This is an automated email from the ASF dual-hosted git repository.

lgoldstein pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/mina-sshd.git


The following commit(s) were added to refs/heads/master by this push:
     new fcd4bfa37 Moved implemented standards documentation to separate file
fcd4bfa37 is described below

commit fcd4bfa37aef397d484890bc567469edfcdd1961
Author: Lyor Goldstein <lgoldst...@apache.org>
AuthorDate: Sat Apr 1 10:04:24 2023 +0300

    Moved implemented standards documentation to separate file
---
 CHANGES.md                     |  10 ++--
 README.md                      | 120 +-------------------------------------
 README.md => docs/standards.md | 128 ++---------------------------------------
 3 files changed, 12 insertions(+), 246 deletions(-)

diff --git a/CHANGES.md b/CHANGES.md
index f24e808fa..ea2d0dc39 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -134,12 +134,12 @@ appropriate for the precise use case.
 ## Behavioral changes and enhancements
 
 * Support for reading SSH keys from PEM files containing encrypted private keys
-  (RFC 5958, EncryptedPrivateKeyInfo) has been added. Such PEM files start with
-  "-----BEGIN ENCRYPTED PRIVATE KEY-----". Reading and decrypting keys from 
such
-  files requires Bouncy Castle to be present.
-* Support reading SSH keys from PEM files starting with "-----BEGIN ED25519 
PRIVATE KEY-----".
+  [RFC 5958, EncryptedPrivateKeyInfo](https://www.rfc-editor.org/rfc/rfc5958) 
has been added.
+  Such PEM files start with `-----BEGIN ENCRYPTED PRIVATE KEY-----`. Reading 
and decrypting keys
+  from such files requires Bouncy Castle to be present.
+* Support reading SSH keys from PEM files starting with `-----BEGIN ED25519 
PRIVATE KEY-----`.
   Some OpenSSL versions could produce such files when the user specified
-  "traditional" PEM output. (Encrypted keys written using RFC 1421 encryption.)
+  "traditional" PEM output. (Encrypted keys written using [RFC 
1421](https://www.rfc-editor.org/rfc/rfc1421) encryption.)
   Modern OpenSSL refuses to create such PEM files; it always uses PKCS#8
   (RFC 5958) style PEM files for EdDSA keys.
 * `CoreModuleProperties.PASSWORD_PROMPTS` is now also used for password
diff --git a/README.md b/README.md
index 21ef2aefa..a53185e66 100644
--- a/README.md
+++ b/README.md
@@ -11,125 +11,7 @@ The library can leverage several I/O back-ends:
 * [Apache MINA](https://mina.apache.org), a scalable and high performance 
asynchronous I/O library, can be used instead, or
 * the [Netty](https://netty.io) asynchronous event-driven network framework is 
also supported.
 
