IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Protocol Action: 'SSH Transport Layer Encryption Modes' to Proposed Standard



The IESG has approved the following document:

- 'SSH Transport Layer Encryption Modes '
   <draft-ietf-secsh-newmodes-05.txt> as a Proposed Standard

This document is the product of the Secure Shell Working Group. 

The IESG contact persons are Sam Hartman and Russ Housley.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-05.txt

Technical Summary
 
 Researchers have discovered that the authenticated encryption portion of
 the current SSH Transport Protocol is vulnerable to several attacks.

 This document describes new counter-mode based symmetric encryption
 methods for the SSH Transport Protocol and gives specific
 recommendations on how frequently SSH implementations should rekey.

 
Working Group Summary
 
 This document was non-controversial and well-received by the WG.

 
Protocol Quality
 
 The spec is relatively simple, and the working group is aware of
 multiple implementations, has received informal reports of successful
 interoperability, and has not received reports of any implementation
 difficulties.

 Sam hartman reviewed the specification for the IESG.

Note to RFC Editor
 
Section 4: Add note about future directions
old:    The "aes128-ctr" method uses AES (the Advanced Encryption Standard,
   formerly Rijndael) with 128-bit keys [AES].  The block size is 16
   bytes.
new:
   The "aes128-ctr" method uses AES (the Advanced Encryption Standard,
   formerly Rijndael) with 128-bit keys [AES].  The block size is 16
   bytes.
       At this time it appears likely that a future
       specification will promote aes128-ctr to be REQUIRED;
       implementation of this algorithm is very strongly encouraged.




Home | Main Index | Thread Index | Old Index