net-ssh 7.2.2.rc1 → 7.3.0.rc1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +2 -1
- data/.github/workflows/ci.yml +1 -1
- data/.rubocop_todo.yml +1 -1
- data/CHANGES.txt +4 -0
- data/README.md +5 -0
- data/Rakefile +7 -3
- data/lib/net/ssh/authentication/ed25519.rb +0 -2
- data/lib/net/ssh/known_hosts.rb +0 -1
- data/lib/net/ssh/transport/aes128_gcm.rb +40 -0
- data/lib/net/ssh/transport/aes256_gcm.rb +40 -0
- data/lib/net/ssh/transport/algorithms.rb +8 -1
- data/lib/net/ssh/transport/cipher_factory.rb +9 -7
- data/lib/net/ssh/transport/gcm_cipher.rb +207 -0
- data/lib/net/ssh/transport/hmac/abstract.rb +16 -0
- data/lib/net/ssh/transport/packet_stream.rb +3 -3
- data/lib/net/ssh/transport/state.rb +1 -1
- data/lib/net/ssh/version.rb +2 -2
- data/net-ssh-public_cert.pem +19 -18
- data.tar.gz.sig +3 -4
- metadata +24 -20
- metadata.gz.sig +0 -0
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 5be7fdb8fff6f5929ae3fae446bed88d9d747ba8d946f50451ff02dc3bbed090
|
4
|
+
data.tar.gz: b0fd4cb80779368e07fa6c81f96e0f6270a40a29de1e6dcd3aba5d6a2a924990
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 439ed07f9029410454211a9e91ea905a3614db275a9e4c46d8c9bcdfd88865be3ddc5ea83152b6347a139b6c6bf3b814306977e2dff94bffc029b4cc48782bac
|
7
|
+
data.tar.gz: d3e626ecec7614a33f9d534753212f6dd21640d6f4bde7d8ea32401427ee646b81d282f929b7d5231aea48aee64ace38d90fe07b068114bca7962bbc12f6c5f3
|
checksums.yaml.gz.sig
CHANGED
@@ -1 +1,2 @@
|
|
1
|
-
|
1
|
+
k��ٟP��VJ�� �2����@�Z�=n���&��"S�B����t�ocs*Y8T
|
2
|
+
%z�o��$�c��J���:���n=� ��+����V?}��]�dov�uQ��D�6��>&�+`S�&��DŽ�2k�\ǁ̝�!���!:��?���j���2���N6ђ���j�����=C��W
|
data/.github/workflows/ci.yml
CHANGED
data/.rubocop_todo.yml
CHANGED
@@ -235,7 +235,7 @@ Lint/UselessTimes:
|
|
235
235
|
# Offense count: 205
|
236
236
|
# Configuration parameters: IgnoredMethods, CountRepeatedAttributes.
|
237
237
|
Metrics/AbcSize:
|
238
|
-
Max:
|
238
|
+
Max: 75
|
239
239
|
|
240
240
|
# Offense count: 16
|
241
241
|
# Configuration parameters: CountComments, CountAsOne, ExcludedMethods, IgnoredMethods.
|
data/CHANGES.txt
CHANGED
data/README.md
CHANGED
@@ -248,6 +248,8 @@ mv gem-public_cert.pem net-ssh-public_cert.pem
|
|
248
248
|
gem cert --add net-ssh-public_cert.pem
|
249
249
|
```
|
250
250
|
|
251
|
+
or `rake cert:update_public_when_expired`
|
252
|
+
|
251
253
|
## Security contact information
|
252
254
|
|
253
255
|
See [SECURITY.md](SECURITY.md)
|
@@ -272,6 +274,9 @@ Support this project by becoming a sponsor. Your logo will show up here with a l
|
|
272
274
|
|
273
275
|
[![Sponsor](https://opencollective.com/net-ssh/sponsor/0/avatar.svg)](https://opencollective.com/net-ssh/sponsor/0/website)
|
274
276
|
|
277
|
+
[<img src="https://github.com/net-ssh/net-ssh/assets/52435/9690bf3e-34ea-4c52-8aea-1cc4cb5bcb6d" width="320">](https://ubicloud.com)
|
278
|
+
|
279
|
+
|
275
280
|
## LICENSE:
|
276
281
|
|
277
282
|
(The MIT License)
|
data/Rakefile
CHANGED
@@ -61,7 +61,7 @@ def change_version(&block)
|
|
61
61
|
pre = Net::SSH::Version::PRE
|
62
62
|
tiny = Net::SSH::Version::TINY
|
63
63
|
result = block[pre: pre, tiny: Net::SSH::Version::TINY]
|
64
|
-
raise "Version change logic should always return a pre"
|
64
|
+
raise ArgumentError, "Version change logic should always return a pre" unless result.key?(:pre)
|
65
65
|
|
66
66
|
new_pre = result[:pre]
|
67
67
|
new_tiny = result[:tiny] || tiny
|
@@ -112,9 +112,13 @@ namespace :vbump do
|
|
112
112
|
task :final do
|
113
113
|
change_version do |pre:, tiny:|
|
114
114
|
_ = tiny
|
115
|
-
|
115
|
+
if pre.nil?
|
116
|
+
{ tiny: tiny + 1, pre: nil }
|
117
|
+
else
|
118
|
+
raise ArgumentError, "Unexpected pre: #{pre}" if pre.nil?
|
116
119
|
|
117
|
-
|
120
|
+
{ pre: nil }
|
121
|
+
end
|
118
122
|
end
|
119
123
|
end
|
120
124
|
|
data/lib/net/ssh/known_hosts.rb
CHANGED
@@ -0,0 +1,40 @@
|
|
1
|
+
require 'net/ssh/transport/hmac/abstract'
|
2
|
+
require 'net/ssh/transport/gcm_cipher'
|
3
|
+
|
4
|
+
module Net::SSH::Transport
|
5
|
+
## Implements the aes128-gcm@openssh cipher
|
6
|
+
class AES128_GCM
|
7
|
+
extend ::Net::SSH::Transport::GCMCipher
|
8
|
+
|
9
|
+
## Implicit HMAC, do need to do anything
|
10
|
+
class ImplicitHMac < ::Net::SSH::Transport::HMAC::Abstract
|
11
|
+
def aead
|
12
|
+
true
|
13
|
+
end
|
14
|
+
|
15
|
+
def key_length
|
16
|
+
16
|
17
|
+
end
|
18
|
+
end
|
19
|
+
|
20
|
+
def implicit_mac
|
21
|
+
ImplicitHMac.new
|
22
|
+
end
|
23
|
+
|
24
|
+
def algo_name
|
25
|
+
'aes-128-gcm'
|
26
|
+
end
|
27
|
+
|
28
|
+
def name
|
29
|
+
'aes128-gcm@openssh.com'
|
30
|
+
end
|
31
|
+
|
32
|
+
#
|
33
|
+
# --- RFC 5647 ---
|
34
|
+
# K_LEN AES key length 16 octets
|
35
|
+
#
|
36
|
+
def self.key_length
|
37
|
+
16
|
38
|
+
end
|
39
|
+
end
|
40
|
+
end
|
@@ -0,0 +1,40 @@
|
|
1
|
+
require 'net/ssh/transport/hmac/abstract'
|
2
|
+
require 'net/ssh/transport/gcm_cipher'
|
3
|
+
|
4
|
+
module Net::SSH::Transport
|
5
|
+
## Implements the aes256-gcm@openssh cipher
|
6
|
+
class AES256_GCM
|
7
|
+
extend ::Net::SSH::Transport::GCMCipher
|
8
|
+
|
9
|
+
## Implicit HMAC, do need to do anything
|
10
|
+
class ImplicitHMac < ::Net::SSH::Transport::HMAC::Abstract
|
11
|
+
def aead
|
12
|
+
true
|
13
|
+
end
|
14
|
+
|
15
|
+
def key_length
|
16
|
+
32
|
17
|
+
end
|
18
|
+
end
|
19
|
+
|
20
|
+
def implicit_mac
|
21
|
+
ImplicitHMac.new
|
22
|
+
end
|
23
|
+
|
24
|
+
def algo_name
|
25
|
+
'aes-256-gcm'
|
26
|
+
end
|
27
|
+
|
28
|
+
def name
|
29
|
+
'aes256-gcm@openssh.com'
|
30
|
+
end
|
31
|
+
|
32
|
+
#
|
33
|
+
# --- RFC 5647 ---
|
34
|
+
# K_LEN AES key length 32 octets
|
35
|
+
#
|
36
|
+
def self.key_length
|
37
|
+
32
|
38
|
+
end
|
39
|
+
end
|
40
|
+
end
|
@@ -44,7 +44,11 @@ module Net
|
|
44
44
|
diffie-hellman-group14-sha256
|
45
45
|
