Overview
Bug Fixes
-
GH-516 SFTP: allow file system URIs without password
-
GH-650 Use the correct key from a user certificate in server-side pubkey auth
-
GH-663 Fix racy
IoSessioncreation -
GH-664 Skip MAC negotiation if an AEAD cipher was negotiated
-
GH-677 Fix current directory handling in
ScpShellfor WinSCP -
GH-678
ScpShell: write month names in English for WinSCP -
GH-690 Handle append mode for buggy SFTP v3 servers
-
GH-700 Fix race in
AbstractCloseable.doCloseImmediately() -
GH-709
AbstractChannel: Handle keep-alive channel messages sent by an old OpenSSH server -
GH-727 Supply default port 22 for proxy jump hosts for which there is no
HostConfigEntry -
GH-733 Avoid NPE in
SftpRemotePathChannel.transferTo() -
GH-751 Fix SFTP v3 “long name” if SFTP server uses an
SftpFileSystemto another server -
GH-754
DefaultFowardermust not be closed after a bind error -
GH-767 Remove dependency on net.i2p.crypto in
SkED25519PublicKey -
GH-771 Remove dependency on net.i2p.crypto in
EdDSAPuttyKeyDecoder -
GH-774 Fix
WritePendingExceptionin SFTP file copy -
GH-793 Close repository in
GitPackCommand -
SSHD-1343 Correct documentation in
ChannelDataReceiver
New Features
-
GH-705 New method
TcpipServerChannel.getPort()returning theChannelToPortHandler -
SSHD-1161 Support pubkey auth with user certificates (server-side)
- Client-side support was introduced in version 2.8.0 already
-
SSHD-1167 Check host certificates against known_hosts file (implements @cert-authority)
Potential Compatibility Issues
- Client-side KEX: we’ve changed the default of the setting
CoreModuleProperties.ABORT_ON_INVALID_CERTIFICATEfromfalsetotrue. A client will newly abort an SSH connection if the server presents an invalid OpenSSH host certificate as host key. - GH-767 and GH-771 cause API changes in classes
SkED25519PublicKeyandEdDSAPuttyKeyDecoder. Both changes are unlikely to be noticed in user code since user code normally doesn’t need to use either class.
Getting the Distributions
- Source distributions:
- Binary distributions:
Please report any feedback to users@mina.apache.org.