More Modular Exponential (MODP) Diffie-Hellman Key Exchange Groups for Secure Shell (SSH)
draft-baushke-ssh-dh-group-sha2-06
Document | Type | Replaced Internet-Draft (individual) | |
---|---|---|---|
Author | Mark Baushke | ||
Last updated | 2016-03-01 | ||
Replaced by | draft-ietf-curdle-ssh-kex-sha2 | ||
Stream | (None) | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Stream | Stream state | (No stream defined) | |
Consensus Boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Replaced by draft-ietf-curdle-ssh-kex-sha2 | |
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of
the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-baushke-ssh-dh-group-sha2-06.txt
https://www.ietf.org/archive/id/draft-baushke-ssh-dh-group-sha2-06.txt
Abstract
This document defines two added Modular Exponential (MODP) Groups for the Secure Shell (SSH) protocol. It also updates [RFC4253], [RFC4419], [RFC4462], and [RFC5656] by specifying the set key exchange algorithms that currently exist and which ones MUST, SHOULD, MAY, and SHOULD NOT be implemented including two new Diffie-Hellman key exchange algorithms using SHA-2 hashes.
Authors
Mark Baushke (mdb@juniper.net)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)