Skip to content

Releases: tmds/Tmds.Ssh

0.9.0

12 Dec 10:38
Compare
Choose a tag to compare

SshClient:

  • [Breaking] Drop support for RSA PKCS#1 PEM keys in favor of the OpenSSH format. (#272)
  • Implement OpenSSH strict kex extension for mitigating Terrapin attack. (#263).
    note: this is for additional security. Previous versions of the library are not vulnerable.
  • Support auth using 'none'. (#268)
  • Include id_ed25519, id_ecdsa in default identity files (#269)
  • ExecuteOptions: fix constructor visibility (#252)
  • RemoteProcess: Write EOF when StandardInputStream gets Closed/Disposed. (#262)
  • Add LocalForward API. (#258)
    • Add SshClient.StartForwardUnixAsync. (#259)
    • LocalForward: support serving from unix socket. (#260)
  • SshClient: Disconnected API. (#270)

SftpClient:

  • Support downloading file to a Stream (#266)
  • Support uploading file from Stream. (#271)

0.8.0

20 Nov 08:13
Compare
Choose a tag to compare
  • SftpFileSystemEnumerator: don't throw when nested directory is no longer found during recursion. (#246)
  • Support server Ed25519 host keys. (#247)
  • Implement server keep alive. (#248)

0.7.0

19 Oct 11:01
Compare
Choose a tag to compare
  • Settings: make List/Dictionary properties mutable. (#232)
  • RemoteProcess: add ExitSignal. (#233)
  • Support multi method authentication. (#234)
  • Add TcpKeepAlive option and enable it by default. (#235)
  • SftpFileEntry.Path: don't append a directory separator when directory is '/'. (#236)
  • Add UploadEntriesOptions.ShouldRecurse. (#237)
  • Add SftpClient.CopyFileAsync. (#240)

0.6.0

20 Sep 07:24
Compare
Choose a tag to compare
  • Add support for ed25519 private keys (#212)
  • Support [email protected] (#215)
  • SftpClient: fix DownloadFileAsync not throwing when remote file was not found. (#221)
  • Support using private keys that are not stored in files. (#223)
    example: Add Azure Key example and fix ECDSA OID check (#226)
  • PrivateKeyCredential: support loading key from char array. (#224)
  • Support decoding private keys that use the [email protected] cipher. (#225)
  • Support configuring the client in code using ssh_config options. (#227)
  • Rename SshConfigOptions to SshConfigSettings. (#228)
  • Don't use ssh config for the default SshClient/SftpClient(string destination) ctor. (#229)

0.5.0

16 Aug 09:27
Compare
Choose a tag to compare
  • Support configuring from ssh_config. (#200)
  • Implement ECDSA private key support (#206)
  • Add support for encrypted private keys. (#207)
  • Add logging support through Microsoft.Extensions.Logging (#211)

0.4.0

26 Jun 06:30
Compare
Choose a tag to compare
  • Add ExecuteSubsystemAsync for subsystem based proc (#183)
  • Correct order of parameters in call to ReplaceInvalidCharacters. (#186)
  • SshClientSettings: support parsing usernames that include a realm. (#190)
  • Don't require an hmac for authenticated ciphers. (#191)
  • Add KerberosCredential/gssapi-with-mic user authentication (#188)
  • Prefer host key algorithms for which we have known keys. (#193)
  • Refactor auth handling and share SSH_MSG_USERAUTH_BANNER handling. (#194)
  • Consider SSH_MSG_USERAUTH_FAILURE authentications. (#195)
  • DefaultCredentials: add KerberosCredential. (#196)

0.3.0

09 Jun 12:55
91c6b21
Compare
Choose a tag to compare

Tmds.Ssh:

  • SftpFile: fine-tune seekable support. (#175)
  • Support ecdsa-sha2-nistp521, ecdsa-sha2-nistp384 server keys. (#176)
  • Add an AutoConnect setting. (#177)
  • SftpClient: support using class stand-alone. (#178)

Tmds.Ssh.Libssh:

  • Library was removed in favor of focus on Tmds.Ssh

0.2.0

31 May 09:35
ba41694
Compare
Choose a tag to compare

Tmds.Ssh:

  • Drop the Bouncy Castle library dependency and instead require .NET 8 to use DeriveRawSecretAgreement.
  • Add SFTP API
  • Extend RemoteProcess API
  • Private key formats: RSA in the OPENSSH PRIVATE KEY format
  • Client key algorithms: rsa-sha2-512, rsa-sha2-256 (instead of the SHA-1 based ssh-rsa).
  • Server key algorithms: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256 (instead of the SHA-1 based ssh-rsa)
  • Key exchange methods: ecdh-sha2-nistp384, ecdh-sha2-nistp521 (in addition to ecdh-sha2-nistp256)
  • Encryption: [email protected], [email protected] (instead of aes256-cbc + hmac-sha2-256)
  • Various API refactorings

Tmds.Ssh.Libssh:

0.1.0

17 Dec 11:11
Compare
Choose a tag to compare

Initial release