Security Focus Interviews Damien Miller 80
An anonymous reader writes "The upcoming version 4.3 of OpenSSH will add support for tunneling allowing you to make a real VPN using OpenSSH without the need for any additional software. This is one of the features discussed in SecurityFocus' interview of OpenSSH developer Damien Miller. The interview touches on, among other things, public key crypto protocols details, timing based attacks and anti-worm measures."
Effective cryptography is a hard problem. (Score:5, Informative)
For example, if you create a VPN with this latest OpenSSH, a lossy network will hold up your traffic. Despite the fact that TCP/IP will try to continue operating with dropped packets, with OpenSSH if you miss one packet the loss cascades into succeeding packets until the client and server are able to resync or the packet is delivered. This accumulation of tolerances is not a problem with IPsec, which is designed cipherwise to work around occasional packet loss.
Most experts agree the product of the best cryptography will be indistinguishable from random noise. This means that it is difficult to share the benefits of compression with file encryption because random noise compresses very poorly, as anyone who attempts to archive their MP3s of today's artists will attest. Additionally, if you accidentally store your encrypted files amongst files containing random noise you run the risk of generating new data during decryption.
The secret is to understand the technology before you use the technology. The problem with encryption is twofold -- some people are overconfident in what they're using and either lose data or risk more than they would if they were fully informed, and others think it's too difficult a topic to broach and leave themselves open to exploitation by network explorers. Certainly when I was in the second category I became convinced of the problem once I saw tools like 'tcpdump' and 'ethereal'.
Thanks guys (Score:5, Informative)
Hacker Summary (Score:5, Informative)
For those hackers who are already familiar with the forwarding features of ssh (-L, -R and -d options), and who are wondering what the hell is this new "support for tunneling", here is a hacker summary. Quoting TFA:
Tun(4) interfaces are indeed very convenient. That's all folks !
Re:Effective cryptography is a hard problem. (Score:5, Informative)
On the other hand, if TCP-over-TCP is your only option (eg. due to the lame firewall my employer set up), then SSH is a great option.
But what does that have to do with increasing security again?
Re:I disagree on one point. (Score:3, Informative)
kick arse vpn (Score:4, Informative)
http://www.hamachi.cc/ [hamachi.cc]
Loos like a better way of doing VPN.. though ssh with in built vpn is going to be nice...
Re:Swapping the order introduces other problems (Score:0, Informative)
Re:kick arse vpn (Score:3, Informative)
Anyone seen this before?: http://www.hamachi.cc/ [hamachi.cc]
Loos like a better way of doing VPN.. though ssh with in built vpn is going to be nice...
Here's my not so humble opinion about Hamachi:
Software review: Hamachi [filion.org]
In short: some good, some bad, some really great, some horrible.
Re:chroot (Score:3, Informative)
Re:Swapping the order introduces other problems (Score:3, Informative)
You're spouting complete nonsense. A secure block cipher in a secure mode of operation revelals nothing about the similarities between files. Loock up CBC mode on Google - a large random initialization vector is used to ensure that identical (or similar) plaintext blocks encrypt completely differently. I also suggest a thorough reading of Applied Cryptography by Bruce Schneier.
OpenPGP, for example, uses gzip compression before encryption with every file. Yet PGP is widely considered very secure. Why? Because a secure mode of operation for the cipher (AES, 3DES, whatever) is used, with a random IV that ensures even identical files produce completely different ciphertext.
Re:SSH is SSH and VPN is VPN (Score:1, Informative)
WHAT???
You, "olde scholar" find too dificult just `ssh -X user@host` and then `startx`?
Now: how can it be any easier!?