=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/58.html,v retrieving revision 1.77 retrieving revision 1.78 diff -c -r1.77 -r1.78 *** www/58.html 2015/10/18 15:21:39 1.77 --- www/58.html 2016/03/21 05:46:19 1.78 *************** *** 37,43 ****
  • See a detailed log of changes between the 5.7 and 5.8 releases.

    !

  • signify(1) pubkeys for this release:
      base: RWQNNZXtC/MqP3Eiu+6FBz/qrxiWQwDhd+9Yljzp62UP4KzFmmvzVk60
      fw:   RWTpkvg4fhJCDx9yL4bUCou/vtAecPVTfcaaGESQeBruwX/qHToMvWh6
    --- 37,43 ----
      
  • See a detailed log of changes between the 5.7 and 5.8 releases.

    !

  • signify(1) pubkeys for this release:
      base: RWQNNZXtC/MqP3Eiu+6FBz/qrxiWQwDhd+9Yljzp62UP4KzFmmvzVk60
      fw:   RWTpkvg4fhJCDx9yL4bUCou/vtAecPVTfcaaGESQeBruwX/qHToMvWh6
    ***************
    *** 68,104 ****
      
    • Improved hardware support, including:
        !
      • New rtwn(4) driver for Realtek RTL8188CE wifi cards. !
      • New hpb(4) driver for HyperTransport bridges as found in the IBM CPC945. !
      • The ugold(4) driver now supports TEMPerHUMV1.x temperature and humidity sensors. !
      • Improved sensor support for the upd(4) driver for USB Power Devices (UPS). !
      • Support for jumbo frames on re(4) devices using RTL8168C/D/E/F/G and RTL8411, including PC Engines APU. !
      • re(4) now works with newer devices e.g. RTL8111GU. !
      • Partial support has been added for full-speed isochronous devices in ehci(4), allowing USB 1.1 audio devices to be used on EHCI-only systems in some cases.
      • Improved macppc stability and G5 performances with MP kernels. !
      • acpicpu(4) uses ACPI C-state information to reduce power consumption of idle CPUs.
      • Kernel supports x86 AVX instructions on CPUs that have them.
      • Avoid assigning low address to PCI BARs, fixing various issues on machines whose BIOSes neglect to claim low memory. !
      • wscons(4) works with even more odd trackpads. !
      • Added pvbus(4) paravirtual device tree root on virtual machines that are running on hypervisors.
      • New octdwctwo(4) driver for USB support on OpenBSD/octeon. !
      • New amdcf(4) driver for embedded flash on OpenBSD/octeon. !
      • Support for RTL8188EU devices was added to the urtwn(4) driver.

    • Removed hardware support:
        !
      • The lmc(4) driver for Lan Media Corporation SSI/T1/DS1/HSSI/DS3 devices has been removed. !
      • The san(4) driver for Sangoma Technologies AFT T1/E1 devices has been removed.

    • Generic network stack improvements:
        !
      • MTU of vlan(4) devices can now be set independently from the parent interface's MTU.
      • The same network range can now be assigned to multiple interfaces, using interface priorities to choose between them. !
      • New MPLS pseudowire driver mpw(4).
      • Much preparatory work for MP unlocking of the network stack.

      --- 68,104 ----

      • Improved hardware support, including:
          !
        • New rtwn(4) driver for Realtek RTL8188CE wifi cards. !
        • New hpb(4) driver for HyperTransport bridges as found in the IBM CPC945. !
        • The ugold(4) driver now supports TEMPerHUMV1.x temperature and humidity sensors. !
        • Improved sensor support for the upd(4) driver for USB Power Devices (UPS). !
        • Support for jumbo frames on re(4) devices using RTL8168C/D/E/F/G and RTL8411, including PC Engines APU. !
        • re(4) now works with newer devices e.g. RTL8111GU. !
        • Partial support has been added for full-speed isochronous devices in ehci(4), allowing USB 1.1 audio devices to be used on EHCI-only systems in some cases.
        • Improved macppc stability and G5 performances with MP kernels. !
        • acpicpu(4) uses ACPI C-state information to reduce power consumption of idle CPUs.
        • Kernel supports x86 AVX instructions on CPUs that have them.
        • Avoid assigning low address to PCI BARs, fixing various issues on machines whose BIOSes neglect to claim low memory. !
        • wscons(4) works with even more odd trackpads. !
        • Added pvbus(4) paravirtual device tree root on virtual machines that are running on hypervisors.
        • New octdwctwo(4) driver for USB support on OpenBSD/octeon. !
        • New amdcf(4) driver for embedded flash on OpenBSD/octeon. !
        • Support for RTL8188EU devices was added to the urtwn(4) driver.

