[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: Why only group1 diffie-hellman
[Thread Prev] | [Thread Next]
- Subject: RE: Why only group1 diffie-hellman
- From: "Murphy, Gearoid P" <gearoid.murphy@xxxxxx>
- Reply-to: libssh@xxxxxxxxxx
- Date: Fri, 8 Jul 2011 14:34:44 +0000
- To: "libssh@xxxxxxxxxx" <libssh@xxxxxxxxxx>
Aris + Andreas I would be interested in attempting this more as a technical exercise than anything else, if libssh can but the fruits of my labor to good use, then all the better. I would obviously defer to your collective expertise when it comes to the evaluation of the security of the submitted code. Unless I am gravely mistaken, the difference between group1 and group14 Diffie-Hellman kex is parametric only, there is no algorithmic change required, but the reply of Aris suggests that this is not the case, can anyone comment? Thanks - Gearoid ________________________________________ From: Andreas Schneider [asn@xxxxxxxxxxxxxx] Sent: 08 July 2011 14:55 To: libssh@xxxxxxxxxx Subject: Re: Why only group1 diffie-hellman On Friday 08 July 2011 13:39:42 you wrote: > Hi all Hi Gearoid, > Is there a particular design decision behind only only supporting group1 > diffie-hellman key exchange? I don't think so, but we should support it. > I would be interested in attempting the implementation for group14 > diffie-hellman kex for integration into the libssh mainline RFC 4253 states that it MUST be supported. We would appreciate a patch for it. Recently Aris added support for ecdh-sha2-nistp256 kex in master. It shouldn't be to hard to add diffie-hellman-group14-sha1 now. -- andreas -- Andreas Schneider GPG-ID: F33E3FC6 www.cryptomilk.org asn@xxxxxxxxxxxxxx
Re: Why only group1 diffie-hellman | Aris Adamantiadis <aris@xxxxxxxxxxxx> |
Why only group1 diffie-hellman | "Murphy, Gearoid P" <gearoid.murphy@xxxxxx> |
Re: Why only group1 diffie-hellman | Andreas Schneider <asn@xxxxxxxxxxxxxx> |