IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: AEAD in ssh
> You'd need to point to actual analysis (of the kind done in Peek-a-boo) to show that it works.
If I restrict myself to send the same amount of data, at regular intervals, independent of my packet queue; if I pick up packets from my queue if they are any, and send IGNORE messages otherwise; then this prevents keystroke analysis if done in 10 second bursts; and if I keep it up, it masks everything done on the connection.
A paper is not useful to show that this works. It evidently works. Yet, we cannot prove a negative. There are possible ways to get it wrong in practice.
If you can think of an attack, a paper can show if that particular attack is viable. But if you can't think of an attack, you can't write a paper to prove there isn't one.
> twenty years ago Tatu decided it was a good idea to use CRC32
> as an ICV, RC4 as a cipher, and encrypted lengths
By the same logic, Tatu also used C. Maybe we shouldn't use C because Tatu used that.
> So maybe we could do a profile for a special allegedly
> traffic-analysis resistant SSH, let's called it
> Data-oriented SSH or DoSSH,
You crack this joke, just after I pointed out that this costs 1 Mbps or less, whereas Netflix uses 3 - 5 Mbps. This is when Google Fiber is rolling out in the US, and we can expect 1 Gbps speeds to be normal in 15 years (if backward thinking people don't stop it).
You appear to be engaging in deliberate misunderstandings.
There's a repeated claim being made that there's an ongoing controversy about this topic. I'm now beginning to think that this would not be as much the case if we eliminated low-quality arguments.
Home |
Main Index |
Thread Index |
Old Index