Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and diffie-hellman-group1-sha1 (1024-bit DH)
"Mark D. Baushke" <mdb@juniper.net> Mon, 24 July 2017 03:26 UTC
Return-Path: <mdb@juniper.net>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9498B126B71 for <curdle@ietfa.amsl.com>; Sun, 23 Jul 2017 20:26:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mzv2Uz_n1ScM for <curdle@ietfa.amsl.com>; Sun, 23 Jul 2017 20:26:09 -0700 (PDT)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on0133.outbound.protection.outlook.com [104.47.36.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15254120227 for <curdle@ietf.org>; Sun, 23 Jul 2017 20:26:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=BbXDO31CYcWCn/VqMQ+jc0DIVl/bZEGrRzvUN8c6PPQ=; b=JA/hmJfVl4vMQ2S6Gyf4DAq/fYc/hmcO99m+lCsV8CmtEe0cyUdjzkaz3x6DB6MYkh9hx7DZtHjTIavvyf/jfDk1omjauk5adiaQJXyZD7ZAXcsC75kZsjCQ49ETbP9cPcsfHGer+e1MxA/uL4guqq5KGp62ea4kdypTnsRrS2Q=
Received: from DM5PR05CA0002.namprd05.prod.outlook.com (10.173.226.12) by BY2PR05MB2310.namprd05.prod.outlook.com (10.166.112.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1304.10; Mon, 24 Jul 2017 03:26:06 +0000
Received: from CO1NAM05FT009.eop-nam05.prod.protection.outlook.com (2a01:111:f400:7e50::208) by DM5PR05CA0002.outlook.office365.com (2603:10b6:3:d4::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1304.10 via Frontend Transport; Mon, 24 Jul 2017 03:26:06 +0000
Authentication-Results: spf=softfail (sender IP is 66.129.239.12) smtp.mailfrom=juniper.net; gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=fail action=none header.from=juniper.net;
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning juniper.net discourages use of 66.129.239.12 as permitted sender)
Received: from p-emfe01a-sac.jnpr.net (66.129.239.12) by CO1NAM05FT009.mail.protection.outlook.com (10.152.96.116) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384) id 15.1.1261.15 via Frontend Transport; Mon, 24 Jul 2017 03:26:06 +0000
Received: from p-mailhub01.juniper.net (10.160.2.17) by p-emfe01a-sac.jnpr.net (172.24.192.21) with Microsoft SMTP Server (TLS) id 14.3.123.3; Sun, 23 Jul 2017 20:26:05 -0700
Received: from eng-mail01.juniper.net (eng-mail01.juniper.net [172.17.28.114]) by p-mailhub01.juniper.net (8.14.4/8.11.3) with ESMTP id v6O3Q4TL020221; Sun, 23 Jul 2017 20:26:04 -0700 (envelope-from mdb@juniper.net)
Received: from eng-mail01.juniper.net (localhost [127.0.0.1]) by eng-mail01.juniper.net (Postfix) with ESMTP id 7D74E1144E; Sun, 23 Jul 2017 20:26:03 -0700 (PDT)
To: "curdle@ietf.org" <curdle@ietf.org>
CC: Peter Gutmann <pgut001@cs.auckland.ac.nz>, Damien Miller <djm@mindrot.org>, Deb Cooley <debcooley1@gmail.com>, Tero Kivinen <kivinen@iki.fi>, denis bider <denisbider.ietf@gmail.com>, Russ Housley <housley@vigilsec.com>, Eric Rescorla <ekr@rtfm.com>
In-Reply-To: <alpine.BSO.2.20.1707211413070.14080@haru.mindrot.org>
References: <22892.35863.542104.942153@fireball.acr.fi> <82005.1500305248@eng-mail01.juniper.net>, <alpine.BSO.2.20.1707201053511.14080@haru.mindrot.org> <1500519070842.37117@cs.auckland.ac.nz>, <alpine.BSO.2.20.1707201345030.14080@haru.mindrot.org> <1500524115986.58764@cs.auckland.ac.nz>, <alpine.BSO.2.20.1707211053360.14080@haru.mindrot.org> <1500607284832.92144@cs.auckland.ac.nz> <alpine.BSO.2.20.1707211413070.14080@haru.mindrot.org>
Comments: In-reply-to: Damien Miller <djm@mindrot.org> message dated "Fri, 21 Jul 2017 14:14:27 +1000."
From: "Mark D. Baushke" <mdb@juniper.net>
X-Phone: +1 408 745-2952 (Office)
X-Mailer: MH-E 8.6; nmh 1.2; GNU Emacs 24.3.1
X-Face: #8D_6URD2G%vC.hzU<dI&#Y9szHj$'mGtUq&d=rXy^L$-=G_-LmZ^5!Fszk:yXZp$k\nTF? 8Up0!v/%1Q[(d?ES0mQW8dRCXi18gK)luJu)loHk, }4{Vi`yX?p?crF5o:LL{6#eiO:(E:YMxLXULB k|'a*EjN.B&L+[J!PhJ*aX0n:5/
Date: Sun, 23 Jul 2017 20:26:03 -0700
Message-ID: <398.1500866763@eng-mail01.juniper.net>
Sender: mdb@juniper.net
MIME-Version: 1.0
Content-Type: text/plain
X-EOPAttributedMessage: 0
X-MS-Office365-Filtering-HT: Tenant
X-Forefront-Antispam-Report: CIP:66.129.239.12; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(6009001)(39450400003)(39840400002)(39860400002)(39850400002)(39400400002)(39410400002)(2980300002)(199003)(189002)(305945005)(53936002)(4743002)(6266002)(38730400002)(93886004)(6246003)(110136004)(229853002)(7846003)(117636001)(47776003)(6392003)(2501003)(39060400002)(356003)(106466001)(6916009)(2950100002)(2351001)(478600001)(76176999)(4326008)(50986999)(2906002)(8936002)(97876018)(81166006)(69596002)(81156014)(189998001)(1730700003)(50226002)(86362001)(2810700001)(5003940100001)(105596002)(76506005)(53416004)(5660300001)(77096006)(48376002)(7696004)(68736007)(230783001)(54906002)(5640700003)(626005)(7126002)(50466002)(55016002)(97736004)(8676002)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:BY2PR05MB2310; H:p-emfe01a-sac.jnpr.net; FPR:; SPF:SoftFail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en;
X-Microsoft-Exchange-Diagnostics: 1; CO1NAM05FT009; 1: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
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 28830a13-ff20-4863-a1ff-08d4d243b868
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:BY2PR05MB2310;
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2310; 3: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
X-MS-TrafficTypeDiagnostic: BY2PR05MB2310:
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2310; 25: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
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2310; 31: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
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2310; 20: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
X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(100405760836317);
X-Microsoft-Antispam-PRVS: <BY2PR05MB2310B0F2438E371FD014A9C7BFBB0@BY2PR05MB2310.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(13018025)(8121501046)(13016025)(5005006)(100000703101)(100105400095)(10201501046)(93006095)(93003095)(3002001)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(20161123562025)(20161123564025)(20161123560025)(20161123558100)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:BY2PR05MB2310; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:BY2PR05MB2310;
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2310; 4: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
X-Forefront-PRVS: 0378F1E47A