diffie-hellman-group14-sha1],
|
46
46
|
|
47
|
-
encryption: %w[aes256-ctr
|
47
|
+
encryption: %w[aes256-ctr
|
48
|
+
aes192-ctr
|
49
|
+
aes128-ctr
|
50
|
+
aes256-gcm@openssh.com
|
51
|
+
aes128-gcm@openssh.com],
|
48
52
|
|
49
53
|
hmac: %w[hmac-sha2-512-etm@openssh.com hmac-sha2-256-etm@openssh.com
|
50
54
|
hmac-sha2-512 hmac-sha2-256
|
@@ -492,6 +496,9 @@ module Net
|
|
492
496
|
HMAC.get(hmac_server, mac_key_server, parameters)
|
493
497
|
end
|
494
498
|
|
499
|
+
cipher_client.nonce = iv_client if mac_client.respond_to?(:aead) && mac_client.aead
|
500
|
+
cipher_server.nonce = iv_server if mac_server.respond_to?(:aead) && mac_client.aead
|
501
|
+
|
495
502
|
session.configure_client cipher: cipher_client, hmac: mac_client,
|
496
503
|
compression: normalize_compression_name(compression_client),
|
497
504
|
compression_level: options[:compression_level],
|
@@ -1,5 +1,7 @@
|
|
1
1
|
require 'openssl'
|
2
2
|
require 'net/ssh/transport/ctr.rb'
|
3
|
+
require 'net/ssh/transport/aes128_gcm'
|
4
|
+
require 'net/ssh/transport/aes256_gcm'
|
3
5
|
require 'net/ssh/transport/key_expander'
|
4
6
|
require 'net/ssh/transport/identity_cipher'
|
5
7
|
require 'net/ssh/transport/chacha20_poly1305_cipher_loader'
|
@@ -31,15 +33,15 @@ module Net
|
|
31
33
|
'none' => 'none'
|
32
34
|
}
|
33
35
|
|
34
|
-
SSH_TO_CLASS =
|
36
|
+
SSH_TO_CLASS = {
|
37
|
+
'aes256-gcm@openssh.com' => Net::SSH::Transport::AES256_GCM,
|
38
|
+
'aes128-gcm@openssh.com' => Net::SSH::Transport::AES128_GCM
|
39
|
+
}.tap do |hash|
|
35
40
|
if Net::SSH::Transport::ChaCha20Poly1305CipherLoader::LOADED
|
36
|
-
|
37
|
-
|
38
|
-
}
|
39
|
-
else
|
40
|
-
{
|
41
|
-
}
|
41
|
+
hash['chacha20-poly1305@openssh.com'] =
|
42
|
+
Net::SSH::Transport::ChaCha20Poly1305Cipher
|
42
43
|
end
|
44
|
+
end
|
43
45
|
|
44
46
|
# Returns true if the underlying OpenSSL library supports the given cipher,
|
45
47
|
# and false otherwise.
|
@@ -0,0 +1,207 @@
|
|
1
|
+
require 'net/ssh/loggable'
|
2
|
+
|
3
|
+
module Net
|
4
|
+
module SSH
|
5
|
+
module Transport
|
6
|
+
## Extension module for aes(128|256)gcm ciphers
|
7
|
+
module GCMCipher
|
8
|
+
# rubocop:disable Metrics/AbcSize
|
9
|
+
def self.extended(orig)
|
10
|
+
# rubocop:disable Metrics/BlockLength
|
11
|
+
orig.class_eval do
|
12
|
+
include Net::SSH::Loggable
|
13
|
+
|
14
|
+
attr_reader :cipher
|
15
|
+
attr_reader :key
|
16
|
+
attr_accessor :nonce
|
17
|
+
|
18
|
+
#
|
19
|
+
# Semantically gcm cipher supplies the OpenSSL iv interface with a nonce
|
20
|
+
# as it is not randomly generated due to being supplied from a counter.
|
21
|
+
# The RFC's use IV and nonce interchangeably.
|
22
|
+
#
|
23
|
+
def initialize(encrypt:, key:)
|
24
|
+
@cipher = OpenSSL::Cipher.new(algo_name)
|
25
|
+
@key = key
|
26
|
+
key_len = @cipher.key_len
|
27
|
+
if key.size != key_len
|
28
|
+
error_message = "#{cipher_name}: keylength does not match"
|
29
|
+
error { error_message }
|
30
|
+
raise error_message
|
31
|
+
end
|
32
|
+
encrypt ? @cipher.encrypt : @cipher.decrypt
|
33
|
+
@cipher.key = key
|
34
|
+
|
35
|
+
@nonce = {
|
36
|
+
fixed: nil,
|
37
|
+
invocation_counter: 0
|
38
|
+
}
|
39
|
+
end
|
40
|
+
|
41
|
+
def update_cipher_mac(payload, _sequence_number)
|
42
|
+
#
|
43
|
+
# --- RFC 5647 7.3 ---
|
44
|
+
# When using AES-GCM with secure shell, the packet_length field is to
|
45
|
+
# be treated as additional authenticated data, not as plaintext.
|
46
|
+
#
|
47
|
+
length_data = [payload.bytesize].pack('N')
|
48
|
+
|
49
|
+
cipher.auth_data = length_data
|
50
|
+
|
51
|
+
encrypted_data = cipher.update(payload) << cipher.final
|
52
|
+
|
53
|
+
mac = cipher.auth_tag
|
54
|
+
|
55
|
+
incr_nonce
|
56
|
+
length_data + encrypted_data + mac
|
57
|
+
end
|
58
|
+
|
59
|
+
#
|
60
|
+
# --- RFC 5647 ---
|
61
|
+
# uint32 packet_length; // 0 <= packet_length < 2^32
|
62
|
+
#
|
63
|
+
def read_length(data, _sequence_number)
|
64
|
+
data.unpack1('N')
|
65
|
+
end
|
66
|
+
|
67
|
+
#
|
68
|
+
# --- RFC 5647 ---
|
69
|
+
# In AES-GCM secure shell, the inputs to the authenticated encryption
|
70
|
+
# are:
|
71
|
+
# PT (Plain Text)
|
72
|
+
# byte padding_length; // 4 <= padding_length < 256
|
73
|
+
# byte[n1] payload; // n1 = packet_length-padding_length-1
|
74
|
+
# byte[n2] random_padding; // n2 = padding_length
|
75
|
+
# AAD (Additional Authenticated Data)
|
76
|
+
# uint32 packet_length; // 0 <= packet_length < 2^32
|
77
|
+
# IV (Initialization Vector)
|
78
|
+
# As described in section 7.1.
|
79
|
+
# BK (Block Cipher Key)
|
80
|
+
# The appropriate Encryption Key formed during the Key Exchange.
|
81
|
+
#
|
82
|
+
def read_and_mac(data, mac, _sequence_number)
|
83
|
+
# The authentication tag will be placed in the MAC field at the end of the packet
|
84
|
+
|
85
|
+
# OpenSSL does not verify auth tag length
|
86
|
+
# GCM mode allows arbitrary sizes for the auth_tag up to 128 bytes and a single
|
87
|
+
# byte allows authentication to pass. If single byte auth tags are possible
|
88
|
+
# an attacker would require no more than 256 attempts to forge a valid tag.
|
89
|
+
#
|
90
|
+
raise 'incorrect auth_tag length' unless mac.to_s.length == mac_length
|
91
|
+
|
92
|
+
packet_length = data.unpack1('N')
|
93
|
+
|
94
|
+
cipher.auth_tag = mac.to_s
|
95
|
+
cipher.auth_data = [packet_length].pack('N')
|
96
|
+
|
97
|
+
result = cipher.update(data[4...]) << cipher.final
|
98
|
+
incr_nonce
|
99
|
+
result
|
100
|
+
end
|
101
|
+
|
102
|
+
def mac_length
|
103
|
+
16
|
104
|
+
end
|
105
|
+
|
106
|
+
def block_size
|
107
|
+
16
|
108
|
+
end
|
109
|
+
|
110
|
+
def self.block_size
|
111
|
+
16
|
112
|
+
end
|
113
|
+
|
114
|
+
#
|
115
|
+
# --- RFC 5647 ---
|
116
|
+
# N_MIN minimum nonce (IV) length 12 octets
|
117
|
+
# N_MAX maximum nonce (IV) length 12 octets
|
118
|
+
#
|
119
|
+
def iv_len
|
120
|
+
12
|
121
|
+
end
|
122
|
+
|
123
|
+
#
|
124
|
+
# --- RFC 5288 ---
|
125
|
+
# Each value of the nonce_explicit MUST be distinct for each distinct
|
126
|
+
# invocation of the GCM encrypt function for any fixed key. Failure to
|
127
|
+
# meet this uniqueness requirement can significantly degrade security.
|
128
|
+
# The nonce_explicit MAY be the 64-bit sequence number.
|
129
|
+
#
|
130
|
+
# --- RFC 5116 ---
|
131
|
+
# (2.1) Applications that can generate distinct nonces SHOULD use the nonce
|
132
|
+
# formation method defined in Section 3.2, and MAY use any
|
133
|
+
# other method that meets the uniqueness requirement.
|
134
|
+
#
|
135
|
+
# (3.2) The following method to construct nonces is RECOMMENDED.
|
136
|
+
#
|
137
|
+
# <- variable -> <- variable ->
|
138
|
+
# - - - - - - - - - - - - - -
|
139
|
+
# | fixed | counter |
|
140
|
+
#
|
141
|
+
# Initial octets consist of a fixed field and final octets consist of a
|
142
|
+
# Counter field. Implementations SHOULD support 12-octet nonces in which
|
143
|
+
# the Counter field is four octets long.
|
144
|
+
# The Counter fields of successive nonces form a monotonically increasing
|
145
|
+
# sequence, when those fields are regarded as unsignd integers in network
|
146
|
+
# byte order.
|
147
|
+
# The Counter part SHOULD be equal to zero for the first nonce and increment
|
148
|
+
# by one for each successive nonce that is generated.
|
149
|
+
# The Fixed field MUST remain constant for all nonces that are generated for
|
150
|
+
# a given encryption device.
|
151
|
+
#
|
152
|
+
# --- RFC 5647 ---
|
153
|
+
# The invocation field is treated as a 64-bit integer and is increment after
|
154
|
+
# each invocation of AES-GCM to process a binary packet.
|
155
|
+
# AES-GCM produces a keystream in blocks of 16-octets that is used to
|
156
|
+
# encrypt the plaintext. This keystream is produced by encrypting the
|
157
|
+
# following 16-octet data structure:
|
158
|
+
#
|
159
|
+
# uint32 fixed; // 4 octets
|
160
|
+
# uint64 invocation_counter; // 8 octets
|
161
|
+
# unit32 block_counter; // 4 octets
|
162
|
+
#
|
163
|
+
# The block_counter is initially set to one (1) and increment as each block
|
164
|
+
# of key is produced.
|
165
|
+
#
|
166
|
+
# The reader is reminded that SSH requires that the data to be encrypted
|
167
|
+
# MUST be padded out to a multiple of the block size (16-octets for AES-GCM).
|
168
|
+
#
|
169
|
+
def incr_nonce
|
170
|
+
return if nonce[:fixed].nil?
|
171
|
+
|
172
|
+
nonce[:invocation_counter] = [nonce[:invocation_counter].to_s.unpack1('B*').to_i(2) + 1].pack('Q>*')
|
173
|
+
|
174
|
+
apply_nonce
|
175
|
+
end
|
176
|
+
|
177
|
+
def nonce=(iv_s)
|
178
|
+
return if nonce[:fixed]
|
179
|
+
|
180
|
+
nonce[:fixed] = iv_s[0...4]
|
181
|
+
nonce[:invocation_counter] = iv_s[4...12]
|
182
|
+
|
183
|
+
apply_nonce
|
184
|
+
end
|
185
|
+
|
186
|
+
def apply_nonce
|
187
|
+
cipher.iv = "#{nonce[:fixed]}#{nonce[:invocation_counter]}"
|
188
|
+
end
|
189
|
+
|
190
|
+
#
|
191
|
+
# --- RFC 5647 ---
|
192
|
+
# If AES-GCM is selected as the encryption algorithm for a given
|
193
|
+
# tunnel, AES-GCM MUST also be selected as the Message Authentication
|
194
|
+
# Code (MAC) algorithm. Conversely, if AES-GCM is selected as the MAC
|
195
|
+
# algorithm, it MUST also be selected as the encryption algorithm.
|
196
|
+
#
|
197
|
+
def implicit_mac?
|
198
|
+
true
|
199
|
+
end
|
200
|
+
end
|
201
|
+
end
|
202
|
+
# rubocop:enable Metrics/BlockLength
|
203
|
+
end
|
204
|
+
# rubocop:enable Metrics/AbcSize
|
205
|
+
end
|
206
|
+
end
|
207
|
+
end
|
@@ -8,6 +8,18 @@ module Net
|
|
8
8
|
# The base class of all OpenSSL-based HMAC algorithm wrappers.
|
9
9
|
class Abstract
|
10
10
|
class << self
|
11
|
+
def aead(*v)
|
12
|
+
@aead = false if !defined?(@aead)
|
13
|
+
if v.empty?
|
14
|
+
@aead = superclass.aead if @aead.nil? && superclass.respond_to?(:aead)
|
15
|
+
return @aead
|
16
|
+
elsif v.length == 1
|
17
|
+
@aead = v.first
|
18
|
+
else
|
19
|
+
raise ArgumentError, "wrong number of arguments (#{v.length} for 1)"
|
20
|
+
end
|
21
|
+
end
|
22
|
+
|
11
23
|
def etm(*v)
|
12
24
|
@etm = false if !defined?(@etm)
|
13
25
|
if v.empty?
|
@@ -57,6 +69,10 @@ module Net
|
|
57
69
|
end
|
58
70
|
end
|
59
71
|
|
72
|
+
def aead
|
73
|
+
self.class.aead
|
74
|
+
end
|
75
|
+
|
60
76
|
def etm
|
61
77
|
self.class.etm
|
62
78
|
end
|
@@ -128,7 +128,7 @@ module Net
|
|
128
128
|
payload = client.compress(payload)
|
129
129
|
|
130
130
|
# the length of the packet, minus the padding
|
131
|
-
actual_length = (client.hmac.etm ? 0 : 4) + payload.bytesize + 1
|
131
|
+
actual_length = (client.hmac.etm || client.hmac.aead ? 0 : 4) + payload.bytesize + 1
|
132
132
|
|
133
133
|
# compute the padding length
|
134
134
|
padding_length = client.block_size - (actual_length % client.block_size)
|
@@ -151,7 +151,7 @@ module Net
|
|
151
151
|
debug { "using encrypt-then-mac" }
|
152
152
|
|
153
153
|
# Encrypt padding_length, payload, and padding. Take MAC
|
154
|
-
# from the unencrypted
|
154
|
+
# from the unencrypted packet_length and the encrypted
|
155
155
|
# data.
|
156
156
|
length_data = [packet_length].pack("N")
|
157
157
|
|
@@ -219,7 +219,7 @@ module Net
|
|
219
219
|
# new Packet object.
|
220
220
|
# rubocop:disable Metrics/AbcSize
|
221
221
|
def poll_next_packet
|
222
|
-
aad_length = server.hmac.etm ? 4 : 0
|
222
|
+
aad_length = server.hmac.etm || server.hmac.aead ? 4 : 0
|
223
223
|
|
224
224
|
if @packet.nil?
|
225
225
|
minimum = server.block_size < 4 ? 4 : server.block_size
|
@@ -125,7 +125,7 @@ module Net
|
|
125
125
|
compressor.deflate(data, Zlib::SYNC_FLUSH)
