forked from pool/python-paramiko
Accepting request 979399 from home:stroeder:python
update to 2.11.0 OBS-URL: https://build.opensuse.org/request/show/979399 OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-paramiko?expand=0&rev=105
This commit is contained in:
@@ -1,3 +1,37 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu May 26 20:43:45 UTC 2022 - Michael Ströder <michael@stroeder.com>
|
||||
|
||||
- update to 2.11.0
|
||||
* [Feature] #1951: Add SSH config token expansion (eg %h, %p) when
|
||||
parsing ProxyJump directives.
|
||||
* [Support] #2004: (via #2011) Apply unittest skipIf to tests currently
|
||||
using SHA1 in their critical path, to avoid failures on systems starting
|
||||
to disable SHA1 outright in their crypto backends (eg RHEL 9).
|
||||
* [Support] #1838: (via #1870/#2028) Update camelCase method calls
|
||||
against the threading module to be snake_case; this and related tweaks
|
||||
should fix some deprecation warnings under Python 3.10.
|
||||
* [Support] #2038: (via #2039) Recent versions of Cryptography have
|
||||
deprecated Blowfish algorithm support; in lieu of an easy method for
|
||||
users to remove it from the list of algorithms Paramiko tries to import
|
||||
and use, we’ve decided to remove it from our “preferred algorithms” list.
|
||||
This will both discourage use of a weak algorithm, and avoid warnings.
|
||||
- update to 2.10.5
|
||||
* [Bug] #2008: (via #2010) Windows-native SSH agent support as merged in
|
||||
2.10 could encounter Errno 22 OSError exceptions in some scenarios
|
||||
(eg server not cleanly closing a relevant named pipe).
|
||||
This has been worked around and should be less problematic.
|
||||
* [Bug] #2017: OpenSSH 7.7 and older has a bug preventing it from
|
||||
understanding how to perform SHA2 signature verification for RSA
|
||||
certificates (specifically certs - not keys), so when we added SHA2
|
||||
support it broke all clients using RSA certificates with these servers.
|
||||
This has been fixed in a manner similar to what OpenSSH’s own client
|
||||
does: a version check is performed and the algorithm used is downgraded
|
||||
if needed.
|
||||
* [Bug] #1933: Align signature verification algorithm with OpenSSH re:
|
||||
zero-padding signatures which don’t match their nominal size/length. This
|
||||
shouldn’t affect most users, but will help Paramiko-implemented SSH
|
||||
servers handle poorly behaved clients such as PuTTY.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Apr 28 21:26:08 UTC 2022 - Dirk Müller <dmueller@suse.com>
|
||||
|
||||
|
||||
Reference in New Issue
Block a user