jline / jline3

JLine is a Java library for handling console input.
Other
1.49k stars 217 forks source link

Bump sshd.version from 2.12.1 to 2.13.0 #1021

Closed dependabot[bot] closed 4 months ago

dependabot[bot] commented 4 months ago

Bumps sshd.version from 2.12.1 to 2.13.0. Updates org.apache.sshd:sshd-common from 2.12.1 to 2.13.0

Release notes

Sourced from org.apache.sshd:sshd-common's releases.

SSHD 2.13.0

What's changed

New Features

sntrup761x25519-sha512@openssh.com Key Exchange

The key exchange method sntrup761x25519-sha512@openssh.com is now available if the Bouncy Castle library is available.

This uses a post-quantum key encapsulation method (KEM) to make key exchange future-proof against quantum attacks. More information can be found in IETF Memo Secure Shell (SSH) Key Exchange Method Using Hybrid Streamlined NTRU Prime sntrup761 and X25519 with SHA-512: sntrup761x25519-sha512.

Behavioral changes and enhancements

GH-318 Handle cascaded proxy jumps

Proxy jumps can be configured via host configuration entries in two ways. First, proxies can be chained directly by specifiying several proxies in one ProxyJump directive:

Host target
Hostname somewhere.example.org
User some_user
IdentityFile ~/.ssh/some_id
ProxyJump jumphost2, jumphost1

Host jumphost1 Hostname jumphost1@example.org User jumphost1_user </tr></table>

... (truncated)

Changelog

Sourced from org.apache.sshd:sshd-common's changelog.

Version 2.12.0 to 2.12.1

Version 2.12.1 to 2.13.0

Planned for next version

Bug Fixes

New Features

Potential compatibility issues

Major Code Re-factoring

Commits
  • 00bfb95 [maven-release-plugin] prepare release sshd-2.13.0
  • 93250df Prepare changelog for release
  • d45646b Mention that CBC is not recommended
  • 8f6e96f Comment fixes
  • b4ee576 Harden CBC cipher handling
  • edb2b95 Remove AES-CBC ciphers from the server's default KEX proposal
  • 0c2403f Minor simplification in packet decoding
  • 249528a Improve X11 forwarding
  • 29df531 Fix "block size" of the "none" cipher
  • 12e5283 GH-318: fix proxyJumps
  • Additional commits viewable in compare view


Updates org.apache.sshd:sshd-core from 2.12.1 to 2.13.0

Release notes

Sourced from org.apache.sshd:sshd-core's releases.

SSHD 2.13.0

What's changed

New Features

sntrup761x25519-sha512@openssh.com Key Exchange

The key exchange method sntrup761x25519-sha512@openssh.com is now available if the Bouncy Castle library is available.

This uses a post-quantum key encapsulation method (KEM) to make key exchange future-proof against quantum attacks. More information can be found in IETF Memo Secure Shell (SSH) Key Exchange Method Using Hybrid Streamlined NTRU Prime sntrup761 and X25519 with SHA-512: sntrup761x25519-sha512.

Behavioral changes and enhancements

GH-318 Handle cascaded proxy jumps

Proxy jumps can be configured via host configuration entries in two ways. First, proxies can be chained directly by specifiying several proxies in one ProxyJump directive:

Host target
Hostname somewhere.example.org
User some_user
IdentityFile ~/.ssh/some_id
ProxyJump jumphost2, jumphost1

Host jumphost1 Hostname jumphost1@example.org User jumphost1_user </tr></table>

... (truncated)

Changelog

Sourced from org.apache.sshd:sshd-core's changelog.

Version 2.12.0 to 2.12.1

Version 2.12.1 to 2.13.0

Planned for next version

Bug Fixes

New Features

Potential compatibility issues

Major Code Re-factoring

Commits
  • 00bfb95 [maven-release-plugin] prepare release sshd-2.13.0
  • 93250df Prepare changelog for release
  • d45646b Mention that CBC is not recommended
  • 8f6e96f Comment fixes
  • b4ee576 Harden CBC cipher handling
  • edb2b95 Remove AES-CBC ciphers from the server's default KEX proposal
  • 0c2403f Minor simplification in packet decoding
  • 249528a Improve X11 forwarding
  • 29df531 Fix "block size" of the "none" cipher
  • 12e5283 GH-318: fix proxyJumps
  • Additional commits viewable in compare view


Updates org.apache.sshd:sshd-scp from 2.12.1 to 2.13.0

Release notes

Sourced from org.apache.sshd:sshd-scp's releases.

