#1
|
||||
|
||||
Does SecureCRT (8) support Curve25519?
Curve25519
Quote:
Quote:
|
#2
|
||||
|
||||
SecureCRT 8 does not support the curve25519 key exchange algorithm.
We don't have a specific timeline for supporting this algorithm, but I have added a feature request. We'll post here in this forum thread if something becomes available and, as always, if you'd like email notification should something become available, feel free to send an email to support@vandyke.com with a subject of "ATTN: Feature request for Forum thread #12314 (curve25519)" or use this form to submit the same. Best bet for the time being is to use the algorithm from #5 on the list, which is supported in SecureCRT 8.0 (diffie-hellman-group-exchange-sha256). --Jake
__________________
Jake Devenport VanDyke Software Technical Support YouTube Channel: https://www.youtube.com/vandykesoftware Email: support@vandyke.com Web: https://www.vandyke.com/support |
#3
|
||||
|
||||
http://arstechnica.com/security/2016...f-crypto-keys/
While there's no *immediate* need to, I'd still really like to move from KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256 to KexAlgorithms curve25519-sha256@libssh.org |
#4
|
||||
|
||||
Dear Rob III,
We understand your desire to move away from DH to your preferred key exchange algorithm: curve25519. We commit to posting notification to this forum should this algorithm be implemented in SecureCRT. Note that as of SecureCRT 8.0, the DH exchange methods default to using primes that are at least 2048 bits, and you can increase this to even larger values as desired. You would need to be connecting to a server that has a primes set that supports larger values in order to be successful, but you might very well be able to put to rest your concerns about 1024-bit primes with DH in the mean time by forcing 2048 or greater primes to be used during key exchange with an SSH2 server. --Jake
__________________
Jake Devenport VanDyke Software Technical Support YouTube Channel: https://www.youtube.com/vandykesoftware Email: support@vandyke.com Web: https://www.vandyke.com/support |
#5
|
||||
|
||||
Added voice for curve25519
So many of the machines we have in public data centers move "digital money" around using various tunnels, etc. Although we have a layered system, because of the nature of what is being moved, we constantly review our access security systems and change our standards as we go. Currently our ingress servers/jump boxes have been configured to support only:
Code:
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256 --Marcos
__________________
Marcos Della Data Center Cloud Architect Nutanix PGP Fingerprint: BDC7 AFFD E94F FA09 C839 9153 F5FF E128 3094 2B9E Key ID: 0x30942B9E |
#6
|
|||
|
|||
Hi Marcos,
SecureCRT has not implemented curve25519 key exchange algorithm yet. I have added this thread to a feature request in our product enhancement database to implement curve25519-sha256 and curve25519-sha256@libssh.org key exchange algorithms. Should a future release of SecureCRT include this feature, notification will be posted here. If you prefer direct email notification, send an email to support@vandyke.com and include "Feature Request - Forum Thread #12314" in the subject line or use this form from the support page of our website.
__________________
Thanks, --Brenda VanDyke Software Technical Support support@vandyke.com (505) 332-5730 |
#7
|
|||
|
|||
Still not implemented?
Dear,
Our company is (was?) using secureFx but our last servers only support curve25519. We are forced to now use FileZilla :/ Best regards, |
#8
|
|||
|
|||
Hi MotamanIT,
I am sorry to hear that. It's rare that a server only supports one key exchange algorithm. ![]() This post has some info on what's involved in implementing new encryption algorithms.
__________________
Thanks, --Brenda VanDyke Software Technical Support support@vandyke.com (505) 332-5730 |
#9
|
|||
|
|||
Hi All,
Our developers have implemented support for the curve25519-sha256 key exchange algorithm (known by two names, curve25519-sha256 and curve25519-sha256@libssh.org, it's the same algorithm in both cases). If you would like us to make this pre-release build available to you, please contact support@vandyke.com and include "Curve25519 feature request" (or similar) in the subject line. If writing us from an email address other than that associated with your VanDyke Software download account, then please indicate in the body of the email what email address is associated with your download account. ![]()
__________________
Thanks, --Brenda VanDyke Software Technical Support support@vandyke.com (505) 332-5730 |
#10
|
|||
|
|||
Hi all,
The curve25519-sha256 key-exchange algorithm was implemented in v8.5.2: Changes in SecureCRT 8.5.2 (Official) -- November 15, 2018 ---------------------------------------------------------- New feature:
__________________
Thanks, --Brenda VanDyke Software Technical Support support@vandyke.com (505) 332-5730 |
![]() |
Thread Tools | |
Display Modes | |
|
|