similar to: openssh and keystroke timing attacks (again)

Displaying 20 results from an estimated 3000 matches similar to: "openssh and keystroke timing attacks (again)"

2001 Oct 16
1
[Fwd: Re: Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2]
Nicolas, The timing attack described in the paper by Dawn Song et al. works by examining the timing of keystrokes. Currently OpenSSH sends a packet every time you press a key, thus it is possible to capture the approximate inter-keystroke timing of a user (they found minimal overhead in time from a key press to packet sent). Our patch causes a packet to be sent every 50 ms regardless of whether
2001 Oct 06
1
Defeating Timing Attacks
Hello, In response to the timing analysis attacks presented by Dawn Song et. al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html we at Silicon Defense developed a patch for openssh to avoid such measures. Timing Analysis Evasion changes were developed by C. Jason Coit and Roel Jonkman of Silicon Defense. These changes cause SSH to send packets unless request not to,
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
Hello, In response to the timing analysis attacks presented by Dawn Song et. al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html we at Silicon Defense developed a patch for openssh to avoid such measures. Timing Analysis Evasion changes were developed by C. Jason Coit and Roel Jonkman of Silicon Defense. These changes cause SSH to send packets unless request not to,
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly: http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html <quote> The paper concludes that the keystroke timing data observable from today's SSH implementations reveals a dangerously significant amount of information about user terminal sessions--enough to locate typed passwords in the session data stream and reduce the
2009 Mar 06
2
Weird Keystroke Errors
Here is my system Fedora 10 Avant Stellar Keyboard (uses Northgate Omnikey 101 layout) wine 1.1.14, 1.1.15, and 1.1.16 Problem: While in game, doesn't matter which, I've tried this with World of Warcraft, and Counter-strike. I have a problem with keystrokes registering 2 keystrokes behind. Example: While typing in game if I type the word "Anyone" the 'A' and
2015 Jan 07
2
discussion about keystroke timing attacks against SSH on the cryptography ML
Hi folks. FYI: There's a discussion[0] about keystroke timing attacks against SSH going on on the cryptography mailing list. Would be interesting to hear the opinion of some OpenSSH folks what SSH/OpenSSH is doing against this and what could maybe be don in addition. Especially since the main idea behind the attack is obviously not limited to the initial authentication phase when a password
2015 Jan 25
2
Centos 7 | Rebind ctrl + alt + f# keystroke to application
Hello, I am new to Centos and this mailing list. I have an application (IntelliJ IDEA) which uses the ctrl+alt+f# key combinations to provide shortcuts. The keystrokes are bind to the ttys virtual consoles. Is there anyway to rebind the keystrokes to the application? I tried the following solution (xorg.conf edit) but my PC freezes during boot process. I had to rollback the xorg.conf changes
2010 Jul 13
2
Capture Keystrokes
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi List, This may be a little of an unorthodox question as it somewhat defeats the purpose of encryption, but I'm currently attempting to put together a high-interactive iPhone honeypot project as part of my thesis for a masters course in security and forensics. The project blog is located at http://iphonehoneypot.wordpress.com which details the
2004 Jan 07
1
keystroke logging
> > >What do you recommend for keeping track of user >activities? For preserving bash histories I followed >these recommendations: > >http://www.defcon1.org/secure-command.html > Interesting reading but, as others have noted, of limited use. Keystroke logging can be disabled by - as others have noted - either spawning another (perhaps different) shell, using a remote
2014 Sep 06
3
keystrokes
> On Sat, Sep 6, 2014 at 8:18 AM, Ady <ady-sf at hotmail.com> wrote: > > Hello Syslinux Team, > > > > What actions are _supposed_ to be triggered by each of: > > > > [Ctrl-J] > > [Ctrl-M] > > > > in the Syslinux command line in version 6.03-pre20? > > They should do nothing special but either might be interpreted like an
2005 Mar 05
1
Emacs keystroke to toggle T/F for setting logical values
I'd like to have an Emacs keystroke that would let me toggle between T and F when editing logical settings in R code. I looked in the ESS documentation and in my O'Reilly emacs books but found nothing. Any ideas? Scott Waichler Pacific Northwest National Laboratory scott.waichler at pnl.gov
2014 Sep 06
2
keystrokes
Hello Syslinux Team, What actions are _supposed_ to be triggered by each of: [Ctrl-J] [Ctrl-M] in the Syslinux command line in version 6.03-pre20? Are there any differences between CLI and [vesa]menu.c32 regarding these keystroke combinations? Are there any differences in their behaviors when booting with different Syslinux variants (e.g ISOLINUX vs. SYSLINUX vs. PXELINUX)? To be
2009 Jan 22
2
[PATCH] I attach two patches correcting documentation and I have a few questions
I post this to the mailing list, but perhaps is not the good place. I'm not subscribed, so I don't know if I'm going to get any reply, but please, tell me where to send patches. I attach two patches that correctly describes the new support for F11 and F12 in documentation but I have two more question to update documentation accordingly. In doc/syslinux.txt line 515, talking about
2015 Jan 26
0
Centos 7 | Rebind ctrl + alt + f# keystroke to application
On 01/25/2015 09:31 AM, Konstantinos Karadamoglou wrote: > > I have an application (IntelliJ IDEA) which uses the ctrl+alt+f# key > combinations to provide shortcuts. The keystrokes are bind to the ttys > virtual consoles. Is there anyway to rebind the keystrokes to the > application? Change the keymappings that IDEA uses: settings > keymap > keymappings > default for
2014 Sep 06
0
keystrokes
On Sat, Sep 6, 2014 at 8:18 AM, Ady <ady-sf at hotmail.com> wrote: > Hello Syslinux Team, > > What actions are _supposed_ to be triggered by each of: > > [Ctrl-J] > [Ctrl-M] > > in the Syslinux command line in version 6.03-pre20? They should do nothing special but either might be interpreted like an <enter>. > Are there any differences between CLI and
2020 Jan 21
2
Security implications of using ControlMaster
On Tue, Jan 21, 2020 at 12:18:52PM +1100, Damien Miller wrote: > I wouldn't say it's a lot harder to take control of current connections - > writing a ptrace-based tool that hijacked a running ssh client and > injected a one-off implant payload via keystrokes doesn't seem like > much work. * Injection of key strokes into an existing channel may be detected just because
2014 Sep 06
2
keystrokes
> Ady <ady-sf at hotmail.com> writes: > > >> On Sat, Sep 6, 2014 at 8:18 AM, Ady <ady-sf at hotmail.com> wrote: > >> > >>> What actions are _supposed_ to be triggered by each of: > >>> > >>> [Ctrl-J] > >>> [Ctrl-M] > >>> > >>> in the Syslinux command line in version 6.03-pre20? >
2004 Dec 31
5
catch keystrokes
is it possible to intercept keystrokes using wxruby?
2023 Dec 18
1
Announce: OpenSSH 9.6 released
OpenSSH 9.6 has just been released. It will be available from the mirrors listed at https://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested
2004 Jan 06
5
Logging user activities
Hello, What do you recommend for keeping track of user activities? For preserving bash histories I followed these recommendations: http://www.defcon1.org/secure-command.html They include using 'chflags sappnd .bash_history', enabling process accounting, and the like. My goal is to "watch the watchers," i.e. watch for abuse of power by SOC people with the ability to view