===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/55.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -r1.2 -r1.3
--- www/55.html 2014/03/14 17:34:09 1.2
+++ www/55.html 2014/03/15 09:15:35 1.3
@@ -130,15 +130,195 @@
-
OpenSSH 6.3:
+OpenSSH 6.6 (including changes to 6.5, a feature-focused release):
- - New features:
+
- Security:
- - ...
+
- sshd(8):
+ when using environment passing with a
+ sshd_config(5)
+ AcceptEnv pattern with a wildcard. OpenSSH prior to 6.6 could
+ be tricked into accepting any enviornment variable that contains the
+ characters before the wildcard character.
+ - New/changed features:
+
+ - ssh(1),
+ sshd(8):
+ Add support for key exchange using elliptic-curve Diffie Hellman
+ in Daniel Bernstein's Curve25519. This key exchange method is
+ the default when both the client and server support it.
+
- ssh(1),
+ sshd(8):
+ Add support for ED25519 as a public key type. ED25519 is
+ a elliptic curve signature scheme that offers better security than
+ ECDSA and DSA and good performance. It may be used for
+ both user and host keys.
+
- Add a new private key format that uses a bcrypt KDF to better
+ protect keys at rest. This format is used unconditionally for
+ ED25519 keys, but may be requested when generating or saving
+ existing keys of other types via the -o
+ ssh-keygen(1)
+ option. We intend to make the new format the default in the near
+ future. Details of the new format are in the PROTOCOL.key
+ file.
+
- ssh(1),
+ sshd(8):
+ Add a new transport cipher "chacha20-poly1305@openssh.com" that
+ combines Daniel Bernstein's ChaCha20 stream cipher and
+ Poly1305 MAC to build an authenticated encryption mode. Details
+ are in the PROTOCOL.chacha20poly1305 file.
+
- ssh(1),
+ sshd(8):
+ Refuse RSA keys from old proprietary clients and servers that
+ use the obsolete RSA+MD5 signature scheme. It will still be
+ possible to connect with these clients/servers but only DSA keys
+ will be accepted, and OpenSSH will refuse connection entirely in a
+ future release.
+
- ssh(1),
+ sshd(8):
+ Refuse old proprietary clients and servers that use a weaker key
+ exchange hash calculation.
+
- ssh(1):
+ Increase the size of the Diffie-Hellman groups requested for
+ each symmetric key size. New values from NIST Special Publication
+ 800-57 with the upper limit specified by RFC 4419.
+
- ssh(1),
+ ssh-agent(1):
+ Support PKCS#11 tokens that only provide X.509 certs
+ instead of raw public keys. (requested as bz#1908)
+
- ssh(1):
+ Add a
+ ssh_config(5)
+ Match keyword that allows conditional configuration to be
+ applied by matching on hostname, user and result of
+ arbitrary commands.
+
- ssh(1):
+ Add support for client-side hostname canonicalisation using a
+ set of DNS suffixes and rules in
+ ssh_config(5).
+ This allows unqualified names to be canonicalised to fully-qualified
+ domain names to eliminate ambiguity when looking up keys in
+ known_hosts or checking host certificate names.
+
- sftp-server(8):
+ Add the ability to whitelist and/or blacklist sftp protocol requests by
+ name.
+
- sftp-server(8):
+ Add a sftp "fsync@openssh.com" to support calling
+ fsync(2)
+ on an open file handle.
+
- sshd(8):
+ Add a
+ ssh_config(5)
+ PermitTTY to disallow TTY allocation, mirroring the
+ longstanding no-pty authorized_keys option.
+
- ssh(1):
+ Add a
+ ssh_config(5)
+ ProxyUseFDPass option that supports the use of
+ ProxyCommands that establish a connection and then pass a
+ connected file descriptor back to
+ ssh(1).
+ This allows the ProxyCommand to exit rather than staying
+ around to transfer data.
+
- ssh(1),
+ sshd(8):
+ this release removes the J-PAKE authentication code. This code
+ was experimental, never enabled and had been unmaintained for some
+ time.
+
- ssh(1):
+ when processing Match blocks, skip 'exec' clauses
+ other clauses predicates failed to match.
+
- ssh(1):
+ if hostname canonicalisation is enabled and results in the destination
+ hostname being changed, then re-parse
+ ssh_config(5)
+ files using the new destination hostname. This gives 'Host'
+ and 'Match' directives that use the expanded hostname a chance
+ to be applied.
+
- The following significant bugs have been fixed in this release:
- - ...
+
- ssh(1),
+ sshd(8):
+ Fix potential stack exhaustion caused by nested certificates.
+
- ssh(1):
+ make BindAddress work with UsePrivilegedPort.
+ (bz#1211)
+
- sftp(1):
+ fix the progress meter for resumed transfer. (bz#2137)
+
- ssh-add(1):
+ do not request smartcard PIN when removing keys from
+ ssh-agent(1).
+ (bz#2187)
+
- sshd(8):
+ fix re-exec fallback when original
+ sshd(8)
+ binary cannot be executed. (bz#2139)
+
- ssh-keygen(1):
+ Make relative-specified certificate expiry times relative to current
+ time and not the validity start time.
+
- sshd(8):
+ fix AuthorizedKeysCommand inside a Match block.
+ (bz#2161)
+
- sftp(1):
+ symlinking a file would incorrectly canonicalise the target path.
+ (bz#2129)
+
- ssh-agent(1):
+ fix a use-after-free in the PKCS#11 agent helper executable.
+ (bz#2175)
+
- sshd(8):
+ Improve logging of sessions to include the user name, remote
+ host and port, the session type (shell, command,
+ etc.) and allocated TTY (if any).
+
- sshd(8):
+ tell the client (via a debug message) when their preferred listen
+ address has been overridden by the server's GatewayPorts
+ setting. (bz#1297)
+
- sshd(8):
+ include report port in bad protocol banner message. (bz#2162)
+
- sftp(1):
+ fix memory leak in error path in do_readdir(). (bz#2163)
+
- sftp(1):
+ don't leak file descriptor on error. (bz#2171)
+
- sshd(8):
+ include the local address and port in "Connection
+ from ..." message. (only shown at loglevel>=verbose)
+
- ssh(1):
+ avoid spurious "getsockname failed: Bad file descriptor" in
+ ssh -W. (bz#2200, debian#738692)
+
- sshd(8):
+ allow the
+ shutdown(2)
+ syscall in seccomp-bpf and systrace sandbox modes, as it is reachable
+ if the connection is terminated during the pre-auth phase.
+
- ssh(1),
+ sshd(8):
+ fix unsigned overflow that in SSH protocol 1 bignum parsing.
+ Minimum key length checks render this bug unexploitable to compromise
+ SSH 1 sessions.
+
- sshd_config(5)
+ clarify behaviour of a keyword that appears in multiple matching
+ Match blocks. (bz#2184)
+
- ssh(1):
+ avoid unnecessary hostname lookups when canonicalisation is disabled.
+ (bz#2205)
+
- sshd(8):
+ avoid sandbox violation crashes in GSSAPI code by caching the supported
+ list of GSSAPI mechanism OIDs before entering the sandbox. (bz#2107)
+
- ssh(1):
+ fix possible crashes in SOCKS4 parsing caused by assumption that the
+ SOCKS username is nul-terminated.
+
- ssh(1):
+ fix regression for UsePrivilegedPort=yes when
+ BindAddress is not specified.
+
- ssh(1),
+ sshd(8):
+ fix memory leak in ECDSA signature verification.
+
- ssh(1):
+ fix matching of 'Host' directives in
+ ssh_config(5)
+ files to be case-insensitive again. (regression in 6.5)