Bump minaSshdVersion from 2.11.0 to 2.12.1
Bumps minaSshdVersion from 2.9.2 to 2.12.1.
Updates org.apache.sshd:sshd-git from 2.9.2 to 2.12.1
Release notes
Sourced from org.apache.sshd:sshd-git's releases.
Apache MINA SSHD 2.12.1
Introduced in 2.12.1
Bug Fixes
- GH-458 Singleton thread pool for kex message handler flushing
- SSHD-1338 Restore binary compatibility with 2.9.2
What's Changed
- Fix link by
@swiedenfeldin apache/mina-sshd#454- SSHD-1338 Restore binary compatibility with 2.9.2 by
@gnodetin apache/mina-sshd#456- Use a singleton threadpool for kex message handler flushing by
@FliegenKLATSCHin apache/mina-sshd#459New Contributors
@swiedenfeldmade their first contribution in apache/mina-sshd#454Full Changelog: https://github.com/apache/mina-sshd/compare/sshd-2.12.0...sshd-2.12.1
Apache MINA SSHD 2.12.0
Introduced in 2.12.0
Bug Fixes
- [GH-428/GH-392](apache/mina-sshd#428) SCP client fails silently when error signalled due to missing file or lacking permissions
- GH-434 Ignore unknown key types from agent or in OpenSSH host keys extension
New Features
- GH-429 Support GIT protocol-v2
- GH-445 OpenSSH "strict key exchange" protocol extension (CVE-2023-48795 mitigation)
Behavioral changes and enhancements
New
ScpTransferEventListenercallback methodFollowing [GH-428/GH-392](apache/mina-sshd#428) a new
handleReceiveCommandAckInfomethod has been added to enable users to inspect acknowledgements of areceiverelated command. The user is free to inspect the command that was attempted as well as the response code and decide how to handle it - including even throwing an exception if OK status (if this makes sense for whatever reason). The default implementation checks for ERROR code and throws an exception if so.OpenSSH protocol extension: strict key exchange
GH-445 implements an extension to the SSH protocol introduced in OpenSSH 9.6. This "strict key exchange" extension hardens the SSH key exchange against the "Terrapin attack" (CVE-2023-48795). The extension is active if both parties announce their support for it at the start of the initial key exchange. If only one party announces support, it is not activated to ensure compatibility with SSH implementations that do not implement it. Apache MINA sshd clients and servers always announce their support for strict key exchange.
... (truncated)
Changelog
Sourced from org.apache.sshd:sshd-git's changelog.
Version 2.9.1 to 2.9.2
Version 2.9.2 to 2.10.0
Version 2.10.0 to 2.11.0
Version 2.11.0 to 2.12.0
Version 2.12.0 to 2.12.1
Planned for next version
Bug Fixes
- GH-455 Fix
BaseCipher: make sure all bytes are processedNew Features
Behavioral changes and enhancements
Potential compatibility issues
Major Code Re-factoring
Commits
9ceba3e[maven-release-plugin] prepare release sshd-2.12.11525fd3Prepare changelog for release6c45997Update CHANGES.md7d77e6dUse a singleton threadpool for kex message handler flushing (#459) (fixes #458)7498f7aUpdate CHANGES.md8744f06[SSHD-1338] Restore binary compatibility with 2.9.244a0b1bBump jgit 5.13.0 -> 5.13.3b040109Merge pull request #454 from swiedenfeld/patch-1c8be9b8Fix link6511fb7[maven-release-plugin] prepare for next development iteration- Additional commits viewable in compare view
Updates org.apache.sshd:sshd-common from 2.9.2 to 2.12.1
Release notes
Sourced from org.apache.sshd:sshd-common's releases.
Apache MINA SSHD 2.12.1
Introduced in 2.12.1
Bug Fixes
- GH-458 Singleton thread pool for kex message handler flushing
- SSHD-1338 Restore binary compatibility with 2.9.2
What's Changed
- Fix link by
@swiedenfeldin apache/mina-sshd#454- SSHD-1338 Restore binary compatibility with 2.9.2 by
@gnodetin apache/mina-sshd#456- Use a singleton threadpool for kex message handler flushing by
@FliegenKLATSCHin apache/mina-sshd#459New Contributors
@swiedenfeldmade their first contribution in apache/mina-sshd#454Full Changelog: https://github.com/apache/mina-sshd/compare/sshd-2.12.0...sshd-2.12.1
Apache MINA SSHD 2.12.0
Introduced in 2.12.0
Bug Fixes
- [GH-428/GH-392](apache/mina-sshd#428) SCP client fails silently when error signalled due to missing file or lacking permissions
- GH-434 Ignore unknown key types from agent or in OpenSSH host keys extension
New Features
- GH-429 Support GIT protocol-v2
- GH-445 OpenSSH "strict key exchange" protocol extension (CVE-2023-48795 mitigation)
Behavioral changes and enhancements
New
ScpTransferEventListenercallback methodFollowing [GH-428/GH-392](apache/mina-sshd#428) a new
handleReceiveCommandAckInfomethod has been added to enable users to inspect acknowledgements of areceiverelated command. The user is free to inspect the command that was attempted as well as the response code and decide how to handle it - including even throwing an exception if OK status (if this makes sense for whatever reason). The default implementation checks for ERROR code and throws an exception if so.OpenSSH protocol extension: strict key exchange
GH-445 implements an extension to the SSH protocol introduced in OpenSSH 9.6. This "strict key exchange" extension hardens the SSH key exchange against the "Terrapin attack" (CVE-2023-48795). The extension is active if both parties announce their support for it at the start of the initial key exchange. If only one party announces support, it is not activated to ensure compatibility with SSH implementations that do not implement it. Apache MINA sshd clients and servers always announce their support for strict key exchange.
