You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@mina.apache.org by "Matt Sicker (Jira)" <ji...@apache.org> on 2020/06/20 19:12:00 UTC

[jira] [Commented] (SSHD-1017) Add support for chacha20-poly1305@openssh.com

    [ https://issues.apache.org/jira/browse/SSHD-1017?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17141176#comment-17141176 ] 

Matt Sicker commented on SSHD-1017:
-----------------------------------

It looks like all of the Bouncycastle AEAD ciphers can use their common {{AEADParameters}} class for initialization. The equivalent one for the Java 11 version is {{ChaCha20ParameterSpec}}. Use of reflection for the updated APIs could prevent a need to complicate the build with multi-version jars. A similar issue is present for asymmetric ciphers added since Java 8 (like in SSHD-704).

> Add support for chacha20-poly1305@openssh.com
> ---------------------------------------------
>
>                 Key: SSHD-1017
>                 URL: https://issues.apache.org/jira/browse/SSHD-1017
>             Project: MINA SSHD
>          Issue Type: New Feature
>            Reporter: Matt Sicker
>            Priority: Major
>
> See [protocol details|https://github.com/openbsd/src/blob/master/usr.bin/ssh/PROTOCOL.chacha20poly1305].
> * [RFC 7539|https://tools.ietf.org/html/rfc7539] describes the ChaCha20-Poly1305 algorithm.
> The cipher is available in Java 11 natively and is also provided by Bouncycastle with a pure Java implementation fallback.
> As a bonus, this could potentially be adapted to propose an equivalent AES/GCM cipher encoding to how OpenSSH implements this ChaCha20-Poly1305 cipher.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@mina.apache.org
For additional commands, e-mail: dev-help@mina.apache.org