Overview
Bug Fixes
-
GH-516 SFTP: allow file system URIs without password
-
GH-650 Use the correct key from a user certificate in server-side pubkey auth
-
GH-663 Fix racy
IoSession
creation -
GH-664 Skip MAC negotiation if an AEAD cipher was negotiated
-
GH-677 Fix current directory handling in
ScpShell
for WinSCP -
GH-678
ScpShell
: write month names in English for WinSCP -
GH-690 Handle append mode for buggy SFTP v3 servers
-
GH-700 Fix race in
AbstractCloseable.doCloseImmediately()
-
GH-709
AbstractChannel
: Handle keep-alive channel messages sent by an old OpenSSH server -
GH-727 Supply default port 22 for proxy jump hosts for which there is no
HostConfigEntry
-
GH-733 Avoid NPE in
SftpRemotePathChannel.transferTo()
-
GH-751 Fix SFTP v3 “long name” if SFTP server uses an
SftpFileSystem
to another server -
GH-754
DefaultFowarder
must not be closed after a bind error -
GH-767 Remove dependency on net.i2p.crypto in
SkED25519PublicKey
-
GH-771 Remove dependency on net.i2p.crypto in
EdDSAPuttyKeyDecoder
-
GH-774 Fix
WritePendingException
in SFTP file copy -
GH-793 Close repository in
GitPackCommand
-
SSHD-1343 Correct documentation in
ChannelDataReceiver
New Features
-
GH-705 New method
TcpipServerChannel.getPort()
returning theChannelToPortHandler
-
SSHD-1161 Support pubkey auth with user certificates (server-side)
- Client-side support was introduced in version 2.8.0 already
-
SSHD-1167 Check host certificates against known_hosts file (implements @cert-authority)
Potential Compatibility Issues
- Client-side KEX: we’ve changed the default of the setting
CoreModuleProperties.ABORT_ON_INVALID_CERTIFICATE
fromfalse
totrue
. A client will newly abort an SSH connection if the server presents an invalid OpenSSH host certificate as host key. - GH-767 and GH-771 cause API changes in classes
SkED25519PublicKey
andEdDSAPuttyKeyDecoder
. Both changes are unlikely to be noticed in user code since user code normally doesn’t need to use either class.
Getting the Distributions
- Source distributions:
- Binary distributions:
Please report any feedback to users@mina.apache.org.