IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: additional core draft nits in need of WG attention.



On Sat, 2003-11-15 at 11:27, Markus Friedl wrote:
> On Sat, Nov 15, 2003 at 10:57:58AM -0500, Bill Sommerfeld wrote:
> > (The process for advancement to Draft Standard requires that we
> > document that all of the protocol features interoperate.  if nobody
> > has actually implemented asymmetric algorithms, we can strike it at
> > that point).
> 
> OpenSSH might support this.

I know Conch does support this.

> > P.S., There are certainly a few obscure applications where it makes
> > sense to use different algorithms in each direction.  One which comes
> > to mind is the case of a remote sensor/space probe/etc., where the
> > "uplink" is low data-rate management/control traffic, where strong
> > integrity protection is required to prevent the probe from being
> > hijacked, and the "downlink" is a higher-volume, lower-value data
> > stream, where weak integrity protection may be sufficient.
> 
> Well, you could also send the request, rekey with different
> algorithms, send the reply, rekey again, ...

...because renegotiating keys is more efficient than using assymetric
ciphers...

-p
-- 
      Paul Swartz
(o_   z3p at twistedmatrix dot com
//\   http://www.twistedmatrix.com/users/z3p.twistd/
V_/_  AIM: Z3Penguin

Attachment: signature.asc
Description: This is a digitally signed message part



Home | Main Index | Thread Index | Old Index