty@debian.org> Wed, 10 Jan 2001 22:11:59 +0100 | ||
5501 | |||
5502 | openssh (1:2.3.0p1-1.2) unstable; urgency=high | ||
5503 | |||
5504 | * Fixed the screwed up build-dependency. | ||
5505 | * Removed --with-ipv4-default to support ipv6. | ||
5506 | * Changed makefile to use /etc/pam.d/ssh instead of /etc/pam.d/sshd. | ||
5507 | * Fixed location to sftp-server in config. | ||
5508 | * Since debian still relies on /etc/pam.d/ssh instead of moving to | ||
5509 | /etc/pam.d/sshd, I had to hack ssh.h to get ssh to use this name. | ||
5510 | * Fixed path to host key in sshd_config. | ||
5511 | |||
5512 | -- Christian Kurz <shorty@debian.org> Wed, 10 Jan 2001 08:23:47 +0100 | ||
5513 | |||
5514 | openssh (1:2.3.0p1-1.1) unstable; urgency=medium | ||
5515 | |||
5516 | * NMU with permission of Phil Hands. | ||
5517 | * New upstream release | ||
5518 | * Update Build-Depends to point to new libssl096. | ||
5519 | * This upstream release doesn't leak any information depending | ||
5520 | on the setting of PermitRootLogin (Closes: #59933) | ||
5521 | * New upstream release contains fix against forcing a client to | ||
5522 | do X/agent forwarding (Closes: #76788) | ||
5523 | * Changed template to contain correct path to the documentation | ||
5524 | (Closes: #67245) | ||
5525 | * Added --with-4in6 switch as compile option into debian/rules. | ||
5526 | * Added --with-ipv4-default as compile option into debian/rules. | ||
5527 | (Closes: #75037) | ||
5528 | * Changed default path to also contain /usr/local/bin and | ||
5529 | /usr/X11R6/bin (Closes: #62472,#54567,#62810) | ||
5530 | * Changed path to sftp-server in sshd_config to match the | ||
5531 | our package (Closes: #68347) | ||
5532 | * Replaced OpenBSDh with OpenBSD in the init-script. | ||
5533 | * Changed location to original source in copyright.head | ||
5534 | * Changed behaviour of init-script when invoked with the option | ||
5535 | restart (Closes: #68706,#72560) | ||
5536 | * Added a note about -L option of scp to README.Debian | ||
5537 | * ssh won't print now the motd if invoked with -t option | ||
5538 | (Closes: #59933) | ||
5539 | * RFC.nroff.gz get's now converted into RFC.gz. (Closes: #63867) | ||
5540 | * Added a note about tcp-wrapper support to README.Debian | ||
5541 | (Closes: #72807,#22190) | ||
5542 | * Removed two unneeded options from building process. | ||
5543 | * Added sshd.pam into debian dir and install it. | ||
5544 | * Commented out unnecessary call to dh_installinfo. | ||
5545 | * Added a line to sshd.pam so that limits will be paid attention | ||
5546 | to (Closes: #66904) | ||
5547 | * Restart Option has a Timeout of 10 seconds (Closes: 51264) | ||
5548 | * scp won't override files anymore (Closes: 51955) | ||
5549 | * Removed pam_lastlog module, so that the lastlog is now printed | ||
5550 | only once (Closes: #71742, #68335, #69592, #71495, #77781) | ||
5551 | * If password is expired, openssh now forces the user to change it. | ||
5552 | (Closes: #51747) | ||
5553 | * scp should now have no more problems with shell-init-files that | ||
5554 | produces ouput (Closes: #56280,#59873) | ||
5555 | * ssh now prints the motd correctly (Closes: #66926) | ||
5556 | * ssh upgrade should disable ssh daemon only if users has choosen | ||
5557 | to do so (Closes: #67478) | ||
5558 | * ssh can now be installed suid (Closes: #70879) | ||
5559 | * Modified debian/rules to support hurd. | ||
5560 | |||
5561 | -- Christian Kurz <shorty@debian.org> Wed, 27 Dec 2000 20:06:57 +0100 | ||
