[23180] in bugtraq
Re: OpenSSH & S/Key information leakage
daemon@ATHENA.MIT.EDU (Pavel Kankovsky)
Mon Nov 19 14:03:44 2001
From: "Pavel Kankovsky" <peak@argo.troja.mff.cuni.cz>
Date: Sun, 18 Nov 2001 21:40:45 +0100 (MET)
To: Alan J Rosenthal <flaps@dgp.toronto.edu>
Cc: bugtraq@securityfocus.com
In-Reply-To: <20011115221226.7C93E186B0@atlas.dgp.toronto.edu>
Message-ID: <20011118213643.ED.0@bobanek.nowhere.cz>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
On Thu, 15 Nov 2001, Alan J Rosenthal wrote:
> A login prompt for a non-account looks like this:
>
> login: flomp
> otp-md5 175 at2078 ext
> Response:
>
> So far, so good. But press return once or twice to get "Login incorrect"
> (or make a new conection), and then do
>
> login: flomp
> otp-md5 220 at0624 ext
> Response:
>
> Either the user just set a new passphrase in this one-second interval, or
> "flomp" does not exist.
Seed the PRNG generating this fake challenge with the given username and
nothing but the username (and perhaps some *static* secret data).
--Pavel Kankovsky aka Peak [ Boycott Microsoft--http://www.vcnet.com/bms ]
"Resistance is futile. Open your source code and prepare for assimilation."