Bug 430641

Summary: AES192-SHA and AES256-SHA Ciphers
Product: [Eclipse Project] Platform Reporter: Patrick Pollington <patrick.pollington>
Component: TeamAssignee: Platform Team Inbox <platform-team-inbox>
Status: NEW --- QA Contact:
Severity: enhancement    
Priority: P3 CC: ymnk
Version: 4.3.2   
Target Milestone: ---   
Hardware: PC   
OS: Windows 7   
Whiteboard:

Description Patrick Pollington CLA 2014-03-18 17:03:17 EDT
Several of the remote systems that I connect to within our organization via Eclipse Remote System Explorer have undergone security policy upgrades allowing only AES192-SHA or AES256-SHA authentication to connect to these remote systems.  When attempting to connect to these remote systems, I receive a  RSEG1066 Error: failed to connect sshd on 'remote server' - Algorithm negotiation fail.

When does eclipse plan to support the AES192-SHA and AES256-SHA ciphers?
Comment 1 Atsuhiko Yamanaka CLA 2014-03-18 20:05:00 EDT
(In reply to Patrick Pollington from comment #0)
> When does eclipse plan to support the AES192-SHA and AES256-SHA ciphers?

Eclipse may be able to support aes192-ctr, aes256-ctr, aes192-cbc and aes256-cbc[1],
but I have never heard about AES192-SHA and AES256-SHA ciphers for ssh.
Do you have a pointer to RFC for those ciphers?

[1] https://www.ietf.org/rfc/rfc4250.txt
Comment 2 Atsuhiko Yamanaka CLA 2014-03-18 22:39:48 EDT
(In reply to Patrick Pollington from comment #0)
> When does eclipse plan to support the AES192-SHA and AES256-SHA ciphers?

As for aes192-cbc and aes256-cbc ciphers, Eclipse Luna will support them,
but users must install JCE Unlimited Strength Jurisdiction Policy Files[1] by themself.

[1] http://www.oracle.com/technetwork/java/javase/downloads/jce-7-download-432124.html