LZ4 compression in openssh
Daniel Kahn Gillmor
dkg at fifthhorseman.net
Sat Oct 26 06:47:02 EST 2013
On 10/25/2013 03:23 PM, Mark E. Lee wrote:
> Thanks for the response, what kind of problematic interactions would
> occur (other than trying to compress seemingly random data)?
e.g. https://en.wikipedia.org/wiki/CRIME or similar attacks where the
attacker can inject pre-defined cleartext into the channel and can then
observe length changes in the ciphertext to derive the other
(non-injected) contents of the cleartext.
--dkg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 1027 bytes
Desc: OpenPGP digital signature
URL: <http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20131025/f819e912/attachment.bin>
More information about the openssh-unix-dev
mailing list