OpenSSH 10.1 Released with Key Security Fixes and Enhancements

On October 6, 2025, OpenSSH 10.1 was released, delivering important updates to the open-source client and server for the SSH 2.0 and SFTP protocols. This version follows the April 2025 release of OpenSSH 10.0, which introduced post-quantum cryptography by default and removed legacy DSA signature support.
Key Fixes and New Features
- Security Fix: A critical vulnerability has been patched that could allow an attacker to inject shell commands by manipulating special characters in usernames or URIs used with
ProxyCommand. - Input Sanitization: To prevent similar attacks, control characters are now forbidden in command-line usernames and %-sequence substitutions. The null character (
\0) is also disallowed inssh://URIs. - PKCS#11 Support:
sshandssh-agentnow support Ed25519 keys stored in PKCS#11 tokens. - New
RefuseConnectionOption: A newRefuseConnectionoption in ssh_config allows for immediate connection termination with a custom error message, bypassing any connection attempt. - SIGINFO Handlers:
sshandsshdcan now log detailed session and channel information upon receiving aSIGINFOsignal. - Improved Certificate Logging: When
sshdrejects a user's certificate authentication, it now logs detailed information to help identify the specific certificate causing the issue. - X11 Display Validation:
sshdnow validates the X11 display number against the offset defined in theX11DisplayOffsetdirective. - Performance Benchmarking: The unit test suite now includes performance benchmarks, which can be enabled during the build process.
Potentially Breaking Changes
- Weak Crypto Warnings:
sshnow warns users when a key exchange algorithm vulnerable to quantum computer attacks is used. This feature addresses the risk of harvest now, decrypt later attacks and can be disabled with theWarnWeakCryptooption. - IPQoS/DSCP Handling: The logic for IP Quality of Service has been revamped. Interactive traffic now defaults to the
EF(Expedited Forwarding) DSCP class for better performance. The legacyToSkeyword for IPv4 is now deprecated in favor of DSCP. - Automatic Certificate Expiry:
ssh-addnow automatically sets a certificate's lifetime inssh-agentto expire 5 minutes after its validity period, ensuring timely removal. The new-Nflag can disable this behavior. - XMSS Key Support Removed: Support for the experimental XMSS stateful hash-based signature scheme has been completely removed.
- Socket Path Change: Unix sockets for
ssh-agentandsshdhave been moved from/tmpto the more secure~/.ssh/agentdirectory to prevent access from sandboxed processes.