IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: draft minutes from meeting at ietf50..
On Sat, Apr 21, 2001 at 03:50:10PM +0900, Tom Holroyd wrote:
> On Fri, 20 Apr 2001, Niels Provos wrote:
>
> > An adversary can listen to SSH network traffic to determine the length
> > of authentication passwords typed during login and interactive shell
> > sessions [B].
>
> Of course SRP authentication fixes that... The SRP shared secret can also
> be used to trigger a key-reexchange, which makes shorter DH parameters
> less of a problem.
i don't see how SRP makes traffic analysis harder.
could you please provide details.
-m
Home |
Main Index |
Thread Index |
Old Index