      • Removed hardware support:
          !
        • The lmc(4) driver for Lan Media Corporation SSI/T1/DS1/HSSI/DS3 devices has been removed. !
        • The san(4) driver for Sangoma Technologies AFT T1/E1 devices has been removed.

      • Generic network stack improvements:
          !
        • MTU of vlan(4) devices can now be set independently from the parent interface's MTU.
        • The same network range can now be assigned to multiple interfaces, using interface priorities to choose between them. !
        • New MPLS pseudowire driver mpw(4).
        • Much preparatory work for MP unlocking of the network stack.

        *************** *** 110,125 ****

      • The default answer is now 'no'.
      • 'prohibit-password' has been added to the list of possible answers.
      !
    • autoinstall(8) has been extended to allow
      • hostname-mode.conf response file names.
      • response files to be placed in a subdir of the webserver's document root.
      • passing a template file to ! disklabel(8) to automatically partition the disk.
      !
    • ntpd(8) is now enabled by default at install time.
    • DUID support has improved enough that new installs now use them unconditionally.
    • Installing sets from CD-ROM has been fixed if more than one CD-ROM drive is present. --- 110,125 ----
    • The default answer is now 'no'.
    • 'prohibit-password' has been added to the list of possible answers.
    !
  • autoinstall(8) has been extended to allow
    • hostname-mode.conf response file names.
    • response files to be placed in a subdir of the webserver's document root.
    • passing a template file to ! disklabel(8) to automatically partition the disk.
    !
  • ntpd(8) is now enabled by default at install time.
  • DUID support has improved enough that new installs now use them unconditionally.
  • Installing sets from CD-ROM has been fixed if more than one CD-ROM drive is present. *************** *** 130,212 ****
  • Routing daemons and other userland network improvements:
      !
    • Many improvements and simplifications in ldpd(8), including configuration reload and support for mpw(4) pseudowire interfaces. !
    • bgpd(8) now allows rules to match on the peer AS number. !
    • For terminated BGP sessions, bgpctl(8) now displays the number of prefixes received on the last session. !
    • ospfd(8) now correctly handles carp(4) interfaces in "backup" mode at startup. !
    • Log messages in bgpd(8) and ospfd(8) have been made more specific. !
    • The default Diffie-Hellman group for VPNs configured by ipsec.conf(5) has been changed to modp3072. !
    • New radiusd(8), Remote Authentication Dial In User Service (RADIUS) daemon.

  • Security improvements:
      !
    • sudo in base has been replaced with doas(1), sudo is available as a package. !
    • file(1) has been replaced with a new modern implementation, including sandbox and privilege separation. !
    • pax(1) (and tar(1) and cpio(1)) now prevent archive extraction from escaping the current directory via symlinks; tar(1) without -P option now strips up through any ".." path components.
    • Static PIE support for sparc.
    • Alpha switched to secure PLT.
    • Improved kernel checks of ELF headers.
    • Support for the NX (No-eXecute) bit on i386, resulting in much better W^X enforcement in userland for hardware that has this feature.
    • Enforcement of W^X in the kernel address space on i386 when using processors with the NX bit. !
    • Work started on a new process-containment facility called tame(2).

  • Assorted improvements:
      !
    • The worm(6) now grows at a rate proportional to terminal size. !
    • dlclose(3) now unregisters handlers registered by a pthread_atfork(3) call from the unloaded libraries. !
    • cp(1), mv(1), and pax(1) with the -rw option now preserve timestamps with full nanosecond precision. !
    • pax(1) now detects failure to decompress an archive when reading it and errors out immediately. !
    • nm(1) now supports the -D option for displaying the dynamic symbol table. !
    • dump(8) now uses DUIDs in /etc/dumpdates when present and the -U option has thus been removed. !
    • Corrected kdump(1) reporting of lseek(2) return value on ILP32 archs and getsockopt/setsockopt(2) level and optname arguments. iovec, msghdr, and cmsghdr structures are now dumped. !
    • sed(1) -i option added. !
    • New, much simpler man.conf(5) configuration file format ! for man(1), ! apropos(1), ! and makewhatis(8). !
    • When using man(1) ! with the less(1) pager, support the :t internal command to search for definitions of keywords similar to what ! ctags(1) provides.
    • Improvements in checking of numeric option values in many utilities.
    • Upgraded to binutils version 2.17 with additional fixes. !
    • Improved correctness of poll(2) and poll(2) of O_RDONLY FIFO fds. !
    • Restored reporting of closed sockets by netstat(1) and systat(1). !
    • fdisk(8) now zeros correct GPT sector at end of disk. !
    • fdisk(8) now accepts 'T' sizes for terabytes. !
    • fdisk(8) repaired to work on 4K sector disks again. !
    • dhcpd(8) now logs correct giaddr and ciaddr information even when DHCP relays are present. !
    • dhcpd(8) now accommodates Linux and MS clients by not sending routers or static routes info when classless static routes are sent. !
    • dhcpd(8) and dhclient(8) now accept hostnames beginning with a digit. !
    • dhclient(8) no longer rejects leases with addresses overlapping existing subnets on other interfaces. Kernel routing logic now just works. !
    • Improvements to realloc(3) decrease system calls and increase efficiency.
    • The reaper now tears down dead processes without holding on to the kernel lock. This greatly reduces latency and increases performance on multi-processor systems.

    !

  • OpenBSD httpd(8):
    • New features:
        !
      • Added support for matching and redirections with Lua patterns(7).
      • Implemented If-Modified-Since for conditional GET or HEAD requests (RFC 7232).
      • Added byte-range support for range requests (RFC 7233).
      • Allowing to specify a global or per-location default media type instead of application/octet-stream.
      • Added support for HTTP Strict Transport Security (HSTS; RFC 6797). !
      • Added initial regression test suite based on relayd(8)'s implementation.
    • Fixes and improvements:
        !
      • TLS in httpd(8) and relayd(8) now defaults to TLSv1.2-only.
      • Fixed support for large TLS keys or certificate bundles with up to 16KB each.
      • Fixed the Content-Length header for files larger than 2 GB on 32-bit architectures.
      • Fixed translation of CGI environment variables in accordance with RFCs 7230 and 3875. --- 130,212 ----
      • Routing daemons and other userland network improvements:
          !
        • Many improvements and simplifications in ldpd(8), including configuration reload and support for mpw(4) pseudowire interfaces. !
        • bgpd(8) now allows rules to match on the peer AS number. !
        • For terminated BGP sessions, bgpctl(8) now displays the number of prefixes received on the last session. !
        • ospfd(8) now correctly handles carp(4) interfaces in "backup" mode at startup. !
        • Log messages in bgpd(8) and ospfd(8) have been made more specific. !
        • The default Diffie-Hellman group for VPNs configured by ipsec.conf(5) has been changed to modp3072. !
        • New radiusd(8), Remote Authentication Dial In User Service (RADIUS) daemon.

      • Security improvements:
          !
        • sudo in base has been replaced with doas(1), sudo is available as a package. !
        • file(1) has been replaced with a new modern implementation, including sandbox and privilege separation. !
        • pax(1) (and tar(1) and cpio(1)) now prevent archive extraction from escaping the current directory via symlinks; tar(1) without -P option now strips up through any ".." path components.
        • Static PIE support for sparc.
        • Alpha switched to secure PLT.
        • Improved kernel checks of ELF headers.
        • Support for the NX (No-eXecute) bit on i386, resulting in much better W^X enforcement in userland for hardware that has this feature.
        • Enforcement of W^X in the kernel address space on i386 when using processors with the NX bit. !
        • Work started on a new process-containment facility called tame(2).

      • Assorted improvements:
          !
        • The worm(6) now grows at a rate proportional to terminal size. !
        • dlclose(3) now unregisters handlers registered by a pthread_atfork(3) call from the unloaded libraries. !
        • cp(1), mv(1), and pax(1) with the -rw option now preserve timestamps with full nanosecond precision. !
        • pax(1) now detects failure to decompress an archive when reading it and errors out immediately. !
        • nm(1) now supports the -D option for displaying the dynamic symbol table. !
        • dump(8) now uses DUIDs in /etc/dumpdates when present and the -U option has thus been removed. !
        • Corrected kdump(1) reporting of lseek(2) return value on ILP32 archs and getsockopt/setsockopt(2) level and optname arguments. iovec, msghdr, and cmsghdr structures are now dumped. !
        • sed(1) -i option added. !
        • New, much simpler man.conf(5) configuration file format ! for man(1), ! apropos(1), ! and makewhatis(8). !
        • When using man(1) ! with the less(1) pager, support the :t internal command to search for definitions of keywords similar to what ! ctags(1) provides.
        • Improvements in checking of numeric option values in many utilities.
        • Upgraded to binutils version 2.17 with additional fixes. !
        • Improved correctness of poll(2) and poll(2) of O_RDONLY FIFO fds. !
        • Restored reporting of closed sockets by netstat(1) and systat(1). !
        • fdisk(8) now zeros correct GPT sector at end of disk. !
        • fdisk(8) now accepts 'T' sizes for terabytes. !
        • fdisk(8) repaired to work on 4K sector disks again. !
        • dhcpd(8) now logs correct giaddr and ciaddr information even when DHCP relays are present. !
        • dhcpd(8) now accommodates Linux and MS clients by not sending routers or static routes info when classless static routes are sent. !
        • dhcpd(8) and dhclient(8) now accept hostnames beginning with a digit. !
        • dhclient(8) no longer rejects leases with addresses overlapping existing subnets on other interfaces. Kernel routing logic now just works. !
        • Improvements to realloc(3) decrease system calls and increase efficiency.
        • The reaper now tears down dead processes without holding on to the kernel lock. This greatly reduces latency and increases performance on multi-processor systems.

        !

      • OpenBSD httpd(8):
        • New features:
            !
          • Added support for matching and redirections with Lua patterns(7).
          • Implemented If-Modified-Since for conditional GET or HEAD requests (RFC 7232).
          • Added byte-range support for range requests (RFC 7233).
          • Allowing to specify a global or per-location default media type instead of application/octet-stream.
          • Added support for HTTP Strict Transport Security (HSTS; RFC 6797). !
          • Added initial regression test suite based on relayd(8)'s implementation.
        • Fixes and improvements:
            !
          • TLS in httpd(8) and relayd(8) now defaults to TLSv1.2-only.
          • Fixed support for large TLS keys or certificate bundles with up to 16KB each.
          • Fixed the Content-Length header for files larger than 2 GB on 32-bit architectures.
          • Fixed translation of CGI environment variables in accordance with RFCs 7230 and 3875. *************** *** 221,227 ****
          • OpenSMTPD 5.4.4
              !
            • smtpd(8) reliability and bug fixes.
            • NOTE: Some security risks were discovered and fixed after the OpenBSD 5.8 release. See 5.8 errata 004. --- 221,227 ----
            • OpenSMTPD 5.4.4
                !
              • smtpd(8) reliability and bug fixes.
              • NOTE: Some security risks were discovered and fixed after the OpenBSD 5.8 release. See 5.8 errata 004. *************** *** 232,263 ****
                • Security:
                    !
                  • ssh(1): when forwarding X11 connections with ForwardX11Trusted=no, connections made after ForwardX11Timeout expired could be permitted and no longer subject to XSECURITY restrictions because of an ineffective timeout check in ! ssh(1) coupled with "fail open" behaviour in the X11 server when clients attempted connections with expired credentials. This problem was reported by Jann Horn. !
                  • ssh-agent(1): fix weakness of agent locking (ssh-add -x) to password guessing by implementing an increasing failure delay, storing a salted hash of the password rather than the password itself and using a timing-safe comparison function for verifying unlock attempts. This problem was reported by Ryan Castellucci. !
                  • sshd(8): OpenSSH 6.8 and 6.9 incorrectly set TTYs to be world-writable. Local attackers may be able to write arbitrary messages to logged-in users, including terminal escape sequences. !
                  • sshd(8): fix circumvention of MaxAuthTries using keyboard-interactive authentication. By specifying a long, repeating keyboard-interactive "devices" string, an attacker could request the same authentication method be tried thousands of times in a single pass. The LoginGraceTime timeout in ! sshd(8) and any authentication failure delays implemented by the authentication mechanism itself were still applied.
                  --- 232,263 ----
                  • Security:
                      !
                    • ssh(1): when forwarding X11 connections with ForwardX11Trusted=no, connections made after ForwardX11Timeout expired could be permitted and no longer subject to XSECURITY restrictions because of an ineffective timeout check in ! ssh(1) coupled with "fail open" behaviour in the X11 server when clients attempted connections with expired credentials. This problem was reported by Jann Horn. !
                    • ssh-agent(1): fix weakness of agent locking (ssh-add -x) to password guessing by implementing an increasing failure delay, storing a salted hash of the password rather than the password itself and using a timing-safe comparison function for verifying unlock attempts. This problem was reported by Ryan Castellucci. !
                    • sshd(8): OpenSSH 6.8 and 6.9 incorrectly set TTYs to be world-writable. Local attackers may be able to write arbitrary messages to logged-in users, including terminal escape sequences. !
                    • sshd(8): fix circumvention of MaxAuthTries using keyboard-interactive authentication. By specifying a long, repeating keyboard-interactive "devices" string, an attacker could request the same authentication method be tried thousands of times in a single pass. The LoginGraceTime timeout in ! sshd(8) and any authentication failure delays implemented by the authentication mechanism itself were still applied.
                    *************** *** 274,280 **** http://www.openssh.com/legacy.html.
                  • Support for the legacy v00 cert format has been removed.
                  • The default for the ! sshd_config(5) PermitRootLogin option has changed from "yes" to "prohibit-password" (but the OpenBSD installer defaults to "no").
                  • NOTE: 'PermitRootLogin prohibit-password' is subtly broken --- 274,280 ---- http://www.openssh.com/legacy.html.
                  • Support for the legacy v00 cert format has been removed.
                  • The default for the ! sshd_config(5) PermitRootLogin option has changed from "yes" to "prohibit-password" (but the OpenBSD installer defaults to "no").
                  • NOTE: 'PermitRootLogin prohibit-password' is subtly broken *************** *** 283,320 ****
                • New/changed features:
                    !
                  • ssh(1), ! sshd(8): promote chacha20-poly1305@openssh.com to be the default cipher. !
                  • sshd(8): support admin-specified arguments to AuthorizedKeysCommand. (bz#2081) !
                  • sshd(8): add AuthorizedPrincipalsCommand that allows retrieving authorized principals information from a subprocess rather than a file. !
                  • ssh(1), ! ssh-add(1): support PKCS#11 devices with external PIN entry devices. (bz#2240) !
                  • sshd(8): allow GSSAPI host credential check to be relaxed for multihomed hosts via GSSAPIStrictAcceptorCheck option. (bz#928) !
                  • ssh-keygen(1): support ssh-keygen -lF hostname to search known_hosts and print key hashes rather than full keys. !
                  • ssh-agent(1): add -D flag to leave ! ssh-agent(1) in foreground without enabling debug mode. (bz#2381) !
                  • ssh_config(5): add PubkeyAcceptedKeyTypes option to control which public key types are available for user authentication. !
                  • sshd_config(5): add HostKeyAlgorithms option to control which public key types are offered for host authentications. !
                  • ssh(1), ! sshd(8): extend Ciphers, MACs, KexAlgorithms, HostKeyAlgorithms, PubkeyAcceptedKeyTypes and HostbasedKeyTypes options to allow appending to the default --- 283,320 ----
                • New/changed features:
                    !
                  • ssh(1), ! sshd(8): promote chacha20-poly1305@openssh.com to be the default cipher. !
                  • sshd(8): support admin-specified arguments to AuthorizedKeysCommand. (bz#2081) !
                  • sshd(8): add AuthorizedPrincipalsCommand that allows retrieving authorized principals information from a subprocess rather than a file. !
                  • ssh(1), ! ssh-add(1): support PKCS#11 devices with external PIN entry devices. (bz#2240) !
                  • sshd(8): allow GSSAPI host credential check to be relaxed for multihomed hosts via GSSAPIStrictAcceptorCheck option. (bz#928) !
                  • ssh-keygen(1): support ssh-keygen -lF hostname to search known_hosts and print key hashes rather than full keys. !
                  • ssh-agent(1): add -D flag to leave ! ssh-agent(1) in foreground without enabling debug mode. (bz#2381) !
                  • ssh_config(5): add PubkeyAcceptedKeyTypes option to control which public key types are available for user authentication. !
                  • sshd_config(5): add HostKeyAlgorithms option to control which public key types are offered for host authentications. !
                  • ssh(1), ! sshd(8): extend Ciphers, MACs, KexAlgorithms, HostKeyAlgorithms, PubkeyAcceptedKeyTypes and HostbasedKeyTypes options to allow appending to the default *************** *** 324,423 ****
                • The following significant bugs have been fixed in this release:
                    !
                  • ssh(1), ! sshd(8): deprecate legacy SSH2_MSG_KEX_DH_GEX_REQUEST_OLD message and do not try to use it against some 3rd-party SSH implementations that use it (older PuTTY, WinSCP).
                  • Many fixes for problems caused by compile-time deactivation of SSH1 support. (including bz#2369) !
                  • ssh(1), ! sshd(8): cap DH-GEX group size at 4Kbits for Cisco implementations as some would fail when attempting to use group sizes greater than 4K. (bz#2209) !
                  • ssh(1): fix out-of-bound read in EscapeChar configuration option parsing. (bz#2396) !
                  • sshd(8): fix application of PermitTunnel, LoginGraceTime, AuthenticationMethods and StreamLocalBindMask options in Match blocks. !
                  • ssh(1), ! sshd(8): improve disconnection message on TCP reset. (bz#2257) !
                  • ssh(1): remove failed remote forwards established by multiplexing from the list of active forwards. (bz#2363) !
                  • sshd(8): make parsing of authorized_keys "environment=" options independent of PermitUserEnv being enabled. (bz#2329) !
                  • sshd(8): fix post-auth crash with permitopen=none. (bz#2355) !
                  • ssh(1), ! ssh-add(1), ! ssh-keygen(1): allow new-format private keys to be encrypted with AEAD ciphers. (bz#2366) !
                  • ssh(1): allow ListenAddress, Port and AddressFamily configuration options to appear in any order. (bz#86) !
                  • sshd(8): check for and reject missing arguments for VersionAddendum and ForceCommand. (bz#2281) !
                  • ssh(1), ! sshd(8): don't treat unknown certificate extensions as fatal. (bz#2387) !
                  • ssh-keygen(1): make stdout and stderr output consistent. (bz#2325) !
                  • ssh(1): mention missing DISPLAY environment in debug log when X11 forwarding requested. (bz#1682) !
                  • sshd(8): correctly record login when UseLogin is set. (bz#378) !
                  • sshd(8): add some missing options to sshd -T output and fix output of VersionAddendum and HostCertificate. (bz#2346)
                  • Document and improve consistency of options that accept a "none" argument: TrustedUserCAKeys, RevokedKeys (bz#2382), AuthorizedPrincipalsFile (bz#2288). !
                  • ssh(1): include remote username in debug output. (bz#2368) !
                  • sshd(8): avoid compatibility problem with some versions of Tera Term, which would crash when they received the hostkeys notification message (hostkeys-00@openssh.com). !
                  • sshd(8): mention ssh-keygen -E as useful when comparing legacy MD5 host key fingerprints. (bz#2332) !
                  • ssh(1): clarify pseudo-terminal request behaviour and use make manual language consistent. (bz#1716) !
                  • ssh(1): document that the TERM environment variable is not subject to SendEnv and AcceptEnv. (bz#2386) !
                  • ssh(1), ! sshd(8): add compatability workarounds for Cisco and more PuTTY versions. (bz#2424)
                  • Fix some omissions and errors in the PROTOCOL and PROTCOL.mux documentation relating to Unix domain socket forwarding. (bz#2421, bz#2422) !
                  • ssh(1): Improve the ! ssh(1) manual page to include a better desciption of Unix domain socket forwarding. (bz#2423) !
                  • ssh(1), ! ssh-agent(1): skip uninitialised PKCS#11 slots, fixing failures to load keys when they are present. (bz#2427) !
                  • ssh(1), ! ssh-agent(1): do not ignore PKCS#11 hosted keys that wth empty CKA_ID. (bz#2429) !
                  • sshd(8): clarify documentation for UseDNS option. (bz#2045)
                --- 324,423 ----
            • The following significant bugs have been fixed in this release:
                !
              • ssh(1), ! sshd(8): deprecate legacy SSH2_MSG_KEX_DH_GEX_REQUEST_OLD message and do not try to use it against some 3rd-party SSH implementations that use it (older PuTTY, WinSCP).
              • Many fixes for problems caused by compile-time deactivation of SSH1 support. (including bz#2369) !
              • ssh(1), ! sshd(8): cap DH-GEX group size at 4Kbits for Cisco implementations as some would fail when attempting to use group sizes greater than 4K. (bz#2209) !
              • ssh(1): fix out-of-bound read in EscapeChar configuration option parsing. (bz#2396) !
              • sshd(8): fix application of PermitTunnel, LoginGraceTime, AuthenticationMethods and StreamLocalBindMask options in Match blocks. !
              • ssh(1), ! sshd(8): improve disconnection message on TCP reset. (bz#2257) !
              • ssh(1): remove failed remote forwards established by multiplexing from the list of active forwards. (bz#2363) !
              • sshd(8): make parsing of authorized_keys "environment=" options independent of PermitUserEnv being enabled. (bz#2329) !
              • sshd(8): fix post-auth crash with permitopen=none. (bz#2355) !
              • ssh(1), ! ssh-add(1), ! ssh-keygen(1): allow new-format private keys to be encrypted with AEAD ciphers. (bz#2366) !
              • ssh(1): allow ListenAddress, Port and AddressFamily configuration options to appear in any order. (bz#86) !
              • sshd(8): check for and reject missing arguments for VersionAddendum and ForceCommand. (bz#2281) !
              • ssh(1), ! sshd(8): don't treat unknown certificate extensions as fatal. (bz#2387) !
              • ssh-keygen(1): make stdout and stderr output consistent. (bz#2325) !
              • ssh(1): mention missing DISPLAY environment in debug log when X11 forwarding requested. (bz#1682) !
              • sshd(8): correctly record login when UseLogin is set. (bz#378) !
              • sshd(8): add some missing options to sshd -T output and fix output of VersionAddendum and HostCertificate. (bz#2346)
              • Document and improve consistency of options that accept a "none" argument: TrustedUserCAKeys, RevokedKeys (bz#2382), AuthorizedPrincipalsFile (bz#2288). !
              • ssh(1): include remote username in debug output. (bz#2368) !
              • sshd(8): avoid compatibility problem with some versions of Tera Term, which would crash when they received the hostkeys notification message (hostkeys-00@openssh.com). !
              • sshd(8): mention ssh-keygen -E as useful when comparing legacy MD5 host key fingerprints. (bz#2332) !
              • ssh(1): clarify pseudo-terminal request behaviour and use make manual language consistent. (bz#1716) !
              • ssh(1): document that the TERM environment variable is not subject to SendEnv and AcceptEnv. (bz#2386) !