-# Supported standards
-
-## Reference implementation documentation
-* [RFC 4251 - The Secure Shell (SSH) Protocol 
Architecture](https://tools.ietf.org/html/rfc4251)
-* [RFC 4252 - The Secure Shell (SSH) Authentication 
Protocol](https://tools.ietf.org/html/rfc4252)
-* [RFC 4253 - The Secure Shell (SSH) Transport Layer 
Protocol](https://tools.ietf.org/html/rfc4253)
-* [RFC 4254 - The Secure Shell (SSH) Connection 
Protocol](https://tools.ietf.org/html/rfc4254)
-* [RFC 4256 - Generic Message Exchange Authentication for the Secure Shell 
Protocol (SSH)](https://tools.ietf.org/html/rfc4256)
-* [RFC 4335 - The Secure Shell (SSH) Session Channel Break 
Extension](https://tools.ietf.org/html/rfc4335)
-* [RFC 4344 - The Secure Shell (SSH) Transport Layer Encryption 
Modes](https://tools.ietf.org/html/rfc4344)
-* [RFC 4345 - Improved Arcfour Modes for the Secure Shell (SSH) Transport 
Layer Protocol](https://tools.ietf.org/html/rfc4345)
-* [RFC 4419 - Diffie-Hellman Group Exchange for the Secure Shell (SSH) 
Transport Layer Protocol](https://tools.ietf.org/html/rfc4419)
-* [RFC 4716 - The Secure Shell (SSH) Public Key File 
Format](https://tools.ietf.org/html/rfc4716)
-* [RFC 5208 - Public-Key Cryptography Standards (PKCS) #8 - version 
1.2](https://tools.ietf.org/html/rfc5208)
-* [RFC 5480 - Elliptic Curve Cryptography Subject Public Key 
Information](https://tools.ietf.org/html/rfc5480)
-* [RFC 5647 - AES Galois Counter Mode for the Secure Shell Transport Layer 
Protocol](https://tools.ietf.org/html/rfc5647)
-* [RFC 5656 - Elliptic Curve Algorithm Integration in the Secure Shell 
Transport Layer](https://tools.ietf.org/html/rfc5656)
-* [RFC 5915 - Elliptic Curve Private Key 
Structure](https://tools.ietf.org/html/rfc5915)
-* [RFC 6668 - SHA-2 Data Integrity Verification for the Secure Shell (SSH) 
Transport Layer Protocol](https://tools.ietf.org/html/rfc6668)
-* [RFC 8160 - IUTF8 Terminal Mode in Secure Shell 
(SSH)](https://tools.ietf.org/html/rfc8160)
-* [RFC 8268 - More Modular Exponentiation (MODP) Diffie-Hellman (DH) Key 
Exchange (KEX) Groups for Secure Shell 
(SSH)](https://tools.ietf.org/html/rfc8268)
-* [RFC 8308 - Extension Negotiation in the Secure Shell (SSH) 
Protocol](https://tools.ietf.org/html/rfc8308)
-    * **Note:** - the code contains 
[**hooks**](./docs/event-listeners.md#kexextensionhandler) for implementing the 
RFC and
-    also provides default client and server implementation for 
`server-sig-algs` extensions.
-* [RFC 8332 - Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell 
(SSH) Protocol](https://tools.ietf.org/html/rfc8332)
-    * **Note:** - the server side supports these signatures by default. The 
client side requires specific
-    initialization - see [section 
3.3](https://tools.ietf.org/html/rfc8332#section-3.3) and also the
-    above mentioned hooks for [RFC 8308](https://tools.ietf.org/html/rfc8308).
-* [RFC 8731 - Secure Shell (SSH) Key Exchange Method Using Curve25519 and 
Curve448](https://tools.ietf.org/html/rfc8731)
-* [Key Exchange (KEX) Method Updates and Recommendations for Secure 
Shell](https://tools.ietf.org/html/draft-ietf-curdle-ssh-kex-sha2-03)
-* [OpenSSH support for U2F/FIDO security 
