IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: draft-miller-secsh-umac-00.txt



On Wed, Jun 13, 2007 at 05:47:20PM -0400, der Mouse wrote:
> >> [...save and restore virtual machine state...]
> > Many of the SSH algorithms break in those circumstances.  For
> > instance, any stream cipher (including block ciphers in SDCTR mode)
> > will leak hugely if the keystream gets reused.
> 
> Only if the datastream isn't.  (Perhaps fortunately, the data stream is
> likely to be identical to the original in such a case...at least long
> enough for the connection to be torn down.)
> 
> > In general, I think SSH assumes that time is linear, and isn't
> > designed to work in the presence of forking time-streams.  This
> > should probably have been mentioned in its Security Considerations.
> 
> "Security considerations: this program assumes it is operating in a
> space-time continuum with only one time dimension." :-)

And with time running only in one direction (hereinafter: "forward" ;)

I don't think there's a dependence on time being monotonic and
non-discrete at a quantum level, just that it not go backward.

:)

But note that even in a VM save/restore case time goes forward (well,
from our p.o.v. anyways.  So we may need a more precise description of
the problem.

I propose that we say that SSHv2 (and probably most cryptographic
protocols) is not continuation reentrance safe ('continuation
reentrance' meaning, here, calling a Scheme-like continuation function
of indefinite extent more than once).

Nico
-- 



Home | Main Index | Thread Index | Old Index