[29973] in bugtraq
Re: OpenSSH/PAM timing attack allows remote users identification
daemon@ATHENA.MIT.EDU (Ethan Benson)
Thu May 1 13:47:29 2003
Date: Thu, 1 May 2003 01:12:42 -0800
From: Ethan Benson <erbenson@alaska.net>
To: Marco Ivaldi <raptor@mediaservice.net>
Message-ID: <20030501091242.GE27626@plato.local.lan>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="HeFlAV5LIbMFYYuh"
Content-Disposition: inline
In-Reply-To: <Pine.LNX.4.30L2.0304301358220.9889-200000@dns.mediaservice.net>
--HeFlAV5LIbMFYYuh
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Wed, Apr 30, 2003 at 04:34:27PM +0200, Marco Ivaldi wrote:
> root@voodoo:~# ssh [valid_user]@lab.mediaservice.net
> [valid_user]@lab.mediaservice.net's password: <- arbitrary (non-null) str=
ing
> [2 secs delay]
> Permission denied, please try again.
>=20
> root@voodoo:~# ssh [no_such_user]@lab.mediaservice.net
> [no_such_user]@lab.mediaservice.net's password: <- arbitrary (non-null) s=
tring
> [no delay]
> Permission denied, please try again.
ive noticed something similar in its handling of PermitRootLogin, if
this option is set to `no' you get the following behavior:
$ ssh root@host
root@host's password: <- arbitrary (non-null) string
[2 secs delay]
Permission denied, please try again.a
$ ssh root@host
root@host's password: <- correct root password
[no delay]
Permission denied, please try again.
i haven't checked the current version to see if this is still true.=20
i think you also will get no delay if DenyUsers or so is in use for
accounts your testing.
--=20
Ethan Benson
http://www.alaska.net/~erbenson/
--HeFlAV5LIbMFYYuh
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAj6w5QoACgkQJKx7GixEevx0lgCeJPHX0EucMiw5PPp1Jb8ErosX
pb0An1J6za7RsZlI5hhmRivRTqz9/eD5
=u2T6
-----END PGP SIGNATURE-----
--HeFlAV5LIbMFYYuh--