-
The
ChannelSession
provides a mechanism for supporting non-standard extended data (a.k.a. STDERR data) in a similar manner as the "regular" data. Please read the relevant section in the main documentation page. -
The user can use a registered
SessionDisconnectHandler
in order be informed and also intervene in cases where the code decides to disconnect the session due to various protocol or configuration parameters violations. -
ScpFileOpener#getMatchingFilesToSend
has been modified to accept aPath
as the base directory and also return anIterable<Path>
. -
The SFTP command line client provides a
kex
command that displays the KEX parameters of the current sesssion - client/server proposals and what has been negotiated. -
The
Session
object provides aKexExtensionHandler
for usage with KEX extension negotiation -
The
SignalListener
accepts aChannel
argument indicating the channel instance through which the signal was received. -
When creating a client shell or command channel one can provide optional PTY and/or environment values in order to override the internal default ones.
- In this context, the
PtyCapableChannelSession#setEnv
method has been modified to accept ANY object. When the environment values are sent to the server, the object'stoString()
will be used. Furthermore, if one provides anull
value, the previous registered value (if any) is removed.
- In this context, the
-
The
SftpFileSystemAccessor
callbacks are now provided with the relevantHandle
they are servicing (Note: in special cases anull
value is provided to indicate invocation outside the scope of such a handle).-
Closing of file channel/directory streams created by the accessor are also closed via callbacks to the same accessor
-
When closing a file channel that may have been potentially modified, the default implementation forces a synchronization of the data with the file-system. This behavior can be modified by setting the
sftp-auto-fsync-on-close
property to false.
-
-
The
ScpFileOpener
methods are also invoked in order to close input/output streams created through it when they are no longer needed once data has been successfully copied. -
The
CommandFactory
andShellFactory
have been modified to accept the server'sChannelSession
instance through which they are being invoked. -
The various implementations of public/private keys/pairs decoders/loaders are provided with a
Map
of any headers that may be available in the relevant data file. -
org.apache.sshd.agent.unix.AgentClient
constructor expects a non-nullFactoryManager
instance which it then exposes via itsgetFactoryManager
. -
SftpEventListener#removing/removed
callbacks accept anisDirectory
flag indicating the type ofPath
being removed - file or directory.
-
The
Session
object provides aisServerSession
method that can be used to distinguish between client/server instances without having to resort toinstanceof
. -
When creating a CLI SSH client one can specify
-o KexExtensionHandler=XXX
option to initialize a client-sideKexExtensionHandler
using an FQCN. Ifdefault
is specified as the option value, then the internalDefaultClientKexExtensionHandler
is used.
- SSHD-782 - Added session level heartbeat mechanism via
SSH_MSG_IGNORE
or customized user provided code.
In order to support customized user code for this feature, the ReservedSessionMessagesHandler
can be used to
implement any kind of user-defined heartbeat. Note: if the user configured such a mechanism, then the
sendReservedHeartbeat
method must be implemented since the default throws UnsupportedOperationException
which will cause the session to be terminated the 1st time the method is invoked.
-
SSHD-882 - Provide hooks to allow users to register a consumer for STDERR data sent via the
ChannelSession
- especially for the SFTP subsystem. -
SSHD-892 - Inform user about possible session disconnect prior to disconnecting and allow intervention via
SessionDisconnectHandler
. -
SSHD-893 - Using Path(s) instead of String(s) as DirectoryScanner results
-
SSHD-895 - Add support for RSA + SHA-256/512 signatures. Note: according to RFC - 8332 - section 3.3:
Implementation experience has shown that there are servers that apply authentication penalties to clients attempting public key algorithms that the SSH server does not support.
When authenticating with an RSA key against a server that does not implement the "server-sig-algs" extension, clients MAY default to an "ssh-rsa" signature to avoid authentication penalties. When the new rsa-sha2-* algorithms have been sufficiently widely adopted to warrant disabling "ssh-rsa", clients MAY default to one of the new algorithms.
Therefore we do not include by default the "rsa-sha-*" signature factories in the SshClient
. They can
be easily added by using the relevant BuiltinSignatures
:
SshClient client = SshClient.setUpDefaultClient();
client.setSignatureFactories(
Arrays.asList(
/* This is the full list in the recommended preference order,
* but the initialization code can choose and/or re-order
*/
BuiltinSignatures.nistp256,
BuiltinSignatures.nistp384,
BuiltinSignatures.nistp521,
BuiltinSignatures.ed25519,
BuiltinSignatures.rsaSHA512,
BuiltinSignatures.rsaSHA256, // should check if isSupported since not required by default for Java 8
BuiltinSignatures.rsa,
BuiltinSignatures.dsa));
-
SSHD-896 - Added support for KEX extension negotiation
-
SSHD-870 - Added support for GPGv2 public keyring (Note: requires upgraded Bouncycastle and jpgpj versions).
-
SSHD-897 - The default CLI code automatically tries to detect the PTY settings to use if opening a shell or command channel.
-
SSHD-901 - Added capability to request a reply for the
keepalive@...
heartbeat request in order to avoid client-side session timeout due to no traffic from server. -
SSHD-902 - Shutdown output when receiving
SSH_MSG_CHANNEL_EOF
message via port forwarding channel. -
SSHD-903 - Fixed the SFTP version negotiation behavior in case client proposed version is higher than server supported one.
-
SSHD-904 - Add option to enable/disable 'fsync' on modified file contents via SFTP (default=enabled).
-
SSHD-905 - Add option to enable/disable 'fsync' on modified file contents via SCP (default=enabled).
-
SSHD-907 -
StpEventListener
invokes (new)exiting
method to inform about SFTP subsystem exiting and therefore closing all currently tracked file/directory handles. -
SSHD-909 - SFTP versions extension handler ignores non-numerical versions when resolving the available ones.
-
SSHD-913 - Provide channel session instance to command and/or shell factories creators
-
SSHD-912 - Use separate locks for Future(s) and Session/Channel instances.
-
SSHD-916 - Avoid locking the session lock when signalling client session authentication failure.
-
SSHD-917 - Add support for SSH2 public key file format.
-
SSHD-921 - Do not send session disconnect message due to timeout expiration if already done so.
-
SSHD-923 - Added agent close detection mechanisms to avoid infinite waits on incoming messages.
-
SSHD-929 - Provide file/directory flag indicator to SFTP event listener callback for removal.