this post was submitted on 20 Dec 2023
95 points (76.0% liked)

Technology

59187 readers
2246 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 28 comments
sorted by: hot top controversial new old
[–] [email protected] 152 points 10 months ago (2 children)

Bit of an alarmist headline here. The vulnerability has been patched in the most common clients (openssh) and it was because the protocol wasn't being implemented correctly. To say that the SSH protocol "just got a lot weaker" is just not true.

[–] [email protected] 40 points 10 months ago* (last edited 10 months ago)

The headline is literally exactly opposite the truth, I would say.

[–] [email protected] 16 points 10 months ago* (last edited 10 months ago) (4 children)

It doesn't look that simple to me. From the Terrapin paper:

Although we suggest backward-compatible countermea- sures to stop our attacks, we note that the security of the SSH protocol would benefit from a redesign from scratch. This redesign should be guided by all findings and insights from both practical and theoretical security analysis, in a similar manner as was done for TLS 1.3.

It seems the protocol itself needs a revision and implementation-specific patches are easier and less-than-ideal solutions.

One could argue that even these solutions they provide are already changes to the protocol, and not just fixes to implementation bugs. Both the Sequence Number Reset and Full Transcript Hash add or change functionality at the communication protocol level, rather than simply covering corner cases.

[–] [email protected] 22 points 10 months ago (1 children)

Yeaaaa, a complete redesign from scratch sounds way more dangerous. “Noah, get the boat” isn’t always the best answer. There’s been a lot of thought and testing put into the magnificent work that is SSH over the past few decades.

[–] [email protected] 1 points 10 months ago* (last edited 10 months ago)

I won't pretend I know better than the paper authors, what I can say is that some fixes are not incremental.

There are cases that mature tools and protocols should be left behind, and the danger lies exactly in using a protocol that was designed in the web 1.0 era.

[–] [email protected] 22 points 10 months ago

Yes I was wrong to say that this an implementation detail rather than a protocol problem as the OpenSSH release notes to prevent this vulnerability include extensions to the SSH Transport Protocol, however I still believe that the headline is sensationalist at best since it can and has been protected against by patching ssh clients and servers. It would be entirely unreasonable in the majority of cases to simply stop using SSH on the basis of this vulnerability and that's why I think the headline exaggerates the problem. The Register has a much more measured take on this including comments from the paper's authors that people shouldn't panic and try to fix immediately.

[–] [email protected] 9 points 10 months ago (1 children)

Whole system rewrites are almost never a good idea

[–] [email protected] -1 points 10 months ago (2 children)

they are when fundamental assumptions change

[–] [email protected] 7 points 10 months ago

Can't expect rewrites to be automatically better than what we have now. We have so many replacement for Clang..

[–] [email protected] 2 points 10 months ago (1 children)

In what way have the fundamental assumptions of SSH changed?

[–] [email protected] 3 points 10 months ago* (last edited 10 months ago) (2 children)

SSH carries design choices from the 90s that might not apply today.

But it's the paper authors themselves who are talking about a redesign, not a random Lemmy user, so idk.

Point is - a system redesign is very much something worth looking into if improving the existing system will be too disruptive.

[–] [email protected] 1 points 10 months ago

If you read the other article linked, there are literally already fixes available for many ssh implementations. Doesn’t seem that disruptive to me…

[–] [email protected] 1 points 10 months ago* (last edited 10 months ago)

We went from “the fundamentals have changed” to “the 90s were a long time ago” real fast. Regardless of who made the point initially you are arguing it. Full redesigns are expensive, inefficient, and likely to introduce new vulnerabilities. The existing implementation is refined by decades of real world use. We can incorporate new lessons without a full redesign - if we can’t then we should stop being software engineers.

A full redesign is usually the type of project a CTO I worked for pejoratively called “computer science projects.”

[–] [email protected] 2 points 10 months ago

TLS and SSH has quite different attack vectors so sure, basing SSH on TLS 1.3 would prevent the problems SSH has, but also bring in the problems TLS has. Thing is, I much prefer SSHs tradeof for things SSH is used for while TLS could be argued makes a lot more sense for the HTTPS use case. It just very different chains of trust with very different weak points, just pointing at TLS 1.3 as a solution when talking about SSH is quite ignorant.

[–] [email protected] 46 points 10 months ago (2 children)

[For Terrapin to be viable, the connection it interferes with also must be secured by either "ChaCha20-Poly1305" or "CBC with Encrypt-then-MAC," both of which are cipher modes added to the SSH protocol (in 2013 and 2012, respectively

Well thats easy then, just change your allowed ciphers.

[–] [email protected] 20 points 10 months ago (1 children)

ChaCha20-Poly1305 sounds like an auto-generated Reddit username.

[–] [email protected] 1 points 10 months ago

You'll also have to be connecting to unknown networks or be the subject of a very targeted hacker. If you don't connect to "free wifi" at the airport no one is going to get to position themselves as the middle man in order to do this attack on you very easily.

[–] [email protected] 27 points 10 months ago (3 children)

I like this internet turtle.

[–] [email protected] 19 points 10 months ago (1 children)

OH MY GOD! Mario was right! There’s turtles In the pipes!

[–] [email protected] 1 points 10 months ago

I mean, we've kinda always known and spoken of that 💩

[–] [email protected] 8 points 10 months ago (2 children)

Turtles are such underrated creatures and most people don't realise how important they are to computer science. Turtle robots! Turtle graphics! Not to even mention the very concept of shell access! And yes, turtles are probably very happy that Secure Shell was invented.

[–] [email protected] 2 points 10 months ago

Heroes in a half-shell

[–] [email protected] 1 points 10 months ago* (last edited 10 months ago)

Sudo Cowabunga dudes.zip

[–] [email protected] 3 points 10 months ago
[–] [email protected] 6 points 10 months ago

MitM attacks are also one of the major threats to MFA.

They don't seem to talk much about TLS which is the current standard for most things (VoIP, email.) We still use ssh for a lot but HTTPS is secured through TLS 1.3

[–] [email protected] 4 points 10 months ago

This is the best summary I could come up with:


Once in place, this piece of dedicated hardware surreptitiously inhaled thousands of user names and passwords before it was finally discovered.

Ylönen, who at the time knew little about implementing strong cryptography in code, set out to develop the Secure Shell Protocol (SSH) in early 1995, about three months after the discovery of the password sniffer.

As one of the first network tools to route traffic through an impregnable tunnel fortified with a still-esoteric feature known as "public key encryption," SSH quickly caught on around the world.

Today, it’s hard to overstate the importance of the protocol, which underpins the security of apps used inside millions of organizations, including cloud environments crucial to Google, Amazon, Facebook, and other large companies.

Now, nearly 30 years later, researchers have devised an attack with the potential to undermine, if not cripple, cryptographic SSH protections that the networking world takes for granted.

The attack targets the BPP, short for Binary Packet Protocol, which is designed to ensure that adversaries with an active position can't add or drop messages exchanged during the handshake.


The original article contains 658 words, the summary contains 178 words. Saved 73%. I'm a bot and I'm open source!

[–] [email protected] 2 points 10 months ago

Finland has done a lot for the industry... Hyvää Suomi!