IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: draft-miller-secsh-umac-00.txt



>> [...save and restore virtual machine state...]
> Many of the SSH algorithms break in those circumstances.  For
> instance, any stream cipher (including block ciphers in SDCTR mode)
> will leak hugely if the keystream gets reused.

Only if the datastream isn't.  (Perhaps fortunately, the data stream is
likely to be identical to the original in such a case...at least long
enough for the connection to be torn down.)

> In general, I think SSH assumes that time is linear, and isn't
> designed to work in the presence of forking time-streams.  This
> should probably have been mentioned in its Security Considerations.

"Security considerations: this program assumes it is operating in a
space-time continuum with only one time dimension." :-)

/~\ The ASCII				der Mouse
\ / Ribbon Campaign
 X  Against HTML	       mouse%rodents.montreal.qc.ca@localhost
/ \ Email!	     7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B



Home | Main Index | Thread Index | Old Index