summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2018-09-09 20:05:39 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2018-09-11 10:28:00 +0000
commit5693eab55115ac73618a69ec286ae4eb99a80bf8 (patch)
treeacde9daa199e746b57cdce12eb1bfdc7b5ed66d1
parentRefreshing sshd-config-hostkeyalgorithms.patch. (diff)
downloadopenssh-progress-linux/1%7.8p1-1_dschinn1.zip
openssh-progress-linux/1%7.8p1-1_dschinn1.tar.xz
Releasing progress-linux version 1:7.8p1-1~dschinn1.HEADprogress-linux/1%7.8p1-1_dschinn1progress-linux
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
-rw-r--r--debian/changelog76
1 files changed, 76 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog
index 7c752b7..8a7eba0 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,79 @@
+openssh (1:7.8p1-1~dschinn1) dschinn-backports; urgency=medium
+
+ * Uploading to dschinn-backports, remaining changes:
+ - Updating maintainer field.
+ - Updating uploaders field.
+ - Updating bugs field.
+ - Updating vcs fields.
+ - Updating source local-options.
+ - Enabling pam_access.so for openssh-server by default.
+ - Disabling pam_motd.so for openssh-server by default.
+ - Setting default size of RSA user keys in ssh-keygen to 4096 bits.
+ - Setting default size of ECDSA user keys in ssh-keygen to 521 bits.
+ - Deduplicate options in /etc/ssh/ssh_config.
+ - Removing example for potentially weak DSA user keys in
+ /etc/ssh/ssh_config.
+ - Removing example for potentially weak ECDSA user keys in
+ /etc/ssh/ssh_config.
+ - Enabling RSA user keys explicitly in /etc/ssh/ssh_config.
+ - Enabling ED25519 user keys explicitly in /etc/ssh/ssh_config.
+ - Setting PubkeyAcceptedKeyTypes to ssh-ed25519-cert-v01@openssh.com,
+ ssh-rsa-cert-v01@openssh.com,ssh-ed25519,ssh-rsa in /etc/ssh/sshd_config.
+ - Setting HostKeyAlgorithms to ssh-ed25519-cert-v01@openssh.com,
+ ssh-rsa-cert-v01@openssh.com,ssh-ed25519,ssh-rsa in /etc/ssh/ssh_config.
+ - Setting Ciphers to
+ aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes128-ctr in
+ /etc/ssh/ssh_config.
+ - Setting KexAlgorithms to curve25519-sha256,curve25519-sha256@libssh.org,
+ diffie-hellman-group-exchange-sha256 in /etc/ssh/ssh_config.
+ - Setting MACs to hmac-sha2-512-etm@openssh.com,hmac-
+ sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-256 in
+ /etc/ssh/ssh_config.
+ - Setting default VerifyHostKeyDNS to ask in /etc/ssh/ssh_config.
+ - Disabling to generate potentially weak DSA host keys.
+ - Disabling to generate potentially weak ECDSA host keys.
+ - Creating empty RSA host certificate if necessary.
+ - Creating empty ED25519 host certificate if necessary.
+ - Removing CVS header in /etc/ssh/sshd_config.
+ - Removing example for potentially weak ECDSA host keys in
+ /etc/ssh/sshd_config.
+ - Enabling RSA host key explicitly in /etc/ssh/sshd_config.
+ - Enabling ED25519 host key explicitly in /etc/ssh/sshd_config.
+ - Setting HostCertificate to /etc/ssh/ssh_host_rsa_key-cert.pub in
+ /etc/ssh/sshd_config.
+ - Setting HostKeyAlgorithms to ssh-ed25519-cert-v01@openssh.com,
+ ssh-rsa-cert-v01@openssh.com,ssh-ed25519,ssh-rsa in /etc/ssh/sshd_config.
+ - Setting Ciphers to
+ aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes128-ctr in
+ /etc/ssh/sshd_config.
+ - Setting KexAlgorithms to curve25519-sha256,curve25519-sha256@libssh.org,
+ diffie-hellman-group-exchange-sha256 in /etc/ssh/sshd_config.
+ - Setting MACs to hmac-sha2-512-etm@openssh.com,hmac-
+ sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-256 in
+ /etc/ssh/sshd_config.
+ - Setting PermitRootLogin to no in /etc/ssh/sshd_config.
+ - Setting PubkeyAcceptedKeyTypes to ssh-ed25519-cert-v01@openssh.com,
+ ssh-rsa-cert-v01@openssh.com,ssh-ed25519,ssh-rsa in /etc/ssh/sshd_config.
+ - Setting AuthorizedKeysFile to /etc/ssh/authorized_keys/%u and
+ .ssh/authorized_keys in /etc/ssh/sshd_config.
+ - Setting UseDNS to yes in /etc/ssh/sshd_config.
+ - Setting DebianBanner to no in /etc/ssh/sshd_config.
+ - Adding sftp-only group configuration in /etc/ssh/sshd_config.
+ - Setting openssh-server/password-authentication to false by default.
+ * Merging upstream version 1:7.8p1.
+ * Merging debian version 1:7.8p1-1.
+ * Refreshing ssh-config-pubkeyacceptedkeytypes.patch.
+ * Refreshing ssh-config-hostkeyalgorithms.patch.
+ * Refreshing ssh-config-ciphers.patch.
+ * Refreshing ssh-config-kexalgorithms.patch.
+ * Refreshing ssh-config-macs.patch.
+ * Refreshing sshd-config-remove-cvs-header.patch.
+ * Refreshing sshd-config-pubkeyacceptedkeytypes.patch.
+ * Refreshing sshd-config-authorizedkeysfile.patch.
+ * Refreshing sshd-config-hostkeyalgorithms.patch.
+
+ -- Daniel Baumann <daniel.baumann@progress-linux.org> Sun, 09 Sep 2018 22:05:08 +0200
+
openssh (1:7.8p1-1) unstable; urgency=medium
* New upstream release (https://www.openssh.com/txt/release-7.8, closes: