Your message dated Mon, 04 Jan 2010 15:44:23 +0000 with message-id <E1NRp6V-0006eb-EQ@ries.debian.org> and subject line Bug#506115: fixed in openssh 1:5.2p1-1 has caused the Debian Bug report #506115, regarding openssh: Plaintext Recovery Attack Against SSH to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 506115: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506115 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: openssh: Plaintext Recovery Attack Against SSH
- From: Hideki Yamane <henrich@debian.or.jp>
- Date: Tue, 18 Nov 2008 22:44:02 +0900
- Message-id: <20081118224402.62f86482.henrich@debian.or.jp>
package: openssh servity: grave tag: security upstream Hi OpenSSH package maintainers (and lists), I saw new OpenSSH vulnerability issue. See http://www.cpni.gov.uk/Docs/Vulnerability_Advisory_SSH.txt It says "The attack was verified against the following product version running on Debian GNU/Linux: - OpenSSH 4.7p1 Other versions are also affected. Other implementations of the SSH protocol may also be affected." and upstream was reported this issue by CPNI (they say). IMHO, we should contact to upstream and wait to be put a solution from them. -- Regards, Hideki Yamane henrich @ debian.or.jp/iijmio-mail.jp http://wiki.debian.org/HidekiYamaneAttachment: pgpcucNp_4jaO.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
- To: 506115-close@bugs.debian.org
- Subject: Bug#506115: fixed in openssh 1:5.2p1-1
- From: Colin Watson <cjwatson@debian.org>
- Date: Mon, 04 Jan 2010 15:44:23 +0000
- Message-id: <E1NRp6V-0006eb-EQ@ries.debian.org>
Source: openssh Source-Version: 1:5.2p1-1 We believe that the bug you reported is fixed in the latest version of openssh, which is due to be installed in the Debian FTP archive: openssh-client-udeb_5.2p1-1_i386.udeb to main/o/openssh/openssh-client-udeb_5.2p1-1_i386.udeb openssh-client_5.2p1-1_i386.deb to main/o/openssh/openssh-client_5.2p1-1_i386.deb openssh-server-udeb_5.2p1-1_i386.udeb to main/o/openssh/openssh-server-udeb_5.2p1-1_i386.udeb openssh-server_5.2p1-1_i386.deb to main/o/openssh/openssh-server_5.2p1-1_i386.deb openssh_5.2p1-1.diff.gz to main/o/openssh/openssh_5.2p1-1.diff.gz openssh_5.2p1-1.dsc to main/o/openssh/openssh_5.2p1-1.dsc openssh_5.2p1.orig.tar.gz to main/o/openssh/openssh_5.2p1.orig.tar.gz ssh-askpass-gnome_5.2p1-1_i386.deb to main/o/openssh/ssh-askpass-gnome_5.2p1-1_i386.deb ssh-krb5_5.2p1-1_all.deb to main/o/openssh/ssh-krb5_5.2p1-1_all.deb ssh_5.2p1-1_all.deb to main/o/openssh/ssh_5.2p1-1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 506115@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson <cjwatson@debian.org> (supplier of updated openssh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Mon, 04 Jan 2010 13:23:35 +0000 Source: openssh Binary: openssh-client openssh-server ssh ssh-krb5 ssh-askpass-gnome openssh-client-udeb openssh-server-udeb Architecture: source all i386 Version: 1:5.2p1-1 Distribution: unstable Urgency: low Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org> Changed-By: Colin Watson <cjwatson@debian.org> Description: openssh-client - secure shell (SSH) client, for secure access to remote machines openssh-client-udeb - secure shell client for the Debian installer (udeb) openssh-server - secure shell (SSH) server, for secure access from remote machines openssh-server-udeb - secure shell server