diff options
author | bdrewery <bdrewery@FreeBSD.org> | 2014-12-19 00:17:08 +0800 |
---|---|---|
committer | bdrewery <bdrewery@FreeBSD.org> | 2014-12-19 00:17:08 +0800 |
commit | b7ce2153af3afcd703c3cecdde7dafc97bb08924 (patch) | |
tree | 16a9af533d5537f99f0f5f13b1bc3bf0deac91b8 /UPDATING | |
parent | 3453fd3f1b5eba064ccf61ba4179c65821d828d4 (diff) | |
download | freebsd-ports-gnome-b7ce2153af3afcd703c3cecdde7dafc97bb08924.tar.gz freebsd-ports-gnome-b7ce2153af3afcd703c3cecdde7dafc97bb08924.tar.zst freebsd-ports-gnome-b7ce2153af3afcd703c3cecdde7dafc97bb08924.zip |
Add entry on OpenSSH 6.7 Ciphers change
Diffstat (limited to 'UPDATING')
-rw-r--r-- | UPDATING | 11 |
1 files changed, 11 insertions, 0 deletions
@@ -5,6 +5,17 @@ they are unavoidable. You should get into the habit of checking this file for changes each time you update your ports collection, before attempting any port upgrades. +20141218: + AFFECTS: users of security/openssh-portable + AUTHOR: bdrewery@FreeBSD.org + + OpenSSH 6.7 disables some insecure ciphers by default, such as arcfour + and blowfish. You may have clients using these over LAN where security is + considered less important for the connection. For these cases you may need + to update your Ciphers entry in your sshd_config to enable them again. + + See http://mgalgs.github.io/2014/10/22/enable-arcfour-and-other-fast-ciphers-on-recent-versions-of-openssh.html + 20141217: AFFECTS: users of lang/perl5.* AUTHOR: mat@FreeBSD.org |