Displaying 20 results from an estimated 500 matches similar to: "X448 Key Exchange"
2018 Sep 14
4
X448 Key Exchange
On 09/13/2018 08:18 PM, Damien Miller wrote:
> We have any plans to add more crypto options to OpenSSH without a strong
> justification, and I don't see one for X448-SHA512 ATM.
What I like about it is that it offers ~224 bit security level, whereas
X25519 offers ~128 bits (according to RFC7748). Hence, pairing X448
with AES256 would provide a full chain of security in the ~224 bit
2020 Jul 03
2
X448 Key Exchange (RFC 8731)
Hi all,
Back in September 2018, I started a thread about implementing the
X448 key exchange (see
https://lists.mindrot.org/pipermail/openssh-unix-dev/2018-September/037183.html).
In February 2020, RFC 8731 (formally specifying X448 in SSH) has
been finalized: https://www.ietf.org/rfc/rfc8731.txt. I thought I'd
start this conversation up again to see if the interest level has
2018 Dec 19
1
How to configure Dovecot to disable NIST's curves and still rertain EECDH?
My opinion is that security by RFC is not security, it's mommy medicine.
Standards have had a terrible time keeping up with security realities.
NITS's curves leak side channel information all over the place. I don't
have details on what implementations are set to calculate the NIST
curves in constant time, and that's not an easy feat to do anyway so I
don't want to depend
2019 Feb 17
3
[PATCH] use ecdh/X25519 from openssl when possible (openssl-1.1.0+)
See attached:
(1) patch against 7.9p1, tested with openssl 1.1.0j and openssl 1.1.1a on linux/i386; passes regression
test and connects to unpatched sshd without problems;
I hacked a bit regress/unittests/kex, and benchmarked
do_kex_with_key("curve25519-sha256 at libssh.org", KEY_ED25519, 256);
Before:
0.3295s per call
After:
0.2183s per call
That is, 50% speedup; assuming
2024 Sep 15
2
Call for testing: OpenSSH 9.9
Hi,
OpenSSH 9.9p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a bugfix release.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available via git using the
instructions at
2024 Jul 30
1
SSH time increased significantly after upgrade to OpenSSH 9.6p1
On Sun, 28 Jul 2024, Darren Tucker wrote:
> OpenSSH 9.0 introduced a quantum resistant hybrid kex method as the
> highest priority method. Quoting
> https://www.openssh.com/releasenotes.html#9.0:
>
> * ssh(1), sshd(8): use the hybrid Streamlined NTRU Prime + x25519 key
> exchange method by default ("sntrup761x25519-sha512 at openssh.com").
> The NTRU
2024 Jul 28
1
SSH time increased significantly after upgrade to OpenSSH 9.6p1
On Sun, 28 Jul 2024 at 22:34, radiatejava <radiatejava at gmail.com> wrote:
> We upgraded sshd in our product from OpenSSH 8.6 to OpenSSH 9,.6.
> After the upgrade, clients are seeing significant increase in time to
> do ssh to the listener. Normally, a single ssh does not matter much
> but some of our workflows involve about 3000 to 4000 ssh connect and
> close and this is
2019 Jul 18
1
Dovecot 2.3.0 TLS
Hello,
I don't know who will read this message, but I found this thread: https://www.mail-archive.com/search?l=dovecot at dovecot.org&q=subject:%22Dovecot+2.3.0+TLS%22&o=newest
And I'm expected the same issue, I will try to explain to you (english is not my native language, sorry)
Since Buster update, so Dovecot update too, I'm not able to connect to my mail server from my
2018 Dec 19
1
How to configure Dovecot to disable NIST's curves and still rertain EECDH?
I am interested in configuring Dovecot's TLS so as to retain forward
secrecy, but eliminate all of NIST's elliptic curves.
Besides being subject to side channel attacks [1], in some quarters
there is a general distrust of NIST's curves and any of their other
cryptographic primitives after the Dual EC DRBG debacle.
>From what I can tell, the following will prevent the use of
2018 Jul 30
2
2.3.2.1 - EC keys suppport?
>>>> I did some local testing and it seems that you are using a curve
>>>> that is not acceptable for openssl as a server key.
>>>> I tested with openssl s_server -cert ec-cert.pem -key ec-key.pem
>>>> -port 5555
>>>> using cert generated with brainpool. Everything works if I use
>>>> prime256v1 or secp521r1. This is a
2018 Jul 31
2
2.3.2.1 - EC keys suppport?
On 31.07.2018 03:32, ????? wrote:
>> Perhaps for whose interested - IETF RFC 7027 specifies for TLS use:
>>
>> [ brainpoolP256r1 | brainpoolP384r1 | brainpoolP512r1 ]
>>
>> And thus t1 would not work anyway. However, having tested r1 the result
>> was just the same.
>>
>> A tcpdump during the openssl test [ s_server | s_client ] then revealed
2018 Jul 30
2
2.3.2.1 - EC keys suppport?
>>>>>> facing [ no shared cipher ] error with EC private keys.
>>>>> the client connecting to your instance has to support ecdsa
>>>>>
>>>>>
>>>> It does - Thunderbird 60.0b10 (64-bit)
>>>>
>>>> [ security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384;true ]
>>>>
>>>> It seems there is
2020 Aug 04
2
Problem with intermediate certificate (tls cafile)
I have several samba servers on Debian 10 all using :
samba 2:4.9.5+dfsg-5+deb10u1 amd64
I use tls cafile, tls certfile and tls keyfile with certificates from
Sectigo (https://cert-manager.com)
And when checking my connexion from the samba server, or from outside,
I've got "unable to verify the first certificate" even if tls_cafile is
provided in smb.conf.
What is wrong
2018 Jul 30
2
2.3.2.1 - EC keys suppport?
>>>> facing [ no shared cipher ] error with EC private keys.
>>> the client connecting to your instance has to support ecdsa
>>>
>>>
>> It does - Thunderbird 60.0b10 (64-bit)
>>
>> [ security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384;true ]
>>
>> It seems there is a difference between the private key (rsa vs. ecc ->
>>
2024 Jul 28
1
SSH time increased significantly after upgrade to OpenSSH 9.6p1
Team,
We upgraded sshd in our product from OpenSSH 8.6 to OpenSSH 9,.6.
After the upgrade, clients are seeing significant increase in time to
do ssh to the listener. Normally, a single ssh does not matter much
but some of our workflows involve about 3000 to 4000 ssh connect and
close and this is hitting us hard,
I enabled logging on the server side. I see the most of the increase
is here in
2019 Feb 15
2
Can we disable diffie-hellman-group-exchange-sha1 by default?
I referred to the fact that there is no value for 4096-bit groups at
all. For higher strengths than 128 bits one should probably not use
non-EC crypto at all, as the document suggests.
On Fri, Feb 15, 2019 at 9:19 AM Darren Tucker <dtucker at dtucker.net> wrote:
>
> On Fri, 15 Feb 2019 at 16:45, Yegor Ievlev <koops1997 at gmail.com> wrote:
> > That doesn't seem to be
2020 Jul 05
2
dovecot oauth
> On 05/07/2020 19:43 Aki Tuomi <aki.tuomi at open-xchange.com> wrote:
>
>
> > On 04/07/2020 21:12 la.jolie at paquerette <la.jolie at paquerette.org> wrote:
> >
> >
> > Hello,
> >
> > I'm trying to configure roundcube / dovecot to work with keycloak.
> > I activated xoauth2 oauthbearer in dovecot.
> > But a problem
2019 Oct 11
2
Panic: file smtp-client-connection.c: line 1212 (smtp_client_connection_established): assertion failed: (!conn->connect_succeeded)
Hello Aki,
I have this problem just with 2.3.8, my self-compiled 2.3.3 works fine.
I have previously tried to update from 2.3.3 to higher versions
(possibly 2.3.5 or so), but always had this error, which is why I am
always back to 2.3.3.
Configuration is exactly the same.
Here my output from "doveconf -n":
# 2.3.8 (9df20d2db): /etc/dovecot/dovecot.conf# Pigeonhole version
0.5.8
2024 Sep 22
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2024 Sep 20
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested