Feeds

Crypto boffins question SSH security

Protocol isn't all it cracks up to be

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Cryptographic researchers have identified flaws in Secure Shell (SSH) which might allow hackers to obtain information about a user's password or traffic being sent using the secure protocol.

SSH has two weaknesses which might be exploited by traffic analysis that looked at the timing of keystrokes, according to a paper published by University of California, Berkeley researchers on the subject.

Firstly, if a block cipher is used, transmitted packets are packed with only an eight-bit boundary, which reveals the approximate size of original data. The second issue is that while in interactive mode every keystroke a user types is sent in a separate IP packet after a key is pressed, which gives information on a user's typing.

This may not seem to serious a problem at first but the paper (Timing analysis of keystrokes and Timing analysis of SSH) explains how a skilled cracker might derive information on the length of passwords. More sophisticated statistical traffic and timing analysis, which it is beyond our experience to understand, can yield information about what a user might have typed during a session.

Information on the attacks, and details of how they developed in a system the researchers christen as Herbivore, have been published in order to provide evidence that SSH (which is commonly used by Unix and network admins) is not as secure as people like to believe. Some countermeasures are also proposed.

The Researchers (Dawn Xiaodong Song, David Wagner and Xuqing Tian) hope their work will be consider by people designing secure protocols in future. ®

External Links

Timing analysis of keystrokes and Timing analysis of SSH

Related Stories

SSH hits the fan for Unix admins
SSH hits the fan for Cisco on security
Cowboy cracker nails Apache (using SSH exploit)

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.