Inoculating SSH Against Address Harvesting
نویسندگان
چکیده
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses from users’ address lists or mail archives. We examine how host addresses harvested from Secure Shell (SSH) clients’ known hosts files can aid those attacking SSH servers. Each user’s known hosts file contains the names of every host previously accessed by its owner. Thus, when an attacker compromises a user’s password or identity key, the known hosts file can be used to identify those hosts on a network that are most likely to accept this compromised credential. Such attacks are not theoretical – a single attacker who targeted host authentication via SSH and employed known hosts address harvesting was able to gain access to a multitude of academic, commercial, and government systems. To show the value of known hosts files to such attackers, we present results of a study of known hosts files and other data collected from 173 hosts distributed over 25 top level domains. We also collected data on users’ credential management practices, and discovered that 61.7% of the identity keys we encountered were stored unencrypted. To show how host authentication attacks via SSH could evolve if automated, we survey mechanisms used to attack and their suitability for use in self-propagating code. Finally, we present countermeasures devised to defend against address harvesting, which have been adopted by the OpenSSH team and one of the two main commercial SSH software vendors.
منابع مشابه
A Denied-Events based Detection Method against SSH Brute-force Attack in Supercomputing Service Environment
The brute-force attack is one of general cyber security threats in supercomputing service environment using a secure shell (SSH) protocol. First we analyzed SSH bruteforce attacks had been detected through the log file parsing method of servers in the KISTI. We found that SSH bruteforce attacks are classified ’1:1’, ’1:N’ or ’N:1’ types of attack between source and destination IP address. And t...
متن کاملSome Fixes To SSH
To against some known attacks to Secure Shell (SSH), I propose some fixes to SSH. The fixes include add a key producer function and revise the MAC.
متن کاملProvable Security in Practice: Analysis of SSH and CBC mode with Padding
This thesis illustrates and examines the gap that exists between theoretical and practical cryptography. Provable security is a useful tool which allows cryptographers to perform formal security analyses within a strict mathematical framework. Unfortunately, the formal modelling of provable security sometimes fails to match how particular schemes or protocols are implemented in real life. We ex...
متن کاملPlaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
This paper presents a formal security analysis of SSH in counter mode in a security model that accurately captures the capabilities of real-world attackers, as well as security-relevant features of the SSH specifications and the OpenSSH implementation of SSH. Under reasonable assumptions on the block cipher and MAC algorithms used to construct the SSH Binary Packet Protocol (BPP), we are able t...
متن کاملThe spiritual history in outpatient practice: attitudes and practices of health professionals in the Adventist Health System
BACKGROUND A screening spiritual history (SSH) is how health professionals (HP) identify patients' spiritual values, beliefs and preferences (VBPs) in the outpatient setting. We report on attitudes and practices of HPs in the largest Protestant health system in the U.S., the Adventist Health System (AHS). METHOD Physicians or mid-level practitioners (N = 1082) in AHS-affiliated practices were...
متن کامل