lp:debian/squeeze/openssh

Created by James Westby and last modified
Get this branch:
bzr branch lp:debian/squeeze/openssh
Members of Ubuntu branches can upload to this branch. Log in for directions.

Related bugs

Related blueprints

Branch information

Owner:
Ubuntu branches
Status:
Development

Recent revisions

34. By Colin Watson

* Convert to source format 3.0 (quilt).
* Update README.source to match, and add a 'quilt-setup' target to
  debian/rules for the benefit of those checking out the package from
  revision control.
* All patches are now maintained separately and tagged according to DEP-3.
* Add GSSAPIStoreCredentialsOnRekey to 'sshd -T' configuration dump.
* Remove documentation of building for Debian 3.0 in README.Debian.
  Support for this was removed in 1:4.7p1-2.
* Remove obsolete header from README.Debian dating from when people
  expected non-free SSH.
* Update copyright years for GSSAPI patch.

33. By Colin Watson

* Link with -Wl,--as-needed (closes: #560155).
* Install upstream sshd_config as an example (closes: #415008).
* Use dh_lintian.
* Honour DEB_BUILD_OPTIONS=nocheck.

32. By Colin Watson

* New upstream release.
* Update to GSSAPI patch from
  http://www.sxw.org.uk/computing/patches/openssh-5.3p1-gsskex-all-20100124.patch.
* Backport from upstream:
  - Do not fall back to adding keys without contraints (ssh-add -c / -t
    ...) when the agent refuses the constrained add request. This was a
    useful migration measure back in 2002 when constraints were new, but
    just adds risk now (LP: #209447).
* Drop change from 1:3.8p1-3 to avoid setresuid() and setresgid() system
  calls. This only applied to Linux 2.2, which it's no longer feasible to
  run anyway (see 1:5.2p1-2 changelog).

31. By Colin Watson

[ Colin Watson ]
* Backport from upstream:
  - After sshd receives a SIGHUP, ignore subsequent HUPs while sshd
    re-execs itself. Prevents two HUPs in quick succession from resulting
    in sshd dying (LP: #497781).
  - Output a debug if we can't open an existing keyfile (LP: #505301).
* Use host compiler for ssh-askpass-gnome when cross-compiling.
* Don't run tests when cross-compiling.
* Drop change from 1:3.6.1p2-5 to disable cmsg_type check for file
  descriptor passing when running on Linux 2.0. The previous stable
  release of Debian dropped support for Linux 2.4, let alone 2.0, so this
  very likely has no remaining users depending on it.

[ Kees Cook ]
* Implement DebianBanner server configuration flag that can be set to "no"
  to allow sshd to run without the Debian-specific extra version in the
  initial protocol handshake (closes: #562048).

30. By Colin Watson

* New upstream release (closes: #536182). Yes, I know 5.3p1 has been out
  for a while, but there's no GSSAPI patch available for it yet.
  - Change the default cipher order to prefer the AES CTR modes and the
    revised "arcfour256" mode to CBC mode ciphers that are susceptible to
    CPNI-957037 "Plaintext Recovery Attack Against SSH".
  - Add countermeasures to mitigate CPNI-957037-style attacks against the
    SSH protocol's use of CBC-mode ciphers. Upon detection of an invalid
    packet length or Message Authentication Code, ssh/sshd will continue
    reading up to the maximum supported packet length rather than
    immediately terminating the connection. This eliminates most of the
    known differences in behaviour that leaked information about the
    plaintext of injected data which formed the basis of this attack
    (closes: #506115, LP: #379329).
  - ForceCommand directive now accepts commandline arguments for the
    internal-sftp server (closes: #524423, LP: #362511).
  - Add AllowAgentForwarding to available Match keywords list (closes:
    #540623).
  - Make ssh(1) send the correct channel number for
    SSH2_MSG_CHANNEL_SUCCESS and SSH2_MSG_CHANNEL_FAILURE messages to
    avoid triggering 'Non-public channel' error messages on sshd(8) in
    openssh-5.1.
  - Avoid printing 'Non-public channel' warnings in sshd(8), since the
    ssh(1) has sent incorrect channel numbers since ~2004 (this reverts a
    behaviour introduced in openssh-5.1; closes: #496017).
  - Disable nonfunctional ssh(1) ~C escape handler in multiplex slave
    connections (closes: #507541).
  - Fix "whitepsace" typo in ssh_config(5) (closes: #514313, LP: #303835).
* Update to GSSAPI patch from
  http://www.sxw.org.uk/computing/patches/openssh-5.2p1-gsskex-all-20090726.patch,
  including cascading credentials support (LP: #416958).
* Use x11.pc when compiling/linking gnome-ssh-askpass2 (closes: #555951).
* Moved to bzr.debian.org; add Vcs-Bzr and Vcs-Browser control fields.
* Add debian/README.source with instructions on bzr handling.
* Make ChrootDirectory work with SELinux (thanks, Russell Coker; closes:
  #556644).
* Initialise sc to NULL in ssh_selinux_getctxbyname (thanks, Václav Ovsík;
  closes: #498684).
* Don't duplicate backslashes when displaying server banner (thanks,
  Michał Górny; closes: #505378, LP: #425346).
* Use hardening-includes for hardening logic (thanks, Kees Cook; closes:
  #561887).
* Update OpenSSH FAQ to revision 1.110.
* Remove ssh/new_config, only needed for direct upgrades from potato which
  are no longer particularly feasible anyway (closes: #420682).
* Cope with insserv reordering of init script links.
* Remove init script stop link in rc1, as killprocs handles it already.
* Adjust short descriptions to avoid relying on previous experience with
  rsh, based on suggestions from Reuben Thomas (closes: #512198).
* Remove manual page references to login.conf, which aren't applicable on
  non-BSD systems (closes: #154434).
* Remove/adjust manual page references to BSD-specific /etc/rc (closes:
  #513417).
* Refer to sshd_config(5) rather than sshd(8) in postinst-written
  /etc/ssh/sshd_config, and add UsePAM commentary from upstream-shipped
  configuration file (closes: #415008, although unfortunately this will
  only be conveniently visible on new installations).
* Include URL to OpenBSD's ssl(8) in ssh(1), since I don't see a better
  source for the same information among Debian's manual pages (closes:
  #530692, LP: #456660).

