Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

0.2.7 changes #264

Merged
merged 48 commits into from
Jan 27, 2023
Merged

0.2.7 changes #264

merged 48 commits into from
Jan 27, 2023

Conversation

norrisjeremy
Copy link
Contributor

@norrisjeremy norrisjeremy commented Jan 5, 2023

  • Use slfj4-test instead of logback for unit & integration tests.
  • Fix exception logging in Log4j2Logger.
  • Add unit tests for Log4j2Logger.
  • Tweak JulLogger & JulLoggerTest to better match other loggers & tests.
  • Add unit tests for Log4j2Logger's getLevel method.
  • Misc cleanup of logger tests.
  • Misc cleanup of LoggerTest.
  • Remove unneeded logging.
  • Update dependencies.
  • JSch fails connection to older SSH servers - wrong MAC segment size in SSH packets #265 change buffer_margin computation to be dynamic based upon the MAC to allow connections that advertise small maximum packet sizes.
  • Invalid Private Key for UNIX runs #266 fix PuTTY key parsing to work with unix line endings.
  • Convert from Hashtable & Vector to HashMap & ArrayList.
  • Add support for ECDSA & EdDSA type PuTTY keys.
  • Support PuTTY's PPK version 3 private key format #71 add support for PuTTY version 3 format keys.
    • Encrypted PuTTY version 3 format keys requires Bouncy Castle (bcprov-jdk18on).
  • Add coverage reports for integration tests.
  • Archive jars.
  • Unroll passphrase key derivation for PuTTY version 2 keys.
  • Add logging when exceptions are swallowed.
  • Test against char representation instead of int to improve readability.
  • Eliminate KeyPairDeferred and instead change handling of OpenSSH V1 type keys to be more like other KeyPair types.
  • Be more vigilant about clearing private key data.
  • Improve PKCS8 key handling and add support for PKCS5 2.1 encryption.
  • Add support for ECDSA type PKCS8 keys.
  • Remove unneeded null checks.
  • Add support for SCrypt type KDF for PKCS8 keys.
  • Minor tweaks of PKCS8 handling.
    • PKCS8 keys using SCrypt requires Bouncy Castle (bcprov-jdk18on).
  • Make some internal methods static.
  • Mark Argon2 type and versions as final.
  • Wrap NoClassDefFoundErrors when Bouncy Castle is unavailable.
  • Add a common bzero routine.
  • Mark PBKDF interface and implementation as deprecated: PBKDF2 should be used instead.
  • Add support for EdDSA type PKCS8 keys.
  • Add a parent KDF type for all the various KDF implementations.
  • Minor syntax cleanup to scala sources.
  • Misc cleanup to ASN1 parsing.
  • Fix warnings in scala sources.
  • Convert JZlib tests from Scala to Java.
  • Attempt to authenticate using other signature algorithms supported by the same public key.
  • Use standard Base64 instead of commons-codec version.
  • Add an enable_auth_none config option.
    • The enable_auth_none config option controls whether an initial authentication request for the method none is sent to detect all the supported authentication methods available on the server.

@norrisjeremy norrisjeremy force-pushed the 20230105 branch 3 times, most recently from 667393d to 0a82d6c Compare January 7, 2023 15:36
@norrisjeremy norrisjeremy changed the title Use slfj4-test instead of logback for unit & integration tests 0.2.7 changes Jan 7, 2023
@norrisjeremy norrisjeremy force-pushed the 20230105 branch 10 times, most recently from 94f6b13 to 26a3f20 Compare January 8, 2023 04:26
…the MAC to allow connections that advertise small maximum packet sizes.
… the same public key.

Some servers incorrectly respond with SSH_MSG_USERAUTH_PK_OK to the
intial auth query, but then fail the full SSH_MSG_USERAUTH_REQUEST for
RSA keys (which can support multiple signautre algorithms).

Allow the new behavior to potentially try other algorithms to be
disabled via a new config option `try_additional_pubkey_algorithms`.

Additionally, add a new config option `enable_pubkey_auth_query` to
allow skipping auth queries and proceed directly to attempting full
SSH_MSG_USERAUTH_REQUEST's.
The `enable_auth_none` config option controls whether an initial
authentication request for the method `none` is sent to detect all the
supported authentication methods available on the server.
@mwiede mwiede merged commit 5b30787 into mwiede:master Jan 27, 2023
@norrisjeremy norrisjeremy deleted the 20230105 branch January 27, 2023 13:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants