| ▲ | eikenberry 6 hours ago | |||||||||||||||||||
It is to prevent timing attacks but there are many ssh use cases where it is 100% computer to computer communications where there is no key based timing attack possible. | ||||||||||||||||||||
| ▲ | OneDeuxTriSeiGo 5 hours ago | parent | next [-] | |||||||||||||||||||
There is an argument that if: - you are listening to an SSH session between devices - and you know what protocol is being talked over the connection (i.e. what they are talking about) - and the protocol is reasonably predictable then you gain enough information about the plaintext to start extracting information about the cipher and keys. It's a non-trivial attack by all means but it's totally feasible. Especially if there's some amount of observable state about the participants being leaked by a third party source (i.e. other services hosted by the participants involved in the same protocol). | ||||||||||||||||||||
| ||||||||||||||||||||
| ▲ | PhilipRoman 5 hours ago | parent | prev [-] | |||||||||||||||||||
I haven't given this more than 5 seconds of thought, but wouldn't it make sense to only enable the timing attack prevention for pseudo-terminal sessions (-t)? | ||||||||||||||||||||