[Bug 3839] Is OpenSSH violating RFC4253 section 6

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Tue Jun 17 19:56:29 AEST 2025


https://bugzilla.mindrot.org/show_bug.cgi?id=3839

--- Comment #2 from nicolas.baranger at 3xo.fr ---
Thanks for answer and provided links. 
It seems that aes***-gcm + chacha20-poly1305 are both violating
RFC4253: one has it length_prefix not encrypted and a minimal size of
20 with a payload of 1 and packet_length [mod16] = 4,  and the other
allow a total packet size of 12 while having (padding_length + payload
+ padding_string) [mod8] = 0 but (packet_length padding_length +
payload + padding_string) [mod8] = 4 

I'm trying to find a "general rule" for checking the minimum packet
size but I'm not sure it's relevant (or possible) in every situations. 

Maybe I should simply check the cipher and hardcoded minimum
packet_length for each cipher.

What would you recommend ?

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.


More information about the openssh-bugs mailing list