IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: [Fwd: [Russ Housley] DISCUSS: draft-ietf-secsh-newmodes-05]
In article <1125337411.453.8.camel@thunk> you write:
>Some review comments from Russ Housley.
...
>>DISCUSS
>>
>> All of the encryption modes described in this document are RECOMMENDED
>> or OPTIONAL. Why isn't one of them REQUIRED?
...
>As a strawman resolution to the DISCUSS comment, how about making
>aes128-ctr REQUIRED? (this new requirement has no effect on
>implementations which don't claim to implement newmodes).
I'd prefer to make 3des-ctr the REQUIRED algorithm, since all SSH
implementations are required to have 3DES code around anyway to support
3des-cbc, so anyone implementing newmodes can put in 3des-ctr support
trivially, whereas aes128-ctr might be a lot more effort or even impossible
(imagine a small implementation without room for both 3DES and AES).
This does raise the question of how to arrange a transition to AES (or
whatever) in the longer term, but I don't think it should be done on the
back of newmodes.
--
Ben Harris
Home |
Main Index |
Thread Index |
Old Index