SSH2 Module for Python
Paramiko is a module for python 2.2 (or higher) that implements the SSH2 protocol for secure (encrypted and authenticated) connections to remote machines.
Unlike SSL (aka TLS), the SSH2 protocol does not require hierarchical certificates signed by a powerful central authority. you may know SSH2 as the protocol that replaced telnet and rsh for secure access to remote shells, but the protocol also includes the ability to open arbitrary channels to remote services across the encrypted tunnel -- this is how sftp works, for example.
It is written entirely in python (no C or platform-dependent code) and is released under the GNU LGPL (lesser GPL).
- Sources inherited from project devel:languages:python
- Devel package for openSUSE:Factory
-
15
derived packages
- Links to openSUSE:Factory / python-paramiko
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:Tomcat42/python-paramiko && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
paramiko-3.4.0.tar.gz | 0001277306 1.22 MB | |
paramiko-test_extend_timeout.patch | 0000000540 540 Bytes | |
python-paramiko.changes | 0000048897 47.8 KB | |
python-paramiko.spec | 0000003790 3.7 KB | |
remove-icecream-dep.patch | 0000000818 818 Bytes | |
support-pytest-8.patch | 0000000663 663 Bytes | |
use-64-bit-maxsize-everywhere.patch | 0000000681 681 Bytes |
Revision 116 (latest revision is 122)
Dirk Mueller (dirkmueller)
committed
(revision 116)
* [Feature] #1951: Add SSH config token expansion (eg %h, %p) when * [Support] #2004: (via #2011) Apply unittest skipIf to tests currently using SHA1 in their critical path, to avoid failures on systems starting * [Support] #1838: (via #1870/#2028) Update camelCase method calls against the threading module to be snake_case; this and related tweaks * [Support] #2038: (via #2039) Recent versions of Cryptography have deprecated Blowfish algorithm support; in lieu of an easy method for users to remove it from the list of algorithms Paramiko tries to import and use, we’ve decided to remove it from our “preferred algorithms” list. This will both discourage use of a weak algorithm, and avoid warnings. * [Bug] #2017: OpenSSH 7.7 and older has a bug preventing it from understanding how to perform SHA2 signature verification for RSA certificates (specifically certs - not keys), so when we added SHA2 support it broke all clients using RSA certificates with these servers. This has been fixed in a manner similar to what OpenSSH’s own client does: a version check is performed and the algorithm used is downgraded * [Bug] #1933: Align signature verification algorithm with OpenSSH re: zero-padding signatures which don’t match their nominal size/length. This shouldn’t affect most users, but will help Paramiko-implemented SSH - Update to 2.10.3 (bsc#1197279, CVE-2022-24302) - [Feature] #1846: Add a prefetch keyword argument to - [Support] #1727: Add missing test suite fixtures directory to - Set environment to utf-8 to allow tests to pass on Python 2. (bsc#1178341) * gh#paramiko/paramiko#1655 - update to 2.7.2 (bsc#1166758, bsc#1166758, bsc#1205132) - update to 2.6.0 (bsc#1200603) - update to 2.5.0 extend timeout in testsuite to pass on ppc64le key-decryption passphrases from password-auth passwords. * Certificate support broke the no-certificate case for Ed25519 keys
Comments 0