IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: SSH_MSG_KEXGSS_HOSTKEY (was: Re: I-D ACTION:draft-weber-secsh-pkalg-none-00.txt)



On Mon, Jul 21, 2003 at 07:40:00PM -0400, Jeffrey Hutzelman wrote:
> On Monday, July 21, 2003 15:39:46 -0700 Nicolas Williams 
> <Nicolas.Williams%sun.com@localhost> wrote:
> 
> >I don't like the idea of modifying the existing session ID
> >specifications because those are spread over three I-Ds and never
> >envisioned that the session ID hash specs would change.
> 
> I'm fine with chaining, as long as you can show me a reasonable way to 
> determine what hash algorithm to use.

First extended KEXINIT pair of messages has no chained checksum - it
would have to have a field for negotiation of hash functions.

> >Details.  We want to negotiate tuples - how we encode them is not very
> >important right now (and "dh-group1-sha1-pgp-sign-dss" is really an
> >encoding for {"dh-group1-sha1", "pgp-sign-dss"}).
> 
> Agreed.  A better question is, can we solve the problem adequately using an 
> encoding that fits everything into the existing key exchange process, or do 
> we have to extend it.  I believe this has a significant impact on whether 
> the work is too complex to be worthwhile, and on whether we will be able to 
> get implementors to adopt it.

Agreed.  This is the crucial decision we'll have to make.

> I guess I was thinking in terms of defining the extensions field as a sort 
> of sub-version, which grows as more extension fields are added.  Yes, this 
> means the extension mechanism can only be used by IETF consensus.  That 
> does not strike me as a problem in this case. :-)

Ok.

Nico
-- 



Home | Main Index | Thread Index | Old Index