IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Traffic Analysis
On Mon, Jan 17, 2005 at 12:14:40AM +0000, Ben Harris wrote:
> In article <Pine.HPX.4.58.0501161506080.12089%edison.cisco.com@localhost> you write:
> >9.2.9 Traffic Analysis
> >
> > Passive monitoring of any protocol may give an attacker some
> > information about the session, the user, or protocol specific
> > information that they would otherwise not be able to garner. For
> > example, it has been shown that traffic analysis of an SSH session
> > can yield information about the length of the password. [Openwall]
> > Implementors should use the SSH_MSG_IGNORE packet as described in
> > [SSH-TRANS] along with any other methods they may find to prevent
> > traffic analysis.
>
> It might also be worth mentioning that the "random padding" field can be
> used to obscure the length of packets. I'd suggest, after "SSH_MSG_IGNORE
> packet" adding ", and variable-length random padding,", though that wording
> could doubtless be improved.
please don't add this, random padding is wrong and
does not really help, as it can be filtered out.
Home |
Main Index |
Thread Index |
Old Index