IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: applying AES-GCM to secure shell: proposed "tweak"



>    (There are some details left to specify on exactly how this should
>    interact with algorithm selection, since there are additional
>    dependencies.  You want to be able to ask for (aead, none) with a
>    fallback to (3des-cbc, hmac), without risk of ending up with
>    (3des-cbc, none).

I believe that's not directly possible at present, given the way
algorithm negotiation works.

However, it is fairly easy to offer enc=aead,3des-cbc mac=hmac, and, if
that negotiation succeeds, immediately re-kex with enc=aead mac=none.

>    Maybe it's easier to say that if an AEAD-algorithm is chosen for
>    encryption, the lists of mac algorithms (for that direction) are
>    ignored).

That would be a rather unpleasant violation of the existing definition.
I'd much rather just re-kex if using a none MAC is that important.

/~\ The ASCII				  Mouse
\ / Ribbon Campaign
 X  Against HTML		mouse%rodents-montreal.org@localhost
/ \ Email!	     7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B



Home | Main Index | Thread Index | Old Index