|
126
126
|
end
|
127
127
|
|
128
|
-
#
|
128
|
+
# Decompresses the data. If no compression is in effect, this will just return
|
129
129
|
# the data unmodified, otherwise it uses #decompressor to decompress the data.
|
130
130
|
def decompress(data)
|
131
131
|
data = data.to_s
|
data/lib/net/ssh/version.rb
CHANGED
@@ -49,10 +49,10 @@ module Net
|
|
49
49
|
MAJOR = 7
|
50
50
|
|
51
51
|
# The minor component of this version of the Net::SSH library
|
52
|
-
MINOR =
|
52
|
+
MINOR = 3
|
53
53
|
|
54
54
|
# The tiny component of this version of the Net::SSH library
|
55
|
-
TINY =
|
55
|
+
TINY = 0
|
56
56
|
|
57
57
|
# The prerelease component of this version of the Net::SSH library
|
58
58
|
# nil allowed
|
data/net-ssh-public_cert.pem
CHANGED
@@ -1,20 +1,21 @@
|
|
1
1
|
-----BEGIN CERTIFICATE-----
|
2
|
-
|
3
|
-
|
4
|
-
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
|
9
|
-
|
10
|
-
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
2
|
+
MIIDeDCCAmCgAwIBAgIBATANBgkqhkiG9w0BAQsFADBBMQ8wDQYDVQQDDAZuZXRz
|
3
|
+
c2gxGTAXBgoJkiaJk/IsZAEZFglzb2x1dGlvdXMxEzARBgoJkiaJk/IsZAEZFgNj
|
4
|
+
b20wHhcNMjQwNDAxMDk1NjIxWhcNMjUwNDAxMDk1NjIxWjBBMQ8wDQYDVQQDDAZu
|
5
|
+
ZXRzc2gxGTAXBgoJkiaJk/IsZAEZFglzb2x1dGlvdXMxEzARBgoJkiaJk/IsZAEZ
|
6
|
+
FgNjb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDGJ4TbZ9H+qZ08
|
7
|
+
pQfJhPJTHaDCyQvCsKTFrL5O9z3tllQ7B/zksMMM+qFBpNYu9HCcg4yBATacE/PB
|
8
|
+
qVVyUrpr6lbH/XwoN5ljXm+bdCfmnjZvTCL2FTE6o+bcnaF0IsJyC0Q2B1fbWdXN
|
9
|
+
6Off1ZWoUk6We2BIM1bn6QJLxBpGyYhvOPXsYoqSuzDf2SJDDsWFZ8kV5ON13Ohm
|
10
|
+
JbBzn0oD8HF8FuYOewwsC0C1q4w7E5GtvHcQ5juweS7+RKsyDcVcVrLuNzoGRttS
|
11
|
+
KP4yMn+TzaXijyjRg7gECfJr3TGASaA4bQsILFGG5dAWcwO4OMrZedR7SHj/o0Kf
|
12
|
+
3gL7P0axAgMBAAGjezB5MAkGA1UdEwQCMAAwCwYDVR0PBAQDAgSwMB0GA1UdDgQW
|
13
|
+
BBQF8qLA7Z4zg0SJGtUbv3eoQ8tjIzAfBgNVHREEGDAWgRRuZXRzc2hAc29sdXRp
|
14
|
+
b3VzLmNvbTAfBgNVHRIEGDAWgRRuZXRzc2hAc29sdXRpb3VzLmNvbTANBgkqhkiG
|
15
|
+
9w0BAQsFAAOCAQEAfY2WbsBKwRtBep4l+Y2/84H1BKH9UVOsFxqQzYkvM2LFDyup
|
16
|
+
UkjYf8nPSjg3mquhaiA5KSoSVUPpNDfQo+UvY3+mlxRs96ttWiUGwz27fy82rx1B
|
17
|
+
ZnfKjsWOntemNON6asOD0mtv0xsNBfOB2VNIKW/uqHsiPpa0OaVy5uENhX+5OFan
|
18
|
+
2P1Uy+WcMiv38RlRkn4cdEIZUFupDgKFsguYlaJy473/wsae4exUgc5bvi3Splob
|
19
|
+
1uE/LmB/qWBVSNW8e9KDtJynhDDZBlpESyQHFQCZj6UapzxlnC46LaDncPoAtJPc
|
20
|
+
MlWxJ8mKghIcyXc5y4cSyGypNG5BralqnvQUyg==
|
20
21
|
-----END CERTIFICATE-----
|
data.tar.gz.sig
CHANGED
@@ -1,4 +1,3 @@
|
|
1
|
-
��
|
2
|
-
y
|
3
|
-
|
4
|
-
�Q����Z����{��sn�H��X�@;��[f���y
|
1
|
+
����f�{��c��x�PP��6�.���h�7��Pˑ��ĸ;��$(�
|
2
|
+
X�Q������\�C)�^q�`����ȯ^{u�e ��XA)��A�]�<so�Q��L����R�I�fр��9O�]]��b"e!���� ��#9���k/�?�y�p�-��w�i�;A'&q�NP�o�+mPK8'��cJ��-o�qb&��Dٷ
|
3
|
+
K0�H�ĸ9��/��'M9/��s_5���^�)����߈VN�
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: net-ssh
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 7.
|
4
|
+
version: 7.3.0.rc1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Jamis Buck
|
@@ -12,26 +12,27 @@ bindir: exe
|
|
12
12
|
cert_chain:
|
13
13
|
- |
|
14
14
|
-----BEGIN CERTIFICATE-----
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
15
|
+
MIIDeDCCAmCgAwIBAgIBATANBgkqhkiG9w0BAQsFADBBMQ8wDQYDVQQDDAZuZXRz
|
16
|
+
c2gxGTAXBgoJkiaJk/IsZAEZFglzb2x1dGlvdXMxEzARBgoJkiaJk/IsZAEZFgNj
|
17
|
+
b20wHhcNMjQwNDAxMDk1NjIxWhcNMjUwNDAxMDk1NjIxWjBBMQ8wDQYDVQQDDAZu
|
18
|
+
ZXRzc2gxGTAXBgoJkiaJk/IsZAEZFglzb2x1dGlvdXMxEzARBgoJkiaJk/IsZAEZ
|
19
|
+
FgNjb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDGJ4TbZ9H+qZ08
|
20
|
+
pQfJhPJTHaDCyQvCsKTFrL5O9z3tllQ7B/zksMMM+qFBpNYu9HCcg4yBATacE/PB
|
21
|
+
qVVyUrpr6lbH/XwoN5ljXm+bdCfmnjZvTCL2FTE6o+bcnaF0IsJyC0Q2B1fbWdXN
|
22
|
+
6Off1ZWoUk6We2BIM1bn6QJLxBpGyYhvOPXsYoqSuzDf2SJDDsWFZ8kV5ON13Ohm
|
23
|
+
JbBzn0oD8HF8FuYOewwsC0C1q4w7E5GtvHcQ5juweS7+RKsyDcVcVrLuNzoGRttS
|
24
|
+
KP4yMn+TzaXijyjRg7gECfJr3TGASaA4bQsILFGG5dAWcwO4OMrZedR7SHj/o0Kf
|
25
|
+
3gL7P0axAgMBAAGjezB5MAkGA1UdEwQCMAAwCwYDVR0PBAQDAgSwMB0GA1UdDgQW
|
26
|
+
BBQF8qLA7Z4zg0SJGtUbv3eoQ8tjIzAfBgNVHREEGDAWgRRuZXRzc2hAc29sdXRp
|
27
|
+
b3VzLmNvbTAfBgNVHRIEGDAWgRRuZXRzc2hAc29sdXRpb3VzLmNvbTANBgkqhkiG
|
28
|
+
9w0BAQsFAAOCAQEAfY2WbsBKwRtBep4l+Y2/84H1BKH9UVOsFxqQzYkvM2LFDyup
|
29
|
+
UkjYf8nPSjg3mquhaiA5KSoSVUPpNDfQo+UvY3+mlxRs96ttWiUGwz27fy82rx1B
|
30
|
+
ZnfKjsWOntemNON6asOD0mtv0xsNBfOB2VNIKW/uqHsiPpa0OaVy5uENhX+5OFan
|
31
|
+
2P1Uy+WcMiv38RlRkn4cdEIZUFupDgKFsguYlaJy473/wsae4exUgc5bvi3Splob
|
32
|
+
1uE/LmB/qWBVSNW8e9KDtJynhDDZBlpESyQHFQCZj6UapzxlnC46LaDncPoAtJPc
|
33
|
+
MlWxJ8mKghIcyXc5y4cSyGypNG5BralqnvQUyg==
|
33
34
|
-----END CERTIFICATE-----
|
34
|
-
date: 2024-
|
35
|
+
date: 2024-06-12 00:00:00.000000000 Z
|
35
36
|
dependencies:
|
36
37
|
- !ruby/object:Gem::Dependency
|
37
38
|
name: bcrypt_pbkdf
|
@@ -257,12 +258,15 @@ files:
|
|
257
258
|
- lib/net/ssh/test/remote_packet.rb
|
258
259
|
- lib/net/ssh/test/script.rb
|
259
260
|
- lib/net/ssh/test/socket.rb
|
261
|
+
- lib/net/ssh/transport/aes128_gcm.rb
|
262
|
+
- lib/net/ssh/transport/aes256_gcm.rb
|
260
263
|
- lib/net/ssh/transport/algorithms.rb
|
261
264
|
- lib/net/ssh/transport/chacha20_poly1305_cipher.rb
|
262
265
|
- lib/net/ssh/transport/chacha20_poly1305_cipher_loader.rb
|
263
266
|
- lib/net/ssh/transport/cipher_factory.rb
|
264
267
|
- lib/net/ssh/transport/constants.rb
|
265
268
|
- lib/net/ssh/transport/ctr.rb
|
269
|
+
- lib/net/ssh/transport/gcm_cipher.rb
|
266
270
|
- lib/net/ssh/transport/hmac.rb
|
267
271
|
- lib/net/ssh/transport/hmac/abstract.rb
|
268
272
|
- lib/net/ssh/transport/hmac/md5.rb
|
metadata.gz.sig
CHANGED
Binary file
|