5562 | |||
5563 | openssh (1:2.2.0p1-1.1) unstable; urgency=medium | ||
5564 | |||
5565 | * Non-Maintainer Upload | ||
5566 | * Check for new returns in the new libc | ||
5567 | (closes: #72803, #74393, #72797, #71307, #71702) | ||
5568 | * Link against libssl095a (closes: #66304) | ||
5569 | * Correct check for PermitRootLogin (closes: #69448) | ||
5570 | |||
5571 | -- Ryan Murray <rmurray@debian.org> Wed, 18 Oct 2000 00:48:18 -0700 | ||
5572 | |||
5573 | openssh (1:2.2.0p1-1) unstable; urgency=low | ||
5574 | |||
5575 | * New upstream release | ||
5576 | |||
5577 | -- Philip Hands <phil@hands.com> Mon, 11 Sep 2000 14:49:43 +0100 | ||
5578 | |||
5579 | openssh (1:2.1.1p4-3) unstable; urgency=low | ||
5580 | |||
5581 | * add rsh alternatives | ||
5582 | * add -S option to scp (using Tommi Virtanen's patch) (closes: #63097) | ||
5583 | * do the IPV4_DEFAULT thing properly this time | ||
5584 | |||
5585 | -- Philip Hands <phil@hands.com> Fri, 11 Aug 2000 18:14:37 +0100 | ||
5586 | |||
5587 | openssh (1:2.1.1p4-2) unstable; urgency=low | ||
5588 | |||
5589 | * reinstate manpage .out patch from 1:1.2.3 | ||
5590 | * fix typo in postinst | ||
5591 | * only compile ssh with IPV4_DEFAULT | ||
5592 | * apply James Troup's patch to add a -o option to scp and updated manpage | ||
5593 | |||
5594 | -- Philip Hands <phil@hands.com> Sun, 30 Jul 2000 00:12:49 +0100 | ||
5595 | |||
5596 | openssh (1:2.1.1p4-1) unstable; urgency=low | ||
5597 | |||
5598 | * New upstream release | ||
5599 | |||
5600 | -- Philip Hands <phil@hands.com> Sat, 29 Jul 2000 14:46:16 +0100 | ||
5601 | |||
5602 | openssh (1:1.2.3-10) unstable; urgency=low | ||
5603 | |||
5604 | * add version to libpam-modules dependency, because old versions of | ||
5605 | pam_motd make it impossible to log in. | ||
5606 | |||
5607 | -- Philip Hands <phil@hands.com> Sat, 29 Jul 2000 13:28:22 +0100 | ||
5608 | |||
5609 | openssh (1:1.2.3-9) frozen unstable; urgency=low | ||
5610 | |||
5611 | * force location of /usr/bin/X11/xauth | ||
5612 | (closes: #64424, #66437, #66859) *RC* | ||
5613 | * typos in config (closes: #66779, #66780) | ||
5614 | * sshd_not_to_be_run could be assumed to be true, in error, if the config | ||
5615 | script died in an unusual way --- I've reversed this (closes: #66335) | ||
5616 | * Apply Zack Weinberg <zack@wolery.cumb.org>'s patch to ssh-askpass-ptk | ||
5617 | (closes: #65981) | ||
5618 | * change default for PermitRootLogin to "no" (closes: #66406) | ||
5619 | |||
5620 | -- Philip Hands <phil@hands.com> Tue, 11 Jul 2000 20:51:18 +0100 | ||
5621 | |||
5622 | openssh (1:1.2.3-8) frozen unstable; urgency=low | ||
5623 | |||
5624 | * get rid of Provides: rsh-server (this will mean that rstartd | ||
5625 | will need to change it's depends to deal with #63948, which I'm | ||
5626 | reopening) (closes: #66257) | ||
5627 | Given that this is also a trivial change, and is a reversal of a | ||
5628 | change that was mistakenly made after the freeze, I think this should | ||
5629 | also go into frozen. | ||
5630 | |||
5631 | -- Philip Hands <phil@hands.com> Wed, 28 Jun 2000 03:26:30 +0100 | ||
5632 | |||
5633 | openssh (1:1.2.3-7) frozen unstable; urgency=low | ||
5634 | |||
5635 | * check if debconf is installed before calling db_stop in postinst. | ||
5636 | This is required to allow ssh to be installed when debconf is not | ||
5637 | wanted, which probably makes it an RC upload (hopefully the last of | ||
5638 | too many). | ||
5639 | |||
5640 | -- Philip Hands <phil@hands.com> Wed, 28 Jun 2000 03:19:47 +0100 | ||
