More Modular Exponential (MODP) Diffie-Hellman Key Exchange Groups for Secure Shell (SSH)
draft-baushke-ssh-dh-group-sha2-06
Document | Type |
Replaced Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Mark D. Baushke | ||
Last updated | 2016-03-01 | ||
Replaced by | RFC 9142 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Replaced by draft-ietf-curdle-ssh-kex-sha2 | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document defines two added Modular Exponential (MODP) Groups for the Secure Shell (SSH) protocol. It also updates [RFC4253], [RFC4419], [RFC4462], and [RFC5656] by specifying the set key exchange algorithms that currently exist and which ones MUST, SHOULD, MAY, and SHOULD NOT be implemented including two new Diffie-Hellman key exchange algorithms using SHA-2 hashes.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)