https://bugzilla.mindrot.org/show_bug.cgi?id=3839
--- Comment #2 from [email protected] --- Thanks for answer and provided links. It seems that aes***-gcm + chacha20-poly1305 are both violating RFC4253: one has it length_prefix not encrypted and a minimal size of 20 with a payload of 1 and packet_length [mod16] = 4, and the other allow a total packet size of 12 while having (padding_length + payload + padding_string) [mod8] = 0 but (packet_length padding_length + payload + padding_string) [mod8] = 4 I'm trying to find a "general rule" for checking the minimum packet size but I'm not sure it's relevant (or possible) in every situations. Maybe I should simply check the cipher and hardcoded minimum packet_length for each cipher. What would you recommend ? -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
