Protection Against Side-Channel Attacks Added to OpenSSH
#1
Quote:Protection against Spectre, Meltdown, Rowhammer, RAMBleed and other side-channel attacks has been added to OpenSSH.
 
These recently uncovered attack methods can allow malicious actors to obtain passwords, encryption keys and other sensitive information from memory by leveraging bit flips or speculative execution.
 
OpenSSH, the free and open source version of the Secure Shell (SSH) tools designed for securely controlling devices and transferring data, now includes a mechanism designed to protect private keys at rest in memory, said OpenSSH developer Damien Miller.
 
Private keys, when not in use, are now encrypted with a symmetic key derived from a large “prekey” consisting of random data, Miller said. In order to obtain the protected private key, an attacker would first need to recover the entire prekey, which is not an easy task due to the bit error rates in current side-channel attack methods.
 
“Implementation-wise, keys are encrypted ‘shielded’ when loaded and then automatically and transparently unshielded when used for signatures or when being saved/serialised,” Miller explained. “Hopefully we can remove this in a few years time when computer architecture has become less unsafe.”

SOURCE: https://www.securityweek.com/protection-...ed-openssh
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
XYplorer
What's new in Rele...Kool — 09:30
Sysinternals Suite 3.26.2026
What's New (March ...harlan4096 — 11:40
AxCrypt 3.0.0.83
AxCrypt 3.0.0.83: ...harlan4096 — 11:39
Microsoft Edge 146.0.3856.84
Version 146.0.3856...harlan4096 — 11:37
PowerToys 0.98.1
Release v0.98.1 ...harlan4096 — 11:37

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
There are no staff members currently online.

>