keys](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.u2f)
-    * **Note:** the server side supports these keys by default. The client 
side requires specific initialization
-* [OpenSSH public-key certificate authentication system for use by 
SSH](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.certkeys)
-* [SSH proxy jumps](./docs/internals.md#ssh-jumps)
-* SFTP version 3-6 + extensions
-    * `supported` - [DRAFT 05 - section 
4.4](https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-05#section-4.4)
-    * `supported2` - [DRAFT 13 section 
5.4](https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-13#section-5.4)
-    * `versions` - [DRAFT 09 Section 
4.6](https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-09#section-4.6)
-    * `vendor-id` - [DRAFT 09 - section 
4.4](https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-09#section-4.4)
-    * `acl-supported` - [DRAFT 11 - section 
5.4](https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-11#section-5.4)
-    * `newline` - [DRAFT 09 Section 
4.3](https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-09#section-4.3)
-    * `md5-hash`, `md5-hash-handle` - [DRAFT 09 - section 
9.1.1](https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-09#section-9.1.1)
-    * `check-file-handle`, `check-file-name` - [DRAFT 09 - section 
9.1.2](https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-09#section-9.1.2)
-    * `copy-file`, `copy-data` - [DRAFT 00 - sections 6, 
7](https://tools.ietf.org/id/draft-ietf-secsh-filexfer-extensions-00.txt)
-    * `space-available` - [DRAFT 09 - section 
9.2](https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-09#section-9.2)
-    * `filename-charset`, `filename-translation-control` - [DRAFT 13 - section 
6](https://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-6) - only 
client side
-    * Several [OpenSSH SFTP 
extensions](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL)
-* [Endless tarpit](https://nullprogram.com/blog/2019/03/22/) - see 
[HOWTO(s)](./docs/howto.md) section.
-
-## Implemented/available support
-
-### Authentication methods
-
-* hostbased, publickey, [OpenSSH host-based 
public-key](https://github.com/openssh/openssh-portable/blob/1781f507c11/PROTOCOL#L349),
 keyboard-interactive, password
-
-### Ciphers
-
-* aes128cbc, aes128ctr, aes192cbc, aes192ctr, aes256cbc, aes256ctr, 
arcfour128, arcfour256, blowfish-cbc,
-aes128-...@openssh.com, aes256-...@openssh.com, chacha20-poly1...@openssh.com, 
3des-cbc
-
-### Digests
-
-* md5, sha1, sha224, sha256, sha384, sha512
-
-### Macs
-
-* hmacmd5, hmacmd596, hmacsha1, hmacsha196, hmacsha256, hmacsha512, 
hmac-sha2-256-...@openssh.com
-, hmac-sha2-512-...@openssh.com, hmac-sha1-...@openssh.com
-
-### Key exchange
-
-* diffie-hellman-group1-sha1, diffie-hellman-group-exchange-sha256, 
diffie-hellman-group14-sha1, diffie-hellman-group14-sha256
-, diffie-hellman-group15-sha512, diffie-hellman-group16-sha512, 
diffie-hellman-group17-sha512, diffie-hellman-group18-sha512
-, ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, 
curve25519-sha256, curve25519-sha...@libssh.org, curve448-sha512
-    * On Java versions before Java 11, [Bouncy 
Castle](./docs/dependencies.md#bouncy-castle) is required for 
curve25519-sha256, curve25519-sha...@libssh.org, or curve448-sha512.
-
-### Compressions
-
-* none, zlib, z...@openssh.com
-
-### Signatures/Keys
-
-* ssh-dss, ssh-rsa, rsa-sha2-256, rsa-sha2-512, nistp256, nistp384, nistp521
-, ssh-ed25519 (requires `eddsa` optional module), 
sk-ecdsa-sha2-nistp...@openssh.com, sk-ssh-ed25...@openssh.com
-, ssh-rsa-cert-...@openssh.com, ssh-dss-cert-...@openssh.com, 
ssh-ed25519-cert-...@openssh.com
-, ecdsa-sha2-nistp256-cert-...@openssh.com, 
ecdsa-sha2-nistp384-cert-...@openssh.com, 
ecdsa-sha2-nistp521-cert-...@openssh.com
-
-**Note:** The above list contains all the supported security settings in the 
code. However, in accordance with the latest recommendations
-the default client/server setup includes only the security settings that are 
currently considered safe to use. Users who wish to include
-the unsafe settings must do so **explicitly**. The following settings have 
been deprecated and are no longer included in the default setup:
-
-* [RFC 8758 - Deprecating RC4 in Secure Shell 
(SSH)](https://tools.ietf.org/html/rfc8758)
-* [RFC 8429 - Deprecate Triple-DES (3DES) and RC4 in 
Kerberos](https://tools.ietf.org/html/rfc8429)
-    * While it refers to Kerberos, it mentions weaknesses in DES as well.
-* [OpenSSH release notes](https://www.openssh.com/releasenotes.html) - usually 
a good indicator of de-facto practices
-* SHA-1 based key exchanges and signatures
-* MD5-based and truncated HMAC algorithms
-* [RFC 8270 - Increase the Secure Shell Minimum Recommended Diffie-Hellman 
Modulus Size to 2048 Bits](https://tools.ietf.org/html/rfc8270)
-    **Note:** it still possible to use 1024 by initializing the value 
*programmatically* or via system property -
-    see [Security providers 
setup](./docs/security-providers.md#diff-hellman-group-exchange-configuration).
-    The code still contains moduli for 1024 and will use them if user 
**explicitly** lowers the default minimum
-    to it.
-
-**Caveat:**: According to [RFC 8332 - section 
3.31](https://tools.ietf.org/html/rfc8332#section-3.3)
->>
->> Implementation experience has shown that there are servers that apply 
authentication penalties to clients
->> attempting public key algorithms that the SSH server does not support.
->>
->> When authenticating with an RSA key against a server that does not 
implement the "server-sig-algs" extension,
->> clients MAY default to an "ssh-rsa" signature to avoid authentication 
penalties. When the new rsa-sha2-*
->> algorithms have been sufficiently widely adopted to warrant disabling 
"ssh-rsa", clients MAY default to one of
->> the new algorithms.
-
-This means that users that encounter this (and related) problems must modify 
the supported security settings
-**explicitly** in order to avoid the issue.
-
-**Special notice:** `ssh-rsa` was left in as part of the default setup since 
there are still a lot of systems / users
-using it. However, in future version it will be removed from the default. We 
therefore strongly encourage users to migrate
-to other keys (e.g. ECDSA, ED25519) as soon as possible.
+# [Supported standards](./docs/standards.md)
 
