Overview

Bug Fixes

  • GH-516 SFTP: allow file system URIs without password

  • GH-650 Use the correct key from a user certificate in server-side pubkey auth

  • GH-663 Fix racy IoSession creation

  • GH-664 Skip MAC negotiation if an AEAD cipher was negotiated

  • GH-677 Fix current directory handling in ScpShell for WinSCP

  • GH-678 ScpShell: write month names in English for WinSCP

  • GH-690 Handle append mode for buggy SFTP v3 servers

  • GH-700 Fix race in AbstractCloseable.doCloseImmediately()

  • GH-709 AbstractChannel: Handle keep-alive channel messages sent by an old OpenSSH server

  • GH-727 Supply default port 22 for proxy jump hosts for which there is no HostConfigEntry

  • GH-733 Avoid NPE in SftpRemotePathChannel.transferTo()

  • GH-751 Fix SFTP v3 “long name” if SFTP server uses an SftpFileSystem to another server

  • GH-754 DefaultFowarder must not be closed after a bind error

  • GH-767 Remove dependency on net.i2p.crypto in SkED25519PublicKey

  • GH-771 Remove dependency on net.i2p.crypto in EdDSAPuttyKeyDecoder

  • GH-774 Fix WritePendingException in SFTP file copy

  • GH-793 Close repository in GitPackCommand

  • SSHD-1343 Correct documentation in ChannelDataReceiver

New Features

  • GH-705 New method TcpipServerChannel.getPort() returning the ChannelToPortHandler

  • SSHD-1161 Support pubkey auth with user certificates (server-side)

    • Client-side support was introduced in version 2.8.0 already
  • SSHD-1167 Check host certificates against known_hosts file (implements @cert-authority)

Potential Compatibility Issues

  • Client-side KEX: we’ve changed the default of the setting CoreModuleProperties.ABORT_ON_INVALID_CERTIFICATE from false to true. A client will newly abort an SSH connection if the server presents an invalid OpenSSH host certificate as host key.
  • GH-767 and GH-771 cause API changes in classes SkED25519PublicKey and EdDSAPuttyKeyDecoder. Both changes are unlikely to be noticed in user code since user code normally doesn’t need to use either class.

Getting the Distributions

Please report any feedback to users@mina.apache.org.