IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: des-cbc cipher



On Thu, Nov 29, 2001 at 03:09:56PM -0500, RJ Atkinson wrote:
> >no, "des-cbc" was never permitted, i checked:
> 
> SSHv2 was deployed before the time of the first IETF WG I-D,
> so that isn't really sufficient here.

hm, draft-ietf-secsh-transport-00.txt is from March 22, 1997
and does not even define the current key-exchange.

the protocol described in the draft-ietf-secsh-transport-00.txt
is very very different from the current SSHv2 spec.

so i doubt that a 1997 implemenation, that only speaks
"double-encrypting-sha" should be considered in this WG.

  "Currently, the following key exchange methods have been defined:

            double-encrypting-sha        mandatory

   The implementation of these methods is described later in this section."

> The WG is supposedly
> standardising the deployed protocol, though perhaps not in fact.

the WG cannot, see below.

> The need remains and is technically founded in interoperability
> and in not making otherwise conforming implementations non-conforming.

have you ever realized that many deployed implementations of SSHv2 are
violating the current specs?  this because the specs have changed.

* there are several implementations that use a different encoding
  of the session id during authentication.

  these implementations are non-conforming to the current drafts.

* there are several implementations that use a different encoding
  of the data that will be signed during authentication.

  these implementations are non-conforming to the current drafts.

* the encoding for SSH_MSG_CHANNEL_OPEN_FAILURE has changed.

  so there are yet more implentations that are not conforming to the
  current drafts.

delaying the last call will only leed to more non-conforming
implementations.

should the WG add all these 'bugs' to the specs, just to make existing
implementations conforming?

-m



Home | Main Index | Thread Index | Old Index