[Twisted-Python] secsh, please compare with conch
Hi. I hate duplicated effort (that has not real reason to be duplicated), and noticed this: http://www.lag.net/~robey/secsh/ secsh is a module for python 2.3 that implements the SSH2 protocol for secure (encrypted and authenticated) connections to remote machines. unlike SSL (aka TLS), SSH2 protocol does not require heirarchical certificates signed by a powerful central authority. you may know SSH2 as the protocol that replaced telnet and rsh for secure access to remote shells, but the protocol also includes the ability to open arbitrary channels to remote services across the encrypted tunnel (this is how sftp works, for example). the module works by taking a socket-like object that you pass in, negotiating with the remote server, authenticating (using a password or a given private key), and opening flow-controled "channels" to the server, which are returned as socket-like objects. you are responsible for verifying that the server's host key is the one you expected to see, and you have control over which kinds of encryption or hashing you prefer (if you care), but all of the heavy lifting is done by the secsh module. it is written entirely in python (no C or platform-dependent code) and is released under the GNU LGPL (lesser GPL). Could the conch guy please email the author of secsh and see whether they could unite their efforts? Please? Thank you.
On Tuesday, Sep 30, 2003, at 08:39 America/New_York, Tommi Virtanen wrote:
Hi. I hate duplicated effort (that has not real reason to be duplicated), and noticed this:
http://www.lag.net/~robey/secsh/
secsh is a module for python 2.3 that implements the SSH2 protocol for secure (encrypted and authenticated) connections to remote machines. unlike SSL (aka TLS), SSH2 protocol does not require heirarchical certificates signed by a powerful central authority. you may know SSH2 as the protocol that replaced telnet and rsh for secure access to remote shells, but the protocol also includes the ability to open arbitrary channels to remote services across the encrypted tunnel (this is how sftp works, for example).
the module works by taking a socket-like object that you pass in, negotiating with the remote server, authenticating (using a password or a given private key), and opening flow-controled "channels" to the server, which are returned as socket-like objects. you are responsible for verifying that the server's host key is the one you expected to see, and you have control over which kinds of encryption or hashing you prefer (if you care), but all of the heavy lifting is done by the secsh module.
it is written entirely in python (no C or platform-dependent code) and is released under the GNU LGPL (lesser GPL).
Could the conch guy please email the author of secsh and see whether they could unite their efforts? Please? Thank you.
I emailed the secsh guy to make sure he was aware of conch, but I received no reply. -bob
On Tue, 2003-09-30 at 15:05, Bob Ippolito wrote:
Could the conch guy please email the author of secsh and see whether they could unite their efforts? Please? Thank you.
I emailed the secsh guy to make sure he was aware of conch, but I received no reply.
I'm gonna have a look at it in the next couple of days, but Bob, let me know if you hear anything from him. -p -- Paul Swartz (o_ z3p at twistedmatrix dot com //\ http://www.twistedmatrix.com/users/z3p.twistd/ V_/_ AIM: Z3Penguin
On Tue, 30 Sep 2003 15:05:23 -0400 Bob Ippolito <bob@redivi.com> wrote:
I emailed the secsh guy to make sure he was aware of conch, but I received no reply.
I also emailed him, and again, no answer. -- Itamar Shtull-Trauring http://itamarst.org/ Available for Python & Twisted consulting
participants (4)
-
Bob Ippolito
-
Itamar Shtull-Trauring
-
Paul Swartz
-
Tommi Virtanen