On Tue, Oct 09, 2001 at 10:54:13AM -0400, Michael H. Warfield wrote: > On Tue, Oct 09, 2001 at 03:44:47PM +0200, Robert van der Meulen wrote: > Yeah, I've seen some comments and a patch or two on the OpenSSH > mailing list and some chatter on the SSH mailing list. I think you could > find a patch, which includes some time randomizers and some idle time > packets, just by searching archives on the mailings lists for the last > couple of months. I'd be interested in any such patches you might be able to dig up or know of. An idle random-packet generator would be quite interesting, especially if it meant that the two sides sometimes acknowledged (echo'd) the packets and other times didn't, to simulate interactive and non-interactive packets. It would have to send the packets sometimes individually like random key strokes, and other times in chunks like an X application. If anyone here knows of any cryptographers that have actually looked at these types of traffic analysis attacks and preventative measures, feel free to post links. -- Michael T. Babcock CTO, FibreSpeed Ltd. Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/