forked from dev-sec/chef-os-hardening
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Dominik Richter <dominik.richter@gmail.com>
- Loading branch information
Showing
2 changed files
with
13 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,17 @@ | ||
# Changelog | ||
|
||
## 1.0.1 | ||
|
||
* feature: cipher, macs and key exchange algorithms are now correctly detected on | ||
ubuntu 12.04+14.04, centos/oracle/redhat 6.4+6.5, debian 6+7 | ||
* feature: UsePAM can now be configured. Locked accounts may not get access via SSH | ||
if UsePAM is disabled (which is the default) | ||
* feature: AllowTcpForwarding is now configurable. It is safe to set it if the user | ||
has a login shell anyway | ||
* improvement: introduced rubocop+foodcritic for linting. As a result, there has been | ||
a long list of cleanups and fixes to make this project looking well-rounded again | ||
* bugfixes: incorrect crypto-configuration on red-hat based systems and debian | ||
|
||
## 1.0.0 | ||
|
||
* imported ssh hardening project and updated to current version with full test suite |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters