IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: an attack against SSH2 protocol
On Fri, Feb 08, 2002 at 02:50:29PM -0500, Bill Sommerfeld wrote:
> With the 4-byte minimum, the random padding puts a floor on the
> difficulty of guessing the previous block (no better than one chance
> in 2**32). An implementation could render the attack entirely
> meaningless by always sending a full cipherblock of padding...
i think this would only work if we restrict the actual payload
to the blocksize of the cipher.
Home |
Main Index |
Thread Index |
Old Index