ssh keystroke timing attacks

19
SSH Keystroke Timing Attacks Mike Hogye Thad Hughes Josh Sarfaty Joe Wolf

Upload: donoma

Post on 11-Feb-2016

52 views

Category:

Documents


3 download

DESCRIPTION

SSH Keystroke Timing Attacks. Mike Hogye Thad Hughes Josh Sarfaty Joe Wolf. SSH. The S ecure SH ell protocol was created by Tatu Ylönen and others to provide encrypted data transfers between remote machines. Mmmm…SSH. SSH Weaknesses. SSH can leak information about passwords - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: SSH Keystroke Timing Attacks

SSH Keystroke Timing Attacks

Mike HogyeThad HughesJosh Sarfaty

Joe Wolf

Page 2: SSH Keystroke Timing Attacks
Page 3: SSH Keystroke Timing Attacks

SSHThe Secure SHell protocol was created by Tatu Ylönen and others to provide encrypted data

transfers between remote machines

Mmmm…SSH

Page 4: SSH Keystroke Timing Attacks

SSH Weaknesses

SSH can leak information about passwordsApproximate length of password can

be inferred by examining number of packets.

Keystroke Timing Analysis can reduce the search space for brute force attacks.

Page 5: SSH Keystroke Timing Attacks

Password Keystroke Timing

• Users type passwords often• Password keystrokes develop consistent rhythm due to

optimized hand motion• This rhythm can be used to determine characteristics about

the password

Page 6: SSH Keystroke Timing Attacks

Time Between Adjacent Keystrokes vs. Key Typed

0.0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

R ] i p J [ : 4 Enter

Key Typed

Tim

e Be

twee

n Ad

jace

nt K

eyst

roke

s (s

econ

ds)

Trial 1

Trial 2

Trial 3

Trial 4

Trial 5

Trial 6

Trial 7

Trial 8

Page 7: SSH Keystroke Timing Attacks

Time Between Adjacent Keystrokes vs. Key TypedWith Network Latency

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

R ] i p J [ : 4 Enter

Key Typed

Tim

e Be

twee

n Ad

jace

nt K

eyst

roke

s (s

econ

ds)

Trial 1

Trial 2

Trial 3

Trial 4

Trial 5

Trial 6

Trial 7

Trial 8

Page 8: SSH Keystroke Timing Attacks

SSH Immediate Mode• Each keystroke is sent IMMEDIATELY from client to

server, one character per packet• Allows interactive user experience

Page 9: SSH Keystroke Timing Attacks

Passwords & SSH•SSH login does NOT used immediate mode•Password (and username) packets are padded to fixed lengths•No problems, right?

WRONG !!Maybe?

Page 10: SSH Keystroke Timing Attacks

su•UNIX “Switch User” command (used to get root access)•Executed in IMMEDIATE mode

SSH1 su command

Page 11: SSH Keystroke Timing Attacks

Nested SSH•Start new SSH session from within a running SSH session•Username and password sent to server B in immediate mode

Page 12: SSH Keystroke Timing Attacks

So What?• Password lengths can be determined• Reveals timing information of password keystrokes• Academically speaking, this is a lot of information

Page 13: SSH Keystroke Timing Attacks

Is This Practical?• How to detect an “su” command?• How to detect a nested SSH session?• Network latency

Page 14: SSH Keystroke Timing Attacks

Detecting the “su”• Look for the ‘su’ signature• Not as easy as it sounds

“I am a su”

40 40

ack ack

40 40 40 40

ack ack ack

48 48

“s” “u” Return “a” “b” “c” “d” Return

40

ack

ack ack ack

56 566440 40 40 40

ack

ack ack ack

40

Server Response

Client

Server

SSH2 su command

Page 15: SSH Keystroke Timing Attacks

SSH! (nested)• Theoretically similar to detecting ‘su’• In practice, much harder to detect• No definite packet signature for calling

‘ssh’

Page 16: SSH Keystroke Timing Attacks

How late(ncy) is your network

• Random network delay influences observed packet times

• Song’s paper considered latency statistics– Determined that latency is not an issue– Used eight year old statistics– Song’s estimated network latency: 10 ms

• Modern latency easily reaches 170 ms

Page 17: SSH Keystroke Timing Attacks

Internet Latency

Page 18: SSH Keystroke Timing Attacks

Conclusions• Song: Timing analysis can reduce brute-

force password search by a factor of 50• In practice, this is unlikely• Use SSH2

– PuTTY defaults to SSH1

Page 19: SSH Keystroke Timing Attacks