diff options
Diffstat (limited to '')
-rw-r--r-- | debian/changelog | 5432 |
1 files changed, 5432 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog new file mode 100644 index 0000000..852e8b9 --- /dev/null +++ b/debian/changelog @@ -0,0 +1,5432 @@ +openssh (1:7.9p1-10+deb10u2) buster; urgency=medium + + * Apply upstream patch to deny (non-fatally) ipc in the seccomp sandbox, + fixing failures with OpenSSL 1.1.1d and Linux < 3.19 on some + architectures (closes: #946242). Note that this also drops the previous + change to allow ipc on s390, since upstream has security concerns with + that and it doesn't currently seem to be needed. + + -- Colin Watson <cjwatson@debian.org> Fri, 31 Jan 2020 20:55:34 +0000 + +openssh (1:7.9p1-10+deb10u1) buster-security; urgency=high + + * Apply upstream patch to deny (non-fatally) shmget/shmat/shmdt in preauth + privsep child, coping with changes in OpenSSL 1.1.1d that broke OpenSSH + on Linux kernels before 3.19 (closes: #941663). + + -- Colin Watson <cjwatson@debian.org> Sun, 06 Oct 2019 19:18:07 +0100 + +openssh (1:7.9p1-10) unstable; urgency=medium + + * Temporarily revert IPQoS defaults to pre-7.8 values until issues with + "iptables -m tos" and VMware have been fixed (closes: #923879, #926229; + LP: #1822370). + + -- Colin Watson <cjwatson@debian.org> Mon, 08 Apr 2019 11:13:04 +0100 + +openssh (1:7.9p1-9) unstable; urgency=medium + + * Apply upstream patch to make scp handle shell-style brace expansions + when checking that filenames sent by the server match what the client + requested (closes: #923486). + + -- Colin Watson <cjwatson@debian.org> Fri, 01 Mar 2019 12:23:36 +0000 + +openssh (1:7.9p1-8) unstable; urgency=medium + + [ Colin Watson ] + * Apply upstream patch to fix bug in HostbasedAcceptedKeyTypes and + PubkeyAcceptedKeyTypes options in the case where only RSA-SHA2 signature + types were specified. + * Apply upstream patch to request RSA-SHA2 signatures for + rsa-sha2-{256|512}-cert-v01@openssh.com cert algorithms (closes: + #923419). + * Move moduli(5) manual page to openssh-server to go with /etc/ssh/moduli; + forgotten in 1:7.9p1-5. + + [ Dominik George ] + * Correctly handle conffile move to openssh-server (closes: #919344). + + -- Colin Watson <cjwatson@debian.org> Thu, 28 Feb 2019 19:31:49 +0000 + +openssh (1:7.9p1-7) unstable; urgency=medium + + * Recommend "default-logind | logind | libpam-systemd" rather than just + libpam-systemd (closes: #923199). (I've retained libpam-systemd as an + alternative for a while to avoid backporting accidents, although it can + be removed later.) + * Pass "--exec /usr/sbin/sshd" to start-stop-daemon on stop as well as + start and pass "--chuid 0:0" on start, to avoid problems with non-root + groups leaking into the ownership of /run/sshd.pid (closes: #922365). + + -- Colin Watson <cjwatson@debian.org> Tue, 26 Feb 2019 15:13:23 +0000 + +openssh (1:7.9p1-6) unstable; urgency=medium + + * CVE-2019-6109: Apply upstream patches to sanitize scp filenames via + snmprintf (closes: #793412). + * CVE-2019-6111: Apply upstream patch to check in scp client that + filenames sent during remote->local directory copies satisfy the + wildcard specified by the user. + + -- Colin Watson <cjwatson@debian.org> Fri, 08 Feb 2019 16:26:35 +0000 + +openssh (1:7.9p1-5) unstable; urgency=high + + * Move /etc/ssh/moduli to openssh-server, since it's reasonably large and + only used by sshd (closes: #858050). + * Drop obsolete alternate build-dependency on libssl1.0-dev (closes: + #917342). + * CVE-2018-20685: Apply upstream scp patch to disallow empty incoming + filename or ones that refer to the current directory (closes: #919101). + + -- Colin Watson <cjwatson@debian.org> Sun, 13 Jan 2019 11:22:45 +0000 + +openssh (1:7.9p1-4) unstable; urgency=medium + + * Fix Ubuntu detection in debian/rules, since the documentation comment + for dpkg_vendor_derives_from is wrong (thanks, Jeremy Bicha; see + #913816). + + -- Colin Watson <cjwatson@debian.org> Fri, 16 Nov 2018 11:27:28 +0000 + +openssh (1:7.9p1-3) unstable; urgency=medium + + * Be more specific about what files to install in openssh-tests, to avoid + installing a symlink into the build tree. + * Re-export debian/upstream/signing-key.asc without extra signatures. + * Restore direct test dependencies on openssl, putty-tools, and + python-twisted-conch; these are really only indirect dependencies via + openssh-tests, but including them means that this package will be + retested when they change. + + -- Colin Watson <cjwatson@debian.org> Thu, 15 Nov 2018 01:30:56 +0000 + +openssh (1:7.9p1-2) unstable; urgency=medium + + * Add GitLab CI configuration. + * Make the autopkgtest create /run/sshd if it doesn't already exist. + * Drop "set -x" verbosity from the autopkgtest; I think we can do without + this in most cases nowadays. + * Add an openssh-tests binary package containing enough files to run the + upstream regression tests. This allows autopkgtest to run more + efficiently, as it doesn't have to build part of the source tree again. + + -- Colin Watson <cjwatson@debian.org> Wed, 14 Nov 2018 15:55:48 +0000 + +openssh (1:7.9p1-1) unstable; urgency=medium + + * New upstream release (https://www.openssh.com/txt/release-7.9): + - ssh(1), sshd(8): allow most port numbers to be specified using service + names from getservbyname(3) (typically /etc/services; closes: + #177406). + - ssh(1): allow the IdentityAgent configuration directive to accept + environment variable names. This supports the use of multiple agent + sockets without needing to use fixed paths. + - sshd(8): support signalling sessions via the SSH protocol. A limited + subset of signals is supported and only for login or command sessions + (i.e. not subsystems) that were not subject to a forced command via + authorized_keys or sshd_config. + - ssh(1): support "ssh -Q sig" to list supported signature options. + Also "ssh -Q help" to show the full set of supported queries. + - ssh(1), sshd(8): add a CASignatureAlgorithms option for the client and + server configs to allow control over which signature formats are + allowed for CAs to sign certificates. For example, this allows + banning CAs that sign certificates using the RSA-SHA1 signature + algorithm. + - sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to revoke + keys specified by SHA256 hash. + - ssh-keygen(1): allow creation of key revocation lists directly from + base64-encoded SHA256 fingerprints. This supports revoking keys using + only the information contained in sshd(8) authentication log messages. + - ssh(1), ssh-keygen(1): avoid spurious "invalid format" errors when + attempting to load PEM private keys while using an incorrect + passphrase. + - sshd(8): when a channel closed message is received from a client, + close the stderr file descriptor at the same time stdout is closed. + This avoids stuck processes if they were waiting for stderr to close + and were insensitive to stdin/out closing (closes: #844494). + - ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11 + forwarding timeout and support X11 forwarding indefinitely. + Previously the behaviour of ForwardX11Timeout=0 was undefined. + - sshd(8): when compiled with GSSAPI support, cache supported method + OIDs regardless of whether GSSAPI authentication is enabled in the + main section of sshd_config. This avoids sandbox violations if GSSAPI + authentication was later enabled in a Match block. + - sshd(8): do not fail closed when configured with a text key revocation + list that contains a too-short key. + - ssh(1): treat connections with ProxyJump specified the same as ones + with a ProxyCommand set with regards to hostname canonicalisation + (i.e. don't try to canonicalise the hostname unless + CanonicalizeHostname is set to 'always'). + - ssh(1): fix regression in OpenSSH 7.8 that could prevent public-key + authentication using certificates hosted in a ssh-agent(1) or against + sshd(8) from OpenSSH <7.8 (LP: #1790963). + - All: support building against the openssl-1.1 API (releases 1.1.0g and + later). The openssl-1.0 API will remain supported at least until + OpenSSL terminates security patch support for that API version + (closes: #828475). + - sshd(8): allow the futex(2) syscall in the Linux seccomp sandbox; + apparently required by some glibc/OpenSSL combinations. + * Remove dh_builddeb override to use xz compression; this has been the + default since dpkg 1.17.0. + * Simplify debian/rules using /usr/share/dpkg/default.mk. + * Remove /etc/network/if-up.d/openssh-server, as it causes more problems + than it solves (thanks, Christian Ehrhardt, Andreas Hasenack, and David + Britton; closes: #789532, LP: #1037738, #1674330, #1718227). Add an + "if-up hook removed" section to README.Debian documenting the corner + case that may need configuration adjustments. + + -- Colin Watson <cjwatson@debian.org> Sun, 21 Oct 2018 10:39:24 +0100 + +openssh (1:7.8p1-1) unstable; urgency=medium + + * New upstream release (https://www.openssh.com/txt/release-7.8, closes: + #907534): + - ssh-keygen(1): Write OpenSSH format private keys by default instead of + using OpenSSL's PEM format (closes: #905407). The OpenSSH format, + supported in OpenSSH releases since 2014 and described in the + PROTOCOL.key file in the source distribution, offers substantially + better protection against offline password guessing and supports key + comments in private keys. If necessary, it is possible to write old + PEM-style keys by adding "-m PEM" to ssh-keygen's arguments when + generating or updating a key. + - sshd(8): Remove internal support for S/Key multiple factor + authentication. S/Key may still be used via PAM or BSD auth. + - ssh(1): Remove vestigial support for running ssh(1) as setuid. This + used to be required for hostbased authentication and the (long gone) + rhosts-style authentication, but has not been necessary for a long + time. Attempting to execute ssh as a setuid binary, or with uid != + effective uid will now yield a fatal error at runtime. + - sshd(8): The semantics of PubkeyAcceptedKeyTypes and the similar + HostbasedAcceptedKeyTypes options have changed. These now specify + signature algorithms that are accepted for their respective + authentication mechanism, where previously they specified accepted key + types. This distinction matters when using the RSA/SHA2 signature + algorithms "rsa-sha2-256", "rsa-sha2-512" and their certificate + counterparts. Configurations that override these options but omit + these algorithm names may cause unexpected authentication failures (no + action is required for configurations that accept the default for + these options). + - sshd(8): The precedence of session environment variables has changed. + ~/.ssh/environment and environment="..." options in authorized_keys + files can no longer override SSH_* variables set implicitly by sshd. + - ssh(1)/sshd(8): The default IPQoS used by ssh/sshd has changed. They + will now use DSCP AF21 for interactive traffic and CS1 for bulk. For + a detailed rationale, please see the commit message: + https://cvsweb.openbsd.org/src/usr.bin/ssh/readconf.c#rev1.284 + - ssh(1)/sshd(8): Add new signature algorithms "rsa-sha2-256-cert- + v01@openssh.com" and "rsa-sha2-512-cert-v01@openssh.com" to explicitly + force use of RSA/SHA2 signatures in authentication. + - sshd(8): Extend the PermitUserEnvironment option to accept a whitelist + of environment variable names in addition to global "yes" or "no" + settings. + - sshd(8): Add a PermitListen directive to sshd_config(5) and a + corresponding permitlisten= authorized_keys option that control which + listen addresses and port numbers may be used by remote forwarding + (ssh -R ...). + - sshd(8): Add some countermeasures against timing attacks used for + account validation/enumeration. sshd will enforce a minimum time or + each failed authentication attempt consisting of a global 5ms minimum + plus an additional per-user 0-4ms delay derived from a host secret. + - sshd(8): Add a SetEnv directive to allow an administrator to + explicitly specify environment variables in sshd_config. Variables + set by SetEnv override the default and client-specified environment. + - ssh(1): Add a SetEnv directive to request that the server sets an + environment variable in the session. Similar to the existing SendEnv + option, these variables are set subject to server configuration. + - ssh(1): Allow "SendEnv -PATTERN" to clear environment variables + previously marked for sending to the server (closes: #573316). + - ssh(1)/sshd(8): Make UID available as a %-expansion everywhere that + the username is available currently. + - ssh(1): Allow setting ProxyJump=none to disable ProxyJump + functionality. + - sshd(8): Avoid observable differences in request parsing that could be + used to determine whether a target user is valid. + - ssh(1)/sshd(8): Fix some memory leaks. + - ssh(1): Fix a pwent clobber (introduced in openssh-7.7) that could + occur during key loading, manifesting as crash on some platforms. + - sshd_config(5): Clarify documentation for AuthenticationMethods + option. + - ssh(1): Ensure that the public key algorithm sent in a public key + SSH_MSG_USERAUTH_REQUEST matches the content of the signature blob. + Previously, these could be inconsistent when a legacy or non-OpenSSH + ssh-agent returned a RSA/SHA1 signature when asked to make a RSA/SHA2 + signature. + - sshd(8): Fix failures to read authorized_keys caused by faulty + supplemental group caching. + - scp(1): Apply umask to directories, fixing potential mkdir/chmod race + when copying directory trees. + - ssh-keygen(1): Return correct exit code when searching for and hashing + known_hosts entries in a single operation. + - ssh(1): Prefer the ssh binary pointed to via argv[0] to $PATH when + re-executing ssh for ProxyJump. + - sshd(8): Do not ban PTY allocation when a sshd session is restricted + because the user password is expired as it breaks password change + dialog. + - ssh(1)/sshd(8): Fix error reporting from select() failures. + - ssh(1): Improve documentation for -w (tunnel) flag, emphasising that + -w implicitly sets Tunnel=point-to-point. + - ssh-agent(1): Implement EMFILE mitigation for ssh-agent. ssh-agent + will no longer spin when its file descriptor limit is exceeded. + - ssh(1)/sshd(8): Disable SSH2_MSG_DEBUG messages for Twisted Conch + clients. Twisted Conch versions that lack a version number in their + identification strings will mishandle these messages when running on + Python 2.x (https://twistedmatrix.com/trac/ticket/9422). + - sftp(1): Notify user immediately when underlying ssh process dies + expectedly. + - ssh(1)/sshd(8): Fix tunnel forwarding; regression in 7.7 release. + - ssh-agent(1): Don't kill ssh-agent's listening socket entirely if it + fails to accept(2) a connection. + - ssh(1): Add some missing options in the configuration dump output (ssh + -G). + - sshd(8): Expose details of completed authentication to PAM auth + modules via SSH_AUTH_INFO_0 in the PAM environment. + * Switch debian/watch to HTTPS. + * Temporarily work around https://twistedmatrix.com/trac/ticket/9515 in + regression tests. + + -- Colin Watson <cjwatson@debian.org> Thu, 30 Aug 2018 15:35:27 +0100 + +openssh (1:7.7p1-4) unstable; urgency=high + + * CVE-2018-15473: Apply upstream patch to delay bailout for invalid + authenticating user until after the packet containing the request has + been fully parsed (closes: #906236). + + -- Colin Watson <cjwatson@debian.org> Fri, 17 Aug 2018 14:09:32 +0100 + +openssh (1:7.7p1-3) unstable; urgency=medium + + [ Colin Watson ] + * Adjust git-dpm tagging configuration. + * Remove no-longer-used Lintian overrides from openssh-server and ssh. + * Add Documentation keys to ssh-agent.service, ssh.service, and + ssh@.service. + + [ Juri Grabowski ] + * Add rescue.target with ssh support. + + [ Christian Ehrhardt ] + * Fix unintentional restriction of authorized keys environment options + to be alphanumeric (closes: #903474, LP: #1771011). + + -- Colin Watson <cjwatson@debian.org> Tue, 10 Jul 2018 16:07:16 +0100 + +openssh (1:7.7p1-2) unstable; urgency=medium + + * Fix parsing of DebianBanner option (closes: #894730). + + -- Colin Watson <cjwatson@debian.org> Wed, 04 Apr 2018 00:47:29 +0100 + +openssh (1:7.7p1-1) unstable; urgency=medium + + * New upstream release (https://www.openssh.com/txt/release-7.7): + - ssh(1)/sshd(8): Drop compatibility support for some very old SSH + implementations, including ssh.com <=2.* and OpenSSH <= 3.*. These + versions were all released in or before 2001 and predate the final SSH + RFCs. The support in question isn't necessary for RFC-compliant SSH + implementations. + - Add experimental support for PQC XMSS keys (Extended Hash-Based + Signatures). + - sshd(8): Add an "rdomain" criterion for the sshd_config Match keyword + to allow conditional configuration that depends on which routing + domain a connection was received on. + - sshd_config(5): Add an optional rdomain qualifier to the ListenAddress + directive to allow listening on different routing domains. + - sshd(8): Add "expiry-time" option for authorized_keys files to allow + for expiring keys. + - ssh(1): Add a BindInterface option to allow binding the outgoing + connection to an interface's address (basically a more usable + BindAddress; closes: #289592). + - ssh(1): Expose device allocated for tun/tap forwarding via a new %T + expansion for LocalCommand. This allows LocalCommand to be used to + prepare the interface. + - sshd(8): Expose the device allocated for tun/tap forwarding via a new + SSH_TUNNEL environment variable. This allows automatic setup of the + interface and surrounding network configuration automatically on the + server. + - ssh(1)/scp(1)/sftp(1): Add URI support to ssh, sftp and scp, e.g. + ssh://user@host or sftp://user@host/path. Additional connection + parameters described in draft-ietf-secsh-scp-sftp-ssh-uri-04 are not + implemented since the ssh fingerprint format in the draft uses the + deprecated MD5 hash with no way to specify any other algorithm. + - ssh-keygen(1): Allow certificate validity intervals that specify only + a start or stop time (instead of both or neither). + - sftp(1): Allow "cd" and "lcd" commands with no explicit path argument. + lcd will change to the local user's home directory as usual. cd will + change to the starting directory for session (because the protocol + offers no way to obtain the remote user's home directory). + - sshd(8): When doing a config test with sshd -T, only require the + attributes that are actually used in Match criteria rather than (an + incomplete list of) all criteria. + - ssh(1)/sshd(8): More strictly check signature types during key + exchange against what was negotiated. Prevents downgrade of RSA + signatures made with SHA-256/512 to SHA-1. + - sshd(8): Fix support for client that advertise a protocol version of + "1.99" (indicating that they are prepared to accept both SSHv1 and + SSHv2). This was broken in OpenSSH 7.6 during the removal of SSHv1 + support. + - ssh(1): Warn when the agent returns a ssh-rsa (SHA1) signature when a + rsa-sha2-256/512 signature was requested. This condition is possible + when an old or non-OpenSSH agent is in use. + - ssh-agent(1): Fix regression introduced in 7.6 that caused ssh-agent + to fatally exit if presented an invalid signature request message. + - sshd_config(5): Accept yes/no flag options case-insensitively, as has + been the case in ssh_config(5) for a long time (LP: #1656557). + - ssh(1): Improve error reporting for failures during connection. Under + some circumstances misleading errors were being shown. + - ssh-keyscan(1): Add -D option to allow printing of results directly in + SSHFP format. + - ssh(1): Compatibility fix for some servers that erroneously drop the + connection when the IUTF8 (RFC8160) option is sent. + - scp(1): Disable RemoteCommand and RequestTTY in the ssh session + started by scp (sftp was already doing this). + - ssh-keygen(1): Refuse to create a certificate with an unusable number + of principals. + - ssh-keygen(1): Fatally exit if ssh-keygen is unable to write all the + public key during key generation. Previously it would silently ignore + errors writing the comment and terminating newline. + - ssh(1): Do not modify hostname arguments that are addresses by + automatically forcing them to lower-case. Instead canonicalise them + jo resolve ambiguities (e.g. ::0001 => ::1) before they are matched + against known_hosts. + - ssh(1): Don't accept junk after "yes" or "no" responses to hostkey + prompts. + - sftp(1): Have sftp print a warning about shell cleanliness when + decoding the first packet fails, which is usually caused by shells + polluting stdout of non-interactive startups. + - ssh(1)/sshd(8): Switch timers in packet code from using wall-clock + time to monotonic time, allowing the packet layer to better function + over a clock step and avoiding possible integer overflows during + steps. + - sshd(8): Correctly detect MIPS ABI in use at configure time. Fixes + sandbox violations on some environments. + - Build and link with "retpoline" flags when available to mitigate the + "branch target injection" style (variant 2) of the Spectre + branch-prediction vulnerability. + + -- Colin Watson <cjwatson@debian.org> Tue, 03 Apr 2018 12:40:24 +0100 + +openssh (1:7.6p1-5) unstable; urgency=medium + + * Explicitly build-depend on pkg-config, rather than implicitly + build-depending on it via libgtk-3-dev (thanks, Aurelien Jarno; closes: + #894558). + + -- Colin Watson <cjwatson@debian.org> Sun, 01 Apr 2018 21:37:19 +0100 + +openssh (1:7.6p1-4) unstable; urgency=medium + + * Move VCS to salsa.debian.org. + * Add a preseeding-only openssh-server/password-authentication debconf + template that can be used to disable password authentication (closes: + #878945). + + -- Colin Watson <cjwatson@debian.org> Sat, 10 Feb 2018 02:31:46 +0000 + +openssh (1:7.6p1-3) unstable; urgency=medium + + [ Colin Watson ] + * Remove the decade-old ssh-krb5 transitional package; upgrades of + openssh-server will preserve existing configuration, and new + installations should just enable GSSAPIAuthentication and + GSSAPIKeyExchange in sshd_config (closes: #878626). + * Support the "noudeb" build profile. + * Fix putty-transfer regression test. + + [ Anders Kaseorg ] + * debian/systemd/ssh-agent.service: Add missing dbus dependency. + + [ Jason Duerstock ] + * Add a "pkg.openssh.nognome" build profile, which disables building the + ssh-askpass-gnome binary package and avoids the build-dependency on + libgtk-3-dev (closes: #883819). + + -- Colin Watson <cjwatson@debian.org> Tue, 16 Jan 2018 17:41:08 +0000 + +openssh (1:7.6p1-2) unstable; urgency=medium + + * Apply upstream patch to fix PermitOpen argument handling. + + -- Colin Watson <cjwatson@debian.org> Sat, 07 Oct 2017 13:44:13 +0100 + +openssh (1:7.6p1-1) unstable; urgency=medium + + * New upstream release (https://www.openssh.com/txt/release-7.6): + - CVE-2017-15906: sftp-server(8): In read-only mode, sftp-server was + incorrectly permitting creation of zero-length files. Reported by + Michal Zalewski. + - ssh(1): Delete SSH protocol version 1 support, associated + configuration options and documentation (LP: #1584321). + - ssh(1)/sshd(8): Remove support for the hmac-ripemd160 MAC. + - ssh(1)/sshd(8): Remove support for the arcfour, blowfish and CAST + ciphers. + - Refuse RSA keys <1024 bits in length and improve reporting for keys + that do not meet this requirement. + - ssh(1): Do not offer CBC ciphers by default. + - ssh(1): Add RemoteCommand option to specify a command in the ssh + config file instead of giving it on the client's command line. This + allows the configuration file to specify the command that will be + executed on the remote host. + - sshd(8): Add ExposeAuthInfo option that enables writing details of the + authentication methods used (including public keys where applicable) + to a file that is exposed via a $SSH_USER_AUTH environment variable in + the subsequent session. + - ssh(1): Add support for reverse dynamic forwarding. In this mode, ssh + will act as a SOCKS4/5 proxy and forward connections to destinations + requested by the remote SOCKS client. This mode is requested using + extended syntax for the -R and RemoteForward options and, because it + is implemented solely at the client, does not require the server be + updated to be supported. + - sshd(8): Allow LogLevel directive in sshd_config Match blocks. + - ssh-keygen(1): Allow inclusion of arbitrary string or flag certificate + extensions and critical options. + - ssh-keygen(1): Allow ssh-keygen to use a key held in ssh-agent as a CA + when signing certificates. + - ssh(1)/sshd(8): Allow IPQoS=none in ssh/sshd to not set an explicit + ToS/DSCP value and just use the operating system default. + - ssh-add(1): Add -q option to make ssh-add quiet on success. + - ssh(1): Expand the StrictHostKeyChecking option with two new settings. + The first "accept-new" will automatically accept hitherto-unseen keys + but will refuse connections for changed or invalid hostkeys. This is + a safer subset of the current behaviour of StrictHostKeyChecking=no. + The second setting "off", is a synonym for the current behaviour of + StrictHostKeyChecking=no: accept new host keys, and continue + connection for hosts with incorrect hostkeys. A future release will + change the meaning of StrictHostKeyChecking=no to the behaviour of + "accept-new". + - ssh(1): Add SyslogFacility option to ssh(1) matching the equivalent + option in sshd(8). + - ssh(1): Use HostKeyAlias if specified instead of hostname for matching + host certificate principal names. + - sftp(1): Implement sorting for globbed ls. + - ssh(1): Add a user@host prefix to client's "Permission denied" + messages, useful in particular when using "stacked" connections (e.g. + ssh -J) where it's not clear which host is denying. + - ssh(1): Accept unknown EXT_INFO extension values that contain \0 + characters. These are legal, but would previously cause fatal + connection errors if received. + - sftp(1): Print '?' instead of incorrect link count (that the protocol + doesn't provide) for remote listings. + - ssh(1): Return failure rather than fatal() for more cases during + session multiplexing negotiations. Causes the session to fall back to + a non-mux connection if they occur. + - ssh(1): Mention that the server may send debug messages to explain + public key authentication problems under some circumstances. + - Translate OpenSSL error codes to better report incorrect passphrase + errors when loading private keys. + - sshd(8): Adjust compatibility patterns for WinSCP to correctly + identify versions that implement only the legacy DH group exchange + scheme (closes: #877800). + - ssh(1): Print the "Killed by signal 1" message only at LogLevel + verbose so that it is not shown at the default level; prevents it from + appearing during ssh -J and equivalent ProxyCommand configs. + - ssh-keygen(1): When generating all hostkeys (ssh-keygen -A), clobber + existing keys if they exist but are zero length. Zero-length keys + could previously be made if ssh-keygen failed or was interrupted part + way through generating them. + - ssh-keyscan(1): Avoid double-close() on file descriptors. + - sshd(8): Avoid reliance on shared use of pointers shared between + monitor and child sshd processes. + - sshd_config(8): Document available AuthenticationMethods. + - ssh(1): Avoid truncation in some login prompts. + - ssh(1): Make "--" before the hostname terminate argument processing + after the hostname too (closes: #873201). + - ssh-keygen(1): Switch from aes256-cbc to aes256-ctr for encrypting + new-style private keys. + - ssh(1): Warn and do not attempt to use keys when the public and + private halves do not match. + - sftp(1): Don't print verbose error message when ssh disconnects from + under sftp. + - sshd(8): Fix keepalive scheduling problem: prevent activity on a + forwarded port from preventing the keepalive from being sent. + - sshd(8): When started without root privileges, don't require the + privilege separation user or path to exist. + - ssh(1)/sshd(8): Correctness fix for channels implementation: accept + channel IDs greater than 0x7FFFFFFF. + - sshd(8): Expose list of completed authentication methods to PAM via + the SSH_AUTH_INFO_0 PAM environment variable. + - ssh(1)/sshd(8): Fix several problems in the tun/tap forwarding code, + mostly to do with host/network byte order confusion. + - sshd(8): Avoid Linux seccomp violations on ppc64le over the socketcall + syscall. + * Build-depend on debhelper (>= 9.20160709~) rather than dh-systemd. + * Change priorities of ssh and ssh-krb5 binary packages to optional, since + "Priority: extra" is now deprecated. + * Use HTTPS form of copyright-format URL. + * Adjust "Running sshd from inittab" instructions in README.Debian to + recommend using service(8) rather than calling the init script directly. + * Policy version 4.1.0. + * Adjust "Per-connection sshd instances with systemd" instructions in + README.Debian to recommend using a drop-in file rather than copying and + modifying the ssh.socket unit file. + + -- Colin Watson <cjwatson@debian.org> Fri, 06 Oct 2017 12:36:48 +0100 + +openssh (1:7.5p1-10) unstable; urgency=medium + + * Tell haveged to create the pid file we expect. + * Give up and use systemctl to start haveged if running under systemd; + this shouldn't be necessary, but I can't seem to get things working in + the Ubuntu autopkgtest environment otherwise. + + -- Colin Watson <cjwatson@debian.org> Fri, 01 Sep 2017 11:17:19 +0100 + +openssh (1:7.5p1-9) unstable; urgency=medium + + * Run debian/tests/regress with "set -x". + * Run haveged without "-w 1024", as setting the low water mark doesn't + seem possible in all autopkgtest virtualisation environments. + + -- Colin Watson <cjwatson@debian.org> Thu, 31 Aug 2017 13:23:04 +0100 + +openssh (1:7.5p1-8) unstable; urgency=medium + + * Drop openssh-client-ssh1, now built by a separate source package. + * Run haveged during autopkgtests to ensure that they have enough entropy + for key generation (LP: #1712921). + * Apply patches from https://bugzilla.mindrot.org/show_bug.cgi?id=2752 to + allow some extra syscalls for crypto cards on s390x (LP: #1686618). + + -- Colin Watson <cjwatson@debian.org> Mon, 28 Aug 2017 12:16:35 +0100 + +openssh (1:7.5p1-7) unstable; urgency=medium + + * Fix spelling of RuntimeDirectoryMode (closes: #872976). + * Add RuntimeDirectory and RuntimeDirectoryMode to ssh@.service as well as + ssh.service (closes: #872978). + + -- Colin Watson <cjwatson@debian.org> Wed, 23 Aug 2017 12:12:59 +0100 + +openssh (1:7.5p1-6) unstable; urgency=medium + + [ Colin Watson ] + * Test configuration before starting or reloading sshd under systemd + (closes: #865770). + * Create /run/sshd under systemd using RuntimeDirectory rather than + tmpfiles.d (thanks, Dmitry Smirnov; closes: #864190). + + [ Dimitri John Ledkov ] + * Drop upstart system and user jobs (closes: #872851). + + [ Chris Lamb ] + * Quote IP address in suggested "ssh-keygen -f" calls (closes: #872643). + + -- Colin Watson <cjwatson@debian.org> Wed, 23 Aug 2017 01:41:06 +0100 + +openssh (1:7.5p1-5) unstable; urgency=medium + + * Upload to unstable. + * Fix syntax error in debian/copyright. + + -- Colin Watson <cjwatson@debian.org> Sun, 18 Jun 2017 12:08:42 +0100 + +openssh (1:7.5p1-4) experimental; urgency=medium + + * Drop README.Debian section on privilege separation, as it's no longer + optional. + * Only call "initctl set-env" from agent-launch if $UPSTART_SESSION is set + (LP: #1689299). + * Fix incoming compression statistics (thanks, Russell