... (truncated)
Changelog
Sourced from org.apache.sshd:sshd-common's changelog.
Version 2.9.1 to 2.9.2
Version 2.9.2 to 2.10.0
Version 2.10.0 to 2.11.0
Version 2.11.0 to 2.12.0
Version 2.12.0 to 2.12.1
Planned for next version
Bug Fixes
- GH-455 Fix
BaseCipher: make sure all bytes are processedNew Features
Behavioral changes and enhancements
Potential compatibility issues
Major Code Re-factoring
Commits
9ceba3e[maven-release-plugin] prepare release sshd-2.12.11525fd3Prepare changelog for release6c45997Update CHANGES.md7d77e6dUse a singleton threadpool for kex message handler flushing (#459) (fixes #458)7498f7aUpdate CHANGES.md8744f06[SSHD-1338] Restore binary compatibility with 2.9.244a0b1bBump jgit 5.13.0 -> 5.13.3b040109Merge pull request #454 from swiedenfeld/patch-1c8be9b8Fix link6511fb7[maven-release-plugin] prepare for next development iteration- Additional commits viewable in compare view
Updates org.apache.sshd:sshd-core from 2.9.2 to 2.12.1
Release notes
Sourced from org.apache.sshd:sshd-core's releases.
Apache MINA SSHD 2.12.1
Introduced in 2.12.1
Bug Fixes
- GH-458 Singleton thread pool for kex message handler flushing
- SSHD-1338 Restore binary compatibility with 2.9.2
What's Changed
- Fix link by
@swiedenfeldin apache/mina-sshd#454- SSHD-1338 Restore binary compatibility with 2.9.2 by
@gnodetin apache/mina-sshd#456- Use a singleton threadpool for kex message handler flushing by
@FliegenKLATSCHin apache/mina-sshd#459New Contributors
@swiedenfeldmade their first contribution in apache/mina-sshd#454Full Changelog: https://github.com/apache/mina-sshd/compare/sshd-2.12.0...sshd-2.12.1
Apache MINA SSHD 2.12.0
Introduced in 2.12.0
Bug Fixes
- [GH-428/GH-392](apache/mina-sshd#428) SCP client fails silently when error signalled due to missing file or lacking permissions
- GH-434 Ignore unknown key types from agent or in OpenSSH host keys extension
New Features
- GH-429 Support GIT protocol-v2
- GH-445 OpenSSH "strict key exchange" protocol extension (CVE-2023-48795 mitigation)
Behavioral changes and enhancements
New
ScpTransferEventListenercallback methodFollowing [GH-428/GH-392](apache/mina-sshd#428) a new
handleReceiveCommandAckInfomethod has been added to enable users to inspect acknowledgements of areceiverelated command. The user is free to inspect the command that was attempted as well as the response code and decide how to handle it - including even throwing an exception if OK status (if this makes sense for whatever reason). The default implementation checks for ERROR code and throws an exception if so.OpenSSH protocol extension: strict key exchange
GH-445 implements an extension to the SSH protocol introduced in OpenSSH 9.6. This "strict key exchange" extension hardens the SSH key exchange against the "Terrapin attack" (CVE-2023-48795). The extension is active if both parties announce their support for it at the start of the initial key exchange. If only one party announces support, it is not activated to ensure compatibility with SSH implementations that do not implement it. Apache MINA sshd clients and servers always announce their support for strict key exchange.
... (truncated)
Changelog
Sourced from org.apache.sshd:sshd-core's changelog.
Version 2.9.1 to 2.9.2
Version 2.9.2 to 2.10.0
Version 2.10.0 to 2.11.0
Version 2.11.0 to 2.12.0
Version 2.12.0 to 2.12.1
Planned for next version
Bug Fixes
- GH-455 Fix
BaseCipher: make sure all bytes are processedNew Features
Behavioral changes and enhancements
Potential compatibility issues
Major Code Re-factoring
Commits
9ceba3e[maven-release-plugin] prepare release sshd-2.12.11525fd3Prepare changelog for release6c45997Update CHANGES.md7d77e6dUse a singleton threadpool for kex message handler flushing (#459) (fixes #458)7498f7aUpdate CHANGES.md8744f06[SSHD-1338] Restore binary compatibility with 2.9.244a0b1bBump jgit 5.13.0 -> 5.13.3b040109Merge pull request #454 from swiedenfeld/patch-1c8be9b8Fix link6511fb7[maven-release-plugin] prepare for next development iteration- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency -
@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
@dependabot rebase
Looks like this PR is already up-to-date with master! If you'd still like to recreate it from scratch, overwriting any edits, you can request @dependabot recreate.
@dependabot recreate
Superseded by #210.