IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
(LAST CALL) Proposed Issue Resolution: aes128-cbc to REQUIRED
An implementation survey showed that:
1) almost all implementations support AES
2) there was little or no opposition to making it mandatory.
3) while there was some concern about code bloat in requiring both
3DES and AES, the actual bloat factor was minimal (0.5% to 5%) even
in constrained implementations and was dwarfed by the variation in
implementation size brought on by typical space vs. time tradeoffs.
So I'm proposing that we're going to require both for now.
As always, local policy may cause one or both of these to be disabled
in favor of another locally preferred algorithm; this is purely an
implementation conformance requirement. I'll note that
extraordinarily resource-constrained but dynamic implementations could
exploit this by not loading code for disallowed algorithms...
Proposed textual change:
In draft-ietf-secsh-transport, section 5.3 (Encryption), change:
aes128-cbc RECOMMENDED AES with 128-bit key
to
aes128-cbc REQUIRED AES with 128-bit key
Please send comments on this change to the WG list by January 5th,
2004.
- Bill
Home |
Main Index |
Thread Index |
Old Index