On Sat, 2003-11-15 at 11:27, Markus Friedl wrote: > On Sat, Nov 15, 2003 at 10:57:58AM -0500, Bill Sommerfeld wrote: > > (The process for advancement to Draft Standard requires that we > > document that all of the protocol features interoperate. if nobody > > has actually implemented asymmetric algorithms, we can strike it at > > that point). > > OpenSSH might support this. I know Conch does support this. > > P.S., There are certainly a few obscure applications where it makes > > sense to use different algorithms in each direction. One which comes > > to mind is the case of a remote sensor/space probe/etc., where the > > "uplink" is low data-rate management/control traffic, where strong > > integrity protection is required to prevent the probe from being > > hijacked, and the "downlink" is a higher-volume, lower-value data > > stream, where weak integrity protection may be sufficient. > > Well, you could also send the request, rekey with different > algorithms, send the reply, rekey again, ... ...because renegotiating keys is more efficient than using assymetric ciphers... -p -- Paul Swartz (o_ z3p at twistedmatrix dot com //\ http://www.twistedmatrix.com/users/z3p.twistd/ V_/_ AIM: Z3Penguin
Attachment:
signature.asc
Description: This is a digitally signed message part