Terrapin attack
The Terrapin attack is a cryptographic attack on the commonly used SSH protocol that is used for secure command-and-control throughout the Internet. The Terrapin attack can reduce the security of SSH by using a downgrade attack via man-in-the-middle interception.[1][2][3] The attack works by prefix truncation; the injection and deletion of messages during feature negotiation, manipulating sequence numbers in a way that causes other messages to be ignored without an error being detected by either client or server.[4]
According to the attack's discoverers, the majority of SSH implementations were vulnerable at the time of the discovery of the attack (2023).[4] As of January 3, 2024, an estimated 11 million publicly accessible SSH servers are still vulnerable.[5] However, the risk is mitigated by the requirement to intercept a genuine SSH session, and that the attack can only delete messages at the start of a negotiation, fortuitously resulting mostly in failed connections.[4][6] Additionally the attack requires the use of either ChaCha20-Poly1305 or a CBC cipher in combination with Encrypt-then-MAC modes of encryption.[7] The SSH developers have stated that the major impact of the attack is the capability to degrade the keystroke timing obfuscation features of SSH.[6]
The designers of SSH have implemented a fix for the Terrapin attack, but the fix is only fully effective when both client and server implementations have been upgraded to support it.[1] The researchers who discovered the attack have also created a vulnerability scanner to determine whether an SSH server or client is vulnerable.[8]
The attack has been given the CVE ID CVE-2023-48795.[9][3] In addition to the main attack, two other vulnerabilities were found in AsyncSSH, and assigned the CVE IDs CVE-2023-46445 and CVE-2023-46446.[3]
References
- ^ a b Goodin, Dan (2023-12-19). "SSH protects the world's most sensitive networks. It just got a lot weaker". Ars Technica. Retrieved 2023-12-20.
- ^ Bäumer, Fabian; Brinkmann, Marcus; Schwenk, Jörg (2023-12-19), Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation, arXiv:2312.12422
- ^ a b c "Terrapin attacks can downgrade security of OpenSSH connections". BleepingComputer. Retrieved 2023-12-20.
- ^ a b c Jones, Connor. "SSH shaken, not stirred by Terrapin downgrade vulnerability". www.theregister.com. Retrieved 2023-12-20.
- ^ "Nearly 11 million SSH servers vulnerable to new Terrapin attacks". BleepingComputer. Retrieved 2024-01-07.
- ^ a b "OpenSSH 9.6 release notes". openssh.com. 2023-12-18.
- ^ "Terrapin Attack". terrapin-attack.com. Retrieved 2024-01-07.
- ^ "Release v1.1.0 · RUB-NDS/Terrapin-Scanner". GitHub. Retrieved 2024-01-07.
- ^ "CVE-2023-48795". cve.org. Retrieved 2024-01-16.
External links
- Official website
- Classic mitm on ssh vs. Terrapin-Attack: packet handling comparison
- v
- t
- e
← 2010s | Timeline | 2030s → |
2020 |
|
---|---|
2021 |
|
2022 | |
2023 | |
2024 |
- Anonymous
- Anonymous Sudan
- Berserk Bear
- BlackCat
- Clop
- Cozy Bear
- DarkMatter
- DarkSide
- Dridex
- Ghostwriter
- GnosticPlayers
- Guacamaya
- Hafnium
- IT Army of Ukraine
- Killnet
- Lapsus$
- LightBasin
- LockBit
- OceanLotus
- REvil
- Sandworm
- Sakura Samurai
- ShinyHunters
- Wizard Spider
publicly disclosed
- SMBGhost (2020)
- Thunderspy (2020)
- PrintNightmare (2021)
- FORCEDENTRY (2021)
- Log4Shell (2021)
- Account pre-hijacking (2022)
- Retbleed (2022)
- Downfall (2023)
- LogoFAIL (2023)
- Reptar (2023)
- Terrapin (2023)
- GoFetch (2024)
- Sinkclose (2024)
2020 | |
---|---|
2021 |
|
2022 |
|
This Internet-related article is a stub. You can help Wikipedia by expanding it. |
- v
- t
- e
This cryptography-related article is a stub. You can help Wikipedia by expanding it. |
- v
- t
- e