IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Data transfer during key re-exchange
What happens to "application data" (connection protocol etc) during a
key re-exchange is still not specified by the current transport draft
(transport-18).
This has come up at least three times. The WG decision made by Bill
Sommerfeld[1] was that non-rekey-related traffic should be suspended for
the duration of the rekey, but this was not implemented in the draft.
[1] 19 Oct 2003, thread 'Some questions about "SSH Transport Layer
Encryption Modes"', <200310192351.h9JNpxAx004282%thunk.east.sun.com@localhost>
Therefore, I propose the following change for the transport draft:
In section 9 "Key re-exchange", between the last two paragraphs, insert
the following paragraph:
Once a party has sent a KEXINIT message for key re-exchange, it MUST
NOT send any messages other than DISCONNECT, IGNORE, and DEBUG;
NEWKEYS; and key exchange method specific messages (message numbers
30 to 49); until it has sent a NEWKEYS message. Note however that
after sending a KEXINIT message, each party MUST be prepared to
process an arbitrary number of received messages that may be "in
flight" before seeing a KEXINIT from the other party.
If anyone has objections, this issue should at least go in the issue
tracker, so it doesn't get lost again.
Home |
Main Index |
Thread Index |
Old Index