search for: blake2b512

Displaying 7 results from an estimated 7 matches for "blake2b512".

2020 Mar 05
0
How does tinc handle "unknown cipher"?
Hi, So my Debian machines are all using the follow cipher + digest: Cipher = chacha20-poly1305 Digest = blake2b512 However my OpenWRT router does not have chacha20-poly1305 and blake2b512 in its SSL library, so it uses the following: Cipher = aes-128-cbc Digest = sha512 I am a bit surprised that the router's tinc manages to talk to Debian's tinc, when I set a cipher suite that the router's SSL li...
2024 Nov 07
1
ssh compat information
On Thu, 7 Nov 2024 at 07:55, Chris Rapier <rapier at psc.edu> wrote: >[...]I had been using > Blake2b512 for the hashing algorithm but I want to put in a path to use > xxhash instead. Maintaining backward compatibility means I need to know > something about the remote. In the case of sftp at least, that sounds like a function of the sftp-server not sshd, in which case could you advertise the ca...
2024 Nov 07
1
ssh compat information
On Fri, 8 Nov 2024 at 03:16, Darren Tucker <dtucker at dtucker.net> wrote: > > On Thu, 7 Nov 2024 at 07:55, Chris Rapier <rapier at psc.edu> wrote: > >[...]I had been using > > Blake2b512 for the hashing algorithm but I want to put in a path to use > > xxhash instead. Maintaining backward compatibility means I need to know > > something about the remote. Could you use the already (draft) specified sftp check-file extension[1] for this? It takes a comma separated list o...
2024 Nov 07
1
ssh compat information
...similar to rsync in that we use hashes to determine if the file fragment (assuming that the transfer cut out mid-file) is identical to the corresponding fragment on the source side. If it is then we start the transfer from the last received byte and append to the destination. I had been using Blake2b512 for the hashing algorithm but I want to put in a path to use xxhash instead. Maintaining backward compatibility means I need to know something about the remote. Hence, the question. I think I have an idea that might work but it's hacky. Alternatively, I can just break compatibility as I am...
2020 Apr 04
3
how to pick cipher for AES-NI enabled AMD GX-412TC SOC tincd at 100% CPU
...rsa rsautl s_client s_server s_time sess_id smime speed spkac srp storeutl ts verify version x509 Message Digest commands (see the `dgst' command for more details) blake2b512 blake2s256 gost md4 md5 rmd160 sha1 sha224 sha256 sha3-224 sha3-256 sha3-384 sha3-512 sha384 sha512 sha512-224 sha512-256 shake128 shake256 sm3 Ciph...
2020 Apr 04
0
how to pick cipher for AES-NI enabled AMD GX-412TC SOC tincd at 100% CPU
Hello everybody, Thank you Fufu Fang for your quick reply: With tinc version 1.0.35 and the bellow options at 100% CPu load i get about 10 MB/s... PMTU = 1400 PMTUDiscovery = yes #Cipher = none Cipher = chacha20-poly1305 Digest = blake2b512 Tried Cipher = none as well and also got 10MB/s with 100% CPU on one thread the other three available threads are idle. With inc_1.1~pre17-1.1_amd64.deb and libssl1.1:amd64 1.1.1d-0+deb10u2 I get the following error: Apr 04 19:03:19 officelink01 tincd[522]: Error while decrypting: error:060A7...
2024 Nov 07
1
ssh compat information
On Wed, 6 Nov 2024, Chris Rapier wrote: > I think I know the answer to this (which would be that you can't) but is there > any not entirely insane way to get the ssh->compat information back to either > scp or sftp? There's no way at present. > I'm doing some extensions on scp (and eventually sftp) and having remote > version or capability information would be