Overview
Bug Fixes
Github issues:
- GH-469 AKA SSHD-897 Fix duplicate character echo with interactive shells
- GH-721 SSH client: schedule session timeout checks on demand only
- GH-807 Handle “verified” flag for sk-* keys
- GH-809 Fix server-side authentication for FIDO/U2F sk-* keys with flags in
authorized_keys - GH-827 Don’t fail on invalid
known_hostslines; log and skip them - GH-830 EC public keys: let Bouncy Castle generate X.509 encodings with the curve OID as algorithm parameter
- GH-855 SFTP: use a single
SftpClientperSftpFileSystem - GH-856 Fix using ed25519 with BC-FIPS
- GH-861 SFTP client: prevent sending zero-length writes in
SftpOutputStreamAsync
JIRA issues:
- SSHD-897 AKA GH-469 Fix duplicate character echo with interactive shells
- SSHD-1348 Fix zero-length SFTP reads
- SSHD-1349 Bump PMD to 7.20.0 to avoid StackOverflowError when compiling on Java 26-ea
New Features
- GH-814 Include a fix for CVE-2020-36843 in optional dependency net.i2p.crypto:eddsa:0.3.0: perform the missing range check in Apache MINA SSHD before delegating to the signature verification in net.i2p.crypto:eddsa:0.3.0. This means that using net.i2p.crypto:eddsa:0.3.0 in Apache MINA SSHD is safe despite that CVE in the dependency.
- GH-865 replace
%hinHostNameSSH config
Potential Compatibility Issues
GH-855 changes the way SftpFileSystem deals with multiple threads. It newly uses a single SSH channel via a single thread-safe SftpClient, serializing writes at the channel level. The properties relating to the previously used pool of SftpClients have been deprecated and have no effect anymore. User applications using the library should not see any changes.
A beneficial side-effect of this change is that an SftpFileSystem creates the SSH session and SFTP channel only when the first SFTP operation is performed. Previously the session and channel were opened right away when an SftpFileSystem was instantiated.
Getting the Distributions
- Source distributions:
- Binary distributions:
PGP signing public keys for all releases are available in the Apache MINA KEYS file.
Please report any feedback to users@mina.apache.org.