Token2Shell/MD now ready for ChaCha20-Poly1305 and TLS 1.2
- ChaCha20 is a stream cipher and Poly1305 is a data authenticator and both algorithms are known for their high-performance.
These two algorithms are combined and formed the "
email@example.com" cipher method for OpenSSH.
Token2Shell/MD now also supports
firstname.lastname@example.org. When this method is selected for a session, your setting for the MAC algorithms (ex.
hmac-sha2-256-etm@openssh) will be ignored as the data integration is checked through Poly1305.
Please note that many CPU's include support for dedicated AES encryption circuitry and as Token2Shell/MD makes use of encryption methods built into Windows (Windows.Security.Cryptography.Core), you may not notice significant speed improvement when using
email@example.com AES based cipher methods (ex.
aes128-ctr). However, if your device or server doesn't have AES encryption hardware (ex. ARM processors in Windows 10 Mobile devices),
firstname.lastname@example.org give you better or similar performance with less power consumption than AES (https://tools.ietf.org/html/rfc7539).
- TCP Direct connection method now supports TLS 1.2
encryption and can be used for directly connecting to HTTPS servers. For additional information about making an HTTP or HTTPS connection,