[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#806962: No supported cipher blowfish breaks systems



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Source: openssh
Version: 1:7.1p1-1
Severity: important

The new version comes without blowfish cipher. That breaks access to
systems that only allows blowfish cipher. This is a major concern as
afterwards it is not possible anymore to get back access to such
systems.

Please at least display a big warning when updating the package that
admins are able to postpone the update. Currently that change is not
even seen in changelog.

- -- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (800, 'unstable'), (500, 'testing'), (110, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.0.7 (SMP w/8 CPU cores)
Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

- -- 
Klaus Ethgen                              http://www.ethgen.ch/
pub  4096R/4E20AF1C 2011-05-16   Klaus Ethgen <Klaus@Ethgen.ch>
Fingerprint: 85D4 CA42 952C 949B 1753  62B3 79D0 B06F 4E20 AF1C
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQGcBAEBCgAGBQJWYFxBAAoJEKZ8CrGAGfasz4oL/Rm5blurTwgtJxbpHU52JP/1
NQCZebvSrKF4HkfEasTgYVR3/kVbUnOjmoz/DlDlk8LOSZounHYJ9RhyVwvXDzyV
wFUZm6RL6lmPTKzshSpmpTwhjFMNKxvwKM+fF9xTo2LPx4kfleGid1MDzWRWRwjK
ETTugmk50Dd/bcU70ARbSxAHaLIerpOFntZ/bYhl9qSKNrp94wPkav0jKrI/E3jj
ak5pKbAMxiUx72o1wt6DcT+d4HYVJ/mu+JZDzEU3Wnyy/jBc5lASZOL8P8QvQs7D
h9YY/6sCph7f6oPXlkGR8eJJGx0hftzMmZfiH3z3lIt2fOVr/qApd1Dsc/D6Y+j+
4b2wuk1LFXn9+01sCoIfS2HJavUqIslftT04x+a70I3i6Xs10HHIcH+La5opja45
+2/Xp9A9LgG/xIRSY7Z91ih9GOiOSy4htAxRrH6b72QyzoaOHoqHzWVttFPTySYY
j+QO35SBGzB8rhNUcwjPfT42dIuCgVrC4EJAITqfhA==
=efEa
-----END PGP SIGNATURE-----


Reply to: