TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Report of an NSA Employee about a Backdoor in the OpenSSH Daemon (2012) [pdf]

61 pointsby Audiophilipover 10 years ago

7 comments

toygover 10 years ago
This is more of a rootkit than a backdoor, since you have to replace the OpenSSH binary with a trojaned version. A backdoor usually implies that it was there from the start, which is exactly the opposite of what the guy says (he reports having to fight OpenSSH hard to let him have the backdoor).<p>Title should be &quot;NSA Employee Reports Developing OpenSSH Rootkit&quot;.
评论 #8905782 未加载
评论 #8905945 未加载
clamprechtover 10 years ago
The thing that strikes me from this report is that he or she (and most of these programmer types working for NSA groups) are just like many of the HN&#x2F;tech crowd, except they&#x27;re working for &quot;the other side&quot;. Heck, many of them probably read HN every day.<p>&gt; New Zealand was incredible! I wish I’d had more time there, but I did pretty well. I saw a handful of LOTR sights, Mount Cook, a number of gorgeous lakes, snow-capped mountains everywhere ... I absolutely loved my time in Australia, both in terms of work and travel, but I’m also looking forward to returning to the land of Chick-fil-A, college athletics, BBQ pork, and real bacon. Oh, and good beer.<p>It&#x27;s great that they love their work, but it&#x27;s too bad so many smart people are going to work on projects that violate so many people&#x27;s rights.
评论 #8906309 未加载
评论 #8905818 未加载
tedunangstover 10 years ago
&gt; SSH has a <i>lot</i> of checks to make sure you can&#x27;t switch usernames in the middle of a login (go figure) so this was a bit tricky to bypass.<p>Go figure.
mappuover 10 years ago
On debian&#x2F;ubuntu you can detect modified packages with `debsums` - but the signatures seem to be MD5, for which it&#x27;s possible to generate collisions with e.g. something like <a href="http://www.bishopfox.com/resources/tools/other-free-tools/md4md5-collision-code/" rel="nofollow">http:&#x2F;&#x2F;www.bishopfox.com&#x2F;resources&#x2F;tools&#x2F;other-free-tools&#x2F;md...</a> .
评论 #8905923 未加载
click170over 10 years ago
&gt; Currently DSD uses authorized_keys as a quick-and-easy method for persistence against certain *nix targets.<p>Good to know. Time for a security audit of every authorized_keys file I maintain.
dorafmonover 10 years ago
If they developed an alternative version of OpenSSH with backdoor how can they distribute it so that people will actually use it?
评论 #8906500 未加载
thrillover 10 years ago
It&#x27;s good to see a man who enjoys his work.
评论 #8905870 未加载