[Cryptography] SSH vulnerability when using passwords

lists at notatla.org.uk lists at notatla.org.uk
Thu Jan 15 17:41:55 EST 2015


> > Where is this attack written up in detail?  And how is it best
> > defended against?

> You may be thinking of Dawn Song's 2001 Usenix paper:
> https://www.usenix.org/legacy/events/sec01/full_papers/song/song.pdf

Coincidentally about the same time Solar Designer and Dug Song
(not related to Dawn Song) produced
    http://www.openwall.com/articles/SSH-Traffic-Analysis


More information about the cryptography mailing list