From 606a97c4d6baff27f6571562173ab2f79c7775eb Mon Sep 17 00:00:00 2001 From: Jakub Jelen Date: Fri, 1 Nov 2019 16:00:13 +0100 Subject: [PATCH] doc: Update the list of RFCs and clearly mention which are not implemented in libssh Fixes T196 Signed-off-by: Jakub Jelen Reviewed-by: Andreas Schneider --- doc/mainpage.dox | 51 ++++++++++++++++++++++++++++++++++++------------ 1 file changed, 39 insertions(+), 12 deletions(-) diff --git a/doc/mainpage.dox b/doc/mainpage.dox index d319385c..95dd6a8c 100644 --- a/doc/mainpage.dox +++ b/doc/mainpage.dox @@ -179,15 +179,46 @@ It was later modified and expanded by the following RFCs. Protocol - RFC 4432, RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol - - RFC 4462, + (not implemented in libssh) + - RFC 4462, Generic Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol - - RFC 4716, + (only the authentication implemented in libssh) + - RFC 4716, The Secure Shell (SSH) Public Key File Format - - RFC 5647, + (not implemented in libssh) + - RFC 5647, AES Galois Counter Mode for the Secure Shell Transport Layer Protocol - - RFC 5656, + (the algorithm negotiation implemented according to openssh.com) + - RFC 5656, Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer + - RFC 6594, + Use of the SHA-256 Algorithm with RSA, DSA, and ECDSA in SSHFP Resource Records + (not implemented in libssh) + - RFC 6668, + SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol + - RFC 7479, + Using Ed25519 in SSHFP Resource Records + (not implemented in libssh) + - RFC 8160, + IUTF8 Terminal Mode in Secure Shell (SSH) + (not handled in libssh) + - RFC 8270, + Increase the Secure Shell Minimum Recommended Diffie-Hellman Modulus Size to 2048 Bits + - RFC 8308, + Extension Negotiation in the Secure Shell (SSH) Protocol + (only the "server-sig-algs" extension implemented) + - RFC 8332, + Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol + +There are also drafts that are being currently developed and followed. + + - draft-ietf-curdle-ssh-kex-sha2-10 + Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH) + - draft-miller-ssh-agent-03 + SSH Agent Protocol + - draft-ietf-curdle-ssh-curves-12 + Secure Shell (SSH) Key Exchange Method using Curve25519 and Curve448 Interesting cryptography documents: @@ -205,20 +236,16 @@ do the same in libssh. @subsection main-rfc-extensions Secure Shell Extensions -The libssh project has an extension to support Curve25519 which is also supported by -the OpenSSH project. - - - curve25519-sha256@libssh.org, - Curve25519-SHA256 for ECDH KEX - The OpenSSH project has defined some extensions to the protocol. We support some of them like the statvfs calls in SFTP or the ssh-agent. - OpenSSH's deviations and extensions - - - OpenSSH's ssh-agent - OpenSSH's pubkey certificate authentication + - + chacha20-poly1305@openssh.com authenticated encryption mode + - + OpenSSH private key format (openssh-key-v1) */