This is an automated email from the ASF dual-hosted git repository.

lgoldstein pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/mina-sshd.git

commit 38686ff3a5ffa5dab995df6e1573ce559783c5c7
Author: Lyor Goldstein <lgoldst...@apache.org>
AuthorDate: Sun Mar 1 21:17:22 2020 +0200

    [SSHD-972] Updated documentation to include link to newly supported key 
types
---
 CHANGES.md | 2 ++
 README.md  | 5 ++++-
 2 files changed, 6 insertions(+), 1 deletion(-)

diff --git a/CHANGES.md b/CHANGES.md
index f605b5e..56f0b06 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -26,3 +26,5 @@ where the former validate the messages and deal with the idle 
timeout, and the l
 * [SSHD-968](https://issues.apache.org/jira/browse/SSHD-968) - Interpret 
SSH_MSG_UNIMPLEMENTED response to a heartbeat request as a liveness indicator
 
 * [SSHD-970](https://issues.apache.org/jira/browse/SSHD-970) - `transferTo` 
function of `SftpRemotePathChannel` will loop if count parameter is greater 
than file size
+
+* [SSHD-972](https://issues.apache.org/jira/browse/SSHD-972) - Add support for 
peers using OpenSSH "security key" key types
\ No newline at end of file
diff --git a/README.md b/README.md
index adf7b22..11d6811 100644
--- a/README.md
+++ b/README.md
@@ -33,6 +33,8 @@ based applications requiring SSH support.
     initialization - see [section 
3.3](https://tools.ietf.org/html/rfc8332#section-3.3) and also the
     above mentioned hooks for [RFC 8308](https://tools.ietf.org/html/rfc8308).
 * [Key Exchange (KEX) Method Updates and Recommendations for Secure 
Shell](https://tools.ietf.org/html/draft-ietf-curdle-ssh-kex-sha2-03)
+* [OpenSSH support for U2F/FIDO security 
keys](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.u2f)
+    * **Note:** the server side supports these keys by default. The client 
side requires specific initialization
 * SFTP version 3-6 + extensions
     * `supported` - [DRAFT 05 - section 
4.4](http://tools.ietf.org/wg/secsh/draft-ietf-secsh-filexfer/draft-ietf-secsh-filexfer-05.tx)
     * `supported2` - [DRAFT 13 section 
5.4](https://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#page-10)
@@ -56,7 +58,8 @@ based applications requiring SSH support.
 , diffie-hellman-group15-sha512, diffie-hellman-group16-sha512, 
diffie-hellman-group17-sha512, diffie-hellman-group18-sha512
 , ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521
 * **Compressions**: none, zlib, z...@openssh.com
-* **Signatures/Keys**: ssh-dss, ssh-rsa, rsa-sha2-256, rsa-sha2-512, nistp256, 
nistp384, nistp521, ed25519 (requires `eddsa` optional module)
+* **Signatures/Keys**: ssh-dss, ssh-rsa, rsa-sha2-256, rsa-sha2-512, nistp256, 
nistp384, nistp521
+, ed25519 (requires `eddsa` optional module), 
sk-ecdsa-sha2-nistp...@openssh.com, sk-ssh-ed25...@openssh.com
 
 # [Release notes](./CHANGES.md)
 

Reply via email to