search for: eddsa

Displaying 20 results from an estimated 20 matches for "eddsa".

Did you mean: ecdsa
2018 Oct 19
2
Future Releases
...t probable to be >> released? >> > We have no idea .. we don't design what is in CentOS. If Red Hat adds > those things to RHEL-6 then we will put them in CentOS .. If they don't > we won't. And for example, if RH does not backport openSSL 1.1.1, you will not get EDDSA certificate support for TLS? 1.3.? Now you might not care about this for your servers and just continue to use ECDSA certs. Clients will increasingly encounter EDDSA certs and it will be interesting to see how this is handled in older clients.? We have had years to spread support for ECDSA befo...
2018 Oct 19
1
Future Releases
...gt;> We have no idea .. we don't design what is in CentOS.? If Red Hat adds >>> those things to RHEL-6 then we will put them in CentOS .. If they don't >>> we won't. >> >> And for example, if RH does not backport openSSL 1.1.1, you will not >> get EDDSA certificate support for TLS? 1.3.? Now you might not care >> about this for your servers and just continue to use ECDSA certs. >> Clients will increasingly encounter EDDSA certs and it will be >> interesting to see how this is handled in older clients.? We have had >> ye...
2018 Aug 31
0
Certificates
...alling a self-signed independent cert.? There is much written about building your own CA and a number of tools for that like openCA.? I can't speak for all your devices or apps, but there should be ways.... In personal promotion, I have been doing my own CA work for ECDSA certs and now for EDDSA certs (and I wonder what commercial CAs are providing them).? See my Internet draft: draft-moskowitz-ecdsa-pki And my github for pending updates to this and the new eddsa-pki draft (to be published after openSSL 1.1.1 is released). https://github.com/rgmhtt/draft-moskowitz-ecdsa-pki https://gi...
2018 Oct 19
0
Future Releases
...sed? >>> >> We have no idea .. we don't design what is in CentOS. If Red Hat adds >> those things to RHEL-6 then we will put them in CentOS .. If they don't >> we won't. > > And for example, if RH does not backport openSSL 1.1.1, you will not get > EDDSA certificate support for TLS? 1.3.? Now you might not care about this > for your servers and just continue to use ECDSA certs. Clients will > increasingly encounter EDDSA certs and it will be interesting to see how this > is handled in older clients.? We have had years to spread support...
2015 Oct 08
3
[PATCH] Enabling ECDSA in PKCS#11 support for ssh-agent
...k you need an OID to put in the namedCurve field of EC Parameters structure, right? The structure is: Parameters:: = CHOICE { ecParametersECParameters, namedCurveCURVES. & id( { CurveNames}), implicitlyCANULL} The ecParametersECParameters approach doesn't work, I believe, for EdDSA, but a namedCurve would probably do. But what OID to use? I'm happy to reserve 1.3.6.1.4.1.11591.9 to mean a namedCurve value for Ed25519 in PKCS#11. I'm not sure this approach works out -- but let's try. /Simon > Cheers, > > Thomas > > On Thu, Oct 8, 2015 at 2:00 PM...
2018 Oct 18
4
Future Releases (was: What are the differences between systemd and non-systemd Linux distros?)
On 18.10.2018 00:08, Johnny Hughes wrote: > The bottom line .. we don't make the decision whether or not to use > systemd or not. We rebuild RHEL source code. will there come a CentOS 6.11 which will be capable of TLS1.3 or HTTP/2? I'm sure there will come a CentOS 8, but when is it probable to be released? one of the most important things (for me), as I already noticed there will
2019 Feb 15
2
Can we disable diffie-hellman-group-exchange-sha1 by default?
I referred to the fact that there is no value for 4096-bit groups at all. For higher strengths than 128 bits one should probably not use non-EC crypto at all, as the document suggests. On Fri, Feb 15, 2019 at 9:19 AM Darren Tucker <dtucker at dtucker.net> wrote: > > On Fri, 15 Feb 2019 at 16:45, Yegor Ievlev <koops1997 at gmail.com> wrote: > > That doesn't seem to be
2018 Aug 31
5
Certificates
I am getting myself confused, and need someone who fully understands this process to help me out a bot. I would like to obtain an ssl certificate, so I can run my own imap server on a machine in my office. My domain is hosted by networksolutions, but I don't run my imap server there. I am assuming I'll need to pay a CA to generate what I need, but I'm confused about what I
2023 Sep 03
1
[patch] ssh-keygen(1): generate Ed25519 keys when invoked without arguments
...penSSH can positively impact the wider eco-system and industry. I'd like to suggest ssh-keygen to generate an Ed25519 keypair, if invoked without any arguments. OpenSSH has supported Ed25519 since version 6.5 (January 2014). The newly published FIPS 186-5 (February 2023) guidelines approve the EdDSA algorithms specified in IETF RFC 8032 (January 2017). At p2k23 Theo de Raadt suggested now (before OpenBSD 7.4 release) is good timing to consider this change. Is there a reason not to do this? OK? Kind regards, Job Further reading: Original Ed25519 paper: https://ed25519.cr.yp.to/ed25519-20...
2017 Apr 16
1
Simple OCSP server ??
What about the pki package that comes with Centos? pki-server and pki-ca? On 04/16/2017 11:54 AM, Alice Wonder wrote: > Oh I don't know, their github works. > > However it seems that it isn't able to deal with more than one ocsp > signing key. > > On 04/16/2017 08:40 AM, Robert Moskowitz wrote: >> >> >> On 04/14/2017 10:41 PM, Alice Wonder wrote:
2019 Feb 17
3
[PATCH] use ecdh/X25519 from openssl when possible (openssl-1.1.0+)
See attached: (1) patch against 7.9p1, tested with openssl 1.1.0j and openssl 1.1.1a on linux/i386; passes regression test and connects to unpatched sshd without problems; I hacked a bit regress/unittests/kex, and benchmarked do_kex_with_key("curve25519-sha256 at libssh.org", KEY_ED25519, 256); Before: 0.3295s per call After: 0.2183s per call That is, 50% speedup; assuming
2019 Mar 29
2
Unable to verify of llvm sources with the .sig files
...ion, Inc. License GPLv3+: GNU GPL version 3 or later < https://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Home: /home/wink/.gnupg Supported algorithms: Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA Cipher: IDEA, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH, CAMELLIA128, CAMELLIA192, CAMELLIA256 Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224 Compression: Uncompressed, ZIP, ZLIB, BZIP2 I went to http://releases.llvm.org/download.html and downloaded llvm-8.0.0: http://releases....
2018 Aug 14
0
TLS 1.3 and openSSL 1.1.1 support
...llenges with ED25519 certs, I will soon have an Internet Draft out on them). So general heads up.? TLS 1.3 is claimed to be the cat's meow for security (I see it as a kitchen sink).? There will be questions asking for when it will be available (wait until they start thinking about creating EDDSA pkis). Yet another thing for our hard working Centos team.
2019 Apr 04
2
Unable to verify of llvm sources with the .sig files
...ttps://gnu.org/licenses/gpl.html> > > This is free software: you are free to change and redistribute it. > > There is NO WARRANTY, to the extent permitted by law. > > > > Home: /home/wink/.gnupg > > Supported algorithms: > > Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA > > Cipher: IDEA, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH, CAMELLIA128, > > CAMELLIA192, CAMELLIA256 > > Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224 > > Compression: Uncompressed, ZIP, ZLIB, BZIP2 > > > > > > I went to http://release...
2024 Jan 11
0
Announce: timeline to remove DSA support in OpenSSH
...SHv2 RFCs[3], mostly because alternative algorithms were encumbered by patents when the SSHv2 protocol was designed and specified. Since then, the world has moved on. RSA is unencumbered and support for it is ubiquitous. ECDSA offers significant performance and security benefits over modp DSA, and EdDSA overs further performance and security improvements over both again. The only remaining use of DSA at this point should be deeply legacy devices. As such, we no longer consider the costs of maintaining DSA in OpenSSH to be justified. Moreover, we hope that OpenSSH's final removal of this insec...
2024 Jan 11
0
Announce: timeline to remove DSA support in OpenSSH
...SHv2 RFCs[3], mostly because alternative algorithms were encumbered by patents when the SSHv2 protocol was designed and specified. Since then, the world has moved on. RSA is unencumbered and support for it is ubiquitous. ECDSA offers significant performance and security benefits over modp DSA, and EdDSA overs further performance and security improvements over both again. The only remaining use of DSA at this point should be deeply legacy devices. As such, we no longer consider the costs of maintaining DSA in OpenSSH to be justified. Moreover, we hope that OpenSSH's final removal of this insec...
2015 Oct 08
2
[PATCH] Enabling ECDSA in PKCS#11 support for ssh-agent
On 10/8/2015 4:49 AM, Simon Josefsson wrote: > Mathias Brossard <mathias at brossard.org> writes: > >> Hi, >> >> I have made a patch for enabling the use of ECDSA keys in the PKCS#11 >> support of ssh-agent which will be of interest to other users. > > Nice! What would it take to add support for Ed25519 too? Do we need to > allocate any new PKCS#11
2015 Sep 28
4
[PATCH] Enabling ECDSA in PKCS#11 support for ssh-agent
Hi, I have made a patch for enabling the use of ECDSA keys in the PKCS#11 support of ssh-agent which will be of interest to other users. I have tested it with P-256 keys. P-384 and P-521 should work out-of-the box. The code is ready for non-FIPS curves (named or explicit), but OpenSSH currently limits ECDSA to those 3 curves. At high level it works like the support for RSA, but because of
2019 Nov 01
10
U2F support in OpenSSH HEAD
Hi, As of this morning, OpenSSH now has experimental U2F/FIDO support, with U2F being added as a new key type "sk-ecdsa-sha2-nistp256 at openssh.com" or "ecdsa-sk" for short (the "sk" stands for "security key"). If you're not familiar with U2F, this is an open standard for making inexpensive hardware security tokens. These are easily the cheapest way
2017 Mar 17
4
sievec
Doug, On 03/16/2017 11:23 PM, Doug Barton wrote: > Your pattern seems a little too complicated. See below. I acquired this script from: http://www.campworld.net/thewiki/pmwiki.php/LinuxServersCentOS/Cent6VirtMailServer No telling where he got it from. So I greatly appreciate any and all advice. I am writing my own howto, and I would like to think I am doing a better job of it. I hope