Xpra: Ticket #2222: update putty to v0.71

PuTTY in your hands: SSH client gets patched after RSA key exchange memory vuln spotted: That really is a 'game over' level vulnerability for a secure network protocol: a MITM attacker could bypass the SSH host key system completely.

Tue, 19 Mar 2019 11:55:22 GMT - Antoine Martin: status changed; resolution set

The problem is that we use the tortoisesvn builds of putty so that we get a GUI for password and key confirmation. Since we can't wait for them to make a new release, r22126 switches to paramiko as default on win32 (now identical to all the other platforms).

To go back to the previous behaviour, and ignoring the serious security vulnerability (...), use xpra --ssh="C:\Program Files\Xpra\Plink.exe -ssh -noagent".

Sat, 23 Jan 2021 05:45:27 GMT - migration script:

this ticket has been moved to: https://github.com/Xpra-org/xpra/issues/2222