TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Writing a replacement for OpenSSH using Go, part 2

66 pointsby _Soulouover 10 years ago

2 comments

0x0over 10 years ago
I&#x27;m always super skeptical about &quot;second-hand&quot; reimplementations of crypto protocols like these, because after working through a few of the crypto challenges around, it&#x27;s pretty obvious that it is very easy to end up with vulnerable code.<p>Compared to a lot of other code, where you can easily tell you&#x27;re &quot;done&quot; because &quot;it works&quot;, with crypto code you&#x27;re only halfways there. Not only does it have to work, but it has to <i>not break</i> and not leak secrets, too. Anything from timing attacks to bad handling of padding, bad random generators, not to speak of buffer overflows and logic errors (goto fail, anyone?)<p>I&#x27;m thinking it would be prudent to at least use separate keys for anything interfacing with non-default implementations. Can&#x27;t remember the details but wasn&#x27;t there an issue where if any (gpg? ssl?) key had been used for signing on a certain flawed implementation, its secrets were spilled?<p>What&#x27;s the state of the Go SSH library, has it been vetted by ... veterans? :)
评论 #8742320 未加载
评论 #8742514 未加载
评论 #8742424 未加载
pfortunyover 10 years ago
Any references about the security of cryptographic primitives in Go? I mean: side-channel attacks, timing attacks and the behaviour of rand().<p>Because that is the first thing I would look into.<p>Thanks.<p>I am just asking (a bit fearful, yes), not simply ranting.
评论 #8742262 未加载