Hacker News new | past | comments | ask | show | jobs | submit login

If you believe Jacob Appelbaum, we probably should not be using SSH for anything http://media.ccc.de/browse/congress/2014/31c3_-_6258_-_en_-_...



If you believe that being able to sometimes compromise some implementations of SSH under some circumstances means that you shouldn't use SSH for anything then maybe you shouldn't use the Internet at all.


Yea I was fairly confused about that announcement as I couldn't find anything damning in the released docs about SSH. Do you have a reference to a specific document/slide?


Spiegel briefly touched on it too;

The NSA also has a program with which it claims it can sometimes decrypt the Secure Shell protocol (SSH). This is typically used by systems administrators to log into employees' computers remotely, largely for use in the infrastructure of businesses, core Internet routers and other similarly important systems. The NSA combines the data collected in this manner with other information to leverage access to important systems of interest.

(source: http://www.spiegel.de/international/germany/inside-the-nsa-s... )

Still incredibly vague. If they're archiving all traffic in hopes of decrypting it some day though, it's safe to say we should treat anything on the internet as the shiny side of one way glass.


My guess is that, at least, some router ssh implementation is insecure, possibly not by accident.

From the slides:

Page 19: "SSH [...] Potentially recover user names and passwords" Page 36: "SSH - often have router configurations and user credentials [...]"

http://www.spiegel.de/media/media-35515.pdf


Right, I saw that also. Is it referring to routers that happen to run SSH with default root/admin passwords or something? I couldn't find anything more concrete.


The slides say they can sometimes decrypt SSH sessions (with ssmintm?) and catpute usernames and passwords from SSH servers.

The only unexpected thing I could see there was the lack of anything I didn't know how to do...


Yea, sshmitm makes sense also, but I wouldn't consider that a 0day exactly. :P


Relevant bit starts around 00:25:30

Also: https://twitter.com/ioerror/status/549327936361611264


This link 404's for me; can you give a summary?


That's weird all the CCC videos were returning 404. The link appears to be working again now. It's a few days since I watched but I inferred that SSH may have some undisclosed vulnerabilities.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: