This is an automated email from the ASF dual-hosted git repository. gnodet pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/mina-sshd.git
The following commit(s) were added to refs/heads/master by this push: new 50b21bfa6 Prepare changelog for release 50b21bfa6 is described below commit 50b21bfa645e8ebeaf6e0e37481cf96fb2bb86bd Author: Guillaume Nodet <gno...@gmail.com> AuthorDate: Fri Jan 12 05:58:35 2024 +0100 Prepare changelog for release --- CHANGES.md | 26 ++------------------------ CHANGES.md => docs/changes/2.12.0.md | 28 +--------------------------- 2 files changed, 3 insertions(+), 51 deletions(-) diff --git a/CHANGES.md b/CHANGES.md index ba9b80de6..b308e7a37 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -24,38 +24,16 @@ # [Version 2.10.0 to 2.11.0](./docs/changes/2.11.0.md) +# [Version 2.11.0 to 2.12.0](./docs/changes/2.12.0.md) + # Planned for next version ## Bug Fixes -* [GH-428/GH-392](https://github.com/apache/mina-sshd/issues/428) SCP client fails silently when error signalled due to missing file or lacking permissions -* [GH-434](https://github.com/apache/mina-sshd/issues/434) Ignore unknown key types from agent or in OpenSSH host keys extension - - ## New Features -* [GH-429](https://github.com/apache/mina-sshd/issues/429) Support GIT protocol-v2 -* [GH-445](https://github.com/apache/mina-sshd/issues/445) OpenSSH "strict key exchange" protocol extension ([CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795) mitigation) - ## Behavioral changes and enhancements -### New `ScpTransferEventListener` callback method - -Following [GH-428/GH-392](https://github.com/apache/mina-sshd/issues/428) a new `handleReceiveCommandAckInfo` method has been added to enable users to inspect -acknowledgements of a `receive` related command. The user is free to inspect the command that was attempted as well as the response code and decide how -to handle it - including even throwing an exception if OK status (if this makes sense for whatever reason). The default implementation checks for ERROR code and throws -an exception if so. - -### OpenSSH protocol extension: strict key exchange - -[GH-445](https://github.com/apache/mina-sshd/issues/445) implements an extension to the SSH protocol introduced -in OpenSSH 9.6. This ["strict key exchange" extension](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL) -hardens the SSH key exchange against the ["Terrapin attack"](https://www.terrapin-attack.com/) -([CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795)). The extension is active if both parties -announce their support for it at the start of the initial key exchange. If only one party announces support, -it is not activated to ensure compatibility with SSH implementations that do not implement it. Apache MINA sshd -clients and servers always announce their support for strict key exchange. - ## Potential compatibility issues ## Major Code Re-factoring diff --git a/CHANGES.md b/docs/changes/2.12.0.md similarity index 73% copy from CHANGES.md copy to docs/changes/2.12.0.md index ba9b80de6..6d2c8325c 100644 --- a/CHANGES.md +++ b/docs/changes/2.12.0.md @@ -1,30 +1,4 @@ -# [Version 2.1.0 to 2.2.0](./docs/changes/2.2.0.md) - -# [Version 2.2.0 to 2.3.0](./docs/changes/2.3.0.md) - -# [Version 2.3.0 to 2.4.0](./docs/changes/2.4.0.md) - -# [Version 2.4.0 to 2.5.0](./docs/changes/2.5.0.md) - -# [Version 2.5.0 to 2.5.1](./docs/changes/2.5.1.md) - -# [Version 2.5.1 to 2.6.0](./docs/changes/2.6.0.md) - -# [Version 2.6.0 to 2.7.0](./docs/changes/2.7.0.md) - -# [Version 2.7.0 to 2.8.0](./docs/changes/2.8.0.md) - -# [Version 2.8.0 to 2.9.0](./docs/changes/2.9.0.md) - -# [Version 2.9.0 to 2.9.1](./docs/changes/2.9.1.md) - -# [Version 2.9.1 to 2.9.2](./docs/changes/2.9.2.md) - -# [Version 2.9.2 to 2.10.0](./docs/changes/2.10.0.md) - -# [Version 2.10.0 to 2.11.0](./docs/changes/2.11.0.md) - -# Planned for next version +# Introduced in 2.12.0 ## Bug Fixes