top | item 7449610

(no title)

pdubs | 12 years ago

Some of the previous work on this involving timing attacks against SSH [1] is particularly interesting because it's so obvious in retrospect, but no one saw it when SSH was being designed.

[1]http://www.cs.berkeley.edu/~daw/papers/ssh-use01.pdf

discuss

order

EGreg|12 years ago

About the nested ssh attack - I don't get it, how come the ssh client on B waits until return is hit to send the password but the client on A doesnt?