SSHD 2.13.0

What's changed

New Features

sntrup761x25519-sha512@openssh.com Key Exchange

The key exchange method sntrup761x25519-sha512@openssh.com is now available if the Bouncy Castle library is available.

This uses a post-quantum key encapsulation method (KEM) to make key exchange future-proof against quantum attacks. More information can be found in IETF Memo Secure Shell (SSH) Key Exchange Method Using Hybrid Streamlined NTRU Prime sntrup761 and X25519 with SHA-512: sntrup761x25519-sha512.

Behavioral changes and enhancements

GH-318 Handle cascaded proxy jumps

Proxy jumps can be configured via host configuration entries in two ways. First, proxies can be chained directly by specifiying several proxies in one ProxyJump directive:

Host target
Hostname somewhere.example.org
User some_user
IdentityFile ~/.ssh/some_id
ProxyJump jumphost2, jumphost1

Host jumphost1 Hostname jumphost1@example.org User jumphost1_user </tr></table>

... (truncated)

Changelog

Sourced from org.apache.sshd:sshd-scp's changelog.

Version 2.12.0 to 2.12.1

Version 2.12.1 to 2.13.0

Planned for next version

Bug Fixes

New Features

Potential compatibility issues

Major Code Re-factoring

Commits
  • 00bfb95 [maven-release-plugin] prepare release sshd-2.13.0
  • 93250df Prepare changelog for release
  • d45646b Mention that CBC is not recommended
  • 8f6e96f Comment fixes
  • b4ee576 Harden CBC cipher handling
  • edb2b95 Remove AES-CBC ciphers from the server's default KEX proposal
  • 0c2403f Minor simplification in packet decoding
  • 249528a Improve X11 forwarding
  • 29df531 Fix "block size" of the "none" cipher
  • 12e5283 GH-318: fix proxyJumps
  • Additional commits viewable in compare view


Updates org.apache.sshd:sshd-sftp from 2.12.1 to 2.13.0

Release notes

Sourced from org.apache.sshd:sshd-sftp's releases.

SSHD 2.13.0

What's changed

New Features

sntrup761x25519-sha512@openssh.com Key Exchange

The key exchange method sntrup761x25519-sha512@openssh.com is now available if the Bouncy Castle library is available.

This uses a post-quantum key encapsulation method (KEM) to make key exchange future-proof against quantum attacks. More information can be found in IETF Memo Secure Shell (SSH) Key Exchange Method Using Hybrid Streamlined NTRU Prime sntrup761 and X25519 with SHA-512: sntrup761x25519-sha512.

Behavioral changes and enhancements

GH-318 Handle cascaded proxy jumps

Proxy jumps can be configured via host configuration entries in two ways. First, proxies can be chained directly by specifiying several proxies in one ProxyJump directive:

Host target
Hostname somewhere.example.org
User some_user
IdentityFile ~/.ssh/some_id
ProxyJump jumphost2, jumphost1

Host jumphost1 Hostname jumphost1@example.org User jumphost1_user </tr></table>

... (truncated)

Changelog

Sourced from org.apache.sshd:sshd-sftp's changelog.

Version 2.12.0 to 2.12.1

Version 2.12.1 to 2.13.0

Planned for next version

Bug Fixes

New Features

Potential compatibility issues

Major Code Re-factoring

Commits
  • 00bfb95 [maven-release-plugin] prepare release sshd-2.13.0
  • 93250df Prepare changelog for release
  • d45646b Mention that CBC is not recommended
  • 8f6e96f Comment fixes
  • b4ee576 Harden CBC cipher handling
  • edb2b95 Remove AES-CBC ciphers from the server's default KEX proposal
  • 0c2403f Minor simplification in packet decoding
  • 249528a Improve X11 forwarding
  • 29df531 Fix "block size" of the "none" cipher
  • 12e5283 GH-318: fix proxyJumps
  • Additional commits viewable in compare view


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
gnodet commented 4 months ago

@dependabot recreate

dependabot[bot] commented 4 months ago

Superseded by #1027.