net-ssh 7.1.0.beta1 → 7.1.0.beta2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data/CHANGES.txt +20 -0
- data/README.md +5 -1
- data/Rakefile +31 -0
- data/SECURITY.md +4 -0
- data/lib/net/ssh/authentication/ed25519.rb +1 -0
- data/lib/net/ssh/buffer.rb +21 -21
- data/lib/net/ssh/version.rb +1 -1
- data.tar.gz.sig +0 -0
- metadata +4 -3
- metadata.gz.sig +0 -0
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: e4dc08515948324af346caddea61529c95353644dc99e709719f5e320775b7fc
|
4
|
+
data.tar.gz: 81dcce4739c85398d13a2f272bf49083cb3790d9b7e9faa3501f2cff792e2a8c
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: fbb1176178c014d7f8477d7c498151ce06d8858413bb5d145543e7be1a11fd8a37ff713e3bf3f4287f5999ccc29e92934d1da26c573dd8d0ef1c667633d5a696
|
7
|
+
data.tar.gz: e718b4989312a5d1c12c93ebcde7925a5e8609c8ac790f3dd23c2210d4d9ab40adefa73c6ba63c3d861e662827e7bf6df87d40a37c5edc326000e541bd273163
|
checksums.yaml.gz.sig
CHANGED
Binary file
|
data/CHANGES.txt
CHANGED
@@ -1,3 +1,23 @@
|
|
1
|
+
|
2
|
+
=== 7.1.0 beta1
|
3
|
+
|
4
|
+
* Don't use the deprecated set_XXX methods on RSA keys. [#875]
|
5
|
+
* Raise error when BCryptPbkdf fails [#876]
|
6
|
+
|
7
|
+
=== 7.0.1
|
8
|
+
|
9
|
+
* Drop leftover debug statement [#866]
|
10
|
+
|
11
|
+
=== 7.0.0
|
12
|
+
|
13
|
+
* BREAKING: Drop support for Ruby 2.5
|
14
|
+
* Fix decoding of ecdsa-sha2-nistp256 private keys [#657, #854]
|
15
|
+
* Fix missing require [#855]
|
16
|
+
* Support `~` in the path to the SSH agent's unix socket [#850]
|
17
|
+
* Add support for RSA client authentication with SHA-2 [a45f54]
|
18
|
+
* openssl: DSA: don't hardcode expected signature size, see ruby/openssl#483 [23a15c]
|
19
|
+
* Internal housekeeping (rubocop, codecov, remove travis, adding/improving tests)
|
20
|
+
|
1
21
|
=== 6.3.0 beta1
|
2
22
|
|
3
23
|
* Support cert based host key auth, fix asterisk in known_hosts [#833]
|
data/README.md
CHANGED
@@ -5,7 +5,7 @@
|
|
5
5
|
[](#backers])
|
6
6
|
[](#sponsors)
|
7
7
|
|
8
|
-
# Net::SSH
|
8
|
+
# Net::SSH 7.x
|
9
9
|
|
10
10
|
* Docs: http://net-ssh.github.io/net-ssh
|
11
11
|
* Issues: https://github.com/net-ssh/net-ssh/issues
|
@@ -247,6 +247,10 @@ mv gem-public_cert.pem net-ssh-public_cert.pem
|
|
247
247
|
gem cert --add net-ssh-public_cert.pem
|
248
248
|
```
|
249
249
|
|
250
|
+
## Security contact information
|
251
|
+
|
252
|
+
See [SECURITY.md](SECURITY.md)
|
253
|
+
|
250
254
|
## CREDITS
|
251
255
|
|
252
256
|
### Contributors
|
data/Rakefile
CHANGED
@@ -55,6 +55,37 @@ namespace :cert do
|
|
55
55
|
end
|
56
56
|
end
|
57
57
|
|
58
|
+
namespace :vbump do
|
59
|
+
desc "Increment prerelease"
|
60
|
+
task :pre do
|
61
|
+
version_file = 'lib/net/ssh/version.rb'
|
62
|
+
require_relative version_file
|
63
|
+
pre = Net::SSH::Version::PRE
|
64
|
+
if pre =~ /^([a-z]+)(\d+)/
|
65
|
+
new_pre = "#{$1}#{$2.to_i+1}"
|
66
|
+
found = false
|
67
|
+
|
68
|
+
File.open("#{version_file}.new", "w") do |f|
|
69
|
+
File.readlines(version_file).each do |line|
|
70
|
+
if line =~ /^(\s+PRE\s+=\s+")#{pre}("\s*)$/
|
71
|
+
new_line = "#{$1}#{new_pre}#{$2}"
|
72
|
+
puts "Changing:\n - #{line} + #{new_line}"
|
73
|
+
line = new_line
|
74
|
+
found = true
|
75
|
+
end
|
76
|
+
f.write(line)
|
77
|
+
end
|
78
|
+
raise ArugmentError, 'Cound not find line: PRE = \"#{pre}\" in #{version_file}"' unless found
|
79
|
+
end
|
80
|
+
|
81
|
+
FileUtils.mv version_file, "#{version_file}.old"
|
82
|
+
FileUtils.mv "#{version_file}.new", version_file
|
83
|
+
else
|
84
|
+
raise ArgumentError, "Unepexeted pre string: #{pre}"
|
85
|
+
end
|
86
|
+
end
|
87
|
+
end
|
88
|
+
|
58
89
|
namespace :rdoc do
|
59
90
|
desc "Update gh-pages branch"
|
60
91
|
task :publish do
|
data/SECURITY.md
ADDED
@@ -0,0 +1,4 @@
|
|
1
|
+
## Security contact information
|
2
|
+
|
3
|
+
To report a security vulnerability, please use the
|
4
|
+
[GitHub private vulnerability reporting feature](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability).
|
@@ -77,6 +77,7 @@ module Net
|
|
77
77
|
raise "BCryptPbkdf is not implemented for jruby" if RUBY_PLATFORM == "java"
|
78
78
|
|
79
79
|
key = BCryptPbkdf::key(password, salt, keylen + ivlen, rounds)
|
80
|
+
raise DecryptError.new("BCyryptPbkdf failed", encrypted_key: true) unless key
|
80
81
|
else
|
81
82
|
key = '\x00' * (keylen + ivlen)
|
82
83
|
end
|
data/lib/net/ssh/buffer.rb
CHANGED
@@ -251,7 +251,6 @@ module Net
|
|
251
251
|
def read_private_keyblob(type)
|
252
252
|
case type
|
253
253
|
when /^ssh-rsa$/
|
254
|
-
key = OpenSSL::PKey::RSA.new
|
255
254
|
n = read_bignum
|
256
255
|
e = read_bignum
|
257
256
|
d = read_bignum
|
@@ -262,27 +261,28 @@ module Net
|
|
262
261
|
_unkown2 = read_bignum
|
263
262
|
dmp1 = d % (p - 1)
|
264
263
|
dmq1 = d % (q - 1)
|
265
|
-
|
266
|
-
|
267
|
-
|
268
|
-
|
269
|
-
|
270
|
-
|
271
|
-
|
272
|
-
|
273
|
-
|
274
|
-
|
275
|
-
|
276
|
-
|
264
|
+
# Public key
|
265
|
+
data_sequence = OpenSSL::ASN1::Sequence([
|
266
|
+
OpenSSL::ASN1::Integer(n),
|
267
|
+
OpenSSL::ASN1::Integer(e)
|
268
|
+
])
|
269
|
+
|
270
|
+
if d && p && q && dmp1 && dmq1 && iqmp
|
271
|
+
data_sequence = OpenSSL::ASN1::Sequence([
|
272
|
+
OpenSSL::ASN1::Integer(0),
|
273
|
+
OpenSSL::ASN1::Integer(n),
|
274
|
+
OpenSSL::ASN1::Integer(e),
|
275
|
+
OpenSSL::ASN1::Integer(d),
|
276
|
+
OpenSSL::ASN1::Integer(p),
|
277
|
+
OpenSSL::ASN1::Integer(q),
|
278
|
+
OpenSSL::ASN1::Integer(dmp1),
|
279
|
+
OpenSSL::ASN1::Integer(dmq1),
|
280
|
+
OpenSSL::ASN1::Integer(iqmp)
|
281
|
+
])
|
277
282
|
end
|
278
|
-
|
279
|
-
|
280
|
-
|
281
|
-
key.dmp1 = dmp1
|
282
|
-
key.dmq1 = dmq1
|
283
|
-
key.iqmp = iqmp
|
284
|
-
end
|
285
|
-
key
|
283
|
+
|
284
|
+
asn1 = OpenSSL::ASN1::Sequence(data_sequence)
|
285
|
+
OpenSSL::PKey::RSA.new(asn1.to_der)
|
286
286
|
when /^ecdsa\-sha2\-(\w*)$/
|
287
287
|
OpenSSL::PKey::EC.read_keyblob($1, self)
|
288
288
|
else
|
data/lib/net/ssh/version.rb
CHANGED
@@ -56,7 +56,7 @@ module Net
|
|
56
56
|
|
57
57
|
# The prerelease component of this version of the Net::SSH library
|
58
58
|
# nil allowed
|
59
|
-
PRE = "
|
59
|
+
PRE = "beta2"
|
60
60
|
|
61
61
|
# The current version of the Net::SSH library as a Version instance
|
62
62
|
CURRENT = new(*[MAJOR, MINOR, TINY, PRE].compact)
|
data.tar.gz.sig
CHANGED
Binary file
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: net-ssh
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 7.1.0.
|
4
|
+
version: 7.1.0.beta2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Jamis Buck
|
@@ -31,7 +31,7 @@ cert_chain:
|
|
31
31
|
v84waVXQ2i5M7pJaHVBF7DxxeW/q8W3VCnsq8vmmvULSThD18QqYGaFDJeN8sTR4
|
32
32
|
6tfjgZ6OvGSScvbCMHkCE9XjonE=
|
33
33
|
-----END CERTIFICATE-----
|
34
|
-
date: 2023-
|
34
|
+
date: 2023-02-27 00:00:00.000000000 Z
|
35
35
|
dependencies:
|
36
36
|
- !ruby/object:Gem::Dependency
|
37
37
|
name: bcrypt_pbkdf
|
@@ -174,6 +174,7 @@ files:
|
|
174
174
|
- Manifest
|
175
175
|
- README.md
|
176
176
|
- Rakefile
|
177
|
+
- SECURITY.md
|
177
178
|
- THANKS.txt
|
178
179
|
- appveyor.yml
|
179
180
|
- docker-compose.yml
|
@@ -291,7 +292,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
291
292
|
- !ruby/object:Gem::Version
|
292
293
|
version: 1.3.1
|
293
294
|
requirements: []
|
294
|
-
rubygems_version: 3.
|
295
|
+
rubygems_version: 3.3.3
|
295
296
|
signing_key:
|
296
297
|
specification_version: 4
|
297
298
|
summary: 'Net::SSH: a pure-Ruby implementation of the SSH2 client protocol.'
|
metadata.gz.sig
CHANGED
Binary file
|