Functionality

Damien Miller djm at mindrot.org
Fri Apr 27 11:42:01 EST 2001


On Fri, 27 Apr 2001 carl at bl.echidna.id.au wrote:

> > 	ssh -l user host
> > 	su
> > 	<root password exposed to traffic analysis>
>
> Erm ... traffic analysis?  Where?
>
> Ssh is encrypted.

Not traffic sniffing - but you can still try to estimate password lengths
and infer a few liklihoods about what characters are used through keystroke
timings. This may be enough to make a brute-force search tractable.

Best read the advisory at
http://www.openwall.com/advisories/OW-003-ssh-traffic-analysis.txt

OpenSSH tries to prevent such attacks using the methods discussed in the
advisory.

-d

-- 
| Damien Miller <djm at mindrot.org> \ ``E-mail attachments are the poor man's
| http://www.mindrot.org          /   distributed filesystem'' - Dan Geer




More information about the openssh-unix-dev mailing list