This is an automated email from the ASF dual-hosted git repository. lgoldstein pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/mina-sshd.git
commit 38686ff3a5ffa5dab995df6e1573ce559783c5c7 Author: Lyor Goldstein <lgoldst...@apache.org> AuthorDate: Sun Mar 1 21:17:22 2020 +0200 [SSHD-972] Updated documentation to include link to newly supported key types --- CHANGES.md | 2 ++ README.md | 5 ++++- 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/CHANGES.md b/CHANGES.md index f605b5e..56f0b06 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -26,3 +26,5 @@ where the former validate the messages and deal with the idle timeout, and the l * [SSHD-968](https://issues.apache.org/jira/browse/SSHD-968) - Interpret SSH_MSG_UNIMPLEMENTED response to a heartbeat request as a liveness indicator * [SSHD-970](https://issues.apache.org/jira/browse/SSHD-970) - `transferTo` function of `SftpRemotePathChannel` will loop if count parameter is greater than file size + +* [SSHD-972](https://issues.apache.org/jira/browse/SSHD-972) - Add support for peers using OpenSSH "security key" key types \ No newline at end of file diff --git a/README.md b/README.md index adf7b22..11d6811 100644 --- a/README.md +++ b/README.md @@ -33,6 +33,8 @@ based applications requiring SSH support. initialization - see [section 3.3](https://tools.ietf.org/html/rfc8332#section-3.3) and also the above mentioned hooks for [RFC 8308](https://tools.ietf.org/html/rfc8308). * [Key Exchange (KEX) Method Updates and Recommendations for Secure Shell](https://tools.ietf.org/html/draft-ietf-curdle-ssh-kex-sha2-03) +* [OpenSSH support for U2F/FIDO security keys](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.u2f) + * **Note:** the server side supports these keys by default. The client side requires specific initialization * SFTP version 3-6 + extensions * `supported` - [DRAFT 05 - section 4.4](http://tools.ietf.org/wg/secsh/draft-ietf-secsh-filexfer/draft-ietf-secsh-filexfer-05.tx) * `supported2` - [DRAFT 13 section 5.4](https://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#page-10) @@ -56,7 +58,8 @@ based applications requiring SSH support. , diffie-hellman-group15-sha512, diffie-hellman-group16-sha512, diffie-hellman-group17-sha512, diffie-hellman-group18-sha512 , ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521 * **Compressions**: none, zlib, z...@openssh.com -* **Signatures/Keys**: ssh-dss, ssh-rsa, rsa-sha2-256, rsa-sha2-512, nistp256, nistp384, nistp521, ed25519 (requires `eddsa` optional module) +* **Signatures/Keys**: ssh-dss, ssh-rsa, rsa-sha2-256, rsa-sha2-512, nistp256, nistp384, nistp521 +, ed25519 (requires `eddsa` optional module), sk-ecdsa-sha2-nistp...@openssh.com, sk-ssh-ed25...@openssh.com # [Release notes](./CHANGES.md)