X-Recipient: archive-cygwin AT delorie DOT com DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 93AA33858402 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cygwin.com; s=default; t=1634716420; bh=MnnWZLUYIwcOhvj7MQmtg56MApWGc8tSrjPFWJUDApQ=; h=To:Date:Subject:List-Id:List-Unsubscribe:List-Archive:List-Post: List-Help:List-Subscribe:From:Reply-To:Cc:From; b=G8QROBNzB9qRAItnLO6qxfpfTi8+xTezVkqNyCvi3mGYc3wP7LaJe+mIHICMgzHzK bDjpLg2a9GAl4uR01GEbCQAEVjDr1EB239Y925ieFluycCnehRiv+myFCKGeZgWFx8 2fT7d4lw5VwAKOGKxxP7QnNHfsb/aUZPJOUEL1PU= X-Original-To: cygwin AT cygwin DOT com Delivered-To: cygwin AT cygwin DOT com DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 5A5BB3857C59 DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 1C58E385801D DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 2E1D53858C3A X-Mailbox-Line: From cygwin-announce-openssh-8.8p1-1 Wed Oct 20 09:50:24 2021 To: cygwin AT cygwin DOT com Date: Wed, 20 Oct 2021 09:50:24 +0200 Message-Id: Subject: [ANNOUNCEMENT] openssh 8.8p1-1 X-Provags-ID: V03:K1:G26YtQIazhbK2Fj6Cp4H9GxGHozS/AeWZrlQ8/iB6ftu96aI5EF Wk8ol2ibMs4fIZcjqcpnPWOg0XDnbJyKBKwVQXrwLudjG/DFsCZ15I/DWItQLXa7hJKpJzu ho6fK7owBUwbEXmeYCdEfpD595yT3sStINmeVnDCvankSx+DOY8wrQLQjxKpGb9xdr8ZmVV yQl/ZzqmSmicOIMowqpkg== X-UI-Out-Filterresults: notjunk:1;V03:K0:lndseRn5Les=:BQ+YBp5M0P8aebH4woKgPW LaKbjeN/Fv8lQKEvKk8SpbtyIzTid12vlq5jsWotJuWsto6GM39wougxWCNXlf+QDNV+qTgI2 n55WMXOs3RLGRL4pGOuEm4T/fPvVn9tpyEEJYYCID4VQoLYUZTNnfMoTBBHUKLjKaSqSKjpLh v8/g9H/IYfdFbEQ4a6qDRwL4X9644eauVJzrmuYctY5RdaNYz73HO4FerYpc60c+EUp/sbw3S Kjqr7/u3eap8yBstAQJVQ5kj0RBZmoOIsHVDIU7aZpcjIrg1NhGKvk71RZP9NrbFVfajcXyTT WjnptjYH6FoNTFC1WC60CqRFfeaaa30GyJVYvwsPsGqjl6o1P7q3Q8lm2uqRQ9c2wjIrRI28a CnDTNPZEzndKL1McmNVws8wp/igw1Kc4AkGFFimuFuCm5DZCelLfPOeoMwjP1y51o2/4RkJTd O3ouFuNmX+4gRf4O3u4AVYSGvh2ZOyKF3d4MoeuBq24P6qfeVM+e9jV7VxBAV9wsFbr9d8VU9 o2z5/iQuqH7QtkPlIlx9oYFBYa88JJUoyIxaH6FYF/FE87/rQWFGpyXUBzsysAgg4YPyjBaJ3 +EIuAhjuaQFoDE38ziMwRWpnaWbVsQevA//OdW0qCicHgcRQO8nTLbsBGLoMY2KNRKOcVBTV4 r4ZoUWX/j6e5mSiEjmsBVJA461FLzW+WZJkizTBQS/cywd6A8KiREi1+/UlOwVFhFQytJPMWr FVeapc1KB3cHES9ffwjl/EfwaP+7xqGEOgBGByFNfHqgefgNdkQXk5gBQPs= X-Spam-Status: No, score=-98.3 required=5.0 tests=BAYES_00, GOOD_FROM_CORINNA_CYGWIN, KAM_ASCII_DIVIDERS, KAM_DMARC_NONE, KAM_DMARC_STATUS, KAM_NUMSUBJECT, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL, SPF_HELO_NONE, SPF_NEUTRAL, TXREP autolearn=ham autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org X-BeenThere: cygwin-announce AT cygwin DOT com X-Mailman-Version: 2.1.29 X-Mailer: Perl5 Mail::Internet v2.20 X-BeenThere: cygwin AT cygwin DOT com List-Id: General Cygwin discussions and problem reports List-Archive: List-Post: List-Help: List-Subscribe: , From: Corinna Vinschen via Cygwin-announce via Cygwin Reply-To: cygwin AT cygwin DOT com Cc: Corinna Vinschen via Cygwin-announce MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "Cygwin" The following packages have been uploaded to the Cygwin distribution: * openssh-8.8p1-1 OpenSSH is a program for logging into a remote machine and for executing commands on a remote machine. It can replace rlogin and rsh, providing encrypted communication between two machines. Official release message: ----------------------------------------------------------------------------- OpenSSH 8.8 has just been released. It will be available from the mirrors listed at https://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested snapshots or donated to the project. More information on donations may be found at: https://www.openssh.com/donations.html Future deprecation notice ========================= A near-future release of OpenSSH will switch scp(1) from using the legacy scp/rcp protocol to using SFTP by default. Legacy scp/rcp performs wildcard expansion of remote filenames (e.g. "scp host:* .") through the remote shell. This has the side effect of requiring double quoting of shell meta-characters in file names included on scp(1) command-lines, otherwise they could be interpreted as shell commands on the remote side. This creates one area of potential incompatibility: scp(1) when using the SFTP protocol no longer requires this finicky and brittle quoting, and attempts to use it may cause transfers to fail. We consider the removal of the need for double-quoting shell characters in file names to be a benefit and do not intend to introduce bug- compatibility for legacy scp/rcp in scp(1) when using the SFTP protocol. Another area of potential incompatibility relates to the use of remote paths relative to other user's home directories, for example - "scp host:~user/file /tmp". The SFTP protocol has no native way to expand a ~user path. However, sftp-server(8) in OpenSSH 8.7 and later support a protocol extension "expand-path AT openssh DOT com" to support this. Security ======== sshd(8) from OpenSSH 6.2 through 8.7 failed to correctly initialise supplemental groups when executing an AuthorizedKeysCommand or AuthorizedPrincipalsCommand, where a AuthorizedKeysCommandUser or AuthorizedPrincipalsCommandUser directive has been set to run the command as a different user. Instead these commands would inherit the groups that sshd(8) was started with. Depending on system configuration, inherited groups may allow AuthorizedKeysCommand/AuthorizedPrincipalsCommand helper programs to gain unintended privilege. Neither AuthorizedKeysCommand nor AuthorizedPrincipalsCommand are enabled by default in sshd_config(5). Potentially-incompatible changes ================================ This release disables RSA signatures using the SHA-1 hash algorithm by default. This change has been made as the SHA-1 hash algorithm is cryptographically broken, and it is possible to create chosen-prefix hash collisions for