              • ssh(1), ! sshd(8): add compatability workarounds for Cisco and more PuTTY versions. (bz#2424)
              • Fix some omissions and errors in the PROTOCOL and PROTCOL.mux documentation relating to Unix domain socket forwarding. (bz#2421, bz#2422) !
              • ssh(1): Improve the ! ssh(1) manual page to include a better desciption of Unix domain socket forwarding. (bz#2423) !
              • ssh(1), ! ssh-agent(1): skip uninitialised PKCS#11 slots, fixing failures to load keys when they are present. (bz#2427) !
              • ssh(1), ! ssh-agent(1): do not ignore PKCS#11 hosted keys that wth empty CKA_ID. (bz#2429) !
              • sshd(8): clarify documentation for UseDNS option. (bz#2045)
            *************** *** 442,452 ****
          • Fixed dozens of Coverity issues including dead code, memory leaks, logic errors and more.
          • Ensure that ! openssl(1) restores terminal echo state after reading a password.
          • Incorporated fix for OpenSSL issue #3683.
          • Removed SSLv3 support from ! openssl(1).
          • Modified tls_write in libtls to allow partial writes, clarified with examples in the documentation.
          • Removed RSAX engine. --- 442,452 ----
          • Fixed dozens of Coverity issues including dead code, memory leaks, logic errors and more.
          • Ensure that ! openssl(1) restores terminal echo state after reading a password.
          • Incorporated fix for OpenSSL issue #3683.
          • Removed SSLv3 support from ! openssl(1).
          • Modified tls_write in libtls to allow partial writes, clarified with examples in the documentation.
          • Removed RSAX engine. *************** *** 471,489 ****
        • Code improvements:
            !
          • Fix incorrect comparison function in openssl(1) certhash command. Thanks to Christian Neukirchen / Void Linux.
          • Removal of OPENSSL_issetugid and all library getenv calls. Applications can and should no longer rely on environment variables for changing library behavior. OPENSSL_CONF and SSLEAY_CONF are still supported with the ! openssl(1) command, but note that $ENV:: is no longer supported in .cnf files.
          • libtls API and documentation additions.
          • Various bug fixes and simplifications to libssl and libcrypto.
          • Reworked ! openssl(1) option handling.
          • LibreSSL version define LIBRESSL_VERSION_NUMBER will now be bumped for each portable release. --- 471,489 ----
        • Code improvements:
            !
          • Fix incorrect comparison function in openssl(1) certhash command. Thanks to Christian Neukirchen / Void Linux.
          • Removal of OPENSSL_issetugid and all library getenv calls. Applications can and should no longer rely on environment variables for changing library behavior. OPENSSL_CONF and SSLEAY_CONF are still supported with the ! openssl(1) command, but note that $ENV:: is no longer supported in .cnf files.
          • libtls API and documentation additions.
          • Various bug fixes and simplifications to libssl and libcrypto.
          • Reworked ! openssl(1) option handling.
          • LibreSSL version define LIBRESSL_VERSION_NUMBER will now be bumped for each portable release. *************** *** 496,513 ****
          • Syslogd:
            • OpenBSD ! syslogd(8) can bind to explicitly given UDP or TCP sockets to receive messages. TCP streams are accepted with the octet counting or the non transparent framing method.
            • Blocks in ! syslog.conf(5) started with +host process messages created by certain hosts specifically.
            • Handle situations when the file descriptor limit is exhausted gracefully. !
            • Since libtls handles short writes smarter, syslogd(8) can use the complete output buffer to save messages, coping with longer TLS server down times without losing messages.
            --- 496,513 ----
          • Syslogd:
            • OpenBSD ! syslogd(8) can bind to explicitly given UDP or TCP sockets to receive messages. TCP streams are accepted with the octet counting or the non transparent framing method.
            • Blocks in ! syslog.conf(5) started with +host process messages created by certain hosts specifically.
            • Handle situations when the file descriptor limit is exhausted gracefully. !
            • Since libtls handles short writes smarter, syslogd(8) can use the complete output buffer to save messages, coping with longer TLS server down times without losing messages.
            *************** *** 947,953 **** OpenBSD ports system.

            The ports/ directory represents a CVS (see the manpage for ! cvs(1) if you aren't familiar with CVS) checkout of our ports. As with our complete source tree, our ports tree is available via --- 947,953 ---- OpenBSD ports system.

            The ports/ directory represents a CVS (see the manpage for ! cvs(1) if you aren't familiar with CVS) checkout of our ports. As with our complete source tree, our ports tree is available via