IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: draft-harris-ssh-rsa-kex-02 and a possible future change



In article <200507071457.KAA01707%Sparkle.Rodents.Montreal.QC.CA@localhost> you write:
>> I've uploaded a new version of my RSA KEX draft. 
>> <http://www.ietf.org/internet-drafts/draft-harris-ssh-rsa-kex-02.txt>
>
>> 1: Using SHA-512 in place of SHA-256.
>
>I'm not sure I like this.  SHA-256 is reasonably good for 32-bit
>machines; SHA-512 (and SHA-384) are basically 64-bit algorithms,
>calling for eight 64-bit temporaries in their core loops.
>
>I think this change will disproportionately hurt exactly those machines
>where your kex is most beneficial - old, slow, half-lung machines,
>which are usually 32-bit.

You're right.  On a convenient slow machine (50MHzish ARM7500FE), a 2048-bit
RSA public operation takes about 1/3s and a 1024-byte SHA-512 takes about
1/2s.  I haven't got a convenient SHA-256 implementation, but looking at the
spec it's a lot friendlier to small systems.  I'll reverse that change.

>> 2: Including the encrypted secret in the data hashed to generate the
>>    exchange hash.
>
>My reaction here is basically "shrug".  I don't really see the hazard
>in the client managing to generate two sessions with the same exchange
>hash in the first place.

I don't think there's a hazard there, but there is one if the client gets to
co-operate with (or be) a server using a KEX method that lets the server
choose the last input to the hash.  Such a KEX method would be approximately
as sane as rsa1024-sha1-draft-01, so I can't safely assume that no-one will
ever deploy one.  Indeed, I suspect that the currently-defined KEX methods
might qualify depending on the host key formats in use.

-- 
Ben Harris



Home | Main Index | Thread Index | Old Index