IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: applying AES-GCM to secure shell: proposed "tweak"
Nicolas Williams <Nicolas.Williams%sun.com@localhost> writes:
>The fact that SSHv2 encrypts the packet length has been a cause of a
>significant protocol security vulnerability. Let's kill this encrypt- the-
>packet-length notion.
If we're going to make this change, could we also consider moving *all*
ciphers to nonencrypted lengths? This currently requires horribly complex
code to process, and it's the very first thing an attacker will hit (that is,
the first bit of client/server code an incoming, possibly hostile packet, will
encounter is the complex encrypted-length processing). It'd be really nice to
be able to switch this off to reduce the attack surface, subject to
negotiation that the other side supports it, obviously. There's a 32-bit
flags field in the handshake that's currently unused, one bit could be used to
indicate unencrypted lengths.
Peter.
Home |
Main Index |
Thread Index |
Old Index