IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Implicit server authentication: Proposed clarification
nisse%lysator.liu.se@localhost (Niels =?iso-8859-1?q?M=F6ller?=) writes:
>Peter complained earlier about the chattyness of the userauth protocol, but
>it doesn't have to be chatty. The client can send a password or public
>userauth key + signature immediately after the SERVICE_REQUEST packet,
>perhaps in the same IP packet. That way, one can connect and login using a
>fairly small number of roundtrips, which I believe was one of the original
>design goals.
That was my concern, you can save 1RTT by bundling the service request with
the userauth, so you've already sent the password before you get a reply to
the service request confirming the correct crypto/MAC keys.
>So I propose the following change to the final paragraph of section 6, Key
>Exchange:
Looks good, it'll clear up the ambiguity in the current text. One small
comment, it may be worth adding a note to the effect that "Clients concerned
about potential exposure of sensitive data MAY choose to wait until they
receive and verify the service-request response from the server to verify that
client and server share the same encryption and MAC keys before sending
further messages", not so much because it's a critical security item but to
let readers know that the issue has been considered during the protocol design
process and isn't regarded as a serious problem.
Peter.
Home |
Main Index |
Thread Index |
Old Index