| > What the RFC seems to be suggesting is that the first block of every | > message be SSH_MSG_IGNORE. Since the first block in any message is now | > fixed, there's no way for the attacker to choose it. Since the attacker | | SSH_MSG_IGNORE messages carry [random] data. | | Effectively what the RFC is calling for is a confounder. No, not really, for any reasonable interpretation I can make of that term. You can send a message that consists of enough 0 bytes to be sure that the entire first block is fixed, and you've gotten all the security you can get against the attack in question. (If you're using SSH_MSG_IGNORE to protect against traffic analysis, you might want to do something different - but that's a completely distinct attack and the security considerations are entirely different.)
-- Jerry | Nico | -- | | --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]