SSH Keystroke Timing Attacks - PowerPoint PPT Presentation

About This Presentation
Title:

SSH Keystroke Timing Attacks

Description:

No problems, right? WRONG !! Maybe? su. UNIX 'Switch User' command (used to get ... No definite packet signature for calling ssh' How late(ncy) is your network ... – PowerPoint PPT presentation

Number of Views:83
Avg rating:3.0/5.0
Slides: 20
Provided by: ITCL3
Category:

less

Transcript and Presenter's Notes

Title: SSH Keystroke Timing Attacks


1
SSH Keystroke Timing Attacks
Mike Hogye Thad Hughes Josh Sarfaty Joe Wolf
2
(No Transcript)
3
SSH
The Secure SHell protocol was created by Tatu
Ylönen and others to provide encrypted data
transfers between remote machines
MmmmSSH
4
SSH Weaknesses
  • SSH can leak information about passwords
  • Approximate length of password can be inferred by
    examining number of packets.
  • Keystroke Timing Analysis can reduce the search
    space for brute force attacks.

5
Password Keystroke Timing
  • Users type passwords often
  • Password keystrokes develop consistent rhythm due
    to optimized hand motion
  • This rhythm can be used to determine
    characteristics about the password

6
(No Transcript)
7
(No Transcript)
8
SSH Immediate Mode
  • Each keystroke is sent IMMEDIATELY from client to
    server, one character per packet
  • Allows interactive user experience

9
Passwords SSH
  • SSH login does NOT used immediate mode
  • Password (and username) packets are padded to
    fixed lengths
  • No problems, right?

WRONG !!
Maybe?
10
su
  • UNIX Switch User command (used to get root
    access)
  • Executed in IMMEDIATE mode

SSH1 su command
11
Nested SSH
  • Start new SSH session from within a running SSH
    session
  • Username and password sent to server B in
    immediate mode

12
So What?
  • Password lengths can be determined
  • Reveals timing information of password keystrokes
  • Academically speaking, this is a lot of
    information

13
Is This Practical?
  • How to detect an su command?
  • How to detect a nested SSH session?
  • Network latency

14
Detecting the su
I am a su
  • Look for the su signature
  • Not as easy as it sounds

SSH2 su command
15
SSH! (nested)
  • Theoretically similar to detecting su
  • In practice, much harder to detect
  • No definite packet signature for calling ssh

16
How late(ncy) is your network
  • Random network delay influences observed packet
    times
  • Songs paper considered latency statistics
  • Determined that latency is not an issue
  • Used eight year old statistics
  • Songs estimated network latency 10 ms
  • Modern latency easily reaches 170 ms

17
Internet Latency
18
Conclusions
  • Song Timing analysis can reduce brute-force
    password search by a factor of 50
  • In practice, this is unlikely
  • Use SSH2
  • PuTTY defaults to SSH1

19
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com