for the Debian installer (udeb) ssh - secure shell client and server (metapackage) ssh-askpass-gnome - interactive X program to prompt users for a passphrase for ssh-ad ssh-krb5 - secure shell client and server (transitional package) Closes: 154434 415008 420682 496017 498684 505378 506115 507541 512198 513417 514313 524423 530692 536182 540623 555951 556644 561887 Changes: openssh (1:5.2p1-1) unstable; urgency=low . * New upstream release (closes: #536182). Yes, I know 5.3p1 has been out for a while, but there's no GSSAPI patch available for it yet. - Change the default cipher order to prefer the AES CTR modes and the revised "arcfour256" mode to CBC mode ciphers that are susceptible to CPNI-957037 "Plaintext Recovery Attack Against SSH". - Add countermeasures to mitigate CPNI-957037-style attacks against the SSH protocol's use of CBC-mode ciphers. Upon detection of an invalid packet length or Message Authentication Code, ssh/sshd will continue reading up to the maximum supported packet length rather than immediately terminating the connection. This eliminates most of the known differences in behaviour that leaked information about the plaintext of injected data which formed the basis of this attack (closes: #506115, LP: #379329). - ForceCommand directive now accepts commandline arguments for the internal-sftp server (closes: #524423, LP: #362511). - Add AllowAgentForwarding to available Match keywords list (closes: #540623). - Make ssh(1) send the correct channel number for SSH2_MSG_CHANNEL_SUCCESS and SSH2_MSG_CHANNEL_FAILURE messages to avoid triggering 'Non-public channel' error messages on sshd(8) in openssh-5.1. - Avoid printing 'Non-public channel' warnings in sshd(8), since the ssh(1) has sent incorrect channel numbers since ~2004 (this reverts a behaviour introduced in openssh-5.1; closes: #496017). - Disable nonfunctional ssh(1) ~C escape handler in multiplex slave connections (closes: #507541). - Fix "whitepsace" typo in ssh_config(5) (closes: #514313, LP: #303835). * Update to GSSAPI patch from http://www.sxw.org.uk/computing/patches/openssh-5.2p1-gsskex-all-20090726.patch, including cascading credentials support (LP: #416958). * Use x11.pc when compiling/linking gnome-ssh-askpass2 (closes: #555951). * Moved to bzr.debian.org; add Vcs-Bzr and Vcs-Browser control fields. * Add debian/README.source with instructions on bzr handling. * Make ChrootDirectory work with SELinux (thanks, Russell Coker; closes: #556644). * Initialise sc to NULL in ssh_selinux_getctxbyname (thanks, Václav Ovsík; closes: #498684). * Don't duplicate backslashes when displaying server banner (thanks, Michał Górny; closes: #505378, LP: #425346). * Use hardening-includes for hardening logic (thanks, Kees Cook; closes: #561887). * Update OpenSSH FAQ to revision 1.110. * Remove ssh/new_config, only needed for direct upgrades from potato which are no longer particularly feasible anyway (closes: #420682). * Cope with insserv reordering of init script links. * Remove init script stop link in rc1, as killprocs handles it already. * Adjust short descriptions to avoid relying on previous experience with rsh, based on suggestions from Reuben Thomas (closes: #512198). * Remove manual page references to login.conf, which aren't applicable on non-BSD systems (closes: #154434). * Remove/adjust manual page references to BSD-specific /etc/rc (closes: #513417). * Refer to sshd_config(5) rather than sshd(8) in postinst-written /etc/ssh/sshd_config, and add UsePAM commentary from upstream-shipped configuration file (closes: #415008, although unfortunately this will only be conveniently visible on new installations). * Include URL to OpenBSD's ssl(8) in ssh(1), since I don't see a better source for the same information among Debian's manual pages (closes: #530692, LP: #456660). Checksums-Sha1: dcfd8d5b9f2f28a0c7c5bfbc773cb3d6bbb6e314 1645 openssh_5.2p1-1.dsc 8273a0237db98179fbdc412207ff8eb14ff3d6de 1016612 openssh_5.2p1.orig.tar.gz 48c8d2b45c6b55004697ac2d3424b36820914457 231152 openssh_5.2p1-1.diff.gz 643bf9c4800636ddf25f6dddd1c0cfa4855cbf99 1206 ssh_5.2p1-1_all.deb 1c2874277d4b2e553c2462604094bc852c18d0a8 72730 ssh-krb5_5.2p1-1_all.deb 7866ae1fd2763e7b5eb437c39ec4123e2f2daef3 747462 openssh-client_5.2p1-1_i386.deb 5ea79b9ca3050439a0751c68b90bea1aa928583e 278672 openssh-server_5.2p1-1_i386.deb e2e74e87b6243ecdf387d97686539cbed2477f76 80262 ssh-askpass-gnome_5.2p1-1_i386.deb 99f40e535037814aa7332437666f0ab23686e638 175744 openssh-client-udeb_5.2p1-1_i386.udeb cbafe9341bfb14d561941d001936c02adbf76598 197886 openssh-server-udeb_5.2p1-1_i386.udeb Checksums-Sha256: d7b3aed3402ac67385faf91fe19ad04faaa9902fd5863dcc46c30f4372dabf14 1645 openssh_5.2p1-1.dsc 4023710c37d0b3d79e6299cb79b6de2a31db7d581fe59e775a5351784034ecae 1016612 openssh_5.2p1.orig.tar.gz 88878592bc4ed2f2cabc183a9efb2475704f0d7a2bb966c7828229efdf8f6683 231152 openssh_5.2p1-1.diff.gz 1f303238ddb46e4c94c26984dba47f1932770278896cfd54cd10dcd7401abf2f 1206 ssh_5.2p1-1_all.deb 16986d0b24d8211a0303de21627351a509ceab186b0857131462b5ed5f0cd378 72730 ssh-krb5_5.2p1-1_all.deb b9842297f615f85dd7c2ef01f7eed2ca9f1b374b1972f3d3d152162b92c7e4e3 747462 openssh-client_5.2p1-1_i386.deb f8f7e7a29cd05fe6787c2976e48b2e389b7ee12dd9b2d81b3a5170c35664ea4e 278672 openssh-server_5.2p1-1_i386.deb cb4f258674ea4a408a9cc33789aa90ce804227e76615efed3c1aeebb2837ec64 80262 ssh-askpass-gnome_5.2p1-1_i386.deb 46f4acd8ba5b4fb58601e2cc357b4f4a561f07f50be9424f666427a0e186ceb4 175744 openssh-client-udeb_5.2p1-1_i386.udeb 02ec1defbc6ef4f5068c9c19eb735220837ab79838a6465b0d8550403c20075c 197886 openssh-server-udeb_5.2p1-1_i386.udeb Files: bdf4750700a34040c354a58fb3928f87 1645 net standard openssh_5.2p1-1.dsc ada79c7328a8551bdf55c95e631e7dad 1016612 net standard openssh_5.2p1.orig.tar.gz 8b71afc010637d3145bbb60f92d5b471 231152 net standard openssh_5.2p1-1.diff.gz c9352daad4b15ca1c5fb46cdaa30eb79 1206 net extra ssh_5.2p1-1_all.deb d07b23f2478946bc53b906338dd6d7a5 72730 net extra ssh-krb5_5.2p1-1_all.deb 0c6bc933f6956693cc88bac78f1b471d 747462 net standard openssh-client_5.2p1-1_i386.deb ca68b2ce567a74d8821ab7674e4ed248 278672 net optional openssh-server_5.2p1-1_i386.deb dd3e7d6c11ae89f950afdf97453a96a7 80262 gnome optional ssh-askpass-gnome_5.2p1-1_i386.deb 6645f49bdcb0a5d71a74a69dca72393f 175744 debian-installer optional openssh-client-udeb_5.2p1-1_i386.udeb 334c4f56384deabe748e545d5c244e78 197886 debian-installer optional openssh-server-udeb_5.2p1-1_i386.udeb Package-Type: udeb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Colin Watson <cjwatson@debian.org> -- Debian developer iD8DBQFLQe3i9t0zAhD6TNERAqowAJ4uwSXTnpo0RZx0YNFNqhGU6myhGgCeNodS 2eYKn0f2TMRt6piaVN2o8Cs= =WfwE -----END PGP SIGNATURE-----
--- End Message ---