Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump minaSshdVersion from 2.11.0 to 2.14.0 #224

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Nov 4, 2024

Bumps minaSshdVersion from 2.11.0 to 2.14.0.
Updates org.apache.sshd:sshd-git from 2.11.0 to 2.14.0

Release notes

Sourced from org.apache.sshd:sshd-git's releases.

SSHD 2.14.0

Full Changelog: apache/mina-sshd@sshd-2.13.2...sshd-2.14.0

Bug Fixes

  • GH-524 Performance improvements
  • GH-533 Fix multi-step authentication
  • GH-582 Fix filtering in NamedFactory
  • GH-587 Prevent NullPointerExceptionon closed channel in NettyIoSession
  • GH-590 Better support for FIPS
  • GH-597 Pass on Charset in ClientSession.executeRemoteCommand()

New Features

  • New utility methods SftpClient.put(Path localFile, String remoteFileName) and SftpClient.put(InputStream in, String remoteFileName) facilitate SFTP file uploading.

GH-590 Better support for FIPS

Besides fixing a bug with bc-fips (the RandomGenerator class exists in normal Bouncy Castle, but not in the FIPS version, but Apache MINA sshd referenced it even if only bc-fips was present), support was improved for running in an environment restricted by FIPS.

There is a new system property org.apache.sshd.security.fipsEnabled. If set to true, a number of crypto-algorithms not approved by FIPS 140 are disabled:

  • key exchange methods sntrup761x25519-sha512, sntrup761x25519-sha512@​openssh.com, curve25519-sha256, curve25519-sha256@​libssh.org, curve448-sha512.
  • the chacha20-poly1305 cipher.
  • the bcrypt KDF used in encrypted private key files in OpenSSH format.
  • all ed25519 keys and signatures.

Additionally, the new "SunJCEWrapper" SecurityProviderRegistrar (see below) and the EdDSASecurityProviderRegistrar are disabled, and the BouncyCastleScurityProviderRegistrar looks only for the "BCFIPS" security provider, not for the normal "BC" provider.

If the system property is not set to true, FIPS mode can be enabled programmatically by calling SecurityUtils.setFipsMode() before any other call to Apache MINA sshd.

Potential compatibility issues

New security provider registrar

There is a new SecurityProviderRegistrar that is registered by default if there is a SunJCE security provider. It uses the AES and HmacSHA* implementations from SunJCE even if Bouncy Castle is also registered. SunJCE has native implementations, whereas Bouncy Castle may not.

The new registrar has the name "SunJCEWrapper" and can be configured like any other registrar. It can be disabled via the system property org.apache.sshd.security.provider.SunJCEWrapper.enabled=false. It is also

... (truncated)

Changelog

Sourced from org.apache.sshd:sshd-git's changelog.

Version 2.10.0 to 2.11.0

Version 2.11.0 to 2.12.0

Version 2.12.0 to 2.12.1

Version 2.12.1 to 2.13.0

Version 2.13.0 to 2.13.1

Version 2.13.1 to 2.13.2

Version 2.13.1 to 2.14.0

Planned for next version

Bug Fixes

  • GH-618 Fix reading an OpenSshCertificate from a Buffer

New Features

Potential compatibility issues

Major Code Re-factoring

Commits
  • 1cc0c0c [maven-release-plugin] prepare release sshd-2.14.0
  • 566445f Fix sshd-benchmark pom for release
  • 633f0a3 Remove unneeded managed dependency (#610)
  • 1fa773c Bump grpc.version from 1.65.1 to 1.66.0
  • 8fc559f Bump pmd.version from 7.4.0 to 7.5.0
  • 90872df Use a global SecureRandom instance
  • 2fff9b4 Remove logback-test.xml from sshd-common test jar (fix #595)
  • 01289ce RunBenchmarks: fix command line options
  • a1a2d8f Bump com.github.mwiede:jsch from 0.2.18 to 0.2.19
  • 684b204 Bump spring.version from 5.3.37 to 5.3.39
  • Additional commits viewable in compare view

Updates org.apache.sshd:sshd-common from 2.11.0 to 2.14.0

Release notes

Sourced from org.apache.sshd:sshd-common's releases.

SSHD 2.14.0

Full Changelog: apache/mina-sshd@sshd-2.13.2...sshd-2.14.0

Bug Fixes

  • GH-524 Performance improvements
  • GH-533 Fix multi-step authentication
  • GH-582 Fix filtering in NamedFactory
  • GH-587 Prevent NullPointerExceptionon closed channel in NettyIoSession
  • GH-590 Better support for FIPS
  • GH-597 Pass on Charset in ClientSession.executeRemoteCommand()

New Features

  • New utility methods SftpClient.put(Path localFile, String remoteFileName) and SftpClient.put(InputStream in, String remoteFileName) facilitate SFTP file uploading.

GH-590 Better support for FIPS

Besides fixing a bug with bc-fips (the RandomGenerator class exists in normal Bouncy Castle, but not in the FIPS version, but Apache MINA sshd referenced it even if only bc-fips was present), support was improved for running in an environment restricted by FIPS.

There is a new system property org.apache.sshd.security.fipsEnabled. If set to true, a number of crypto-algorithms not approved by FIPS 140 are disabled:

  • key exchange methods sntrup761x25519-sha512, sntrup761x25519-sha512@​openssh.com, curve25519-sha256, curve25519-sha256@​libssh.org, curve448-sha512.
  • the chacha20-poly1305 cipher.
  • the bcrypt KDF used in encrypted private key files in OpenSSH format.
  • all ed25519 keys and signatures.

Additionally, the new "SunJCEWrapper" SecurityProviderRegistrar (see below) and the EdDSASecurityProviderRegistrar are disabled, and the BouncyCastleScurityProviderRegistrar looks only for the "BCFIPS" security provider, not for the normal "BC" provider.

If the system property is not set to true, FIPS mode can be enabled programmatically by calling SecurityUtils.setFipsMode() before any other call to Apache MINA sshd.

Potential compatibility issues

New security provider registrar

There is a new SecurityProviderRegistrar that is registered by default if there is a SunJCE security provider. It uses the AES and HmacSHA* implementations from SunJCE even if Bouncy Castle is also registered. SunJCE has native implementations, whereas Bouncy Castle may not.

The new registrar has the name "SunJCEWrapper" and can be configured like any other registrar. It can be disabled via the system property org.apache.sshd.security.provider.SunJCEWrapper.enabled=false. It is also

... (truncated)

Changelog

Sourced from org.apache.sshd:sshd-common's changelog.

Version 2.10.0 to 2.11.0

Version 2.11.0 to 2.12.0

Version 2.12.0 to 2.12.1

Version 2.12.1 to 2.13.0

Version 2.13.0 to 2.13.1

Version 2.13.1 to 2.13.2

Version 2.13.1 to 2.14.0

Planned for next version

Bug Fixes

  • GH-618 Fix reading an OpenSshCertificate from a Buffer

New Features

Potential compatibility issues

Major Code Re-factoring

Commits
  • 1cc0c0c [maven-release-plugin] prepare release sshd-2.14.0
  • 566445f Fix sshd-benchmark pom for release
  • 633f0a3 Remove unneeded managed dependency (#610)
  • 1fa773c Bump grpc.version from 1.65.1 to 1.66.0
  • 8fc559f Bump pmd.version from 7.4.0 to 7.5.0
  • 90872df Use a global SecureRandom instance
  • 2fff9b4 Remove logback-test.xml from sshd-common test jar (fix #595)
  • 01289ce RunBenchmarks: fix command line options
  • a1a2d8f Bump com.github.mwiede:jsch from 0.2.18 to 0.2.19
  • 684b204 Bump spring.version from 5.3.37 to 5.3.39
  • Additional commits viewable in compare view

Updates org.apache.sshd:sshd-core from 2.11.0 to 2.14.0

Release notes

Sourced from org.apache.sshd:sshd-core's releases.

SSHD 2.14.0

Full Changelog: apache/mina-sshd@sshd-2.13.2...sshd-2.14.0

Bug Fixes

  • GH-524 Performance improvements
  • GH-533 Fix multi-step authentication
  • GH-582 Fix filtering in NamedFactory
  • GH-587 Prevent NullPointerExceptionon closed channel in NettyIoSession
  • GH-590 Better support for FIPS
  • GH-597 Pass on Charset in ClientSession.executeRemoteCommand()

New Features

  • New utility methods SftpClient.put(Path localFile, String remoteFileName) and SftpClient.put(InputStream in, String remoteFileName) facilitate SFTP file uploading.

GH-590 Better support for FIPS

Besides fixing a bug with bc-fips (the RandomGenerator class exists in normal Bouncy Castle, but not in the FIPS version, but Apache MINA sshd referenced it even if only bc-fips was present), support was improved for running in an environment restricted by FIPS.

There is a new system property org.apache.sshd.security.fipsEnabled. If set to true, a number of crypto-algorithms not approved by FIPS 140 are disabled:

  • key exchange methods sntrup761x25519-sha512, sntrup761x25519-sha512@​openssh.com, curve25519-sha256, curve25519-sha256@​libssh.org, curve448-sha512.
  • the chacha20-poly1305 cipher.
  • the bcrypt KDF used in encrypted private key files in OpenSSH format.
  • all ed25519 keys and signatures.

Additionally, the new "SunJCEWrapper" SecurityProviderRegistrar (see below) and the EdDSASecurityProviderRegistrar are disabled, and the BouncyCastleScurityProviderRegistrar looks only for the "BCFIPS" security provider, not for the normal "BC" provider.

If the system property is not set to true, FIPS mode can be enabled programmatically by calling SecurityUtils.setFipsMode() before any other call to Apache MINA sshd.

Potential compatibility issues

New security provider registrar

There is a new SecurityProviderRegistrar that is registered by default if there is a SunJCE security provider. It uses the AES and HmacSHA* implementations from SunJCE even if Bouncy Castle is also registered. SunJCE has native implementations, whereas Bouncy Castle may not.

The new registrar has the name "SunJCEWrapper" and can be configured like any other registrar. It can be disabled via the system property org.apache.sshd.security.provider.SunJCEWrapper.enabled=false. It is also

... (truncated)

Changelog

Sourced from org.apache.sshd:sshd-core's changelog.

Version 2.10.0 to 2.11.0

Version 2.11.0 to 2.12.0

Version 2.12.0 to 2.12.1

Version 2.12.1 to 2.13.0

Version 2.13.0 to 2.13.1

Version 2.13.1 to 2.13.2

Version 2.13.1 to 2.14.0

Planned for next version

Bug Fixes

  • GH-618 Fix reading an OpenSshCertificate from a Buffer

New Features

Potential compatibility issues

Major Code Re-factoring

Commits
  • 1cc0c0c [maven-release-plugin] prepare release sshd-2.14.0
  • 566445f Fix sshd-benchmark pom for release
  • 633f0a3 Remove unneeded managed dependency (#610)
  • 1fa773c Bump grpc.version from 1.65.1 to 1.66.0
  • 8fc559f Bump pmd.version from 7.4.0 to 7.5.0
  • 90872df Use a global SecureRandom instance
  • 2fff9b4 Remove logback-test.xml from sshd-common test jar (fix #595)
  • 01289ce RunBenchmarks: fix command line options
  • a1a2d8f Bump com.github.mwiede:jsch from 0.2.18 to 0.2.19
  • 684b204 Bump spring.version from 5.3.37 to 5.3.39
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps `minaSshdVersion` from 2.11.0 to 2.14.0.

Updates `org.apache.sshd:sshd-git` from 2.11.0 to 2.14.0
- [Release notes](https://github.com/apache/mina-sshd/releases)
- [Changelog](https://github.com/apache/mina-sshd/blob/master/CHANGES.md)
- [Commits](apache/mina-sshd@sshd-2.11.0...sshd-2.14.0)

Updates `org.apache.sshd:sshd-common` from 2.11.0 to 2.14.0
- [Release notes](https://github.com/apache/mina-sshd/releases)
- [Changelog](https://github.com/apache/mina-sshd/blob/master/CHANGES.md)
- [Commits](apache/mina-sshd@sshd-2.11.0...sshd-2.14.0)

Updates `org.apache.sshd:sshd-core` from 2.11.0 to 2.14.0
- [Release notes](https://github.com/apache/mina-sshd/releases)
- [Changelog](https://github.com/apache/mina-sshd/blob/master/CHANGES.md)
- [Commits](apache/mina-sshd@sshd-2.11.0...sshd-2.14.0)

---
updated-dependencies:
- dependency-name: org.apache.sshd:sshd-git
  dependency-type: direct:production
  update-type: version-update:semver-minor
- dependency-name: org.apache.sshd:sshd-common
  dependency-type: direct:production
  update-type: version-update:semver-minor
- dependency-name: org.apache.sshd:sshd-core
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file java Pull requests that update Java code labels Nov 4, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file java Pull requests that update Java code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants