[ 
https://issues.apache.org/jira/browse/SSHD-1017?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17216843#comment-17216843
 ] 

Jeremy Norris commented on SSHD-1017:
-------------------------------------

Yes, I too spent a lot of time staring at the OpenSSH code to figure out how to 
make this work as well in JSch. :)
FYI, I'm not sure if you have followed the work over at the JSch fork on 
Github, but I've spent a bit of time the past few months updating it to add 
support many of the newer crypto primitives (rsa-sha2-256, rsa-sha2-512, 
curve25519-sha256, curve448-sha512, ssh-ed25519, ssh-ed448, and all the ETM 
Macs). I also built an integration test suite using Testcontainers to attempt 
to validate these implementations against other live implementations (OpenSSH, 
Dropbear & AsyncSSH).

> Add support for [email protected]
> ---------------------------------------------
>
>                 Key: SSHD-1017
>                 URL: https://issues.apache.org/jira/browse/SSHD-1017
>             Project: MINA SSHD
>          Issue Type: New Feature
>            Reporter: Matt Sicker
>            Priority: Major
>
> See [protocol 
> details|https://github.com/openbsd/src/blob/master/usr.bin/ssh/PROTOCOL.chacha20poly1305].
> * [RFC 7539|https://tools.ietf.org/html/rfc7539] describes the 
> ChaCha20-Poly1305 algorithm.
> * [Dropbear 
> implementation|https://github.com/mkj/dropbear/blob/master/chachapoly.c]
> * [OpenSSH 
> implementation|https://github.com/openbsd/src/blob/master/usr.bin/ssh/cipher-chachapoly-libcrypto.c]
> The cipher is provided by Bouncycastle.
> As a bonus, this could potentially be adapted to propose an equivalent 
> AES/GCM cipher encoding to how OpenSSH implements this ChaCha20-Poly1305 
> cipher.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to