IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: draft minutes from meeting at ietf50..



On Fri, 20 Apr 2001, Niels Provos wrote:

> An adversary can listen to SSH network traffic to determine the length
> of authentication passwords typed during login and interactive shell
> sessions [B].

Of course SRP authentication fixes that...  The SRP shared secret can also
be used to trigger a key-reexchange, which makes shorter DH parameters
less of a problem.

Tom Wu tells me that Stanford should be issuing the all-clear on SRP any
day now...

Dr. Tom




Home | Main Index | Thread Index | Old Index