===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/71.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -c -r1.46 -r1.47
*** www/71.html 2022/04/14 20:59:01 1.46
--- www/71.html 2022/04/15 04:36:09 1.47
***************
*** 1086,1108 ****
- Security
- Potentially incompatible changes
- New features
- Bugfixes
!
mandoc 1.14.6 plus several bugfixes, including:
--- 1086,1263 ----
- Security
!
! - Near miss in sshd(8):
! fix an integer overflow in the user authentication path
! that, in conjunction with other logic errors, could have yielded
! unauthenticated access under difficult to exploit conditions.
! This situation is not exploitable because of independent checks in
! the privilege separation monitor. Privilege separation has been
! enabled by default in since openssh-3.2.2 (released in 2002) and
! has been mandatory since openssh-7.5 (released in 2017).
! Thanks to Malcolm Stagg for finding and reporting this bug.
- Potentially incompatible changes
!
! - In OpenSSH 8.9 the FIDO security key middleware interface
! changed and increments SSH_SK_VERSION_MAJOR.
- New features
!
! - ssh(1), sshd(8), ssh-add(1), ssh-agent(1): add a system for
! restricting forwarding and use of keys added to ssh-agent(1)
! A detailed description of the feature is available at
! https://www.openssh.com/agent-restrict.html and the protocol
! extensions are documented in the PROTOCOL and PROTOCOL.agent
! files in the source release.
!
- ssh(1), sshd(8): add the sntrup761x25519-sha512@openssh.com hybrid
! ECDH/x25519 + Streamlined NTRU Prime post-quantum KEX to the
! default KEXAlgorithms list (after the ECDH methods but before the
! prime-group DH ones).
!
- ssh-keygen(1): when downloading resident keys from a FIDO token,
! pass back the user ID that was used when the key was created and
! append it to the filename the key is written to (if it is not the
! default). Avoids keys being clobbered if the user created multiple
! resident keys with the same application string but different user
! IDs.
!
- ssh-keygen(1), ssh(1), ssh-agent(1): better handling for FIDO keys
! on tokens that provide user verification (UV) on the device itself,
! including biometric keys, avoiding unnecessary PIN prompts.
!
- ssh-keygen(1): add "ssh-keygen -Y match-principals" operation to
! perform matching of principals names against an allowed signers
! file. To be used towards a TOFU model for SSH signatures in git.
!
- ssh-add(1), ssh-agent(1): allow pin-required FIDO keys to be added
! to ssh-agent(1). $SSH_ASKPASS will be used to request the PIN at
! authentication time.
!
- ssh-keygen(1): allow selection of hash at sshsig signing time
! (either sha512 (default) or sha256).
!
- ssh(1), sshd(8): read network data directly to the packet input
! buffer instead of indirectly via a small stack buffer. Provides a
! modest performance improvement.
!
- ssh(1), sshd(8): read data directly to the channel input buffer,
! providing a similar modest performance improvement.
!
- ssh(1): extend the PubkeyAuthentication configuration directive to
! accept yes|no|unbound|host-bound to allow control over one of the
! protocol extensions used to implement agent-restricted keys.
!
!
- ssh(1), sshd(8): use the hybrid Streamlined NTRU Prime + x25519 key
! exchange method by default ("sntrup761x25519-sha512@openssh.com").
! The NTRU algorithm is believed to resist attacks enabled by future
! quantum computers and is paired with the X25519 ECDH key exchange
! (the previous default) as a backstop against any weaknesses in
! NTRU Prime that may be discovered in the future. The combination
! ensures that the hybrid exchange offers at least as good security
! as the status quo.
! We are making this change now (i.e. ahead of cryptographically-
! relevant quantum computers) to prevent "capture now, decrypt
! later" attacks where an adversary who can record and store SSH
! session ciphertext would be able to decrypt it once a sufficiently
! advanced quantum computer is available.
! - sftp-server(8): support the "copy-data" extension to allow server-
! side copying of files/data, following the design in
! draft-ietf-secsh-filexfer-extensions-00.
!
- sftp(1): add a "cp" command to allow the sftp client to perform
! server-side file copies.
+
- Bugfixes
!
! - sshd(8): document that CASignatureAlgorithms, ExposeAuthInfo and
! PubkeyAuthOptions can be used in a Match block.
!
- sshd(8): fix possible string truncation when constructing paths to
! .rhosts/.shosts files with very long user home directory names.
!
- ssh-keysign(1): unbreak for KEX algorithms that use SHA384/512
! exchange hashes
!
- ssh(1): don't put the TTY into raw mode when SessionType=none,
! avoids ^C being unable to kill such a session.
!
