Asyncssh

Latest version: v2.19.0

Safety actively analyzes 688896 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 13 of 16

1.3.0

Not secure
---------------------------

* Updated AsyncSSH dependencies to make PyCA version 1.0.0 or later
mandatory and remove the older PyCrypto support. This change also
adds support for the PyCA implementation of ECDSA and removes support
for RC2-based private key encryption that was only supported by
PyCrypto.

* Refactored ECDH and Curve25519 key exchange code so they can share an
implementation, and prepared the code for adding a PyCA shim for this
as soon as support for that is released.

* Hardened the DSA and RSA implementations to do stricter checking of the
key exchange response, and sped up the RSA implementation by taking
advantage of optional RSA private key parameters when they are present.

* Added support for asynchronous client and server authentication,
allowing auth-related callbacks in SSHClient and SSHServer to optionally
be defined as coroutines.

* Added support for asynchronous SFTP server processing, allowing callbacks
in SFTPServer to optionally be defined as coroutines.

* Added support for a broader set of open mode flags in the SFTP server.
Note that this change is not completely backward compatible with previous
releases. If you have application code which expects a Python mode
string as an argument to SFTPServer open method, it will need to be
changed to expect a pflags value instead.

* Fixed handling of eof_received() when it returns false to close the
half-open connection but still allow sending or receiving of exit status
and exit signals.

* Added unit tests for the asn1, cipher, compression, ec, kex, known_hosts,
mac, and saslprep modules and expended the set of pbe and public_key
unit tests.

* Fixed a set of issues uncovered by ASN.1 unit tests:

* Removed extra 0xff byte when encoding integers of the form -128*256^n
* Fixed decoding error for OIDs beginning with 2.n where n >= 40
* Fixed range check for second component of ObjectIdentifier
* Added check for extraneous 0x80 bytes in ObjectIdentifier components
* Added check for negative component values in ObjectIdentifier
* Added error handling for ObjectIdentifier components being non-integer
* Added handling for missing length byte after extended tag
* Raised ASN1EncodeError instead of TypeError on unsupported types

* Added validation on asn1_class argument, and equality and hash methods
to BitString, RawDERObject, and TaggedDERObject. Also, reordered
RawDERObject arguments to be consistent with TaggedDERObject and added
str method to ObjectIdentifier.

* Fixed a set of issues uncovered by additional pbe unit tests:

* Encoding and decoding of PBES2-encrypted keys with a PRF other than
SHA1 is now handled correctly.
* Some exception messages were made more specific.
* Additional checks were put in for empty salt or zero iteration count
in encryption parameters.

* Fixed a set of issues uncovered by additional public key unit tests:

* Properly handle PKCS8 keys with invalid ASN.1 data
* Properly handle PKCS8 DSA & RSA keys with non-sequence for arg_params
* Properly handle attempts to import empty string as a public key
* Properly handle encrypted PEM keys with missing DEK-Info header
* Report check byte mismatches for encrypted OpenSSH keys as bad passphrase
* Return KeyImportError instead of KeyEncryptionError when passphrase
is needed but not provided

* Added information about branches to CONTRIBUTING guide.

* Performed a bunch of code cleanup suggested by pylint.

1.2.1

Not secure
---------------------------

* Fixed a problem with passing in client_keys=None to disable public
key authentication in the SSH client.

* Updated Unicode handling to allow multi-byte Unicode characters to be
split across successive SSH data messages.

* Added a note to the documentation for AsyncSSH create_connection()
explaining how to perform the equivalent of a connect with a timeout.

1.2.0

Not secure
--------------------------

* Fixed a problem with the SSHConnection context manager on Python versions
older than 3.4.2.

* Updated the documentation for get_extra_info() in the SSHConnection,
SSHChannel, SSHReader, and SSHWriter classes to contain pointers
to get_extra_info() in their parent transports to make it easier to
see all of the attributes which can be queried.

* Clarified the legal return values for the session_requested(),
connection_requested(), and server_requested() methods in
SSHServer.

* Eliminated calls to the deprecated importlib.find_loader() method.

* Made improvements to README suggested by Nicholas Chammas.

* Fixed a number of issues identified by pylint.

1.1.1

Not secure
---------------------------

* Added new start_sftp_server method on SSHChannel to allow applications
using the non-streams API to start an SFTP server.

* Enhanced the default format_longname() method in SFTPServer to properly
handle the case where not all of the file attributes are returned by
stat().

* Fixed a bug related to the new allow_pty parameter in create_server.

* Fixed a bug in the hashed known_hosts support introduced in some recent
refactoring of the host pattern matching code.

1.1.0

Not secure
---------------------------

* SFTP is now supported!

* Both client and server support is available.
* SFTP version 3 is supported, with OpenSSH extensions.
* Recursive transfers and glob matching are supported in the client.
* File I/O APIs allow files to be accessed without downloading them.

* New simplified connect and listen APIs have been added.

* SSHConnection can now be used as a context manager.

* New arguments to create_server now allow the specification of a
session_factory and encoding or sftp_factory as well as controls
over whether a pty is allowed and the window and max packet size,
avoiding the need to create custom SSHServer subclasses or custom
SSHServerChannel instances.

* New examples have been added for SFTP and to show the use of the new
connect and listen APIs.

* Copyrights in changed files have all been updated to 2015.

1.0.1

Not secure
---------------------------

* Fixed a bug in OpenSSH private key encryption introduced in some
recent cipher refactoring.

* Added bcrypt and libnacl as optional dependencies in setup.py.

* Changed test_keys test to work properly when bcrypt or libnacl aren't
installed.

Page 13 of 16

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.