Difference between revisions of "Key exchange method (KEX)"

From wikieduonline
Jump to navigation Jump to search
 
(12 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
[[wikipedia:Key exchange method]]
 
[[wikipedia:Key exchange method]]
  
[[OpenSSH changelog]]
+
* [[Diffie–Hellman key exchange]]
 +
* [[PSK]]
 +
* [[Elliptic-curve Diffie–Hellman (ECDH)]]
 +
 
 +
== [[OpenSSH changelog]] ==
 +
* [[OpenSSH 9.0]] Aug 2022 Use the hybrid Streamlined [[NTRU]] Prime + [[x25519]] [[key exchange]] method by default
 
* [[OpenSSH 8.5]] 03 March 2021 update/replace the experimental [[post-quantum]] hybrid key exchange method
 
* [[OpenSSH 8.5]] 03 March 2021 update/replace the experimental [[post-quantum]] hybrid key exchange method
  
 
* Added [[curve25519-sha256]]@libssh.org key exchange
 
* Added [[curve25519-sha256]]@libssh.org key exchange
 
 
== Cisco IOS ==
 
 
<code>[[show ip ssh]]</code>
 
KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1
 
 
 
== Related terms ==
 
* <code>[[KexAlgorithms]]</code> directive
 
  
 
  ssh -V
 
  ssh -V
Line 24: Line 19:
 
  ssh -o[[KexAlgorithms]]=+diffie-hellman-group1-sha1 123.123.123.123
 
  ssh -o[[KexAlgorithms]]=+diffie-hellman-group1-sha1 123.123.123.123
 
  [[ssh_dispatch_run_fatal]]: Connection to 123.123.123.123 port 22: [[Invalid key length]]
 
  [[ssh_dispatch_run_fatal]]: Connection to 123.123.123.123 port 22: [[Invalid key length]]
 +
 +
== Cisco IOS ==
 +
<code>[[show ip ssh]]</code>
 +
:<code>KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1</code>
 +
 +
== Related terms ==
 +
* <code>[[KexAlgorithms]]</code> directive
 +
* <code>[[ssh -Q kex]]</code>
  
 
== See also ==
 
== See also ==
Line 29: Line 32:
 
* {{key}}
 
* {{key}}
 
* {{ssh}}
 
* {{ssh}}
 +
* {{TLS}}
  
 
[[Category:ssh]]
 
[[Category:ssh]]

Latest revision as of 11:01, 22 February 2024

wikipedia:Key exchange method

OpenSSH changelog[edit]

ssh -V
OpenSSH_8.2p1 Ubuntu-4ubuntu0.2, OpenSSL 1.1.1f  31 Mar 2020
ssh -o PreferredAuthentications=keyboard-interactive -o PubkeyAuthentication=no [email protected]
Unable to negotiate with 10.10.10.2 port 22: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1


ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 123.123.123.123
ssh_dispatch_run_fatal: Connection to 123.123.123.123 port 22: Invalid key length

Cisco IOS[edit]

show ip ssh

KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1

Related terms[edit]

See also[edit]

Advertising: