Displaying 14 results from an estimated 14 matches for "mlkem768x25519".
2025 Apr 17
2
[Bug 3814] New: incorrect signature when ssh'ing to an AIX server (Big Endian) from amd64 (Little endian)
...rt-v01 at openssh.com,rsa-sha2-256-cert-v01 at openssh.com,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms:
mlkem768x25519-sha256,sntrup761x25519-sha512,sntrup761x25519-sha512 at openssh.com,curve25519-sha256,curve25519-sha256 at libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha2...
2024 Oct 27
3
FYI: fix for big-endian systems pushed to V_9_9 branch
Hi,
This is mostly a note for downstream distributors of OpenSSH. I've
just pushed fixes to the V_9_9 stable branch for a bug in the
mlkem768x25519-sha256 key exchange algorithm that was added in this
release that causes connection failures when connecting between
big-endian and little-endian hosts.
The problem is on the big-endian side. No change is required for
the more common little-endian architectures (e.g. x86, ARM).
If you distribute...
2024 Oct 27
1
FYI: fix for big-endian systems pushed to V_9_9 branch
On Sun, Oct 27, 2024 at 03:45:33PM +1100, Damien Miller wrote:
> This is mostly a note for downstream distributors of OpenSSH. I've
> just pushed fixes to the V_9_9 stable branch for a bug in the
> mlkem768x25519-sha256 key exchange algorithm that was added in this
> release that causes connection failures when connecting between
> big-endian and little-endian hosts.
>
> The problem is on the big-endian side. No change is required for
> the more common little-endian architectures (e.g. x86,...
2025 Feb 18
0
Announce: Portable OpenSSH 9.9p2 released
...ailures when predicates and their arguments were separated by '='
characters instead of whitespace (bz3739).
* sshd(8): fix the "Match invalid-user" predicate, which was matching
incorrectly in the initial pass of config evaluation.
* ssh(1), sshd(8), ssh-keyscan(1): fix mlkem768x25519-sha256 key
exchange on big-endian systems.
* Fix a number of build problems on particular operating systems /
configurations.
Checksums:
==========
- SHA1 (openssh-9.9p2.tar.gz) = edefe960645780dee78059c444d4261667ad3056
- SHA256 (openssh-9.9p2.tar.gz) = karbYD4IzChe3fll4RmdAlhfqU2ZTWyu...
2025 Feb 18
0
Announce: Portable OpenSSH 9.9p2 released
...ailures when predicates and their arguments were separated by '='
characters instead of whitespace (bz3739).
* sshd(8): fix the "Match invalid-user" predicate, which was matching
incorrectly in the initial pass of config evaluation.
* ssh(1), sshd(8), ssh-keyscan(1): fix mlkem768x25519-sha256 key
exchange on big-endian systems.
* Fix a number of build problems on particular operating systems /
configurations.
Checksums:
==========
- SHA1 (openssh-9.9p2.tar.gz) = edefe960645780dee78059c444d4261667ad3056
- SHA256 (openssh-9.9p2.tar.gz) = karbYD4IzChe3fll4RmdAlhfqU2ZTWyu...
2025 May 19
4
[Bug 3824] New: ssh -Q should also accept a remote hostname to query
https://bugzilla.mindrot.org/show_bug.cgi?id=3824
Bug ID: 3824
Summary: ssh -Q should also accept a remote hostname to query
Product: Portable OpenSSH
Version: 10.0p2
Hardware: amd64
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee:
2025 May 13
5
[Bug 3823] New: SSH on same device ignores MAC restrictions
...sh/ssh_known_hosts2: No such file or
directory
debug3: order_hostkeyalgs: no algorithms matched; accept original
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms:
mlkem768x25519-sha256,sntrup761x25519-sha512,sntrup761x25519-sha512 at openssh.com,curve25519-sha256,curve25519-sha256 at libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha2...
2024 Sep 15
2
Call for testing: OpenSSH 9.9
...* ssh(1), sshd(8): add support for a new hybrid post-quantim key
exchange based on on the FIPS 203 Module-Lattice Key Enapsulation
mechanism (ML-KEM) combined with X25519 ECDH as described by
https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-ssh-pq-ke-03
This algorithm "mlkem768x25519-sha256" is available by default.
* ssh(1): the ssh_config "Include" directive can now expand
environment as well as the same set of %-tokens "Match Exec"
supports.
* sshd(8): add a sshd_config "RefuseConnection" option that, if set
will terminate the...
2024 Sep 20
0
Announce: OpenSSH 9.9 released
...* ssh(1), sshd(8): add support for a new hybrid post-quantum key
exchange based on the FIPS 203 Module-Lattice Key Enapsulation
mechanism (ML-KEM) combined with X25519 ECDH as described by
https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-ssh-pq-ke-03
This algorithm "mlkem768x25519-sha256" is available by default.
* ssh(1): the ssh_config "Include" directive can now expand
environment as well as the same set of %-tokens "Match Exec"
supports.
* sshd(8): add a sshd_config "RefuseConnection" option that, if set
will terminate the...
2024 Sep 20
0
Announce: OpenSSH 9.9 released
...* ssh(1), sshd(8): add support for a new hybrid post-quantum key
exchange based on the FIPS 203 Module-Lattice Key Enapsulation
mechanism (ML-KEM) combined with X25519 ECDH as described by
https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-ssh-pq-ke-03
This algorithm "mlkem768x25519-sha256" is available by default.
* ssh(1): the ssh_config "Include" directive can now expand
environment as well as the same set of %-tokens "Match Exec"
supports.
* sshd(8): add a sshd_config "RefuseConnection" option that, if set
will terminate the...
2024 Sep 22
0
Announce: OpenSSH 9.9 released
...* ssh(1), sshd(8): add support for a new hybrid post-quantum key
exchange based on the FIPS 203 Module-Lattice Key Enapsulation
mechanism (ML-KEM) combined with X25519 ECDH as described by
https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-ssh-pq-ke-03
This algorithm "mlkem768x25519-sha256" is available by default.
* ssh(1): the ssh_config "Include" directive can now expand
environment as well as the same set of %-tokens "Match Exec"
supports.
* sshd(8): add a sshd_config "RefuseConnection" option that, if set
will terminate the...
2024 Sep 22
0
Announce: OpenSSH 9.9 released
...* ssh(1), sshd(8): add support for a new hybrid post-quantum key
exchange based on the FIPS 203 Module-Lattice Key Enapsulation
mechanism (ML-KEM) combined with X25519 ECDH as described by
https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-ssh-pq-ke-03
This algorithm "mlkem768x25519-sha256" is available by default.
* ssh(1): the ssh_config "Include" directive can now expand
environment as well as the same set of %-tokens "Match Exec"
supports.
* sshd(8): add a sshd_config "RefuseConnection" option that, if set
will terminate the...
2025 Apr 02
1
Call for testing: OpenSSH 10.0
...scp(1) can still use a mux connection,
> so ssh(1) can be used to establish one, after which they can use it
> as per usual.
>
> Changes since OpenSSH 9.9
> =========================
>
> New features
> ------------
>
> * ssh(1): the hybrid post-quantum algorithm mlkem768x25519-sha256
> is now used by default for key agreement. This algorithm is
> considered to be safe against attack by quantum computers,
> is guaranteed to be no less strong than the popular
> curve25519-sha256 algorithm, has been standardised by NIST
> and is considerably fa...
2025 Apr 01
9
Call for testing: OpenSSH 10.0
...used with
ControlMaster=auto. sftp(1) and scp(1) can still use a mux connection,
so ssh(1) can be used to establish one, after which they can use it
as per usual.
Changes since OpenSSH 9.9
=========================
New features
------------
* ssh(1): the hybrid post-quantum algorithm mlkem768x25519-sha256
is now used by default for key agreement. This algorithm is
considered to be safe against attack by quantum computers,
is guaranteed to be no less strong than the popular
curve25519-sha256 algorithm, has been standardised by NIST
and is considerably faster than the previous de...