diff options
Diffstat (limited to 'debian')
-rw-r--r-- | debian/changelog | 145 |
1 files changed, 145 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog index 8ba684245..1530329a9 100644 --- a/debian/changelog +++ b/debian/changelog | |||
@@ -1,3 +1,148 @@ | |||
1 | openssh (1:5.1p1-1) UNRELEASED; urgency=low | ||
2 | |||
3 | * New upstream release (closes: #474301). Important changes not previously | ||
4 | backported to 4.7p1: | ||
5 | - 4.9/4.9p1 (http://www.openssh.com/txt/release-4.9): | ||
6 | + Added chroot(2) support for sshd(8), controlled by a new option | ||
7 | "ChrootDirectory" (closes: #139047, LP: #24777). | ||
8 | + Linked sftp-server(8) into sshd(8). The internal sftp server is used | ||
9 | when the command "internal-sftp" is specified in a Subsystem or | ||
10 | ForceCommand declaration. When used with ChrootDirectory, the | ||
11 | internal sftp server requires no special configuration of files | ||
12 | inside the chroot environment. | ||
13 | + Added a protocol extension method "posix-rename@openssh.com" for | ||
14 | sftp-server(8) to perform POSIX atomic rename() operations; sftp(1) | ||
15 | prefers this if available (closes: #308561). | ||
16 | + Removed the fixed limit of 100 file handles in sftp-server(8). | ||
17 | + ssh(8) will now skip generation of SSH protocol 1 ephemeral server | ||
18 | keys when in inetd mode and protocol 2 connections are negotiated. | ||
19 | This speeds up protocol 2 connections to inetd-mode servers that | ||
20 | also allow Protocol 1. | ||
21 | + Accept the PermitRootLogin directive in a sshd_config(5) Match | ||
22 | block. Allows for, e.g. permitting root only from the local network. | ||
23 | + Reworked sftp(1) argument splitting and escaping to be more | ||
24 | internally consistent (i.e. between sftp commands) and more | ||
25 | consistent with sh(1). Please note that this will change the | ||
26 | interpretation of some quoted strings, especially those with | ||
27 | embedded backslash escape sequences. | ||
28 | + Support "Banner=none" in sshd_config(5) to disable sending of a | ||
29 | pre-login banner (e.g. in a Match block). | ||
30 | + ssh(1) ProxyCommands are now executed with $SHELL rather than | ||
31 | /bin/sh. | ||
32 | + ssh(1)'s ConnectTimeout option is now applied to both the TCP | ||
33 | connection and the SSH banner exchange (previously it just covered | ||
34 | the TCP connection). This allows callers of ssh(1) to better detect | ||
35 | and deal with stuck servers that accept a TCP connection but don't | ||
36 | progress the protocol, and also makes ConnectTimeout useful for | ||
37 | connections via a ProxyCommand. | ||
38 | + scp(1) incorrectly reported "stalled" on slow copies (closes: | ||
39 | #140828). | ||
40 | + scp(1) date underflow for timestamps before epoch. | ||
41 | + ssh(1) used the obsolete SIG DNS RRtype for host keys in DNS, | ||
42 | instead of the current standard RRSIG. | ||
43 | + Correctly drain ACKs when a sftp(1) upload write fails midway, | ||
44 | avoids a fatal() exit from what should be a recoverable condition. | ||
45 | + Fixed ssh-keygen(1) selective host key hashing (i.e. "ssh-keygen -HF | ||
46 | hostname") to not include any IP address in the data to be hashed. | ||
47 | + Make ssh(1) skip listening on the IPv6 wildcard address when a | ||
48 | binding address of 0.0.0.0 is used against an old SSH server that | ||
49 | does not support the RFC4254 syntax for wildcard bind addresses. | ||
50 | + Enable IPV6_V6ONLY socket option on sshd(8) listen socket, as is | ||
51 | already done for X11/TCP forwarding sockets (closes: #439661). | ||
52 | + Fix FD leak that could hang a ssh(1) connection multiplexing master. | ||
53 | + Make ssh(1) -q option documentation consistent with reality. | ||
54 | + Fixed sshd(8) PAM support not calling pam_session_close(), or | ||
55 | failing to call it with root privileges (closes: #372680). | ||
56 | + Fix activation of OpenSSL engine support when requested in configure | ||
57 | (LP: #119295). | ||
58 | - 5.1/5.1p1 (http://www.openssh.com/txt/release-5.1): | ||
59 | + Introduce experimental SSH Fingerprint ASCII Visualisation to ssh(1) | ||
60 | and ssh-keygen(1). Visual fingerprint display is controlled by a new | ||
61 | ssh_config(5) option "VisualHostKey". The intent is to render SSH | ||
62 | host keys in a visual form that is amenable to easy recall and | ||
63 | rejection of changed host keys. | ||
64 | + sshd_config(5) now supports CIDR address/masklen matching in "Match | ||
65 | address" blocks, with a fallback to classic wildcard matching. | ||
66 | + sshd(8) now supports CIDR matching in ~/.ssh/authorized_keys | ||
67 | from="..." restrictions, also with a fallback to classic wildcard | ||
68 | matching. | ||
69 | + Added an extended test mode (-T) to sshd(8) to request that it write | ||
70 | its effective configuration to stdout and exit. Extended test mode | ||
71 | also supports the specification of connection parameters (username, | ||
72 | source address and hostname) to test the application of | ||
73 | sshd_config(5) Match rules. | ||
74 | + ssh(1) now prints the number of bytes transferred and the overall | ||
75 | connection throughput for SSH protocol 2 sessions when in verbose | ||
76 | mode (previously these statistics were displayed for protocol 1 | ||
77 | connections only). | ||
78 | + sftp-server(8) now supports extension methods statvfs@openssh.com | ||
79 | and fstatvfs@openssh.com that implement statvfs(2)-like operations. | ||
80 | + sftp(1) now has a "df" command to the sftp client that uses the | ||
81 | statvfs@openssh.com to produce a df(1)-like display of filesystem | ||
82 | space and inode utilisation (requires statvfs@openssh.com support on | ||
83 | the server). | ||
84 | + Added a MaxSessions option to sshd_config(5) to allow control of the | ||
85 | number of multiplexed sessions supported over a single TCP | ||
86 | connection. This allows increasing the number of allowed sessions | ||
87 | above the previous default of 10, disabling connection multiplexing | ||
88 | (MaxSessions=1) or disallowing login/shell/subsystem sessions | ||
89 | entirely (MaxSessions=0). | ||
90 | + Added a no-more-sessions@openssh.com global request extension that | ||
91 | is sent from ssh(1) to sshd(8) when the client knows that it will | ||
92 | never request another session (i.e. when session multiplexing is | ||
93 | disabled). This allows a server to disallow further session requests | ||
94 | and terminate the session in cases where the client has been | ||
95 | hijacked. | ||
96 | + ssh-keygen(1) now supports the use of the -l option in combination | ||
97 | with -F to search for a host in ~/.ssh/known_hosts and display its | ||
98 | fingerprint. | ||
99 | + ssh-keyscan(1) now defaults to "rsa" (protocol 2) keys, instead of | ||
100 | "rsa1". | ||
101 | + Added an AllowAgentForwarding option to sshd_config(8) to control | ||
102 | whether authentication agent forwarding is permitted. Note that this | ||
103 | is a loose control, as a client may install their own unofficial | ||
104 | forwarder. | ||
105 | + ssh(1) and sshd(8): avoid unnecessary malloc/copy/free when | ||
106 | receiving network data, resulting in a ~10% speedup. | ||
107 | + ssh(1) and sshd(8) will now try additional addresses when connecting | ||
108 | to a port forward destination whose DNS name resolves to more than | ||
109 | one address. The previous behaviour was to try the only first | ||
110 | address and give up if that failed. | ||
111 | + ssh(1) and sshd(8) now support signalling that channels are | ||
112 | half-closed for writing, through a channel protocol extension | ||
113 | notification "eow@openssh.com". This allows propagation of closed | ||
114 | file descriptors, so that commands such as "ssh -2 localhost od | ||
115 | /bin/ls | true" do not send unnecessary data over the wire. | ||
116 | + sshd(8): increased the default size of ssh protocol 1 ephemeral keys | ||
117 | from 768 to 1024 bits. | ||
118 | + When ssh(1) has been requested to fork after authentication ("ssh | ||
119 | -f") with ExitOnForwardFailure enabled, delay the fork until after | ||
120 | replies for any -R forwards have been seen. Allows for robust | ||
121 | detection of -R forward failure when using -f. | ||
122 | + "Match group" blocks in sshd_config(5) now support negation of | ||
123 | groups. E.g. "Match group staff,!guests". | ||
124 | + sftp(1) and sftp-server(8) now allow chmod-like operations to set | ||
125 | set[ug]id/sticky bits. | ||
126 | + The MaxAuthTries option is now permitted in sshd_config(5) match | ||
127 | blocks. | ||
128 | + Multiplexed ssh(1) sessions now support a subset of the ~ escapes | ||
129 | that are available to a primary connection. | ||
130 | + ssh(1) connection multiplexing will now fall back to creating a new | ||
131 | connection in most error cases (closes: #352830). | ||
132 | + Make ssh(1) deal more gracefully with channel requests that fail. | ||
133 | Previously it would optimistically assume that requests would always | ||
134 | succeed, which could cause hangs if they did not (e.g. when the | ||
135 | server runs out of file descriptors). | ||
136 | + ssh(1) now reports multiplexing errors via the multiplex slave's | ||
137 | stderr where possible (subject to LogLevel in the mux master). | ||
138 | + Prevent sshd(8) from erroneously applying public key restrictions | ||
139 | leaned from ~/.ssh/authorized_keys to other authentication methods | ||
140 | when public key authentication subsequently fails (LP: #161047). | ||
141 | + Fixed an UMAC alignment problem that manifested on Itanium | ||
142 | platforms. | ||
143 | |||
144 | -- Colin Watson <cjwatson@ubuntu.com> Tue, 22 Jul 2008 17:34:06 +0100 | ||
145 | |||
1 | openssh (1:4.7p1-13) unstable; urgency=low | 146 | openssh (1:4.7p1-13) unstable; urgency=low |
2 | 147 | ||
3 | * Add some helpful advice to the end of ssh-vulnkey's output if there are | 148 | * Add some helpful advice to the end of ssh-vulnkey's output if there are |