On Wed, 10 Sep 2008, Kevin Neff wrote:

> Hi,
> 
> Some secure protocols like SSH send encrypted keystrokes
> as they're typed.  By doing timing analysis you can figure
> out which keys the user probably typed (keys that are
> physically close together on a keyboard can be typed
> faster).  A careful analysis can reveal the length of
> passwords and probably some of password itself.
> 
> The paper:
> 
>   http://portal.acm.org/citation.cfm?
>   id=1267612.1267637&coll=Portal&dl=GUIDE&CFID=1943417&C
>   FTOKEN=28290455
> 
> I'm seriously considering implementing a fix for this
> weakness.  Is there any interest in incorporating this
> sort of thing into openBSD?

Be warned: implementing any sort of time-based events in the current
SSH mainloop is annoyingly difficult.

If you can do it cleanly, then we are interested.

-d

Reply via email to