Commit 306a7c20 authored by Niels Möller's avatar Niels Möller
Browse files

*** empty log message ***

Rev: ChangeLog:1.509
Rev: NEWS:1.98
parent 4e97e9b9
......@@ -17,9 +17,8 @@ o Random numbers are generated using the Yarrow pseudorandomness
o Both lsh and lshd now expire session keys and performs
key-reexchange regularly.
o AES is now the default cipher. A faster assembler version for sparc
is included. x86 code is included as well, but it needs some more
work before it can be enabled.
o AES is now the default cipher. Faster assembler versions are
included for x86 and sparc.
o Client and server support for subsystems.
......@@ -86,7 +85,7 @@ LSH is provided AS IS, ABSOLUTELY no GUARANTEES, etc. Please report
any bugs you find.
LSH is distributed under the terms and conditions of the GNU General
Public License. Unlike some other secsh implementations, you can use
2002-06-04 Niels Mller <>
* src/rsa.c (do_rsa_public_spki_key): Reverted the 2001-01-24
change "rsa-pkcs1-sha1" -> "rsa-pkcs1".
* src/testsuite/conv-2-test, src/testsuite/conv-3-test: Updated
2002-05-30 Pontus Skld <>
* src/server_session.c (init_spawn_info): Require more entries
News for the 1.4 release
In 1.3.6, there was an incompatible change to the rsa key
format, you probably want to pass your keys through
`sexp-conv --replace=%rsa-pkcs1-sha1%rsa-pkcs1% -f transport'
format. This change has been reverted for 1.4. You may want to
pass your keys through `sexp-conv
--replace=%rsa-pkcs1%rsa-pkcs1-sha1% -f transport'
lshd now sets SSH_CLIENT and SSH_TTY (if appropiate).
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment