You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@mina.apache.org by "Goldstein Lyor (JIRA)" <ji...@apache.org> on 2015/06/09 07:16:01 UTC

[jira] [Commented] (SSHD-440) Support curve25519-sha256 for KEX and Ed25519 keys

    [ https://issues.apache.org/jira/browse/SSHD-440?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14578334#comment-14578334 ] 

Goldstein Lyor commented on SSHD-440:
-------------------------------------

See also [https://github.com/str4d/ed25519-java] for a possible source for such an implementation.

> Support curve25519-sha256 for KEX and Ed25519 keys
> --------------------------------------------------
>
>                 Key: SSHD-440
>                 URL: https://issues.apache.org/jira/browse/SSHD-440
>             Project: MINA SSHD
>          Issue Type: New Feature
>    Affects Versions: 0.14.0
>            Reporter: Ancoron Luciferis
>
> As an administrator of a production system running with Apache Karaf I want to secure the system as much as possible.
> Based on the following article I would like to use the "curve25519-sha256" key exchange mechanism and Ed25519 keys for the SSH server and client:
> * https://stribika.github.io/2015/01/04/secure-secure-shell.html
> \\
> The probably most stable implementation in pure Java is currently residing in I2P:
> * https://github.com/i2p/i2p.i2p/tree/master/core/java/src/net/i2p/crypto/eddsa
> \\
> ...although it seems to have originated at the following standalone library:
> * https://github.com/str4d/ed25519-java



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)