The OpenSSH team has announced the release of OpenSSH 10.0 on April 9, marking an important milestone for one of the most widely-used open-source tools in secure communications. With significant protocol changes, security advancements, and new features, this version aims to provide enhanced functionality and security for users worldwide. The OpenSSH 10.0 introduces several security updates to bolster protection against evolving threats:
– Support for the outdated and vulnerable DSA signature algorithm has been fully eliminated.
This completes the deprecation process that began back in 2015, ensuring OpenSSH aligns with modern cryptographic best practices. – OpenSSH 10.0 replaces finite field Diffie-Hellman (modp) key exchange methods with Elliptic Curve Diffie-Hellman (ECDH) by default. This adjustment significantly improves key agreement performance and security while removing legacy methods.
– The new mlkem768x25519-sha256 hybrid algorithm is now the default for key exchanges. Designed to withstand quantum computing attacks, this algorithm ensures that cryptographic protocols remain future-proof and resilient. – OpenSSH has introduced a modular approach by separating the user authentication phase into a new binary called sshd-auth.
Major security updates enhance OpenSSH
This reduces attack surfaces and enhances memory efficiency by unloading authentication code post-authentication. OpenSSH 10.0 also makes adjustments to its protocol behavior that may impact user configurations:
– OpenSSH now reports its version as “SSH-2.0-OpenSSH_10.0.” This change might cause issues for software relying on outdated version-matching patterns.
– Tools such as scp and sftp now pass “ControlMaster no” to disable implicit session creation, streamlining configurations for unexpected behavior. – Improvements allow better compatibility with newer FIDO tokens, including those that return no attestation data, enhancing usability across modern systems. The new version also brings features tailored for improved usability:
– User-specific configurations now support new matching criteria, such as Match version or Match sessiontype, providing finer control over ssh/sftp connections.
– OpenSSH now favors AES-GCM over AES-CTR for secure data encryption while retaining ChaCha20/Poly1305 as the highest-priority cipher. – The ssh-agent now integrates with systemd-style socket activation, simplifying service management. Bug fixes further improve robustness and reliability, addressing issues like configuration parsing errors, X11 forwarding performance, and key signature compatibility with specialized hardware tokens.
The OpenSSH team expressed gratitude to its global community for contributing code, reporting bugs, testing snapshots, and donating to the project. Their support continues to drive the development of this vital tool.
Image Credits: Photo by Solen Feyissa on Unsplash
Johannah Lopez is a versatile professional who seamlessly navigates two worlds. By day, she excels as a SaaS freelance writer, crafting informative and persuasive content for tech companies. By night, she showcases her vibrant personality and customer service skills as a part-time bartender. Johannah's ability to blend her writing expertise with her social finesse makes her a well-rounded and engaging storyteller in any setting.























