Diffie Hellman key exchange algorithms

Rob Waite rwaite1 at tampabay.rr.com
Tue Sep 25 14:55:59 EST 2007


Isn't dh_estimate() only used on the client to find the desired group size?
This is then taken by the server and used to find p and g correct?

OpenSSH is not configurable in this manner... but if someone wanted to force 
larger primes...
couldn't they do this by altering the code? In the code changes I sent 
earlier... you could
force group exchange. And if you picked only large primes in your moduli 
file...
you should be able to force the client to get a large p as long as it is 
within the min
and max sent by the client. I just started looking at the code again (it has 
been a while)
but it seems like the server can control at the very least the size of the 
public and private
numbers generated from p. He would not be able to control how powerful the 
client made
their public and private numbers from the given p... but at least data sent 
out from the server would
be forced to have the symmetric key encrypted using larges primes for the 
assymmetric.

That is assuming that the server has its own symmetric cipher key and the 
client has their own.
If they do in fact share the same key... then I guess you would not be 
protected as the client
could generate a small private number from p... no matter how large. I would 
then expect
that there would be a way to code the server to only accept a certain size 
for the public number
given back to the server by the client.

Is this line of thinking correct? Or does it sounds like garbled nonsense? I 
am kinda sleepy.



----- Original Message ----- 
From: "Damien Miller" <djm at mindrot.org>
To: "Balaraman, Srinath" <srinath_balaraman at mentor.com>
Cc: "Vikram Mhetre" <vmhetre at hotmail.com>; <openssh-unix-dev at mindrot.org>
Sent: Monday, September 24, 2007 8:41 PM
Subject: RE: Diffie Hellman key exchange algorithms


> On Mon, 24 Sep 2007, Balaraman, Srinath wrote:
>
>> Hello All,
>>
>> To add to this question, I also am interested in knowing if the size of
>> the DH key to be negotiated both from the Server and the Client can be
>> configured? If yes, how?
>
> Do you mean the size of the key generated by DH or the size of the group
> used in diffie-hellman-group-exchange-*?
>
> If you mean the former, then the key length is that of the symmetric
> cipher that has been negotiated.
>
> If you mean the latter, then the size of the group is chosen to yield
> a similar attack complexity as the negotiated symmetric cipher. See
> dh.c:dh_estimate() and the comment that preceeds it.
>
> Either way, there is are no configuration knobs.
>
> -d
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
> 



More information about the openssh-unix-dev mailing list