IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: applying AES-GCM to secure shell: proposed "tweak"
On Thu, 16 Apr 2009, Peter Gutmann wrote:
> Nicolas Williams <Nicolas.Williams%sun.com@localhost> writes:
>
> > When a KEXINIT is received that has a non-zero value in the KEXINIT
> > reserved uint32 field, then the receiver MUST ignore both, the
> > reserved uint32 field and any additional bytes in the packet beyond
> > it.
>
> I'm not sure that this length-extension will work. The spec has always said
> that the packet ends at the reserved field, but this would change it to say
> that it can now continue more or less arbitrarily beyond this point. What
> will existing implementations do if they see garbage beyond this point?
OpenSSH will treat additional data at the end of a kex packet as
a fatal error. It ignores unknown values of the "reserved" field though,
so it could be used to signal that additional data follows in a different
packet, or that the failure of a kex method is non-terminating.
-d
Home |
Main Index |
Thread Index |
Old Index