summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2018-08-24 13:44:16 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2018-08-24 13:44:16 +0000
commiteeb668edead09dabe09b5db4a1f3279f892a40fa (patch)
tree6bc158050940541bf908aaa9325a45cb0c898f4a
parentMerging debian version 1:7.4p1-10+deb9u4. (diff)
downloadopenssh-eeb668edead09dabe09b5db4a1f3279f892a40fa.zip
openssh-eeb668edead09dabe09b5db4a1f3279f892a40fa.tar.xz
Releasing progress-linux version 1:7.4p1-10+deb9u4dschinn1.HEADprogress-linux/1%7.4p1-10+deb9u4dschinn1progress-linux
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
-rw-r--r--debian/changelog67
1 files changed, 67 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog
index 7dce772..5ba4dc1 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,70 @@
+openssh (1:7.4p1-10+deb9u4dschinn1) dschinn; urgency=high
+
+ * Uploading to dschinn, remaining changes:
+ - Updating maintainer field.
+ - Updating uploaders field.
+ - Updating bugs field.
+ - Updating vcs fields.
+ - Updating source local-options.
+ - Enabling pam_access.so for openssh-server by default.
+ - Disabling pam_motd.so for openssh-server by default.
+ - Setting default size of RSA user keys in ssh-keygen to 4096 bits.
+ - Setting default size of ECDSA user keys in ssh-keygen to 521 bits.
+ - Removing obsolete protocol 1 specific settings in /etc/ssh/ssh_config.
+ - Deduplicate options in /etc/ssh/ssh_config.
+ - Removing example for potentially weak DSA user keys in
+ /etc/ssh/ssh_config.
+ - Removing example for potentially weak ECDSA user keys in
+ /etc/ssh/ssh_config.
+ - Enabling RSA user keys explicitly in /etc/ssh/ssh_config.
+ - Enabling ED25519 user keys explicitly in /etc/ssh/ssh_config.
+ - Setting PubkeyAcceptedKeyTypes to ssh-rsa-cert-v01@openssh.com,ssh-rsa
+ in /etc/ssh/sshd_config.
+ - Setting HostKeyAlgorithms to ssh-rsa-cert-v01@openssh.com,ssh-rsa in
+ /etc/ssh/ssh_config.
+ - Setting Ciphers to
+ aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes128-ctr in
+ /etc/ssh/ssh_config.
+ - Setting KexAlgorithms to diffie-hellman-group-exchange-sha256 in
+ /etc/ssh/ssh_config.
+ - Setting MACs to hmac-sha2-512-etm@openssh.com,hmac-
+ sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-256 in
+ /etc/ssh/ssh_config.
+ - Setting default VerifyHostKeyDNS to ask in /etc/ssh/ssh_config.
+ - Disabling to generate potentially weak DSA host keys.
+ - Disabling to generate potentially weak ECDSA host keys.
+ - Creating empty RSA host certificate if necessary.
+ - Creating empty ED25519 host certificate if necessary.
+ - Removing CVS header in /etc/ssh/sshd_config.
+ - Removing example for potentially weak ECDSA host keys in
+ /etc/ssh/sshd_config.
+ - Enabling RSA host key explicitly in /etc/ssh/sshd_config.
+ - Enabling ED25519 host key explicitly in /etc/ssh/sshd_config.
+ - Setting HostCertificate to /etc/ssh/ssh_host_rsa_key-cert.pub in
+ /etc/ssh/sshd_config.
+ - Setting HostKeyAlgorithms to ssh-rsa-cert-v01@openssh.com,ssh-rsa in
+ /etc/ssh/sshd_config.
+ - Setting Ciphers to
+ aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes128-ctr in
+ /etc/ssh/sshd_config.
+ - Setting KexAlgorithms to diffie-hellman-group-exchange-sha256 in
+ /etc/ssh/sshd_config.
+ - Setting MACs to hmac-sha2-512-etm@openssh.com,hmac-
+ sha2-256-etm@openssh.com,hmac-sha2-512,hmac-sha2-256 in
+ /etc/ssh/sshd_config.
+ - Setting PermitRootLogin to no in /etc/ssh/sshd_config.
+ - Setting PubkeyAcceptedKeyTypes to ssh-rsa-cert-v01@openssh.com,ssh-rsa
+ in /etc/ssh/sshd_config.
+ - Setting AuthorizedKeysFile to /etc/ssh/authorized_keys/%u and
+ .ssh/authorized_keys in /etc/ssh/sshd_config.
+ - Setting PasswordAuthentication to no in /etc/ssh/sshd_config.
+ - Setting UseDNS to yes in /etc/ssh/sshd_config.
+ - Setting DebianBanner to no in /etc/ssh/sshd_config.
+ - Adding sftp-only group configuration in /etc/ssh/sshd_config.
+ * Merging debian version 1:7.4p1-10+deb9u4.
+
+ -- Daniel Baumann <daniel.baumann@progress-linux.org> Fri, 24 Aug 2018 15:42:30 +0200
+
openssh (1:7.4p1-10+deb9u4) stretch-security; urgency=high
* Non-maintainer upload by the Security Team