
La OpenSSH version 10.0 It is now available with a number of important improvements related to security, post-quantum cryptography, and system efficiency. This release represents a significant step toward strengthening the secure communications infrastructure against current and future threats. Furthermore, this advancement highlights the importance of staying up-to-date with the latest encryption and security tools in a constantly evolving technological world.
OpenSSH, one of the most widely used SSH implementations worldwidecontinues to evolve to adapt to new cybersecurity challenges. This time, version 10.0 not only fixes bugs but also introduces structural and cryptographic changes that could affect system administrators and developers alike.
OpenSSH 10.0 strengthens cryptographic security
One of the most notable decisions has been Completely remove support for the DSA (Digital Signature Algorithm) signature algorithm, which has been obsolete for years and is considered vulnerable to modern attacks. OpenSSH was already deprecated, but still supported, which represented an unnecessary risk.
Regarding the key exchange, a hybrid post-quantum algorithm has been chosen by default: mlkem768x25519-sha256. This combination integrates the NIST-standardized ML-KEM scheme with the X25519 elliptic curve, providing resistance to quantum computer attacks without sacrificing efficiency on current systems. This change positions OpenSSH as a pioneer in adopting cryptographic methods prepared for a post-quantum era.
OpenSSh 10.0 redesigns the authentication architecture
One of the most technical but relevant advances is the Separation of the code responsible for runtime authentication into a new binary called "sshd-auth"This modification effectively reduces the attack surface before authentication is complete, as the new binary runs independently of the main process.
With this change, memory usage is also optimized, as the authentication code is downloaded once it has been used, improving efficiency without compromising security.
FIDO2 support and configuration improvements
OpenSSH 10.0 too expands support for FIDO2 authentication tokens, introducing new capabilities for verifying FIDO attestation blobs. Although this utility is still in the experimental phase and is not installed by default, it represents a step toward more robust and standardized authentication in modern environments.
Another notable addition is the greater flexibility in user-specific configuration options. More precise matching criteria can now be defined, allowing for more detailed rules on when and how certain SSH or SFTP configurations are applied. In this context, the evolution of platforms such as OpenSSH 9.0 sets an important precedent in the configuration of these tools.
Optimization of encryption algorithms
Regarding data encryption, The use of AES-GCM is prioritized over AES-CTR, a decision that improves both security and performance on encrypted connections. Despite this, ChaCha20/Poly1305 remains the preferred encryption algorithm, due to its superior performance on devices that do not have hardware acceleration for AES.
Other technical and protocol changes
Beyond security, Changes have been introduced in session management, as well as improvements to active session detection. These modifications aim to make the system more adaptable to different connection and usage conditions.
In addition, there have been adjustments to code portability and maintenance, as a better organization for the modular handling of cryptographic parameter files (moduli), facilitating future updates and audits.
Bug fixes and usability
As with any major release, OpenSSH 10.0 incorporates various bug fixes reported by users or detected in internal audits. One of the fixed bugs relates to the "DisableForwarding" option, which did not correctly disable X11 and agent forwarding, as indicated in the official documentation.
Improvements have also been made to the user interface for a more consistent experience, even in session detection or when applying specific configurations. These details, although technical, directly impact the stability and reliability of the software in production environments.
Another noteworthy detail is the appearance of a command line tool, although still in the experimental phase, is designed to verify FIDO attestation blobs. It is available in the project's internal repositories, but is not installed automatically.
OpenSSH continues its evolution as a key pillar in remote communications security. This latest update not only addresses current needs but also anticipates future challenges such as the emergence of quantum computing. By retiring obsolete technologies and adopting emerging standards, the project continues to consolidate its central role in protecting critical digital infrastructures.
