IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
draft-harris-ssh-rsa-kex-02 and a possible future change
I've uploaded a new version of my RSA KEX draft.
<http://www.ietf.org/internet-drafts/draft-harris-ssh-rsa-kex-02.txt>
Notable changes are:
1: Using SHA-512 in place of SHA-256. This is largely because I've got
the impression that -dh-group-exchange is heading in the direction of
using SHA-512, and it seems silly to require implementations to support
both SHA-256 and SHA-512. Plus of course it gives us headroom in case
decent collision attacks are found against the higher SHAs.
2: Including the encrypted secret in the data hashed to generate the
exchange hash. This should make it much harder for a client to
generate hash collisions, since they'd need to generate K such that K
and its RSA encryption between them generate a collision. I conjecture
that for reasonable RSA key sizes this is infeasible.
I don't imagine that either of these will be controversial.
I'd like to make another change, to move the transmission of K_S, the
server's host key, from SSH_MSG_KEXRSA_DONE to SSH_MSG_KEXRSA_PUBKEY. The
reason for this would be to ensure that even if the server can change its
key (which I can imagine being possible for some kinds of certificate), it
can't use this to mount a collision attack on the exchange hash because it
doesn't know what secret the client is going to send. While this is
rather different from the way the current KEX methods work, I can't
imagine it being any more difficult for server implementations. Would any
client imeplementors find it a problem?
--
Ben Harris
Home |
Main Index |
Thread Index |
Old Index