Re: add Spectre variant 2 mitigations

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On 06/02/18 19:52, Darren Tucker wrote:
On 6 February 2018 at 20:09, David Newall <openssh@xxxxxxxxxxxxxxx> wrote:
Do we need to do anything?  It's not clear to me how SSH is vulnerable to
Spectre -- that is, how SSH can be used to execute a Spectre attack?
I am more concerned with it being the target of a Spectre style
attack.  There's some long lived private data (host keys in the case
of sshd, session keys in the case of ssh and sshd and user keys in the
case of ssh-agent) and there's some scope to manipulate their
behaviour through external stimuli.

Indeed, but I'm not sure that SSH can be used in a Spectre attack; nor that using the mitigation strategies in SSH will do anything to prevent these keys from being stolen.  As I understand it, the likely way that SSH session keys will be stolen is by sending malicious JS to the browser.

I'm not saying that SSH needs no mitigation, I'm asking the question, "does it"?  Before we slow SSH down with the mitigation strategies, let's be sure there's a benefit to be gained.

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev




[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux