IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
RE: IESG feedback on core drafts.
> -----Original Message-----
> From: ietf-ssh-owner%netbsd.org@localhost [mailto:ietf-ssh-owner%netbsd.org@localhost]On Behalf
Of Eric Rescorla
> Some detailed comments,
> This sentence is ungrammatical.
>
> "Joseph Galbraith" <galb-list%vandyke.com@localhost> writes:
> > With ciphers operating in CBC mode is theoretically
> > vulnerable to choosen cipher-text attacks because of
> > the high predicability of the start of packet sequence.
Likewise. Aside from "chosen" it's still unparsable.
> > However, this attack is still relatively hard enough, and
> > requires a sufficiently high number of packets, to be safe
> > in the short term. Ciphers with larger block sizes are
> > less vulnerable the ciphers with smaller block sizes.
> > [Is this true?]
> What attack are you talking about here? The Rogaway attack?
> Perhaps you need a citation and some explanation?
>
>
> > Effort is underway to standardize the use of CTR mode
> > ciphers in the SSH protocol. When this work is completed,
> > implementors SHOULD support it.
> >
> > In addition, the CBC mode attack can be mitigated by
> > ensuring the an SSH_MSG_IGNORE packet preceeds any real
^^^ that
-- Howard Chu
Chief Architect, Symas Corp. Director, Highland Sun
http://www.symas.com http://highlandsun.com/hyc
Symas: Premier OpenSource Development and Support
Home |
Main Index |
Thread Index |
Old Index