From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=0.2 required=5.0 tests=DKIM_INVALID,DKIM_SIGNED, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.4 Received: (qmail 23312 invoked from network); 13 Nov 2023 22:04:33 -0000 Received: from 9front.inri.net (168.235.81.73) by inbox.vuxu.org with ESMTPUTF8; 13 Nov 2023 22:04:33 -0000 Received: from pb-smtp2.pobox.com ([64.147.108.71]) by 9front; Mon Nov 13 17:03:10 -0500 2023 Received: from pb-smtp2.pobox.com (unknown [127.0.0.1]) by pb-smtp2.pobox.com (Postfix) with ESMTP id 7A72F1BE41B for <9front@9front.org>; Mon, 13 Nov 2023 17:03:05 -0500 (EST) (envelope-from unobe@cpan.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=pobox.com; h=message-id :to:subject:date:from:mime-version:content-type :content-transfer-encoding; s=sasl; bh=JbS/yEQXzL0OaugF+376a9nB9 wWpYPKbzCW0UrEAe/4=; b=LKf/yeWzm+HZonKFEFnvVfFckqCk8sSlMbIqbw4rw ImiCKlS3Ij5iwbqlH74e8N9MK/NylYWy1dMepNnP8TgepqBCWz2V9b5FlPLV5aal VlumcyC8FHHG8ApAjj/L0xKfXweN71Cj5IHx+pJUMlCEoC5WISMmlluwc8h14FyE NU= Received: from pb-smtp2.nyi.icgroup.com (unknown [127.0.0.1]) by pb-smtp2.pobox.com (Postfix) with ESMTP id 5510F1BE41A for <9front@9front.org>; Mon, 13 Nov 2023 17:03:05 -0500 (EST) (envelope-from unobe@cpan.org) Received: from strider.localdomain (unknown [24.205.13.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp2.pobox.com (Postfix) with ESMTPSA id 066B21BE414 for <9front@9front.org.>; Mon, 13 Nov 2023 17:03:01 -0500 (EST) (envelope-from unobe@cpan.org) Message-ID: To: 9front@9front.org Date: Mon, 13 Nov 2023 14:02:59 -0800 From: unobe@cpan.org MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit X-Pobox-Relay-ID: 6A01AFE8-8270-11EE-BBFD-25B3960A682E-09620299!pb-smtp2.pobox.com List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: lifecycle shader-oriented controller Subject: [9front] passive ssh key compromise via lattices Reply-To: 9front@9front.org Precedence: bulk See https://eprint.iacr.org/2023/1711.pdf . My understanding is that /sys/src/cmd/ssh.c:602 does the proper countermeasure. Anyone wish to confirm?