1Net::SSH::Perl::Kex(3)User Contributed Perl DocumentationNet::SSH::Perl::Kex(3)
2
3
4

NAME

6       Net::SSH::Perl::Kex - SSH2 Key Exchange
7

SYNOPSIS

9           use Net::SSH::Perl::Kex;
10           my $kex = Net::SSH::Perl::Kex->new($ssh);
11           $kex->exchange;
12

DESCRIPTION

14       Net::SSH::Perl::Kex implements base functionality for SSH2 key
15       exchange. The basic idea is this: Kex itself initializes the client
16       algorithm proposal, sends it to the server, then waits for the server's
17       proposal. From these proposals Kex chooses the algorithms that will be
18       used in the communications between client and server (eg. encryption
19       algorithm, MAC algorithm, etc.). Different algorithms can be used in
20       each direction; for example, client to server communications could be
21       encrypted using 3DES, and server to client could be encrypted using
22       RC4.
23
24       The algorithm negotiation phase, as described above, includes
25       negotiation for the key-exchange algorithm to be used.  Currently, the
26       only supported algorithm is Diffie-Hellman Group 1 key exchange,
27       implemented in Net::SSH::Perl::Kex::DH1.  After algorithm negotiation,
28       the Kex object is reblessed into the key exchange class (eg.
29       'Net::SSH::Perl::Kex::DH1'), and then the subclass's exchange method is
30       called to perform the key exchange.
31
32       Once control returns to Kex::exchange, the client waits for the
33       SSH_MSG_NEWKEYS message; once received, the client turns on its
34       incoming encryption/MAC/compression algorithms, then sends an
35       SSH_MSG_NEWKEYS message to the server.  Finally, it turns on its
36       outgoing encryption/MAC/compression algorithms.
37

AUTHOR & COPYRIGHTS

39       Please see the Net::SSH::Perl manpage for author, copyright, and
40       license information.
41
42
43
44perl v5.12.2                      2009-02-02            Net::SSH::Perl::Kex(3)
Impressum