Public bug reported:

Scheduled-For: ubuntu-later
Upstream: tbd
Debian:   1:9.0p1-1    
Ubuntu:   1:9.0p1-1ubuntu7


### New Debian Changes ###

openssh (1:9.0p1-1) unstable; urgency=medium

  * New upstream release (https://www.openssh.com/releasenotes.html#9.0p1):
    - scp(1): Use the SFTP protocol by default (closes: #144579, #204546,
      #327019). This changes scp's quoting semantics by no longer performing
      wildcard expansion using the remote shell, and (with some server
      versions) no longer expanding ~user paths. The -O option is available
      to use the old protocol. See NEWS.Debian for more details.
    - ssh(1), sshd(8): use the hybrid Streamlined NTRU Prime + x25519 key
      exchange method by default ('sntrup761x25519-sha...@openssh.com').
      The NTRU algorithm is believed to resist attacks enabled by future
      quantum computers and is paired with the X25519 ECDH key exchange (the
      previous default) as a backstop against any weaknesses in NTRU Prime
      that may be discovered in the future. The combination ensures that the
      hybrid exchange offers at least as good security as the status quo.
    - sftp-server(8): support the 'copy-data' extension to allow server-
      side copying of files/data, following the design in
      draft-ietf-secsh-filexfer-extensions-00.
    - sftp(1): add a 'cp' command to allow the sftp client to perform
      server-side file copies.
    - ssh(1), sshd(8): upstream: fix poll(2) spin when a channel's output fd
      closes without data in the channel buffer (closes: #1007822).
    - sshd(8): pack pollfd array in server listen/accept loop. Could cause
      the server to hang/spin when MaxStartups > RLIMIT_NOFILE.
    - ssh-keygen(1): avoid NULL deref via the find-principals and
      check-novalidate operations. bz3409 and GHPR307 respectively.
    - scp(1): fix a memory leak in argument processing.
    - sshd(8): don't try to resolve ListenAddress directives in the sshd
      re-exec path. They are unused after re-exec and parsing errors
      (possible for example if the host's network configuration changed)
      could prevent connections from being accepted.
    - sshd(8): when refusing a public key authentication request from a
      client for using an unapproved or unsupported signature algorithm
      include the algorithm name in the log message to make debugging
      easier.
    - ssh(1), sshd(8): Fix possible integer underflow in scan_scaled(3)
      parsing of K/M/G/etc quantities.
    - sshd(8): default to not using sandbox when cross compiling. On most
      systems poll(2) does not work when the number of FDs is reduced with
      setrlimit, so assume it doesn't when cross compiling and we can't run
      the test.
  * Remove obsolete FAQ, removed from openssh.com in 2016.

 -- Colin Watson <cjwat...@debian.org>  Sat, 09 Apr 2022 14:14:10 +0100

openssh (1:8.9p1-3) unstable; urgency=medium

  * Allow ppoll_time64 in seccomp filter (closes: #1006445).

 -- Colin Watson <cjwat...@debian.org>  Fri, 25 Feb 2022 23:30:49 +0000

openssh (1:8.9p1-2) unstable; urgency=medium

  * Improve detection of -fzero-call-used-regs=all support.

 -- Colin Watson <cjwat...@debian.org>  Thu, 24 Feb 2022 16:09:56 +0000

openssh (1:8.9p1-1) unstable; urgency=medium

  * New upstream release (https://www.openssh.com/releasenotes.html#8.9p1):
    - sshd(8): fix an integer overflow in the user authentication path that,
      in conjunction with other logic errors, could have yielded
      unauthenticated access under difficult to exploit conditions.
    - sshd(8), portable OpenSSH only: this release removes in-built support
      for MD5-hashed passwords.
    - ssh(1), sshd(8), ssh-add(1), ssh-agent(1): add a system for
      restricting forwarding and use of keys added to ssh-agent(1).
    - ssh(1), sshd(8): add the sntrup761x25519-sha...@openssh.com hybrid
      ECDH/x25519 + Streamlined NTRU Prime post-quantum KEX to the default
      KEXAlgorithms list (after the ECDH methods but before the prime-group
      DH ones). The next release of OpenSSH is likely to make this key
      exchange the default method.
    - ssh-keygen(1): when downloading resident keys from a FIDO token, pass
      back the user ID that was used when the key was created and append it
      to the filename the key is written to (if it is not the default).
      Avoids keys being clobbered if the user created multiple resident keys
      with the same application string but different user IDs.
    - ssh-keygen(1), ssh(1), ssh-agent(1): better handling for FIDO keys on
      tokens that provide user verification (UV) on the device itself,
      including biometric keys, avoiding unnecessary PIN prompts.
    - ssh-keygen(1): add 'ssh-keygen -Y match-principals' operation to
      perform matching of principals names against an allowed signers file.
      To be used towards a TOFU model for SSH signatures in git.
    - ssh-add(1), ssh-agent(1): allow pin-required FIDO keys to be added to
      ssh-agent(1). $SSH_ASKPASS will be used to request the PIN at
      authentication time.
    - ssh-keygen(1): allow selection of hash at sshsig signing time (either
      sha512 (default) or sha256).
    - ssh(1), sshd(8): read network data directly to the packet input buffer
      instead indirectly via a small stack buffer. Provides a modest
      performance improvement.
    - ssh(1), sshd(8): read data directly to the channel input buffer,
      providing a similar modest performance improvement.
    - ssh(1): extend the PubkeyAuthentication configuration directive to
      accept yes|no|unbound|host-bound to allow control over one of the
      protocol extensions used to implement agent-restricted keys.
    - sshd(8): document that CASignatureAlgorithms, ExposeAuthInfo and
      PubkeyAuthOptions can be used in a Match block.
    - sshd(8): fix possible string truncation when constructing paths to
      .rhosts/.shosts files with very long user home directory names.


### Old Ubuntu Delta ###

openssh (1:9.0p1-1ubuntu7) kinetic; urgency=medium

  * Update list of stock sshd_config checksums to include those from
    jammy and kinetic.
  * Add a workaround for LP: #1990863 (now fixed in livecd-rootfs) to
    avoid spurious ucf prompts on upgrade.
  * Move /run/sshd creation out of the systemd unit to a tmpfile config
    so that sshd can be run manually if necessary without having to create
    this directory by hand.  LP: #1991283.

  [ Nick Rosbrook ]
  * debian/openssh-server.postinst: Fix addresses.conf generation when only
    non-default Port is used in /etc/ssh/sshd_config (LP: #1991199).

 -- Steve Langasek <vor...@debian.org>  Mon, 26 Sep 2022 21:55:14 +0000

openssh (1:9.0p1-1ubuntu6) kinetic; urgency=medium

  * Fix syntax error in postinst :/

 -- Steve Langasek <vor...@debian.org>  Fri, 23 Sep 2022 19:51:32 +0000

openssh (1:9.0p1-1ubuntu5) kinetic; urgency=medium

  * Correctly handle the case of new installs, and correctly apply systemd
    unit overrides on upgrade from existing kinetic systems.

 -- Steve Langasek <vor...@debian.org>  Fri, 23 Sep 2022 19:45:18 +0000

openssh (1:9.0p1-1ubuntu4) kinetic; urgency=medium

  * Don't migrate users to socket activation if multiple ListenAddresses
    might make sshd unreliable on boot.
  * Fix regexp bug that prevented proper migration of IPv6 address settings.

 -- Steve Langasek <vor...@debian.org>  Fri, 23 Sep 2022 19:35:37 +0000

openssh (1:9.0p1-1ubuntu3) kinetic; urgency=medium

  * Document in the default sshd_config file the changes in behavior 
    triggered by use of socket-based activation.

 -- Steve Langasek <steve.langa...@ubuntu.com>  Fri, 26 Aug 2022
00:40:11 +0000

openssh (1:9.0p1-1ubuntu2) kinetic; urgency=medium

  * Fix manpage to not claim socket-based activation is the default on
    Debian!

 -- Steve Langasek <steve.langa...@ubuntu.com>  Fri, 26 Aug 2022
00:21:42 +0000

openssh (1:9.0p1-1ubuntu1) kinetic; urgency=medium

  * debian/patches/systemd-socket-activation.patch: support systemd
    socket activation.
  * debian/systemd/ssh.socket, debian/systemd/ssh.service: use socket
    activation by default.
  * debian/rules: rejigger dh_installsystemd invocations so ssh.service and
    ssh.socket don't fight.
  * debian/openssh-server.postinst: handle migration of sshd_config options
    to systemd socket options on upgrade.
  * debian/README.Debian: document systemd socket activation.
  * debian/patches/socket-activation-documentation.patch: Document in
    sshd_config(5) that ListenAddress and Port no longer work.
  * debian/openssh-server.templates, debian/openssh-server.postinst: include
    debconf warning about possible service failure with multiple
    ListenAddress settings.

 -- Steve Langasek <steve.langa...@ubuntu.com>  Fri, 19 Aug 2022
20:43:16 +0000

** Affects: openssh (Ubuntu)
     Importance: Undecided
         Status: Incomplete


** Tags: needs-merge upgrade-software-version

** Changed in: openssh (Ubuntu)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1993427

Title:
  Merge openssh from Debian unstable for l-series

Status in openssh package in Ubuntu:
  Incomplete

Bug description:
  Scheduled-For: ubuntu-later
  Upstream: tbd
  Debian:   1:9.0p1-1    
  Ubuntu:   1:9.0p1-1ubuntu7


  
  ### New Debian Changes ###

  openssh (1:9.0p1-1) unstable; urgency=medium

    * New upstream release (https://www.openssh.com/releasenotes.html#9.0p1):
      - scp(1): Use the SFTP protocol by default (closes: #144579, #204546,
        #327019). This changes scp's quoting semantics by no longer performing
        wildcard expansion using the remote shell, and (with some server
        versions) no longer expanding ~user paths. The -O option is available
        to use the old protocol. See NEWS.Debian for more details.
      - ssh(1), sshd(8): use the hybrid Streamlined NTRU Prime + x25519 key
        exchange method by default ('sntrup761x25519-sha...@openssh.com').
        The NTRU algorithm is believed to resist attacks enabled by future
        quantum computers and is paired with the X25519 ECDH key exchange (the
        previous default) as a backstop against any weaknesses in NTRU Prime
        that may be discovered in the future. The combination ensures that the
        hybrid exchange offers at least as good security as the status quo.
      - sftp-server(8): support the 'copy-data' extension to allow server-
        side copying of files/data, following the design in
        draft-ietf-secsh-filexfer-extensions-00.
      - sftp(1): add a 'cp' command to allow the sftp client to perform
        server-side file copies.
      - ssh(1), sshd(8): upstream: fix poll(2) spin when a channel's output fd
        closes without data in the channel buffer (closes: #1007822).
      - sshd(8): pack pollfd array in server listen/accept loop. Could cause
        the server to hang/spin when MaxStartups > RLIMIT_NOFILE.
      - ssh-keygen(1): avoid NULL deref via the find-principals and
        check-novalidate operations. bz3409 and GHPR307 respectively.
      - scp(1): fix a memory leak in argument processing.
      - sshd(8): don't try to resolve ListenAddress directives in the sshd
        re-exec path. They are unused after re-exec and parsing errors
        (possible for example if the host's network configuration changed)
        could prevent connections from being accepted.
      - sshd(8): when refusing a public key authentication request from a
        client for using an unapproved or unsupported signature algorithm
        include the algorithm name in the log message to make debugging
        easier.
      - ssh(1), sshd(8): Fix possible integer underflow in scan_scaled(3)
        parsing of K/M/G/etc quantities.
      - sshd(8): default to not using sandbox when cross compiling. On most
        systems poll(2) does not work when the number of FDs is reduced with
        setrlimit, so assume it doesn't when cross compiling and we can't run
        the test.
    * Remove obsolete FAQ, removed from openssh.com in 2016.

   -- Colin Watson <cjwat...@debian.org>  Sat, 09 Apr 2022 14:14:10
  +0100

  openssh (1:8.9p1-3) unstable; urgency=medium

    * Allow ppoll_time64 in seccomp filter (closes: #1006445).

   -- Colin Watson <cjwat...@debian.org>  Fri, 25 Feb 2022 23:30:49
  +0000

  openssh (1:8.9p1-2) unstable; urgency=medium

    * Improve detection of -fzero-call-used-regs=all support.

