Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Server should not require a MAC algorithm when AEAD cipher is used. #664

Open
tmds opened this issue Feb 19, 2025 · 1 comment
Open

Server should not require a MAC algorithm when AEAD cipher is used. #664

tmds opened this issue Feb 19, 2025 · 1 comment

Comments

@tmds
Copy link

tmds commented Feb 19, 2025

Version

2.11.0

Bug description

When the client and server agree on an AEAD ciper (like aes256-gcm@openssh.comor chacha20-poly1305@openssh.com) the server disconnects when the client and server have no common MAC algorithm.

Actual behavior

The server disconnects when there is no common algorithm MAC algorithm between the client and server.

Expected behavior

With an AEAD cipher, no separate MAC algorithm is needed, so the server should not require a common MAC algorithm. The key exchange should continue.

Relevant log output

Unable to negotiate key exchange for mac algorithms (client to server) (client:  / server: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1)

Other information

Reported by @pandabytes when using Tmds.Ssh .NET client in tmds/Tmds.Ssh#356.

@tmds
Copy link
Author

tmds commented Feb 19, 2025

cc @tomaswolf

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant