Alright, Cliff.
I will think about some sniffer tests and
see how it goes.
Or, I will look for a hacker to do that. 

Thank you.

-Umesh.

-----Original Message-----
From: Cliff Friedel [mailto:[EMAIL PROTECTED]]
Sent: Friday, March 03, 2000 11:42 AM
To: Umesh Mallugari
Cc: '[EMAIL PROTECTED]'
Subject: RE: Robustness of SSHd....


Unfortunately I am not sure if there is anything out there that performs
the type of tests you are looking for (at least for sshd).  I would think
you could write a program that would take a better look at the packet
information that the other side sends to make sure it hadn't been
hijacked (ie: tcp sequence information, packet header info, etc.).  You
could also do some kind of ARP/RARP test to make sure you
are getting only the MAC/IP combo you were looking for (of course this
would not work on dial-up connections as they don't have MACS).  The last
idea may also not work if they are using passive listener (ie: A
promiscuous ethernet device with the TX line cut). Traceroute info could
also be useful to make sure the info was going through all the hops it
should.  A nice idea (although possibly impractical) would be frequent key
changes through a source other than the connection [sneakernet exchanges
or FEDEX].  This would make it more difficult to brute force the keys. 

So the short answer, I am not sure if they do make testing tools
to determine the strength of the tunnel.  I do think though that integrity
testing could be done with a lot of tools on hand to make sure you are
really getting the person you think you are.  Hope this helps =).

Cliff

> Cliff,
> 
> I agree with you on basic testing i.e., for encryption.
> But, what about testing for 'breach' and things like
> that?
> 
> Thank you.
> 
> -Umesh.
> 
> -----Original Message-----
> From: Cliff Friedel [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, January 26, 2000 5:04 PM
> To: Umesh Mallugari
> Cc: '[EMAIL PROTECTED]'
> Subject: Re: Robustness of SSHd....
> 
> 
> If you are looking for an extremely basic test, you could watch your
> packets with tcpdump and see how  randomized the data is that leaves or
> enters your interface (as unencrypted traffic tends to have patterns
> associated with it.  IE:  a telnet sessions data has a characteristic
> pattern you can see by viewing the packet.).  
> 
> You could also intercept packets with a known statement in them and see if
> you could read the statement using a sniffer.  If you can, the info is not
> encrypted.
> 
> Just some basic ideas.  Please let me know if this helps.  
> 
> Cliff
> 
> On Thu, 2 Mar 2000, Umesh Mallugari wrote:
> 
> > Hi folks,
> > 
> > Could you tell me how to test the 
> > security robustness of a SSH server?
> > Are there any tools available out there?
> > 
> > Thank you.
> > 
> > -Umesh.
> > 
> 

Reply via email to