summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2018-03-04 07:22:27 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2018-03-04 07:22:27 +0000
commit8587a6c79cd1e84772543d1957af31de51dd2497 (patch)
tree29a9cd75d811ece8a7841078982cfe52419de95f
parentMerging debian version 1:7.4p1-10+deb9u3. (diff)
downloadopenssh-8587a6c79cd1e84772543d1957af31de51dd2497.zip
openssh-8587a6c79cd1e84772543d1957af31de51dd2497.tar.xz
Releasing progress-linux version 1:7.4p1-10+deb9u3dschinn1.progress-linux/1%7.4p1-10+deb9u3dschinn1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
-rw-r--r--debian/changelog68
1 files changed, 68 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog
index ccc0d46..2f41508 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,71 @@
+openssh (1:7.4p1-10+deb9u3dschinn1) dschinn; urgency=medium
+
+ * Uploading to dschinn, remaining changes:
+ - Updating maintainer field.
+ - Updating uploaders field.
+ - Updating bugs field.
+ - Updating vcs fields.
+ - Updating source local-options.
+ - Enabling pam_access.so for openssh-server by default.
+ - Disabling pam_motd.so for openssh-server by default.
+ - Setting default size of RSA user keys in ssh-keygen to 4096 bits.
+ - Setting default size of ECDSA user keys in ssh-keygen to 521 bits.
+ - Removing obsolete protocol 1 specific settings in /etc/ssh/ssh_config.
+ - Deduplicate options in /etc/ssh/ssh_config.
+ - Removing example for potentially weak DSA user keys in
+ /etc/ssh/ssh_config.
+ - Removing example for potentially weak ECDSA user keys in
+ /etc/ssh/ssh_config.
+ - Removing example for too new ED25519 user keys in /etc/ssh/ssh_config.
+ - Enabling RSA user keys explicitly in /etc/ssh/ssh_config.
+ - Setting PubkeyAcceptedKeyTypes to ssh-rsa-cert-v01@openssh.com,ssh-rsa
+ in /etc/ssh/sshd_config.
+ - Setting HostKeyAlgorithms to ssh-rsa-cert-v01@openssh.com,ssh-rsa in
+ /etc/ssh/ssh_config.
+ - Setting Ciphers to
+ aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes128-ctr in
+ /etc/ssh/ssh_config.
+ - Setting KexAlgorithms to diffie-hellman-group-exchange-sha256 in
+ /etc/ssh/ssh_config.
+ - Setting MACs to hmac-sha2-512-etm@openssh.com,hmac-
+ sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-256 in
+ /etc/ssh/ssh_config.
+ - Setting default VerifyHostKeyDNS to ask in /etc/ssh/ssh_config.
+ - Disabling to generate potentially weak DSA host keys.
+ - Disabling to generate potentially weak ECDSA host keys.
+ - Disabling to generate too new ED25519 host keys.
+ - Creating empty RSA host certificate if necessary.
+ - Removing CVS header in /etc/ssh/sshd_config.
+ - Removing example for potentially weak ECDSA host keys in
+ /etc/ssh/sshd_config.
+ - Removing example for too new ED25519 host keys in
+ /etc/ssh/sshd_config.
+ - Enabling RSA host key explicitly in /etc/ssh/sshd_config.
+ - Setting HostCertificate to /etc/ssh/ssh_host_rsa_key-cert.pub in
+ /etc/ssh/sshd_config.
+ - Setting HostKeyAlgorithms to ssh-rsa-cert-v01@openssh.com,ssh-rsa in
+ /etc/ssh/sshd_config.
+ - Setting Ciphers to
+ aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes128-ctr in
+ /etc/ssh/sshd_config.
+ - Setting KexAlgorithms to diffie-hellman-group-exchange-sha256 in
+ /etc/ssh/sshd_config.
+ - Setting MACs to hmac-sha2-512-etm@openssh.com,hmac-
+ sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-256 in
+ /etc/ssh/sshd_config.
+ - Setting PermitRootLogin to no in /etc/ssh/sshd_config.
+ - Setting PubkeyAcceptedKeyTypes to ssh-rsa-cert-v01@openssh.com,ssh-rsa
+ in /etc/ssh/sshd_config.
+ - Setting AuthorizedKeysFile to /etc/ssh/authorized_keys/%u and
+ .ssh/authorized_keys in /etc/ssh/sshd_config.
+ - Setting PasswordAuthentication to no in /etc/ssh/sshd_config.
+ - Setting UseDNS to yes in /etc/ssh/sshd_config.
+ - Setting DebianBanner to no in /etc/ssh/sshd_config.
+ - Adding sftp-only group configuration in /etc/ssh/sshd_config.
+ * Merging debian version 1:7.4p1-10+deb9u3.
+
+ -- Daniel Baumann <daniel.baumann@progress-linux.org> Sun, 04 Mar 2018 08:22:01 +0100
+
openssh (1:7.4p1-10+deb9u3) stretch; urgency=medium
* CVE-2017-15906: sftp-server(8): In read-only mode, sftp-server was