TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OpenSSH 9.5 released with keystroke timing obfuscation

232 pointsby surteenover 1 year ago

10 comments

Tempest1981over 1 year ago
More from last month:<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37307708">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37307708</a> (258 comments)
评论 #37771022 未加载
throw0101aover 1 year ago
More importantly (IMHO):<p><pre><code> ssh-keygen(1): generate Ed25519 keys by default. Ed25519 public keys are very convenient due to their small size. Ed25519 keys are specified in RFC 8709 and OpenSSH has supported them since version 6.5 (January 2014). </code></pre> * <a href="https:&#x2F;&#x2F;www.openssh.com&#x2F;releasenotes.html#9.5" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.openssh.com&#x2F;releasenotes.html#9.5</a><p>Previously, if you didn&#x27;t specify &quot;-t&quot;, you got RSA keys; now you get Ed25519, and if you want RSA you have to ask for it.<p>NIST&#x27;s publication of FIPS 186-5 in February (2023) added Ed25519 and Ed448 as approved (? allowed?) algorithms:<p>* <a href="https:&#x2F;&#x2F;csrc.nist.gov&#x2F;publications&#x2F;detail&#x2F;fips&#x2F;186&#x2F;5&#x2F;final" rel="nofollow noreferrer">https:&#x2F;&#x2F;csrc.nist.gov&#x2F;publications&#x2F;detail&#x2F;fips&#x2F;186&#x2F;5&#x2F;final</a><p>* <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;EdDSA#Standardization_and_implementation_inconsistencies" rel="nofollow noreferrer">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;EdDSA#Standardization_and_impl...</a><p>Partly one of the reasons given for the default switch:<p>* <a href="https:&#x2F;&#x2F;lists.mindrot.org&#x2F;pipermail&#x2F;openssh-unix-dev&#x2F;2023-September&#x2F;040932.html" rel="nofollow noreferrer">https:&#x2F;&#x2F;lists.mindrot.org&#x2F;pipermail&#x2F;openssh-unix-dev&#x2F;2023-Se...</a><p>Curious to know if&#x2F;when the OpenSSH folks will add Ed448 (RFC 8709, like Ed25519).
评论 #37766070 未加载
评论 #37765733 未加载
评论 #37765815 未加载
评论 #37765716 未加载
评论 #37772047 未加载
FiloSottileover 1 year ago
I&#x27;m very proud that we implemented server-side support for the keystroke timing obfuscation mechanism in golang.org&#x2F;x&#x2F;crypto&#x2F;ssh already.<p>(I just clicked the Submit button! <a href="https:&#x2F;&#x2F;go.dev&#x2F;cl&#x2F;524775" rel="nofollow noreferrer">https:&#x2F;&#x2F;go.dev&#x2F;cl&#x2F;524775</a>)<p>It&#x27;s a small change, but it&#x27;s a signal that we&#x27;re much more on top of x&#x2F;crypto&#x2F;ssh maintenance, compared to a year ago when we had to scramble to implement rsa-sha2-256&#x2F;512 support just hours before GitHub (rightfully) dropped SHA-1 support, potentially breaking every x&#x2F;crypto&#x2F;ssh client.<p>The main reason is that thanks to the funding of my clients (<a href="https:&#x2F;&#x2F;words.filippo.io&#x2F;full-time-maintainer&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;words.filippo.io&#x2F;full-time-maintainer&#x2F;</a>) I was able to hire Nicola Murino, the maintainer of SFTPGo, to pick up maintenance of x&#x2F;crypto&#x2F;ssh. This is benefiting both my clients and the whole ecosystem, and is a little step in growing the professional maintainer model.
评论 #37769417 未加载
throw0101aover 1 year ago
The link that was (originally) submitted is to LWN just posting the release notes. The direct link(s) to the release notes is:<p>* <a href="https:&#x2F;&#x2F;www.openssh.com&#x2F;txt&#x2F;release-9.5" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.openssh.com&#x2F;txt&#x2F;release-9.5</a><p>* <a href="https:&#x2F;&#x2F;www.openssh.com&#x2F;releasenotes.html#9.5" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.openssh.com&#x2F;releasenotes.html#9.5</a>
cabirumover 1 year ago
The release notes do not say <i>why</i> there is a need to obfuscate keystroke timings. I guess it is designed to mitigate some attack vector? Is it already being exploited in the wild or... let&#x27;s say is purely of academic interest?
评论 #37766188 未加载
评论 #37767576 未加载
评论 #37766508 未加载
评论 #37768306 未加载
rollcatover 1 year ago
If you use OpenSSH (wink), please consider donating to OpenBSD, aka the upstream developers: <a href="https:&#x2F;&#x2F;www.openbsd.org&#x2F;donations.html" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.openbsd.org&#x2F;donations.html</a>
devsdaover 1 year ago
&gt; This attempts to hide inter-keystroke timings by sending interactive traffic at fixed intervals (default: every 20ms) when there is only a small amount of data being sent. It also sends fake &quot;chaff&quot; keystrokes for a random interval after the last real keystroke. These are controlled by a new ssh_config ObscureKeystrokeTiming keyword.<p>So does it send these phantom keystrokes only when there are real keystrokes?<p>On first reading I thought it sends periodic+random keystrokes and so {Client,Server}AliveInterval option(s) may not be required to keep the connection alive. Need to try and confirm the behaviour.<p>This version also changes ssh-keygen to generate ed25519 keys by default. Time to update scripts that generate keys without a &#x27;-t&#x27; arg.
评论 #37765878 未加载
jsanfordover 1 year ago
With the new default ObscureKeystrokeTiming setting, a single typed character now causes hundreds of packets on the wire instead of 3.
enbuggerover 1 year ago
What are the downsides of this?
guerrillaover 1 year ago
It&#x27;s nice to see that they take this seriously. I praise their risk aversion.