Date: Sun, 26 Nov 2000 18:57:16 -0400 From: "Jeroen C. van Gelderen" <jeroen@vangelderen.org> To: Niels Provos <provos@citi.umich.edu> Cc: Kris Kennaway <kris@FreeBSD.ORG>, "Brian F. Feldman" <green@FreeBSD.ORG>, security@FreeBSD.ORG Subject: Re: OpenSSH 2.3.0 pre-upgrade Message-ID: <3A21954C.F9E9D25F@vangelderen.org> References: <20001126215625.21D89207C1@citi.umich.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi Niels,
Niels Provos wrote:
>
> Hi,
>
> Jeroen C. van Gelderen wrote:
> >You happen to know who came up with the non-standard
> >extension to the SSH2 protocol that allows these primes
> >to be used??
> The key exchange is documented in
>
> Diffie-Hellman Group Exchange for the SSH Transport Layer Protocol
> draft-provos-secsh-dh-group-exchange-00.txt
>
> All rationale is contained within.
Ah! Thanks for the reference. You might want to publish
a refence to it (and the other I-D/RFCs) on openssh.com.
I do like the idea behind this new SSH2 key exchange but
I have a question: how does the client detect cooked primes?
Or at a more basic level: Are cooked primes a problem in
this setting?[1] If not, you want to mention this as a
non-issue in the "Security Considerations" section. If
cooked primes are indeed a problem the protocol needs to
be enhanced to counter them. Either way, the draft needs
a couple of extra words IMHO.
Anyway, my assumption that dh-group-exchange is non-standard
still holds as far as I can see so I'd still recommend not
enabling this feature by default for now.
What steps have to taken to have this standardized? Is this
proposal being considered by the IETF secsh working group?
Cheers,
Jeroen
[1] My gut feeling says that cooked primes could cause
privacy and repudation problems; I may very well be
wrong.
--
Jeroen C. van Gelderen - jeroen@vangelderen.org
"It is not utopian to work for a society without taxation;
it is utopian to think that the power to tax won't be abused
once it is granted." -- Murray N. Rothbard (1926-1995)
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3A21954C.F9E9D25F>
