Copssh Client

Copssh client changelog

Release history grouped from the itefix master release export.

Back to software index

Latest release summary

FieldValue
SoftwareCopssh client
Latest releaseCopssh client 8.3.0
Release date2025-11-03

Latest release components

component namecomponent versioncomponent license
OpenSSH10.2p1OpenSSH license
OpenSSL3.0.18OpenSSL license
Cygwin3.6.5Cygwin license (GPL/LGPL)
Autossh1.4fAutossh license (Simplified BSD)
Copssh client8.3.0Itefix free software license (Simplified BSD)

Changelog history

2025-11-03 Copssh client 8.3.0

  • OpenSSH 10.2p
  • Cygwin 3.6.5
  • OpenSSL 3.0.18

2025-09-05 Copssh client 8.2.2

  • All binaries are digitally signed with our Windows code signing certificate.

2025-07-23 Copssh client 8.2.1

  • OpenSSH 10.0p2
  • OpenSSL 3.0.17
  • Cygwin 3.6.4

2025-04-14 Copssh client 8.2.0

  • OpenSSH 10.0p1
  • OpenSSL 3.0.16
  • Cygwin 3.6.1
  • Updated GNU tools

2025-02-19 Copssh client 8.1.0 (security)

  • OpenSSH 9.9p2 with security patches

2025-01-12 Copssh client 8.0.1

  • Autossh support
  • Cygwin 3.5.5

2024-11-25 Copssh client 8.0.0

  • OpenSSH 9.9p1
  • OpenSSL 3.0.15
  • Cygwin 3.5.4
  • support for ssh-copy-id tool, recipe start a bash prompt (bash –login)
  • run ssh-copy-id as usual

2024-07-31 Copssh client 7.15.0

  • OpenSSH 9.8p1
  • Switch to OpenSSL (3.0.14)

2024-06-26 Copssh client 7.14.3

  • LibreSSL 3.9.2
  • Cygwin 3.5.3

2024-04-09 Copssh client 7.14.2

  • LibreSSL 3.9.1

2024-03-13 Copssh client 7.14.1

  • LibreSSL 3.8.3

2024-03-11 Copssh client 7.14.0

  • OpenSSH 9.7p1
  • Cygwin 3.4.10

2023-12-19 Copssh client 7.13.0 (security)

  • OpenSSH 9.6p1

2023-12-04 Copssh client 7.12.1

  • LibreSSL 3.8.2

2023-10-09 Copssh client 7.12.0

    • OpenSSH 9.5p1 OpenSSH 9.5 was released on 2023-10-04. It is available from the mirrors listed at https://www.openssh.com/ . OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested snapshots or donated to the project. More information on donations may be found at: https://www.openssh.com/donations.html Changes since OpenSSH 9.4 ========================= This release fixes a number of bugs and adds some small features. Potentially incompatible changes ——————————– * ssh-keygen(1): generate Ed25519 keys by default. Ed25519 public keys are very convenient due to their small size. Ed25519 keys are specified in RFC 8709 and OpenSSH has supported them since version 6.5 (January 2014). * sshd(8): the Subsystem directive now accurately preserves quoting of subsystem commands and arguments. This may change behaviour for exotic configurations, but the most common subsystem configuration (sftp-server) is unlikely to be affected. New features ———— * ssh(1): add keystroke timing obfuscation to the client. This attempts to hide inter-keystroke timings by sending interactive traffic at fixed intervals (default: every 20ms) when there is only a small amount of data being sent. It also sends fake “chaff” keystrokes for a random interval after the last real keystroke. These are controlled by a new ssh_config ObscureKeystrokeTiming keyword. * ssh(1), sshd(8): Introduce a transport-level ping facility. This adds a pair of SSH transport protocol messages SSH2_MSG_PING/PONG to implement a ping capability. These messages use numbers in the “local extensions” number space and are advertised using a “ping@openssh.com ” ext-info message with a string version number of “0”. * sshd(8): allow override of Subsystem directives in sshd Match blocks. Bugfixes ——– * scp(1): fix scp in SFTP mode recursive upload and download of directories that contain symlinks to other directories. In scp mode, the links would be followed, but in SFTP mode they were not. bz3611 * ssh-keygen(1): handle cr+lf (instead of just cr) line endings in sshsig signature files. * ssh(1): interactive mode for ControlPersist sessions if they originally requested a tty. * sshd(8): make PerSourceMaxStartups first-match-wins * sshd(8): limit artificial login delay to a reasonable maximum (5s) and don’t delay at all for the “none” authentication mechanism.cw bz3602 * sshd(8): Log errors in kex_exchange_identification() with level verbose instead of error to reduce preauth log spam. All of those get logged with a more generic error message by sshpkt_fatal(). * sshd(8): correct math for ClientAliveInterval that caused the probes to be sent less frequently than configured. * ssh(1): fix regression in OpenSSH 9.4 (mux.c r1.99) that caused multiplexed sessions to ignore SIGINT under some circumstances. Portability ———– * Avoid clang zero-call-used-regs=all bug on Apple compilers, which for some reason have version numbers that do not match the upstream clang version numbers. bz#3584 * Fix configure test for zlib 1.3 and later/development versions. bz3604 Checksums: ========== - SHA1 (openssh-9.5.tar.gz) = 8a0bd3a91fac338d97d91817af58df731f6509a3 - SHA256 (openssh-9.5.tar.gz) = sVMxeM3d6g65qBMktJIofxmK4Ipg9dblKif0VnhPeO0= - SHA1 (openssh-9.5p1.tar.gz) = 35c16dcc6e7d0a9465faa241476ef24f76b196cc - SHA256 (openssh-9.5p1.tar.gz) = 8Cbnt5un+1QPdRgq+W3IqPHbOV+SK7yfbKYDZyaGCGs= Please note that the SHA256 signatures are base64 encoded and not hexadecimal (which is the default for most checksum tools). The PGP key used to sign the releases is available from the mirror sites: https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/RELEASE_KEY.asc Reporting Bugs: =============== - Please read https://www.openssh.com/report.html Security bugs should be reported directly to openssh@openssh.com

2023-09-21 Copssh client 7.11.1

    • Cygwin 3.4.9

2023-08-11 Copssh client 7.11.0

    • OpenSSH 9.4p1

2023-07-26 Copssh client 7.10.2 (security)

    • OpenSSH 9.3p2

2023-07-04 Copssh client 7.10.1

    • Cygwin 3.4.7 - LibreSSL 3.7.3

2023-03-21 Copssh client 7.10.0 (security)

    • OpenSSH 9.3p Changes since OpenSSH 9.2 ========================= This release fixes a number of security bugs. Security ======== This release contains fixes for a security problem and a memory safety problem. The memory safety problem is not believed to be exploitable, but we report most network-reachable memory faults as security bugs. * ssh-add(1) : when adding smartcard keys to ssh-agent(1) with the per-hop destination constraints (ssh-add -h …) added in OpenSSH 8.9, a logic error prevented the constraints from being communicated to the agent. This resulted in the keys being added without constraints. The common cases of non-smartcard keys and keys without destination constraints are unaffected. This problem was reported by Luci Stanescu. * ssh(1) : Portable OpenSSH provides an implementation of the getrrsetbyname(3) function if the standard library does not provide it, for use by the VerifyHostKeyDNS feature. A specifically crafted DNS response could cause this function to perform an out-of-bounds read of adjacent stack data, but this condition does not appear to be exploitable beyond denial-of- service to the ssh(1) client. The getrrsetbyname(3) replacement is only included if the system’s standard library lacks this function and portable OpenSSH was not compiled with the ldns library (–with-ldns). getrrsetbyname(3) is only invoked if using VerifyHostKeyDNS to fetch SSHFP records. This problem was found by the Coverity static analyzer. - LibreSSL 3.6.2

2023-02-03 Copssh client 7.9.0 (security)

    • OpenSSH 9.2p - Cygwin 3.4.5

2022-11-07 Copssh client 7.8.0

  • OpenSSH 9.1p
  • LibreSSL 3.6.1
  • Cygwin 3.3.6

2021-12-12 Copssh client 7.7.0

  • OpenSSH 8.8p
  • LibreSSL 3.4.1
  • Cygwin 3.3.2

2021-09-18 Copssh client 7.6.0

  • OpenSSH 8.7p
  • LibreSSL 3.3.3
  • Cygwin 3.2.0

2021-03-07 Copssh client 7.5.0

  • OpenSSH 8.5p
  • LibreSSL 3.2.4

2020-12-29 Copssh client 7.4.1

  • LibreSSL 3.2.3