Protection Against Side-Channel Attacks Added to OpenSSH
#1
Quote:Protection against Spectre, Meltdown, Rowhammer, RAMBleed and other side-channel attacks has been added to OpenSSH.
 
These recently uncovered attack methods can allow malicious actors to obtain passwords, encryption keys and other sensitive information from memory by leveraging bit flips or speculative execution.
 
OpenSSH, the free and open source version of the Secure Shell (SSH) tools designed for securely controlling devices and transferring data, now includes a mechanism designed to protect private keys at rest in memory, said OpenSSH developer Damien Miller.
 
Private keys, when not in use, are now encrypted with a symmetic key derived from a large “prekey” consisting of random data, Miller said. In order to obtain the protected private key, an attacker would first need to recover the entire prekey, which is not an easy task due to the bit error rates in current side-channel attack methods.
 
“Implementation-wise, keys are encrypted ‘shielded’ when loaded and then automatically and transparently unshielded when used for signatures or when being saved/serialised,” Miller explained. “Hopefully we can remove this in a few years time when computer architecture has become less unsafe.”

SOURCE: https://www.securityweek.com/protection-...ed-openssh
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AdGuard for iOS v4.5.16
AdGuard for iOS v4...harlan4096 — 07:24
QOwnNotes
26.2.9  Fixed a v...Kool — 05:38
AdGuard for Android 4.12.3
AdGuard for Androi...harlan4096 — 17:18
Replit Pro – One Month Free
Replit Pro     C...hanso — 17:02
Free 4 months Adobe Express subscription
Free 4 months Ado...hanso — 12:27

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (46)dimaWeami
avatar (44)Baihu

[-]
Online Staff
There are no staff members currently online.

>