29. By Colin Watson

* Build with just -fPIC on mips/mipsel, not -fPIE as well (thanks, LIU Qi;
  closes: #538313).
* Build-depend on libselinux1-dev on sh4 too (thanks, Nobuhiro Iwamatsu;
  closes: #547103).
* Fix grammar in if-up script (closes: #549128).
* Pass $SSHD_OPTS when checking configuration too (thanks, "sobtwmxt";
  closes: #548662).

28. By Colin Watson

* Update config.guess and config.sub from autotools-dev 20090611.1
  (closes: #538301).
* Set umask to 022 in the init script as well as postinsts (closes:
  #539030).
* Add ${misc:Depends} to keep Lintian happy.
* Use 'which' rather than 'type' in maintainer scripts.
* Upgrade to debhelper v7.

27. By Colin Watson

* Open /proc/self/oom_adj with O_RDONLY or O_WRONLY as necessary, rather
  than O_RDWR.
* Disable OOM adjustment for vserver/OpenVZ (thanks, Karl Chen; closes:
  #511771).
* Add ufw integration (thanks, Didier Roche; see
  https://wiki.ubuntu.com/UbuntuFirewall#Integrating%20UFW%20with%20Packages;
  LP: #261884).
* Add a comment above PermitRootLogin in sshd_config pointing to
  README.Debian.
* Check if delgroup is present in openssh-client.postrm (closes: #530501).
* Build with -fPIC on mips/mipsel (thanks, Luk Claes; closes: #531942).
* Remove /var/run/sshd from openssh-server package; it will be created at
  run-time before starting the server.
* Use invoke-rc.d in openssh-server's if-up script.

26. By Colin Watson

* Backport from upstream CVS (Markus Friedl):
  - packet_disconnect() on padding error, too. Should reduce the success
    probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18.
* Check that /var/run/sshd.pid exists and that the process ID listed there
  corresponds to sshd before running '/etc/init.d/ssh reload' from if-up
  script; SIGHUP is racy if called at boot before sshd has a chance to
  install its signal handler, but fortunately the pid file is written
  after that which lets us avoid the race (closes: #502444).
* While the above is a valuable sanity-check, it turns out that it doesn't
  really fix the bug (thanks to Kevin Price for testing), so for the
  meantime we'll just use '/etc/init.d/ssh restart', even though it is
  unfortunately heavyweight.

25. By Colin Watson

* ssh-copy-id: Strip trailing colons from hostname (closes: #226172,
  LP: #249706; thanks to Karl Goetz for nudging this along; forwarded
  upstream as https://bugzilla.mindrot.org/show_bug.cgi?id=1530).
* Backport from upstream CVS (Markus Friedl):
  - Only send eow and no-more-sessions requests to openssh 5 and newer;
    fixes interop problems with broken ssh v2 implementations (closes:
    #495917).
* Fix double-free when failing to parse a forwarding specification given
  using ~C (closes: #505330; forwarded upstream as
  https://bugzilla.mindrot.org/show_bug.cgi?id=1539).

Branch metadata

Branch format:
Branch format 7
Repository format:
Bazaar repository format 2a (needs bzr 1.16 or later)
This branch contains Public information 
Everyone can see this information.

Subscribers