Hi, I would like to know the order used by OpenSSH to choose the key exchange algorithm. I've used Ethereal to sniff a complete connection between my FreeBSD workstation and my OpenBSD laptop. I found that ssh used Diffie-Hellman. Why ? How can I use RSA or DSA keys created during the first boot by /etc/rc ? Please note that I'm not asking how to use keys to access a box, but how to choose a different algorithm to manage the key exchange process and protect my password on the wire... Thanks. Ed
On Sun, 22 Feb 2004, Ed White wrote:> Hi, > > I would like to know the order used by OpenSSH to choose the key exchange > algorithm. > > I've used Ethereal to sniff a complete connection between my FreeBSD > workstation and my OpenBSD laptop. I found that ssh used Diffie-Hellman. > Why ? > > How can I use RSA or DSA keys created during the first boot by /etc/rc ?I think you need to read the protocol spec: http://www.openssh.com/txt/draft-ietf-secsh-connect-15.txt -d
On Sun, Feb 22, 2004 at 12:14:48AM +0100, Ed White wrote:> I've used Ethereal to sniff a complete connection between my FreeBSD > workstation and my OpenBSD laptop. I found that ssh used Diffie-Hellman. > Why ?this is how ssh works.> How can I use RSA or DSA keys created during the first boot by /etc/rc ?they are.
Possibly Parallel Threads
- Diffie Hellman key exchange algorithms
- DSA key not accepted on CentOS even after enabling
- Can we disable diffie-hellman-group-exchange-sha1 by default?
- Can we disable diffie-hellman-group-exchange-sha1 by default?
- Fwd: need help in ssh client: key exchange