Replies: 1 comment
-
I did not plan to support outdated clients, but you can add other ciphers if you like. My point of view is that the tiny, tiny ESP32 does provide one solution, that is modern and safe (with the knowledge of today) and the client on much bigger hardware has to deal with it - not the other way around. But of course it is interesting to know, what is used in the wild and what is obviously not recommendable in general. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Trying out ssh.be, I quickly got it to work with a default
ssh
client command in Linux, after getting past the "surprise" of not getting a>
prompt when ready for commands, after entering the password.Next step was feasibility for automation, where I have my own client (tested with Linux SSH servers) based on the sshj client library which fails with this message:
The key here is the last bit, when the 2nd half of the matching (proposal from the
ssh.be
server) is an empty list. This makes sense when the functionkexinit_to_client
has:My conclusion became that
ssh.be
expects it to be ok without any MAC algorithms, butsshj
expects the server to have some candidate algorithm(s) on offer.Not sure if I'm reading this right, but the
check_packet
andencrypt
functions appears to be usingcrypto.CHACHA20_POLY1305
to create/check a MAC. Is this based on an expectation of this being "the default" MAC algorithm without a negotiation match?I was wondering if this should or even could be advertised, but my client library does not include it, and this comparison table of SSH across a lot of implementations does not mention anything looking like that. The ones with the broadest support are
hmac-sha1
andhmac-sha2-256
, but several others are common too.What do you think, @Staars ?
Beta Was this translation helpful? Give feedback.
All reactions