IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Proposal for New Section 11.1 PRNG



Hi Everyone,

I'd like to suggest the following as a new section to call out the
importance of the PRNG to this effort.  Essentially the first paragraph of
the Replay section was removed from there to form this new section.  I'm
thinking it should just be a new Section 11.1 and then everything that had
been 11.1 (Transport) and below just move downwards.  Your comments on
this are requested.

Thanks,
Chris

===========================================================================

11.1 PRNG

   This protocol binds each session key to the session by including
   random data that is specific to the session in the hash used to
   produce session keys.  If the random data here (e.g., DH parameters)
   are pseudo-random then the PRNG should be cryptographically secure
   (i.e., its next output not easily guessed even when knowing all
   previous outputs) and, furthermore, the PRNG should be seeded with
   some truly random inputs, or as random as can be available.  RFC 1750
   [1750] contains more discussion on this and suggestions for
   randomness.  Implementors should note well the importance of truly
   random values where needed in this document.  They should also heed
   the well-meant, anecdotal warning that implementing PRNG functions are
   difficult to get right.

   The amount of entropy available to a given client or server sometimes
   may be less than what is needed to run the protocol.  In this case
   one must either resort to PRNGs anyways or refuse to run the protocol.
   In practice implementors will generally rely on some PRNG.

[1750] Eastlake, D., Crocker, S. and J. Schiller, "Randomness
       Recommendations for Security", RFC 1750, December 1994.




Home | Main Index | Thread Index | Old Index