[ 
https://issues.apache.org/jira/browse/SSHD-1017?focusedWorklogId=621403&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-621403
 ]

ASF GitHub Bot logged work on SSHD-1017:
----------------------------------------

                Author: ASF GitHub Bot
            Created on: 11/Jul/21 22:38
            Start Date: 11/Jul/21 22:38
    Worklog Time Spent: 10m 
      Work Description: tomaswolf commented on pull request #176:
URL: https://github.com/apache/mina-sshd/pull/176#issuecomment-877871488


   And it's in again.
   
   Chacha20-poly1305 has a block size of 8, and `AbstractSession` computed 
rekey limits for ciphers with block sizes < 16 wrongly, which caused SSHD-1191. 
That's fixed now. If there are remaining problems with rekeying, they're in any 
case not caused by the choice of cipher.
   
   This chacha20-poly1305 implementation itself is perfectly fine.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


Issue Time Tracking
-------------------

    Worklog Id:     (was: 621403)
    Time Spent: 5h 50m  (was: 5h 40m)

> Add support for chacha20-poly1...@openssh.com
> ---------------------------------------------
>
>                 Key: SSHD-1017
>                 URL: https://issues.apache.org/jira/browse/SSHD-1017
>             Project: MINA SSHD
>          Issue Type: New Feature
>            Reporter: Matt Sicker
>            Priority: Major
>             Fix For: 2.7.1
>
>          Time Spent: 5h 50m
>  Remaining Estimate: 0h
>
> See [protocol 
> details|https://github.com/openbsd/src/blob/master/usr.bin/ssh/PROTOCOL.chacha20poly1305].
> * [RFC 7539|https://tools.ietf.org/html/rfc7539] describes the 
> ChaCha20-Poly1305 algorithm.
> * [Dropbear 
> implementation|https://github.com/mkj/dropbear/blob/master/chachapoly.c]
> * [OpenSSH 
> implementation|https://github.com/openbsd/src/blob/master/usr.bin/ssh/cipher-chachapoly-libcrypto.c]
> The cipher is provided by Bouncycastle.
> As a bonus, this could potentially be adapted to propose an equivalent 
> AES/GCM cipher encoding to how OpenSSH implements this ChaCha20-Poly1305 
> cipher.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org

Reply via email to