5641 | |||
5642 | openssh (1:1.2.3-6) frozen unstable; urgency=low | ||
5643 | |||
5644 | * fixed depressing little bug involving a line wrap looking like | ||
5645 | a blank line in the templates file *RC* | ||
5646 | (closes: #66090, #66078, #66083, #66182) | ||
5647 | |||
5648 | -- Philip Hands <phil@hands.com> Mon, 26 Jun 2000 00:45:05 +0100 | ||
5649 | |||
5650 | openssh (1:1.2.3-5) frozen unstable; urgency=low | ||
5651 | |||
5652 | * add code to prevent UseLogin exploit, although I think our PAM | ||
5653 | conditional code breaks UseLogin in a way that protects us from this | ||
5654 | exploit anyway. ;-) (closes: #65495) *RC* | ||
5655 | * Apply Zack Weinberg <zack@wolery.cumb.org>'s patch to fix keyboard | ||
5656 | grab vulnerability in ssh-askpass-gnome (closes: #64795) *RC* | ||
5657 | * stop redirection of sshd's file descriptors (introduced in 1:1.2.3-3) | ||
5658 | and use db_stop in the postinst to solve that problem instead | ||
5659 | (closes: #65104) | ||
5660 | * add Provides: rsh-server to ssh (closes: #63948) | ||
5661 | * provide config option not to run sshd | ||
5662 | |||
5663 | -- Philip Hands <phil@hands.com> Mon, 12 Jun 2000 23:05:11 +0100 | ||
5664 | |||
5665 | openssh (1:1.2.3-4) frozen unstable; urgency=low | ||
5666 | |||
5667 | * fixes #63436 which is *RC* | ||
5668 | * add 10 second pause in init.d restart (closes: #63844) | ||
5669 | * get rid of noenv in PAM mail line (closes: #63856) | ||
5670 | * fix host key path in make-ssh-known-hosts (closes: #63713) | ||
5671 | * change wording of SUID template (closes: #62788, #63436) | ||
5672 | |||
5673 | -- Philip Hands <phil@hands.com> Sat, 27 May 2000 11:18:06 +0100 | ||
5674 | |||
5675 | openssh (1:1.2.3-3) frozen unstable; urgency=low | ||
5676 | |||
5677 | * redirect sshd's file descriptors to /dev/null in init to | ||
5678 | prevent debconf from locking up during installation | ||
5679 | ** grave bug just submited by me ** | ||
5680 | |||
5681 | -- Philip Hands <phil@hands.com> Thu, 20 Apr 2000 17:10:59 +0100 | ||
5682 | |||
5683 | openssh (1:1.2.3-2) frozen unstable; urgency=low | ||
5684 | |||
5685 | * allow user to select SUID status of /usr/bin/ssh (closes: 62462) ** RC ** | ||
5686 | * suggest debconf | ||
5687 | * conflict with debconf{,-tiny} (<<0.2.17) so I can clean up the preinst | ||
5688 | |||
5689 | -- Philip Hands <phil@hands.com> Wed, 19 Apr 2000 17:49:15 +0100 | ||
5690 | |||
5691 | openssh (1:1.2.3-1) frozen unstable; urgency=low | ||
5692 | |||
5693 | * New upstream release | ||
5694 | * patch sshd to create extra xauth key required for localhost | ||
5695 | (closes: #49944) *** RC *** | ||
5696 | * FallbacktoRsh now defaults to ``no'' to match impression | ||
5697 | given in sshd_config | ||
5698 | * stop setting suid bit on ssh (closes: #58711, #58558) | ||
5699 | This breaks Rhosts authentication (which nobody uses) and allows | ||
5700 | the LD_PRELOAD trick to get socks working, so seems like a net benefit. | ||
5701 | |||
5702 | -- Philip Hands <phil@hands.com> Thu, 13 Apr 2000 20:01:54 +0100 | ||
5703 | |||
5704 | openssh (1:1.2.2-1.4) frozen unstable; urgency=low | ||
5705 | |||
5706 | * Recompile for frozen, contains fix for RC bug. | ||
5707 | |||
5708 | -- Tommi Virtanen <tv@debian.org> Tue, 29 Feb 2000 22:14:58 +0200 | ||
5709 | |||
5710 | openssh (1:1.2.2-1.3) unstable; urgency=low | ||
5711 | |||
5712 | * Integrated man page addition for PrintLastLog. | ||
5713 | This bug was filed on "openssh", and I ended up | ||
5714 | creating my own patch for this (closes: #59054) | ||
5715 | * Improved error message when ssh_exchange_identification | ||
5716 | gets EOF (closes: #58904) | ||
5717 | * Fixed typo (your -> you're) in debian/preinst. | ||
5718 | * Added else-clauses to config to make this upgradepath possible: | ||
5719 | oldssh -> openssh preinst fails due to upgrade_to_openssh=false | ||
5720 | -> ssh-nonfree -> openssh. Without these, debconf remembered | ||
5721 | the old answer, config didn't force asking it, and preinst always | ||
5722 | aborted (closes: #56596, #57782) | ||
5723 | * Moved setting upgrade_to_openssh isdefault flag to the place | ||
5724 | where preinst would abort. This means no double question to most | ||
5725 | users, people who currently suffer from "can't upgrade" may need | ||
5726 | to run apt-get install ssh twice. Did not do the same for | ||
5727 | use_old_init_script, as the situation is a bit different, and | ||
5728 | less common (closes: #54010, #56224) | ||
5729 | * Check for existance of ssh-keygen before attempting to use it in | ||
5730 | preinst, added warning for non-existant ssh-keygen in config. This | ||
5731 | happens when the old ssh is removed (say, due to ssh-nonfree getting | ||
5732 | installed). | ||
5733 | |||
5734 | -- Tommi Virtanen <tv@debian.org> Sun, 27 Feb 2000 21:36:43 +0200 | ||
5735 | |||
5736 | openssh (1:1.2.2-1.2) frozen unstable; urgency=low | ||
5737 | |||
5738 | * Non-maintainer upload. | ||
5739 | * Added configuration option PrintLastLog, default off due to PAM | ||
5740 | (closes: #54007, #55042) | ||
5741 | * ssh-askpass-{gnome,ptk} now provide ssh-askpass, making ssh's | ||
5742 | Suggests: line more accurate. Also closing related bugs fixed | ||
5743 | earlier, when default ssh-askpass moved to /usr/bin. | ||
5744 | (closes: #52403, #54741, #50607, #52298, #50967, #51661) | ||
5745 | * Patched to call vhangup, with autoconf detection and all | ||
5746 | (closes: #55379) | ||
5747 | * Added --with-ipv4-default workaround to a glibc bug causing | ||
5748 | slow DNS lookups, as per UPGRADING. Use -6 to really use | ||
5749 | IPv6 addresses. (closes: #57891, #58744, #58713, #57970) | ||
5750 | * Added noenv to PAM pam_mail line. Thanks to Ben Collins. | ||
5751 | (closes: #58429) | ||
5752 | * Added the UPGRADING file to the package. | ||
5753 | * Added frozen to the changelog line and recompiled before | ||
5754 | package was installed into the archive. | ||
5755 | |||
5756 | -- Tommi Virtanen <tv@debian.org> Fri, 25 Feb 2000 22:08:57 +0200 | ||
5757 | |||
5758 | openssh (1:1.2.2-1.1) frozen unstable; urgency=low | ||
5759 | |||
5760 | * Non-maintainer upload. | ||
5761 | * Integrated scp pipe buffer patch from Ben Collins | ||
5762 | <benc@debian.org>, should now work even if reading | ||
5763 | a pipe gives less than fstat st_blksize bytes. | ||
5764 | Should now work on Alpha and Sparc Linux (closes: #53697, #52071) | ||
5765 | * Made ssh depend on libssl09 (>= 0.9.4-3) (closes: #51393) | ||
5766 | * Integrated patch from Ben Collins <benc@debian.org> | ||
5767 | to do full shadow account locking and expiration | ||
5768 | checking (closes: #58165, #51747) | ||
5769 | |||
5770 | -- Tommi Virtanen <tv@debian.org> Tue, 22 Feb 2000 20:46:12 +0200 | ||
5771 | |||
5772 | openssh (1:1.2.2-1) frozen unstable; urgency=medium | ||
5773 | |||
5774 | * New upstream release (closes: #56870, #56346) | ||
5775 | * built against new libesd (closes: #56805) | ||
5776 | * add Colin Watson <cjw44@cam.ac.uk> =NULL patch | ||
5777 | (closes: #49902, #54894) | ||
5778 | * use socketpairs as suggested by Andrew Tridgell to eliminate rsync | ||
5779 | (and other) lockups | ||
5780 | * patch SSHD_PAM_SERVICE back into auth-pam.c, again :-/ | ||
5781 | (closes: #49902, #55872, #56959) | ||
5782 | * uncoment the * line in ssh_config (closes: #56444) | ||
5783 | |||
5784 | * #54894 & #49902 are release critical, so this should go in frozen | ||
5785 | |||
5786 | -- Philip Hands <phil@hands.com> Wed, 9 Feb 2000 04:52:04 +0000 | ||
5787 | |||
5788 | openssh (1:1.2.1pre24-1) unstable; urgency=low | ||
5789 | |||
5790 | * New upstream release | ||
5791 | |||
5792 | -- Philip Hands <phil@hands.com> Fri, 31 Dec 1999 02:47:24 +0000 | ||
5793 | |||
5794 | openssh (1:1.2.1pre23-1) unstable; urgency=low | ||
5795 | |||
5796 | * New upstream release | ||
5797 | * excape ? in /etc/init.d/ssh (closes: #53269) | ||
5798 | |||
5799 | -- Philip Hands <phil@hands.com> Wed, 29 Dec 1999 16:50:46 +0000 | ||
5800 | |||
5801 | openssh (1:1.2pre17-1) unstable; urgency=low | ||
5802 | |||
5803 | * New upstream release | ||
5804 | |||
5805 | -- Philip Hands <phil@hands.com> Thu, 9 Dec 1999 16:50:40 +0000 | ||
5806 | |||
5807 | openssh (1:1.2pre16-1) unstable; urgency=low | ||
5808 | |||
5809 | * New upstream release | ||
5810 | * upstream release (1.2pre14) (closes: #50299) | ||
5811 | * make ssh depend on libwrap0 (>= 7.6-1.1) (closes: #50973, #50776) | ||
5812 | * dispose of grep -q broken pipe message in config script (closes: #50855) | ||
5813 | * add make-ssh-known-hosts (closes: #50660) | ||
5814 | * add -i option to ssh-copy-id (closes: #50657) | ||
5815 | * add check for *LK* in password, indicating a locked account | ||
5816 | |||
5817 | -- Philip Hands <phil@hands.com> Wed, 8 Dec 1999 22:59:38 +0000 | ||
5818 | |||
5819 | openssh (1:1.2pre13-1) unstable; urgency=low | ||
5820 | |||
5821 | * New upstream release | ||
5822 | * make sshd.c use SSHD_PAM_SERVICE and define it as "ssh" in debian/rules | ||
5823 | * remove duplicate line in /etc/pam.d/ssh (closes: #50310) | ||
5824 | * mention ssh -A option in ssh.1 & ssh_config | ||
5825 | * enable forwarding to localhost in default ssh_config (closes: #50373) | ||
5826 | * tweak preinst to deal with debconf being `unpacked' | ||
5827 | * use --with-tcp-wrappers (closes: #49545) | ||
5828 | |||
5829 | -- Philip Hands <phil@hands.com> Sat, 20 Nov 1999 14:20:04 +0000 | ||
5830 | |||
5831 | openssh (1:1.2pre11-2) unstable; urgency=low | ||
5832 | |||
5833 | * oops, just realised that I forgot to strip out the unpleasant | ||
5834 | fiddling mentioned below (which turned not to be a fix anyway) | ||
5835 | |||
5836 | -- Philip Hands <phil@hands.com> Mon, 15 Nov 1999 01:35:23 +0000 | ||
5837 | |||
5838 | openssh (1:1.2pre11-1) unstable; urgency=low | ||
5839 | |||
5840 | * New upstream release (closes: #49722) | ||
5841 | * add 2>/dev/null to dispose of spurious message casused by grep -q | ||
5842 | (closes: #49876, #49604) | ||
5843 | * fix typo in debian/control (closes: #49841) | ||
5844 | * Do some unpleasant fiddling with upgraded keys in the preinst, which | ||
5845 | should make the keylength problem go away. (closes: #49676) | ||
5846 | * make pam_start in sshd use ``ssh'' as the service name (closes: #49956) | ||
5847 | * If /etc/ssh/NOSERVER exist, stop sshd from starting (closes: #47107) | ||
5848 | * apply Ben Collins <bcollins@debian.org>'s shadow patch | ||
5849 | * disable lastlogin and motd printing if using pam (closes: #49957) | ||
