IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: draft minutes from meeting at ietf50..



On Mon, Apr 23, 2001 at 09:54:19AM +0900, Tom Holroyd wrote:
> On Sat, 21 Apr 2001, Markus Friedl wrote:
> 
> > On Sat, Apr 21, 2001 at 03:50:10PM +0900, Tom Holroyd wrote:
> > > On Fri, 20 Apr 2001, Niels Provos wrote:
> > >
> > > > An adversary can listen to SSH network traffic to determine the length
> > > > of authentication passwords typed during login and interactive shell
> > > > sessions [B].
> > >
> > > Of course SRP authentication fixes that...  The SRP shared secret can also
> > > be used to trigger a key-reexchange, which makes shorter DH parameters
> > > less of a problem.
> >
> > i don't see how SRP makes traffic analysis harder.
> >
> > could you please provide details.
> 
> The SRP password is never sent over the network, only some random bignums
> of known length, and some hashes, also of known length.  So even if you
> can observe traffic you can't get the length of the password/phrase.

this does not fork for 'interactive shell sessions', e.g. if i
login in and type 'su'. the authentication used in the ssh connection
is not relevant.



Home | Main Index | Thread Index | Old Index