IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: SSH key algorithm updates
Hi denis,
> On 06.11.2015, at 18:59, denis bider <ietf-ssh3%denisbider.com@localhost> wrote:
>
> > Also, of course there are implementations missing (one notable
> > is Bitvise's; I started work on that, but had a hard time finding
> > reliable a source for what they actually support and what not).
>
> If you can run a Windows executable,
That's the rub, I can't really (don't have access to any Windows machine). Though I'll try whether wine can do it. I'll try to setup a Windows VM for this one of these days.
>
> Both the client and the server are free for use that is both personal and non-commercial. The client goes further than that, and is also free for individual use in organizations.
>
> The following is what a default SSH Server installation (latest version 6.43) supports and enables at the moment. All algorithms listed are supported. Only the "true" ones are enabled by default:
OK, that more or less matches what I had "guessed" based on FlowSSH (which already was on my page).
Though I do not yet have a way to show on the page when an algorithm is supported but disabled by default. This is on my TODO list, though. Amongst other things (e.g. "supported since version x.y" would be nice to have, too)
[...]
> Algorithms supported by our client mirror those in the server.
OK, so for now I'll keep a single entry for the two.
Thanks for your help, I now added Bitwise SSH to my page.
One last question: Right now I only list these user auth methods:
userauth: # the following is a guess, based on what FlowSsh supports
- publickey
- password
- keyboard-interactive
- none
But since you mention gss in your kex list, I am wondering whether this is incomplete...?
Cheers,
Max
Home |
Main Index |
Thread Index |
Old Index