[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#774410: allow for the package-specific version banner to be suppressed for ssh client



Broadcasting the client version is a serious privacy issue for those up
against a network-level adversary (China/Iran activists, anybody GCHQ/NSA
doesn't like). The important issue is timing correlation.

Example:

A) Activist creates anonymous website, uses SSH-over-TOR to update his
website.
B) Network-level adversary monitors network around his website, sees the
activist is using SSH-2.0-OpenSSH_6.0p1 Debian-4+deb7u1.
C) Activist updates SSH through apt-get dist-upgrade using his real IP.
D) Activist updates his website using SSH-over-TOR.
E) Network-level adversary now sees he is using SSH-2.0-OpenSSH_6.0p1
Debian-4+deb7u2.
F) Network-level adversary checks their captured network data to see who
downloaded the Debian-4+deb7u2 deb from security.debian.org or other
mirrors during that time.

There are other variations that don't require the adversary to monitor the
traffic to the package mirrors. Example:

A) Activist visits state run news site using his real IP.
B) Activist uses SSH-over-TOR to write rebuttals to each news item.
C) Network-level adversary sees when he upgrades his SSH version.
D) Network-level adversary correlates that with visitors to their news
site whose User-Agent version changed around the same time (of course
limiting it to Debian users since for some reason the User-Agent strings
report that).

Even a traditional police adversary could use time correlation with no
network monitoring needed. Seize the server, seize a suspect's TAILS CD,
use /var/log/auth.log on the server to match the SSH client upgrade time
with the timestamp the TAILS CD was burned.

I'm sure there are many more but you get the idea. Leaking any information
about the OS or package versions should always be avoided. Even if you
can't think of a scenario that would abuse it does not mean that scenario
doesn't exist.


Reply to: