Date: Wed, 22 Aug 2001 20:59:41 -0400 From: Leo Bicknell <bicknell@ufp.org> To: freebsd-hackers@FreeBSD.ORG Subject: Re: ssh password cracker - now this *is* cool! Message-ID: <20010822205941.A98321@ussenterprise.ufp.org> In-Reply-To: <200108230010.f7N0AGf27563@intruder.bmah.org>; from bmah@FreeBSD.ORG on Wed, Aug 22, 2001 at 05:10:16PM -0700 References: <200108222330.f7MNUUj80882@earth.backplane.com> <20010822195508.B93930@ussenterprise.ufp.org> <200108230010.f7N0AGf27563@intruder.bmah.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Aug 22, 2001 at 05:10:16PM -0700, Bruce A. Mah wrote:
> > Several people on other mailing lists have pointed out that Nagle
> > should make this much harder, although it's unclear how Nagle and
> > ssh interact. So far that has resulted in a number of degenerating
> > discussions of how things work. Of course, Nagle will not help
> > between two machines on the same ethernet segment, but probably
> > would make the process described in the paper much harder.
>
> Indeed. They also didn't discuss (or I didn't see it) the effects of
> queueing or jitter in the network on their scheme.
I just had a thought. It appears from the discussion that SSH encrypts
things (internal to ssh) in whatever unit is handed to the encryption
routine, that is something like:
for(;;) {
read(stdin, buffer);
encrypt(buffer);
write(network, buffer);
}
So, if read returns a single character, it encrypts a single character
and sends it. This results in the 20 byte packets in the article. Now,
20 bytes is small enough that Nagle might combine two of them into a
single 40 byte packet or similar making this harder. That said, it would
be much harder if something similar to Nagle was done in ssh:
for (;;) {
timer = gettime();
while ((len(buffer) < 20) && ((gettime() - timer) < 20ms)) {
read(stdin, buffer);
}
encrypt(buffer);
write(network, buffer);
}
This should allow two or three characters to go into a single block (which
would probably still be 20 bytes) and completely throw off the method they
were using.
--
Leo Bicknell - bicknell@ufp.org
Systems Engineer - Internetworking Engineer - CCIE 3440
Read TMBG List - tmbg-list-request@tmbg.org, www.tmbg.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010822205941.A98321>
