Skip to content

Latest commit

 

History

History
60 lines (44 loc) · 3.22 KB

CHANGES.md

File metadata and controls

60 lines (44 loc) · 3.22 KB

Previous Versions

Latest Released Version

Planned for Next Version

Bug Fixes

  • GH-650 Use the correct key from a user certificate in server-side pubkey auth

  • GH-663 Fix racy IoSession creation

  • GH-664 Skip MAC negotiation if an AEAD cipher was negotiated

  • GH-677 Fix current directory handling in ScpShell for WinSCP

  • GH-678 ScpShell: write month names in English for WinSCP

  • GH-690 Handle append mode for buggy SFTP v3 servers

  • GH-700 Fix race in AbstractCloseable.doCloseImmediately()

  • GH-709 AbstractChannel: Handle keep-alive channel messages sent by an old OpenSSH server

  • GH-727 Supply default port 22 for proxy jump hosts for which there is no HostConfigEntry

  • GH-733 Fix SftpRemotePathChannel.transferTo() (avoid NPE)

  • SSHD-1343 Correct documentation in ChannelDataReceiver

New Features

  • GH-705 New method TcpipServerChannel.getPort() returning the ChannelToPortHandler

  • SSHD-1161 Support pubkey auth with user certificates (server-side)

    • Client-side support was introduced in version 2.8.0 already
  • SSHD-1167 Check host certificates against known_hosts file (implements @cert-authority)

Potential Compatibility Issues

Client-side KEX: we've changed the default of the setting CoreModuleProperties.ABORT_ON_INVALID_CERTIFICATE from false to true. A client will newly abort an SSH connection if the server presents an invalid OpenSSH host certificate as host key.

Major Code Re-factoring