[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Weak keys



> >So what I get from all this is:
> >1. Handle the specified list of DES keys (and no others) in phase 1 as 
> >stated, i.e., skip bits.
> >2. Handle all other weak keys in all other cases by rekeying.
> 
> There was an interesting comment about weak keys some time ago.  Either
> from Sommerville or McDonald to something like:
> 
> Weak keys are so rare that the code for them might never be exercised in
> testing and might be flawed.

I didn't say it, but that makes a LOT of sense.

> ERGO a developer might choose a strategy that keeps the weak key code as
> simple as possible.

My code rejects weak keys at the time you attempt to add them to the kernel's
SADB.  Any program that handles the adding of keys needs to check for
errors anyway, so weak keys become just one more error case.

Dan


References: