SSH2 Module for Python
Paramiko is a module for python 2.2 (or higher) that implements the
SSH2 protocol for secure (encrypted and authenticated) connections to
remote machines.
Unlike SSL (aka TLS), the SSH2 protocol does not require hierarchical
certificates signed by a powerful central authority. you may know SSH2
as the protocol that replaced telnet and rsh for secure access to
remote shells, but the protocol also includes the ability to open
arbitrary channels to remote services across the encrypted tunnel --
this is how sftp works, for example.
It is written entirely in python (no C or platform-dependent code) and
is released under the GNU LGPL (lesser GPL).
- Developed at devel:languages:python
-
8
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory/python-paramiko && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
paramiko-3.3.1.tar.gz | 0001270242 1.21 MB | |
paramiko-test_extend_timeout.patch | 0000000540 540 Bytes | |
python-paramiko.changes | 0000046668 45.6 KB | |
python-paramiko.spec | 0000003577 3.49 KB | |
remove-icecream-dep.patch | 0000000818 818 Bytes |
Revision 60 (latest revision is 64)
Ana Guerrero (anag+factory)
accepted
request 1116019
from
Dirk Mueller (dirkmueller)
(revision 60)
* [Feature] #1951: Add SSH config token expansion (eg %h, %p) when * [Support] #2004: (via #2011) Apply unittest skipIf to tests currently using SHA1 in their critical path, to avoid failures on systems starting * [Support] #1838: (via #1870/#2028) Update camelCase method calls against the threading module to be snake_case; this and related tweaks * [Support] #2038: (via #2039) Recent versions of Cryptography have deprecated Blowfish algorithm support; in lieu of an easy method for users to remove it from the list of algorithms Paramiko tries to import and use, we’ve decided to remove it from our “preferred algorithms” list. This will both discourage use of a weak algorithm, and avoid warnings. * [Bug] #2017: OpenSSH 7.7 and older has a bug preventing it from understanding how to perform SHA2 signature verification for RSA certificates (specifically certs - not keys), so when we added SHA2 support it broke all clients using RSA certificates with these servers. This has been fixed in a manner similar to what OpenSSH’s own client does: a version check is performed and the algorithm used is downgraded * [Bug] #1933: Align signature verification algorithm with OpenSSH re: zero-padding signatures which don’t match their nominal size/length. This shouldn’t affect most users, but will help Paramiko-implemented SSH - Update to 2.10.3 (bsc#1197279, CVE-2022-24302) - [Feature] #1846: Add a prefetch keyword argument to - [Support] #1727: Add missing test suite fixtures directory to - Set environment to utf-8 to allow tests to pass on Python 2. (bsc#1178341) * gh#paramiko/paramiko#1655 - update to 2.7.2 (bsc#1166758, bsc#1166758, bsc#1205132) - update to 2.6.0 (bsc#1200603) - update to 2.5.0 extend timeout in testsuite to pass on ppc64le key-decryption passphrases from password-auth passwords. * Certificate support broke the no-certificate case for Ed25519 keys
Comments 0