[Plugins-writers] Correction needed for ssh timing attack

From: Senthil Kumar (senthilkumar_sen@private)
Date: Fri Jan 07 2005 - 08:29:57 PST


Hello All,

Im  testing OpenSSH for vulnerabilites with the help of nessus. The nessus nasl script openssh_pam_timing.nasl is not reporting vulnerability even for vulnerable systems. The following change in the script makes it to report the vulnerabilities correctly.

Remove this:
-if ( now - then == 0 )
-{
-}
-if ( now - then >= 2 ) security_note(port);


Add this:
68 ret = ssh_login(socket:soc, login:"nonexistent" + rand(), password:"n3ssus");
69 now = unixtime();
+70 inval_diff=now - then;

77   ret = ssh_login(socket:soc, login:"bin", password:"n3ssus");
78   now = unixtime();
+79 val_diff=now - then;
+80 if ( (val_diff - inval_diff) >= 1) security_note(port);


As the ssh_login for a non-existent user will take some time, checking the difference value of time to be zero is not correct.

Thanks,
Senthil Kumar.




---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.791 / Virus Database: 535 - Release Date: 11/8/2004




_______________________________________________
Plugins-writers mailing list
Plugins-writers@private
http://mail.nessus.org/mailman/listinfo/plugins-writers



This archive was generated by hypermail 2.1.3 : Fri Jan 07 2005 - 08:55:30 PST