maven-scm
maven-scm copied to clipboard
Bump minaSshdVersion from 2.11.0 to 2.13.1
Bumps minaSshdVersion
from 2.11.0 to 2.13.1.
Updates org.apache.sshd:sshd-git
from 2.11.0 to 2.13.1
Release notes
Sourced from org.apache.sshd:sshd-git's releases.
SSHD 2.13.1
What's changed
This release does not contain any code changes. It is solely to rectify the issue that the 2.13.0 release encountered during the release process, where the source jars were not created.
Full Changelog: https://github.com/apache/mina-sshd/compare/sshd-2.13.0...sshd-2.13.1
The 2.13.0 release notes are available at https://github.com/apache/mina-sshd/releases/tag/sshd-2.13.0
SSHD 2.13.0
What's changed
- GH-318: Handle cascaded proxy jumps by
@tomaswolf
in #512- GH-427: Read initial ACK on channel open prior to direct stream upload & close streams prior to exit code handling by
@TerraNibble
in #464- GH-455: ensure BaseCipher.update() fulfills the contract by
@tomaswolf
in #463- GH-470: Synchronize not thread safe java.security.KeyPairGenerator.generateKe… by
@zakharovsergey1000
in #467- GH-476: Fix Android detection false negative by
@wh0
- GH-475: Switch uses of JSch library to the com.github.mwiede:jsch fork by
@Alex-Vol-Amz
- GH-472: change client start condition in sshd-spring-sftp by
@alwaystom
- GH-489: sftp readdir: determine file type from longname by
@tomaswolf
in #491- GH-486: Add missing U2F {ed25519,ecdsa}-sk public key equality methods by
@lf
-- SSHD-1237 Handle keep-alive channel requests by
@tomaswolf
in #492- GH-494: Nio2Session improvements by
@evgeny-pasynkov
- GH-468: Handle excess data in SFTP read requests by
@tomaswolf
in #495- GH-498: Implement the "[email protected]" KEX method by
@tomaswolf
- GH-500: SftpFileSystemProvider: close SftpClient on exception by
@tomaswolf
in #501- GH-504: Pass reason to sessionNegotiationEnd by
@duco-lw
in #505- GH-461: Fix heartbeats with
wantReply=true
by@tomaswolf
in #507- GH-493: Fix arcfour128 and arcfour256 ciphers (regression in 2.2.0)
- GH-509: SFTP v[456] client: validate attribute flags
- GH-510: Fix class name in BuiltinIoServiceFactoryFactories (regression in 2.6.0)
New Features
[email protected]
Key ExchangeThe key exchange method [email protected] is now available if the Bouncy Castle library is available.
This uses a post-quantum key encapsulation method (KEM) to make key exchange future-proof against quantum attacks. More information can be found in IETF Memo Secure Shell (SSH) Key Exchange Method Using Hybrid Streamlined NTRU Prime sntrup761 and X25519 with SHA-512: sntrup761x25519-sha512.
Behavioral changes and enhancements
GH-318 Handle cascaded proxy jumps
Proxy jumps can be configured via host configuration entries in two ways. First, proxies can be chained directly by specifiying several proxies in one
ProxyJump
directive:</tr></table>
... (truncated)
Changelog
Sourced from org.apache.sshd:sshd-git's changelog.
Version 2.1.0 to 2.2.0
Version 2.2.0 to 2.3.0
Version 2.3.0 to 2.4.0
Version 2.4.0 to 2.5.0
Version 2.5.0 to 2.5.1
Version 2.5.1 to 2.6.0
Version 2.6.0 to 2.7.0
Version 2.7.0 to 2.8.0
Version 2.8.0 to 2.9.0
Version 2.9.0 to 2.9.1
Version 2.9.1 to 2.9.2
Version 2.9.2 to 2.10.0
Commits
a02a49e
[maven-release-plugin] prepare release sshd-2.13.150d1d9f
Do not build the default source jar for sshd-osgi31a2ddc
[maven-release-plugin] prepare for next development iteration00bfb95
[maven-release-plugin] prepare release sshd-2.13.093250df
Prepare changelog for released45646b
Mention that CBC is not recommended8f6e96f
Comment fixesb4ee576
Harden CBC cipher handlingedb2b95
Remove AES-CBC ciphers from the server's default KEX proposal0c2403f
Minor simplification in packet decoding- Additional commits viewable in compare view
Updates org.apache.sshd:sshd-common
from 2.11.0 to 2.13.1
Release notes
Sourced from org.apache.sshd:sshd-common's releases.
SSHD 2.13.1
What's changed
This release does not contain any code changes. It is solely to rectify the issue that the 2.13.0 release encountered during the release process, where the source jars were not created.
Full Changelog: https://github.com/apache/mina-sshd/compare/sshd-2.13.0...sshd-2.13.1
The 2.13.0 release notes are available at https://github.com/apache/mina-sshd/releases/tag/sshd-2.13.0
SSHD 2.13.0
What's changed
- GH-318: Handle cascaded proxy jumps by
@tomaswolf
in #512- GH-427: Read initial ACK on channel open prior to direct stream upload & close streams prior to exit code handling by
@TerraNibble
in #464- GH-455: ensure BaseCipher.update() fulfills the contract by
@tomaswolf
in #463- GH-470: Synchronize not thread safe java.security.KeyPairGenerator.generateKe… by
@zakharovsergey1000
in #467- GH-476: Fix Android detection false negative by
@wh0
- GH-475: Switch uses of JSch library to the com.github.mwiede:jsch fork by
@Alex-Vol-Amz
- GH-472: change client start condition in sshd-spring-sftp by
@alwaystom
- GH-489: sftp readdir: determine file type from longname by
@tomaswolf
in #491- GH-486: Add missing U2F {ed25519,ecdsa}-sk public key equality methods by
@lf
-- SSHD-1237 Handle keep-alive channel requests by
@tomaswolf
in #492- GH-494: Nio2Session improvements by
@evgeny-pasynkov
- GH-468: Handle excess data in SFTP read requests by
@tomaswolf
in #495- GH-498: Implement the "[email protected]" KEX method by
@tomaswolf
- GH-500: SftpFileSystemProvider: close SftpClient on exception by
@tomaswolf
in #501- GH-504: Pass reason to sessionNegotiationEnd by
@duco-lw
in #505- GH-461: Fix heartbeats with
wantReply=true
by@tomaswolf
in #507- GH-493: Fix arcfour128 and arcfour256 ciphers (regression in 2.2.0)
- GH-509: SFTP v[456] client: validate attribute flags
- GH-510: Fix class name in BuiltinIoServiceFactoryFactories (regression in 2.6.0)
New Features
[email protected]
Key ExchangeThe key exchange method [email protected] is now available if the Bouncy Castle library is available.
This uses a post-quantum key encapsulation method (KEM) to make key exchange future-proof against quantum attacks. More information can be found in IETF Memo Secure Shell (SSH) Key Exchange Method Using Hybrid Streamlined NTRU Prime sntrup761 and X25519 with SHA-512: sntrup761x25519-sha512.
Behavioral changes and enhancements
GH-318 Handle cascaded proxy jumps
Proxy jumps can be configured via host configuration entries in two ways. First, proxies can be chained directly by specifiying several proxies in one
ProxyJump
directive:</tr></table>
... (truncated)
Changelog
Sourced from org.apache.sshd:sshd-common's changelog.
Version 2.1.0 to 2.2.0
Version 2.2.0 to 2.3.0
Version 2.3.0 to 2.4.0
Version 2.4.0 to 2.5.0
Version 2.5.0 to 2.5.1
Version 2.5.1 to 2.6.0
Version 2.6.0 to 2.7.0
Version 2.7.0 to 2.8.0
Version 2.8.0 to 2.9.0
Version 2.9.0 to 2.9.1
Version 2.9.1 to 2.9.2
Version 2.9.2 to 2.10.0
Commits
a02a49e
[maven-release-plugin] prepare release sshd-2.13.150d1d9f
Do not build the default source jar for sshd-osgi31a2ddc
[maven-release-plugin] prepare for next development iteration00bfb95
[maven-release-plugin] prepare release sshd-2.13.093250df
Prepare changelog for released45646b
Mention that CBC is not recommended8f6e96f
Comment fixesb4ee576
Harden CBC cipher handlingedb2b95
Remove AES-CBC ciphers from the server's default KEX proposal0c2403f
Minor simplification in packet decoding- Additional commits viewable in compare view
Updates org.apache.sshd:sshd-core
from 2.11.0 to 2.13.1
Release notes
Sourced from org.apache.sshd:sshd-core's releases.
SSHD 2.13.1
What's changed
This release does not contain any code changes. It is solely to rectify the issue that the 2.13.0 release encountered during the release process, where the source jars were not created.
Full Changelog: https://github.com/apache/mina-sshd/compare/sshd-2.13.0...sshd-2.13.1
The 2.13.0 release notes are available at https://github.com/apache/mina-sshd/releases/tag/sshd-2.13.0
SSHD 2.13.0
What's changed
- GH-318: Handle cascaded proxy jumps by
@tomaswolf
in #512- GH-427: Read initial ACK on channel open prior to direct stream upload & close streams prior to exit code handling by
@TerraNibble
in #464- GH-455: ensure BaseCipher.update() fulfills the contract by
@tomaswolf
in #463- GH-470: Synchronize not thread safe java.security.KeyPairGenerator.generateKe… by
@zakharovsergey1000
in #467- GH-476: Fix Android detection false negative by
@wh0
- GH-475: Switch uses of JSch library to the com.github.mwiede:jsch fork by
@Alex-Vol-Amz
- GH-472: change client start condition in sshd-spring-sftp by
@alwaystom
- GH-489: sftp readdir: determine file type from longname by
@tomaswolf
in #491- GH-486: Add missing U2F {ed25519,ecdsa}-sk public key equality methods by
@lf
-- SSHD-1237 Handle keep-alive channel requests by
@tomaswolf
in #492- GH-494: Nio2Session improvements by
@evgeny-pasynkov
- GH-468: Handle excess data in SFTP read requests by
@tomaswolf
in #495- GH-498: Implement the "[email protected]" KEX method by
@tomaswolf
- GH-500: SftpFileSystemProvider: close SftpClient on exception by
@tomaswolf
in #501- GH-504: Pass reason to sessionNegotiationEnd by
@duco-lw
in #505- GH-461: Fix heartbeats with
wantReply=true
by@tomaswolf
in #507- GH-493: Fix arcfour128 and arcfour256 ciphers (regression in 2.2.0)
- GH-509: SFTP v[456] client: validate attribute flags
- GH-510: Fix class name in BuiltinIoServiceFactoryFactories (regression in 2.6.0)
New Features
[email protected]
Key ExchangeThe key exchange method [email protected] is now available if the Bouncy Castle library is available.
This uses a post-quantum key encapsulation method (KEM) to make key exchange future-proof against quantum attacks. More information can be found in IETF Memo Secure Shell (SSH) Key Exchange Method Using Hybrid Streamlined NTRU Prime sntrup761 and X25519 with SHA-512: sntrup761x25519-sha512.
Behavioral changes and enhancements
GH-318 Handle cascaded proxy jumps
Proxy jumps can be configured via host configuration entries in two ways. First, proxies can be chained directly by specifiying several proxies in one
ProxyJump
directive:</tr></table>
... (truncated)
Changelog
Sourced from org.apache.sshd:sshd-core's changelog.
Version 2.1.0 to 2.2.0
Version 2.2.0 to 2.3.0
Version 2.3.0 to 2.4.0
Version 2.4.0 to 2.5.0
Version 2.5.0 to 2.5.1
Version 2.5.1 to 2.6.0
Version 2.6.0 to 2.7.0
Version 2.7.0 to 2.8.0
Version 2.8.0 to 2.9.0
Version 2.9.0 to 2.9.1
Version 2.9.1 to 2.9.2
Version 2.9.2 to 2.10.0
Commits
a02a49e
[maven-release-plugin] prepare release sshd-2.13.150d1d9f
Do not build the default source jar for sshd-osgi31a2ddc
[maven-release-plugin] prepare for next development iteration00bfb95
[maven-release-plugin] prepare release sshd-2.13.093250df
Prepare changelog for released45646b
Mention that CBC is not recommended8f6e96f
Comment fixesb4ee576
Harden CBC cipher handlingedb2b95
Remove AES-CBC ciphers from the server's default KEX proposal0c2403f
Minor simplification in packet decoding- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency -
@dependabot ignore this major version
will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor version
will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependency
will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)