Control: reassign -1 release-notes On Sun, Apr 07, 2019 at 08:36:11PM +0000, Sam Bull wrote: > Package: openssh-server > Severity: serious > Justification: Policy 8.2
Policy 8.2 is "Shared library support files", which seems to have nothing to do with this. > Due to a change in how some options are handled in sshd_config, upgrading to > buster can result in the user getting locked out of their system if the > config is not updated. > > Probably the most likely cause (and what occurred to me) is if the > PubkeyAcceptedKeyTypes includes ssh-rsa and the admin logs in with an RSA > key. After upgrading, the user will no longer be able to connect to the > server. > The solution for this case is to replace ssh-rsa with > rsa-sha2-256,rsa-sha2-512. > > At the very least this needs to be mentioned in the upgrade instructions in > the release notes for buster. This is already documented in openssh's NEWS.Debian file, presented before upgrade if you use apt-listchanges. It says: * sshd(8): The semantics of PubkeyAcceptedKeyTypes and the similar HostbasedAcceptedKeyTypes options have changed. These now specify signature algorithms that are accepted for their respective authentication mechanism, where previously they specified accepted key types. This distinction matters when using the RSA/SHA2 signature algorithms "rsa-sha2-256", "rsa-sha2-512" and their certificate counterparts. Configurations that override these options but omit these algorithm names may cause unexpected authentication failures (no action is required for configurations that accept the default for these options). I don't think I consider it safe to try to mangle this automatically in people's sshd_config files in this case; the cure could easily be worse than the disease, and any time I try to do that sort of thing it generates a flurry of RC bug reports about configuration file modifications which are always really hard to get right in a policy-friendly way. Other than that, for people who don't see or don't fully read the NEWS.Debian file I already provided, the best I can do is reassign this to the release notes to lift some of these warnings up to there. Thanks, -- Colin Watson [cjwat...@debian.org]