|| ||"Kevin Neff" <kevin.l.neff-AT-gmail.com>|
|| ||Patching a SSH 'Weakness'|
|| ||Wed, 10 Sep 2008 14:58:03 -0500|
Some secure protocols like SSH send encrypted keystrokes
as they're typed. By doing timing analysis you can figure
out which keys the user probably typed (keys that are
physically close together on a keyboard can be typed
faster). A careful analysis can reveal the length of
passwords and probably some of password itself.
I'm seriously considering implementing a fix for this
weakness. Is there any interest in incorporating this
sort of thing into openBSD?
to post comments)