IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: applying AES-GCM to secure shell: proposed "tweak"
On Thu, Apr 16, 2009 at 07:51:12AM +1000, Damien Miller wrote:
> On Wed, 15 Apr 2009, Nicolas Williams wrote:
>
> > On Wed, Apr 15, 2009 at 03:52:46PM -0400, Jeffrey Hutzelman wrote:
> > > What I'd suggest instead is defining a unique MAC alogrithm for each AEAD
> > > encryption algorithm, which has the same effects as null but is usable
> > > _only_ when the corresponding encryption algorithm is selected. This is a
> > > simple and straightforward modification to the negotiation rules which
> >
> > But not simpler than my proposal:
> >
> > IF an AEAD cipher is selected THEN no MAC alg is selected (since the
> > cipher provides integrity protection all by its lonesome).
> >
> > We should pick the simplest solution that does the job. I don't think
> > you'll find one simpler than the above.
>
> +1
>
> This seems to be the least horrible solution to the problem. It is
> certainly the easiest to implement, which makes me think that it won't
> be stuffed up.
Jeff Hutzelman objects that this violates the abstraction that the
transport layer defines the binary packet encoding. I don't give a
damn.
Home |
Main Index |
Thread Index |
Old Index