Your message dated Tue, 15 Feb 2022 19:49:51 +0000
with message-id <[email protected]>
and subject line Bug#996391: fixed in openssh 1:8.8p1-1
has caused the Debian Bug report #996391,
regarding openssh: New upstream version available
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
996391: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=996391
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openssh
Version: 1:8.4p1-6
Severity: wishlist
Hi,
the current upstream version is 8.8p1 (see [1]), I'm sure that
the package maintainers are aware of this, but I couldn't find any
tracking bug report about this, so reporting it here. :)
Given that there are plenty of new features, but also the (upcoming)
deprecation of scp(1), the disabled RSA signatures using the SHA-1
hash algorithm,... it would be nice to get a more current OpenSSH
version in Debian.
Thanks for maintaining OpenSSH in Debian!
[1] https://www.openssh.com/releasenotes.html:
* OpenSSH 8.8/8.8p1 (2021-09-26)
* OpenSSH 8.7/8.7p1 (2021-08-20)
* OpenSSH 8.6/8.6p1 (2021-04-19)
* OpenSSH 8.5/8.5p1 (2021-03-03)
regards
-mika-
signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:8.8p1-1
Done: Colin Watson <[email protected]>
We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Colin Watson <[email protected]> (supplier of updated openssh package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 15 Feb 2022 19:20:21 +0000
Source: openssh
Architecture: source
Version: 1:8.8p1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSH Maintainers <[email protected]>
Changed-By: Colin Watson <[email protected]>
Closes: 996391
Changes:
openssh (1:8.8p1-1) unstable; urgency=medium
.
* New upstream release (https://www.openssh.com/releasenotes.html#8.8p1,
closes: #996391):
- This release disables RSA signatures using the SHA-1 hash algorithm by
default. (Existing RSA keys may still be used and do not need to be
replaced; see NEWS.Debian if you have problems connecting to old SSH
servers.)
- ssh(1): allow the ssh_config(5) CanonicalizePermittedCNAMEs directive
to accept a "none" argument to specify the default behaviour.
- scp(1): when using the SFTP protocol, continue transferring files
after a transfer error occurs, better matching original scp/rcp
behaviour.
- ssh(1): fixed a number of memory leaks in multiplexing,
- ssh-keygen(1): avoid crash when using the -Y find-principals command.
- A number of documentation and manual improvements.
- ssh(1)/sshd(8): some fixes to the pselect(2) replacement compatibility
code.
* Work around missing RSA SHA-2 signature support in conch until the
upstream fix lands in Debian.
Checksums-Sha1:
b8690cc5355e8af197b6d0c427775ad163d0a68c 3347 openssh_8.8p1-1.dsc
1eb964897a4372f6fb96c7effeb509ec71c379c9 1815060 openssh_8.8p1.orig.tar.gz
8e1d9e918be4be7ae44bbe4061adf9dc7cb915b9 833 openssh_8.8p1.orig.tar.gz.asc
c0da03480c1669c204ebb903bc930c6f93a8b863 185620 openssh_8.8p1-1.debian.tar.xz
Checksums-Sha256:
a67428df6bfd167e59793c9572c8a5a9a603adc552fb72b2e5ac4d469c3e6c30 3347
openssh_8.8p1-1.dsc
4590890ea9bb9ace4f71ae331785a3a5823232435161960ed5fc86588f331fe9 1815060
openssh_8.8p1.orig.tar.gz
eb930fe3a4f745021e61168f318ac4913658e0669c3249ab0d731b198660b0df 833
openssh_8.8p1.orig.tar.gz.asc
59c283f39621ee09fe4caa4d80c6b8bc18bb439c79b9a37556d84569fd115e9d 185620
openssh_8.8p1-1.debian.tar.xz
Files:
1c786540da9a891f93791ee5f079e368 3347 net standard openssh_8.8p1-1.dsc
8ce5f390958baeeab635aafd0ef41453 1815060 net standard openssh_8.8p1.orig.tar.gz
5a276debc9e28185a0cdb04e066c27bf 833 net standard openssh_8.8p1.orig.tar.gz.asc
50be1aa8aef38b4e0a3f3cf77ee6cfcb 185620 net standard
openssh_8.8p1-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEErApP8SYRtvzPAcEROTWH2X2GUAsFAmIL/TcACgkQOTWH2X2G
UAtFDQ//WqlSflwHFuQ1S64Utmtje2qGOndObNnsVypOPMWslkbreQroNJGvVb5a
n2e55enjjq4pocIfq7DmqOPnwgSjE4AN+Pt1HZh/WCedQOE8sPPSzcqaJfmbed3i
aaYc44bXVWbWSgeZrmvXoOkdHc/126U3MgTcqtJjHOFolm0hO63tcpfIGmTotX2n
kfLvKw2UNIKVywBtzUg/ETKvS7grTvt+pYl2Ty8UyOWe2yU6stikdnfLcFTLzIrA
4H1cFVFUwM4R7/6JyCOh94DUB170ywGcyetl8jHvdnnSinBkucAYh8lEwdZQMXjD
oCf6aWWh7o51qiv/fadHFKK9jG9wqQBDUazRHFMGiBhIvXpmQhC7zA7ckGt6+BDL
gl07uygF89cR+xYXmwiNaT/cw7qRHhjUdG83CbLIs1tSMENo+Ehkz7Y53MXPBXfd
pT7GMDbXP/a6yc/jRf35eVnebRmCRhyy93xqIVokvHaLmFvTkA6Dlip1WZLHpV6h
IlhgOYcQrqoOPOpUn/yjoREeKMM7jnBP9vOS6GEDnyJNVmxK7b+gEeXYgDXeB52f
FVPcgNSJqmW0t5c/YjBp2ncK2MD2Ln06ZbXEyskjCYG/C9Qtss6iWxpyBzL2HEu2
CF0BRkRDNRX+lK0hBbuLhG9jtUbVwvM8p/mI+eLzLc7ZH2bKO2k=
=3WNo
-----END PGP SIGNATURE-----
--- End Message ---