On Thu, Jun 21, 2012 at 5:41 PM, Chris Cappuccio <ch...@nmedia.net> wrote:
> ??????? [hohoho...@dreamsecurity.com] wrote:
>
>> I have question for openssh
>>
>> SSH server with RSA key exchange?
>> I need to look for a free ssh server that accepts RSA key exchange instead
of diffie-hellman.
>
> openssh supports both

Actually it doesn't.  You're talking about different things: he's
asking about RSA key exchange (ie how the client and server arrive at
a shared secret, ie http://www.ietf.org/rfc/rfc4432.txt), but you're
talking about RSA host key algorithms (ie how the server proves it is
who you think it is, which happens latter in the connection).

Here's the list of supported key exchange algorithms (from
usr.bin/ssh/myproposal.h):

#define KEX_DEFAULT_KEX         \
        "ecdh-sha2-nistp256," \
        "ecdh-sha2-nistp384," \
        "ecdh-sha2-nistp521," \
        "diffie-hellman-group-exchange-sha256," \
        "diffie-hellman-group-exchange-sha1," \
        "diffie-hellman-group14-sha1," \
        "diffie-hellman-group1-sha1"

so no "rsa1024-sha1" or "rsa2048-sha256".

To the original question:
 - Putty implements the client side, which makes me wonder what they
tested against.  Ben Harris mentioned that his initial implementation
used OpenSSH.  I don't know if the code is available anywhere, but it
might be.
 - the threads on the ietf working group lists mentioned der Mouse
implemented it, so it's probably in
http://sparkle.rodents-montreal.org/mouseware/local-src/moussh/moussh/.

On a related topic: I added an openssh specs page recently
(http://www.openssh.com/specs.html) which should be the authoritative
reference for what is supported.  Corrections are welcome (but before
someone says "RFC6594", note that I'm trying to keep it accurate for
the most recent release).

--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.

Reply via email to