On Sat, 2003-11-15 at 11:27, Markus Friedl wrote:
> On Sat, Nov 15, 2003 at 10:57:58AM -0500, Bill Sommerfeld wrote:
> > (The process for advancement to Draft Standard requires that we
> > document that all of the protocol features interoperate. if nobody
> > has actually implemented asymmetric algorithms, we can strike it at
> > that point).
>
> OpenSSH might support this.
I know Conch does support this.
> > P.S., There are certainly a few obscure applications where it makes
> > sense to use different algorithms in each direction. One which comes
> > to mind is the case of a remote sensor/space probe/etc., where the
> > "uplink" is low data-rate management/control traffic, where strong
> > integrity protection is required to prevent the probe from being
> > hijacked, and the "downlink" is a higher-volume, lower-value data
> > stream, where weak integrity protection may be sufficient.
>
> Well, you could also send the request, rekey with different
> algorithms, send the reply, rekey again, ...
...because renegotiating keys is more efficient than using assymetric
ciphers...
-p
--
Paul Swartz
(o_ z3p at twistedmatrix dot com
//\ http://www.twistedmatrix.com/users/z3p.twistd/
V_/_ AIM: Z3Penguin
Attachment:
signature.asc
Description: This is a digitally signed message part