Releases: tmds/Tmds.Ssh
Releases · tmds/Tmds.Ssh
0.9.1
0.9.0
SshClient:
- [Breaking] Drop support for RSA PKCS#1 PEM keys in favor of the OpenSSH format. (#272)
- Implement OpenSSH strict kex extension for mitigating Terrapin attack. (#263).
note: this is for additional security. Previous versions of the library are not vulnerable. - Support auth using 'none'. (#268)
- Include id_ed25519, id_ecdsa in default identity files (#269)
- ExecuteOptions: fix constructor visibility (#252)
- RemoteProcess: Write EOF when StandardInputStream gets Closed/Disposed. (#262)
- Add LocalForward API. (#258)
- SshClient: Disconnected API. (#270)
SftpClient:
0.8.0
0.7.0
- Settings: make List/Dictionary properties mutable. (#232)
- RemoteProcess: add ExitSignal. (#233)
- Support multi method authentication. (#234)
- Add TcpKeepAlive option and enable it by default. (#235)
- SftpFileEntry.Path: don't append a directory separator when directory is '/'. (#236)
- Add UploadEntriesOptions.ShouldRecurse. (#237)
- Add SftpClient.CopyFileAsync. (#240)
0.6.0
- Add support for ed25519 private keys (#212)
- Support chacha20-poly1305@openssh.com (#215)
- SftpClient: fix DownloadFileAsync not throwing when remote file was not found. (#221)
- Support using private keys that are not stored in files. (#223)
example: Add Azure Key example and fix ECDSA OID check (#226) - PrivateKeyCredential: support loading key from char array. (#224)
- Support decoding private keys that use the chacha20-poly1305@openssh.com cipher. (#225)
- Support configuring the client in code using ssh_config options. (#227)
- Rename SshConfigOptions to SshConfigSettings. (#228)
- Don't use ssh config for the default SshClient/SftpClient(string destination) ctor. (#229)
0.5.0
0.4.0
- Add ExecuteSubsystemAsync for subsystem based proc (#183)
- Correct order of parameters in call to ReplaceInvalidCharacters. (#186)
- SshClientSettings: support parsing usernames that include a realm. (#190)
- Don't require an hmac for authenticated ciphers. (#191)
- Add KerberosCredential/gssapi-with-mic user authentication (#188)
- Prefer host key algorithms for which we have known keys. (#193)
- Refactor auth handling and share SSH_MSG_USERAUTH_BANNER handling. (#194)
- Consider SSH_MSG_USERAUTH_FAILURE authentications. (#195)
- DefaultCredentials: add KerberosCredential. (#196)
0.3.0
0.2.0
Tmds.Ssh:
- Drop the Bouncy Castle library dependency and instead require .NET 8 to use DeriveRawSecretAgreement.
- Add SFTP API
- Extend RemoteProcess API
- Private key formats: RSA in the OPENSSH PRIVATE KEY format
- Client key algorithms: rsa-sha2-512, rsa-sha2-256 (instead of the SHA-1 based ssh-rsa).
- Server key algorithms: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256 (instead of the SHA-1 based ssh-rsa)
- Key exchange methods: ecdh-sha2-nistp384, ecdh-sha2-nistp521 (in addition to ecdh-sha2-nistp256)
- Encryption: aes256-gcm@openssh.com, aes128-gcm@openssh.com (instead of aes256-cbc + hmac-sha2-256)
- Various API refactorings
Tmds.Ssh.Libssh:
- Provides the same API as Tmds.Ssh and uses https://www.libssh.org/ as its backend. It requires libssh 0.11+.