-
Notifications
You must be signed in to change notification settings - Fork 601
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add key exchange algorithm curve25519-sha256@libssh.org #171
Comments
Hi David, Could you link the RFC for the protocol? In both this one and #167? Thx! |
Refer also to Specifications implemented by OpenSSH. |
@hierynomus @dkocher same point as #167 basically, has there been any progress on this? I looked at the code, but I'm not sure where to start on implementing a new key exchange algorithm myself. |
Started work on this on the ed25519 branch |
@dkocher I'm not seeming to get it to work yet. Maybe you can have a look at the branch also. Probably missing something very stupid here during the signature verification :(. Current status is:
SSHD configuration on linux box used:
|
I can reproduce the signature verification failure. Note that when I leave the other
|
Some additional implementation info... Nice scheme: https://blog.mozilla.org/warner/2011/11/29/ed25519-keys/ |
@dkocher Can you try it out and see whether it indeed works, verified it locally against a VM, but would be good to have a backup check before releasing into the wild 😄 |
Tested against |
In that case I'm going to release! Stay tuned for 0.14.0 |
Currently only
diffie-hellman-group14-sha1
anddiffie-hellman-group1-sha1
is implemented.The text was updated successfully, but these errors were encountered: