Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support chacha20-poly1305@openssh.com cipher #8554

Closed
cyberduck opened this issue Feb 6, 2015 · 3 comments
Closed

Support chacha20-poly1305@openssh.com cipher #8554

cyberduck opened this issue Feb 6, 2015 · 3 comments
Assignees
Labels
enhancement fixed sftp SFTP Protocol Implementation
Milestone

Comments

@cyberduck
Copy link
Collaborator

cyberduck commented Feb 6, 2015

5586502 created the issue

This is in the line of tickets #8488, #8528 and #8537, but not as urgent as the key exchange algorithms.

Apparently the ciphers aes256-ctr, aes192-ctr and aes128-ctr which are left after #8537 are still secure if Encrypt-then-MAC is used, but they do not offer authenticated encryption. Chacha20-poly1305 fixes this.

@cyberduck
Copy link
Collaborator Author

cyberduck commented Jan 5, 2021

@dkocher commented

Upstream issue.

@cyberduck
Copy link
Collaborator Author

cyberduck commented Apr 28, 2021

@ylangisc commented

In 25dc5fb.

@cyberduck
Copy link
Collaborator Author

cyberduck commented Apr 29, 2021

@dkocher commented

Milestone renamed

@iterate-ch iterate-ch locked as resolved and limited conversation to collaborators Nov 26, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement fixed sftp SFTP Protocol Implementation
Projects
None yet
Development

No branches or pull requests

2 participants