Skip to content

Commit 884d27f

Browse files
bobmcnhanwen
authored andcommitted
Update reference to CBC vulnerability in cipher.go
The original referenced paper is no longer available. I contacted the author, and this is the reference he supplied. Change-Id: Ib5ad88932f2bfc12ff62639f7fb7c3ee568610d6 GitHub-Last-Rev: 2cf7d15 GitHub-Pull-Request: golang#132 Reviewed-on: https://go-review.googlesource.com/c/crypto/+/228638 Reviewed-by: Han-Wen Nienhuys <[email protected]> Run-TryBot: Han-Wen Nienhuys <[email protected]> TryBot-Result: Gobot Gobot <[email protected]>
1 parent 0848c95 commit 884d27f

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

ssh/cipher.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ var cipherModes = map[string]*cipherMode{
119119
chacha20Poly1305ID: {64, 0, newChaCha20Cipher},
120120

121121
// CBC mode is insecure and so is not included in the default config.
122-
// (See http://www.isg.rhul.ac.uk/~kp/SandPfinal.pdf). If absolutely
122+
// (See https://www.ieee-security.org/TC/SP2013/papers/4977a526.pdf). If absolutely
123123
// needed, it's possible to specify a custom Config to enable it.
124124
// You should expect that an active attacker can recover plaintext if
125125
// you do.

0 commit comments

Comments
 (0)