Monday, April 28, 2025
HomeCyber Security NewsOpenSSH 10.0 Released: New Protocol Changes and Key Security Improvements

OpenSSH 10.0 Released: New Protocol Changes and Key Security Improvements

Published on

SIEM as a Service

Follow Us on Google News

The OpenSSH team has announced the release of OpenSSH 10.0 on April 9, marking an important milestone for one of the most widely-used open-source tools in secure communications.

With significant protocol changes, security advancements, and new features, this version aims to provide enhanced protection and functionality for users worldwide.

Key Security Improvements

The OpenSSH 10.0 release introduces several security updates to bolster protection against evolving threats:

- Advertisement - Google News
  1. Removal of Weak DSA Algorithm: Support for the outdated and vulnerable DSA signature algorithm has been fully eliminated. This completes the deprecation process that began back in 2015, ensuring OpenSSH aligns with modern cryptographic best practices.
  2. Enhanced Key Exchange Mechanisms: OpenSSH 10.0 replaces finite field Diffie-Hellman (modp) key exchange methods with Elliptic Curve Diffie-Hellman (ECDH) by default. This adjustment significantly improves key agreement performance and security while removing legacy methods.
  3. Post-Quantum Cryptography: The mlkem768x25519-sha256 hybrid algorithm is now the default for key exchanges. Designed to withstand quantum computing attacks, this algorithm ensures that cryptographic protocols remain future-proof and resilient.
  4. Runtime Isolation of Authentication Code: OpenSSH has introduced a modular approach by separating the user authentication phase into a new binary called sshd-auth. This reduces attack surfaces and enhances memory efficiency by unloading authentication code post-authentication.

Notable Protocol Changes

OpenSSH 10.0 also makes adjustments to its protocol behavior that may impact user configurations:

  • Version Number Refinements: OpenSSH now reports its version as “SSH-2.0-OpenSSH_10.0.” This change might cause issues for software relying on outdated version-matching patterns.
  • Session Control Adjustments: Tools such as scp and sftp now pass “ControlMaster no” to disable implicit session creation, streamlining configurations for unexpected behavior.
  • FIDO-Based Key Enhancements: Improvements allow better compatibility with newer FIDO tokens, including those that return no attestation data, enhancing usability across modern systems.

New Features and Bug Fixes

The new version also brings features tailored for improved usability:

  1. Configuration Matching Enhancements: User-specific configurations now support new matching criteria, such as Match version or Match sessiontype, providing finer control over ssh/sftp connections.
  2. AES-GCM Cipher Preference: OpenSSH now favors AES-GCM over AES-CTR for secure data encryption while retaining ChaCha20/Poly1305 as the highest-priority cipher.
  3. Systemd Socket Activation for ssh-agent: The ssh-agent now integrates with systemd-style socket activation, simplifying service management for Linux users.

Bug fixes further improve robustness and reliability, addressing issues like configuration parsing errors, X11 forwarding performance, and key signature compatibility with specialized hardware tokens.

The OpenSSH team expressed gratitude to its global community for contributing code, reporting bugs, testing snapshots, and donating to the project. Their support continues to drive the development of this vital tool.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

CISA Alerts Users to Security Flaws in Planet Technology Network Products

The United States Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...