 # [Release notes](./CHANGES.md)
 
diff --git a/README.md b/docs/standards.md
similarity index 64%
copy from README.md
copy to docs/standards.md
index 21ef2aefa..cc0cfc144 100644
--- a/README.md
+++ b/docs/standards.md
@@ -1,16 +1,3 @@
-![Apache MINA SSHD](https://mina.apache.org/assets/img/header-sshd.png "Apache 
MINA SSHD")
-# Apache MINA SSHD
-
-Apache MINA SSHD is a 100% pure java library to support the SSH protocols on 
both the client and server side. It does not
-aim at being a replacement for the SSH client or SSH server from Unix 
operating systems, but rather provides support for Java
-based applications requiring SSH support.
-
-The library can leverage several I/O back-ends:
-
-* The default transport is built-in and uses Java's 
`AsynchronousSocketChannel`s.
-* [Apache MINA](https://mina.apache.org), a scalable and high performance 
asynchronous I/O library, can be used instead, or
-* the [Netty](https://netty.io) asynchronous event-driven network framework is 
also supported.
-
 # Supported standards
 
 ## Reference implementation documentation
@@ -29,11 +16,12 @@ The library can leverage several I/O back-ends:
 * [RFC 5647 - AES Galois Counter Mode for the Secure Shell Transport Layer 
Protocol](https://tools.ietf.org/html/rfc5647)
 * [RFC 5656 - Elliptic Curve Algorithm Integration in the Secure Shell 
Transport Layer](https://tools.ietf.org/html/rfc5656)
 * [RFC 5915 - Elliptic Curve Private Key 
Structure](https://tools.ietf.org/html/rfc5915)
+* [RFC 5958 - EncryptedPrivateKeyInfo](https://www.rfc-editor.org/rfc/rfc5958)
 * [RFC 6668 - SHA-2 Data Integrity Verification for the Secure Shell (SSH) 
Transport Layer Protocol](https://tools.ietf.org/html/rfc6668)
 * [RFC 8160 - IUTF8 Terminal Mode in Secure Shell 
(SSH)](https://tools.ietf.org/html/rfc8160)
 * [RFC 8268 - More Modular Exponentiation (MODP) Diffie-Hellman (DH) Key 
Exchange (KEX) Groups for Secure Shell 
(SSH)](https://tools.ietf.org/html/rfc8268)
 * [RFC 8308 - Extension Negotiation in the Secure Shell (SSH) 
Protocol](https://tools.ietf.org/html/rfc8308)
-    * **Note:** - the code contains 
[**hooks**](./docs/event-listeners.md#kexextensionhandler) for implementing the 
RFC and
+    * **Note:** - the code contains 
[**hooks**](./event-listeners.md#kexextensionhandler) for implementing the RFC 
and
     also provides default client and server implementation for 
`server-sig-algs` extensions.
 * [RFC 8332 - Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell 
(SSH) Protocol](https://tools.ietf.org/html/rfc8332)
     * **Note:** - the server side supports these signatures by default. The 
client side requires specific
@@ -44,7 +32,7 @@ The library can leverage several I/O back-ends:
 * [OpenSSH support for U2F/FIDO security 
keys](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.u2f)
     * **Note:** the server side supports these keys by default. The client 
side requires specific initialization
 * [OpenSSH public-key certificate authentication system for use by 
SSH](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.certkeys)
-* [SSH proxy jumps](./docs/internals.md#ssh-jumps)
+* [SSH proxy jumps](./internals.md#ssh-jumps)
 * SFTP version 3-6 + extensions
     * `supported` - [DRAFT 05 - section 
4.4](https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-05#section-4.4)
     * `supported2` - [DRAFT 13 section 
5.4](https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-13#section-5.4)
@@ -58,7 +46,7 @@ The library can leverage several I/O back-ends:
     * `space-available` - [DRAFT 09 - section 
9.2](https://datatracker.ietf.org/doc/html/draft-ietf-secsh-filexfer-09#section-9.2)
     * `filename-charset`, `filename-translation-control` - [DRAFT 13 - section 
6](https://tools.ietf.org/html/draft-ietf-secsh-filexfer-13#section-6) - only 
client side
     * Several [OpenSSH SFTP 
extensions](https://github.com/openssh/openssh-portable/blob/master/PROTOCOL)
-* [Endless tarpit](https://nullprogram.com/blog/2019/03/22/) - see 
[HOWTO(s)](./docs/howto.md) section.
+* [Endless tarpit](https://nullprogram.com/blog/2019/03/22/) - see 
[HOWTO(s)](./howto.md) section.
 
 ## Implemented/available support
 
@@ -85,7 +73,7 @@ aes128-...@openssh.com, aes256-...@openssh.com, 
chacha20-poly1...@openssh.com, 3
 * diffie-hellman-group1-sha1, diffie-hellman-group-exchange-sha256, 
diffie-hellman-group14-sha1, diffie-hellman-group14-sha256
 , diffie-hellman-group15-sha512, diffie-hellman-group16-sha512, 
diffie-hellman-group17-sha512, diffie-hellman-group18-sha512
 , ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521, 
curve25519-sha256, curve25519-sha...@libssh.org, curve448-sha512
-    * On Java versions before Java 11, [Bouncy 
Castle](./docs/dependencies.md#bouncy-castle) is required for 
curve25519-sha256, curve25519-sha...@libssh.org, or curve448-sha512.
+    * On Java versions before Java 11, [Bouncy 
Castle](./dependencies.md#bouncy-castle) is required for curve25519-sha256, 
curve25519-sha...@libssh.org, or curve448-sha512.
 
 ### Compressions
 
@@ -110,7 +98,7 @@ the unsafe settings must do so **explicitly**. The following 
settings have been
 * MD5-based and truncated HMAC algorithms
 * [RFC 8270 - Increase the Secure Shell Minimum Recommended Diffie-Hellman 
Modulus Size to 2048 Bits](https://tools.ietf.org/html/rfc8270)
     **Note:** it still possible to use 1024 by initializing the value 
*programmatically* or via system property -
-    see [Security providers 
setup](./docs/security-providers.md#diff-hellman-group-exchange-configuration).
+    see [Security providers 
setup](./security-providers.md#diff-hellman-group-exchange-configuration).
     The code still contains moduli for 1024 and will use them if user 
**explicitly** lowers the default minimum
     to it.
 
@@ -130,107 +118,3 @@ This means that users that encounter this (and related) 
problems must modify the
 **Special notice:** `ssh-rsa` was left in as part of the default setup since 
there are still a lot of systems / users
 using it. However, in future version it will be removed from the default. We 
therefore strongly encourage users to migrate
 to other keys (e.g. ECDSA, ED25519) as soon as possible.
-
-# [Release notes](./CHANGES.md)
-
-# Issue reporting
-
-Bug reports and improvement or feature requests can be filed at the [GitHub 
issue tracker](https://github.com/apache/mina-sshd/issues)
-or at the [Apache issue tracker](https://issues.apache.org/jira/projects/SSHD).
-
-Sensitive issues such as security vulnerabilities must be reported through 
[private channels](./SECURITY.md), not via either issue tracker.
-
-# Core requirements
-
-* Java 8+ (as of version 1.3)
-
-* [Slf4j](https://www.slf4j.org/)
-
-The code only requires the core abstract 
[slf4j-api](https://mvnrepository.com/artifact/org.slf4j/slf4j-api) module. The 
actual
-implementation of the logging API can be selected from the many existing 
adaptors.
-
-# Basic artifacts structure
-
-* *sshd-common* - contains basic classes used throughout the project as well 
as code that does not require client or server network support.
-
-* *sshd-core* - contains the basic SSH client/server code implementing the 
connection, transport, channels, forwarding, etc..
-    * *sshd-mina*, *sshd-netty* - replacements for the default NIO2 connector 
used to establish and manage network connections using
-[MINA](https://mina.apache.org/mina-project/index.html) and/or 
[Netty](https://netty.io/) libraries respectively.
-
-* *sshd-sftp* - contains the server side SFTP subsystem and the SFTP client 
code.
-    * *sshd-spring-sftp* - contains a [Spring 
Integration](https://spring.io/projects/spring-integration) compatible SFTP 
adapter
-
-* *sshd-scp* - contains the server side SCP command handler and the SCP client 
code.
-
-* *sshd-ldap* - contains server-side password and public key authenticators 
that use an LDAP server.
-
-* *sshd-git* - contains replacements for [JGit](https://www.eclipse.org/jgit/) 
SSH session factory.
-
-* *sshd-osgi* - contains an artifact that combines *sshd-common* and 
*sshd-core* so it can be deployed in OSGi environments.
-
-* *sshd-putty* - contains code that can parse [PUTTY](https://www.putty.org/) 
key files.
-
-* *sshd-openpgp* - contains code that can parse 
[OpenPGP](https://www.openpgp.org/) key files (with some limitations - see 
relevant section)
-
-* *sshd-cli* - contains simple templates for command-line client/server - used 
to provide look-and-feel similar to the Linux *ssh/sshd* commands.
-
-* *sshd-contrib* - **experimental** code that is currently under review and 
may find its way into one of the other artifacts
-(or become an entirely new artifact - e.g., *sshd-putty* evolved this way).
-
-# [Optional dependencies](./docs/dependencies.md)
-
-# Quick reference
-
-## Building the code
-
-Including tests
-
-```
-mvn clean install
-```
-
-Without tests
-
-```
-mvn -Pquick clean install
-```
-
-## [Set up an SSH client in 5 minutes](./docs/client-setup.md)
-
-## [Embedding an SSHD server instance in 5 minutes](./docs/server-setup.md)
-
-# SSH functionality breakdown
-
-## [Security providers setup](./docs/security-providers.md)
-
-## [Commands infrastructure](./docs/commands.md)
-
-## [SCP](./docs/scp.md)
-
-## [SFTP](./docs/sftp.md)
-
-## [Port forwarding](./docs/port-forwarding.md)
-
-## [Internal support classes](./docs/internals.md)
-
-## [Event listeners and handlers](./docs/event-listeners.md)
-
-## [Command line clients](./docs/cli.md)
-
-## [GIT support](./docs/git.md)
-
-## [Configuration/data files parsing support](./docs/files-parsing.md)
-
-## [Extension modules](./docs/extensions.md)
-
-# [HOWTO(s)](./docs/howto.md)
-
-# Technical Documentation
-
-## [SSH Key Exchange](./docs/technical/kex.md)
-
-## [TCP/IP Port Forwarding](./docs/technical/tcpip-forwarding.md)
-
-## [Global Requests](./docs/technical/global_requests.md)
-
-## [Android support](./docs/android.md)

Reply via email to