Coker; closes: + #797964). + * Relicense debian/* under a two-clause BSD licence for bidirectional + compatibility with upstream, with permission from Matthew Vernon and + others. + + -- Colin Watson <cjwatson@debian.org> Tue, 06 Jun 2017 15:17:58 +0100 + +openssh (1:7.5p1-3) experimental; urgency=medium + + * Fix debian/adjust-openssl-dependencies to account for preferring + libssl1.0-dev. + * Adjust OpenSSL dependencies for openssh-client-ssh1 too. + * Fix purge failure when /etc/ssh has already somehow been removed + (LP: #1682817). + * Ensure that /etc/ssh exists before trying to create /etc/ssh/sshd_config + (LP: #1685022). + + -- Colin Watson <cjwatson@debian.org> Tue, 02 May 2017 13:51:27 +0100 + +openssh (1:7.5p1-2) experimental; urgency=medium + + * Add missing header on Linux/s390. + * Fix syntax error on Linux/X32. + + -- Colin Watson <cjwatson@debian.org> Sun, 02 Apr 2017 13:20:11 +0100 + +openssh (1:7.5p1-1) experimental; urgency=medium + + * New upstream release (https://www.openssh.com/txt/release-7.5): + - SECURITY: ssh(1), sshd(8): Fix weakness in CBC padding oracle + countermeasures that allowed a variant of the attack fixed in OpenSSH + 7.3 to proceed. Note that the OpenSSH client disables CBC ciphers by + default, sshd offers them as lowest-preference options and will remove + them by default entirely in the next release. + - This release deprecates the sshd_config UsePrivilegeSeparation option, + thereby making privilege separation mandatory (closes: #407754). + - The format of several log messages emitted by the packet code has + changed to include additional information about the user and their + authentication state. Software that monitors ssh/sshd logs may need + to account for these changes. + - ssh(1), sshd(8): Support "=-" syntax to easily remove methods from + algorithm lists, e.g. Ciphers=-*cbc. + - sshd(1): Fix NULL dereference crash when key exchange start messages + are sent out of sequence. + - ssh(1), sshd(8): Allow form-feed characters to appear in configuration + files. + - sshd(8): Fix regression in OpenSSH 7.4 support for the server-sig-algs + extension, where SHA2 RSA signature methods were not being correctly + advertised. + - ssh(1), ssh-keygen(1): Fix a number of case-sensitivity bugs in + known_hosts processing. + - ssh(1): Allow ssh to use certificates accompanied by a private key + file but no corresponding plain *.pub public key. + - ssh(1): When updating hostkeys using the UpdateHostKeys option, accept + RSA keys if HostkeyAlgorithms contains any RSA keytype. Previously, + ssh could ignore RSA keys when only the ssh-rsa-sha2-* methods were + enabled in HostkeyAlgorithms and not the old ssh-rsa method. + - ssh(1): Detect and report excessively long configuration file lines. + - Merge a number of fixes found by Coverity and reported via Redhat and + FreeBSD. Includes fixes for some memory and file descriptor leaks in + error paths. + - ssh(1), sshd(8): When logging long messages to stderr, don't truncate + "\r\n" if the length of the message exceeds the buffer. + - ssh(1): Fully quote [host]:port in generated ProxyJump/-J command- + line; avoid confusion over IPv6 addresses and shells that treat square + bracket characters specially. + - Fix various fallout and sharp edges caused by removing SSH protocol 1 + support from the server, including the server banner string being + incorrectly terminated with only \n (instead of \r\n), confusing error + messages from ssh-keyscan, and a segfault in sshd if protocol v.1 was + enabled for the client and sshd_config contained references to legacy + keys. + - ssh(1), sshd(8): Free fd_set on connection timeout. + - sftp(1): Fix division by zero crash in "df" output when server returns + zero total filesystem blocks/inodes. + - ssh(1), ssh-add(1), ssh-keygen(1), sshd(8): Translate OpenSSL errors + encountered during key loading to more meaningful error codes. + - ssh-keygen(1): Sanitise escape sequences in key comments sent to + printf but preserve valid UTF-8 when the locale supports it. + - ssh(1), sshd(8): Return reason for port forwarding failures where + feasible rather than always "administratively prohibited". + - sshd(8): Fix deadlock when AuthorizedKeysCommand or + AuthorizedPrincipalsCommand produces a lot of output and a key is + matched early. + - ssh(1): Fix typo in ~C error message for bad port forward + cancellation. + - ssh(1): Show a useful error message when included config files can't + be opened. + - sshd_config(5): Repair accidentally-deleted mention of %k token in + AuthorizedKeysCommand. + - sshd(8): Remove vestiges of previously removed LOGIN_PROGRAM. + - ssh-agent(1): Relax PKCS#11 whitelist to include libexec and common + 32-bit compatibility library directories. + - sftp-client(1): Fix non-exploitable integer overflow in SSH2_FXP_NAME + response handling. + - ssh-agent(1): Fix regression in 7.4 of deleting PKCS#11-hosted keys. + It was not possible to delete them except by specifying their full + physical path. + - sshd(8): Avoid sandbox errors for Linux S390 systems using an ICA + crypto coprocessor. + - sshd(8): Fix non-exploitable weakness in seccomp-bpf sandbox arg + inspection. + - ssh-keygen(1), ssh(1), sftp(1): Fix output truncation for various that + contain non-printable characters where the codeset in use is ASCII. + + -- Colin Watson <cjwatson@debian.org> Sun, 02 Apr 2017 02:58:01 +0100 + +openssh (1:7.4p1-11) unstable; urgency=medium + + * Fix incoming compression statistics (thanks, Russell Coker; closes: + #797964). + + -- Colin Watson <cjwatson@debian.org> Tue, 06 Jun 2017 15:03:48 +0100 + +openssh (1:7.4p1-10) unstable; urgency=medium + + * Move privilege separation directory and PID file from /var/run/ to /run/ + (closes: #760422, #856825). + * Unbreak Unix domain socket forwarding for root (closes: #858252). + + -- Colin Watson <cjwatson@debian.org> Thu, 30 Mar 2017 11:19:04 +0100 + +openssh (1:7.4p1-9) unstable; urgency=medium + + * Fix null pointer dereference in ssh-keygen; this fixes an autopkgtest + regression introduced in 1:7.4p1-8. + + -- Colin Watson <cjwatson@debian.org> Thu, 16 Mar 2017 13:43:15 +0000 + +openssh (1:7.4p1-8) unstable; urgency=medium + + * Fix ssh-keygen -H accidentally corrupting known_hosts that contained + already-hashed entries (closes: #851734, LP: #1668093). + * Fix ssh-keyscan to correctly hash hosts with a port number (closes: + #857736, LP: #1670745). + + -- Colin Watson <cjwatson@debian.org> Tue, 14 Mar 2017 13:49:14 +0000 + +openssh (1:7.4p1-7) unstable; urgency=medium + + * Don't set "PermitRootLogin yes" on fresh installations (regression + introduced in 1:7.4p1-1; closes: #852781). + * Restore reading authorized_keys2 by default. Upstream seems to intend + to gradually phase this out, so don't assume that this will remain the + default forever. However, we were late in adopting the upstream + sshd_config changes, so it makes sense to extend the grace period + (closes: #852320). + + -- Colin Watson <cjwatson@debian.org> Sun, 05 Mar 2017 02:12:42 +0000 + +openssh (1:7.4p1-6) unstable; urgency=medium + + * Remove temporary file on exit from postinst (closes: #850275). + * Remove LOGIN_PROGRAM and LOGIN_NO_ENDOPT definitions, since UseLogin is + gone. + * Document sshd_config changes that may be needed following the removal of + protocol 1 support from sshd (closes: #851573). + * Remove ssh_host_dsa_key from HostKey default (closes: #850614). + * Fix rekeying failure with GSSAPI key exchange (thanks, Harald Barth; + closes: #819361, LP: #1608965). + + -- Colin Watson <cjwatson@debian.org> Mon, 16 Jan 2017 15:11:10 +0000 + +openssh (1:7.4p1-5) unstable; urgency=medium + + * Create mux socket for regression tests in a temporary directory. + * Work around clock_gettime kernel bug on Linux x32 (closes: #849923). + + -- Colin Watson <cjwatson@debian.org> Tue, 03 Jan 2017 14:43:28 +0000 + +openssh (1:7.4p1-4) unstable; urgency=medium + + * Run regression tests inside annotate-output to try to diagnose timeout + issues. + * Make integrity tests more robust against timeouts in the case where the + first test in a series for a given MAC happens to modify the low bytes + of a packet length. + * Fix race conditions in forwarding tests. + + -- Colin Watson <cjwatson@debian.org> Mon, 02 Jan 2017 19:37:23 +0000 + +openssh (1:7.4p1-3) unstable; urgency=medium + + * Revert attempted hack around regress/forwarding.sh test failure, since + it doesn't seem to help. + * Run regression tests using 'sh -x' to try to get more information about + failures. + * Dump some useful log files if regression tests fail. + * Tweak regression test setup to cope with the case where some of the + source directory is unreadable by the openssh-tests user. + + -- Colin Watson <cjwatson@debian.org> Sat, 31 Dec 2016 02:48:17 +0000 + +openssh (1:7.4p1-2) unstable; urgency=medium + + * Attempt to hack around regress/forwarding.sh test failure in some + environments. + * Avoid calling into Kerberos libraries from ssh_gssapi_server_mechanisms + in the privsep monitor. + + -- Colin Watson <cjwatson@debian.org> Thu, 29 Dec 2016 12:02:12 +0000 + +openssh (1:7.4p1-1) unstable; urgency=medium + + * New upstream release (http://www.openssh.com/txt/release-7.4): + - ssh(1): Remove 3des-cbc from the client's default proposal. 64-bit + block ciphers are not safe in 2016 and we don't want to wait until + attacks like SWEET32 are extended to SSH. As 3des-cbc was the only + mandatory cipher in the SSH RFCs, this may cause problems connecting + to older devices using the default configuration, but it's highly + likely that such devices already need explicit configuration for key + exchange and hostkey algorithms already anyway. + - sshd(8): When a forced-command appears in both a certificate and an + authorized keys/principals command= restriction, sshd will now refuse + to accept the certificate unless they are identical. The previous + (documented) behaviour of having the certificate forced-command + override the other could be a bit confusing and error-prone. + - sshd(8): Remove the UseLogin configuration directive and support for + having /bin/login manage login sessions. + - CVE-2016-10009: ssh-agent(1): Will now refuse to load PKCS#11 modules + from paths outside a trusted whitelist (run-time configurable). + Requests to load modules could be passed via agent forwarding and an + attacker could attempt to load a hostile PKCS#11 module across the + forwarded agent channel: PKCS#11 modules are shared libraries, so this + would result in code execution on the system running the ssh-agent if + the attacker has control of the forwarded agent-socket (on the host + running the sshd server) and the ability to write to the filesystem of + the host running ssh-agent (usually the host running the ssh client) + (closes: #848714). + - CVE-2016-10010: sshd(8): When privilege separation is disabled, + forwarded Unix-domain sockets would be created by sshd(8) with the + privileges of 'root' instead of the authenticated user. This release + refuses Unix-domain socket forwarding when privilege separation is + disabled (Privilege separation has been enabled by default for 14 + years) (closes: #848715). + - CVE-2016-10011: sshd(8): Avoid theoretical leak of host private key + material to privilege-separated child processes via realloc() when + reading keys. No such leak was observed in practice for normal-sized + keys, nor does a leak to the child processes directly expose key + material to unprivileged users (closes: #848716). + - CVE-2016-10012: sshd(8): The shared memory manager used by + pre-authentication compression support had a bounds checks that could + be elided by some optimising compilers. Additionally, this memory + manager was incorrectly accessible when pre-authentication compression + was disabled. This could potentially allow attacks against the + privileged monitor process from the sandboxed privilege-separation + process (a compromise of the latter would be required first). This + release removes support for pre-authentication compression from + sshd(8) (closes: #848717). + - SECURITY: sshd(8): Validate address ranges for AllowUser and DenyUsers + directives at configuration load time and refuse to accept invalid + ones. It was previously possible to specify invalid CIDR address + ranges (e.g. user@127.1.2.3/55) and these would always match, possibly + resulting in granting access where it was not intended. + - ssh(1): Add a proxy multiplexing mode to ssh(1) inspired by the + version in PuTTY by Simon Tatham. This allows a multiplexing client + to communicate with the master process using a subset of the SSH + packet and channels protocol over a Unix-domain socket, with the main + process acting as a proxy that translates channel IDs, etc. This + allows multiplexing mode to run on systems that lack file-descriptor + passing (used by current multiplexing code) and potentially, in + conjunction with Unix-domain socket forwarding, with the client and + multiplexing master process on different machines. Multiplexing proxy + mode may be invoked using "ssh -O proxy ...". + - sshd(8): Add a sshd_config DisableForwarding option that disables X11, + agent, TCP, tunnel and Unix domain socket forwarding, as well as + anything else we might implement in the future. Like the 'restrict' + authorized_keys flag, this is intended to be a simple and future-proof + way of restricting an account. + - sshd(8), ssh(1): Support the "curve25519-sha256" key exchange method. + This is identical to the currently-supported method named + "curve25519-sha256@libssh.org". + - sshd(8): Improve handling of SIGHUP by checking to see if sshd is + already daemonised at startup and skipping the call to daemon(3) if it + is. This ensures that a SIGHUP restart of sshd(8) will retain the + same process-ID as the initial execution. sshd(8) will also now + unlink the PidFile prior to SIGHUP restart and re-create it after a + successful restart, rather than leaving a stale file in the case of a + configuration error. + - sshd(8): Allow ClientAliveInterval and ClientAliveCountMax directives + to appear in sshd_config Match blocks. + - sshd(8): Add %-escapes to AuthorizedPrincipalsCommand to match those + supported by AuthorizedKeysCommand (key, key type, fingerprint, etc.) + and a few more to provide access to the contents of the certificate + being offered. + - ssh(1): Allow IdentityFile to successfully load and use certificates + that have no corresponding bare public key. + - ssh(1): Fix public key authentication when multiple authentication is + in use and publickey is not just the first method attempted. + - ssh(1): Improve reporting when attempting to load keys from PKCS#11 + tokens with fewer useless log messages and more detail in debug + messages. + - ssh(1): When tearing down ControlMaster connections, don't pollute + stderr when LogLevel=quiet. + - sftp(1): On ^Z wait for underlying ssh(1) to suspend before suspending + sftp(1) to ensure that ssh(1) restores the terminal mode correctly if + suspended during a password prompt. + - ssh(1): Avoid busy-wait when ssh(1) is suspended during a password + prompt (LP: #1646813). + - ssh(1), sshd(8): Correctly report errors during sending of ext-info + messages. + - sshd(8): Fix NULL-deref crash if sshd(8) received an out-of-sequence + NEWKEYS message. + - sshd(8): Correct list of supported signature algorithms sent in the + server-sig-algs extension. + - sshd(8): Fix sending ext_info message if privsep is disabled. + - sshd(8): More strictly enforce the expected ordering of privilege + separation monitor calls used for authentication and allow them only + when their respective authentication methods are enabled in the + configuration. + - sshd_config(5): Use 2001:db8::/32, the official IPv6 subnet for + configuration examples. + - On environments configured with Turkish locales, fall back to the + C/POSIX locale to avoid errors in configuration parsing caused by that + locale's unique handling of the letters 'i' and 'I' (LP: #1638338). + - contrib: Add a gnome-ssh-askpass3 with GTK+3 support. + - sshd(8): Improve PRNG reseeding across privilege separation and force + libcrypto to obtain a high-quality seed before chroot or sandboxing. + * Apply "wrap-and-sort -at -f debian/control -f debian/tests/control". + * Remove entries related to protocol 1 from the default sshd_config + generated on new installations. + * Remove some advice related to protocol 1 from README.Debian. + * Start handling /etc/ssh/sshd_config using ucf. The immediate motivation + for this is to deal with deprecations of options related to protocol 1, + but something like this has been needed for a long time (closes: + #419574, #848089): + - sshd_config is now a slightly-patched version of upstream's, and only + contains non-default settings (closes: #147201). + - I've included as many historical md5sums of default versions of + sshd_config as I could reconstruct from version control, but I'm sure + I've missed some. + - Explicitly synchronise the debconf database with the current + configuration file state in openssh-server.config, to ensure that the + PermitRootLogin setting is properly preserved. + - UsePrivilegeSeparation now defaults to the stronger "sandbox" rather + than "yes", per upstream. + * Remove redundant "GSSAPIDelegateCredentials no" from ssh_config (already + the upstream default), and document that setting ServerAliveInterval to + 300 by default if BatchMode is set is Debian-specific (closes: #765630). + * Build gnome-ssh-askpass with GTK+ 3 (LP: #801187). + * When running regression tests under autopkgtest, use a non-root user + with passwordless sudo. + + -- Colin Watson <cjwatson@debian.org> Tue, 27 Dec 2016 18:01:46 +0000 + +openssh (1:7.3p1-5) unstable; urgency=medium + + * debian/tests/control: Add dependency on openssl, required by the PuTTY + interoperability tests. + + -- Colin Watson <cjwatson@debian.org> Sat, 03 Dec 2016 03:43:21 +0000 + +openssh (1:7.3p1-4) unstable; urgency=medium + + * Adjust Build-Depends further to avoid considering libssl-dev >= 1.1.0~ + as sufficient. + * Move build directories under debian/. + * Remove the non-upstream .gitignore file and add the relevant entries to + debian/.gitignore, in order to make the source tree more + dgit-compatible. + * Build all upstream regression test binaries using the new + "regress-binaries" target. + * Fix and enable PuTTY interoperability tests under autopkgtest. + + -- Colin Watson <cjwatson@debian.org> Fri, 02 Dec 2016 20:49:30 +0000 + +openssh (1:7.3p1-3) unstable; urgency=medium + + * Avoid building with OpenSSL 1.1 for now (see #828475). + * Add a missing License line to debian/copyright. + * Policy version 3.9.8: no changes required. + + -- Colin Watson <cjwatson@debian.org> Sat, 05 Nov 2016 15:37:15 +0000 + +openssh (1:7.3p1-2) unstable; urgency=high + + * Rewrite debian/copyright using copyright-format 1.0. + * CVE-2016-8858: Unregister the KEXINIT handler after message has been + received (closes: #841884). + + -- Colin Watson <cjwatson@debian.org> Mon, 24 Oct 2016 11:18:00 +0100 + +openssh (1:7.3p1-1) unstable; urgency=medium + + * New upstream release (http://www.openssh.com/txt/release-7.3): + - SECURITY: sshd(8): Mitigate a potential denial-of-service attack + against the system's crypt(3) function via sshd(8). An attacker could + send very long passwords that would cause excessive CPU use in + crypt(3). sshd(8) now refuses to accept password authentication + requests of length greater than 1024 characters. + - SECURITY: ssh(1), sshd(8): Fix observable timing weakness in the CBC + padding oracle countermeasures. Note that CBC ciphers are disabled by + default and only included for legacy compatibility. + - SECURITY: ssh(1), sshd(8): Improve operation ordering of MAC + verification for Encrypt-then-MAC (EtM) mode transport MAC algorithms + to verify the MAC before decrypting any ciphertext. This removes the + possibility of timing differences leaking facts about the plaintext, + though no such leakage has been observed. + - ssh(1): Add a ProxyJump option and corresponding -J command-line flag + to allow simplified indirection through a one or more SSH bastions or + "jump hosts". + - ssh(1): Add an IdentityAgent option to allow specifying specific agent + sockets instead of accepting one from the environment. + - ssh(1): Allow ExitOnForwardFailure and ClearAllForwardings to be + optionally overridden when using ssh -W. + - ssh(1), sshd(8): Implement support for the IUTF8 terminal mode as per + draft-sgtatham-secsh-iutf8-00 (closes: #337041, LP: #394570). + - ssh(1), sshd(8): Add support for additional fixed Diffie-Hellman 2K, + 4K and 8K groups from draft-ietf-curdle-ssh-kex-sha2-03. + - ssh-keygen(1), ssh(1), sshd(8): Support SHA256 and SHA512 RSA + signatures in certificates. + - ssh(1): Add an Include directive for ssh_config(5) files (closes: + #536031). + - ssh(1): Permit UTF-8 characters in pre-authentication banners sent + from the server. + - ssh(1), sshd(8): Reduce the syslog level of some relatively common + protocol events from LOG_CRIT. + - sshd(8): Refuse AuthenticationMethods="" in configurations and accept + AuthenticationMethods=any for the default behaviour of not requiring + multiple authentication. + - sshd(8): Remove obsolete and misleading "POSSIBLE BREAK-IN ATTEMPT!" + message when forward and reverse DNS don't match. + - ssh(1): Deduplicate LocalForward and RemoteForward entries to fix + failures when both ExitOnForwardFailure and hostname canonicalisation + are enabled. + - sshd(8): Remove fallback from moduli to obsolete "primes" file that + was deprecated in 2001 (LP: #1528251). + - sshd_config(5): Correct description of UseDNS: it affects ssh hostname + processing for authorized_keys, not known_hosts. + - sshd(8): Send ClientAliveInterval pings when a time-based RekeyLimit + is set; previously keepalive packets were not being sent. + - sshd(8): Whitelist more architectures to enable the seccomp-bpf + sandbox. + - scp(1): Respect the local user's LC_CTYPE locale (closes: #396295). + - Take character display widths into account for the progressmeter + (closes: #407088). + + -- Colin Watson <cjwatson@debian.org> Sun, 07 Aug 2016 22:45:26 +0100 + +openssh (1:7.2p2-8) unstable; urgency=medium + + [ Colin Watson ] + * Stop enabling ssh-session-cleanup.service by default; instead, ship it + as an example and add a section to README.Debian. libpam-systemd >= 230 + and "UsePAM yes" should take care of the original problem for most + systemd users (thanks, Michael Biebl; closes: #832155). + + [ Martin Pitt ] + * Add debian/agent-launch: Helper script for conditionally starting the SSH + agent in the user session. Use it in ssh-agent.user-session.upstart. + * Add systemd user unit for graphical sessions that use systemd. Override + the corresponding upstart job in that case (closes: #832445). + * debian/openssh-server.if-up: Don't block on a finished reload of + openssh.service, to avoid deadlocking with restarting networking. + (closes: #832557, LP: #1584393) + + -- Colin Watson <cjwatson@debian.org> Fri, 29 Jul 2016 02:51:32 +0100 + +openssh (1:7.2p2-7) unstable; urgency=medium + + * Don't stop the ssh-session-cleanup service on upgrade (closes: #832155). + This may cause SSH sessions to be killed on upgrade to *this* version if + you had previously installed 1:7.2p2-6. Sorry! If your session is + killed, you can recover using "dpkg --unpack" on this openssh-server + .deb, followed by "dpkg --configure -a". + * Recommend libpam-systemd from openssh-server. It's a much better + solution than the above for systemd users, but I'm wary of depending on + it in case I cause an assortment of exciting dependency problems on + upgrade for non-systemd users. + + -- Colin Watson <cjwatson@debian.org> Sat, 23 Jul 2016 11:46:33 +0100 + +openssh (1:7.2p2-6) unstable; urgency=medium + + * debian/watch: Switch to HTTP (thanks, Nicholas Luedtke; closes: + #822997). + * Copy summary of supported SFTP protocol versions from upstream's + PROTOCOL file into the openssh-sftp-server package description (closes: + #766887). + * Set SSH_PROGRAM=/usr/bin/ssh1 when building openssh-client-ssh1 so that + scp1 works (reported by Olivier MATZ). + * Retroactively add a NEWS.Debian entry for the UseDNS change in 6.9 (see + LP #1588457). + * CVE-2016-6210: Mitigate user enumeration via covert timing channel + (closes: #831902). + * Backport upstream patch to close ControlPersist background process + stderr when not in debug mode or when logging to a file or syslog + (closes: #714526). + * Add a session cleanup script and a systemd unit file to trigger it, + which serves to terminate SSH sessions cleanly if systemd doesn't do + that itself, often because libpam-systemd is not installed (thanks, + Vivek Das Mohapatra, Tom Hutter, and others; closes: #751636). + * Stop generating DSA host keys by default (thanks, Santiago Vila; closes: + #823827). + + -- Colin Watson <cjwatson@debian.org> Fri, 22 Jul 2016 17:06:19 +0100 + +openssh (1:7.2p2-5) unstable; urgency=medium + + * Backport upstream patch to unbreak authentication using lone certificate + keys in ssh-agent: when attempting pubkey auth with a certificate, if no + separate private key is found among the keys then try with the + certificate key itself (thanks, Paul Querna; LP: #1575961). + + -- Colin Watson <cjwatson@debian.org> Thu, 28 Apr 2016 01:52:01 +0100 + +openssh (1:7.2p2-4) unstable; urgency=medium + + * Drop dependency on libnss-files-udeb (closes: #819686). + * Policy version 3.9.7: no changes required. + + -- Colin Watson <cjwatson@debian.org> Fri, 15 Apr 2016 16:40:07 +0100 + +openssh (1:7.2p2-3) unstable; urgency=high + + * Change all openssh.org references to openssh.com (closes: #819213). + * CVE-2015-8325: Ignore PAM environment vars when UseLogin=yes. + + -- Colin Watson <cjwatson@debian.org> Wed, 13 Apr 2016 16:42:28 +0100 + +openssh (1:7.2p2-2) unstable; urgency=medium + + * Fix kexgss_server to cope with DH_GRP_MIN/DH_GRP_MAX being stricter on + the server end than the client (thanks, Damien Miller; closes: #817870, + LP: #1558576). + + -- Colin Watson <cjwatson@debian.org> Mon, 21 Mar 2016 12:08:55 +0000 + +openssh (1:7.2p2-1) unstable; urgency=high + + * New upstream release (http://www.openssh.com/txt/release-7.2p2): + - CVE-2016-3115: sshd(8): Sanitise X11 authentication credentials to + avoid xauth command injection when X11Forwarding is enabled + (http://www.openssh.com/txt/x11fwd.adv). + + -- Colin Watson <cjwatson@debian.org> Thu, 10 Mar 2016 13:04:29 +0000 + +openssh (1:7.2p1-1) unstable; urgency=medium + + * New upstream release (http://www.openssh.com/txt/release-7.2): + - This release disables a number of legacy cryptographic algorithms by + default in ssh: + + Several ciphers blowfish-cbc, cast128-cbc, all arcfour variants and + the rijndael-cbc aliases for AES. + + MD5-based and truncated HMAC algorithms. + These algorithms are already disabled by default in sshd. + - ssh(1), sshd(8): Remove unfinished and unused roaming code (was + already forcibly disabled in OpenSSH 7.1p2). + - ssh(1): Eliminate fallback from untrusted X11 forwarding to trusted + forwarding when the X server disables the SECURITY extension. + - ssh(1), sshd(8): Increase the minimum modulus size supported for + diffie-hellman-group-exchange to 2048 bits. + - sshd(8): Pre-auth sandboxing is now enabled by default (previous + releases enabled it for new installations via sshd_config). + - all: Add support for RSA signatures using SHA-256/512 hash algorithms + based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt. + - ssh(1): Add an AddKeysToAgent client option which can be set to 'yes', + 'no', 'ask', or 'confirm', and defaults to 'no'. When enabled, a + private key that is used during authentication will be added to + ssh-agent if it is running (with confirmation enabled if set to + 'confirm'). + - sshd(8): Add a new authorized_keys option "restrict" that includes all + current and future key restrictions (no-*-forwarding, etc.). Also add + permissive versions of the existing restrictions, e.g. "no-pty" -> + "pty". This simplifies the task of setting up restricted keys and + ensures they are maximally-restricted, regardless of any permissions + we might implement in the future. + - ssh(1): Add ssh_config CertificateFile option to explicitly list + certificates. + - ssh-keygen(1): Allow ssh-keygen to change the key comment for all + supported formats (closes: #811125). + - ssh-keygen(1): Allow fingerprinting from standard input, e.g. + "ssh-keygen -lf -" (closes: #509058). + - ssh-keygen(1): Allow fingerprinting multiple public keys in a file, + e.g. "ssh-keygen -lf ~/.ssh/authorized_keys". + - sshd(8): Support "none" as an argument for sshd_config Foreground and + ChrootDirectory. Useful inside Match blocks to override a global + default. + - ssh-keygen(1): Support multiple certificates (one per line) and + reading from standard input (using "-f -") for "ssh-keygen -L" + - ssh-keyscan(1): Add "ssh-keyscan -c ..." flag to allow fetching + certificates instead of plain keys. + - ssh(1): Better handle anchored FQDNs (e.g. 'cvs.openbsd.org.') in + hostname canonicalisation - treat them as already canonical and remove + the trailing '.' before matching ssh_config. + - sftp(1): Existing destination directories should not terminate + recursive uploads (regression in OpenSSH 6.8; LP: #1553378). + * Use HTTPS for Vcs-* URLs, and link to cgit rather than gitweb. + * Restore slogin symlinks for compatibility, although they were removed + upstream. + + -- Colin Watson <cjwatson@debian.org> Tue, 08 Mar 2016 11:47:20 +0000 + +openssh (1:7.1p2-2) unstable; urgency=medium + + * Remove protocol 1 host key generation from openssh-server.postinst + (closes: #811265). + + -- Colin Watson <cjwatson@debian.org> Sun, 17 Jan 2016 14:10:19 +0000 + +openssh (1:7.1p2-1) unstable; urgency=high + + * New upstream release (http://www.openssh.com/txt/release-7.1p2): + - CVE-2016-0777, CVE-2016-0778: Disable experimental client-side support + for roaming, which could be tricked by a malicious server into leaking + client memory to the server, including private client user keys; this + information leak is restricted to connections to malicious or + compromised servers (closes: #810984). + - SECURITY: Fix an out of-bound read access in the packet handling code. + Reported by Ben Hawkes. + - Further use of explicit_bzero has been added in various buffer + handling code paths to guard against compilers aggressively doing + dead-store removal. + + -- Colin Watson <cjwatson@debian.org> Thu, 14 Jan 2016 15:28:03 +0000 + +openssh (1:7.1p1-6) unstable; urgency=medium + + [ Colin Watson ] + * Remove explicit "XS-Testsuite: autopkgtest" from debian/control; + dpkg-source now figures that out automatically based on the existence of + debian/tests/control. + * Allow authenticating as root using gssapi-keyex even with + "PermitRootLogin prohibit-password" (closes: #809695). + * Shuffle PROPOSAL_KEX_ALGS mangling for GSSAPI key exchange a little + later in ssh_kex2 so that it's actually effective (closes: #809696). + + [ Michael Biebl ] + * Don't call sd_notify when sshd is re-execed (closes: #809035). + + -- Colin Watson <cjwatson@debian.org> Mon, 04 Jan 2016 15:09:10 +0000 + +openssh (1:7.1p1-5) unstable; urgency=medium + + [ Michael Biebl ] + * Add systemd readiness notification support (closes: #778913). + + -- Colin Watson <cjwatson@debian.org> Mon, 21 Dec 2015 22:10:07 +0000 + +openssh (1:7.1p1-4) unstable; urgency=medium + + * Backport upstream patch to unbreak connections with peers that set + first_kex_follows (LP: #1526357). + + -- Colin Watson <cjwatson@debian.org> Tue, 15 Dec 2015 15:40:18 +0000 + +openssh (1:7.1p1-3) unstable; urgency=medium + + * Drop priority of openssh-client-ssh1 to extra (closes: #807518). + * Redirect regression test input from /dev/zero, since otherwise conch + will immediately send EOF. + + -- Colin Watson <cjwatson@debian.org> Thu, 10 Dec 2015 15:12:10 +0000 + +openssh (1:7.1p1-2) unstable; urgency=medium + + * Really enable conch interoperability tests under autopkgtest. + * Drop SSH1 keepalive patch. Now that SSH1 is disabled at compile-time, + it's been rejected upstream and there isn't much point carrying it any + more. + * Add NEWS.Debian documenting cryptographic changes in OpenSSH 7.0 + (closes: #806962). + * Add an openssh-client-ssh1 binary package for people who need to connect + to outdated SSH1-only servers (closes: #807107). + * Update "Subsystem sftp" path in example sshd_config (closes: #691004, + LP: #1437005). + + -- Colin Watson <cjwatson@debian.org> Tue, 08 Dec 2015 15:33:08 +0000 + +openssh (1:7.1p1-1) unstable; urgency=medium + + * New upstream release (http://www.openssh.com/txt/release-7.0, closes: + #785190): + - Support for the legacy SSH version 1 protocol is disabled by default + at compile time. + - Support for the 1024-bit diffie-hellman-group1-sha1 key exchange is + disabled by default at run-time. It may be re-enabled using the + instructions at http://www.openssh.com/legacy.html + - Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled by + default at run-time. These may be re-enabled using the instructions + at http://www.openssh.com/legacy.html + - Support for the legacy v00 cert format has been removed. + - The default for the sshd_config(5) PermitRootLogin option has changed + from "yes" to "prohibit-password". + - PermitRootLogin=without-password/prohibit-password now bans all + interactive authentication methods, allowing only public-key, + hostbased and GSSAPI authentication (previously it permitted + keyboard-interactive and password-less authentication if those were + enabled). + - ssh_config(5): Add PubkeyAcceptedKeyTypes option to control which + public key types are available for user authentication. + - sshd_config(5): Add HostKeyAlgorithms option to control which public + key types are offered for host authentications. + - ssh(1), sshd(8): Extend Ciphers, MACs, KexAlgorithms, + HostKeyAlgorithms, PubkeyAcceptedKeyTypes and HostbasedKeyTypes + options to allow appending to the default set of algorithms instead of + replacing it. Options may now be prefixed with a '+' to append to the + default, e.g. "HostKeyAlgorithms=+ssh-dss". + - sshd_config(5): PermitRootLogin now accepts an argument of + 'prohibit-password' as a less-ambiguous synonym of 'without- + password'. + - ssh(1), sshd(8): Add compatability workarounds for Cisco and more + PuTTY versions. + - Fix some omissions and errors in the PROTOCOL and PROTOCOL.mux + documentation relating to Unix domain socket forwarding. + - ssh(1): Improve the ssh(1) manual page to include a better description + of Unix domain socket forwarding (closes: #779068). + - ssh(1), ssh-agent(1): Skip uninitialised PKCS#11 slots, fixing + failures to load keys when they are present. + - ssh(1), ssh-agent(1): Do not ignore PKCS#11 hosted keys that wth empty + CKA_ID. + - sshd(8): Clarify documentation for UseDNS option. + - Check realpath(3) behaviour matches what sftp-server requires and use + a replacement if necessary. + * New upstream release (http://www.openssh.com/txt/release-7.1): + - sshd(8): OpenSSH 7.0 contained a logic error in PermitRootLogin= + prohibit-password/without-password that could, depending on + compile-time configuration, permit password authentication to root + while preventing other forms of authentication. This problem was + reported by Mantas Mikulenas. + - ssh(1), sshd(8): Add compatibility workarounds for FuTTY. + - ssh(1), sshd(8): Refine compatibility workarounds for WinSCP. + - Fix a number of memory faults (double-free, free of uninitialised + memory, etc) in ssh(1) and ssh-keygen(1). Reported by Mateusz + Kocielski. + * Change "PermitRootLogin without-password" to the new preferred spelling + of "PermitRootLogin prohibit-password" in sshd_config, and update + documentation to reflect the new upstream default. + * Enable conch interoperability tests under autopkgtest. + + -- Colin Watson <cjwatson@debian.org> Wed, 02 Dec 2015 20:18:35 +0000 + +openssh (1:6.9p1-3) unstable; urgency=medium + + * ssh_config(5): Fix markup errors in description of GSSAPITrustDns + (closes: #799271). + * Fix dh_install and dh_fixperms overrides to work properly with an + architecture-independent-only build (closes: #806090). + * Do much less work in architecture-independent-only builds. + * Drop ConsoleKit session registration patch; it was only ever enabled for + Ubuntu, which no longer needs it (LP: #1334916, #1502045). + + -- Colin Watson <cjwatson@debian.org> Tue, 24 Nov 2015 22:48:53 +0000 + +openssh (1:6.9p1-2) unstable; urgency=medium + + [ Colin Watson ] + * mention-ssh-keygen-on-keychange.patch: Move example ssh-keygen + invocation onto a separate line to make it easier to copy and paste + (LP: #1491532). + + [ Tyler Hicks ] + * Build with audit support on Linux (closes: #797727, LP: #1478087). + + -- Colin Watson <cjwatson@debian.org> Thu, 10 Sep 2015 12:26:11 +0100 + +openssh (1:6.9p1-1) unstable; urgency=medium + + * New upstream release (http://www.openssh.com/txt/release-6.8): + - sshd(8): UseDNS now defaults to 'no'. Configurations that match + against the client host name (via sshd_config or authorized_keys) may + need to re-enable it or convert to matching against addresses. + - Add FingerprintHash option to ssh(1) and sshd(8), and equivalent + command-line flags to the other tools to control algorithm used for + key fingerprints. The default changes from MD5 to SHA256 and format + from hex to base64. + Fingerprints now have the hash algorithm prepended. An example of the + new format: SHA256:mVPwvezndPv/ARoIadVY98vAC0g+P/5633yTC4d/wXE + Please note that visual host keys will also be different. + - ssh(1), sshd(8): Experimental host key rotation support. Add a + protocol extension for a server to inform a client of all its + available host keys after authentication has completed. The client + may record the keys in known_hosts, allowing it to upgrade to better + host key algorithms and a server to gracefully rotate its keys. + The client side of this is controlled by a UpdateHostkeys config + option (default off). + - ssh(1): Add a ssh_config HostbasedKeyType option to control which host + public key types are tried during host-based authentication. + - ssh(1), sshd(8): Fix connection-killing host key mismatch errors when + sshd offers multiple ECDSA keys of different lengths. + - ssh(1): When host name canonicalisation is enabled, try to parse host + names as addresses before looking them up for canonicalisation. Fixes + bz#2074 and avoids needless DNS lookups in some cases. + - ssh(1), ssh-keysign(8): Make ed25519 keys work for host based + authentication. + - sshd(8): SSH protocol v.1 workaround for the Meyer, et al, + Bleichenbacher Side Channel Attack. Fake up a bignum key before RSA + decryption. + - sshd(8): Remember which public keys have been used for authentication + and refuse to accept previously-used keys. This allows + AuthenticationMethods=publickey,publickey to require that users + authenticate using two _different_ public keys. + - sshd(8): add sshd_config HostbasedAcceptedKeyTypes and + PubkeyAcceptedKeyTypes options to allow sshd to control what public + key types will be accepted (closes: #481133). Currently defaults to + all. + - sshd(8): Don't count partial authentication success as a failure + against MaxAuthTries. + - ssh(1): Add RevokedHostKeys option for the client to allow text-file + or KRL-based revocation of host keys. + - ssh-keygen(1), sshd(8): Permit KRLs that revoke certificates by serial + number or key ID without scoping to a particular CA. + - ssh(1): Add a "Match canonical" criteria that allows ssh_config Match + blocks to trigger only in the second config pass. + - ssh(1): Add a -G option to ssh that causes it to parse its + configuration and dump the result to stdout, similar to "sshd -T". + - ssh(1): Allow Match criteria to be negated. E.g. "Match !host". + - ssh-keyscan(1): ssh-keyscan has been made much more robust against + servers that hang or violate the SSH protocol (closes: #241119). + - ssh(1), ssh-keygen(1): Fix regression bz#2306: Key path names were + being lost as comment fields (closes: #787776). + - ssh(1): Allow ssh_config Port options set in the second config parse + phase to be applied (they were being ignored; closes: #774369). + - ssh(1): Tweak config re-parsing with host canonicalisation - make the + second pass through the config files always run when host name + canonicalisation is enabled (and not whenever the host name changes) + - ssh(1): Fix passing of wildcard forward bind addresses when connection + multiplexing is in use. + - ssh-keygen(1): Fix broken private key conversion from non-OpenSSH + formats. + - ssh-keygen(1): Fix KRL generation bug when multiple CAs are in use. + * New upstream release (http://www.openssh.com/txt/release-6.9): + - CVE-2015-5352: ssh(1): When forwarding X11 connections with + ForwardX11Trusted=no, connections made after ForwardX11Timeout expired + could be permitted and no longer subject to XSECURITY restrictions + because of an ineffective timeout check in ssh(1) coupled with "fail + open" behaviour in the X11 server when clients attempted connections + with expired credentials (closes: #790798). This problem was reported + by Jann Horn. + - SECURITY: ssh-agent(1): Fix weakness of agent locking (ssh-add -x) to + password guessing by implementing an increasing failure delay, storing + a salted hash of the password rather than the password itself and + using a timing-safe comparison function for verifying unlock attempts. + This problem was reported by Ryan Castellucci. + - sshd(8): Support admin-specified arguments to AuthorizedKeysCommand + (closes: #740494). + - sshd(8): Add AuthorizedPrincipalsCommand that allows retrieving + authorized principals information from a subprocess rather than a + file. + - ssh(1), ssh-add(1): Support PKCS#11 devices with external PIN entry + devices. + - ssh-keygen(1): Support "ssh-keygen -lF hostname" to search known_hosts + and print key hashes rather than full keys. + - ssh-agent(1): Add -D flag to leave ssh-agent in foreground without + enabling debug mode. + - ssh(1), sshd(8): Deprecate legacy SSH2_MSG_KEX_DH_GEX_REQUEST_OLD + message and do not try to use it against some 3rd-party SSH + implementations that use it (older PuTTY, WinSCP). + - ssh(1), sshd(8): Cap DH-GEX group size at 4Kbits for Cisco + implementations as some would fail when attempting to use group sizes + >4K (closes: #740307, LP: #1287222). + - ssh(1): Fix out-of-bound read in EscapeChar configuration option + parsing. + - sshd(8): Fix application of PermitTunnel, LoginGraceTime, + AuthenticationMethods and StreamLocalBindMask options in Match blocks. + - ssh(1), sshd(8): Improve disconnection message on TCP reset. + - ssh(1): Remove failed remote forwards established by multiplexing from + the list of active forwards. + - sshd(8): Make parsing of authorized_keys "environment=" options + independent of PermitUserEnv being enabled. + - sshd(8): Fix post-auth crash with permitopen=none (closes: #778807). + - ssh(1), ssh-add(1), ssh-keygen(1): Allow new-format private keys to be + encrypted with AEAD ciphers. + - ssh(1): Allow ListenAddress, Port and AddressFamily configuration + options to appear in any order. + - sshd(8): Check for and reject missing arguments for VersionAddendum + and ForceCommand. + - ssh(1), sshd(8): Don't treat unknown certificate extensions as fatal. + - ssh-keygen(1): Make stdout and stderr output consistent. + - ssh(1): Mention missing DISPLAY environment in debug log when X11 + forwarding requested. + - sshd(8): Correctly record login when UseLogin is set. + - sshd(8): Add some missing options to sshd -T output and fix output of + VersionAddendum and HostCertificate. + - Document and improve consistency of options that accept a "none" + argument: TrustedUserCAKeys, RevokedKeys, AuthorizedPrincipalsFile. + - ssh(1): Include remote username in debug output. + - sshd(8): Avoid compatibility problem with some versions of Tera Term, + which would crash when they received the hostkeys notification message + (hostkeys-00@openssh.com). + - sshd(8): Mention ssh-keygen -E as useful when comparing legacy MD5 + host key fingerprints. + - ssh(1): Clarify pseudo-terminal request behaviour and make manual + language consistent. + - ssh(1): Document that the TERM environment variable is not subject to + SendEnv and AcceptEnv; bz#2386 + - sshd(8): Format UsePAM setting when using sshd -T (closes: #767648). + - moduli(5): Update DH-GEX moduli (closes: #787037). + * There are some things I want to fix before upgrading to 7.0p1, though I + intend to do that soon. In the meantime, backport some patches, mainly + to fix security issues: + - SECURITY: sshd(8): OpenSSH 6.8 and 6.9 incorrectly set TTYs to be + world-writable. Local attackers may be able to write arbitrary + messages to logged-in users, including terminal escape sequences. + Reported by Nikolay Edigaryev. + - SECURITY: sshd(8): Fixed a privilege separation weakness related to + PAM support. Attackers who could successfully compromise the + pre-authentication process for remote code execution and who had valid + credentials on the host could impersonate other users. Reported by + Moritz Jodeit. + - SECURITY: sshd(8): Fixed a use-after-free bug related to PAM support + that was reachable by attackers who could compromise the + pre-authentication process for remote code execution (closes: + #795711). Also reported by Moritz Jodeit. + - CVE-2015-5600: sshd(8): Fix circumvention of MaxAuthTries using + keyboard-interactive authentication (closes: #793616). By specifying + a long, repeating keyboard-interactive "devices" string, an attacker + could request the same authentication method be tried thousands of + times in a single pass. The LoginGraceTime timeout in sshd(8) and any + authentication failure delays implemented by the authentication + mechanism itself were still applied. Found by Kingcope. + - Let principals-command.sh work for noexec /var/run. + * Thanks to Jakub Jelen of Red Hat for Fedora's rebased version of the + GSSAPI key exchange patch. + * Document the Debian-specific change to the default value of + ForwardX11Trusted in ssh(1) (closes: #781469). + + -- Colin Watson <cjwatson@debian.org> Thu, 20 Aug 2015 10:38:58 +0100 + +openssh (1:6.7p1-6) unstable; urgency=medium + + [ Martin Pitt ] + * openssh-server.postinst: Quiesce "Unable to connect to Upstart" error + message from initctl if upstart is installed, but not the current init + system. (LP: #1440070) + * openssh-server.postinst: Fix version comparisons of upgrade adjustments + to not apply to fresh installs. + + -- Colin Watson <cjwatson@debian.org> Sun, 19 Apr 2015 14:32:43 +0100 + +openssh (1:6.7p1-5) unstable; urgency=medium + + * Revert change from previous upload, which causes far more trouble than + it is worth (closes: #780797): + - Send/accept only specific known LC_* variables, rather than using a + wildcard. + * Add a NEWS.Debian entry documenting this reversion, as it is too + difficult to undo the sshd_config change automatically without + compounding the problem of (arguably) overwriting user configuration. + + -- Colin Watson <cjwatson@debian.org> Sun, 22 Mar 2015 23:20:56 +0000 + +openssh (1:6.7p1-4) unstable; urgency=medium + + * Send/accept only specific known LC_* variables, rather than using a + wildcard (closes: #765633). + * Document interactions between ListenAddress/Port and ssh.socket in + README.Debian (closes: #764842). + * Debconf translations: + - Brazilian Portuguese (thanks, José de Figueiredo; closes: #771859). + + -- Colin Watson <cjwatson@debian.org> Wed, 18 Mar 2015 15:34:13 +0000 + +openssh (1:6.7p1-3) unstable; urgency=medium + + * Debconf translations: + - Dutch (thanks, Frans Spiesschaert; closes: #765851). + * Assume that dpkg-statoverride exists and drop the test for an obsolete + compatibility path. + + -- Colin Watson <cjwatson@debian.org> Mon, 03 Nov 2014 20:29:52 +0000 + +openssh (1:6.7p1-2) unstable; urgency=medium + + * debian/tests/control: Drop isolation-container, since the tests run on a + high port. They're still not guaranteed to run correctly in an schroot, + but may manage to work, so this lets the tests at least try to run on + ci.debian.net. + + -- Colin Watson <cjwatson@debian.org> Fri, 10 Oct 2014 10:47:19 +0100 + +openssh (1:6.7p1-1) unstable; urgency=medium + + * New upstream release (http://www.openssh.com/txt/release-6.7): + - sshd(8): The default set of ciphers and MACs has been altered to + remove unsafe algorithms. In particular, CBC ciphers and arcfour* are + disabled by default. The full set of algorithms remains available if + configured explicitly via the Ciphers and MACs sshd_config options. + - ssh(1), sshd(8): Add support for Unix domain socket forwarding. A + remote TCP port may be forwarded to a local Unix domain socket and + vice versa or both ends may be a Unix domain socket (closes: #236718). + - ssh(1), ssh-keygen(1): Add support for SSHFP DNS records for ED25519 + key types. + - sftp(1): Allow resumption of interrupted uploads. + - ssh(1): When rekeying, skip file/DNS lookups of the hostkey if it is + the same as the one sent during initial key exchange. + - sshd(8): Allow explicit ::1 and 127.0.0.1 forwarding bind addresses + when GatewayPorts=no; allows client to choose address family. + - sshd(8): Add a sshd_config PermitUserRC option to control whether + ~/.ssh/rc is executed, mirroring the no-user-rc authorized_keys + option. + - ssh(1): Add a %C escape sequence for LocalCommand and ControlPath that + expands to a unique identifier based on a hash of the tuple of (local + host, remote user, hostname, port). Helps avoid exceeding miserly + pathname limits for Unix domain sockets in multiplexing control paths. + - sshd(8): Make the "Too many authentication failures" message include + the user, source address, port and protocol in a format similar to the + authentication success / failure messages. + - Use CLOCK_BOOTTIME in preference to CLOCK_MONOTONIC when it is + available. It considers time spent suspended, thereby ensuring + timeouts (e.g. for expiring agent keys) fire correctly (closes: + #734553). + - Use prctl() to prevent sftp-server from accessing + /proc/self/{mem,maps}. + * Restore TCP wrappers support, removed upstream in 6.7. It is true that + dropping this reduces preauth attack surface in sshd. On the other + hand, this support seems to be quite widely used, and abruptly dropping + it (from the perspective of users who don't read openssh-unix-dev) could + easily cause more serious problems in practice. It's not entirely clear + what the right long-term answer for Debian is, but it at least probably + doesn't involve dropping this feature shortly before a freeze. + * Replace patch to disable OpenSSL version check with an updated version + of Kurt Roeckx's patch from #732940 to just avoid checking the status + field. + * Build-depend on a new enough dpkg-dev for dpkg-buildflags, rather than + simply a new enough dpkg. + * Simplify debian/rules using /usr/share/dpkg/buildflags.mk. + * Use Package-Type rather than XC-Package-Type, now that it is an official + field. + * Run a subset of the upstream regression test suite at package build + time, and the rest of it under autopkgtest. + + -- Colin Watson <cjwatson@debian.org> Thu, 09 Oct 2014 14:05:56 +0100 + +openssh (1:6.6p1-8) unstable; urgency=medium + + * Make the if-up hook use "reload" rather than "restart" if the system was + booted using systemd (closes: #756547). + * Show fingerprints of new keys after creating them in the postinst + (closes: #762128). + * Policy version 3.9.6: no changes required. + * Don't link /usr/share/doc/ssh to openssh-client, as this is not safe + between Architecture: all and Architecture: any binary packages (closes: + #763375). + + -- Colin Watson <cjwatson@debian.org> Fri, 03 Oct 2014 12:23:57 +0100 + +openssh (1:6.6p1-7) unstable; urgency=medium + + * Make sure that DEB_HOST_ARCH is set, even when invoking debian/rules + directly. + * Use dh-exec to simplify override_dh_install target. + * Remove several unnecessary entries in debian/*.dirs. + * Pass noupdate to the second call to pam_motd, not the first (thanks, Ken + T Takusagawa; closes: #757059). + * Debconf translations: + - Turkish (thanks, Mert Dirik; closes: #756757). + + -- Colin Watson <cjwatson@debian.org> Tue, 05 Aug 2014 09:10:04 +0100 + +openssh (1:6.6p1-6) unstable; urgency=medium + + * Upgrade to debhelper v9. + * Only use pam_keyinit on Linux architectures (closes: #747245). + * Make get_config_option more robust against trailing whitespace (thanks, + LaMont Jones). + * Debconf translations: + - Czech (thanks, Michal Šimůnek; closes: #751419). + + -- Colin Watson <cjwatson@debian.org> Sat, 28 Jun 2014 14:50:04 +0100 + +openssh (1:6.6p1-5) unstable; urgency=medium + + * Force ssh-agent Upstart job to use sh syntax regardless of the user's + shell (thanks, Steffen Stempel; LP: #1312928). + + -- Colin Watson <cjwatson@debian.org> Thu, 01 May 2014 16:27:53 +0100 + +openssh (1:6.6p1-4) unstable; urgency=medium + + * Debconf translations: + - Spanish (thanks, Matías Bellone; closes: #744867). + * Apply upstream-recommended patch to fix bignum encoding for + curve25519-sha256@libssh.org, fixing occasional key exchange failures. + + -- Colin Watson <cjwatson@debian.org> Mon, 21 Apr 2014 21:29:53 +0100 + +openssh (1:6.6p1-3) unstable; urgency=medium + + * Debconf translations: + - French (thanks, Étienne Gilli; closes: #743242). + * Never signal the service supervisor with SIGSTOP more than once, to + prevent a hang on re-exec (thanks, Robie Basak; LP: #1306877). + + -- Colin Watson <cjwatson@debian.org> Mon, 14 Apr 2014 12:11:50 +0100 + +openssh (1:6.6p1-2) unstable; urgency=medium + + * If no root password is set, then switch to "PermitRootLogin + without-password" without asking (LP: #1300127). + + -- Colin Watson <cjwatson@debian.org> Mon, 31 Mar 2014 12:20:46 +0100 + +openssh (1:6.6p1-1) unstable; urgency=medium + + [ Colin Watson ] + * Apply various warning-suppression and regression-test fixes to + gssapi.patch from Damien Miller. + * New upstream release (http://www.openssh.com/txt/release-6.6, + LP: #1298280): + - CVE-2014-2532: sshd(8): when using environment passing with an + sshd_config(5) AcceptEnv pattern with a wildcard, OpenSSH prior to 6.6 + could be tricked into accepting any environment variable that contains + the characters before the wildcard character. + * Re-enable btmp logging, as its permissions were fixed a long time ago in + response to #370050 (closes: #341883). + * Change to "PermitRootLogin without-password" for new installations, and + ask a debconf question when upgrading systems with "PermitRootLogin yes" + from previous versions (closes: #298138). + * Debconf translations: + - Danish (thanks, Joe Hansen). + - Portuguese (thanks, Américo Monteiro). + - Russian (thanks, Yuri Kozlov; closes: #742308). + - Swedish (thanks, Andreas Rönnquist). + - Japanese (thanks, victory). + - German (thanks, Stephan Beck; closes: #742541). + - Italian (thanks, Beatrice Torracca). + * Don't start ssh-agent from the Upstart user session job if something + like Xsession has already done so (based on work by Bruno Vasselle; + LP: #1244736). + + [ Matthew Vernon ] + * CVE-2014-2653: Fix failure to check SSHFP records if server presents a + certificate (bug reported by me, patch by upstream's Damien Miller; + thanks also to Mark Wooding for his help in fixing this) (Closes: + #742513) + + -- Colin Watson <cjwatson@debian.org> Fri, 28 Mar 2014 18:04:41 +0000 + +openssh (1:6.5p1-6) unstable; urgency=medium + + * Fix Breaks/Replaces versions of openssh-sftp-server on openssh-server + (thanks, Axel Beckert). + + -- Colin Watson <cjwatson@debian.org> Thu, 06 Mar 2014 16:18:44 +0000 + +openssh (1:6.5p1-5) unstable; urgency=medium + + [ Colin Watson ] + * Add Alias=sshd.service to systemd ssh.service file, to match "Provides: + sshd" in the sysvinit script (thanks, Michael Biebl). + * Add Before=ssh.service to systemd ssh.socket file, since otherwise + nothing guarantees that ssh.service has stopped before ssh.socket starts + (thanks, Uoti Urpala). + + [ Axel Beckert ] + * Split sftp-server into its own package to allow it to also be used by + other SSH server implementations like dropbear (closes: #504290). + + -- Colin Watson <cjwatson@debian.org> Wed, 05 Mar 2014 13:53:08 +0000 + +openssh (1:6.5p1-4) unstable; urgency=medium + + * Configure --without-hardening on hppa, to work around + http://gcc.gnu.org/bugzilla/show_bug.cgi?id=60155 (closes: #738798). + * Amend "Running sshd from inittab" instructions in README.Debian to + recommend 'update-rc.d ssh disable', rather than manual removal of rc*.d + symlinks that won't work with dependency-based sysv-rc. + * Remove code related to non-dependency-based sysv-rc ordering, since that + is no longer supported. + * Apply patch from https://bugzilla.mindrot.org/show_bug.cgi?id=2200 to + fix getsockname errors when using "ssh -W" (closes: #738693). + + -- Colin Watson <cjwatson@debian.org> Sat, 15 Feb 2014 02:19:36 +0000 + +openssh (1:6.5p1-3) unstable; urgency=medium + + * Clarify socket activation mode in README.Debian, as suggested by Uoti + Urpala. + * Stop claiming that "Protocol 2" is a Debian-specific default; this has + been upstream's default since 5.4p1. + * Avoid stdout noise from which(1) on purge of openssh-client. + * Fix sysvinit->systemd transition code to cope with still-running + sysvinit jobs being considered active by systemd (thanks, Uoti Urpala + and Michael Biebl). + * Bump guard version for sysvinit->systemd transition to 1:6.5p1-3; we may + have got it wrong before, and it's fairly harmless to repeat it. + * Remove tests for whether /dev/null is a character device from the + Upstart job and the systemd service files; it's there to avoid a + confusing failure mode in daemon(), but with modern init systems we use + the -D option to suppress daemonisation anyway. + * Refer to /usr/share/common-licenses/GPL-2 in debian/copyright (for the + Debian patch) rather than plain GPL. + * Drop some very old Conflicts and Replaces (ssh (<< 1:3.8.1p1-9), + rsh-client (<< 0.16.1-1), ssh-krb5 (<< 1:4.3p2-7), ssh-nonfree (<< 2), + and openssh-client (<< 1:3.8.1p1-11)). These all relate to pre-etch + versions, for which we no longer have maintainer script code, and per + policy they would have to become Breaks nowadays anyway. + * Policy version 3.9.5. + * Drop unnecessary -1 in zlib1g Build-Depends version. + * Tweak dh_systemd_enable invocations to avoid lots of error noise. + + -- Colin Watson <cjwatson@debian.org> Wed, 12 Feb 2014 13:10:08 +0000 + +openssh (1:6.5p1-2) unstable; urgency=medium + + * Only enable ssh.service for systemd, not both ssh.service and + ssh.socket. Thanks to Michael Biebl for spotting this. + * Backport upstream patch to unbreak case-sensitive matching of ssh_config + (closes: #738619). + + -- Colin Watson <cjwatson@debian.org> Tue, 11 Feb 2014 11:28:35 +0000 + +openssh (1:6.5p1-1) unstable; urgency=medium + + * New upstream release (http://www.openssh.com/txt/release-6.5, + LP: #1275068): + - ssh(1): Add support for client-side hostname canonicalisation using a + set of DNS suffixes and rules in ssh_config(5). This allows + unqualified names to be canonicalised to fully-qualified domain names + to eliminate ambiguity when looking up keys in known_hosts or checking + host certificate names (closes: #115286). + * Switch to git; adjust Vcs-* fields. + * Convert to git-dpm, and drop source package documentation associated + with the old bzr/quilt patch handling workflow. + * Drop ssh-vulnkey and the associated ssh/ssh-add/sshd integration code, + leaving only basic configuration file compatibility, since it has been + nearly six years since the original vulnerability and this code is not + likely to be of much value any more (closes: #481853, #570651). See + https://lists.debian.org/debian-devel/2013/09/msg00240.html for my full + reasoning. + * Add OpenPGP signature checking configuration to watch file (thanks, + Daniel Kahn Gillmor; closes: #732441). + * Add the pam_keyinit session module, to create a new session keyring on + login (closes: #734816). + * Incorporate default path changes from shadow 1:4.0.18.1-8, removing + /usr/bin/X11 (closes: #644521). + * Generate ED25519 host keys on fresh installations. Upgraders who wish + to add such host keys should manually add 'HostKey + /etc/ssh/ssh_host_ed25519_key' to /etc/ssh/sshd_config and run + 'ssh-keygen -q -f /etc/ssh/ssh_host_ed25519_key -N "" -t ed25519'. + * Drop long-obsolete "SSH now uses protocol 2 by default" section from + README.Debian. + * Add systemd support (thanks, Sven Joachim; closes: #676830). + + -- Colin Watson <cjwatson@debian.org> Mon, 10 Feb 2014 14:58:26 +0000 + +openssh (1:6.4p1-2) unstable; urgency=high + + * Increase ServerKeyBits value in package-generated sshd_config to 1024 + (closes: #727622, LP: #1244272). + * Restore patch to disable OpenSSL version check (closes: #732940). + + -- Colin Watson <cjwatson@debian.org> Mon, 23 Dec 2013 10:44:04 +0000 + +openssh (1:6.4p1-1) unstable; urgency=high + + * New upstream release. Important changes: + - 6.3/6.3p1 (http://www.openssh.com/txt/release-6.3): + + sftp(1): add support for resuming partial downloads using the + "reget" command and on the sftp commandline or on the "get" + commandline using the "-a" (append) option (closes: #158590). + + ssh(1): add an "IgnoreUnknown" configuration option to selectively + suppress errors arising from unknown configuration directives + (closes: #436052). + + sftp(1): update progressmeter when data is acknowledged, not when + it's sent (partially addresses #708372). + + ssh(1): do not fatally exit when attempting to cleanup multiplexing- + created channels that are incompletely opened (closes: #651357). + - 6.4/6.4p1 (http://www.openssh.com/txt/release-6.4): + + CVE-2013-4548: sshd(8): fix a memory corruption problem triggered + during rekeying when an AES-GCM cipher is selected (closes: + #729029). Full details of the vulnerability are available at: + http://www.openssh.com/txt/gcmrekey.adv + * When running under Upstart, only consider the daemon started once it is + ready to accept connections (by raising SIGSTOP at that point and using + "expect stop"). + + -- Colin Watson <cjwatson@debian.org> Sat, 09 Nov 2013 18:24:16 +0000 + +openssh (1:6.2p2-6) unstable; urgency=low + + * Update config.guess and config.sub automatically at build time. + dh_autoreconf does not take care of that by default because openssh does + not use automake. + + -- Colin Watson <cjwatson@debian.org> Tue, 02 Jul 2013 22:54:49 +0100 + +openssh (1:6.2p2-5) unstable; urgency=low + + [ Colin Watson ] + * Document consequences of ssh-agent being setgid in ssh-agent(1); see + #711623. + * Use 'set -e' rather than '#! /bin/sh -e' in maintainer scripts and + ssh-argv0. + + [ Yolanda Robla ] + * debian/rules: Include real distribution in SSH_EXTRAVERSION instead of + hardcoding Debian (LP: #1195342). + + -- Colin Watson <cjwatson@debian.org> Thu, 27 Jun 2013 15:24:14 +0100 + +openssh (1:6.2p2-4) unstable; urgency=low + + * Fix non-portable shell in ssh-copy-id (closes: #711162). + * Rebuild against debhelper 9.20130604 with fixed dependencies for + invoke-rc.d and Upstart jobs (closes: #711159, #711364). + * Set SELinux context on private host keys as well as public host keys + (closes: #687436). + + -- Colin Watson <cjwatson@debian.org> Thu, 06 Jun 2013 17:06:31 +0100 + +openssh (1:6.2p2-3) unstable; urgency=low + + * If the running init daemon is Upstart, then, on the first upgrade to + this version, check whether sysvinit is still managing sshd; if so, + manually stop it so that it can be restarted under upstart. We do this + near the end of the postinst, so it shouldn't result in any appreciable + extra window where sshd is not running during upgrade. + + -- Colin Watson <cjwatson@debian.org> Wed, 22 May 2013 17:42:10 +0100 + +openssh (1:6.2p2-2) unstable; urgency=low + + * Change start condition of Upstart job to be just the standard "runlevel + [2345]", rather than "filesystem or runlevel [2345]"; the latter makes + it unreasonably difficult to ensure that urandom starts before ssh, and + is not really necessary since one of static-network-up and failsafe-boot + is guaranteed to happen and will trigger entry to the default runlevel, + and we don't care about ssh starting before the network (LP: #1098299). + * Drop conffile handling for direct upgrades from pre-split ssh package; + this was originally added in 1:4.3p2-7 / 1:4.3p2-8, and contained a + truly ghastly hack around a misbehaviour in sarge's dpkg. Since this is + now four Debian releases ago, we can afford to drop this and simplify + the packaging. + * Remove ssh/use_old_init_script, which was a workaround for a very old + bug in /etc/init.d/ssh. If anyone has ignored this for >10 years then + they aren't going to be convinced now (closes: #214182). + * Remove support for upgrading directly from ssh-nonfree. + * Remove lots of maintainer script support for direct upgrades from + pre-etch (three releases before current stable). + * Add #DEBHELPER# tokens to openssh-client.postinst and + openssh-server.postinst. + * Replace old manual conffile handling code with dpkg-maintscript-helper, + via dh_installdeb. + * Switch to new unified layout for Upstart jobs as documented in + https://wiki.ubuntu.com/UpstartCompatibleInitScripts: the init script + checks for a running Upstart, and we now let dh_installinit handle most + of the heavy lifting in maintainer scripts. Ubuntu users should be + essentially unaffected except that sshd may no longer start + automatically in chroots if the running Upstart predates 0.9.0; but the + main goal is simply not to break when openssh-server is installed in a + chroot. + * Remove the check for vulnerable host keys; this was first added five + years ago, and everyone should have upgraded through a version that + applied these checks by now. The ssh-vulnkey tool and the blacklisting + support in sshd are still here, at least for the moment. + * This removes the last of our uses of debconf (closes: #221531). + * Use the pam_loginuid session module (thanks, Laurent Bigonville; closes: + #677440, LP: #1067779). + * Bracket our session stack with calls to pam_selinux close/open (thanks, + Laurent Bigonville; closes: #679458). + * Fix dh_builddeb invocation so that we really use xz compression for + binary packages, as intended since 1:6.1p1-2. + + -- Colin Watson <cjwatson@debian.org> Wed, 22 May 2013 09:07:42 +0100 + +openssh (1:6.2p2-1) unstable; urgency=low + + * New upstream release (http://www.openssh.com/txt/release-6.2p2): + - Only warn for missing identity files that were explicitly specified + (closes: #708275). + - Fix bug in contributed contrib/ssh-copy-id script that could result in + "rm *" being called on mktemp failure (closes: #708419). + + -- Colin Watson <cjwatson@debian.org> Thu, 16 May 2013 14:05:06 +0100 + +openssh (1:6.2p1-3) unstable; urgency=low + + * Renumber Debian-specific additions to enum monitor_reqtype so that they + fit within a single byte (thanks, Jason Conti; LP: #1179202). + + -- Colin Watson <cjwatson@debian.org> Mon, 13 May 2013 10:56:04 +0100 + +openssh (1:6.2p1-2) unstable; urgency=low + + * Fix build failure on Ubuntu: + - Include openbsd-compat/sys-queue.h from consolekit.c. + - Fix consolekit mismerges in monitor.c and monitor_wrap.c. + + -- Colin Watson <cjwatson@debian.org> Thu, 09 May 2013 09:45:57 +0100 + +openssh (1:6.2p1-1) unstable; urgency=low + + * New upstream release (http://www.openssh.com/txt/release-6.2). + - Add support for multiple required authentication in SSH protocol 2 via + an AuthenticationMethods option (closes: #195716). + - Fix Sophie Germain formula in moduli(5) (closes: #698612). + - Update ssh-copy-id to Phil Hands' greatly revised version (closes: + #99785, #322228, #620428; LP: #518883, #835901, #1074798). + * Use dh-autoreconf. + + -- Colin Watson <cjwatson@debian.org> Tue, 07 May 2013 11:48:16 +0100 + +openssh (1:6.1p1-4) experimental; urgency=low + + [ Gunnar Hjalmarsson ] + * debian/openssh-server.sshd.pam: Explicitly state that ~/.pam_environment + should be read, and move the pam_env calls from "auth" to "session" so + that it's also read when $HOME is encrypted (LP: #952185). + + [ Stéphane Graber ] + * Add ssh-agent upstart user job. This implements something similar to + the 90x11-common_ssh-agent Xsession script. That is, start ssh-agent + and set the appropriate environment variables (closes: #703906). + + -- Colin Watson <cjwatson@debian.org> Mon, 25 Mar 2013 16:58:04 +0000 + +openssh (1:6.1p1-3) experimental; urgency=low + + * Give ssh and ssh-krb5 versioned dependencies on openssh-client and + openssh-server, to try to reduce confusion when people run 'apt-get + install ssh' or similar and expect that to upgrade everything relevant. + * CVE-2010-5107: Improve DoS resistance by changing default of MaxStartups + to 10:30:100 (closes: #700102). + + -- Colin Watson <cjwatson@debian.org> Fri, 08 Feb 2013 21:07:31 +0000 + +openssh (1:6.1p1-2) experimental; urgency=low + + * Use xz compression for binary packages. + * Merge from Ubuntu: + - Add support for registering ConsoleKit sessions on login. (This is + currently enabled only when building for Ubuntu.) + - Drop openssh-blacklist and openssh-blacklist-extra to Suggests. It's + been long enough since the relevant vulnerability that we shouldn't + need these installed by default nowadays. + - Add an Upstart job (not currently used by default in Debian). + - Add mention of ssh-keygen in ssh connect warning (Scott Moser). + - Install apport hooks. + * Only build with -j if DEB_BUILD_OPTIONS=parallel=* is used (closes: + #694282). + + -- Colin Watson <cjwatson@debian.org> Mon, 26 Nov 2012 16:39:07 +0000 + +openssh (1:6.1p1-1) experimental; urgency=low + + * New upstream release (http://www.openssh.com/txt/release-6.1). + - Enable pre-auth sandboxing by default for new installs. + - Allow "PermitOpen none" to refuse all port-forwarding requests + (closes: #543683). + + -- Colin Watson <cjwatson@debian.org> Fri, 07 Sep 2012 00:22:44 +0100 + +openssh (1:6.0p1-3) unstable; urgency=low + + * debconf template translations: + - Add Indonesian (thanks, Andika Triwidada; closes: #681670). + * Call restorecon on copied ~/.ssh/authorized_keys if possible, since some + SELinux policies require this (closes: #658675). + * Add ncurses-term to openssh-server's Recommends, since it's often needed + to support unusual terminal emulators on clients (closes: #675362). + + -- Colin Watson <cjwatson@debian.org> Fri, 24 Aug 2012 06:55:36 +0100 + +openssh (1:6.0p1-2) unstable; urgency=low + + * Tighten libssl1.0.0 and libcrypto1.0.0-udeb dependencies to the current + "fix" version at build time (closes: #678661). + + -- Colin Watson <cjwatson@debian.org> Sun, 24 Jun 2012 12:16:06 +0100 + +openssh (1:6.0p1-1) unstable; urgency=low + + [ Roger Leigh ] + * Display dynamic part of MOTD from /run/motd.dynamic, if it exists + (closes: #669699). + + [ Colin Watson ] + * Update OpenSSH FAQ to revision 1.113, fixing missing line break (closes: + #669667). + * New upstream release (closes: #671010, + http://www.openssh.com/txt/release-6.0). + - Fix IPQoS not being set on non-mapped v4-in-v6 addressed connections + (closes: #643312, #650512, #671075). + - Add a new privilege separation sandbox implementation for Linux's new + seccomp sandbox, automatically enabled on platforms that support it. + (Note: privilege separation sandboxing is still experimental.) + * Fix a bashism in configure's seccomp_filter check. + * Add a sandbox fallback mechanism, so that behaviour on Linux depends on + whether the running system's kernel has seccomp_filter support, not the + build system's kernel (forwarded upstream as + https://bugzilla.mindrot.org/show_bug.cgi?id=2011). + + -- Colin Watson <cjwatson@debian.org> Sat, 26 May 2012 13:48:14 +0100 + +openssh (1:5.9p1-5) unstable; urgency=low + + * Use dpkg-buildflags, including for hardening support; drop use of + hardening-includes. + * Fix cross-building: + - Allow using a cross-architecture pkg-config. + - Pass default LDFLAGS to contrib/Makefile. + - Allow dh_strip to strip gnome-ssh-askpass, rather than calling + 'install -s'. + + -- Colin Watson <cjwatson@debian.org> Mon, 02 Apr 2012 11:20:33 +0100 + +openssh (1:5.9p1-4) unstable; urgency=low + + * Disable OpenSSL version check again, as its SONAME is sufficient + nowadays (closes: #664383). + + -- Colin Watson <cjwatson@debian.org> Mon, 19 Mar 2012 11:06:30 +0000 + +openssh (1:5.9p1-3) unstable; urgency=low + + * debconf template translations: + - Update Polish (thanks, Michał Kułach; closes: #659829). + * Ignore errors writing to console in init script (closes: #546743). + * Move ssh-krb5 to Section: oldlibs. + + -- Colin Watson <cjwatson@debian.org> Fri, 24 Feb 2012 08:56:18 +0000 + +openssh (1:5.9p1-2) unstable; urgency=low + + * Mark openssh-client and openssh-server as Multi-Arch: foreign. + + -- Colin Watson <cjwatson@debian.org> Wed, 09 Nov 2011 02:06:48 +0000 + +openssh (1:5.9p1-1) unstable; urgency=low + + * New upstream release (http://www.openssh.com/txt/release-5.9). + - Introduce sandboxing of the pre-auth privsep child using an optional + sshd_config(5) "UsePrivilegeSeparation=sandbox" mode that enables + mandatory restrictions on the syscalls the privsep child can perform. + - Add new SHA256-based HMAC transport integrity modes from + http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt. + - The pre-authentication sshd(8) privilege separation slave process now + logs via a socket shared with the master process, avoiding the need to + maintain /dev/log inside the chroot (closes: #75043, #429243, + #599240). + - ssh(1) now warns when a server refuses X11 forwarding (closes: + #504757). + - sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths, + separated by whitespace (closes: #76312). The authorized_keys2 + fallback is deprecated but documented (closes: #560156). + - ssh(1) and sshd(8): set IPv6 traffic class from IPQoS, as well as IPv4 + ToS/DSCP (closes: #498297). + - ssh-add(1) now accepts keys piped from standard input. E.g. "ssh-add + - < /path/to/key" (closes: #229124). + - Clean up lost-passphrase text in ssh-keygen(1) (closes: #444691). + - Say "required" rather than "recommended" in unprotected-private-key + warning (LP: #663455). + * Update OpenSSH FAQ to revision 1.112. + + -- Colin Watson <cjwatson@debian.org> Wed, 07 Sep 2011 23:46:00 +0100 + +openssh (1:5.8p1-7) unstable; urgency=low + + * Only recommend ssh-import-id when built on Ubuntu (closes: #635887). + * Use 'dpkg-vendor --derives-from Ubuntu' to detect Ubuntu systems rather + than 'lsb_release -is' so that Ubuntu derivatives behave the same way as + Ubuntu itself. + + -- Colin Watson <cjwatson@debian.org> Fri, 29 Jul 2011 14:27:52 +0100 + +openssh (1:5.8p1-6) unstable; urgency=low + + * openssh-client and openssh-server Suggests: monkeysphere. + * Quieten logs when multiple from= restrictions are used in different + authorized_keys lines for the same key; it's still not ideal, but at + least you'll only get one log entry per key (closes: #630606). + * Merge from Ubuntu (Dustin Kirkland): + - openssh-server Recommends: ssh-import-id (no-op in Debian since that + package doesn't exist there, but this reduces the Ubuntu delta). + + -- Colin Watson <cjwatson@debian.org> Thu, 28 Jul 2011 17:10:18 +0100 + +openssh (1:5.8p1-5) unstable; urgency=low + + * Drop openssh-server's dependency on openssh-blacklist to a + recommendation (closes: #622604). + * Update Vcs-* fields and README.source for Alioth changes. + * Backport from upstream: + - Make hostbased auth with ECDSA keys work correctly (closes: #633368). + + -- Colin Watson <cjwatson@debian.org> Sun, 24 Jul 2011 11:06:47 +0100 + +openssh (1:5.8p1-4) unstable; urgency=low + + * Drop hardcoded dependencies on libssl0.9.8 and libcrypto0.9.8-udeb, + since the required minimum versions are rather old now anyway and + openssl has bumped its SONAME (thanks, Julien Cristau; closes: #620828). + * Remove unreachable code from openssh-server.postinst. + + -- Colin Watson <cjwatson@debian.org> Mon, 04 Apr 2011 15:56:18 +0100 + +openssh (1:5.8p1-3) unstable; urgency=low + + * Correct ssh-keygen instruction in the changelog for 1:5.7p1-1 (thanks, + Joel Stanley). + * Allow ssh-add to read from FIFOs (thanks, Daniel Kahn Gillmor; closes: + #614897). + + -- Colin Watson <cjwatson@debian.org> Fri, 18 Mar 2011 16:42:42 +0000 + +openssh (1:5.8p1-2) unstable; urgency=low + + * Upload to unstable. + + -- Colin Watson <cjwatson@debian.org> Tue, 08 Feb 2011 10:59:17 +0000 + +openssh (1:5.8p1-1) experimental; urgency=low + + * New upstream release (http://www.openssh.com/txt/release-5.8): + - Fix stack information leak in legacy certificate signing + (http://www.openssh.com/txt/legacy-cert.adv). + + -- Colin Watson <cjwatson@debian.org> Sat, 05 Feb 2011 11:13:11 +0000 + +openssh (1:5.7p1-2) experimental; urgency=low + + * Fix crash in ssh_selinux_setfscreatecon when SELinux is disabled + (LP: #708571). + + -- Colin Watson <cjwatson@debian.org> Thu, 27 Jan 2011 12:14:17 +0000 + +openssh (1:5.7p1-1) experimental; urgency=low + + * New upstream release (http://www.openssh.com/txt/release-5.7): + - Implement Elliptic Curve Cryptography modes for key exchange (ECDH) + and host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA + offer better performance than plain DH and DSA at the same equivalent + symmetric key length, as well as much shorter keys. + - sftp(1)/sftp-server(8): add a protocol extension to support a hard + link operation. It is available through the "ln" command in the + client. The old "ln" behaviour of creating a symlink is available + using its "-s" option or through the preexisting "symlink" command. + - scp(1): Add a new -3 option to scp: Copies between two remote hosts + are transferred through the local host (closes: #508613). + - ssh(1): "atomically" create the listening mux socket by binding it on + a temporary name and then linking it into position after listen() has + succeeded. This allows the mux clients to determine that the server + socket is either ready or stale without races (closes: #454784). + Stale server sockets are now automatically removed (closes: #523250). + - ssh(1): install a SIGCHLD handler to reap expired child process + (closes: #594687). + - ssh(1)/ssh-agent(1): honour $TMPDIR for client xauth and ssh-agent + temporary directories (closes: #357469, although only if you arrange + for ssh-agent to actually see $TMPDIR since the setgid bit will cause + it to be stripped off). + * Update to current GSSAPI patch from + http://www.sxw.org.uk/computing/patches/openssh-5.7p1-gsskex-all-20110125.patch: + - Add GSSAPIServerIdentity option. + * Generate ECDSA host keys on fresh installations. Upgraders who wish to + add such host keys should manually add 'HostKey + /etc/ssh/ssh_host_ecdsa_key' to /etc/ssh/sshd_config and run 'ssh-keygen + -q -f /etc/ssh/ssh_host_ecdsa_key -N "" -t ecdsa'. + * Build-depend on libssl-dev (>= 0.9.8g) to ensure sufficient ECC support. + * Backport SELinux build fix from CVS. + * Rearrange selinux-role.patch so that it links properly given this + SELinux build fix. + + -- Colin Watson <cjwatson@debian.org> Wed, 26 Jan 2011 23:48:02 +0000 + +openssh (1:5.6p1-3) experimental; urgency=low + + * Drop override for desktop-file-but-no-dh_desktop-call, which Lintian no + longer issues. + * Merge 1:5.5p1-6. + + -- Colin Watson <cjwatson@debian.org> Thu, 30 Dec 2010 11:48:00 +0000 + +openssh (1:5.6p1-2) experimental; urgency=low + + * Backport upstream patch to install a SIGCHLD handler to reap expired ssh + child processes, preventing lots of zombies when using ControlPersist + (closes: #594687). + + -- Colin Watson <cjwatson@debian.org> Tue, 26 Oct 2010 14:46:40 +0100 + +openssh (1:5.6p1-1) experimental; urgency=low + + * New upstream release (http://www.openssh.com/txt/release-5.6): + - Added a ControlPersist option to ssh_config(5) that automatically + starts a background ssh(1) multiplex master when connecting. This + connection can stay alive indefinitely, or can be set to automatically + close after a user-specified duration of inactivity (closes: #335697, + #350898, #454787, #500573, #550262). + - Support AuthorizedKeysFile, AuthorizedPrincipalsFile, + HostbasedUsesNameFromPacketOnly, and PermitTunnel in sshd_config(5) + Match blocks (closes: #549858). + - sftp(1): fix ls in working directories that contain globbing + characters in their pathnames (LP: #530714). + + -- Colin Watson <cjwatson@debian.org> Tue, 24 Aug 2010 00:37:54 +0100 + +openssh (1:5.5p1-6) unstable; urgency=low + + * Touch /var/run/sshd/.placeholder in the preinst so that /var/run/sshd, + which is intentionally no longer shipped in the openssh-server package + due to /var/run often being a temporary directory, is not removed on + upgrade (closes: #575582). + + -- Colin Watson <cjwatson@debian.org> Sun, 26 Dec 2010 18:09:29 +0000 + +openssh (1:5.5p1-5) unstable; urgency=low + + * Use an architecture wildcard for libselinux1-dev (closes: #591740). + * debconf template translations: + - Update Danish (thanks, Joe Hansen; closes: #592800). + + -- Colin Watson <cjwatson@debian.org> Mon, 23 Aug 2010 22:59:03 +0100 + +openssh (1:5.5p1-4) unstable; urgency=low + + [ Sebastian Andrzej Siewior ] + * Add powerpcspe to architecture list for libselinux1-dev build-dependency + (closes: #579843). + + [ Colin Watson ] + * Allow ~/.ssh/authorized_keys and other secure files to be + group-writable, provided that the group in question contains only the + file's owner; this extends a patch previously applied to ~/.ssh/config + (closes: #581919). + * Check primary group memberships as well as supplementary group + memberships, and only allow group-writability by groups with exactly one + member, as zero-member groups are typically used by setgid binaries + rather than being user-private groups (closes: #581697). + + -- Colin Watson <cjwatson@debian.org> Sat, 22 May 2010 23:37:20 +0100 + +openssh (1:5.5p1-3) unstable; urgency=low + + * Discard error messages while checking whether rsh, rlogin, and rcp + alternatives exist (closes: #579285). + * Drop IDEA key check; I don't think it works properly any more due to + textual changes in error output, it's only relevant for direct upgrades + from truly ancient versions, and it breaks upgrades if + /etc/ssh/ssh_host_key can't be loaded (closes: #579570). + + -- Colin Watson <cjwatson@debian.org> Wed, 28 Apr 2010 22:12:47 +0100 + +openssh (1:5.5p1-2) unstable; urgency=low + + * Use dh_installinit -n, since our maintainer scripts already handle this + more carefully (thanks, Julien Cristau). + + -- Colin Watson <cjwatson@debian.org> Sat, 17 Apr 2010 12:55:56 +0100 + +openssh (1:5.5p1-1) unstable; urgency=low + + * New upstream release: + - Unbreak sshd_config's AuthorizedKeysFile option for $HOME-relative + paths. + - Include a language tag when sending a protocol 2 disconnection + message. + - Make logging of certificates used for user authentication more clear + and consistent between CAs specified using TrustedUserCAKeys and + authorized_keys. + + -- Colin Watson <cjwatson@debian.org> Fri, 16 Apr 2010 10:27:30 +0100 + +openssh (1:5.4p1-2) unstable; urgency=low + + * Borrow patch from Fedora to add DNSSEC support: if glibc 2.11 is + installed, the host key is published in an SSHFP RR secured with DNSSEC, + and VerifyHostKeyDNS=yes, then ssh will no longer prompt for host key + verification (closes: #572049). + * Convert to dh(1), and use dh_installdocs --link-doc. + * Drop lpia support, since Ubuntu no longer supports this architecture. + * Use dh_install more effectively. + * Add a NEWS.Debian entry about changes in smartcard support relative to + previous unofficial builds (closes: #231472). + + -- Colin Watson <cjwatson@debian.org> Sat, 10 Apr 2010 01:08:59 +0100 + +openssh (1:5.4p1-1) unstable; urgency=low + + * New upstream release (LP: #535029). + - After a transition period of about 10 years, this release disables SSH + protocol 1 by default. Clients and servers that need to use the + legacy protocol must explicitly enable it in ssh_config / sshd_config + or on the command-line. + - Remove the libsectok/OpenSC-based smartcard code and add support for + PKCS#11 tokens. This support is enabled by default in the Debian + packaging, since it now doesn't involve additional library + dependencies (closes: #231472, LP: #16918). + - Add support for certificate authentication of users and hosts using a + new, minimal OpenSSH certificate format (closes: #482806). + - Added a 'netcat mode' to ssh(1): "ssh -W host:port ...". + - Add the ability to revoke keys in sshd(8) and ssh(1). (For the Debian + package, this overlaps with the key blacklisting facility added in + openssh 1:4.7p1-9, but with different file formats and slightly + different scopes; for the moment, I've roughly merged the two.) + - Various multiplexing improvements, including support for requesting + port-forwardings via the multiplex protocol (closes: #360151). + - Allow setting an explicit umask on the sftp-server(8) commandline to + override whatever default the user has (closes: #496843). + - Many sftp client improvements, including tab-completion, more options, + and recursive transfer support for get/put (LP: #33378). The old + mget/mput commands never worked properly and have been removed + (closes: #270399, #428082). + - Do not prompt for a passphrase if we fail to open a keyfile, and log + the reason why the open failed to debug (closes: #431538). + - Prevent sftp from crashing when given a "-" without a command. Also, + allow whitespace to follow a "-" (closes: #531561). + + * Fix 'debian/rules quilt-setup' to avoid writing .orig files if some + patches apply with offsets. + * Include debian/ssh-askpass-gnome.png in the Debian tarball now that + we're using a source format that permits this, rather than messing + around with uudecode. + * Drop compatibility with the old gssapi mechanism used in ssh-krb5 << + 3.8.1p1-1. Simon Wilkinson refused this patch since the old gssapi + mechanism was removed due to a serious security hole, and since these + versions of ssh-krb5 are no longer security-supported by Debian I don't + think there's any point keeping client compatibility for them. + * Fix substitution of ETC_PAM_D_SSH, following the rename in 1:4.7p1-4. + * Hardcode the location of xauth to /usr/bin/xauth rather than + /usr/bin/X11/xauth (thanks, Aron Griffis; closes: #575725, LP: #8440). + xauth no longer depends on x11-common, so we're no longer guaranteed to + have the /usr/bin/X11 symlink available. I was taking advantage of the + /usr/bin/X11 symlink to smooth X's move to /usr/bin, but this is far + enough in the past now that it's probably safe to just use /usr/bin. + * Remove SSHD_OOM_ADJUST configuration. sshd now unconditionally makes + itself non-OOM-killable, and doesn't require configuration to avoid log + spam in virtualisation containers (closes: #555625). + * Drop Debian-specific removal of OpenSSL version check. Upstream ignores + the two patchlevel nybbles now, which is sufficient to address the + original reason this change was introduced, and it appears that any + change in the major/minor/fix nybbles would involve a new libssl package + name. (We'd still lose if the status nybble were ever changed, but that + would mean somebody had packaged a development/beta version rather than + a proper release, which doesn't appear to be normal practice.) + * Drop most of our "LogLevel SILENT" (-qq) patch. This was originally + introduced to match the behaviour of non-free SSH, in which -q does not + suppress fatal errors, but matching the behaviour of OpenSSH upstream is + much more important nowadays. We no longer document that -q does not + suppress fatal errors (closes: #280609). Migrate "LogLevel SILENT" to + "LogLevel QUIET" in sshd_config on upgrade. + * Policy version 3.8.4: + - Add a Homepage field. + + -- Colin Watson <cjwatson@debian.org> Tue, 06 Apr 2010 22:38:31 +0100 + +openssh (1:5.3p1-3) unstable; urgency=low + + * Convert to source format 3.0 (quilt). + * Update README.source to match, and add a 'quilt-setup' target to + debian/rules for the benefit of those checking out the package from + revision control. + * All patches are now maintained separately and tagged according to DEP-3. + * Add GSSAPIStoreCredentialsOnRekey to 'sshd -T' configuration dump. + * Remove documentation of building for Debian 3.0 in README.Debian. + Support for this was removed in 1:4.7p1-2. + * Remove obsolete header from README.Debian dating from when people + expected non-free SSH. + * Update copyright years for GSSAPI patch. + + -- Colin Watson <cjwatson@debian.org> Sun, 28 Feb 2010 01:35:53 +0000 + +openssh (1:5.3p1-2) unstable; urgency=low + + * Link with -Wl,--as-needed (closes: #560155). + * Install upstream sshd_config as an example (closes: #415008). + * Use dh_lintian. + * Honour DEB_BUILD_OPTIONS=nocheck. + + -- Colin Watson <cjwatson@debian.org> Mon, 22 Feb 2010 12:43:24 +0000 + +openssh (1:5.3p1-1) unstable; urgency=low + + * New upstream release. + * Update to GSSAPI patch from + http://www.sxw.org.uk/computing/patches/openssh-5.3p1-gsskex-all-20100124.patch. + * Backport from upstream: + - Do not fall back to adding keys without constraints (ssh-add -c / -t + ...) when the agent refuses the constrained add request. This was a + useful migration measure back in 2002 when constraints were new, but + just adds risk now (LP: #209447). + * Drop change from 1:3.8p1-3 to avoid setresuid() and setresgid() system + calls. This only applied to Linux 2.2, which it's no longer feasible to + run anyway (see 1:5.2p1-2 changelog). + + -- Colin Watson <cjwatson@debian.org> Tue, 26 Jan 2010 11:55:29 +0000 + +openssh (1:5.2p1-2) unstable; urgency=low + + [ Colin Watson ] + * Backport from upstream: + - After sshd receives a SIGHUP, ignore subsequent HUPs while sshd + re-execs itself. Prevents two HUPs in quick succession from resulting + in sshd dying (LP: #497781). + - Output a debug if we can't open an existing keyfile (LP: #505301). + * Use host compiler for ssh-askpass-gnome when cross-compiling. + * Don't run tests when cross-compiling. + * Drop change from 1:3.6.1p2-5 to disable cmsg_type check for file + descriptor passing when running on Linux 2.0. The previous stable + release of Debian dropped support for Linux 2.4, let alone 2.0, so this + very likely has no remaining users depending on it. + + [ Kees Cook ] + * Implement DebianBanner server configuration flag that can be set to "no" + to allow sshd to run without the Debian-specific extra version in the + initial protocol handshake (closes: #562048). + + -- Colin Watson <cjwatson@debian.org> Sat, 16 Jan 2010 01:28:58 +0000 + +openssh (1:5.2p1-1) unstable; urgency=low + + * New upstream release (closes: #536182). Yes, I know 5.3p1 has been out + for a while, but there's no GSSAPI patch available for it yet. + - Change the default cipher order to prefer the AES CTR modes and the + revised "arcfour256" mode to CBC mode ciphers that are susceptible to + CPNI-957037 "Plaintext Recovery Attack Against SSH". + - Add countermeasures to mitigate CPNI-957037-style attacks against the + SSH protocol's use of CBC-mode ciphers. Upon detection of an invalid + packet length or Message Authentication Code, ssh/sshd will continue + reading up to the maximum supported packet length rather than + immediately terminating the connection. This eliminates most of the + known differences in behaviour that leaked information about the + plaintext of injected data which formed the basis of this attack + (closes: #506115, LP: #379329). + - ForceCommand directive now accepts commandline arguments for the + internal-sftp server (closes: #524423, LP: #362511). + - Add AllowAgentForwarding to available Match keywords list (closes: + #540623). + - Make ssh(1) send the correct channel number for + SSH2_MSG_CHANNEL_SUCCESS and SSH2_MSG_CHANNEL_FAILURE messages to + avoid triggering 'Non-public channel' error messages on sshd(8) in + openssh-5.1. + - Avoid printing 'Non-public channel' warnings in sshd(8), since the + ssh(1) has sent incorrect channel numbers since ~2004 (this reverts a + behaviour introduced in openssh-5.1; closes: #496017). + - Disable nonfunctional ssh(1) ~C escape handler in multiplex slave + connections (closes: #507541). + - Fix "whitepsace" typo in ssh_config(5) (closes: #514313, LP: #303835). + * Update to GSSAPI patch from + http://www.sxw.org.uk/computing/patches/openssh-5.2p1-gsskex-all-20090726.patch, + including cascading credentials support (LP: #416958). + * Use x11.pc when compiling/linking gnome-ssh-askpass2 (closes: #555951). + * Moved to bzr.debian.org; add Vcs-Bzr and Vcs-Browser control fields. + * Add debian/README.source with instructions on bzr handling. + * Make ChrootDirectory work with SELinux (thanks, Russell Coker; closes: + #556644). + * Initialise sc to NULL in ssh_selinux_getctxbyname (thanks, Václav Ovsík; + closes: #498684). + * Don't duplicate backslashes when displaying server banner (thanks, + Michał Górny; closes: #505378, LP: #425346). + * Use hardening-includes for hardening logic (thanks, Kees Cook; closes: + #561887). + * Update OpenSSH FAQ to revision 1.110. + * Remove ssh/new_config, only needed for direct upgrades from potato which + are no longer particularly feasible anyway (closes: #420682). + * Cope with insserv reordering of init script links. + * Remove init script stop link in rc1, as killprocs handles it already. + * Adjust short descriptions to avoid relying on previous experience with + rsh, based on suggestions from Reuben Thomas (closes: #512198). + * Remove manual page references to login.conf, which aren't applicable on + non-BSD systems (closes: #154434). + * Remove/adjust manual page references to BSD-specific /etc/rc (closes: + #513417). + * Refer to sshd_config(5) rather than sshd(8) in postinst-written + /etc/ssh/sshd_config, and add UsePAM commentary from upstream-shipped + configuration file (closes: #415008, although unfortunately this will + only be conveniently visible on new installations). + * Include URL to OpenBSD's ssl(8) in ssh(1), since I don't see a better + source for the same information among Debian's manual pages (closes: + #530692, LP: #456660). + + -- Colin Watson <cjwatson@debian.org> Mon, 04 Jan 2010 13:23:35 +0000 + +openssh (1:5.1p1-8) unstable; urgency=low + + * Build with just -fPIC on mips/mipsel, not -fPIE as well (thanks, LIU Qi; + closes: #538313). + * Build-depend on libselinux1-dev on sh4 too (thanks, Nobuhiro Iwamatsu; + closes: #547103). + * Fix grammar in if-up script (closes: #549128). + * Pass $SSHD_OPTS when checking configuration too (thanks, "sobtwmxt"; + closes: #548662). + + -- Colin Watson <cjwatson@debian.org> Mon, 05 Oct 2009 13:30:49 +0100 + +openssh (1:5.1p1-7) unstable; urgency=low + + * Update config.guess and config.sub from autotools-dev 20090611.1 + (closes: #538301). + * Set umask to 022 in the init script as well as postinsts (closes: + #539030). + * Add ${misc:Depends} to keep Lintian happy. + * Use 'which' rather than 'type' in maintainer scripts. + * Upgrade to debhelper v7. + + -- Colin Watson <cjwatson@debian.org> Fri, 31 Jul 2009 16:28:10 +0100 + +openssh (1:5.1p1-6) unstable; urgency=low + + * Open /proc/self/oom_adj with O_RDONLY or O_WRONLY as necessary, rather + than O_RDWR. + * Disable OOM adjustment for vserver/OpenVZ (thanks, Karl Chen; closes: + #511771). + * Add ufw integration (thanks, Didier Roche; see + https://wiki.ubuntu.com/UbuntuFirewall#Integrating%20UFW%20with%20Packages; + LP: #261884). + * Add a comment above PermitRootLogin in sshd_config pointing to + README.Debian. + * Check if delgroup is present in openssh-client.postrm (closes: #530501). + * Build with -fPIC on mips/mipsel (thanks, Luk Claes; closes: #531942). + * Remove /var/run/sshd from openssh-server package; it will be created at + run-time before starting the server. + * Use invoke-rc.d in openssh-server's if-up script. + + -- Colin Watson <cjwatson@debian.org> Fri, 05 Jun 2009 11:56:03 +0100 + +openssh (1:5.1p1-5) unstable; urgency=low + + * Backport from upstream CVS (Markus Friedl): + - packet_disconnect() on padding error, too. Should reduce the success + probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18. + * Check that /var/run/sshd.pid exists and that the process ID listed there + corresponds to sshd before running '/etc/init.d/ssh reload' from if-up + script; SIGHUP is racy if called at boot before sshd has a chance to + install its signal handler, but fortunately the pid file is written + after that which lets us avoid the race (closes: #502444). + * While the above is a valuable sanity-check, it turns out that it doesn't + really fix the bug (thanks to Kevin Price for testing), so for the + meantime we'll just use '/etc/init.d/ssh restart', even though it is + unfortunately heavyweight. + + -- Colin Watson <cjwatson@debian.org> Wed, 14 Jan 2009 00:34:08 +0000 + +openssh (1:5.1p1-4) unstable; urgency=low + + * ssh-copy-id: Strip trailing colons from hostname (closes: #226172, + LP: #249706; thanks to Karl Goetz for nudging this along; forwarded + upstream as https://bugzilla.mindrot.org/show_bug.cgi?id=1530). + * Backport from upstream CVS (Markus Friedl): + - Only send eow and no-more-sessions requests to openssh 5 and newer; + fixes interop problems with broken ssh v2 implementations (closes: + #495917). + * Fix double-free when failing to parse a forwarding specification given + using ~C (closes: #505330; forwarded upstream as + https://bugzilla.mindrot.org/show_bug.cgi?id=1539). + + -- Colin Watson <cjwatson@debian.org> Sun, 23 Nov 2008 14:46:10 +0000 + +openssh (1:5.1p1-3) unstable; urgency=low + + * Remove unnecessary ssh-vulnkey output in non-verbose mode when no + compromised or unknown keys were found (closes: #496495). + * Configure with --disable-strip; dh_strip will deal with stripping + binaries and will honour DEB_BUILD_OPTIONS (thanks, Bernhard R. Link; + closes: #498681). + * Fix handling of zero-length server banners (thanks, Tomas Mraz; closes: + #497026). + + -- Colin Watson <cjwatson@debian.org> Tue, 30 Sep 2008 23:09:58 +0100 + +openssh (1:5.1p1-2) unstable; urgency=low + + * Look for $SHELL on the path when executing ProxyCommands or + LocalCommands (closes: #492728). + + -- Colin Watson <cjwatson@debian.org> Tue, 29 Jul 2008 15:31:25 +0100 + +openssh (1:5.1p1-1) unstable; urgency=low + + * New upstream release (closes: #474301). Important changes not previously + backported to 4.7p1: + - 4.9/4.9p1 (http://www.openssh.com/txt/release-4.9): + + Added chroot(2) support for sshd(8), controlled by a new option + "ChrootDirectory" (closes: #139047, LP: #24777). + + Linked sftp-server(8) into sshd(8). The internal sftp server is used + when the command "internal-sftp" is specified in a Subsystem or + ForceCommand declaration. When used with ChrootDirectory, the + internal sftp server requires no special configuration of files + inside the chroot environment. + + Added a protocol extension method "posix-rename@openssh.com" for + sftp-server(8) to perform POSIX atomic rename() operations; sftp(1) + prefers this if available (closes: #308561). + + Removed the fixed limit of 100 file handles in sftp-server(8). + + ssh(8) will now skip generation of SSH protocol 1 ephemeral server + keys when in inetd mode and protocol 2 connections are negotiated. + This speeds up protocol 2 connections to inetd-mode servers that + also allow Protocol 1. + + Accept the PermitRootLogin directive in a sshd_config(5) Match + block. Allows for, e.g. permitting root only from the local network. + + Reworked sftp(1) argument splitting and escaping to be more + internally consistent (i.e. between sftp commands) and more + consistent with sh(1). Please note that this will change the + interpretation of some quoted strings, especially those with + embedded backslash escape sequences. + + Support "Banner=none" in sshd_config(5) to disable sending of a + pre-login banner (e.g. in a Match block). + + ssh(1) ProxyCommands are now executed with $SHELL rather than + /bin/sh. + + ssh(1)'s ConnectTimeout option is now applied to both the TCP + connection and the SSH banner exchange (previously it just covered + the TCP connection). This allows callers of ssh(1) to better detect + and deal with stuck servers that accept a TCP connection but don't + progress the protocol, and also makes ConnectTimeout useful for + connections via a ProxyCommand. + + scp(1) incorrectly reported "stalled" on slow copies (closes: + #140828). + + scp(1) date underflow for timestamps before epoch. + + ssh(1) used the obsolete SIG DNS RRtype for host keys in DNS, + instead of the current standard RRSIG. + + Correctly drain ACKs when a sftp(1) upload write fails midway, + avoids a fatal() exit from what should be a recoverable condition. + + Fixed ssh-keygen(1) selective host key hashing (i.e. "ssh-keygen -HF + hostname") to not include any IP address in the data to be hashed. + + Make ssh(1) skip listening on the IPv6 wildcard address when a + binding address of 0.0.0.0 is used against an old SSH server that + does not support the RFC4254 syntax for wildcard bind addresses. + + Enable IPV6_V6ONLY socket option on sshd(8) listen socket, as is + already done for X11/TCP forwarding sockets (closes: #439661). + + Fix FD leak that could hang a ssh(1) connection multiplexing master. + + Make ssh(1) -q option documentation consistent with reality. + + Fixed sshd(8) PAM support not calling pam_session_close(), or + failing to call it with root privileges (closes: #372680). + + Fix activation of OpenSSL engine support when requested in configure + (LP: #119295). + + Cache SELinux status earlier so we know if it's enabled after a + chroot (LP: #237557). + - 5.1/5.1p1 (http://www.openssh.com/txt/release-5.1): + + Introduce experimental SSH Fingerprint ASCII Visualisation to ssh(1) + and ssh-keygen(1). Visual fingerprint display is controlled by a new + ssh_config(5) option "VisualHostKey". The intent is to render SSH + host keys in a visual form that is amenable to easy recall and + rejection of changed host keys. + + sshd_config(5) now supports CIDR address/masklen matching in "Match + address" blocks, with a fallback to classic wildcard matching. + + sshd(8) now supports CIDR matching in ~/.ssh/authorized_keys + from="..." restrictions, also with a fallback to classic wildcard + matching. + + Added an extended test mode (-T) to sshd(8) to request that it write + its effective configuration to stdout and exit. Extended test mode + also supports the specification of connection parameters (username, + source address and hostname) to test the application of + sshd_config(5) Match rules. + + ssh(1) now prints the number of bytes transferred and the overall + connection throughput for SSH protocol 2 sessions when in verbose + mode (previously these statistics were displayed for protocol 1 + connections only). + + sftp-server(8) now supports extension methods statvfs@openssh.com + and fstatvfs@openssh.com that implement statvfs(2)-like operations. + + sftp(1) now has a "df" command to the sftp client that uses the + statvfs@openssh.com to produce a df(1)-like display of filesystem + space and inode utilisation (requires statvfs@openssh.com support on + the server). + + Added a MaxSessions option to sshd_config(5) to allow control of the + number of multiplexed sessions supported over a single TCP + connection. This allows increasing the number of allowed sessions + above the previous default of 10, disabling connection multiplexing + (MaxSessions=1) or disallowing login/shell/subsystem sessions + entirely (MaxSessions=0). + + Added a no-more-sessions@openssh.com global request extension that + is sent from ssh(1) to sshd(8) when the client knows that it will + never request another session (i.e. when session multiplexing is + disabled). This allows a server to disallow further session requests + and terminate the session in cases where the client has been + hijacked. + + ssh-keygen(1) now supports the use of the -l option in combination + with -F to search for a host in ~/.ssh/known_hosts and display its + fingerprint. + + ssh-keyscan(1) now defaults to "rsa" (protocol 2) keys, instead of + "rsa1" (LP: #129794). + + Added an AllowAgentForwarding option to sshd_config(8) to control + whether authentication agent forwarding is permitted. Note that this + is a loose control, as a client may install their own unofficial + forwarder. + + ssh(1) and sshd(8): avoid unnecessary malloc/copy/free when + receiving network data, resulting in a ~10% speedup. + + ssh(1) and sshd(8) will now try additional addresses when connecting + to a port forward destination whose DNS name resolves to more than + one address. The previous behaviour was to try the only first + address and give up if that failed. + + ssh(1) and sshd(8) now support signalling that channels are + half-closed for writing, through a channel protocol extension + notification "eow@openssh.com". This allows propagation of closed + file descriptors, so that commands such as "ssh -2 localhost od + /bin/ls | true" do not send unnecessary data over the wire. + + sshd(8): increased the default size of ssh protocol 1 ephemeral keys + from 768 to 1024 bits. + + When ssh(1) has been requested to fork after authentication ("ssh + -f") with ExitOnForwardFailure enabled, delay the fork until after + replies for any -R forwards have been seen. Allows for robust + detection of -R forward failure when using -f. + + "Match group" blocks in sshd_config(5) now support negation of + groups. E.g. "Match group staff,!guests". + + sftp(1) and sftp-server(8) now allow chmod-like operations to set + set[ug]id/sticky bits. + + The MaxAuthTries option is now permitted in sshd_config(5) match + blocks. + + Multiplexed ssh(1) sessions now support a subset of the ~ escapes + that are available to a primary connection. + + ssh(1) connection multiplexing will now fall back to creating a new + connection in most error cases (closes: #352830). + + Make ssh(1) deal more gracefully with channel requests that fail. + Previously it would optimistically assume that requests would always + succeed, which could cause hangs if they did not (e.g. when the + server runs out of file descriptors). + + ssh(1) now reports multiplexing errors via the multiplex slave's + stderr where possible (subject to LogLevel in the mux master). + + Fixed an UMAC alignment problem that manifested on Itanium + platforms. + * Remove our local version of moduli(5) now that there's one upstream. + * Say "GTK+" rather than "GTK" in ssh-askpass-gnome's description. + * Add lintian overrides for empty /usr/share/doc/openssh-client + directories in openssh-server and ssh (necessary due to being symlink + targets). + * Merge from Ubuntu: + - Add 'status' action to openssh-server init script, requiring lsb-base + (>= 3.2-13) (thanks, Dustin Kirkland). + * debconf template translations: + - Update Korean (thanks, Sunjae Park; closes: #484821). + + -- Colin Watson <cjwatson@debian.org> Fri, 25 Jul 2008 10:45:08 +0100 + +openssh (1:4.7p1-13) unstable; urgency=low + + * Add some helpful advice to the end of ssh-vulnkey's output if there are + unknown or compromised keys (thanks, Dan Jacobson; closes: #483756). + * Check compromised key blacklist in ssh or ssh-add, as well as in the + server (LP: #232391). To override the blacklist check in ssh + temporarily, use 'ssh -o UseBlacklistedKeys=yes'; there is no override + for the blacklist check in ssh-add. + * Add cross-references to ssh-vulnkey(1) to ssh(1), ssh-add(1), + ssh-keygen(1), and sshd(8) (closes: #484451). + * Change openssh-client-udeb's Installer-Menu-Item from 99900 to 99999 + (thanks, Frans Pop). + * Drop openssh-client-udeb isinstallable hack, as main-menu (>= 1.26) now + takes care of that (thanks, Frans Pop; closes: #484404). + * Update DEB_BUILD_OPTIONS parsing code from policy 3.8.0. + * Add documentation on removing openssh-blacklist locally (see #484269). + * Clarify documentation of SSHD_OOM_ADJUST, and make setting it to the + empty string actually skip adjustment as intended (closes: #487325). + * Remove empty /usr/share/applications directory in ssh-askpass-gnome. + * debconf template translations: + - Update Romanian (thanks, Cătălin Feștilă; closes: #485415). + + -- Colin Watson <cjwatson@debian.org> Mon, 21 Jul 2008 12:18:28 +0100 + +openssh (1:4.7p1-12) unstable; urgency=low + + * Fill in CVE identifier for ssh-vulnkey bug fixed in 1:4.7p1-10. + * Refactor rejection of blacklisted user keys into a single + reject_blacklisted_key function in auth.c (thanks, Dmitry V. Levin). + * Fix memory leak of blacklisted host keys (thanks, Dmitry V. Levin). + * debconf template translations: + - Update Dutch (thanks, Bart Cornelis; closes: #483004). + - Update Brazilian Portuguese (thanks, Eder L. Marques; closes: + #483142). + - Update Slovak (thanks, Ivan Masár; closes: #483517). + + -- Colin Watson <cjwatson@debian.org> Thu, 29 May 2008 21:41:29 +0100 + +openssh (1:4.7p1-11) unstable; urgency=low + + * Make init script depend on $syslog, and fix some other dependency + glitches (thanks, Petter Reinholdtsen; closes: #481018). + * Remove 0 and 6 from Default-Stop in init script (thanks, Kel Modderman; + closes: #481151). + * Restore OOM killer adjustment for child processes (thanks, Vaclav Ovsik; + closes: #480020). + * Allow building with heimdal-dev (LP: #125805). + + * Check RSA1 keys without the need for a separate blacklist. Thanks to + Simon Tatham for the idea. + * Generate two keys with the PID forced to the same value and test that + they differ, to defend against recurrences of the recent Debian OpenSSL + vulnerability. + * Recommend openssh-blacklist from openssh-client (closes: #481187). + * Recommend openssh-blacklist-extra from openssh-client and + openssh-server. + * Make ssh-vulnkey report the file name and line number for each key + (thanks, Heiko Schlittermann and Christopher Perry; closes: #481398). + * Check for blacklists in /usr/share/ssh/ as well as /etc/ssh/ (see + #481283). + * Log IP addresses of hosts attempting to use blacklisted keys (closes: + #481721). + * Incorporate various ssh-vulnkey suggestions from Hugh Daniel: + - Add -v (verbose) option, and don't print output for keys that have a + blacklist file but that are not listed unless in verbose mode. + - Move exit status documentation to a separate section. + - Document key status descriptions. + - Add key type to output. + - Fix error output if ssh-vulnkey fails to read key files, with the + exception of host keys unless -a was given. + - In verbose mode, output the name of each file examined. + * Handle leading IP addresses in ssh-vulnkey input (LP: #230497). + * Fix various ssh-vulnkey problems pointed out by Solar Designer: + - Fix some buffer handling inconsistencies. + - Use xasprintf to build user key file names, avoiding truncation + problems. + - Drop to the user's UID when reading user keys with -a. + - Use EUID rather than UID when run with no file names and without -a. + - Reword "Unknown (no blacklist information)" to "Unknown (blacklist + file not installed)". + + * Fix typo in ssh/vulnerable_host_keys message (thanks, Esko Arajärvi). + * debconf template translations: + - Update Finnish (thanks, Esko Arajärvi; closes: #481530). + - Update French (thanks, Christian Perrier; closes: #481576). + - Update Norwegian Bokmål (thanks, Bjørn Steensrud; closes: #481591). + - Update Galician (thanks, Jacobo Tarrio; closes: #481596). + - Update Japanese (thanks, Kenshi Muto; closes: #481621). + - Update Czech (thanks, Miroslav Kure; closes: #481624). + - Update German (thanks, Helge Kreutzmann; closes: #481676). + - Update Portuguese (thanks, Ricardo Silva; closes: #481781). + - Update Basque (thanks, Piarres Beobide; closes: #481836). + - Update Bulgarian (thanks, Damyan Ivanov; closes: #481870). + - Update Vietnamese (thanks, Clytie Siddall; closes: #481876). + - Update Spanish (thanks, Javier Fernandez-Sanguino Peña; closes: + #482341). + - Update Turkish (thanks, Mert Dirik; closes: #482548). + - Update Russian (thanks, Yuri Kozlov; closes: #482887). + - Update Swedish (thanks, Martin Bagge; closes: #482464). + - Update Italian (thanks, Luca Monducci; closes: #482808). + + -- Colin Watson <cjwatson@debian.org> Mon, 26 May 2008 12:21:39 +0100 + +openssh (1:4.7p1-10) unstable; urgency=low + + * Add a FILES section to ssh-vulnkey(1) (thanks, Hugh Daniel). + * CVE-2008-2285: ssh-vulnkey handles options in authorized_keys + (LP: #230029), and treats # as introducing a comment even if it is + preceded by whitespace. + + -- Colin Watson <cjwatson@debian.org> Wed, 14 May 2008 12:35:05 +0100 + +openssh (1:4.7p1-9) unstable; urgency=critical + + * Fill in CVE identifier for security vulnerability fixed in 1:4.7p1-8. + * Mitigate OpenSSL security vulnerability (CVE-2008-0166): + - Add key blacklisting support. Keys listed in + /etc/ssh/blacklist.TYPE-LENGTH will be rejected for authentication by + sshd, unless "PermitBlacklistedKeys yes" is set in + /etc/ssh/sshd_config. + - Add a new program, ssh-vulnkey, which can be used to check keys + against these blacklists. + - Depend on openssh-blacklist. + - Force dependencies on libssl0.9.8 / libcrypto0.9.8-udeb to at least + 0.9.8g-9. + - Automatically regenerate known-compromised host keys, with a + critical-priority debconf note. (I regret that there was no time to + gather translations.) + + -- Colin Watson <cjwatson@debian.org> Tue, 13 May 2008 12:33:38 +0100 + +openssh (1:4.7p1-8) unstable; urgency=high + + * Fill in CVE identifier for security vulnerability fixed in 1:4.7p1-5. + * Rename KeepAlive to TCPKeepAlive in sshd_config, cleaning up from old + configurations (LP: #211400). + * Tweak scp's reporting of filenames in verbose mode to be a bit less + confusing with spaces (thanks, Nicolas Valcárcel; LP: #89945). + * Backport from 4.9p1: + - CVE-2008-1657: Ignore ~/.ssh/rc if a sshd_config ForceCommand is + specified. + - Add no-user-rc authorized_keys option to disable execution of + ~/.ssh/rc. + * Backport from Simon Wilkinson's GSSAPI key exchange patch for 5.0p1: + - Add code to actually implement GSSAPIStrictAcceptorCheck, which had + somehow been omitted from a previous version of this patch (closes: + #474246). + + -- Colin Watson <cjwatson@debian.org> Sun, 06 Apr 2008 12:34:19 +0100 + +openssh (1:4.7p1-7) unstable; urgency=low + + * Ignore errors writing to oom_adj (closes: #473573). + + -- Colin Watson <cjwatson@debian.org> Mon, 31 Mar 2008 16:24:44 +0100 + +openssh (1:4.7p1-6) unstable; urgency=low + + * Disable the Linux kernel's OOM-killer for the sshd parent; tweak + SSHD_OOM_ADJUST in /etc/default/ssh to change this (closes: #341767). + + -- Colin Watson <cjwatson@debian.org> Sun, 30 Mar 2008 21:14:12 +0100 + +openssh (1:4.7p1-5) unstable; urgency=low + + * Recommends: xauth rather than Suggests: xbase-clients. + * Document in ssh(1) that '-S none' disables connection sharing + (closes: #471437). + * Patch from Red Hat / Fedora: + - CVE-2008-1483: Don't use X11 forwarding port which can't be bound on + all address families, preventing hijacking of X11 forwarding by + unprivileged users when both IPv4 and IPv6 are configured (closes: + #463011). + * Use printf rather than echo -en (a bashism) in openssh-server.config and + openssh-server.preinst. + * debconf template translations: + - Update Finnish (thanks, Esko Arajärvi; closes: #468563). + + -- Colin Watson <cjwatson@debian.org> Sat, 22 Mar 2008 12:37:00 +0000 + +openssh (1:4.7p1-4) unstable; urgency=low + + [ Caleb Case ] + * Fix configure detection of getseuserbyname and + get_default_context_with_level (closes: #465614, LP: #188136). + + [ Colin Watson ] + * Include the autogenerated debian/copyright in the source package. + * Move /etc/pam.d/ssh to /etc/pam.d/sshd, allowing us to stop defining + SSHD_PAM_SERVICE (closes: #255870). + + -- Colin Watson <cjwatson@debian.org> Wed, 13 Feb 2008 18:18:52 +0000 + +openssh (1:4.7p1-3) unstable; urgency=low + + * Improve grammar of ssh-askpass-gnome description. + * Backport from upstream: + - Use the correct packet maximum sizes for remote port and agent + forwarding. Prevents the server from killing the connection if too + much data is queued and an excessively large packet gets sent + (https://bugzilla.mindrot.org/show_bug.cgi?id=1360). + * Allow passing temporary daemon parameters on the init script's command + line, e.g. '/etc/init.d/ssh start "-o PermitRootLogin=yes"' (thanks, + Marc Haber; closes: #458547). + + -- Colin Watson <cjwatson@debian.org> Fri, 01 Feb 2008 21:59:59 +0000 + +openssh (1:4.7p1-2) unstable; urgency=low + + * Adjust many relative links in faq.html to point to + http://www.openssh.com/ (thanks, Dan Jacobson; mentioned in #459807). + * Pass --with-mantype=doc to configure rather than build-depending on + groff (closes: #460121). + * Add armel to architecture list for libselinux1-dev build-dependency + (closes: #460136). + * Drop source-compatibility with Debian 3.0: + - Remove support for building with GNOME 1. This allows simplification + of our GNOME build-dependencies (see #460136). + - Remove hacks to support the old PAM configuration scheme. + - Remove compatibility for building without po-debconf. + * Build-depend on libgtk2.0-dev rather than libgnomeui-dev. As far as I + can see, the GTK2 version of ssh-askpass-gnome has never required + libgnomeui-dev. + + -- Colin Watson <cjwatson@debian.org> Fri, 11 Jan 2008 00:14:10 +0000 + +openssh (1:4.7p1-1) unstable; urgency=low + + * New upstream release (closes: #453367). + - CVE-2007-4752: Prevent ssh(1) from using a trusted X11 cookie if + creation of an untrusted cookie fails; found and fixed by Jan Pechanec + (closes: #444738). + - sshd(8) in new installations defaults to SSH Protocol 2 only. Existing + installations are unchanged. + - The SSH channel window size has been increased, and both ssh(1) + sshd(8) now send window updates more aggressively. These improves + performance on high-BDP (Bandwidth Delay Product) networks. + - ssh(1) and sshd(8) now preserve MAC contexts between packets, which + saves 2 hash calls per packet and results in 12-16% speedup for + arcfour256/hmac-md5. + - A new MAC algorithm has been added, UMAC-64 (RFC4418) as + "umac-64@openssh.com". UMAC-64 has been measured to be approximately + 20% faster than HMAC-MD5. + - Failure to establish a ssh(1) TunnelForward is now treated as a fatal + error when the ExitOnForwardFailure option is set. + - ssh(1) returns a sensible exit status if the control master goes away + without passing the full exit status. + - When using a ProxyCommand in ssh(1), set the outgoing hostname with + gethostname(2), allowing hostbased authentication to work. + - Make scp(1) skip FIFOs rather than hanging (closes: #246774). + - Encode non-printing characters in scp(1) filenames. These could cause + copies to be aborted with a "protocol error". + - Handle SIGINT in sshd(8) privilege separation child process to ensure + that wtmp and lastlog records are correctly updated. + - Report GSSAPI mechanism in errors, for libraries that support multiple + mechanisms. + - Improve documentation for ssh-add(1)'s -d option. + - Rearrange and tidy GSSAPI code, removing server-only code being linked + into the client. + - Delay execution of ssh(1)'s LocalCommand until after all forwardings + have been established. + - In scp(1), do not truncate non-regular files. + - Improve exit message from ControlMaster clients. + - Prevent sftp-server(8) from reading until it runs out of buffer space, + whereupon it would exit with a fatal error (closes: #365541). + - pam_end() was not being called if authentication failed + (closes: #405041). + - Manual page datestamps updated (closes: #433181). + * Install the OpenSSH FAQ in /usr/share/doc/openssh-client. + - Includes documentation on copying files with colons using scp + (closes: #303453). + * Create /var/run/sshd on start even if /etc/ssh/sshd_not_to_be_run exists + (closes: #453285). + * Fix "overriden" typo in ssh(1) (thanks, A. Costa; closes: #390699). + * Refactor debian/rules configure and make invocations to make development + easier. + * Remove the hideously old /etc/ssh/primes on upgrade (closes: #123013). + * Update moduli(5) to revision 1.11 from OpenBSD CVS. + * Document the non-default options we set as standard in ssh_config(5) and + sshd_config(5) (closes: #327886, #345628). + * Recode LICENCE to UTF-8 when concatenating it to debian/copyright. + * Override desktop-file-but-no-dh_desktop-call lintian warning; the + .desktop file is intentionally not installed (see 1:3.8.1p1-10). + * Update copyright dates for Kerberos patch in debian/copyright.head. + * Policy version 3.7.3: no changes required. + + -- Colin Watson <cjwatson@debian.org> Mon, 24 Dec 2007 16:43:02 +0000 + +openssh (1:4.6p1-7) unstable; urgency=low + + * Don't build PIE executables on m68k (closes: #451192). + * Use autotools-dev's recommended configure --build and --host options. + * Adjust README.Debian to suggest mailing debian-ssh@lists.debian.org + rather than Matthew. + * Check whether deluser exists in postrm (closes: #454085). + + -- Colin Watson <cjwatson@debian.org> Mon, 03 Dec 2007 11:11:02 +0000 + +openssh (1:4.6p1-6) unstable; urgency=low + + * Remove blank line between head comment and first template in + debian/openssh-server.templates.master; apparently it confuses some + versions of debconf. + * Install authorized_keys(5) as a symlink to sshd(8) (thanks, Tomas + Pospisek; closes: #441817). + * Discard error output from dpkg-query in preinsts, in case the ssh + metapackage is not installed. + * Fix sshd/inittab advice in README.Debian to account for rc.d movement + (closes: #450632). + * Suppress error from debian/rules if lsb-release is not installed. + * Don't ignore errors from 'make -C contrib clean'. + * Adjust categories in ssh-askpass-gnome.desktop to comply with the + Desktop Menu Specification. + * debconf template translations: + - Add Slovak (thanks, Ivan Masár; closes: #441690). + - Update Brazilian Portuguese (thanks, Eder L. Marques; + closes: #447145). + + -- Colin Watson <cjwatson@debian.org> Mon, 12 Nov 2007 11:47:28 +0000 + +openssh (1:4.6p1-5) unstable; urgency=low + + * Identify ssh as a metapackage rather than a transitional package. It's + still useful as a quick way to install both the client and the server. + * ssh-copy-id now checks the exit status of ssh-add -L (thanks, Adeodato + Simó; closes: #221675). + * ssh-copy-id no longer prints the output of expr (thanks, Peter + Eisentraut; closes: #291534). + * ssh-copy-id defaults to ~/.ssh/id_rsa.pub rather than + ~/.ssh/identity.pub, in line with ssh-keygen (thanks, Greg Norris; + closes: #234627). + * Build-depend on libselinux1-dev on lpia. + * openssh-client Suggests: keychain. + * debconf template translations: + - Update Catalan (thanks, Jordà Polo; closes: #431970). + + -- Colin Watson <cjwatson@debian.org> Mon, 30 Jul 2007 09:34:38 +0100 + +openssh (1:4.6p1-4) unstable; urgency=low + + * Don't build PIE executables on hppa, as they crash. + + -- Colin Watson <cjwatson@debian.org> Thu, 05 Jul 2007 11:06:54 +0100 + +openssh (1:4.6p1-3) unstable; urgency=low + + * Only build PIE executables on Linux and NetBSD (closes: #430455). + * Fix broken switch fallthrough when SELinux is running in permissive mode + (closes: #430838). + * Document that HashKnownHosts may break tab-completion (closes: #430154). + + -- Colin Watson <cjwatson@debian.org> Fri, 29 Jun 2007 07:15:38 +0100 + +openssh (1:4.6p1-2) unstable; urgency=low + + * Fix ordering of SYSLOG_LEVEL_QUIET and SYSLOG_LEVEL_FATAL. + * Clarify that 'ssh -q -q' still prints errors caused by bad arguments + (i.e. before the logging system is initialised). + * Suppress "Connection to <host> closed" and "Connection to master closed" + messages at loglevel SILENT (thanks, Jaap Eldering; closes: #409788). + * Suppress "Pseudo-terminal will not be allocated because stdin is not a + terminal" message at loglevels QUIET and SILENT (closes: #366814). + * Document the SILENT loglevel in sftp-server(8), ssh_config(5), and + sshd_config(5). + * Add try-restart action to init script. + * Add /etc/network/if-up.d/openssh-server to restart sshd when new + interfaces appear (LP: #103436). + * Backport from upstream: + - Move C/R -> kbdint special case to after the defaults have been + loaded, which makes ChallengeResponse default to yes again. This was + broken by the Match changes and not fixed properly subsequently + (closes: #428968). + - Silence spurious error messages from hang-on-exit fix + (http://bugzilla.mindrot.org/show_bug.cgi?id=1306, closes: #429531). + + -- Colin Watson <cjwatson@debian.org> Wed, 20 Jun 2007 11:52:44 +0100 + +openssh (1:4.6p1-1) unstable; urgency=low + + * New upstream release (closes: #395507, #397961, #420035). Important + changes not previously backported to 4.3p2: + - 4.4/4.4p1 (http://www.openssh.com/txt/release-4.4): + + On portable OpenSSH, fix a GSSAPI authentication abort that could be + used to determine the validity of usernames on some platforms. + + Implemented conditional configuration in sshd_config(5) using the + "Match" directive. This allows some configuration options to be + selectively overridden if specific criteria (based on user, group, + hostname and/or address) are met. So far a useful subset of + post-authentication options are supported and more are expected to + be added in future releases. + + Add support for Diffie-Hellman group exchange key agreement with a + final hash of SHA256. + + Added a "ForceCommand" directive to sshd_config(5). Similar to the + command="..." option accepted in ~/.ssh/authorized_keys, this forces + the execution of the specified command regardless of what the user + requested. This is very useful in conjunction with the new "Match" + option. + + Add a "PermitOpen" directive to sshd_config(5). This mirrors the + permitopen="..." authorized_keys option, allowing fine-grained + control over the port-forwardings that a user is allowed to + establish. + + Add optional logging of transactions to sftp-server(8). + + ssh(1) will now record port numbers for hosts stored in + ~/.ssh/known_hosts when a non-standard port has been requested + (closes: #50612). + + Add an "ExitOnForwardFailure" option to cause ssh(1) to exit (with a + non-zero exit