-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Wed, 14 Sep 2005 15:16:14 +0100 Source: openssh Binary: ssh-askpass-gnome openssh-client-udeb ssh openssh-server openssh-client openssh-server-udeb Architecture: source powerpc all Version: 1:4.2p1-1 Distribution: unstable Urgency: low Maintainer: Matthew Vernon <[EMAIL PROTECTED]> Changed-By: Colin Watson <[EMAIL PROTECTED]> Description: openssh-client - Secure shell client, an rlogin/rsh/rcp replacement openssh-client-udeb - Secure shell client for the Debian installer (udeb) openssh-server - Secure shell server, an rshd replacement openssh-server-udeb - Secure shell server for the Debian installer (udeb) ssh - Secure shell client and server (transitional package) ssh-askpass-gnome - under X, asks user for a passphrase for ssh-add Closes: 181162 208648 320104 324695 326065 Changes: openssh (1:4.2p1-1) unstable; urgency=low . * New upstream release. - SECURITY: Fix a bug introduced in OpenSSH 4.0 that caused GatewayPorts to be incorrectly activated for dynamic ("-D") port forwardings when no listen address was explicitly specified (closes: #326065). - Add a new compression method ("Compression delayed") that delays zlib compression until after authentication, eliminating the risk of zlib vulnerabilities being exploited by unauthenticated users. Note that users of OpenSSH versions earlier than 3.5 will need to disable compression on the client or set "Compression yes" (losing this security benefit) on the server. - Increase the default size of new RSA/DSA keys generated by ssh-keygen from 1024 to 2048 bits (closes: #181162). - Many bugfixes and improvements to connection multiplexing. - Don't pretend to accept $HOME (closes: #208648). * debian/rules: Resynchronise CFLAGS with that generated by configure. * openssh-client and openssh-server conflict with pre-split ssh to avoid problems when ssh is left un-upgraded (closes: #324695). * Set X11Forwarding to yes in the default sshd_config (new installs only). At least when X11UseLocalhost is turned on, which is the default, the security risks of using X11 forwarding are risks to the client, not to the server (closes: #320104). Files: 178047b053c1ccd0c09b5aa42c663da2 953 net standard openssh_4.2p1-1.dsc 93295701e6bcd76fabd6a271654ed15c 928420 net standard openssh_4.2p1.orig.tar.gz de8b13991036a157fb89a1277c36ed70 153306 net standard openssh_4.2p1-1.diff.gz 359f8fed6358af698de006f923175263 1052 net extra ssh_4.2p1-1_all.deb 8d7e3e8de54516bfb1db71fa13049378 582104 net standard openssh-client_4.2p1-1_powerpc.deb dfd29170f38c83a123da23a0164c4f57 215660 net optional openssh-server_4.2p1-1_powerpc.deb f25a5d4fc687897338e15e6e40853eca 85428 gnome optional ssh-askpass-gnome_4.2p1-1_powerpc.deb 243723651a92cd52e1f43a1d03155c4f 157496 debian-installer optional openssh-client-udeb_4.2p1-1_powerpc.udeb 51bade95482a43d7e69a5a95c3400677 165090 debian-installer optional openssh-server-udeb_4.2p1-1_powerpc.udeb
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFDKDam9t0zAhD6TNERAuvRAJ4lO0peam3SlphI+YRp9ifRD3mhQQCfZsh1 dWajDTamDn77FM5FLgtTUd8= =q11C -----END PGP SIGNATURE----- Accepted: openssh-client-udeb_4.2p1-1_powerpc.udeb to pool/main/o/openssh/openssh-client-udeb_4.2p1-1_powerpc.udeb openssh-client_4.2p1-1_powerpc.deb to pool/main/o/openssh/openssh-client_4.2p1-1_powerpc.deb openssh-server-udeb_4.2p1-1_powerpc.udeb to pool/main/o/openssh/openssh-server-udeb_4.2p1-1_powerpc.udeb openssh-server_4.2p1-1_powerpc.deb to pool/main/o/openssh/openssh-server_4.2p1-1_powerpc.deb openssh_4.2p1-1.diff.gz to pool/main/o/openssh/openssh_4.2p1-1.diff.gz openssh_4.2p1-1.dsc to pool/main/o/openssh/openssh_4.2p1-1.dsc openssh_4.2p1.orig.tar.gz to pool/main/o/openssh/openssh_4.2p1.orig.tar.gz ssh-askpass-gnome_4.2p1-1_powerpc.deb to pool/main/o/openssh/ssh-askpass-gnome_4.2p1-1_powerpc.deb ssh_4.2p1-1_all.deb to pool/main/o/openssh/ssh_4.2p1-1_all.deb -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]