Releases: Eugeny/russh
v0.44.0
Breaking changes
OpenSSL-free RSA
- This release adds a default pure-Rust RSA implementation, meaning that you can disable the
openssl
feature to reduce your app size and improve portability and build speed. - RSA is now enabled by default in
Preferred::DEFAULT
when theopenssl
feature is disabled.
Preferred algorithms config changes - 77cc2f7
- The fields specifying cipher algorithms in
Preferred
are nowCow<&'static, [Name]>
instead of&'static [Name]
, allowing you to dynamically construct the lists. If you're using custom algorithm lists, you'll need to update your code:
config.preferred = Preferred {
- kex: &[CURVE25519],
+ kex: Cow::Borrowed(&[CURVE25519]),
..<_>::default()
}
- The type of
Preferred::compression
items is nowrussh::compression::Name
instead ofString
. - All
Name
structs now implementTryFrom<&'static str>
which will validate that the named algorithm is actually implemented in the library. - There are now companion algorithm lists to choose from dynamically:
russh_keys::key::ALL_KEY_TYPES
,russh::kex::ALL_KEX_ALGORITHMS
,russh::cipher::ALL_CIPHERS
,russh::compression::ALL_COMPRESSION_ALGORITHMS
andrussh::mac::ALL_MAC_ALGORITHMS
.
Incorrect Ed25519 PKCS#8 key saving
- Up to
v0.43
,russh-keys
has generated incorrect key format when saving Ed25519 keys in PKCS#8 format. This is fixed inv0.44
but by default,v0.44
will fail to parse keys generated inv0.43
. - To allow
v0.44
to parse these keys, enable thelegacy-ed25519-pkcs8-parser
feature of therussh-keys
crate.
Other changes
- 3bfd99f:
ecdh-sha2-nistp{256,384,521}
kex support (#282) (Michael Gleason) #282 - 800969b: Implement
-cbc
ciphers. (#297) (Pierre Barre) #297 - 1eaadfb: Add support for glob pattern matching in Host directives (#306) (Adam Chappell) #306
- 88196a7: allow converting
ChannelId
intou32
Fixes
- 643be05: Fix block ciphers + HMAC_SHA1_ETM (#298) (Pierre Barre) #298
- 2bfe426: Fix hardcoded public key auth negotiation (#294) (Tom König) #294
- 9cce48c: Allow ssh-rsa keys to be used for rsa-sha2-* auth (#290) (Ana Gelez) #290
- Fix a segmentation fault (#288) #288 (Ana Gelez)
- 9e1ed09: Overachiever host key checking (#302) (Jean-Baptiste Skutnik) #302
- 3f4646a: removed use of unstable Option::inspect
- f2d94c0: fixed warp-tech/warpgate#996 - prevent offering of unparseable public keys from ending the session
v0.44.0-beta.4
Changes
Incorrect Ed25519 PKCS#8 key saving
- Up to
v0.43
,russh-keys
has generated incorrect key format when saving Ed25519 keys in PKCS#8 format. This is fixed inv0.44
but by default,v0.44
will fail to parse keys generated inv0.43
. - To allow
v0.44
to parse these keys, enable thelegacy-ed25519-pkcs8-parser
feature of therussh-keys
crate.
v0.44.0-beta.3
Preferred algorithms config changes
-
77cc2f7: algorithm names QoL changes
-
The fields specifying cipher algorithms in
Preferred
are nowCow<&'static, [Name]>
instead of&'static [Name]
, allowing you to dynamically construct the lists. If you're using custom algorithm lists, you'll need to update your code:
config.preferred = Preferred {
- kex: &[CURVE25519],
+ kex: Cow::Borrowed(&[CURVE25519]),
..<_>::default()
}
- The type of
Preferred::compression
items is nowrussh::compression::Name
instead ofString
. - All
Name
structs now implementTryFrom<&'static str>
which will validate that the named algorithm is actually implemented in the library. - There are now companion algorithm lists to choose from dynamically:
russh_keys::key::ALL_KEY_TYPES
,russh::kex::ALL_KEX_ALGORITHMS
,russh::cipher::ALL_CIPHERS
,russh::compression::ALL_COMPRESSION_ALGORITHMS
andrussh::mac::ALL_MAC_ALGORITHMS
.
Changes
- 3bfd99f:
ecdh-sha2-nistp{256,384,521}
kex support (#282) (Michael Gleason) #282 - 800969b: Implement
-cbc
ciphers. (#297) (Pierre Barre) #297 - 1eaadfb: Add support for glob pattern matching in Host directives (#306) (Adam Chappell) #306
- 88196a7: allow converting
ChannelId
intou32
Fixes
- 643be05: Fix block ciphers + HMAC_SHA1_ETM (#298) (Pierre Barre) #298
- 2bfe426: Fix hardcoded public key auth negotiation (#294) (Tom König) #294
- 9cce48c: Allow ssh-rsa keys to be used for rsa-sha2-* auth (#290) (Ana Gelez) #290
- Fix a segmentation fault (#288) #288 (Ana Gelez)
- 9e1ed09: Overachiever host key checking (#302) (Jean-Baptiste Skutnik) #302
- 3f4646a: removed use of unstable Option::inspect
v0.44.0-beta.1
Notes
- This release adds a default pure-Rust RSA implementation, meaning that you can disable the
openssl
feature to reduce your app size and improve portability and build speed.
Changes
- c850dbd: Add pure-rust RSA implementation (#273) (Robert Wang) #273
- 3041b0c: Implement ecdsa-sha2-nistp{256,384,521} (#267) (Robert Wang) #267
- b20504d: Implements client support for OpenSSH Certificates (#278) (Shoaib Merchant) #278
- 4f749f4: Replace custom PKCS #8 parsing with
der
crate and others (#274) (Robert Wang) #274 - 194430b: Use
ssh-key
crate to decode OpenSSH public/private keys (#279) (Robert Wang) #279 - 4b40f51: Zeroize RSA private key data on drop (#275) (Robert Wang) #275
Fixes
v0.43.0
Breaking changes
Changes in the Handler
traits
859e685: refactor
Handler
trait to use mutable reference instead of owned variables (Alessandro Ricottone) #247
The Handler
traits no longer take ownership of both self
and Session
or have to return them. These have been replaced with normal &mut
references.
You will need to update your Handler
impls to match the new method signatures, for example:
async fn channel_open_session(
- self,
+ &mut self,
channel: Channel<Msg>,
- session: Session,
+ session: &mut Session,
- ) -> Result<(Self, bool, Session), Self::Error> {
+ ) -> Result<bool, Self::Error> {
...
- Ok((self, true, session))
+ Ok(true)
}
async fn auth_publickey(
- self,
+ &mut self,
_: &str,
_: &key::PublicKey,
- ) -> Result<(Self, server::Auth), Self::Error> {
+ ) -> Result<server::Auth, Self::Error> {
...
- Ok((self, server::Auth::Accept))
+ Ok(server::Auth::Accept)
}
russh::server::run
moved into the Server
trait
a592366: Move run and run_on_socket to Server trait (Alessandro Ricottone) #247
You'll need to replace the call to run
with a call to Server::run_on_address
, for example:
- russh::server::run(config, ("0.0.0.0", 2222), &mut server).await?;
+ server.run_on_address(config, ("0.0.0.0", 2222)).await?;
}
Changes
- 1d7dab8: Better disconnect event handling (Adrian Müller) #255 - added Handler::disconnected
- 45edb29: added specific error types for keepalive and inactivity timeouts
- 0fcb1ec: Allow retrieving peer SSH Protocol Version String (#260) (Adrian Müller (DTT)) #260
- 5c60d30: Actually process global request results (Adrian Müller) #250
- dcbe4ba: update examples to new APIs (Alessandro Ricottone) #249
Fixes
v0.43.0-beta.1
Breaking changes
Changes in the Handler
traits
859e685: refactor
Handler
trait to use mutable reference instead of owned variables (Alessandro Ricottone) #247
The Handler
traits no longer take ownership of both self
and Session
or have to return them. These have been replaced with normal &mut
references.
You will need to update your Handler
impls to match the new method signatures, for example:
async fn channel_open_session(
- self,
+ &mut self,
channel: Channel<Msg>,
- session: Session,
+ session: &mut Session,
- ) -> Result<(Self, bool, Session), Self::Error> {
+ ) -> Result<bool, Self::Error> {
...
- Ok((self, true, session))
+ Ok(true)
}
async fn auth_publickey(
- self,
+ &mut self,
_: &str,
_: &key::PublicKey,
- ) -> Result<(Self, server::Auth), Self::Error> {
+ ) -> Result<server::Auth, Self::Error> {
...
- Ok((self, server::Auth::Accept))
+ Ok(server::Auth::Accept)
}
russh::server::run
moved into the Server
trait
a592366: Move run and run_on_socket to Server trait (Alessandro Ricottone) #247
You'll need to replace the call to run
with a call to Server::run_on_address
, for example:
- russh::server::run(config, ("0.0.0.0", 2222), &mut server).await?;
+ server.run_on_address(config, ("0.0.0.0", 2222)).await?;
}
v0.42.0
Changes
- 2ce82f2: Support for NIST P-521 public keys (akeamc) #230
- 8f6af5e: Support for
diffie-hellman-group16-sha512
hex (Brendon Ho) #233 - 273fd88: Add
russh::server::run_on_socket
to facilitate dropping privileges immediately after socket binding (Samuel Ainsworth) #231 - be6f5be: implement Ord, PartialOrd for ChannelId (Sherlock Holo) #238
Fixes
- b9dce87: Improve keepalive and inactivity timers (Milo Mirate) #214
- 1541fe5: Analogous keepalive fixes to the client module (Samuel Ainsworth) #243
- bd13e95: Avert the race between sending data and sending EOF (Milo Mirate) #222
- 44a2392: server/encrypted.rs: respect
proceed_with_methods
in "none" and "password" authentication methods (Samuel Ainsworth) #241 - 42c98a6: fixed #227 - only advertise host key algos for host keys present in
server::Config
v0.40.2
Security fixes
CVE-2023-48795 - Terrapin Attack [a355c62]
A flaw in the SSH protocol itself allows an active MitM attacker to prevent the client & server from negotiating OpenSSH security extensions, or, with AsyncSSH, take control of the user's session.
This release adds the support for the kex-strict-*-v00@openssh.com
extensions designed by OpenSSH specifically to prevent this attack.
More info: https://terrapin-attack.com
v0.40.1
Changes
- Explicitly set minimum supported Rust version (1.65)
v0.40.0
Breaking changes
- acd744a:
ChannelStream
rebuild (Maya the bee) #181ChannelStream
is now generic over the same type as the parentChannel
- You can now obtain separate
AsyncRead
andAsyncWrite
handles for a channel, as well as its extended streams withmake_reader(_ext)
andmake_writer(_ext)
.
Changes
- 92660ef: Support for NIST P-256 public keys (George Hopkins) #208
- 4a683d2: Add client-sent keepalives (Milo Mirate) #196
- c4a0688: Add method to read known host key (George Hopkins) #205
- 7c03dd9: add sftp client example (Roman) #184
- 3463ed0: Fix ChannelMsg::Close docs (Lucas Kent) #212
- cd59590: Added client-side inactivity timeout (Adrian Müller) #211
- c0f3458: added
Server::handle_session_error
and session closure logging
Fixes
- d0908de: fixed #218 - fixed padding calculation, AES-GCM rekey and hmac-sha2-256(-etm) MAC
- 52e5eaa: Use
ChannelMsg::WindowAdjusted
during data transfer (Joe Grund) #180 - e81db83: Make winapi dep windows only (Lucas Kent) #195
- a904a08: Fix handling of key constraints (George Hopkins) #203
- 72afa2b: Reduce busywaiting in ChannelStream components (Milo Mirate) #197
- 9c25fa2: Support hashed hostnames in known_hosts file (George Hopkins) #200
- c66f4b0: fixed #198 - agent server - ed25519 key parsing