[mdlug] [Fwd: PuTTY 0.68 is released]

Carl T. Miller carl at carltm.com
Tue Feb 21 15:43:05 EST 2017


FYI, there's been an update to putty.

c


---------------------------- Original Message ----------------------------
Subject: PuTTY 0.68 is released
From:    "Simon Tatham" <anakin at pobox.com>
Date:    Tue, February 21, 2017 1:59 pm
To:      "putty-announce" <putty-announce at lists.tartarus.org>
--------------------------------------------------------------------------

PuTTY version 0.68 is released
------------------------------

All the pre-built binaries, and the source code, are now available
from the PuTTY website at

    http://www.chiark.greenend.org.uk/~sgtatham/putty/

This is mostly a feature update, but it also includes security fixes:

 - Fixed a security vulnerability in the agent forwarding code. An
   agent forwarding client could overwrite PuTTY's memory by sending a
   particular kind of illegally formatted message. However, that is
   less worrying than it sounds, because if a hostile client can
   access your agent forwarding then you have other problems anyway!

 - Fixed the widespread DLL hijacking issue seen in many Windows
   programs. PuTTY should no longer accidentally load DLLs with
   special names like 'ntmarta.dll' if they are in the same directory
   as its executable file.

 - Enabled some system security features in Windows PuTTY: Address
   Space Layout Randomisation and Data Execution Prevention.

If any of those concerns you, you should upgrade as soon as possible.

We have also turned *off* (by default) the previous security feature
in which Windows PuTTY restricted its process ACL to make it harder
for malware to inject code into a running PuTTY. This feature was
causing too much assorted trouble with legitimate processes trying to
interoperate with PuTTY, ranging from screen reader software such as
NVDA to programs using Plink as a transport such as TortoiseGit. So
it's now off by default, but you can re-enable it using the
command-line option '-restrict-acl'.

That's enough about security. We also have lots of new features in
PuTTY 0.68:

 - Support for elliptic-curve cryptography. PuTTY now supports public
   and private keys using the Ed25519 signature algorithm, and also
   the ECDSA algorithm using the three standard NIST curves. These
   keys are supported for both user authentication and as host keys.
   Also, elliptic-curve key exchange with both sets of curves is
   supported (called 'Curve25519' and 'ECDH' respectively).

 - PuTTYgen can now import and export keys in OpenSSH's newer file
   format. (This is necessary for elliptic curve keys, but older key
   algorithms like RSA are sometimes stored in the new format too.)

 - When connecting to a server, PuTTY will now automatically prefer to
   use a host key it already knows. But once you're connected, it also
   has a new option to download the server's other host keys securely
   over its existing connection and add them to its database so it can
   use them next time. So if you want to upgrade to using elliptic-
   curve keys for your existing servers, you can do that, and if you
   don't care, then PuTTY shouldn't bother you about it.

 - Windows: we are now offering a 64-bit version of PuTTY! This is
   less well tested (so far), but it does its cryptography faster
   during connection setup, and it can also load 64-bit DLLs if you
   need that for some reason (e.g. GSSAPI).

 - Unix: the Unix GUI tools can now be built with GTK version 3, which
   offers improved font rendering and better support for precise
   trackpad scrolling.

 - Unix: we now have a Unix version of Pageant.

Enjoy using PuTTY!

Cheers,
Simon

-- 
for k in [pow(x,37,0x1a1298d262b49c895d47f) for x in [0x50deb914257022de7fff,
0x213558f2215127d5a2d1, 0x90c99e86d08b91218630, 0x109f3d0cfbf640c0beee7,
0xc83e01379a5fbec5fdd1, 0x19d3d70a8d567e388600e, 0x534e2f6e8a4a33155123]]:
 print "".join([chr(32+3*((k>>x)&1))for x in range(79)]) # <anakin at pobox.com>

_______________________________________________
PuTTY-announce mailing list
PuTTY-announce at lists.tartarus.org
https://lists.tartarus.org/mailman/listinfo/putty-announce




More information about the mdlug mailing list