IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: applying AES-GCM to secure shell: proposed "tweak"



Nicolas Williams <Nicolas.Williams%sun.com@localhost> writes:

>The fact that SSHv2 encrypts the packet length has been a cause of a
>significant protocol security vulnerability.  Let's kill this encrypt- the-
>packet-length notion.

If we're going to make this change, could we also consider moving *all*
ciphers to nonencrypted lengths?  This currently requires horribly complex
code to process, and it's the very first thing an attacker will hit (that is,
the first bit of client/server code an incoming, possibly hostile packet, will
encounter is the complex encrypted-length processing).  It'd be really nice to
be able to switch this off to reduce the attack surface, subject to
negotiation that the other side supports it, obviously.  There's a 32-bit
flags field in the handshake that's currently unused, one bit could be used to
indicate unencrypted lengths.

Peter.



Home | Main Index | Thread Index | Old Index