Re: Slicing and dicing

Dave Mason <dmason@tis.com> Tue, 09 September 1997 20:08 UTC

Received: (from majordom@localhost) by portal.ex.tis.com (8.8.2/8.8.2) id QAA29568 for ipsec-outgoing; Tue, 9 Sep 1997 16:08:49 -0400 (EDT)
Date: Tue, 09 Sep 1997 16:17:34 -0400
From: Dave Mason <dmason@tis.com>
Message-Id: <199709092017.QAA17933@rubicon.rv.tis.com>
To: ipsec@tis.com
Subject: Re: Slicing and dicing
Sender: owner-ipsec@ex.tis.com
Precedence: bulk

>I'd prefer that the list be included in the document (preferably in a
>*single* document), partly because the table of possibly-weak keys in
>my copy of Schneier's book (2nd edition, 1st printing) contains an
>error.  The tables in draft-ietf-ipsec-ciph-des-derived-00.txt and
>draft-ietf-ipsec-ciph-des-expiv-00.txt are right.  I don't know if
>Schneier's book has been corrected in later printings (if there are
>any).  I've reported the error to him twice with only an automated
>errata list (not containing the table error) as reply, but it may be
>fixed now--others I've spoken to have found it, too.

Although the authors have probably already notice this, it should
be noted that the weak keys listed in Appendix A of the resolution doc,
oakley-04, don't match the above docs and don't include the possibly-weak
keys.

-dave