-
-
Notifications
You must be signed in to change notification settings - Fork 940
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support newer SSH Ciphers and MACs #53
Comments
Any plan for this? I'm having the issue in software that uses your ssh lib. ShareX/ShareX#3599 |
It might be useful to look at the following repos for 25519 related code, licensed as public domain or MIT: |
I recently also ran into this issue, I am unable to acces a Teltonika router anymore: Please implement some of the newer ciphers. |
+1 |
It seems aes128-ctr, aes192-ctr and aes256-ctr are currently supported. Thank and Best Regards, |
In the next beta, we'll add support for the following key exchange algorithms:
and we've added support for the following host key algorithms:
|
2020.0.0-beta1 is now available. |
Would it be possible to support more crypto algorithms which recent versions of OpenSSH support?
From
man ssh_config
on Debian Jessie.MACs
[email protected],[email protected],
[email protected],[email protected],
[email protected],[email protected],
hmac-sha2-256,hmac-sha2-512,
[email protected],[email protected],
[email protected],
[email protected],[email protected],
hmac-md5,hmac-sha1,hmac-ripemd160,
hmac-sha1-96,hmac-md5-96
Ciphers
aes128-ctr,aes192-ctr,aes256-ctr,
[email protected],[email protected],
[email protected],
arcfour256,arcfour128,
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,
aes192-cbc,aes256-cbc,arcfour
KexAlgorithms
[email protected],
ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,
diffie-hellman-group-exchange-sha256,
diffie-hellman-group14-sha1,
diffie-hellman-group-exchange-sha1,
diffie-hellman-group1-sha1
Related to: darkoperator/Posh-SSH#103
Partly related to: #20
The text was updated successfully, but these errors were encountered: