This is an automated email from the ASF dual-hosted git repository. lgoldstein pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/mina-sshd.git
commit 726629f31247220af48c412b2ad787aa1376709d Author: Lyor Goldstein <lgoldst...@apache.org> AuthorDate: Sun Oct 17 19:54:24 2021 +0300 [SSHD-1216] Updated README and CHANGES files --- CHANGES.md | 1 + README.md | 5 ++--- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/CHANGES.md b/CHANGES.md index 9c4838c..3e6508a 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -34,3 +34,4 @@ * [SSHD-1171](https://issues.apache.org/jira/browse/SSHD-1171) OpenSSHCertificatesTest: certificates expire in 2030 * [SSHD-1172](https://issues.apache.org/jira/browse/SSHD-1172) Expiration of OpenSshCertificates needs to compare timestamps as unsigned long * [SSHD-1202](https://issues.apache.org/jira/browse/SSHD-1202) Provide SftpErrorDataHandler callback support for SFTP client. +* [SSHD-1216](https://issues.apache.org/jira/browse/SSHD-1216) Implement RFC 8332 server-sig-algs on the server diff --git a/README.md b/README.md index d7b9b87..6c1ff82 100644 --- a/README.md +++ b/README.md @@ -28,9 +28,8 @@ based applications requiring SSH support. * [RFC 8160 - IUTF8 Terminal Mode in Secure Shell (SSH)](https://tools.ietf.org/html/rfc8160) * [RFC 8268 - More Modular Exponentiation (MODP) Diffie-Hellman (DH) Key Exchange (KEX) Groups for Secure Shell (SSH)](https://tools.ietf.org/html/rfc8268) * [RFC 8308 - Extension Negotiation in the Secure Shell (SSH) Protocol](https://tools.ietf.org/html/rfc8308) - * **Note:** - the code contains [**hooks**](./docs/event-listeners.md#kexextensionhandler) for implementing the RFC but - beyond allowing convenient support for the required protocol details, it does not implement any default logic that handles - the messages or manages the actual extension negotiation (though some **experimental** code is available). + * **Note:** - the code contains [**hooks**](./docs/event-listeners.md#kexextensionhandler) for implementing the RFC and + also provides default client and server implementation for `server-sig-algs` extensions. * [RFC 8332 - Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol](https://tools.ietf.org/html/rfc8332) * **Note:** - the server side supports these signatures by default. The client side requires specific initialization - see [section 3.3](https://tools.ietf.org/html/rfc8332#section-3.3) and also the