Bitvise SSH Server

helium

Bardzo aktywny
Ekspert
Dołączył
16 Czerwiec 2010
Posty
2205
Reakcje/Polubienia
2584
Miasto
Kraków
Bitvise SSH Server 9.32 [ 20 December 2023 ]

  • Version information:
    • This version continues the upgrade access amnesty introduced in version 9.25, so it can be used with any license that is valid for a previous SSH Server 9.xx version. The minimum upgrade access expiry date to activate this version is January 1, 2022.
    • You can
      Zaloguj lub Zarejestruj się aby zobaczyć!
      . (
      Zaloguj lub Zarejestruj się aby zobaczyć!
      )
  • Security:
    • Terrapin -
      Zaloguj lub Zarejestruj się aby zobaczyć!
      : Researchers have identified an issue where all SSH connections which use the encryption algorithm ChaCha20-Poly1305, or any integrity algorithm of type encrypt-then-MAC, are vulnerable to packet sequence manipulation by an active attacker, if the attacker can intercept the network path. This can be used to sabotage SSH extension negotiation. This affects extensions with security impact, such as server-sig-algs.
      Since the attacker can only remove packets sent before user authentication, this does not seem to fatally break the security of the SSH connection. However, it is a cryptographic weakness to address.
      Bitvise software versions 9.32 and newer support strict key exchange. This is a new SSH protocol feature which mitigates this attack. The SSH client and server must both implement strict key exchange for mitigation to be effective. Other SSH software authors are also releasing new versions to support this.
      If you must interoperate with SSH software which does not support strict key exchange, consider disabling the encryption algorithm ChaCha20-Poly1305, as well as integrity algorithms of type encrypt-then-MAC. These are the newer data integrity protection algorithms whose names contain -etm.
      Bitvise software versions 8.xx and older are not substantially affected because they do not implement algorithms where this issue is practically exploitable. Nevertheless, we suggest updating all SSH software to new versions that support strict key exchange.
      The encryption algorithms aes256-gcm and aes128-gcm are substantially immune from this attack. Users who are committed to older SSH software versions should consider using AES GCM. If this is not possible, the data integrity protection algorithms which are not named -etm are not entirely immune, but are also not believed to be practically exploitable. For compatibility with SSH software which does not support strict key exchange or AES GCM, an algorithm combination such as AES CTR with non-ETM data integrity protection may continue to be acceptable.
  • General:
    • If the SSH Server was configured to accept FTPS connections, but no certificate was employed; or if the employed certificate was not usable because it expired; the SSH Server would stop running and refuse to start, even for SSH connections, until the administrator fixed the certificate issue.
      The SSH Server will now start, and continue running, as long as the configuration allows connections to be handled on at least one SSH or FTPS binding.
  • SSH:
    • When a user authentication banner is entered directly in SSH Server settings, the SSH Server will no longer strip leading and trailing whitespace. If the banner does not end with a newline, the SSH Server will now append it. This avoids OpenSSH displaying the last line incorrectly.
  • Email notifications:
    • Further improved error messages when SMTP sending fails.
  • Settings:
    • When a list of address accept rules was imported from CSV using the options Import blocked IPs or Import permitted IPs, IP address ranges were imported incorrectly. Fixed.
  • File transfer:
    • When using a mount point of type Another SFTP server, the other SFTP server may support SFTP protocol version 5 or higher, but not SFTP v5+ file locking. In this case, the SSH Server now strips file open block flags sent by the client if the block flags include SSH_FXF_BLOCK_ADVISORY.
      As in previous versions, it is possible to always strip block flags by configuring mount point settings:
      File sharing behavior: Force File sharing for uploads: Read, Write, Delete File sharing for downloads: Read, Write, Delete
    • When using a mount point of type Another SFTP server, and the other server uses SFTP v3, the SSH Server now lets an SFTP v4+ client set a file modification time without having to also include the last access time.
    • The SSH Server now logs most SFTP flags and bits as human-readable strings instead of hexadecimal values.
  • FTPS:
    • The SSH Server would replace non-US-ASCII bytes with "." when sending reply lines on the FTP control connection. To improve compatibility with clients, the SSH Server now preserves UTF-8 (which may appear in directory names) in FTP control connection replies.

Zaloguj lub Zarejestruj się aby zobaczyć!
 

Camel1965

Bardzo aktywny
Zasłużony
Dołączył
8 Wrzesień 2010
Posty
41720
Reakcje/Polubienia
35286

Bitvise 9.34

Security Clarification: [ April 2024 ]


  • We are receiving inquiries about whether our software is affected by the recent XZ Utils backdoor described in CVE-2024-3094.
    Bitvise software does not use XZ Utils and is not affected by this issue.

Changes in Bitvise SSH Client 9.34: [ 11 April 2024 ]


  • Installation:
    • When installing using command-line parameters, the -autoUpdates parameter could previously be used only to disable automatic updates. It now also supports other values (stronglyRecommended, recommended or allAvailable).
    • The FlowSshNet library, an optional SSH/SFTP scripting feature included with the SSH Client, now uses the Universal C Runtime. This allows the SSH Client to no longer include the outdated Visual C++ 2010 CRT. As a result, FlowSshNet is now installed only on Windows 7 SP1 or newer. (Previously, this feature was compatible with Windows Vista or newer.)
    • SFTP drive:
      • Updated the WinFsp version included with the SSH Client to 2.0.23075.
      • Improved the WinFsp installation process.
  • SSH:
    • When connecting through an SSH jump proxy, interactive authentication methods can now be used to authenticate against the jump proxy. Previously, only pre-configured (unattended) authentication could be used.
    • When the SSH Client fails to connect to a server, the error message now contains more detailed information about IP addresses to which the client attempted to connect.
  • stermc:
    • In certain versions of Windows, the Windows function ScrollConsoleScreenBufferW fails if the destination coordinate is the same as the origin. This would cause previous stermc versions to exit with an error. Fixed.
  • sftpc:
    • The sftpc command-line client now supports new get/put command parameters:
      • -rv: Resume verifiably. Acts like -r for Resume, but does not resume unless the server supports synchronization using block-by-block hashing. This avoids corruption which is possible if heuristic resume detects the file can be resumed, but there are subtle changes in the middle of the file.
      • -noSync: Disables synchronization using block-by-block hashing, even if the server supports it. This can be used with -r to achieve a faster heuristic resume, but corruption is possible if there are subtle changes in the middle of the file.
      • -noBuf[=y|n]: If the server supports the extended SFTP attribute no-buffering@bitvise.com, this allows the user to express a preference whether the server should open the file for unbuffered I/O.
  • SFTP:
    • The graphical SFTP interface now remembers its maximization state.
    • The graphical SFTP interface now offers an option to clear recent folder history.
    • When using cut & paste (rather than copy & paste) between Local and Remote panes, files are now moved instead of copied.
    • In both graphical SFTP and sftpc, the Resume and Overwrite options are now once again available separately, even if the server supports synchronization using block-by-block hashing. This allows the user to express a preference to resume a file, but only if the partial destination file is unchanged relative to the source.
    • When uploading, the SSH Client now includes the extended SFTP attribute intended-size@bitvise.com to communicate the final intended size of the file. This can help detect and diagnose incomplete transfers.
    • The mirror feature would incorrectly remove destination files after they were mirrored, if the file names were present in the destination with a different case than in the source. Fixed.
    • The mirror feature now supports a fast skip option which attempts to skip files which are present in both source and destination with the same size and last modification time. This can dramatically improve the speed of large mirror transfers where most files are unchanged, but at the cost of not verifying the content of skipped files.
Zaloguj lub Zarejestruj się aby zobaczyć!
 

helium

Bardzo aktywny
Ekspert
Dołączył
16 Czerwiec 2010
Posty
2205
Reakcje/Polubienia
2584
Miasto
Kraków
Bitvise SSH Server 9.36 [ 17 April 2024 ]

  • SFTP:
    • Version 9.34 added logic to ensure SFTP responses are sent in the same order requests are received. Due to an oversight, the SSH Server's file transfer subsystem would hang, most readily if a client sent consecutive SFTP requests with the same request ID. This was observed with WS_FTP (version 12.9) and also with phpseclib. Fixed.
    • The SSH Server now implements the SFTP extended request fsync@openssh.com for files opened with unbuffered I/O.

Zaloguj lub Zarejestruj się aby zobaczyć!
 

helium

Bardzo aktywny
Ekspert
Dołączył
16 Czerwiec 2010
Posty
2205
Reakcje/Polubienia
2584
Miasto
Kraków
Bitvise SSH Server 9.37 [ 4 May 2024 ]

  • Control Panel and Settings:
    • If the Windows setting Roll the mouse wheel to scroll was set to One screen at a time, the SSH Server Control Panel would exit abruptly when attempting to scroll. Full page mouse wheel scrolling is now supported.
    • On Windows XP and Windows Server 2003, the Custom events interface in Advanced settings and the list on the Statistics tab did not display text for searchable columns. Fixed.
    • When the SSH Server Control Panel was opened displaying the Server tab, it would cause Windows to log repeated audit events about enumerating group membership for the SSH Server's BvSsh_VirtualUsers account. Fixed.
  • Logging:
    • Connection disconnect log events now include information about connection duration, so it does not need to be calculated by finding the matching connection accept event.
  • SFTP:
    • Version 9.34 introduced an inconsistency in how the SSH Server responds to SSH_FXP_READ requests which attempt to read past end-of-file. When processing a single such request, the SSH Server would send SSH_FXP_STATUS with SSH_FX_EOF; but when responding to consolidated requests, the SSH Server could send SSH_FXP_DATA with empty data. When using SFTP v6, the end-of-file flag would also be set, but this flag is not present in SFTP v3 and v4. This broke file transfers using some clients, specifically the Perl mesh client (based on Net::SFTP).
      The SSH Server again consistently responds to past-end-of-file SSH_FXP_READ requests by sending SSH_FXP_STATUS with SSH_FX_EOF.

Zaloguj lub Zarejestruj się aby zobaczyć!
 

Camel1965

Bardzo aktywny
Zasłużony
Dołączył
8 Wrzesień 2010
Posty
41720
Reakcje/Polubienia
35286

Bitvise SSH Server 9.38​

Jun 7, 2024
  • SFTP:
  • If the SFTP server does not send an exit code, the OpenSSH SFTP client returns exit code -1 instead of 0. This has become noticeable in newer OpenSSH versions, where scp now uses SFTP by default, and the change in exit code breaks scripts.
  • To accommodate this client behavior, the SSH Server now sends an exit code for the SFTP subsystem.
Zaloguj lub Zarejestruj się aby zobaczyć!
 

helium

Bardzo aktywny
Ekspert
Dołączył
16 Czerwiec 2010
Posty
2205
Reakcje/Polubienia
2584
Miasto
Kraków
Bitvise SSH Server 9.39 [ 2 August 2024 ]

  • General:
    • In a niche situation where the SSH Server cannot initialize the Windows logon session with the user's environment block, the first connection which creates the Windows logon session would still succeed; it falls back to the system environment block. However, if Windows session sharing is enabled, subsequent connections attempting to reuse the Windows logon session would fail, instead of continuing to fall back to the system environment block. Fixed.
  • File transfer:
    • If a user was configured with a virtual filesystem layout with more than one mount point, then if permitted by Windows filesystem permissions, the SSH Server would allow the user to rename the mount path of one of the mount points, moving that entire mount point inside another mount point. The SSH Server no longer allows this, even if permitted by Windows filesystem permissions.
    • When renaming a file or directory on a mount point backed by another SFTP server, the SSH Server would translate a standard SSH rename request into a POSIX rename request, which many servers cannot process. Fixed.

Zaloguj lub Zarejestruj się aby zobaczyć!
 
Do góry