5850 | * add ssh-copy-id script and manpage | ||
5851 | |||
5852 | -- Philip Hands <phil@hands.com> Fri, 12 Nov 1999 01:03:38 +0000 | ||
5853 | |||
5854 | openssh (1:1.2pre9-1) unstable; urgency=low | ||
5855 | |||
5856 | * New upstream release | ||
5857 | * apply Chip Salzenberg <chip@valinux.com>'s SO_REUSEADDR patch | ||
5858 | to channels.c, to make forwarded ports instantly reusable | ||
5859 | * replace Pre-Depend: debconf with some check code in preinst | ||
5860 | * make the ssh-add ssh-askpass failure message more helpful | ||
5861 | * fix the ssh-agent getopts bug (closes: #49426) | ||
5862 | * fixed typo on Suggests: line (closes: #49704, #49571) | ||
5863 | * tidy up ssh package description (closes: #49642) | ||
5864 | * make ssh suid (closes: #49635) | ||
5865 | * in preinst upgrade code, ensure ssh_host_keys is mode 600 (closes: #49606) | ||
5866 | * disable agent forwarding by default, for the similar reasons as | ||
5867 | X forwarding (closes: #49586) | ||
5868 | |||
5869 | -- Philip Hands <phil@hands.com> Tue, 9 Nov 1999 09:57:47 +0000 | ||
5870 | |||
5871 | openssh (1:1.2pre7-4) unstable; urgency=low | ||
5872 | |||
5873 | * predepend on debconf (>= 0.2.17) should now allow preinst questions | ||
5874 | |||
5875 | -- Philip Hands <phil@hands.com> Sat, 6 Nov 1999 10:31:06 +0000 | ||
5876 | |||
5877 | openssh (1:1.2pre7-3) unstable; urgency=low | ||
5878 | |||
5879 | * add ssh-askpass package using Tommi Virtanen's perl-tk script | ||
5880 | * add ssh-preconfig package cludge | ||
5881 | * add usage hints to ssh-agent.1 | ||
5882 | |||
5883 | -- Philip Hands <phil@hands.com> Fri, 5 Nov 1999 00:38:33 +0000 | ||
5884 | |||
5885 | openssh (1:1.2pre7-2) unstable; urgency=low | ||
5886 | |||
5887 | * use pam patch from Ben Collins <bcollins@debian.org> | ||
5888 | * add slogin symlink to Makefile.in | ||
5889 | * change /usr/bin/login to LOGIN_PROGRAM define of /bin/login | ||
5890 | * sort out debconf usage | ||
5891 | * patch from Tommi Virtanen <tv@debian.org>'s makes ssh-add use ssh-askpass | ||
5892 | |||
5893 | -- Philip Hands <phil@hands.com> Thu, 4 Nov 1999 11:08:54 +0000 | ||
5894 | |||
5895 | openssh (1:1.2pre7-1) unstable; urgency=low | ||
5896 | |||
5897 | * New upstream release | ||
5898 | |||
5899 | -- Philip Hands <phil@hands.com> Tue, 2 Nov 1999 21:02:37 +0000 | ||
5900 | |||
5901 | openssh (1:1.2.0.pre6db1-2) unstable; urgency=low | ||
5902 | |||
5903 | * change the binary package name to ssh (the non-free branch of ssh has | ||
5904 | been renamed to ssh-nonfree) | ||
5905 | * make pam file comply with Debian standards | ||
5906 | * use an epoch to make sure openssh supercedes ssh-nonfree | ||
5907 | |||
5908 | -- Philip Hands <phil@hands.com> Sat, 30 Oct 1999 16:26:05 +0100 | ||
5909 | |||
5910 | openssh (1.2pre6db1-1) unstable; urgency=low | ||
5911 | |||
5912 | * New upstream source | ||
5913 | * sshd accepts logins now! | ||
5914 | |||
5915 | -- Dan Brosemer <odin@linuxfreak.com> Fri, 29 Oct 1999 11:13:38 -0500 | ||
5916 | |||
5917 | openssh (1.2.0.19991028-1) unstable; urgency=low | ||
5918 | |||
5919 | * New upstream source | ||
5920 | * Added test for -lnsl to configure script | ||
5921 | |||
5922 | -- Dan Brosemer <odin@linuxfreak.com> Thu, 28 Oct 1999 18:52:09 -0500 | ||
5923 | |||
5924 | openssh (1.2.0.19991027-3) unstable; urgency=low | ||
5925 | |||
5926 | * Initial release | ||
5927 | |||
5928 | -- Dan Brosemer <odin@linuxfreak.com> Wed, 27 Oct 1999 19:39:46 -0500 | ||