{"release":{"tag":{"name":"v2.4.0","path":"/ic-starter/barrier/tags/v2.4.0","tree_path":"/ic-starter/barrier/tree/v2.4.0","message":"v2.4.0\n","commit":{"id":"3e0d758b59e44e6bb8b5e13cf96c824be44207ac","short_id":"3e0d758","title":"Barrier v2.4.0","title_markdown":"Barrier v2.4.0","description":"","description_markdown":"","message":"Barrier v2.4.0\n","message_markdown":"Barrier v2.4.0","detail_path":"/ic-starter/barrier/commit/3e0d758b59e44e6bb8b5e13cf96c824be44207ac","commits_path":"/ic-starter/barrier/commits/3e0d758b59e44e6bb8b5e13cf96c824be44207ac","tree_path":"/ic-starter/barrier/tree/3e0d758b59e44e6bb8b5e13cf96c824be44207ac","author":{"name":"Povilas Kanapickas","email":"povilas@radix.lt","username":null,"user_path":null,"enterprise_user_path":null,"image_path":"no_portrait.png#Povilas Kanapickas-","is_gitee_user":false,"is_enterprise_user":null,"widget_url":null},"committer":{"name":"Povilas Kanapickas","email":"povilas@radix.lt","username":null,"user_path":null,"enterprise_user_path":null,"image_path":"no_portrait.png#Povilas Kanapickas-","is_gitee_user":false,"is_enterprise_user":null,"widget_url":null},"authored_date":"2021-11-01T22:46:43+02:00","committed_date":"2021-11-01T22:46:43+02:00","signature":null,"build_state":null},"archive_path":"/ic-starter/barrier/repository/archive/v2.4.0","signature":null},"operating":{"edit":false,"download":true,"destroy":false,"enterprise_forbid_zip":false},"release":{"title":"v2.4.0","path":"/ic-starter/barrier/releases/tag/v2.4.0","tag_path":"/ic-starter/barrier/tree/v2.4.0","project_id":40668540,"created_at":"2025-04-21T21:33:38+08:00","is_prerelease":false,"description":"Barrier is no longer maintained and no longer receives improvements and security fixes. The primary developers have moved to the InputLeap project. The newest release of InputLeap is 3.0.2\r\n\r\nSecurity fixes\r\nBarrier now supports client identity verification (fixes CVE-2021-42072, CVE-2021-42073).\r\n\r\nPreviously a malicious client could connect to Barrier server without any authentication and send application-level messages. This made the attack surface of Barrier significantly larger. Additionally, in case the malicious client got possession of a valid screen name by brute forcing or other means it could modify the clipboard contents of the server.\r\n\r\nTo support seamless upgrades from older versions of Barrier this is currently disabled by default. The feature can be enabled in the settings dialog. If enabled, older clients of Barrier will be rejected.\r\n\r\nBarrier now uses SHA256 fingerprints for establishing security of encrypted SSL connections. After upgrading client to new version the existing server fingerprint will need to be approved again. Client and server will show both SHA1 and SHA256 server fingerprints to allow interoperability with older versions of Barrier.\r\n\r\nAll of the above security issues have been reported by Matthias Gerstner who was really helpful for resolving them.\r\n\r\nBug fixes\r\nFixed build failure on mips*el and riscv64 architecture.\r\nFixed reading of configuration on Windows when the paths contain non-ASCII characters (#976, #974, #444).\r\nBarrier no longer uses openssl CLI tool for any operations and hooks into the openssl library directly.\r\nMore X11 clipboard MIME types have been mapped to corresponding converters (#344).\r\nFixed setup of multiple actions associated with a hotkey.\r\nFixed setup of hotkeys with special characters such as comma and semicolon (#778).\r\nFixed transfer of non-ASCII characters coming from a Windows server in certain cases (#527).\r\nBarrier will now regenerate server certificate if it's invalid instead of failing to launch (#802)\r\nAdded support for additional keys on Sun Microsystems USB keyboards (#784).\r\nUpdated Chinese translation.\r\nUpdated Slovak translation.\r\nTheme icons are now preferred to icons distributed together with Barrier (#471).\r\nFixed incorrect setup of Barrier service path on Windows.\r\nFeatures\r\nAdded --drop-target option that improves drag and drop support on Windows when Barrier is being run as a portable app.\r\nThe --enable-crypto command line option has been made the default to reduce chances of accidental security mishaps when configuring Barrier from command line. A new --disable-crypto command line option has been added to explicitly disable encryption.\r\nAdded support for randomart images for easier comparison of SSL certificate fingerprints. The algorithm is identical to what OpenSSH uses.\r\nImplemented a configuration option for Server GUI auto-start.\r\nMade it possible to use keyboard instead of mouse to modify screen layout.\r\nAdded support for keyboard backlight media keys\r\nAdded support for Eisu_toggle and Muhenkan keys\r\nAdded --profile-dir option that allows to select custom profile directory.\r\nv2.4.0 includes all bug fixes and features that were part of v2.3.4.","author":{"name":"ic-starter","username":"ic-starter","path":"/ic-starter","avatar_url":"no_portrait.png#ic-starter-ic-starter"},"attach_files":[{"download_url":"/ic-starter/barrier/attach_files/2158621/download/BarrierSetup-2.4.0-release.exe","name":"BarrierSetup-2.4.0-release.exe","cli_download_url":"https://gitee.com/ic-starter/barrier/releases/download/v2.4.0/BarrierSetup-2.4.0-release.exe","censor_failed":false,"censor_tip":null}],"zip_download_url":"/ic-starter/barrier/releases/tag/v2.4.0.zip","tar_download_url":"/ic-starter/barrier/releases/tag/v2.4.0.tar.gz"}}}