FreeBSD Security Advisory FreeBSD-SA-03:12.openssh

Roger Marquis marquis at roble.com
Thu Sep 18 17:57:00 PDT 2003


Bruce M Simpson wrote:
> When you run out of inetd to service a single connection, you have to
> generate a new ephemeral key for every ssh instance. This is a needless
> waste of precious entropy from /dev/random.

It takes all of 2 seconds to generate a ssh 2 new session on a
500Mhz cpu (causing less than 20% utilization).  Considering that
99% of even the most heavily loaded servers have more than enough
cpu for this task I don't really see it as an issue.

Also, by generating a different key for each session you get better
entropy, which makes for better encryption, especially when you
consider that the keys for one session are useless when attempting
to decrypt other sessions.  For this reason alone it's better to
run sshd out of inetd.

> I think running sshd out of inetd is a very bad idea indeed, unless
> Mr Marquis is willing to stay in my datacenter and hammer the keys like
> a monkey all day, but even then that might be a poor source of entropy.

I've been using inetd+ssh since 1995, in dozens of data centers,
across hundreds of hosts, and millions of sessions without a single
problem.  I wonder what Bruce Schneier would think of Mr. Simpson's
understanding of cryptography?

-- 
Roger Marquis
Roble Systems Consulting
http://www.roble.com/


More information about the freebsd-security mailing list