Thanks for all the comments.  I think we're all pretty much on the same
page.

First order of business is to look at how much of a weakness this may be.
Then, implement several potential solutions.  Finally, test to see if the
"fixes" improved the situation.

I like the idea of mainly patching the username and passwd transfer.  But
there may be some utility to having interactive sessions as bullet proof as
possible.

I will pitch the idea to my group.  If they agree to work on it, we will
have something by the end of the quarter (bar F).

--Kevin




On Fri, Sep 12, 2008 at 7:01 AM, Mike M <[EMAIL PROTECTED]> wrote:

> On 9/10/2008 at 2:58 PM Kevin Neff wrote:
>
> |Hi,
> |
> |Some secure protocols like SSH send encrypted keystrokes
> |as they're typed.  By doing timing analysis you can figure
> |out which keys the user probably typed (keys that are
> |physically close together on a keyboard can be typed
> |faster).  A careful analysis can reveal the length of
> |passwords and probably some of password itself.
>  =============
>
>
> >> (keys that are physically close together on a keyboard
> >> can be typed faster).
>
>
> I do not agree with that statement.   Using two fingers I can hit the "A"
> and
> "L" keys nearly simultaneously (probably could even hit them simultaneously
> if
> I tried enough).
>
> The statement seems to rely upon the typist being a one-finger typer.

Reply via email to