You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The problem is that we use the tortoisesvn builds of putty so that we get a GUI for password and key confirmation.
Since we can't wait for them to make a new release, r22126 switches to paramiko as default on win32 (now identical to all the other platforms).
To go back to the previous behaviour, and ignoring the serious security vulnerability (...), use xpra --ssh="C:\Program Files\Xpra\Plink.exe -ssh -noagent".
PuTTY in your hands: SSH client gets patched after RSA key exchange memory vuln spotted: That really is a 'game over' level vulnerability for a secure network protocol: a MITM attacker could bypass the SSH host key system completely.
The text was updated successfully, but these errors were encountered: