IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: an attack against SSH2 protocol



On Fri, Feb 08, 2002 at 02:50:29PM -0500, Bill Sommerfeld wrote:
> With the 4-byte minimum, the random padding puts a floor on the
> difficulty of guessing the previous block (no better than one chance
> in 2**32).  An implementation could render the attack entirely
> meaningless by always sending a full cipherblock of padding...

i think this would only work if we restrict the actual payload
to the blocksize of the cipher.



Home | Main Index | Thread Index | Old Index