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2310; 23:eMWvFwvB4hyJe1C2YVLiTbTmYCo72rBfcf48wOtLuqQBDQ6mma5g+HgilrHYQzcHRc2Nmt/auRfXG2ZW7vf2X5E/rRx7pElsz5bD4ghCdiQhLAxeQqarYx8OwroQdzGiupmkT8NqibMSQyPgmTUWJbsRAqraqAkD5bAxfdq4ADNDM3YGCNNB4ZS8grvu8Ez5ZBYwfnkL8zatxvETaPCXr4c/8WHD3vkTWyYevIp6gRt+5rS28nSioBhIOtBKxiy9VihHmnYRVwtk4MaiI2gDsE8OwXkzSvIIxIKPtRcIjl/EReMICRVojoE9UP3ukFPbfahErTjm6ot8cIiqSxoHBhXQKz1ObapQIxEicKileM94OlbH3JhHqu49r3nHr0qNIi5TNxFMBYzvBgV7/pjMLRjDVjhlw7bNNdyqyv6c8bimtZDp95+IoPYi3Eie0expJ5vb0b3XZp/QsbcZ7V1DVoArO4EsbMwSeUfC+dr4+7BbsjwcV3sOLuWFeIPQzQG071V+c8trW6waaI/2sunvFNE2Y6QzWDbUwQ8CQ/cVavN2Oi60UvSale8bDGa1t7oVs7dxKrZS/ZQUZmjv5iAwOYCmzxeX1Kuvu0/+w2nreHDy5OaFsn59f5YUVrtZZmeRyuG+JJmOGiULeYKaXz5iTPFfH3Twn/OxahTM3XxvuwxAntUhwFptIYQ7GOLo8Hci9d7UPHiL6wyh7/Ha0/pKaLouZKSsRSr60fugXuFLDoV8B8uzS/SF+OKdtviDBsTwOTgsD0qEPD/2sLzyYEtis+uG3lw7lxrR+5t9yKnAMewR6wiSbGfi8R0jQMh6rK3UQ3RxAahNBZ/ytqnsl7lHhcDJ8TCEk11KPrXArSPE56wJnKCxUHlRM6A/YmhKUHYhclM6S/JhaOXUSmEDBHD2HSZw2LMh/ngMnlybiQAImcm7ej7cHlwLx+HOmrDnCN8Nu25oyFKMj/YFdlgBCeEFvRuGvxS+hWPZLNmpzxS1JnQiAacZYyAcg9GfKkBiJRfaFa3deZVqKU8KSs/l6mYvF57jFHFon9m30L7B+OlkEttlPszPn4mJRi7znK492lgNywvdz8wB5jcUrj0PI31qhhOfSxnBKyvphfNpMQGL3q4fFJ1tHyeqADLH/h6dDXN/SMrHtZBBzlK5IP1lDsIdEUuLHlsjAlt13WXtniP2kaRXxvNHhbhg7Q35tqJniRKnxaBLR/pS5QNcU1t7z638uzN5s9NQLbnh6h9Bjdn2p8nl4TBg+7CJQO7IBdvZQ/zSkayn0OgFUeor+lYkGMA6m66wkGlQZYItCMgD250EZtMevEXt8VT+jfsGVkd0M9ssk0pFnWmI5i3sP4wFvvsw7mV5Y4Mk6LTpbtdRoXBU4LPmnu3ar19VWuY9Veo2zKkdb36r8fSN1Vh2W3t/+hukoqWcUl4iJNRUWXsxF/xHjq4BtIDQ5MOZs/B1df7cJrMorK1SImLbs3NdSDYJTyZa8lBH9iqCoyTIy3h2/ox10dhcV4h16OO7JVckU5ItR6iz
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2310; 6:tV5/gKyAj8H1a35b2tJ7bZYCKBHgfIIYD8qM0vlGai7JfiVJMlS23Legg+3iuVo5ZrTZ7XLmnP6fNMylzknqZ5FlZVSl37cpfAIjg/+e1t9KQ7PXVOJkAJQKtI1xJLvrLAjVBBtpYCNSGrXnTyeMXU8s4NqRTPsOJpMrrt3Qeyp1AZL9OYGlNd/7d4GtHB4REpRX9eItdCXyhaX+47kyng5P8g5cM9ChQLrIyZOIb48w3nyq+8siz127lP+6ZmP4QxvbkAEmpY1cvf1NHdmBD8Pqznfp4WXpG8WYA6rKSSKSg/HVr3O57le1cs3XHHohLnRETd/AeYlU/RoYPNFoUQTwBBH1HOL+oa69CaVTXhrALtePmYC3/2AyH2eFDr4WgcRL5kujRmrfHbV+19eWD2ARM0vlFMWRcRoA7POkSCMEZ/ZMLN7N4buZM7AnQI1JCjbK2S3ENXmB21GGBR1nYAQe0rTLn3yROAQo/zm7MrVTD4/rPxRsO3PrKmKd+fVGkrwHF/+Q/cp/K1K2dJM9BtKi0LlmcJUfhSGcOLUKP5Xkk6UqXZ40rsYU/cwMenkj0tFvpJFh+WG/dj9bD/JC4ig/+VdwoVJqGCFb1h51AG24OUnIM4NQaNv+XXDgH8ISbR/Mzh2xAjEcLA7dZgaodEvOtVgEwQncJGZS5SN3BvmCqAVH6Dve1x4l7MnqxI+bVk9X7qCmpK+MvVqMl3Z5mxBoFKhEDaTFgcHUtmVCIVGbEaCrqO6Zkr3J0rBITXw4uCWjwFXcIuURha3HZTvu9M1KX+e9aRlhbrDjBDh0K/i1irTIsRpQNZaLQq2xl9IyLATGCsYR4JDWHHek615lvUnD3P0gqwoUzYfTY6JEg5LhSe73QmQ2louJ7VdP3klYoNI0C5IiVDcj0zkrj1Xl9TJNwBP9SLCiEA8qBp5lzOwbCiSM5qUZkRx1LN8HfeoARX7usHrZ9+4aeCZV1dj/+IBXPc6jv4nS83soSdtIjnvWjcuFPArunvIMN3uIcaMZ
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2310; 5: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; 24:5/6q4P/vtHm1TzX1FbFfZ5iEeR1N8Erq5xnCkvReJ9AWDGoX7TtiMd9r4K/FO1JNaV/FcL4z9+l4dvFYzBocWt8zmtC/zeiBj+BR3599mHY=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; BY2PR05MB2310; 7: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
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Jul 2017 03:26:06.2089 (UTC)
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=bea78b3c-4cdb-4130-854a-1d193232e5f4; Ip=[66.129.239.12]; Helo=[p-emfe01a-sac.jnpr.net]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR05MB2310
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/8oIPDjD3U6-KlhLkEDc2lW3B_70>
Subject: Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and diffie-hellman-group1-sha1 (1024-bit DH)
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Jul 2017 03:26:12 -0000
Hi Folks, In the wake of the IETF 99 Curdle meeting, I am in the process of updating the draft-ietf-curdle-ssh-kex-sha2 draft. The following are the summary of changes: - remove use of SHOULD+ and SHOULD- - enumerate all of the Key exchange methods. The table will still have only the non-default "MAY" values, but all entries will exist with a brief indication stating that they MAY be implemented instead of the stronger SHOULD or MUST or SHOULD NOT or MUST NOT. - I am listing diffie-hellman-group1-sha1 as a SHOULD NOT (because it was a MUST preiously), but I am also listing gss-group1-sha1-* as a SHOULD NOT for consistency. Is this okay? Or, should I list the gss group as a MUST NOT? - I am thinking that gss-group14-sha1-* is better as a MAY than a SHOULD. Everything else is MAY, here is the suggested new guidance: Key Exchange Method Name Reference Implement ---------------------------------- ---------- ---------- curve25519-sha256 ssh-curves SHOULD diffie-hellman-group-exchange-sha1 RFC4419 SHOULD NOT diffie-hellman-group1-sha1 RFC4253 SHOULD NOT diffie-hellman-group14-sha1 RFC4253 SHOULD diffie-hellman-group14-sha256 new-modp MUST diffie-hellman-group16-sha512 new-modp SHOULD ecdh-sha2-nistp256 RFC5656 SHOULD ecdh-sha2-nistp384 RFC5656 SHOULD gss-gex-sha1-* RFC4462 SHOULD NOT gss-group1-sha1-* RFC4462 SHOULD NOT gss-group14-sha256-* gss-keyex SHOULD gss-group16-sha512-* gss-keyex SHOULD gss-nistp256-sha256-* gss-keyex SHOULD gss-nistp384-sha384-* gss-keyex SHOULD gss-curve25519-sha256-* gss-keyex SHOULD rsa1024-sha1 RFC4432 MUST NOT I also have a new piece of text that tries to describe the section of SHA256 vs SHA384 vs SHA512. However, I am not sure it is reasonable. I provide it here for your comments: Selecting an appropriate hashing algorithm As may be seen from the above, the Key Exchange Methods area all using either SHA256 or SHA512 with the exception of the ecdh-sha2-nistp384 which uses SHA384. The cited CNSA Suite specifies the use of SHA384 and says that SHA256 is no longer good enough for TOP SECRET. Nothing is said about the use of SHA512. It may be that the internal state of 1024 bits in both SHA384 and SHA512 makes the SHA384 more secure because it does not leak an additional 128 bits of state. Of course, use of SHA384 also reduces the security strength to 192 bits instead of being 256 bits or more. This seems to contradict the desire to double the symmetric key strength in order to try to be safe from Post Quantum Computing (PQC) attacks given a session key derived from the key exchange will be limited to the security strength of the hash being used. The move away from SHA256 to SHA512 for the newer key exchange methods is more to try to slow Grover's algorithm (a PQC attack) slightly. It is also the case that SHA2-512 may, in many modern CPUs, be implemented more efficiently using 64-bit arithmetic than SHA256 which is faster on 32-bit CPUs. The selection of SHA384 vs SHA512 is more about reducing the number of code point alternatives to negotiate. There seemed to be consensus in favor of SHA2-512 over SHA2-384 for key exchanges. Before I publish -09, it would be nice to see if this list is reasonable or not for other folks on the list. Interesting note: I did not find a gss-gex-sha2-* defined in RFC4462. It is also not found in the I-D.ietf-curdle-gss-keyex-sha2 draft. Thank you, -- Mark PS: For completness, here is the list of all of the Key Exchanges methods in my current copy of the draft. 3.1. curve25519-sha256 . . . . . . . . . . . . . . . . . . . . 4 3.2. curve448-sha512 . . . . . . . . . . . . . . . . . . . . . 4 3.3. diffie-hellman-group-exchange-sha1 . . . . . . . . . . . 4 3.4. diffie-hellman-group-exchange-sha256 . . . . . . . . . . 4 3.5. diffie-hellman-group1-sha1 . . . . . . . . . . . . . . . 4 3.6. diffie-hellman-group14-sha1 . . . . . . . . . . . . . . . 5 3.7. diffie-hellman-group14-sha256 . . . . . . . . . . . . . . 5 3.8. diffie-hellman-group15-sha512 . . . . . . . . . . . . . . 5 3.9. diffie-hellman-group16-sha512 . . . . . . . . . . . . . . 5 3.10. diffie-hellman-group17-sha512 . . . . . . . . . . . . . . 6 3.11. diffie-hellman-group18-sha512 . . . . . . . . . . . . . . 6 3.12. ecdh-sha2-nistp256 . . . . . . . . . . . . . . . . . . . 6 3.13. ecdh-sha2-nistp384 . . . . . . . . . . . . . . . . . . . 6 3.14. ecdh-sha2-nistp521 . . . . . . . . . . . . . . . . . . . 6 3.15. gss-gex-sha1-* . . . . . . . . . . . . . . . . . . . . . 6 3.16. gss-group1-sha1-* . . . . . . . . . . . . . . . . . . . . 7 3.17. gss-group14-sha1-* . . . . . . . . . . . . . . . . . . . 7 3.18. gss-group14-sha256-* . . . . . . . . . . . . . . . . . . 7 3.19. gss-group15-sha512-* . . . . . . . . . . . . . . . . . . 7 3.20. gss-group16-sha512-* . . . . . . . . . . . . . . . . . . 7 3.21. gss-group17-sha512-* . . . . . . . . . . . . . . . . . . 8 3.22. gss-group18-sha512-* . . . . . . . . . . . . . . . . . . 8 3.23. gss-nistp256-sha256-* . . . . . . . . . . . . . . . . . . 8 3.24. gss-nistp384-sha384-* . . . . . . . . . . . . . . . . . . 8 3.25. gss-nistp521-sha512-* . . . . . . . . . . . . . . . . . . 8 3.26. gss-curve25519-sha256-* . . . . . . . . . . . . . . . . . 8 3.27. gss-curve448-sha512-* . . . . . . . . . . . . . . . . . . 8 3.28. rsa1024-sha1 . . . . . . . . . . . . . . . . . . . . . . 8 3.29. rsa2048-sha256 . . . . . . . . . . . . . . . . . . . . . 9
- [Curdle] draft-ietf-curdle-ssh-kex-sha2 and diffi… Tero Kivinen
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Russ Housley
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Tero Kivinen
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Mark D. Baushke
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Mark D. Baushke
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Tero Kivinen
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… denis bider
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Peter Gutmann
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Damien Miller
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Peter Gutmann
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Damien Miller
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Peter Gutmann
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Damien Miller
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Peter Gutmann
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Damien Miller
- Re: [Curdle] draft-ietf-curdle-ssh-kex-sha2 and d… Mark D. Baushke