In article <1125337411.453.8.camel@thunk> you write:
Some review comments from Russ Housley.
...
DISCUSS
All of the encryption modes described in this document are RECOMMENDED
or OPTIONAL. Why isn't one of them REQUIRED?
...
As a strawman resolution to the DISCUSS comment, how about making
aes128-ctr REQUIRED? (this new requirement has no effect on
implementations which don't claim to implement newmodes).
I'd prefer to make 3des-ctr the REQUIRED algorithm, since all SSH
implementations are required to have 3DES code around anyway to support
3des-cbc, so anyone implementing newmodes can put in 3des-ctr support
trivially, whereas aes128-ctr might be a lot more effort or even
impossible (imagine a small implementation without room for both 3DES and
AES).
This does raise the question of how to arrange a transition to AES (or
whatever) in the longer term, but I don't think it should be done on the
back of newmodes.