IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Traffic Analysis
In article <Pine.HPX.4.58.0501161506080.12089%edison.cisco.com@localhost> you write:
>9.2.9 Traffic Analysis
>
> Passive monitoring of any protocol may give an attacker some
> information about the session, the user, or protocol specific
> information that they would otherwise not be able to garner. For
> example, it has been shown that traffic analysis of an SSH session
> can yield information about the length of the password. [Openwall]
> Implementors should use the SSH_MSG_IGNORE packet as described in
> [SSH-TRANS] along with any other methods they may find to prevent
> traffic analysis.
It might also be worth mentioning that the "random padding" field can be
used to obscure the length of packets. I'd suggest, after "SSH_MSG_IGNORE
packet" adding ", and variable-length random padding,", though that wording
could doubtless be improved.
--
Ben Harris
Home |
Main Index |
Thread Index |
Old Index