⚡ Security
- No security fixes since previous release
- Oldest release with no known security issue is
v3.14.15
(2023-11-08)
💡 Highlights
This release drops official support for Debian 10, whose LTS support has ended in June 2024.
We now support the new Debian 13 stable (Trixie), and as a side effect, compatibility with other untested Linux distributions
using OpenSSH >= 10.0 should also be better.
We took this opportunity to clean up compatibility code for long unsupported systems (such as NetBSD, OpenBSD), and enhance
support for FreeBSD, particularly (but not exclusively) on satellite cron scripts.
A few bugs were also squished: a more complete list of changes can be found below,
for an exhaustive (and boring) list, please refer to the commit log.
📌 Changes
- chg: deprecate Debian 10, support Debian 13 (Trixie)
- enh: scp: add more scp options to the wrapper
- fix: FreeBSD: add missing package for interactive mode (close #548)
- fix: better FreeBSD compatibility for cron scripts (#550)
- fix:
groupAddServer
: don't ignore --force-key (close #561) - fix: logic error validating idle(Lock|Kill)Timeout config values (close #549)
- fix: ping max deadline is 3600 on FreeBSD (close #547)
- fix: recent versions of sshd have a separate sshd-session $0
- fix: remove tests for DSA keys, compiled out of recent OpenSSH versions
- fix: scp/sftp: handle case where TMPDIR is mounted in noexec (#569)
- fix: sftp wrapper: handle -P properly (close #553)
- fix: supported key algorithms detection for OpenSSH >= 10
- fix: tests: better detect faulty modules syntax
- fix: tests: FreeBSD: proper reload of recent sshd
- fix: tests: more robust sshd reloading across OSes
- fix: tests: remove support for MD5 fingerprints