IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: draft-miller-secsh-umac-00.txt
>> [...save and restore virtual machine state...]
> Many of the SSH algorithms break in those circumstances. For
> instance, any stream cipher (including block ciphers in SDCTR mode)
> will leak hugely if the keystream gets reused.
Only if the datastream isn't. (Perhaps fortunately, the data stream is
likely to be identical to the original in such a case...at least long
enough for the connection to be torn down.)
> In general, I think SSH assumes that time is linear, and isn't
> designed to work in the presence of forking time-streams. This
> should probably have been mentioned in its Security Considerations.
"Security considerations: this program assumes it is operating in a
space-time continuum with only one time dimension." :-)
/~\ The ASCII der Mouse
\ / Ribbon Campaign
X Against HTML mouse%rodents.montreal.qc.ca@localhost
/ \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B
Home |
Main Index |
Thread Index |
Old Index