aboutsummaryrefslogtreecommitdiffstats
path: root/UPDATING
diff options
context:
space:
mode:
authorbdrewery <bdrewery@FreeBSD.org>2014-12-19 00:17:08 +0800
committerbdrewery <bdrewery@FreeBSD.org>2014-12-19 00:17:08 +0800
commitb7ce2153af3afcd703c3cecdde7dafc97bb08924 (patch)
tree16a9af533d5537f99f0f5f13b1bc3bf0deac91b8 /UPDATING
parent3453fd3f1b5eba064ccf61ba4179c65821d828d4 (diff)
downloadfreebsd-ports-gnome-b7ce2153af3afcd703c3cecdde7dafc97bb08924.tar.gz
freebsd-ports-gnome-b7ce2153af3afcd703c3cecdde7dafc97bb08924.tar.zst
freebsd-ports-gnome-b7ce2153af3afcd703c3cecdde7dafc97bb08924.zip
Add entry on OpenSSH 6.7 Ciphers change
Diffstat (limited to 'UPDATING')
-rw-r--r--UPDATING11
1 files changed, 11 insertions, 0 deletions
diff --git a/UPDATING b/UPDATING
index b1f9e7cf7cae..6c1298cfe65a 100644
--- a/UPDATING
+++ b/UPDATING
@@ -5,6 +5,17 @@ they are unavoidable.
You should get into the habit of checking this file for changes each time
you update your ports collection, before attempting any port upgrades.
+20141218:
+ AFFECTS: users of security/openssh-portable
+ AUTHOR: bdrewery@FreeBSD.org
+
+ OpenSSH 6.7 disables some insecure ciphers by default, such as arcfour
+ and blowfish. You may have clients using these over LAN where security is
+ considered less important for the connection. For these cases you may need
+ to update your Ciphers entry in your sshd_config to enable them again.
+
+ See http://mgalgs.github.io/2014/10/22/enable-arcfour-and-other-fast-ciphers-on-recent-versions-of-openssh.html
+
20141217:
AFFECTS: users of lang/perl5.*
AUTHOR: mat@FreeBSD.org