Articles from release category
- ⬅ All articles
- 🗂 Categories
- 🔖 ftp (1)
- 🔖 infrastructure (3)
- 🔖 privacy (1)
- 🔖 compliance (1)
- 🔖 client-side (1)
- 🔖 general (84)
- 🔖 blog (6)
- 🔖 press (2)
- 🔖 australia (1)
- 🔖 client (17)
- 🔖 release (81)
- 🔖 article (14)
- 🔖 security (24)
- 🔖 server (19)
- 🗄 Archive
- 📌 2013 (2)
- 📌 2014 (4)
- 📌 2015 (10)
- 📌 2016 (21)
- 📌 2017 (13)
- 📌 2018 (21)
- 📌 2019 (10)
SFTPPlus 3.7.0 Release
Tue 29 March 2016 | general release
We are pleased to announce the latest release of SFTPPlus, version 3.7.0.
Here is the list of the important new functionalities:
- The OpenSSL version distributed in our Windows version was updated to OpenSSL 1.0.2g.
- The SSH protocol was updated to support hmac-sha2-256, diffie-hellman-group14-sha1, and diffie-hellman-group-exchange-sha256.
- SFTP and SCP server-side file close operations now emit dedicated event ids. In this way you can filter file upload or download operations based on a specific event ID. The previous event with ID 30017 is now used only when the file was not opened in read-only or write-only mode. [SFTP][SCP]
- Allow simple negation of the regular expression used in source filter. In this way you don't need to use look-around zero-length assertion regex rules to exclude a certain pattern.
This release was focused on reducing the number of known defects and improving the quality of the product. Here is the list of the main defects fixed in this release:
- The SCP server-side implementation now sends a response for successful SCP initialization, before starting to process the SCP transfer requests. This fixes a bug in which the Cisco SCP client (SSH-1.99-Cisco-1.25 implementation) hangs when SCP is initialized. For example when running copy start scp://10.0.2.1/some-file.
- Allow using the file dispatcher with any event from the file-operation group. Previously only the FTP upload events were supported. [#3366]
- Fix parsing the SCP arguments for client sending command line arguments with leading spaces. This affect the integration with the SCP client available on Cisco ASA and ASAv systems.
These are just the highlights of this release. For more details, including the full list of changes, please see the full release notes.
SFTPPlus Client 1.5.61 Release
Wed 23 March 2016 | release client
SFTPPlus Team announces a new release of SFTPPlus Client, version 1.5.61.
In this version we have fixed a regression in which SFTP transfer using absolute inbox path were failing.
In this release we have also added support for running the SFTPPlus client from an installation folder containing space characters.
For more details, please see the full release notes.
SFTPPlus 3.6.0 Release
Fri 18 March 2016 | release security
We are pleased to announce the latest release of SFTPPlus, version 3.6.0.
Here is the list of the important new functionalities:
- The OpenSSL version used by SFTPPlus is advertised as part of the events generated when starting the SFTPPlus process, as well as in the Local Manager status page.
- Now you can configure the source port used by the FTP and FTPS services to initiate active data connections. [ftp][ftps]
- The matching rules for file dispatching are now applied to the full path, not only to the file name.
This release was focused on reducing the number of known defects and improving the quality of the product. Here is the list of the main defects fixed in this release:
- When a transfer requires multiple files to be transferred, they are now queued so that the files are transferred sequentially, one at a time. [#3131]
- When a location fails to start, it is no longer auto-started by a transfer. Now it needs to be manually started after the failure was investigated. All components/transfer trying to use a location which failed, will also have their operation failed. [#3176]
- Locations are now auto-started in the correct state, emitting an event and not leaving them in a 'restart-required' state. [#3176]
- The file transfer services secured by TLS/SSL and using a CRL will automatically stop/fail if the CRL can not be updated at runtime. In previous versions a warning was raised but the file transfer service continued to operate with a version of CRL which was previously loaded, resulting in an insecure operation. [security] [#3216]
- The files already present on the source location for a transfer are now filtered based on the transfer configuration and processed only after they are stable. [#3223]
- The file dispatcher event handler now no longer enters an infinite loop by handling its own events. [#3261]
- No internal server error is now produced when failing to remove the remote file after the file was successfully transferred on the local machine. [client] [#3283]
- Starting the Local Manager or the documentation pages from the Windows Start menu or using the command line using the admin-commands manager command, now successfully opens the default browser. [local-manager] [#3295]
These are just the highlights of this release. For more details, including the full list of changes, please see the full release notes.
SFTPPlus 3.5.1 Release
Mon 08 February 2016 | general release
We have released version 3.5.1 of SFTPPlus, which is a release containing only defect fixes.
Here is the list of fixes:
- Event with ID 20024 is now emitted for internal errors caused by unhandled runtime errors.
- Include the sample Library_LaunchDaemons_sftpplus.plist file in the distributable archive.
- Documentation was updated to document the filesystem permissions required for the service account.
- Fix SCP protocol interoperability with latest versions of the OpenSSH scp command.
For more details, please see the full release notes.
SFTPPlus 3.5.0 Release
Thu 28 January 2016 | general release
We are pleased to announce the latest release of SFTPPlus, version 3.5.0.
In this version we added the functionality of dispatching files received by both service side services and client side transfers.
As an experimental feature we have added support to validate received file using the RSA Digital Signature Algorithm PKCS#1 v2.1.
For Windows, the OpenSSL version was upraded to 1.0.2d brining support for latest TLS versions.
These are just the highlights of this release. For more details, including the list of fixed defects, please see the full release notes.