IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Async rekey?



Simon Tatham <anakin%pobox.com@localhost> writes:

>Another risk is exposure of the session keys from the implementation's memory
>[...]

These are being used in things like IEDs - the other IED, power grid control
elements - where there's nothing much on the system to attack, and
availability is vastly more important than a hypothetical problem of keys
being stolen, thus the don't-risk-data-corruption-via-a-rekey approach.  Even
if someone were to figure out how to steal a key, they're only really being
used for integrity protection (of control messages), and any attacker who can
extract the keys, delete legitimate messages, and inject their own fake ones
in their place already has capabilities way outside the threat model.

Peter.




Home | Main Index | Thread Index | Old Index