keystroke timing attack

Richard E. Silverman slade at shore.net
Thu Nov 29 14:38:21 EST 2001


A couple observations:

1) The original poster (Jason) referred to the O'Reilly article on the timing
   attack, but confused timing user session data with SSH password
   authentication.  Jason: the distinction is actually carefully made in the
   article; see the first section under "Common Misconceptions."

2) In this thread, it is proposed to send dummy packets at either
   pseudo-random or fixed intervals.  Both of these are of questionable value,
   as is pointed out both in the article and in the Song et al. paper, as well
   as in Solar's paper.  The fixed-gap packets will show up as a tall spike in
   a frequency domain analysis of the timing data, and are easily filtered
   out.  Similarly, pseudo-random noise can be filtered, since the user typing
   data is *not* random.  This is especially true if one can gather repeated
   examples to average out the noise -- and people often type their passwords
   quite a lot.

--
  Richard Silverman
  slade at shore.net
  [disclosure: I wrote the O'Reilly article]



More information about the openssh-unix-dev mailing list