Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

Asynchronous inputs are at the root of our race problems. -- D. Winker and F. Prosser


devel / comp.security.ssh / PuTTY 0.80 is released

SubjectAuthor
o PuTTY 0.80 is releasedSimon Tatham

1
PuTTY 0.80 is released

<81v88vzfz5.fsf@thyestes.tartarus.org>

  copy mid

https://www.rocksolidbbs.com/devel/article-flat.php?id=231&group=comp.security.ssh#231

  copy link   Newsgroups: comp.security.ssh
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!newsfeed.xs3.de!nntp-feed.chiark.greenend.org.uk!ewrotcd!.POSTED.chiark.greenend.org.uk!not-for-mail
From: anakin@pobox.com (Simon Tatham)
Newsgroups: comp.security.ssh
Subject: PuTTY 0.80 is released
Date: Mon, 18 Dec 2023 15:29:34 +0000
Message-ID: <81v88vzfz5.fsf@thyestes.tartarus.org>
Mime-Version: 1.0
Content-Type: text/plain
Injection-Info: chiark.greenend.org.uk; posting-host="chiark.greenend.org.uk:212.13.197.229";
logging-data="16334"; mail-complaints-to="abuse@chiark.greenend.org.uk"
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux)
Cancel-Lock: sha1:l54Q2pI4SP8I2dmTr7KDFlZRaeU=
Originator: simon@tunnel.thyestes.tartarus.org ([172.31.80.4])
 by: Simon Tatham - Mon, 18 Dec 2023 15:29 UTC

PuTTY version 0.80 is released
------------------------------

All the pre-built binaries, and the source code, are now available
from the PuTTY website at

https://www.chiark.greenend.org.uk/~sgtatham/putty/

This is a SECURITY UPDATE. We recommend that _everybody_ upgrade, as
soon as possible.

There is one security fix in this release:

- Fix for a newly discovered security issue known as the 'Terrapin'
attack, also numbered CVE-2023-48795. The issue affects widely-used
OpenSSH extensions to the SSH protocol: the ChaCha20+Poly1305
cipher system, and 'encrypt-then-MAC' mode.

In order to benefit from the fix, you must be using a fixed version
of PuTTY _and_ a server with the fix, so that they can agree to
adopt a modified version of the protocol. Alternatively, you may be
able to reconfigure PuTTY to avoid selecting any of the affected
modes.

If PuTTY 0.80 connects to an SSH server without the fix, it will
warn you if the initial protocol negotiation chooses an insecure
mode to run the connection in, so that you can abandon the
connection. If it's possible to alter PuTTY's configuration to
avoid the problem, then the warning message will tell you how to do
it.

As well as this security fix, there are two other ordinary bug fixes
in 0.80:

- On Windows, if you installed the MSI package, PuTTY could not find
its help file. The help file was installed, but PuTTY wouldn't be
able to open it, so the help buttons in its dialog boxes were
missing.

- Sometimes, if you were looking at the terminal scrollback, the view
position would be reset to the bottom of the scrollback unwantedly,
if the server sent terminal output that didn't actually cause
anything to be printed.

Enjoy using PuTTY!

--
for k in [pow(x,37,0x1a1298d262b49c895d47f) for x in [0x50deb914257022de7fff,
0x213558f2215127d5a2d1, 0x90c99e86d08b91218630, 0x109f3d0cfbf640c0beee7,
0xc83e01379a5fbec5fdd1, 0x19d3d70a8d567e388600e, 0x534e2f6e8a4a33155123]]:
print("".join([chr(32+3*((k>>x)&1))for x in range(79)])) # <anakin@pobox.com>

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor