More Modular Exponential (MODP) Diffie-Hellman Key Exchange Groups for Secure Shell (SSH)
draft-baushke-ssh-dh-group-sha2-06
| Document | Type |
Replaced Internet-Draft
(individual)
Expired & archived
|
|
|---|---|---|---|
| Author | Mark D. Baushke | ||
| Last updated | 2016-03-01 | ||
| Replaced by | RFC 9142 | ||
| RFC stream | (None) | ||
| Intended RFC status | (None) | ||
| Formats | |||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | Replaced by draft-ietf-curdle-ssh-kex-sha2 | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document defines two added Modular Exponential (MODP) Groups for the Secure Shell (SSH) protocol. It also updates [RFC4253], [RFC4419], [RFC4462], and [RFC5656] by specifying the set key exchange algorithms that currently exist and which ones MUST, SHOULD, MAY, and SHOULD NOT be implemented including two new Diffie-Hellman key exchange algorithms using SHA-2 hashes.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)