IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: DH group exchange (Re: SSH key algorithm updates)
Half the time - or even more often - the parameters sent by the server fail a pairwise consistency test that Crypto++ performs in FIPS mode.
I believe these tests are required by FIPS to use the crypto parameters.
I believe this has been recognized as a shortcoming of these dynamically generated groups, and has been deemed an acceptable level of risk because they are short-lived.
The issue is that FIPS (probably correctly, given its intent to prevent suspicious-looking crypto use) does not make this accommodation.
----- Original Message -----
From: Jeffrey Hutzelman
Sent: Friday, November 6, 2015 21:50
To: denis bider
Cc: jhutz%cmu.edu@localhost ; NielsMöller ; Mark D. Baushke ; ietf-ssh%NetBSD.org@localhost ; stephen.farrell%cs.tcd.ie@localhost ; jon%siliconcircus.com@localhost
Subject: Re: DH group exchange (Re: SSH key algorithm updates)
On Sat, 2015-11-07 at 03:33 +0000, denis bider wrote:
> It is a fairly substantial problem that most dynamically generated
> groups aren't usable with our FIPS module.
What's broken about the groups that don't work?
Home |
Main Index |
Thread Index |
Old Index