IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
RE: applying AES-GCM to secure shell: proposed "tweak"
It doesn't need to be ignored, but the order does matter. AEAD-* algorithms must appear first in the order list. And AEAD-* algos must match cipher and MAC in order as well. It's easy to detect, if there is a mismatch between cipher and hmac.
-----Original Message-----
From: ietf-ssh-owner%NetBSD.org@localhost [mailto:ietf-ssh-owner%NetBSD.org@localhost] On Behalf Of Nicolas Williams
Sent: Wednesday, April 15, 2009 8:36 AM
To: der Mouse
Cc: ietf-ssh%NetBSD.org@localhost
Subject: Re: applying AES-GCM to secure shell: proposed "tweak"
On Wed, Apr 15, 2009 at 06:10:50AM -0400, der Mouse wrote:
> > Maybe it's easier to say that if an AEAD-algorithm is chosen for
> > encryption, the lists of mac algorithms (for that direction) are
> > ignored).
>
> That would be a rather unpleasant violation of the existing definition.
> I'd much rather just re-kex if using a none MAC is that important.
AEAD cipher modes clearly combine the MAC into the cipher. That
means that the MAC can no longer be negotiated separately from the
cipher.
Therefore I believe Niels is correct: when an AEAD cipher is selected
then the MAC negotiation MUST be ignored.
Home |
Main Index |
Thread Index |
Old Index