SSH

Jan Pechanec jp at devnull.cz
Wed Jan 28 23:45:30 CET 2015


On Wed, 28 Jan 2015, Jan Dušátko wrote:

	ahoj Honzo,

>2) Je mozne zvolit jinou metodu sifrovani spojeni nez předvolené
>"3des-cbc", "aes128-cbc", "aes192-cbc", "aes256-cbc", "aes128-ctr",
>"aes192-ctr", "aes256-ctr", "arcfour128", "arcfour256", "arcfour",
>"blowfish-cbc", and "cast128-cbc"? Například aes v gcm modu, nebo misto RSA
>pouziti eliptickych krivek (ECDH/ECDHE) ? Dle dostupnych informaci to není
>mozne, rad bych si overil, zda jsem nic neprehledl. Nastesti lze vypnout
>kompresi nebo alespoň dat do stavu delayed.

	http://www.openssh.com/txt/release-6.2

 * ssh(1)/sshd(8): Added support for AES-GCM authenticated encryption in
   SSH protocol 2. The new cipher is available as aes128-gcm at openssh.com
   and aes256-gcm at openssh.com. It uses an identical packet format to the
   AES-GCM mode specified in RFC 5647, but uses simpler and different
   selection rules during key exchange.

	a pokud vim, uz OpenSSH uz dlouho podporuje elipticky krivky v KEX 
(i kdyz jsem to nezkousel, tak nevim, na co narazis, kdyz rikas, ze to podle 
dostupnych informaci neni mozne):

 KexAlgorithms
    Specifies the available KEX (Key Exchange) algorithms. Multiple 
algorithms must be comma-separated. The default is:

    curve25519-sha256 at libssh.org, 
    ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, 
    diffie-hellman-group-exchange-sha256, 
    diffie-hellman-group14-sha1, 
    diffie-hellman-group-exchange-sha1, 
    diffie-hellman-group1-sha1

    The list of available key exchange algorithms may also be obtained using 
the -Q option of ssh(1) with an argument of “kex”.

	h.

-- 
Jan Pechanec <jp (at) devnull (dot) cz>
http://www.devnull.cz


More information about the Users-l mailing list