IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

(LAST CALL) Proposed Issue Resolution: aes128-cbc to REQUIRED



An implementation survey showed that:
 1) almost all implementations support AES
 2) there was little or no opposition to making it mandatory.
 3) while there was some concern about code bloat in requiring both
 3DES and AES, the actual bloat factor was minimal (0.5% to 5%) even
 in constrained implementations and was dwarfed by the variation in
 implementation size brought on by typical space vs. time tradeoffs. 

So I'm proposing that we're going to require both for now.

As always, local policy may cause one or both of these to be disabled
in favor of another locally preferred algorithm; this is purely an
implementation conformance requirement.  I'll note that
extraordinarily resource-constrained but dynamic implementations could
exploit this by not loading code for disallowed algorithms...

Proposed textual change:

In draft-ietf-secsh-transport, section 5.3 (Encryption), change:

    aes128-cbc       RECOMMENDED       AES with 128-bit key
to
    aes128-cbc       REQUIRED          AES with 128-bit key

Please send comments on this change to the WG list by January 5th,
2004.

						- Bill



Home | Main Index | Thread Index | Old Index