Timing Analysis of Keystrokes and Timing Attacks on SSH [PDF format] Paper describing research into applying traffic-analysis techniques to interactive SSH connections in order to infer information about the encrypted connection contents. Concludes that the keystroke timing data observable from today's SSH implementations reveals a dangerously significant amount of information about user terminal sessions. http://packetstormsecurity.nl/papers/cryptography/ssh-timing.pdf ReviewsRating: Not yet Rated
Whois Check
Ports of SSH Extensive compilation of SSH documentation and links to client downloads. http://heimhardt.com/htdocs/ssh.html ReviewsRating: Not yet Rated
Whois Check
SSH and beyond Discussion of security issues when using SSH over NFS. http://fy.chalmers.se/~appro/ssh_beyond.html ReviewsRating: Not yet Rated
Whois Check
CERT Advisory CA-99-15 December 1999 -- CERT Advisory CA-99-15 Buffer Overflows in SSH Daemon and RSAREF2 Library. Affects all versions of SSH 1.2.27 and lower when built with RSAREF (all US versions.) http://www.cert.org/advisories/CA-99-15-RSAREF2.html ReviewsRating: Not yet Rated
Whois Check