On Thu, Jun 21, 2012 at 5:41 PM, Chris Cappuccio <ch...@nmedia.net> wrote: > ??????? [hohoho...@dreamsecurity.com] wrote: > >> I have question for openssh >> >> SSH server with RSA key exchange? >> I need to look for a free ssh server that accepts RSA key exchange instead of diffie-hellman. > > openssh supports both
Actually it doesn't. You're talking about different things: he's asking about RSA key exchange (ie how the client and server arrive at a shared secret, ie http://www.ietf.org/rfc/rfc4432.txt), but you're talking about RSA host key algorithms (ie how the server proves it is who you think it is, which happens latter in the connection). Here's the list of supported key exchange algorithms (from usr.bin/ssh/myproposal.h): #define KEX_DEFAULT_KEX \ "ecdh-sha2-nistp256," \ "ecdh-sha2-nistp384," \ "ecdh-sha2-nistp521," \ "diffie-hellman-group-exchange-sha256," \ "diffie-hellman-group-exchange-sha1," \ "diffie-hellman-group14-sha1," \ "diffie-hellman-group1-sha1" so no "rsa1024-sha1" or "rsa2048-sha256". To the original question: - Putty implements the client side, which makes me wonder what they tested against. Ben Harris mentioned that his initial implementation used OpenSSH. I don't know if the code is available anywhere, but it might be. - the threads on the ietf working group lists mentioned der Mouse implemented it, so it's probably in http://sparkle.rodents-montreal.org/mouseware/local-src/moussh/moussh/. On a related topic: I added an openssh specs page recently (http://www.openssh.com/specs.html) which should be the authoritative reference for what is supported. Corrections are welcome (but before someone says "RFC6594", note that I'm trying to keep it accurate for the most recent release). -- Darren Tucker (dtucker at zip.com.au) GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69 Good judgement comes with experience. Unfortunately, the experience usually comes from bad judgement.