stribika-rdonly
Results
3
comments of
stribika-rdonly
How would the protocol work, just n*(n-1)/2 one-to-one connections or like [mpOTR](https://www.cypherpunks.ca/~iang/pubs/mpotr.pdf)?
Can you post `ssh -v` output?
You are correct, SHA-1 collisions are not sufficient to break HMAC-SHA-1. I have no new attacks. Even [HMAC-MD5](https://crypto.stackexchange.com/questions/9336/is-hmac-md5-considered-secure) is safe. I did consider attacks on the hash function used as...