[Bug 129794] Re: ssh-keyscan default type is unuseful

2008-07-25 Thread Launchpad Bug Tracker
This bug was fixed in the package openssh - 1:5.1p1-1ubuntu1

---
openssh (1:5.1p1-1ubuntu1) intrepid; urgency=low

  * Resynchronise with Debian. Remaining changes:
- Add support for registering ConsoleKit sessions on login.
- Drop openssh-blacklist and openssh-blacklist-extra to Suggests; they
  take up a lot of CD space, and I suspect that rolling them out in
  security updates has covered most affected systems now.

openssh (1:5.1p1-1) unstable; urgency=low

  * New upstream release (closes: #474301). Important changes not previously
backported to 4.7p1:
- 4.9/4.9p1 (http://www.openssh.com/txt/release-4.9):
  + Added chroot(2) support for sshd(8), controlled by a new option
ChrootDirectory (closes: #139047, LP: #24777).
  + Linked sftp-server(8) into sshd(8). The internal sftp server is used
when the command internal-sftp is specified in a Subsystem or
ForceCommand declaration. When used with ChrootDirectory, the
internal sftp server requires no special configuration of files
inside the chroot environment.
  + Added a protocol extension method [EMAIL PROTECTED] for
sftp-server(8) to perform POSIX atomic rename() operations; sftp(1)
prefers this if available (closes: #308561).
  + Removed the fixed limit of 100 file handles in sftp-server(8).
  + ssh(8) will now skip generation of SSH protocol 1 ephemeral server
keys when in inetd mode and protocol 2 connections are negotiated.
This speeds up protocol 2 connections to inetd-mode servers that
also allow Protocol 1.
  + Accept the PermitRootLogin directive in a sshd_config(5) Match
block. Allows for, e.g. permitting root only from the local network.
  + Reworked sftp(1) argument splitting and escaping to be more
internally consistent (i.e. between sftp commands) and more
consistent with sh(1). Please note that this will change the
interpretation of some quoted strings, especially those with
embedded backslash escape sequences.
  + Support Banner=none in sshd_config(5) to disable sending of a
pre-login banner (e.g. in a Match block).
  + ssh(1) ProxyCommands are now executed with $SHELL rather than
/bin/sh.
  + ssh(1)'s ConnectTimeout option is now applied to both the TCP
connection and the SSH banner exchange (previously it just covered
the TCP connection). This allows callers of ssh(1) to better detect
and deal with stuck servers that accept a TCP connection but don't
progress the protocol, and also makes ConnectTimeout useful for
connections via a ProxyCommand.
  + scp(1) incorrectly reported stalled on slow copies (closes:
#140828).
  + scp(1) date underflow for timestamps before epoch.
  + ssh(1) used the obsolete SIG DNS RRtype for host keys in DNS,
instead of the current standard RRSIG.
  + Correctly drain ACKs when a sftp(1) upload write fails midway,
avoids a fatal() exit from what should be a recoverable condition.
  + Fixed ssh-keygen(1) selective host key hashing (i.e. ssh-keygen -HF
hostname) to not include any IP address in the data to be hashed.
  + Make ssh(1) skip listening on the IPv6 wildcard address when a
binding address of 0.0.0.0 is used against an old SSH server that
does not support the RFC4254 syntax for wildcard bind addresses.
  + Enable IPV6_V6ONLY socket option on sshd(8) listen socket, as is
already done for X11/TCP forwarding sockets (closes: #439661).
  + Fix FD leak that could hang a ssh(1) connection multiplexing master.
  + Make ssh(1) -q option documentation consistent with reality.
  + Fixed sshd(8) PAM support not calling pam_session_close(), or
failing to call it with root privileges (closes: #372680).
  + Fix activation of OpenSSL engine support when requested in configure
(LP: #119295).
  + Cache SELinux status earlier so we know if it's enabled after a
chroot (LP: #237557).
- 5.1/5.1p1 (http://www.openssh.com/txt/release-5.1):
  + Introduce experimental SSH Fingerprint ASCII Visualisation to ssh(1)
and ssh-keygen(1). Visual fingerprint display is controlled by a new
ssh_config(5) option VisualHostKey. The intent is to render SSH
host keys in a visual form that is amenable to easy recall and
rejection of changed host keys.
  + sshd_config(5) now supports CIDR address/masklen matching in Match
address blocks, with a fallback to classic wildcard matching.
  + sshd(8) now supports CIDR matching in ~/.ssh/authorized_keys
from=... restrictions, also with a fallback to classic wildcard
matching.
  + Added an extended test mode (-T) to sshd(8) to request that it write
its effective configuration to stdout and exit. Extended test mode
also supports the 

[Bug 129794] Re: ssh-keyscan default type is unuseful

2008-05-25 Thread Colin Watson
This was apparently recently fixed upstream (post-5.0p1).

** Changed in: openssh (Ubuntu)
   Importance: Undecided = Medium
   Status: New = In Progress

-- 
ssh-keyscan default type is unuseful
https://bugs.launchpad.net/bugs/129794
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in ubuntu.

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs