top | item 7449610 (no title) pdubs | 12 years ago Some of the previous work on this involving timing attacks against SSH [1] is particularly interesting because it's so obvious in retrospect, but no one saw it when SSH was being designed.[1]http://www.cs.berkeley.edu/~daw/papers/ssh-use01.pdf discuss order hn newest EGreg|12 years ago About the nested ssh attack - I don't get it, how come the ssh client on B waits until return is hit to send the password but the client on A doesnt?
EGreg|12 years ago About the nested ssh attack - I don't get it, how come the ssh client on B waits until return is hit to send the password but the client on A doesnt?
EGreg|12 years ago