Added key exchange method "diffie-hellman-group14-sha1". #228

Closed
wants to merge 1 commit into
from

Projects

None yet

2 participants

@Bluehorn
Contributor

I lately failed to use paramiko to connect to an SSH server which does not implement diffie-hellman-group1-sha1 which actually violates the RFC 4253.

OTOH paramiko violates the same RFC in that it does not support diffie-hellman-group14-sha1, which must be implemented all the same.

Please pull this branch to add support for this kex protocol to paramiko.

@Bluehorn Torsten Landschoff Added key exchange method "diffie-hellman-group14-sha1".
This method is REQUIRED for an SSH implementation according to

http://tools.ietf.org/html/rfc4253#section-6.5
22237b6
@SebastianDeiss SebastianDeiss pushed a commit to SebastianDeiss/paramiko that referenced this pull request Jan 9, 2014
Sebastian Deiss Merged pull request #228 from Bluehorn and implemented GSS-API
authenticated dh group14 kex.
4f3d4ee
@SebastianDeiss SebastianDeiss pushed a commit to SebastianDeiss/paramiko that referenced this pull request Jan 13, 2014
Sebastian Deiss GSS-API / SSPI authenticated Diffie-Hellman Key Exchange and user
authentication

This patch implements the GSS-API / SSPI authenticated Diffie-Hellman
Key Exchange and user authentication (gssapi-keyex) with the context
established during key exchange.
In order to use this feature you need the following packages:
- pyasn1 0.1.7
- python-gssapi 0.4.0 (Unix)
- pywin32 2.1.8 (Windows)
These packages are not required for Paramiko, but to use GSS-API / SSPI
authenticated key exchange you need to install them manually.
This patch also contains the patch of pull request #228 which implements
"diffie-hellman-group14-sha1" key exchange.
f969693
@lndbrg
Contributor
lndbrg commented Aug 14, 2014

This is included in #267

@lndbrg lndbrg closed this Aug 14, 2014
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment