Support for AES-GCM (in the OpenSSH style rather than RFC 5647). Support for NTRU Prime post-quantum key exchange, New plugin system to allow a helper program to provide responses in keyboard-interactive authentication, intended to automate one-time password systems. New SSH proxy modes, for running a custom shell command or subsystem on the proxy server instead of forwarding a port through it. Support for OpenSSH certificates, for both user authentication keys and host keys. German), Windows PuTTY would generate '.' instead for that keyīug fix: PuTTYgen could generate RSA keys with a modulus one bit shorter than requested Two separate vulnerabilities affecting the obsolete SSH-1 protocol, both available before host key checkingĪ vulnerability in all the SSH client tools (PuTTY, Plink, PSFTP and PSCP) if a malicious program can impersonate Pageantīug fix: crash in GSSAPI / Kerberos key exchange affecting third-party GSSAPI providers on Windows (such as MIT Kerberos for Windows)īug fix: crash in GSSAPI / Kerberos key exchange triggered if the server provided an ordinary SSH host key as part of the exchangeīug fix: trust sigils were never turned off in SSH-1 or Rloginīug fix: trust sigils were never turned back on if you used Restart Sessionīug fix: PSCP in SCP download mode could create files with a spurious newline at the end of their namesīug fix: PSCP in SCP download mode with the -p option would generate spurious complaints about illegal file renamingīug fix: the initial instruction message was never printed during SSH keyboard-interactive authenticationīug fix: pasting very long lines through connection sharing could crash the downstream PuTTY windowīug fix: in keyboard layouts with a ',' key on the numeric keypad (e.g. Security fixes found by the EU-funded bug bounty:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |