IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: draft-harris-ssh-rsa-kex-02 and a possible future change



> I've uploaded a new version of my RSA KEX draft. 
> <http://www.ietf.org/internet-drafts/draft-harris-ssh-rsa-kex-02.txt>

> 1: Using SHA-512 in place of SHA-256.

I'm not sure I like this.  SHA-256 is reasonably good for 32-bit
machines; SHA-512 (and SHA-384) are basically 64-bit algorithms,
calling for eight 64-bit temporaries in their core loops.

I think this change will disproportionately hurt exactly those machines
where your kex is most beneficial - old, slow, half-lung machines,
which are usually 32-bit.

>    Plus of course it gives us headroom in case decent collision
>    attacks are found against the higher SHAs.

True, though I'd prefer to address this by defining variants using
block-cipher-based hash functions.

> 2: Including the encrypted secret in the data hashed to generate the
>    exchange hash.

My reaction here is basically "shrug".  I don't really see the hazard
in the client managing to generate two sessions with the same exchange
hash in the first place.

> I'd like to make another change, to move the transmission of K_S, the
> server's host key, from SSH_MSG_KEXRSA_DONE to SSH_MSG_KEXRSA_PUBKEY.
> [...].  Would any client imeplementors find it a problem?

Tentatively, I wouldn't.  I'll have to look at my code, though, and
make sure I do indeed have (or can easily arrange to have) the host key
at hand at that point.

/~\ The ASCII				der Mouse
\ / Ribbon Campaign
 X  Against HTML	       mouse%rodents.montreal.qc.ca@localhost
/ \ Email!	     7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B



Home | Main Index | Thread Index | Old Index