IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: applying AES-GCM to secure shell: proposed "tweak"
>>> Surely you jest. Why get so complicated when the much simpler
>>> negotiation through alg names will do? What value is there in this
>>> complication?
>> - generality
>> - allowing the feature to be negotiated for any algorithm, not just
>> a particular gcm algorithm, without a cross product explosion
> I'd rather have a magic alg name that does this. It's less code, a
> lot less code.
That's not the only metric that matters.
> We don't need no stinking generality here :) given that we weren't
> given it to begin with :)
That's why we're trying to design a clean mechanism that provides it,
rather than throwing in a kludge for this case, another kludge for next
case, and pretty soon you're shoehorning protocol version numbers into
the authentication username string or some such horror.
> BTW, I would love to use the reserved field of KEXINIT to negotiate
> retriable key exchagne (a big deal for gss keyex).
Why? Why not just have the gss kex define its kex-method-specific
messages so as to permit multiple back-and-forths, retrying as much as
necessary to find something suitable?
Actually, perhaps the best way to answer that would be to sketch the
semantics for the retryable-kex bit you'd like to define; then I could
probably see what the issue is (or suggest a way that doesn't break
interoperability that badly, using existing facilities).
/~\ The ASCII Mouse
\ / Ribbon Campaign
X Against HTML mouse%rodents-montreal.org@localhost
/ \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B
Home |
Main Index |
Thread Index |
Old Index