Skip to content

jsch-0.2.7

Compare
Choose a tag to compare
@mwiede mwiede released this 28 Jan 10:12
· 698 commits to master since this release

What's Changed

  • #265 change buffer_margin computation to be dynamic based upon the MAC to allow connections that advertise small maximum packet sizes.
  • #266 fix PuTTY key parsing to work with unix line endings.
  • Add support for ECDSA & EdDSA type PuTTY keys.
  • #71 add support for PuTTY version 3 format keys.
    • Encrypted PuTTY version 3 format keys requires Bouncy Castle (bcprov-jdk18on).
  • Eliminate KeyPairDeferred and instead change handling of OpenSSH V1 type keys to be more like other KeyPair types.
  • Be more vigilant about clearing private key data.
  • Improve PKCS8 key handling and add support for PKCS5 2.1 encryption.
  • Add support for ECDSA type PKCS8 keys.
  • Add support for SCrypt type KDF for PKCS8 keys.
    • PKCS8 keys using SCrypt requires Bouncy Castle (bcprov-jdk18on).
  • Add support for EdDSA type PKCS8 keys.
  • Attempt to authenticate using other signature algorithms supported by the same public key.
    • Allow this behavior to be disabled via try_additional_pubkey_algorithms config option.
      • Some servers incorrectly respond with SSH_MSG_USERAUTH_PK_OK to an initial auth query that they don't actually support for RSA keys.
  • Add a new config option enable_pubkey_auth_query to allow skipping auth queries and proceed directly to attempting full SSH_MSG_USERAUTH_REQUEST's.
  • Add a new config option enable_auth_none to control whether an initial auth request for the method none is sent to detect all supported auth methods available on the server.

Updates

Full Changelog: jsch-0.2.6...jsch-0.2.7