Difference between revisions of "Side-channel attacks"
Jump to navigation
Jump to search
Line 5: | Line 5: | ||
− | [[OpenSSH]] 8.1, [[OpenSSH changelog|released in October 2019]] added in [[ssh]], [[sshd] and [[ssh-agent]] protection for [[private key]]s at rest in RAM against speculation and memory side-channel attacks like [[Spectre]], [[Meltdown]] and [[Rambleed]]. | + | [[OpenSSH]] 8.1, [[OpenSSH changelog|released in October 2019]] added in [[ssh]], [[sshd]] and [[ssh-agent]] protection for [[private key]]s at rest in RAM against speculation and memory side-channel attacks like [[Spectre]], [[Meltdown]] and [[Rambleed]]. |
Revision as of 13:42, 4 January 2020
This article is a Draft. Help us to complete it.
OpenSSH 8.1, released in October 2019 added in ssh, sshd and ssh-agent protection for private keys at rest in RAM against speculation and memory side-channel attacks like Spectre, Meltdown and Rambleed.
See also
- Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Advertising: