Path to this page:
./
security/putty,
Free implementation of Telnet and SSH for Win32 and Unix platforms
Branch: CURRENT,
Version: 0.83,
Package name: putty-0.83,
Maintainer: pkgsrc-usersPuTTY is a client program for the SSH, Telnet and Rlogin network protocols.
These protocols are all used to run a remote session on a computer, over a
network. PuTTY implements the client end of that session: the end at which
the session is displayed, rather than the end at which it runs.
Required to run:[
x11/gtk3]
Required to build:[
pkgtools/x11-links] [
x11/xcb-proto] [
x11/fixesproto4] [
pkgtools/cwrappers] [
x11/xorgproto]
Package options: inet6
Master sites:
Filesize: 2936.697 KB
Version history: (Expand)
- (2025-02-11) Updated to version: putty-0.83
- (2024-12-27) Updated to version: putty-0.82nb1
- (2024-12-12) Updated to version: putty-0.82
- (2024-11-17) Updated to version: putty-0.81nb2
- (2024-10-20) Updated to version: putty-0.81nb1
- (2024-04-16) Updated to version: putty-0.81
CVS history: (Expand)
2025-02-11 11:28:46 by Ryo ONODERA | Files touched by this commit (2) |  |
Log message:
security/putty: Update to 0.83
Changelog:
0.83 is mostly a bug-fix release, but there are also two new features:
- In SSH, we now support key exchange using the post-quantum
algorithm "ML-KEM", recently standardised by NIST. This is our
second supported post-quantum algorithm, in addition to NTRU Prime
which has been in PuTTY since 0.78. At present, both algorithms are
run in parallel with an existing classical algorithm, just in case.
- On Windows, all of the PuTTY tools' file selector dialogs now
support Unicode file names which don't fit into the system code
page. (But like the rest of the recent Unicode additions, such
filenames still can't reliably be stored in saved sessions.)
Bug fixes in this release include:
- PSFTP's command line option '-b', for handling batch files of PSFTP
commands, was completely broken in 0.82 as a side effect of Unicode
support work. It's now fixed again.
- PuTTY could fail an assertion if an SSH server timed out your
connection while you were still at the login prompt, and then you
selected 'Restart Session'.
- Pageant could crash if you loaded a key into it still encrypted,
started an SSH connection which caused Pageant to prompt for the
key's passphrase, and then abandoned the SSH connection before
entering the passphrase.
- PuTTY could go into a tight loop, consuming CPU and not responding,
if you configured the terminal answerback to the empty string.
- Text entered into some edit boxes in the GUI configuration dialog
was accidentally truncated to 127 characters before writing it into
the saved configuration.
- The default 32-bit Windows builds of PuTTY stopped running on
Windows XP, not intentionally. (Windows would report them as
incompatible.)
- PuTTY's username and password prompts in the terminal accidentally
stopped recognising the keystrokes Ctrl+M and Ctrl+J as ways to
terminate an input line, which broke third-party tools which send
keystrokes to PuTTY and expected those sequences to work.
- Windows PuTTY could fail to update the window width and height
fields in its configuration when resized via the PowerToys
"FancyZones" tool, or any other tool that resize application
windows by the same method.
- On Unix PuTTY and pterm, the keys on the small keypad above the
arrows (Home, End etc) could misbehave in some builds, including
doing nothing at all.
|
2025-01-02 18:24:58 by Tobias Nygren | Files touched by this commit (2) |
Log message:
putty: fix build
|
2024-12-27 09:21:09 by Thomas Klausner | Files touched by this commit (1055) |
Log message:
*: recursive bump for pango requiring fontconfig 2.15
|
2024-12-12 16:29:09 by Ryo ONODERA | Files touched by this commit (3) |  |
Log message:
security/putty: Update to 0.82
Changelog:
These features are new in 0.82 (released 2024-11-27):
* Major refactoring of Unicode handling to allow the use of 'foreign' Unicode
characters, i.e. outside the system's configured default character set /
code page. Not yet complete, but the following things work:
+ Windows console: usernames and passwords entered interactively into
PSCP, PSFTP and Plink can use foreign characters.
+ Windows command line: usernames, remote commands, and filenames entered
via command-line options can use foreign characters.
+ PuTTY's own terminal (on Windows and Unix): even if it's not configured
into UTF-8 mode for the main session, interactive usernames and
passwords can use foreign characters.
* Unicode version update: all character analysis is updated to Unicode
16.0.0.
* Unicode terminal rendering: national and regional flags are now understood
by PuTTY's terminal emulator. (However, correct display of those flags will
depend on fonts and operating system.)
* The Event Log mentions the local address and port number of the outgoing
connection socket.
* Bracketed paste mode can now be turned off in the Terminal > Features
panel.
* Unix Pageant: new --foreground mode for running as a subprocess.
* Bug fix: the 'border width' configuration option is now honoured even when
the window is maximised.
* Bug fix: SHA-2 based RSA signatures are now sent with correct zero padding.
* Bug fix: terminal wrap mishandling caused occasional incorrect redraws in
curses-based applications.
* Bug fix: Alt + function key in "Xterm 216+" mode sent a spurious extra
escape character.
|
2024-11-17 08:17:06 by Thomas Klausner | Files touched by this commit (944) |
Log message:
*: recursive bump for default-on option of at-spi2-core
|
2024-10-10 21:44:33 by Nia Alarie | Files touched by this commit (1) |
Log message:
putty: Make sure extensions mode is enabled for SunOS (sigprocmask)
|
2024-04-15 23:55:23 by Thomas Klausner | Files touched by this commit (2) |  |
Log message:
putty: update to 0.81.
PuTTY 0.81, released today, fixes a critical vulnerability
CVE-2024-31497 in the use of 521-bit ECDSA keys (ecdsa-sha2-nistp521).
If you have used a 521-bit ECDSA private key with any previous
version of PuTTY, consider the private key compromised: remove the
public key from authorized_keys files, and generate a new key pair.
However, this only affects that one algorithm and key size. No
other size of ECDSA key is affected, and no other key type is
affected.
|
2024-04-07 09:35:33 by Thomas Klausner | Files touched by this commit (1138) |
Log message:
*: bump for cairo buildlink3.mk change
lzo was made an option
|