IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

RE: SSH key algorithm updates



Niels Möller <nisse%lysator.liu.se@localhost> writes:

>First, it totally defeats the original purpose of group exchange, which was
>to avoid wide use of any particular group, in order to reduce the attacker's
>gain from massive precomputation.

Something even scarier, first pointed out in the Logjam paper, is that (at
least for TLS) some server implementations precompute g^x mod p and reuse it
over a period of time, so every client that connects gets the same DH phase 1
value sent to them.  It's a nice efficiency "optimisation", but it turns DH
into something that works more like RSA (or, since it's DLP, maybe Elgamal)
than DH.

I wouldn't even have considered that someone would do that until I saw it in
the Logjam paper.

>Second, if fixed groups are used, then those groups ought to be subject to
>both standardization review and negotiation at runtime.

The benefit of fixed groups is that, as you mention, they can be reviewed, and
also that they're a lot more efficient than on-the-fly keygen, particularly if
you have to use full-size safe primes rather than the Lim-Lee swarm-of-small-
primes trick.

I'm worried about this short, quick draft turning into a tutorial on how not
to do DH...

Peter.


Home | Main Index | Thread Index | Old Index