   -- Colin Watson <cjwat...@debian.org>  Thu, 24 Feb 2022 16:09:56
  +0000

  openssh (1:8.9p1-1) unstable; urgency=medium

    * New upstream release (https://www.openssh.com/releasenotes.html#8.9p1):
      - sshd(8): fix an integer overflow in the user authentication path that,
        in conjunction with other logic errors, could have yielded
        unauthenticated access under difficult to exploit conditions.
      - sshd(8), portable OpenSSH only: this release removes in-built support
        for MD5-hashed passwords.
      - ssh(1), sshd(8), ssh-add(1), ssh-agent(1): add a system for
        restricting forwarding and use of keys added to ssh-agent(1).
      - ssh(1), sshd(8): add the sntrup761x25519-sha...@openssh.com hybrid
        ECDH/x25519 + Streamlined NTRU Prime post-quantum KEX to the default
        KEXAlgorithms list (after the ECDH methods but before the prime-group
        DH ones). The next release of OpenSSH is likely to make this key
        exchange the default method.
      - ssh-keygen(1): when downloading resident keys from a FIDO token, pass
        back the user ID that was used when the key was created and append it
        to the filename the key is written to (if it is not the default).
        Avoids keys being clobbered if the user created multiple resident keys
        with the same application string but different user IDs.
      - ssh-keygen(1), ssh(1), ssh-agent(1): better handling for FIDO keys on
        tokens that provide user verification (UV) on the device itself,
        including biometric keys, avoiding unnecessary PIN prompts.
      - ssh-keygen(1): add 'ssh-keygen -Y match-principals' operation to
        perform matching of principals names against an allowed signers file.
        To be used towards a TOFU model for SSH signatures in git.
      - ssh-add(1), ssh-agent(1): allow pin-required FIDO keys to be added to
        ssh-agent(1). $SSH_ASKPASS will be used to request the PIN at
        authentication time.
      - ssh-keygen(1): allow selection of hash at sshsig signing time (either
        sha512 (default) or sha256).
      - ssh(1), sshd(8): read network data directly to the packet input buffer
        instead indirectly via a small stack buffer. Provides a modest
        performance improvement.
      - ssh(1), sshd(8): read data directly to the channel input buffer,
        providing a similar modest performance improvement.
      - ssh(1): extend the PubkeyAuthentication configuration directive to
        accept yes|no|unbound|host-bound to allow control over one of the
        protocol extensions used to implement agent-restricted keys.
      - sshd(8): document that CASignatureAlgorithms, ExposeAuthInfo and
        PubkeyAuthOptions can be used in a Match block.
      - sshd(8): fix possible string truncation when constructing paths to
        .rhosts/.shosts files with very long user home directory names.


  ### Old Ubuntu Delta ###

  openssh (1:9.0p1-1ubuntu7) kinetic; urgency=medium

    * Update list of stock sshd_config checksums to include those from
      jammy and kinetic.
    * Add a workaround for LP: #1990863 (now fixed in livecd-rootfs) to
      avoid spurious ucf prompts on upgrade.
    * Move /run/sshd creation out of the systemd unit to a tmpfile config
      so that sshd can be run manually if necessary without having to create
      this directory by hand.  LP: #1991283.

    [ Nick Rosbrook ]
    * debian/openssh-server.postinst: Fix addresses.conf generation when only
      non-default Port is used in /etc/ssh/sshd_config (LP: #1991199).

   -- Steve Langasek <vor...@debian.org>  Mon, 26 Sep 2022 21:55:14
  +0000

  openssh (1:9.0p1-1ubuntu6) kinetic; urgency=medium

    * Fix syntax error in postinst :/

   -- Steve Langasek <vor...@debian.org>  Fri, 23 Sep 2022 19:51:32
  +0000

  openssh (1:9.0p1-1ubuntu5) kinetic; urgency=medium

    * Correctly handle the case of new installs, and correctly apply systemd
      unit overrides on upgrade from existing kinetic systems.

   -- Steve Langasek <vor...@debian.org>  Fri, 23 Sep 2022 19:45:18
  +0000

  openssh (1:9.0p1-1ubuntu4) kinetic; urgency=medium

    * Don't migrate users to socket activation if multiple ListenAddresses
      might make sshd unreliable on boot.
    * Fix regexp bug that prevented proper migration of IPv6 address settings.

   -- Steve Langasek <vor...@debian.org>  Fri, 23 Sep 2022 19:35:37
  +0000

  openssh (1:9.0p1-1ubuntu3) kinetic; urgency=medium

    * Document in the default sshd_config file the changes in behavior 
      triggered by use of socket-based activation.

   -- Steve Langasek <steve.langa...@ubuntu.com>  Fri, 26 Aug 2022
  00:40:11 +0000

  openssh (1:9.0p1-1ubuntu2) kinetic; urgency=medium

    * Fix manpage to not claim socket-based activation is the default on
      Debian!

   -- Steve Langasek <steve.langa...@ubuntu.com>  Fri, 26 Aug 2022
  00:21:42 +0000

  openssh (1:9.0p1-1ubuntu1) kinetic; urgency=medium

    * debian/patches/systemd-socket-activation.patch: support systemd
      socket activation.
    * debian/systemd/ssh.socket, debian/systemd/ssh.service: use socket
      activation by default.
    * debian/rules: rejigger dh_installsystemd invocations so ssh.service and
      ssh.socket don't fight.
    * debian/openssh-server.postinst: handle migration of sshd_config options
      to systemd socket options on upgrade.
    * debian/README.Debian: document systemd socket activation.
    * debian/patches/socket-activation-documentation.patch: Document in
      sshd_config(5) that ListenAddress and Port no longer work.
    * debian/openssh-server.templates, debian/openssh-server.postinst: include
      debconf warning about possible service failure with multiple
      ListenAddress settings.

   -- Steve Langasek <steve.langa...@ubuntu.com>  Fri, 19 Aug 2022
  20:43:16 +0000

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1993427/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to