Displaying 20 results from an estimated 2000 matches similar to: "How often should an encrypted session be rekeyed?"
2023 Mar 29
1
ChaCha20 Rekey Frequency
I was wondering if there was something specific to the internal chacha20
cipher as opposed to OpenSSL implementation.
I can't just change the block size because it breaks compatibility. I
can do something like as a hack (though it would probably be better to
do it with the compat function):
if (strstr(enc->name, "chacha"))
*max_blocks = (u_int64_t)1 << (16*2);
2023 Mar 24
1
ChaCha20 Rekey Frequency
I'm wondering why the ChaCha20 cipher rekeys so frequently. At speed I'm
seeing rekeys every second or two. So I'm spending a large amount of
time in the rekey process. From what I've read about ChaCha20 it
shouldn't need to be rekeyed quite so frequently. Am I missing something
obvious?
Just curious more than anything else.
Chris
2007 Nov 12
11
Various FreeBSD bits...
I just drudged through a bit of the archives and see a FreeBSD bits
floating in there that are of some value, but aren''t on the wiki. I
posted a few bits on the wiki regarding some FreeBSD cobbling that
I''ve done recently and hope that folk find it of use (and start
posting their useful bits there as well).
http://reductivelabs.com/trac/puppet/wiki/PuppetFreeBSD
The
2006 Feb 13
4
Table Relationships and ActiveRecord Associations
First of all, I love Ruby on Rails. I have an intermediate
understanding of PHP, JavaScript, DOM and CSS, and that''s the extent of
my programming experience. I''m developing an online game''s web presence
with another colleague. We''re the only two technical guys on a team of
+10 content developers. So, baring all that in mind, here are my
questions with a
2013 May 13
1
Session rekeying support in OpenSSH
Hi,
I am using OpenSSH_5.2p1. It seems ssh server doesn't support key
regeneration after a specified amount of time. I manually verified the
OpenSSH_5.2p1 and OpenSSH-6.2 source codes and haven?t found any code
support for session rekeying in both releases.
SSH2 supports session rekeying using the parameter ?RekeyIntervalSeconds?
with default value 3600 seconds (one hour) in both
2000 Feb 15
1
Rekeying
Hello,
I apologize that this is slightly off topic.
According to the Internet Draft I found for SSH ver 1
(draft-ietf-tls-ssh-00.txt from Jun 13, 1996), the client or server can
send a SSH_MSG_KEXINIT at any time to force a new key exchange. I looked
through the code for OpenSSH and ssh-1.2.27 and can't find where it does
this. I then searched the Secure Shell mailing list archives and saw
2005 Jun 13
1
rekeying in SSH-2 and session setup?
Dear all,
while playing around with openssh-4.1p1 (trying to add AFS token
forwarding in SSH-2), I noticed that agressive rekeying (as e.g.
employed by regress/rekey.sh, rekeying every 16bytes) seems to disturb
the various forwardings (X11, agent) set up at the beginning of the
session. These do not trigger regression test errors, since the client
does not ask for confirmation from the server for
2016 Jan 05
14
[Bug 2521] New: subtract buffer size from computed rekey limit to avoid exceeding it
https://bugzilla.mindrot.org/show_bug.cgi?id=2521
Bug ID: 2521
Summary: subtract buffer size from computed rekey limit to
avoid exceeding it
Product: Portable OpenSSH
Version: 6.8p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: minor
Priority: P5
Component: sshd
2018 Nov 13
12
[Bug 2929] New: OpenSSH server should not send the SSH_MSG_EXT_INFO message after rekeying
https://bugzilla.mindrot.org/show_bug.cgi?id=2929
Bug ID: 2929
Summary: OpenSSH server should not send the SSH_MSG_EXT_INFO
message after rekeying
Product: Portable OpenSSH
Version: 7.7p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
2023 Mar 29
2
ChaCha20 Rekey Frequency
On Wed, 29 Mar 2023, Chris Rapier wrote:
> I was wondering if there was something specific to the internal chacha20
> cipher as opposed to OpenSSL implementation.
