Network Working Group d. bider Internet-Draft Bitvise Limited Expires: October 10, 2011 April 8, 2011 SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol draft-dbider-sha2-mac-for-ssh-01 Abstract This memo defines algorithm names and parameters for use of SHA-2 for data integrity verification in the Secure Shell (SSH) protocol. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on October 10, 2011. Copyright Notice Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. bider Expires October 10, 2011 [Page 1] Internet-Draft SHA-2 MAC for SSH April 2011 1. Overview and Rationale SSH [RFC4251] is a very common protocol for secure remote login on the Internet. Currently, SSH defines data integrity verification using SHA-1 and MD5 algorithms [RFC4253]. Due to recent security concerns with these two algorithms, implementors and users request support for data integrity verification using SHA-2. bider Expires October 10, 2011 [Page 2] Internet-Draft SHA-2 MAC for SSH April 2011 2. Data Integrity Algorithms This memo adopts the style and conventions of [RFC4253] in defining new data integrity algorithms. The following new data integrity algorithms are defined: hmac-sha2-256 RECOMMENDED HMAC-SHA2-256 (digest length = 32 bytes, key length = 32 bytes) hmac-sha2-256-96 OPTIONAL first 96 bits of HMAC-SHA2-256 (digest length = 12 bytes, key length = 32 bytes) hmac-sha2-512 OPTIONAL HMAC-SHA2-512 (digest length = 64 bytes, key length = 64 bytes) hmac-sha2-512-96 OPTIONAL first 96 bits of HMAC-SHA2-512 (digest length = 12 bytes, key length = 64 bytes) Figure 1 bider Expires October 10, 2011 [Page 3] Internet-Draft SHA-2 MAC for SSH April 2011 3. References [FIPS-180-2] National Institute of Standards and Technology (NIST), "Secure Hash Standard (SHS)", FIPS PUB 180-2, August 2002. [RFC4251] Ylonen, T. and C. Lonvick, "The Secure Shell (SSH) Protocol Architecture", RFC 4251, January 2006. [RFC4253] Ylonen, T. and C. Lonvick, "The Secure Shell (SSH) Transport Layer Protocol", RFC 4253, January 2006. bider Expires October 10, 2011 [Page 4] Internet-Draft SHA-2 MAC for SSH April 2011 Author's Address denis bider Bitvise Limited Suites 41/42, Victoria House 26 Main Street Gibraltar GI Phone: +1 869 762 1410 Email: hmac-sha2-256@bitvise.com URI: http://www.bitvise.com/ bider Expires October 10, 2011 [Page 5]