Activity log for bug #119295

Date Who What changed Old value New value Message
2007-06-08 10:10:04 Pascal de Bruijn bug added bug
2007-06-08 10:17:13 DarkMageZ marked as duplicate 119294
2007-06-08 10:19:18 DarkMageZ removed duplicate marker 119294
2007-06-11 10:22:21 Colin Watson openssh: status Unconfirmed Confirmed
2007-06-11 10:22:21 Colin Watson openssh: importance Undecided Wishlist
2007-06-11 10:22:21 Colin Watson openssh: statusexplanation With OpenSSH >= 4.4, we just need to configure --with-ssl-engine.
2007-06-13 09:36:46 Colin Watson openssh: status Confirmed Fix Released
2007-06-13 09:36:46 Colin Watson openssh: assignee kamion
2007-06-13 09:36:46 Colin Watson openssh: statusexplanation With OpenSSH >= 4.4, we just need to configure --with-ssl-engine. openssh (1:4.6p1-1) unstable; urgency=low * New upstream release (closes: #395507, #397961, #420035). Important changes not previously backported to 4.3p2: - 4.4/4.4p1 (http://www.openssh.org/txt/release-4.4): + On portable OpenSSH, fix a GSSAPI authentication abort that could be used to determine the validity of usernames on some platforms. + Implemented conditional configuration in sshd_config(5) using the "Match" directive. This allows some configuration options to be selectively overridden if specific criteria (based on user, group, hostname and/or address) are met. So far a useful subset of post-authentication options are supported and more are expected to be added in future releases. + Add support for Diffie-Hellman group exchange key agreement with a final hash of SHA256. + Added a "ForceCommand" directive to sshd_config(5). Similar to the command="..." option accepted in ~/.ssh/authorized_keys, this forces the execution of the specified command regardless of what the user requested. This is very useful in conjunction with the new "Match" option. + Add a "PermitOpen" directive to sshd_config(5). This mirrors the permitopen="..." authorized_keys option, allowing fine-grained control over the port-forwardings that a user is allowed to establish. + Add optional logging of transactions to sftp-server(8). + ssh(1) will now record port numbers for hosts stored in ~/.ssh/known_hosts when a non-standard port has been requested (closes: #50612). + Add an "ExitOnForwardFailure" option to cause ssh(1) to exit (with a non-zero exit code) when requested port forwardings could not be established. + Extend sshd_config(5) "SubSystem" declarations to allow the specification of command-line arguments. + Replacement of all integer overflow susceptible invocations of malloc(3) and realloc(3) with overflow-checking equivalents. + Many manpage fixes and improvements. + Add optional support for OpenSSL hardware accelerators (engines), enabled using the --with-ssl-engine configure option. + Tokens in configuration files may be double-quoted in order to contain spaces (closes: #319639). + Move a debug() call out of a SIGCHLD handler, fixing a hang when the session exits very quickly (closes: #307890). + Fix some incorrect buffer allocation calculations (closes: #410599). + ssh-add doesn't ask for a passphrase if key file permissions are too liberal (closes: #103677). + Likewise, ssh doesn't ask either (closes: #99675). - 4.6/4.6p1 (http://www.openssh.org/txt/release-4.6): + sshd now allows the enabling and disabling of authentication methods on a per user, group, host and network basis via the Match directive in sshd_config. + Fixed an inconsistent check for a terminal when displaying scp progress meter (closes: #257524). + Fix "hang on exit" when background processes are running at the time of exit on a ttyful/login session (closes: #88337). * Update to current GSSAPI patch from http://www.sxw.org.uk/computing/patches/openssh-4.6p1-gsskex-20070312.patch; install ChangeLog.gssapi. * Build the .deb --with-ssl-engine (closes: #408027, LP: #119295). * Use LSB functions in init scripts, and add an LSB-style header (partly from Ubuntu and partly thanks to Christian Perrier; closes: #389038). * Move init script start links to S16, move rc1 stop link to K84, and remove rc0 and rc6 stop links altogether (the last part from Ubuntu; closes: #122188). * Emit a slightly more informative message from the init script if /dev/null has somehow become not a character device (closes: #369964). * Belatedly build-depend on zlib1g-dev (>= 1:1.2.3-1) (closes: #333447). * Merge from Ubuntu: - Build position-independent executables (only for debs, not for udebs) to take advantage of address space layout randomisation. - If building on Ubuntu, add /sbin, /usr/sbin, and /usr/local/sbin to the default path. * Use ${binary:Version} rather than ${Source-Version} in openssh-server -> openssh-client dependency. -- Colin Watson <cjwatson@debian.org> Wed, 13 Jun 2007 00:28:26 +0100
2007-07-07 07:33:12 John Steele Scott bug added attachment 'openssh-padlock.diff' (openssh-padlock.diff)
2008-02-05 10:41:42 Colin Watson openssh: status Fix Released Confirmed
2008-02-10 17:16:50 Daniel Hahler bug assigned to openssh
2008-02-11 11:41:49 Bug Watch Updater openssh: status Unknown Confirmed
2008-02-26 10:42:05 Bug Watch Updater openssh: status Confirmed In Progress
2008-02-29 10:37:05 Bug Watch Updater openssh: status In Progress Fix Released
2008-04-22 08:35:55 Ian Lister bug added attachment 'bug119295.patch' (Patch to reverse caching logic)
2008-06-12 04:01:20 Craig Ringer description VIA PadLock is a hardware cryptography engine for AES and SHA1/256. OpenSSH should support PadLock. Initial work on PadLock support has already been done: http://www.logix.cz/michal/devel/padlock/ VIA PadLock is a hardware cryptography engine for AES and SHA1/256. OpenSSH should support PadLock. Upstream OpenSSH versions do support padlock, and a working patch exists in openssh-portable bug #1437 (see remote bug watches) as of 4.9p1. The patch applies and works fine in 4.7p1. A small bugfix patch to the version of OpenSSL in Ubuntu is also required for this to work. The bugfix is included in OpenSSL upstream 0.9.8h. It applies fine and works fine on 0.9.8g. Initial work on PadLock support was done some time ago: http://www.logix.cz/michal/devel/padlock/
2008-07-23 06:17:28 Colin Watson openssh: status Confirmed Fix Committed
2008-07-25 11:00:11 Launchpad Janitor openssh: status Fix Committed Fix Released
2009-12-02 15:18:13 Launchpad Janitor branch linked lp:debian/openssh