> Actually it doesn't.  You're talking about different things: he's
> asking about RSA key exchange (ie how the client and server arrive at
> a shared secret, ie http://www.ietf.org/rfc/rfc4432.txt), but you're
> talking about RSA host key algorithms (ie how the server proves it is
> who you think it is, which happens latter in the connection).
Does it prevent man in the middle attack ?

> 
> Here's the list of supported key exchange algorithms (from
> usr.bin/ssh/myproposal.h):
> 
> #define KEX_DEFAULT_KEX         \
>         "ecdh-sha2-nistp256," \
>         "ecdh-sha2-nistp384," \
>         "ecdh-sha2-nistp521," \
>         "diffie-hellman-group-exchange-sha256," \
>         "diffie-hellman-group-exchange-sha1," \
>         "diffie-hellman-group14-sha1," \
>         "diffie-hellman-group1-sha1"
> 
> so no "rsa1024-sha1" or "rsa2048-sha256".
> 
> To the original question:
>  - Putty implements the client side, which makes me wonder what they
> tested against.  Ben Harris mentioned that his initial implementation
> used OpenSSH.  I don't know if the code is available anywhere, but it
> might be.
>  - the threads on the ietf working group lists mentioned der Mouse
> implemented it, so it's probably in
> http://sparkle.rodents-montreal.org/mouseware/local-src/moussh/moussh/.
> 
> On a related topic: I added an openssh specs page recently
> (http://www.openssh.com/specs.html) which should be the authoritative
> reference for what is supported.  Corrections are welcome (but before
> someone says "RFC6594", note that I'm trying to keep it accurate for
> the most recent release).
> 
> --
> Darren Tucker (dtucker at zip.com.au)
> GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
>     Good judgement comes with experience. Unfortunately, the experience
> usually comes from bad judgement.

Reply via email to