code) when requested port forwardings could not be + established. + + Extend sshd_config(5) "SubSystem" declarations to allow the + specification of command-line arguments. + + Replacement of all integer overflow susceptible invocations of + malloc(3) and realloc(3) with overflow-checking equivalents. + + Many manpage fixes and improvements. + + Add optional support for OpenSSL hardware accelerators (engines), + enabled using the --with-ssl-engine configure option. + + Tokens in configuration files may be double-quoted in order to + contain spaces (closes: #319639). + + Move a debug() call out of a SIGCHLD handler, fixing a hang when the + session exits very quickly (closes: #307890). + + Fix some incorrect buffer allocation calculations (closes: #410599). + + ssh-add doesn't ask for a passphrase if key file permissions are too + liberal (closes: #103677). + + Likewise, ssh doesn't ask either (closes: #99675). + - 4.6/4.6p1 (http://www.openssh.com/txt/release-4.6): + + sshd now allows the enabling and disabling of authentication methods + on a per user, group, host and network basis via the Match directive + in sshd_config. + + Fixed an inconsistent check for a terminal when displaying scp + progress meter (closes: #257524). + + Fix "hang on exit" when background processes are running at the time + of exit on a ttyful/login session (closes: #88337). + * Update to current GSSAPI patch from + http://www.sxw.org.uk/computing/patches/openssh-4.6p1-gsskex-20070312.patch; + install ChangeLog.gssapi. + * Build the .deb --with-ssl-engine (closes: #408027, LP: #119295). + * Use LSB functions in init scripts, and add an LSB-style header (partly + from Ubuntu and partly thanks to Christian Perrier; closes: #389038). + * Move init script start links to S16, move rc1 stop link to K84, and + remove rc0 and rc6 stop links altogether (the last part from Ubuntu; + closes: #122188). + * Emit a slightly more informative message from the init script if + /dev/null has somehow become not a character device (closes: #369964). + * Belatedly build-depend on zlib1g-dev (>= 1:1.2.3-1) (closes: #333447). + * Merge from Ubuntu: + - Build position-independent executables (only for debs, not for udebs) + to take advantage of address space layout randomisation. + - If building on Ubuntu, add /sbin, /usr/sbin, and /usr/local/sbin to + the default path. + * Use ${binary:Version} rather than ${Source-Version} in openssh-server -> + openssh-client dependency. + + -- Colin Watson <cjwatson@debian.org> Wed, 13 Jun 2007 00:28:26 +0100 + +openssh (1:4.3p2-11) unstable; urgency=low + + * It's been four and a half years now since I took over as "temporary" + maintainer, so the Maintainer field is getting a bit inaccurate. Set + Maintainer to debian-ssh@lists.debian.org and leave Matthew and myself + as Uploaders. + * Use dpkg-query to fetch conffile md5sums rather than parsing + /var/lib/dpkg/status directly. + * openssh-client Suggests: libpam-ssh (closes: #427840). + * Use 'start-stop-daemon --oknodo' so that openssh-server's init script + exits successfully if sshd is already running (closes: #426858). + + * Apply results of debconf templates and package descriptions review by + debian-l10n-english (closes: #420107, #420742). + * debconf template translations: + - Update Dutch (thanks, Machteld de Kok; closes: #419260). + - Update Norwegian Bokmål (thanks, Bjørn Steensrud; closes: #420630). + - Update Galician (thanks, Jacobo Tarrio; closes: #420635). + - Update Spanish (thanks, Javier Fernández-Sanguino Peña; + closes: #420651). + - Update Swedish (thanks, Daniel Nylander; closes: #420663). + - Add Bulgarian (thanks, Damyan Ivanov; closes: #420703). + - Add Tamil (thanks, Tirumurti Vasudevan; closes: #420739). + - Update German (thanks, Helge Kreutzmann; closes: #420743). + - Update Japanese (thanks, Kenshi Muto; closes: #420946). + - Add Basque (thanks, Piarres Beobide; closes: #421238). + - Update Italian (thanks, Luca Monducci; closes: #421348). + - Update Czech (thanks, Miroslav Kure; closes: #421484). + - Update Romanian (thanks, Igor Stirbu; closes: #421760). + - Update Russian (thanks, Yuriy Talakan' and Sergey Alyoshin; + closes: #420862). + - Update Dutch (thanks, Bart Cornelis; closes: #422767). + - Update Portuguese (thanks, Ricardo Silva; closes: #423112). + - Update French (thanks, Christian Perrier). + - Add Korean (thanks, Sunjae Park; closes: #424008). + - Update Vietnamese (thanks, Clytie Siddall; closes: #426991). + + -- Colin Watson <cjwatson@debian.org> Sun, 10 Jun 2007 08:59:42 +0100 + +openssh (1:4.3p2-10) unstable; urgency=low + + * Multiply openssh-client-udeb's Installer-Menu-Item by 100. + * Increase MAX_SESSIONS to 64. + + -- Colin Watson <cjwatson@debian.org> Tue, 10 Apr 2007 19:17:20 +0100 + +openssh (1:4.3p2-9) unstable; urgency=high + + [ Russ Allbery ] + * Fix GSSAPIKeyExchange configuration file handling logic in ssh-krb5 + (closes: #404863). + * Fix uncommenting of GSSAPI options by ssh-krb5 (closes: #407766). + + [ Colin Watson ] + * debconf template translations: + - Add Norwegian Bokmål (thanks, Bjørn Steensrud; closes: #412330). + + -- Colin Watson <cjwatson@debian.org> Mon, 5 Mar 2007 16:13:50 +0000 + +openssh (1:4.3p2-8) unstable; urgency=medium + + [ Vincent Untz ] + * Give the ssh-askpass-gnome window a default icon; remove unnecessary + icon extension from .desktop file (closes: + https://launchpad.net/bugs/27152). + + [ Colin Watson ] + * Drop versioning on ssh/ssh-krb5 Replaces, as otherwise it isn't + sufficient to replace conffiles (closes: #402804). + * Make GSSAPICleanupCreds a compatibility alias for + GSSAPICleanupCredentials. Mark GSSUseSessionCCache and + GSSAPIUseSessionCredCache as known-but-unsupported options, and migrate + away from them on upgrade. + * It turns out that the people who told me that removing a conffile in the + preinst was sufficient to have dpkg replace it without prompting when + moving a conffile between packages were very much mistaken. As far as I + can tell, the only way to do this reliably is to write out the desired + new text of the conffile in the preinst. This is gross, and requires + shipping the text of all conffiles in the preinst too, but there's + nothing for it. Fortunately this nonsense is only required for smooth + upgrades from sarge. + * debconf template translations: + - Add Romanian (thanks, Stan Ioan-Eugen; closes: #403528). + + -- Colin Watson <cjwatson@debian.org> Sat, 23 Dec 2006 18:38:33 +0000 + +openssh (1:4.3p2-7) unstable; urgency=medium + + [ Colin Watson ] + * Ignore errors from usermod when changing sshd's shell, since it will + fail if the sshd user is not local (closes: #398436). + * Remove version control tags from /etc/ssh/moduli and /etc/ssh/ssh_config + to avoid unnecessary conffile resolution steps for administrators + (thanks, Jari Aalto; closes: #335259). + * Fix quoting error in configure.ac and regenerate configure (thanks, Ben + Pfaff; closes: #391248). + * When installing openssh-client or openssh-server from scratch, remove + any unchanged conffiles from the pre-split ssh package to work around a + bug in sarge's dpkg (thanks, Justin Pryzby and others; closes: #335276). + + [ Russ Allbery ] + * Create transitional ssh-krb5 package which enables GSSAPI configuration + in sshd_config (closes: #390986). + * Default client to attempting GSSAPI authentication. + * Remove obsolete GSSAPINoMICAuthentication from sshd_config if it's + found. + * Add ssh -K option, the converse of -k, to enable GSSAPI credential + delegation (closes: #401483). + + -- Colin Watson <cjwatson@debian.org> Wed, 6 Dec 2006 23:00:49 +0000 + +openssh (1:4.3p2-6) unstable; urgency=low + + * Acknowledge NMU (thanks, Manoj; closes: #394795). + * Backport from 4.5p1: + - Fix a bug in the sshd privilege separation monitor that weakened its + verification of successful authentication. This bug is not known to be + exploitable in the absence of additional vulnerabilities. + * openssh-server Suggests: molly-guard (closes: #395473). + * debconf template translations: + - Update German (thanks, Helge Kreutzmann; closes: #395947). + + -- Colin Watson <cjwatson@debian.org> Wed, 15 Nov 2006 00:07:32 +0000 + +openssh (1:4.3p2-5.1) unstable; urgency=low + + * NMU to update SELinux patch, bringing it in line with current selinux + releases. The patch for this NMU is simply the Bug#394795 patch, + and no other changes. (closes: #394795) + + -- Manoj Srivastava <srivasta@debian.org> Mon, 23 Oct 2006 14:11:24 -0500 + +openssh (1:4.3p2-5) unstable; urgency=low + + * Remove ssh/insecure_telnetd check altogether (closes: #391081). + * debconf template translations: + - Update Danish (thanks, Claus Hindsgaul; closes: #390612). + + -- Colin Watson <cjwatson@debian.org> Thu, 5 Oct 2006 09:04:19 +0100 + +openssh (1:4.3p2-4) unstable; urgency=high + + * Backport from 4.4p1 (since I don't have an updated version of the GSSAPI + patch yet): + - CVE-2006-4924: Fix a pre-authentication denial of service found by + Tavis Ormandy, that would cause sshd(8) to spin until the login grace + time expired (closes: #389995). + - CVE-2006-5051: Fix an unsafe signal hander reported by Mark Dowd. The + signal handler was vulnerable to a race condition that could be + exploited to perform a pre-authentication denial of service. On + portable OpenSSH, this vulnerability could theoretically lead to + pre-authentication remote code execution if GSSAPI authentication is + enabled, but the likelihood of successful exploitation appears remote. + + * Read /etc/default/locale as well as /etc/environment (thanks, Raphaël + Hertzog; closes: #369395). + * Remove no-longer-used ssh/insecure_rshd debconf template. + * Make ssh/insecure_telnetd Type: error (closes: #388946). + + * debconf template translations: + - Update Portuguese (thanks, Rui Branco; closes: #381942). + - Update Spanish (thanks, Javier Fernández-Sanguino Peña; + closes: #382966). + + -- Colin Watson <cjwatson@debian.org> Fri, 29 Sep 2006 16:28:24 +0100 + +openssh (1:4.3p2-3) unstable; urgency=low + + * Document KeepAlive->TCPKeepAlive renaming in sshd_config(5) (closes: + https://launchpad.net/bugs/50702). + * Change sshd user's shell to /usr/sbin/nologin (closes: #366541). + Introduces dependency on passwd for usermod. + * debconf template translations: + - Update French (thanks, Denis Barbier; closes: #368503). + - Update Dutch (thanks, Bart Cornelis; closes: #375100). + - Update Japanese (thanks, Kenshi Muto; closes: #379950). + + -- Colin Watson <cjwatson@debian.org> Thu, 27 Jul 2006 00:12:36 +0100 + +openssh (1:4.3p2-2) unstable; urgency=low + + * Include commented-out pam_access example in /etc/pam.d/ssh. + * On '/etc/init.d/ssh restart', create /var/run/sshd before checking the + server configuration, as otherwise 'sshd -t' will complain about the + lack of /var/run/sshd (closes: https://launchpad.net/bugs/45234). + * debconf template translations: + - Update Russian (thanks, Yuriy Talakan'; closes: #367143). + - Update Czech (thanks, Miroslav Kure; closes: #367161). + - Update Italian (thanks, Luca Monducci; closes: #367186). + - Update Galician (thanks, Jacobo Tarrio; closes: #367318). + - Update Swedish (thanks, Daniel Nylander; closes: #367971). + + -- Colin Watson <cjwatson@debian.org> Fri, 19 May 2006 09:14:27 +0100 + +openssh (1:4.3p2-1) unstable; urgency=low + + * New upstream release (closes: #361032). + - CVE-2006-0225: scp (as does rcp, on which it is based) invoked a + subshell to perform local to local, and remote to remote copy + operations. This subshell exposed filenames to shell expansion twice; + allowing a local attacker to create filenames containing shell + metacharacters that, if matched by a wildcard, could lead to execution + of attacker-specified commands with the privilege of the user running + scp (closes: #349645). + - Add support for tunneling arbitrary network packets over a connection + between an OpenSSH client and server via tun(4) virtual network + interfaces. This allows the use of OpenSSH (4.3+) to create a true VPN + between the client and server providing real network connectivity at + layer 2 or 3. This feature is experimental. + - Reduce default key length for new DSA keys generated by ssh-keygen + back to 1024 bits. DSA is not specified for longer lengths and does + not fully benefit from simply making keys longer. As per FIPS 186-2 + Change Notice 1, ssh-keygen will refuse to generate a new DSA key + smaller or larger than 1024 bits. + - Fixed X forwarding failing to start when the X11 client is executed in + background at the time of session exit. + - Change ssh-keygen to generate a protocol 2 RSA key when invoked + without arguments (closes: #114894). + - Fix timing variance for valid vs. invalid accounts when attempting + Kerberos authentication. + - Ensure that ssh always returns code 255 on internal error + (closes: #259865). + - Cleanup wtmp files on SIGTERM when not using privsep. + - Set SO_REUSEADDR on X11 listeners to avoid problems caused by + lingering sockets from previous session (X11 applications can + sometimes not connect to 127.0.0.1:60xx) (closes: + https://launchpad.net/bugs/25528). + - Ensure that fds 0, 1 and 2 are always attached in all programs, by + duping /dev/null to them if necessary. + - Xauth list invocation had bogus "." argument. + - Remove internal assumptions on key exchange hash algorithm and output + length, preparing OpenSSH for KEX methods with alternate hashes. + - Ignore junk sent by a server before it sends the "SSH-" banner. + - Many manual page improvements. + - Lots of cleanups, including fixes to memory leaks on error paths and + possible crashes. + * Update to current GSSAPI patch from + http://www.sxw.org.uk/computing/patches/openssh-4.3p2-gsskex-20060223.patch + (closes: #352042). + * debian/rules: Resynchronise CFLAGS with that generated by configure. + * Restore pam_nologin to /etc/pam.d/ssh; sshd no longer checks this itself + when PAM is enabled, but relies on PAM to do it. + * Rename KeepAlive to TCPKeepAlive in default sshd_config + (closes: #349896). + * Rephrase ssh/new_config and ssh/encrypted_host_key_but_no_keygen debconf + templates to make boolean short descriptions end with a question mark + and to avoid use of the first person. + * Ship README.tun. + * Policy version 3.7.2: no changes required. + * debconf template translations: + - Update Italian (thanks, Luca Monducci; closes: #360348). + - Add Galician (thanks, Jacobo Tarrio; closes: #361220). + + -- Colin Watson <cjwatson@debian.org> Fri, 12 May 2006 12:48:24 +0100 + +openssh (1:4.2p1-8) unstable; urgency=low + + [ Frans Pop ] + * Use udeb support introduced in debhelper 4.2.0 (available in sarge) + rather than constructing udebs by steam. + * Require debhelper 5.0.22, which generates correct shared library + dependencies for udebs (closes: #360068). This build-dependency can be + ignored if building on sarge. + + [ Colin Watson ] + * Switch to debhelper compatibility level 4, since we now require + debhelper 4 even on sarge anyway for udeb support. + + -- Colin Watson <cjwatson@debian.org> Fri, 31 Mar 2006 09:44:55 +0100 + +openssh (1:4.2p1-7) unstable; urgency=low + + * I accidentally applied the default $PATH change in 1:4.2p1-6 to the udeb + rather than the deb. Fixed. + + -- Colin Watson <cjwatson@debian.org> Wed, 1 Mar 2006 16:19:00 +0000 + +openssh (1:4.2p1-6) unstable; urgency=low + + * Sync default values of $PATH from shadow 1:4.0.12-6, adding /usr/bin/X11 + to the normal and superuser paths and /usr/games to the normal path. + * When the client receives a signal, don't fatal() with "Killed by signal + %d." (which produces unhelpful noise on stderr and causes confusion for + users of some applications that wrap ssh); instead, generate a debug + message and exit with the traditional status (closes: #313371). + * debconf template translations: + - Add Swedish (thanks, Daniel Nylander; closes: #333133). + - Update Spanish (thanks, Javier Fernández-Sanguino Peña; + closes: #341371). + - Correct erroneously-changed Last-Translator headers in Greek and + Spanish translations. + + -- Colin Watson <cjwatson@debian.org> Mon, 20 Feb 2006 16:50:55 +0000 + +openssh (1:4.2p1-5) unstable; urgency=low + + * Add a CVE name to the 1:4.0p1-1 changelog entry. + * Build-depend on libselinux1-dev on armeb. + * Only send GSSAPI proposal if GSSAPIAuthentication is enabled. + * Build-depend on libssl-dev (>= 0.9.8-1) to cope with surprise OpenSSL + transition, since otherwise who knows what the buildds will do. If + you're building openssh yourself, you can safely ignore this and use an + older libssl-dev. + + -- Colin Watson <cjwatson@debian.org> Fri, 7 Oct 2005 12:23:42 +0100 + +openssh (1:4.2p1-4) unstable; urgency=low + + * Initialise token to GSS_C_EMPTY_BUFFER in ssh_gssapi_check_mechanism + (closes: #328606). + + -- Colin Watson <cjwatson@debian.org> Fri, 16 Sep 2005 12:50:16 +0100 + +openssh (1:4.2p1-3) unstable; urgency=low + + * Add prototype for ssh_gssapi_server_mechanisms (closes: #328372). + * Interoperate with ssh-krb5 << 3.8.1p1-1 servers, which used a slightly + different version of the gssapi authentication method (thanks, Aaron M. + Ucko; closes: #328388). + * Explicitly tell po2debconf to use the 'popular' output encoding, so that + the woody-compatibility hack works even with po-debconf 0.9.0. + + -- Colin Watson <cjwatson@debian.org> Thu, 15 Sep 2005 09:28:21 +0100 + +openssh (1:4.2p1-2) unstable; urgency=low + + * Annotate 1:4.2p1-1 changelog with CVE references. + * Add remaining pieces of Kerberos support (closes: #152657, #275472): + - Add GSSAPI key exchange support from + http://www.sxw.org.uk/computing/patches/openssh.html (thanks, Stephen + Frost). + - Build-depend on libkrb5-dev and configure --with-kerberos5=/usr. + - openssh-client and openssh-server replace ssh-krb5. + - Update commented-out Kerberos/GSSAPI options in default sshd_config. + - Fix HAVE_GSSAPI_KRB5_H/HAVE_GSSAPI_GSSAPI_KRB5_H typos in + gss-serv-krb5.c. + + -- Colin Watson <cjwatson@debian.org> Wed, 14 Sep 2005 18:28:49 +0100 + +openssh (1:4.2p1-1) unstable; urgency=low + + * New upstream release. + - SECURITY (CAN-2005-2797): Fix a bug introduced in OpenSSH 4.0 that + caused GatewayPorts to be incorrectly activated for dynamic ("-D") + port forwardings when no listen address was explicitly specified + (closes: #326065). + - SECURITY (CAN-2005-2798): Fix improper delegation of GSSAPI + credentials. This code is only built in openssh-krb5, not openssh, but + I mention the CVE reference here anyway for completeness. + - Add a new compression method ("Compression delayed") that delays zlib + compression until after authentication, eliminating the risk of zlib + vulnerabilities being exploited by unauthenticated users. Note that + users of OpenSSH versions earlier than 3.5 will need to disable + compression on the client or set "Compression yes" (losing this + security benefit) on the server. + - Increase the default size of new RSA/DSA keys generated by ssh-keygen + from 1024 to 2048 bits (closes: #181162). + - Many bugfixes and improvements to connection multiplexing. + - Don't pretend to accept $HOME (closes: #208648). + * debian/rules: Resynchronise CFLAGS with that generated by configure. + * openssh-client and openssh-server conflict with pre-split ssh to avoid + problems when ssh is left un-upgraded (closes: #324695). + * Set X11Forwarding to yes in the default sshd_config (new installs only). + At least when X11UseLocalhost is turned on, which is the default, the + security risks of using X11 forwarding are risks to the client, not to + the server (closes: #320104). + + -- Colin Watson <cjwatson@debian.org> Wed, 14 Sep 2005 15:16:14 +0100 + +openssh (1:4.1p1-7) unstable; urgency=low + + * Do the IDEA host key check on a temporary file to avoid altering + /etc/ssh/ssh_host_key itself (closes: #312312). + * Work around the ssh-askpass alternative somehow ending up in manual mode + pointing to the obsolete /usr/lib/ssh/gnome-ssh-askpass. + * Add GNU/kFreeBSD support (thanks, Aurelien Jarno; closes: #318113). + * Fix XSIish uses of 'test' in openssh-server.preinst. + * Policy version 3.6.2: no changes required. + + -- Colin Watson <cjwatson@debian.org> Fri, 2 Sep 2005 16:18:11 +0100 + +openssh (1:4.1p1-6) unstable; urgency=low + + * Fix one-character typo that meant the binaries in openssh-client and + openssh-server got recompiled with the wrong options during + 'debian/rules install' (closes: #317088, #317238, #317241). + + -- Colin Watson <cjwatson@debian.org> Thu, 7 Jul 2005 10:56:16 +0100 + +openssh (1:4.1p1-5) unstable; urgency=low + + * Build-depend on libselinux1-dev on ppc64 too (closes: #314625). + * Drop priority of ssh to extra to match the override file. + * Make /usr/share/doc/openssh-server and /usr/share/doc/ssh symlinks to + /usr/share/doc/openssh-client (closes: #314745). + * Ship README.dns (closes: #284874). + * Disable btmp logging, since Debian's /var/log/btmp has inappropriate + permissions (closes: #314956). + * Allow ~/.ssh/config to be group-writable, provided that the group in + question contains only the file's owner (closes: #314347). + * debconf template translations: + - Update Brazilian Portuguese (thanks, André Luís Lopes; + closes: #315477). + - Add Vietnamese (thanks, Clytie Siddall; closes: #316636). + + -- Colin Watson <cjwatson@debian.org> Sun, 3 Jul 2005 17:08:08 +0100 + +openssh (1:4.1p1-4) unstable; urgency=low + + * openssh-client and openssh-server conflict with ssh-krb5, as ssh-krb5 + only conflicts with ssh (closes: #312475). + * SELinux support (thanks, Manoj Srivastava; closes: #308555): + - Added SELinux capability, and turned it on be default. Added + restorecon calls in preinst and postinst (should not matter if the + machine is not SELinux aware). By and large, the changes made should + have no effect unless the rules file calls --with-selinux; and even + then there should be no performance hit for machines not actively + running SELinux. + - Modified the preinst and postinst to call restorecon to set the + security context for the generated public key files. + - Added a comment to /etc/pam.d/ssh to indicate that an SELinux system + may want to also include pam_selinux.so. + * Re-enable ssh-askpass-gnome on the Hurd, now that its build-dependencies + are available. + * Restore /usr/lib/sftp-server temporarily, as a symlink to + /usr/lib/openssh/sftp-server (closes: #312891). + * Switch to debhelper compatibility level 3, since 2 is deprecated. + * debconf template translations: + - Update German (thanks, Jens Seidel; closes: #313949). + + -- Colin Watson <cjwatson@debian.org> Fri, 17 Jun 2005 14:20:20 +0100 + +openssh (1:4.1p1-3) unstable; urgency=low + + * Upload to unstable. + + -- Colin Watson <cjwatson@debian.org> Mon, 6 Jun 2005 22:28:33 +0100 + +openssh (1:4.1p1-2) experimental; urgency=low + + * Drop debconf support for allowing SSH protocol 1, which is discouraged + and has not been the default since openssh 1:3.0.1p1-1. Users who need + this should edit sshd_config instead (closes: #147212). + * Since ssh-keysign isn't used by default (you need to set + EnableSSHKeysign to "yes" in /etc/ssh/ssh_config), having a debconf + question to ask whether it should be setuid is overkill, and the + question text had got out of date anyway. Remove this question, ship + ssh-keysign setuid in openssh-client.deb, and set a statoverride if the + debconf question was previously set to false. + * Add lintian overrides for the above (setuid-binary, + no-debconf-templates). + * Fix picky lintian errors about slogin symlinks. + * Fix DEB_HOST_ARCH_OS/DEB_HOST_GNU_SYSTEM compatibility handling. + * Apply Linux 2.2 workaround (see #239999) only on Linux. + + -- Colin Watson <cjwatson@debian.org> Thu, 2 Jun 2005 00:55:58 +0100 + +openssh (1:4.1p1-1) experimental; urgency=low + + * New upstream release. + - Normalise socket addresses returned by get_remote_hostname(), fixing + 4-in-6 mapping issues with AllowUsers et al (closes: #192234). + * Take upstream's hint and disable the unsupported USE_POSIX_THREADS + (closes: #295757, #308868, and possibly others; may open other bugs). + Use PAM password authentication to avoid #278394. In future I may + provide two sets of binaries built with and without this option, since + it seems I can't win. + * Disable ChallengeResponseAuthentication in new installations, returning + to PasswordAuthentication by default, since it now supports PAM and + apparently works better with a non-threaded sshd (closes: #247521). + * openssh-server Suggests: rssh (closes: #233012). + * Change libexecdir to /usr/lib/openssh, and fix up various alternatives + and configuration files to match (closes: #87900, #151321). + * Fix up very old sshd_config files that refer to /usr/libexec/sftp-server + (closes: #141979). + + -- Colin Watson <cjwatson@debian.org> Tue, 31 May 2005 01:33:33 +0100 + +openssh (1:4.0p1-1) experimental; urgency=low + + * New upstream release. + - Port-forwarding specifications now take optional bind addresses, and + the server allows client-specified bind addresses for remote port + forwardings when configured with "GatewayPorts clientspecified" + (closes: #87253, #192206). + - ssh and ssh-keyscan now support hashing of known_hosts files for + improved privacy (CAN-2005-2666). ssh-keygen has new options for + managing known_hosts files, which understand hashing. + - sftp supports command history and editing support using libedit + (closes: #287013). + - Have scp and sftp wait for the spawned ssh to exit before they exit + themselves, allowing ssh to restore terminal modes (closes: #257130). + - Improved the handling of bad data in authorized_keys files, + eliminating fatal errors on corrupt or very large keys; e.g. linefeeds + in keys only produce errors in auth.log now (closes: #220726). + - Add "command mode" to ssh connection multiplexing (closes: #303452). + - Mention $HOME/.hushlogin in sshd(8) FILES section (closes: #163933). + * Make gnome-ssh-askpass stay above other windows (thanks, Liyang HU; + closes: #296487). + * Remove obsolete and unnecessary ssh/forward_warning debconf note. + * Hurd build fixes (although sshd still doesn't work): + - Restore X forwarding fix from #102991, lost somewhere along the way. + - Link with -lcrypt. + - Link with -lpthread rather than -pthread. + - Don't build ssh-askpass-gnome on the Hurd, until GNOME is available to + satisfy build-dependencies. + * Drop workaround for #242462 on amd64; it's been fixed properly upstream. + * Enable HashKnownHosts by default. This only affects new entries; use + 'ssh-keygen -H' to convert an entire known_hosts file to hashed format. + * Note in ssh_config(5) that the SetupTimeOut option is Debian-specific + (closes: #307069). + * debconf template translations: + - Update Czech (thanks, Miroslav Kure; closes: #298744). + - Update Finnish (thanks, Matti Pöllä; closes: #303787). + - Synchronise Spanish with sarge branch (thanks, Javier + Fernández-Sanguino Peña; closes: #298536). + - Add Ukrainian (thanks, Eugeniy Meshcheryakov; closes: #301852). + + -- Colin Watson <cjwatson@debian.org> Thu, 26 May 2005 11:23:18 +0100 + +openssh (1:3.9p1-3) experimental; urgency=low + + * Explain how to run sshd from inittab in README.Debian (closes: #147360). + * Add debian/watch file. + + -- Colin Watson <cjwatson@debian.org> Fri, 18 Feb 2005 00:20:16 +0000 + +openssh (1:3.9p1-2) experimental; urgency=low + + * Remove pam_nologin from /etc/pam.d/ssh, as sshd's built-in support + appears to be sufficient and more useful (closes: #162996). + * Depend on debconf | debconf-2.0. + * Drop LoginGraceTime back to the upstream default of two minutes on new + installs (closes: #289573). + * debconf template translations from Ubuntu bug #1232: + - Update Greek (thanks, Logiotatidis George). + - Update Spanish (thanks, Santiago Erquicia). + + -- Colin Watson <cjwatson@debian.org> Sat, 15 Jan 2005 12:37:54 +0000 + +openssh (1:3.9p1-1) experimental; urgency=low + + * New upstream release. + - PAM password authentication implemented again (closes: #238699, + #242119). + - Implemented the ability to pass selected environment variables between + the client and the server. + - Fix ssh-keyscan breakage when remote server doesn't speak SSH protocol + (closes: #228828). + - Fix res_query detection (closes: #242462). + - 'ssh -c' documentation improved (closes: #265627). + * Pass LANG and LC_* environment variables from the client by default, and + accept them to the server by default in new installs, although not on + upgrade (closes: #264024). + * Build ssh in binary-indep, not binary-arch (thanks, LaMont Jones). + * Expand on openssh-client package description (closes: #273831). + + -- Colin Watson <cjwatson@debian.org> Tue, 4 Jan 2005 14:18:31 +0000 + +openssh (1:3.8.1p1-14) experimental; urgency=low + + * We use DH_COMPAT=2, so build-depend on debhelper (>= 2). + * Fix timing information leak allowing discovery of invalid usernames in + PAM keyboard-interactive authentication (backported from a patch by + Darren Tucker; closes: #281595). + * Make sure that there's a delay in PAM keyboard-interactive + authentication when PermitRootLogin is not set to yes and the correct + root password is entered (closes: #248747). + + -- Colin Watson <cjwatson@debian.org> Sun, 28 Nov 2004 18:09:37 +0000 + +openssh (1:3.8.1p1-13) experimental; urgency=low + + * Enable threading for PAM, on Sam Hartman's advice (closes: #278394). + * debconf template translations: + - Update Dutch (thanks, cobaco; closes: #278715). + * Correct README.Debian's ForwardX11Trusted description (closes: #280190). + + -- Colin Watson <cjwatson@debian.org> Fri, 12 Nov 2004 12:03:13 +0000 + +openssh (1:3.8.1p1-12) experimental; urgency=low + + * Preserve /etc/ssh/sshd_config ownership/permissions (closes: #276754). + * Shorten the version string from the form "OpenSSH_3.8.1p1 Debian + 1:3.8.1p1-8.sarge.1" to "OpenSSH_3.8.1p1 Debian-8.sarge.1", as some SSH + implementations apparently have problems with the long version string. + This is of course a bug in those implementations, but since the extent + of the problem is unknown it's best to play safe (closes: #275731). + * debconf template translations: + - Add Finnish (thanks, Matti Pöllä; closes: #265339). + - Update Danish (thanks, Morten Brix Pedersen; closes: #275895). + - Update French (thanks, Denis Barbier; closes: #276703). + - Update Japanese (thanks, Kenshi Muto; closes: #277438). + + -- Colin Watson <cjwatson@debian.org> Sun, 24 Oct 2004 19:21:17 +0100 + +openssh (1:3.8.1p1-11) experimental; urgency=high + + * Move sshd_config(5) to openssh-server, where it belongs. + * If PasswordAuthentication is disabled, then offer to disable + ChallengeResponseAuthentication too. The current PAM code will attempt + password-style authentication if ChallengeResponseAuthentication is + enabled (closes: #250369). + * This will ask a question of anyone who installed fresh with 1:3.8p1-2 or + later and then upgraded. Sorry about that ... for this reason, the + default answer is to leave ChallengeResponseAuthentication enabled. + + -- Colin Watson <cjwatson@debian.org> Wed, 6 Oct 2004 14:28:20 +0100 + +openssh (1:3.8.1p1-10) experimental; urgency=low + + * Don't install the ssh-askpass-gnome .desktop file by default; I've had + too many GNOME people tell me it's the wrong thing to be doing. I've + left it in /usr/share/doc/ssh-askpass-gnome/examples/ for now. + + -- Colin Watson <cjwatson@debian.org> Wed, 25 Aug 2004 18:18:14 +0100 + +openssh (1:3.8.1p1-9) experimental; urgency=low + + * Split the ssh binary package into openssh-client and openssh-server + (closes: #39741). openssh-server depends on openssh-client for some + common functionality; it didn't seem worth creating yet another package + for this. openssh-client is priority standard, openssh-server optional. + * New transitional ssh package, priority optional, depending on + openssh-client and openssh-server. May be removed once nothing depends + on it. + * When upgrading from ssh to openssh-{client,server}, it's very difficult + for the maintainer scripts to find out what version we're upgrading from + without dodgy dpkg hackery. I've therefore taken the opportunity to move + a couple of debconf notes into NEWS files, namely ssh/ssh2_keys_merged + and ssh/user_environment_tell. + * Add a heuristic to try to make sure the sshd_config upgrade to >= 3.7 + happens even though we don't know what version we're upgrading from. + * Remove /etc/ssh/sshd_not_to_be_run on purge of openssh-server. For now + (until sarge+2) it's still honoured to avoid breaking existing + configurations, but the right approach is now to remove the + openssh-server package if you don't want to run the server. Add a NEWS + item to that effect. + + -- Colin Watson <cjwatson@debian.org> Mon, 2 Aug 2004 20:48:54 +0100 + +openssh (1:3.8.1p1-8.sarge.4) unstable; urgency=high + + * Fix timing information leak allowing discovery of invalid usernames in + PAM keyboard-interactive authentication (backported from a patch by + Darren Tucker; closes: #281595). + * Make sure that there's a delay in PAM keyboard-interactive + authentication when PermitRootLogin is not set to yes and the correct + root password is entered (closes: #248747). + + -- Colin Watson <cjwatson@debian.org> Sun, 28 Nov 2004 12:37:16 +0000 + +openssh (1:3.8.1p1-8.sarge.3) unstable; urgency=low + + * Enable threading for PAM, on Sam Hartman's advice (closes: #278394). + * debconf template translations: + - Update Dutch (thanks, cobaco; closes: #278715). + * Correct README.Debian's ForwardX11Trusted description (closes: #280190). + + -- Colin Watson <cjwatson@debian.org> Fri, 12 Nov 2004 10:31:12 +0000 + +openssh (1:3.8.1p1-8.sarge.2) unstable; urgency=low + + * Preserve /etc/ssh/sshd_config ownership/permissions (closes: #276754). + * Shorten the version string from the form "OpenSSH_3.8.1p1 Debian + 1:3.8.1p1-8.sarge.1" to "OpenSSH_3.8.1p1 Debian-8.sarge.1", as some SSH + implementations apparently have problems with the long version string. + This is of course a bug in those implementations, but since the extent + of the problem is unknown it's best to play safe (closes: #275731). + * debconf template translations: + - Add Finnish (thanks, Matti Pöllä; closes: #265339). + - Update Danish (thanks, Morten Brix Pedersen; closes: #275895). + - Update French (thanks, Denis Barbier; closes: #276703). + - Update Japanese (thanks, Kenshi Muto; closes: #277438). + + -- Colin Watson <cjwatson@debian.org> Sun, 24 Oct 2004 17:57:14 +0100 + +openssh (1:3.8.1p1-8.sarge.1) unstable; urgency=high + + * If PasswordAuthentication is disabled, then offer to disable + ChallengeResponseAuthentication too. The current PAM code will attempt + password-style authentication if ChallengeResponseAuthentication is + enabled (closes: #250369). + * This will ask a question of anyone who installed fresh with 1:3.8p1-2 or + later and then upgraded. Sorry about that ... for this reason, the + default answer is to leave ChallengeResponseAuthentication enabled. + + -- Colin Watson <cjwatson@debian.org> Wed, 6 Oct 2004 14:21:55 +0100 + +openssh (1:3.8.1p1-8) unstable; urgency=high + + * Matthew Vernon: + - Add a GPL exception to the licensing terms of the Debian patch + (closes: #211644). + + -- Colin Watson <cjwatson@debian.org> Thu, 29 Jul 2004 13:28:47 +0100 + +openssh (1:3.8.1p1-7) unstable; urgency=low + + * Re-enable shadow password support in openssh-server-udeb, at Bastian + Blank's request (closes: #260800). + + -- Colin Watson <cjwatson@debian.org> Thu, 22 Jul 2004 10:56:06 +0100 + +openssh (1:3.8.1p1-6) unstable; urgency=low + + * Implement hack in + http://lists.debian.org/debian-boot/2004/07/msg01207.html to get + openssh-client-udeb to show up as a retrievable debian-installer + component. + * Generate host keys in postinst only if the relevant HostKey directives + are found in sshd_config (closes: #87946). + + -- Colin Watson <cjwatson@debian.org> Wed, 21 Jul 2004 15:14:46 +0100 + +openssh (1:3.8.1p1-5) unstable; urgency=medium + + * Update German debconf template translation (thanks, Helge Kreutzmann; + closes: #252226). + * Remove Suggests: dnsutils, as it was only needed for + make-ssh-known-hosts (#93265), which has been replaced by ssh-keyscan. + * Disable shadow password support in openssh-server-udeb. + * Fix non-portable shell constructs in maintainer scripts, Makefile, and + ssh-copy-id (thanks, David Weinehall; closes: #258517). + * Apply patch from Darren Tucker to make the PAM authentication SIGCHLD + handler kill the PAM thread if its waitpid() call returns 0, as well as + the previous check for -1 (closes: #252676). + * Add scp and sftp to openssh-client-udeb. It might not be very 'u' any + more; oh well. + + -- Colin Watson <cjwatson@debian.org> Sat, 10 Jul 2004 13:57:27 +0100 + +openssh (1:3.8.1p1-4) unstable; urgency=medium + + * Kill off PAM thread if privsep slave dies (closes: #248125). + + -- Colin Watson <cjwatson@debian.org> Fri, 28 May 2004 17:58:45 -0300 + +openssh (1:3.8.1p1-3) unstable; urgency=low + + * Add ssh-keygen to openssh-server-udeb. + + -- Colin Watson <cjwatson@debian.org> Thu, 20 May 2004 16:31:52 +0100 + +openssh (1:3.8.1p1-2) unstable; urgency=low + + * Add Catalan debconf template translation (thanks, Aleix Badia i Bosch; + closes: #248748). + * openssh-client-udeb and openssh-server-udeb depend on libnss-files-udeb + (not yet uploaded). + * Restore ssh-askpass-gnome binary, lost by mistake. + * Don't link against libnsl in udeb builds. + + -- Colin Watson <cjwatson@debian.org> Thu, 20 May 2004 11:15:58 +0100 + +openssh (1:3.8.1p1-1) unstable; urgency=low + + * New upstream release. + - Use a longer buffer for tty names in utmp (closes: #247538). + * Make sure there's a newline at the end of sshd_config before adding + 'UsePAM yes' (closes: #244829). + * Generate a new .orig.tar.gz without RFC.nroff, and remove + /usr/share/doc/ssh/RFC.gz (closes: #211640). It isn't DFSG-free and only + documents the obsolete SSH1 protocol, not to mention that it was never a + real RFC but only an Internet-Draft. It's available from + http://www.free.lp.se/bamse/draft-ylonen-ssh-protocol-00.txt if you want + it for some reason. + * Add openssh-client-udeb and openssh-server-udeb binary packages for use + in debian-installer. They still need libnss_files to be supplied in udeb + form by glibc. + * Work around lack of res_query weak alias in libresolv on amd64 (see + #242462, awaiting real fix upstream). + * Fix grammar in sshd(8) (closes: #238753). + * Add .desktop file and icon for ssh-askpass-gnome (closes: #232333). + * Update Polish debconf template translation (thanks, Emil Nowak; + closes: #242808). + * Add Turkish debconf template translation (thanks, Recai Oktaş; + closes: #246068). + + -- Colin Watson <cjwatson@debian.org> Tue, 11 May 2004 23:38:10 +0100 + +openssh (1:3.8p1-3) unstable; urgency=low + + * Remove deprecated ReverseMappingCheck option from newly generated + sshd_config files (closes: #239987). + * Build everything apart from contrib in a subdirectory, to allow for + multiple builds. + * Some older kernels are missing setresuid() and setresgid(), so don't try + to use them. setreuid() and setregid() will do well enough for our + purposes (closes: #239999). + + -- Colin Watson <cjwatson@debian.org> Mon, 5 Apr 2004 21:23:43 +0100 + +openssh (1:3.8p1-2) unstable; urgency=medium + + * Disable PasswordAuthentication for new installations (closes: #236810). + * Turn off the new ForwardX11Trusted by default, returning to the + semantics of 3.7 and earlier, since it seems immature and causes far too + many problems with existing setups. See README.Debian for details + (closes: #237021). + + -- Colin Watson <cjwatson@debian.org> Wed, 10 Mar 2004 10:33:07 +0000 + +openssh (1:3.8p1-1) unstable; urgency=low + + * New upstream release (closes: #232281): + - New PAM implementation based on that in FreeBSD. This runs PAM session + modules before dropping privileges (closes: #132681, #150968). + - Since PAM session modules are run as root, we can turn pam_limits back + on by default, and it no longer spits out "Operation not permitted" to + syslog (closes: #171673). + - Password expiry works again (closes: #153235). + - 'ssh -q' suppresses login banner (closes: #134589). + - sshd doesn't lie to PAM about invalid usernames (closes: #157078). + - ssh-add prints key comment on each prompt (closes: #181869). + - Punctuation formatting fixed in man pages (closes: #191131). + - EnableSSHKeysign documented in ssh_config(5) (closes: #224457). + * Add 'UsePAM yes' to /etc/ssh/sshd_config on upgrade from versions older + than this, to maintain the standard Debian sshd configuration. + * Comment out PAMAuthenticationViaKbdInt and RhostsAuthentication in + sshd_config on upgrade. Neither option is supported any more. + * Privilege separation and PAM are now properly supported together, so + remove both debconf questions related to them and simply set it + unconditionally in newly generated sshd_config files (closes: #228838). + * ServerAliveInterval implemented upstream, so ProtocolKeepAlives is now a + compatibility alias. The semantics differ slightly, though; see + ssh_config(5) for details. + * Implement SSH1 support for ServerAliveInterval using SSH_MSG_IGNORE. As + documented in ssh_config(5), it's not as good as the SSH2 version. + * Remove -fno-builtin-log, -DHAVE_MMAP_ANON_SHARED, and + -D__FILE_OFFSET_BITS=64 compiler options, which are no longer necessary. + * Update config.guess and config.sub from autotools-dev 20040105.1. + * Darren Tucker: + - Reset signal status when starting pam auth thread, prevent hanging + during PAM keyboard-interactive authentications. + - Fix a non-security-critical segfault in PAM authentication. + * Add debconf template translations: + - Greek (thanks, Konstantinos Margaritis; closes: #232843). + - Italian (thanks, Renato Gini; closes: #234777). + + -- Colin Watson <cjwatson@debian.org> Sat, 6 Mar 2004 18:43:44 +0000 + +openssh (1:3.6.1p2-12) unstable; urgency=low + + * Update Spanish debconf template translation (thanks, Javier + Fernández-Sanguino Peña; closes: #228242). + * Add debconf template translations: + - Czech (thanks, Miroslav Kure; closes: #230110). + - Simplified Chinese (thanks, Hiei Xu; closes: #230726). + + -- Colin Watson <cjwatson@debian.org> Wed, 11 Feb 2004 09:37:57 +0000 + +openssh (1:3.6.1p2-11) unstable; urgency=low + + * Comment out pam_limits in default configuration, for now at least + (closes: #198254). + * Use invoke-rc.d (if it exists) to run the init script. + * Backport format string bug fix in sshconnect.c (closes: #225238). + * ssh-copy-id exits if ssh fails (closes: #215252). + + -- Colin Watson <cjwatson@debian.org> Sun, 4 Jan 2004 18:59:21 +0000 + +openssh (1:3.6.1p2-10) unstable; urgency=low + + * Use --retry in init script when restarting rather than sleeping, to make + sure the old process is dead (thanks, Herbert Xu; closes: #212117). + Depend on dpkg (>= 1.9.0) for start-stop-daemon's --retry option. + * Update debconf template translations: + - Brazilian Portuguese (thanks, Andre Luis Lopes; closes: #219844). + - Danish (thanks, Morten Brix Pedersen; closes: #217964). + - Japanese (thanks, Kenshi Muto; closes: #212497). + - Russian (thanks, Ilgiz Kalmetev). + - Spanish (thanks, Carlos Valdivia Yagüe; closes: #211832). + * Add Dutch debconf template translation (thanks, cobaco; + closes: #215372). + * Update config.guess and config.sub from autotools-dev 20031007.1 + (closes: #217696). + * Implement New World Order for PAM configuration, including + /etc/pam.d/common-* from /etc/pam.d/ssh (closes: #212959). + - To backport this release to woody, you need to set DEB_BUILD_SSH_WOODY + in your environment. See README.Debian. + * Add more commentary to /etc/pam.d/ssh. + + -- Colin Watson <cjwatson@debian.org> Sun, 16 Nov 2003 01:14:16 +0000 + +openssh (1:3.6.1p2-9) unstable; urgency=high + + * Merge even more buffer allocation fixes from upstream (CAN-2003-0682; + closes: #211434). + + -- Colin Watson <cjwatson@debian.org> Fri, 19 Sep 2003 10:25:25 +0100 + +openssh (1:3.6.1p2-8) unstable; urgency=high + + * Merge more buffer allocation fixes from new upstream version 3.7.1p1 + (closes: #211324). + + -- Colin Watson <cjwatson@debian.org> Wed, 17 Sep 2003 03:07:19 +0100 + +openssh (1:3.6.1p2-7) unstable; urgency=high + + * Update debconf template translations: + - French (thanks, Christian Perrier; closes: #208801). + - Japanese (thanks, Kenshi Muto; closes: #210380). + * Some small improvements to the English templates courtesy of Christian + Perrier. I've manually unfuzzied a few translations where it was + obvious, on Christian's advice, but the others will have to be updated. + * Document how to generate an RSA1 host key (closes: #141703). + * Incorporate NMU fix for early buffer expansion vulnerability, + CAN-2003-0693 (closes: #211205). Thanks to Michael Stone. + + -- Colin Watson <cjwatson@debian.org> Tue, 16 Sep 2003 14:32:28 +0100 + +openssh (1:3.6.1p2-6.0) unstable; urgency=high + + * SECURITY: fix for CAN-2003-0693, buffer allocation error + + -- Michael Stone <mstone@debian.org> Tue, 16 Sep 2003 08:27:07 -0400 + +openssh (1:3.6.1p2-6) unstable; urgency=medium + + * Use a more CVS-friendly means of setting SSH_VERSION. + * Update Brazilian Portuguese debconf template translation (thanks, Andre + Luis Lopes; closes: #208036). + * Don't run 'sshd -t' in init script if the server isn't to be run + (closes: #197576). + * Fix login delay, spurious auth.log entry, and PermitRootLogin + information leakage due to PAM issues with upstream's recent security + update (thanks, Darren Tucker; closes: #99168, #192207, #193546). + * Policy version 3.6.1: recode this changelog to UTF-8. + + -- Colin Watson <cjwatson@debian.org> Wed, 3 Sep 2003 19:14:02 +0100 + +openssh (1:3.6.1p2-5) unstable; urgency=low + + * Disable cmsg_type check for file descriptor passing when running on + Linux 2.0 (closes: #150976). Remove comments about non-functional + privilege separation on 2.0 from ssh/privsep_ask and ssh/privsep_tell + debconf questions and from README.Debian, since it should all now work. + * Fix "defails" typo in generated sshd_config (closes: #206484). + * Backport upstream patch to strip trailing whitespace (including + newlines) from configuration directives (closes: #192079). + + -- Colin Watson <cjwatson@debian.org> Wed, 27 Aug 2003 02:19:57 +0100 + +openssh (1:3.6.1p2-4) unstable; urgency=low + + * getent can get just one key; no need to use grep (thanks, James Troup). + * Move /usr/local/bin to the front of the default path, following + /etc/login.defs (closes: #201150). + * Remove specifics of problematic countries from package description + (closes: #197040). + * Update Spanish debconf template translation (thanks, Carlos Valdivia + Yagüe; closes: #198456). + * Backport upstream patch to pass monitor signals through to child + (closes: #164797). + + -- Colin Watson <cjwatson@debian.org> Sun, 27 Jul 2003 17:31:15 +0100 + +openssh (1:3.6.1p2-3) unstable; urgency=low + + * Update French debconf template translation (thanks, Christian Perrier; + closes: #194323). + * Version the adduser dependency for --no-create-home (closes: #195756). + * Add a version of moduli(5), namely revision 1.7 of + http://www.openbsd.org/cgi-bin/cvsweb/src/share/man/man5/moduli.5 with + '/etc/moduli' changed to '/etc/ssh/moduli' throughout (closes: #196061). + + -- Colin Watson <cjwatson@debian.org> Mon, 9 Jun 2003 02:51:35 +0100 + +openssh (1:3.6.1p2-2) unstable; urgency=low + + * Force /etc/default/ssh to be non-executable, since dpkg apparently + doesn't deal with permissions changes on conffiles (closes: #192966). + * Use debconf 0.5's seen flag rather than the deprecated isdefault. + * Add GPL location to copyright file. + * Remove debian/postinst.old. + * Switch to po-debconf, with some careful manual use of po2debconf to + ensure that the source package continues to build smoothly on woody + (closes: #183986). + * Update debconf template translations: + - Brazilian Portugese (thanks, Andre Luis Lopes; see #183986). + - Japanese (thanks, Tomohiro KUBOTA; closes: #192429). + * Compile with -fno-builtin-log for now, otherwise gcc-3.3 complains + "log.h:59: warning: conflicting types for built-in function `log'". The + OpenSSH log() function has been renamed in upstream CVS. + + -- Colin Watson <cjwatson@debian.org> Mon, 19 May 2003 01:52:38 +0100 + +openssh (1:3.6.1p2-1) unstable; urgency=medium + + * New upstream release, including fix for PAM user-discovery security hole + (closes: #191681). + * Fix ChallengeResponseAuthentication default in generated sshd_config + (closes: #106037). + * Put newlines after full stops in man page documentation for + ProtocolKeepAlives and SetupTimeOut. + * Policy version 3.5.9: support DEB_BUILD_OPTIONS=noopt, build + gnome-ssh-askpass with -g and -Wall flags. + * Really ask ssh/new_config debconf question before trying to fetch its + value (closes: #188721). + * On purge, remove only the files we know about in /etc/ssh rather than + the whole thing, and remove the directory if that leaves it empty + (closes: #176679). + * ssh has depended on debconf for some time now with no complaints, so: + - Simplify the postinst by relying on debconf being present. (The absent + case was buggy anyway.) + - Get rid of "if you have not installed debconf" text in README.Debian, + and generally update the "/usr/bin/ssh not SUID" entry. + * More README.Debian work: + - Reorganize into "UPGRADE ISSUES" and "OTHER ISSUES", in an effort to + make it easier for people to find the former. The upgrade issues + should probably be sorted by version somehow. + - Document X11UseLocalhost under "X11 Forwarding" (closes: #150913). + * Fix setting of IP flags for interactive sessions (upstream bug #541). + + -- Colin Watson <cjwatson@debian.org> Mon, 5 May 2003 17:47:40 +0100 + +openssh (1:3.6.1p1-1) unstable; urgency=low + + * New upstream release (thanks, Laurence J. Lane). + * debian/control: ssh-askpass-gnome is now Section: gnome, following the + override file. + + -- Colin Watson <cjwatson@debian.org> Wed, 2 Apr 2003 00:51:02 +0100 + +openssh (1:3.6p1-1) unstable; urgency=low + + * New upstream release. + - Workaround applied upstream for a bug in the interaction of glibc's + getaddrinfo() with the Linux 2.2 kernel (closes: #155814). + - As such, it should now be safe to remove --with-ipv4-default, so + starting sshd with -6 is no longer necessary (closes: #79861 and lots + of other merged bugs). + - ssh-copy-id prints usage when run without arguments (closes: #71376). + - scp exits 1 if ssh fails (closes: #138400). + - sshd writes to utmp's ut_addr_v6 field in IPv6 mode (closes: #167867). + - 'ssh-add -c' causes ssh-agent to ask the user each time a key is used + (closes: #109795). + * Install /etc/default/ssh non-executable (closes: #185537). + + -- Colin Watson <cjwatson@debian.org> Mon, 31 Mar 2003 23:00:59 +0100 + +openssh (1:3.5p1-5) unstable; urgency=low + + * Add /etc/default/ssh (closes: #161049). + * Run the init script under 'set -e' (closes: #175010). + * Change the default superuser path to include /sbin, /usr/sbin, and + /usr/local/sbin (closes: #128235, #151267). Using login.defs would be + nice, but that belongs to another package. Without a defined API to + retrieve its settings, parsing it is off-limits. + * Build ssh-askpass-gnome with GNOME 2. The source package should still + support building on stable with GNOME 1, using the alternate + libgnome-dev build-dependency (thanks, Colin Walters; closes: #167582). + + -- Colin Watson <cjwatson@debian.org> Sun, 9 Mar 2003 20:12:10 +0000 + +openssh (1:3.5p1-4) unstable; urgency=low + + * Point rlogin and rcp alternatives at slogin and scp respectively rather + than ssh (closes: #121103, #151666). Fix alternative removal to match; + previously it was completely wrong anyway. + * Find out whether /etc/ssh/sshd_not_to_be_run exists and set the debconf + question's default using that information, rather than using debconf as + a registry. Other solutions may be better in the long run, but this is + at least correct (thanks, Matthew Woodcraft; closes: #84725). + * Stop using pam_lastlog, as it doesn't currently work well as a session + module when privilege separation is enabled; it can usually read + /var/log/lastlog but can't write to it. Instead, just use sshd's + built-in support, already enabled by default (closes: #151297, #169938). + * Use 'ssh-keygen -q' rather than redirecting output to /dev/null. + * Add a "this may take some time" warning when creating host keys on + installation (part of #110094). + * When restarting via the init script, check for sshd_not_to_be_run after + stopping sshd (idea from Tomas Pospisek; closes: #149850). + * Append /usr/sbin:/sbin to the init script's $PATH, just in case of + strangeness (closes: #115138). + * Fix a dpkg-statoverride call to redirect stdout to /dev/null, not + stderr. + * Correct copyright file typo: "orignal" -> "original" (closes: #176490). + * Rebuild with libssl0.9.7 (closes: #176983). + * We're up to policy version 3.5.6. DEB_BUILD_OPTIONS stuff still needs to + be looked at. + + -- Colin Watson <cjwatson@debian.org> Sat, 18 Jan 2003 01:37:23 +0000 + +openssh (1:3.5p1-3) unstable; urgency=low + + * Happy new year! + * Use getent rather than id to find out whether the sshd user exists + (closes: #150974). + * Remove some duplication from the postinst's ssh-keysign setuid code. + * Replace db_text with db_input throughout debian/config. (db_text has + been a compatibility wrapper since debconf 0.1.5.) + * Warn about PermitUserEnvironment on upgrade (closes: #167895). + * Use 'make install-nokeys', and disable unused debhelper commands, + thereby forward-porting the last pieces of Zack Weinberg's patch + (closes: #68341). + * Move the man page for gnome-ssh-askpass from the ssh package to + ssh-askpass-gnome (closes: #174449). + * Build with -DLOGIN_NO_ENDOPT, since Debian's /bin/login doesn't accept + '--' to terminate the list of options (closes: #171554). + * Add Jonathan Amery's ssh-argv0 script (closes: #111341). + * Update Danish debconf template (thanks, Morten Brix Pedersen; + closes: #174757). + * Document setgid ssh-agent's effect on certain environment variables in + README.Debian (closes: #167974). + * Document interoperability problems between scp and ssh.com's server in + README.Debian, and suggest some workarounds (closes: #174662). + + -- Colin Watson <cjwatson@debian.org> Wed, 1 Jan 2003 14:18:30 +0000 + +openssh (1:3.5p1-2) unstable; urgency=low + + * Mention in the ssh package description that it provides both ssh and + sshd (closes: #99680). + * Create a system group for ssh-agent, not a user group (closes: #167669). + + -- Colin Watson <cjwatson@debian.org> Mon, 4 Nov 2002 13:43:53 +0000 + +openssh (1:3.5p1-1) unstable; urgency=low + + * New upstream release. + - Fixes typo in ssh-add usage (closes: #152239). + - Fixes 'PermitRootLogin forced-commands-only' (closes: #166184). + - ~/.ssh/environment and environment= options in ~/.ssh/authorized_keys + are deprecated for security reasons and will eventually go away. For + now they can be re-enabled by setting 'PermitUserEnvironment yes' in + sshd_config. + - ssh-agent is installed setgid to prevent ptrace() attacks. The group + actually doesn't matter, as it drops privileges immediately, but to + avoid confusion the postinst creates a new 'ssh' group for it. + * Obsolete patches: + - Solar Designer's privsep+compression patch for Linux 2.2 (see + 1:3.3p1-0.0woody1). + - Hostbased auth ssh-keysign backport (see 1:3.4p1-4). + + * Remove duplicated phrase in ssh_config(5) (closes: #152404). + * Source the debconf confmodule at the top of the postrm rather than at + the bottom, to avoid making future non-idempotency problems worse (see + #151035). + * Debconf templates: + - Add Polish (thanks, Grzegorz Kusnierz). + - Update French (thanks, Denis Barbier; closes: #132509). + - Update Spanish (thanks, Carlos Valdivia Yagüe; closes: #164716). + * Write a man page for gnome-ssh-askpass, and link it to ssh-askpass.1 if + this is the selected ssh-askpass alternative (closes: #67775). + + -- Colin Watson <cjwatson@debian.org> Sat, 26 Oct 2002 19:41:51 +0100 + +openssh (1:3.4p1-4) unstable; urgency=low + + * Allow ssh-krb5 in ssh-askpass-gnome's dependencies (closes: #129532). + * Restore Russia to list of countries where encryption is problematic (see + #148951 and http://www.average.org/freecrypto/). + * Drop ssh-askpass-gnome's priority to optional, per the override file. + * Drop the PAM special case for hurd-i386 (closes: #99157). + * s/dile/idle/ in ssh_config(5) (closes: #118331). + * Note in README.Debian that you need xauth from xbase-clients on the + server for X11 forwarding (closes: #140269). + * Use correct path to upstream README in copyright file (closes: #146037). + * Document the units for ProtocolKeepAlives (closes: #159479). + * Backport upstream patch to fix hostbased auth (closes: #117114). + * Add -g to CFLAGS. + + -- Colin Watson <cjwatson@debian.org> Sun, 13 Oct 2002 18:58:53 +0100 + +openssh (1:3.4p1-3) unstable; urgency=low + + * Add myself to Uploaders: and begin acting as temporary maintainer, at + Matthew's request. (Normal service will resume in some months' time.) + * Add sharutils to Build-Depends (closes: #138465). + * Stop creating the /usr/doc/ssh symlink. + + * Fix some debconf template typos (closes: #160358). + * Split debconf templates into one file per language. + * Add debconf template translations: + - Brazilian Portuguese (thanks, Andre Luis Lopes; closes: #106173). + - Danish (thanks, Claus Hindsgaul; closes: #126607). + - Japanese (thanks, Tomohiro KUBOTA; closes: #137427). + - Russian (thanks, Ilgiz Kalmetev; closes: #136610). + - Spanish (thanks, Carlos Valdivia Yagüe; closes: #129041). + * Update debconf template translations: + - French (thanks, Igor Genibel; closes: #151361). + - German (thanks, Axel Noetzold; closes: #147069). + * Some of these translations are fuzzy. Please send updates. + + -- Colin Watson <cjwatson@debian.org> Sun, 13 Oct 2002 14:09:57 +0100 + +openssh (1:3.4p1-2) unstable; urgency=high + + * Get a security-fixed version into unstable + * Also tidy README.Debian up a little + + -- Matthew Vernon <matthew@debian.org> Fri, 28 Jun 2002 17:20:59 +0100 + +openssh (1:3.4p1-1) testing; urgency=high + + * Extend my tendrils back into this package (Closes: #150915, #151098) + * thanks to the security team for their work + * no thanks to ISS/Theo de Raadt for their handling of these bugs + * save old sshd_configs to sshd_config.dpkg-old when auto-generating a + new one + * tell/ask the user about PriviledgeSeparation + * /etc/init.d/ssh run will now create the chroot empty dir if necessary + * Remove our previous statoverride on /usr/bin/ssh (only for people + upgrading from a version where we'd put one in ourselves!) + * Stop slandering Russia, since someone asked so nicely (Closes: #148951) + * Reduce the sleep time in /etc/init.d/ssh during a restart + + -- Matthew Vernon <matthew@debian.org> Fri, 28 Jun 2002 15:52:10 +0100 + +openssh (1:3.4p1-0.0woody1) testing-security; urgency=high + + * NMU by the security team. + * New upstream version + + -- Michael Stone <mstone@debian.org> Wed, 26 Jun 2002 15:40:38 -0400 + +openssh (1:3.3p1-0.0woody4) testing-security; urgency=high + + * NMU by the security team. + * fix error when /etc/ssh/sshd_config exists on new install + * check that user doesn't exist before running adduser + * use openssl internal random unconditionally + + -- Michael Stone <mstone@debian.org> Tue, 25 Jun 2002 19:44:39 -0400 + +openssh (1:3.3p1-0.0woody3) testing-security; urgency=high + + * NMU by the security team. + * use correct home directory when sshd user is created + + -- Michael Stone <mstone@debian.org> Tue, 25 Jun 2002 08:59:50 -0400 + +openssh (1:3.3p1-0.0woody2) testing-security; urgency=high + + * NMU by the security team. + * Fix rsa1 key creation (Closes: #150949) + * don't fail if sshd user removal fails + * depends: on adduser (Closes: #150907) + + -- Michael Stone <mstone@debian.org> Tue, 25 Jun 2002 08:59:50 -0400 + +openssh (1:3.3p1-0.0woody1) testing-security; urgency=high + + * NMU by the security team. + * New upstream version. + - Enable privilege separation by default. + * Include patch from Solar Designer for privilege separation and + compression on 2.2.x kernels. + * Remove --disable-suid-ssh from configure. + * Support setuid ssh-keysign binary instead of setuid ssh client. + * Check sshd configuration before restarting. + + -- Daniel Jacobowitz <dan@debian.org> Mon, 24 Jun 2002 13:43:44 -0400 + +openssh (1:3.0.2p1-9) unstable; urgency=high + + * Thanks to those who NMUd + * The only change in this version is to debian/control - I've removed + the bit that says you can't export it from the US - it would look + pretty daft to say this about a package in main! Also, it's now OK + to use crypto in France, so I've edited that comment slightly + * Correct a path in README.Debian too (Closes: #138634) + + -- Matthew Vernon <matthew@debian.org> Sun, 4 Apr 2002 09:52:59 +0100 + +openssh (1:3.0.2p1-8.3) unstable; urgency=medium + + * NMU + * Really set urgency to medium this time (oops) + * Fix priority to standard per override while I'm at it + + -- Aaron M. Ucko <ucko@debian.org> Sun, 24 Mar 2002 09:00:08 -0500 + +openssh (1:3.0.2p1-8.2) unstable; urgency=low + + * NMU with maintainer's permission + * Prepare for upcoming ssh-nonfree transitional packages per + <http://lists.debian.org/debian-ssh/2002/debian-ssh-200203/msg00008.html> + * Urgency medium because it would really be good to get this into woody + before it releases + * Fix sections to match override file + * Reissued due to clash with non-US -> main move + + -- Aaron M. Ucko <ucko@debian.org> Sat, 23 Mar 2002 21:21:52 -0500 + +openssh (1:3.0.2p1-8.1) unstable; urgency=low + + * NMU + * Move from non-US to mani + + -- LaMont Jones <lamont@debian.org> Thu, 21 Mar 2002 09:33:50 -0700 + +openssh (1:3.0.2p1-8) unstable; urgency=critical + + * Security fix - patch from upstream (Closes: #137209, #137210) + * Undo the changes in the unreleased -7, since they appear to break + things here. Accordingly, the code change is minimal, and I'm + happy to get it into testing ASAP + + -- Matthew Vernon <matthew@debian.org> Thu, 7 Mar 2002 14:25:23 +0000 + +openssh (1:3.0.2p1-7) unstable; urgency=high + + * Build to support IPv6 and IPv4 by default again + + -- Matthew Vernon <matthew@debian.org> Sat, 2 Mar 2002 00:25:05 +0000 + +openssh (1:3.0.2p1-6) unstable; urgency=high + + * Correct error in the clean target (Closes: #130868) + + -- Matthew Vernon <matthew@debian.org> Sat, 26 Jan 2002 00:32:00 +0000 + +openssh (1:3.0.2p1-5) unstable; urgency=medium + + * Include the Debian version in our identification, to make it easier to + audit networks for patched versions in future + + -- Matthew Vernon <matthew@debian.org> Mon, 21 Jan 2002 17:16:10 +0000 + +openssh (1:3.0.2p1-4) unstable; urgency=medium + + * If we're asked to not run sshd, stop any running sshd's first + (Closes: #129327) + + -- Matthew Vernon <matthew@debian.org> Wed, 16 Jan 2002 21:24:16 +0000 + +openssh (1:3.0.2p1-3) unstable; urgency=high + + * Fix /etc/pam.d/ssh to not set $MAIL (Closes: #128913) + * Remove extra debconf suggestion (Closes: #128094) + * Mmm. speedy bug-fixing :-) + + -- Matthew Vernon <matthew@debian.org> Sat, 12 Jan 2002 17:23:58 +0000 + +openssh (1:3.0.2p1-2) unstable; urgency=high + + * Fix postinst to not automatically overwrite sshd_config (!) + (Closes: #127842, #127867) + * Add section in README.Debian about the PermitRootLogin setting + + -- Matthew Vernon <matthew@debian.org> Sat, 5 Jan 2003 05:26:30 +0000 + +openssh (1:3.0.2p1-1) unstable; urgency=high + + * Incorporate fix from Colin's NMU + * New upstream version (fixes the bug Wichert fixed) (Closes: #124035) + * Capitalise IETF (Closes: #125379) + * Refer to the correct sftp-server location (Closes: #126854, #126224) + * Do what we're asked re SetUID ssh (Closes: #124065, #124154, #123247) + * Ask people upgrading from potato if they want a new conffile + (Closes: #125642) + * Fix a typo in postinst (Closes: #122192, #122410, #123440) + * Frob the default config a little (Closes: #122284, #125827, #125696, + #123854) + * Make /etc/init.d/ssh be more clear about ssh not running (Closes: + #123552) + * Fix typo in templates file (Closes: #123411) + + -- Matthew Vernon <matthew@debian.org> Fri, 4 Jan 2002 16:01:52 +0000 + +openssh (1:3.0.1p1-1.2) unstable; urgency=high + + * Non-maintainer upload + * Prevent local users from passing environment variables to the login + process when UseLogin is enabled + + -- Wichert Akkerman <wakkerma@debian.org> Mon, 3 Dec 2001 19:34:45 +0100 + +openssh (1:3.0.1p1-1.1) unstable; urgency=low + + * Non-maintainer upload, at Matthew's request. + * Remove sa_restorer assignment to fix compilation on alpha, hppa, and + ia64 (closes: #122086). + + -- Colin Watson <cjwatson@debian.org> Sun, 2 Dec 2001 18:54:16 +0000 + +openssh (1:3.0.1p1-1) unstable; urgency=high + + * New upstream version (Closes: #113646, #113513, #114707, #118564) + * Building with a libc that works (!) (Closes: #115228) + * Patches forward-ported are -1/-2 options for scp, the improvement to + 'waiting for forwarded connections to terminate...' + * Fix /etc/init.d/ssh to stop sshd properly (Closes: #115228) + * /etc/ssh/sshd_config is no longer a conffile but generated in the postinst + * Remove suidregister leftover from postrm + * Mention key we are making in the postinst + * Default to not enable SSH protocol 1 support, since protocol 2 is + much safer anyway. + * New version of the vpn-fixes patch, from Ian Jackson + * New handling of -q, and added new -qq option; thanks to Jon Amery + * Experimental smartcard support not enabled, since I have no way of + testing it. + + -- Matthew Vernon <matthew@debian.org> Thu, 28 Nov 2001 17:43:01 +0000 + +openssh (1:2.9p2-6) unstable; urgency=low + + * check for correct file in /etc/init.d/ssh (Closes: #110876) + * correct location of version 2 keys in ssh.1 (Closes: #110439) + * call update-alternatives --quiet (Closes: #103314) + * hack ssh-copy-id to chmod go-w (Closes: #95551) + * TEMPORARY fix to provide largefile support using a -D in the cflags + line. long-term, upstream will patch the autoconf stuff + (Closes: #106809, #111849) + * remove /etc/rc references in ssh-keygen.1 (Closes: #68350) + * scp.1 patch from Adam McKenna to document -r properly (Closes: #76054) + * Check for files containing a newline character (Closes: #111692) + + -- Matthew Vernon <matthew@debian.org> Thu, 13 Sep 2001 16:47:36 +0100 + +openssh (1:2.9p2-5) unstable; urgency=high + + * Thanks to all the bug-fixers who helped! + * remove sa_restorer assignment (Closes: #102837) + * patch from Peter Benie to DTRT wrt X forwarding if the server refuses + us access (Closes: #48297) + * patch from upstream CVS to fix port forwarding (Closes: #107132) + * patch from Jonathan Amery to document ssh-keygen behaviour + (Closes:#106643, #107512) + * patch to postinst from Jonathan Amery (Closes: #106411) + * patch to manpage from Jonathan Amery (Closes: #107364) + * patch from Matthew Vernon to make -q emit fatal errors as that is the + documented behaviour (Closes: #64347) + * patch from Ian Jackson to cause us to destroy a file when we scp it + onto itself, rather than dumping bits of our memory into it, which was + a security hole (see #51955) + * patch from Jonathan Amery to document lack of Kerberos support + (Closes: #103726) + * patch from Matthew Vernon to make the 'waiting for connections to + terminate' message more helpful (Closes: #50308) + + -- Matthew Vernon <matthew@debian.org> Thu, 23 Aug 2001 02:14:09 +0100 + +openssh (1:2.9p2-4) unstable; urgency=high + + * Today's build of ssh is strawberry flavoured + * Patch from mhp to reduce length of time sshd is stopped for (Closes: #106176) + * Tidy up debconf template (Closes: #106152) + * If called non-setuid, then setgid()'s failure should not be fatal (see + #105854) + + -- Matthew Vernon <matthew@debian.org> Sun, 22 Jul 2001 14:19:43 +0100 + +openssh (1:2.9p2-3) unstable; urgency=low + + * Patch from yours truly to add -1 and -2 options to scp (Closes: #106061) + * Improve the IdentityFile section in the man page (Closes: #106038) + + -- Matthew Vernon <matthew@debian.org> Sat, 21 Jul 2001 14:47:27 +0100 + +openssh (1:2.9p2-2) unstable; urgency=low + + * Document the protocol version 2 and IPV6 changes (Closes: #105845, #105868) + * Make PrintLastLog 'no' by default (Closes: #105893) + + -- Matthew Vernon <matthew@debian.org> Thu, 19 Jul 2001 18:36:41 +0100 + +openssh (1:2.9p2-1) unstable; urgency=low + + * new (several..) upstream version (Closes: #96726, #81856, #96335) + * Hopefully, this will close some other bugs too + + -- Matthew Vernon <matthew@debian.org> Tue, 17 Jul 2001 19:41:58 +0100 + +openssh (1:2.5.2p2-3) unstable; urgency=low + + * Taking Over this package + * Patches from Robert Bihlmeyer for the Hurd (Closes: #102991) + * Put PermitRootLogin back to yes (Closes: #67334, #67371, #78274) + * Don't fiddle with conf-files any more (Closes: #69501) + + -- Matthew Vernon <matthew@debian.org> Tue, 03 Jul 2001 02:58:13 +0100 + +openssh (1:2.5.2p2-2.2) unstable; urgency=low + + * NMU + * Include Hurd compatibility patches from Robert Bihlmeyer (Closes: #76033) + * Patch from Richard Kettlewell for protocolkeepalives (Closes: #99273) + * Patch from Matthew Vernon for BannerTimeOut, batchmode, and + documentation for protocolkeepalives. Makes ssh more generally useful + for scripting uses (Closes: #82877, #99275) + * Set a umask, so ourpidfile isn't world-writable (closes: #100012, + #98286, #97391) + + -- Matthew Vernon <matthew@debian.org> Thu, 28 Jun 2001 23:15:42 +0100 + +openssh (1:2.5.2p2-2.1) unstable; urgency=low + + * NMU + * Remove duplicate Build-Depends for libssl096-dev and change it to + depend on libssl-dev instaed. Also adding in virtual | real package + style build-deps. (Closes: #93793, #75228) + * Removing add-log entry (Closes: #79266) + * This was a pam bug from a while back (Closes: #86908, #88457, #86843) + * pam build-dep already exists (Closes: #93683) + * libgnome-dev build-dep already exists (Closes: #93694) + * No longer in non-free (Closes: #85401) + * Adding in fr debconf translations (Closes: #83783) + * Already suggests xbase-clients (Closes: #79741) + * No need to suggest libpam-pwdb anymore (Closes: #81658) + * Providing rsh-client (Closes: #79437) + * hurd patch was already applied (Closes: #76033) + * default set to no (Closes: #73682) + * Adding in a suggests for dnsutils (Closes: #93265) + * postinst bugs fixed (Closes: #88057, #88066, #88196, #88405, #88612) + (Closes: #88774, #88196, #89556, #90123, #90228, #90833, #87814, #85465) + * Adding in debconf dependency + + -- Ivan E. Moore II <rkrusty@debian.org> Mon, 16 Apr 2001 14:11:04 +0100 + +openssh (1:2.5.2p2-2) unstable; urgency=high + + * disable the OpenSSL version check in entropy.c + (closes: #93581, #93588, #93590, #93614, #93619, #93635, #93648) + + -- Philip Hands <phil@uk.alcove.com> Wed, 11 Apr 2001 20:30:04 +0100 + +openssh (1:2.5.2p2-1) unstable; urgency=low + + * New upstream release + * removed make-ssh-known-hosts, since ssh-keyscan does that job (closes: #86069, #87748) + * fix double space indent in german templates (closes: #89493) + * make postinst check for ssh_host_rsa_key + * get rid of the last of the misguided debian/rules NMU debris :-/ + + -- Philip Hands <phil@hands.com> Sat, 24 Mar 2001 20:59:33 +0000 + +openssh (1:2.5.1p2-2) unstable; urgency=low + + * rebuild with new debhelper (closes: #89558, #89536, #90225) + * fix broken dpkg-statoverride test in postinst + (closes: #89612, #90474, #90460, #89605) + * NMU bug fixed but not closed in last upload (closes: #88206) + + -- Philip Hands <phil@hands.com> Fri, 23 Mar 2001 16:11:33 +0000 + +openssh (1:2.5.1p2-1) unstable; urgency=high + + * New upstream release + * fix typo in postinst (closes: #88110) + * revert to setting PAM service name in debian/rules, backing out last + NMU, which also (closes: #88101) + * restore the pam lastlog/motd lines, lost during the NMUs, and sshd_config + * restore printlastlog option patch + * revert to using debhelper, which had been partially disabled in NMUs + + -- Philip Hands <phil@hands.com> Tue, 13 Mar 2001 01:41:34 +0000 + +openssh (1:2.5.1p1-1.8) unstable; urgency=high + + * And now the old pam-bug s/sshd/ssh in ssh.c is also fixed + + -- Christian Kurz <shorty@debian.org> Thu, 1 Mar 2001 19:48:01 +0100 + +openssh (1:2.5.1p1-1.7) unstable; urgency=high + + * And now we mark the correct binary as setuid, when a user requested + to install it setuid. + + -- Christian Kurz <shorty@debian.org> Thu, 1 Mar 2001 07:19:56 +0100 + +openssh (1:2.5.1p1-1.6) unstable; urgency=high + + * Fixes postinst to handle overrides that are already there. Damn, I + should have noticed the bug earlier. + + -- Christian Kurz <shorty@debian.org> Wed, 28 Feb 2001 22:35:00 +0100 + +openssh (1:2.5.1p1-1.5) unstable; urgency=high + + * Rebuild ssh with pam-support. + + -- Christian Kurz <shorty@debian.org> Mon, 26 Feb 2001 21:55:51 +0100 + +openssh (1:2.5.1p1-1.4) unstable; urgency=low + + * Added Build-Depends on libssl096-dev. + * Fixed sshd_config file to disallow root logins again. + + -- Christian Kurz <shorty@debian.org> Sun, 25 Feb 2001 20:03:55 +0100 + +openssh (1:2.5.1p1-1.3) unstable; urgency=low + + * Fixed missing manpages for sftp.1 and ssh-keyscan.1 + * Made package policy 3.5.2 compliant. + + -- Christian Kurz <shorty@debian.org> Sun, 25 Feb 2001 15:46:26 +0100 + +openssh (1:2.5.1p1-1.2) unstable; urgency=low + + * Added Conflict with sftp, since we now provide our own sftp-client. + * Added a fix for our broken dpkg-statoverride call in the + 2.3.0p1-13. + * Fixed some config pathes in the comments of sshd_config. + * Removed ssh-key-exchange-vulnerability-patch since it's not needed + anymore because upstream included the fix. + + -- Christian Kurz <shorty@debian.org> Sun, 25 Feb 2001 13:46:58 +0100 + +openssh (1:2.5.1p1-1.1) unstable; urgency=high + + * Another NMU to get the new upstream version 2.5.1p1 into + unstable. (Closes: #87123) + * Corrected postinst to mark ssh as setuid. (Closes: #86391, #85766) + * Key Exchange patch is already included by upstream. (Closes: #86015) + * Upgrading should be possible now. (Closes: #85525, #85523) + * Added --disable-suid-ssh as compile option, so ssh won't get installed + suid per default. + * Fixed postinst to run dpkg-statoverride only, when dpkg-statoverride + is available and the mode of the binary should be 4755. And also added + suggestion for a newer dpkg. + (Closes: #85734, #85741, #86876) + * sftp and ssh-keyscan will also be included from now on. (Closes: #79994) + * scp now understands spaces in filenames (Closes: #53783, #58958, + #66723) + * ssh-keygen now supports showing DSA fingerprints. (Closes: #68623) + * ssh doesn' t show motd anymore when switch -t is used. (Closes #69035) + * ssh supports the usage of other dsa keys via the ssh command line + options. (Closes: #81250) + * Documentation in sshd_config fixed. (Closes: #81088) + * primes file included by upstream and included now. (Closes: #82101) + * scp now allows dots in the username. (Closes: #82477) + * Spelling error in ssh-copy-id.1 corrected by upstream. (Closes: #78124) + + -- Christian Kurz <shorty@debian.org> Sun, 25 Feb 2001 10:06:08 +0100 + +openssh (1:2.3.0p1-1.13) unstable; urgency=low + + * Config should now also be fixed with this hopefully last NMU. + + -- Christian Kurz <shorty@debian.org> Sat, 10 Feb 2001 22:56:36 +0100 + +openssh (1:2.3.0p1-1.12) unstable; urgency=high + + * Added suggest for xbase-clients to control-file. (Closes #85227) + * Applied patch from Markus Friedl to fix a vulnerability in + the rsa keyexchange. + * Fixed position of horizontal line. (Closes: #83613) + * Fixed hopefully the grep problem in the config-file. (Closes: #78802) + * Converted package from suidregister to dpkg-statoverride. + + -- Christian Kurz <shorty@debian.org> Fri, 9 Feb 2001 19:43:55 +0100 + +openssh (1:2.3.0p1-1.11) unstable; urgency=medium + + * Fixed some typos in the german translation of the debconf + template. + + -- Christian Kurz <shorty@debian.org> Wed, 24 Jan 2001 18:22:38 +0100 + +openssh (1:2.3.0p1-1.10) unstable; urgency=medium + + * Fixed double printing of motd. (Closes: #82618) + + -- Christian Kurz <shorty@debian.org> Tue, 23 Jan 2001 21:03:43 +0100 + +openssh (1:2.3.0p1-1.9) unstable; urgency=high + + * And the next NMU which includes the patch from Andrew Bartlett + and Markus Friedl to fix the root privileges handling of openssh. + (Closes: #82657) + + -- Christian Kurz <shorty@debian.org> Wed, 17 Jan 2001 22:20:54 +0100 + +openssh (1:2.3.0p1-1.8) unstable; urgency=high + + * Applied fix from Ryan Murray to allow building on other architectures + since the hurd patch was wrong. (Closes: #82471) + + -- Christian Kurz <shorty@debian.org> Tue, 16 Jan 2001 22:45:51 +0100 + +openssh (1:2.3.0p1-1.7) unstable; urgency=medium + + * Fixed another typo on sshd_config + + -- Christian Kurz <shorty@debian.org> Sun, 14 Jan 2001 19:01:31 +0100 + +openssh (1:2.3.0p1-1.6) unstable; urgency=high + + * Added Build-Dependency on groff (Closes: #81886) + * Added Build-Depencency on debhelper (Closes: #82072) + * Fixed entry for known_hosts in sshd_config (Closes: #82096) + + -- Christian Kurz <shorty@debian.org> Thu, 11 Jan 2001 23:08:16 +0100 + +openssh (1:2.3.0p1-1.5) unstable; urgency=high + + * Fixed now also the problem with sshd used as default ipv4 and + didn't use IPv6. This should be now fixed. + + -- Christian Kurz <shorty@debian.org> Thu, 11 Jan 2001 21:25:55 +0100 + +openssh (1:2.3.0p1-1.4) unstable; urgency=high + + * Fixed buggy entry in postinst. + + -- Christian Kurz <shorty@debian.org> Wed, 10 Jan 2001 23:12:16 +0100 + +openssh (1:2.3.0p1-1.3) unstable; urgency=high + + * After finishing the rewrite of the rules-file I had to notice that + the manpage installation was broken. This should now work again. + + -- Christian Kurz <shorty@debian.org> Wed, 10 Jan 2001 22:11:59 +0100 + +openssh (1:2.3.0p1-1.2) unstable; urgency=high + + * Fixed the screwed up build-dependency. + * Removed --with-ipv4-default to support ipv6. + * Changed makefile to use /etc/pam.d/ssh instead of /etc/pam.d/sshd. + * Fixed location to sftp-server in config. + * Since debian still relies on /etc/pam.d/ssh instead of moving to + /etc/pam.d/sshd, I had to hack ssh.h to get ssh to use this name. + * Fixed path to host key in sshd_config. + + -- Christian Kurz <shorty@debian.org> Wed, 10 Jan 2001 08:23:47 +0100 + +openssh (1:2.3.0p1-1.1) unstable; urgency=medium + + * NMU with permission of Phil Hands. + * New upstream release + * Update Build-Depends to point to new libssl096. + * This upstream release doesn't leak any information depending + on the setting of PermitRootLogin (Closes: #59933) + * New upstream release contains fix against forcing a client to + do X/agent forwarding (Closes: #76788) + * Changed template to contain correct path to the documentation + (Closes: #67245) + * Added --with-4in6 switch as compile option into debian/rules. + * Added --with-ipv4-default as compile option into debian/rules. + (Closes: #75037) + * Changed default path to also contain /usr/local/bin and + /usr/X11R6/bin (Closes: #62472,#54567,#62810) + * Changed path to sftp-server in sshd_config to match the + our package (Closes: #68347) + * Replaced OpenBSDh with OpenBSD in the init-script. + * Changed location to original source in copyright.head + * Changed behaviour of init-script when invoked with the option + restart (Closes: #68706,#72560) + * Added a note about -L option of scp to README.Debian + * ssh won't print now the motd if invoked with -t option + (Closes: #59933) + * RFC.nroff.gz get's now converted into RFC.gz. (Closes: #63867) + * Added a note about tcp-wrapper support to README.Debian + (Closes: #72807,#22190) + * Removed two unneeded options from building process. + * Added sshd.pam into debian dir and install it. + * Commented out unnecessary call to dh_installinfo. + * Added a line to sshd.pam so that limits will be paid attention + to (Closes: #66904) + * Restart Option has a Timeout of 10 seconds (Closes: 51264) + * scp won't override files anymore (Closes: 51955) + * Removed pam_lastlog module, so that the lastlog is now printed + only once (Closes: #71742, #68335, #69592, #71495, #77781) + * If password is expired, openssh now forces the user to change it. + (Closes: #51747) + * scp should now have no more problems with shell-init-files that + produces ouput (Closes: #56280,#59873) + * ssh now prints the motd correctly (Closes: #66926) + * ssh upgrade should disable ssh daemon only if users has choosen + to do so (Closes: #67478) + * ssh can now be installed suid (Closes: #70879) + * Modified debian/rules to support hurd. + + -- Christian Kurz <shorty@debian.org> Wed, 27 Dec 2000 20:06:57 +0100 + +openssh (1:2.2.0p1-1.1) unstable; urgency=medium + + * Non-Maintainer Upload + * Check for new returns in the new libc + (closes: #72803, #74393, #72797, #71307, #71702) + * Link against libssl095a (closes: #66304) + * Correct check for PermitRootLogin (closes: #69448) + + -- Ryan Murray <rmurray@debian.org> Wed, 18 Oct 2000 00:48:18 -0700 + +openssh (1:2.2.0p1-1) unstable; urgency=low + + * New upstream release + + -- Philip Hands <phil@hands.com> Mon, 11 Sep 2000 14:49:43 +0100 + +openssh (1:2.1.1p4-3) unstable; urgency=low + + * add rsh alternatives + * add -S option to scp (using Tommi Virtanen's patch) (closes: #63097) + * do the IPV4_DEFAULT thing properly this time + + -- Philip Hands <phil@hands.com> Fri, 11 Aug 2000 18:14:37 +0100 + +openssh (1:2.1.1p4-2) unstable; urgency=low + + * reinstate manpage .out patch from 1:1.2.3 + * fix typo in postinst + * only compile ssh with IPV4_DEFAULT + * apply James Troup's patch to add a -o option to scp and updated manpage + + -- Philip Hands <phil@hands.com> Sun, 30 Jul 2000 00:12:49 +0100 + +openssh (1:2.1.1p4-1) unstable; urgency=low + + * New upstream release + + -- Philip Hands <phil@hands.com> Sat, 29 Jul 2000 14:46:16 +0100 + +openssh (1:1.2.3-10) unstable; urgency=low + + * add version to libpam-modules dependency, because old versions of + pam_motd make it impossible to log in. + + -- Philip Hands <phil@hands.com> Sat, 29 Jul 2000 13:28:22 +0100 + +openssh (1:1.2.3-9) frozen unstable; urgency=low + + * force location of /usr/bin/X11/xauth + (closes: #64424, #66437, #66859) *RC* + * typos in config (closes: #66779, #66780) + * sshd_not_to_be_run could be assumed to be true, in error, if the config + script died in an unusual way --- I've reversed this (closes: #66335) + * Apply Zack Weinberg <zack@wolery.cumb.org>'s patch to ssh-askpass-ptk + (closes: #65981) + * change default for PermitRootLogin to "no" (closes: #66406) + + -- Philip Hands <phil@hands.com> Tue, 11 Jul 2000 20:51:18 +0100 + +openssh (1:1.2.3-8) frozen unstable; urgency=low + + * get rid of Provides: rsh-server (this will mean that rstartd + will need to change it's depends to deal with #63948, which I'm + reopening) (closes: #66257) + Given that this is also a trivial change, and is a reversal of a + change that was mistakenly made after the freeze, I think this should + also go into frozen. + + -- Philip Hands <phil@hands.com> Wed, 28 Jun 2000 03:26:30 +0100 + +openssh (1:1.2.3-7) frozen unstable; urgency=low + + * check if debconf is installed before calling db_stop in postinst. + This is required to allow ssh to be installed when debconf is not + wanted, which probably makes it an RC upload (hopefully the last of + too many). + + -- Philip Hands <phil@hands.com> Wed, 28 Jun 2000 03:19:47 +0100 + +openssh (1:1.2.3-6) frozen unstable; urgency=low + + * fixed depressing little bug involving a line wrap looking like + a blank line in the templates file *RC* + (closes: #66090, #66078, #66083, #66182) + + -- Philip Hands <phil@hands.com> Mon, 26 Jun 2000 00:45:05 +0100 + +openssh (1:1.2.3-5) frozen unstable; urgency=low + + * add code to prevent UseLogin exploit, although I think our PAM + conditional code breaks UseLogin in a way that protects us from this + exploit anyway. ;-) (closes: #65495) *RC* + * Apply Zack Weinberg <zack@wolery.cumb.org>'s patch to fix keyboard + grab vulnerability in ssh-askpass-gnome (closes: #64795) *RC* + * stop redirection of sshd's file descriptors (introduced in 1:1.2.3-3) + and use db_stop in the postinst to solve that problem instead + (closes: #65104) + * add Provides: rsh-server to ssh (closes: #63948) + * provide config option not to run sshd + + -- Philip Hands <phil@hands.com> Mon, 12 Jun 2000 23:05:11 +0100 + +openssh (1:1.2.3-4) frozen unstable; urgency=low + + * fixes #63436 which is *RC* + * add 10 second pause in init.d restart (closes: #63844) + * get rid of noenv in PAM mail line (closes: #63856) + * fix host key path in make-ssh-known-hosts (closes: #63713) + * change wording of SUID template (closes: #62788, #63436) + + -- Philip Hands <phil@hands.com> Sat, 27 May 2000 11:18:06 +0100 + +openssh (1:1.2.3-3) frozen unstable; urgency=low + + * redirect sshd's file descriptors to /dev/null in init to + prevent debconf from locking up during installation + ** grave bug just submited by me ** + + -- Philip Hands <phil@hands.com> Thu, 20 Apr 2000 17:10:59 +0100 + +openssh (1:1.2.3-2) frozen unstable; urgency=low + + * allow user to select SUID status of /usr/bin/ssh (closes: 62462) ** RC ** + * suggest debconf + * conflict with debconf{,-tiny} (<<0.2.17) so I can clean up the preinst + + -- Philip Hands <phil@hands.com> Wed, 19 Apr 2000 17:49:15 +0100 + +openssh (1:1.2.3-1) frozen unstable; urgency=low + + * New upstream release + * patch sshd to create extra xauth key required for localhost + (closes: #49944) *** RC *** + * FallbacktoRsh now defaults to ``no'' to match impression + given in sshd_config + * stop setting suid bit on ssh (closes: #58711, #58558) + This breaks Rhosts authentication (which nobody uses) and allows + the LD_PRELOAD trick to get socks working, so seems like a net benefit. + + -- Philip Hands <phil@hands.com> Thu, 13 Apr 2000 20:01:54 +0100 + +openssh (1:1.2.2-1.4) frozen unstable; urgency=low + + * Recompile for frozen, contains fix for RC bug. + + -- Tommi Virtanen <tv@debian.org> Tue, 29 Feb 2000 22:14:58 +0200 + +openssh (1:1.2.2-1.3) unstable; urgency=low + + * Integrated man page addition for PrintLastLog. + This bug was filed on "openssh", and I ended up + creating my own patch for this (closes: #59054) + * Improved error message when ssh_exchange_identification + gets EOF (closes: #58904) + * Fixed typo (your -> you're) in debian/preinst. + * Added else-clauses to config to make this upgradepath possible: + oldssh -> openssh preinst fails due to upgrade_to_openssh=false + -> ssh-nonfree -> openssh. Without these, debconf remembered + the old answer, config didn't force asking it, and preinst always + aborted (closes: #56596, #57782) + * Moved setting upgrade_to_openssh isdefault flag to the place + where preinst would abort. This means no double question to most + users, people who currently suffer from "can't upgrade" may need + to run apt-get install ssh twice. Did not do the same for + use_old_init_script, as the situation is a bit different, and + less common (closes: #54010, #56224) + * Check for existance of ssh-keygen before attempting to use it in + preinst, added warning for non-existant ssh-keygen in config. This + happens when the old ssh is removed (say, due to ssh-nonfree getting + installed). + + -- Tommi Virtanen <tv@debian.org> Sun, 27 Feb 2000 21:36:43 +0200 + +openssh (1:1.2.2-1.2) frozen unstable; urgency=low + + * Non-maintainer upload. + * Added configuration option PrintLastLog, default off due to PAM + (closes: #54007, #55042) + * ssh-askpass-{gnome,ptk} now provide ssh-askpass, making ssh's + Suggests: line more accurate. Also closing related bugs fixed + earlier, when default ssh-askpass moved to /usr/bin. + (closes: #52403, #54741, #50607, #52298, #50967, #51661) + * Patched to call vhangup, with autoconf detection and all + (closes: #55379) + * Added --with-ipv4-default workaround to a glibc bug causing + slow DNS lookups, as per UPGRADING. Use -6 to really use + IPv6 addresses. (closes: #57891, #58744, #58713, #57970) + * Added noenv to PAM pam_mail line. Thanks to Ben Collins. + (closes: #58429) + * Added the UPGRADING file to the package. + * Added frozen to the changelog line and recompiled before + package was installed into the archive. + + -- Tommi Virtanen <tv@debian.org> Fri, 25 Feb 2000 22:08:57 +0200 + +openssh (1:1.2.2-1.1) frozen unstable; urgency=low + + * Non-maintainer upload. + * Integrated scp pipe buffer patch from Ben Collins + <benc@debian.org>, should now work even if reading + a pipe gives less than fstat st_blksize bytes. + Should now work on Alpha and Sparc Linux (closes: #53697, #52071) + * Made ssh depend on libssl09 (>= 0.9.4-3) (closes: #51393) + * Integrated patch from Ben Collins <benc@debian.org> + to do full shadow account locking and expiration + checking (closes: #58165, #51747) + + -- Tommi Virtanen <tv@debian.org> Tue, 22 Feb 2000 20:46:12 +0200 + +openssh (1:1.2.2-1) frozen unstable; urgency=medium + + * New upstream release (closes: #56870, #56346) + * built against new libesd (closes: #56805) + * add Colin Watson <cjw44@cam.ac.uk> =NULL patch + (closes: #49902, #54894) + * use socketpairs as suggested by Andrew Tridgell to eliminate rsync + (and other) lockups + * patch SSHD_PAM_SERVICE back into auth-pam.c, again :-/ + (closes: #49902, #55872, #56959) + * uncoment the * line in ssh_config (closes: #56444) + + * #54894 & #49902 are release critical, so this should go in frozen + + -- Philip Hands <phil@hands.com> Wed, 9 Feb 2000 04:52:04 +0000 + +openssh (1:1.2.1pre24-1) unstable; urgency=low + + * New upstream release + + -- Philip Hands <phil@hands.com> Fri, 31 Dec 1999 02:47:24 +0000 + +openssh (1:1.2.1pre23-1) unstable; urgency=low + + * New upstream release + * excape ? in /etc/init.d/ssh (closes: #53269) + + -- Philip Hands <phil@hands.com> Wed, 29 Dec 1999 16:50:46 +0000 + +openssh (1:1.2pre17-1) unstable; urgency=low + + * New upstream release + + -- Philip Hands <phil@hands.com> Thu, 9 Dec 1999 16:50:40 +0000 + +openssh (1:1.2pre16-1) unstable; urgency=low + + * New upstream release + * upstream release (1.2pre14) (closes: #50299) + * make ssh depend on libwrap0 (>= 7.6-1.1) (closes: #50973, #50776) + * dispose of grep -q broken pipe message in config script (closes: #50855) + * add make-ssh-known-hosts (closes: #50660) + * add -i option to ssh-copy-id (closes: #50657) + * add check for *LK* in password, indicating a locked account + + -- Philip Hands <phil@hands.com> Wed, 8 Dec 1999 22:59:38 +0000 + +openssh (1:1.2pre13-1) unstable; urgency=low + + * New upstream release + * make sshd.c use SSHD_PAM_SERVICE and define it as "ssh" in debian/rules + * remove duplicate line in /etc/pam.d/ssh (closes: #50310) + * mention ssh -A option in ssh.1 & ssh_config + * enable forwarding to localhost in default ssh_config (closes: #50373) + * tweak preinst to deal with debconf being `unpacked' + * use --with-tcp-wrappers (closes: #49545) + + -- Philip Hands <phil@hands.com> Sat, 20 Nov 1999 14:20:04 +0000 + +openssh (1:1.2pre11-2) unstable; urgency=low + + * oops, just realised that I forgot to strip out the unpleasant + fiddling mentioned below (which turned not to be a fix anyway) + + -- Philip Hands <phil@hands.com> Mon, 15 Nov 1999 01:35:23 +0000 + +openssh (1:1.2pre11-1) unstable; urgency=low + + * New upstream release (closes: #49722) + * add 2>/dev/null to dispose of spurious message casused by grep -q + (closes: #49876, #49604) + * fix typo in debian/control (closes: #49841) + * Do some unpleasant fiddling with upgraded keys in the preinst, which + should make the keylength problem go away. (closes: #49676) + * make pam_start in sshd use ``ssh'' as the service name (closes: #49956) + * If /etc/ssh/NOSERVER exist, stop sshd from starting (closes: #47107) + * apply Ben Collins <bcollins@debian.org>'s shadow patch + * disable lastlogin and motd printing if using pam (closes: #49957) + * add ssh-copy-id script and manpage + + -- Philip Hands <phil@hands.com> Fri, 12 Nov 1999 01:03:38 +0000 + +openssh (1:1.2pre9-1) unstable; urgency=low + + * New upstream release + * apply Chip Salzenberg <chip@valinux.com>'s SO_REUSEADDR patch + to channels.c, to make forwarded ports instantly reusable + * replace Pre-Depend: debconf with some check code in preinst + * make the ssh-add ssh-askpass failure message more helpful + * fix the ssh-agent getopts bug (closes: #49426) + * fixed typo on Suggests: line (closes: #49704, #49571) + * tidy up ssh package description (closes: #49642) + * make ssh suid (closes: #49635) + * in preinst upgrade code, ensure ssh_host_keys is mode 600 (closes: #49606) + * disable agent forwarding by default, for the similar reasons as + X forwarding (closes: #49586) + + -- Philip Hands <phil@hands.com> Tue, 9 Nov 1999 09:57:47 +0000 + +openssh (1:1.2pre7-4) unstable; urgency=low + + * predepend on debconf (>= 0.2.17) should now allow preinst questions + + -- Philip Hands <phil@hands.com> Sat, 6 Nov 1999 10:31:06 +0000 + +openssh (1:1.2pre7-3) unstable; urgency=low + + * add ssh-askpass package using Tommi Virtanen's perl-tk script + * add ssh-preconfig package cludge + * add usage hints to ssh-agent.1 + + -- Philip Hands <phil@hands.com> Fri, 5 Nov 1999 00:38:33 +0000 + +openssh (1:1.2pre7-2) unstable; urgency=low + + * use pam patch from Ben Collins <bcollins@debian.org> + * add slogin symlink to Makefile.in + * change /usr/bin/login to LOGIN_PROGRAM define of /bin/login + * sort out debconf usage + * patch from Tommi Virtanen <tv@debian.org>'s makes ssh-add use ssh-askpass + + -- Philip Hands <phil@hands.com> Thu, 4 Nov 1999 11:08:54 +0000 + +openssh (1:1.2pre7-1) unstable; urgency=low + + * New upstream release + + -- Philip Hands <phil@hands.com> Tue, 2 Nov 1999 21:02:37 +0000 + +openssh (1:1.2.0.pre6db1-2) unstable; urgency=low + + * change the binary package name to ssh (the non-free branch of ssh has + been renamed to ssh-nonfree) + * make pam file comply with Debian standards + * use an epoch to make sure openssh supercedes ssh-nonfree + + -- Philip Hands <phil@hands.com> Sat, 30 Oct 1999 16:26:05 +0100 + +openssh (1.2pre6db1-1) unstable; urgency=low + + * New upstream source + * sshd accepts logins now! + + -- Dan Brosemer <odin@linuxfreak.com> Fri, 29 Oct 1999 11:13:38 -0500 + +openssh (1.2.0.19991028-1) unstable; urgency=low + + * New upstream source + * Added test for -lnsl to configure script + + -- Dan Brosemer <odin@linuxfreak.com> Thu, 28 Oct 1999 18:52:09 -0500 + +openssh (1.2.0.19991027-3) unstable; urgency=low + + * Initial release + + -- Dan Brosemer <odin@linuxfreak.com> Wed, 27 Oct 1999 19:39:46 -0500 |