hms=diffie-hellman-group14-sha1 -oMACs=hmac-sha2-512
user@localhost
against a Twisted ssh server, and you will see the problem.
--
Craig
On Thu, Dec 29, 2016 at 1:17 AM, 陈健 wrote:
hi,
Yes, your understanding is correct. I must set the hmac-sha2-512 option
unable with SecureCRT, it
ug3: load_hostkeys: loaded 1keys from [127.0.0.1]:6022
debug1: Host '[127.0.0.1]:6022' is known and matches the RSA host key.
debug1: Found key in /Users/crodrigues/.ssh/known_hosts:5
debug3: send packet: type 21
debug2: set_newkeys: mode 1
I did not see the problem that you saw.
--
you'll need to provide more details, ideally a short SSCCE
http://sscce.org explaining how to get a broken SSH server with conch.
Thanks for using Twisted & Conch - I hope a simple upgrade will fix it for you!
-glyph
On Dec 20, 2016, at 7:15 PM, 陈健 wrote:
hi:
|
|
I write a
hi:
|
|
I write a SSH server with Twisted(15.5.0) Conch. But it don't support
hmac-sha2-512 MAC algorithms
|
. However I see this problem has been fixed in
https://twistedmatrix.com/trac/ticket/8108 . I asked the question in
http://stackoverflow.com/questions/41254398/twisted-hmac-sh
hi:
|
|
I write a SSH server with Twisted Conch. But encountered a difficult
problem. Assume that user A and user B log in to the twisted ssh server through
ssh command. Then user A tail or cat a large file (greater than 100M) on the
server, which will cause a lot of echoing through the tw
hi:
I wrote a SSH server with Twisted Conch. I want to support for the
'keyboard-interactive' authentication .ChallengeResponseAuthentication controls
support for the 'keyboard-interactive' authentication scheme defined in
RFC-4256. The 'keyboard-interactive' authentication scheme could, in