Differences

This shows you the differences between the selected revisions of the page.

2005-04-20 2005-05-04
typography 2.0.85 (martin) 3.7.5 ssh version syntax (martin)
Line 6: Line 6:
  * SSH core upgraded to [[&url(puttychanges)|PuTTY 0.55]]. It brings following changes:   * SSH core upgraded to [[&url(puttychanges)|PuTTY 0.55]]. It brings following changes:
    * Security fix: the vulnerability found by the Core Security Technologies is now fixed. See advisory numbered [[&url(core20040705)|CORE-2004-0705]]     * Security fix: the vulnerability found by the Core Security Technologies is now fixed. See advisory numbered [[&url(core20040705)|CORE-2004-0705]]
-    * General robustness of the SSH1 implementation has been improved. +    * General robustness of the SSH-1 implementation has been improved.
    * Bug fix: Random noise generation was hanging some computers and interfering with other processes' precision timing.     * Bug fix: Random noise generation was hanging some computers and interfering with other processes' precision timing.
    * Several other bug fixes.     * Several other bug fixes.
Line 160: Line 160:
  * Moving remote files to different remote directory.   * Moving remote files to different remote directory.
  * SSH core upgraded to [[&url(puttychanges)|PuTTY 0.54]]. It brings following changes:   * SSH core upgraded to [[&url(puttychanges)|PuTTY 0.54]]. It brings following changes:
-    * Fixed validation of SSH2 RSA key whose length was not a multiple of 8 bits.+    * Fixed validation of SSH-2 RSA key whose length was not a multiple of 8 bits.
    * Several other bug fixes.     * Several other bug fixes.
  * Program can be registered to handle ''scp:%%//%%'' and ''sftp:%%//%%'' addresses. Format of the address may be the same as session command-line parameter of program: ''%%(scp|sftp)://[user[:pwd]@]host[:port][/path]%%''. Command-line parameter may also start with protocol name now. Address handling may be registered either from Preferences window or from setup application.   * Program can be registered to handle ''scp:%%//%%'' and ''sftp:%%//%%'' addresses. Format of the address may be the same as session command-line parameter of program: ''%%(scp|sftp)://[user[:pwd]@]host[:port][/path]%%''. Command-line parameter may also start with protocol name now. Address handling may be registered either from Preferences window or from setup application.
Line 202: Line 202:
  * Both upload and download confirmation dialogs has target path histories.   * Both upload and download confirmation dialogs has target path histories.
  * For downloads, file properties modification and calculation of total transfer size, symlinks to directories are not followed.   * For downloads, file properties modification and calculation of total transfer size, symlinks to directories are not followed.
-  * Size of SFTP packet is limited by maximal size of SSH2 packet (as suggested by the server). This heuristics can allow WinSCP to work on SFTP servers with limited memory (in particular servers running on embeded devices).+  * Size of SFTP packet is limited by maximal size of SSH-2 packet (as suggested by the server). This heuristics can allow WinSCP to work on SFTP servers with limited memory (in particular servers running on embeded devices).
  * Local read-only files can be overwritten (confirmation is required).   * Local read-only files can be overwritten (confirmation is required).
  * When PuTTY is not found in configured (or default) path, the search paths (''PATH'' system variable) are searched for executable.   * When PuTTY is not found in configured (or default) path, the search paths (''PATH'' system variable) are searched for executable.
Line 443: Line 443:
  * SSH core upgraded to [[&url(puttychanges)|PuTTY 0.53b]]. It brings following changes:   * SSH core upgraded to [[&url(puttychanges)|PuTTY 0.53b]]. It brings following changes:
    * Security fix: the vulnerability found by the Rapid7 SSHredder test suite is now believed fixed. See CERT advisory [[&url(ca200236)|CA-2002-36]].     * Security fix: the vulnerability found by the Rapid7 SSHredder test suite is now believed fixed. See CERT advisory [[&url(ca200236)|CA-2002-36]].
-    * Support for Diffie-Hellman group exchange in SSH2+    * Support for Diffie-Hellman group exchange in SSH-2
-    * Support for AES in SSH·2. +    * Support for AES in SSH-2. 
-    * Support for public keys in SSH2, both RSA and DSA. Agent forwarding is supported, but only to OpenSSH servers, because ssh.com have a different agent protocol which they haven't published.+    * Support for public keys in SSH-2, both RSA and DSA. Agent forwarding is supported, but only to OpenSSH servers, because ssh.com have a different agent protocol which they haven't published.
    * Added the //Bugs// control panel, allowing the user to manually control various workarounds for SSH server bugs.     * Added the //Bugs// control panel, allowing the user to manually control various workarounds for SSH server bugs.
    * WinSCP now natively supports making its connection through various types of proxy. We support SOCKS 4 and 5, HTTP CONNECT (RFC 2817), and the common ad-hoc type of proxy where you telnet to the proxy and then send text of the form ''connect host.name 22''. Basic password authentication is supported in SOCKS and HTTP proxies.     * WinSCP now natively supports making its connection through various types of proxy. We support SOCKS 4 and 5, HTTP CONNECT (RFC 2817), and the common ad-hoc type of proxy where you telnet to the proxy and then send text of the form ''connect host.name 22''. Basic password authentication is supported in SOCKS and HTTP proxies.
Line 553: Line 553:
=== 2001-10-05 === === 2001-10-05 ===
-  * SSH2 support. +  * SSH-2 support. 
-  * RSA keys authentication (SSH1-only), including support for [[&pageanthelp|Pageant]] and agent forwarding.+  * RSA keys authentication (SSH-1-only), including support for [[&pageanthelp|Pageant]] and agent forwarding.
  * Compression.   * Compression.
  * Possibility to choose preferred encryption algorithm (3DES, DES, Blowfish).   * Possibility to choose preferred encryption algorithm (3DES, DES, Blowfish).

Last modified: by martin