Some shops do not allow aes-cbc because of  the 'Padding Oracle Attack'  
problem, since AES-CBC uses padding. aes-ctr does not use padding

Also FIPS 140-2 was published in 2001 and last updated in 2002

Steve Finch
Recovery Point

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf 
Of Mark Jacobs
Sent: Monday, March 10, 2014 11:02 AM
To: IBM-MAIN@LISTSERV.UA.EDU
Subject: aes-ctr vs aes-cbc

We've been trying to migrate our ssh/sftp environment, for both our client and 
server users to only use FIPS-140-2 certified ciphers, and run ICSF in FIPS 
mode. We've had no problems doing so, except with one of our partners who 
states that their security policy will not allow their sftp server to accept 
data transmitted with any CBC cipher.

I tried adding the aes-ctr ciphers to our allowed list, but it doesn't look 
like ICSF can handle it, which is needed for ICSF to execute in FIPS mode.

It seems like I'm in a unresolvable problem from a technology standpoint, 
unless our partner changes their policy, which I don't understand why they 
don't allow FIPS-140-2 certified ciphers to be used.

--
Mark Jacobs
Time Customer Service
Tampa, FL
----

The quiet ones are the ones that change the universe...
The loud ones only take the credit.

Londo Mollari - Babylon 5

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions, send email to 
lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to