IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: SSH key algorithm updates
> Also, of course there are implementations missing (one notable
> is Bitvise's; I started work on that, but had a hard time finding
> reliable a source for what they actually support and what not).
If you can run a Windows executable, you can simply download our stuff from our website:
https://www.bitvise.com/
Both the client and the server are free for use that is both personal and non-commercial. The client goes further than that, and is also free for individual use in organizations.
The following is what a default SSH Server installation (latest version 6.43) supports and enables at the moment. All algorithms listed are supported. Only the "true" ones are enabled by default:
> q algs.*
With kex {
ecdhSecp256k1 true
ecdhNistp256 true
ecdhNistp384 true
ecdhNistp521 true
dhGexSha256 true
dhGexSha1 true
dhG1Sha1 false
dhG14Sha1 true
gssG1Sha1Krb5 false
gssG14Sha1Krb5 true
gssGexSha1Krb5 true
}
With encr {
aes256-ctr true
aes192-ctr true
aes128-ctr true
3des-ctr true
aes256-cbc false
aes192-cbc false
aes128-cbc false
3des-cbc false
none false
}
With mac {
hmac-sha2-256 true
hmac-sha1 true
hmac-md5 false
hmac-sha2-256-96 false
hmac-sha1-96 false
hmac-md5-96 false
none false
}
With cmpr {
zlib true
none true
delayCompression false
}
Supported host key algorithms are:
ssh-rsa
ssh-dss
ecdsa-sha2 over secp256k1
ecdsa-sha2 over nistp256
ecdsa-sha2 over nistp384
ecdsa-sha2 over nistp521
Algorithms supported by our client mirror those in the server.
denis
----- Original Message -----
From: Max Horn
Sent: Friday, November 6, 2015 03:08
To: ietf-ssh%NetBSD.org@localhost
Cc: Mark D. Baushke
Subject: Re: SSH key algorithm updates
Hi there,
just joined the list, but saw on the list archive that a few days ago,
Mark D. Baushke wrote on this thread:
> It would be useful to see what other protocols various SSH implementers
> have been adding and see if there is a desire to move any of them into a
> recommended or optional standard.
As a matter of fact, I started such a page some time ago:
http://ssh-comparison.quendi.de/
http://ssh-comparison.quendi.de/comparison.html
I tried my best to make it accurate, but of course cannot exclude mistakes.
Also, of course there are implementations missing (one notable is Bitvise's;
I started work on that, but had a hard time finding reliable a source for
what they actually support and what not).
Anyway, issue reports and pull request (also with info on additional
implementations) are most welcome:
https://github.com/fingolfin/ssh-comparison
The comparison page shows for example that hmac-sha2-256 and hmac-sha2-512
support is quite good now; one notable SSH library not implementing it yet
in a released version is libssh2, but they will have it in the next release
(the code is in their repository already), which in turn should allow
various clients based on it to support it. Another exception is lsh.
Cheers,
max
Home |
Main Index |
Thread Index |
Old Index