[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-07-31 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-667143520 Thanks! This is an automated message from the Apache Git Service. To respond to the message, please log on to

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-07-29 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-665138067 Oh hey, sorry about that. This branch is basically ready at this point as I got stuck trying to get ChaCha20-Poly1305 to work properly. From what I recall, I already updated the

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-06-27 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-650583844 Once I’ve figured out the ChaCha part, I think this PR will be ready to go. I’ll add that cipher in a separate PR, but I’m trying to make the changes required for both ciphers

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-06-26 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-650477660 While working on SSHD-1017, I discovered a couple refactoring improvements to add here. This is an automated

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-06-20 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-647042561 Tested on an RPi4 (arm64), works fine. This is an automated message from the Apache Git Service. To respond to the

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-06-14 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-643795423 > I will do so some time soon - does this mean that I can merge this patch if I am satisfied with it ? Yes, I think so. I'm a little iffy on the `BaseGCMCipher` name for the

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-06-13 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-643706799 I also tested this with [dropbear](https://matt.ucc.asn.au/dropbear/dropbear.html) so far, all good. Also tested with PuTTY (on macOS). Feel free to test in any other

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-06-02 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-637901360 Found one OSS implementation of the RFC version (disabled by default) in Erlang OTP. Seems like the ambiguity about requiring a mac with an AEAD cipher caused OpenSSH to create

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-06-01 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-637256088 Based on what I'm finding online, it does seem like the RFC specifies the all caps version. I'm going to try adding that as well.

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-06-01 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-637249935 I can't seem to find any official documentation on what the RFC 5647 cipher names are supposed to be unless they meant to literally use `AEAD_AES_128_GCM` and `AEAD_AES_256_GCM` as

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-06-01 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-63708 Also tested with FileZilla so far. It even defaulted to selecting aes256-gcm! Seems to work. This is an automated

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-06-01 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-637216880 I merged the latest changes from master and did some basic smoketesting using the following: Server: OpenSSH_8.1p1, LibreSSL 2.7.3 Command: `./ssh.sh -c

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-05-24 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-633254174 I still need to do some manual integration testing. Thanks for the suggestions since OpenSSH was the only thing I remembered exists. This may be on hold for a week or so as

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-05-22 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-632976351 The tests all pass on my machine. I'm not sure what's going on with the failing one on here. This is an automated

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-05-21 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-632408690 So it seems I've created an incompatible implementation with OpenSSH at the moment, but it talks to itself. Still debugging this before this can move anywhere.

[GitHub] [mina-sshd] jvz commented on pull request #132: [SSHD-506] Add support for RFC 5647

2020-05-21 Thread GitBox
jvz commented on pull request #132: URL: https://github.com/apache/mina-sshd/pull/132#issuecomment-632271382 Yes, these should be added as defaults once they're working. Based on how OpenSSH is distributed nowadays, these should the highest priority ciphers. I've seen ChaCha20 taking