Releases: tmds/Tmds.Ssh
Releases · tmds/Tmds.Ssh
0.7.0
- Settings: make List/Dictionary properties mutable. (#232)
- RemoteProcess: add ExitSignal. (#233)
- Support multi method authentication. (#234)
- Add TcpKeepAlive option and enable it by default. (#235)
- SftpFileEntry.Path: don't append a directory separator when directory is '/'. (#236)
- Add UploadEntriesOptions.ShouldRecurse. (#237)
- Add SftpClient.CopyFileAsync. (#240)
0.6.0
- Add support for ed25519 private keys (#212)
- Support [email protected] (#215)
- SftpClient: fix DownloadFileAsync not throwing when remote file was not found. (#221)
- Support using private keys that are not stored in files. (#223)
example: Add Azure Key example and fix ECDSA OID check (#226) - PrivateKeyCredential: support loading key from char array. (#224)
- Support decoding private keys that use the [email protected] cipher. (#225)
- Support configuring the client in code using ssh_config options. (#227)
- Rename SshConfigOptions to SshConfigSettings. (#228)
- Don't use ssh config for the default SshClient/SftpClient(string destination) ctor. (#229)
0.5.0
0.4.0
- Add ExecuteSubsystemAsync for subsystem based proc (#183)
- Correct order of parameters in call to ReplaceInvalidCharacters. (#186)
- SshClientSettings: support parsing usernames that include a realm. (#190)
- Don't require an hmac for authenticated ciphers. (#191)
- Add KerberosCredential/gssapi-with-mic user authentication (#188)
- Prefer host key algorithms for which we have known keys. (#193)
- Refactor auth handling and share SSH_MSG_USERAUTH_BANNER handling. (#194)
- Consider SSH_MSG_USERAUTH_FAILURE authentications. (#195)
- DefaultCredentials: add KerberosCredential. (#196)
0.3.0
0.2.0
Tmds.Ssh:
- Drop the Bouncy Castle library dependency and instead require .NET 8 to use DeriveRawSecretAgreement.
- Add SFTP API
- Extend RemoteProcess API
- Private key formats: RSA in the OPENSSH PRIVATE KEY format
- Client key algorithms: rsa-sha2-512, rsa-sha2-256 (instead of the SHA-1 based ssh-rsa).
- Server key algorithms: ecdsa-sha2-nistp256, rsa-sha2-512, rsa-sha2-256 (instead of the SHA-1 based ssh-rsa)
- Key exchange methods: ecdh-sha2-nistp384, ecdh-sha2-nistp521 (in addition to ecdh-sha2-nistp256)
- Encryption: [email protected], [email protected] (instead of aes256-cbc + hmac-sha2-256)
- Various API refactorings
Tmds.Ssh.Libssh:
- Provides the same API as Tmds.Ssh and uses https://www.libssh.org/ as its backend. It requires libssh 0.11+.