Article 6E8KE Keystroke timing obfuscation added to ssh(1)

Keystroke timing obfuscation added to ssh(1)

by
from OpenBSD Journal on (#6E8KE)

Damien Miller (djm@) hascommittedsupport for keystroke timing obfuscation tossh(1):

CVSROOT:/cvsModule name:srcChanges by:djm@cvs.openbsd.org2023/08/27 21:31:16Modified files:usr.bin/ssh : clientloop.c misc.c misc.h packet.c packet.h readconf.c readconf.h ssh_config.5 Log message:Add keystroke timing obfuscation to the client.This attempts to hide inter-keystroke timings by sending interactivetraffic at fixed intervals (default: every 20ms) when there is only asmall amount of data being sent. It also sends fake "chaff" keystrokesfor a random interval after the last real keystroke. These arecontrolled by a new ssh_config ObscureKeystrokeTiming keyword/feedback/ok markus@

Read more...

External Content
Source RSS or Atom Feed
Feed Location http://undeadly.org/cgi?action=rss
Feed Title OpenBSD Journal
Feed Link http://undeadly.org/
Reply 0 comments