- scp(1): fix some corner-case bugs in SFTP-mode handling of
! ~-prefixed paths.
!
- ssh(1): unbreak hostbased auth using RSA keys. Allow ssh(1) to
! select RSA keys when only RSA/SHA2 signature algorithms are
! configured (this is the default case). Previously RSA keys were
! not being considered in the default case.
!
- ssh-keysign(1): make ssh-keysign use the requested signature
! algorithm and not the default for the key type. Part of unbreaking
! hostbased auth for RSA/SHA2 keys.
!
- ssh(1): stricter UpdateHostkey signature verification logic on
! the client- side. Require RSA/SHA2 signatures for RSA hostkeys
! except when RSA/SHA1 was explicitly negotiated during initial
! KEX
!
- ssh(1), sshd(8): fix signature algorithm selection logic for
! UpdateHostkeys on the server side. The previous code tried to
! prefer RSA/SHA2 for hostkey proofs of RSA keys, but missed some
! cases. This will use RSA/SHA2 signatures for RSA keys if the
! client proposed these algorithms in initial KEX.
!
- All: convert all uses of select(2)/pselect(2) to poll(2)/ppoll(2).
! This includes the mainloops in ssh(1), ssh-agent(1), ssh-agent(1)
! and sftp-server(8), as well as the sshd(8) listen loop and all
! other FD read/writability checks. On platforms with missing or
! broken poll(2)/ppoll(2) syscalls a select(2)-based compat shim is
! available.
!
- ssh-keygen(1): the "-Y find-principals" command was verifying key
! validity when using ca certs but not with simple key lifetimes
! within the allowed signers file.
!
- ssh-keygen(1): make sshsig verify-time argument parsing optional
!
- sshd(8): fix truncation in rhosts/shosts path construction.
!
- ssh(1), ssh-agent(1): avoid xmalloc(0) for PKCS#11 keyid for ECDSA
! keys (we already did this for RSA keys). Avoids fatal errors for
! PKCS#11 libraries that return empty keyid, e.g. Microchip ATECC608B
! "cryptoauthlib"
!
- ssh(1), ssh-agent(1): improve the testing of credentials against
! inserted FIDO: ask the token whether a particular key belongs to
! it in cases where the token supports on-token user-verification
! (e.g. biometrics) rather than just assuming that it will accept it.
! Will reduce spurious "Confirm user presence" notifications for key
! handles that relate to FIDO keys that are not currently inserted in at
! least some cases.
! - ssh(1), sshd(8): correct value for IPTOS_DSCP_LE. It needs to
! allow for the preceding two ECN bits.
!
- ssh-keygen(1): add missing -O option to usage() for the "-Y sign"
! option.
!
- ssh-keygen(1): fix a NULL deref when using the find-principals
! function, when matching an allowed_signers line that contains a
! namespace restriction, but no restriction specified on the
! command-line
!
- ssh-agent(1): fix memleak in process_extension(); oss-fuzz
! issue #42719
!
- ssh(1): suppress "Connection to xxx closed" messages when LogLevel
! is set to "error" or above.
!
- ssh(1), sshd(8): use correct zlib flags when inflate(3)-ing
! compressed packet data.
!
- scp(1): when recursively transferring files in SFTP mode, create the
! destination directory if it doesn't already exist to match scp(1) in
! legacy RCP mode behaviour.
!
- scp(1): many improvements in error message consistency between scp(1)
! in SFTP mode vs legacy RCP mode.
!
- sshd(8): fix potential race in SIGTERM handling
!
- ssh(1), ssh(8): since DSA keys are deprecated, move them to the
! end of the default list of public keys so that they will be tried
! last.
!
- ssh-keygen(1): allow 'ssh-keygen -Y find-principals' to match
! wildcard principals in allowed_signers files
!
!
- ssh(1), sshd(8): upstream: fix poll(2) spin when a channel's output
! fd closes without data in the channel buffer.
!
- sshd(8): pack pollfd array in server listen/accept loop. Could
! cause the server to hang/spin when MaxStartups > RLIMIT_NOFILE
!
- ssh-keygen(1): avoid NULL deref via the find-principals and
! check-novalidate operations.
!
- scp(1): fix a memory leak in argument processing.
!
- sshd(8): don't try to resolve ListenAddress directives in the sshd
! re-exec path. They are unused after re-exec and parsing errors
! (possible for example if the host's network configuration changed)
! could prevent connections from being accepted.
!
- sshd(8): when refusing a public key authentication request from a
! client for using an unapproved or unsupported signature algorithm
! include the algorithm name in the log message to make debugging
! easier.
!
mandoc 1.14.6 plus several bugfixes, including: