This is an automated email from the ASF dual-hosted git repository. gnodet pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/mina-sshd.git
The following commit(s) were added to refs/heads/master by this push: new 6a607e3a8 Prepare sshd 2.9.0 release 6a607e3a8 is described below commit 6a607e3a89de95651b8b7bee97e52d615e668edd Author: Guillaume Nodet <gno...@gmail.com> AuthorDate: Mon Jul 11 15:09:27 2022 +0200 Prepare sshd 2.9.0 release --- CHANGES.md | 96 ------------------------------------- CHANGES.md => docs/changes/2.9.0.md | 43 +++++++---------- 2 files changed, 16 insertions(+), 123 deletions(-) diff --git a/CHANGES.md b/CHANGES.md index 241256ed9..2d04d0399 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -15,99 +15,3 @@ # [Version 2.7.0 to 2.8.0](./docs/changes/2.8.0.md) # Planned for next version - -## Major code re-factoring - -### Asynchronous API for making SSH global requests - -A new API in `Session` is introduced for making SSH global requests and handling the reply asynchronously. - -```java -public GlobalRequestFuture request(Buffer buffer, String request, ReplyHandler replyHandler) throws IOException; -``` - -The `Buffer` is supposed to contain the full request, including the `request` name (for -instance, "tcpip-forward"), the `want-reply` flag, and any additional data needed. There -are several possible ways to use it. - -* `want-reply=true` and `replyHandler != null`: the methods sends the request and returns a - future that is fulfilled when the request was actually sent. The future is fulfilled with - an exception if sending the request failed, or with `null` if it was sent successfully. - Once the reply is received, the handler is invoked with the SSH command (`SSH_MSG_REQUEST_SUCCESS`, - `SSH_MSG_REQUEST_FAILURE`, or `SSH_MSG_UNIMPLEMENTED`) and the buffer received. -* `want-reply=true` and `replyHandler == null`: the method sends the request and returns a - future that is fulfilled with an exception if sending it failed, or if a `SSH_MSG_REQUEST_FAILURE` - or `SSH_MSG_UNIMPLEMENTED` reply was received. Otherwise the future is fulfilled with the received - Buffer once the reply has been received. -* `want-reply=false`: the method sends the request and returns a future that is fulfilled when - the request was actually sent. The future is fulfilled with an exception if sending the request - failed, or with an empty buffer if it was sent successfully. If `replyHandler != null`, it is - invoked with an empty buffer once the request was sent. - -If the method throws an `IOException`, the request was not sent, and the handler will not be -invoked. - -## Potential compatibility issues - -Changes that may affect existing code - -### A **new** SFTP configuration property has been introduced that limits the maximum amount of data that can be sent in a single *SSH_FXP_WRITE* packet - default=256KB - -```java - /** - * Force the use of a max. packet length for {@link AbstractSftpSubsystemHelper#doWrite(Buffer, int)} protection - * against malicious packets - */ - public static final Property<Integer> MAX_WRITE_DATA_PACKET_LENGTH - = Property.integer("sftp-max-writedata-packet-length", 256 * 1024); -``` - -This might cause SFTP write failures for clients that might have sent larger buffers and they have been accepted so far. If this happens, simply increase -this value (though the choice of 256KB should be compatible with the vast majority of clients). - -### SSH channel identifiers have been changed to use *long* instead of *int* in order to align them with the standard that required them to be *UINT32* values. - -The relevant API(s) have been modified accordingly - which may cause a few incompatibility issues with code that extends/implements existing `Channel` classes -and interfaces. In this context, the *Channel* interface now extends *ChannelIdentifier* where *getId()* has been renamed to *getChannelId()* - -### *long* used instead of *int* in most encoded/decoded packets that are specified as being *UINT32* - -There are several exceptions to this rule: - -* The SFTP packet *id* field - an "opaque" value anyway, not used for allocation or indexing anyway - -* Various flags and mask field - there is no reason to encapsulate them into a *long* value since they do not represent a cardinal number of 32 bits - -* Various status code fields - ditto. - -* Cases where the value serves as argument for allocation of other data structures based on its value - e.g., arrays, lists. This was -done for *convenience* reasons since Java does not support unsigned array/list sizes. In such cases, special validation code was applied -to make sure the requested value does not exceed `Integer#MAX_VALUE` (sometimes even less) in order to protect the code from malicious -or malformed packets. It is important to bear in mind that in the vast majority of the cases we do not want to be able to allocate arrays -or lists having billions of elements as it would almost definitely cause out-of-memory issues. - -## User HOME directory resolution and usage have been moved to *PathUtils* - -Was originally in *HostConfigEntry*. - -## Minor code helpers - -## Behavioral changes and enhancements - -* [SSHD-966](https://issues.apache.org/jira/browse/SSHD-966) Deadlock on disconnection at the end of key-exchange -* [SSHD-1055](https://issues.apache.org/jira/browse/SSHD-1055) Shut down output on port-forwarded socket on EOF in tunnel -* [SSHD-1231](https://issues.apache.org/jira/browse/SSHD-1231) Public key authentication: wrong signature algorithm used (ed25519 key with ssh-rsa signature) -* [SSHD-1233](https://issues.apache.org/jira/browse/SSHD-1233) Added support for "lim...@openssh.com" SFTP extension -* [SSHD-1244](https://issues.apache.org/jira/browse/SSHD-1244) Fixed channel window adjustment handling of large UINT32 values -* [SSHD-1244](https://issues.apache.org/jira/browse/SSHD-1244) Re-defined channel identifiers as `long` rather than `int` to align with protocol UINT32 definition -* [SSHD-1246](https://issues.apache.org/jira/browse/SSHD-1246) Added SshKeyDumpMain utility -* [SSHD-1247](https://issues.apache.org/jira/browse/SSHD-1247) Added support for Argon2id encrypted PUTTY keys -* [SSHD-1254](https://issues.apache.org/jira/browse/SSHD-1254) Support host-based pubkey authentication in the client ("publickey-hostbo...@openssh.com" KEX extension) -* [SSHD-1257](https://issues.apache.org/jira/browse/SSHD-1257) ChannelSession: don't flush out stream if already closed -* [SSHD-1262](https://issues.apache.org/jira/browse/SSHD-1262) TCP/IP port forwarding: don't buffer, and don't read from port before channel is open -* [SSHD-1264](https://issues.apache.org/jira/browse/SSHD-1264) Create KEX negotiation proposal only once per session, not on every re-KEX -* [SSHD-1266](https://issues.apache.org/jira/browse/SSHD-1266) Fix encoding/decoding critical options in OpenSSH certificates -* [SSHD-1269](https://issues.apache.org/jira/browse/SSHD-1269) Fix TCP/IP remote port forwarding with wildcard addresses -* [SSHD-1272](https://issues.apache.org/jira/browse/SSHD-1272) Use correct signature for RSA keys from SSH agent, and by default ignore keys for which there is no signature algorithm -* [SSHD-1273](https://issues.apache.org/jira/browse/SSHD-1273) Add support to use env vars together with subsystem channels -* [SSHD-1276](https://issues.apache.org/jira/browse/SSHD-1276) Added capability to redirect command/shell STDERR stream to STDOUT one \ No newline at end of file diff --git a/CHANGES.md b/docs/changes/2.9.0.md similarity index 82% copy from CHANGES.md copy to docs/changes/2.9.0.md index 241256ed9..2c70ae7c5 100644 --- a/CHANGES.md +++ b/docs/changes/2.9.0.md @@ -1,20 +1,4 @@ -# [Version 2.1.0 to 2.2.0](./docs/changes/2.2.0.md) - -# [Version 2.2.0 to 2.3.0](./docs/changes/2.3.0.md) - -# [Version 2.3.0 to 2.4.0](./docs/changes/2.4.0.md) - -# [Version 2.4.0 to 2.5.0](./docs/changes/2.5.0.md) - -# [Version 2.5.0 to 2.5.1](./docs/changes/2.5.1.md) - -# [Version 2.5.1 to 2.6.0](./docs/changes/2.6.0.md) - -# [Version 2.6.0 to 2.7.0](./docs/changes/2.7.0.md) - -# [Version 2.7.0 to 2.8.0](./docs/changes/2.8.0.md) - -# Planned for next version +# Introduced in 2.9.0 ## Major code re-factoring @@ -30,23 +14,23 @@ The `Buffer` is supposed to contain the full request, including the `request` na instance, "tcpip-forward"), the `want-reply` flag, and any additional data needed. There are several possible ways to use it. -* `want-reply=true` and `replyHandler != null`: the methods sends the request and returns a +* `want-reply == true` and `replyHandler != null`: the methods sends the request and returns a future that is fulfilled when the request was actually sent. The future is fulfilled with an exception if sending the request failed, or with `null` if it was sent successfully. Once the reply is received, the handler is invoked with the SSH command (`SSH_MSG_REQUEST_SUCCESS`, `SSH_MSG_REQUEST_FAILURE`, or `SSH_MSG_UNIMPLEMENTED`) and the buffer received. -* `want-reply=true` and `replyHandler == null`: the method sends the request and returns a +* `want-reply == true` and `replyHandler == null`: the method sends the request and returns a future that is fulfilled with an exception if sending it failed, or if a `SSH_MSG_REQUEST_FAILURE` or `SSH_MSG_UNIMPLEMENTED` reply was received. Otherwise the future is fulfilled with the received Buffer once the reply has been received. -* `want-reply=false`: the method sends the request and returns a future that is fulfilled when +* `want-reply == false`: the method sends the request and returns a future that is fulfilled when the request was actually sent. The future is fulfilled with an exception if sending the request failed, or with an empty buffer if it was sent successfully. If `replyHandler != null`, it is invoked with an empty buffer once the request was sent. - + If the method throws an `IOException`, the request was not sent, and the handler will not be invoked. - + ## Potential compatibility issues Changes that may affect existing code @@ -81,10 +65,10 @@ There are several exceptions to this rule: * Various status code fields - ditto. * Cases where the value serves as argument for allocation of other data structures based on its value - e.g., arrays, lists. This was -done for *convenience* reasons since Java does not support unsigned array/list sizes. In such cases, special validation code was applied -to make sure the requested value does not exceed `Integer#MAX_VALUE` (sometimes even less) in order to protect the code from malicious -or malformed packets. It is important to bear in mind that in the vast majority of the cases we do not want to be able to allocate arrays -or lists having billions of elements as it would almost definitely cause out-of-memory issues. + done for *convenience* reasons since Java does not support unsigned array/list sizes. In such cases, special validation code was applied + to make sure the requested value does not exceed `Integer#MAX_VALUE` (sometimes even less) in order to protect the code from malicious + or malformed packets. It is important to bear in mind that in the vast majority of the cases we do not want to be able to allocate arrays + or lists having billions of elements as it would almost definitely cause out-of-memory issues. ## User HOME directory resolution and usage have been moved to *PathUtils* @@ -103,11 +87,16 @@ Was originally in *HostConfigEntry*. * [SSHD-1246](https://issues.apache.org/jira/browse/SSHD-1246) Added SshKeyDumpMain utility * [SSHD-1247](https://issues.apache.org/jira/browse/SSHD-1247) Added support for Argon2id encrypted PUTTY keys * [SSHD-1254](https://issues.apache.org/jira/browse/SSHD-1254) Support host-based pubkey authentication in the client ("publickey-hostbo...@openssh.com" KEX extension) +* [SSHD-1253](https://issues.apache.org/jira/browse/SSHD-1253) Class loader fails to load org.apache.sshd.common.cipher.BaseGCMCipher +* [SSHD-1256](https://issues.apache.org/jira/browse/SSHD-1256) PortForwardingTest.testRemoteForwardingSecondTimeInSameSession always fails in Github CI * [SSHD-1257](https://issues.apache.org/jira/browse/SSHD-1257) ChannelSession: don't flush out stream if already closed +* [SSHD-1261](https://issues.apache.org/jira/browse/SSHD-1261) - Sometimes async write listener is not called * [SSHD-1262](https://issues.apache.org/jira/browse/SSHD-1262) TCP/IP port forwarding: don't buffer, and don't read from port before channel is open * [SSHD-1264](https://issues.apache.org/jira/browse/SSHD-1264) Create KEX negotiation proposal only once per session, not on every re-KEX * [SSHD-1266](https://issues.apache.org/jira/browse/SSHD-1266) Fix encoding/decoding critical options in OpenSSH certificates * [SSHD-1269](https://issues.apache.org/jira/browse/SSHD-1269) Fix TCP/IP remote port forwarding with wildcard addresses * [SSHD-1272](https://issues.apache.org/jira/browse/SSHD-1272) Use correct signature for RSA keys from SSH agent, and by default ignore keys for which there is no signature algorithm * [SSHD-1273](https://issues.apache.org/jira/browse/SSHD-1273) Add support to use env vars together with subsystem channels -* [SSHD-1276](https://issues.apache.org/jira/browse/SSHD-1276) Added capability to redirect command/shell STDERR stream to STDOUT one \ No newline at end of file +* [SSHD-1276](https://issues.apache.org/jira/browse/SSHD-1276) Added capability to redirect command/shell STDERR stream to STDOUT one + +