Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 12 Feb 2001 11:45:06 +0100
From:      Andrea Campi <andrea@webcom.it>
To:        Kris Kennaway <kris@FreeBSD.org>
Cc:        cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   Re: cvs commit: src/crypto/openssh rsa.c rsa.h ssh-agent.c sshconnect1.c sshd.c
Message-ID:  <20010212114505.B631@webcom.it>
In-Reply-To: <200102120644.f1C6iqj18540@freefall.freebsd.org>; from kris@FreeBSD.org on Sun, Feb 11, 2001 at 10:44:52PM -0800
References:  <200102120644.f1C6iqj18540@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
>   Modified files:
>     crypto/openssh       rsa.c rsa.h ssh-agent.c sshconnect1.c 
>                          sshd.c 
>   Log:
>   Patches backported from later development version of OpenSSH which prevent
>   (instead of just mitigating through connection limits) the Bleichenbacher
>   attack which can lead to guessing of the server key (not host key) by
>   regenerating it when an RSA failure is detected.

Haven't actually tested this given -CURRENT breakage so I might say something
stupid but...

What happens if an attacker is able to trigger regeneration tens or hundreds of
times per second? I think there is opportunity for a DOS if this isn't done
properly!

Bye,
	Andrea

-- 
         The computer revolution is over. The computers won.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010212114505.B631>