
This release fixes a lot of bugs, and adds several enhancmeents, such as V2.4.0 includes all bug fixes and features that were part of v2.3.4. Added -profile-dir option that allows to select custom profile directory.Added support for Eisu_toggle and Muhenkan keys.Added support for keyboard backlight media keys.Made it possible to use keyboard instead of mouse to modify screen layout.Implemented a configuration option for Server GUI auto-start.The algorithm is identical to what OpenSSH uses. Added support for randomart images for easier comparison of SSL certificate fingerprints.A new -disable-crypto command line option has been added to explicitly disable encryption. The -enable-crypto command line option has been made the default to reduce chances of accidental security mishaps when configuring Barrier from command line.
SHAREMOUSE FREE PORTABLE

Fixed setup of multiple actions associated with a hotkey.More X11 clipboard MIME types have been mapped to corresponding converters ( #344).Barrier no longer uses openssl CLI tool for any operations and hooks into the openssl library directly.Fixed reading of configuration on Windows when the paths contain non-ASCII characters ( #976, #974, #444).Fixed build failure on mips*el and riscv64 architecture.Client and server will show both SHA1 and SHA256 server fingerprints to allow interoperability with older versions of Barrier.Īll of the above security issues have been reported by Matthias Gerstner who was really helpful for resolving them.

After upgrading client to new version the existing server fingerprint will need to be approved again. If enabled, older clients of Barrier will be rejected.īarrier now uses SHA256 fingerprints for establishing security of encrypted SSL connections. The feature can be enabled in the settings dialog. To support seamless upgrades from older versions of Barrier this is currently disabled by default.

Additionally, in case the malicious client got possession of a valid screen name by brute forcing or other means it could modify the clipboard contents of the server. This made the attack surface of Barrier significantly larger. Previously a malicious client could connect to Barrier server without any authentication and send application-level messages.
SHAREMOUSE FREE VERIFICATION
Barrier now supports client identity verification (fixes CVE-2021-42072, CVE-2021-42073).
