dracut-sshd VS cryptoverif

Compare dracut-sshd vs cryptoverif and see what are their differences.

dracut-sshd

Provide SSH access to initramfs early user space on Fedora and other systems that use Dracut (by gsauthof)

cryptoverif

Python implementations for CryptoVerif 1.23 (outdated) (by mgrabovsky)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
dracut-sshd cryptoverif
7 1
204 4
- -
4.6 -
about 1 month ago over 7 years ago
Shell OCaml
- GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

dracut-sshd

Posts with mentions or reviews of dracut-sshd. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-24.

cryptoverif

Posts with mentions or reviews of cryptoverif. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-24.
  • Tinyssh
    7 projects | news.ycombinator.com | 24 Mar 2024
    A better question to ask would have been, why settle for just memory safety - does a formally verified sshd exist? That kind of thing seems to be implemented more in OCaml and F#, like Project Everest, which has formally verified implementations of primitives (HACL) TLS, QUIC, and Signal https://project-everest.github.io/ ... ssh is notably missing?

    I had a dig and found that ssh had in fact been done 9 years ago, tho it doesn't seem to have made it to a distribution: it's an offshoot of the CryptoVerif project[1] (which is, maybe unsurprisingly, under the umbrella of the same Prosecco team at Inria who worked on Project Everest). In 2015 Bruno Blanchet and David Cadé wrote a paper "From Computationally-Proved Protocol Specifications to Implementations and Application to SSH"[2] which describes using CryptoVerif to generate an implementation of SSH from the spec; the code is in the CryptoVerif tarball, but someone's helpfully put that up on github if you want a look https://github.com/mgrabovsky/cryptoverif/tree/master/implem...

    The eye opening bits in the paper (given the claims of tinyssh to be small at < 100k words):

What are some alternatives?

When comparing dracut-sshd and cryptoverif you can also consider the following projects:

wireguard-initramfs - Use dropbear over wireguard.

dracut-crypt-ssh - dracut initramfs module to start dropbear sshd during boot to unlock the root filesystem with the (cryptsetup) LUKS passphrase remotely

dracut - dracut the event driven initramfs infrastructure

u-root - A fully Go userland with Linux bootloaders! u-root can create a one-binary root file system (initramfs) containing a busybox-like set of tools written in Go.

ubuntu-server-zfsbootmenu - Ubuntu zfsbootmenu install script

yubikey-full-disk-encryption - Use YubiKey to unlock a LUKS partition

zfsbootmenu - ZFS Bootloader for root-on-ZFS systems with support for snapshots and native full disk encryption

ubuntu-server-zfsbootmenu

nala