Re: 3des cipher and DH group size

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Wed, 12 Feb 2014, Hubert Kario wrote:

> The previous version did bind cipher to DH sizes so this expectation was
> met.

Yes, but using obsolete symmetric/DH group size equivalences.

> Problem is, that now when you're running in FIPS mode the chosen HMAC
> in worst case is sha1-based so the DH moduli end up being 7680 bits in
> size even when the selected cipher is 3DES:

Which is the correct recommended length for a 160-bit key according to
NIST. 

(It's ironic that you're effectively arguing to ignore NIST advice to
make FIPS mode work)

> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(2048<7680<8192) sent
> 
> as a result, connection to cryptlib server in FIPS mode doesn't work.

We can't help other broken implementations.

Easy workarounds include using ECDH and specifying explicit KexAlgorithms.

-d
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev




[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux