You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@mina.apache.org by "Goldstein Lyor (JIRA)" <ji...@apache.org> on 2015/06/09 07:16:01 UTC
[jira] [Commented] (SSHD-440) Support curve25519-sha256 for KEX and
Ed25519 keys
[ https://issues.apache.org/jira/browse/SSHD-440?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14578334#comment-14578334 ]
Goldstein Lyor commented on SSHD-440:
-------------------------------------
See also [https://github.com/str4d/ed25519-java] for a possible source for such an implementation.
> Support curve25519-sha256 for KEX and Ed25519 keys
> --------------------------------------------------
>
> Key: SSHD-440
> URL: https://issues.apache.org/jira/browse/SSHD-440
> Project: MINA SSHD
> Issue Type: New Feature
> Affects Versions: 0.14.0
> Reporter: Ancoron Luciferis
>
> As an administrator of a production system running with Apache Karaf I want to secure the system as much as possible.
> Based on the following article I would like to use the "curve25519-sha256" key exchange mechanism and Ed25519 keys for the SSH server and client:
> * https://stribika.github.io/2015/01/04/secure-secure-shell.html
> \\
> The probably most stable implementation in pure Java is currently residing in I2P:
> * https://github.com/i2p/i2p.i2p/tree/master/core/java/src/net/i2p/crypto/eddsa
> \\
> ...although it seems to have originated at the following standalone library:
> * https://github.com/str4d/ed25519-java
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)