Skip to content

Bump minaSshdVersion from 2.11.0 to 2.15.0 #235

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Feb 25, 2025

Bumps minaSshdVersion from 2.11.0 to 2.15.0.
Updates org.apache.sshd:sshd-git from 2.11.0 to 2.15.0

Release notes

Sourced from org.apache.sshd:sshd-git's releases.

SSHD 2.14.0

Full Changelog: apache/mina-sshd@sshd-2.13.2...sshd-2.14.0

Bug Fixes

  • GH-524 Performance improvements
  • GH-533 Fix multi-step authentication
  • GH-582 Fix filtering in NamedFactory
  • GH-587 Prevent NullPointerExceptionon closed channel in NettyIoSession
  • GH-590 Better support for FIPS
  • GH-597 Pass on Charset in ClientSession.executeRemoteCommand()

New Features

  • New utility methods SftpClient.put(Path localFile, String remoteFileName) and SftpClient.put(InputStream in, String remoteFileName) facilitate SFTP file uploading.

GH-590 Better support for FIPS

Besides fixing a bug with bc-fips (the RandomGenerator class exists in normal Bouncy Castle, but not in the FIPS version, but Apache MINA sshd referenced it even if only bc-fips was present), support was improved for running in an environment restricted by FIPS.

There is a new system property org.apache.sshd.security.fipsEnabled. If set to true, a number of crypto-algorithms not approved by FIPS 140 are disabled:

  • key exchange methods sntrup761x25519-sha512, sntrup761x25519-sha512@​openssh.com, curve25519-sha256, curve25519-sha256@​libssh.org, curve448-sha512.
  • the chacha20-poly1305 cipher.
  • the bcrypt KDF used in encrypted private key files in OpenSSH format.
  • all ed25519 keys and signatures.

Additionally, the new "SunJCEWrapper" SecurityProviderRegistrar (see below) and the EdDSASecurityProviderRegistrar are disabled, and the BouncyCastleScurityProviderRegistrar looks only for the "BCFIPS" security provider, not for the normal "BC" provider.

If the system property is not set to true, FIPS mode can be enabled programmatically by calling SecurityUtils.setFipsMode() before any other call to Apache MINA sshd.

Potential compatibility issues

New security provider registrar

There is a new SecurityProviderRegistrar that is registered by default if there is a SunJCE security provider. It uses the AES and HmacSHA* implementations from SunJCE even if Bouncy Castle is also registered. SunJCE has native implementations, whereas Bouncy Castle may not.

The new registrar has the name "SunJCEWrapper" and can be configured like any other registrar. It can be disabled via the system property org.apache.sshd.security.provider.SunJCEWrapper.enabled=false. It is also

... (truncated)

Changelog

Sourced from org.apache.sshd:sshd-git's changelog.

Version 2.1.0 to 2.2.0

Version 2.2.0 to 2.3.0

Version 2.3.0 to 2.4.0

Version 2.4.0 to 2.5.0

Version 2.5.0 to 2.5.1

Version 2.5.1 to 2.6.0

Version 2.6.0 to 2.7.0

Version 2.7.0 to 2.8.0

Version 2.8.0 to 2.9.0

Version 2.9.0 to 2.9.1

Version 2.9.1 to 2.9.2

Version 2.9.2 to 2.10.0

Commits
  • c651f7c [maven-release-plugin] prepare release sshd-2.15.0
  • 2835991 Bump version to 2.15.0-SNAPSHOT
  • 909b5e2 Abstract revoked key handling in KnownHostsServerKeyVerifier
  • 11a9277 Update documentation
  • 3427b21 Bump Bouncy Castle 1.79 -> 1.80
  • e59dd00 GH-654: sshd-contrib: use test scope for assertj dependency
  • e5f805e OpenSshmlKemTest: use alpine 3.21
  • 7b19f6b Update CHANGES.md
  • fb21e1f Merge pull request #639 from ianjoneill/f-ed25519-bc
  • 9c49609 Update docs
  • Additional commits viewable in compare view

Updates org.apache.sshd:sshd-common from 2.11.0 to 2.15.0

Release notes

Sourced from org.apache.sshd:sshd-common's releases.

SSHD 2.14.0

Full Changelog: apache/mina-sshd@sshd-2.13.2...sshd-2.14.0

Bug Fixes

  • GH-524 Performance improvements
  • GH-533 Fix multi-step authentication
  • GH-582 Fix filtering in NamedFactory
  • GH-587 Prevent NullPointerExceptionon closed channel in NettyIoSession
  • GH-590 Better support for FIPS
  • GH-597 Pass on Charset in ClientSession.executeRemoteCommand()

New Features

  • New utility methods SftpClient.put(Path localFile, String remoteFileName) and SftpClient.put(InputStream in, String remoteFileName) facilitate SFTP file uploading.

GH-590 Better support for FIPS

Besides fixing a bug with bc-fips (the RandomGenerator class exists in normal Bouncy Castle, but not in the FIPS version, but Apache MINA sshd referenced it even if only bc-fips was present), support was improved for running in an environment restricted by FIPS.

There is a new system property org.apache.sshd.security.fipsEnabled. If set to true, a number of crypto-algorithms not approved by FIPS 140 are disabled:

  • key exchange methods sntrup761x25519-sha512, sntrup761x25519-sha512@​openssh.com, curve25519-sha256, curve25519-sha256@​libssh.org, curve448-sha512.
  • the chacha20-poly1305 cipher.
  • the bcrypt KDF used in encrypted private key files in OpenSSH format.
  • all ed25519 keys and signatures.

Additionally, the new "SunJCEWrapper" SecurityProviderRegistrar (see below) and the EdDSASecurityProviderRegistrar are disabled, and the BouncyCastleScurityProviderRegistrar looks only for the "BCFIPS" security provider, not for the normal "BC" provider.

If the system property is not set to true, FIPS mode can be enabled programmatically by calling SecurityUtils.setFipsMode() before any other call to Apache MINA sshd.

Potential compatibility issues

New security provider registrar

There is a new SecurityProviderRegistrar that is registered by default if there is a SunJCE security provider. It uses the AES and HmacSHA* implementations from SunJCE even if Bouncy Castle is also registered. SunJCE has native implementations, whereas Bouncy Castle may not.

The new registrar has the name "SunJCEWrapper" and can be configured like any other registrar. It can be disabled via the system property org.apache.sshd.security.provider.SunJCEWrapper.enabled=false. It is also

... (truncated)

Changelog

Sourced from org.apache.sshd:sshd-common's changelog.

Version 2.1.0 to 2.2.0

Version 2.2.0 to 2.3.0

Version 2.3.0 to 2.4.0

Version 2.4.0 to 2.5.0

Version 2.5.0 to 2.5.1

Version 2.5.1 to 2.6.0

Version 2.6.0 to 2.7.0

Version 2.7.0 to 2.8.0

Version 2.8.0 to 2.9.0

Version 2.9.0 to 2.9.1

Version 2.9.1 to 2.9.2

Version 2.9.2 to 2.10.0

Commits
  • c651f7c [maven-release-plugin] prepare release sshd-2.15.0
  • 2835991 Bump version to 2.15.0-SNAPSHOT
  • 909b5e2 Abstract revoked key handling in KnownHostsServerKeyVerifier
  • 11a9277 Update documentation
  • 3427b21 Bump Bouncy Castle 1.79 -> 1.80
  • e59dd00 GH-654: sshd-contrib: use test scope for assertj dependency
  • e5f805e OpenSshmlKemTest: use alpine 3.21
  • 7b19f6b Update CHANGES.md
  • fb21e1f Merge pull request #639 from ianjoneill/f-ed25519-bc
  • 9c49609 Update docs
  • Additional commits viewable in compare view

Updates org.apache.sshd:sshd-core from 2.11.0 to 2.15.0

Release notes

Sourced from org.apache.sshd:sshd-core's releases.

SSHD 2.14.0

Full Changelog: apache/mina-sshd@sshd-2.13.2...sshd-2.14.0

Bug Fixes

  • GH-524 Performance improvements
  • GH-533 Fix multi-step authentication
  • GH-582 Fix filtering in NamedFactory
  • GH-587 Prevent NullPointerExceptionon closed channel in NettyIoSession
  • GH-590 Better support for FIPS
  • GH-597 Pass on Charset in ClientSession.executeRemoteCommand()

New Features

  • New utility methods SftpClient.put(Path localFile, String remoteFileName) and SftpClient.put(InputStream in, String remoteFileName) facilitate SFTP file uploading.

GH-590 Better support for FIPS

Besides fixing a bug with bc-fips (the RandomGenerator class exists in normal Bouncy Castle, but not in the FIPS version, but Apache MINA sshd referenced it even if only bc-fips was present), support was improved for running in an environment restricted by FIPS.

There is a new system property org.apache.sshd.security.fipsEnabled. If set to true, a number of crypto-algorithms not approved by FIPS 140 are disabled:

  • key exchange methods sntrup761x25519-sha512, sntrup761x25519-sha512@​openssh.com, curve25519-sha256, curve25519-sha256@​libssh.org, curve448-sha512.
  • the chacha20-poly1305 cipher.
  • the bcrypt KDF used in encrypted private key files in OpenSSH format.
  • all ed25519 keys and signatures.

Additionally, the new "SunJCEWrapper" SecurityProviderRegistrar (see below) and the EdDSASecurityProviderRegistrar are disabled, and the BouncyCastleScurityProviderRegistrar looks only for the "BCFIPS" security provider, not for the normal "BC" provider.

If the system property is not set to true, FIPS mode can be enabled programmatically by calling SecurityUtils.setFipsMode() before any other call to Apache MINA sshd.

Potential compatibility issues

New security provider registrar

There is a new SecurityProviderRegistrar that is registered by default if there is a SunJCE security provider. It uses the AES and HmacSHA* implementations from SunJCE even if Bouncy Castle is also registered. SunJCE has native implementations, whereas Bouncy Castle may not.

The new registrar has the name "SunJCEWrapper" and can be configured like any other registrar. It can be disabled via the system property org.apache.sshd.security.provider.SunJCEWrapper.enabled=false. It is also

... (truncated)

Changelog

Sourced from org.apache.sshd:sshd-core's changelog.

Version 2.1.0 to 2.2.0

Version 2.2.0 to 2.3.0

Version 2.3.0 to 2.4.0

Version 2.4.0 to 2.5.0

Version 2.5.0 to 2.5.1

Version 2.5.1 to 2.6.0

Version 2.6.0 to 2.7.0

Version 2.7.0 to 2.8.0

Version 2.8.0 to 2.9.0

Version 2.9.0 to 2.9.1

Version 2.9.1 to 2.9.2

Version 2.9.2 to 2.10.0

Commits
  • c651f7c [maven-release-plugin] prepare release sshd-2.15.0
  • 2835991 Bump version to 2.15.0-SNAPSHOT
  • 909b5e2 Abstract revoked key handling in KnownHostsServerKeyVerifier
  • 11a9277 Update documentation
  • 3427b21 Bump Bouncy Castle 1.79 -> 1.80
  • e59dd00 GH-654: sshd-contrib: use test scope for assertj dependency
  • e5f805e OpenSshmlKemTest: use alpine 3.21
  • 7b19f6b Update CHANGES.md
  • fb21e1f Merge pull request #639 from ianjoneill/f-ed25519-bc
  • 9c49609 Update docs
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps `minaSshdVersion` from 2.11.0 to 2.15.0.

Updates `org.apache.sshd:sshd-git` from 2.11.0 to 2.15.0
- [Release notes](https://github.com/apache/mina-sshd/releases)
- [Changelog](https://github.com/apache/mina-sshd/blob/master/CHANGES.md)
- [Commits](apache/mina-sshd@sshd-2.11.0...sshd-2.15.0)

Updates `org.apache.sshd:sshd-common` from 2.11.0 to 2.15.0
- [Release notes](https://github.com/apache/mina-sshd/releases)
- [Changelog](https://github.com/apache/mina-sshd/blob/master/CHANGES.md)
- [Commits](apache/mina-sshd@sshd-2.11.0...sshd-2.15.0)

Updates `org.apache.sshd:sshd-core` from 2.11.0 to 2.15.0
- [Release notes](https://github.com/apache/mina-sshd/releases)
- [Changelog](https://github.com/apache/mina-sshd/blob/master/CHANGES.md)
- [Commits](apache/mina-sshd@sshd-2.11.0...sshd-2.15.0)

---
updated-dependencies:
- dependency-name: org.apache.sshd:sshd-git
  dependency-type: direct:production
  update-type: version-update:semver-minor
- dependency-name: org.apache.sshd:sshd-common
  dependency-type: direct:production
  update-type: version-update:semver-minor
- dependency-name: org.apache.sshd:sshd-core
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file java Pull requests that update Java code labels Feb 25, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file java Pull requests that update Java code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants