summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2017-03-05 17:37:09 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2017-03-05 17:37:09 +0000
commitc838909b7ff264930413885866c6a1ba965f1e39 (patch)
tree49f292cd4151409ef4b8185fa1c322c2d7f672b9
parentRefreshing sshd-config-authorizedkeysfile.patch. (diff)
downloadopenssh-c838909b7ff264930413885866c6a1ba965f1e39.zip
openssh-c838909b7ff264930413885866c6a1ba965f1e39.tar.xz
Releasing progress-linux version 1:7.4p1-7dschinn1.progress-linux/1%7.4p1-7dschinn1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
-rw-r--r--debian/changelog70
1 files changed, 70 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog
index b9ae8bb..98173fd 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,73 @@
+openssh (1:7.4p1-7dschinn1) dschinn; urgency=medium
+
+ * Uploading to dschinn, remaining changes:
+ - Updating maintainer field.
+ - Updating uploaders field.
+ - Updating bugs field.
+ - Updating vcs fields.
+ - Updating source local-options.
+ - Enabling pam_access.so for openssh-server by default.
+ - Disabling pam_motd.so for openssh-server by default.
+ - Setting default size of RSA user keys in ssh-keygen to 4096 bits.
+ - Setting default size of ECDSA user keys in ssh-keygen to 521 bits.
+ - Removing obsolete protocol 1 specific settings in /etc/ssh/ssh_config.
+ - Deduplicate options in /etc/ssh/ssh_config.
+ - Removing example for potentially weak DSA user keys in
+ /etc/ssh/ssh_config.
+ - Removing example for potentially weak ECDSA user keys in
+ /etc/ssh/ssh_config.
+ - Removing example for too new ED25519 user keys in /etc/ssh/ssh_config.
+ - Enabling RSA user keys explicitly in /etc/ssh/ssh_config.
+ - Setting PubkeyAcceptedKeyTypes to ssh-rsa-cert-v01@openssh.com,ssh-rsa
+ in /etc/ssh/sshd_config.
+ - Setting HostKeyAlgorithms to ssh-rsa-cert-v01@openssh.com,ssh-rsa in
+ /etc/ssh/ssh_config.
+ - Setting Ciphers to
+ aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes128-ctr in
+ /etc/ssh/ssh_config.
+ - Setting KexAlgorithms to diffie-hellman-group-exchange-sha256 in
+ /etc/ssh/ssh_config.
+ - Setting MACs to hmac-sha2-512-etm@openssh.com,hmac-
+ sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-256 in
+ /etc/ssh/ssh_config.
+ - Setting default VerifyHostKeyDNS to ask in /etc/ssh/ssh_config.
+ - Disabling to generate potentially weak DSA host keys.
+ - Disabling to generate potentially weak ECDSA host keys.
+ - Disabling to generate too new ED25519 host keys.
+ - Creating empty RSA host certificate if necessary.
+ - Removing CVS header in /etc/ssh/sshd_config.
+ - Removing example for potentially weak ECDSA host keys in
+ /etc/ssh/sshd_config.
+ - Removing example for too new ED25519 host keys in
+ /etc/ssh/sshd_config.
+ - Enabling RSA host key explicitly in /etc/ssh/sshd_config.
+ - Setting HostCertificate to /etc/ssh/ssh_host_rsa_key-cert.pub in
+ /etc/ssh/sshd_config.
+ - Setting HostKeyAlgorithms to ssh-rsa-cert-v01@openssh.com,ssh-rsa in
+ /etc/ssh/sshd_config.
+ - Setting Ciphers to
+ aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes128-ctr in
+ /etc/ssh/sshd_config.
+ - Setting KexAlgorithms to diffie-hellman-group-exchange-sha256 in
+ /etc/ssh/sshd_config.
+ - Setting MACs to hmac-sha2-512-etm@openssh.com,hmac-
+ sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-256 in
+ /etc/ssh/sshd_config.
+ - Setting PermitRootLogin to no in /etc/ssh/sshd_config.
+ - Setting PubkeyAcceptedKeyTypes to ssh-rsa-cert-v01@openssh.com,ssh-rsa
+ in /etc/ssh/sshd_config.
+ - Setting AuthorizedKeysFile to /etc/ssh/authorized_keys/%u and
+ .ssh/authorized_keys in /etc/ssh/sshd_config.
+ - Setting PasswordAuthentication to no in /etc/ssh/sshd_config.
+ - Setting UseDNS to yes in /etc/ssh/sshd_config.
+ - Setting DebianBanner to no in /etc/ssh/sshd_config.
+ - Adding sftp-only group configuration in /etc/ssh/sshd_config.
+ * Merging debian version 1:7.4p1-7.
+ * Refreshing sshd-config-pubkeyacceptedkeytypes.patch.
+ * Refreshing sshd-config-authorizedkeysfile.patch.
+
+ -- Daniel Baumann <daniel.baumann@progress-linux.org> Sun, 05 Mar 2017 17:58:27 +0100
+
openssh (1:7.4p1-7) unstable; urgency=medium
* Don't set "PermitRootLogin yes" on fresh installations (regression