On Fri, Sep 12, 2008 at 2:05 PM, johan beisser <[EMAIL PROTECTED]> wrote:
...
> I'm not going to say "It's impossible." It's not. How about "really highly
> unlikely" that Eve will pick up enough useful signal to decrypt which
> letters are being typed by the user. I know that not everyone uses ssh keys,
> or chains authentication back to themselves.. but.. c'mon, be realistic.

This about security.  Being realistic means *not* being optimistic
that extracting data will be "too hard", "too unlikely", "only
applicable to a subset of people [and certainly not me]", etc.  Have
you not read enough papers that start with something like "It was
previously thought that attack [foo] was impractical for the following
reasons: [blah blah blah].  This paper demonstrates practical
circumstances under which those reasons fail or don't apply and the
attack succeeds"?

As such, statements of "can't be done" that don't have hard data or
proofs attached are pretty much worth the electrons they were sent
with.  You might not see how the published attack can be made
practical against you, but someone else will almost certainly see the
next link in making it so.  The original posters didn't sound like
they were being overly sensationalist, just interested in cutting off
a possible avenue of attack *before* it becomes a problem.


> Frankly, concern over someone sniffing and discovering your password over
> captured ssh traffic pattern analysis is much less likely than someone
> shoulder surfing your system password first, or your ssh key passphrase.

They're different types of attacks; they have different applicability.
 Perhaps the timing attack can be done remotely, over a long period of
time, and therefore has a much lower risk of detection.  Even better,
it may be possible to do it 'in bulk', where shoulder-surfing and
similar is much harder to parallelize.


Philip Guenther

Reply via email to