IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: updated transport & userauth drafts
It looks like the transport draft still does not deal with the attack I
pointed out a few weeks ago. To fix this, I suggest that the following
text be added to section 4.3:
(begin quote)
aes256-ctr OPTIONAL AES (Rijndael) in CTR mode,
with 256-bit key
aes192-ctr OPTIONAL AES with 192-bit key
aes128-ctr RECOMMENDED AES with 128-bit key
[and similarly for all other block ciphers]
The "aes256-ctr" cipher is AES (Advanced Encryption Standard),
formerly Rijndael, in CTR mode. This version uses 256-bit key.
The "aes192-ctr" cipher. Same as above but with 192-bit key.
The "aes128-ctr" cipher. Same as above but with 128-bit key.
For any cipher in CTR mode, the counter used to encrypt each plaintext
block MUST be the IV if no previous plaintext block exists, or C+1 mod 2^N
where C is the counter used to encrypt the previous block, and N is the
block size of the cipher in bits. Network order SHOULD be used to convert
the counter between its octet string form and its integer form for the
computation of C+1 mod 2^N.
(end quote)
And that the following text be added to the security discussions section:
(begin quote)
The protocol may be susceptible to chosen plaintext attacks if a CBC-mode
cipher is used. It is RECOMMENDED that CBC-mode ciphers be avoided if the
protocol is used in a way that allows an attacker to control part or all
of the first N bits of the plaintext of each packet, where N is the cipher
block size.
(end quote)
Home |
Main Index |
Thread Index |
Old Index