home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Columbia Kermit
/
kermit.zip
/
newsgroups
/
misc.20031118-20041115
/
000242_jaltman2@nyc.rr.com_Thu Apr 22 10:49:10 2004.msg
< prev
next >
Wrap
Internet Message Format
|
2020-01-01
|
9KB
Path: newsmaster.cc.columbia.edu!iad-feed.news.verio.net!peer1.stngva01.us.to.verio.net!news.verio.net!news.glorb.com!news3.optonline.net!cyclone.rdc-nyc.rr.com!news-out.nyc.rr.com!twister.nyc.rr.com.POSTED!not-for-mail
From: Jeffrey Altman <jaltman2@nyc.rr.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7b) Gecko/20040316
X-Accept-Language: en-us, en
MIME-Version: 1.0
Newsgroups: comp.protocols.kermit.misc
Subject: Post 2.1.3 Bug Fixes and New Features for Kermit 95
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 154
Message-ID: <j7Jhc.26404$mX.8468588@twister.nyc.rr.com>
Date: Thu, 22 Apr 2004 05:55:27 GMT
NNTP-Posting-Host: 24.193.46.55
X-Complaints-To: abuse@rr.com
X-Trace: twister.nyc.rr.com 1082613327 24.193.46.55 (Thu, 22 Apr 2004 01:55:27 EDT)
NNTP-Posting-Date: Thu, 22 Apr 2004 01:55:27 EDT
Organization: Road Runner - NYC
Xref: newsmaster.cc.columbia.edu comp.protocols.kermit.misc:14959
Since the release of Kermit 95 2.1.3 in January 2003, I have fixed
numerous bugs and added a few new features to the Kermit 95 code base.
The 72 bugs are detailed in the Kermit 95 New Bugs List
ftp://ftp.kermit.columbia.edu/kermit/k95/newbugs.txt
numbers 717 to 788 (as of this writing.) A summary of the fixes and new
features follow:
!!! Fixed a bug preventing the execution of macros assigned to keys or
mouse events when in terminal mode
* added DG4xx Set Cursor Type sequence <RS> F Q <type>
!!! the dialer did not save the values of menubar, toolbar, statusbar
settings on the gui page
* a SEND command embedded in a macro and executed as a function with
\Fexecute(macro) would cause K95 to crash
* timeouts were added to incoming tcp/ip server sockets to prevent
denial of service attacks
* the passphrase dialog box for private keys accessed during SSL/TLS
did not obscure passphrase input
!!! OpenSSL has been updated to close known security holes
!!! SSH support has been updated to close known security holes
* when a HANDLE to a communication device, SET EXIT HANGUP OFF is
now the default
* Support for Pragma Systems Terminal Server connections were added
* ENABLE QUERY command was fixed
* Support for using HTTP Proxies to make HTTP connections was added
* Corrections to the AnnArbor terminal emulation handling of zSDP
* UNC paths now supported for FTP operations
* the dialer's QUICK command now supports connections based on
templates and includes a SaveAs operation (a poor man's clone)
* Linux Character Set handling fixed
* Xmodem-CRC checksums fixed
* Inadvertant beep produced when setting the title in a terminal
session removed
!!! Debug logging of SSH operations added
* ADM5 terminal type added
* Corrections to START_TLS vs AUTH Telnet Protocol negotiation
conflicts
* Added SET SSH V2 AUTO-REKEY
* SSH URLs did not properly set the window title
!!! extended command line options were not properly processed
* new SKERMIT command
!!! a handle leak in the IKSD Service was plugged
* new SET FTP BUG USE_SSL_V2 {ON, OFF} command
* new SET SSH HEARTBEAT-INTERVAL <seconds> command
* new ON_CD macro. This macro is executed (if defined) whenever a
change directory operation occurs.
* added FTP MLSD parsing of extended strings
* added SET ATTRIBUTES DATE OFF support for XYZmodem transfers
* improved algorithm for calculating optimal number of overlapped
I/O operations on serial connections
* Improvements to Kerberos 5 support
!!! Fixed FTP ASCII sends
* added SET TCP HTTP-PROXY /AGENT:<agent>
!!! fixed timeout parameters used on USB serial devices and internal
modems
* SET DIALER BACKSPACE now clears the equivalent SET KEY and SET
TERM KEY values
* When reading strings from the Windows registry, environment
variables are now expanded
* fixed the ability to disable reverse dns lookups
* fixed code that checks if a name is a directory to work on network
mapped file systems which do not provide creation date information
for directories.
* added missing keymap assignments for IBM 3151 emulation
!!! the dialer did not preserve alternative port numbers for FTP
connections
* removed a Windows Event Log entry logged before the IKSD.KSC file
could be processed to disable all logging
* HyperLink Extensions were added to ANSI based terminals allowing
URLs and UNCs to be specified within the terminal stream just like
HREFs work in HTML
* Fixed improper handling of DCS sequences consisting of an
intermediary '$' character
* Add SET TELNET BUG AUTH-KRB5-DES which defaults to ON. When OFF,
3DES encryption may be used with KRB5 Telnet authentication.
* Replaced C runtime library stat() calls with home grown version to
allow for proper processing of UNCs in file transfer operations
* Allow SET TITLE input to be surrounded by braces
* Implemented {SEND, RECEIVE} {MOVE-TO, RENAME-TO} for XYZmodem
transfers
* Fixed SEND /MOVE-TO:directory file transfers
* Fixed SET TERMINAL DEBUG ON
* Fixed BEEP INFORMATION (and any events that trigger an Informational
audible notification)
* Removed restriction of FTP GSSAPI exchanges limiting them to one
round-trip
!!! Rebuilt all binaries with the new Microsoft Visual Studio .NET 2003
compiler. The primary benefits are optimizations and security
precautions.
* Fixed a bug preventing (CSI Z) backtab from being executed.
* Add a GUI dialog version of the TYPE command to K95G
* SCO SGR Set fg/bg colors hack (CSI 2;fg;bg m) The implementation
set the colors to black on black regardless to what was specified
* SCO Set Function Key hack (ESC Q fn quote ... quote)
If the <fn> character is below '0', don't throw it away; instead
push the character back into the input stream and reprocess it.
!!! IBM EDI Services fails randomly due to a "missing tmp rsa export
key" error.
* Fixed incorrect script generation by the dialer when Transaction
Logging was turned on. The SET TRANSACTION-LOG command was
incompletely generated.
!!! Added support for Named Pipe connections (both client and server
side) on Windows. Allows the use of Kermit 95 as a terminal or
host based syslogger for Linux systems running on VMWare 3.0 and
higher.
The items identified by !!! are those which I consider to be the most
important. As described on my Columbia University home page
http://www.columbia.edu/~jaltman/
the Kermit Project is working hard to put the necessary agreements in
place for a new release of Kermit 95 which would include all of these
changes. Unfortunately, this has taken much longer than anyone could
possibly have expected. In the meantime I have been quietly making
interim builds available to registered Kermit 95 users who have
experienced serious problems and as a result have contacted
kermit-support@columbia.edu.
These changes will eventually find their way into an official
Kermit 95 release from the Kermit Project. If you are a registered
user and would like to gain immediate access to these changes,
please make a donation to support my on-going work on Kermit from
my Columbia University home page. I wish I could provide these
updates for free. Unfortunately, at the present time this is
not an option.
Just as an FYI, in addition to the work I have performed on Kermit,
my new company, Secure Endpoints Inc., continues to contribute
to the development of MIT Kerberos, OpenAFS, OpenSSL, Project JXTA
and the protocol standardization efforts of the IETF.
One more note for those who are using Kermit 95 in
conjunction with Kerberos. The version of MIT Kerberos for Windows
that shipped with Kermit 95 2.1.3 was based on the unreleased
KFW 2.2. Since K95 2.1.3 there have been major changes to
the KFW product which I have implemented over the last fifteen
months. I recommend that the Kerberos libraries provided with
Kermit 95 be uninstalled and be replaced by the MIT KFW 2.6.1
distribution which can be downloaded free of charge from
http://web.mit.edu/kerberos/dist/index.html#KFW2.6.1
Jeffrey Altman
Kermit 95 Author
Secure Endpoints Inc.
--
The e-mail account used to post this message is not read on a regular
basis. Please send private responses to:
jaltman at secure-endpoints dot com