SSH2 Module for Python

Edit Package python-paramiko

Paramiko is a module for python 2.2 (or higher) that implements the
SSH2 protocol for secure (encrypted and authenticated) connections to
remote machines.

Unlike SSL (aka TLS), the SSH2 protocol does not require hierarchical
certificates signed by a powerful central authority. you may know SSH2
as the protocol that replaced telnet and rsh for secure access to
remote shells, but the protocol also includes the ability to open
arbitrary channels to remote services across the encrypted tunnel --
this is how sftp works, for example.

It is written entirely in python (no C or platform-dependent code) and
is released under the GNU LGPL (lesser GPL).

Refresh
Refresh
Source Files
Filename Size Changed
paramiko-3.3.1.tar.gz 0001270242 1.21 MB
paramiko-test_extend_timeout.patch 0000000540 540 Bytes
python-paramiko.changes 0000046668 45.6 KB
python-paramiko.spec 0000003577 3.49 KB
remove-icecream-dep.patch 0000000818 818 Bytes
Revision 60 (latest revision is 64)
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1116019 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 60)
  * [Feature] #1951: Add SSH config token expansion (eg %h, %p) when
  * [Support] #2004: (via #2011) Apply unittest skipIf to tests currently
    using SHA1 in their critical path, to avoid failures on systems starting
  * [Support] #1838: (via #1870/#2028) Update camelCase method calls
    against the threading module to be snake_case; this and related tweaks
  * [Support] #2038: (via #2039) Recent versions of Cryptography have
    deprecated Blowfish algorithm support; in lieu of an easy method for
    users to remove it from the list of algorithms Paramiko tries to import
    and use, we’ve decided to remove it from our “preferred algorithms” list.
    This will both discourage use of a weak algorithm, and avoid warnings.
  * [Bug] #2017: OpenSSH 7.7 and older has a bug preventing it from
    understanding how to perform SHA2 signature verification for RSA
    certificates (specifically certs - not keys), so when we added SHA2
    support it broke all clients using RSA certificates with these servers.
    This has been fixed in a manner similar to what OpenSSH’s own client
    does: a version check is performed and the algorithm used is downgraded
  * [Bug] #1933: Align signature verification algorithm with OpenSSH re:
    zero-padding signatures which don’t match their nominal size/length. This
    shouldn’t affect most users, but will help Paramiko-implemented SSH
- Update to 2.10.3 (bsc#1197279, CVE-2022-24302)
  - [Feature] #1846: Add a prefetch keyword argument to
  - [Support] #1727: Add missing test suite fixtures directory to
- Set environment to utf-8 to allow tests to pass on Python 2. (bsc#1178341)
  * gh#paramiko/paramiko#1655
- update to 2.7.2 (bsc#1166758, bsc#1166758, bsc#1205132)
- update to 2.6.0 (bsc#1200603)
- update to 2.5.0
  extend timeout in testsuite to pass on ppc64le
     key-decryption passphrases from password-auth passwords.
  * Certificate support broke the no-certificate case for Ed25519 keys
Comments 0
openSUSE Build Service is sponsored by