LZ4 compression in openssh

Daniel Kahn Gillmor dkg at fifthhorseman.net
Sat Oct 26 06:47:02 EST 2013


On 10/25/2013 03:23 PM, Mark E. Lee wrote:
> Thanks for the response, what kind of problematic interactions would
> occur (other than trying to compress seemingly random data)?

e.g. https://en.wikipedia.org/wiki/CRIME or similar attacks where the
attacker can inject pre-defined cleartext into the channel and can then
observe length changes in the ciphertext to derive the other
(non-injected) contents of the cleartext.

	--dkg

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 1027 bytes
Desc: OpenPGP digital signature
URL: <http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20131025/f819e912/attachment.bin>


More information about the openssh-unix-dev mailing list