Accepted openssh 1:4.2p1-1 (source all powerpc)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 14 Sep 2005 15:16:14 +0100
Source: openssh
Binary: ssh-askpass-gnome openssh-client-udeb ssh openssh-server openssh-client openssh-server-udeb
Architecture: source powerpc all
Version: 1:4.2p1-1
Distribution: unstable
Urgency: low
Maintainer: Matthew Vernon <matthew@debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Description:
openssh-client - Secure shell client, an rlogin/rsh/rcp replacement
openssh-client-udeb - Secure shell client for the Debian installer (udeb)
openssh-server - Secure shell server, an rshd replacement
openssh-server-udeb - Secure shell server for the Debian installer (udeb)
ssh - Secure shell client and server (transitional package)
ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add
Closes: 181162 208648 320104 324695 326065
Changes:
openssh (1:4.2p1-1) unstable; urgency=low
.
* New upstream release.
- SECURITY: Fix a bug introduced in OpenSSH 4.0 that caused GatewayPorts
to be incorrectly activated for dynamic ("-D") port forwardings when
no listen address was explicitly specified (closes: #326065).
- Add a new compression method ("Compression delayed") that delays zlib
compression until after authentication, eliminating the risk of zlib
vulnerabilities being exploited by unauthenticated users. Note that
users of OpenSSH versions earlier than 3.5 will need to disable
compression on the client or set "Compression yes" (losing this
security benefit) on the server.
- Increase the default size of new RSA/DSA keys generated by ssh-keygen
from 1024 to 2048 bits (closes: #181162).
- Many bugfixes and improvements to connection multiplexing.
- Don't pretend to accept $HOME (closes: #208648).
* debian/rules: Resynchronise CFLAGS with that generated by configure.
* openssh-client and openssh-server conflict with pre-split ssh to avoid
problems when ssh is left un-upgraded (closes: #324695).
* Set X11Forwarding to yes in the default sshd_config (new installs only).
At least when X11UseLocalhost is turned on, which is the default, the
security risks of using X11 forwarding are risks to the client, not to
the server (closes: #320104).
Files:
178047b053c1ccd0c09b5aa42c663da2 953 net standard openssh_4.2p1-1.dsc
93295701e6bcd76fabd6a271654ed15c 928420 net standard openssh_4.2p1.orig.tar.gz
de8b13991036a157fb89a1277c36ed70 153306 net standard openssh_4.2p1-1.diff.gz
359f8fed6358af698de006f923175263 1052 net extra ssh_4.2p1-1_all.deb
8d7e3e8de54516bfb1db71fa13049378 582104 net standard openssh-client_4.2p1-1_powerpc.deb
dfd29170f38c83a123da23a0164c4f57 215660 net optional openssh-server_4.2p1-1_powerpc.deb
f25a5d4fc687897338e15e6e40853eca 85428 gnome optional ssh-askpass-gnome_4.2p1-1_powerpc.deb
243723651a92cd52e1f43a1d03155c4f 157496 debian-installer optional openssh-client-udeb_4.2p1-1_powerpc.udeb
51bade95482a43d7e69a5a95c3400677 165090 debian-installer optional openssh-server-udeb_4.2p1-1_powerpc.udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFDKDam9t0zAhD6TNERAuvRAJ4lO0peam3SlphI+YRp9ifRD3mhQQCfZsh1
dWajDTamDn77FM5FLgtTUd8=
=q11C
-----END PGP SIGNATURE-----
Accepted:
openssh-client-udeb_4.2p1-1_powerpc.udeb
to pool/main/o/openssh/openssh-client-udeb_4.2p1-1_powerpc.udeb
openssh-client_4.2p1-1_powerpc.deb
to pool/main/o/openssh/openssh-client_4.2p1-1_powerpc.deb
openssh-server-udeb_4.2p1-1_powerpc.udeb
to pool/main/o/openssh/openssh-server-udeb_4.2p1-1_powerpc.udeb
openssh-server_4.2p1-1_powerpc.deb
to pool/main/o/openssh/openssh-server_4.2p1-1_powerpc.deb
openssh_4.2p1-1.diff.gz
to pool/main/o/openssh/openssh_4.2p1-1.diff.gz
openssh_4.2p1-1.dsc
to pool/main/o/openssh/openssh_4.2p1-1.dsc
openssh_4.2p1.orig.tar.gz
to pool/main/o/openssh/openssh_4.2p1.orig.tar.gz
ssh-askpass-gnome_4.2p1-1_powerpc.deb
to pool/main/o/openssh/ssh-askpass-gnome_4.2p1-1_powerpc.deb
ssh_4.2p1-1_all.deb
to pool/main/o/openssh/ssh_4.2p1-1_all.deb
Reply to: