boem@lemmy.world to Technology@lemmy.worldEnglish · 1 year agoIn a first, cryptographic keys protecting SSH connections stolen in new attackarstechnica.comexternal-linkmessage-square6fedilinkarrow-up1199arrow-down14cross-posted to: saugumas@group.ltcybersecurity@infosec.pubtech@pawb.social
arrow-up1195arrow-down1external-linkIn a first, cryptographic keys protecting SSH connections stolen in new attackarstechnica.comboem@lemmy.world to Technology@lemmy.worldEnglish · 1 year agomessage-square6fedilinkcross-posted to: saugumas@group.ltcybersecurity@infosec.pubtech@pawb.social
minus-squarelemmyvore@feddit.nllinkfedilinkEnglisharrow-up81·1 year agoOnly affects RSA keys, and then only 1 in a million keys are vulnerable. So this is mostly of academic (rather than practical) interest, but nevertheless it will lead to further hardening of the SSH protocol which is nice.
minus-squareBorgDrone@lemmy.onelinkfedilinkEnglisharrow-up55arrow-down2·1 year agoOne in a million is next Tuesday
minus-squarePlasticExistence@lemmy.worldlinkfedilinkEnglisharrow-up25·1 year agoIt also appears to only affect non-OpenSSH secure shell implementations.
minus-squaredeafboy@lemmy.worldlinkfedilinkEnglisharrow-up1·1 year agoSecurity of a sufficiently long RSA key was the one true constant in my life. Poof… There it goes! Once attackers have possession of the secret key through passive observation of traffic, they can mount an active Mallory-in-the-middle Mallory in the middle would be a sick punkrock band name though.
Only affects RSA keys, and then only 1 in a million keys are vulnerable. So this is mostly of academic (rather than practical) interest, but nevertheless it will lead to further hardening of the SSH protocol which is nice.
One in a million is next Tuesday
It also appears to only affect non-OpenSSH secure shell implementations.
Oh, so like 3 users
Security of a sufficiently long RSA key was the one true constant in my life. Poof… There it goes!
Mallory in the middle would be a sick punkrock band name though.