>
> I can't just change the block size because it breaks compatibility. I can do
> something like as a hack (though it would probably be better to do it with the
> compat function):
>
> if
2007 Nov 13
7
Exported resources & exec ?
Hi,
I''m sorry if that''s a FAQ, I also know exported resources are a still
experimental. So my problem might well be a design limitation of how
exported resources are working.
My issue: I''m trying to export a file resource that is created by an
exec block. The file is exported fine and collected fine but it is
always empty on the other host.
The puppet snippet:
class
2023 Mar 29
1
[EXTERNAL] Re: ChaCha20 Rekey Frequency
I'm hardly an expert on this, but if I remember correctly, the rekey rate for good security is mostly dependent on the cipher block size. I left my reference books at home; so, I can't come up with a reference for you, but I would take Chris' "I'm deeply unsure of what impact that would have on the security of the cipher" comment seriously and switch to a cipher with a
2023 Mar 29
1
[EXTERNAL] Re: ChaCha20 Rekey Frequency
That's true for block ciphers, but ChaCha20+poly1305 is a stream cipher.
On Wed, 29 Mar 2023, Robinson, Herbie wrote:
>
> I?m hardly an expert on this, but if I remember correctly, the rekey rate
> for good security is mostly dependent on the cipher block size.? I left my
> reference books at home; so, I can?t come up with a reference for you, but I
> would take Chris?
2004 Feb 20
1
ssh client auto rekey feature.
I plan to use ssh as the secure transport of a VPN. (Yes I know there are
other solutions but...)
These tunnels may be up for a long time, days or weeks, and escape
characters will be turned off because I'll be passing binary data so I can't
force a rekey with that method.
Since the ssh spec says one should rekey every hour, I plan to patch the ssh
client to implement an auto-rekey
2023 Mar 29
1
ChaCha20 Rekey Frequency
Hi Damien,
>This is what I'm playing with at the moment:
if you?re playing with this currently anyway, shouldn?t?
>+ /*
>+ * Otherwise, use the RFC4344 s3.2 recommendation of 2**(L/4) blocks
>+ * before rekeying where L is the blocksize in bits.
>+ * Most other ciphers have a 128 bit blocksize, so this equates to
>+ * 2**32 blocks / 64GB data.
>+ */
>+ return
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |
2016 May 26
19
[Bug 2573] New: dead sessions cannot be closed with ~.
https://bugzilla.mindrot.org/show_bug.cgi?id=2573
Bug ID: 2573
Summary: dead sessions cannot be closed with ~.
Product: Portable OpenSSH
Version: 3.7.1p2
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
2003 Apr 23
1
ATA tag queuing broken...
Alright, well it's apparently no surprise to folks that ATA tag queuing
is broken at the moment. Are there any objections to me adding a few
cautious words to ata(4) and tuning(7) that advise _against_ the use
of ata tag queuing given that they're likely the fastest way to reboot
a -STABLE box?
Here's a PR that I tacked a tad bit of info into:
2006 Mar 01
2
o''reilly''s arrogance
although basically hopeful of the company''s ''rough cuts'' venture, i am
insulted by the fact that o''reilly''s safari service offers important material
to its regular subscribers only if they pay extra for it. o''reilly''s material
on ajax is a good example: all of the introductory coverage is available only
as pricey ''rough
2009 May 03
12
DNAT Question
Hi list,
I have a shorewall installed on 2 interfaces which also has multiple
static public IP. Let''s say I have 1.2.3.4 and 1.2.3.5. I have assigned
nat with:
1.2.3.4 eth0 11.22.33.4 no no
But then I have a situation where I need 11.22.33.44 to connect to a
host in the net zone and appears also to be 1.2.3.5 not only 1.2.3.4.
How to do it? TIA
Willy