Add keystroke timing obfuscation to the client.
authordjm <djm@openbsd.org>
Mon, 28 Aug 2023 03:31:16 +0000 (03:31 +0000)
committerdjm <djm@openbsd.org>
Mon, 28 Aug 2023 03:31:16 +0000 (03:31 +0000)
commit1d1d630434bcb3cb4e4e3e8aa6fdf787da029628
tree5e595edbc9e75f7aa4956a32d521fc3be76d318d
parent56f6b460f0957d1db356d4f6f2899a212cc21a75
Add keystroke timing obfuscation to the client.

This attempts to hide inter-keystroke timings by sending interactive
traffic at fixed intervals (default: every 20ms) when there is only a
small amount of data being sent. It also sends fake "chaff" keystrokes
for a random interval after the last real keystroke. These are
controlled by a new ssh_config ObscureKeystrokeTiming keyword/

feedback/ok markus@
usr.bin/ssh/clientloop.c
usr.bin/ssh/misc.c
usr.bin/ssh/misc.h
usr.bin/ssh/packet.c
usr.bin/ssh/packet.h
usr.bin/ssh/readconf.c
usr.bin/ssh/readconf.h
usr.bin/ssh/ssh_config.5