[ 
https://issues.apache.org/jira/browse/SSHD-1017?focusedWorklogId=621403&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-621403
 ]

ASF GitHub Bot logged work on SSHD-1017:
----------------------------------------

                Author: ASF GitHub Bot
            Created on: 11/Jul/21 22:38
            Start Date: 11/Jul/21 22:38
    Worklog Time Spent: 10m 
      Work Description: tomaswolf commented on pull request #176:
URL: https://github.com/apache/mina-sshd/pull/176#issuecomment-877871488


   And it's in again.
   
   Chacha20-poly1305 has a block size of 8, and `AbstractSession` computed 
rekey limits for ciphers with block sizes < 16 wrongly, which caused SSHD-1191. 
That's fixed now. If there are remaining problems with rekeying, they're in any 
case not caused by the choice of cipher.
   
   This chacha20-poly1305 implementation itself is perfectly fine.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


Issue Time Tracking
-------------------

    Worklog Id:     (was: 621403)
    Time Spent: 5h 50m  (was: 5h 40m)

> Add support for [email protected]
> ---------------------------------------------
>
>                 Key: SSHD-1017
>                 URL: https://issues.apache.org/jira/browse/SSHD-1017
>             Project: MINA SSHD
>          Issue Type: New Feature
>            Reporter: Matt Sicker
>            Priority: Major
>             Fix For: 2.7.1
>
>          Time Spent: 5h 50m
>  Remaining Estimate: 0h
>
> See [protocol 
> details|https://github.com/openbsd/src/blob/master/usr.bin/ssh/PROTOCOL.chacha20poly1305].
> * [RFC 7539|https://tools.ietf.org/html/rfc7539] describes the 
> ChaCha20-Poly1305 algorithm.
> * [Dropbear 
> implementation|https://github.com/mkj/dropbear/blob/master/chachapoly.c]
> * [OpenSSH 
> implementation|https://github.com/openbsd/src/blob/master/usr.bin/ssh/cipher-chachapoly-libcrypto.c]
> The cipher is provided by Bouncycastle.
> As a bonus, this could potentially be adapted to propose an equivalent 
> AES/GCM cipher encoding to how OpenSSH implements this ChaCha20-Poly1305 
> cipher.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to