X-Recipient: archive-cygwin AT delorie DOT com DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:reply-to:date:from:to:subject:message-id :mime-version:content-type; q=dns; s=default; b=bLHqH8XMET0h6UsQ g7ng9Bx6XjWqURIfSbo7HEjRNyQ8EkjqCzvF5zvvH5tRFBUKw68/cOWXNh4KaDBG 8pFGRzs47exiRkZhmRvDB47MyepZyl/uEz6Zx16SFuUTuHAAWbKo15WUVm+IoZu7 /otJ6z07J/k+f48u6GI7oOpsDWM= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:reply-to:date:from:to:subject:message-id :mime-version:content-type; s=default; bh=D/mBALDrmAPY0DaC+SJzW4 T8HS0=; b=WsFATjt5qdN05wQRbAGFrVuJeZrXKXn9wOLObmVXrkQlnJqvHky8vX 5ji/lmebq/uEuKDnK5SEWW7iyOqQTIZnEaSFkSO+BBwM+viLJZGLTw/LoPGncNfv jXIRD1NyyIPTYDkaLnI9gI8gR96LYq+tOzqkNpyz9qrUFXS1gHWAo= Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner AT cygwin DOT com Mail-Followup-To: cygwin AT cygwin DOT com Delivered-To: mailing list cygwin AT cygwin DOT com Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-HELO: localhost.localdomain Reply-To: cygwin AT cygwin DOT com Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-5.9 required=5.0 tests=AWL,BAYES_00 autolearn=ham version=3.3.2 Date: Tue, 22 Apr 2014 11:32:48 +0200 From: Corinna Vinschen To: cygwin AT cygwin DOT com Subject: [ANNOUNCEMENT] Updated: OpenSSH-6.6.1p1-1 Message-Id: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline User-Agent: Mutt/1.5.21 (2010-09-15) I've just updated the Cygwin version of OpenSSH to 6.6.1p1-1. This is an upstream bugfix release. A bug in the curve25519 KEX method that doesn't depend on OpenSSL's BIGNUM type left leading zero bytes where they should have been skipped. The impact of this is that OpenSSH 6.5 and 6.6 will fail during key exchange with a peer that implements curve25519-sha256 AT libssh DOT org properly about 0.2% of the time (one in every 512ish connections). ======== HEADSUP: ======== The upstream developers are planning to remove tcp-wrappers support from the next OpenSSH release 6.7p1. If you have a legitimate utilisation of tcp-wrappers support for OpenSSH, you might want to chime in to the discussion thread on the openssh-unix-dev mailing list(1). The thread starts here: http://lists.mindrot.org/pipermail/openssh-unix-dev/2014-April/032497.html Corinna (1) https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev -- Corinna Vinschen Please, send mails regarding Cygwin to Cygwin Project Co-Leader cygwin AT cygwin DOT com Red Hat -- Problem reports: http://cygwin.com/problems.html FAQ: http://cygwin.com/faq/ Documentation: http://cygwin.com/docs.html Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple